Module transit
This provider is a derived work of the Terraform Provider distributed under MPL 2.0. If you encounter a bug or missing feature, first check the
pulumi/pulumi-vaultrepo; however, if that doesn’t turn up anything, please consult the sourceterraform-providers/terraform-provider-vaultrepo.
Resources
Others
Resources
Resource SecretBackendKey
class SecretBackendKey extends CustomResourceCreates an Encryption Keyring on a Transit Secret Backend for Vault.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as vault from "@pulumi/vault";
const transit = new vault.Mount("transit", {
defaultLeaseTtlSeconds: 3600,
description: "Example description",
maxLeaseTtlSeconds: 86400,
path: "transit",
type: "transit",
});
const key = new vault.transit.SecretBackendKey("key", {
backend: transit.path,
});constructor
new SecretBackendKey(name: string, args: SecretBackendKeyArgs, opts?: pulumi.CustomResourceOptions)Create a SecretBackendKey resource with the given unique name, arguments, and options.
nameThe unique name of the resource.argsThe arguments to use to populate this resource's properties.optsA bag of options that control this resource's behavior.
method get
public static get(name: string, id: pulumi.Input<pulumi.ID>, state?: SecretBackendKeyState, opts?: pulumi.CustomResourceOptions): SecretBackendKeyGet an existing SecretBackendKey resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
method getProvider
getProvider(moduleMember: string): ProviderResource | undefinedmethod isInstance
public static isInstance(obj: any): obj is SecretBackendKeyReturns true if the given object is an instance of SecretBackendKey. This is designed to work even when multiple copies of the Pulumi SDK have been loaded into the same process.
property allowPlaintextBackup
public allowPlaintextBackup: pulumi.Output<boolean | undefined>;Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled. * Refer to Vault API documentation on key backups for more information: Backup Key
property backend
public backend: pulumi.Output<string>;The path the transit secret backend is mounted at, with no leading or trailing /s.
property convergentEncryption
public convergentEncryption: pulumi.Output<boolean | undefined>;Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires derived to be set to true.
property deletionAllowed
public deletionAllowed: pulumi.Output<boolean | undefined>;Specifies if the key is allowed to be deleted.
property derived
public derived: pulumi.Output<boolean | undefined>;Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
property exportable
public exportable: pulumi.Output<boolean | undefined>;Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled.
property id
id: Output<ID>;id is the provider-assigned unique ID for this managed resource. It is set during deployments and may be missing (undefined) during planning phases.
property keys
public keys: pulumi.Output<{[key: string]: any}[]>;List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the type of the encryption key.
* for key types aes256-gcm96 and chacha20-poly1305, each key version will be a map of a single value id which is just a hash of the key’s metadata.
* for key types ed25519, ecdsa-p256, rsa-2048 and rsa-4096, each key version will be a map of the following:
property latestVersion
public latestVersion: pulumi.Output<number>;Latest key version available. This value is 1-indexed, so if latestVersion is 1, then the key’s information can be referenced from keys by selecting element 0
property minAvailableVersion
public minAvailableVersion: pulumi.Output<number>;Minimum key version available for use. If keys have been archived by increasing minDecryptionVersion, this attribute will reflect that change.
property minDecryptionVersion
public minDecryptionVersion: pulumi.Output<number | undefined>;Minimum key version to use for decryption.
property minEncryptionVersion
public minEncryptionVersion: pulumi.Output<number | undefined>;Minimum key version to use for encryption
property name
public name: pulumi.Output<string>;The name to identify this key within the backend. Must be unique within the backend.
property supportsDecryption
public supportsDecryption: pulumi.Output<boolean>;Whether or not the key supports decryption, based on key type.
property supportsDerivation
public supportsDerivation: pulumi.Output<boolean>;Whether or not the key supports derivation, based on key type.
property supportsEncryption
public supportsEncryption: pulumi.Output<boolean>;Whether or not the key supports encryption, based on key type.
property supportsSigning
public supportsSigning: pulumi.Output<boolean>;Whether or not the key supports signing, based on key type.
property type
public type: pulumi.Output<string | undefined>;Specifies the type of key to create. The currently-supported types are: aes256-gcm96 (default), chacha20-poly1305, ed25519, ecdsa-p256, rsa-2048 and rsa-4096.
* Refer to the Vault documentation on transit key types for more information: Key Types
property urn
urn: Output<URN>;urn is the stable logical URN used to distinctly address a resource, both before and after deployments.
Resource SecretCacheConfig
class SecretCacheConfig extends CustomResourceConfigure the cache for the Transit Secret Backend in Vault.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as vault from "@pulumi/vault";
const transit = new vault.Mount("transit", {
defaultLeaseTtlSeconds: 3600,
description: "Example description",
maxLeaseTtlSeconds: 86400,
path: "transit",
type: "transit",
});
const cfg = new vault.TransitSecretBackendCacheConfig("cfg", {
backend: transit.path,
size: 500,
});constructor
new SecretCacheConfig(name: string, args: SecretCacheConfigArgs, opts?: pulumi.CustomResourceOptions)Create a SecretCacheConfig resource with the given unique name, arguments, and options.
nameThe unique name of the resource.argsThe arguments to use to populate this resource's properties.optsA bag of options that control this resource's behavior.
method get
public static get(name: string, id: pulumi.Input<pulumi.ID>, state?: SecretCacheConfigState, opts?: pulumi.CustomResourceOptions): SecretCacheConfigGet an existing SecretCacheConfig resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
method getProvider
getProvider(moduleMember: string): ProviderResource | undefinedmethod isInstance
public static isInstance(obj: any): obj is SecretCacheConfigReturns true if the given object is an instance of SecretCacheConfig. This is designed to work even when multiple copies of the Pulumi SDK have been loaded into the same process.
property backend
public backend: pulumi.Output<string>;The path the transit secret backend is mounted at, with no leading or trailing /s.
property id
id: Output<ID>;id is the provider-assigned unique ID for this managed resource. It is set during deployments and may be missing (undefined) during planning phases.
property size
public size: pulumi.Output<number>;The number of cache entries. 0 means unlimited.
property urn
urn: Output<URN>;urn is the stable logical URN used to distinctly address a resource, both before and after deployments.
Others
interface SecretBackendKeyArgs
interface SecretBackendKeyArgsThe set of arguments for constructing a SecretBackendKey resource.
property allowPlaintextBackup
allowPlaintextBackup?: pulumi.Input<boolean>;Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled. * Refer to Vault API documentation on key backups for more information: Backup Key
property backend
backend: pulumi.Input<string>;The path the transit secret backend is mounted at, with no leading or trailing /s.
property convergentEncryption
convergentEncryption?: pulumi.Input<boolean>;Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires derived to be set to true.
property deletionAllowed
deletionAllowed?: pulumi.Input<boolean>;Specifies if the key is allowed to be deleted.
property derived
derived?: pulumi.Input<boolean>;Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
property exportable
exportable?: pulumi.Input<boolean>;Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled.
property minDecryptionVersion
minDecryptionVersion?: pulumi.Input<number>;Minimum key version to use for decryption.
property minEncryptionVersion
minEncryptionVersion?: pulumi.Input<number>;Minimum key version to use for encryption
property name
name?: pulumi.Input<string>;The name to identify this key within the backend. Must be unique within the backend.
property type
type?: pulumi.Input<string>;Specifies the type of key to create. The currently-supported types are: aes256-gcm96 (default), chacha20-poly1305, ed25519, ecdsa-p256, rsa-2048 and rsa-4096.
* Refer to the Vault documentation on transit key types for more information: Key Types
interface SecretBackendKeyState
interface SecretBackendKeyStateInput properties used for looking up and filtering SecretBackendKey resources.
property allowPlaintextBackup
allowPlaintextBackup?: pulumi.Input<boolean>;Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled. * Refer to Vault API documentation on key backups for more information: Backup Key
property backend
backend?: pulumi.Input<string>;The path the transit secret backend is mounted at, with no leading or trailing /s.
property convergentEncryption
convergentEncryption?: pulumi.Input<boolean>;Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires derived to be set to true.
property deletionAllowed
deletionAllowed?: pulumi.Input<boolean>;Specifies if the key is allowed to be deleted.
property derived
derived?: pulumi.Input<boolean>;Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
property exportable
exportable?: pulumi.Input<boolean>;Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled.
property keys
keys?: pulumi.Input<pulumi.Input<{[key: string]: any}>[]>;List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the type of the encryption key.
* for key types aes256-gcm96 and chacha20-poly1305, each key version will be a map of a single value id which is just a hash of the key’s metadata.
* for key types ed25519, ecdsa-p256, rsa-2048 and rsa-4096, each key version will be a map of the following:
property latestVersion
latestVersion?: pulumi.Input<number>;Latest key version available. This value is 1-indexed, so if latestVersion is 1, then the key’s information can be referenced from keys by selecting element 0
property minAvailableVersion
minAvailableVersion?: pulumi.Input<number>;Minimum key version available for use. If keys have been archived by increasing minDecryptionVersion, this attribute will reflect that change.
property minDecryptionVersion
minDecryptionVersion?: pulumi.Input<number>;Minimum key version to use for decryption.
property minEncryptionVersion
minEncryptionVersion?: pulumi.Input<number>;Minimum key version to use for encryption
property name
name?: pulumi.Input<string>;The name to identify this key within the backend. Must be unique within the backend.
property supportsDecryption
supportsDecryption?: pulumi.Input<boolean>;Whether or not the key supports decryption, based on key type.
property supportsDerivation
supportsDerivation?: pulumi.Input<boolean>;Whether or not the key supports derivation, based on key type.
property supportsEncryption
supportsEncryption?: pulumi.Input<boolean>;Whether or not the key supports encryption, based on key type.
property supportsSigning
supportsSigning?: pulumi.Input<boolean>;Whether or not the key supports signing, based on key type.
property type
type?: pulumi.Input<string>;Specifies the type of key to create. The currently-supported types are: aes256-gcm96 (default), chacha20-poly1305, ed25519, ecdsa-p256, rsa-2048 and rsa-4096.
* Refer to the Vault documentation on transit key types for more information: Key Types
interface SecretCacheConfigArgs
interface SecretCacheConfigArgsThe set of arguments for constructing a SecretCacheConfig resource.
property backend
backend: pulumi.Input<string>;The path the transit secret backend is mounted at, with no leading or trailing /s.
property size
size: pulumi.Input<number>;The number of cache entries. 0 means unlimited.
interface SecretCacheConfigState
interface SecretCacheConfigStateInput properties used for looking up and filtering SecretCacheConfig resources.
property backend
backend?: pulumi.Input<string>;The path the transit secret backend is mounted at, with no leading or trailing /s.
property size
size?: pulumi.Input<number>;The number of cache entries. 0 means unlimited.