@pulumi/vault
Version:
A Pulumi package for creating and managing HashiCorp Vault cloud resources.
132 lines • 6.63 kB
JavaScript
;
// *** WARNING: this file was generated by pulumi-language-nodejs. ***
// *** Do not edit by hand unless you're certain you know what you are doing! ***
Object.defineProperty(exports, "__esModule", { value: true });
exports.SecretBackend = void 0;
const pulumi = require("@pulumi/pulumi");
const utilities = require("../utilities");
/**
* ## Example Usage
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as std from "@pulumi/std";
* import * as vault from "@pulumi/vault";
*
* const config = new vault.kubernetes.SecretBackend("config", {
* path: "kubernetes",
* description: "kubernetes secrets engine description",
* defaultLeaseTtlSeconds: 43200,
* maxLeaseTtlSeconds: 86400,
* kubernetesHost: "https://127.0.0.1:61233",
* kubernetesCaCert: std.file({
* input: "/path/to/cert",
* }).then(invoke => invoke.result),
* serviceAccountJwt: std.file({
* input: "/path/to/token",
* }).then(invoke => invoke.result),
* disableLocalCaJwt: false,
* });
* ```
*
* ## Import
*
* The Kubernetes secret backend can be imported using its `path` e.g.
*
* ```sh
* $ pulumi import vault:kubernetes/secretBackend:SecretBackend config kubernetes
* ```
*/
class SecretBackend extends pulumi.CustomResource {
/**
* Get an existing SecretBackend resource's state with the given name, ID, and optional extra
* properties used to qualify the lookup.
*
* @param name The _unique_ name of the resulting resource.
* @param id The _unique_ provider ID of the resource to lookup.
* @param state Any extra arguments used during the lookup.
* @param opts Optional settings to control the behavior of the CustomResource.
*/
static get(name, id, state, opts) {
return new SecretBackend(name, state, { ...opts, id: id });
}
/**
* Returns true if the given object is an instance of SecretBackend. This is designed to work even
* when multiple copies of the Pulumi SDK have been loaded into the same process.
*/
static isInstance(obj) {
if (obj === undefined || obj === null) {
return false;
}
return obj['__pulumiType'] === SecretBackend.__pulumiType;
}
constructor(name, argsOrState, opts) {
let resourceInputs = {};
opts = opts || {};
if (opts.id) {
const state = argsOrState;
resourceInputs["accessor"] = state?.accessor;
resourceInputs["allowedManagedKeys"] = state?.allowedManagedKeys;
resourceInputs["allowedResponseHeaders"] = state?.allowedResponseHeaders;
resourceInputs["auditNonHmacRequestKeys"] = state?.auditNonHmacRequestKeys;
resourceInputs["auditNonHmacResponseKeys"] = state?.auditNonHmacResponseKeys;
resourceInputs["defaultLeaseTtlSeconds"] = state?.defaultLeaseTtlSeconds;
resourceInputs["delegatedAuthAccessors"] = state?.delegatedAuthAccessors;
resourceInputs["description"] = state?.description;
resourceInputs["disableLocalCaJwt"] = state?.disableLocalCaJwt;
resourceInputs["externalEntropyAccess"] = state?.externalEntropyAccess;
resourceInputs["forceNoCache"] = state?.forceNoCache;
resourceInputs["identityTokenKey"] = state?.identityTokenKey;
resourceInputs["kubernetesCaCert"] = state?.kubernetesCaCert;
resourceInputs["kubernetesHost"] = state?.kubernetesHost;
resourceInputs["listingVisibility"] = state?.listingVisibility;
resourceInputs["local"] = state?.local;
resourceInputs["maxLeaseTtlSeconds"] = state?.maxLeaseTtlSeconds;
resourceInputs["namespace"] = state?.namespace;
resourceInputs["options"] = state?.options;
resourceInputs["passthroughRequestHeaders"] = state?.passthroughRequestHeaders;
resourceInputs["path"] = state?.path;
resourceInputs["pluginVersion"] = state?.pluginVersion;
resourceInputs["sealWrap"] = state?.sealWrap;
resourceInputs["serviceAccountJwt"] = state?.serviceAccountJwt;
}
else {
const args = argsOrState;
if (args?.path === undefined && !opts.urn) {
throw new Error("Missing required property 'path'");
}
resourceInputs["allowedManagedKeys"] = args?.allowedManagedKeys;
resourceInputs["allowedResponseHeaders"] = args?.allowedResponseHeaders;
resourceInputs["auditNonHmacRequestKeys"] = args?.auditNonHmacRequestKeys;
resourceInputs["auditNonHmacResponseKeys"] = args?.auditNonHmacResponseKeys;
resourceInputs["defaultLeaseTtlSeconds"] = args?.defaultLeaseTtlSeconds;
resourceInputs["delegatedAuthAccessors"] = args?.delegatedAuthAccessors;
resourceInputs["description"] = args?.description;
resourceInputs["disableLocalCaJwt"] = args?.disableLocalCaJwt;
resourceInputs["externalEntropyAccess"] = args?.externalEntropyAccess;
resourceInputs["forceNoCache"] = args?.forceNoCache;
resourceInputs["identityTokenKey"] = args?.identityTokenKey;
resourceInputs["kubernetesCaCert"] = args?.kubernetesCaCert;
resourceInputs["kubernetesHost"] = args?.kubernetesHost;
resourceInputs["listingVisibility"] = args?.listingVisibility;
resourceInputs["local"] = args?.local;
resourceInputs["maxLeaseTtlSeconds"] = args?.maxLeaseTtlSeconds;
resourceInputs["namespace"] = args?.namespace;
resourceInputs["options"] = args?.options;
resourceInputs["passthroughRequestHeaders"] = args?.passthroughRequestHeaders;
resourceInputs["path"] = args?.path;
resourceInputs["pluginVersion"] = args?.pluginVersion;
resourceInputs["sealWrap"] = args?.sealWrap;
resourceInputs["serviceAccountJwt"] = args?.serviceAccountJwt ? pulumi.secret(args.serviceAccountJwt) : undefined;
resourceInputs["accessor"] = undefined /*out*/;
}
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
const secretOpts = { additionalSecretOutputs: ["serviceAccountJwt"] };
opts = pulumi.mergeOptions(opts, secretOpts);
super(SecretBackend.__pulumiType, name, resourceInputs, opts);
}
}
exports.SecretBackend = SecretBackend;
/** @internal */
SecretBackend.__pulumiType = 'vault:kubernetes/secretBackend:SecretBackend';
//# sourceMappingURL=secretBackend.js.map