Oracle Cloud Infrastructure v2.27.0 published on Thursday, Mar 20, 2025 by Pulumi
oci.Vault.getSecret
Explore with Pulumi AI
This data source provides details about a specific Secret resource in Oracle Cloud Infrastructure Vault service.
Gets information about the specified secret.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as oci from "@pulumi/oci";
const testSecret = oci.Vault.getSecret({
    secretId: testSecretOciVaultSecret.id,
});
import pulumi
import pulumi_oci as oci
test_secret = oci.Vault.get_secret(secret_id=test_secret_oci_vault_secret["id"])
package main
import (
	"github.com/pulumi/pulumi-oci/sdk/v2/go/oci/vault"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := vault.GetSecret(ctx, &vault.GetSecretArgs{
			SecretId: testSecretOciVaultSecret.Id,
		}, nil)
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Oci = Pulumi.Oci;
return await Deployment.RunAsync(() => 
{
    var testSecret = Oci.Vault.GetSecret.Invoke(new()
    {
        SecretId = testSecretOciVaultSecret.Id,
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.oci.Vault.VaultFunctions;
import com.pulumi.oci.Vault.inputs.GetSecretArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        final var testSecret = VaultFunctions.getSecret(GetSecretArgs.builder()
            .secretId(testSecretOciVaultSecret.id())
            .build());
    }
}
variables:
  testSecret:
    fn::invoke:
      function: oci:Vault:getSecret
      arguments:
        secretId: ${testSecretOciVaultSecret.id}
Using getSecret
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getSecret(args: GetSecretArgs, opts?: InvokeOptions): Promise<GetSecretResult>
function getSecretOutput(args: GetSecretOutputArgs, opts?: InvokeOptions): Output<GetSecretResult>def get_secret(secret_id: Optional[str] = None,
               opts: Optional[InvokeOptions] = None) -> GetSecretResult
def get_secret_output(secret_id: Optional[pulumi.Input[str]] = None,
               opts: Optional[InvokeOptions] = None) -> Output[GetSecretResult]func GetSecret(ctx *Context, args *GetSecretArgs, opts ...InvokeOption) (*GetSecretResult, error)
func GetSecretOutput(ctx *Context, args *GetSecretOutputArgs, opts ...InvokeOption) GetSecretResultOutput> Note: This function is named GetSecret in the Go SDK.
public static class GetSecret 
{
    public static Task<GetSecretResult> InvokeAsync(GetSecretArgs args, InvokeOptions? opts = null)
    public static Output<GetSecretResult> Invoke(GetSecretInvokeArgs args, InvokeOptions? opts = null)
}public static CompletableFuture<GetSecretResult> getSecret(GetSecretArgs args, InvokeOptions options)
public static Output<GetSecretResult> getSecret(GetSecretArgs args, InvokeOptions options)
fn::invoke:
  function: oci:Vault/getSecret:getSecret
  arguments:
    # arguments dictionaryThe following arguments are supported:
- SecretId string
- The OCID of the secret.
- SecretId string
- The OCID of the secret.
- secretId String
- The OCID of the secret.
- secretId string
- The OCID of the secret.
- secret_id str
- The OCID of the secret.
- secretId String
- The OCID of the secret.
getSecret Result
The following output properties are available:
- CompartmentId string
- The OCID of the compartment where you want to create the secret.
- CurrentVersion stringNumber 
- The version number of the secret version that's currently in use.
- Dictionary<string, string>
- Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example: {"Operations.CostCenter": "42"}
- Description string
- A brief description of the secret. Avoid entering confidential information.
- EnableAuto boolGeneration 
- Dictionary<string, string>
- Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example: {"Department": "Finance"}
- Id string
- The OCID of the secret.
- IsAuto boolGeneration Enabled 
- The value of this flag determines whether or not secret content will be generated automatically.
- KeyId string
- The OCID of the master encryption key that is used to encrypt the secret. You must specify a symmetric key to encrypt the secret during import to the vault. You cannot encrypt secrets with asymmetric keys. Furthermore, the key must exist in the vault that you specify.
- LastRotation stringTime 
- A property indicating when the secret was last rotated successfully, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- LifecycleDetails string
- Additional information about the current lifecycle state of the secret.
- Metadata Dictionary<string, string>
- Additional metadata that you can use to provide context about how to use the secret or during rotation or other administrative tasks. For example, for a secret that you use to connect to a database, the additional metadata might specify the connection endpoint and the connection string. Provide additional metadata as key-value pairs.
- NextRotation stringTime 
- A property indicating when the secret is scheduled to be rotated, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- RotationConfigs List<GetSecret Rotation Config> 
- Defines the frequency of the rotation and the information about the target system
- RotationStatus string
- Additional information about the status of the secret rotation
- SecretContents List<GetSecret Secret Content> 
- SecretGeneration List<GetContexts Secret Secret Generation Context> 
- Captures a configurable set of secret generation rules such as length, base characters, additional characters, and so on.
- SecretId string
- SecretName string
- The user-friendly name of the secret. Avoid entering confidential information.
- SecretRules List<GetSecret Secret Rule> 
- A list of rules that control how the secret is used and managed.
- State string
- The current lifecycle state of the secret.
- TimeCreated string
- A property indicating when the secret was created, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- TimeOf stringCurrent Version Expiry 
- An optional property indicating when the current secret version will expire, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- TimeOf stringDeletion 
- An optional property indicating when to delete the secret, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- VaultId string
- The OCID of the Vault in which the secret exists
- CompartmentId string
- The OCID of the compartment where you want to create the secret.
- CurrentVersion stringNumber 
- The version number of the secret version that's currently in use.
- map[string]string
- Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example: {"Operations.CostCenter": "42"}
- Description string
- A brief description of the secret. Avoid entering confidential information.
- EnableAuto boolGeneration 
- map[string]string
- Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example: {"Department": "Finance"}
- Id string
- The OCID of the secret.
- IsAuto boolGeneration Enabled 
- The value of this flag determines whether or not secret content will be generated automatically.
- KeyId string
- The OCID of the master encryption key that is used to encrypt the secret. You must specify a symmetric key to encrypt the secret during import to the vault. You cannot encrypt secrets with asymmetric keys. Furthermore, the key must exist in the vault that you specify.
- LastRotation stringTime 
- A property indicating when the secret was last rotated successfully, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- LifecycleDetails string
- Additional information about the current lifecycle state of the secret.
- Metadata map[string]string
- Additional metadata that you can use to provide context about how to use the secret or during rotation or other administrative tasks. For example, for a secret that you use to connect to a database, the additional metadata might specify the connection endpoint and the connection string. Provide additional metadata as key-value pairs.
- NextRotation stringTime 
- A property indicating when the secret is scheduled to be rotated, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- RotationConfigs []GetSecret Rotation Config 
- Defines the frequency of the rotation and the information about the target system
- RotationStatus string
- Additional information about the status of the secret rotation
- SecretContents []GetSecret Secret Content 
- SecretGeneration []GetContexts Secret Secret Generation Context 
- Captures a configurable set of secret generation rules such as length, base characters, additional characters, and so on.
- SecretId string
- SecretName string
- The user-friendly name of the secret. Avoid entering confidential information.
- SecretRules []GetSecret Secret Rule 
- A list of rules that control how the secret is used and managed.
- State string
- The current lifecycle state of the secret.
- TimeCreated string
- A property indicating when the secret was created, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- TimeOf stringCurrent Version Expiry 
- An optional property indicating when the current secret version will expire, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- TimeOf stringDeletion 
- An optional property indicating when to delete the secret, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- VaultId string
- The OCID of the Vault in which the secret exists
- compartmentId String
- The OCID of the compartment where you want to create the secret.
- currentVersion StringNumber 
- The version number of the secret version that's currently in use.
- Map<String,String>
- Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example: {"Operations.CostCenter": "42"}
- description String
- A brief description of the secret. Avoid entering confidential information.
- enableAuto BooleanGeneration 
- Map<String,String>
- Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example: {"Department": "Finance"}
- id String
- The OCID of the secret.
- isAuto BooleanGeneration Enabled 
- The value of this flag determines whether or not secret content will be generated automatically.
- keyId String
- The OCID of the master encryption key that is used to encrypt the secret. You must specify a symmetric key to encrypt the secret during import to the vault. You cannot encrypt secrets with asymmetric keys. Furthermore, the key must exist in the vault that you specify.
- lastRotation StringTime 
- A property indicating when the secret was last rotated successfully, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- lifecycleDetails String
- Additional information about the current lifecycle state of the secret.
- metadata Map<String,String>
- Additional metadata that you can use to provide context about how to use the secret or during rotation or other administrative tasks. For example, for a secret that you use to connect to a database, the additional metadata might specify the connection endpoint and the connection string. Provide additional metadata as key-value pairs.
- nextRotation StringTime 
- A property indicating when the secret is scheduled to be rotated, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- rotationConfigs List<GetSecret Rotation Config> 
- Defines the frequency of the rotation and the information about the target system
- rotationStatus String
- Additional information about the status of the secret rotation
- secretContents List<GetSecret Secret Content> 
- secretGeneration List<GetContexts Secret Secret Generation Context> 
- Captures a configurable set of secret generation rules such as length, base characters, additional characters, and so on.
- secretId String
- secretName String
- The user-friendly name of the secret. Avoid entering confidential information.
- secretRules List<GetSecret Secret Rule> 
- A list of rules that control how the secret is used and managed.
- state String
- The current lifecycle state of the secret.
- timeCreated String
- A property indicating when the secret was created, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- timeOf StringCurrent Version Expiry 
- An optional property indicating when the current secret version will expire, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- timeOf StringDeletion 
- An optional property indicating when to delete the secret, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- vaultId String
- The OCID of the Vault in which the secret exists
- compartmentId string
- The OCID of the compartment where you want to create the secret.
- currentVersion stringNumber 
- The version number of the secret version that's currently in use.
- {[key: string]: string}
- Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example: {"Operations.CostCenter": "42"}
- description string
- A brief description of the secret. Avoid entering confidential information.
- enableAuto booleanGeneration 
- {[key: string]: string}
- Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example: {"Department": "Finance"}
- id string
- The OCID of the secret.
- isAuto booleanGeneration Enabled 
- The value of this flag determines whether or not secret content will be generated automatically.
- keyId string
- The OCID of the master encryption key that is used to encrypt the secret. You must specify a symmetric key to encrypt the secret during import to the vault. You cannot encrypt secrets with asymmetric keys. Furthermore, the key must exist in the vault that you specify.
- lastRotation stringTime 
- A property indicating when the secret was last rotated successfully, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- lifecycleDetails string
- Additional information about the current lifecycle state of the secret.
- metadata {[key: string]: string}
- Additional metadata that you can use to provide context about how to use the secret or during rotation or other administrative tasks. For example, for a secret that you use to connect to a database, the additional metadata might specify the connection endpoint and the connection string. Provide additional metadata as key-value pairs.
- nextRotation stringTime 
- A property indicating when the secret is scheduled to be rotated, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- rotationConfigs GetSecret Rotation Config[] 
- Defines the frequency of the rotation and the information about the target system
- rotationStatus string
- Additional information about the status of the secret rotation
- secretContents GetSecret Secret Content[] 
- secretGeneration GetContexts Secret Secret Generation Context[] 
- Captures a configurable set of secret generation rules such as length, base characters, additional characters, and so on.
- secretId string
- secretName string
- The user-friendly name of the secret. Avoid entering confidential information.
- secretRules GetSecret Secret Rule[] 
- A list of rules that control how the secret is used and managed.
- state string
- The current lifecycle state of the secret.
- timeCreated string
- A property indicating when the secret was created, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- timeOf stringCurrent Version Expiry 
- An optional property indicating when the current secret version will expire, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- timeOf stringDeletion 
- An optional property indicating when to delete the secret, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- vaultId string
- The OCID of the Vault in which the secret exists
- compartment_id str
- The OCID of the compartment where you want to create the secret.
- current_version_ strnumber 
- The version number of the secret version that's currently in use.
- Mapping[str, str]
- Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example: {"Operations.CostCenter": "42"}
- description str
- A brief description of the secret. Avoid entering confidential information.
- enable_auto_ boolgeneration 
- Mapping[str, str]
- Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example: {"Department": "Finance"}
- id str
- The OCID of the secret.
- is_auto_ boolgeneration_ enabled 
- The value of this flag determines whether or not secret content will be generated automatically.
- key_id str
- The OCID of the master encryption key that is used to encrypt the secret. You must specify a symmetric key to encrypt the secret during import to the vault. You cannot encrypt secrets with asymmetric keys. Furthermore, the key must exist in the vault that you specify.
- last_rotation_ strtime 
- A property indicating when the secret was last rotated successfully, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- lifecycle_details str
- Additional information about the current lifecycle state of the secret.
- metadata Mapping[str, str]
- Additional metadata that you can use to provide context about how to use the secret or during rotation or other administrative tasks. For example, for a secret that you use to connect to a database, the additional metadata might specify the connection endpoint and the connection string. Provide additional metadata as key-value pairs.
- next_rotation_ strtime 
- A property indicating when the secret is scheduled to be rotated, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- rotation_configs Sequence[vault.Get Secret Rotation Config] 
- Defines the frequency of the rotation and the information about the target system
- rotation_status str
- Additional information about the status of the secret rotation
- secret_contents Sequence[vault.Get Secret Secret Content] 
- secret_generation_ Sequence[vault.contexts Get Secret Secret Generation Context] 
- Captures a configurable set of secret generation rules such as length, base characters, additional characters, and so on.
- secret_id str
- secret_name str
- The user-friendly name of the secret. Avoid entering confidential information.
- secret_rules Sequence[vault.Get Secret Secret Rule] 
- A list of rules that control how the secret is used and managed.
- state str
- The current lifecycle state of the secret.
- time_created str
- A property indicating when the secret was created, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- time_of_ strcurrent_ version_ expiry 
- An optional property indicating when the current secret version will expire, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- time_of_ strdeletion 
- An optional property indicating when to delete the secret, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- vault_id str
- The OCID of the Vault in which the secret exists
- compartmentId String
- The OCID of the compartment where you want to create the secret.
- currentVersion StringNumber 
- The version number of the secret version that's currently in use.
- Map<String>
- Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example: {"Operations.CostCenter": "42"}
- description String
- A brief description of the secret. Avoid entering confidential information.
- enableAuto BooleanGeneration 
- Map<String>
- Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags. Example: {"Department": "Finance"}
- id String
- The OCID of the secret.
- isAuto BooleanGeneration Enabled 
- The value of this flag determines whether or not secret content will be generated automatically.
- keyId String
- The OCID of the master encryption key that is used to encrypt the secret. You must specify a symmetric key to encrypt the secret during import to the vault. You cannot encrypt secrets with asymmetric keys. Furthermore, the key must exist in the vault that you specify.
- lastRotation StringTime 
- A property indicating when the secret was last rotated successfully, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- lifecycleDetails String
- Additional information about the current lifecycle state of the secret.
- metadata Map<String>
- Additional metadata that you can use to provide context about how to use the secret or during rotation or other administrative tasks. For example, for a secret that you use to connect to a database, the additional metadata might specify the connection endpoint and the connection string. Provide additional metadata as key-value pairs.
- nextRotation StringTime 
- A property indicating when the secret is scheduled to be rotated, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- rotationConfigs List<Property Map>
- Defines the frequency of the rotation and the information about the target system
- rotationStatus String
- Additional information about the status of the secret rotation
- secretContents List<Property Map>
- secretGeneration List<Property Map>Contexts 
- Captures a configurable set of secret generation rules such as length, base characters, additional characters, and so on.
- secretId String
- secretName String
- The user-friendly name of the secret. Avoid entering confidential information.
- secretRules List<Property Map>
- A list of rules that control how the secret is used and managed.
- state String
- The current lifecycle state of the secret.
- timeCreated String
- A property indicating when the secret was created, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- timeOf StringCurrent Version Expiry 
- An optional property indicating when the current secret version will expire, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- timeOf StringDeletion 
- An optional property indicating when to delete the secret, expressed in RFC 3339 timestamp format. Example: 2019-04-03T21:10:29.600Z
- vaultId String
- The OCID of the Vault in which the secret exists
Supporting Types
GetSecretRotationConfig   
- IsScheduled boolRotation Enabled 
- Enables auto rotation, when set to true rotationInterval must be set.
- RotationInterval string
- The time interval that indicates the frequency for rotating secret data, as described in ISO 8601 format. The minimum value is 1 day and maximum value is 360 days. For example, if you want to set the time interval for rotating a secret data as 30 days, the duration is expressed as "P30D."
- TargetSystem List<GetDetails Secret Rotation Config Target System Detail> 
- The TargetSystemDetails provides the targetSystem type and type-specific connection metadata
- IsScheduled boolRotation Enabled 
- Enables auto rotation, when set to true rotationInterval must be set.
- RotationInterval string
- The time interval that indicates the frequency for rotating secret data, as described in ISO 8601 format. The minimum value is 1 day and maximum value is 360 days. For example, if you want to set the time interval for rotating a secret data as 30 days, the duration is expressed as "P30D."
- TargetSystem []GetDetails Secret Rotation Config Target System Detail 
- The TargetSystemDetails provides the targetSystem type and type-specific connection metadata
- isScheduled BooleanRotation Enabled 
- Enables auto rotation, when set to true rotationInterval must be set.
- rotationInterval String
- The time interval that indicates the frequency for rotating secret data, as described in ISO 8601 format. The minimum value is 1 day and maximum value is 360 days. For example, if you want to set the time interval for rotating a secret data as 30 days, the duration is expressed as "P30D."
- targetSystem List<GetDetails Secret Rotation Config Target System Detail> 
- The TargetSystemDetails provides the targetSystem type and type-specific connection metadata
- isScheduled booleanRotation Enabled 
- Enables auto rotation, when set to true rotationInterval must be set.
- rotationInterval string
- The time interval that indicates the frequency for rotating secret data, as described in ISO 8601 format. The minimum value is 1 day and maximum value is 360 days. For example, if you want to set the time interval for rotating a secret data as 30 days, the duration is expressed as "P30D."
- targetSystem GetDetails Secret Rotation Config Target System Detail[] 
- The TargetSystemDetails provides the targetSystem type and type-specific connection metadata
- is_scheduled_ boolrotation_ enabled 
- Enables auto rotation, when set to true rotationInterval must be set.
- rotation_interval str
- The time interval that indicates the frequency for rotating secret data, as described in ISO 8601 format. The minimum value is 1 day and maximum value is 360 days. For example, if you want to set the time interval for rotating a secret data as 30 days, the duration is expressed as "P30D."
- target_system_ Sequence[vault.details Get Secret Rotation Config Target System Detail] 
- The TargetSystemDetails provides the targetSystem type and type-specific connection metadata
- isScheduled BooleanRotation Enabled 
- Enables auto rotation, when set to true rotationInterval must be set.
- rotationInterval String
- The time interval that indicates the frequency for rotating secret data, as described in ISO 8601 format. The minimum value is 1 day and maximum value is 360 days. For example, if you want to set the time interval for rotating a secret data as 30 days, the duration is expressed as "P30D."
- targetSystem List<Property Map>Details 
- The TargetSystemDetails provides the targetSystem type and type-specific connection metadata
GetSecretRotationConfigTargetSystemDetail      
- AdbId string
- The unique identifier (OCID) for the autonomous database that Vault Secret connects to.
- FunctionId string
- The unique identifier (OCID) of the Oracle Cloud Infrastructure Functions that vault secret connects to.
- TargetSystem stringType 
- Unique identifier of the target system that Vault Secret connects to.
- AdbId string
- The unique identifier (OCID) for the autonomous database that Vault Secret connects to.
- FunctionId string
- The unique identifier (OCID) of the Oracle Cloud Infrastructure Functions that vault secret connects to.
- TargetSystem stringType 
- Unique identifier of the target system that Vault Secret connects to.
- adbId String
- The unique identifier (OCID) for the autonomous database that Vault Secret connects to.
- functionId String
- The unique identifier (OCID) of the Oracle Cloud Infrastructure Functions that vault secret connects to.
- targetSystem StringType 
- Unique identifier of the target system that Vault Secret connects to.
- adbId string
- The unique identifier (OCID) for the autonomous database that Vault Secret connects to.
- functionId string
- The unique identifier (OCID) of the Oracle Cloud Infrastructure Functions that vault secret connects to.
- targetSystem stringType 
- Unique identifier of the target system that Vault Secret connects to.
- adb_id str
- The unique identifier (OCID) for the autonomous database that Vault Secret connects to.
- function_id str
- The unique identifier (OCID) of the Oracle Cloud Infrastructure Functions that vault secret connects to.
- target_system_ strtype 
- Unique identifier of the target system that Vault Secret connects to.
- adbId String
- The unique identifier (OCID) for the autonomous database that Vault Secret connects to.
- functionId String
- The unique identifier (OCID) of the Oracle Cloud Infrastructure Functions that vault secret connects to.
- targetSystem StringType 
- Unique identifier of the target system that Vault Secret connects to.
GetSecretSecretContent   
- Content string
- ContentType string
- Name string
- Stage string
- Content string
- ContentType string
- Name string
- Stage string
- content String
- contentType String
- name String
- stage String
- content string
- contentType string
- name string
- stage string
- content str
- content_type str
- name str
- stage str
- content String
- contentType String
- name String
- stage String
GetSecretSecretGenerationContext    
- GenerationTemplate string
- Name of random bytes generation template for generating random byte type secret.
- GenerationType string
- Name of the predefined secret generation type.
- PassphraseLength int
- Length of the passphrase to be generated
- SecretTemplate string
- SecretTemplate captures structure in which customer wants to store secrets. This is optional and a default structure is available for each secret type. The template can have any structure with static values that are not generated. Within the template, you can insert predefined placeholders to store secrets. These placeholders are later replaced with the generated content and saved as a Base64 encoded content.
- GenerationTemplate string
- Name of random bytes generation template for generating random byte type secret.
- GenerationType string
- Name of the predefined secret generation type.
- PassphraseLength int
- Length of the passphrase to be generated
- SecretTemplate string
- SecretTemplate captures structure in which customer wants to store secrets. This is optional and a default structure is available for each secret type. The template can have any structure with static values that are not generated. Within the template, you can insert predefined placeholders to store secrets. These placeholders are later replaced with the generated content and saved as a Base64 encoded content.
- generationTemplate String
- Name of random bytes generation template for generating random byte type secret.
- generationType String
- Name of the predefined secret generation type.
- passphraseLength Integer
- Length of the passphrase to be generated
- secretTemplate String
- SecretTemplate captures structure in which customer wants to store secrets. This is optional and a default structure is available for each secret type. The template can have any structure with static values that are not generated. Within the template, you can insert predefined placeholders to store secrets. These placeholders are later replaced with the generated content and saved as a Base64 encoded content.
- generationTemplate string
- Name of random bytes generation template for generating random byte type secret.
- generationType string
- Name of the predefined secret generation type.
- passphraseLength number
- Length of the passphrase to be generated
- secretTemplate string
- SecretTemplate captures structure in which customer wants to store secrets. This is optional and a default structure is available for each secret type. The template can have any structure with static values that are not generated. Within the template, you can insert predefined placeholders to store secrets. These placeholders are later replaced with the generated content and saved as a Base64 encoded content.
- generation_template str
- Name of random bytes generation template for generating random byte type secret.
- generation_type str
- Name of the predefined secret generation type.
- passphrase_length int
- Length of the passphrase to be generated
- secret_template str
- SecretTemplate captures structure in which customer wants to store secrets. This is optional and a default structure is available for each secret type. The template can have any structure with static values that are not generated. Within the template, you can insert predefined placeholders to store secrets. These placeholders are later replaced with the generated content and saved as a Base64 encoded content.
- generationTemplate String
- Name of random bytes generation template for generating random byte type secret.
- generationType String
- Name of the predefined secret generation type.
- passphraseLength Number
- Length of the passphrase to be generated
- secretTemplate String
- SecretTemplate captures structure in which customer wants to store secrets. This is optional and a default structure is available for each secret type. The template can have any structure with static values that are not generated. Within the template, you can insert predefined placeholders to store secrets. These placeholders are later replaced with the generated content and saved as a Base64 encoded content.
GetSecretSecretRule   
- IsEnforced boolOn Deleted Secret Versions 
- A property indicating whether the rule is applied even if the secret version with the content you are trying to reuse was deleted.
- IsSecret boolContent Retrieval Blocked On Expiry 
- A property indicating whether to block retrieval of the secret content, on expiry. The default is false. If the secret has already expired and you would like to retrieve the secret contents, you need to edit the secret rule to disable this property, to allow reading the secret content.
- RuleType string
- The type of rule, which either controls when the secret contents expire or whether they can be reused.
- SecretVersion stringExpiry Interval 
- A property indicating how long the secret contents will be considered valid, expressed in ISO 8601 format. The secret needs to be updated when the secret content expires. The timer resets after you update the secret contents. The minimum value is 1 day and the maximum value is 90 days for this property. Currently, only intervals expressed in days are supported. For example, pass P3Dto have the secret version expire every 3 days.
- TimeOf stringAbsolute Expiry 
- An optional property indicating the absolute time when this secret will expire, expressed in RFC 3339 timestamp format. The minimum number of days from current time is 1 day and the maximum number of days from current time is 365 days. Example: 2019-04-03T21:10:29.600Z
- IsEnforced boolOn Deleted Secret Versions 
- A property indicating whether the rule is applied even if the secret version with the content you are trying to reuse was deleted.
- IsSecret boolContent Retrieval Blocked On Expiry 
- A property indicating whether to block retrieval of the secret content, on expiry. The default is false. If the secret has already expired and you would like to retrieve the secret contents, you need to edit the secret rule to disable this property, to allow reading the secret content.
- RuleType string
- The type of rule, which either controls when the secret contents expire or whether they can be reused.
- SecretVersion stringExpiry Interval 
- A property indicating how long the secret contents will be considered valid, expressed in ISO 8601 format. The secret needs to be updated when the secret content expires. The timer resets after you update the secret contents. The minimum value is 1 day and the maximum value is 90 days for this property. Currently, only intervals expressed in days are supported. For example, pass P3Dto have the secret version expire every 3 days.
- TimeOf stringAbsolute Expiry 
- An optional property indicating the absolute time when this secret will expire, expressed in RFC 3339 timestamp format. The minimum number of days from current time is 1 day and the maximum number of days from current time is 365 days. Example: 2019-04-03T21:10:29.600Z
- isEnforced BooleanOn Deleted Secret Versions 
- A property indicating whether the rule is applied even if the secret version with the content you are trying to reuse was deleted.
- isSecret BooleanContent Retrieval Blocked On Expiry 
- A property indicating whether to block retrieval of the secret content, on expiry. The default is false. If the secret has already expired and you would like to retrieve the secret contents, you need to edit the secret rule to disable this property, to allow reading the secret content.
- ruleType String
- The type of rule, which either controls when the secret contents expire or whether they can be reused.
- secretVersion StringExpiry Interval 
- A property indicating how long the secret contents will be considered valid, expressed in ISO 8601 format. The secret needs to be updated when the secret content expires. The timer resets after you update the secret contents. The minimum value is 1 day and the maximum value is 90 days for this property. Currently, only intervals expressed in days are supported. For example, pass P3Dto have the secret version expire every 3 days.
- timeOf StringAbsolute Expiry 
- An optional property indicating the absolute time when this secret will expire, expressed in RFC 3339 timestamp format. The minimum number of days from current time is 1 day and the maximum number of days from current time is 365 days. Example: 2019-04-03T21:10:29.600Z
- isEnforced booleanOn Deleted Secret Versions 
- A property indicating whether the rule is applied even if the secret version with the content you are trying to reuse was deleted.
- isSecret booleanContent Retrieval Blocked On Expiry 
- A property indicating whether to block retrieval of the secret content, on expiry. The default is false. If the secret has already expired and you would like to retrieve the secret contents, you need to edit the secret rule to disable this property, to allow reading the secret content.
- ruleType string
- The type of rule, which either controls when the secret contents expire or whether they can be reused.
- secretVersion stringExpiry Interval 
- A property indicating how long the secret contents will be considered valid, expressed in ISO 8601 format. The secret needs to be updated when the secret content expires. The timer resets after you update the secret contents. The minimum value is 1 day and the maximum value is 90 days for this property. Currently, only intervals expressed in days are supported. For example, pass P3Dto have the secret version expire every 3 days.
- timeOf stringAbsolute Expiry 
- An optional property indicating the absolute time when this secret will expire, expressed in RFC 3339 timestamp format. The minimum number of days from current time is 1 day and the maximum number of days from current time is 365 days. Example: 2019-04-03T21:10:29.600Z
- is_enforced_ boolon_ deleted_ secret_ versions 
- A property indicating whether the rule is applied even if the secret version with the content you are trying to reuse was deleted.
- is_secret_ boolcontent_ retrieval_ blocked_ on_ expiry 
- A property indicating whether to block retrieval of the secret content, on expiry. The default is false. If the secret has already expired and you would like to retrieve the secret contents, you need to edit the secret rule to disable this property, to allow reading the secret content.
- rule_type str
- The type of rule, which either controls when the secret contents expire or whether they can be reused.
- secret_version_ strexpiry_ interval 
- A property indicating how long the secret contents will be considered valid, expressed in ISO 8601 format. The secret needs to be updated when the secret content expires. The timer resets after you update the secret contents. The minimum value is 1 day and the maximum value is 90 days for this property. Currently, only intervals expressed in days are supported. For example, pass P3Dto have the secret version expire every 3 days.
- time_of_ strabsolute_ expiry 
- An optional property indicating the absolute time when this secret will expire, expressed in RFC 3339 timestamp format. The minimum number of days from current time is 1 day and the maximum number of days from current time is 365 days. Example: 2019-04-03T21:10:29.600Z
- isEnforced BooleanOn Deleted Secret Versions 
- A property indicating whether the rule is applied even if the secret version with the content you are trying to reuse was deleted.
- isSecret BooleanContent Retrieval Blocked On Expiry 
- A property indicating whether to block retrieval of the secret content, on expiry. The default is false. If the secret has already expired and you would like to retrieve the secret contents, you need to edit the secret rule to disable this property, to allow reading the secret content.
- ruleType String
- The type of rule, which either controls when the secret contents expire or whether they can be reused.
- secretVersion StringExpiry Interval 
- A property indicating how long the secret contents will be considered valid, expressed in ISO 8601 format. The secret needs to be updated when the secret content expires. The timer resets after you update the secret contents. The minimum value is 1 day and the maximum value is 90 days for this property. Currently, only intervals expressed in days are supported. For example, pass P3Dto have the secret version expire every 3 days.
- timeOf StringAbsolute Expiry 
- An optional property indicating the absolute time when this secret will expire, expressed in RFC 3339 timestamp format. The minimum number of days from current time is 1 day and the maximum number of days from current time is 365 days. Example: 2019-04-03T21:10:29.600Z
Package Details
- Repository
- oci pulumi/pulumi-oci
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the ociTerraform Provider.