All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.pulumi.gcp.secretmanager.kotlin.RegionalSecret.kt Maven / Gradle / Ivy

@file:Suppress("NAME_SHADOWING", "DEPRECATION")

package com.pulumi.gcp.secretmanager.kotlin

import com.pulumi.core.Output
import com.pulumi.gcp.secretmanager.kotlin.outputs.RegionalSecretCustomerManagedEncryption
import com.pulumi.gcp.secretmanager.kotlin.outputs.RegionalSecretRotation
import com.pulumi.gcp.secretmanager.kotlin.outputs.RegionalSecretTopic
import com.pulumi.kotlin.KotlinCustomResource
import com.pulumi.kotlin.PulumiTagMarker
import com.pulumi.kotlin.ResourceMapper
import com.pulumi.kotlin.options.CustomResourceOptions
import com.pulumi.kotlin.options.CustomResourceOptionsBuilder
import com.pulumi.resources.Resource
import kotlin.Boolean
import kotlin.String
import kotlin.Suppress
import kotlin.Unit
import kotlin.collections.List
import kotlin.collections.Map
import com.pulumi.gcp.secretmanager.kotlin.outputs.RegionalSecretCustomerManagedEncryption.Companion.toKotlin as regionalSecretCustomerManagedEncryptionToKotlin
import com.pulumi.gcp.secretmanager.kotlin.outputs.RegionalSecretRotation.Companion.toKotlin as regionalSecretRotationToKotlin
import com.pulumi.gcp.secretmanager.kotlin.outputs.RegionalSecretTopic.Companion.toKotlin as regionalSecretTopicToKotlin

/**
 * Builder for [RegionalSecret].
 */
@PulumiTagMarker
public class RegionalSecretResourceBuilder internal constructor() {
    public var name: String? = null

    public var args: RegionalSecretArgs = RegionalSecretArgs()

    public var opts: CustomResourceOptions = CustomResourceOptions()

    /**
     * @param name The _unique_ name of the resulting resource.
     */
    public fun name(`value`: String) {
        this.name = value
    }

    /**
     * @param block The arguments to use to populate this resource's properties.
     */
    public suspend fun args(block: suspend RegionalSecretArgsBuilder.() -> Unit) {
        val builder = RegionalSecretArgsBuilder()
        block(builder)
        this.args = builder.build()
    }

    /**
     * @param block A bag of options that control this resource's behavior.
     */
    public suspend fun opts(block: suspend CustomResourceOptionsBuilder.() -> Unit) {
        this.opts = com.pulumi.kotlin.options.CustomResourceOptions.opts(block)
    }

    internal fun build(): RegionalSecret {
        val builtJavaResource = com.pulumi.gcp.secretmanager.RegionalSecret(
            this.name,
            this.args.toJava(),
            this.opts.toJava(),
        )
        return RegionalSecret(builtJavaResource)
    }
}

/**
 * A Regional Secret is a logical secret whose value and versions can be created and accessed within a region only.
 * To get more information about RegionalSecret, see:
 * * [API documentation](https://cloud.google.com/secret-manager/docs/reference/rest/v1/projects.locations.secrets)
 * ## Example Usage
 * ### Regional Secret Config Basic
 * 
 * ```typescript
 * import * as pulumi from "@pulumi/pulumi";
 * import * as gcp from "@pulumi/gcp";
 * const regional_secret_basic = new gcp.secretmanager.RegionalSecret("regional-secret-basic", {
 *     secretId: "tf-reg-secret",
 *     location: "us-central1",
 *     labels: {
 *         label: "my-label",
 *     },
 *     annotations: {
 *         key1: "value1",
 *         key2: "value2",
 *         key3: "value3",
 *     },
 * });
 * ```
 * ```python
 * import pulumi
 * import pulumi_gcp as gcp
 * regional_secret_basic = gcp.secretmanager.RegionalSecret("regional-secret-basic",
 *     secret_id="tf-reg-secret",
 *     location="us-central1",
 *     labels={
 *         "label": "my-label",
 *     },
 *     annotations={
 *         "key1": "value1",
 *         "key2": "value2",
 *         "key3": "value3",
 *     })
 * ```
 * ```csharp
 * using System.Collections.Generic;
 * using System.Linq;
 * using Pulumi;
 * using Gcp = Pulumi.Gcp;
 * return await Deployment.RunAsync(() =>
 * {
 *     var regional_secret_basic = new Gcp.SecretManager.RegionalSecret("regional-secret-basic", new()
 *     {
 *         SecretId = "tf-reg-secret",
 *         Location = "us-central1",
 *         Labels =
 *         {
 *             { "label", "my-label" },
 *         },
 *         Annotations =
 *         {
 *             { "key1", "value1" },
 *             { "key2", "value2" },
 *             { "key3", "value3" },
 *         },
 *     });
 * });
 * ```
 * ```go
 * package main
 * import (
 * 	"github.com/pulumi/pulumi-gcp/sdk/v8/go/gcp/secretmanager"
 * 	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
 * )
 * func main() {
 * 	pulumi.Run(func(ctx *pulumi.Context) error {
 * 		_, err := secretmanager.NewRegionalSecret(ctx, "regional-secret-basic", &secretmanager.RegionalSecretArgs{
 * 			SecretId: pulumi.String("tf-reg-secret"),
 * 			Location: pulumi.String("us-central1"),
 * 			Labels: pulumi.StringMap{
 * 				"label": pulumi.String("my-label"),
 * 			},
 * 			Annotations: pulumi.StringMap{
 * 				"key1": pulumi.String("value1"),
 * 				"key2": pulumi.String("value2"),
 * 				"key3": pulumi.String("value3"),
 * 			},
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		return nil
 * 	})
 * }
 * ```
 * ```java
 * package generated_program;
 * import com.pulumi.Context;
 * import com.pulumi.Pulumi;
 * import com.pulumi.core.Output;
 * import com.pulumi.gcp.secretmanager.RegionalSecret;
 * import com.pulumi.gcp.secretmanager.RegionalSecretArgs;
 * import java.util.List;
 * import java.util.ArrayList;
 * import java.util.Map;
 * import java.io.File;
 * import java.nio.file.Files;
 * import java.nio.file.Paths;
 * public class App {
 *     public static void main(String[] args) {
 *         Pulumi.run(App::stack);
 *     }
 *     public static void stack(Context ctx) {
 *         var regional_secret_basic = new RegionalSecret("regional-secret-basic", RegionalSecretArgs.builder()
 *             .secretId("tf-reg-secret")
 *             .location("us-central1")
 *             .labels(Map.of("label", "my-label"))
 *             .annotations(Map.ofEntries(
 *                 Map.entry("key1", "value1"),
 *                 Map.entry("key2", "value2"),
 *                 Map.entry("key3", "value3")
 *             ))
 *             .build());
 *     }
 * }
 * ```
 * ```yaml
 * resources:
 *   regional-secret-basic:
 *     type: gcp:secretmanager:RegionalSecret
 *     properties:
 *       secretId: tf-reg-secret
 *       location: us-central1
 *       labels:
 *         label: my-label
 *       annotations:
 *         key1: value1
 *         key2: value2
 *         key3: value3
 * ```
 * 
 * ### Regional Secret With Cmek
 * 
 * ```typescript
 * import * as pulumi from "@pulumi/pulumi";
 * import * as gcp from "@pulumi/gcp";
 * const project = gcp.organizations.getProject({});
 * const kms_secret_binding = new gcp.kms.CryptoKeyIAMMember("kms-secret-binding", {
 *     cryptoKeyId: "kms-key",
 *     role: "roles/cloudkms.cryptoKeyEncrypterDecrypter",
 *     member: project.then(project => `serviceAccount:service-${project.number}@gcp-sa-secretmanager.iam.gserviceaccount.com`),
 * });
 * const regional_secret_with_cmek = new gcp.secretmanager.RegionalSecret("regional-secret-with-cmek", {
 *     secretId: "tf-reg-secret",
 *     location: "us-central1",
 *     customerManagedEncryption: {
 *         kmsKeyName: "kms-key",
 *     },
 * }, {
 *     dependsOn: [kms_secret_binding],
 * });
 * ```
 * ```python
 * import pulumi
 * import pulumi_gcp as gcp
 * project = gcp.organizations.get_project()
 * kms_secret_binding = gcp.kms.CryptoKeyIAMMember("kms-secret-binding",
 *     crypto_key_id="kms-key",
 *     role="roles/cloudkms.cryptoKeyEncrypterDecrypter",
 *     member=f"serviceAccount:service-{project.number}@gcp-sa-secretmanager.iam.gserviceaccount.com")
 * regional_secret_with_cmek = gcp.secretmanager.RegionalSecret("regional-secret-with-cmek",
 *     secret_id="tf-reg-secret",
 *     location="us-central1",
 *     customer_managed_encryption={
 *         "kms_key_name": "kms-key",
 *     },
 *     opts = pulumi.ResourceOptions(depends_on=[kms_secret_binding]))
 * ```
 * ```csharp
 * using System.Collections.Generic;
 * using System.Linq;
 * using Pulumi;
 * using Gcp = Pulumi.Gcp;
 * return await Deployment.RunAsync(() =>
 * {
 *     var project = Gcp.Organizations.GetProject.Invoke();
 *     var kms_secret_binding = new Gcp.Kms.CryptoKeyIAMMember("kms-secret-binding", new()
 *     {
 *         CryptoKeyId = "kms-key",
 *         Role = "roles/cloudkms.cryptoKeyEncrypterDecrypter",
 *         Member = $"serviceAccount:service-{project.Apply(getProjectResult => getProjectResult.Number)}@gcp-sa-secretmanager.iam.gserviceaccount.com",
 *     });
 *     var regional_secret_with_cmek = new Gcp.SecretManager.RegionalSecret("regional-secret-with-cmek", new()
 *     {
 *         SecretId = "tf-reg-secret",
 *         Location = "us-central1",
 *         CustomerManagedEncryption = new Gcp.SecretManager.Inputs.RegionalSecretCustomerManagedEncryptionArgs
 *         {
 *             KmsKeyName = "kms-key",
 *         },
 *     }, new CustomResourceOptions
 *     {
 *         DependsOn =
 *         {
 *             kms_secret_binding,
 *         },
 *     });
 * });
 * ```
 * ```go
 * package main
 * import (
 * 	"fmt"
 * 	"github.com/pulumi/pulumi-gcp/sdk/v8/go/gcp/kms"
 * 	"github.com/pulumi/pulumi-gcp/sdk/v8/go/gcp/organizations"
 * 	"github.com/pulumi/pulumi-gcp/sdk/v8/go/gcp/secretmanager"
 * 	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
 * )
 * func main() {
 * 	pulumi.Run(func(ctx *pulumi.Context) error {
 * 		project, err := organizations.LookupProject(ctx, &organizations.LookupProjectArgs{}, nil)
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = kms.NewCryptoKeyIAMMember(ctx, "kms-secret-binding", &kms.CryptoKeyIAMMemberArgs{
 * 			CryptoKeyId: pulumi.String("kms-key"),
 * 			Role:        pulumi.String("roles/cloudkms.cryptoKeyEncrypterDecrypter"),
 * 			Member:      pulumi.Sprintf("serviceAccount:service-%[email protected]", project.Number),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = secretmanager.NewRegionalSecret(ctx, "regional-secret-with-cmek", &secretmanager.RegionalSecretArgs{
 * 			SecretId: pulumi.String("tf-reg-secret"),
 * 			Location: pulumi.String("us-central1"),
 * 			CustomerManagedEncryption: &secretmanager.RegionalSecretCustomerManagedEncryptionArgs{
 * 				KmsKeyName: pulumi.String("kms-key"),
 * 			},
 * 		}, pulumi.DependsOn([]pulumi.Resource{
 * 			kms_secret_binding,
 * 		}))
 * 		if err != nil {
 * 			return err
 * 		}
 * 		return nil
 * 	})
 * }
 * ```
 * ```java
 * package generated_program;
 * import com.pulumi.Context;
 * import com.pulumi.Pulumi;
 * import com.pulumi.core.Output;
 * import com.pulumi.gcp.organizations.OrganizationsFunctions;
 * import com.pulumi.gcp.organizations.inputs.GetProjectArgs;
 * import com.pulumi.gcp.kms.CryptoKeyIAMMember;
 * import com.pulumi.gcp.kms.CryptoKeyIAMMemberArgs;
 * import com.pulumi.gcp.secretmanager.RegionalSecret;
 * import com.pulumi.gcp.secretmanager.RegionalSecretArgs;
 * import com.pulumi.gcp.secretmanager.inputs.RegionalSecretCustomerManagedEncryptionArgs;
 * import com.pulumi.resources.CustomResourceOptions;
 * import java.util.List;
 * import java.util.ArrayList;
 * import java.util.Map;
 * import java.io.File;
 * import java.nio.file.Files;
 * import java.nio.file.Paths;
 * public class App {
 *     public static void main(String[] args) {
 *         Pulumi.run(App::stack);
 *     }
 *     public static void stack(Context ctx) {
 *         final var project = OrganizationsFunctions.getProject();
 *         var kms_secret_binding = new CryptoKeyIAMMember("kms-secret-binding", CryptoKeyIAMMemberArgs.builder()
 *             .cryptoKeyId("kms-key")
 *             .role("roles/cloudkms.cryptoKeyEncrypterDecrypter")
 *             .member(String.format("serviceAccount:service-%[email protected]", project.applyValue(getProjectResult -> getProjectResult.number())))
 *             .build());
 *         var regional_secret_with_cmek = new RegionalSecret("regional-secret-with-cmek", RegionalSecretArgs.builder()
 *             .secretId("tf-reg-secret")
 *             .location("us-central1")
 *             .customerManagedEncryption(RegionalSecretCustomerManagedEncryptionArgs.builder()
 *                 .kmsKeyName("kms-key")
 *                 .build())
 *             .build(), CustomResourceOptions.builder()
 *                 .dependsOn(kms_secret_binding)
 *                 .build());
 *     }
 * }
 * ```
 * ```yaml
 * resources:
 *   kms-secret-binding:
 *     type: gcp:kms:CryptoKeyIAMMember
 *     properties:
 *       cryptoKeyId: kms-key
 *       role: roles/cloudkms.cryptoKeyEncrypterDecrypter
 *       member: serviceAccount:service-${project.number}@gcp-sa-secretmanager.iam.gserviceaccount.com
 *   regional-secret-with-cmek:
 *     type: gcp:secretmanager:RegionalSecret
 *     properties:
 *       secretId: tf-reg-secret
 *       location: us-central1
 *       customerManagedEncryption:
 *         kmsKeyName: kms-key
 *     options:
 *       dependsOn:
 *         - ${["kms-secret-binding"]}
 * variables:
 *   project:
 *     fn::invoke:
 *       function: gcp:organizations:getProject
 *       arguments: {}
 * ```
 * 
 * ### Regional Secret With Rotation
 * 
 * ```typescript
 * import * as pulumi from "@pulumi/pulumi";
 * import * as gcp from "@pulumi/gcp";
 * const project = gcp.organizations.getProject({});
 * const topic = new gcp.pubsub.Topic("topic", {name: "tf-topic"});
 * const secretsManagerAccess = new gcp.pubsub.TopicIAMMember("secrets_manager_access", {
 *     topic: topic.name,
 *     role: "roles/pubsub.publisher",
 *     member: project.then(project => `serviceAccount:service-${project.number}@gcp-sa-secretmanager.iam.gserviceaccount.com`),
 * });
 * const regional_secret_with_rotation = new gcp.secretmanager.RegionalSecret("regional-secret-with-rotation", {
 *     secretId: "tf-reg-secret",
 *     location: "us-central1",
 *     topics: [{
 *         name: topic.id,
 *     }],
 *     rotation: {
 *         rotationPeriod: "3600s",
 *         nextRotationTime: "2045-11-30T00:00:00Z",
 *     },
 * }, {
 *     dependsOn: [secretsManagerAccess],
 * });
 * ```
 * ```python
 * import pulumi
 * import pulumi_gcp as gcp
 * project = gcp.organizations.get_project()
 * topic = gcp.pubsub.Topic("topic", name="tf-topic")
 * secrets_manager_access = gcp.pubsub.TopicIAMMember("secrets_manager_access",
 *     topic=topic.name,
 *     role="roles/pubsub.publisher",
 *     member=f"serviceAccount:service-{project.number}@gcp-sa-secretmanager.iam.gserviceaccount.com")
 * regional_secret_with_rotation = gcp.secretmanager.RegionalSecret("regional-secret-with-rotation",
 *     secret_id="tf-reg-secret",
 *     location="us-central1",
 *     topics=[{
 *         "name": topic.id,
 *     }],
 *     rotation={
 *         "rotation_period": "3600s",
 *         "next_rotation_time": "2045-11-30T00:00:00Z",
 *     },
 *     opts = pulumi.ResourceOptions(depends_on=[secrets_manager_access]))
 * ```
 * ```csharp
 * using System.Collections.Generic;
 * using System.Linq;
 * using Pulumi;
 * using Gcp = Pulumi.Gcp;
 * return await Deployment.RunAsync(() =>
 * {
 *     var project = Gcp.Organizations.GetProject.Invoke();
 *     var topic = new Gcp.PubSub.Topic("topic", new()
 *     {
 *         Name = "tf-topic",
 *     });
 *     var secretsManagerAccess = new Gcp.PubSub.TopicIAMMember("secrets_manager_access", new()
 *     {
 *         Topic = topic.Name,
 *         Role = "roles/pubsub.publisher",
 *         Member = $"serviceAccount:service-{project.Apply(getProjectResult => getProjectResult.Number)}@gcp-sa-secretmanager.iam.gserviceaccount.com",
 *     });
 *     var regional_secret_with_rotation = new Gcp.SecretManager.RegionalSecret("regional-secret-with-rotation", new()
 *     {
 *         SecretId = "tf-reg-secret",
 *         Location = "us-central1",
 *         Topics = new[]
 *         {
 *             new Gcp.SecretManager.Inputs.RegionalSecretTopicArgs
 *             {
 *                 Name = topic.Id,
 *             },
 *         },
 *         Rotation = new Gcp.SecretManager.Inputs.RegionalSecretRotationArgs
 *         {
 *             RotationPeriod = "3600s",
 *             NextRotationTime = "2045-11-30T00:00:00Z",
 *         },
 *     }, new CustomResourceOptions
 *     {
 *         DependsOn =
 *         {
 *             secretsManagerAccess,
 *         },
 *     });
 * });
 * ```
 * ```go
 * package main
 * import (
 * 	"fmt"
 * 	"github.com/pulumi/pulumi-gcp/sdk/v8/go/gcp/organizations"
 * 	"github.com/pulumi/pulumi-gcp/sdk/v8/go/gcp/pubsub"
 * 	"github.com/pulumi/pulumi-gcp/sdk/v8/go/gcp/secretmanager"
 * 	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
 * )
 * func main() {
 * 	pulumi.Run(func(ctx *pulumi.Context) error {
 * 		project, err := organizations.LookupProject(ctx, &organizations.LookupProjectArgs{}, nil)
 * 		if err != nil {
 * 			return err
 * 		}
 * 		topic, err := pubsub.NewTopic(ctx, "topic", &pubsub.TopicArgs{
 * 			Name: pulumi.String("tf-topic"),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		secretsManagerAccess, err := pubsub.NewTopicIAMMember(ctx, "secrets_manager_access", &pubsub.TopicIAMMemberArgs{
 * 			Topic:  topic.Name,
 * 			Role:   pulumi.String("roles/pubsub.publisher"),
 * 			Member: pulumi.Sprintf("serviceAccount:service-%[email protected]", project.Number),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = secretmanager.NewRegionalSecret(ctx, "regional-secret-with-rotation", &secretmanager.RegionalSecretArgs{
 * 			SecretId: pulumi.String("tf-reg-secret"),
 * 			Location: pulumi.String("us-central1"),
 * 			Topics: secretmanager.RegionalSecretTopicArray{
 * 				&secretmanager.RegionalSecretTopicArgs{
 * 					Name: topic.ID(),
 * 				},
 * 			},
 * 			Rotation: &secretmanager.RegionalSecretRotationArgs{
 * 				RotationPeriod:   pulumi.String("3600s"),
 * 				NextRotationTime: pulumi.String("2045-11-30T00:00:00Z"),
 * 			},
 * 		}, pulumi.DependsOn([]pulumi.Resource{
 * 			secretsManagerAccess,
 * 		}))
 * 		if err != nil {
 * 			return err
 * 		}
 * 		return nil
 * 	})
 * }
 * ```
 * ```java
 * package generated_program;
 * import com.pulumi.Context;
 * import com.pulumi.Pulumi;
 * import com.pulumi.core.Output;
 * import com.pulumi.gcp.organizations.OrganizationsFunctions;
 * import com.pulumi.gcp.organizations.inputs.GetProjectArgs;
 * import com.pulumi.gcp.pubsub.Topic;
 * import com.pulumi.gcp.pubsub.TopicArgs;
 * import com.pulumi.gcp.pubsub.TopicIAMMember;
 * import com.pulumi.gcp.pubsub.TopicIAMMemberArgs;
 * import com.pulumi.gcp.secretmanager.RegionalSecret;
 * import com.pulumi.gcp.secretmanager.RegionalSecretArgs;
 * import com.pulumi.gcp.secretmanager.inputs.RegionalSecretTopicArgs;
 * import com.pulumi.gcp.secretmanager.inputs.RegionalSecretRotationArgs;
 * import com.pulumi.resources.CustomResourceOptions;
 * import java.util.List;
 * import java.util.ArrayList;
 * import java.util.Map;
 * import java.io.File;
 * import java.nio.file.Files;
 * import java.nio.file.Paths;
 * public class App {
 *     public static void main(String[] args) {
 *         Pulumi.run(App::stack);
 *     }
 *     public static void stack(Context ctx) {
 *         final var project = OrganizationsFunctions.getProject();
 *         var topic = new Topic("topic", TopicArgs.builder()
 *             .name("tf-topic")
 *             .build());
 *         var secretsManagerAccess = new TopicIAMMember("secretsManagerAccess", TopicIAMMemberArgs.builder()
 *             .topic(topic.name())
 *             .role("roles/pubsub.publisher")
 *             .member(String.format("serviceAccount:service-%[email protected]", project.applyValue(getProjectResult -> getProjectResult.number())))
 *             .build());
 *         var regional_secret_with_rotation = new RegionalSecret("regional-secret-with-rotation", RegionalSecretArgs.builder()
 *             .secretId("tf-reg-secret")
 *             .location("us-central1")
 *             .topics(RegionalSecretTopicArgs.builder()
 *                 .name(topic.id())
 *                 .build())
 *             .rotation(RegionalSecretRotationArgs.builder()
 *                 .rotationPeriod("3600s")
 *                 .nextRotationTime("2045-11-30T00:00:00Z")
 *                 .build())
 *             .build(), CustomResourceOptions.builder()
 *                 .dependsOn(secretsManagerAccess)
 *                 .build());
 *     }
 * }
 * ```
 * ```yaml
 * resources:
 *   topic:
 *     type: gcp:pubsub:Topic
 *     properties:
 *       name: tf-topic
 *   secretsManagerAccess:
 *     type: gcp:pubsub:TopicIAMMember
 *     name: secrets_manager_access
 *     properties:
 *       topic: ${topic.name}
 *       role: roles/pubsub.publisher
 *       member: serviceAccount:service-${project.number}@gcp-sa-secretmanager.iam.gserviceaccount.com
 *   regional-secret-with-rotation:
 *     type: gcp:secretmanager:RegionalSecret
 *     properties:
 *       secretId: tf-reg-secret
 *       location: us-central1
 *       topics:
 *         - name: ${topic.id}
 *       rotation:
 *         rotationPeriod: 3600s
 *         nextRotationTime: 2045-11-30T00:00:00Z
 *     options:
 *       dependsOn:
 *         - ${secretsManagerAccess}
 * variables:
 *   project:
 *     fn::invoke:
 *       function: gcp:organizations:getProject
 *       arguments: {}
 * ```
 * 
 * ### Regional Secret With Ttl
 * 
 * ```typescript
 * import * as pulumi from "@pulumi/pulumi";
 * import * as gcp from "@pulumi/gcp";
 * const regional_secret_with_ttl = new gcp.secretmanager.RegionalSecret("regional-secret-with-ttl", {
 *     secretId: "tf-reg-secret",
 *     location: "us-central1",
 *     labels: {
 *         label: "my-label",
 *     },
 *     annotations: {
 *         key1: "value1",
 *         key2: "value2",
 *         key3: "value3",
 *     },
 *     ttl: "36000s",
 * });
 * ```
 * ```python
 * import pulumi
 * import pulumi_gcp as gcp
 * regional_secret_with_ttl = gcp.secretmanager.RegionalSecret("regional-secret-with-ttl",
 *     secret_id="tf-reg-secret",
 *     location="us-central1",
 *     labels={
 *         "label": "my-label",
 *     },
 *     annotations={
 *         "key1": "value1",
 *         "key2": "value2",
 *         "key3": "value3",
 *     },
 *     ttl="36000s")
 * ```
 * ```csharp
 * using System.Collections.Generic;
 * using System.Linq;
 * using Pulumi;
 * using Gcp = Pulumi.Gcp;
 * return await Deployment.RunAsync(() =>
 * {
 *     var regional_secret_with_ttl = new Gcp.SecretManager.RegionalSecret("regional-secret-with-ttl", new()
 *     {
 *         SecretId = "tf-reg-secret",
 *         Location = "us-central1",
 *         Labels =
 *         {
 *             { "label", "my-label" },
 *         },
 *         Annotations =
 *         {
 *             { "key1", "value1" },
 *             { "key2", "value2" },
 *             { "key3", "value3" },
 *         },
 *         Ttl = "36000s",
 *     });
 * });
 * ```
 * ```go
 * package main
 * import (
 * 	"github.com/pulumi/pulumi-gcp/sdk/v8/go/gcp/secretmanager"
 * 	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
 * )
 * func main() {
 * 	pulumi.Run(func(ctx *pulumi.Context) error {
 * 		_, err := secretmanager.NewRegionalSecret(ctx, "regional-secret-with-ttl", &secretmanager.RegionalSecretArgs{
 * 			SecretId: pulumi.String("tf-reg-secret"),
 * 			Location: pulumi.String("us-central1"),
 * 			Labels: pulumi.StringMap{
 * 				"label": pulumi.String("my-label"),
 * 			},
 * 			Annotations: pulumi.StringMap{
 * 				"key1": pulumi.String("value1"),
 * 				"key2": pulumi.String("value2"),
 * 				"key3": pulumi.String("value3"),
 * 			},
 * 			Ttl: pulumi.String("36000s"),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		return nil
 * 	})
 * }
 * ```
 * ```java
 * package generated_program;
 * import com.pulumi.Context;
 * import com.pulumi.Pulumi;
 * import com.pulumi.core.Output;
 * import com.pulumi.gcp.secretmanager.RegionalSecret;
 * import com.pulumi.gcp.secretmanager.RegionalSecretArgs;
 * import java.util.List;
 * import java.util.ArrayList;
 * import java.util.Map;
 * import java.io.File;
 * import java.nio.file.Files;
 * import java.nio.file.Paths;
 * public class App {
 *     public static void main(String[] args) {
 *         Pulumi.run(App::stack);
 *     }
 *     public static void stack(Context ctx) {
 *         var regional_secret_with_ttl = new RegionalSecret("regional-secret-with-ttl", RegionalSecretArgs.builder()
 *             .secretId("tf-reg-secret")
 *             .location("us-central1")
 *             .labels(Map.of("label", "my-label"))
 *             .annotations(Map.ofEntries(
 *                 Map.entry("key1", "value1"),
 *                 Map.entry("key2", "value2"),
 *                 Map.entry("key3", "value3")
 *             ))
 *             .ttl("36000s")
 *             .build());
 *     }
 * }
 * ```
 * ```yaml
 * resources:
 *   regional-secret-with-ttl:
 *     type: gcp:secretmanager:RegionalSecret
 *     properties:
 *       secretId: tf-reg-secret
 *       location: us-central1
 *       labels:
 *         label: my-label
 *       annotations:
 *         key1: value1
 *         key2: value2
 *         key3: value3
 *       ttl: 36000s
 * ```
 * 
 * ### Regional Secret With Expire Time
 * 
 * ```typescript
 * import * as pulumi from "@pulumi/pulumi";
 * import * as gcp from "@pulumi/gcp";
 * const regional_secret_with_expire_time = new gcp.secretmanager.RegionalSecret("regional-secret-with-expire-time", {
 *     secretId: "tf-reg-secret",
 *     location: "us-central1",
 *     labels: {
 *         label: "my-label",
 *     },
 *     annotations: {
 *         key1: "value1",
 *         key2: "value2",
 *         key3: "value3",
 *     },
 *     expireTime: "2055-11-30T00:00:00Z",
 * });
 * ```
 * ```python
 * import pulumi
 * import pulumi_gcp as gcp
 * regional_secret_with_expire_time = gcp.secretmanager.RegionalSecret("regional-secret-with-expire-time",
 *     secret_id="tf-reg-secret",
 *     location="us-central1",
 *     labels={
 *         "label": "my-label",
 *     },
 *     annotations={
 *         "key1": "value1",
 *         "key2": "value2",
 *         "key3": "value3",
 *     },
 *     expire_time="2055-11-30T00:00:00Z")
 * ```
 * ```csharp
 * using System.Collections.Generic;
 * using System.Linq;
 * using Pulumi;
 * using Gcp = Pulumi.Gcp;
 * return await Deployment.RunAsync(() =>
 * {
 *     var regional_secret_with_expire_time = new Gcp.SecretManager.RegionalSecret("regional-secret-with-expire-time", new()
 *     {
 *         SecretId = "tf-reg-secret",
 *         Location = "us-central1",
 *         Labels =
 *         {
 *             { "label", "my-label" },
 *         },
 *         Annotations =
 *         {
 *             { "key1", "value1" },
 *             { "key2", "value2" },
 *             { "key3", "value3" },
 *         },
 *         ExpireTime = "2055-11-30T00:00:00Z",
 *     });
 * });
 * ```
 * ```go
 * package main
 * import (
 * 	"github.com/pulumi/pulumi-gcp/sdk/v8/go/gcp/secretmanager"
 * 	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
 * )
 * func main() {
 * 	pulumi.Run(func(ctx *pulumi.Context) error {
 * 		_, err := secretmanager.NewRegionalSecret(ctx, "regional-secret-with-expire-time", &secretmanager.RegionalSecretArgs{
 * 			SecretId: pulumi.String("tf-reg-secret"),
 * 			Location: pulumi.String("us-central1"),
 * 			Labels: pulumi.StringMap{
 * 				"label": pulumi.String("my-label"),
 * 			},
 * 			Annotations: pulumi.StringMap{
 * 				"key1": pulumi.String("value1"),
 * 				"key2": pulumi.String("value2"),
 * 				"key3": pulumi.String("value3"),
 * 			},
 * 			ExpireTime: pulumi.String("2055-11-30T00:00:00Z"),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		return nil
 * 	})
 * }
 * ```
 * ```java
 * package generated_program;
 * import com.pulumi.Context;
 * import com.pulumi.Pulumi;
 * import com.pulumi.core.Output;
 * import com.pulumi.gcp.secretmanager.RegionalSecret;
 * import com.pulumi.gcp.secretmanager.RegionalSecretArgs;
 * import java.util.List;
 * import java.util.ArrayList;
 * import java.util.Map;
 * import java.io.File;
 * import java.nio.file.Files;
 * import java.nio.file.Paths;
 * public class App {
 *     public static void main(String[] args) {
 *         Pulumi.run(App::stack);
 *     }
 *     public static void stack(Context ctx) {
 *         var regional_secret_with_expire_time = new RegionalSecret("regional-secret-with-expire-time", RegionalSecretArgs.builder()
 *             .secretId("tf-reg-secret")
 *             .location("us-central1")
 *             .labels(Map.of("label", "my-label"))
 *             .annotations(Map.ofEntries(
 *                 Map.entry("key1", "value1"),
 *                 Map.entry("key2", "value2"),
 *                 Map.entry("key3", "value3")
 *             ))
 *             .expireTime("2055-11-30T00:00:00Z")
 *             .build());
 *     }
 * }
 * ```
 * ```yaml
 * resources:
 *   regional-secret-with-expire-time:
 *     type: gcp:secretmanager:RegionalSecret
 *     properties:
 *       secretId: tf-reg-secret
 *       location: us-central1
 *       labels:
 *         label: my-label
 *       annotations:
 *         key1: value1
 *         key2: value2
 *         key3: value3
 *       expireTime: 2055-11-30T00:00:00Z
 * ```
 * 
 * ### Regional Secret With Version Destroy Ttl
 * 
 * ```typescript
 * import * as pulumi from "@pulumi/pulumi";
 * import * as gcp from "@pulumi/gcp";
 * const regional_secret_with_version_destroy_ttl = new gcp.secretmanager.RegionalSecret("regional-secret-with-version-destroy-ttl", {
 *     secretId: "tf-reg-secret",
 *     location: "us-central1",
 *     labels: {
 *         label: "my-label",
 *     },
 *     annotations: {
 *         key1: "value1",
 *         key2: "value2",
 *         key3: "value3",
 *     },
 *     versionDestroyTtl: "86400s",
 * });
 * ```
 * ```python
 * import pulumi
 * import pulumi_gcp as gcp
 * regional_secret_with_version_destroy_ttl = gcp.secretmanager.RegionalSecret("regional-secret-with-version-destroy-ttl",
 *     secret_id="tf-reg-secret",
 *     location="us-central1",
 *     labels={
 *         "label": "my-label",
 *     },
 *     annotations={
 *         "key1": "value1",
 *         "key2": "value2",
 *         "key3": "value3",
 *     },
 *     version_destroy_ttl="86400s")
 * ```
 * ```csharp
 * using System.Collections.Generic;
 * using System.Linq;
 * using Pulumi;
 * using Gcp = Pulumi.Gcp;
 * return await Deployment.RunAsync(() =>
 * {
 *     var regional_secret_with_version_destroy_ttl = new Gcp.SecretManager.RegionalSecret("regional-secret-with-version-destroy-ttl", new()
 *     {
 *         SecretId = "tf-reg-secret",
 *         Location = "us-central1",
 *         Labels =
 *         {
 *             { "label", "my-label" },
 *         },
 *         Annotations =
 *         {
 *             { "key1", "value1" },
 *             { "key2", "value2" },
 *             { "key3", "value3" },
 *         },
 *         VersionDestroyTtl = "86400s",
 *     });
 * });
 * ```
 * ```go
 * package main
 * import (
 * 	"github.com/pulumi/pulumi-gcp/sdk/v8/go/gcp/secretmanager"
 * 	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
 * )
 * func main() {
 * 	pulumi.Run(func(ctx *pulumi.Context) error {
 * 		_, err := secretmanager.NewRegionalSecret(ctx, "regional-secret-with-version-destroy-ttl", &secretmanager.RegionalSecretArgs{
 * 			SecretId: pulumi.String("tf-reg-secret"),
 * 			Location: pulumi.String("us-central1"),
 * 			Labels: pulumi.StringMap{
 * 				"label": pulumi.String("my-label"),
 * 			},
 * 			Annotations: pulumi.StringMap{
 * 				"key1": pulumi.String("value1"),
 * 				"key2": pulumi.String("value2"),
 * 				"key3": pulumi.String("value3"),
 * 			},
 * 			VersionDestroyTtl: pulumi.String("86400s"),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		return nil
 * 	})
 * }
 * ```
 * ```java
 * package generated_program;
 * import com.pulumi.Context;
 * import com.pulumi.Pulumi;
 * import com.pulumi.core.Output;
 * import com.pulumi.gcp.secretmanager.RegionalSecret;
 * import com.pulumi.gcp.secretmanager.RegionalSecretArgs;
 * import java.util.List;
 * import java.util.ArrayList;
 * import java.util.Map;
 * import java.io.File;
 * import java.nio.file.Files;
 * import java.nio.file.Paths;
 * public class App {
 *     public static void main(String[] args) {
 *         Pulumi.run(App::stack);
 *     }
 *     public static void stack(Context ctx) {
 *         var regional_secret_with_version_destroy_ttl = new RegionalSecret("regional-secret-with-version-destroy-ttl", RegionalSecretArgs.builder()
 *             .secretId("tf-reg-secret")
 *             .location("us-central1")
 *             .labels(Map.of("label", "my-label"))
 *             .annotations(Map.ofEntries(
 *                 Map.entry("key1", "value1"),
 *                 Map.entry("key2", "value2"),
 *                 Map.entry("key3", "value3")
 *             ))
 *             .versionDestroyTtl("86400s")
 *             .build());
 *     }
 * }
 * ```
 * ```yaml
 * resources:
 *   regional-secret-with-version-destroy-ttl:
 *     type: gcp:secretmanager:RegionalSecret
 *     properties:
 *       secretId: tf-reg-secret
 *       location: us-central1
 *       labels:
 *         label: my-label
 *       annotations:
 *         key1: value1
 *         key2: value2
 *         key3: value3
 *       versionDestroyTtl: 86400s
 * ```
 * 
 * ## Import
 * RegionalSecret can be imported using any of these accepted formats:
 * * `projects/{{project}}/locations/{{location}}/secrets/{{secret_id}}`
 * * `{{project}}/{{location}}/{{secret_id}}`
 * * `{{location}}/{{secret_id}}`
 * When using the `pulumi import` command, RegionalSecret can be imported using one of the formats above. For example:
 * ```sh
 * $ pulumi import gcp:secretmanager/regionalSecret:RegionalSecret default projects/{{project}}/locations/{{location}}/secrets/{{secret_id}}
 * ```
 * ```sh
 * $ pulumi import gcp:secretmanager/regionalSecret:RegionalSecret default {{project}}/{{location}}/{{secret_id}}
 * ```
 * ```sh
 * $ pulumi import gcp:secretmanager/regionalSecret:RegionalSecret default {{location}}/{{secret_id}}
 * ```
 */
public class RegionalSecret internal constructor(
    override val javaResource: com.pulumi.gcp.secretmanager.RegionalSecret,
) : KotlinCustomResource(javaResource, RegionalSecretMapper) {
    /**
     * Custom metadata about the regional secret.
     * Annotations are distinct from various forms of labels. Annotations exist to allow
     * client tools to store their own state information without requiring a database.
     * Annotation keys must be between 1 and 63 characters long, have a UTF-8 encoding of
     * maximum 128 bytes, begin and end with an alphanumeric character ([a-z0-9A-Z]), and
     * may have dashes (-), underscores (_), dots (.), and alphanumerics in between these
     * symbols.
     * The total size of annotation keys and values must be less than 16KiB.
     * An object containing a list of "key": value pairs. Example:
     * { "name": "wrench", "mass": "1.3kg", "count": "3" }.
     * **Note**: This field is non-authoritative, and will only manage the annotations present in your configuration.
     * Please refer to the field `effective_annotations` for all of the annotations present on the resource.
     */
    public val annotations: Output>?
        get() = javaResource.annotations().applyValue({ args0 ->
            args0.map({ args0 ->
                args0.map({ args0 ->
                    args0.key.to(args0.value)
                }).toMap()
            }).orElse(null)
        })

    /**
     * The time at which the regional secret was created.
     */
    public val createTime: Output
        get() = javaResource.createTime().applyValue({ args0 -> args0 })

    /**
     * The customer-managed encryption configuration of the regional secret.
     * Structure is documented below.
     */
    public val customerManagedEncryption: Output?
        get() = javaResource.customerManagedEncryption().applyValue({ args0 ->
            args0.map({ args0 ->
                args0.let({ args0 ->
                    regionalSecretCustomerManagedEncryptionToKotlin(args0)
                })
            }).orElse(null)
        })

    public val effectiveAnnotations: Output>
        get() = javaResource.effectiveAnnotations().applyValue({ args0 ->
            args0.map({ args0 ->
                args0.key.to(args0.value)
            }).toMap()
        })

    /**
     * All of labels (key/value pairs) present on the resource in GCP, including the labels configured through Pulumi, other clients and services.
     */
    public val effectiveLabels: Output>
        get() = javaResource.effectiveLabels().applyValue({ args0 ->
            args0.map({ args0 ->
                args0.key.to(args0.value)
            }).toMap()
        })

    /**
     * Timestamp in UTC when the regional secret is scheduled to expire. This is always provided on
     * output, regardless of what was sent on input. A timestamp in RFC3339 UTC "Zulu" format, with
     * nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and
     * "2014-10-02T15:01:23.045123456Z". Only one of `expire_time` or `ttl` can be provided.
     */
    public val expireTime: Output
        get() = javaResource.expireTime().applyValue({ args0 -> args0 })

    /**
     * The labels assigned to this regional secret.
     * Label keys must be between 1 and 63 characters long, have a UTF-8 encoding of maximum 128 bytes,
     * and must conform to the following PCRE regular expression: [\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62}
     * Label values must be between 0 and 63 characters long, have a UTF-8 encoding of maximum 128 bytes,
     * and must conform to the following PCRE regular expression: [\p{Ll}\p{Lo}\p{N}_-]{0,63}
     * No more than 64 labels can be assigned to a given resource.
     * An object containing a list of "key": value pairs. Example:
     * { "name": "wrench", "mass": "1.3kg", "count": "3" }.
     * **Note**: This field is non-authoritative, and will only manage the labels present in your configuration.
     * Please refer to the field `effective_labels` for all of the labels present on the resource.
     */
    public val labels: Output>?
        get() = javaResource.labels().applyValue({ args0 ->
            args0.map({ args0 ->
                args0.map({ args0 ->
                    args0.key.to(args0.value)
                }).toMap()
            }).orElse(null)
        })

    /**
     * The location of the regional secret. eg us-central1
     */
    public val location: Output
        get() = javaResource.location().applyValue({ args0 -> args0 })

    /**
     * The resource name of the regional secret. Format:
     * `projects/{{project}}/locations/{{location}}/secrets/{{secret_id}}`
     */
    public val name: Output
        get() = javaResource.name().applyValue({ args0 -> args0 })

    /**
     * The ID of the project in which the resource belongs.
     * If it is not provided, the provider project is used.
     */
    public val project: Output
        get() = javaResource.project().applyValue({ args0 -> args0 })

    /**
     * The combination of labels configured directly on the resource
     * and default labels configured on the provider.
     */
    public val pulumiLabels: Output>
        get() = javaResource.pulumiLabels().applyValue({ args0 ->
            args0.map({ args0 ->
                args0.key.to(args0.value)
            }).toMap()
        })

    /**
     * The rotation time and period for a regional secret. At `next_rotation_time`, Secret Manager
     * will send a Pub/Sub notification to the topics configured on the Secret. `topics` must be
     * set to configure rotation.
     * Structure is documented below.
     */
    public val rotation: Output?
        get() = javaResource.rotation().applyValue({ args0 ->
            args0.map({ args0 ->
                args0.let({ args0 ->
                    regionalSecretRotationToKotlin(args0)
                })
            }).orElse(null)
        })

    /**
     * This must be unique within the project.
     * - - -
     */
    public val secretId: Output
        get() = javaResource.secretId().applyValue({ args0 -> args0 })

    /**
     * A list of up to 10 Pub/Sub topics to which messages are published when control plane
     * operations are called on the regional secret or its versions.
     * Structure is documented below.
     */
    public val topics: Output>?
        get() = javaResource.topics().applyValue({ args0 ->
            args0.map({ args0 ->
                args0.map({ args0 ->
                    args0.let({ args0 -> regionalSecretTopicToKotlin(args0) })
                })
            }).orElse(null)
        })

    /**
     * The TTL for the regional secret. A duration in seconds with up to nine fractional digits,
     * terminated by 's'. Example: "3.5s". Only one of `ttl` or `expire_time` can be provided.
     */
    public val ttl: Output?
        get() = javaResource.ttl().applyValue({ args0 -> args0.map({ args0 -> args0 }).orElse(null) })

    /**
     * Mapping from version alias to version name.
     * A version alias is a string with a maximum length of 63 characters and can contain
     * uppercase and lowercase letters, numerals, and the hyphen (-) and underscore ('_')
     * characters. An alias string must start with a letter and cannot be the string
     * 'latest' or 'NEW'. No more than 50 aliases can be assigned to a given secret.
     * An object containing a list of "key": value pairs. Example:
     * { "name": "wrench", "mass": "1.3kg", "count": "3" }.
     */
    public val versionAliases: Output>?
        get() = javaResource.versionAliases().applyValue({ args0 ->
            args0.map({ args0 ->
                args0.map({ args0 -> args0.key.to(args0.value) }).toMap()
            }).orElse(null)
        })

    /**
     * Secret Version TTL after destruction request.
     * This is a part of the delayed delete feature on Secret Version.
     * For secret with versionDestroyTtl>0, version destruction doesn't happen immediately
     * on calling destroy instead the version goes to a disabled state and
     * the actual destruction happens after this TTL expires. It must be atleast 24h.
     */
    public val versionDestroyTtl: Output?
        get() = javaResource.versionDestroyTtl().applyValue({ args0 ->
            args0.map({ args0 ->
                args0
            }).orElse(null)
        })
}

public object RegionalSecretMapper : ResourceMapper {
    override fun supportsMappingOfType(javaResource: Resource): Boolean =
        com.pulumi.gcp.secretmanager.RegionalSecret::class == javaResource::class

    override fun map(javaResource: Resource): RegionalSecret = RegionalSecret(
        javaResource as
            com.pulumi.gcp.secretmanager.RegionalSecret,
    )
}

/**
 * @see [RegionalSecret].
 * @param name The _unique_ name of the resulting resource.
 * @param block Builder for [RegionalSecret].
 */
public suspend fun regionalSecret(
    name: String,
    block: suspend RegionalSecretResourceBuilder.() -> Unit,
): RegionalSecret {
    val builder = RegionalSecretResourceBuilder()
    builder.name(name)
    block(builder)
    return builder.build()
}

/**
 * @see [RegionalSecret].
 * @param name The _unique_ name of the resulting resource.
 */
public fun regionalSecret(name: String): RegionalSecret {
    val builder = RegionalSecretResourceBuilder()
    builder.name(name)
    return builder.build()
}




© 2015 - 2025 Weber Informatics LLC | Privacy Policy