pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744183682__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744183682.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,30 +20,30 @@ __all__ = ['SyncGcpDestinationArgs', 'SyncGcpDestination']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class SyncGcpDestinationArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
credentials: Optional[pulumi.Input[str]] = None,
|
23
|
-
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
24
|
-
granularity: Optional[pulumi.Input[str]] = None,
|
25
|
-
name: Optional[pulumi.Input[str]] = None,
|
26
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
27
|
-
project_id: Optional[pulumi.Input[str]] = None,
|
28
|
-
secret_name_template: Optional[pulumi.Input[str]] = None):
|
23
|
+
credentials: Optional[pulumi.Input[builtins.str]] = None,
|
24
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
25
|
+
granularity: Optional[pulumi.Input[builtins.str]] = None,
|
26
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
27
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
28
|
+
project_id: Optional[pulumi.Input[builtins.str]] = None,
|
29
|
+
secret_name_template: Optional[pulumi.Input[builtins.str]] = None):
|
29
30
|
"""
|
30
31
|
The set of arguments for constructing a SyncGcpDestination resource.
|
31
|
-
:param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP.
|
32
|
+
:param pulumi.Input[builtins.str] credentials: JSON-encoded credentials to use to connect to GCP.
|
32
33
|
Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
|
33
34
|
variable.
|
34
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
35
|
-
:param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
|
35
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
36
|
+
:param pulumi.Input[builtins.str] granularity: Determines what level of information is synced as a distinct resource
|
36
37
|
at the destination. Supports `secret-path` and `secret-key`.
|
37
|
-
:param pulumi.Input[str] name: Unique name of the GCP destination.
|
38
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
38
|
+
:param pulumi.Input[builtins.str] name: Unique name of the GCP destination.
|
39
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
39
40
|
The value should not contain leading or trailing forward slashes.
|
40
41
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
41
|
-
:param pulumi.Input[str] project_id: The target project to manage secrets in. If set,
|
42
|
+
:param pulumi.Input[builtins.str] project_id: The target project to manage secrets in. If set,
|
42
43
|
overrides the project ID derived from the service account JSON credentials or application
|
43
44
|
default credentials. The service account must be [authorized](https://cloud.google.com/iam/docs/service-account-overview#locations)
|
44
45
|
to perform Secret Manager actions in the target project.
|
45
|
-
:param pulumi.Input[str] secret_name_template: Template describing how to generate external secret names.
|
46
|
+
:param pulumi.Input[builtins.str] secret_name_template: Template describing how to generate external secret names.
|
46
47
|
Supports a subset of the Go Template syntax.
|
47
48
|
"""
|
48
49
|
if credentials is not None:
|
@@ -62,7 +63,7 @@ class SyncGcpDestinationArgs:
|
|
62
63
|
|
63
64
|
@property
|
64
65
|
@pulumi.getter
|
65
|
-
def credentials(self) -> Optional[pulumi.Input[str]]:
|
66
|
+
def credentials(self) -> Optional[pulumi.Input[builtins.str]]:
|
66
67
|
"""
|
67
68
|
JSON-encoded credentials to use to connect to GCP.
|
68
69
|
Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
|
@@ -71,24 +72,24 @@ class SyncGcpDestinationArgs:
|
|
71
72
|
return pulumi.get(self, "credentials")
|
72
73
|
|
73
74
|
@credentials.setter
|
74
|
-
def credentials(self, value: Optional[pulumi.Input[str]]):
|
75
|
+
def credentials(self, value: Optional[pulumi.Input[builtins.str]]):
|
75
76
|
pulumi.set(self, "credentials", value)
|
76
77
|
|
77
78
|
@property
|
78
79
|
@pulumi.getter(name="customTags")
|
79
|
-
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
80
|
+
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
|
80
81
|
"""
|
81
82
|
Custom tags to set on the secret managed at the destination.
|
82
83
|
"""
|
83
84
|
return pulumi.get(self, "custom_tags")
|
84
85
|
|
85
86
|
@custom_tags.setter
|
86
|
-
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
87
|
+
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
|
87
88
|
pulumi.set(self, "custom_tags", value)
|
88
89
|
|
89
90
|
@property
|
90
91
|
@pulumi.getter
|
91
|
-
def granularity(self) -> Optional[pulumi.Input[str]]:
|
92
|
+
def granularity(self) -> Optional[pulumi.Input[builtins.str]]:
|
92
93
|
"""
|
93
94
|
Determines what level of information is synced as a distinct resource
|
94
95
|
at the destination. Supports `secret-path` and `secret-key`.
|
@@ -96,24 +97,24 @@ class SyncGcpDestinationArgs:
|
|
96
97
|
return pulumi.get(self, "granularity")
|
97
98
|
|
98
99
|
@granularity.setter
|
99
|
-
def granularity(self, value: Optional[pulumi.Input[str]]):
|
100
|
+
def granularity(self, value: Optional[pulumi.Input[builtins.str]]):
|
100
101
|
pulumi.set(self, "granularity", value)
|
101
102
|
|
102
103
|
@property
|
103
104
|
@pulumi.getter
|
104
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
105
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
105
106
|
"""
|
106
107
|
Unique name of the GCP destination.
|
107
108
|
"""
|
108
109
|
return pulumi.get(self, "name")
|
109
110
|
|
110
111
|
@name.setter
|
111
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
112
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
112
113
|
pulumi.set(self, "name", value)
|
113
114
|
|
114
115
|
@property
|
115
116
|
@pulumi.getter
|
116
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
117
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
117
118
|
"""
|
118
119
|
The namespace to provision the resource in.
|
119
120
|
The value should not contain leading or trailing forward slashes.
|
@@ -122,12 +123,12 @@ class SyncGcpDestinationArgs:
|
|
122
123
|
return pulumi.get(self, "namespace")
|
123
124
|
|
124
125
|
@namespace.setter
|
125
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
126
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
126
127
|
pulumi.set(self, "namespace", value)
|
127
128
|
|
128
129
|
@property
|
129
130
|
@pulumi.getter(name="projectId")
|
130
|
-
def project_id(self) -> Optional[pulumi.Input[str]]:
|
131
|
+
def project_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
131
132
|
"""
|
132
133
|
The target project to manage secrets in. If set,
|
133
134
|
overrides the project ID derived from the service account JSON credentials or application
|
@@ -137,12 +138,12 @@ class SyncGcpDestinationArgs:
|
|
137
138
|
return pulumi.get(self, "project_id")
|
138
139
|
|
139
140
|
@project_id.setter
|
140
|
-
def project_id(self, value: Optional[pulumi.Input[str]]):
|
141
|
+
def project_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
141
142
|
pulumi.set(self, "project_id", value)
|
142
143
|
|
143
144
|
@property
|
144
145
|
@pulumi.getter(name="secretNameTemplate")
|
145
|
-
def secret_name_template(self) -> Optional[pulumi.Input[str]]:
|
146
|
+
def secret_name_template(self) -> Optional[pulumi.Input[builtins.str]]:
|
146
147
|
"""
|
147
148
|
Template describing how to generate external secret names.
|
148
149
|
Supports a subset of the Go Template syntax.
|
@@ -150,40 +151,40 @@ class SyncGcpDestinationArgs:
|
|
150
151
|
return pulumi.get(self, "secret_name_template")
|
151
152
|
|
152
153
|
@secret_name_template.setter
|
153
|
-
def secret_name_template(self, value: Optional[pulumi.Input[str]]):
|
154
|
+
def secret_name_template(self, value: Optional[pulumi.Input[builtins.str]]):
|
154
155
|
pulumi.set(self, "secret_name_template", value)
|
155
156
|
|
156
157
|
|
157
158
|
@pulumi.input_type
|
158
159
|
class _SyncGcpDestinationState:
|
159
160
|
def __init__(__self__, *,
|
160
|
-
credentials: Optional[pulumi.Input[str]] = None,
|
161
|
-
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
162
|
-
granularity: Optional[pulumi.Input[str]] = None,
|
163
|
-
name: Optional[pulumi.Input[str]] = None,
|
164
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
165
|
-
project_id: Optional[pulumi.Input[str]] = None,
|
166
|
-
secret_name_template: Optional[pulumi.Input[str]] = None,
|
167
|
-
type: Optional[pulumi.Input[str]] = None):
|
161
|
+
credentials: Optional[pulumi.Input[builtins.str]] = None,
|
162
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
163
|
+
granularity: Optional[pulumi.Input[builtins.str]] = None,
|
164
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
165
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
166
|
+
project_id: Optional[pulumi.Input[builtins.str]] = None,
|
167
|
+
secret_name_template: Optional[pulumi.Input[builtins.str]] = None,
|
168
|
+
type: Optional[pulumi.Input[builtins.str]] = None):
|
168
169
|
"""
|
169
170
|
Input properties used for looking up and filtering SyncGcpDestination resources.
|
170
|
-
:param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP.
|
171
|
+
:param pulumi.Input[builtins.str] credentials: JSON-encoded credentials to use to connect to GCP.
|
171
172
|
Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
|
172
173
|
variable.
|
173
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
174
|
-
:param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
|
174
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
175
|
+
:param pulumi.Input[builtins.str] granularity: Determines what level of information is synced as a distinct resource
|
175
176
|
at the destination. Supports `secret-path` and `secret-key`.
|
176
|
-
:param pulumi.Input[str] name: Unique name of the GCP destination.
|
177
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
177
|
+
:param pulumi.Input[builtins.str] name: Unique name of the GCP destination.
|
178
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
178
179
|
The value should not contain leading or trailing forward slashes.
|
179
180
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
180
|
-
:param pulumi.Input[str] project_id: The target project to manage secrets in. If set,
|
181
|
+
:param pulumi.Input[builtins.str] project_id: The target project to manage secrets in. If set,
|
181
182
|
overrides the project ID derived from the service account JSON credentials or application
|
182
183
|
default credentials. The service account must be [authorized](https://cloud.google.com/iam/docs/service-account-overview#locations)
|
183
184
|
to perform Secret Manager actions in the target project.
|
184
|
-
:param pulumi.Input[str] secret_name_template: Template describing how to generate external secret names.
|
185
|
+
:param pulumi.Input[builtins.str] secret_name_template: Template describing how to generate external secret names.
|
185
186
|
Supports a subset of the Go Template syntax.
|
186
|
-
:param pulumi.Input[str] type: The type of the secrets destination (`gcp-sm`).
|
187
|
+
:param pulumi.Input[builtins.str] type: The type of the secrets destination (`gcp-sm`).
|
187
188
|
"""
|
188
189
|
if credentials is not None:
|
189
190
|
pulumi.set(__self__, "credentials", credentials)
|
@@ -204,7 +205,7 @@ class _SyncGcpDestinationState:
|
|
204
205
|
|
205
206
|
@property
|
206
207
|
@pulumi.getter
|
207
|
-
def credentials(self) -> Optional[pulumi.Input[str]]:
|
208
|
+
def credentials(self) -> Optional[pulumi.Input[builtins.str]]:
|
208
209
|
"""
|
209
210
|
JSON-encoded credentials to use to connect to GCP.
|
210
211
|
Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
|
@@ -213,24 +214,24 @@ class _SyncGcpDestinationState:
|
|
213
214
|
return pulumi.get(self, "credentials")
|
214
215
|
|
215
216
|
@credentials.setter
|
216
|
-
def credentials(self, value: Optional[pulumi.Input[str]]):
|
217
|
+
def credentials(self, value: Optional[pulumi.Input[builtins.str]]):
|
217
218
|
pulumi.set(self, "credentials", value)
|
218
219
|
|
219
220
|
@property
|
220
221
|
@pulumi.getter(name="customTags")
|
221
|
-
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
222
|
+
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
|
222
223
|
"""
|
223
224
|
Custom tags to set on the secret managed at the destination.
|
224
225
|
"""
|
225
226
|
return pulumi.get(self, "custom_tags")
|
226
227
|
|
227
228
|
@custom_tags.setter
|
228
|
-
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
229
|
+
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
|
229
230
|
pulumi.set(self, "custom_tags", value)
|
230
231
|
|
231
232
|
@property
|
232
233
|
@pulumi.getter
|
233
|
-
def granularity(self) -> Optional[pulumi.Input[str]]:
|
234
|
+
def granularity(self) -> Optional[pulumi.Input[builtins.str]]:
|
234
235
|
"""
|
235
236
|
Determines what level of information is synced as a distinct resource
|
236
237
|
at the destination. Supports `secret-path` and `secret-key`.
|
@@ -238,24 +239,24 @@ class _SyncGcpDestinationState:
|
|
238
239
|
return pulumi.get(self, "granularity")
|
239
240
|
|
240
241
|
@granularity.setter
|
241
|
-
def granularity(self, value: Optional[pulumi.Input[str]]):
|
242
|
+
def granularity(self, value: Optional[pulumi.Input[builtins.str]]):
|
242
243
|
pulumi.set(self, "granularity", value)
|
243
244
|
|
244
245
|
@property
|
245
246
|
@pulumi.getter
|
246
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
247
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
247
248
|
"""
|
248
249
|
Unique name of the GCP destination.
|
249
250
|
"""
|
250
251
|
return pulumi.get(self, "name")
|
251
252
|
|
252
253
|
@name.setter
|
253
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
254
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
254
255
|
pulumi.set(self, "name", value)
|
255
256
|
|
256
257
|
@property
|
257
258
|
@pulumi.getter
|
258
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
259
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
259
260
|
"""
|
260
261
|
The namespace to provision the resource in.
|
261
262
|
The value should not contain leading or trailing forward slashes.
|
@@ -264,12 +265,12 @@ class _SyncGcpDestinationState:
|
|
264
265
|
return pulumi.get(self, "namespace")
|
265
266
|
|
266
267
|
@namespace.setter
|
267
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
268
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
268
269
|
pulumi.set(self, "namespace", value)
|
269
270
|
|
270
271
|
@property
|
271
272
|
@pulumi.getter(name="projectId")
|
272
|
-
def project_id(self) -> Optional[pulumi.Input[str]]:
|
273
|
+
def project_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
273
274
|
"""
|
274
275
|
The target project to manage secrets in. If set,
|
275
276
|
overrides the project ID derived from the service account JSON credentials or application
|
@@ -279,12 +280,12 @@ class _SyncGcpDestinationState:
|
|
279
280
|
return pulumi.get(self, "project_id")
|
280
281
|
|
281
282
|
@project_id.setter
|
282
|
-
def project_id(self, value: Optional[pulumi.Input[str]]):
|
283
|
+
def project_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
283
284
|
pulumi.set(self, "project_id", value)
|
284
285
|
|
285
286
|
@property
|
286
287
|
@pulumi.getter(name="secretNameTemplate")
|
287
|
-
def secret_name_template(self) -> Optional[pulumi.Input[str]]:
|
288
|
+
def secret_name_template(self) -> Optional[pulumi.Input[builtins.str]]:
|
288
289
|
"""
|
289
290
|
Template describing how to generate external secret names.
|
290
291
|
Supports a subset of the Go Template syntax.
|
@@ -292,19 +293,19 @@ class _SyncGcpDestinationState:
|
|
292
293
|
return pulumi.get(self, "secret_name_template")
|
293
294
|
|
294
295
|
@secret_name_template.setter
|
295
|
-
def secret_name_template(self, value: Optional[pulumi.Input[str]]):
|
296
|
+
def secret_name_template(self, value: Optional[pulumi.Input[builtins.str]]):
|
296
297
|
pulumi.set(self, "secret_name_template", value)
|
297
298
|
|
298
299
|
@property
|
299
300
|
@pulumi.getter
|
300
|
-
def type(self) -> Optional[pulumi.Input[str]]:
|
301
|
+
def type(self) -> Optional[pulumi.Input[builtins.str]]:
|
301
302
|
"""
|
302
303
|
The type of the secrets destination (`gcp-sm`).
|
303
304
|
"""
|
304
305
|
return pulumi.get(self, "type")
|
305
306
|
|
306
307
|
@type.setter
|
307
|
-
def type(self, value: Optional[pulumi.Input[str]]):
|
308
|
+
def type(self, value: Optional[pulumi.Input[builtins.str]]):
|
308
309
|
pulumi.set(self, "type", value)
|
309
310
|
|
310
311
|
|
@@ -313,13 +314,13 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
313
314
|
def __init__(__self__,
|
314
315
|
resource_name: str,
|
315
316
|
opts: Optional[pulumi.ResourceOptions] = None,
|
316
|
-
credentials: Optional[pulumi.Input[str]] = None,
|
317
|
-
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
318
|
-
granularity: Optional[pulumi.Input[str]] = None,
|
319
|
-
name: Optional[pulumi.Input[str]] = None,
|
320
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
321
|
-
project_id: Optional[pulumi.Input[str]] = None,
|
322
|
-
secret_name_template: Optional[pulumi.Input[str]] = None,
|
317
|
+
credentials: Optional[pulumi.Input[builtins.str]] = None,
|
318
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
319
|
+
granularity: Optional[pulumi.Input[builtins.str]] = None,
|
320
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
321
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
322
|
+
project_id: Optional[pulumi.Input[builtins.str]] = None,
|
323
|
+
secret_name_template: Optional[pulumi.Input[builtins.str]] = None,
|
323
324
|
__props__=None):
|
324
325
|
"""
|
325
326
|
## Example Usage
|
@@ -349,21 +350,21 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
349
350
|
|
350
351
|
:param str resource_name: The name of the resource.
|
351
352
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
352
|
-
:param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP.
|
353
|
+
:param pulumi.Input[builtins.str] credentials: JSON-encoded credentials to use to connect to GCP.
|
353
354
|
Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
|
354
355
|
variable.
|
355
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
356
|
-
:param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
|
356
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
357
|
+
:param pulumi.Input[builtins.str] granularity: Determines what level of information is synced as a distinct resource
|
357
358
|
at the destination. Supports `secret-path` and `secret-key`.
|
358
|
-
:param pulumi.Input[str] name: Unique name of the GCP destination.
|
359
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
359
|
+
:param pulumi.Input[builtins.str] name: Unique name of the GCP destination.
|
360
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
360
361
|
The value should not contain leading or trailing forward slashes.
|
361
362
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
362
|
-
:param pulumi.Input[str] project_id: The target project to manage secrets in. If set,
|
363
|
+
:param pulumi.Input[builtins.str] project_id: The target project to manage secrets in. If set,
|
363
364
|
overrides the project ID derived from the service account JSON credentials or application
|
364
365
|
default credentials. The service account must be [authorized](https://cloud.google.com/iam/docs/service-account-overview#locations)
|
365
366
|
to perform Secret Manager actions in the target project.
|
366
|
-
:param pulumi.Input[str] secret_name_template: Template describing how to generate external secret names.
|
367
|
+
:param pulumi.Input[builtins.str] secret_name_template: Template describing how to generate external secret names.
|
367
368
|
Supports a subset of the Go Template syntax.
|
368
369
|
"""
|
369
370
|
...
|
@@ -413,13 +414,13 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
413
414
|
def _internal_init(__self__,
|
414
415
|
resource_name: str,
|
415
416
|
opts: Optional[pulumi.ResourceOptions] = None,
|
416
|
-
credentials: Optional[pulumi.Input[str]] = None,
|
417
|
-
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
418
|
-
granularity: Optional[pulumi.Input[str]] = None,
|
419
|
-
name: Optional[pulumi.Input[str]] = None,
|
420
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
421
|
-
project_id: Optional[pulumi.Input[str]] = None,
|
422
|
-
secret_name_template: Optional[pulumi.Input[str]] = None,
|
417
|
+
credentials: Optional[pulumi.Input[builtins.str]] = None,
|
418
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
419
|
+
granularity: Optional[pulumi.Input[builtins.str]] = None,
|
420
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
421
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
422
|
+
project_id: Optional[pulumi.Input[builtins.str]] = None,
|
423
|
+
secret_name_template: Optional[pulumi.Input[builtins.str]] = None,
|
423
424
|
__props__=None):
|
424
425
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
425
426
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -449,14 +450,14 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
449
450
|
def get(resource_name: str,
|
450
451
|
id: pulumi.Input[str],
|
451
452
|
opts: Optional[pulumi.ResourceOptions] = None,
|
452
|
-
credentials: Optional[pulumi.Input[str]] = None,
|
453
|
-
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
454
|
-
granularity: Optional[pulumi.Input[str]] = None,
|
455
|
-
name: Optional[pulumi.Input[str]] = None,
|
456
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
457
|
-
project_id: Optional[pulumi.Input[str]] = None,
|
458
|
-
secret_name_template: Optional[pulumi.Input[str]] = None,
|
459
|
-
type: Optional[pulumi.Input[str]] = None) -> 'SyncGcpDestination':
|
453
|
+
credentials: Optional[pulumi.Input[builtins.str]] = None,
|
454
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
455
|
+
granularity: Optional[pulumi.Input[builtins.str]] = None,
|
456
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
457
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
458
|
+
project_id: Optional[pulumi.Input[builtins.str]] = None,
|
459
|
+
secret_name_template: Optional[pulumi.Input[builtins.str]] = None,
|
460
|
+
type: Optional[pulumi.Input[builtins.str]] = None) -> 'SyncGcpDestination':
|
460
461
|
"""
|
461
462
|
Get an existing SyncGcpDestination resource's state with the given name, id, and optional extra
|
462
463
|
properties used to qualify the lookup.
|
@@ -464,23 +465,23 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
464
465
|
:param str resource_name: The unique name of the resulting resource.
|
465
466
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
466
467
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
467
|
-
:param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP.
|
468
|
+
:param pulumi.Input[builtins.str] credentials: JSON-encoded credentials to use to connect to GCP.
|
468
469
|
Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
|
469
470
|
variable.
|
470
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
471
|
-
:param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
|
471
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
472
|
+
:param pulumi.Input[builtins.str] granularity: Determines what level of information is synced as a distinct resource
|
472
473
|
at the destination. Supports `secret-path` and `secret-key`.
|
473
|
-
:param pulumi.Input[str] name: Unique name of the GCP destination.
|
474
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
474
|
+
:param pulumi.Input[builtins.str] name: Unique name of the GCP destination.
|
475
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
475
476
|
The value should not contain leading or trailing forward slashes.
|
476
477
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
477
|
-
:param pulumi.Input[str] project_id: The target project to manage secrets in. If set,
|
478
|
+
:param pulumi.Input[builtins.str] project_id: The target project to manage secrets in. If set,
|
478
479
|
overrides the project ID derived from the service account JSON credentials or application
|
479
480
|
default credentials. The service account must be [authorized](https://cloud.google.com/iam/docs/service-account-overview#locations)
|
480
481
|
to perform Secret Manager actions in the target project.
|
481
|
-
:param pulumi.Input[str] secret_name_template: Template describing how to generate external secret names.
|
482
|
+
:param pulumi.Input[builtins.str] secret_name_template: Template describing how to generate external secret names.
|
482
483
|
Supports a subset of the Go Template syntax.
|
483
|
-
:param pulumi.Input[str] type: The type of the secrets destination (`gcp-sm`).
|
484
|
+
:param pulumi.Input[builtins.str] type: The type of the secrets destination (`gcp-sm`).
|
484
485
|
"""
|
485
486
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
486
487
|
|
@@ -498,7 +499,7 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
498
499
|
|
499
500
|
@property
|
500
501
|
@pulumi.getter
|
501
|
-
def credentials(self) -> pulumi.Output[Optional[str]]:
|
502
|
+
def credentials(self) -> pulumi.Output[Optional[builtins.str]]:
|
502
503
|
"""
|
503
504
|
JSON-encoded credentials to use to connect to GCP.
|
504
505
|
Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
|
@@ -508,7 +509,7 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
508
509
|
|
509
510
|
@property
|
510
511
|
@pulumi.getter(name="customTags")
|
511
|
-
def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
512
|
+
def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
|
512
513
|
"""
|
513
514
|
Custom tags to set on the secret managed at the destination.
|
514
515
|
"""
|
@@ -516,7 +517,7 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
516
517
|
|
517
518
|
@property
|
518
519
|
@pulumi.getter
|
519
|
-
def granularity(self) -> pulumi.Output[Optional[str]]:
|
520
|
+
def granularity(self) -> pulumi.Output[Optional[builtins.str]]:
|
520
521
|
"""
|
521
522
|
Determines what level of information is synced as a distinct resource
|
522
523
|
at the destination. Supports `secret-path` and `secret-key`.
|
@@ -525,7 +526,7 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
525
526
|
|
526
527
|
@property
|
527
528
|
@pulumi.getter
|
528
|
-
def name(self) -> pulumi.Output[str]:
|
529
|
+
def name(self) -> pulumi.Output[builtins.str]:
|
529
530
|
"""
|
530
531
|
Unique name of the GCP destination.
|
531
532
|
"""
|
@@ -533,7 +534,7 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
533
534
|
|
534
535
|
@property
|
535
536
|
@pulumi.getter
|
536
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
537
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
537
538
|
"""
|
538
539
|
The namespace to provision the resource in.
|
539
540
|
The value should not contain leading or trailing forward slashes.
|
@@ -543,7 +544,7 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
543
544
|
|
544
545
|
@property
|
545
546
|
@pulumi.getter(name="projectId")
|
546
|
-
def project_id(self) -> pulumi.Output[Optional[str]]:
|
547
|
+
def project_id(self) -> pulumi.Output[Optional[builtins.str]]:
|
547
548
|
"""
|
548
549
|
The target project to manage secrets in. If set,
|
549
550
|
overrides the project ID derived from the service account JSON credentials or application
|
@@ -554,7 +555,7 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
554
555
|
|
555
556
|
@property
|
556
557
|
@pulumi.getter(name="secretNameTemplate")
|
557
|
-
def secret_name_template(self) -> pulumi.Output[str]:
|
558
|
+
def secret_name_template(self) -> pulumi.Output[builtins.str]:
|
558
559
|
"""
|
559
560
|
Template describing how to generate external secret names.
|
560
561
|
Supports a subset of the Go Template syntax.
|
@@ -563,7 +564,7 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
563
564
|
|
564
565
|
@property
|
565
566
|
@pulumi.getter
|
566
|
-
def type(self) -> pulumi.Output[str]:
|
567
|
+
def type(self) -> pulumi.Output[builtins.str]:
|
567
568
|
"""
|
568
569
|
The type of the secrets destination (`gcp-sm`).
|
569
570
|
"""
|