pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -26
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/auth_backend.py +0 -47
- pulumi_vault/aws/auth_backend_client.py +17 -253
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -56
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -139
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +22 -217
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -286
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +18 -226
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +9 -275
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +225 -91
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -288
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -286
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -350
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -459
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/__init__.py +0 -2
- pulumi_vault/pkisecret/_inputs.py +0 -30
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/outputs.py +0 -54
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -53
- pulumi_vault/quota_rate_limit.py +4 -49
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -94
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_config_est.py +0 -614
- pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
- pulumi_vault/plugin.py +0 -590
- pulumi_vault/plugin_pinned_version.py +0 -293
- pulumi_vault-6.2.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
pulumi_vault/database/outputs.py
CHANGED
@@ -87,16 +87,20 @@ class SecretBackendConnectionCassandra(dict):
|
|
87
87
|
tls: Optional[bool] = None,
|
88
88
|
username: Optional[str] = None):
|
89
89
|
"""
|
90
|
-
:param int connect_timeout: The number of seconds to use as a connection
|
91
|
-
|
92
|
-
:param
|
93
|
-
:param
|
94
|
-
|
95
|
-
:param str
|
96
|
-
:param
|
90
|
+
:param int connect_timeout: The number of seconds to use as a connection
|
91
|
+
timeout.
|
92
|
+
:param Sequence[str] hosts: The hosts to connect to.
|
93
|
+
:param bool insecure_tls: Whether to skip verification of the server
|
94
|
+
certificate when using TLS.
|
95
|
+
:param str password: The password to authenticate with.
|
96
|
+
:param str pem_bundle: Concatenated PEM blocks configuring the certificate
|
97
|
+
chain.
|
98
|
+
:param str pem_json: A JSON structure configuring the certificate chain.
|
99
|
+
:param int port: The default port to connect to if no port is specified as
|
100
|
+
part of the host.
|
97
101
|
:param int protocol_version: The CQL protocol version to use.
|
98
102
|
:param bool tls: Whether to use TLS when connecting to Cassandra.
|
99
|
-
:param str username: The username to
|
103
|
+
:param str username: The username to authenticate with.
|
100
104
|
"""
|
101
105
|
if connect_timeout is not None:
|
102
106
|
pulumi.set(__self__, "connect_timeout", connect_timeout)
|
@@ -123,7 +127,8 @@ class SecretBackendConnectionCassandra(dict):
|
|
123
127
|
@pulumi.getter(name="connectTimeout")
|
124
128
|
def connect_timeout(self) -> Optional[int]:
|
125
129
|
"""
|
126
|
-
The number of seconds to use as a connection
|
130
|
+
The number of seconds to use as a connection
|
131
|
+
timeout.
|
127
132
|
"""
|
128
133
|
return pulumi.get(self, "connect_timeout")
|
129
134
|
|
@@ -131,7 +136,7 @@ class SecretBackendConnectionCassandra(dict):
|
|
131
136
|
@pulumi.getter
|
132
137
|
def hosts(self) -> Optional[Sequence[str]]:
|
133
138
|
"""
|
134
|
-
|
139
|
+
The hosts to connect to.
|
135
140
|
"""
|
136
141
|
return pulumi.get(self, "hosts")
|
137
142
|
|
@@ -139,7 +144,8 @@ class SecretBackendConnectionCassandra(dict):
|
|
139
144
|
@pulumi.getter(name="insecureTls")
|
140
145
|
def insecure_tls(self) -> Optional[bool]:
|
141
146
|
"""
|
142
|
-
Whether to skip verification of the server
|
147
|
+
Whether to skip verification of the server
|
148
|
+
certificate when using TLS.
|
143
149
|
"""
|
144
150
|
return pulumi.get(self, "insecure_tls")
|
145
151
|
|
@@ -147,7 +153,7 @@ class SecretBackendConnectionCassandra(dict):
|
|
147
153
|
@pulumi.getter
|
148
154
|
def password(self) -> Optional[str]:
|
149
155
|
"""
|
150
|
-
The password to
|
156
|
+
The password to authenticate with.
|
151
157
|
"""
|
152
158
|
return pulumi.get(self, "password")
|
153
159
|
|
@@ -155,7 +161,8 @@ class SecretBackendConnectionCassandra(dict):
|
|
155
161
|
@pulumi.getter(name="pemBundle")
|
156
162
|
def pem_bundle(self) -> Optional[str]:
|
157
163
|
"""
|
158
|
-
Concatenated PEM blocks
|
164
|
+
Concatenated PEM blocks configuring the certificate
|
165
|
+
chain.
|
159
166
|
"""
|
160
167
|
return pulumi.get(self, "pem_bundle")
|
161
168
|
|
@@ -163,7 +170,7 @@ class SecretBackendConnectionCassandra(dict):
|
|
163
170
|
@pulumi.getter(name="pemJson")
|
164
171
|
def pem_json(self) -> Optional[str]:
|
165
172
|
"""
|
166
|
-
|
173
|
+
A JSON structure configuring the certificate chain.
|
167
174
|
"""
|
168
175
|
return pulumi.get(self, "pem_json")
|
169
176
|
|
@@ -171,7 +178,8 @@ class SecretBackendConnectionCassandra(dict):
|
|
171
178
|
@pulumi.getter
|
172
179
|
def port(self) -> Optional[int]:
|
173
180
|
"""
|
174
|
-
The
|
181
|
+
The default port to connect to if no port is specified as
|
182
|
+
part of the host.
|
175
183
|
"""
|
176
184
|
return pulumi.get(self, "port")
|
177
185
|
|
@@ -195,7 +203,7 @@ class SecretBackendConnectionCassandra(dict):
|
|
195
203
|
@pulumi.getter
|
196
204
|
def username(self) -> Optional[str]:
|
197
205
|
"""
|
198
|
-
The username to
|
206
|
+
The username to authenticate with.
|
199
207
|
"""
|
200
208
|
return pulumi.get(self, "username")
|
201
209
|
|
@@ -235,13 +243,14 @@ class SecretBackendConnectionCouchbase(dict):
|
|
235
243
|
tls: Optional[bool] = None,
|
236
244
|
username_template: Optional[str] = None):
|
237
245
|
"""
|
238
|
-
:param Sequence[str] hosts:
|
239
|
-
:param str password:
|
240
|
-
:param str username:
|
246
|
+
:param Sequence[str] hosts: The hosts to connect to.
|
247
|
+
:param str password: The password to authenticate with.
|
248
|
+
:param str username: The username to authenticate with.
|
241
249
|
:param str base64_pem: Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
|
242
250
|
:param str bucket_name: Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
|
243
|
-
:param bool insecure_tls:
|
244
|
-
|
251
|
+
:param bool insecure_tls: Whether to skip verification of the server
|
252
|
+
certificate when using TLS.
|
253
|
+
:param bool tls: Whether to use TLS when connecting to Cassandra.
|
245
254
|
:param str username_template: Template describing how dynamic usernames are generated.
|
246
255
|
"""
|
247
256
|
pulumi.set(__self__, "hosts", hosts)
|
@@ -262,7 +271,7 @@ class SecretBackendConnectionCouchbase(dict):
|
|
262
271
|
@pulumi.getter
|
263
272
|
def hosts(self) -> Sequence[str]:
|
264
273
|
"""
|
265
|
-
|
274
|
+
The hosts to connect to.
|
266
275
|
"""
|
267
276
|
return pulumi.get(self, "hosts")
|
268
277
|
|
@@ -270,7 +279,7 @@ class SecretBackendConnectionCouchbase(dict):
|
|
270
279
|
@pulumi.getter
|
271
280
|
def password(self) -> str:
|
272
281
|
"""
|
273
|
-
|
282
|
+
The password to authenticate with.
|
274
283
|
"""
|
275
284
|
return pulumi.get(self, "password")
|
276
285
|
|
@@ -278,7 +287,7 @@ class SecretBackendConnectionCouchbase(dict):
|
|
278
287
|
@pulumi.getter
|
279
288
|
def username(self) -> str:
|
280
289
|
"""
|
281
|
-
|
290
|
+
The username to authenticate with.
|
282
291
|
"""
|
283
292
|
return pulumi.get(self, "username")
|
284
293
|
|
@@ -302,7 +311,8 @@ class SecretBackendConnectionCouchbase(dict):
|
|
302
311
|
@pulumi.getter(name="insecureTls")
|
303
312
|
def insecure_tls(self) -> Optional[bool]:
|
304
313
|
"""
|
305
|
-
|
314
|
+
Whether to skip verification of the server
|
315
|
+
certificate when using TLS.
|
306
316
|
"""
|
307
317
|
return pulumi.get(self, "insecure_tls")
|
308
318
|
|
@@ -310,7 +320,7 @@ class SecretBackendConnectionCouchbase(dict):
|
|
310
320
|
@pulumi.getter
|
311
321
|
def tls(self) -> Optional[bool]:
|
312
322
|
"""
|
313
|
-
|
323
|
+
Whether to use TLS when connecting to Cassandra.
|
314
324
|
"""
|
315
325
|
return pulumi.get(self, "tls")
|
316
326
|
|
@@ -364,15 +374,16 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
364
374
|
tls_server_name: Optional[str] = None,
|
365
375
|
username_template: Optional[str] = None):
|
366
376
|
"""
|
367
|
-
:param str password: The password to
|
368
|
-
:param str url: The URL for Elasticsearch's API
|
369
|
-
|
370
|
-
:param str
|
371
|
-
:param str
|
372
|
-
:param str
|
373
|
-
:param str
|
374
|
-
:param
|
375
|
-
:param
|
377
|
+
:param str password: The password to authenticate with.
|
378
|
+
:param str url: The URL for Elasticsearch's API. https requires certificate
|
379
|
+
by trusted CA if used.
|
380
|
+
:param str username: The username to authenticate with.
|
381
|
+
:param str ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
|
382
|
+
:param str ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
|
383
|
+
:param str client_cert: The path to the certificate for the Elasticsearch client to present for communication.
|
384
|
+
:param str client_key: The path to the key for the Elasticsearch client to use for communication.
|
385
|
+
:param bool insecure: Whether to disable certificate verification.
|
386
|
+
:param str tls_server_name: This, if set, is used to set the SNI host when connecting via TLS.
|
376
387
|
:param str username_template: Template describing how dynamic usernames are generated.
|
377
388
|
"""
|
378
389
|
pulumi.set(__self__, "password", password)
|
@@ -397,7 +408,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
397
408
|
@pulumi.getter
|
398
409
|
def password(self) -> str:
|
399
410
|
"""
|
400
|
-
The password to
|
411
|
+
The password to authenticate with.
|
401
412
|
"""
|
402
413
|
return pulumi.get(self, "password")
|
403
414
|
|
@@ -405,7 +416,8 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
405
416
|
@pulumi.getter
|
406
417
|
def url(self) -> str:
|
407
418
|
"""
|
408
|
-
The URL for Elasticsearch's API
|
419
|
+
The URL for Elasticsearch's API. https requires certificate
|
420
|
+
by trusted CA if used.
|
409
421
|
"""
|
410
422
|
return pulumi.get(self, "url")
|
411
423
|
|
@@ -413,7 +425,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
413
425
|
@pulumi.getter
|
414
426
|
def username(self) -> str:
|
415
427
|
"""
|
416
|
-
The username to
|
428
|
+
The username to authenticate with.
|
417
429
|
"""
|
418
430
|
return pulumi.get(self, "username")
|
419
431
|
|
@@ -421,7 +433,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
421
433
|
@pulumi.getter(name="caCert")
|
422
434
|
def ca_cert(self) -> Optional[str]:
|
423
435
|
"""
|
424
|
-
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
436
|
+
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
|
425
437
|
"""
|
426
438
|
return pulumi.get(self, "ca_cert")
|
427
439
|
|
@@ -429,7 +441,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
429
441
|
@pulumi.getter(name="caPath")
|
430
442
|
def ca_path(self) -> Optional[str]:
|
431
443
|
"""
|
432
|
-
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
444
|
+
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
|
433
445
|
"""
|
434
446
|
return pulumi.get(self, "ca_path")
|
435
447
|
|
@@ -437,7 +449,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
437
449
|
@pulumi.getter(name="clientCert")
|
438
450
|
def client_cert(self) -> Optional[str]:
|
439
451
|
"""
|
440
|
-
The path to the certificate for the Elasticsearch client to present for communication
|
452
|
+
The path to the certificate for the Elasticsearch client to present for communication.
|
441
453
|
"""
|
442
454
|
return pulumi.get(self, "client_cert")
|
443
455
|
|
@@ -445,7 +457,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
445
457
|
@pulumi.getter(name="clientKey")
|
446
458
|
def client_key(self) -> Optional[str]:
|
447
459
|
"""
|
448
|
-
The path to the key for the Elasticsearch client to use for communication
|
460
|
+
The path to the key for the Elasticsearch client to use for communication.
|
449
461
|
"""
|
450
462
|
return pulumi.get(self, "client_key")
|
451
463
|
|
@@ -453,7 +465,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
453
465
|
@pulumi.getter
|
454
466
|
def insecure(self) -> Optional[bool]:
|
455
467
|
"""
|
456
|
-
Whether to disable certificate verification
|
468
|
+
Whether to disable certificate verification.
|
457
469
|
"""
|
458
470
|
return pulumi.get(self, "insecure")
|
459
471
|
|
@@ -461,7 +473,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
461
473
|
@pulumi.getter(name="tlsServerName")
|
462
474
|
def tls_server_name(self) -> Optional[str]:
|
463
475
|
"""
|
464
|
-
This, if set, is used to set the SNI host when connecting via TLS
|
476
|
+
This, if set, is used to set the SNI host when connecting via TLS.
|
465
477
|
"""
|
466
478
|
return pulumi.get(self, "tls_server_name")
|
467
479
|
|
@@ -510,13 +522,19 @@ class SecretBackendConnectionHana(dict):
|
|
510
522
|
password: Optional[str] = None,
|
511
523
|
username: Optional[str] = None):
|
512
524
|
"""
|
513
|
-
:param str connection_url:
|
514
|
-
|
515
|
-
|
516
|
-
|
517
|
-
:param
|
518
|
-
:param
|
519
|
-
|
525
|
+
:param str connection_url: A URL containing connection information. See
|
526
|
+
the [Vault
|
527
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
528
|
+
for an example.
|
529
|
+
:param bool disable_escaping: Disable special character escaping in username and password.
|
530
|
+
:param int max_connection_lifetime: The maximum number of seconds to keep
|
531
|
+
a connection alive for.
|
532
|
+
:param int max_idle_connections: The maximum number of idle connections to
|
533
|
+
maintain.
|
534
|
+
:param int max_open_connections: The maximum number of open connections to
|
535
|
+
use.
|
536
|
+
:param str password: The password to authenticate with.
|
537
|
+
:param str username: The username to authenticate with.
|
520
538
|
"""
|
521
539
|
if connection_url is not None:
|
522
540
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -537,7 +555,10 @@ class SecretBackendConnectionHana(dict):
|
|
537
555
|
@pulumi.getter(name="connectionUrl")
|
538
556
|
def connection_url(self) -> Optional[str]:
|
539
557
|
"""
|
540
|
-
|
558
|
+
A URL containing connection information. See
|
559
|
+
the [Vault
|
560
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
561
|
+
for an example.
|
541
562
|
"""
|
542
563
|
return pulumi.get(self, "connection_url")
|
543
564
|
|
@@ -545,7 +566,7 @@ class SecretBackendConnectionHana(dict):
|
|
545
566
|
@pulumi.getter(name="disableEscaping")
|
546
567
|
def disable_escaping(self) -> Optional[bool]:
|
547
568
|
"""
|
548
|
-
Disable special character escaping in username and password
|
569
|
+
Disable special character escaping in username and password.
|
549
570
|
"""
|
550
571
|
return pulumi.get(self, "disable_escaping")
|
551
572
|
|
@@ -553,7 +574,8 @@ class SecretBackendConnectionHana(dict):
|
|
553
574
|
@pulumi.getter(name="maxConnectionLifetime")
|
554
575
|
def max_connection_lifetime(self) -> Optional[int]:
|
555
576
|
"""
|
556
|
-
|
577
|
+
The maximum number of seconds to keep
|
578
|
+
a connection alive for.
|
557
579
|
"""
|
558
580
|
return pulumi.get(self, "max_connection_lifetime")
|
559
581
|
|
@@ -561,7 +583,8 @@ class SecretBackendConnectionHana(dict):
|
|
561
583
|
@pulumi.getter(name="maxIdleConnections")
|
562
584
|
def max_idle_connections(self) -> Optional[int]:
|
563
585
|
"""
|
564
|
-
|
586
|
+
The maximum number of idle connections to
|
587
|
+
maintain.
|
565
588
|
"""
|
566
589
|
return pulumi.get(self, "max_idle_connections")
|
567
590
|
|
@@ -569,7 +592,8 @@ class SecretBackendConnectionHana(dict):
|
|
569
592
|
@pulumi.getter(name="maxOpenConnections")
|
570
593
|
def max_open_connections(self) -> Optional[int]:
|
571
594
|
"""
|
572
|
-
|
595
|
+
The maximum number of open connections to
|
596
|
+
use.
|
573
597
|
"""
|
574
598
|
return pulumi.get(self, "max_open_connections")
|
575
599
|
|
@@ -577,7 +601,7 @@ class SecretBackendConnectionHana(dict):
|
|
577
601
|
@pulumi.getter
|
578
602
|
def password(self) -> Optional[str]:
|
579
603
|
"""
|
580
|
-
The
|
604
|
+
The password to authenticate with.
|
581
605
|
"""
|
582
606
|
return pulumi.get(self, "password")
|
583
607
|
|
@@ -585,7 +609,7 @@ class SecretBackendConnectionHana(dict):
|
|
585
609
|
@pulumi.getter
|
586
610
|
def username(self) -> Optional[str]:
|
587
611
|
"""
|
588
|
-
The
|
612
|
+
The username to authenticate with.
|
589
613
|
"""
|
590
614
|
return pulumi.get(self, "username")
|
591
615
|
|
@@ -629,15 +653,19 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
629
653
|
tls: Optional[bool] = None,
|
630
654
|
username_template: Optional[str] = None):
|
631
655
|
"""
|
632
|
-
:param str host:
|
633
|
-
:param str password:
|
634
|
-
:param str username:
|
635
|
-
:param int connect_timeout: The number of seconds to use as a connection
|
636
|
-
|
637
|
-
:param
|
638
|
-
|
639
|
-
:param
|
640
|
-
|
656
|
+
:param str host: The host to connect to.
|
657
|
+
:param str password: The password to authenticate with.
|
658
|
+
:param str username: The username to authenticate with.
|
659
|
+
:param int connect_timeout: The number of seconds to use as a connection
|
660
|
+
timeout.
|
661
|
+
:param bool insecure_tls: Whether to skip verification of the server
|
662
|
+
certificate when using TLS.
|
663
|
+
:param str pem_bundle: Concatenated PEM blocks configuring the certificate
|
664
|
+
chain.
|
665
|
+
:param str pem_json: A JSON structure configuring the certificate chain.
|
666
|
+
:param int port: The default port to connect to if no port is specified as
|
667
|
+
part of the host.
|
668
|
+
:param bool tls: Whether to use TLS when connecting to Cassandra.
|
641
669
|
:param str username_template: Template describing how dynamic usernames are generated.
|
642
670
|
"""
|
643
671
|
pulumi.set(__self__, "host", host)
|
@@ -662,7 +690,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
662
690
|
@pulumi.getter
|
663
691
|
def host(self) -> str:
|
664
692
|
"""
|
665
|
-
|
693
|
+
The host to connect to.
|
666
694
|
"""
|
667
695
|
return pulumi.get(self, "host")
|
668
696
|
|
@@ -670,7 +698,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
670
698
|
@pulumi.getter
|
671
699
|
def password(self) -> str:
|
672
700
|
"""
|
673
|
-
|
701
|
+
The password to authenticate with.
|
674
702
|
"""
|
675
703
|
return pulumi.get(self, "password")
|
676
704
|
|
@@ -678,7 +706,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
678
706
|
@pulumi.getter
|
679
707
|
def username(self) -> str:
|
680
708
|
"""
|
681
|
-
|
709
|
+
The username to authenticate with.
|
682
710
|
"""
|
683
711
|
return pulumi.get(self, "username")
|
684
712
|
|
@@ -686,7 +714,8 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
686
714
|
@pulumi.getter(name="connectTimeout")
|
687
715
|
def connect_timeout(self) -> Optional[int]:
|
688
716
|
"""
|
689
|
-
The number of seconds to use as a connection
|
717
|
+
The number of seconds to use as a connection
|
718
|
+
timeout.
|
690
719
|
"""
|
691
720
|
return pulumi.get(self, "connect_timeout")
|
692
721
|
|
@@ -694,7 +723,8 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
694
723
|
@pulumi.getter(name="insecureTls")
|
695
724
|
def insecure_tls(self) -> Optional[bool]:
|
696
725
|
"""
|
697
|
-
Whether to skip verification of the server
|
726
|
+
Whether to skip verification of the server
|
727
|
+
certificate when using TLS.
|
698
728
|
"""
|
699
729
|
return pulumi.get(self, "insecure_tls")
|
700
730
|
|
@@ -702,7 +732,8 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
702
732
|
@pulumi.getter(name="pemBundle")
|
703
733
|
def pem_bundle(self) -> Optional[str]:
|
704
734
|
"""
|
705
|
-
Concatenated PEM blocks
|
735
|
+
Concatenated PEM blocks configuring the certificate
|
736
|
+
chain.
|
706
737
|
"""
|
707
738
|
return pulumi.get(self, "pem_bundle")
|
708
739
|
|
@@ -710,7 +741,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
710
741
|
@pulumi.getter(name="pemJson")
|
711
742
|
def pem_json(self) -> Optional[str]:
|
712
743
|
"""
|
713
|
-
|
744
|
+
A JSON structure configuring the certificate chain.
|
714
745
|
"""
|
715
746
|
return pulumi.get(self, "pem_json")
|
716
747
|
|
@@ -718,7 +749,8 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
718
749
|
@pulumi.getter
|
719
750
|
def port(self) -> Optional[int]:
|
720
751
|
"""
|
721
|
-
The
|
752
|
+
The default port to connect to if no port is specified as
|
753
|
+
part of the host.
|
722
754
|
"""
|
723
755
|
return pulumi.get(self, "port")
|
724
756
|
|
@@ -726,7 +758,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
726
758
|
@pulumi.getter
|
727
759
|
def tls(self) -> Optional[bool]:
|
728
760
|
"""
|
729
|
-
Whether to use TLS when connecting to
|
761
|
+
Whether to use TLS when connecting to Cassandra.
|
730
762
|
"""
|
731
763
|
return pulumi.get(self, "tls")
|
732
764
|
|
@@ -775,13 +807,19 @@ class SecretBackendConnectionMongodb(dict):
|
|
775
807
|
username: Optional[str] = None,
|
776
808
|
username_template: Optional[str] = None):
|
777
809
|
"""
|
778
|
-
:param str connection_url:
|
779
|
-
|
780
|
-
|
781
|
-
|
782
|
-
:param
|
783
|
-
|
784
|
-
:param
|
810
|
+
:param str connection_url: A URL containing connection information. See
|
811
|
+
the [Vault
|
812
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
813
|
+
for an example.
|
814
|
+
:param int max_connection_lifetime: The maximum number of seconds to keep
|
815
|
+
a connection alive for.
|
816
|
+
:param int max_idle_connections: The maximum number of idle connections to
|
817
|
+
maintain.
|
818
|
+
:param int max_open_connections: The maximum number of open connections to
|
819
|
+
use.
|
820
|
+
:param str password: The password to authenticate with.
|
821
|
+
:param str username: The username to authenticate with.
|
822
|
+
:param str username_template: Template describing how dynamic usernames are generated.
|
785
823
|
"""
|
786
824
|
if connection_url is not None:
|
787
825
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -802,7 +840,10 @@ class SecretBackendConnectionMongodb(dict):
|
|
802
840
|
@pulumi.getter(name="connectionUrl")
|
803
841
|
def connection_url(self) -> Optional[str]:
|
804
842
|
"""
|
805
|
-
|
843
|
+
A URL containing connection information. See
|
844
|
+
the [Vault
|
845
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
846
|
+
for an example.
|
806
847
|
"""
|
807
848
|
return pulumi.get(self, "connection_url")
|
808
849
|
|
@@ -810,7 +851,8 @@ class SecretBackendConnectionMongodb(dict):
|
|
810
851
|
@pulumi.getter(name="maxConnectionLifetime")
|
811
852
|
def max_connection_lifetime(self) -> Optional[int]:
|
812
853
|
"""
|
813
|
-
|
854
|
+
The maximum number of seconds to keep
|
855
|
+
a connection alive for.
|
814
856
|
"""
|
815
857
|
return pulumi.get(self, "max_connection_lifetime")
|
816
858
|
|
@@ -818,7 +860,8 @@ class SecretBackendConnectionMongodb(dict):
|
|
818
860
|
@pulumi.getter(name="maxIdleConnections")
|
819
861
|
def max_idle_connections(self) -> Optional[int]:
|
820
862
|
"""
|
821
|
-
|
863
|
+
The maximum number of idle connections to
|
864
|
+
maintain.
|
822
865
|
"""
|
823
866
|
return pulumi.get(self, "max_idle_connections")
|
824
867
|
|
@@ -826,7 +869,8 @@ class SecretBackendConnectionMongodb(dict):
|
|
826
869
|
@pulumi.getter(name="maxOpenConnections")
|
827
870
|
def max_open_connections(self) -> Optional[int]:
|
828
871
|
"""
|
829
|
-
|
872
|
+
The maximum number of open connections to
|
873
|
+
use.
|
830
874
|
"""
|
831
875
|
return pulumi.get(self, "max_open_connections")
|
832
876
|
|
@@ -834,7 +878,7 @@ class SecretBackendConnectionMongodb(dict):
|
|
834
878
|
@pulumi.getter
|
835
879
|
def password(self) -> Optional[str]:
|
836
880
|
"""
|
837
|
-
The
|
881
|
+
The password to authenticate with.
|
838
882
|
"""
|
839
883
|
return pulumi.get(self, "password")
|
840
884
|
|
@@ -842,7 +886,7 @@ class SecretBackendConnectionMongodb(dict):
|
|
842
886
|
@pulumi.getter
|
843
887
|
def username(self) -> Optional[str]:
|
844
888
|
"""
|
845
|
-
The
|
889
|
+
The username to authenticate with.
|
846
890
|
"""
|
847
891
|
return pulumi.get(self, "username")
|
848
892
|
|
@@ -850,7 +894,7 @@ class SecretBackendConnectionMongodb(dict):
|
|
850
894
|
@pulumi.getter(name="usernameTemplate")
|
851
895
|
def username_template(self) -> Optional[str]:
|
852
896
|
"""
|
853
|
-
|
897
|
+
Template describing how dynamic usernames are generated.
|
854
898
|
"""
|
855
899
|
return pulumi.get(self, "username_template")
|
856
900
|
|
@@ -958,15 +1002,24 @@ class SecretBackendConnectionMssql(dict):
|
|
958
1002
|
username: Optional[str] = None,
|
959
1003
|
username_template: Optional[str] = None):
|
960
1004
|
"""
|
961
|
-
:param str connection_url:
|
962
|
-
|
963
|
-
|
964
|
-
|
965
|
-
:param
|
966
|
-
|
967
|
-
|
968
|
-
|
969
|
-
:param
|
1005
|
+
:param str connection_url: A URL containing connection information. See
|
1006
|
+
the [Vault
|
1007
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1008
|
+
for an example.
|
1009
|
+
:param bool contained_db: For Vault v1.9+. Set to true when the target is a
|
1010
|
+
Contained Database, e.g. AzureSQL.
|
1011
|
+
See the [Vault
|
1012
|
+
docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
|
1013
|
+
:param bool disable_escaping: Disable special character escaping in username and password.
|
1014
|
+
:param int max_connection_lifetime: The maximum number of seconds to keep
|
1015
|
+
a connection alive for.
|
1016
|
+
:param int max_idle_connections: The maximum number of idle connections to
|
1017
|
+
maintain.
|
1018
|
+
:param int max_open_connections: The maximum number of open connections to
|
1019
|
+
use.
|
1020
|
+
:param str password: The password to authenticate with.
|
1021
|
+
:param str username: The username to authenticate with.
|
1022
|
+
:param str username_template: Template describing how dynamic usernames are generated.
|
970
1023
|
"""
|
971
1024
|
if connection_url is not None:
|
972
1025
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -991,7 +1044,10 @@ class SecretBackendConnectionMssql(dict):
|
|
991
1044
|
@pulumi.getter(name="connectionUrl")
|
992
1045
|
def connection_url(self) -> Optional[str]:
|
993
1046
|
"""
|
994
|
-
|
1047
|
+
A URL containing connection information. See
|
1048
|
+
the [Vault
|
1049
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1050
|
+
for an example.
|
995
1051
|
"""
|
996
1052
|
return pulumi.get(self, "connection_url")
|
997
1053
|
|
@@ -999,7 +1055,10 @@ class SecretBackendConnectionMssql(dict):
|
|
999
1055
|
@pulumi.getter(name="containedDb")
|
1000
1056
|
def contained_db(self) -> Optional[bool]:
|
1001
1057
|
"""
|
1002
|
-
Set to true when the target is a
|
1058
|
+
For Vault v1.9+. Set to true when the target is a
|
1059
|
+
Contained Database, e.g. AzureSQL.
|
1060
|
+
See the [Vault
|
1061
|
+
docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
|
1003
1062
|
"""
|
1004
1063
|
return pulumi.get(self, "contained_db")
|
1005
1064
|
|
@@ -1007,7 +1066,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1007
1066
|
@pulumi.getter(name="disableEscaping")
|
1008
1067
|
def disable_escaping(self) -> Optional[bool]:
|
1009
1068
|
"""
|
1010
|
-
Disable special character escaping in username and password
|
1069
|
+
Disable special character escaping in username and password.
|
1011
1070
|
"""
|
1012
1071
|
return pulumi.get(self, "disable_escaping")
|
1013
1072
|
|
@@ -1015,7 +1074,8 @@ class SecretBackendConnectionMssql(dict):
|
|
1015
1074
|
@pulumi.getter(name="maxConnectionLifetime")
|
1016
1075
|
def max_connection_lifetime(self) -> Optional[int]:
|
1017
1076
|
"""
|
1018
|
-
|
1077
|
+
The maximum number of seconds to keep
|
1078
|
+
a connection alive for.
|
1019
1079
|
"""
|
1020
1080
|
return pulumi.get(self, "max_connection_lifetime")
|
1021
1081
|
|
@@ -1023,7 +1083,8 @@ class SecretBackendConnectionMssql(dict):
|
|
1023
1083
|
@pulumi.getter(name="maxIdleConnections")
|
1024
1084
|
def max_idle_connections(self) -> Optional[int]:
|
1025
1085
|
"""
|
1026
|
-
|
1086
|
+
The maximum number of idle connections to
|
1087
|
+
maintain.
|
1027
1088
|
"""
|
1028
1089
|
return pulumi.get(self, "max_idle_connections")
|
1029
1090
|
|
@@ -1031,7 +1092,8 @@ class SecretBackendConnectionMssql(dict):
|
|
1031
1092
|
@pulumi.getter(name="maxOpenConnections")
|
1032
1093
|
def max_open_connections(self) -> Optional[int]:
|
1033
1094
|
"""
|
1034
|
-
|
1095
|
+
The maximum number of open connections to
|
1096
|
+
use.
|
1035
1097
|
"""
|
1036
1098
|
return pulumi.get(self, "max_open_connections")
|
1037
1099
|
|
@@ -1039,7 +1101,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1039
1101
|
@pulumi.getter
|
1040
1102
|
def password(self) -> Optional[str]:
|
1041
1103
|
"""
|
1042
|
-
The
|
1104
|
+
The password to authenticate with.
|
1043
1105
|
"""
|
1044
1106
|
return pulumi.get(self, "password")
|
1045
1107
|
|
@@ -1047,7 +1109,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1047
1109
|
@pulumi.getter
|
1048
1110
|
def username(self) -> Optional[str]:
|
1049
1111
|
"""
|
1050
|
-
The
|
1112
|
+
The username to authenticate with.
|
1051
1113
|
"""
|
1052
1114
|
return pulumi.get(self, "username")
|
1053
1115
|
|
@@ -1055,7 +1117,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1055
1117
|
@pulumi.getter(name="usernameTemplate")
|
1056
1118
|
def username_template(self) -> Optional[str]:
|
1057
1119
|
"""
|
1058
|
-
|
1120
|
+
Template describing how dynamic usernames are generated.
|
1059
1121
|
"""
|
1060
1122
|
return pulumi.get(self, "username_template")
|
1061
1123
|
|
@@ -1108,17 +1170,23 @@ class SecretBackendConnectionMysql(dict):
|
|
1108
1170
|
username: Optional[str] = None,
|
1109
1171
|
username_template: Optional[str] = None):
|
1110
1172
|
"""
|
1111
|
-
:param str auth_type:
|
1112
|
-
:param str connection_url:
|
1113
|
-
|
1114
|
-
|
1115
|
-
|
1116
|
-
:param
|
1117
|
-
|
1173
|
+
:param str auth_type: Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
1174
|
+
:param str connection_url: A URL containing connection information. See
|
1175
|
+
the [Vault
|
1176
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1177
|
+
for an example.
|
1178
|
+
:param int max_connection_lifetime: The maximum number of seconds to keep
|
1179
|
+
a connection alive for.
|
1180
|
+
:param int max_idle_connections: The maximum number of idle connections to
|
1181
|
+
maintain.
|
1182
|
+
:param int max_open_connections: The maximum number of open connections to
|
1183
|
+
use.
|
1184
|
+
:param str password: The password to authenticate with.
|
1185
|
+
:param str service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1118
1186
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1119
1187
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1120
|
-
:param str username: The
|
1121
|
-
:param str username_template:
|
1188
|
+
:param str username: The username to authenticate with.
|
1189
|
+
:param str username_template: Template describing how dynamic usernames are generated.
|
1122
1190
|
"""
|
1123
1191
|
if auth_type is not None:
|
1124
1192
|
pulumi.set(__self__, "auth_type", auth_type)
|
@@ -1147,7 +1215,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1147
1215
|
@pulumi.getter(name="authType")
|
1148
1216
|
def auth_type(self) -> Optional[str]:
|
1149
1217
|
"""
|
1150
|
-
|
1218
|
+
Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
1151
1219
|
"""
|
1152
1220
|
return pulumi.get(self, "auth_type")
|
1153
1221
|
|
@@ -1155,7 +1223,10 @@ class SecretBackendConnectionMysql(dict):
|
|
1155
1223
|
@pulumi.getter(name="connectionUrl")
|
1156
1224
|
def connection_url(self) -> Optional[str]:
|
1157
1225
|
"""
|
1158
|
-
|
1226
|
+
A URL containing connection information. See
|
1227
|
+
the [Vault
|
1228
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1229
|
+
for an example.
|
1159
1230
|
"""
|
1160
1231
|
return pulumi.get(self, "connection_url")
|
1161
1232
|
|
@@ -1163,7 +1234,8 @@ class SecretBackendConnectionMysql(dict):
|
|
1163
1234
|
@pulumi.getter(name="maxConnectionLifetime")
|
1164
1235
|
def max_connection_lifetime(self) -> Optional[int]:
|
1165
1236
|
"""
|
1166
|
-
|
1237
|
+
The maximum number of seconds to keep
|
1238
|
+
a connection alive for.
|
1167
1239
|
"""
|
1168
1240
|
return pulumi.get(self, "max_connection_lifetime")
|
1169
1241
|
|
@@ -1171,7 +1243,8 @@ class SecretBackendConnectionMysql(dict):
|
|
1171
1243
|
@pulumi.getter(name="maxIdleConnections")
|
1172
1244
|
def max_idle_connections(self) -> Optional[int]:
|
1173
1245
|
"""
|
1174
|
-
|
1246
|
+
The maximum number of idle connections to
|
1247
|
+
maintain.
|
1175
1248
|
"""
|
1176
1249
|
return pulumi.get(self, "max_idle_connections")
|
1177
1250
|
|
@@ -1179,7 +1252,8 @@ class SecretBackendConnectionMysql(dict):
|
|
1179
1252
|
@pulumi.getter(name="maxOpenConnections")
|
1180
1253
|
def max_open_connections(self) -> Optional[int]:
|
1181
1254
|
"""
|
1182
|
-
|
1255
|
+
The maximum number of open connections to
|
1256
|
+
use.
|
1183
1257
|
"""
|
1184
1258
|
return pulumi.get(self, "max_open_connections")
|
1185
1259
|
|
@@ -1187,7 +1261,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1187
1261
|
@pulumi.getter
|
1188
1262
|
def password(self) -> Optional[str]:
|
1189
1263
|
"""
|
1190
|
-
The
|
1264
|
+
The password to authenticate with.
|
1191
1265
|
"""
|
1192
1266
|
return pulumi.get(self, "password")
|
1193
1267
|
|
@@ -1195,7 +1269,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1195
1269
|
@pulumi.getter(name="serviceAccountJson")
|
1196
1270
|
def service_account_json(self) -> Optional[str]:
|
1197
1271
|
"""
|
1198
|
-
|
1272
|
+
JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1199
1273
|
"""
|
1200
1274
|
return pulumi.get(self, "service_account_json")
|
1201
1275
|
|
@@ -1219,7 +1293,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1219
1293
|
@pulumi.getter
|
1220
1294
|
def username(self) -> Optional[str]:
|
1221
1295
|
"""
|
1222
|
-
The
|
1296
|
+
The username to authenticate with.
|
1223
1297
|
"""
|
1224
1298
|
return pulumi.get(self, "username")
|
1225
1299
|
|
@@ -1227,7 +1301,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1227
1301
|
@pulumi.getter(name="usernameTemplate")
|
1228
1302
|
def username_template(self) -> Optional[str]:
|
1229
1303
|
"""
|
1230
|
-
|
1304
|
+
Template describing how dynamic usernames are generated.
|
1231
1305
|
"""
|
1232
1306
|
return pulumi.get(self, "username_template")
|
1233
1307
|
|
@@ -1280,17 +1354,23 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1280
1354
|
username: Optional[str] = None,
|
1281
1355
|
username_template: Optional[str] = None):
|
1282
1356
|
"""
|
1283
|
-
:param str auth_type:
|
1284
|
-
:param str connection_url:
|
1285
|
-
|
1286
|
-
|
1287
|
-
|
1288
|
-
:param
|
1289
|
-
|
1357
|
+
:param str auth_type: Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
1358
|
+
:param str connection_url: A URL containing connection information. See
|
1359
|
+
the [Vault
|
1360
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1361
|
+
for an example.
|
1362
|
+
:param int max_connection_lifetime: The maximum number of seconds to keep
|
1363
|
+
a connection alive for.
|
1364
|
+
:param int max_idle_connections: The maximum number of idle connections to
|
1365
|
+
maintain.
|
1366
|
+
:param int max_open_connections: The maximum number of open connections to
|
1367
|
+
use.
|
1368
|
+
:param str password: The password to authenticate with.
|
1369
|
+
:param str service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1290
1370
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1291
1371
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1292
|
-
:param str username: The
|
1293
|
-
:param str username_template:
|
1372
|
+
:param str username: The username to authenticate with.
|
1373
|
+
:param str username_template: Template describing how dynamic usernames are generated.
|
1294
1374
|
"""
|
1295
1375
|
if auth_type is not None:
|
1296
1376
|
pulumi.set(__self__, "auth_type", auth_type)
|
@@ -1319,7 +1399,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1319
1399
|
@pulumi.getter(name="authType")
|
1320
1400
|
def auth_type(self) -> Optional[str]:
|
1321
1401
|
"""
|
1322
|
-
|
1402
|
+
Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
1323
1403
|
"""
|
1324
1404
|
return pulumi.get(self, "auth_type")
|
1325
1405
|
|
@@ -1327,7 +1407,10 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1327
1407
|
@pulumi.getter(name="connectionUrl")
|
1328
1408
|
def connection_url(self) -> Optional[str]:
|
1329
1409
|
"""
|
1330
|
-
|
1410
|
+
A URL containing connection information. See
|
1411
|
+
the [Vault
|
1412
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1413
|
+
for an example.
|
1331
1414
|
"""
|
1332
1415
|
return pulumi.get(self, "connection_url")
|
1333
1416
|
|
@@ -1335,7 +1418,8 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1335
1418
|
@pulumi.getter(name="maxConnectionLifetime")
|
1336
1419
|
def max_connection_lifetime(self) -> Optional[int]:
|
1337
1420
|
"""
|
1338
|
-
|
1421
|
+
The maximum number of seconds to keep
|
1422
|
+
a connection alive for.
|
1339
1423
|
"""
|
1340
1424
|
return pulumi.get(self, "max_connection_lifetime")
|
1341
1425
|
|
@@ -1343,7 +1427,8 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1343
1427
|
@pulumi.getter(name="maxIdleConnections")
|
1344
1428
|
def max_idle_connections(self) -> Optional[int]:
|
1345
1429
|
"""
|
1346
|
-
|
1430
|
+
The maximum number of idle connections to
|
1431
|
+
maintain.
|
1347
1432
|
"""
|
1348
1433
|
return pulumi.get(self, "max_idle_connections")
|
1349
1434
|
|
@@ -1351,7 +1436,8 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1351
1436
|
@pulumi.getter(name="maxOpenConnections")
|
1352
1437
|
def max_open_connections(self) -> Optional[int]:
|
1353
1438
|
"""
|
1354
|
-
|
1439
|
+
The maximum number of open connections to
|
1440
|
+
use.
|
1355
1441
|
"""
|
1356
1442
|
return pulumi.get(self, "max_open_connections")
|
1357
1443
|
|
@@ -1359,7 +1445,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1359
1445
|
@pulumi.getter
|
1360
1446
|
def password(self) -> Optional[str]:
|
1361
1447
|
"""
|
1362
|
-
The
|
1448
|
+
The password to authenticate with.
|
1363
1449
|
"""
|
1364
1450
|
return pulumi.get(self, "password")
|
1365
1451
|
|
@@ -1367,7 +1453,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1367
1453
|
@pulumi.getter(name="serviceAccountJson")
|
1368
1454
|
def service_account_json(self) -> Optional[str]:
|
1369
1455
|
"""
|
1370
|
-
|
1456
|
+
JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1371
1457
|
"""
|
1372
1458
|
return pulumi.get(self, "service_account_json")
|
1373
1459
|
|
@@ -1391,7 +1477,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1391
1477
|
@pulumi.getter
|
1392
1478
|
def username(self) -> Optional[str]:
|
1393
1479
|
"""
|
1394
|
-
The
|
1480
|
+
The username to authenticate with.
|
1395
1481
|
"""
|
1396
1482
|
return pulumi.get(self, "username")
|
1397
1483
|
|
@@ -1399,7 +1485,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1399
1485
|
@pulumi.getter(name="usernameTemplate")
|
1400
1486
|
def username_template(self) -> Optional[str]:
|
1401
1487
|
"""
|
1402
|
-
|
1488
|
+
Template describing how dynamic usernames are generated.
|
1403
1489
|
"""
|
1404
1490
|
return pulumi.get(self, "username_template")
|
1405
1491
|
|
@@ -1452,17 +1538,23 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1452
1538
|
username: Optional[str] = None,
|
1453
1539
|
username_template: Optional[str] = None):
|
1454
1540
|
"""
|
1455
|
-
:param str auth_type:
|
1456
|
-
:param str connection_url:
|
1457
|
-
|
1458
|
-
|
1459
|
-
|
1460
|
-
:param
|
1461
|
-
|
1541
|
+
:param str auth_type: Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
1542
|
+
:param str connection_url: A URL containing connection information. See
|
1543
|
+
the [Vault
|
1544
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1545
|
+
for an example.
|
1546
|
+
:param int max_connection_lifetime: The maximum number of seconds to keep
|
1547
|
+
a connection alive for.
|
1548
|
+
:param int max_idle_connections: The maximum number of idle connections to
|
1549
|
+
maintain.
|
1550
|
+
:param int max_open_connections: The maximum number of open connections to
|
1551
|
+
use.
|
1552
|
+
:param str password: The password to authenticate with.
|
1553
|
+
:param str service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1462
1554
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1463
1555
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1464
|
-
:param str username: The
|
1465
|
-
:param str username_template:
|
1556
|
+
:param str username: The username to authenticate with.
|
1557
|
+
:param str username_template: Template describing how dynamic usernames are generated.
|
1466
1558
|
"""
|
1467
1559
|
if auth_type is not None:
|
1468
1560
|
pulumi.set(__self__, "auth_type", auth_type)
|
@@ -1491,7 +1583,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1491
1583
|
@pulumi.getter(name="authType")
|
1492
1584
|
def auth_type(self) -> Optional[str]:
|
1493
1585
|
"""
|
1494
|
-
|
1586
|
+
Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
1495
1587
|
"""
|
1496
1588
|
return pulumi.get(self, "auth_type")
|
1497
1589
|
|
@@ -1499,7 +1591,10 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1499
1591
|
@pulumi.getter(name="connectionUrl")
|
1500
1592
|
def connection_url(self) -> Optional[str]:
|
1501
1593
|
"""
|
1502
|
-
|
1594
|
+
A URL containing connection information. See
|
1595
|
+
the [Vault
|
1596
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1597
|
+
for an example.
|
1503
1598
|
"""
|
1504
1599
|
return pulumi.get(self, "connection_url")
|
1505
1600
|
|
@@ -1507,7 +1602,8 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1507
1602
|
@pulumi.getter(name="maxConnectionLifetime")
|
1508
1603
|
def max_connection_lifetime(self) -> Optional[int]:
|
1509
1604
|
"""
|
1510
|
-
|
1605
|
+
The maximum number of seconds to keep
|
1606
|
+
a connection alive for.
|
1511
1607
|
"""
|
1512
1608
|
return pulumi.get(self, "max_connection_lifetime")
|
1513
1609
|
|
@@ -1515,7 +1611,8 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1515
1611
|
@pulumi.getter(name="maxIdleConnections")
|
1516
1612
|
def max_idle_connections(self) -> Optional[int]:
|
1517
1613
|
"""
|
1518
|
-
|
1614
|
+
The maximum number of idle connections to
|
1615
|
+
maintain.
|
1519
1616
|
"""
|
1520
1617
|
return pulumi.get(self, "max_idle_connections")
|
1521
1618
|
|
@@ -1523,7 +1620,8 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1523
1620
|
@pulumi.getter(name="maxOpenConnections")
|
1524
1621
|
def max_open_connections(self) -> Optional[int]:
|
1525
1622
|
"""
|
1526
|
-
|
1623
|
+
The maximum number of open connections to
|
1624
|
+
use.
|
1527
1625
|
"""
|
1528
1626
|
return pulumi.get(self, "max_open_connections")
|
1529
1627
|
|
@@ -1531,7 +1629,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1531
1629
|
@pulumi.getter
|
1532
1630
|
def password(self) -> Optional[str]:
|
1533
1631
|
"""
|
1534
|
-
The
|
1632
|
+
The password to authenticate with.
|
1535
1633
|
"""
|
1536
1634
|
return pulumi.get(self, "password")
|
1537
1635
|
|
@@ -1539,7 +1637,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1539
1637
|
@pulumi.getter(name="serviceAccountJson")
|
1540
1638
|
def service_account_json(self) -> Optional[str]:
|
1541
1639
|
"""
|
1542
|
-
|
1640
|
+
JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1543
1641
|
"""
|
1544
1642
|
return pulumi.get(self, "service_account_json")
|
1545
1643
|
|
@@ -1563,7 +1661,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1563
1661
|
@pulumi.getter
|
1564
1662
|
def username(self) -> Optional[str]:
|
1565
1663
|
"""
|
1566
|
-
The
|
1664
|
+
The username to authenticate with.
|
1567
1665
|
"""
|
1568
1666
|
return pulumi.get(self, "username")
|
1569
1667
|
|
@@ -1571,7 +1669,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1571
1669
|
@pulumi.getter(name="usernameTemplate")
|
1572
1670
|
def username_template(self) -> Optional[str]:
|
1573
1671
|
"""
|
1574
|
-
|
1672
|
+
Template describing how dynamic usernames are generated.
|
1575
1673
|
"""
|
1576
1674
|
return pulumi.get(self, "username_template")
|
1577
1675
|
|
@@ -1624,17 +1722,23 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1624
1722
|
username: Optional[str] = None,
|
1625
1723
|
username_template: Optional[str] = None):
|
1626
1724
|
"""
|
1627
|
-
:param str auth_type:
|
1628
|
-
:param str connection_url:
|
1629
|
-
|
1630
|
-
|
1631
|
-
|
1632
|
-
:param
|
1633
|
-
|
1725
|
+
:param str auth_type: Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
1726
|
+
:param str connection_url: A URL containing connection information. See
|
1727
|
+
the [Vault
|
1728
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1729
|
+
for an example.
|
1730
|
+
:param int max_connection_lifetime: The maximum number of seconds to keep
|
1731
|
+
a connection alive for.
|
1732
|
+
:param int max_idle_connections: The maximum number of idle connections to
|
1733
|
+
maintain.
|
1734
|
+
:param int max_open_connections: The maximum number of open connections to
|
1735
|
+
use.
|
1736
|
+
:param str password: The password to authenticate with.
|
1737
|
+
:param str service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1634
1738
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1635
1739
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1636
|
-
:param str username: The
|
1637
|
-
:param str username_template:
|
1740
|
+
:param str username: The username to authenticate with.
|
1741
|
+
:param str username_template: Template describing how dynamic usernames are generated.
|
1638
1742
|
"""
|
1639
1743
|
if auth_type is not None:
|
1640
1744
|
pulumi.set(__self__, "auth_type", auth_type)
|
@@ -1663,7 +1767,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1663
1767
|
@pulumi.getter(name="authType")
|
1664
1768
|
def auth_type(self) -> Optional[str]:
|
1665
1769
|
"""
|
1666
|
-
|
1770
|
+
Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
1667
1771
|
"""
|
1668
1772
|
return pulumi.get(self, "auth_type")
|
1669
1773
|
|
@@ -1671,7 +1775,10 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1671
1775
|
@pulumi.getter(name="connectionUrl")
|
1672
1776
|
def connection_url(self) -> Optional[str]:
|
1673
1777
|
"""
|
1674
|
-
|
1778
|
+
A URL containing connection information. See
|
1779
|
+
the [Vault
|
1780
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1781
|
+
for an example.
|
1675
1782
|
"""
|
1676
1783
|
return pulumi.get(self, "connection_url")
|
1677
1784
|
|
@@ -1679,7 +1786,8 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1679
1786
|
@pulumi.getter(name="maxConnectionLifetime")
|
1680
1787
|
def max_connection_lifetime(self) -> Optional[int]:
|
1681
1788
|
"""
|
1682
|
-
|
1789
|
+
The maximum number of seconds to keep
|
1790
|
+
a connection alive for.
|
1683
1791
|
"""
|
1684
1792
|
return pulumi.get(self, "max_connection_lifetime")
|
1685
1793
|
|
@@ -1687,7 +1795,8 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1687
1795
|
@pulumi.getter(name="maxIdleConnections")
|
1688
1796
|
def max_idle_connections(self) -> Optional[int]:
|
1689
1797
|
"""
|
1690
|
-
|
1798
|
+
The maximum number of idle connections to
|
1799
|
+
maintain.
|
1691
1800
|
"""
|
1692
1801
|
return pulumi.get(self, "max_idle_connections")
|
1693
1802
|
|
@@ -1695,7 +1804,8 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1695
1804
|
@pulumi.getter(name="maxOpenConnections")
|
1696
1805
|
def max_open_connections(self) -> Optional[int]:
|
1697
1806
|
"""
|
1698
|
-
|
1807
|
+
The maximum number of open connections to
|
1808
|
+
use.
|
1699
1809
|
"""
|
1700
1810
|
return pulumi.get(self, "max_open_connections")
|
1701
1811
|
|
@@ -1703,7 +1813,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1703
1813
|
@pulumi.getter
|
1704
1814
|
def password(self) -> Optional[str]:
|
1705
1815
|
"""
|
1706
|
-
The
|
1816
|
+
The password to authenticate with.
|
1707
1817
|
"""
|
1708
1818
|
return pulumi.get(self, "password")
|
1709
1819
|
|
@@ -1711,7 +1821,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1711
1821
|
@pulumi.getter(name="serviceAccountJson")
|
1712
1822
|
def service_account_json(self) -> Optional[str]:
|
1713
1823
|
"""
|
1714
|
-
|
1824
|
+
JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1715
1825
|
"""
|
1716
1826
|
return pulumi.get(self, "service_account_json")
|
1717
1827
|
|
@@ -1735,7 +1845,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1735
1845
|
@pulumi.getter
|
1736
1846
|
def username(self) -> Optional[str]:
|
1737
1847
|
"""
|
1738
|
-
The
|
1848
|
+
The username to authenticate with.
|
1739
1849
|
"""
|
1740
1850
|
return pulumi.get(self, "username")
|
1741
1851
|
|
@@ -1743,7 +1853,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1743
1853
|
@pulumi.getter(name="usernameTemplate")
|
1744
1854
|
def username_template(self) -> Optional[str]:
|
1745
1855
|
"""
|
1746
|
-
|
1856
|
+
Template describing how dynamic usernames are generated.
|
1747
1857
|
"""
|
1748
1858
|
return pulumi.get(self, "username_template")
|
1749
1859
|
|
@@ -1790,15 +1900,21 @@ class SecretBackendConnectionOracle(dict):
|
|
1790
1900
|
username: Optional[str] = None,
|
1791
1901
|
username_template: Optional[str] = None):
|
1792
1902
|
"""
|
1793
|
-
:param str connection_url:
|
1794
|
-
|
1795
|
-
|
1796
|
-
|
1797
|
-
:param
|
1798
|
-
:param
|
1799
|
-
|
1800
|
-
:param
|
1801
|
-
|
1903
|
+
:param str connection_url: A URL containing connection information. See
|
1904
|
+
the [Vault
|
1905
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1906
|
+
for an example.
|
1907
|
+
:param bool disconnect_sessions: Enable the built-in session disconnect mechanism.
|
1908
|
+
:param int max_connection_lifetime: The maximum number of seconds to keep
|
1909
|
+
a connection alive for.
|
1910
|
+
:param int max_idle_connections: The maximum number of idle connections to
|
1911
|
+
maintain.
|
1912
|
+
:param int max_open_connections: The maximum number of open connections to
|
1913
|
+
use.
|
1914
|
+
:param str password: The password to authenticate with.
|
1915
|
+
:param bool split_statements: Enable spliting statements after semi-colons.
|
1916
|
+
:param str username: The username to authenticate with.
|
1917
|
+
:param str username_template: Template describing how dynamic usernames are generated.
|
1802
1918
|
"""
|
1803
1919
|
if connection_url is not None:
|
1804
1920
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -1823,7 +1939,10 @@ class SecretBackendConnectionOracle(dict):
|
|
1823
1939
|
@pulumi.getter(name="connectionUrl")
|
1824
1940
|
def connection_url(self) -> Optional[str]:
|
1825
1941
|
"""
|
1826
|
-
|
1942
|
+
A URL containing connection information. See
|
1943
|
+
the [Vault
|
1944
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1945
|
+
for an example.
|
1827
1946
|
"""
|
1828
1947
|
return pulumi.get(self, "connection_url")
|
1829
1948
|
|
@@ -1831,7 +1950,7 @@ class SecretBackendConnectionOracle(dict):
|
|
1831
1950
|
@pulumi.getter(name="disconnectSessions")
|
1832
1951
|
def disconnect_sessions(self) -> Optional[bool]:
|
1833
1952
|
"""
|
1834
|
-
|
1953
|
+
Enable the built-in session disconnect mechanism.
|
1835
1954
|
"""
|
1836
1955
|
return pulumi.get(self, "disconnect_sessions")
|
1837
1956
|
|
@@ -1839,7 +1958,8 @@ class SecretBackendConnectionOracle(dict):
|
|
1839
1958
|
@pulumi.getter(name="maxConnectionLifetime")
|
1840
1959
|
def max_connection_lifetime(self) -> Optional[int]:
|
1841
1960
|
"""
|
1842
|
-
|
1961
|
+
The maximum number of seconds to keep
|
1962
|
+
a connection alive for.
|
1843
1963
|
"""
|
1844
1964
|
return pulumi.get(self, "max_connection_lifetime")
|
1845
1965
|
|
@@ -1847,7 +1967,8 @@ class SecretBackendConnectionOracle(dict):
|
|
1847
1967
|
@pulumi.getter(name="maxIdleConnections")
|
1848
1968
|
def max_idle_connections(self) -> Optional[int]:
|
1849
1969
|
"""
|
1850
|
-
|
1970
|
+
The maximum number of idle connections to
|
1971
|
+
maintain.
|
1851
1972
|
"""
|
1852
1973
|
return pulumi.get(self, "max_idle_connections")
|
1853
1974
|
|
@@ -1855,7 +1976,8 @@ class SecretBackendConnectionOracle(dict):
|
|
1855
1976
|
@pulumi.getter(name="maxOpenConnections")
|
1856
1977
|
def max_open_connections(self) -> Optional[int]:
|
1857
1978
|
"""
|
1858
|
-
|
1979
|
+
The maximum number of open connections to
|
1980
|
+
use.
|
1859
1981
|
"""
|
1860
1982
|
return pulumi.get(self, "max_open_connections")
|
1861
1983
|
|
@@ -1863,7 +1985,7 @@ class SecretBackendConnectionOracle(dict):
|
|
1863
1985
|
@pulumi.getter
|
1864
1986
|
def password(self) -> Optional[str]:
|
1865
1987
|
"""
|
1866
|
-
The
|
1988
|
+
The password to authenticate with.
|
1867
1989
|
"""
|
1868
1990
|
return pulumi.get(self, "password")
|
1869
1991
|
|
@@ -1871,7 +1993,7 @@ class SecretBackendConnectionOracle(dict):
|
|
1871
1993
|
@pulumi.getter(name="splitStatements")
|
1872
1994
|
def split_statements(self) -> Optional[bool]:
|
1873
1995
|
"""
|
1874
|
-
|
1996
|
+
Enable spliting statements after semi-colons.
|
1875
1997
|
"""
|
1876
1998
|
return pulumi.get(self, "split_statements")
|
1877
1999
|
|
@@ -1879,7 +2001,7 @@ class SecretBackendConnectionOracle(dict):
|
|
1879
2001
|
@pulumi.getter
|
1880
2002
|
def username(self) -> Optional[str]:
|
1881
2003
|
"""
|
1882
|
-
The
|
2004
|
+
The username to authenticate with.
|
1883
2005
|
"""
|
1884
2006
|
return pulumi.get(self, "username")
|
1885
2007
|
|
@@ -1887,7 +2009,7 @@ class SecretBackendConnectionOracle(dict):
|
|
1887
2009
|
@pulumi.getter(name="usernameTemplate")
|
1888
2010
|
def username_template(self) -> Optional[str]:
|
1889
2011
|
"""
|
1890
|
-
|
2012
|
+
Template describing how dynamic usernames are generated.
|
1891
2013
|
"""
|
1892
2014
|
return pulumi.get(self, "username_template")
|
1893
2015
|
|
@@ -1937,16 +2059,22 @@ class SecretBackendConnectionPostgresql(dict):
|
|
1937
2059
|
username: Optional[str] = None,
|
1938
2060
|
username_template: Optional[str] = None):
|
1939
2061
|
"""
|
1940
|
-
:param str auth_type:
|
1941
|
-
:param str connection_url:
|
1942
|
-
|
1943
|
-
|
1944
|
-
|
1945
|
-
:param
|
1946
|
-
:param
|
1947
|
-
|
1948
|
-
:param
|
1949
|
-
|
2062
|
+
:param str auth_type: Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
2063
|
+
:param str connection_url: A URL containing connection information. See
|
2064
|
+
the [Vault
|
2065
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
2066
|
+
for an example.
|
2067
|
+
:param bool disable_escaping: Disable special character escaping in username and password.
|
2068
|
+
:param int max_connection_lifetime: The maximum number of seconds to keep
|
2069
|
+
a connection alive for.
|
2070
|
+
:param int max_idle_connections: The maximum number of idle connections to
|
2071
|
+
maintain.
|
2072
|
+
:param int max_open_connections: The maximum number of open connections to
|
2073
|
+
use.
|
2074
|
+
:param str password: The password to authenticate with.
|
2075
|
+
:param str service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
2076
|
+
:param str username: The username to authenticate with.
|
2077
|
+
:param str username_template: Template describing how dynamic usernames are generated.
|
1950
2078
|
"""
|
1951
2079
|
if auth_type is not None:
|
1952
2080
|
pulumi.set(__self__, "auth_type", auth_type)
|
@@ -1973,7 +2101,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
1973
2101
|
@pulumi.getter(name="authType")
|
1974
2102
|
def auth_type(self) -> Optional[str]:
|
1975
2103
|
"""
|
1976
|
-
|
2104
|
+
Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
1977
2105
|
"""
|
1978
2106
|
return pulumi.get(self, "auth_type")
|
1979
2107
|
|
@@ -1981,7 +2109,10 @@ class SecretBackendConnectionPostgresql(dict):
|
|
1981
2109
|
@pulumi.getter(name="connectionUrl")
|
1982
2110
|
def connection_url(self) -> Optional[str]:
|
1983
2111
|
"""
|
1984
|
-
|
2112
|
+
A URL containing connection information. See
|
2113
|
+
the [Vault
|
2114
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
2115
|
+
for an example.
|
1985
2116
|
"""
|
1986
2117
|
return pulumi.get(self, "connection_url")
|
1987
2118
|
|
@@ -1989,7 +2120,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
1989
2120
|
@pulumi.getter(name="disableEscaping")
|
1990
2121
|
def disable_escaping(self) -> Optional[bool]:
|
1991
2122
|
"""
|
1992
|
-
Disable special character escaping in username and password
|
2123
|
+
Disable special character escaping in username and password.
|
1993
2124
|
"""
|
1994
2125
|
return pulumi.get(self, "disable_escaping")
|
1995
2126
|
|
@@ -1997,7 +2128,8 @@ class SecretBackendConnectionPostgresql(dict):
|
|
1997
2128
|
@pulumi.getter(name="maxConnectionLifetime")
|
1998
2129
|
def max_connection_lifetime(self) -> Optional[int]:
|
1999
2130
|
"""
|
2000
|
-
|
2131
|
+
The maximum number of seconds to keep
|
2132
|
+
a connection alive for.
|
2001
2133
|
"""
|
2002
2134
|
return pulumi.get(self, "max_connection_lifetime")
|
2003
2135
|
|
@@ -2005,7 +2137,8 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2005
2137
|
@pulumi.getter(name="maxIdleConnections")
|
2006
2138
|
def max_idle_connections(self) -> Optional[int]:
|
2007
2139
|
"""
|
2008
|
-
|
2140
|
+
The maximum number of idle connections to
|
2141
|
+
maintain.
|
2009
2142
|
"""
|
2010
2143
|
return pulumi.get(self, "max_idle_connections")
|
2011
2144
|
|
@@ -2013,7 +2146,8 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2013
2146
|
@pulumi.getter(name="maxOpenConnections")
|
2014
2147
|
def max_open_connections(self) -> Optional[int]:
|
2015
2148
|
"""
|
2016
|
-
|
2149
|
+
The maximum number of open connections to
|
2150
|
+
use.
|
2017
2151
|
"""
|
2018
2152
|
return pulumi.get(self, "max_open_connections")
|
2019
2153
|
|
@@ -2021,7 +2155,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2021
2155
|
@pulumi.getter
|
2022
2156
|
def password(self) -> Optional[str]:
|
2023
2157
|
"""
|
2024
|
-
The
|
2158
|
+
The password to authenticate with.
|
2025
2159
|
"""
|
2026
2160
|
return pulumi.get(self, "password")
|
2027
2161
|
|
@@ -2029,7 +2163,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2029
2163
|
@pulumi.getter(name="serviceAccountJson")
|
2030
2164
|
def service_account_json(self) -> Optional[str]:
|
2031
2165
|
"""
|
2032
|
-
|
2166
|
+
JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
2033
2167
|
"""
|
2034
2168
|
return pulumi.get(self, "service_account_json")
|
2035
2169
|
|
@@ -2037,7 +2171,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2037
2171
|
@pulumi.getter
|
2038
2172
|
def username(self) -> Optional[str]:
|
2039
2173
|
"""
|
2040
|
-
The
|
2174
|
+
The username to authenticate with.
|
2041
2175
|
"""
|
2042
2176
|
return pulumi.get(self, "username")
|
2043
2177
|
|
@@ -2045,7 +2179,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2045
2179
|
@pulumi.getter(name="usernameTemplate")
|
2046
2180
|
def username_template(self) -> Optional[str]:
|
2047
2181
|
"""
|
2048
|
-
|
2182
|
+
Template describing how dynamic usernames are generated.
|
2049
2183
|
"""
|
2050
2184
|
return pulumi.get(self, "username_template")
|
2051
2185
|
|
@@ -2080,13 +2214,15 @@ class SecretBackendConnectionRedis(dict):
|
|
2080
2214
|
port: Optional[int] = None,
|
2081
2215
|
tls: Optional[bool] = None):
|
2082
2216
|
"""
|
2083
|
-
:param str host:
|
2084
|
-
:param str password:
|
2085
|
-
:param str username:
|
2086
|
-
:param str ca_cert: The
|
2087
|
-
:param bool insecure_tls:
|
2088
|
-
|
2089
|
-
:param
|
2217
|
+
:param str host: The host to connect to.
|
2218
|
+
:param str password: The password to authenticate with.
|
2219
|
+
:param str username: The username to authenticate with.
|
2220
|
+
:param str ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
|
2221
|
+
:param bool insecure_tls: Whether to skip verification of the server
|
2222
|
+
certificate when using TLS.
|
2223
|
+
:param int port: The default port to connect to if no port is specified as
|
2224
|
+
part of the host.
|
2225
|
+
:param bool tls: Whether to use TLS when connecting to Cassandra.
|
2090
2226
|
"""
|
2091
2227
|
pulumi.set(__self__, "host", host)
|
2092
2228
|
pulumi.set(__self__, "password", password)
|
@@ -2104,7 +2240,7 @@ class SecretBackendConnectionRedis(dict):
|
|
2104
2240
|
@pulumi.getter
|
2105
2241
|
def host(self) -> str:
|
2106
2242
|
"""
|
2107
|
-
|
2243
|
+
The host to connect to.
|
2108
2244
|
"""
|
2109
2245
|
return pulumi.get(self, "host")
|
2110
2246
|
|
@@ -2112,7 +2248,7 @@ class SecretBackendConnectionRedis(dict):
|
|
2112
2248
|
@pulumi.getter
|
2113
2249
|
def password(self) -> str:
|
2114
2250
|
"""
|
2115
|
-
|
2251
|
+
The password to authenticate with.
|
2116
2252
|
"""
|
2117
2253
|
return pulumi.get(self, "password")
|
2118
2254
|
|
@@ -2120,7 +2256,7 @@ class SecretBackendConnectionRedis(dict):
|
|
2120
2256
|
@pulumi.getter
|
2121
2257
|
def username(self) -> str:
|
2122
2258
|
"""
|
2123
|
-
|
2259
|
+
The username to authenticate with.
|
2124
2260
|
"""
|
2125
2261
|
return pulumi.get(self, "username")
|
2126
2262
|
|
@@ -2128,7 +2264,7 @@ class SecretBackendConnectionRedis(dict):
|
|
2128
2264
|
@pulumi.getter(name="caCert")
|
2129
2265
|
def ca_cert(self) -> Optional[str]:
|
2130
2266
|
"""
|
2131
|
-
The
|
2267
|
+
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
|
2132
2268
|
"""
|
2133
2269
|
return pulumi.get(self, "ca_cert")
|
2134
2270
|
|
@@ -2136,7 +2272,8 @@ class SecretBackendConnectionRedis(dict):
|
|
2136
2272
|
@pulumi.getter(name="insecureTls")
|
2137
2273
|
def insecure_tls(self) -> Optional[bool]:
|
2138
2274
|
"""
|
2139
|
-
|
2275
|
+
Whether to skip verification of the server
|
2276
|
+
certificate when using TLS.
|
2140
2277
|
"""
|
2141
2278
|
return pulumi.get(self, "insecure_tls")
|
2142
2279
|
|
@@ -2144,7 +2281,8 @@ class SecretBackendConnectionRedis(dict):
|
|
2144
2281
|
@pulumi.getter
|
2145
2282
|
def port(self) -> Optional[int]:
|
2146
2283
|
"""
|
2147
|
-
The
|
2284
|
+
The default port to connect to if no port is specified as
|
2285
|
+
part of the host.
|
2148
2286
|
"""
|
2149
2287
|
return pulumi.get(self, "port")
|
2150
2288
|
|
@@ -2152,7 +2290,7 @@ class SecretBackendConnectionRedis(dict):
|
|
2152
2290
|
@pulumi.getter
|
2153
2291
|
def tls(self) -> Optional[bool]:
|
2154
2292
|
"""
|
2155
|
-
|
2293
|
+
Whether to use TLS when connecting to Cassandra.
|
2156
2294
|
"""
|
2157
2295
|
return pulumi.get(self, "tls")
|
2158
2296
|
|
@@ -2165,10 +2303,11 @@ class SecretBackendConnectionRedisElasticache(dict):
|
|
2165
2303
|
region: Optional[str] = None,
|
2166
2304
|
username: Optional[str] = None):
|
2167
2305
|
"""
|
2168
|
-
:param str url: The
|
2169
|
-
|
2170
|
-
:param str
|
2171
|
-
:param str
|
2306
|
+
:param str url: The URL for Elasticsearch's API. https requires certificate
|
2307
|
+
by trusted CA if used.
|
2308
|
+
:param str password: The password to authenticate with.
|
2309
|
+
:param str region: The region where the ElastiCache cluster is hosted. If omitted Vault tries to infer from the environment instead.
|
2310
|
+
:param str username: The username to authenticate with.
|
2172
2311
|
"""
|
2173
2312
|
pulumi.set(__self__, "url", url)
|
2174
2313
|
if password is not None:
|
@@ -2182,7 +2321,8 @@ class SecretBackendConnectionRedisElasticache(dict):
|
|
2182
2321
|
@pulumi.getter
|
2183
2322
|
def url(self) -> str:
|
2184
2323
|
"""
|
2185
|
-
The
|
2324
|
+
The URL for Elasticsearch's API. https requires certificate
|
2325
|
+
by trusted CA if used.
|
2186
2326
|
"""
|
2187
2327
|
return pulumi.get(self, "url")
|
2188
2328
|
|
@@ -2190,7 +2330,7 @@ class SecretBackendConnectionRedisElasticache(dict):
|
|
2190
2330
|
@pulumi.getter
|
2191
2331
|
def password(self) -> Optional[str]:
|
2192
2332
|
"""
|
2193
|
-
The
|
2333
|
+
The password to authenticate with.
|
2194
2334
|
"""
|
2195
2335
|
return pulumi.get(self, "password")
|
2196
2336
|
|
@@ -2198,7 +2338,7 @@ class SecretBackendConnectionRedisElasticache(dict):
|
|
2198
2338
|
@pulumi.getter
|
2199
2339
|
def region(self) -> Optional[str]:
|
2200
2340
|
"""
|
2201
|
-
The
|
2341
|
+
The region where the ElastiCache cluster is hosted. If omitted Vault tries to infer from the environment instead.
|
2202
2342
|
"""
|
2203
2343
|
return pulumi.get(self, "region")
|
2204
2344
|
|
@@ -2206,7 +2346,7 @@ class SecretBackendConnectionRedisElasticache(dict):
|
|
2206
2346
|
@pulumi.getter
|
2207
2347
|
def username(self) -> Optional[str]:
|
2208
2348
|
"""
|
2209
|
-
The
|
2349
|
+
The username to authenticate with.
|
2210
2350
|
"""
|
2211
2351
|
return pulumi.get(self, "username")
|
2212
2352
|
|
@@ -2250,14 +2390,20 @@ class SecretBackendConnectionRedshift(dict):
|
|
2250
2390
|
username: Optional[str] = None,
|
2251
2391
|
username_template: Optional[str] = None):
|
2252
2392
|
"""
|
2253
|
-
:param str connection_url:
|
2254
|
-
|
2255
|
-
|
2256
|
-
|
2257
|
-
:param
|
2258
|
-
:param
|
2259
|
-
|
2260
|
-
:param
|
2393
|
+
:param str connection_url: A URL containing connection information. See
|
2394
|
+
the [Vault
|
2395
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
2396
|
+
for an example.
|
2397
|
+
:param bool disable_escaping: Disable special character escaping in username and password.
|
2398
|
+
:param int max_connection_lifetime: The maximum number of seconds to keep
|
2399
|
+
a connection alive for.
|
2400
|
+
:param int max_idle_connections: The maximum number of idle connections to
|
2401
|
+
maintain.
|
2402
|
+
:param int max_open_connections: The maximum number of open connections to
|
2403
|
+
use.
|
2404
|
+
:param str password: The password to authenticate with.
|
2405
|
+
:param str username: The username to authenticate with.
|
2406
|
+
:param str username_template: Template describing how dynamic usernames are generated.
|
2261
2407
|
"""
|
2262
2408
|
if connection_url is not None:
|
2263
2409
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -2280,7 +2426,10 @@ class SecretBackendConnectionRedshift(dict):
|
|
2280
2426
|
@pulumi.getter(name="connectionUrl")
|
2281
2427
|
def connection_url(self) -> Optional[str]:
|
2282
2428
|
"""
|
2283
|
-
|
2429
|
+
A URL containing connection information. See
|
2430
|
+
the [Vault
|
2431
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
2432
|
+
for an example.
|
2284
2433
|
"""
|
2285
2434
|
return pulumi.get(self, "connection_url")
|
2286
2435
|
|
@@ -2288,7 +2437,7 @@ class SecretBackendConnectionRedshift(dict):
|
|
2288
2437
|
@pulumi.getter(name="disableEscaping")
|
2289
2438
|
def disable_escaping(self) -> Optional[bool]:
|
2290
2439
|
"""
|
2291
|
-
Disable special character escaping in username and password
|
2440
|
+
Disable special character escaping in username and password.
|
2292
2441
|
"""
|
2293
2442
|
return pulumi.get(self, "disable_escaping")
|
2294
2443
|
|
@@ -2296,7 +2445,8 @@ class SecretBackendConnectionRedshift(dict):
|
|
2296
2445
|
@pulumi.getter(name="maxConnectionLifetime")
|
2297
2446
|
def max_connection_lifetime(self) -> Optional[int]:
|
2298
2447
|
"""
|
2299
|
-
|
2448
|
+
The maximum number of seconds to keep
|
2449
|
+
a connection alive for.
|
2300
2450
|
"""
|
2301
2451
|
return pulumi.get(self, "max_connection_lifetime")
|
2302
2452
|
|
@@ -2304,7 +2454,8 @@ class SecretBackendConnectionRedshift(dict):
|
|
2304
2454
|
@pulumi.getter(name="maxIdleConnections")
|
2305
2455
|
def max_idle_connections(self) -> Optional[int]:
|
2306
2456
|
"""
|
2307
|
-
|
2457
|
+
The maximum number of idle connections to
|
2458
|
+
maintain.
|
2308
2459
|
"""
|
2309
2460
|
return pulumi.get(self, "max_idle_connections")
|
2310
2461
|
|
@@ -2312,7 +2463,8 @@ class SecretBackendConnectionRedshift(dict):
|
|
2312
2463
|
@pulumi.getter(name="maxOpenConnections")
|
2313
2464
|
def max_open_connections(self) -> Optional[int]:
|
2314
2465
|
"""
|
2315
|
-
|
2466
|
+
The maximum number of open connections to
|
2467
|
+
use.
|
2316
2468
|
"""
|
2317
2469
|
return pulumi.get(self, "max_open_connections")
|
2318
2470
|
|
@@ -2320,7 +2472,7 @@ class SecretBackendConnectionRedshift(dict):
|
|
2320
2472
|
@pulumi.getter
|
2321
2473
|
def password(self) -> Optional[str]:
|
2322
2474
|
"""
|
2323
|
-
The
|
2475
|
+
The password to authenticate with.
|
2324
2476
|
"""
|
2325
2477
|
return pulumi.get(self, "password")
|
2326
2478
|
|
@@ -2328,7 +2480,7 @@ class SecretBackendConnectionRedshift(dict):
|
|
2328
2480
|
@pulumi.getter
|
2329
2481
|
def username(self) -> Optional[str]:
|
2330
2482
|
"""
|
2331
|
-
The
|
2483
|
+
The username to authenticate with.
|
2332
2484
|
"""
|
2333
2485
|
return pulumi.get(self, "username")
|
2334
2486
|
|
@@ -2336,7 +2488,7 @@ class SecretBackendConnectionRedshift(dict):
|
|
2336
2488
|
@pulumi.getter(name="usernameTemplate")
|
2337
2489
|
def username_template(self) -> Optional[str]:
|
2338
2490
|
"""
|
2339
|
-
|
2491
|
+
Template describing how dynamic usernames are generated.
|
2340
2492
|
"""
|
2341
2493
|
return pulumi.get(self, "username_template")
|
2342
2494
|
|
@@ -2377,13 +2529,19 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2377
2529
|
username: Optional[str] = None,
|
2378
2530
|
username_template: Optional[str] = None):
|
2379
2531
|
"""
|
2380
|
-
:param str connection_url:
|
2381
|
-
|
2382
|
-
|
2383
|
-
|
2384
|
-
:param
|
2385
|
-
|
2386
|
-
:param
|
2532
|
+
:param str connection_url: A URL containing connection information. See
|
2533
|
+
the [Vault
|
2534
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
2535
|
+
for an example.
|
2536
|
+
:param int max_connection_lifetime: The maximum number of seconds to keep
|
2537
|
+
a connection alive for.
|
2538
|
+
:param int max_idle_connections: The maximum number of idle connections to
|
2539
|
+
maintain.
|
2540
|
+
:param int max_open_connections: The maximum number of open connections to
|
2541
|
+
use.
|
2542
|
+
:param str password: The password to authenticate with.
|
2543
|
+
:param str username: The username to authenticate with.
|
2544
|
+
:param str username_template: Template describing how dynamic usernames are generated.
|
2387
2545
|
"""
|
2388
2546
|
if connection_url is not None:
|
2389
2547
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -2404,7 +2562,10 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2404
2562
|
@pulumi.getter(name="connectionUrl")
|
2405
2563
|
def connection_url(self) -> Optional[str]:
|
2406
2564
|
"""
|
2407
|
-
|
2565
|
+
A URL containing connection information. See
|
2566
|
+
the [Vault
|
2567
|
+
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
2568
|
+
for an example.
|
2408
2569
|
"""
|
2409
2570
|
return pulumi.get(self, "connection_url")
|
2410
2571
|
|
@@ -2412,7 +2573,8 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2412
2573
|
@pulumi.getter(name="maxConnectionLifetime")
|
2413
2574
|
def max_connection_lifetime(self) -> Optional[int]:
|
2414
2575
|
"""
|
2415
|
-
|
2576
|
+
The maximum number of seconds to keep
|
2577
|
+
a connection alive for.
|
2416
2578
|
"""
|
2417
2579
|
return pulumi.get(self, "max_connection_lifetime")
|
2418
2580
|
|
@@ -2420,7 +2582,8 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2420
2582
|
@pulumi.getter(name="maxIdleConnections")
|
2421
2583
|
def max_idle_connections(self) -> Optional[int]:
|
2422
2584
|
"""
|
2423
|
-
|
2585
|
+
The maximum number of idle connections to
|
2586
|
+
maintain.
|
2424
2587
|
"""
|
2425
2588
|
return pulumi.get(self, "max_idle_connections")
|
2426
2589
|
|
@@ -2428,7 +2591,8 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2428
2591
|
@pulumi.getter(name="maxOpenConnections")
|
2429
2592
|
def max_open_connections(self) -> Optional[int]:
|
2430
2593
|
"""
|
2431
|
-
|
2594
|
+
The maximum number of open connections to
|
2595
|
+
use.
|
2432
2596
|
"""
|
2433
2597
|
return pulumi.get(self, "max_open_connections")
|
2434
2598
|
|
@@ -2436,7 +2600,7 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2436
2600
|
@pulumi.getter
|
2437
2601
|
def password(self) -> Optional[str]:
|
2438
2602
|
"""
|
2439
|
-
The
|
2603
|
+
The password to authenticate with.
|
2440
2604
|
"""
|
2441
2605
|
return pulumi.get(self, "password")
|
2442
2606
|
|
@@ -2444,7 +2608,7 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2444
2608
|
@pulumi.getter
|
2445
2609
|
def username(self) -> Optional[str]:
|
2446
2610
|
"""
|
2447
|
-
The
|
2611
|
+
The username to authenticate with.
|
2448
2612
|
"""
|
2449
2613
|
return pulumi.get(self, "username")
|
2450
2614
|
|
@@ -2452,7 +2616,7 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2452
2616
|
@pulumi.getter(name="usernameTemplate")
|
2453
2617
|
def username_template(self) -> Optional[str]:
|
2454
2618
|
"""
|
2455
|
-
|
2619
|
+
Template describing how dynamic usernames are generated.
|
2456
2620
|
"""
|
2457
2621
|
return pulumi.get(self, "username_template")
|
2458
2622
|
|
@@ -2513,21 +2677,25 @@ class SecretsMountCassandra(dict):
|
|
2513
2677
|
:param str name: Name of the database connection.
|
2514
2678
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
2515
2679
|
connection.
|
2516
|
-
:param int connect_timeout: The number of seconds to use as a connection
|
2680
|
+
:param int connect_timeout: The number of seconds to use as a connection
|
2681
|
+
timeout.
|
2517
2682
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2518
2683
|
|
2519
2684
|
Supported list of database secrets engines that can be configured:
|
2520
|
-
:param Sequence[str] hosts:
|
2521
|
-
:param bool insecure_tls: Whether to skip verification of the server
|
2522
|
-
|
2523
|
-
:param str
|
2524
|
-
:param str
|
2685
|
+
:param Sequence[str] hosts: The hosts to connect to.
|
2686
|
+
:param bool insecure_tls: Whether to skip verification of the server
|
2687
|
+
certificate when using TLS.
|
2688
|
+
:param str password: The root credential password used in the connection URL.
|
2689
|
+
:param str pem_bundle: Concatenated PEM blocks configuring the certificate
|
2690
|
+
chain.
|
2691
|
+
:param str pem_json: A JSON structure configuring the certificate chain.
|
2525
2692
|
:param str plugin_name: Specifies the name of the plugin to use.
|
2526
|
-
:param int port: The
|
2693
|
+
:param int port: The default port to connect to if no port is specified as
|
2694
|
+
part of the host.
|
2527
2695
|
:param int protocol_version: The CQL protocol version to use.
|
2528
2696
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
2529
2697
|
:param bool tls: Whether to use TLS when connecting to Cassandra.
|
2530
|
-
:param str username: The username
|
2698
|
+
:param str username: The root credential username used in the connection URL.
|
2531
2699
|
:param bool verify_connection: Whether the connection should be verified on
|
2532
2700
|
initial configuration or not.
|
2533
2701
|
"""
|
@@ -2584,7 +2752,8 @@ class SecretsMountCassandra(dict):
|
|
2584
2752
|
@pulumi.getter(name="connectTimeout")
|
2585
2753
|
def connect_timeout(self) -> Optional[int]:
|
2586
2754
|
"""
|
2587
|
-
The number of seconds to use as a connection
|
2755
|
+
The number of seconds to use as a connection
|
2756
|
+
timeout.
|
2588
2757
|
"""
|
2589
2758
|
return pulumi.get(self, "connect_timeout")
|
2590
2759
|
|
@@ -2602,7 +2771,7 @@ class SecretsMountCassandra(dict):
|
|
2602
2771
|
@pulumi.getter
|
2603
2772
|
def hosts(self) -> Optional[Sequence[str]]:
|
2604
2773
|
"""
|
2605
|
-
|
2774
|
+
The hosts to connect to.
|
2606
2775
|
"""
|
2607
2776
|
return pulumi.get(self, "hosts")
|
2608
2777
|
|
@@ -2610,7 +2779,8 @@ class SecretsMountCassandra(dict):
|
|
2610
2779
|
@pulumi.getter(name="insecureTls")
|
2611
2780
|
def insecure_tls(self) -> Optional[bool]:
|
2612
2781
|
"""
|
2613
|
-
Whether to skip verification of the server
|
2782
|
+
Whether to skip verification of the server
|
2783
|
+
certificate when using TLS.
|
2614
2784
|
"""
|
2615
2785
|
return pulumi.get(self, "insecure_tls")
|
2616
2786
|
|
@@ -2618,7 +2788,7 @@ class SecretsMountCassandra(dict):
|
|
2618
2788
|
@pulumi.getter
|
2619
2789
|
def password(self) -> Optional[str]:
|
2620
2790
|
"""
|
2621
|
-
The password
|
2791
|
+
The root credential password used in the connection URL.
|
2622
2792
|
"""
|
2623
2793
|
return pulumi.get(self, "password")
|
2624
2794
|
|
@@ -2626,7 +2796,8 @@ class SecretsMountCassandra(dict):
|
|
2626
2796
|
@pulumi.getter(name="pemBundle")
|
2627
2797
|
def pem_bundle(self) -> Optional[str]:
|
2628
2798
|
"""
|
2629
|
-
Concatenated PEM blocks
|
2799
|
+
Concatenated PEM blocks configuring the certificate
|
2800
|
+
chain.
|
2630
2801
|
"""
|
2631
2802
|
return pulumi.get(self, "pem_bundle")
|
2632
2803
|
|
@@ -2634,7 +2805,7 @@ class SecretsMountCassandra(dict):
|
|
2634
2805
|
@pulumi.getter(name="pemJson")
|
2635
2806
|
def pem_json(self) -> Optional[str]:
|
2636
2807
|
"""
|
2637
|
-
|
2808
|
+
A JSON structure configuring the certificate chain.
|
2638
2809
|
"""
|
2639
2810
|
return pulumi.get(self, "pem_json")
|
2640
2811
|
|
@@ -2650,7 +2821,8 @@ class SecretsMountCassandra(dict):
|
|
2650
2821
|
@pulumi.getter
|
2651
2822
|
def port(self) -> Optional[int]:
|
2652
2823
|
"""
|
2653
|
-
The
|
2824
|
+
The default port to connect to if no port is specified as
|
2825
|
+
part of the host.
|
2654
2826
|
"""
|
2655
2827
|
return pulumi.get(self, "port")
|
2656
2828
|
|
@@ -2682,7 +2854,7 @@ class SecretsMountCassandra(dict):
|
|
2682
2854
|
@pulumi.getter
|
2683
2855
|
def username(self) -> Optional[str]:
|
2684
2856
|
"""
|
2685
|
-
The username
|
2857
|
+
The root credential username used in the connection URL.
|
2686
2858
|
"""
|
2687
2859
|
return pulumi.get(self, "username")
|
2688
2860
|
|
@@ -2745,10 +2917,10 @@ class SecretsMountCouchbase(dict):
|
|
2745
2917
|
username_template: Optional[str] = None,
|
2746
2918
|
verify_connection: Optional[bool] = None):
|
2747
2919
|
"""
|
2748
|
-
:param Sequence[str] hosts:
|
2920
|
+
:param Sequence[str] hosts: The hosts to connect to.
|
2749
2921
|
:param str name: Name of the database connection.
|
2750
|
-
:param str password:
|
2751
|
-
:param str username:
|
2922
|
+
:param str password: The root credential password used in the connection URL.
|
2923
|
+
:param str username: The root credential username used in the connection URL.
|
2752
2924
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
2753
2925
|
connection.
|
2754
2926
|
:param str base64_pem: Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
|
@@ -2756,11 +2928,12 @@ class SecretsMountCouchbase(dict):
|
|
2756
2928
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2757
2929
|
|
2758
2930
|
Supported list of database secrets engines that can be configured:
|
2759
|
-
:param bool insecure_tls:
|
2931
|
+
:param bool insecure_tls: Whether to skip verification of the server
|
2932
|
+
certificate when using TLS.
|
2760
2933
|
:param str plugin_name: Specifies the name of the plugin to use.
|
2761
2934
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
2762
|
-
:param bool tls:
|
2763
|
-
:param str username_template: Template describing how dynamic usernames are generated.
|
2935
|
+
:param bool tls: Whether to use TLS when connecting to Cassandra.
|
2936
|
+
:param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
2764
2937
|
:param bool verify_connection: Whether the connection should be verified on
|
2765
2938
|
initial configuration or not.
|
2766
2939
|
"""
|
@@ -2793,7 +2966,7 @@ class SecretsMountCouchbase(dict):
|
|
2793
2966
|
@pulumi.getter
|
2794
2967
|
def hosts(self) -> Sequence[str]:
|
2795
2968
|
"""
|
2796
|
-
|
2969
|
+
The hosts to connect to.
|
2797
2970
|
"""
|
2798
2971
|
return pulumi.get(self, "hosts")
|
2799
2972
|
|
@@ -2809,7 +2982,7 @@ class SecretsMountCouchbase(dict):
|
|
2809
2982
|
@pulumi.getter
|
2810
2983
|
def password(self) -> str:
|
2811
2984
|
"""
|
2812
|
-
|
2985
|
+
The root credential password used in the connection URL.
|
2813
2986
|
"""
|
2814
2987
|
return pulumi.get(self, "password")
|
2815
2988
|
|
@@ -2817,7 +2990,7 @@ class SecretsMountCouchbase(dict):
|
|
2817
2990
|
@pulumi.getter
|
2818
2991
|
def username(self) -> str:
|
2819
2992
|
"""
|
2820
|
-
|
2993
|
+
The root credential username used in the connection URL.
|
2821
2994
|
"""
|
2822
2995
|
return pulumi.get(self, "username")
|
2823
2996
|
|
@@ -2860,7 +3033,8 @@ class SecretsMountCouchbase(dict):
|
|
2860
3033
|
@pulumi.getter(name="insecureTls")
|
2861
3034
|
def insecure_tls(self) -> Optional[bool]:
|
2862
3035
|
"""
|
2863
|
-
|
3036
|
+
Whether to skip verification of the server
|
3037
|
+
certificate when using TLS.
|
2864
3038
|
"""
|
2865
3039
|
return pulumi.get(self, "insecure_tls")
|
2866
3040
|
|
@@ -2884,7 +3058,7 @@ class SecretsMountCouchbase(dict):
|
|
2884
3058
|
@pulumi.getter
|
2885
3059
|
def tls(self) -> Optional[bool]:
|
2886
3060
|
"""
|
2887
|
-
|
3061
|
+
Whether to use TLS when connecting to Cassandra.
|
2888
3062
|
"""
|
2889
3063
|
return pulumi.get(self, "tls")
|
2890
3064
|
|
@@ -2892,7 +3066,7 @@ class SecretsMountCouchbase(dict):
|
|
2892
3066
|
@pulumi.getter(name="usernameTemplate")
|
2893
3067
|
def username_template(self) -> Optional[str]:
|
2894
3068
|
"""
|
2895
|
-
Template describing how dynamic usernames are generated.
|
3069
|
+
[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
2896
3070
|
"""
|
2897
3071
|
return pulumi.get(self, "username_template")
|
2898
3072
|
|
@@ -2962,23 +3136,24 @@ class SecretsMountElasticsearch(dict):
|
|
2962
3136
|
verify_connection: Optional[bool] = None):
|
2963
3137
|
"""
|
2964
3138
|
:param str name: Name of the database connection.
|
2965
|
-
:param str password: The
|
2966
|
-
:param str url: The URL for Elasticsearch's API
|
2967
|
-
|
3139
|
+
:param str password: The root credential password used in the connection URL.
|
3140
|
+
:param str url: The URL for Elasticsearch's API. https requires certificate
|
3141
|
+
by trusted CA if used.
|
3142
|
+
:param str username: The root credential username used in the connection URL.
|
2968
3143
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
2969
3144
|
connection.
|
2970
|
-
:param str ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
2971
|
-
:param str ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
2972
|
-
:param str client_cert: The path to the certificate for the Elasticsearch client to present for communication
|
2973
|
-
:param str client_key: The path to the key for the Elasticsearch client to use for communication
|
3145
|
+
:param str ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
|
3146
|
+
:param str ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
|
3147
|
+
:param str client_cert: The path to the certificate for the Elasticsearch client to present for communication.
|
3148
|
+
:param str client_key: The path to the key for the Elasticsearch client to use for communication.
|
2974
3149
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2975
3150
|
|
2976
3151
|
Supported list of database secrets engines that can be configured:
|
2977
|
-
:param bool insecure: Whether to disable certificate verification
|
3152
|
+
:param bool insecure: Whether to disable certificate verification.
|
2978
3153
|
:param str plugin_name: Specifies the name of the plugin to use.
|
2979
3154
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
2980
|
-
:param str tls_server_name: This, if set, is used to set the SNI host when connecting via TLS
|
2981
|
-
:param str username_template: Template describing how dynamic usernames are generated.
|
3155
|
+
:param str tls_server_name: This, if set, is used to set the SNI host when connecting via TLS.
|
3156
|
+
:param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
2982
3157
|
:param bool verify_connection: Whether the connection should be verified on
|
2983
3158
|
initial configuration or not.
|
2984
3159
|
"""
|
@@ -3023,7 +3198,7 @@ class SecretsMountElasticsearch(dict):
|
|
3023
3198
|
@pulumi.getter
|
3024
3199
|
def password(self) -> str:
|
3025
3200
|
"""
|
3026
|
-
The
|
3201
|
+
The root credential password used in the connection URL.
|
3027
3202
|
"""
|
3028
3203
|
return pulumi.get(self, "password")
|
3029
3204
|
|
@@ -3031,7 +3206,8 @@ class SecretsMountElasticsearch(dict):
|
|
3031
3206
|
@pulumi.getter
|
3032
3207
|
def url(self) -> str:
|
3033
3208
|
"""
|
3034
|
-
The URL for Elasticsearch's API
|
3209
|
+
The URL for Elasticsearch's API. https requires certificate
|
3210
|
+
by trusted CA if used.
|
3035
3211
|
"""
|
3036
3212
|
return pulumi.get(self, "url")
|
3037
3213
|
|
@@ -3039,7 +3215,7 @@ class SecretsMountElasticsearch(dict):
|
|
3039
3215
|
@pulumi.getter
|
3040
3216
|
def username(self) -> str:
|
3041
3217
|
"""
|
3042
|
-
The
|
3218
|
+
The root credential username used in the connection URL.
|
3043
3219
|
"""
|
3044
3220
|
return pulumi.get(self, "username")
|
3045
3221
|
|
@@ -3056,7 +3232,7 @@ class SecretsMountElasticsearch(dict):
|
|
3056
3232
|
@pulumi.getter(name="caCert")
|
3057
3233
|
def ca_cert(self) -> Optional[str]:
|
3058
3234
|
"""
|
3059
|
-
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
3235
|
+
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
|
3060
3236
|
"""
|
3061
3237
|
return pulumi.get(self, "ca_cert")
|
3062
3238
|
|
@@ -3064,7 +3240,7 @@ class SecretsMountElasticsearch(dict):
|
|
3064
3240
|
@pulumi.getter(name="caPath")
|
3065
3241
|
def ca_path(self) -> Optional[str]:
|
3066
3242
|
"""
|
3067
|
-
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
3243
|
+
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
|
3068
3244
|
"""
|
3069
3245
|
return pulumi.get(self, "ca_path")
|
3070
3246
|
|
@@ -3072,7 +3248,7 @@ class SecretsMountElasticsearch(dict):
|
|
3072
3248
|
@pulumi.getter(name="clientCert")
|
3073
3249
|
def client_cert(self) -> Optional[str]:
|
3074
3250
|
"""
|
3075
|
-
The path to the certificate for the Elasticsearch client to present for communication
|
3251
|
+
The path to the certificate for the Elasticsearch client to present for communication.
|
3076
3252
|
"""
|
3077
3253
|
return pulumi.get(self, "client_cert")
|
3078
3254
|
|
@@ -3080,7 +3256,7 @@ class SecretsMountElasticsearch(dict):
|
|
3080
3256
|
@pulumi.getter(name="clientKey")
|
3081
3257
|
def client_key(self) -> Optional[str]:
|
3082
3258
|
"""
|
3083
|
-
The path to the key for the Elasticsearch client to use for communication
|
3259
|
+
The path to the key for the Elasticsearch client to use for communication.
|
3084
3260
|
"""
|
3085
3261
|
return pulumi.get(self, "client_key")
|
3086
3262
|
|
@@ -3098,7 +3274,7 @@ class SecretsMountElasticsearch(dict):
|
|
3098
3274
|
@pulumi.getter
|
3099
3275
|
def insecure(self) -> Optional[bool]:
|
3100
3276
|
"""
|
3101
|
-
Whether to disable certificate verification
|
3277
|
+
Whether to disable certificate verification.
|
3102
3278
|
"""
|
3103
3279
|
return pulumi.get(self, "insecure")
|
3104
3280
|
|
@@ -3122,7 +3298,7 @@ class SecretsMountElasticsearch(dict):
|
|
3122
3298
|
@pulumi.getter(name="tlsServerName")
|
3123
3299
|
def tls_server_name(self) -> Optional[str]:
|
3124
3300
|
"""
|
3125
|
-
This, if set, is used to set the SNI host when connecting via TLS
|
3301
|
+
This, if set, is used to set the SNI host when connecting via TLS.
|
3126
3302
|
"""
|
3127
3303
|
return pulumi.get(self, "tls_server_name")
|
3128
3304
|
|
@@ -3130,7 +3306,7 @@ class SecretsMountElasticsearch(dict):
|
|
3130
3306
|
@pulumi.getter(name="usernameTemplate")
|
3131
3307
|
def username_template(self) -> Optional[str]:
|
3132
3308
|
"""
|
3133
|
-
Template describing how dynamic usernames are generated.
|
3309
|
+
[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
3134
3310
|
"""
|
3135
3311
|
return pulumi.get(self, "username_template")
|
3136
3312
|
|
@@ -3197,18 +3373,21 @@ class SecretsMountHana(dict):
|
|
3197
3373
|
:param str name: Name of the database connection.
|
3198
3374
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3199
3375
|
connection.
|
3200
|
-
:param str connection_url:
|
3376
|
+
:param str connection_url: Specifies the Redshift DSN.
|
3377
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
3201
3378
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3202
3379
|
|
3203
3380
|
Supported list of database secrets engines that can be configured:
|
3204
|
-
:param bool disable_escaping: Disable special character escaping in username and password
|
3205
|
-
:param int max_connection_lifetime:
|
3206
|
-
:param int max_idle_connections:
|
3207
|
-
|
3208
|
-
:param
|
3381
|
+
:param bool disable_escaping: Disable special character escaping in username and password.
|
3382
|
+
:param int max_connection_lifetime: The maximum amount of time a connection may be reused.
|
3383
|
+
:param int max_idle_connections: The maximum number of idle connections to
|
3384
|
+
the database.
|
3385
|
+
:param int max_open_connections: The maximum number of open connections to
|
3386
|
+
the database.
|
3387
|
+
:param str password: The root credential password used in the connection URL.
|
3209
3388
|
:param str plugin_name: Specifies the name of the plugin to use.
|
3210
3389
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
3211
|
-
:param str username: The root credential username used in the connection URL
|
3390
|
+
:param str username: The root credential username used in the connection URL.
|
3212
3391
|
:param bool verify_connection: Whether the connection should be verified on
|
3213
3392
|
initial configuration or not.
|
3214
3393
|
"""
|
@@ -3259,7 +3438,8 @@ class SecretsMountHana(dict):
|
|
3259
3438
|
@pulumi.getter(name="connectionUrl")
|
3260
3439
|
def connection_url(self) -> Optional[str]:
|
3261
3440
|
"""
|
3262
|
-
|
3441
|
+
Specifies the Redshift DSN.
|
3442
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
3263
3443
|
"""
|
3264
3444
|
return pulumi.get(self, "connection_url")
|
3265
3445
|
|
@@ -3277,7 +3457,7 @@ class SecretsMountHana(dict):
|
|
3277
3457
|
@pulumi.getter(name="disableEscaping")
|
3278
3458
|
def disable_escaping(self) -> Optional[bool]:
|
3279
3459
|
"""
|
3280
|
-
Disable special character escaping in username and password
|
3460
|
+
Disable special character escaping in username and password.
|
3281
3461
|
"""
|
3282
3462
|
return pulumi.get(self, "disable_escaping")
|
3283
3463
|
|
@@ -3285,7 +3465,7 @@ class SecretsMountHana(dict):
|
|
3285
3465
|
@pulumi.getter(name="maxConnectionLifetime")
|
3286
3466
|
def max_connection_lifetime(self) -> Optional[int]:
|
3287
3467
|
"""
|
3288
|
-
|
3468
|
+
The maximum amount of time a connection may be reused.
|
3289
3469
|
"""
|
3290
3470
|
return pulumi.get(self, "max_connection_lifetime")
|
3291
3471
|
|
@@ -3293,7 +3473,8 @@ class SecretsMountHana(dict):
|
|
3293
3473
|
@pulumi.getter(name="maxIdleConnections")
|
3294
3474
|
def max_idle_connections(self) -> Optional[int]:
|
3295
3475
|
"""
|
3296
|
-
|
3476
|
+
The maximum number of idle connections to
|
3477
|
+
the database.
|
3297
3478
|
"""
|
3298
3479
|
return pulumi.get(self, "max_idle_connections")
|
3299
3480
|
|
@@ -3301,7 +3482,8 @@ class SecretsMountHana(dict):
|
|
3301
3482
|
@pulumi.getter(name="maxOpenConnections")
|
3302
3483
|
def max_open_connections(self) -> Optional[int]:
|
3303
3484
|
"""
|
3304
|
-
|
3485
|
+
The maximum number of open connections to
|
3486
|
+
the database.
|
3305
3487
|
"""
|
3306
3488
|
return pulumi.get(self, "max_open_connections")
|
3307
3489
|
|
@@ -3309,7 +3491,7 @@ class SecretsMountHana(dict):
|
|
3309
3491
|
@pulumi.getter
|
3310
3492
|
def password(self) -> Optional[str]:
|
3311
3493
|
"""
|
3312
|
-
The root credential password used in the connection URL
|
3494
|
+
The root credential password used in the connection URL.
|
3313
3495
|
"""
|
3314
3496
|
return pulumi.get(self, "password")
|
3315
3497
|
|
@@ -3333,7 +3515,7 @@ class SecretsMountHana(dict):
|
|
3333
3515
|
@pulumi.getter
|
3334
3516
|
def username(self) -> Optional[str]:
|
3335
3517
|
"""
|
3336
|
-
The root credential username used in the connection URL
|
3518
|
+
The root credential username used in the connection URL.
|
3337
3519
|
"""
|
3338
3520
|
return pulumi.get(self, "username")
|
3339
3521
|
|
@@ -3400,24 +3582,28 @@ class SecretsMountInfluxdb(dict):
|
|
3400
3582
|
username_template: Optional[str] = None,
|
3401
3583
|
verify_connection: Optional[bool] = None):
|
3402
3584
|
"""
|
3403
|
-
:param str host:
|
3585
|
+
:param str host: The host to connect to.
|
3404
3586
|
:param str name: Name of the database connection.
|
3405
|
-
:param str password:
|
3406
|
-
:param str username:
|
3587
|
+
:param str password: The root credential password used in the connection URL.
|
3588
|
+
:param str username: The root credential username used in the connection URL.
|
3407
3589
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3408
3590
|
connection.
|
3409
|
-
:param int connect_timeout: The number of seconds to use as a connection
|
3591
|
+
:param int connect_timeout: The number of seconds to use as a connection
|
3592
|
+
timeout.
|
3410
3593
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3411
3594
|
|
3412
3595
|
Supported list of database secrets engines that can be configured:
|
3413
|
-
:param bool insecure_tls: Whether to skip verification of the server
|
3414
|
-
|
3415
|
-
:param str
|
3596
|
+
:param bool insecure_tls: Whether to skip verification of the server
|
3597
|
+
certificate when using TLS.
|
3598
|
+
:param str pem_bundle: Concatenated PEM blocks configuring the certificate
|
3599
|
+
chain.
|
3600
|
+
:param str pem_json: A JSON structure configuring the certificate chain.
|
3416
3601
|
:param str plugin_name: Specifies the name of the plugin to use.
|
3417
|
-
:param int port: The
|
3602
|
+
:param int port: The default port to connect to if no port is specified as
|
3603
|
+
part of the host.
|
3418
3604
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
3419
|
-
:param bool tls: Whether to use TLS when connecting to
|
3420
|
-
:param str username_template: Template describing how dynamic usernames are generated.
|
3605
|
+
:param bool tls: Whether to use TLS when connecting to Cassandra.
|
3606
|
+
:param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
3421
3607
|
:param bool verify_connection: Whether the connection should be verified on
|
3422
3608
|
initial configuration or not.
|
3423
3609
|
"""
|
@@ -3454,7 +3640,7 @@ class SecretsMountInfluxdb(dict):
|
|
3454
3640
|
@pulumi.getter
|
3455
3641
|
def host(self) -> str:
|
3456
3642
|
"""
|
3457
|
-
|
3643
|
+
The host to connect to.
|
3458
3644
|
"""
|
3459
3645
|
return pulumi.get(self, "host")
|
3460
3646
|
|
@@ -3470,7 +3656,7 @@ class SecretsMountInfluxdb(dict):
|
|
3470
3656
|
@pulumi.getter
|
3471
3657
|
def password(self) -> str:
|
3472
3658
|
"""
|
3473
|
-
|
3659
|
+
The root credential password used in the connection URL.
|
3474
3660
|
"""
|
3475
3661
|
return pulumi.get(self, "password")
|
3476
3662
|
|
@@ -3478,7 +3664,7 @@ class SecretsMountInfluxdb(dict):
|
|
3478
3664
|
@pulumi.getter
|
3479
3665
|
def username(self) -> str:
|
3480
3666
|
"""
|
3481
|
-
|
3667
|
+
The root credential username used in the connection URL.
|
3482
3668
|
"""
|
3483
3669
|
return pulumi.get(self, "username")
|
3484
3670
|
|
@@ -3495,7 +3681,8 @@ class SecretsMountInfluxdb(dict):
|
|
3495
3681
|
@pulumi.getter(name="connectTimeout")
|
3496
3682
|
def connect_timeout(self) -> Optional[int]:
|
3497
3683
|
"""
|
3498
|
-
The number of seconds to use as a connection
|
3684
|
+
The number of seconds to use as a connection
|
3685
|
+
timeout.
|
3499
3686
|
"""
|
3500
3687
|
return pulumi.get(self, "connect_timeout")
|
3501
3688
|
|
@@ -3513,7 +3700,8 @@ class SecretsMountInfluxdb(dict):
|
|
3513
3700
|
@pulumi.getter(name="insecureTls")
|
3514
3701
|
def insecure_tls(self) -> Optional[bool]:
|
3515
3702
|
"""
|
3516
|
-
Whether to skip verification of the server
|
3703
|
+
Whether to skip verification of the server
|
3704
|
+
certificate when using TLS.
|
3517
3705
|
"""
|
3518
3706
|
return pulumi.get(self, "insecure_tls")
|
3519
3707
|
|
@@ -3521,7 +3709,8 @@ class SecretsMountInfluxdb(dict):
|
|
3521
3709
|
@pulumi.getter(name="pemBundle")
|
3522
3710
|
def pem_bundle(self) -> Optional[str]:
|
3523
3711
|
"""
|
3524
|
-
Concatenated PEM blocks
|
3712
|
+
Concatenated PEM blocks configuring the certificate
|
3713
|
+
chain.
|
3525
3714
|
"""
|
3526
3715
|
return pulumi.get(self, "pem_bundle")
|
3527
3716
|
|
@@ -3529,7 +3718,7 @@ class SecretsMountInfluxdb(dict):
|
|
3529
3718
|
@pulumi.getter(name="pemJson")
|
3530
3719
|
def pem_json(self) -> Optional[str]:
|
3531
3720
|
"""
|
3532
|
-
|
3721
|
+
A JSON structure configuring the certificate chain.
|
3533
3722
|
"""
|
3534
3723
|
return pulumi.get(self, "pem_json")
|
3535
3724
|
|
@@ -3545,7 +3734,8 @@ class SecretsMountInfluxdb(dict):
|
|
3545
3734
|
@pulumi.getter
|
3546
3735
|
def port(self) -> Optional[int]:
|
3547
3736
|
"""
|
3548
|
-
The
|
3737
|
+
The default port to connect to if no port is specified as
|
3738
|
+
part of the host.
|
3549
3739
|
"""
|
3550
3740
|
return pulumi.get(self, "port")
|
3551
3741
|
|
@@ -3561,7 +3751,7 @@ class SecretsMountInfluxdb(dict):
|
|
3561
3751
|
@pulumi.getter
|
3562
3752
|
def tls(self) -> Optional[bool]:
|
3563
3753
|
"""
|
3564
|
-
Whether to use TLS when connecting to
|
3754
|
+
Whether to use TLS when connecting to Cassandra.
|
3565
3755
|
"""
|
3566
3756
|
return pulumi.get(self, "tls")
|
3567
3757
|
|
@@ -3569,7 +3759,7 @@ class SecretsMountInfluxdb(dict):
|
|
3569
3759
|
@pulumi.getter(name="usernameTemplate")
|
3570
3760
|
def username_template(self) -> Optional[str]:
|
3571
3761
|
"""
|
3572
|
-
Template describing how dynamic usernames are generated.
|
3762
|
+
[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
3573
3763
|
"""
|
3574
3764
|
return pulumi.get(self, "username_template")
|
3575
3765
|
|
@@ -3636,18 +3826,21 @@ class SecretsMountMongodb(dict):
|
|
3636
3826
|
:param str name: Name of the database connection.
|
3637
3827
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3638
3828
|
connection.
|
3639
|
-
:param str connection_url:
|
3829
|
+
:param str connection_url: Specifies the Redshift DSN.
|
3830
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
3640
3831
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3641
3832
|
|
3642
3833
|
Supported list of database secrets engines that can be configured:
|
3643
|
-
:param int max_connection_lifetime:
|
3644
|
-
:param int max_idle_connections:
|
3645
|
-
|
3646
|
-
:param
|
3834
|
+
:param int max_connection_lifetime: The maximum amount of time a connection may be reused.
|
3835
|
+
:param int max_idle_connections: The maximum number of idle connections to
|
3836
|
+
the database.
|
3837
|
+
:param int max_open_connections: The maximum number of open connections to
|
3838
|
+
the database.
|
3839
|
+
:param str password: The root credential password used in the connection URL.
|
3647
3840
|
:param str plugin_name: Specifies the name of the plugin to use.
|
3648
3841
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
3649
|
-
:param str username: The root credential username used in the connection URL
|
3650
|
-
:param str username_template:
|
3842
|
+
:param str username: The root credential username used in the connection URL.
|
3843
|
+
:param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
3651
3844
|
:param bool verify_connection: Whether the connection should be verified on
|
3652
3845
|
initial configuration or not.
|
3653
3846
|
"""
|
@@ -3698,7 +3891,8 @@ class SecretsMountMongodb(dict):
|
|
3698
3891
|
@pulumi.getter(name="connectionUrl")
|
3699
3892
|
def connection_url(self) -> Optional[str]:
|
3700
3893
|
"""
|
3701
|
-
|
3894
|
+
Specifies the Redshift DSN.
|
3895
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
3702
3896
|
"""
|
3703
3897
|
return pulumi.get(self, "connection_url")
|
3704
3898
|
|
@@ -3716,7 +3910,7 @@ class SecretsMountMongodb(dict):
|
|
3716
3910
|
@pulumi.getter(name="maxConnectionLifetime")
|
3717
3911
|
def max_connection_lifetime(self) -> Optional[int]:
|
3718
3912
|
"""
|
3719
|
-
|
3913
|
+
The maximum amount of time a connection may be reused.
|
3720
3914
|
"""
|
3721
3915
|
return pulumi.get(self, "max_connection_lifetime")
|
3722
3916
|
|
@@ -3724,7 +3918,8 @@ class SecretsMountMongodb(dict):
|
|
3724
3918
|
@pulumi.getter(name="maxIdleConnections")
|
3725
3919
|
def max_idle_connections(self) -> Optional[int]:
|
3726
3920
|
"""
|
3727
|
-
|
3921
|
+
The maximum number of idle connections to
|
3922
|
+
the database.
|
3728
3923
|
"""
|
3729
3924
|
return pulumi.get(self, "max_idle_connections")
|
3730
3925
|
|
@@ -3732,7 +3927,8 @@ class SecretsMountMongodb(dict):
|
|
3732
3927
|
@pulumi.getter(name="maxOpenConnections")
|
3733
3928
|
def max_open_connections(self) -> Optional[int]:
|
3734
3929
|
"""
|
3735
|
-
|
3930
|
+
The maximum number of open connections to
|
3931
|
+
the database.
|
3736
3932
|
"""
|
3737
3933
|
return pulumi.get(self, "max_open_connections")
|
3738
3934
|
|
@@ -3740,7 +3936,7 @@ class SecretsMountMongodb(dict):
|
|
3740
3936
|
@pulumi.getter
|
3741
3937
|
def password(self) -> Optional[str]:
|
3742
3938
|
"""
|
3743
|
-
The root credential password used in the connection URL
|
3939
|
+
The root credential password used in the connection URL.
|
3744
3940
|
"""
|
3745
3941
|
return pulumi.get(self, "password")
|
3746
3942
|
|
@@ -3764,7 +3960,7 @@ class SecretsMountMongodb(dict):
|
|
3764
3960
|
@pulumi.getter
|
3765
3961
|
def username(self) -> Optional[str]:
|
3766
3962
|
"""
|
3767
|
-
The root credential username used in the connection URL
|
3963
|
+
The root credential username used in the connection URL.
|
3768
3964
|
"""
|
3769
3965
|
return pulumi.get(self, "username")
|
3770
3966
|
|
@@ -3772,7 +3968,7 @@ class SecretsMountMongodb(dict):
|
|
3772
3968
|
@pulumi.getter(name="usernameTemplate")
|
3773
3969
|
def username_template(self) -> Optional[str]:
|
3774
3970
|
"""
|
3775
|
-
|
3971
|
+
[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
3776
3972
|
"""
|
3777
3973
|
return pulumi.get(self, "username_template")
|
3778
3974
|
|
@@ -3993,20 +4189,25 @@ class SecretsMountMssql(dict):
|
|
3993
4189
|
:param str name: Name of the database connection.
|
3994
4190
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3995
4191
|
connection.
|
3996
|
-
:param str connection_url:
|
3997
|
-
|
4192
|
+
:param str connection_url: Specifies the Redshift DSN.
|
4193
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4194
|
+
:param bool contained_db: For Vault v1.9+. Set to true when the target is a
|
4195
|
+
Contained Database, e.g. AzureSQL.
|
4196
|
+
See [Vault docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
|
3998
4197
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3999
4198
|
|
4000
4199
|
Supported list of database secrets engines that can be configured:
|
4001
|
-
:param bool disable_escaping: Disable special character escaping in username and password
|
4002
|
-
:param int max_connection_lifetime:
|
4003
|
-
:param int max_idle_connections:
|
4004
|
-
|
4005
|
-
:param
|
4200
|
+
:param bool disable_escaping: Disable special character escaping in username and password.
|
4201
|
+
:param int max_connection_lifetime: The maximum amount of time a connection may be reused.
|
4202
|
+
:param int max_idle_connections: The maximum number of idle connections to
|
4203
|
+
the database.
|
4204
|
+
:param int max_open_connections: The maximum number of open connections to
|
4205
|
+
the database.
|
4206
|
+
:param str password: The root credential password used in the connection URL.
|
4006
4207
|
:param str plugin_name: Specifies the name of the plugin to use.
|
4007
4208
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
4008
|
-
:param str username: The root credential username used in the connection URL
|
4009
|
-
:param str username_template:
|
4209
|
+
:param str username: The root credential username used in the connection URL.
|
4210
|
+
:param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
4010
4211
|
:param bool verify_connection: Whether the connection should be verified on
|
4011
4212
|
initial configuration or not.
|
4012
4213
|
"""
|
@@ -4061,7 +4262,8 @@ class SecretsMountMssql(dict):
|
|
4061
4262
|
@pulumi.getter(name="connectionUrl")
|
4062
4263
|
def connection_url(self) -> Optional[str]:
|
4063
4264
|
"""
|
4064
|
-
|
4265
|
+
Specifies the Redshift DSN.
|
4266
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4065
4267
|
"""
|
4066
4268
|
return pulumi.get(self, "connection_url")
|
4067
4269
|
|
@@ -4069,7 +4271,9 @@ class SecretsMountMssql(dict):
|
|
4069
4271
|
@pulumi.getter(name="containedDb")
|
4070
4272
|
def contained_db(self) -> Optional[bool]:
|
4071
4273
|
"""
|
4072
|
-
Set to true when the target is a
|
4274
|
+
For Vault v1.9+. Set to true when the target is a
|
4275
|
+
Contained Database, e.g. AzureSQL.
|
4276
|
+
See [Vault docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
|
4073
4277
|
"""
|
4074
4278
|
return pulumi.get(self, "contained_db")
|
4075
4279
|
|
@@ -4087,7 +4291,7 @@ class SecretsMountMssql(dict):
|
|
4087
4291
|
@pulumi.getter(name="disableEscaping")
|
4088
4292
|
def disable_escaping(self) -> Optional[bool]:
|
4089
4293
|
"""
|
4090
|
-
Disable special character escaping in username and password
|
4294
|
+
Disable special character escaping in username and password.
|
4091
4295
|
"""
|
4092
4296
|
return pulumi.get(self, "disable_escaping")
|
4093
4297
|
|
@@ -4095,7 +4299,7 @@ class SecretsMountMssql(dict):
|
|
4095
4299
|
@pulumi.getter(name="maxConnectionLifetime")
|
4096
4300
|
def max_connection_lifetime(self) -> Optional[int]:
|
4097
4301
|
"""
|
4098
|
-
|
4302
|
+
The maximum amount of time a connection may be reused.
|
4099
4303
|
"""
|
4100
4304
|
return pulumi.get(self, "max_connection_lifetime")
|
4101
4305
|
|
@@ -4103,7 +4307,8 @@ class SecretsMountMssql(dict):
|
|
4103
4307
|
@pulumi.getter(name="maxIdleConnections")
|
4104
4308
|
def max_idle_connections(self) -> Optional[int]:
|
4105
4309
|
"""
|
4106
|
-
|
4310
|
+
The maximum number of idle connections to
|
4311
|
+
the database.
|
4107
4312
|
"""
|
4108
4313
|
return pulumi.get(self, "max_idle_connections")
|
4109
4314
|
|
@@ -4111,7 +4316,8 @@ class SecretsMountMssql(dict):
|
|
4111
4316
|
@pulumi.getter(name="maxOpenConnections")
|
4112
4317
|
def max_open_connections(self) -> Optional[int]:
|
4113
4318
|
"""
|
4114
|
-
|
4319
|
+
The maximum number of open connections to
|
4320
|
+
the database.
|
4115
4321
|
"""
|
4116
4322
|
return pulumi.get(self, "max_open_connections")
|
4117
4323
|
|
@@ -4119,7 +4325,7 @@ class SecretsMountMssql(dict):
|
|
4119
4325
|
@pulumi.getter
|
4120
4326
|
def password(self) -> Optional[str]:
|
4121
4327
|
"""
|
4122
|
-
The root credential password used in the connection URL
|
4328
|
+
The root credential password used in the connection URL.
|
4123
4329
|
"""
|
4124
4330
|
return pulumi.get(self, "password")
|
4125
4331
|
|
@@ -4143,7 +4349,7 @@ class SecretsMountMssql(dict):
|
|
4143
4349
|
@pulumi.getter
|
4144
4350
|
def username(self) -> Optional[str]:
|
4145
4351
|
"""
|
4146
|
-
The root credential username used in the connection URL
|
4352
|
+
The root credential username used in the connection URL.
|
4147
4353
|
"""
|
4148
4354
|
return pulumi.get(self, "username")
|
4149
4355
|
|
@@ -4151,7 +4357,7 @@ class SecretsMountMssql(dict):
|
|
4151
4357
|
@pulumi.getter(name="usernameTemplate")
|
4152
4358
|
def username_template(self) -> Optional[str]:
|
4153
4359
|
"""
|
4154
|
-
|
4360
|
+
[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
4155
4361
|
"""
|
4156
4362
|
return pulumi.get(self, "username_template")
|
4157
4363
|
|
@@ -4231,21 +4437,24 @@ class SecretsMountMysql(dict):
|
|
4231
4437
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
4232
4438
|
connection.
|
4233
4439
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4234
|
-
:param str connection_url:
|
4440
|
+
:param str connection_url: Specifies the Redshift DSN.
|
4441
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4235
4442
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4236
4443
|
|
4237
4444
|
Supported list of database secrets engines that can be configured:
|
4238
|
-
:param int max_connection_lifetime:
|
4239
|
-
:param int max_idle_connections:
|
4240
|
-
|
4241
|
-
:param
|
4445
|
+
:param int max_connection_lifetime: The maximum amount of time a connection may be reused.
|
4446
|
+
:param int max_idle_connections: The maximum number of idle connections to
|
4447
|
+
the database.
|
4448
|
+
:param int max_open_connections: The maximum number of open connections to
|
4449
|
+
the database.
|
4450
|
+
:param str password: The root credential password used in the connection URL.
|
4242
4451
|
:param str plugin_name: Specifies the name of the plugin to use.
|
4243
4452
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
4244
4453
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
4245
4454
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
4246
4455
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
4247
|
-
:param str username: The root credential username used in the connection URL
|
4248
|
-
:param str username_template:
|
4456
|
+
:param str username: The root credential username used in the connection URL.
|
4457
|
+
:param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
4249
4458
|
:param bool verify_connection: Whether the connection should be verified on
|
4250
4459
|
initial configuration or not.
|
4251
4460
|
"""
|
@@ -4312,7 +4521,8 @@ class SecretsMountMysql(dict):
|
|
4312
4521
|
@pulumi.getter(name="connectionUrl")
|
4313
4522
|
def connection_url(self) -> Optional[str]:
|
4314
4523
|
"""
|
4315
|
-
|
4524
|
+
Specifies the Redshift DSN.
|
4525
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4316
4526
|
"""
|
4317
4527
|
return pulumi.get(self, "connection_url")
|
4318
4528
|
|
@@ -4330,7 +4540,7 @@ class SecretsMountMysql(dict):
|
|
4330
4540
|
@pulumi.getter(name="maxConnectionLifetime")
|
4331
4541
|
def max_connection_lifetime(self) -> Optional[int]:
|
4332
4542
|
"""
|
4333
|
-
|
4543
|
+
The maximum amount of time a connection may be reused.
|
4334
4544
|
"""
|
4335
4545
|
return pulumi.get(self, "max_connection_lifetime")
|
4336
4546
|
|
@@ -4338,7 +4548,8 @@ class SecretsMountMysql(dict):
|
|
4338
4548
|
@pulumi.getter(name="maxIdleConnections")
|
4339
4549
|
def max_idle_connections(self) -> Optional[int]:
|
4340
4550
|
"""
|
4341
|
-
|
4551
|
+
The maximum number of idle connections to
|
4552
|
+
the database.
|
4342
4553
|
"""
|
4343
4554
|
return pulumi.get(self, "max_idle_connections")
|
4344
4555
|
|
@@ -4346,7 +4557,8 @@ class SecretsMountMysql(dict):
|
|
4346
4557
|
@pulumi.getter(name="maxOpenConnections")
|
4347
4558
|
def max_open_connections(self) -> Optional[int]:
|
4348
4559
|
"""
|
4349
|
-
|
4560
|
+
The maximum number of open connections to
|
4561
|
+
the database.
|
4350
4562
|
"""
|
4351
4563
|
return pulumi.get(self, "max_open_connections")
|
4352
4564
|
|
@@ -4354,7 +4566,7 @@ class SecretsMountMysql(dict):
|
|
4354
4566
|
@pulumi.getter
|
4355
4567
|
def password(self) -> Optional[str]:
|
4356
4568
|
"""
|
4357
|
-
The root credential password used in the connection URL
|
4569
|
+
The root credential password used in the connection URL.
|
4358
4570
|
"""
|
4359
4571
|
return pulumi.get(self, "password")
|
4360
4572
|
|
@@ -4402,7 +4614,7 @@ class SecretsMountMysql(dict):
|
|
4402
4614
|
@pulumi.getter
|
4403
4615
|
def username(self) -> Optional[str]:
|
4404
4616
|
"""
|
4405
|
-
The root credential username used in the connection URL
|
4617
|
+
The root credential username used in the connection URL.
|
4406
4618
|
"""
|
4407
4619
|
return pulumi.get(self, "username")
|
4408
4620
|
|
@@ -4410,7 +4622,7 @@ class SecretsMountMysql(dict):
|
|
4410
4622
|
@pulumi.getter(name="usernameTemplate")
|
4411
4623
|
def username_template(self) -> Optional[str]:
|
4412
4624
|
"""
|
4413
|
-
|
4625
|
+
[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
4414
4626
|
"""
|
4415
4627
|
return pulumi.get(self, "username_template")
|
4416
4628
|
|
@@ -4490,21 +4702,24 @@ class SecretsMountMysqlAurora(dict):
|
|
4490
4702
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
4491
4703
|
connection.
|
4492
4704
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4493
|
-
:param str connection_url:
|
4705
|
+
:param str connection_url: Specifies the Redshift DSN.
|
4706
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4494
4707
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4495
4708
|
|
4496
4709
|
Supported list of database secrets engines that can be configured:
|
4497
|
-
:param int max_connection_lifetime:
|
4498
|
-
:param int max_idle_connections:
|
4499
|
-
|
4500
|
-
:param
|
4710
|
+
:param int max_connection_lifetime: The maximum amount of time a connection may be reused.
|
4711
|
+
:param int max_idle_connections: The maximum number of idle connections to
|
4712
|
+
the database.
|
4713
|
+
:param int max_open_connections: The maximum number of open connections to
|
4714
|
+
the database.
|
4715
|
+
:param str password: The root credential password used in the connection URL.
|
4501
4716
|
:param str plugin_name: Specifies the name of the plugin to use.
|
4502
4717
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
4503
4718
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
4504
4719
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
4505
4720
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
4506
|
-
:param str username: The root credential username used in the connection URL
|
4507
|
-
:param str username_template:
|
4721
|
+
:param str username: The root credential username used in the connection URL.
|
4722
|
+
:param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
4508
4723
|
:param bool verify_connection: Whether the connection should be verified on
|
4509
4724
|
initial configuration or not.
|
4510
4725
|
"""
|
@@ -4571,7 +4786,8 @@ class SecretsMountMysqlAurora(dict):
|
|
4571
4786
|
@pulumi.getter(name="connectionUrl")
|
4572
4787
|
def connection_url(self) -> Optional[str]:
|
4573
4788
|
"""
|
4574
|
-
|
4789
|
+
Specifies the Redshift DSN.
|
4790
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4575
4791
|
"""
|
4576
4792
|
return pulumi.get(self, "connection_url")
|
4577
4793
|
|
@@ -4589,7 +4805,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4589
4805
|
@pulumi.getter(name="maxConnectionLifetime")
|
4590
4806
|
def max_connection_lifetime(self) -> Optional[int]:
|
4591
4807
|
"""
|
4592
|
-
|
4808
|
+
The maximum amount of time a connection may be reused.
|
4593
4809
|
"""
|
4594
4810
|
return pulumi.get(self, "max_connection_lifetime")
|
4595
4811
|
|
@@ -4597,7 +4813,8 @@ class SecretsMountMysqlAurora(dict):
|
|
4597
4813
|
@pulumi.getter(name="maxIdleConnections")
|
4598
4814
|
def max_idle_connections(self) -> Optional[int]:
|
4599
4815
|
"""
|
4600
|
-
|
4816
|
+
The maximum number of idle connections to
|
4817
|
+
the database.
|
4601
4818
|
"""
|
4602
4819
|
return pulumi.get(self, "max_idle_connections")
|
4603
4820
|
|
@@ -4605,7 +4822,8 @@ class SecretsMountMysqlAurora(dict):
|
|
4605
4822
|
@pulumi.getter(name="maxOpenConnections")
|
4606
4823
|
def max_open_connections(self) -> Optional[int]:
|
4607
4824
|
"""
|
4608
|
-
|
4825
|
+
The maximum number of open connections to
|
4826
|
+
the database.
|
4609
4827
|
"""
|
4610
4828
|
return pulumi.get(self, "max_open_connections")
|
4611
4829
|
|
@@ -4613,7 +4831,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4613
4831
|
@pulumi.getter
|
4614
4832
|
def password(self) -> Optional[str]:
|
4615
4833
|
"""
|
4616
|
-
The root credential password used in the connection URL
|
4834
|
+
The root credential password used in the connection URL.
|
4617
4835
|
"""
|
4618
4836
|
return pulumi.get(self, "password")
|
4619
4837
|
|
@@ -4661,7 +4879,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4661
4879
|
@pulumi.getter
|
4662
4880
|
def username(self) -> Optional[str]:
|
4663
4881
|
"""
|
4664
|
-
The root credential username used in the connection URL
|
4882
|
+
The root credential username used in the connection URL.
|
4665
4883
|
"""
|
4666
4884
|
return pulumi.get(self, "username")
|
4667
4885
|
|
@@ -4669,7 +4887,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4669
4887
|
@pulumi.getter(name="usernameTemplate")
|
4670
4888
|
def username_template(self) -> Optional[str]:
|
4671
4889
|
"""
|
4672
|
-
|
4890
|
+
[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
4673
4891
|
"""
|
4674
4892
|
return pulumi.get(self, "username_template")
|
4675
4893
|
|
@@ -4749,21 +4967,24 @@ class SecretsMountMysqlLegacy(dict):
|
|
4749
4967
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
4750
4968
|
connection.
|
4751
4969
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4752
|
-
:param str connection_url:
|
4970
|
+
:param str connection_url: Specifies the Redshift DSN.
|
4971
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4753
4972
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4754
4973
|
|
4755
4974
|
Supported list of database secrets engines that can be configured:
|
4756
|
-
:param int max_connection_lifetime:
|
4757
|
-
:param int max_idle_connections:
|
4758
|
-
|
4759
|
-
:param
|
4975
|
+
:param int max_connection_lifetime: The maximum amount of time a connection may be reused.
|
4976
|
+
:param int max_idle_connections: The maximum number of idle connections to
|
4977
|
+
the database.
|
4978
|
+
:param int max_open_connections: The maximum number of open connections to
|
4979
|
+
the database.
|
4980
|
+
:param str password: The root credential password used in the connection URL.
|
4760
4981
|
:param str plugin_name: Specifies the name of the plugin to use.
|
4761
4982
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
4762
4983
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
4763
4984
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
4764
4985
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
4765
|
-
:param str username: The root credential username used in the connection URL
|
4766
|
-
:param str username_template:
|
4986
|
+
:param str username: The root credential username used in the connection URL.
|
4987
|
+
:param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
4767
4988
|
:param bool verify_connection: Whether the connection should be verified on
|
4768
4989
|
initial configuration or not.
|
4769
4990
|
"""
|
@@ -4830,7 +5051,8 @@ class SecretsMountMysqlLegacy(dict):
|
|
4830
5051
|
@pulumi.getter(name="connectionUrl")
|
4831
5052
|
def connection_url(self) -> Optional[str]:
|
4832
5053
|
"""
|
4833
|
-
|
5054
|
+
Specifies the Redshift DSN.
|
5055
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4834
5056
|
"""
|
4835
5057
|
return pulumi.get(self, "connection_url")
|
4836
5058
|
|
@@ -4848,7 +5070,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
4848
5070
|
@pulumi.getter(name="maxConnectionLifetime")
|
4849
5071
|
def max_connection_lifetime(self) -> Optional[int]:
|
4850
5072
|
"""
|
4851
|
-
|
5073
|
+
The maximum amount of time a connection may be reused.
|
4852
5074
|
"""
|
4853
5075
|
return pulumi.get(self, "max_connection_lifetime")
|
4854
5076
|
|
@@ -4856,7 +5078,8 @@ class SecretsMountMysqlLegacy(dict):
|
|
4856
5078
|
@pulumi.getter(name="maxIdleConnections")
|
4857
5079
|
def max_idle_connections(self) -> Optional[int]:
|
4858
5080
|
"""
|
4859
|
-
|
5081
|
+
The maximum number of idle connections to
|
5082
|
+
the database.
|
4860
5083
|
"""
|
4861
5084
|
return pulumi.get(self, "max_idle_connections")
|
4862
5085
|
|
@@ -4864,7 +5087,8 @@ class SecretsMountMysqlLegacy(dict):
|
|
4864
5087
|
@pulumi.getter(name="maxOpenConnections")
|
4865
5088
|
def max_open_connections(self) -> Optional[int]:
|
4866
5089
|
"""
|
4867
|
-
|
5090
|
+
The maximum number of open connections to
|
5091
|
+
the database.
|
4868
5092
|
"""
|
4869
5093
|
return pulumi.get(self, "max_open_connections")
|
4870
5094
|
|
@@ -4872,7 +5096,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
4872
5096
|
@pulumi.getter
|
4873
5097
|
def password(self) -> Optional[str]:
|
4874
5098
|
"""
|
4875
|
-
The root credential password used in the connection URL
|
5099
|
+
The root credential password used in the connection URL.
|
4876
5100
|
"""
|
4877
5101
|
return pulumi.get(self, "password")
|
4878
5102
|
|
@@ -4920,7 +5144,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
4920
5144
|
@pulumi.getter
|
4921
5145
|
def username(self) -> Optional[str]:
|
4922
5146
|
"""
|
4923
|
-
The root credential username used in the connection URL
|
5147
|
+
The root credential username used in the connection URL.
|
4924
5148
|
"""
|
4925
5149
|
return pulumi.get(self, "username")
|
4926
5150
|
|
@@ -4928,7 +5152,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
4928
5152
|
@pulumi.getter(name="usernameTemplate")
|
4929
5153
|
def username_template(self) -> Optional[str]:
|
4930
5154
|
"""
|
4931
|
-
|
5155
|
+
[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
4932
5156
|
"""
|
4933
5157
|
return pulumi.get(self, "username_template")
|
4934
5158
|
|
@@ -5008,21 +5232,24 @@ class SecretsMountMysqlRd(dict):
|
|
5008
5232
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
5009
5233
|
connection.
|
5010
5234
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5011
|
-
:param str connection_url:
|
5235
|
+
:param str connection_url: Specifies the Redshift DSN.
|
5236
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
5012
5237
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5013
5238
|
|
5014
5239
|
Supported list of database secrets engines that can be configured:
|
5015
|
-
:param int max_connection_lifetime:
|
5016
|
-
:param int max_idle_connections:
|
5017
|
-
|
5018
|
-
:param
|
5240
|
+
:param int max_connection_lifetime: The maximum amount of time a connection may be reused.
|
5241
|
+
:param int max_idle_connections: The maximum number of idle connections to
|
5242
|
+
the database.
|
5243
|
+
:param int max_open_connections: The maximum number of open connections to
|
5244
|
+
the database.
|
5245
|
+
:param str password: The root credential password used in the connection URL.
|
5019
5246
|
:param str plugin_name: Specifies the name of the plugin to use.
|
5020
5247
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5021
5248
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
5022
5249
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
5023
5250
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
5024
|
-
:param str username: The root credential username used in the connection URL
|
5025
|
-
:param str username_template:
|
5251
|
+
:param str username: The root credential username used in the connection URL.
|
5252
|
+
:param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
5026
5253
|
:param bool verify_connection: Whether the connection should be verified on
|
5027
5254
|
initial configuration or not.
|
5028
5255
|
"""
|
@@ -5089,7 +5316,8 @@ class SecretsMountMysqlRd(dict):
|
|
5089
5316
|
@pulumi.getter(name="connectionUrl")
|
5090
5317
|
def connection_url(self) -> Optional[str]:
|
5091
5318
|
"""
|
5092
|
-
|
5319
|
+
Specifies the Redshift DSN.
|
5320
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
5093
5321
|
"""
|
5094
5322
|
return pulumi.get(self, "connection_url")
|
5095
5323
|
|
@@ -5107,7 +5335,7 @@ class SecretsMountMysqlRd(dict):
|
|
5107
5335
|
@pulumi.getter(name="maxConnectionLifetime")
|
5108
5336
|
def max_connection_lifetime(self) -> Optional[int]:
|
5109
5337
|
"""
|
5110
|
-
|
5338
|
+
The maximum amount of time a connection may be reused.
|
5111
5339
|
"""
|
5112
5340
|
return pulumi.get(self, "max_connection_lifetime")
|
5113
5341
|
|
@@ -5115,7 +5343,8 @@ class SecretsMountMysqlRd(dict):
|
|
5115
5343
|
@pulumi.getter(name="maxIdleConnections")
|
5116
5344
|
def max_idle_connections(self) -> Optional[int]:
|
5117
5345
|
"""
|
5118
|
-
|
5346
|
+
The maximum number of idle connections to
|
5347
|
+
the database.
|
5119
5348
|
"""
|
5120
5349
|
return pulumi.get(self, "max_idle_connections")
|
5121
5350
|
|
@@ -5123,7 +5352,8 @@ class SecretsMountMysqlRd(dict):
|
|
5123
5352
|
@pulumi.getter(name="maxOpenConnections")
|
5124
5353
|
def max_open_connections(self) -> Optional[int]:
|
5125
5354
|
"""
|
5126
|
-
|
5355
|
+
The maximum number of open connections to
|
5356
|
+
the database.
|
5127
5357
|
"""
|
5128
5358
|
return pulumi.get(self, "max_open_connections")
|
5129
5359
|
|
@@ -5131,7 +5361,7 @@ class SecretsMountMysqlRd(dict):
|
|
5131
5361
|
@pulumi.getter
|
5132
5362
|
def password(self) -> Optional[str]:
|
5133
5363
|
"""
|
5134
|
-
The root credential password used in the connection URL
|
5364
|
+
The root credential password used in the connection URL.
|
5135
5365
|
"""
|
5136
5366
|
return pulumi.get(self, "password")
|
5137
5367
|
|
@@ -5179,7 +5409,7 @@ class SecretsMountMysqlRd(dict):
|
|
5179
5409
|
@pulumi.getter
|
5180
5410
|
def username(self) -> Optional[str]:
|
5181
5411
|
"""
|
5182
|
-
The root credential username used in the connection URL
|
5412
|
+
The root credential username used in the connection URL.
|
5183
5413
|
"""
|
5184
5414
|
return pulumi.get(self, "username")
|
5185
5415
|
|
@@ -5187,7 +5417,7 @@ class SecretsMountMysqlRd(dict):
|
|
5187
5417
|
@pulumi.getter(name="usernameTemplate")
|
5188
5418
|
def username_template(self) -> Optional[str]:
|
5189
5419
|
"""
|
5190
|
-
|
5420
|
+
[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
5191
5421
|
"""
|
5192
5422
|
return pulumi.get(self, "username_template")
|
5193
5423
|
|
@@ -5260,20 +5490,23 @@ class SecretsMountOracle(dict):
|
|
5260
5490
|
:param str name: Name of the database connection.
|
5261
5491
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
5262
5492
|
connection.
|
5263
|
-
:param str connection_url:
|
5493
|
+
:param str connection_url: Specifies the Redshift DSN.
|
5494
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
5264
5495
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5265
5496
|
|
5266
5497
|
Supported list of database secrets engines that can be configured:
|
5267
5498
|
:param bool disconnect_sessions: Set to true to disconnect any open sessions prior to running the revocation statements.
|
5268
|
-
:param int max_connection_lifetime:
|
5269
|
-
:param int max_idle_connections:
|
5270
|
-
|
5271
|
-
:param
|
5499
|
+
:param int max_connection_lifetime: The maximum amount of time a connection may be reused.
|
5500
|
+
:param int max_idle_connections: The maximum number of idle connections to
|
5501
|
+
the database.
|
5502
|
+
:param int max_open_connections: The maximum number of open connections to
|
5503
|
+
the database.
|
5504
|
+
:param str password: The root credential password used in the connection URL.
|
5272
5505
|
:param str plugin_name: Specifies the name of the plugin to use.
|
5273
5506
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5274
5507
|
:param bool split_statements: Set to true in order to split statements after semi-colons.
|
5275
|
-
:param str username: The root credential username used in the connection URL
|
5276
|
-
:param str username_template:
|
5508
|
+
:param str username: The root credential username used in the connection URL.
|
5509
|
+
:param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
5277
5510
|
:param bool verify_connection: Whether the connection should be verified on
|
5278
5511
|
initial configuration or not.
|
5279
5512
|
"""
|
@@ -5328,7 +5561,8 @@ class SecretsMountOracle(dict):
|
|
5328
5561
|
@pulumi.getter(name="connectionUrl")
|
5329
5562
|
def connection_url(self) -> Optional[str]:
|
5330
5563
|
"""
|
5331
|
-
|
5564
|
+
Specifies the Redshift DSN.
|
5565
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
5332
5566
|
"""
|
5333
5567
|
return pulumi.get(self, "connection_url")
|
5334
5568
|
|
@@ -5354,7 +5588,7 @@ class SecretsMountOracle(dict):
|
|
5354
5588
|
@pulumi.getter(name="maxConnectionLifetime")
|
5355
5589
|
def max_connection_lifetime(self) -> Optional[int]:
|
5356
5590
|
"""
|
5357
|
-
|
5591
|
+
The maximum amount of time a connection may be reused.
|
5358
5592
|
"""
|
5359
5593
|
return pulumi.get(self, "max_connection_lifetime")
|
5360
5594
|
|
@@ -5362,7 +5596,8 @@ class SecretsMountOracle(dict):
|
|
5362
5596
|
@pulumi.getter(name="maxIdleConnections")
|
5363
5597
|
def max_idle_connections(self) -> Optional[int]:
|
5364
5598
|
"""
|
5365
|
-
|
5599
|
+
The maximum number of idle connections to
|
5600
|
+
the database.
|
5366
5601
|
"""
|
5367
5602
|
return pulumi.get(self, "max_idle_connections")
|
5368
5603
|
|
@@ -5370,7 +5605,8 @@ class SecretsMountOracle(dict):
|
|
5370
5605
|
@pulumi.getter(name="maxOpenConnections")
|
5371
5606
|
def max_open_connections(self) -> Optional[int]:
|
5372
5607
|
"""
|
5373
|
-
|
5608
|
+
The maximum number of open connections to
|
5609
|
+
the database.
|
5374
5610
|
"""
|
5375
5611
|
return pulumi.get(self, "max_open_connections")
|
5376
5612
|
|
@@ -5378,7 +5614,7 @@ class SecretsMountOracle(dict):
|
|
5378
5614
|
@pulumi.getter
|
5379
5615
|
def password(self) -> Optional[str]:
|
5380
5616
|
"""
|
5381
|
-
The root credential password used in the connection URL
|
5617
|
+
The root credential password used in the connection URL.
|
5382
5618
|
"""
|
5383
5619
|
return pulumi.get(self, "password")
|
5384
5620
|
|
@@ -5410,7 +5646,7 @@ class SecretsMountOracle(dict):
|
|
5410
5646
|
@pulumi.getter
|
5411
5647
|
def username(self) -> Optional[str]:
|
5412
5648
|
"""
|
5413
|
-
The root credential username used in the connection URL
|
5649
|
+
The root credential username used in the connection URL.
|
5414
5650
|
"""
|
5415
5651
|
return pulumi.get(self, "username")
|
5416
5652
|
|
@@ -5418,7 +5654,7 @@ class SecretsMountOracle(dict):
|
|
5418
5654
|
@pulumi.getter(name="usernameTemplate")
|
5419
5655
|
def username_template(self) -> Optional[str]:
|
5420
5656
|
"""
|
5421
|
-
|
5657
|
+
[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
5422
5658
|
"""
|
5423
5659
|
return pulumi.get(self, "username_template")
|
5424
5660
|
|
@@ -5495,20 +5731,23 @@ class SecretsMountPostgresql(dict):
|
|
5495
5731
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
5496
5732
|
connection.
|
5497
5733
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5498
|
-
:param str connection_url:
|
5734
|
+
:param str connection_url: Specifies the Redshift DSN.
|
5735
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
5499
5736
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5500
5737
|
|
5501
5738
|
Supported list of database secrets engines that can be configured:
|
5502
|
-
:param bool disable_escaping: Disable special character escaping in username and password
|
5503
|
-
:param int max_connection_lifetime:
|
5504
|
-
:param int max_idle_connections:
|
5505
|
-
|
5506
|
-
:param
|
5739
|
+
:param bool disable_escaping: Disable special character escaping in username and password.
|
5740
|
+
:param int max_connection_lifetime: The maximum amount of time a connection may be reused.
|
5741
|
+
:param int max_idle_connections: The maximum number of idle connections to
|
5742
|
+
the database.
|
5743
|
+
:param int max_open_connections: The maximum number of open connections to
|
5744
|
+
the database.
|
5745
|
+
:param str password: The root credential password used in the connection URL.
|
5507
5746
|
:param str plugin_name: Specifies the name of the plugin to use.
|
5508
5747
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5509
5748
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
5510
|
-
:param str username: The root credential username used in the connection URL
|
5511
|
-
:param str username_template:
|
5749
|
+
:param str username: The root credential username used in the connection URL.
|
5750
|
+
:param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
5512
5751
|
:param bool verify_connection: Whether the connection should be verified on
|
5513
5752
|
initial configuration or not.
|
5514
5753
|
"""
|
@@ -5573,7 +5812,8 @@ class SecretsMountPostgresql(dict):
|
|
5573
5812
|
@pulumi.getter(name="connectionUrl")
|
5574
5813
|
def connection_url(self) -> Optional[str]:
|
5575
5814
|
"""
|
5576
|
-
|
5815
|
+
Specifies the Redshift DSN.
|
5816
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
5577
5817
|
"""
|
5578
5818
|
return pulumi.get(self, "connection_url")
|
5579
5819
|
|
@@ -5591,7 +5831,7 @@ class SecretsMountPostgresql(dict):
|
|
5591
5831
|
@pulumi.getter(name="disableEscaping")
|
5592
5832
|
def disable_escaping(self) -> Optional[bool]:
|
5593
5833
|
"""
|
5594
|
-
Disable special character escaping in username and password
|
5834
|
+
Disable special character escaping in username and password.
|
5595
5835
|
"""
|
5596
5836
|
return pulumi.get(self, "disable_escaping")
|
5597
5837
|
|
@@ -5599,7 +5839,7 @@ class SecretsMountPostgresql(dict):
|
|
5599
5839
|
@pulumi.getter(name="maxConnectionLifetime")
|
5600
5840
|
def max_connection_lifetime(self) -> Optional[int]:
|
5601
5841
|
"""
|
5602
|
-
|
5842
|
+
The maximum amount of time a connection may be reused.
|
5603
5843
|
"""
|
5604
5844
|
return pulumi.get(self, "max_connection_lifetime")
|
5605
5845
|
|
@@ -5607,7 +5847,8 @@ class SecretsMountPostgresql(dict):
|
|
5607
5847
|
@pulumi.getter(name="maxIdleConnections")
|
5608
5848
|
def max_idle_connections(self) -> Optional[int]:
|
5609
5849
|
"""
|
5610
|
-
|
5850
|
+
The maximum number of idle connections to
|
5851
|
+
the database.
|
5611
5852
|
"""
|
5612
5853
|
return pulumi.get(self, "max_idle_connections")
|
5613
5854
|
|
@@ -5615,7 +5856,8 @@ class SecretsMountPostgresql(dict):
|
|
5615
5856
|
@pulumi.getter(name="maxOpenConnections")
|
5616
5857
|
def max_open_connections(self) -> Optional[int]:
|
5617
5858
|
"""
|
5618
|
-
|
5859
|
+
The maximum number of open connections to
|
5860
|
+
the database.
|
5619
5861
|
"""
|
5620
5862
|
return pulumi.get(self, "max_open_connections")
|
5621
5863
|
|
@@ -5623,7 +5865,7 @@ class SecretsMountPostgresql(dict):
|
|
5623
5865
|
@pulumi.getter
|
5624
5866
|
def password(self) -> Optional[str]:
|
5625
5867
|
"""
|
5626
|
-
The root credential password used in the connection URL
|
5868
|
+
The root credential password used in the connection URL.
|
5627
5869
|
"""
|
5628
5870
|
return pulumi.get(self, "password")
|
5629
5871
|
|
@@ -5655,7 +5897,7 @@ class SecretsMountPostgresql(dict):
|
|
5655
5897
|
@pulumi.getter
|
5656
5898
|
def username(self) -> Optional[str]:
|
5657
5899
|
"""
|
5658
|
-
The root credential username used in the connection URL
|
5900
|
+
The root credential username used in the connection URL.
|
5659
5901
|
"""
|
5660
5902
|
return pulumi.get(self, "username")
|
5661
5903
|
|
@@ -5663,7 +5905,7 @@ class SecretsMountPostgresql(dict):
|
|
5663
5905
|
@pulumi.getter(name="usernameTemplate")
|
5664
5906
|
def username_template(self) -> Optional[str]:
|
5665
5907
|
"""
|
5666
|
-
|
5908
|
+
[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
5667
5909
|
"""
|
5668
5910
|
return pulumi.get(self, "username_template")
|
5669
5911
|
|
@@ -5721,21 +5963,23 @@ class SecretsMountRedi(dict):
|
|
5721
5963
|
tls: Optional[bool] = None,
|
5722
5964
|
verify_connection: Optional[bool] = None):
|
5723
5965
|
"""
|
5724
|
-
:param str host:
|
5966
|
+
:param str host: The host to connect to.
|
5725
5967
|
:param str name: Name of the database connection.
|
5726
|
-
:param str password:
|
5727
|
-
:param str username:
|
5968
|
+
:param str password: The root credential password used in the connection URL.
|
5969
|
+
:param str username: The root credential username used in the connection URL.
|
5728
5970
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
5729
5971
|
connection.
|
5730
|
-
:param str ca_cert: The
|
5972
|
+
:param str ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
|
5731
5973
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5732
5974
|
|
5733
5975
|
Supported list of database secrets engines that can be configured:
|
5734
|
-
:param bool insecure_tls:
|
5976
|
+
:param bool insecure_tls: Whether to skip verification of the server
|
5977
|
+
certificate when using TLS.
|
5735
5978
|
:param str plugin_name: Specifies the name of the plugin to use.
|
5736
|
-
:param int port: The
|
5979
|
+
:param int port: The default port to connect to if no port is specified as
|
5980
|
+
part of the host.
|
5737
5981
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5738
|
-
:param bool tls:
|
5982
|
+
:param bool tls: Whether to use TLS when connecting to Cassandra.
|
5739
5983
|
:param bool verify_connection: Whether the connection should be verified on
|
5740
5984
|
initial configuration or not.
|
5741
5985
|
"""
|
@@ -5766,7 +6010,7 @@ class SecretsMountRedi(dict):
|
|
5766
6010
|
@pulumi.getter
|
5767
6011
|
def host(self) -> str:
|
5768
6012
|
"""
|
5769
|
-
|
6013
|
+
The host to connect to.
|
5770
6014
|
"""
|
5771
6015
|
return pulumi.get(self, "host")
|
5772
6016
|
|
@@ -5782,7 +6026,7 @@ class SecretsMountRedi(dict):
|
|
5782
6026
|
@pulumi.getter
|
5783
6027
|
def password(self) -> str:
|
5784
6028
|
"""
|
5785
|
-
|
6029
|
+
The root credential password used in the connection URL.
|
5786
6030
|
"""
|
5787
6031
|
return pulumi.get(self, "password")
|
5788
6032
|
|
@@ -5790,7 +6034,7 @@ class SecretsMountRedi(dict):
|
|
5790
6034
|
@pulumi.getter
|
5791
6035
|
def username(self) -> str:
|
5792
6036
|
"""
|
5793
|
-
|
6037
|
+
The root credential username used in the connection URL.
|
5794
6038
|
"""
|
5795
6039
|
return pulumi.get(self, "username")
|
5796
6040
|
|
@@ -5807,7 +6051,7 @@ class SecretsMountRedi(dict):
|
|
5807
6051
|
@pulumi.getter(name="caCert")
|
5808
6052
|
def ca_cert(self) -> Optional[str]:
|
5809
6053
|
"""
|
5810
|
-
The
|
6054
|
+
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
|
5811
6055
|
"""
|
5812
6056
|
return pulumi.get(self, "ca_cert")
|
5813
6057
|
|
@@ -5825,7 +6069,8 @@ class SecretsMountRedi(dict):
|
|
5825
6069
|
@pulumi.getter(name="insecureTls")
|
5826
6070
|
def insecure_tls(self) -> Optional[bool]:
|
5827
6071
|
"""
|
5828
|
-
|
6072
|
+
Whether to skip verification of the server
|
6073
|
+
certificate when using TLS.
|
5829
6074
|
"""
|
5830
6075
|
return pulumi.get(self, "insecure_tls")
|
5831
6076
|
|
@@ -5841,7 +6086,8 @@ class SecretsMountRedi(dict):
|
|
5841
6086
|
@pulumi.getter
|
5842
6087
|
def port(self) -> Optional[int]:
|
5843
6088
|
"""
|
5844
|
-
The
|
6089
|
+
The default port to connect to if no port is specified as
|
6090
|
+
part of the host.
|
5845
6091
|
"""
|
5846
6092
|
return pulumi.get(self, "port")
|
5847
6093
|
|
@@ -5857,7 +6103,7 @@ class SecretsMountRedi(dict):
|
|
5857
6103
|
@pulumi.getter
|
5858
6104
|
def tls(self) -> Optional[bool]:
|
5859
6105
|
"""
|
5860
|
-
|
6106
|
+
Whether to use TLS when connecting to Cassandra.
|
5861
6107
|
"""
|
5862
6108
|
return pulumi.get(self, "tls")
|
5863
6109
|
|
@@ -5909,17 +6155,19 @@ class SecretsMountRedisElasticach(dict):
|
|
5909
6155
|
verify_connection: Optional[bool] = None):
|
5910
6156
|
"""
|
5911
6157
|
:param str name: Name of the database connection.
|
5912
|
-
:param str url: The
|
6158
|
+
:param str url: The URL for Elasticsearch's API. https requires certificate
|
6159
|
+
by trusted CA if used.
|
5913
6160
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
5914
6161
|
connection.
|
5915
6162
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5916
6163
|
|
5917
6164
|
Supported list of database secrets engines that can be configured:
|
5918
|
-
:param str password: The
|
6165
|
+
:param str password: The root credential password used in the connection URL.
|
5919
6166
|
:param str plugin_name: Specifies the name of the plugin to use.
|
5920
|
-
:param str region: The AWS region where the ElastiCache cluster is hosted.
|
6167
|
+
:param str region: The AWS region where the ElastiCache cluster is hosted.
|
6168
|
+
If omitted the plugin tries to infer the region from the environment.
|
5921
6169
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5922
|
-
:param str username: The
|
6170
|
+
:param str username: The root credential username used in the connection URL.
|
5923
6171
|
:param bool verify_connection: Whether the connection should be verified on
|
5924
6172
|
initial configuration or not.
|
5925
6173
|
"""
|
@@ -5954,7 +6202,8 @@ class SecretsMountRedisElasticach(dict):
|
|
5954
6202
|
@pulumi.getter
|
5955
6203
|
def url(self) -> str:
|
5956
6204
|
"""
|
5957
|
-
The
|
6205
|
+
The URL for Elasticsearch's API. https requires certificate
|
6206
|
+
by trusted CA if used.
|
5958
6207
|
"""
|
5959
6208
|
return pulumi.get(self, "url")
|
5960
6209
|
|
@@ -5981,7 +6230,7 @@ class SecretsMountRedisElasticach(dict):
|
|
5981
6230
|
@pulumi.getter
|
5982
6231
|
def password(self) -> Optional[str]:
|
5983
6232
|
"""
|
5984
|
-
The
|
6233
|
+
The root credential password used in the connection URL.
|
5985
6234
|
"""
|
5986
6235
|
return pulumi.get(self, "password")
|
5987
6236
|
|
@@ -5997,7 +6246,8 @@ class SecretsMountRedisElasticach(dict):
|
|
5997
6246
|
@pulumi.getter
|
5998
6247
|
def region(self) -> Optional[str]:
|
5999
6248
|
"""
|
6000
|
-
The AWS region where the ElastiCache cluster is hosted.
|
6249
|
+
The AWS region where the ElastiCache cluster is hosted.
|
6250
|
+
If omitted the plugin tries to infer the region from the environment.
|
6001
6251
|
"""
|
6002
6252
|
return pulumi.get(self, "region")
|
6003
6253
|
|
@@ -6013,7 +6263,7 @@ class SecretsMountRedisElasticach(dict):
|
|
6013
6263
|
@pulumi.getter
|
6014
6264
|
def username(self) -> Optional[str]:
|
6015
6265
|
"""
|
6016
|
-
The
|
6266
|
+
The root credential username used in the connection URL.
|
6017
6267
|
"""
|
6018
6268
|
return pulumi.get(self, "username")
|
6019
6269
|
|
@@ -6083,19 +6333,22 @@ class SecretsMountRedshift(dict):
|
|
6083
6333
|
:param str name: Name of the database connection.
|
6084
6334
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
6085
6335
|
connection.
|
6086
|
-
:param str connection_url:
|
6336
|
+
:param str connection_url: Specifies the Redshift DSN.
|
6337
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
6087
6338
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6088
6339
|
|
6089
6340
|
Supported list of database secrets engines that can be configured:
|
6090
|
-
:param bool disable_escaping: Disable special character escaping in username and password
|
6091
|
-
:param int max_connection_lifetime:
|
6092
|
-
:param int max_idle_connections:
|
6093
|
-
|
6094
|
-
:param
|
6341
|
+
:param bool disable_escaping: Disable special character escaping in username and password.
|
6342
|
+
:param int max_connection_lifetime: The maximum amount of time a connection may be reused.
|
6343
|
+
:param int max_idle_connections: The maximum number of idle connections to
|
6344
|
+
the database.
|
6345
|
+
:param int max_open_connections: The maximum number of open connections to
|
6346
|
+
the database.
|
6347
|
+
:param str password: The root credential password used in the connection URL.
|
6095
6348
|
:param str plugin_name: Specifies the name of the plugin to use.
|
6096
6349
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
6097
|
-
:param str username: The root credential username used in the connection URL
|
6098
|
-
:param str username_template:
|
6350
|
+
:param str username: The root credential username used in the connection URL.
|
6351
|
+
:param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
6099
6352
|
:param bool verify_connection: Whether the connection should be verified on
|
6100
6353
|
initial configuration or not.
|
6101
6354
|
"""
|
@@ -6148,7 +6401,8 @@ class SecretsMountRedshift(dict):
|
|
6148
6401
|
@pulumi.getter(name="connectionUrl")
|
6149
6402
|
def connection_url(self) -> Optional[str]:
|
6150
6403
|
"""
|
6151
|
-
|
6404
|
+
Specifies the Redshift DSN.
|
6405
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
6152
6406
|
"""
|
6153
6407
|
return pulumi.get(self, "connection_url")
|
6154
6408
|
|
@@ -6166,7 +6420,7 @@ class SecretsMountRedshift(dict):
|
|
6166
6420
|
@pulumi.getter(name="disableEscaping")
|
6167
6421
|
def disable_escaping(self) -> Optional[bool]:
|
6168
6422
|
"""
|
6169
|
-
Disable special character escaping in username and password
|
6423
|
+
Disable special character escaping in username and password.
|
6170
6424
|
"""
|
6171
6425
|
return pulumi.get(self, "disable_escaping")
|
6172
6426
|
|
@@ -6174,7 +6428,7 @@ class SecretsMountRedshift(dict):
|
|
6174
6428
|
@pulumi.getter(name="maxConnectionLifetime")
|
6175
6429
|
def max_connection_lifetime(self) -> Optional[int]:
|
6176
6430
|
"""
|
6177
|
-
|
6431
|
+
The maximum amount of time a connection may be reused.
|
6178
6432
|
"""
|
6179
6433
|
return pulumi.get(self, "max_connection_lifetime")
|
6180
6434
|
|
@@ -6182,7 +6436,8 @@ class SecretsMountRedshift(dict):
|
|
6182
6436
|
@pulumi.getter(name="maxIdleConnections")
|
6183
6437
|
def max_idle_connections(self) -> Optional[int]:
|
6184
6438
|
"""
|
6185
|
-
|
6439
|
+
The maximum number of idle connections to
|
6440
|
+
the database.
|
6186
6441
|
"""
|
6187
6442
|
return pulumi.get(self, "max_idle_connections")
|
6188
6443
|
|
@@ -6190,7 +6445,8 @@ class SecretsMountRedshift(dict):
|
|
6190
6445
|
@pulumi.getter(name="maxOpenConnections")
|
6191
6446
|
def max_open_connections(self) -> Optional[int]:
|
6192
6447
|
"""
|
6193
|
-
|
6448
|
+
The maximum number of open connections to
|
6449
|
+
the database.
|
6194
6450
|
"""
|
6195
6451
|
return pulumi.get(self, "max_open_connections")
|
6196
6452
|
|
@@ -6198,7 +6454,7 @@ class SecretsMountRedshift(dict):
|
|
6198
6454
|
@pulumi.getter
|
6199
6455
|
def password(self) -> Optional[str]:
|
6200
6456
|
"""
|
6201
|
-
The root credential password used in the connection URL
|
6457
|
+
The root credential password used in the connection URL.
|
6202
6458
|
"""
|
6203
6459
|
return pulumi.get(self, "password")
|
6204
6460
|
|
@@ -6222,7 +6478,7 @@ class SecretsMountRedshift(dict):
|
|
6222
6478
|
@pulumi.getter
|
6223
6479
|
def username(self) -> Optional[str]:
|
6224
6480
|
"""
|
6225
|
-
The root credential username used in the connection URL
|
6481
|
+
The root credential username used in the connection URL.
|
6226
6482
|
"""
|
6227
6483
|
return pulumi.get(self, "username")
|
6228
6484
|
|
@@ -6230,7 +6486,7 @@ class SecretsMountRedshift(dict):
|
|
6230
6486
|
@pulumi.getter(name="usernameTemplate")
|
6231
6487
|
def username_template(self) -> Optional[str]:
|
6232
6488
|
"""
|
6233
|
-
|
6489
|
+
[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
6234
6490
|
"""
|
6235
6491
|
return pulumi.get(self, "username_template")
|
6236
6492
|
|
@@ -6297,18 +6553,21 @@ class SecretsMountSnowflake(dict):
|
|
6297
6553
|
:param str name: Name of the database connection.
|
6298
6554
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
6299
6555
|
connection.
|
6300
|
-
:param str connection_url:
|
6556
|
+
:param str connection_url: Specifies the Redshift DSN.
|
6557
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
6301
6558
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6302
6559
|
|
6303
6560
|
Supported list of database secrets engines that can be configured:
|
6304
|
-
:param int max_connection_lifetime:
|
6305
|
-
:param int max_idle_connections:
|
6306
|
-
|
6307
|
-
:param
|
6561
|
+
:param int max_connection_lifetime: The maximum amount of time a connection may be reused.
|
6562
|
+
:param int max_idle_connections: The maximum number of idle connections to
|
6563
|
+
the database.
|
6564
|
+
:param int max_open_connections: The maximum number of open connections to
|
6565
|
+
the database.
|
6566
|
+
:param str password: The root credential password used in the connection URL.
|
6308
6567
|
:param str plugin_name: Specifies the name of the plugin to use.
|
6309
6568
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
6310
|
-
:param str username: The root credential username used in the connection URL
|
6311
|
-
:param str username_template:
|
6569
|
+
:param str username: The root credential username used in the connection URL.
|
6570
|
+
:param str username_template: [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
6312
6571
|
:param bool verify_connection: Whether the connection should be verified on
|
6313
6572
|
initial configuration or not.
|
6314
6573
|
"""
|
@@ -6359,7 +6618,8 @@ class SecretsMountSnowflake(dict):
|
|
6359
6618
|
@pulumi.getter(name="connectionUrl")
|
6360
6619
|
def connection_url(self) -> Optional[str]:
|
6361
6620
|
"""
|
6362
|
-
|
6621
|
+
Specifies the Redshift DSN.
|
6622
|
+
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
6363
6623
|
"""
|
6364
6624
|
return pulumi.get(self, "connection_url")
|
6365
6625
|
|
@@ -6377,7 +6637,7 @@ class SecretsMountSnowflake(dict):
|
|
6377
6637
|
@pulumi.getter(name="maxConnectionLifetime")
|
6378
6638
|
def max_connection_lifetime(self) -> Optional[int]:
|
6379
6639
|
"""
|
6380
|
-
|
6640
|
+
The maximum amount of time a connection may be reused.
|
6381
6641
|
"""
|
6382
6642
|
return pulumi.get(self, "max_connection_lifetime")
|
6383
6643
|
|
@@ -6385,7 +6645,8 @@ class SecretsMountSnowflake(dict):
|
|
6385
6645
|
@pulumi.getter(name="maxIdleConnections")
|
6386
6646
|
def max_idle_connections(self) -> Optional[int]:
|
6387
6647
|
"""
|
6388
|
-
|
6648
|
+
The maximum number of idle connections to
|
6649
|
+
the database.
|
6389
6650
|
"""
|
6390
6651
|
return pulumi.get(self, "max_idle_connections")
|
6391
6652
|
|
@@ -6393,7 +6654,8 @@ class SecretsMountSnowflake(dict):
|
|
6393
6654
|
@pulumi.getter(name="maxOpenConnections")
|
6394
6655
|
def max_open_connections(self) -> Optional[int]:
|
6395
6656
|
"""
|
6396
|
-
|
6657
|
+
The maximum number of open connections to
|
6658
|
+
the database.
|
6397
6659
|
"""
|
6398
6660
|
return pulumi.get(self, "max_open_connections")
|
6399
6661
|
|
@@ -6401,7 +6663,7 @@ class SecretsMountSnowflake(dict):
|
|
6401
6663
|
@pulumi.getter
|
6402
6664
|
def password(self) -> Optional[str]:
|
6403
6665
|
"""
|
6404
|
-
The root credential password used in the connection URL
|
6666
|
+
The root credential password used in the connection URL.
|
6405
6667
|
"""
|
6406
6668
|
return pulumi.get(self, "password")
|
6407
6669
|
|
@@ -6425,7 +6687,7 @@ class SecretsMountSnowflake(dict):
|
|
6425
6687
|
@pulumi.getter
|
6426
6688
|
def username(self) -> Optional[str]:
|
6427
6689
|
"""
|
6428
|
-
The root credential username used in the connection URL
|
6690
|
+
The root credential username used in the connection URL.
|
6429
6691
|
"""
|
6430
6692
|
return pulumi.get(self, "username")
|
6431
6693
|
|
@@ -6433,7 +6695,7 @@ class SecretsMountSnowflake(dict):
|
|
6433
6695
|
@pulumi.getter(name="usernameTemplate")
|
6434
6696
|
def username_template(self) -> Optional[str]:
|
6435
6697
|
"""
|
6436
|
-
|
6698
|
+
[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
6437
6699
|
"""
|
6438
6700
|
return pulumi.get(self, "username_template")
|
6439
6701
|
|