diff --git a/provider/cmd/pulumi-resource-cpln/schema.json b/provider/cmd/pulumi-resource-cpln/schema.json index 17e7ac2..06b0a2a 100644 --- a/provider/cmd/pulumi-resource-cpln/schema.json +++ b/provider/cmd/pulumi-resource-cpln/schema.json @@ -1054,6 +1054,9 @@ "type": "string", "secret": true }, + "externalId": { + "type": "string" + }, "roleArn": { "type": "string" }, diff --git a/provider/go.mod b/provider/go.mod index acf2173..62d0ec3 100644 --- a/provider/go.mod +++ b/provider/go.mod @@ -87,7 +87,7 @@ require ( github.com/cheggaaa/pb v1.0.29 // indirect github.com/cloudflare/circl v1.3.7 // indirect github.com/containerd/console v1.0.4-0.20230313162750-1ae8d489ac81 // indirect - github.com/controlplane-com/terraform-provider-cpln v1.1.18 // indirect + github.com/controlplane-com/terraform-provider-cpln v1.1.19 // indirect github.com/davecgh/go-spew v1.1.1 // indirect github.com/dimchansky/utfbom v1.1.1 // indirect github.com/djherbis/times v1.5.0 // indirect diff --git a/provider/go.sum b/provider/go.sum index 6667e2b..8007329 100644 --- a/provider/go.sum +++ b/provider/go.sum @@ -1076,10 +1076,8 @@ github.com/containers/ocicrypt v1.0.1/go.mod h1:MeJDzk1RJHv89LjsH0Sp5KTY3ZYkjXO/ github.com/containers/ocicrypt v1.1.0/go.mod h1:b8AOe0YR67uU8OqfVNcznfFpAzu3rdgUV4GP9qXPfu4= github.com/containers/ocicrypt v1.1.1/go.mod h1:Dm55fwWm1YZAjYRaJ94z2mfZikIyIN4B0oB3dj3jFxY= github.com/containers/ocicrypt v1.1.2/go.mod h1:Dm55fwWm1YZAjYRaJ94z2mfZikIyIN4B0oB3dj3jFxY= -github.com/controlplane-com/terraform-provider-cpln v1.1.17 h1:pPW3dvZRZRYSsXc0uSY2M9un2wtpDrSThrPvKpJTtBA= -github.com/controlplane-com/terraform-provider-cpln v1.1.17/go.mod h1:JPgpgfZ6qE0btGIYW5BrtqDHzFsE929JmDzTgYfRQkc= -github.com/controlplane-com/terraform-provider-cpln v1.1.18 h1:IT6EkrA6VHmQIfnVn79C57KAmwnE9EMXPu4xJn8KC+w= -github.com/controlplane-com/terraform-provider-cpln v1.1.18/go.mod h1:Omq2M175dtYzFK4e8UT79j6/+NrAwTVhK/bZh3POdZk= +github.com/controlplane-com/terraform-provider-cpln v1.1.19 h1:PTIMhx7Vjudg+sCfxULFhwl5JxJHUk1m2Ncuz2RRsEw= +github.com/controlplane-com/terraform-provider-cpln v1.1.19/go.mod h1:Omq2M175dtYzFK4e8UT79j6/+NrAwTVhK/bZh3POdZk= github.com/coreos/bbolt v1.3.2/go.mod h1:iRUV2dpdMOn7Bo10OQBFzIJO9kkE559Wcmn+qkEiiKk= github.com/coreos/etcd v3.3.10+incompatible/go.mod h1:uF7uidLiAD3TWHmW31ZFd/JWoc32PjwdhPthX9715RE= github.com/coreos/etcd v3.3.13+incompatible/go.mod h1:uF7uidLiAD3TWHmW31ZFd/JWoc32PjwdhPthX9715RE= diff --git a/provider/shim/go.mod b/provider/shim/go.mod index 7424310..2625062 100644 --- a/provider/shim/go.mod +++ b/provider/shim/go.mod @@ -3,8 +3,8 @@ module github.com/controlplane-com/terraform-provider-cpln/shim go 1.21 require ( + github.com/controlplane-com/terraform-provider-cpln v1.1.19 github.com/hashicorp/terraform-plugin-sdk/v2 v2.31.0 - github.com/controlplane-com/terraform-provider-cpln v1.1.18 ) require ( diff --git a/provider/shim/go.sum b/provider/shim/go.sum index 27a6191..3e73e95 100644 --- a/provider/shim/go.sum +++ b/provider/shim/go.sum @@ -9,8 +9,8 @@ github.com/apparentlymart/go-textseg/v15 v15.0.0 h1:uYvfpb3DyLSCGWnctWKGj857c6ew github.com/apparentlymart/go-textseg/v15 v15.0.0/go.mod h1:K8XmNZdhEBkdlyDdvbmmsvpAG721bKi0joRfFdHIWJ4= github.com/cloudflare/circl v1.3.7 h1:qlCDlTPz2n9fu58M0Nh1J/JzcFpfgkFHHX3O35r5vcU= github.com/cloudflare/circl v1.3.7/go.mod h1:sRTcRWXGLrKw6yIGJ+l7amYJFfAXbZG0kBSc8r4zxgA= -github.com/controlplane-com/terraform-provider-cpln v1.1.17 h1:pPW3dvZRZRYSsXc0uSY2M9un2wtpDrSThrPvKpJTtBA= -github.com/controlplane-com/terraform-provider-cpln v1.1.17/go.mod h1:JPgpgfZ6qE0btGIYW5BrtqDHzFsE929JmDzTgYfRQkc= +github.com/controlplane-com/terraform-provider-cpln v1.1.19 h1:PTIMhx7Vjudg+sCfxULFhwl5JxJHUk1m2Ncuz2RRsEw= +github.com/controlplane-com/terraform-provider-cpln v1.1.19/go.mod h1:Omq2M175dtYzFK4e8UT79j6/+NrAwTVhK/bZh3POdZk= github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38= github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c= github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38= diff --git a/sdk/dotnet/Inputs/SecretAwsArgs.cs b/sdk/dotnet/Inputs/SecretAwsArgs.cs index 1cb8234..1dde72d 100644 --- a/sdk/dotnet/Inputs/SecretAwsArgs.cs +++ b/sdk/dotnet/Inputs/SecretAwsArgs.cs @@ -25,6 +25,9 @@ public Input? AccessKey } } + [Input("externalId")] + public Input? ExternalId { get; set; } + [Input("roleArn")] public Input? RoleArn { get; set; } diff --git a/sdk/dotnet/Inputs/SecretAwsGetArgs.cs b/sdk/dotnet/Inputs/SecretAwsGetArgs.cs index 46f2d9e..38b156c 100644 --- a/sdk/dotnet/Inputs/SecretAwsGetArgs.cs +++ b/sdk/dotnet/Inputs/SecretAwsGetArgs.cs @@ -25,6 +25,9 @@ public Input? AccessKey } } + [Input("externalId")] + public Input? ExternalId { get; set; } + [Input("roleArn")] public Input? RoleArn { get; set; } diff --git a/sdk/dotnet/Outputs/SecretAws.cs b/sdk/dotnet/Outputs/SecretAws.cs index 4d495ca..c9a3cd1 100644 --- a/sdk/dotnet/Outputs/SecretAws.cs +++ b/sdk/dotnet/Outputs/SecretAws.cs @@ -15,6 +15,7 @@ namespace Pulumiverse.Cpln.Outputs public sealed class SecretAws { public readonly string AccessKey; + public readonly string? ExternalId; public readonly string? RoleArn; public readonly string SecretKey; @@ -22,11 +23,14 @@ public sealed class SecretAws private SecretAws( string accessKey, + string? externalId, + string? roleArn, string secretKey) { AccessKey = accessKey; + ExternalId = externalId; RoleArn = roleArn; SecretKey = secretKey; } diff --git a/sdk/go/cpln/pulumiTypes.go b/sdk/go/cpln/pulumiTypes.go index 59cfd07..0f1dba9 100644 --- a/sdk/go/cpln/pulumiTypes.go +++ b/sdk/go/cpln/pulumiTypes.go @@ -8942,9 +8942,10 @@ func (o PolicyTargetQuerySpecTermArrayOutput) Index(i pulumi.IntInput) PolicyTar } type SecretAws struct { - AccessKey string `pulumi:"accessKey"` - RoleArn *string `pulumi:"roleArn"` - SecretKey string `pulumi:"secretKey"` + AccessKey string `pulumi:"accessKey"` + ExternalId *string `pulumi:"externalId"` + RoleArn *string `pulumi:"roleArn"` + SecretKey string `pulumi:"secretKey"` } // SecretAwsInput is an input type that accepts SecretAwsArgs and SecretAwsOutput values. @@ -8959,9 +8960,10 @@ type SecretAwsInput interface { } type SecretAwsArgs struct { - AccessKey pulumi.StringInput `pulumi:"accessKey"` - RoleArn pulumi.StringPtrInput `pulumi:"roleArn"` - SecretKey pulumi.StringInput `pulumi:"secretKey"` + AccessKey pulumi.StringInput `pulumi:"accessKey"` + ExternalId pulumi.StringPtrInput `pulumi:"externalId"` + RoleArn pulumi.StringPtrInput `pulumi:"roleArn"` + SecretKey pulumi.StringInput `pulumi:"secretKey"` } func (SecretAwsArgs) ElementType() reflect.Type { @@ -9063,6 +9065,10 @@ func (o SecretAwsOutput) AccessKey() pulumi.StringOutput { return o.ApplyT(func(v SecretAws) string { return v.AccessKey }).(pulumi.StringOutput) } +func (o SecretAwsOutput) ExternalId() pulumi.StringPtrOutput { + return o.ApplyT(func(v SecretAws) *string { return v.ExternalId }).(pulumi.StringPtrOutput) +} + func (o SecretAwsOutput) RoleArn() pulumi.StringPtrOutput { return o.ApplyT(func(v SecretAws) *string { return v.RoleArn }).(pulumi.StringPtrOutput) } @@ -9110,6 +9116,15 @@ func (o SecretAwsPtrOutput) AccessKey() pulumi.StringPtrOutput { }).(pulumi.StringPtrOutput) } +func (o SecretAwsPtrOutput) ExternalId() pulumi.StringPtrOutput { + return o.ApplyT(func(v *SecretAws) *string { + if v == nil { + return nil + } + return v.ExternalId + }).(pulumi.StringPtrOutput) +} + func (o SecretAwsPtrOutput) RoleArn() pulumi.StringPtrOutput { return o.ApplyT(func(v *SecretAws) *string { if v == nil { diff --git a/sdk/nodejs/types/input.ts b/sdk/nodejs/types/input.ts index 25a8dd1..16b1a83 100644 --- a/sdk/nodejs/types/input.ts +++ b/sdk/nodejs/types/input.ts @@ -383,6 +383,7 @@ export interface PolicyTargetQuerySpecTerm { export interface SecretAws { accessKey: pulumi.Input; + externalId?: pulumi.Input; roleArn?: pulumi.Input; secretKey: pulumi.Input; } diff --git a/sdk/nodejs/types/output.ts b/sdk/nodejs/types/output.ts index a966f0b..aa88eec 100644 --- a/sdk/nodejs/types/output.ts +++ b/sdk/nodejs/types/output.ts @@ -387,6 +387,7 @@ export interface PolicyTargetQuerySpecTerm { export interface SecretAws { accessKey: string; + externalId?: string; roleArn?: string; secretKey: string; } diff --git a/sdk/python/pulumiverse_cpln/_inputs.py b/sdk/python/pulumiverse_cpln/_inputs.py index 7e6c3d1..8fa784a 100644 --- a/sdk/python/pulumiverse_cpln/_inputs.py +++ b/sdk/python/pulumiverse_cpln/_inputs.py @@ -3138,11 +3138,13 @@ class SecretAwsArgs: def __init__(__self__, *, access_key: pulumi.Input[str], secret_key: pulumi.Input[str], + external_id: Optional[pulumi.Input[str]] = None, role_arn: Optional[pulumi.Input[str]] = None): SecretAwsArgs._configure( lambda key, value: pulumi.set(__self__, key, value), access_key=access_key, secret_key=secret_key, + external_id=external_id, role_arn=role_arn, ) @staticmethod @@ -3150,6 +3152,7 @@ def _configure( _setter: Callable[[Any, Any], None], access_key: pulumi.Input[str], secret_key: pulumi.Input[str], + external_id: Optional[pulumi.Input[str]] = None, role_arn: Optional[pulumi.Input[str]] = None, opts: Optional[pulumi.ResourceOptions]=None, **kwargs): @@ -3157,11 +3160,15 @@ def _configure( access_key = kwargs['accessKey'] if 'secretKey' in kwargs: secret_key = kwargs['secretKey'] + if 'externalId' in kwargs: + external_id = kwargs['externalId'] if 'roleArn' in kwargs: role_arn = kwargs['roleArn'] _setter("access_key", access_key) _setter("secret_key", secret_key) + if external_id is not None: + _setter("external_id", external_id) if role_arn is not None: _setter("role_arn", role_arn) @@ -3183,6 +3190,15 @@ def secret_key(self) -> pulumi.Input[str]: def secret_key(self, value: pulumi.Input[str]): pulumi.set(self, "secret_key", value) + @property + @pulumi.getter(name="externalId") + def external_id(self) -> Optional[pulumi.Input[str]]: + return pulumi.get(self, "external_id") + + @external_id.setter + def external_id(self, value: Optional[pulumi.Input[str]]): + pulumi.set(self, "external_id", value) + @property @pulumi.getter(name="roleArn") def role_arn(self) -> Optional[pulumi.Input[str]]: diff --git a/sdk/python/pulumiverse_cpln/outputs.py b/sdk/python/pulumiverse_cpln/outputs.py index b36061e..09a845a 100644 --- a/sdk/python/pulumiverse_cpln/outputs.py +++ b/sdk/python/pulumiverse_cpln/outputs.py @@ -3134,6 +3134,8 @@ def __key_warning(key: str): suggest = "access_key" elif key == "secretKey": suggest = "secret_key" + elif key == "externalId": + suggest = "external_id" elif key == "roleArn": suggest = "role_arn" @@ -3151,11 +3153,13 @@ def get(self, key: str, default = None) -> Any: def __init__(__self__, *, access_key: str, secret_key: str, + external_id: Optional[str] = None, role_arn: Optional[str] = None): SecretAws._configure( lambda key, value: pulumi.set(__self__, key, value), access_key=access_key, secret_key=secret_key, + external_id=external_id, role_arn=role_arn, ) @staticmethod @@ -3163,6 +3167,7 @@ def _configure( _setter: Callable[[Any, Any], None], access_key: str, secret_key: str, + external_id: Optional[str] = None, role_arn: Optional[str] = None, opts: Optional[pulumi.ResourceOptions]=None, **kwargs): @@ -3170,11 +3175,15 @@ def _configure( access_key = kwargs['accessKey'] if 'secretKey' in kwargs: secret_key = kwargs['secretKey'] + if 'externalId' in kwargs: + external_id = kwargs['externalId'] if 'roleArn' in kwargs: role_arn = kwargs['roleArn'] _setter("access_key", access_key) _setter("secret_key", secret_key) + if external_id is not None: + _setter("external_id", external_id) if role_arn is not None: _setter("role_arn", role_arn) @@ -3188,6 +3197,11 @@ def access_key(self) -> str: def secret_key(self) -> str: return pulumi.get(self, "secret_key") + @property + @pulumi.getter(name="externalId") + def external_id(self) -> Optional[str]: + return pulumi.get(self, "external_id") + @property @pulumi.getter(name="roleArn") def role_arn(self) -> Optional[str]: