@volcengine/pulumi 0.0.30 → 0.0.32
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/cloud_identity/permissionSetAssignment.d.ts +15 -0
- package/cloud_identity/permissionSetAssignment.js +2 -0
- package/cloud_identity/permissionSetAssignment.js.map +1 -1
- package/cloud_identity/permissionSetProvisioning.d.ts +5 -3
- package/cloud_identity/permissionSetProvisioning.js +5 -3
- package/cloud_identity/permissionSetProvisioning.js.map +1 -1
- package/dns/backup.d.ts +10 -1
- package/dns/backup.js +10 -1
- package/dns/backup.js.map +1 -1
- package/dns/zone.d.ts +1 -1
- package/dns/zone.js +1 -1
- package/ebs/getMaxExtraPerformances.d.ts +82 -0
- package/ebs/getMaxExtraPerformances.js +30 -0
- package/ebs/getMaxExtraPerformances.js.map +1 -0
- package/ebs/index.d.ts +6 -0
- package/ebs/index.js +7 -1
- package/ebs/index.js.map +1 -1
- package/ebs/maxExtraPerformances.d.ts +84 -0
- package/ebs/maxExtraPerformances.js +33 -0
- package/ebs/maxExtraPerformances.js.map +1 -0
- package/ebs/volume.d.ts +22 -14
- package/ebs/volume.js +7 -2
- package/ebs/volume.js.map +1 -1
- package/escloud_v2/escloudInstanceV2.d.ts +19 -3
- package/escloud_v2/escloudInstanceV2.js +19 -3
- package/escloud_v2/escloudInstanceV2.js.map +1 -1
- package/kafka/instance.d.ts +37 -0
- package/kafka/instance.js +37 -0
- package/kafka/instance.js.map +1 -1
- package/mongodb/instance.d.ts +66 -11
- package/mongodb/instance.js +40 -11
- package/mongodb/instance.js.map +1 -1
- package/nas/fileSystem.d.ts +58 -0
- package/nas/fileSystem.js +58 -0
- package/nas/fileSystem.js.map +1 -1
- package/nas/getMountPoints.d.ts +112 -0
- package/nas/getMountPoints.js +112 -0
- package/nas/getMountPoints.js.map +1 -1
- package/nas/mountPoint.d.ts +53 -0
- package/nas/mountPoint.js +53 -0
- package/nas/mountPoint.js.map +1 -1
- package/nas/mountPoints.d.ts +112 -0
- package/nas/mountPoints.js +112 -0
- package/nas/mountPoints.js.map +1 -1
- package/package.json +1 -1
- package/rds_mysql/instance.d.ts +42 -8
- package/rds_mysql/instance.js +42 -8
- package/rds_mysql/instance.js.map +1 -1
- package/rds_postgresql/instance.d.ts +54 -3
- package/rds_postgresql/instance.js +54 -3
- package/rds_postgresql/instance.js.map +1 -1
- package/redis/instance.d.ts +8 -1
- package/redis/instance.js +8 -1
- package/redis/instance.js.map +1 -1
- package/types/output.d.ts +220 -0
- package/vke/getPermissions.d.ts +137 -0
- package/vke/getPermissions.js +55 -0
- package/vke/getPermissions.js.map +1 -0
- package/vke/index.d.ts +9 -0
- package/vke/index.js +12 -1
- package/vke/index.js.map +1 -1
- package/vke/permission.d.ts +269 -0
- package/vke/permission.js +165 -0
- package/vke/permission.js.map +1 -0
- package/vke/permissions.d.ts +139 -0
- package/vke/permissions.js +58 -0
- package/vke/permissions.js.map +1 -0
- package/vpc/routeEntry.d.ts +27 -6
- package/vpc/routeEntry.js +27 -6
- package/vpc/routeEntry.js.map +1 -1
|
@@ -0,0 +1,269 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* Provides a resource to manage vke permission
|
|
4
|
+
* ## Example Usage
|
|
5
|
+
*
|
|
6
|
+
* ```typescript
|
|
7
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
8
|
+
* import * as volcengine from "@pulumi/volcengine";
|
|
9
|
+
* import * as volcengine from "@volcengine/pulumi";
|
|
10
|
+
*
|
|
11
|
+
* const fooZones = volcengine.ecs.getZones({});
|
|
12
|
+
* // create vpc
|
|
13
|
+
* const fooVpc = new volcengine.vpc.Vpc("fooVpc", {
|
|
14
|
+
* vpcName: "acc-test-vpc",
|
|
15
|
+
* cidrBlock: "172.16.0.0/16",
|
|
16
|
+
* });
|
|
17
|
+
* // create subnet
|
|
18
|
+
* const fooSubnet = new volcengine.vpc.Subnet("fooSubnet", {
|
|
19
|
+
* subnetName: "acc-test-subnet",
|
|
20
|
+
* cidrBlock: "172.16.0.0/24",
|
|
21
|
+
* zoneId: fooZones.then(fooZones => fooZones.zones?.[0]?.id),
|
|
22
|
+
* vpcId: fooVpc.id,
|
|
23
|
+
* });
|
|
24
|
+
* // create security group
|
|
25
|
+
* const fooSecurityGroup = new volcengine.vpc.SecurityGroup("fooSecurityGroup", {
|
|
26
|
+
* securityGroupName: "acc-test-security-group",
|
|
27
|
+
* vpcId: fooVpc.id,
|
|
28
|
+
* });
|
|
29
|
+
* // create vke cluster
|
|
30
|
+
* const fooCluster = new volcengine.vke.Cluster("fooCluster", {
|
|
31
|
+
* description: "created by terraform",
|
|
32
|
+
* projectName: "default",
|
|
33
|
+
* deleteProtectionEnabled: false,
|
|
34
|
+
* clusterConfig: {
|
|
35
|
+
* subnetIds: [fooSubnet.id],
|
|
36
|
+
* apiServerPublicAccessEnabled: true,
|
|
37
|
+
* apiServerPublicAccessConfig: {
|
|
38
|
+
* publicAccessNetworkConfig: {
|
|
39
|
+
* billingType: "PostPaidByBandwidth",
|
|
40
|
+
* bandwidth: 1,
|
|
41
|
+
* },
|
|
42
|
+
* },
|
|
43
|
+
* resourcePublicAccessDefaultEnabled: true,
|
|
44
|
+
* },
|
|
45
|
+
* podsConfig: {
|
|
46
|
+
* podNetworkMode: "VpcCniShared",
|
|
47
|
+
* vpcCniConfig: {
|
|
48
|
+
* subnetIds: [fooSubnet.id],
|
|
49
|
+
* },
|
|
50
|
+
* },
|
|
51
|
+
* servicesConfig: {
|
|
52
|
+
* serviceCidrsv4s: ["172.30.0.0/18"],
|
|
53
|
+
* },
|
|
54
|
+
* tags: [{
|
|
55
|
+
* key: "tf-k1",
|
|
56
|
+
* value: "tf-v1",
|
|
57
|
+
* }],
|
|
58
|
+
* });
|
|
59
|
+
* const fooPermission = new volcengine.vke.Permission("fooPermission", {
|
|
60
|
+
* roleName: "vke:visitor",
|
|
61
|
+
* granteeId: 385500000,
|
|
62
|
+
* granteeType: "User",
|
|
63
|
+
* roleDomain: "cluster",
|
|
64
|
+
* clusterId: fooCluster.id,
|
|
65
|
+
* });
|
|
66
|
+
* ```
|
|
67
|
+
*
|
|
68
|
+
* ## Import
|
|
69
|
+
*
|
|
70
|
+
* VkePermission can be imported using the id, e.g.
|
|
71
|
+
*
|
|
72
|
+
* ```sh
|
|
73
|
+
* $ pulumi import volcengine:vke/permission:Permission default resource_id
|
|
74
|
+
* ```
|
|
75
|
+
*/
|
|
76
|
+
export declare class Permission extends pulumi.CustomResource {
|
|
77
|
+
/**
|
|
78
|
+
* Get an existing Permission resource's state with the given name, ID, and optional extra
|
|
79
|
+
* properties used to qualify the lookup.
|
|
80
|
+
*
|
|
81
|
+
* @param name The _unique_ name of the resulting resource.
|
|
82
|
+
* @param id The _unique_ provider ID of the resource to lookup.
|
|
83
|
+
* @param state Any extra arguments used during the lookup.
|
|
84
|
+
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
85
|
+
*/
|
|
86
|
+
static get(name: string, id: pulumi.Input<pulumi.ID>, state?: PermissionState, opts?: pulumi.CustomResourceOptions): Permission;
|
|
87
|
+
/**
|
|
88
|
+
* Returns true if the given object is an instance of Permission. This is designed to work even
|
|
89
|
+
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
90
|
+
*/
|
|
91
|
+
static isInstance(obj: any): obj is Permission;
|
|
92
|
+
/**
|
|
93
|
+
* The authorized time of the RBAC Permission.
|
|
94
|
+
*/
|
|
95
|
+
readonly authorizedAt: pulumi.Output<string>;
|
|
96
|
+
/**
|
|
97
|
+
* The ID of the Authorizer.
|
|
98
|
+
*/
|
|
99
|
+
readonly authorizerId: pulumi.Output<number>;
|
|
100
|
+
/**
|
|
101
|
+
* The name of the Authorizer.
|
|
102
|
+
*/
|
|
103
|
+
readonly authorizerName: pulumi.Output<string>;
|
|
104
|
+
/**
|
|
105
|
+
* The type of the Authorizer.
|
|
106
|
+
*/
|
|
107
|
+
readonly authorizerType: pulumi.Output<string>;
|
|
108
|
+
/**
|
|
109
|
+
* The cluster ID that needs to be authorized to IAM users or roles.
|
|
110
|
+
*/
|
|
111
|
+
readonly clusterId: pulumi.Output<string>;
|
|
112
|
+
/**
|
|
113
|
+
* The granted time of the RBAC Permission.
|
|
114
|
+
*/
|
|
115
|
+
readonly grantedAt: pulumi.Output<string>;
|
|
116
|
+
/**
|
|
117
|
+
* The ID of the grantee.
|
|
118
|
+
*/
|
|
119
|
+
readonly granteeId: pulumi.Output<number>;
|
|
120
|
+
/**
|
|
121
|
+
* The type of the grantee. Valid values: `User`.
|
|
122
|
+
*/
|
|
123
|
+
readonly granteeType: pulumi.Output<string>;
|
|
124
|
+
/**
|
|
125
|
+
* Whether the RBAC role is a custom role. Default is false.
|
|
126
|
+
*/
|
|
127
|
+
readonly isCustomRole: pulumi.Output<boolean>;
|
|
128
|
+
/**
|
|
129
|
+
* The name of the Kube Role Binding.
|
|
130
|
+
*/
|
|
131
|
+
readonly kubeRoleBindingName: pulumi.Output<string>;
|
|
132
|
+
/**
|
|
133
|
+
* The message of the RBAC Permission.
|
|
134
|
+
*/
|
|
135
|
+
readonly message: pulumi.Output<string>;
|
|
136
|
+
/**
|
|
137
|
+
* The namespace that needs to be authorized to IAM users or roles.
|
|
138
|
+
*/
|
|
139
|
+
readonly namespace: pulumi.Output<string>;
|
|
140
|
+
/**
|
|
141
|
+
* The revoked time of the RBAC Permission.
|
|
142
|
+
*/
|
|
143
|
+
readonly revokedAt: pulumi.Output<string>;
|
|
144
|
+
/**
|
|
145
|
+
* The types of permissions granted to IAM users or roles. Valid values: `namespace`, `cluster`, `allClusters`.
|
|
146
|
+
* When importing resources, this attribute will not be imported. If this attribute is set, please use lifecycle and ignoreChanges ignore changes in fields.
|
|
147
|
+
*/
|
|
148
|
+
readonly roleDomain: pulumi.Output<string>;
|
|
149
|
+
/**
|
|
150
|
+
* The name of RBAC role. The following RBAC permissions can be granted: custom role name, system preset role names.
|
|
151
|
+
*/
|
|
152
|
+
readonly roleName: pulumi.Output<string>;
|
|
153
|
+
/**
|
|
154
|
+
* The status of the RBAC Permission.
|
|
155
|
+
*/
|
|
156
|
+
readonly status: pulumi.Output<string>;
|
|
157
|
+
/**
|
|
158
|
+
* Create a Permission resource with the given unique name, arguments, and options.
|
|
159
|
+
*
|
|
160
|
+
* @param name The _unique_ name of the resource.
|
|
161
|
+
* @param args The arguments to use to populate this resource's properties.
|
|
162
|
+
* @param opts A bag of options that control this resource's behavior.
|
|
163
|
+
*/
|
|
164
|
+
constructor(name: string, args: PermissionArgs, opts?: pulumi.CustomResourceOptions);
|
|
165
|
+
}
|
|
166
|
+
/**
|
|
167
|
+
* Input properties used for looking up and filtering Permission resources.
|
|
168
|
+
*/
|
|
169
|
+
export interface PermissionState {
|
|
170
|
+
/**
|
|
171
|
+
* The authorized time of the RBAC Permission.
|
|
172
|
+
*/
|
|
173
|
+
authorizedAt?: pulumi.Input<string>;
|
|
174
|
+
/**
|
|
175
|
+
* The ID of the Authorizer.
|
|
176
|
+
*/
|
|
177
|
+
authorizerId?: pulumi.Input<number>;
|
|
178
|
+
/**
|
|
179
|
+
* The name of the Authorizer.
|
|
180
|
+
*/
|
|
181
|
+
authorizerName?: pulumi.Input<string>;
|
|
182
|
+
/**
|
|
183
|
+
* The type of the Authorizer.
|
|
184
|
+
*/
|
|
185
|
+
authorizerType?: pulumi.Input<string>;
|
|
186
|
+
/**
|
|
187
|
+
* The cluster ID that needs to be authorized to IAM users or roles.
|
|
188
|
+
*/
|
|
189
|
+
clusterId?: pulumi.Input<string>;
|
|
190
|
+
/**
|
|
191
|
+
* The granted time of the RBAC Permission.
|
|
192
|
+
*/
|
|
193
|
+
grantedAt?: pulumi.Input<string>;
|
|
194
|
+
/**
|
|
195
|
+
* The ID of the grantee.
|
|
196
|
+
*/
|
|
197
|
+
granteeId?: pulumi.Input<number>;
|
|
198
|
+
/**
|
|
199
|
+
* The type of the grantee. Valid values: `User`.
|
|
200
|
+
*/
|
|
201
|
+
granteeType?: pulumi.Input<string>;
|
|
202
|
+
/**
|
|
203
|
+
* Whether the RBAC role is a custom role. Default is false.
|
|
204
|
+
*/
|
|
205
|
+
isCustomRole?: pulumi.Input<boolean>;
|
|
206
|
+
/**
|
|
207
|
+
* The name of the Kube Role Binding.
|
|
208
|
+
*/
|
|
209
|
+
kubeRoleBindingName?: pulumi.Input<string>;
|
|
210
|
+
/**
|
|
211
|
+
* The message of the RBAC Permission.
|
|
212
|
+
*/
|
|
213
|
+
message?: pulumi.Input<string>;
|
|
214
|
+
/**
|
|
215
|
+
* The namespace that needs to be authorized to IAM users or roles.
|
|
216
|
+
*/
|
|
217
|
+
namespace?: pulumi.Input<string>;
|
|
218
|
+
/**
|
|
219
|
+
* The revoked time of the RBAC Permission.
|
|
220
|
+
*/
|
|
221
|
+
revokedAt?: pulumi.Input<string>;
|
|
222
|
+
/**
|
|
223
|
+
* The types of permissions granted to IAM users or roles. Valid values: `namespace`, `cluster`, `allClusters`.
|
|
224
|
+
* When importing resources, this attribute will not be imported. If this attribute is set, please use lifecycle and ignoreChanges ignore changes in fields.
|
|
225
|
+
*/
|
|
226
|
+
roleDomain?: pulumi.Input<string>;
|
|
227
|
+
/**
|
|
228
|
+
* The name of RBAC role. The following RBAC permissions can be granted: custom role name, system preset role names.
|
|
229
|
+
*/
|
|
230
|
+
roleName?: pulumi.Input<string>;
|
|
231
|
+
/**
|
|
232
|
+
* The status of the RBAC Permission.
|
|
233
|
+
*/
|
|
234
|
+
status?: pulumi.Input<string>;
|
|
235
|
+
}
|
|
236
|
+
/**
|
|
237
|
+
* The set of arguments for constructing a Permission resource.
|
|
238
|
+
*/
|
|
239
|
+
export interface PermissionArgs {
|
|
240
|
+
/**
|
|
241
|
+
* The cluster ID that needs to be authorized to IAM users or roles.
|
|
242
|
+
*/
|
|
243
|
+
clusterId?: pulumi.Input<string>;
|
|
244
|
+
/**
|
|
245
|
+
* The ID of the grantee.
|
|
246
|
+
*/
|
|
247
|
+
granteeId: pulumi.Input<number>;
|
|
248
|
+
/**
|
|
249
|
+
* The type of the grantee. Valid values: `User`.
|
|
250
|
+
*/
|
|
251
|
+
granteeType: pulumi.Input<string>;
|
|
252
|
+
/**
|
|
253
|
+
* Whether the RBAC role is a custom role. Default is false.
|
|
254
|
+
*/
|
|
255
|
+
isCustomRole?: pulumi.Input<boolean>;
|
|
256
|
+
/**
|
|
257
|
+
* The namespace that needs to be authorized to IAM users or roles.
|
|
258
|
+
*/
|
|
259
|
+
namespace?: pulumi.Input<string>;
|
|
260
|
+
/**
|
|
261
|
+
* The types of permissions granted to IAM users or roles. Valid values: `namespace`, `cluster`, `allClusters`.
|
|
262
|
+
* When importing resources, this attribute will not be imported. If this attribute is set, please use lifecycle and ignoreChanges ignore changes in fields.
|
|
263
|
+
*/
|
|
264
|
+
roleDomain: pulumi.Input<string>;
|
|
265
|
+
/**
|
|
266
|
+
* The name of RBAC role. The following RBAC permissions can be granted: custom role name, system preset role names.
|
|
267
|
+
*/
|
|
268
|
+
roleName: pulumi.Input<string>;
|
|
269
|
+
}
|
|
@@ -0,0 +1,165 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.Permission = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* Provides a resource to manage vke permission
|
|
10
|
+
* ## Example Usage
|
|
11
|
+
*
|
|
12
|
+
* ```typescript
|
|
13
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
14
|
+
* import * as volcengine from "@pulumi/volcengine";
|
|
15
|
+
* import * as volcengine from "@volcengine/pulumi";
|
|
16
|
+
*
|
|
17
|
+
* const fooZones = volcengine.ecs.getZones({});
|
|
18
|
+
* // create vpc
|
|
19
|
+
* const fooVpc = new volcengine.vpc.Vpc("fooVpc", {
|
|
20
|
+
* vpcName: "acc-test-vpc",
|
|
21
|
+
* cidrBlock: "172.16.0.0/16",
|
|
22
|
+
* });
|
|
23
|
+
* // create subnet
|
|
24
|
+
* const fooSubnet = new volcengine.vpc.Subnet("fooSubnet", {
|
|
25
|
+
* subnetName: "acc-test-subnet",
|
|
26
|
+
* cidrBlock: "172.16.0.0/24",
|
|
27
|
+
* zoneId: fooZones.then(fooZones => fooZones.zones?.[0]?.id),
|
|
28
|
+
* vpcId: fooVpc.id,
|
|
29
|
+
* });
|
|
30
|
+
* // create security group
|
|
31
|
+
* const fooSecurityGroup = new volcengine.vpc.SecurityGroup("fooSecurityGroup", {
|
|
32
|
+
* securityGroupName: "acc-test-security-group",
|
|
33
|
+
* vpcId: fooVpc.id,
|
|
34
|
+
* });
|
|
35
|
+
* // create vke cluster
|
|
36
|
+
* const fooCluster = new volcengine.vke.Cluster("fooCluster", {
|
|
37
|
+
* description: "created by terraform",
|
|
38
|
+
* projectName: "default",
|
|
39
|
+
* deleteProtectionEnabled: false,
|
|
40
|
+
* clusterConfig: {
|
|
41
|
+
* subnetIds: [fooSubnet.id],
|
|
42
|
+
* apiServerPublicAccessEnabled: true,
|
|
43
|
+
* apiServerPublicAccessConfig: {
|
|
44
|
+
* publicAccessNetworkConfig: {
|
|
45
|
+
* billingType: "PostPaidByBandwidth",
|
|
46
|
+
* bandwidth: 1,
|
|
47
|
+
* },
|
|
48
|
+
* },
|
|
49
|
+
* resourcePublicAccessDefaultEnabled: true,
|
|
50
|
+
* },
|
|
51
|
+
* podsConfig: {
|
|
52
|
+
* podNetworkMode: "VpcCniShared",
|
|
53
|
+
* vpcCniConfig: {
|
|
54
|
+
* subnetIds: [fooSubnet.id],
|
|
55
|
+
* },
|
|
56
|
+
* },
|
|
57
|
+
* servicesConfig: {
|
|
58
|
+
* serviceCidrsv4s: ["172.30.0.0/18"],
|
|
59
|
+
* },
|
|
60
|
+
* tags: [{
|
|
61
|
+
* key: "tf-k1",
|
|
62
|
+
* value: "tf-v1",
|
|
63
|
+
* }],
|
|
64
|
+
* });
|
|
65
|
+
* const fooPermission = new volcengine.vke.Permission("fooPermission", {
|
|
66
|
+
* roleName: "vke:visitor",
|
|
67
|
+
* granteeId: 385500000,
|
|
68
|
+
* granteeType: "User",
|
|
69
|
+
* roleDomain: "cluster",
|
|
70
|
+
* clusterId: fooCluster.id,
|
|
71
|
+
* });
|
|
72
|
+
* ```
|
|
73
|
+
*
|
|
74
|
+
* ## Import
|
|
75
|
+
*
|
|
76
|
+
* VkePermission can be imported using the id, e.g.
|
|
77
|
+
*
|
|
78
|
+
* ```sh
|
|
79
|
+
* $ pulumi import volcengine:vke/permission:Permission default resource_id
|
|
80
|
+
* ```
|
|
81
|
+
*/
|
|
82
|
+
class Permission extends pulumi.CustomResource {
|
|
83
|
+
/**
|
|
84
|
+
* Get an existing Permission resource's state with the given name, ID, and optional extra
|
|
85
|
+
* properties used to qualify the lookup.
|
|
86
|
+
*
|
|
87
|
+
* @param name The _unique_ name of the resulting resource.
|
|
88
|
+
* @param id The _unique_ provider ID of the resource to lookup.
|
|
89
|
+
* @param state Any extra arguments used during the lookup.
|
|
90
|
+
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
91
|
+
*/
|
|
92
|
+
static get(name, id, state, opts) {
|
|
93
|
+
return new Permission(name, state, Object.assign(Object.assign({}, opts), { id: id }));
|
|
94
|
+
}
|
|
95
|
+
/**
|
|
96
|
+
* Returns true if the given object is an instance of Permission. This is designed to work even
|
|
97
|
+
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
98
|
+
*/
|
|
99
|
+
static isInstance(obj) {
|
|
100
|
+
if (obj === undefined || obj === null) {
|
|
101
|
+
return false;
|
|
102
|
+
}
|
|
103
|
+
return obj['__pulumiType'] === Permission.__pulumiType;
|
|
104
|
+
}
|
|
105
|
+
constructor(name, argsOrState, opts) {
|
|
106
|
+
let resourceInputs = {};
|
|
107
|
+
opts = opts || {};
|
|
108
|
+
if (opts.id) {
|
|
109
|
+
const state = argsOrState;
|
|
110
|
+
resourceInputs["authorizedAt"] = state ? state.authorizedAt : undefined;
|
|
111
|
+
resourceInputs["authorizerId"] = state ? state.authorizerId : undefined;
|
|
112
|
+
resourceInputs["authorizerName"] = state ? state.authorizerName : undefined;
|
|
113
|
+
resourceInputs["authorizerType"] = state ? state.authorizerType : undefined;
|
|
114
|
+
resourceInputs["clusterId"] = state ? state.clusterId : undefined;
|
|
115
|
+
resourceInputs["grantedAt"] = state ? state.grantedAt : undefined;
|
|
116
|
+
resourceInputs["granteeId"] = state ? state.granteeId : undefined;
|
|
117
|
+
resourceInputs["granteeType"] = state ? state.granteeType : undefined;
|
|
118
|
+
resourceInputs["isCustomRole"] = state ? state.isCustomRole : undefined;
|
|
119
|
+
resourceInputs["kubeRoleBindingName"] = state ? state.kubeRoleBindingName : undefined;
|
|
120
|
+
resourceInputs["message"] = state ? state.message : undefined;
|
|
121
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
122
|
+
resourceInputs["revokedAt"] = state ? state.revokedAt : undefined;
|
|
123
|
+
resourceInputs["roleDomain"] = state ? state.roleDomain : undefined;
|
|
124
|
+
resourceInputs["roleName"] = state ? state.roleName : undefined;
|
|
125
|
+
resourceInputs["status"] = state ? state.status : undefined;
|
|
126
|
+
}
|
|
127
|
+
else {
|
|
128
|
+
const args = argsOrState;
|
|
129
|
+
if ((!args || args.granteeId === undefined) && !opts.urn) {
|
|
130
|
+
throw new Error("Missing required property 'granteeId'");
|
|
131
|
+
}
|
|
132
|
+
if ((!args || args.granteeType === undefined) && !opts.urn) {
|
|
133
|
+
throw new Error("Missing required property 'granteeType'");
|
|
134
|
+
}
|
|
135
|
+
if ((!args || args.roleDomain === undefined) && !opts.urn) {
|
|
136
|
+
throw new Error("Missing required property 'roleDomain'");
|
|
137
|
+
}
|
|
138
|
+
if ((!args || args.roleName === undefined) && !opts.urn) {
|
|
139
|
+
throw new Error("Missing required property 'roleName'");
|
|
140
|
+
}
|
|
141
|
+
resourceInputs["clusterId"] = args ? args.clusterId : undefined;
|
|
142
|
+
resourceInputs["granteeId"] = args ? args.granteeId : undefined;
|
|
143
|
+
resourceInputs["granteeType"] = args ? args.granteeType : undefined;
|
|
144
|
+
resourceInputs["isCustomRole"] = args ? args.isCustomRole : undefined;
|
|
145
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
146
|
+
resourceInputs["roleDomain"] = args ? args.roleDomain : undefined;
|
|
147
|
+
resourceInputs["roleName"] = args ? args.roleName : undefined;
|
|
148
|
+
resourceInputs["authorizedAt"] = undefined /*out*/;
|
|
149
|
+
resourceInputs["authorizerId"] = undefined /*out*/;
|
|
150
|
+
resourceInputs["authorizerName"] = undefined /*out*/;
|
|
151
|
+
resourceInputs["authorizerType"] = undefined /*out*/;
|
|
152
|
+
resourceInputs["grantedAt"] = undefined /*out*/;
|
|
153
|
+
resourceInputs["kubeRoleBindingName"] = undefined /*out*/;
|
|
154
|
+
resourceInputs["message"] = undefined /*out*/;
|
|
155
|
+
resourceInputs["revokedAt"] = undefined /*out*/;
|
|
156
|
+
resourceInputs["status"] = undefined /*out*/;
|
|
157
|
+
}
|
|
158
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
159
|
+
super(Permission.__pulumiType, name, resourceInputs, opts);
|
|
160
|
+
}
|
|
161
|
+
}
|
|
162
|
+
exports.Permission = Permission;
|
|
163
|
+
/** @internal */
|
|
164
|
+
Permission.__pulumiType = 'volcengine:vke/permission:Permission';
|
|
165
|
+
//# sourceMappingURL=permission.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"permission.js","sourceRoot":"","sources":["../../vke/permission.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAyEG;AACH,MAAa,UAAW,SAAQ,MAAM,CAAC,cAAc;IACjD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuB,EAAE,IAAmC;QACrH,OAAO,IAAI,UAAU,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACjE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,UAAU,CAAC,YAAY,CAAC;IAC3D,CAAC;IA4ED,YAAY,IAAY,EAAE,WAA8C,EAAE,IAAmC;QACzG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA0C,CAAC;YACzD,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAAyC,CAAC;YACvD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,UAAU,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvD,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACnD,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACnD,cAAc,CAAC,gBAAgB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACrD,cAAc,CAAC,gBAAgB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACrD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,cAAc,CAAC,qBAAqB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC1D,cAAc,CAAC,SAAS,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC9C,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAChD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,UAAU,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC/D,CAAC;;AA5JL,gCA6JC;AA/IG,gBAAgB;AACO,uBAAY,GAAG,sCAAsC,CAAC"}
|
|
@@ -0,0 +1,139 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
import * as outputs from "../types/output";
|
|
3
|
+
/**
|
|
4
|
+
* Use this data source to query detailed information of vke permissions
|
|
5
|
+
* ## Example Usage
|
|
6
|
+
*
|
|
7
|
+
* ```typescript
|
|
8
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
9
|
+
* import * as volcengine from "@pulumi/volcengine";
|
|
10
|
+
*
|
|
11
|
+
* const foo = volcengine.vke.getPermissions({
|
|
12
|
+
* granteeType: "User",
|
|
13
|
+
* ids: ["apd10o9jhqqno0ba25****"],
|
|
14
|
+
* });
|
|
15
|
+
* ```
|
|
16
|
+
*/
|
|
17
|
+
/** @deprecated volcengine.vke.Permissions has been deprecated in favor of volcengine.vke.getPermissions */
|
|
18
|
+
export declare function permissions(args?: PermissionsArgs, opts?: pulumi.InvokeOptions): Promise<PermissionsResult>;
|
|
19
|
+
/**
|
|
20
|
+
* A collection of arguments for invoking Permissions.
|
|
21
|
+
*/
|
|
22
|
+
export interface PermissionsArgs {
|
|
23
|
+
/**
|
|
24
|
+
* A list of Cluster IDs.
|
|
25
|
+
*/
|
|
26
|
+
clusterIds?: string[];
|
|
27
|
+
/**
|
|
28
|
+
* A list of Grantee IDs.
|
|
29
|
+
*/
|
|
30
|
+
granteeIds?: number[];
|
|
31
|
+
/**
|
|
32
|
+
* The type of Grantee. Valid values: `User`, `Role`.
|
|
33
|
+
*/
|
|
34
|
+
granteeType?: string;
|
|
35
|
+
/**
|
|
36
|
+
* A list of RBAC Permission IDs.
|
|
37
|
+
*/
|
|
38
|
+
ids?: string[];
|
|
39
|
+
/**
|
|
40
|
+
* A list of Namespaces.
|
|
41
|
+
*/
|
|
42
|
+
namespaces?: string[];
|
|
43
|
+
/**
|
|
44
|
+
* File name where to save data source results.
|
|
45
|
+
*/
|
|
46
|
+
outputFile?: string;
|
|
47
|
+
/**
|
|
48
|
+
* A list of RBAC Role Names.
|
|
49
|
+
*/
|
|
50
|
+
roleNames?: string[];
|
|
51
|
+
/**
|
|
52
|
+
* The status of RBAC Permission.
|
|
53
|
+
*/
|
|
54
|
+
status?: string;
|
|
55
|
+
}
|
|
56
|
+
/**
|
|
57
|
+
* A collection of values returned by Permissions.
|
|
58
|
+
*/
|
|
59
|
+
export interface PermissionsResult {
|
|
60
|
+
/**
|
|
61
|
+
* The collection of query.
|
|
62
|
+
*/
|
|
63
|
+
readonly accessPolicies: outputs.vke.PermissionsAccessPolicy[];
|
|
64
|
+
readonly clusterIds?: string[];
|
|
65
|
+
readonly granteeIds?: number[];
|
|
66
|
+
/**
|
|
67
|
+
* The type of the Grantee.
|
|
68
|
+
*/
|
|
69
|
+
readonly granteeType?: string;
|
|
70
|
+
/**
|
|
71
|
+
* The provider-assigned unique ID for this managed resource.
|
|
72
|
+
*/
|
|
73
|
+
readonly id: string;
|
|
74
|
+
readonly ids?: string[];
|
|
75
|
+
readonly namespaces?: string[];
|
|
76
|
+
readonly outputFile?: string;
|
|
77
|
+
readonly roleNames?: string[];
|
|
78
|
+
/**
|
|
79
|
+
* The status of the RBAC Permission.
|
|
80
|
+
*/
|
|
81
|
+
readonly status?: string;
|
|
82
|
+
/**
|
|
83
|
+
* The total count of query.
|
|
84
|
+
*/
|
|
85
|
+
readonly totalCount: number;
|
|
86
|
+
}
|
|
87
|
+
/**
|
|
88
|
+
* Use this data source to query detailed information of vke permissions
|
|
89
|
+
* ## Example Usage
|
|
90
|
+
*
|
|
91
|
+
* ```typescript
|
|
92
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
93
|
+
* import * as volcengine from "@pulumi/volcengine";
|
|
94
|
+
*
|
|
95
|
+
* const foo = volcengine.vke.getPermissions({
|
|
96
|
+
* granteeType: "User",
|
|
97
|
+
* ids: ["apd10o9jhqqno0ba25****"],
|
|
98
|
+
* });
|
|
99
|
+
* ```
|
|
100
|
+
*/
|
|
101
|
+
/** @deprecated volcengine.vke.Permissions has been deprecated in favor of volcengine.vke.getPermissions */
|
|
102
|
+
export declare function permissionsOutput(args?: PermissionsOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<PermissionsResult>;
|
|
103
|
+
/**
|
|
104
|
+
* A collection of arguments for invoking Permissions.
|
|
105
|
+
*/
|
|
106
|
+
export interface PermissionsOutputArgs {
|
|
107
|
+
/**
|
|
108
|
+
* A list of Cluster IDs.
|
|
109
|
+
*/
|
|
110
|
+
clusterIds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
111
|
+
/**
|
|
112
|
+
* A list of Grantee IDs.
|
|
113
|
+
*/
|
|
114
|
+
granteeIds?: pulumi.Input<pulumi.Input<number>[]>;
|
|
115
|
+
/**
|
|
116
|
+
* The type of Grantee. Valid values: `User`, `Role`.
|
|
117
|
+
*/
|
|
118
|
+
granteeType?: pulumi.Input<string>;
|
|
119
|
+
/**
|
|
120
|
+
* A list of RBAC Permission IDs.
|
|
121
|
+
*/
|
|
122
|
+
ids?: pulumi.Input<pulumi.Input<string>[]>;
|
|
123
|
+
/**
|
|
124
|
+
* A list of Namespaces.
|
|
125
|
+
*/
|
|
126
|
+
namespaces?: pulumi.Input<pulumi.Input<string>[]>;
|
|
127
|
+
/**
|
|
128
|
+
* File name where to save data source results.
|
|
129
|
+
*/
|
|
130
|
+
outputFile?: pulumi.Input<string>;
|
|
131
|
+
/**
|
|
132
|
+
* A list of RBAC Role Names.
|
|
133
|
+
*/
|
|
134
|
+
roleNames?: pulumi.Input<pulumi.Input<string>[]>;
|
|
135
|
+
/**
|
|
136
|
+
* The status of RBAC Permission.
|
|
137
|
+
*/
|
|
138
|
+
status?: pulumi.Input<string>;
|
|
139
|
+
}
|
|
@@ -0,0 +1,58 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.permissionsOutput = exports.permissions = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* Use this data source to query detailed information of vke permissions
|
|
10
|
+
* ## Example Usage
|
|
11
|
+
*
|
|
12
|
+
* ```typescript
|
|
13
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
14
|
+
* import * as volcengine from "@pulumi/volcengine";
|
|
15
|
+
*
|
|
16
|
+
* const foo = volcengine.vke.getPermissions({
|
|
17
|
+
* granteeType: "User",
|
|
18
|
+
* ids: ["apd10o9jhqqno0ba25****"],
|
|
19
|
+
* });
|
|
20
|
+
* ```
|
|
21
|
+
*/
|
|
22
|
+
/** @deprecated volcengine.vke.Permissions has been deprecated in favor of volcengine.vke.getPermissions */
|
|
23
|
+
function permissions(args, opts) {
|
|
24
|
+
pulumi.log.warn("permissions is deprecated: volcengine.vke.Permissions has been deprecated in favor of volcengine.vke.getPermissions");
|
|
25
|
+
args = args || {};
|
|
26
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
|
|
27
|
+
return pulumi.runtime.invoke("volcengine:vke/permissions:Permissions", {
|
|
28
|
+
"clusterIds": args.clusterIds,
|
|
29
|
+
"granteeIds": args.granteeIds,
|
|
30
|
+
"granteeType": args.granteeType,
|
|
31
|
+
"ids": args.ids,
|
|
32
|
+
"namespaces": args.namespaces,
|
|
33
|
+
"outputFile": args.outputFile,
|
|
34
|
+
"roleNames": args.roleNames,
|
|
35
|
+
"status": args.status,
|
|
36
|
+
}, opts);
|
|
37
|
+
}
|
|
38
|
+
exports.permissions = permissions;
|
|
39
|
+
/**
|
|
40
|
+
* Use this data source to query detailed information of vke permissions
|
|
41
|
+
* ## Example Usage
|
|
42
|
+
*
|
|
43
|
+
* ```typescript
|
|
44
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
45
|
+
* import * as volcengine from "@pulumi/volcengine";
|
|
46
|
+
*
|
|
47
|
+
* const foo = volcengine.vke.getPermissions({
|
|
48
|
+
* granteeType: "User",
|
|
49
|
+
* ids: ["apd10o9jhqqno0ba25****"],
|
|
50
|
+
* });
|
|
51
|
+
* ```
|
|
52
|
+
*/
|
|
53
|
+
/** @deprecated volcengine.vke.Permissions has been deprecated in favor of volcengine.vke.getPermissions */
|
|
54
|
+
function permissionsOutput(args, opts) {
|
|
55
|
+
return pulumi.output(args).apply((a) => permissions(a, opts));
|
|
56
|
+
}
|
|
57
|
+
exports.permissionsOutput = permissionsOutput;
|
|
58
|
+
//# sourceMappingURL=permissions.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"permissions.js","sourceRoot":"","sources":["../../vke/permissions.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;GAaG;AACH,2GAA2G;AAC3G,SAAgB,WAAW,CAAC,IAAsB,EAAE,IAA2B;IAC3E,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,qHAAqH,CAAC,CAAA;IACtI,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAElB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,wCAAwC,EAAE;QACnE,YAAY,EAAE,IAAI,CAAC,UAAU;QAC7B,YAAY,EAAE,IAAI,CAAC,UAAU;QAC7B,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,KAAK,EAAE,IAAI,CAAC,GAAG;QACf,YAAY,EAAE,IAAI,CAAC,UAAU;QAC7B,YAAY,EAAE,IAAI,CAAC,UAAU;QAC7B,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,QAAQ,EAAE,IAAI,CAAC,MAAM;KACxB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAfD,kCAeC;AAuED;;;;;;;;;;;;;GAaG;AACH,2GAA2G;AAC3G,SAAgB,iBAAiB,CAAC,IAA4B,EAAE,IAA2B;IACvF,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,WAAW,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACtE,CAAC;AAFD,8CAEC"}
|
package/vpc/routeEntry.d.ts
CHANGED
|
@@ -5,15 +5,36 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
5
5
|
*
|
|
6
6
|
* ```typescript
|
|
7
7
|
* import * as pulumi from "@pulumi/pulumi";
|
|
8
|
+
* import * as volcengine from "@pulumi/volcengine";
|
|
8
9
|
* import * as volcengine from "@volcengine/pulumi";
|
|
9
10
|
*
|
|
10
|
-
* const
|
|
11
|
-
*
|
|
12
|
-
*
|
|
13
|
-
*
|
|
11
|
+
* const fooZones = volcengine.ecs.getZones({});
|
|
12
|
+
* const fooVpc = new volcengine.vpc.Vpc("fooVpc", {
|
|
13
|
+
* vpcName: "acc-test-vpc-rn",
|
|
14
|
+
* cidrBlock: "172.16.0.0/16",
|
|
15
|
+
* });
|
|
16
|
+
* const fooSubnet = new volcengine.vpc.Subnet("fooSubnet", {
|
|
17
|
+
* subnetName: "acc-test-subnet-rn",
|
|
18
|
+
* cidrBlock: "172.16.0.0/24",
|
|
19
|
+
* zoneId: fooZones.then(fooZones => fooZones.zones?.[0]?.id),
|
|
20
|
+
* vpcId: fooVpc.id,
|
|
21
|
+
* });
|
|
22
|
+
* const fooGateway = new volcengine.nat.Gateway("fooGateway", {
|
|
23
|
+
* vpcId: fooVpc.id,
|
|
24
|
+
* subnetId: fooSubnet.id,
|
|
25
|
+
* spec: "Small",
|
|
26
|
+
* natGatewayName: "acc-test-nat-rn",
|
|
27
|
+
* });
|
|
28
|
+
* const fooRouteTable = new volcengine.vpc.RouteTable("fooRouteTable", {
|
|
29
|
+
* vpcId: fooVpc.id,
|
|
30
|
+
* routeTableName: "acc-test-route-table",
|
|
31
|
+
* });
|
|
32
|
+
* const fooRouteEntry = new volcengine.vpc.RouteEntry("fooRouteEntry", {
|
|
33
|
+
* routeTableId: fooRouteTable.id,
|
|
34
|
+
* destinationCidrBlock: "172.16.1.0/24",
|
|
14
35
|
* nextHopType: "NatGW",
|
|
15
|
-
*
|
|
16
|
-
*
|
|
36
|
+
* nextHopId: fooGateway.id,
|
|
37
|
+
* routeEntryName: "acc-test-route-entry",
|
|
17
38
|
* });
|
|
18
39
|
* ```
|
|
19
40
|
*
|