pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +12 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +75 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +19 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +83 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -20,7 +25,7 @@ class SecretBackendConnectionArgs:
|
|
20
25
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
21
26
|
cassandra: Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']] = None,
|
22
27
|
couchbase: Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']] = None,
|
23
|
-
data: Optional[pulumi.Input[Mapping[str,
|
28
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
24
29
|
elasticsearch: Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']] = None,
|
25
30
|
hana: Optional[pulumi.Input['SecretBackendConnectionHanaArgs']] = None,
|
26
31
|
influxdb: Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']] = None,
|
@@ -49,7 +54,7 @@ class SecretBackendConnectionArgs:
|
|
49
54
|
connection.
|
50
55
|
:param pulumi.Input['SecretBackendConnectionCassandraArgs'] cassandra: A nested block containing configuration options for Cassandra connections.
|
51
56
|
:param pulumi.Input['SecretBackendConnectionCouchbaseArgs'] couchbase: A nested block containing configuration options for Couchbase connections.
|
52
|
-
:param pulumi.Input[Mapping[str,
|
57
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
53
58
|
:param pulumi.Input['SecretBackendConnectionElasticsearchArgs'] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
|
54
59
|
:param pulumi.Input['SecretBackendConnectionHanaArgs'] hana: A nested block containing configuration options for SAP HanaDB connections.
|
55
60
|
:param pulumi.Input['SecretBackendConnectionInfluxdbArgs'] influxdb: A nested block containing configuration options for InfluxDB connections.
|
@@ -181,14 +186,14 @@ class SecretBackendConnectionArgs:
|
|
181
186
|
|
182
187
|
@property
|
183
188
|
@pulumi.getter
|
184
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
189
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
185
190
|
"""
|
186
191
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
187
192
|
"""
|
188
193
|
return pulumi.get(self, "data")
|
189
194
|
|
190
195
|
@data.setter
|
191
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
196
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
192
197
|
pulumi.set(self, "data", value)
|
193
198
|
|
194
199
|
@property
|
@@ -457,7 +462,7 @@ class _SecretBackendConnectionState:
|
|
457
462
|
backend: Optional[pulumi.Input[str]] = None,
|
458
463
|
cassandra: Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']] = None,
|
459
464
|
couchbase: Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']] = None,
|
460
|
-
data: Optional[pulumi.Input[Mapping[str,
|
465
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
461
466
|
elasticsearch: Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']] = None,
|
462
467
|
hana: Optional[pulumi.Input['SecretBackendConnectionHanaArgs']] = None,
|
463
468
|
influxdb: Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']] = None,
|
@@ -486,7 +491,7 @@ class _SecretBackendConnectionState:
|
|
486
491
|
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
487
492
|
:param pulumi.Input['SecretBackendConnectionCassandraArgs'] cassandra: A nested block containing configuration options for Cassandra connections.
|
488
493
|
:param pulumi.Input['SecretBackendConnectionCouchbaseArgs'] couchbase: A nested block containing configuration options for Couchbase connections.
|
489
|
-
:param pulumi.Input[Mapping[str,
|
494
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
490
495
|
:param pulumi.Input['SecretBackendConnectionElasticsearchArgs'] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
|
491
496
|
:param pulumi.Input['SecretBackendConnectionHanaArgs'] hana: A nested block containing configuration options for SAP HanaDB connections.
|
492
497
|
:param pulumi.Input['SecretBackendConnectionInfluxdbArgs'] influxdb: A nested block containing configuration options for InfluxDB connections.
|
@@ -619,14 +624,14 @@ class _SecretBackendConnectionState:
|
|
619
624
|
|
620
625
|
@property
|
621
626
|
@pulumi.getter
|
622
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
627
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
623
628
|
"""
|
624
629
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
625
630
|
"""
|
626
631
|
return pulumi.get(self, "data")
|
627
632
|
|
628
633
|
@data.setter
|
629
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
634
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
630
635
|
pulumi.set(self, "data", value)
|
631
636
|
|
632
637
|
@property
|
@@ -895,35 +900,34 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
895
900
|
opts: Optional[pulumi.ResourceOptions] = None,
|
896
901
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
897
902
|
backend: Optional[pulumi.Input[str]] = None,
|
898
|
-
cassandra: Optional[pulumi.Input[
|
899
|
-
couchbase: Optional[pulumi.Input[
|
900
|
-
data: Optional[pulumi.Input[Mapping[str,
|
901
|
-
elasticsearch: Optional[pulumi.Input[
|
902
|
-
hana: Optional[pulumi.Input[
|
903
|
-
influxdb: Optional[pulumi.Input[
|
904
|
-
mongodb: Optional[pulumi.Input[
|
905
|
-
mongodbatlas: Optional[pulumi.Input[
|
906
|
-
mssql: Optional[pulumi.Input[
|
907
|
-
mysql: Optional[pulumi.Input[
|
908
|
-
mysql_aurora: Optional[pulumi.Input[
|
909
|
-
mysql_legacy: Optional[pulumi.Input[
|
910
|
-
mysql_rds: Optional[pulumi.Input[
|
903
|
+
cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
|
904
|
+
couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
|
905
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
906
|
+
elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
|
907
|
+
hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
|
908
|
+
influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
|
909
|
+
mongodb: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbArgs', 'SecretBackendConnectionMongodbArgsDict']]] = None,
|
910
|
+
mongodbatlas: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbatlasArgs', 'SecretBackendConnectionMongodbatlasArgsDict']]] = None,
|
911
|
+
mssql: Optional[pulumi.Input[Union['SecretBackendConnectionMssqlArgs', 'SecretBackendConnectionMssqlArgsDict']]] = None,
|
912
|
+
mysql: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlArgs', 'SecretBackendConnectionMysqlArgsDict']]] = None,
|
913
|
+
mysql_aurora: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']]] = None,
|
914
|
+
mysql_legacy: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']]] = None,
|
915
|
+
mysql_rds: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']]] = None,
|
911
916
|
name: Optional[pulumi.Input[str]] = None,
|
912
917
|
namespace: Optional[pulumi.Input[str]] = None,
|
913
|
-
oracle: Optional[pulumi.Input[
|
918
|
+
oracle: Optional[pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']]] = None,
|
914
919
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
915
|
-
postgresql: Optional[pulumi.Input[
|
916
|
-
redis: Optional[pulumi.Input[
|
917
|
-
redis_elasticache: Optional[pulumi.Input[
|
918
|
-
redshift: Optional[pulumi.Input[
|
920
|
+
postgresql: Optional[pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']]] = None,
|
921
|
+
redis: Optional[pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']]] = None,
|
922
|
+
redis_elasticache: Optional[pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']]] = None,
|
923
|
+
redshift: Optional[pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']]] = None,
|
919
924
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
920
|
-
snowflake: Optional[pulumi.Input[
|
925
|
+
snowflake: Optional[pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']]] = None,
|
921
926
|
verify_connection: Optional[pulumi.Input[bool]] = None,
|
922
927
|
__props__=None):
|
923
928
|
"""
|
924
929
|
## Example Usage
|
925
930
|
|
926
|
-
<!--Start PulumiCodeChooser -->
|
927
931
|
```python
|
928
932
|
import pulumi
|
929
933
|
import pulumi_vault as vault
|
@@ -933,15 +937,15 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
933
937
|
type="database")
|
934
938
|
postgres = vault.database.SecretBackendConnection("postgres",
|
935
939
|
backend=db.path,
|
940
|
+
name="postgres",
|
936
941
|
allowed_roles=[
|
937
942
|
"dev",
|
938
943
|
"prod",
|
939
944
|
],
|
940
|
-
postgresql=
|
941
|
-
connection_url
|
942
|
-
)
|
945
|
+
postgresql={
|
946
|
+
"connection_url": "postgres://username:password@host:port/database",
|
947
|
+
})
|
943
948
|
```
|
944
|
-
<!--End PulumiCodeChooser -->
|
945
949
|
|
946
950
|
## Import
|
947
951
|
|
@@ -956,34 +960,34 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
956
960
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
957
961
|
connection.
|
958
962
|
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
959
|
-
:param pulumi.Input[
|
960
|
-
:param pulumi.Input[
|
961
|
-
:param pulumi.Input[Mapping[str,
|
962
|
-
:param pulumi.Input[
|
963
|
-
:param pulumi.Input[
|
964
|
-
:param pulumi.Input[
|
965
|
-
:param pulumi.Input[
|
966
|
-
:param pulumi.Input[
|
967
|
-
:param pulumi.Input[
|
968
|
-
:param pulumi.Input[
|
969
|
-
:param pulumi.Input[
|
970
|
-
:param pulumi.Input[
|
971
|
-
:param pulumi.Input[
|
963
|
+
:param pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']] cassandra: A nested block containing configuration options for Cassandra connections.
|
964
|
+
:param pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']] couchbase: A nested block containing configuration options for Couchbase connections.
|
965
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
966
|
+
:param pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
|
967
|
+
:param pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']] hana: A nested block containing configuration options for SAP HanaDB connections.
|
968
|
+
:param pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']] influxdb: A nested block containing configuration options for InfluxDB connections.
|
969
|
+
:param pulumi.Input[Union['SecretBackendConnectionMongodbArgs', 'SecretBackendConnectionMongodbArgsDict']] mongodb: A nested block containing configuration options for MongoDB connections.
|
970
|
+
:param pulumi.Input[Union['SecretBackendConnectionMongodbatlasArgs', 'SecretBackendConnectionMongodbatlasArgsDict']] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
|
971
|
+
:param pulumi.Input[Union['SecretBackendConnectionMssqlArgs', 'SecretBackendConnectionMssqlArgsDict']] mssql: A nested block containing configuration options for MSSQL connections.
|
972
|
+
:param pulumi.Input[Union['SecretBackendConnectionMysqlArgs', 'SecretBackendConnectionMysqlArgsDict']] mysql: A nested block containing configuration options for MySQL connections.
|
973
|
+
:param pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']] mysql_aurora: A nested block containing configuration options for Aurora MySQL connections.
|
974
|
+
:param pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']] mysql_legacy: A nested block containing configuration options for legacy MySQL connections.
|
975
|
+
:param pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
|
972
976
|
:param pulumi.Input[str] name: A unique name to give the database connection.
|
973
977
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
974
978
|
The value should not contain leading or trailing forward slashes.
|
975
979
|
The `namespace` is always relative to the provider's configured namespace.
|
976
980
|
*Available only for Vault Enterprise*.
|
977
|
-
:param pulumi.Input[
|
981
|
+
:param pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']] oracle: A nested block containing configuration options for Oracle connections.
|
978
982
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
979
|
-
:param pulumi.Input[
|
980
|
-
:param pulumi.Input[
|
981
|
-
:param pulumi.Input[
|
983
|
+
:param pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']] postgresql: A nested block containing configuration options for PostgreSQL connections.
|
984
|
+
:param pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']] redis: A nested block containing configuration options for Redis connections.
|
985
|
+
:param pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']] redis_elasticache: A nested block containing configuration options for Redis ElastiCache connections.
|
982
986
|
|
983
987
|
Exactly one of the nested blocks of configuration options must be supplied.
|
984
|
-
:param pulumi.Input[
|
988
|
+
:param pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']] redshift: Connection parameters for the redshift-database-plugin plugin.
|
985
989
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
986
|
-
:param pulumi.Input[
|
990
|
+
:param pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']] snowflake: A nested block containing configuration options for Snowflake connections.
|
987
991
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
988
992
|
initial configuration or not.
|
989
993
|
"""
|
@@ -996,7 +1000,6 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
996
1000
|
"""
|
997
1001
|
## Example Usage
|
998
1002
|
|
999
|
-
<!--Start PulumiCodeChooser -->
|
1000
1003
|
```python
|
1001
1004
|
import pulumi
|
1002
1005
|
import pulumi_vault as vault
|
@@ -1006,15 +1009,15 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1006
1009
|
type="database")
|
1007
1010
|
postgres = vault.database.SecretBackendConnection("postgres",
|
1008
1011
|
backend=db.path,
|
1012
|
+
name="postgres",
|
1009
1013
|
allowed_roles=[
|
1010
1014
|
"dev",
|
1011
1015
|
"prod",
|
1012
1016
|
],
|
1013
|
-
postgresql=
|
1014
|
-
connection_url
|
1015
|
-
)
|
1017
|
+
postgresql={
|
1018
|
+
"connection_url": "postgres://username:password@host:port/database",
|
1019
|
+
})
|
1016
1020
|
```
|
1017
|
-
<!--End PulumiCodeChooser -->
|
1018
1021
|
|
1019
1022
|
## Import
|
1020
1023
|
|
@@ -1041,29 +1044,29 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1041
1044
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1042
1045
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1043
1046
|
backend: Optional[pulumi.Input[str]] = None,
|
1044
|
-
cassandra: Optional[pulumi.Input[
|
1045
|
-
couchbase: Optional[pulumi.Input[
|
1046
|
-
data: Optional[pulumi.Input[Mapping[str,
|
1047
|
-
elasticsearch: Optional[pulumi.Input[
|
1048
|
-
hana: Optional[pulumi.Input[
|
1049
|
-
influxdb: Optional[pulumi.Input[
|
1050
|
-
mongodb: Optional[pulumi.Input[
|
1051
|
-
mongodbatlas: Optional[pulumi.Input[
|
1052
|
-
mssql: Optional[pulumi.Input[
|
1053
|
-
mysql: Optional[pulumi.Input[
|
1054
|
-
mysql_aurora: Optional[pulumi.Input[
|
1055
|
-
mysql_legacy: Optional[pulumi.Input[
|
1056
|
-
mysql_rds: Optional[pulumi.Input[
|
1047
|
+
cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
|
1048
|
+
couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
|
1049
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
1050
|
+
elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
|
1051
|
+
hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
|
1052
|
+
influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
|
1053
|
+
mongodb: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbArgs', 'SecretBackendConnectionMongodbArgsDict']]] = None,
|
1054
|
+
mongodbatlas: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbatlasArgs', 'SecretBackendConnectionMongodbatlasArgsDict']]] = None,
|
1055
|
+
mssql: Optional[pulumi.Input[Union['SecretBackendConnectionMssqlArgs', 'SecretBackendConnectionMssqlArgsDict']]] = None,
|
1056
|
+
mysql: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlArgs', 'SecretBackendConnectionMysqlArgsDict']]] = None,
|
1057
|
+
mysql_aurora: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']]] = None,
|
1058
|
+
mysql_legacy: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']]] = None,
|
1059
|
+
mysql_rds: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']]] = None,
|
1057
1060
|
name: Optional[pulumi.Input[str]] = None,
|
1058
1061
|
namespace: Optional[pulumi.Input[str]] = None,
|
1059
|
-
oracle: Optional[pulumi.Input[
|
1062
|
+
oracle: Optional[pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']]] = None,
|
1060
1063
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
1061
|
-
postgresql: Optional[pulumi.Input[
|
1062
|
-
redis: Optional[pulumi.Input[
|
1063
|
-
redis_elasticache: Optional[pulumi.Input[
|
1064
|
-
redshift: Optional[pulumi.Input[
|
1064
|
+
postgresql: Optional[pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']]] = None,
|
1065
|
+
redis: Optional[pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']]] = None,
|
1066
|
+
redis_elasticache: Optional[pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']]] = None,
|
1067
|
+
redshift: Optional[pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']]] = None,
|
1065
1068
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1066
|
-
snowflake: Optional[pulumi.Input[
|
1069
|
+
snowflake: Optional[pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']]] = None,
|
1067
1070
|
verify_connection: Optional[pulumi.Input[bool]] = None,
|
1068
1071
|
__props__=None):
|
1069
1072
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -1114,29 +1117,29 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1114
1117
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1115
1118
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1116
1119
|
backend: Optional[pulumi.Input[str]] = None,
|
1117
|
-
cassandra: Optional[pulumi.Input[
|
1118
|
-
couchbase: Optional[pulumi.Input[
|
1119
|
-
data: Optional[pulumi.Input[Mapping[str,
|
1120
|
-
elasticsearch: Optional[pulumi.Input[
|
1121
|
-
hana: Optional[pulumi.Input[
|
1122
|
-
influxdb: Optional[pulumi.Input[
|
1123
|
-
mongodb: Optional[pulumi.Input[
|
1124
|
-
mongodbatlas: Optional[pulumi.Input[
|
1125
|
-
mssql: Optional[pulumi.Input[
|
1126
|
-
mysql: Optional[pulumi.Input[
|
1127
|
-
mysql_aurora: Optional[pulumi.Input[
|
1128
|
-
mysql_legacy: Optional[pulumi.Input[
|
1129
|
-
mysql_rds: Optional[pulumi.Input[
|
1120
|
+
cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
|
1121
|
+
couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
|
1122
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
1123
|
+
elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
|
1124
|
+
hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
|
1125
|
+
influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
|
1126
|
+
mongodb: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbArgs', 'SecretBackendConnectionMongodbArgsDict']]] = None,
|
1127
|
+
mongodbatlas: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbatlasArgs', 'SecretBackendConnectionMongodbatlasArgsDict']]] = None,
|
1128
|
+
mssql: Optional[pulumi.Input[Union['SecretBackendConnectionMssqlArgs', 'SecretBackendConnectionMssqlArgsDict']]] = None,
|
1129
|
+
mysql: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlArgs', 'SecretBackendConnectionMysqlArgsDict']]] = None,
|
1130
|
+
mysql_aurora: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']]] = None,
|
1131
|
+
mysql_legacy: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']]] = None,
|
1132
|
+
mysql_rds: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']]] = None,
|
1130
1133
|
name: Optional[pulumi.Input[str]] = None,
|
1131
1134
|
namespace: Optional[pulumi.Input[str]] = None,
|
1132
|
-
oracle: Optional[pulumi.Input[
|
1135
|
+
oracle: Optional[pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']]] = None,
|
1133
1136
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
1134
|
-
postgresql: Optional[pulumi.Input[
|
1135
|
-
redis: Optional[pulumi.Input[
|
1136
|
-
redis_elasticache: Optional[pulumi.Input[
|
1137
|
-
redshift: Optional[pulumi.Input[
|
1137
|
+
postgresql: Optional[pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']]] = None,
|
1138
|
+
redis: Optional[pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']]] = None,
|
1139
|
+
redis_elasticache: Optional[pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']]] = None,
|
1140
|
+
redshift: Optional[pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']]] = None,
|
1138
1141
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1139
|
-
snowflake: Optional[pulumi.Input[
|
1142
|
+
snowflake: Optional[pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']]] = None,
|
1140
1143
|
verify_connection: Optional[pulumi.Input[bool]] = None) -> 'SecretBackendConnection':
|
1141
1144
|
"""
|
1142
1145
|
Get an existing SecretBackendConnection resource's state with the given name, id, and optional extra
|
@@ -1148,34 +1151,34 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1148
1151
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
1149
1152
|
connection.
|
1150
1153
|
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
1151
|
-
:param pulumi.Input[
|
1152
|
-
:param pulumi.Input[
|
1153
|
-
:param pulumi.Input[Mapping[str,
|
1154
|
-
:param pulumi.Input[
|
1155
|
-
:param pulumi.Input[
|
1156
|
-
:param pulumi.Input[
|
1157
|
-
:param pulumi.Input[
|
1158
|
-
:param pulumi.Input[
|
1159
|
-
:param pulumi.Input[
|
1160
|
-
:param pulumi.Input[
|
1161
|
-
:param pulumi.Input[
|
1162
|
-
:param pulumi.Input[
|
1163
|
-
:param pulumi.Input[
|
1154
|
+
:param pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']] cassandra: A nested block containing configuration options for Cassandra connections.
|
1155
|
+
:param pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']] couchbase: A nested block containing configuration options for Couchbase connections.
|
1156
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
1157
|
+
:param pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
|
1158
|
+
:param pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']] hana: A nested block containing configuration options for SAP HanaDB connections.
|
1159
|
+
:param pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']] influxdb: A nested block containing configuration options for InfluxDB connections.
|
1160
|
+
:param pulumi.Input[Union['SecretBackendConnectionMongodbArgs', 'SecretBackendConnectionMongodbArgsDict']] mongodb: A nested block containing configuration options for MongoDB connections.
|
1161
|
+
:param pulumi.Input[Union['SecretBackendConnectionMongodbatlasArgs', 'SecretBackendConnectionMongodbatlasArgsDict']] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
|
1162
|
+
:param pulumi.Input[Union['SecretBackendConnectionMssqlArgs', 'SecretBackendConnectionMssqlArgsDict']] mssql: A nested block containing configuration options for MSSQL connections.
|
1163
|
+
:param pulumi.Input[Union['SecretBackendConnectionMysqlArgs', 'SecretBackendConnectionMysqlArgsDict']] mysql: A nested block containing configuration options for MySQL connections.
|
1164
|
+
:param pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']] mysql_aurora: A nested block containing configuration options for Aurora MySQL connections.
|
1165
|
+
:param pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']] mysql_legacy: A nested block containing configuration options for legacy MySQL connections.
|
1166
|
+
:param pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
|
1164
1167
|
:param pulumi.Input[str] name: A unique name to give the database connection.
|
1165
1168
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1166
1169
|
The value should not contain leading or trailing forward slashes.
|
1167
1170
|
The `namespace` is always relative to the provider's configured namespace.
|
1168
1171
|
*Available only for Vault Enterprise*.
|
1169
|
-
:param pulumi.Input[
|
1172
|
+
:param pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']] oracle: A nested block containing configuration options for Oracle connections.
|
1170
1173
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
1171
|
-
:param pulumi.Input[
|
1172
|
-
:param pulumi.Input[
|
1173
|
-
:param pulumi.Input[
|
1174
|
+
:param pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']] postgresql: A nested block containing configuration options for PostgreSQL connections.
|
1175
|
+
:param pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']] redis: A nested block containing configuration options for Redis connections.
|
1176
|
+
:param pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']] redis_elasticache: A nested block containing configuration options for Redis ElastiCache connections.
|
1174
1177
|
|
1175
1178
|
Exactly one of the nested blocks of configuration options must be supplied.
|
1176
|
-
:param pulumi.Input[
|
1179
|
+
:param pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']] redshift: Connection parameters for the redshift-database-plugin plugin.
|
1177
1180
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
1178
|
-
:param pulumi.Input[
|
1181
|
+
:param pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']] snowflake: A nested block containing configuration options for Snowflake connections.
|
1179
1182
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
1180
1183
|
initial configuration or not.
|
1181
1184
|
"""
|
@@ -1246,7 +1249,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1246
1249
|
|
1247
1250
|
@property
|
1248
1251
|
@pulumi.getter
|
1249
|
-
def data(self) -> pulumi.Output[Optional[Mapping[str,
|
1252
|
+
def data(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
1250
1253
|
"""
|
1251
1254
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
1252
1255
|
"""
|