UNPKG

@pulumi/consul

Version:

A Pulumi package for creating and managing consul resources.

136 lines 5.36 kB
"use strict"; // *** WARNING: this file was generated by pulumi-language-nodejs. *** // *** Do not edit by hand unless you're certain you know what you are doing! *** Object.defineProperty(exports, "__esModule", { value: true }); exports.AclTokenPolicyAttachment = void 0; const pulumi = require("@pulumi/pulumi"); const utilities = require("./utilities"); /** * The `consul.AclTokenPolicyAttachment` resource links a Consul Token and an ACL * policy. The link is implemented through an update to the Consul ACL token. * * > **NOTE:** This resource is only useful to attach policies to an ACL token * that has been created outside the current Terraform configuration, like the * anonymous or the master token. If the token you need to attach a policy to has * been created in the current Terraform configuration and will only be used in it, * you should use the `policies` attribute of [`consul.AclToken`](https://www.terraform.io/docs/providers/consul/r/acl_token.html). * * ## Example Usage * * ### Attach a policy to the anonymous token * * ```typescript * import * as pulumi from "@pulumi/pulumi"; * import * as consul from "@pulumi/consul"; * * const agent = new consul.AclPolicy("agent", { * name: "agent", * rules: `node_prefix \\"\\" { * policy = \\"read\\" * } * `, * }); * const attachment = new consul.AclTokenPolicyAttachment("attachment", { * tokenId: "00000000-0000-0000-0000-000000000002", * policy: agent.name, * }); * ``` * * ### Attach a policy to a token created in another Terraform configuration * * ### In `first_configuration/main.tf` * * ```typescript * import * as pulumi from "@pulumi/pulumi"; * import * as consul from "@pulumi/consul"; * * const test = new consul.AclToken("test", { * accessorId: "9b20de68-3ea2-4b70-b4f1-506afad062a4", * description: "my test token", * local: true, * }); * ``` * * ### In `second_configuration/main.tf` * * ```typescript * import * as pulumi from "@pulumi/pulumi"; * import * as consul from "@pulumi/consul"; * * const agent = new consul.AclPolicy("agent", { * name: "agent", * rules: `node_prefix \\"\\" { * policy = \\"read\\" * } * `, * }); * const attachment = new consul.AclTokenPolicyAttachment("attachment", { * tokenId: "9b20de68-3ea2-4b70-b4f1-506afad062a4", * policy: agent.name, * }); * ``` * **NOTE**: consul.AclToken would attempt to enforce an empty set of policies, * because its policies attribute is empty. For this reason it is necessary to add * the lifecycle clause to prevent Terraform from attempting to empty the set of * policies associated to the token. * * ## Import * * `consul.AclTokenPolicyAttachment` can be imported. This is especially useful to manage the * policies attached to the anonymous and the master tokens with Terraform: * * ```sh * $ pulumi import consul:index/aclTokenPolicyAttachment:AclTokenPolicyAttachment anonymous 00000000-0000-0000-0000-000000000002:policy_name * $ pulumi import consul:index/aclTokenPolicyAttachment:AclTokenPolicyAttachment master-token 624d94ca-bc5c-f960-4e83-0a609cf588be:policy_name * ``` */ class AclTokenPolicyAttachment extends pulumi.CustomResource { /** * Get an existing AclTokenPolicyAttachment resource's state with the given name, ID, and optional extra * properties used to qualify the lookup. * * @param name The _unique_ name of the resulting resource. * @param id The _unique_ provider ID of the resource to lookup. * @param state Any extra arguments used during the lookup. * @param opts Optional settings to control the behavior of the CustomResource. */ static get(name, id, state, opts) { return new AclTokenPolicyAttachment(name, state, { ...opts, id: id }); } /** * Returns true if the given object is an instance of AclTokenPolicyAttachment. This is designed to work even * when multiple copies of the Pulumi SDK have been loaded into the same process. */ static isInstance(obj) { if (obj === undefined || obj === null) { return false; } return obj['__pulumiType'] === AclTokenPolicyAttachment.__pulumiType; } constructor(name, argsOrState, opts) { let resourceInputs = {}; opts = opts || {}; if (opts.id) { const state = argsOrState; resourceInputs["policy"] = state?.policy; resourceInputs["tokenId"] = state?.tokenId; } else { const args = argsOrState; if (args?.policy === undefined && !opts.urn) { throw new Error("Missing required property 'policy'"); } if (args?.tokenId === undefined && !opts.urn) { throw new Error("Missing required property 'tokenId'"); } resourceInputs["policy"] = args?.policy; resourceInputs["tokenId"] = args?.tokenId; } opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts); super(AclTokenPolicyAttachment.__pulumiType, name, resourceInputs, opts); } } exports.AclTokenPolicyAttachment = AclTokenPolicyAttachment; /** @internal */ AclTokenPolicyAttachment.__pulumiType = 'consul:index/aclTokenPolicyAttachment:AclTokenPolicyAttachment'; //# sourceMappingURL=aclTokenPolicyAttachment.js.map