UNPKG

@pulumi/vault

Version:

A Pulumi package for creating and managing HashiCorp Vault cloud resources.

132 lines 6.63 kB
"use strict"; // *** WARNING: this file was generated by pulumi-language-nodejs. *** // *** Do not edit by hand unless you're certain you know what you are doing! *** Object.defineProperty(exports, "__esModule", { value: true }); exports.SecretBackend = void 0; const pulumi = require("@pulumi/pulumi"); const utilities = require("../utilities"); /** * ## Example Usage * * ```typescript * import * as pulumi from "@pulumi/pulumi"; * import * as std from "@pulumi/std"; * import * as vault from "@pulumi/vault"; * * const config = new vault.kubernetes.SecretBackend("config", { * path: "kubernetes", * description: "kubernetes secrets engine description", * defaultLeaseTtlSeconds: 43200, * maxLeaseTtlSeconds: 86400, * kubernetesHost: "https://127.0.0.1:61233", * kubernetesCaCert: std.file({ * input: "/path/to/cert", * }).then(invoke => invoke.result), * serviceAccountJwt: std.file({ * input: "/path/to/token", * }).then(invoke => invoke.result), * disableLocalCaJwt: false, * }); * ``` * * ## Import * * The Kubernetes secret backend can be imported using its `path` e.g. * * ```sh * $ pulumi import vault:kubernetes/secretBackend:SecretBackend config kubernetes * ``` */ class SecretBackend extends pulumi.CustomResource { /** * Get an existing SecretBackend resource's state with the given name, ID, and optional extra * properties used to qualify the lookup. * * @param name The _unique_ name of the resulting resource. * @param id The _unique_ provider ID of the resource to lookup. * @param state Any extra arguments used during the lookup. * @param opts Optional settings to control the behavior of the CustomResource. */ static get(name, id, state, opts) { return new SecretBackend(name, state, { ...opts, id: id }); } /** * Returns true if the given object is an instance of SecretBackend. This is designed to work even * when multiple copies of the Pulumi SDK have been loaded into the same process. */ static isInstance(obj) { if (obj === undefined || obj === null) { return false; } return obj['__pulumiType'] === SecretBackend.__pulumiType; } constructor(name, argsOrState, opts) { let resourceInputs = {}; opts = opts || {}; if (opts.id) { const state = argsOrState; resourceInputs["accessor"] = state?.accessor; resourceInputs["allowedManagedKeys"] = state?.allowedManagedKeys; resourceInputs["allowedResponseHeaders"] = state?.allowedResponseHeaders; resourceInputs["auditNonHmacRequestKeys"] = state?.auditNonHmacRequestKeys; resourceInputs["auditNonHmacResponseKeys"] = state?.auditNonHmacResponseKeys; resourceInputs["defaultLeaseTtlSeconds"] = state?.defaultLeaseTtlSeconds; resourceInputs["delegatedAuthAccessors"] = state?.delegatedAuthAccessors; resourceInputs["description"] = state?.description; resourceInputs["disableLocalCaJwt"] = state?.disableLocalCaJwt; resourceInputs["externalEntropyAccess"] = state?.externalEntropyAccess; resourceInputs["forceNoCache"] = state?.forceNoCache; resourceInputs["identityTokenKey"] = state?.identityTokenKey; resourceInputs["kubernetesCaCert"] = state?.kubernetesCaCert; resourceInputs["kubernetesHost"] = state?.kubernetesHost; resourceInputs["listingVisibility"] = state?.listingVisibility; resourceInputs["local"] = state?.local; resourceInputs["maxLeaseTtlSeconds"] = state?.maxLeaseTtlSeconds; resourceInputs["namespace"] = state?.namespace; resourceInputs["options"] = state?.options; resourceInputs["passthroughRequestHeaders"] = state?.passthroughRequestHeaders; resourceInputs["path"] = state?.path; resourceInputs["pluginVersion"] = state?.pluginVersion; resourceInputs["sealWrap"] = state?.sealWrap; resourceInputs["serviceAccountJwt"] = state?.serviceAccountJwt; } else { const args = argsOrState; if (args?.path === undefined && !opts.urn) { throw new Error("Missing required property 'path'"); } resourceInputs["allowedManagedKeys"] = args?.allowedManagedKeys; resourceInputs["allowedResponseHeaders"] = args?.allowedResponseHeaders; resourceInputs["auditNonHmacRequestKeys"] = args?.auditNonHmacRequestKeys; resourceInputs["auditNonHmacResponseKeys"] = args?.auditNonHmacResponseKeys; resourceInputs["defaultLeaseTtlSeconds"] = args?.defaultLeaseTtlSeconds; resourceInputs["delegatedAuthAccessors"] = args?.delegatedAuthAccessors; resourceInputs["description"] = args?.description; resourceInputs["disableLocalCaJwt"] = args?.disableLocalCaJwt; resourceInputs["externalEntropyAccess"] = args?.externalEntropyAccess; resourceInputs["forceNoCache"] = args?.forceNoCache; resourceInputs["identityTokenKey"] = args?.identityTokenKey; resourceInputs["kubernetesCaCert"] = args?.kubernetesCaCert; resourceInputs["kubernetesHost"] = args?.kubernetesHost; resourceInputs["listingVisibility"] = args?.listingVisibility; resourceInputs["local"] = args?.local; resourceInputs["maxLeaseTtlSeconds"] = args?.maxLeaseTtlSeconds; resourceInputs["namespace"] = args?.namespace; resourceInputs["options"] = args?.options; resourceInputs["passthroughRequestHeaders"] = args?.passthroughRequestHeaders; resourceInputs["path"] = args?.path; resourceInputs["pluginVersion"] = args?.pluginVersion; resourceInputs["sealWrap"] = args?.sealWrap; resourceInputs["serviceAccountJwt"] = args?.serviceAccountJwt ? pulumi.secret(args.serviceAccountJwt) : undefined; resourceInputs["accessor"] = undefined /*out*/; } opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts); const secretOpts = { additionalSecretOutputs: ["serviceAccountJwt"] }; opts = pulumi.mergeOptions(opts, secretOpts); super(SecretBackend.__pulumiType, name, resourceInputs, opts); } } exports.SecretBackend = SecretBackend; /** @internal */ SecretBackend.__pulumiType = 'vault:kubernetes/secretBackend:SecretBackend'; //# sourceMappingURL=secretBackend.js.map