pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -26
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/auth_backend.py +0 -47
- pulumi_vault/aws/auth_backend_client.py +17 -253
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -56
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -139
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +22 -217
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -286
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +18 -226
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +9 -275
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +225 -91
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -288
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -286
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -350
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -459
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/__init__.py +0 -2
- pulumi_vault/pkisecret/_inputs.py +0 -30
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/outputs.py +0 -54
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -53
- pulumi_vault/quota_rate_limit.py +4 -49
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -94
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_config_est.py +0 -614
- pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
- pulumi_vault/plugin.py +0 -590
- pulumi_vault/plugin_pinned_version.py +0 -293
- pulumi_vault-6.2.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
pulumi_vault/database/_inputs.py
CHANGED
@@ -62,16 +62,20 @@ class SecretBackendConnectionCassandraArgs:
|
|
62
62
|
tls: Optional[pulumi.Input[bool]] = None,
|
63
63
|
username: Optional[pulumi.Input[str]] = None):
|
64
64
|
"""
|
65
|
-
:param pulumi.Input[int] connect_timeout: The number of seconds to use as a connection
|
66
|
-
|
67
|
-
:param pulumi.Input[
|
68
|
-
:param pulumi.Input[
|
69
|
-
|
70
|
-
:param pulumi.Input[str]
|
71
|
-
:param pulumi.Input[
|
65
|
+
:param pulumi.Input[int] connect_timeout: The number of seconds to use as a connection
|
66
|
+
timeout.
|
67
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] hosts: The hosts to connect to.
|
68
|
+
:param pulumi.Input[bool] insecure_tls: Whether to skip verification of the server
|
69
|
+
certificate when using TLS.
|
70
|
+
:param pulumi.Input[str] password: The password to authenticate with.
|
71
|
+
:param pulumi.Input[str] pem_bundle: Concatenated PEM blocks configuring the certificate
|
72
|
+
chain.
|
73
|
+
:param pulumi.Input[str] pem_json: A JSON structure configuring the certificate chain.
|
74
|
+
:param pulumi.Input[int] port: The default port to connect to if no port is specified as
|
75
|
+
part of the host.
|
72
76
|
:param pulumi.Input[int] protocol_version: The CQL protocol version to use.
|
73
77
|
:param pulumi.Input[bool] tls: Whether to use TLS when connecting to Cassandra.
|
74
|
-
:param pulumi.Input[str] username: The username to
|
78
|
+
:param pulumi.Input[str] username: The username to authenticate with.
|
75
79
|
"""
|
76
80
|
if connect_timeout is not None:
|
77
81
|
pulumi.set(__self__, "connect_timeout", connect_timeout)
|
@@ -98,7 +102,8 @@ class SecretBackendConnectionCassandraArgs:
|
|
98
102
|
@pulumi.getter(name="connectTimeout")
|
99
103
|
def connect_timeout(self) -> Optional[pulumi.Input[int]]:
|
100
104
|
"""
|
101
|
-
The number of seconds to use as a connection
|
105
|
+
The number of seconds to use as a connection
|
106
|
+
timeout.
|
102
107
|
"""
|
103
108
|
return pulumi.get(self, "connect_timeout")
|
104
109
|
|
@@ -110,7 +115,7 @@ class SecretBackendConnectionCassandraArgs:
|
|
110
115
|
@pulumi.getter
|
111
116
|
def hosts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
112
117
|
"""
|
113
|
-
|
118
|
+
The hosts to connect to.
|
114
119
|
"""
|
115
120
|
return pulumi.get(self, "hosts")
|
116
121
|
|
@@ -122,7 +127,8 @@ class SecretBackendConnectionCassandraArgs:
|
|
122
127
|
@pulumi.getter(name="insecureTls")
|
123
128
|
def insecure_tls(self) -> Optional[pulumi.Input[bool]]:
|
124
129
|
"""
|
125
|
-
Whether to skip verification of the server
|
130
|
+
Whether to skip verification of the server
|
131
|
+
certificate when using TLS.
|
126
132
|
"""
|
127
133
|
return pulumi.get(self, "insecure_tls")
|
128
134
|
|
@@ -134,7 +140,7 @@ class SecretBackendConnectionCassandraArgs:
|
|
134
140
|
@pulumi.getter
|
135
141
|
def password(self) -> Optional[pulumi.Input[str]]:
|
136
142
|
"""
|
137
|
-
The password to
|
143
|
+
The password to authenticate with.
|
138
144
|
"""
|
139
145
|
return pulumi.get(self, "password")
|
140
146
|
|
@@ -146,7 +152,8 @@ class SecretBackendConnectionCassandraArgs:
|
|
146
152
|
@pulumi.getter(name="pemBundle")
|
147
153
|
def pem_bundle(self) -> Optional[pulumi.Input[str]]:
|
148
154
|
"""
|
149
|
-
Concatenated PEM blocks
|
155
|
+
Concatenated PEM blocks configuring the certificate
|
156
|
+
chain.
|
150
157
|
"""
|
151
158
|
return pulumi.get(self, "pem_bundle")
|
152
159
|
|
@@ -158,7 +165,7 @@ class SecretBackendConnectionCassandraArgs:
|
|
158
165
|
@pulumi.getter(name="pemJson")
|
159
166
|
def pem_json(self) -> Optional[pulumi.Input[str]]:
|
160
167
|
"""
|
161
|
-
|
168
|
+
A JSON structure configuring the certificate chain.
|
162
169
|
"""
|
163
170
|
return pulumi.get(self, "pem_json")
|
164
171
|
|
@@ -170,7 +177,8 @@ class SecretBackendConnectionCassandraArgs:
|
|
170
177
|
@pulumi.getter
|
171
178
|
def port(self) -> Optional[pulumi.Input[int]]:
|
172
179
|
"""
|
173
|
-
The
|
180
|
+
The default port to connect to if no port is specified as
|
181
|
+
part of the host.
|
174
182
|
"""
|
175
183
|
return pulumi.get(self, "port")
|
176
184
|
|
@@ -206,7 +214,7 @@ class SecretBackendConnectionCassandraArgs:
|
|
206
214
|
@pulumi.getter
|
207
215
|
def username(self) -> Optional[pulumi.Input[str]]:
|
208
216
|
"""
|
209
|
-
The username to
|
217
|
+
The username to authenticate with.
|
210
218
|
"""
|
211
219
|
return pulumi.get(self, "username")
|
212
220
|
|
@@ -227,13 +235,14 @@ class SecretBackendConnectionCouchbaseArgs:
|
|
227
235
|
tls: Optional[pulumi.Input[bool]] = None,
|
228
236
|
username_template: Optional[pulumi.Input[str]] = None):
|
229
237
|
"""
|
230
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] hosts:
|
231
|
-
:param pulumi.Input[str] password:
|
232
|
-
:param pulumi.Input[str] username:
|
238
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] hosts: The hosts to connect to.
|
239
|
+
:param pulumi.Input[str] password: The password to authenticate with.
|
240
|
+
:param pulumi.Input[str] username: The username to authenticate with.
|
233
241
|
:param pulumi.Input[str] base64_pem: Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
|
234
242
|
:param pulumi.Input[str] bucket_name: Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
|
235
|
-
:param pulumi.Input[bool] insecure_tls:
|
236
|
-
|
243
|
+
:param pulumi.Input[bool] insecure_tls: Whether to skip verification of the server
|
244
|
+
certificate when using TLS.
|
245
|
+
:param pulumi.Input[bool] tls: Whether to use TLS when connecting to Cassandra.
|
237
246
|
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated.
|
238
247
|
"""
|
239
248
|
pulumi.set(__self__, "hosts", hosts)
|
@@ -254,7 +263,7 @@ class SecretBackendConnectionCouchbaseArgs:
|
|
254
263
|
@pulumi.getter
|
255
264
|
def hosts(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
|
256
265
|
"""
|
257
|
-
|
266
|
+
The hosts to connect to.
|
258
267
|
"""
|
259
268
|
return pulumi.get(self, "hosts")
|
260
269
|
|
@@ -266,7 +275,7 @@ class SecretBackendConnectionCouchbaseArgs:
|
|
266
275
|
@pulumi.getter
|
267
276
|
def password(self) -> pulumi.Input[str]:
|
268
277
|
"""
|
269
|
-
|
278
|
+
The password to authenticate with.
|
270
279
|
"""
|
271
280
|
return pulumi.get(self, "password")
|
272
281
|
|
@@ -278,7 +287,7 @@ class SecretBackendConnectionCouchbaseArgs:
|
|
278
287
|
@pulumi.getter
|
279
288
|
def username(self) -> pulumi.Input[str]:
|
280
289
|
"""
|
281
|
-
|
290
|
+
The username to authenticate with.
|
282
291
|
"""
|
283
292
|
return pulumi.get(self, "username")
|
284
293
|
|
@@ -314,7 +323,8 @@ class SecretBackendConnectionCouchbaseArgs:
|
|
314
323
|
@pulumi.getter(name="insecureTls")
|
315
324
|
def insecure_tls(self) -> Optional[pulumi.Input[bool]]:
|
316
325
|
"""
|
317
|
-
|
326
|
+
Whether to skip verification of the server
|
327
|
+
certificate when using TLS.
|
318
328
|
"""
|
319
329
|
return pulumi.get(self, "insecure_tls")
|
320
330
|
|
@@ -326,7 +336,7 @@ class SecretBackendConnectionCouchbaseArgs:
|
|
326
336
|
@pulumi.getter
|
327
337
|
def tls(self) -> Optional[pulumi.Input[bool]]:
|
328
338
|
"""
|
329
|
-
|
339
|
+
Whether to use TLS when connecting to Cassandra.
|
330
340
|
"""
|
331
341
|
return pulumi.get(self, "tls")
|
332
342
|
|
@@ -361,15 +371,16 @@ class SecretBackendConnectionElasticsearchArgs:
|
|
361
371
|
tls_server_name: Optional[pulumi.Input[str]] = None,
|
362
372
|
username_template: Optional[pulumi.Input[str]] = None):
|
363
373
|
"""
|
364
|
-
:param pulumi.Input[str] password: The password to
|
365
|
-
:param pulumi.Input[str] url: The URL for Elasticsearch's API
|
366
|
-
|
367
|
-
:param pulumi.Input[str]
|
368
|
-
:param pulumi.Input[str]
|
369
|
-
:param pulumi.Input[str]
|
370
|
-
:param pulumi.Input[str]
|
371
|
-
:param pulumi.Input[
|
372
|
-
:param pulumi.Input[
|
374
|
+
:param pulumi.Input[str] password: The password to authenticate with.
|
375
|
+
:param pulumi.Input[str] url: The URL for Elasticsearch's API. https requires certificate
|
376
|
+
by trusted CA if used.
|
377
|
+
:param pulumi.Input[str] username: The username to authenticate with.
|
378
|
+
:param pulumi.Input[str] ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
|
379
|
+
:param pulumi.Input[str] ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
|
380
|
+
:param pulumi.Input[str] client_cert: The path to the certificate for the Elasticsearch client to present for communication.
|
381
|
+
:param pulumi.Input[str] client_key: The path to the key for the Elasticsearch client to use for communication.
|
382
|
+
:param pulumi.Input[bool] insecure: Whether to disable certificate verification.
|
383
|
+
:param pulumi.Input[str] tls_server_name: This, if set, is used to set the SNI host when connecting via TLS.
|
373
384
|
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated.
|
374
385
|
"""
|
375
386
|
pulumi.set(__self__, "password", password)
|
@@ -394,7 +405,7 @@ class SecretBackendConnectionElasticsearchArgs:
|
|
394
405
|
@pulumi.getter
|
395
406
|
def password(self) -> pulumi.Input[str]:
|
396
407
|
"""
|
397
|
-
The password to
|
408
|
+
The password to authenticate with.
|
398
409
|
"""
|
399
410
|
return pulumi.get(self, "password")
|
400
411
|
|
@@ -406,7 +417,8 @@ class SecretBackendConnectionElasticsearchArgs:
|
|
406
417
|
@pulumi.getter
|
407
418
|
def url(self) -> pulumi.Input[str]:
|
408
419
|
"""
|
409
|
-
The URL for Elasticsearch's API
|
420
|
+
The URL for Elasticsearch's API. https requires certificate
|
421
|
+
by trusted CA if used.
|
410
422
|
"""
|
411
423
|
return pulumi.get(self, "url")
|
412
424
|
|
@@ -418,7 +430,7 @@ class SecretBackendConnectionElasticsearchArgs:
|
|
418
430
|
@pulumi.getter
|
419
431
|
def username(self) -> pulumi.Input[str]:
|
420
432
|
"""
|
421
|
-
The username to
|
433
|
+
The username to authenticate with.
|
422
434
|
"""
|
423
435
|
return pulumi.get(self, "username")
|
424
436
|
|
@@ -430,7 +442,7 @@ class SecretBackendConnectionElasticsearchArgs:
|
|
430
442
|
@pulumi.getter(name="caCert")
|
431
443
|
def ca_cert(self) -> Optional[pulumi.Input[str]]:
|
432
444
|
"""
|
433
|
-
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
445
|
+
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
|
434
446
|
"""
|
435
447
|
return pulumi.get(self, "ca_cert")
|
436
448
|
|
@@ -442,7 +454,7 @@ class SecretBackendConnectionElasticsearchArgs:
|
|
442
454
|
@pulumi.getter(name="caPath")
|
443
455
|
def ca_path(self) -> Optional[pulumi.Input[str]]:
|
444
456
|
"""
|
445
|
-
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
457
|
+
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
|
446
458
|
"""
|
447
459
|
return pulumi.get(self, "ca_path")
|
448
460
|
|
@@ -454,7 +466,7 @@ class SecretBackendConnectionElasticsearchArgs:
|
|
454
466
|
@pulumi.getter(name="clientCert")
|
455
467
|
def client_cert(self) -> Optional[pulumi.Input[str]]:
|
456
468
|
"""
|
457
|
-
The path to the certificate for the Elasticsearch client to present for communication
|
469
|
+
The path to the certificate for the Elasticsearch client to present for communication.
|
458
470
|
"""
|
459
471
|
return pulumi.get(self, "client_cert")
|
460
472
|
|
@@ -466,7 +478,7 @@ class SecretBackendConnectionElasticsearchArgs:
|
|
466
478
|
@pulumi.getter(name="clientKey")
|
467
479
|
def client_key(self) -> Optional[pulumi.Input[str]]:
|
468
480
|
"""
|
469
|
-
The path to the key for the Elasticsearch client to use for communication
|
481
|
+
The path to the key for the Elasticsearch client to use for communication.
|
470
482
|
"""
|
471
483
|
return pulumi.get(self, "client_key")
|
472
484
|
|
@@ -478,7 +490,7 @@ class SecretBackendConnectionElasticsearchArgs:
|
|
478
490
|
@pulumi.getter
|
479
491
|
def insecure(self) -> Optional[pulumi.Input[bool]]:
|
480
492
|
"""
|
481
|
-
Whether to disable certificate verification
|
493
|
+
Whether to disable certificate verification.
|
482
494
|
"""
|
483
495
|
return pulumi.get(self, "insecure")
|
484
496
|
|
@@ -490,7 +502,7 @@ class SecretBackendConnectionElasticsearchArgs:
|
|
490
502
|
@pulumi.getter(name="tlsServerName")
|
491
503
|
def tls_server_name(self) -> Optional[pulumi.Input[str]]:
|
492
504
|
"""
|
493
|
-
This, if set, is used to set the SNI host when connecting via TLS
|
505
|
+
This, if set, is used to set the SNI host when connecting via TLS.
|
494
506
|
"""
|
495
507
|
return pulumi.get(self, "tls_server_name")
|
496
508
|
|
@@ -522,13 +534,19 @@ class SecretBackendConnectionHanaArgs:
|
|
522
534
|
password: Optional[pulumi.Input[str]] = None,
|
523
535
|
username: Optional[pulumi.Input[str]] = None):
|
524
536
|
"""
|
525
|
-
:param pulumi.Input[str] connection_url:
|
526
|
-
|
527
|
-
|
528
|
-
|
529
|
-
:param pulumi.Input[
|
530
|
-
:param pulumi.Input[
|
531
|
-
|
537
|
+
:param pulumi.Input[str] connection_url: A URL containing connection information. See
|
538
|
+
the [Vault
|
539
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
540
|
+
for an example.
|
541
|
+
:param pulumi.Input[bool] disable_escaping: Disable special character escaping in username and password.
|
542
|
+
:param pulumi.Input[int] max_connection_lifetime: The maximum number of seconds to keep
|
543
|
+
a connection alive for.
|
544
|
+
:param pulumi.Input[int] max_idle_connections: The maximum number of idle connections to
|
545
|
+
maintain.
|
546
|
+
:param pulumi.Input[int] max_open_connections: The maximum number of open connections to
|
547
|
+
use.
|
548
|
+
:param pulumi.Input[str] password: The password to authenticate with.
|
549
|
+
:param pulumi.Input[str] username: The username to authenticate with.
|
532
550
|
"""
|
533
551
|
if connection_url is not None:
|
534
552
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -549,7 +567,10 @@ class SecretBackendConnectionHanaArgs:
|
|
549
567
|
@pulumi.getter(name="connectionUrl")
|
550
568
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
551
569
|
"""
|
552
|
-
|
570
|
+
A URL containing connection information. See
|
571
|
+
the [Vault
|
572
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
573
|
+
for an example.
|
553
574
|
"""
|
554
575
|
return pulumi.get(self, "connection_url")
|
555
576
|
|
@@ -561,7 +582,7 @@ class SecretBackendConnectionHanaArgs:
|
|
561
582
|
@pulumi.getter(name="disableEscaping")
|
562
583
|
def disable_escaping(self) -> Optional[pulumi.Input[bool]]:
|
563
584
|
"""
|
564
|
-
Disable special character escaping in username and password
|
585
|
+
Disable special character escaping in username and password.
|
565
586
|
"""
|
566
587
|
return pulumi.get(self, "disable_escaping")
|
567
588
|
|
@@ -573,7 +594,8 @@ class SecretBackendConnectionHanaArgs:
|
|
573
594
|
@pulumi.getter(name="maxConnectionLifetime")
|
574
595
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
575
596
|
"""
|
576
|
-
|
597
|
+
The maximum number of seconds to keep
|
598
|
+
a connection alive for.
|
577
599
|
"""
|
578
600
|
return pulumi.get(self, "max_connection_lifetime")
|
579
601
|
|
@@ -585,7 +607,8 @@ class SecretBackendConnectionHanaArgs:
|
|
585
607
|
@pulumi.getter(name="maxIdleConnections")
|
586
608
|
def max_idle_connections(self) -> Optional[pulumi.Input[int]]:
|
587
609
|
"""
|
588
|
-
|
610
|
+
The maximum number of idle connections to
|
611
|
+
maintain.
|
589
612
|
"""
|
590
613
|
return pulumi.get(self, "max_idle_connections")
|
591
614
|
|
@@ -597,7 +620,8 @@ class SecretBackendConnectionHanaArgs:
|
|
597
620
|
@pulumi.getter(name="maxOpenConnections")
|
598
621
|
def max_open_connections(self) -> Optional[pulumi.Input[int]]:
|
599
622
|
"""
|
600
|
-
|
623
|
+
The maximum number of open connections to
|
624
|
+
use.
|
601
625
|
"""
|
602
626
|
return pulumi.get(self, "max_open_connections")
|
603
627
|
|
@@ -609,7 +633,7 @@ class SecretBackendConnectionHanaArgs:
|
|
609
633
|
@pulumi.getter
|
610
634
|
def password(self) -> Optional[pulumi.Input[str]]:
|
611
635
|
"""
|
612
|
-
The
|
636
|
+
The password to authenticate with.
|
613
637
|
"""
|
614
638
|
return pulumi.get(self, "password")
|
615
639
|
|
@@ -621,7 +645,7 @@ class SecretBackendConnectionHanaArgs:
|
|
621
645
|
@pulumi.getter
|
622
646
|
def username(self) -> Optional[pulumi.Input[str]]:
|
623
647
|
"""
|
624
|
-
The
|
648
|
+
The username to authenticate with.
|
625
649
|
"""
|
626
650
|
return pulumi.get(self, "username")
|
627
651
|
|
@@ -644,15 +668,19 @@ class SecretBackendConnectionInfluxdbArgs:
|
|
644
668
|
tls: Optional[pulumi.Input[bool]] = None,
|
645
669
|
username_template: Optional[pulumi.Input[str]] = None):
|
646
670
|
"""
|
647
|
-
:param pulumi.Input[str] host:
|
648
|
-
:param pulumi.Input[str] password:
|
649
|
-
:param pulumi.Input[str] username:
|
650
|
-
:param pulumi.Input[int] connect_timeout: The number of seconds to use as a connection
|
651
|
-
|
652
|
-
:param pulumi.Input[
|
653
|
-
|
654
|
-
:param pulumi.Input[
|
655
|
-
|
671
|
+
:param pulumi.Input[str] host: The host to connect to.
|
672
|
+
:param pulumi.Input[str] password: The password to authenticate with.
|
673
|
+
:param pulumi.Input[str] username: The username to authenticate with.
|
674
|
+
:param pulumi.Input[int] connect_timeout: The number of seconds to use as a connection
|
675
|
+
timeout.
|
676
|
+
:param pulumi.Input[bool] insecure_tls: Whether to skip verification of the server
|
677
|
+
certificate when using TLS.
|
678
|
+
:param pulumi.Input[str] pem_bundle: Concatenated PEM blocks configuring the certificate
|
679
|
+
chain.
|
680
|
+
:param pulumi.Input[str] pem_json: A JSON structure configuring the certificate chain.
|
681
|
+
:param pulumi.Input[int] port: The default port to connect to if no port is specified as
|
682
|
+
part of the host.
|
683
|
+
:param pulumi.Input[bool] tls: Whether to use TLS when connecting to Cassandra.
|
656
684
|
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated.
|
657
685
|
"""
|
658
686
|
pulumi.set(__self__, "host", host)
|
@@ -677,7 +705,7 @@ class SecretBackendConnectionInfluxdbArgs:
|
|
677
705
|
@pulumi.getter
|
678
706
|
def host(self) -> pulumi.Input[str]:
|
679
707
|
"""
|
680
|
-
|
708
|
+
The host to connect to.
|
681
709
|
"""
|
682
710
|
return pulumi.get(self, "host")
|
683
711
|
|
@@ -689,7 +717,7 @@ class SecretBackendConnectionInfluxdbArgs:
|
|
689
717
|
@pulumi.getter
|
690
718
|
def password(self) -> pulumi.Input[str]:
|
691
719
|
"""
|
692
|
-
|
720
|
+
The password to authenticate with.
|
693
721
|
"""
|
694
722
|
return pulumi.get(self, "password")
|
695
723
|
|
@@ -701,7 +729,7 @@ class SecretBackendConnectionInfluxdbArgs:
|
|
701
729
|
@pulumi.getter
|
702
730
|
def username(self) -> pulumi.Input[str]:
|
703
731
|
"""
|
704
|
-
|
732
|
+
The username to authenticate with.
|
705
733
|
"""
|
706
734
|
return pulumi.get(self, "username")
|
707
735
|
|
@@ -713,7 +741,8 @@ class SecretBackendConnectionInfluxdbArgs:
|
|
713
741
|
@pulumi.getter(name="connectTimeout")
|
714
742
|
def connect_timeout(self) -> Optional[pulumi.Input[int]]:
|
715
743
|
"""
|
716
|
-
The number of seconds to use as a connection
|
744
|
+
The number of seconds to use as a connection
|
745
|
+
timeout.
|
717
746
|
"""
|
718
747
|
return pulumi.get(self, "connect_timeout")
|
719
748
|
|
@@ -725,7 +754,8 @@ class SecretBackendConnectionInfluxdbArgs:
|
|
725
754
|
@pulumi.getter(name="insecureTls")
|
726
755
|
def insecure_tls(self) -> Optional[pulumi.Input[bool]]:
|
727
756
|
"""
|
728
|
-
Whether to skip verification of the server
|
757
|
+
Whether to skip verification of the server
|
758
|
+
certificate when using TLS.
|
729
759
|
"""
|
730
760
|
return pulumi.get(self, "insecure_tls")
|
731
761
|
|
@@ -737,7 +767,8 @@ class SecretBackendConnectionInfluxdbArgs:
|
|
737
767
|
@pulumi.getter(name="pemBundle")
|
738
768
|
def pem_bundle(self) -> Optional[pulumi.Input[str]]:
|
739
769
|
"""
|
740
|
-
Concatenated PEM blocks
|
770
|
+
Concatenated PEM blocks configuring the certificate
|
771
|
+
chain.
|
741
772
|
"""
|
742
773
|
return pulumi.get(self, "pem_bundle")
|
743
774
|
|
@@ -749,7 +780,7 @@ class SecretBackendConnectionInfluxdbArgs:
|
|
749
780
|
@pulumi.getter(name="pemJson")
|
750
781
|
def pem_json(self) -> Optional[pulumi.Input[str]]:
|
751
782
|
"""
|
752
|
-
|
783
|
+
A JSON structure configuring the certificate chain.
|
753
784
|
"""
|
754
785
|
return pulumi.get(self, "pem_json")
|
755
786
|
|
@@ -761,7 +792,8 @@ class SecretBackendConnectionInfluxdbArgs:
|
|
761
792
|
@pulumi.getter
|
762
793
|
def port(self) -> Optional[pulumi.Input[int]]:
|
763
794
|
"""
|
764
|
-
The
|
795
|
+
The default port to connect to if no port is specified as
|
796
|
+
part of the host.
|
765
797
|
"""
|
766
798
|
return pulumi.get(self, "port")
|
767
799
|
|
@@ -773,7 +805,7 @@ class SecretBackendConnectionInfluxdbArgs:
|
|
773
805
|
@pulumi.getter
|
774
806
|
def tls(self) -> Optional[pulumi.Input[bool]]:
|
775
807
|
"""
|
776
|
-
Whether to use TLS when connecting to
|
808
|
+
Whether to use TLS when connecting to Cassandra.
|
777
809
|
"""
|
778
810
|
return pulumi.get(self, "tls")
|
779
811
|
|
@@ -805,13 +837,19 @@ class SecretBackendConnectionMongodbArgs:
|
|
805
837
|
username: Optional[pulumi.Input[str]] = None,
|
806
838
|
username_template: Optional[pulumi.Input[str]] = None):
|
807
839
|
"""
|
808
|
-
:param pulumi.Input[str] connection_url:
|
809
|
-
|
810
|
-
|
811
|
-
|
812
|
-
:param pulumi.Input[
|
813
|
-
|
814
|
-
:param pulumi.Input[
|
840
|
+
:param pulumi.Input[str] connection_url: A URL containing connection information. See
|
841
|
+
the [Vault
|
842
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
843
|
+
for an example.
|
844
|
+
:param pulumi.Input[int] max_connection_lifetime: The maximum number of seconds to keep
|
845
|
+
a connection alive for.
|
846
|
+
:param pulumi.Input[int] max_idle_connections: The maximum number of idle connections to
|
847
|
+
maintain.
|
848
|
+
:param pulumi.Input[int] max_open_connections: The maximum number of open connections to
|
849
|
+
use.
|
850
|
+
:param pulumi.Input[str] password: The password to authenticate with.
|
851
|
+
:param pulumi.Input[str] username: The username to authenticate with.
|
852
|
+
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated.
|
815
853
|
"""
|
816
854
|
if connection_url is not None:
|
817
855
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -832,7 +870,10 @@ class SecretBackendConnectionMongodbArgs:
|
|
832
870
|
@pulumi.getter(name="connectionUrl")
|
833
871
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
834
872
|
"""
|
835
|
-
|
873
|
+
A URL containing connection information. See
|
874
|
+
the [Vault
|
875
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
876
|
+
for an example.
|
836
877
|
"""
|
837
878
|
return pulumi.get(self, "connection_url")
|
838
879
|
|
@@ -844,7 +885,8 @@ class SecretBackendConnectionMongodbArgs:
|
|
844
885
|
@pulumi.getter(name="maxConnectionLifetime")
|
845
886
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
846
887
|
"""
|
847
|
-
|
888
|
+
The maximum number of seconds to keep
|
889
|
+
a connection alive for.
|
848
890
|
"""
|
849
891
|
return pulumi.get(self, "max_connection_lifetime")
|
850
892
|
|
@@ -856,7 +898,8 @@ class SecretBackendConnectionMongodbArgs:
|
|
856
898
|
@pulumi.getter(name="maxIdleConnections")
|
857
899
|
def max_idle_connections(self) -> Optional[pulumi.Input[int]]:
|
858
900
|
"""
|
859
|
-
|
901
|
+
The maximum number of idle connections to
|
902
|
+
maintain.
|
860
903
|
"""
|
861
904
|
return pulumi.get(self, "max_idle_connections")
|
862
905
|
|
@@ -868,7 +911,8 @@ class SecretBackendConnectionMongodbArgs:
|
|
868
911
|
@pulumi.getter(name="maxOpenConnections")
|
869
912
|
def max_open_connections(self) -> Optional[pulumi.Input[int]]:
|
870
913
|
"""
|
871
|
-
|
914
|
+
The maximum number of open connections to
|
915
|
+
use.
|
872
916
|
"""
|
873
917
|
return pulumi.get(self, "max_open_connections")
|
874
918
|
|
@@ -880,7 +924,7 @@ class SecretBackendConnectionMongodbArgs:
|
|
880
924
|
@pulumi.getter
|
881
925
|
def password(self) -> Optional[pulumi.Input[str]]:
|
882
926
|
"""
|
883
|
-
The
|
927
|
+
The password to authenticate with.
|
884
928
|
"""
|
885
929
|
return pulumi.get(self, "password")
|
886
930
|
|
@@ -892,7 +936,7 @@ class SecretBackendConnectionMongodbArgs:
|
|
892
936
|
@pulumi.getter
|
893
937
|
def username(self) -> Optional[pulumi.Input[str]]:
|
894
938
|
"""
|
895
|
-
The
|
939
|
+
The username to authenticate with.
|
896
940
|
"""
|
897
941
|
return pulumi.get(self, "username")
|
898
942
|
|
@@ -904,7 +948,7 @@ class SecretBackendConnectionMongodbArgs:
|
|
904
948
|
@pulumi.getter(name="usernameTemplate")
|
905
949
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
906
950
|
"""
|
907
|
-
|
951
|
+
Template describing how dynamic usernames are generated.
|
908
952
|
"""
|
909
953
|
return pulumi.get(self, "username_template")
|
910
954
|
|
@@ -978,15 +1022,24 @@ class SecretBackendConnectionMssqlArgs:
|
|
978
1022
|
username: Optional[pulumi.Input[str]] = None,
|
979
1023
|
username_template: Optional[pulumi.Input[str]] = None):
|
980
1024
|
"""
|
981
|
-
:param pulumi.Input[str] connection_url:
|
982
|
-
|
983
|
-
|
984
|
-
|
985
|
-
:param pulumi.Input[
|
986
|
-
|
987
|
-
|
988
|
-
|
989
|
-
:param pulumi.Input[
|
1025
|
+
:param pulumi.Input[str] connection_url: A URL containing connection information. See
|
1026
|
+
the [Vault
|
1027
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1028
|
+
for an example.
|
1029
|
+
:param pulumi.Input[bool] contained_db: For Vault v1.9+. Set to true when the target is a
|
1030
|
+
Contained Database, e.g. AzureSQL.
|
1031
|
+
See the [Vault
|
1032
|
+
docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
|
1033
|
+
:param pulumi.Input[bool] disable_escaping: Disable special character escaping in username and password.
|
1034
|
+
:param pulumi.Input[int] max_connection_lifetime: The maximum number of seconds to keep
|
1035
|
+
a connection alive for.
|
1036
|
+
:param pulumi.Input[int] max_idle_connections: The maximum number of idle connections to
|
1037
|
+
maintain.
|
1038
|
+
:param pulumi.Input[int] max_open_connections: The maximum number of open connections to
|
1039
|
+
use.
|
1040
|
+
:param pulumi.Input[str] password: The password to authenticate with.
|
1041
|
+
:param pulumi.Input[str] username: The username to authenticate with.
|
1042
|
+
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated.
|
990
1043
|
"""
|
991
1044
|
if connection_url is not None:
|
992
1045
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -1011,7 +1064,10 @@ class SecretBackendConnectionMssqlArgs:
|
|
1011
1064
|
@pulumi.getter(name="connectionUrl")
|
1012
1065
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
1013
1066
|
"""
|
1014
|
-
|
1067
|
+
A URL containing connection information. See
|
1068
|
+
the [Vault
|
1069
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1070
|
+
for an example.
|
1015
1071
|
"""
|
1016
1072
|
return pulumi.get(self, "connection_url")
|
1017
1073
|
|
@@ -1023,7 +1079,10 @@ class SecretBackendConnectionMssqlArgs:
|
|
1023
1079
|
@pulumi.getter(name="containedDb")
|
1024
1080
|
def contained_db(self) -> Optional[pulumi.Input[bool]]:
|
1025
1081
|
"""
|
1026
|
-
Set to true when the target is a
|
1082
|
+
For Vault v1.9+. Set to true when the target is a
|
1083
|
+
Contained Database, e.g. AzureSQL.
|
1084
|
+
See the [Vault
|
1085
|
+
docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
|
1027
1086
|
"""
|
1028
1087
|
return pulumi.get(self, "contained_db")
|
1029
1088
|
|
@@ -1035,7 +1094,7 @@ class SecretBackendConnectionMssqlArgs:
|
|
1035
1094
|
@pulumi.getter(name="disableEscaping")
|
1036
1095
|
def disable_escaping(self) -> Optional[pulumi.Input[bool]]:
|
1037
1096
|
"""
|
1038
|
-
Disable special character escaping in username and password
|
1097
|
+
Disable special character escaping in username and password.
|
1039
1098
|
"""
|
1040
1099
|
return pulumi.get(self, "disable_escaping")
|
1041
1100
|
|
@@ -1047,7 +1106,8 @@ class SecretBackendConnectionMssqlArgs:
|
|
1047
1106
|
@pulumi.getter(name="maxConnectionLifetime")
|
1048
1107
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
1049
1108
|
"""
|
1050
|
-
|
1109
|
+
The maximum number of seconds to keep
|
1110
|
+
a connection alive for.
|
1051
1111
|
"""
|
1052
1112
|
return pulumi.get(self, "max_connection_lifetime")
|
1053
1113
|
|
@@ -1059,7 +1119,8 @@ class SecretBackendConnectionMssqlArgs:
|
|
1059
1119
|
@pulumi.getter(name="maxIdleConnections")
|
1060
1120
|
def max_idle_connections(self) -> Optional[pulumi.Input[int]]:
|
1061
1121
|
"""
|
1062
|
-
|
1122
|
+
The maximum number of idle connections to
|
1123
|
+
maintain.
|
1063
1124
|
"""
|
1064
1125
|
return pulumi.get(self, "max_idle_connections")
|
1065
1126
|
|
@@ -1071,7 +1132,8 @@ class SecretBackendConnectionMssqlArgs:
|
|
1071
1132
|
@pulumi.getter(name="maxOpenConnections")
|
1072
1133
|
def max_open_connections(self) -> Optional[pulumi.Input[int]]:
|
1073
1134
|
"""
|
1074
|
-
|
1135
|
+
The maximum number of open connections to
|
1136
|
+
use.
|
1075
1137
|
"""
|
1076
1138
|
return pulumi.get(self, "max_open_connections")
|
1077
1139
|
|
@@ -1083,7 +1145,7 @@ class SecretBackendConnectionMssqlArgs:
|
|
1083
1145
|
@pulumi.getter
|
1084
1146
|
def password(self) -> Optional[pulumi.Input[str]]:
|
1085
1147
|
"""
|
1086
|
-
The
|
1148
|
+
The password to authenticate with.
|
1087
1149
|
"""
|
1088
1150
|
return pulumi.get(self, "password")
|
1089
1151
|
|
@@ -1095,7 +1157,7 @@ class SecretBackendConnectionMssqlArgs:
|
|
1095
1157
|
@pulumi.getter
|
1096
1158
|
def username(self) -> Optional[pulumi.Input[str]]:
|
1097
1159
|
"""
|
1098
|
-
The
|
1160
|
+
The username to authenticate with.
|
1099
1161
|
"""
|
1100
1162
|
return pulumi.get(self, "username")
|
1101
1163
|
|
@@ -1107,7 +1169,7 @@ class SecretBackendConnectionMssqlArgs:
|
|
1107
1169
|
@pulumi.getter(name="usernameTemplate")
|
1108
1170
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
1109
1171
|
"""
|
1110
|
-
|
1172
|
+
Template describing how dynamic usernames are generated.
|
1111
1173
|
"""
|
1112
1174
|
return pulumi.get(self, "username_template")
|
1113
1175
|
|
@@ -1131,17 +1193,23 @@ class SecretBackendConnectionMysqlArgs:
|
|
1131
1193
|
username: Optional[pulumi.Input[str]] = None,
|
1132
1194
|
username_template: Optional[pulumi.Input[str]] = None):
|
1133
1195
|
"""
|
1134
|
-
:param pulumi.Input[str] auth_type:
|
1135
|
-
:param pulumi.Input[str] connection_url:
|
1136
|
-
|
1137
|
-
|
1138
|
-
|
1139
|
-
:param pulumi.Input[
|
1140
|
-
|
1196
|
+
:param pulumi.Input[str] auth_type: Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
1197
|
+
:param pulumi.Input[str] connection_url: A URL containing connection information. See
|
1198
|
+
the [Vault
|
1199
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1200
|
+
for an example.
|
1201
|
+
:param pulumi.Input[int] max_connection_lifetime: The maximum number of seconds to keep
|
1202
|
+
a connection alive for.
|
1203
|
+
:param pulumi.Input[int] max_idle_connections: The maximum number of idle connections to
|
1204
|
+
maintain.
|
1205
|
+
:param pulumi.Input[int] max_open_connections: The maximum number of open connections to
|
1206
|
+
use.
|
1207
|
+
:param pulumi.Input[str] password: The password to authenticate with.
|
1208
|
+
:param pulumi.Input[str] service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1141
1209
|
:param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1142
1210
|
:param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1143
|
-
:param pulumi.Input[str] username: The
|
1144
|
-
:param pulumi.Input[str] username_template:
|
1211
|
+
:param pulumi.Input[str] username: The username to authenticate with.
|
1212
|
+
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated.
|
1145
1213
|
"""
|
1146
1214
|
if auth_type is not None:
|
1147
1215
|
pulumi.set(__self__, "auth_type", auth_type)
|
@@ -1170,7 +1238,7 @@ class SecretBackendConnectionMysqlArgs:
|
|
1170
1238
|
@pulumi.getter(name="authType")
|
1171
1239
|
def auth_type(self) -> Optional[pulumi.Input[str]]:
|
1172
1240
|
"""
|
1173
|
-
|
1241
|
+
Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
1174
1242
|
"""
|
1175
1243
|
return pulumi.get(self, "auth_type")
|
1176
1244
|
|
@@ -1182,7 +1250,10 @@ class SecretBackendConnectionMysqlArgs:
|
|
1182
1250
|
@pulumi.getter(name="connectionUrl")
|
1183
1251
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
1184
1252
|
"""
|
1185
|
-
|
1253
|
+
A URL containing connection information. See
|
1254
|
+
the [Vault
|
1255
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1256
|
+
for an example.
|
1186
1257
|
"""
|
1187
1258
|
return pulumi.get(self, "connection_url")
|
1188
1259
|
|
@@ -1194,7 +1265,8 @@ class SecretBackendConnectionMysqlArgs:
|
|
1194
1265
|
@pulumi.getter(name="maxConnectionLifetime")
|
1195
1266
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
1196
1267
|
"""
|
1197
|
-
|
1268
|
+
The maximum number of seconds to keep
|
1269
|
+
a connection alive for.
|
1198
1270
|
"""
|
1199
1271
|
return pulumi.get(self, "max_connection_lifetime")
|
1200
1272
|
|
@@ -1206,7 +1278,8 @@ class SecretBackendConnectionMysqlArgs:
|
|
1206
1278
|
@pulumi.getter(name="maxIdleConnections")
|
1207
1279
|
def max_idle_connections(self) -> Optional[pulumi.Input[int]]:
|
1208
1280
|
"""
|
1209
|
-
|
1281
|
+
The maximum number of idle connections to
|
1282
|
+
maintain.
|
1210
1283
|
"""
|
1211
1284
|
return pulumi.get(self, "max_idle_connections")
|
1212
1285
|
|
@@ -1218,7 +1291,8 @@ class SecretBackendConnectionMysqlArgs:
|
|
1218
1291
|
@pulumi.getter(name="maxOpenConnections")
|
1219
1292
|
def max_open_connections(self) -> Optional[pulumi.Input[int]]:
|
1220
1293
|
"""
|
1221
|
-
|
1294
|
+
The maximum number of open connections to
|
1295
|
+
use.
|
1222
1296
|
"""
|
1223
1297
|
return pulumi.get(self, "max_open_connections")
|
1224
1298
|
|
@@ -1230,7 +1304,7 @@ class SecretBackendConnectionMysqlArgs:
|
|
1230
1304
|
@pulumi.getter
|
1231
1305
|
def password(self) -> Optional[pulumi.Input[str]]:
|
1232
1306
|
"""
|
1233
|
-
The
|
1307
|
+
The password to authenticate with.
|
1234
1308
|
"""
|
1235
1309
|
return pulumi.get(self, "password")
|
1236
1310
|
|
@@ -1242,7 +1316,7 @@ class SecretBackendConnectionMysqlArgs:
|
|
1242
1316
|
@pulumi.getter(name="serviceAccountJson")
|
1243
1317
|
def service_account_json(self) -> Optional[pulumi.Input[str]]:
|
1244
1318
|
"""
|
1245
|
-
|
1319
|
+
JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1246
1320
|
"""
|
1247
1321
|
return pulumi.get(self, "service_account_json")
|
1248
1322
|
|
@@ -1278,7 +1352,7 @@ class SecretBackendConnectionMysqlArgs:
|
|
1278
1352
|
@pulumi.getter
|
1279
1353
|
def username(self) -> Optional[pulumi.Input[str]]:
|
1280
1354
|
"""
|
1281
|
-
The
|
1355
|
+
The username to authenticate with.
|
1282
1356
|
"""
|
1283
1357
|
return pulumi.get(self, "username")
|
1284
1358
|
|
@@ -1290,7 +1364,7 @@ class SecretBackendConnectionMysqlArgs:
|
|
1290
1364
|
@pulumi.getter(name="usernameTemplate")
|
1291
1365
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
1292
1366
|
"""
|
1293
|
-
|
1367
|
+
Template describing how dynamic usernames are generated.
|
1294
1368
|
"""
|
1295
1369
|
return pulumi.get(self, "username_template")
|
1296
1370
|
|
@@ -1314,17 +1388,23 @@ class SecretBackendConnectionMysqlAuroraArgs:
|
|
1314
1388
|
username: Optional[pulumi.Input[str]] = None,
|
1315
1389
|
username_template: Optional[pulumi.Input[str]] = None):
|
1316
1390
|
"""
|
1317
|
-
:param pulumi.Input[str] auth_type:
|
1318
|
-
:param pulumi.Input[str] connection_url:
|
1319
|
-
|
1320
|
-
|
1321
|
-
|
1322
|
-
:param pulumi.Input[
|
1323
|
-
|
1391
|
+
:param pulumi.Input[str] auth_type: Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
1392
|
+
:param pulumi.Input[str] connection_url: A URL containing connection information. See
|
1393
|
+
the [Vault
|
1394
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1395
|
+
for an example.
|
1396
|
+
:param pulumi.Input[int] max_connection_lifetime: The maximum number of seconds to keep
|
1397
|
+
a connection alive for.
|
1398
|
+
:param pulumi.Input[int] max_idle_connections: The maximum number of idle connections to
|
1399
|
+
maintain.
|
1400
|
+
:param pulumi.Input[int] max_open_connections: The maximum number of open connections to
|
1401
|
+
use.
|
1402
|
+
:param pulumi.Input[str] password: The password to authenticate with.
|
1403
|
+
:param pulumi.Input[str] service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1324
1404
|
:param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1325
1405
|
:param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1326
|
-
:param pulumi.Input[str] username: The
|
1327
|
-
:param pulumi.Input[str] username_template:
|
1406
|
+
:param pulumi.Input[str] username: The username to authenticate with.
|
1407
|
+
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated.
|
1328
1408
|
"""
|
1329
1409
|
if auth_type is not None:
|
1330
1410
|
pulumi.set(__self__, "auth_type", auth_type)
|
@@ -1353,7 +1433,7 @@ class SecretBackendConnectionMysqlAuroraArgs:
|
|
1353
1433
|
@pulumi.getter(name="authType")
|
1354
1434
|
def auth_type(self) -> Optional[pulumi.Input[str]]:
|
1355
1435
|
"""
|
1356
|
-
|
1436
|
+
Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
1357
1437
|
"""
|
1358
1438
|
return pulumi.get(self, "auth_type")
|
1359
1439
|
|
@@ -1365,7 +1445,10 @@ class SecretBackendConnectionMysqlAuroraArgs:
|
|
1365
1445
|
@pulumi.getter(name="connectionUrl")
|
1366
1446
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
1367
1447
|
"""
|
1368
|
-
|
1448
|
+
A URL containing connection information. See
|
1449
|
+
the [Vault
|
1450
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1451
|
+
for an example.
|
1369
1452
|
"""
|
1370
1453
|
return pulumi.get(self, "connection_url")
|
1371
1454
|
|
@@ -1377,7 +1460,8 @@ class SecretBackendConnectionMysqlAuroraArgs:
|
|
1377
1460
|
@pulumi.getter(name="maxConnectionLifetime")
|
1378
1461
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
1379
1462
|
"""
|
1380
|
-
|
1463
|
+
The maximum number of seconds to keep
|
1464
|
+
a connection alive for.
|
1381
1465
|
"""
|
1382
1466
|
return pulumi.get(self, "max_connection_lifetime")
|
1383
1467
|
|
@@ -1389,7 +1473,8 @@ class SecretBackendConnectionMysqlAuroraArgs:
|
|
1389
1473
|
@pulumi.getter(name="maxIdleConnections")
|
1390
1474
|
def max_idle_connections(self) -> Optional[pulumi.Input[int]]:
|
1391
1475
|
"""
|
1392
|
-
|
1476
|
+
The maximum number of idle connections to
|
1477
|
+
maintain.
|
1393
1478
|
"""
|
1394
1479
|
return pulumi.get(self, "max_idle_connections")
|
1395
1480
|
|
@@ -1401,7 +1486,8 @@ class SecretBackendConnectionMysqlAuroraArgs:
|
|
1401
1486
|
@pulumi.getter(name="maxOpenConnections")
|
1402
1487
|
def max_open_connections(self) -> Optional[pulumi.Input[int]]:
|
1403
1488
|
"""
|
1404
|
-
|
1489
|
+
The maximum number of open connections to
|
1490
|
+
use.
|
1405
1491
|
"""
|
1406
1492
|
return pulumi.get(self, "max_open_connections")
|
1407
1493
|
|
@@ -1413,7 +1499,7 @@ class SecretBackendConnectionMysqlAuroraArgs:
|
|
1413
1499
|
@pulumi.getter
|
1414
1500
|
def password(self) -> Optional[pulumi.Input[str]]:
|
1415
1501
|
"""
|
1416
|
-
The
|
1502
|
+
The password to authenticate with.
|
1417
1503
|
"""
|
1418
1504
|
return pulumi.get(self, "password")
|
1419
1505
|
|
@@ -1425,7 +1511,7 @@ class SecretBackendConnectionMysqlAuroraArgs:
|
|
1425
1511
|
@pulumi.getter(name="serviceAccountJson")
|
1426
1512
|
def service_account_json(self) -> Optional[pulumi.Input[str]]:
|
1427
1513
|
"""
|
1428
|
-
|
1514
|
+
JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1429
1515
|
"""
|
1430
1516
|
return pulumi.get(self, "service_account_json")
|
1431
1517
|
|
@@ -1461,7 +1547,7 @@ class SecretBackendConnectionMysqlAuroraArgs:
|
|
1461
1547
|
@pulumi.getter
|
1462
1548
|
def username(self) -> Optional[pulumi.Input[str]]:
|
1463
1549
|
"""
|
1464
|
-
The
|
1550
|
+
The username to authenticate with.
|
1465
1551
|
"""
|
1466
1552
|
return pulumi.get(self, "username")
|
1467
1553
|
|
@@ -1473,7 +1559,7 @@ class SecretBackendConnectionMysqlAuroraArgs:
|
|
1473
1559
|
@pulumi.getter(name="usernameTemplate")
|
1474
1560
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
1475
1561
|
"""
|
1476
|
-
|
1562
|
+
Template describing how dynamic usernames are generated.
|
1477
1563
|
"""
|
1478
1564
|
return pulumi.get(self, "username_template")
|
1479
1565
|
|
@@ -1497,17 +1583,23 @@ class SecretBackendConnectionMysqlLegacyArgs:
|
|
1497
1583
|
username: Optional[pulumi.Input[str]] = None,
|
1498
1584
|
username_template: Optional[pulumi.Input[str]] = None):
|
1499
1585
|
"""
|
1500
|
-
:param pulumi.Input[str] auth_type:
|
1501
|
-
:param pulumi.Input[str] connection_url:
|
1502
|
-
|
1503
|
-
|
1504
|
-
|
1505
|
-
:param pulumi.Input[
|
1506
|
-
|
1586
|
+
:param pulumi.Input[str] auth_type: Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
1587
|
+
:param pulumi.Input[str] connection_url: A URL containing connection information. See
|
1588
|
+
the [Vault
|
1589
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1590
|
+
for an example.
|
1591
|
+
:param pulumi.Input[int] max_connection_lifetime: The maximum number of seconds to keep
|
1592
|
+
a connection alive for.
|
1593
|
+
:param pulumi.Input[int] max_idle_connections: The maximum number of idle connections to
|
1594
|
+
maintain.
|
1595
|
+
:param pulumi.Input[int] max_open_connections: The maximum number of open connections to
|
1596
|
+
use.
|
1597
|
+
:param pulumi.Input[str] password: The password to authenticate with.
|
1598
|
+
:param pulumi.Input[str] service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1507
1599
|
:param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1508
1600
|
:param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1509
|
-
:param pulumi.Input[str] username: The
|
1510
|
-
:param pulumi.Input[str] username_template:
|
1601
|
+
:param pulumi.Input[str] username: The username to authenticate with.
|
1602
|
+
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated.
|
1511
1603
|
"""
|
1512
1604
|
if auth_type is not None:
|
1513
1605
|
pulumi.set(__self__, "auth_type", auth_type)
|
@@ -1536,7 +1628,7 @@ class SecretBackendConnectionMysqlLegacyArgs:
|
|
1536
1628
|
@pulumi.getter(name="authType")
|
1537
1629
|
def auth_type(self) -> Optional[pulumi.Input[str]]:
|
1538
1630
|
"""
|
1539
|
-
|
1631
|
+
Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
1540
1632
|
"""
|
1541
1633
|
return pulumi.get(self, "auth_type")
|
1542
1634
|
|
@@ -1548,7 +1640,10 @@ class SecretBackendConnectionMysqlLegacyArgs:
|
|
1548
1640
|
@pulumi.getter(name="connectionUrl")
|
1549
1641
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
1550
1642
|
"""
|
1551
|
-
|
1643
|
+
A URL containing connection information. See
|
1644
|
+
the [Vault
|
1645
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1646
|
+
for an example.
|
1552
1647
|
"""
|
1553
1648
|
return pulumi.get(self, "connection_url")
|
1554
1649
|
|
@@ -1560,7 +1655,8 @@ class SecretBackendConnectionMysqlLegacyArgs:
|
|
1560
1655
|
@pulumi.getter(name="maxConnectionLifetime")
|
1561
1656
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
1562
1657
|
"""
|
1563
|
-
|
1658
|
+
The maximum number of seconds to keep
|
1659
|
+
a connection alive for.
|
1564
1660
|
"""
|
1565
1661
|
return pulumi.get(self, "max_connection_lifetime")
|
1566
1662
|
|
@@ -1572,7 +1668,8 @@ class SecretBackendConnectionMysqlLegacyArgs:
|
|
1572
1668
|
@pulumi.getter(name="maxIdleConnections")
|
1573
1669
|
def max_idle_connections(self) -> Optional[pulumi.Input[int]]:
|
1574
1670
|
"""
|
1575
|
-
|
1671
|
+
The maximum number of idle connections to
|
1672
|
+
maintain.
|
1576
1673
|
"""
|
1577
1674
|
return pulumi.get(self, "max_idle_connections")
|
1578
1675
|
|
@@ -1584,7 +1681,8 @@ class SecretBackendConnectionMysqlLegacyArgs:
|
|
1584
1681
|
@pulumi.getter(name="maxOpenConnections")
|
1585
1682
|
def max_open_connections(self) -> Optional[pulumi.Input[int]]:
|
1586
1683
|
"""
|
1587
|
-
|
1684
|
+
The maximum number of open connections to
|
1685
|
+
use.
|
1588
1686
|
"""
|
1589
1687
|
return pulumi.get(self, "max_open_connections")
|
1590
1688
|
|
@@ -1596,7 +1694,7 @@ class SecretBackendConnectionMysqlLegacyArgs:
|
|
1596
1694
|
@pulumi.getter
|
1597
1695
|
def password(self) -> Optional[pulumi.Input[str]]:
|
1598
1696
|
"""
|
1599
|
-
The
|
1697
|
+
The password to authenticate with.
|
1600
1698
|
"""
|
1601
1699
|
return pulumi.get(self, "password")
|
1602
1700
|
|
@@ -1608,7 +1706,7 @@ class SecretBackendConnectionMysqlLegacyArgs:
|
|
1608
1706
|
@pulumi.getter(name="serviceAccountJson")
|
1609
1707
|
def service_account_json(self) -> Optional[pulumi.Input[str]]:
|
1610
1708
|
"""
|
1611
|
-
|
1709
|
+
JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1612
1710
|
"""
|
1613
1711
|
return pulumi.get(self, "service_account_json")
|
1614
1712
|
|
@@ -1644,7 +1742,7 @@ class SecretBackendConnectionMysqlLegacyArgs:
|
|
1644
1742
|
@pulumi.getter
|
1645
1743
|
def username(self) -> Optional[pulumi.Input[str]]:
|
1646
1744
|
"""
|
1647
|
-
The
|
1745
|
+
The username to authenticate with.
|
1648
1746
|
"""
|
1649
1747
|
return pulumi.get(self, "username")
|
1650
1748
|
|
@@ -1656,7 +1754,7 @@ class SecretBackendConnectionMysqlLegacyArgs:
|
|
1656
1754
|
@pulumi.getter(name="usernameTemplate")
|
1657
1755
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
1658
1756
|
"""
|
1659
|
-
|
1757
|
+
Template describing how dynamic usernames are generated.
|
1660
1758
|
"""
|
1661
1759
|
return pulumi.get(self, "username_template")
|
1662
1760
|
|
@@ -1680,17 +1778,23 @@ class SecretBackendConnectionMysqlRdsArgs:
|
|
1680
1778
|
username: Optional[pulumi.Input[str]] = None,
|
1681
1779
|
username_template: Optional[pulumi.Input[str]] = None):
|
1682
1780
|
"""
|
1683
|
-
:param pulumi.Input[str] auth_type:
|
1684
|
-
:param pulumi.Input[str] connection_url:
|
1685
|
-
|
1686
|
-
|
1687
|
-
|
1688
|
-
:param pulumi.Input[
|
1689
|
-
|
1781
|
+
:param pulumi.Input[str] auth_type: Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
1782
|
+
:param pulumi.Input[str] connection_url: A URL containing connection information. See
|
1783
|
+
the [Vault
|
1784
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1785
|
+
for an example.
|
1786
|
+
:param pulumi.Input[int] max_connection_lifetime: The maximum number of seconds to keep
|
1787
|
+
a connection alive for.
|
1788
|
+
:param pulumi.Input[int] max_idle_connections: The maximum number of idle connections to
|
1789
|
+
maintain.
|
1790
|
+
:param pulumi.Input[int] max_open_connections: The maximum number of open connections to
|
1791
|
+
use.
|
1792
|
+
:param pulumi.Input[str] password: The password to authenticate with.
|
1793
|
+
:param pulumi.Input[str] service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1690
1794
|
:param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1691
1795
|
:param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1692
|
-
:param pulumi.Input[str] username: The
|
1693
|
-
:param pulumi.Input[str] username_template:
|
1796
|
+
:param pulumi.Input[str] username: The username to authenticate with.
|
1797
|
+
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated.
|
1694
1798
|
"""
|
1695
1799
|
if auth_type is not None:
|
1696
1800
|
pulumi.set(__self__, "auth_type", auth_type)
|
@@ -1719,7 +1823,7 @@ class SecretBackendConnectionMysqlRdsArgs:
|
|
1719
1823
|
@pulumi.getter(name="authType")
|
1720
1824
|
def auth_type(self) -> Optional[pulumi.Input[str]]:
|
1721
1825
|
"""
|
1722
|
-
|
1826
|
+
Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
1723
1827
|
"""
|
1724
1828
|
return pulumi.get(self, "auth_type")
|
1725
1829
|
|
@@ -1731,7 +1835,10 @@ class SecretBackendConnectionMysqlRdsArgs:
|
|
1731
1835
|
@pulumi.getter(name="connectionUrl")
|
1732
1836
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
1733
1837
|
"""
|
1734
|
-
|
1838
|
+
A URL containing connection information. See
|
1839
|
+
the [Vault
|
1840
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1841
|
+
for an example.
|
1735
1842
|
"""
|
1736
1843
|
return pulumi.get(self, "connection_url")
|
1737
1844
|
|
@@ -1743,7 +1850,8 @@ class SecretBackendConnectionMysqlRdsArgs:
|
|
1743
1850
|
@pulumi.getter(name="maxConnectionLifetime")
|
1744
1851
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
1745
1852
|
"""
|
1746
|
-
|
1853
|
+
The maximum number of seconds to keep
|
1854
|
+
a connection alive for.
|
1747
1855
|
"""
|
1748
1856
|
return pulumi.get(self, "max_connection_lifetime")
|
1749
1857
|
|
@@ -1755,7 +1863,8 @@ class SecretBackendConnectionMysqlRdsArgs:
|
|
1755
1863
|
@pulumi.getter(name="maxIdleConnections")
|
1756
1864
|
def max_idle_connections(self) -> Optional[pulumi.Input[int]]:
|
1757
1865
|
"""
|
1758
|
-
|
1866
|
+
The maximum number of idle connections to
|
1867
|
+
maintain.
|
1759
1868
|
"""
|
1760
1869
|
return pulumi.get(self, "max_idle_connections")
|
1761
1870
|
|
@@ -1767,7 +1876,8 @@ class SecretBackendConnectionMysqlRdsArgs:
|
|
1767
1876
|
@pulumi.getter(name="maxOpenConnections")
|
1768
1877
|
def max_open_connections(self) -> Optional[pulumi.Input[int]]:
|
1769
1878
|
"""
|
1770
|
-
|
1879
|
+
The maximum number of open connections to
|
1880
|
+
use.
|
1771
1881
|
"""
|
1772
1882
|
return pulumi.get(self, "max_open_connections")
|
1773
1883
|
|
@@ -1779,7 +1889,7 @@ class SecretBackendConnectionMysqlRdsArgs:
|
|
1779
1889
|
@pulumi.getter
|
1780
1890
|
def password(self) -> Optional[pulumi.Input[str]]:
|
1781
1891
|
"""
|
1782
|
-
The
|
1892
|
+
The password to authenticate with.
|
1783
1893
|
"""
|
1784
1894
|
return pulumi.get(self, "password")
|
1785
1895
|
|
@@ -1791,7 +1901,7 @@ class SecretBackendConnectionMysqlRdsArgs:
|
|
1791
1901
|
@pulumi.getter(name="serviceAccountJson")
|
1792
1902
|
def service_account_json(self) -> Optional[pulumi.Input[str]]:
|
1793
1903
|
"""
|
1794
|
-
|
1904
|
+
JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1795
1905
|
"""
|
1796
1906
|
return pulumi.get(self, "service_account_json")
|
1797
1907
|
|
@@ -1827,7 +1937,7 @@ class SecretBackendConnectionMysqlRdsArgs:
|
|
1827
1937
|
@pulumi.getter
|
1828
1938
|
def username(self) -> Optional[pulumi.Input[str]]:
|
1829
1939
|
"""
|
1830
|
-
The
|
1940
|
+
The username to authenticate with.
|
1831
1941
|
"""
|
1832
1942
|
return pulumi.get(self, "username")
|
1833
1943
|
|
@@ -1839,7 +1949,7 @@ class SecretBackendConnectionMysqlRdsArgs:
|
|
1839
1949
|
@pulumi.getter(name="usernameTemplate")
|
1840
1950
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
1841
1951
|
"""
|
1842
|
-
|
1952
|
+
Template describing how dynamic usernames are generated.
|
1843
1953
|
"""
|
1844
1954
|
return pulumi.get(self, "username_template")
|
1845
1955
|
|
@@ -1861,15 +1971,21 @@ class SecretBackendConnectionOracleArgs:
|
|
1861
1971
|
username: Optional[pulumi.Input[str]] = None,
|
1862
1972
|
username_template: Optional[pulumi.Input[str]] = None):
|
1863
1973
|
"""
|
1864
|
-
:param pulumi.Input[str] connection_url:
|
1865
|
-
|
1866
|
-
|
1867
|
-
|
1868
|
-
:param pulumi.Input[
|
1869
|
-
:param pulumi.Input[
|
1870
|
-
|
1871
|
-
:param pulumi.Input[
|
1872
|
-
|
1974
|
+
:param pulumi.Input[str] connection_url: A URL containing connection information. See
|
1975
|
+
the [Vault
|
1976
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1977
|
+
for an example.
|
1978
|
+
:param pulumi.Input[bool] disconnect_sessions: Enable the built-in session disconnect mechanism.
|
1979
|
+
:param pulumi.Input[int] max_connection_lifetime: The maximum number of seconds to keep
|
1980
|
+
a connection alive for.
|
1981
|
+
:param pulumi.Input[int] max_idle_connections: The maximum number of idle connections to
|
1982
|
+
maintain.
|
1983
|
+
:param pulumi.Input[int] max_open_connections: The maximum number of open connections to
|
1984
|
+
use.
|
1985
|
+
:param pulumi.Input[str] password: The password to authenticate with.
|
1986
|
+
:param pulumi.Input[bool] split_statements: Enable spliting statements after semi-colons.
|
1987
|
+
:param pulumi.Input[str] username: The username to authenticate with.
|
1988
|
+
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated.
|
1873
1989
|
"""
|
1874
1990
|
if connection_url is not None:
|
1875
1991
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -1894,7 +2010,10 @@ class SecretBackendConnectionOracleArgs:
|
|
1894
2010
|
@pulumi.getter(name="connectionUrl")
|
1895
2011
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
1896
2012
|
"""
|
1897
|
-
|
2013
|
+
A URL containing connection information. See
|
2014
|
+
the [Vault
|
2015
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
2016
|
+
for an example.
|
1898
2017
|
"""
|
1899
2018
|
return pulumi.get(self, "connection_url")
|
1900
2019
|
|
@@ -1906,7 +2025,7 @@ class SecretBackendConnectionOracleArgs:
|
|
1906
2025
|
@pulumi.getter(name="disconnectSessions")
|
1907
2026
|
def disconnect_sessions(self) -> Optional[pulumi.Input[bool]]:
|
1908
2027
|
"""
|
1909
|
-
|
2028
|
+
Enable the built-in session disconnect mechanism.
|
1910
2029
|
"""
|
1911
2030
|
return pulumi.get(self, "disconnect_sessions")
|
1912
2031
|
|
@@ -1918,7 +2037,8 @@ class SecretBackendConnectionOracleArgs:
|
|
1918
2037
|
@pulumi.getter(name="maxConnectionLifetime")
|
1919
2038
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
1920
2039
|
"""
|
1921
|
-
|
2040
|
+
The maximum number of seconds to keep
|
2041
|
+
a connection alive for.
|
1922
2042
|
"""
|
1923
2043
|
return pulumi.get(self, "max_connection_lifetime")
|
1924
2044
|
|
@@ -1930,7 +2050,8 @@ class SecretBackendConnectionOracleArgs:
|
|
1930
2050
|
@pulumi.getter(name="maxIdleConnections")
|
1931
2051
|
def max_idle_connections(self) -> Optional[pulumi.Input[int]]:
|
1932
2052
|
"""
|
1933
|
-
|
2053
|
+
The maximum number of idle connections to
|
2054
|
+
maintain.
|
1934
2055
|
"""
|
1935
2056
|
return pulumi.get(self, "max_idle_connections")
|
1936
2057
|
|
@@ -1942,7 +2063,8 @@ class SecretBackendConnectionOracleArgs:
|
|
1942
2063
|
@pulumi.getter(name="maxOpenConnections")
|
1943
2064
|
def max_open_connections(self) -> Optional[pulumi.Input[int]]:
|
1944
2065
|
"""
|
1945
|
-
|
2066
|
+
The maximum number of open connections to
|
2067
|
+
use.
|
1946
2068
|
"""
|
1947
2069
|
return pulumi.get(self, "max_open_connections")
|
1948
2070
|
|
@@ -1954,7 +2076,7 @@ class SecretBackendConnectionOracleArgs:
|
|
1954
2076
|
@pulumi.getter
|
1955
2077
|
def password(self) -> Optional[pulumi.Input[str]]:
|
1956
2078
|
"""
|
1957
|
-
The
|
2079
|
+
The password to authenticate with.
|
1958
2080
|
"""
|
1959
2081
|
return pulumi.get(self, "password")
|
1960
2082
|
|
@@ -1966,7 +2088,7 @@ class SecretBackendConnectionOracleArgs:
|
|
1966
2088
|
@pulumi.getter(name="splitStatements")
|
1967
2089
|
def split_statements(self) -> Optional[pulumi.Input[bool]]:
|
1968
2090
|
"""
|
1969
|
-
|
2091
|
+
Enable spliting statements after semi-colons.
|
1970
2092
|
"""
|
1971
2093
|
return pulumi.get(self, "split_statements")
|
1972
2094
|
|
@@ -1978,7 +2100,7 @@ class SecretBackendConnectionOracleArgs:
|
|
1978
2100
|
@pulumi.getter
|
1979
2101
|
def username(self) -> Optional[pulumi.Input[str]]:
|
1980
2102
|
"""
|
1981
|
-
The
|
2103
|
+
The username to authenticate with.
|
1982
2104
|
"""
|
1983
2105
|
return pulumi.get(self, "username")
|
1984
2106
|
|
@@ -1990,7 +2112,7 @@ class SecretBackendConnectionOracleArgs:
|
|
1990
2112
|
@pulumi.getter(name="usernameTemplate")
|
1991
2113
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
1992
2114
|
"""
|
1993
|
-
|
2115
|
+
Template describing how dynamic usernames are generated.
|
1994
2116
|
"""
|
1995
2117
|
return pulumi.get(self, "username_template")
|
1996
2118
|
|
@@ -2013,16 +2135,22 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2013
2135
|
username: Optional[pulumi.Input[str]] = None,
|
2014
2136
|
username_template: Optional[pulumi.Input[str]] = None):
|
2015
2137
|
"""
|
2016
|
-
:param pulumi.Input[str] auth_type:
|
2017
|
-
:param pulumi.Input[str] connection_url:
|
2018
|
-
|
2019
|
-
|
2020
|
-
|
2021
|
-
:param pulumi.Input[
|
2022
|
-
:param pulumi.Input[
|
2023
|
-
|
2024
|
-
:param pulumi.Input[
|
2025
|
-
|
2138
|
+
:param pulumi.Input[str] auth_type: Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
2139
|
+
:param pulumi.Input[str] connection_url: A URL containing connection information. See
|
2140
|
+
the [Vault
|
2141
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
2142
|
+
for an example.
|
2143
|
+
:param pulumi.Input[bool] disable_escaping: Disable special character escaping in username and password.
|
2144
|
+
:param pulumi.Input[int] max_connection_lifetime: The maximum number of seconds to keep
|
2145
|
+
a connection alive for.
|
2146
|
+
:param pulumi.Input[int] max_idle_connections: The maximum number of idle connections to
|
2147
|
+
maintain.
|
2148
|
+
:param pulumi.Input[int] max_open_connections: The maximum number of open connections to
|
2149
|
+
use.
|
2150
|
+
:param pulumi.Input[str] password: The password to authenticate with.
|
2151
|
+
:param pulumi.Input[str] service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
2152
|
+
:param pulumi.Input[str] username: The username to authenticate with.
|
2153
|
+
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated.
|
2026
2154
|
"""
|
2027
2155
|
if auth_type is not None:
|
2028
2156
|
pulumi.set(__self__, "auth_type", auth_type)
|
@@ -2049,7 +2177,7 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2049
2177
|
@pulumi.getter(name="authType")
|
2050
2178
|
def auth_type(self) -> Optional[pulumi.Input[str]]:
|
2051
2179
|
"""
|
2052
|
-
|
2180
|
+
Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
2053
2181
|
"""
|
2054
2182
|
return pulumi.get(self, "auth_type")
|
2055
2183
|
|
@@ -2061,7 +2189,10 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2061
2189
|
@pulumi.getter(name="connectionUrl")
|
2062
2190
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
2063
2191
|
"""
|
2064
|
-
|
2192
|
+
A URL containing connection information. See
|
2193
|
+
the [Vault
|
2194
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
2195
|
+
for an example.
|
2065
2196
|
"""
|
2066
2197
|
return pulumi.get(self, "connection_url")
|
2067
2198
|
|
@@ -2073,7 +2204,7 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2073
2204
|
@pulumi.getter(name="disableEscaping")
|
2074
2205
|
def disable_escaping(self) -> Optional[pulumi.Input[bool]]:
|
2075
2206
|
"""
|
2076
|
-
Disable special character escaping in username and password
|
2207
|
+
Disable special character escaping in username and password.
|
2077
2208
|
"""
|
2078
2209
|
return pulumi.get(self, "disable_escaping")
|
2079
2210
|
|
@@ -2085,7 +2216,8 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2085
2216
|
@pulumi.getter(name="maxConnectionLifetime")
|
2086
2217
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
2087
2218
|
"""
|
2088
|
-
|
2219
|
+
The maximum number of seconds to keep
|
2220
|
+
a connection alive for.
|
2089
2221
|
"""
|
2090
2222
|
return pulumi.get(self, "max_connection_lifetime")
|
2091
2223
|
|
@@ -2097,7 +2229,8 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2097
2229
|
@pulumi.getter(name="maxIdleConnections")
|
2098
2230
|
def max_idle_connections(self) -> Optional[pulumi.Input[int]]:
|
2099
2231
|
"""
|
2100
|
-
|
2232
|
+
The maximum number of idle connections to
|
2233
|
+
maintain.
|
2101
2234
|
"""
|
2102
2235
|
return pulumi.get(self, "max_idle_connections")
|
2103
2236
|
|
@@ -2109,7 +2242,8 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2109
2242
|
@pulumi.getter(name="maxOpenConnections")
|
2110
2243
|
def max_open_connections(self) -> Optional[pulumi.Input[int]]:
|
2111
2244
|
"""
|
2112
|
-
|
2245
|
+
The maximum number of open connections to
|
2246
|
+
use.
|
2113
2247
|
"""
|
2114
2248
|
return pulumi.get(self, "max_open_connections")
|
2115
2249
|
|
@@ -2121,7 +2255,7 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2121
2255
|
@pulumi.getter
|
2122
2256
|
def password(self) -> Optional[pulumi.Input[str]]:
|
2123
2257
|
"""
|
2124
|
-
The
|
2258
|
+
The password to authenticate with.
|
2125
2259
|
"""
|
2126
2260
|
return pulumi.get(self, "password")
|
2127
2261
|
|
@@ -2133,7 +2267,7 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2133
2267
|
@pulumi.getter(name="serviceAccountJson")
|
2134
2268
|
def service_account_json(self) -> Optional[pulumi.Input[str]]:
|
2135
2269
|
"""
|
2136
|
-
|
2270
|
+
JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
2137
2271
|
"""
|
2138
2272
|
return pulumi.get(self, "service_account_json")
|
2139
2273
|
|
@@ -2145,7 +2279,7 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2145
2279
|
@pulumi.getter
|
2146
2280
|
def username(self) -> Optional[pulumi.Input[str]]:
|
2147
2281
|
"""
|
2148
|
-
The
|
2282
|
+
The username to authenticate with.
|
2149
2283
|
"""
|
2150
2284
|
return pulumi.get(self, "username")
|
2151
2285
|
|
@@ -2157,7 +2291,7 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2157
2291
|
@pulumi.getter(name="usernameTemplate")
|
2158
2292
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
2159
2293
|
"""
|
2160
|
-
|
2294
|
+
Template describing how dynamic usernames are generated.
|
2161
2295
|
"""
|
2162
2296
|
return pulumi.get(self, "username_template")
|
2163
2297
|
|
@@ -2177,13 +2311,15 @@ class SecretBackendConnectionRedisArgs:
|
|
2177
2311
|
port: Optional[pulumi.Input[int]] = None,
|
2178
2312
|
tls: Optional[pulumi.Input[bool]] = None):
|
2179
2313
|
"""
|
2180
|
-
:param pulumi.Input[str] host:
|
2181
|
-
:param pulumi.Input[str] password:
|
2182
|
-
:param pulumi.Input[str] username:
|
2183
|
-
:param pulumi.Input[str] ca_cert: The
|
2184
|
-
:param pulumi.Input[bool] insecure_tls:
|
2185
|
-
|
2186
|
-
:param pulumi.Input[
|
2314
|
+
:param pulumi.Input[str] host: The host to connect to.
|
2315
|
+
:param pulumi.Input[str] password: The password to authenticate with.
|
2316
|
+
:param pulumi.Input[str] username: The username to authenticate with.
|
2317
|
+
:param pulumi.Input[str] ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
|
2318
|
+
:param pulumi.Input[bool] insecure_tls: Whether to skip verification of the server
|
2319
|
+
certificate when using TLS.
|
2320
|
+
:param pulumi.Input[int] port: The default port to connect to if no port is specified as
|
2321
|
+
part of the host.
|
2322
|
+
:param pulumi.Input[bool] tls: Whether to use TLS when connecting to Cassandra.
|
2187
2323
|
"""
|
2188
2324
|
pulumi.set(__self__, "host", host)
|
2189
2325
|
pulumi.set(__self__, "password", password)
|
@@ -2201,7 +2337,7 @@ class SecretBackendConnectionRedisArgs:
|
|
2201
2337
|
@pulumi.getter
|
2202
2338
|
def host(self) -> pulumi.Input[str]:
|
2203
2339
|
"""
|
2204
|
-
|
2340
|
+
The host to connect to.
|
2205
2341
|
"""
|
2206
2342
|
return pulumi.get(self, "host")
|
2207
2343
|
|
@@ -2213,7 +2349,7 @@ class SecretBackendConnectionRedisArgs:
|
|
2213
2349
|
@pulumi.getter
|
2214
2350
|
def password(self) -> pulumi.Input[str]:
|
2215
2351
|
"""
|
2216
|
-
|
2352
|
+
The password to authenticate with.
|
2217
2353
|
"""
|
2218
2354
|
return pulumi.get(self, "password")
|
2219
2355
|
|
@@ -2225,7 +2361,7 @@ class SecretBackendConnectionRedisArgs:
|
|
2225
2361
|
@pulumi.getter
|
2226
2362
|
def username(self) -> pulumi.Input[str]:
|
2227
2363
|
"""
|
2228
|
-
|
2364
|
+
The username to authenticate with.
|
2229
2365
|
"""
|
2230
2366
|
return pulumi.get(self, "username")
|
2231
2367
|
|
@@ -2237,7 +2373,7 @@ class SecretBackendConnectionRedisArgs:
|
|
2237
2373
|
@pulumi.getter(name="caCert")
|
2238
2374
|
def ca_cert(self) -> Optional[pulumi.Input[str]]:
|
2239
2375
|
"""
|
2240
|
-
The
|
2376
|
+
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
|
2241
2377
|
"""
|
2242
2378
|
return pulumi.get(self, "ca_cert")
|
2243
2379
|
|
@@ -2249,7 +2385,8 @@ class SecretBackendConnectionRedisArgs:
|
|
2249
2385
|
@pulumi.getter(name="insecureTls")
|
2250
2386
|
def insecure_tls(self) -> Optional[pulumi.Input[bool]]:
|
2251
2387
|
"""
|
2252
|
-
|
2388
|
+
Whether to skip verification of the server
|
2389
|
+
certificate when using TLS.
|
2253
2390
|
"""
|
2254
2391
|
return pulumi.get(self, "insecure_tls")
|
2255
2392
|
|
@@ -2261,7 +2398,8 @@ class SecretBackendConnectionRedisArgs:
|
|
2261
2398
|
@pulumi.getter
|
2262
2399
|
def port(self) -> Optional[pulumi.Input[int]]:
|
2263
2400
|
"""
|
2264
|
-
The
|
2401
|
+
The default port to connect to if no port is specified as
|
2402
|
+
part of the host.
|
2265
2403
|
"""
|
2266
2404
|
return pulumi.get(self, "port")
|
2267
2405
|
|
@@ -2273,7 +2411,7 @@ class SecretBackendConnectionRedisArgs:
|
|
2273
2411
|
@pulumi.getter
|
2274
2412
|
def tls(self) -> Optional[pulumi.Input[bool]]:
|
2275
2413
|
"""
|
2276
|
-
|
2414
|
+
Whether to use TLS when connecting to Cassandra.
|
2277
2415
|
"""
|
2278
2416
|
return pulumi.get(self, "tls")
|
2279
2417
|
|
@@ -2290,10 +2428,11 @@ class SecretBackendConnectionRedisElasticacheArgs:
|
|
2290
2428
|
region: Optional[pulumi.Input[str]] = None,
|
2291
2429
|
username: Optional[pulumi.Input[str]] = None):
|
2292
2430
|
"""
|
2293
|
-
:param pulumi.Input[str] url: The
|
2294
|
-
|
2295
|
-
:param pulumi.Input[str]
|
2296
|
-
:param pulumi.Input[str]
|
2431
|
+
:param pulumi.Input[str] url: The URL for Elasticsearch's API. https requires certificate
|
2432
|
+
by trusted CA if used.
|
2433
|
+
:param pulumi.Input[str] password: The password to authenticate with.
|
2434
|
+
:param pulumi.Input[str] region: The region where the ElastiCache cluster is hosted. If omitted Vault tries to infer from the environment instead.
|
2435
|
+
:param pulumi.Input[str] username: The username to authenticate with.
|
2297
2436
|
"""
|
2298
2437
|
pulumi.set(__self__, "url", url)
|
2299
2438
|
if password is not None:
|
@@ -2307,7 +2446,8 @@ class SecretBackendConnectionRedisElasticacheArgs:
|
|
2307
2446
|
@pulumi.getter
|
2308
2447
|
def url(self) -> pulumi.Input[str]:
|
2309
2448
|
"""
|
2310
|
-
The
|
2449
|
+
The URL for Elasticsearch's API. https requires certificate
|
2450
|
+
by trusted CA if used.
|
2311
2451
|
"""
|
2312
2452
|
return pulumi.get(self, "url")
|
2313
2453
|
|
@@ -2319,7 +2459,7 @@ class SecretBackendConnectionRedisElasticacheArgs:
|
|
2319
2459
|
@pulumi.getter
|
2320
2460
|
def password(self) -> Optional[pulumi.Input[str]]:
|
2321
2461
|
"""
|
2322
|
-
The
|
2462
|
+
The password to authenticate with.
|
2323
2463
|
"""
|
2324
2464
|
return pulumi.get(self, "password")
|
2325
2465
|
|
@@ -2331,7 +2471,7 @@ class SecretBackendConnectionRedisElasticacheArgs:
|
|
2331
2471
|
@pulumi.getter
|
2332
2472
|
def region(self) -> Optional[pulumi.Input[str]]:
|
2333
2473
|
"""
|
2334
|
-
The
|
2474
|
+
The region where the ElastiCache cluster is hosted. If omitted Vault tries to infer from the environment instead.
|
2335
2475
|
"""
|
2336
2476
|
return pulumi.get(self, "region")
|
2337
2477
|
|
@@ -2343,7 +2483,7 @@ class SecretBackendConnectionRedisElasticacheArgs:
|
|
2343
2483
|
@pulumi.getter
|
2344
2484
|
def username(self) -> Optional[pulumi.Input[str]]:
|
2345
2485
|
"""
|
2346
|
-
The
|
2486
|
+
The username to authenticate with.
|
2347
2487
|
"""
|
2348
2488
|
return pulumi.get(self, "username")
|
2349
2489
|
|
@@ -2364,14 +2504,20 @@ class SecretBackendConnectionRedshiftArgs:
|
|
2364
2504
|
username: Optional[pulumi.Input[str]] = None,
|
2365
2505
|
username_template: Optional[pulumi.Input[str]] = None):
|
2366
2506
|
"""
|
2367
|
-
:param pulumi.Input[str] connection_url:
|
2368
|
-
|
2369
|
-
|
2370
|
-
|
2371
|
-
:param pulumi.Input[
|
2372
|
-
:param pulumi.Input[
|
2373
|
-
|
2374
|
-
:param pulumi.Input[
|
2507
|
+
:param pulumi.Input[str] connection_url: A URL containing connection information. See
|
2508
|
+
the [Vault
|
2509
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
2510
|
+
for an example.
|
2511
|
+
:param pulumi.Input[bool] disable_escaping: Disable special character escaping in username and password.
|
2512
|
+
:param pulumi.Input[int] max_connection_lifetime: The maximum number of seconds to keep
|
2513
|
+
a connection alive for.
|
2514
|
+
:param pulumi.Input[int] max_idle_connections: The maximum number of idle connections to
|
2515
|
+
maintain.
|
2516
|
+
:param pulumi.Input[int] max_open_connections: The maximum number of open connections to
|
2517
|
+
use.
|
2518
|
+
:param pulumi.Input[str] password: The password to authenticate with.
|
2519
|
+
:param pulumi.Input[str] username: The username to authenticate with.
|
2520
|
+
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated.
|
2375
2521
|
"""
|
2376
2522
|
if connection_url is not None:
|
2377
2523
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -2394,7 +2540,10 @@ class SecretBackendConnectionRedshiftArgs:
|
|
2394
2540
|
@pulumi.getter(name="connectionUrl")
|
2395
2541
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
2396
2542
|
"""
|
2397
|
-
|
2543
|
+
A URL containing connection information. See
|
2544
|
+
the [Vault
|
2545
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
2546
|
+
for an example.
|
2398
2547
|
"""
|
2399
2548
|
return pulumi.get(self, "connection_url")
|
2400
2549
|
|
@@ -2406,7 +2555,7 @@ class SecretBackendConnectionRedshiftArgs:
|
|
2406
2555
|
@pulumi.getter(name="disableEscaping")
|
2407
2556
|
def disable_escaping(self) -> Optional[pulumi.Input[bool]]:
|
2408
2557
|
"""
|
2409
|
-
Disable special character escaping in username and password
|
2558
|
+
Disable special character escaping in username and password.
|
2410
2559
|
"""
|
2411
2560
|
return pulumi.get(self, "disable_escaping")
|
2412
2561
|
|
@@ -2418,7 +2567,8 @@ class SecretBackendConnectionRedshiftArgs:
|
|
2418
2567
|
@pulumi.getter(name="maxConnectionLifetime")
|
2419
2568
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
2420
2569
|
"""
|
2421
|
-
|
2570
|
+
The maximum number of seconds to keep
|
2571
|
+
a connection alive for.
|
2422
2572
|
"""
|
2423
2573
|
return pulumi.get(self, "max_connection_lifetime")
|
2424
2574
|
|
@@ -2430,7 +2580,8 @@ class SecretBackendConnectionRedshiftArgs:
|
|
2430
2580
|
@pulumi.getter(name="maxIdleConnections")
|
2431
2581
|
def max_idle_connections(self) -> Optional[pulumi.Input[int]]:
|
2432
2582
|
"""
|
2433
|
-
|
2583
|
+
The maximum number of idle connections to
|
2584
|
+
maintain.
|
2434
2585
|
"""
|
2435
2586
|
return pulumi.get(self, "max_idle_connections")
|
2436
2587
|
|
@@ -2442,7 +2593,8 @@ class SecretBackendConnectionRedshiftArgs:
|
|
2442
2593
|
@pulumi.getter(name="maxOpenConnections")
|
2443
2594
|
def max_open_connections(self) -> Optional[pulumi.Input[int]]:
|
2444
2595
|
"""
|
2445
|
-
|
2596
|
+
The maximum number of open connections to
|
2597
|
+
use.
|
2446
2598
|
"""
|
2447
2599
|
return pulumi.get(self, "max_open_connections")
|
2448
2600
|
|
@@ -2454,7 +2606,7 @@ class SecretBackendConnectionRedshiftArgs:
|
|
2454
2606
|
@pulumi.getter
|
2455
2607
|
def password(self) -> Optional[pulumi.Input[str]]:
|
2456
2608
|
"""
|
2457
|
-
The
|
2609
|
+
The password to authenticate with.
|
2458
2610
|
"""
|
2459
2611
|
return pulumi.get(self, "password")
|
2460
2612
|
|
@@ -2466,7 +2618,7 @@ class SecretBackendConnectionRedshiftArgs:
|
|
2466
2618
|
@pulumi.getter
|
2467
2619
|
def username(self) -> Optional[pulumi.Input[str]]:
|
2468
2620
|
"""
|
2469
|
-
The
|
2621
|
+
The username to authenticate with.
|
2470
2622
|
"""
|
2471
2623
|
return pulumi.get(self, "username")
|
2472
2624
|
|
@@ -2478,7 +2630,7 @@ class SecretBackendConnectionRedshiftArgs:
|
|
2478
2630
|
@pulumi.getter(name="usernameTemplate")
|
2479
2631
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
2480
2632
|
"""
|
2481
|
-
|
2633
|
+
Template describing how dynamic usernames are generated.
|
2482
2634
|
"""
|
2483
2635
|
return pulumi.get(self, "username_template")
|
2484
2636
|
|
@@ -2498,13 +2650,19 @@ class SecretBackendConnectionSnowflakeArgs:
|
|
2498
2650
|
username: Optional[pulumi.Input[str]] = None,
|
2499
2651
|
username_template: Optional[pulumi.Input[str]] = None):
|
2500
2652
|
"""
|
2501
|
-
:param pulumi.Input[str] connection_url:
|
2502
|
-
|
2503
|
-
|
2504
|
-
|
2505
|
-
:param pulumi.Input[
|
2506
|
-
|
2507
|
-
:param pulumi.Input[
|
2653
|
+
:param pulumi.Input[str] connection_url: A URL containing connection information. See
|
2654
|
+
the [Vault
|
2655
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
2656
|
+
for an example.
|
2657
|
+
:param pulumi.Input[int] max_connection_lifetime: The maximum number of seconds to keep
|
2658
|
+
a connection alive for.
|
2659
|
+
:param pulumi.Input[int] max_idle_connections: The maximum number of idle connections to
|
2660
|
+
maintain.
|
2661
|
+
:param pulumi.Input[int] max_open_connections: The maximum number of open connections to
|
2662
|
+
use.
|
2663
|
+
:param pulumi.Input[str] password: The password to authenticate with.
|
2664
|
+
:param pulumi.Input[str] username: The username to authenticate with.
|
2665
|
+
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated.
|
2508
2666
|
"""
|
2509
2667
|
if connection_url is not None:
|
2510
2668
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -2525,7 +2683,10 @@ class SecretBackendConnectionSnowflakeArgs:
|
|
2525
2683
|
@pulumi.getter(name="connectionUrl")
|
2526
2684
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
2527
2685
|
"""
|
2528
|
-
|
2686
|
+
A URL containing connection information. See
|
2687
|
+
the [Vault
|
2688
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
2689
|
+
for an example.
|
2529
2690
|
"""
|
2530
2691
|
return pulumi.get(self, "connection_url")
|
2531
2692
|
|
@@ -2537,7 +2698,8 @@ class SecretBackendConnectionSnowflakeArgs:
|
|
2537
2698
|
@pulumi.getter(name="maxConnectionLifetime")
|
2538
2699
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
2539
2700
|
"""
|
2540
|
-
|
2701
|
+
The maximum number of seconds to keep
|
2702
|
+
a connection alive for.
|
2541
2703
|
"""
|
2542
2704
|
return pulumi.get(self, "max_connection_lifetime")
|
2543
2705
|
|
@@ -2549,7 +2711,8 @@ class SecretBackendConnectionSnowflakeArgs:
|
|
2549
2711
|
@pulumi.getter(name="maxIdleConnections")
|
2550
2712
|
def max_idle_connections(self) -> Optional[pulumi.Input[int]]:
|
2551
2713
|
"""
|
2552
|
-
|
2714
|
+
The maximum number of idle connections to
|
2715
|
+
maintain.
|
2553
2716
|
"""
|
2554
2717
|
return pulumi.get(self, "max_idle_connections")
|
2555
2718
|
|
@@ -2561,7 +2724,8 @@ class SecretBackendConnectionSnowflakeArgs:
|
|
2561
2724
|
@pulumi.getter(name="maxOpenConnections")
|
2562
2725
|
def max_open_connections(self) -> Optional[pulumi.Input[int]]:
|
2563
2726
|
"""
|
2564
|
-
|
2727
|
+
The maximum number of open connections to
|
2728
|
+
use.
|
2565
2729
|
"""
|
2566
2730
|
return pulumi.get(self, "max_open_connections")
|
2567
2731
|
|
@@ -2573,7 +2737,7 @@ class SecretBackendConnectionSnowflakeArgs:
|
|
2573
2737
|
@pulumi.getter
|
2574
2738
|
def password(self) -> Optional[pulumi.Input[str]]:
|
2575
2739
|
"""
|
2576
|
-
The
|
2740
|
+
The password to authenticate with.
|
2577
2741
|
"""
|
2578
2742
|
return pulumi.get(self, "password")
|
2579
2743
|
|
@@ -2585,7 +2749,7 @@ class SecretBackendConnectionSnowflakeArgs:
|
|
2585
2749
|
@pulumi.getter
|
2586
2750
|
def username(self) -> Optional[pulumi.Input[str]]:
|
2587
2751
|
"""
|
2588
|
-
The
|
2752
|
+
The username to authenticate with.
|
2589
2753
|
"""
|
2590
2754
|
return pulumi.get(self, "username")
|
2591
2755
|
|
@@ -2597,7 +2761,7 @@ class SecretBackendConnectionSnowflakeArgs:
|
|
2597
2761
|
@pulumi.getter(name="usernameTemplate")
|
2598
2762
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
2599
2763
|
"""
|
2600
|
-
|
2764
|
+
Template describing how dynamic usernames are generated.
|
2601
2765
|
"""
|
2602
2766
|
return pulumi.get(self, "username_template")
|
2603
2767
|
|
@@ -2629,21 +2793,25 @@ class SecretsMountCassandraArgs:
|
|
2629
2793
|
:param pulumi.Input[str] name: Name of the database connection.
|
2630
2794
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
2631
2795
|
connection.
|
2632
|
-
:param pulumi.Input[int] connect_timeout: The number of seconds to use as a connection
|
2796
|
+
:param pulumi.Input[int] connect_timeout: The number of seconds to use as a connection
|
2797
|
+
timeout.
|
2633
2798
|
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2634
2799
|
|
2635
2800
|
Supported list of database secrets engines that can be configured:
|
2636
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] hosts:
|
2637
|
-
:param pulumi.Input[bool] insecure_tls: Whether to skip verification of the server
|
2638
|
-
|
2639
|
-
:param pulumi.Input[str]
|
2640
|
-
:param pulumi.Input[str]
|
2801
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] hosts: The hosts to connect to.
|
2802
|
+
:param pulumi.Input[bool] insecure_tls: Whether to skip verification of the server
|
2803
|
+
certificate when using TLS.
|
2804
|
+
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
2805
|
+
:param pulumi.Input[str] pem_bundle: Concatenated PEM blocks configuring the certificate
|
2806
|
+
chain.
|
2807
|
+
:param pulumi.Input[str] pem_json: A JSON structure configuring the certificate chain.
|
2641
2808
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
2642
|
-
:param pulumi.Input[int] port: The
|
2809
|
+
:param pulumi.Input[int] port: The default port to connect to if no port is specified as
|
2810
|
+
part of the host.
|
2643
2811
|
:param pulumi.Input[int] protocol_version: The CQL protocol version to use.
|
2644
2812
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
2645
2813
|
:param pulumi.Input[bool] tls: Whether to use TLS when connecting to Cassandra.
|
2646
|
-
:param pulumi.Input[str] username: The username
|
2814
|
+
:param pulumi.Input[str] username: The root credential username used in the connection URL.
|
2647
2815
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
2648
2816
|
initial configuration or not.
|
2649
2817
|
"""
|
@@ -2708,7 +2876,8 @@ class SecretsMountCassandraArgs:
|
|
2708
2876
|
@pulumi.getter(name="connectTimeout")
|
2709
2877
|
def connect_timeout(self) -> Optional[pulumi.Input[int]]:
|
2710
2878
|
"""
|
2711
|
-
The number of seconds to use as a connection
|
2879
|
+
The number of seconds to use as a connection
|
2880
|
+
timeout.
|
2712
2881
|
"""
|
2713
2882
|
return pulumi.get(self, "connect_timeout")
|
2714
2883
|
|
@@ -2734,7 +2903,7 @@ class SecretsMountCassandraArgs:
|
|
2734
2903
|
@pulumi.getter
|
2735
2904
|
def hosts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
2736
2905
|
"""
|
2737
|
-
|
2906
|
+
The hosts to connect to.
|
2738
2907
|
"""
|
2739
2908
|
return pulumi.get(self, "hosts")
|
2740
2909
|
|
@@ -2746,7 +2915,8 @@ class SecretsMountCassandraArgs:
|
|
2746
2915
|
@pulumi.getter(name="insecureTls")
|
2747
2916
|
def insecure_tls(self) -> Optional[pulumi.Input[bool]]:
|
2748
2917
|
"""
|
2749
|
-
Whether to skip verification of the server
|
2918
|
+
Whether to skip verification of the server
|
2919
|
+
certificate when using TLS.
|
2750
2920
|
"""
|
2751
2921
|
return pulumi.get(self, "insecure_tls")
|
2752
2922
|
|
@@ -2758,7 +2928,7 @@ class SecretsMountCassandraArgs:
|
|
2758
2928
|
@pulumi.getter
|
2759
2929
|
def password(self) -> Optional[pulumi.Input[str]]:
|
2760
2930
|
"""
|
2761
|
-
The password
|
2931
|
+
The root credential password used in the connection URL.
|
2762
2932
|
"""
|
2763
2933
|
return pulumi.get(self, "password")
|
2764
2934
|
|
@@ -2770,7 +2940,8 @@ class SecretsMountCassandraArgs:
|
|
2770
2940
|
@pulumi.getter(name="pemBundle")
|
2771
2941
|
def pem_bundle(self) -> Optional[pulumi.Input[str]]:
|
2772
2942
|
"""
|
2773
|
-
Concatenated PEM blocks
|
2943
|
+
Concatenated PEM blocks configuring the certificate
|
2944
|
+
chain.
|
2774
2945
|
"""
|
2775
2946
|
return pulumi.get(self, "pem_bundle")
|
2776
2947
|
|
@@ -2782,7 +2953,7 @@ class SecretsMountCassandraArgs:
|
|
2782
2953
|
@pulumi.getter(name="pemJson")
|
2783
2954
|
def pem_json(self) -> Optional[pulumi.Input[str]]:
|
2784
2955
|
"""
|
2785
|
-
|
2956
|
+
A JSON structure configuring the certificate chain.
|
2786
2957
|
"""
|
2787
2958
|
return pulumi.get(self, "pem_json")
|
2788
2959
|
|
@@ -2806,7 +2977,8 @@ class SecretsMountCassandraArgs:
|
|
2806
2977
|
@pulumi.getter
|
2807
2978
|
def port(self) -> Optional[pulumi.Input[int]]:
|
2808
2979
|
"""
|
2809
|
-
The
|
2980
|
+
The default port to connect to if no port is specified as
|
2981
|
+
part of the host.
|
2810
2982
|
"""
|
2811
2983
|
return pulumi.get(self, "port")
|
2812
2984
|
|
@@ -2854,7 +3026,7 @@ class SecretsMountCassandraArgs:
|
|
2854
3026
|
@pulumi.getter
|
2855
3027
|
def username(self) -> Optional[pulumi.Input[str]]:
|
2856
3028
|
"""
|
2857
|
-
The username
|
3029
|
+
The root credential username used in the connection URL.
|
2858
3030
|
"""
|
2859
3031
|
return pulumi.get(self, "username")
|
2860
3032
|
|
@@ -2894,10 +3066,10 @@ class SecretsMountCouchbaseArgs:
|
|
2894
3066
|
username_template: Optional[pulumi.Input[str]] = None,
|
2895
3067
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
2896
3068
|
"""
|
2897
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] hosts:
|
3069
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] hosts: The hosts to connect to.
|
2898
3070
|
:param pulumi.Input[str] name: Name of the database connection.
|
2899
|
-
:param pulumi.Input[str] password:
|
2900
|
-
:param pulumi.Input[str] username:
|
3071
|
+
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
3072
|
+
:param pulumi.Input[str] username: The root credential username used in the connection URL.
|
2901
3073
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
2902
3074
|
connection.
|
2903
3075
|
:param pulumi.Input[str] base64_pem: Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
|
@@ -2905,11 +3077,12 @@ class SecretsMountCouchbaseArgs:
|
|
2905
3077
|
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2906
3078
|
|
2907
3079
|
Supported list of database secrets engines that can be configured:
|
2908
|
-
:param pulumi.Input[bool] insecure_tls:
|
3080
|
+
:param pulumi.Input[bool] insecure_tls: Whether to skip verification of the server
|
3081
|
+
certificate when using TLS.
|
2909
3082
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
2910
3083
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
2911
|
-
:param pulumi.Input[bool] tls:
|
2912
|
-
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated.
|
3084
|
+
:param pulumi.Input[bool] tls: Whether to use TLS when connecting to Cassandra.
|
3085
|
+
:param pulumi.Input[str] username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
2913
3086
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
2914
3087
|
initial configuration or not.
|
2915
3088
|
"""
|
@@ -2942,7 +3115,7 @@ class SecretsMountCouchbaseArgs:
|
|
2942
3115
|
@pulumi.getter
|
2943
3116
|
def hosts(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
|
2944
3117
|
"""
|
2945
|
-
|
3118
|
+
The hosts to connect to.
|
2946
3119
|
"""
|
2947
3120
|
return pulumi.get(self, "hosts")
|
2948
3121
|
|
@@ -2966,7 +3139,7 @@ class SecretsMountCouchbaseArgs:
|
|
2966
3139
|
@pulumi.getter
|
2967
3140
|
def password(self) -> pulumi.Input[str]:
|
2968
3141
|
"""
|
2969
|
-
|
3142
|
+
The root credential password used in the connection URL.
|
2970
3143
|
"""
|
2971
3144
|
return pulumi.get(self, "password")
|
2972
3145
|
|
@@ -2978,7 +3151,7 @@ class SecretsMountCouchbaseArgs:
|
|
2978
3151
|
@pulumi.getter
|
2979
3152
|
def username(self) -> pulumi.Input[str]:
|
2980
3153
|
"""
|
2981
|
-
|
3154
|
+
The root credential username used in the connection URL.
|
2982
3155
|
"""
|
2983
3156
|
return pulumi.get(self, "username")
|
2984
3157
|
|
@@ -3041,7 +3214,8 @@ class SecretsMountCouchbaseArgs:
|
|
3041
3214
|
@pulumi.getter(name="insecureTls")
|
3042
3215
|
def insecure_tls(self) -> Optional[pulumi.Input[bool]]:
|
3043
3216
|
"""
|
3044
|
-
|
3217
|
+
Whether to skip verification of the server
|
3218
|
+
certificate when using TLS.
|
3045
3219
|
"""
|
3046
3220
|
return pulumi.get(self, "insecure_tls")
|
3047
3221
|
|
@@ -3077,7 +3251,7 @@ class SecretsMountCouchbaseArgs:
|
|
3077
3251
|
@pulumi.getter
|
3078
3252
|
def tls(self) -> Optional[pulumi.Input[bool]]:
|
3079
3253
|
"""
|
3080
|
-
|
3254
|
+
Whether to use TLS when connecting to Cassandra.
|
3081
3255
|
"""
|
3082
3256
|
return pulumi.get(self, "tls")
|
3083
3257
|
|
@@ -3089,7 +3263,7 @@ class SecretsMountCouchbaseArgs:
|
|
3089
3263
|
@pulumi.getter(name="usernameTemplate")
|
3090
3264
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
3091
3265
|
"""
|
3092
|
-
Template describing how dynamic usernames are generated.
|
3266
|
+
[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
3093
3267
|
"""
|
3094
3268
|
return pulumi.get(self, "username_template")
|
3095
3269
|
|
@@ -3132,23 +3306,24 @@ class SecretsMountElasticsearchArgs:
|
|
3132
3306
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
3133
3307
|
"""
|
3134
3308
|
:param pulumi.Input[str] name: Name of the database connection.
|
3135
|
-
:param pulumi.Input[str] password: The
|
3136
|
-
:param pulumi.Input[str] url: The URL for Elasticsearch's API
|
3137
|
-
|
3309
|
+
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
3310
|
+
:param pulumi.Input[str] url: The URL for Elasticsearch's API. https requires certificate
|
3311
|
+
by trusted CA if used.
|
3312
|
+
:param pulumi.Input[str] username: The root credential username used in the connection URL.
|
3138
3313
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
3139
3314
|
connection.
|
3140
|
-
:param pulumi.Input[str] ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
3141
|
-
:param pulumi.Input[str] ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
3142
|
-
:param pulumi.Input[str] client_cert: The path to the certificate for the Elasticsearch client to present for communication
|
3143
|
-
:param pulumi.Input[str] client_key: The path to the key for the Elasticsearch client to use for communication
|
3315
|
+
:param pulumi.Input[str] ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
|
3316
|
+
:param pulumi.Input[str] ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
|
3317
|
+
:param pulumi.Input[str] client_cert: The path to the certificate for the Elasticsearch client to present for communication.
|
3318
|
+
:param pulumi.Input[str] client_key: The path to the key for the Elasticsearch client to use for communication.
|
3144
3319
|
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3145
3320
|
|
3146
3321
|
Supported list of database secrets engines that can be configured:
|
3147
|
-
:param pulumi.Input[bool] insecure: Whether to disable certificate verification
|
3322
|
+
:param pulumi.Input[bool] insecure: Whether to disable certificate verification.
|
3148
3323
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
3149
3324
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
3150
|
-
:param pulumi.Input[str] tls_server_name: This, if set, is used to set the SNI host when connecting via TLS
|
3151
|
-
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated.
|
3325
|
+
:param pulumi.Input[str] tls_server_name: This, if set, is used to set the SNI host when connecting via TLS.
|
3326
|
+
:param pulumi.Input[str] username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
3152
3327
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
3153
3328
|
initial configuration or not.
|
3154
3329
|
"""
|
@@ -3197,7 +3372,7 @@ class SecretsMountElasticsearchArgs:
|
|
3197
3372
|
@pulumi.getter
|
3198
3373
|
def password(self) -> pulumi.Input[str]:
|
3199
3374
|
"""
|
3200
|
-
The
|
3375
|
+
The root credential password used in the connection URL.
|
3201
3376
|
"""
|
3202
3377
|
return pulumi.get(self, "password")
|
3203
3378
|
|
@@ -3209,7 +3384,8 @@ class SecretsMountElasticsearchArgs:
|
|
3209
3384
|
@pulumi.getter
|
3210
3385
|
def url(self) -> pulumi.Input[str]:
|
3211
3386
|
"""
|
3212
|
-
The URL for Elasticsearch's API
|
3387
|
+
The URL for Elasticsearch's API. https requires certificate
|
3388
|
+
by trusted CA if used.
|
3213
3389
|
"""
|
3214
3390
|
return pulumi.get(self, "url")
|
3215
3391
|
|
@@ -3221,7 +3397,7 @@ class SecretsMountElasticsearchArgs:
|
|
3221
3397
|
@pulumi.getter
|
3222
3398
|
def username(self) -> pulumi.Input[str]:
|
3223
3399
|
"""
|
3224
|
-
The
|
3400
|
+
The root credential username used in the connection URL.
|
3225
3401
|
"""
|
3226
3402
|
return pulumi.get(self, "username")
|
3227
3403
|
|
@@ -3246,7 +3422,7 @@ class SecretsMountElasticsearchArgs:
|
|
3246
3422
|
@pulumi.getter(name="caCert")
|
3247
3423
|
def ca_cert(self) -> Optional[pulumi.Input[str]]:
|
3248
3424
|
"""
|
3249
|
-
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
3425
|
+
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
|
3250
3426
|
"""
|
3251
3427
|
return pulumi.get(self, "ca_cert")
|
3252
3428
|
|
@@ -3258,7 +3434,7 @@ class SecretsMountElasticsearchArgs:
|
|
3258
3434
|
@pulumi.getter(name="caPath")
|
3259
3435
|
def ca_path(self) -> Optional[pulumi.Input[str]]:
|
3260
3436
|
"""
|
3261
|
-
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
3437
|
+
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
|
3262
3438
|
"""
|
3263
3439
|
return pulumi.get(self, "ca_path")
|
3264
3440
|
|
@@ -3270,7 +3446,7 @@ class SecretsMountElasticsearchArgs:
|
|
3270
3446
|
@pulumi.getter(name="clientCert")
|
3271
3447
|
def client_cert(self) -> Optional[pulumi.Input[str]]:
|
3272
3448
|
"""
|
3273
|
-
The path to the certificate for the Elasticsearch client to present for communication
|
3449
|
+
The path to the certificate for the Elasticsearch client to present for communication.
|
3274
3450
|
"""
|
3275
3451
|
return pulumi.get(self, "client_cert")
|
3276
3452
|
|
@@ -3282,7 +3458,7 @@ class SecretsMountElasticsearchArgs:
|
|
3282
3458
|
@pulumi.getter(name="clientKey")
|
3283
3459
|
def client_key(self) -> Optional[pulumi.Input[str]]:
|
3284
3460
|
"""
|
3285
|
-
The path to the key for the Elasticsearch client to use for communication
|
3461
|
+
The path to the key for the Elasticsearch client to use for communication.
|
3286
3462
|
"""
|
3287
3463
|
return pulumi.get(self, "client_key")
|
3288
3464
|
|
@@ -3308,7 +3484,7 @@ class SecretsMountElasticsearchArgs:
|
|
3308
3484
|
@pulumi.getter
|
3309
3485
|
def insecure(self) -> Optional[pulumi.Input[bool]]:
|
3310
3486
|
"""
|
3311
|
-
Whether to disable certificate verification
|
3487
|
+
Whether to disable certificate verification.
|
3312
3488
|
"""
|
3313
3489
|
return pulumi.get(self, "insecure")
|
3314
3490
|
|
@@ -3344,7 +3520,7 @@ class SecretsMountElasticsearchArgs:
|
|
3344
3520
|
@pulumi.getter(name="tlsServerName")
|
3345
3521
|
def tls_server_name(self) -> Optional[pulumi.Input[str]]:
|
3346
3522
|
"""
|
3347
|
-
This, if set, is used to set the SNI host when connecting via TLS
|
3523
|
+
This, if set, is used to set the SNI host when connecting via TLS.
|
3348
3524
|
"""
|
3349
3525
|
return pulumi.get(self, "tls_server_name")
|
3350
3526
|
|
@@ -3356,7 +3532,7 @@ class SecretsMountElasticsearchArgs:
|
|
3356
3532
|
@pulumi.getter(name="usernameTemplate")
|
3357
3533
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
3358
3534
|
"""
|
3359
|
-
Template describing how dynamic usernames are generated.
|
3535
|
+
[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
3360
3536
|
"""
|
3361
3537
|
return pulumi.get(self, "username_template")
|
3362
3538
|
|
@@ -3398,18 +3574,21 @@ class SecretsMountHanaArgs:
|
|
3398
3574
|
:param pulumi.Input[str] name: Name of the database connection.
|
3399
3575
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
3400
3576
|
connection.
|
3401
|
-
:param pulumi.Input[str] connection_url:
|
3577
|
+
:param pulumi.Input[str] connection_url: Specifies the Redshift DSN.
|
3578
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
3402
3579
|
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3403
3580
|
|
3404
3581
|
Supported list of database secrets engines that can be configured:
|
3405
|
-
:param pulumi.Input[bool] disable_escaping: Disable special character escaping in username and password
|
3406
|
-
:param pulumi.Input[int] max_connection_lifetime:
|
3407
|
-
:param pulumi.Input[int] max_idle_connections:
|
3408
|
-
|
3409
|
-
:param pulumi.Input[
|
3582
|
+
:param pulumi.Input[bool] disable_escaping: Disable special character escaping in username and password.
|
3583
|
+
:param pulumi.Input[int] max_connection_lifetime: The maximum amount of time a connection may be reused.
|
3584
|
+
:param pulumi.Input[int] max_idle_connections: The maximum number of idle connections to
|
3585
|
+
the database.
|
3586
|
+
:param pulumi.Input[int] max_open_connections: The maximum number of open connections to
|
3587
|
+
the database.
|
3588
|
+
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
3410
3589
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
3411
3590
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
3412
|
-
:param pulumi.Input[str] username: The root credential username used in the connection URL
|
3591
|
+
:param pulumi.Input[str] username: The root credential username used in the connection URL.
|
3413
3592
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
3414
3593
|
initial configuration or not.
|
3415
3594
|
"""
|
@@ -3468,7 +3647,8 @@ class SecretsMountHanaArgs:
|
|
3468
3647
|
@pulumi.getter(name="connectionUrl")
|
3469
3648
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
3470
3649
|
"""
|
3471
|
-
|
3650
|
+
Specifies the Redshift DSN.
|
3651
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
3472
3652
|
"""
|
3473
3653
|
return pulumi.get(self, "connection_url")
|
3474
3654
|
|
@@ -3494,7 +3674,7 @@ class SecretsMountHanaArgs:
|
|
3494
3674
|
@pulumi.getter(name="disableEscaping")
|
3495
3675
|
def disable_escaping(self) -> Optional[pulumi.Input[bool]]:
|
3496
3676
|
"""
|
3497
|
-
Disable special character escaping in username and password
|
3677
|
+
Disable special character escaping in username and password.
|
3498
3678
|
"""
|
3499
3679
|
return pulumi.get(self, "disable_escaping")
|
3500
3680
|
|
@@ -3506,7 +3686,7 @@ class SecretsMountHanaArgs:
|
|
3506
3686
|
@pulumi.getter(name="maxConnectionLifetime")
|
3507
3687
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
3508
3688
|
"""
|
3509
|
-
|
3689
|
+
The maximum amount of time a connection may be reused.
|
3510
3690
|
"""
|
3511
3691
|
return pulumi.get(self, "max_connection_lifetime")
|
3512
3692
|
|
@@ -3518,7 +3698,8 @@ class SecretsMountHanaArgs:
|
|
3518
3698
|
@pulumi.getter(name="maxIdleConnections")
|
3519
3699
|
def max_idle_connections(self) -> Optional[pulumi.Input[int]]:
|
3520
3700
|
"""
|
3521
|
-
|
3701
|
+
The maximum number of idle connections to
|
3702
|
+
the database.
|
3522
3703
|
"""
|
3523
3704
|
return pulumi.get(self, "max_idle_connections")
|
3524
3705
|
|
@@ -3530,7 +3711,8 @@ class SecretsMountHanaArgs:
|
|
3530
3711
|
@pulumi.getter(name="maxOpenConnections")
|
3531
3712
|
def max_open_connections(self) -> Optional[pulumi.Input[int]]:
|
3532
3713
|
"""
|
3533
|
-
|
3714
|
+
The maximum number of open connections to
|
3715
|
+
the database.
|
3534
3716
|
"""
|
3535
3717
|
return pulumi.get(self, "max_open_connections")
|
3536
3718
|
|
@@ -3542,7 +3724,7 @@ class SecretsMountHanaArgs:
|
|
3542
3724
|
@pulumi.getter
|
3543
3725
|
def password(self) -> Optional[pulumi.Input[str]]:
|
3544
3726
|
"""
|
3545
|
-
The root credential password used in the connection URL
|
3727
|
+
The root credential password used in the connection URL.
|
3546
3728
|
"""
|
3547
3729
|
return pulumi.get(self, "password")
|
3548
3730
|
|
@@ -3578,7 +3760,7 @@ class SecretsMountHanaArgs:
|
|
3578
3760
|
@pulumi.getter
|
3579
3761
|
def username(self) -> Optional[pulumi.Input[str]]:
|
3580
3762
|
"""
|
3581
|
-
The root credential username used in the connection URL
|
3763
|
+
The root credential username used in the connection URL.
|
3582
3764
|
"""
|
3583
3765
|
return pulumi.get(self, "username")
|
3584
3766
|
|
@@ -3620,24 +3802,28 @@ class SecretsMountInfluxdbArgs:
|
|
3620
3802
|
username_template: Optional[pulumi.Input[str]] = None,
|
3621
3803
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
3622
3804
|
"""
|
3623
|
-
:param pulumi.Input[str] host:
|
3805
|
+
:param pulumi.Input[str] host: The host to connect to.
|
3624
3806
|
:param pulumi.Input[str] name: Name of the database connection.
|
3625
|
-
:param pulumi.Input[str] password:
|
3626
|
-
:param pulumi.Input[str] username:
|
3807
|
+
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
3808
|
+
:param pulumi.Input[str] username: The root credential username used in the connection URL.
|
3627
3809
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
3628
3810
|
connection.
|
3629
|
-
:param pulumi.Input[int] connect_timeout: The number of seconds to use as a connection
|
3811
|
+
:param pulumi.Input[int] connect_timeout: The number of seconds to use as a connection
|
3812
|
+
timeout.
|
3630
3813
|
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3631
3814
|
|
3632
3815
|
Supported list of database secrets engines that can be configured:
|
3633
|
-
:param pulumi.Input[bool] insecure_tls: Whether to skip verification of the server
|
3634
|
-
|
3635
|
-
:param pulumi.Input[str]
|
3816
|
+
:param pulumi.Input[bool] insecure_tls: Whether to skip verification of the server
|
3817
|
+
certificate when using TLS.
|
3818
|
+
:param pulumi.Input[str] pem_bundle: Concatenated PEM blocks configuring the certificate
|
3819
|
+
chain.
|
3820
|
+
:param pulumi.Input[str] pem_json: A JSON structure configuring the certificate chain.
|
3636
3821
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
3637
|
-
:param pulumi.Input[int] port: The
|
3822
|
+
:param pulumi.Input[int] port: The default port to connect to if no port is specified as
|
3823
|
+
part of the host.
|
3638
3824
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
3639
|
-
:param pulumi.Input[bool] tls: Whether to use TLS when connecting to
|
3640
|
-
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated.
|
3825
|
+
:param pulumi.Input[bool] tls: Whether to use TLS when connecting to Cassandra.
|
3826
|
+
:param pulumi.Input[str] username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
3641
3827
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
3642
3828
|
initial configuration or not.
|
3643
3829
|
"""
|
@@ -3674,7 +3860,7 @@ class SecretsMountInfluxdbArgs:
|
|
3674
3860
|
@pulumi.getter
|
3675
3861
|
def host(self) -> pulumi.Input[str]:
|
3676
3862
|
"""
|
3677
|
-
|
3863
|
+
The host to connect to.
|
3678
3864
|
"""
|
3679
3865
|
return pulumi.get(self, "host")
|
3680
3866
|
|
@@ -3698,7 +3884,7 @@ class SecretsMountInfluxdbArgs:
|
|
3698
3884
|
@pulumi.getter
|
3699
3885
|
def password(self) -> pulumi.Input[str]:
|
3700
3886
|
"""
|
3701
|
-
|
3887
|
+
The root credential password used in the connection URL.
|
3702
3888
|
"""
|
3703
3889
|
return pulumi.get(self, "password")
|
3704
3890
|
|
@@ -3710,7 +3896,7 @@ class SecretsMountInfluxdbArgs:
|
|
3710
3896
|
@pulumi.getter
|
3711
3897
|
def username(self) -> pulumi.Input[str]:
|
3712
3898
|
"""
|
3713
|
-
|
3899
|
+
The root credential username used in the connection URL.
|
3714
3900
|
"""
|
3715
3901
|
return pulumi.get(self, "username")
|
3716
3902
|
|
@@ -3735,7 +3921,8 @@ class SecretsMountInfluxdbArgs:
|
|
3735
3921
|
@pulumi.getter(name="connectTimeout")
|
3736
3922
|
def connect_timeout(self) -> Optional[pulumi.Input[int]]:
|
3737
3923
|
"""
|
3738
|
-
The number of seconds to use as a connection
|
3924
|
+
The number of seconds to use as a connection
|
3925
|
+
timeout.
|
3739
3926
|
"""
|
3740
3927
|
return pulumi.get(self, "connect_timeout")
|
3741
3928
|
|
@@ -3761,7 +3948,8 @@ class SecretsMountInfluxdbArgs:
|
|
3761
3948
|
@pulumi.getter(name="insecureTls")
|
3762
3949
|
def insecure_tls(self) -> Optional[pulumi.Input[bool]]:
|
3763
3950
|
"""
|
3764
|
-
Whether to skip verification of the server
|
3951
|
+
Whether to skip verification of the server
|
3952
|
+
certificate when using TLS.
|
3765
3953
|
"""
|
3766
3954
|
return pulumi.get(self, "insecure_tls")
|
3767
3955
|
|
@@ -3773,7 +3961,8 @@ class SecretsMountInfluxdbArgs:
|
|
3773
3961
|
@pulumi.getter(name="pemBundle")
|
3774
3962
|
def pem_bundle(self) -> Optional[pulumi.Input[str]]:
|
3775
3963
|
"""
|
3776
|
-
Concatenated PEM blocks
|
3964
|
+
Concatenated PEM blocks configuring the certificate
|
3965
|
+
chain.
|
3777
3966
|
"""
|
3778
3967
|
return pulumi.get(self, "pem_bundle")
|
3779
3968
|
|
@@ -3785,7 +3974,7 @@ class SecretsMountInfluxdbArgs:
|
|
3785
3974
|
@pulumi.getter(name="pemJson")
|
3786
3975
|
def pem_json(self) -> Optional[pulumi.Input[str]]:
|
3787
3976
|
"""
|
3788
|
-
|
3977
|
+
A JSON structure configuring the certificate chain.
|
3789
3978
|
"""
|
3790
3979
|
return pulumi.get(self, "pem_json")
|
3791
3980
|
|
@@ -3809,7 +3998,8 @@ class SecretsMountInfluxdbArgs:
|
|
3809
3998
|
@pulumi.getter
|
3810
3999
|
def port(self) -> Optional[pulumi.Input[int]]:
|
3811
4000
|
"""
|
3812
|
-
The
|
4001
|
+
The default port to connect to if no port is specified as
|
4002
|
+
part of the host.
|
3813
4003
|
"""
|
3814
4004
|
return pulumi.get(self, "port")
|
3815
4005
|
|
@@ -3833,7 +4023,7 @@ class SecretsMountInfluxdbArgs:
|
|
3833
4023
|
@pulumi.getter
|
3834
4024
|
def tls(self) -> Optional[pulumi.Input[bool]]:
|
3835
4025
|
"""
|
3836
|
-
Whether to use TLS when connecting to
|
4026
|
+
Whether to use TLS when connecting to Cassandra.
|
3837
4027
|
"""
|
3838
4028
|
return pulumi.get(self, "tls")
|
3839
4029
|
|
@@ -3845,7 +4035,7 @@ class SecretsMountInfluxdbArgs:
|
|
3845
4035
|
@pulumi.getter(name="usernameTemplate")
|
3846
4036
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
3847
4037
|
"""
|
3848
|
-
Template describing how dynamic usernames are generated.
|
4038
|
+
[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
3849
4039
|
"""
|
3850
4040
|
return pulumi.get(self, "username_template")
|
3851
4041
|
|
@@ -3887,18 +4077,21 @@ class SecretsMountMongodbArgs:
|
|
3887
4077
|
:param pulumi.Input[str] name: Name of the database connection.
|
3888
4078
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
3889
4079
|
connection.
|
3890
|
-
:param pulumi.Input[str] connection_url:
|
4080
|
+
:param pulumi.Input[str] connection_url: Specifies the Redshift DSN.
|
4081
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
3891
4082
|
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3892
4083
|
|
3893
4084
|
Supported list of database secrets engines that can be configured:
|
3894
|
-
:param pulumi.Input[int] max_connection_lifetime:
|
3895
|
-
:param pulumi.Input[int] max_idle_connections:
|
3896
|
-
|
3897
|
-
:param pulumi.Input[
|
4085
|
+
:param pulumi.Input[int] max_connection_lifetime: The maximum amount of time a connection may be reused.
|
4086
|
+
:param pulumi.Input[int] max_idle_connections: The maximum number of idle connections to
|
4087
|
+
the database.
|
4088
|
+
:param pulumi.Input[int] max_open_connections: The maximum number of open connections to
|
4089
|
+
the database.
|
4090
|
+
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
3898
4091
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
3899
4092
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
3900
|
-
:param pulumi.Input[str] username: The root credential username used in the connection URL
|
3901
|
-
:param pulumi.Input[str] username_template:
|
4093
|
+
:param pulumi.Input[str] username: The root credential username used in the connection URL.
|
4094
|
+
:param pulumi.Input[str] username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
3902
4095
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
3903
4096
|
initial configuration or not.
|
3904
4097
|
"""
|
@@ -3957,7 +4150,8 @@ class SecretsMountMongodbArgs:
|
|
3957
4150
|
@pulumi.getter(name="connectionUrl")
|
3958
4151
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
3959
4152
|
"""
|
3960
|
-
|
4153
|
+
Specifies the Redshift DSN.
|
4154
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
3961
4155
|
"""
|
3962
4156
|
return pulumi.get(self, "connection_url")
|
3963
4157
|
|
@@ -3983,7 +4177,7 @@ class SecretsMountMongodbArgs:
|
|
3983
4177
|
@pulumi.getter(name="maxConnectionLifetime")
|
3984
4178
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
3985
4179
|
"""
|
3986
|
-
|
4180
|
+
The maximum amount of time a connection may be reused.
|
3987
4181
|
"""
|
3988
4182
|
return pulumi.get(self, "max_connection_lifetime")
|
3989
4183
|
|
@@ -3995,7 +4189,8 @@ class SecretsMountMongodbArgs:
|
|
3995
4189
|
@pulumi.getter(name="maxIdleConnections")
|
3996
4190
|
def max_idle_connections(self) -> Optional[pulumi.Input[int]]:
|
3997
4191
|
"""
|
3998
|
-
|
4192
|
+
The maximum number of idle connections to
|
4193
|
+
the database.
|
3999
4194
|
"""
|
4000
4195
|
return pulumi.get(self, "max_idle_connections")
|
4001
4196
|
|
@@ -4007,7 +4202,8 @@ class SecretsMountMongodbArgs:
|
|
4007
4202
|
@pulumi.getter(name="maxOpenConnections")
|
4008
4203
|
def max_open_connections(self) -> Optional[pulumi.Input[int]]:
|
4009
4204
|
"""
|
4010
|
-
|
4205
|
+
The maximum number of open connections to
|
4206
|
+
the database.
|
4011
4207
|
"""
|
4012
4208
|
return pulumi.get(self, "max_open_connections")
|
4013
4209
|
|
@@ -4019,7 +4215,7 @@ class SecretsMountMongodbArgs:
|
|
4019
4215
|
@pulumi.getter
|
4020
4216
|
def password(self) -> Optional[pulumi.Input[str]]:
|
4021
4217
|
"""
|
4022
|
-
The root credential password used in the connection URL
|
4218
|
+
The root credential password used in the connection URL.
|
4023
4219
|
"""
|
4024
4220
|
return pulumi.get(self, "password")
|
4025
4221
|
|
@@ -4055,7 +4251,7 @@ class SecretsMountMongodbArgs:
|
|
4055
4251
|
@pulumi.getter
|
4056
4252
|
def username(self) -> Optional[pulumi.Input[str]]:
|
4057
4253
|
"""
|
4058
|
-
The root credential username used in the connection URL
|
4254
|
+
The root credential username used in the connection URL.
|
4059
4255
|
"""
|
4060
4256
|
return pulumi.get(self, "username")
|
4061
4257
|
|
@@ -4067,7 +4263,7 @@ class SecretsMountMongodbArgs:
|
|
4067
4263
|
@pulumi.getter(name="usernameTemplate")
|
4068
4264
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
4069
4265
|
"""
|
4070
|
-
|
4266
|
+
[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
4071
4267
|
"""
|
4072
4268
|
return pulumi.get(self, "username_template")
|
4073
4269
|
|
@@ -4266,20 +4462,25 @@ class SecretsMountMssqlArgs:
|
|
4266
4462
|
:param pulumi.Input[str] name: Name of the database connection.
|
4267
4463
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
4268
4464
|
connection.
|
4269
|
-
:param pulumi.Input[str] connection_url:
|
4270
|
-
|
4465
|
+
:param pulumi.Input[str] connection_url: Specifies the Redshift DSN.
|
4466
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4467
|
+
:param pulumi.Input[bool] contained_db: For Vault v1.9+. Set to true when the target is a
|
4468
|
+
Contained Database, e.g. AzureSQL.
|
4469
|
+
See [Vault docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
|
4271
4470
|
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4272
4471
|
|
4273
4472
|
Supported list of database secrets engines that can be configured:
|
4274
|
-
:param pulumi.Input[bool] disable_escaping: Disable special character escaping in username and password
|
4275
|
-
:param pulumi.Input[int] max_connection_lifetime:
|
4276
|
-
:param pulumi.Input[int] max_idle_connections:
|
4277
|
-
|
4278
|
-
:param pulumi.Input[
|
4473
|
+
:param pulumi.Input[bool] disable_escaping: Disable special character escaping in username and password.
|
4474
|
+
:param pulumi.Input[int] max_connection_lifetime: The maximum amount of time a connection may be reused.
|
4475
|
+
:param pulumi.Input[int] max_idle_connections: The maximum number of idle connections to
|
4476
|
+
the database.
|
4477
|
+
:param pulumi.Input[int] max_open_connections: The maximum number of open connections to
|
4478
|
+
the database.
|
4479
|
+
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
4279
4480
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
4280
4481
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
4281
|
-
:param pulumi.Input[str] username: The root credential username used in the connection URL
|
4282
|
-
:param pulumi.Input[str] username_template:
|
4482
|
+
:param pulumi.Input[str] username: The root credential username used in the connection URL.
|
4483
|
+
:param pulumi.Input[str] username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
4283
4484
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
4284
4485
|
initial configuration or not.
|
4285
4486
|
"""
|
@@ -4342,7 +4543,8 @@ class SecretsMountMssqlArgs:
|
|
4342
4543
|
@pulumi.getter(name="connectionUrl")
|
4343
4544
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
4344
4545
|
"""
|
4345
|
-
|
4546
|
+
Specifies the Redshift DSN.
|
4547
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4346
4548
|
"""
|
4347
4549
|
return pulumi.get(self, "connection_url")
|
4348
4550
|
|
@@ -4354,7 +4556,9 @@ class SecretsMountMssqlArgs:
|
|
4354
4556
|
@pulumi.getter(name="containedDb")
|
4355
4557
|
def contained_db(self) -> Optional[pulumi.Input[bool]]:
|
4356
4558
|
"""
|
4357
|
-
Set to true when the target is a
|
4559
|
+
For Vault v1.9+. Set to true when the target is a
|
4560
|
+
Contained Database, e.g. AzureSQL.
|
4561
|
+
See [Vault docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
|
4358
4562
|
"""
|
4359
4563
|
return pulumi.get(self, "contained_db")
|
4360
4564
|
|
@@ -4380,7 +4584,7 @@ class SecretsMountMssqlArgs:
|
|
4380
4584
|
@pulumi.getter(name="disableEscaping")
|
4381
4585
|
def disable_escaping(self) -> Optional[pulumi.Input[bool]]:
|
4382
4586
|
"""
|
4383
|
-
Disable special character escaping in username and password
|
4587
|
+
Disable special character escaping in username and password.
|
4384
4588
|
"""
|
4385
4589
|
return pulumi.get(self, "disable_escaping")
|
4386
4590
|
|
@@ -4392,7 +4596,7 @@ class SecretsMountMssqlArgs:
|
|
4392
4596
|
@pulumi.getter(name="maxConnectionLifetime")
|
4393
4597
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
4394
4598
|
"""
|
4395
|
-
|
4599
|
+
The maximum amount of time a connection may be reused.
|
4396
4600
|
"""
|
4397
4601
|
return pulumi.get(self, "max_connection_lifetime")
|
4398
4602
|
|
@@ -4404,7 +4608,8 @@ class SecretsMountMssqlArgs:
|
|
4404
4608
|
@pulumi.getter(name="maxIdleConnections")
|
4405
4609
|
def max_idle_connections(self) -> Optional[pulumi.Input[int]]:
|
4406
4610
|
"""
|
4407
|
-
|
4611
|
+
The maximum number of idle connections to
|
4612
|
+
the database.
|
4408
4613
|
"""
|
4409
4614
|
return pulumi.get(self, "max_idle_connections")
|
4410
4615
|
|
@@ -4416,7 +4621,8 @@ class SecretsMountMssqlArgs:
|
|
4416
4621
|
@pulumi.getter(name="maxOpenConnections")
|
4417
4622
|
def max_open_connections(self) -> Optional[pulumi.Input[int]]:
|
4418
4623
|
"""
|
4419
|
-
|
4624
|
+
The maximum number of open connections to
|
4625
|
+
the database.
|
4420
4626
|
"""
|
4421
4627
|
return pulumi.get(self, "max_open_connections")
|
4422
4628
|
|
@@ -4428,7 +4634,7 @@ class SecretsMountMssqlArgs:
|
|
4428
4634
|
@pulumi.getter
|
4429
4635
|
def password(self) -> Optional[pulumi.Input[str]]:
|
4430
4636
|
"""
|
4431
|
-
The root credential password used in the connection URL
|
4637
|
+
The root credential password used in the connection URL.
|
4432
4638
|
"""
|
4433
4639
|
return pulumi.get(self, "password")
|
4434
4640
|
|
@@ -4464,7 +4670,7 @@ class SecretsMountMssqlArgs:
|
|
4464
4670
|
@pulumi.getter
|
4465
4671
|
def username(self) -> Optional[pulumi.Input[str]]:
|
4466
4672
|
"""
|
4467
|
-
The root credential username used in the connection URL
|
4673
|
+
The root credential username used in the connection URL.
|
4468
4674
|
"""
|
4469
4675
|
return pulumi.get(self, "username")
|
4470
4676
|
|
@@ -4476,7 +4682,7 @@ class SecretsMountMssqlArgs:
|
|
4476
4682
|
@pulumi.getter(name="usernameTemplate")
|
4477
4683
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
4478
4684
|
"""
|
4479
|
-
|
4685
|
+
[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
4480
4686
|
"""
|
4481
4687
|
return pulumi.get(self, "username_template")
|
4482
4688
|
|
@@ -4523,21 +4729,24 @@ class SecretsMountMysqlArgs:
|
|
4523
4729
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
4524
4730
|
connection.
|
4525
4731
|
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4526
|
-
:param pulumi.Input[str] connection_url:
|
4732
|
+
:param pulumi.Input[str] connection_url: Specifies the Redshift DSN.
|
4733
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4527
4734
|
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4528
4735
|
|
4529
4736
|
Supported list of database secrets engines that can be configured:
|
4530
|
-
:param pulumi.Input[int] max_connection_lifetime:
|
4531
|
-
:param pulumi.Input[int] max_idle_connections:
|
4532
|
-
|
4533
|
-
:param pulumi.Input[
|
4737
|
+
:param pulumi.Input[int] max_connection_lifetime: The maximum amount of time a connection may be reused.
|
4738
|
+
:param pulumi.Input[int] max_idle_connections: The maximum number of idle connections to
|
4739
|
+
the database.
|
4740
|
+
:param pulumi.Input[int] max_open_connections: The maximum number of open connections to
|
4741
|
+
the database.
|
4742
|
+
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
4534
4743
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
4535
4744
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
4536
4745
|
:param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
|
4537
4746
|
:param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
4538
4747
|
:param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
4539
|
-
:param pulumi.Input[str] username: The root credential username used in the connection URL
|
4540
|
-
:param pulumi.Input[str] username_template:
|
4748
|
+
:param pulumi.Input[str] username: The root credential username used in the connection URL.
|
4749
|
+
:param pulumi.Input[str] username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
4541
4750
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
4542
4751
|
initial configuration or not.
|
4543
4752
|
"""
|
@@ -4616,7 +4825,8 @@ class SecretsMountMysqlArgs:
|
|
4616
4825
|
@pulumi.getter(name="connectionUrl")
|
4617
4826
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
4618
4827
|
"""
|
4619
|
-
|
4828
|
+
Specifies the Redshift DSN.
|
4829
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4620
4830
|
"""
|
4621
4831
|
return pulumi.get(self, "connection_url")
|
4622
4832
|
|
@@ -4642,7 +4852,7 @@ class SecretsMountMysqlArgs:
|
|
4642
4852
|
@pulumi.getter(name="maxConnectionLifetime")
|
4643
4853
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
4644
4854
|
"""
|
4645
|
-
|
4855
|
+
The maximum amount of time a connection may be reused.
|
4646
4856
|
"""
|
4647
4857
|
return pulumi.get(self, "max_connection_lifetime")
|
4648
4858
|
|
@@ -4654,7 +4864,8 @@ class SecretsMountMysqlArgs:
|
|
4654
4864
|
@pulumi.getter(name="maxIdleConnections")
|
4655
4865
|
def max_idle_connections(self) -> Optional[pulumi.Input[int]]:
|
4656
4866
|
"""
|
4657
|
-
|
4867
|
+
The maximum number of idle connections to
|
4868
|
+
the database.
|
4658
4869
|
"""
|
4659
4870
|
return pulumi.get(self, "max_idle_connections")
|
4660
4871
|
|
@@ -4666,7 +4877,8 @@ class SecretsMountMysqlArgs:
|
|
4666
4877
|
@pulumi.getter(name="maxOpenConnections")
|
4667
4878
|
def max_open_connections(self) -> Optional[pulumi.Input[int]]:
|
4668
4879
|
"""
|
4669
|
-
|
4880
|
+
The maximum number of open connections to
|
4881
|
+
the database.
|
4670
4882
|
"""
|
4671
4883
|
return pulumi.get(self, "max_open_connections")
|
4672
4884
|
|
@@ -4678,7 +4890,7 @@ class SecretsMountMysqlArgs:
|
|
4678
4890
|
@pulumi.getter
|
4679
4891
|
def password(self) -> Optional[pulumi.Input[str]]:
|
4680
4892
|
"""
|
4681
|
-
The root credential password used in the connection URL
|
4893
|
+
The root credential password used in the connection URL.
|
4682
4894
|
"""
|
4683
4895
|
return pulumi.get(self, "password")
|
4684
4896
|
|
@@ -4750,7 +4962,7 @@ class SecretsMountMysqlArgs:
|
|
4750
4962
|
@pulumi.getter
|
4751
4963
|
def username(self) -> Optional[pulumi.Input[str]]:
|
4752
4964
|
"""
|
4753
|
-
The root credential username used in the connection URL
|
4965
|
+
The root credential username used in the connection URL.
|
4754
4966
|
"""
|
4755
4967
|
return pulumi.get(self, "username")
|
4756
4968
|
|
@@ -4762,7 +4974,7 @@ class SecretsMountMysqlArgs:
|
|
4762
4974
|
@pulumi.getter(name="usernameTemplate")
|
4763
4975
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
4764
4976
|
"""
|
4765
|
-
|
4977
|
+
[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
4766
4978
|
"""
|
4767
4979
|
return pulumi.get(self, "username_template")
|
4768
4980
|
|
@@ -4809,21 +5021,24 @@ class SecretsMountMysqlAuroraArgs:
|
|
4809
5021
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
4810
5022
|
connection.
|
4811
5023
|
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4812
|
-
:param pulumi.Input[str] connection_url:
|
5024
|
+
:param pulumi.Input[str] connection_url: Specifies the Redshift DSN.
|
5025
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4813
5026
|
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4814
5027
|
|
4815
5028
|
Supported list of database secrets engines that can be configured:
|
4816
|
-
:param pulumi.Input[int] max_connection_lifetime:
|
4817
|
-
:param pulumi.Input[int] max_idle_connections:
|
4818
|
-
|
4819
|
-
:param pulumi.Input[
|
5029
|
+
:param pulumi.Input[int] max_connection_lifetime: The maximum amount of time a connection may be reused.
|
5030
|
+
:param pulumi.Input[int] max_idle_connections: The maximum number of idle connections to
|
5031
|
+
the database.
|
5032
|
+
:param pulumi.Input[int] max_open_connections: The maximum number of open connections to
|
5033
|
+
the database.
|
5034
|
+
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
4820
5035
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
4821
5036
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
4822
5037
|
:param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
|
4823
5038
|
:param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
4824
5039
|
:param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
4825
|
-
:param pulumi.Input[str] username: The root credential username used in the connection URL
|
4826
|
-
:param pulumi.Input[str] username_template:
|
5040
|
+
:param pulumi.Input[str] username: The root credential username used in the connection URL.
|
5041
|
+
:param pulumi.Input[str] username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
4827
5042
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
4828
5043
|
initial configuration or not.
|
4829
5044
|
"""
|
@@ -4902,7 +5117,8 @@ class SecretsMountMysqlAuroraArgs:
|
|
4902
5117
|
@pulumi.getter(name="connectionUrl")
|
4903
5118
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
4904
5119
|
"""
|
4905
|
-
|
5120
|
+
Specifies the Redshift DSN.
|
5121
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4906
5122
|
"""
|
4907
5123
|
return pulumi.get(self, "connection_url")
|
4908
5124
|
|
@@ -4928,7 +5144,7 @@ class SecretsMountMysqlAuroraArgs:
|
|
4928
5144
|
@pulumi.getter(name="maxConnectionLifetime")
|
4929
5145
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
4930
5146
|
"""
|
4931
|
-
|
5147
|
+
The maximum amount of time a connection may be reused.
|
4932
5148
|
"""
|
4933
5149
|
return pulumi.get(self, "max_connection_lifetime")
|
4934
5150
|
|
@@ -4940,7 +5156,8 @@ class SecretsMountMysqlAuroraArgs:
|
|
4940
5156
|
@pulumi.getter(name="maxIdleConnections")
|
4941
5157
|
def max_idle_connections(self) -> Optional[pulumi.Input[int]]:
|
4942
5158
|
"""
|
4943
|
-
|
5159
|
+
The maximum number of idle connections to
|
5160
|
+
the database.
|
4944
5161
|
"""
|
4945
5162
|
return pulumi.get(self, "max_idle_connections")
|
4946
5163
|
|
@@ -4952,7 +5169,8 @@ class SecretsMountMysqlAuroraArgs:
|
|
4952
5169
|
@pulumi.getter(name="maxOpenConnections")
|
4953
5170
|
def max_open_connections(self) -> Optional[pulumi.Input[int]]:
|
4954
5171
|
"""
|
4955
|
-
|
5172
|
+
The maximum number of open connections to
|
5173
|
+
the database.
|
4956
5174
|
"""
|
4957
5175
|
return pulumi.get(self, "max_open_connections")
|
4958
5176
|
|
@@ -4964,7 +5182,7 @@ class SecretsMountMysqlAuroraArgs:
|
|
4964
5182
|
@pulumi.getter
|
4965
5183
|
def password(self) -> Optional[pulumi.Input[str]]:
|
4966
5184
|
"""
|
4967
|
-
The root credential password used in the connection URL
|
5185
|
+
The root credential password used in the connection URL.
|
4968
5186
|
"""
|
4969
5187
|
return pulumi.get(self, "password")
|
4970
5188
|
|
@@ -5036,7 +5254,7 @@ class SecretsMountMysqlAuroraArgs:
|
|
5036
5254
|
@pulumi.getter
|
5037
5255
|
def username(self) -> Optional[pulumi.Input[str]]:
|
5038
5256
|
"""
|
5039
|
-
The root credential username used in the connection URL
|
5257
|
+
The root credential username used in the connection URL.
|
5040
5258
|
"""
|
5041
5259
|
return pulumi.get(self, "username")
|
5042
5260
|
|
@@ -5048,7 +5266,7 @@ class SecretsMountMysqlAuroraArgs:
|
|
5048
5266
|
@pulumi.getter(name="usernameTemplate")
|
5049
5267
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
5050
5268
|
"""
|
5051
|
-
|
5269
|
+
[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
5052
5270
|
"""
|
5053
5271
|
return pulumi.get(self, "username_template")
|
5054
5272
|
|
@@ -5095,21 +5313,24 @@ class SecretsMountMysqlLegacyArgs:
|
|
5095
5313
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
5096
5314
|
connection.
|
5097
5315
|
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5098
|
-
:param pulumi.Input[str] connection_url:
|
5316
|
+
:param pulumi.Input[str] connection_url: Specifies the Redshift DSN.
|
5317
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
5099
5318
|
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5100
5319
|
|
5101
5320
|
Supported list of database secrets engines that can be configured:
|
5102
|
-
:param pulumi.Input[int] max_connection_lifetime:
|
5103
|
-
:param pulumi.Input[int] max_idle_connections:
|
5104
|
-
|
5105
|
-
:param pulumi.Input[
|
5321
|
+
:param pulumi.Input[int] max_connection_lifetime: The maximum amount of time a connection may be reused.
|
5322
|
+
:param pulumi.Input[int] max_idle_connections: The maximum number of idle connections to
|
5323
|
+
the database.
|
5324
|
+
:param pulumi.Input[int] max_open_connections: The maximum number of open connections to
|
5325
|
+
the database.
|
5326
|
+
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
5106
5327
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
5107
5328
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5108
5329
|
:param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
|
5109
5330
|
:param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
5110
5331
|
:param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
5111
|
-
:param pulumi.Input[str] username: The root credential username used in the connection URL
|
5112
|
-
:param pulumi.Input[str] username_template:
|
5332
|
+
:param pulumi.Input[str] username: The root credential username used in the connection URL.
|
5333
|
+
:param pulumi.Input[str] username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
5113
5334
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
5114
5335
|
initial configuration or not.
|
5115
5336
|
"""
|
@@ -5188,7 +5409,8 @@ class SecretsMountMysqlLegacyArgs:
|
|
5188
5409
|
@pulumi.getter(name="connectionUrl")
|
5189
5410
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
5190
5411
|
"""
|
5191
|
-
|
5412
|
+
Specifies the Redshift DSN.
|
5413
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
5192
5414
|
"""
|
5193
5415
|
return pulumi.get(self, "connection_url")
|
5194
5416
|
|
@@ -5214,7 +5436,7 @@ class SecretsMountMysqlLegacyArgs:
|
|
5214
5436
|
@pulumi.getter(name="maxConnectionLifetime")
|
5215
5437
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
5216
5438
|
"""
|
5217
|
-
|
5439
|
+
The maximum amount of time a connection may be reused.
|
5218
5440
|
"""
|
5219
5441
|
return pulumi.get(self, "max_connection_lifetime")
|
5220
5442
|
|
@@ -5226,7 +5448,8 @@ class SecretsMountMysqlLegacyArgs:
|
|
5226
5448
|
@pulumi.getter(name="maxIdleConnections")
|
5227
5449
|
def max_idle_connections(self) -> Optional[pulumi.Input[int]]:
|
5228
5450
|
"""
|
5229
|
-
|
5451
|
+
The maximum number of idle connections to
|
5452
|
+
the database.
|
5230
5453
|
"""
|
5231
5454
|
return pulumi.get(self, "max_idle_connections")
|
5232
5455
|
|
@@ -5238,7 +5461,8 @@ class SecretsMountMysqlLegacyArgs:
|
|
5238
5461
|
@pulumi.getter(name="maxOpenConnections")
|
5239
5462
|
def max_open_connections(self) -> Optional[pulumi.Input[int]]:
|
5240
5463
|
"""
|
5241
|
-
|
5464
|
+
The maximum number of open connections to
|
5465
|
+
the database.
|
5242
5466
|
"""
|
5243
5467
|
return pulumi.get(self, "max_open_connections")
|
5244
5468
|
|
@@ -5250,7 +5474,7 @@ class SecretsMountMysqlLegacyArgs:
|
|
5250
5474
|
@pulumi.getter
|
5251
5475
|
def password(self) -> Optional[pulumi.Input[str]]:
|
5252
5476
|
"""
|
5253
|
-
The root credential password used in the connection URL
|
5477
|
+
The root credential password used in the connection URL.
|
5254
5478
|
"""
|
5255
5479
|
return pulumi.get(self, "password")
|
5256
5480
|
|
@@ -5322,7 +5546,7 @@ class SecretsMountMysqlLegacyArgs:
|
|
5322
5546
|
@pulumi.getter
|
5323
5547
|
def username(self) -> Optional[pulumi.Input[str]]:
|
5324
5548
|
"""
|
5325
|
-
The root credential username used in the connection URL
|
5549
|
+
The root credential username used in the connection URL.
|
5326
5550
|
"""
|
5327
5551
|
return pulumi.get(self, "username")
|
5328
5552
|
|
@@ -5334,7 +5558,7 @@ class SecretsMountMysqlLegacyArgs:
|
|
5334
5558
|
@pulumi.getter(name="usernameTemplate")
|
5335
5559
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
5336
5560
|
"""
|
5337
|
-
|
5561
|
+
[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
5338
5562
|
"""
|
5339
5563
|
return pulumi.get(self, "username_template")
|
5340
5564
|
|
@@ -5381,21 +5605,24 @@ class SecretsMountMysqlRdArgs:
|
|
5381
5605
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
5382
5606
|
connection.
|
5383
5607
|
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5384
|
-
:param pulumi.Input[str] connection_url:
|
5608
|
+
:param pulumi.Input[str] connection_url: Specifies the Redshift DSN.
|
5609
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
5385
5610
|
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5386
5611
|
|
5387
5612
|
Supported list of database secrets engines that can be configured:
|
5388
|
-
:param pulumi.Input[int] max_connection_lifetime:
|
5389
|
-
:param pulumi.Input[int] max_idle_connections:
|
5390
|
-
|
5391
|
-
:param pulumi.Input[
|
5613
|
+
:param pulumi.Input[int] max_connection_lifetime: The maximum amount of time a connection may be reused.
|
5614
|
+
:param pulumi.Input[int] max_idle_connections: The maximum number of idle connections to
|
5615
|
+
the database.
|
5616
|
+
:param pulumi.Input[int] max_open_connections: The maximum number of open connections to
|
5617
|
+
the database.
|
5618
|
+
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
5392
5619
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
5393
5620
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5394
5621
|
:param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
|
5395
5622
|
:param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
5396
5623
|
:param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
5397
|
-
:param pulumi.Input[str] username: The root credential username used in the connection URL
|
5398
|
-
:param pulumi.Input[str] username_template:
|
5624
|
+
:param pulumi.Input[str] username: The root credential username used in the connection URL.
|
5625
|
+
:param pulumi.Input[str] username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
5399
5626
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
5400
5627
|
initial configuration or not.
|
5401
5628
|
"""
|
@@ -5474,7 +5701,8 @@ class SecretsMountMysqlRdArgs:
|
|
5474
5701
|
@pulumi.getter(name="connectionUrl")
|
5475
5702
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
5476
5703
|
"""
|
5477
|
-
|
5704
|
+
Specifies the Redshift DSN.
|
5705
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
5478
5706
|
"""
|
5479
5707
|
return pulumi.get(self, "connection_url")
|
5480
5708
|
|
@@ -5500,7 +5728,7 @@ class SecretsMountMysqlRdArgs:
|
|
5500
5728
|
@pulumi.getter(name="maxConnectionLifetime")
|
5501
5729
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
5502
5730
|
"""
|
5503
|
-
|
5731
|
+
The maximum amount of time a connection may be reused.
|
5504
5732
|
"""
|
5505
5733
|
return pulumi.get(self, "max_connection_lifetime")
|
5506
5734
|
|
@@ -5512,7 +5740,8 @@ class SecretsMountMysqlRdArgs:
|
|
5512
5740
|
@pulumi.getter(name="maxIdleConnections")
|
5513
5741
|
def max_idle_connections(self) -> Optional[pulumi.Input[int]]:
|
5514
5742
|
"""
|
5515
|
-
|
5743
|
+
The maximum number of idle connections to
|
5744
|
+
the database.
|
5516
5745
|
"""
|
5517
5746
|
return pulumi.get(self, "max_idle_connections")
|
5518
5747
|
|
@@ -5524,7 +5753,8 @@ class SecretsMountMysqlRdArgs:
|
|
5524
5753
|
@pulumi.getter(name="maxOpenConnections")
|
5525
5754
|
def max_open_connections(self) -> Optional[pulumi.Input[int]]:
|
5526
5755
|
"""
|
5527
|
-
|
5756
|
+
The maximum number of open connections to
|
5757
|
+
the database.
|
5528
5758
|
"""
|
5529
5759
|
return pulumi.get(self, "max_open_connections")
|
5530
5760
|
|
@@ -5536,7 +5766,7 @@ class SecretsMountMysqlRdArgs:
|
|
5536
5766
|
@pulumi.getter
|
5537
5767
|
def password(self) -> Optional[pulumi.Input[str]]:
|
5538
5768
|
"""
|
5539
|
-
The root credential password used in the connection URL
|
5769
|
+
The root credential password used in the connection URL.
|
5540
5770
|
"""
|
5541
5771
|
return pulumi.get(self, "password")
|
5542
5772
|
|
@@ -5608,7 +5838,7 @@ class SecretsMountMysqlRdArgs:
|
|
5608
5838
|
@pulumi.getter
|
5609
5839
|
def username(self) -> Optional[pulumi.Input[str]]:
|
5610
5840
|
"""
|
5611
|
-
The root credential username used in the connection URL
|
5841
|
+
The root credential username used in the connection URL.
|
5612
5842
|
"""
|
5613
5843
|
return pulumi.get(self, "username")
|
5614
5844
|
|
@@ -5620,7 +5850,7 @@ class SecretsMountMysqlRdArgs:
|
|
5620
5850
|
@pulumi.getter(name="usernameTemplate")
|
5621
5851
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
5622
5852
|
"""
|
5623
|
-
|
5853
|
+
[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
5624
5854
|
"""
|
5625
5855
|
return pulumi.get(self, "username_template")
|
5626
5856
|
|
@@ -5664,20 +5894,23 @@ class SecretsMountOracleArgs:
|
|
5664
5894
|
:param pulumi.Input[str] name: Name of the database connection.
|
5665
5895
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
5666
5896
|
connection.
|
5667
|
-
:param pulumi.Input[str] connection_url:
|
5897
|
+
:param pulumi.Input[str] connection_url: Specifies the Redshift DSN.
|
5898
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
5668
5899
|
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5669
5900
|
|
5670
5901
|
Supported list of database secrets engines that can be configured:
|
5671
5902
|
:param pulumi.Input[bool] disconnect_sessions: Set to true to disconnect any open sessions prior to running the revocation statements.
|
5672
|
-
:param pulumi.Input[int] max_connection_lifetime:
|
5673
|
-
:param pulumi.Input[int] max_idle_connections:
|
5674
|
-
|
5675
|
-
:param pulumi.Input[
|
5903
|
+
:param pulumi.Input[int] max_connection_lifetime: The maximum amount of time a connection may be reused.
|
5904
|
+
:param pulumi.Input[int] max_idle_connections: The maximum number of idle connections to
|
5905
|
+
the database.
|
5906
|
+
:param pulumi.Input[int] max_open_connections: The maximum number of open connections to
|
5907
|
+
the database.
|
5908
|
+
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
5676
5909
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
5677
5910
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5678
5911
|
:param pulumi.Input[bool] split_statements: Set to true in order to split statements after semi-colons.
|
5679
|
-
:param pulumi.Input[str] username: The root credential username used in the connection URL
|
5680
|
-
:param pulumi.Input[str] username_template:
|
5912
|
+
:param pulumi.Input[str] username: The root credential username used in the connection URL.
|
5913
|
+
:param pulumi.Input[str] username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
5681
5914
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
5682
5915
|
initial configuration or not.
|
5683
5916
|
"""
|
@@ -5740,7 +5973,8 @@ class SecretsMountOracleArgs:
|
|
5740
5973
|
@pulumi.getter(name="connectionUrl")
|
5741
5974
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
5742
5975
|
"""
|
5743
|
-
|
5976
|
+
Specifies the Redshift DSN.
|
5977
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
5744
5978
|
"""
|
5745
5979
|
return pulumi.get(self, "connection_url")
|
5746
5980
|
|
@@ -5778,7 +6012,7 @@ class SecretsMountOracleArgs:
|
|
5778
6012
|
@pulumi.getter(name="maxConnectionLifetime")
|
5779
6013
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
5780
6014
|
"""
|
5781
|
-
|
6015
|
+
The maximum amount of time a connection may be reused.
|
5782
6016
|
"""
|
5783
6017
|
return pulumi.get(self, "max_connection_lifetime")
|
5784
6018
|
|
@@ -5790,7 +6024,8 @@ class SecretsMountOracleArgs:
|
|
5790
6024
|
@pulumi.getter(name="maxIdleConnections")
|
5791
6025
|
def max_idle_connections(self) -> Optional[pulumi.Input[int]]:
|
5792
6026
|
"""
|
5793
|
-
|
6027
|
+
The maximum number of idle connections to
|
6028
|
+
the database.
|
5794
6029
|
"""
|
5795
6030
|
return pulumi.get(self, "max_idle_connections")
|
5796
6031
|
|
@@ -5802,7 +6037,8 @@ class SecretsMountOracleArgs:
|
|
5802
6037
|
@pulumi.getter(name="maxOpenConnections")
|
5803
6038
|
def max_open_connections(self) -> Optional[pulumi.Input[int]]:
|
5804
6039
|
"""
|
5805
|
-
|
6040
|
+
The maximum number of open connections to
|
6041
|
+
the database.
|
5806
6042
|
"""
|
5807
6043
|
return pulumi.get(self, "max_open_connections")
|
5808
6044
|
|
@@ -5814,7 +6050,7 @@ class SecretsMountOracleArgs:
|
|
5814
6050
|
@pulumi.getter
|
5815
6051
|
def password(self) -> Optional[pulumi.Input[str]]:
|
5816
6052
|
"""
|
5817
|
-
The root credential password used in the connection URL
|
6053
|
+
The root credential password used in the connection URL.
|
5818
6054
|
"""
|
5819
6055
|
return pulumi.get(self, "password")
|
5820
6056
|
|
@@ -5862,7 +6098,7 @@ class SecretsMountOracleArgs:
|
|
5862
6098
|
@pulumi.getter
|
5863
6099
|
def username(self) -> Optional[pulumi.Input[str]]:
|
5864
6100
|
"""
|
5865
|
-
The root credential username used in the connection URL
|
6101
|
+
The root credential username used in the connection URL.
|
5866
6102
|
"""
|
5867
6103
|
return pulumi.get(self, "username")
|
5868
6104
|
|
@@ -5874,7 +6110,7 @@ class SecretsMountOracleArgs:
|
|
5874
6110
|
@pulumi.getter(name="usernameTemplate")
|
5875
6111
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
5876
6112
|
"""
|
5877
|
-
|
6113
|
+
[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
5878
6114
|
"""
|
5879
6115
|
return pulumi.get(self, "username_template")
|
5880
6116
|
|
@@ -5920,20 +6156,23 @@ class SecretsMountPostgresqlArgs:
|
|
5920
6156
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
5921
6157
|
connection.
|
5922
6158
|
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5923
|
-
:param pulumi.Input[str] connection_url:
|
6159
|
+
:param pulumi.Input[str] connection_url: Specifies the Redshift DSN.
|
6160
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
5924
6161
|
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5925
6162
|
|
5926
6163
|
Supported list of database secrets engines that can be configured:
|
5927
|
-
:param pulumi.Input[bool] disable_escaping: Disable special character escaping in username and password
|
5928
|
-
:param pulumi.Input[int] max_connection_lifetime:
|
5929
|
-
:param pulumi.Input[int] max_idle_connections:
|
5930
|
-
|
5931
|
-
:param pulumi.Input[
|
6164
|
+
:param pulumi.Input[bool] disable_escaping: Disable special character escaping in username and password.
|
6165
|
+
:param pulumi.Input[int] max_connection_lifetime: The maximum amount of time a connection may be reused.
|
6166
|
+
:param pulumi.Input[int] max_idle_connections: The maximum number of idle connections to
|
6167
|
+
the database.
|
6168
|
+
:param pulumi.Input[int] max_open_connections: The maximum number of open connections to
|
6169
|
+
the database.
|
6170
|
+
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
5932
6171
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
5933
6172
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5934
6173
|
:param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
|
5935
|
-
:param pulumi.Input[str] username: The root credential username used in the connection URL
|
5936
|
-
:param pulumi.Input[str] username_template:
|
6174
|
+
:param pulumi.Input[str] username: The root credential username used in the connection URL.
|
6175
|
+
:param pulumi.Input[str] username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
5937
6176
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
5938
6177
|
initial configuration or not.
|
5939
6178
|
"""
|
@@ -6010,7 +6249,8 @@ class SecretsMountPostgresqlArgs:
|
|
6010
6249
|
@pulumi.getter(name="connectionUrl")
|
6011
6250
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
6012
6251
|
"""
|
6013
|
-
|
6252
|
+
Specifies the Redshift DSN.
|
6253
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
6014
6254
|
"""
|
6015
6255
|
return pulumi.get(self, "connection_url")
|
6016
6256
|
|
@@ -6036,7 +6276,7 @@ class SecretsMountPostgresqlArgs:
|
|
6036
6276
|
@pulumi.getter(name="disableEscaping")
|
6037
6277
|
def disable_escaping(self) -> Optional[pulumi.Input[bool]]:
|
6038
6278
|
"""
|
6039
|
-
Disable special character escaping in username and password
|
6279
|
+
Disable special character escaping in username and password.
|
6040
6280
|
"""
|
6041
6281
|
return pulumi.get(self, "disable_escaping")
|
6042
6282
|
|
@@ -6048,7 +6288,7 @@ class SecretsMountPostgresqlArgs:
|
|
6048
6288
|
@pulumi.getter(name="maxConnectionLifetime")
|
6049
6289
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
6050
6290
|
"""
|
6051
|
-
|
6291
|
+
The maximum amount of time a connection may be reused.
|
6052
6292
|
"""
|
6053
6293
|
return pulumi.get(self, "max_connection_lifetime")
|
6054
6294
|
|
@@ -6060,7 +6300,8 @@ class SecretsMountPostgresqlArgs:
|
|
6060
6300
|
@pulumi.getter(name="maxIdleConnections")
|
6061
6301
|
def max_idle_connections(self) -> Optional[pulumi.Input[int]]:
|
6062
6302
|
"""
|
6063
|
-
|
6303
|
+
The maximum number of idle connections to
|
6304
|
+
the database.
|
6064
6305
|
"""
|
6065
6306
|
return pulumi.get(self, "max_idle_connections")
|
6066
6307
|
|
@@ -6072,7 +6313,8 @@ class SecretsMountPostgresqlArgs:
|
|
6072
6313
|
@pulumi.getter(name="maxOpenConnections")
|
6073
6314
|
def max_open_connections(self) -> Optional[pulumi.Input[int]]:
|
6074
6315
|
"""
|
6075
|
-
|
6316
|
+
The maximum number of open connections to
|
6317
|
+
the database.
|
6076
6318
|
"""
|
6077
6319
|
return pulumi.get(self, "max_open_connections")
|
6078
6320
|
|
@@ -6084,7 +6326,7 @@ class SecretsMountPostgresqlArgs:
|
|
6084
6326
|
@pulumi.getter
|
6085
6327
|
def password(self) -> Optional[pulumi.Input[str]]:
|
6086
6328
|
"""
|
6087
|
-
The root credential password used in the connection URL
|
6329
|
+
The root credential password used in the connection URL.
|
6088
6330
|
"""
|
6089
6331
|
return pulumi.get(self, "password")
|
6090
6332
|
|
@@ -6132,7 +6374,7 @@ class SecretsMountPostgresqlArgs:
|
|
6132
6374
|
@pulumi.getter
|
6133
6375
|
def username(self) -> Optional[pulumi.Input[str]]:
|
6134
6376
|
"""
|
6135
|
-
The root credential username used in the connection URL
|
6377
|
+
The root credential username used in the connection URL.
|
6136
6378
|
"""
|
6137
6379
|
return pulumi.get(self, "username")
|
6138
6380
|
|
@@ -6144,7 +6386,7 @@ class SecretsMountPostgresqlArgs:
|
|
6144
6386
|
@pulumi.getter(name="usernameTemplate")
|
6145
6387
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
6146
6388
|
"""
|
6147
|
-
|
6389
|
+
[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
6148
6390
|
"""
|
6149
6391
|
return pulumi.get(self, "username_template")
|
6150
6392
|
|
@@ -6183,21 +6425,23 @@ class SecretsMountRediArgs:
|
|
6183
6425
|
tls: Optional[pulumi.Input[bool]] = None,
|
6184
6426
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
6185
6427
|
"""
|
6186
|
-
:param pulumi.Input[str] host:
|
6428
|
+
:param pulumi.Input[str] host: The host to connect to.
|
6187
6429
|
:param pulumi.Input[str] name: Name of the database connection.
|
6188
|
-
:param pulumi.Input[str] password:
|
6189
|
-
:param pulumi.Input[str] username:
|
6430
|
+
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
6431
|
+
:param pulumi.Input[str] username: The root credential username used in the connection URL.
|
6190
6432
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
6191
6433
|
connection.
|
6192
|
-
:param pulumi.Input[str] ca_cert: The
|
6434
|
+
:param pulumi.Input[str] ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
|
6193
6435
|
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6194
6436
|
|
6195
6437
|
Supported list of database secrets engines that can be configured:
|
6196
|
-
:param pulumi.Input[bool] insecure_tls:
|
6438
|
+
:param pulumi.Input[bool] insecure_tls: Whether to skip verification of the server
|
6439
|
+
certificate when using TLS.
|
6197
6440
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
6198
|
-
:param pulumi.Input[int] port: The
|
6441
|
+
:param pulumi.Input[int] port: The default port to connect to if no port is specified as
|
6442
|
+
part of the host.
|
6199
6443
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
6200
|
-
:param pulumi.Input[bool] tls:
|
6444
|
+
:param pulumi.Input[bool] tls: Whether to use TLS when connecting to Cassandra.
|
6201
6445
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
6202
6446
|
initial configuration or not.
|
6203
6447
|
"""
|
@@ -6228,7 +6472,7 @@ class SecretsMountRediArgs:
|
|
6228
6472
|
@pulumi.getter
|
6229
6473
|
def host(self) -> pulumi.Input[str]:
|
6230
6474
|
"""
|
6231
|
-
|
6475
|
+
The host to connect to.
|
6232
6476
|
"""
|
6233
6477
|
return pulumi.get(self, "host")
|
6234
6478
|
|
@@ -6252,7 +6496,7 @@ class SecretsMountRediArgs:
|
|
6252
6496
|
@pulumi.getter
|
6253
6497
|
def password(self) -> pulumi.Input[str]:
|
6254
6498
|
"""
|
6255
|
-
|
6499
|
+
The root credential password used in the connection URL.
|
6256
6500
|
"""
|
6257
6501
|
return pulumi.get(self, "password")
|
6258
6502
|
|
@@ -6264,7 +6508,7 @@ class SecretsMountRediArgs:
|
|
6264
6508
|
@pulumi.getter
|
6265
6509
|
def username(self) -> pulumi.Input[str]:
|
6266
6510
|
"""
|
6267
|
-
|
6511
|
+
The root credential username used in the connection URL.
|
6268
6512
|
"""
|
6269
6513
|
return pulumi.get(self, "username")
|
6270
6514
|
|
@@ -6289,7 +6533,7 @@ class SecretsMountRediArgs:
|
|
6289
6533
|
@pulumi.getter(name="caCert")
|
6290
6534
|
def ca_cert(self) -> Optional[pulumi.Input[str]]:
|
6291
6535
|
"""
|
6292
|
-
The
|
6536
|
+
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
|
6293
6537
|
"""
|
6294
6538
|
return pulumi.get(self, "ca_cert")
|
6295
6539
|
|
@@ -6315,7 +6559,8 @@ class SecretsMountRediArgs:
|
|
6315
6559
|
@pulumi.getter(name="insecureTls")
|
6316
6560
|
def insecure_tls(self) -> Optional[pulumi.Input[bool]]:
|
6317
6561
|
"""
|
6318
|
-
|
6562
|
+
Whether to skip verification of the server
|
6563
|
+
certificate when using TLS.
|
6319
6564
|
"""
|
6320
6565
|
return pulumi.get(self, "insecure_tls")
|
6321
6566
|
|
@@ -6339,7 +6584,8 @@ class SecretsMountRediArgs:
|
|
6339
6584
|
@pulumi.getter
|
6340
6585
|
def port(self) -> Optional[pulumi.Input[int]]:
|
6341
6586
|
"""
|
6342
|
-
The
|
6587
|
+
The default port to connect to if no port is specified as
|
6588
|
+
part of the host.
|
6343
6589
|
"""
|
6344
6590
|
return pulumi.get(self, "port")
|
6345
6591
|
|
@@ -6363,7 +6609,7 @@ class SecretsMountRediArgs:
|
|
6363
6609
|
@pulumi.getter
|
6364
6610
|
def tls(self) -> Optional[pulumi.Input[bool]]:
|
6365
6611
|
"""
|
6366
|
-
|
6612
|
+
Whether to use TLS when connecting to Cassandra.
|
6367
6613
|
"""
|
6368
6614
|
return pulumi.get(self, "tls")
|
6369
6615
|
|
@@ -6400,17 +6646,19 @@ class SecretsMountRedisElasticachArgs:
|
|
6400
6646
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
6401
6647
|
"""
|
6402
6648
|
:param pulumi.Input[str] name: Name of the database connection.
|
6403
|
-
:param pulumi.Input[str] url: The
|
6649
|
+
:param pulumi.Input[str] url: The URL for Elasticsearch's API. https requires certificate
|
6650
|
+
by trusted CA if used.
|
6404
6651
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
6405
6652
|
connection.
|
6406
6653
|
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6407
6654
|
|
6408
6655
|
Supported list of database secrets engines that can be configured:
|
6409
|
-
:param pulumi.Input[str] password: The
|
6656
|
+
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
6410
6657
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
6411
|
-
:param pulumi.Input[str] region: The AWS region where the ElastiCache cluster is hosted.
|
6658
|
+
:param pulumi.Input[str] region: The AWS region where the ElastiCache cluster is hosted.
|
6659
|
+
If omitted the plugin tries to infer the region from the environment.
|
6412
6660
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
6413
|
-
:param pulumi.Input[str] username: The
|
6661
|
+
:param pulumi.Input[str] username: The root credential username used in the connection URL.
|
6414
6662
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
6415
6663
|
initial configuration or not.
|
6416
6664
|
"""
|
@@ -6449,7 +6697,8 @@ class SecretsMountRedisElasticachArgs:
|
|
6449
6697
|
@pulumi.getter
|
6450
6698
|
def url(self) -> pulumi.Input[str]:
|
6451
6699
|
"""
|
6452
|
-
The
|
6700
|
+
The URL for Elasticsearch's API. https requires certificate
|
6701
|
+
by trusted CA if used.
|
6453
6702
|
"""
|
6454
6703
|
return pulumi.get(self, "url")
|
6455
6704
|
|
@@ -6488,7 +6737,7 @@ class SecretsMountRedisElasticachArgs:
|
|
6488
6737
|
@pulumi.getter
|
6489
6738
|
def password(self) -> Optional[pulumi.Input[str]]:
|
6490
6739
|
"""
|
6491
|
-
The
|
6740
|
+
The root credential password used in the connection URL.
|
6492
6741
|
"""
|
6493
6742
|
return pulumi.get(self, "password")
|
6494
6743
|
|
@@ -6512,7 +6761,8 @@ class SecretsMountRedisElasticachArgs:
|
|
6512
6761
|
@pulumi.getter
|
6513
6762
|
def region(self) -> Optional[pulumi.Input[str]]:
|
6514
6763
|
"""
|
6515
|
-
The AWS region where the ElastiCache cluster is hosted.
|
6764
|
+
The AWS region where the ElastiCache cluster is hosted.
|
6765
|
+
If omitted the plugin tries to infer the region from the environment.
|
6516
6766
|
"""
|
6517
6767
|
return pulumi.get(self, "region")
|
6518
6768
|
|
@@ -6536,7 +6786,7 @@ class SecretsMountRedisElasticachArgs:
|
|
6536
6786
|
@pulumi.getter
|
6537
6787
|
def username(self) -> Optional[pulumi.Input[str]]:
|
6538
6788
|
"""
|
6539
|
-
The
|
6789
|
+
The root credential username used in the connection URL.
|
6540
6790
|
"""
|
6541
6791
|
return pulumi.get(self, "username")
|
6542
6792
|
|
@@ -6579,19 +6829,22 @@ class SecretsMountRedshiftArgs:
|
|
6579
6829
|
:param pulumi.Input[str] name: Name of the database connection.
|
6580
6830
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
6581
6831
|
connection.
|
6582
|
-
:param pulumi.Input[str] connection_url:
|
6832
|
+
:param pulumi.Input[str] connection_url: Specifies the Redshift DSN.
|
6833
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
6583
6834
|
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6584
6835
|
|
6585
6836
|
Supported list of database secrets engines that can be configured:
|
6586
|
-
:param pulumi.Input[bool] disable_escaping: Disable special character escaping in username and password
|
6587
|
-
:param pulumi.Input[int] max_connection_lifetime:
|
6588
|
-
:param pulumi.Input[int] max_idle_connections:
|
6589
|
-
|
6590
|
-
:param pulumi.Input[
|
6837
|
+
:param pulumi.Input[bool] disable_escaping: Disable special character escaping in username and password.
|
6838
|
+
:param pulumi.Input[int] max_connection_lifetime: The maximum amount of time a connection may be reused.
|
6839
|
+
:param pulumi.Input[int] max_idle_connections: The maximum number of idle connections to
|
6840
|
+
the database.
|
6841
|
+
:param pulumi.Input[int] max_open_connections: The maximum number of open connections to
|
6842
|
+
the database.
|
6843
|
+
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
6591
6844
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
6592
6845
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
6593
|
-
:param pulumi.Input[str] username: The root credential username used in the connection URL
|
6594
|
-
:param pulumi.Input[str] username_template:
|
6846
|
+
:param pulumi.Input[str] username: The root credential username used in the connection URL.
|
6847
|
+
:param pulumi.Input[str] username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
6595
6848
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
6596
6849
|
initial configuration or not.
|
6597
6850
|
"""
|
@@ -6652,7 +6905,8 @@ class SecretsMountRedshiftArgs:
|
|
6652
6905
|
@pulumi.getter(name="connectionUrl")
|
6653
6906
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
6654
6907
|
"""
|
6655
|
-
|
6908
|
+
Specifies the Redshift DSN.
|
6909
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
6656
6910
|
"""
|
6657
6911
|
return pulumi.get(self, "connection_url")
|
6658
6912
|
|
@@ -6678,7 +6932,7 @@ class SecretsMountRedshiftArgs:
|
|
6678
6932
|
@pulumi.getter(name="disableEscaping")
|
6679
6933
|
def disable_escaping(self) -> Optional[pulumi.Input[bool]]:
|
6680
6934
|
"""
|
6681
|
-
Disable special character escaping in username and password
|
6935
|
+
Disable special character escaping in username and password.
|
6682
6936
|
"""
|
6683
6937
|
return pulumi.get(self, "disable_escaping")
|
6684
6938
|
|
@@ -6690,7 +6944,7 @@ class SecretsMountRedshiftArgs:
|
|
6690
6944
|
@pulumi.getter(name="maxConnectionLifetime")
|
6691
6945
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
6692
6946
|
"""
|
6693
|
-
|
6947
|
+
The maximum amount of time a connection may be reused.
|
6694
6948
|
"""
|
6695
6949
|
return pulumi.get(self, "max_connection_lifetime")
|
6696
6950
|
|
@@ -6702,7 +6956,8 @@ class SecretsMountRedshiftArgs:
|
|
6702
6956
|
@pulumi.getter(name="maxIdleConnections")
|
6703
6957
|
def max_idle_connections(self) -> Optional[pulumi.Input[int]]:
|
6704
6958
|
"""
|
6705
|
-
|
6959
|
+
The maximum number of idle connections to
|
6960
|
+
the database.
|
6706
6961
|
"""
|
6707
6962
|
return pulumi.get(self, "max_idle_connections")
|
6708
6963
|
|
@@ -6714,7 +6969,8 @@ class SecretsMountRedshiftArgs:
|
|
6714
6969
|
@pulumi.getter(name="maxOpenConnections")
|
6715
6970
|
def max_open_connections(self) -> Optional[pulumi.Input[int]]:
|
6716
6971
|
"""
|
6717
|
-
|
6972
|
+
The maximum number of open connections to
|
6973
|
+
the database.
|
6718
6974
|
"""
|
6719
6975
|
return pulumi.get(self, "max_open_connections")
|
6720
6976
|
|
@@ -6726,7 +6982,7 @@ class SecretsMountRedshiftArgs:
|
|
6726
6982
|
@pulumi.getter
|
6727
6983
|
def password(self) -> Optional[pulumi.Input[str]]:
|
6728
6984
|
"""
|
6729
|
-
The root credential password used in the connection URL
|
6985
|
+
The root credential password used in the connection URL.
|
6730
6986
|
"""
|
6731
6987
|
return pulumi.get(self, "password")
|
6732
6988
|
|
@@ -6762,7 +7018,7 @@ class SecretsMountRedshiftArgs:
|
|
6762
7018
|
@pulumi.getter
|
6763
7019
|
def username(self) -> Optional[pulumi.Input[str]]:
|
6764
7020
|
"""
|
6765
|
-
The root credential username used in the connection URL
|
7021
|
+
The root credential username used in the connection URL.
|
6766
7022
|
"""
|
6767
7023
|
return pulumi.get(self, "username")
|
6768
7024
|
|
@@ -6774,7 +7030,7 @@ class SecretsMountRedshiftArgs:
|
|
6774
7030
|
@pulumi.getter(name="usernameTemplate")
|
6775
7031
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
6776
7032
|
"""
|
6777
|
-
|
7033
|
+
[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
6778
7034
|
"""
|
6779
7035
|
return pulumi.get(self, "username_template")
|
6780
7036
|
|
@@ -6816,18 +7072,21 @@ class SecretsMountSnowflakeArgs:
|
|
6816
7072
|
:param pulumi.Input[str] name: Name of the database connection.
|
6817
7073
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
6818
7074
|
connection.
|
6819
|
-
:param pulumi.Input[str] connection_url:
|
7075
|
+
:param pulumi.Input[str] connection_url: Specifies the Redshift DSN.
|
7076
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
6820
7077
|
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6821
7078
|
|
6822
7079
|
Supported list of database secrets engines that can be configured:
|
6823
|
-
:param pulumi.Input[int] max_connection_lifetime:
|
6824
|
-
:param pulumi.Input[int] max_idle_connections:
|
6825
|
-
|
6826
|
-
:param pulumi.Input[
|
7080
|
+
:param pulumi.Input[int] max_connection_lifetime: The maximum amount of time a connection may be reused.
|
7081
|
+
:param pulumi.Input[int] max_idle_connections: The maximum number of idle connections to
|
7082
|
+
the database.
|
7083
|
+
:param pulumi.Input[int] max_open_connections: The maximum number of open connections to
|
7084
|
+
the database.
|
7085
|
+
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
6827
7086
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
6828
7087
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
6829
|
-
:param pulumi.Input[str] username: The root credential username used in the connection URL
|
6830
|
-
:param pulumi.Input[str] username_template:
|
7088
|
+
:param pulumi.Input[str] username: The root credential username used in the connection URL.
|
7089
|
+
:param pulumi.Input[str] username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
6831
7090
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
6832
7091
|
initial configuration or not.
|
6833
7092
|
"""
|
@@ -6886,7 +7145,8 @@ class SecretsMountSnowflakeArgs:
|
|
6886
7145
|
@pulumi.getter(name="connectionUrl")
|
6887
7146
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
6888
7147
|
"""
|
6889
|
-
|
7148
|
+
Specifies the Redshift DSN.
|
7149
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
6890
7150
|
"""
|
6891
7151
|
return pulumi.get(self, "connection_url")
|
6892
7152
|
|
@@ -6912,7 +7172,7 @@ class SecretsMountSnowflakeArgs:
|
|
6912
7172
|
@pulumi.getter(name="maxConnectionLifetime")
|
6913
7173
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
6914
7174
|
"""
|
6915
|
-
|
7175
|
+
The maximum amount of time a connection may be reused.
|
6916
7176
|
"""
|
6917
7177
|
return pulumi.get(self, "max_connection_lifetime")
|
6918
7178
|
|
@@ -6924,7 +7184,8 @@ class SecretsMountSnowflakeArgs:
|
|
6924
7184
|
@pulumi.getter(name="maxIdleConnections")
|
6925
7185
|
def max_idle_connections(self) -> Optional[pulumi.Input[int]]:
|
6926
7186
|
"""
|
6927
|
-
|
7187
|
+
The maximum number of idle connections to
|
7188
|
+
the database.
|
6928
7189
|
"""
|
6929
7190
|
return pulumi.get(self, "max_idle_connections")
|
6930
7191
|
|
@@ -6936,7 +7197,8 @@ class SecretsMountSnowflakeArgs:
|
|
6936
7197
|
@pulumi.getter(name="maxOpenConnections")
|
6937
7198
|
def max_open_connections(self) -> Optional[pulumi.Input[int]]:
|
6938
7199
|
"""
|
6939
|
-
|
7200
|
+
The maximum number of open connections to
|
7201
|
+
the database.
|
6940
7202
|
"""
|
6941
7203
|
return pulumi.get(self, "max_open_connections")
|
6942
7204
|
|
@@ -6948,7 +7210,7 @@ class SecretsMountSnowflakeArgs:
|
|
6948
7210
|
@pulumi.getter
|
6949
7211
|
def password(self) -> Optional[pulumi.Input[str]]:
|
6950
7212
|
"""
|
6951
|
-
The root credential password used in the connection URL
|
7213
|
+
The root credential password used in the connection URL.
|
6952
7214
|
"""
|
6953
7215
|
return pulumi.get(self, "password")
|
6954
7216
|
|
@@ -6984,7 +7246,7 @@ class SecretsMountSnowflakeArgs:
|
|
6984
7246
|
@pulumi.getter
|
6985
7247
|
def username(self) -> Optional[pulumi.Input[str]]:
|
6986
7248
|
"""
|
6987
|
-
The root credential username used in the connection URL
|
7249
|
+
The root credential username used in the connection URL.
|
6988
7250
|
"""
|
6989
7251
|
return pulumi.get(self, "username")
|
6990
7252
|
|
@@ -6996,7 +7258,7 @@ class SecretsMountSnowflakeArgs:
|
|
6996
7258
|
@pulumi.getter(name="usernameTemplate")
|
6997
7259
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
6998
7260
|
"""
|
6999
|
-
|
7261
|
+
[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
7000
7262
|
"""
|
7001
7263
|
return pulumi.get(self, "username_template")
|
7002
7264
|
|