@pulumi/kubernetes
Version:
[](https://github.com/pulumi/pulumi-kubernetes/actions) [](https://slack.pulumi.com) [;
exports.Secret = void 0;
const pulumi = require("@pulumi/pulumi");
const utilities = require("../../utilities");
/**
* Secret holds secret data of a certain type. The total bytes of the values in the Data field must be less than MaxSecretSize bytes.
*
* Note: While Pulumi automatically encrypts the 'data' and 'stringData'
* fields, this encryption only applies to Pulumi's context, including the state file,
* the Service, the CLI, etc. Kubernetes does not encrypt Secret resources by default,
* and the contents are visible to users with access to the Secret in Kubernetes using
* tools like 'kubectl'.
*
* For more information on securing Kubernetes Secrets, see the following links:
* https://kubernetes.io/docs/concepts/configuration/secret/#security-properties
* https://kubernetes.io/docs/concepts/configuration/secret/#risks
*/
class Secret extends pulumi.CustomResource {
/**
* Get an existing Secret resource's state with the given name, ID, and optional extra
* properties used to qualify the lookup.
*
* @param name The _unique_ name of the resulting resource.
* @param id The _unique_ provider ID of the resource to lookup.
* @param opts Optional settings to control the behavior of the CustomResource.
*/
static get(name, id, opts) {
return new Secret(name, undefined, { ...opts, id: id });
}
/**
* Returns true if the given object is an instance of Secret. This is designed to work even
* when multiple copies of the Pulumi SDK have been loaded into the same process.
*/
static isInstance(obj) {
if (obj === undefined || obj === null) {
return false;
}
return obj['__pulumiType'] === Secret.__pulumiType;
}
/**
* Create a Secret resource with the given unique name, arguments, and options.
*
* @param name The _unique_ name of the resource.
* @param args The arguments to use to populate this resource's properties.
* @param opts A bag of options that control this resource's behavior.
*/
constructor(name, args, opts) {
let resourceInputs = {};
opts = opts || {};
if (!opts.id) {
resourceInputs["apiVersion"] = "v1";
resourceInputs["data"] = args?.data ? pulumi.secret(args.data) : undefined;
resourceInputs["immutable"] = args?.immutable;
resourceInputs["kind"] = "Secret";
resourceInputs["metadata"] = args?.metadata;
resourceInputs["stringData"] = args?.stringData ? pulumi.secret(args.stringData) : undefined;
resourceInputs["type"] = args?.type;
}
else {
resourceInputs["apiVersion"] = undefined /*out*/;
resourceInputs["data"] = undefined /*out*/;
resourceInputs["immutable"] = undefined /*out*/;
resourceInputs["kind"] = undefined /*out*/;
resourceInputs["metadata"] = undefined /*out*/;
resourceInputs["stringData"] = undefined /*out*/;
resourceInputs["type"] = undefined /*out*/;
}
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
const secretOpts = { additionalSecretOutputs: ["data", "stringData"] };
opts = pulumi.mergeOptions(opts, secretOpts);
super(Secret.__pulumiType, name, resourceInputs, opts);
}
}
exports.Secret = Secret;
/** @internal */
Secret.__pulumiType = 'kubernetes:core/v1:Secret';
//# sourceMappingURL=secret.js.map