pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +76 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +26 -9
- pulumi_vault/ad/secret_backend.py +16 -142
- pulumi_vault/ad/secret_library.py +16 -9
- pulumi_vault/ad/secret_role.py +14 -9
- pulumi_vault/alicloud/auth_backend_role.py +76 -190
- pulumi_vault/approle/auth_backend_login.py +12 -7
- pulumi_vault/approle/auth_backend_role.py +77 -191
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
- pulumi_vault/audit.py +30 -21
- pulumi_vault/audit_request_header.py +11 -2
- pulumi_vault/auth_backend.py +66 -14
- pulumi_vault/aws/auth_backend_cert.py +18 -9
- pulumi_vault/aws/auth_backend_client.py +267 -22
- pulumi_vault/aws/auth_backend_config_identity.py +14 -9
- pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +77 -191
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
- pulumi_vault/aws/auth_backend_sts_role.py +61 -9
- pulumi_vault/aws/get_access_credentials.py +38 -9
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +218 -9
- pulumi_vault/aws/secret_backend_role.py +185 -9
- pulumi_vault/aws/secret_backend_static_role.py +20 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +153 -15
- pulumi_vault/azure/auth_backend_role.py +77 -191
- pulumi_vault/azure/backend.py +227 -21
- pulumi_vault/azure/backend_role.py +42 -37
- pulumi_vault/azure/get_access_credentials.py +41 -7
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -267
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +28 -19
- pulumi_vault/consul/secret_backend_role.py +18 -78
- pulumi_vault/database/_inputs.py +2808 -879
- pulumi_vault/database/outputs.py +749 -838
- pulumi_vault/database/secret_backend_connection.py +119 -112
- pulumi_vault/database/secret_backend_role.py +31 -22
- pulumi_vault/database/secret_backend_static_role.py +87 -13
- pulumi_vault/database/secrets_mount.py +427 -136
- pulumi_vault/egp_policy.py +16 -11
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +250 -33
- pulumi_vault/gcp/auth_backend_role.py +77 -269
- pulumi_vault/gcp/get_auth_backend_role.py +43 -5
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -12
- pulumi_vault/gcp/secret_impersonated_account.py +76 -15
- pulumi_vault/gcp/secret_roleset.py +31 -24
- pulumi_vault/gcp/secret_static_account.py +39 -32
- pulumi_vault/generic/endpoint.py +24 -17
- pulumi_vault/generic/get_secret.py +64 -8
- pulumi_vault/generic/secret.py +21 -16
- pulumi_vault/get_auth_backend.py +24 -7
- pulumi_vault/get_auth_backends.py +51 -9
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -11
- pulumi_vault/get_policy_document.py +34 -19
- pulumi_vault/get_raft_autopilot_state.py +29 -10
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +19 -14
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +16 -11
- pulumi_vault/github/user.py +16 -11
- pulumi_vault/identity/entity.py +20 -13
- pulumi_vault/identity/entity_alias.py +20 -13
- pulumi_vault/identity/entity_policies.py +28 -11
- pulumi_vault/identity/get_entity.py +42 -10
- pulumi_vault/identity/get_group.py +47 -9
- pulumi_vault/identity/get_oidc_client_creds.py +21 -7
- pulumi_vault/identity/get_oidc_openid_config.py +39 -9
- pulumi_vault/identity/get_oidc_public_keys.py +29 -10
- pulumi_vault/identity/group.py +58 -39
- pulumi_vault/identity/group_alias.py +16 -9
- pulumi_vault/identity/group_member_entity_ids.py +28 -66
- pulumi_vault/identity/group_member_group_ids.py +40 -19
- pulumi_vault/identity/group_policies.py +20 -7
- pulumi_vault/identity/mfa_duo.py +11 -6
- pulumi_vault/identity/mfa_login_enforcement.py +15 -6
- pulumi_vault/identity/mfa_okta.py +11 -6
- pulumi_vault/identity/mfa_pingid.py +7 -2
- pulumi_vault/identity/mfa_totp.py +7 -2
- pulumi_vault/identity/oidc.py +12 -7
- pulumi_vault/identity/oidc_assignment.py +24 -11
- pulumi_vault/identity/oidc_client.py +36 -23
- pulumi_vault/identity/oidc_key.py +30 -17
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
- pulumi_vault/identity/oidc_provider.py +36 -21
- pulumi_vault/identity/oidc_role.py +42 -21
- pulumi_vault/identity/oidc_scope.py +20 -13
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +45 -40
- pulumi_vault/jwt/auth_backend_role.py +133 -254
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +24 -19
- pulumi_vault/kmip/secret_role.py +14 -9
- pulumi_vault/kmip/secret_scope.py +14 -9
- pulumi_vault/kubernetes/auth_backend_config.py +57 -5
- pulumi_vault/kubernetes/auth_backend_role.py +70 -177
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -11
- pulumi_vault/kubernetes/secret_backend.py +316 -27
- pulumi_vault/kubernetes/secret_backend_role.py +137 -46
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +25 -8
- pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
- pulumi_vault/kv/get_secret_v2.py +85 -9
- pulumi_vault/kv/get_secrets_list.py +24 -11
- pulumi_vault/kv/get_secrets_list_v2.py +37 -15
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +23 -16
- pulumi_vault/kv/secret_backend_v2.py +20 -11
- pulumi_vault/kv/secret_v2.py +59 -50
- pulumi_vault/ldap/auth_backend.py +127 -166
- pulumi_vault/ldap/auth_backend_group.py +14 -9
- pulumi_vault/ldap/auth_backend_user.py +14 -9
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +354 -82
- pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
- pulumi_vault/ldap/secret_backend_library_set.py +16 -9
- pulumi_vault/ldap/secret_backend_static_role.py +73 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +29 -57
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +18 -11
- pulumi_vault/mfa_okta.py +18 -11
- pulumi_vault/mfa_pingid.py +18 -11
- pulumi_vault/mfa_totp.py +24 -17
- pulumi_vault/mongodbatlas/secret_backend.py +20 -15
- pulumi_vault/mongodbatlas/secret_role.py +47 -38
- pulumi_vault/mount.py +391 -51
- pulumi_vault/namespace.py +68 -83
- pulumi_vault/nomad_secret_backend.py +18 -13
- pulumi_vault/nomad_secret_role.py +14 -9
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +485 -39
- pulumi_vault/okta/auth_backend_group.py +14 -9
- pulumi_vault/okta/auth_backend_user.py +14 -9
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +20 -13
- pulumi_vault/pkisecret/__init__.py +7 -0
- pulumi_vault/pkisecret/_inputs.py +115 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +549 -0
- pulumi_vault/pkisecret/backend_config_acme.py +642 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +525 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +209 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
- pulumi_vault/pkisecret/get_backend_key.py +24 -9
- pulumi_vault/pkisecret/get_backend_keys.py +21 -8
- pulumi_vault/pkisecret/outputs.py +109 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
- pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
- pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
- pulumi_vault/pkisecret/secret_backend_key.py +14 -9
- pulumi_vault/pkisecret/secret_backend_role.py +68 -14
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +14 -9
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +60 -6
- pulumi_vault/quota_rate_limit.py +56 -2
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +18 -13
- pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
- pulumi_vault/raft_autopilot.py +14 -9
- pulumi_vault/raft_snapshot_agent_config.py +129 -224
- pulumi_vault/rgp_policy.py +14 -9
- pulumi_vault/saml/auth_backend.py +22 -17
- pulumi_vault/saml/auth_backend_role.py +92 -197
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -71
- pulumi_vault/secrets/sync_aws_destination.py +242 -27
- pulumi_vault/secrets/sync_azure_destination.py +92 -31
- pulumi_vault/secrets/sync_config.py +9 -4
- pulumi_vault/secrets/sync_gcp_destination.py +158 -25
- pulumi_vault/secrets/sync_gh_destination.py +189 -13
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +74 -13
- pulumi_vault/ssh/_inputs.py +28 -28
- pulumi_vault/ssh/outputs.py +11 -28
- pulumi_vault/ssh/secret_backend_ca.py +108 -9
- pulumi_vault/ssh/secret_backend_role.py +112 -118
- pulumi_vault/terraformcloud/secret_backend.py +7 -54
- pulumi_vault/terraformcloud/secret_creds.py +14 -20
- pulumi_vault/terraformcloud/secret_role.py +16 -74
- pulumi_vault/token.py +28 -23
- pulumi_vault/tokenauth/auth_backend_role.py +78 -199
- pulumi_vault/transform/alphabet.py +16 -9
- pulumi_vault/transform/get_decode.py +45 -17
- pulumi_vault/transform/get_encode.py +45 -17
- pulumi_vault/transform/role.py +16 -9
- pulumi_vault/transform/template.py +30 -21
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -21
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +27 -93
- pulumi_vault/transit/secret_cache_config.py +12 -7
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0.dist-info/RECORD +260 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/top_level.txt +0 -0
pulumi_vault/database/outputs.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -63,6 +68,8 @@ class SecretBackendConnectionCassandra(dict):
|
|
63
68
|
suggest = "pem_json"
|
64
69
|
elif key == "protocolVersion":
|
65
70
|
suggest = "protocol_version"
|
71
|
+
elif key == "skipVerification":
|
72
|
+
suggest = "skip_verification"
|
66
73
|
|
67
74
|
if suggest:
|
68
75
|
pulumi.log.warn(f"Key '{key}' not found in SecretBackendConnectionCassandra. Access the value via the '{suggest}' property getter instead.")
|
@@ -84,23 +91,21 @@ class SecretBackendConnectionCassandra(dict):
|
|
84
91
|
pem_json: Optional[str] = None,
|
85
92
|
port: Optional[int] = None,
|
86
93
|
protocol_version: Optional[int] = None,
|
94
|
+
skip_verification: Optional[bool] = None,
|
87
95
|
tls: Optional[bool] = None,
|
88
96
|
username: Optional[str] = None):
|
89
97
|
"""
|
90
|
-
:param int connect_timeout: The number of seconds to use as a connection
|
91
|
-
|
92
|
-
:param
|
93
|
-
:param
|
94
|
-
|
95
|
-
:param str
|
96
|
-
:param
|
97
|
-
chain.
|
98
|
-
:param str pem_json: A JSON structure configuring the certificate chain.
|
99
|
-
:param int port: The default port to connect to if no port is specified as
|
100
|
-
part of the host.
|
98
|
+
:param int connect_timeout: The number of seconds to use as a connection timeout.
|
99
|
+
:param Sequence[str] hosts: Cassandra hosts to connect to.
|
100
|
+
:param bool insecure_tls: Whether to skip verification of the server certificate when using TLS.
|
101
|
+
:param str password: The password to use when authenticating with Cassandra.
|
102
|
+
:param str pem_bundle: Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
103
|
+
:param str pem_json: Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
104
|
+
:param int port: The transport port to use to connect to Cassandra.
|
101
105
|
:param int protocol_version: The CQL protocol version to use.
|
106
|
+
:param bool skip_verification: Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
102
107
|
:param bool tls: Whether to use TLS when connecting to Cassandra.
|
103
|
-
:param str username: The username to
|
108
|
+
:param str username: The username to use when authenticating with Cassandra.
|
104
109
|
"""
|
105
110
|
if connect_timeout is not None:
|
106
111
|
pulumi.set(__self__, "connect_timeout", connect_timeout)
|
@@ -118,6 +123,8 @@ class SecretBackendConnectionCassandra(dict):
|
|
118
123
|
pulumi.set(__self__, "port", port)
|
119
124
|
if protocol_version is not None:
|
120
125
|
pulumi.set(__self__, "protocol_version", protocol_version)
|
126
|
+
if skip_verification is not None:
|
127
|
+
pulumi.set(__self__, "skip_verification", skip_verification)
|
121
128
|
if tls is not None:
|
122
129
|
pulumi.set(__self__, "tls", tls)
|
123
130
|
if username is not None:
|
@@ -127,8 +134,7 @@ class SecretBackendConnectionCassandra(dict):
|
|
127
134
|
@pulumi.getter(name="connectTimeout")
|
128
135
|
def connect_timeout(self) -> Optional[int]:
|
129
136
|
"""
|
130
|
-
The number of seconds to use as a connection
|
131
|
-
timeout.
|
137
|
+
The number of seconds to use as a connection timeout.
|
132
138
|
"""
|
133
139
|
return pulumi.get(self, "connect_timeout")
|
134
140
|
|
@@ -136,7 +142,7 @@ class SecretBackendConnectionCassandra(dict):
|
|
136
142
|
@pulumi.getter
|
137
143
|
def hosts(self) -> Optional[Sequence[str]]:
|
138
144
|
"""
|
139
|
-
|
145
|
+
Cassandra hosts to connect to.
|
140
146
|
"""
|
141
147
|
return pulumi.get(self, "hosts")
|
142
148
|
|
@@ -144,8 +150,7 @@ class SecretBackendConnectionCassandra(dict):
|
|
144
150
|
@pulumi.getter(name="insecureTls")
|
145
151
|
def insecure_tls(self) -> Optional[bool]:
|
146
152
|
"""
|
147
|
-
Whether to skip verification of the server
|
148
|
-
certificate when using TLS.
|
153
|
+
Whether to skip verification of the server certificate when using TLS.
|
149
154
|
"""
|
150
155
|
return pulumi.get(self, "insecure_tls")
|
151
156
|
|
@@ -153,7 +158,7 @@ class SecretBackendConnectionCassandra(dict):
|
|
153
158
|
@pulumi.getter
|
154
159
|
def password(self) -> Optional[str]:
|
155
160
|
"""
|
156
|
-
The password to
|
161
|
+
The password to use when authenticating with Cassandra.
|
157
162
|
"""
|
158
163
|
return pulumi.get(self, "password")
|
159
164
|
|
@@ -161,8 +166,7 @@ class SecretBackendConnectionCassandra(dict):
|
|
161
166
|
@pulumi.getter(name="pemBundle")
|
162
167
|
def pem_bundle(self) -> Optional[str]:
|
163
168
|
"""
|
164
|
-
Concatenated PEM blocks
|
165
|
-
chain.
|
169
|
+
Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
166
170
|
"""
|
167
171
|
return pulumi.get(self, "pem_bundle")
|
168
172
|
|
@@ -170,7 +174,7 @@ class SecretBackendConnectionCassandra(dict):
|
|
170
174
|
@pulumi.getter(name="pemJson")
|
171
175
|
def pem_json(self) -> Optional[str]:
|
172
176
|
"""
|
173
|
-
|
177
|
+
Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
174
178
|
"""
|
175
179
|
return pulumi.get(self, "pem_json")
|
176
180
|
|
@@ -178,8 +182,7 @@ class SecretBackendConnectionCassandra(dict):
|
|
178
182
|
@pulumi.getter
|
179
183
|
def port(self) -> Optional[int]:
|
180
184
|
"""
|
181
|
-
The
|
182
|
-
part of the host.
|
185
|
+
The transport port to use to connect to Cassandra.
|
183
186
|
"""
|
184
187
|
return pulumi.get(self, "port")
|
185
188
|
|
@@ -191,6 +194,14 @@ class SecretBackendConnectionCassandra(dict):
|
|
191
194
|
"""
|
192
195
|
return pulumi.get(self, "protocol_version")
|
193
196
|
|
197
|
+
@property
|
198
|
+
@pulumi.getter(name="skipVerification")
|
199
|
+
def skip_verification(self) -> Optional[bool]:
|
200
|
+
"""
|
201
|
+
Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
202
|
+
"""
|
203
|
+
return pulumi.get(self, "skip_verification")
|
204
|
+
|
194
205
|
@property
|
195
206
|
@pulumi.getter
|
196
207
|
def tls(self) -> Optional[bool]:
|
@@ -203,7 +214,7 @@ class SecretBackendConnectionCassandra(dict):
|
|
203
214
|
@pulumi.getter
|
204
215
|
def username(self) -> Optional[str]:
|
205
216
|
"""
|
206
|
-
The username to
|
217
|
+
The username to use when authenticating with Cassandra.
|
207
218
|
"""
|
208
219
|
return pulumi.get(self, "username")
|
209
220
|
|
@@ -243,14 +254,13 @@ class SecretBackendConnectionCouchbase(dict):
|
|
243
254
|
tls: Optional[bool] = None,
|
244
255
|
username_template: Optional[str] = None):
|
245
256
|
"""
|
246
|
-
:param Sequence[str] hosts:
|
247
|
-
:param str password:
|
248
|
-
:param str username:
|
257
|
+
:param Sequence[str] hosts: A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
|
258
|
+
:param str password: Specifies the password corresponding to the given username.
|
259
|
+
:param str username: Specifies the username for Vault to use.
|
249
260
|
:param str base64_pem: Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
|
250
261
|
:param str bucket_name: Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
|
251
|
-
:param bool insecure_tls:
|
252
|
-
|
253
|
-
:param bool tls: Whether to use TLS when connecting to Cassandra.
|
262
|
+
:param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
|
263
|
+
:param bool tls: Specifies whether to use TLS when connecting to Couchbase.
|
254
264
|
:param str username_template: Template describing how dynamic usernames are generated.
|
255
265
|
"""
|
256
266
|
pulumi.set(__self__, "hosts", hosts)
|
@@ -271,7 +281,7 @@ class SecretBackendConnectionCouchbase(dict):
|
|
271
281
|
@pulumi.getter
|
272
282
|
def hosts(self) -> Sequence[str]:
|
273
283
|
"""
|
274
|
-
|
284
|
+
A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
|
275
285
|
"""
|
276
286
|
return pulumi.get(self, "hosts")
|
277
287
|
|
@@ -279,7 +289,7 @@ class SecretBackendConnectionCouchbase(dict):
|
|
279
289
|
@pulumi.getter
|
280
290
|
def password(self) -> str:
|
281
291
|
"""
|
282
|
-
|
292
|
+
Specifies the password corresponding to the given username.
|
283
293
|
"""
|
284
294
|
return pulumi.get(self, "password")
|
285
295
|
|
@@ -287,7 +297,7 @@ class SecretBackendConnectionCouchbase(dict):
|
|
287
297
|
@pulumi.getter
|
288
298
|
def username(self) -> str:
|
289
299
|
"""
|
290
|
-
|
300
|
+
Specifies the username for Vault to use.
|
291
301
|
"""
|
292
302
|
return pulumi.get(self, "username")
|
293
303
|
|
@@ -311,8 +321,7 @@ class SecretBackendConnectionCouchbase(dict):
|
|
311
321
|
@pulumi.getter(name="insecureTls")
|
312
322
|
def insecure_tls(self) -> Optional[bool]:
|
313
323
|
"""
|
314
|
-
|
315
|
-
certificate when using TLS.
|
324
|
+
Specifies whether to skip verification of the server certificate when using TLS.
|
316
325
|
"""
|
317
326
|
return pulumi.get(self, "insecure_tls")
|
318
327
|
|
@@ -320,7 +329,7 @@ class SecretBackendConnectionCouchbase(dict):
|
|
320
329
|
@pulumi.getter
|
321
330
|
def tls(self) -> Optional[bool]:
|
322
331
|
"""
|
323
|
-
|
332
|
+
Specifies whether to use TLS when connecting to Couchbase.
|
324
333
|
"""
|
325
334
|
return pulumi.get(self, "tls")
|
326
335
|
|
@@ -374,16 +383,15 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
374
383
|
tls_server_name: Optional[str] = None,
|
375
384
|
username_template: Optional[str] = None):
|
376
385
|
"""
|
377
|
-
:param str password: The password to
|
378
|
-
:param str url: The URL for Elasticsearch's API
|
379
|
-
|
380
|
-
:param str
|
381
|
-
:param str
|
382
|
-
:param str
|
383
|
-
:param str
|
384
|
-
:param
|
385
|
-
:param
|
386
|
-
:param str tls_server_name: This, if set, is used to set the SNI host when connecting via TLS.
|
386
|
+
:param str password: The password to be used in the connection URL
|
387
|
+
:param str url: The URL for Elasticsearch's API
|
388
|
+
:param str username: The username to be used in the connection URL
|
389
|
+
:param str ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
390
|
+
:param str ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
391
|
+
:param str client_cert: The path to the certificate for the Elasticsearch client to present for communication
|
392
|
+
:param str client_key: The path to the key for the Elasticsearch client to use for communication
|
393
|
+
:param bool insecure: Whether to disable certificate verification
|
394
|
+
:param str tls_server_name: This, if set, is used to set the SNI host when connecting via TLS
|
387
395
|
:param str username_template: Template describing how dynamic usernames are generated.
|
388
396
|
"""
|
389
397
|
pulumi.set(__self__, "password", password)
|
@@ -408,7 +416,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
408
416
|
@pulumi.getter
|
409
417
|
def password(self) -> str:
|
410
418
|
"""
|
411
|
-
The password to
|
419
|
+
The password to be used in the connection URL
|
412
420
|
"""
|
413
421
|
return pulumi.get(self, "password")
|
414
422
|
|
@@ -416,8 +424,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
416
424
|
@pulumi.getter
|
417
425
|
def url(self) -> str:
|
418
426
|
"""
|
419
|
-
The URL for Elasticsearch's API
|
420
|
-
by trusted CA if used.
|
427
|
+
The URL for Elasticsearch's API
|
421
428
|
"""
|
422
429
|
return pulumi.get(self, "url")
|
423
430
|
|
@@ -425,7 +432,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
425
432
|
@pulumi.getter
|
426
433
|
def username(self) -> str:
|
427
434
|
"""
|
428
|
-
The username to
|
435
|
+
The username to be used in the connection URL
|
429
436
|
"""
|
430
437
|
return pulumi.get(self, "username")
|
431
438
|
|
@@ -433,7 +440,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
433
440
|
@pulumi.getter(name="caCert")
|
434
441
|
def ca_cert(self) -> Optional[str]:
|
435
442
|
"""
|
436
|
-
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
443
|
+
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
437
444
|
"""
|
438
445
|
return pulumi.get(self, "ca_cert")
|
439
446
|
|
@@ -441,7 +448,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
441
448
|
@pulumi.getter(name="caPath")
|
442
449
|
def ca_path(self) -> Optional[str]:
|
443
450
|
"""
|
444
|
-
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
451
|
+
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
445
452
|
"""
|
446
453
|
return pulumi.get(self, "ca_path")
|
447
454
|
|
@@ -449,7 +456,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
449
456
|
@pulumi.getter(name="clientCert")
|
450
457
|
def client_cert(self) -> Optional[str]:
|
451
458
|
"""
|
452
|
-
The path to the certificate for the Elasticsearch client to present for communication
|
459
|
+
The path to the certificate for the Elasticsearch client to present for communication
|
453
460
|
"""
|
454
461
|
return pulumi.get(self, "client_cert")
|
455
462
|
|
@@ -457,7 +464,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
457
464
|
@pulumi.getter(name="clientKey")
|
458
465
|
def client_key(self) -> Optional[str]:
|
459
466
|
"""
|
460
|
-
The path to the key for the Elasticsearch client to use for communication
|
467
|
+
The path to the key for the Elasticsearch client to use for communication
|
461
468
|
"""
|
462
469
|
return pulumi.get(self, "client_key")
|
463
470
|
|
@@ -465,7 +472,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
465
472
|
@pulumi.getter
|
466
473
|
def insecure(self) -> Optional[bool]:
|
467
474
|
"""
|
468
|
-
Whether to disable certificate verification
|
475
|
+
Whether to disable certificate verification
|
469
476
|
"""
|
470
477
|
return pulumi.get(self, "insecure")
|
471
478
|
|
@@ -473,7 +480,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
473
480
|
@pulumi.getter(name="tlsServerName")
|
474
481
|
def tls_server_name(self) -> Optional[str]:
|
475
482
|
"""
|
476
|
-
This, if set, is used to set the SNI host when connecting via TLS
|
483
|
+
This, if set, is used to set the SNI host when connecting via TLS
|
477
484
|
"""
|
478
485
|
return pulumi.get(self, "tls_server_name")
|
479
486
|
|
@@ -522,19 +529,13 @@ class SecretBackendConnectionHana(dict):
|
|
522
529
|
password: Optional[str] = None,
|
523
530
|
username: Optional[str] = None):
|
524
531
|
"""
|
525
|
-
:param str connection_url:
|
526
|
-
|
527
|
-
|
528
|
-
|
529
|
-
:param
|
530
|
-
:param
|
531
|
-
|
532
|
-
:param int max_idle_connections: The maximum number of idle connections to
|
533
|
-
maintain.
|
534
|
-
:param int max_open_connections: The maximum number of open connections to
|
535
|
-
use.
|
536
|
-
:param str password: The password to authenticate with.
|
537
|
-
:param str username: The username to authenticate with.
|
532
|
+
:param str connection_url: Connection string to use to connect to the database.
|
533
|
+
:param bool disable_escaping: Disable special character escaping in username and password
|
534
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
535
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
536
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
537
|
+
:param str password: The root credential password used in the connection URL
|
538
|
+
:param str username: The root credential username used in the connection URL
|
538
539
|
"""
|
539
540
|
if connection_url is not None:
|
540
541
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -555,10 +556,7 @@ class SecretBackendConnectionHana(dict):
|
|
555
556
|
@pulumi.getter(name="connectionUrl")
|
556
557
|
def connection_url(self) -> Optional[str]:
|
557
558
|
"""
|
558
|
-
|
559
|
-
the [Vault
|
560
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
561
|
-
for an example.
|
559
|
+
Connection string to use to connect to the database.
|
562
560
|
"""
|
563
561
|
return pulumi.get(self, "connection_url")
|
564
562
|
|
@@ -566,7 +564,7 @@ class SecretBackendConnectionHana(dict):
|
|
566
564
|
@pulumi.getter(name="disableEscaping")
|
567
565
|
def disable_escaping(self) -> Optional[bool]:
|
568
566
|
"""
|
569
|
-
Disable special character escaping in username and password
|
567
|
+
Disable special character escaping in username and password
|
570
568
|
"""
|
571
569
|
return pulumi.get(self, "disable_escaping")
|
572
570
|
|
@@ -574,8 +572,7 @@ class SecretBackendConnectionHana(dict):
|
|
574
572
|
@pulumi.getter(name="maxConnectionLifetime")
|
575
573
|
def max_connection_lifetime(self) -> Optional[int]:
|
576
574
|
"""
|
577
|
-
|
578
|
-
a connection alive for.
|
575
|
+
Maximum number of seconds a connection may be reused.
|
579
576
|
"""
|
580
577
|
return pulumi.get(self, "max_connection_lifetime")
|
581
578
|
|
@@ -583,8 +580,7 @@ class SecretBackendConnectionHana(dict):
|
|
583
580
|
@pulumi.getter(name="maxIdleConnections")
|
584
581
|
def max_idle_connections(self) -> Optional[int]:
|
585
582
|
"""
|
586
|
-
|
587
|
-
maintain.
|
583
|
+
Maximum number of idle connections to the database.
|
588
584
|
"""
|
589
585
|
return pulumi.get(self, "max_idle_connections")
|
590
586
|
|
@@ -592,8 +588,7 @@ class SecretBackendConnectionHana(dict):
|
|
592
588
|
@pulumi.getter(name="maxOpenConnections")
|
593
589
|
def max_open_connections(self) -> Optional[int]:
|
594
590
|
"""
|
595
|
-
|
596
|
-
use.
|
591
|
+
Maximum number of open connections to the database.
|
597
592
|
"""
|
598
593
|
return pulumi.get(self, "max_open_connections")
|
599
594
|
|
@@ -601,7 +596,7 @@ class SecretBackendConnectionHana(dict):
|
|
601
596
|
@pulumi.getter
|
602
597
|
def password(self) -> Optional[str]:
|
603
598
|
"""
|
604
|
-
The password
|
599
|
+
The root credential password used in the connection URL
|
605
600
|
"""
|
606
601
|
return pulumi.get(self, "password")
|
607
602
|
|
@@ -609,7 +604,7 @@ class SecretBackendConnectionHana(dict):
|
|
609
604
|
@pulumi.getter
|
610
605
|
def username(self) -> Optional[str]:
|
611
606
|
"""
|
612
|
-
The username
|
607
|
+
The root credential username used in the connection URL
|
613
608
|
"""
|
614
609
|
return pulumi.get(self, "username")
|
615
610
|
|
@@ -653,19 +648,15 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
653
648
|
tls: Optional[bool] = None,
|
654
649
|
username_template: Optional[str] = None):
|
655
650
|
"""
|
656
|
-
:param str host:
|
657
|
-
:param str password:
|
658
|
-
:param str username:
|
659
|
-
:param int connect_timeout: The number of seconds to use as a connection
|
660
|
-
|
661
|
-
:param
|
662
|
-
|
663
|
-
:param
|
664
|
-
|
665
|
-
:param str pem_json: A JSON structure configuring the certificate chain.
|
666
|
-
:param int port: The default port to connect to if no port is specified as
|
667
|
-
part of the host.
|
668
|
-
:param bool tls: Whether to use TLS when connecting to Cassandra.
|
651
|
+
:param str host: Influxdb host to connect to.
|
652
|
+
:param str password: Specifies the password corresponding to the given username.
|
653
|
+
:param str username: Specifies the username to use for superuser access.
|
654
|
+
:param int connect_timeout: The number of seconds to use as a connection timeout.
|
655
|
+
:param bool insecure_tls: Whether to skip verification of the server certificate when using TLS.
|
656
|
+
:param str pem_bundle: Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
657
|
+
:param str pem_json: Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
658
|
+
:param int port: The transport port to use to connect to Influxdb.
|
659
|
+
:param bool tls: Whether to use TLS when connecting to Influxdb.
|
669
660
|
:param str username_template: Template describing how dynamic usernames are generated.
|
670
661
|
"""
|
671
662
|
pulumi.set(__self__, "host", host)
|
@@ -690,7 +681,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
690
681
|
@pulumi.getter
|
691
682
|
def host(self) -> str:
|
692
683
|
"""
|
693
|
-
|
684
|
+
Influxdb host to connect to.
|
694
685
|
"""
|
695
686
|
return pulumi.get(self, "host")
|
696
687
|
|
@@ -698,7 +689,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
698
689
|
@pulumi.getter
|
699
690
|
def password(self) -> str:
|
700
691
|
"""
|
701
|
-
|
692
|
+
Specifies the password corresponding to the given username.
|
702
693
|
"""
|
703
694
|
return pulumi.get(self, "password")
|
704
695
|
|
@@ -706,7 +697,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
706
697
|
@pulumi.getter
|
707
698
|
def username(self) -> str:
|
708
699
|
"""
|
709
|
-
|
700
|
+
Specifies the username to use for superuser access.
|
710
701
|
"""
|
711
702
|
return pulumi.get(self, "username")
|
712
703
|
|
@@ -714,8 +705,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
714
705
|
@pulumi.getter(name="connectTimeout")
|
715
706
|
def connect_timeout(self) -> Optional[int]:
|
716
707
|
"""
|
717
|
-
The number of seconds to use as a connection
|
718
|
-
timeout.
|
708
|
+
The number of seconds to use as a connection timeout.
|
719
709
|
"""
|
720
710
|
return pulumi.get(self, "connect_timeout")
|
721
711
|
|
@@ -723,8 +713,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
723
713
|
@pulumi.getter(name="insecureTls")
|
724
714
|
def insecure_tls(self) -> Optional[bool]:
|
725
715
|
"""
|
726
|
-
Whether to skip verification of the server
|
727
|
-
certificate when using TLS.
|
716
|
+
Whether to skip verification of the server certificate when using TLS.
|
728
717
|
"""
|
729
718
|
return pulumi.get(self, "insecure_tls")
|
730
719
|
|
@@ -732,8 +721,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
732
721
|
@pulumi.getter(name="pemBundle")
|
733
722
|
def pem_bundle(self) -> Optional[str]:
|
734
723
|
"""
|
735
|
-
Concatenated PEM blocks
|
736
|
-
chain.
|
724
|
+
Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
737
725
|
"""
|
738
726
|
return pulumi.get(self, "pem_bundle")
|
739
727
|
|
@@ -741,7 +729,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
741
729
|
@pulumi.getter(name="pemJson")
|
742
730
|
def pem_json(self) -> Optional[str]:
|
743
731
|
"""
|
744
|
-
|
732
|
+
Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
745
733
|
"""
|
746
734
|
return pulumi.get(self, "pem_json")
|
747
735
|
|
@@ -749,8 +737,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
749
737
|
@pulumi.getter
|
750
738
|
def port(self) -> Optional[int]:
|
751
739
|
"""
|
752
|
-
The
|
753
|
-
part of the host.
|
740
|
+
The transport port to use to connect to Influxdb.
|
754
741
|
"""
|
755
742
|
return pulumi.get(self, "port")
|
756
743
|
|
@@ -758,7 +745,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
758
745
|
@pulumi.getter
|
759
746
|
def tls(self) -> Optional[bool]:
|
760
747
|
"""
|
761
|
-
Whether to use TLS when connecting to
|
748
|
+
Whether to use TLS when connecting to Influxdb.
|
762
749
|
"""
|
763
750
|
return pulumi.get(self, "tls")
|
764
751
|
|
@@ -807,19 +794,13 @@ class SecretBackendConnectionMongodb(dict):
|
|
807
794
|
username: Optional[str] = None,
|
808
795
|
username_template: Optional[str] = None):
|
809
796
|
"""
|
810
|
-
:param str connection_url:
|
811
|
-
|
812
|
-
|
813
|
-
|
814
|
-
:param
|
815
|
-
|
816
|
-
:param
|
817
|
-
maintain.
|
818
|
-
:param int max_open_connections: The maximum number of open connections to
|
819
|
-
use.
|
820
|
-
:param str password: The password to authenticate with.
|
821
|
-
:param str username: The username to authenticate with.
|
822
|
-
:param str username_template: Template describing how dynamic usernames are generated.
|
797
|
+
:param str connection_url: Connection string to use to connect to the database.
|
798
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
799
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
800
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
801
|
+
:param str password: The root credential password used in the connection URL
|
802
|
+
:param str username: The root credential username used in the connection URL
|
803
|
+
:param str username_template: Username generation template.
|
823
804
|
"""
|
824
805
|
if connection_url is not None:
|
825
806
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -840,10 +821,7 @@ class SecretBackendConnectionMongodb(dict):
|
|
840
821
|
@pulumi.getter(name="connectionUrl")
|
841
822
|
def connection_url(self) -> Optional[str]:
|
842
823
|
"""
|
843
|
-
|
844
|
-
the [Vault
|
845
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
846
|
-
for an example.
|
824
|
+
Connection string to use to connect to the database.
|
847
825
|
"""
|
848
826
|
return pulumi.get(self, "connection_url")
|
849
827
|
|
@@ -851,8 +829,7 @@ class SecretBackendConnectionMongodb(dict):
|
|
851
829
|
@pulumi.getter(name="maxConnectionLifetime")
|
852
830
|
def max_connection_lifetime(self) -> Optional[int]:
|
853
831
|
"""
|
854
|
-
|
855
|
-
a connection alive for.
|
832
|
+
Maximum number of seconds a connection may be reused.
|
856
833
|
"""
|
857
834
|
return pulumi.get(self, "max_connection_lifetime")
|
858
835
|
|
@@ -860,8 +837,7 @@ class SecretBackendConnectionMongodb(dict):
|
|
860
837
|
@pulumi.getter(name="maxIdleConnections")
|
861
838
|
def max_idle_connections(self) -> Optional[int]:
|
862
839
|
"""
|
863
|
-
|
864
|
-
maintain.
|
840
|
+
Maximum number of idle connections to the database.
|
865
841
|
"""
|
866
842
|
return pulumi.get(self, "max_idle_connections")
|
867
843
|
|
@@ -869,8 +845,7 @@ class SecretBackendConnectionMongodb(dict):
|
|
869
845
|
@pulumi.getter(name="maxOpenConnections")
|
870
846
|
def max_open_connections(self) -> Optional[int]:
|
871
847
|
"""
|
872
|
-
|
873
|
-
use.
|
848
|
+
Maximum number of open connections to the database.
|
874
849
|
"""
|
875
850
|
return pulumi.get(self, "max_open_connections")
|
876
851
|
|
@@ -878,7 +853,7 @@ class SecretBackendConnectionMongodb(dict):
|
|
878
853
|
@pulumi.getter
|
879
854
|
def password(self) -> Optional[str]:
|
880
855
|
"""
|
881
|
-
The password
|
856
|
+
The root credential password used in the connection URL
|
882
857
|
"""
|
883
858
|
return pulumi.get(self, "password")
|
884
859
|
|
@@ -886,7 +861,7 @@ class SecretBackendConnectionMongodb(dict):
|
|
886
861
|
@pulumi.getter
|
887
862
|
def username(self) -> Optional[str]:
|
888
863
|
"""
|
889
|
-
The username
|
864
|
+
The root credential username used in the connection URL
|
890
865
|
"""
|
891
866
|
return pulumi.get(self, "username")
|
892
867
|
|
@@ -894,7 +869,7 @@ class SecretBackendConnectionMongodb(dict):
|
|
894
869
|
@pulumi.getter(name="usernameTemplate")
|
895
870
|
def username_template(self) -> Optional[str]:
|
896
871
|
"""
|
897
|
-
|
872
|
+
Username generation template.
|
898
873
|
"""
|
899
874
|
return pulumi.get(self, "username_template")
|
900
875
|
|
@@ -1002,24 +977,15 @@ class SecretBackendConnectionMssql(dict):
|
|
1002
977
|
username: Optional[str] = None,
|
1003
978
|
username_template: Optional[str] = None):
|
1004
979
|
"""
|
1005
|
-
:param str connection_url:
|
1006
|
-
|
1007
|
-
|
1008
|
-
|
1009
|
-
:param
|
1010
|
-
|
1011
|
-
|
1012
|
-
|
1013
|
-
:param
|
1014
|
-
:param int max_connection_lifetime: The maximum number of seconds to keep
|
1015
|
-
a connection alive for.
|
1016
|
-
:param int max_idle_connections: The maximum number of idle connections to
|
1017
|
-
maintain.
|
1018
|
-
:param int max_open_connections: The maximum number of open connections to
|
1019
|
-
use.
|
1020
|
-
:param str password: The password to authenticate with.
|
1021
|
-
:param str username: The username to authenticate with.
|
1022
|
-
:param str username_template: Template describing how dynamic usernames are generated.
|
980
|
+
:param str connection_url: Connection string to use to connect to the database.
|
981
|
+
:param bool contained_db: Set to true when the target is a Contained Database, e.g. AzureSQL.
|
982
|
+
:param bool disable_escaping: Disable special character escaping in username and password
|
983
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
984
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
985
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
986
|
+
:param str password: The root credential password used in the connection URL
|
987
|
+
:param str username: The root credential username used in the connection URL
|
988
|
+
:param str username_template: Username generation template.
|
1023
989
|
"""
|
1024
990
|
if connection_url is not None:
|
1025
991
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -1044,10 +1010,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1044
1010
|
@pulumi.getter(name="connectionUrl")
|
1045
1011
|
def connection_url(self) -> Optional[str]:
|
1046
1012
|
"""
|
1047
|
-
|
1048
|
-
the [Vault
|
1049
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1050
|
-
for an example.
|
1013
|
+
Connection string to use to connect to the database.
|
1051
1014
|
"""
|
1052
1015
|
return pulumi.get(self, "connection_url")
|
1053
1016
|
|
@@ -1055,10 +1018,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1055
1018
|
@pulumi.getter(name="containedDb")
|
1056
1019
|
def contained_db(self) -> Optional[bool]:
|
1057
1020
|
"""
|
1058
|
-
|
1059
|
-
Contained Database, e.g. AzureSQL.
|
1060
|
-
See the [Vault
|
1061
|
-
docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
|
1021
|
+
Set to true when the target is a Contained Database, e.g. AzureSQL.
|
1062
1022
|
"""
|
1063
1023
|
return pulumi.get(self, "contained_db")
|
1064
1024
|
|
@@ -1066,7 +1026,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1066
1026
|
@pulumi.getter(name="disableEscaping")
|
1067
1027
|
def disable_escaping(self) -> Optional[bool]:
|
1068
1028
|
"""
|
1069
|
-
Disable special character escaping in username and password
|
1029
|
+
Disable special character escaping in username and password
|
1070
1030
|
"""
|
1071
1031
|
return pulumi.get(self, "disable_escaping")
|
1072
1032
|
|
@@ -1074,8 +1034,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1074
1034
|
@pulumi.getter(name="maxConnectionLifetime")
|
1075
1035
|
def max_connection_lifetime(self) -> Optional[int]:
|
1076
1036
|
"""
|
1077
|
-
|
1078
|
-
a connection alive for.
|
1037
|
+
Maximum number of seconds a connection may be reused.
|
1079
1038
|
"""
|
1080
1039
|
return pulumi.get(self, "max_connection_lifetime")
|
1081
1040
|
|
@@ -1083,8 +1042,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1083
1042
|
@pulumi.getter(name="maxIdleConnections")
|
1084
1043
|
def max_idle_connections(self) -> Optional[int]:
|
1085
1044
|
"""
|
1086
|
-
|
1087
|
-
maintain.
|
1045
|
+
Maximum number of idle connections to the database.
|
1088
1046
|
"""
|
1089
1047
|
return pulumi.get(self, "max_idle_connections")
|
1090
1048
|
|
@@ -1092,8 +1050,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1092
1050
|
@pulumi.getter(name="maxOpenConnections")
|
1093
1051
|
def max_open_connections(self) -> Optional[int]:
|
1094
1052
|
"""
|
1095
|
-
|
1096
|
-
use.
|
1053
|
+
Maximum number of open connections to the database.
|
1097
1054
|
"""
|
1098
1055
|
return pulumi.get(self, "max_open_connections")
|
1099
1056
|
|
@@ -1101,7 +1058,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1101
1058
|
@pulumi.getter
|
1102
1059
|
def password(self) -> Optional[str]:
|
1103
1060
|
"""
|
1104
|
-
The password
|
1061
|
+
The root credential password used in the connection URL
|
1105
1062
|
"""
|
1106
1063
|
return pulumi.get(self, "password")
|
1107
1064
|
|
@@ -1109,7 +1066,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1109
1066
|
@pulumi.getter
|
1110
1067
|
def username(self) -> Optional[str]:
|
1111
1068
|
"""
|
1112
|
-
The username
|
1069
|
+
The root credential username used in the connection URL
|
1113
1070
|
"""
|
1114
1071
|
return pulumi.get(self, "username")
|
1115
1072
|
|
@@ -1117,7 +1074,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1117
1074
|
@pulumi.getter(name="usernameTemplate")
|
1118
1075
|
def username_template(self) -> Optional[str]:
|
1119
1076
|
"""
|
1120
|
-
|
1077
|
+
Username generation template.
|
1121
1078
|
"""
|
1122
1079
|
return pulumi.get(self, "username_template")
|
1123
1080
|
|
@@ -1170,23 +1127,17 @@ class SecretBackendConnectionMysql(dict):
|
|
1170
1127
|
username: Optional[str] = None,
|
1171
1128
|
username_template: Optional[str] = None):
|
1172
1129
|
"""
|
1173
|
-
:param str auth_type:
|
1174
|
-
:param str connection_url:
|
1175
|
-
|
1176
|
-
|
1177
|
-
|
1178
|
-
:param
|
1179
|
-
|
1180
|
-
:param int max_idle_connections: The maximum number of idle connections to
|
1181
|
-
maintain.
|
1182
|
-
:param int max_open_connections: The maximum number of open connections to
|
1183
|
-
use.
|
1184
|
-
:param str password: The password to authenticate with.
|
1185
|
-
:param str service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1130
|
+
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1131
|
+
:param str connection_url: Connection string to use to connect to the database.
|
1132
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
1133
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
1134
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
1135
|
+
:param str password: The root credential password used in the connection URL
|
1136
|
+
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
1186
1137
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1187
1138
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1188
|
-
:param str username: The username
|
1189
|
-
:param str username_template:
|
1139
|
+
:param str username: The root credential username used in the connection URL
|
1140
|
+
:param str username_template: Username generation template.
|
1190
1141
|
"""
|
1191
1142
|
if auth_type is not None:
|
1192
1143
|
pulumi.set(__self__, "auth_type", auth_type)
|
@@ -1215,7 +1166,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1215
1166
|
@pulumi.getter(name="authType")
|
1216
1167
|
def auth_type(self) -> Optional[str]:
|
1217
1168
|
"""
|
1218
|
-
|
1169
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1219
1170
|
"""
|
1220
1171
|
return pulumi.get(self, "auth_type")
|
1221
1172
|
|
@@ -1223,10 +1174,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1223
1174
|
@pulumi.getter(name="connectionUrl")
|
1224
1175
|
def connection_url(self) -> Optional[str]:
|
1225
1176
|
"""
|
1226
|
-
|
1227
|
-
the [Vault
|
1228
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1229
|
-
for an example.
|
1177
|
+
Connection string to use to connect to the database.
|
1230
1178
|
"""
|
1231
1179
|
return pulumi.get(self, "connection_url")
|
1232
1180
|
|
@@ -1234,8 +1182,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1234
1182
|
@pulumi.getter(name="maxConnectionLifetime")
|
1235
1183
|
def max_connection_lifetime(self) -> Optional[int]:
|
1236
1184
|
"""
|
1237
|
-
|
1238
|
-
a connection alive for.
|
1185
|
+
Maximum number of seconds a connection may be reused.
|
1239
1186
|
"""
|
1240
1187
|
return pulumi.get(self, "max_connection_lifetime")
|
1241
1188
|
|
@@ -1243,8 +1190,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1243
1190
|
@pulumi.getter(name="maxIdleConnections")
|
1244
1191
|
def max_idle_connections(self) -> Optional[int]:
|
1245
1192
|
"""
|
1246
|
-
|
1247
|
-
maintain.
|
1193
|
+
Maximum number of idle connections to the database.
|
1248
1194
|
"""
|
1249
1195
|
return pulumi.get(self, "max_idle_connections")
|
1250
1196
|
|
@@ -1252,8 +1198,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1252
1198
|
@pulumi.getter(name="maxOpenConnections")
|
1253
1199
|
def max_open_connections(self) -> Optional[int]:
|
1254
1200
|
"""
|
1255
|
-
|
1256
|
-
use.
|
1201
|
+
Maximum number of open connections to the database.
|
1257
1202
|
"""
|
1258
1203
|
return pulumi.get(self, "max_open_connections")
|
1259
1204
|
|
@@ -1261,7 +1206,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1261
1206
|
@pulumi.getter
|
1262
1207
|
def password(self) -> Optional[str]:
|
1263
1208
|
"""
|
1264
|
-
The password
|
1209
|
+
The root credential password used in the connection URL
|
1265
1210
|
"""
|
1266
1211
|
return pulumi.get(self, "password")
|
1267
1212
|
|
@@ -1269,7 +1214,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1269
1214
|
@pulumi.getter(name="serviceAccountJson")
|
1270
1215
|
def service_account_json(self) -> Optional[str]:
|
1271
1216
|
"""
|
1272
|
-
JSON
|
1217
|
+
A JSON encoded credential for use with IAM authorization
|
1273
1218
|
"""
|
1274
1219
|
return pulumi.get(self, "service_account_json")
|
1275
1220
|
|
@@ -1293,7 +1238,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1293
1238
|
@pulumi.getter
|
1294
1239
|
def username(self) -> Optional[str]:
|
1295
1240
|
"""
|
1296
|
-
The username
|
1241
|
+
The root credential username used in the connection URL
|
1297
1242
|
"""
|
1298
1243
|
return pulumi.get(self, "username")
|
1299
1244
|
|
@@ -1301,7 +1246,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1301
1246
|
@pulumi.getter(name="usernameTemplate")
|
1302
1247
|
def username_template(self) -> Optional[str]:
|
1303
1248
|
"""
|
1304
|
-
|
1249
|
+
Username generation template.
|
1305
1250
|
"""
|
1306
1251
|
return pulumi.get(self, "username_template")
|
1307
1252
|
|
@@ -1354,23 +1299,17 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1354
1299
|
username: Optional[str] = None,
|
1355
1300
|
username_template: Optional[str] = None):
|
1356
1301
|
"""
|
1357
|
-
:param str auth_type:
|
1358
|
-
:param str connection_url:
|
1359
|
-
|
1360
|
-
|
1361
|
-
|
1362
|
-
:param
|
1363
|
-
|
1364
|
-
:param int max_idle_connections: The maximum number of idle connections to
|
1365
|
-
maintain.
|
1366
|
-
:param int max_open_connections: The maximum number of open connections to
|
1367
|
-
use.
|
1368
|
-
:param str password: The password to authenticate with.
|
1369
|
-
:param str service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1302
|
+
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1303
|
+
:param str connection_url: Connection string to use to connect to the database.
|
1304
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
1305
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
1306
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
1307
|
+
:param str password: The root credential password used in the connection URL
|
1308
|
+
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
1370
1309
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1371
1310
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1372
|
-
:param str username: The username
|
1373
|
-
:param str username_template:
|
1311
|
+
:param str username: The root credential username used in the connection URL
|
1312
|
+
:param str username_template: Username generation template.
|
1374
1313
|
"""
|
1375
1314
|
if auth_type is not None:
|
1376
1315
|
pulumi.set(__self__, "auth_type", auth_type)
|
@@ -1399,7 +1338,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1399
1338
|
@pulumi.getter(name="authType")
|
1400
1339
|
def auth_type(self) -> Optional[str]:
|
1401
1340
|
"""
|
1402
|
-
|
1341
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1403
1342
|
"""
|
1404
1343
|
return pulumi.get(self, "auth_type")
|
1405
1344
|
|
@@ -1407,10 +1346,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1407
1346
|
@pulumi.getter(name="connectionUrl")
|
1408
1347
|
def connection_url(self) -> Optional[str]:
|
1409
1348
|
"""
|
1410
|
-
|
1411
|
-
the [Vault
|
1412
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1413
|
-
for an example.
|
1349
|
+
Connection string to use to connect to the database.
|
1414
1350
|
"""
|
1415
1351
|
return pulumi.get(self, "connection_url")
|
1416
1352
|
|
@@ -1418,8 +1354,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1418
1354
|
@pulumi.getter(name="maxConnectionLifetime")
|
1419
1355
|
def max_connection_lifetime(self) -> Optional[int]:
|
1420
1356
|
"""
|
1421
|
-
|
1422
|
-
a connection alive for.
|
1357
|
+
Maximum number of seconds a connection may be reused.
|
1423
1358
|
"""
|
1424
1359
|
return pulumi.get(self, "max_connection_lifetime")
|
1425
1360
|
|
@@ -1427,8 +1362,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1427
1362
|
@pulumi.getter(name="maxIdleConnections")
|
1428
1363
|
def max_idle_connections(self) -> Optional[int]:
|
1429
1364
|
"""
|
1430
|
-
|
1431
|
-
maintain.
|
1365
|
+
Maximum number of idle connections to the database.
|
1432
1366
|
"""
|
1433
1367
|
return pulumi.get(self, "max_idle_connections")
|
1434
1368
|
|
@@ -1436,8 +1370,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1436
1370
|
@pulumi.getter(name="maxOpenConnections")
|
1437
1371
|
def max_open_connections(self) -> Optional[int]:
|
1438
1372
|
"""
|
1439
|
-
|
1440
|
-
use.
|
1373
|
+
Maximum number of open connections to the database.
|
1441
1374
|
"""
|
1442
1375
|
return pulumi.get(self, "max_open_connections")
|
1443
1376
|
|
@@ -1445,7 +1378,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1445
1378
|
@pulumi.getter
|
1446
1379
|
def password(self) -> Optional[str]:
|
1447
1380
|
"""
|
1448
|
-
The password
|
1381
|
+
The root credential password used in the connection URL
|
1449
1382
|
"""
|
1450
1383
|
return pulumi.get(self, "password")
|
1451
1384
|
|
@@ -1453,7 +1386,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1453
1386
|
@pulumi.getter(name="serviceAccountJson")
|
1454
1387
|
def service_account_json(self) -> Optional[str]:
|
1455
1388
|
"""
|
1456
|
-
JSON
|
1389
|
+
A JSON encoded credential for use with IAM authorization
|
1457
1390
|
"""
|
1458
1391
|
return pulumi.get(self, "service_account_json")
|
1459
1392
|
|
@@ -1477,7 +1410,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1477
1410
|
@pulumi.getter
|
1478
1411
|
def username(self) -> Optional[str]:
|
1479
1412
|
"""
|
1480
|
-
The username
|
1413
|
+
The root credential username used in the connection URL
|
1481
1414
|
"""
|
1482
1415
|
return pulumi.get(self, "username")
|
1483
1416
|
|
@@ -1485,7 +1418,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1485
1418
|
@pulumi.getter(name="usernameTemplate")
|
1486
1419
|
def username_template(self) -> Optional[str]:
|
1487
1420
|
"""
|
1488
|
-
|
1421
|
+
Username generation template.
|
1489
1422
|
"""
|
1490
1423
|
return pulumi.get(self, "username_template")
|
1491
1424
|
|
@@ -1538,23 +1471,17 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1538
1471
|
username: Optional[str] = None,
|
1539
1472
|
username_template: Optional[str] = None):
|
1540
1473
|
"""
|
1541
|
-
:param str auth_type:
|
1542
|
-
:param str connection_url:
|
1543
|
-
|
1544
|
-
|
1545
|
-
|
1546
|
-
:param
|
1547
|
-
|
1548
|
-
:param int max_idle_connections: The maximum number of idle connections to
|
1549
|
-
maintain.
|
1550
|
-
:param int max_open_connections: The maximum number of open connections to
|
1551
|
-
use.
|
1552
|
-
:param str password: The password to authenticate with.
|
1553
|
-
:param str service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1474
|
+
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1475
|
+
:param str connection_url: Connection string to use to connect to the database.
|
1476
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
1477
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
1478
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
1479
|
+
:param str password: The root credential password used in the connection URL
|
1480
|
+
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
1554
1481
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1555
1482
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1556
|
-
:param str username: The username
|
1557
|
-
:param str username_template:
|
1483
|
+
:param str username: The root credential username used in the connection URL
|
1484
|
+
:param str username_template: Username generation template.
|
1558
1485
|
"""
|
1559
1486
|
if auth_type is not None:
|
1560
1487
|
pulumi.set(__self__, "auth_type", auth_type)
|
@@ -1583,7 +1510,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1583
1510
|
@pulumi.getter(name="authType")
|
1584
1511
|
def auth_type(self) -> Optional[str]:
|
1585
1512
|
"""
|
1586
|
-
|
1513
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1587
1514
|
"""
|
1588
1515
|
return pulumi.get(self, "auth_type")
|
1589
1516
|
|
@@ -1591,10 +1518,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1591
1518
|
@pulumi.getter(name="connectionUrl")
|
1592
1519
|
def connection_url(self) -> Optional[str]:
|
1593
1520
|
"""
|
1594
|
-
|
1595
|
-
the [Vault
|
1596
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1597
|
-
for an example.
|
1521
|
+
Connection string to use to connect to the database.
|
1598
1522
|
"""
|
1599
1523
|
return pulumi.get(self, "connection_url")
|
1600
1524
|
|
@@ -1602,8 +1526,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1602
1526
|
@pulumi.getter(name="maxConnectionLifetime")
|
1603
1527
|
def max_connection_lifetime(self) -> Optional[int]:
|
1604
1528
|
"""
|
1605
|
-
|
1606
|
-
a connection alive for.
|
1529
|
+
Maximum number of seconds a connection may be reused.
|
1607
1530
|
"""
|
1608
1531
|
return pulumi.get(self, "max_connection_lifetime")
|
1609
1532
|
|
@@ -1611,8 +1534,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1611
1534
|
@pulumi.getter(name="maxIdleConnections")
|
1612
1535
|
def max_idle_connections(self) -> Optional[int]:
|
1613
1536
|
"""
|
1614
|
-
|
1615
|
-
maintain.
|
1537
|
+
Maximum number of idle connections to the database.
|
1616
1538
|
"""
|
1617
1539
|
return pulumi.get(self, "max_idle_connections")
|
1618
1540
|
|
@@ -1620,8 +1542,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1620
1542
|
@pulumi.getter(name="maxOpenConnections")
|
1621
1543
|
def max_open_connections(self) -> Optional[int]:
|
1622
1544
|
"""
|
1623
|
-
|
1624
|
-
use.
|
1545
|
+
Maximum number of open connections to the database.
|
1625
1546
|
"""
|
1626
1547
|
return pulumi.get(self, "max_open_connections")
|
1627
1548
|
|
@@ -1629,7 +1550,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1629
1550
|
@pulumi.getter
|
1630
1551
|
def password(self) -> Optional[str]:
|
1631
1552
|
"""
|
1632
|
-
The password
|
1553
|
+
The root credential password used in the connection URL
|
1633
1554
|
"""
|
1634
1555
|
return pulumi.get(self, "password")
|
1635
1556
|
|
@@ -1637,7 +1558,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1637
1558
|
@pulumi.getter(name="serviceAccountJson")
|
1638
1559
|
def service_account_json(self) -> Optional[str]:
|
1639
1560
|
"""
|
1640
|
-
JSON
|
1561
|
+
A JSON encoded credential for use with IAM authorization
|
1641
1562
|
"""
|
1642
1563
|
return pulumi.get(self, "service_account_json")
|
1643
1564
|
|
@@ -1661,7 +1582,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1661
1582
|
@pulumi.getter
|
1662
1583
|
def username(self) -> Optional[str]:
|
1663
1584
|
"""
|
1664
|
-
The username
|
1585
|
+
The root credential username used in the connection URL
|
1665
1586
|
"""
|
1666
1587
|
return pulumi.get(self, "username")
|
1667
1588
|
|
@@ -1669,7 +1590,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1669
1590
|
@pulumi.getter(name="usernameTemplate")
|
1670
1591
|
def username_template(self) -> Optional[str]:
|
1671
1592
|
"""
|
1672
|
-
|
1593
|
+
Username generation template.
|
1673
1594
|
"""
|
1674
1595
|
return pulumi.get(self, "username_template")
|
1675
1596
|
|
@@ -1722,23 +1643,17 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1722
1643
|
username: Optional[str] = None,
|
1723
1644
|
username_template: Optional[str] = None):
|
1724
1645
|
"""
|
1725
|
-
:param str auth_type:
|
1726
|
-
:param str connection_url:
|
1727
|
-
|
1728
|
-
|
1729
|
-
|
1730
|
-
:param
|
1731
|
-
|
1732
|
-
:param int max_idle_connections: The maximum number of idle connections to
|
1733
|
-
maintain.
|
1734
|
-
:param int max_open_connections: The maximum number of open connections to
|
1735
|
-
use.
|
1736
|
-
:param str password: The password to authenticate with.
|
1737
|
-
:param str service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1646
|
+
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1647
|
+
:param str connection_url: Connection string to use to connect to the database.
|
1648
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
1649
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
1650
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
1651
|
+
:param str password: The root credential password used in the connection URL
|
1652
|
+
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
1738
1653
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1739
1654
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1740
|
-
:param str username: The username
|
1741
|
-
:param str username_template:
|
1655
|
+
:param str username: The root credential username used in the connection URL
|
1656
|
+
:param str username_template: Username generation template.
|
1742
1657
|
"""
|
1743
1658
|
if auth_type is not None:
|
1744
1659
|
pulumi.set(__self__, "auth_type", auth_type)
|
@@ -1767,7 +1682,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1767
1682
|
@pulumi.getter(name="authType")
|
1768
1683
|
def auth_type(self) -> Optional[str]:
|
1769
1684
|
"""
|
1770
|
-
|
1685
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1771
1686
|
"""
|
1772
1687
|
return pulumi.get(self, "auth_type")
|
1773
1688
|
|
@@ -1775,10 +1690,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1775
1690
|
@pulumi.getter(name="connectionUrl")
|
1776
1691
|
def connection_url(self) -> Optional[str]:
|
1777
1692
|
"""
|
1778
|
-
|
1779
|
-
the [Vault
|
1780
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1781
|
-
for an example.
|
1693
|
+
Connection string to use to connect to the database.
|
1782
1694
|
"""
|
1783
1695
|
return pulumi.get(self, "connection_url")
|
1784
1696
|
|
@@ -1786,8 +1698,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1786
1698
|
@pulumi.getter(name="maxConnectionLifetime")
|
1787
1699
|
def max_connection_lifetime(self) -> Optional[int]:
|
1788
1700
|
"""
|
1789
|
-
|
1790
|
-
a connection alive for.
|
1701
|
+
Maximum number of seconds a connection may be reused.
|
1791
1702
|
"""
|
1792
1703
|
return pulumi.get(self, "max_connection_lifetime")
|
1793
1704
|
|
@@ -1795,8 +1706,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1795
1706
|
@pulumi.getter(name="maxIdleConnections")
|
1796
1707
|
def max_idle_connections(self) -> Optional[int]:
|
1797
1708
|
"""
|
1798
|
-
|
1799
|
-
maintain.
|
1709
|
+
Maximum number of idle connections to the database.
|
1800
1710
|
"""
|
1801
1711
|
return pulumi.get(self, "max_idle_connections")
|
1802
1712
|
|
@@ -1804,8 +1714,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1804
1714
|
@pulumi.getter(name="maxOpenConnections")
|
1805
1715
|
def max_open_connections(self) -> Optional[int]:
|
1806
1716
|
"""
|
1807
|
-
|
1808
|
-
use.
|
1717
|
+
Maximum number of open connections to the database.
|
1809
1718
|
"""
|
1810
1719
|
return pulumi.get(self, "max_open_connections")
|
1811
1720
|
|
@@ -1813,7 +1722,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1813
1722
|
@pulumi.getter
|
1814
1723
|
def password(self) -> Optional[str]:
|
1815
1724
|
"""
|
1816
|
-
The password
|
1725
|
+
The root credential password used in the connection URL
|
1817
1726
|
"""
|
1818
1727
|
return pulumi.get(self, "password")
|
1819
1728
|
|
@@ -1821,7 +1730,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1821
1730
|
@pulumi.getter(name="serviceAccountJson")
|
1822
1731
|
def service_account_json(self) -> Optional[str]:
|
1823
1732
|
"""
|
1824
|
-
JSON
|
1733
|
+
A JSON encoded credential for use with IAM authorization
|
1825
1734
|
"""
|
1826
1735
|
return pulumi.get(self, "service_account_json")
|
1827
1736
|
|
@@ -1845,7 +1754,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1845
1754
|
@pulumi.getter
|
1846
1755
|
def username(self) -> Optional[str]:
|
1847
1756
|
"""
|
1848
|
-
The username
|
1757
|
+
The root credential username used in the connection URL
|
1849
1758
|
"""
|
1850
1759
|
return pulumi.get(self, "username")
|
1851
1760
|
|
@@ -1853,7 +1762,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1853
1762
|
@pulumi.getter(name="usernameTemplate")
|
1854
1763
|
def username_template(self) -> Optional[str]:
|
1855
1764
|
"""
|
1856
|
-
|
1765
|
+
Username generation template.
|
1857
1766
|
"""
|
1858
1767
|
return pulumi.get(self, "username_template")
|
1859
1768
|
|
@@ -1900,21 +1809,15 @@ class SecretBackendConnectionOracle(dict):
|
|
1900
1809
|
username: Optional[str] = None,
|
1901
1810
|
username_template: Optional[str] = None):
|
1902
1811
|
"""
|
1903
|
-
:param str connection_url:
|
1904
|
-
|
1905
|
-
|
1906
|
-
|
1907
|
-
:param
|
1908
|
-
:param
|
1909
|
-
|
1910
|
-
:param
|
1911
|
-
|
1912
|
-
:param int max_open_connections: The maximum number of open connections to
|
1913
|
-
use.
|
1914
|
-
:param str password: The password to authenticate with.
|
1915
|
-
:param bool split_statements: Enable spliting statements after semi-colons.
|
1916
|
-
:param str username: The username to authenticate with.
|
1917
|
-
:param str username_template: Template describing how dynamic usernames are generated.
|
1812
|
+
:param str connection_url: Connection string to use to connect to the database.
|
1813
|
+
:param bool disconnect_sessions: Set to true to disconnect any open sessions prior to running the revocation statements.
|
1814
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
1815
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
1816
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
1817
|
+
:param str password: The root credential password used in the connection URL
|
1818
|
+
:param bool split_statements: Set to true in order to split statements after semi-colons.
|
1819
|
+
:param str username: The root credential username used in the connection URL
|
1820
|
+
:param str username_template: Username generation template.
|
1918
1821
|
"""
|
1919
1822
|
if connection_url is not None:
|
1920
1823
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -1939,10 +1842,7 @@ class SecretBackendConnectionOracle(dict):
|
|
1939
1842
|
@pulumi.getter(name="connectionUrl")
|
1940
1843
|
def connection_url(self) -> Optional[str]:
|
1941
1844
|
"""
|
1942
|
-
|
1943
|
-
the [Vault
|
1944
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1945
|
-
for an example.
|
1845
|
+
Connection string to use to connect to the database.
|
1946
1846
|
"""
|
1947
1847
|
return pulumi.get(self, "connection_url")
|
1948
1848
|
|
@@ -1950,7 +1850,7 @@ class SecretBackendConnectionOracle(dict):
|
|
1950
1850
|
@pulumi.getter(name="disconnectSessions")
|
1951
1851
|
def disconnect_sessions(self) -> Optional[bool]:
|
1952
1852
|
"""
|
1953
|
-
|
1853
|
+
Set to true to disconnect any open sessions prior to running the revocation statements.
|
1954
1854
|
"""
|
1955
1855
|
return pulumi.get(self, "disconnect_sessions")
|
1956
1856
|
|
@@ -1958,8 +1858,7 @@ class SecretBackendConnectionOracle(dict):
|
|
1958
1858
|
@pulumi.getter(name="maxConnectionLifetime")
|
1959
1859
|
def max_connection_lifetime(self) -> Optional[int]:
|
1960
1860
|
"""
|
1961
|
-
|
1962
|
-
a connection alive for.
|
1861
|
+
Maximum number of seconds a connection may be reused.
|
1963
1862
|
"""
|
1964
1863
|
return pulumi.get(self, "max_connection_lifetime")
|
1965
1864
|
|
@@ -1967,8 +1866,7 @@ class SecretBackendConnectionOracle(dict):
|
|
1967
1866
|
@pulumi.getter(name="maxIdleConnections")
|
1968
1867
|
def max_idle_connections(self) -> Optional[int]:
|
1969
1868
|
"""
|
1970
|
-
|
1971
|
-
maintain.
|
1869
|
+
Maximum number of idle connections to the database.
|
1972
1870
|
"""
|
1973
1871
|
return pulumi.get(self, "max_idle_connections")
|
1974
1872
|
|
@@ -1976,8 +1874,7 @@ class SecretBackendConnectionOracle(dict):
|
|
1976
1874
|
@pulumi.getter(name="maxOpenConnections")
|
1977
1875
|
def max_open_connections(self) -> Optional[int]:
|
1978
1876
|
"""
|
1979
|
-
|
1980
|
-
use.
|
1877
|
+
Maximum number of open connections to the database.
|
1981
1878
|
"""
|
1982
1879
|
return pulumi.get(self, "max_open_connections")
|
1983
1880
|
|
@@ -1985,7 +1882,7 @@ class SecretBackendConnectionOracle(dict):
|
|
1985
1882
|
@pulumi.getter
|
1986
1883
|
def password(self) -> Optional[str]:
|
1987
1884
|
"""
|
1988
|
-
The password
|
1885
|
+
The root credential password used in the connection URL
|
1989
1886
|
"""
|
1990
1887
|
return pulumi.get(self, "password")
|
1991
1888
|
|
@@ -1993,7 +1890,7 @@ class SecretBackendConnectionOracle(dict):
|
|
1993
1890
|
@pulumi.getter(name="splitStatements")
|
1994
1891
|
def split_statements(self) -> Optional[bool]:
|
1995
1892
|
"""
|
1996
|
-
|
1893
|
+
Set to true in order to split statements after semi-colons.
|
1997
1894
|
"""
|
1998
1895
|
return pulumi.get(self, "split_statements")
|
1999
1896
|
|
@@ -2001,7 +1898,7 @@ class SecretBackendConnectionOracle(dict):
|
|
2001
1898
|
@pulumi.getter
|
2002
1899
|
def username(self) -> Optional[str]:
|
2003
1900
|
"""
|
2004
|
-
The username
|
1901
|
+
The root credential username used in the connection URL
|
2005
1902
|
"""
|
2006
1903
|
return pulumi.get(self, "username")
|
2007
1904
|
|
@@ -2009,7 +1906,7 @@ class SecretBackendConnectionOracle(dict):
|
|
2009
1906
|
@pulumi.getter(name="usernameTemplate")
|
2010
1907
|
def username_template(self) -> Optional[str]:
|
2011
1908
|
"""
|
2012
|
-
|
1909
|
+
Username generation template.
|
2013
1910
|
"""
|
2014
1911
|
return pulumi.get(self, "username_template")
|
2015
1912
|
|
@@ -2031,8 +1928,18 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2031
1928
|
suggest = "max_idle_connections"
|
2032
1929
|
elif key == "maxOpenConnections":
|
2033
1930
|
suggest = "max_open_connections"
|
1931
|
+
elif key == "passwordAuthentication":
|
1932
|
+
suggest = "password_authentication"
|
1933
|
+
elif key == "privateKey":
|
1934
|
+
suggest = "private_key"
|
1935
|
+
elif key == "selfManaged":
|
1936
|
+
suggest = "self_managed"
|
2034
1937
|
elif key == "serviceAccountJson":
|
2035
1938
|
suggest = "service_account_json"
|
1939
|
+
elif key == "tlsCa":
|
1940
|
+
suggest = "tls_ca"
|
1941
|
+
elif key == "tlsCertificate":
|
1942
|
+
suggest = "tls_certificate"
|
2036
1943
|
elif key == "usernameTemplate":
|
2037
1944
|
suggest = "username_template"
|
2038
1945
|
|
@@ -2055,26 +1962,30 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2055
1962
|
max_idle_connections: Optional[int] = None,
|
2056
1963
|
max_open_connections: Optional[int] = None,
|
2057
1964
|
password: Optional[str] = None,
|
1965
|
+
password_authentication: Optional[str] = None,
|
1966
|
+
private_key: Optional[str] = None,
|
1967
|
+
self_managed: Optional[bool] = None,
|
2058
1968
|
service_account_json: Optional[str] = None,
|
1969
|
+
tls_ca: Optional[str] = None,
|
1970
|
+
tls_certificate: Optional[str] = None,
|
2059
1971
|
username: Optional[str] = None,
|
2060
1972
|
username_template: Optional[str] = None):
|
2061
1973
|
"""
|
2062
|
-
:param str auth_type:
|
2063
|
-
:param str connection_url:
|
2064
|
-
|
2065
|
-
|
2066
|
-
|
2067
|
-
:param
|
2068
|
-
:param
|
2069
|
-
|
2070
|
-
:param
|
2071
|
-
|
2072
|
-
:param
|
2073
|
-
|
2074
|
-
:param str
|
2075
|
-
:param str
|
2076
|
-
:param str
|
2077
|
-
:param str username_template: Template describing how dynamic usernames are generated.
|
1974
|
+
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1975
|
+
:param str connection_url: Connection string to use to connect to the database.
|
1976
|
+
:param bool disable_escaping: Disable special character escaping in username and password
|
1977
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
1978
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
1979
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
1980
|
+
:param str password: The root credential password used in the connection URL
|
1981
|
+
:param str password_authentication: When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
1982
|
+
:param str private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
|
1983
|
+
:param bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
|
1984
|
+
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
1985
|
+
:param str tls_ca: The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
1986
|
+
:param str tls_certificate: The x509 client certificate for connecting to the database. Must be PEM encoded.
|
1987
|
+
:param str username: The root credential username used in the connection URL
|
1988
|
+
:param str username_template: Username generation template.
|
2078
1989
|
"""
|
2079
1990
|
if auth_type is not None:
|
2080
1991
|
pulumi.set(__self__, "auth_type", auth_type)
|
@@ -2090,8 +2001,18 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2090
2001
|
pulumi.set(__self__, "max_open_connections", max_open_connections)
|
2091
2002
|
if password is not None:
|
2092
2003
|
pulumi.set(__self__, "password", password)
|
2004
|
+
if password_authentication is not None:
|
2005
|
+
pulumi.set(__self__, "password_authentication", password_authentication)
|
2006
|
+
if private_key is not None:
|
2007
|
+
pulumi.set(__self__, "private_key", private_key)
|
2008
|
+
if self_managed is not None:
|
2009
|
+
pulumi.set(__self__, "self_managed", self_managed)
|
2093
2010
|
if service_account_json is not None:
|
2094
2011
|
pulumi.set(__self__, "service_account_json", service_account_json)
|
2012
|
+
if tls_ca is not None:
|
2013
|
+
pulumi.set(__self__, "tls_ca", tls_ca)
|
2014
|
+
if tls_certificate is not None:
|
2015
|
+
pulumi.set(__self__, "tls_certificate", tls_certificate)
|
2095
2016
|
if username is not None:
|
2096
2017
|
pulumi.set(__self__, "username", username)
|
2097
2018
|
if username_template is not None:
|
@@ -2101,7 +2022,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2101
2022
|
@pulumi.getter(name="authType")
|
2102
2023
|
def auth_type(self) -> Optional[str]:
|
2103
2024
|
"""
|
2104
|
-
|
2025
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
2105
2026
|
"""
|
2106
2027
|
return pulumi.get(self, "auth_type")
|
2107
2028
|
|
@@ -2109,10 +2030,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2109
2030
|
@pulumi.getter(name="connectionUrl")
|
2110
2031
|
def connection_url(self) -> Optional[str]:
|
2111
2032
|
"""
|
2112
|
-
|
2113
|
-
the [Vault
|
2114
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
2115
|
-
for an example.
|
2033
|
+
Connection string to use to connect to the database.
|
2116
2034
|
"""
|
2117
2035
|
return pulumi.get(self, "connection_url")
|
2118
2036
|
|
@@ -2120,7 +2038,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2120
2038
|
@pulumi.getter(name="disableEscaping")
|
2121
2039
|
def disable_escaping(self) -> Optional[bool]:
|
2122
2040
|
"""
|
2123
|
-
Disable special character escaping in username and password
|
2041
|
+
Disable special character escaping in username and password
|
2124
2042
|
"""
|
2125
2043
|
return pulumi.get(self, "disable_escaping")
|
2126
2044
|
|
@@ -2128,8 +2046,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2128
2046
|
@pulumi.getter(name="maxConnectionLifetime")
|
2129
2047
|
def max_connection_lifetime(self) -> Optional[int]:
|
2130
2048
|
"""
|
2131
|
-
|
2132
|
-
a connection alive for.
|
2049
|
+
Maximum number of seconds a connection may be reused.
|
2133
2050
|
"""
|
2134
2051
|
return pulumi.get(self, "max_connection_lifetime")
|
2135
2052
|
|
@@ -2137,8 +2054,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2137
2054
|
@pulumi.getter(name="maxIdleConnections")
|
2138
2055
|
def max_idle_connections(self) -> Optional[int]:
|
2139
2056
|
"""
|
2140
|
-
|
2141
|
-
maintain.
|
2057
|
+
Maximum number of idle connections to the database.
|
2142
2058
|
"""
|
2143
2059
|
return pulumi.get(self, "max_idle_connections")
|
2144
2060
|
|
@@ -2146,8 +2062,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2146
2062
|
@pulumi.getter(name="maxOpenConnections")
|
2147
2063
|
def max_open_connections(self) -> Optional[int]:
|
2148
2064
|
"""
|
2149
|
-
|
2150
|
-
use.
|
2065
|
+
Maximum number of open connections to the database.
|
2151
2066
|
"""
|
2152
2067
|
return pulumi.get(self, "max_open_connections")
|
2153
2068
|
|
@@ -2155,23 +2070,63 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2155
2070
|
@pulumi.getter
|
2156
2071
|
def password(self) -> Optional[str]:
|
2157
2072
|
"""
|
2158
|
-
The password
|
2073
|
+
The root credential password used in the connection URL
|
2159
2074
|
"""
|
2160
2075
|
return pulumi.get(self, "password")
|
2161
2076
|
|
2077
|
+
@property
|
2078
|
+
@pulumi.getter(name="passwordAuthentication")
|
2079
|
+
def password_authentication(self) -> Optional[str]:
|
2080
|
+
"""
|
2081
|
+
When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
2082
|
+
"""
|
2083
|
+
return pulumi.get(self, "password_authentication")
|
2084
|
+
|
2085
|
+
@property
|
2086
|
+
@pulumi.getter(name="privateKey")
|
2087
|
+
def private_key(self) -> Optional[str]:
|
2088
|
+
"""
|
2089
|
+
The secret key used for the x509 client certificate. Must be PEM encoded.
|
2090
|
+
"""
|
2091
|
+
return pulumi.get(self, "private_key")
|
2092
|
+
|
2093
|
+
@property
|
2094
|
+
@pulumi.getter(name="selfManaged")
|
2095
|
+
def self_managed(self) -> Optional[bool]:
|
2096
|
+
"""
|
2097
|
+
If set, allows onboarding static roles with a rootless connection configuration.
|
2098
|
+
"""
|
2099
|
+
return pulumi.get(self, "self_managed")
|
2100
|
+
|
2162
2101
|
@property
|
2163
2102
|
@pulumi.getter(name="serviceAccountJson")
|
2164
2103
|
def service_account_json(self) -> Optional[str]:
|
2165
2104
|
"""
|
2166
|
-
JSON
|
2105
|
+
A JSON encoded credential for use with IAM authorization
|
2167
2106
|
"""
|
2168
2107
|
return pulumi.get(self, "service_account_json")
|
2169
2108
|
|
2109
|
+
@property
|
2110
|
+
@pulumi.getter(name="tlsCa")
|
2111
|
+
def tls_ca(self) -> Optional[str]:
|
2112
|
+
"""
|
2113
|
+
The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
2114
|
+
"""
|
2115
|
+
return pulumi.get(self, "tls_ca")
|
2116
|
+
|
2117
|
+
@property
|
2118
|
+
@pulumi.getter(name="tlsCertificate")
|
2119
|
+
def tls_certificate(self) -> Optional[str]:
|
2120
|
+
"""
|
2121
|
+
The x509 client certificate for connecting to the database. Must be PEM encoded.
|
2122
|
+
"""
|
2123
|
+
return pulumi.get(self, "tls_certificate")
|
2124
|
+
|
2170
2125
|
@property
|
2171
2126
|
@pulumi.getter
|
2172
2127
|
def username(self) -> Optional[str]:
|
2173
2128
|
"""
|
2174
|
-
The username
|
2129
|
+
The root credential username used in the connection URL
|
2175
2130
|
"""
|
2176
2131
|
return pulumi.get(self, "username")
|
2177
2132
|
|
@@ -2179,7 +2134,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2179
2134
|
@pulumi.getter(name="usernameTemplate")
|
2180
2135
|
def username_template(self) -> Optional[str]:
|
2181
2136
|
"""
|
2182
|
-
|
2137
|
+
Username generation template.
|
2183
2138
|
"""
|
2184
2139
|
return pulumi.get(self, "username_template")
|
2185
2140
|
|
@@ -2214,15 +2169,13 @@ class SecretBackendConnectionRedis(dict):
|
|
2214
2169
|
port: Optional[int] = None,
|
2215
2170
|
tls: Optional[bool] = None):
|
2216
2171
|
"""
|
2217
|
-
:param str host:
|
2218
|
-
:param str password:
|
2219
|
-
:param str username:
|
2220
|
-
:param str ca_cert: The
|
2221
|
-
:param bool insecure_tls:
|
2222
|
-
|
2223
|
-
:param
|
2224
|
-
part of the host.
|
2225
|
-
:param bool tls: Whether to use TLS when connecting to Cassandra.
|
2172
|
+
:param str host: Specifies the host to connect to
|
2173
|
+
:param str password: Specifies the password corresponding to the given username.
|
2174
|
+
:param str username: Specifies the username for Vault to use.
|
2175
|
+
:param str ca_cert: The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
|
2176
|
+
:param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
|
2177
|
+
:param int port: The transport port to use to connect to Redis.
|
2178
|
+
:param bool tls: Specifies whether to use TLS when connecting to Redis.
|
2226
2179
|
"""
|
2227
2180
|
pulumi.set(__self__, "host", host)
|
2228
2181
|
pulumi.set(__self__, "password", password)
|
@@ -2240,7 +2193,7 @@ class SecretBackendConnectionRedis(dict):
|
|
2240
2193
|
@pulumi.getter
|
2241
2194
|
def host(self) -> str:
|
2242
2195
|
"""
|
2243
|
-
|
2196
|
+
Specifies the host to connect to
|
2244
2197
|
"""
|
2245
2198
|
return pulumi.get(self, "host")
|
2246
2199
|
|
@@ -2248,7 +2201,7 @@ class SecretBackendConnectionRedis(dict):
|
|
2248
2201
|
@pulumi.getter
|
2249
2202
|
def password(self) -> str:
|
2250
2203
|
"""
|
2251
|
-
|
2204
|
+
Specifies the password corresponding to the given username.
|
2252
2205
|
"""
|
2253
2206
|
return pulumi.get(self, "password")
|
2254
2207
|
|
@@ -2256,7 +2209,7 @@ class SecretBackendConnectionRedis(dict):
|
|
2256
2209
|
@pulumi.getter
|
2257
2210
|
def username(self) -> str:
|
2258
2211
|
"""
|
2259
|
-
|
2212
|
+
Specifies the username for Vault to use.
|
2260
2213
|
"""
|
2261
2214
|
return pulumi.get(self, "username")
|
2262
2215
|
|
@@ -2264,7 +2217,7 @@ class SecretBackendConnectionRedis(dict):
|
|
2264
2217
|
@pulumi.getter(name="caCert")
|
2265
2218
|
def ca_cert(self) -> Optional[str]:
|
2266
2219
|
"""
|
2267
|
-
The
|
2220
|
+
The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
|
2268
2221
|
"""
|
2269
2222
|
return pulumi.get(self, "ca_cert")
|
2270
2223
|
|
@@ -2272,8 +2225,7 @@ class SecretBackendConnectionRedis(dict):
|
|
2272
2225
|
@pulumi.getter(name="insecureTls")
|
2273
2226
|
def insecure_tls(self) -> Optional[bool]:
|
2274
2227
|
"""
|
2275
|
-
|
2276
|
-
certificate when using TLS.
|
2228
|
+
Specifies whether to skip verification of the server certificate when using TLS.
|
2277
2229
|
"""
|
2278
2230
|
return pulumi.get(self, "insecure_tls")
|
2279
2231
|
|
@@ -2281,8 +2233,7 @@ class SecretBackendConnectionRedis(dict):
|
|
2281
2233
|
@pulumi.getter
|
2282
2234
|
def port(self) -> Optional[int]:
|
2283
2235
|
"""
|
2284
|
-
The
|
2285
|
-
part of the host.
|
2236
|
+
The transport port to use to connect to Redis.
|
2286
2237
|
"""
|
2287
2238
|
return pulumi.get(self, "port")
|
2288
2239
|
|
@@ -2290,7 +2241,7 @@ class SecretBackendConnectionRedis(dict):
|
|
2290
2241
|
@pulumi.getter
|
2291
2242
|
def tls(self) -> Optional[bool]:
|
2292
2243
|
"""
|
2293
|
-
|
2244
|
+
Specifies whether to use TLS when connecting to Redis.
|
2294
2245
|
"""
|
2295
2246
|
return pulumi.get(self, "tls")
|
2296
2247
|
|
@@ -2303,11 +2254,10 @@ class SecretBackendConnectionRedisElasticache(dict):
|
|
2303
2254
|
region: Optional[str] = None,
|
2304
2255
|
username: Optional[str] = None):
|
2305
2256
|
"""
|
2306
|
-
:param str url: The
|
2307
|
-
|
2308
|
-
:param str
|
2309
|
-
:param str
|
2310
|
-
:param str username: The username to authenticate with.
|
2257
|
+
:param str url: The configuration endpoint for the ElastiCache cluster to connect to.
|
2258
|
+
:param str password: The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
2259
|
+
:param str region: The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
|
2260
|
+
:param str username: The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
2311
2261
|
"""
|
2312
2262
|
pulumi.set(__self__, "url", url)
|
2313
2263
|
if password is not None:
|
@@ -2321,8 +2271,7 @@ class SecretBackendConnectionRedisElasticache(dict):
|
|
2321
2271
|
@pulumi.getter
|
2322
2272
|
def url(self) -> str:
|
2323
2273
|
"""
|
2324
|
-
The
|
2325
|
-
by trusted CA if used.
|
2274
|
+
The configuration endpoint for the ElastiCache cluster to connect to.
|
2326
2275
|
"""
|
2327
2276
|
return pulumi.get(self, "url")
|
2328
2277
|
|
@@ -2330,7 +2279,7 @@ class SecretBackendConnectionRedisElasticache(dict):
|
|
2330
2279
|
@pulumi.getter
|
2331
2280
|
def password(self) -> Optional[str]:
|
2332
2281
|
"""
|
2333
|
-
The
|
2282
|
+
The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
2334
2283
|
"""
|
2335
2284
|
return pulumi.get(self, "password")
|
2336
2285
|
|
@@ -2338,7 +2287,7 @@ class SecretBackendConnectionRedisElasticache(dict):
|
|
2338
2287
|
@pulumi.getter
|
2339
2288
|
def region(self) -> Optional[str]:
|
2340
2289
|
"""
|
2341
|
-
The region where the ElastiCache cluster is hosted. If omitted
|
2290
|
+
The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
|
2342
2291
|
"""
|
2343
2292
|
return pulumi.get(self, "region")
|
2344
2293
|
|
@@ -2346,7 +2295,7 @@ class SecretBackendConnectionRedisElasticache(dict):
|
|
2346
2295
|
@pulumi.getter
|
2347
2296
|
def username(self) -> Optional[str]:
|
2348
2297
|
"""
|
2349
|
-
The
|
2298
|
+
The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
2350
2299
|
"""
|
2351
2300
|
return pulumi.get(self, "username")
|
2352
2301
|
|
@@ -2390,20 +2339,14 @@ class SecretBackendConnectionRedshift(dict):
|
|
2390
2339
|
username: Optional[str] = None,
|
2391
2340
|
username_template: Optional[str] = None):
|
2392
2341
|
"""
|
2393
|
-
:param str connection_url:
|
2394
|
-
|
2395
|
-
|
2396
|
-
|
2397
|
-
:param
|
2398
|
-
:param
|
2399
|
-
|
2400
|
-
:param
|
2401
|
-
maintain.
|
2402
|
-
:param int max_open_connections: The maximum number of open connections to
|
2403
|
-
use.
|
2404
|
-
:param str password: The password to authenticate with.
|
2405
|
-
:param str username: The username to authenticate with.
|
2406
|
-
:param str username_template: Template describing how dynamic usernames are generated.
|
2342
|
+
:param str connection_url: Connection string to use to connect to the database.
|
2343
|
+
:param bool disable_escaping: Disable special character escaping in username and password
|
2344
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
2345
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
2346
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
2347
|
+
:param str password: The root credential password used in the connection URL
|
2348
|
+
:param str username: The root credential username used in the connection URL
|
2349
|
+
:param str username_template: Username generation template.
|
2407
2350
|
"""
|
2408
2351
|
if connection_url is not None:
|
2409
2352
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -2426,10 +2369,7 @@ class SecretBackendConnectionRedshift(dict):
|
|
2426
2369
|
@pulumi.getter(name="connectionUrl")
|
2427
2370
|
def connection_url(self) -> Optional[str]:
|
2428
2371
|
"""
|
2429
|
-
|
2430
|
-
the [Vault
|
2431
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
2432
|
-
for an example.
|
2372
|
+
Connection string to use to connect to the database.
|
2433
2373
|
"""
|
2434
2374
|
return pulumi.get(self, "connection_url")
|
2435
2375
|
|
@@ -2437,7 +2377,7 @@ class SecretBackendConnectionRedshift(dict):
|
|
2437
2377
|
@pulumi.getter(name="disableEscaping")
|
2438
2378
|
def disable_escaping(self) -> Optional[bool]:
|
2439
2379
|
"""
|
2440
|
-
Disable special character escaping in username and password
|
2380
|
+
Disable special character escaping in username and password
|
2441
2381
|
"""
|
2442
2382
|
return pulumi.get(self, "disable_escaping")
|
2443
2383
|
|
@@ -2445,8 +2385,7 @@ class SecretBackendConnectionRedshift(dict):
|
|
2445
2385
|
@pulumi.getter(name="maxConnectionLifetime")
|
2446
2386
|
def max_connection_lifetime(self) -> Optional[int]:
|
2447
2387
|
"""
|
2448
|
-
|
2449
|
-
a connection alive for.
|
2388
|
+
Maximum number of seconds a connection may be reused.
|
2450
2389
|
"""
|
2451
2390
|
return pulumi.get(self, "max_connection_lifetime")
|
2452
2391
|
|
@@ -2454,8 +2393,7 @@ class SecretBackendConnectionRedshift(dict):
|
|
2454
2393
|
@pulumi.getter(name="maxIdleConnections")
|
2455
2394
|
def max_idle_connections(self) -> Optional[int]:
|
2456
2395
|
"""
|
2457
|
-
|
2458
|
-
maintain.
|
2396
|
+
Maximum number of idle connections to the database.
|
2459
2397
|
"""
|
2460
2398
|
return pulumi.get(self, "max_idle_connections")
|
2461
2399
|
|
@@ -2463,8 +2401,7 @@ class SecretBackendConnectionRedshift(dict):
|
|
2463
2401
|
@pulumi.getter(name="maxOpenConnections")
|
2464
2402
|
def max_open_connections(self) -> Optional[int]:
|
2465
2403
|
"""
|
2466
|
-
|
2467
|
-
use.
|
2404
|
+
Maximum number of open connections to the database.
|
2468
2405
|
"""
|
2469
2406
|
return pulumi.get(self, "max_open_connections")
|
2470
2407
|
|
@@ -2472,7 +2409,7 @@ class SecretBackendConnectionRedshift(dict):
|
|
2472
2409
|
@pulumi.getter
|
2473
2410
|
def password(self) -> Optional[str]:
|
2474
2411
|
"""
|
2475
|
-
The password
|
2412
|
+
The root credential password used in the connection URL
|
2476
2413
|
"""
|
2477
2414
|
return pulumi.get(self, "password")
|
2478
2415
|
|
@@ -2480,7 +2417,7 @@ class SecretBackendConnectionRedshift(dict):
|
|
2480
2417
|
@pulumi.getter
|
2481
2418
|
def username(self) -> Optional[str]:
|
2482
2419
|
"""
|
2483
|
-
The username
|
2420
|
+
The root credential username used in the connection URL
|
2484
2421
|
"""
|
2485
2422
|
return pulumi.get(self, "username")
|
2486
2423
|
|
@@ -2488,7 +2425,7 @@ class SecretBackendConnectionRedshift(dict):
|
|
2488
2425
|
@pulumi.getter(name="usernameTemplate")
|
2489
2426
|
def username_template(self) -> Optional[str]:
|
2490
2427
|
"""
|
2491
|
-
|
2428
|
+
Username generation template.
|
2492
2429
|
"""
|
2493
2430
|
return pulumi.get(self, "username_template")
|
2494
2431
|
|
@@ -2529,19 +2466,13 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2529
2466
|
username: Optional[str] = None,
|
2530
2467
|
username_template: Optional[str] = None):
|
2531
2468
|
"""
|
2532
|
-
:param str connection_url:
|
2533
|
-
|
2534
|
-
|
2535
|
-
|
2536
|
-
:param
|
2537
|
-
|
2538
|
-
:param
|
2539
|
-
maintain.
|
2540
|
-
:param int max_open_connections: The maximum number of open connections to
|
2541
|
-
use.
|
2542
|
-
:param str password: The password to authenticate with.
|
2543
|
-
:param str username: The username to authenticate with.
|
2544
|
-
:param str username_template: Template describing how dynamic usernames are generated.
|
2469
|
+
:param str connection_url: Connection string to use to connect to the database.
|
2470
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
2471
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
2472
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
2473
|
+
:param str password: The root credential password used in the connection URL
|
2474
|
+
:param str username: The root credential username used in the connection URL
|
2475
|
+
:param str username_template: Username generation template.
|
2545
2476
|
"""
|
2546
2477
|
if connection_url is not None:
|
2547
2478
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -2562,10 +2493,7 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2562
2493
|
@pulumi.getter(name="connectionUrl")
|
2563
2494
|
def connection_url(self) -> Optional[str]:
|
2564
2495
|
"""
|
2565
|
-
|
2566
|
-
the [Vault
|
2567
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
2568
|
-
for an example.
|
2496
|
+
Connection string to use to connect to the database.
|
2569
2497
|
"""
|
2570
2498
|
return pulumi.get(self, "connection_url")
|
2571
2499
|
|
@@ -2573,8 +2501,7 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2573
2501
|
@pulumi.getter(name="maxConnectionLifetime")
|
2574
2502
|
def max_connection_lifetime(self) -> Optional[int]:
|
2575
2503
|
"""
|
2576
|
-
|
2577
|
-
a connection alive for.
|
2504
|
+
Maximum number of seconds a connection may be reused.
|
2578
2505
|
"""
|
2579
2506
|
return pulumi.get(self, "max_connection_lifetime")
|
2580
2507
|
|
@@ -2582,8 +2509,7 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2582
2509
|
@pulumi.getter(name="maxIdleConnections")
|
2583
2510
|
def max_idle_connections(self) -> Optional[int]:
|
2584
2511
|
"""
|
2585
|
-
|
2586
|
-
maintain.
|
2512
|
+
Maximum number of idle connections to the database.
|
2587
2513
|
"""
|
2588
2514
|
return pulumi.get(self, "max_idle_connections")
|
2589
2515
|
|
@@ -2591,8 +2517,7 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2591
2517
|
@pulumi.getter(name="maxOpenConnections")
|
2592
2518
|
def max_open_connections(self) -> Optional[int]:
|
2593
2519
|
"""
|
2594
|
-
|
2595
|
-
use.
|
2520
|
+
Maximum number of open connections to the database.
|
2596
2521
|
"""
|
2597
2522
|
return pulumi.get(self, "max_open_connections")
|
2598
2523
|
|
@@ -2600,7 +2525,7 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2600
2525
|
@pulumi.getter
|
2601
2526
|
def password(self) -> Optional[str]:
|
2602
2527
|
"""
|
2603
|
-
The password
|
2528
|
+
The root credential password used in the connection URL
|
2604
2529
|
"""
|
2605
2530
|
return pulumi.get(self, "password")
|
2606
2531
|
|
@@ -2608,7 +2533,7 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2608
2533
|
@pulumi.getter
|
2609
2534
|
def username(self) -> Optional[str]:
|
2610
2535
|
"""
|
2611
|
-
The username
|
2536
|
+
The root credential username used in the connection URL
|
2612
2537
|
"""
|
2613
2538
|
return pulumi.get(self, "username")
|
2614
2539
|
|
@@ -2616,7 +2541,7 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2616
2541
|
@pulumi.getter(name="usernameTemplate")
|
2617
2542
|
def username_template(self) -> Optional[str]:
|
2618
2543
|
"""
|
2619
|
-
|
2544
|
+
Username generation template.
|
2620
2545
|
"""
|
2621
2546
|
return pulumi.get(self, "username_template")
|
2622
2547
|
|
@@ -2642,6 +2567,8 @@ class SecretsMountCassandra(dict):
|
|
2642
2567
|
suggest = "protocol_version"
|
2643
2568
|
elif key == "rootRotationStatements":
|
2644
2569
|
suggest = "root_rotation_statements"
|
2570
|
+
elif key == "skipVerification":
|
2571
|
+
suggest = "skip_verification"
|
2645
2572
|
elif key == "verifyConnection":
|
2646
2573
|
suggest = "verify_connection"
|
2647
2574
|
|
@@ -2660,7 +2587,7 @@ class SecretsMountCassandra(dict):
|
|
2660
2587
|
name: str,
|
2661
2588
|
allowed_roles: Optional[Sequence[str]] = None,
|
2662
2589
|
connect_timeout: Optional[int] = None,
|
2663
|
-
data: Optional[Mapping[str,
|
2590
|
+
data: Optional[Mapping[str, str]] = None,
|
2664
2591
|
hosts: Optional[Sequence[str]] = None,
|
2665
2592
|
insecure_tls: Optional[bool] = None,
|
2666
2593
|
password: Optional[str] = None,
|
@@ -2670,6 +2597,7 @@ class SecretsMountCassandra(dict):
|
|
2670
2597
|
port: Optional[int] = None,
|
2671
2598
|
protocol_version: Optional[int] = None,
|
2672
2599
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
2600
|
+
skip_verification: Optional[bool] = None,
|
2673
2601
|
tls: Optional[bool] = None,
|
2674
2602
|
username: Optional[str] = None,
|
2675
2603
|
verify_connection: Optional[bool] = None):
|
@@ -2677,25 +2605,22 @@ class SecretsMountCassandra(dict):
|
|
2677
2605
|
:param str name: Name of the database connection.
|
2678
2606
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
2679
2607
|
connection.
|
2680
|
-
:param int connect_timeout: The number of seconds to use as a connection
|
2681
|
-
|
2682
|
-
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2608
|
+
:param int connect_timeout: The number of seconds to use as a connection timeout.
|
2609
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2683
2610
|
|
2684
2611
|
Supported list of database secrets engines that can be configured:
|
2685
|
-
:param Sequence[str] hosts:
|
2686
|
-
:param bool insecure_tls: Whether to skip verification of the server
|
2687
|
-
|
2688
|
-
:param str
|
2689
|
-
:param str
|
2690
|
-
chain.
|
2691
|
-
:param str pem_json: A JSON structure configuring the certificate chain.
|
2612
|
+
:param Sequence[str] hosts: Cassandra hosts to connect to.
|
2613
|
+
:param bool insecure_tls: Whether to skip verification of the server certificate when using TLS.
|
2614
|
+
:param str password: The password to use when authenticating with Cassandra.
|
2615
|
+
:param str pem_bundle: Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
2616
|
+
:param str pem_json: Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
2692
2617
|
:param str plugin_name: Specifies the name of the plugin to use.
|
2693
|
-
:param int port: The
|
2694
|
-
part of the host.
|
2618
|
+
:param int port: The transport port to use to connect to Cassandra.
|
2695
2619
|
:param int protocol_version: The CQL protocol version to use.
|
2696
2620
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
2621
|
+
:param bool skip_verification: Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
2697
2622
|
:param bool tls: Whether to use TLS when connecting to Cassandra.
|
2698
|
-
:param str username: The
|
2623
|
+
:param str username: The username to use when authenticating with Cassandra.
|
2699
2624
|
:param bool verify_connection: Whether the connection should be verified on
|
2700
2625
|
initial configuration or not.
|
2701
2626
|
"""
|
@@ -2724,6 +2649,8 @@ class SecretsMountCassandra(dict):
|
|
2724
2649
|
pulumi.set(__self__, "protocol_version", protocol_version)
|
2725
2650
|
if root_rotation_statements is not None:
|
2726
2651
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
2652
|
+
if skip_verification is not None:
|
2653
|
+
pulumi.set(__self__, "skip_verification", skip_verification)
|
2727
2654
|
if tls is not None:
|
2728
2655
|
pulumi.set(__self__, "tls", tls)
|
2729
2656
|
if username is not None:
|
@@ -2752,14 +2679,13 @@ class SecretsMountCassandra(dict):
|
|
2752
2679
|
@pulumi.getter(name="connectTimeout")
|
2753
2680
|
def connect_timeout(self) -> Optional[int]:
|
2754
2681
|
"""
|
2755
|
-
The number of seconds to use as a connection
|
2756
|
-
timeout.
|
2682
|
+
The number of seconds to use as a connection timeout.
|
2757
2683
|
"""
|
2758
2684
|
return pulumi.get(self, "connect_timeout")
|
2759
2685
|
|
2760
2686
|
@property
|
2761
2687
|
@pulumi.getter
|
2762
|
-
def data(self) -> Optional[Mapping[str,
|
2688
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
2763
2689
|
"""
|
2764
2690
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2765
2691
|
|
@@ -2771,7 +2697,7 @@ class SecretsMountCassandra(dict):
|
|
2771
2697
|
@pulumi.getter
|
2772
2698
|
def hosts(self) -> Optional[Sequence[str]]:
|
2773
2699
|
"""
|
2774
|
-
|
2700
|
+
Cassandra hosts to connect to.
|
2775
2701
|
"""
|
2776
2702
|
return pulumi.get(self, "hosts")
|
2777
2703
|
|
@@ -2779,8 +2705,7 @@ class SecretsMountCassandra(dict):
|
|
2779
2705
|
@pulumi.getter(name="insecureTls")
|
2780
2706
|
def insecure_tls(self) -> Optional[bool]:
|
2781
2707
|
"""
|
2782
|
-
Whether to skip verification of the server
|
2783
|
-
certificate when using TLS.
|
2708
|
+
Whether to skip verification of the server certificate when using TLS.
|
2784
2709
|
"""
|
2785
2710
|
return pulumi.get(self, "insecure_tls")
|
2786
2711
|
|
@@ -2788,7 +2713,7 @@ class SecretsMountCassandra(dict):
|
|
2788
2713
|
@pulumi.getter
|
2789
2714
|
def password(self) -> Optional[str]:
|
2790
2715
|
"""
|
2791
|
-
The
|
2716
|
+
The password to use when authenticating with Cassandra.
|
2792
2717
|
"""
|
2793
2718
|
return pulumi.get(self, "password")
|
2794
2719
|
|
@@ -2796,8 +2721,7 @@ class SecretsMountCassandra(dict):
|
|
2796
2721
|
@pulumi.getter(name="pemBundle")
|
2797
2722
|
def pem_bundle(self) -> Optional[str]:
|
2798
2723
|
"""
|
2799
|
-
Concatenated PEM blocks
|
2800
|
-
chain.
|
2724
|
+
Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
2801
2725
|
"""
|
2802
2726
|
return pulumi.get(self, "pem_bundle")
|
2803
2727
|
|
@@ -2805,7 +2729,7 @@ class SecretsMountCassandra(dict):
|
|
2805
2729
|
@pulumi.getter(name="pemJson")
|
2806
2730
|
def pem_json(self) -> Optional[str]:
|
2807
2731
|
"""
|
2808
|
-
|
2732
|
+
Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
2809
2733
|
"""
|
2810
2734
|
return pulumi.get(self, "pem_json")
|
2811
2735
|
|
@@ -2821,8 +2745,7 @@ class SecretsMountCassandra(dict):
|
|
2821
2745
|
@pulumi.getter
|
2822
2746
|
def port(self) -> Optional[int]:
|
2823
2747
|
"""
|
2824
|
-
The
|
2825
|
-
part of the host.
|
2748
|
+
The transport port to use to connect to Cassandra.
|
2826
2749
|
"""
|
2827
2750
|
return pulumi.get(self, "port")
|
2828
2751
|
|
@@ -2842,6 +2765,14 @@ class SecretsMountCassandra(dict):
|
|
2842
2765
|
"""
|
2843
2766
|
return pulumi.get(self, "root_rotation_statements")
|
2844
2767
|
|
2768
|
+
@property
|
2769
|
+
@pulumi.getter(name="skipVerification")
|
2770
|
+
def skip_verification(self) -> Optional[bool]:
|
2771
|
+
"""
|
2772
|
+
Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
2773
|
+
"""
|
2774
|
+
return pulumi.get(self, "skip_verification")
|
2775
|
+
|
2845
2776
|
@property
|
2846
2777
|
@pulumi.getter
|
2847
2778
|
def tls(self) -> Optional[bool]:
|
@@ -2854,7 +2785,7 @@ class SecretsMountCassandra(dict):
|
|
2854
2785
|
@pulumi.getter
|
2855
2786
|
def username(self) -> Optional[str]:
|
2856
2787
|
"""
|
2857
|
-
The
|
2788
|
+
The username to use when authenticating with Cassandra.
|
2858
2789
|
"""
|
2859
2790
|
return pulumi.get(self, "username")
|
2860
2791
|
|
@@ -2909,7 +2840,7 @@ class SecretsMountCouchbase(dict):
|
|
2909
2840
|
allowed_roles: Optional[Sequence[str]] = None,
|
2910
2841
|
base64_pem: Optional[str] = None,
|
2911
2842
|
bucket_name: Optional[str] = None,
|
2912
|
-
data: Optional[Mapping[str,
|
2843
|
+
data: Optional[Mapping[str, str]] = None,
|
2913
2844
|
insecure_tls: Optional[bool] = None,
|
2914
2845
|
plugin_name: Optional[str] = None,
|
2915
2846
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
@@ -2917,23 +2848,22 @@ class SecretsMountCouchbase(dict):
|
|
2917
2848
|
username_template: Optional[str] = None,
|
2918
2849
|
verify_connection: Optional[bool] = None):
|
2919
2850
|
"""
|
2920
|
-
:param Sequence[str] hosts:
|
2851
|
+
:param Sequence[str] hosts: A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
|
2921
2852
|
:param str name: Name of the database connection.
|
2922
|
-
:param str password:
|
2923
|
-
:param str username:
|
2853
|
+
:param str password: Specifies the password corresponding to the given username.
|
2854
|
+
:param str username: Specifies the username for Vault to use.
|
2924
2855
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
2925
2856
|
connection.
|
2926
2857
|
:param str base64_pem: Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
|
2927
2858
|
:param str bucket_name: Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
|
2928
|
-
:param Mapping[str,
|
2859
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2929
2860
|
|
2930
2861
|
Supported list of database secrets engines that can be configured:
|
2931
|
-
:param bool insecure_tls:
|
2932
|
-
certificate when using TLS.
|
2862
|
+
:param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
|
2933
2863
|
:param str plugin_name: Specifies the name of the plugin to use.
|
2934
2864
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
2935
|
-
:param bool tls:
|
2936
|
-
:param str username_template:
|
2865
|
+
:param bool tls: Specifies whether to use TLS when connecting to Couchbase.
|
2866
|
+
:param str username_template: Template describing how dynamic usernames are generated.
|
2937
2867
|
:param bool verify_connection: Whether the connection should be verified on
|
2938
2868
|
initial configuration or not.
|
2939
2869
|
"""
|
@@ -2966,7 +2896,7 @@ class SecretsMountCouchbase(dict):
|
|
2966
2896
|
@pulumi.getter
|
2967
2897
|
def hosts(self) -> Sequence[str]:
|
2968
2898
|
"""
|
2969
|
-
|
2899
|
+
A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
|
2970
2900
|
"""
|
2971
2901
|
return pulumi.get(self, "hosts")
|
2972
2902
|
|
@@ -2982,7 +2912,7 @@ class SecretsMountCouchbase(dict):
|
|
2982
2912
|
@pulumi.getter
|
2983
2913
|
def password(self) -> str:
|
2984
2914
|
"""
|
2985
|
-
|
2915
|
+
Specifies the password corresponding to the given username.
|
2986
2916
|
"""
|
2987
2917
|
return pulumi.get(self, "password")
|
2988
2918
|
|
@@ -2990,7 +2920,7 @@ class SecretsMountCouchbase(dict):
|
|
2990
2920
|
@pulumi.getter
|
2991
2921
|
def username(self) -> str:
|
2992
2922
|
"""
|
2993
|
-
|
2923
|
+
Specifies the username for Vault to use.
|
2994
2924
|
"""
|
2995
2925
|
return pulumi.get(self, "username")
|
2996
2926
|
|
@@ -3021,7 +2951,7 @@ class SecretsMountCouchbase(dict):
|
|
3021
2951
|
|
3022
2952
|
@property
|
3023
2953
|
@pulumi.getter
|
3024
|
-
def data(self) -> Optional[Mapping[str,
|
2954
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
3025
2955
|
"""
|
3026
2956
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3027
2957
|
|
@@ -3033,8 +2963,7 @@ class SecretsMountCouchbase(dict):
|
|
3033
2963
|
@pulumi.getter(name="insecureTls")
|
3034
2964
|
def insecure_tls(self) -> Optional[bool]:
|
3035
2965
|
"""
|
3036
|
-
|
3037
|
-
certificate when using TLS.
|
2966
|
+
Specifies whether to skip verification of the server certificate when using TLS.
|
3038
2967
|
"""
|
3039
2968
|
return pulumi.get(self, "insecure_tls")
|
3040
2969
|
|
@@ -3058,7 +2987,7 @@ class SecretsMountCouchbase(dict):
|
|
3058
2987
|
@pulumi.getter
|
3059
2988
|
def tls(self) -> Optional[bool]:
|
3060
2989
|
"""
|
3061
|
-
|
2990
|
+
Specifies whether to use TLS when connecting to Couchbase.
|
3062
2991
|
"""
|
3063
2992
|
return pulumi.get(self, "tls")
|
3064
2993
|
|
@@ -3066,7 +2995,7 @@ class SecretsMountCouchbase(dict):
|
|
3066
2995
|
@pulumi.getter(name="usernameTemplate")
|
3067
2996
|
def username_template(self) -> Optional[str]:
|
3068
2997
|
"""
|
3069
|
-
|
2998
|
+
Template describing how dynamic usernames are generated.
|
3070
2999
|
"""
|
3071
3000
|
return pulumi.get(self, "username_template")
|
3072
3001
|
|
@@ -3127,7 +3056,7 @@ class SecretsMountElasticsearch(dict):
|
|
3127
3056
|
ca_path: Optional[str] = None,
|
3128
3057
|
client_cert: Optional[str] = None,
|
3129
3058
|
client_key: Optional[str] = None,
|
3130
|
-
data: Optional[Mapping[str,
|
3059
|
+
data: Optional[Mapping[str, str]] = None,
|
3131
3060
|
insecure: Optional[bool] = None,
|
3132
3061
|
plugin_name: Optional[str] = None,
|
3133
3062
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
@@ -3136,24 +3065,23 @@ class SecretsMountElasticsearch(dict):
|
|
3136
3065
|
verify_connection: Optional[bool] = None):
|
3137
3066
|
"""
|
3138
3067
|
:param str name: Name of the database connection.
|
3139
|
-
:param str password: The
|
3140
|
-
:param str url: The URL for Elasticsearch's API
|
3141
|
-
|
3142
|
-
:param str username: The root credential username used in the connection URL.
|
3068
|
+
:param str password: The password to be used in the connection URL
|
3069
|
+
:param str url: The URL for Elasticsearch's API
|
3070
|
+
:param str username: The username to be used in the connection URL
|
3143
3071
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3144
3072
|
connection.
|
3145
|
-
:param str ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
3146
|
-
:param str ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
3147
|
-
:param str client_cert: The path to the certificate for the Elasticsearch client to present for communication
|
3148
|
-
:param str client_key: The path to the key for the Elasticsearch client to use for communication
|
3149
|
-
:param Mapping[str,
|
3073
|
+
:param str ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
3074
|
+
:param str ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
3075
|
+
:param str client_cert: The path to the certificate for the Elasticsearch client to present for communication
|
3076
|
+
:param str client_key: The path to the key for the Elasticsearch client to use for communication
|
3077
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3150
3078
|
|
3151
3079
|
Supported list of database secrets engines that can be configured:
|
3152
|
-
:param bool insecure: Whether to disable certificate verification
|
3080
|
+
:param bool insecure: Whether to disable certificate verification
|
3153
3081
|
:param str plugin_name: Specifies the name of the plugin to use.
|
3154
3082
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
3155
|
-
:param str tls_server_name: This, if set, is used to set the SNI host when connecting via TLS
|
3156
|
-
:param str username_template:
|
3083
|
+
:param str tls_server_name: This, if set, is used to set the SNI host when connecting via TLS
|
3084
|
+
:param str username_template: Template describing how dynamic usernames are generated.
|
3157
3085
|
:param bool verify_connection: Whether the connection should be verified on
|
3158
3086
|
initial configuration or not.
|
3159
3087
|
"""
|
@@ -3198,7 +3126,7 @@ class SecretsMountElasticsearch(dict):
|
|
3198
3126
|
@pulumi.getter
|
3199
3127
|
def password(self) -> str:
|
3200
3128
|
"""
|
3201
|
-
The
|
3129
|
+
The password to be used in the connection URL
|
3202
3130
|
"""
|
3203
3131
|
return pulumi.get(self, "password")
|
3204
3132
|
|
@@ -3206,8 +3134,7 @@ class SecretsMountElasticsearch(dict):
|
|
3206
3134
|
@pulumi.getter
|
3207
3135
|
def url(self) -> str:
|
3208
3136
|
"""
|
3209
|
-
The URL for Elasticsearch's API
|
3210
|
-
by trusted CA if used.
|
3137
|
+
The URL for Elasticsearch's API
|
3211
3138
|
"""
|
3212
3139
|
return pulumi.get(self, "url")
|
3213
3140
|
|
@@ -3215,7 +3142,7 @@ class SecretsMountElasticsearch(dict):
|
|
3215
3142
|
@pulumi.getter
|
3216
3143
|
def username(self) -> str:
|
3217
3144
|
"""
|
3218
|
-
The
|
3145
|
+
The username to be used in the connection URL
|
3219
3146
|
"""
|
3220
3147
|
return pulumi.get(self, "username")
|
3221
3148
|
|
@@ -3232,7 +3159,7 @@ class SecretsMountElasticsearch(dict):
|
|
3232
3159
|
@pulumi.getter(name="caCert")
|
3233
3160
|
def ca_cert(self) -> Optional[str]:
|
3234
3161
|
"""
|
3235
|
-
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
3162
|
+
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
3236
3163
|
"""
|
3237
3164
|
return pulumi.get(self, "ca_cert")
|
3238
3165
|
|
@@ -3240,7 +3167,7 @@ class SecretsMountElasticsearch(dict):
|
|
3240
3167
|
@pulumi.getter(name="caPath")
|
3241
3168
|
def ca_path(self) -> Optional[str]:
|
3242
3169
|
"""
|
3243
|
-
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
3170
|
+
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
3244
3171
|
"""
|
3245
3172
|
return pulumi.get(self, "ca_path")
|
3246
3173
|
|
@@ -3248,7 +3175,7 @@ class SecretsMountElasticsearch(dict):
|
|
3248
3175
|
@pulumi.getter(name="clientCert")
|
3249
3176
|
def client_cert(self) -> Optional[str]:
|
3250
3177
|
"""
|
3251
|
-
The path to the certificate for the Elasticsearch client to present for communication
|
3178
|
+
The path to the certificate for the Elasticsearch client to present for communication
|
3252
3179
|
"""
|
3253
3180
|
return pulumi.get(self, "client_cert")
|
3254
3181
|
|
@@ -3256,13 +3183,13 @@ class SecretsMountElasticsearch(dict):
|
|
3256
3183
|
@pulumi.getter(name="clientKey")
|
3257
3184
|
def client_key(self) -> Optional[str]:
|
3258
3185
|
"""
|
3259
|
-
The path to the key for the Elasticsearch client to use for communication
|
3186
|
+
The path to the key for the Elasticsearch client to use for communication
|
3260
3187
|
"""
|
3261
3188
|
return pulumi.get(self, "client_key")
|
3262
3189
|
|
3263
3190
|
@property
|
3264
3191
|
@pulumi.getter
|
3265
|
-
def data(self) -> Optional[Mapping[str,
|
3192
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
3266
3193
|
"""
|
3267
3194
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3268
3195
|
|
@@ -3274,7 +3201,7 @@ class SecretsMountElasticsearch(dict):
|
|
3274
3201
|
@pulumi.getter
|
3275
3202
|
def insecure(self) -> Optional[bool]:
|
3276
3203
|
"""
|
3277
|
-
Whether to disable certificate verification
|
3204
|
+
Whether to disable certificate verification
|
3278
3205
|
"""
|
3279
3206
|
return pulumi.get(self, "insecure")
|
3280
3207
|
|
@@ -3298,7 +3225,7 @@ class SecretsMountElasticsearch(dict):
|
|
3298
3225
|
@pulumi.getter(name="tlsServerName")
|
3299
3226
|
def tls_server_name(self) -> Optional[str]:
|
3300
3227
|
"""
|
3301
|
-
This, if set, is used to set the SNI host when connecting via TLS
|
3228
|
+
This, if set, is used to set the SNI host when connecting via TLS
|
3302
3229
|
"""
|
3303
3230
|
return pulumi.get(self, "tls_server_name")
|
3304
3231
|
|
@@ -3306,7 +3233,7 @@ class SecretsMountElasticsearch(dict):
|
|
3306
3233
|
@pulumi.getter(name="usernameTemplate")
|
3307
3234
|
def username_template(self) -> Optional[str]:
|
3308
3235
|
"""
|
3309
|
-
|
3236
|
+
Template describing how dynamic usernames are generated.
|
3310
3237
|
"""
|
3311
3238
|
return pulumi.get(self, "username_template")
|
3312
3239
|
|
@@ -3359,7 +3286,7 @@ class SecretsMountHana(dict):
|
|
3359
3286
|
name: str,
|
3360
3287
|
allowed_roles: Optional[Sequence[str]] = None,
|
3361
3288
|
connection_url: Optional[str] = None,
|
3362
|
-
data: Optional[Mapping[str,
|
3289
|
+
data: Optional[Mapping[str, str]] = None,
|
3363
3290
|
disable_escaping: Optional[bool] = None,
|
3364
3291
|
max_connection_lifetime: Optional[int] = None,
|
3365
3292
|
max_idle_connections: Optional[int] = None,
|
@@ -3373,21 +3300,18 @@ class SecretsMountHana(dict):
|
|
3373
3300
|
:param str name: Name of the database connection.
|
3374
3301
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3375
3302
|
connection.
|
3376
|
-
:param str connection_url:
|
3377
|
-
|
3378
|
-
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3303
|
+
:param str connection_url: Connection string to use to connect to the database.
|
3304
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3379
3305
|
|
3380
3306
|
Supported list of database secrets engines that can be configured:
|
3381
|
-
:param bool disable_escaping: Disable special character escaping in username and password
|
3382
|
-
:param int max_connection_lifetime:
|
3383
|
-
:param int max_idle_connections:
|
3384
|
-
|
3385
|
-
:param
|
3386
|
-
the database.
|
3387
|
-
:param str password: The root credential password used in the connection URL.
|
3307
|
+
:param bool disable_escaping: Disable special character escaping in username and password
|
3308
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
3309
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
3310
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
3311
|
+
:param str password: The root credential password used in the connection URL
|
3388
3312
|
:param str plugin_name: Specifies the name of the plugin to use.
|
3389
3313
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
3390
|
-
:param str username: The root credential username used in the connection URL
|
3314
|
+
:param str username: The root credential username used in the connection URL
|
3391
3315
|
:param bool verify_connection: Whether the connection should be verified on
|
3392
3316
|
initial configuration or not.
|
3393
3317
|
"""
|
@@ -3438,14 +3362,13 @@ class SecretsMountHana(dict):
|
|
3438
3362
|
@pulumi.getter(name="connectionUrl")
|
3439
3363
|
def connection_url(self) -> Optional[str]:
|
3440
3364
|
"""
|
3441
|
-
|
3442
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
3365
|
+
Connection string to use to connect to the database.
|
3443
3366
|
"""
|
3444
3367
|
return pulumi.get(self, "connection_url")
|
3445
3368
|
|
3446
3369
|
@property
|
3447
3370
|
@pulumi.getter
|
3448
|
-
def data(self) -> Optional[Mapping[str,
|
3371
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
3449
3372
|
"""
|
3450
3373
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3451
3374
|
|
@@ -3457,7 +3380,7 @@ class SecretsMountHana(dict):
|
|
3457
3380
|
@pulumi.getter(name="disableEscaping")
|
3458
3381
|
def disable_escaping(self) -> Optional[bool]:
|
3459
3382
|
"""
|
3460
|
-
Disable special character escaping in username and password
|
3383
|
+
Disable special character escaping in username and password
|
3461
3384
|
"""
|
3462
3385
|
return pulumi.get(self, "disable_escaping")
|
3463
3386
|
|
@@ -3465,7 +3388,7 @@ class SecretsMountHana(dict):
|
|
3465
3388
|
@pulumi.getter(name="maxConnectionLifetime")
|
3466
3389
|
def max_connection_lifetime(self) -> Optional[int]:
|
3467
3390
|
"""
|
3468
|
-
|
3391
|
+
Maximum number of seconds a connection may be reused.
|
3469
3392
|
"""
|
3470
3393
|
return pulumi.get(self, "max_connection_lifetime")
|
3471
3394
|
|
@@ -3473,8 +3396,7 @@ class SecretsMountHana(dict):
|
|
3473
3396
|
@pulumi.getter(name="maxIdleConnections")
|
3474
3397
|
def max_idle_connections(self) -> Optional[int]:
|
3475
3398
|
"""
|
3476
|
-
|
3477
|
-
the database.
|
3399
|
+
Maximum number of idle connections to the database.
|
3478
3400
|
"""
|
3479
3401
|
return pulumi.get(self, "max_idle_connections")
|
3480
3402
|
|
@@ -3482,8 +3404,7 @@ class SecretsMountHana(dict):
|
|
3482
3404
|
@pulumi.getter(name="maxOpenConnections")
|
3483
3405
|
def max_open_connections(self) -> Optional[int]:
|
3484
3406
|
"""
|
3485
|
-
|
3486
|
-
the database.
|
3407
|
+
Maximum number of open connections to the database.
|
3487
3408
|
"""
|
3488
3409
|
return pulumi.get(self, "max_open_connections")
|
3489
3410
|
|
@@ -3491,7 +3412,7 @@ class SecretsMountHana(dict):
|
|
3491
3412
|
@pulumi.getter
|
3492
3413
|
def password(self) -> Optional[str]:
|
3493
3414
|
"""
|
3494
|
-
The root credential password used in the connection URL
|
3415
|
+
The root credential password used in the connection URL
|
3495
3416
|
"""
|
3496
3417
|
return pulumi.get(self, "password")
|
3497
3418
|
|
@@ -3515,7 +3436,7 @@ class SecretsMountHana(dict):
|
|
3515
3436
|
@pulumi.getter
|
3516
3437
|
def username(self) -> Optional[str]:
|
3517
3438
|
"""
|
3518
|
-
The root credential username used in the connection URL
|
3439
|
+
The root credential username used in the connection URL
|
3519
3440
|
"""
|
3520
3441
|
return pulumi.get(self, "username")
|
3521
3442
|
|
@@ -3571,7 +3492,7 @@ class SecretsMountInfluxdb(dict):
|
|
3571
3492
|
username: str,
|
3572
3493
|
allowed_roles: Optional[Sequence[str]] = None,
|
3573
3494
|
connect_timeout: Optional[int] = None,
|
3574
|
-
data: Optional[Mapping[str,
|
3495
|
+
data: Optional[Mapping[str, str]] = None,
|
3575
3496
|
insecure_tls: Optional[bool] = None,
|
3576
3497
|
pem_bundle: Optional[str] = None,
|
3577
3498
|
pem_json: Optional[str] = None,
|
@@ -3582,28 +3503,24 @@ class SecretsMountInfluxdb(dict):
|
|
3582
3503
|
username_template: Optional[str] = None,
|
3583
3504
|
verify_connection: Optional[bool] = None):
|
3584
3505
|
"""
|
3585
|
-
:param str host:
|
3506
|
+
:param str host: Influxdb host to connect to.
|
3586
3507
|
:param str name: Name of the database connection.
|
3587
|
-
:param str password:
|
3588
|
-
:param str username:
|
3508
|
+
:param str password: Specifies the password corresponding to the given username.
|
3509
|
+
:param str username: Specifies the username to use for superuser access.
|
3589
3510
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3590
3511
|
connection.
|
3591
|
-
:param int connect_timeout: The number of seconds to use as a connection
|
3592
|
-
|
3593
|
-
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3512
|
+
:param int connect_timeout: The number of seconds to use as a connection timeout.
|
3513
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3594
3514
|
|
3595
3515
|
Supported list of database secrets engines that can be configured:
|
3596
|
-
:param bool insecure_tls: Whether to skip verification of the server
|
3597
|
-
|
3598
|
-
:param str
|
3599
|
-
chain.
|
3600
|
-
:param str pem_json: A JSON structure configuring the certificate chain.
|
3516
|
+
:param bool insecure_tls: Whether to skip verification of the server certificate when using TLS.
|
3517
|
+
:param str pem_bundle: Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
3518
|
+
:param str pem_json: Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
3601
3519
|
:param str plugin_name: Specifies the name of the plugin to use.
|
3602
|
-
:param int port: The
|
3603
|
-
part of the host.
|
3520
|
+
:param int port: The transport port to use to connect to Influxdb.
|
3604
3521
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
3605
|
-
:param bool tls: Whether to use TLS when connecting to
|
3606
|
-
:param str username_template:
|
3522
|
+
:param bool tls: Whether to use TLS when connecting to Influxdb.
|
3523
|
+
:param str username_template: Template describing how dynamic usernames are generated.
|
3607
3524
|
:param bool verify_connection: Whether the connection should be verified on
|
3608
3525
|
initial configuration or not.
|
3609
3526
|
"""
|
@@ -3640,7 +3557,7 @@ class SecretsMountInfluxdb(dict):
|
|
3640
3557
|
@pulumi.getter
|
3641
3558
|
def host(self) -> str:
|
3642
3559
|
"""
|
3643
|
-
|
3560
|
+
Influxdb host to connect to.
|
3644
3561
|
"""
|
3645
3562
|
return pulumi.get(self, "host")
|
3646
3563
|
|
@@ -3656,7 +3573,7 @@ class SecretsMountInfluxdb(dict):
|
|
3656
3573
|
@pulumi.getter
|
3657
3574
|
def password(self) -> str:
|
3658
3575
|
"""
|
3659
|
-
|
3576
|
+
Specifies the password corresponding to the given username.
|
3660
3577
|
"""
|
3661
3578
|
return pulumi.get(self, "password")
|
3662
3579
|
|
@@ -3664,7 +3581,7 @@ class SecretsMountInfluxdb(dict):
|
|
3664
3581
|
@pulumi.getter
|
3665
3582
|
def username(self) -> str:
|
3666
3583
|
"""
|
3667
|
-
|
3584
|
+
Specifies the username to use for superuser access.
|
3668
3585
|
"""
|
3669
3586
|
return pulumi.get(self, "username")
|
3670
3587
|
|
@@ -3681,14 +3598,13 @@ class SecretsMountInfluxdb(dict):
|
|
3681
3598
|
@pulumi.getter(name="connectTimeout")
|
3682
3599
|
def connect_timeout(self) -> Optional[int]:
|
3683
3600
|
"""
|
3684
|
-
The number of seconds to use as a connection
|
3685
|
-
timeout.
|
3601
|
+
The number of seconds to use as a connection timeout.
|
3686
3602
|
"""
|
3687
3603
|
return pulumi.get(self, "connect_timeout")
|
3688
3604
|
|
3689
3605
|
@property
|
3690
3606
|
@pulumi.getter
|
3691
|
-
def data(self) -> Optional[Mapping[str,
|
3607
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
3692
3608
|
"""
|
3693
3609
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3694
3610
|
|
@@ -3700,8 +3616,7 @@ class SecretsMountInfluxdb(dict):
|
|
3700
3616
|
@pulumi.getter(name="insecureTls")
|
3701
3617
|
def insecure_tls(self) -> Optional[bool]:
|
3702
3618
|
"""
|
3703
|
-
Whether to skip verification of the server
|
3704
|
-
certificate when using TLS.
|
3619
|
+
Whether to skip verification of the server certificate when using TLS.
|
3705
3620
|
"""
|
3706
3621
|
return pulumi.get(self, "insecure_tls")
|
3707
3622
|
|
@@ -3709,8 +3624,7 @@ class SecretsMountInfluxdb(dict):
|
|
3709
3624
|
@pulumi.getter(name="pemBundle")
|
3710
3625
|
def pem_bundle(self) -> Optional[str]:
|
3711
3626
|
"""
|
3712
|
-
Concatenated PEM blocks
|
3713
|
-
chain.
|
3627
|
+
Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
3714
3628
|
"""
|
3715
3629
|
return pulumi.get(self, "pem_bundle")
|
3716
3630
|
|
@@ -3718,7 +3632,7 @@ class SecretsMountInfluxdb(dict):
|
|
3718
3632
|
@pulumi.getter(name="pemJson")
|
3719
3633
|
def pem_json(self) -> Optional[str]:
|
3720
3634
|
"""
|
3721
|
-
|
3635
|
+
Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
3722
3636
|
"""
|
3723
3637
|
return pulumi.get(self, "pem_json")
|
3724
3638
|
|
@@ -3734,8 +3648,7 @@ class SecretsMountInfluxdb(dict):
|
|
3734
3648
|
@pulumi.getter
|
3735
3649
|
def port(self) -> Optional[int]:
|
3736
3650
|
"""
|
3737
|
-
The
|
3738
|
-
part of the host.
|
3651
|
+
The transport port to use to connect to Influxdb.
|
3739
3652
|
"""
|
3740
3653
|
return pulumi.get(self, "port")
|
3741
3654
|
|
@@ -3751,7 +3664,7 @@ class SecretsMountInfluxdb(dict):
|
|
3751
3664
|
@pulumi.getter
|
3752
3665
|
def tls(self) -> Optional[bool]:
|
3753
3666
|
"""
|
3754
|
-
Whether to use TLS when connecting to
|
3667
|
+
Whether to use TLS when connecting to Influxdb.
|
3755
3668
|
"""
|
3756
3669
|
return pulumi.get(self, "tls")
|
3757
3670
|
|
@@ -3759,7 +3672,7 @@ class SecretsMountInfluxdb(dict):
|
|
3759
3672
|
@pulumi.getter(name="usernameTemplate")
|
3760
3673
|
def username_template(self) -> Optional[str]:
|
3761
3674
|
"""
|
3762
|
-
|
3675
|
+
Template describing how dynamic usernames are generated.
|
3763
3676
|
"""
|
3764
3677
|
return pulumi.get(self, "username_template")
|
3765
3678
|
|
@@ -3812,7 +3725,7 @@ class SecretsMountMongodb(dict):
|
|
3812
3725
|
name: str,
|
3813
3726
|
allowed_roles: Optional[Sequence[str]] = None,
|
3814
3727
|
connection_url: Optional[str] = None,
|
3815
|
-
data: Optional[Mapping[str,
|
3728
|
+
data: Optional[Mapping[str, str]] = None,
|
3816
3729
|
max_connection_lifetime: Optional[int] = None,
|
3817
3730
|
max_idle_connections: Optional[int] = None,
|
3818
3731
|
max_open_connections: Optional[int] = None,
|
@@ -3826,21 +3739,18 @@ class SecretsMountMongodb(dict):
|
|
3826
3739
|
:param str name: Name of the database connection.
|
3827
3740
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3828
3741
|
connection.
|
3829
|
-
:param str connection_url:
|
3830
|
-
|
3831
|
-
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3742
|
+
:param str connection_url: Connection string to use to connect to the database.
|
3743
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3832
3744
|
|
3833
3745
|
Supported list of database secrets engines that can be configured:
|
3834
|
-
:param int max_connection_lifetime:
|
3835
|
-
:param int max_idle_connections:
|
3836
|
-
|
3837
|
-
:param
|
3838
|
-
the database.
|
3839
|
-
:param str password: The root credential password used in the connection URL.
|
3746
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
3747
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
3748
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
3749
|
+
:param str password: The root credential password used in the connection URL
|
3840
3750
|
:param str plugin_name: Specifies the name of the plugin to use.
|
3841
3751
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
3842
|
-
:param str username: The root credential username used in the connection URL
|
3843
|
-
:param str username_template:
|
3752
|
+
:param str username: The root credential username used in the connection URL
|
3753
|
+
:param str username_template: Username generation template.
|
3844
3754
|
:param bool verify_connection: Whether the connection should be verified on
|
3845
3755
|
initial configuration or not.
|
3846
3756
|
"""
|
@@ -3891,14 +3801,13 @@ class SecretsMountMongodb(dict):
|
|
3891
3801
|
@pulumi.getter(name="connectionUrl")
|
3892
3802
|
def connection_url(self) -> Optional[str]:
|
3893
3803
|
"""
|
3894
|
-
|
3895
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
3804
|
+
Connection string to use to connect to the database.
|
3896
3805
|
"""
|
3897
3806
|
return pulumi.get(self, "connection_url")
|
3898
3807
|
|
3899
3808
|
@property
|
3900
3809
|
@pulumi.getter
|
3901
|
-
def data(self) -> Optional[Mapping[str,
|
3810
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
3902
3811
|
"""
|
3903
3812
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3904
3813
|
|
@@ -3910,7 +3819,7 @@ class SecretsMountMongodb(dict):
|
|
3910
3819
|
@pulumi.getter(name="maxConnectionLifetime")
|
3911
3820
|
def max_connection_lifetime(self) -> Optional[int]:
|
3912
3821
|
"""
|
3913
|
-
|
3822
|
+
Maximum number of seconds a connection may be reused.
|
3914
3823
|
"""
|
3915
3824
|
return pulumi.get(self, "max_connection_lifetime")
|
3916
3825
|
|
@@ -3918,8 +3827,7 @@ class SecretsMountMongodb(dict):
|
|
3918
3827
|
@pulumi.getter(name="maxIdleConnections")
|
3919
3828
|
def max_idle_connections(self) -> Optional[int]:
|
3920
3829
|
"""
|
3921
|
-
|
3922
|
-
the database.
|
3830
|
+
Maximum number of idle connections to the database.
|
3923
3831
|
"""
|
3924
3832
|
return pulumi.get(self, "max_idle_connections")
|
3925
3833
|
|
@@ -3927,8 +3835,7 @@ class SecretsMountMongodb(dict):
|
|
3927
3835
|
@pulumi.getter(name="maxOpenConnections")
|
3928
3836
|
def max_open_connections(self) -> Optional[int]:
|
3929
3837
|
"""
|
3930
|
-
|
3931
|
-
the database.
|
3838
|
+
Maximum number of open connections to the database.
|
3932
3839
|
"""
|
3933
3840
|
return pulumi.get(self, "max_open_connections")
|
3934
3841
|
|
@@ -3936,7 +3843,7 @@ class SecretsMountMongodb(dict):
|
|
3936
3843
|
@pulumi.getter
|
3937
3844
|
def password(self) -> Optional[str]:
|
3938
3845
|
"""
|
3939
|
-
The root credential password used in the connection URL
|
3846
|
+
The root credential password used in the connection URL
|
3940
3847
|
"""
|
3941
3848
|
return pulumi.get(self, "password")
|
3942
3849
|
|
@@ -3960,7 +3867,7 @@ class SecretsMountMongodb(dict):
|
|
3960
3867
|
@pulumi.getter
|
3961
3868
|
def username(self) -> Optional[str]:
|
3962
3869
|
"""
|
3963
|
-
The root credential username used in the connection URL
|
3870
|
+
The root credential username used in the connection URL
|
3964
3871
|
"""
|
3965
3872
|
return pulumi.get(self, "username")
|
3966
3873
|
|
@@ -3968,7 +3875,7 @@ class SecretsMountMongodb(dict):
|
|
3968
3875
|
@pulumi.getter(name="usernameTemplate")
|
3969
3876
|
def username_template(self) -> Optional[str]:
|
3970
3877
|
"""
|
3971
|
-
|
3878
|
+
Username generation template.
|
3972
3879
|
"""
|
3973
3880
|
return pulumi.get(self, "username_template")
|
3974
3881
|
|
@@ -4019,7 +3926,7 @@ class SecretsMountMongodbatla(dict):
|
|
4019
3926
|
project_id: str,
|
4020
3927
|
public_key: str,
|
4021
3928
|
allowed_roles: Optional[Sequence[str]] = None,
|
4022
|
-
data: Optional[Mapping[str,
|
3929
|
+
data: Optional[Mapping[str, str]] = None,
|
4023
3930
|
plugin_name: Optional[str] = None,
|
4024
3931
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
4025
3932
|
verify_connection: Optional[bool] = None):
|
@@ -4030,7 +3937,7 @@ class SecretsMountMongodbatla(dict):
|
|
4030
3937
|
:param str public_key: The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
|
4031
3938
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
4032
3939
|
connection.
|
4033
|
-
:param Mapping[str,
|
3940
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4034
3941
|
|
4035
3942
|
Supported list of database secrets engines that can be configured:
|
4036
3943
|
:param str plugin_name: Specifies the name of the plugin to use.
|
@@ -4096,7 +4003,7 @@ class SecretsMountMongodbatla(dict):
|
|
4096
4003
|
|
4097
4004
|
@property
|
4098
4005
|
@pulumi.getter
|
4099
|
-
def data(self) -> Optional[Mapping[str,
|
4006
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
4100
4007
|
"""
|
4101
4008
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4102
4009
|
|
@@ -4174,7 +4081,7 @@ class SecretsMountMssql(dict):
|
|
4174
4081
|
allowed_roles: Optional[Sequence[str]] = None,
|
4175
4082
|
connection_url: Optional[str] = None,
|
4176
4083
|
contained_db: Optional[bool] = None,
|
4177
|
-
data: Optional[Mapping[str,
|
4084
|
+
data: Optional[Mapping[str, str]] = None,
|
4178
4085
|
disable_escaping: Optional[bool] = None,
|
4179
4086
|
max_connection_lifetime: Optional[int] = None,
|
4180
4087
|
max_idle_connections: Optional[int] = None,
|
@@ -4189,25 +4096,20 @@ class SecretsMountMssql(dict):
|
|
4189
4096
|
:param str name: Name of the database connection.
|
4190
4097
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
4191
4098
|
connection.
|
4192
|
-
:param str connection_url:
|
4193
|
-
|
4194
|
-
:param
|
4195
|
-
Contained Database, e.g. AzureSQL.
|
4196
|
-
See [Vault docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
|
4197
|
-
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4099
|
+
:param str connection_url: Connection string to use to connect to the database.
|
4100
|
+
:param bool contained_db: Set to true when the target is a Contained Database, e.g. AzureSQL.
|
4101
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4198
4102
|
|
4199
4103
|
Supported list of database secrets engines that can be configured:
|
4200
|
-
:param bool disable_escaping: Disable special character escaping in username and password
|
4201
|
-
:param int max_connection_lifetime:
|
4202
|
-
:param int max_idle_connections:
|
4203
|
-
|
4204
|
-
:param
|
4205
|
-
the database.
|
4206
|
-
:param str password: The root credential password used in the connection URL.
|
4104
|
+
:param bool disable_escaping: Disable special character escaping in username and password
|
4105
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
4106
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
4107
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
4108
|
+
:param str password: The root credential password used in the connection URL
|
4207
4109
|
:param str plugin_name: Specifies the name of the plugin to use.
|
4208
4110
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
4209
|
-
:param str username: The root credential username used in the connection URL
|
4210
|
-
:param str username_template:
|
4111
|
+
:param str username: The root credential username used in the connection URL
|
4112
|
+
:param str username_template: Username generation template.
|
4211
4113
|
:param bool verify_connection: Whether the connection should be verified on
|
4212
4114
|
initial configuration or not.
|
4213
4115
|
"""
|
@@ -4262,8 +4164,7 @@ class SecretsMountMssql(dict):
|
|
4262
4164
|
@pulumi.getter(name="connectionUrl")
|
4263
4165
|
def connection_url(self) -> Optional[str]:
|
4264
4166
|
"""
|
4265
|
-
|
4266
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4167
|
+
Connection string to use to connect to the database.
|
4267
4168
|
"""
|
4268
4169
|
return pulumi.get(self, "connection_url")
|
4269
4170
|
|
@@ -4271,15 +4172,13 @@ class SecretsMountMssql(dict):
|
|
4271
4172
|
@pulumi.getter(name="containedDb")
|
4272
4173
|
def contained_db(self) -> Optional[bool]:
|
4273
4174
|
"""
|
4274
|
-
|
4275
|
-
Contained Database, e.g. AzureSQL.
|
4276
|
-
See [Vault docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
|
4175
|
+
Set to true when the target is a Contained Database, e.g. AzureSQL.
|
4277
4176
|
"""
|
4278
4177
|
return pulumi.get(self, "contained_db")
|
4279
4178
|
|
4280
4179
|
@property
|
4281
4180
|
@pulumi.getter
|
4282
|
-
def data(self) -> Optional[Mapping[str,
|
4181
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
4283
4182
|
"""
|
4284
4183
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4285
4184
|
|
@@ -4291,7 +4190,7 @@ class SecretsMountMssql(dict):
|
|
4291
4190
|
@pulumi.getter(name="disableEscaping")
|
4292
4191
|
def disable_escaping(self) -> Optional[bool]:
|
4293
4192
|
"""
|
4294
|
-
Disable special character escaping in username and password
|
4193
|
+
Disable special character escaping in username and password
|
4295
4194
|
"""
|
4296
4195
|
return pulumi.get(self, "disable_escaping")
|
4297
4196
|
|
@@ -4299,7 +4198,7 @@ class SecretsMountMssql(dict):
|
|
4299
4198
|
@pulumi.getter(name="maxConnectionLifetime")
|
4300
4199
|
def max_connection_lifetime(self) -> Optional[int]:
|
4301
4200
|
"""
|
4302
|
-
|
4201
|
+
Maximum number of seconds a connection may be reused.
|
4303
4202
|
"""
|
4304
4203
|
return pulumi.get(self, "max_connection_lifetime")
|
4305
4204
|
|
@@ -4307,8 +4206,7 @@ class SecretsMountMssql(dict):
|
|
4307
4206
|
@pulumi.getter(name="maxIdleConnections")
|
4308
4207
|
def max_idle_connections(self) -> Optional[int]:
|
4309
4208
|
"""
|
4310
|
-
|
4311
|
-
the database.
|
4209
|
+
Maximum number of idle connections to the database.
|
4312
4210
|
"""
|
4313
4211
|
return pulumi.get(self, "max_idle_connections")
|
4314
4212
|
|
@@ -4316,8 +4214,7 @@ class SecretsMountMssql(dict):
|
|
4316
4214
|
@pulumi.getter(name="maxOpenConnections")
|
4317
4215
|
def max_open_connections(self) -> Optional[int]:
|
4318
4216
|
"""
|
4319
|
-
|
4320
|
-
the database.
|
4217
|
+
Maximum number of open connections to the database.
|
4321
4218
|
"""
|
4322
4219
|
return pulumi.get(self, "max_open_connections")
|
4323
4220
|
|
@@ -4325,7 +4222,7 @@ class SecretsMountMssql(dict):
|
|
4325
4222
|
@pulumi.getter
|
4326
4223
|
def password(self) -> Optional[str]:
|
4327
4224
|
"""
|
4328
|
-
The root credential password used in the connection URL
|
4225
|
+
The root credential password used in the connection URL
|
4329
4226
|
"""
|
4330
4227
|
return pulumi.get(self, "password")
|
4331
4228
|
|
@@ -4349,7 +4246,7 @@ class SecretsMountMssql(dict):
|
|
4349
4246
|
@pulumi.getter
|
4350
4247
|
def username(self) -> Optional[str]:
|
4351
4248
|
"""
|
4352
|
-
The root credential username used in the connection URL
|
4249
|
+
The root credential username used in the connection URL
|
4353
4250
|
"""
|
4354
4251
|
return pulumi.get(self, "username")
|
4355
4252
|
|
@@ -4357,7 +4254,7 @@ class SecretsMountMssql(dict):
|
|
4357
4254
|
@pulumi.getter(name="usernameTemplate")
|
4358
4255
|
def username_template(self) -> Optional[str]:
|
4359
4256
|
"""
|
4360
|
-
|
4257
|
+
Username generation template.
|
4361
4258
|
"""
|
4362
4259
|
return pulumi.get(self, "username_template")
|
4363
4260
|
|
@@ -4419,7 +4316,7 @@ class SecretsMountMysql(dict):
|
|
4419
4316
|
allowed_roles: Optional[Sequence[str]] = None,
|
4420
4317
|
auth_type: Optional[str] = None,
|
4421
4318
|
connection_url: Optional[str] = None,
|
4422
|
-
data: Optional[Mapping[str,
|
4319
|
+
data: Optional[Mapping[str, str]] = None,
|
4423
4320
|
max_connection_lifetime: Optional[int] = None,
|
4424
4321
|
max_idle_connections: Optional[int] = None,
|
4425
4322
|
max_open_connections: Optional[int] = None,
|
@@ -4437,24 +4334,21 @@ class SecretsMountMysql(dict):
|
|
4437
4334
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
4438
4335
|
connection.
|
4439
4336
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4440
|
-
:param str connection_url:
|
4441
|
-
|
4442
|
-
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4337
|
+
:param str connection_url: Connection string to use to connect to the database.
|
4338
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4443
4339
|
|
4444
4340
|
Supported list of database secrets engines that can be configured:
|
4445
|
-
:param int max_connection_lifetime:
|
4446
|
-
:param int max_idle_connections:
|
4447
|
-
|
4448
|
-
:param
|
4449
|
-
the database.
|
4450
|
-
:param str password: The root credential password used in the connection URL.
|
4341
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
4342
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
4343
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
4344
|
+
:param str password: The root credential password used in the connection URL
|
4451
4345
|
:param str plugin_name: Specifies the name of the plugin to use.
|
4452
4346
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
4453
4347
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
4454
4348
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
4455
4349
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
4456
|
-
:param str username: The root credential username used in the connection URL
|
4457
|
-
:param str username_template:
|
4350
|
+
:param str username: The root credential username used in the connection URL
|
4351
|
+
:param str username_template: Username generation template.
|
4458
4352
|
:param bool verify_connection: Whether the connection should be verified on
|
4459
4353
|
initial configuration or not.
|
4460
4354
|
"""
|
@@ -4521,14 +4415,13 @@ class SecretsMountMysql(dict):
|
|
4521
4415
|
@pulumi.getter(name="connectionUrl")
|
4522
4416
|
def connection_url(self) -> Optional[str]:
|
4523
4417
|
"""
|
4524
|
-
|
4525
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4418
|
+
Connection string to use to connect to the database.
|
4526
4419
|
"""
|
4527
4420
|
return pulumi.get(self, "connection_url")
|
4528
4421
|
|
4529
4422
|
@property
|
4530
4423
|
@pulumi.getter
|
4531
|
-
def data(self) -> Optional[Mapping[str,
|
4424
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
4532
4425
|
"""
|
4533
4426
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4534
4427
|
|
@@ -4540,7 +4433,7 @@ class SecretsMountMysql(dict):
|
|
4540
4433
|
@pulumi.getter(name="maxConnectionLifetime")
|
4541
4434
|
def max_connection_lifetime(self) -> Optional[int]:
|
4542
4435
|
"""
|
4543
|
-
|
4436
|
+
Maximum number of seconds a connection may be reused.
|
4544
4437
|
"""
|
4545
4438
|
return pulumi.get(self, "max_connection_lifetime")
|
4546
4439
|
|
@@ -4548,8 +4441,7 @@ class SecretsMountMysql(dict):
|
|
4548
4441
|
@pulumi.getter(name="maxIdleConnections")
|
4549
4442
|
def max_idle_connections(self) -> Optional[int]:
|
4550
4443
|
"""
|
4551
|
-
|
4552
|
-
the database.
|
4444
|
+
Maximum number of idle connections to the database.
|
4553
4445
|
"""
|
4554
4446
|
return pulumi.get(self, "max_idle_connections")
|
4555
4447
|
|
@@ -4557,8 +4449,7 @@ class SecretsMountMysql(dict):
|
|
4557
4449
|
@pulumi.getter(name="maxOpenConnections")
|
4558
4450
|
def max_open_connections(self) -> Optional[int]:
|
4559
4451
|
"""
|
4560
|
-
|
4561
|
-
the database.
|
4452
|
+
Maximum number of open connections to the database.
|
4562
4453
|
"""
|
4563
4454
|
return pulumi.get(self, "max_open_connections")
|
4564
4455
|
|
@@ -4566,7 +4457,7 @@ class SecretsMountMysql(dict):
|
|
4566
4457
|
@pulumi.getter
|
4567
4458
|
def password(self) -> Optional[str]:
|
4568
4459
|
"""
|
4569
|
-
The root credential password used in the connection URL
|
4460
|
+
The root credential password used in the connection URL
|
4570
4461
|
"""
|
4571
4462
|
return pulumi.get(self, "password")
|
4572
4463
|
|
@@ -4614,7 +4505,7 @@ class SecretsMountMysql(dict):
|
|
4614
4505
|
@pulumi.getter
|
4615
4506
|
def username(self) -> Optional[str]:
|
4616
4507
|
"""
|
4617
|
-
The root credential username used in the connection URL
|
4508
|
+
The root credential username used in the connection URL
|
4618
4509
|
"""
|
4619
4510
|
return pulumi.get(self, "username")
|
4620
4511
|
|
@@ -4622,7 +4513,7 @@ class SecretsMountMysql(dict):
|
|
4622
4513
|
@pulumi.getter(name="usernameTemplate")
|
4623
4514
|
def username_template(self) -> Optional[str]:
|
4624
4515
|
"""
|
4625
|
-
|
4516
|
+
Username generation template.
|
4626
4517
|
"""
|
4627
4518
|
return pulumi.get(self, "username_template")
|
4628
4519
|
|
@@ -4684,7 +4575,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4684
4575
|
allowed_roles: Optional[Sequence[str]] = None,
|
4685
4576
|
auth_type: Optional[str] = None,
|
4686
4577
|
connection_url: Optional[str] = None,
|
4687
|
-
data: Optional[Mapping[str,
|
4578
|
+
data: Optional[Mapping[str, str]] = None,
|
4688
4579
|
max_connection_lifetime: Optional[int] = None,
|
4689
4580
|
max_idle_connections: Optional[int] = None,
|
4690
4581
|
max_open_connections: Optional[int] = None,
|
@@ -4702,24 +4593,21 @@ class SecretsMountMysqlAurora(dict):
|
|
4702
4593
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
4703
4594
|
connection.
|
4704
4595
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4705
|
-
:param str connection_url:
|
4706
|
-
|
4707
|
-
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4596
|
+
:param str connection_url: Connection string to use to connect to the database.
|
4597
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4708
4598
|
|
4709
4599
|
Supported list of database secrets engines that can be configured:
|
4710
|
-
:param int max_connection_lifetime:
|
4711
|
-
:param int max_idle_connections:
|
4712
|
-
|
4713
|
-
:param
|
4714
|
-
the database.
|
4715
|
-
:param str password: The root credential password used in the connection URL.
|
4600
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
4601
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
4602
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
4603
|
+
:param str password: The root credential password used in the connection URL
|
4716
4604
|
:param str plugin_name: Specifies the name of the plugin to use.
|
4717
4605
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
4718
4606
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
4719
4607
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
4720
4608
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
4721
|
-
:param str username: The root credential username used in the connection URL
|
4722
|
-
:param str username_template:
|
4609
|
+
:param str username: The root credential username used in the connection URL
|
4610
|
+
:param str username_template: Username generation template.
|
4723
4611
|
:param bool verify_connection: Whether the connection should be verified on
|
4724
4612
|
initial configuration or not.
|
4725
4613
|
"""
|
@@ -4786,14 +4674,13 @@ class SecretsMountMysqlAurora(dict):
|
|
4786
4674
|
@pulumi.getter(name="connectionUrl")
|
4787
4675
|
def connection_url(self) -> Optional[str]:
|
4788
4676
|
"""
|
4789
|
-
|
4790
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4677
|
+
Connection string to use to connect to the database.
|
4791
4678
|
"""
|
4792
4679
|
return pulumi.get(self, "connection_url")
|
4793
4680
|
|
4794
4681
|
@property
|
4795
4682
|
@pulumi.getter
|
4796
|
-
def data(self) -> Optional[Mapping[str,
|
4683
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
4797
4684
|
"""
|
4798
4685
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4799
4686
|
|
@@ -4805,7 +4692,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4805
4692
|
@pulumi.getter(name="maxConnectionLifetime")
|
4806
4693
|
def max_connection_lifetime(self) -> Optional[int]:
|
4807
4694
|
"""
|
4808
|
-
|
4695
|
+
Maximum number of seconds a connection may be reused.
|
4809
4696
|
"""
|
4810
4697
|
return pulumi.get(self, "max_connection_lifetime")
|
4811
4698
|
|
@@ -4813,8 +4700,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4813
4700
|
@pulumi.getter(name="maxIdleConnections")
|
4814
4701
|
def max_idle_connections(self) -> Optional[int]:
|
4815
4702
|
"""
|
4816
|
-
|
4817
|
-
the database.
|
4703
|
+
Maximum number of idle connections to the database.
|
4818
4704
|
"""
|
4819
4705
|
return pulumi.get(self, "max_idle_connections")
|
4820
4706
|
|
@@ -4822,8 +4708,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4822
4708
|
@pulumi.getter(name="maxOpenConnections")
|
4823
4709
|
def max_open_connections(self) -> Optional[int]:
|
4824
4710
|
"""
|
4825
|
-
|
4826
|
-
the database.
|
4711
|
+
Maximum number of open connections to the database.
|
4827
4712
|
"""
|
4828
4713
|
return pulumi.get(self, "max_open_connections")
|
4829
4714
|
|
@@ -4831,7 +4716,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4831
4716
|
@pulumi.getter
|
4832
4717
|
def password(self) -> Optional[str]:
|
4833
4718
|
"""
|
4834
|
-
The root credential password used in the connection URL
|
4719
|
+
The root credential password used in the connection URL
|
4835
4720
|
"""
|
4836
4721
|
return pulumi.get(self, "password")
|
4837
4722
|
|
@@ -4879,7 +4764,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4879
4764
|
@pulumi.getter
|
4880
4765
|
def username(self) -> Optional[str]:
|
4881
4766
|
"""
|
4882
|
-
The root credential username used in the connection URL
|
4767
|
+
The root credential username used in the connection URL
|
4883
4768
|
"""
|
4884
4769
|
return pulumi.get(self, "username")
|
4885
4770
|
|
@@ -4887,7 +4772,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4887
4772
|
@pulumi.getter(name="usernameTemplate")
|
4888
4773
|
def username_template(self) -> Optional[str]:
|
4889
4774
|
"""
|
4890
|
-
|
4775
|
+
Username generation template.
|
4891
4776
|
"""
|
4892
4777
|
return pulumi.get(self, "username_template")
|
4893
4778
|
|
@@ -4949,7 +4834,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
4949
4834
|
allowed_roles: Optional[Sequence[str]] = None,
|
4950
4835
|
auth_type: Optional[str] = None,
|
4951
4836
|
connection_url: Optional[str] = None,
|
4952
|
-
data: Optional[Mapping[str,
|
4837
|
+
data: Optional[Mapping[str, str]] = None,
|
4953
4838
|
max_connection_lifetime: Optional[int] = None,
|
4954
4839
|
max_idle_connections: Optional[int] = None,
|
4955
4840
|
max_open_connections: Optional[int] = None,
|
@@ -4967,24 +4852,21 @@ class SecretsMountMysqlLegacy(dict):
|
|
4967
4852
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
4968
4853
|
connection.
|
4969
4854
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4970
|
-
:param str connection_url:
|
4971
|
-
|
4972
|
-
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4855
|
+
:param str connection_url: Connection string to use to connect to the database.
|
4856
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4973
4857
|
|
4974
4858
|
Supported list of database secrets engines that can be configured:
|
4975
|
-
:param int max_connection_lifetime:
|
4976
|
-
:param int max_idle_connections:
|
4977
|
-
|
4978
|
-
:param
|
4979
|
-
the database.
|
4980
|
-
:param str password: The root credential password used in the connection URL.
|
4859
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
4860
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
4861
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
4862
|
+
:param str password: The root credential password used in the connection URL
|
4981
4863
|
:param str plugin_name: Specifies the name of the plugin to use.
|
4982
4864
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
4983
4865
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
4984
4866
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
4985
4867
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
4986
|
-
:param str username: The root credential username used in the connection URL
|
4987
|
-
:param str username_template:
|
4868
|
+
:param str username: The root credential username used in the connection URL
|
4869
|
+
:param str username_template: Username generation template.
|
4988
4870
|
:param bool verify_connection: Whether the connection should be verified on
|
4989
4871
|
initial configuration or not.
|
4990
4872
|
"""
|
@@ -5051,14 +4933,13 @@ class SecretsMountMysqlLegacy(dict):
|
|
5051
4933
|
@pulumi.getter(name="connectionUrl")
|
5052
4934
|
def connection_url(self) -> Optional[str]:
|
5053
4935
|
"""
|
5054
|
-
|
5055
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4936
|
+
Connection string to use to connect to the database.
|
5056
4937
|
"""
|
5057
4938
|
return pulumi.get(self, "connection_url")
|
5058
4939
|
|
5059
4940
|
@property
|
5060
4941
|
@pulumi.getter
|
5061
|
-
def data(self) -> Optional[Mapping[str,
|
4942
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
5062
4943
|
"""
|
5063
4944
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5064
4945
|
|
@@ -5070,7 +4951,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
5070
4951
|
@pulumi.getter(name="maxConnectionLifetime")
|
5071
4952
|
def max_connection_lifetime(self) -> Optional[int]:
|
5072
4953
|
"""
|
5073
|
-
|
4954
|
+
Maximum number of seconds a connection may be reused.
|
5074
4955
|
"""
|
5075
4956
|
return pulumi.get(self, "max_connection_lifetime")
|
5076
4957
|
|
@@ -5078,8 +4959,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
5078
4959
|
@pulumi.getter(name="maxIdleConnections")
|
5079
4960
|
def max_idle_connections(self) -> Optional[int]:
|
5080
4961
|
"""
|
5081
|
-
|
5082
|
-
the database.
|
4962
|
+
Maximum number of idle connections to the database.
|
5083
4963
|
"""
|
5084
4964
|
return pulumi.get(self, "max_idle_connections")
|
5085
4965
|
|
@@ -5087,8 +4967,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
5087
4967
|
@pulumi.getter(name="maxOpenConnections")
|
5088
4968
|
def max_open_connections(self) -> Optional[int]:
|
5089
4969
|
"""
|
5090
|
-
|
5091
|
-
the database.
|
4970
|
+
Maximum number of open connections to the database.
|
5092
4971
|
"""
|
5093
4972
|
return pulumi.get(self, "max_open_connections")
|
5094
4973
|
|
@@ -5096,7 +4975,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
5096
4975
|
@pulumi.getter
|
5097
4976
|
def password(self) -> Optional[str]:
|
5098
4977
|
"""
|
5099
|
-
The root credential password used in the connection URL
|
4978
|
+
The root credential password used in the connection URL
|
5100
4979
|
"""
|
5101
4980
|
return pulumi.get(self, "password")
|
5102
4981
|
|
@@ -5144,7 +5023,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
5144
5023
|
@pulumi.getter
|
5145
5024
|
def username(self) -> Optional[str]:
|
5146
5025
|
"""
|
5147
|
-
The root credential username used in the connection URL
|
5026
|
+
The root credential username used in the connection URL
|
5148
5027
|
"""
|
5149
5028
|
return pulumi.get(self, "username")
|
5150
5029
|
|
@@ -5152,7 +5031,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
5152
5031
|
@pulumi.getter(name="usernameTemplate")
|
5153
5032
|
def username_template(self) -> Optional[str]:
|
5154
5033
|
"""
|
5155
|
-
|
5034
|
+
Username generation template.
|
5156
5035
|
"""
|
5157
5036
|
return pulumi.get(self, "username_template")
|
5158
5037
|
|
@@ -5214,7 +5093,7 @@ class SecretsMountMysqlRd(dict):
|
|
5214
5093
|
allowed_roles: Optional[Sequence[str]] = None,
|
5215
5094
|
auth_type: Optional[str] = None,
|
5216
5095
|
connection_url: Optional[str] = None,
|
5217
|
-
data: Optional[Mapping[str,
|
5096
|
+
data: Optional[Mapping[str, str]] = None,
|
5218
5097
|
max_connection_lifetime: Optional[int] = None,
|
5219
5098
|
max_idle_connections: Optional[int] = None,
|
5220
5099
|
max_open_connections: Optional[int] = None,
|
@@ -5232,24 +5111,21 @@ class SecretsMountMysqlRd(dict):
|
|
5232
5111
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
5233
5112
|
connection.
|
5234
5113
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5235
|
-
:param str connection_url:
|
5236
|
-
|
5237
|
-
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5114
|
+
:param str connection_url: Connection string to use to connect to the database.
|
5115
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5238
5116
|
|
5239
5117
|
Supported list of database secrets engines that can be configured:
|
5240
|
-
:param int max_connection_lifetime:
|
5241
|
-
:param int max_idle_connections:
|
5242
|
-
|
5243
|
-
:param
|
5244
|
-
the database.
|
5245
|
-
:param str password: The root credential password used in the connection URL.
|
5118
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
5119
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
5120
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
5121
|
+
:param str password: The root credential password used in the connection URL
|
5246
5122
|
:param str plugin_name: Specifies the name of the plugin to use.
|
5247
5123
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5248
5124
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
5249
5125
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
5250
5126
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
5251
|
-
:param str username: The root credential username used in the connection URL
|
5252
|
-
:param str username_template:
|
5127
|
+
:param str username: The root credential username used in the connection URL
|
5128
|
+
:param str username_template: Username generation template.
|
5253
5129
|
:param bool verify_connection: Whether the connection should be verified on
|
5254
5130
|
initial configuration or not.
|
5255
5131
|
"""
|
@@ -5316,14 +5192,13 @@ class SecretsMountMysqlRd(dict):
|
|
5316
5192
|
@pulumi.getter(name="connectionUrl")
|
5317
5193
|
def connection_url(self) -> Optional[str]:
|
5318
5194
|
"""
|
5319
|
-
|
5320
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
5195
|
+
Connection string to use to connect to the database.
|
5321
5196
|
"""
|
5322
5197
|
return pulumi.get(self, "connection_url")
|
5323
5198
|
|
5324
5199
|
@property
|
5325
5200
|
@pulumi.getter
|
5326
|
-
def data(self) -> Optional[Mapping[str,
|
5201
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
5327
5202
|
"""
|
5328
5203
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5329
5204
|
|
@@ -5335,7 +5210,7 @@ class SecretsMountMysqlRd(dict):
|
|
5335
5210
|
@pulumi.getter(name="maxConnectionLifetime")
|
5336
5211
|
def max_connection_lifetime(self) -> Optional[int]:
|
5337
5212
|
"""
|
5338
|
-
|
5213
|
+
Maximum number of seconds a connection may be reused.
|
5339
5214
|
"""
|
5340
5215
|
return pulumi.get(self, "max_connection_lifetime")
|
5341
5216
|
|
@@ -5343,8 +5218,7 @@ class SecretsMountMysqlRd(dict):
|
|
5343
5218
|
@pulumi.getter(name="maxIdleConnections")
|
5344
5219
|
def max_idle_connections(self) -> Optional[int]:
|
5345
5220
|
"""
|
5346
|
-
|
5347
|
-
the database.
|
5221
|
+
Maximum number of idle connections to the database.
|
5348
5222
|
"""
|
5349
5223
|
return pulumi.get(self, "max_idle_connections")
|
5350
5224
|
|
@@ -5352,8 +5226,7 @@ class SecretsMountMysqlRd(dict):
|
|
5352
5226
|
@pulumi.getter(name="maxOpenConnections")
|
5353
5227
|
def max_open_connections(self) -> Optional[int]:
|
5354
5228
|
"""
|
5355
|
-
|
5356
|
-
the database.
|
5229
|
+
Maximum number of open connections to the database.
|
5357
5230
|
"""
|
5358
5231
|
return pulumi.get(self, "max_open_connections")
|
5359
5232
|
|
@@ -5361,7 +5234,7 @@ class SecretsMountMysqlRd(dict):
|
|
5361
5234
|
@pulumi.getter
|
5362
5235
|
def password(self) -> Optional[str]:
|
5363
5236
|
"""
|
5364
|
-
The root credential password used in the connection URL
|
5237
|
+
The root credential password used in the connection URL
|
5365
5238
|
"""
|
5366
5239
|
return pulumi.get(self, "password")
|
5367
5240
|
|
@@ -5409,7 +5282,7 @@ class SecretsMountMysqlRd(dict):
|
|
5409
5282
|
@pulumi.getter
|
5410
5283
|
def username(self) -> Optional[str]:
|
5411
5284
|
"""
|
5412
|
-
The root credential username used in the connection URL
|
5285
|
+
The root credential username used in the connection URL
|
5413
5286
|
"""
|
5414
5287
|
return pulumi.get(self, "username")
|
5415
5288
|
|
@@ -5417,7 +5290,7 @@ class SecretsMountMysqlRd(dict):
|
|
5417
5290
|
@pulumi.getter(name="usernameTemplate")
|
5418
5291
|
def username_template(self) -> Optional[str]:
|
5419
5292
|
"""
|
5420
|
-
|
5293
|
+
Username generation template.
|
5421
5294
|
"""
|
5422
5295
|
return pulumi.get(self, "username_template")
|
5423
5296
|
|
@@ -5474,7 +5347,7 @@ class SecretsMountOracle(dict):
|
|
5474
5347
|
name: str,
|
5475
5348
|
allowed_roles: Optional[Sequence[str]] = None,
|
5476
5349
|
connection_url: Optional[str] = None,
|
5477
|
-
data: Optional[Mapping[str,
|
5350
|
+
data: Optional[Mapping[str, str]] = None,
|
5478
5351
|
disconnect_sessions: Optional[bool] = None,
|
5479
5352
|
max_connection_lifetime: Optional[int] = None,
|
5480
5353
|
max_idle_connections: Optional[int] = None,
|
@@ -5490,23 +5363,20 @@ class SecretsMountOracle(dict):
|
|
5490
5363
|
:param str name: Name of the database connection.
|
5491
5364
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
5492
5365
|
connection.
|
5493
|
-
:param str connection_url:
|
5494
|
-
|
5495
|
-
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5366
|
+
:param str connection_url: Connection string to use to connect to the database.
|
5367
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5496
5368
|
|
5497
5369
|
Supported list of database secrets engines that can be configured:
|
5498
5370
|
:param bool disconnect_sessions: Set to true to disconnect any open sessions prior to running the revocation statements.
|
5499
|
-
:param int max_connection_lifetime:
|
5500
|
-
:param int max_idle_connections:
|
5501
|
-
|
5502
|
-
:param
|
5503
|
-
the database.
|
5504
|
-
:param str password: The root credential password used in the connection URL.
|
5371
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
5372
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
5373
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
5374
|
+
:param str password: The root credential password used in the connection URL
|
5505
5375
|
:param str plugin_name: Specifies the name of the plugin to use.
|
5506
5376
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5507
5377
|
:param bool split_statements: Set to true in order to split statements after semi-colons.
|
5508
|
-
:param str username: The root credential username used in the connection URL
|
5509
|
-
:param str username_template:
|
5378
|
+
:param str username: The root credential username used in the connection URL
|
5379
|
+
:param str username_template: Username generation template.
|
5510
5380
|
:param bool verify_connection: Whether the connection should be verified on
|
5511
5381
|
initial configuration or not.
|
5512
5382
|
"""
|
@@ -5561,14 +5431,13 @@ class SecretsMountOracle(dict):
|
|
5561
5431
|
@pulumi.getter(name="connectionUrl")
|
5562
5432
|
def connection_url(self) -> Optional[str]:
|
5563
5433
|
"""
|
5564
|
-
|
5565
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
5434
|
+
Connection string to use to connect to the database.
|
5566
5435
|
"""
|
5567
5436
|
return pulumi.get(self, "connection_url")
|
5568
5437
|
|
5569
5438
|
@property
|
5570
5439
|
@pulumi.getter
|
5571
|
-
def data(self) -> Optional[Mapping[str,
|
5440
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
5572
5441
|
"""
|
5573
5442
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5574
5443
|
|
@@ -5588,7 +5457,7 @@ class SecretsMountOracle(dict):
|
|
5588
5457
|
@pulumi.getter(name="maxConnectionLifetime")
|
5589
5458
|
def max_connection_lifetime(self) -> Optional[int]:
|
5590
5459
|
"""
|
5591
|
-
|
5460
|
+
Maximum number of seconds a connection may be reused.
|
5592
5461
|
"""
|
5593
5462
|
return pulumi.get(self, "max_connection_lifetime")
|
5594
5463
|
|
@@ -5596,8 +5465,7 @@ class SecretsMountOracle(dict):
|
|
5596
5465
|
@pulumi.getter(name="maxIdleConnections")
|
5597
5466
|
def max_idle_connections(self) -> Optional[int]:
|
5598
5467
|
"""
|
5599
|
-
|
5600
|
-
the database.
|
5468
|
+
Maximum number of idle connections to the database.
|
5601
5469
|
"""
|
5602
5470
|
return pulumi.get(self, "max_idle_connections")
|
5603
5471
|
|
@@ -5605,8 +5473,7 @@ class SecretsMountOracle(dict):
|
|
5605
5473
|
@pulumi.getter(name="maxOpenConnections")
|
5606
5474
|
def max_open_connections(self) -> Optional[int]:
|
5607
5475
|
"""
|
5608
|
-
|
5609
|
-
the database.
|
5476
|
+
Maximum number of open connections to the database.
|
5610
5477
|
"""
|
5611
5478
|
return pulumi.get(self, "max_open_connections")
|
5612
5479
|
|
@@ -5614,7 +5481,7 @@ class SecretsMountOracle(dict):
|
|
5614
5481
|
@pulumi.getter
|
5615
5482
|
def password(self) -> Optional[str]:
|
5616
5483
|
"""
|
5617
|
-
The root credential password used in the connection URL
|
5484
|
+
The root credential password used in the connection URL
|
5618
5485
|
"""
|
5619
5486
|
return pulumi.get(self, "password")
|
5620
5487
|
|
@@ -5646,7 +5513,7 @@ class SecretsMountOracle(dict):
|
|
5646
5513
|
@pulumi.getter
|
5647
5514
|
def username(self) -> Optional[str]:
|
5648
5515
|
"""
|
5649
|
-
The root credential username used in the connection URL
|
5516
|
+
The root credential username used in the connection URL
|
5650
5517
|
"""
|
5651
5518
|
return pulumi.get(self, "username")
|
5652
5519
|
|
@@ -5654,7 +5521,7 @@ class SecretsMountOracle(dict):
|
|
5654
5521
|
@pulumi.getter(name="usernameTemplate")
|
5655
5522
|
def username_template(self) -> Optional[str]:
|
5656
5523
|
"""
|
5657
|
-
|
5524
|
+
Username generation template.
|
5658
5525
|
"""
|
5659
5526
|
return pulumi.get(self, "username_template")
|
5660
5527
|
|
@@ -5687,12 +5554,22 @@ class SecretsMountPostgresql(dict):
|
|
5687
5554
|
suggest = "max_idle_connections"
|
5688
5555
|
elif key == "maxOpenConnections":
|
5689
5556
|
suggest = "max_open_connections"
|
5557
|
+
elif key == "passwordAuthentication":
|
5558
|
+
suggest = "password_authentication"
|
5690
5559
|
elif key == "pluginName":
|
5691
5560
|
suggest = "plugin_name"
|
5561
|
+
elif key == "privateKey":
|
5562
|
+
suggest = "private_key"
|
5692
5563
|
elif key == "rootRotationStatements":
|
5693
5564
|
suggest = "root_rotation_statements"
|
5565
|
+
elif key == "selfManaged":
|
5566
|
+
suggest = "self_managed"
|
5694
5567
|
elif key == "serviceAccountJson":
|
5695
5568
|
suggest = "service_account_json"
|
5569
|
+
elif key == "tlsCa":
|
5570
|
+
suggest = "tls_ca"
|
5571
|
+
elif key == "tlsCertificate":
|
5572
|
+
suggest = "tls_certificate"
|
5696
5573
|
elif key == "usernameTemplate":
|
5697
5574
|
suggest = "username_template"
|
5698
5575
|
elif key == "verifyConnection":
|
@@ -5714,15 +5591,20 @@ class SecretsMountPostgresql(dict):
|
|
5714
5591
|
allowed_roles: Optional[Sequence[str]] = None,
|
5715
5592
|
auth_type: Optional[str] = None,
|
5716
5593
|
connection_url: Optional[str] = None,
|
5717
|
-
data: Optional[Mapping[str,
|
5594
|
+
data: Optional[Mapping[str, str]] = None,
|
5718
5595
|
disable_escaping: Optional[bool] = None,
|
5719
5596
|
max_connection_lifetime: Optional[int] = None,
|
5720
5597
|
max_idle_connections: Optional[int] = None,
|
5721
5598
|
max_open_connections: Optional[int] = None,
|
5722
5599
|
password: Optional[str] = None,
|
5600
|
+
password_authentication: Optional[str] = None,
|
5723
5601
|
plugin_name: Optional[str] = None,
|
5602
|
+
private_key: Optional[str] = None,
|
5724
5603
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
5604
|
+
self_managed: Optional[bool] = None,
|
5725
5605
|
service_account_json: Optional[str] = None,
|
5606
|
+
tls_ca: Optional[str] = None,
|
5607
|
+
tls_certificate: Optional[str] = None,
|
5726
5608
|
username: Optional[str] = None,
|
5727
5609
|
username_template: Optional[str] = None,
|
5728
5610
|
verify_connection: Optional[bool] = None):
|
@@ -5731,23 +5613,25 @@ class SecretsMountPostgresql(dict):
|
|
5731
5613
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
5732
5614
|
connection.
|
5733
5615
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5734
|
-
:param str connection_url:
|
5735
|
-
|
5736
|
-
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5616
|
+
:param str connection_url: Connection string to use to connect to the database.
|
5617
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5737
5618
|
|
5738
5619
|
Supported list of database secrets engines that can be configured:
|
5739
|
-
:param bool disable_escaping: Disable special character escaping in username and password
|
5740
|
-
:param int max_connection_lifetime:
|
5741
|
-
:param int max_idle_connections:
|
5742
|
-
|
5743
|
-
:param
|
5744
|
-
|
5745
|
-
:param str password: The root credential password used in the connection URL.
|
5620
|
+
:param bool disable_escaping: Disable special character escaping in username and password
|
5621
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
5622
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
5623
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
5624
|
+
:param str password: The root credential password used in the connection URL
|
5625
|
+
:param str password_authentication: When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
5746
5626
|
:param str plugin_name: Specifies the name of the plugin to use.
|
5627
|
+
:param str private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
|
5747
5628
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5629
|
+
:param bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
|
5748
5630
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
5749
|
-
:param str
|
5750
|
-
:param str
|
5631
|
+
:param str tls_ca: The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
5632
|
+
:param str tls_certificate: The x509 client certificate for connecting to the database. Must be PEM encoded.
|
5633
|
+
:param str username: The root credential username used in the connection URL
|
5634
|
+
:param str username_template: Username generation template.
|
5751
5635
|
:param bool verify_connection: Whether the connection should be verified on
|
5752
5636
|
initial configuration or not.
|
5753
5637
|
"""
|
@@ -5770,12 +5654,22 @@ class SecretsMountPostgresql(dict):
|
|
5770
5654
|
pulumi.set(__self__, "max_open_connections", max_open_connections)
|
5771
5655
|
if password is not None:
|
5772
5656
|
pulumi.set(__self__, "password", password)
|
5657
|
+
if password_authentication is not None:
|
5658
|
+
pulumi.set(__self__, "password_authentication", password_authentication)
|
5773
5659
|
if plugin_name is not None:
|
5774
5660
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
5661
|
+
if private_key is not None:
|
5662
|
+
pulumi.set(__self__, "private_key", private_key)
|
5775
5663
|
if root_rotation_statements is not None:
|
5776
5664
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
5665
|
+
if self_managed is not None:
|
5666
|
+
pulumi.set(__self__, "self_managed", self_managed)
|
5777
5667
|
if service_account_json is not None:
|
5778
5668
|
pulumi.set(__self__, "service_account_json", service_account_json)
|
5669
|
+
if tls_ca is not None:
|
5670
|
+
pulumi.set(__self__, "tls_ca", tls_ca)
|
5671
|
+
if tls_certificate is not None:
|
5672
|
+
pulumi.set(__self__, "tls_certificate", tls_certificate)
|
5779
5673
|
if username is not None:
|
5780
5674
|
pulumi.set(__self__, "username", username)
|
5781
5675
|
if username_template is not None:
|
@@ -5812,14 +5706,13 @@ class SecretsMountPostgresql(dict):
|
|
5812
5706
|
@pulumi.getter(name="connectionUrl")
|
5813
5707
|
def connection_url(self) -> Optional[str]:
|
5814
5708
|
"""
|
5815
|
-
|
5816
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
5709
|
+
Connection string to use to connect to the database.
|
5817
5710
|
"""
|
5818
5711
|
return pulumi.get(self, "connection_url")
|
5819
5712
|
|
5820
5713
|
@property
|
5821
5714
|
@pulumi.getter
|
5822
|
-
def data(self) -> Optional[Mapping[str,
|
5715
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
5823
5716
|
"""
|
5824
5717
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5825
5718
|
|
@@ -5831,7 +5724,7 @@ class SecretsMountPostgresql(dict):
|
|
5831
5724
|
@pulumi.getter(name="disableEscaping")
|
5832
5725
|
def disable_escaping(self) -> Optional[bool]:
|
5833
5726
|
"""
|
5834
|
-
Disable special character escaping in username and password
|
5727
|
+
Disable special character escaping in username and password
|
5835
5728
|
"""
|
5836
5729
|
return pulumi.get(self, "disable_escaping")
|
5837
5730
|
|
@@ -5839,7 +5732,7 @@ class SecretsMountPostgresql(dict):
|
|
5839
5732
|
@pulumi.getter(name="maxConnectionLifetime")
|
5840
5733
|
def max_connection_lifetime(self) -> Optional[int]:
|
5841
5734
|
"""
|
5842
|
-
|
5735
|
+
Maximum number of seconds a connection may be reused.
|
5843
5736
|
"""
|
5844
5737
|
return pulumi.get(self, "max_connection_lifetime")
|
5845
5738
|
|
@@ -5847,8 +5740,7 @@ class SecretsMountPostgresql(dict):
|
|
5847
5740
|
@pulumi.getter(name="maxIdleConnections")
|
5848
5741
|
def max_idle_connections(self) -> Optional[int]:
|
5849
5742
|
"""
|
5850
|
-
|
5851
|
-
the database.
|
5743
|
+
Maximum number of idle connections to the database.
|
5852
5744
|
"""
|
5853
5745
|
return pulumi.get(self, "max_idle_connections")
|
5854
5746
|
|
@@ -5856,8 +5748,7 @@ class SecretsMountPostgresql(dict):
|
|
5856
5748
|
@pulumi.getter(name="maxOpenConnections")
|
5857
5749
|
def max_open_connections(self) -> Optional[int]:
|
5858
5750
|
"""
|
5859
|
-
|
5860
|
-
the database.
|
5751
|
+
Maximum number of open connections to the database.
|
5861
5752
|
"""
|
5862
5753
|
return pulumi.get(self, "max_open_connections")
|
5863
5754
|
|
@@ -5865,10 +5756,18 @@ class SecretsMountPostgresql(dict):
|
|
5865
5756
|
@pulumi.getter
|
5866
5757
|
def password(self) -> Optional[str]:
|
5867
5758
|
"""
|
5868
|
-
The root credential password used in the connection URL
|
5759
|
+
The root credential password used in the connection URL
|
5869
5760
|
"""
|
5870
5761
|
return pulumi.get(self, "password")
|
5871
5762
|
|
5763
|
+
@property
|
5764
|
+
@pulumi.getter(name="passwordAuthentication")
|
5765
|
+
def password_authentication(self) -> Optional[str]:
|
5766
|
+
"""
|
5767
|
+
When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
5768
|
+
"""
|
5769
|
+
return pulumi.get(self, "password_authentication")
|
5770
|
+
|
5872
5771
|
@property
|
5873
5772
|
@pulumi.getter(name="pluginName")
|
5874
5773
|
def plugin_name(self) -> Optional[str]:
|
@@ -5877,6 +5776,14 @@ class SecretsMountPostgresql(dict):
|
|
5877
5776
|
"""
|
5878
5777
|
return pulumi.get(self, "plugin_name")
|
5879
5778
|
|
5779
|
+
@property
|
5780
|
+
@pulumi.getter(name="privateKey")
|
5781
|
+
def private_key(self) -> Optional[str]:
|
5782
|
+
"""
|
5783
|
+
The secret key used for the x509 client certificate. Must be PEM encoded.
|
5784
|
+
"""
|
5785
|
+
return pulumi.get(self, "private_key")
|
5786
|
+
|
5880
5787
|
@property
|
5881
5788
|
@pulumi.getter(name="rootRotationStatements")
|
5882
5789
|
def root_rotation_statements(self) -> Optional[Sequence[str]]:
|
@@ -5885,6 +5792,14 @@ class SecretsMountPostgresql(dict):
|
|
5885
5792
|
"""
|
5886
5793
|
return pulumi.get(self, "root_rotation_statements")
|
5887
5794
|
|
5795
|
+
@property
|
5796
|
+
@pulumi.getter(name="selfManaged")
|
5797
|
+
def self_managed(self) -> Optional[bool]:
|
5798
|
+
"""
|
5799
|
+
If set, allows onboarding static roles with a rootless connection configuration.
|
5800
|
+
"""
|
5801
|
+
return pulumi.get(self, "self_managed")
|
5802
|
+
|
5888
5803
|
@property
|
5889
5804
|
@pulumi.getter(name="serviceAccountJson")
|
5890
5805
|
def service_account_json(self) -> Optional[str]:
|
@@ -5893,11 +5808,27 @@ class SecretsMountPostgresql(dict):
|
|
5893
5808
|
"""
|
5894
5809
|
return pulumi.get(self, "service_account_json")
|
5895
5810
|
|
5811
|
+
@property
|
5812
|
+
@pulumi.getter(name="tlsCa")
|
5813
|
+
def tls_ca(self) -> Optional[str]:
|
5814
|
+
"""
|
5815
|
+
The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
5816
|
+
"""
|
5817
|
+
return pulumi.get(self, "tls_ca")
|
5818
|
+
|
5819
|
+
@property
|
5820
|
+
@pulumi.getter(name="tlsCertificate")
|
5821
|
+
def tls_certificate(self) -> Optional[str]:
|
5822
|
+
"""
|
5823
|
+
The x509 client certificate for connecting to the database. Must be PEM encoded.
|
5824
|
+
"""
|
5825
|
+
return pulumi.get(self, "tls_certificate")
|
5826
|
+
|
5896
5827
|
@property
|
5897
5828
|
@pulumi.getter
|
5898
5829
|
def username(self) -> Optional[str]:
|
5899
5830
|
"""
|
5900
|
-
The root credential username used in the connection URL
|
5831
|
+
The root credential username used in the connection URL
|
5901
5832
|
"""
|
5902
5833
|
return pulumi.get(self, "username")
|
5903
5834
|
|
@@ -5905,7 +5836,7 @@ class SecretsMountPostgresql(dict):
|
|
5905
5836
|
@pulumi.getter(name="usernameTemplate")
|
5906
5837
|
def username_template(self) -> Optional[str]:
|
5907
5838
|
"""
|
5908
|
-
|
5839
|
+
Username generation template.
|
5909
5840
|
"""
|
5910
5841
|
return pulumi.get(self, "username_template")
|
5911
5842
|
|
@@ -5955,7 +5886,7 @@ class SecretsMountRedi(dict):
|
|
5955
5886
|
username: str,
|
5956
5887
|
allowed_roles: Optional[Sequence[str]] = None,
|
5957
5888
|
ca_cert: Optional[str] = None,
|
5958
|
-
data: Optional[Mapping[str,
|
5889
|
+
data: Optional[Mapping[str, str]] = None,
|
5959
5890
|
insecure_tls: Optional[bool] = None,
|
5960
5891
|
plugin_name: Optional[str] = None,
|
5961
5892
|
port: Optional[int] = None,
|
@@ -5963,23 +5894,21 @@ class SecretsMountRedi(dict):
|
|
5963
5894
|
tls: Optional[bool] = None,
|
5964
5895
|
verify_connection: Optional[bool] = None):
|
5965
5896
|
"""
|
5966
|
-
:param str host:
|
5897
|
+
:param str host: Specifies the host to connect to
|
5967
5898
|
:param str name: Name of the database connection.
|
5968
|
-
:param str password:
|
5969
|
-
:param str username:
|
5899
|
+
:param str password: Specifies the password corresponding to the given username.
|
5900
|
+
:param str username: Specifies the username for Vault to use.
|
5970
5901
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
5971
5902
|
connection.
|
5972
|
-
:param str ca_cert: The
|
5973
|
-
:param Mapping[str,
|
5903
|
+
:param str ca_cert: The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
|
5904
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5974
5905
|
|
5975
5906
|
Supported list of database secrets engines that can be configured:
|
5976
|
-
:param bool insecure_tls:
|
5977
|
-
certificate when using TLS.
|
5907
|
+
:param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
|
5978
5908
|
:param str plugin_name: Specifies the name of the plugin to use.
|
5979
|
-
:param int port: The
|
5980
|
-
part of the host.
|
5909
|
+
:param int port: The transport port to use to connect to Redis.
|
5981
5910
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5982
|
-
:param bool tls:
|
5911
|
+
:param bool tls: Specifies whether to use TLS when connecting to Redis.
|
5983
5912
|
:param bool verify_connection: Whether the connection should be verified on
|
5984
5913
|
initial configuration or not.
|
5985
5914
|
"""
|
@@ -6010,7 +5939,7 @@ class SecretsMountRedi(dict):
|
|
6010
5939
|
@pulumi.getter
|
6011
5940
|
def host(self) -> str:
|
6012
5941
|
"""
|
6013
|
-
|
5942
|
+
Specifies the host to connect to
|
6014
5943
|
"""
|
6015
5944
|
return pulumi.get(self, "host")
|
6016
5945
|
|
@@ -6026,7 +5955,7 @@ class SecretsMountRedi(dict):
|
|
6026
5955
|
@pulumi.getter
|
6027
5956
|
def password(self) -> str:
|
6028
5957
|
"""
|
6029
|
-
|
5958
|
+
Specifies the password corresponding to the given username.
|
6030
5959
|
"""
|
6031
5960
|
return pulumi.get(self, "password")
|
6032
5961
|
|
@@ -6034,7 +5963,7 @@ class SecretsMountRedi(dict):
|
|
6034
5963
|
@pulumi.getter
|
6035
5964
|
def username(self) -> str:
|
6036
5965
|
"""
|
6037
|
-
|
5966
|
+
Specifies the username for Vault to use.
|
6038
5967
|
"""
|
6039
5968
|
return pulumi.get(self, "username")
|
6040
5969
|
|
@@ -6051,13 +5980,13 @@ class SecretsMountRedi(dict):
|
|
6051
5980
|
@pulumi.getter(name="caCert")
|
6052
5981
|
def ca_cert(self) -> Optional[str]:
|
6053
5982
|
"""
|
6054
|
-
The
|
5983
|
+
The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
|
6055
5984
|
"""
|
6056
5985
|
return pulumi.get(self, "ca_cert")
|
6057
5986
|
|
6058
5987
|
@property
|
6059
5988
|
@pulumi.getter
|
6060
|
-
def data(self) -> Optional[Mapping[str,
|
5989
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
6061
5990
|
"""
|
6062
5991
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6063
5992
|
|
@@ -6069,8 +5998,7 @@ class SecretsMountRedi(dict):
|
|
6069
5998
|
@pulumi.getter(name="insecureTls")
|
6070
5999
|
def insecure_tls(self) -> Optional[bool]:
|
6071
6000
|
"""
|
6072
|
-
|
6073
|
-
certificate when using TLS.
|
6001
|
+
Specifies whether to skip verification of the server certificate when using TLS.
|
6074
6002
|
"""
|
6075
6003
|
return pulumi.get(self, "insecure_tls")
|
6076
6004
|
|
@@ -6086,8 +6014,7 @@ class SecretsMountRedi(dict):
|
|
6086
6014
|
@pulumi.getter
|
6087
6015
|
def port(self) -> Optional[int]:
|
6088
6016
|
"""
|
6089
|
-
The
|
6090
|
-
part of the host.
|
6017
|
+
The transport port to use to connect to Redis.
|
6091
6018
|
"""
|
6092
6019
|
return pulumi.get(self, "port")
|
6093
6020
|
|
@@ -6103,7 +6030,7 @@ class SecretsMountRedi(dict):
|
|
6103
6030
|
@pulumi.getter
|
6104
6031
|
def tls(self) -> Optional[bool]:
|
6105
6032
|
"""
|
6106
|
-
|
6033
|
+
Specifies whether to use TLS when connecting to Redis.
|
6107
6034
|
"""
|
6108
6035
|
return pulumi.get(self, "tls")
|
6109
6036
|
|
@@ -6146,7 +6073,7 @@ class SecretsMountRedisElasticach(dict):
|
|
6146
6073
|
name: str,
|
6147
6074
|
url: str,
|
6148
6075
|
allowed_roles: Optional[Sequence[str]] = None,
|
6149
|
-
data: Optional[Mapping[str,
|
6076
|
+
data: Optional[Mapping[str, str]] = None,
|
6150
6077
|
password: Optional[str] = None,
|
6151
6078
|
plugin_name: Optional[str] = None,
|
6152
6079
|
region: Optional[str] = None,
|
@@ -6155,19 +6082,17 @@ class SecretsMountRedisElasticach(dict):
|
|
6155
6082
|
verify_connection: Optional[bool] = None):
|
6156
6083
|
"""
|
6157
6084
|
:param str name: Name of the database connection.
|
6158
|
-
:param str url: The
|
6159
|
-
by trusted CA if used.
|
6085
|
+
:param str url: The configuration endpoint for the ElastiCache cluster to connect to.
|
6160
6086
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
6161
6087
|
connection.
|
6162
|
-
:param Mapping[str,
|
6088
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6163
6089
|
|
6164
6090
|
Supported list of database secrets engines that can be configured:
|
6165
|
-
:param str password: The
|
6091
|
+
:param str password: The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
6166
6092
|
:param str plugin_name: Specifies the name of the plugin to use.
|
6167
|
-
:param str region: The AWS region where the ElastiCache cluster is hosted.
|
6168
|
-
If omitted the plugin tries to infer the region from the environment.
|
6093
|
+
:param str region: The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
|
6169
6094
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
6170
|
-
:param str username: The
|
6095
|
+
:param str username: The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
6171
6096
|
:param bool verify_connection: Whether the connection should be verified on
|
6172
6097
|
initial configuration or not.
|
6173
6098
|
"""
|
@@ -6202,8 +6127,7 @@ class SecretsMountRedisElasticach(dict):
|
|
6202
6127
|
@pulumi.getter
|
6203
6128
|
def url(self) -> str:
|
6204
6129
|
"""
|
6205
|
-
The
|
6206
|
-
by trusted CA if used.
|
6130
|
+
The configuration endpoint for the ElastiCache cluster to connect to.
|
6207
6131
|
"""
|
6208
6132
|
return pulumi.get(self, "url")
|
6209
6133
|
|
@@ -6218,7 +6142,7 @@ class SecretsMountRedisElasticach(dict):
|
|
6218
6142
|
|
6219
6143
|
@property
|
6220
6144
|
@pulumi.getter
|
6221
|
-
def data(self) -> Optional[Mapping[str,
|
6145
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
6222
6146
|
"""
|
6223
6147
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6224
6148
|
|
@@ -6230,7 +6154,7 @@ class SecretsMountRedisElasticach(dict):
|
|
6230
6154
|
@pulumi.getter
|
6231
6155
|
def password(self) -> Optional[str]:
|
6232
6156
|
"""
|
6233
|
-
The
|
6157
|
+
The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
6234
6158
|
"""
|
6235
6159
|
return pulumi.get(self, "password")
|
6236
6160
|
|
@@ -6246,8 +6170,7 @@ class SecretsMountRedisElasticach(dict):
|
|
6246
6170
|
@pulumi.getter
|
6247
6171
|
def region(self) -> Optional[str]:
|
6248
6172
|
"""
|
6249
|
-
The AWS region where the ElastiCache cluster is hosted.
|
6250
|
-
If omitted the plugin tries to infer the region from the environment.
|
6173
|
+
The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
|
6251
6174
|
"""
|
6252
6175
|
return pulumi.get(self, "region")
|
6253
6176
|
|
@@ -6263,7 +6186,7 @@ class SecretsMountRedisElasticach(dict):
|
|
6263
6186
|
@pulumi.getter
|
6264
6187
|
def username(self) -> Optional[str]:
|
6265
6188
|
"""
|
6266
|
-
The
|
6189
|
+
The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
6267
6190
|
"""
|
6268
6191
|
return pulumi.get(self, "username")
|
6269
6192
|
|
@@ -6318,7 +6241,7 @@ class SecretsMountRedshift(dict):
|
|
6318
6241
|
name: str,
|
6319
6242
|
allowed_roles: Optional[Sequence[str]] = None,
|
6320
6243
|
connection_url: Optional[str] = None,
|
6321
|
-
data: Optional[Mapping[str,
|
6244
|
+
data: Optional[Mapping[str, str]] = None,
|
6322
6245
|
disable_escaping: Optional[bool] = None,
|
6323
6246
|
max_connection_lifetime: Optional[int] = None,
|
6324
6247
|
max_idle_connections: Optional[int] = None,
|
@@ -6333,22 +6256,19 @@ class SecretsMountRedshift(dict):
|
|
6333
6256
|
:param str name: Name of the database connection.
|
6334
6257
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
6335
6258
|
connection.
|
6336
|
-
:param str connection_url:
|
6337
|
-
|
6338
|
-
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6259
|
+
:param str connection_url: Connection string to use to connect to the database.
|
6260
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6339
6261
|
|
6340
6262
|
Supported list of database secrets engines that can be configured:
|
6341
|
-
:param bool disable_escaping: Disable special character escaping in username and password
|
6342
|
-
:param int max_connection_lifetime:
|
6343
|
-
:param int max_idle_connections:
|
6344
|
-
|
6345
|
-
:param
|
6346
|
-
the database.
|
6347
|
-
:param str password: The root credential password used in the connection URL.
|
6263
|
+
:param bool disable_escaping: Disable special character escaping in username and password
|
6264
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
6265
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
6266
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
6267
|
+
:param str password: The root credential password used in the connection URL
|
6348
6268
|
:param str plugin_name: Specifies the name of the plugin to use.
|
6349
6269
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
6350
|
-
:param str username: The root credential username used in the connection URL
|
6351
|
-
:param str username_template:
|
6270
|
+
:param str username: The root credential username used in the connection URL
|
6271
|
+
:param str username_template: Username generation template.
|
6352
6272
|
:param bool verify_connection: Whether the connection should be verified on
|
6353
6273
|
initial configuration or not.
|
6354
6274
|
"""
|
@@ -6401,14 +6321,13 @@ class SecretsMountRedshift(dict):
|
|
6401
6321
|
@pulumi.getter(name="connectionUrl")
|
6402
6322
|
def connection_url(self) -> Optional[str]:
|
6403
6323
|
"""
|
6404
|
-
|
6405
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
6324
|
+
Connection string to use to connect to the database.
|
6406
6325
|
"""
|
6407
6326
|
return pulumi.get(self, "connection_url")
|
6408
6327
|
|
6409
6328
|
@property
|
6410
6329
|
@pulumi.getter
|
6411
|
-
def data(self) -> Optional[Mapping[str,
|
6330
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
6412
6331
|
"""
|
6413
6332
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6414
6333
|
|
@@ -6420,7 +6339,7 @@ class SecretsMountRedshift(dict):
|
|
6420
6339
|
@pulumi.getter(name="disableEscaping")
|
6421
6340
|
def disable_escaping(self) -> Optional[bool]:
|
6422
6341
|
"""
|
6423
|
-
Disable special character escaping in username and password
|
6342
|
+
Disable special character escaping in username and password
|
6424
6343
|
"""
|
6425
6344
|
return pulumi.get(self, "disable_escaping")
|
6426
6345
|
|
@@ -6428,7 +6347,7 @@ class SecretsMountRedshift(dict):
|
|
6428
6347
|
@pulumi.getter(name="maxConnectionLifetime")
|
6429
6348
|
def max_connection_lifetime(self) -> Optional[int]:
|
6430
6349
|
"""
|
6431
|
-
|
6350
|
+
Maximum number of seconds a connection may be reused.
|
6432
6351
|
"""
|
6433
6352
|
return pulumi.get(self, "max_connection_lifetime")
|
6434
6353
|
|
@@ -6436,8 +6355,7 @@ class SecretsMountRedshift(dict):
|
|
6436
6355
|
@pulumi.getter(name="maxIdleConnections")
|
6437
6356
|
def max_idle_connections(self) -> Optional[int]:
|
6438
6357
|
"""
|
6439
|
-
|
6440
|
-
the database.
|
6358
|
+
Maximum number of idle connections to the database.
|
6441
6359
|
"""
|
6442
6360
|
return pulumi.get(self, "max_idle_connections")
|
6443
6361
|
|
@@ -6445,8 +6363,7 @@ class SecretsMountRedshift(dict):
|
|
6445
6363
|
@pulumi.getter(name="maxOpenConnections")
|
6446
6364
|
def max_open_connections(self) -> Optional[int]:
|
6447
6365
|
"""
|
6448
|
-
|
6449
|
-
the database.
|
6366
|
+
Maximum number of open connections to the database.
|
6450
6367
|
"""
|
6451
6368
|
return pulumi.get(self, "max_open_connections")
|
6452
6369
|
|
@@ -6454,7 +6371,7 @@ class SecretsMountRedshift(dict):
|
|
6454
6371
|
@pulumi.getter
|
6455
6372
|
def password(self) -> Optional[str]:
|
6456
6373
|
"""
|
6457
|
-
The root credential password used in the connection URL
|
6374
|
+
The root credential password used in the connection URL
|
6458
6375
|
"""
|
6459
6376
|
return pulumi.get(self, "password")
|
6460
6377
|
|
@@ -6478,7 +6395,7 @@ class SecretsMountRedshift(dict):
|
|
6478
6395
|
@pulumi.getter
|
6479
6396
|
def username(self) -> Optional[str]:
|
6480
6397
|
"""
|
6481
|
-
The root credential username used in the connection URL
|
6398
|
+
The root credential username used in the connection URL
|
6482
6399
|
"""
|
6483
6400
|
return pulumi.get(self, "username")
|
6484
6401
|
|
@@ -6486,7 +6403,7 @@ class SecretsMountRedshift(dict):
|
|
6486
6403
|
@pulumi.getter(name="usernameTemplate")
|
6487
6404
|
def username_template(self) -> Optional[str]:
|
6488
6405
|
"""
|
6489
|
-
|
6406
|
+
Username generation template.
|
6490
6407
|
"""
|
6491
6408
|
return pulumi.get(self, "username_template")
|
6492
6409
|
|
@@ -6539,7 +6456,7 @@ class SecretsMountSnowflake(dict):
|
|
6539
6456
|
name: str,
|
6540
6457
|
allowed_roles: Optional[Sequence[str]] = None,
|
6541
6458
|
connection_url: Optional[str] = None,
|
6542
|
-
data: Optional[Mapping[str,
|
6459
|
+
data: Optional[Mapping[str, str]] = None,
|
6543
6460
|
max_connection_lifetime: Optional[int] = None,
|
6544
6461
|
max_idle_connections: Optional[int] = None,
|
6545
6462
|
max_open_connections: Optional[int] = None,
|
@@ -6553,21 +6470,18 @@ class SecretsMountSnowflake(dict):
|
|
6553
6470
|
:param str name: Name of the database connection.
|
6554
6471
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
6555
6472
|
connection.
|
6556
|
-
:param str connection_url:
|
6557
|
-
|
6558
|
-
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6473
|
+
:param str connection_url: Connection string to use to connect to the database.
|
6474
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6559
6475
|
|
6560
6476
|
Supported list of database secrets engines that can be configured:
|
6561
|
-
:param int max_connection_lifetime:
|
6562
|
-
:param int max_idle_connections:
|
6563
|
-
|
6564
|
-
:param
|
6565
|
-
the database.
|
6566
|
-
:param str password: The root credential password used in the connection URL.
|
6477
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
6478
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
6479
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
6480
|
+
:param str password: The root credential password used in the connection URL
|
6567
6481
|
:param str plugin_name: Specifies the name of the plugin to use.
|
6568
6482
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
6569
|
-
:param str username: The root credential username used in the connection URL
|
6570
|
-
:param str username_template:
|
6483
|
+
:param str username: The root credential username used in the connection URL
|
6484
|
+
:param str username_template: Username generation template.
|
6571
6485
|
:param bool verify_connection: Whether the connection should be verified on
|
6572
6486
|
initial configuration or not.
|
6573
6487
|
"""
|
@@ -6618,14 +6532,13 @@ class SecretsMountSnowflake(dict):
|
|
6618
6532
|
@pulumi.getter(name="connectionUrl")
|
6619
6533
|
def connection_url(self) -> Optional[str]:
|
6620
6534
|
"""
|
6621
|
-
|
6622
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
6535
|
+
Connection string to use to connect to the database.
|
6623
6536
|
"""
|
6624
6537
|
return pulumi.get(self, "connection_url")
|
6625
6538
|
|
6626
6539
|
@property
|
6627
6540
|
@pulumi.getter
|
6628
|
-
def data(self) -> Optional[Mapping[str,
|
6541
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
6629
6542
|
"""
|
6630
6543
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6631
6544
|
|
@@ -6637,7 +6550,7 @@ class SecretsMountSnowflake(dict):
|
|
6637
6550
|
@pulumi.getter(name="maxConnectionLifetime")
|
6638
6551
|
def max_connection_lifetime(self) -> Optional[int]:
|
6639
6552
|
"""
|
6640
|
-
|
6553
|
+
Maximum number of seconds a connection may be reused.
|
6641
6554
|
"""
|
6642
6555
|
return pulumi.get(self, "max_connection_lifetime")
|
6643
6556
|
|
@@ -6645,8 +6558,7 @@ class SecretsMountSnowflake(dict):
|
|
6645
6558
|
@pulumi.getter(name="maxIdleConnections")
|
6646
6559
|
def max_idle_connections(self) -> Optional[int]:
|
6647
6560
|
"""
|
6648
|
-
|
6649
|
-
the database.
|
6561
|
+
Maximum number of idle connections to the database.
|
6650
6562
|
"""
|
6651
6563
|
return pulumi.get(self, "max_idle_connections")
|
6652
6564
|
|
@@ -6654,8 +6566,7 @@ class SecretsMountSnowflake(dict):
|
|
6654
6566
|
@pulumi.getter(name="maxOpenConnections")
|
6655
6567
|
def max_open_connections(self) -> Optional[int]:
|
6656
6568
|
"""
|
6657
|
-
|
6658
|
-
the database.
|
6569
|
+
Maximum number of open connections to the database.
|
6659
6570
|
"""
|
6660
6571
|
return pulumi.get(self, "max_open_connections")
|
6661
6572
|
|
@@ -6663,7 +6574,7 @@ class SecretsMountSnowflake(dict):
|
|
6663
6574
|
@pulumi.getter
|
6664
6575
|
def password(self) -> Optional[str]:
|
6665
6576
|
"""
|
6666
|
-
The root credential password used in the connection URL
|
6577
|
+
The root credential password used in the connection URL
|
6667
6578
|
"""
|
6668
6579
|
return pulumi.get(self, "password")
|
6669
6580
|
|
@@ -6687,7 +6598,7 @@ class SecretsMountSnowflake(dict):
|
|
6687
6598
|
@pulumi.getter
|
6688
6599
|
def username(self) -> Optional[str]:
|
6689
6600
|
"""
|
6690
|
-
The root credential username used in the connection URL
|
6601
|
+
The root credential username used in the connection URL
|
6691
6602
|
"""
|
6692
6603
|
return pulumi.get(self, "username")
|
6693
6604
|
|
@@ -6695,7 +6606,7 @@ class SecretsMountSnowflake(dict):
|
|
6695
6606
|
@pulumi.getter(name="usernameTemplate")
|
6696
6607
|
def username_template(self) -> Optional[str]:
|
6697
6608
|
"""
|
6698
|
-
|
6609
|
+
Username generation template.
|
6699
6610
|
"""
|
6700
6611
|
return pulumi.get(self, "username_template")
|
6701
6612
|
|