pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (233) hide show
  1. pulumi_vault/__init__.py +76 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +26 -9
  5. pulumi_vault/ad/secret_backend.py +16 -142
  6. pulumi_vault/ad/secret_library.py +16 -9
  7. pulumi_vault/ad/secret_role.py +14 -9
  8. pulumi_vault/alicloud/auth_backend_role.py +76 -190
  9. pulumi_vault/approle/auth_backend_login.py +12 -7
  10. pulumi_vault/approle/auth_backend_role.py +77 -191
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
  13. pulumi_vault/audit.py +30 -21
  14. pulumi_vault/audit_request_header.py +11 -2
  15. pulumi_vault/auth_backend.py +66 -14
  16. pulumi_vault/aws/auth_backend_cert.py +18 -9
  17. pulumi_vault/aws/auth_backend_client.py +267 -22
  18. pulumi_vault/aws/auth_backend_config_identity.py +14 -9
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +77 -191
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
  24. pulumi_vault/aws/auth_backend_sts_role.py +61 -9
  25. pulumi_vault/aws/get_access_credentials.py +38 -9
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +218 -9
  28. pulumi_vault/aws/secret_backend_role.py +185 -9
  29. pulumi_vault/aws/secret_backend_static_role.py +20 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +153 -15
  32. pulumi_vault/azure/auth_backend_role.py +77 -191
  33. pulumi_vault/azure/backend.py +227 -21
  34. pulumi_vault/azure/backend_role.py +42 -37
  35. pulumi_vault/azure/get_access_credentials.py +41 -7
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -267
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +28 -19
  44. pulumi_vault/consul/secret_backend_role.py +18 -78
  45. pulumi_vault/database/_inputs.py +2808 -879
  46. pulumi_vault/database/outputs.py +749 -838
  47. pulumi_vault/database/secret_backend_connection.py +119 -112
  48. pulumi_vault/database/secret_backend_role.py +31 -22
  49. pulumi_vault/database/secret_backend_static_role.py +87 -13
  50. pulumi_vault/database/secrets_mount.py +427 -136
  51. pulumi_vault/egp_policy.py +16 -11
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +250 -33
  54. pulumi_vault/gcp/auth_backend_role.py +77 -269
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -5
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -12
  58. pulumi_vault/gcp/secret_impersonated_account.py +76 -15
  59. pulumi_vault/gcp/secret_roleset.py +31 -24
  60. pulumi_vault/gcp/secret_static_account.py +39 -32
  61. pulumi_vault/generic/endpoint.py +24 -17
  62. pulumi_vault/generic/get_secret.py +64 -8
  63. pulumi_vault/generic/secret.py +21 -16
  64. pulumi_vault/get_auth_backend.py +24 -7
  65. pulumi_vault/get_auth_backends.py +51 -9
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -11
  69. pulumi_vault/get_policy_document.py +34 -19
  70. pulumi_vault/get_raft_autopilot_state.py +29 -10
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +19 -14
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +16 -11
  75. pulumi_vault/github/user.py +16 -11
  76. pulumi_vault/identity/entity.py +20 -13
  77. pulumi_vault/identity/entity_alias.py +20 -13
  78. pulumi_vault/identity/entity_policies.py +28 -11
  79. pulumi_vault/identity/get_entity.py +42 -10
  80. pulumi_vault/identity/get_group.py +47 -9
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -7
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -9
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -10
  84. pulumi_vault/identity/group.py +58 -39
  85. pulumi_vault/identity/group_alias.py +16 -9
  86. pulumi_vault/identity/group_member_entity_ids.py +28 -66
  87. pulumi_vault/identity/group_member_group_ids.py +40 -19
  88. pulumi_vault/identity/group_policies.py +20 -7
  89. pulumi_vault/identity/mfa_duo.py +11 -6
  90. pulumi_vault/identity/mfa_login_enforcement.py +15 -6
  91. pulumi_vault/identity/mfa_okta.py +11 -6
  92. pulumi_vault/identity/mfa_pingid.py +7 -2
  93. pulumi_vault/identity/mfa_totp.py +7 -2
  94. pulumi_vault/identity/oidc.py +12 -7
  95. pulumi_vault/identity/oidc_assignment.py +24 -11
  96. pulumi_vault/identity/oidc_client.py +36 -23
  97. pulumi_vault/identity/oidc_key.py +30 -17
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
  99. pulumi_vault/identity/oidc_provider.py +36 -21
  100. pulumi_vault/identity/oidc_role.py +42 -21
  101. pulumi_vault/identity/oidc_scope.py +20 -13
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +45 -40
  105. pulumi_vault/jwt/auth_backend_role.py +133 -254
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +24 -19
  108. pulumi_vault/kmip/secret_role.py +14 -9
  109. pulumi_vault/kmip/secret_scope.py +14 -9
  110. pulumi_vault/kubernetes/auth_backend_config.py +57 -5
  111. pulumi_vault/kubernetes/auth_backend_role.py +70 -177
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -11
  115. pulumi_vault/kubernetes/secret_backend.py +316 -27
  116. pulumi_vault/kubernetes/secret_backend_role.py +137 -46
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +25 -8
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
  120. pulumi_vault/kv/get_secret_v2.py +85 -9
  121. pulumi_vault/kv/get_secrets_list.py +24 -11
  122. pulumi_vault/kv/get_secrets_list_v2.py +37 -15
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +23 -16
  125. pulumi_vault/kv/secret_backend_v2.py +20 -11
  126. pulumi_vault/kv/secret_v2.py +59 -50
  127. pulumi_vault/ldap/auth_backend.py +127 -166
  128. pulumi_vault/ldap/auth_backend_group.py +14 -9
  129. pulumi_vault/ldap/auth_backend_user.py +14 -9
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +354 -82
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +16 -9
  135. pulumi_vault/ldap/secret_backend_static_role.py +73 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +29 -57
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +18 -11
  140. pulumi_vault/mfa_okta.py +18 -11
  141. pulumi_vault/mfa_pingid.py +18 -11
  142. pulumi_vault/mfa_totp.py +24 -17
  143. pulumi_vault/mongodbatlas/secret_backend.py +20 -15
  144. pulumi_vault/mongodbatlas/secret_role.py +47 -38
  145. pulumi_vault/mount.py +391 -51
  146. pulumi_vault/namespace.py +68 -83
  147. pulumi_vault/nomad_secret_backend.py +18 -13
  148. pulumi_vault/nomad_secret_role.py +14 -9
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +485 -39
  151. pulumi_vault/okta/auth_backend_group.py +14 -9
  152. pulumi_vault/okta/auth_backend_user.py +14 -9
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +20 -13
  156. pulumi_vault/pkisecret/__init__.py +7 -0
  157. pulumi_vault/pkisecret/_inputs.py +115 -0
  158. pulumi_vault/pkisecret/backend_acme_eab.py +549 -0
  159. pulumi_vault/pkisecret/backend_config_acme.py +642 -0
  160. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  161. pulumi_vault/pkisecret/backend_config_cmpv2.py +525 -0
  162. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  163. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +209 -0
  164. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  165. pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
  166. pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
  167. pulumi_vault/pkisecret/get_backend_key.py +24 -9
  168. pulumi_vault/pkisecret/get_backend_keys.py +21 -8
  169. pulumi_vault/pkisecret/outputs.py +109 -0
  170. pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
  171. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
  172. pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
  173. pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
  174. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
  175. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
  176. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
  177. pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
  178. pulumi_vault/pkisecret/secret_backend_key.py +14 -9
  179. pulumi_vault/pkisecret/secret_backend_role.py +68 -14
  180. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
  181. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
  182. pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
  183. pulumi_vault/plugin.py +595 -0
  184. pulumi_vault/plugin_pinned_version.py +298 -0
  185. pulumi_vault/policy.py +14 -9
  186. pulumi_vault/provider.py +48 -53
  187. pulumi_vault/pulumi-plugin.json +2 -1
  188. pulumi_vault/quota_lease_count.py +60 -6
  189. pulumi_vault/quota_rate_limit.py +56 -2
  190. pulumi_vault/rabbitmq/_inputs.py +61 -0
  191. pulumi_vault/rabbitmq/outputs.py +5 -0
  192. pulumi_vault/rabbitmq/secret_backend.py +18 -13
  193. pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
  194. pulumi_vault/raft_autopilot.py +14 -9
  195. pulumi_vault/raft_snapshot_agent_config.py +129 -224
  196. pulumi_vault/rgp_policy.py +14 -9
  197. pulumi_vault/saml/auth_backend.py +22 -17
  198. pulumi_vault/saml/auth_backend_role.py +92 -197
  199. pulumi_vault/secrets/__init__.py +3 -0
  200. pulumi_vault/secrets/_inputs.py +110 -0
  201. pulumi_vault/secrets/outputs.py +94 -0
  202. pulumi_vault/secrets/sync_association.py +56 -71
  203. pulumi_vault/secrets/sync_aws_destination.py +242 -27
  204. pulumi_vault/secrets/sync_azure_destination.py +92 -31
  205. pulumi_vault/secrets/sync_config.py +9 -4
  206. pulumi_vault/secrets/sync_gcp_destination.py +158 -25
  207. pulumi_vault/secrets/sync_gh_destination.py +189 -13
  208. pulumi_vault/secrets/sync_github_apps.py +375 -0
  209. pulumi_vault/secrets/sync_vercel_destination.py +74 -13
  210. pulumi_vault/ssh/_inputs.py +28 -28
  211. pulumi_vault/ssh/outputs.py +11 -28
  212. pulumi_vault/ssh/secret_backend_ca.py +108 -9
  213. pulumi_vault/ssh/secret_backend_role.py +112 -118
  214. pulumi_vault/terraformcloud/secret_backend.py +7 -54
  215. pulumi_vault/terraformcloud/secret_creds.py +14 -20
  216. pulumi_vault/terraformcloud/secret_role.py +16 -74
  217. pulumi_vault/token.py +28 -23
  218. pulumi_vault/tokenauth/auth_backend_role.py +78 -199
  219. pulumi_vault/transform/alphabet.py +16 -9
  220. pulumi_vault/transform/get_decode.py +45 -17
  221. pulumi_vault/transform/get_encode.py +45 -17
  222. pulumi_vault/transform/role.py +16 -9
  223. pulumi_vault/transform/template.py +30 -21
  224. pulumi_vault/transform/transformation.py +12 -7
  225. pulumi_vault/transit/get_decrypt.py +26 -21
  226. pulumi_vault/transit/get_encrypt.py +24 -19
  227. pulumi_vault/transit/secret_backend_key.py +27 -93
  228. pulumi_vault/transit/secret_cache_config.py +12 -7
  229. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/METADATA +8 -7
  230. pulumi_vault-6.5.0.dist-info/RECORD +260 -0
  231. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/WHEEL +1 -1
  232. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  233. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -63,6 +68,8 @@ class SecretBackendConnectionCassandra(dict):
63
68
  suggest = "pem_json"
64
69
  elif key == "protocolVersion":
65
70
  suggest = "protocol_version"
71
+ elif key == "skipVerification":
72
+ suggest = "skip_verification"
66
73
 
67
74
  if suggest:
68
75
  pulumi.log.warn(f"Key '{key}' not found in SecretBackendConnectionCassandra. Access the value via the '{suggest}' property getter instead.")
@@ -84,23 +91,21 @@ class SecretBackendConnectionCassandra(dict):
84
91
  pem_json: Optional[str] = None,
85
92
  port: Optional[int] = None,
86
93
  protocol_version: Optional[int] = None,
94
+ skip_verification: Optional[bool] = None,
87
95
  tls: Optional[bool] = None,
88
96
  username: Optional[str] = None):
89
97
  """
90
- :param int connect_timeout: The number of seconds to use as a connection
91
- timeout.
92
- :param Sequence[str] hosts: The hosts to connect to.
93
- :param bool insecure_tls: Whether to skip verification of the server
94
- certificate when using TLS.
95
- :param str password: The password to authenticate with.
96
- :param str pem_bundle: Concatenated PEM blocks configuring the certificate
97
- chain.
98
- :param str pem_json: A JSON structure configuring the certificate chain.
99
- :param int port: The default port to connect to if no port is specified as
100
- part of the host.
98
+ :param int connect_timeout: The number of seconds to use as a connection timeout.
99
+ :param Sequence[str] hosts: Cassandra hosts to connect to.
100
+ :param bool insecure_tls: Whether to skip verification of the server certificate when using TLS.
101
+ :param str password: The password to use when authenticating with Cassandra.
102
+ :param str pem_bundle: Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
103
+ :param str pem_json: Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
104
+ :param int port: The transport port to use to connect to Cassandra.
101
105
  :param int protocol_version: The CQL protocol version to use.
106
+ :param bool skip_verification: Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
102
107
  :param bool tls: Whether to use TLS when connecting to Cassandra.
103
- :param str username: The username to authenticate with.
108
+ :param str username: The username to use when authenticating with Cassandra.
104
109
  """
105
110
  if connect_timeout is not None:
106
111
  pulumi.set(__self__, "connect_timeout", connect_timeout)
@@ -118,6 +123,8 @@ class SecretBackendConnectionCassandra(dict):
118
123
  pulumi.set(__self__, "port", port)
119
124
  if protocol_version is not None:
120
125
  pulumi.set(__self__, "protocol_version", protocol_version)
126
+ if skip_verification is not None:
127
+ pulumi.set(__self__, "skip_verification", skip_verification)
121
128
  if tls is not None:
122
129
  pulumi.set(__self__, "tls", tls)
123
130
  if username is not None:
@@ -127,8 +134,7 @@ class SecretBackendConnectionCassandra(dict):
127
134
  @pulumi.getter(name="connectTimeout")
128
135
  def connect_timeout(self) -> Optional[int]:
129
136
  """
130
- The number of seconds to use as a connection
131
- timeout.
137
+ The number of seconds to use as a connection timeout.
132
138
  """
133
139
  return pulumi.get(self, "connect_timeout")
134
140
 
@@ -136,7 +142,7 @@ class SecretBackendConnectionCassandra(dict):
136
142
  @pulumi.getter
137
143
  def hosts(self) -> Optional[Sequence[str]]:
138
144
  """
139
- The hosts to connect to.
145
+ Cassandra hosts to connect to.
140
146
  """
141
147
  return pulumi.get(self, "hosts")
142
148
 
@@ -144,8 +150,7 @@ class SecretBackendConnectionCassandra(dict):
144
150
  @pulumi.getter(name="insecureTls")
145
151
  def insecure_tls(self) -> Optional[bool]:
146
152
  """
147
- Whether to skip verification of the server
148
- certificate when using TLS.
153
+ Whether to skip verification of the server certificate when using TLS.
149
154
  """
150
155
  return pulumi.get(self, "insecure_tls")
151
156
 
@@ -153,7 +158,7 @@ class SecretBackendConnectionCassandra(dict):
153
158
  @pulumi.getter
154
159
  def password(self) -> Optional[str]:
155
160
  """
156
- The password to authenticate with.
161
+ The password to use when authenticating with Cassandra.
157
162
  """
158
163
  return pulumi.get(self, "password")
159
164
 
@@ -161,8 +166,7 @@ class SecretBackendConnectionCassandra(dict):
161
166
  @pulumi.getter(name="pemBundle")
162
167
  def pem_bundle(self) -> Optional[str]:
163
168
  """
164
- Concatenated PEM blocks configuring the certificate
165
- chain.
169
+ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
166
170
  """
167
171
  return pulumi.get(self, "pem_bundle")
168
172
 
@@ -170,7 +174,7 @@ class SecretBackendConnectionCassandra(dict):
170
174
  @pulumi.getter(name="pemJson")
171
175
  def pem_json(self) -> Optional[str]:
172
176
  """
173
- A JSON structure configuring the certificate chain.
177
+ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
174
178
  """
175
179
  return pulumi.get(self, "pem_json")
176
180
 
@@ -178,8 +182,7 @@ class SecretBackendConnectionCassandra(dict):
178
182
  @pulumi.getter
179
183
  def port(self) -> Optional[int]:
180
184
  """
181
- The default port to connect to if no port is specified as
182
- part of the host.
185
+ The transport port to use to connect to Cassandra.
183
186
  """
184
187
  return pulumi.get(self, "port")
185
188
 
@@ -191,6 +194,14 @@ class SecretBackendConnectionCassandra(dict):
191
194
  """
192
195
  return pulumi.get(self, "protocol_version")
193
196
 
197
+ @property
198
+ @pulumi.getter(name="skipVerification")
199
+ def skip_verification(self) -> Optional[bool]:
200
+ """
201
+ Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
202
+ """
203
+ return pulumi.get(self, "skip_verification")
204
+
194
205
  @property
195
206
  @pulumi.getter
196
207
  def tls(self) -> Optional[bool]:
@@ -203,7 +214,7 @@ class SecretBackendConnectionCassandra(dict):
203
214
  @pulumi.getter
204
215
  def username(self) -> Optional[str]:
205
216
  """
206
- The username to authenticate with.
217
+ The username to use when authenticating with Cassandra.
207
218
  """
208
219
  return pulumi.get(self, "username")
209
220
 
@@ -243,14 +254,13 @@ class SecretBackendConnectionCouchbase(dict):
243
254
  tls: Optional[bool] = None,
244
255
  username_template: Optional[str] = None):
245
256
  """
246
- :param Sequence[str] hosts: The hosts to connect to.
247
- :param str password: The password to authenticate with.
248
- :param str username: The username to authenticate with.
257
+ :param Sequence[str] hosts: A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
258
+ :param str password: Specifies the password corresponding to the given username.
259
+ :param str username: Specifies the username for Vault to use.
249
260
  :param str base64_pem: Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
250
261
  :param str bucket_name: Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
251
- :param bool insecure_tls: Whether to skip verification of the server
252
- certificate when using TLS.
253
- :param bool tls: Whether to use TLS when connecting to Cassandra.
262
+ :param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
263
+ :param bool tls: Specifies whether to use TLS when connecting to Couchbase.
254
264
  :param str username_template: Template describing how dynamic usernames are generated.
255
265
  """
256
266
  pulumi.set(__self__, "hosts", hosts)
@@ -271,7 +281,7 @@ class SecretBackendConnectionCouchbase(dict):
271
281
  @pulumi.getter
272
282
  def hosts(self) -> Sequence[str]:
273
283
  """
274
- The hosts to connect to.
284
+ A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
275
285
  """
276
286
  return pulumi.get(self, "hosts")
277
287
 
@@ -279,7 +289,7 @@ class SecretBackendConnectionCouchbase(dict):
279
289
  @pulumi.getter
280
290
  def password(self) -> str:
281
291
  """
282
- The password to authenticate with.
292
+ Specifies the password corresponding to the given username.
283
293
  """
284
294
  return pulumi.get(self, "password")
285
295
 
@@ -287,7 +297,7 @@ class SecretBackendConnectionCouchbase(dict):
287
297
  @pulumi.getter
288
298
  def username(self) -> str:
289
299
  """
290
- The username to authenticate with.
300
+ Specifies the username for Vault to use.
291
301
  """
292
302
  return pulumi.get(self, "username")
293
303
 
@@ -311,8 +321,7 @@ class SecretBackendConnectionCouchbase(dict):
311
321
  @pulumi.getter(name="insecureTls")
312
322
  def insecure_tls(self) -> Optional[bool]:
313
323
  """
314
- Whether to skip verification of the server
315
- certificate when using TLS.
324
+ Specifies whether to skip verification of the server certificate when using TLS.
316
325
  """
317
326
  return pulumi.get(self, "insecure_tls")
318
327
 
@@ -320,7 +329,7 @@ class SecretBackendConnectionCouchbase(dict):
320
329
  @pulumi.getter
321
330
  def tls(self) -> Optional[bool]:
322
331
  """
323
- Whether to use TLS when connecting to Cassandra.
332
+ Specifies whether to use TLS when connecting to Couchbase.
324
333
  """
325
334
  return pulumi.get(self, "tls")
326
335
 
@@ -374,16 +383,15 @@ class SecretBackendConnectionElasticsearch(dict):
374
383
  tls_server_name: Optional[str] = None,
375
384
  username_template: Optional[str] = None):
376
385
  """
377
- :param str password: The password to authenticate with.
378
- :param str url: The URL for Elasticsearch's API. https requires certificate
379
- by trusted CA if used.
380
- :param str username: The username to authenticate with.
381
- :param str ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
382
- :param str ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
383
- :param str client_cert: The path to the certificate for the Elasticsearch client to present for communication.
384
- :param str client_key: The path to the key for the Elasticsearch client to use for communication.
385
- :param bool insecure: Whether to disable certificate verification.
386
- :param str tls_server_name: This, if set, is used to set the SNI host when connecting via TLS.
386
+ :param str password: The password to be used in the connection URL
387
+ :param str url: The URL for Elasticsearch's API
388
+ :param str username: The username to be used in the connection URL
389
+ :param str ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
390
+ :param str ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
391
+ :param str client_cert: The path to the certificate for the Elasticsearch client to present for communication
392
+ :param str client_key: The path to the key for the Elasticsearch client to use for communication
393
+ :param bool insecure: Whether to disable certificate verification
394
+ :param str tls_server_name: This, if set, is used to set the SNI host when connecting via TLS
387
395
  :param str username_template: Template describing how dynamic usernames are generated.
388
396
  """
389
397
  pulumi.set(__self__, "password", password)
@@ -408,7 +416,7 @@ class SecretBackendConnectionElasticsearch(dict):
408
416
  @pulumi.getter
409
417
  def password(self) -> str:
410
418
  """
411
- The password to authenticate with.
419
+ The password to be used in the connection URL
412
420
  """
413
421
  return pulumi.get(self, "password")
414
422
 
@@ -416,8 +424,7 @@ class SecretBackendConnectionElasticsearch(dict):
416
424
  @pulumi.getter
417
425
  def url(self) -> str:
418
426
  """
419
- The URL for Elasticsearch's API. https requires certificate
420
- by trusted CA if used.
427
+ The URL for Elasticsearch's API
421
428
  """
422
429
  return pulumi.get(self, "url")
423
430
 
@@ -425,7 +432,7 @@ class SecretBackendConnectionElasticsearch(dict):
425
432
  @pulumi.getter
426
433
  def username(self) -> str:
427
434
  """
428
- The username to authenticate with.
435
+ The username to be used in the connection URL
429
436
  """
430
437
  return pulumi.get(self, "username")
431
438
 
@@ -433,7 +440,7 @@ class SecretBackendConnectionElasticsearch(dict):
433
440
  @pulumi.getter(name="caCert")
434
441
  def ca_cert(self) -> Optional[str]:
435
442
  """
436
- The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
443
+ The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
437
444
  """
438
445
  return pulumi.get(self, "ca_cert")
439
446
 
@@ -441,7 +448,7 @@ class SecretBackendConnectionElasticsearch(dict):
441
448
  @pulumi.getter(name="caPath")
442
449
  def ca_path(self) -> Optional[str]:
443
450
  """
444
- The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
451
+ The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
445
452
  """
446
453
  return pulumi.get(self, "ca_path")
447
454
 
@@ -449,7 +456,7 @@ class SecretBackendConnectionElasticsearch(dict):
449
456
  @pulumi.getter(name="clientCert")
450
457
  def client_cert(self) -> Optional[str]:
451
458
  """
452
- The path to the certificate for the Elasticsearch client to present for communication.
459
+ The path to the certificate for the Elasticsearch client to present for communication
453
460
  """
454
461
  return pulumi.get(self, "client_cert")
455
462
 
@@ -457,7 +464,7 @@ class SecretBackendConnectionElasticsearch(dict):
457
464
  @pulumi.getter(name="clientKey")
458
465
  def client_key(self) -> Optional[str]:
459
466
  """
460
- The path to the key for the Elasticsearch client to use for communication.
467
+ The path to the key for the Elasticsearch client to use for communication
461
468
  """
462
469
  return pulumi.get(self, "client_key")
463
470
 
@@ -465,7 +472,7 @@ class SecretBackendConnectionElasticsearch(dict):
465
472
  @pulumi.getter
466
473
  def insecure(self) -> Optional[bool]:
467
474
  """
468
- Whether to disable certificate verification.
475
+ Whether to disable certificate verification
469
476
  """
470
477
  return pulumi.get(self, "insecure")
471
478
 
@@ -473,7 +480,7 @@ class SecretBackendConnectionElasticsearch(dict):
473
480
  @pulumi.getter(name="tlsServerName")
474
481
  def tls_server_name(self) -> Optional[str]:
475
482
  """
476
- This, if set, is used to set the SNI host when connecting via TLS.
483
+ This, if set, is used to set the SNI host when connecting via TLS
477
484
  """
478
485
  return pulumi.get(self, "tls_server_name")
479
486
 
@@ -522,19 +529,13 @@ class SecretBackendConnectionHana(dict):
522
529
  password: Optional[str] = None,
523
530
  username: Optional[str] = None):
524
531
  """
525
- :param str connection_url: A URL containing connection information. See
526
- the [Vault
527
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
528
- for an example.
529
- :param bool disable_escaping: Disable special character escaping in username and password.
530
- :param int max_connection_lifetime: The maximum number of seconds to keep
531
- a connection alive for.
532
- :param int max_idle_connections: The maximum number of idle connections to
533
- maintain.
534
- :param int max_open_connections: The maximum number of open connections to
535
- use.
536
- :param str password: The password to authenticate with.
537
- :param str username: The username to authenticate with.
532
+ :param str connection_url: Connection string to use to connect to the database.
533
+ :param bool disable_escaping: Disable special character escaping in username and password
534
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
535
+ :param int max_idle_connections: Maximum number of idle connections to the database.
536
+ :param int max_open_connections: Maximum number of open connections to the database.
537
+ :param str password: The root credential password used in the connection URL
538
+ :param str username: The root credential username used in the connection URL
538
539
  """
539
540
  if connection_url is not None:
540
541
  pulumi.set(__self__, "connection_url", connection_url)
@@ -555,10 +556,7 @@ class SecretBackendConnectionHana(dict):
555
556
  @pulumi.getter(name="connectionUrl")
556
557
  def connection_url(self) -> Optional[str]:
557
558
  """
558
- A URL containing connection information. See
559
- the [Vault
560
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
561
- for an example.
559
+ Connection string to use to connect to the database.
562
560
  """
563
561
  return pulumi.get(self, "connection_url")
564
562
 
@@ -566,7 +564,7 @@ class SecretBackendConnectionHana(dict):
566
564
  @pulumi.getter(name="disableEscaping")
567
565
  def disable_escaping(self) -> Optional[bool]:
568
566
  """
569
- Disable special character escaping in username and password.
567
+ Disable special character escaping in username and password
570
568
  """
571
569
  return pulumi.get(self, "disable_escaping")
572
570
 
@@ -574,8 +572,7 @@ class SecretBackendConnectionHana(dict):
574
572
  @pulumi.getter(name="maxConnectionLifetime")
575
573
  def max_connection_lifetime(self) -> Optional[int]:
576
574
  """
577
- The maximum number of seconds to keep
578
- a connection alive for.
575
+ Maximum number of seconds a connection may be reused.
579
576
  """
580
577
  return pulumi.get(self, "max_connection_lifetime")
581
578
 
@@ -583,8 +580,7 @@ class SecretBackendConnectionHana(dict):
583
580
  @pulumi.getter(name="maxIdleConnections")
584
581
  def max_idle_connections(self) -> Optional[int]:
585
582
  """
586
- The maximum number of idle connections to
587
- maintain.
583
+ Maximum number of idle connections to the database.
588
584
  """
589
585
  return pulumi.get(self, "max_idle_connections")
590
586
 
@@ -592,8 +588,7 @@ class SecretBackendConnectionHana(dict):
592
588
  @pulumi.getter(name="maxOpenConnections")
593
589
  def max_open_connections(self) -> Optional[int]:
594
590
  """
595
- The maximum number of open connections to
596
- use.
591
+ Maximum number of open connections to the database.
597
592
  """
598
593
  return pulumi.get(self, "max_open_connections")
599
594
 
@@ -601,7 +596,7 @@ class SecretBackendConnectionHana(dict):
601
596
  @pulumi.getter
602
597
  def password(self) -> Optional[str]:
603
598
  """
604
- The password to authenticate with.
599
+ The root credential password used in the connection URL
605
600
  """
606
601
  return pulumi.get(self, "password")
607
602
 
@@ -609,7 +604,7 @@ class SecretBackendConnectionHana(dict):
609
604
  @pulumi.getter
610
605
  def username(self) -> Optional[str]:
611
606
  """
612
- The username to authenticate with.
607
+ The root credential username used in the connection URL
613
608
  """
614
609
  return pulumi.get(self, "username")
615
610
 
@@ -653,19 +648,15 @@ class SecretBackendConnectionInfluxdb(dict):
653
648
  tls: Optional[bool] = None,
654
649
  username_template: Optional[str] = None):
655
650
  """
656
- :param str host: The host to connect to.
657
- :param str password: The password to authenticate with.
658
- :param str username: The username to authenticate with.
659
- :param int connect_timeout: The number of seconds to use as a connection
660
- timeout.
661
- :param bool insecure_tls: Whether to skip verification of the server
662
- certificate when using TLS.
663
- :param str pem_bundle: Concatenated PEM blocks configuring the certificate
664
- chain.
665
- :param str pem_json: A JSON structure configuring the certificate chain.
666
- :param int port: The default port to connect to if no port is specified as
667
- part of the host.
668
- :param bool tls: Whether to use TLS when connecting to Cassandra.
651
+ :param str host: Influxdb host to connect to.
652
+ :param str password: Specifies the password corresponding to the given username.
653
+ :param str username: Specifies the username to use for superuser access.
654
+ :param int connect_timeout: The number of seconds to use as a connection timeout.
655
+ :param bool insecure_tls: Whether to skip verification of the server certificate when using TLS.
656
+ :param str pem_bundle: Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
657
+ :param str pem_json: Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
658
+ :param int port: The transport port to use to connect to Influxdb.
659
+ :param bool tls: Whether to use TLS when connecting to Influxdb.
669
660
  :param str username_template: Template describing how dynamic usernames are generated.
670
661
  """
671
662
  pulumi.set(__self__, "host", host)
@@ -690,7 +681,7 @@ class SecretBackendConnectionInfluxdb(dict):
690
681
  @pulumi.getter
691
682
  def host(self) -> str:
692
683
  """
693
- The host to connect to.
684
+ Influxdb host to connect to.
694
685
  """
695
686
  return pulumi.get(self, "host")
696
687
 
@@ -698,7 +689,7 @@ class SecretBackendConnectionInfluxdb(dict):
698
689
  @pulumi.getter
699
690
  def password(self) -> str:
700
691
  """
701
- The password to authenticate with.
692
+ Specifies the password corresponding to the given username.
702
693
  """
703
694
  return pulumi.get(self, "password")
704
695
 
@@ -706,7 +697,7 @@ class SecretBackendConnectionInfluxdb(dict):
706
697
  @pulumi.getter
707
698
  def username(self) -> str:
708
699
  """
709
- The username to authenticate with.
700
+ Specifies the username to use for superuser access.
710
701
  """
711
702
  return pulumi.get(self, "username")
712
703
 
@@ -714,8 +705,7 @@ class SecretBackendConnectionInfluxdb(dict):
714
705
  @pulumi.getter(name="connectTimeout")
715
706
  def connect_timeout(self) -> Optional[int]:
716
707
  """
717
- The number of seconds to use as a connection
718
- timeout.
708
+ The number of seconds to use as a connection timeout.
719
709
  """
720
710
  return pulumi.get(self, "connect_timeout")
721
711
 
@@ -723,8 +713,7 @@ class SecretBackendConnectionInfluxdb(dict):
723
713
  @pulumi.getter(name="insecureTls")
724
714
  def insecure_tls(self) -> Optional[bool]:
725
715
  """
726
- Whether to skip verification of the server
727
- certificate when using TLS.
716
+ Whether to skip verification of the server certificate when using TLS.
728
717
  """
729
718
  return pulumi.get(self, "insecure_tls")
730
719
 
@@ -732,8 +721,7 @@ class SecretBackendConnectionInfluxdb(dict):
732
721
  @pulumi.getter(name="pemBundle")
733
722
  def pem_bundle(self) -> Optional[str]:
734
723
  """
735
- Concatenated PEM blocks configuring the certificate
736
- chain.
724
+ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
737
725
  """
738
726
  return pulumi.get(self, "pem_bundle")
739
727
 
@@ -741,7 +729,7 @@ class SecretBackendConnectionInfluxdb(dict):
741
729
  @pulumi.getter(name="pemJson")
742
730
  def pem_json(self) -> Optional[str]:
743
731
  """
744
- A JSON structure configuring the certificate chain.
732
+ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
745
733
  """
746
734
  return pulumi.get(self, "pem_json")
747
735
 
@@ -749,8 +737,7 @@ class SecretBackendConnectionInfluxdb(dict):
749
737
  @pulumi.getter
750
738
  def port(self) -> Optional[int]:
751
739
  """
752
- The default port to connect to if no port is specified as
753
- part of the host.
740
+ The transport port to use to connect to Influxdb.
754
741
  """
755
742
  return pulumi.get(self, "port")
756
743
 
@@ -758,7 +745,7 @@ class SecretBackendConnectionInfluxdb(dict):
758
745
  @pulumi.getter
759
746
  def tls(self) -> Optional[bool]:
760
747
  """
761
- Whether to use TLS when connecting to Cassandra.
748
+ Whether to use TLS when connecting to Influxdb.
762
749
  """
763
750
  return pulumi.get(self, "tls")
764
751
 
@@ -807,19 +794,13 @@ class SecretBackendConnectionMongodb(dict):
807
794
  username: Optional[str] = None,
808
795
  username_template: Optional[str] = None):
809
796
  """
810
- :param str connection_url: A URL containing connection information. See
811
- the [Vault
812
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
813
- for an example.
814
- :param int max_connection_lifetime: The maximum number of seconds to keep
815
- a connection alive for.
816
- :param int max_idle_connections: The maximum number of idle connections to
817
- maintain.
818
- :param int max_open_connections: The maximum number of open connections to
819
- use.
820
- :param str password: The password to authenticate with.
821
- :param str username: The username to authenticate with.
822
- :param str username_template: Template describing how dynamic usernames are generated.
797
+ :param str connection_url: Connection string to use to connect to the database.
798
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
799
+ :param int max_idle_connections: Maximum number of idle connections to the database.
800
+ :param int max_open_connections: Maximum number of open connections to the database.
801
+ :param str password: The root credential password used in the connection URL
802
+ :param str username: The root credential username used in the connection URL
803
+ :param str username_template: Username generation template.
823
804
  """
824
805
  if connection_url is not None:
825
806
  pulumi.set(__self__, "connection_url", connection_url)
@@ -840,10 +821,7 @@ class SecretBackendConnectionMongodb(dict):
840
821
  @pulumi.getter(name="connectionUrl")
841
822
  def connection_url(self) -> Optional[str]:
842
823
  """
843
- A URL containing connection information. See
844
- the [Vault
845
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
846
- for an example.
824
+ Connection string to use to connect to the database.
847
825
  """
848
826
  return pulumi.get(self, "connection_url")
849
827
 
@@ -851,8 +829,7 @@ class SecretBackendConnectionMongodb(dict):
851
829
  @pulumi.getter(name="maxConnectionLifetime")
852
830
  def max_connection_lifetime(self) -> Optional[int]:
853
831
  """
854
- The maximum number of seconds to keep
855
- a connection alive for.
832
+ Maximum number of seconds a connection may be reused.
856
833
  """
857
834
  return pulumi.get(self, "max_connection_lifetime")
858
835
 
@@ -860,8 +837,7 @@ class SecretBackendConnectionMongodb(dict):
860
837
  @pulumi.getter(name="maxIdleConnections")
861
838
  def max_idle_connections(self) -> Optional[int]:
862
839
  """
863
- The maximum number of idle connections to
864
- maintain.
840
+ Maximum number of idle connections to the database.
865
841
  """
866
842
  return pulumi.get(self, "max_idle_connections")
867
843
 
@@ -869,8 +845,7 @@ class SecretBackendConnectionMongodb(dict):
869
845
  @pulumi.getter(name="maxOpenConnections")
870
846
  def max_open_connections(self) -> Optional[int]:
871
847
  """
872
- The maximum number of open connections to
873
- use.
848
+ Maximum number of open connections to the database.
874
849
  """
875
850
  return pulumi.get(self, "max_open_connections")
876
851
 
@@ -878,7 +853,7 @@ class SecretBackendConnectionMongodb(dict):
878
853
  @pulumi.getter
879
854
  def password(self) -> Optional[str]:
880
855
  """
881
- The password to authenticate with.
856
+ The root credential password used in the connection URL
882
857
  """
883
858
  return pulumi.get(self, "password")
884
859
 
@@ -886,7 +861,7 @@ class SecretBackendConnectionMongodb(dict):
886
861
  @pulumi.getter
887
862
  def username(self) -> Optional[str]:
888
863
  """
889
- The username to authenticate with.
864
+ The root credential username used in the connection URL
890
865
  """
891
866
  return pulumi.get(self, "username")
892
867
 
@@ -894,7 +869,7 @@ class SecretBackendConnectionMongodb(dict):
894
869
  @pulumi.getter(name="usernameTemplate")
895
870
  def username_template(self) -> Optional[str]:
896
871
  """
897
- Template describing how dynamic usernames are generated.
872
+ Username generation template.
898
873
  """
899
874
  return pulumi.get(self, "username_template")
900
875
 
@@ -1002,24 +977,15 @@ class SecretBackendConnectionMssql(dict):
1002
977
  username: Optional[str] = None,
1003
978
  username_template: Optional[str] = None):
1004
979
  """
1005
- :param str connection_url: A URL containing connection information. See
1006
- the [Vault
1007
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
1008
- for an example.
1009
- :param bool contained_db: For Vault v1.9+. Set to true when the target is a
1010
- Contained Database, e.g. AzureSQL.
1011
- See the [Vault
1012
- docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
1013
- :param bool disable_escaping: Disable special character escaping in username and password.
1014
- :param int max_connection_lifetime: The maximum number of seconds to keep
1015
- a connection alive for.
1016
- :param int max_idle_connections: The maximum number of idle connections to
1017
- maintain.
1018
- :param int max_open_connections: The maximum number of open connections to
1019
- use.
1020
- :param str password: The password to authenticate with.
1021
- :param str username: The username to authenticate with.
1022
- :param str username_template: Template describing how dynamic usernames are generated.
980
+ :param str connection_url: Connection string to use to connect to the database.
981
+ :param bool contained_db: Set to true when the target is a Contained Database, e.g. AzureSQL.
982
+ :param bool disable_escaping: Disable special character escaping in username and password
983
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
984
+ :param int max_idle_connections: Maximum number of idle connections to the database.
985
+ :param int max_open_connections: Maximum number of open connections to the database.
986
+ :param str password: The root credential password used in the connection URL
987
+ :param str username: The root credential username used in the connection URL
988
+ :param str username_template: Username generation template.
1023
989
  """
1024
990
  if connection_url is not None:
1025
991
  pulumi.set(__self__, "connection_url", connection_url)
@@ -1044,10 +1010,7 @@ class SecretBackendConnectionMssql(dict):
1044
1010
  @pulumi.getter(name="connectionUrl")
1045
1011
  def connection_url(self) -> Optional[str]:
1046
1012
  """
1047
- A URL containing connection information. See
1048
- the [Vault
1049
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
1050
- for an example.
1013
+ Connection string to use to connect to the database.
1051
1014
  """
1052
1015
  return pulumi.get(self, "connection_url")
1053
1016
 
@@ -1055,10 +1018,7 @@ class SecretBackendConnectionMssql(dict):
1055
1018
  @pulumi.getter(name="containedDb")
1056
1019
  def contained_db(self) -> Optional[bool]:
1057
1020
  """
1058
- For Vault v1.9+. Set to true when the target is a
1059
- Contained Database, e.g. AzureSQL.
1060
- See the [Vault
1061
- docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
1021
+ Set to true when the target is a Contained Database, e.g. AzureSQL.
1062
1022
  """
1063
1023
  return pulumi.get(self, "contained_db")
1064
1024
 
@@ -1066,7 +1026,7 @@ class SecretBackendConnectionMssql(dict):
1066
1026
  @pulumi.getter(name="disableEscaping")
1067
1027
  def disable_escaping(self) -> Optional[bool]:
1068
1028
  """
1069
- Disable special character escaping in username and password.
1029
+ Disable special character escaping in username and password
1070
1030
  """
1071
1031
  return pulumi.get(self, "disable_escaping")
1072
1032
 
@@ -1074,8 +1034,7 @@ class SecretBackendConnectionMssql(dict):
1074
1034
  @pulumi.getter(name="maxConnectionLifetime")
1075
1035
  def max_connection_lifetime(self) -> Optional[int]:
1076
1036
  """
1077
- The maximum number of seconds to keep
1078
- a connection alive for.
1037
+ Maximum number of seconds a connection may be reused.
1079
1038
  """
1080
1039
  return pulumi.get(self, "max_connection_lifetime")
1081
1040
 
@@ -1083,8 +1042,7 @@ class SecretBackendConnectionMssql(dict):
1083
1042
  @pulumi.getter(name="maxIdleConnections")
1084
1043
  def max_idle_connections(self) -> Optional[int]:
1085
1044
  """
1086
- The maximum number of idle connections to
1087
- maintain.
1045
+ Maximum number of idle connections to the database.
1088
1046
  """
1089
1047
  return pulumi.get(self, "max_idle_connections")
1090
1048
 
@@ -1092,8 +1050,7 @@ class SecretBackendConnectionMssql(dict):
1092
1050
  @pulumi.getter(name="maxOpenConnections")
1093
1051
  def max_open_connections(self) -> Optional[int]:
1094
1052
  """
1095
- The maximum number of open connections to
1096
- use.
1053
+ Maximum number of open connections to the database.
1097
1054
  """
1098
1055
  return pulumi.get(self, "max_open_connections")
1099
1056
 
@@ -1101,7 +1058,7 @@ class SecretBackendConnectionMssql(dict):
1101
1058
  @pulumi.getter
1102
1059
  def password(self) -> Optional[str]:
1103
1060
  """
1104
- The password to authenticate with.
1061
+ The root credential password used in the connection URL
1105
1062
  """
1106
1063
  return pulumi.get(self, "password")
1107
1064
 
@@ -1109,7 +1066,7 @@ class SecretBackendConnectionMssql(dict):
1109
1066
  @pulumi.getter
1110
1067
  def username(self) -> Optional[str]:
1111
1068
  """
1112
- The username to authenticate with.
1069
+ The root credential username used in the connection URL
1113
1070
  """
1114
1071
  return pulumi.get(self, "username")
1115
1072
 
@@ -1117,7 +1074,7 @@ class SecretBackendConnectionMssql(dict):
1117
1074
  @pulumi.getter(name="usernameTemplate")
1118
1075
  def username_template(self) -> Optional[str]:
1119
1076
  """
1120
- Template describing how dynamic usernames are generated.
1077
+ Username generation template.
1121
1078
  """
1122
1079
  return pulumi.get(self, "username_template")
1123
1080
 
@@ -1170,23 +1127,17 @@ class SecretBackendConnectionMysql(dict):
1170
1127
  username: Optional[str] = None,
1171
1128
  username_template: Optional[str] = None):
1172
1129
  """
1173
- :param str auth_type: Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
1174
- :param str connection_url: A URL containing connection information. See
1175
- the [Vault
1176
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
1177
- for an example.
1178
- :param int max_connection_lifetime: The maximum number of seconds to keep
1179
- a connection alive for.
1180
- :param int max_idle_connections: The maximum number of idle connections to
1181
- maintain.
1182
- :param int max_open_connections: The maximum number of open connections to
1183
- use.
1184
- :param str password: The password to authenticate with.
1185
- :param str service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
1130
+ :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
1131
+ :param str connection_url: Connection string to use to connect to the database.
1132
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
1133
+ :param int max_idle_connections: Maximum number of idle connections to the database.
1134
+ :param int max_open_connections: Maximum number of open connections to the database.
1135
+ :param str password: The root credential password used in the connection URL
1136
+ :param str service_account_json: A JSON encoded credential for use with IAM authorization
1186
1137
  :param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
1187
1138
  :param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
1188
- :param str username: The username to authenticate with.
1189
- :param str username_template: Template describing how dynamic usernames are generated.
1139
+ :param str username: The root credential username used in the connection URL
1140
+ :param str username_template: Username generation template.
1190
1141
  """
1191
1142
  if auth_type is not None:
1192
1143
  pulumi.set(__self__, "auth_type", auth_type)
@@ -1215,7 +1166,7 @@ class SecretBackendConnectionMysql(dict):
1215
1166
  @pulumi.getter(name="authType")
1216
1167
  def auth_type(self) -> Optional[str]:
1217
1168
  """
1218
- Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
1169
+ Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
1219
1170
  """
1220
1171
  return pulumi.get(self, "auth_type")
1221
1172
 
@@ -1223,10 +1174,7 @@ class SecretBackendConnectionMysql(dict):
1223
1174
  @pulumi.getter(name="connectionUrl")
1224
1175
  def connection_url(self) -> Optional[str]:
1225
1176
  """
1226
- A URL containing connection information. See
1227
- the [Vault
1228
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
1229
- for an example.
1177
+ Connection string to use to connect to the database.
1230
1178
  """
1231
1179
  return pulumi.get(self, "connection_url")
1232
1180
 
@@ -1234,8 +1182,7 @@ class SecretBackendConnectionMysql(dict):
1234
1182
  @pulumi.getter(name="maxConnectionLifetime")
1235
1183
  def max_connection_lifetime(self) -> Optional[int]:
1236
1184
  """
1237
- The maximum number of seconds to keep
1238
- a connection alive for.
1185
+ Maximum number of seconds a connection may be reused.
1239
1186
  """
1240
1187
  return pulumi.get(self, "max_connection_lifetime")
1241
1188
 
@@ -1243,8 +1190,7 @@ class SecretBackendConnectionMysql(dict):
1243
1190
  @pulumi.getter(name="maxIdleConnections")
1244
1191
  def max_idle_connections(self) -> Optional[int]:
1245
1192
  """
1246
- The maximum number of idle connections to
1247
- maintain.
1193
+ Maximum number of idle connections to the database.
1248
1194
  """
1249
1195
  return pulumi.get(self, "max_idle_connections")
1250
1196
 
@@ -1252,8 +1198,7 @@ class SecretBackendConnectionMysql(dict):
1252
1198
  @pulumi.getter(name="maxOpenConnections")
1253
1199
  def max_open_connections(self) -> Optional[int]:
1254
1200
  """
1255
- The maximum number of open connections to
1256
- use.
1201
+ Maximum number of open connections to the database.
1257
1202
  """
1258
1203
  return pulumi.get(self, "max_open_connections")
1259
1204
 
@@ -1261,7 +1206,7 @@ class SecretBackendConnectionMysql(dict):
1261
1206
  @pulumi.getter
1262
1207
  def password(self) -> Optional[str]:
1263
1208
  """
1264
- The password to authenticate with.
1209
+ The root credential password used in the connection URL
1265
1210
  """
1266
1211
  return pulumi.get(self, "password")
1267
1212
 
@@ -1269,7 +1214,7 @@ class SecretBackendConnectionMysql(dict):
1269
1214
  @pulumi.getter(name="serviceAccountJson")
1270
1215
  def service_account_json(self) -> Optional[str]:
1271
1216
  """
1272
- JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
1217
+ A JSON encoded credential for use with IAM authorization
1273
1218
  """
1274
1219
  return pulumi.get(self, "service_account_json")
1275
1220
 
@@ -1293,7 +1238,7 @@ class SecretBackendConnectionMysql(dict):
1293
1238
  @pulumi.getter
1294
1239
  def username(self) -> Optional[str]:
1295
1240
  """
1296
- The username to authenticate with.
1241
+ The root credential username used in the connection URL
1297
1242
  """
1298
1243
  return pulumi.get(self, "username")
1299
1244
 
@@ -1301,7 +1246,7 @@ class SecretBackendConnectionMysql(dict):
1301
1246
  @pulumi.getter(name="usernameTemplate")
1302
1247
  def username_template(self) -> Optional[str]:
1303
1248
  """
1304
- Template describing how dynamic usernames are generated.
1249
+ Username generation template.
1305
1250
  """
1306
1251
  return pulumi.get(self, "username_template")
1307
1252
 
@@ -1354,23 +1299,17 @@ class SecretBackendConnectionMysqlAurora(dict):
1354
1299
  username: Optional[str] = None,
1355
1300
  username_template: Optional[str] = None):
1356
1301
  """
1357
- :param str auth_type: Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
1358
- :param str connection_url: A URL containing connection information. See
1359
- the [Vault
1360
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
1361
- for an example.
1362
- :param int max_connection_lifetime: The maximum number of seconds to keep
1363
- a connection alive for.
1364
- :param int max_idle_connections: The maximum number of idle connections to
1365
- maintain.
1366
- :param int max_open_connections: The maximum number of open connections to
1367
- use.
1368
- :param str password: The password to authenticate with.
1369
- :param str service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
1302
+ :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
1303
+ :param str connection_url: Connection string to use to connect to the database.
1304
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
1305
+ :param int max_idle_connections: Maximum number of idle connections to the database.
1306
+ :param int max_open_connections: Maximum number of open connections to the database.
1307
+ :param str password: The root credential password used in the connection URL
1308
+ :param str service_account_json: A JSON encoded credential for use with IAM authorization
1370
1309
  :param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
1371
1310
  :param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
1372
- :param str username: The username to authenticate with.
1373
- :param str username_template: Template describing how dynamic usernames are generated.
1311
+ :param str username: The root credential username used in the connection URL
1312
+ :param str username_template: Username generation template.
1374
1313
  """
1375
1314
  if auth_type is not None:
1376
1315
  pulumi.set(__self__, "auth_type", auth_type)
@@ -1399,7 +1338,7 @@ class SecretBackendConnectionMysqlAurora(dict):
1399
1338
  @pulumi.getter(name="authType")
1400
1339
  def auth_type(self) -> Optional[str]:
1401
1340
  """
1402
- Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
1341
+ Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
1403
1342
  """
1404
1343
  return pulumi.get(self, "auth_type")
1405
1344
 
@@ -1407,10 +1346,7 @@ class SecretBackendConnectionMysqlAurora(dict):
1407
1346
  @pulumi.getter(name="connectionUrl")
1408
1347
  def connection_url(self) -> Optional[str]:
1409
1348
  """
1410
- A URL containing connection information. See
1411
- the [Vault
1412
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
1413
- for an example.
1349
+ Connection string to use to connect to the database.
1414
1350
  """
1415
1351
  return pulumi.get(self, "connection_url")
1416
1352
 
@@ -1418,8 +1354,7 @@ class SecretBackendConnectionMysqlAurora(dict):
1418
1354
  @pulumi.getter(name="maxConnectionLifetime")
1419
1355
  def max_connection_lifetime(self) -> Optional[int]:
1420
1356
  """
1421
- The maximum number of seconds to keep
1422
- a connection alive for.
1357
+ Maximum number of seconds a connection may be reused.
1423
1358
  """
1424
1359
  return pulumi.get(self, "max_connection_lifetime")
1425
1360
 
@@ -1427,8 +1362,7 @@ class SecretBackendConnectionMysqlAurora(dict):
1427
1362
  @pulumi.getter(name="maxIdleConnections")
1428
1363
  def max_idle_connections(self) -> Optional[int]:
1429
1364
  """
1430
- The maximum number of idle connections to
1431
- maintain.
1365
+ Maximum number of idle connections to the database.
1432
1366
  """
1433
1367
  return pulumi.get(self, "max_idle_connections")
1434
1368
 
@@ -1436,8 +1370,7 @@ class SecretBackendConnectionMysqlAurora(dict):
1436
1370
  @pulumi.getter(name="maxOpenConnections")
1437
1371
  def max_open_connections(self) -> Optional[int]:
1438
1372
  """
1439
- The maximum number of open connections to
1440
- use.
1373
+ Maximum number of open connections to the database.
1441
1374
  """
1442
1375
  return pulumi.get(self, "max_open_connections")
1443
1376
 
@@ -1445,7 +1378,7 @@ class SecretBackendConnectionMysqlAurora(dict):
1445
1378
  @pulumi.getter
1446
1379
  def password(self) -> Optional[str]:
1447
1380
  """
1448
- The password to authenticate with.
1381
+ The root credential password used in the connection URL
1449
1382
  """
1450
1383
  return pulumi.get(self, "password")
1451
1384
 
@@ -1453,7 +1386,7 @@ class SecretBackendConnectionMysqlAurora(dict):
1453
1386
  @pulumi.getter(name="serviceAccountJson")
1454
1387
  def service_account_json(self) -> Optional[str]:
1455
1388
  """
1456
- JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
1389
+ A JSON encoded credential for use with IAM authorization
1457
1390
  """
1458
1391
  return pulumi.get(self, "service_account_json")
1459
1392
 
@@ -1477,7 +1410,7 @@ class SecretBackendConnectionMysqlAurora(dict):
1477
1410
  @pulumi.getter
1478
1411
  def username(self) -> Optional[str]:
1479
1412
  """
1480
- The username to authenticate with.
1413
+ The root credential username used in the connection URL
1481
1414
  """
1482
1415
  return pulumi.get(self, "username")
1483
1416
 
@@ -1485,7 +1418,7 @@ class SecretBackendConnectionMysqlAurora(dict):
1485
1418
  @pulumi.getter(name="usernameTemplate")
1486
1419
  def username_template(self) -> Optional[str]:
1487
1420
  """
1488
- Template describing how dynamic usernames are generated.
1421
+ Username generation template.
1489
1422
  """
1490
1423
  return pulumi.get(self, "username_template")
1491
1424
 
@@ -1538,23 +1471,17 @@ class SecretBackendConnectionMysqlLegacy(dict):
1538
1471
  username: Optional[str] = None,
1539
1472
  username_template: Optional[str] = None):
1540
1473
  """
1541
- :param str auth_type: Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
1542
- :param str connection_url: A URL containing connection information. See
1543
- the [Vault
1544
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
1545
- for an example.
1546
- :param int max_connection_lifetime: The maximum number of seconds to keep
1547
- a connection alive for.
1548
- :param int max_idle_connections: The maximum number of idle connections to
1549
- maintain.
1550
- :param int max_open_connections: The maximum number of open connections to
1551
- use.
1552
- :param str password: The password to authenticate with.
1553
- :param str service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
1474
+ :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
1475
+ :param str connection_url: Connection string to use to connect to the database.
1476
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
1477
+ :param int max_idle_connections: Maximum number of idle connections to the database.
1478
+ :param int max_open_connections: Maximum number of open connections to the database.
1479
+ :param str password: The root credential password used in the connection URL
1480
+ :param str service_account_json: A JSON encoded credential for use with IAM authorization
1554
1481
  :param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
1555
1482
  :param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
1556
- :param str username: The username to authenticate with.
1557
- :param str username_template: Template describing how dynamic usernames are generated.
1483
+ :param str username: The root credential username used in the connection URL
1484
+ :param str username_template: Username generation template.
1558
1485
  """
1559
1486
  if auth_type is not None:
1560
1487
  pulumi.set(__self__, "auth_type", auth_type)
@@ -1583,7 +1510,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
1583
1510
  @pulumi.getter(name="authType")
1584
1511
  def auth_type(self) -> Optional[str]:
1585
1512
  """
1586
- Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
1513
+ Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
1587
1514
  """
1588
1515
  return pulumi.get(self, "auth_type")
1589
1516
 
@@ -1591,10 +1518,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
1591
1518
  @pulumi.getter(name="connectionUrl")
1592
1519
  def connection_url(self) -> Optional[str]:
1593
1520
  """
1594
- A URL containing connection information. See
1595
- the [Vault
1596
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
1597
- for an example.
1521
+ Connection string to use to connect to the database.
1598
1522
  """
1599
1523
  return pulumi.get(self, "connection_url")
1600
1524
 
@@ -1602,8 +1526,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
1602
1526
  @pulumi.getter(name="maxConnectionLifetime")
1603
1527
  def max_connection_lifetime(self) -> Optional[int]:
1604
1528
  """
1605
- The maximum number of seconds to keep
1606
- a connection alive for.
1529
+ Maximum number of seconds a connection may be reused.
1607
1530
  """
1608
1531
  return pulumi.get(self, "max_connection_lifetime")
1609
1532
 
@@ -1611,8 +1534,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
1611
1534
  @pulumi.getter(name="maxIdleConnections")
1612
1535
  def max_idle_connections(self) -> Optional[int]:
1613
1536
  """
1614
- The maximum number of idle connections to
1615
- maintain.
1537
+ Maximum number of idle connections to the database.
1616
1538
  """
1617
1539
  return pulumi.get(self, "max_idle_connections")
1618
1540
 
@@ -1620,8 +1542,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
1620
1542
  @pulumi.getter(name="maxOpenConnections")
1621
1543
  def max_open_connections(self) -> Optional[int]:
1622
1544
  """
1623
- The maximum number of open connections to
1624
- use.
1545
+ Maximum number of open connections to the database.
1625
1546
  """
1626
1547
  return pulumi.get(self, "max_open_connections")
1627
1548
 
@@ -1629,7 +1550,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
1629
1550
  @pulumi.getter
1630
1551
  def password(self) -> Optional[str]:
1631
1552
  """
1632
- The password to authenticate with.
1553
+ The root credential password used in the connection URL
1633
1554
  """
1634
1555
  return pulumi.get(self, "password")
1635
1556
 
@@ -1637,7 +1558,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
1637
1558
  @pulumi.getter(name="serviceAccountJson")
1638
1559
  def service_account_json(self) -> Optional[str]:
1639
1560
  """
1640
- JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
1561
+ A JSON encoded credential for use with IAM authorization
1641
1562
  """
1642
1563
  return pulumi.get(self, "service_account_json")
1643
1564
 
@@ -1661,7 +1582,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
1661
1582
  @pulumi.getter
1662
1583
  def username(self) -> Optional[str]:
1663
1584
  """
1664
- The username to authenticate with.
1585
+ The root credential username used in the connection URL
1665
1586
  """
1666
1587
  return pulumi.get(self, "username")
1667
1588
 
@@ -1669,7 +1590,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
1669
1590
  @pulumi.getter(name="usernameTemplate")
1670
1591
  def username_template(self) -> Optional[str]:
1671
1592
  """
1672
- Template describing how dynamic usernames are generated.
1593
+ Username generation template.
1673
1594
  """
1674
1595
  return pulumi.get(self, "username_template")
1675
1596
 
@@ -1722,23 +1643,17 @@ class SecretBackendConnectionMysqlRds(dict):
1722
1643
  username: Optional[str] = None,
1723
1644
  username_template: Optional[str] = None):
1724
1645
  """
1725
- :param str auth_type: Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
1726
- :param str connection_url: A URL containing connection information. See
1727
- the [Vault
1728
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
1729
- for an example.
1730
- :param int max_connection_lifetime: The maximum number of seconds to keep
1731
- a connection alive for.
1732
- :param int max_idle_connections: The maximum number of idle connections to
1733
- maintain.
1734
- :param int max_open_connections: The maximum number of open connections to
1735
- use.
1736
- :param str password: The password to authenticate with.
1737
- :param str service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
1646
+ :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
1647
+ :param str connection_url: Connection string to use to connect to the database.
1648
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
1649
+ :param int max_idle_connections: Maximum number of idle connections to the database.
1650
+ :param int max_open_connections: Maximum number of open connections to the database.
1651
+ :param str password: The root credential password used in the connection URL
1652
+ :param str service_account_json: A JSON encoded credential for use with IAM authorization
1738
1653
  :param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
1739
1654
  :param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
1740
- :param str username: The username to authenticate with.
1741
- :param str username_template: Template describing how dynamic usernames are generated.
1655
+ :param str username: The root credential username used in the connection URL
1656
+ :param str username_template: Username generation template.
1742
1657
  """
1743
1658
  if auth_type is not None:
1744
1659
  pulumi.set(__self__, "auth_type", auth_type)
@@ -1767,7 +1682,7 @@ class SecretBackendConnectionMysqlRds(dict):
1767
1682
  @pulumi.getter(name="authType")
1768
1683
  def auth_type(self) -> Optional[str]:
1769
1684
  """
1770
- Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
1685
+ Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
1771
1686
  """
1772
1687
  return pulumi.get(self, "auth_type")
1773
1688
 
@@ -1775,10 +1690,7 @@ class SecretBackendConnectionMysqlRds(dict):
1775
1690
  @pulumi.getter(name="connectionUrl")
1776
1691
  def connection_url(self) -> Optional[str]:
1777
1692
  """
1778
- A URL containing connection information. See
1779
- the [Vault
1780
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
1781
- for an example.
1693
+ Connection string to use to connect to the database.
1782
1694
  """
1783
1695
  return pulumi.get(self, "connection_url")
1784
1696
 
@@ -1786,8 +1698,7 @@ class SecretBackendConnectionMysqlRds(dict):
1786
1698
  @pulumi.getter(name="maxConnectionLifetime")
1787
1699
  def max_connection_lifetime(self) -> Optional[int]:
1788
1700
  """
1789
- The maximum number of seconds to keep
1790
- a connection alive for.
1701
+ Maximum number of seconds a connection may be reused.
1791
1702
  """
1792
1703
  return pulumi.get(self, "max_connection_lifetime")
1793
1704
 
@@ -1795,8 +1706,7 @@ class SecretBackendConnectionMysqlRds(dict):
1795
1706
  @pulumi.getter(name="maxIdleConnections")
1796
1707
  def max_idle_connections(self) -> Optional[int]:
1797
1708
  """
1798
- The maximum number of idle connections to
1799
- maintain.
1709
+ Maximum number of idle connections to the database.
1800
1710
  """
1801
1711
  return pulumi.get(self, "max_idle_connections")
1802
1712
 
@@ -1804,8 +1714,7 @@ class SecretBackendConnectionMysqlRds(dict):
1804
1714
  @pulumi.getter(name="maxOpenConnections")
1805
1715
  def max_open_connections(self) -> Optional[int]:
1806
1716
  """
1807
- The maximum number of open connections to
1808
- use.
1717
+ Maximum number of open connections to the database.
1809
1718
  """
1810
1719
  return pulumi.get(self, "max_open_connections")
1811
1720
 
@@ -1813,7 +1722,7 @@ class SecretBackendConnectionMysqlRds(dict):
1813
1722
  @pulumi.getter
1814
1723
  def password(self) -> Optional[str]:
1815
1724
  """
1816
- The password to authenticate with.
1725
+ The root credential password used in the connection URL
1817
1726
  """
1818
1727
  return pulumi.get(self, "password")
1819
1728
 
@@ -1821,7 +1730,7 @@ class SecretBackendConnectionMysqlRds(dict):
1821
1730
  @pulumi.getter(name="serviceAccountJson")
1822
1731
  def service_account_json(self) -> Optional[str]:
1823
1732
  """
1824
- JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
1733
+ A JSON encoded credential for use with IAM authorization
1825
1734
  """
1826
1735
  return pulumi.get(self, "service_account_json")
1827
1736
 
@@ -1845,7 +1754,7 @@ class SecretBackendConnectionMysqlRds(dict):
1845
1754
  @pulumi.getter
1846
1755
  def username(self) -> Optional[str]:
1847
1756
  """
1848
- The username to authenticate with.
1757
+ The root credential username used in the connection URL
1849
1758
  """
1850
1759
  return pulumi.get(self, "username")
1851
1760
 
@@ -1853,7 +1762,7 @@ class SecretBackendConnectionMysqlRds(dict):
1853
1762
  @pulumi.getter(name="usernameTemplate")
1854
1763
  def username_template(self) -> Optional[str]:
1855
1764
  """
1856
- Template describing how dynamic usernames are generated.
1765
+ Username generation template.
1857
1766
  """
1858
1767
  return pulumi.get(self, "username_template")
1859
1768
 
@@ -1900,21 +1809,15 @@ class SecretBackendConnectionOracle(dict):
1900
1809
  username: Optional[str] = None,
1901
1810
  username_template: Optional[str] = None):
1902
1811
  """
1903
- :param str connection_url: A URL containing connection information. See
1904
- the [Vault
1905
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
1906
- for an example.
1907
- :param bool disconnect_sessions: Enable the built-in session disconnect mechanism.
1908
- :param int max_connection_lifetime: The maximum number of seconds to keep
1909
- a connection alive for.
1910
- :param int max_idle_connections: The maximum number of idle connections to
1911
- maintain.
1912
- :param int max_open_connections: The maximum number of open connections to
1913
- use.
1914
- :param str password: The password to authenticate with.
1915
- :param bool split_statements: Enable spliting statements after semi-colons.
1916
- :param str username: The username to authenticate with.
1917
- :param str username_template: Template describing how dynamic usernames are generated.
1812
+ :param str connection_url: Connection string to use to connect to the database.
1813
+ :param bool disconnect_sessions: Set to true to disconnect any open sessions prior to running the revocation statements.
1814
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
1815
+ :param int max_idle_connections: Maximum number of idle connections to the database.
1816
+ :param int max_open_connections: Maximum number of open connections to the database.
1817
+ :param str password: The root credential password used in the connection URL
1818
+ :param bool split_statements: Set to true in order to split statements after semi-colons.
1819
+ :param str username: The root credential username used in the connection URL
1820
+ :param str username_template: Username generation template.
1918
1821
  """
1919
1822
  if connection_url is not None:
1920
1823
  pulumi.set(__self__, "connection_url", connection_url)
@@ -1939,10 +1842,7 @@ class SecretBackendConnectionOracle(dict):
1939
1842
  @pulumi.getter(name="connectionUrl")
1940
1843
  def connection_url(self) -> Optional[str]:
1941
1844
  """
1942
- A URL containing connection information. See
1943
- the [Vault
1944
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
1945
- for an example.
1845
+ Connection string to use to connect to the database.
1946
1846
  """
1947
1847
  return pulumi.get(self, "connection_url")
1948
1848
 
@@ -1950,7 +1850,7 @@ class SecretBackendConnectionOracle(dict):
1950
1850
  @pulumi.getter(name="disconnectSessions")
1951
1851
  def disconnect_sessions(self) -> Optional[bool]:
1952
1852
  """
1953
- Enable the built-in session disconnect mechanism.
1853
+ Set to true to disconnect any open sessions prior to running the revocation statements.
1954
1854
  """
1955
1855
  return pulumi.get(self, "disconnect_sessions")
1956
1856
 
@@ -1958,8 +1858,7 @@ class SecretBackendConnectionOracle(dict):
1958
1858
  @pulumi.getter(name="maxConnectionLifetime")
1959
1859
  def max_connection_lifetime(self) -> Optional[int]:
1960
1860
  """
1961
- The maximum number of seconds to keep
1962
- a connection alive for.
1861
+ Maximum number of seconds a connection may be reused.
1963
1862
  """
1964
1863
  return pulumi.get(self, "max_connection_lifetime")
1965
1864
 
@@ -1967,8 +1866,7 @@ class SecretBackendConnectionOracle(dict):
1967
1866
  @pulumi.getter(name="maxIdleConnections")
1968
1867
  def max_idle_connections(self) -> Optional[int]:
1969
1868
  """
1970
- The maximum number of idle connections to
1971
- maintain.
1869
+ Maximum number of idle connections to the database.
1972
1870
  """
1973
1871
  return pulumi.get(self, "max_idle_connections")
1974
1872
 
@@ -1976,8 +1874,7 @@ class SecretBackendConnectionOracle(dict):
1976
1874
  @pulumi.getter(name="maxOpenConnections")
1977
1875
  def max_open_connections(self) -> Optional[int]:
1978
1876
  """
1979
- The maximum number of open connections to
1980
- use.
1877
+ Maximum number of open connections to the database.
1981
1878
  """
1982
1879
  return pulumi.get(self, "max_open_connections")
1983
1880
 
@@ -1985,7 +1882,7 @@ class SecretBackendConnectionOracle(dict):
1985
1882
  @pulumi.getter
1986
1883
  def password(self) -> Optional[str]:
1987
1884
  """
1988
- The password to authenticate with.
1885
+ The root credential password used in the connection URL
1989
1886
  """
1990
1887
  return pulumi.get(self, "password")
1991
1888
 
@@ -1993,7 +1890,7 @@ class SecretBackendConnectionOracle(dict):
1993
1890
  @pulumi.getter(name="splitStatements")
1994
1891
  def split_statements(self) -> Optional[bool]:
1995
1892
  """
1996
- Enable spliting statements after semi-colons.
1893
+ Set to true in order to split statements after semi-colons.
1997
1894
  """
1998
1895
  return pulumi.get(self, "split_statements")
1999
1896
 
@@ -2001,7 +1898,7 @@ class SecretBackendConnectionOracle(dict):
2001
1898
  @pulumi.getter
2002
1899
  def username(self) -> Optional[str]:
2003
1900
  """
2004
- The username to authenticate with.
1901
+ The root credential username used in the connection URL
2005
1902
  """
2006
1903
  return pulumi.get(self, "username")
2007
1904
 
@@ -2009,7 +1906,7 @@ class SecretBackendConnectionOracle(dict):
2009
1906
  @pulumi.getter(name="usernameTemplate")
2010
1907
  def username_template(self) -> Optional[str]:
2011
1908
  """
2012
- Template describing how dynamic usernames are generated.
1909
+ Username generation template.
2013
1910
  """
2014
1911
  return pulumi.get(self, "username_template")
2015
1912
 
@@ -2031,8 +1928,18 @@ class SecretBackendConnectionPostgresql(dict):
2031
1928
  suggest = "max_idle_connections"
2032
1929
  elif key == "maxOpenConnections":
2033
1930
  suggest = "max_open_connections"
1931
+ elif key == "passwordAuthentication":
1932
+ suggest = "password_authentication"
1933
+ elif key == "privateKey":
1934
+ suggest = "private_key"
1935
+ elif key == "selfManaged":
1936
+ suggest = "self_managed"
2034
1937
  elif key == "serviceAccountJson":
2035
1938
  suggest = "service_account_json"
1939
+ elif key == "tlsCa":
1940
+ suggest = "tls_ca"
1941
+ elif key == "tlsCertificate":
1942
+ suggest = "tls_certificate"
2036
1943
  elif key == "usernameTemplate":
2037
1944
  suggest = "username_template"
2038
1945
 
@@ -2055,26 +1962,30 @@ class SecretBackendConnectionPostgresql(dict):
2055
1962
  max_idle_connections: Optional[int] = None,
2056
1963
  max_open_connections: Optional[int] = None,
2057
1964
  password: Optional[str] = None,
1965
+ password_authentication: Optional[str] = None,
1966
+ private_key: Optional[str] = None,
1967
+ self_managed: Optional[bool] = None,
2058
1968
  service_account_json: Optional[str] = None,
1969
+ tls_ca: Optional[str] = None,
1970
+ tls_certificate: Optional[str] = None,
2059
1971
  username: Optional[str] = None,
2060
1972
  username_template: Optional[str] = None):
2061
1973
  """
2062
- :param str auth_type: Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
2063
- :param str connection_url: A URL containing connection information. See
2064
- the [Vault
2065
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
2066
- for an example.
2067
- :param bool disable_escaping: Disable special character escaping in username and password.
2068
- :param int max_connection_lifetime: The maximum number of seconds to keep
2069
- a connection alive for.
2070
- :param int max_idle_connections: The maximum number of idle connections to
2071
- maintain.
2072
- :param int max_open_connections: The maximum number of open connections to
2073
- use.
2074
- :param str password: The password to authenticate with.
2075
- :param str service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
2076
- :param str username: The username to authenticate with.
2077
- :param str username_template: Template describing how dynamic usernames are generated.
1974
+ :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
1975
+ :param str connection_url: Connection string to use to connect to the database.
1976
+ :param bool disable_escaping: Disable special character escaping in username and password
1977
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
1978
+ :param int max_idle_connections: Maximum number of idle connections to the database.
1979
+ :param int max_open_connections: Maximum number of open connections to the database.
1980
+ :param str password: The root credential password used in the connection URL
1981
+ :param str password_authentication: When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
1982
+ :param str private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
1983
+ :param bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
1984
+ :param str service_account_json: A JSON encoded credential for use with IAM authorization
1985
+ :param str tls_ca: The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
1986
+ :param str tls_certificate: The x509 client certificate for connecting to the database. Must be PEM encoded.
1987
+ :param str username: The root credential username used in the connection URL
1988
+ :param str username_template: Username generation template.
2078
1989
  """
2079
1990
  if auth_type is not None:
2080
1991
  pulumi.set(__self__, "auth_type", auth_type)
@@ -2090,8 +2001,18 @@ class SecretBackendConnectionPostgresql(dict):
2090
2001
  pulumi.set(__self__, "max_open_connections", max_open_connections)
2091
2002
  if password is not None:
2092
2003
  pulumi.set(__self__, "password", password)
2004
+ if password_authentication is not None:
2005
+ pulumi.set(__self__, "password_authentication", password_authentication)
2006
+ if private_key is not None:
2007
+ pulumi.set(__self__, "private_key", private_key)
2008
+ if self_managed is not None:
2009
+ pulumi.set(__self__, "self_managed", self_managed)
2093
2010
  if service_account_json is not None:
2094
2011
  pulumi.set(__self__, "service_account_json", service_account_json)
2012
+ if tls_ca is not None:
2013
+ pulumi.set(__self__, "tls_ca", tls_ca)
2014
+ if tls_certificate is not None:
2015
+ pulumi.set(__self__, "tls_certificate", tls_certificate)
2095
2016
  if username is not None:
2096
2017
  pulumi.set(__self__, "username", username)
2097
2018
  if username_template is not None:
@@ -2101,7 +2022,7 @@ class SecretBackendConnectionPostgresql(dict):
2101
2022
  @pulumi.getter(name="authType")
2102
2023
  def auth_type(self) -> Optional[str]:
2103
2024
  """
2104
- Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
2025
+ Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
2105
2026
  """
2106
2027
  return pulumi.get(self, "auth_type")
2107
2028
 
@@ -2109,10 +2030,7 @@ class SecretBackendConnectionPostgresql(dict):
2109
2030
  @pulumi.getter(name="connectionUrl")
2110
2031
  def connection_url(self) -> Optional[str]:
2111
2032
  """
2112
- A URL containing connection information. See
2113
- the [Vault
2114
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
2115
- for an example.
2033
+ Connection string to use to connect to the database.
2116
2034
  """
2117
2035
  return pulumi.get(self, "connection_url")
2118
2036
 
@@ -2120,7 +2038,7 @@ class SecretBackendConnectionPostgresql(dict):
2120
2038
  @pulumi.getter(name="disableEscaping")
2121
2039
  def disable_escaping(self) -> Optional[bool]:
2122
2040
  """
2123
- Disable special character escaping in username and password.
2041
+ Disable special character escaping in username and password
2124
2042
  """
2125
2043
  return pulumi.get(self, "disable_escaping")
2126
2044
 
@@ -2128,8 +2046,7 @@ class SecretBackendConnectionPostgresql(dict):
2128
2046
  @pulumi.getter(name="maxConnectionLifetime")
2129
2047
  def max_connection_lifetime(self) -> Optional[int]:
2130
2048
  """
2131
- The maximum number of seconds to keep
2132
- a connection alive for.
2049
+ Maximum number of seconds a connection may be reused.
2133
2050
  """
2134
2051
  return pulumi.get(self, "max_connection_lifetime")
2135
2052
 
@@ -2137,8 +2054,7 @@ class SecretBackendConnectionPostgresql(dict):
2137
2054
  @pulumi.getter(name="maxIdleConnections")
2138
2055
  def max_idle_connections(self) -> Optional[int]:
2139
2056
  """
2140
- The maximum number of idle connections to
2141
- maintain.
2057
+ Maximum number of idle connections to the database.
2142
2058
  """
2143
2059
  return pulumi.get(self, "max_idle_connections")
2144
2060
 
@@ -2146,8 +2062,7 @@ class SecretBackendConnectionPostgresql(dict):
2146
2062
  @pulumi.getter(name="maxOpenConnections")
2147
2063
  def max_open_connections(self) -> Optional[int]:
2148
2064
  """
2149
- The maximum number of open connections to
2150
- use.
2065
+ Maximum number of open connections to the database.
2151
2066
  """
2152
2067
  return pulumi.get(self, "max_open_connections")
2153
2068
 
@@ -2155,23 +2070,63 @@ class SecretBackendConnectionPostgresql(dict):
2155
2070
  @pulumi.getter
2156
2071
  def password(self) -> Optional[str]:
2157
2072
  """
2158
- The password to authenticate with.
2073
+ The root credential password used in the connection URL
2159
2074
  """
2160
2075
  return pulumi.get(self, "password")
2161
2076
 
2077
+ @property
2078
+ @pulumi.getter(name="passwordAuthentication")
2079
+ def password_authentication(self) -> Optional[str]:
2080
+ """
2081
+ When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
2082
+ """
2083
+ return pulumi.get(self, "password_authentication")
2084
+
2085
+ @property
2086
+ @pulumi.getter(name="privateKey")
2087
+ def private_key(self) -> Optional[str]:
2088
+ """
2089
+ The secret key used for the x509 client certificate. Must be PEM encoded.
2090
+ """
2091
+ return pulumi.get(self, "private_key")
2092
+
2093
+ @property
2094
+ @pulumi.getter(name="selfManaged")
2095
+ def self_managed(self) -> Optional[bool]:
2096
+ """
2097
+ If set, allows onboarding static roles with a rootless connection configuration.
2098
+ """
2099
+ return pulumi.get(self, "self_managed")
2100
+
2162
2101
  @property
2163
2102
  @pulumi.getter(name="serviceAccountJson")
2164
2103
  def service_account_json(self) -> Optional[str]:
2165
2104
  """
2166
- JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
2105
+ A JSON encoded credential for use with IAM authorization
2167
2106
  """
2168
2107
  return pulumi.get(self, "service_account_json")
2169
2108
 
2109
+ @property
2110
+ @pulumi.getter(name="tlsCa")
2111
+ def tls_ca(self) -> Optional[str]:
2112
+ """
2113
+ The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
2114
+ """
2115
+ return pulumi.get(self, "tls_ca")
2116
+
2117
+ @property
2118
+ @pulumi.getter(name="tlsCertificate")
2119
+ def tls_certificate(self) -> Optional[str]:
2120
+ """
2121
+ The x509 client certificate for connecting to the database. Must be PEM encoded.
2122
+ """
2123
+ return pulumi.get(self, "tls_certificate")
2124
+
2170
2125
  @property
2171
2126
  @pulumi.getter
2172
2127
  def username(self) -> Optional[str]:
2173
2128
  """
2174
- The username to authenticate with.
2129
+ The root credential username used in the connection URL
2175
2130
  """
2176
2131
  return pulumi.get(self, "username")
2177
2132
 
@@ -2179,7 +2134,7 @@ class SecretBackendConnectionPostgresql(dict):
2179
2134
  @pulumi.getter(name="usernameTemplate")
2180
2135
  def username_template(self) -> Optional[str]:
2181
2136
  """
2182
- Template describing how dynamic usernames are generated.
2137
+ Username generation template.
2183
2138
  """
2184
2139
  return pulumi.get(self, "username_template")
2185
2140
 
@@ -2214,15 +2169,13 @@ class SecretBackendConnectionRedis(dict):
2214
2169
  port: Optional[int] = None,
2215
2170
  tls: Optional[bool] = None):
2216
2171
  """
2217
- :param str host: The host to connect to.
2218
- :param str password: The password to authenticate with.
2219
- :param str username: The username to authenticate with.
2220
- :param str ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
2221
- :param bool insecure_tls: Whether to skip verification of the server
2222
- certificate when using TLS.
2223
- :param int port: The default port to connect to if no port is specified as
2224
- part of the host.
2225
- :param bool tls: Whether to use TLS when connecting to Cassandra.
2172
+ :param str host: Specifies the host to connect to
2173
+ :param str password: Specifies the password corresponding to the given username.
2174
+ :param str username: Specifies the username for Vault to use.
2175
+ :param str ca_cert: The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
2176
+ :param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
2177
+ :param int port: The transport port to use to connect to Redis.
2178
+ :param bool tls: Specifies whether to use TLS when connecting to Redis.
2226
2179
  """
2227
2180
  pulumi.set(__self__, "host", host)
2228
2181
  pulumi.set(__self__, "password", password)
@@ -2240,7 +2193,7 @@ class SecretBackendConnectionRedis(dict):
2240
2193
  @pulumi.getter
2241
2194
  def host(self) -> str:
2242
2195
  """
2243
- The host to connect to.
2196
+ Specifies the host to connect to
2244
2197
  """
2245
2198
  return pulumi.get(self, "host")
2246
2199
 
@@ -2248,7 +2201,7 @@ class SecretBackendConnectionRedis(dict):
2248
2201
  @pulumi.getter
2249
2202
  def password(self) -> str:
2250
2203
  """
2251
- The password to authenticate with.
2204
+ Specifies the password corresponding to the given username.
2252
2205
  """
2253
2206
  return pulumi.get(self, "password")
2254
2207
 
@@ -2256,7 +2209,7 @@ class SecretBackendConnectionRedis(dict):
2256
2209
  @pulumi.getter
2257
2210
  def username(self) -> str:
2258
2211
  """
2259
- The username to authenticate with.
2212
+ Specifies the username for Vault to use.
2260
2213
  """
2261
2214
  return pulumi.get(self, "username")
2262
2215
 
@@ -2264,7 +2217,7 @@ class SecretBackendConnectionRedis(dict):
2264
2217
  @pulumi.getter(name="caCert")
2265
2218
  def ca_cert(self) -> Optional[str]:
2266
2219
  """
2267
- The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
2220
+ The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
2268
2221
  """
2269
2222
  return pulumi.get(self, "ca_cert")
2270
2223
 
@@ -2272,8 +2225,7 @@ class SecretBackendConnectionRedis(dict):
2272
2225
  @pulumi.getter(name="insecureTls")
2273
2226
  def insecure_tls(self) -> Optional[bool]:
2274
2227
  """
2275
- Whether to skip verification of the server
2276
- certificate when using TLS.
2228
+ Specifies whether to skip verification of the server certificate when using TLS.
2277
2229
  """
2278
2230
  return pulumi.get(self, "insecure_tls")
2279
2231
 
@@ -2281,8 +2233,7 @@ class SecretBackendConnectionRedis(dict):
2281
2233
  @pulumi.getter
2282
2234
  def port(self) -> Optional[int]:
2283
2235
  """
2284
- The default port to connect to if no port is specified as
2285
- part of the host.
2236
+ The transport port to use to connect to Redis.
2286
2237
  """
2287
2238
  return pulumi.get(self, "port")
2288
2239
 
@@ -2290,7 +2241,7 @@ class SecretBackendConnectionRedis(dict):
2290
2241
  @pulumi.getter
2291
2242
  def tls(self) -> Optional[bool]:
2292
2243
  """
2293
- Whether to use TLS when connecting to Cassandra.
2244
+ Specifies whether to use TLS when connecting to Redis.
2294
2245
  """
2295
2246
  return pulumi.get(self, "tls")
2296
2247
 
@@ -2303,11 +2254,10 @@ class SecretBackendConnectionRedisElasticache(dict):
2303
2254
  region: Optional[str] = None,
2304
2255
  username: Optional[str] = None):
2305
2256
  """
2306
- :param str url: The URL for Elasticsearch's API. https requires certificate
2307
- by trusted CA if used.
2308
- :param str password: The password to authenticate with.
2309
- :param str region: The region where the ElastiCache cluster is hosted. If omitted Vault tries to infer from the environment instead.
2310
- :param str username: The username to authenticate with.
2257
+ :param str url: The configuration endpoint for the ElastiCache cluster to connect to.
2258
+ :param str password: The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
2259
+ :param str region: The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
2260
+ :param str username: The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
2311
2261
  """
2312
2262
  pulumi.set(__self__, "url", url)
2313
2263
  if password is not None:
@@ -2321,8 +2271,7 @@ class SecretBackendConnectionRedisElasticache(dict):
2321
2271
  @pulumi.getter
2322
2272
  def url(self) -> str:
2323
2273
  """
2324
- The URL for Elasticsearch's API. https requires certificate
2325
- by trusted CA if used.
2274
+ The configuration endpoint for the ElastiCache cluster to connect to.
2326
2275
  """
2327
2276
  return pulumi.get(self, "url")
2328
2277
 
@@ -2330,7 +2279,7 @@ class SecretBackendConnectionRedisElasticache(dict):
2330
2279
  @pulumi.getter
2331
2280
  def password(self) -> Optional[str]:
2332
2281
  """
2333
- The password to authenticate with.
2282
+ The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
2334
2283
  """
2335
2284
  return pulumi.get(self, "password")
2336
2285
 
@@ -2338,7 +2287,7 @@ class SecretBackendConnectionRedisElasticache(dict):
2338
2287
  @pulumi.getter
2339
2288
  def region(self) -> Optional[str]:
2340
2289
  """
2341
- The region where the ElastiCache cluster is hosted. If omitted Vault tries to infer from the environment instead.
2290
+ The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
2342
2291
  """
2343
2292
  return pulumi.get(self, "region")
2344
2293
 
@@ -2346,7 +2295,7 @@ class SecretBackendConnectionRedisElasticache(dict):
2346
2295
  @pulumi.getter
2347
2296
  def username(self) -> Optional[str]:
2348
2297
  """
2349
- The username to authenticate with.
2298
+ The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
2350
2299
  """
2351
2300
  return pulumi.get(self, "username")
2352
2301
 
@@ -2390,20 +2339,14 @@ class SecretBackendConnectionRedshift(dict):
2390
2339
  username: Optional[str] = None,
2391
2340
  username_template: Optional[str] = None):
2392
2341
  """
2393
- :param str connection_url: A URL containing connection information. See
2394
- the [Vault
2395
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
2396
- for an example.
2397
- :param bool disable_escaping: Disable special character escaping in username and password.
2398
- :param int max_connection_lifetime: The maximum number of seconds to keep
2399
- a connection alive for.
2400
- :param int max_idle_connections: The maximum number of idle connections to
2401
- maintain.
2402
- :param int max_open_connections: The maximum number of open connections to
2403
- use.
2404
- :param str password: The password to authenticate with.
2405
- :param str username: The username to authenticate with.
2406
- :param str username_template: Template describing how dynamic usernames are generated.
2342
+ :param str connection_url: Connection string to use to connect to the database.
2343
+ :param bool disable_escaping: Disable special character escaping in username and password
2344
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
2345
+ :param int max_idle_connections: Maximum number of idle connections to the database.
2346
+ :param int max_open_connections: Maximum number of open connections to the database.
2347
+ :param str password: The root credential password used in the connection URL
2348
+ :param str username: The root credential username used in the connection URL
2349
+ :param str username_template: Username generation template.
2407
2350
  """
2408
2351
  if connection_url is not None:
2409
2352
  pulumi.set(__self__, "connection_url", connection_url)
@@ -2426,10 +2369,7 @@ class SecretBackendConnectionRedshift(dict):
2426
2369
  @pulumi.getter(name="connectionUrl")
2427
2370
  def connection_url(self) -> Optional[str]:
2428
2371
  """
2429
- A URL containing connection information. See
2430
- the [Vault
2431
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
2432
- for an example.
2372
+ Connection string to use to connect to the database.
2433
2373
  """
2434
2374
  return pulumi.get(self, "connection_url")
2435
2375
 
@@ -2437,7 +2377,7 @@ class SecretBackendConnectionRedshift(dict):
2437
2377
  @pulumi.getter(name="disableEscaping")
2438
2378
  def disable_escaping(self) -> Optional[bool]:
2439
2379
  """
2440
- Disable special character escaping in username and password.
2380
+ Disable special character escaping in username and password
2441
2381
  """
2442
2382
  return pulumi.get(self, "disable_escaping")
2443
2383
 
@@ -2445,8 +2385,7 @@ class SecretBackendConnectionRedshift(dict):
2445
2385
  @pulumi.getter(name="maxConnectionLifetime")
2446
2386
  def max_connection_lifetime(self) -> Optional[int]:
2447
2387
  """
2448
- The maximum number of seconds to keep
2449
- a connection alive for.
2388
+ Maximum number of seconds a connection may be reused.
2450
2389
  """
2451
2390
  return pulumi.get(self, "max_connection_lifetime")
2452
2391
 
@@ -2454,8 +2393,7 @@ class SecretBackendConnectionRedshift(dict):
2454
2393
  @pulumi.getter(name="maxIdleConnections")
2455
2394
  def max_idle_connections(self) -> Optional[int]:
2456
2395
  """
2457
- The maximum number of idle connections to
2458
- maintain.
2396
+ Maximum number of idle connections to the database.
2459
2397
  """
2460
2398
  return pulumi.get(self, "max_idle_connections")
2461
2399
 
@@ -2463,8 +2401,7 @@ class SecretBackendConnectionRedshift(dict):
2463
2401
  @pulumi.getter(name="maxOpenConnections")
2464
2402
  def max_open_connections(self) -> Optional[int]:
2465
2403
  """
2466
- The maximum number of open connections to
2467
- use.
2404
+ Maximum number of open connections to the database.
2468
2405
  """
2469
2406
  return pulumi.get(self, "max_open_connections")
2470
2407
 
@@ -2472,7 +2409,7 @@ class SecretBackendConnectionRedshift(dict):
2472
2409
  @pulumi.getter
2473
2410
  def password(self) -> Optional[str]:
2474
2411
  """
2475
- The password to authenticate with.
2412
+ The root credential password used in the connection URL
2476
2413
  """
2477
2414
  return pulumi.get(self, "password")
2478
2415
 
@@ -2480,7 +2417,7 @@ class SecretBackendConnectionRedshift(dict):
2480
2417
  @pulumi.getter
2481
2418
  def username(self) -> Optional[str]:
2482
2419
  """
2483
- The username to authenticate with.
2420
+ The root credential username used in the connection URL
2484
2421
  """
2485
2422
  return pulumi.get(self, "username")
2486
2423
 
@@ -2488,7 +2425,7 @@ class SecretBackendConnectionRedshift(dict):
2488
2425
  @pulumi.getter(name="usernameTemplate")
2489
2426
  def username_template(self) -> Optional[str]:
2490
2427
  """
2491
- Template describing how dynamic usernames are generated.
2428
+ Username generation template.
2492
2429
  """
2493
2430
  return pulumi.get(self, "username_template")
2494
2431
 
@@ -2529,19 +2466,13 @@ class SecretBackendConnectionSnowflake(dict):
2529
2466
  username: Optional[str] = None,
2530
2467
  username_template: Optional[str] = None):
2531
2468
  """
2532
- :param str connection_url: A URL containing connection information. See
2533
- the [Vault
2534
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
2535
- for an example.
2536
- :param int max_connection_lifetime: The maximum number of seconds to keep
2537
- a connection alive for.
2538
- :param int max_idle_connections: The maximum number of idle connections to
2539
- maintain.
2540
- :param int max_open_connections: The maximum number of open connections to
2541
- use.
2542
- :param str password: The password to authenticate with.
2543
- :param str username: The username to authenticate with.
2544
- :param str username_template: Template describing how dynamic usernames are generated.
2469
+ :param str connection_url: Connection string to use to connect to the database.
2470
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
2471
+ :param int max_idle_connections: Maximum number of idle connections to the database.
2472
+ :param int max_open_connections: Maximum number of open connections to the database.
2473
+ :param str password: The root credential password used in the connection URL
2474
+ :param str username: The root credential username used in the connection URL
2475
+ :param str username_template: Username generation template.
2545
2476
  """
2546
2477
  if connection_url is not None:
2547
2478
  pulumi.set(__self__, "connection_url", connection_url)
@@ -2562,10 +2493,7 @@ class SecretBackendConnectionSnowflake(dict):
2562
2493
  @pulumi.getter(name="connectionUrl")
2563
2494
  def connection_url(self) -> Optional[str]:
2564
2495
  """
2565
- A URL containing connection information. See
2566
- the [Vault
2567
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
2568
- for an example.
2496
+ Connection string to use to connect to the database.
2569
2497
  """
2570
2498
  return pulumi.get(self, "connection_url")
2571
2499
 
@@ -2573,8 +2501,7 @@ class SecretBackendConnectionSnowflake(dict):
2573
2501
  @pulumi.getter(name="maxConnectionLifetime")
2574
2502
  def max_connection_lifetime(self) -> Optional[int]:
2575
2503
  """
2576
- The maximum number of seconds to keep
2577
- a connection alive for.
2504
+ Maximum number of seconds a connection may be reused.
2578
2505
  """
2579
2506
  return pulumi.get(self, "max_connection_lifetime")
2580
2507
 
@@ -2582,8 +2509,7 @@ class SecretBackendConnectionSnowflake(dict):
2582
2509
  @pulumi.getter(name="maxIdleConnections")
2583
2510
  def max_idle_connections(self) -> Optional[int]:
2584
2511
  """
2585
- The maximum number of idle connections to
2586
- maintain.
2512
+ Maximum number of idle connections to the database.
2587
2513
  """
2588
2514
  return pulumi.get(self, "max_idle_connections")
2589
2515
 
@@ -2591,8 +2517,7 @@ class SecretBackendConnectionSnowflake(dict):
2591
2517
  @pulumi.getter(name="maxOpenConnections")
2592
2518
  def max_open_connections(self) -> Optional[int]:
2593
2519
  """
2594
- The maximum number of open connections to
2595
- use.
2520
+ Maximum number of open connections to the database.
2596
2521
  """
2597
2522
  return pulumi.get(self, "max_open_connections")
2598
2523
 
@@ -2600,7 +2525,7 @@ class SecretBackendConnectionSnowflake(dict):
2600
2525
  @pulumi.getter
2601
2526
  def password(self) -> Optional[str]:
2602
2527
  """
2603
- The password to authenticate with.
2528
+ The root credential password used in the connection URL
2604
2529
  """
2605
2530
  return pulumi.get(self, "password")
2606
2531
 
@@ -2608,7 +2533,7 @@ class SecretBackendConnectionSnowflake(dict):
2608
2533
  @pulumi.getter
2609
2534
  def username(self) -> Optional[str]:
2610
2535
  """
2611
- The username to authenticate with.
2536
+ The root credential username used in the connection URL
2612
2537
  """
2613
2538
  return pulumi.get(self, "username")
2614
2539
 
@@ -2616,7 +2541,7 @@ class SecretBackendConnectionSnowflake(dict):
2616
2541
  @pulumi.getter(name="usernameTemplate")
2617
2542
  def username_template(self) -> Optional[str]:
2618
2543
  """
2619
- Template describing how dynamic usernames are generated.
2544
+ Username generation template.
2620
2545
  """
2621
2546
  return pulumi.get(self, "username_template")
2622
2547
 
@@ -2642,6 +2567,8 @@ class SecretsMountCassandra(dict):
2642
2567
  suggest = "protocol_version"
2643
2568
  elif key == "rootRotationStatements":
2644
2569
  suggest = "root_rotation_statements"
2570
+ elif key == "skipVerification":
2571
+ suggest = "skip_verification"
2645
2572
  elif key == "verifyConnection":
2646
2573
  suggest = "verify_connection"
2647
2574
 
@@ -2660,7 +2587,7 @@ class SecretsMountCassandra(dict):
2660
2587
  name: str,
2661
2588
  allowed_roles: Optional[Sequence[str]] = None,
2662
2589
  connect_timeout: Optional[int] = None,
2663
- data: Optional[Mapping[str, Any]] = None,
2590
+ data: Optional[Mapping[str, str]] = None,
2664
2591
  hosts: Optional[Sequence[str]] = None,
2665
2592
  insecure_tls: Optional[bool] = None,
2666
2593
  password: Optional[str] = None,
@@ -2670,6 +2597,7 @@ class SecretsMountCassandra(dict):
2670
2597
  port: Optional[int] = None,
2671
2598
  protocol_version: Optional[int] = None,
2672
2599
  root_rotation_statements: Optional[Sequence[str]] = None,
2600
+ skip_verification: Optional[bool] = None,
2673
2601
  tls: Optional[bool] = None,
2674
2602
  username: Optional[str] = None,
2675
2603
  verify_connection: Optional[bool] = None):
@@ -2677,25 +2605,22 @@ class SecretsMountCassandra(dict):
2677
2605
  :param str name: Name of the database connection.
2678
2606
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
2679
2607
  connection.
2680
- :param int connect_timeout: The number of seconds to use as a connection
2681
- timeout.
2682
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2608
+ :param int connect_timeout: The number of seconds to use as a connection timeout.
2609
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2683
2610
 
2684
2611
  Supported list of database secrets engines that can be configured:
2685
- :param Sequence[str] hosts: The hosts to connect to.
2686
- :param bool insecure_tls: Whether to skip verification of the server
2687
- certificate when using TLS.
2688
- :param str password: The root credential password used in the connection URL.
2689
- :param str pem_bundle: Concatenated PEM blocks configuring the certificate
2690
- chain.
2691
- :param str pem_json: A JSON structure configuring the certificate chain.
2612
+ :param Sequence[str] hosts: Cassandra hosts to connect to.
2613
+ :param bool insecure_tls: Whether to skip verification of the server certificate when using TLS.
2614
+ :param str password: The password to use when authenticating with Cassandra.
2615
+ :param str pem_bundle: Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
2616
+ :param str pem_json: Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
2692
2617
  :param str plugin_name: Specifies the name of the plugin to use.
2693
- :param int port: The default port to connect to if no port is specified as
2694
- part of the host.
2618
+ :param int port: The transport port to use to connect to Cassandra.
2695
2619
  :param int protocol_version: The CQL protocol version to use.
2696
2620
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
2621
+ :param bool skip_verification: Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
2697
2622
  :param bool tls: Whether to use TLS when connecting to Cassandra.
2698
- :param str username: The root credential username used in the connection URL.
2623
+ :param str username: The username to use when authenticating with Cassandra.
2699
2624
  :param bool verify_connection: Whether the connection should be verified on
2700
2625
  initial configuration or not.
2701
2626
  """
@@ -2724,6 +2649,8 @@ class SecretsMountCassandra(dict):
2724
2649
  pulumi.set(__self__, "protocol_version", protocol_version)
2725
2650
  if root_rotation_statements is not None:
2726
2651
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
2652
+ if skip_verification is not None:
2653
+ pulumi.set(__self__, "skip_verification", skip_verification)
2727
2654
  if tls is not None:
2728
2655
  pulumi.set(__self__, "tls", tls)
2729
2656
  if username is not None:
@@ -2752,14 +2679,13 @@ class SecretsMountCassandra(dict):
2752
2679
  @pulumi.getter(name="connectTimeout")
2753
2680
  def connect_timeout(self) -> Optional[int]:
2754
2681
  """
2755
- The number of seconds to use as a connection
2756
- timeout.
2682
+ The number of seconds to use as a connection timeout.
2757
2683
  """
2758
2684
  return pulumi.get(self, "connect_timeout")
2759
2685
 
2760
2686
  @property
2761
2687
  @pulumi.getter
2762
- def data(self) -> Optional[Mapping[str, Any]]:
2688
+ def data(self) -> Optional[Mapping[str, str]]:
2763
2689
  """
2764
2690
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2765
2691
 
@@ -2771,7 +2697,7 @@ class SecretsMountCassandra(dict):
2771
2697
  @pulumi.getter
2772
2698
  def hosts(self) -> Optional[Sequence[str]]:
2773
2699
  """
2774
- The hosts to connect to.
2700
+ Cassandra hosts to connect to.
2775
2701
  """
2776
2702
  return pulumi.get(self, "hosts")
2777
2703
 
@@ -2779,8 +2705,7 @@ class SecretsMountCassandra(dict):
2779
2705
  @pulumi.getter(name="insecureTls")
2780
2706
  def insecure_tls(self) -> Optional[bool]:
2781
2707
  """
2782
- Whether to skip verification of the server
2783
- certificate when using TLS.
2708
+ Whether to skip verification of the server certificate when using TLS.
2784
2709
  """
2785
2710
  return pulumi.get(self, "insecure_tls")
2786
2711
 
@@ -2788,7 +2713,7 @@ class SecretsMountCassandra(dict):
2788
2713
  @pulumi.getter
2789
2714
  def password(self) -> Optional[str]:
2790
2715
  """
2791
- The root credential password used in the connection URL.
2716
+ The password to use when authenticating with Cassandra.
2792
2717
  """
2793
2718
  return pulumi.get(self, "password")
2794
2719
 
@@ -2796,8 +2721,7 @@ class SecretsMountCassandra(dict):
2796
2721
  @pulumi.getter(name="pemBundle")
2797
2722
  def pem_bundle(self) -> Optional[str]:
2798
2723
  """
2799
- Concatenated PEM blocks configuring the certificate
2800
- chain.
2724
+ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
2801
2725
  """
2802
2726
  return pulumi.get(self, "pem_bundle")
2803
2727
 
@@ -2805,7 +2729,7 @@ class SecretsMountCassandra(dict):
2805
2729
  @pulumi.getter(name="pemJson")
2806
2730
  def pem_json(self) -> Optional[str]:
2807
2731
  """
2808
- A JSON structure configuring the certificate chain.
2732
+ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
2809
2733
  """
2810
2734
  return pulumi.get(self, "pem_json")
2811
2735
 
@@ -2821,8 +2745,7 @@ class SecretsMountCassandra(dict):
2821
2745
  @pulumi.getter
2822
2746
  def port(self) -> Optional[int]:
2823
2747
  """
2824
- The default port to connect to if no port is specified as
2825
- part of the host.
2748
+ The transport port to use to connect to Cassandra.
2826
2749
  """
2827
2750
  return pulumi.get(self, "port")
2828
2751
 
@@ -2842,6 +2765,14 @@ class SecretsMountCassandra(dict):
2842
2765
  """
2843
2766
  return pulumi.get(self, "root_rotation_statements")
2844
2767
 
2768
+ @property
2769
+ @pulumi.getter(name="skipVerification")
2770
+ def skip_verification(self) -> Optional[bool]:
2771
+ """
2772
+ Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
2773
+ """
2774
+ return pulumi.get(self, "skip_verification")
2775
+
2845
2776
  @property
2846
2777
  @pulumi.getter
2847
2778
  def tls(self) -> Optional[bool]:
@@ -2854,7 +2785,7 @@ class SecretsMountCassandra(dict):
2854
2785
  @pulumi.getter
2855
2786
  def username(self) -> Optional[str]:
2856
2787
  """
2857
- The root credential username used in the connection URL.
2788
+ The username to use when authenticating with Cassandra.
2858
2789
  """
2859
2790
  return pulumi.get(self, "username")
2860
2791
 
@@ -2909,7 +2840,7 @@ class SecretsMountCouchbase(dict):
2909
2840
  allowed_roles: Optional[Sequence[str]] = None,
2910
2841
  base64_pem: Optional[str] = None,
2911
2842
  bucket_name: Optional[str] = None,
2912
- data: Optional[Mapping[str, Any]] = None,
2843
+ data: Optional[Mapping[str, str]] = None,
2913
2844
  insecure_tls: Optional[bool] = None,
2914
2845
  plugin_name: Optional[str] = None,
2915
2846
  root_rotation_statements: Optional[Sequence[str]] = None,
@@ -2917,23 +2848,22 @@ class SecretsMountCouchbase(dict):
2917
2848
  username_template: Optional[str] = None,
2918
2849
  verify_connection: Optional[bool] = None):
2919
2850
  """
2920
- :param Sequence[str] hosts: The hosts to connect to.
2851
+ :param Sequence[str] hosts: A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
2921
2852
  :param str name: Name of the database connection.
2922
- :param str password: The root credential password used in the connection URL.
2923
- :param str username: The root credential username used in the connection URL.
2853
+ :param str password: Specifies the password corresponding to the given username.
2854
+ :param str username: Specifies the username for Vault to use.
2924
2855
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
2925
2856
  connection.
2926
2857
  :param str base64_pem: Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
2927
2858
  :param str bucket_name: Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
2928
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2859
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2929
2860
 
2930
2861
  Supported list of database secrets engines that can be configured:
2931
- :param bool insecure_tls: Whether to skip verification of the server
2932
- certificate when using TLS.
2862
+ :param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
2933
2863
  :param str plugin_name: Specifies the name of the plugin to use.
2934
2864
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
2935
- :param bool tls: Whether to use TLS when connecting to Cassandra.
2936
- :param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
2865
+ :param bool tls: Specifies whether to use TLS when connecting to Couchbase.
2866
+ :param str username_template: Template describing how dynamic usernames are generated.
2937
2867
  :param bool verify_connection: Whether the connection should be verified on
2938
2868
  initial configuration or not.
2939
2869
  """
@@ -2966,7 +2896,7 @@ class SecretsMountCouchbase(dict):
2966
2896
  @pulumi.getter
2967
2897
  def hosts(self) -> Sequence[str]:
2968
2898
  """
2969
- The hosts to connect to.
2899
+ A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
2970
2900
  """
2971
2901
  return pulumi.get(self, "hosts")
2972
2902
 
@@ -2982,7 +2912,7 @@ class SecretsMountCouchbase(dict):
2982
2912
  @pulumi.getter
2983
2913
  def password(self) -> str:
2984
2914
  """
2985
- The root credential password used in the connection URL.
2915
+ Specifies the password corresponding to the given username.
2986
2916
  """
2987
2917
  return pulumi.get(self, "password")
2988
2918
 
@@ -2990,7 +2920,7 @@ class SecretsMountCouchbase(dict):
2990
2920
  @pulumi.getter
2991
2921
  def username(self) -> str:
2992
2922
  """
2993
- The root credential username used in the connection URL.
2923
+ Specifies the username for Vault to use.
2994
2924
  """
2995
2925
  return pulumi.get(self, "username")
2996
2926
 
@@ -3021,7 +2951,7 @@ class SecretsMountCouchbase(dict):
3021
2951
 
3022
2952
  @property
3023
2953
  @pulumi.getter
3024
- def data(self) -> Optional[Mapping[str, Any]]:
2954
+ def data(self) -> Optional[Mapping[str, str]]:
3025
2955
  """
3026
2956
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3027
2957
 
@@ -3033,8 +2963,7 @@ class SecretsMountCouchbase(dict):
3033
2963
  @pulumi.getter(name="insecureTls")
3034
2964
  def insecure_tls(self) -> Optional[bool]:
3035
2965
  """
3036
- Whether to skip verification of the server
3037
- certificate when using TLS.
2966
+ Specifies whether to skip verification of the server certificate when using TLS.
3038
2967
  """
3039
2968
  return pulumi.get(self, "insecure_tls")
3040
2969
 
@@ -3058,7 +2987,7 @@ class SecretsMountCouchbase(dict):
3058
2987
  @pulumi.getter
3059
2988
  def tls(self) -> Optional[bool]:
3060
2989
  """
3061
- Whether to use TLS when connecting to Cassandra.
2990
+ Specifies whether to use TLS when connecting to Couchbase.
3062
2991
  """
3063
2992
  return pulumi.get(self, "tls")
3064
2993
 
@@ -3066,7 +2995,7 @@ class SecretsMountCouchbase(dict):
3066
2995
  @pulumi.getter(name="usernameTemplate")
3067
2996
  def username_template(self) -> Optional[str]:
3068
2997
  """
3069
- [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
2998
+ Template describing how dynamic usernames are generated.
3070
2999
  """
3071
3000
  return pulumi.get(self, "username_template")
3072
3001
 
@@ -3127,7 +3056,7 @@ class SecretsMountElasticsearch(dict):
3127
3056
  ca_path: Optional[str] = None,
3128
3057
  client_cert: Optional[str] = None,
3129
3058
  client_key: Optional[str] = None,
3130
- data: Optional[Mapping[str, Any]] = None,
3059
+ data: Optional[Mapping[str, str]] = None,
3131
3060
  insecure: Optional[bool] = None,
3132
3061
  plugin_name: Optional[str] = None,
3133
3062
  root_rotation_statements: Optional[Sequence[str]] = None,
@@ -3136,24 +3065,23 @@ class SecretsMountElasticsearch(dict):
3136
3065
  verify_connection: Optional[bool] = None):
3137
3066
  """
3138
3067
  :param str name: Name of the database connection.
3139
- :param str password: The root credential password used in the connection URL.
3140
- :param str url: The URL for Elasticsearch's API. https requires certificate
3141
- by trusted CA if used.
3142
- :param str username: The root credential username used in the connection URL.
3068
+ :param str password: The password to be used in the connection URL
3069
+ :param str url: The URL for Elasticsearch's API
3070
+ :param str username: The username to be used in the connection URL
3143
3071
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
3144
3072
  connection.
3145
- :param str ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
3146
- :param str ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
3147
- :param str client_cert: The path to the certificate for the Elasticsearch client to present for communication.
3148
- :param str client_key: The path to the key for the Elasticsearch client to use for communication.
3149
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3073
+ :param str ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
3074
+ :param str ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
3075
+ :param str client_cert: The path to the certificate for the Elasticsearch client to present for communication
3076
+ :param str client_key: The path to the key for the Elasticsearch client to use for communication
3077
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3150
3078
 
3151
3079
  Supported list of database secrets engines that can be configured:
3152
- :param bool insecure: Whether to disable certificate verification.
3080
+ :param bool insecure: Whether to disable certificate verification
3153
3081
  :param str plugin_name: Specifies the name of the plugin to use.
3154
3082
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
3155
- :param str tls_server_name: This, if set, is used to set the SNI host when connecting via TLS.
3156
- :param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
3083
+ :param str tls_server_name: This, if set, is used to set the SNI host when connecting via TLS
3084
+ :param str username_template: Template describing how dynamic usernames are generated.
3157
3085
  :param bool verify_connection: Whether the connection should be verified on
3158
3086
  initial configuration or not.
3159
3087
  """
@@ -3198,7 +3126,7 @@ class SecretsMountElasticsearch(dict):
3198
3126
  @pulumi.getter
3199
3127
  def password(self) -> str:
3200
3128
  """
3201
- The root credential password used in the connection URL.
3129
+ The password to be used in the connection URL
3202
3130
  """
3203
3131
  return pulumi.get(self, "password")
3204
3132
 
@@ -3206,8 +3134,7 @@ class SecretsMountElasticsearch(dict):
3206
3134
  @pulumi.getter
3207
3135
  def url(self) -> str:
3208
3136
  """
3209
- The URL for Elasticsearch's API. https requires certificate
3210
- by trusted CA if used.
3137
+ The URL for Elasticsearch's API
3211
3138
  """
3212
3139
  return pulumi.get(self, "url")
3213
3140
 
@@ -3215,7 +3142,7 @@ class SecretsMountElasticsearch(dict):
3215
3142
  @pulumi.getter
3216
3143
  def username(self) -> str:
3217
3144
  """
3218
- The root credential username used in the connection URL.
3145
+ The username to be used in the connection URL
3219
3146
  """
3220
3147
  return pulumi.get(self, "username")
3221
3148
 
@@ -3232,7 +3159,7 @@ class SecretsMountElasticsearch(dict):
3232
3159
  @pulumi.getter(name="caCert")
3233
3160
  def ca_cert(self) -> Optional[str]:
3234
3161
  """
3235
- The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
3162
+ The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
3236
3163
  """
3237
3164
  return pulumi.get(self, "ca_cert")
3238
3165
 
@@ -3240,7 +3167,7 @@ class SecretsMountElasticsearch(dict):
3240
3167
  @pulumi.getter(name="caPath")
3241
3168
  def ca_path(self) -> Optional[str]:
3242
3169
  """
3243
- The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
3170
+ The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
3244
3171
  """
3245
3172
  return pulumi.get(self, "ca_path")
3246
3173
 
@@ -3248,7 +3175,7 @@ class SecretsMountElasticsearch(dict):
3248
3175
  @pulumi.getter(name="clientCert")
3249
3176
  def client_cert(self) -> Optional[str]:
3250
3177
  """
3251
- The path to the certificate for the Elasticsearch client to present for communication.
3178
+ The path to the certificate for the Elasticsearch client to present for communication
3252
3179
  """
3253
3180
  return pulumi.get(self, "client_cert")
3254
3181
 
@@ -3256,13 +3183,13 @@ class SecretsMountElasticsearch(dict):
3256
3183
  @pulumi.getter(name="clientKey")
3257
3184
  def client_key(self) -> Optional[str]:
3258
3185
  """
3259
- The path to the key for the Elasticsearch client to use for communication.
3186
+ The path to the key for the Elasticsearch client to use for communication
3260
3187
  """
3261
3188
  return pulumi.get(self, "client_key")
3262
3189
 
3263
3190
  @property
3264
3191
  @pulumi.getter
3265
- def data(self) -> Optional[Mapping[str, Any]]:
3192
+ def data(self) -> Optional[Mapping[str, str]]:
3266
3193
  """
3267
3194
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3268
3195
 
@@ -3274,7 +3201,7 @@ class SecretsMountElasticsearch(dict):
3274
3201
  @pulumi.getter
3275
3202
  def insecure(self) -> Optional[bool]:
3276
3203
  """
3277
- Whether to disable certificate verification.
3204
+ Whether to disable certificate verification
3278
3205
  """
3279
3206
  return pulumi.get(self, "insecure")
3280
3207
 
@@ -3298,7 +3225,7 @@ class SecretsMountElasticsearch(dict):
3298
3225
  @pulumi.getter(name="tlsServerName")
3299
3226
  def tls_server_name(self) -> Optional[str]:
3300
3227
  """
3301
- This, if set, is used to set the SNI host when connecting via TLS.
3228
+ This, if set, is used to set the SNI host when connecting via TLS
3302
3229
  """
3303
3230
  return pulumi.get(self, "tls_server_name")
3304
3231
 
@@ -3306,7 +3233,7 @@ class SecretsMountElasticsearch(dict):
3306
3233
  @pulumi.getter(name="usernameTemplate")
3307
3234
  def username_template(self) -> Optional[str]:
3308
3235
  """
3309
- [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
3236
+ Template describing how dynamic usernames are generated.
3310
3237
  """
3311
3238
  return pulumi.get(self, "username_template")
3312
3239
 
@@ -3359,7 +3286,7 @@ class SecretsMountHana(dict):
3359
3286
  name: str,
3360
3287
  allowed_roles: Optional[Sequence[str]] = None,
3361
3288
  connection_url: Optional[str] = None,
3362
- data: Optional[Mapping[str, Any]] = None,
3289
+ data: Optional[Mapping[str, str]] = None,
3363
3290
  disable_escaping: Optional[bool] = None,
3364
3291
  max_connection_lifetime: Optional[int] = None,
3365
3292
  max_idle_connections: Optional[int] = None,
@@ -3373,21 +3300,18 @@ class SecretsMountHana(dict):
3373
3300
  :param str name: Name of the database connection.
3374
3301
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
3375
3302
  connection.
3376
- :param str connection_url: Specifies the Redshift DSN.
3377
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
3378
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3303
+ :param str connection_url: Connection string to use to connect to the database.
3304
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3379
3305
 
3380
3306
  Supported list of database secrets engines that can be configured:
3381
- :param bool disable_escaping: Disable special character escaping in username and password.
3382
- :param int max_connection_lifetime: The maximum amount of time a connection may be reused.
3383
- :param int max_idle_connections: The maximum number of idle connections to
3384
- the database.
3385
- :param int max_open_connections: The maximum number of open connections to
3386
- the database.
3387
- :param str password: The root credential password used in the connection URL.
3307
+ :param bool disable_escaping: Disable special character escaping in username and password
3308
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
3309
+ :param int max_idle_connections: Maximum number of idle connections to the database.
3310
+ :param int max_open_connections: Maximum number of open connections to the database.
3311
+ :param str password: The root credential password used in the connection URL
3388
3312
  :param str plugin_name: Specifies the name of the plugin to use.
3389
3313
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
3390
- :param str username: The root credential username used in the connection URL.
3314
+ :param str username: The root credential username used in the connection URL
3391
3315
  :param bool verify_connection: Whether the connection should be verified on
3392
3316
  initial configuration or not.
3393
3317
  """
@@ -3438,14 +3362,13 @@ class SecretsMountHana(dict):
3438
3362
  @pulumi.getter(name="connectionUrl")
3439
3363
  def connection_url(self) -> Optional[str]:
3440
3364
  """
3441
- Specifies the Redshift DSN.
3442
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
3365
+ Connection string to use to connect to the database.
3443
3366
  """
3444
3367
  return pulumi.get(self, "connection_url")
3445
3368
 
3446
3369
  @property
3447
3370
  @pulumi.getter
3448
- def data(self) -> Optional[Mapping[str, Any]]:
3371
+ def data(self) -> Optional[Mapping[str, str]]:
3449
3372
  """
3450
3373
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3451
3374
 
@@ -3457,7 +3380,7 @@ class SecretsMountHana(dict):
3457
3380
  @pulumi.getter(name="disableEscaping")
3458
3381
  def disable_escaping(self) -> Optional[bool]:
3459
3382
  """
3460
- Disable special character escaping in username and password.
3383
+ Disable special character escaping in username and password
3461
3384
  """
3462
3385
  return pulumi.get(self, "disable_escaping")
3463
3386
 
@@ -3465,7 +3388,7 @@ class SecretsMountHana(dict):
3465
3388
  @pulumi.getter(name="maxConnectionLifetime")
3466
3389
  def max_connection_lifetime(self) -> Optional[int]:
3467
3390
  """
3468
- The maximum amount of time a connection may be reused.
3391
+ Maximum number of seconds a connection may be reused.
3469
3392
  """
3470
3393
  return pulumi.get(self, "max_connection_lifetime")
3471
3394
 
@@ -3473,8 +3396,7 @@ class SecretsMountHana(dict):
3473
3396
  @pulumi.getter(name="maxIdleConnections")
3474
3397
  def max_idle_connections(self) -> Optional[int]:
3475
3398
  """
3476
- The maximum number of idle connections to
3477
- the database.
3399
+ Maximum number of idle connections to the database.
3478
3400
  """
3479
3401
  return pulumi.get(self, "max_idle_connections")
3480
3402
 
@@ -3482,8 +3404,7 @@ class SecretsMountHana(dict):
3482
3404
  @pulumi.getter(name="maxOpenConnections")
3483
3405
  def max_open_connections(self) -> Optional[int]:
3484
3406
  """
3485
- The maximum number of open connections to
3486
- the database.
3407
+ Maximum number of open connections to the database.
3487
3408
  """
3488
3409
  return pulumi.get(self, "max_open_connections")
3489
3410
 
@@ -3491,7 +3412,7 @@ class SecretsMountHana(dict):
3491
3412
  @pulumi.getter
3492
3413
  def password(self) -> Optional[str]:
3493
3414
  """
3494
- The root credential password used in the connection URL.
3415
+ The root credential password used in the connection URL
3495
3416
  """
3496
3417
  return pulumi.get(self, "password")
3497
3418
 
@@ -3515,7 +3436,7 @@ class SecretsMountHana(dict):
3515
3436
  @pulumi.getter
3516
3437
  def username(self) -> Optional[str]:
3517
3438
  """
3518
- The root credential username used in the connection URL.
3439
+ The root credential username used in the connection URL
3519
3440
  """
3520
3441
  return pulumi.get(self, "username")
3521
3442
 
@@ -3571,7 +3492,7 @@ class SecretsMountInfluxdb(dict):
3571
3492
  username: str,
3572
3493
  allowed_roles: Optional[Sequence[str]] = None,
3573
3494
  connect_timeout: Optional[int] = None,
3574
- data: Optional[Mapping[str, Any]] = None,
3495
+ data: Optional[Mapping[str, str]] = None,
3575
3496
  insecure_tls: Optional[bool] = None,
3576
3497
  pem_bundle: Optional[str] = None,
3577
3498
  pem_json: Optional[str] = None,
@@ -3582,28 +3503,24 @@ class SecretsMountInfluxdb(dict):
3582
3503
  username_template: Optional[str] = None,
3583
3504
  verify_connection: Optional[bool] = None):
3584
3505
  """
3585
- :param str host: The host to connect to.
3506
+ :param str host: Influxdb host to connect to.
3586
3507
  :param str name: Name of the database connection.
3587
- :param str password: The root credential password used in the connection URL.
3588
- :param str username: The root credential username used in the connection URL.
3508
+ :param str password: Specifies the password corresponding to the given username.
3509
+ :param str username: Specifies the username to use for superuser access.
3589
3510
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
3590
3511
  connection.
3591
- :param int connect_timeout: The number of seconds to use as a connection
3592
- timeout.
3593
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3512
+ :param int connect_timeout: The number of seconds to use as a connection timeout.
3513
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3594
3514
 
3595
3515
  Supported list of database secrets engines that can be configured:
3596
- :param bool insecure_tls: Whether to skip verification of the server
3597
- certificate when using TLS.
3598
- :param str pem_bundle: Concatenated PEM blocks configuring the certificate
3599
- chain.
3600
- :param str pem_json: A JSON structure configuring the certificate chain.
3516
+ :param bool insecure_tls: Whether to skip verification of the server certificate when using TLS.
3517
+ :param str pem_bundle: Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
3518
+ :param str pem_json: Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
3601
3519
  :param str plugin_name: Specifies the name of the plugin to use.
3602
- :param int port: The default port to connect to if no port is specified as
3603
- part of the host.
3520
+ :param int port: The transport port to use to connect to Influxdb.
3604
3521
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
3605
- :param bool tls: Whether to use TLS when connecting to Cassandra.
3606
- :param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
3522
+ :param bool tls: Whether to use TLS when connecting to Influxdb.
3523
+ :param str username_template: Template describing how dynamic usernames are generated.
3607
3524
  :param bool verify_connection: Whether the connection should be verified on
3608
3525
  initial configuration or not.
3609
3526
  """
@@ -3640,7 +3557,7 @@ class SecretsMountInfluxdb(dict):
3640
3557
  @pulumi.getter
3641
3558
  def host(self) -> str:
3642
3559
  """
3643
- The host to connect to.
3560
+ Influxdb host to connect to.
3644
3561
  """
3645
3562
  return pulumi.get(self, "host")
3646
3563
 
@@ -3656,7 +3573,7 @@ class SecretsMountInfluxdb(dict):
3656
3573
  @pulumi.getter
3657
3574
  def password(self) -> str:
3658
3575
  """
3659
- The root credential password used in the connection URL.
3576
+ Specifies the password corresponding to the given username.
3660
3577
  """
3661
3578
  return pulumi.get(self, "password")
3662
3579
 
@@ -3664,7 +3581,7 @@ class SecretsMountInfluxdb(dict):
3664
3581
  @pulumi.getter
3665
3582
  def username(self) -> str:
3666
3583
  """
3667
- The root credential username used in the connection URL.
3584
+ Specifies the username to use for superuser access.
3668
3585
  """
3669
3586
  return pulumi.get(self, "username")
3670
3587
 
@@ -3681,14 +3598,13 @@ class SecretsMountInfluxdb(dict):
3681
3598
  @pulumi.getter(name="connectTimeout")
3682
3599
  def connect_timeout(self) -> Optional[int]:
3683
3600
  """
3684
- The number of seconds to use as a connection
3685
- timeout.
3601
+ The number of seconds to use as a connection timeout.
3686
3602
  """
3687
3603
  return pulumi.get(self, "connect_timeout")
3688
3604
 
3689
3605
  @property
3690
3606
  @pulumi.getter
3691
- def data(self) -> Optional[Mapping[str, Any]]:
3607
+ def data(self) -> Optional[Mapping[str, str]]:
3692
3608
  """
3693
3609
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3694
3610
 
@@ -3700,8 +3616,7 @@ class SecretsMountInfluxdb(dict):
3700
3616
  @pulumi.getter(name="insecureTls")
3701
3617
  def insecure_tls(self) -> Optional[bool]:
3702
3618
  """
3703
- Whether to skip verification of the server
3704
- certificate when using TLS.
3619
+ Whether to skip verification of the server certificate when using TLS.
3705
3620
  """
3706
3621
  return pulumi.get(self, "insecure_tls")
3707
3622
 
@@ -3709,8 +3624,7 @@ class SecretsMountInfluxdb(dict):
3709
3624
  @pulumi.getter(name="pemBundle")
3710
3625
  def pem_bundle(self) -> Optional[str]:
3711
3626
  """
3712
- Concatenated PEM blocks configuring the certificate
3713
- chain.
3627
+ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
3714
3628
  """
3715
3629
  return pulumi.get(self, "pem_bundle")
3716
3630
 
@@ -3718,7 +3632,7 @@ class SecretsMountInfluxdb(dict):
3718
3632
  @pulumi.getter(name="pemJson")
3719
3633
  def pem_json(self) -> Optional[str]:
3720
3634
  """
3721
- A JSON structure configuring the certificate chain.
3635
+ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
3722
3636
  """
3723
3637
  return pulumi.get(self, "pem_json")
3724
3638
 
@@ -3734,8 +3648,7 @@ class SecretsMountInfluxdb(dict):
3734
3648
  @pulumi.getter
3735
3649
  def port(self) -> Optional[int]:
3736
3650
  """
3737
- The default port to connect to if no port is specified as
3738
- part of the host.
3651
+ The transport port to use to connect to Influxdb.
3739
3652
  """
3740
3653
  return pulumi.get(self, "port")
3741
3654
 
@@ -3751,7 +3664,7 @@ class SecretsMountInfluxdb(dict):
3751
3664
  @pulumi.getter
3752
3665
  def tls(self) -> Optional[bool]:
3753
3666
  """
3754
- Whether to use TLS when connecting to Cassandra.
3667
+ Whether to use TLS when connecting to Influxdb.
3755
3668
  """
3756
3669
  return pulumi.get(self, "tls")
3757
3670
 
@@ -3759,7 +3672,7 @@ class SecretsMountInfluxdb(dict):
3759
3672
  @pulumi.getter(name="usernameTemplate")
3760
3673
  def username_template(self) -> Optional[str]:
3761
3674
  """
3762
- [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
3675
+ Template describing how dynamic usernames are generated.
3763
3676
  """
3764
3677
  return pulumi.get(self, "username_template")
3765
3678
 
@@ -3812,7 +3725,7 @@ class SecretsMountMongodb(dict):
3812
3725
  name: str,
3813
3726
  allowed_roles: Optional[Sequence[str]] = None,
3814
3727
  connection_url: Optional[str] = None,
3815
- data: Optional[Mapping[str, Any]] = None,
3728
+ data: Optional[Mapping[str, str]] = None,
3816
3729
  max_connection_lifetime: Optional[int] = None,
3817
3730
  max_idle_connections: Optional[int] = None,
3818
3731
  max_open_connections: Optional[int] = None,
@@ -3826,21 +3739,18 @@ class SecretsMountMongodb(dict):
3826
3739
  :param str name: Name of the database connection.
3827
3740
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
3828
3741
  connection.
3829
- :param str connection_url: Specifies the Redshift DSN.
3830
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
3831
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3742
+ :param str connection_url: Connection string to use to connect to the database.
3743
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3832
3744
 
3833
3745
  Supported list of database secrets engines that can be configured:
3834
- :param int max_connection_lifetime: The maximum amount of time a connection may be reused.
3835
- :param int max_idle_connections: The maximum number of idle connections to
3836
- the database.
3837
- :param int max_open_connections: The maximum number of open connections to
3838
- the database.
3839
- :param str password: The root credential password used in the connection URL.
3746
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
3747
+ :param int max_idle_connections: Maximum number of idle connections to the database.
3748
+ :param int max_open_connections: Maximum number of open connections to the database.
3749
+ :param str password: The root credential password used in the connection URL
3840
3750
  :param str plugin_name: Specifies the name of the plugin to use.
3841
3751
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
3842
- :param str username: The root credential username used in the connection URL.
3843
- :param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
3752
+ :param str username: The root credential username used in the connection URL
3753
+ :param str username_template: Username generation template.
3844
3754
  :param bool verify_connection: Whether the connection should be verified on
3845
3755
  initial configuration or not.
3846
3756
  """
@@ -3891,14 +3801,13 @@ class SecretsMountMongodb(dict):
3891
3801
  @pulumi.getter(name="connectionUrl")
3892
3802
  def connection_url(self) -> Optional[str]:
3893
3803
  """
3894
- Specifies the Redshift DSN.
3895
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
3804
+ Connection string to use to connect to the database.
3896
3805
  """
3897
3806
  return pulumi.get(self, "connection_url")
3898
3807
 
3899
3808
  @property
3900
3809
  @pulumi.getter
3901
- def data(self) -> Optional[Mapping[str, Any]]:
3810
+ def data(self) -> Optional[Mapping[str, str]]:
3902
3811
  """
3903
3812
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3904
3813
 
@@ -3910,7 +3819,7 @@ class SecretsMountMongodb(dict):
3910
3819
  @pulumi.getter(name="maxConnectionLifetime")
3911
3820
  def max_connection_lifetime(self) -> Optional[int]:
3912
3821
  """
3913
- The maximum amount of time a connection may be reused.
3822
+ Maximum number of seconds a connection may be reused.
3914
3823
  """
3915
3824
  return pulumi.get(self, "max_connection_lifetime")
3916
3825
 
@@ -3918,8 +3827,7 @@ class SecretsMountMongodb(dict):
3918
3827
  @pulumi.getter(name="maxIdleConnections")
3919
3828
  def max_idle_connections(self) -> Optional[int]:
3920
3829
  """
3921
- The maximum number of idle connections to
3922
- the database.
3830
+ Maximum number of idle connections to the database.
3923
3831
  """
3924
3832
  return pulumi.get(self, "max_idle_connections")
3925
3833
 
@@ -3927,8 +3835,7 @@ class SecretsMountMongodb(dict):
3927
3835
  @pulumi.getter(name="maxOpenConnections")
3928
3836
  def max_open_connections(self) -> Optional[int]:
3929
3837
  """
3930
- The maximum number of open connections to
3931
- the database.
3838
+ Maximum number of open connections to the database.
3932
3839
  """
3933
3840
  return pulumi.get(self, "max_open_connections")
3934
3841
 
@@ -3936,7 +3843,7 @@ class SecretsMountMongodb(dict):
3936
3843
  @pulumi.getter
3937
3844
  def password(self) -> Optional[str]:
3938
3845
  """
3939
- The root credential password used in the connection URL.
3846
+ The root credential password used in the connection URL
3940
3847
  """
3941
3848
  return pulumi.get(self, "password")
3942
3849
 
@@ -3960,7 +3867,7 @@ class SecretsMountMongodb(dict):
3960
3867
  @pulumi.getter
3961
3868
  def username(self) -> Optional[str]:
3962
3869
  """
3963
- The root credential username used in the connection URL.
3870
+ The root credential username used in the connection URL
3964
3871
  """
3965
3872
  return pulumi.get(self, "username")
3966
3873
 
@@ -3968,7 +3875,7 @@ class SecretsMountMongodb(dict):
3968
3875
  @pulumi.getter(name="usernameTemplate")
3969
3876
  def username_template(self) -> Optional[str]:
3970
3877
  """
3971
- [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
3878
+ Username generation template.
3972
3879
  """
3973
3880
  return pulumi.get(self, "username_template")
3974
3881
 
@@ -4019,7 +3926,7 @@ class SecretsMountMongodbatla(dict):
4019
3926
  project_id: str,
4020
3927
  public_key: str,
4021
3928
  allowed_roles: Optional[Sequence[str]] = None,
4022
- data: Optional[Mapping[str, Any]] = None,
3929
+ data: Optional[Mapping[str, str]] = None,
4023
3930
  plugin_name: Optional[str] = None,
4024
3931
  root_rotation_statements: Optional[Sequence[str]] = None,
4025
3932
  verify_connection: Optional[bool] = None):
@@ -4030,7 +3937,7 @@ class SecretsMountMongodbatla(dict):
4030
3937
  :param str public_key: The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
4031
3938
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
4032
3939
  connection.
4033
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3940
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4034
3941
 
4035
3942
  Supported list of database secrets engines that can be configured:
4036
3943
  :param str plugin_name: Specifies the name of the plugin to use.
@@ -4096,7 +4003,7 @@ class SecretsMountMongodbatla(dict):
4096
4003
 
4097
4004
  @property
4098
4005
  @pulumi.getter
4099
- def data(self) -> Optional[Mapping[str, Any]]:
4006
+ def data(self) -> Optional[Mapping[str, str]]:
4100
4007
  """
4101
4008
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4102
4009
 
@@ -4174,7 +4081,7 @@ class SecretsMountMssql(dict):
4174
4081
  allowed_roles: Optional[Sequence[str]] = None,
4175
4082
  connection_url: Optional[str] = None,
4176
4083
  contained_db: Optional[bool] = None,
4177
- data: Optional[Mapping[str, Any]] = None,
4084
+ data: Optional[Mapping[str, str]] = None,
4178
4085
  disable_escaping: Optional[bool] = None,
4179
4086
  max_connection_lifetime: Optional[int] = None,
4180
4087
  max_idle_connections: Optional[int] = None,
@@ -4189,25 +4096,20 @@ class SecretsMountMssql(dict):
4189
4096
  :param str name: Name of the database connection.
4190
4097
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
4191
4098
  connection.
4192
- :param str connection_url: Specifies the Redshift DSN.
4193
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
4194
- :param bool contained_db: For Vault v1.9+. Set to true when the target is a
4195
- Contained Database, e.g. AzureSQL.
4196
- See [Vault docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
4197
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4099
+ :param str connection_url: Connection string to use to connect to the database.
4100
+ :param bool contained_db: Set to true when the target is a Contained Database, e.g. AzureSQL.
4101
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4198
4102
 
4199
4103
  Supported list of database secrets engines that can be configured:
4200
- :param bool disable_escaping: Disable special character escaping in username and password.
4201
- :param int max_connection_lifetime: The maximum amount of time a connection may be reused.
4202
- :param int max_idle_connections: The maximum number of idle connections to
4203
- the database.
4204
- :param int max_open_connections: The maximum number of open connections to
4205
- the database.
4206
- :param str password: The root credential password used in the connection URL.
4104
+ :param bool disable_escaping: Disable special character escaping in username and password
4105
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
4106
+ :param int max_idle_connections: Maximum number of idle connections to the database.
4107
+ :param int max_open_connections: Maximum number of open connections to the database.
4108
+ :param str password: The root credential password used in the connection URL
4207
4109
  :param str plugin_name: Specifies the name of the plugin to use.
4208
4110
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
4209
- :param str username: The root credential username used in the connection URL.
4210
- :param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
4111
+ :param str username: The root credential username used in the connection URL
4112
+ :param str username_template: Username generation template.
4211
4113
  :param bool verify_connection: Whether the connection should be verified on
4212
4114
  initial configuration or not.
4213
4115
  """
@@ -4262,8 +4164,7 @@ class SecretsMountMssql(dict):
4262
4164
  @pulumi.getter(name="connectionUrl")
4263
4165
  def connection_url(self) -> Optional[str]:
4264
4166
  """
4265
- Specifies the Redshift DSN.
4266
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
4167
+ Connection string to use to connect to the database.
4267
4168
  """
4268
4169
  return pulumi.get(self, "connection_url")
4269
4170
 
@@ -4271,15 +4172,13 @@ class SecretsMountMssql(dict):
4271
4172
  @pulumi.getter(name="containedDb")
4272
4173
  def contained_db(self) -> Optional[bool]:
4273
4174
  """
4274
- For Vault v1.9+. Set to true when the target is a
4275
- Contained Database, e.g. AzureSQL.
4276
- See [Vault docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
4175
+ Set to true when the target is a Contained Database, e.g. AzureSQL.
4277
4176
  """
4278
4177
  return pulumi.get(self, "contained_db")
4279
4178
 
4280
4179
  @property
4281
4180
  @pulumi.getter
4282
- def data(self) -> Optional[Mapping[str, Any]]:
4181
+ def data(self) -> Optional[Mapping[str, str]]:
4283
4182
  """
4284
4183
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4285
4184
 
@@ -4291,7 +4190,7 @@ class SecretsMountMssql(dict):
4291
4190
  @pulumi.getter(name="disableEscaping")
4292
4191
  def disable_escaping(self) -> Optional[bool]:
4293
4192
  """
4294
- Disable special character escaping in username and password.
4193
+ Disable special character escaping in username and password
4295
4194
  """
4296
4195
  return pulumi.get(self, "disable_escaping")
4297
4196
 
@@ -4299,7 +4198,7 @@ class SecretsMountMssql(dict):
4299
4198
  @pulumi.getter(name="maxConnectionLifetime")
4300
4199
  def max_connection_lifetime(self) -> Optional[int]:
4301
4200
  """
4302
- The maximum amount of time a connection may be reused.
4201
+ Maximum number of seconds a connection may be reused.
4303
4202
  """
4304
4203
  return pulumi.get(self, "max_connection_lifetime")
4305
4204
 
@@ -4307,8 +4206,7 @@ class SecretsMountMssql(dict):
4307
4206
  @pulumi.getter(name="maxIdleConnections")
4308
4207
  def max_idle_connections(self) -> Optional[int]:
4309
4208
  """
4310
- The maximum number of idle connections to
4311
- the database.
4209
+ Maximum number of idle connections to the database.
4312
4210
  """
4313
4211
  return pulumi.get(self, "max_idle_connections")
4314
4212
 
@@ -4316,8 +4214,7 @@ class SecretsMountMssql(dict):
4316
4214
  @pulumi.getter(name="maxOpenConnections")
4317
4215
  def max_open_connections(self) -> Optional[int]:
4318
4216
  """
4319
- The maximum number of open connections to
4320
- the database.
4217
+ Maximum number of open connections to the database.
4321
4218
  """
4322
4219
  return pulumi.get(self, "max_open_connections")
4323
4220
 
@@ -4325,7 +4222,7 @@ class SecretsMountMssql(dict):
4325
4222
  @pulumi.getter
4326
4223
  def password(self) -> Optional[str]:
4327
4224
  """
4328
- The root credential password used in the connection URL.
4225
+ The root credential password used in the connection URL
4329
4226
  """
4330
4227
  return pulumi.get(self, "password")
4331
4228
 
@@ -4349,7 +4246,7 @@ class SecretsMountMssql(dict):
4349
4246
  @pulumi.getter
4350
4247
  def username(self) -> Optional[str]:
4351
4248
  """
4352
- The root credential username used in the connection URL.
4249
+ The root credential username used in the connection URL
4353
4250
  """
4354
4251
  return pulumi.get(self, "username")
4355
4252
 
@@ -4357,7 +4254,7 @@ class SecretsMountMssql(dict):
4357
4254
  @pulumi.getter(name="usernameTemplate")
4358
4255
  def username_template(self) -> Optional[str]:
4359
4256
  """
4360
- [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
4257
+ Username generation template.
4361
4258
  """
4362
4259
  return pulumi.get(self, "username_template")
4363
4260
 
@@ -4419,7 +4316,7 @@ class SecretsMountMysql(dict):
4419
4316
  allowed_roles: Optional[Sequence[str]] = None,
4420
4317
  auth_type: Optional[str] = None,
4421
4318
  connection_url: Optional[str] = None,
4422
- data: Optional[Mapping[str, Any]] = None,
4319
+ data: Optional[Mapping[str, str]] = None,
4423
4320
  max_connection_lifetime: Optional[int] = None,
4424
4321
  max_idle_connections: Optional[int] = None,
4425
4322
  max_open_connections: Optional[int] = None,
@@ -4437,24 +4334,21 @@ class SecretsMountMysql(dict):
4437
4334
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
4438
4335
  connection.
4439
4336
  :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
4440
- :param str connection_url: Specifies the Redshift DSN.
4441
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
4442
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4337
+ :param str connection_url: Connection string to use to connect to the database.
4338
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4443
4339
 
4444
4340
  Supported list of database secrets engines that can be configured:
4445
- :param int max_connection_lifetime: The maximum amount of time a connection may be reused.
4446
- :param int max_idle_connections: The maximum number of idle connections to
4447
- the database.
4448
- :param int max_open_connections: The maximum number of open connections to
4449
- the database.
4450
- :param str password: The root credential password used in the connection URL.
4341
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
4342
+ :param int max_idle_connections: Maximum number of idle connections to the database.
4343
+ :param int max_open_connections: Maximum number of open connections to the database.
4344
+ :param str password: The root credential password used in the connection URL
4451
4345
  :param str plugin_name: Specifies the name of the plugin to use.
4452
4346
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
4453
4347
  :param str service_account_json: A JSON encoded credential for use with IAM authorization
4454
4348
  :param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
4455
4349
  :param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
4456
- :param str username: The root credential username used in the connection URL.
4457
- :param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
4350
+ :param str username: The root credential username used in the connection URL
4351
+ :param str username_template: Username generation template.
4458
4352
  :param bool verify_connection: Whether the connection should be verified on
4459
4353
  initial configuration or not.
4460
4354
  """
@@ -4521,14 +4415,13 @@ class SecretsMountMysql(dict):
4521
4415
  @pulumi.getter(name="connectionUrl")
4522
4416
  def connection_url(self) -> Optional[str]:
4523
4417
  """
4524
- Specifies the Redshift DSN.
4525
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
4418
+ Connection string to use to connect to the database.
4526
4419
  """
4527
4420
  return pulumi.get(self, "connection_url")
4528
4421
 
4529
4422
  @property
4530
4423
  @pulumi.getter
4531
- def data(self) -> Optional[Mapping[str, Any]]:
4424
+ def data(self) -> Optional[Mapping[str, str]]:
4532
4425
  """
4533
4426
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4534
4427
 
@@ -4540,7 +4433,7 @@ class SecretsMountMysql(dict):
4540
4433
  @pulumi.getter(name="maxConnectionLifetime")
4541
4434
  def max_connection_lifetime(self) -> Optional[int]:
4542
4435
  """
4543
- The maximum amount of time a connection may be reused.
4436
+ Maximum number of seconds a connection may be reused.
4544
4437
  """
4545
4438
  return pulumi.get(self, "max_connection_lifetime")
4546
4439
 
@@ -4548,8 +4441,7 @@ class SecretsMountMysql(dict):
4548
4441
  @pulumi.getter(name="maxIdleConnections")
4549
4442
  def max_idle_connections(self) -> Optional[int]:
4550
4443
  """
4551
- The maximum number of idle connections to
4552
- the database.
4444
+ Maximum number of idle connections to the database.
4553
4445
  """
4554
4446
  return pulumi.get(self, "max_idle_connections")
4555
4447
 
@@ -4557,8 +4449,7 @@ class SecretsMountMysql(dict):
4557
4449
  @pulumi.getter(name="maxOpenConnections")
4558
4450
  def max_open_connections(self) -> Optional[int]:
4559
4451
  """
4560
- The maximum number of open connections to
4561
- the database.
4452
+ Maximum number of open connections to the database.
4562
4453
  """
4563
4454
  return pulumi.get(self, "max_open_connections")
4564
4455
 
@@ -4566,7 +4457,7 @@ class SecretsMountMysql(dict):
4566
4457
  @pulumi.getter
4567
4458
  def password(self) -> Optional[str]:
4568
4459
  """
4569
- The root credential password used in the connection URL.
4460
+ The root credential password used in the connection URL
4570
4461
  """
4571
4462
  return pulumi.get(self, "password")
4572
4463
 
@@ -4614,7 +4505,7 @@ class SecretsMountMysql(dict):
4614
4505
  @pulumi.getter
4615
4506
  def username(self) -> Optional[str]:
4616
4507
  """
4617
- The root credential username used in the connection URL.
4508
+ The root credential username used in the connection URL
4618
4509
  """
4619
4510
  return pulumi.get(self, "username")
4620
4511
 
@@ -4622,7 +4513,7 @@ class SecretsMountMysql(dict):
4622
4513
  @pulumi.getter(name="usernameTemplate")
4623
4514
  def username_template(self) -> Optional[str]:
4624
4515
  """
4625
- [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
4516
+ Username generation template.
4626
4517
  """
4627
4518
  return pulumi.get(self, "username_template")
4628
4519
 
@@ -4684,7 +4575,7 @@ class SecretsMountMysqlAurora(dict):
4684
4575
  allowed_roles: Optional[Sequence[str]] = None,
4685
4576
  auth_type: Optional[str] = None,
4686
4577
  connection_url: Optional[str] = None,
4687
- data: Optional[Mapping[str, Any]] = None,
4578
+ data: Optional[Mapping[str, str]] = None,
4688
4579
  max_connection_lifetime: Optional[int] = None,
4689
4580
  max_idle_connections: Optional[int] = None,
4690
4581
  max_open_connections: Optional[int] = None,
@@ -4702,24 +4593,21 @@ class SecretsMountMysqlAurora(dict):
4702
4593
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
4703
4594
  connection.
4704
4595
  :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
4705
- :param str connection_url: Specifies the Redshift DSN.
4706
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
4707
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4596
+ :param str connection_url: Connection string to use to connect to the database.
4597
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4708
4598
 
4709
4599
  Supported list of database secrets engines that can be configured:
4710
- :param int max_connection_lifetime: The maximum amount of time a connection may be reused.
4711
- :param int max_idle_connections: The maximum number of idle connections to
4712
- the database.
4713
- :param int max_open_connections: The maximum number of open connections to
4714
- the database.
4715
- :param str password: The root credential password used in the connection URL.
4600
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
4601
+ :param int max_idle_connections: Maximum number of idle connections to the database.
4602
+ :param int max_open_connections: Maximum number of open connections to the database.
4603
+ :param str password: The root credential password used in the connection URL
4716
4604
  :param str plugin_name: Specifies the name of the plugin to use.
4717
4605
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
4718
4606
  :param str service_account_json: A JSON encoded credential for use with IAM authorization
4719
4607
  :param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
4720
4608
  :param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
4721
- :param str username: The root credential username used in the connection URL.
4722
- :param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
4609
+ :param str username: The root credential username used in the connection URL
4610
+ :param str username_template: Username generation template.
4723
4611
  :param bool verify_connection: Whether the connection should be verified on
4724
4612
  initial configuration or not.
4725
4613
  """
@@ -4786,14 +4674,13 @@ class SecretsMountMysqlAurora(dict):
4786
4674
  @pulumi.getter(name="connectionUrl")
4787
4675
  def connection_url(self) -> Optional[str]:
4788
4676
  """
4789
- Specifies the Redshift DSN.
4790
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
4677
+ Connection string to use to connect to the database.
4791
4678
  """
4792
4679
  return pulumi.get(self, "connection_url")
4793
4680
 
4794
4681
  @property
4795
4682
  @pulumi.getter
4796
- def data(self) -> Optional[Mapping[str, Any]]:
4683
+ def data(self) -> Optional[Mapping[str, str]]:
4797
4684
  """
4798
4685
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4799
4686
 
@@ -4805,7 +4692,7 @@ class SecretsMountMysqlAurora(dict):
4805
4692
  @pulumi.getter(name="maxConnectionLifetime")
4806
4693
  def max_connection_lifetime(self) -> Optional[int]:
4807
4694
  """
4808
- The maximum amount of time a connection may be reused.
4695
+ Maximum number of seconds a connection may be reused.
4809
4696
  """
4810
4697
  return pulumi.get(self, "max_connection_lifetime")
4811
4698
 
@@ -4813,8 +4700,7 @@ class SecretsMountMysqlAurora(dict):
4813
4700
  @pulumi.getter(name="maxIdleConnections")
4814
4701
  def max_idle_connections(self) -> Optional[int]:
4815
4702
  """
4816
- The maximum number of idle connections to
4817
- the database.
4703
+ Maximum number of idle connections to the database.
4818
4704
  """
4819
4705
  return pulumi.get(self, "max_idle_connections")
4820
4706
 
@@ -4822,8 +4708,7 @@ class SecretsMountMysqlAurora(dict):
4822
4708
  @pulumi.getter(name="maxOpenConnections")
4823
4709
  def max_open_connections(self) -> Optional[int]:
4824
4710
  """
4825
- The maximum number of open connections to
4826
- the database.
4711
+ Maximum number of open connections to the database.
4827
4712
  """
4828
4713
  return pulumi.get(self, "max_open_connections")
4829
4714
 
@@ -4831,7 +4716,7 @@ class SecretsMountMysqlAurora(dict):
4831
4716
  @pulumi.getter
4832
4717
  def password(self) -> Optional[str]:
4833
4718
  """
4834
- The root credential password used in the connection URL.
4719
+ The root credential password used in the connection URL
4835
4720
  """
4836
4721
  return pulumi.get(self, "password")
4837
4722
 
@@ -4879,7 +4764,7 @@ class SecretsMountMysqlAurora(dict):
4879
4764
  @pulumi.getter
4880
4765
  def username(self) -> Optional[str]:
4881
4766
  """
4882
- The root credential username used in the connection URL.
4767
+ The root credential username used in the connection URL
4883
4768
  """
4884
4769
  return pulumi.get(self, "username")
4885
4770
 
@@ -4887,7 +4772,7 @@ class SecretsMountMysqlAurora(dict):
4887
4772
  @pulumi.getter(name="usernameTemplate")
4888
4773
  def username_template(self) -> Optional[str]:
4889
4774
  """
4890
- [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
4775
+ Username generation template.
4891
4776
  """
4892
4777
  return pulumi.get(self, "username_template")
4893
4778
 
@@ -4949,7 +4834,7 @@ class SecretsMountMysqlLegacy(dict):
4949
4834
  allowed_roles: Optional[Sequence[str]] = None,
4950
4835
  auth_type: Optional[str] = None,
4951
4836
  connection_url: Optional[str] = None,
4952
- data: Optional[Mapping[str, Any]] = None,
4837
+ data: Optional[Mapping[str, str]] = None,
4953
4838
  max_connection_lifetime: Optional[int] = None,
4954
4839
  max_idle_connections: Optional[int] = None,
4955
4840
  max_open_connections: Optional[int] = None,
@@ -4967,24 +4852,21 @@ class SecretsMountMysqlLegacy(dict):
4967
4852
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
4968
4853
  connection.
4969
4854
  :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
4970
- :param str connection_url: Specifies the Redshift DSN.
4971
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
4972
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4855
+ :param str connection_url: Connection string to use to connect to the database.
4856
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4973
4857
 
4974
4858
  Supported list of database secrets engines that can be configured:
4975
- :param int max_connection_lifetime: The maximum amount of time a connection may be reused.
4976
- :param int max_idle_connections: The maximum number of idle connections to
4977
- the database.
4978
- :param int max_open_connections: The maximum number of open connections to
4979
- the database.
4980
- :param str password: The root credential password used in the connection URL.
4859
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
4860
+ :param int max_idle_connections: Maximum number of idle connections to the database.
4861
+ :param int max_open_connections: Maximum number of open connections to the database.
4862
+ :param str password: The root credential password used in the connection URL
4981
4863
  :param str plugin_name: Specifies the name of the plugin to use.
4982
4864
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
4983
4865
  :param str service_account_json: A JSON encoded credential for use with IAM authorization
4984
4866
  :param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
4985
4867
  :param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
4986
- :param str username: The root credential username used in the connection URL.
4987
- :param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
4868
+ :param str username: The root credential username used in the connection URL
4869
+ :param str username_template: Username generation template.
4988
4870
  :param bool verify_connection: Whether the connection should be verified on
4989
4871
  initial configuration or not.
4990
4872
  """
@@ -5051,14 +4933,13 @@ class SecretsMountMysqlLegacy(dict):
5051
4933
  @pulumi.getter(name="connectionUrl")
5052
4934
  def connection_url(self) -> Optional[str]:
5053
4935
  """
5054
- Specifies the Redshift DSN.
5055
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
4936
+ Connection string to use to connect to the database.
5056
4937
  """
5057
4938
  return pulumi.get(self, "connection_url")
5058
4939
 
5059
4940
  @property
5060
4941
  @pulumi.getter
5061
- def data(self) -> Optional[Mapping[str, Any]]:
4942
+ def data(self) -> Optional[Mapping[str, str]]:
5062
4943
  """
5063
4944
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5064
4945
 
@@ -5070,7 +4951,7 @@ class SecretsMountMysqlLegacy(dict):
5070
4951
  @pulumi.getter(name="maxConnectionLifetime")
5071
4952
  def max_connection_lifetime(self) -> Optional[int]:
5072
4953
  """
5073
- The maximum amount of time a connection may be reused.
4954
+ Maximum number of seconds a connection may be reused.
5074
4955
  """
5075
4956
  return pulumi.get(self, "max_connection_lifetime")
5076
4957
 
@@ -5078,8 +4959,7 @@ class SecretsMountMysqlLegacy(dict):
5078
4959
  @pulumi.getter(name="maxIdleConnections")
5079
4960
  def max_idle_connections(self) -> Optional[int]:
5080
4961
  """
5081
- The maximum number of idle connections to
5082
- the database.
4962
+ Maximum number of idle connections to the database.
5083
4963
  """
5084
4964
  return pulumi.get(self, "max_idle_connections")
5085
4965
 
@@ -5087,8 +4967,7 @@ class SecretsMountMysqlLegacy(dict):
5087
4967
  @pulumi.getter(name="maxOpenConnections")
5088
4968
  def max_open_connections(self) -> Optional[int]:
5089
4969
  """
5090
- The maximum number of open connections to
5091
- the database.
4970
+ Maximum number of open connections to the database.
5092
4971
  """
5093
4972
  return pulumi.get(self, "max_open_connections")
5094
4973
 
@@ -5096,7 +4975,7 @@ class SecretsMountMysqlLegacy(dict):
5096
4975
  @pulumi.getter
5097
4976
  def password(self) -> Optional[str]:
5098
4977
  """
5099
- The root credential password used in the connection URL.
4978
+ The root credential password used in the connection URL
5100
4979
  """
5101
4980
  return pulumi.get(self, "password")
5102
4981
 
@@ -5144,7 +5023,7 @@ class SecretsMountMysqlLegacy(dict):
5144
5023
  @pulumi.getter
5145
5024
  def username(self) -> Optional[str]:
5146
5025
  """
5147
- The root credential username used in the connection URL.
5026
+ The root credential username used in the connection URL
5148
5027
  """
5149
5028
  return pulumi.get(self, "username")
5150
5029
 
@@ -5152,7 +5031,7 @@ class SecretsMountMysqlLegacy(dict):
5152
5031
  @pulumi.getter(name="usernameTemplate")
5153
5032
  def username_template(self) -> Optional[str]:
5154
5033
  """
5155
- [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
5034
+ Username generation template.
5156
5035
  """
5157
5036
  return pulumi.get(self, "username_template")
5158
5037
 
@@ -5214,7 +5093,7 @@ class SecretsMountMysqlRd(dict):
5214
5093
  allowed_roles: Optional[Sequence[str]] = None,
5215
5094
  auth_type: Optional[str] = None,
5216
5095
  connection_url: Optional[str] = None,
5217
- data: Optional[Mapping[str, Any]] = None,
5096
+ data: Optional[Mapping[str, str]] = None,
5218
5097
  max_connection_lifetime: Optional[int] = None,
5219
5098
  max_idle_connections: Optional[int] = None,
5220
5099
  max_open_connections: Optional[int] = None,
@@ -5232,24 +5111,21 @@ class SecretsMountMysqlRd(dict):
5232
5111
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
5233
5112
  connection.
5234
5113
  :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
5235
- :param str connection_url: Specifies the Redshift DSN.
5236
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
5237
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5114
+ :param str connection_url: Connection string to use to connect to the database.
5115
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5238
5116
 
5239
5117
  Supported list of database secrets engines that can be configured:
5240
- :param int max_connection_lifetime: The maximum amount of time a connection may be reused.
5241
- :param int max_idle_connections: The maximum number of idle connections to
5242
- the database.
5243
- :param int max_open_connections: The maximum number of open connections to
5244
- the database.
5245
- :param str password: The root credential password used in the connection URL.
5118
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
5119
+ :param int max_idle_connections: Maximum number of idle connections to the database.
5120
+ :param int max_open_connections: Maximum number of open connections to the database.
5121
+ :param str password: The root credential password used in the connection URL
5246
5122
  :param str plugin_name: Specifies the name of the plugin to use.
5247
5123
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
5248
5124
  :param str service_account_json: A JSON encoded credential for use with IAM authorization
5249
5125
  :param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
5250
5126
  :param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
5251
- :param str username: The root credential username used in the connection URL.
5252
- :param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
5127
+ :param str username: The root credential username used in the connection URL
5128
+ :param str username_template: Username generation template.
5253
5129
  :param bool verify_connection: Whether the connection should be verified on
5254
5130
  initial configuration or not.
5255
5131
  """
@@ -5316,14 +5192,13 @@ class SecretsMountMysqlRd(dict):
5316
5192
  @pulumi.getter(name="connectionUrl")
5317
5193
  def connection_url(self) -> Optional[str]:
5318
5194
  """
5319
- Specifies the Redshift DSN.
5320
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
5195
+ Connection string to use to connect to the database.
5321
5196
  """
5322
5197
  return pulumi.get(self, "connection_url")
5323
5198
 
5324
5199
  @property
5325
5200
  @pulumi.getter
5326
- def data(self) -> Optional[Mapping[str, Any]]:
5201
+ def data(self) -> Optional[Mapping[str, str]]:
5327
5202
  """
5328
5203
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5329
5204
 
@@ -5335,7 +5210,7 @@ class SecretsMountMysqlRd(dict):
5335
5210
  @pulumi.getter(name="maxConnectionLifetime")
5336
5211
  def max_connection_lifetime(self) -> Optional[int]:
5337
5212
  """
5338
- The maximum amount of time a connection may be reused.
5213
+ Maximum number of seconds a connection may be reused.
5339
5214
  """
5340
5215
  return pulumi.get(self, "max_connection_lifetime")
5341
5216
 
@@ -5343,8 +5218,7 @@ class SecretsMountMysqlRd(dict):
5343
5218
  @pulumi.getter(name="maxIdleConnections")
5344
5219
  def max_idle_connections(self) -> Optional[int]:
5345
5220
  """
5346
- The maximum number of idle connections to
5347
- the database.
5221
+ Maximum number of idle connections to the database.
5348
5222
  """
5349
5223
  return pulumi.get(self, "max_idle_connections")
5350
5224
 
@@ -5352,8 +5226,7 @@ class SecretsMountMysqlRd(dict):
5352
5226
  @pulumi.getter(name="maxOpenConnections")
5353
5227
  def max_open_connections(self) -> Optional[int]:
5354
5228
  """
5355
- The maximum number of open connections to
5356
- the database.
5229
+ Maximum number of open connections to the database.
5357
5230
  """
5358
5231
  return pulumi.get(self, "max_open_connections")
5359
5232
 
@@ -5361,7 +5234,7 @@ class SecretsMountMysqlRd(dict):
5361
5234
  @pulumi.getter
5362
5235
  def password(self) -> Optional[str]:
5363
5236
  """
5364
- The root credential password used in the connection URL.
5237
+ The root credential password used in the connection URL
5365
5238
  """
5366
5239
  return pulumi.get(self, "password")
5367
5240
 
@@ -5409,7 +5282,7 @@ class SecretsMountMysqlRd(dict):
5409
5282
  @pulumi.getter
5410
5283
  def username(self) -> Optional[str]:
5411
5284
  """
5412
- The root credential username used in the connection URL.
5285
+ The root credential username used in the connection URL
5413
5286
  """
5414
5287
  return pulumi.get(self, "username")
5415
5288
 
@@ -5417,7 +5290,7 @@ class SecretsMountMysqlRd(dict):
5417
5290
  @pulumi.getter(name="usernameTemplate")
5418
5291
  def username_template(self) -> Optional[str]:
5419
5292
  """
5420
- [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
5293
+ Username generation template.
5421
5294
  """
5422
5295
  return pulumi.get(self, "username_template")
5423
5296
 
@@ -5474,7 +5347,7 @@ class SecretsMountOracle(dict):
5474
5347
  name: str,
5475
5348
  allowed_roles: Optional[Sequence[str]] = None,
5476
5349
  connection_url: Optional[str] = None,
5477
- data: Optional[Mapping[str, Any]] = None,
5350
+ data: Optional[Mapping[str, str]] = None,
5478
5351
  disconnect_sessions: Optional[bool] = None,
5479
5352
  max_connection_lifetime: Optional[int] = None,
5480
5353
  max_idle_connections: Optional[int] = None,
@@ -5490,23 +5363,20 @@ class SecretsMountOracle(dict):
5490
5363
  :param str name: Name of the database connection.
5491
5364
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
5492
5365
  connection.
5493
- :param str connection_url: Specifies the Redshift DSN.
5494
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
5495
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5366
+ :param str connection_url: Connection string to use to connect to the database.
5367
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5496
5368
 
5497
5369
  Supported list of database secrets engines that can be configured:
5498
5370
  :param bool disconnect_sessions: Set to true to disconnect any open sessions prior to running the revocation statements.
5499
- :param int max_connection_lifetime: The maximum amount of time a connection may be reused.
5500
- :param int max_idle_connections: The maximum number of idle connections to
5501
- the database.
5502
- :param int max_open_connections: The maximum number of open connections to
5503
- the database.
5504
- :param str password: The root credential password used in the connection URL.
5371
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
5372
+ :param int max_idle_connections: Maximum number of idle connections to the database.
5373
+ :param int max_open_connections: Maximum number of open connections to the database.
5374
+ :param str password: The root credential password used in the connection URL
5505
5375
  :param str plugin_name: Specifies the name of the plugin to use.
5506
5376
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
5507
5377
  :param bool split_statements: Set to true in order to split statements after semi-colons.
5508
- :param str username: The root credential username used in the connection URL.
5509
- :param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
5378
+ :param str username: The root credential username used in the connection URL
5379
+ :param str username_template: Username generation template.
5510
5380
  :param bool verify_connection: Whether the connection should be verified on
5511
5381
  initial configuration or not.
5512
5382
  """
@@ -5561,14 +5431,13 @@ class SecretsMountOracle(dict):
5561
5431
  @pulumi.getter(name="connectionUrl")
5562
5432
  def connection_url(self) -> Optional[str]:
5563
5433
  """
5564
- Specifies the Redshift DSN.
5565
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
5434
+ Connection string to use to connect to the database.
5566
5435
  """
5567
5436
  return pulumi.get(self, "connection_url")
5568
5437
 
5569
5438
  @property
5570
5439
  @pulumi.getter
5571
- def data(self) -> Optional[Mapping[str, Any]]:
5440
+ def data(self) -> Optional[Mapping[str, str]]:
5572
5441
  """
5573
5442
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5574
5443
 
@@ -5588,7 +5457,7 @@ class SecretsMountOracle(dict):
5588
5457
  @pulumi.getter(name="maxConnectionLifetime")
5589
5458
  def max_connection_lifetime(self) -> Optional[int]:
5590
5459
  """
5591
- The maximum amount of time a connection may be reused.
5460
+ Maximum number of seconds a connection may be reused.
5592
5461
  """
5593
5462
  return pulumi.get(self, "max_connection_lifetime")
5594
5463
 
@@ -5596,8 +5465,7 @@ class SecretsMountOracle(dict):
5596
5465
  @pulumi.getter(name="maxIdleConnections")
5597
5466
  def max_idle_connections(self) -> Optional[int]:
5598
5467
  """
5599
- The maximum number of idle connections to
5600
- the database.
5468
+ Maximum number of idle connections to the database.
5601
5469
  """
5602
5470
  return pulumi.get(self, "max_idle_connections")
5603
5471
 
@@ -5605,8 +5473,7 @@ class SecretsMountOracle(dict):
5605
5473
  @pulumi.getter(name="maxOpenConnections")
5606
5474
  def max_open_connections(self) -> Optional[int]:
5607
5475
  """
5608
- The maximum number of open connections to
5609
- the database.
5476
+ Maximum number of open connections to the database.
5610
5477
  """
5611
5478
  return pulumi.get(self, "max_open_connections")
5612
5479
 
@@ -5614,7 +5481,7 @@ class SecretsMountOracle(dict):
5614
5481
  @pulumi.getter
5615
5482
  def password(self) -> Optional[str]:
5616
5483
  """
5617
- The root credential password used in the connection URL.
5484
+ The root credential password used in the connection URL
5618
5485
  """
5619
5486
  return pulumi.get(self, "password")
5620
5487
 
@@ -5646,7 +5513,7 @@ class SecretsMountOracle(dict):
5646
5513
  @pulumi.getter
5647
5514
  def username(self) -> Optional[str]:
5648
5515
  """
5649
- The root credential username used in the connection URL.
5516
+ The root credential username used in the connection URL
5650
5517
  """
5651
5518
  return pulumi.get(self, "username")
5652
5519
 
@@ -5654,7 +5521,7 @@ class SecretsMountOracle(dict):
5654
5521
  @pulumi.getter(name="usernameTemplate")
5655
5522
  def username_template(self) -> Optional[str]:
5656
5523
  """
5657
- [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
5524
+ Username generation template.
5658
5525
  """
5659
5526
  return pulumi.get(self, "username_template")
5660
5527
 
@@ -5687,12 +5554,22 @@ class SecretsMountPostgresql(dict):
5687
5554
  suggest = "max_idle_connections"
5688
5555
  elif key == "maxOpenConnections":
5689
5556
  suggest = "max_open_connections"
5557
+ elif key == "passwordAuthentication":
5558
+ suggest = "password_authentication"
5690
5559
  elif key == "pluginName":
5691
5560
  suggest = "plugin_name"
5561
+ elif key == "privateKey":
5562
+ suggest = "private_key"
5692
5563
  elif key == "rootRotationStatements":
5693
5564
  suggest = "root_rotation_statements"
5565
+ elif key == "selfManaged":
5566
+ suggest = "self_managed"
5694
5567
  elif key == "serviceAccountJson":
5695
5568
  suggest = "service_account_json"
5569
+ elif key == "tlsCa":
5570
+ suggest = "tls_ca"
5571
+ elif key == "tlsCertificate":
5572
+ suggest = "tls_certificate"
5696
5573
  elif key == "usernameTemplate":
5697
5574
  suggest = "username_template"
5698
5575
  elif key == "verifyConnection":
@@ -5714,15 +5591,20 @@ class SecretsMountPostgresql(dict):
5714
5591
  allowed_roles: Optional[Sequence[str]] = None,
5715
5592
  auth_type: Optional[str] = None,
5716
5593
  connection_url: Optional[str] = None,
5717
- data: Optional[Mapping[str, Any]] = None,
5594
+ data: Optional[Mapping[str, str]] = None,
5718
5595
  disable_escaping: Optional[bool] = None,
5719
5596
  max_connection_lifetime: Optional[int] = None,
5720
5597
  max_idle_connections: Optional[int] = None,
5721
5598
  max_open_connections: Optional[int] = None,
5722
5599
  password: Optional[str] = None,
5600
+ password_authentication: Optional[str] = None,
5723
5601
  plugin_name: Optional[str] = None,
5602
+ private_key: Optional[str] = None,
5724
5603
  root_rotation_statements: Optional[Sequence[str]] = None,
5604
+ self_managed: Optional[bool] = None,
5725
5605
  service_account_json: Optional[str] = None,
5606
+ tls_ca: Optional[str] = None,
5607
+ tls_certificate: Optional[str] = None,
5726
5608
  username: Optional[str] = None,
5727
5609
  username_template: Optional[str] = None,
5728
5610
  verify_connection: Optional[bool] = None):
@@ -5731,23 +5613,25 @@ class SecretsMountPostgresql(dict):
5731
5613
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
5732
5614
  connection.
5733
5615
  :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
5734
- :param str connection_url: Specifies the Redshift DSN.
5735
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
5736
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5616
+ :param str connection_url: Connection string to use to connect to the database.
5617
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5737
5618
 
5738
5619
  Supported list of database secrets engines that can be configured:
5739
- :param bool disable_escaping: Disable special character escaping in username and password.
5740
- :param int max_connection_lifetime: The maximum amount of time a connection may be reused.
5741
- :param int max_idle_connections: The maximum number of idle connections to
5742
- the database.
5743
- :param int max_open_connections: The maximum number of open connections to
5744
- the database.
5745
- :param str password: The root credential password used in the connection URL.
5620
+ :param bool disable_escaping: Disable special character escaping in username and password
5621
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
5622
+ :param int max_idle_connections: Maximum number of idle connections to the database.
5623
+ :param int max_open_connections: Maximum number of open connections to the database.
5624
+ :param str password: The root credential password used in the connection URL
5625
+ :param str password_authentication: When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
5746
5626
  :param str plugin_name: Specifies the name of the plugin to use.
5627
+ :param str private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
5747
5628
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
5629
+ :param bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
5748
5630
  :param str service_account_json: A JSON encoded credential for use with IAM authorization
5749
- :param str username: The root credential username used in the connection URL.
5750
- :param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
5631
+ :param str tls_ca: The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
5632
+ :param str tls_certificate: The x509 client certificate for connecting to the database. Must be PEM encoded.
5633
+ :param str username: The root credential username used in the connection URL
5634
+ :param str username_template: Username generation template.
5751
5635
  :param bool verify_connection: Whether the connection should be verified on
5752
5636
  initial configuration or not.
5753
5637
  """
@@ -5770,12 +5654,22 @@ class SecretsMountPostgresql(dict):
5770
5654
  pulumi.set(__self__, "max_open_connections", max_open_connections)
5771
5655
  if password is not None:
5772
5656
  pulumi.set(__self__, "password", password)
5657
+ if password_authentication is not None:
5658
+ pulumi.set(__self__, "password_authentication", password_authentication)
5773
5659
  if plugin_name is not None:
5774
5660
  pulumi.set(__self__, "plugin_name", plugin_name)
5661
+ if private_key is not None:
5662
+ pulumi.set(__self__, "private_key", private_key)
5775
5663
  if root_rotation_statements is not None:
5776
5664
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
5665
+ if self_managed is not None:
5666
+ pulumi.set(__self__, "self_managed", self_managed)
5777
5667
  if service_account_json is not None:
5778
5668
  pulumi.set(__self__, "service_account_json", service_account_json)
5669
+ if tls_ca is not None:
5670
+ pulumi.set(__self__, "tls_ca", tls_ca)
5671
+ if tls_certificate is not None:
5672
+ pulumi.set(__self__, "tls_certificate", tls_certificate)
5779
5673
  if username is not None:
5780
5674
  pulumi.set(__self__, "username", username)
5781
5675
  if username_template is not None:
@@ -5812,14 +5706,13 @@ class SecretsMountPostgresql(dict):
5812
5706
  @pulumi.getter(name="connectionUrl")
5813
5707
  def connection_url(self) -> Optional[str]:
5814
5708
  """
5815
- Specifies the Redshift DSN.
5816
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
5709
+ Connection string to use to connect to the database.
5817
5710
  """
5818
5711
  return pulumi.get(self, "connection_url")
5819
5712
 
5820
5713
  @property
5821
5714
  @pulumi.getter
5822
- def data(self) -> Optional[Mapping[str, Any]]:
5715
+ def data(self) -> Optional[Mapping[str, str]]:
5823
5716
  """
5824
5717
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5825
5718
 
@@ -5831,7 +5724,7 @@ class SecretsMountPostgresql(dict):
5831
5724
  @pulumi.getter(name="disableEscaping")
5832
5725
  def disable_escaping(self) -> Optional[bool]:
5833
5726
  """
5834
- Disable special character escaping in username and password.
5727
+ Disable special character escaping in username and password
5835
5728
  """
5836
5729
  return pulumi.get(self, "disable_escaping")
5837
5730
 
@@ -5839,7 +5732,7 @@ class SecretsMountPostgresql(dict):
5839
5732
  @pulumi.getter(name="maxConnectionLifetime")
5840
5733
  def max_connection_lifetime(self) -> Optional[int]:
5841
5734
  """
5842
- The maximum amount of time a connection may be reused.
5735
+ Maximum number of seconds a connection may be reused.
5843
5736
  """
5844
5737
  return pulumi.get(self, "max_connection_lifetime")
5845
5738
 
@@ -5847,8 +5740,7 @@ class SecretsMountPostgresql(dict):
5847
5740
  @pulumi.getter(name="maxIdleConnections")
5848
5741
  def max_idle_connections(self) -> Optional[int]:
5849
5742
  """
5850
- The maximum number of idle connections to
5851
- the database.
5743
+ Maximum number of idle connections to the database.
5852
5744
  """
5853
5745
  return pulumi.get(self, "max_idle_connections")
5854
5746
 
@@ -5856,8 +5748,7 @@ class SecretsMountPostgresql(dict):
5856
5748
  @pulumi.getter(name="maxOpenConnections")
5857
5749
  def max_open_connections(self) -> Optional[int]:
5858
5750
  """
5859
- The maximum number of open connections to
5860
- the database.
5751
+ Maximum number of open connections to the database.
5861
5752
  """
5862
5753
  return pulumi.get(self, "max_open_connections")
5863
5754
 
@@ -5865,10 +5756,18 @@ class SecretsMountPostgresql(dict):
5865
5756
  @pulumi.getter
5866
5757
  def password(self) -> Optional[str]:
5867
5758
  """
5868
- The root credential password used in the connection URL.
5759
+ The root credential password used in the connection URL
5869
5760
  """
5870
5761
  return pulumi.get(self, "password")
5871
5762
 
5763
+ @property
5764
+ @pulumi.getter(name="passwordAuthentication")
5765
+ def password_authentication(self) -> Optional[str]:
5766
+ """
5767
+ When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
5768
+ """
5769
+ return pulumi.get(self, "password_authentication")
5770
+
5872
5771
  @property
5873
5772
  @pulumi.getter(name="pluginName")
5874
5773
  def plugin_name(self) -> Optional[str]:
@@ -5877,6 +5776,14 @@ class SecretsMountPostgresql(dict):
5877
5776
  """
5878
5777
  return pulumi.get(self, "plugin_name")
5879
5778
 
5779
+ @property
5780
+ @pulumi.getter(name="privateKey")
5781
+ def private_key(self) -> Optional[str]:
5782
+ """
5783
+ The secret key used for the x509 client certificate. Must be PEM encoded.
5784
+ """
5785
+ return pulumi.get(self, "private_key")
5786
+
5880
5787
  @property
5881
5788
  @pulumi.getter(name="rootRotationStatements")
5882
5789
  def root_rotation_statements(self) -> Optional[Sequence[str]]:
@@ -5885,6 +5792,14 @@ class SecretsMountPostgresql(dict):
5885
5792
  """
5886
5793
  return pulumi.get(self, "root_rotation_statements")
5887
5794
 
5795
+ @property
5796
+ @pulumi.getter(name="selfManaged")
5797
+ def self_managed(self) -> Optional[bool]:
5798
+ """
5799
+ If set, allows onboarding static roles with a rootless connection configuration.
5800
+ """
5801
+ return pulumi.get(self, "self_managed")
5802
+
5888
5803
  @property
5889
5804
  @pulumi.getter(name="serviceAccountJson")
5890
5805
  def service_account_json(self) -> Optional[str]:
@@ -5893,11 +5808,27 @@ class SecretsMountPostgresql(dict):
5893
5808
  """
5894
5809
  return pulumi.get(self, "service_account_json")
5895
5810
 
5811
+ @property
5812
+ @pulumi.getter(name="tlsCa")
5813
+ def tls_ca(self) -> Optional[str]:
5814
+ """
5815
+ The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
5816
+ """
5817
+ return pulumi.get(self, "tls_ca")
5818
+
5819
+ @property
5820
+ @pulumi.getter(name="tlsCertificate")
5821
+ def tls_certificate(self) -> Optional[str]:
5822
+ """
5823
+ The x509 client certificate for connecting to the database. Must be PEM encoded.
5824
+ """
5825
+ return pulumi.get(self, "tls_certificate")
5826
+
5896
5827
  @property
5897
5828
  @pulumi.getter
5898
5829
  def username(self) -> Optional[str]:
5899
5830
  """
5900
- The root credential username used in the connection URL.
5831
+ The root credential username used in the connection URL
5901
5832
  """
5902
5833
  return pulumi.get(self, "username")
5903
5834
 
@@ -5905,7 +5836,7 @@ class SecretsMountPostgresql(dict):
5905
5836
  @pulumi.getter(name="usernameTemplate")
5906
5837
  def username_template(self) -> Optional[str]:
5907
5838
  """
5908
- [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
5839
+ Username generation template.
5909
5840
  """
5910
5841
  return pulumi.get(self, "username_template")
5911
5842
 
@@ -5955,7 +5886,7 @@ class SecretsMountRedi(dict):
5955
5886
  username: str,
5956
5887
  allowed_roles: Optional[Sequence[str]] = None,
5957
5888
  ca_cert: Optional[str] = None,
5958
- data: Optional[Mapping[str, Any]] = None,
5889
+ data: Optional[Mapping[str, str]] = None,
5959
5890
  insecure_tls: Optional[bool] = None,
5960
5891
  plugin_name: Optional[str] = None,
5961
5892
  port: Optional[int] = None,
@@ -5963,23 +5894,21 @@ class SecretsMountRedi(dict):
5963
5894
  tls: Optional[bool] = None,
5964
5895
  verify_connection: Optional[bool] = None):
5965
5896
  """
5966
- :param str host: The host to connect to.
5897
+ :param str host: Specifies the host to connect to
5967
5898
  :param str name: Name of the database connection.
5968
- :param str password: The root credential password used in the connection URL.
5969
- :param str username: The root credential username used in the connection URL.
5899
+ :param str password: Specifies the password corresponding to the given username.
5900
+ :param str username: Specifies the username for Vault to use.
5970
5901
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
5971
5902
  connection.
5972
- :param str ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
5973
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5903
+ :param str ca_cert: The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
5904
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5974
5905
 
5975
5906
  Supported list of database secrets engines that can be configured:
5976
- :param bool insecure_tls: Whether to skip verification of the server
5977
- certificate when using TLS.
5907
+ :param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
5978
5908
  :param str plugin_name: Specifies the name of the plugin to use.
5979
- :param int port: The default port to connect to if no port is specified as
5980
- part of the host.
5909
+ :param int port: The transport port to use to connect to Redis.
5981
5910
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
5982
- :param bool tls: Whether to use TLS when connecting to Cassandra.
5911
+ :param bool tls: Specifies whether to use TLS when connecting to Redis.
5983
5912
  :param bool verify_connection: Whether the connection should be verified on
5984
5913
  initial configuration or not.
5985
5914
  """
@@ -6010,7 +5939,7 @@ class SecretsMountRedi(dict):
6010
5939
  @pulumi.getter
6011
5940
  def host(self) -> str:
6012
5941
  """
6013
- The host to connect to.
5942
+ Specifies the host to connect to
6014
5943
  """
6015
5944
  return pulumi.get(self, "host")
6016
5945
 
@@ -6026,7 +5955,7 @@ class SecretsMountRedi(dict):
6026
5955
  @pulumi.getter
6027
5956
  def password(self) -> str:
6028
5957
  """
6029
- The root credential password used in the connection URL.
5958
+ Specifies the password corresponding to the given username.
6030
5959
  """
6031
5960
  return pulumi.get(self, "password")
6032
5961
 
@@ -6034,7 +5963,7 @@ class SecretsMountRedi(dict):
6034
5963
  @pulumi.getter
6035
5964
  def username(self) -> str:
6036
5965
  """
6037
- The root credential username used in the connection URL.
5966
+ Specifies the username for Vault to use.
6038
5967
  """
6039
5968
  return pulumi.get(self, "username")
6040
5969
 
@@ -6051,13 +5980,13 @@ class SecretsMountRedi(dict):
6051
5980
  @pulumi.getter(name="caCert")
6052
5981
  def ca_cert(self) -> Optional[str]:
6053
5982
  """
6054
- The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
5983
+ The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
6055
5984
  """
6056
5985
  return pulumi.get(self, "ca_cert")
6057
5986
 
6058
5987
  @property
6059
5988
  @pulumi.getter
6060
- def data(self) -> Optional[Mapping[str, Any]]:
5989
+ def data(self) -> Optional[Mapping[str, str]]:
6061
5990
  """
6062
5991
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6063
5992
 
@@ -6069,8 +5998,7 @@ class SecretsMountRedi(dict):
6069
5998
  @pulumi.getter(name="insecureTls")
6070
5999
  def insecure_tls(self) -> Optional[bool]:
6071
6000
  """
6072
- Whether to skip verification of the server
6073
- certificate when using TLS.
6001
+ Specifies whether to skip verification of the server certificate when using TLS.
6074
6002
  """
6075
6003
  return pulumi.get(self, "insecure_tls")
6076
6004
 
@@ -6086,8 +6014,7 @@ class SecretsMountRedi(dict):
6086
6014
  @pulumi.getter
6087
6015
  def port(self) -> Optional[int]:
6088
6016
  """
6089
- The default port to connect to if no port is specified as
6090
- part of the host.
6017
+ The transport port to use to connect to Redis.
6091
6018
  """
6092
6019
  return pulumi.get(self, "port")
6093
6020
 
@@ -6103,7 +6030,7 @@ class SecretsMountRedi(dict):
6103
6030
  @pulumi.getter
6104
6031
  def tls(self) -> Optional[bool]:
6105
6032
  """
6106
- Whether to use TLS when connecting to Cassandra.
6033
+ Specifies whether to use TLS when connecting to Redis.
6107
6034
  """
6108
6035
  return pulumi.get(self, "tls")
6109
6036
 
@@ -6146,7 +6073,7 @@ class SecretsMountRedisElasticach(dict):
6146
6073
  name: str,
6147
6074
  url: str,
6148
6075
  allowed_roles: Optional[Sequence[str]] = None,
6149
- data: Optional[Mapping[str, Any]] = None,
6076
+ data: Optional[Mapping[str, str]] = None,
6150
6077
  password: Optional[str] = None,
6151
6078
  plugin_name: Optional[str] = None,
6152
6079
  region: Optional[str] = None,
@@ -6155,19 +6082,17 @@ class SecretsMountRedisElasticach(dict):
6155
6082
  verify_connection: Optional[bool] = None):
6156
6083
  """
6157
6084
  :param str name: Name of the database connection.
6158
- :param str url: The URL for Elasticsearch's API. https requires certificate
6159
- by trusted CA if used.
6085
+ :param str url: The configuration endpoint for the ElastiCache cluster to connect to.
6160
6086
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
6161
6087
  connection.
6162
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6088
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6163
6089
 
6164
6090
  Supported list of database secrets engines that can be configured:
6165
- :param str password: The root credential password used in the connection URL.
6091
+ :param str password: The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
6166
6092
  :param str plugin_name: Specifies the name of the plugin to use.
6167
- :param str region: The AWS region where the ElastiCache cluster is hosted.
6168
- If omitted the plugin tries to infer the region from the environment.
6093
+ :param str region: The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
6169
6094
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
6170
- :param str username: The root credential username used in the connection URL.
6095
+ :param str username: The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
6171
6096
  :param bool verify_connection: Whether the connection should be verified on
6172
6097
  initial configuration or not.
6173
6098
  """
@@ -6202,8 +6127,7 @@ class SecretsMountRedisElasticach(dict):
6202
6127
  @pulumi.getter
6203
6128
  def url(self) -> str:
6204
6129
  """
6205
- The URL for Elasticsearch's API. https requires certificate
6206
- by trusted CA if used.
6130
+ The configuration endpoint for the ElastiCache cluster to connect to.
6207
6131
  """
6208
6132
  return pulumi.get(self, "url")
6209
6133
 
@@ -6218,7 +6142,7 @@ class SecretsMountRedisElasticach(dict):
6218
6142
 
6219
6143
  @property
6220
6144
  @pulumi.getter
6221
- def data(self) -> Optional[Mapping[str, Any]]:
6145
+ def data(self) -> Optional[Mapping[str, str]]:
6222
6146
  """
6223
6147
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6224
6148
 
@@ -6230,7 +6154,7 @@ class SecretsMountRedisElasticach(dict):
6230
6154
  @pulumi.getter
6231
6155
  def password(self) -> Optional[str]:
6232
6156
  """
6233
- The root credential password used in the connection URL.
6157
+ The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
6234
6158
  """
6235
6159
  return pulumi.get(self, "password")
6236
6160
 
@@ -6246,8 +6170,7 @@ class SecretsMountRedisElasticach(dict):
6246
6170
  @pulumi.getter
6247
6171
  def region(self) -> Optional[str]:
6248
6172
  """
6249
- The AWS region where the ElastiCache cluster is hosted.
6250
- If omitted the plugin tries to infer the region from the environment.
6173
+ The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
6251
6174
  """
6252
6175
  return pulumi.get(self, "region")
6253
6176
 
@@ -6263,7 +6186,7 @@ class SecretsMountRedisElasticach(dict):
6263
6186
  @pulumi.getter
6264
6187
  def username(self) -> Optional[str]:
6265
6188
  """
6266
- The root credential username used in the connection URL.
6189
+ The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
6267
6190
  """
6268
6191
  return pulumi.get(self, "username")
6269
6192
 
@@ -6318,7 +6241,7 @@ class SecretsMountRedshift(dict):
6318
6241
  name: str,
6319
6242
  allowed_roles: Optional[Sequence[str]] = None,
6320
6243
  connection_url: Optional[str] = None,
6321
- data: Optional[Mapping[str, Any]] = None,
6244
+ data: Optional[Mapping[str, str]] = None,
6322
6245
  disable_escaping: Optional[bool] = None,
6323
6246
  max_connection_lifetime: Optional[int] = None,
6324
6247
  max_idle_connections: Optional[int] = None,
@@ -6333,22 +6256,19 @@ class SecretsMountRedshift(dict):
6333
6256
  :param str name: Name of the database connection.
6334
6257
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
6335
6258
  connection.
6336
- :param str connection_url: Specifies the Redshift DSN.
6337
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
6338
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6259
+ :param str connection_url: Connection string to use to connect to the database.
6260
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6339
6261
 
6340
6262
  Supported list of database secrets engines that can be configured:
6341
- :param bool disable_escaping: Disable special character escaping in username and password.
6342
- :param int max_connection_lifetime: The maximum amount of time a connection may be reused.
6343
- :param int max_idle_connections: The maximum number of idle connections to
6344
- the database.
6345
- :param int max_open_connections: The maximum number of open connections to
6346
- the database.
6347
- :param str password: The root credential password used in the connection URL.
6263
+ :param bool disable_escaping: Disable special character escaping in username and password
6264
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
6265
+ :param int max_idle_connections: Maximum number of idle connections to the database.
6266
+ :param int max_open_connections: Maximum number of open connections to the database.
6267
+ :param str password: The root credential password used in the connection URL
6348
6268
  :param str plugin_name: Specifies the name of the plugin to use.
6349
6269
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
6350
- :param str username: The root credential username used in the connection URL.
6351
- :param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
6270
+ :param str username: The root credential username used in the connection URL
6271
+ :param str username_template: Username generation template.
6352
6272
  :param bool verify_connection: Whether the connection should be verified on
6353
6273
  initial configuration or not.
6354
6274
  """
@@ -6401,14 +6321,13 @@ class SecretsMountRedshift(dict):
6401
6321
  @pulumi.getter(name="connectionUrl")
6402
6322
  def connection_url(self) -> Optional[str]:
6403
6323
  """
6404
- Specifies the Redshift DSN.
6405
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
6324
+ Connection string to use to connect to the database.
6406
6325
  """
6407
6326
  return pulumi.get(self, "connection_url")
6408
6327
 
6409
6328
  @property
6410
6329
  @pulumi.getter
6411
- def data(self) -> Optional[Mapping[str, Any]]:
6330
+ def data(self) -> Optional[Mapping[str, str]]:
6412
6331
  """
6413
6332
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6414
6333
 
@@ -6420,7 +6339,7 @@ class SecretsMountRedshift(dict):
6420
6339
  @pulumi.getter(name="disableEscaping")
6421
6340
  def disable_escaping(self) -> Optional[bool]:
6422
6341
  """
6423
- Disable special character escaping in username and password.
6342
+ Disable special character escaping in username and password
6424
6343
  """
6425
6344
  return pulumi.get(self, "disable_escaping")
6426
6345
 
@@ -6428,7 +6347,7 @@ class SecretsMountRedshift(dict):
6428
6347
  @pulumi.getter(name="maxConnectionLifetime")
6429
6348
  def max_connection_lifetime(self) -> Optional[int]:
6430
6349
  """
6431
- The maximum amount of time a connection may be reused.
6350
+ Maximum number of seconds a connection may be reused.
6432
6351
  """
6433
6352
  return pulumi.get(self, "max_connection_lifetime")
6434
6353
 
@@ -6436,8 +6355,7 @@ class SecretsMountRedshift(dict):
6436
6355
  @pulumi.getter(name="maxIdleConnections")
6437
6356
  def max_idle_connections(self) -> Optional[int]:
6438
6357
  """
6439
- The maximum number of idle connections to
6440
- the database.
6358
+ Maximum number of idle connections to the database.
6441
6359
  """
6442
6360
  return pulumi.get(self, "max_idle_connections")
6443
6361
 
@@ -6445,8 +6363,7 @@ class SecretsMountRedshift(dict):
6445
6363
  @pulumi.getter(name="maxOpenConnections")
6446
6364
  def max_open_connections(self) -> Optional[int]:
6447
6365
  """
6448
- The maximum number of open connections to
6449
- the database.
6366
+ Maximum number of open connections to the database.
6450
6367
  """
6451
6368
  return pulumi.get(self, "max_open_connections")
6452
6369
 
@@ -6454,7 +6371,7 @@ class SecretsMountRedshift(dict):
6454
6371
  @pulumi.getter
6455
6372
  def password(self) -> Optional[str]:
6456
6373
  """
6457
- The root credential password used in the connection URL.
6374
+ The root credential password used in the connection URL
6458
6375
  """
6459
6376
  return pulumi.get(self, "password")
6460
6377
 
@@ -6478,7 +6395,7 @@ class SecretsMountRedshift(dict):
6478
6395
  @pulumi.getter
6479
6396
  def username(self) -> Optional[str]:
6480
6397
  """
6481
- The root credential username used in the connection URL.
6398
+ The root credential username used in the connection URL
6482
6399
  """
6483
6400
  return pulumi.get(self, "username")
6484
6401
 
@@ -6486,7 +6403,7 @@ class SecretsMountRedshift(dict):
6486
6403
  @pulumi.getter(name="usernameTemplate")
6487
6404
  def username_template(self) -> Optional[str]:
6488
6405
  """
6489
- [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
6406
+ Username generation template.
6490
6407
  """
6491
6408
  return pulumi.get(self, "username_template")
6492
6409
 
@@ -6539,7 +6456,7 @@ class SecretsMountSnowflake(dict):
6539
6456
  name: str,
6540
6457
  allowed_roles: Optional[Sequence[str]] = None,
6541
6458
  connection_url: Optional[str] = None,
6542
- data: Optional[Mapping[str, Any]] = None,
6459
+ data: Optional[Mapping[str, str]] = None,
6543
6460
  max_connection_lifetime: Optional[int] = None,
6544
6461
  max_idle_connections: Optional[int] = None,
6545
6462
  max_open_connections: Optional[int] = None,
@@ -6553,21 +6470,18 @@ class SecretsMountSnowflake(dict):
6553
6470
  :param str name: Name of the database connection.
6554
6471
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
6555
6472
  connection.
6556
- :param str connection_url: Specifies the Redshift DSN.
6557
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
6558
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6473
+ :param str connection_url: Connection string to use to connect to the database.
6474
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6559
6475
 
6560
6476
  Supported list of database secrets engines that can be configured:
6561
- :param int max_connection_lifetime: The maximum amount of time a connection may be reused.
6562
- :param int max_idle_connections: The maximum number of idle connections to
6563
- the database.
6564
- :param int max_open_connections: The maximum number of open connections to
6565
- the database.
6566
- :param str password: The root credential password used in the connection URL.
6477
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
6478
+ :param int max_idle_connections: Maximum number of idle connections to the database.
6479
+ :param int max_open_connections: Maximum number of open connections to the database.
6480
+ :param str password: The root credential password used in the connection URL
6567
6481
  :param str plugin_name: Specifies the name of the plugin to use.
6568
6482
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
6569
- :param str username: The root credential username used in the connection URL.
6570
- :param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
6483
+ :param str username: The root credential username used in the connection URL
6484
+ :param str username_template: Username generation template.
6571
6485
  :param bool verify_connection: Whether the connection should be verified on
6572
6486
  initial configuration or not.
6573
6487
  """
@@ -6618,14 +6532,13 @@ class SecretsMountSnowflake(dict):
6618
6532
  @pulumi.getter(name="connectionUrl")
6619
6533
  def connection_url(self) -> Optional[str]:
6620
6534
  """
6621
- Specifies the Redshift DSN.
6622
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
6535
+ Connection string to use to connect to the database.
6623
6536
  """
6624
6537
  return pulumi.get(self, "connection_url")
6625
6538
 
6626
6539
  @property
6627
6540
  @pulumi.getter
6628
- def data(self) -> Optional[Mapping[str, Any]]:
6541
+ def data(self) -> Optional[Mapping[str, str]]:
6629
6542
  """
6630
6543
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6631
6544
 
@@ -6637,7 +6550,7 @@ class SecretsMountSnowflake(dict):
6637
6550
  @pulumi.getter(name="maxConnectionLifetime")
6638
6551
  def max_connection_lifetime(self) -> Optional[int]:
6639
6552
  """
6640
- The maximum amount of time a connection may be reused.
6553
+ Maximum number of seconds a connection may be reused.
6641
6554
  """
6642
6555
  return pulumi.get(self, "max_connection_lifetime")
6643
6556
 
@@ -6645,8 +6558,7 @@ class SecretsMountSnowflake(dict):
6645
6558
  @pulumi.getter(name="maxIdleConnections")
6646
6559
  def max_idle_connections(self) -> Optional[int]:
6647
6560
  """
6648
- The maximum number of idle connections to
6649
- the database.
6561
+ Maximum number of idle connections to the database.
6650
6562
  """
6651
6563
  return pulumi.get(self, "max_idle_connections")
6652
6564
 
@@ -6654,8 +6566,7 @@ class SecretsMountSnowflake(dict):
6654
6566
  @pulumi.getter(name="maxOpenConnections")
6655
6567
  def max_open_connections(self) -> Optional[int]:
6656
6568
  """
6657
- The maximum number of open connections to
6658
- the database.
6569
+ Maximum number of open connections to the database.
6659
6570
  """
6660
6571
  return pulumi.get(self, "max_open_connections")
6661
6572
 
@@ -6663,7 +6574,7 @@ class SecretsMountSnowflake(dict):
6663
6574
  @pulumi.getter
6664
6575
  def password(self) -> Optional[str]:
6665
6576
  """
6666
- The root credential password used in the connection URL.
6577
+ The root credential password used in the connection URL
6667
6578
  """
6668
6579
  return pulumi.get(self, "password")
6669
6580
 
@@ -6687,7 +6598,7 @@ class SecretsMountSnowflake(dict):
6687
6598
  @pulumi.getter
6688
6599
  def username(self) -> Optional[str]:
6689
6600
  """
6690
- The root credential username used in the connection URL.
6601
+ The root credential username used in the connection URL
6691
6602
  """
6692
6603
  return pulumi.get(self, "username")
6693
6604
 
@@ -6695,7 +6606,7 @@ class SecretsMountSnowflake(dict):
6695
6606
  @pulumi.getter(name="usernameTemplate")
6696
6607
  def username_template(self) -> Optional[str]:
6697
6608
  """
6698
- [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
6609
+ Username generation template.
6699
6610
  """
6700
6611
  return pulumi.get(self, "username_template")
6701
6612