Please wait. This can take some minutes ...
Many resources are needed to download a project. Please understand that we have to compensate our server costs. Thank you in advance.
Project price only 1 $
You can buy this project and download/modify it how often you want.
com.pulumi.gcp.secretmanager.kotlin.Secret.kt Maven / Gradle / Ivy
@file:Suppress("NAME_SHADOWING", "DEPRECATION")
package com.pulumi.gcp.secretmanager.kotlin
import com.pulumi.core.Output
import com.pulumi.gcp.secretmanager.kotlin.outputs.SecretReplication
import com.pulumi.gcp.secretmanager.kotlin.outputs.SecretRotation
import com.pulumi.gcp.secretmanager.kotlin.outputs.SecretTopic
import com.pulumi.kotlin.KotlinCustomResource
import com.pulumi.kotlin.PulumiTagMarker
import com.pulumi.kotlin.ResourceMapper
import com.pulumi.kotlin.options.CustomResourceOptions
import com.pulumi.kotlin.options.CustomResourceOptionsBuilder
import com.pulumi.resources.Resource
import kotlin.Boolean
import kotlin.String
import kotlin.Suppress
import kotlin.Unit
import kotlin.collections.List
import kotlin.collections.Map
import com.pulumi.gcp.secretmanager.kotlin.outputs.SecretReplication.Companion.toKotlin as secretReplicationToKotlin
import com.pulumi.gcp.secretmanager.kotlin.outputs.SecretRotation.Companion.toKotlin as secretRotationToKotlin
import com.pulumi.gcp.secretmanager.kotlin.outputs.SecretTopic.Companion.toKotlin as secretTopicToKotlin
/**
* Builder for [Secret].
*/
@PulumiTagMarker
public class SecretResourceBuilder internal constructor() {
public var name: String? = null
public var args: SecretArgs = SecretArgs()
public var opts: CustomResourceOptions = CustomResourceOptions()
/**
* @param name The _unique_ name of the resulting resource.
*/
public fun name(`value`: String) {
this.name = value
}
/**
* @param block The arguments to use to populate this resource's properties.
*/
public suspend fun args(block: suspend SecretArgsBuilder.() -> Unit) {
val builder = SecretArgsBuilder()
block(builder)
this.args = builder.build()
}
/**
* @param block A bag of options that control this resource's behavior.
*/
public suspend fun opts(block: suspend CustomResourceOptionsBuilder.() -> Unit) {
this.opts = com.pulumi.kotlin.options.CustomResourceOptions.opts(block)
}
internal fun build(): Secret {
val builtJavaResource = com.pulumi.gcp.secretmanager.Secret(
this.name,
this.args.toJava(),
this.opts.toJava(),
)
return Secret(builtJavaResource)
}
}
/**
* A Secret is a logical secret whose value and versions can be accessed.
* To get more information about Secret, see:
* * [API documentation](https://cloud.google.com/secret-manager/docs/reference/rest/v1/projects.secrets)
* ## Example Usage
* ### Secret Config Basic
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as gcp from "@pulumi/gcp";
* const secret_basic = new gcp.secretmanager.Secret("secret-basic", {
* secretId: "secret",
* labels: {
* label: "my-label",
* },
* replication: {
* userManaged: {
* replicas: [
* {
* location: "us-central1",
* },
* {
* location: "us-east1",
* },
* ],
* },
* },
* });
* ```
* ```python
* import pulumi
* import pulumi_gcp as gcp
* secret_basic = gcp.secretmanager.Secret("secret-basic",
* secret_id="secret",
* labels={
* "label": "my-label",
* },
* replication={
* "user_managed": {
* "replicas": [
* {
* "location": "us-central1",
* },
* {
* "location": "us-east1",
* },
* ],
* },
* })
* ```
* ```csharp
* using System.Collections.Generic;
* using System.Linq;
* using Pulumi;
* using Gcp = Pulumi.Gcp;
* return await Deployment.RunAsync(() =>
* {
* var secret_basic = new Gcp.SecretManager.Secret("secret-basic", new()
* {
* SecretId = "secret",
* Labels =
* {
* { "label", "my-label" },
* },
* Replication = new Gcp.SecretManager.Inputs.SecretReplicationArgs
* {
* UserManaged = new Gcp.SecretManager.Inputs.SecretReplicationUserManagedArgs
* {
* Replicas = new[]
* {
* new Gcp.SecretManager.Inputs.SecretReplicationUserManagedReplicaArgs
* {
* Location = "us-central1",
* },
* new Gcp.SecretManager.Inputs.SecretReplicationUserManagedReplicaArgs
* {
* Location = "us-east1",
* },
* },
* },
* },
* });
* });
* ```
* ```go
* package main
* import (
* "github.com/pulumi/pulumi-gcp/sdk/v7/go/gcp/secretmanager"
* "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
* )
* func main() {
* pulumi.Run(func(ctx *pulumi.Context) error {
* _, err := secretmanager.NewSecret(ctx, "secret-basic", &secretmanager.SecretArgs{
* SecretId: pulumi.String("secret"),
* Labels: pulumi.StringMap{
* "label": pulumi.String("my-label"),
* },
* Replication: &secretmanager.SecretReplicationArgs{
* UserManaged: &secretmanager.SecretReplicationUserManagedArgs{
* Replicas: secretmanager.SecretReplicationUserManagedReplicaArray{
* &secretmanager.SecretReplicationUserManagedReplicaArgs{
* Location: pulumi.String("us-central1"),
* },
* &secretmanager.SecretReplicationUserManagedReplicaArgs{
* Location: pulumi.String("us-east1"),
* },
* },
* },
* },
* })
* if err != nil {
* return err
* }
* return nil
* })
* }
* ```
* ```java
* package generated_program;
* import com.pulumi.Context;
* import com.pulumi.Pulumi;
* import com.pulumi.core.Output;
* import com.pulumi.gcp.secretmanager.Secret;
* import com.pulumi.gcp.secretmanager.SecretArgs;
* import com.pulumi.gcp.secretmanager.inputs.SecretReplicationArgs;
* import com.pulumi.gcp.secretmanager.inputs.SecretReplicationUserManagedArgs;
* import java.util.List;
* import java.util.ArrayList;
* import java.util.Map;
* import java.io.File;
* import java.nio.file.Files;
* import java.nio.file.Paths;
* public class App {
* public static void main(String[] args) {
* Pulumi.run(App::stack);
* }
* public static void stack(Context ctx) {
* var secret_basic = new Secret("secret-basic", SecretArgs.builder()
* .secretId("secret")
* .labels(Map.of("label", "my-label"))
* .replication(SecretReplicationArgs.builder()
* .userManaged(SecretReplicationUserManagedArgs.builder()
* .replicas(
* SecretReplicationUserManagedReplicaArgs.builder()
* .location("us-central1")
* .build(),
* SecretReplicationUserManagedReplicaArgs.builder()
* .location("us-east1")
* .build())
* .build())
* .build())
* .build());
* }
* }
* ```
* ```yaml
* resources:
* secret-basic:
* type: gcp:secretmanager:Secret
* properties:
* secretId: secret
* labels:
* label: my-label
* replication:
* userManaged:
* replicas:
* - location: us-central1
* - location: us-east1
* ```
*
* ### Secret With Annotations
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as gcp from "@pulumi/gcp";
* const secret_with_annotations = new gcp.secretmanager.Secret("secret-with-annotations", {
* secretId: "secret",
* labels: {
* label: "my-label",
* },
* annotations: {
* key1: "someval",
* key2: "someval2",
* key3: "someval3",
* key4: "someval4",
* key5: "someval5",
* },
* replication: {
* auto: {},
* },
* });
* ```
* ```python
* import pulumi
* import pulumi_gcp as gcp
* secret_with_annotations = gcp.secretmanager.Secret("secret-with-annotations",
* secret_id="secret",
* labels={
* "label": "my-label",
* },
* annotations={
* "key1": "someval",
* "key2": "someval2",
* "key3": "someval3",
* "key4": "someval4",
* "key5": "someval5",
* },
* replication={
* "auto": {},
* })
* ```
* ```csharp
* using System.Collections.Generic;
* using System.Linq;
* using Pulumi;
* using Gcp = Pulumi.Gcp;
* return await Deployment.RunAsync(() =>
* {
* var secret_with_annotations = new Gcp.SecretManager.Secret("secret-with-annotations", new()
* {
* SecretId = "secret",
* Labels =
* {
* { "label", "my-label" },
* },
* Annotations =
* {
* { "key1", "someval" },
* { "key2", "someval2" },
* { "key3", "someval3" },
* { "key4", "someval4" },
* { "key5", "someval5" },
* },
* Replication = new Gcp.SecretManager.Inputs.SecretReplicationArgs
* {
* Auto = null,
* },
* });
* });
* ```
* ```go
* package main
* import (
* "github.com/pulumi/pulumi-gcp/sdk/v7/go/gcp/secretmanager"
* "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
* )
* func main() {
* pulumi.Run(func(ctx *pulumi.Context) error {
* _, err := secretmanager.NewSecret(ctx, "secret-with-annotations", &secretmanager.SecretArgs{
* SecretId: pulumi.String("secret"),
* Labels: pulumi.StringMap{
* "label": pulumi.String("my-label"),
* },
* Annotations: pulumi.StringMap{
* "key1": pulumi.String("someval"),
* "key2": pulumi.String("someval2"),
* "key3": pulumi.String("someval3"),
* "key4": pulumi.String("someval4"),
* "key5": pulumi.String("someval5"),
* },
* Replication: &secretmanager.SecretReplicationArgs{
* Auto: nil,
* },
* })
* if err != nil {
* return err
* }
* return nil
* })
* }
* ```
* ```java
* package generated_program;
* import com.pulumi.Context;
* import com.pulumi.Pulumi;
* import com.pulumi.core.Output;
* import com.pulumi.gcp.secretmanager.Secret;
* import com.pulumi.gcp.secretmanager.SecretArgs;
* import com.pulumi.gcp.secretmanager.inputs.SecretReplicationArgs;
* import com.pulumi.gcp.secretmanager.inputs.SecretReplicationAutoArgs;
* import java.util.List;
* import java.util.ArrayList;
* import java.util.Map;
* import java.io.File;
* import java.nio.file.Files;
* import java.nio.file.Paths;
* public class App {
* public static void main(String[] args) {
* Pulumi.run(App::stack);
* }
* public static void stack(Context ctx) {
* var secret_with_annotations = new Secret("secret-with-annotations", SecretArgs.builder()
* .secretId("secret")
* .labels(Map.of("label", "my-label"))
* .annotations(Map.ofEntries(
* Map.entry("key1", "someval"),
* Map.entry("key2", "someval2"),
* Map.entry("key3", "someval3"),
* Map.entry("key4", "someval4"),
* Map.entry("key5", "someval5")
* ))
* .replication(SecretReplicationArgs.builder()
* .auto()
* .build())
* .build());
* }
* }
* ```
* ```yaml
* resources:
* secret-with-annotations:
* type: gcp:secretmanager:Secret
* properties:
* secretId: secret
* labels:
* label: my-label
* annotations:
* key1: someval
* key2: someval2
* key3: someval3
* key4: someval4
* key5: someval5
* replication:
* auto: {}
* ```
*
* ### Secret With Version Destroy Ttl
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as gcp from "@pulumi/gcp";
* const secret_with_version_destroy_ttl = new gcp.secretmanager.Secret("secret-with-version-destroy-ttl", {
* secretId: "secret",
* versionDestroyTtl: "2592000s",
* replication: {
* auto: {},
* },
* });
* ```
* ```python
* import pulumi
* import pulumi_gcp as gcp
* secret_with_version_destroy_ttl = gcp.secretmanager.Secret("secret-with-version-destroy-ttl",
* secret_id="secret",
* version_destroy_ttl="2592000s",
* replication={
* "auto": {},
* })
* ```
* ```csharp
* using System.Collections.Generic;
* using System.Linq;
* using Pulumi;
* using Gcp = Pulumi.Gcp;
* return await Deployment.RunAsync(() =>
* {
* var secret_with_version_destroy_ttl = new Gcp.SecretManager.Secret("secret-with-version-destroy-ttl", new()
* {
* SecretId = "secret",
* VersionDestroyTtl = "2592000s",
* Replication = new Gcp.SecretManager.Inputs.SecretReplicationArgs
* {
* Auto = null,
* },
* });
* });
* ```
* ```go
* package main
* import (
* "github.com/pulumi/pulumi-gcp/sdk/v7/go/gcp/secretmanager"
* "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
* )
* func main() {
* pulumi.Run(func(ctx *pulumi.Context) error {
* _, err := secretmanager.NewSecret(ctx, "secret-with-version-destroy-ttl", &secretmanager.SecretArgs{
* SecretId: pulumi.String("secret"),
* VersionDestroyTtl: pulumi.String("2592000s"),
* Replication: &secretmanager.SecretReplicationArgs{
* Auto: nil,
* },
* })
* if err != nil {
* return err
* }
* return nil
* })
* }
* ```
* ```java
* package generated_program;
* import com.pulumi.Context;
* import com.pulumi.Pulumi;
* import com.pulumi.core.Output;
* import com.pulumi.gcp.secretmanager.Secret;
* import com.pulumi.gcp.secretmanager.SecretArgs;
* import com.pulumi.gcp.secretmanager.inputs.SecretReplicationArgs;
* import com.pulumi.gcp.secretmanager.inputs.SecretReplicationAutoArgs;
* import java.util.List;
* import java.util.ArrayList;
* import java.util.Map;
* import java.io.File;
* import java.nio.file.Files;
* import java.nio.file.Paths;
* public class App {
* public static void main(String[] args) {
* Pulumi.run(App::stack);
* }
* public static void stack(Context ctx) {
* var secret_with_version_destroy_ttl = new Secret("secret-with-version-destroy-ttl", SecretArgs.builder()
* .secretId("secret")
* .versionDestroyTtl("2592000s")
* .replication(SecretReplicationArgs.builder()
* .auto()
* .build())
* .build());
* }
* }
* ```
* ```yaml
* resources:
* secret-with-version-destroy-ttl:
* type: gcp:secretmanager:Secret
* properties:
* secretId: secret
* versionDestroyTtl: 2592000s
* replication:
* auto: {}
* ```
*
* ### Secret With Automatic Cmek
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as gcp from "@pulumi/gcp";
* const project = gcp.organizations.getProject({});
* const kms_secret_binding = new gcp.kms.CryptoKeyIAMMember("kms-secret-binding", {
* cryptoKeyId: "kms-key",
* role: "roles/cloudkms.cryptoKeyEncrypterDecrypter",
* member: project.then(project => `serviceAccount:service-${project.number}@gcp-sa-secretmanager.iam.gserviceaccount.com`),
* });
* const secret_with_automatic_cmek = new gcp.secretmanager.Secret("secret-with-automatic-cmek", {
* secretId: "secret",
* replication: {
* auto: {
* customerManagedEncryption: {
* kmsKeyName: "kms-key",
* },
* },
* },
* }, {
* dependsOn: [kms_secret_binding],
* });
* ```
* ```python
* import pulumi
* import pulumi_gcp as gcp
* project = gcp.organizations.get_project()
* kms_secret_binding = gcp.kms.CryptoKeyIAMMember("kms-secret-binding",
* crypto_key_id="kms-key",
* role="roles/cloudkms.cryptoKeyEncrypterDecrypter",
* member=f"serviceAccount:service-{project.number}@gcp-sa-secretmanager.iam.gserviceaccount.com")
* secret_with_automatic_cmek = gcp.secretmanager.Secret("secret-with-automatic-cmek",
* secret_id="secret",
* replication={
* "auto": {
* "customer_managed_encryption": {
* "kms_key_name": "kms-key",
* },
* },
* },
* opts = pulumi.ResourceOptions(depends_on=[kms_secret_binding]))
* ```
* ```csharp
* using System.Collections.Generic;
* using System.Linq;
* using Pulumi;
* using Gcp = Pulumi.Gcp;
* return await Deployment.RunAsync(() =>
* {
* var project = Gcp.Organizations.GetProject.Invoke();
* var kms_secret_binding = new Gcp.Kms.CryptoKeyIAMMember("kms-secret-binding", new()
* {
* CryptoKeyId = "kms-key",
* Role = "roles/cloudkms.cryptoKeyEncrypterDecrypter",
* Member = $"serviceAccount:service-{project.Apply(getProjectResult => getProjectResult.Number)}@gcp-sa-secretmanager.iam.gserviceaccount.com",
* });
* var secret_with_automatic_cmek = new Gcp.SecretManager.Secret("secret-with-automatic-cmek", new()
* {
* SecretId = "secret",
* Replication = new Gcp.SecretManager.Inputs.SecretReplicationArgs
* {
* Auto = new Gcp.SecretManager.Inputs.SecretReplicationAutoArgs
* {
* CustomerManagedEncryption = new Gcp.SecretManager.Inputs.SecretReplicationAutoCustomerManagedEncryptionArgs
* {
* KmsKeyName = "kms-key",
* },
* },
* },
* }, new CustomResourceOptions
* {
* DependsOn =
* {
* kms_secret_binding,
* },
* });
* });
* ```
* ```go
* package main
* import (
* "fmt"
* "github.com/pulumi/pulumi-gcp/sdk/v7/go/gcp/kms"
* "github.com/pulumi/pulumi-gcp/sdk/v7/go/gcp/organizations"
* "github.com/pulumi/pulumi-gcp/sdk/v7/go/gcp/secretmanager"
* "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
* )
* func main() {
* pulumi.Run(func(ctx *pulumi.Context) error {
* project, err := organizations.LookupProject(ctx, nil, nil)
* if err != nil {
* return err
* }
* _, err = kms.NewCryptoKeyIAMMember(ctx, "kms-secret-binding", &kms.CryptoKeyIAMMemberArgs{
* CryptoKeyId: pulumi.String("kms-key"),
* Role: pulumi.String("roles/cloudkms.cryptoKeyEncrypterDecrypter"),
* Member: pulumi.Sprintf("serviceAccount:service-%[email protected] ", project.Number),
* })
* if err != nil {
* return err
* }
* _, err = secretmanager.NewSecret(ctx, "secret-with-automatic-cmek", &secretmanager.SecretArgs{
* SecretId: pulumi.String("secret"),
* Replication: &secretmanager.SecretReplicationArgs{
* Auto: &secretmanager.SecretReplicationAutoArgs{
* CustomerManagedEncryption: &secretmanager.SecretReplicationAutoCustomerManagedEncryptionArgs{
* KmsKeyName: pulumi.String("kms-key"),
* },
* },
* },
* }, pulumi.DependsOn([]pulumi.Resource{
* kms_secret_binding,
* }))
* if err != nil {
* return err
* }
* return nil
* })
* }
* ```
* ```java
* package generated_program;
* import com.pulumi.Context;
* import com.pulumi.Pulumi;
* import com.pulumi.core.Output;
* import com.pulumi.gcp.organizations.OrganizationsFunctions;
* import com.pulumi.gcp.organizations.inputs.GetProjectArgs;
* import com.pulumi.gcp.kms.CryptoKeyIAMMember;
* import com.pulumi.gcp.kms.CryptoKeyIAMMemberArgs;
* import com.pulumi.gcp.secretmanager.Secret;
* import com.pulumi.gcp.secretmanager.SecretArgs;
* import com.pulumi.gcp.secretmanager.inputs.SecretReplicationArgs;
* import com.pulumi.gcp.secretmanager.inputs.SecretReplicationAutoArgs;
* import com.pulumi.gcp.secretmanager.inputs.SecretReplicationAutoCustomerManagedEncryptionArgs;
* import com.pulumi.resources.CustomResourceOptions;
* import java.util.List;
* import java.util.ArrayList;
* import java.util.Map;
* import java.io.File;
* import java.nio.file.Files;
* import java.nio.file.Paths;
* public class App {
* public static void main(String[] args) {
* Pulumi.run(App::stack);
* }
* public static void stack(Context ctx) {
* final var project = OrganizationsFunctions.getProject();
* var kms_secret_binding = new CryptoKeyIAMMember("kms-secret-binding", CryptoKeyIAMMemberArgs.builder()
* .cryptoKeyId("kms-key")
* .role("roles/cloudkms.cryptoKeyEncrypterDecrypter")
* .member(String.format("serviceAccount:service-%[email protected] ", project.applyValue(getProjectResult -> getProjectResult.number())))
* .build());
* var secret_with_automatic_cmek = new Secret("secret-with-automatic-cmek", SecretArgs.builder()
* .secretId("secret")
* .replication(SecretReplicationArgs.builder()
* .auto(SecretReplicationAutoArgs.builder()
* .customerManagedEncryption(SecretReplicationAutoCustomerManagedEncryptionArgs.builder()
* .kmsKeyName("kms-key")
* .build())
* .build())
* .build())
* .build(), CustomResourceOptions.builder()
* .dependsOn(kms_secret_binding)
* .build());
* }
* }
* ```
* ```yaml
* resources:
* kms-secret-binding:
* type: gcp:kms:CryptoKeyIAMMember
* properties:
* cryptoKeyId: kms-key
* role: roles/cloudkms.cryptoKeyEncrypterDecrypter
* member: serviceAccount:service-${project.number}@gcp-sa-secretmanager.iam.gserviceaccount.com
* secret-with-automatic-cmek:
* type: gcp:secretmanager:Secret
* properties:
* secretId: secret
* replication:
* auto:
* customerManagedEncryption:
* kmsKeyName: kms-key
* options:
* dependson:
* - ${["kms-secret-binding"]}
* variables:
* project:
* fn::invoke:
* Function: gcp:organizations:getProject
* Arguments: {}
* ```
*
* ## Import
* Secret can be imported using any of these accepted formats:
* * `projects/{{project}}/secrets/{{secret_id}}`
* * `{{project}}/{{secret_id}}`
* * `{{secret_id}}`
* When using the `pulumi import` command, Secret can be imported using one of the formats above. For example:
* ```sh
* $ pulumi import gcp:secretmanager/secret:Secret default projects/{{project}}/secrets/{{secret_id}}
* ```
* ```sh
* $ pulumi import gcp:secretmanager/secret:Secret default {{project}}/{{secret_id}}
* ```
* ```sh
* $ pulumi import gcp:secretmanager/secret:Secret default {{secret_id}}
* ```
*/
public class Secret internal constructor(
override val javaResource: com.pulumi.gcp.secretmanager.Secret,
) : KotlinCustomResource(javaResource, SecretMapper) {
/**
* Custom metadata about the secret. Annotations are distinct from various forms of labels. Annotations exist to allow
* client tools to store their own state information without requiring a database. Annotation keys must be between 1 and 63
* characters long, have a UTF-8 encoding of maximum 128 bytes, begin and end with an alphanumeric character ([a-z0-9A-Z]),
* and may have dashes (-), underscores (_), dots (.), and alphanumerics in between these symbols. The total size of
* annotation keys and values must be less than 16KiB. An object containing a list of "key": value pairs. Example: {
* "name": "wrench", "mass": "1.3kg", "count": "3" }. **Note**: This field is non-authoritative, and will only manage the
* annotations present in your configuration. Please refer to the field 'effective_annotations' for all of the annotations
* present on the resource.
*/
public val annotations: Output>?
get() = javaResource.annotations().applyValue({ args0 ->
args0.map({ args0 ->
args0.map({ args0 ->
args0.key.to(args0.value)
}).toMap()
}).orElse(null)
})
/**
* The time at which the Secret was created.
*/
public val createTime: Output
get() = javaResource.createTime().applyValue({ args0 -> args0 })
public val effectiveAnnotations: Output>
get() = javaResource.effectiveAnnotations().applyValue({ args0 ->
args0.map({ args0 ->
args0.key.to(args0.value)
}).toMap()
})
/**
* All of labels (key/value pairs) present on the resource in GCP, including the labels configured through Pulumi, other clients and services.
*/
public val effectiveLabels: Output>
get() = javaResource.effectiveLabels().applyValue({ args0 ->
args0.map({ args0 ->
args0.key.to(args0.value)
}).toMap()
})
/**
* Timestamp in UTC when the Secret is scheduled to expire. This is always provided on output, regardless of what was sent
* on input. A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits.
* Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z". Only one of 'expire_time' or 'ttl' can be
* provided.
*/
public val expireTime: Output
get() = javaResource.expireTime().applyValue({ args0 -> args0 })
/**
* The labels assigned to this Secret. Label keys must be between 1 and 63 characters long, have a UTF-8 encoding of
* maximum 128 bytes, and must conform to the following PCRE regular expression: [\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}
* Label values must be between 0 and 63 characters long, have a UTF-8 encoding of maximum 128 bytes, and must conform to
* the following PCRE regular expression: [\p{Ll}\p{Lo}\p{N}_-]{0,63} No more than 64 labels can be assigned to a given
* resource. An object containing a list of "key": value pairs. Example: { "name": "wrench", "mass": "1.3kg", "count": "3"
* }. **Note**: This field is non-authoritative, and will only manage the labels present in your configuration. Please
* refer to the field 'effective_labels' for all of the labels present on the resource.
*/
public val labels: Output>?
get() = javaResource.labels().applyValue({ args0 ->
args0.map({ args0 ->
args0.map({ args0 ->
args0.key.to(args0.value)
}).toMap()
}).orElse(null)
})
/**
* The resource name of the Secret. Format:
* `projects/{{project}}/secrets/{{secret_id}}`
*/
public val name: Output
get() = javaResource.name().applyValue({ args0 -> args0 })
public val project: Output
get() = javaResource.project().applyValue({ args0 -> args0 })
/**
* The combination of labels configured directly on the resource
* and default labels configured on the provider.
*/
public val pulumiLabels: Output>
get() = javaResource.pulumiLabels().applyValue({ args0 ->
args0.map({ args0 ->
args0.key.to(args0.value)
}).toMap()
})
/**
* The replication policy of the secret data attached to the Secret. It cannot be changed
* after the Secret has been created.
* Structure is documented below.
*/
public val replication: Output
get() = javaResource.replication().applyValue({ args0 ->
args0.let({ args0 ->
secretReplicationToKotlin(args0)
})
})
/**
* The rotation time and period for a Secret. At 'next_rotation_time', Secret Manager will send a Pub/Sub notification to
* the topics configured on the Secret. 'topics' must be set to configure rotation.
*/
public val rotation: Output?
get() = javaResource.rotation().applyValue({ args0 ->
args0.map({ args0 ->
args0.let({ args0 ->
secretRotationToKotlin(args0)
})
}).orElse(null)
})
/**
* This must be unique within the project.
*/
public val secretId: Output
get() = javaResource.secretId().applyValue({ args0 -> args0 })
/**
* A list of up to 10 Pub/Sub topics to which messages are published when control plane operations are called on the secret
* or its versions.
*/
public val topics: Output>?
get() = javaResource.topics().applyValue({ args0 ->
args0.map({ args0 ->
args0.map({ args0 ->
args0.let({ args0 -> secretTopicToKotlin(args0) })
})
}).orElse(null)
})
/**
* The TTL for the Secret. A duration in seconds with up to nine fractional digits, terminated by 's'. Example: "3.5s".
* Only one of 'ttl' or 'expire_time' can be provided.
*/
public val ttl: Output?
get() = javaResource.ttl().applyValue({ args0 -> args0.map({ args0 -> args0 }).orElse(null) })
/**
* Mapping from version alias to version name. A version alias is a string with a maximum length of 63 characters and can
* contain uppercase and lowercase letters, numerals, and the hyphen (-) and underscore ('_') characters. An alias string
* must start with a letter and cannot be the string 'latest' or 'NEW'. No more than 50 aliases can be assigned to a given
* secret. An object containing a list of "key": value pairs. Example: { "name": "wrench", "mass": "1.3kg", "count": "3" }.
*/
public val versionAliases: Output>?
get() = javaResource.versionAliases().applyValue({ args0 ->
args0.map({ args0 ->
args0.map({ args0 -> args0.key.to(args0.value) }).toMap()
}).orElse(null)
})
/**
* Secret Version TTL after destruction request. This is a part of the delayed delete feature on Secret Version. For secret
* with versionDestroyTtl>0, version destruction doesn't happen immediately on calling destroy instead the version goes to
* a disabled state and the actual destruction happens after this TTL expires.
*/
public val versionDestroyTtl: Output?
get() = javaResource.versionDestroyTtl().applyValue({ args0 ->
args0.map({ args0 ->
args0
}).orElse(null)
})
}
public object SecretMapper : ResourceMapper {
override fun supportsMappingOfType(javaResource: Resource): Boolean =
com.pulumi.gcp.secretmanager.Secret::class == javaResource::class
override fun map(javaResource: Resource): Secret = Secret(
javaResource as
com.pulumi.gcp.secretmanager.Secret,
)
}
/**
* @see [Secret].
* @param name The _unique_ name of the resulting resource.
* @param block Builder for [Secret].
*/
public suspend fun secret(name: String, block: suspend SecretResourceBuilder.() -> Unit): Secret {
val builder = SecretResourceBuilder()
builder.name(name)
block(builder)
return builder.build()
}
/**
* @see [Secret].
* @param name The _unique_ name of the resulting resource.
*/
public fun secret(name: String): Secret {
val builder = SecretResourceBuilder()
builder.name(name)
return builder.build()
}