pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +26 -9
  5. pulumi_vault/ad/secret_backend.py +16 -142
  6. pulumi_vault/ad/secret_library.py +16 -9
  7. pulumi_vault/ad/secret_role.py +14 -9
  8. pulumi_vault/alicloud/auth_backend_role.py +76 -190
  9. pulumi_vault/approle/auth_backend_login.py +12 -7
  10. pulumi_vault/approle/auth_backend_role.py +77 -191
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
  13. pulumi_vault/audit.py +30 -21
  14. pulumi_vault/audit_request_header.py +11 -2
  15. pulumi_vault/auth_backend.py +66 -14
  16. pulumi_vault/aws/auth_backend_cert.py +18 -9
  17. pulumi_vault/aws/auth_backend_client.py +267 -22
  18. pulumi_vault/aws/auth_backend_config_identity.py +14 -9
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +77 -191
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
  24. pulumi_vault/aws/auth_backend_sts_role.py +14 -9
  25. pulumi_vault/aws/get_access_credentials.py +38 -9
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +77 -9
  28. pulumi_vault/aws/secret_backend_role.py +185 -9
  29. pulumi_vault/aws/secret_backend_static_role.py +20 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +153 -15
  32. pulumi_vault/azure/auth_backend_role.py +77 -191
  33. pulumi_vault/azure/backend.py +227 -21
  34. pulumi_vault/azure/backend_role.py +42 -37
  35. pulumi_vault/azure/get_access_credentials.py +41 -7
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -267
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +28 -19
  44. pulumi_vault/consul/secret_backend_role.py +18 -78
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +119 -112
  48. pulumi_vault/database/secret_backend_role.py +31 -22
  49. pulumi_vault/database/secret_backend_static_role.py +87 -13
  50. pulumi_vault/database/secrets_mount.py +427 -136
  51. pulumi_vault/egp_policy.py +16 -11
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +250 -33
  54. pulumi_vault/gcp/auth_backend_role.py +77 -269
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -5
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -12
  58. pulumi_vault/gcp/secret_impersonated_account.py +76 -15
  59. pulumi_vault/gcp/secret_roleset.py +31 -24
  60. pulumi_vault/gcp/secret_static_account.py +39 -32
  61. pulumi_vault/generic/endpoint.py +24 -17
  62. pulumi_vault/generic/get_secret.py +64 -8
  63. pulumi_vault/generic/secret.py +21 -16
  64. pulumi_vault/get_auth_backend.py +24 -7
  65. pulumi_vault/get_auth_backends.py +51 -9
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -11
  69. pulumi_vault/get_policy_document.py +34 -19
  70. pulumi_vault/get_raft_autopilot_state.py +29 -10
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +19 -14
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +16 -11
  75. pulumi_vault/github/user.py +16 -11
  76. pulumi_vault/identity/entity.py +20 -13
  77. pulumi_vault/identity/entity_alias.py +20 -13
  78. pulumi_vault/identity/entity_policies.py +28 -11
  79. pulumi_vault/identity/get_entity.py +42 -10
  80. pulumi_vault/identity/get_group.py +47 -9
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -7
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -9
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -10
  84. pulumi_vault/identity/group.py +58 -39
  85. pulumi_vault/identity/group_alias.py +16 -9
  86. pulumi_vault/identity/group_member_entity_ids.py +28 -66
  87. pulumi_vault/identity/group_member_group_ids.py +40 -19
  88. pulumi_vault/identity/group_policies.py +20 -7
  89. pulumi_vault/identity/mfa_duo.py +11 -6
  90. pulumi_vault/identity/mfa_login_enforcement.py +15 -6
  91. pulumi_vault/identity/mfa_okta.py +11 -6
  92. pulumi_vault/identity/mfa_pingid.py +7 -2
  93. pulumi_vault/identity/mfa_totp.py +7 -2
  94. pulumi_vault/identity/oidc.py +12 -7
  95. pulumi_vault/identity/oidc_assignment.py +24 -11
  96. pulumi_vault/identity/oidc_client.py +36 -23
  97. pulumi_vault/identity/oidc_key.py +30 -17
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
  99. pulumi_vault/identity/oidc_provider.py +36 -21
  100. pulumi_vault/identity/oidc_role.py +42 -21
  101. pulumi_vault/identity/oidc_scope.py +20 -13
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +45 -40
  105. pulumi_vault/jwt/auth_backend_role.py +133 -254
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +24 -19
  108. pulumi_vault/kmip/secret_role.py +14 -9
  109. pulumi_vault/kmip/secret_scope.py +14 -9
  110. pulumi_vault/kubernetes/auth_backend_config.py +57 -5
  111. pulumi_vault/kubernetes/auth_backend_role.py +70 -177
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -11
  115. pulumi_vault/kubernetes/secret_backend.py +316 -27
  116. pulumi_vault/kubernetes/secret_backend_role.py +137 -46
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +25 -8
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
  120. pulumi_vault/kv/get_secret_v2.py +85 -9
  121. pulumi_vault/kv/get_secrets_list.py +24 -11
  122. pulumi_vault/kv/get_secrets_list_v2.py +37 -15
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +23 -16
  125. pulumi_vault/kv/secret_backend_v2.py +20 -11
  126. pulumi_vault/kv/secret_v2.py +59 -50
  127. pulumi_vault/ldap/auth_backend.py +127 -166
  128. pulumi_vault/ldap/auth_backend_group.py +14 -9
  129. pulumi_vault/ldap/auth_backend_user.py +14 -9
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +354 -82
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +16 -9
  135. pulumi_vault/ldap/secret_backend_static_role.py +73 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +29 -57
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +18 -11
  140. pulumi_vault/mfa_okta.py +18 -11
  141. pulumi_vault/mfa_pingid.py +18 -11
  142. pulumi_vault/mfa_totp.py +24 -17
  143. pulumi_vault/mongodbatlas/secret_backend.py +20 -15
  144. pulumi_vault/mongodbatlas/secret_role.py +47 -38
  145. pulumi_vault/mount.py +391 -51
  146. pulumi_vault/namespace.py +68 -83
  147. pulumi_vault/nomad_secret_backend.py +18 -13
  148. pulumi_vault/nomad_secret_role.py +14 -9
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +485 -39
  151. pulumi_vault/okta/auth_backend_group.py +14 -9
  152. pulumi_vault/okta/auth_backend_user.py +14 -9
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +20 -13
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -9
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -8
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
  174. pulumi_vault/pkisecret/secret_backend_key.py +14 -9
  175. pulumi_vault/pkisecret/secret_backend_role.py +21 -14
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +14 -9
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +60 -6
  185. pulumi_vault/quota_rate_limit.py +56 -2
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +18 -13
  189. pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
  190. pulumi_vault/raft_autopilot.py +14 -9
  191. pulumi_vault/raft_snapshot_agent_config.py +129 -224
  192. pulumi_vault/rgp_policy.py +14 -9
  193. pulumi_vault/saml/auth_backend.py +22 -17
  194. pulumi_vault/saml/auth_backend_role.py +92 -197
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -71
  199. pulumi_vault/secrets/sync_aws_destination.py +242 -27
  200. pulumi_vault/secrets/sync_azure_destination.py +92 -31
  201. pulumi_vault/secrets/sync_config.py +9 -4
  202. pulumi_vault/secrets/sync_gcp_destination.py +158 -25
  203. pulumi_vault/secrets/sync_gh_destination.py +189 -13
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +74 -13
  206. pulumi_vault/ssh/_inputs.py +28 -28
  207. pulumi_vault/ssh/outputs.py +11 -28
  208. pulumi_vault/ssh/secret_backend_ca.py +108 -9
  209. pulumi_vault/ssh/secret_backend_role.py +85 -118
  210. pulumi_vault/terraformcloud/secret_backend.py +7 -54
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -20
  212. pulumi_vault/terraformcloud/secret_role.py +16 -74
  213. pulumi_vault/token.py +28 -23
  214. pulumi_vault/tokenauth/auth_backend_role.py +78 -199
  215. pulumi_vault/transform/alphabet.py +16 -9
  216. pulumi_vault/transform/get_decode.py +45 -17
  217. pulumi_vault/transform/get_encode.py +45 -17
  218. pulumi_vault/transform/role.py +16 -9
  219. pulumi_vault/transform/template.py +30 -21
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -21
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +27 -93
  224. pulumi_vault/transit/secret_cache_config.py +12 -7
  225. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -63,6 +68,8 @@ class SecretBackendConnectionCassandra(dict):
63
68
  suggest = "pem_json"
64
69
  elif key == "protocolVersion":
65
70
  suggest = "protocol_version"
71
+ elif key == "skipVerification":
72
+ suggest = "skip_verification"
66
73
 
67
74
  if suggest:
68
75
  pulumi.log.warn(f"Key '{key}' not found in SecretBackendConnectionCassandra. Access the value via the '{suggest}' property getter instead.")
@@ -84,23 +91,21 @@ class SecretBackendConnectionCassandra(dict):
84
91
  pem_json: Optional[str] = None,
85
92
  port: Optional[int] = None,
86
93
  protocol_version: Optional[int] = None,
94
+ skip_verification: Optional[bool] = None,
87
95
  tls: Optional[bool] = None,
88
96
  username: Optional[str] = None):
89
97
  """
90
- :param int connect_timeout: The number of seconds to use as a connection
91
- timeout.
92
- :param Sequence[str] hosts: The hosts to connect to.
93
- :param bool insecure_tls: Whether to skip verification of the server
94
- certificate when using TLS.
95
- :param str password: The password to authenticate with.
96
- :param str pem_bundle: Concatenated PEM blocks configuring the certificate
97
- chain.
98
- :param str pem_json: A JSON structure configuring the certificate chain.
99
- :param int port: The default port to connect to if no port is specified as
100
- part of the host.
98
+ :param int connect_timeout: The number of seconds to use as a connection timeout.
99
+ :param Sequence[str] hosts: Cassandra hosts to connect to.
100
+ :param bool insecure_tls: Whether to skip verification of the server certificate when using TLS.
101
+ :param str password: The password to use when authenticating with Cassandra.
102
+ :param str pem_bundle: Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
103
+ :param str pem_json: Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
104
+ :param int port: The transport port to use to connect to Cassandra.
101
105
  :param int protocol_version: The CQL protocol version to use.
106
+ :param bool skip_verification: Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
102
107
  :param bool tls: Whether to use TLS when connecting to Cassandra.
103
- :param str username: The username to authenticate with.
108
+ :param str username: The username to use when authenticating with Cassandra.
104
109
  """
105
110
  if connect_timeout is not None:
106
111
  pulumi.set(__self__, "connect_timeout", connect_timeout)
@@ -118,6 +123,8 @@ class SecretBackendConnectionCassandra(dict):
118
123
  pulumi.set(__self__, "port", port)
119
124
  if protocol_version is not None:
120
125
  pulumi.set(__self__, "protocol_version", protocol_version)
126
+ if skip_verification is not None:
127
+ pulumi.set(__self__, "skip_verification", skip_verification)
121
128
  if tls is not None:
122
129
  pulumi.set(__self__, "tls", tls)
123
130
  if username is not None:
@@ -127,8 +134,7 @@ class SecretBackendConnectionCassandra(dict):
127
134
  @pulumi.getter(name="connectTimeout")
128
135
  def connect_timeout(self) -> Optional[int]:
129
136
  """
130
- The number of seconds to use as a connection
131
- timeout.
137
+ The number of seconds to use as a connection timeout.
132
138
  """
133
139
  return pulumi.get(self, "connect_timeout")
134
140
 
@@ -136,7 +142,7 @@ class SecretBackendConnectionCassandra(dict):
136
142
  @pulumi.getter
137
143
  def hosts(self) -> Optional[Sequence[str]]:
138
144
  """
139
- The hosts to connect to.
145
+ Cassandra hosts to connect to.
140
146
  """
141
147
  return pulumi.get(self, "hosts")
142
148
 
@@ -144,8 +150,7 @@ class SecretBackendConnectionCassandra(dict):
144
150
  @pulumi.getter(name="insecureTls")
145
151
  def insecure_tls(self) -> Optional[bool]:
146
152
  """
147
- Whether to skip verification of the server
148
- certificate when using TLS.
153
+ Whether to skip verification of the server certificate when using TLS.
149
154
  """
150
155
  return pulumi.get(self, "insecure_tls")
151
156
 
@@ -153,7 +158,7 @@ class SecretBackendConnectionCassandra(dict):
153
158
  @pulumi.getter
154
159
  def password(self) -> Optional[str]:
155
160
  """
156
- The password to authenticate with.
161
+ The password to use when authenticating with Cassandra.
157
162
  """
158
163
  return pulumi.get(self, "password")
159
164
 
@@ -161,8 +166,7 @@ class SecretBackendConnectionCassandra(dict):
161
166
  @pulumi.getter(name="pemBundle")
162
167
  def pem_bundle(self) -> Optional[str]:
163
168
  """
164
- Concatenated PEM blocks configuring the certificate
165
- chain.
169
+ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
166
170
  """
167
171
  return pulumi.get(self, "pem_bundle")
168
172
 
@@ -170,7 +174,7 @@ class SecretBackendConnectionCassandra(dict):
170
174
  @pulumi.getter(name="pemJson")
171
175
  def pem_json(self) -> Optional[str]:
172
176
  """
173
- A JSON structure configuring the certificate chain.
177
+ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
174
178
  """
175
179
  return pulumi.get(self, "pem_json")
176
180
 
@@ -178,8 +182,7 @@ class SecretBackendConnectionCassandra(dict):
178
182
  @pulumi.getter
179
183
  def port(self) -> Optional[int]:
180
184
  """
181
- The default port to connect to if no port is specified as
182
- part of the host.
185
+ The transport port to use to connect to Cassandra.
183
186
  """
184
187
  return pulumi.get(self, "port")
185
188
 
@@ -191,6 +194,14 @@ class SecretBackendConnectionCassandra(dict):
191
194
  """
192
195
  return pulumi.get(self, "protocol_version")
193
196
 
197
+ @property
198
+ @pulumi.getter(name="skipVerification")
199
+ def skip_verification(self) -> Optional[bool]:
200
+ """
201
+ Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
202
+ """
203
+ return pulumi.get(self, "skip_verification")
204
+
194
205
  @property
195
206
  @pulumi.getter
196
207
  def tls(self) -> Optional[bool]:
@@ -203,7 +214,7 @@ class SecretBackendConnectionCassandra(dict):
203
214
  @pulumi.getter
204
215
  def username(self) -> Optional[str]:
205
216
  """
206
- The username to authenticate with.
217
+ The username to use when authenticating with Cassandra.
207
218
  """
208
219
  return pulumi.get(self, "username")
209
220
 
@@ -243,14 +254,13 @@ class SecretBackendConnectionCouchbase(dict):
243
254
  tls: Optional[bool] = None,
244
255
  username_template: Optional[str] = None):
245
256
  """
246
- :param Sequence[str] hosts: The hosts to connect to.
247
- :param str password: The password to authenticate with.
248
- :param str username: The username to authenticate with.
257
+ :param Sequence[str] hosts: A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
258
+ :param str password: Specifies the password corresponding to the given username.
259
+ :param str username: Specifies the username for Vault to use.
249
260
  :param str base64_pem: Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
250
261
  :param str bucket_name: Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
251
- :param bool insecure_tls: Whether to skip verification of the server
252
- certificate when using TLS.
253
- :param bool tls: Whether to use TLS when connecting to Cassandra.
262
+ :param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
263
+ :param bool tls: Specifies whether to use TLS when connecting to Couchbase.
254
264
  :param str username_template: Template describing how dynamic usernames are generated.
255
265
  """
256
266
  pulumi.set(__self__, "hosts", hosts)
@@ -271,7 +281,7 @@ class SecretBackendConnectionCouchbase(dict):
271
281
  @pulumi.getter
272
282
  def hosts(self) -> Sequence[str]:
273
283
  """
274
- The hosts to connect to.
284
+ A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
275
285
  """
276
286
  return pulumi.get(self, "hosts")
277
287
 
@@ -279,7 +289,7 @@ class SecretBackendConnectionCouchbase(dict):
279
289
  @pulumi.getter
280
290
  def password(self) -> str:
281
291
  """
282
- The password to authenticate with.
292
+ Specifies the password corresponding to the given username.
283
293
  """
284
294
  return pulumi.get(self, "password")
285
295
 
@@ -287,7 +297,7 @@ class SecretBackendConnectionCouchbase(dict):
287
297
  @pulumi.getter
288
298
  def username(self) -> str:
289
299
  """
290
- The username to authenticate with.
300
+ Specifies the username for Vault to use.
291
301
  """
292
302
  return pulumi.get(self, "username")
293
303
 
@@ -311,8 +321,7 @@ class SecretBackendConnectionCouchbase(dict):
311
321
  @pulumi.getter(name="insecureTls")
312
322
  def insecure_tls(self) -> Optional[bool]:
313
323
  """
314
- Whether to skip verification of the server
315
- certificate when using TLS.
324
+ Specifies whether to skip verification of the server certificate when using TLS.
316
325
  """
317
326
  return pulumi.get(self, "insecure_tls")
318
327
 
@@ -320,7 +329,7 @@ class SecretBackendConnectionCouchbase(dict):
320
329
  @pulumi.getter
321
330
  def tls(self) -> Optional[bool]:
322
331
  """
323
- Whether to use TLS when connecting to Cassandra.
332
+ Specifies whether to use TLS when connecting to Couchbase.
324
333
  """
325
334
  return pulumi.get(self, "tls")
326
335
 
@@ -374,16 +383,15 @@ class SecretBackendConnectionElasticsearch(dict):
374
383
  tls_server_name: Optional[str] = None,
375
384
  username_template: Optional[str] = None):
376
385
  """
377
- :param str password: The password to authenticate with.
378
- :param str url: The URL for Elasticsearch's API. https requires certificate
379
- by trusted CA if used.
380
- :param str username: The username to authenticate with.
381
- :param str ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
382
- :param str ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
383
- :param str client_cert: The path to the certificate for the Elasticsearch client to present for communication.
384
- :param str client_key: The path to the key for the Elasticsearch client to use for communication.
385
- :param bool insecure: Whether to disable certificate verification.
386
- :param str tls_server_name: This, if set, is used to set the SNI host when connecting via TLS.
386
+ :param str password: The password to be used in the connection URL
387
+ :param str url: The URL for Elasticsearch's API
388
+ :param str username: The username to be used in the connection URL
389
+ :param str ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
390
+ :param str ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
391
+ :param str client_cert: The path to the certificate for the Elasticsearch client to present for communication
392
+ :param str client_key: The path to the key for the Elasticsearch client to use for communication
393
+ :param bool insecure: Whether to disable certificate verification
394
+ :param str tls_server_name: This, if set, is used to set the SNI host when connecting via TLS
387
395
  :param str username_template: Template describing how dynamic usernames are generated.
388
396
  """
389
397
  pulumi.set(__self__, "password", password)
@@ -408,7 +416,7 @@ class SecretBackendConnectionElasticsearch(dict):
408
416
  @pulumi.getter
409
417
  def password(self) -> str:
410
418
  """
411
- The password to authenticate with.
419
+ The password to be used in the connection URL
412
420
  """
413
421
  return pulumi.get(self, "password")
414
422
 
@@ -416,8 +424,7 @@ class SecretBackendConnectionElasticsearch(dict):
416
424
  @pulumi.getter
417
425
  def url(self) -> str:
418
426
  """
419
- The URL for Elasticsearch's API. https requires certificate
420
- by trusted CA if used.
427
+ The URL for Elasticsearch's API
421
428
  """
422
429
  return pulumi.get(self, "url")
423
430
 
@@ -425,7 +432,7 @@ class SecretBackendConnectionElasticsearch(dict):
425
432
  @pulumi.getter
426
433
  def username(self) -> str:
427
434
  """
428
- The username to authenticate with.
435
+ The username to be used in the connection URL
429
436
  """
430
437
  return pulumi.get(self, "username")
431
438
 
@@ -433,7 +440,7 @@ class SecretBackendConnectionElasticsearch(dict):
433
440
  @pulumi.getter(name="caCert")
434
441
  def ca_cert(self) -> Optional[str]:
435
442
  """
436
- The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
443
+ The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
437
444
  """
438
445
  return pulumi.get(self, "ca_cert")
439
446
 
@@ -441,7 +448,7 @@ class SecretBackendConnectionElasticsearch(dict):
441
448
  @pulumi.getter(name="caPath")
442
449
  def ca_path(self) -> Optional[str]:
443
450
  """
444
- The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
451
+ The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
445
452
  """
446
453
  return pulumi.get(self, "ca_path")
447
454
 
@@ -449,7 +456,7 @@ class SecretBackendConnectionElasticsearch(dict):
449
456
  @pulumi.getter(name="clientCert")
450
457
  def client_cert(self) -> Optional[str]:
451
458
  """
452
- The path to the certificate for the Elasticsearch client to present for communication.
459
+ The path to the certificate for the Elasticsearch client to present for communication
453
460
  """
454
461
  return pulumi.get(self, "client_cert")
455
462
 
@@ -457,7 +464,7 @@ class SecretBackendConnectionElasticsearch(dict):
457
464
  @pulumi.getter(name="clientKey")
458
465
  def client_key(self) -> Optional[str]:
459
466
  """
460
- The path to the key for the Elasticsearch client to use for communication.
467
+ The path to the key for the Elasticsearch client to use for communication
461
468
  """
462
469
  return pulumi.get(self, "client_key")
463
470
 
@@ -465,7 +472,7 @@ class SecretBackendConnectionElasticsearch(dict):
465
472
  @pulumi.getter
466
473
  def insecure(self) -> Optional[bool]:
467
474
  """
468
- Whether to disable certificate verification.
475
+ Whether to disable certificate verification
469
476
  """
470
477
  return pulumi.get(self, "insecure")
471
478
 
@@ -473,7 +480,7 @@ class SecretBackendConnectionElasticsearch(dict):
473
480
  @pulumi.getter(name="tlsServerName")
474
481
  def tls_server_name(self) -> Optional[str]:
475
482
  """
476
- This, if set, is used to set the SNI host when connecting via TLS.
483
+ This, if set, is used to set the SNI host when connecting via TLS
477
484
  """
478
485
  return pulumi.get(self, "tls_server_name")
479
486
 
@@ -522,19 +529,13 @@ class SecretBackendConnectionHana(dict):
522
529
  password: Optional[str] = None,
523
530
  username: Optional[str] = None):
524
531
  """
525
- :param str connection_url: A URL containing connection information. See
526
- the [Vault
527
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
528
- for an example.
529
- :param bool disable_escaping: Disable special character escaping in username and password.
530
- :param int max_connection_lifetime: The maximum number of seconds to keep
531
- a connection alive for.
532
- :param int max_idle_connections: The maximum number of idle connections to
533
- maintain.
534
- :param int max_open_connections: The maximum number of open connections to
535
- use.
536
- :param str password: The password to authenticate with.
537
- :param str username: The username to authenticate with.
532
+ :param str connection_url: Connection string to use to connect to the database.
533
+ :param bool disable_escaping: Disable special character escaping in username and password
534
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
535
+ :param int max_idle_connections: Maximum number of idle connections to the database.
536
+ :param int max_open_connections: Maximum number of open connections to the database.
537
+ :param str password: The root credential password used in the connection URL
538
+ :param str username: The root credential username used in the connection URL
538
539
  """
539
540
  if connection_url is not None:
540
541
  pulumi.set(__self__, "connection_url", connection_url)
@@ -555,10 +556,7 @@ class SecretBackendConnectionHana(dict):
555
556
  @pulumi.getter(name="connectionUrl")
556
557
  def connection_url(self) -> Optional[str]:
557
558
  """
558
- A URL containing connection information. See
559
- the [Vault
560
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
561
- for an example.
559
+ Connection string to use to connect to the database.
562
560
  """
563
561
  return pulumi.get(self, "connection_url")
564
562
 
@@ -566,7 +564,7 @@ class SecretBackendConnectionHana(dict):
566
564
  @pulumi.getter(name="disableEscaping")
567
565
  def disable_escaping(self) -> Optional[bool]:
568
566
  """
569
- Disable special character escaping in username and password.
567
+ Disable special character escaping in username and password
570
568
  """
571
569
  return pulumi.get(self, "disable_escaping")
572
570
 
@@ -574,8 +572,7 @@ class SecretBackendConnectionHana(dict):
574
572
  @pulumi.getter(name="maxConnectionLifetime")
575
573
  def max_connection_lifetime(self) -> Optional[int]:
576
574
  """
577
- The maximum number of seconds to keep
578
- a connection alive for.
575
+ Maximum number of seconds a connection may be reused.
579
576
  """
580
577
  return pulumi.get(self, "max_connection_lifetime")
581
578
 
@@ -583,8 +580,7 @@ class SecretBackendConnectionHana(dict):
583
580
  @pulumi.getter(name="maxIdleConnections")
584
581
  def max_idle_connections(self) -> Optional[int]:
585
582
  """
586
- The maximum number of idle connections to
587
- maintain.
583
+ Maximum number of idle connections to the database.
588
584
  """
589
585
  return pulumi.get(self, "max_idle_connections")
590
586
 
@@ -592,8 +588,7 @@ class SecretBackendConnectionHana(dict):
592
588
  @pulumi.getter(name="maxOpenConnections")
593
589
  def max_open_connections(self) -> Optional[int]:
594
590
  """
595
- The maximum number of open connections to
596
- use.
591
+ Maximum number of open connections to the database.
597
592
  """
598
593
  return pulumi.get(self, "max_open_connections")
599
594
 
@@ -601,7 +596,7 @@ class SecretBackendConnectionHana(dict):
601
596
  @pulumi.getter
602
597
  def password(self) -> Optional[str]:
603
598
  """
604
- The password to authenticate with.
599
+ The root credential password used in the connection URL
605
600
  """
606
601
  return pulumi.get(self, "password")
607
602
 
@@ -609,7 +604,7 @@ class SecretBackendConnectionHana(dict):
609
604
  @pulumi.getter
610
605
  def username(self) -> Optional[str]:
611
606
  """
612
- The username to authenticate with.
607
+ The root credential username used in the connection URL
613
608
  """
614
609
  return pulumi.get(self, "username")
615
610
 
@@ -653,19 +648,15 @@ class SecretBackendConnectionInfluxdb(dict):
653
648
  tls: Optional[bool] = None,
654
649
  username_template: Optional[str] = None):
655
650
  """
656
- :param str host: The host to connect to.
657
- :param str password: The password to authenticate with.
658
- :param str username: The username to authenticate with.
659
- :param int connect_timeout: The number of seconds to use as a connection
660
- timeout.
661
- :param bool insecure_tls: Whether to skip verification of the server
662
- certificate when using TLS.
663
- :param str pem_bundle: Concatenated PEM blocks configuring the certificate
664
- chain.
665
- :param str pem_json: A JSON structure configuring the certificate chain.
666
- :param int port: The default port to connect to if no port is specified as
667
- part of the host.
668
- :param bool tls: Whether to use TLS when connecting to Cassandra.
651
+ :param str host: Influxdb host to connect to.
652
+ :param str password: Specifies the password corresponding to the given username.
653
+ :param str username: Specifies the username to use for superuser access.
654
+ :param int connect_timeout: The number of seconds to use as a connection timeout.
655
+ :param bool insecure_tls: Whether to skip verification of the server certificate when using TLS.
656
+ :param str pem_bundle: Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
657
+ :param str pem_json: Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
658
+ :param int port: The transport port to use to connect to Influxdb.
659
+ :param bool tls: Whether to use TLS when connecting to Influxdb.
669
660
  :param str username_template: Template describing how dynamic usernames are generated.
670
661
  """
671
662
  pulumi.set(__self__, "host", host)
@@ -690,7 +681,7 @@ class SecretBackendConnectionInfluxdb(dict):
690
681
  @pulumi.getter
691
682
  def host(self) -> str:
692
683
  """
693
- The host to connect to.
684
+ Influxdb host to connect to.
694
685
  """
695
686
  return pulumi.get(self, "host")
696
687
 
@@ -698,7 +689,7 @@ class SecretBackendConnectionInfluxdb(dict):
698
689
  @pulumi.getter
699
690
  def password(self) -> str:
700
691
  """
701
- The password to authenticate with.
692
+ Specifies the password corresponding to the given username.
702
693
  """
703
694
  return pulumi.get(self, "password")
704
695
 
@@ -706,7 +697,7 @@ class SecretBackendConnectionInfluxdb(dict):
706
697
  @pulumi.getter
707
698
  def username(self) -> str:
708
699
  """
709
- The username to authenticate with.
700
+ Specifies the username to use for superuser access.
710
701
  """
711
702
  return pulumi.get(self, "username")
712
703
 
@@ -714,8 +705,7 @@ class SecretBackendConnectionInfluxdb(dict):
714
705
  @pulumi.getter(name="connectTimeout")
715
706
  def connect_timeout(self) -> Optional[int]:
716
707
  """
717
- The number of seconds to use as a connection
718
- timeout.
708
+ The number of seconds to use as a connection timeout.
719
709
  """
720
710
  return pulumi.get(self, "connect_timeout")
721
711
 
@@ -723,8 +713,7 @@ class SecretBackendConnectionInfluxdb(dict):
723
713
  @pulumi.getter(name="insecureTls")
724
714
  def insecure_tls(self) -> Optional[bool]:
725
715
  """
726
- Whether to skip verification of the server
727
- certificate when using TLS.
716
+ Whether to skip verification of the server certificate when using TLS.
728
717
  """
729
718
  return pulumi.get(self, "insecure_tls")
730
719
 
@@ -732,8 +721,7 @@ class SecretBackendConnectionInfluxdb(dict):
732
721
  @pulumi.getter(name="pemBundle")
733
722
  def pem_bundle(self) -> Optional[str]:
734
723
  """
735
- Concatenated PEM blocks configuring the certificate
736
- chain.
724
+ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
737
725
  """
738
726
  return pulumi.get(self, "pem_bundle")
739
727
 
@@ -741,7 +729,7 @@ class SecretBackendConnectionInfluxdb(dict):
741
729
  @pulumi.getter(name="pemJson")
742
730
  def pem_json(self) -> Optional[str]:
743
731
  """
744
- A JSON structure configuring the certificate chain.
732
+ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
745
733
  """
746
734
  return pulumi.get(self, "pem_json")
747
735
 
@@ -749,8 +737,7 @@ class SecretBackendConnectionInfluxdb(dict):
749
737
  @pulumi.getter
750
738
  def port(self) -> Optional[int]:
751
739
  """
752
- The default port to connect to if no port is specified as
753
- part of the host.
740
+ The transport port to use to connect to Influxdb.
754
741
  """
755
742
  return pulumi.get(self, "port")
756
743
 
@@ -758,7 +745,7 @@ class SecretBackendConnectionInfluxdb(dict):
758
745
  @pulumi.getter
759
746
  def tls(self) -> Optional[bool]:
760
747
  """
761
- Whether to use TLS when connecting to Cassandra.
748
+ Whether to use TLS when connecting to Influxdb.
762
749
  """
763
750
  return pulumi.get(self, "tls")
764
751
 
@@ -807,19 +794,13 @@ class SecretBackendConnectionMongodb(dict):
807
794
  username: Optional[str] = None,
808
795
  username_template: Optional[str] = None):
809
796
  """
810
- :param str connection_url: A URL containing connection information. See
811
- the [Vault
812
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
813
- for an example.
814
- :param int max_connection_lifetime: The maximum number of seconds to keep
815
- a connection alive for.
816
- :param int max_idle_connections: The maximum number of idle connections to
817
- maintain.
818
- :param int max_open_connections: The maximum number of open connections to
819
- use.
820
- :param str password: The password to authenticate with.
821
- :param str username: The username to authenticate with.
822
- :param str username_template: Template describing how dynamic usernames are generated.
797
+ :param str connection_url: Connection string to use to connect to the database.
798
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
799
+ :param int max_idle_connections: Maximum number of idle connections to the database.
800
+ :param int max_open_connections: Maximum number of open connections to the database.
801
+ :param str password: The root credential password used in the connection URL
802
+ :param str username: The root credential username used in the connection URL
803
+ :param str username_template: Username generation template.
823
804
  """
824
805
  if connection_url is not None:
825
806
  pulumi.set(__self__, "connection_url", connection_url)
@@ -840,10 +821,7 @@ class SecretBackendConnectionMongodb(dict):
840
821
  @pulumi.getter(name="connectionUrl")
841
822
  def connection_url(self) -> Optional[str]:
842
823
  """
843
- A URL containing connection information. See
844
- the [Vault
845
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
846
- for an example.
824
+ Connection string to use to connect to the database.
847
825
  """
848
826
  return pulumi.get(self, "connection_url")
849
827
 
@@ -851,8 +829,7 @@ class SecretBackendConnectionMongodb(dict):
851
829
  @pulumi.getter(name="maxConnectionLifetime")
852
830
  def max_connection_lifetime(self) -> Optional[int]:
853
831
  """
854
- The maximum number of seconds to keep
855
- a connection alive for.
832
+ Maximum number of seconds a connection may be reused.
856
833
  """
857
834
  return pulumi.get(self, "max_connection_lifetime")
858
835
 
@@ -860,8 +837,7 @@ class SecretBackendConnectionMongodb(dict):
860
837
  @pulumi.getter(name="maxIdleConnections")
861
838
  def max_idle_connections(self) -> Optional[int]:
862
839
  """
863
- The maximum number of idle connections to
864
- maintain.
840
+ Maximum number of idle connections to the database.
865
841
  """
866
842
  return pulumi.get(self, "max_idle_connections")
867
843
 
@@ -869,8 +845,7 @@ class SecretBackendConnectionMongodb(dict):
869
845
  @pulumi.getter(name="maxOpenConnections")
870
846
  def max_open_connections(self) -> Optional[int]:
871
847
  """
872
- The maximum number of open connections to
873
- use.
848
+ Maximum number of open connections to the database.
874
849
  """
875
850
  return pulumi.get(self, "max_open_connections")
876
851
 
@@ -878,7 +853,7 @@ class SecretBackendConnectionMongodb(dict):
878
853
  @pulumi.getter
879
854
  def password(self) -> Optional[str]:
880
855
  """
881
- The password to authenticate with.
856
+ The root credential password used in the connection URL
882
857
  """
883
858
  return pulumi.get(self, "password")
884
859
 
@@ -886,7 +861,7 @@ class SecretBackendConnectionMongodb(dict):
886
861
  @pulumi.getter
887
862
  def username(self) -> Optional[str]:
888
863
  """
889
- The username to authenticate with.
864
+ The root credential username used in the connection URL
890
865
  """
891
866
  return pulumi.get(self, "username")
892
867
 
@@ -894,7 +869,7 @@ class SecretBackendConnectionMongodb(dict):
894
869
  @pulumi.getter(name="usernameTemplate")
895
870
  def username_template(self) -> Optional[str]:
896
871
  """
897
- Template describing how dynamic usernames are generated.
872
+ Username generation template.
898
873
  """
899
874
  return pulumi.get(self, "username_template")
900
875
 
@@ -1002,24 +977,15 @@ class SecretBackendConnectionMssql(dict):
1002
977
  username: Optional[str] = None,
1003
978
  username_template: Optional[str] = None):
1004
979
  """
1005
- :param str connection_url: A URL containing connection information. See
1006
- the [Vault
1007
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
1008
- for an example.
1009
- :param bool contained_db: For Vault v1.9+. Set to true when the target is a
1010
- Contained Database, e.g. AzureSQL.
1011
- See the [Vault
1012
- docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
1013
- :param bool disable_escaping: Disable special character escaping in username and password.
1014
- :param int max_connection_lifetime: The maximum number of seconds to keep
1015
- a connection alive for.
1016
- :param int max_idle_connections: The maximum number of idle connections to
1017
- maintain.
1018
- :param int max_open_connections: The maximum number of open connections to
1019
- use.
1020
- :param str password: The password to authenticate with.
1021
- :param str username: The username to authenticate with.
1022
- :param str username_template: Template describing how dynamic usernames are generated.
980
+ :param str connection_url: Connection string to use to connect to the database.
981
+ :param bool contained_db: Set to true when the target is a Contained Database, e.g. AzureSQL.
982
+ :param bool disable_escaping: Disable special character escaping in username and password
983
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
984
+ :param int max_idle_connections: Maximum number of idle connections to the database.
985
+ :param int max_open_connections: Maximum number of open connections to the database.
986
+ :param str password: The root credential password used in the connection URL
987
+ :param str username: The root credential username used in the connection URL
988
+ :param str username_template: Username generation template.
1023
989
  """
1024
990
  if connection_url is not None:
1025
991
  pulumi.set(__self__, "connection_url", connection_url)
@@ -1044,10 +1010,7 @@ class SecretBackendConnectionMssql(dict):
1044
1010
  @pulumi.getter(name="connectionUrl")
1045
1011
  def connection_url(self) -> Optional[str]:
1046
1012
  """
1047
- A URL containing connection information. See
1048
- the [Vault
1049
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
1050
- for an example.
1013
+ Connection string to use to connect to the database.
1051
1014
  """
1052
1015
  return pulumi.get(self, "connection_url")
1053
1016
 
@@ -1055,10 +1018,7 @@ class SecretBackendConnectionMssql(dict):
1055
1018
  @pulumi.getter(name="containedDb")
1056
1019
  def contained_db(self) -> Optional[bool]:
1057
1020
  """
1058
- For Vault v1.9+. Set to true when the target is a
1059
- Contained Database, e.g. AzureSQL.
1060
- See the [Vault
1061
- docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
1021
+ Set to true when the target is a Contained Database, e.g. AzureSQL.
1062
1022
  """
1063
1023
  return pulumi.get(self, "contained_db")
1064
1024
 
@@ -1066,7 +1026,7 @@ class SecretBackendConnectionMssql(dict):
1066
1026
  @pulumi.getter(name="disableEscaping")
1067
1027
  def disable_escaping(self) -> Optional[bool]:
1068
1028
  """
1069
- Disable special character escaping in username and password.
1029
+ Disable special character escaping in username and password
1070
1030
  """
1071
1031
  return pulumi.get(self, "disable_escaping")
1072
1032
 
@@ -1074,8 +1034,7 @@ class SecretBackendConnectionMssql(dict):
1074
1034
  @pulumi.getter(name="maxConnectionLifetime")
1075
1035
  def max_connection_lifetime(self) -> Optional[int]:
1076
1036
  """
1077
- The maximum number of seconds to keep
1078
- a connection alive for.
1037
+ Maximum number of seconds a connection may be reused.
1079
1038
  """
1080
1039
  return pulumi.get(self, "max_connection_lifetime")
1081
1040
 
@@ -1083,8 +1042,7 @@ class SecretBackendConnectionMssql(dict):
1083
1042
  @pulumi.getter(name="maxIdleConnections")
1084
1043
  def max_idle_connections(self) -> Optional[int]:
1085
1044
  """
1086
- The maximum number of idle connections to
1087
- maintain.
1045
+ Maximum number of idle connections to the database.
1088
1046
  """
1089
1047
  return pulumi.get(self, "max_idle_connections")
1090
1048
 
@@ -1092,8 +1050,7 @@ class SecretBackendConnectionMssql(dict):
1092
1050
  @pulumi.getter(name="maxOpenConnections")
1093
1051
  def max_open_connections(self) -> Optional[int]:
1094
1052
  """
1095
- The maximum number of open connections to
1096
- use.
1053
+ Maximum number of open connections to the database.
1097
1054
  """
1098
1055
  return pulumi.get(self, "max_open_connections")
1099
1056
 
@@ -1101,7 +1058,7 @@ class SecretBackendConnectionMssql(dict):
1101
1058
  @pulumi.getter
1102
1059
  def password(self) -> Optional[str]:
1103
1060
  """
1104
- The password to authenticate with.
1061
+ The root credential password used in the connection URL
1105
1062
  """
1106
1063
  return pulumi.get(self, "password")
1107
1064
 
@@ -1109,7 +1066,7 @@ class SecretBackendConnectionMssql(dict):
1109
1066
  @pulumi.getter
1110
1067
  def username(self) -> Optional[str]:
1111
1068
  """
1112
- The username to authenticate with.
1069
+ The root credential username used in the connection URL
1113
1070
  """
1114
1071
  return pulumi.get(self, "username")
1115
1072
 
@@ -1117,7 +1074,7 @@ class SecretBackendConnectionMssql(dict):
1117
1074
  @pulumi.getter(name="usernameTemplate")
1118
1075
  def username_template(self) -> Optional[str]:
1119
1076
  """
1120
- Template describing how dynamic usernames are generated.
1077
+ Username generation template.
1121
1078
  """
1122
1079
  return pulumi.get(self, "username_template")
1123
1080
 
@@ -1170,23 +1127,17 @@ class SecretBackendConnectionMysql(dict):
1170
1127
  username: Optional[str] = None,
1171
1128
  username_template: Optional[str] = None):
1172
1129
  """
1173
- :param str auth_type: Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
1174
- :param str connection_url: A URL containing connection information. See
1175
- the [Vault
1176
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
1177
- for an example.
1178
- :param int max_connection_lifetime: The maximum number of seconds to keep
1179
- a connection alive for.
1180
- :param int max_idle_connections: The maximum number of idle connections to
1181
- maintain.
1182
- :param int max_open_connections: The maximum number of open connections to
1183
- use.
1184
- :param str password: The password to authenticate with.
1185
- :param str service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
1130
+ :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
1131
+ :param str connection_url: Connection string to use to connect to the database.
1132
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
1133
+ :param int max_idle_connections: Maximum number of idle connections to the database.
1134
+ :param int max_open_connections: Maximum number of open connections to the database.
1135
+ :param str password: The root credential password used in the connection URL
1136
+ :param str service_account_json: A JSON encoded credential for use with IAM authorization
1186
1137
  :param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
1187
1138
  :param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
1188
- :param str username: The username to authenticate with.
1189
- :param str username_template: Template describing how dynamic usernames are generated.
1139
+ :param str username: The root credential username used in the connection URL
1140
+ :param str username_template: Username generation template.
1190
1141
  """
1191
1142
  if auth_type is not None:
1192
1143
  pulumi.set(__self__, "auth_type", auth_type)
@@ -1215,7 +1166,7 @@ class SecretBackendConnectionMysql(dict):
1215
1166
  @pulumi.getter(name="authType")
1216
1167
  def auth_type(self) -> Optional[str]:
1217
1168
  """
1218
- Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
1169
+ Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
1219
1170
  """
1220
1171
  return pulumi.get(self, "auth_type")
1221
1172
 
@@ -1223,10 +1174,7 @@ class SecretBackendConnectionMysql(dict):
1223
1174
  @pulumi.getter(name="connectionUrl")
1224
1175
  def connection_url(self) -> Optional[str]:
1225
1176
  """
1226
- A URL containing connection information. See
1227
- the [Vault
1228
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
1229
- for an example.
1177
+ Connection string to use to connect to the database.
1230
1178
  """
1231
1179
  return pulumi.get(self, "connection_url")
1232
1180
 
@@ -1234,8 +1182,7 @@ class SecretBackendConnectionMysql(dict):
1234
1182
  @pulumi.getter(name="maxConnectionLifetime")
1235
1183
  def max_connection_lifetime(self) -> Optional[int]:
1236
1184
  """
1237
- The maximum number of seconds to keep
1238
- a connection alive for.
1185
+ Maximum number of seconds a connection may be reused.
1239
1186
  """
1240
1187
  return pulumi.get(self, "max_connection_lifetime")
1241
1188
 
@@ -1243,8 +1190,7 @@ class SecretBackendConnectionMysql(dict):
1243
1190
  @pulumi.getter(name="maxIdleConnections")
1244
1191
  def max_idle_connections(self) -> Optional[int]:
1245
1192
  """
1246
- The maximum number of idle connections to
1247
- maintain.
1193
+ Maximum number of idle connections to the database.
1248
1194
  """
1249
1195
  return pulumi.get(self, "max_idle_connections")
1250
1196
 
@@ -1252,8 +1198,7 @@ class SecretBackendConnectionMysql(dict):
1252
1198
  @pulumi.getter(name="maxOpenConnections")
1253
1199
  def max_open_connections(self) -> Optional[int]:
1254
1200
  """
1255
- The maximum number of open connections to
1256
- use.
1201
+ Maximum number of open connections to the database.
1257
1202
  """
1258
1203
  return pulumi.get(self, "max_open_connections")
1259
1204
 
@@ -1261,7 +1206,7 @@ class SecretBackendConnectionMysql(dict):
1261
1206
  @pulumi.getter
1262
1207
  def password(self) -> Optional[str]:
1263
1208
  """
1264
- The password to authenticate with.
1209
+ The root credential password used in the connection URL
1265
1210
  """
1266
1211
  return pulumi.get(self, "password")
1267
1212
 
@@ -1269,7 +1214,7 @@ class SecretBackendConnectionMysql(dict):
1269
1214
  @pulumi.getter(name="serviceAccountJson")
1270
1215
  def service_account_json(self) -> Optional[str]:
1271
1216
  """
1272
- JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
1217
+ A JSON encoded credential for use with IAM authorization
1273
1218
  """
1274
1219
  return pulumi.get(self, "service_account_json")
1275
1220
 
@@ -1293,7 +1238,7 @@ class SecretBackendConnectionMysql(dict):
1293
1238
  @pulumi.getter
1294
1239
  def username(self) -> Optional[str]:
1295
1240
  """
1296
- The username to authenticate with.
1241
+ The root credential username used in the connection URL
1297
1242
  """
1298
1243
  return pulumi.get(self, "username")
1299
1244
 
@@ -1301,7 +1246,7 @@ class SecretBackendConnectionMysql(dict):
1301
1246
  @pulumi.getter(name="usernameTemplate")
1302
1247
  def username_template(self) -> Optional[str]:
1303
1248
  """
1304
- Template describing how dynamic usernames are generated.
1249
+ Username generation template.
1305
1250
  """
1306
1251
  return pulumi.get(self, "username_template")
1307
1252
 
@@ -1354,23 +1299,17 @@ class SecretBackendConnectionMysqlAurora(dict):
1354
1299
  username: Optional[str] = None,
1355
1300
  username_template: Optional[str] = None):
1356
1301
  """
1357
- :param str auth_type: Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
1358
- :param str connection_url: A URL containing connection information. See
1359
- the [Vault
1360
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
1361
- for an example.
1362
- :param int max_connection_lifetime: The maximum number of seconds to keep
1363
- a connection alive for.
1364
- :param int max_idle_connections: The maximum number of idle connections to
1365
- maintain.
1366
- :param int max_open_connections: The maximum number of open connections to
1367
- use.
1368
- :param str password: The password to authenticate with.
1369
- :param str service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
1302
+ :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
1303
+ :param str connection_url: Connection string to use to connect to the database.
1304
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
1305
+ :param int max_idle_connections: Maximum number of idle connections to the database.
1306
+ :param int max_open_connections: Maximum number of open connections to the database.
1307
+ :param str password: The root credential password used in the connection URL
1308
+ :param str service_account_json: A JSON encoded credential for use with IAM authorization
1370
1309
  :param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
1371
1310
  :param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
1372
- :param str username: The username to authenticate with.
1373
- :param str username_template: Template describing how dynamic usernames are generated.
1311
+ :param str username: The root credential username used in the connection URL
1312
+ :param str username_template: Username generation template.
1374
1313
  """
1375
1314
  if auth_type is not None:
1376
1315
  pulumi.set(__self__, "auth_type", auth_type)
@@ -1399,7 +1338,7 @@ class SecretBackendConnectionMysqlAurora(dict):
1399
1338
  @pulumi.getter(name="authType")
1400
1339
  def auth_type(self) -> Optional[str]:
1401
1340
  """
1402
- Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
1341
+ Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
1403
1342
  """
1404
1343
  return pulumi.get(self, "auth_type")
1405
1344
 
@@ -1407,10 +1346,7 @@ class SecretBackendConnectionMysqlAurora(dict):
1407
1346
  @pulumi.getter(name="connectionUrl")
1408
1347
  def connection_url(self) -> Optional[str]:
1409
1348
  """
1410
- A URL containing connection information. See
1411
- the [Vault
1412
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
1413
- for an example.
1349
+ Connection string to use to connect to the database.
1414
1350
  """
1415
1351
  return pulumi.get(self, "connection_url")
1416
1352
 
@@ -1418,8 +1354,7 @@ class SecretBackendConnectionMysqlAurora(dict):
1418
1354
  @pulumi.getter(name="maxConnectionLifetime")
1419
1355
  def max_connection_lifetime(self) -> Optional[int]:
1420
1356
  """
1421
- The maximum number of seconds to keep
1422
- a connection alive for.
1357
+ Maximum number of seconds a connection may be reused.
1423
1358
  """
1424
1359
  return pulumi.get(self, "max_connection_lifetime")
1425
1360
 
@@ -1427,8 +1362,7 @@ class SecretBackendConnectionMysqlAurora(dict):
1427
1362
  @pulumi.getter(name="maxIdleConnections")
1428
1363
  def max_idle_connections(self) -> Optional[int]:
1429
1364
  """
1430
- The maximum number of idle connections to
1431
- maintain.
1365
+ Maximum number of idle connections to the database.
1432
1366
  """
1433
1367
  return pulumi.get(self, "max_idle_connections")
1434
1368
 
@@ -1436,8 +1370,7 @@ class SecretBackendConnectionMysqlAurora(dict):
1436
1370
  @pulumi.getter(name="maxOpenConnections")
1437
1371
  def max_open_connections(self) -> Optional[int]:
1438
1372
  """
1439
- The maximum number of open connections to
1440
- use.
1373
+ Maximum number of open connections to the database.
1441
1374
  """
1442
1375
  return pulumi.get(self, "max_open_connections")
1443
1376
 
@@ -1445,7 +1378,7 @@ class SecretBackendConnectionMysqlAurora(dict):
1445
1378
  @pulumi.getter
1446
1379
  def password(self) -> Optional[str]:
1447
1380
  """
1448
- The password to authenticate with.
1381
+ The root credential password used in the connection URL
1449
1382
  """
1450
1383
  return pulumi.get(self, "password")
1451
1384
 
@@ -1453,7 +1386,7 @@ class SecretBackendConnectionMysqlAurora(dict):
1453
1386
  @pulumi.getter(name="serviceAccountJson")
1454
1387
  def service_account_json(self) -> Optional[str]:
1455
1388
  """
1456
- JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
1389
+ A JSON encoded credential for use with IAM authorization
1457
1390
  """
1458
1391
  return pulumi.get(self, "service_account_json")
1459
1392
 
@@ -1477,7 +1410,7 @@ class SecretBackendConnectionMysqlAurora(dict):
1477
1410
  @pulumi.getter
1478
1411
  def username(self) -> Optional[str]:
1479
1412
  """
1480
- The username to authenticate with.
1413
+ The root credential username used in the connection URL
1481
1414
  """
1482
1415
  return pulumi.get(self, "username")
1483
1416
 
@@ -1485,7 +1418,7 @@ class SecretBackendConnectionMysqlAurora(dict):
1485
1418
  @pulumi.getter(name="usernameTemplate")
1486
1419
  def username_template(self) -> Optional[str]:
1487
1420
  """
1488
- Template describing how dynamic usernames are generated.
1421
+ Username generation template.
1489
1422
  """
1490
1423
  return pulumi.get(self, "username_template")
1491
1424
 
@@ -1538,23 +1471,17 @@ class SecretBackendConnectionMysqlLegacy(dict):
1538
1471
  username: Optional[str] = None,
1539
1472
  username_template: Optional[str] = None):
1540
1473
  """
1541
- :param str auth_type: Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
1542
- :param str connection_url: A URL containing connection information. See
1543
- the [Vault
1544
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
1545
- for an example.
1546
- :param int max_connection_lifetime: The maximum number of seconds to keep
1547
- a connection alive for.
1548
- :param int max_idle_connections: The maximum number of idle connections to
1549
- maintain.
1550
- :param int max_open_connections: The maximum number of open connections to
1551
- use.
1552
- :param str password: The password to authenticate with.
1553
- :param str service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
1474
+ :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
1475
+ :param str connection_url: Connection string to use to connect to the database.
1476
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
1477
+ :param int max_idle_connections: Maximum number of idle connections to the database.
1478
+ :param int max_open_connections: Maximum number of open connections to the database.
1479
+ :param str password: The root credential password used in the connection URL
1480
+ :param str service_account_json: A JSON encoded credential for use with IAM authorization
1554
1481
  :param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
1555
1482
  :param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
1556
- :param str username: The username to authenticate with.
1557
- :param str username_template: Template describing how dynamic usernames are generated.
1483
+ :param str username: The root credential username used in the connection URL
1484
+ :param str username_template: Username generation template.
1558
1485
  """
1559
1486
  if auth_type is not None:
1560
1487
  pulumi.set(__self__, "auth_type", auth_type)
@@ -1583,7 +1510,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
1583
1510
  @pulumi.getter(name="authType")
1584
1511
  def auth_type(self) -> Optional[str]:
1585
1512
  """
1586
- Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
1513
+ Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
1587
1514
  """
1588
1515
  return pulumi.get(self, "auth_type")
1589
1516
 
@@ -1591,10 +1518,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
1591
1518
  @pulumi.getter(name="connectionUrl")
1592
1519
  def connection_url(self) -> Optional[str]:
1593
1520
  """
1594
- A URL containing connection information. See
1595
- the [Vault
1596
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
1597
- for an example.
1521
+ Connection string to use to connect to the database.
1598
1522
  """
1599
1523
  return pulumi.get(self, "connection_url")
1600
1524
 
@@ -1602,8 +1526,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
1602
1526
  @pulumi.getter(name="maxConnectionLifetime")
1603
1527
  def max_connection_lifetime(self) -> Optional[int]:
1604
1528
  """
1605
- The maximum number of seconds to keep
1606
- a connection alive for.
1529
+ Maximum number of seconds a connection may be reused.
1607
1530
  """
1608
1531
  return pulumi.get(self, "max_connection_lifetime")
1609
1532
 
@@ -1611,8 +1534,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
1611
1534
  @pulumi.getter(name="maxIdleConnections")
1612
1535
  def max_idle_connections(self) -> Optional[int]:
1613
1536
  """
1614
- The maximum number of idle connections to
1615
- maintain.
1537
+ Maximum number of idle connections to the database.
1616
1538
  """
1617
1539
  return pulumi.get(self, "max_idle_connections")
1618
1540
 
@@ -1620,8 +1542,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
1620
1542
  @pulumi.getter(name="maxOpenConnections")
1621
1543
  def max_open_connections(self) -> Optional[int]:
1622
1544
  """
1623
- The maximum number of open connections to
1624
- use.
1545
+ Maximum number of open connections to the database.
1625
1546
  """
1626
1547
  return pulumi.get(self, "max_open_connections")
1627
1548
 
@@ -1629,7 +1550,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
1629
1550
  @pulumi.getter
1630
1551
  def password(self) -> Optional[str]:
1631
1552
  """
1632
- The password to authenticate with.
1553
+ The root credential password used in the connection URL
1633
1554
  """
1634
1555
  return pulumi.get(self, "password")
1635
1556
 
@@ -1637,7 +1558,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
1637
1558
  @pulumi.getter(name="serviceAccountJson")
1638
1559
  def service_account_json(self) -> Optional[str]:
1639
1560
  """
1640
- JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
1561
+ A JSON encoded credential for use with IAM authorization
1641
1562
  """
1642
1563
  return pulumi.get(self, "service_account_json")
1643
1564
 
@@ -1661,7 +1582,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
1661
1582
  @pulumi.getter
1662
1583
  def username(self) -> Optional[str]:
1663
1584
  """
1664
- The username to authenticate with.
1585
+ The root credential username used in the connection URL
1665
1586
  """
1666
1587
  return pulumi.get(self, "username")
1667
1588
 
@@ -1669,7 +1590,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
1669
1590
  @pulumi.getter(name="usernameTemplate")
1670
1591
  def username_template(self) -> Optional[str]:
1671
1592
  """
1672
- Template describing how dynamic usernames are generated.
1593
+ Username generation template.
1673
1594
  """
1674
1595
  return pulumi.get(self, "username_template")
1675
1596
 
@@ -1722,23 +1643,17 @@ class SecretBackendConnectionMysqlRds(dict):
1722
1643
  username: Optional[str] = None,
1723
1644
  username_template: Optional[str] = None):
1724
1645
  """
1725
- :param str auth_type: Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
1726
- :param str connection_url: A URL containing connection information. See
1727
- the [Vault
1728
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
1729
- for an example.
1730
- :param int max_connection_lifetime: The maximum number of seconds to keep
1731
- a connection alive for.
1732
- :param int max_idle_connections: The maximum number of idle connections to
1733
- maintain.
1734
- :param int max_open_connections: The maximum number of open connections to
1735
- use.
1736
- :param str password: The password to authenticate with.
1737
- :param str service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
1646
+ :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
1647
+ :param str connection_url: Connection string to use to connect to the database.
1648
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
1649
+ :param int max_idle_connections: Maximum number of idle connections to the database.
1650
+ :param int max_open_connections: Maximum number of open connections to the database.
1651
+ :param str password: The root credential password used in the connection URL
1652
+ :param str service_account_json: A JSON encoded credential for use with IAM authorization
1738
1653
  :param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
1739
1654
  :param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
1740
- :param str username: The username to authenticate with.
1741
- :param str username_template: Template describing how dynamic usernames are generated.
1655
+ :param str username: The root credential username used in the connection URL
1656
+ :param str username_template: Username generation template.
1742
1657
  """
1743
1658
  if auth_type is not None:
1744
1659
  pulumi.set(__self__, "auth_type", auth_type)
@@ -1767,7 +1682,7 @@ class SecretBackendConnectionMysqlRds(dict):
1767
1682
  @pulumi.getter(name="authType")
1768
1683
  def auth_type(self) -> Optional[str]:
1769
1684
  """
1770
- Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
1685
+ Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
1771
1686
  """
1772
1687
  return pulumi.get(self, "auth_type")
1773
1688
 
@@ -1775,10 +1690,7 @@ class SecretBackendConnectionMysqlRds(dict):
1775
1690
  @pulumi.getter(name="connectionUrl")
1776
1691
  def connection_url(self) -> Optional[str]:
1777
1692
  """
1778
- A URL containing connection information. See
1779
- the [Vault
1780
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
1781
- for an example.
1693
+ Connection string to use to connect to the database.
1782
1694
  """
1783
1695
  return pulumi.get(self, "connection_url")
1784
1696
 
@@ -1786,8 +1698,7 @@ class SecretBackendConnectionMysqlRds(dict):
1786
1698
  @pulumi.getter(name="maxConnectionLifetime")
1787
1699
  def max_connection_lifetime(self) -> Optional[int]:
1788
1700
  """
1789
- The maximum number of seconds to keep
1790
- a connection alive for.
1701
+ Maximum number of seconds a connection may be reused.
1791
1702
  """
1792
1703
  return pulumi.get(self, "max_connection_lifetime")
1793
1704
 
@@ -1795,8 +1706,7 @@ class SecretBackendConnectionMysqlRds(dict):
1795
1706
  @pulumi.getter(name="maxIdleConnections")
1796
1707
  def max_idle_connections(self) -> Optional[int]:
1797
1708
  """
1798
- The maximum number of idle connections to
1799
- maintain.
1709
+ Maximum number of idle connections to the database.
1800
1710
  """
1801
1711
  return pulumi.get(self, "max_idle_connections")
1802
1712
 
@@ -1804,8 +1714,7 @@ class SecretBackendConnectionMysqlRds(dict):
1804
1714
  @pulumi.getter(name="maxOpenConnections")
1805
1715
  def max_open_connections(self) -> Optional[int]:
1806
1716
  """
1807
- The maximum number of open connections to
1808
- use.
1717
+ Maximum number of open connections to the database.
1809
1718
  """
1810
1719
  return pulumi.get(self, "max_open_connections")
1811
1720
 
@@ -1813,7 +1722,7 @@ class SecretBackendConnectionMysqlRds(dict):
1813
1722
  @pulumi.getter
1814
1723
  def password(self) -> Optional[str]:
1815
1724
  """
1816
- The password to authenticate with.
1725
+ The root credential password used in the connection URL
1817
1726
  """
1818
1727
  return pulumi.get(self, "password")
1819
1728
 
@@ -1821,7 +1730,7 @@ class SecretBackendConnectionMysqlRds(dict):
1821
1730
  @pulumi.getter(name="serviceAccountJson")
1822
1731
  def service_account_json(self) -> Optional[str]:
1823
1732
  """
1824
- JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
1733
+ A JSON encoded credential for use with IAM authorization
1825
1734
  """
1826
1735
  return pulumi.get(self, "service_account_json")
1827
1736
 
@@ -1845,7 +1754,7 @@ class SecretBackendConnectionMysqlRds(dict):
1845
1754
  @pulumi.getter
1846
1755
  def username(self) -> Optional[str]:
1847
1756
  """
1848
- The username to authenticate with.
1757
+ The root credential username used in the connection URL
1849
1758
  """
1850
1759
  return pulumi.get(self, "username")
1851
1760
 
@@ -1853,7 +1762,7 @@ class SecretBackendConnectionMysqlRds(dict):
1853
1762
  @pulumi.getter(name="usernameTemplate")
1854
1763
  def username_template(self) -> Optional[str]:
1855
1764
  """
1856
- Template describing how dynamic usernames are generated.
1765
+ Username generation template.
1857
1766
  """
1858
1767
  return pulumi.get(self, "username_template")
1859
1768
 
@@ -1900,21 +1809,15 @@ class SecretBackendConnectionOracle(dict):
1900
1809
  username: Optional[str] = None,
1901
1810
  username_template: Optional[str] = None):
1902
1811
  """
1903
- :param str connection_url: A URL containing connection information. See
1904
- the [Vault
1905
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
1906
- for an example.
1907
- :param bool disconnect_sessions: Enable the built-in session disconnect mechanism.
1908
- :param int max_connection_lifetime: The maximum number of seconds to keep
1909
- a connection alive for.
1910
- :param int max_idle_connections: The maximum number of idle connections to
1911
- maintain.
1912
- :param int max_open_connections: The maximum number of open connections to
1913
- use.
1914
- :param str password: The password to authenticate with.
1915
- :param bool split_statements: Enable spliting statements after semi-colons.
1916
- :param str username: The username to authenticate with.
1917
- :param str username_template: Template describing how dynamic usernames are generated.
1812
+ :param str connection_url: Connection string to use to connect to the database.
1813
+ :param bool disconnect_sessions: Set to true to disconnect any open sessions prior to running the revocation statements.
1814
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
1815
+ :param int max_idle_connections: Maximum number of idle connections to the database.
1816
+ :param int max_open_connections: Maximum number of open connections to the database.
1817
+ :param str password: The root credential password used in the connection URL
1818
+ :param bool split_statements: Set to true in order to split statements after semi-colons.
1819
+ :param str username: The root credential username used in the connection URL
1820
+ :param str username_template: Username generation template.
1918
1821
  """
1919
1822
  if connection_url is not None:
1920
1823
  pulumi.set(__self__, "connection_url", connection_url)
@@ -1939,10 +1842,7 @@ class SecretBackendConnectionOracle(dict):
1939
1842
  @pulumi.getter(name="connectionUrl")
1940
1843
  def connection_url(self) -> Optional[str]:
1941
1844
  """
1942
- A URL containing connection information. See
1943
- the [Vault
1944
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
1945
- for an example.
1845
+ Connection string to use to connect to the database.
1946
1846
  """
1947
1847
  return pulumi.get(self, "connection_url")
1948
1848
 
@@ -1950,7 +1850,7 @@ class SecretBackendConnectionOracle(dict):
1950
1850
  @pulumi.getter(name="disconnectSessions")
1951
1851
  def disconnect_sessions(self) -> Optional[bool]:
1952
1852
  """
1953
- Enable the built-in session disconnect mechanism.
1853
+ Set to true to disconnect any open sessions prior to running the revocation statements.
1954
1854
  """
1955
1855
  return pulumi.get(self, "disconnect_sessions")
1956
1856
 
@@ -1958,8 +1858,7 @@ class SecretBackendConnectionOracle(dict):
1958
1858
  @pulumi.getter(name="maxConnectionLifetime")
1959
1859
  def max_connection_lifetime(self) -> Optional[int]:
1960
1860
  """
1961
- The maximum number of seconds to keep
1962
- a connection alive for.
1861
+ Maximum number of seconds a connection may be reused.
1963
1862
  """
1964
1863
  return pulumi.get(self, "max_connection_lifetime")
1965
1864
 
@@ -1967,8 +1866,7 @@ class SecretBackendConnectionOracle(dict):
1967
1866
  @pulumi.getter(name="maxIdleConnections")
1968
1867
  def max_idle_connections(self) -> Optional[int]:
1969
1868
  """
1970
- The maximum number of idle connections to
1971
- maintain.
1869
+ Maximum number of idle connections to the database.
1972
1870
  """
1973
1871
  return pulumi.get(self, "max_idle_connections")
1974
1872
 
@@ -1976,8 +1874,7 @@ class SecretBackendConnectionOracle(dict):
1976
1874
  @pulumi.getter(name="maxOpenConnections")
1977
1875
  def max_open_connections(self) -> Optional[int]:
1978
1876
  """
1979
- The maximum number of open connections to
1980
- use.
1877
+ Maximum number of open connections to the database.
1981
1878
  """
1982
1879
  return pulumi.get(self, "max_open_connections")
1983
1880
 
@@ -1985,7 +1882,7 @@ class SecretBackendConnectionOracle(dict):
1985
1882
  @pulumi.getter
1986
1883
  def password(self) -> Optional[str]:
1987
1884
  """
1988
- The password to authenticate with.
1885
+ The root credential password used in the connection URL
1989
1886
  """
1990
1887
  return pulumi.get(self, "password")
1991
1888
 
@@ -1993,7 +1890,7 @@ class SecretBackendConnectionOracle(dict):
1993
1890
  @pulumi.getter(name="splitStatements")
1994
1891
  def split_statements(self) -> Optional[bool]:
1995
1892
  """
1996
- Enable spliting statements after semi-colons.
1893
+ Set to true in order to split statements after semi-colons.
1997
1894
  """
1998
1895
  return pulumi.get(self, "split_statements")
1999
1896
 
@@ -2001,7 +1898,7 @@ class SecretBackendConnectionOracle(dict):
2001
1898
  @pulumi.getter
2002
1899
  def username(self) -> Optional[str]:
2003
1900
  """
2004
- The username to authenticate with.
1901
+ The root credential username used in the connection URL
2005
1902
  """
2006
1903
  return pulumi.get(self, "username")
2007
1904
 
@@ -2009,7 +1906,7 @@ class SecretBackendConnectionOracle(dict):
2009
1906
  @pulumi.getter(name="usernameTemplate")
2010
1907
  def username_template(self) -> Optional[str]:
2011
1908
  """
2012
- Template describing how dynamic usernames are generated.
1909
+ Username generation template.
2013
1910
  """
2014
1911
  return pulumi.get(self, "username_template")
2015
1912
 
@@ -2031,8 +1928,16 @@ class SecretBackendConnectionPostgresql(dict):
2031
1928
  suggest = "max_idle_connections"
2032
1929
  elif key == "maxOpenConnections":
2033
1930
  suggest = "max_open_connections"
1931
+ elif key == "privateKey":
1932
+ suggest = "private_key"
1933
+ elif key == "selfManaged":
1934
+ suggest = "self_managed"
2034
1935
  elif key == "serviceAccountJson":
2035
1936
  suggest = "service_account_json"
1937
+ elif key == "tlsCa":
1938
+ suggest = "tls_ca"
1939
+ elif key == "tlsCertificate":
1940
+ suggest = "tls_certificate"
2036
1941
  elif key == "usernameTemplate":
2037
1942
  suggest = "username_template"
2038
1943
 
@@ -2055,26 +1960,28 @@ class SecretBackendConnectionPostgresql(dict):
2055
1960
  max_idle_connections: Optional[int] = None,
2056
1961
  max_open_connections: Optional[int] = None,
2057
1962
  password: Optional[str] = None,
1963
+ private_key: Optional[str] = None,
1964
+ self_managed: Optional[bool] = None,
2058
1965
  service_account_json: Optional[str] = None,
1966
+ tls_ca: Optional[str] = None,
1967
+ tls_certificate: Optional[str] = None,
2059
1968
  username: Optional[str] = None,
2060
1969
  username_template: Optional[str] = None):
2061
1970
  """
2062
- :param str auth_type: Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
2063
- :param str connection_url: A URL containing connection information. See
2064
- the [Vault
2065
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
2066
- for an example.
2067
- :param bool disable_escaping: Disable special character escaping in username and password.
2068
- :param int max_connection_lifetime: The maximum number of seconds to keep
2069
- a connection alive for.
2070
- :param int max_idle_connections: The maximum number of idle connections to
2071
- maintain.
2072
- :param int max_open_connections: The maximum number of open connections to
2073
- use.
2074
- :param str password: The password to authenticate with.
2075
- :param str service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
2076
- :param str username: The username to authenticate with.
2077
- :param str username_template: Template describing how dynamic usernames are generated.
1971
+ :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
1972
+ :param str connection_url: Connection string to use to connect to the database.
1973
+ :param bool disable_escaping: Disable special character escaping in username and password
1974
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
1975
+ :param int max_idle_connections: Maximum number of idle connections to the database.
1976
+ :param int max_open_connections: Maximum number of open connections to the database.
1977
+ :param str password: The root credential password used in the connection URL
1978
+ :param str private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
1979
+ :param bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
1980
+ :param str service_account_json: A JSON encoded credential for use with IAM authorization
1981
+ :param str tls_ca: The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
1982
+ :param str tls_certificate: The x509 client certificate for connecting to the database. Must be PEM encoded.
1983
+ :param str username: The root credential username used in the connection URL
1984
+ :param str username_template: Username generation template.
2078
1985
  """
2079
1986
  if auth_type is not None:
2080
1987
  pulumi.set(__self__, "auth_type", auth_type)
@@ -2090,8 +1997,16 @@ class SecretBackendConnectionPostgresql(dict):
2090
1997
  pulumi.set(__self__, "max_open_connections", max_open_connections)
2091
1998
  if password is not None:
2092
1999
  pulumi.set(__self__, "password", password)
2000
+ if private_key is not None:
2001
+ pulumi.set(__self__, "private_key", private_key)
2002
+ if self_managed is not None:
2003
+ pulumi.set(__self__, "self_managed", self_managed)
2093
2004
  if service_account_json is not None:
2094
2005
  pulumi.set(__self__, "service_account_json", service_account_json)
2006
+ if tls_ca is not None:
2007
+ pulumi.set(__self__, "tls_ca", tls_ca)
2008
+ if tls_certificate is not None:
2009
+ pulumi.set(__self__, "tls_certificate", tls_certificate)
2095
2010
  if username is not None:
2096
2011
  pulumi.set(__self__, "username", username)
2097
2012
  if username_template is not None:
@@ -2101,7 +2016,7 @@ class SecretBackendConnectionPostgresql(dict):
2101
2016
  @pulumi.getter(name="authType")
2102
2017
  def auth_type(self) -> Optional[str]:
2103
2018
  """
2104
- Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
2019
+ Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
2105
2020
  """
2106
2021
  return pulumi.get(self, "auth_type")
2107
2022
 
@@ -2109,10 +2024,7 @@ class SecretBackendConnectionPostgresql(dict):
2109
2024
  @pulumi.getter(name="connectionUrl")
2110
2025
  def connection_url(self) -> Optional[str]:
2111
2026
  """
2112
- A URL containing connection information. See
2113
- the [Vault
2114
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
2115
- for an example.
2027
+ Connection string to use to connect to the database.
2116
2028
  """
2117
2029
  return pulumi.get(self, "connection_url")
2118
2030
 
@@ -2120,7 +2032,7 @@ class SecretBackendConnectionPostgresql(dict):
2120
2032
  @pulumi.getter(name="disableEscaping")
2121
2033
  def disable_escaping(self) -> Optional[bool]:
2122
2034
  """
2123
- Disable special character escaping in username and password.
2035
+ Disable special character escaping in username and password
2124
2036
  """
2125
2037
  return pulumi.get(self, "disable_escaping")
2126
2038
 
@@ -2128,8 +2040,7 @@ class SecretBackendConnectionPostgresql(dict):
2128
2040
  @pulumi.getter(name="maxConnectionLifetime")
2129
2041
  def max_connection_lifetime(self) -> Optional[int]:
2130
2042
  """
2131
- The maximum number of seconds to keep
2132
- a connection alive for.
2043
+ Maximum number of seconds a connection may be reused.
2133
2044
  """
2134
2045
  return pulumi.get(self, "max_connection_lifetime")
2135
2046
 
@@ -2137,8 +2048,7 @@ class SecretBackendConnectionPostgresql(dict):
2137
2048
  @pulumi.getter(name="maxIdleConnections")
2138
2049
  def max_idle_connections(self) -> Optional[int]:
2139
2050
  """
2140
- The maximum number of idle connections to
2141
- maintain.
2051
+ Maximum number of idle connections to the database.
2142
2052
  """
2143
2053
  return pulumi.get(self, "max_idle_connections")
2144
2054
 
@@ -2146,8 +2056,7 @@ class SecretBackendConnectionPostgresql(dict):
2146
2056
  @pulumi.getter(name="maxOpenConnections")
2147
2057
  def max_open_connections(self) -> Optional[int]:
2148
2058
  """
2149
- The maximum number of open connections to
2150
- use.
2059
+ Maximum number of open connections to the database.
2151
2060
  """
2152
2061
  return pulumi.get(self, "max_open_connections")
2153
2062
 
@@ -2155,23 +2064,55 @@ class SecretBackendConnectionPostgresql(dict):
2155
2064
  @pulumi.getter
2156
2065
  def password(self) -> Optional[str]:
2157
2066
  """
2158
- The password to authenticate with.
2067
+ The root credential password used in the connection URL
2159
2068
  """
2160
2069
  return pulumi.get(self, "password")
2161
2070
 
2071
+ @property
2072
+ @pulumi.getter(name="privateKey")
2073
+ def private_key(self) -> Optional[str]:
2074
+ """
2075
+ The secret key used for the x509 client certificate. Must be PEM encoded.
2076
+ """
2077
+ return pulumi.get(self, "private_key")
2078
+
2079
+ @property
2080
+ @pulumi.getter(name="selfManaged")
2081
+ def self_managed(self) -> Optional[bool]:
2082
+ """
2083
+ If set, allows onboarding static roles with a rootless connection configuration.
2084
+ """
2085
+ return pulumi.get(self, "self_managed")
2086
+
2162
2087
  @property
2163
2088
  @pulumi.getter(name="serviceAccountJson")
2164
2089
  def service_account_json(self) -> Optional[str]:
2165
2090
  """
2166
- JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
2091
+ A JSON encoded credential for use with IAM authorization
2167
2092
  """
2168
2093
  return pulumi.get(self, "service_account_json")
2169
2094
 
2095
+ @property
2096
+ @pulumi.getter(name="tlsCa")
2097
+ def tls_ca(self) -> Optional[str]:
2098
+ """
2099
+ The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
2100
+ """
2101
+ return pulumi.get(self, "tls_ca")
2102
+
2103
+ @property
2104
+ @pulumi.getter(name="tlsCertificate")
2105
+ def tls_certificate(self) -> Optional[str]:
2106
+ """
2107
+ The x509 client certificate for connecting to the database. Must be PEM encoded.
2108
+ """
2109
+ return pulumi.get(self, "tls_certificate")
2110
+
2170
2111
  @property
2171
2112
  @pulumi.getter
2172
2113
  def username(self) -> Optional[str]:
2173
2114
  """
2174
- The username to authenticate with.
2115
+ The root credential username used in the connection URL
2175
2116
  """
2176
2117
  return pulumi.get(self, "username")
2177
2118
 
@@ -2179,7 +2120,7 @@ class SecretBackendConnectionPostgresql(dict):
2179
2120
  @pulumi.getter(name="usernameTemplate")
2180
2121
  def username_template(self) -> Optional[str]:
2181
2122
  """
2182
- Template describing how dynamic usernames are generated.
2123
+ Username generation template.
2183
2124
  """
2184
2125
  return pulumi.get(self, "username_template")
2185
2126
 
@@ -2214,15 +2155,13 @@ class SecretBackendConnectionRedis(dict):
2214
2155
  port: Optional[int] = None,
2215
2156
  tls: Optional[bool] = None):
2216
2157
  """
2217
- :param str host: The host to connect to.
2218
- :param str password: The password to authenticate with.
2219
- :param str username: The username to authenticate with.
2220
- :param str ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
2221
- :param bool insecure_tls: Whether to skip verification of the server
2222
- certificate when using TLS.
2223
- :param int port: The default port to connect to if no port is specified as
2224
- part of the host.
2225
- :param bool tls: Whether to use TLS when connecting to Cassandra.
2158
+ :param str host: Specifies the host to connect to
2159
+ :param str password: Specifies the password corresponding to the given username.
2160
+ :param str username: Specifies the username for Vault to use.
2161
+ :param str ca_cert: The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
2162
+ :param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
2163
+ :param int port: The transport port to use to connect to Redis.
2164
+ :param bool tls: Specifies whether to use TLS when connecting to Redis.
2226
2165
  """
2227
2166
  pulumi.set(__self__, "host", host)
2228
2167
  pulumi.set(__self__, "password", password)
@@ -2240,7 +2179,7 @@ class SecretBackendConnectionRedis(dict):
2240
2179
  @pulumi.getter
2241
2180
  def host(self) -> str:
2242
2181
  """
2243
- The host to connect to.
2182
+ Specifies the host to connect to
2244
2183
  """
2245
2184
  return pulumi.get(self, "host")
2246
2185
 
@@ -2248,7 +2187,7 @@ class SecretBackendConnectionRedis(dict):
2248
2187
  @pulumi.getter
2249
2188
  def password(self) -> str:
2250
2189
  """
2251
- The password to authenticate with.
2190
+ Specifies the password corresponding to the given username.
2252
2191
  """
2253
2192
  return pulumi.get(self, "password")
2254
2193
 
@@ -2256,7 +2195,7 @@ class SecretBackendConnectionRedis(dict):
2256
2195
  @pulumi.getter
2257
2196
  def username(self) -> str:
2258
2197
  """
2259
- The username to authenticate with.
2198
+ Specifies the username for Vault to use.
2260
2199
  """
2261
2200
  return pulumi.get(self, "username")
2262
2201
 
@@ -2264,7 +2203,7 @@ class SecretBackendConnectionRedis(dict):
2264
2203
  @pulumi.getter(name="caCert")
2265
2204
  def ca_cert(self) -> Optional[str]:
2266
2205
  """
2267
- The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
2206
+ The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
2268
2207
  """
2269
2208
  return pulumi.get(self, "ca_cert")
2270
2209
 
@@ -2272,8 +2211,7 @@ class SecretBackendConnectionRedis(dict):
2272
2211
  @pulumi.getter(name="insecureTls")
2273
2212
  def insecure_tls(self) -> Optional[bool]:
2274
2213
  """
2275
- Whether to skip verification of the server
2276
- certificate when using TLS.
2214
+ Specifies whether to skip verification of the server certificate when using TLS.
2277
2215
  """
2278
2216
  return pulumi.get(self, "insecure_tls")
2279
2217
 
@@ -2281,8 +2219,7 @@ class SecretBackendConnectionRedis(dict):
2281
2219
  @pulumi.getter
2282
2220
  def port(self) -> Optional[int]:
2283
2221
  """
2284
- The default port to connect to if no port is specified as
2285
- part of the host.
2222
+ The transport port to use to connect to Redis.
2286
2223
  """
2287
2224
  return pulumi.get(self, "port")
2288
2225
 
@@ -2290,7 +2227,7 @@ class SecretBackendConnectionRedis(dict):
2290
2227
  @pulumi.getter
2291
2228
  def tls(self) -> Optional[bool]:
2292
2229
  """
2293
- Whether to use TLS when connecting to Cassandra.
2230
+ Specifies whether to use TLS when connecting to Redis.
2294
2231
  """
2295
2232
  return pulumi.get(self, "tls")
2296
2233
 
@@ -2303,11 +2240,10 @@ class SecretBackendConnectionRedisElasticache(dict):
2303
2240
  region: Optional[str] = None,
2304
2241
  username: Optional[str] = None):
2305
2242
  """
2306
- :param str url: The URL for Elasticsearch's API. https requires certificate
2307
- by trusted CA if used.
2308
- :param str password: The password to authenticate with.
2309
- :param str region: The region where the ElastiCache cluster is hosted. If omitted Vault tries to infer from the environment instead.
2310
- :param str username: The username to authenticate with.
2243
+ :param str url: The configuration endpoint for the ElastiCache cluster to connect to.
2244
+ :param str password: The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
2245
+ :param str region: The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
2246
+ :param str username: The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
2311
2247
  """
2312
2248
  pulumi.set(__self__, "url", url)
2313
2249
  if password is not None:
@@ -2321,8 +2257,7 @@ class SecretBackendConnectionRedisElasticache(dict):
2321
2257
  @pulumi.getter
2322
2258
  def url(self) -> str:
2323
2259
  """
2324
- The URL for Elasticsearch's API. https requires certificate
2325
- by trusted CA if used.
2260
+ The configuration endpoint for the ElastiCache cluster to connect to.
2326
2261
  """
2327
2262
  return pulumi.get(self, "url")
2328
2263
 
@@ -2330,7 +2265,7 @@ class SecretBackendConnectionRedisElasticache(dict):
2330
2265
  @pulumi.getter
2331
2266
  def password(self) -> Optional[str]:
2332
2267
  """
2333
- The password to authenticate with.
2268
+ The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
2334
2269
  """
2335
2270
  return pulumi.get(self, "password")
2336
2271
 
@@ -2338,7 +2273,7 @@ class SecretBackendConnectionRedisElasticache(dict):
2338
2273
  @pulumi.getter
2339
2274
  def region(self) -> Optional[str]:
2340
2275
  """
2341
- The region where the ElastiCache cluster is hosted. If omitted Vault tries to infer from the environment instead.
2276
+ The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
2342
2277
  """
2343
2278
  return pulumi.get(self, "region")
2344
2279
 
@@ -2346,7 +2281,7 @@ class SecretBackendConnectionRedisElasticache(dict):
2346
2281
  @pulumi.getter
2347
2282
  def username(self) -> Optional[str]:
2348
2283
  """
2349
- The username to authenticate with.
2284
+ The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
2350
2285
  """
2351
2286
  return pulumi.get(self, "username")
2352
2287
 
@@ -2390,20 +2325,14 @@ class SecretBackendConnectionRedshift(dict):
2390
2325
  username: Optional[str] = None,
2391
2326
  username_template: Optional[str] = None):
2392
2327
  """
2393
- :param str connection_url: A URL containing connection information. See
2394
- the [Vault
2395
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
2396
- for an example.
2397
- :param bool disable_escaping: Disable special character escaping in username and password.
2398
- :param int max_connection_lifetime: The maximum number of seconds to keep
2399
- a connection alive for.
2400
- :param int max_idle_connections: The maximum number of idle connections to
2401
- maintain.
2402
- :param int max_open_connections: The maximum number of open connections to
2403
- use.
2404
- :param str password: The password to authenticate with.
2405
- :param str username: The username to authenticate with.
2406
- :param str username_template: Template describing how dynamic usernames are generated.
2328
+ :param str connection_url: Connection string to use to connect to the database.
2329
+ :param bool disable_escaping: Disable special character escaping in username and password
2330
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
2331
+ :param int max_idle_connections: Maximum number of idle connections to the database.
2332
+ :param int max_open_connections: Maximum number of open connections to the database.
2333
+ :param str password: The root credential password used in the connection URL
2334
+ :param str username: The root credential username used in the connection URL
2335
+ :param str username_template: Username generation template.
2407
2336
  """
2408
2337
  if connection_url is not None:
2409
2338
  pulumi.set(__self__, "connection_url", connection_url)
@@ -2426,10 +2355,7 @@ class SecretBackendConnectionRedshift(dict):
2426
2355
  @pulumi.getter(name="connectionUrl")
2427
2356
  def connection_url(self) -> Optional[str]:
2428
2357
  """
2429
- A URL containing connection information. See
2430
- the [Vault
2431
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
2432
- for an example.
2358
+ Connection string to use to connect to the database.
2433
2359
  """
2434
2360
  return pulumi.get(self, "connection_url")
2435
2361
 
@@ -2437,7 +2363,7 @@ class SecretBackendConnectionRedshift(dict):
2437
2363
  @pulumi.getter(name="disableEscaping")
2438
2364
  def disable_escaping(self) -> Optional[bool]:
2439
2365
  """
2440
- Disable special character escaping in username and password.
2366
+ Disable special character escaping in username and password
2441
2367
  """
2442
2368
  return pulumi.get(self, "disable_escaping")
2443
2369
 
@@ -2445,8 +2371,7 @@ class SecretBackendConnectionRedshift(dict):
2445
2371
  @pulumi.getter(name="maxConnectionLifetime")
2446
2372
  def max_connection_lifetime(self) -> Optional[int]:
2447
2373
  """
2448
- The maximum number of seconds to keep
2449
- a connection alive for.
2374
+ Maximum number of seconds a connection may be reused.
2450
2375
  """
2451
2376
  return pulumi.get(self, "max_connection_lifetime")
2452
2377
 
@@ -2454,8 +2379,7 @@ class SecretBackendConnectionRedshift(dict):
2454
2379
  @pulumi.getter(name="maxIdleConnections")
2455
2380
  def max_idle_connections(self) -> Optional[int]:
2456
2381
  """
2457
- The maximum number of idle connections to
2458
- maintain.
2382
+ Maximum number of idle connections to the database.
2459
2383
  """
2460
2384
  return pulumi.get(self, "max_idle_connections")
2461
2385
 
@@ -2463,8 +2387,7 @@ class SecretBackendConnectionRedshift(dict):
2463
2387
  @pulumi.getter(name="maxOpenConnections")
2464
2388
  def max_open_connections(self) -> Optional[int]:
2465
2389
  """
2466
- The maximum number of open connections to
2467
- use.
2390
+ Maximum number of open connections to the database.
2468
2391
  """
2469
2392
  return pulumi.get(self, "max_open_connections")
2470
2393
 
@@ -2472,7 +2395,7 @@ class SecretBackendConnectionRedshift(dict):
2472
2395
  @pulumi.getter
2473
2396
  def password(self) -> Optional[str]:
2474
2397
  """
2475
- The password to authenticate with.
2398
+ The root credential password used in the connection URL
2476
2399
  """
2477
2400
  return pulumi.get(self, "password")
2478
2401
 
@@ -2480,7 +2403,7 @@ class SecretBackendConnectionRedshift(dict):
2480
2403
  @pulumi.getter
2481
2404
  def username(self) -> Optional[str]:
2482
2405
  """
2483
- The username to authenticate with.
2406
+ The root credential username used in the connection URL
2484
2407
  """
2485
2408
  return pulumi.get(self, "username")
2486
2409
 
@@ -2488,7 +2411,7 @@ class SecretBackendConnectionRedshift(dict):
2488
2411
  @pulumi.getter(name="usernameTemplate")
2489
2412
  def username_template(self) -> Optional[str]:
2490
2413
  """
2491
- Template describing how dynamic usernames are generated.
2414
+ Username generation template.
2492
2415
  """
2493
2416
  return pulumi.get(self, "username_template")
2494
2417
 
@@ -2529,19 +2452,13 @@ class SecretBackendConnectionSnowflake(dict):
2529
2452
  username: Optional[str] = None,
2530
2453
  username_template: Optional[str] = None):
2531
2454
  """
2532
- :param str connection_url: A URL containing connection information. See
2533
- the [Vault
2534
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
2535
- for an example.
2536
- :param int max_connection_lifetime: The maximum number of seconds to keep
2537
- a connection alive for.
2538
- :param int max_idle_connections: The maximum number of idle connections to
2539
- maintain.
2540
- :param int max_open_connections: The maximum number of open connections to
2541
- use.
2542
- :param str password: The password to authenticate with.
2543
- :param str username: The username to authenticate with.
2544
- :param str username_template: Template describing how dynamic usernames are generated.
2455
+ :param str connection_url: Connection string to use to connect to the database.
2456
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
2457
+ :param int max_idle_connections: Maximum number of idle connections to the database.
2458
+ :param int max_open_connections: Maximum number of open connections to the database.
2459
+ :param str password: The root credential password used in the connection URL
2460
+ :param str username: The root credential username used in the connection URL
2461
+ :param str username_template: Username generation template.
2545
2462
  """
2546
2463
  if connection_url is not None:
2547
2464
  pulumi.set(__self__, "connection_url", connection_url)
@@ -2562,10 +2479,7 @@ class SecretBackendConnectionSnowflake(dict):
2562
2479
  @pulumi.getter(name="connectionUrl")
2563
2480
  def connection_url(self) -> Optional[str]:
2564
2481
  """
2565
- A URL containing connection information. See
2566
- the [Vault
2567
- docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
2568
- for an example.
2482
+ Connection string to use to connect to the database.
2569
2483
  """
2570
2484
  return pulumi.get(self, "connection_url")
2571
2485
 
@@ -2573,8 +2487,7 @@ class SecretBackendConnectionSnowflake(dict):
2573
2487
  @pulumi.getter(name="maxConnectionLifetime")
2574
2488
  def max_connection_lifetime(self) -> Optional[int]:
2575
2489
  """
2576
- The maximum number of seconds to keep
2577
- a connection alive for.
2490
+ Maximum number of seconds a connection may be reused.
2578
2491
  """
2579
2492
  return pulumi.get(self, "max_connection_lifetime")
2580
2493
 
@@ -2582,8 +2495,7 @@ class SecretBackendConnectionSnowflake(dict):
2582
2495
  @pulumi.getter(name="maxIdleConnections")
2583
2496
  def max_idle_connections(self) -> Optional[int]:
2584
2497
  """
2585
- The maximum number of idle connections to
2586
- maintain.
2498
+ Maximum number of idle connections to the database.
2587
2499
  """
2588
2500
  return pulumi.get(self, "max_idle_connections")
2589
2501
 
@@ -2591,8 +2503,7 @@ class SecretBackendConnectionSnowflake(dict):
2591
2503
  @pulumi.getter(name="maxOpenConnections")
2592
2504
  def max_open_connections(self) -> Optional[int]:
2593
2505
  """
2594
- The maximum number of open connections to
2595
- use.
2506
+ Maximum number of open connections to the database.
2596
2507
  """
2597
2508
  return pulumi.get(self, "max_open_connections")
2598
2509
 
@@ -2600,7 +2511,7 @@ class SecretBackendConnectionSnowflake(dict):
2600
2511
  @pulumi.getter
2601
2512
  def password(self) -> Optional[str]:
2602
2513
  """
2603
- The password to authenticate with.
2514
+ The root credential password used in the connection URL
2604
2515
  """
2605
2516
  return pulumi.get(self, "password")
2606
2517
 
@@ -2608,7 +2519,7 @@ class SecretBackendConnectionSnowflake(dict):
2608
2519
  @pulumi.getter
2609
2520
  def username(self) -> Optional[str]:
2610
2521
  """
2611
- The username to authenticate with.
2522
+ The root credential username used in the connection URL
2612
2523
  """
2613
2524
  return pulumi.get(self, "username")
2614
2525
 
@@ -2616,7 +2527,7 @@ class SecretBackendConnectionSnowflake(dict):
2616
2527
  @pulumi.getter(name="usernameTemplate")
2617
2528
  def username_template(self) -> Optional[str]:
2618
2529
  """
2619
- Template describing how dynamic usernames are generated.
2530
+ Username generation template.
2620
2531
  """
2621
2532
  return pulumi.get(self, "username_template")
2622
2533
 
@@ -2642,6 +2553,8 @@ class SecretsMountCassandra(dict):
2642
2553
  suggest = "protocol_version"
2643
2554
  elif key == "rootRotationStatements":
2644
2555
  suggest = "root_rotation_statements"
2556
+ elif key == "skipVerification":
2557
+ suggest = "skip_verification"
2645
2558
  elif key == "verifyConnection":
2646
2559
  suggest = "verify_connection"
2647
2560
 
@@ -2660,7 +2573,7 @@ class SecretsMountCassandra(dict):
2660
2573
  name: str,
2661
2574
  allowed_roles: Optional[Sequence[str]] = None,
2662
2575
  connect_timeout: Optional[int] = None,
2663
- data: Optional[Mapping[str, Any]] = None,
2576
+ data: Optional[Mapping[str, str]] = None,
2664
2577
  hosts: Optional[Sequence[str]] = None,
2665
2578
  insecure_tls: Optional[bool] = None,
2666
2579
  password: Optional[str] = None,
@@ -2670,6 +2583,7 @@ class SecretsMountCassandra(dict):
2670
2583
  port: Optional[int] = None,
2671
2584
  protocol_version: Optional[int] = None,
2672
2585
  root_rotation_statements: Optional[Sequence[str]] = None,
2586
+ skip_verification: Optional[bool] = None,
2673
2587
  tls: Optional[bool] = None,
2674
2588
  username: Optional[str] = None,
2675
2589
  verify_connection: Optional[bool] = None):
@@ -2677,25 +2591,22 @@ class SecretsMountCassandra(dict):
2677
2591
  :param str name: Name of the database connection.
2678
2592
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
2679
2593
  connection.
2680
- :param int connect_timeout: The number of seconds to use as a connection
2681
- timeout.
2682
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2594
+ :param int connect_timeout: The number of seconds to use as a connection timeout.
2595
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2683
2596
 
2684
2597
  Supported list of database secrets engines that can be configured:
2685
- :param Sequence[str] hosts: The hosts to connect to.
2686
- :param bool insecure_tls: Whether to skip verification of the server
2687
- certificate when using TLS.
2688
- :param str password: The root credential password used in the connection URL.
2689
- :param str pem_bundle: Concatenated PEM blocks configuring the certificate
2690
- chain.
2691
- :param str pem_json: A JSON structure configuring the certificate chain.
2598
+ :param Sequence[str] hosts: Cassandra hosts to connect to.
2599
+ :param bool insecure_tls: Whether to skip verification of the server certificate when using TLS.
2600
+ :param str password: The password to use when authenticating with Cassandra.
2601
+ :param str pem_bundle: Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
2602
+ :param str pem_json: Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
2692
2603
  :param str plugin_name: Specifies the name of the plugin to use.
2693
- :param int port: The default port to connect to if no port is specified as
2694
- part of the host.
2604
+ :param int port: The transport port to use to connect to Cassandra.
2695
2605
  :param int protocol_version: The CQL protocol version to use.
2696
2606
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
2607
+ :param bool skip_verification: Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
2697
2608
  :param bool tls: Whether to use TLS when connecting to Cassandra.
2698
- :param str username: The root credential username used in the connection URL.
2609
+ :param str username: The username to use when authenticating with Cassandra.
2699
2610
  :param bool verify_connection: Whether the connection should be verified on
2700
2611
  initial configuration or not.
2701
2612
  """
@@ -2724,6 +2635,8 @@ class SecretsMountCassandra(dict):
2724
2635
  pulumi.set(__self__, "protocol_version", protocol_version)
2725
2636
  if root_rotation_statements is not None:
2726
2637
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
2638
+ if skip_verification is not None:
2639
+ pulumi.set(__self__, "skip_verification", skip_verification)
2727
2640
  if tls is not None:
2728
2641
  pulumi.set(__self__, "tls", tls)
2729
2642
  if username is not None:
@@ -2752,14 +2665,13 @@ class SecretsMountCassandra(dict):
2752
2665
  @pulumi.getter(name="connectTimeout")
2753
2666
  def connect_timeout(self) -> Optional[int]:
2754
2667
  """
2755
- The number of seconds to use as a connection
2756
- timeout.
2668
+ The number of seconds to use as a connection timeout.
2757
2669
  """
2758
2670
  return pulumi.get(self, "connect_timeout")
2759
2671
 
2760
2672
  @property
2761
2673
  @pulumi.getter
2762
- def data(self) -> Optional[Mapping[str, Any]]:
2674
+ def data(self) -> Optional[Mapping[str, str]]:
2763
2675
  """
2764
2676
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2765
2677
 
@@ -2771,7 +2683,7 @@ class SecretsMountCassandra(dict):
2771
2683
  @pulumi.getter
2772
2684
  def hosts(self) -> Optional[Sequence[str]]:
2773
2685
  """
2774
- The hosts to connect to.
2686
+ Cassandra hosts to connect to.
2775
2687
  """
2776
2688
  return pulumi.get(self, "hosts")
2777
2689
 
@@ -2779,8 +2691,7 @@ class SecretsMountCassandra(dict):
2779
2691
  @pulumi.getter(name="insecureTls")
2780
2692
  def insecure_tls(self) -> Optional[bool]:
2781
2693
  """
2782
- Whether to skip verification of the server
2783
- certificate when using TLS.
2694
+ Whether to skip verification of the server certificate when using TLS.
2784
2695
  """
2785
2696
  return pulumi.get(self, "insecure_tls")
2786
2697
 
@@ -2788,7 +2699,7 @@ class SecretsMountCassandra(dict):
2788
2699
  @pulumi.getter
2789
2700
  def password(self) -> Optional[str]:
2790
2701
  """
2791
- The root credential password used in the connection URL.
2702
+ The password to use when authenticating with Cassandra.
2792
2703
  """
2793
2704
  return pulumi.get(self, "password")
2794
2705
 
@@ -2796,8 +2707,7 @@ class SecretsMountCassandra(dict):
2796
2707
  @pulumi.getter(name="pemBundle")
2797
2708
  def pem_bundle(self) -> Optional[str]:
2798
2709
  """
2799
- Concatenated PEM blocks configuring the certificate
2800
- chain.
2710
+ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
2801
2711
  """
2802
2712
  return pulumi.get(self, "pem_bundle")
2803
2713
 
@@ -2805,7 +2715,7 @@ class SecretsMountCassandra(dict):
2805
2715
  @pulumi.getter(name="pemJson")
2806
2716
  def pem_json(self) -> Optional[str]:
2807
2717
  """
2808
- A JSON structure configuring the certificate chain.
2718
+ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
2809
2719
  """
2810
2720
  return pulumi.get(self, "pem_json")
2811
2721
 
@@ -2821,8 +2731,7 @@ class SecretsMountCassandra(dict):
2821
2731
  @pulumi.getter
2822
2732
  def port(self) -> Optional[int]:
2823
2733
  """
2824
- The default port to connect to if no port is specified as
2825
- part of the host.
2734
+ The transport port to use to connect to Cassandra.
2826
2735
  """
2827
2736
  return pulumi.get(self, "port")
2828
2737
 
@@ -2842,6 +2751,14 @@ class SecretsMountCassandra(dict):
2842
2751
  """
2843
2752
  return pulumi.get(self, "root_rotation_statements")
2844
2753
 
2754
+ @property
2755
+ @pulumi.getter(name="skipVerification")
2756
+ def skip_verification(self) -> Optional[bool]:
2757
+ """
2758
+ Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
2759
+ """
2760
+ return pulumi.get(self, "skip_verification")
2761
+
2845
2762
  @property
2846
2763
  @pulumi.getter
2847
2764
  def tls(self) -> Optional[bool]:
@@ -2854,7 +2771,7 @@ class SecretsMountCassandra(dict):
2854
2771
  @pulumi.getter
2855
2772
  def username(self) -> Optional[str]:
2856
2773
  """
2857
- The root credential username used in the connection URL.
2774
+ The username to use when authenticating with Cassandra.
2858
2775
  """
2859
2776
  return pulumi.get(self, "username")
2860
2777
 
@@ -2909,7 +2826,7 @@ class SecretsMountCouchbase(dict):
2909
2826
  allowed_roles: Optional[Sequence[str]] = None,
2910
2827
  base64_pem: Optional[str] = None,
2911
2828
  bucket_name: Optional[str] = None,
2912
- data: Optional[Mapping[str, Any]] = None,
2829
+ data: Optional[Mapping[str, str]] = None,
2913
2830
  insecure_tls: Optional[bool] = None,
2914
2831
  plugin_name: Optional[str] = None,
2915
2832
  root_rotation_statements: Optional[Sequence[str]] = None,
@@ -2917,23 +2834,22 @@ class SecretsMountCouchbase(dict):
2917
2834
  username_template: Optional[str] = None,
2918
2835
  verify_connection: Optional[bool] = None):
2919
2836
  """
2920
- :param Sequence[str] hosts: The hosts to connect to.
2837
+ :param Sequence[str] hosts: A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
2921
2838
  :param str name: Name of the database connection.
2922
- :param str password: The root credential password used in the connection URL.
2923
- :param str username: The root credential username used in the connection URL.
2839
+ :param str password: Specifies the password corresponding to the given username.
2840
+ :param str username: Specifies the username for Vault to use.
2924
2841
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
2925
2842
  connection.
2926
2843
  :param str base64_pem: Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
2927
2844
  :param str bucket_name: Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
2928
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2845
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2929
2846
 
2930
2847
  Supported list of database secrets engines that can be configured:
2931
- :param bool insecure_tls: Whether to skip verification of the server
2932
- certificate when using TLS.
2848
+ :param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
2933
2849
  :param str plugin_name: Specifies the name of the plugin to use.
2934
2850
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
2935
- :param bool tls: Whether to use TLS when connecting to Cassandra.
2936
- :param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
2851
+ :param bool tls: Specifies whether to use TLS when connecting to Couchbase.
2852
+ :param str username_template: Template describing how dynamic usernames are generated.
2937
2853
  :param bool verify_connection: Whether the connection should be verified on
2938
2854
  initial configuration or not.
2939
2855
  """
@@ -2966,7 +2882,7 @@ class SecretsMountCouchbase(dict):
2966
2882
  @pulumi.getter
2967
2883
  def hosts(self) -> Sequence[str]:
2968
2884
  """
2969
- The hosts to connect to.
2885
+ A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
2970
2886
  """
2971
2887
  return pulumi.get(self, "hosts")
2972
2888
 
@@ -2982,7 +2898,7 @@ class SecretsMountCouchbase(dict):
2982
2898
  @pulumi.getter
2983
2899
  def password(self) -> str:
2984
2900
  """
2985
- The root credential password used in the connection URL.
2901
+ Specifies the password corresponding to the given username.
2986
2902
  """
2987
2903
  return pulumi.get(self, "password")
2988
2904
 
@@ -2990,7 +2906,7 @@ class SecretsMountCouchbase(dict):
2990
2906
  @pulumi.getter
2991
2907
  def username(self) -> str:
2992
2908
  """
2993
- The root credential username used in the connection URL.
2909
+ Specifies the username for Vault to use.
2994
2910
  """
2995
2911
  return pulumi.get(self, "username")
2996
2912
 
@@ -3021,7 +2937,7 @@ class SecretsMountCouchbase(dict):
3021
2937
 
3022
2938
  @property
3023
2939
  @pulumi.getter
3024
- def data(self) -> Optional[Mapping[str, Any]]:
2940
+ def data(self) -> Optional[Mapping[str, str]]:
3025
2941
  """
3026
2942
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3027
2943
 
@@ -3033,8 +2949,7 @@ class SecretsMountCouchbase(dict):
3033
2949
  @pulumi.getter(name="insecureTls")
3034
2950
  def insecure_tls(self) -> Optional[bool]:
3035
2951
  """
3036
- Whether to skip verification of the server
3037
- certificate when using TLS.
2952
+ Specifies whether to skip verification of the server certificate when using TLS.
3038
2953
  """
3039
2954
  return pulumi.get(self, "insecure_tls")
3040
2955
 
@@ -3058,7 +2973,7 @@ class SecretsMountCouchbase(dict):
3058
2973
  @pulumi.getter
3059
2974
  def tls(self) -> Optional[bool]:
3060
2975
  """
3061
- Whether to use TLS when connecting to Cassandra.
2976
+ Specifies whether to use TLS when connecting to Couchbase.
3062
2977
  """
3063
2978
  return pulumi.get(self, "tls")
3064
2979
 
@@ -3066,7 +2981,7 @@ class SecretsMountCouchbase(dict):
3066
2981
  @pulumi.getter(name="usernameTemplate")
3067
2982
  def username_template(self) -> Optional[str]:
3068
2983
  """
3069
- [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
2984
+ Template describing how dynamic usernames are generated.
3070
2985
  """
3071
2986
  return pulumi.get(self, "username_template")
3072
2987
 
@@ -3127,7 +3042,7 @@ class SecretsMountElasticsearch(dict):
3127
3042
  ca_path: Optional[str] = None,
3128
3043
  client_cert: Optional[str] = None,
3129
3044
  client_key: Optional[str] = None,
3130
- data: Optional[Mapping[str, Any]] = None,
3045
+ data: Optional[Mapping[str, str]] = None,
3131
3046
  insecure: Optional[bool] = None,
3132
3047
  plugin_name: Optional[str] = None,
3133
3048
  root_rotation_statements: Optional[Sequence[str]] = None,
@@ -3136,24 +3051,23 @@ class SecretsMountElasticsearch(dict):
3136
3051
  verify_connection: Optional[bool] = None):
3137
3052
  """
3138
3053
  :param str name: Name of the database connection.
3139
- :param str password: The root credential password used in the connection URL.
3140
- :param str url: The URL for Elasticsearch's API. https requires certificate
3141
- by trusted CA if used.
3142
- :param str username: The root credential username used in the connection URL.
3054
+ :param str password: The password to be used in the connection URL
3055
+ :param str url: The URL for Elasticsearch's API
3056
+ :param str username: The username to be used in the connection URL
3143
3057
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
3144
3058
  connection.
3145
- :param str ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
3146
- :param str ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
3147
- :param str client_cert: The path to the certificate for the Elasticsearch client to present for communication.
3148
- :param str client_key: The path to the key for the Elasticsearch client to use for communication.
3149
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3059
+ :param str ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
3060
+ :param str ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
3061
+ :param str client_cert: The path to the certificate for the Elasticsearch client to present for communication
3062
+ :param str client_key: The path to the key for the Elasticsearch client to use for communication
3063
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3150
3064
 
3151
3065
  Supported list of database secrets engines that can be configured:
3152
- :param bool insecure: Whether to disable certificate verification.
3066
+ :param bool insecure: Whether to disable certificate verification
3153
3067
  :param str plugin_name: Specifies the name of the plugin to use.
3154
3068
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
3155
- :param str tls_server_name: This, if set, is used to set the SNI host when connecting via TLS.
3156
- :param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
3069
+ :param str tls_server_name: This, if set, is used to set the SNI host when connecting via TLS
3070
+ :param str username_template: Template describing how dynamic usernames are generated.
3157
3071
  :param bool verify_connection: Whether the connection should be verified on
3158
3072
  initial configuration or not.
3159
3073
  """
@@ -3198,7 +3112,7 @@ class SecretsMountElasticsearch(dict):
3198
3112
  @pulumi.getter
3199
3113
  def password(self) -> str:
3200
3114
  """
3201
- The root credential password used in the connection URL.
3115
+ The password to be used in the connection URL
3202
3116
  """
3203
3117
  return pulumi.get(self, "password")
3204
3118
 
@@ -3206,8 +3120,7 @@ class SecretsMountElasticsearch(dict):
3206
3120
  @pulumi.getter
3207
3121
  def url(self) -> str:
3208
3122
  """
3209
- The URL for Elasticsearch's API. https requires certificate
3210
- by trusted CA if used.
3123
+ The URL for Elasticsearch's API
3211
3124
  """
3212
3125
  return pulumi.get(self, "url")
3213
3126
 
@@ -3215,7 +3128,7 @@ class SecretsMountElasticsearch(dict):
3215
3128
  @pulumi.getter
3216
3129
  def username(self) -> str:
3217
3130
  """
3218
- The root credential username used in the connection URL.
3131
+ The username to be used in the connection URL
3219
3132
  """
3220
3133
  return pulumi.get(self, "username")
3221
3134
 
@@ -3232,7 +3145,7 @@ class SecretsMountElasticsearch(dict):
3232
3145
  @pulumi.getter(name="caCert")
3233
3146
  def ca_cert(self) -> Optional[str]:
3234
3147
  """
3235
- The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
3148
+ The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
3236
3149
  """
3237
3150
  return pulumi.get(self, "ca_cert")
3238
3151
 
@@ -3240,7 +3153,7 @@ class SecretsMountElasticsearch(dict):
3240
3153
  @pulumi.getter(name="caPath")
3241
3154
  def ca_path(self) -> Optional[str]:
3242
3155
  """
3243
- The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
3156
+ The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
3244
3157
  """
3245
3158
  return pulumi.get(self, "ca_path")
3246
3159
 
@@ -3248,7 +3161,7 @@ class SecretsMountElasticsearch(dict):
3248
3161
  @pulumi.getter(name="clientCert")
3249
3162
  def client_cert(self) -> Optional[str]:
3250
3163
  """
3251
- The path to the certificate for the Elasticsearch client to present for communication.
3164
+ The path to the certificate for the Elasticsearch client to present for communication
3252
3165
  """
3253
3166
  return pulumi.get(self, "client_cert")
3254
3167
 
@@ -3256,13 +3169,13 @@ class SecretsMountElasticsearch(dict):
3256
3169
  @pulumi.getter(name="clientKey")
3257
3170
  def client_key(self) -> Optional[str]:
3258
3171
  """
3259
- The path to the key for the Elasticsearch client to use for communication.
3172
+ The path to the key for the Elasticsearch client to use for communication
3260
3173
  """
3261
3174
  return pulumi.get(self, "client_key")
3262
3175
 
3263
3176
  @property
3264
3177
  @pulumi.getter
3265
- def data(self) -> Optional[Mapping[str, Any]]:
3178
+ def data(self) -> Optional[Mapping[str, str]]:
3266
3179
  """
3267
3180
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3268
3181
 
@@ -3274,7 +3187,7 @@ class SecretsMountElasticsearch(dict):
3274
3187
  @pulumi.getter
3275
3188
  def insecure(self) -> Optional[bool]:
3276
3189
  """
3277
- Whether to disable certificate verification.
3190
+ Whether to disable certificate verification
3278
3191
  """
3279
3192
  return pulumi.get(self, "insecure")
3280
3193
 
@@ -3298,7 +3211,7 @@ class SecretsMountElasticsearch(dict):
3298
3211
  @pulumi.getter(name="tlsServerName")
3299
3212
  def tls_server_name(self) -> Optional[str]:
3300
3213
  """
3301
- This, if set, is used to set the SNI host when connecting via TLS.
3214
+ This, if set, is used to set the SNI host when connecting via TLS
3302
3215
  """
3303
3216
  return pulumi.get(self, "tls_server_name")
3304
3217
 
@@ -3306,7 +3219,7 @@ class SecretsMountElasticsearch(dict):
3306
3219
  @pulumi.getter(name="usernameTemplate")
3307
3220
  def username_template(self) -> Optional[str]:
3308
3221
  """
3309
- [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
3222
+ Template describing how dynamic usernames are generated.
3310
3223
  """
3311
3224
  return pulumi.get(self, "username_template")
3312
3225
 
@@ -3359,7 +3272,7 @@ class SecretsMountHana(dict):
3359
3272
  name: str,
3360
3273
  allowed_roles: Optional[Sequence[str]] = None,
3361
3274
  connection_url: Optional[str] = None,
3362
- data: Optional[Mapping[str, Any]] = None,
3275
+ data: Optional[Mapping[str, str]] = None,
3363
3276
  disable_escaping: Optional[bool] = None,
3364
3277
  max_connection_lifetime: Optional[int] = None,
3365
3278
  max_idle_connections: Optional[int] = None,
@@ -3373,21 +3286,18 @@ class SecretsMountHana(dict):
3373
3286
  :param str name: Name of the database connection.
3374
3287
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
3375
3288
  connection.
3376
- :param str connection_url: Specifies the Redshift DSN.
3377
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
3378
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3289
+ :param str connection_url: Connection string to use to connect to the database.
3290
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3379
3291
 
3380
3292
  Supported list of database secrets engines that can be configured:
3381
- :param bool disable_escaping: Disable special character escaping in username and password.
3382
- :param int max_connection_lifetime: The maximum amount of time a connection may be reused.
3383
- :param int max_idle_connections: The maximum number of idle connections to
3384
- the database.
3385
- :param int max_open_connections: The maximum number of open connections to
3386
- the database.
3387
- :param str password: The root credential password used in the connection URL.
3293
+ :param bool disable_escaping: Disable special character escaping in username and password
3294
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
3295
+ :param int max_idle_connections: Maximum number of idle connections to the database.
3296
+ :param int max_open_connections: Maximum number of open connections to the database.
3297
+ :param str password: The root credential password used in the connection URL
3388
3298
  :param str plugin_name: Specifies the name of the plugin to use.
3389
3299
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
3390
- :param str username: The root credential username used in the connection URL.
3300
+ :param str username: The root credential username used in the connection URL
3391
3301
  :param bool verify_connection: Whether the connection should be verified on
3392
3302
  initial configuration or not.
3393
3303
  """
@@ -3438,14 +3348,13 @@ class SecretsMountHana(dict):
3438
3348
  @pulumi.getter(name="connectionUrl")
3439
3349
  def connection_url(self) -> Optional[str]:
3440
3350
  """
3441
- Specifies the Redshift DSN.
3442
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
3351
+ Connection string to use to connect to the database.
3443
3352
  """
3444
3353
  return pulumi.get(self, "connection_url")
3445
3354
 
3446
3355
  @property
3447
3356
  @pulumi.getter
3448
- def data(self) -> Optional[Mapping[str, Any]]:
3357
+ def data(self) -> Optional[Mapping[str, str]]:
3449
3358
  """
3450
3359
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3451
3360
 
@@ -3457,7 +3366,7 @@ class SecretsMountHana(dict):
3457
3366
  @pulumi.getter(name="disableEscaping")
3458
3367
  def disable_escaping(self) -> Optional[bool]:
3459
3368
  """
3460
- Disable special character escaping in username and password.
3369
+ Disable special character escaping in username and password
3461
3370
  """
3462
3371
  return pulumi.get(self, "disable_escaping")
3463
3372
 
@@ -3465,7 +3374,7 @@ class SecretsMountHana(dict):
3465
3374
  @pulumi.getter(name="maxConnectionLifetime")
3466
3375
  def max_connection_lifetime(self) -> Optional[int]:
3467
3376
  """
3468
- The maximum amount of time a connection may be reused.
3377
+ Maximum number of seconds a connection may be reused.
3469
3378
  """
3470
3379
  return pulumi.get(self, "max_connection_lifetime")
3471
3380
 
@@ -3473,8 +3382,7 @@ class SecretsMountHana(dict):
3473
3382
  @pulumi.getter(name="maxIdleConnections")
3474
3383
  def max_idle_connections(self) -> Optional[int]:
3475
3384
  """
3476
- The maximum number of idle connections to
3477
- the database.
3385
+ Maximum number of idle connections to the database.
3478
3386
  """
3479
3387
  return pulumi.get(self, "max_idle_connections")
3480
3388
 
@@ -3482,8 +3390,7 @@ class SecretsMountHana(dict):
3482
3390
  @pulumi.getter(name="maxOpenConnections")
3483
3391
  def max_open_connections(self) -> Optional[int]:
3484
3392
  """
3485
- The maximum number of open connections to
3486
- the database.
3393
+ Maximum number of open connections to the database.
3487
3394
  """
3488
3395
  return pulumi.get(self, "max_open_connections")
3489
3396
 
@@ -3491,7 +3398,7 @@ class SecretsMountHana(dict):
3491
3398
  @pulumi.getter
3492
3399
  def password(self) -> Optional[str]:
3493
3400
  """
3494
- The root credential password used in the connection URL.
3401
+ The root credential password used in the connection URL
3495
3402
  """
3496
3403
  return pulumi.get(self, "password")
3497
3404
 
@@ -3515,7 +3422,7 @@ class SecretsMountHana(dict):
3515
3422
  @pulumi.getter
3516
3423
  def username(self) -> Optional[str]:
3517
3424
  """
3518
- The root credential username used in the connection URL.
3425
+ The root credential username used in the connection URL
3519
3426
  """
3520
3427
  return pulumi.get(self, "username")
3521
3428
 
@@ -3571,7 +3478,7 @@ class SecretsMountInfluxdb(dict):
3571
3478
  username: str,
3572
3479
  allowed_roles: Optional[Sequence[str]] = None,
3573
3480
  connect_timeout: Optional[int] = None,
3574
- data: Optional[Mapping[str, Any]] = None,
3481
+ data: Optional[Mapping[str, str]] = None,
3575
3482
  insecure_tls: Optional[bool] = None,
3576
3483
  pem_bundle: Optional[str] = None,
3577
3484
  pem_json: Optional[str] = None,
@@ -3582,28 +3489,24 @@ class SecretsMountInfluxdb(dict):
3582
3489
  username_template: Optional[str] = None,
3583
3490
  verify_connection: Optional[bool] = None):
3584
3491
  """
3585
- :param str host: The host to connect to.
3492
+ :param str host: Influxdb host to connect to.
3586
3493
  :param str name: Name of the database connection.
3587
- :param str password: The root credential password used in the connection URL.
3588
- :param str username: The root credential username used in the connection URL.
3494
+ :param str password: Specifies the password corresponding to the given username.
3495
+ :param str username: Specifies the username to use for superuser access.
3589
3496
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
3590
3497
  connection.
3591
- :param int connect_timeout: The number of seconds to use as a connection
3592
- timeout.
3593
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3498
+ :param int connect_timeout: The number of seconds to use as a connection timeout.
3499
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3594
3500
 
3595
3501
  Supported list of database secrets engines that can be configured:
3596
- :param bool insecure_tls: Whether to skip verification of the server
3597
- certificate when using TLS.
3598
- :param str pem_bundle: Concatenated PEM blocks configuring the certificate
3599
- chain.
3600
- :param str pem_json: A JSON structure configuring the certificate chain.
3502
+ :param bool insecure_tls: Whether to skip verification of the server certificate when using TLS.
3503
+ :param str pem_bundle: Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
3504
+ :param str pem_json: Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
3601
3505
  :param str plugin_name: Specifies the name of the plugin to use.
3602
- :param int port: The default port to connect to if no port is specified as
3603
- part of the host.
3506
+ :param int port: The transport port to use to connect to Influxdb.
3604
3507
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
3605
- :param bool tls: Whether to use TLS when connecting to Cassandra.
3606
- :param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
3508
+ :param bool tls: Whether to use TLS when connecting to Influxdb.
3509
+ :param str username_template: Template describing how dynamic usernames are generated.
3607
3510
  :param bool verify_connection: Whether the connection should be verified on
3608
3511
  initial configuration or not.
3609
3512
  """
@@ -3640,7 +3543,7 @@ class SecretsMountInfluxdb(dict):
3640
3543
  @pulumi.getter
3641
3544
  def host(self) -> str:
3642
3545
  """
3643
- The host to connect to.
3546
+ Influxdb host to connect to.
3644
3547
  """
3645
3548
  return pulumi.get(self, "host")
3646
3549
 
@@ -3656,7 +3559,7 @@ class SecretsMountInfluxdb(dict):
3656
3559
  @pulumi.getter
3657
3560
  def password(self) -> str:
3658
3561
  """
3659
- The root credential password used in the connection URL.
3562
+ Specifies the password corresponding to the given username.
3660
3563
  """
3661
3564
  return pulumi.get(self, "password")
3662
3565
 
@@ -3664,7 +3567,7 @@ class SecretsMountInfluxdb(dict):
3664
3567
  @pulumi.getter
3665
3568
  def username(self) -> str:
3666
3569
  """
3667
- The root credential username used in the connection URL.
3570
+ Specifies the username to use for superuser access.
3668
3571
  """
3669
3572
  return pulumi.get(self, "username")
3670
3573
 
@@ -3681,14 +3584,13 @@ class SecretsMountInfluxdb(dict):
3681
3584
  @pulumi.getter(name="connectTimeout")
3682
3585
  def connect_timeout(self) -> Optional[int]:
3683
3586
  """
3684
- The number of seconds to use as a connection
3685
- timeout.
3587
+ The number of seconds to use as a connection timeout.
3686
3588
  """
3687
3589
  return pulumi.get(self, "connect_timeout")
3688
3590
 
3689
3591
  @property
3690
3592
  @pulumi.getter
3691
- def data(self) -> Optional[Mapping[str, Any]]:
3593
+ def data(self) -> Optional[Mapping[str, str]]:
3692
3594
  """
3693
3595
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3694
3596
 
@@ -3700,8 +3602,7 @@ class SecretsMountInfluxdb(dict):
3700
3602
  @pulumi.getter(name="insecureTls")
3701
3603
  def insecure_tls(self) -> Optional[bool]:
3702
3604
  """
3703
- Whether to skip verification of the server
3704
- certificate when using TLS.
3605
+ Whether to skip verification of the server certificate when using TLS.
3705
3606
  """
3706
3607
  return pulumi.get(self, "insecure_tls")
3707
3608
 
@@ -3709,8 +3610,7 @@ class SecretsMountInfluxdb(dict):
3709
3610
  @pulumi.getter(name="pemBundle")
3710
3611
  def pem_bundle(self) -> Optional[str]:
3711
3612
  """
3712
- Concatenated PEM blocks configuring the certificate
3713
- chain.
3613
+ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
3714
3614
  """
3715
3615
  return pulumi.get(self, "pem_bundle")
3716
3616
 
@@ -3718,7 +3618,7 @@ class SecretsMountInfluxdb(dict):
3718
3618
  @pulumi.getter(name="pemJson")
3719
3619
  def pem_json(self) -> Optional[str]:
3720
3620
  """
3721
- A JSON structure configuring the certificate chain.
3621
+ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
3722
3622
  """
3723
3623
  return pulumi.get(self, "pem_json")
3724
3624
 
@@ -3734,8 +3634,7 @@ class SecretsMountInfluxdb(dict):
3734
3634
  @pulumi.getter
3735
3635
  def port(self) -> Optional[int]:
3736
3636
  """
3737
- The default port to connect to if no port is specified as
3738
- part of the host.
3637
+ The transport port to use to connect to Influxdb.
3739
3638
  """
3740
3639
  return pulumi.get(self, "port")
3741
3640
 
@@ -3751,7 +3650,7 @@ class SecretsMountInfluxdb(dict):
3751
3650
  @pulumi.getter
3752
3651
  def tls(self) -> Optional[bool]:
3753
3652
  """
3754
- Whether to use TLS when connecting to Cassandra.
3653
+ Whether to use TLS when connecting to Influxdb.
3755
3654
  """
3756
3655
  return pulumi.get(self, "tls")
3757
3656
 
@@ -3759,7 +3658,7 @@ class SecretsMountInfluxdb(dict):
3759
3658
  @pulumi.getter(name="usernameTemplate")
3760
3659
  def username_template(self) -> Optional[str]:
3761
3660
  """
3762
- [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
3661
+ Template describing how dynamic usernames are generated.
3763
3662
  """
3764
3663
  return pulumi.get(self, "username_template")
3765
3664
 
@@ -3812,7 +3711,7 @@ class SecretsMountMongodb(dict):
3812
3711
  name: str,
3813
3712
  allowed_roles: Optional[Sequence[str]] = None,
3814
3713
  connection_url: Optional[str] = None,
3815
- data: Optional[Mapping[str, Any]] = None,
3714
+ data: Optional[Mapping[str, str]] = None,
3816
3715
  max_connection_lifetime: Optional[int] = None,
3817
3716
  max_idle_connections: Optional[int] = None,
3818
3717
  max_open_connections: Optional[int] = None,
@@ -3826,21 +3725,18 @@ class SecretsMountMongodb(dict):
3826
3725
  :param str name: Name of the database connection.
3827
3726
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
3828
3727
  connection.
3829
- :param str connection_url: Specifies the Redshift DSN.
3830
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
3831
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3728
+ :param str connection_url: Connection string to use to connect to the database.
3729
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3832
3730
 
3833
3731
  Supported list of database secrets engines that can be configured:
3834
- :param int max_connection_lifetime: The maximum amount of time a connection may be reused.
3835
- :param int max_idle_connections: The maximum number of idle connections to
3836
- the database.
3837
- :param int max_open_connections: The maximum number of open connections to
3838
- the database.
3839
- :param str password: The root credential password used in the connection URL.
3732
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
3733
+ :param int max_idle_connections: Maximum number of idle connections to the database.
3734
+ :param int max_open_connections: Maximum number of open connections to the database.
3735
+ :param str password: The root credential password used in the connection URL
3840
3736
  :param str plugin_name: Specifies the name of the plugin to use.
3841
3737
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
3842
- :param str username: The root credential username used in the connection URL.
3843
- :param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
3738
+ :param str username: The root credential username used in the connection URL
3739
+ :param str username_template: Username generation template.
3844
3740
  :param bool verify_connection: Whether the connection should be verified on
3845
3741
  initial configuration or not.
3846
3742
  """
@@ -3891,14 +3787,13 @@ class SecretsMountMongodb(dict):
3891
3787
  @pulumi.getter(name="connectionUrl")
3892
3788
  def connection_url(self) -> Optional[str]:
3893
3789
  """
3894
- Specifies the Redshift DSN.
3895
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
3790
+ Connection string to use to connect to the database.
3896
3791
  """
3897
3792
  return pulumi.get(self, "connection_url")
3898
3793
 
3899
3794
  @property
3900
3795
  @pulumi.getter
3901
- def data(self) -> Optional[Mapping[str, Any]]:
3796
+ def data(self) -> Optional[Mapping[str, str]]:
3902
3797
  """
3903
3798
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3904
3799
 
@@ -3910,7 +3805,7 @@ class SecretsMountMongodb(dict):
3910
3805
  @pulumi.getter(name="maxConnectionLifetime")
3911
3806
  def max_connection_lifetime(self) -> Optional[int]:
3912
3807
  """
3913
- The maximum amount of time a connection may be reused.
3808
+ Maximum number of seconds a connection may be reused.
3914
3809
  """
3915
3810
  return pulumi.get(self, "max_connection_lifetime")
3916
3811
 
@@ -3918,8 +3813,7 @@ class SecretsMountMongodb(dict):
3918
3813
  @pulumi.getter(name="maxIdleConnections")
3919
3814
  def max_idle_connections(self) -> Optional[int]:
3920
3815
  """
3921
- The maximum number of idle connections to
3922
- the database.
3816
+ Maximum number of idle connections to the database.
3923
3817
  """
3924
3818
  return pulumi.get(self, "max_idle_connections")
3925
3819
 
@@ -3927,8 +3821,7 @@ class SecretsMountMongodb(dict):
3927
3821
  @pulumi.getter(name="maxOpenConnections")
3928
3822
  def max_open_connections(self) -> Optional[int]:
3929
3823
  """
3930
- The maximum number of open connections to
3931
- the database.
3824
+ Maximum number of open connections to the database.
3932
3825
  """
3933
3826
  return pulumi.get(self, "max_open_connections")
3934
3827
 
@@ -3936,7 +3829,7 @@ class SecretsMountMongodb(dict):
3936
3829
  @pulumi.getter
3937
3830
  def password(self) -> Optional[str]:
3938
3831
  """
3939
- The root credential password used in the connection URL.
3832
+ The root credential password used in the connection URL
3940
3833
  """
3941
3834
  return pulumi.get(self, "password")
3942
3835
 
@@ -3960,7 +3853,7 @@ class SecretsMountMongodb(dict):
3960
3853
  @pulumi.getter
3961
3854
  def username(self) -> Optional[str]:
3962
3855
  """
3963
- The root credential username used in the connection URL.
3856
+ The root credential username used in the connection URL
3964
3857
  """
3965
3858
  return pulumi.get(self, "username")
3966
3859
 
@@ -3968,7 +3861,7 @@ class SecretsMountMongodb(dict):
3968
3861
  @pulumi.getter(name="usernameTemplate")
3969
3862
  def username_template(self) -> Optional[str]:
3970
3863
  """
3971
- [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
3864
+ Username generation template.
3972
3865
  """
3973
3866
  return pulumi.get(self, "username_template")
3974
3867
 
@@ -4019,7 +3912,7 @@ class SecretsMountMongodbatla(dict):
4019
3912
  project_id: str,
4020
3913
  public_key: str,
4021
3914
  allowed_roles: Optional[Sequence[str]] = None,
4022
- data: Optional[Mapping[str, Any]] = None,
3915
+ data: Optional[Mapping[str, str]] = None,
4023
3916
  plugin_name: Optional[str] = None,
4024
3917
  root_rotation_statements: Optional[Sequence[str]] = None,
4025
3918
  verify_connection: Optional[bool] = None):
@@ -4030,7 +3923,7 @@ class SecretsMountMongodbatla(dict):
4030
3923
  :param str public_key: The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
4031
3924
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
4032
3925
  connection.
4033
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3926
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4034
3927
 
4035
3928
  Supported list of database secrets engines that can be configured:
4036
3929
  :param str plugin_name: Specifies the name of the plugin to use.
@@ -4096,7 +3989,7 @@ class SecretsMountMongodbatla(dict):
4096
3989
 
4097
3990
  @property
4098
3991
  @pulumi.getter
4099
- def data(self) -> Optional[Mapping[str, Any]]:
3992
+ def data(self) -> Optional[Mapping[str, str]]:
4100
3993
  """
4101
3994
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4102
3995
 
@@ -4174,7 +4067,7 @@ class SecretsMountMssql(dict):
4174
4067
  allowed_roles: Optional[Sequence[str]] = None,
4175
4068
  connection_url: Optional[str] = None,
4176
4069
  contained_db: Optional[bool] = None,
4177
- data: Optional[Mapping[str, Any]] = None,
4070
+ data: Optional[Mapping[str, str]] = None,
4178
4071
  disable_escaping: Optional[bool] = None,
4179
4072
  max_connection_lifetime: Optional[int] = None,
4180
4073
  max_idle_connections: Optional[int] = None,
@@ -4189,25 +4082,20 @@ class SecretsMountMssql(dict):
4189
4082
  :param str name: Name of the database connection.
4190
4083
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
4191
4084
  connection.
4192
- :param str connection_url: Specifies the Redshift DSN.
4193
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
4194
- :param bool contained_db: For Vault v1.9+. Set to true when the target is a
4195
- Contained Database, e.g. AzureSQL.
4196
- See [Vault docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
4197
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4085
+ :param str connection_url: Connection string to use to connect to the database.
4086
+ :param bool contained_db: Set to true when the target is a Contained Database, e.g. AzureSQL.
4087
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4198
4088
 
4199
4089
  Supported list of database secrets engines that can be configured:
4200
- :param bool disable_escaping: Disable special character escaping in username and password.
4201
- :param int max_connection_lifetime: The maximum amount of time a connection may be reused.
4202
- :param int max_idle_connections: The maximum number of idle connections to
4203
- the database.
4204
- :param int max_open_connections: The maximum number of open connections to
4205
- the database.
4206
- :param str password: The root credential password used in the connection URL.
4090
+ :param bool disable_escaping: Disable special character escaping in username and password
4091
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
4092
+ :param int max_idle_connections: Maximum number of idle connections to the database.
4093
+ :param int max_open_connections: Maximum number of open connections to the database.
4094
+ :param str password: The root credential password used in the connection URL
4207
4095
  :param str plugin_name: Specifies the name of the plugin to use.
4208
4096
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
4209
- :param str username: The root credential username used in the connection URL.
4210
- :param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
4097
+ :param str username: The root credential username used in the connection URL
4098
+ :param str username_template: Username generation template.
4211
4099
  :param bool verify_connection: Whether the connection should be verified on
4212
4100
  initial configuration or not.
4213
4101
  """
@@ -4262,8 +4150,7 @@ class SecretsMountMssql(dict):
4262
4150
  @pulumi.getter(name="connectionUrl")
4263
4151
  def connection_url(self) -> Optional[str]:
4264
4152
  """
4265
- Specifies the Redshift DSN.
4266
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
4153
+ Connection string to use to connect to the database.
4267
4154
  """
4268
4155
  return pulumi.get(self, "connection_url")
4269
4156
 
@@ -4271,15 +4158,13 @@ class SecretsMountMssql(dict):
4271
4158
  @pulumi.getter(name="containedDb")
4272
4159
  def contained_db(self) -> Optional[bool]:
4273
4160
  """
4274
- For Vault v1.9+. Set to true when the target is a
4275
- Contained Database, e.g. AzureSQL.
4276
- See [Vault docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
4161
+ Set to true when the target is a Contained Database, e.g. AzureSQL.
4277
4162
  """
4278
4163
  return pulumi.get(self, "contained_db")
4279
4164
 
4280
4165
  @property
4281
4166
  @pulumi.getter
4282
- def data(self) -> Optional[Mapping[str, Any]]:
4167
+ def data(self) -> Optional[Mapping[str, str]]:
4283
4168
  """
4284
4169
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4285
4170
 
@@ -4291,7 +4176,7 @@ class SecretsMountMssql(dict):
4291
4176
  @pulumi.getter(name="disableEscaping")
4292
4177
  def disable_escaping(self) -> Optional[bool]:
4293
4178
  """
4294
- Disable special character escaping in username and password.
4179
+ Disable special character escaping in username and password
4295
4180
  """
4296
4181
  return pulumi.get(self, "disable_escaping")
4297
4182
 
@@ -4299,7 +4184,7 @@ class SecretsMountMssql(dict):
4299
4184
  @pulumi.getter(name="maxConnectionLifetime")
4300
4185
  def max_connection_lifetime(self) -> Optional[int]:
4301
4186
  """
4302
- The maximum amount of time a connection may be reused.
4187
+ Maximum number of seconds a connection may be reused.
4303
4188
  """
4304
4189
  return pulumi.get(self, "max_connection_lifetime")
4305
4190
 
@@ -4307,8 +4192,7 @@ class SecretsMountMssql(dict):
4307
4192
  @pulumi.getter(name="maxIdleConnections")
4308
4193
  def max_idle_connections(self) -> Optional[int]:
4309
4194
  """
4310
- The maximum number of idle connections to
4311
- the database.
4195
+ Maximum number of idle connections to the database.
4312
4196
  """
4313
4197
  return pulumi.get(self, "max_idle_connections")
4314
4198
 
@@ -4316,8 +4200,7 @@ class SecretsMountMssql(dict):
4316
4200
  @pulumi.getter(name="maxOpenConnections")
4317
4201
  def max_open_connections(self) -> Optional[int]:
4318
4202
  """
4319
- The maximum number of open connections to
4320
- the database.
4203
+ Maximum number of open connections to the database.
4321
4204
  """
4322
4205
  return pulumi.get(self, "max_open_connections")
4323
4206
 
@@ -4325,7 +4208,7 @@ class SecretsMountMssql(dict):
4325
4208
  @pulumi.getter
4326
4209
  def password(self) -> Optional[str]:
4327
4210
  """
4328
- The root credential password used in the connection URL.
4211
+ The root credential password used in the connection URL
4329
4212
  """
4330
4213
  return pulumi.get(self, "password")
4331
4214
 
@@ -4349,7 +4232,7 @@ class SecretsMountMssql(dict):
4349
4232
  @pulumi.getter
4350
4233
  def username(self) -> Optional[str]:
4351
4234
  """
4352
- The root credential username used in the connection URL.
4235
+ The root credential username used in the connection URL
4353
4236
  """
4354
4237
  return pulumi.get(self, "username")
4355
4238
 
@@ -4357,7 +4240,7 @@ class SecretsMountMssql(dict):
4357
4240
  @pulumi.getter(name="usernameTemplate")
4358
4241
  def username_template(self) -> Optional[str]:
4359
4242
  """
4360
- [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
4243
+ Username generation template.
4361
4244
  """
4362
4245
  return pulumi.get(self, "username_template")
4363
4246
 
@@ -4419,7 +4302,7 @@ class SecretsMountMysql(dict):
4419
4302
  allowed_roles: Optional[Sequence[str]] = None,
4420
4303
  auth_type: Optional[str] = None,
4421
4304
  connection_url: Optional[str] = None,
4422
- data: Optional[Mapping[str, Any]] = None,
4305
+ data: Optional[Mapping[str, str]] = None,
4423
4306
  max_connection_lifetime: Optional[int] = None,
4424
4307
  max_idle_connections: Optional[int] = None,
4425
4308
  max_open_connections: Optional[int] = None,
@@ -4437,24 +4320,21 @@ class SecretsMountMysql(dict):
4437
4320
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
4438
4321
  connection.
4439
4322
  :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
4440
- :param str connection_url: Specifies the Redshift DSN.
4441
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
4442
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4323
+ :param str connection_url: Connection string to use to connect to the database.
4324
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4443
4325
 
4444
4326
  Supported list of database secrets engines that can be configured:
4445
- :param int max_connection_lifetime: The maximum amount of time a connection may be reused.
4446
- :param int max_idle_connections: The maximum number of idle connections to
4447
- the database.
4448
- :param int max_open_connections: The maximum number of open connections to
4449
- the database.
4450
- :param str password: The root credential password used in the connection URL.
4327
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
4328
+ :param int max_idle_connections: Maximum number of idle connections to the database.
4329
+ :param int max_open_connections: Maximum number of open connections to the database.
4330
+ :param str password: The root credential password used in the connection URL
4451
4331
  :param str plugin_name: Specifies the name of the plugin to use.
4452
4332
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
4453
4333
  :param str service_account_json: A JSON encoded credential for use with IAM authorization
4454
4334
  :param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
4455
4335
  :param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
4456
- :param str username: The root credential username used in the connection URL.
4457
- :param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
4336
+ :param str username: The root credential username used in the connection URL
4337
+ :param str username_template: Username generation template.
4458
4338
  :param bool verify_connection: Whether the connection should be verified on
4459
4339
  initial configuration or not.
4460
4340
  """
@@ -4521,14 +4401,13 @@ class SecretsMountMysql(dict):
4521
4401
  @pulumi.getter(name="connectionUrl")
4522
4402
  def connection_url(self) -> Optional[str]:
4523
4403
  """
4524
- Specifies the Redshift DSN.
4525
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
4404
+ Connection string to use to connect to the database.
4526
4405
  """
4527
4406
  return pulumi.get(self, "connection_url")
4528
4407
 
4529
4408
  @property
4530
4409
  @pulumi.getter
4531
- def data(self) -> Optional[Mapping[str, Any]]:
4410
+ def data(self) -> Optional[Mapping[str, str]]:
4532
4411
  """
4533
4412
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4534
4413
 
@@ -4540,7 +4419,7 @@ class SecretsMountMysql(dict):
4540
4419
  @pulumi.getter(name="maxConnectionLifetime")
4541
4420
  def max_connection_lifetime(self) -> Optional[int]:
4542
4421
  """
4543
- The maximum amount of time a connection may be reused.
4422
+ Maximum number of seconds a connection may be reused.
4544
4423
  """
4545
4424
  return pulumi.get(self, "max_connection_lifetime")
4546
4425
 
@@ -4548,8 +4427,7 @@ class SecretsMountMysql(dict):
4548
4427
  @pulumi.getter(name="maxIdleConnections")
4549
4428
  def max_idle_connections(self) -> Optional[int]:
4550
4429
  """
4551
- The maximum number of idle connections to
4552
- the database.
4430
+ Maximum number of idle connections to the database.
4553
4431
  """
4554
4432
  return pulumi.get(self, "max_idle_connections")
4555
4433
 
@@ -4557,8 +4435,7 @@ class SecretsMountMysql(dict):
4557
4435
  @pulumi.getter(name="maxOpenConnections")
4558
4436
  def max_open_connections(self) -> Optional[int]:
4559
4437
  """
4560
- The maximum number of open connections to
4561
- the database.
4438
+ Maximum number of open connections to the database.
4562
4439
  """
4563
4440
  return pulumi.get(self, "max_open_connections")
4564
4441
 
@@ -4566,7 +4443,7 @@ class SecretsMountMysql(dict):
4566
4443
  @pulumi.getter
4567
4444
  def password(self) -> Optional[str]:
4568
4445
  """
4569
- The root credential password used in the connection URL.
4446
+ The root credential password used in the connection URL
4570
4447
  """
4571
4448
  return pulumi.get(self, "password")
4572
4449
 
@@ -4614,7 +4491,7 @@ class SecretsMountMysql(dict):
4614
4491
  @pulumi.getter
4615
4492
  def username(self) -> Optional[str]:
4616
4493
  """
4617
- The root credential username used in the connection URL.
4494
+ The root credential username used in the connection URL
4618
4495
  """
4619
4496
  return pulumi.get(self, "username")
4620
4497
 
@@ -4622,7 +4499,7 @@ class SecretsMountMysql(dict):
4622
4499
  @pulumi.getter(name="usernameTemplate")
4623
4500
  def username_template(self) -> Optional[str]:
4624
4501
  """
4625
- [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
4502
+ Username generation template.
4626
4503
  """
4627
4504
  return pulumi.get(self, "username_template")
4628
4505
 
@@ -4684,7 +4561,7 @@ class SecretsMountMysqlAurora(dict):
4684
4561
  allowed_roles: Optional[Sequence[str]] = None,
4685
4562
  auth_type: Optional[str] = None,
4686
4563
  connection_url: Optional[str] = None,
4687
- data: Optional[Mapping[str, Any]] = None,
4564
+ data: Optional[Mapping[str, str]] = None,
4688
4565
  max_connection_lifetime: Optional[int] = None,
4689
4566
  max_idle_connections: Optional[int] = None,
4690
4567
  max_open_connections: Optional[int] = None,
@@ -4702,24 +4579,21 @@ class SecretsMountMysqlAurora(dict):
4702
4579
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
4703
4580
  connection.
4704
4581
  :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
4705
- :param str connection_url: Specifies the Redshift DSN.
4706
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
4707
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4582
+ :param str connection_url: Connection string to use to connect to the database.
4583
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4708
4584
 
4709
4585
  Supported list of database secrets engines that can be configured:
4710
- :param int max_connection_lifetime: The maximum amount of time a connection may be reused.
4711
- :param int max_idle_connections: The maximum number of idle connections to
4712
- the database.
4713
- :param int max_open_connections: The maximum number of open connections to
4714
- the database.
4715
- :param str password: The root credential password used in the connection URL.
4586
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
4587
+ :param int max_idle_connections: Maximum number of idle connections to the database.
4588
+ :param int max_open_connections: Maximum number of open connections to the database.
4589
+ :param str password: The root credential password used in the connection URL
4716
4590
  :param str plugin_name: Specifies the name of the plugin to use.
4717
4591
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
4718
4592
  :param str service_account_json: A JSON encoded credential for use with IAM authorization
4719
4593
  :param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
4720
4594
  :param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
4721
- :param str username: The root credential username used in the connection URL.
4722
- :param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
4595
+ :param str username: The root credential username used in the connection URL
4596
+ :param str username_template: Username generation template.
4723
4597
  :param bool verify_connection: Whether the connection should be verified on
4724
4598
  initial configuration or not.
4725
4599
  """
@@ -4786,14 +4660,13 @@ class SecretsMountMysqlAurora(dict):
4786
4660
  @pulumi.getter(name="connectionUrl")
4787
4661
  def connection_url(self) -> Optional[str]:
4788
4662
  """
4789
- Specifies the Redshift DSN.
4790
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
4663
+ Connection string to use to connect to the database.
4791
4664
  """
4792
4665
  return pulumi.get(self, "connection_url")
4793
4666
 
4794
4667
  @property
4795
4668
  @pulumi.getter
4796
- def data(self) -> Optional[Mapping[str, Any]]:
4669
+ def data(self) -> Optional[Mapping[str, str]]:
4797
4670
  """
4798
4671
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4799
4672
 
@@ -4805,7 +4678,7 @@ class SecretsMountMysqlAurora(dict):
4805
4678
  @pulumi.getter(name="maxConnectionLifetime")
4806
4679
  def max_connection_lifetime(self) -> Optional[int]:
4807
4680
  """
4808
- The maximum amount of time a connection may be reused.
4681
+ Maximum number of seconds a connection may be reused.
4809
4682
  """
4810
4683
  return pulumi.get(self, "max_connection_lifetime")
4811
4684
 
@@ -4813,8 +4686,7 @@ class SecretsMountMysqlAurora(dict):
4813
4686
  @pulumi.getter(name="maxIdleConnections")
4814
4687
  def max_idle_connections(self) -> Optional[int]:
4815
4688
  """
4816
- The maximum number of idle connections to
4817
- the database.
4689
+ Maximum number of idle connections to the database.
4818
4690
  """
4819
4691
  return pulumi.get(self, "max_idle_connections")
4820
4692
 
@@ -4822,8 +4694,7 @@ class SecretsMountMysqlAurora(dict):
4822
4694
  @pulumi.getter(name="maxOpenConnections")
4823
4695
  def max_open_connections(self) -> Optional[int]:
4824
4696
  """
4825
- The maximum number of open connections to
4826
- the database.
4697
+ Maximum number of open connections to the database.
4827
4698
  """
4828
4699
  return pulumi.get(self, "max_open_connections")
4829
4700
 
@@ -4831,7 +4702,7 @@ class SecretsMountMysqlAurora(dict):
4831
4702
  @pulumi.getter
4832
4703
  def password(self) -> Optional[str]:
4833
4704
  """
4834
- The root credential password used in the connection URL.
4705
+ The root credential password used in the connection URL
4835
4706
  """
4836
4707
  return pulumi.get(self, "password")
4837
4708
 
@@ -4879,7 +4750,7 @@ class SecretsMountMysqlAurora(dict):
4879
4750
  @pulumi.getter
4880
4751
  def username(self) -> Optional[str]:
4881
4752
  """
4882
- The root credential username used in the connection URL.
4753
+ The root credential username used in the connection URL
4883
4754
  """
4884
4755
  return pulumi.get(self, "username")
4885
4756
 
@@ -4887,7 +4758,7 @@ class SecretsMountMysqlAurora(dict):
4887
4758
  @pulumi.getter(name="usernameTemplate")
4888
4759
  def username_template(self) -> Optional[str]:
4889
4760
  """
4890
- [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
4761
+ Username generation template.
4891
4762
  """
4892
4763
  return pulumi.get(self, "username_template")
4893
4764
 
@@ -4949,7 +4820,7 @@ class SecretsMountMysqlLegacy(dict):
4949
4820
  allowed_roles: Optional[Sequence[str]] = None,
4950
4821
  auth_type: Optional[str] = None,
4951
4822
  connection_url: Optional[str] = None,
4952
- data: Optional[Mapping[str, Any]] = None,
4823
+ data: Optional[Mapping[str, str]] = None,
4953
4824
  max_connection_lifetime: Optional[int] = None,
4954
4825
  max_idle_connections: Optional[int] = None,
4955
4826
  max_open_connections: Optional[int] = None,
@@ -4967,24 +4838,21 @@ class SecretsMountMysqlLegacy(dict):
4967
4838
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
4968
4839
  connection.
4969
4840
  :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
4970
- :param str connection_url: Specifies the Redshift DSN.
4971
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
4972
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4841
+ :param str connection_url: Connection string to use to connect to the database.
4842
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4973
4843
 
4974
4844
  Supported list of database secrets engines that can be configured:
4975
- :param int max_connection_lifetime: The maximum amount of time a connection may be reused.
4976
- :param int max_idle_connections: The maximum number of idle connections to
4977
- the database.
4978
- :param int max_open_connections: The maximum number of open connections to
4979
- the database.
4980
- :param str password: The root credential password used in the connection URL.
4845
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
4846
+ :param int max_idle_connections: Maximum number of idle connections to the database.
4847
+ :param int max_open_connections: Maximum number of open connections to the database.
4848
+ :param str password: The root credential password used in the connection URL
4981
4849
  :param str plugin_name: Specifies the name of the plugin to use.
4982
4850
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
4983
4851
  :param str service_account_json: A JSON encoded credential for use with IAM authorization
4984
4852
  :param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
4985
4853
  :param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
4986
- :param str username: The root credential username used in the connection URL.
4987
- :param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
4854
+ :param str username: The root credential username used in the connection URL
4855
+ :param str username_template: Username generation template.
4988
4856
  :param bool verify_connection: Whether the connection should be verified on
4989
4857
  initial configuration or not.
4990
4858
  """
@@ -5051,14 +4919,13 @@ class SecretsMountMysqlLegacy(dict):
5051
4919
  @pulumi.getter(name="connectionUrl")
5052
4920
  def connection_url(self) -> Optional[str]:
5053
4921
  """
5054
- Specifies the Redshift DSN.
5055
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
4922
+ Connection string to use to connect to the database.
5056
4923
  """
5057
4924
  return pulumi.get(self, "connection_url")
5058
4925
 
5059
4926
  @property
5060
4927
  @pulumi.getter
5061
- def data(self) -> Optional[Mapping[str, Any]]:
4928
+ def data(self) -> Optional[Mapping[str, str]]:
5062
4929
  """
5063
4930
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5064
4931
 
@@ -5070,7 +4937,7 @@ class SecretsMountMysqlLegacy(dict):
5070
4937
  @pulumi.getter(name="maxConnectionLifetime")
5071
4938
  def max_connection_lifetime(self) -> Optional[int]:
5072
4939
  """
5073
- The maximum amount of time a connection may be reused.
4940
+ Maximum number of seconds a connection may be reused.
5074
4941
  """
5075
4942
  return pulumi.get(self, "max_connection_lifetime")
5076
4943
 
@@ -5078,8 +4945,7 @@ class SecretsMountMysqlLegacy(dict):
5078
4945
  @pulumi.getter(name="maxIdleConnections")
5079
4946
  def max_idle_connections(self) -> Optional[int]:
5080
4947
  """
5081
- The maximum number of idle connections to
5082
- the database.
4948
+ Maximum number of idle connections to the database.
5083
4949
  """
5084
4950
  return pulumi.get(self, "max_idle_connections")
5085
4951
 
@@ -5087,8 +4953,7 @@ class SecretsMountMysqlLegacy(dict):
5087
4953
  @pulumi.getter(name="maxOpenConnections")
5088
4954
  def max_open_connections(self) -> Optional[int]:
5089
4955
  """
5090
- The maximum number of open connections to
5091
- the database.
4956
+ Maximum number of open connections to the database.
5092
4957
  """
5093
4958
  return pulumi.get(self, "max_open_connections")
5094
4959
 
@@ -5096,7 +4961,7 @@ class SecretsMountMysqlLegacy(dict):
5096
4961
  @pulumi.getter
5097
4962
  def password(self) -> Optional[str]:
5098
4963
  """
5099
- The root credential password used in the connection URL.
4964
+ The root credential password used in the connection URL
5100
4965
  """
5101
4966
  return pulumi.get(self, "password")
5102
4967
 
@@ -5144,7 +5009,7 @@ class SecretsMountMysqlLegacy(dict):
5144
5009
  @pulumi.getter
5145
5010
  def username(self) -> Optional[str]:
5146
5011
  """
5147
- The root credential username used in the connection URL.
5012
+ The root credential username used in the connection URL
5148
5013
  """
5149
5014
  return pulumi.get(self, "username")
5150
5015
 
@@ -5152,7 +5017,7 @@ class SecretsMountMysqlLegacy(dict):
5152
5017
  @pulumi.getter(name="usernameTemplate")
5153
5018
  def username_template(self) -> Optional[str]:
5154
5019
  """
5155
- [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
5020
+ Username generation template.
5156
5021
  """
5157
5022
  return pulumi.get(self, "username_template")
5158
5023
 
@@ -5214,7 +5079,7 @@ class SecretsMountMysqlRd(dict):
5214
5079
  allowed_roles: Optional[Sequence[str]] = None,
5215
5080
  auth_type: Optional[str] = None,
5216
5081
  connection_url: Optional[str] = None,
5217
- data: Optional[Mapping[str, Any]] = None,
5082
+ data: Optional[Mapping[str, str]] = None,
5218
5083
  max_connection_lifetime: Optional[int] = None,
5219
5084
  max_idle_connections: Optional[int] = None,
5220
5085
  max_open_connections: Optional[int] = None,
@@ -5232,24 +5097,21 @@ class SecretsMountMysqlRd(dict):
5232
5097
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
5233
5098
  connection.
5234
5099
  :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
5235
- :param str connection_url: Specifies the Redshift DSN.
5236
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
5237
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5100
+ :param str connection_url: Connection string to use to connect to the database.
5101
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5238
5102
 
5239
5103
  Supported list of database secrets engines that can be configured:
5240
- :param int max_connection_lifetime: The maximum amount of time a connection may be reused.
5241
- :param int max_idle_connections: The maximum number of idle connections to
5242
- the database.
5243
- :param int max_open_connections: The maximum number of open connections to
5244
- the database.
5245
- :param str password: The root credential password used in the connection URL.
5104
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
5105
+ :param int max_idle_connections: Maximum number of idle connections to the database.
5106
+ :param int max_open_connections: Maximum number of open connections to the database.
5107
+ :param str password: The root credential password used in the connection URL
5246
5108
  :param str plugin_name: Specifies the name of the plugin to use.
5247
5109
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
5248
5110
  :param str service_account_json: A JSON encoded credential for use with IAM authorization
5249
5111
  :param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
5250
5112
  :param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
5251
- :param str username: The root credential username used in the connection URL.
5252
- :param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
5113
+ :param str username: The root credential username used in the connection URL
5114
+ :param str username_template: Username generation template.
5253
5115
  :param bool verify_connection: Whether the connection should be verified on
5254
5116
  initial configuration or not.
5255
5117
  """
@@ -5316,14 +5178,13 @@ class SecretsMountMysqlRd(dict):
5316
5178
  @pulumi.getter(name="connectionUrl")
5317
5179
  def connection_url(self) -> Optional[str]:
5318
5180
  """
5319
- Specifies the Redshift DSN.
5320
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
5181
+ Connection string to use to connect to the database.
5321
5182
  """
5322
5183
  return pulumi.get(self, "connection_url")
5323
5184
 
5324
5185
  @property
5325
5186
  @pulumi.getter
5326
- def data(self) -> Optional[Mapping[str, Any]]:
5187
+ def data(self) -> Optional[Mapping[str, str]]:
5327
5188
  """
5328
5189
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5329
5190
 
@@ -5335,7 +5196,7 @@ class SecretsMountMysqlRd(dict):
5335
5196
  @pulumi.getter(name="maxConnectionLifetime")
5336
5197
  def max_connection_lifetime(self) -> Optional[int]:
5337
5198
  """
5338
- The maximum amount of time a connection may be reused.
5199
+ Maximum number of seconds a connection may be reused.
5339
5200
  """
5340
5201
  return pulumi.get(self, "max_connection_lifetime")
5341
5202
 
@@ -5343,8 +5204,7 @@ class SecretsMountMysqlRd(dict):
5343
5204
  @pulumi.getter(name="maxIdleConnections")
5344
5205
  def max_idle_connections(self) -> Optional[int]:
5345
5206
  """
5346
- The maximum number of idle connections to
5347
- the database.
5207
+ Maximum number of idle connections to the database.
5348
5208
  """
5349
5209
  return pulumi.get(self, "max_idle_connections")
5350
5210
 
@@ -5352,8 +5212,7 @@ class SecretsMountMysqlRd(dict):
5352
5212
  @pulumi.getter(name="maxOpenConnections")
5353
5213
  def max_open_connections(self) -> Optional[int]:
5354
5214
  """
5355
- The maximum number of open connections to
5356
- the database.
5215
+ Maximum number of open connections to the database.
5357
5216
  """
5358
5217
  return pulumi.get(self, "max_open_connections")
5359
5218
 
@@ -5361,7 +5220,7 @@ class SecretsMountMysqlRd(dict):
5361
5220
  @pulumi.getter
5362
5221
  def password(self) -> Optional[str]:
5363
5222
  """
5364
- The root credential password used in the connection URL.
5223
+ The root credential password used in the connection URL
5365
5224
  """
5366
5225
  return pulumi.get(self, "password")
5367
5226
 
@@ -5409,7 +5268,7 @@ class SecretsMountMysqlRd(dict):
5409
5268
  @pulumi.getter
5410
5269
  def username(self) -> Optional[str]:
5411
5270
  """
5412
- The root credential username used in the connection URL.
5271
+ The root credential username used in the connection URL
5413
5272
  """
5414
5273
  return pulumi.get(self, "username")
5415
5274
 
@@ -5417,7 +5276,7 @@ class SecretsMountMysqlRd(dict):
5417
5276
  @pulumi.getter(name="usernameTemplate")
5418
5277
  def username_template(self) -> Optional[str]:
5419
5278
  """
5420
- [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
5279
+ Username generation template.
5421
5280
  """
5422
5281
  return pulumi.get(self, "username_template")
5423
5282
 
@@ -5474,7 +5333,7 @@ class SecretsMountOracle(dict):
5474
5333
  name: str,
5475
5334
  allowed_roles: Optional[Sequence[str]] = None,
5476
5335
  connection_url: Optional[str] = None,
5477
- data: Optional[Mapping[str, Any]] = None,
5336
+ data: Optional[Mapping[str, str]] = None,
5478
5337
  disconnect_sessions: Optional[bool] = None,
5479
5338
  max_connection_lifetime: Optional[int] = None,
5480
5339
  max_idle_connections: Optional[int] = None,
@@ -5490,23 +5349,20 @@ class SecretsMountOracle(dict):
5490
5349
  :param str name: Name of the database connection.
5491
5350
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
5492
5351
  connection.
5493
- :param str connection_url: Specifies the Redshift DSN.
5494
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
5495
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5352
+ :param str connection_url: Connection string to use to connect to the database.
5353
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5496
5354
 
5497
5355
  Supported list of database secrets engines that can be configured:
5498
5356
  :param bool disconnect_sessions: Set to true to disconnect any open sessions prior to running the revocation statements.
5499
- :param int max_connection_lifetime: The maximum amount of time a connection may be reused.
5500
- :param int max_idle_connections: The maximum number of idle connections to
5501
- the database.
5502
- :param int max_open_connections: The maximum number of open connections to
5503
- the database.
5504
- :param str password: The root credential password used in the connection URL.
5357
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
5358
+ :param int max_idle_connections: Maximum number of idle connections to the database.
5359
+ :param int max_open_connections: Maximum number of open connections to the database.
5360
+ :param str password: The root credential password used in the connection URL
5505
5361
  :param str plugin_name: Specifies the name of the plugin to use.
5506
5362
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
5507
5363
  :param bool split_statements: Set to true in order to split statements after semi-colons.
5508
- :param str username: The root credential username used in the connection URL.
5509
- :param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
5364
+ :param str username: The root credential username used in the connection URL
5365
+ :param str username_template: Username generation template.
5510
5366
  :param bool verify_connection: Whether the connection should be verified on
5511
5367
  initial configuration or not.
5512
5368
  """
@@ -5561,14 +5417,13 @@ class SecretsMountOracle(dict):
5561
5417
  @pulumi.getter(name="connectionUrl")
5562
5418
  def connection_url(self) -> Optional[str]:
5563
5419
  """
5564
- Specifies the Redshift DSN.
5565
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
5420
+ Connection string to use to connect to the database.
5566
5421
  """
5567
5422
  return pulumi.get(self, "connection_url")
5568
5423
 
5569
5424
  @property
5570
5425
  @pulumi.getter
5571
- def data(self) -> Optional[Mapping[str, Any]]:
5426
+ def data(self) -> Optional[Mapping[str, str]]:
5572
5427
  """
5573
5428
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5574
5429
 
@@ -5588,7 +5443,7 @@ class SecretsMountOracle(dict):
5588
5443
  @pulumi.getter(name="maxConnectionLifetime")
5589
5444
  def max_connection_lifetime(self) -> Optional[int]:
5590
5445
  """
5591
- The maximum amount of time a connection may be reused.
5446
+ Maximum number of seconds a connection may be reused.
5592
5447
  """
5593
5448
  return pulumi.get(self, "max_connection_lifetime")
5594
5449
 
@@ -5596,8 +5451,7 @@ class SecretsMountOracle(dict):
5596
5451
  @pulumi.getter(name="maxIdleConnections")
5597
5452
  def max_idle_connections(self) -> Optional[int]:
5598
5453
  """
5599
- The maximum number of idle connections to
5600
- the database.
5454
+ Maximum number of idle connections to the database.
5601
5455
  """
5602
5456
  return pulumi.get(self, "max_idle_connections")
5603
5457
 
@@ -5605,8 +5459,7 @@ class SecretsMountOracle(dict):
5605
5459
  @pulumi.getter(name="maxOpenConnections")
5606
5460
  def max_open_connections(self) -> Optional[int]:
5607
5461
  """
5608
- The maximum number of open connections to
5609
- the database.
5462
+ Maximum number of open connections to the database.
5610
5463
  """
5611
5464
  return pulumi.get(self, "max_open_connections")
5612
5465
 
@@ -5614,7 +5467,7 @@ class SecretsMountOracle(dict):
5614
5467
  @pulumi.getter
5615
5468
  def password(self) -> Optional[str]:
5616
5469
  """
5617
- The root credential password used in the connection URL.
5470
+ The root credential password used in the connection URL
5618
5471
  """
5619
5472
  return pulumi.get(self, "password")
5620
5473
 
@@ -5646,7 +5499,7 @@ class SecretsMountOracle(dict):
5646
5499
  @pulumi.getter
5647
5500
  def username(self) -> Optional[str]:
5648
5501
  """
5649
- The root credential username used in the connection URL.
5502
+ The root credential username used in the connection URL
5650
5503
  """
5651
5504
  return pulumi.get(self, "username")
5652
5505
 
@@ -5654,7 +5507,7 @@ class SecretsMountOracle(dict):
5654
5507
  @pulumi.getter(name="usernameTemplate")
5655
5508
  def username_template(self) -> Optional[str]:
5656
5509
  """
5657
- [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
5510
+ Username generation template.
5658
5511
  """
5659
5512
  return pulumi.get(self, "username_template")
5660
5513
 
@@ -5689,10 +5542,18 @@ class SecretsMountPostgresql(dict):
5689
5542
  suggest = "max_open_connections"
5690
5543
  elif key == "pluginName":
5691
5544
  suggest = "plugin_name"
5545
+ elif key == "privateKey":
5546
+ suggest = "private_key"
5692
5547
  elif key == "rootRotationStatements":
5693
5548
  suggest = "root_rotation_statements"
5549
+ elif key == "selfManaged":
5550
+ suggest = "self_managed"
5694
5551
  elif key == "serviceAccountJson":
5695
5552
  suggest = "service_account_json"
5553
+ elif key == "tlsCa":
5554
+ suggest = "tls_ca"
5555
+ elif key == "tlsCertificate":
5556
+ suggest = "tls_certificate"
5696
5557
  elif key == "usernameTemplate":
5697
5558
  suggest = "username_template"
5698
5559
  elif key == "verifyConnection":
@@ -5714,15 +5575,19 @@ class SecretsMountPostgresql(dict):
5714
5575
  allowed_roles: Optional[Sequence[str]] = None,
5715
5576
  auth_type: Optional[str] = None,
5716
5577
  connection_url: Optional[str] = None,
5717
- data: Optional[Mapping[str, Any]] = None,
5578
+ data: Optional[Mapping[str, str]] = None,
5718
5579
  disable_escaping: Optional[bool] = None,
5719
5580
  max_connection_lifetime: Optional[int] = None,
5720
5581
  max_idle_connections: Optional[int] = None,
5721
5582
  max_open_connections: Optional[int] = None,
5722
5583
  password: Optional[str] = None,
5723
5584
  plugin_name: Optional[str] = None,
5585
+ private_key: Optional[str] = None,
5724
5586
  root_rotation_statements: Optional[Sequence[str]] = None,
5587
+ self_managed: Optional[bool] = None,
5725
5588
  service_account_json: Optional[str] = None,
5589
+ tls_ca: Optional[str] = None,
5590
+ tls_certificate: Optional[str] = None,
5726
5591
  username: Optional[str] = None,
5727
5592
  username_template: Optional[str] = None,
5728
5593
  verify_connection: Optional[bool] = None):
@@ -5731,23 +5596,24 @@ class SecretsMountPostgresql(dict):
5731
5596
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
5732
5597
  connection.
5733
5598
  :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
5734
- :param str connection_url: Specifies the Redshift DSN.
5735
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
5736
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5599
+ :param str connection_url: Connection string to use to connect to the database.
5600
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5737
5601
 
5738
5602
  Supported list of database secrets engines that can be configured:
5739
- :param bool disable_escaping: Disable special character escaping in username and password.
5740
- :param int max_connection_lifetime: The maximum amount of time a connection may be reused.
5741
- :param int max_idle_connections: The maximum number of idle connections to
5742
- the database.
5743
- :param int max_open_connections: The maximum number of open connections to
5744
- the database.
5745
- :param str password: The root credential password used in the connection URL.
5603
+ :param bool disable_escaping: Disable special character escaping in username and password
5604
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
5605
+ :param int max_idle_connections: Maximum number of idle connections to the database.
5606
+ :param int max_open_connections: Maximum number of open connections to the database.
5607
+ :param str password: The root credential password used in the connection URL
5746
5608
  :param str plugin_name: Specifies the name of the plugin to use.
5609
+ :param str private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
5747
5610
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
5611
+ :param bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
5748
5612
  :param str service_account_json: A JSON encoded credential for use with IAM authorization
5749
- :param str username: The root credential username used in the connection URL.
5750
- :param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
5613
+ :param str tls_ca: The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
5614
+ :param str tls_certificate: The x509 client certificate for connecting to the database. Must be PEM encoded.
5615
+ :param str username: The root credential username used in the connection URL
5616
+ :param str username_template: Username generation template.
5751
5617
  :param bool verify_connection: Whether the connection should be verified on
5752
5618
  initial configuration or not.
5753
5619
  """
@@ -5772,10 +5638,18 @@ class SecretsMountPostgresql(dict):
5772
5638
  pulumi.set(__self__, "password", password)
5773
5639
  if plugin_name is not None:
5774
5640
  pulumi.set(__self__, "plugin_name", plugin_name)
5641
+ if private_key is not None:
5642
+ pulumi.set(__self__, "private_key", private_key)
5775
5643
  if root_rotation_statements is not None:
5776
5644
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
5645
+ if self_managed is not None:
5646
+ pulumi.set(__self__, "self_managed", self_managed)
5777
5647
  if service_account_json is not None:
5778
5648
  pulumi.set(__self__, "service_account_json", service_account_json)
5649
+ if tls_ca is not None:
5650
+ pulumi.set(__self__, "tls_ca", tls_ca)
5651
+ if tls_certificate is not None:
5652
+ pulumi.set(__self__, "tls_certificate", tls_certificate)
5779
5653
  if username is not None:
5780
5654
  pulumi.set(__self__, "username", username)
5781
5655
  if username_template is not None:
@@ -5812,14 +5686,13 @@ class SecretsMountPostgresql(dict):
5812
5686
  @pulumi.getter(name="connectionUrl")
5813
5687
  def connection_url(self) -> Optional[str]:
5814
5688
  """
5815
- Specifies the Redshift DSN.
5816
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
5689
+ Connection string to use to connect to the database.
5817
5690
  """
5818
5691
  return pulumi.get(self, "connection_url")
5819
5692
 
5820
5693
  @property
5821
5694
  @pulumi.getter
5822
- def data(self) -> Optional[Mapping[str, Any]]:
5695
+ def data(self) -> Optional[Mapping[str, str]]:
5823
5696
  """
5824
5697
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5825
5698
 
@@ -5831,7 +5704,7 @@ class SecretsMountPostgresql(dict):
5831
5704
  @pulumi.getter(name="disableEscaping")
5832
5705
  def disable_escaping(self) -> Optional[bool]:
5833
5706
  """
5834
- Disable special character escaping in username and password.
5707
+ Disable special character escaping in username and password
5835
5708
  """
5836
5709
  return pulumi.get(self, "disable_escaping")
5837
5710
 
@@ -5839,7 +5712,7 @@ class SecretsMountPostgresql(dict):
5839
5712
  @pulumi.getter(name="maxConnectionLifetime")
5840
5713
  def max_connection_lifetime(self) -> Optional[int]:
5841
5714
  """
5842
- The maximum amount of time a connection may be reused.
5715
+ Maximum number of seconds a connection may be reused.
5843
5716
  """
5844
5717
  return pulumi.get(self, "max_connection_lifetime")
5845
5718
 
@@ -5847,8 +5720,7 @@ class SecretsMountPostgresql(dict):
5847
5720
  @pulumi.getter(name="maxIdleConnections")
5848
5721
  def max_idle_connections(self) -> Optional[int]:
5849
5722
  """
5850
- The maximum number of idle connections to
5851
- the database.
5723
+ Maximum number of idle connections to the database.
5852
5724
  """
5853
5725
  return pulumi.get(self, "max_idle_connections")
5854
5726
 
@@ -5856,8 +5728,7 @@ class SecretsMountPostgresql(dict):
5856
5728
  @pulumi.getter(name="maxOpenConnections")
5857
5729
  def max_open_connections(self) -> Optional[int]:
5858
5730
  """
5859
- The maximum number of open connections to
5860
- the database.
5731
+ Maximum number of open connections to the database.
5861
5732
  """
5862
5733
  return pulumi.get(self, "max_open_connections")
5863
5734
 
@@ -5865,7 +5736,7 @@ class SecretsMountPostgresql(dict):
5865
5736
  @pulumi.getter
5866
5737
  def password(self) -> Optional[str]:
5867
5738
  """
5868
- The root credential password used in the connection URL.
5739
+ The root credential password used in the connection URL
5869
5740
  """
5870
5741
  return pulumi.get(self, "password")
5871
5742
 
@@ -5877,6 +5748,14 @@ class SecretsMountPostgresql(dict):
5877
5748
  """
5878
5749
  return pulumi.get(self, "plugin_name")
5879
5750
 
5751
+ @property
5752
+ @pulumi.getter(name="privateKey")
5753
+ def private_key(self) -> Optional[str]:
5754
+ """
5755
+ The secret key used for the x509 client certificate. Must be PEM encoded.
5756
+ """
5757
+ return pulumi.get(self, "private_key")
5758
+
5880
5759
  @property
5881
5760
  @pulumi.getter(name="rootRotationStatements")
5882
5761
  def root_rotation_statements(self) -> Optional[Sequence[str]]:
@@ -5885,6 +5764,14 @@ class SecretsMountPostgresql(dict):
5885
5764
  """
5886
5765
  return pulumi.get(self, "root_rotation_statements")
5887
5766
 
5767
+ @property
5768
+ @pulumi.getter(name="selfManaged")
5769
+ def self_managed(self) -> Optional[bool]:
5770
+ """
5771
+ If set, allows onboarding static roles with a rootless connection configuration.
5772
+ """
5773
+ return pulumi.get(self, "self_managed")
5774
+
5888
5775
  @property
5889
5776
  @pulumi.getter(name="serviceAccountJson")
5890
5777
  def service_account_json(self) -> Optional[str]:
@@ -5893,11 +5780,27 @@ class SecretsMountPostgresql(dict):
5893
5780
  """
5894
5781
  return pulumi.get(self, "service_account_json")
5895
5782
 
5783
+ @property
5784
+ @pulumi.getter(name="tlsCa")
5785
+ def tls_ca(self) -> Optional[str]:
5786
+ """
5787
+ The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
5788
+ """
5789
+ return pulumi.get(self, "tls_ca")
5790
+
5791
+ @property
5792
+ @pulumi.getter(name="tlsCertificate")
5793
+ def tls_certificate(self) -> Optional[str]:
5794
+ """
5795
+ The x509 client certificate for connecting to the database. Must be PEM encoded.
5796
+ """
5797
+ return pulumi.get(self, "tls_certificate")
5798
+
5896
5799
  @property
5897
5800
  @pulumi.getter
5898
5801
  def username(self) -> Optional[str]:
5899
5802
  """
5900
- The root credential username used in the connection URL.
5803
+ The root credential username used in the connection URL
5901
5804
  """
5902
5805
  return pulumi.get(self, "username")
5903
5806
 
@@ -5905,7 +5808,7 @@ class SecretsMountPostgresql(dict):
5905
5808
  @pulumi.getter(name="usernameTemplate")
5906
5809
  def username_template(self) -> Optional[str]:
5907
5810
  """
5908
- [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
5811
+ Username generation template.
5909
5812
  """
5910
5813
  return pulumi.get(self, "username_template")
5911
5814
 
@@ -5955,7 +5858,7 @@ class SecretsMountRedi(dict):
5955
5858
  username: str,
5956
5859
  allowed_roles: Optional[Sequence[str]] = None,
5957
5860
  ca_cert: Optional[str] = None,
5958
- data: Optional[Mapping[str, Any]] = None,
5861
+ data: Optional[Mapping[str, str]] = None,
5959
5862
  insecure_tls: Optional[bool] = None,
5960
5863
  plugin_name: Optional[str] = None,
5961
5864
  port: Optional[int] = None,
@@ -5963,23 +5866,21 @@ class SecretsMountRedi(dict):
5963
5866
  tls: Optional[bool] = None,
5964
5867
  verify_connection: Optional[bool] = None):
5965
5868
  """
5966
- :param str host: The host to connect to.
5869
+ :param str host: Specifies the host to connect to
5967
5870
  :param str name: Name of the database connection.
5968
- :param str password: The root credential password used in the connection URL.
5969
- :param str username: The root credential username used in the connection URL.
5871
+ :param str password: Specifies the password corresponding to the given username.
5872
+ :param str username: Specifies the username for Vault to use.
5970
5873
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
5971
5874
  connection.
5972
- :param str ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
5973
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5875
+ :param str ca_cert: The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
5876
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5974
5877
 
5975
5878
  Supported list of database secrets engines that can be configured:
5976
- :param bool insecure_tls: Whether to skip verification of the server
5977
- certificate when using TLS.
5879
+ :param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
5978
5880
  :param str plugin_name: Specifies the name of the plugin to use.
5979
- :param int port: The default port to connect to if no port is specified as
5980
- part of the host.
5881
+ :param int port: The transport port to use to connect to Redis.
5981
5882
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
5982
- :param bool tls: Whether to use TLS when connecting to Cassandra.
5883
+ :param bool tls: Specifies whether to use TLS when connecting to Redis.
5983
5884
  :param bool verify_connection: Whether the connection should be verified on
5984
5885
  initial configuration or not.
5985
5886
  """
@@ -6010,7 +5911,7 @@ class SecretsMountRedi(dict):
6010
5911
  @pulumi.getter
6011
5912
  def host(self) -> str:
6012
5913
  """
6013
- The host to connect to.
5914
+ Specifies the host to connect to
6014
5915
  """
6015
5916
  return pulumi.get(self, "host")
6016
5917
 
@@ -6026,7 +5927,7 @@ class SecretsMountRedi(dict):
6026
5927
  @pulumi.getter
6027
5928
  def password(self) -> str:
6028
5929
  """
6029
- The root credential password used in the connection URL.
5930
+ Specifies the password corresponding to the given username.
6030
5931
  """
6031
5932
  return pulumi.get(self, "password")
6032
5933
 
@@ -6034,7 +5935,7 @@ class SecretsMountRedi(dict):
6034
5935
  @pulumi.getter
6035
5936
  def username(self) -> str:
6036
5937
  """
6037
- The root credential username used in the connection URL.
5938
+ Specifies the username for Vault to use.
6038
5939
  """
6039
5940
  return pulumi.get(self, "username")
6040
5941
 
@@ -6051,13 +5952,13 @@ class SecretsMountRedi(dict):
6051
5952
  @pulumi.getter(name="caCert")
6052
5953
  def ca_cert(self) -> Optional[str]:
6053
5954
  """
6054
- The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
5955
+ The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
6055
5956
  """
6056
5957
  return pulumi.get(self, "ca_cert")
6057
5958
 
6058
5959
  @property
6059
5960
  @pulumi.getter
6060
- def data(self) -> Optional[Mapping[str, Any]]:
5961
+ def data(self) -> Optional[Mapping[str, str]]:
6061
5962
  """
6062
5963
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6063
5964
 
@@ -6069,8 +5970,7 @@ class SecretsMountRedi(dict):
6069
5970
  @pulumi.getter(name="insecureTls")
6070
5971
  def insecure_tls(self) -> Optional[bool]:
6071
5972
  """
6072
- Whether to skip verification of the server
6073
- certificate when using TLS.
5973
+ Specifies whether to skip verification of the server certificate when using TLS.
6074
5974
  """
6075
5975
  return pulumi.get(self, "insecure_tls")
6076
5976
 
@@ -6086,8 +5986,7 @@ class SecretsMountRedi(dict):
6086
5986
  @pulumi.getter
6087
5987
  def port(self) -> Optional[int]:
6088
5988
  """
6089
- The default port to connect to if no port is specified as
6090
- part of the host.
5989
+ The transport port to use to connect to Redis.
6091
5990
  """
6092
5991
  return pulumi.get(self, "port")
6093
5992
 
@@ -6103,7 +6002,7 @@ class SecretsMountRedi(dict):
6103
6002
  @pulumi.getter
6104
6003
  def tls(self) -> Optional[bool]:
6105
6004
  """
6106
- Whether to use TLS when connecting to Cassandra.
6005
+ Specifies whether to use TLS when connecting to Redis.
6107
6006
  """
6108
6007
  return pulumi.get(self, "tls")
6109
6008
 
@@ -6146,7 +6045,7 @@ class SecretsMountRedisElasticach(dict):
6146
6045
  name: str,
6147
6046
  url: str,
6148
6047
  allowed_roles: Optional[Sequence[str]] = None,
6149
- data: Optional[Mapping[str, Any]] = None,
6048
+ data: Optional[Mapping[str, str]] = None,
6150
6049
  password: Optional[str] = None,
6151
6050
  plugin_name: Optional[str] = None,
6152
6051
  region: Optional[str] = None,
@@ -6155,19 +6054,17 @@ class SecretsMountRedisElasticach(dict):
6155
6054
  verify_connection: Optional[bool] = None):
6156
6055
  """
6157
6056
  :param str name: Name of the database connection.
6158
- :param str url: The URL for Elasticsearch's API. https requires certificate
6159
- by trusted CA if used.
6057
+ :param str url: The configuration endpoint for the ElastiCache cluster to connect to.
6160
6058
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
6161
6059
  connection.
6162
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6060
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6163
6061
 
6164
6062
  Supported list of database secrets engines that can be configured:
6165
- :param str password: The root credential password used in the connection URL.
6063
+ :param str password: The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
6166
6064
  :param str plugin_name: Specifies the name of the plugin to use.
6167
- :param str region: The AWS region where the ElastiCache cluster is hosted.
6168
- If omitted the plugin tries to infer the region from the environment.
6065
+ :param str region: The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
6169
6066
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
6170
- :param str username: The root credential username used in the connection URL.
6067
+ :param str username: The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
6171
6068
  :param bool verify_connection: Whether the connection should be verified on
6172
6069
  initial configuration or not.
6173
6070
  """
@@ -6202,8 +6099,7 @@ class SecretsMountRedisElasticach(dict):
6202
6099
  @pulumi.getter
6203
6100
  def url(self) -> str:
6204
6101
  """
6205
- The URL for Elasticsearch's API. https requires certificate
6206
- by trusted CA if used.
6102
+ The configuration endpoint for the ElastiCache cluster to connect to.
6207
6103
  """
6208
6104
  return pulumi.get(self, "url")
6209
6105
 
@@ -6218,7 +6114,7 @@ class SecretsMountRedisElasticach(dict):
6218
6114
 
6219
6115
  @property
6220
6116
  @pulumi.getter
6221
- def data(self) -> Optional[Mapping[str, Any]]:
6117
+ def data(self) -> Optional[Mapping[str, str]]:
6222
6118
  """
6223
6119
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6224
6120
 
@@ -6230,7 +6126,7 @@ class SecretsMountRedisElasticach(dict):
6230
6126
  @pulumi.getter
6231
6127
  def password(self) -> Optional[str]:
6232
6128
  """
6233
- The root credential password used in the connection URL.
6129
+ The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
6234
6130
  """
6235
6131
  return pulumi.get(self, "password")
6236
6132
 
@@ -6246,8 +6142,7 @@ class SecretsMountRedisElasticach(dict):
6246
6142
  @pulumi.getter
6247
6143
  def region(self) -> Optional[str]:
6248
6144
  """
6249
- The AWS region where the ElastiCache cluster is hosted.
6250
- If omitted the plugin tries to infer the region from the environment.
6145
+ The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
6251
6146
  """
6252
6147
  return pulumi.get(self, "region")
6253
6148
 
@@ -6263,7 +6158,7 @@ class SecretsMountRedisElasticach(dict):
6263
6158
  @pulumi.getter
6264
6159
  def username(self) -> Optional[str]:
6265
6160
  """
6266
- The root credential username used in the connection URL.
6161
+ The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
6267
6162
  """
6268
6163
  return pulumi.get(self, "username")
6269
6164
 
@@ -6318,7 +6213,7 @@ class SecretsMountRedshift(dict):
6318
6213
  name: str,
6319
6214
  allowed_roles: Optional[Sequence[str]] = None,
6320
6215
  connection_url: Optional[str] = None,
6321
- data: Optional[Mapping[str, Any]] = None,
6216
+ data: Optional[Mapping[str, str]] = None,
6322
6217
  disable_escaping: Optional[bool] = None,
6323
6218
  max_connection_lifetime: Optional[int] = None,
6324
6219
  max_idle_connections: Optional[int] = None,
@@ -6333,22 +6228,19 @@ class SecretsMountRedshift(dict):
6333
6228
  :param str name: Name of the database connection.
6334
6229
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
6335
6230
  connection.
6336
- :param str connection_url: Specifies the Redshift DSN.
6337
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
6338
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6231
+ :param str connection_url: Connection string to use to connect to the database.
6232
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6339
6233
 
6340
6234
  Supported list of database secrets engines that can be configured:
6341
- :param bool disable_escaping: Disable special character escaping in username and password.
6342
- :param int max_connection_lifetime: The maximum amount of time a connection may be reused.
6343
- :param int max_idle_connections: The maximum number of idle connections to
6344
- the database.
6345
- :param int max_open_connections: The maximum number of open connections to
6346
- the database.
6347
- :param str password: The root credential password used in the connection URL.
6235
+ :param bool disable_escaping: Disable special character escaping in username and password
6236
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
6237
+ :param int max_idle_connections: Maximum number of idle connections to the database.
6238
+ :param int max_open_connections: Maximum number of open connections to the database.
6239
+ :param str password: The root credential password used in the connection URL
6348
6240
  :param str plugin_name: Specifies the name of the plugin to use.
6349
6241
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
6350
- :param str username: The root credential username used in the connection URL.
6351
- :param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
6242
+ :param str username: The root credential username used in the connection URL
6243
+ :param str username_template: Username generation template.
6352
6244
  :param bool verify_connection: Whether the connection should be verified on
6353
6245
  initial configuration or not.
6354
6246
  """
@@ -6401,14 +6293,13 @@ class SecretsMountRedshift(dict):
6401
6293
  @pulumi.getter(name="connectionUrl")
6402
6294
  def connection_url(self) -> Optional[str]:
6403
6295
  """
6404
- Specifies the Redshift DSN.
6405
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
6296
+ Connection string to use to connect to the database.
6406
6297
  """
6407
6298
  return pulumi.get(self, "connection_url")
6408
6299
 
6409
6300
  @property
6410
6301
  @pulumi.getter
6411
- def data(self) -> Optional[Mapping[str, Any]]:
6302
+ def data(self) -> Optional[Mapping[str, str]]:
6412
6303
  """
6413
6304
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6414
6305
 
@@ -6420,7 +6311,7 @@ class SecretsMountRedshift(dict):
6420
6311
  @pulumi.getter(name="disableEscaping")
6421
6312
  def disable_escaping(self) -> Optional[bool]:
6422
6313
  """
6423
- Disable special character escaping in username and password.
6314
+ Disable special character escaping in username and password
6424
6315
  """
6425
6316
  return pulumi.get(self, "disable_escaping")
6426
6317
 
@@ -6428,7 +6319,7 @@ class SecretsMountRedshift(dict):
6428
6319
  @pulumi.getter(name="maxConnectionLifetime")
6429
6320
  def max_connection_lifetime(self) -> Optional[int]:
6430
6321
  """
6431
- The maximum amount of time a connection may be reused.
6322
+ Maximum number of seconds a connection may be reused.
6432
6323
  """
6433
6324
  return pulumi.get(self, "max_connection_lifetime")
6434
6325
 
@@ -6436,8 +6327,7 @@ class SecretsMountRedshift(dict):
6436
6327
  @pulumi.getter(name="maxIdleConnections")
6437
6328
  def max_idle_connections(self) -> Optional[int]:
6438
6329
  """
6439
- The maximum number of idle connections to
6440
- the database.
6330
+ Maximum number of idle connections to the database.
6441
6331
  """
6442
6332
  return pulumi.get(self, "max_idle_connections")
6443
6333
 
@@ -6445,8 +6335,7 @@ class SecretsMountRedshift(dict):
6445
6335
  @pulumi.getter(name="maxOpenConnections")
6446
6336
  def max_open_connections(self) -> Optional[int]:
6447
6337
  """
6448
- The maximum number of open connections to
6449
- the database.
6338
+ Maximum number of open connections to the database.
6450
6339
  """
6451
6340
  return pulumi.get(self, "max_open_connections")
6452
6341
 
@@ -6454,7 +6343,7 @@ class SecretsMountRedshift(dict):
6454
6343
  @pulumi.getter
6455
6344
  def password(self) -> Optional[str]:
6456
6345
  """
6457
- The root credential password used in the connection URL.
6346
+ The root credential password used in the connection URL
6458
6347
  """
6459
6348
  return pulumi.get(self, "password")
6460
6349
 
@@ -6478,7 +6367,7 @@ class SecretsMountRedshift(dict):
6478
6367
  @pulumi.getter
6479
6368
  def username(self) -> Optional[str]:
6480
6369
  """
6481
- The root credential username used in the connection URL.
6370
+ The root credential username used in the connection URL
6482
6371
  """
6483
6372
  return pulumi.get(self, "username")
6484
6373
 
@@ -6486,7 +6375,7 @@ class SecretsMountRedshift(dict):
6486
6375
  @pulumi.getter(name="usernameTemplate")
6487
6376
  def username_template(self) -> Optional[str]:
6488
6377
  """
6489
- [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
6378
+ Username generation template.
6490
6379
  """
6491
6380
  return pulumi.get(self, "username_template")
6492
6381
 
@@ -6539,7 +6428,7 @@ class SecretsMountSnowflake(dict):
6539
6428
  name: str,
6540
6429
  allowed_roles: Optional[Sequence[str]] = None,
6541
6430
  connection_url: Optional[str] = None,
6542
- data: Optional[Mapping[str, Any]] = None,
6431
+ data: Optional[Mapping[str, str]] = None,
6543
6432
  max_connection_lifetime: Optional[int] = None,
6544
6433
  max_idle_connections: Optional[int] = None,
6545
6434
  max_open_connections: Optional[int] = None,
@@ -6553,21 +6442,18 @@ class SecretsMountSnowflake(dict):
6553
6442
  :param str name: Name of the database connection.
6554
6443
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
6555
6444
  connection.
6556
- :param str connection_url: Specifies the Redshift DSN.
6557
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
6558
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6445
+ :param str connection_url: Connection string to use to connect to the database.
6446
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6559
6447
 
6560
6448
  Supported list of database secrets engines that can be configured:
6561
- :param int max_connection_lifetime: The maximum amount of time a connection may be reused.
6562
- :param int max_idle_connections: The maximum number of idle connections to
6563
- the database.
6564
- :param int max_open_connections: The maximum number of open connections to
6565
- the database.
6566
- :param str password: The root credential password used in the connection URL.
6449
+ :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
6450
+ :param int max_idle_connections: Maximum number of idle connections to the database.
6451
+ :param int max_open_connections: Maximum number of open connections to the database.
6452
+ :param str password: The root credential password used in the connection URL
6567
6453
  :param str plugin_name: Specifies the name of the plugin to use.
6568
6454
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
6569
- :param str username: The root credential username used in the connection URL.
6570
- :param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
6455
+ :param str username: The root credential username used in the connection URL
6456
+ :param str username_template: Username generation template.
6571
6457
  :param bool verify_connection: Whether the connection should be verified on
6572
6458
  initial configuration or not.
6573
6459
  """
@@ -6618,14 +6504,13 @@ class SecretsMountSnowflake(dict):
6618
6504
  @pulumi.getter(name="connectionUrl")
6619
6505
  def connection_url(self) -> Optional[str]:
6620
6506
  """
6621
- Specifies the Redshift DSN.
6622
- See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
6507
+ Connection string to use to connect to the database.
6623
6508
  """
6624
6509
  return pulumi.get(self, "connection_url")
6625
6510
 
6626
6511
  @property
6627
6512
  @pulumi.getter
6628
- def data(self) -> Optional[Mapping[str, Any]]:
6513
+ def data(self) -> Optional[Mapping[str, str]]:
6629
6514
  """
6630
6515
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6631
6516
 
@@ -6637,7 +6522,7 @@ class SecretsMountSnowflake(dict):
6637
6522
  @pulumi.getter(name="maxConnectionLifetime")
6638
6523
  def max_connection_lifetime(self) -> Optional[int]:
6639
6524
  """
6640
- The maximum amount of time a connection may be reused.
6525
+ Maximum number of seconds a connection may be reused.
6641
6526
  """
6642
6527
  return pulumi.get(self, "max_connection_lifetime")
6643
6528
 
@@ -6645,8 +6530,7 @@ class SecretsMountSnowflake(dict):
6645
6530
  @pulumi.getter(name="maxIdleConnections")
6646
6531
  def max_idle_connections(self) -> Optional[int]:
6647
6532
  """
6648
- The maximum number of idle connections to
6649
- the database.
6533
+ Maximum number of idle connections to the database.
6650
6534
  """
6651
6535
  return pulumi.get(self, "max_idle_connections")
6652
6536
 
@@ -6654,8 +6538,7 @@ class SecretsMountSnowflake(dict):
6654
6538
  @pulumi.getter(name="maxOpenConnections")
6655
6539
  def max_open_connections(self) -> Optional[int]:
6656
6540
  """
6657
- The maximum number of open connections to
6658
- the database.
6541
+ Maximum number of open connections to the database.
6659
6542
  """
6660
6543
  return pulumi.get(self, "max_open_connections")
6661
6544
 
@@ -6663,7 +6546,7 @@ class SecretsMountSnowflake(dict):
6663
6546
  @pulumi.getter
6664
6547
  def password(self) -> Optional[str]:
6665
6548
  """
6666
- The root credential password used in the connection URL.
6549
+ The root credential password used in the connection URL
6667
6550
  """
6668
6551
  return pulumi.get(self, "password")
6669
6552
 
@@ -6687,7 +6570,7 @@ class SecretsMountSnowflake(dict):
6687
6570
  @pulumi.getter
6688
6571
  def username(self) -> Optional[str]:
6689
6572
  """
6690
- The root credential username used in the connection URL.
6573
+ The root credential username used in the connection URL
6691
6574
  """
6692
6575
  return pulumi.get(self, "username")
6693
6576
 
@@ -6695,7 +6578,7 @@ class SecretsMountSnowflake(dict):
6695
6578
  @pulumi.getter(name="usernameTemplate")
6696
6579
  def username_template(self) -> Optional[str]:
6697
6580
  """
6698
- [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
6581
+ Username generation template.
6699
6582
  """
6700
6583
  return pulumi.get(self, "username_template")
6701
6584