pulumi-vault 5.19.0a1705474292__py3-none-any.whl → 5.20.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +59 -0
- pulumi_vault/_inputs.py +380 -0
- pulumi_vault/_utilities.py +2 -2
- pulumi_vault/aws/secret_backend.py +188 -0
- pulumi_vault/aws/secret_backend_static_role.py +2 -2
- pulumi_vault/azure/backend.py +7 -21
- pulumi_vault/azure/backend_role.py +111 -0
- pulumi_vault/config/__init__.pyi +0 -3
- pulumi_vault/config/outputs.py +380 -0
- pulumi_vault/config/vars.py +0 -3
- pulumi_vault/consul/secret_backend.py +7 -35
- pulumi_vault/database/_inputs.py +536 -0
- pulumi_vault/database/outputs.py +483 -3
- pulumi_vault/gcp/_inputs.py +162 -4
- pulumi_vault/gcp/auth_backend.py +64 -3
- pulumi_vault/gcp/outputs.py +161 -4
- pulumi_vault/get_raft_autopilot_state.py +0 -12
- pulumi_vault/identity/group_alias.py +6 -6
- pulumi_vault/kubernetes/auth_backend_config.py +7 -7
- pulumi_vault/kubernetes/secret_backend_role.py +8 -4
- pulumi_vault/kv/_inputs.py +12 -0
- pulumi_vault/kv/outputs.py +12 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +2 -2
- pulumi_vault/ldap/secret_backend_static_role.py +2 -2
- pulumi_vault/managed/_inputs.py +12 -0
- pulumi_vault/managed/keys.py +20 -0
- pulumi_vault/managed/outputs.py +12 -0
- pulumi_vault/mongodbatlas/secret_role.py +2 -2
- pulumi_vault/namespace.py +46 -14
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -6
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -10
- pulumi_vault/pkisecret/secret_backend_role.py +54 -7
- pulumi_vault/rabbitmq/_inputs.py +36 -0
- pulumi_vault/rabbitmq/outputs.py +36 -0
- pulumi_vault/saml/auth_backend_role.py +7 -14
- pulumi_vault/secrets/__init__.py +14 -0
- pulumi_vault/secrets/sync_association.py +464 -0
- pulumi_vault/secrets/sync_aws_destination.py +564 -0
- pulumi_vault/secrets/sync_azure_destination.py +674 -0
- pulumi_vault/secrets/sync_config.py +297 -0
- pulumi_vault/secrets/sync_gcp_destination.py +438 -0
- pulumi_vault/secrets/sync_gh_destination.py +511 -0
- pulumi_vault/secrets/sync_vercel_destination.py +541 -0
- pulumi_vault/ssh/secret_backend_role.py +7 -14
- {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/METADATA +2 -2
- {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/RECORD +48 -40
- {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/top_level.txt +0 -0
pulumi_vault/database/_inputs.py
CHANGED
@@ -1376,14 +1376,19 @@ class SecretBackendConnectionMysqlArgs:
|
|
1376
1376
|
@pulumi.input_type
|
1377
1377
|
class SecretBackendConnectionMysqlAuroraArgs:
|
1378
1378
|
def __init__(__self__, *,
|
1379
|
+
auth_type: Optional[pulumi.Input[str]] = None,
|
1379
1380
|
connection_url: Optional[pulumi.Input[str]] = None,
|
1380
1381
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
1381
1382
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
1382
1383
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
1383
1384
|
password: Optional[pulumi.Input[str]] = None,
|
1385
|
+
service_account_json: Optional[pulumi.Input[str]] = None,
|
1386
|
+
tls_ca: Optional[pulumi.Input[str]] = None,
|
1387
|
+
tls_certificate_key: Optional[pulumi.Input[str]] = None,
|
1384
1388
|
username: Optional[pulumi.Input[str]] = None,
|
1385
1389
|
username_template: Optional[pulumi.Input[str]] = None):
|
1386
1390
|
"""
|
1391
|
+
:param pulumi.Input[str] auth_type: Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
1387
1392
|
:param pulumi.Input[str] connection_url: A URL containing connection information. See
|
1388
1393
|
the [Vault
|
1389
1394
|
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
@@ -1395,9 +1400,14 @@ class SecretBackendConnectionMysqlAuroraArgs:
|
|
1395
1400
|
:param pulumi.Input[int] max_open_connections: The maximum number of open connections to
|
1396
1401
|
use.
|
1397
1402
|
:param pulumi.Input[str] password: The password to authenticate with.
|
1403
|
+
:param pulumi.Input[str] service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1404
|
+
:param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1405
|
+
:param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1398
1406
|
:param pulumi.Input[str] username: The username to authenticate with.
|
1399
1407
|
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated.
|
1400
1408
|
"""
|
1409
|
+
if auth_type is not None:
|
1410
|
+
pulumi.set(__self__, "auth_type", auth_type)
|
1401
1411
|
if connection_url is not None:
|
1402
1412
|
pulumi.set(__self__, "connection_url", connection_url)
|
1403
1413
|
if max_connection_lifetime is not None:
|
@@ -1408,11 +1418,29 @@ class SecretBackendConnectionMysqlAuroraArgs:
|
|
1408
1418
|
pulumi.set(__self__, "max_open_connections", max_open_connections)
|
1409
1419
|
if password is not None:
|
1410
1420
|
pulumi.set(__self__, "password", password)
|
1421
|
+
if service_account_json is not None:
|
1422
|
+
pulumi.set(__self__, "service_account_json", service_account_json)
|
1423
|
+
if tls_ca is not None:
|
1424
|
+
pulumi.set(__self__, "tls_ca", tls_ca)
|
1425
|
+
if tls_certificate_key is not None:
|
1426
|
+
pulumi.set(__self__, "tls_certificate_key", tls_certificate_key)
|
1411
1427
|
if username is not None:
|
1412
1428
|
pulumi.set(__self__, "username", username)
|
1413
1429
|
if username_template is not None:
|
1414
1430
|
pulumi.set(__self__, "username_template", username_template)
|
1415
1431
|
|
1432
|
+
@property
|
1433
|
+
@pulumi.getter(name="authType")
|
1434
|
+
def auth_type(self) -> Optional[pulumi.Input[str]]:
|
1435
|
+
"""
|
1436
|
+
Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
1437
|
+
"""
|
1438
|
+
return pulumi.get(self, "auth_type")
|
1439
|
+
|
1440
|
+
@auth_type.setter
|
1441
|
+
def auth_type(self, value: Optional[pulumi.Input[str]]):
|
1442
|
+
pulumi.set(self, "auth_type", value)
|
1443
|
+
|
1416
1444
|
@property
|
1417
1445
|
@pulumi.getter(name="connectionUrl")
|
1418
1446
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
@@ -1479,6 +1507,42 @@ class SecretBackendConnectionMysqlAuroraArgs:
|
|
1479
1507
|
def password(self, value: Optional[pulumi.Input[str]]):
|
1480
1508
|
pulumi.set(self, "password", value)
|
1481
1509
|
|
1510
|
+
@property
|
1511
|
+
@pulumi.getter(name="serviceAccountJson")
|
1512
|
+
def service_account_json(self) -> Optional[pulumi.Input[str]]:
|
1513
|
+
"""
|
1514
|
+
JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1515
|
+
"""
|
1516
|
+
return pulumi.get(self, "service_account_json")
|
1517
|
+
|
1518
|
+
@service_account_json.setter
|
1519
|
+
def service_account_json(self, value: Optional[pulumi.Input[str]]):
|
1520
|
+
pulumi.set(self, "service_account_json", value)
|
1521
|
+
|
1522
|
+
@property
|
1523
|
+
@pulumi.getter(name="tlsCa")
|
1524
|
+
def tls_ca(self) -> Optional[pulumi.Input[str]]:
|
1525
|
+
"""
|
1526
|
+
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1527
|
+
"""
|
1528
|
+
return pulumi.get(self, "tls_ca")
|
1529
|
+
|
1530
|
+
@tls_ca.setter
|
1531
|
+
def tls_ca(self, value: Optional[pulumi.Input[str]]):
|
1532
|
+
pulumi.set(self, "tls_ca", value)
|
1533
|
+
|
1534
|
+
@property
|
1535
|
+
@pulumi.getter(name="tlsCertificateKey")
|
1536
|
+
def tls_certificate_key(self) -> Optional[pulumi.Input[str]]:
|
1537
|
+
"""
|
1538
|
+
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1539
|
+
"""
|
1540
|
+
return pulumi.get(self, "tls_certificate_key")
|
1541
|
+
|
1542
|
+
@tls_certificate_key.setter
|
1543
|
+
def tls_certificate_key(self, value: Optional[pulumi.Input[str]]):
|
1544
|
+
pulumi.set(self, "tls_certificate_key", value)
|
1545
|
+
|
1482
1546
|
@property
|
1483
1547
|
@pulumi.getter
|
1484
1548
|
def username(self) -> Optional[pulumi.Input[str]]:
|
@@ -1507,14 +1571,19 @@ class SecretBackendConnectionMysqlAuroraArgs:
|
|
1507
1571
|
@pulumi.input_type
|
1508
1572
|
class SecretBackendConnectionMysqlLegacyArgs:
|
1509
1573
|
def __init__(__self__, *,
|
1574
|
+
auth_type: Optional[pulumi.Input[str]] = None,
|
1510
1575
|
connection_url: Optional[pulumi.Input[str]] = None,
|
1511
1576
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
1512
1577
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
1513
1578
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
1514
1579
|
password: Optional[pulumi.Input[str]] = None,
|
1580
|
+
service_account_json: Optional[pulumi.Input[str]] = None,
|
1581
|
+
tls_ca: Optional[pulumi.Input[str]] = None,
|
1582
|
+
tls_certificate_key: Optional[pulumi.Input[str]] = None,
|
1515
1583
|
username: Optional[pulumi.Input[str]] = None,
|
1516
1584
|
username_template: Optional[pulumi.Input[str]] = None):
|
1517
1585
|
"""
|
1586
|
+
:param pulumi.Input[str] auth_type: Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
1518
1587
|
:param pulumi.Input[str] connection_url: A URL containing connection information. See
|
1519
1588
|
the [Vault
|
1520
1589
|
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
@@ -1526,9 +1595,14 @@ class SecretBackendConnectionMysqlLegacyArgs:
|
|
1526
1595
|
:param pulumi.Input[int] max_open_connections: The maximum number of open connections to
|
1527
1596
|
use.
|
1528
1597
|
:param pulumi.Input[str] password: The password to authenticate with.
|
1598
|
+
:param pulumi.Input[str] service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1599
|
+
:param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1600
|
+
:param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1529
1601
|
:param pulumi.Input[str] username: The username to authenticate with.
|
1530
1602
|
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated.
|
1531
1603
|
"""
|
1604
|
+
if auth_type is not None:
|
1605
|
+
pulumi.set(__self__, "auth_type", auth_type)
|
1532
1606
|
if connection_url is not None:
|
1533
1607
|
pulumi.set(__self__, "connection_url", connection_url)
|
1534
1608
|
if max_connection_lifetime is not None:
|
@@ -1539,11 +1613,29 @@ class SecretBackendConnectionMysqlLegacyArgs:
|
|
1539
1613
|
pulumi.set(__self__, "max_open_connections", max_open_connections)
|
1540
1614
|
if password is not None:
|
1541
1615
|
pulumi.set(__self__, "password", password)
|
1616
|
+
if service_account_json is not None:
|
1617
|
+
pulumi.set(__self__, "service_account_json", service_account_json)
|
1618
|
+
if tls_ca is not None:
|
1619
|
+
pulumi.set(__self__, "tls_ca", tls_ca)
|
1620
|
+
if tls_certificate_key is not None:
|
1621
|
+
pulumi.set(__self__, "tls_certificate_key", tls_certificate_key)
|
1542
1622
|
if username is not None:
|
1543
1623
|
pulumi.set(__self__, "username", username)
|
1544
1624
|
if username_template is not None:
|
1545
1625
|
pulumi.set(__self__, "username_template", username_template)
|
1546
1626
|
|
1627
|
+
@property
|
1628
|
+
@pulumi.getter(name="authType")
|
1629
|
+
def auth_type(self) -> Optional[pulumi.Input[str]]:
|
1630
|
+
"""
|
1631
|
+
Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
1632
|
+
"""
|
1633
|
+
return pulumi.get(self, "auth_type")
|
1634
|
+
|
1635
|
+
@auth_type.setter
|
1636
|
+
def auth_type(self, value: Optional[pulumi.Input[str]]):
|
1637
|
+
pulumi.set(self, "auth_type", value)
|
1638
|
+
|
1547
1639
|
@property
|
1548
1640
|
@pulumi.getter(name="connectionUrl")
|
1549
1641
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
@@ -1610,6 +1702,42 @@ class SecretBackendConnectionMysqlLegacyArgs:
|
|
1610
1702
|
def password(self, value: Optional[pulumi.Input[str]]):
|
1611
1703
|
pulumi.set(self, "password", value)
|
1612
1704
|
|
1705
|
+
@property
|
1706
|
+
@pulumi.getter(name="serviceAccountJson")
|
1707
|
+
def service_account_json(self) -> Optional[pulumi.Input[str]]:
|
1708
|
+
"""
|
1709
|
+
JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1710
|
+
"""
|
1711
|
+
return pulumi.get(self, "service_account_json")
|
1712
|
+
|
1713
|
+
@service_account_json.setter
|
1714
|
+
def service_account_json(self, value: Optional[pulumi.Input[str]]):
|
1715
|
+
pulumi.set(self, "service_account_json", value)
|
1716
|
+
|
1717
|
+
@property
|
1718
|
+
@pulumi.getter(name="tlsCa")
|
1719
|
+
def tls_ca(self) -> Optional[pulumi.Input[str]]:
|
1720
|
+
"""
|
1721
|
+
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1722
|
+
"""
|
1723
|
+
return pulumi.get(self, "tls_ca")
|
1724
|
+
|
1725
|
+
@tls_ca.setter
|
1726
|
+
def tls_ca(self, value: Optional[pulumi.Input[str]]):
|
1727
|
+
pulumi.set(self, "tls_ca", value)
|
1728
|
+
|
1729
|
+
@property
|
1730
|
+
@pulumi.getter(name="tlsCertificateKey")
|
1731
|
+
def tls_certificate_key(self) -> Optional[pulumi.Input[str]]:
|
1732
|
+
"""
|
1733
|
+
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1734
|
+
"""
|
1735
|
+
return pulumi.get(self, "tls_certificate_key")
|
1736
|
+
|
1737
|
+
@tls_certificate_key.setter
|
1738
|
+
def tls_certificate_key(self, value: Optional[pulumi.Input[str]]):
|
1739
|
+
pulumi.set(self, "tls_certificate_key", value)
|
1740
|
+
|
1613
1741
|
@property
|
1614
1742
|
@pulumi.getter
|
1615
1743
|
def username(self) -> Optional[pulumi.Input[str]]:
|
@@ -1638,14 +1766,19 @@ class SecretBackendConnectionMysqlLegacyArgs:
|
|
1638
1766
|
@pulumi.input_type
|
1639
1767
|
class SecretBackendConnectionMysqlRdsArgs:
|
1640
1768
|
def __init__(__self__, *,
|
1769
|
+
auth_type: Optional[pulumi.Input[str]] = None,
|
1641
1770
|
connection_url: Optional[pulumi.Input[str]] = None,
|
1642
1771
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
1643
1772
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
1644
1773
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
1645
1774
|
password: Optional[pulumi.Input[str]] = None,
|
1775
|
+
service_account_json: Optional[pulumi.Input[str]] = None,
|
1776
|
+
tls_ca: Optional[pulumi.Input[str]] = None,
|
1777
|
+
tls_certificate_key: Optional[pulumi.Input[str]] = None,
|
1646
1778
|
username: Optional[pulumi.Input[str]] = None,
|
1647
1779
|
username_template: Optional[pulumi.Input[str]] = None):
|
1648
1780
|
"""
|
1781
|
+
:param pulumi.Input[str] auth_type: Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
1649
1782
|
:param pulumi.Input[str] connection_url: A URL containing connection information. See
|
1650
1783
|
the [Vault
|
1651
1784
|
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
@@ -1657,9 +1790,14 @@ class SecretBackendConnectionMysqlRdsArgs:
|
|
1657
1790
|
:param pulumi.Input[int] max_open_connections: The maximum number of open connections to
|
1658
1791
|
use.
|
1659
1792
|
:param pulumi.Input[str] password: The password to authenticate with.
|
1793
|
+
:param pulumi.Input[str] service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1794
|
+
:param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1795
|
+
:param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1660
1796
|
:param pulumi.Input[str] username: The username to authenticate with.
|
1661
1797
|
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated.
|
1662
1798
|
"""
|
1799
|
+
if auth_type is not None:
|
1800
|
+
pulumi.set(__self__, "auth_type", auth_type)
|
1663
1801
|
if connection_url is not None:
|
1664
1802
|
pulumi.set(__self__, "connection_url", connection_url)
|
1665
1803
|
if max_connection_lifetime is not None:
|
@@ -1670,11 +1808,29 @@ class SecretBackendConnectionMysqlRdsArgs:
|
|
1670
1808
|
pulumi.set(__self__, "max_open_connections", max_open_connections)
|
1671
1809
|
if password is not None:
|
1672
1810
|
pulumi.set(__self__, "password", password)
|
1811
|
+
if service_account_json is not None:
|
1812
|
+
pulumi.set(__self__, "service_account_json", service_account_json)
|
1813
|
+
if tls_ca is not None:
|
1814
|
+
pulumi.set(__self__, "tls_ca", tls_ca)
|
1815
|
+
if tls_certificate_key is not None:
|
1816
|
+
pulumi.set(__self__, "tls_certificate_key", tls_certificate_key)
|
1673
1817
|
if username is not None:
|
1674
1818
|
pulumi.set(__self__, "username", username)
|
1675
1819
|
if username_template is not None:
|
1676
1820
|
pulumi.set(__self__, "username_template", username_template)
|
1677
1821
|
|
1822
|
+
@property
|
1823
|
+
@pulumi.getter(name="authType")
|
1824
|
+
def auth_type(self) -> Optional[pulumi.Input[str]]:
|
1825
|
+
"""
|
1826
|
+
Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
1827
|
+
"""
|
1828
|
+
return pulumi.get(self, "auth_type")
|
1829
|
+
|
1830
|
+
@auth_type.setter
|
1831
|
+
def auth_type(self, value: Optional[pulumi.Input[str]]):
|
1832
|
+
pulumi.set(self, "auth_type", value)
|
1833
|
+
|
1678
1834
|
@property
|
1679
1835
|
@pulumi.getter(name="connectionUrl")
|
1680
1836
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
@@ -1741,6 +1897,42 @@ class SecretBackendConnectionMysqlRdsArgs:
|
|
1741
1897
|
def password(self, value: Optional[pulumi.Input[str]]):
|
1742
1898
|
pulumi.set(self, "password", value)
|
1743
1899
|
|
1900
|
+
@property
|
1901
|
+
@pulumi.getter(name="serviceAccountJson")
|
1902
|
+
def service_account_json(self) -> Optional[pulumi.Input[str]]:
|
1903
|
+
"""
|
1904
|
+
JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1905
|
+
"""
|
1906
|
+
return pulumi.get(self, "service_account_json")
|
1907
|
+
|
1908
|
+
@service_account_json.setter
|
1909
|
+
def service_account_json(self, value: Optional[pulumi.Input[str]]):
|
1910
|
+
pulumi.set(self, "service_account_json", value)
|
1911
|
+
|
1912
|
+
@property
|
1913
|
+
@pulumi.getter(name="tlsCa")
|
1914
|
+
def tls_ca(self) -> Optional[pulumi.Input[str]]:
|
1915
|
+
"""
|
1916
|
+
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1917
|
+
"""
|
1918
|
+
return pulumi.get(self, "tls_ca")
|
1919
|
+
|
1920
|
+
@tls_ca.setter
|
1921
|
+
def tls_ca(self, value: Optional[pulumi.Input[str]]):
|
1922
|
+
pulumi.set(self, "tls_ca", value)
|
1923
|
+
|
1924
|
+
@property
|
1925
|
+
@pulumi.getter(name="tlsCertificateKey")
|
1926
|
+
def tls_certificate_key(self) -> Optional[pulumi.Input[str]]:
|
1927
|
+
"""
|
1928
|
+
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1929
|
+
"""
|
1930
|
+
return pulumi.get(self, "tls_certificate_key")
|
1931
|
+
|
1932
|
+
@tls_certificate_key.setter
|
1933
|
+
def tls_certificate_key(self, value: Optional[pulumi.Input[str]]):
|
1934
|
+
pulumi.set(self, "tls_certificate_key", value)
|
1935
|
+
|
1744
1936
|
@property
|
1745
1937
|
@pulumi.getter
|
1746
1938
|
def username(self) -> Optional[pulumi.Input[str]]:
|
@@ -1770,10 +1962,12 @@ class SecretBackendConnectionMysqlRdsArgs:
|
|
1770
1962
|
class SecretBackendConnectionOracleArgs:
|
1771
1963
|
def __init__(__self__, *,
|
1772
1964
|
connection_url: Optional[pulumi.Input[str]] = None,
|
1965
|
+
disconnect_sessions: Optional[pulumi.Input[bool]] = None,
|
1773
1966
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
1774
1967
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
1775
1968
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
1776
1969
|
password: Optional[pulumi.Input[str]] = None,
|
1970
|
+
split_statements: Optional[pulumi.Input[bool]] = None,
|
1777
1971
|
username: Optional[pulumi.Input[str]] = None,
|
1778
1972
|
username_template: Optional[pulumi.Input[str]] = None):
|
1779
1973
|
"""
|
@@ -1781,6 +1975,7 @@ class SecretBackendConnectionOracleArgs:
|
|
1781
1975
|
the [Vault
|
1782
1976
|
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1783
1977
|
for an example.
|
1978
|
+
:param pulumi.Input[bool] disconnect_sessions: Enable the built-in session disconnect mechanism.
|
1784
1979
|
:param pulumi.Input[int] max_connection_lifetime: The maximum number of seconds to keep
|
1785
1980
|
a connection alive for.
|
1786
1981
|
:param pulumi.Input[int] max_idle_connections: The maximum number of idle connections to
|
@@ -1788,11 +1983,14 @@ class SecretBackendConnectionOracleArgs:
|
|
1788
1983
|
:param pulumi.Input[int] max_open_connections: The maximum number of open connections to
|
1789
1984
|
use.
|
1790
1985
|
:param pulumi.Input[str] password: The password to authenticate with.
|
1986
|
+
:param pulumi.Input[bool] split_statements: Enable spliting statements after semi-colons.
|
1791
1987
|
:param pulumi.Input[str] username: The username to authenticate with.
|
1792
1988
|
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated.
|
1793
1989
|
"""
|
1794
1990
|
if connection_url is not None:
|
1795
1991
|
pulumi.set(__self__, "connection_url", connection_url)
|
1992
|
+
if disconnect_sessions is not None:
|
1993
|
+
pulumi.set(__self__, "disconnect_sessions", disconnect_sessions)
|
1796
1994
|
if max_connection_lifetime is not None:
|
1797
1995
|
pulumi.set(__self__, "max_connection_lifetime", max_connection_lifetime)
|
1798
1996
|
if max_idle_connections is not None:
|
@@ -1801,6 +1999,8 @@ class SecretBackendConnectionOracleArgs:
|
|
1801
1999
|
pulumi.set(__self__, "max_open_connections", max_open_connections)
|
1802
2000
|
if password is not None:
|
1803
2001
|
pulumi.set(__self__, "password", password)
|
2002
|
+
if split_statements is not None:
|
2003
|
+
pulumi.set(__self__, "split_statements", split_statements)
|
1804
2004
|
if username is not None:
|
1805
2005
|
pulumi.set(__self__, "username", username)
|
1806
2006
|
if username_template is not None:
|
@@ -1821,6 +2021,18 @@ class SecretBackendConnectionOracleArgs:
|
|
1821
2021
|
def connection_url(self, value: Optional[pulumi.Input[str]]):
|
1822
2022
|
pulumi.set(self, "connection_url", value)
|
1823
2023
|
|
2024
|
+
@property
|
2025
|
+
@pulumi.getter(name="disconnectSessions")
|
2026
|
+
def disconnect_sessions(self) -> Optional[pulumi.Input[bool]]:
|
2027
|
+
"""
|
2028
|
+
Enable the built-in session disconnect mechanism.
|
2029
|
+
"""
|
2030
|
+
return pulumi.get(self, "disconnect_sessions")
|
2031
|
+
|
2032
|
+
@disconnect_sessions.setter
|
2033
|
+
def disconnect_sessions(self, value: Optional[pulumi.Input[bool]]):
|
2034
|
+
pulumi.set(self, "disconnect_sessions", value)
|
2035
|
+
|
1824
2036
|
@property
|
1825
2037
|
@pulumi.getter(name="maxConnectionLifetime")
|
1826
2038
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
@@ -1872,6 +2084,18 @@ class SecretBackendConnectionOracleArgs:
|
|
1872
2084
|
def password(self, value: Optional[pulumi.Input[str]]):
|
1873
2085
|
pulumi.set(self, "password", value)
|
1874
2086
|
|
2087
|
+
@property
|
2088
|
+
@pulumi.getter(name="splitStatements")
|
2089
|
+
def split_statements(self) -> Optional[pulumi.Input[bool]]:
|
2090
|
+
"""
|
2091
|
+
Enable spliting statements after semi-colons.
|
2092
|
+
"""
|
2093
|
+
return pulumi.get(self, "split_statements")
|
2094
|
+
|
2095
|
+
@split_statements.setter
|
2096
|
+
def split_statements(self, value: Optional[pulumi.Input[bool]]):
|
2097
|
+
pulumi.set(self, "split_statements", value)
|
2098
|
+
|
1875
2099
|
@property
|
1876
2100
|
@pulumi.getter
|
1877
2101
|
def username(self) -> Optional[pulumi.Input[str]]:
|
@@ -2566,6 +2790,7 @@ class SecretsMountCassandraArgs:
|
|
2566
2790
|
username: Optional[pulumi.Input[str]] = None,
|
2567
2791
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
2568
2792
|
"""
|
2793
|
+
:param pulumi.Input[str] name: Name of the database connection.
|
2569
2794
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
2570
2795
|
connection.
|
2571
2796
|
:param pulumi.Input[int] connect_timeout: The number of seconds to use as a connection
|
@@ -2625,6 +2850,9 @@ class SecretsMountCassandraArgs:
|
|
2625
2850
|
@property
|
2626
2851
|
@pulumi.getter
|
2627
2852
|
def name(self) -> pulumi.Input[str]:
|
2853
|
+
"""
|
2854
|
+
Name of the database connection.
|
2855
|
+
"""
|
2628
2856
|
return pulumi.get(self, "name")
|
2629
2857
|
|
2630
2858
|
@name.setter
|
@@ -2839,6 +3067,7 @@ class SecretsMountCouchbaseArgs:
|
|
2839
3067
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
2840
3068
|
"""
|
2841
3069
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] hosts: The hosts to connect to.
|
3070
|
+
:param pulumi.Input[str] name: Name of the database connection.
|
2842
3071
|
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
2843
3072
|
:param pulumi.Input[str] username: The root credential username used in the connection URL.
|
2844
3073
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
@@ -2897,6 +3126,9 @@ class SecretsMountCouchbaseArgs:
|
|
2897
3126
|
@property
|
2898
3127
|
@pulumi.getter
|
2899
3128
|
def name(self) -> pulumi.Input[str]:
|
3129
|
+
"""
|
3130
|
+
Name of the database connection.
|
3131
|
+
"""
|
2900
3132
|
return pulumi.get(self, "name")
|
2901
3133
|
|
2902
3134
|
@name.setter
|
@@ -3073,6 +3305,7 @@ class SecretsMountElasticsearchArgs:
|
|
3073
3305
|
username_template: Optional[pulumi.Input[str]] = None,
|
3074
3306
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
3075
3307
|
"""
|
3308
|
+
:param pulumi.Input[str] name: Name of the database connection.
|
3076
3309
|
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
3077
3310
|
:param pulumi.Input[str] url: The URL for Elasticsearch's API. https requires certificate
|
3078
3311
|
by trusted CA if used.
|
@@ -3126,6 +3359,9 @@ class SecretsMountElasticsearchArgs:
|
|
3126
3359
|
@property
|
3127
3360
|
@pulumi.getter
|
3128
3361
|
def name(self) -> pulumi.Input[str]:
|
3362
|
+
"""
|
3363
|
+
Name of the database connection.
|
3364
|
+
"""
|
3129
3365
|
return pulumi.get(self, "name")
|
3130
3366
|
|
3131
3367
|
@name.setter
|
@@ -3335,6 +3571,7 @@ class SecretsMountHanaArgs:
|
|
3335
3571
|
username: Optional[pulumi.Input[str]] = None,
|
3336
3572
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
3337
3573
|
"""
|
3574
|
+
:param pulumi.Input[str] name: Name of the database connection.
|
3338
3575
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
3339
3576
|
connection.
|
3340
3577
|
:param pulumi.Input[str] connection_url: Specifies the Redshift DSN.
|
@@ -3384,6 +3621,9 @@ class SecretsMountHanaArgs:
|
|
3384
3621
|
@property
|
3385
3622
|
@pulumi.getter
|
3386
3623
|
def name(self) -> pulumi.Input[str]:
|
3624
|
+
"""
|
3625
|
+
Name of the database connection.
|
3626
|
+
"""
|
3387
3627
|
return pulumi.get(self, "name")
|
3388
3628
|
|
3389
3629
|
@name.setter
|
@@ -3563,6 +3803,7 @@ class SecretsMountInfluxdbArgs:
|
|
3563
3803
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
3564
3804
|
"""
|
3565
3805
|
:param pulumi.Input[str] host: The host to connect to.
|
3806
|
+
:param pulumi.Input[str] name: Name of the database connection.
|
3566
3807
|
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
3567
3808
|
:param pulumi.Input[str] username: The root credential username used in the connection URL.
|
3568
3809
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
@@ -3630,6 +3871,9 @@ class SecretsMountInfluxdbArgs:
|
|
3630
3871
|
@property
|
3631
3872
|
@pulumi.getter
|
3632
3873
|
def name(self) -> pulumi.Input[str]:
|
3874
|
+
"""
|
3875
|
+
Name of the database connection.
|
3876
|
+
"""
|
3633
3877
|
return pulumi.get(self, "name")
|
3634
3878
|
|
3635
3879
|
@name.setter
|
@@ -3830,6 +4074,7 @@ class SecretsMountMongodbArgs:
|
|
3830
4074
|
username_template: Optional[pulumi.Input[str]] = None,
|
3831
4075
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
3832
4076
|
"""
|
4077
|
+
:param pulumi.Input[str] name: Name of the database connection.
|
3833
4078
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
3834
4079
|
connection.
|
3835
4080
|
:param pulumi.Input[str] connection_url: Specifies the Redshift DSN.
|
@@ -3879,6 +4124,9 @@ class SecretsMountMongodbArgs:
|
|
3879
4124
|
@property
|
3880
4125
|
@pulumi.getter
|
3881
4126
|
def name(self) -> pulumi.Input[str]:
|
4127
|
+
"""
|
4128
|
+
Name of the database connection.
|
4129
|
+
"""
|
3882
4130
|
return pulumi.get(self, "name")
|
3883
4131
|
|
3884
4132
|
@name.setter
|
@@ -4050,6 +4298,7 @@ class SecretsMountMongodbatlaArgs:
|
|
4050
4298
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
4051
4299
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
4052
4300
|
"""
|
4301
|
+
:param pulumi.Input[str] name: Name of the database connection.
|
4053
4302
|
:param pulumi.Input[str] private_key: The Private Programmatic API Key used to connect with MongoDB Atlas API.
|
4054
4303
|
:param pulumi.Input[str] project_id: The Project ID the Database User should be created within.
|
4055
4304
|
:param pulumi.Input[str] public_key: The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
|
@@ -4081,6 +4330,9 @@ class SecretsMountMongodbatlaArgs:
|
|
4081
4330
|
@property
|
4082
4331
|
@pulumi.getter
|
4083
4332
|
def name(self) -> pulumi.Input[str]:
|
4333
|
+
"""
|
4334
|
+
Name of the database connection.
|
4335
|
+
"""
|
4084
4336
|
return pulumi.get(self, "name")
|
4085
4337
|
|
4086
4338
|
@name.setter
|
@@ -4207,6 +4459,7 @@ class SecretsMountMssqlArgs:
|
|
4207
4459
|
username_template: Optional[pulumi.Input[str]] = None,
|
4208
4460
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
4209
4461
|
"""
|
4462
|
+
:param pulumi.Input[str] name: Name of the database connection.
|
4210
4463
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
4211
4464
|
connection.
|
4212
4465
|
:param pulumi.Input[str] connection_url: Specifies the Redshift DSN.
|
@@ -4264,6 +4517,9 @@ class SecretsMountMssqlArgs:
|
|
4264
4517
|
@property
|
4265
4518
|
@pulumi.getter
|
4266
4519
|
def name(self) -> pulumi.Input[str]:
|
4520
|
+
"""
|
4521
|
+
Name of the database connection.
|
4522
|
+
"""
|
4267
4523
|
return pulumi.get(self, "name")
|
4268
4524
|
|
4269
4525
|
@name.setter
|
@@ -4469,8 +4725,10 @@ class SecretsMountMysqlArgs:
|
|
4469
4725
|
username_template: Optional[pulumi.Input[str]] = None,
|
4470
4726
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
4471
4727
|
"""
|
4728
|
+
:param pulumi.Input[str] name: Name of the database connection.
|
4472
4729
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
4473
4730
|
connection.
|
4731
|
+
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4474
4732
|
:param pulumi.Input[str] connection_url: Specifies the Redshift DSN.
|
4475
4733
|
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4476
4734
|
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
@@ -4484,6 +4742,7 @@ class SecretsMountMysqlArgs:
|
|
4484
4742
|
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
4485
4743
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
4486
4744
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
4745
|
+
:param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
|
4487
4746
|
:param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
4488
4747
|
:param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
4489
4748
|
:param pulumi.Input[str] username: The root credential username used in the connection URL.
|
@@ -4528,6 +4787,9 @@ class SecretsMountMysqlArgs:
|
|
4528
4787
|
@property
|
4529
4788
|
@pulumi.getter
|
4530
4789
|
def name(self) -> pulumi.Input[str]:
|
4790
|
+
"""
|
4791
|
+
Name of the database connection.
|
4792
|
+
"""
|
4531
4793
|
return pulumi.get(self, "name")
|
4532
4794
|
|
4533
4795
|
@name.setter
|
@@ -4550,6 +4812,9 @@ class SecretsMountMysqlArgs:
|
|
4550
4812
|
@property
|
4551
4813
|
@pulumi.getter(name="authType")
|
4552
4814
|
def auth_type(self) -> Optional[pulumi.Input[str]]:
|
4815
|
+
"""
|
4816
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4817
|
+
"""
|
4553
4818
|
return pulumi.get(self, "auth_type")
|
4554
4819
|
|
4555
4820
|
@auth_type.setter
|
@@ -4660,6 +4925,9 @@ class SecretsMountMysqlArgs:
|
|
4660
4925
|
@property
|
4661
4926
|
@pulumi.getter(name="serviceAccountJson")
|
4662
4927
|
def service_account_json(self) -> Optional[pulumi.Input[str]]:
|
4928
|
+
"""
|
4929
|
+
A JSON encoded credential for use with IAM authorization
|
4930
|
+
"""
|
4663
4931
|
return pulumi.get(self, "service_account_json")
|
4664
4932
|
|
4665
4933
|
@service_account_json.setter
|
@@ -4733,6 +5001,7 @@ class SecretsMountMysqlAuroraArgs:
|
|
4733
5001
|
def __init__(__self__, *,
|
4734
5002
|
name: pulumi.Input[str],
|
4735
5003
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
5004
|
+
auth_type: Optional[pulumi.Input[str]] = None,
|
4736
5005
|
connection_url: Optional[pulumi.Input[str]] = None,
|
4737
5006
|
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
4738
5007
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
@@ -4741,12 +5010,17 @@ class SecretsMountMysqlAuroraArgs:
|
|
4741
5010
|
password: Optional[pulumi.Input[str]] = None,
|
4742
5011
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
4743
5012
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
5013
|
+
service_account_json: Optional[pulumi.Input[str]] = None,
|
5014
|
+
tls_ca: Optional[pulumi.Input[str]] = None,
|
5015
|
+
tls_certificate_key: Optional[pulumi.Input[str]] = None,
|
4744
5016
|
username: Optional[pulumi.Input[str]] = None,
|
4745
5017
|
username_template: Optional[pulumi.Input[str]] = None,
|
4746
5018
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
4747
5019
|
"""
|
5020
|
+
:param pulumi.Input[str] name: Name of the database connection.
|
4748
5021
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
4749
5022
|
connection.
|
5023
|
+
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4750
5024
|
:param pulumi.Input[str] connection_url: Specifies the Redshift DSN.
|
4751
5025
|
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4752
5026
|
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
@@ -4760,6 +5034,9 @@ class SecretsMountMysqlAuroraArgs:
|
|
4760
5034
|
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
4761
5035
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
4762
5036
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5037
|
+
:param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
|
5038
|
+
:param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
5039
|
+
:param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
4763
5040
|
:param pulumi.Input[str] username: The root credential username used in the connection URL.
|
4764
5041
|
:param pulumi.Input[str] username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
4765
5042
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
@@ -4768,6 +5045,8 @@ class SecretsMountMysqlAuroraArgs:
|
|
4768
5045
|
pulumi.set(__self__, "name", name)
|
4769
5046
|
if allowed_roles is not None:
|
4770
5047
|
pulumi.set(__self__, "allowed_roles", allowed_roles)
|
5048
|
+
if auth_type is not None:
|
5049
|
+
pulumi.set(__self__, "auth_type", auth_type)
|
4771
5050
|
if connection_url is not None:
|
4772
5051
|
pulumi.set(__self__, "connection_url", connection_url)
|
4773
5052
|
if data is not None:
|
@@ -4784,6 +5063,12 @@ class SecretsMountMysqlAuroraArgs:
|
|
4784
5063
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
4785
5064
|
if root_rotation_statements is not None:
|
4786
5065
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
5066
|
+
if service_account_json is not None:
|
5067
|
+
pulumi.set(__self__, "service_account_json", service_account_json)
|
5068
|
+
if tls_ca is not None:
|
5069
|
+
pulumi.set(__self__, "tls_ca", tls_ca)
|
5070
|
+
if tls_certificate_key is not None:
|
5071
|
+
pulumi.set(__self__, "tls_certificate_key", tls_certificate_key)
|
4787
5072
|
if username is not None:
|
4788
5073
|
pulumi.set(__self__, "username", username)
|
4789
5074
|
if username_template is not None:
|
@@ -4794,6 +5079,9 @@ class SecretsMountMysqlAuroraArgs:
|
|
4794
5079
|
@property
|
4795
5080
|
@pulumi.getter
|
4796
5081
|
def name(self) -> pulumi.Input[str]:
|
5082
|
+
"""
|
5083
|
+
Name of the database connection.
|
5084
|
+
"""
|
4797
5085
|
return pulumi.get(self, "name")
|
4798
5086
|
|
4799
5087
|
@name.setter
|
@@ -4813,6 +5101,18 @@ class SecretsMountMysqlAuroraArgs:
|
|
4813
5101
|
def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
4814
5102
|
pulumi.set(self, "allowed_roles", value)
|
4815
5103
|
|
5104
|
+
@property
|
5105
|
+
@pulumi.getter(name="authType")
|
5106
|
+
def auth_type(self) -> Optional[pulumi.Input[str]]:
|
5107
|
+
"""
|
5108
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5109
|
+
"""
|
5110
|
+
return pulumi.get(self, "auth_type")
|
5111
|
+
|
5112
|
+
@auth_type.setter
|
5113
|
+
def auth_type(self, value: Optional[pulumi.Input[str]]):
|
5114
|
+
pulumi.set(self, "auth_type", value)
|
5115
|
+
|
4816
5116
|
@property
|
4817
5117
|
@pulumi.getter(name="connectionUrl")
|
4818
5118
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
@@ -4914,6 +5214,42 @@ class SecretsMountMysqlAuroraArgs:
|
|
4914
5214
|
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
4915
5215
|
pulumi.set(self, "root_rotation_statements", value)
|
4916
5216
|
|
5217
|
+
@property
|
5218
|
+
@pulumi.getter(name="serviceAccountJson")
|
5219
|
+
def service_account_json(self) -> Optional[pulumi.Input[str]]:
|
5220
|
+
"""
|
5221
|
+
A JSON encoded credential for use with IAM authorization
|
5222
|
+
"""
|
5223
|
+
return pulumi.get(self, "service_account_json")
|
5224
|
+
|
5225
|
+
@service_account_json.setter
|
5226
|
+
def service_account_json(self, value: Optional[pulumi.Input[str]]):
|
5227
|
+
pulumi.set(self, "service_account_json", value)
|
5228
|
+
|
5229
|
+
@property
|
5230
|
+
@pulumi.getter(name="tlsCa")
|
5231
|
+
def tls_ca(self) -> Optional[pulumi.Input[str]]:
|
5232
|
+
"""
|
5233
|
+
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
5234
|
+
"""
|
5235
|
+
return pulumi.get(self, "tls_ca")
|
5236
|
+
|
5237
|
+
@tls_ca.setter
|
5238
|
+
def tls_ca(self, value: Optional[pulumi.Input[str]]):
|
5239
|
+
pulumi.set(self, "tls_ca", value)
|
5240
|
+
|
5241
|
+
@property
|
5242
|
+
@pulumi.getter(name="tlsCertificateKey")
|
5243
|
+
def tls_certificate_key(self) -> Optional[pulumi.Input[str]]:
|
5244
|
+
"""
|
5245
|
+
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
5246
|
+
"""
|
5247
|
+
return pulumi.get(self, "tls_certificate_key")
|
5248
|
+
|
5249
|
+
@tls_certificate_key.setter
|
5250
|
+
def tls_certificate_key(self, value: Optional[pulumi.Input[str]]):
|
5251
|
+
pulumi.set(self, "tls_certificate_key", value)
|
5252
|
+
|
4917
5253
|
@property
|
4918
5254
|
@pulumi.getter
|
4919
5255
|
def username(self) -> Optional[pulumi.Input[str]]:
|
@@ -4957,6 +5293,7 @@ class SecretsMountMysqlLegacyArgs:
|
|
4957
5293
|
def __init__(__self__, *,
|
4958
5294
|
name: pulumi.Input[str],
|
4959
5295
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
5296
|
+
auth_type: Optional[pulumi.Input[str]] = None,
|
4960
5297
|
connection_url: Optional[pulumi.Input[str]] = None,
|
4961
5298
|
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
4962
5299
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
@@ -4965,12 +5302,17 @@ class SecretsMountMysqlLegacyArgs:
|
|
4965
5302
|
password: Optional[pulumi.Input[str]] = None,
|
4966
5303
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
4967
5304
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
5305
|
+
service_account_json: Optional[pulumi.Input[str]] = None,
|
5306
|
+
tls_ca: Optional[pulumi.Input[str]] = None,
|
5307
|
+
tls_certificate_key: Optional[pulumi.Input[str]] = None,
|
4968
5308
|
username: Optional[pulumi.Input[str]] = None,
|
4969
5309
|
username_template: Optional[pulumi.Input[str]] = None,
|
4970
5310
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
4971
5311
|
"""
|
5312
|
+
:param pulumi.Input[str] name: Name of the database connection.
|
4972
5313
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
4973
5314
|
connection.
|
5315
|
+
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4974
5316
|
:param pulumi.Input[str] connection_url: Specifies the Redshift DSN.
|
4975
5317
|
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4976
5318
|
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
@@ -4984,6 +5326,9 @@ class SecretsMountMysqlLegacyArgs:
|
|
4984
5326
|
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
4985
5327
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
4986
5328
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5329
|
+
:param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
|
5330
|
+
:param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
5331
|
+
:param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
4987
5332
|
:param pulumi.Input[str] username: The root credential username used in the connection URL.
|
4988
5333
|
:param pulumi.Input[str] username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
4989
5334
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
@@ -4992,6 +5337,8 @@ class SecretsMountMysqlLegacyArgs:
|
|
4992
5337
|
pulumi.set(__self__, "name", name)
|
4993
5338
|
if allowed_roles is not None:
|
4994
5339
|
pulumi.set(__self__, "allowed_roles", allowed_roles)
|
5340
|
+
if auth_type is not None:
|
5341
|
+
pulumi.set(__self__, "auth_type", auth_type)
|
4995
5342
|
if connection_url is not None:
|
4996
5343
|
pulumi.set(__self__, "connection_url", connection_url)
|
4997
5344
|
if data is not None:
|
@@ -5008,6 +5355,12 @@ class SecretsMountMysqlLegacyArgs:
|
|
5008
5355
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
5009
5356
|
if root_rotation_statements is not None:
|
5010
5357
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
5358
|
+
if service_account_json is not None:
|
5359
|
+
pulumi.set(__self__, "service_account_json", service_account_json)
|
5360
|
+
if tls_ca is not None:
|
5361
|
+
pulumi.set(__self__, "tls_ca", tls_ca)
|
5362
|
+
if tls_certificate_key is not None:
|
5363
|
+
pulumi.set(__self__, "tls_certificate_key", tls_certificate_key)
|
5011
5364
|
if username is not None:
|
5012
5365
|
pulumi.set(__self__, "username", username)
|
5013
5366
|
if username_template is not None:
|
@@ -5018,6 +5371,9 @@ class SecretsMountMysqlLegacyArgs:
|
|
5018
5371
|
@property
|
5019
5372
|
@pulumi.getter
|
5020
5373
|
def name(self) -> pulumi.Input[str]:
|
5374
|
+
"""
|
5375
|
+
Name of the database connection.
|
5376
|
+
"""
|
5021
5377
|
return pulumi.get(self, "name")
|
5022
5378
|
|
5023
5379
|
@name.setter
|
@@ -5037,6 +5393,18 @@ class SecretsMountMysqlLegacyArgs:
|
|
5037
5393
|
def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
5038
5394
|
pulumi.set(self, "allowed_roles", value)
|
5039
5395
|
|
5396
|
+
@property
|
5397
|
+
@pulumi.getter(name="authType")
|
5398
|
+
def auth_type(self) -> Optional[pulumi.Input[str]]:
|
5399
|
+
"""
|
5400
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5401
|
+
"""
|
5402
|
+
return pulumi.get(self, "auth_type")
|
5403
|
+
|
5404
|
+
@auth_type.setter
|
5405
|
+
def auth_type(self, value: Optional[pulumi.Input[str]]):
|
5406
|
+
pulumi.set(self, "auth_type", value)
|
5407
|
+
|
5040
5408
|
@property
|
5041
5409
|
@pulumi.getter(name="connectionUrl")
|
5042
5410
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
@@ -5138,6 +5506,42 @@ class SecretsMountMysqlLegacyArgs:
|
|
5138
5506
|
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
5139
5507
|
pulumi.set(self, "root_rotation_statements", value)
|
5140
5508
|
|
5509
|
+
@property
|
5510
|
+
@pulumi.getter(name="serviceAccountJson")
|
5511
|
+
def service_account_json(self) -> Optional[pulumi.Input[str]]:
|
5512
|
+
"""
|
5513
|
+
A JSON encoded credential for use with IAM authorization
|
5514
|
+
"""
|
5515
|
+
return pulumi.get(self, "service_account_json")
|
5516
|
+
|
5517
|
+
@service_account_json.setter
|
5518
|
+
def service_account_json(self, value: Optional[pulumi.Input[str]]):
|
5519
|
+
pulumi.set(self, "service_account_json", value)
|
5520
|
+
|
5521
|
+
@property
|
5522
|
+
@pulumi.getter(name="tlsCa")
|
5523
|
+
def tls_ca(self) -> Optional[pulumi.Input[str]]:
|
5524
|
+
"""
|
5525
|
+
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
5526
|
+
"""
|
5527
|
+
return pulumi.get(self, "tls_ca")
|
5528
|
+
|
5529
|
+
@tls_ca.setter
|
5530
|
+
def tls_ca(self, value: Optional[pulumi.Input[str]]):
|
5531
|
+
pulumi.set(self, "tls_ca", value)
|
5532
|
+
|
5533
|
+
@property
|
5534
|
+
@pulumi.getter(name="tlsCertificateKey")
|
5535
|
+
def tls_certificate_key(self) -> Optional[pulumi.Input[str]]:
|
5536
|
+
"""
|
5537
|
+
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
5538
|
+
"""
|
5539
|
+
return pulumi.get(self, "tls_certificate_key")
|
5540
|
+
|
5541
|
+
@tls_certificate_key.setter
|
5542
|
+
def tls_certificate_key(self, value: Optional[pulumi.Input[str]]):
|
5543
|
+
pulumi.set(self, "tls_certificate_key", value)
|
5544
|
+
|
5141
5545
|
@property
|
5142
5546
|
@pulumi.getter
|
5143
5547
|
def username(self) -> Optional[pulumi.Input[str]]:
|
@@ -5181,6 +5585,7 @@ class SecretsMountMysqlRdArgs:
|
|
5181
5585
|
def __init__(__self__, *,
|
5182
5586
|
name: pulumi.Input[str],
|
5183
5587
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
5588
|
+
auth_type: Optional[pulumi.Input[str]] = None,
|
5184
5589
|
connection_url: Optional[pulumi.Input[str]] = None,
|
5185
5590
|
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
5186
5591
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
@@ -5189,12 +5594,17 @@ class SecretsMountMysqlRdArgs:
|
|
5189
5594
|
password: Optional[pulumi.Input[str]] = None,
|
5190
5595
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
5191
5596
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
5597
|
+
service_account_json: Optional[pulumi.Input[str]] = None,
|
5598
|
+
tls_ca: Optional[pulumi.Input[str]] = None,
|
5599
|
+
tls_certificate_key: Optional[pulumi.Input[str]] = None,
|
5192
5600
|
username: Optional[pulumi.Input[str]] = None,
|
5193
5601
|
username_template: Optional[pulumi.Input[str]] = None,
|
5194
5602
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
5195
5603
|
"""
|
5604
|
+
:param pulumi.Input[str] name: Name of the database connection.
|
5196
5605
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
5197
5606
|
connection.
|
5607
|
+
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5198
5608
|
:param pulumi.Input[str] connection_url: Specifies the Redshift DSN.
|
5199
5609
|
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
5200
5610
|
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
@@ -5208,6 +5618,9 @@ class SecretsMountMysqlRdArgs:
|
|
5208
5618
|
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
5209
5619
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
5210
5620
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5621
|
+
:param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
|
5622
|
+
:param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
5623
|
+
:param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
5211
5624
|
:param pulumi.Input[str] username: The root credential username used in the connection URL.
|
5212
5625
|
:param pulumi.Input[str] username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
5213
5626
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
@@ -5216,6 +5629,8 @@ class SecretsMountMysqlRdArgs:
|
|
5216
5629
|
pulumi.set(__self__, "name", name)
|
5217
5630
|
if allowed_roles is not None:
|
5218
5631
|
pulumi.set(__self__, "allowed_roles", allowed_roles)
|
5632
|
+
if auth_type is not None:
|
5633
|
+
pulumi.set(__self__, "auth_type", auth_type)
|
5219
5634
|
if connection_url is not None:
|
5220
5635
|
pulumi.set(__self__, "connection_url", connection_url)
|
5221
5636
|
if data is not None:
|
@@ -5232,6 +5647,12 @@ class SecretsMountMysqlRdArgs:
|
|
5232
5647
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
5233
5648
|
if root_rotation_statements is not None:
|
5234
5649
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
5650
|
+
if service_account_json is not None:
|
5651
|
+
pulumi.set(__self__, "service_account_json", service_account_json)
|
5652
|
+
if tls_ca is not None:
|
5653
|
+
pulumi.set(__self__, "tls_ca", tls_ca)
|
5654
|
+
if tls_certificate_key is not None:
|
5655
|
+
pulumi.set(__self__, "tls_certificate_key", tls_certificate_key)
|
5235
5656
|
if username is not None:
|
5236
5657
|
pulumi.set(__self__, "username", username)
|
5237
5658
|
if username_template is not None:
|
@@ -5242,6 +5663,9 @@ class SecretsMountMysqlRdArgs:
|
|
5242
5663
|
@property
|
5243
5664
|
@pulumi.getter
|
5244
5665
|
def name(self) -> pulumi.Input[str]:
|
5666
|
+
"""
|
5667
|
+
Name of the database connection.
|
5668
|
+
"""
|
5245
5669
|
return pulumi.get(self, "name")
|
5246
5670
|
|
5247
5671
|
@name.setter
|
@@ -5261,6 +5685,18 @@ class SecretsMountMysqlRdArgs:
|
|
5261
5685
|
def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
5262
5686
|
pulumi.set(self, "allowed_roles", value)
|
5263
5687
|
|
5688
|
+
@property
|
5689
|
+
@pulumi.getter(name="authType")
|
5690
|
+
def auth_type(self) -> Optional[pulumi.Input[str]]:
|
5691
|
+
"""
|
5692
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5693
|
+
"""
|
5694
|
+
return pulumi.get(self, "auth_type")
|
5695
|
+
|
5696
|
+
@auth_type.setter
|
5697
|
+
def auth_type(self, value: Optional[pulumi.Input[str]]):
|
5698
|
+
pulumi.set(self, "auth_type", value)
|
5699
|
+
|
5264
5700
|
@property
|
5265
5701
|
@pulumi.getter(name="connectionUrl")
|
5266
5702
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
@@ -5362,6 +5798,42 @@ class SecretsMountMysqlRdArgs:
|
|
5362
5798
|
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
5363
5799
|
pulumi.set(self, "root_rotation_statements", value)
|
5364
5800
|
|
5801
|
+
@property
|
5802
|
+
@pulumi.getter(name="serviceAccountJson")
|
5803
|
+
def service_account_json(self) -> Optional[pulumi.Input[str]]:
|
5804
|
+
"""
|
5805
|
+
A JSON encoded credential for use with IAM authorization
|
5806
|
+
"""
|
5807
|
+
return pulumi.get(self, "service_account_json")
|
5808
|
+
|
5809
|
+
@service_account_json.setter
|
5810
|
+
def service_account_json(self, value: Optional[pulumi.Input[str]]):
|
5811
|
+
pulumi.set(self, "service_account_json", value)
|
5812
|
+
|
5813
|
+
@property
|
5814
|
+
@pulumi.getter(name="tlsCa")
|
5815
|
+
def tls_ca(self) -> Optional[pulumi.Input[str]]:
|
5816
|
+
"""
|
5817
|
+
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
5818
|
+
"""
|
5819
|
+
return pulumi.get(self, "tls_ca")
|
5820
|
+
|
5821
|
+
@tls_ca.setter
|
5822
|
+
def tls_ca(self, value: Optional[pulumi.Input[str]]):
|
5823
|
+
pulumi.set(self, "tls_ca", value)
|
5824
|
+
|
5825
|
+
@property
|
5826
|
+
@pulumi.getter(name="tlsCertificateKey")
|
5827
|
+
def tls_certificate_key(self) -> Optional[pulumi.Input[str]]:
|
5828
|
+
"""
|
5829
|
+
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
5830
|
+
"""
|
5831
|
+
return pulumi.get(self, "tls_certificate_key")
|
5832
|
+
|
5833
|
+
@tls_certificate_key.setter
|
5834
|
+
def tls_certificate_key(self, value: Optional[pulumi.Input[str]]):
|
5835
|
+
pulumi.set(self, "tls_certificate_key", value)
|
5836
|
+
|
5365
5837
|
@property
|
5366
5838
|
@pulumi.getter
|
5367
5839
|
def username(self) -> Optional[pulumi.Input[str]]:
|
@@ -5407,16 +5879,19 @@ class SecretsMountOracleArgs:
|
|
5407
5879
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
5408
5880
|
connection_url: Optional[pulumi.Input[str]] = None,
|
5409
5881
|
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
5882
|
+
disconnect_sessions: Optional[pulumi.Input[bool]] = None,
|
5410
5883
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
5411
5884
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
5412
5885
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
5413
5886
|
password: Optional[pulumi.Input[str]] = None,
|
5414
5887
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
5415
5888
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
5889
|
+
split_statements: Optional[pulumi.Input[bool]] = None,
|
5416
5890
|
username: Optional[pulumi.Input[str]] = None,
|
5417
5891
|
username_template: Optional[pulumi.Input[str]] = None,
|
5418
5892
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
5419
5893
|
"""
|
5894
|
+
:param pulumi.Input[str] name: Name of the database connection.
|
5420
5895
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
5421
5896
|
connection.
|
5422
5897
|
:param pulumi.Input[str] connection_url: Specifies the Redshift DSN.
|
@@ -5424,6 +5899,7 @@ class SecretsMountOracleArgs:
|
|
5424
5899
|
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5425
5900
|
|
5426
5901
|
Supported list of database secrets engines that can be configured:
|
5902
|
+
:param pulumi.Input[bool] disconnect_sessions: Set to true to disconnect any open sessions prior to running the revocation statements.
|
5427
5903
|
:param pulumi.Input[int] max_connection_lifetime: The maximum amount of time a connection may be reused.
|
5428
5904
|
:param pulumi.Input[int] max_idle_connections: The maximum number of idle connections to
|
5429
5905
|
the database.
|
@@ -5432,6 +5908,7 @@ class SecretsMountOracleArgs:
|
|
5432
5908
|
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
5433
5909
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
5434
5910
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5911
|
+
:param pulumi.Input[bool] split_statements: Set to true in order to split statements after semi-colons.
|
5435
5912
|
:param pulumi.Input[str] username: The root credential username used in the connection URL.
|
5436
5913
|
:param pulumi.Input[str] username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
5437
5914
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
@@ -5444,6 +5921,8 @@ class SecretsMountOracleArgs:
|
|
5444
5921
|
pulumi.set(__self__, "connection_url", connection_url)
|
5445
5922
|
if data is not None:
|
5446
5923
|
pulumi.set(__self__, "data", data)
|
5924
|
+
if disconnect_sessions is not None:
|
5925
|
+
pulumi.set(__self__, "disconnect_sessions", disconnect_sessions)
|
5447
5926
|
if max_connection_lifetime is not None:
|
5448
5927
|
pulumi.set(__self__, "max_connection_lifetime", max_connection_lifetime)
|
5449
5928
|
if max_idle_connections is not None:
|
@@ -5456,6 +5935,8 @@ class SecretsMountOracleArgs:
|
|
5456
5935
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
5457
5936
|
if root_rotation_statements is not None:
|
5458
5937
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
5938
|
+
if split_statements is not None:
|
5939
|
+
pulumi.set(__self__, "split_statements", split_statements)
|
5459
5940
|
if username is not None:
|
5460
5941
|
pulumi.set(__self__, "username", username)
|
5461
5942
|
if username_template is not None:
|
@@ -5466,6 +5947,9 @@ class SecretsMountOracleArgs:
|
|
5466
5947
|
@property
|
5467
5948
|
@pulumi.getter
|
5468
5949
|
def name(self) -> pulumi.Input[str]:
|
5950
|
+
"""
|
5951
|
+
Name of the database connection.
|
5952
|
+
"""
|
5469
5953
|
return pulumi.get(self, "name")
|
5470
5954
|
|
5471
5955
|
@name.setter
|
@@ -5512,6 +5996,18 @@ class SecretsMountOracleArgs:
|
|
5512
5996
|
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
5513
5997
|
pulumi.set(self, "data", value)
|
5514
5998
|
|
5999
|
+
@property
|
6000
|
+
@pulumi.getter(name="disconnectSessions")
|
6001
|
+
def disconnect_sessions(self) -> Optional[pulumi.Input[bool]]:
|
6002
|
+
"""
|
6003
|
+
Set to true to disconnect any open sessions prior to running the revocation statements.
|
6004
|
+
"""
|
6005
|
+
return pulumi.get(self, "disconnect_sessions")
|
6006
|
+
|
6007
|
+
@disconnect_sessions.setter
|
6008
|
+
def disconnect_sessions(self, value: Optional[pulumi.Input[bool]]):
|
6009
|
+
pulumi.set(self, "disconnect_sessions", value)
|
6010
|
+
|
5515
6011
|
@property
|
5516
6012
|
@pulumi.getter(name="maxConnectionLifetime")
|
5517
6013
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
@@ -5586,6 +6082,18 @@ class SecretsMountOracleArgs:
|
|
5586
6082
|
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
5587
6083
|
pulumi.set(self, "root_rotation_statements", value)
|
5588
6084
|
|
6085
|
+
@property
|
6086
|
+
@pulumi.getter(name="splitStatements")
|
6087
|
+
def split_statements(self) -> Optional[pulumi.Input[bool]]:
|
6088
|
+
"""
|
6089
|
+
Set to true in order to split statements after semi-colons.
|
6090
|
+
"""
|
6091
|
+
return pulumi.get(self, "split_statements")
|
6092
|
+
|
6093
|
+
@split_statements.setter
|
6094
|
+
def split_statements(self, value: Optional[pulumi.Input[bool]]):
|
6095
|
+
pulumi.set(self, "split_statements", value)
|
6096
|
+
|
5589
6097
|
@property
|
5590
6098
|
@pulumi.getter
|
5591
6099
|
def username(self) -> Optional[pulumi.Input[str]]:
|
@@ -5644,8 +6152,10 @@ class SecretsMountPostgresqlArgs:
|
|
5644
6152
|
username_template: Optional[pulumi.Input[str]] = None,
|
5645
6153
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
5646
6154
|
"""
|
6155
|
+
:param pulumi.Input[str] name: Name of the database connection.
|
5647
6156
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
5648
6157
|
connection.
|
6158
|
+
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5649
6159
|
:param pulumi.Input[str] connection_url: Specifies the Redshift DSN.
|
5650
6160
|
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
5651
6161
|
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
@@ -5660,6 +6170,7 @@ class SecretsMountPostgresqlArgs:
|
|
5660
6170
|
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
5661
6171
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
5662
6172
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
6173
|
+
:param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
|
5663
6174
|
:param pulumi.Input[str] username: The root credential username used in the connection URL.
|
5664
6175
|
:param pulumi.Input[str] username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
5665
6176
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
@@ -5700,6 +6211,9 @@ class SecretsMountPostgresqlArgs:
|
|
5700
6211
|
@property
|
5701
6212
|
@pulumi.getter
|
5702
6213
|
def name(self) -> pulumi.Input[str]:
|
6214
|
+
"""
|
6215
|
+
Name of the database connection.
|
6216
|
+
"""
|
5703
6217
|
return pulumi.get(self, "name")
|
5704
6218
|
|
5705
6219
|
@name.setter
|
@@ -5722,6 +6236,9 @@ class SecretsMountPostgresqlArgs:
|
|
5722
6236
|
@property
|
5723
6237
|
@pulumi.getter(name="authType")
|
5724
6238
|
def auth_type(self) -> Optional[pulumi.Input[str]]:
|
6239
|
+
"""
|
6240
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
6241
|
+
"""
|
5725
6242
|
return pulumi.get(self, "auth_type")
|
5726
6243
|
|
5727
6244
|
@auth_type.setter
|
@@ -5844,6 +6361,9 @@ class SecretsMountPostgresqlArgs:
|
|
5844
6361
|
@property
|
5845
6362
|
@pulumi.getter(name="serviceAccountJson")
|
5846
6363
|
def service_account_json(self) -> Optional[pulumi.Input[str]]:
|
6364
|
+
"""
|
6365
|
+
A JSON encoded credential for use with IAM authorization
|
6366
|
+
"""
|
5847
6367
|
return pulumi.get(self, "service_account_json")
|
5848
6368
|
|
5849
6369
|
@service_account_json.setter
|
@@ -5906,6 +6426,7 @@ class SecretsMountRediArgs:
|
|
5906
6426
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
5907
6427
|
"""
|
5908
6428
|
:param pulumi.Input[str] host: The host to connect to.
|
6429
|
+
:param pulumi.Input[str] name: Name of the database connection.
|
5909
6430
|
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
5910
6431
|
:param pulumi.Input[str] username: The root credential username used in the connection URL.
|
5911
6432
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
@@ -5962,6 +6483,9 @@ class SecretsMountRediArgs:
|
|
5962
6483
|
@property
|
5963
6484
|
@pulumi.getter
|
5964
6485
|
def name(self) -> pulumi.Input[str]:
|
6486
|
+
"""
|
6487
|
+
Name of the database connection.
|
6488
|
+
"""
|
5965
6489
|
return pulumi.get(self, "name")
|
5966
6490
|
|
5967
6491
|
@name.setter
|
@@ -6121,6 +6645,7 @@ class SecretsMountRedisElasticachArgs:
|
|
6121
6645
|
username: Optional[pulumi.Input[str]] = None,
|
6122
6646
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
6123
6647
|
"""
|
6648
|
+
:param pulumi.Input[str] name: Name of the database connection.
|
6124
6649
|
:param pulumi.Input[str] url: The URL for Elasticsearch's API. https requires certificate
|
6125
6650
|
by trusted CA if used.
|
6126
6651
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
@@ -6159,6 +6684,9 @@ class SecretsMountRedisElasticachArgs:
|
|
6159
6684
|
@property
|
6160
6685
|
@pulumi.getter
|
6161
6686
|
def name(self) -> pulumi.Input[str]:
|
6687
|
+
"""
|
6688
|
+
Name of the database connection.
|
6689
|
+
"""
|
6162
6690
|
return pulumi.get(self, "name")
|
6163
6691
|
|
6164
6692
|
@name.setter
|
@@ -6298,6 +6826,7 @@ class SecretsMountRedshiftArgs:
|
|
6298
6826
|
username_template: Optional[pulumi.Input[str]] = None,
|
6299
6827
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
6300
6828
|
"""
|
6829
|
+
:param pulumi.Input[str] name: Name of the database connection.
|
6301
6830
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
6302
6831
|
connection.
|
6303
6832
|
:param pulumi.Input[str] connection_url: Specifies the Redshift DSN.
|
@@ -6350,6 +6879,9 @@ class SecretsMountRedshiftArgs:
|
|
6350
6879
|
@property
|
6351
6880
|
@pulumi.getter
|
6352
6881
|
def name(self) -> pulumi.Input[str]:
|
6882
|
+
"""
|
6883
|
+
Name of the database connection.
|
6884
|
+
"""
|
6353
6885
|
return pulumi.get(self, "name")
|
6354
6886
|
|
6355
6887
|
@name.setter
|
@@ -6537,6 +7069,7 @@ class SecretsMountSnowflakeArgs:
|
|
6537
7069
|
username_template: Optional[pulumi.Input[str]] = None,
|
6538
7070
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
6539
7071
|
"""
|
7072
|
+
:param pulumi.Input[str] name: Name of the database connection.
|
6540
7073
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
6541
7074
|
connection.
|
6542
7075
|
:param pulumi.Input[str] connection_url: Specifies the Redshift DSN.
|
@@ -6586,6 +7119,9 @@ class SecretsMountSnowflakeArgs:
|
|
6586
7119
|
@property
|
6587
7120
|
@pulumi.getter
|
6588
7121
|
def name(self) -> pulumi.Input[str]:
|
7122
|
+
"""
|
7123
|
+
Name of the database connection.
|
7124
|
+
"""
|
6589
7125
|
return pulumi.get(self, "name")
|
6590
7126
|
|
6591
7127
|
@name.setter
|