Documentation
¶
Index ¶
- type GetDecryptArgs
- type GetDecryptResult
- type GetEncryptArgs
- type GetEncryptResult
- type SecretBackendKey
- func (*SecretBackendKey) ElementType() reflect.Type
- func (i *SecretBackendKey) ToSecretBackendKeyOutput() SecretBackendKeyOutput
- func (i *SecretBackendKey) ToSecretBackendKeyOutputWithContext(ctx context.Context) SecretBackendKeyOutput
- func (i *SecretBackendKey) ToSecretBackendKeyPtrOutput() SecretBackendKeyPtrOutput
- func (i *SecretBackendKey) ToSecretBackendKeyPtrOutputWithContext(ctx context.Context) SecretBackendKeyPtrOutput
- type SecretBackendKeyArgs
- type SecretBackendKeyArray
- type SecretBackendKeyArrayInput
- type SecretBackendKeyArrayOutput
- func (SecretBackendKeyArrayOutput) ElementType() reflect.Type
- func (o SecretBackendKeyArrayOutput) Index(i pulumi.IntInput) SecretBackendKeyOutput
- func (o SecretBackendKeyArrayOutput) ToSecretBackendKeyArrayOutput() SecretBackendKeyArrayOutput
- func (o SecretBackendKeyArrayOutput) ToSecretBackendKeyArrayOutputWithContext(ctx context.Context) SecretBackendKeyArrayOutput
- type SecretBackendKeyInput
- type SecretBackendKeyMap
- type SecretBackendKeyMapInput
- type SecretBackendKeyMapOutput
- func (SecretBackendKeyMapOutput) ElementType() reflect.Type
- func (o SecretBackendKeyMapOutput) MapIndex(k pulumi.StringInput) SecretBackendKeyOutput
- func (o SecretBackendKeyMapOutput) ToSecretBackendKeyMapOutput() SecretBackendKeyMapOutput
- func (o SecretBackendKeyMapOutput) ToSecretBackendKeyMapOutputWithContext(ctx context.Context) SecretBackendKeyMapOutput
- type SecretBackendKeyOutput
- func (SecretBackendKeyOutput) ElementType() reflect.Type
- func (o SecretBackendKeyOutput) ToSecretBackendKeyOutput() SecretBackendKeyOutput
- func (o SecretBackendKeyOutput) ToSecretBackendKeyOutputWithContext(ctx context.Context) SecretBackendKeyOutput
- func (o SecretBackendKeyOutput) ToSecretBackendKeyPtrOutput() SecretBackendKeyPtrOutput
- func (o SecretBackendKeyOutput) ToSecretBackendKeyPtrOutputWithContext(ctx context.Context) SecretBackendKeyPtrOutput
- type SecretBackendKeyPtrInput
- type SecretBackendKeyPtrOutput
- type SecretBackendKeyState
- type SecretCacheConfig
- func (*SecretCacheConfig) ElementType() reflect.Type
- func (i *SecretCacheConfig) ToSecretCacheConfigOutput() SecretCacheConfigOutput
- func (i *SecretCacheConfig) ToSecretCacheConfigOutputWithContext(ctx context.Context) SecretCacheConfigOutput
- func (i *SecretCacheConfig) ToSecretCacheConfigPtrOutput() SecretCacheConfigPtrOutput
- func (i *SecretCacheConfig) ToSecretCacheConfigPtrOutputWithContext(ctx context.Context) SecretCacheConfigPtrOutput
- type SecretCacheConfigArgs
- type SecretCacheConfigArray
- type SecretCacheConfigArrayInput
- type SecretCacheConfigArrayOutput
- func (SecretCacheConfigArrayOutput) ElementType() reflect.Type
- func (o SecretCacheConfigArrayOutput) Index(i pulumi.IntInput) SecretCacheConfigOutput
- func (o SecretCacheConfigArrayOutput) ToSecretCacheConfigArrayOutput() SecretCacheConfigArrayOutput
- func (o SecretCacheConfigArrayOutput) ToSecretCacheConfigArrayOutputWithContext(ctx context.Context) SecretCacheConfigArrayOutput
- type SecretCacheConfigInput
- type SecretCacheConfigMap
- type SecretCacheConfigMapInput
- type SecretCacheConfigMapOutput
- func (SecretCacheConfigMapOutput) ElementType() reflect.Type
- func (o SecretCacheConfigMapOutput) MapIndex(k pulumi.StringInput) SecretCacheConfigOutput
- func (o SecretCacheConfigMapOutput) ToSecretCacheConfigMapOutput() SecretCacheConfigMapOutput
- func (o SecretCacheConfigMapOutput) ToSecretCacheConfigMapOutputWithContext(ctx context.Context) SecretCacheConfigMapOutput
- type SecretCacheConfigOutput
- func (SecretCacheConfigOutput) ElementType() reflect.Type
- func (o SecretCacheConfigOutput) ToSecretCacheConfigOutput() SecretCacheConfigOutput
- func (o SecretCacheConfigOutput) ToSecretCacheConfigOutputWithContext(ctx context.Context) SecretCacheConfigOutput
- func (o SecretCacheConfigOutput) ToSecretCacheConfigPtrOutput() SecretCacheConfigPtrOutput
- func (o SecretCacheConfigOutput) ToSecretCacheConfigPtrOutputWithContext(ctx context.Context) SecretCacheConfigPtrOutput
- type SecretCacheConfigPtrInput
- type SecretCacheConfigPtrOutput
- type SecretCacheConfigState
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
This section is empty.
Types ¶
type GetDecryptArgs ¶
type GetDecryptArgs struct { // The path the transit secret backend is mounted at, with no leading or trailing `/`. Backend string `pulumi:"backend"` // Ciphertext to be decoded. Ciphertext string `pulumi:"ciphertext"` // Context for key derivation. This is required if key derivation is enabled for this key. Context *string `pulumi:"context"` // Specifies the name of the transit key to decrypt against. Key string `pulumi:"key"` }
A collection of arguments for invoking getDecrypt.
type GetDecryptResult ¶
type GetDecryptResult struct { Backend string `pulumi:"backend"` Ciphertext string `pulumi:"ciphertext"` Context *string `pulumi:"context"` // The provider-assigned unique ID for this managed resource. Id string `pulumi:"id"` Key string `pulumi:"key"` // Decrypted plaintext returned from Vault Plaintext string `pulumi:"plaintext"` }
A collection of values returned by getDecrypt.
func GetDecrypt ¶
func GetDecrypt(ctx *pulumi.Context, args *GetDecryptArgs, opts ...pulumi.InvokeOption) (*GetDecryptResult, error)
This is a data source which can be used to decrypt ciphertext using a Vault Transit key.
## Example Usage
```go package main
import (
"github.com/pulumi/pulumi-vault/sdk/v3/go/vault/transit" "github.com/pulumi/pulumi/sdk/v2/go/pulumi"
)
func main() { pulumi.Run(func(ctx *pulumi.Context) error { _, err := transit.GetDecrypt(ctx, &transit.GetDecryptArgs{ Backend: "transit", Ciphertext: "vault:v1:S3GtnJ5GUNCWV+/pdL9+g1Feu/nzAv+RlmTmE91Tu0rBkeIU8MEb2nSspC/1IQ==", Key: "test", }, nil) if err != nil { return err } return nil }) }
```
type GetEncryptArgs ¶
type GetEncryptArgs struct { // The path the transit secret backend is mounted at, with no leading or trailing `/`. Backend string `pulumi:"backend"` // Context for key derivation. This is required if key derivation is enabled for this key. Context *string `pulumi:"context"` // Specifies the name of the transit key to encrypt against. Key string `pulumi:"key"` // The version of the key to use for encryption. If not set, uses the latest version. Must be greater than or equal to the key's `minEncryptionVersion`, if set. KeyVersion *int `pulumi:"keyVersion"` // Plaintext to be encoded. Plaintext string `pulumi:"plaintext"` }
A collection of arguments for invoking getEncrypt.
type GetEncryptResult ¶
type GetEncryptResult struct { Backend string `pulumi:"backend"` // Encrypted ciphertext returned from Vault Ciphertext string `pulumi:"ciphertext"` Context *string `pulumi:"context"` // The provider-assigned unique ID for this managed resource. Id string `pulumi:"id"` Key string `pulumi:"key"` KeyVersion *int `pulumi:"keyVersion"` Plaintext string `pulumi:"plaintext"` }
A collection of values returned by getEncrypt.
func GetEncrypt ¶
func GetEncrypt(ctx *pulumi.Context, args *GetEncryptArgs, opts ...pulumi.InvokeOption) (*GetEncryptResult, error)
This is a data source which can be used to encrypt plaintext using a Vault Transit key.
## Example Usage
```go package main
import (
"github.com/pulumi/pulumi-vault/sdk/v3/go/vault" "github.com/pulumi/pulumi-vault/sdk/v3/go/vault/transit" "github.com/pulumi/pulumi/sdk/v2/go/pulumi"
)
func main() { pulumi.Run(func(ctx *pulumi.Context) error { testMount, err := vault.NewMount(ctx, "testMount", &vault.MountArgs{ Description: pulumi.String("This is an example mount"), Path: pulumi.String("transit"), Type: pulumi.String("transit"), }) if err != nil { return err } testSecretBackendKey, err := transit.NewSecretBackendKey(ctx, "testSecretBackendKey", &transit.SecretBackendKeyArgs{ Backend: testMount.Path, }) if err != nil { return err } return nil }) }
```
type SecretBackendKey ¶
type SecretBackendKey struct { pulumi.CustomResourceState // Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled. // * Refer to Vault API documentation on key backups for more information: [Backup Key](https://www.vaultproject.io/api-docs/secret/transit#backup-key) AllowPlaintextBackup pulumi.BoolPtrOutput `pulumi:"allowPlaintextBackup"` // The path the transit secret backend is mounted at, with no leading or trailing `/`s. Backend pulumi.StringOutput `pulumi:"backend"` // Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires `derived` to be set to `true`. ConvergentEncryption pulumi.BoolPtrOutput `pulumi:"convergentEncryption"` // Specifies if the key is allowed to be deleted. DeletionAllowed pulumi.BoolPtrOutput `pulumi:"deletionAllowed"` // Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation. Derived pulumi.BoolPtrOutput `pulumi:"derived"` // Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled. Exportable pulumi.BoolPtrOutput `pulumi:"exportable"` // List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the `type` of the encryption key. // * for key types `aes128-gcm96`, `aes256-gcm96` and `chacha20-poly1305`, each key version will be a map of a single value `id` which is just a hash of the key's metadata. // * for key types `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `rsa-2048`, `rsa-3072` and `rsa-4096`, each key version will be a map of the following: Keys pulumi.MapArrayOutput `pulumi:"keys"` // Latest key version available. This value is 1-indexed, so if `latestVersion` is `1`, then the key's information can be referenced from `keys` by selecting element `0` LatestVersion pulumi.IntOutput `pulumi:"latestVersion"` // Minimum key version available for use. If keys have been archived by increasing `minDecryptionVersion`, this attribute will reflect that change. MinAvailableVersion pulumi.IntOutput `pulumi:"minAvailableVersion"` // Minimum key version to use for decryption. MinDecryptionVersion pulumi.IntPtrOutput `pulumi:"minDecryptionVersion"` // Minimum key version to use for encryption MinEncryptionVersion pulumi.IntPtrOutput `pulumi:"minEncryptionVersion"` // The name to identify this key within the backend. Must be unique within the backend. Name pulumi.StringOutput `pulumi:"name"` // Whether or not the key supports decryption, based on key type. SupportsDecryption pulumi.BoolOutput `pulumi:"supportsDecryption"` // Whether or not the key supports derivation, based on key type. SupportsDerivation pulumi.BoolOutput `pulumi:"supportsDerivation"` // Whether or not the key supports encryption, based on key type. SupportsEncryption pulumi.BoolOutput `pulumi:"supportsEncryption"` // Whether or not the key supports signing, based on key type. SupportsSigning pulumi.BoolOutput `pulumi:"supportsSigning"` // Specifies the type of key to create. The currently-supported types are: `aes128-gcm96`, `aes256-gcm96` (default), `chacha20-poly1305`, `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `rsa-2048`, `rsa-3072` and `rsa-4096`. // * Refer to the Vault documentation on transit key types for more information: [Key Types](https://www.vaultproject.io/docs/secrets/transit#key-types) Type pulumi.StringPtrOutput `pulumi:"type"` }
Creates an Encryption Keyring on a Transit Secret Backend for Vault.
## Example Usage
```go package main
import (
"github.com/pulumi/pulumi-vault/sdk/v3/go/vault" "github.com/pulumi/pulumi-vault/sdk/v3/go/vault/transit" "github.com/pulumi/pulumi/sdk/v2/go/pulumi"
)
func main() { pulumi.Run(func(ctx *pulumi.Context) error { transit, err := vault.NewMount(ctx, "transit", &vault.MountArgs{ DefaultLeaseTtlSeconds: pulumi.Int(3600), Description: pulumi.String("Example description"), MaxLeaseTtlSeconds: pulumi.Int(86400), Path: pulumi.String("transit"), Type: pulumi.String("transit"), }) if err != nil { return err } _, err = transit.NewSecretBackendKey(ctx, "key", &transit.SecretBackendKeyArgs{ Backend: transit.Path, }) if err != nil { return err } return nil }) }
```
## Import
Transit secret backend keys can be imported using the `path`, e.g.
```sh
$ pulumi import vault:transit/secretBackendKey:SecretBackendKey key transit/keys/my_key
```
func GetSecretBackendKey ¶
func GetSecretBackendKey(ctx *pulumi.Context, name string, id pulumi.IDInput, state *SecretBackendKeyState, opts ...pulumi.ResourceOption) (*SecretBackendKey, error)
GetSecretBackendKey gets an existing SecretBackendKey resource's state with the given name, ID, and optional state properties that are used to uniquely qualify the lookup (nil if not required).
func NewSecretBackendKey ¶
func NewSecretBackendKey(ctx *pulumi.Context, name string, args *SecretBackendKeyArgs, opts ...pulumi.ResourceOption) (*SecretBackendKey, error)
NewSecretBackendKey registers a new resource with the given unique name, arguments, and options.
func (*SecretBackendKey) ElementType ¶ added in v3.0.2
func (*SecretBackendKey) ElementType() reflect.Type
func (*SecretBackendKey) ToSecretBackendKeyOutput ¶ added in v3.0.2
func (i *SecretBackendKey) ToSecretBackendKeyOutput() SecretBackendKeyOutput
func (*SecretBackendKey) ToSecretBackendKeyOutputWithContext ¶ added in v3.0.2
func (i *SecretBackendKey) ToSecretBackendKeyOutputWithContext(ctx context.Context) SecretBackendKeyOutput
func (*SecretBackendKey) ToSecretBackendKeyPtrOutput ¶ added in v3.4.1
func (i *SecretBackendKey) ToSecretBackendKeyPtrOutput() SecretBackendKeyPtrOutput
func (*SecretBackendKey) ToSecretBackendKeyPtrOutputWithContext ¶ added in v3.4.1
func (i *SecretBackendKey) ToSecretBackendKeyPtrOutputWithContext(ctx context.Context) SecretBackendKeyPtrOutput
type SecretBackendKeyArgs ¶
type SecretBackendKeyArgs struct { // Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled. // * Refer to Vault API documentation on key backups for more information: [Backup Key](https://www.vaultproject.io/api-docs/secret/transit#backup-key) AllowPlaintextBackup pulumi.BoolPtrInput // The path the transit secret backend is mounted at, with no leading or trailing `/`s. Backend pulumi.StringInput // Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires `derived` to be set to `true`. ConvergentEncryption pulumi.BoolPtrInput // Specifies if the key is allowed to be deleted. DeletionAllowed pulumi.BoolPtrInput // Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation. Derived pulumi.BoolPtrInput // Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled. Exportable pulumi.BoolPtrInput // Minimum key version to use for decryption. MinDecryptionVersion pulumi.IntPtrInput // Minimum key version to use for encryption MinEncryptionVersion pulumi.IntPtrInput // The name to identify this key within the backend. Must be unique within the backend. Name pulumi.StringPtrInput // Specifies the type of key to create. The currently-supported types are: `aes128-gcm96`, `aes256-gcm96` (default), `chacha20-poly1305`, `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `rsa-2048`, `rsa-3072` and `rsa-4096`. // * Refer to the Vault documentation on transit key types for more information: [Key Types](https://www.vaultproject.io/docs/secrets/transit#key-types) Type pulumi.StringPtrInput }
The set of arguments for constructing a SecretBackendKey resource.
func (SecretBackendKeyArgs) ElementType ¶
func (SecretBackendKeyArgs) ElementType() reflect.Type
type SecretBackendKeyArray ¶ added in v3.4.1
type SecretBackendKeyArray []SecretBackendKeyInput
func (SecretBackendKeyArray) ElementType ¶ added in v3.4.1
func (SecretBackendKeyArray) ElementType() reflect.Type
func (SecretBackendKeyArray) ToSecretBackendKeyArrayOutput ¶ added in v3.4.1
func (i SecretBackendKeyArray) ToSecretBackendKeyArrayOutput() SecretBackendKeyArrayOutput
func (SecretBackendKeyArray) ToSecretBackendKeyArrayOutputWithContext ¶ added in v3.4.1
func (i SecretBackendKeyArray) ToSecretBackendKeyArrayOutputWithContext(ctx context.Context) SecretBackendKeyArrayOutput
type SecretBackendKeyArrayInput ¶ added in v3.4.1
type SecretBackendKeyArrayInput interface { pulumi.Input ToSecretBackendKeyArrayOutput() SecretBackendKeyArrayOutput ToSecretBackendKeyArrayOutputWithContext(context.Context) SecretBackendKeyArrayOutput }
SecretBackendKeyArrayInput is an input type that accepts SecretBackendKeyArray and SecretBackendKeyArrayOutput values. You can construct a concrete instance of `SecretBackendKeyArrayInput` via:
SecretBackendKeyArray{ SecretBackendKeyArgs{...} }
type SecretBackendKeyArrayOutput ¶ added in v3.4.1
type SecretBackendKeyArrayOutput struct{ *pulumi.OutputState }
func (SecretBackendKeyArrayOutput) ElementType ¶ added in v3.4.1
func (SecretBackendKeyArrayOutput) ElementType() reflect.Type
func (SecretBackendKeyArrayOutput) Index ¶ added in v3.4.1
func (o SecretBackendKeyArrayOutput) Index(i pulumi.IntInput) SecretBackendKeyOutput
func (SecretBackendKeyArrayOutput) ToSecretBackendKeyArrayOutput ¶ added in v3.4.1
func (o SecretBackendKeyArrayOutput) ToSecretBackendKeyArrayOutput() SecretBackendKeyArrayOutput
func (SecretBackendKeyArrayOutput) ToSecretBackendKeyArrayOutputWithContext ¶ added in v3.4.1
func (o SecretBackendKeyArrayOutput) ToSecretBackendKeyArrayOutputWithContext(ctx context.Context) SecretBackendKeyArrayOutput
type SecretBackendKeyInput ¶ added in v3.0.2
type SecretBackendKeyInput interface { pulumi.Input ToSecretBackendKeyOutput() SecretBackendKeyOutput ToSecretBackendKeyOutputWithContext(ctx context.Context) SecretBackendKeyOutput }
type SecretBackendKeyMap ¶ added in v3.4.1
type SecretBackendKeyMap map[string]SecretBackendKeyInput
func (SecretBackendKeyMap) ElementType ¶ added in v3.4.1
func (SecretBackendKeyMap) ElementType() reflect.Type
func (SecretBackendKeyMap) ToSecretBackendKeyMapOutput ¶ added in v3.4.1
func (i SecretBackendKeyMap) ToSecretBackendKeyMapOutput() SecretBackendKeyMapOutput
func (SecretBackendKeyMap) ToSecretBackendKeyMapOutputWithContext ¶ added in v3.4.1
func (i SecretBackendKeyMap) ToSecretBackendKeyMapOutputWithContext(ctx context.Context) SecretBackendKeyMapOutput
type SecretBackendKeyMapInput ¶ added in v3.4.1
type SecretBackendKeyMapInput interface { pulumi.Input ToSecretBackendKeyMapOutput() SecretBackendKeyMapOutput ToSecretBackendKeyMapOutputWithContext(context.Context) SecretBackendKeyMapOutput }
SecretBackendKeyMapInput is an input type that accepts SecretBackendKeyMap and SecretBackendKeyMapOutput values. You can construct a concrete instance of `SecretBackendKeyMapInput` via:
SecretBackendKeyMap{ "key": SecretBackendKeyArgs{...} }
type SecretBackendKeyMapOutput ¶ added in v3.4.1
type SecretBackendKeyMapOutput struct{ *pulumi.OutputState }
func (SecretBackendKeyMapOutput) ElementType ¶ added in v3.4.1
func (SecretBackendKeyMapOutput) ElementType() reflect.Type
func (SecretBackendKeyMapOutput) MapIndex ¶ added in v3.4.1
func (o SecretBackendKeyMapOutput) MapIndex(k pulumi.StringInput) SecretBackendKeyOutput
func (SecretBackendKeyMapOutput) ToSecretBackendKeyMapOutput ¶ added in v3.4.1
func (o SecretBackendKeyMapOutput) ToSecretBackendKeyMapOutput() SecretBackendKeyMapOutput
func (SecretBackendKeyMapOutput) ToSecretBackendKeyMapOutputWithContext ¶ added in v3.4.1
func (o SecretBackendKeyMapOutput) ToSecretBackendKeyMapOutputWithContext(ctx context.Context) SecretBackendKeyMapOutput
type SecretBackendKeyOutput ¶ added in v3.0.2
type SecretBackendKeyOutput struct {
*pulumi.OutputState
}
func (SecretBackendKeyOutput) ElementType ¶ added in v3.0.2
func (SecretBackendKeyOutput) ElementType() reflect.Type
func (SecretBackendKeyOutput) ToSecretBackendKeyOutput ¶ added in v3.0.2
func (o SecretBackendKeyOutput) ToSecretBackendKeyOutput() SecretBackendKeyOutput
func (SecretBackendKeyOutput) ToSecretBackendKeyOutputWithContext ¶ added in v3.0.2
func (o SecretBackendKeyOutput) ToSecretBackendKeyOutputWithContext(ctx context.Context) SecretBackendKeyOutput
func (SecretBackendKeyOutput) ToSecretBackendKeyPtrOutput ¶ added in v3.4.1
func (o SecretBackendKeyOutput) ToSecretBackendKeyPtrOutput() SecretBackendKeyPtrOutput
func (SecretBackendKeyOutput) ToSecretBackendKeyPtrOutputWithContext ¶ added in v3.4.1
func (o SecretBackendKeyOutput) ToSecretBackendKeyPtrOutputWithContext(ctx context.Context) SecretBackendKeyPtrOutput
type SecretBackendKeyPtrInput ¶ added in v3.4.1
type SecretBackendKeyPtrInput interface { pulumi.Input ToSecretBackendKeyPtrOutput() SecretBackendKeyPtrOutput ToSecretBackendKeyPtrOutputWithContext(ctx context.Context) SecretBackendKeyPtrOutput }
type SecretBackendKeyPtrOutput ¶ added in v3.4.1
type SecretBackendKeyPtrOutput struct {
*pulumi.OutputState
}
func (SecretBackendKeyPtrOutput) ElementType ¶ added in v3.4.1
func (SecretBackendKeyPtrOutput) ElementType() reflect.Type
func (SecretBackendKeyPtrOutput) ToSecretBackendKeyPtrOutput ¶ added in v3.4.1
func (o SecretBackendKeyPtrOutput) ToSecretBackendKeyPtrOutput() SecretBackendKeyPtrOutput
func (SecretBackendKeyPtrOutput) ToSecretBackendKeyPtrOutputWithContext ¶ added in v3.4.1
func (o SecretBackendKeyPtrOutput) ToSecretBackendKeyPtrOutputWithContext(ctx context.Context) SecretBackendKeyPtrOutput
type SecretBackendKeyState ¶
type SecretBackendKeyState struct { // Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled. // * Refer to Vault API documentation on key backups for more information: [Backup Key](https://www.vaultproject.io/api-docs/secret/transit#backup-key) AllowPlaintextBackup pulumi.BoolPtrInput // The path the transit secret backend is mounted at, with no leading or trailing `/`s. Backend pulumi.StringPtrInput // Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires `derived` to be set to `true`. ConvergentEncryption pulumi.BoolPtrInput // Specifies if the key is allowed to be deleted. DeletionAllowed pulumi.BoolPtrInput // Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation. Derived pulumi.BoolPtrInput // Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled. Exportable pulumi.BoolPtrInput // List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the `type` of the encryption key. // * for key types `aes128-gcm96`, `aes256-gcm96` and `chacha20-poly1305`, each key version will be a map of a single value `id` which is just a hash of the key's metadata. // * for key types `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `rsa-2048`, `rsa-3072` and `rsa-4096`, each key version will be a map of the following: Keys pulumi.MapArrayInput // Latest key version available. This value is 1-indexed, so if `latestVersion` is `1`, then the key's information can be referenced from `keys` by selecting element `0` LatestVersion pulumi.IntPtrInput // Minimum key version available for use. If keys have been archived by increasing `minDecryptionVersion`, this attribute will reflect that change. MinAvailableVersion pulumi.IntPtrInput // Minimum key version to use for decryption. MinDecryptionVersion pulumi.IntPtrInput // Minimum key version to use for encryption MinEncryptionVersion pulumi.IntPtrInput // The name to identify this key within the backend. Must be unique within the backend. Name pulumi.StringPtrInput // Whether or not the key supports decryption, based on key type. SupportsDecryption pulumi.BoolPtrInput // Whether or not the key supports derivation, based on key type. SupportsDerivation pulumi.BoolPtrInput // Whether or not the key supports encryption, based on key type. SupportsEncryption pulumi.BoolPtrInput // Whether or not the key supports signing, based on key type. SupportsSigning pulumi.BoolPtrInput // Specifies the type of key to create. The currently-supported types are: `aes128-gcm96`, `aes256-gcm96` (default), `chacha20-poly1305`, `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `rsa-2048`, `rsa-3072` and `rsa-4096`. // * Refer to the Vault documentation on transit key types for more information: [Key Types](https://www.vaultproject.io/docs/secrets/transit#key-types) Type pulumi.StringPtrInput }
func (SecretBackendKeyState) ElementType ¶
func (SecretBackendKeyState) ElementType() reflect.Type
type SecretCacheConfig ¶
type SecretCacheConfig struct { pulumi.CustomResourceState // The path the transit secret backend is mounted at, with no leading or trailing `/`s. Backend pulumi.StringOutput `pulumi:"backend"` // The number of cache entries. 0 means unlimited. Size pulumi.IntOutput `pulumi:"size"` }
Configure the cache for the Transit Secret Backend in Vault.
## Example Usage
```go package main
import (
"github.com/pulumi/pulumi-vault/sdk/v3/go/vault" "github.com/pulumi/pulumi-vault/sdk/v3/go/vault/transit" "github.com/pulumi/pulumi/sdk/v2/go/pulumi"
)
func main() { pulumi.Run(func(ctx *pulumi.Context) error { transit, err := vault.NewMount(ctx, "transit", &vault.MountArgs{ DefaultLeaseTtlSeconds: pulumi.Int(3600), Description: pulumi.String("Example description"), MaxLeaseTtlSeconds: pulumi.Int(86400), Path: pulumi.String("transit"), Type: pulumi.String("transit"), }) if err != nil { return err } _, err = transit.NewSecretCacheConfig(ctx, "cfg", &transit.SecretCacheConfigArgs{ Backend: transit.Path, Size: pulumi.Int(500), }) if err != nil { return err } return nil }) }
```
func GetSecretCacheConfig ¶
func GetSecretCacheConfig(ctx *pulumi.Context, name string, id pulumi.IDInput, state *SecretCacheConfigState, opts ...pulumi.ResourceOption) (*SecretCacheConfig, error)
GetSecretCacheConfig gets an existing SecretCacheConfig resource's state with the given name, ID, and optional state properties that are used to uniquely qualify the lookup (nil if not required).
func NewSecretCacheConfig ¶
func NewSecretCacheConfig(ctx *pulumi.Context, name string, args *SecretCacheConfigArgs, opts ...pulumi.ResourceOption) (*SecretCacheConfig, error)
NewSecretCacheConfig registers a new resource with the given unique name, arguments, and options.
func (*SecretCacheConfig) ElementType ¶ added in v3.0.2
func (*SecretCacheConfig) ElementType() reflect.Type
func (*SecretCacheConfig) ToSecretCacheConfigOutput ¶ added in v3.0.2
func (i *SecretCacheConfig) ToSecretCacheConfigOutput() SecretCacheConfigOutput
func (*SecretCacheConfig) ToSecretCacheConfigOutputWithContext ¶ added in v3.0.2
func (i *SecretCacheConfig) ToSecretCacheConfigOutputWithContext(ctx context.Context) SecretCacheConfigOutput
func (*SecretCacheConfig) ToSecretCacheConfigPtrOutput ¶ added in v3.4.1
func (i *SecretCacheConfig) ToSecretCacheConfigPtrOutput() SecretCacheConfigPtrOutput
func (*SecretCacheConfig) ToSecretCacheConfigPtrOutputWithContext ¶ added in v3.4.1
func (i *SecretCacheConfig) ToSecretCacheConfigPtrOutputWithContext(ctx context.Context) SecretCacheConfigPtrOutput
type SecretCacheConfigArgs ¶
type SecretCacheConfigArgs struct { // The path the transit secret backend is mounted at, with no leading or trailing `/`s. Backend pulumi.StringInput // The number of cache entries. 0 means unlimited. Size pulumi.IntInput }
The set of arguments for constructing a SecretCacheConfig resource.
func (SecretCacheConfigArgs) ElementType ¶
func (SecretCacheConfigArgs) ElementType() reflect.Type
type SecretCacheConfigArray ¶ added in v3.4.1
type SecretCacheConfigArray []SecretCacheConfigInput
func (SecretCacheConfigArray) ElementType ¶ added in v3.4.1
func (SecretCacheConfigArray) ElementType() reflect.Type
func (SecretCacheConfigArray) ToSecretCacheConfigArrayOutput ¶ added in v3.4.1
func (i SecretCacheConfigArray) ToSecretCacheConfigArrayOutput() SecretCacheConfigArrayOutput
func (SecretCacheConfigArray) ToSecretCacheConfigArrayOutputWithContext ¶ added in v3.4.1
func (i SecretCacheConfigArray) ToSecretCacheConfigArrayOutputWithContext(ctx context.Context) SecretCacheConfigArrayOutput
type SecretCacheConfigArrayInput ¶ added in v3.4.1
type SecretCacheConfigArrayInput interface { pulumi.Input ToSecretCacheConfigArrayOutput() SecretCacheConfigArrayOutput ToSecretCacheConfigArrayOutputWithContext(context.Context) SecretCacheConfigArrayOutput }
SecretCacheConfigArrayInput is an input type that accepts SecretCacheConfigArray and SecretCacheConfigArrayOutput values. You can construct a concrete instance of `SecretCacheConfigArrayInput` via:
SecretCacheConfigArray{ SecretCacheConfigArgs{...} }
type SecretCacheConfigArrayOutput ¶ added in v3.4.1
type SecretCacheConfigArrayOutput struct{ *pulumi.OutputState }
func (SecretCacheConfigArrayOutput) ElementType ¶ added in v3.4.1
func (SecretCacheConfigArrayOutput) ElementType() reflect.Type
func (SecretCacheConfigArrayOutput) Index ¶ added in v3.4.1
func (o SecretCacheConfigArrayOutput) Index(i pulumi.IntInput) SecretCacheConfigOutput
func (SecretCacheConfigArrayOutput) ToSecretCacheConfigArrayOutput ¶ added in v3.4.1
func (o SecretCacheConfigArrayOutput) ToSecretCacheConfigArrayOutput() SecretCacheConfigArrayOutput
func (SecretCacheConfigArrayOutput) ToSecretCacheConfigArrayOutputWithContext ¶ added in v3.4.1
func (o SecretCacheConfigArrayOutput) ToSecretCacheConfigArrayOutputWithContext(ctx context.Context) SecretCacheConfigArrayOutput
type SecretCacheConfigInput ¶ added in v3.0.2
type SecretCacheConfigInput interface { pulumi.Input ToSecretCacheConfigOutput() SecretCacheConfigOutput ToSecretCacheConfigOutputWithContext(ctx context.Context) SecretCacheConfigOutput }
type SecretCacheConfigMap ¶ added in v3.4.1
type SecretCacheConfigMap map[string]SecretCacheConfigInput
func (SecretCacheConfigMap) ElementType ¶ added in v3.4.1
func (SecretCacheConfigMap) ElementType() reflect.Type
func (SecretCacheConfigMap) ToSecretCacheConfigMapOutput ¶ added in v3.4.1
func (i SecretCacheConfigMap) ToSecretCacheConfigMapOutput() SecretCacheConfigMapOutput
func (SecretCacheConfigMap) ToSecretCacheConfigMapOutputWithContext ¶ added in v3.4.1
func (i SecretCacheConfigMap) ToSecretCacheConfigMapOutputWithContext(ctx context.Context) SecretCacheConfigMapOutput
type SecretCacheConfigMapInput ¶ added in v3.4.1
type SecretCacheConfigMapInput interface { pulumi.Input ToSecretCacheConfigMapOutput() SecretCacheConfigMapOutput ToSecretCacheConfigMapOutputWithContext(context.Context) SecretCacheConfigMapOutput }
SecretCacheConfigMapInput is an input type that accepts SecretCacheConfigMap and SecretCacheConfigMapOutput values. You can construct a concrete instance of `SecretCacheConfigMapInput` via:
SecretCacheConfigMap{ "key": SecretCacheConfigArgs{...} }
type SecretCacheConfigMapOutput ¶ added in v3.4.1
type SecretCacheConfigMapOutput struct{ *pulumi.OutputState }
func (SecretCacheConfigMapOutput) ElementType ¶ added in v3.4.1
func (SecretCacheConfigMapOutput) ElementType() reflect.Type
func (SecretCacheConfigMapOutput) MapIndex ¶ added in v3.4.1
func (o SecretCacheConfigMapOutput) MapIndex(k pulumi.StringInput) SecretCacheConfigOutput
func (SecretCacheConfigMapOutput) ToSecretCacheConfigMapOutput ¶ added in v3.4.1
func (o SecretCacheConfigMapOutput) ToSecretCacheConfigMapOutput() SecretCacheConfigMapOutput
func (SecretCacheConfigMapOutput) ToSecretCacheConfigMapOutputWithContext ¶ added in v3.4.1
func (o SecretCacheConfigMapOutput) ToSecretCacheConfigMapOutputWithContext(ctx context.Context) SecretCacheConfigMapOutput
type SecretCacheConfigOutput ¶ added in v3.0.2
type SecretCacheConfigOutput struct {
*pulumi.OutputState
}
func (SecretCacheConfigOutput) ElementType ¶ added in v3.0.2
func (SecretCacheConfigOutput) ElementType() reflect.Type
func (SecretCacheConfigOutput) ToSecretCacheConfigOutput ¶ added in v3.0.2
func (o SecretCacheConfigOutput) ToSecretCacheConfigOutput() SecretCacheConfigOutput
func (SecretCacheConfigOutput) ToSecretCacheConfigOutputWithContext ¶ added in v3.0.2
func (o SecretCacheConfigOutput) ToSecretCacheConfigOutputWithContext(ctx context.Context) SecretCacheConfigOutput
func (SecretCacheConfigOutput) ToSecretCacheConfigPtrOutput ¶ added in v3.4.1
func (o SecretCacheConfigOutput) ToSecretCacheConfigPtrOutput() SecretCacheConfigPtrOutput
func (SecretCacheConfigOutput) ToSecretCacheConfigPtrOutputWithContext ¶ added in v3.4.1
func (o SecretCacheConfigOutput) ToSecretCacheConfigPtrOutputWithContext(ctx context.Context) SecretCacheConfigPtrOutput
type SecretCacheConfigPtrInput ¶ added in v3.4.1
type SecretCacheConfigPtrInput interface { pulumi.Input ToSecretCacheConfigPtrOutput() SecretCacheConfigPtrOutput ToSecretCacheConfigPtrOutputWithContext(ctx context.Context) SecretCacheConfigPtrOutput }
type SecretCacheConfigPtrOutput ¶ added in v3.4.1
type SecretCacheConfigPtrOutput struct {
*pulumi.OutputState
}
func (SecretCacheConfigPtrOutput) ElementType ¶ added in v3.4.1
func (SecretCacheConfigPtrOutput) ElementType() reflect.Type
func (SecretCacheConfigPtrOutput) ToSecretCacheConfigPtrOutput ¶ added in v3.4.1
func (o SecretCacheConfigPtrOutput) ToSecretCacheConfigPtrOutput() SecretCacheConfigPtrOutput
func (SecretCacheConfigPtrOutput) ToSecretCacheConfigPtrOutputWithContext ¶ added in v3.4.1
func (o SecretCacheConfigPtrOutput) ToSecretCacheConfigPtrOutputWithContext(ctx context.Context) SecretCacheConfigPtrOutput
type SecretCacheConfigState ¶
type SecretCacheConfigState struct { // The path the transit secret backend is mounted at, with no leading or trailing `/`s. Backend pulumi.StringPtrInput // The number of cache entries. 0 means unlimited. Size pulumi.IntPtrInput }
func (SecretCacheConfigState) ElementType ¶
func (SecretCacheConfigState) ElementType() reflect.Type