@pulumi/vault
Version: 
A Pulumi package for creating and managing HashiCorp Vault cloud resources.
96 lines • 2.92 kB
JavaScript
;
// *** WARNING: this file was generated by pulumi-language-nodejs. ***
// *** Do not edit by hand unless you're certain you know what you are doing! ***
Object.defineProperty(exports, "__esModule", { value: true });
exports.getSecretsListOutput = exports.getSecretsList = void 0;
const pulumi = require("@pulumi/pulumi");
const utilities = require("../utilities");
/**
 * ## Example Usage
 *
 * ```typescript
 * import * as pulumi from "@pulumi/pulumi";
 * import * as vault from "@pulumi/vault";
 *
 * const kvv1 = new vault.Mount("kvv1", {
 *     path: "kvv1",
 *     type: "kv",
 *     options: {
 *         version: "1",
 *     },
 *     description: "KV Version 1 secret engine mount",
 * });
 * const awsSecret = new vault.kv.Secret("aws_secret", {
 *     path: pulumi.interpolate`${kvv1.path}/aws-secret`,
 *     dataJson: JSON.stringify({
 *         zip: "zap",
 *     }),
 * });
 * const azureSecret = new vault.kv.Secret("azure_secret", {
 *     path: pulumi.interpolate`${kvv1.path}/azure-secret`,
 *     dataJson: JSON.stringify({
 *         foo: "bar",
 *     }),
 * });
 * const secrets = vault.kv.getSecretsListOutput({
 *     path: kvv1.path,
 * });
 * ```
 *
 * ## Required Vault Capabilities
 *
 * Use of this resource requires the `read` capability on the given path.
 */
function getSecretsList(args, opts) {
    opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
    return pulumi.runtime.invoke("vault:kv/getSecretsList:getSecretsList", {
        "namespace": args.namespace,
        "path": args.path,
    }, opts);
}
exports.getSecretsList = getSecretsList;
/**
 * ## Example Usage
 *
 * ```typescript
 * import * as pulumi from "@pulumi/pulumi";
 * import * as vault from "@pulumi/vault";
 *
 * const kvv1 = new vault.Mount("kvv1", {
 *     path: "kvv1",
 *     type: "kv",
 *     options: {
 *         version: "1",
 *     },
 *     description: "KV Version 1 secret engine mount",
 * });
 * const awsSecret = new vault.kv.Secret("aws_secret", {
 *     path: pulumi.interpolate`${kvv1.path}/aws-secret`,
 *     dataJson: JSON.stringify({
 *         zip: "zap",
 *     }),
 * });
 * const azureSecret = new vault.kv.Secret("azure_secret", {
 *     path: pulumi.interpolate`${kvv1.path}/azure-secret`,
 *     dataJson: JSON.stringify({
 *         foo: "bar",
 *     }),
 * });
 * const secrets = vault.kv.getSecretsListOutput({
 *     path: kvv1.path,
 * });
 * ```
 *
 * ## Required Vault Capabilities
 *
 * Use of this resource requires the `read` capability on the given path.
 */
function getSecretsListOutput(args, opts) {
    opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
    return pulumi.runtime.invokeOutput("vault:kv/getSecretsList:getSecretsList", {
        "namespace": args.namespace,
        "path": args.path,
    }, opts);
}
exports.getSecretsListOutput = getSecretsListOutput;
//# sourceMappingURL=getSecretsList.js.map