pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +12 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +75 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +19 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +83 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
pulumi_vault/database/outputs.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -63,6 +68,8 @@ class SecretBackendConnectionCassandra(dict):
|
|
63
68
|
suggest = "pem_json"
|
64
69
|
elif key == "protocolVersion":
|
65
70
|
suggest = "protocol_version"
|
71
|
+
elif key == "skipVerification":
|
72
|
+
suggest = "skip_verification"
|
66
73
|
|
67
74
|
if suggest:
|
68
75
|
pulumi.log.warn(f"Key '{key}' not found in SecretBackendConnectionCassandra. Access the value via the '{suggest}' property getter instead.")
|
@@ -84,23 +91,21 @@ class SecretBackendConnectionCassandra(dict):
|
|
84
91
|
pem_json: Optional[str] = None,
|
85
92
|
port: Optional[int] = None,
|
86
93
|
protocol_version: Optional[int] = None,
|
94
|
+
skip_verification: Optional[bool] = None,
|
87
95
|
tls: Optional[bool] = None,
|
88
96
|
username: Optional[str] = None):
|
89
97
|
"""
|
90
|
-
:param int connect_timeout: The number of seconds to use as a connection
|
91
|
-
|
92
|
-
:param
|
93
|
-
:param
|
94
|
-
|
95
|
-
:param str
|
96
|
-
:param
|
97
|
-
chain.
|
98
|
-
:param str pem_json: A JSON structure configuring the certificate chain.
|
99
|
-
:param int port: The default port to connect to if no port is specified as
|
100
|
-
part of the host.
|
98
|
+
:param int connect_timeout: The number of seconds to use as a connection timeout.
|
99
|
+
:param Sequence[str] hosts: Cassandra hosts to connect to.
|
100
|
+
:param bool insecure_tls: Whether to skip verification of the server certificate when using TLS.
|
101
|
+
:param str password: The password to use when authenticating with Cassandra.
|
102
|
+
:param str pem_bundle: Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
103
|
+
:param str pem_json: Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
104
|
+
:param int port: The transport port to use to connect to Cassandra.
|
101
105
|
:param int protocol_version: The CQL protocol version to use.
|
106
|
+
:param bool skip_verification: Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
102
107
|
:param bool tls: Whether to use TLS when connecting to Cassandra.
|
103
|
-
:param str username: The username to
|
108
|
+
:param str username: The username to use when authenticating with Cassandra.
|
104
109
|
"""
|
105
110
|
if connect_timeout is not None:
|
106
111
|
pulumi.set(__self__, "connect_timeout", connect_timeout)
|
@@ -118,6 +123,8 @@ class SecretBackendConnectionCassandra(dict):
|
|
118
123
|
pulumi.set(__self__, "port", port)
|
119
124
|
if protocol_version is not None:
|
120
125
|
pulumi.set(__self__, "protocol_version", protocol_version)
|
126
|
+
if skip_verification is not None:
|
127
|
+
pulumi.set(__self__, "skip_verification", skip_verification)
|
121
128
|
if tls is not None:
|
122
129
|
pulumi.set(__self__, "tls", tls)
|
123
130
|
if username is not None:
|
@@ -127,8 +134,7 @@ class SecretBackendConnectionCassandra(dict):
|
|
127
134
|
@pulumi.getter(name="connectTimeout")
|
128
135
|
def connect_timeout(self) -> Optional[int]:
|
129
136
|
"""
|
130
|
-
The number of seconds to use as a connection
|
131
|
-
timeout.
|
137
|
+
The number of seconds to use as a connection timeout.
|
132
138
|
"""
|
133
139
|
return pulumi.get(self, "connect_timeout")
|
134
140
|
|
@@ -136,7 +142,7 @@ class SecretBackendConnectionCassandra(dict):
|
|
136
142
|
@pulumi.getter
|
137
143
|
def hosts(self) -> Optional[Sequence[str]]:
|
138
144
|
"""
|
139
|
-
|
145
|
+
Cassandra hosts to connect to.
|
140
146
|
"""
|
141
147
|
return pulumi.get(self, "hosts")
|
142
148
|
|
@@ -144,8 +150,7 @@ class SecretBackendConnectionCassandra(dict):
|
|
144
150
|
@pulumi.getter(name="insecureTls")
|
145
151
|
def insecure_tls(self) -> Optional[bool]:
|
146
152
|
"""
|
147
|
-
Whether to skip verification of the server
|
148
|
-
certificate when using TLS.
|
153
|
+
Whether to skip verification of the server certificate when using TLS.
|
149
154
|
"""
|
150
155
|
return pulumi.get(self, "insecure_tls")
|
151
156
|
|
@@ -153,7 +158,7 @@ class SecretBackendConnectionCassandra(dict):
|
|
153
158
|
@pulumi.getter
|
154
159
|
def password(self) -> Optional[str]:
|
155
160
|
"""
|
156
|
-
The password to
|
161
|
+
The password to use when authenticating with Cassandra.
|
157
162
|
"""
|
158
163
|
return pulumi.get(self, "password")
|
159
164
|
|
@@ -161,8 +166,7 @@ class SecretBackendConnectionCassandra(dict):
|
|
161
166
|
@pulumi.getter(name="pemBundle")
|
162
167
|
def pem_bundle(self) -> Optional[str]:
|
163
168
|
"""
|
164
|
-
Concatenated PEM blocks
|
165
|
-
chain.
|
169
|
+
Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
166
170
|
"""
|
167
171
|
return pulumi.get(self, "pem_bundle")
|
168
172
|
|
@@ -170,7 +174,7 @@ class SecretBackendConnectionCassandra(dict):
|
|
170
174
|
@pulumi.getter(name="pemJson")
|
171
175
|
def pem_json(self) -> Optional[str]:
|
172
176
|
"""
|
173
|
-
|
177
|
+
Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
174
178
|
"""
|
175
179
|
return pulumi.get(self, "pem_json")
|
176
180
|
|
@@ -178,8 +182,7 @@ class SecretBackendConnectionCassandra(dict):
|
|
178
182
|
@pulumi.getter
|
179
183
|
def port(self) -> Optional[int]:
|
180
184
|
"""
|
181
|
-
The
|
182
|
-
part of the host.
|
185
|
+
The transport port to use to connect to Cassandra.
|
183
186
|
"""
|
184
187
|
return pulumi.get(self, "port")
|
185
188
|
|
@@ -191,6 +194,14 @@ class SecretBackendConnectionCassandra(dict):
|
|
191
194
|
"""
|
192
195
|
return pulumi.get(self, "protocol_version")
|
193
196
|
|
197
|
+
@property
|
198
|
+
@pulumi.getter(name="skipVerification")
|
199
|
+
def skip_verification(self) -> Optional[bool]:
|
200
|
+
"""
|
201
|
+
Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
202
|
+
"""
|
203
|
+
return pulumi.get(self, "skip_verification")
|
204
|
+
|
194
205
|
@property
|
195
206
|
@pulumi.getter
|
196
207
|
def tls(self) -> Optional[bool]:
|
@@ -203,7 +214,7 @@ class SecretBackendConnectionCassandra(dict):
|
|
203
214
|
@pulumi.getter
|
204
215
|
def username(self) -> Optional[str]:
|
205
216
|
"""
|
206
|
-
The username to
|
217
|
+
The username to use when authenticating with Cassandra.
|
207
218
|
"""
|
208
219
|
return pulumi.get(self, "username")
|
209
220
|
|
@@ -243,14 +254,13 @@ class SecretBackendConnectionCouchbase(dict):
|
|
243
254
|
tls: Optional[bool] = None,
|
244
255
|
username_template: Optional[str] = None):
|
245
256
|
"""
|
246
|
-
:param Sequence[str] hosts:
|
247
|
-
:param str password:
|
248
|
-
:param str username:
|
257
|
+
:param Sequence[str] hosts: A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
|
258
|
+
:param str password: Specifies the password corresponding to the given username.
|
259
|
+
:param str username: Specifies the username for Vault to use.
|
249
260
|
:param str base64_pem: Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
|
250
261
|
:param str bucket_name: Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
|
251
|
-
:param bool insecure_tls:
|
252
|
-
|
253
|
-
:param bool tls: Whether to use TLS when connecting to Cassandra.
|
262
|
+
:param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
|
263
|
+
:param bool tls: Specifies whether to use TLS when connecting to Couchbase.
|
254
264
|
:param str username_template: Template describing how dynamic usernames are generated.
|
255
265
|
"""
|
256
266
|
pulumi.set(__self__, "hosts", hosts)
|
@@ -271,7 +281,7 @@ class SecretBackendConnectionCouchbase(dict):
|
|
271
281
|
@pulumi.getter
|
272
282
|
def hosts(self) -> Sequence[str]:
|
273
283
|
"""
|
274
|
-
|
284
|
+
A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
|
275
285
|
"""
|
276
286
|
return pulumi.get(self, "hosts")
|
277
287
|
|
@@ -279,7 +289,7 @@ class SecretBackendConnectionCouchbase(dict):
|
|
279
289
|
@pulumi.getter
|
280
290
|
def password(self) -> str:
|
281
291
|
"""
|
282
|
-
|
292
|
+
Specifies the password corresponding to the given username.
|
283
293
|
"""
|
284
294
|
return pulumi.get(self, "password")
|
285
295
|
|
@@ -287,7 +297,7 @@ class SecretBackendConnectionCouchbase(dict):
|
|
287
297
|
@pulumi.getter
|
288
298
|
def username(self) -> str:
|
289
299
|
"""
|
290
|
-
|
300
|
+
Specifies the username for Vault to use.
|
291
301
|
"""
|
292
302
|
return pulumi.get(self, "username")
|
293
303
|
|
@@ -311,8 +321,7 @@ class SecretBackendConnectionCouchbase(dict):
|
|
311
321
|
@pulumi.getter(name="insecureTls")
|
312
322
|
def insecure_tls(self) -> Optional[bool]:
|
313
323
|
"""
|
314
|
-
|
315
|
-
certificate when using TLS.
|
324
|
+
Specifies whether to skip verification of the server certificate when using TLS.
|
316
325
|
"""
|
317
326
|
return pulumi.get(self, "insecure_tls")
|
318
327
|
|
@@ -320,7 +329,7 @@ class SecretBackendConnectionCouchbase(dict):
|
|
320
329
|
@pulumi.getter
|
321
330
|
def tls(self) -> Optional[bool]:
|
322
331
|
"""
|
323
|
-
|
332
|
+
Specifies whether to use TLS when connecting to Couchbase.
|
324
333
|
"""
|
325
334
|
return pulumi.get(self, "tls")
|
326
335
|
|
@@ -374,16 +383,15 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
374
383
|
tls_server_name: Optional[str] = None,
|
375
384
|
username_template: Optional[str] = None):
|
376
385
|
"""
|
377
|
-
:param str password: The password to
|
378
|
-
:param str url: The URL for Elasticsearch's API
|
379
|
-
|
380
|
-
:param str
|
381
|
-
:param str
|
382
|
-
:param str
|
383
|
-
:param str
|
384
|
-
:param
|
385
|
-
:param
|
386
|
-
:param str tls_server_name: This, if set, is used to set the SNI host when connecting via TLS.
|
386
|
+
:param str password: The password to be used in the connection URL
|
387
|
+
:param str url: The URL for Elasticsearch's API
|
388
|
+
:param str username: The username to be used in the connection URL
|
389
|
+
:param str ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
390
|
+
:param str ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
391
|
+
:param str client_cert: The path to the certificate for the Elasticsearch client to present for communication
|
392
|
+
:param str client_key: The path to the key for the Elasticsearch client to use for communication
|
393
|
+
:param bool insecure: Whether to disable certificate verification
|
394
|
+
:param str tls_server_name: This, if set, is used to set the SNI host when connecting via TLS
|
387
395
|
:param str username_template: Template describing how dynamic usernames are generated.
|
388
396
|
"""
|
389
397
|
pulumi.set(__self__, "password", password)
|
@@ -408,7 +416,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
408
416
|
@pulumi.getter
|
409
417
|
def password(self) -> str:
|
410
418
|
"""
|
411
|
-
The password to
|
419
|
+
The password to be used in the connection URL
|
412
420
|
"""
|
413
421
|
return pulumi.get(self, "password")
|
414
422
|
|
@@ -416,8 +424,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
416
424
|
@pulumi.getter
|
417
425
|
def url(self) -> str:
|
418
426
|
"""
|
419
|
-
The URL for Elasticsearch's API
|
420
|
-
by trusted CA if used.
|
427
|
+
The URL for Elasticsearch's API
|
421
428
|
"""
|
422
429
|
return pulumi.get(self, "url")
|
423
430
|
|
@@ -425,7 +432,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
425
432
|
@pulumi.getter
|
426
433
|
def username(self) -> str:
|
427
434
|
"""
|
428
|
-
The username to
|
435
|
+
The username to be used in the connection URL
|
429
436
|
"""
|
430
437
|
return pulumi.get(self, "username")
|
431
438
|
|
@@ -433,7 +440,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
433
440
|
@pulumi.getter(name="caCert")
|
434
441
|
def ca_cert(self) -> Optional[str]:
|
435
442
|
"""
|
436
|
-
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
443
|
+
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
437
444
|
"""
|
438
445
|
return pulumi.get(self, "ca_cert")
|
439
446
|
|
@@ -441,7 +448,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
441
448
|
@pulumi.getter(name="caPath")
|
442
449
|
def ca_path(self) -> Optional[str]:
|
443
450
|
"""
|
444
|
-
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
451
|
+
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
445
452
|
"""
|
446
453
|
return pulumi.get(self, "ca_path")
|
447
454
|
|
@@ -449,7 +456,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
449
456
|
@pulumi.getter(name="clientCert")
|
450
457
|
def client_cert(self) -> Optional[str]:
|
451
458
|
"""
|
452
|
-
The path to the certificate for the Elasticsearch client to present for communication
|
459
|
+
The path to the certificate for the Elasticsearch client to present for communication
|
453
460
|
"""
|
454
461
|
return pulumi.get(self, "client_cert")
|
455
462
|
|
@@ -457,7 +464,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
457
464
|
@pulumi.getter(name="clientKey")
|
458
465
|
def client_key(self) -> Optional[str]:
|
459
466
|
"""
|
460
|
-
The path to the key for the Elasticsearch client to use for communication
|
467
|
+
The path to the key for the Elasticsearch client to use for communication
|
461
468
|
"""
|
462
469
|
return pulumi.get(self, "client_key")
|
463
470
|
|
@@ -465,7 +472,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
465
472
|
@pulumi.getter
|
466
473
|
def insecure(self) -> Optional[bool]:
|
467
474
|
"""
|
468
|
-
Whether to disable certificate verification
|
475
|
+
Whether to disable certificate verification
|
469
476
|
"""
|
470
477
|
return pulumi.get(self, "insecure")
|
471
478
|
|
@@ -473,7 +480,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
473
480
|
@pulumi.getter(name="tlsServerName")
|
474
481
|
def tls_server_name(self) -> Optional[str]:
|
475
482
|
"""
|
476
|
-
This, if set, is used to set the SNI host when connecting via TLS
|
483
|
+
This, if set, is used to set the SNI host when connecting via TLS
|
477
484
|
"""
|
478
485
|
return pulumi.get(self, "tls_server_name")
|
479
486
|
|
@@ -522,19 +529,13 @@ class SecretBackendConnectionHana(dict):
|
|
522
529
|
password: Optional[str] = None,
|
523
530
|
username: Optional[str] = None):
|
524
531
|
"""
|
525
|
-
:param str connection_url:
|
526
|
-
|
527
|
-
|
528
|
-
|
529
|
-
:param
|
530
|
-
:param
|
531
|
-
|
532
|
-
:param int max_idle_connections: The maximum number of idle connections to
|
533
|
-
maintain.
|
534
|
-
:param int max_open_connections: The maximum number of open connections to
|
535
|
-
use.
|
536
|
-
:param str password: The password to authenticate with.
|
537
|
-
:param str username: The username to authenticate with.
|
532
|
+
:param str connection_url: Connection string to use to connect to the database.
|
533
|
+
:param bool disable_escaping: Disable special character escaping in username and password
|
534
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
535
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
536
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
537
|
+
:param str password: The root credential password used in the connection URL
|
538
|
+
:param str username: The root credential username used in the connection URL
|
538
539
|
"""
|
539
540
|
if connection_url is not None:
|
540
541
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -555,10 +556,7 @@ class SecretBackendConnectionHana(dict):
|
|
555
556
|
@pulumi.getter(name="connectionUrl")
|
556
557
|
def connection_url(self) -> Optional[str]:
|
557
558
|
"""
|
558
|
-
|
559
|
-
the [Vault
|
560
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
561
|
-
for an example.
|
559
|
+
Connection string to use to connect to the database.
|
562
560
|
"""
|
563
561
|
return pulumi.get(self, "connection_url")
|
564
562
|
|
@@ -566,7 +564,7 @@ class SecretBackendConnectionHana(dict):
|
|
566
564
|
@pulumi.getter(name="disableEscaping")
|
567
565
|
def disable_escaping(self) -> Optional[bool]:
|
568
566
|
"""
|
569
|
-
Disable special character escaping in username and password
|
567
|
+
Disable special character escaping in username and password
|
570
568
|
"""
|
571
569
|
return pulumi.get(self, "disable_escaping")
|
572
570
|
|
@@ -574,8 +572,7 @@ class SecretBackendConnectionHana(dict):
|
|
574
572
|
@pulumi.getter(name="maxConnectionLifetime")
|
575
573
|
def max_connection_lifetime(self) -> Optional[int]:
|
576
574
|
"""
|
577
|
-
|
578
|
-
a connection alive for.
|
575
|
+
Maximum number of seconds a connection may be reused.
|
579
576
|
"""
|
580
577
|
return pulumi.get(self, "max_connection_lifetime")
|
581
578
|
|
@@ -583,8 +580,7 @@ class SecretBackendConnectionHana(dict):
|
|
583
580
|
@pulumi.getter(name="maxIdleConnections")
|
584
581
|
def max_idle_connections(self) -> Optional[int]:
|
585
582
|
"""
|
586
|
-
|
587
|
-
maintain.
|
583
|
+
Maximum number of idle connections to the database.
|
588
584
|
"""
|
589
585
|
return pulumi.get(self, "max_idle_connections")
|
590
586
|
|
@@ -592,8 +588,7 @@ class SecretBackendConnectionHana(dict):
|
|
592
588
|
@pulumi.getter(name="maxOpenConnections")
|
593
589
|
def max_open_connections(self) -> Optional[int]:
|
594
590
|
"""
|
595
|
-
|
596
|
-
use.
|
591
|
+
Maximum number of open connections to the database.
|
597
592
|
"""
|
598
593
|
return pulumi.get(self, "max_open_connections")
|
599
594
|
|
@@ -601,7 +596,7 @@ class SecretBackendConnectionHana(dict):
|
|
601
596
|
@pulumi.getter
|
602
597
|
def password(self) -> Optional[str]:
|
603
598
|
"""
|
604
|
-
The password
|
599
|
+
The root credential password used in the connection URL
|
605
600
|
"""
|
606
601
|
return pulumi.get(self, "password")
|
607
602
|
|
@@ -609,7 +604,7 @@ class SecretBackendConnectionHana(dict):
|
|
609
604
|
@pulumi.getter
|
610
605
|
def username(self) -> Optional[str]:
|
611
606
|
"""
|
612
|
-
The username
|
607
|
+
The root credential username used in the connection URL
|
613
608
|
"""
|
614
609
|
return pulumi.get(self, "username")
|
615
610
|
|
@@ -653,19 +648,15 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
653
648
|
tls: Optional[bool] = None,
|
654
649
|
username_template: Optional[str] = None):
|
655
650
|
"""
|
656
|
-
:param str host:
|
657
|
-
:param str password:
|
658
|
-
:param str username:
|
659
|
-
:param int connect_timeout: The number of seconds to use as a connection
|
660
|
-
|
661
|
-
:param
|
662
|
-
|
663
|
-
:param
|
664
|
-
|
665
|
-
:param str pem_json: A JSON structure configuring the certificate chain.
|
666
|
-
:param int port: The default port to connect to if no port is specified as
|
667
|
-
part of the host.
|
668
|
-
:param bool tls: Whether to use TLS when connecting to Cassandra.
|
651
|
+
:param str host: Influxdb host to connect to.
|
652
|
+
:param str password: Specifies the password corresponding to the given username.
|
653
|
+
:param str username: Specifies the username to use for superuser access.
|
654
|
+
:param int connect_timeout: The number of seconds to use as a connection timeout.
|
655
|
+
:param bool insecure_tls: Whether to skip verification of the server certificate when using TLS.
|
656
|
+
:param str pem_bundle: Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
657
|
+
:param str pem_json: Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
658
|
+
:param int port: The transport port to use to connect to Influxdb.
|
659
|
+
:param bool tls: Whether to use TLS when connecting to Influxdb.
|
669
660
|
:param str username_template: Template describing how dynamic usernames are generated.
|
670
661
|
"""
|
671
662
|
pulumi.set(__self__, "host", host)
|
@@ -690,7 +681,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
690
681
|
@pulumi.getter
|
691
682
|
def host(self) -> str:
|
692
683
|
"""
|
693
|
-
|
684
|
+
Influxdb host to connect to.
|
694
685
|
"""
|
695
686
|
return pulumi.get(self, "host")
|
696
687
|
|
@@ -698,7 +689,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
698
689
|
@pulumi.getter
|
699
690
|
def password(self) -> str:
|
700
691
|
"""
|
701
|
-
|
692
|
+
Specifies the password corresponding to the given username.
|
702
693
|
"""
|
703
694
|
return pulumi.get(self, "password")
|
704
695
|
|
@@ -706,7 +697,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
706
697
|
@pulumi.getter
|
707
698
|
def username(self) -> str:
|
708
699
|
"""
|
709
|
-
|
700
|
+
Specifies the username to use for superuser access.
|
710
701
|
"""
|
711
702
|
return pulumi.get(self, "username")
|
712
703
|
|
@@ -714,8 +705,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
714
705
|
@pulumi.getter(name="connectTimeout")
|
715
706
|
def connect_timeout(self) -> Optional[int]:
|
716
707
|
"""
|
717
|
-
The number of seconds to use as a connection
|
718
|
-
timeout.
|
708
|
+
The number of seconds to use as a connection timeout.
|
719
709
|
"""
|
720
710
|
return pulumi.get(self, "connect_timeout")
|
721
711
|
|
@@ -723,8 +713,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
723
713
|
@pulumi.getter(name="insecureTls")
|
724
714
|
def insecure_tls(self) -> Optional[bool]:
|
725
715
|
"""
|
726
|
-
Whether to skip verification of the server
|
727
|
-
certificate when using TLS.
|
716
|
+
Whether to skip verification of the server certificate when using TLS.
|
728
717
|
"""
|
729
718
|
return pulumi.get(self, "insecure_tls")
|
730
719
|
|
@@ -732,8 +721,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
732
721
|
@pulumi.getter(name="pemBundle")
|
733
722
|
def pem_bundle(self) -> Optional[str]:
|
734
723
|
"""
|
735
|
-
Concatenated PEM blocks
|
736
|
-
chain.
|
724
|
+
Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
737
725
|
"""
|
738
726
|
return pulumi.get(self, "pem_bundle")
|
739
727
|
|
@@ -741,7 +729,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
741
729
|
@pulumi.getter(name="pemJson")
|
742
730
|
def pem_json(self) -> Optional[str]:
|
743
731
|
"""
|
744
|
-
|
732
|
+
Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
745
733
|
"""
|
746
734
|
return pulumi.get(self, "pem_json")
|
747
735
|
|
@@ -749,8 +737,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
749
737
|
@pulumi.getter
|
750
738
|
def port(self) -> Optional[int]:
|
751
739
|
"""
|
752
|
-
The
|
753
|
-
part of the host.
|
740
|
+
The transport port to use to connect to Influxdb.
|
754
741
|
"""
|
755
742
|
return pulumi.get(self, "port")
|
756
743
|
|
@@ -758,7 +745,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
758
745
|
@pulumi.getter
|
759
746
|
def tls(self) -> Optional[bool]:
|
760
747
|
"""
|
761
|
-
Whether to use TLS when connecting to
|
748
|
+
Whether to use TLS when connecting to Influxdb.
|
762
749
|
"""
|
763
750
|
return pulumi.get(self, "tls")
|
764
751
|
|
@@ -807,19 +794,13 @@ class SecretBackendConnectionMongodb(dict):
|
|
807
794
|
username: Optional[str] = None,
|
808
795
|
username_template: Optional[str] = None):
|
809
796
|
"""
|
810
|
-
:param str connection_url:
|
811
|
-
|
812
|
-
|
813
|
-
|
814
|
-
:param
|
815
|
-
|
816
|
-
:param
|
817
|
-
maintain.
|
818
|
-
:param int max_open_connections: The maximum number of open connections to
|
819
|
-
use.
|
820
|
-
:param str password: The password to authenticate with.
|
821
|
-
:param str username: The username to authenticate with.
|
822
|
-
:param str username_template: Template describing how dynamic usernames are generated.
|
797
|
+
:param str connection_url: Connection string to use to connect to the database.
|
798
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
799
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
800
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
801
|
+
:param str password: The root credential password used in the connection URL
|
802
|
+
:param str username: The root credential username used in the connection URL
|
803
|
+
:param str username_template: Username generation template.
|
823
804
|
"""
|
824
805
|
if connection_url is not None:
|
825
806
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -840,10 +821,7 @@ class SecretBackendConnectionMongodb(dict):
|
|
840
821
|
@pulumi.getter(name="connectionUrl")
|
841
822
|
def connection_url(self) -> Optional[str]:
|
842
823
|
"""
|
843
|
-
|
844
|
-
the [Vault
|
845
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
846
|
-
for an example.
|
824
|
+
Connection string to use to connect to the database.
|
847
825
|
"""
|
848
826
|
return pulumi.get(self, "connection_url")
|
849
827
|
|
@@ -851,8 +829,7 @@ class SecretBackendConnectionMongodb(dict):
|
|
851
829
|
@pulumi.getter(name="maxConnectionLifetime")
|
852
830
|
def max_connection_lifetime(self) -> Optional[int]:
|
853
831
|
"""
|
854
|
-
|
855
|
-
a connection alive for.
|
832
|
+
Maximum number of seconds a connection may be reused.
|
856
833
|
"""
|
857
834
|
return pulumi.get(self, "max_connection_lifetime")
|
858
835
|
|
@@ -860,8 +837,7 @@ class SecretBackendConnectionMongodb(dict):
|
|
860
837
|
@pulumi.getter(name="maxIdleConnections")
|
861
838
|
def max_idle_connections(self) -> Optional[int]:
|
862
839
|
"""
|
863
|
-
|
864
|
-
maintain.
|
840
|
+
Maximum number of idle connections to the database.
|
865
841
|
"""
|
866
842
|
return pulumi.get(self, "max_idle_connections")
|
867
843
|
|
@@ -869,8 +845,7 @@ class SecretBackendConnectionMongodb(dict):
|
|
869
845
|
@pulumi.getter(name="maxOpenConnections")
|
870
846
|
def max_open_connections(self) -> Optional[int]:
|
871
847
|
"""
|
872
|
-
|
873
|
-
use.
|
848
|
+
Maximum number of open connections to the database.
|
874
849
|
"""
|
875
850
|
return pulumi.get(self, "max_open_connections")
|
876
851
|
|
@@ -878,7 +853,7 @@ class SecretBackendConnectionMongodb(dict):
|
|
878
853
|
@pulumi.getter
|
879
854
|
def password(self) -> Optional[str]:
|
880
855
|
"""
|
881
|
-
The password
|
856
|
+
The root credential password used in the connection URL
|
882
857
|
"""
|
883
858
|
return pulumi.get(self, "password")
|
884
859
|
|
@@ -886,7 +861,7 @@ class SecretBackendConnectionMongodb(dict):
|
|
886
861
|
@pulumi.getter
|
887
862
|
def username(self) -> Optional[str]:
|
888
863
|
"""
|
889
|
-
The username
|
864
|
+
The root credential username used in the connection URL
|
890
865
|
"""
|
891
866
|
return pulumi.get(self, "username")
|
892
867
|
|
@@ -894,7 +869,7 @@ class SecretBackendConnectionMongodb(dict):
|
|
894
869
|
@pulumi.getter(name="usernameTemplate")
|
895
870
|
def username_template(self) -> Optional[str]:
|
896
871
|
"""
|
897
|
-
|
872
|
+
Username generation template.
|
898
873
|
"""
|
899
874
|
return pulumi.get(self, "username_template")
|
900
875
|
|
@@ -1002,24 +977,15 @@ class SecretBackendConnectionMssql(dict):
|
|
1002
977
|
username: Optional[str] = None,
|
1003
978
|
username_template: Optional[str] = None):
|
1004
979
|
"""
|
1005
|
-
:param str connection_url:
|
1006
|
-
|
1007
|
-
|
1008
|
-
|
1009
|
-
:param
|
1010
|
-
|
1011
|
-
|
1012
|
-
|
1013
|
-
:param
|
1014
|
-
:param int max_connection_lifetime: The maximum number of seconds to keep
|
1015
|
-
a connection alive for.
|
1016
|
-
:param int max_idle_connections: The maximum number of idle connections to
|
1017
|
-
maintain.
|
1018
|
-
:param int max_open_connections: The maximum number of open connections to
|
1019
|
-
use.
|
1020
|
-
:param str password: The password to authenticate with.
|
1021
|
-
:param str username: The username to authenticate with.
|
1022
|
-
:param str username_template: Template describing how dynamic usernames are generated.
|
980
|
+
:param str connection_url: Connection string to use to connect to the database.
|
981
|
+
:param bool contained_db: Set to true when the target is a Contained Database, e.g. AzureSQL.
|
982
|
+
:param bool disable_escaping: Disable special character escaping in username and password
|
983
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
984
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
985
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
986
|
+
:param str password: The root credential password used in the connection URL
|
987
|
+
:param str username: The root credential username used in the connection URL
|
988
|
+
:param str username_template: Username generation template.
|
1023
989
|
"""
|
1024
990
|
if connection_url is not None:
|
1025
991
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -1044,10 +1010,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1044
1010
|
@pulumi.getter(name="connectionUrl")
|
1045
1011
|
def connection_url(self) -> Optional[str]:
|
1046
1012
|
"""
|
1047
|
-
|
1048
|
-
the [Vault
|
1049
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1050
|
-
for an example.
|
1013
|
+
Connection string to use to connect to the database.
|
1051
1014
|
"""
|
1052
1015
|
return pulumi.get(self, "connection_url")
|
1053
1016
|
|
@@ -1055,10 +1018,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1055
1018
|
@pulumi.getter(name="containedDb")
|
1056
1019
|
def contained_db(self) -> Optional[bool]:
|
1057
1020
|
"""
|
1058
|
-
|
1059
|
-
Contained Database, e.g. AzureSQL.
|
1060
|
-
See the [Vault
|
1061
|
-
docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
|
1021
|
+
Set to true when the target is a Contained Database, e.g. AzureSQL.
|
1062
1022
|
"""
|
1063
1023
|
return pulumi.get(self, "contained_db")
|
1064
1024
|
|
@@ -1066,7 +1026,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1066
1026
|
@pulumi.getter(name="disableEscaping")
|
1067
1027
|
def disable_escaping(self) -> Optional[bool]:
|
1068
1028
|
"""
|
1069
|
-
Disable special character escaping in username and password
|
1029
|
+
Disable special character escaping in username and password
|
1070
1030
|
"""
|
1071
1031
|
return pulumi.get(self, "disable_escaping")
|
1072
1032
|
|
@@ -1074,8 +1034,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1074
1034
|
@pulumi.getter(name="maxConnectionLifetime")
|
1075
1035
|
def max_connection_lifetime(self) -> Optional[int]:
|
1076
1036
|
"""
|
1077
|
-
|
1078
|
-
a connection alive for.
|
1037
|
+
Maximum number of seconds a connection may be reused.
|
1079
1038
|
"""
|
1080
1039
|
return pulumi.get(self, "max_connection_lifetime")
|
1081
1040
|
|
@@ -1083,8 +1042,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1083
1042
|
@pulumi.getter(name="maxIdleConnections")
|
1084
1043
|
def max_idle_connections(self) -> Optional[int]:
|
1085
1044
|
"""
|
1086
|
-
|
1087
|
-
maintain.
|
1045
|
+
Maximum number of idle connections to the database.
|
1088
1046
|
"""
|
1089
1047
|
return pulumi.get(self, "max_idle_connections")
|
1090
1048
|
|
@@ -1092,8 +1050,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1092
1050
|
@pulumi.getter(name="maxOpenConnections")
|
1093
1051
|
def max_open_connections(self) -> Optional[int]:
|
1094
1052
|
"""
|
1095
|
-
|
1096
|
-
use.
|
1053
|
+
Maximum number of open connections to the database.
|
1097
1054
|
"""
|
1098
1055
|
return pulumi.get(self, "max_open_connections")
|
1099
1056
|
|
@@ -1101,7 +1058,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1101
1058
|
@pulumi.getter
|
1102
1059
|
def password(self) -> Optional[str]:
|
1103
1060
|
"""
|
1104
|
-
The password
|
1061
|
+
The root credential password used in the connection URL
|
1105
1062
|
"""
|
1106
1063
|
return pulumi.get(self, "password")
|
1107
1064
|
|
@@ -1109,7 +1066,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1109
1066
|
@pulumi.getter
|
1110
1067
|
def username(self) -> Optional[str]:
|
1111
1068
|
"""
|
1112
|
-
The username
|
1069
|
+
The root credential username used in the connection URL
|
1113
1070
|
"""
|
1114
1071
|
return pulumi.get(self, "username")
|
1115
1072
|
|
@@ -1117,7 +1074,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1117
1074
|
@pulumi.getter(name="usernameTemplate")
|
1118
1075
|
def username_template(self) -> Optional[str]:
|
1119
1076
|
"""
|
1120
|
-
|
1077
|
+
Username generation template.
|
1121
1078
|
"""
|
1122
1079
|
return pulumi.get(self, "username_template")
|
1123
1080
|
|
@@ -1170,23 +1127,17 @@ class SecretBackendConnectionMysql(dict):
|
|
1170
1127
|
username: Optional[str] = None,
|
1171
1128
|
username_template: Optional[str] = None):
|
1172
1129
|
"""
|
1173
|
-
:param str auth_type:
|
1174
|
-
:param str connection_url:
|
1175
|
-
|
1176
|
-
|
1177
|
-
|
1178
|
-
:param
|
1179
|
-
|
1180
|
-
:param int max_idle_connections: The maximum number of idle connections to
|
1181
|
-
maintain.
|
1182
|
-
:param int max_open_connections: The maximum number of open connections to
|
1183
|
-
use.
|
1184
|
-
:param str password: The password to authenticate with.
|
1185
|
-
:param str service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1130
|
+
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1131
|
+
:param str connection_url: Connection string to use to connect to the database.
|
1132
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
1133
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
1134
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
1135
|
+
:param str password: The root credential password used in the connection URL
|
1136
|
+
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
1186
1137
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1187
1138
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1188
|
-
:param str username: The username
|
1189
|
-
:param str username_template:
|
1139
|
+
:param str username: The root credential username used in the connection URL
|
1140
|
+
:param str username_template: Username generation template.
|
1190
1141
|
"""
|
1191
1142
|
if auth_type is not None:
|
1192
1143
|
pulumi.set(__self__, "auth_type", auth_type)
|
@@ -1215,7 +1166,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1215
1166
|
@pulumi.getter(name="authType")
|
1216
1167
|
def auth_type(self) -> Optional[str]:
|
1217
1168
|
"""
|
1218
|
-
|
1169
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1219
1170
|
"""
|
1220
1171
|
return pulumi.get(self, "auth_type")
|
1221
1172
|
|
@@ -1223,10 +1174,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1223
1174
|
@pulumi.getter(name="connectionUrl")
|
1224
1175
|
def connection_url(self) -> Optional[str]:
|
1225
1176
|
"""
|
1226
|
-
|
1227
|
-
the [Vault
|
1228
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1229
|
-
for an example.
|
1177
|
+
Connection string to use to connect to the database.
|
1230
1178
|
"""
|
1231
1179
|
return pulumi.get(self, "connection_url")
|
1232
1180
|
|
@@ -1234,8 +1182,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1234
1182
|
@pulumi.getter(name="maxConnectionLifetime")
|
1235
1183
|
def max_connection_lifetime(self) -> Optional[int]:
|
1236
1184
|
"""
|
1237
|
-
|
1238
|
-
a connection alive for.
|
1185
|
+
Maximum number of seconds a connection may be reused.
|
1239
1186
|
"""
|
1240
1187
|
return pulumi.get(self, "max_connection_lifetime")
|
1241
1188
|
|
@@ -1243,8 +1190,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1243
1190
|
@pulumi.getter(name="maxIdleConnections")
|
1244
1191
|
def max_idle_connections(self) -> Optional[int]:
|
1245
1192
|
"""
|
1246
|
-
|
1247
|
-
maintain.
|
1193
|
+
Maximum number of idle connections to the database.
|
1248
1194
|
"""
|
1249
1195
|
return pulumi.get(self, "max_idle_connections")
|
1250
1196
|
|
@@ -1252,8 +1198,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1252
1198
|
@pulumi.getter(name="maxOpenConnections")
|
1253
1199
|
def max_open_connections(self) -> Optional[int]:
|
1254
1200
|
"""
|
1255
|
-
|
1256
|
-
use.
|
1201
|
+
Maximum number of open connections to the database.
|
1257
1202
|
"""
|
1258
1203
|
return pulumi.get(self, "max_open_connections")
|
1259
1204
|
|
@@ -1261,7 +1206,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1261
1206
|
@pulumi.getter
|
1262
1207
|
def password(self) -> Optional[str]:
|
1263
1208
|
"""
|
1264
|
-
The password
|
1209
|
+
The root credential password used in the connection URL
|
1265
1210
|
"""
|
1266
1211
|
return pulumi.get(self, "password")
|
1267
1212
|
|
@@ -1269,7 +1214,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1269
1214
|
@pulumi.getter(name="serviceAccountJson")
|
1270
1215
|
def service_account_json(self) -> Optional[str]:
|
1271
1216
|
"""
|
1272
|
-
JSON
|
1217
|
+
A JSON encoded credential for use with IAM authorization
|
1273
1218
|
"""
|
1274
1219
|
return pulumi.get(self, "service_account_json")
|
1275
1220
|
|
@@ -1293,7 +1238,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1293
1238
|
@pulumi.getter
|
1294
1239
|
def username(self) -> Optional[str]:
|
1295
1240
|
"""
|
1296
|
-
The username
|
1241
|
+
The root credential username used in the connection URL
|
1297
1242
|
"""
|
1298
1243
|
return pulumi.get(self, "username")
|
1299
1244
|
|
@@ -1301,7 +1246,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1301
1246
|
@pulumi.getter(name="usernameTemplate")
|
1302
1247
|
def username_template(self) -> Optional[str]:
|
1303
1248
|
"""
|
1304
|
-
|
1249
|
+
Username generation template.
|
1305
1250
|
"""
|
1306
1251
|
return pulumi.get(self, "username_template")
|
1307
1252
|
|
@@ -1354,23 +1299,17 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1354
1299
|
username: Optional[str] = None,
|
1355
1300
|
username_template: Optional[str] = None):
|
1356
1301
|
"""
|
1357
|
-
:param str auth_type:
|
1358
|
-
:param str connection_url:
|
1359
|
-
|
1360
|
-
|
1361
|
-
|
1362
|
-
:param
|
1363
|
-
|
1364
|
-
:param int max_idle_connections: The maximum number of idle connections to
|
1365
|
-
maintain.
|
1366
|
-
:param int max_open_connections: The maximum number of open connections to
|
1367
|
-
use.
|
1368
|
-
:param str password: The password to authenticate with.
|
1369
|
-
:param str service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1302
|
+
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1303
|
+
:param str connection_url: Connection string to use to connect to the database.
|
1304
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
1305
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
1306
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
1307
|
+
:param str password: The root credential password used in the connection URL
|
1308
|
+
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
1370
1309
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1371
1310
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1372
|
-
:param str username: The username
|
1373
|
-
:param str username_template:
|
1311
|
+
:param str username: The root credential username used in the connection URL
|
1312
|
+
:param str username_template: Username generation template.
|
1374
1313
|
"""
|
1375
1314
|
if auth_type is not None:
|
1376
1315
|
pulumi.set(__self__, "auth_type", auth_type)
|
@@ -1399,7 +1338,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1399
1338
|
@pulumi.getter(name="authType")
|
1400
1339
|
def auth_type(self) -> Optional[str]:
|
1401
1340
|
"""
|
1402
|
-
|
1341
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1403
1342
|
"""
|
1404
1343
|
return pulumi.get(self, "auth_type")
|
1405
1344
|
|
@@ -1407,10 +1346,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1407
1346
|
@pulumi.getter(name="connectionUrl")
|
1408
1347
|
def connection_url(self) -> Optional[str]:
|
1409
1348
|
"""
|
1410
|
-
|
1411
|
-
the [Vault
|
1412
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1413
|
-
for an example.
|
1349
|
+
Connection string to use to connect to the database.
|
1414
1350
|
"""
|
1415
1351
|
return pulumi.get(self, "connection_url")
|
1416
1352
|
|
@@ -1418,8 +1354,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1418
1354
|
@pulumi.getter(name="maxConnectionLifetime")
|
1419
1355
|
def max_connection_lifetime(self) -> Optional[int]:
|
1420
1356
|
"""
|
1421
|
-
|
1422
|
-
a connection alive for.
|
1357
|
+
Maximum number of seconds a connection may be reused.
|
1423
1358
|
"""
|
1424
1359
|
return pulumi.get(self, "max_connection_lifetime")
|
1425
1360
|
|
@@ -1427,8 +1362,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1427
1362
|
@pulumi.getter(name="maxIdleConnections")
|
1428
1363
|
def max_idle_connections(self) -> Optional[int]:
|
1429
1364
|
"""
|
1430
|
-
|
1431
|
-
maintain.
|
1365
|
+
Maximum number of idle connections to the database.
|
1432
1366
|
"""
|
1433
1367
|
return pulumi.get(self, "max_idle_connections")
|
1434
1368
|
|
@@ -1436,8 +1370,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1436
1370
|
@pulumi.getter(name="maxOpenConnections")
|
1437
1371
|
def max_open_connections(self) -> Optional[int]:
|
1438
1372
|
"""
|
1439
|
-
|
1440
|
-
use.
|
1373
|
+
Maximum number of open connections to the database.
|
1441
1374
|
"""
|
1442
1375
|
return pulumi.get(self, "max_open_connections")
|
1443
1376
|
|
@@ -1445,7 +1378,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1445
1378
|
@pulumi.getter
|
1446
1379
|
def password(self) -> Optional[str]:
|
1447
1380
|
"""
|
1448
|
-
The password
|
1381
|
+
The root credential password used in the connection URL
|
1449
1382
|
"""
|
1450
1383
|
return pulumi.get(self, "password")
|
1451
1384
|
|
@@ -1453,7 +1386,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1453
1386
|
@pulumi.getter(name="serviceAccountJson")
|
1454
1387
|
def service_account_json(self) -> Optional[str]:
|
1455
1388
|
"""
|
1456
|
-
JSON
|
1389
|
+
A JSON encoded credential for use with IAM authorization
|
1457
1390
|
"""
|
1458
1391
|
return pulumi.get(self, "service_account_json")
|
1459
1392
|
|
@@ -1477,7 +1410,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1477
1410
|
@pulumi.getter
|
1478
1411
|
def username(self) -> Optional[str]:
|
1479
1412
|
"""
|
1480
|
-
The username
|
1413
|
+
The root credential username used in the connection URL
|
1481
1414
|
"""
|
1482
1415
|
return pulumi.get(self, "username")
|
1483
1416
|
|
@@ -1485,7 +1418,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1485
1418
|
@pulumi.getter(name="usernameTemplate")
|
1486
1419
|
def username_template(self) -> Optional[str]:
|
1487
1420
|
"""
|
1488
|
-
|
1421
|
+
Username generation template.
|
1489
1422
|
"""
|
1490
1423
|
return pulumi.get(self, "username_template")
|
1491
1424
|
|
@@ -1538,23 +1471,17 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1538
1471
|
username: Optional[str] = None,
|
1539
1472
|
username_template: Optional[str] = None):
|
1540
1473
|
"""
|
1541
|
-
:param str auth_type:
|
1542
|
-
:param str connection_url:
|
1543
|
-
|
1544
|
-
|
1545
|
-
|
1546
|
-
:param
|
1547
|
-
|
1548
|
-
:param int max_idle_connections: The maximum number of idle connections to
|
1549
|
-
maintain.
|
1550
|
-
:param int max_open_connections: The maximum number of open connections to
|
1551
|
-
use.
|
1552
|
-
:param str password: The password to authenticate with.
|
1553
|
-
:param str service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1474
|
+
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1475
|
+
:param str connection_url: Connection string to use to connect to the database.
|
1476
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
1477
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
1478
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
1479
|
+
:param str password: The root credential password used in the connection URL
|
1480
|
+
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
1554
1481
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1555
1482
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1556
|
-
:param str username: The username
|
1557
|
-
:param str username_template:
|
1483
|
+
:param str username: The root credential username used in the connection URL
|
1484
|
+
:param str username_template: Username generation template.
|
1558
1485
|
"""
|
1559
1486
|
if auth_type is not None:
|
1560
1487
|
pulumi.set(__self__, "auth_type", auth_type)
|
@@ -1583,7 +1510,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1583
1510
|
@pulumi.getter(name="authType")
|
1584
1511
|
def auth_type(self) -> Optional[str]:
|
1585
1512
|
"""
|
1586
|
-
|
1513
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1587
1514
|
"""
|
1588
1515
|
return pulumi.get(self, "auth_type")
|
1589
1516
|
|
@@ -1591,10 +1518,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1591
1518
|
@pulumi.getter(name="connectionUrl")
|
1592
1519
|
def connection_url(self) -> Optional[str]:
|
1593
1520
|
"""
|
1594
|
-
|
1595
|
-
the [Vault
|
1596
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1597
|
-
for an example.
|
1521
|
+
Connection string to use to connect to the database.
|
1598
1522
|
"""
|
1599
1523
|
return pulumi.get(self, "connection_url")
|
1600
1524
|
|
@@ -1602,8 +1526,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1602
1526
|
@pulumi.getter(name="maxConnectionLifetime")
|
1603
1527
|
def max_connection_lifetime(self) -> Optional[int]:
|
1604
1528
|
"""
|
1605
|
-
|
1606
|
-
a connection alive for.
|
1529
|
+
Maximum number of seconds a connection may be reused.
|
1607
1530
|
"""
|
1608
1531
|
return pulumi.get(self, "max_connection_lifetime")
|
1609
1532
|
|
@@ -1611,8 +1534,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1611
1534
|
@pulumi.getter(name="maxIdleConnections")
|
1612
1535
|
def max_idle_connections(self) -> Optional[int]:
|
1613
1536
|
"""
|
1614
|
-
|
1615
|
-
maintain.
|
1537
|
+
Maximum number of idle connections to the database.
|
1616
1538
|
"""
|
1617
1539
|
return pulumi.get(self, "max_idle_connections")
|
1618
1540
|
|
@@ -1620,8 +1542,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1620
1542
|
@pulumi.getter(name="maxOpenConnections")
|
1621
1543
|
def max_open_connections(self) -> Optional[int]:
|
1622
1544
|
"""
|
1623
|
-
|
1624
|
-
use.
|
1545
|
+
Maximum number of open connections to the database.
|
1625
1546
|
"""
|
1626
1547
|
return pulumi.get(self, "max_open_connections")
|
1627
1548
|
|
@@ -1629,7 +1550,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1629
1550
|
@pulumi.getter
|
1630
1551
|
def password(self) -> Optional[str]:
|
1631
1552
|
"""
|
1632
|
-
The password
|
1553
|
+
The root credential password used in the connection URL
|
1633
1554
|
"""
|
1634
1555
|
return pulumi.get(self, "password")
|
1635
1556
|
|
@@ -1637,7 +1558,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1637
1558
|
@pulumi.getter(name="serviceAccountJson")
|
1638
1559
|
def service_account_json(self) -> Optional[str]:
|
1639
1560
|
"""
|
1640
|
-
JSON
|
1561
|
+
A JSON encoded credential for use with IAM authorization
|
1641
1562
|
"""
|
1642
1563
|
return pulumi.get(self, "service_account_json")
|
1643
1564
|
|
@@ -1661,7 +1582,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1661
1582
|
@pulumi.getter
|
1662
1583
|
def username(self) -> Optional[str]:
|
1663
1584
|
"""
|
1664
|
-
The username
|
1585
|
+
The root credential username used in the connection URL
|
1665
1586
|
"""
|
1666
1587
|
return pulumi.get(self, "username")
|
1667
1588
|
|
@@ -1669,7 +1590,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1669
1590
|
@pulumi.getter(name="usernameTemplate")
|
1670
1591
|
def username_template(self) -> Optional[str]:
|
1671
1592
|
"""
|
1672
|
-
|
1593
|
+
Username generation template.
|
1673
1594
|
"""
|
1674
1595
|
return pulumi.get(self, "username_template")
|
1675
1596
|
|
@@ -1722,23 +1643,17 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1722
1643
|
username: Optional[str] = None,
|
1723
1644
|
username_template: Optional[str] = None):
|
1724
1645
|
"""
|
1725
|
-
:param str auth_type:
|
1726
|
-
:param str connection_url:
|
1727
|
-
|
1728
|
-
|
1729
|
-
|
1730
|
-
:param
|
1731
|
-
|
1732
|
-
:param int max_idle_connections: The maximum number of idle connections to
|
1733
|
-
maintain.
|
1734
|
-
:param int max_open_connections: The maximum number of open connections to
|
1735
|
-
use.
|
1736
|
-
:param str password: The password to authenticate with.
|
1737
|
-
:param str service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1646
|
+
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1647
|
+
:param str connection_url: Connection string to use to connect to the database.
|
1648
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
1649
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
1650
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
1651
|
+
:param str password: The root credential password used in the connection URL
|
1652
|
+
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
1738
1653
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1739
1654
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1740
|
-
:param str username: The username
|
1741
|
-
:param str username_template:
|
1655
|
+
:param str username: The root credential username used in the connection URL
|
1656
|
+
:param str username_template: Username generation template.
|
1742
1657
|
"""
|
1743
1658
|
if auth_type is not None:
|
1744
1659
|
pulumi.set(__self__, "auth_type", auth_type)
|
@@ -1767,7 +1682,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1767
1682
|
@pulumi.getter(name="authType")
|
1768
1683
|
def auth_type(self) -> Optional[str]:
|
1769
1684
|
"""
|
1770
|
-
|
1685
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1771
1686
|
"""
|
1772
1687
|
return pulumi.get(self, "auth_type")
|
1773
1688
|
|
@@ -1775,10 +1690,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1775
1690
|
@pulumi.getter(name="connectionUrl")
|
1776
1691
|
def connection_url(self) -> Optional[str]:
|
1777
1692
|
"""
|
1778
|
-
|
1779
|
-
the [Vault
|
1780
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1781
|
-
for an example.
|
1693
|
+
Connection string to use to connect to the database.
|
1782
1694
|
"""
|
1783
1695
|
return pulumi.get(self, "connection_url")
|
1784
1696
|
|
@@ -1786,8 +1698,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1786
1698
|
@pulumi.getter(name="maxConnectionLifetime")
|
1787
1699
|
def max_connection_lifetime(self) -> Optional[int]:
|
1788
1700
|
"""
|
1789
|
-
|
1790
|
-
a connection alive for.
|
1701
|
+
Maximum number of seconds a connection may be reused.
|
1791
1702
|
"""
|
1792
1703
|
return pulumi.get(self, "max_connection_lifetime")
|
1793
1704
|
|
@@ -1795,8 +1706,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1795
1706
|
@pulumi.getter(name="maxIdleConnections")
|
1796
1707
|
def max_idle_connections(self) -> Optional[int]:
|
1797
1708
|
"""
|
1798
|
-
|
1799
|
-
maintain.
|
1709
|
+
Maximum number of idle connections to the database.
|
1800
1710
|
"""
|
1801
1711
|
return pulumi.get(self, "max_idle_connections")
|
1802
1712
|
|
@@ -1804,8 +1714,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1804
1714
|
@pulumi.getter(name="maxOpenConnections")
|
1805
1715
|
def max_open_connections(self) -> Optional[int]:
|
1806
1716
|
"""
|
1807
|
-
|
1808
|
-
use.
|
1717
|
+
Maximum number of open connections to the database.
|
1809
1718
|
"""
|
1810
1719
|
return pulumi.get(self, "max_open_connections")
|
1811
1720
|
|
@@ -1813,7 +1722,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1813
1722
|
@pulumi.getter
|
1814
1723
|
def password(self) -> Optional[str]:
|
1815
1724
|
"""
|
1816
|
-
The password
|
1725
|
+
The root credential password used in the connection URL
|
1817
1726
|
"""
|
1818
1727
|
return pulumi.get(self, "password")
|
1819
1728
|
|
@@ -1821,7 +1730,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1821
1730
|
@pulumi.getter(name="serviceAccountJson")
|
1822
1731
|
def service_account_json(self) -> Optional[str]:
|
1823
1732
|
"""
|
1824
|
-
JSON
|
1733
|
+
A JSON encoded credential for use with IAM authorization
|
1825
1734
|
"""
|
1826
1735
|
return pulumi.get(self, "service_account_json")
|
1827
1736
|
|
@@ -1845,7 +1754,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1845
1754
|
@pulumi.getter
|
1846
1755
|
def username(self) -> Optional[str]:
|
1847
1756
|
"""
|
1848
|
-
The username
|
1757
|
+
The root credential username used in the connection URL
|
1849
1758
|
"""
|
1850
1759
|
return pulumi.get(self, "username")
|
1851
1760
|
|
@@ -1853,7 +1762,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1853
1762
|
@pulumi.getter(name="usernameTemplate")
|
1854
1763
|
def username_template(self) -> Optional[str]:
|
1855
1764
|
"""
|
1856
|
-
|
1765
|
+
Username generation template.
|
1857
1766
|
"""
|
1858
1767
|
return pulumi.get(self, "username_template")
|
1859
1768
|
|
@@ -1900,21 +1809,15 @@ class SecretBackendConnectionOracle(dict):
|
|
1900
1809
|
username: Optional[str] = None,
|
1901
1810
|
username_template: Optional[str] = None):
|
1902
1811
|
"""
|
1903
|
-
:param str connection_url:
|
1904
|
-
|
1905
|
-
|
1906
|
-
|
1907
|
-
:param
|
1908
|
-
:param
|
1909
|
-
|
1910
|
-
:param
|
1911
|
-
|
1912
|
-
:param int max_open_connections: The maximum number of open connections to
|
1913
|
-
use.
|
1914
|
-
:param str password: The password to authenticate with.
|
1915
|
-
:param bool split_statements: Enable spliting statements after semi-colons.
|
1916
|
-
:param str username: The username to authenticate with.
|
1917
|
-
:param str username_template: Template describing how dynamic usernames are generated.
|
1812
|
+
:param str connection_url: Connection string to use to connect to the database.
|
1813
|
+
:param bool disconnect_sessions: Set to true to disconnect any open sessions prior to running the revocation statements.
|
1814
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
1815
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
1816
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
1817
|
+
:param str password: The root credential password used in the connection URL
|
1818
|
+
:param bool split_statements: Set to true in order to split statements after semi-colons.
|
1819
|
+
:param str username: The root credential username used in the connection URL
|
1820
|
+
:param str username_template: Username generation template.
|
1918
1821
|
"""
|
1919
1822
|
if connection_url is not None:
|
1920
1823
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -1939,10 +1842,7 @@ class SecretBackendConnectionOracle(dict):
|
|
1939
1842
|
@pulumi.getter(name="connectionUrl")
|
1940
1843
|
def connection_url(self) -> Optional[str]:
|
1941
1844
|
"""
|
1942
|
-
|
1943
|
-
the [Vault
|
1944
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1945
|
-
for an example.
|
1845
|
+
Connection string to use to connect to the database.
|
1946
1846
|
"""
|
1947
1847
|
return pulumi.get(self, "connection_url")
|
1948
1848
|
|
@@ -1950,7 +1850,7 @@ class SecretBackendConnectionOracle(dict):
|
|
1950
1850
|
@pulumi.getter(name="disconnectSessions")
|
1951
1851
|
def disconnect_sessions(self) -> Optional[bool]:
|
1952
1852
|
"""
|
1953
|
-
|
1853
|
+
Set to true to disconnect any open sessions prior to running the revocation statements.
|
1954
1854
|
"""
|
1955
1855
|
return pulumi.get(self, "disconnect_sessions")
|
1956
1856
|
|
@@ -1958,8 +1858,7 @@ class SecretBackendConnectionOracle(dict):
|
|
1958
1858
|
@pulumi.getter(name="maxConnectionLifetime")
|
1959
1859
|
def max_connection_lifetime(self) -> Optional[int]:
|
1960
1860
|
"""
|
1961
|
-
|
1962
|
-
a connection alive for.
|
1861
|
+
Maximum number of seconds a connection may be reused.
|
1963
1862
|
"""
|
1964
1863
|
return pulumi.get(self, "max_connection_lifetime")
|
1965
1864
|
|
@@ -1967,8 +1866,7 @@ class SecretBackendConnectionOracle(dict):
|
|
1967
1866
|
@pulumi.getter(name="maxIdleConnections")
|
1968
1867
|
def max_idle_connections(self) -> Optional[int]:
|
1969
1868
|
"""
|
1970
|
-
|
1971
|
-
maintain.
|
1869
|
+
Maximum number of idle connections to the database.
|
1972
1870
|
"""
|
1973
1871
|
return pulumi.get(self, "max_idle_connections")
|
1974
1872
|
|
@@ -1976,8 +1874,7 @@ class SecretBackendConnectionOracle(dict):
|
|
1976
1874
|
@pulumi.getter(name="maxOpenConnections")
|
1977
1875
|
def max_open_connections(self) -> Optional[int]:
|
1978
1876
|
"""
|
1979
|
-
|
1980
|
-
use.
|
1877
|
+
Maximum number of open connections to the database.
|
1981
1878
|
"""
|
1982
1879
|
return pulumi.get(self, "max_open_connections")
|
1983
1880
|
|
@@ -1985,7 +1882,7 @@ class SecretBackendConnectionOracle(dict):
|
|
1985
1882
|
@pulumi.getter
|
1986
1883
|
def password(self) -> Optional[str]:
|
1987
1884
|
"""
|
1988
|
-
The password
|
1885
|
+
The root credential password used in the connection URL
|
1989
1886
|
"""
|
1990
1887
|
return pulumi.get(self, "password")
|
1991
1888
|
|
@@ -1993,7 +1890,7 @@ class SecretBackendConnectionOracle(dict):
|
|
1993
1890
|
@pulumi.getter(name="splitStatements")
|
1994
1891
|
def split_statements(self) -> Optional[bool]:
|
1995
1892
|
"""
|
1996
|
-
|
1893
|
+
Set to true in order to split statements after semi-colons.
|
1997
1894
|
"""
|
1998
1895
|
return pulumi.get(self, "split_statements")
|
1999
1896
|
|
@@ -2001,7 +1898,7 @@ class SecretBackendConnectionOracle(dict):
|
|
2001
1898
|
@pulumi.getter
|
2002
1899
|
def username(self) -> Optional[str]:
|
2003
1900
|
"""
|
2004
|
-
The username
|
1901
|
+
The root credential username used in the connection URL
|
2005
1902
|
"""
|
2006
1903
|
return pulumi.get(self, "username")
|
2007
1904
|
|
@@ -2009,7 +1906,7 @@ class SecretBackendConnectionOracle(dict):
|
|
2009
1906
|
@pulumi.getter(name="usernameTemplate")
|
2010
1907
|
def username_template(self) -> Optional[str]:
|
2011
1908
|
"""
|
2012
|
-
|
1909
|
+
Username generation template.
|
2013
1910
|
"""
|
2014
1911
|
return pulumi.get(self, "username_template")
|
2015
1912
|
|
@@ -2031,8 +1928,16 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2031
1928
|
suggest = "max_idle_connections"
|
2032
1929
|
elif key == "maxOpenConnections":
|
2033
1930
|
suggest = "max_open_connections"
|
1931
|
+
elif key == "privateKey":
|
1932
|
+
suggest = "private_key"
|
1933
|
+
elif key == "selfManaged":
|
1934
|
+
suggest = "self_managed"
|
2034
1935
|
elif key == "serviceAccountJson":
|
2035
1936
|
suggest = "service_account_json"
|
1937
|
+
elif key == "tlsCa":
|
1938
|
+
suggest = "tls_ca"
|
1939
|
+
elif key == "tlsCertificate":
|
1940
|
+
suggest = "tls_certificate"
|
2036
1941
|
elif key == "usernameTemplate":
|
2037
1942
|
suggest = "username_template"
|
2038
1943
|
|
@@ -2055,26 +1960,28 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2055
1960
|
max_idle_connections: Optional[int] = None,
|
2056
1961
|
max_open_connections: Optional[int] = None,
|
2057
1962
|
password: Optional[str] = None,
|
1963
|
+
private_key: Optional[str] = None,
|
1964
|
+
self_managed: Optional[bool] = None,
|
2058
1965
|
service_account_json: Optional[str] = None,
|
1966
|
+
tls_ca: Optional[str] = None,
|
1967
|
+
tls_certificate: Optional[str] = None,
|
2059
1968
|
username: Optional[str] = None,
|
2060
1969
|
username_template: Optional[str] = None):
|
2061
1970
|
"""
|
2062
|
-
:param str auth_type:
|
2063
|
-
:param str connection_url:
|
2064
|
-
|
2065
|
-
|
2066
|
-
|
2067
|
-
:param
|
2068
|
-
:param
|
2069
|
-
|
2070
|
-
:param
|
2071
|
-
|
2072
|
-
:param
|
2073
|
-
|
2074
|
-
:param str
|
2075
|
-
:param str
|
2076
|
-
:param str username: The username to authenticate with.
|
2077
|
-
:param str username_template: Template describing how dynamic usernames are generated.
|
1971
|
+
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1972
|
+
:param str connection_url: Connection string to use to connect to the database.
|
1973
|
+
:param bool disable_escaping: Disable special character escaping in username and password
|
1974
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
1975
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
1976
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
1977
|
+
:param str password: The root credential password used in the connection URL
|
1978
|
+
:param str private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
|
1979
|
+
:param bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
|
1980
|
+
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
1981
|
+
:param str tls_ca: The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
1982
|
+
:param str tls_certificate: The x509 client certificate for connecting to the database. Must be PEM encoded.
|
1983
|
+
:param str username: The root credential username used in the connection URL
|
1984
|
+
:param str username_template: Username generation template.
|
2078
1985
|
"""
|
2079
1986
|
if auth_type is not None:
|
2080
1987
|
pulumi.set(__self__, "auth_type", auth_type)
|
@@ -2090,8 +1997,16 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2090
1997
|
pulumi.set(__self__, "max_open_connections", max_open_connections)
|
2091
1998
|
if password is not None:
|
2092
1999
|
pulumi.set(__self__, "password", password)
|
2000
|
+
if private_key is not None:
|
2001
|
+
pulumi.set(__self__, "private_key", private_key)
|
2002
|
+
if self_managed is not None:
|
2003
|
+
pulumi.set(__self__, "self_managed", self_managed)
|
2093
2004
|
if service_account_json is not None:
|
2094
2005
|
pulumi.set(__self__, "service_account_json", service_account_json)
|
2006
|
+
if tls_ca is not None:
|
2007
|
+
pulumi.set(__self__, "tls_ca", tls_ca)
|
2008
|
+
if tls_certificate is not None:
|
2009
|
+
pulumi.set(__self__, "tls_certificate", tls_certificate)
|
2095
2010
|
if username is not None:
|
2096
2011
|
pulumi.set(__self__, "username", username)
|
2097
2012
|
if username_template is not None:
|
@@ -2101,7 +2016,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2101
2016
|
@pulumi.getter(name="authType")
|
2102
2017
|
def auth_type(self) -> Optional[str]:
|
2103
2018
|
"""
|
2104
|
-
|
2019
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
2105
2020
|
"""
|
2106
2021
|
return pulumi.get(self, "auth_type")
|
2107
2022
|
|
@@ -2109,10 +2024,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2109
2024
|
@pulumi.getter(name="connectionUrl")
|
2110
2025
|
def connection_url(self) -> Optional[str]:
|
2111
2026
|
"""
|
2112
|
-
|
2113
|
-
the [Vault
|
2114
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
2115
|
-
for an example.
|
2027
|
+
Connection string to use to connect to the database.
|
2116
2028
|
"""
|
2117
2029
|
return pulumi.get(self, "connection_url")
|
2118
2030
|
|
@@ -2120,7 +2032,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2120
2032
|
@pulumi.getter(name="disableEscaping")
|
2121
2033
|
def disable_escaping(self) -> Optional[bool]:
|
2122
2034
|
"""
|
2123
|
-
Disable special character escaping in username and password
|
2035
|
+
Disable special character escaping in username and password
|
2124
2036
|
"""
|
2125
2037
|
return pulumi.get(self, "disable_escaping")
|
2126
2038
|
|
@@ -2128,8 +2040,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2128
2040
|
@pulumi.getter(name="maxConnectionLifetime")
|
2129
2041
|
def max_connection_lifetime(self) -> Optional[int]:
|
2130
2042
|
"""
|
2131
|
-
|
2132
|
-
a connection alive for.
|
2043
|
+
Maximum number of seconds a connection may be reused.
|
2133
2044
|
"""
|
2134
2045
|
return pulumi.get(self, "max_connection_lifetime")
|
2135
2046
|
|
@@ -2137,8 +2048,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2137
2048
|
@pulumi.getter(name="maxIdleConnections")
|
2138
2049
|
def max_idle_connections(self) -> Optional[int]:
|
2139
2050
|
"""
|
2140
|
-
|
2141
|
-
maintain.
|
2051
|
+
Maximum number of idle connections to the database.
|
2142
2052
|
"""
|
2143
2053
|
return pulumi.get(self, "max_idle_connections")
|
2144
2054
|
|
@@ -2146,8 +2056,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2146
2056
|
@pulumi.getter(name="maxOpenConnections")
|
2147
2057
|
def max_open_connections(self) -> Optional[int]:
|
2148
2058
|
"""
|
2149
|
-
|
2150
|
-
use.
|
2059
|
+
Maximum number of open connections to the database.
|
2151
2060
|
"""
|
2152
2061
|
return pulumi.get(self, "max_open_connections")
|
2153
2062
|
|
@@ -2155,23 +2064,55 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2155
2064
|
@pulumi.getter
|
2156
2065
|
def password(self) -> Optional[str]:
|
2157
2066
|
"""
|
2158
|
-
The password
|
2067
|
+
The root credential password used in the connection URL
|
2159
2068
|
"""
|
2160
2069
|
return pulumi.get(self, "password")
|
2161
2070
|
|
2071
|
+
@property
|
2072
|
+
@pulumi.getter(name="privateKey")
|
2073
|
+
def private_key(self) -> Optional[str]:
|
2074
|
+
"""
|
2075
|
+
The secret key used for the x509 client certificate. Must be PEM encoded.
|
2076
|
+
"""
|
2077
|
+
return pulumi.get(self, "private_key")
|
2078
|
+
|
2079
|
+
@property
|
2080
|
+
@pulumi.getter(name="selfManaged")
|
2081
|
+
def self_managed(self) -> Optional[bool]:
|
2082
|
+
"""
|
2083
|
+
If set, allows onboarding static roles with a rootless connection configuration.
|
2084
|
+
"""
|
2085
|
+
return pulumi.get(self, "self_managed")
|
2086
|
+
|
2162
2087
|
@property
|
2163
2088
|
@pulumi.getter(name="serviceAccountJson")
|
2164
2089
|
def service_account_json(self) -> Optional[str]:
|
2165
2090
|
"""
|
2166
|
-
JSON
|
2091
|
+
A JSON encoded credential for use with IAM authorization
|
2167
2092
|
"""
|
2168
2093
|
return pulumi.get(self, "service_account_json")
|
2169
2094
|
|
2095
|
+
@property
|
2096
|
+
@pulumi.getter(name="tlsCa")
|
2097
|
+
def tls_ca(self) -> Optional[str]:
|
2098
|
+
"""
|
2099
|
+
The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
2100
|
+
"""
|
2101
|
+
return pulumi.get(self, "tls_ca")
|
2102
|
+
|
2103
|
+
@property
|
2104
|
+
@pulumi.getter(name="tlsCertificate")
|
2105
|
+
def tls_certificate(self) -> Optional[str]:
|
2106
|
+
"""
|
2107
|
+
The x509 client certificate for connecting to the database. Must be PEM encoded.
|
2108
|
+
"""
|
2109
|
+
return pulumi.get(self, "tls_certificate")
|
2110
|
+
|
2170
2111
|
@property
|
2171
2112
|
@pulumi.getter
|
2172
2113
|
def username(self) -> Optional[str]:
|
2173
2114
|
"""
|
2174
|
-
The username
|
2115
|
+
The root credential username used in the connection URL
|
2175
2116
|
"""
|
2176
2117
|
return pulumi.get(self, "username")
|
2177
2118
|
|
@@ -2179,7 +2120,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2179
2120
|
@pulumi.getter(name="usernameTemplate")
|
2180
2121
|
def username_template(self) -> Optional[str]:
|
2181
2122
|
"""
|
2182
|
-
|
2123
|
+
Username generation template.
|
2183
2124
|
"""
|
2184
2125
|
return pulumi.get(self, "username_template")
|
2185
2126
|
|
@@ -2214,15 +2155,13 @@ class SecretBackendConnectionRedis(dict):
|
|
2214
2155
|
port: Optional[int] = None,
|
2215
2156
|
tls: Optional[bool] = None):
|
2216
2157
|
"""
|
2217
|
-
:param str host:
|
2218
|
-
:param str password:
|
2219
|
-
:param str username:
|
2220
|
-
:param str ca_cert: The
|
2221
|
-
:param bool insecure_tls:
|
2222
|
-
|
2223
|
-
:param
|
2224
|
-
part of the host.
|
2225
|
-
:param bool tls: Whether to use TLS when connecting to Cassandra.
|
2158
|
+
:param str host: Specifies the host to connect to
|
2159
|
+
:param str password: Specifies the password corresponding to the given username.
|
2160
|
+
:param str username: Specifies the username for Vault to use.
|
2161
|
+
:param str ca_cert: The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
|
2162
|
+
:param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
|
2163
|
+
:param int port: The transport port to use to connect to Redis.
|
2164
|
+
:param bool tls: Specifies whether to use TLS when connecting to Redis.
|
2226
2165
|
"""
|
2227
2166
|
pulumi.set(__self__, "host", host)
|
2228
2167
|
pulumi.set(__self__, "password", password)
|
@@ -2240,7 +2179,7 @@ class SecretBackendConnectionRedis(dict):
|
|
2240
2179
|
@pulumi.getter
|
2241
2180
|
def host(self) -> str:
|
2242
2181
|
"""
|
2243
|
-
|
2182
|
+
Specifies the host to connect to
|
2244
2183
|
"""
|
2245
2184
|
return pulumi.get(self, "host")
|
2246
2185
|
|
@@ -2248,7 +2187,7 @@ class SecretBackendConnectionRedis(dict):
|
|
2248
2187
|
@pulumi.getter
|
2249
2188
|
def password(self) -> str:
|
2250
2189
|
"""
|
2251
|
-
|
2190
|
+
Specifies the password corresponding to the given username.
|
2252
2191
|
"""
|
2253
2192
|
return pulumi.get(self, "password")
|
2254
2193
|
|
@@ -2256,7 +2195,7 @@ class SecretBackendConnectionRedis(dict):
|
|
2256
2195
|
@pulumi.getter
|
2257
2196
|
def username(self) -> str:
|
2258
2197
|
"""
|
2259
|
-
|
2198
|
+
Specifies the username for Vault to use.
|
2260
2199
|
"""
|
2261
2200
|
return pulumi.get(self, "username")
|
2262
2201
|
|
@@ -2264,7 +2203,7 @@ class SecretBackendConnectionRedis(dict):
|
|
2264
2203
|
@pulumi.getter(name="caCert")
|
2265
2204
|
def ca_cert(self) -> Optional[str]:
|
2266
2205
|
"""
|
2267
|
-
The
|
2206
|
+
The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
|
2268
2207
|
"""
|
2269
2208
|
return pulumi.get(self, "ca_cert")
|
2270
2209
|
|
@@ -2272,8 +2211,7 @@ class SecretBackendConnectionRedis(dict):
|
|
2272
2211
|
@pulumi.getter(name="insecureTls")
|
2273
2212
|
def insecure_tls(self) -> Optional[bool]:
|
2274
2213
|
"""
|
2275
|
-
|
2276
|
-
certificate when using TLS.
|
2214
|
+
Specifies whether to skip verification of the server certificate when using TLS.
|
2277
2215
|
"""
|
2278
2216
|
return pulumi.get(self, "insecure_tls")
|
2279
2217
|
|
@@ -2281,8 +2219,7 @@ class SecretBackendConnectionRedis(dict):
|
|
2281
2219
|
@pulumi.getter
|
2282
2220
|
def port(self) -> Optional[int]:
|
2283
2221
|
"""
|
2284
|
-
The
|
2285
|
-
part of the host.
|
2222
|
+
The transport port to use to connect to Redis.
|
2286
2223
|
"""
|
2287
2224
|
return pulumi.get(self, "port")
|
2288
2225
|
|
@@ -2290,7 +2227,7 @@ class SecretBackendConnectionRedis(dict):
|
|
2290
2227
|
@pulumi.getter
|
2291
2228
|
def tls(self) -> Optional[bool]:
|
2292
2229
|
"""
|
2293
|
-
|
2230
|
+
Specifies whether to use TLS when connecting to Redis.
|
2294
2231
|
"""
|
2295
2232
|
return pulumi.get(self, "tls")
|
2296
2233
|
|
@@ -2303,11 +2240,10 @@ class SecretBackendConnectionRedisElasticache(dict):
|
|
2303
2240
|
region: Optional[str] = None,
|
2304
2241
|
username: Optional[str] = None):
|
2305
2242
|
"""
|
2306
|
-
:param str url: The
|
2307
|
-
|
2308
|
-
:param str
|
2309
|
-
:param str
|
2310
|
-
:param str username: The username to authenticate with.
|
2243
|
+
:param str url: The configuration endpoint for the ElastiCache cluster to connect to.
|
2244
|
+
:param str password: The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
2245
|
+
:param str region: The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
|
2246
|
+
:param str username: The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
2311
2247
|
"""
|
2312
2248
|
pulumi.set(__self__, "url", url)
|
2313
2249
|
if password is not None:
|
@@ -2321,8 +2257,7 @@ class SecretBackendConnectionRedisElasticache(dict):
|
|
2321
2257
|
@pulumi.getter
|
2322
2258
|
def url(self) -> str:
|
2323
2259
|
"""
|
2324
|
-
The
|
2325
|
-
by trusted CA if used.
|
2260
|
+
The configuration endpoint for the ElastiCache cluster to connect to.
|
2326
2261
|
"""
|
2327
2262
|
return pulumi.get(self, "url")
|
2328
2263
|
|
@@ -2330,7 +2265,7 @@ class SecretBackendConnectionRedisElasticache(dict):
|
|
2330
2265
|
@pulumi.getter
|
2331
2266
|
def password(self) -> Optional[str]:
|
2332
2267
|
"""
|
2333
|
-
The
|
2268
|
+
The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
2334
2269
|
"""
|
2335
2270
|
return pulumi.get(self, "password")
|
2336
2271
|
|
@@ -2338,7 +2273,7 @@ class SecretBackendConnectionRedisElasticache(dict):
|
|
2338
2273
|
@pulumi.getter
|
2339
2274
|
def region(self) -> Optional[str]:
|
2340
2275
|
"""
|
2341
|
-
The region where the ElastiCache cluster is hosted. If omitted
|
2276
|
+
The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
|
2342
2277
|
"""
|
2343
2278
|
return pulumi.get(self, "region")
|
2344
2279
|
|
@@ -2346,7 +2281,7 @@ class SecretBackendConnectionRedisElasticache(dict):
|
|
2346
2281
|
@pulumi.getter
|
2347
2282
|
def username(self) -> Optional[str]:
|
2348
2283
|
"""
|
2349
|
-
The
|
2284
|
+
The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
2350
2285
|
"""
|
2351
2286
|
return pulumi.get(self, "username")
|
2352
2287
|
|
@@ -2390,20 +2325,14 @@ class SecretBackendConnectionRedshift(dict):
|
|
2390
2325
|
username: Optional[str] = None,
|
2391
2326
|
username_template: Optional[str] = None):
|
2392
2327
|
"""
|
2393
|
-
:param str connection_url:
|
2394
|
-
|
2395
|
-
|
2396
|
-
|
2397
|
-
:param
|
2398
|
-
:param
|
2399
|
-
|
2400
|
-
:param
|
2401
|
-
maintain.
|
2402
|
-
:param int max_open_connections: The maximum number of open connections to
|
2403
|
-
use.
|
2404
|
-
:param str password: The password to authenticate with.
|
2405
|
-
:param str username: The username to authenticate with.
|
2406
|
-
:param str username_template: Template describing how dynamic usernames are generated.
|
2328
|
+
:param str connection_url: Connection string to use to connect to the database.
|
2329
|
+
:param bool disable_escaping: Disable special character escaping in username and password
|
2330
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
2331
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
2332
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
2333
|
+
:param str password: The root credential password used in the connection URL
|
2334
|
+
:param str username: The root credential username used in the connection URL
|
2335
|
+
:param str username_template: Username generation template.
|
2407
2336
|
"""
|
2408
2337
|
if connection_url is not None:
|
2409
2338
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -2426,10 +2355,7 @@ class SecretBackendConnectionRedshift(dict):
|
|
2426
2355
|
@pulumi.getter(name="connectionUrl")
|
2427
2356
|
def connection_url(self) -> Optional[str]:
|
2428
2357
|
"""
|
2429
|
-
|
2430
|
-
the [Vault
|
2431
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
2432
|
-
for an example.
|
2358
|
+
Connection string to use to connect to the database.
|
2433
2359
|
"""
|
2434
2360
|
return pulumi.get(self, "connection_url")
|
2435
2361
|
|
@@ -2437,7 +2363,7 @@ class SecretBackendConnectionRedshift(dict):
|
|
2437
2363
|
@pulumi.getter(name="disableEscaping")
|
2438
2364
|
def disable_escaping(self) -> Optional[bool]:
|
2439
2365
|
"""
|
2440
|
-
Disable special character escaping in username and password
|
2366
|
+
Disable special character escaping in username and password
|
2441
2367
|
"""
|
2442
2368
|
return pulumi.get(self, "disable_escaping")
|
2443
2369
|
|
@@ -2445,8 +2371,7 @@ class SecretBackendConnectionRedshift(dict):
|
|
2445
2371
|
@pulumi.getter(name="maxConnectionLifetime")
|
2446
2372
|
def max_connection_lifetime(self) -> Optional[int]:
|
2447
2373
|
"""
|
2448
|
-
|
2449
|
-
a connection alive for.
|
2374
|
+
Maximum number of seconds a connection may be reused.
|
2450
2375
|
"""
|
2451
2376
|
return pulumi.get(self, "max_connection_lifetime")
|
2452
2377
|
|
@@ -2454,8 +2379,7 @@ class SecretBackendConnectionRedshift(dict):
|
|
2454
2379
|
@pulumi.getter(name="maxIdleConnections")
|
2455
2380
|
def max_idle_connections(self) -> Optional[int]:
|
2456
2381
|
"""
|
2457
|
-
|
2458
|
-
maintain.
|
2382
|
+
Maximum number of idle connections to the database.
|
2459
2383
|
"""
|
2460
2384
|
return pulumi.get(self, "max_idle_connections")
|
2461
2385
|
|
@@ -2463,8 +2387,7 @@ class SecretBackendConnectionRedshift(dict):
|
|
2463
2387
|
@pulumi.getter(name="maxOpenConnections")
|
2464
2388
|
def max_open_connections(self) -> Optional[int]:
|
2465
2389
|
"""
|
2466
|
-
|
2467
|
-
use.
|
2390
|
+
Maximum number of open connections to the database.
|
2468
2391
|
"""
|
2469
2392
|
return pulumi.get(self, "max_open_connections")
|
2470
2393
|
|
@@ -2472,7 +2395,7 @@ class SecretBackendConnectionRedshift(dict):
|
|
2472
2395
|
@pulumi.getter
|
2473
2396
|
def password(self) -> Optional[str]:
|
2474
2397
|
"""
|
2475
|
-
The password
|
2398
|
+
The root credential password used in the connection URL
|
2476
2399
|
"""
|
2477
2400
|
return pulumi.get(self, "password")
|
2478
2401
|
|
@@ -2480,7 +2403,7 @@ class SecretBackendConnectionRedshift(dict):
|
|
2480
2403
|
@pulumi.getter
|
2481
2404
|
def username(self) -> Optional[str]:
|
2482
2405
|
"""
|
2483
|
-
The username
|
2406
|
+
The root credential username used in the connection URL
|
2484
2407
|
"""
|
2485
2408
|
return pulumi.get(self, "username")
|
2486
2409
|
|
@@ -2488,7 +2411,7 @@ class SecretBackendConnectionRedshift(dict):
|
|
2488
2411
|
@pulumi.getter(name="usernameTemplate")
|
2489
2412
|
def username_template(self) -> Optional[str]:
|
2490
2413
|
"""
|
2491
|
-
|
2414
|
+
Username generation template.
|
2492
2415
|
"""
|
2493
2416
|
return pulumi.get(self, "username_template")
|
2494
2417
|
|
@@ -2529,19 +2452,13 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2529
2452
|
username: Optional[str] = None,
|
2530
2453
|
username_template: Optional[str] = None):
|
2531
2454
|
"""
|
2532
|
-
:param str connection_url:
|
2533
|
-
|
2534
|
-
|
2535
|
-
|
2536
|
-
:param
|
2537
|
-
|
2538
|
-
:param
|
2539
|
-
maintain.
|
2540
|
-
:param int max_open_connections: The maximum number of open connections to
|
2541
|
-
use.
|
2542
|
-
:param str password: The password to authenticate with.
|
2543
|
-
:param str username: The username to authenticate with.
|
2544
|
-
:param str username_template: Template describing how dynamic usernames are generated.
|
2455
|
+
:param str connection_url: Connection string to use to connect to the database.
|
2456
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
2457
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
2458
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
2459
|
+
:param str password: The root credential password used in the connection URL
|
2460
|
+
:param str username: The root credential username used in the connection URL
|
2461
|
+
:param str username_template: Username generation template.
|
2545
2462
|
"""
|
2546
2463
|
if connection_url is not None:
|
2547
2464
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -2562,10 +2479,7 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2562
2479
|
@pulumi.getter(name="connectionUrl")
|
2563
2480
|
def connection_url(self) -> Optional[str]:
|
2564
2481
|
"""
|
2565
|
-
|
2566
|
-
the [Vault
|
2567
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
2568
|
-
for an example.
|
2482
|
+
Connection string to use to connect to the database.
|
2569
2483
|
"""
|
2570
2484
|
return pulumi.get(self, "connection_url")
|
2571
2485
|
|
@@ -2573,8 +2487,7 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2573
2487
|
@pulumi.getter(name="maxConnectionLifetime")
|
2574
2488
|
def max_connection_lifetime(self) -> Optional[int]:
|
2575
2489
|
"""
|
2576
|
-
|
2577
|
-
a connection alive for.
|
2490
|
+
Maximum number of seconds a connection may be reused.
|
2578
2491
|
"""
|
2579
2492
|
return pulumi.get(self, "max_connection_lifetime")
|
2580
2493
|
|
@@ -2582,8 +2495,7 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2582
2495
|
@pulumi.getter(name="maxIdleConnections")
|
2583
2496
|
def max_idle_connections(self) -> Optional[int]:
|
2584
2497
|
"""
|
2585
|
-
|
2586
|
-
maintain.
|
2498
|
+
Maximum number of idle connections to the database.
|
2587
2499
|
"""
|
2588
2500
|
return pulumi.get(self, "max_idle_connections")
|
2589
2501
|
|
@@ -2591,8 +2503,7 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2591
2503
|
@pulumi.getter(name="maxOpenConnections")
|
2592
2504
|
def max_open_connections(self) -> Optional[int]:
|
2593
2505
|
"""
|
2594
|
-
|
2595
|
-
use.
|
2506
|
+
Maximum number of open connections to the database.
|
2596
2507
|
"""
|
2597
2508
|
return pulumi.get(self, "max_open_connections")
|
2598
2509
|
|
@@ -2600,7 +2511,7 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2600
2511
|
@pulumi.getter
|
2601
2512
|
def password(self) -> Optional[str]:
|
2602
2513
|
"""
|
2603
|
-
The password
|
2514
|
+
The root credential password used in the connection URL
|
2604
2515
|
"""
|
2605
2516
|
return pulumi.get(self, "password")
|
2606
2517
|
|
@@ -2608,7 +2519,7 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2608
2519
|
@pulumi.getter
|
2609
2520
|
def username(self) -> Optional[str]:
|
2610
2521
|
"""
|
2611
|
-
The username
|
2522
|
+
The root credential username used in the connection URL
|
2612
2523
|
"""
|
2613
2524
|
return pulumi.get(self, "username")
|
2614
2525
|
|
@@ -2616,7 +2527,7 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2616
2527
|
@pulumi.getter(name="usernameTemplate")
|
2617
2528
|
def username_template(self) -> Optional[str]:
|
2618
2529
|
"""
|
2619
|
-
|
2530
|
+
Username generation template.
|
2620
2531
|
"""
|
2621
2532
|
return pulumi.get(self, "username_template")
|
2622
2533
|
|
@@ -2642,6 +2553,8 @@ class SecretsMountCassandra(dict):
|
|
2642
2553
|
suggest = "protocol_version"
|
2643
2554
|
elif key == "rootRotationStatements":
|
2644
2555
|
suggest = "root_rotation_statements"
|
2556
|
+
elif key == "skipVerification":
|
2557
|
+
suggest = "skip_verification"
|
2645
2558
|
elif key == "verifyConnection":
|
2646
2559
|
suggest = "verify_connection"
|
2647
2560
|
|
@@ -2660,7 +2573,7 @@ class SecretsMountCassandra(dict):
|
|
2660
2573
|
name: str,
|
2661
2574
|
allowed_roles: Optional[Sequence[str]] = None,
|
2662
2575
|
connect_timeout: Optional[int] = None,
|
2663
|
-
data: Optional[Mapping[str,
|
2576
|
+
data: Optional[Mapping[str, str]] = None,
|
2664
2577
|
hosts: Optional[Sequence[str]] = None,
|
2665
2578
|
insecure_tls: Optional[bool] = None,
|
2666
2579
|
password: Optional[str] = None,
|
@@ -2670,6 +2583,7 @@ class SecretsMountCassandra(dict):
|
|
2670
2583
|
port: Optional[int] = None,
|
2671
2584
|
protocol_version: Optional[int] = None,
|
2672
2585
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
2586
|
+
skip_verification: Optional[bool] = None,
|
2673
2587
|
tls: Optional[bool] = None,
|
2674
2588
|
username: Optional[str] = None,
|
2675
2589
|
verify_connection: Optional[bool] = None):
|
@@ -2677,25 +2591,22 @@ class SecretsMountCassandra(dict):
|
|
2677
2591
|
:param str name: Name of the database connection.
|
2678
2592
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
2679
2593
|
connection.
|
2680
|
-
:param int connect_timeout: The number of seconds to use as a connection
|
2681
|
-
|
2682
|
-
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2594
|
+
:param int connect_timeout: The number of seconds to use as a connection timeout.
|
2595
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2683
2596
|
|
2684
2597
|
Supported list of database secrets engines that can be configured:
|
2685
|
-
:param Sequence[str] hosts:
|
2686
|
-
:param bool insecure_tls: Whether to skip verification of the server
|
2687
|
-
|
2688
|
-
:param str
|
2689
|
-
:param str
|
2690
|
-
chain.
|
2691
|
-
:param str pem_json: A JSON structure configuring the certificate chain.
|
2598
|
+
:param Sequence[str] hosts: Cassandra hosts to connect to.
|
2599
|
+
:param bool insecure_tls: Whether to skip verification of the server certificate when using TLS.
|
2600
|
+
:param str password: The password to use when authenticating with Cassandra.
|
2601
|
+
:param str pem_bundle: Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
2602
|
+
:param str pem_json: Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
2692
2603
|
:param str plugin_name: Specifies the name of the plugin to use.
|
2693
|
-
:param int port: The
|
2694
|
-
part of the host.
|
2604
|
+
:param int port: The transport port to use to connect to Cassandra.
|
2695
2605
|
:param int protocol_version: The CQL protocol version to use.
|
2696
2606
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
2607
|
+
:param bool skip_verification: Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
2697
2608
|
:param bool tls: Whether to use TLS when connecting to Cassandra.
|
2698
|
-
:param str username: The
|
2609
|
+
:param str username: The username to use when authenticating with Cassandra.
|
2699
2610
|
:param bool verify_connection: Whether the connection should be verified on
|
2700
2611
|
initial configuration or not.
|
2701
2612
|
"""
|
@@ -2724,6 +2635,8 @@ class SecretsMountCassandra(dict):
|
|
2724
2635
|
pulumi.set(__self__, "protocol_version", protocol_version)
|
2725
2636
|
if root_rotation_statements is not None:
|
2726
2637
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
2638
|
+
if skip_verification is not None:
|
2639
|
+
pulumi.set(__self__, "skip_verification", skip_verification)
|
2727
2640
|
if tls is not None:
|
2728
2641
|
pulumi.set(__self__, "tls", tls)
|
2729
2642
|
if username is not None:
|
@@ -2752,14 +2665,13 @@ class SecretsMountCassandra(dict):
|
|
2752
2665
|
@pulumi.getter(name="connectTimeout")
|
2753
2666
|
def connect_timeout(self) -> Optional[int]:
|
2754
2667
|
"""
|
2755
|
-
The number of seconds to use as a connection
|
2756
|
-
timeout.
|
2668
|
+
The number of seconds to use as a connection timeout.
|
2757
2669
|
"""
|
2758
2670
|
return pulumi.get(self, "connect_timeout")
|
2759
2671
|
|
2760
2672
|
@property
|
2761
2673
|
@pulumi.getter
|
2762
|
-
def data(self) -> Optional[Mapping[str,
|
2674
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
2763
2675
|
"""
|
2764
2676
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2765
2677
|
|
@@ -2771,7 +2683,7 @@ class SecretsMountCassandra(dict):
|
|
2771
2683
|
@pulumi.getter
|
2772
2684
|
def hosts(self) -> Optional[Sequence[str]]:
|
2773
2685
|
"""
|
2774
|
-
|
2686
|
+
Cassandra hosts to connect to.
|
2775
2687
|
"""
|
2776
2688
|
return pulumi.get(self, "hosts")
|
2777
2689
|
|
@@ -2779,8 +2691,7 @@ class SecretsMountCassandra(dict):
|
|
2779
2691
|
@pulumi.getter(name="insecureTls")
|
2780
2692
|
def insecure_tls(self) -> Optional[bool]:
|
2781
2693
|
"""
|
2782
|
-
Whether to skip verification of the server
|
2783
|
-
certificate when using TLS.
|
2694
|
+
Whether to skip verification of the server certificate when using TLS.
|
2784
2695
|
"""
|
2785
2696
|
return pulumi.get(self, "insecure_tls")
|
2786
2697
|
|
@@ -2788,7 +2699,7 @@ class SecretsMountCassandra(dict):
|
|
2788
2699
|
@pulumi.getter
|
2789
2700
|
def password(self) -> Optional[str]:
|
2790
2701
|
"""
|
2791
|
-
The
|
2702
|
+
The password to use when authenticating with Cassandra.
|
2792
2703
|
"""
|
2793
2704
|
return pulumi.get(self, "password")
|
2794
2705
|
|
@@ -2796,8 +2707,7 @@ class SecretsMountCassandra(dict):
|
|
2796
2707
|
@pulumi.getter(name="pemBundle")
|
2797
2708
|
def pem_bundle(self) -> Optional[str]:
|
2798
2709
|
"""
|
2799
|
-
Concatenated PEM blocks
|
2800
|
-
chain.
|
2710
|
+
Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
2801
2711
|
"""
|
2802
2712
|
return pulumi.get(self, "pem_bundle")
|
2803
2713
|
|
@@ -2805,7 +2715,7 @@ class SecretsMountCassandra(dict):
|
|
2805
2715
|
@pulumi.getter(name="pemJson")
|
2806
2716
|
def pem_json(self) -> Optional[str]:
|
2807
2717
|
"""
|
2808
|
-
|
2718
|
+
Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
2809
2719
|
"""
|
2810
2720
|
return pulumi.get(self, "pem_json")
|
2811
2721
|
|
@@ -2821,8 +2731,7 @@ class SecretsMountCassandra(dict):
|
|
2821
2731
|
@pulumi.getter
|
2822
2732
|
def port(self) -> Optional[int]:
|
2823
2733
|
"""
|
2824
|
-
The
|
2825
|
-
part of the host.
|
2734
|
+
The transport port to use to connect to Cassandra.
|
2826
2735
|
"""
|
2827
2736
|
return pulumi.get(self, "port")
|
2828
2737
|
|
@@ -2842,6 +2751,14 @@ class SecretsMountCassandra(dict):
|
|
2842
2751
|
"""
|
2843
2752
|
return pulumi.get(self, "root_rotation_statements")
|
2844
2753
|
|
2754
|
+
@property
|
2755
|
+
@pulumi.getter(name="skipVerification")
|
2756
|
+
def skip_verification(self) -> Optional[bool]:
|
2757
|
+
"""
|
2758
|
+
Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
2759
|
+
"""
|
2760
|
+
return pulumi.get(self, "skip_verification")
|
2761
|
+
|
2845
2762
|
@property
|
2846
2763
|
@pulumi.getter
|
2847
2764
|
def tls(self) -> Optional[bool]:
|
@@ -2854,7 +2771,7 @@ class SecretsMountCassandra(dict):
|
|
2854
2771
|
@pulumi.getter
|
2855
2772
|
def username(self) -> Optional[str]:
|
2856
2773
|
"""
|
2857
|
-
The
|
2774
|
+
The username to use when authenticating with Cassandra.
|
2858
2775
|
"""
|
2859
2776
|
return pulumi.get(self, "username")
|
2860
2777
|
|
@@ -2909,7 +2826,7 @@ class SecretsMountCouchbase(dict):
|
|
2909
2826
|
allowed_roles: Optional[Sequence[str]] = None,
|
2910
2827
|
base64_pem: Optional[str] = None,
|
2911
2828
|
bucket_name: Optional[str] = None,
|
2912
|
-
data: Optional[Mapping[str,
|
2829
|
+
data: Optional[Mapping[str, str]] = None,
|
2913
2830
|
insecure_tls: Optional[bool] = None,
|
2914
2831
|
plugin_name: Optional[str] = None,
|
2915
2832
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
@@ -2917,23 +2834,22 @@ class SecretsMountCouchbase(dict):
|
|
2917
2834
|
username_template: Optional[str] = None,
|
2918
2835
|
verify_connection: Optional[bool] = None):
|
2919
2836
|
"""
|
2920
|
-
:param Sequence[str] hosts:
|
2837
|
+
:param Sequence[str] hosts: A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
|
2921
2838
|
:param str name: Name of the database connection.
|
2922
|
-
:param str password:
|
2923
|
-
:param str username:
|
2839
|
+
:param str password: Specifies the password corresponding to the given username.
|
2840
|
+
:param str username: Specifies the username for Vault to use.
|
2924
2841
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
2925
2842
|
connection.
|
2926
2843
|
:param str base64_pem: Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
|
2927
2844
|
:param str bucket_name: Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
|
2928
|
-
:param Mapping[str,
|
2845
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2929
2846
|
|
2930
2847
|
Supported list of database secrets engines that can be configured:
|
2931
|
-
:param bool insecure_tls:
|
2932
|
-
certificate when using TLS.
|
2848
|
+
:param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
|
2933
2849
|
:param str plugin_name: Specifies the name of the plugin to use.
|
2934
2850
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
2935
|
-
:param bool tls:
|
2936
|
-
:param str username_template:
|
2851
|
+
:param bool tls: Specifies whether to use TLS when connecting to Couchbase.
|
2852
|
+
:param str username_template: Template describing how dynamic usernames are generated.
|
2937
2853
|
:param bool verify_connection: Whether the connection should be verified on
|
2938
2854
|
initial configuration or not.
|
2939
2855
|
"""
|
@@ -2966,7 +2882,7 @@ class SecretsMountCouchbase(dict):
|
|
2966
2882
|
@pulumi.getter
|
2967
2883
|
def hosts(self) -> Sequence[str]:
|
2968
2884
|
"""
|
2969
|
-
|
2885
|
+
A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
|
2970
2886
|
"""
|
2971
2887
|
return pulumi.get(self, "hosts")
|
2972
2888
|
|
@@ -2982,7 +2898,7 @@ class SecretsMountCouchbase(dict):
|
|
2982
2898
|
@pulumi.getter
|
2983
2899
|
def password(self) -> str:
|
2984
2900
|
"""
|
2985
|
-
|
2901
|
+
Specifies the password corresponding to the given username.
|
2986
2902
|
"""
|
2987
2903
|
return pulumi.get(self, "password")
|
2988
2904
|
|
@@ -2990,7 +2906,7 @@ class SecretsMountCouchbase(dict):
|
|
2990
2906
|
@pulumi.getter
|
2991
2907
|
def username(self) -> str:
|
2992
2908
|
"""
|
2993
|
-
|
2909
|
+
Specifies the username for Vault to use.
|
2994
2910
|
"""
|
2995
2911
|
return pulumi.get(self, "username")
|
2996
2912
|
|
@@ -3021,7 +2937,7 @@ class SecretsMountCouchbase(dict):
|
|
3021
2937
|
|
3022
2938
|
@property
|
3023
2939
|
@pulumi.getter
|
3024
|
-
def data(self) -> Optional[Mapping[str,
|
2940
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
3025
2941
|
"""
|
3026
2942
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3027
2943
|
|
@@ -3033,8 +2949,7 @@ class SecretsMountCouchbase(dict):
|
|
3033
2949
|
@pulumi.getter(name="insecureTls")
|
3034
2950
|
def insecure_tls(self) -> Optional[bool]:
|
3035
2951
|
"""
|
3036
|
-
|
3037
|
-
certificate when using TLS.
|
2952
|
+
Specifies whether to skip verification of the server certificate when using TLS.
|
3038
2953
|
"""
|
3039
2954
|
return pulumi.get(self, "insecure_tls")
|
3040
2955
|
|
@@ -3058,7 +2973,7 @@ class SecretsMountCouchbase(dict):
|
|
3058
2973
|
@pulumi.getter
|
3059
2974
|
def tls(self) -> Optional[bool]:
|
3060
2975
|
"""
|
3061
|
-
|
2976
|
+
Specifies whether to use TLS when connecting to Couchbase.
|
3062
2977
|
"""
|
3063
2978
|
return pulumi.get(self, "tls")
|
3064
2979
|
|
@@ -3066,7 +2981,7 @@ class SecretsMountCouchbase(dict):
|
|
3066
2981
|
@pulumi.getter(name="usernameTemplate")
|
3067
2982
|
def username_template(self) -> Optional[str]:
|
3068
2983
|
"""
|
3069
|
-
|
2984
|
+
Template describing how dynamic usernames are generated.
|
3070
2985
|
"""
|
3071
2986
|
return pulumi.get(self, "username_template")
|
3072
2987
|
|
@@ -3127,7 +3042,7 @@ class SecretsMountElasticsearch(dict):
|
|
3127
3042
|
ca_path: Optional[str] = None,
|
3128
3043
|
client_cert: Optional[str] = None,
|
3129
3044
|
client_key: Optional[str] = None,
|
3130
|
-
data: Optional[Mapping[str,
|
3045
|
+
data: Optional[Mapping[str, str]] = None,
|
3131
3046
|
insecure: Optional[bool] = None,
|
3132
3047
|
plugin_name: Optional[str] = None,
|
3133
3048
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
@@ -3136,24 +3051,23 @@ class SecretsMountElasticsearch(dict):
|
|
3136
3051
|
verify_connection: Optional[bool] = None):
|
3137
3052
|
"""
|
3138
3053
|
:param str name: Name of the database connection.
|
3139
|
-
:param str password: The
|
3140
|
-
:param str url: The URL for Elasticsearch's API
|
3141
|
-
|
3142
|
-
:param str username: The root credential username used in the connection URL.
|
3054
|
+
:param str password: The password to be used in the connection URL
|
3055
|
+
:param str url: The URL for Elasticsearch's API
|
3056
|
+
:param str username: The username to be used in the connection URL
|
3143
3057
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3144
3058
|
connection.
|
3145
|
-
:param str ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
3146
|
-
:param str ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
3147
|
-
:param str client_cert: The path to the certificate for the Elasticsearch client to present for communication
|
3148
|
-
:param str client_key: The path to the key for the Elasticsearch client to use for communication
|
3149
|
-
:param Mapping[str,
|
3059
|
+
:param str ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
3060
|
+
:param str ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
3061
|
+
:param str client_cert: The path to the certificate for the Elasticsearch client to present for communication
|
3062
|
+
:param str client_key: The path to the key for the Elasticsearch client to use for communication
|
3063
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3150
3064
|
|
3151
3065
|
Supported list of database secrets engines that can be configured:
|
3152
|
-
:param bool insecure: Whether to disable certificate verification
|
3066
|
+
:param bool insecure: Whether to disable certificate verification
|
3153
3067
|
:param str plugin_name: Specifies the name of the plugin to use.
|
3154
3068
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
3155
|
-
:param str tls_server_name: This, if set, is used to set the SNI host when connecting via TLS
|
3156
|
-
:param str username_template:
|
3069
|
+
:param str tls_server_name: This, if set, is used to set the SNI host when connecting via TLS
|
3070
|
+
:param str username_template: Template describing how dynamic usernames are generated.
|
3157
3071
|
:param bool verify_connection: Whether the connection should be verified on
|
3158
3072
|
initial configuration or not.
|
3159
3073
|
"""
|
@@ -3198,7 +3112,7 @@ class SecretsMountElasticsearch(dict):
|
|
3198
3112
|
@pulumi.getter
|
3199
3113
|
def password(self) -> str:
|
3200
3114
|
"""
|
3201
|
-
The
|
3115
|
+
The password to be used in the connection URL
|
3202
3116
|
"""
|
3203
3117
|
return pulumi.get(self, "password")
|
3204
3118
|
|
@@ -3206,8 +3120,7 @@ class SecretsMountElasticsearch(dict):
|
|
3206
3120
|
@pulumi.getter
|
3207
3121
|
def url(self) -> str:
|
3208
3122
|
"""
|
3209
|
-
The URL for Elasticsearch's API
|
3210
|
-
by trusted CA if used.
|
3123
|
+
The URL for Elasticsearch's API
|
3211
3124
|
"""
|
3212
3125
|
return pulumi.get(self, "url")
|
3213
3126
|
|
@@ -3215,7 +3128,7 @@ class SecretsMountElasticsearch(dict):
|
|
3215
3128
|
@pulumi.getter
|
3216
3129
|
def username(self) -> str:
|
3217
3130
|
"""
|
3218
|
-
The
|
3131
|
+
The username to be used in the connection URL
|
3219
3132
|
"""
|
3220
3133
|
return pulumi.get(self, "username")
|
3221
3134
|
|
@@ -3232,7 +3145,7 @@ class SecretsMountElasticsearch(dict):
|
|
3232
3145
|
@pulumi.getter(name="caCert")
|
3233
3146
|
def ca_cert(self) -> Optional[str]:
|
3234
3147
|
"""
|
3235
|
-
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
3148
|
+
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
3236
3149
|
"""
|
3237
3150
|
return pulumi.get(self, "ca_cert")
|
3238
3151
|
|
@@ -3240,7 +3153,7 @@ class SecretsMountElasticsearch(dict):
|
|
3240
3153
|
@pulumi.getter(name="caPath")
|
3241
3154
|
def ca_path(self) -> Optional[str]:
|
3242
3155
|
"""
|
3243
|
-
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
3156
|
+
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
3244
3157
|
"""
|
3245
3158
|
return pulumi.get(self, "ca_path")
|
3246
3159
|
|
@@ -3248,7 +3161,7 @@ class SecretsMountElasticsearch(dict):
|
|
3248
3161
|
@pulumi.getter(name="clientCert")
|
3249
3162
|
def client_cert(self) -> Optional[str]:
|
3250
3163
|
"""
|
3251
|
-
The path to the certificate for the Elasticsearch client to present for communication
|
3164
|
+
The path to the certificate for the Elasticsearch client to present for communication
|
3252
3165
|
"""
|
3253
3166
|
return pulumi.get(self, "client_cert")
|
3254
3167
|
|
@@ -3256,13 +3169,13 @@ class SecretsMountElasticsearch(dict):
|
|
3256
3169
|
@pulumi.getter(name="clientKey")
|
3257
3170
|
def client_key(self) -> Optional[str]:
|
3258
3171
|
"""
|
3259
|
-
The path to the key for the Elasticsearch client to use for communication
|
3172
|
+
The path to the key for the Elasticsearch client to use for communication
|
3260
3173
|
"""
|
3261
3174
|
return pulumi.get(self, "client_key")
|
3262
3175
|
|
3263
3176
|
@property
|
3264
3177
|
@pulumi.getter
|
3265
|
-
def data(self) -> Optional[Mapping[str,
|
3178
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
3266
3179
|
"""
|
3267
3180
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3268
3181
|
|
@@ -3274,7 +3187,7 @@ class SecretsMountElasticsearch(dict):
|
|
3274
3187
|
@pulumi.getter
|
3275
3188
|
def insecure(self) -> Optional[bool]:
|
3276
3189
|
"""
|
3277
|
-
Whether to disable certificate verification
|
3190
|
+
Whether to disable certificate verification
|
3278
3191
|
"""
|
3279
3192
|
return pulumi.get(self, "insecure")
|
3280
3193
|
|
@@ -3298,7 +3211,7 @@ class SecretsMountElasticsearch(dict):
|
|
3298
3211
|
@pulumi.getter(name="tlsServerName")
|
3299
3212
|
def tls_server_name(self) -> Optional[str]:
|
3300
3213
|
"""
|
3301
|
-
This, if set, is used to set the SNI host when connecting via TLS
|
3214
|
+
This, if set, is used to set the SNI host when connecting via TLS
|
3302
3215
|
"""
|
3303
3216
|
return pulumi.get(self, "tls_server_name")
|
3304
3217
|
|
@@ -3306,7 +3219,7 @@ class SecretsMountElasticsearch(dict):
|
|
3306
3219
|
@pulumi.getter(name="usernameTemplate")
|
3307
3220
|
def username_template(self) -> Optional[str]:
|
3308
3221
|
"""
|
3309
|
-
|
3222
|
+
Template describing how dynamic usernames are generated.
|
3310
3223
|
"""
|
3311
3224
|
return pulumi.get(self, "username_template")
|
3312
3225
|
|
@@ -3359,7 +3272,7 @@ class SecretsMountHana(dict):
|
|
3359
3272
|
name: str,
|
3360
3273
|
allowed_roles: Optional[Sequence[str]] = None,
|
3361
3274
|
connection_url: Optional[str] = None,
|
3362
|
-
data: Optional[Mapping[str,
|
3275
|
+
data: Optional[Mapping[str, str]] = None,
|
3363
3276
|
disable_escaping: Optional[bool] = None,
|
3364
3277
|
max_connection_lifetime: Optional[int] = None,
|
3365
3278
|
max_idle_connections: Optional[int] = None,
|
@@ -3373,21 +3286,18 @@ class SecretsMountHana(dict):
|
|
3373
3286
|
:param str name: Name of the database connection.
|
3374
3287
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3375
3288
|
connection.
|
3376
|
-
:param str connection_url:
|
3377
|
-
|
3378
|
-
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3289
|
+
:param str connection_url: Connection string to use to connect to the database.
|
3290
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3379
3291
|
|
3380
3292
|
Supported list of database secrets engines that can be configured:
|
3381
|
-
:param bool disable_escaping: Disable special character escaping in username and password
|
3382
|
-
:param int max_connection_lifetime:
|
3383
|
-
:param int max_idle_connections:
|
3384
|
-
|
3385
|
-
:param
|
3386
|
-
the database.
|
3387
|
-
:param str password: The root credential password used in the connection URL.
|
3293
|
+
:param bool disable_escaping: Disable special character escaping in username and password
|
3294
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
3295
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
3296
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
3297
|
+
:param str password: The root credential password used in the connection URL
|
3388
3298
|
:param str plugin_name: Specifies the name of the plugin to use.
|
3389
3299
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
3390
|
-
:param str username: The root credential username used in the connection URL
|
3300
|
+
:param str username: The root credential username used in the connection URL
|
3391
3301
|
:param bool verify_connection: Whether the connection should be verified on
|
3392
3302
|
initial configuration or not.
|
3393
3303
|
"""
|
@@ -3438,14 +3348,13 @@ class SecretsMountHana(dict):
|
|
3438
3348
|
@pulumi.getter(name="connectionUrl")
|
3439
3349
|
def connection_url(self) -> Optional[str]:
|
3440
3350
|
"""
|
3441
|
-
|
3442
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
3351
|
+
Connection string to use to connect to the database.
|
3443
3352
|
"""
|
3444
3353
|
return pulumi.get(self, "connection_url")
|
3445
3354
|
|
3446
3355
|
@property
|
3447
3356
|
@pulumi.getter
|
3448
|
-
def data(self) -> Optional[Mapping[str,
|
3357
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
3449
3358
|
"""
|
3450
3359
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3451
3360
|
|
@@ -3457,7 +3366,7 @@ class SecretsMountHana(dict):
|
|
3457
3366
|
@pulumi.getter(name="disableEscaping")
|
3458
3367
|
def disable_escaping(self) -> Optional[bool]:
|
3459
3368
|
"""
|
3460
|
-
Disable special character escaping in username and password
|
3369
|
+
Disable special character escaping in username and password
|
3461
3370
|
"""
|
3462
3371
|
return pulumi.get(self, "disable_escaping")
|
3463
3372
|
|
@@ -3465,7 +3374,7 @@ class SecretsMountHana(dict):
|
|
3465
3374
|
@pulumi.getter(name="maxConnectionLifetime")
|
3466
3375
|
def max_connection_lifetime(self) -> Optional[int]:
|
3467
3376
|
"""
|
3468
|
-
|
3377
|
+
Maximum number of seconds a connection may be reused.
|
3469
3378
|
"""
|
3470
3379
|
return pulumi.get(self, "max_connection_lifetime")
|
3471
3380
|
|
@@ -3473,8 +3382,7 @@ class SecretsMountHana(dict):
|
|
3473
3382
|
@pulumi.getter(name="maxIdleConnections")
|
3474
3383
|
def max_idle_connections(self) -> Optional[int]:
|
3475
3384
|
"""
|
3476
|
-
|
3477
|
-
the database.
|
3385
|
+
Maximum number of idle connections to the database.
|
3478
3386
|
"""
|
3479
3387
|
return pulumi.get(self, "max_idle_connections")
|
3480
3388
|
|
@@ -3482,8 +3390,7 @@ class SecretsMountHana(dict):
|
|
3482
3390
|
@pulumi.getter(name="maxOpenConnections")
|
3483
3391
|
def max_open_connections(self) -> Optional[int]:
|
3484
3392
|
"""
|
3485
|
-
|
3486
|
-
the database.
|
3393
|
+
Maximum number of open connections to the database.
|
3487
3394
|
"""
|
3488
3395
|
return pulumi.get(self, "max_open_connections")
|
3489
3396
|
|
@@ -3491,7 +3398,7 @@ class SecretsMountHana(dict):
|
|
3491
3398
|
@pulumi.getter
|
3492
3399
|
def password(self) -> Optional[str]:
|
3493
3400
|
"""
|
3494
|
-
The root credential password used in the connection URL
|
3401
|
+
The root credential password used in the connection URL
|
3495
3402
|
"""
|
3496
3403
|
return pulumi.get(self, "password")
|
3497
3404
|
|
@@ -3515,7 +3422,7 @@ class SecretsMountHana(dict):
|
|
3515
3422
|
@pulumi.getter
|
3516
3423
|
def username(self) -> Optional[str]:
|
3517
3424
|
"""
|
3518
|
-
The root credential username used in the connection URL
|
3425
|
+
The root credential username used in the connection URL
|
3519
3426
|
"""
|
3520
3427
|
return pulumi.get(self, "username")
|
3521
3428
|
|
@@ -3571,7 +3478,7 @@ class SecretsMountInfluxdb(dict):
|
|
3571
3478
|
username: str,
|
3572
3479
|
allowed_roles: Optional[Sequence[str]] = None,
|
3573
3480
|
connect_timeout: Optional[int] = None,
|
3574
|
-
data: Optional[Mapping[str,
|
3481
|
+
data: Optional[Mapping[str, str]] = None,
|
3575
3482
|
insecure_tls: Optional[bool] = None,
|
3576
3483
|
pem_bundle: Optional[str] = None,
|
3577
3484
|
pem_json: Optional[str] = None,
|
@@ -3582,28 +3489,24 @@ class SecretsMountInfluxdb(dict):
|
|
3582
3489
|
username_template: Optional[str] = None,
|
3583
3490
|
verify_connection: Optional[bool] = None):
|
3584
3491
|
"""
|
3585
|
-
:param str host:
|
3492
|
+
:param str host: Influxdb host to connect to.
|
3586
3493
|
:param str name: Name of the database connection.
|
3587
|
-
:param str password:
|
3588
|
-
:param str username:
|
3494
|
+
:param str password: Specifies the password corresponding to the given username.
|
3495
|
+
:param str username: Specifies the username to use for superuser access.
|
3589
3496
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3590
3497
|
connection.
|
3591
|
-
:param int connect_timeout: The number of seconds to use as a connection
|
3592
|
-
|
3593
|
-
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3498
|
+
:param int connect_timeout: The number of seconds to use as a connection timeout.
|
3499
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3594
3500
|
|
3595
3501
|
Supported list of database secrets engines that can be configured:
|
3596
|
-
:param bool insecure_tls: Whether to skip verification of the server
|
3597
|
-
|
3598
|
-
:param str
|
3599
|
-
chain.
|
3600
|
-
:param str pem_json: A JSON structure configuring the certificate chain.
|
3502
|
+
:param bool insecure_tls: Whether to skip verification of the server certificate when using TLS.
|
3503
|
+
:param str pem_bundle: Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
3504
|
+
:param str pem_json: Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
3601
3505
|
:param str plugin_name: Specifies the name of the plugin to use.
|
3602
|
-
:param int port: The
|
3603
|
-
part of the host.
|
3506
|
+
:param int port: The transport port to use to connect to Influxdb.
|
3604
3507
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
3605
|
-
:param bool tls: Whether to use TLS when connecting to
|
3606
|
-
:param str username_template:
|
3508
|
+
:param bool tls: Whether to use TLS when connecting to Influxdb.
|
3509
|
+
:param str username_template: Template describing how dynamic usernames are generated.
|
3607
3510
|
:param bool verify_connection: Whether the connection should be verified on
|
3608
3511
|
initial configuration or not.
|
3609
3512
|
"""
|
@@ -3640,7 +3543,7 @@ class SecretsMountInfluxdb(dict):
|
|
3640
3543
|
@pulumi.getter
|
3641
3544
|
def host(self) -> str:
|
3642
3545
|
"""
|
3643
|
-
|
3546
|
+
Influxdb host to connect to.
|
3644
3547
|
"""
|
3645
3548
|
return pulumi.get(self, "host")
|
3646
3549
|
|
@@ -3656,7 +3559,7 @@ class SecretsMountInfluxdb(dict):
|
|
3656
3559
|
@pulumi.getter
|
3657
3560
|
def password(self) -> str:
|
3658
3561
|
"""
|
3659
|
-
|
3562
|
+
Specifies the password corresponding to the given username.
|
3660
3563
|
"""
|
3661
3564
|
return pulumi.get(self, "password")
|
3662
3565
|
|
@@ -3664,7 +3567,7 @@ class SecretsMountInfluxdb(dict):
|
|
3664
3567
|
@pulumi.getter
|
3665
3568
|
def username(self) -> str:
|
3666
3569
|
"""
|
3667
|
-
|
3570
|
+
Specifies the username to use for superuser access.
|
3668
3571
|
"""
|
3669
3572
|
return pulumi.get(self, "username")
|
3670
3573
|
|
@@ -3681,14 +3584,13 @@ class SecretsMountInfluxdb(dict):
|
|
3681
3584
|
@pulumi.getter(name="connectTimeout")
|
3682
3585
|
def connect_timeout(self) -> Optional[int]:
|
3683
3586
|
"""
|
3684
|
-
The number of seconds to use as a connection
|
3685
|
-
timeout.
|
3587
|
+
The number of seconds to use as a connection timeout.
|
3686
3588
|
"""
|
3687
3589
|
return pulumi.get(self, "connect_timeout")
|
3688
3590
|
|
3689
3591
|
@property
|
3690
3592
|
@pulumi.getter
|
3691
|
-
def data(self) -> Optional[Mapping[str,
|
3593
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
3692
3594
|
"""
|
3693
3595
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3694
3596
|
|
@@ -3700,8 +3602,7 @@ class SecretsMountInfluxdb(dict):
|
|
3700
3602
|
@pulumi.getter(name="insecureTls")
|
3701
3603
|
def insecure_tls(self) -> Optional[bool]:
|
3702
3604
|
"""
|
3703
|
-
Whether to skip verification of the server
|
3704
|
-
certificate when using TLS.
|
3605
|
+
Whether to skip verification of the server certificate when using TLS.
|
3705
3606
|
"""
|
3706
3607
|
return pulumi.get(self, "insecure_tls")
|
3707
3608
|
|
@@ -3709,8 +3610,7 @@ class SecretsMountInfluxdb(dict):
|
|
3709
3610
|
@pulumi.getter(name="pemBundle")
|
3710
3611
|
def pem_bundle(self) -> Optional[str]:
|
3711
3612
|
"""
|
3712
|
-
Concatenated PEM blocks
|
3713
|
-
chain.
|
3613
|
+
Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
3714
3614
|
"""
|
3715
3615
|
return pulumi.get(self, "pem_bundle")
|
3716
3616
|
|
@@ -3718,7 +3618,7 @@ class SecretsMountInfluxdb(dict):
|
|
3718
3618
|
@pulumi.getter(name="pemJson")
|
3719
3619
|
def pem_json(self) -> Optional[str]:
|
3720
3620
|
"""
|
3721
|
-
|
3621
|
+
Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
3722
3622
|
"""
|
3723
3623
|
return pulumi.get(self, "pem_json")
|
3724
3624
|
|
@@ -3734,8 +3634,7 @@ class SecretsMountInfluxdb(dict):
|
|
3734
3634
|
@pulumi.getter
|
3735
3635
|
def port(self) -> Optional[int]:
|
3736
3636
|
"""
|
3737
|
-
The
|
3738
|
-
part of the host.
|
3637
|
+
The transport port to use to connect to Influxdb.
|
3739
3638
|
"""
|
3740
3639
|
return pulumi.get(self, "port")
|
3741
3640
|
|
@@ -3751,7 +3650,7 @@ class SecretsMountInfluxdb(dict):
|
|
3751
3650
|
@pulumi.getter
|
3752
3651
|
def tls(self) -> Optional[bool]:
|
3753
3652
|
"""
|
3754
|
-
Whether to use TLS when connecting to
|
3653
|
+
Whether to use TLS when connecting to Influxdb.
|
3755
3654
|
"""
|
3756
3655
|
return pulumi.get(self, "tls")
|
3757
3656
|
|
@@ -3759,7 +3658,7 @@ class SecretsMountInfluxdb(dict):
|
|
3759
3658
|
@pulumi.getter(name="usernameTemplate")
|
3760
3659
|
def username_template(self) -> Optional[str]:
|
3761
3660
|
"""
|
3762
|
-
|
3661
|
+
Template describing how dynamic usernames are generated.
|
3763
3662
|
"""
|
3764
3663
|
return pulumi.get(self, "username_template")
|
3765
3664
|
|
@@ -3812,7 +3711,7 @@ class SecretsMountMongodb(dict):
|
|
3812
3711
|
name: str,
|
3813
3712
|
allowed_roles: Optional[Sequence[str]] = None,
|
3814
3713
|
connection_url: Optional[str] = None,
|
3815
|
-
data: Optional[Mapping[str,
|
3714
|
+
data: Optional[Mapping[str, str]] = None,
|
3816
3715
|
max_connection_lifetime: Optional[int] = None,
|
3817
3716
|
max_idle_connections: Optional[int] = None,
|
3818
3717
|
max_open_connections: Optional[int] = None,
|
@@ -3826,21 +3725,18 @@ class SecretsMountMongodb(dict):
|
|
3826
3725
|
:param str name: Name of the database connection.
|
3827
3726
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3828
3727
|
connection.
|
3829
|
-
:param str connection_url:
|
3830
|
-
|
3831
|
-
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3728
|
+
:param str connection_url: Connection string to use to connect to the database.
|
3729
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3832
3730
|
|
3833
3731
|
Supported list of database secrets engines that can be configured:
|
3834
|
-
:param int max_connection_lifetime:
|
3835
|
-
:param int max_idle_connections:
|
3836
|
-
|
3837
|
-
:param
|
3838
|
-
the database.
|
3839
|
-
:param str password: The root credential password used in the connection URL.
|
3732
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
3733
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
3734
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
3735
|
+
:param str password: The root credential password used in the connection URL
|
3840
3736
|
:param str plugin_name: Specifies the name of the plugin to use.
|
3841
3737
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
3842
|
-
:param str username: The root credential username used in the connection URL
|
3843
|
-
:param str username_template:
|
3738
|
+
:param str username: The root credential username used in the connection URL
|
3739
|
+
:param str username_template: Username generation template.
|
3844
3740
|
:param bool verify_connection: Whether the connection should be verified on
|
3845
3741
|
initial configuration or not.
|
3846
3742
|
"""
|
@@ -3891,14 +3787,13 @@ class SecretsMountMongodb(dict):
|
|
3891
3787
|
@pulumi.getter(name="connectionUrl")
|
3892
3788
|
def connection_url(self) -> Optional[str]:
|
3893
3789
|
"""
|
3894
|
-
|
3895
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
3790
|
+
Connection string to use to connect to the database.
|
3896
3791
|
"""
|
3897
3792
|
return pulumi.get(self, "connection_url")
|
3898
3793
|
|
3899
3794
|
@property
|
3900
3795
|
@pulumi.getter
|
3901
|
-
def data(self) -> Optional[Mapping[str,
|
3796
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
3902
3797
|
"""
|
3903
3798
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3904
3799
|
|
@@ -3910,7 +3805,7 @@ class SecretsMountMongodb(dict):
|
|
3910
3805
|
@pulumi.getter(name="maxConnectionLifetime")
|
3911
3806
|
def max_connection_lifetime(self) -> Optional[int]:
|
3912
3807
|
"""
|
3913
|
-
|
3808
|
+
Maximum number of seconds a connection may be reused.
|
3914
3809
|
"""
|
3915
3810
|
return pulumi.get(self, "max_connection_lifetime")
|
3916
3811
|
|
@@ -3918,8 +3813,7 @@ class SecretsMountMongodb(dict):
|
|
3918
3813
|
@pulumi.getter(name="maxIdleConnections")
|
3919
3814
|
def max_idle_connections(self) -> Optional[int]:
|
3920
3815
|
"""
|
3921
|
-
|
3922
|
-
the database.
|
3816
|
+
Maximum number of idle connections to the database.
|
3923
3817
|
"""
|
3924
3818
|
return pulumi.get(self, "max_idle_connections")
|
3925
3819
|
|
@@ -3927,8 +3821,7 @@ class SecretsMountMongodb(dict):
|
|
3927
3821
|
@pulumi.getter(name="maxOpenConnections")
|
3928
3822
|
def max_open_connections(self) -> Optional[int]:
|
3929
3823
|
"""
|
3930
|
-
|
3931
|
-
the database.
|
3824
|
+
Maximum number of open connections to the database.
|
3932
3825
|
"""
|
3933
3826
|
return pulumi.get(self, "max_open_connections")
|
3934
3827
|
|
@@ -3936,7 +3829,7 @@ class SecretsMountMongodb(dict):
|
|
3936
3829
|
@pulumi.getter
|
3937
3830
|
def password(self) -> Optional[str]:
|
3938
3831
|
"""
|
3939
|
-
The root credential password used in the connection URL
|
3832
|
+
The root credential password used in the connection URL
|
3940
3833
|
"""
|
3941
3834
|
return pulumi.get(self, "password")
|
3942
3835
|
|
@@ -3960,7 +3853,7 @@ class SecretsMountMongodb(dict):
|
|
3960
3853
|
@pulumi.getter
|
3961
3854
|
def username(self) -> Optional[str]:
|
3962
3855
|
"""
|
3963
|
-
The root credential username used in the connection URL
|
3856
|
+
The root credential username used in the connection URL
|
3964
3857
|
"""
|
3965
3858
|
return pulumi.get(self, "username")
|
3966
3859
|
|
@@ -3968,7 +3861,7 @@ class SecretsMountMongodb(dict):
|
|
3968
3861
|
@pulumi.getter(name="usernameTemplate")
|
3969
3862
|
def username_template(self) -> Optional[str]:
|
3970
3863
|
"""
|
3971
|
-
|
3864
|
+
Username generation template.
|
3972
3865
|
"""
|
3973
3866
|
return pulumi.get(self, "username_template")
|
3974
3867
|
|
@@ -4019,7 +3912,7 @@ class SecretsMountMongodbatla(dict):
|
|
4019
3912
|
project_id: str,
|
4020
3913
|
public_key: str,
|
4021
3914
|
allowed_roles: Optional[Sequence[str]] = None,
|
4022
|
-
data: Optional[Mapping[str,
|
3915
|
+
data: Optional[Mapping[str, str]] = None,
|
4023
3916
|
plugin_name: Optional[str] = None,
|
4024
3917
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
4025
3918
|
verify_connection: Optional[bool] = None):
|
@@ -4030,7 +3923,7 @@ class SecretsMountMongodbatla(dict):
|
|
4030
3923
|
:param str public_key: The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
|
4031
3924
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
4032
3925
|
connection.
|
4033
|
-
:param Mapping[str,
|
3926
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4034
3927
|
|
4035
3928
|
Supported list of database secrets engines that can be configured:
|
4036
3929
|
:param str plugin_name: Specifies the name of the plugin to use.
|
@@ -4096,7 +3989,7 @@ class SecretsMountMongodbatla(dict):
|
|
4096
3989
|
|
4097
3990
|
@property
|
4098
3991
|
@pulumi.getter
|
4099
|
-
def data(self) -> Optional[Mapping[str,
|
3992
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
4100
3993
|
"""
|
4101
3994
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4102
3995
|
|
@@ -4174,7 +4067,7 @@ class SecretsMountMssql(dict):
|
|
4174
4067
|
allowed_roles: Optional[Sequence[str]] = None,
|
4175
4068
|
connection_url: Optional[str] = None,
|
4176
4069
|
contained_db: Optional[bool] = None,
|
4177
|
-
data: Optional[Mapping[str,
|
4070
|
+
data: Optional[Mapping[str, str]] = None,
|
4178
4071
|
disable_escaping: Optional[bool] = None,
|
4179
4072
|
max_connection_lifetime: Optional[int] = None,
|
4180
4073
|
max_idle_connections: Optional[int] = None,
|
@@ -4189,25 +4082,20 @@ class SecretsMountMssql(dict):
|
|
4189
4082
|
:param str name: Name of the database connection.
|
4190
4083
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
4191
4084
|
connection.
|
4192
|
-
:param str connection_url:
|
4193
|
-
|
4194
|
-
:param
|
4195
|
-
Contained Database, e.g. AzureSQL.
|
4196
|
-
See [Vault docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
|
4197
|
-
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4085
|
+
:param str connection_url: Connection string to use to connect to the database.
|
4086
|
+
:param bool contained_db: Set to true when the target is a Contained Database, e.g. AzureSQL.
|
4087
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4198
4088
|
|
4199
4089
|
Supported list of database secrets engines that can be configured:
|
4200
|
-
:param bool disable_escaping: Disable special character escaping in username and password
|
4201
|
-
:param int max_connection_lifetime:
|
4202
|
-
:param int max_idle_connections:
|
4203
|
-
|
4204
|
-
:param
|
4205
|
-
the database.
|
4206
|
-
:param str password: The root credential password used in the connection URL.
|
4090
|
+
:param bool disable_escaping: Disable special character escaping in username and password
|
4091
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
4092
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
4093
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
4094
|
+
:param str password: The root credential password used in the connection URL
|
4207
4095
|
:param str plugin_name: Specifies the name of the plugin to use.
|
4208
4096
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
4209
|
-
:param str username: The root credential username used in the connection URL
|
4210
|
-
:param str username_template:
|
4097
|
+
:param str username: The root credential username used in the connection URL
|
4098
|
+
:param str username_template: Username generation template.
|
4211
4099
|
:param bool verify_connection: Whether the connection should be verified on
|
4212
4100
|
initial configuration or not.
|
4213
4101
|
"""
|
@@ -4262,8 +4150,7 @@ class SecretsMountMssql(dict):
|
|
4262
4150
|
@pulumi.getter(name="connectionUrl")
|
4263
4151
|
def connection_url(self) -> Optional[str]:
|
4264
4152
|
"""
|
4265
|
-
|
4266
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4153
|
+
Connection string to use to connect to the database.
|
4267
4154
|
"""
|
4268
4155
|
return pulumi.get(self, "connection_url")
|
4269
4156
|
|
@@ -4271,15 +4158,13 @@ class SecretsMountMssql(dict):
|
|
4271
4158
|
@pulumi.getter(name="containedDb")
|
4272
4159
|
def contained_db(self) -> Optional[bool]:
|
4273
4160
|
"""
|
4274
|
-
|
4275
|
-
Contained Database, e.g. AzureSQL.
|
4276
|
-
See [Vault docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
|
4161
|
+
Set to true when the target is a Contained Database, e.g. AzureSQL.
|
4277
4162
|
"""
|
4278
4163
|
return pulumi.get(self, "contained_db")
|
4279
4164
|
|
4280
4165
|
@property
|
4281
4166
|
@pulumi.getter
|
4282
|
-
def data(self) -> Optional[Mapping[str,
|
4167
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
4283
4168
|
"""
|
4284
4169
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4285
4170
|
|
@@ -4291,7 +4176,7 @@ class SecretsMountMssql(dict):
|
|
4291
4176
|
@pulumi.getter(name="disableEscaping")
|
4292
4177
|
def disable_escaping(self) -> Optional[bool]:
|
4293
4178
|
"""
|
4294
|
-
Disable special character escaping in username and password
|
4179
|
+
Disable special character escaping in username and password
|
4295
4180
|
"""
|
4296
4181
|
return pulumi.get(self, "disable_escaping")
|
4297
4182
|
|
@@ -4299,7 +4184,7 @@ class SecretsMountMssql(dict):
|
|
4299
4184
|
@pulumi.getter(name="maxConnectionLifetime")
|
4300
4185
|
def max_connection_lifetime(self) -> Optional[int]:
|
4301
4186
|
"""
|
4302
|
-
|
4187
|
+
Maximum number of seconds a connection may be reused.
|
4303
4188
|
"""
|
4304
4189
|
return pulumi.get(self, "max_connection_lifetime")
|
4305
4190
|
|
@@ -4307,8 +4192,7 @@ class SecretsMountMssql(dict):
|
|
4307
4192
|
@pulumi.getter(name="maxIdleConnections")
|
4308
4193
|
def max_idle_connections(self) -> Optional[int]:
|
4309
4194
|
"""
|
4310
|
-
|
4311
|
-
the database.
|
4195
|
+
Maximum number of idle connections to the database.
|
4312
4196
|
"""
|
4313
4197
|
return pulumi.get(self, "max_idle_connections")
|
4314
4198
|
|
@@ -4316,8 +4200,7 @@ class SecretsMountMssql(dict):
|
|
4316
4200
|
@pulumi.getter(name="maxOpenConnections")
|
4317
4201
|
def max_open_connections(self) -> Optional[int]:
|
4318
4202
|
"""
|
4319
|
-
|
4320
|
-
the database.
|
4203
|
+
Maximum number of open connections to the database.
|
4321
4204
|
"""
|
4322
4205
|
return pulumi.get(self, "max_open_connections")
|
4323
4206
|
|
@@ -4325,7 +4208,7 @@ class SecretsMountMssql(dict):
|
|
4325
4208
|
@pulumi.getter
|
4326
4209
|
def password(self) -> Optional[str]:
|
4327
4210
|
"""
|
4328
|
-
The root credential password used in the connection URL
|
4211
|
+
The root credential password used in the connection URL
|
4329
4212
|
"""
|
4330
4213
|
return pulumi.get(self, "password")
|
4331
4214
|
|
@@ -4349,7 +4232,7 @@ class SecretsMountMssql(dict):
|
|
4349
4232
|
@pulumi.getter
|
4350
4233
|
def username(self) -> Optional[str]:
|
4351
4234
|
"""
|
4352
|
-
The root credential username used in the connection URL
|
4235
|
+
The root credential username used in the connection URL
|
4353
4236
|
"""
|
4354
4237
|
return pulumi.get(self, "username")
|
4355
4238
|
|
@@ -4357,7 +4240,7 @@ class SecretsMountMssql(dict):
|
|
4357
4240
|
@pulumi.getter(name="usernameTemplate")
|
4358
4241
|
def username_template(self) -> Optional[str]:
|
4359
4242
|
"""
|
4360
|
-
|
4243
|
+
Username generation template.
|
4361
4244
|
"""
|
4362
4245
|
return pulumi.get(self, "username_template")
|
4363
4246
|
|
@@ -4419,7 +4302,7 @@ class SecretsMountMysql(dict):
|
|
4419
4302
|
allowed_roles: Optional[Sequence[str]] = None,
|
4420
4303
|
auth_type: Optional[str] = None,
|
4421
4304
|
connection_url: Optional[str] = None,
|
4422
|
-
data: Optional[Mapping[str,
|
4305
|
+
data: Optional[Mapping[str, str]] = None,
|
4423
4306
|
max_connection_lifetime: Optional[int] = None,
|
4424
4307
|
max_idle_connections: Optional[int] = None,
|
4425
4308
|
max_open_connections: Optional[int] = None,
|
@@ -4437,24 +4320,21 @@ class SecretsMountMysql(dict):
|
|
4437
4320
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
4438
4321
|
connection.
|
4439
4322
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4440
|
-
:param str connection_url:
|
4441
|
-
|
4442
|
-
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4323
|
+
:param str connection_url: Connection string to use to connect to the database.
|
4324
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4443
4325
|
|
4444
4326
|
Supported list of database secrets engines that can be configured:
|
4445
|
-
:param int max_connection_lifetime:
|
4446
|
-
:param int max_idle_connections:
|
4447
|
-
|
4448
|
-
:param
|
4449
|
-
the database.
|
4450
|
-
:param str password: The root credential password used in the connection URL.
|
4327
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
4328
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
4329
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
4330
|
+
:param str password: The root credential password used in the connection URL
|
4451
4331
|
:param str plugin_name: Specifies the name of the plugin to use.
|
4452
4332
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
4453
4333
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
4454
4334
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
4455
4335
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
4456
|
-
:param str username: The root credential username used in the connection URL
|
4457
|
-
:param str username_template:
|
4336
|
+
:param str username: The root credential username used in the connection URL
|
4337
|
+
:param str username_template: Username generation template.
|
4458
4338
|
:param bool verify_connection: Whether the connection should be verified on
|
4459
4339
|
initial configuration or not.
|
4460
4340
|
"""
|
@@ -4521,14 +4401,13 @@ class SecretsMountMysql(dict):
|
|
4521
4401
|
@pulumi.getter(name="connectionUrl")
|
4522
4402
|
def connection_url(self) -> Optional[str]:
|
4523
4403
|
"""
|
4524
|
-
|
4525
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4404
|
+
Connection string to use to connect to the database.
|
4526
4405
|
"""
|
4527
4406
|
return pulumi.get(self, "connection_url")
|
4528
4407
|
|
4529
4408
|
@property
|
4530
4409
|
@pulumi.getter
|
4531
|
-
def data(self) -> Optional[Mapping[str,
|
4410
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
4532
4411
|
"""
|
4533
4412
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4534
4413
|
|
@@ -4540,7 +4419,7 @@ class SecretsMountMysql(dict):
|
|
4540
4419
|
@pulumi.getter(name="maxConnectionLifetime")
|
4541
4420
|
def max_connection_lifetime(self) -> Optional[int]:
|
4542
4421
|
"""
|
4543
|
-
|
4422
|
+
Maximum number of seconds a connection may be reused.
|
4544
4423
|
"""
|
4545
4424
|
return pulumi.get(self, "max_connection_lifetime")
|
4546
4425
|
|
@@ -4548,8 +4427,7 @@ class SecretsMountMysql(dict):
|
|
4548
4427
|
@pulumi.getter(name="maxIdleConnections")
|
4549
4428
|
def max_idle_connections(self) -> Optional[int]:
|
4550
4429
|
"""
|
4551
|
-
|
4552
|
-
the database.
|
4430
|
+
Maximum number of idle connections to the database.
|
4553
4431
|
"""
|
4554
4432
|
return pulumi.get(self, "max_idle_connections")
|
4555
4433
|
|
@@ -4557,8 +4435,7 @@ class SecretsMountMysql(dict):
|
|
4557
4435
|
@pulumi.getter(name="maxOpenConnections")
|
4558
4436
|
def max_open_connections(self) -> Optional[int]:
|
4559
4437
|
"""
|
4560
|
-
|
4561
|
-
the database.
|
4438
|
+
Maximum number of open connections to the database.
|
4562
4439
|
"""
|
4563
4440
|
return pulumi.get(self, "max_open_connections")
|
4564
4441
|
|
@@ -4566,7 +4443,7 @@ class SecretsMountMysql(dict):
|
|
4566
4443
|
@pulumi.getter
|
4567
4444
|
def password(self) -> Optional[str]:
|
4568
4445
|
"""
|
4569
|
-
The root credential password used in the connection URL
|
4446
|
+
The root credential password used in the connection URL
|
4570
4447
|
"""
|
4571
4448
|
return pulumi.get(self, "password")
|
4572
4449
|
|
@@ -4614,7 +4491,7 @@ class SecretsMountMysql(dict):
|
|
4614
4491
|
@pulumi.getter
|
4615
4492
|
def username(self) -> Optional[str]:
|
4616
4493
|
"""
|
4617
|
-
The root credential username used in the connection URL
|
4494
|
+
The root credential username used in the connection URL
|
4618
4495
|
"""
|
4619
4496
|
return pulumi.get(self, "username")
|
4620
4497
|
|
@@ -4622,7 +4499,7 @@ class SecretsMountMysql(dict):
|
|
4622
4499
|
@pulumi.getter(name="usernameTemplate")
|
4623
4500
|
def username_template(self) -> Optional[str]:
|
4624
4501
|
"""
|
4625
|
-
|
4502
|
+
Username generation template.
|
4626
4503
|
"""
|
4627
4504
|
return pulumi.get(self, "username_template")
|
4628
4505
|
|
@@ -4684,7 +4561,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4684
4561
|
allowed_roles: Optional[Sequence[str]] = None,
|
4685
4562
|
auth_type: Optional[str] = None,
|
4686
4563
|
connection_url: Optional[str] = None,
|
4687
|
-
data: Optional[Mapping[str,
|
4564
|
+
data: Optional[Mapping[str, str]] = None,
|
4688
4565
|
max_connection_lifetime: Optional[int] = None,
|
4689
4566
|
max_idle_connections: Optional[int] = None,
|
4690
4567
|
max_open_connections: Optional[int] = None,
|
@@ -4702,24 +4579,21 @@ class SecretsMountMysqlAurora(dict):
|
|
4702
4579
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
4703
4580
|
connection.
|
4704
4581
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4705
|
-
:param str connection_url:
|
4706
|
-
|
4707
|
-
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4582
|
+
:param str connection_url: Connection string to use to connect to the database.
|
4583
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4708
4584
|
|
4709
4585
|
Supported list of database secrets engines that can be configured:
|
4710
|
-
:param int max_connection_lifetime:
|
4711
|
-
:param int max_idle_connections:
|
4712
|
-
|
4713
|
-
:param
|
4714
|
-
the database.
|
4715
|
-
:param str password: The root credential password used in the connection URL.
|
4586
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
4587
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
4588
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
4589
|
+
:param str password: The root credential password used in the connection URL
|
4716
4590
|
:param str plugin_name: Specifies the name of the plugin to use.
|
4717
4591
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
4718
4592
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
4719
4593
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
4720
4594
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
4721
|
-
:param str username: The root credential username used in the connection URL
|
4722
|
-
:param str username_template:
|
4595
|
+
:param str username: The root credential username used in the connection URL
|
4596
|
+
:param str username_template: Username generation template.
|
4723
4597
|
:param bool verify_connection: Whether the connection should be verified on
|
4724
4598
|
initial configuration or not.
|
4725
4599
|
"""
|
@@ -4786,14 +4660,13 @@ class SecretsMountMysqlAurora(dict):
|
|
4786
4660
|
@pulumi.getter(name="connectionUrl")
|
4787
4661
|
def connection_url(self) -> Optional[str]:
|
4788
4662
|
"""
|
4789
|
-
|
4790
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4663
|
+
Connection string to use to connect to the database.
|
4791
4664
|
"""
|
4792
4665
|
return pulumi.get(self, "connection_url")
|
4793
4666
|
|
4794
4667
|
@property
|
4795
4668
|
@pulumi.getter
|
4796
|
-
def data(self) -> Optional[Mapping[str,
|
4669
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
4797
4670
|
"""
|
4798
4671
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4799
4672
|
|
@@ -4805,7 +4678,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4805
4678
|
@pulumi.getter(name="maxConnectionLifetime")
|
4806
4679
|
def max_connection_lifetime(self) -> Optional[int]:
|
4807
4680
|
"""
|
4808
|
-
|
4681
|
+
Maximum number of seconds a connection may be reused.
|
4809
4682
|
"""
|
4810
4683
|
return pulumi.get(self, "max_connection_lifetime")
|
4811
4684
|
|
@@ -4813,8 +4686,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4813
4686
|
@pulumi.getter(name="maxIdleConnections")
|
4814
4687
|
def max_idle_connections(self) -> Optional[int]:
|
4815
4688
|
"""
|
4816
|
-
|
4817
|
-
the database.
|
4689
|
+
Maximum number of idle connections to the database.
|
4818
4690
|
"""
|
4819
4691
|
return pulumi.get(self, "max_idle_connections")
|
4820
4692
|
|
@@ -4822,8 +4694,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4822
4694
|
@pulumi.getter(name="maxOpenConnections")
|
4823
4695
|
def max_open_connections(self) -> Optional[int]:
|
4824
4696
|
"""
|
4825
|
-
|
4826
|
-
the database.
|
4697
|
+
Maximum number of open connections to the database.
|
4827
4698
|
"""
|
4828
4699
|
return pulumi.get(self, "max_open_connections")
|
4829
4700
|
|
@@ -4831,7 +4702,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4831
4702
|
@pulumi.getter
|
4832
4703
|
def password(self) -> Optional[str]:
|
4833
4704
|
"""
|
4834
|
-
The root credential password used in the connection URL
|
4705
|
+
The root credential password used in the connection URL
|
4835
4706
|
"""
|
4836
4707
|
return pulumi.get(self, "password")
|
4837
4708
|
|
@@ -4879,7 +4750,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4879
4750
|
@pulumi.getter
|
4880
4751
|
def username(self) -> Optional[str]:
|
4881
4752
|
"""
|
4882
|
-
The root credential username used in the connection URL
|
4753
|
+
The root credential username used in the connection URL
|
4883
4754
|
"""
|
4884
4755
|
return pulumi.get(self, "username")
|
4885
4756
|
|
@@ -4887,7 +4758,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4887
4758
|
@pulumi.getter(name="usernameTemplate")
|
4888
4759
|
def username_template(self) -> Optional[str]:
|
4889
4760
|
"""
|
4890
|
-
|
4761
|
+
Username generation template.
|
4891
4762
|
"""
|
4892
4763
|
return pulumi.get(self, "username_template")
|
4893
4764
|
|
@@ -4949,7 +4820,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
4949
4820
|
allowed_roles: Optional[Sequence[str]] = None,
|
4950
4821
|
auth_type: Optional[str] = None,
|
4951
4822
|
connection_url: Optional[str] = None,
|
4952
|
-
data: Optional[Mapping[str,
|
4823
|
+
data: Optional[Mapping[str, str]] = None,
|
4953
4824
|
max_connection_lifetime: Optional[int] = None,
|
4954
4825
|
max_idle_connections: Optional[int] = None,
|
4955
4826
|
max_open_connections: Optional[int] = None,
|
@@ -4967,24 +4838,21 @@ class SecretsMountMysqlLegacy(dict):
|
|
4967
4838
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
4968
4839
|
connection.
|
4969
4840
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4970
|
-
:param str connection_url:
|
4971
|
-
|
4972
|
-
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4841
|
+
:param str connection_url: Connection string to use to connect to the database.
|
4842
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4973
4843
|
|
4974
4844
|
Supported list of database secrets engines that can be configured:
|
4975
|
-
:param int max_connection_lifetime:
|
4976
|
-
:param int max_idle_connections:
|
4977
|
-
|
4978
|
-
:param
|
4979
|
-
the database.
|
4980
|
-
:param str password: The root credential password used in the connection URL.
|
4845
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
4846
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
4847
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
4848
|
+
:param str password: The root credential password used in the connection URL
|
4981
4849
|
:param str plugin_name: Specifies the name of the plugin to use.
|
4982
4850
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
4983
4851
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
4984
4852
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
4985
4853
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
4986
|
-
:param str username: The root credential username used in the connection URL
|
4987
|
-
:param str username_template:
|
4854
|
+
:param str username: The root credential username used in the connection URL
|
4855
|
+
:param str username_template: Username generation template.
|
4988
4856
|
:param bool verify_connection: Whether the connection should be verified on
|
4989
4857
|
initial configuration or not.
|
4990
4858
|
"""
|
@@ -5051,14 +4919,13 @@ class SecretsMountMysqlLegacy(dict):
|
|
5051
4919
|
@pulumi.getter(name="connectionUrl")
|
5052
4920
|
def connection_url(self) -> Optional[str]:
|
5053
4921
|
"""
|
5054
|
-
|
5055
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4922
|
+
Connection string to use to connect to the database.
|
5056
4923
|
"""
|
5057
4924
|
return pulumi.get(self, "connection_url")
|
5058
4925
|
|
5059
4926
|
@property
|
5060
4927
|
@pulumi.getter
|
5061
|
-
def data(self) -> Optional[Mapping[str,
|
4928
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
5062
4929
|
"""
|
5063
4930
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5064
4931
|
|
@@ -5070,7 +4937,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
5070
4937
|
@pulumi.getter(name="maxConnectionLifetime")
|
5071
4938
|
def max_connection_lifetime(self) -> Optional[int]:
|
5072
4939
|
"""
|
5073
|
-
|
4940
|
+
Maximum number of seconds a connection may be reused.
|
5074
4941
|
"""
|
5075
4942
|
return pulumi.get(self, "max_connection_lifetime")
|
5076
4943
|
|
@@ -5078,8 +4945,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
5078
4945
|
@pulumi.getter(name="maxIdleConnections")
|
5079
4946
|
def max_idle_connections(self) -> Optional[int]:
|
5080
4947
|
"""
|
5081
|
-
|
5082
|
-
the database.
|
4948
|
+
Maximum number of idle connections to the database.
|
5083
4949
|
"""
|
5084
4950
|
return pulumi.get(self, "max_idle_connections")
|
5085
4951
|
|
@@ -5087,8 +4953,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
5087
4953
|
@pulumi.getter(name="maxOpenConnections")
|
5088
4954
|
def max_open_connections(self) -> Optional[int]:
|
5089
4955
|
"""
|
5090
|
-
|
5091
|
-
the database.
|
4956
|
+
Maximum number of open connections to the database.
|
5092
4957
|
"""
|
5093
4958
|
return pulumi.get(self, "max_open_connections")
|
5094
4959
|
|
@@ -5096,7 +4961,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
5096
4961
|
@pulumi.getter
|
5097
4962
|
def password(self) -> Optional[str]:
|
5098
4963
|
"""
|
5099
|
-
The root credential password used in the connection URL
|
4964
|
+
The root credential password used in the connection URL
|
5100
4965
|
"""
|
5101
4966
|
return pulumi.get(self, "password")
|
5102
4967
|
|
@@ -5144,7 +5009,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
5144
5009
|
@pulumi.getter
|
5145
5010
|
def username(self) -> Optional[str]:
|
5146
5011
|
"""
|
5147
|
-
The root credential username used in the connection URL
|
5012
|
+
The root credential username used in the connection URL
|
5148
5013
|
"""
|
5149
5014
|
return pulumi.get(self, "username")
|
5150
5015
|
|
@@ -5152,7 +5017,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
5152
5017
|
@pulumi.getter(name="usernameTemplate")
|
5153
5018
|
def username_template(self) -> Optional[str]:
|
5154
5019
|
"""
|
5155
|
-
|
5020
|
+
Username generation template.
|
5156
5021
|
"""
|
5157
5022
|
return pulumi.get(self, "username_template")
|
5158
5023
|
|
@@ -5214,7 +5079,7 @@ class SecretsMountMysqlRd(dict):
|
|
5214
5079
|
allowed_roles: Optional[Sequence[str]] = None,
|
5215
5080
|
auth_type: Optional[str] = None,
|
5216
5081
|
connection_url: Optional[str] = None,
|
5217
|
-
data: Optional[Mapping[str,
|
5082
|
+
data: Optional[Mapping[str, str]] = None,
|
5218
5083
|
max_connection_lifetime: Optional[int] = None,
|
5219
5084
|
max_idle_connections: Optional[int] = None,
|
5220
5085
|
max_open_connections: Optional[int] = None,
|
@@ -5232,24 +5097,21 @@ class SecretsMountMysqlRd(dict):
|
|
5232
5097
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
5233
5098
|
connection.
|
5234
5099
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5235
|
-
:param str connection_url:
|
5236
|
-
|
5237
|
-
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5100
|
+
:param str connection_url: Connection string to use to connect to the database.
|
5101
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5238
5102
|
|
5239
5103
|
Supported list of database secrets engines that can be configured:
|
5240
|
-
:param int max_connection_lifetime:
|
5241
|
-
:param int max_idle_connections:
|
5242
|
-
|
5243
|
-
:param
|
5244
|
-
the database.
|
5245
|
-
:param str password: The root credential password used in the connection URL.
|
5104
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
5105
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
5106
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
5107
|
+
:param str password: The root credential password used in the connection URL
|
5246
5108
|
:param str plugin_name: Specifies the name of the plugin to use.
|
5247
5109
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5248
5110
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
5249
5111
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
5250
5112
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
5251
|
-
:param str username: The root credential username used in the connection URL
|
5252
|
-
:param str username_template:
|
5113
|
+
:param str username: The root credential username used in the connection URL
|
5114
|
+
:param str username_template: Username generation template.
|
5253
5115
|
:param bool verify_connection: Whether the connection should be verified on
|
5254
5116
|
initial configuration or not.
|
5255
5117
|
"""
|
@@ -5316,14 +5178,13 @@ class SecretsMountMysqlRd(dict):
|
|
5316
5178
|
@pulumi.getter(name="connectionUrl")
|
5317
5179
|
def connection_url(self) -> Optional[str]:
|
5318
5180
|
"""
|
5319
|
-
|
5320
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
5181
|
+
Connection string to use to connect to the database.
|
5321
5182
|
"""
|
5322
5183
|
return pulumi.get(self, "connection_url")
|
5323
5184
|
|
5324
5185
|
@property
|
5325
5186
|
@pulumi.getter
|
5326
|
-
def data(self) -> Optional[Mapping[str,
|
5187
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
5327
5188
|
"""
|
5328
5189
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5329
5190
|
|
@@ -5335,7 +5196,7 @@ class SecretsMountMysqlRd(dict):
|
|
5335
5196
|
@pulumi.getter(name="maxConnectionLifetime")
|
5336
5197
|
def max_connection_lifetime(self) -> Optional[int]:
|
5337
5198
|
"""
|
5338
|
-
|
5199
|
+
Maximum number of seconds a connection may be reused.
|
5339
5200
|
"""
|
5340
5201
|
return pulumi.get(self, "max_connection_lifetime")
|
5341
5202
|
|
@@ -5343,8 +5204,7 @@ class SecretsMountMysqlRd(dict):
|
|
5343
5204
|
@pulumi.getter(name="maxIdleConnections")
|
5344
5205
|
def max_idle_connections(self) -> Optional[int]:
|
5345
5206
|
"""
|
5346
|
-
|
5347
|
-
the database.
|
5207
|
+
Maximum number of idle connections to the database.
|
5348
5208
|
"""
|
5349
5209
|
return pulumi.get(self, "max_idle_connections")
|
5350
5210
|
|
@@ -5352,8 +5212,7 @@ class SecretsMountMysqlRd(dict):
|
|
5352
5212
|
@pulumi.getter(name="maxOpenConnections")
|
5353
5213
|
def max_open_connections(self) -> Optional[int]:
|
5354
5214
|
"""
|
5355
|
-
|
5356
|
-
the database.
|
5215
|
+
Maximum number of open connections to the database.
|
5357
5216
|
"""
|
5358
5217
|
return pulumi.get(self, "max_open_connections")
|
5359
5218
|
|
@@ -5361,7 +5220,7 @@ class SecretsMountMysqlRd(dict):
|
|
5361
5220
|
@pulumi.getter
|
5362
5221
|
def password(self) -> Optional[str]:
|
5363
5222
|
"""
|
5364
|
-
The root credential password used in the connection URL
|
5223
|
+
The root credential password used in the connection URL
|
5365
5224
|
"""
|
5366
5225
|
return pulumi.get(self, "password")
|
5367
5226
|
|
@@ -5409,7 +5268,7 @@ class SecretsMountMysqlRd(dict):
|
|
5409
5268
|
@pulumi.getter
|
5410
5269
|
def username(self) -> Optional[str]:
|
5411
5270
|
"""
|
5412
|
-
The root credential username used in the connection URL
|
5271
|
+
The root credential username used in the connection URL
|
5413
5272
|
"""
|
5414
5273
|
return pulumi.get(self, "username")
|
5415
5274
|
|
@@ -5417,7 +5276,7 @@ class SecretsMountMysqlRd(dict):
|
|
5417
5276
|
@pulumi.getter(name="usernameTemplate")
|
5418
5277
|
def username_template(self) -> Optional[str]:
|
5419
5278
|
"""
|
5420
|
-
|
5279
|
+
Username generation template.
|
5421
5280
|
"""
|
5422
5281
|
return pulumi.get(self, "username_template")
|
5423
5282
|
|
@@ -5474,7 +5333,7 @@ class SecretsMountOracle(dict):
|
|
5474
5333
|
name: str,
|
5475
5334
|
allowed_roles: Optional[Sequence[str]] = None,
|
5476
5335
|
connection_url: Optional[str] = None,
|
5477
|
-
data: Optional[Mapping[str,
|
5336
|
+
data: Optional[Mapping[str, str]] = None,
|
5478
5337
|
disconnect_sessions: Optional[bool] = None,
|
5479
5338
|
max_connection_lifetime: Optional[int] = None,
|
5480
5339
|
max_idle_connections: Optional[int] = None,
|
@@ -5490,23 +5349,20 @@ class SecretsMountOracle(dict):
|
|
5490
5349
|
:param str name: Name of the database connection.
|
5491
5350
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
5492
5351
|
connection.
|
5493
|
-
:param str connection_url:
|
5494
|
-
|
5495
|
-
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5352
|
+
:param str connection_url: Connection string to use to connect to the database.
|
5353
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5496
5354
|
|
5497
5355
|
Supported list of database secrets engines that can be configured:
|
5498
5356
|
:param bool disconnect_sessions: Set to true to disconnect any open sessions prior to running the revocation statements.
|
5499
|
-
:param int max_connection_lifetime:
|
5500
|
-
:param int max_idle_connections:
|
5501
|
-
|
5502
|
-
:param
|
5503
|
-
the database.
|
5504
|
-
:param str password: The root credential password used in the connection URL.
|
5357
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
5358
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
5359
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
5360
|
+
:param str password: The root credential password used in the connection URL
|
5505
5361
|
:param str plugin_name: Specifies the name of the plugin to use.
|
5506
5362
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5507
5363
|
:param bool split_statements: Set to true in order to split statements after semi-colons.
|
5508
|
-
:param str username: The root credential username used in the connection URL
|
5509
|
-
:param str username_template:
|
5364
|
+
:param str username: The root credential username used in the connection URL
|
5365
|
+
:param str username_template: Username generation template.
|
5510
5366
|
:param bool verify_connection: Whether the connection should be verified on
|
5511
5367
|
initial configuration or not.
|
5512
5368
|
"""
|
@@ -5561,14 +5417,13 @@ class SecretsMountOracle(dict):
|
|
5561
5417
|
@pulumi.getter(name="connectionUrl")
|
5562
5418
|
def connection_url(self) -> Optional[str]:
|
5563
5419
|
"""
|
5564
|
-
|
5565
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
5420
|
+
Connection string to use to connect to the database.
|
5566
5421
|
"""
|
5567
5422
|
return pulumi.get(self, "connection_url")
|
5568
5423
|
|
5569
5424
|
@property
|
5570
5425
|
@pulumi.getter
|
5571
|
-
def data(self) -> Optional[Mapping[str,
|
5426
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
5572
5427
|
"""
|
5573
5428
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5574
5429
|
|
@@ -5588,7 +5443,7 @@ class SecretsMountOracle(dict):
|
|
5588
5443
|
@pulumi.getter(name="maxConnectionLifetime")
|
5589
5444
|
def max_connection_lifetime(self) -> Optional[int]:
|
5590
5445
|
"""
|
5591
|
-
|
5446
|
+
Maximum number of seconds a connection may be reused.
|
5592
5447
|
"""
|
5593
5448
|
return pulumi.get(self, "max_connection_lifetime")
|
5594
5449
|
|
@@ -5596,8 +5451,7 @@ class SecretsMountOracle(dict):
|
|
5596
5451
|
@pulumi.getter(name="maxIdleConnections")
|
5597
5452
|
def max_idle_connections(self) -> Optional[int]:
|
5598
5453
|
"""
|
5599
|
-
|
5600
|
-
the database.
|
5454
|
+
Maximum number of idle connections to the database.
|
5601
5455
|
"""
|
5602
5456
|
return pulumi.get(self, "max_idle_connections")
|
5603
5457
|
|
@@ -5605,8 +5459,7 @@ class SecretsMountOracle(dict):
|
|
5605
5459
|
@pulumi.getter(name="maxOpenConnections")
|
5606
5460
|
def max_open_connections(self) -> Optional[int]:
|
5607
5461
|
"""
|
5608
|
-
|
5609
|
-
the database.
|
5462
|
+
Maximum number of open connections to the database.
|
5610
5463
|
"""
|
5611
5464
|
return pulumi.get(self, "max_open_connections")
|
5612
5465
|
|
@@ -5614,7 +5467,7 @@ class SecretsMountOracle(dict):
|
|
5614
5467
|
@pulumi.getter
|
5615
5468
|
def password(self) -> Optional[str]:
|
5616
5469
|
"""
|
5617
|
-
The root credential password used in the connection URL
|
5470
|
+
The root credential password used in the connection URL
|
5618
5471
|
"""
|
5619
5472
|
return pulumi.get(self, "password")
|
5620
5473
|
|
@@ -5646,7 +5499,7 @@ class SecretsMountOracle(dict):
|
|
5646
5499
|
@pulumi.getter
|
5647
5500
|
def username(self) -> Optional[str]:
|
5648
5501
|
"""
|
5649
|
-
The root credential username used in the connection URL
|
5502
|
+
The root credential username used in the connection URL
|
5650
5503
|
"""
|
5651
5504
|
return pulumi.get(self, "username")
|
5652
5505
|
|
@@ -5654,7 +5507,7 @@ class SecretsMountOracle(dict):
|
|
5654
5507
|
@pulumi.getter(name="usernameTemplate")
|
5655
5508
|
def username_template(self) -> Optional[str]:
|
5656
5509
|
"""
|
5657
|
-
|
5510
|
+
Username generation template.
|
5658
5511
|
"""
|
5659
5512
|
return pulumi.get(self, "username_template")
|
5660
5513
|
|
@@ -5689,10 +5542,18 @@ class SecretsMountPostgresql(dict):
|
|
5689
5542
|
suggest = "max_open_connections"
|
5690
5543
|
elif key == "pluginName":
|
5691
5544
|
suggest = "plugin_name"
|
5545
|
+
elif key == "privateKey":
|
5546
|
+
suggest = "private_key"
|
5692
5547
|
elif key == "rootRotationStatements":
|
5693
5548
|
suggest = "root_rotation_statements"
|
5549
|
+
elif key == "selfManaged":
|
5550
|
+
suggest = "self_managed"
|
5694
5551
|
elif key == "serviceAccountJson":
|
5695
5552
|
suggest = "service_account_json"
|
5553
|
+
elif key == "tlsCa":
|
5554
|
+
suggest = "tls_ca"
|
5555
|
+
elif key == "tlsCertificate":
|
5556
|
+
suggest = "tls_certificate"
|
5696
5557
|
elif key == "usernameTemplate":
|
5697
5558
|
suggest = "username_template"
|
5698
5559
|
elif key == "verifyConnection":
|
@@ -5714,15 +5575,19 @@ class SecretsMountPostgresql(dict):
|
|
5714
5575
|
allowed_roles: Optional[Sequence[str]] = None,
|
5715
5576
|
auth_type: Optional[str] = None,
|
5716
5577
|
connection_url: Optional[str] = None,
|
5717
|
-
data: Optional[Mapping[str,
|
5578
|
+
data: Optional[Mapping[str, str]] = None,
|
5718
5579
|
disable_escaping: Optional[bool] = None,
|
5719
5580
|
max_connection_lifetime: Optional[int] = None,
|
5720
5581
|
max_idle_connections: Optional[int] = None,
|
5721
5582
|
max_open_connections: Optional[int] = None,
|
5722
5583
|
password: Optional[str] = None,
|
5723
5584
|
plugin_name: Optional[str] = None,
|
5585
|
+
private_key: Optional[str] = None,
|
5724
5586
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
5587
|
+
self_managed: Optional[bool] = None,
|
5725
5588
|
service_account_json: Optional[str] = None,
|
5589
|
+
tls_ca: Optional[str] = None,
|
5590
|
+
tls_certificate: Optional[str] = None,
|
5726
5591
|
username: Optional[str] = None,
|
5727
5592
|
username_template: Optional[str] = None,
|
5728
5593
|
verify_connection: Optional[bool] = None):
|
@@ -5731,23 +5596,24 @@ class SecretsMountPostgresql(dict):
|
|
5731
5596
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
5732
5597
|
connection.
|
5733
5598
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5734
|
-
:param str connection_url:
|
5735
|
-
|
5736
|
-
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5599
|
+
:param str connection_url: Connection string to use to connect to the database.
|
5600
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5737
5601
|
|
5738
5602
|
Supported list of database secrets engines that can be configured:
|
5739
|
-
:param bool disable_escaping: Disable special character escaping in username and password
|
5740
|
-
:param int max_connection_lifetime:
|
5741
|
-
:param int max_idle_connections:
|
5742
|
-
|
5743
|
-
:param
|
5744
|
-
the database.
|
5745
|
-
:param str password: The root credential password used in the connection URL.
|
5603
|
+
:param bool disable_escaping: Disable special character escaping in username and password
|
5604
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
5605
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
5606
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
5607
|
+
:param str password: The root credential password used in the connection URL
|
5746
5608
|
:param str plugin_name: Specifies the name of the plugin to use.
|
5609
|
+
:param str private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
|
5747
5610
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5611
|
+
:param bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
|
5748
5612
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
5749
|
-
:param str
|
5750
|
-
:param str
|
5613
|
+
:param str tls_ca: The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
5614
|
+
:param str tls_certificate: The x509 client certificate for connecting to the database. Must be PEM encoded.
|
5615
|
+
:param str username: The root credential username used in the connection URL
|
5616
|
+
:param str username_template: Username generation template.
|
5751
5617
|
:param bool verify_connection: Whether the connection should be verified on
|
5752
5618
|
initial configuration or not.
|
5753
5619
|
"""
|
@@ -5772,10 +5638,18 @@ class SecretsMountPostgresql(dict):
|
|
5772
5638
|
pulumi.set(__self__, "password", password)
|
5773
5639
|
if plugin_name is not None:
|
5774
5640
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
5641
|
+
if private_key is not None:
|
5642
|
+
pulumi.set(__self__, "private_key", private_key)
|
5775
5643
|
if root_rotation_statements is not None:
|
5776
5644
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
5645
|
+
if self_managed is not None:
|
5646
|
+
pulumi.set(__self__, "self_managed", self_managed)
|
5777
5647
|
if service_account_json is not None:
|
5778
5648
|
pulumi.set(__self__, "service_account_json", service_account_json)
|
5649
|
+
if tls_ca is not None:
|
5650
|
+
pulumi.set(__self__, "tls_ca", tls_ca)
|
5651
|
+
if tls_certificate is not None:
|
5652
|
+
pulumi.set(__self__, "tls_certificate", tls_certificate)
|
5779
5653
|
if username is not None:
|
5780
5654
|
pulumi.set(__self__, "username", username)
|
5781
5655
|
if username_template is not None:
|
@@ -5812,14 +5686,13 @@ class SecretsMountPostgresql(dict):
|
|
5812
5686
|
@pulumi.getter(name="connectionUrl")
|
5813
5687
|
def connection_url(self) -> Optional[str]:
|
5814
5688
|
"""
|
5815
|
-
|
5816
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
5689
|
+
Connection string to use to connect to the database.
|
5817
5690
|
"""
|
5818
5691
|
return pulumi.get(self, "connection_url")
|
5819
5692
|
|
5820
5693
|
@property
|
5821
5694
|
@pulumi.getter
|
5822
|
-
def data(self) -> Optional[Mapping[str,
|
5695
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
5823
5696
|
"""
|
5824
5697
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5825
5698
|
|
@@ -5831,7 +5704,7 @@ class SecretsMountPostgresql(dict):
|
|
5831
5704
|
@pulumi.getter(name="disableEscaping")
|
5832
5705
|
def disable_escaping(self) -> Optional[bool]:
|
5833
5706
|
"""
|
5834
|
-
Disable special character escaping in username and password
|
5707
|
+
Disable special character escaping in username and password
|
5835
5708
|
"""
|
5836
5709
|
return pulumi.get(self, "disable_escaping")
|
5837
5710
|
|
@@ -5839,7 +5712,7 @@ class SecretsMountPostgresql(dict):
|
|
5839
5712
|
@pulumi.getter(name="maxConnectionLifetime")
|
5840
5713
|
def max_connection_lifetime(self) -> Optional[int]:
|
5841
5714
|
"""
|
5842
|
-
|
5715
|
+
Maximum number of seconds a connection may be reused.
|
5843
5716
|
"""
|
5844
5717
|
return pulumi.get(self, "max_connection_lifetime")
|
5845
5718
|
|
@@ -5847,8 +5720,7 @@ class SecretsMountPostgresql(dict):
|
|
5847
5720
|
@pulumi.getter(name="maxIdleConnections")
|
5848
5721
|
def max_idle_connections(self) -> Optional[int]:
|
5849
5722
|
"""
|
5850
|
-
|
5851
|
-
the database.
|
5723
|
+
Maximum number of idle connections to the database.
|
5852
5724
|
"""
|
5853
5725
|
return pulumi.get(self, "max_idle_connections")
|
5854
5726
|
|
@@ -5856,8 +5728,7 @@ class SecretsMountPostgresql(dict):
|
|
5856
5728
|
@pulumi.getter(name="maxOpenConnections")
|
5857
5729
|
def max_open_connections(self) -> Optional[int]:
|
5858
5730
|
"""
|
5859
|
-
|
5860
|
-
the database.
|
5731
|
+
Maximum number of open connections to the database.
|
5861
5732
|
"""
|
5862
5733
|
return pulumi.get(self, "max_open_connections")
|
5863
5734
|
|
@@ -5865,7 +5736,7 @@ class SecretsMountPostgresql(dict):
|
|
5865
5736
|
@pulumi.getter
|
5866
5737
|
def password(self) -> Optional[str]:
|
5867
5738
|
"""
|
5868
|
-
The root credential password used in the connection URL
|
5739
|
+
The root credential password used in the connection URL
|
5869
5740
|
"""
|
5870
5741
|
return pulumi.get(self, "password")
|
5871
5742
|
|
@@ -5877,6 +5748,14 @@ class SecretsMountPostgresql(dict):
|
|
5877
5748
|
"""
|
5878
5749
|
return pulumi.get(self, "plugin_name")
|
5879
5750
|
|
5751
|
+
@property
|
5752
|
+
@pulumi.getter(name="privateKey")
|
5753
|
+
def private_key(self) -> Optional[str]:
|
5754
|
+
"""
|
5755
|
+
The secret key used for the x509 client certificate. Must be PEM encoded.
|
5756
|
+
"""
|
5757
|
+
return pulumi.get(self, "private_key")
|
5758
|
+
|
5880
5759
|
@property
|
5881
5760
|
@pulumi.getter(name="rootRotationStatements")
|
5882
5761
|
def root_rotation_statements(self) -> Optional[Sequence[str]]:
|
@@ -5885,6 +5764,14 @@ class SecretsMountPostgresql(dict):
|
|
5885
5764
|
"""
|
5886
5765
|
return pulumi.get(self, "root_rotation_statements")
|
5887
5766
|
|
5767
|
+
@property
|
5768
|
+
@pulumi.getter(name="selfManaged")
|
5769
|
+
def self_managed(self) -> Optional[bool]:
|
5770
|
+
"""
|
5771
|
+
If set, allows onboarding static roles with a rootless connection configuration.
|
5772
|
+
"""
|
5773
|
+
return pulumi.get(self, "self_managed")
|
5774
|
+
|
5888
5775
|
@property
|
5889
5776
|
@pulumi.getter(name="serviceAccountJson")
|
5890
5777
|
def service_account_json(self) -> Optional[str]:
|
@@ -5893,11 +5780,27 @@ class SecretsMountPostgresql(dict):
|
|
5893
5780
|
"""
|
5894
5781
|
return pulumi.get(self, "service_account_json")
|
5895
5782
|
|
5783
|
+
@property
|
5784
|
+
@pulumi.getter(name="tlsCa")
|
5785
|
+
def tls_ca(self) -> Optional[str]:
|
5786
|
+
"""
|
5787
|
+
The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
5788
|
+
"""
|
5789
|
+
return pulumi.get(self, "tls_ca")
|
5790
|
+
|
5791
|
+
@property
|
5792
|
+
@pulumi.getter(name="tlsCertificate")
|
5793
|
+
def tls_certificate(self) -> Optional[str]:
|
5794
|
+
"""
|
5795
|
+
The x509 client certificate for connecting to the database. Must be PEM encoded.
|
5796
|
+
"""
|
5797
|
+
return pulumi.get(self, "tls_certificate")
|
5798
|
+
|
5896
5799
|
@property
|
5897
5800
|
@pulumi.getter
|
5898
5801
|
def username(self) -> Optional[str]:
|
5899
5802
|
"""
|
5900
|
-
The root credential username used in the connection URL
|
5803
|
+
The root credential username used in the connection URL
|
5901
5804
|
"""
|
5902
5805
|
return pulumi.get(self, "username")
|
5903
5806
|
|
@@ -5905,7 +5808,7 @@ class SecretsMountPostgresql(dict):
|
|
5905
5808
|
@pulumi.getter(name="usernameTemplate")
|
5906
5809
|
def username_template(self) -> Optional[str]:
|
5907
5810
|
"""
|
5908
|
-
|
5811
|
+
Username generation template.
|
5909
5812
|
"""
|
5910
5813
|
return pulumi.get(self, "username_template")
|
5911
5814
|
|
@@ -5955,7 +5858,7 @@ class SecretsMountRedi(dict):
|
|
5955
5858
|
username: str,
|
5956
5859
|
allowed_roles: Optional[Sequence[str]] = None,
|
5957
5860
|
ca_cert: Optional[str] = None,
|
5958
|
-
data: Optional[Mapping[str,
|
5861
|
+
data: Optional[Mapping[str, str]] = None,
|
5959
5862
|
insecure_tls: Optional[bool] = None,
|
5960
5863
|
plugin_name: Optional[str] = None,
|
5961
5864
|
port: Optional[int] = None,
|
@@ -5963,23 +5866,21 @@ class SecretsMountRedi(dict):
|
|
5963
5866
|
tls: Optional[bool] = None,
|
5964
5867
|
verify_connection: Optional[bool] = None):
|
5965
5868
|
"""
|
5966
|
-
:param str host:
|
5869
|
+
:param str host: Specifies the host to connect to
|
5967
5870
|
:param str name: Name of the database connection.
|
5968
|
-
:param str password:
|
5969
|
-
:param str username:
|
5871
|
+
:param str password: Specifies the password corresponding to the given username.
|
5872
|
+
:param str username: Specifies the username for Vault to use.
|
5970
5873
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
5971
5874
|
connection.
|
5972
|
-
:param str ca_cert: The
|
5973
|
-
:param Mapping[str,
|
5875
|
+
:param str ca_cert: The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
|
5876
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5974
5877
|
|
5975
5878
|
Supported list of database secrets engines that can be configured:
|
5976
|
-
:param bool insecure_tls:
|
5977
|
-
certificate when using TLS.
|
5879
|
+
:param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
|
5978
5880
|
:param str plugin_name: Specifies the name of the plugin to use.
|
5979
|
-
:param int port: The
|
5980
|
-
part of the host.
|
5881
|
+
:param int port: The transport port to use to connect to Redis.
|
5981
5882
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5982
|
-
:param bool tls:
|
5883
|
+
:param bool tls: Specifies whether to use TLS when connecting to Redis.
|
5983
5884
|
:param bool verify_connection: Whether the connection should be verified on
|
5984
5885
|
initial configuration or not.
|
5985
5886
|
"""
|
@@ -6010,7 +5911,7 @@ class SecretsMountRedi(dict):
|
|
6010
5911
|
@pulumi.getter
|
6011
5912
|
def host(self) -> str:
|
6012
5913
|
"""
|
6013
|
-
|
5914
|
+
Specifies the host to connect to
|
6014
5915
|
"""
|
6015
5916
|
return pulumi.get(self, "host")
|
6016
5917
|
|
@@ -6026,7 +5927,7 @@ class SecretsMountRedi(dict):
|
|
6026
5927
|
@pulumi.getter
|
6027
5928
|
def password(self) -> str:
|
6028
5929
|
"""
|
6029
|
-
|
5930
|
+
Specifies the password corresponding to the given username.
|
6030
5931
|
"""
|
6031
5932
|
return pulumi.get(self, "password")
|
6032
5933
|
|
@@ -6034,7 +5935,7 @@ class SecretsMountRedi(dict):
|
|
6034
5935
|
@pulumi.getter
|
6035
5936
|
def username(self) -> str:
|
6036
5937
|
"""
|
6037
|
-
|
5938
|
+
Specifies the username for Vault to use.
|
6038
5939
|
"""
|
6039
5940
|
return pulumi.get(self, "username")
|
6040
5941
|
|
@@ -6051,13 +5952,13 @@ class SecretsMountRedi(dict):
|
|
6051
5952
|
@pulumi.getter(name="caCert")
|
6052
5953
|
def ca_cert(self) -> Optional[str]:
|
6053
5954
|
"""
|
6054
|
-
The
|
5955
|
+
The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
|
6055
5956
|
"""
|
6056
5957
|
return pulumi.get(self, "ca_cert")
|
6057
5958
|
|
6058
5959
|
@property
|
6059
5960
|
@pulumi.getter
|
6060
|
-
def data(self) -> Optional[Mapping[str,
|
5961
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
6061
5962
|
"""
|
6062
5963
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6063
5964
|
|
@@ -6069,8 +5970,7 @@ class SecretsMountRedi(dict):
|
|
6069
5970
|
@pulumi.getter(name="insecureTls")
|
6070
5971
|
def insecure_tls(self) -> Optional[bool]:
|
6071
5972
|
"""
|
6072
|
-
|
6073
|
-
certificate when using TLS.
|
5973
|
+
Specifies whether to skip verification of the server certificate when using TLS.
|
6074
5974
|
"""
|
6075
5975
|
return pulumi.get(self, "insecure_tls")
|
6076
5976
|
|
@@ -6086,8 +5986,7 @@ class SecretsMountRedi(dict):
|
|
6086
5986
|
@pulumi.getter
|
6087
5987
|
def port(self) -> Optional[int]:
|
6088
5988
|
"""
|
6089
|
-
The
|
6090
|
-
part of the host.
|
5989
|
+
The transport port to use to connect to Redis.
|
6091
5990
|
"""
|
6092
5991
|
return pulumi.get(self, "port")
|
6093
5992
|
|
@@ -6103,7 +6002,7 @@ class SecretsMountRedi(dict):
|
|
6103
6002
|
@pulumi.getter
|
6104
6003
|
def tls(self) -> Optional[bool]:
|
6105
6004
|
"""
|
6106
|
-
|
6005
|
+
Specifies whether to use TLS when connecting to Redis.
|
6107
6006
|
"""
|
6108
6007
|
return pulumi.get(self, "tls")
|
6109
6008
|
|
@@ -6146,7 +6045,7 @@ class SecretsMountRedisElasticach(dict):
|
|
6146
6045
|
name: str,
|
6147
6046
|
url: str,
|
6148
6047
|
allowed_roles: Optional[Sequence[str]] = None,
|
6149
|
-
data: Optional[Mapping[str,
|
6048
|
+
data: Optional[Mapping[str, str]] = None,
|
6150
6049
|
password: Optional[str] = None,
|
6151
6050
|
plugin_name: Optional[str] = None,
|
6152
6051
|
region: Optional[str] = None,
|
@@ -6155,19 +6054,17 @@ class SecretsMountRedisElasticach(dict):
|
|
6155
6054
|
verify_connection: Optional[bool] = None):
|
6156
6055
|
"""
|
6157
6056
|
:param str name: Name of the database connection.
|
6158
|
-
:param str url: The
|
6159
|
-
by trusted CA if used.
|
6057
|
+
:param str url: The configuration endpoint for the ElastiCache cluster to connect to.
|
6160
6058
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
6161
6059
|
connection.
|
6162
|
-
:param Mapping[str,
|
6060
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6163
6061
|
|
6164
6062
|
Supported list of database secrets engines that can be configured:
|
6165
|
-
:param str password: The
|
6063
|
+
:param str password: The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
6166
6064
|
:param str plugin_name: Specifies the name of the plugin to use.
|
6167
|
-
:param str region: The AWS region where the ElastiCache cluster is hosted.
|
6168
|
-
If omitted the plugin tries to infer the region from the environment.
|
6065
|
+
:param str region: The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
|
6169
6066
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
6170
|
-
:param str username: The
|
6067
|
+
:param str username: The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
6171
6068
|
:param bool verify_connection: Whether the connection should be verified on
|
6172
6069
|
initial configuration or not.
|
6173
6070
|
"""
|
@@ -6202,8 +6099,7 @@ class SecretsMountRedisElasticach(dict):
|
|
6202
6099
|
@pulumi.getter
|
6203
6100
|
def url(self) -> str:
|
6204
6101
|
"""
|
6205
|
-
The
|
6206
|
-
by trusted CA if used.
|
6102
|
+
The configuration endpoint for the ElastiCache cluster to connect to.
|
6207
6103
|
"""
|
6208
6104
|
return pulumi.get(self, "url")
|
6209
6105
|
|
@@ -6218,7 +6114,7 @@ class SecretsMountRedisElasticach(dict):
|
|
6218
6114
|
|
6219
6115
|
@property
|
6220
6116
|
@pulumi.getter
|
6221
|
-
def data(self) -> Optional[Mapping[str,
|
6117
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
6222
6118
|
"""
|
6223
6119
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6224
6120
|
|
@@ -6230,7 +6126,7 @@ class SecretsMountRedisElasticach(dict):
|
|
6230
6126
|
@pulumi.getter
|
6231
6127
|
def password(self) -> Optional[str]:
|
6232
6128
|
"""
|
6233
|
-
The
|
6129
|
+
The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
6234
6130
|
"""
|
6235
6131
|
return pulumi.get(self, "password")
|
6236
6132
|
|
@@ -6246,8 +6142,7 @@ class SecretsMountRedisElasticach(dict):
|
|
6246
6142
|
@pulumi.getter
|
6247
6143
|
def region(self) -> Optional[str]:
|
6248
6144
|
"""
|
6249
|
-
The AWS region where the ElastiCache cluster is hosted.
|
6250
|
-
If omitted the plugin tries to infer the region from the environment.
|
6145
|
+
The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
|
6251
6146
|
"""
|
6252
6147
|
return pulumi.get(self, "region")
|
6253
6148
|
|
@@ -6263,7 +6158,7 @@ class SecretsMountRedisElasticach(dict):
|
|
6263
6158
|
@pulumi.getter
|
6264
6159
|
def username(self) -> Optional[str]:
|
6265
6160
|
"""
|
6266
|
-
The
|
6161
|
+
The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
6267
6162
|
"""
|
6268
6163
|
return pulumi.get(self, "username")
|
6269
6164
|
|
@@ -6318,7 +6213,7 @@ class SecretsMountRedshift(dict):
|
|
6318
6213
|
name: str,
|
6319
6214
|
allowed_roles: Optional[Sequence[str]] = None,
|
6320
6215
|
connection_url: Optional[str] = None,
|
6321
|
-
data: Optional[Mapping[str,
|
6216
|
+
data: Optional[Mapping[str, str]] = None,
|
6322
6217
|
disable_escaping: Optional[bool] = None,
|
6323
6218
|
max_connection_lifetime: Optional[int] = None,
|
6324
6219
|
max_idle_connections: Optional[int] = None,
|
@@ -6333,22 +6228,19 @@ class SecretsMountRedshift(dict):
|
|
6333
6228
|
:param str name: Name of the database connection.
|
6334
6229
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
6335
6230
|
connection.
|
6336
|
-
:param str connection_url:
|
6337
|
-
|
6338
|
-
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6231
|
+
:param str connection_url: Connection string to use to connect to the database.
|
6232
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6339
6233
|
|
6340
6234
|
Supported list of database secrets engines that can be configured:
|
6341
|
-
:param bool disable_escaping: Disable special character escaping in username and password
|
6342
|
-
:param int max_connection_lifetime:
|
6343
|
-
:param int max_idle_connections:
|
6344
|
-
|
6345
|
-
:param
|
6346
|
-
the database.
|
6347
|
-
:param str password: The root credential password used in the connection URL.
|
6235
|
+
:param bool disable_escaping: Disable special character escaping in username and password
|
6236
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
6237
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
6238
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
6239
|
+
:param str password: The root credential password used in the connection URL
|
6348
6240
|
:param str plugin_name: Specifies the name of the plugin to use.
|
6349
6241
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
6350
|
-
:param str username: The root credential username used in the connection URL
|
6351
|
-
:param str username_template:
|
6242
|
+
:param str username: The root credential username used in the connection URL
|
6243
|
+
:param str username_template: Username generation template.
|
6352
6244
|
:param bool verify_connection: Whether the connection should be verified on
|
6353
6245
|
initial configuration or not.
|
6354
6246
|
"""
|
@@ -6401,14 +6293,13 @@ class SecretsMountRedshift(dict):
|
|
6401
6293
|
@pulumi.getter(name="connectionUrl")
|
6402
6294
|
def connection_url(self) -> Optional[str]:
|
6403
6295
|
"""
|
6404
|
-
|
6405
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
6296
|
+
Connection string to use to connect to the database.
|
6406
6297
|
"""
|
6407
6298
|
return pulumi.get(self, "connection_url")
|
6408
6299
|
|
6409
6300
|
@property
|
6410
6301
|
@pulumi.getter
|
6411
|
-
def data(self) -> Optional[Mapping[str,
|
6302
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
6412
6303
|
"""
|
6413
6304
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6414
6305
|
|
@@ -6420,7 +6311,7 @@ class SecretsMountRedshift(dict):
|
|
6420
6311
|
@pulumi.getter(name="disableEscaping")
|
6421
6312
|
def disable_escaping(self) -> Optional[bool]:
|
6422
6313
|
"""
|
6423
|
-
Disable special character escaping in username and password
|
6314
|
+
Disable special character escaping in username and password
|
6424
6315
|
"""
|
6425
6316
|
return pulumi.get(self, "disable_escaping")
|
6426
6317
|
|
@@ -6428,7 +6319,7 @@ class SecretsMountRedshift(dict):
|
|
6428
6319
|
@pulumi.getter(name="maxConnectionLifetime")
|
6429
6320
|
def max_connection_lifetime(self) -> Optional[int]:
|
6430
6321
|
"""
|
6431
|
-
|
6322
|
+
Maximum number of seconds a connection may be reused.
|
6432
6323
|
"""
|
6433
6324
|
return pulumi.get(self, "max_connection_lifetime")
|
6434
6325
|
|
@@ -6436,8 +6327,7 @@ class SecretsMountRedshift(dict):
|
|
6436
6327
|
@pulumi.getter(name="maxIdleConnections")
|
6437
6328
|
def max_idle_connections(self) -> Optional[int]:
|
6438
6329
|
"""
|
6439
|
-
|
6440
|
-
the database.
|
6330
|
+
Maximum number of idle connections to the database.
|
6441
6331
|
"""
|
6442
6332
|
return pulumi.get(self, "max_idle_connections")
|
6443
6333
|
|
@@ -6445,8 +6335,7 @@ class SecretsMountRedshift(dict):
|
|
6445
6335
|
@pulumi.getter(name="maxOpenConnections")
|
6446
6336
|
def max_open_connections(self) -> Optional[int]:
|
6447
6337
|
"""
|
6448
|
-
|
6449
|
-
the database.
|
6338
|
+
Maximum number of open connections to the database.
|
6450
6339
|
"""
|
6451
6340
|
return pulumi.get(self, "max_open_connections")
|
6452
6341
|
|
@@ -6454,7 +6343,7 @@ class SecretsMountRedshift(dict):
|
|
6454
6343
|
@pulumi.getter
|
6455
6344
|
def password(self) -> Optional[str]:
|
6456
6345
|
"""
|
6457
|
-
The root credential password used in the connection URL
|
6346
|
+
The root credential password used in the connection URL
|
6458
6347
|
"""
|
6459
6348
|
return pulumi.get(self, "password")
|
6460
6349
|
|
@@ -6478,7 +6367,7 @@ class SecretsMountRedshift(dict):
|
|
6478
6367
|
@pulumi.getter
|
6479
6368
|
def username(self) -> Optional[str]:
|
6480
6369
|
"""
|
6481
|
-
The root credential username used in the connection URL
|
6370
|
+
The root credential username used in the connection URL
|
6482
6371
|
"""
|
6483
6372
|
return pulumi.get(self, "username")
|
6484
6373
|
|
@@ -6486,7 +6375,7 @@ class SecretsMountRedshift(dict):
|
|
6486
6375
|
@pulumi.getter(name="usernameTemplate")
|
6487
6376
|
def username_template(self) -> Optional[str]:
|
6488
6377
|
"""
|
6489
|
-
|
6378
|
+
Username generation template.
|
6490
6379
|
"""
|
6491
6380
|
return pulumi.get(self, "username_template")
|
6492
6381
|
|
@@ -6539,7 +6428,7 @@ class SecretsMountSnowflake(dict):
|
|
6539
6428
|
name: str,
|
6540
6429
|
allowed_roles: Optional[Sequence[str]] = None,
|
6541
6430
|
connection_url: Optional[str] = None,
|
6542
|
-
data: Optional[Mapping[str,
|
6431
|
+
data: Optional[Mapping[str, str]] = None,
|
6543
6432
|
max_connection_lifetime: Optional[int] = None,
|
6544
6433
|
max_idle_connections: Optional[int] = None,
|
6545
6434
|
max_open_connections: Optional[int] = None,
|
@@ -6553,21 +6442,18 @@ class SecretsMountSnowflake(dict):
|
|
6553
6442
|
:param str name: Name of the database connection.
|
6554
6443
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
6555
6444
|
connection.
|
6556
|
-
:param str connection_url:
|
6557
|
-
|
6558
|
-
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6445
|
+
:param str connection_url: Connection string to use to connect to the database.
|
6446
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6559
6447
|
|
6560
6448
|
Supported list of database secrets engines that can be configured:
|
6561
|
-
:param int max_connection_lifetime:
|
6562
|
-
:param int max_idle_connections:
|
6563
|
-
|
6564
|
-
:param
|
6565
|
-
the database.
|
6566
|
-
:param str password: The root credential password used in the connection URL.
|
6449
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
6450
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
6451
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
6452
|
+
:param str password: The root credential password used in the connection URL
|
6567
6453
|
:param str plugin_name: Specifies the name of the plugin to use.
|
6568
6454
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
6569
|
-
:param str username: The root credential username used in the connection URL
|
6570
|
-
:param str username_template:
|
6455
|
+
:param str username: The root credential username used in the connection URL
|
6456
|
+
:param str username_template: Username generation template.
|
6571
6457
|
:param bool verify_connection: Whether the connection should be verified on
|
6572
6458
|
initial configuration or not.
|
6573
6459
|
"""
|
@@ -6618,14 +6504,13 @@ class SecretsMountSnowflake(dict):
|
|
6618
6504
|
@pulumi.getter(name="connectionUrl")
|
6619
6505
|
def connection_url(self) -> Optional[str]:
|
6620
6506
|
"""
|
6621
|
-
|
6622
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
6507
|
+
Connection string to use to connect to the database.
|
6623
6508
|
"""
|
6624
6509
|
return pulumi.get(self, "connection_url")
|
6625
6510
|
|
6626
6511
|
@property
|
6627
6512
|
@pulumi.getter
|
6628
|
-
def data(self) -> Optional[Mapping[str,
|
6513
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
6629
6514
|
"""
|
6630
6515
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6631
6516
|
|
@@ -6637,7 +6522,7 @@ class SecretsMountSnowflake(dict):
|
|
6637
6522
|
@pulumi.getter(name="maxConnectionLifetime")
|
6638
6523
|
def max_connection_lifetime(self) -> Optional[int]:
|
6639
6524
|
"""
|
6640
|
-
|
6525
|
+
Maximum number of seconds a connection may be reused.
|
6641
6526
|
"""
|
6642
6527
|
return pulumi.get(self, "max_connection_lifetime")
|
6643
6528
|
|
@@ -6645,8 +6530,7 @@ class SecretsMountSnowflake(dict):
|
|
6645
6530
|
@pulumi.getter(name="maxIdleConnections")
|
6646
6531
|
def max_idle_connections(self) -> Optional[int]:
|
6647
6532
|
"""
|
6648
|
-
|
6649
|
-
the database.
|
6533
|
+
Maximum number of idle connections to the database.
|
6650
6534
|
"""
|
6651
6535
|
return pulumi.get(self, "max_idle_connections")
|
6652
6536
|
|
@@ -6654,8 +6538,7 @@ class SecretsMountSnowflake(dict):
|
|
6654
6538
|
@pulumi.getter(name="maxOpenConnections")
|
6655
6539
|
def max_open_connections(self) -> Optional[int]:
|
6656
6540
|
"""
|
6657
|
-
|
6658
|
-
the database.
|
6541
|
+
Maximum number of open connections to the database.
|
6659
6542
|
"""
|
6660
6543
|
return pulumi.get(self, "max_open_connections")
|
6661
6544
|
|
@@ -6663,7 +6546,7 @@ class SecretsMountSnowflake(dict):
|
|
6663
6546
|
@pulumi.getter
|
6664
6547
|
def password(self) -> Optional[str]:
|
6665
6548
|
"""
|
6666
|
-
The root credential password used in the connection URL
|
6549
|
+
The root credential password used in the connection URL
|
6667
6550
|
"""
|
6668
6551
|
return pulumi.get(self, "password")
|
6669
6552
|
|
@@ -6687,7 +6570,7 @@ class SecretsMountSnowflake(dict):
|
|
6687
6570
|
@pulumi.getter
|
6688
6571
|
def username(self) -> Optional[str]:
|
6689
6572
|
"""
|
6690
|
-
The root credential username used in the connection URL
|
6573
|
+
The root credential username used in the connection URL
|
6691
6574
|
"""
|
6692
6575
|
return pulumi.get(self, "username")
|
6693
6576
|
|
@@ -6695,7 +6578,7 @@ class SecretsMountSnowflake(dict):
|
|
6695
6578
|
@pulumi.getter(name="usernameTemplate")
|
6696
6579
|
def username_template(self) -> Optional[str]:
|
6697
6580
|
"""
|
6698
|
-
|
6581
|
+
Username generation template.
|
6699
6582
|
"""
|
6700
6583
|
return pulumi.get(self, "username_template")
|
6701
6584
|
|