pulumi-vault 6.6.0a1741415971__py3-none-any.whl → 6.7.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +9 -0
  2. pulumi_vault/_inputs.py +583 -562
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +425 -200
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +523 -306
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +288 -70
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +383 -130
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +432 -186
  38. pulumi_vault/azure/backend_role.py +188 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +3857 -2200
  53. pulumi_vault/database/outputs.py +2483 -1330
  54. pulumi_vault/database/secret_backend_connection.py +333 -112
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +283 -140
  57. pulumi_vault/database/secrets_mount.py +275 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +426 -205
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +420 -179
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +68 -18
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +754 -533
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +720 -499
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +73 -60
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +3 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -36
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +174 -126
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1377 -0
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +152 -104
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +278 -0
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +35 -17
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +139 -25
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -31
  191. pulumi_vault/pkisecret/secret_backend_cert.py +439 -297
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +237 -182
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +520 -378
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +441 -175
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +894 -644
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +851 -427
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +936 -357
  203. pulumi_vault/pkisecret/secret_backend_sign.py +347 -252
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +2 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +295 -0
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +96 -95
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +3 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +325 -0
  257. pulumi_vault/transit/get_verify.py +355 -0
  258. pulumi_vault/transit/secret_backend_key.py +394 -231
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/METADATA +2 -2
  261. pulumi_vault-6.7.0.dist-info/RECORD +265 -0
  262. {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/WHEEL +1 -1
  263. pulumi_vault-6.6.0a1741415971.dist-info/RECORD +0 -260
  264. {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,30 +20,30 @@ __all__ = ['SyncGcpDestinationArgs', 'SyncGcpDestination']
19
20
  @pulumi.input_type
20
21
  class SyncGcpDestinationArgs:
21
22
  def __init__(__self__, *,
22
- credentials: Optional[pulumi.Input[str]] = None,
23
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
24
- granularity: Optional[pulumi.Input[str]] = None,
25
- name: Optional[pulumi.Input[str]] = None,
26
- namespace: Optional[pulumi.Input[str]] = None,
27
- project_id: Optional[pulumi.Input[str]] = None,
28
- secret_name_template: Optional[pulumi.Input[str]] = None):
23
+ credentials: Optional[pulumi.Input[builtins.str]] = None,
24
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
25
+ granularity: Optional[pulumi.Input[builtins.str]] = None,
26
+ name: Optional[pulumi.Input[builtins.str]] = None,
27
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
28
+ project_id: Optional[pulumi.Input[builtins.str]] = None,
29
+ secret_name_template: Optional[pulumi.Input[builtins.str]] = None):
29
30
  """
30
31
  The set of arguments for constructing a SyncGcpDestination resource.
31
- :param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP.
32
+ :param pulumi.Input[builtins.str] credentials: JSON-encoded credentials to use to connect to GCP.
32
33
  Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
33
34
  variable.
34
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
35
- :param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
35
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
36
+ :param pulumi.Input[builtins.str] granularity: Determines what level of information is synced as a distinct resource
36
37
  at the destination. Supports `secret-path` and `secret-key`.
37
- :param pulumi.Input[str] name: Unique name of the GCP destination.
38
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
38
+ :param pulumi.Input[builtins.str] name: Unique name of the GCP destination.
39
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
39
40
  The value should not contain leading or trailing forward slashes.
40
41
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
41
- :param pulumi.Input[str] project_id: The target project to manage secrets in. If set,
42
+ :param pulumi.Input[builtins.str] project_id: The target project to manage secrets in. If set,
42
43
  overrides the project ID derived from the service account JSON credentials or application
43
44
  default credentials. The service account must be [authorized](https://cloud.google.com/iam/docs/service-account-overview#locations)
44
45
  to perform Secret Manager actions in the target project.
45
- :param pulumi.Input[str] secret_name_template: Template describing how to generate external secret names.
46
+ :param pulumi.Input[builtins.str] secret_name_template: Template describing how to generate external secret names.
46
47
  Supports a subset of the Go Template syntax.
47
48
  """
48
49
  if credentials is not None:
@@ -62,7 +63,7 @@ class SyncGcpDestinationArgs:
62
63
 
63
64
  @property
64
65
  @pulumi.getter
65
- def credentials(self) -> Optional[pulumi.Input[str]]:
66
+ def credentials(self) -> Optional[pulumi.Input[builtins.str]]:
66
67
  """
67
68
  JSON-encoded credentials to use to connect to GCP.
68
69
  Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
@@ -71,24 +72,24 @@ class SyncGcpDestinationArgs:
71
72
  return pulumi.get(self, "credentials")
72
73
 
73
74
  @credentials.setter
74
- def credentials(self, value: Optional[pulumi.Input[str]]):
75
+ def credentials(self, value: Optional[pulumi.Input[builtins.str]]):
75
76
  pulumi.set(self, "credentials", value)
76
77
 
77
78
  @property
78
79
  @pulumi.getter(name="customTags")
79
- def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
80
+ def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
80
81
  """
81
82
  Custom tags to set on the secret managed at the destination.
82
83
  """
83
84
  return pulumi.get(self, "custom_tags")
84
85
 
85
86
  @custom_tags.setter
86
- def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
87
+ def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
87
88
  pulumi.set(self, "custom_tags", value)
88
89
 
89
90
  @property
90
91
  @pulumi.getter
91
- def granularity(self) -> Optional[pulumi.Input[str]]:
92
+ def granularity(self) -> Optional[pulumi.Input[builtins.str]]:
92
93
  """
93
94
  Determines what level of information is synced as a distinct resource
94
95
  at the destination. Supports `secret-path` and `secret-key`.
@@ -96,24 +97,24 @@ class SyncGcpDestinationArgs:
96
97
  return pulumi.get(self, "granularity")
97
98
 
98
99
  @granularity.setter
99
- def granularity(self, value: Optional[pulumi.Input[str]]):
100
+ def granularity(self, value: Optional[pulumi.Input[builtins.str]]):
100
101
  pulumi.set(self, "granularity", value)
101
102
 
102
103
  @property
103
104
  @pulumi.getter
104
- def name(self) -> Optional[pulumi.Input[str]]:
105
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
105
106
  """
106
107
  Unique name of the GCP destination.
107
108
  """
108
109
  return pulumi.get(self, "name")
109
110
 
110
111
  @name.setter
111
- def name(self, value: Optional[pulumi.Input[str]]):
112
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
112
113
  pulumi.set(self, "name", value)
113
114
 
114
115
  @property
115
116
  @pulumi.getter
116
- def namespace(self) -> Optional[pulumi.Input[str]]:
117
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
117
118
  """
118
119
  The namespace to provision the resource in.
119
120
  The value should not contain leading or trailing forward slashes.
@@ -122,12 +123,12 @@ class SyncGcpDestinationArgs:
122
123
  return pulumi.get(self, "namespace")
123
124
 
124
125
  @namespace.setter
125
- def namespace(self, value: Optional[pulumi.Input[str]]):
126
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
126
127
  pulumi.set(self, "namespace", value)
127
128
 
128
129
  @property
129
130
  @pulumi.getter(name="projectId")
130
- def project_id(self) -> Optional[pulumi.Input[str]]:
131
+ def project_id(self) -> Optional[pulumi.Input[builtins.str]]:
131
132
  """
132
133
  The target project to manage secrets in. If set,
133
134
  overrides the project ID derived from the service account JSON credentials or application
@@ -137,12 +138,12 @@ class SyncGcpDestinationArgs:
137
138
  return pulumi.get(self, "project_id")
138
139
 
139
140
  @project_id.setter
140
- def project_id(self, value: Optional[pulumi.Input[str]]):
141
+ def project_id(self, value: Optional[pulumi.Input[builtins.str]]):
141
142
  pulumi.set(self, "project_id", value)
142
143
 
143
144
  @property
144
145
  @pulumi.getter(name="secretNameTemplate")
145
- def secret_name_template(self) -> Optional[pulumi.Input[str]]:
146
+ def secret_name_template(self) -> Optional[pulumi.Input[builtins.str]]:
146
147
  """
147
148
  Template describing how to generate external secret names.
148
149
  Supports a subset of the Go Template syntax.
@@ -150,40 +151,40 @@ class SyncGcpDestinationArgs:
150
151
  return pulumi.get(self, "secret_name_template")
151
152
 
152
153
  @secret_name_template.setter
153
- def secret_name_template(self, value: Optional[pulumi.Input[str]]):
154
+ def secret_name_template(self, value: Optional[pulumi.Input[builtins.str]]):
154
155
  pulumi.set(self, "secret_name_template", value)
155
156
 
156
157
 
157
158
  @pulumi.input_type
158
159
  class _SyncGcpDestinationState:
159
160
  def __init__(__self__, *,
160
- credentials: Optional[pulumi.Input[str]] = None,
161
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
162
- granularity: Optional[pulumi.Input[str]] = None,
163
- name: Optional[pulumi.Input[str]] = None,
164
- namespace: Optional[pulumi.Input[str]] = None,
165
- project_id: Optional[pulumi.Input[str]] = None,
166
- secret_name_template: Optional[pulumi.Input[str]] = None,
167
- type: Optional[pulumi.Input[str]] = None):
161
+ credentials: Optional[pulumi.Input[builtins.str]] = None,
162
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
163
+ granularity: Optional[pulumi.Input[builtins.str]] = None,
164
+ name: Optional[pulumi.Input[builtins.str]] = None,
165
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
166
+ project_id: Optional[pulumi.Input[builtins.str]] = None,
167
+ secret_name_template: Optional[pulumi.Input[builtins.str]] = None,
168
+ type: Optional[pulumi.Input[builtins.str]] = None):
168
169
  """
169
170
  Input properties used for looking up and filtering SyncGcpDestination resources.
170
- :param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP.
171
+ :param pulumi.Input[builtins.str] credentials: JSON-encoded credentials to use to connect to GCP.
171
172
  Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
172
173
  variable.
173
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
174
- :param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
174
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
175
+ :param pulumi.Input[builtins.str] granularity: Determines what level of information is synced as a distinct resource
175
176
  at the destination. Supports `secret-path` and `secret-key`.
176
- :param pulumi.Input[str] name: Unique name of the GCP destination.
177
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
177
+ :param pulumi.Input[builtins.str] name: Unique name of the GCP destination.
178
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
178
179
  The value should not contain leading or trailing forward slashes.
179
180
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
180
- :param pulumi.Input[str] project_id: The target project to manage secrets in. If set,
181
+ :param pulumi.Input[builtins.str] project_id: The target project to manage secrets in. If set,
181
182
  overrides the project ID derived from the service account JSON credentials or application
182
183
  default credentials. The service account must be [authorized](https://cloud.google.com/iam/docs/service-account-overview#locations)
183
184
  to perform Secret Manager actions in the target project.
184
- :param pulumi.Input[str] secret_name_template: Template describing how to generate external secret names.
185
+ :param pulumi.Input[builtins.str] secret_name_template: Template describing how to generate external secret names.
185
186
  Supports a subset of the Go Template syntax.
186
- :param pulumi.Input[str] type: The type of the secrets destination (`gcp-sm`).
187
+ :param pulumi.Input[builtins.str] type: The type of the secrets destination (`gcp-sm`).
187
188
  """
188
189
  if credentials is not None:
189
190
  pulumi.set(__self__, "credentials", credentials)
@@ -204,7 +205,7 @@ class _SyncGcpDestinationState:
204
205
 
205
206
  @property
206
207
  @pulumi.getter
207
- def credentials(self) -> Optional[pulumi.Input[str]]:
208
+ def credentials(self) -> Optional[pulumi.Input[builtins.str]]:
208
209
  """
209
210
  JSON-encoded credentials to use to connect to GCP.
210
211
  Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
@@ -213,24 +214,24 @@ class _SyncGcpDestinationState:
213
214
  return pulumi.get(self, "credentials")
214
215
 
215
216
  @credentials.setter
216
- def credentials(self, value: Optional[pulumi.Input[str]]):
217
+ def credentials(self, value: Optional[pulumi.Input[builtins.str]]):
217
218
  pulumi.set(self, "credentials", value)
218
219
 
219
220
  @property
220
221
  @pulumi.getter(name="customTags")
221
- def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
222
+ def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
222
223
  """
223
224
  Custom tags to set on the secret managed at the destination.
224
225
  """
225
226
  return pulumi.get(self, "custom_tags")
226
227
 
227
228
  @custom_tags.setter
228
- def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
229
+ def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
229
230
  pulumi.set(self, "custom_tags", value)
230
231
 
231
232
  @property
232
233
  @pulumi.getter
233
- def granularity(self) -> Optional[pulumi.Input[str]]:
234
+ def granularity(self) -> Optional[pulumi.Input[builtins.str]]:
234
235
  """
235
236
  Determines what level of information is synced as a distinct resource
236
237
  at the destination. Supports `secret-path` and `secret-key`.
@@ -238,24 +239,24 @@ class _SyncGcpDestinationState:
238
239
  return pulumi.get(self, "granularity")
239
240
 
240
241
  @granularity.setter
241
- def granularity(self, value: Optional[pulumi.Input[str]]):
242
+ def granularity(self, value: Optional[pulumi.Input[builtins.str]]):
242
243
  pulumi.set(self, "granularity", value)
243
244
 
244
245
  @property
245
246
  @pulumi.getter
246
- def name(self) -> Optional[pulumi.Input[str]]:
247
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
247
248
  """
248
249
  Unique name of the GCP destination.
249
250
  """
250
251
  return pulumi.get(self, "name")
251
252
 
252
253
  @name.setter
253
- def name(self, value: Optional[pulumi.Input[str]]):
254
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
254
255
  pulumi.set(self, "name", value)
255
256
 
256
257
  @property
257
258
  @pulumi.getter
258
- def namespace(self) -> Optional[pulumi.Input[str]]:
259
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
259
260
  """
260
261
  The namespace to provision the resource in.
261
262
  The value should not contain leading or trailing forward slashes.
@@ -264,12 +265,12 @@ class _SyncGcpDestinationState:
264
265
  return pulumi.get(self, "namespace")
265
266
 
266
267
  @namespace.setter
267
- def namespace(self, value: Optional[pulumi.Input[str]]):
268
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
268
269
  pulumi.set(self, "namespace", value)
269
270
 
270
271
  @property
271
272
  @pulumi.getter(name="projectId")
272
- def project_id(self) -> Optional[pulumi.Input[str]]:
273
+ def project_id(self) -> Optional[pulumi.Input[builtins.str]]:
273
274
  """
274
275
  The target project to manage secrets in. If set,
275
276
  overrides the project ID derived from the service account JSON credentials or application
@@ -279,12 +280,12 @@ class _SyncGcpDestinationState:
279
280
  return pulumi.get(self, "project_id")
280
281
 
281
282
  @project_id.setter
282
- def project_id(self, value: Optional[pulumi.Input[str]]):
283
+ def project_id(self, value: Optional[pulumi.Input[builtins.str]]):
283
284
  pulumi.set(self, "project_id", value)
284
285
 
285
286
  @property
286
287
  @pulumi.getter(name="secretNameTemplate")
287
- def secret_name_template(self) -> Optional[pulumi.Input[str]]:
288
+ def secret_name_template(self) -> Optional[pulumi.Input[builtins.str]]:
288
289
  """
289
290
  Template describing how to generate external secret names.
290
291
  Supports a subset of the Go Template syntax.
@@ -292,19 +293,19 @@ class _SyncGcpDestinationState:
292
293
  return pulumi.get(self, "secret_name_template")
293
294
 
294
295
  @secret_name_template.setter
295
- def secret_name_template(self, value: Optional[pulumi.Input[str]]):
296
+ def secret_name_template(self, value: Optional[pulumi.Input[builtins.str]]):
296
297
  pulumi.set(self, "secret_name_template", value)
297
298
 
298
299
  @property
299
300
  @pulumi.getter
300
- def type(self) -> Optional[pulumi.Input[str]]:
301
+ def type(self) -> Optional[pulumi.Input[builtins.str]]:
301
302
  """
302
303
  The type of the secrets destination (`gcp-sm`).
303
304
  """
304
305
  return pulumi.get(self, "type")
305
306
 
306
307
  @type.setter
307
- def type(self, value: Optional[pulumi.Input[str]]):
308
+ def type(self, value: Optional[pulumi.Input[builtins.str]]):
308
309
  pulumi.set(self, "type", value)
309
310
 
310
311
 
@@ -313,13 +314,13 @@ class SyncGcpDestination(pulumi.CustomResource):
313
314
  def __init__(__self__,
314
315
  resource_name: str,
315
316
  opts: Optional[pulumi.ResourceOptions] = None,
316
- credentials: Optional[pulumi.Input[str]] = None,
317
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
318
- granularity: Optional[pulumi.Input[str]] = None,
319
- name: Optional[pulumi.Input[str]] = None,
320
- namespace: Optional[pulumi.Input[str]] = None,
321
- project_id: Optional[pulumi.Input[str]] = None,
322
- secret_name_template: Optional[pulumi.Input[str]] = None,
317
+ credentials: Optional[pulumi.Input[builtins.str]] = None,
318
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
319
+ granularity: Optional[pulumi.Input[builtins.str]] = None,
320
+ name: Optional[pulumi.Input[builtins.str]] = None,
321
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
322
+ project_id: Optional[pulumi.Input[builtins.str]] = None,
323
+ secret_name_template: Optional[pulumi.Input[builtins.str]] = None,
323
324
  __props__=None):
324
325
  """
325
326
  ## Example Usage
@@ -349,21 +350,21 @@ class SyncGcpDestination(pulumi.CustomResource):
349
350
 
350
351
  :param str resource_name: The name of the resource.
351
352
  :param pulumi.ResourceOptions opts: Options for the resource.
352
- :param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP.
353
+ :param pulumi.Input[builtins.str] credentials: JSON-encoded credentials to use to connect to GCP.
353
354
  Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
354
355
  variable.
355
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
356
- :param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
356
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
357
+ :param pulumi.Input[builtins.str] granularity: Determines what level of information is synced as a distinct resource
357
358
  at the destination. Supports `secret-path` and `secret-key`.
358
- :param pulumi.Input[str] name: Unique name of the GCP destination.
359
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
359
+ :param pulumi.Input[builtins.str] name: Unique name of the GCP destination.
360
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
360
361
  The value should not contain leading or trailing forward slashes.
361
362
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
362
- :param pulumi.Input[str] project_id: The target project to manage secrets in. If set,
363
+ :param pulumi.Input[builtins.str] project_id: The target project to manage secrets in. If set,
363
364
  overrides the project ID derived from the service account JSON credentials or application
364
365
  default credentials. The service account must be [authorized](https://cloud.google.com/iam/docs/service-account-overview#locations)
365
366
  to perform Secret Manager actions in the target project.
366
- :param pulumi.Input[str] secret_name_template: Template describing how to generate external secret names.
367
+ :param pulumi.Input[builtins.str] secret_name_template: Template describing how to generate external secret names.
367
368
  Supports a subset of the Go Template syntax.
368
369
  """
369
370
  ...
@@ -413,13 +414,13 @@ class SyncGcpDestination(pulumi.CustomResource):
413
414
  def _internal_init(__self__,
414
415
  resource_name: str,
415
416
  opts: Optional[pulumi.ResourceOptions] = None,
416
- credentials: Optional[pulumi.Input[str]] = None,
417
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
418
- granularity: Optional[pulumi.Input[str]] = None,
419
- name: Optional[pulumi.Input[str]] = None,
420
- namespace: Optional[pulumi.Input[str]] = None,
421
- project_id: Optional[pulumi.Input[str]] = None,
422
- secret_name_template: Optional[pulumi.Input[str]] = None,
417
+ credentials: Optional[pulumi.Input[builtins.str]] = None,
418
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
419
+ granularity: Optional[pulumi.Input[builtins.str]] = None,
420
+ name: Optional[pulumi.Input[builtins.str]] = None,
421
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
422
+ project_id: Optional[pulumi.Input[builtins.str]] = None,
423
+ secret_name_template: Optional[pulumi.Input[builtins.str]] = None,
423
424
  __props__=None):
424
425
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
425
426
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -449,14 +450,14 @@ class SyncGcpDestination(pulumi.CustomResource):
449
450
  def get(resource_name: str,
450
451
  id: pulumi.Input[str],
451
452
  opts: Optional[pulumi.ResourceOptions] = None,
452
- credentials: Optional[pulumi.Input[str]] = None,
453
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
454
- granularity: Optional[pulumi.Input[str]] = None,
455
- name: Optional[pulumi.Input[str]] = None,
456
- namespace: Optional[pulumi.Input[str]] = None,
457
- project_id: Optional[pulumi.Input[str]] = None,
458
- secret_name_template: Optional[pulumi.Input[str]] = None,
459
- type: Optional[pulumi.Input[str]] = None) -> 'SyncGcpDestination':
453
+ credentials: Optional[pulumi.Input[builtins.str]] = None,
454
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
455
+ granularity: Optional[pulumi.Input[builtins.str]] = None,
456
+ name: Optional[pulumi.Input[builtins.str]] = None,
457
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
458
+ project_id: Optional[pulumi.Input[builtins.str]] = None,
459
+ secret_name_template: Optional[pulumi.Input[builtins.str]] = None,
460
+ type: Optional[pulumi.Input[builtins.str]] = None) -> 'SyncGcpDestination':
460
461
  """
461
462
  Get an existing SyncGcpDestination resource's state with the given name, id, and optional extra
462
463
  properties used to qualify the lookup.
@@ -464,23 +465,23 @@ class SyncGcpDestination(pulumi.CustomResource):
464
465
  :param str resource_name: The unique name of the resulting resource.
465
466
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
466
467
  :param pulumi.ResourceOptions opts: Options for the resource.
467
- :param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP.
468
+ :param pulumi.Input[builtins.str] credentials: JSON-encoded credentials to use to connect to GCP.
468
469
  Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
469
470
  variable.
470
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
471
- :param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
471
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
472
+ :param pulumi.Input[builtins.str] granularity: Determines what level of information is synced as a distinct resource
472
473
  at the destination. Supports `secret-path` and `secret-key`.
473
- :param pulumi.Input[str] name: Unique name of the GCP destination.
474
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
474
+ :param pulumi.Input[builtins.str] name: Unique name of the GCP destination.
475
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
475
476
  The value should not contain leading or trailing forward slashes.
476
477
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
477
- :param pulumi.Input[str] project_id: The target project to manage secrets in. If set,
478
+ :param pulumi.Input[builtins.str] project_id: The target project to manage secrets in. If set,
478
479
  overrides the project ID derived from the service account JSON credentials or application
479
480
  default credentials. The service account must be [authorized](https://cloud.google.com/iam/docs/service-account-overview#locations)
480
481
  to perform Secret Manager actions in the target project.
481
- :param pulumi.Input[str] secret_name_template: Template describing how to generate external secret names.
482
+ :param pulumi.Input[builtins.str] secret_name_template: Template describing how to generate external secret names.
482
483
  Supports a subset of the Go Template syntax.
483
- :param pulumi.Input[str] type: The type of the secrets destination (`gcp-sm`).
484
+ :param pulumi.Input[builtins.str] type: The type of the secrets destination (`gcp-sm`).
484
485
  """
485
486
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
486
487
 
@@ -498,7 +499,7 @@ class SyncGcpDestination(pulumi.CustomResource):
498
499
 
499
500
  @property
500
501
  @pulumi.getter
501
- def credentials(self) -> pulumi.Output[Optional[str]]:
502
+ def credentials(self) -> pulumi.Output[Optional[builtins.str]]:
502
503
  """
503
504
  JSON-encoded credentials to use to connect to GCP.
504
505
  Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
@@ -508,7 +509,7 @@ class SyncGcpDestination(pulumi.CustomResource):
508
509
 
509
510
  @property
510
511
  @pulumi.getter(name="customTags")
511
- def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
512
+ def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
512
513
  """
513
514
  Custom tags to set on the secret managed at the destination.
514
515
  """
@@ -516,7 +517,7 @@ class SyncGcpDestination(pulumi.CustomResource):
516
517
 
517
518
  @property
518
519
  @pulumi.getter
519
- def granularity(self) -> pulumi.Output[Optional[str]]:
520
+ def granularity(self) -> pulumi.Output[Optional[builtins.str]]:
520
521
  """
521
522
  Determines what level of information is synced as a distinct resource
522
523
  at the destination. Supports `secret-path` and `secret-key`.
@@ -525,7 +526,7 @@ class SyncGcpDestination(pulumi.CustomResource):
525
526
 
526
527
  @property
527
528
  @pulumi.getter
528
- def name(self) -> pulumi.Output[str]:
529
+ def name(self) -> pulumi.Output[builtins.str]:
529
530
  """
530
531
  Unique name of the GCP destination.
531
532
  """
@@ -533,7 +534,7 @@ class SyncGcpDestination(pulumi.CustomResource):
533
534
 
534
535
  @property
535
536
  @pulumi.getter
536
- def namespace(self) -> pulumi.Output[Optional[str]]:
537
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
537
538
  """
538
539
  The namespace to provision the resource in.
539
540
  The value should not contain leading or trailing forward slashes.
@@ -543,7 +544,7 @@ class SyncGcpDestination(pulumi.CustomResource):
543
544
 
544
545
  @property
545
546
  @pulumi.getter(name="projectId")
546
- def project_id(self) -> pulumi.Output[Optional[str]]:
547
+ def project_id(self) -> pulumi.Output[Optional[builtins.str]]:
547
548
  """
548
549
  The target project to manage secrets in. If set,
549
550
  overrides the project ID derived from the service account JSON credentials or application
@@ -554,7 +555,7 @@ class SyncGcpDestination(pulumi.CustomResource):
554
555
 
555
556
  @property
556
557
  @pulumi.getter(name="secretNameTemplate")
557
- def secret_name_template(self) -> pulumi.Output[str]:
558
+ def secret_name_template(self) -> pulumi.Output[builtins.str]:
558
559
  """
559
560
  Template describing how to generate external secret names.
560
561
  Supports a subset of the Go Template syntax.
@@ -563,7 +564,7 @@ class SyncGcpDestination(pulumi.CustomResource):
563
564
 
564
565
  @property
565
566
  @pulumi.getter
566
- def type(self) -> pulumi.Output[str]:
567
+ def type(self) -> pulumi.Output[builtins.str]:
567
568
  """
568
569
  The type of the secrets destination (`gcp-sm`).
569
570
  """