pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,30 +19,30 @@ __all__ = ['SyncGcpDestinationArgs', 'SyncGcpDestination']
20
19
  @pulumi.input_type
21
20
  class SyncGcpDestinationArgs:
22
21
  def __init__(__self__, *,
23
- credentials: Optional[pulumi.Input[builtins.str]] = None,
24
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
25
- granularity: Optional[pulumi.Input[builtins.str]] = None,
26
- name: Optional[pulumi.Input[builtins.str]] = None,
27
- namespace: Optional[pulumi.Input[builtins.str]] = None,
28
- project_id: Optional[pulumi.Input[builtins.str]] = None,
29
- secret_name_template: Optional[pulumi.Input[builtins.str]] = None):
22
+ credentials: Optional[pulumi.Input[_builtins.str]] = None,
23
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
24
+ granularity: Optional[pulumi.Input[_builtins.str]] = None,
25
+ name: Optional[pulumi.Input[_builtins.str]] = None,
26
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
27
+ project_id: Optional[pulumi.Input[_builtins.str]] = None,
28
+ secret_name_template: Optional[pulumi.Input[_builtins.str]] = None):
30
29
  """
31
30
  The set of arguments for constructing a SyncGcpDestination resource.
32
- :param pulumi.Input[builtins.str] credentials: JSON-encoded credentials to use to connect to GCP.
31
+ :param pulumi.Input[_builtins.str] credentials: JSON-encoded credentials to use to connect to GCP.
33
32
  Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
34
33
  variable.
35
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
36
- :param pulumi.Input[builtins.str] granularity: Determines what level of information is synced as a distinct resource
34
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
35
+ :param pulumi.Input[_builtins.str] granularity: Determines what level of information is synced as a distinct resource
37
36
  at the destination. Supports `secret-path` and `secret-key`.
38
- :param pulumi.Input[builtins.str] name: Unique name of the GCP destination.
39
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
37
+ :param pulumi.Input[_builtins.str] name: Unique name of the GCP destination.
38
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
40
39
  The value should not contain leading or trailing forward slashes.
41
40
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
42
- :param pulumi.Input[builtins.str] project_id: The target project to manage secrets in. If set,
41
+ :param pulumi.Input[_builtins.str] project_id: The target project to manage secrets in. If set,
43
42
  overrides the project ID derived from the service account JSON credentials or application
44
43
  default credentials. The service account must be [authorized](https://cloud.google.com/iam/docs/service-account-overview#locations)
45
44
  to perform Secret Manager actions in the target project.
46
- :param pulumi.Input[builtins.str] secret_name_template: Template describing how to generate external secret names.
45
+ :param pulumi.Input[_builtins.str] secret_name_template: Template describing how to generate external secret names.
47
46
  Supports a subset of the Go Template syntax.
48
47
  """
49
48
  if credentials is not None:
@@ -61,9 +60,9 @@ class SyncGcpDestinationArgs:
61
60
  if secret_name_template is not None:
62
61
  pulumi.set(__self__, "secret_name_template", secret_name_template)
63
62
 
64
- @property
63
+ @_builtins.property
65
64
  @pulumi.getter
66
- def credentials(self) -> Optional[pulumi.Input[builtins.str]]:
65
+ def credentials(self) -> Optional[pulumi.Input[_builtins.str]]:
67
66
  """
68
67
  JSON-encoded credentials to use to connect to GCP.
69
68
  Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
@@ -72,24 +71,24 @@ class SyncGcpDestinationArgs:
72
71
  return pulumi.get(self, "credentials")
73
72
 
74
73
  @credentials.setter
75
- def credentials(self, value: Optional[pulumi.Input[builtins.str]]):
74
+ def credentials(self, value: Optional[pulumi.Input[_builtins.str]]):
76
75
  pulumi.set(self, "credentials", value)
77
76
 
78
- @property
77
+ @_builtins.property
79
78
  @pulumi.getter(name="customTags")
80
- def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
79
+ def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
81
80
  """
82
81
  Custom tags to set on the secret managed at the destination.
83
82
  """
84
83
  return pulumi.get(self, "custom_tags")
85
84
 
86
85
  @custom_tags.setter
87
- def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
86
+ def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
88
87
  pulumi.set(self, "custom_tags", value)
89
88
 
90
- @property
89
+ @_builtins.property
91
90
  @pulumi.getter
92
- def granularity(self) -> Optional[pulumi.Input[builtins.str]]:
91
+ def granularity(self) -> Optional[pulumi.Input[_builtins.str]]:
93
92
  """
94
93
  Determines what level of information is synced as a distinct resource
95
94
  at the destination. Supports `secret-path` and `secret-key`.
@@ -97,24 +96,24 @@ class SyncGcpDestinationArgs:
97
96
  return pulumi.get(self, "granularity")
98
97
 
99
98
  @granularity.setter
100
- def granularity(self, value: Optional[pulumi.Input[builtins.str]]):
99
+ def granularity(self, value: Optional[pulumi.Input[_builtins.str]]):
101
100
  pulumi.set(self, "granularity", value)
102
101
 
103
- @property
102
+ @_builtins.property
104
103
  @pulumi.getter
105
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
104
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
106
105
  """
107
106
  Unique name of the GCP destination.
108
107
  """
109
108
  return pulumi.get(self, "name")
110
109
 
111
110
  @name.setter
112
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
111
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
113
112
  pulumi.set(self, "name", value)
114
113
 
115
- @property
114
+ @_builtins.property
116
115
  @pulumi.getter
117
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
116
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
118
117
  """
119
118
  The namespace to provision the resource in.
120
119
  The value should not contain leading or trailing forward slashes.
@@ -123,12 +122,12 @@ class SyncGcpDestinationArgs:
123
122
  return pulumi.get(self, "namespace")
124
123
 
125
124
  @namespace.setter
126
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
125
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
127
126
  pulumi.set(self, "namespace", value)
128
127
 
129
- @property
128
+ @_builtins.property
130
129
  @pulumi.getter(name="projectId")
131
- def project_id(self) -> Optional[pulumi.Input[builtins.str]]:
130
+ def project_id(self) -> Optional[pulumi.Input[_builtins.str]]:
132
131
  """
133
132
  The target project to manage secrets in. If set,
134
133
  overrides the project ID derived from the service account JSON credentials or application
@@ -138,12 +137,12 @@ class SyncGcpDestinationArgs:
138
137
  return pulumi.get(self, "project_id")
139
138
 
140
139
  @project_id.setter
141
- def project_id(self, value: Optional[pulumi.Input[builtins.str]]):
140
+ def project_id(self, value: Optional[pulumi.Input[_builtins.str]]):
142
141
  pulumi.set(self, "project_id", value)
143
142
 
144
- @property
143
+ @_builtins.property
145
144
  @pulumi.getter(name="secretNameTemplate")
146
- def secret_name_template(self) -> Optional[pulumi.Input[builtins.str]]:
145
+ def secret_name_template(self) -> Optional[pulumi.Input[_builtins.str]]:
147
146
  """
148
147
  Template describing how to generate external secret names.
149
148
  Supports a subset of the Go Template syntax.
@@ -151,40 +150,40 @@ class SyncGcpDestinationArgs:
151
150
  return pulumi.get(self, "secret_name_template")
152
151
 
153
152
  @secret_name_template.setter
154
- def secret_name_template(self, value: Optional[pulumi.Input[builtins.str]]):
153
+ def secret_name_template(self, value: Optional[pulumi.Input[_builtins.str]]):
155
154
  pulumi.set(self, "secret_name_template", value)
156
155
 
157
156
 
158
157
  @pulumi.input_type
159
158
  class _SyncGcpDestinationState:
160
159
  def __init__(__self__, *,
161
- credentials: Optional[pulumi.Input[builtins.str]] = None,
162
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
163
- granularity: Optional[pulumi.Input[builtins.str]] = None,
164
- name: Optional[pulumi.Input[builtins.str]] = None,
165
- namespace: Optional[pulumi.Input[builtins.str]] = None,
166
- project_id: Optional[pulumi.Input[builtins.str]] = None,
167
- secret_name_template: Optional[pulumi.Input[builtins.str]] = None,
168
- type: Optional[pulumi.Input[builtins.str]] = None):
160
+ credentials: Optional[pulumi.Input[_builtins.str]] = None,
161
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
162
+ granularity: Optional[pulumi.Input[_builtins.str]] = None,
163
+ name: Optional[pulumi.Input[_builtins.str]] = None,
164
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
165
+ project_id: Optional[pulumi.Input[_builtins.str]] = None,
166
+ secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
167
+ type: Optional[pulumi.Input[_builtins.str]] = None):
169
168
  """
170
169
  Input properties used for looking up and filtering SyncGcpDestination resources.
171
- :param pulumi.Input[builtins.str] credentials: JSON-encoded credentials to use to connect to GCP.
170
+ :param pulumi.Input[_builtins.str] credentials: JSON-encoded credentials to use to connect to GCP.
172
171
  Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
173
172
  variable.
174
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
175
- :param pulumi.Input[builtins.str] granularity: Determines what level of information is synced as a distinct resource
173
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
174
+ :param pulumi.Input[_builtins.str] granularity: Determines what level of information is synced as a distinct resource
176
175
  at the destination. Supports `secret-path` and `secret-key`.
177
- :param pulumi.Input[builtins.str] name: Unique name of the GCP destination.
178
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
176
+ :param pulumi.Input[_builtins.str] name: Unique name of the GCP destination.
177
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
179
178
  The value should not contain leading or trailing forward slashes.
180
179
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
181
- :param pulumi.Input[builtins.str] project_id: The target project to manage secrets in. If set,
180
+ :param pulumi.Input[_builtins.str] project_id: The target project to manage secrets in. If set,
182
181
  overrides the project ID derived from the service account JSON credentials or application
183
182
  default credentials. The service account must be [authorized](https://cloud.google.com/iam/docs/service-account-overview#locations)
184
183
  to perform Secret Manager actions in the target project.
185
- :param pulumi.Input[builtins.str] secret_name_template: Template describing how to generate external secret names.
184
+ :param pulumi.Input[_builtins.str] secret_name_template: Template describing how to generate external secret names.
186
185
  Supports a subset of the Go Template syntax.
187
- :param pulumi.Input[builtins.str] type: The type of the secrets destination (`gcp-sm`).
186
+ :param pulumi.Input[_builtins.str] type: The type of the secrets destination (`gcp-sm`).
188
187
  """
189
188
  if credentials is not None:
190
189
  pulumi.set(__self__, "credentials", credentials)
@@ -203,9 +202,9 @@ class _SyncGcpDestinationState:
203
202
  if type is not None:
204
203
  pulumi.set(__self__, "type", type)
205
204
 
206
- @property
205
+ @_builtins.property
207
206
  @pulumi.getter
208
- def credentials(self) -> Optional[pulumi.Input[builtins.str]]:
207
+ def credentials(self) -> Optional[pulumi.Input[_builtins.str]]:
209
208
  """
210
209
  JSON-encoded credentials to use to connect to GCP.
211
210
  Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
@@ -214,24 +213,24 @@ class _SyncGcpDestinationState:
214
213
  return pulumi.get(self, "credentials")
215
214
 
216
215
  @credentials.setter
217
- def credentials(self, value: Optional[pulumi.Input[builtins.str]]):
216
+ def credentials(self, value: Optional[pulumi.Input[_builtins.str]]):
218
217
  pulumi.set(self, "credentials", value)
219
218
 
220
- @property
219
+ @_builtins.property
221
220
  @pulumi.getter(name="customTags")
222
- def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
221
+ def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
223
222
  """
224
223
  Custom tags to set on the secret managed at the destination.
225
224
  """
226
225
  return pulumi.get(self, "custom_tags")
227
226
 
228
227
  @custom_tags.setter
229
- def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
228
+ def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
230
229
  pulumi.set(self, "custom_tags", value)
231
230
 
232
- @property
231
+ @_builtins.property
233
232
  @pulumi.getter
234
- def granularity(self) -> Optional[pulumi.Input[builtins.str]]:
233
+ def granularity(self) -> Optional[pulumi.Input[_builtins.str]]:
235
234
  """
236
235
  Determines what level of information is synced as a distinct resource
237
236
  at the destination. Supports `secret-path` and `secret-key`.
@@ -239,24 +238,24 @@ class _SyncGcpDestinationState:
239
238
  return pulumi.get(self, "granularity")
240
239
 
241
240
  @granularity.setter
242
- def granularity(self, value: Optional[pulumi.Input[builtins.str]]):
241
+ def granularity(self, value: Optional[pulumi.Input[_builtins.str]]):
243
242
  pulumi.set(self, "granularity", value)
244
243
 
245
- @property
244
+ @_builtins.property
246
245
  @pulumi.getter
247
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
246
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
248
247
  """
249
248
  Unique name of the GCP destination.
250
249
  """
251
250
  return pulumi.get(self, "name")
252
251
 
253
252
  @name.setter
254
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
253
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
255
254
  pulumi.set(self, "name", value)
256
255
 
257
- @property
256
+ @_builtins.property
258
257
  @pulumi.getter
259
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
258
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
260
259
  """
261
260
  The namespace to provision the resource in.
262
261
  The value should not contain leading or trailing forward slashes.
@@ -265,12 +264,12 @@ class _SyncGcpDestinationState:
265
264
  return pulumi.get(self, "namespace")
266
265
 
267
266
  @namespace.setter
268
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
267
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
269
268
  pulumi.set(self, "namespace", value)
270
269
 
271
- @property
270
+ @_builtins.property
272
271
  @pulumi.getter(name="projectId")
273
- def project_id(self) -> Optional[pulumi.Input[builtins.str]]:
272
+ def project_id(self) -> Optional[pulumi.Input[_builtins.str]]:
274
273
  """
275
274
  The target project to manage secrets in. If set,
276
275
  overrides the project ID derived from the service account JSON credentials or application
@@ -280,12 +279,12 @@ class _SyncGcpDestinationState:
280
279
  return pulumi.get(self, "project_id")
281
280
 
282
281
  @project_id.setter
283
- def project_id(self, value: Optional[pulumi.Input[builtins.str]]):
282
+ def project_id(self, value: Optional[pulumi.Input[_builtins.str]]):
284
283
  pulumi.set(self, "project_id", value)
285
284
 
286
- @property
285
+ @_builtins.property
287
286
  @pulumi.getter(name="secretNameTemplate")
288
- def secret_name_template(self) -> Optional[pulumi.Input[builtins.str]]:
287
+ def secret_name_template(self) -> Optional[pulumi.Input[_builtins.str]]:
289
288
  """
290
289
  Template describing how to generate external secret names.
291
290
  Supports a subset of the Go Template syntax.
@@ -293,19 +292,19 @@ class _SyncGcpDestinationState:
293
292
  return pulumi.get(self, "secret_name_template")
294
293
 
295
294
  @secret_name_template.setter
296
- def secret_name_template(self, value: Optional[pulumi.Input[builtins.str]]):
295
+ def secret_name_template(self, value: Optional[pulumi.Input[_builtins.str]]):
297
296
  pulumi.set(self, "secret_name_template", value)
298
297
 
299
- @property
298
+ @_builtins.property
300
299
  @pulumi.getter
301
- def type(self) -> Optional[pulumi.Input[builtins.str]]:
300
+ def type(self) -> Optional[pulumi.Input[_builtins.str]]:
302
301
  """
303
302
  The type of the secrets destination (`gcp-sm`).
304
303
  """
305
304
  return pulumi.get(self, "type")
306
305
 
307
306
  @type.setter
308
- def type(self, value: Optional[pulumi.Input[builtins.str]]):
307
+ def type(self, value: Optional[pulumi.Input[_builtins.str]]):
309
308
  pulumi.set(self, "type", value)
310
309
 
311
310
 
@@ -315,13 +314,13 @@ class SyncGcpDestination(pulumi.CustomResource):
315
314
  def __init__(__self__,
316
315
  resource_name: str,
317
316
  opts: Optional[pulumi.ResourceOptions] = None,
318
- credentials: Optional[pulumi.Input[builtins.str]] = None,
319
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
320
- granularity: Optional[pulumi.Input[builtins.str]] = None,
321
- name: Optional[pulumi.Input[builtins.str]] = None,
322
- namespace: Optional[pulumi.Input[builtins.str]] = None,
323
- project_id: Optional[pulumi.Input[builtins.str]] = None,
324
- secret_name_template: Optional[pulumi.Input[builtins.str]] = None,
317
+ credentials: Optional[pulumi.Input[_builtins.str]] = None,
318
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
319
+ granularity: Optional[pulumi.Input[_builtins.str]] = None,
320
+ name: Optional[pulumi.Input[_builtins.str]] = None,
321
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
322
+ project_id: Optional[pulumi.Input[_builtins.str]] = None,
323
+ secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
325
324
  __props__=None):
326
325
  """
327
326
  ## Example Usage
@@ -351,21 +350,21 @@ class SyncGcpDestination(pulumi.CustomResource):
351
350
 
352
351
  :param str resource_name: The name of the resource.
353
352
  :param pulumi.ResourceOptions opts: Options for the resource.
354
- :param pulumi.Input[builtins.str] credentials: JSON-encoded credentials to use to connect to GCP.
353
+ :param pulumi.Input[_builtins.str] credentials: JSON-encoded credentials to use to connect to GCP.
355
354
  Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
356
355
  variable.
357
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
358
- :param pulumi.Input[builtins.str] granularity: Determines what level of information is synced as a distinct resource
356
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
357
+ :param pulumi.Input[_builtins.str] granularity: Determines what level of information is synced as a distinct resource
359
358
  at the destination. Supports `secret-path` and `secret-key`.
360
- :param pulumi.Input[builtins.str] name: Unique name of the GCP destination.
361
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
359
+ :param pulumi.Input[_builtins.str] name: Unique name of the GCP destination.
360
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
362
361
  The value should not contain leading or trailing forward slashes.
363
362
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
364
- :param pulumi.Input[builtins.str] project_id: The target project to manage secrets in. If set,
363
+ :param pulumi.Input[_builtins.str] project_id: The target project to manage secrets in. If set,
365
364
  overrides the project ID derived from the service account JSON credentials or application
366
365
  default credentials. The service account must be [authorized](https://cloud.google.com/iam/docs/service-account-overview#locations)
367
366
  to perform Secret Manager actions in the target project.
368
- :param pulumi.Input[builtins.str] secret_name_template: Template describing how to generate external secret names.
367
+ :param pulumi.Input[_builtins.str] secret_name_template: Template describing how to generate external secret names.
369
368
  Supports a subset of the Go Template syntax.
370
369
  """
371
370
  ...
@@ -415,13 +414,13 @@ class SyncGcpDestination(pulumi.CustomResource):
415
414
  def _internal_init(__self__,
416
415
  resource_name: str,
417
416
  opts: Optional[pulumi.ResourceOptions] = None,
418
- credentials: Optional[pulumi.Input[builtins.str]] = None,
419
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
420
- granularity: Optional[pulumi.Input[builtins.str]] = None,
421
- name: Optional[pulumi.Input[builtins.str]] = None,
422
- namespace: Optional[pulumi.Input[builtins.str]] = None,
423
- project_id: Optional[pulumi.Input[builtins.str]] = None,
424
- secret_name_template: Optional[pulumi.Input[builtins.str]] = None,
417
+ credentials: Optional[pulumi.Input[_builtins.str]] = None,
418
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
419
+ granularity: Optional[pulumi.Input[_builtins.str]] = None,
420
+ name: Optional[pulumi.Input[_builtins.str]] = None,
421
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
422
+ project_id: Optional[pulumi.Input[_builtins.str]] = None,
423
+ secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
425
424
  __props__=None):
426
425
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
427
426
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -451,14 +450,14 @@ class SyncGcpDestination(pulumi.CustomResource):
451
450
  def get(resource_name: str,
452
451
  id: pulumi.Input[str],
453
452
  opts: Optional[pulumi.ResourceOptions] = None,
454
- credentials: Optional[pulumi.Input[builtins.str]] = None,
455
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
456
- granularity: Optional[pulumi.Input[builtins.str]] = None,
457
- name: Optional[pulumi.Input[builtins.str]] = None,
458
- namespace: Optional[pulumi.Input[builtins.str]] = None,
459
- project_id: Optional[pulumi.Input[builtins.str]] = None,
460
- secret_name_template: Optional[pulumi.Input[builtins.str]] = None,
461
- type: Optional[pulumi.Input[builtins.str]] = None) -> 'SyncGcpDestination':
453
+ credentials: Optional[pulumi.Input[_builtins.str]] = None,
454
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
455
+ granularity: Optional[pulumi.Input[_builtins.str]] = None,
456
+ name: Optional[pulumi.Input[_builtins.str]] = None,
457
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
458
+ project_id: Optional[pulumi.Input[_builtins.str]] = None,
459
+ secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
460
+ type: Optional[pulumi.Input[_builtins.str]] = None) -> 'SyncGcpDestination':
462
461
  """
463
462
  Get an existing SyncGcpDestination resource's state with the given name, id, and optional extra
464
463
  properties used to qualify the lookup.
@@ -466,23 +465,23 @@ class SyncGcpDestination(pulumi.CustomResource):
466
465
  :param str resource_name: The unique name of the resulting resource.
467
466
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
468
467
  :param pulumi.ResourceOptions opts: Options for the resource.
469
- :param pulumi.Input[builtins.str] credentials: JSON-encoded credentials to use to connect to GCP.
468
+ :param pulumi.Input[_builtins.str] credentials: JSON-encoded credentials to use to connect to GCP.
470
469
  Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
471
470
  variable.
472
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
473
- :param pulumi.Input[builtins.str] granularity: Determines what level of information is synced as a distinct resource
471
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
472
+ :param pulumi.Input[_builtins.str] granularity: Determines what level of information is synced as a distinct resource
474
473
  at the destination. Supports `secret-path` and `secret-key`.
475
- :param pulumi.Input[builtins.str] name: Unique name of the GCP destination.
476
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
474
+ :param pulumi.Input[_builtins.str] name: Unique name of the GCP destination.
475
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
477
476
  The value should not contain leading or trailing forward slashes.
478
477
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
479
- :param pulumi.Input[builtins.str] project_id: The target project to manage secrets in. If set,
478
+ :param pulumi.Input[_builtins.str] project_id: The target project to manage secrets in. If set,
480
479
  overrides the project ID derived from the service account JSON credentials or application
481
480
  default credentials. The service account must be [authorized](https://cloud.google.com/iam/docs/service-account-overview#locations)
482
481
  to perform Secret Manager actions in the target project.
483
- :param pulumi.Input[builtins.str] secret_name_template: Template describing how to generate external secret names.
482
+ :param pulumi.Input[_builtins.str] secret_name_template: Template describing how to generate external secret names.
484
483
  Supports a subset of the Go Template syntax.
485
- :param pulumi.Input[builtins.str] type: The type of the secrets destination (`gcp-sm`).
484
+ :param pulumi.Input[_builtins.str] type: The type of the secrets destination (`gcp-sm`).
486
485
  """
487
486
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
488
487
 
@@ -498,9 +497,9 @@ class SyncGcpDestination(pulumi.CustomResource):
498
497
  __props__.__dict__["type"] = type
499
498
  return SyncGcpDestination(resource_name, opts=opts, __props__=__props__)
500
499
 
501
- @property
500
+ @_builtins.property
502
501
  @pulumi.getter
503
- def credentials(self) -> pulumi.Output[Optional[builtins.str]]:
502
+ def credentials(self) -> pulumi.Output[Optional[_builtins.str]]:
504
503
  """
505
504
  JSON-encoded credentials to use to connect to GCP.
506
505
  Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
@@ -508,34 +507,34 @@ class SyncGcpDestination(pulumi.CustomResource):
508
507
  """
509
508
  return pulumi.get(self, "credentials")
510
509
 
511
- @property
510
+ @_builtins.property
512
511
  @pulumi.getter(name="customTags")
513
- def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
512
+ def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
514
513
  """
515
514
  Custom tags to set on the secret managed at the destination.
516
515
  """
517
516
  return pulumi.get(self, "custom_tags")
518
517
 
519
- @property
518
+ @_builtins.property
520
519
  @pulumi.getter
521
- def granularity(self) -> pulumi.Output[Optional[builtins.str]]:
520
+ def granularity(self) -> pulumi.Output[Optional[_builtins.str]]:
522
521
  """
523
522
  Determines what level of information is synced as a distinct resource
524
523
  at the destination. Supports `secret-path` and `secret-key`.
525
524
  """
526
525
  return pulumi.get(self, "granularity")
527
526
 
528
- @property
527
+ @_builtins.property
529
528
  @pulumi.getter
530
- def name(self) -> pulumi.Output[builtins.str]:
529
+ def name(self) -> pulumi.Output[_builtins.str]:
531
530
  """
532
531
  Unique name of the GCP destination.
533
532
  """
534
533
  return pulumi.get(self, "name")
535
534
 
536
- @property
535
+ @_builtins.property
537
536
  @pulumi.getter
538
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
537
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
539
538
  """
540
539
  The namespace to provision the resource in.
541
540
  The value should not contain leading or trailing forward slashes.
@@ -543,9 +542,9 @@ class SyncGcpDestination(pulumi.CustomResource):
543
542
  """
544
543
  return pulumi.get(self, "namespace")
545
544
 
546
- @property
545
+ @_builtins.property
547
546
  @pulumi.getter(name="projectId")
548
- def project_id(self) -> pulumi.Output[Optional[builtins.str]]:
547
+ def project_id(self) -> pulumi.Output[Optional[_builtins.str]]:
549
548
  """
550
549
  The target project to manage secrets in. If set,
551
550
  overrides the project ID derived from the service account JSON credentials or application
@@ -554,18 +553,18 @@ class SyncGcpDestination(pulumi.CustomResource):
554
553
  """
555
554
  return pulumi.get(self, "project_id")
556
555
 
557
- @property
556
+ @_builtins.property
558
557
  @pulumi.getter(name="secretNameTemplate")
559
- def secret_name_template(self) -> pulumi.Output[builtins.str]:
558
+ def secret_name_template(self) -> pulumi.Output[_builtins.str]:
560
559
  """
561
560
  Template describing how to generate external secret names.
562
561
  Supports a subset of the Go Template syntax.
563
562
  """
564
563
  return pulumi.get(self, "secret_name_template")
565
564
 
566
- @property
565
+ @_builtins.property
567
566
  @pulumi.getter
568
- def type(self) -> pulumi.Output[builtins.str]:
567
+ def type(self) -> pulumi.Output[_builtins.str]:
569
568
  """
570
569
  The type of the secrets destination (`gcp-sm`).
571
570
  """