1. Packages
  2. OpenStack
  3. API Docs
  4. keymanager
  5. SecretV1
OpenStack v3.14.0 published on Tuesday, Oct 31, 2023 by Pulumi

openstack.keymanager.SecretV1

Explore with Pulumi AI

openstack logo
OpenStack v3.14.0 published on Tuesday, Oct 31, 2023 by Pulumi

    Import

    Secrets can be imported using the secret id (the last part of the secret reference), e.g.:

     $ pulumi import openstack:keymanager/secretV1:SecretV1 secret_1 8a7a79c2-cf17-4e65-b2ae-ddc8bfcf6c74
    

    Example Usage

    Simple secret

    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using OpenStack = Pulumi.OpenStack;
    
    return await Deployment.RunAsync(() => 
    {
        var secret1 = new OpenStack.KeyManager.SecretV1("secret1", new()
        {
            Algorithm = "aes",
            BitLength = 256,
            Metadata = 
            {
                { "key", "foo" },
            },
            Mode = "cbc",
            Payload = "foobar",
            PayloadContentType = "text/plain",
            SecretType = "passphrase",
        });
    
    });
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-openstack/sdk/v3/go/openstack/keymanager"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := keymanager.NewSecretV1(ctx, "secret1", &keymanager.SecretV1Args{
    			Algorithm: pulumi.String("aes"),
    			BitLength: pulumi.Int(256),
    			Metadata: pulumi.Map{
    				"key": pulumi.Any("foo"),
    			},
    			Mode:               pulumi.String("cbc"),
    			Payload:            pulumi.String("foobar"),
    			PayloadContentType: pulumi.String("text/plain"),
    			SecretType:         pulumi.String("passphrase"),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.openstack.keymanager.SecretV1;
    import com.pulumi.openstack.keymanager.SecretV1Args;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var secret1 = new SecretV1("secret1", SecretV1Args.builder()        
                .algorithm("aes")
                .bitLength(256)
                .metadata(Map.of("key", "foo"))
                .mode("cbc")
                .payload("foobar")
                .payloadContentType("text/plain")
                .secretType("passphrase")
                .build());
    
        }
    }
    
    import pulumi
    import pulumi_openstack as openstack
    
    secret1 = openstack.keymanager.SecretV1("secret1",
        algorithm="aes",
        bit_length=256,
        metadata={
            "key": "foo",
        },
        mode="cbc",
        payload="foobar",
        payload_content_type="text/plain",
        secret_type="passphrase")
    
    import * as pulumi from "@pulumi/pulumi";
    import * as openstack from "@pulumi/openstack";
    
    const secret1 = new openstack.keymanager.SecretV1("secret1", {
        algorithm: "aes",
        bitLength: 256,
        metadata: {
            key: "foo",
        },
        mode: "cbc",
        payload: "foobar",
        payloadContentType: "text/plain",
        secretType: "passphrase",
    });
    
    resources:
      secret1:
        type: openstack:keymanager:SecretV1
        properties:
          algorithm: aes
          bitLength: 256
          metadata:
            key: foo
          mode: cbc
          payload: foobar
          payloadContentType: text/plain
          secretType: passphrase
    

    Secret with the ACL

    using System.Collections.Generic;
    using System.IO;
    using System.Linq;
    using Pulumi;
    using OpenStack = Pulumi.OpenStack;
    
    return await Deployment.RunAsync(() => 
    {
        var secret1 = new OpenStack.KeyManager.SecretV1("secret1", new()
        {
            Payload = File.ReadAllText("certificate.pem"),
            SecretType = "certificate",
            PayloadContentType = "text/plain",
            Acl = new OpenStack.KeyManager.Inputs.SecretV1AclArgs
            {
                Read = new OpenStack.KeyManager.Inputs.SecretV1AclReadArgs
                {
                    ProjectAccess = false,
                    Users = new[]
                    {
                        "userid1",
                        "userid2",
                    },
                },
            },
        });
    
    });
    
    package main
    
    import (
    	"os"
    
    	"github.com/pulumi/pulumi-openstack/sdk/v3/go/openstack/keymanager"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func readFileOrPanic(path string) pulumi.StringPtrInput {
    	data, err := os.ReadFile(path)
    	if err != nil {
    		panic(err.Error())
    	}
    	return pulumi.String(string(data))
    }
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := keymanager.NewSecretV1(ctx, "secret1", &keymanager.SecretV1Args{
    			Payload:            readFileOrPanic("certificate.pem"),
    			SecretType:         pulumi.String("certificate"),
    			PayloadContentType: pulumi.String("text/plain"),
    			Acl: &keymanager.SecretV1AclArgs{
    				Read: &keymanager.SecretV1AclReadArgs{
    					ProjectAccess: pulumi.Bool(false),
    					Users: pulumi.StringArray{
    						pulumi.String("userid1"),
    						pulumi.String("userid2"),
    					},
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.openstack.keymanager.SecretV1;
    import com.pulumi.openstack.keymanager.SecretV1Args;
    import com.pulumi.openstack.keymanager.inputs.SecretV1AclArgs;
    import com.pulumi.openstack.keymanager.inputs.SecretV1AclReadArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var secret1 = new SecretV1("secret1", SecretV1Args.builder()        
                .payload(Files.readString(Paths.get("certificate.pem")))
                .secretType("certificate")
                .payloadContentType("text/plain")
                .acl(SecretV1AclArgs.builder()
                    .read(SecretV1AclReadArgs.builder()
                        .projectAccess(false)
                        .users(                    
                            "userid1",
                            "userid2")
                        .build())
                    .build())
                .build());
    
        }
    }
    
    import pulumi
    import pulumi_openstack as openstack
    
    secret1 = openstack.keymanager.SecretV1("secret1",
        payload=(lambda path: open(path).read())("certificate.pem"),
        secret_type="certificate",
        payload_content_type="text/plain",
        acl=openstack.keymanager.SecretV1AclArgs(
            read=openstack.keymanager.SecretV1AclReadArgs(
                project_access=False,
                users=[
                    "userid1",
                    "userid2",
                ],
            ),
        ))
    
    import * as pulumi from "@pulumi/pulumi";
    import * as fs from "fs";
    import * as openstack from "@pulumi/openstack";
    
    const secret1 = new openstack.keymanager.SecretV1("secret1", {
        payload: fs.readFileSync("certificate.pem"),
        secretType: "certificate",
        payloadContentType: "text/plain",
        acl: {
            read: {
                projectAccess: false,
                users: [
                    "userid1",
                    "userid2",
                ],
            },
        },
    });
    
    resources:
      secret1:
        type: openstack:keymanager:SecretV1
        properties:
          payload:
            fn::readFile: certificate.pem
          secretType: certificate
          payloadContentType: text/plain
          acl:
            read:
              projectAccess: false
              users:
                - userid1
                - userid2
    

    Create SecretV1 Resource

    new SecretV1(name: string, args?: SecretV1Args, opts?: CustomResourceOptions);
    @overload
    def SecretV1(resource_name: str,
                 opts: Optional[ResourceOptions] = None,
                 acl: Optional[SecretV1AclArgs] = None,
                 algorithm: Optional[str] = None,
                 bit_length: Optional[int] = None,
                 expiration: Optional[str] = None,
                 metadata: Optional[Mapping[str, Any]] = None,
                 mode: Optional[str] = None,
                 name: Optional[str] = None,
                 payload: Optional[str] = None,
                 payload_content_encoding: Optional[str] = None,
                 payload_content_type: Optional[str] = None,
                 region: Optional[str] = None,
                 secret_type: Optional[str] = None)
    @overload
    def SecretV1(resource_name: str,
                 args: Optional[SecretV1Args] = None,
                 opts: Optional[ResourceOptions] = None)
    func NewSecretV1(ctx *Context, name string, args *SecretV1Args, opts ...ResourceOption) (*SecretV1, error)
    public SecretV1(string name, SecretV1Args? args = null, CustomResourceOptions? opts = null)
    public SecretV1(String name, SecretV1Args args)
    public SecretV1(String name, SecretV1Args args, CustomResourceOptions options)
    
    type: openstack:keymanager:SecretV1
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    
    name string
    The unique name of the resource.
    args SecretV1Args
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args SecretV1Args
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args SecretV1Args
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args SecretV1Args
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args SecretV1Args
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    SecretV1 Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    The SecretV1 resource accepts the following input properties:

    Acl Pulumi.OpenStack.KeyManager.Inputs.SecretV1Acl

    Allows to control an access to a secret. Currently only the read operation is supported. If not specified, the secret is accessible project wide.

    Algorithm string

    Metadata provided by a user or system for informational purposes.

    BitLength int

    Metadata provided by a user or system for informational purposes.

    Expiration string

    The expiration time of the secret in the RFC3339 timestamp format (e.g. 2019-03-09T12:58:49Z). If omitted, a secret will never expire. Changing this creates a new secret.

    Metadata Dictionary<string, object>

    Additional Metadata for the secret.

    Mode string

    Metadata provided by a user or system for informational purposes.

    Name string

    Human-readable name for the Secret. Does not have to be unique.

    Payload string

    The secret's data to be stored. payload_content_type must also be supplied if payload is included.

    PayloadContentEncoding string

    (required if payload is encoded) The encoding used for the payload to be able to include it in the JSON request. Must be either base64 or binary.

    PayloadContentType string

    (required if payload is included) The media type for the content of the payload. Must be one of text/plain, text/plain;charset=utf-8, text/plain; charset=utf-8, application/octet-stream, application/pkcs8.

    Region string

    The region in which to obtain the V1 KeyManager client. A KeyManager client is needed to create a secret. If omitted, the region argument of the provider is used. Changing this creates a new V1 secret.

    SecretType string

    Used to indicate the type of secret being stored. For more information see Secret types.

    Acl SecretV1AclArgs

    Allows to control an access to a secret. Currently only the read operation is supported. If not specified, the secret is accessible project wide.

    Algorithm string

    Metadata provided by a user or system for informational purposes.

    BitLength int

    Metadata provided by a user or system for informational purposes.

    Expiration string

    The expiration time of the secret in the RFC3339 timestamp format (e.g. 2019-03-09T12:58:49Z). If omitted, a secret will never expire. Changing this creates a new secret.

    Metadata map[string]interface{}

    Additional Metadata for the secret.

    Mode string

    Metadata provided by a user or system for informational purposes.

    Name string

    Human-readable name for the Secret. Does not have to be unique.

    Payload string

    The secret's data to be stored. payload_content_type must also be supplied if payload is included.

    PayloadContentEncoding string

    (required if payload is encoded) The encoding used for the payload to be able to include it in the JSON request. Must be either base64 or binary.

    PayloadContentType string

    (required if payload is included) The media type for the content of the payload. Must be one of text/plain, text/plain;charset=utf-8, text/plain; charset=utf-8, application/octet-stream, application/pkcs8.

    Region string

    The region in which to obtain the V1 KeyManager client. A KeyManager client is needed to create a secret. If omitted, the region argument of the provider is used. Changing this creates a new V1 secret.

    SecretType string

    Used to indicate the type of secret being stored. For more information see Secret types.

    acl SecretV1Acl

    Allows to control an access to a secret. Currently only the read operation is supported. If not specified, the secret is accessible project wide.

    algorithm String

    Metadata provided by a user or system for informational purposes.

    bitLength Integer

    Metadata provided by a user or system for informational purposes.

    expiration String

    The expiration time of the secret in the RFC3339 timestamp format (e.g. 2019-03-09T12:58:49Z). If omitted, a secret will never expire. Changing this creates a new secret.

    metadata Map<String,Object>

    Additional Metadata for the secret.

    mode String

    Metadata provided by a user or system for informational purposes.

    name String

    Human-readable name for the Secret. Does not have to be unique.

    payload String

    The secret's data to be stored. payload_content_type must also be supplied if payload is included.

    payloadContentEncoding String

    (required if payload is encoded) The encoding used for the payload to be able to include it in the JSON request. Must be either base64 or binary.

    payloadContentType String

    (required if payload is included) The media type for the content of the payload. Must be one of text/plain, text/plain;charset=utf-8, text/plain; charset=utf-8, application/octet-stream, application/pkcs8.

    region String

    The region in which to obtain the V1 KeyManager client. A KeyManager client is needed to create a secret. If omitted, the region argument of the provider is used. Changing this creates a new V1 secret.

    secretType String

    Used to indicate the type of secret being stored. For more information see Secret types.

    acl SecretV1Acl

    Allows to control an access to a secret. Currently only the read operation is supported. If not specified, the secret is accessible project wide.

    algorithm string

    Metadata provided by a user or system for informational purposes.

    bitLength number

    Metadata provided by a user or system for informational purposes.

    expiration string

    The expiration time of the secret in the RFC3339 timestamp format (e.g. 2019-03-09T12:58:49Z). If omitted, a secret will never expire. Changing this creates a new secret.

    metadata {[key: string]: any}

    Additional Metadata for the secret.

    mode string

    Metadata provided by a user or system for informational purposes.

    name string

    Human-readable name for the Secret. Does not have to be unique.

    payload string

    The secret's data to be stored. payload_content_type must also be supplied if payload is included.

    payloadContentEncoding string

    (required if payload is encoded) The encoding used for the payload to be able to include it in the JSON request. Must be either base64 or binary.

    payloadContentType string

    (required if payload is included) The media type for the content of the payload. Must be one of text/plain, text/plain;charset=utf-8, text/plain; charset=utf-8, application/octet-stream, application/pkcs8.

    region string

    The region in which to obtain the V1 KeyManager client. A KeyManager client is needed to create a secret. If omitted, the region argument of the provider is used. Changing this creates a new V1 secret.

    secretType string

    Used to indicate the type of secret being stored. For more information see Secret types.

    acl SecretV1AclArgs

    Allows to control an access to a secret. Currently only the read operation is supported. If not specified, the secret is accessible project wide.

    algorithm str

    Metadata provided by a user or system for informational purposes.

    bit_length int

    Metadata provided by a user or system for informational purposes.

    expiration str

    The expiration time of the secret in the RFC3339 timestamp format (e.g. 2019-03-09T12:58:49Z). If omitted, a secret will never expire. Changing this creates a new secret.

    metadata Mapping[str, Any]

    Additional Metadata for the secret.

    mode str

    Metadata provided by a user or system for informational purposes.

    name str

    Human-readable name for the Secret. Does not have to be unique.

    payload str

    The secret's data to be stored. payload_content_type must also be supplied if payload is included.

    payload_content_encoding str

    (required if payload is encoded) The encoding used for the payload to be able to include it in the JSON request. Must be either base64 or binary.

    payload_content_type str

    (required if payload is included) The media type for the content of the payload. Must be one of text/plain, text/plain;charset=utf-8, text/plain; charset=utf-8, application/octet-stream, application/pkcs8.

    region str

    The region in which to obtain the V1 KeyManager client. A KeyManager client is needed to create a secret. If omitted, the region argument of the provider is used. Changing this creates a new V1 secret.

    secret_type str

    Used to indicate the type of secret being stored. For more information see Secret types.

    acl Property Map

    Allows to control an access to a secret. Currently only the read operation is supported. If not specified, the secret is accessible project wide.

    algorithm String

    Metadata provided by a user or system for informational purposes.

    bitLength Number

    Metadata provided by a user or system for informational purposes.

    expiration String

    The expiration time of the secret in the RFC3339 timestamp format (e.g. 2019-03-09T12:58:49Z). If omitted, a secret will never expire. Changing this creates a new secret.

    metadata Map<Any>

    Additional Metadata for the secret.

    mode String

    Metadata provided by a user or system for informational purposes.

    name String

    Human-readable name for the Secret. Does not have to be unique.

    payload String

    The secret's data to be stored. payload_content_type must also be supplied if payload is included.

    payloadContentEncoding String

    (required if payload is encoded) The encoding used for the payload to be able to include it in the JSON request. Must be either base64 or binary.

    payloadContentType String

    (required if payload is included) The media type for the content of the payload. Must be one of text/plain, text/plain;charset=utf-8, text/plain; charset=utf-8, application/octet-stream, application/pkcs8.

    region String

    The region in which to obtain the V1 KeyManager client. A KeyManager client is needed to create a secret. If omitted, the region argument of the provider is used. Changing this creates a new V1 secret.

    secretType String

    Used to indicate the type of secret being stored. For more information see Secret types.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the SecretV1 resource produces the following output properties:

    AllMetadata Dictionary<string, object>

    The map of metadata, assigned on the secret, which has been explicitly and implicitly added.

    ContentTypes Dictionary<string, object>

    The map of the content types, assigned on the secret.

    CreatedAt string

    The date the secret ACL was created.

    CreatorId string

    The creator of the secret.

    Id string

    The provider-assigned unique ID for this managed resource.

    SecretRef string

    The secret reference / where to find the secret.

    Status string

    The status of the secret.

    UpdatedAt string

    The date the secret ACL was last updated.

    AllMetadata map[string]interface{}

    The map of metadata, assigned on the secret, which has been explicitly and implicitly added.

    ContentTypes map[string]interface{}

    The map of the content types, assigned on the secret.

    CreatedAt string

    The date the secret ACL was created.

    CreatorId string

    The creator of the secret.

    Id string

    The provider-assigned unique ID for this managed resource.

    SecretRef string

    The secret reference / where to find the secret.

    Status string

    The status of the secret.

    UpdatedAt string

    The date the secret ACL was last updated.

    allMetadata Map<String,Object>

    The map of metadata, assigned on the secret, which has been explicitly and implicitly added.

    contentTypes Map<String,Object>

    The map of the content types, assigned on the secret.

    createdAt String

    The date the secret ACL was created.

    creatorId String

    The creator of the secret.

    id String

    The provider-assigned unique ID for this managed resource.

    secretRef String

    The secret reference / where to find the secret.

    status String

    The status of the secret.

    updatedAt String

    The date the secret ACL was last updated.

    allMetadata {[key: string]: any}

    The map of metadata, assigned on the secret, which has been explicitly and implicitly added.

    contentTypes {[key: string]: any}

    The map of the content types, assigned on the secret.

    createdAt string

    The date the secret ACL was created.

    creatorId string

    The creator of the secret.

    id string

    The provider-assigned unique ID for this managed resource.

    secretRef string

    The secret reference / where to find the secret.

    status string

    The status of the secret.

    updatedAt string

    The date the secret ACL was last updated.

    all_metadata Mapping[str, Any]

    The map of metadata, assigned on the secret, which has been explicitly and implicitly added.

    content_types Mapping[str, Any]

    The map of the content types, assigned on the secret.

    created_at str

    The date the secret ACL was created.

    creator_id str

    The creator of the secret.

    id str

    The provider-assigned unique ID for this managed resource.

    secret_ref str

    The secret reference / where to find the secret.

    status str

    The status of the secret.

    updated_at str

    The date the secret ACL was last updated.

    allMetadata Map<Any>

    The map of metadata, assigned on the secret, which has been explicitly and implicitly added.

    contentTypes Map<Any>

    The map of the content types, assigned on the secret.

    createdAt String

    The date the secret ACL was created.

    creatorId String

    The creator of the secret.

    id String

    The provider-assigned unique ID for this managed resource.

    secretRef String

    The secret reference / where to find the secret.

    status String

    The status of the secret.

    updatedAt String

    The date the secret ACL was last updated.

    Look up Existing SecretV1 Resource

    Get an existing SecretV1 resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: SecretV1State, opts?: CustomResourceOptions): SecretV1
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            acl: Optional[SecretV1AclArgs] = None,
            algorithm: Optional[str] = None,
            all_metadata: Optional[Mapping[str, Any]] = None,
            bit_length: Optional[int] = None,
            content_types: Optional[Mapping[str, Any]] = None,
            created_at: Optional[str] = None,
            creator_id: Optional[str] = None,
            expiration: Optional[str] = None,
            metadata: Optional[Mapping[str, Any]] = None,
            mode: Optional[str] = None,
            name: Optional[str] = None,
            payload: Optional[str] = None,
            payload_content_encoding: Optional[str] = None,
            payload_content_type: Optional[str] = None,
            region: Optional[str] = None,
            secret_ref: Optional[str] = None,
            secret_type: Optional[str] = None,
            status: Optional[str] = None,
            updated_at: Optional[str] = None) -> SecretV1
    func GetSecretV1(ctx *Context, name string, id IDInput, state *SecretV1State, opts ...ResourceOption) (*SecretV1, error)
    public static SecretV1 Get(string name, Input<string> id, SecretV1State? state, CustomResourceOptions? opts = null)
    public static SecretV1 get(String name, Output<String> id, SecretV1State state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    Acl Pulumi.OpenStack.KeyManager.Inputs.SecretV1Acl

    Allows to control an access to a secret. Currently only the read operation is supported. If not specified, the secret is accessible project wide.

    Algorithm string

    Metadata provided by a user or system for informational purposes.

    AllMetadata Dictionary<string, object>

    The map of metadata, assigned on the secret, which has been explicitly and implicitly added.

    BitLength int

    Metadata provided by a user or system for informational purposes.

    ContentTypes Dictionary<string, object>

    The map of the content types, assigned on the secret.

    CreatedAt string

    The date the secret ACL was created.

    CreatorId string

    The creator of the secret.

    Expiration string

    The expiration time of the secret in the RFC3339 timestamp format (e.g. 2019-03-09T12:58:49Z). If omitted, a secret will never expire. Changing this creates a new secret.

    Metadata Dictionary<string, object>

    Additional Metadata for the secret.

    Mode string

    Metadata provided by a user or system for informational purposes.

    Name string

    Human-readable name for the Secret. Does not have to be unique.

    Payload string

    The secret's data to be stored. payload_content_type must also be supplied if payload is included.

    PayloadContentEncoding string

    (required if payload is encoded) The encoding used for the payload to be able to include it in the JSON request. Must be either base64 or binary.

    PayloadContentType string

    (required if payload is included) The media type for the content of the payload. Must be one of text/plain, text/plain;charset=utf-8, text/plain; charset=utf-8, application/octet-stream, application/pkcs8.

    Region string

    The region in which to obtain the V1 KeyManager client. A KeyManager client is needed to create a secret. If omitted, the region argument of the provider is used. Changing this creates a new V1 secret.

    SecretRef string

    The secret reference / where to find the secret.

    SecretType string

    Used to indicate the type of secret being stored. For more information see Secret types.

    Status string

    The status of the secret.

    UpdatedAt string

    The date the secret ACL was last updated.

    Acl SecretV1AclArgs

    Allows to control an access to a secret. Currently only the read operation is supported. If not specified, the secret is accessible project wide.

    Algorithm string

    Metadata provided by a user or system for informational purposes.

    AllMetadata map[string]interface{}

    The map of metadata, assigned on the secret, which has been explicitly and implicitly added.

    BitLength int

    Metadata provided by a user or system for informational purposes.

    ContentTypes map[string]interface{}

    The map of the content types, assigned on the secret.

    CreatedAt string

    The date the secret ACL was created.

    CreatorId string

    The creator of the secret.

    Expiration string

    The expiration time of the secret in the RFC3339 timestamp format (e.g. 2019-03-09T12:58:49Z). If omitted, a secret will never expire. Changing this creates a new secret.

    Metadata map[string]interface{}

    Additional Metadata for the secret.

    Mode string

    Metadata provided by a user or system for informational purposes.

    Name string

    Human-readable name for the Secret. Does not have to be unique.

    Payload string

    The secret's data to be stored. payload_content_type must also be supplied if payload is included.

    PayloadContentEncoding string

    (required if payload is encoded) The encoding used for the payload to be able to include it in the JSON request. Must be either base64 or binary.

    PayloadContentType string

    (required if payload is included) The media type for the content of the payload. Must be one of text/plain, text/plain;charset=utf-8, text/plain; charset=utf-8, application/octet-stream, application/pkcs8.

    Region string

    The region in which to obtain the V1 KeyManager client. A KeyManager client is needed to create a secret. If omitted, the region argument of the provider is used. Changing this creates a new V1 secret.

    SecretRef string

    The secret reference / where to find the secret.

    SecretType string

    Used to indicate the type of secret being stored. For more information see Secret types.

    Status string

    The status of the secret.

    UpdatedAt string

    The date the secret ACL was last updated.

    acl SecretV1Acl

    Allows to control an access to a secret. Currently only the read operation is supported. If not specified, the secret is accessible project wide.

    algorithm String

    Metadata provided by a user or system for informational purposes.

    allMetadata Map<String,Object>

    The map of metadata, assigned on the secret, which has been explicitly and implicitly added.

    bitLength Integer

    Metadata provided by a user or system for informational purposes.

    contentTypes Map<String,Object>

    The map of the content types, assigned on the secret.

    createdAt String

    The date the secret ACL was created.

    creatorId String

    The creator of the secret.

    expiration String

    The expiration time of the secret in the RFC3339 timestamp format (e.g. 2019-03-09T12:58:49Z). If omitted, a secret will never expire. Changing this creates a new secret.

    metadata Map<String,Object>

    Additional Metadata for the secret.

    mode String

    Metadata provided by a user or system for informational purposes.

    name String

    Human-readable name for the Secret. Does not have to be unique.

    payload String

    The secret's data to be stored. payload_content_type must also be supplied if payload is included.

    payloadContentEncoding String

    (required if payload is encoded) The encoding used for the payload to be able to include it in the JSON request. Must be either base64 or binary.

    payloadContentType String

    (required if payload is included) The media type for the content of the payload. Must be one of text/plain, text/plain;charset=utf-8, text/plain; charset=utf-8, application/octet-stream, application/pkcs8.

    region String

    The region in which to obtain the V1 KeyManager client. A KeyManager client is needed to create a secret. If omitted, the region argument of the provider is used. Changing this creates a new V1 secret.

    secretRef String

    The secret reference / where to find the secret.

    secretType String

    Used to indicate the type of secret being stored. For more information see Secret types.

    status String

    The status of the secret.

    updatedAt String

    The date the secret ACL was last updated.

    acl SecretV1Acl

    Allows to control an access to a secret. Currently only the read operation is supported. If not specified, the secret is accessible project wide.

    algorithm string

    Metadata provided by a user or system for informational purposes.

    allMetadata {[key: string]: any}

    The map of metadata, assigned on the secret, which has been explicitly and implicitly added.

    bitLength number

    Metadata provided by a user or system for informational purposes.

    contentTypes {[key: string]: any}

    The map of the content types, assigned on the secret.

    createdAt string

    The date the secret ACL was created.

    creatorId string

    The creator of the secret.

    expiration string

    The expiration time of the secret in the RFC3339 timestamp format (e.g. 2019-03-09T12:58:49Z). If omitted, a secret will never expire. Changing this creates a new secret.

    metadata {[key: string]: any}

    Additional Metadata for the secret.

    mode string

    Metadata provided by a user or system for informational purposes.

    name string

    Human-readable name for the Secret. Does not have to be unique.

    payload string

    The secret's data to be stored. payload_content_type must also be supplied if payload is included.

    payloadContentEncoding string

    (required if payload is encoded) The encoding used for the payload to be able to include it in the JSON request. Must be either base64 or binary.

    payloadContentType string

    (required if payload is included) The media type for the content of the payload. Must be one of text/plain, text/plain;charset=utf-8, text/plain; charset=utf-8, application/octet-stream, application/pkcs8.

    region string

    The region in which to obtain the V1 KeyManager client. A KeyManager client is needed to create a secret. If omitted, the region argument of the provider is used. Changing this creates a new V1 secret.

    secretRef string

    The secret reference / where to find the secret.

    secretType string

    Used to indicate the type of secret being stored. For more information see Secret types.

    status string

    The status of the secret.

    updatedAt string

    The date the secret ACL was last updated.

    acl SecretV1AclArgs

    Allows to control an access to a secret. Currently only the read operation is supported. If not specified, the secret is accessible project wide.

    algorithm str

    Metadata provided by a user or system for informational purposes.

    all_metadata Mapping[str, Any]

    The map of metadata, assigned on the secret, which has been explicitly and implicitly added.

    bit_length int

    Metadata provided by a user or system for informational purposes.

    content_types Mapping[str, Any]

    The map of the content types, assigned on the secret.

    created_at str

    The date the secret ACL was created.

    creator_id str

    The creator of the secret.

    expiration str

    The expiration time of the secret in the RFC3339 timestamp format (e.g. 2019-03-09T12:58:49Z). If omitted, a secret will never expire. Changing this creates a new secret.

    metadata Mapping[str, Any]

    Additional Metadata for the secret.

    mode str

    Metadata provided by a user or system for informational purposes.

    name str

    Human-readable name for the Secret. Does not have to be unique.

    payload str

    The secret's data to be stored. payload_content_type must also be supplied if payload is included.

    payload_content_encoding str

    (required if payload is encoded) The encoding used for the payload to be able to include it in the JSON request. Must be either base64 or binary.

    payload_content_type str

    (required if payload is included) The media type for the content of the payload. Must be one of text/plain, text/plain;charset=utf-8, text/plain; charset=utf-8, application/octet-stream, application/pkcs8.

    region str

    The region in which to obtain the V1 KeyManager client. A KeyManager client is needed to create a secret. If omitted, the region argument of the provider is used. Changing this creates a new V1 secret.

    secret_ref str

    The secret reference / where to find the secret.

    secret_type str

    Used to indicate the type of secret being stored. For more information see Secret types.

    status str

    The status of the secret.

    updated_at str

    The date the secret ACL was last updated.

    acl Property Map

    Allows to control an access to a secret. Currently only the read operation is supported. If not specified, the secret is accessible project wide.

    algorithm String

    Metadata provided by a user or system for informational purposes.

    allMetadata Map<Any>

    The map of metadata, assigned on the secret, which has been explicitly and implicitly added.

    bitLength Number

    Metadata provided by a user or system for informational purposes.

    contentTypes Map<Any>

    The map of the content types, assigned on the secret.

    createdAt String

    The date the secret ACL was created.

    creatorId String

    The creator of the secret.

    expiration String

    The expiration time of the secret in the RFC3339 timestamp format (e.g. 2019-03-09T12:58:49Z). If omitted, a secret will never expire. Changing this creates a new secret.

    metadata Map<Any>

    Additional Metadata for the secret.

    mode String

    Metadata provided by a user or system for informational purposes.

    name String

    Human-readable name for the Secret. Does not have to be unique.

    payload String

    The secret's data to be stored. payload_content_type must also be supplied if payload is included.

    payloadContentEncoding String

    (required if payload is encoded) The encoding used for the payload to be able to include it in the JSON request. Must be either base64 or binary.

    payloadContentType String

    (required if payload is included) The media type for the content of the payload. Must be one of text/plain, text/plain;charset=utf-8, text/plain; charset=utf-8, application/octet-stream, application/pkcs8.

    region String

    The region in which to obtain the V1 KeyManager client. A KeyManager client is needed to create a secret. If omitted, the region argument of the provider is used. Changing this creates a new V1 secret.

    secretRef String

    The secret reference / where to find the secret.

    secretType String

    Used to indicate the type of secret being stored. For more information see Secret types.

    status String

    The status of the secret.

    updatedAt String

    The date the secret ACL was last updated.

    Supporting Types

    SecretV1Acl, SecretV1AclArgs

    SecretV1AclRead, SecretV1AclReadArgs

    CreatedAt string

    The date the secret ACL was created.

    ProjectAccess bool

    Whether the secret is accessible project wide. Defaults to true.

    UpdatedAt string

    The date the secret ACL was last updated.

    Users List<string>

    The list of user IDs, which are allowed to access the secret, when project_access is set to false.

    CreatedAt string

    The date the secret ACL was created.

    ProjectAccess bool

    Whether the secret is accessible project wide. Defaults to true.

    UpdatedAt string

    The date the secret ACL was last updated.

    Users []string

    The list of user IDs, which are allowed to access the secret, when project_access is set to false.

    createdAt String

    The date the secret ACL was created.

    projectAccess Boolean

    Whether the secret is accessible project wide. Defaults to true.

    updatedAt String

    The date the secret ACL was last updated.

    users List<String>

    The list of user IDs, which are allowed to access the secret, when project_access is set to false.

    createdAt string

    The date the secret ACL was created.

    projectAccess boolean

    Whether the secret is accessible project wide. Defaults to true.

    updatedAt string

    The date the secret ACL was last updated.

    users string[]

    The list of user IDs, which are allowed to access the secret, when project_access is set to false.

    created_at str

    The date the secret ACL was created.

    project_access bool

    Whether the secret is accessible project wide. Defaults to true.

    updated_at str

    The date the secret ACL was last updated.

    users Sequence[str]

    The list of user IDs, which are allowed to access the secret, when project_access is set to false.

    createdAt String

    The date the secret ACL was created.

    projectAccess Boolean

    Whether the secret is accessible project wide. Defaults to true.

    updatedAt String

    The date the secret ACL was last updated.

    users List<String>

    The list of user IDs, which are allowed to access the secret, when project_access is set to false.

    Package Details

    Repository
    OpenStack pulumi/pulumi-openstack
    License
    Apache-2.0
    Notes

    This Pulumi package is based on the openstack Terraform Provider.

    openstack logo
    OpenStack v3.14.0 published on Tuesday, Oct 31, 2023 by Pulumi