Skip to content

Commit

Permalink
make build_sdks
Browse files Browse the repository at this point in the history
  • Loading branch information
iwahbe committed Oct 12, 2023
1 parent 24d05b8 commit 01873e8
Show file tree
Hide file tree
Showing 72 changed files with 2,258 additions and 207 deletions.
47 changes: 41 additions & 6 deletions sdk/dotnet/AppRole/AuthBackendLogin.cs
Original file line number Diff line number Diff line change
Expand Up @@ -152,6 +152,11 @@ private static CustomResourceOptions MakeResourceOptions(CustomResourceOptions?
var defaultOptions = new CustomResourceOptions
{
Version = Utilities.Version,
AdditionalSecretOutputs =
{
"clientToken",
"secretId",
},
};
var merged = CustomResourceOptions.Merge(defaultOptions, options);
// Override the ID if one was specified for consistency with other language SDKs.
Expand Down Expand Up @@ -196,12 +201,22 @@ public sealed class AuthBackendLoginArgs : global::Pulumi.ResourceArgs
[Input("roleId", required: true)]
public Input<string> RoleId { get; set; } = null!;

[Input("secretId")]
private Input<string>? _secretId;

/// <summary>
/// The secret ID of the role to log in with. Required
/// unless `bind_secret_id` is set to false on the role.
/// </summary>
[Input("secretId")]
public Input<string>? SecretId { get; set; }
public Input<string>? SecretId
{
get => _secretId;
set
{
var emptySecret = Output.CreateSecret(0);
_secretId = Output.Tuple<Input<string>?, int>(value, emptySecret).Apply(t => t.Item1);
}
}

public AuthBackendLoginArgs()
{
Expand All @@ -223,11 +238,21 @@ public sealed class AuthBackendLoginState : global::Pulumi.ResourceArgs
[Input("backend")]
public Input<string>? Backend { get; set; }

[Input("clientToken")]
private Input<string>? _clientToken;

/// <summary>
/// The Vault token created.
/// </summary>
[Input("clientToken")]
public Input<string>? ClientToken { get; set; }
public Input<string>? ClientToken
{
get => _clientToken;
set
{
var emptySecret = Output.CreateSecret(0);
_clientToken = Output.Tuple<Input<string>?, int>(value, emptySecret).Apply(t => t.Item1);
}
}

/// <summary>
/// How long the token is valid for, in seconds.
Expand Down Expand Up @@ -286,12 +311,22 @@ public InputList<string> Policies
[Input("roleId")]
public Input<string>? RoleId { get; set; }

[Input("secretId")]
private Input<string>? _secretId;

/// <summary>
/// The secret ID of the role to log in with. Required
/// unless `bind_secret_id` is set to false on the role.
/// </summary>
[Input("secretId")]
public Input<string>? SecretId { get; set; }
public Input<string>? SecretId
{
get => _secretId;
set
{
var emptySecret = Output.CreateSecret(0);
_secretId = Output.Tuple<Input<string>?, int>(value, emptySecret).Apply(t => t.Item1);
}
}

public AuthBackendLoginState()
{
Expand Down
18 changes: 18 additions & 0 deletions sdk/dotnet/Aws/SecretBackend.cs
Original file line number Diff line number Diff line change
Expand Up @@ -54,6 +54,12 @@ public partial class SecretBackend : global::Pulumi.CustomResource
[Output("iamEndpoint")]
public Output<string?> IamEndpoint { get; private set; } = null!;

/// <summary>
/// Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
/// </summary>
[Output("local")]
public Output<bool?> Local { get; private set; } = null!;

/// <summary>
/// The maximum TTL that can be requested
/// for credentials issued by this backend.
Expand Down Expand Up @@ -196,6 +202,12 @@ public Input<string>? AccessKey
[Input("iamEndpoint")]
public Input<string>? IamEndpoint { get; set; }

/// <summary>
/// Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
/// </summary>
[Input("local")]
public Input<bool>? Local { get; set; }

/// <summary>
/// The maximum TTL that can be requested
/// for credentials issued by this backend.
Expand Down Expand Up @@ -305,6 +317,12 @@ public Input<string>? AccessKey
[Input("iamEndpoint")]
public Input<string>? IamEndpoint { get; set; }

/// <summary>
/// Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
/// </summary>
[Input("local")]
public Input<bool>? Local { get; set; }

/// <summary>
/// The maximum TTL that can be requested
/// for credentials issued by this backend.
Expand Down
22 changes: 22 additions & 0 deletions sdk/dotnet/Database/Inputs/SecretBackendConnectionMysqlArgs.cs
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,12 @@ namespace Pulumi.Vault.Database.Inputs

public sealed class SecretBackendConnectionMysqlArgs : global::Pulumi.ResourceArgs
{
/// <summary>
/// Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
/// </summary>
[Input("authType")]
public Input<string>? AuthType { get; set; }

/// <summary>
/// Specifies the Redshift DSN. See
/// the [Vault
Expand Down Expand Up @@ -57,6 +63,22 @@ public Input<string>? Password
}
}

[Input("serviceAccountJson")]
private Input<string>? _serviceAccountJson;

/// <summary>
/// JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
/// </summary>
public Input<string>? ServiceAccountJson
{
get => _serviceAccountJson;
set
{
var emptySecret = Output.CreateSecret(0);
_serviceAccountJson = Output.Tuple<Input<string>?, int>(value, emptySecret).Apply(t => t.Item1);
}
}

/// <summary>
/// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
/// </summary>
Expand Down
22 changes: 22 additions & 0 deletions sdk/dotnet/Database/Inputs/SecretBackendConnectionMysqlGetArgs.cs
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,12 @@ namespace Pulumi.Vault.Database.Inputs

public sealed class SecretBackendConnectionMysqlGetArgs : global::Pulumi.ResourceArgs
{
/// <summary>
/// Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
/// </summary>
[Input("authType")]
public Input<string>? AuthType { get; set; }

/// <summary>
/// Specifies the Redshift DSN. See
/// the [Vault
Expand Down Expand Up @@ -57,6 +63,22 @@ public Input<string>? Password
}
}

[Input("serviceAccountJson")]
private Input<string>? _serviceAccountJson;

/// <summary>
/// JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
/// </summary>
public Input<string>? ServiceAccountJson
{
get => _serviceAccountJson;
set
{
var emptySecret = Output.CreateSecret(0);
_serviceAccountJson = Output.Tuple<Input<string>?, int>(value, emptySecret).Apply(t => t.Item1);
}
}

/// <summary>
/// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
/// </summary>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,12 @@ namespace Pulumi.Vault.Database.Inputs

public sealed class SecretBackendConnectionPostgresqlArgs : global::Pulumi.ResourceArgs
{
/// <summary>
/// Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
/// </summary>
[Input("authType")]
public Input<string>? AuthType { get; set; }

/// <summary>
/// Specifies the Redshift DSN. See
/// the [Vault
Expand Down Expand Up @@ -63,6 +69,22 @@ public Input<string>? Password
}
}

[Input("serviceAccountJson")]
private Input<string>? _serviceAccountJson;

/// <summary>
/// JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
/// </summary>
public Input<string>? ServiceAccountJson
{
get => _serviceAccountJson;
set
{
var emptySecret = Output.CreateSecret(0);
_serviceAccountJson = Output.Tuple<Input<string>?, int>(value, emptySecret).Apply(t => t.Item1);
}
}

/// <summary>
/// The root credential username used in the connection URL.
/// </summary>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,12 @@ namespace Pulumi.Vault.Database.Inputs

public sealed class SecretBackendConnectionPostgresqlGetArgs : global::Pulumi.ResourceArgs
{
/// <summary>
/// Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
/// </summary>
[Input("authType")]
public Input<string>? AuthType { get; set; }

/// <summary>
/// Specifies the Redshift DSN. See
/// the [Vault
Expand Down Expand Up @@ -63,6 +69,22 @@ public Input<string>? Password
}
}

[Input("serviceAccountJson")]
private Input<string>? _serviceAccountJson;

/// <summary>
/// JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
/// </summary>
public Input<string>? ServiceAccountJson
{
get => _serviceAccountJson;
set
{
var emptySecret = Output.CreateSecret(0);
_serviceAccountJson = Output.Tuple<Input<string>?, int>(value, emptySecret).Apply(t => t.Item1);
}
}

/// <summary>
/// The root credential username used in the connection URL.
/// </summary>
Expand Down
15 changes: 15 additions & 0 deletions sdk/dotnet/Database/Inputs/SecretsMountMysqlArgs.cs
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,9 @@ public InputList<string> AllowedRoles
set => _allowedRoles = value;
}

[Input("authType")]
public Input<string>? AuthType { get; set; }

/// <summary>
/// A URL containing connection information.
/// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/snowflake#sample-payload)
Expand Down Expand Up @@ -102,6 +105,18 @@ public InputList<string> RootRotationStatements
set => _rootRotationStatements = value;
}

[Input("serviceAccountJson")]
private Input<string>? _serviceAccountJson;
public Input<string>? ServiceAccountJson
{
get => _serviceAccountJson;
set
{
var emptySecret = Output.CreateSecret(0);
_serviceAccountJson = Output.Tuple<Input<string>?, int>(value, emptySecret).Apply(t => t.Item1);
}
}

/// <summary>
/// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
/// </summary>
Expand Down
15 changes: 15 additions & 0 deletions sdk/dotnet/Database/Inputs/SecretsMountMysqlGetArgs.cs
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,9 @@ public InputList<string> AllowedRoles
set => _allowedRoles = value;
}

[Input("authType")]
public Input<string>? AuthType { get; set; }

/// <summary>
/// A URL containing connection information.
/// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/snowflake#sample-payload)
Expand Down Expand Up @@ -102,6 +105,18 @@ public InputList<string> RootRotationStatements
set => _rootRotationStatements = value;
}

[Input("serviceAccountJson")]
private Input<string>? _serviceAccountJson;
public Input<string>? ServiceAccountJson
{
get => _serviceAccountJson;
set
{
var emptySecret = Output.CreateSecret(0);
_serviceAccountJson = Output.Tuple<Input<string>?, int>(value, emptySecret).Apply(t => t.Item1);
}
}

/// <summary>
/// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
/// </summary>
Expand Down
15 changes: 15 additions & 0 deletions sdk/dotnet/Database/Inputs/SecretsMountPostgresqlArgs.cs
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,9 @@ public InputList<string> AllowedRoles
set => _allowedRoles = value;
}

[Input("authType")]
public Input<string>? AuthType { get; set; }

/// <summary>
/// A URL containing connection information.
/// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/snowflake#sample-payload)
Expand Down Expand Up @@ -108,6 +111,18 @@ public InputList<string> RootRotationStatements
set => _rootRotationStatements = value;
}

[Input("serviceAccountJson")]
private Input<string>? _serviceAccountJson;
public Input<string>? ServiceAccountJson
{
get => _serviceAccountJson;
set
{
var emptySecret = Output.CreateSecret(0);
_serviceAccountJson = Output.Tuple<Input<string>?, int>(value, emptySecret).Apply(t => t.Item1);
}
}

/// <summary>
/// The username to be used in the connection (the account admin level).
/// </summary>
Expand Down
15 changes: 15 additions & 0 deletions sdk/dotnet/Database/Inputs/SecretsMountPostgresqlGetArgs.cs
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,9 @@ public InputList<string> AllowedRoles
set => _allowedRoles = value;
}

[Input("authType")]
public Input<string>? AuthType { get; set; }

/// <summary>
/// A URL containing connection information.
/// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/snowflake#sample-payload)
Expand Down Expand Up @@ -108,6 +111,18 @@ public InputList<string> RootRotationStatements
set => _rootRotationStatements = value;
}

[Input("serviceAccountJson")]
private Input<string>? _serviceAccountJson;
public Input<string>? ServiceAccountJson
{
get => _serviceAccountJson;
set
{
var emptySecret = Output.CreateSecret(0);
_serviceAccountJson = Output.Tuple<Input<string>?, int>(value, emptySecret).Apply(t => t.Item1);
}
}

/// <summary>
/// The username to be used in the connection (the account admin level).
/// </summary>
Expand Down
Loading

0 comments on commit 01873e8

Please sign in to comment.