published on Tuesday, Mar 31, 2026 by Pulumi
published on Tuesday, Mar 31, 2026 by Pulumi
Creates a GCP destination to synchronize secrets in Vault. Requires Vault 1.16+. Available only for Vault Enterprise.
Important All data provided in the resource configuration will be written in cleartext to state and plan files generated by Terraform, and will appear in the console output when Terraform runs. Protect these artifacts accordingly. See the main provider documentation for more details.
For more information on syncing secrets with GCP, please refer to the Vault documentation.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as std from "@pulumi/std";
import * as vault from "@pulumi/vault";
const gcp = new vault.secrets.SyncGcpDestination("gcp", {
name: "gcp-dest",
projectId: "gcp-project-id",
credentials: std.file({
input: credentialsFile,
}).then(invoke => invoke.result),
secretNameTemplate: "vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
customTags: {
foo: "bar",
},
});
import pulumi
import pulumi_std as std
import pulumi_vault as vault
gcp = vault.secrets.SyncGcpDestination("gcp",
name="gcp-dest",
project_id="gcp-project-id",
credentials=std.file(input=credentials_file).result,
secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
custom_tags={
"foo": "bar",
})
package main
import (
"github.com/pulumi/pulumi-std/sdk/go/std"
"github.com/pulumi/pulumi-vault/sdk/v7/go/vault/secrets"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
invokeFile, err := std.File(ctx, &std.FileArgs{
Input: credentialsFile,
}, nil)
if err != nil {
return err
}
_, err = secrets.NewSyncGcpDestination(ctx, "gcp", &secrets.SyncGcpDestinationArgs{
Name: pulumi.String("gcp-dest"),
ProjectId: pulumi.String("gcp-project-id"),
Credentials: pulumi.String(invokeFile.Result),
SecretNameTemplate: pulumi.String("vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}"),
CustomTags: pulumi.StringMap{
"foo": pulumi.String("bar"),
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Std = Pulumi.Std;
using Vault = Pulumi.Vault;
return await Deployment.RunAsync(() =>
{
var gcp = new Vault.Secrets.SyncGcpDestination("gcp", new()
{
Name = "gcp-dest",
ProjectId = "gcp-project-id",
Credentials = Std.File.Invoke(new()
{
Input = credentialsFile,
}).Apply(invoke => invoke.Result),
SecretNameTemplate = "vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
CustomTags =
{
{ "foo", "bar" },
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.vault.secrets.SyncGcpDestination;
import com.pulumi.vault.secrets.SyncGcpDestinationArgs;
import com.pulumi.std.StdFunctions;
import com.pulumi.std.inputs.FileArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var gcp = new SyncGcpDestination("gcp", SyncGcpDestinationArgs.builder()
.name("gcp-dest")
.projectId("gcp-project-id")
.credentials(StdFunctions.file(FileArgs.builder()
.input(credentialsFile)
.build()).result())
.secretNameTemplate("vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
.customTags(Map.of("foo", "bar"))
.build());
}
}
resources:
gcp:
type: vault:secrets:SyncGcpDestination
properties:
name: gcp-dest
projectId: gcp-project-id
credentials:
fn::invoke:
function: std:file
arguments:
input: ${credentialsFile}
return: result
secretNameTemplate: vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}
customTags:
foo: bar
Example coming soon!
With Networking Configuration (Vault 1.19+)
import * as pulumi from "@pulumi/pulumi";
import * as std from "@pulumi/std";
import * as vault from "@pulumi/vault";
const gcpNetworking = new vault.secrets.SyncGcpDestination("gcp_networking", {
name: "gcp-dest-networking",
projectId: "gcp-project-id",
credentials: std.file({
input: credentialsFile,
}).then(invoke => invoke.result),
secretNameTemplate: "vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
allowedIpv4Addresses: [
"10.0.0.0/8",
"192.168.0.0/16",
],
allowedIpv6Addresses: ["2001:db8::/32"],
allowedPorts: [
443,
8443,
],
disableStrictNetworking: false,
});
import pulumi
import pulumi_std as std
import pulumi_vault as vault
gcp_networking = vault.secrets.SyncGcpDestination("gcp_networking",
name="gcp-dest-networking",
project_id="gcp-project-id",
credentials=std.file(input=credentials_file).result,
secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
allowed_ipv4_addresses=[
"10.0.0.0/8",
"192.168.0.0/16",
],
allowed_ipv6_addresses=["2001:db8::/32"],
allowed_ports=[
443,
8443,
],
disable_strict_networking=False)
package main
import (
"github.com/pulumi/pulumi-std/sdk/go/std"
"github.com/pulumi/pulumi-vault/sdk/v7/go/vault/secrets"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
invokeFile, err := std.File(ctx, &std.FileArgs{
Input: credentialsFile,
}, nil)
if err != nil {
return err
}
_, err = secrets.NewSyncGcpDestination(ctx, "gcp_networking", &secrets.SyncGcpDestinationArgs{
Name: pulumi.String("gcp-dest-networking"),
ProjectId: pulumi.String("gcp-project-id"),
Credentials: pulumi.String(invokeFile.Result),
SecretNameTemplate: pulumi.String("vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}"),
AllowedIpv4Addresses: pulumi.StringArray{
pulumi.String("10.0.0.0/8"),
pulumi.String("192.168.0.0/16"),
},
AllowedIpv6Addresses: pulumi.StringArray{
pulumi.String("2001:db8::/32"),
},
AllowedPorts: pulumi.IntArray{
pulumi.Int(443),
pulumi.Int(8443),
},
DisableStrictNetworking: pulumi.Bool(false),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Std = Pulumi.Std;
using Vault = Pulumi.Vault;
return await Deployment.RunAsync(() =>
{
var gcpNetworking = new Vault.Secrets.SyncGcpDestination("gcp_networking", new()
{
Name = "gcp-dest-networking",
ProjectId = "gcp-project-id",
Credentials = Std.File.Invoke(new()
{
Input = credentialsFile,
}).Apply(invoke => invoke.Result),
SecretNameTemplate = "vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
AllowedIpv4Addresses = new[]
{
"10.0.0.0/8",
"192.168.0.0/16",
},
AllowedIpv6Addresses = new[]
{
"2001:db8::/32",
},
AllowedPorts = new[]
{
443,
8443,
},
DisableStrictNetworking = false,
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.vault.secrets.SyncGcpDestination;
import com.pulumi.vault.secrets.SyncGcpDestinationArgs;
import com.pulumi.std.StdFunctions;
import com.pulumi.std.inputs.FileArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var gcpNetworking = new SyncGcpDestination("gcpNetworking", SyncGcpDestinationArgs.builder()
.name("gcp-dest-networking")
.projectId("gcp-project-id")
.credentials(StdFunctions.file(FileArgs.builder()
.input(credentialsFile)
.build()).result())
.secretNameTemplate("vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
.allowedIpv4Addresses(
"10.0.0.0/8",
"192.168.0.0/16")
.allowedIpv6Addresses("2001:db8::/32")
.allowedPorts(
443,
8443)
.disableStrictNetworking(false)
.build());
}
}
resources:
gcpNetworking:
type: vault:secrets:SyncGcpDestination
name: gcp_networking
properties:
name: gcp-dest-networking
projectId: gcp-project-id
credentials:
fn::invoke:
function: std:file
arguments:
input: ${credentialsFile}
return: result
secretNameTemplate: vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}
allowedIpv4Addresses:
- 10.0.0.0/8
- 192.168.0.0/16
allowedIpv6Addresses:
- 2001:db8::/32
allowedPorts:
- 443
- 8443
disableStrictNetworking: false
Example coming soon!
With Global Encryption (Vault 1.19+)
import * as pulumi from "@pulumi/pulumi";
import * as std from "@pulumi/std";
import * as vault from "@pulumi/vault";
const gcpEncryption = new vault.secrets.SyncGcpDestination("gcp_encryption", {
name: "gcp-dest-encryption",
projectId: "gcp-project-id",
credentials: std.file({
input: credentialsFile,
}).then(invoke => invoke.result),
secretNameTemplate: "vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
globalKmsKey: "projects/my-project/locations/global/keyRings/my-keyring/cryptoKeys/my-key",
});
import pulumi
import pulumi_std as std
import pulumi_vault as vault
gcp_encryption = vault.secrets.SyncGcpDestination("gcp_encryption",
name="gcp-dest-encryption",
project_id="gcp-project-id",
credentials=std.file(input=credentials_file).result,
secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
global_kms_key="projects/my-project/locations/global/keyRings/my-keyring/cryptoKeys/my-key")
package main
import (
"github.com/pulumi/pulumi-std/sdk/go/std"
"github.com/pulumi/pulumi-vault/sdk/v7/go/vault/secrets"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
invokeFile, err := std.File(ctx, &std.FileArgs{
Input: credentialsFile,
}, nil)
if err != nil {
return err
}
_, err = secrets.NewSyncGcpDestination(ctx, "gcp_encryption", &secrets.SyncGcpDestinationArgs{
Name: pulumi.String("gcp-dest-encryption"),
ProjectId: pulumi.String("gcp-project-id"),
Credentials: pulumi.String(invokeFile.Result),
SecretNameTemplate: pulumi.String("vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}"),
GlobalKmsKey: pulumi.String("projects/my-project/locations/global/keyRings/my-keyring/cryptoKeys/my-key"),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Std = Pulumi.Std;
using Vault = Pulumi.Vault;
return await Deployment.RunAsync(() =>
{
var gcpEncryption = new Vault.Secrets.SyncGcpDestination("gcp_encryption", new()
{
Name = "gcp-dest-encryption",
ProjectId = "gcp-project-id",
Credentials = Std.File.Invoke(new()
{
Input = credentialsFile,
}).Apply(invoke => invoke.Result),
SecretNameTemplate = "vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
GlobalKmsKey = "projects/my-project/locations/global/keyRings/my-keyring/cryptoKeys/my-key",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.vault.secrets.SyncGcpDestination;
import com.pulumi.vault.secrets.SyncGcpDestinationArgs;
import com.pulumi.std.StdFunctions;
import com.pulumi.std.inputs.FileArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var gcpEncryption = new SyncGcpDestination("gcpEncryption", SyncGcpDestinationArgs.builder()
.name("gcp-dest-encryption")
.projectId("gcp-project-id")
.credentials(StdFunctions.file(FileArgs.builder()
.input(credentialsFile)
.build()).result())
.secretNameTemplate("vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
.globalKmsKey("projects/my-project/locations/global/keyRings/my-keyring/cryptoKeys/my-key")
.build());
}
}
resources:
gcpEncryption:
type: vault:secrets:SyncGcpDestination
name: gcp_encryption
properties:
name: gcp-dest-encryption
projectId: gcp-project-id
credentials:
fn::invoke:
function: std:file
arguments:
input: ${credentialsFile}
return: result
secretNameTemplate: vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}
globalKmsKey: projects/my-project/locations/global/keyRings/my-keyring/cryptoKeys/my-key
Example coming soon!
With Multi-Region Replication and Regional Encryption (Vault 1.19+)
import * as pulumi from "@pulumi/pulumi";
import * as std from "@pulumi/std";
import * as vault from "@pulumi/vault";
const gcpReplicationEncryption = new vault.secrets.SyncGcpDestination("gcp_replication_encryption", {
name: "gcp-dest-replication-encryption",
projectId: "gcp-project-id",
credentials: std.file({
input: credentialsFile,
}).then(invoke => invoke.result),
secretNameTemplate: "vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}_{{ .SecretKey | lowercase }}",
granularity: "secret-key",
locationalKmsKeys: {
"us-central1": "projects/my-project/locations/us-central1/keyRings/kr/cryptoKeys/key",
"us-east1": "projects/my-project/locations/us-east1/keyRings/kr/cryptoKeys/key",
},
replicationLocations: [
"us-central1",
"us-east1",
],
});
import pulumi
import pulumi_std as std
import pulumi_vault as vault
gcp_replication_encryption = vault.secrets.SyncGcpDestination("gcp_replication_encryption",
name="gcp-dest-replication-encryption",
project_id="gcp-project-id",
credentials=std.file(input=credentials_file).result,
secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}_{{ .SecretKey | lowercase }}",
granularity="secret-key",
locational_kms_keys={
"us-central1": "projects/my-project/locations/us-central1/keyRings/kr/cryptoKeys/key",
"us-east1": "projects/my-project/locations/us-east1/keyRings/kr/cryptoKeys/key",
},
replication_locations=[
"us-central1",
"us-east1",
])
package main
import (
"github.com/pulumi/pulumi-std/sdk/go/std"
"github.com/pulumi/pulumi-vault/sdk/v7/go/vault/secrets"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
invokeFile, err := std.File(ctx, &std.FileArgs{
Input: credentialsFile,
}, nil)
if err != nil {
return err
}
_, err = secrets.NewSyncGcpDestination(ctx, "gcp_replication_encryption", &secrets.SyncGcpDestinationArgs{
Name: pulumi.String("gcp-dest-replication-encryption"),
ProjectId: pulumi.String("gcp-project-id"),
Credentials: pulumi.String(invokeFile.Result),
SecretNameTemplate: pulumi.String("vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}_{{ .SecretKey | lowercase }}"),
Granularity: pulumi.String("secret-key"),
LocationalKmsKeys: pulumi.StringMap{
"us-central1": pulumi.String("projects/my-project/locations/us-central1/keyRings/kr/cryptoKeys/key"),
"us-east1": pulumi.String("projects/my-project/locations/us-east1/keyRings/kr/cryptoKeys/key"),
},
ReplicationLocations: pulumi.StringArray{
pulumi.String("us-central1"),
pulumi.String("us-east1"),
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Std = Pulumi.Std;
using Vault = Pulumi.Vault;
return await Deployment.RunAsync(() =>
{
var gcpReplicationEncryption = new Vault.Secrets.SyncGcpDestination("gcp_replication_encryption", new()
{
Name = "gcp-dest-replication-encryption",
ProjectId = "gcp-project-id",
Credentials = Std.File.Invoke(new()
{
Input = credentialsFile,
}).Apply(invoke => invoke.Result),
SecretNameTemplate = "vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}_{{ .SecretKey | lowercase }}",
Granularity = "secret-key",
LocationalKmsKeys =
{
{ "us-central1", "projects/my-project/locations/us-central1/keyRings/kr/cryptoKeys/key" },
{ "us-east1", "projects/my-project/locations/us-east1/keyRings/kr/cryptoKeys/key" },
},
ReplicationLocations = new[]
{
"us-central1",
"us-east1",
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.vault.secrets.SyncGcpDestination;
import com.pulumi.vault.secrets.SyncGcpDestinationArgs;
import com.pulumi.std.StdFunctions;
import com.pulumi.std.inputs.FileArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var gcpReplicationEncryption = new SyncGcpDestination("gcpReplicationEncryption", SyncGcpDestinationArgs.builder()
.name("gcp-dest-replication-encryption")
.projectId("gcp-project-id")
.credentials(StdFunctions.file(FileArgs.builder()
.input(credentialsFile)
.build()).result())
.secretNameTemplate("vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}_{{ .SecretKey | lowercase }}")
.granularity("secret-key")
.locationalKmsKeys(Map.ofEntries(
Map.entry("us-central1", "projects/my-project/locations/us-central1/keyRings/kr/cryptoKeys/key"),
Map.entry("us-east1", "projects/my-project/locations/us-east1/keyRings/kr/cryptoKeys/key")
))
.replicationLocations(
"us-central1",
"us-east1")
.build());
}
}
resources:
gcpReplicationEncryption:
type: vault:secrets:SyncGcpDestination
name: gcp_replication_encryption
properties:
name: gcp-dest-replication-encryption
projectId: gcp-project-id
credentials:
fn::invoke:
function: std:file
arguments:
input: ${credentialsFile}
return: result
secretNameTemplate: vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}_{{ .SecretKey | lowercase }}
granularity: secret-key
locationalKmsKeys:
us-central1: projects/my-project/locations/us-central1/keyRings/kr/cryptoKeys/key
us-east1: projects/my-project/locations/us-east1/keyRings/kr/cryptoKeys/key
replicationLocations:
- us-central1
- us-east1
Example coming soon!
Using Workload Identity Federation (Vault 2.0.0+)
import * as pulumi from "@pulumi/pulumi";
import * as vault from "@pulumi/vault";
const gcpWif = new vault.secrets.SyncGcpDestination("gcp_wif", {
name: "gcp-dest-wif",
serviceAccountEmail: serviceAccountEmail,
identityTokenAudienceWo: identityTokenAudience,
identityTokenAudienceWoVersion: 1,
identityTokenTtl: 3600,
identityTokenKeyWo: "my-key",
identityTokenKeyWoVersion: 1,
granularity: "secret-path",
});
import pulumi
import pulumi_vault as vault
gcp_wif = vault.secrets.SyncGcpDestination("gcp_wif",
name="gcp-dest-wif",
service_account_email=service_account_email,
identity_token_audience_wo=identity_token_audience,
identity_token_audience_wo_version=1,
identity_token_ttl=3600,
identity_token_key_wo="my-key",
identity_token_key_wo_version=1,
granularity="secret-path")
package main
import (
"github.com/pulumi/pulumi-vault/sdk/v7/go/vault/secrets"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := secrets.NewSyncGcpDestination(ctx, "gcp_wif", &secrets.SyncGcpDestinationArgs{
Name: pulumi.String("gcp-dest-wif"),
ServiceAccountEmail: pulumi.Any(serviceAccountEmail),
IdentityTokenAudienceWo: pulumi.Any(identityTokenAudience),
IdentityTokenAudienceWoVersion: pulumi.Int(1),
IdentityTokenTtl: pulumi.Int(3600),
IdentityTokenKeyWo: pulumi.String("my-key"),
IdentityTokenKeyWoVersion: pulumi.Int(1),
Granularity: pulumi.String("secret-path"),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Vault = Pulumi.Vault;
return await Deployment.RunAsync(() =>
{
var gcpWif = new Vault.Secrets.SyncGcpDestination("gcp_wif", new()
{
Name = "gcp-dest-wif",
ServiceAccountEmail = serviceAccountEmail,
IdentityTokenAudienceWo = identityTokenAudience,
IdentityTokenAudienceWoVersion = 1,
IdentityTokenTtl = 3600,
IdentityTokenKeyWo = "my-key",
IdentityTokenKeyWoVersion = 1,
Granularity = "secret-path",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.vault.secrets.SyncGcpDestination;
import com.pulumi.vault.secrets.SyncGcpDestinationArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var gcpWif = new SyncGcpDestination("gcpWif", SyncGcpDestinationArgs.builder()
.name("gcp-dest-wif")
.serviceAccountEmail(serviceAccountEmail)
.identityTokenAudienceWo(identityTokenAudience)
.identityTokenAudienceWoVersion(1)
.identityTokenTtl(3600)
.identityTokenKeyWo("my-key")
.identityTokenKeyWoVersion(1)
.granularity("secret-path")
.build());
}
}
resources:
gcpWif:
type: vault:secrets:SyncGcpDestination
name: gcp_wif
properties:
name: gcp-dest-wif
serviceAccountEmail: ${serviceAccountEmail}
identityTokenAudienceWo: ${identityTokenAudience}
identityTokenAudienceWoVersion: 1
identityTokenTtl: 3600
identityTokenKeyWo: my-key
identityTokenKeyWoVersion: 1
granularity: secret-path
Example coming soon!
Create SyncGcpDestination Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new SyncGcpDestination(name: string, args?: SyncGcpDestinationArgs, opts?: CustomResourceOptions);@overload
def SyncGcpDestination(resource_name: str,
args: Optional[SyncGcpDestinationArgs] = None,
opts: Optional[ResourceOptions] = None)
@overload
def SyncGcpDestination(resource_name: str,
opts: Optional[ResourceOptions] = None,
allowed_ipv4_addresses: Optional[Sequence[str]] = None,
allowed_ipv6_addresses: Optional[Sequence[str]] = None,
allowed_ports: Optional[Sequence[int]] = None,
credentials: Optional[str] = None,
custom_tags: Optional[Mapping[str, str]] = None,
disable_strict_networking: Optional[bool] = None,
global_kms_key: Optional[str] = None,
granularity: Optional[str] = None,
identity_token_audience_wo: Optional[str] = None,
identity_token_audience_wo_version: Optional[int] = None,
identity_token_key_wo: Optional[str] = None,
identity_token_key_wo_version: Optional[int] = None,
identity_token_ttl: Optional[int] = None,
locational_kms_keys: Optional[Mapping[str, str]] = None,
name: Optional[str] = None,
namespace: Optional[str] = None,
project_id: Optional[str] = None,
replication_locations: Optional[Sequence[str]] = None,
secret_name_template: Optional[str] = None,
service_account_email: Optional[str] = None)func NewSyncGcpDestination(ctx *Context, name string, args *SyncGcpDestinationArgs, opts ...ResourceOption) (*SyncGcpDestination, error)public SyncGcpDestination(string name, SyncGcpDestinationArgs? args = null, CustomResourceOptions? opts = null)
public SyncGcpDestination(String name, SyncGcpDestinationArgs args)
public SyncGcpDestination(String name, SyncGcpDestinationArgs args, CustomResourceOptions options)
type: vault:secrets:SyncGcpDestination
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
resource "vault_secrets_syncgcpdestination" "name" {
# resource properties
}Parameters
- name string
- The unique name of the resource.
- args SyncGcpDestinationArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args SyncGcpDestinationArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args SyncGcpDestinationArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args SyncGcpDestinationArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args SyncGcpDestinationArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var syncGcpDestinationResource = new Vault.Secrets.SyncGcpDestination("syncGcpDestinationResource", new()
{
AllowedIpv4Addresses = new[]
{
"string",
},
AllowedIpv6Addresses = new[]
{
"string",
},
AllowedPorts = new[]
{
0,
},
Credentials = "string",
CustomTags =
{
{ "string", "string" },
},
DisableStrictNetworking = false,
GlobalKmsKey = "string",
Granularity = "string",
IdentityTokenAudienceWo = "string",
IdentityTokenAudienceWoVersion = 0,
IdentityTokenKeyWo = "string",
IdentityTokenKeyWoVersion = 0,
IdentityTokenTtl = 0,
LocationalKmsKeys =
{
{ "string", "string" },
},
Name = "string",
Namespace = "string",
ProjectId = "string",
ReplicationLocations = new[]
{
"string",
},
SecretNameTemplate = "string",
ServiceAccountEmail = "string",
});
example, err := secrets.NewSyncGcpDestination(ctx, "syncGcpDestinationResource", &secrets.SyncGcpDestinationArgs{
AllowedIpv4Addresses: pulumi.StringArray{
pulumi.String("string"),
},
AllowedIpv6Addresses: pulumi.StringArray{
pulumi.String("string"),
},
AllowedPorts: pulumi.IntArray{
pulumi.Int(0),
},
Credentials: pulumi.String("string"),
CustomTags: pulumi.StringMap{
"string": pulumi.String("string"),
},
DisableStrictNetworking: pulumi.Bool(false),
GlobalKmsKey: pulumi.String("string"),
Granularity: pulumi.String("string"),
IdentityTokenAudienceWo: pulumi.String("string"),
IdentityTokenAudienceWoVersion: pulumi.Int(0),
IdentityTokenKeyWo: pulumi.String("string"),
IdentityTokenKeyWoVersion: pulumi.Int(0),
IdentityTokenTtl: pulumi.Int(0),
LocationalKmsKeys: pulumi.StringMap{
"string": pulumi.String("string"),
},
Name: pulumi.String("string"),
Namespace: pulumi.String("string"),
ProjectId: pulumi.String("string"),
ReplicationLocations: pulumi.StringArray{
pulumi.String("string"),
},
SecretNameTemplate: pulumi.String("string"),
ServiceAccountEmail: pulumi.String("string"),
})
resource "vault_secrets_syncgcpdestination" "syncGcpDestinationResource" {
allowed_ipv4_addresses = ["string"]
allowed_ipv6_addresses = ["string"]
allowed_ports = [0]
credentials = "string"
custom_tags = {
"string" = "string"
}
disable_strict_networking = false
global_kms_key = "string"
granularity = "string"
identity_token_audience_wo = "string"
identity_token_audience_wo_version = 0
identity_token_key_wo = "string"
identity_token_key_wo_version = 0
identity_token_ttl = 0
locational_kms_keys = {
"string" = "string"
}
name = "string"
namespace = "string"
project_id = "string"
replication_locations = ["string"]
secret_name_template = "string"
service_account_email = "string"
}
var syncGcpDestinationResource = new SyncGcpDestination("syncGcpDestinationResource", SyncGcpDestinationArgs.builder()
.allowedIpv4Addresses("string")
.allowedIpv6Addresses("string")
.allowedPorts(0)
.credentials("string")
.customTags(Map.of("string", "string"))
.disableStrictNetworking(false)
.globalKmsKey("string")
.granularity("string")
.identityTokenAudienceWo("string")
.identityTokenAudienceWoVersion(0)
.identityTokenKeyWo("string")
.identityTokenKeyWoVersion(0)
.identityTokenTtl(0)
.locationalKmsKeys(Map.of("string", "string"))
.name("string")
.namespace("string")
.projectId("string")
.replicationLocations("string")
.secretNameTemplate("string")
.serviceAccountEmail("string")
.build());
sync_gcp_destination_resource = vault.secrets.SyncGcpDestination("syncGcpDestinationResource",
allowed_ipv4_addresses=["string"],
allowed_ipv6_addresses=["string"],
allowed_ports=[0],
credentials="string",
custom_tags={
"string": "string",
},
disable_strict_networking=False,
global_kms_key="string",
granularity="string",
identity_token_audience_wo="string",
identity_token_audience_wo_version=0,
identity_token_key_wo="string",
identity_token_key_wo_version=0,
identity_token_ttl=0,
locational_kms_keys={
"string": "string",
},
name="string",
namespace="string",
project_id="string",
replication_locations=["string"],
secret_name_template="string",
service_account_email="string")
const syncGcpDestinationResource = new vault.secrets.SyncGcpDestination("syncGcpDestinationResource", {
allowedIpv4Addresses: ["string"],
allowedIpv6Addresses: ["string"],
allowedPorts: [0],
credentials: "string",
customTags: {
string: "string",
},
disableStrictNetworking: false,
globalKmsKey: "string",
granularity: "string",
identityTokenAudienceWo: "string",
identityTokenAudienceWoVersion: 0,
identityTokenKeyWo: "string",
identityTokenKeyWoVersion: 0,
identityTokenTtl: 0,
locationalKmsKeys: {
string: "string",
},
name: "string",
namespace: "string",
projectId: "string",
replicationLocations: ["string"],
secretNameTemplate: "string",
serviceAccountEmail: "string",
});
type: vault:secrets:SyncGcpDestination
properties:
allowedIpv4Addresses:
- string
allowedIpv6Addresses:
- string
allowedPorts:
- 0
credentials: string
customTags:
string: string
disableStrictNetworking: false
globalKmsKey: string
granularity: string
identityTokenAudienceWo: string
identityTokenAudienceWoVersion: 0
identityTokenKeyWo: string
identityTokenKeyWoVersion: 0
identityTokenTtl: 0
locationalKmsKeys:
string: string
name: string
namespace: string
projectId: string
replicationLocations:
- string
secretNameTemplate: string
serviceAccountEmail: string
SyncGcpDestination Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The SyncGcpDestination resource accepts the following input properties:
- Allowed
Ipv4Addresses List<string> - Allowed IPv4 addresses for outbound network connectivity in CIDR notation. If not set, all IPv4 addresses are allowed.
- Allowed
Ipv6Addresses List<string> - Allowed IPv6 addresses for outbound network connectivity in CIDR notation. If not set, all IPv6 addresses are allowed.
- Allowed
Ports List<int> - Allowed ports for outbound network connectivity. If not set, all ports are allowed.
- Credentials string
- JSON-encoded credentials to use to connect to GCP.
Can be omitted and directly provided to Vault using the
GOOGLE_APPLICATION_CREDENTIALSenvironment variable. - Dictionary<string, string>
- Custom tags to set on the secret managed at the destination.
- Disable
Strict boolNetworking - Disable strict networking requirements.
- Global
Kms stringKey - Global KMS key for encryption.
- Granularity string
- Determines what level of information is synced as a distinct resource
at the destination. Supports
secret-pathandsecret-key. - Identity
Token stringAudience Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
- Identity
Token intAudience Wo Version - A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
- Identity
Token stringKey Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
- Identity
Token intKey Wo Version - A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
- Identity
Token intTtl - The TTL of generated tokens.
- Locational
Kms Dictionary<string, string>Keys - Locational KMS keys for encryption.
- Name string
- Unique name of the GCP destination.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. - Project
Id string - The target project to manage secrets in. If set, overrides the project ID derived from the service account JSON credentials or application default credentials. The service account must be authorized to perform Secret Manager actions in the target project.
- Replication
Locations List<string> - Replication locations for secrets.
- Secret
Name stringTemplate - Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
- Service
Account stringEmail - Service Account to impersonate for workload identity federation.
- Allowed
Ipv4Addresses []string - Allowed IPv4 addresses for outbound network connectivity in CIDR notation. If not set, all IPv4 addresses are allowed.
- Allowed
Ipv6Addresses []string - Allowed IPv6 addresses for outbound network connectivity in CIDR notation. If not set, all IPv6 addresses are allowed.
- Allowed
Ports []int - Allowed ports for outbound network connectivity. If not set, all ports are allowed.
- Credentials string
- JSON-encoded credentials to use to connect to GCP.
Can be omitted and directly provided to Vault using the
GOOGLE_APPLICATION_CREDENTIALSenvironment variable. - map[string]string
- Custom tags to set on the secret managed at the destination.
- Disable
Strict boolNetworking - Disable strict networking requirements.
- Global
Kms stringKey - Global KMS key for encryption.
- Granularity string
- Determines what level of information is synced as a distinct resource
at the destination. Supports
secret-pathandsecret-key. - Identity
Token stringAudience Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
- Identity
Token intAudience Wo Version - A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
- Identity
Token stringKey Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
- Identity
Token intKey Wo Version - A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
- Identity
Token intTtl - The TTL of generated tokens.
- Locational
Kms map[string]stringKeys - Locational KMS keys for encryption.
- Name string
- Unique name of the GCP destination.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. - Project
Id string - The target project to manage secrets in. If set, overrides the project ID derived from the service account JSON credentials or application default credentials. The service account must be authorized to perform Secret Manager actions in the target project.
- Replication
Locations []string - Replication locations for secrets.
- Secret
Name stringTemplate - Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
- Service
Account stringEmail - Service Account to impersonate for workload identity federation.
- allowed_
ipv4_ list(string)addresses - Allowed IPv4 addresses for outbound network connectivity in CIDR notation. If not set, all IPv4 addresses are allowed.
- allowed_
ipv6_ list(string)addresses - Allowed IPv6 addresses for outbound network connectivity in CIDR notation. If not set, all IPv6 addresses are allowed.
- allowed_
ports list(number) - Allowed ports for outbound network connectivity. If not set, all ports are allowed.
- credentials string
- JSON-encoded credentials to use to connect to GCP.
Can be omitted and directly provided to Vault using the
GOOGLE_APPLICATION_CREDENTIALSenvironment variable. - map(string)
- Custom tags to set on the secret managed at the destination.
- disable_
strict_ boolnetworking - Disable strict networking requirements.
- global_
kms_ stringkey - Global KMS key for encryption.
- granularity string
- Determines what level of information is synced as a distinct resource
at the destination. Supports
secret-pathandsecret-key. - identity_
token_ stringaudience_ wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
- identity_
token_ numberaudience_ wo_ version - A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
- identity_
token_ stringkey_ wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
- identity_
token_ numberkey_ wo_ version - A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
- identity_
token_ numberttl - The TTL of generated tokens.
- locational_
kms_ map(string)keys - Locational KMS keys for encryption.
- name string
- Unique name of the GCP destination.
- namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. - project_
id string - The target project to manage secrets in. If set, overrides the project ID derived from the service account JSON credentials or application default credentials. The service account must be authorized to perform Secret Manager actions in the target project.
- replication_
locations list(string) - Replication locations for secrets.
- secret_
name_ stringtemplate - Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
- service_
account_ stringemail - Service Account to impersonate for workload identity federation.
- allowed
Ipv4Addresses List<String> - Allowed IPv4 addresses for outbound network connectivity in CIDR notation. If not set, all IPv4 addresses are allowed.
- allowed
Ipv6Addresses List<String> - Allowed IPv6 addresses for outbound network connectivity in CIDR notation. If not set, all IPv6 addresses are allowed.
- allowed
Ports List<Integer> - Allowed ports for outbound network connectivity. If not set, all ports are allowed.
- credentials String
- JSON-encoded credentials to use to connect to GCP.
Can be omitted and directly provided to Vault using the
GOOGLE_APPLICATION_CREDENTIALSenvironment variable. - Map<String,String>
- Custom tags to set on the secret managed at the destination.
- disable
Strict BooleanNetworking - Disable strict networking requirements.
- global
Kms StringKey - Global KMS key for encryption.
- granularity String
- Determines what level of information is synced as a distinct resource
at the destination. Supports
secret-pathandsecret-key. - identity
Token StringAudience Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
- identity
Token IntegerAudience Wo Version - A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
- identity
Token StringKey Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
- identity
Token IntegerKey Wo Version - A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
- identity
Token IntegerTtl - The TTL of generated tokens.
- locational
Kms Map<String,String>Keys - Locational KMS keys for encryption.
- name String
- Unique name of the GCP destination.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. - project
Id String - The target project to manage secrets in. If set, overrides the project ID derived from the service account JSON credentials or application default credentials. The service account must be authorized to perform Secret Manager actions in the target project.
- replication
Locations List<String> - Replication locations for secrets.
- secret
Name StringTemplate - Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
- service
Account StringEmail - Service Account to impersonate for workload identity federation.
- allowed
Ipv4Addresses string[] - Allowed IPv4 addresses for outbound network connectivity in CIDR notation. If not set, all IPv4 addresses are allowed.
- allowed
Ipv6Addresses string[] - Allowed IPv6 addresses for outbound network connectivity in CIDR notation. If not set, all IPv6 addresses are allowed.
- allowed
Ports number[] - Allowed ports for outbound network connectivity. If not set, all ports are allowed.
- credentials string
- JSON-encoded credentials to use to connect to GCP.
Can be omitted and directly provided to Vault using the
GOOGLE_APPLICATION_CREDENTIALSenvironment variable. - {[key: string]: string}
- Custom tags to set on the secret managed at the destination.
- disable
Strict booleanNetworking - Disable strict networking requirements.
- global
Kms stringKey - Global KMS key for encryption.
- granularity string
- Determines what level of information is synced as a distinct resource
at the destination. Supports
secret-pathandsecret-key. - identity
Token stringAudience Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
- identity
Token numberAudience Wo Version - A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
- identity
Token stringKey Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
- identity
Token numberKey Wo Version - A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
- identity
Token numberTtl - The TTL of generated tokens.
- locational
Kms {[key: string]: string}Keys - Locational KMS keys for encryption.
- name string
- Unique name of the GCP destination.
- namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. - project
Id string - The target project to manage secrets in. If set, overrides the project ID derived from the service account JSON credentials or application default credentials. The service account must be authorized to perform Secret Manager actions in the target project.
- replication
Locations string[] - Replication locations for secrets.
- secret
Name stringTemplate - Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
- service
Account stringEmail - Service Account to impersonate for workload identity federation.
- allowed_
ipv4_ Sequence[str]addresses - Allowed IPv4 addresses for outbound network connectivity in CIDR notation. If not set, all IPv4 addresses are allowed.
- allowed_
ipv6_ Sequence[str]addresses - Allowed IPv6 addresses for outbound network connectivity in CIDR notation. If not set, all IPv6 addresses are allowed.
- allowed_
ports Sequence[int] - Allowed ports for outbound network connectivity. If not set, all ports are allowed.
- credentials str
- JSON-encoded credentials to use to connect to GCP.
Can be omitted and directly provided to Vault using the
GOOGLE_APPLICATION_CREDENTIALSenvironment variable. - Mapping[str, str]
- Custom tags to set on the secret managed at the destination.
- disable_
strict_ boolnetworking - Disable strict networking requirements.
- global_
kms_ strkey - Global KMS key for encryption.
- granularity str
- Determines what level of information is synced as a distinct resource
at the destination. Supports
secret-pathandsecret-key. - identity_
token_ straudience_ wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
- identity_
token_ intaudience_ wo_ version - A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
- identity_
token_ strkey_ wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
- identity_
token_ intkey_ wo_ version - A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
- identity_
token_ intttl - The TTL of generated tokens.
- locational_
kms_ Mapping[str, str]keys - Locational KMS keys for encryption.
- name str
- Unique name of the GCP destination.
- namespace str
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. - project_
id str - The target project to manage secrets in. If set, overrides the project ID derived from the service account JSON credentials or application default credentials. The service account must be authorized to perform Secret Manager actions in the target project.
- replication_
locations Sequence[str] - Replication locations for secrets.
- secret_
name_ strtemplate - Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
- service_
account_ stremail - Service Account to impersonate for workload identity federation.
- allowed
Ipv4Addresses List<String> - Allowed IPv4 addresses for outbound network connectivity in CIDR notation. If not set, all IPv4 addresses are allowed.
- allowed
Ipv6Addresses List<String> - Allowed IPv6 addresses for outbound network connectivity in CIDR notation. If not set, all IPv6 addresses are allowed.
- allowed
Ports List<Number> - Allowed ports for outbound network connectivity. If not set, all ports are allowed.
- credentials String
- JSON-encoded credentials to use to connect to GCP.
Can be omitted and directly provided to Vault using the
GOOGLE_APPLICATION_CREDENTIALSenvironment variable. - Map<String>
- Custom tags to set on the secret managed at the destination.
- disable
Strict BooleanNetworking - Disable strict networking requirements.
- global
Kms StringKey - Global KMS key for encryption.
- granularity String
- Determines what level of information is synced as a distinct resource
at the destination. Supports
secret-pathandsecret-key. - identity
Token StringAudience Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
- identity
Token NumberAudience Wo Version - A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
- identity
Token StringKey Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
- identity
Token NumberKey Wo Version - A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
- identity
Token NumberTtl - The TTL of generated tokens.
- locational
Kms Map<String>Keys - Locational KMS keys for encryption.
- name String
- Unique name of the GCP destination.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. - project
Id String - The target project to manage secrets in. If set, overrides the project ID derived from the service account JSON credentials or application default credentials. The service account must be authorized to perform Secret Manager actions in the target project.
- replication
Locations List<String> - Replication locations for secrets.
- secret
Name StringTemplate - Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
- service
Account StringEmail - Service Account to impersonate for workload identity federation.
Outputs
All input properties are implicitly available as output properties. Additionally, the SyncGcpDestination resource produces the following output properties:
Look up Existing SyncGcpDestination Resource
Get an existing SyncGcpDestination resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: SyncGcpDestinationState, opts?: CustomResourceOptions): SyncGcpDestination@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
allowed_ipv4_addresses: Optional[Sequence[str]] = None,
allowed_ipv6_addresses: Optional[Sequence[str]] = None,
allowed_ports: Optional[Sequence[int]] = None,
credentials: Optional[str] = None,
custom_tags: Optional[Mapping[str, str]] = None,
disable_strict_networking: Optional[bool] = None,
global_kms_key: Optional[str] = None,
granularity: Optional[str] = None,
identity_token_audience_wo: Optional[str] = None,
identity_token_audience_wo_version: Optional[int] = None,
identity_token_key_wo: Optional[str] = None,
identity_token_key_wo_version: Optional[int] = None,
identity_token_ttl: Optional[int] = None,
locational_kms_keys: Optional[Mapping[str, str]] = None,
name: Optional[str] = None,
namespace: Optional[str] = None,
project_id: Optional[str] = None,
replication_locations: Optional[Sequence[str]] = None,
secret_name_template: Optional[str] = None,
service_account_email: Optional[str] = None,
type: Optional[str] = None) -> SyncGcpDestinationfunc GetSyncGcpDestination(ctx *Context, name string, id IDInput, state *SyncGcpDestinationState, opts ...ResourceOption) (*SyncGcpDestination, error)public static SyncGcpDestination Get(string name, Input<string> id, SyncGcpDestinationState? state, CustomResourceOptions? opts = null)public static SyncGcpDestination get(String name, Output<String> id, SyncGcpDestinationState state, CustomResourceOptions options)resources: _: type: vault:secrets:SyncGcpDestination get: id: ${id}import {
to = vault_secrets_syncgcpdestination.example
id = "${id}"
}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Allowed
Ipv4Addresses List<string> - Allowed IPv4 addresses for outbound network connectivity in CIDR notation. If not set, all IPv4 addresses are allowed.
- Allowed
Ipv6Addresses List<string> - Allowed IPv6 addresses for outbound network connectivity in CIDR notation. If not set, all IPv6 addresses are allowed.
- Allowed
Ports List<int> - Allowed ports for outbound network connectivity. If not set, all ports are allowed.
- Credentials string
- JSON-encoded credentials to use to connect to GCP.
Can be omitted and directly provided to Vault using the
GOOGLE_APPLICATION_CREDENTIALSenvironment variable. - Dictionary<string, string>
- Custom tags to set on the secret managed at the destination.
- Disable
Strict boolNetworking - Disable strict networking requirements.
- Global
Kms stringKey - Global KMS key for encryption.
- Granularity string
- Determines what level of information is synced as a distinct resource
at the destination. Supports
secret-pathandsecret-key. - Identity
Token stringAudience Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
- Identity
Token intAudience Wo Version - A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
- Identity
Token stringKey Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
- Identity
Token intKey Wo Version - A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
- Identity
Token intTtl - The TTL of generated tokens.
- Locational
Kms Dictionary<string, string>Keys - Locational KMS keys for encryption.
- Name string
- Unique name of the GCP destination.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. - Project
Id string - The target project to manage secrets in. If set, overrides the project ID derived from the service account JSON credentials or application default credentials. The service account must be authorized to perform Secret Manager actions in the target project.
- Replication
Locations List<string> - Replication locations for secrets.
- Secret
Name stringTemplate - Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
- Service
Account stringEmail - Service Account to impersonate for workload identity federation.
- Type string
- The type of the secrets destination (
gcp-sm).
- Allowed
Ipv4Addresses []string - Allowed IPv4 addresses for outbound network connectivity in CIDR notation. If not set, all IPv4 addresses are allowed.
- Allowed
Ipv6Addresses []string - Allowed IPv6 addresses for outbound network connectivity in CIDR notation. If not set, all IPv6 addresses are allowed.
- Allowed
Ports []int - Allowed ports for outbound network connectivity. If not set, all ports are allowed.
- Credentials string
- JSON-encoded credentials to use to connect to GCP.
Can be omitted and directly provided to Vault using the
GOOGLE_APPLICATION_CREDENTIALSenvironment variable. - map[string]string
- Custom tags to set on the secret managed at the destination.
- Disable
Strict boolNetworking - Disable strict networking requirements.
- Global
Kms stringKey - Global KMS key for encryption.
- Granularity string
- Determines what level of information is synced as a distinct resource
at the destination. Supports
secret-pathandsecret-key. - Identity
Token stringAudience Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
- Identity
Token intAudience Wo Version - A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
- Identity
Token stringKey Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
- Identity
Token intKey Wo Version - A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
- Identity
Token intTtl - The TTL of generated tokens.
- Locational
Kms map[string]stringKeys - Locational KMS keys for encryption.
- Name string
- Unique name of the GCP destination.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. - Project
Id string - The target project to manage secrets in. If set, overrides the project ID derived from the service account JSON credentials or application default credentials. The service account must be authorized to perform Secret Manager actions in the target project.
- Replication
Locations []string - Replication locations for secrets.
- Secret
Name stringTemplate - Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
- Service
Account stringEmail - Service Account to impersonate for workload identity federation.
- Type string
- The type of the secrets destination (
gcp-sm).
- allowed_
ipv4_ list(string)addresses - Allowed IPv4 addresses for outbound network connectivity in CIDR notation. If not set, all IPv4 addresses are allowed.
- allowed_
ipv6_ list(string)addresses - Allowed IPv6 addresses for outbound network connectivity in CIDR notation. If not set, all IPv6 addresses are allowed.
- allowed_
ports list(number) - Allowed ports for outbound network connectivity. If not set, all ports are allowed.
- credentials string
- JSON-encoded credentials to use to connect to GCP.
Can be omitted and directly provided to Vault using the
GOOGLE_APPLICATION_CREDENTIALSenvironment variable. - map(string)
- Custom tags to set on the secret managed at the destination.
- disable_
strict_ boolnetworking - Disable strict networking requirements.
- global_
kms_ stringkey - Global KMS key for encryption.
- granularity string
- Determines what level of information is synced as a distinct resource
at the destination. Supports
secret-pathandsecret-key. - identity_
token_ stringaudience_ wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
- identity_
token_ numberaudience_ wo_ version - A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
- identity_
token_ stringkey_ wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
- identity_
token_ numberkey_ wo_ version - A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
- identity_
token_ numberttl - The TTL of generated tokens.
- locational_
kms_ map(string)keys - Locational KMS keys for encryption.
- name string
- Unique name of the GCP destination.
- namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. - project_
id string - The target project to manage secrets in. If set, overrides the project ID derived from the service account JSON credentials or application default credentials. The service account must be authorized to perform Secret Manager actions in the target project.
- replication_
locations list(string) - Replication locations for secrets.
- secret_
name_ stringtemplate - Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
- service_
account_ stringemail - Service Account to impersonate for workload identity federation.
- type string
- The type of the secrets destination (
gcp-sm).
- allowed
Ipv4Addresses List<String> - Allowed IPv4 addresses for outbound network connectivity in CIDR notation. If not set, all IPv4 addresses are allowed.
- allowed
Ipv6Addresses List<String> - Allowed IPv6 addresses for outbound network connectivity in CIDR notation. If not set, all IPv6 addresses are allowed.
- allowed
Ports List<Integer> - Allowed ports for outbound network connectivity. If not set, all ports are allowed.
- credentials String
- JSON-encoded credentials to use to connect to GCP.
Can be omitted and directly provided to Vault using the
GOOGLE_APPLICATION_CREDENTIALSenvironment variable. - Map<String,String>
- Custom tags to set on the secret managed at the destination.
- disable
Strict BooleanNetworking - Disable strict networking requirements.
- global
Kms StringKey - Global KMS key for encryption.
- granularity String
- Determines what level of information is synced as a distinct resource
at the destination. Supports
secret-pathandsecret-key. - identity
Token StringAudience Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
- identity
Token IntegerAudience Wo Version - A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
- identity
Token StringKey Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
- identity
Token IntegerKey Wo Version - A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
- identity
Token IntegerTtl - The TTL of generated tokens.
- locational
Kms Map<String,String>Keys - Locational KMS keys for encryption.
- name String
- Unique name of the GCP destination.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. - project
Id String - The target project to manage secrets in. If set, overrides the project ID derived from the service account JSON credentials or application default credentials. The service account must be authorized to perform Secret Manager actions in the target project.
- replication
Locations List<String> - Replication locations for secrets.
- secret
Name StringTemplate - Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
- service
Account StringEmail - Service Account to impersonate for workload identity federation.
- type String
- The type of the secrets destination (
gcp-sm).
- allowed
Ipv4Addresses string[] - Allowed IPv4 addresses for outbound network connectivity in CIDR notation. If not set, all IPv4 addresses are allowed.
- allowed
Ipv6Addresses string[] - Allowed IPv6 addresses for outbound network connectivity in CIDR notation. If not set, all IPv6 addresses are allowed.
- allowed
Ports number[] - Allowed ports for outbound network connectivity. If not set, all ports are allowed.
- credentials string
- JSON-encoded credentials to use to connect to GCP.
Can be omitted and directly provided to Vault using the
GOOGLE_APPLICATION_CREDENTIALSenvironment variable. - {[key: string]: string}
- Custom tags to set on the secret managed at the destination.
- disable
Strict booleanNetworking - Disable strict networking requirements.
- global
Kms stringKey - Global KMS key for encryption.
- granularity string
- Determines what level of information is synced as a distinct resource
at the destination. Supports
secret-pathandsecret-key. - identity
Token stringAudience Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
- identity
Token numberAudience Wo Version - A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
- identity
Token stringKey Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
- identity
Token numberKey Wo Version - A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
- identity
Token numberTtl - The TTL of generated tokens.
- locational
Kms {[key: string]: string}Keys - Locational KMS keys for encryption.
- name string
- Unique name of the GCP destination.
- namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. - project
Id string - The target project to manage secrets in. If set, overrides the project ID derived from the service account JSON credentials or application default credentials. The service account must be authorized to perform Secret Manager actions in the target project.
- replication
Locations string[] - Replication locations for secrets.
- secret
Name stringTemplate - Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
- service
Account stringEmail - Service Account to impersonate for workload identity federation.
- type string
- The type of the secrets destination (
gcp-sm).
- allowed_
ipv4_ Sequence[str]addresses - Allowed IPv4 addresses for outbound network connectivity in CIDR notation. If not set, all IPv4 addresses are allowed.
- allowed_
ipv6_ Sequence[str]addresses - Allowed IPv6 addresses for outbound network connectivity in CIDR notation. If not set, all IPv6 addresses are allowed.
- allowed_
ports Sequence[int] - Allowed ports for outbound network connectivity. If not set, all ports are allowed.
- credentials str
- JSON-encoded credentials to use to connect to GCP.
Can be omitted and directly provided to Vault using the
GOOGLE_APPLICATION_CREDENTIALSenvironment variable. - Mapping[str, str]
- Custom tags to set on the secret managed at the destination.
- disable_
strict_ boolnetworking - Disable strict networking requirements.
- global_
kms_ strkey - Global KMS key for encryption.
- granularity str
- Determines what level of information is synced as a distinct resource
at the destination. Supports
secret-pathandsecret-key. - identity_
token_ straudience_ wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
- identity_
token_ intaudience_ wo_ version - A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
- identity_
token_ strkey_ wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
- identity_
token_ intkey_ wo_ version - A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
- identity_
token_ intttl - The TTL of generated tokens.
- locational_
kms_ Mapping[str, str]keys - Locational KMS keys for encryption.
- name str
- Unique name of the GCP destination.
- namespace str
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. - project_
id str - The target project to manage secrets in. If set, overrides the project ID derived from the service account JSON credentials or application default credentials. The service account must be authorized to perform Secret Manager actions in the target project.
- replication_
locations Sequence[str] - Replication locations for secrets.
- secret_
name_ strtemplate - Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
- service_
account_ stremail - Service Account to impersonate for workload identity federation.
- type str
- The type of the secrets destination (
gcp-sm).
- allowed
Ipv4Addresses List<String> - Allowed IPv4 addresses for outbound network connectivity in CIDR notation. If not set, all IPv4 addresses are allowed.
- allowed
Ipv6Addresses List<String> - Allowed IPv6 addresses for outbound network connectivity in CIDR notation. If not set, all IPv6 addresses are allowed.
- allowed
Ports List<Number> - Allowed ports for outbound network connectivity. If not set, all ports are allowed.
- credentials String
- JSON-encoded credentials to use to connect to GCP.
Can be omitted and directly provided to Vault using the
GOOGLE_APPLICATION_CREDENTIALSenvironment variable. - Map<String>
- Custom tags to set on the secret managed at the destination.
- disable
Strict BooleanNetworking - Disable strict networking requirements.
- global
Kms StringKey - Global KMS key for encryption.
- granularity String
- Determines what level of information is synced as a distinct resource
at the destination. Supports
secret-pathandsecret-key. - identity
Token StringAudience Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
- identity
Token NumberAudience Wo Version - A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
- identity
Token StringKey Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
- identity
Token NumberKey Wo Version - A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
- identity
Token NumberTtl - The TTL of generated tokens.
- locational
Kms Map<String>Keys - Locational KMS keys for encryption.
- name String
- Unique name of the GCP destination.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. - project
Id String - The target project to manage secrets in. If set, overrides the project ID derived from the service account JSON credentials or application default credentials. The service account must be authorized to perform Secret Manager actions in the target project.
- replication
Locations List<String> - Replication locations for secrets.
- secret
Name StringTemplate - Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
- service
Account StringEmail - Service Account to impersonate for workload identity federation.
- type String
- The type of the secrets destination (
gcp-sm).
Import
GCP Secrets sync destinations can be imported using the name, e.g.
$ pulumi import vault:secrets/syncGcpDestination:SyncGcpDestination gcp gcp-dest
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- Vault pulumi/pulumi-vault
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
vaultTerraform Provider.
published on Tuesday, Mar 31, 2026 by Pulumi
