pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,30 +19,30 @@ __all__ = ['SyncGcpDestinationArgs', 'SyncGcpDestination']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SyncGcpDestinationArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
credentials: Optional[pulumi.Input[
|
24
|
-
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
25
|
-
granularity: Optional[pulumi.Input[
|
26
|
-
name: Optional[pulumi.Input[
|
27
|
-
namespace: Optional[pulumi.Input[
|
28
|
-
project_id: Optional[pulumi.Input[
|
29
|
-
secret_name_template: Optional[pulumi.Input[
|
22
|
+
credentials: Optional[pulumi.Input[_builtins.str]] = None,
|
23
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
24
|
+
granularity: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
project_id: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
secret_name_template: Optional[pulumi.Input[_builtins.str]] = None):
|
30
29
|
"""
|
31
30
|
The set of arguments for constructing a SyncGcpDestination resource.
|
32
|
-
:param pulumi.Input[
|
31
|
+
:param pulumi.Input[_builtins.str] credentials: JSON-encoded credentials to use to connect to GCP.
|
33
32
|
Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
|
34
33
|
variable.
|
35
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
36
|
-
:param pulumi.Input[
|
34
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
35
|
+
:param pulumi.Input[_builtins.str] granularity: Determines what level of information is synced as a distinct resource
|
37
36
|
at the destination. Supports `secret-path` and `secret-key`.
|
38
|
-
:param pulumi.Input[
|
39
|
-
:param pulumi.Input[
|
37
|
+
:param pulumi.Input[_builtins.str] name: Unique name of the GCP destination.
|
38
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
40
39
|
The value should not contain leading or trailing forward slashes.
|
41
40
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
42
|
-
:param pulumi.Input[
|
41
|
+
:param pulumi.Input[_builtins.str] project_id: The target project to manage secrets in. If set,
|
43
42
|
overrides the project ID derived from the service account JSON credentials or application
|
44
43
|
default credentials. The service account must be [authorized](https://cloud.google.com/iam/docs/service-account-overview#locations)
|
45
44
|
to perform Secret Manager actions in the target project.
|
46
|
-
:param pulumi.Input[
|
45
|
+
:param pulumi.Input[_builtins.str] secret_name_template: Template describing how to generate external secret names.
|
47
46
|
Supports a subset of the Go Template syntax.
|
48
47
|
"""
|
49
48
|
if credentials is not None:
|
@@ -61,9 +60,9 @@ class SyncGcpDestinationArgs:
|
|
61
60
|
if secret_name_template is not None:
|
62
61
|
pulumi.set(__self__, "secret_name_template", secret_name_template)
|
63
62
|
|
64
|
-
@property
|
63
|
+
@_builtins.property
|
65
64
|
@pulumi.getter
|
66
|
-
def credentials(self) -> Optional[pulumi.Input[
|
65
|
+
def credentials(self) -> Optional[pulumi.Input[_builtins.str]]:
|
67
66
|
"""
|
68
67
|
JSON-encoded credentials to use to connect to GCP.
|
69
68
|
Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
|
@@ -72,24 +71,24 @@ class SyncGcpDestinationArgs:
|
|
72
71
|
return pulumi.get(self, "credentials")
|
73
72
|
|
74
73
|
@credentials.setter
|
75
|
-
def credentials(self, value: Optional[pulumi.Input[
|
74
|
+
def credentials(self, value: Optional[pulumi.Input[_builtins.str]]):
|
76
75
|
pulumi.set(self, "credentials", value)
|
77
76
|
|
78
|
-
@property
|
77
|
+
@_builtins.property
|
79
78
|
@pulumi.getter(name="customTags")
|
80
|
-
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
79
|
+
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
81
80
|
"""
|
82
81
|
Custom tags to set on the secret managed at the destination.
|
83
82
|
"""
|
84
83
|
return pulumi.get(self, "custom_tags")
|
85
84
|
|
86
85
|
@custom_tags.setter
|
87
|
-
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
86
|
+
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
88
87
|
pulumi.set(self, "custom_tags", value)
|
89
88
|
|
90
|
-
@property
|
89
|
+
@_builtins.property
|
91
90
|
@pulumi.getter
|
92
|
-
def granularity(self) -> Optional[pulumi.Input[
|
91
|
+
def granularity(self) -> Optional[pulumi.Input[_builtins.str]]:
|
93
92
|
"""
|
94
93
|
Determines what level of information is synced as a distinct resource
|
95
94
|
at the destination. Supports `secret-path` and `secret-key`.
|
@@ -97,24 +96,24 @@ class SyncGcpDestinationArgs:
|
|
97
96
|
return pulumi.get(self, "granularity")
|
98
97
|
|
99
98
|
@granularity.setter
|
100
|
-
def granularity(self, value: Optional[pulumi.Input[
|
99
|
+
def granularity(self, value: Optional[pulumi.Input[_builtins.str]]):
|
101
100
|
pulumi.set(self, "granularity", value)
|
102
101
|
|
103
|
-
@property
|
102
|
+
@_builtins.property
|
104
103
|
@pulumi.getter
|
105
|
-
def name(self) -> Optional[pulumi.Input[
|
104
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
106
105
|
"""
|
107
106
|
Unique name of the GCP destination.
|
108
107
|
"""
|
109
108
|
return pulumi.get(self, "name")
|
110
109
|
|
111
110
|
@name.setter
|
112
|
-
def name(self, value: Optional[pulumi.Input[
|
111
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
113
112
|
pulumi.set(self, "name", value)
|
114
113
|
|
115
|
-
@property
|
114
|
+
@_builtins.property
|
116
115
|
@pulumi.getter
|
117
|
-
def namespace(self) -> Optional[pulumi.Input[
|
116
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
118
117
|
"""
|
119
118
|
The namespace to provision the resource in.
|
120
119
|
The value should not contain leading or trailing forward slashes.
|
@@ -123,12 +122,12 @@ class SyncGcpDestinationArgs:
|
|
123
122
|
return pulumi.get(self, "namespace")
|
124
123
|
|
125
124
|
@namespace.setter
|
126
|
-
def namespace(self, value: Optional[pulumi.Input[
|
125
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
127
126
|
pulumi.set(self, "namespace", value)
|
128
127
|
|
129
|
-
@property
|
128
|
+
@_builtins.property
|
130
129
|
@pulumi.getter(name="projectId")
|
131
|
-
def project_id(self) -> Optional[pulumi.Input[
|
130
|
+
def project_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
132
131
|
"""
|
133
132
|
The target project to manage secrets in. If set,
|
134
133
|
overrides the project ID derived from the service account JSON credentials or application
|
@@ -138,12 +137,12 @@ class SyncGcpDestinationArgs:
|
|
138
137
|
return pulumi.get(self, "project_id")
|
139
138
|
|
140
139
|
@project_id.setter
|
141
|
-
def project_id(self, value: Optional[pulumi.Input[
|
140
|
+
def project_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
142
141
|
pulumi.set(self, "project_id", value)
|
143
142
|
|
144
|
-
@property
|
143
|
+
@_builtins.property
|
145
144
|
@pulumi.getter(name="secretNameTemplate")
|
146
|
-
def secret_name_template(self) -> Optional[pulumi.Input[
|
145
|
+
def secret_name_template(self) -> Optional[pulumi.Input[_builtins.str]]:
|
147
146
|
"""
|
148
147
|
Template describing how to generate external secret names.
|
149
148
|
Supports a subset of the Go Template syntax.
|
@@ -151,40 +150,40 @@ class SyncGcpDestinationArgs:
|
|
151
150
|
return pulumi.get(self, "secret_name_template")
|
152
151
|
|
153
152
|
@secret_name_template.setter
|
154
|
-
def secret_name_template(self, value: Optional[pulumi.Input[
|
153
|
+
def secret_name_template(self, value: Optional[pulumi.Input[_builtins.str]]):
|
155
154
|
pulumi.set(self, "secret_name_template", value)
|
156
155
|
|
157
156
|
|
158
157
|
@pulumi.input_type
|
159
158
|
class _SyncGcpDestinationState:
|
160
159
|
def __init__(__self__, *,
|
161
|
-
credentials: Optional[pulumi.Input[
|
162
|
-
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
163
|
-
granularity: Optional[pulumi.Input[
|
164
|
-
name: Optional[pulumi.Input[
|
165
|
-
namespace: Optional[pulumi.Input[
|
166
|
-
project_id: Optional[pulumi.Input[
|
167
|
-
secret_name_template: Optional[pulumi.Input[
|
168
|
-
type: Optional[pulumi.Input[
|
160
|
+
credentials: Optional[pulumi.Input[_builtins.str]] = None,
|
161
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
162
|
+
granularity: Optional[pulumi.Input[_builtins.str]] = None,
|
163
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
164
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
165
|
+
project_id: Optional[pulumi.Input[_builtins.str]] = None,
|
166
|
+
secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
|
167
|
+
type: Optional[pulumi.Input[_builtins.str]] = None):
|
169
168
|
"""
|
170
169
|
Input properties used for looking up and filtering SyncGcpDestination resources.
|
171
|
-
:param pulumi.Input[
|
170
|
+
:param pulumi.Input[_builtins.str] credentials: JSON-encoded credentials to use to connect to GCP.
|
172
171
|
Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
|
173
172
|
variable.
|
174
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
175
|
-
:param pulumi.Input[
|
173
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
174
|
+
:param pulumi.Input[_builtins.str] granularity: Determines what level of information is synced as a distinct resource
|
176
175
|
at the destination. Supports `secret-path` and `secret-key`.
|
177
|
-
:param pulumi.Input[
|
178
|
-
:param pulumi.Input[
|
176
|
+
:param pulumi.Input[_builtins.str] name: Unique name of the GCP destination.
|
177
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
179
178
|
The value should not contain leading or trailing forward slashes.
|
180
179
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
181
|
-
:param pulumi.Input[
|
180
|
+
:param pulumi.Input[_builtins.str] project_id: The target project to manage secrets in. If set,
|
182
181
|
overrides the project ID derived from the service account JSON credentials or application
|
183
182
|
default credentials. The service account must be [authorized](https://cloud.google.com/iam/docs/service-account-overview#locations)
|
184
183
|
to perform Secret Manager actions in the target project.
|
185
|
-
:param pulumi.Input[
|
184
|
+
:param pulumi.Input[_builtins.str] secret_name_template: Template describing how to generate external secret names.
|
186
185
|
Supports a subset of the Go Template syntax.
|
187
|
-
:param pulumi.Input[
|
186
|
+
:param pulumi.Input[_builtins.str] type: The type of the secrets destination (`gcp-sm`).
|
188
187
|
"""
|
189
188
|
if credentials is not None:
|
190
189
|
pulumi.set(__self__, "credentials", credentials)
|
@@ -203,9 +202,9 @@ class _SyncGcpDestinationState:
|
|
203
202
|
if type is not None:
|
204
203
|
pulumi.set(__self__, "type", type)
|
205
204
|
|
206
|
-
@property
|
205
|
+
@_builtins.property
|
207
206
|
@pulumi.getter
|
208
|
-
def credentials(self) -> Optional[pulumi.Input[
|
207
|
+
def credentials(self) -> Optional[pulumi.Input[_builtins.str]]:
|
209
208
|
"""
|
210
209
|
JSON-encoded credentials to use to connect to GCP.
|
211
210
|
Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
|
@@ -214,24 +213,24 @@ class _SyncGcpDestinationState:
|
|
214
213
|
return pulumi.get(self, "credentials")
|
215
214
|
|
216
215
|
@credentials.setter
|
217
|
-
def credentials(self, value: Optional[pulumi.Input[
|
216
|
+
def credentials(self, value: Optional[pulumi.Input[_builtins.str]]):
|
218
217
|
pulumi.set(self, "credentials", value)
|
219
218
|
|
220
|
-
@property
|
219
|
+
@_builtins.property
|
221
220
|
@pulumi.getter(name="customTags")
|
222
|
-
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
221
|
+
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
223
222
|
"""
|
224
223
|
Custom tags to set on the secret managed at the destination.
|
225
224
|
"""
|
226
225
|
return pulumi.get(self, "custom_tags")
|
227
226
|
|
228
227
|
@custom_tags.setter
|
229
|
-
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
228
|
+
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
230
229
|
pulumi.set(self, "custom_tags", value)
|
231
230
|
|
232
|
-
@property
|
231
|
+
@_builtins.property
|
233
232
|
@pulumi.getter
|
234
|
-
def granularity(self) -> Optional[pulumi.Input[
|
233
|
+
def granularity(self) -> Optional[pulumi.Input[_builtins.str]]:
|
235
234
|
"""
|
236
235
|
Determines what level of information is synced as a distinct resource
|
237
236
|
at the destination. Supports `secret-path` and `secret-key`.
|
@@ -239,24 +238,24 @@ class _SyncGcpDestinationState:
|
|
239
238
|
return pulumi.get(self, "granularity")
|
240
239
|
|
241
240
|
@granularity.setter
|
242
|
-
def granularity(self, value: Optional[pulumi.Input[
|
241
|
+
def granularity(self, value: Optional[pulumi.Input[_builtins.str]]):
|
243
242
|
pulumi.set(self, "granularity", value)
|
244
243
|
|
245
|
-
@property
|
244
|
+
@_builtins.property
|
246
245
|
@pulumi.getter
|
247
|
-
def name(self) -> Optional[pulumi.Input[
|
246
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
248
247
|
"""
|
249
248
|
Unique name of the GCP destination.
|
250
249
|
"""
|
251
250
|
return pulumi.get(self, "name")
|
252
251
|
|
253
252
|
@name.setter
|
254
|
-
def name(self, value: Optional[pulumi.Input[
|
253
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
255
254
|
pulumi.set(self, "name", value)
|
256
255
|
|
257
|
-
@property
|
256
|
+
@_builtins.property
|
258
257
|
@pulumi.getter
|
259
|
-
def namespace(self) -> Optional[pulumi.Input[
|
258
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
260
259
|
"""
|
261
260
|
The namespace to provision the resource in.
|
262
261
|
The value should not contain leading or trailing forward slashes.
|
@@ -265,12 +264,12 @@ class _SyncGcpDestinationState:
|
|
265
264
|
return pulumi.get(self, "namespace")
|
266
265
|
|
267
266
|
@namespace.setter
|
268
|
-
def namespace(self, value: Optional[pulumi.Input[
|
267
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
269
268
|
pulumi.set(self, "namespace", value)
|
270
269
|
|
271
|
-
@property
|
270
|
+
@_builtins.property
|
272
271
|
@pulumi.getter(name="projectId")
|
273
|
-
def project_id(self) -> Optional[pulumi.Input[
|
272
|
+
def project_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
274
273
|
"""
|
275
274
|
The target project to manage secrets in. If set,
|
276
275
|
overrides the project ID derived from the service account JSON credentials or application
|
@@ -280,12 +279,12 @@ class _SyncGcpDestinationState:
|
|
280
279
|
return pulumi.get(self, "project_id")
|
281
280
|
|
282
281
|
@project_id.setter
|
283
|
-
def project_id(self, value: Optional[pulumi.Input[
|
282
|
+
def project_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
284
283
|
pulumi.set(self, "project_id", value)
|
285
284
|
|
286
|
-
@property
|
285
|
+
@_builtins.property
|
287
286
|
@pulumi.getter(name="secretNameTemplate")
|
288
|
-
def secret_name_template(self) -> Optional[pulumi.Input[
|
287
|
+
def secret_name_template(self) -> Optional[pulumi.Input[_builtins.str]]:
|
289
288
|
"""
|
290
289
|
Template describing how to generate external secret names.
|
291
290
|
Supports a subset of the Go Template syntax.
|
@@ -293,19 +292,19 @@ class _SyncGcpDestinationState:
|
|
293
292
|
return pulumi.get(self, "secret_name_template")
|
294
293
|
|
295
294
|
@secret_name_template.setter
|
296
|
-
def secret_name_template(self, value: Optional[pulumi.Input[
|
295
|
+
def secret_name_template(self, value: Optional[pulumi.Input[_builtins.str]]):
|
297
296
|
pulumi.set(self, "secret_name_template", value)
|
298
297
|
|
299
|
-
@property
|
298
|
+
@_builtins.property
|
300
299
|
@pulumi.getter
|
301
|
-
def type(self) -> Optional[pulumi.Input[
|
300
|
+
def type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
302
301
|
"""
|
303
302
|
The type of the secrets destination (`gcp-sm`).
|
304
303
|
"""
|
305
304
|
return pulumi.get(self, "type")
|
306
305
|
|
307
306
|
@type.setter
|
308
|
-
def type(self, value: Optional[pulumi.Input[
|
307
|
+
def type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
309
308
|
pulumi.set(self, "type", value)
|
310
309
|
|
311
310
|
|
@@ -315,13 +314,13 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
315
314
|
def __init__(__self__,
|
316
315
|
resource_name: str,
|
317
316
|
opts: Optional[pulumi.ResourceOptions] = None,
|
318
|
-
credentials: Optional[pulumi.Input[
|
319
|
-
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
320
|
-
granularity: Optional[pulumi.Input[
|
321
|
-
name: Optional[pulumi.Input[
|
322
|
-
namespace: Optional[pulumi.Input[
|
323
|
-
project_id: Optional[pulumi.Input[
|
324
|
-
secret_name_template: Optional[pulumi.Input[
|
317
|
+
credentials: Optional[pulumi.Input[_builtins.str]] = None,
|
318
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
319
|
+
granularity: Optional[pulumi.Input[_builtins.str]] = None,
|
320
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
321
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
322
|
+
project_id: Optional[pulumi.Input[_builtins.str]] = None,
|
323
|
+
secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
|
325
324
|
__props__=None):
|
326
325
|
"""
|
327
326
|
## Example Usage
|
@@ -351,21 +350,21 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
351
350
|
|
352
351
|
:param str resource_name: The name of the resource.
|
353
352
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
354
|
-
:param pulumi.Input[
|
353
|
+
:param pulumi.Input[_builtins.str] credentials: JSON-encoded credentials to use to connect to GCP.
|
355
354
|
Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
|
356
355
|
variable.
|
357
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
358
|
-
:param pulumi.Input[
|
356
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
357
|
+
:param pulumi.Input[_builtins.str] granularity: Determines what level of information is synced as a distinct resource
|
359
358
|
at the destination. Supports `secret-path` and `secret-key`.
|
360
|
-
:param pulumi.Input[
|
361
|
-
:param pulumi.Input[
|
359
|
+
:param pulumi.Input[_builtins.str] name: Unique name of the GCP destination.
|
360
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
362
361
|
The value should not contain leading or trailing forward slashes.
|
363
362
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
364
|
-
:param pulumi.Input[
|
363
|
+
:param pulumi.Input[_builtins.str] project_id: The target project to manage secrets in. If set,
|
365
364
|
overrides the project ID derived from the service account JSON credentials or application
|
366
365
|
default credentials. The service account must be [authorized](https://cloud.google.com/iam/docs/service-account-overview#locations)
|
367
366
|
to perform Secret Manager actions in the target project.
|
368
|
-
:param pulumi.Input[
|
367
|
+
:param pulumi.Input[_builtins.str] secret_name_template: Template describing how to generate external secret names.
|
369
368
|
Supports a subset of the Go Template syntax.
|
370
369
|
"""
|
371
370
|
...
|
@@ -415,13 +414,13 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
415
414
|
def _internal_init(__self__,
|
416
415
|
resource_name: str,
|
417
416
|
opts: Optional[pulumi.ResourceOptions] = None,
|
418
|
-
credentials: Optional[pulumi.Input[
|
419
|
-
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
420
|
-
granularity: Optional[pulumi.Input[
|
421
|
-
name: Optional[pulumi.Input[
|
422
|
-
namespace: Optional[pulumi.Input[
|
423
|
-
project_id: Optional[pulumi.Input[
|
424
|
-
secret_name_template: Optional[pulumi.Input[
|
417
|
+
credentials: Optional[pulumi.Input[_builtins.str]] = None,
|
418
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
419
|
+
granularity: Optional[pulumi.Input[_builtins.str]] = None,
|
420
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
421
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
422
|
+
project_id: Optional[pulumi.Input[_builtins.str]] = None,
|
423
|
+
secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
|
425
424
|
__props__=None):
|
426
425
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
427
426
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -451,14 +450,14 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
451
450
|
def get(resource_name: str,
|
452
451
|
id: pulumi.Input[str],
|
453
452
|
opts: Optional[pulumi.ResourceOptions] = None,
|
454
|
-
credentials: Optional[pulumi.Input[
|
455
|
-
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
456
|
-
granularity: Optional[pulumi.Input[
|
457
|
-
name: Optional[pulumi.Input[
|
458
|
-
namespace: Optional[pulumi.Input[
|
459
|
-
project_id: Optional[pulumi.Input[
|
460
|
-
secret_name_template: Optional[pulumi.Input[
|
461
|
-
type: Optional[pulumi.Input[
|
453
|
+
credentials: Optional[pulumi.Input[_builtins.str]] = None,
|
454
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
455
|
+
granularity: Optional[pulumi.Input[_builtins.str]] = None,
|
456
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
457
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
458
|
+
project_id: Optional[pulumi.Input[_builtins.str]] = None,
|
459
|
+
secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
|
460
|
+
type: Optional[pulumi.Input[_builtins.str]] = None) -> 'SyncGcpDestination':
|
462
461
|
"""
|
463
462
|
Get an existing SyncGcpDestination resource's state with the given name, id, and optional extra
|
464
463
|
properties used to qualify the lookup.
|
@@ -466,23 +465,23 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
466
465
|
:param str resource_name: The unique name of the resulting resource.
|
467
466
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
468
467
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
469
|
-
:param pulumi.Input[
|
468
|
+
:param pulumi.Input[_builtins.str] credentials: JSON-encoded credentials to use to connect to GCP.
|
470
469
|
Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
|
471
470
|
variable.
|
472
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
473
|
-
:param pulumi.Input[
|
471
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
472
|
+
:param pulumi.Input[_builtins.str] granularity: Determines what level of information is synced as a distinct resource
|
474
473
|
at the destination. Supports `secret-path` and `secret-key`.
|
475
|
-
:param pulumi.Input[
|
476
|
-
:param pulumi.Input[
|
474
|
+
:param pulumi.Input[_builtins.str] name: Unique name of the GCP destination.
|
475
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
477
476
|
The value should not contain leading or trailing forward slashes.
|
478
477
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
479
|
-
:param pulumi.Input[
|
478
|
+
:param pulumi.Input[_builtins.str] project_id: The target project to manage secrets in. If set,
|
480
479
|
overrides the project ID derived from the service account JSON credentials or application
|
481
480
|
default credentials. The service account must be [authorized](https://cloud.google.com/iam/docs/service-account-overview#locations)
|
482
481
|
to perform Secret Manager actions in the target project.
|
483
|
-
:param pulumi.Input[
|
482
|
+
:param pulumi.Input[_builtins.str] secret_name_template: Template describing how to generate external secret names.
|
484
483
|
Supports a subset of the Go Template syntax.
|
485
|
-
:param pulumi.Input[
|
484
|
+
:param pulumi.Input[_builtins.str] type: The type of the secrets destination (`gcp-sm`).
|
486
485
|
"""
|
487
486
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
488
487
|
|
@@ -498,9 +497,9 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
498
497
|
__props__.__dict__["type"] = type
|
499
498
|
return SyncGcpDestination(resource_name, opts=opts, __props__=__props__)
|
500
499
|
|
501
|
-
@property
|
500
|
+
@_builtins.property
|
502
501
|
@pulumi.getter
|
503
|
-
def credentials(self) -> pulumi.Output[Optional[
|
502
|
+
def credentials(self) -> pulumi.Output[Optional[_builtins.str]]:
|
504
503
|
"""
|
505
504
|
JSON-encoded credentials to use to connect to GCP.
|
506
505
|
Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
|
@@ -508,34 +507,34 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
508
507
|
"""
|
509
508
|
return pulumi.get(self, "credentials")
|
510
509
|
|
511
|
-
@property
|
510
|
+
@_builtins.property
|
512
511
|
@pulumi.getter(name="customTags")
|
513
|
-
def custom_tags(self) -> pulumi.Output[Optional[Mapping[str,
|
512
|
+
def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
514
513
|
"""
|
515
514
|
Custom tags to set on the secret managed at the destination.
|
516
515
|
"""
|
517
516
|
return pulumi.get(self, "custom_tags")
|
518
517
|
|
519
|
-
@property
|
518
|
+
@_builtins.property
|
520
519
|
@pulumi.getter
|
521
|
-
def granularity(self) -> pulumi.Output[Optional[
|
520
|
+
def granularity(self) -> pulumi.Output[Optional[_builtins.str]]:
|
522
521
|
"""
|
523
522
|
Determines what level of information is synced as a distinct resource
|
524
523
|
at the destination. Supports `secret-path` and `secret-key`.
|
525
524
|
"""
|
526
525
|
return pulumi.get(self, "granularity")
|
527
526
|
|
528
|
-
@property
|
527
|
+
@_builtins.property
|
529
528
|
@pulumi.getter
|
530
|
-
def name(self) -> pulumi.Output[
|
529
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
531
530
|
"""
|
532
531
|
Unique name of the GCP destination.
|
533
532
|
"""
|
534
533
|
return pulumi.get(self, "name")
|
535
534
|
|
536
|
-
@property
|
535
|
+
@_builtins.property
|
537
536
|
@pulumi.getter
|
538
|
-
def namespace(self) -> pulumi.Output[Optional[
|
537
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
539
538
|
"""
|
540
539
|
The namespace to provision the resource in.
|
541
540
|
The value should not contain leading or trailing forward slashes.
|
@@ -543,9 +542,9 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
543
542
|
"""
|
544
543
|
return pulumi.get(self, "namespace")
|
545
544
|
|
546
|
-
@property
|
545
|
+
@_builtins.property
|
547
546
|
@pulumi.getter(name="projectId")
|
548
|
-
def project_id(self) -> pulumi.Output[Optional[
|
547
|
+
def project_id(self) -> pulumi.Output[Optional[_builtins.str]]:
|
549
548
|
"""
|
550
549
|
The target project to manage secrets in. If set,
|
551
550
|
overrides the project ID derived from the service account JSON credentials or application
|
@@ -554,18 +553,18 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
554
553
|
"""
|
555
554
|
return pulumi.get(self, "project_id")
|
556
555
|
|
557
|
-
@property
|
556
|
+
@_builtins.property
|
558
557
|
@pulumi.getter(name="secretNameTemplate")
|
559
|
-
def secret_name_template(self) -> pulumi.Output[
|
558
|
+
def secret_name_template(self) -> pulumi.Output[_builtins.str]:
|
560
559
|
"""
|
561
560
|
Template describing how to generate external secret names.
|
562
561
|
Supports a subset of the Go Template syntax.
|
563
562
|
"""
|
564
563
|
return pulumi.get(self, "secret_name_template")
|
565
564
|
|
566
|
-
@property
|
565
|
+
@_builtins.property
|
567
566
|
@pulumi.getter
|
568
|
-
def type(self) -> pulumi.Output[
|
567
|
+
def type(self) -> pulumi.Output[_builtins.str]:
|
569
568
|
"""
|
570
569
|
The type of the secrets destination (`gcp-sm`).
|
571
570
|
"""
|