Documentation ¶
Index ¶
- type AccessPolicy
- func (r *AccessPolicy) ApplicationId() *pulumi.StringOutput
- func (r *AccessPolicy) CertificatePermissions() *pulumi.ArrayOutput
- func (r *AccessPolicy) ID() *pulumi.IDOutput
- func (r *AccessPolicy) KeyPermissions() *pulumi.ArrayOutput
- func (r *AccessPolicy) ObjectId() *pulumi.StringOutput
- func (r *AccessPolicy) ResourceGroupName() *pulumi.StringOutput
- func (r *AccessPolicy) SecretPermissions() *pulumi.ArrayOutput
- func (r *AccessPolicy) TenantId() *pulumi.StringOutput
- func (r *AccessPolicy) URN() *pulumi.URNOutput
- func (r *AccessPolicy) VaultName() *pulumi.StringOutput
- type AccessPolicyArgs
- type AccessPolicyState
- type Certifiate
- func (r *Certifiate) Certificate() *pulumi.Output
- func (r *Certifiate) CertificateData() *pulumi.StringOutput
- func (r *Certifiate) CertificatePolicy() *pulumi.Output
- func (r *Certifiate) ID() *pulumi.IDOutput
- func (r *Certifiate) Name() *pulumi.StringOutput
- func (r *Certifiate) SecretId() *pulumi.StringOutput
- func (r *Certifiate) Tags() *pulumi.MapOutput
- func (r *Certifiate) Thumbprint() *pulumi.StringOutput
- func (r *Certifiate) URN() *pulumi.URNOutput
- func (r *Certifiate) VaultUri() *pulumi.StringOutput
- func (r *Certifiate) Version() *pulumi.StringOutput
- type CertifiateArgs
- type CertifiateState
- type GetAccessPolicyArgs
- type GetAccessPolicyResult
- type GetKeyVaultArgs
- type GetKeyVaultResult
- type GetSecretArgs
- type GetSecretResult
- type Key
- func (r *Key) E() *pulumi.StringOutput
- func (r *Key) ID() *pulumi.IDOutput
- func (r *Key) KeyOpts() *pulumi.ArrayOutput
- func (r *Key) KeySize() *pulumi.IntOutput
- func (r *Key) KeyType() *pulumi.StringOutput
- func (r *Key) N() *pulumi.StringOutput
- func (r *Key) Name() *pulumi.StringOutput
- func (r *Key) Tags() *pulumi.MapOutput
- func (r *Key) URN() *pulumi.URNOutput
- func (r *Key) VaultUri() *pulumi.StringOutput
- func (r *Key) Version() *pulumi.StringOutput
- type KeyArgs
- type KeyState
- type KeyVault
- func (r *KeyVault) AccessPolicies() *pulumi.ArrayOutput
- func (r *KeyVault) EnabledForDeployment() *pulumi.BoolOutput
- func (r *KeyVault) EnabledForDiskEncryption() *pulumi.BoolOutput
- func (r *KeyVault) EnabledForTemplateDeployment() *pulumi.BoolOutput
- func (r *KeyVault) ID() *pulumi.IDOutput
- func (r *KeyVault) Location() *pulumi.StringOutput
- func (r *KeyVault) Name() *pulumi.StringOutput
- func (r *KeyVault) NetworkAcls() *pulumi.Output
- func (r *KeyVault) ResourceGroupName() *pulumi.StringOutput
- func (r *KeyVault) Sku() *pulumi.Output
- func (r *KeyVault) Tags() *pulumi.MapOutput
- func (r *KeyVault) TenantId() *pulumi.StringOutput
- func (r *KeyVault) URN() *pulumi.URNOutput
- func (r *KeyVault) VaultUri() *pulumi.StringOutput
- type KeyVaultArgs
- type KeyVaultState
- type Secret
- func (r *Secret) ContentType() *pulumi.StringOutput
- func (r *Secret) ID() *pulumi.IDOutput
- func (r *Secret) Name() *pulumi.StringOutput
- func (r *Secret) Tags() *pulumi.MapOutput
- func (r *Secret) URN() *pulumi.URNOutput
- func (r *Secret) Value() *pulumi.StringOutput
- func (r *Secret) VaultUri() *pulumi.StringOutput
- func (r *Secret) Version() *pulumi.StringOutput
- type SecretArgs
- type SecretState
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
This section is empty.
Types ¶
type AccessPolicy ¶ added in v0.15.0
type AccessPolicy struct {
// contains filtered or unexported fields
}
Manages a Key Vault Access Policy.
~> **NOTE:** It's possible to define Key Vault Access Policies both within the `azurerm_key_vault` resource via the `access_policy` block and by using the `azurerm_key_vault_access_policy` resource. However it's not possible to use both methods to manage Access Policies within a KeyVault, since there'll be conflicts.
-> **NOTE:** Azure permits a maximum of 16 Access Policies per Key Vault - [more information can be found in this document](https://docs.microsoft.com/en-us/azure/key-vault/key-vault-secure-your-key-vault#data-plane-access-control).
func GetAccessPolicy ¶ added in v0.15.0
func GetAccessPolicy(ctx *pulumi.Context, name string, id pulumi.ID, state *AccessPolicyState, opts ...pulumi.ResourceOpt) (*AccessPolicy, error)
GetAccessPolicy gets an existing AccessPolicy resource's state with the given name, ID, and optional state properties that are used to uniquely qualify the lookup (nil if not required).
func NewAccessPolicy ¶ added in v0.15.0
func NewAccessPolicy(ctx *pulumi.Context, name string, args *AccessPolicyArgs, opts ...pulumi.ResourceOpt) (*AccessPolicy, error)
NewAccessPolicy registers a new resource with the given unique name, arguments, and options.
func (*AccessPolicy) ApplicationId ¶ added in v0.15.0
func (r *AccessPolicy) ApplicationId() *pulumi.StringOutput
The object ID of an Application in Azure Active Directory.
func (*AccessPolicy) CertificatePermissions ¶ added in v0.15.0
func (r *AccessPolicy) CertificatePermissions() *pulumi.ArrayOutput
List of certificate permissions, must be one or more from the following: `create`, `delete`, `deleteissuers`, `get`, `getissuers`, `import`, `list`, `listissuers`, `managecontacts`, `manageissuers`, `purge`, `recover`, `setissuers` and `update`.
func (*AccessPolicy) ID ¶ added in v0.15.0
func (r *AccessPolicy) ID() *pulumi.IDOutput
ID is this resource's unique identifier assigned by its provider.
func (*AccessPolicy) KeyPermissions ¶ added in v0.15.0
func (r *AccessPolicy) KeyPermissions() *pulumi.ArrayOutput
List of key permissions, must be one or more from the following: `backup`, `create`, `decrypt`, `delete`, `encrypt`, `get`, `import`, `list`, `purge`, `recover`, `restore`, `sign`, `unwrapKey`, `update`, `verify` and `wrapKey`.
func (*AccessPolicy) ObjectId ¶ added in v0.15.0
func (r *AccessPolicy) ObjectId() *pulumi.StringOutput
The object ID of a user, service principal or security group in the Azure Active Directory tenant for the vault. The object ID must be unique for the list of access policies. Changing this forces a new resource to be created.
func (*AccessPolicy) ResourceGroupName ¶ added in v0.15.0
func (r *AccessPolicy) ResourceGroupName() *pulumi.StringOutput
The name of the resource group in which to create the namespace. Changing this forces a new resource to be created.
func (*AccessPolicy) SecretPermissions ¶ added in v0.15.0
func (r *AccessPolicy) SecretPermissions() *pulumi.ArrayOutput
List of secret permissions, must be one or more from the following: `backup`, `delete`, `get`, `list`, `purge`, `recover`, `restore` and `set`.
func (*AccessPolicy) TenantId ¶ added in v0.15.0
func (r *AccessPolicy) TenantId() *pulumi.StringOutput
The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault. Changing this forces a new resource to be created.
func (*AccessPolicy) URN ¶ added in v0.15.0
func (r *AccessPolicy) URN() *pulumi.URNOutput
URN is this resource's unique name assigned by Pulumi.
func (*AccessPolicy) VaultName ¶ added in v0.15.0
func (r *AccessPolicy) VaultName() *pulumi.StringOutput
Specifies the name of the Key Vault resource. Changing this forces a new resource to be created.
type AccessPolicyArgs ¶ added in v0.15.0
type AccessPolicyArgs struct { // The object ID of an Application in Azure Active Directory. ApplicationId interface{} // List of certificate permissions, must be one or more from // the following: `create`, `delete`, `deleteissuers`, `get`, `getissuers`, `import`, `list`, `listissuers`, // `managecontacts`, `manageissuers`, `purge`, `recover`, `setissuers` and `update`. CertificatePermissions interface{} // List of key permissions, must be one or more from // the following: `backup`, `create`, `decrypt`, `delete`, `encrypt`, `get`, `import`, `list`, `purge`, // `recover`, `restore`, `sign`, `unwrapKey`, `update`, `verify` and `wrapKey`. KeyPermissions interface{} // The object ID of a user, service principal or security // group in the Azure Active Directory tenant for the vault. The object ID must // be unique for the list of access policies. Changing this forces a new resource // to be created. ObjectId interface{} // The name of the resource group in which to // create the namespace. Changing this forces a new resource to be created. ResourceGroupName interface{} // List of secret permissions, must be one or more // from the following: `backup`, `delete`, `get`, `list`, `purge`, `recover`, `restore` and `set`. SecretPermissions interface{} // The Azure Active Directory tenant ID that should be used // for authenticating requests to the key vault. Changing this forces a new resource // to be created. TenantId interface{} // Specifies the name of the Key Vault resource. Changing this // forces a new resource to be created. VaultName interface{} }
The set of arguments for constructing a AccessPolicy resource.
type AccessPolicyState ¶ added in v0.15.0
type AccessPolicyState struct { // The object ID of an Application in Azure Active Directory. ApplicationId interface{} // List of certificate permissions, must be one or more from // the following: `create`, `delete`, `deleteissuers`, `get`, `getissuers`, `import`, `list`, `listissuers`, // `managecontacts`, `manageissuers`, `purge`, `recover`, `setissuers` and `update`. CertificatePermissions interface{} // List of key permissions, must be one or more from // the following: `backup`, `create`, `decrypt`, `delete`, `encrypt`, `get`, `import`, `list`, `purge`, // `recover`, `restore`, `sign`, `unwrapKey`, `update`, `verify` and `wrapKey`. KeyPermissions interface{} // The object ID of a user, service principal or security // group in the Azure Active Directory tenant for the vault. The object ID must // be unique for the list of access policies. Changing this forces a new resource // to be created. ObjectId interface{} // The name of the resource group in which to // create the namespace. Changing this forces a new resource to be created. ResourceGroupName interface{} // List of secret permissions, must be one or more // from the following: `backup`, `delete`, `get`, `list`, `purge`, `recover`, `restore` and `set`. SecretPermissions interface{} // The Azure Active Directory tenant ID that should be used // for authenticating requests to the key vault. Changing this forces a new resource // to be created. TenantId interface{} // Specifies the name of the Key Vault resource. Changing this // forces a new resource to be created. VaultName interface{} }
Input properties used for looking up and filtering AccessPolicy resources.
type Certifiate ¶
type Certifiate struct {
// contains filtered or unexported fields
}
Manages a Key Vault Certificate.
func GetCertifiate ¶
func GetCertifiate(ctx *pulumi.Context, name string, id pulumi.ID, state *CertifiateState, opts ...pulumi.ResourceOpt) (*Certifiate, error)
GetCertifiate gets an existing Certifiate resource's state with the given name, ID, and optional state properties that are used to uniquely qualify the lookup (nil if not required).
func NewCertifiate ¶
func NewCertifiate(ctx *pulumi.Context, name string, args *CertifiateArgs, opts ...pulumi.ResourceOpt) (*Certifiate, error)
NewCertifiate registers a new resource with the given unique name, arguments, and options.
func (*Certifiate) Certificate ¶
func (r *Certifiate) Certificate() *pulumi.Output
A `certificate` block as defined below, used to Import an existing certificate.
func (*Certifiate) CertificateData ¶
func (r *Certifiate) CertificateData() *pulumi.StringOutput
The raw Key Vault Certificate.
func (*Certifiate) CertificatePolicy ¶
func (r *Certifiate) CertificatePolicy() *pulumi.Output
A `certificate_policy` block as defined below.
func (*Certifiate) ID ¶
func (r *Certifiate) ID() *pulumi.IDOutput
ID is this resource's unique identifier assigned by its provider.
func (*Certifiate) Name ¶
func (r *Certifiate) Name() *pulumi.StringOutput
The name of the Certificate Issuer. Possible values include `Self`, or the name of a certificate issuing authority supported by Azure. Changing this forces a new resource to be created.
func (*Certifiate) SecretId ¶
func (r *Certifiate) SecretId() *pulumi.StringOutput
The ID of the associated Key Vault Secret.
func (*Certifiate) Tags ¶
func (r *Certifiate) Tags() *pulumi.MapOutput
A mapping of tags to assign to the resource.
func (*Certifiate) Thumbprint ¶ added in v0.16.0
func (r *Certifiate) Thumbprint() *pulumi.StringOutput
The X509 Thumbprint of the Key Vault Certificate returned as hex string.
func (*Certifiate) URN ¶
func (r *Certifiate) URN() *pulumi.URNOutput
URN is this resource's unique name assigned by Pulumi.
func (*Certifiate) VaultUri ¶
func (r *Certifiate) VaultUri() *pulumi.StringOutput
Specifies the URI used to access the Key Vault instance, available on the `azurerm_key_vault` resource.
func (*Certifiate) Version ¶
func (r *Certifiate) Version() *pulumi.StringOutput
The current version of the Key Vault Certificate.
type CertifiateArgs ¶
type CertifiateArgs struct { // A `certificate` block as defined below, used to Import an existing certificate. Certificate interface{} // A `certificate_policy` block as defined below. CertificatePolicy interface{} // The name of the Certificate Issuer. Possible values include `Self`, or the name of a certificate issuing authority supported by Azure. Changing this forces a new resource to be created. Name interface{} // A mapping of tags to assign to the resource. Tags interface{} // Specifies the URI used to access the Key Vault instance, available on the `azurerm_key_vault` resource. VaultUri interface{} }
The set of arguments for constructing a Certifiate resource.
type CertifiateState ¶
type CertifiateState struct { // A `certificate` block as defined below, used to Import an existing certificate. Certificate interface{} // The raw Key Vault Certificate. CertificateData interface{} // A `certificate_policy` block as defined below. CertificatePolicy interface{} // The name of the Certificate Issuer. Possible values include `Self`, or the name of a certificate issuing authority supported by Azure. Changing this forces a new resource to be created. Name interface{} // The ID of the associated Key Vault Secret. SecretId interface{} // A mapping of tags to assign to the resource. Tags interface{} // The X509 Thumbprint of the Key Vault Certificate returned as hex string. Thumbprint interface{} // Specifies the URI used to access the Key Vault instance, available on the `azurerm_key_vault` resource. VaultUri interface{} // The current version of the Key Vault Certificate. Version interface{} }
Input properties used for looking up and filtering Certifiate resources.
type GetAccessPolicyArgs ¶
type GetAccessPolicyArgs struct { // Specifies the name of the Management Template. Possible values are: `Key Management`, // `Secret Management`, `Certificate Management`, `Key & Secret Management`, `Key & Certificate Management`, // `Secret & Certificate Management`, `Key, Secret, & Certificate Management` Name interface{} }
A collection of arguments for invoking getAccessPolicy.
type GetAccessPolicyResult ¶
type GetAccessPolicyResult struct { // the certificate permissions for the access policy CertificatePermissions interface{} // the key permissions for the access policy KeyPermissions interface{} // the secret permissions for the access policy SecretPermissions interface{} // id is the provider-assigned unique ID for this managed resource. Id interface{} }
A collection of values returned by getAccessPolicy.
func LookupAccessPolicy ¶
func LookupAccessPolicy(ctx *pulumi.Context, args *GetAccessPolicyArgs) (*GetAccessPolicyResult, error)
Use this data source to access information about the permissions from the Management Key Vault Templates.
type GetKeyVaultArgs ¶
type GetKeyVaultArgs struct { // Specifies the name of the Key Vault. Name interface{} // The name of the Resource Group in which the Key Vault exists. ResourceGroupName interface{} }
A collection of arguments for invoking getKeyVault.
type GetKeyVaultResult ¶
type GetKeyVaultResult struct { // One or more `access_policy` blocks as defined below. AccessPolicies interface{} // Can Azure Virtual Machines retrieve certificates stored as secrets from the Key Vault? EnabledForDeployment interface{} // Can Azure Disk Encryption retrieve secrets from the Key Vault? EnabledForDiskEncryption interface{} // Can Azure Resource Manager retrieve secrets from the Key Vault? EnabledForTemplateDeployment interface{} // The Azure Region in which the Key Vault exists. Location interface{} NetworkAcls interface{} // A `sku` block as described below. Sku interface{} // A mapping of tags assigned to the Key Vault. Tags interface{} // The Azure Active Directory Tenant ID used to authenticate requests for this Key Vault. TenantId interface{} // The URI of the vault for performing operations on keys and secrets. VaultUri interface{} // id is the provider-assigned unique ID for this managed resource. Id interface{} }
A collection of values returned by getKeyVault.
func LookupKeyVault ¶
func LookupKeyVault(ctx *pulumi.Context, args *GetKeyVaultArgs) (*GetKeyVaultResult, error)
Use this data source to access information about an existing Key Vault.
type GetSecretArgs ¶
type GetSecretArgs struct { // Specifies the name of the Key Vault Secret. Name interface{} // Specifies the URI used to access the Key Vault instance, available on the `azurerm_key_vault` Data Source / Resource. VaultUri interface{} }
A collection of arguments for invoking getSecret.
type GetSecretResult ¶
type GetSecretResult struct { // The content type for the Key Vault Secret. ContentType interface{} // Any tags assigned to this resource. Tags interface{} // The value of the Key Vault Secret. Value interface{} // The current version of the Key Vault Secret. Version interface{} // id is the provider-assigned unique ID for this managed resource. Id interface{} }
A collection of values returned by getSecret.
func LookupSecret ¶
func LookupSecret(ctx *pulumi.Context, args *GetSecretArgs) (*GetSecretResult, error)
Use this data source to access information about an existing Key Vault Secret.
~> **Note:** All arguments including the secret value will be stored in the raw state as plain-text. [Read more about sensitive data in state](https://www.terraform.io/docs/state/sensitive-data.html).
type Key ¶
type Key struct {
// contains filtered or unexported fields
}
Manages a Key Vault Key.
func GetKey ¶
func GetKey(ctx *pulumi.Context, name string, id pulumi.ID, state *KeyState, opts ...pulumi.ResourceOpt) (*Key, error)
GetKey gets an existing Key resource's state with the given name, ID, and optional state properties that are used to uniquely qualify the lookup (nil if not required).
func NewKey ¶
func NewKey(ctx *pulumi.Context, name string, args *KeyArgs, opts ...pulumi.ResourceOpt) (*Key, error)
NewKey registers a new resource with the given unique name, arguments, and options.
func (*Key) E ¶
func (r *Key) E() *pulumi.StringOutput
The RSA public exponent of this Key Vault Key.
func (*Key) KeyOpts ¶
func (r *Key) KeyOpts() *pulumi.ArrayOutput
A list of JSON web key operations. Possible values include: `decrypt`, `encrypt`, `sign`, `unwrapKey`, `verify` and `wrapKey`. Please note these values are case sensitive.
func (*Key) KeySize ¶
Specifies the Size of the Key to create in bytes. For example, 1024 or 2048. Changing this forces a new resource to be created.
func (*Key) KeyType ¶
func (r *Key) KeyType() *pulumi.StringOutput
Specifies the Key Type to use for this Key Vault Key. Possible values are `EC` (Elliptic Curve), `Oct` (Octet), `RSA` and `RSA-HSM`. Changing this forces a new resource to be created.
func (*Key) Name ¶
func (r *Key) Name() *pulumi.StringOutput
Specifies the name of the Key Vault Key. Changing this forces a new resource to be created.
func (*Key) VaultUri ¶
func (r *Key) VaultUri() *pulumi.StringOutput
Specifies the URI used to access the Key Vault instance, available on the `azurerm_key_vault` resource.
func (*Key) Version ¶
func (r *Key) Version() *pulumi.StringOutput
The current version of the Key Vault Key.
type KeyArgs ¶
type KeyArgs struct { // A list of JSON web key operations. Possible values include: `decrypt`, `encrypt`, `sign`, `unwrapKey`, `verify` and `wrapKey`. Please note these values are case sensitive. KeyOpts interface{} // Specifies the Size of the Key to create in bytes. For example, 1024 or 2048. Changing this forces a new resource to be created. KeySize interface{} // Specifies the Key Type to use for this Key Vault Key. Possible values are `EC` (Elliptic Curve), `Oct` (Octet), `RSA` and `RSA-HSM`. Changing this forces a new resource to be created. KeyType interface{} // Specifies the name of the Key Vault Key. Changing this forces a new resource to be created. Name interface{} // A mapping of tags to assign to the resource. Tags interface{} // Specifies the URI used to access the Key Vault instance, available on the `azurerm_key_vault` resource. VaultUri interface{} }
The set of arguments for constructing a Key resource.
type KeyState ¶
type KeyState struct { // The RSA public exponent of this Key Vault Key. E interface{} // A list of JSON web key operations. Possible values include: `decrypt`, `encrypt`, `sign`, `unwrapKey`, `verify` and `wrapKey`. Please note these values are case sensitive. KeyOpts interface{} // Specifies the Size of the Key to create in bytes. For example, 1024 or 2048. Changing this forces a new resource to be created. KeySize interface{} // Specifies the Key Type to use for this Key Vault Key. Possible values are `EC` (Elliptic Curve), `Oct` (Octet), `RSA` and `RSA-HSM`. Changing this forces a new resource to be created. KeyType interface{} // The RSA modulus of this Key Vault Key. N interface{} // Specifies the name of the Key Vault Key. Changing this forces a new resource to be created. Name interface{} // A mapping of tags to assign to the resource. Tags interface{} // Specifies the URI used to access the Key Vault instance, available on the `azurerm_key_vault` resource. VaultUri interface{} // The current version of the Key Vault Key. Version interface{} }
Input properties used for looking up and filtering Key resources.
type KeyVault ¶
type KeyVault struct {
// contains filtered or unexported fields
}
Manages a Key Vault.
~> **NOTE:** It's possible to define Key Vault Access Policies both within the `azurerm_key_vault` resource via the `access_policy` block and by using the `azurerm_key_vault_access_policy` resource. However it's not possible to use both methods to manage Access Policies within a KeyVault, since there'll be conflicts.
func GetKeyVault ¶
func GetKeyVault(ctx *pulumi.Context, name string, id pulumi.ID, state *KeyVaultState, opts ...pulumi.ResourceOpt) (*KeyVault, error)
GetKeyVault gets an existing KeyVault resource's state with the given name, ID, and optional state properties that are used to uniquely qualify the lookup (nil if not required).
func NewKeyVault ¶
func NewKeyVault(ctx *pulumi.Context, name string, args *KeyVaultArgs, opts ...pulumi.ResourceOpt) (*KeyVault, error)
NewKeyVault registers a new resource with the given unique name, arguments, and options.
func (*KeyVault) AccessPolicies ¶
func (r *KeyVault) AccessPolicies() *pulumi.ArrayOutput
An access policy block as described below. A maximum of 16 may be declared.
func (*KeyVault) EnabledForDeployment ¶
func (r *KeyVault) EnabledForDeployment() *pulumi.BoolOutput
Boolean flag to specify whether Azure Virtual Machines are permitted to retrieve certificates stored as secrets from the key vault. Defaults to `false`.
func (*KeyVault) EnabledForDiskEncryption ¶
func (r *KeyVault) EnabledForDiskEncryption() *pulumi.BoolOutput
Boolean flag to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys. Defaults to `false`.
func (*KeyVault) EnabledForTemplateDeployment ¶
func (r *KeyVault) EnabledForTemplateDeployment() *pulumi.BoolOutput
Boolean flag to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault. Defaults to `false`.
func (*KeyVault) Location ¶
func (r *KeyVault) Location() *pulumi.StringOutput
Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
func (*KeyVault) Name ¶
func (r *KeyVault) Name() *pulumi.StringOutput
Specifies the name of the Key Vault. Changing this forces a new resource to be created.
func (*KeyVault) NetworkAcls ¶ added in v0.16.2
A `network_acls` block as defined below.
func (*KeyVault) ResourceGroupName ¶
func (r *KeyVault) ResourceGroupName() *pulumi.StringOutput
The name of the resource group in which to create the Key Vault. Changing this forces a new resource to be created.
func (*KeyVault) TenantId ¶
func (r *KeyVault) TenantId() *pulumi.StringOutput
The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
func (*KeyVault) VaultUri ¶
func (r *KeyVault) VaultUri() *pulumi.StringOutput
The URI of the Key Vault, used for performing operations on keys and secrets.
type KeyVaultArgs ¶
type KeyVaultArgs struct { // An access policy block as described below. A maximum of 16 may be declared. AccessPolicies interface{} // Boolean flag to specify whether Azure Virtual Machines are permitted to retrieve certificates stored as secrets from the key vault. Defaults to `false`. EnabledForDeployment interface{} // Boolean flag to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys. Defaults to `false`. EnabledForDiskEncryption interface{} // Boolean flag to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault. Defaults to `false`. EnabledForTemplateDeployment interface{} // Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created. Location interface{} // Specifies the name of the Key Vault. Changing this forces a new resource to be created. Name interface{} // A `network_acls` block as defined below. NetworkAcls interface{} // The name of the resource group in which to create the Key Vault. Changing this forces a new resource to be created. ResourceGroupName interface{} // An SKU block as described below. Sku interface{} // A mapping of tags to assign to the resource. Tags interface{} // The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault. TenantId interface{} }
The set of arguments for constructing a KeyVault resource.
type KeyVaultState ¶
type KeyVaultState struct { // An access policy block as described below. A maximum of 16 may be declared. AccessPolicies interface{} // Boolean flag to specify whether Azure Virtual Machines are permitted to retrieve certificates stored as secrets from the key vault. Defaults to `false`. EnabledForDeployment interface{} // Boolean flag to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys. Defaults to `false`. EnabledForDiskEncryption interface{} // Boolean flag to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault. Defaults to `false`. EnabledForTemplateDeployment interface{} // Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created. Location interface{} // Specifies the name of the Key Vault. Changing this forces a new resource to be created. Name interface{} // A `network_acls` block as defined below. NetworkAcls interface{} // The name of the resource group in which to create the Key Vault. Changing this forces a new resource to be created. ResourceGroupName interface{} // An SKU block as described below. Sku interface{} // A mapping of tags to assign to the resource. Tags interface{} // The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault. TenantId interface{} // The URI of the Key Vault, used for performing operations on keys and secrets. VaultUri interface{} }
Input properties used for looking up and filtering KeyVault resources.
type Secret ¶
type Secret struct {
// contains filtered or unexported fields
}
Manages a Key Vault Secret.
~> **Note:** All arguments including the secret value will be stored in the raw state as plain-text. [Read more about sensitive data in state](https://www.terraform.io/docs/state/sensitive-data.html).
func GetSecret ¶
func GetSecret(ctx *pulumi.Context, name string, id pulumi.ID, state *SecretState, opts ...pulumi.ResourceOpt) (*Secret, error)
GetSecret gets an existing Secret resource's state with the given name, ID, and optional state properties that are used to uniquely qualify the lookup (nil if not required).
func NewSecret ¶
func NewSecret(ctx *pulumi.Context, name string, args *SecretArgs, opts ...pulumi.ResourceOpt) (*Secret, error)
NewSecret registers a new resource with the given unique name, arguments, and options.
func (*Secret) ContentType ¶
func (r *Secret) ContentType() *pulumi.StringOutput
Specifies the content type for the Key Vault Secret.
func (*Secret) Name ¶
func (r *Secret) Name() *pulumi.StringOutput
Specifies the name of the Key Vault Secret. Changing this forces a new resource to be created.
func (*Secret) Value ¶
func (r *Secret) Value() *pulumi.StringOutput
Specifies the value of the Key Vault Secret.
func (*Secret) VaultUri ¶
func (r *Secret) VaultUri() *pulumi.StringOutput
Specifies the URI used to access the Key Vault instance, available on the `azurerm_key_vault` resource.
func (*Secret) Version ¶
func (r *Secret) Version() *pulumi.StringOutput
The current version of the Key Vault Secret.
type SecretArgs ¶
type SecretArgs struct { // Specifies the content type for the Key Vault Secret. ContentType interface{} // Specifies the name of the Key Vault Secret. Changing this forces a new resource to be created. Name interface{} // A mapping of tags to assign to the resource. Tags interface{} // Specifies the value of the Key Vault Secret. Value interface{} // Specifies the URI used to access the Key Vault instance, available on the `azurerm_key_vault` resource. VaultUri interface{} }
The set of arguments for constructing a Secret resource.
type SecretState ¶
type SecretState struct { // Specifies the content type for the Key Vault Secret. ContentType interface{} // Specifies the name of the Key Vault Secret. Changing this forces a new resource to be created. Name interface{} // A mapping of tags to assign to the resource. Tags interface{} // Specifies the value of the Key Vault Secret. Value interface{} // Specifies the URI used to access the Key Vault instance, available on the `azurerm_key_vault` resource. VaultUri interface{} // The current version of the Key Vault Secret. Version interface{} }
Input properties used for looking up and filtering Secret resources.