pulumi-vault 6.2.0a1713561465__py3-none-any.whl → 6.2.0a1714114277__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +0 -4
- pulumi_vault/ad/secret_library.py +0 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +0 -8
- pulumi_vault/audit_request_header.py +0 -4
- pulumi_vault/aws/auth_backend_client.py +0 -4
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -4
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -4
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend_role.py +0 -4
- pulumi_vault/aws/secret_backend_static_role.py +0 -4
- pulumi_vault/azure/auth_backend_config.py +0 -4
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +0 -8
- pulumi_vault/azure/backend_role.py +0 -4
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +63 -200
- pulumi_vault/consul/secret_backend.py +0 -8
- pulumi_vault/consul/secret_backend_role.py +0 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +0 -4
- pulumi_vault/database/secret_backend_role.py +0 -4
- pulumi_vault/database/secret_backend_static_role.py +0 -4
- pulumi_vault/database/secrets_mount.py +0 -4
- pulumi_vault/egp_policy.py +0 -4
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +0 -4
- pulumi_vault/gcp/secret_impersonated_account.py +0 -4
- pulumi_vault/gcp/secret_roleset.py +0 -4
- pulumi_vault/gcp/secret_static_account.py +0 -4
- pulumi_vault/generic/endpoint.py +0 -4
- pulumi_vault/generic/get_secret.py +0 -8
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +0 -8
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +0 -4
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +0 -4
- pulumi_vault/github/user.py +0 -4
- pulumi_vault/identity/entity.py +0 -4
- pulumi_vault/identity/entity_alias.py +0 -4
- pulumi_vault/identity/entity_policies.py +0 -8
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +0 -4
- pulumi_vault/identity/get_oidc_openid_config.py +0 -4
- pulumi_vault/identity/get_oidc_public_keys.py +0 -4
- pulumi_vault/identity/group.py +0 -12
- pulumi_vault/identity/group_alias.py +0 -4
- pulumi_vault/identity/group_member_entity_ids.py +0 -8
- pulumi_vault/identity/group_member_group_ids.py +0 -8
- pulumi_vault/identity/group_policies.py +0 -8
- pulumi_vault/identity/mfa_duo.py +0 -4
- pulumi_vault/identity/mfa_login_enforcement.py +0 -4
- pulumi_vault/identity/mfa_okta.py +0 -4
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +0 -4
- pulumi_vault/identity/oidc_client.py +0 -4
- pulumi_vault/identity/oidc_key.py +0 -4
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -4
- pulumi_vault/identity/oidc_provider.py +0 -4
- pulumi_vault/identity/oidc_role.py +0 -8
- pulumi_vault/identity/oidc_scope.py +0 -4
- pulumi_vault/jwt/auth_backend.py +0 -12
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +0 -4
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +0 -4
- pulumi_vault/kubernetes/secret_backend.py +0 -4
- pulumi_vault/kubernetes/secret_backend_role.py +0 -12
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +0 -4
- pulumi_vault/kv/get_secret_v2.py +0 -4
- pulumi_vault/kv/get_secrets_list.py +0 -4
- pulumi_vault/kv/get_secrets_list_v2.py +0 -4
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +0 -4
- pulumi_vault/ldap/auth_backend.py +56 -151
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +0 -4
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +0 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +0 -4
- pulumi_vault/mfa_okta.py +0 -4
- pulumi_vault/mfa_pingid.py +0 -4
- pulumi_vault/mfa_totp.py +0 -4
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +0 -4
- pulumi_vault/mount.py +0 -16
- pulumi_vault/nomad_secret_backend.py +0 -4
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +0 -4
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +0 -4
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +0 -4
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -4
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +0 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -4
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -4
- pulumi_vault/quota_lease_count.py +0 -4
- pulumi_vault/quota_rate_limit.py +0 -4
- pulumi_vault/rabbitmq/secret_backend.py +0 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +91 -292
- pulumi_vault/rgp_policy.py +0 -4
- pulumi_vault/saml/auth_backend.py +0 -4
- pulumi_vault/saml/auth_backend_role.py +56 -172
- pulumi_vault/secrets/sync_association.py +0 -4
- pulumi_vault/secrets/sync_aws_destination.py +0 -4
- pulumi_vault/secrets/sync_azure_destination.py +0 -4
- pulumi_vault/secrets/sync_config.py +0 -4
- pulumi_vault/secrets/sync_gcp_destination.py +0 -4
- pulumi_vault/secrets/sync_gh_destination.py +0 -4
- pulumi_vault/secrets/sync_github_apps.py +0 -4
- pulumi_vault/secrets/sync_vercel_destination.py +0 -4
- pulumi_vault/ssh/_inputs.py +6 -20
- pulumi_vault/ssh/outputs.py +6 -20
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +0 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -4
- pulumi_vault/terraformcloud/secret_creds.py +0 -4
- pulumi_vault/terraformcloud/secret_role.py +0 -4
- pulumi_vault/token.py +0 -4
- pulumi_vault/tokenauth/auth_backend_role.py +56 -172
- pulumi_vault/transform/alphabet.py +0 -4
- pulumi_vault/transform/get_decode.py +0 -4
- pulumi_vault/transform/get_encode.py +0 -4
- pulumi_vault/transform/role.py +0 -4
- pulumi_vault/transform/template.py +0 -4
- pulumi_vault/transit/get_decrypt.py +0 -16
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +0 -4
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1714114277.dist-info/RECORD +252 -0
- pulumi_vault-6.2.0a1713561465.dist-info/RECORD +0 -252
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/top_level.txt +0 -0
pulumi_vault/database/outputs.py
CHANGED
@@ -87,20 +87,16 @@ class SecretBackendConnectionCassandra(dict):
|
|
87
87
|
tls: Optional[bool] = None,
|
88
88
|
username: Optional[str] = None):
|
89
89
|
"""
|
90
|
-
:param int connect_timeout: The number of seconds to use as a connection
|
91
|
-
|
92
|
-
:param
|
93
|
-
:param
|
94
|
-
|
95
|
-
:param str
|
96
|
-
:param
|
97
|
-
chain.
|
98
|
-
:param str pem_json: A JSON structure configuring the certificate chain.
|
99
|
-
:param int port: The default port to connect to if no port is specified as
|
100
|
-
part of the host.
|
90
|
+
:param int connect_timeout: The number of seconds to use as a connection timeout.
|
91
|
+
:param Sequence[str] hosts: Cassandra hosts to connect to.
|
92
|
+
:param bool insecure_tls: Whether to skip verification of the server certificate when using TLS.
|
93
|
+
:param str password: The password to use when authenticating with Cassandra.
|
94
|
+
:param str pem_bundle: Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
95
|
+
:param str pem_json: Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
96
|
+
:param int port: The transport port to use to connect to Cassandra.
|
101
97
|
:param int protocol_version: The CQL protocol version to use.
|
102
98
|
:param bool tls: Whether to use TLS when connecting to Cassandra.
|
103
|
-
:param str username: The username to
|
99
|
+
:param str username: The username to use when authenticating with Cassandra.
|
104
100
|
"""
|
105
101
|
if connect_timeout is not None:
|
106
102
|
pulumi.set(__self__, "connect_timeout", connect_timeout)
|
@@ -127,8 +123,7 @@ class SecretBackendConnectionCassandra(dict):
|
|
127
123
|
@pulumi.getter(name="connectTimeout")
|
128
124
|
def connect_timeout(self) -> Optional[int]:
|
129
125
|
"""
|
130
|
-
The number of seconds to use as a connection
|
131
|
-
timeout.
|
126
|
+
The number of seconds to use as a connection timeout.
|
132
127
|
"""
|
133
128
|
return pulumi.get(self, "connect_timeout")
|
134
129
|
|
@@ -136,7 +131,7 @@ class SecretBackendConnectionCassandra(dict):
|
|
136
131
|
@pulumi.getter
|
137
132
|
def hosts(self) -> Optional[Sequence[str]]:
|
138
133
|
"""
|
139
|
-
|
134
|
+
Cassandra hosts to connect to.
|
140
135
|
"""
|
141
136
|
return pulumi.get(self, "hosts")
|
142
137
|
|
@@ -144,8 +139,7 @@ class SecretBackendConnectionCassandra(dict):
|
|
144
139
|
@pulumi.getter(name="insecureTls")
|
145
140
|
def insecure_tls(self) -> Optional[bool]:
|
146
141
|
"""
|
147
|
-
Whether to skip verification of the server
|
148
|
-
certificate when using TLS.
|
142
|
+
Whether to skip verification of the server certificate when using TLS.
|
149
143
|
"""
|
150
144
|
return pulumi.get(self, "insecure_tls")
|
151
145
|
|
@@ -153,7 +147,7 @@ class SecretBackendConnectionCassandra(dict):
|
|
153
147
|
@pulumi.getter
|
154
148
|
def password(self) -> Optional[str]:
|
155
149
|
"""
|
156
|
-
The password to
|
150
|
+
The password to use when authenticating with Cassandra.
|
157
151
|
"""
|
158
152
|
return pulumi.get(self, "password")
|
159
153
|
|
@@ -161,8 +155,7 @@ class SecretBackendConnectionCassandra(dict):
|
|
161
155
|
@pulumi.getter(name="pemBundle")
|
162
156
|
def pem_bundle(self) -> Optional[str]:
|
163
157
|
"""
|
164
|
-
Concatenated PEM blocks
|
165
|
-
chain.
|
158
|
+
Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
166
159
|
"""
|
167
160
|
return pulumi.get(self, "pem_bundle")
|
168
161
|
|
@@ -170,7 +163,7 @@ class SecretBackendConnectionCassandra(dict):
|
|
170
163
|
@pulumi.getter(name="pemJson")
|
171
164
|
def pem_json(self) -> Optional[str]:
|
172
165
|
"""
|
173
|
-
|
166
|
+
Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
174
167
|
"""
|
175
168
|
return pulumi.get(self, "pem_json")
|
176
169
|
|
@@ -178,8 +171,7 @@ class SecretBackendConnectionCassandra(dict):
|
|
178
171
|
@pulumi.getter
|
179
172
|
def port(self) -> Optional[int]:
|
180
173
|
"""
|
181
|
-
The
|
182
|
-
part of the host.
|
174
|
+
The transport port to use to connect to Cassandra.
|
183
175
|
"""
|
184
176
|
return pulumi.get(self, "port")
|
185
177
|
|
@@ -203,7 +195,7 @@ class SecretBackendConnectionCassandra(dict):
|
|
203
195
|
@pulumi.getter
|
204
196
|
def username(self) -> Optional[str]:
|
205
197
|
"""
|
206
|
-
The username to
|
198
|
+
The username to use when authenticating with Cassandra.
|
207
199
|
"""
|
208
200
|
return pulumi.get(self, "username")
|
209
201
|
|
@@ -243,14 +235,13 @@ class SecretBackendConnectionCouchbase(dict):
|
|
243
235
|
tls: Optional[bool] = None,
|
244
236
|
username_template: Optional[str] = None):
|
245
237
|
"""
|
246
|
-
:param Sequence[str] hosts:
|
247
|
-
:param str password:
|
248
|
-
:param str username:
|
238
|
+
:param Sequence[str] hosts: A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
|
239
|
+
:param str password: Specifies the password corresponding to the given username.
|
240
|
+
:param str username: Specifies the username for Vault to use.
|
249
241
|
:param str base64_pem: Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
|
250
242
|
:param str bucket_name: Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
|
251
|
-
:param bool insecure_tls:
|
252
|
-
|
253
|
-
:param bool tls: Whether to use TLS when connecting to Cassandra.
|
243
|
+
:param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
|
244
|
+
:param bool tls: Specifies whether to use TLS when connecting to Couchbase.
|
254
245
|
:param str username_template: Template describing how dynamic usernames are generated.
|
255
246
|
"""
|
256
247
|
pulumi.set(__self__, "hosts", hosts)
|
@@ -271,7 +262,7 @@ class SecretBackendConnectionCouchbase(dict):
|
|
271
262
|
@pulumi.getter
|
272
263
|
def hosts(self) -> Sequence[str]:
|
273
264
|
"""
|
274
|
-
|
265
|
+
A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
|
275
266
|
"""
|
276
267
|
return pulumi.get(self, "hosts")
|
277
268
|
|
@@ -279,7 +270,7 @@ class SecretBackendConnectionCouchbase(dict):
|
|
279
270
|
@pulumi.getter
|
280
271
|
def password(self) -> str:
|
281
272
|
"""
|
282
|
-
|
273
|
+
Specifies the password corresponding to the given username.
|
283
274
|
"""
|
284
275
|
return pulumi.get(self, "password")
|
285
276
|
|
@@ -287,7 +278,7 @@ class SecretBackendConnectionCouchbase(dict):
|
|
287
278
|
@pulumi.getter
|
288
279
|
def username(self) -> str:
|
289
280
|
"""
|
290
|
-
|
281
|
+
Specifies the username for Vault to use.
|
291
282
|
"""
|
292
283
|
return pulumi.get(self, "username")
|
293
284
|
|
@@ -311,8 +302,7 @@ class SecretBackendConnectionCouchbase(dict):
|
|
311
302
|
@pulumi.getter(name="insecureTls")
|
312
303
|
def insecure_tls(self) -> Optional[bool]:
|
313
304
|
"""
|
314
|
-
|
315
|
-
certificate when using TLS.
|
305
|
+
Specifies whether to skip verification of the server certificate when using TLS.
|
316
306
|
"""
|
317
307
|
return pulumi.get(self, "insecure_tls")
|
318
308
|
|
@@ -320,7 +310,7 @@ class SecretBackendConnectionCouchbase(dict):
|
|
320
310
|
@pulumi.getter
|
321
311
|
def tls(self) -> Optional[bool]:
|
322
312
|
"""
|
323
|
-
|
313
|
+
Specifies whether to use TLS when connecting to Couchbase.
|
324
314
|
"""
|
325
315
|
return pulumi.get(self, "tls")
|
326
316
|
|
@@ -374,16 +364,15 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
374
364
|
tls_server_name: Optional[str] = None,
|
375
365
|
username_template: Optional[str] = None):
|
376
366
|
"""
|
377
|
-
:param str password: The password to
|
378
|
-
:param str url: The URL for Elasticsearch's API
|
379
|
-
|
380
|
-
:param str
|
381
|
-
:param str
|
382
|
-
:param str
|
383
|
-
:param str
|
384
|
-
:param
|
385
|
-
:param
|
386
|
-
:param str tls_server_name: This, if set, is used to set the SNI host when connecting via TLS.
|
367
|
+
:param str password: The password to be used in the connection URL
|
368
|
+
:param str url: The URL for Elasticsearch's API
|
369
|
+
:param str username: The username to be used in the connection URL
|
370
|
+
:param str ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
371
|
+
:param str ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
372
|
+
:param str client_cert: The path to the certificate for the Elasticsearch client to present for communication
|
373
|
+
:param str client_key: The path to the key for the Elasticsearch client to use for communication
|
374
|
+
:param bool insecure: Whether to disable certificate verification
|
375
|
+
:param str tls_server_name: This, if set, is used to set the SNI host when connecting via TLS
|
387
376
|
:param str username_template: Template describing how dynamic usernames are generated.
|
388
377
|
"""
|
389
378
|
pulumi.set(__self__, "password", password)
|
@@ -408,7 +397,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
408
397
|
@pulumi.getter
|
409
398
|
def password(self) -> str:
|
410
399
|
"""
|
411
|
-
The password to
|
400
|
+
The password to be used in the connection URL
|
412
401
|
"""
|
413
402
|
return pulumi.get(self, "password")
|
414
403
|
|
@@ -416,8 +405,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
416
405
|
@pulumi.getter
|
417
406
|
def url(self) -> str:
|
418
407
|
"""
|
419
|
-
The URL for Elasticsearch's API
|
420
|
-
by trusted CA if used.
|
408
|
+
The URL for Elasticsearch's API
|
421
409
|
"""
|
422
410
|
return pulumi.get(self, "url")
|
423
411
|
|
@@ -425,7 +413,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
425
413
|
@pulumi.getter
|
426
414
|
def username(self) -> str:
|
427
415
|
"""
|
428
|
-
The username to
|
416
|
+
The username to be used in the connection URL
|
429
417
|
"""
|
430
418
|
return pulumi.get(self, "username")
|
431
419
|
|
@@ -433,7 +421,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
433
421
|
@pulumi.getter(name="caCert")
|
434
422
|
def ca_cert(self) -> Optional[str]:
|
435
423
|
"""
|
436
|
-
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
424
|
+
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
437
425
|
"""
|
438
426
|
return pulumi.get(self, "ca_cert")
|
439
427
|
|
@@ -441,7 +429,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
441
429
|
@pulumi.getter(name="caPath")
|
442
430
|
def ca_path(self) -> Optional[str]:
|
443
431
|
"""
|
444
|
-
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
432
|
+
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
445
433
|
"""
|
446
434
|
return pulumi.get(self, "ca_path")
|
447
435
|
|
@@ -449,7 +437,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
449
437
|
@pulumi.getter(name="clientCert")
|
450
438
|
def client_cert(self) -> Optional[str]:
|
451
439
|
"""
|
452
|
-
The path to the certificate for the Elasticsearch client to present for communication
|
440
|
+
The path to the certificate for the Elasticsearch client to present for communication
|
453
441
|
"""
|
454
442
|
return pulumi.get(self, "client_cert")
|
455
443
|
|
@@ -457,7 +445,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
457
445
|
@pulumi.getter(name="clientKey")
|
458
446
|
def client_key(self) -> Optional[str]:
|
459
447
|
"""
|
460
|
-
The path to the key for the Elasticsearch client to use for communication
|
448
|
+
The path to the key for the Elasticsearch client to use for communication
|
461
449
|
"""
|
462
450
|
return pulumi.get(self, "client_key")
|
463
451
|
|
@@ -465,7 +453,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
465
453
|
@pulumi.getter
|
466
454
|
def insecure(self) -> Optional[bool]:
|
467
455
|
"""
|
468
|
-
Whether to disable certificate verification
|
456
|
+
Whether to disable certificate verification
|
469
457
|
"""
|
470
458
|
return pulumi.get(self, "insecure")
|
471
459
|
|
@@ -473,7 +461,7 @@ class SecretBackendConnectionElasticsearch(dict):
|
|
473
461
|
@pulumi.getter(name="tlsServerName")
|
474
462
|
def tls_server_name(self) -> Optional[str]:
|
475
463
|
"""
|
476
|
-
This, if set, is used to set the SNI host when connecting via TLS
|
464
|
+
This, if set, is used to set the SNI host when connecting via TLS
|
477
465
|
"""
|
478
466
|
return pulumi.get(self, "tls_server_name")
|
479
467
|
|
@@ -522,19 +510,13 @@ class SecretBackendConnectionHana(dict):
|
|
522
510
|
password: Optional[str] = None,
|
523
511
|
username: Optional[str] = None):
|
524
512
|
"""
|
525
|
-
:param str connection_url:
|
526
|
-
|
527
|
-
|
528
|
-
|
529
|
-
:param
|
530
|
-
:param
|
531
|
-
|
532
|
-
:param int max_idle_connections: The maximum number of idle connections to
|
533
|
-
maintain.
|
534
|
-
:param int max_open_connections: The maximum number of open connections to
|
535
|
-
use.
|
536
|
-
:param str password: The password to authenticate with.
|
537
|
-
:param str username: The username to authenticate with.
|
513
|
+
:param str connection_url: Connection string to use to connect to the database.
|
514
|
+
:param bool disable_escaping: Disable special character escaping in username and password
|
515
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
516
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
517
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
518
|
+
:param str password: The root credential password used in the connection URL
|
519
|
+
:param str username: The root credential username used in the connection URL
|
538
520
|
"""
|
539
521
|
if connection_url is not None:
|
540
522
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -555,10 +537,7 @@ class SecretBackendConnectionHana(dict):
|
|
555
537
|
@pulumi.getter(name="connectionUrl")
|
556
538
|
def connection_url(self) -> Optional[str]:
|
557
539
|
"""
|
558
|
-
|
559
|
-
the [Vault
|
560
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
561
|
-
for an example.
|
540
|
+
Connection string to use to connect to the database.
|
562
541
|
"""
|
563
542
|
return pulumi.get(self, "connection_url")
|
564
543
|
|
@@ -566,7 +545,7 @@ class SecretBackendConnectionHana(dict):
|
|
566
545
|
@pulumi.getter(name="disableEscaping")
|
567
546
|
def disable_escaping(self) -> Optional[bool]:
|
568
547
|
"""
|
569
|
-
Disable special character escaping in username and password
|
548
|
+
Disable special character escaping in username and password
|
570
549
|
"""
|
571
550
|
return pulumi.get(self, "disable_escaping")
|
572
551
|
|
@@ -574,8 +553,7 @@ class SecretBackendConnectionHana(dict):
|
|
574
553
|
@pulumi.getter(name="maxConnectionLifetime")
|
575
554
|
def max_connection_lifetime(self) -> Optional[int]:
|
576
555
|
"""
|
577
|
-
|
578
|
-
a connection alive for.
|
556
|
+
Maximum number of seconds a connection may be reused.
|
579
557
|
"""
|
580
558
|
return pulumi.get(self, "max_connection_lifetime")
|
581
559
|
|
@@ -583,8 +561,7 @@ class SecretBackendConnectionHana(dict):
|
|
583
561
|
@pulumi.getter(name="maxIdleConnections")
|
584
562
|
def max_idle_connections(self) -> Optional[int]:
|
585
563
|
"""
|
586
|
-
|
587
|
-
maintain.
|
564
|
+
Maximum number of idle connections to the database.
|
588
565
|
"""
|
589
566
|
return pulumi.get(self, "max_idle_connections")
|
590
567
|
|
@@ -592,8 +569,7 @@ class SecretBackendConnectionHana(dict):
|
|
592
569
|
@pulumi.getter(name="maxOpenConnections")
|
593
570
|
def max_open_connections(self) -> Optional[int]:
|
594
571
|
"""
|
595
|
-
|
596
|
-
use.
|
572
|
+
Maximum number of open connections to the database.
|
597
573
|
"""
|
598
574
|
return pulumi.get(self, "max_open_connections")
|
599
575
|
|
@@ -601,7 +577,7 @@ class SecretBackendConnectionHana(dict):
|
|
601
577
|
@pulumi.getter
|
602
578
|
def password(self) -> Optional[str]:
|
603
579
|
"""
|
604
|
-
The password
|
580
|
+
The root credential password used in the connection URL
|
605
581
|
"""
|
606
582
|
return pulumi.get(self, "password")
|
607
583
|
|
@@ -609,7 +585,7 @@ class SecretBackendConnectionHana(dict):
|
|
609
585
|
@pulumi.getter
|
610
586
|
def username(self) -> Optional[str]:
|
611
587
|
"""
|
612
|
-
The username
|
588
|
+
The root credential username used in the connection URL
|
613
589
|
"""
|
614
590
|
return pulumi.get(self, "username")
|
615
591
|
|
@@ -653,19 +629,15 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
653
629
|
tls: Optional[bool] = None,
|
654
630
|
username_template: Optional[str] = None):
|
655
631
|
"""
|
656
|
-
:param str host:
|
657
|
-
:param str password:
|
658
|
-
:param str username:
|
659
|
-
:param int connect_timeout: The number of seconds to use as a connection
|
660
|
-
|
661
|
-
:param
|
662
|
-
|
663
|
-
:param
|
664
|
-
|
665
|
-
:param str pem_json: A JSON structure configuring the certificate chain.
|
666
|
-
:param int port: The default port to connect to if no port is specified as
|
667
|
-
part of the host.
|
668
|
-
:param bool tls: Whether to use TLS when connecting to Cassandra.
|
632
|
+
:param str host: Influxdb host to connect to.
|
633
|
+
:param str password: Specifies the password corresponding to the given username.
|
634
|
+
:param str username: Specifies the username to use for superuser access.
|
635
|
+
:param int connect_timeout: The number of seconds to use as a connection timeout.
|
636
|
+
:param bool insecure_tls: Whether to skip verification of the server certificate when using TLS.
|
637
|
+
:param str pem_bundle: Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
638
|
+
:param str pem_json: Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
639
|
+
:param int port: The transport port to use to connect to Influxdb.
|
640
|
+
:param bool tls: Whether to use TLS when connecting to Influxdb.
|
669
641
|
:param str username_template: Template describing how dynamic usernames are generated.
|
670
642
|
"""
|
671
643
|
pulumi.set(__self__, "host", host)
|
@@ -690,7 +662,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
690
662
|
@pulumi.getter
|
691
663
|
def host(self) -> str:
|
692
664
|
"""
|
693
|
-
|
665
|
+
Influxdb host to connect to.
|
694
666
|
"""
|
695
667
|
return pulumi.get(self, "host")
|
696
668
|
|
@@ -698,7 +670,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
698
670
|
@pulumi.getter
|
699
671
|
def password(self) -> str:
|
700
672
|
"""
|
701
|
-
|
673
|
+
Specifies the password corresponding to the given username.
|
702
674
|
"""
|
703
675
|
return pulumi.get(self, "password")
|
704
676
|
|
@@ -706,7 +678,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
706
678
|
@pulumi.getter
|
707
679
|
def username(self) -> str:
|
708
680
|
"""
|
709
|
-
|
681
|
+
Specifies the username to use for superuser access.
|
710
682
|
"""
|
711
683
|
return pulumi.get(self, "username")
|
712
684
|
|
@@ -714,8 +686,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
714
686
|
@pulumi.getter(name="connectTimeout")
|
715
687
|
def connect_timeout(self) -> Optional[int]:
|
716
688
|
"""
|
717
|
-
The number of seconds to use as a connection
|
718
|
-
timeout.
|
689
|
+
The number of seconds to use as a connection timeout.
|
719
690
|
"""
|
720
691
|
return pulumi.get(self, "connect_timeout")
|
721
692
|
|
@@ -723,8 +694,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
723
694
|
@pulumi.getter(name="insecureTls")
|
724
695
|
def insecure_tls(self) -> Optional[bool]:
|
725
696
|
"""
|
726
|
-
Whether to skip verification of the server
|
727
|
-
certificate when using TLS.
|
697
|
+
Whether to skip verification of the server certificate when using TLS.
|
728
698
|
"""
|
729
699
|
return pulumi.get(self, "insecure_tls")
|
730
700
|
|
@@ -732,8 +702,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
732
702
|
@pulumi.getter(name="pemBundle")
|
733
703
|
def pem_bundle(self) -> Optional[str]:
|
734
704
|
"""
|
735
|
-
Concatenated PEM blocks
|
736
|
-
chain.
|
705
|
+
Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
737
706
|
"""
|
738
707
|
return pulumi.get(self, "pem_bundle")
|
739
708
|
|
@@ -741,7 +710,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
741
710
|
@pulumi.getter(name="pemJson")
|
742
711
|
def pem_json(self) -> Optional[str]:
|
743
712
|
"""
|
744
|
-
|
713
|
+
Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
745
714
|
"""
|
746
715
|
return pulumi.get(self, "pem_json")
|
747
716
|
|
@@ -749,8 +718,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
749
718
|
@pulumi.getter
|
750
719
|
def port(self) -> Optional[int]:
|
751
720
|
"""
|
752
|
-
The
|
753
|
-
part of the host.
|
721
|
+
The transport port to use to connect to Influxdb.
|
754
722
|
"""
|
755
723
|
return pulumi.get(self, "port")
|
756
724
|
|
@@ -758,7 +726,7 @@ class SecretBackendConnectionInfluxdb(dict):
|
|
758
726
|
@pulumi.getter
|
759
727
|
def tls(self) -> Optional[bool]:
|
760
728
|
"""
|
761
|
-
Whether to use TLS when connecting to
|
729
|
+
Whether to use TLS when connecting to Influxdb.
|
762
730
|
"""
|
763
731
|
return pulumi.get(self, "tls")
|
764
732
|
|
@@ -807,19 +775,13 @@ class SecretBackendConnectionMongodb(dict):
|
|
807
775
|
username: Optional[str] = None,
|
808
776
|
username_template: Optional[str] = None):
|
809
777
|
"""
|
810
|
-
:param str connection_url:
|
811
|
-
|
812
|
-
|
813
|
-
|
814
|
-
:param
|
815
|
-
|
816
|
-
:param
|
817
|
-
maintain.
|
818
|
-
:param int max_open_connections: The maximum number of open connections to
|
819
|
-
use.
|
820
|
-
:param str password: The password to authenticate with.
|
821
|
-
:param str username: The username to authenticate with.
|
822
|
-
:param str username_template: Template describing how dynamic usernames are generated.
|
778
|
+
:param str connection_url: Connection string to use to connect to the database.
|
779
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
780
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
781
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
782
|
+
:param str password: The root credential password used in the connection URL
|
783
|
+
:param str username: The root credential username used in the connection URL
|
784
|
+
:param str username_template: Username generation template.
|
823
785
|
"""
|
824
786
|
if connection_url is not None:
|
825
787
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -840,10 +802,7 @@ class SecretBackendConnectionMongodb(dict):
|
|
840
802
|
@pulumi.getter(name="connectionUrl")
|
841
803
|
def connection_url(self) -> Optional[str]:
|
842
804
|
"""
|
843
|
-
|
844
|
-
the [Vault
|
845
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
846
|
-
for an example.
|
805
|
+
Connection string to use to connect to the database.
|
847
806
|
"""
|
848
807
|
return pulumi.get(self, "connection_url")
|
849
808
|
|
@@ -851,8 +810,7 @@ class SecretBackendConnectionMongodb(dict):
|
|
851
810
|
@pulumi.getter(name="maxConnectionLifetime")
|
852
811
|
def max_connection_lifetime(self) -> Optional[int]:
|
853
812
|
"""
|
854
|
-
|
855
|
-
a connection alive for.
|
813
|
+
Maximum number of seconds a connection may be reused.
|
856
814
|
"""
|
857
815
|
return pulumi.get(self, "max_connection_lifetime")
|
858
816
|
|
@@ -860,8 +818,7 @@ class SecretBackendConnectionMongodb(dict):
|
|
860
818
|
@pulumi.getter(name="maxIdleConnections")
|
861
819
|
def max_idle_connections(self) -> Optional[int]:
|
862
820
|
"""
|
863
|
-
|
864
|
-
maintain.
|
821
|
+
Maximum number of idle connections to the database.
|
865
822
|
"""
|
866
823
|
return pulumi.get(self, "max_idle_connections")
|
867
824
|
|
@@ -869,8 +826,7 @@ class SecretBackendConnectionMongodb(dict):
|
|
869
826
|
@pulumi.getter(name="maxOpenConnections")
|
870
827
|
def max_open_connections(self) -> Optional[int]:
|
871
828
|
"""
|
872
|
-
|
873
|
-
use.
|
829
|
+
Maximum number of open connections to the database.
|
874
830
|
"""
|
875
831
|
return pulumi.get(self, "max_open_connections")
|
876
832
|
|
@@ -878,7 +834,7 @@ class SecretBackendConnectionMongodb(dict):
|
|
878
834
|
@pulumi.getter
|
879
835
|
def password(self) -> Optional[str]:
|
880
836
|
"""
|
881
|
-
The password
|
837
|
+
The root credential password used in the connection URL
|
882
838
|
"""
|
883
839
|
return pulumi.get(self, "password")
|
884
840
|
|
@@ -886,7 +842,7 @@ class SecretBackendConnectionMongodb(dict):
|
|
886
842
|
@pulumi.getter
|
887
843
|
def username(self) -> Optional[str]:
|
888
844
|
"""
|
889
|
-
The username
|
845
|
+
The root credential username used in the connection URL
|
890
846
|
"""
|
891
847
|
return pulumi.get(self, "username")
|
892
848
|
|
@@ -894,7 +850,7 @@ class SecretBackendConnectionMongodb(dict):
|
|
894
850
|
@pulumi.getter(name="usernameTemplate")
|
895
851
|
def username_template(self) -> Optional[str]:
|
896
852
|
"""
|
897
|
-
|
853
|
+
Username generation template.
|
898
854
|
"""
|
899
855
|
return pulumi.get(self, "username_template")
|
900
856
|
|
@@ -1002,24 +958,15 @@ class SecretBackendConnectionMssql(dict):
|
|
1002
958
|
username: Optional[str] = None,
|
1003
959
|
username_template: Optional[str] = None):
|
1004
960
|
"""
|
1005
|
-
:param str connection_url:
|
1006
|
-
|
1007
|
-
|
1008
|
-
|
1009
|
-
:param
|
1010
|
-
|
1011
|
-
|
1012
|
-
|
1013
|
-
:param
|
1014
|
-
:param int max_connection_lifetime: The maximum number of seconds to keep
|
1015
|
-
a connection alive for.
|
1016
|
-
:param int max_idle_connections: The maximum number of idle connections to
|
1017
|
-
maintain.
|
1018
|
-
:param int max_open_connections: The maximum number of open connections to
|
1019
|
-
use.
|
1020
|
-
:param str password: The password to authenticate with.
|
1021
|
-
:param str username: The username to authenticate with.
|
1022
|
-
:param str username_template: Template describing how dynamic usernames are generated.
|
961
|
+
:param str connection_url: Connection string to use to connect to the database.
|
962
|
+
:param bool contained_db: Set to true when the target is a Contained Database, e.g. AzureSQL.
|
963
|
+
:param bool disable_escaping: Disable special character escaping in username and password
|
964
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
965
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
966
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
967
|
+
:param str password: The root credential password used in the connection URL
|
968
|
+
:param str username: The root credential username used in the connection URL
|
969
|
+
:param str username_template: Username generation template.
|
1023
970
|
"""
|
1024
971
|
if connection_url is not None:
|
1025
972
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -1044,10 +991,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1044
991
|
@pulumi.getter(name="connectionUrl")
|
1045
992
|
def connection_url(self) -> Optional[str]:
|
1046
993
|
"""
|
1047
|
-
|
1048
|
-
the [Vault
|
1049
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1050
|
-
for an example.
|
994
|
+
Connection string to use to connect to the database.
|
1051
995
|
"""
|
1052
996
|
return pulumi.get(self, "connection_url")
|
1053
997
|
|
@@ -1055,10 +999,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1055
999
|
@pulumi.getter(name="containedDb")
|
1056
1000
|
def contained_db(self) -> Optional[bool]:
|
1057
1001
|
"""
|
1058
|
-
|
1059
|
-
Contained Database, e.g. AzureSQL.
|
1060
|
-
See the [Vault
|
1061
|
-
docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
|
1002
|
+
Set to true when the target is a Contained Database, e.g. AzureSQL.
|
1062
1003
|
"""
|
1063
1004
|
return pulumi.get(self, "contained_db")
|
1064
1005
|
|
@@ -1066,7 +1007,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1066
1007
|
@pulumi.getter(name="disableEscaping")
|
1067
1008
|
def disable_escaping(self) -> Optional[bool]:
|
1068
1009
|
"""
|
1069
|
-
Disable special character escaping in username and password
|
1010
|
+
Disable special character escaping in username and password
|
1070
1011
|
"""
|
1071
1012
|
return pulumi.get(self, "disable_escaping")
|
1072
1013
|
|
@@ -1074,8 +1015,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1074
1015
|
@pulumi.getter(name="maxConnectionLifetime")
|
1075
1016
|
def max_connection_lifetime(self) -> Optional[int]:
|
1076
1017
|
"""
|
1077
|
-
|
1078
|
-
a connection alive for.
|
1018
|
+
Maximum number of seconds a connection may be reused.
|
1079
1019
|
"""
|
1080
1020
|
return pulumi.get(self, "max_connection_lifetime")
|
1081
1021
|
|
@@ -1083,8 +1023,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1083
1023
|
@pulumi.getter(name="maxIdleConnections")
|
1084
1024
|
def max_idle_connections(self) -> Optional[int]:
|
1085
1025
|
"""
|
1086
|
-
|
1087
|
-
maintain.
|
1026
|
+
Maximum number of idle connections to the database.
|
1088
1027
|
"""
|
1089
1028
|
return pulumi.get(self, "max_idle_connections")
|
1090
1029
|
|
@@ -1092,8 +1031,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1092
1031
|
@pulumi.getter(name="maxOpenConnections")
|
1093
1032
|
def max_open_connections(self) -> Optional[int]:
|
1094
1033
|
"""
|
1095
|
-
|
1096
|
-
use.
|
1034
|
+
Maximum number of open connections to the database.
|
1097
1035
|
"""
|
1098
1036
|
return pulumi.get(self, "max_open_connections")
|
1099
1037
|
|
@@ -1101,7 +1039,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1101
1039
|
@pulumi.getter
|
1102
1040
|
def password(self) -> Optional[str]:
|
1103
1041
|
"""
|
1104
|
-
The password
|
1042
|
+
The root credential password used in the connection URL
|
1105
1043
|
"""
|
1106
1044
|
return pulumi.get(self, "password")
|
1107
1045
|
|
@@ -1109,7 +1047,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1109
1047
|
@pulumi.getter
|
1110
1048
|
def username(self) -> Optional[str]:
|
1111
1049
|
"""
|
1112
|
-
The username
|
1050
|
+
The root credential username used in the connection URL
|
1113
1051
|
"""
|
1114
1052
|
return pulumi.get(self, "username")
|
1115
1053
|
|
@@ -1117,7 +1055,7 @@ class SecretBackendConnectionMssql(dict):
|
|
1117
1055
|
@pulumi.getter(name="usernameTemplate")
|
1118
1056
|
def username_template(self) -> Optional[str]:
|
1119
1057
|
"""
|
1120
|
-
|
1058
|
+
Username generation template.
|
1121
1059
|
"""
|
1122
1060
|
return pulumi.get(self, "username_template")
|
1123
1061
|
|
@@ -1170,23 +1108,17 @@ class SecretBackendConnectionMysql(dict):
|
|
1170
1108
|
username: Optional[str] = None,
|
1171
1109
|
username_template: Optional[str] = None):
|
1172
1110
|
"""
|
1173
|
-
:param str auth_type:
|
1174
|
-
:param str connection_url:
|
1175
|
-
|
1176
|
-
|
1177
|
-
|
1178
|
-
:param
|
1179
|
-
|
1180
|
-
:param int max_idle_connections: The maximum number of idle connections to
|
1181
|
-
maintain.
|
1182
|
-
:param int max_open_connections: The maximum number of open connections to
|
1183
|
-
use.
|
1184
|
-
:param str password: The password to authenticate with.
|
1185
|
-
:param str service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1111
|
+
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1112
|
+
:param str connection_url: Connection string to use to connect to the database.
|
1113
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
1114
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
1115
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
1116
|
+
:param str password: The root credential password used in the connection URL
|
1117
|
+
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
1186
1118
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1187
1119
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1188
|
-
:param str username: The username
|
1189
|
-
:param str username_template:
|
1120
|
+
:param str username: The root credential username used in the connection URL
|
1121
|
+
:param str username_template: Username generation template.
|
1190
1122
|
"""
|
1191
1123
|
if auth_type is not None:
|
1192
1124
|
pulumi.set(__self__, "auth_type", auth_type)
|
@@ -1215,7 +1147,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1215
1147
|
@pulumi.getter(name="authType")
|
1216
1148
|
def auth_type(self) -> Optional[str]:
|
1217
1149
|
"""
|
1218
|
-
|
1150
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1219
1151
|
"""
|
1220
1152
|
return pulumi.get(self, "auth_type")
|
1221
1153
|
|
@@ -1223,10 +1155,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1223
1155
|
@pulumi.getter(name="connectionUrl")
|
1224
1156
|
def connection_url(self) -> Optional[str]:
|
1225
1157
|
"""
|
1226
|
-
|
1227
|
-
the [Vault
|
1228
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1229
|
-
for an example.
|
1158
|
+
Connection string to use to connect to the database.
|
1230
1159
|
"""
|
1231
1160
|
return pulumi.get(self, "connection_url")
|
1232
1161
|
|
@@ -1234,8 +1163,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1234
1163
|
@pulumi.getter(name="maxConnectionLifetime")
|
1235
1164
|
def max_connection_lifetime(self) -> Optional[int]:
|
1236
1165
|
"""
|
1237
|
-
|
1238
|
-
a connection alive for.
|
1166
|
+
Maximum number of seconds a connection may be reused.
|
1239
1167
|
"""
|
1240
1168
|
return pulumi.get(self, "max_connection_lifetime")
|
1241
1169
|
|
@@ -1243,8 +1171,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1243
1171
|
@pulumi.getter(name="maxIdleConnections")
|
1244
1172
|
def max_idle_connections(self) -> Optional[int]:
|
1245
1173
|
"""
|
1246
|
-
|
1247
|
-
maintain.
|
1174
|
+
Maximum number of idle connections to the database.
|
1248
1175
|
"""
|
1249
1176
|
return pulumi.get(self, "max_idle_connections")
|
1250
1177
|
|
@@ -1252,8 +1179,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1252
1179
|
@pulumi.getter(name="maxOpenConnections")
|
1253
1180
|
def max_open_connections(self) -> Optional[int]:
|
1254
1181
|
"""
|
1255
|
-
|
1256
|
-
use.
|
1182
|
+
Maximum number of open connections to the database.
|
1257
1183
|
"""
|
1258
1184
|
return pulumi.get(self, "max_open_connections")
|
1259
1185
|
|
@@ -1261,7 +1187,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1261
1187
|
@pulumi.getter
|
1262
1188
|
def password(self) -> Optional[str]:
|
1263
1189
|
"""
|
1264
|
-
The password
|
1190
|
+
The root credential password used in the connection URL
|
1265
1191
|
"""
|
1266
1192
|
return pulumi.get(self, "password")
|
1267
1193
|
|
@@ -1269,7 +1195,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1269
1195
|
@pulumi.getter(name="serviceAccountJson")
|
1270
1196
|
def service_account_json(self) -> Optional[str]:
|
1271
1197
|
"""
|
1272
|
-
JSON
|
1198
|
+
A JSON encoded credential for use with IAM authorization
|
1273
1199
|
"""
|
1274
1200
|
return pulumi.get(self, "service_account_json")
|
1275
1201
|
|
@@ -1293,7 +1219,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1293
1219
|
@pulumi.getter
|
1294
1220
|
def username(self) -> Optional[str]:
|
1295
1221
|
"""
|
1296
|
-
The username
|
1222
|
+
The root credential username used in the connection URL
|
1297
1223
|
"""
|
1298
1224
|
return pulumi.get(self, "username")
|
1299
1225
|
|
@@ -1301,7 +1227,7 @@ class SecretBackendConnectionMysql(dict):
|
|
1301
1227
|
@pulumi.getter(name="usernameTemplate")
|
1302
1228
|
def username_template(self) -> Optional[str]:
|
1303
1229
|
"""
|
1304
|
-
|
1230
|
+
Username generation template.
|
1305
1231
|
"""
|
1306
1232
|
return pulumi.get(self, "username_template")
|
1307
1233
|
|
@@ -1354,23 +1280,17 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1354
1280
|
username: Optional[str] = None,
|
1355
1281
|
username_template: Optional[str] = None):
|
1356
1282
|
"""
|
1357
|
-
:param str auth_type:
|
1358
|
-
:param str connection_url:
|
1359
|
-
|
1360
|
-
|
1361
|
-
|
1362
|
-
:param
|
1363
|
-
|
1364
|
-
:param int max_idle_connections: The maximum number of idle connections to
|
1365
|
-
maintain.
|
1366
|
-
:param int max_open_connections: The maximum number of open connections to
|
1367
|
-
use.
|
1368
|
-
:param str password: The password to authenticate with.
|
1369
|
-
:param str service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1283
|
+
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1284
|
+
:param str connection_url: Connection string to use to connect to the database.
|
1285
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
1286
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
1287
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
1288
|
+
:param str password: The root credential password used in the connection URL
|
1289
|
+
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
1370
1290
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1371
1291
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1372
|
-
:param str username: The username
|
1373
|
-
:param str username_template:
|
1292
|
+
:param str username: The root credential username used in the connection URL
|
1293
|
+
:param str username_template: Username generation template.
|
1374
1294
|
"""
|
1375
1295
|
if auth_type is not None:
|
1376
1296
|
pulumi.set(__self__, "auth_type", auth_type)
|
@@ -1399,7 +1319,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1399
1319
|
@pulumi.getter(name="authType")
|
1400
1320
|
def auth_type(self) -> Optional[str]:
|
1401
1321
|
"""
|
1402
|
-
|
1322
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1403
1323
|
"""
|
1404
1324
|
return pulumi.get(self, "auth_type")
|
1405
1325
|
|
@@ -1407,10 +1327,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1407
1327
|
@pulumi.getter(name="connectionUrl")
|
1408
1328
|
def connection_url(self) -> Optional[str]:
|
1409
1329
|
"""
|
1410
|
-
|
1411
|
-
the [Vault
|
1412
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1413
|
-
for an example.
|
1330
|
+
Connection string to use to connect to the database.
|
1414
1331
|
"""
|
1415
1332
|
return pulumi.get(self, "connection_url")
|
1416
1333
|
|
@@ -1418,8 +1335,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1418
1335
|
@pulumi.getter(name="maxConnectionLifetime")
|
1419
1336
|
def max_connection_lifetime(self) -> Optional[int]:
|
1420
1337
|
"""
|
1421
|
-
|
1422
|
-
a connection alive for.
|
1338
|
+
Maximum number of seconds a connection may be reused.
|
1423
1339
|
"""
|
1424
1340
|
return pulumi.get(self, "max_connection_lifetime")
|
1425
1341
|
|
@@ -1427,8 +1343,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1427
1343
|
@pulumi.getter(name="maxIdleConnections")
|
1428
1344
|
def max_idle_connections(self) -> Optional[int]:
|
1429
1345
|
"""
|
1430
|
-
|
1431
|
-
maintain.
|
1346
|
+
Maximum number of idle connections to the database.
|
1432
1347
|
"""
|
1433
1348
|
return pulumi.get(self, "max_idle_connections")
|
1434
1349
|
|
@@ -1436,8 +1351,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1436
1351
|
@pulumi.getter(name="maxOpenConnections")
|
1437
1352
|
def max_open_connections(self) -> Optional[int]:
|
1438
1353
|
"""
|
1439
|
-
|
1440
|
-
use.
|
1354
|
+
Maximum number of open connections to the database.
|
1441
1355
|
"""
|
1442
1356
|
return pulumi.get(self, "max_open_connections")
|
1443
1357
|
|
@@ -1445,7 +1359,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1445
1359
|
@pulumi.getter
|
1446
1360
|
def password(self) -> Optional[str]:
|
1447
1361
|
"""
|
1448
|
-
The password
|
1362
|
+
The root credential password used in the connection URL
|
1449
1363
|
"""
|
1450
1364
|
return pulumi.get(self, "password")
|
1451
1365
|
|
@@ -1453,7 +1367,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1453
1367
|
@pulumi.getter(name="serviceAccountJson")
|
1454
1368
|
def service_account_json(self) -> Optional[str]:
|
1455
1369
|
"""
|
1456
|
-
JSON
|
1370
|
+
A JSON encoded credential for use with IAM authorization
|
1457
1371
|
"""
|
1458
1372
|
return pulumi.get(self, "service_account_json")
|
1459
1373
|
|
@@ -1477,7 +1391,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1477
1391
|
@pulumi.getter
|
1478
1392
|
def username(self) -> Optional[str]:
|
1479
1393
|
"""
|
1480
|
-
The username
|
1394
|
+
The root credential username used in the connection URL
|
1481
1395
|
"""
|
1482
1396
|
return pulumi.get(self, "username")
|
1483
1397
|
|
@@ -1485,7 +1399,7 @@ class SecretBackendConnectionMysqlAurora(dict):
|
|
1485
1399
|
@pulumi.getter(name="usernameTemplate")
|
1486
1400
|
def username_template(self) -> Optional[str]:
|
1487
1401
|
"""
|
1488
|
-
|
1402
|
+
Username generation template.
|
1489
1403
|
"""
|
1490
1404
|
return pulumi.get(self, "username_template")
|
1491
1405
|
|
@@ -1538,23 +1452,17 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1538
1452
|
username: Optional[str] = None,
|
1539
1453
|
username_template: Optional[str] = None):
|
1540
1454
|
"""
|
1541
|
-
:param str auth_type:
|
1542
|
-
:param str connection_url:
|
1543
|
-
|
1544
|
-
|
1545
|
-
|
1546
|
-
:param
|
1547
|
-
|
1548
|
-
:param int max_idle_connections: The maximum number of idle connections to
|
1549
|
-
maintain.
|
1550
|
-
:param int max_open_connections: The maximum number of open connections to
|
1551
|
-
use.
|
1552
|
-
:param str password: The password to authenticate with.
|
1553
|
-
:param str service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1455
|
+
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1456
|
+
:param str connection_url: Connection string to use to connect to the database.
|
1457
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
1458
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
1459
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
1460
|
+
:param str password: The root credential password used in the connection URL
|
1461
|
+
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
1554
1462
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1555
1463
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1556
|
-
:param str username: The username
|
1557
|
-
:param str username_template:
|
1464
|
+
:param str username: The root credential username used in the connection URL
|
1465
|
+
:param str username_template: Username generation template.
|
1558
1466
|
"""
|
1559
1467
|
if auth_type is not None:
|
1560
1468
|
pulumi.set(__self__, "auth_type", auth_type)
|
@@ -1583,7 +1491,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1583
1491
|
@pulumi.getter(name="authType")
|
1584
1492
|
def auth_type(self) -> Optional[str]:
|
1585
1493
|
"""
|
1586
|
-
|
1494
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1587
1495
|
"""
|
1588
1496
|
return pulumi.get(self, "auth_type")
|
1589
1497
|
|
@@ -1591,10 +1499,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1591
1499
|
@pulumi.getter(name="connectionUrl")
|
1592
1500
|
def connection_url(self) -> Optional[str]:
|
1593
1501
|
"""
|
1594
|
-
|
1595
|
-
the [Vault
|
1596
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1597
|
-
for an example.
|
1502
|
+
Connection string to use to connect to the database.
|
1598
1503
|
"""
|
1599
1504
|
return pulumi.get(self, "connection_url")
|
1600
1505
|
|
@@ -1602,8 +1507,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1602
1507
|
@pulumi.getter(name="maxConnectionLifetime")
|
1603
1508
|
def max_connection_lifetime(self) -> Optional[int]:
|
1604
1509
|
"""
|
1605
|
-
|
1606
|
-
a connection alive for.
|
1510
|
+
Maximum number of seconds a connection may be reused.
|
1607
1511
|
"""
|
1608
1512
|
return pulumi.get(self, "max_connection_lifetime")
|
1609
1513
|
|
@@ -1611,8 +1515,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1611
1515
|
@pulumi.getter(name="maxIdleConnections")
|
1612
1516
|
def max_idle_connections(self) -> Optional[int]:
|
1613
1517
|
"""
|
1614
|
-
|
1615
|
-
maintain.
|
1518
|
+
Maximum number of idle connections to the database.
|
1616
1519
|
"""
|
1617
1520
|
return pulumi.get(self, "max_idle_connections")
|
1618
1521
|
|
@@ -1620,8 +1523,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1620
1523
|
@pulumi.getter(name="maxOpenConnections")
|
1621
1524
|
def max_open_connections(self) -> Optional[int]:
|
1622
1525
|
"""
|
1623
|
-
|
1624
|
-
use.
|
1526
|
+
Maximum number of open connections to the database.
|
1625
1527
|
"""
|
1626
1528
|
return pulumi.get(self, "max_open_connections")
|
1627
1529
|
|
@@ -1629,7 +1531,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1629
1531
|
@pulumi.getter
|
1630
1532
|
def password(self) -> Optional[str]:
|
1631
1533
|
"""
|
1632
|
-
The password
|
1534
|
+
The root credential password used in the connection URL
|
1633
1535
|
"""
|
1634
1536
|
return pulumi.get(self, "password")
|
1635
1537
|
|
@@ -1637,7 +1539,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1637
1539
|
@pulumi.getter(name="serviceAccountJson")
|
1638
1540
|
def service_account_json(self) -> Optional[str]:
|
1639
1541
|
"""
|
1640
|
-
JSON
|
1542
|
+
A JSON encoded credential for use with IAM authorization
|
1641
1543
|
"""
|
1642
1544
|
return pulumi.get(self, "service_account_json")
|
1643
1545
|
|
@@ -1661,7 +1563,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1661
1563
|
@pulumi.getter
|
1662
1564
|
def username(self) -> Optional[str]:
|
1663
1565
|
"""
|
1664
|
-
The username
|
1566
|
+
The root credential username used in the connection URL
|
1665
1567
|
"""
|
1666
1568
|
return pulumi.get(self, "username")
|
1667
1569
|
|
@@ -1669,7 +1571,7 @@ class SecretBackendConnectionMysqlLegacy(dict):
|
|
1669
1571
|
@pulumi.getter(name="usernameTemplate")
|
1670
1572
|
def username_template(self) -> Optional[str]:
|
1671
1573
|
"""
|
1672
|
-
|
1574
|
+
Username generation template.
|
1673
1575
|
"""
|
1674
1576
|
return pulumi.get(self, "username_template")
|
1675
1577
|
|
@@ -1722,23 +1624,17 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1722
1624
|
username: Optional[str] = None,
|
1723
1625
|
username_template: Optional[str] = None):
|
1724
1626
|
"""
|
1725
|
-
:param str auth_type:
|
1726
|
-
:param str connection_url:
|
1727
|
-
|
1728
|
-
|
1729
|
-
|
1730
|
-
:param
|
1731
|
-
|
1732
|
-
:param int max_idle_connections: The maximum number of idle connections to
|
1733
|
-
maintain.
|
1734
|
-
:param int max_open_connections: The maximum number of open connections to
|
1735
|
-
use.
|
1736
|
-
:param str password: The password to authenticate with.
|
1737
|
-
:param str service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1627
|
+
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1628
|
+
:param str connection_url: Connection string to use to connect to the database.
|
1629
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
1630
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
1631
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
1632
|
+
:param str password: The root credential password used in the connection URL
|
1633
|
+
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
1738
1634
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1739
1635
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1740
|
-
:param str username: The username
|
1741
|
-
:param str username_template:
|
1636
|
+
:param str username: The root credential username used in the connection URL
|
1637
|
+
:param str username_template: Username generation template.
|
1742
1638
|
"""
|
1743
1639
|
if auth_type is not None:
|
1744
1640
|
pulumi.set(__self__, "auth_type", auth_type)
|
@@ -1767,7 +1663,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1767
1663
|
@pulumi.getter(name="authType")
|
1768
1664
|
def auth_type(self) -> Optional[str]:
|
1769
1665
|
"""
|
1770
|
-
|
1666
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1771
1667
|
"""
|
1772
1668
|
return pulumi.get(self, "auth_type")
|
1773
1669
|
|
@@ -1775,10 +1671,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1775
1671
|
@pulumi.getter(name="connectionUrl")
|
1776
1672
|
def connection_url(self) -> Optional[str]:
|
1777
1673
|
"""
|
1778
|
-
|
1779
|
-
the [Vault
|
1780
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1781
|
-
for an example.
|
1674
|
+
Connection string to use to connect to the database.
|
1782
1675
|
"""
|
1783
1676
|
return pulumi.get(self, "connection_url")
|
1784
1677
|
|
@@ -1786,8 +1679,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1786
1679
|
@pulumi.getter(name="maxConnectionLifetime")
|
1787
1680
|
def max_connection_lifetime(self) -> Optional[int]:
|
1788
1681
|
"""
|
1789
|
-
|
1790
|
-
a connection alive for.
|
1682
|
+
Maximum number of seconds a connection may be reused.
|
1791
1683
|
"""
|
1792
1684
|
return pulumi.get(self, "max_connection_lifetime")
|
1793
1685
|
|
@@ -1795,8 +1687,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1795
1687
|
@pulumi.getter(name="maxIdleConnections")
|
1796
1688
|
def max_idle_connections(self) -> Optional[int]:
|
1797
1689
|
"""
|
1798
|
-
|
1799
|
-
maintain.
|
1690
|
+
Maximum number of idle connections to the database.
|
1800
1691
|
"""
|
1801
1692
|
return pulumi.get(self, "max_idle_connections")
|
1802
1693
|
|
@@ -1804,8 +1695,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1804
1695
|
@pulumi.getter(name="maxOpenConnections")
|
1805
1696
|
def max_open_connections(self) -> Optional[int]:
|
1806
1697
|
"""
|
1807
|
-
|
1808
|
-
use.
|
1698
|
+
Maximum number of open connections to the database.
|
1809
1699
|
"""
|
1810
1700
|
return pulumi.get(self, "max_open_connections")
|
1811
1701
|
|
@@ -1813,7 +1703,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1813
1703
|
@pulumi.getter
|
1814
1704
|
def password(self) -> Optional[str]:
|
1815
1705
|
"""
|
1816
|
-
The password
|
1706
|
+
The root credential password used in the connection URL
|
1817
1707
|
"""
|
1818
1708
|
return pulumi.get(self, "password")
|
1819
1709
|
|
@@ -1821,7 +1711,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1821
1711
|
@pulumi.getter(name="serviceAccountJson")
|
1822
1712
|
def service_account_json(self) -> Optional[str]:
|
1823
1713
|
"""
|
1824
|
-
JSON
|
1714
|
+
A JSON encoded credential for use with IAM authorization
|
1825
1715
|
"""
|
1826
1716
|
return pulumi.get(self, "service_account_json")
|
1827
1717
|
|
@@ -1845,7 +1735,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1845
1735
|
@pulumi.getter
|
1846
1736
|
def username(self) -> Optional[str]:
|
1847
1737
|
"""
|
1848
|
-
The username
|
1738
|
+
The root credential username used in the connection URL
|
1849
1739
|
"""
|
1850
1740
|
return pulumi.get(self, "username")
|
1851
1741
|
|
@@ -1853,7 +1743,7 @@ class SecretBackendConnectionMysqlRds(dict):
|
|
1853
1743
|
@pulumi.getter(name="usernameTemplate")
|
1854
1744
|
def username_template(self) -> Optional[str]:
|
1855
1745
|
"""
|
1856
|
-
|
1746
|
+
Username generation template.
|
1857
1747
|
"""
|
1858
1748
|
return pulumi.get(self, "username_template")
|
1859
1749
|
|
@@ -1900,21 +1790,15 @@ class SecretBackendConnectionOracle(dict):
|
|
1900
1790
|
username: Optional[str] = None,
|
1901
1791
|
username_template: Optional[str] = None):
|
1902
1792
|
"""
|
1903
|
-
:param str connection_url:
|
1904
|
-
|
1905
|
-
|
1906
|
-
|
1907
|
-
:param
|
1908
|
-
:param
|
1909
|
-
|
1910
|
-
:param
|
1911
|
-
|
1912
|
-
:param int max_open_connections: The maximum number of open connections to
|
1913
|
-
use.
|
1914
|
-
:param str password: The password to authenticate with.
|
1915
|
-
:param bool split_statements: Enable spliting statements after semi-colons.
|
1916
|
-
:param str username: The username to authenticate with.
|
1917
|
-
:param str username_template: Template describing how dynamic usernames are generated.
|
1793
|
+
:param str connection_url: Connection string to use to connect to the database.
|
1794
|
+
:param bool disconnect_sessions: Set to true to disconnect any open sessions prior to running the revocation statements.
|
1795
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
1796
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
1797
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
1798
|
+
:param str password: The root credential password used in the connection URL
|
1799
|
+
:param bool split_statements: Set to true in order to split statements after semi-colons.
|
1800
|
+
:param str username: The root credential username used in the connection URL
|
1801
|
+
:param str username_template: Username generation template.
|
1918
1802
|
"""
|
1919
1803
|
if connection_url is not None:
|
1920
1804
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -1939,10 +1823,7 @@ class SecretBackendConnectionOracle(dict):
|
|
1939
1823
|
@pulumi.getter(name="connectionUrl")
|
1940
1824
|
def connection_url(self) -> Optional[str]:
|
1941
1825
|
"""
|
1942
|
-
|
1943
|
-
the [Vault
|
1944
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
1945
|
-
for an example.
|
1826
|
+
Connection string to use to connect to the database.
|
1946
1827
|
"""
|
1947
1828
|
return pulumi.get(self, "connection_url")
|
1948
1829
|
|
@@ -1950,7 +1831,7 @@ class SecretBackendConnectionOracle(dict):
|
|
1950
1831
|
@pulumi.getter(name="disconnectSessions")
|
1951
1832
|
def disconnect_sessions(self) -> Optional[bool]:
|
1952
1833
|
"""
|
1953
|
-
|
1834
|
+
Set to true to disconnect any open sessions prior to running the revocation statements.
|
1954
1835
|
"""
|
1955
1836
|
return pulumi.get(self, "disconnect_sessions")
|
1956
1837
|
|
@@ -1958,8 +1839,7 @@ class SecretBackendConnectionOracle(dict):
|
|
1958
1839
|
@pulumi.getter(name="maxConnectionLifetime")
|
1959
1840
|
def max_connection_lifetime(self) -> Optional[int]:
|
1960
1841
|
"""
|
1961
|
-
|
1962
|
-
a connection alive for.
|
1842
|
+
Maximum number of seconds a connection may be reused.
|
1963
1843
|
"""
|
1964
1844
|
return pulumi.get(self, "max_connection_lifetime")
|
1965
1845
|
|
@@ -1967,8 +1847,7 @@ class SecretBackendConnectionOracle(dict):
|
|
1967
1847
|
@pulumi.getter(name="maxIdleConnections")
|
1968
1848
|
def max_idle_connections(self) -> Optional[int]:
|
1969
1849
|
"""
|
1970
|
-
|
1971
|
-
maintain.
|
1850
|
+
Maximum number of idle connections to the database.
|
1972
1851
|
"""
|
1973
1852
|
return pulumi.get(self, "max_idle_connections")
|
1974
1853
|
|
@@ -1976,8 +1855,7 @@ class SecretBackendConnectionOracle(dict):
|
|
1976
1855
|
@pulumi.getter(name="maxOpenConnections")
|
1977
1856
|
def max_open_connections(self) -> Optional[int]:
|
1978
1857
|
"""
|
1979
|
-
|
1980
|
-
use.
|
1858
|
+
Maximum number of open connections to the database.
|
1981
1859
|
"""
|
1982
1860
|
return pulumi.get(self, "max_open_connections")
|
1983
1861
|
|
@@ -1985,7 +1863,7 @@ class SecretBackendConnectionOracle(dict):
|
|
1985
1863
|
@pulumi.getter
|
1986
1864
|
def password(self) -> Optional[str]:
|
1987
1865
|
"""
|
1988
|
-
The password
|
1866
|
+
The root credential password used in the connection URL
|
1989
1867
|
"""
|
1990
1868
|
return pulumi.get(self, "password")
|
1991
1869
|
|
@@ -1993,7 +1871,7 @@ class SecretBackendConnectionOracle(dict):
|
|
1993
1871
|
@pulumi.getter(name="splitStatements")
|
1994
1872
|
def split_statements(self) -> Optional[bool]:
|
1995
1873
|
"""
|
1996
|
-
|
1874
|
+
Set to true in order to split statements after semi-colons.
|
1997
1875
|
"""
|
1998
1876
|
return pulumi.get(self, "split_statements")
|
1999
1877
|
|
@@ -2001,7 +1879,7 @@ class SecretBackendConnectionOracle(dict):
|
|
2001
1879
|
@pulumi.getter
|
2002
1880
|
def username(self) -> Optional[str]:
|
2003
1881
|
"""
|
2004
|
-
The username
|
1882
|
+
The root credential username used in the connection URL
|
2005
1883
|
"""
|
2006
1884
|
return pulumi.get(self, "username")
|
2007
1885
|
|
@@ -2009,7 +1887,7 @@ class SecretBackendConnectionOracle(dict):
|
|
2009
1887
|
@pulumi.getter(name="usernameTemplate")
|
2010
1888
|
def username_template(self) -> Optional[str]:
|
2011
1889
|
"""
|
2012
|
-
|
1890
|
+
Username generation template.
|
2013
1891
|
"""
|
2014
1892
|
return pulumi.get(self, "username_template")
|
2015
1893
|
|
@@ -2059,22 +1937,16 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2059
1937
|
username: Optional[str] = None,
|
2060
1938
|
username_template: Optional[str] = None):
|
2061
1939
|
"""
|
2062
|
-
:param str auth_type:
|
2063
|
-
:param str connection_url:
|
2064
|
-
|
2065
|
-
|
2066
|
-
|
2067
|
-
:param
|
2068
|
-
:param
|
2069
|
-
|
2070
|
-
:param
|
2071
|
-
|
2072
|
-
:param int max_open_connections: The maximum number of open connections to
|
2073
|
-
use.
|
2074
|
-
:param str password: The password to authenticate with.
|
2075
|
-
:param str service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
2076
|
-
:param str username: The username to authenticate with.
|
2077
|
-
:param str username_template: Template describing how dynamic usernames are generated.
|
1940
|
+
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1941
|
+
:param str connection_url: Connection string to use to connect to the database.
|
1942
|
+
:param bool disable_escaping: Disable special character escaping in username and password
|
1943
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
1944
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
1945
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
1946
|
+
:param str password: The root credential password used in the connection URL
|
1947
|
+
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
1948
|
+
:param str username: The root credential username used in the connection URL
|
1949
|
+
:param str username_template: Username generation template.
|
2078
1950
|
"""
|
2079
1951
|
if auth_type is not None:
|
2080
1952
|
pulumi.set(__self__, "auth_type", auth_type)
|
@@ -2101,7 +1973,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2101
1973
|
@pulumi.getter(name="authType")
|
2102
1974
|
def auth_type(self) -> Optional[str]:
|
2103
1975
|
"""
|
2104
|
-
|
1976
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
2105
1977
|
"""
|
2106
1978
|
return pulumi.get(self, "auth_type")
|
2107
1979
|
|
@@ -2109,10 +1981,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2109
1981
|
@pulumi.getter(name="connectionUrl")
|
2110
1982
|
def connection_url(self) -> Optional[str]:
|
2111
1983
|
"""
|
2112
|
-
|
2113
|
-
the [Vault
|
2114
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
2115
|
-
for an example.
|
1984
|
+
Connection string to use to connect to the database.
|
2116
1985
|
"""
|
2117
1986
|
return pulumi.get(self, "connection_url")
|
2118
1987
|
|
@@ -2120,7 +1989,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2120
1989
|
@pulumi.getter(name="disableEscaping")
|
2121
1990
|
def disable_escaping(self) -> Optional[bool]:
|
2122
1991
|
"""
|
2123
|
-
Disable special character escaping in username and password
|
1992
|
+
Disable special character escaping in username and password
|
2124
1993
|
"""
|
2125
1994
|
return pulumi.get(self, "disable_escaping")
|
2126
1995
|
|
@@ -2128,8 +1997,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2128
1997
|
@pulumi.getter(name="maxConnectionLifetime")
|
2129
1998
|
def max_connection_lifetime(self) -> Optional[int]:
|
2130
1999
|
"""
|
2131
|
-
|
2132
|
-
a connection alive for.
|
2000
|
+
Maximum number of seconds a connection may be reused.
|
2133
2001
|
"""
|
2134
2002
|
return pulumi.get(self, "max_connection_lifetime")
|
2135
2003
|
|
@@ -2137,8 +2005,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2137
2005
|
@pulumi.getter(name="maxIdleConnections")
|
2138
2006
|
def max_idle_connections(self) -> Optional[int]:
|
2139
2007
|
"""
|
2140
|
-
|
2141
|
-
maintain.
|
2008
|
+
Maximum number of idle connections to the database.
|
2142
2009
|
"""
|
2143
2010
|
return pulumi.get(self, "max_idle_connections")
|
2144
2011
|
|
@@ -2146,8 +2013,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2146
2013
|
@pulumi.getter(name="maxOpenConnections")
|
2147
2014
|
def max_open_connections(self) -> Optional[int]:
|
2148
2015
|
"""
|
2149
|
-
|
2150
|
-
use.
|
2016
|
+
Maximum number of open connections to the database.
|
2151
2017
|
"""
|
2152
2018
|
return pulumi.get(self, "max_open_connections")
|
2153
2019
|
|
@@ -2155,7 +2021,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2155
2021
|
@pulumi.getter
|
2156
2022
|
def password(self) -> Optional[str]:
|
2157
2023
|
"""
|
2158
|
-
The password
|
2024
|
+
The root credential password used in the connection URL
|
2159
2025
|
"""
|
2160
2026
|
return pulumi.get(self, "password")
|
2161
2027
|
|
@@ -2163,7 +2029,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2163
2029
|
@pulumi.getter(name="serviceAccountJson")
|
2164
2030
|
def service_account_json(self) -> Optional[str]:
|
2165
2031
|
"""
|
2166
|
-
JSON
|
2032
|
+
A JSON encoded credential for use with IAM authorization
|
2167
2033
|
"""
|
2168
2034
|
return pulumi.get(self, "service_account_json")
|
2169
2035
|
|
@@ -2171,7 +2037,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2171
2037
|
@pulumi.getter
|
2172
2038
|
def username(self) -> Optional[str]:
|
2173
2039
|
"""
|
2174
|
-
The username
|
2040
|
+
The root credential username used in the connection URL
|
2175
2041
|
"""
|
2176
2042
|
return pulumi.get(self, "username")
|
2177
2043
|
|
@@ -2179,7 +2045,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2179
2045
|
@pulumi.getter(name="usernameTemplate")
|
2180
2046
|
def username_template(self) -> Optional[str]:
|
2181
2047
|
"""
|
2182
|
-
|
2048
|
+
Username generation template.
|
2183
2049
|
"""
|
2184
2050
|
return pulumi.get(self, "username_template")
|
2185
2051
|
|
@@ -2214,15 +2080,13 @@ class SecretBackendConnectionRedis(dict):
|
|
2214
2080
|
port: Optional[int] = None,
|
2215
2081
|
tls: Optional[bool] = None):
|
2216
2082
|
"""
|
2217
|
-
:param str host:
|
2218
|
-
:param str password:
|
2219
|
-
:param str username:
|
2220
|
-
:param str ca_cert: The
|
2221
|
-
:param bool insecure_tls:
|
2222
|
-
|
2223
|
-
:param
|
2224
|
-
part of the host.
|
2225
|
-
:param bool tls: Whether to use TLS when connecting to Cassandra.
|
2083
|
+
:param str host: Specifies the host to connect to
|
2084
|
+
:param str password: Specifies the password corresponding to the given username.
|
2085
|
+
:param str username: Specifies the username for Vault to use.
|
2086
|
+
:param str ca_cert: The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
|
2087
|
+
:param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
|
2088
|
+
:param int port: The transport port to use to connect to Redis.
|
2089
|
+
:param bool tls: Specifies whether to use TLS when connecting to Redis.
|
2226
2090
|
"""
|
2227
2091
|
pulumi.set(__self__, "host", host)
|
2228
2092
|
pulumi.set(__self__, "password", password)
|
@@ -2240,7 +2104,7 @@ class SecretBackendConnectionRedis(dict):
|
|
2240
2104
|
@pulumi.getter
|
2241
2105
|
def host(self) -> str:
|
2242
2106
|
"""
|
2243
|
-
|
2107
|
+
Specifies the host to connect to
|
2244
2108
|
"""
|
2245
2109
|
return pulumi.get(self, "host")
|
2246
2110
|
|
@@ -2248,7 +2112,7 @@ class SecretBackendConnectionRedis(dict):
|
|
2248
2112
|
@pulumi.getter
|
2249
2113
|
def password(self) -> str:
|
2250
2114
|
"""
|
2251
|
-
|
2115
|
+
Specifies the password corresponding to the given username.
|
2252
2116
|
"""
|
2253
2117
|
return pulumi.get(self, "password")
|
2254
2118
|
|
@@ -2256,7 +2120,7 @@ class SecretBackendConnectionRedis(dict):
|
|
2256
2120
|
@pulumi.getter
|
2257
2121
|
def username(self) -> str:
|
2258
2122
|
"""
|
2259
|
-
|
2123
|
+
Specifies the username for Vault to use.
|
2260
2124
|
"""
|
2261
2125
|
return pulumi.get(self, "username")
|
2262
2126
|
|
@@ -2264,7 +2128,7 @@ class SecretBackendConnectionRedis(dict):
|
|
2264
2128
|
@pulumi.getter(name="caCert")
|
2265
2129
|
def ca_cert(self) -> Optional[str]:
|
2266
2130
|
"""
|
2267
|
-
The
|
2131
|
+
The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
|
2268
2132
|
"""
|
2269
2133
|
return pulumi.get(self, "ca_cert")
|
2270
2134
|
|
@@ -2272,8 +2136,7 @@ class SecretBackendConnectionRedis(dict):
|
|
2272
2136
|
@pulumi.getter(name="insecureTls")
|
2273
2137
|
def insecure_tls(self) -> Optional[bool]:
|
2274
2138
|
"""
|
2275
|
-
|
2276
|
-
certificate when using TLS.
|
2139
|
+
Specifies whether to skip verification of the server certificate when using TLS.
|
2277
2140
|
"""
|
2278
2141
|
return pulumi.get(self, "insecure_tls")
|
2279
2142
|
|
@@ -2281,8 +2144,7 @@ class SecretBackendConnectionRedis(dict):
|
|
2281
2144
|
@pulumi.getter
|
2282
2145
|
def port(self) -> Optional[int]:
|
2283
2146
|
"""
|
2284
|
-
The
|
2285
|
-
part of the host.
|
2147
|
+
The transport port to use to connect to Redis.
|
2286
2148
|
"""
|
2287
2149
|
return pulumi.get(self, "port")
|
2288
2150
|
|
@@ -2290,7 +2152,7 @@ class SecretBackendConnectionRedis(dict):
|
|
2290
2152
|
@pulumi.getter
|
2291
2153
|
def tls(self) -> Optional[bool]:
|
2292
2154
|
"""
|
2293
|
-
|
2155
|
+
Specifies whether to use TLS when connecting to Redis.
|
2294
2156
|
"""
|
2295
2157
|
return pulumi.get(self, "tls")
|
2296
2158
|
|
@@ -2303,11 +2165,10 @@ class SecretBackendConnectionRedisElasticache(dict):
|
|
2303
2165
|
region: Optional[str] = None,
|
2304
2166
|
username: Optional[str] = None):
|
2305
2167
|
"""
|
2306
|
-
:param str url: The
|
2307
|
-
|
2308
|
-
:param str
|
2309
|
-
:param str
|
2310
|
-
:param str username: The username to authenticate with.
|
2168
|
+
:param str url: The configuration endpoint for the ElastiCache cluster to connect to.
|
2169
|
+
:param str password: The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
2170
|
+
:param str region: The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
|
2171
|
+
:param str username: The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
2311
2172
|
"""
|
2312
2173
|
pulumi.set(__self__, "url", url)
|
2313
2174
|
if password is not None:
|
@@ -2321,8 +2182,7 @@ class SecretBackendConnectionRedisElasticache(dict):
|
|
2321
2182
|
@pulumi.getter
|
2322
2183
|
def url(self) -> str:
|
2323
2184
|
"""
|
2324
|
-
The
|
2325
|
-
by trusted CA if used.
|
2185
|
+
The configuration endpoint for the ElastiCache cluster to connect to.
|
2326
2186
|
"""
|
2327
2187
|
return pulumi.get(self, "url")
|
2328
2188
|
|
@@ -2330,7 +2190,7 @@ class SecretBackendConnectionRedisElasticache(dict):
|
|
2330
2190
|
@pulumi.getter
|
2331
2191
|
def password(self) -> Optional[str]:
|
2332
2192
|
"""
|
2333
|
-
The
|
2193
|
+
The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
2334
2194
|
"""
|
2335
2195
|
return pulumi.get(self, "password")
|
2336
2196
|
|
@@ -2338,7 +2198,7 @@ class SecretBackendConnectionRedisElasticache(dict):
|
|
2338
2198
|
@pulumi.getter
|
2339
2199
|
def region(self) -> Optional[str]:
|
2340
2200
|
"""
|
2341
|
-
The region where the ElastiCache cluster is hosted. If omitted
|
2201
|
+
The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
|
2342
2202
|
"""
|
2343
2203
|
return pulumi.get(self, "region")
|
2344
2204
|
|
@@ -2346,7 +2206,7 @@ class SecretBackendConnectionRedisElasticache(dict):
|
|
2346
2206
|
@pulumi.getter
|
2347
2207
|
def username(self) -> Optional[str]:
|
2348
2208
|
"""
|
2349
|
-
The
|
2209
|
+
The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
2350
2210
|
"""
|
2351
2211
|
return pulumi.get(self, "username")
|
2352
2212
|
|
@@ -2390,20 +2250,14 @@ class SecretBackendConnectionRedshift(dict):
|
|
2390
2250
|
username: Optional[str] = None,
|
2391
2251
|
username_template: Optional[str] = None):
|
2392
2252
|
"""
|
2393
|
-
:param str connection_url:
|
2394
|
-
|
2395
|
-
|
2396
|
-
|
2397
|
-
:param
|
2398
|
-
:param
|
2399
|
-
|
2400
|
-
:param
|
2401
|
-
maintain.
|
2402
|
-
:param int max_open_connections: The maximum number of open connections to
|
2403
|
-
use.
|
2404
|
-
:param str password: The password to authenticate with.
|
2405
|
-
:param str username: The username to authenticate with.
|
2406
|
-
:param str username_template: Template describing how dynamic usernames are generated.
|
2253
|
+
:param str connection_url: Connection string to use to connect to the database.
|
2254
|
+
:param bool disable_escaping: Disable special character escaping in username and password
|
2255
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
2256
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
2257
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
2258
|
+
:param str password: The root credential password used in the connection URL
|
2259
|
+
:param str username: The root credential username used in the connection URL
|
2260
|
+
:param str username_template: Username generation template.
|
2407
2261
|
"""
|
2408
2262
|
if connection_url is not None:
|
2409
2263
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -2426,10 +2280,7 @@ class SecretBackendConnectionRedshift(dict):
|
|
2426
2280
|
@pulumi.getter(name="connectionUrl")
|
2427
2281
|
def connection_url(self) -> Optional[str]:
|
2428
2282
|
"""
|
2429
|
-
|
2430
|
-
the [Vault
|
2431
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
2432
|
-
for an example.
|
2283
|
+
Connection string to use to connect to the database.
|
2433
2284
|
"""
|
2434
2285
|
return pulumi.get(self, "connection_url")
|
2435
2286
|
|
@@ -2437,7 +2288,7 @@ class SecretBackendConnectionRedshift(dict):
|
|
2437
2288
|
@pulumi.getter(name="disableEscaping")
|
2438
2289
|
def disable_escaping(self) -> Optional[bool]:
|
2439
2290
|
"""
|
2440
|
-
Disable special character escaping in username and password
|
2291
|
+
Disable special character escaping in username and password
|
2441
2292
|
"""
|
2442
2293
|
return pulumi.get(self, "disable_escaping")
|
2443
2294
|
|
@@ -2445,8 +2296,7 @@ class SecretBackendConnectionRedshift(dict):
|
|
2445
2296
|
@pulumi.getter(name="maxConnectionLifetime")
|
2446
2297
|
def max_connection_lifetime(self) -> Optional[int]:
|
2447
2298
|
"""
|
2448
|
-
|
2449
|
-
a connection alive for.
|
2299
|
+
Maximum number of seconds a connection may be reused.
|
2450
2300
|
"""
|
2451
2301
|
return pulumi.get(self, "max_connection_lifetime")
|
2452
2302
|
|
@@ -2454,8 +2304,7 @@ class SecretBackendConnectionRedshift(dict):
|
|
2454
2304
|
@pulumi.getter(name="maxIdleConnections")
|
2455
2305
|
def max_idle_connections(self) -> Optional[int]:
|
2456
2306
|
"""
|
2457
|
-
|
2458
|
-
maintain.
|
2307
|
+
Maximum number of idle connections to the database.
|
2459
2308
|
"""
|
2460
2309
|
return pulumi.get(self, "max_idle_connections")
|
2461
2310
|
|
@@ -2463,8 +2312,7 @@ class SecretBackendConnectionRedshift(dict):
|
|
2463
2312
|
@pulumi.getter(name="maxOpenConnections")
|
2464
2313
|
def max_open_connections(self) -> Optional[int]:
|
2465
2314
|
"""
|
2466
|
-
|
2467
|
-
use.
|
2315
|
+
Maximum number of open connections to the database.
|
2468
2316
|
"""
|
2469
2317
|
return pulumi.get(self, "max_open_connections")
|
2470
2318
|
|
@@ -2472,7 +2320,7 @@ class SecretBackendConnectionRedshift(dict):
|
|
2472
2320
|
@pulumi.getter
|
2473
2321
|
def password(self) -> Optional[str]:
|
2474
2322
|
"""
|
2475
|
-
The password
|
2323
|
+
The root credential password used in the connection URL
|
2476
2324
|
"""
|
2477
2325
|
return pulumi.get(self, "password")
|
2478
2326
|
|
@@ -2480,7 +2328,7 @@ class SecretBackendConnectionRedshift(dict):
|
|
2480
2328
|
@pulumi.getter
|
2481
2329
|
def username(self) -> Optional[str]:
|
2482
2330
|
"""
|
2483
|
-
The username
|
2331
|
+
The root credential username used in the connection URL
|
2484
2332
|
"""
|
2485
2333
|
return pulumi.get(self, "username")
|
2486
2334
|
|
@@ -2488,7 +2336,7 @@ class SecretBackendConnectionRedshift(dict):
|
|
2488
2336
|
@pulumi.getter(name="usernameTemplate")
|
2489
2337
|
def username_template(self) -> Optional[str]:
|
2490
2338
|
"""
|
2491
|
-
|
2339
|
+
Username generation template.
|
2492
2340
|
"""
|
2493
2341
|
return pulumi.get(self, "username_template")
|
2494
2342
|
|
@@ -2529,19 +2377,13 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2529
2377
|
username: Optional[str] = None,
|
2530
2378
|
username_template: Optional[str] = None):
|
2531
2379
|
"""
|
2532
|
-
:param str connection_url:
|
2533
|
-
|
2534
|
-
|
2535
|
-
|
2536
|
-
:param
|
2537
|
-
|
2538
|
-
:param
|
2539
|
-
maintain.
|
2540
|
-
:param int max_open_connections: The maximum number of open connections to
|
2541
|
-
use.
|
2542
|
-
:param str password: The password to authenticate with.
|
2543
|
-
:param str username: The username to authenticate with.
|
2544
|
-
:param str username_template: Template describing how dynamic usernames are generated.
|
2380
|
+
:param str connection_url: Connection string to use to connect to the database.
|
2381
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
2382
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
2383
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
2384
|
+
:param str password: The root credential password used in the connection URL
|
2385
|
+
:param str username: The root credential username used in the connection URL
|
2386
|
+
:param str username_template: Username generation template.
|
2545
2387
|
"""
|
2546
2388
|
if connection_url is not None:
|
2547
2389
|
pulumi.set(__self__, "connection_url", connection_url)
|
@@ -2562,10 +2404,7 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2562
2404
|
@pulumi.getter(name="connectionUrl")
|
2563
2405
|
def connection_url(self) -> Optional[str]:
|
2564
2406
|
"""
|
2565
|
-
|
2566
|
-
the [Vault
|
2567
|
-
docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
|
2568
|
-
for an example.
|
2407
|
+
Connection string to use to connect to the database.
|
2569
2408
|
"""
|
2570
2409
|
return pulumi.get(self, "connection_url")
|
2571
2410
|
|
@@ -2573,8 +2412,7 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2573
2412
|
@pulumi.getter(name="maxConnectionLifetime")
|
2574
2413
|
def max_connection_lifetime(self) -> Optional[int]:
|
2575
2414
|
"""
|
2576
|
-
|
2577
|
-
a connection alive for.
|
2415
|
+
Maximum number of seconds a connection may be reused.
|
2578
2416
|
"""
|
2579
2417
|
return pulumi.get(self, "max_connection_lifetime")
|
2580
2418
|
|
@@ -2582,8 +2420,7 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2582
2420
|
@pulumi.getter(name="maxIdleConnections")
|
2583
2421
|
def max_idle_connections(self) -> Optional[int]:
|
2584
2422
|
"""
|
2585
|
-
|
2586
|
-
maintain.
|
2423
|
+
Maximum number of idle connections to the database.
|
2587
2424
|
"""
|
2588
2425
|
return pulumi.get(self, "max_idle_connections")
|
2589
2426
|
|
@@ -2591,8 +2428,7 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2591
2428
|
@pulumi.getter(name="maxOpenConnections")
|
2592
2429
|
def max_open_connections(self) -> Optional[int]:
|
2593
2430
|
"""
|
2594
|
-
|
2595
|
-
use.
|
2431
|
+
Maximum number of open connections to the database.
|
2596
2432
|
"""
|
2597
2433
|
return pulumi.get(self, "max_open_connections")
|
2598
2434
|
|
@@ -2600,7 +2436,7 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2600
2436
|
@pulumi.getter
|
2601
2437
|
def password(self) -> Optional[str]:
|
2602
2438
|
"""
|
2603
|
-
The password
|
2439
|
+
The root credential password used in the connection URL
|
2604
2440
|
"""
|
2605
2441
|
return pulumi.get(self, "password")
|
2606
2442
|
|
@@ -2608,7 +2444,7 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2608
2444
|
@pulumi.getter
|
2609
2445
|
def username(self) -> Optional[str]:
|
2610
2446
|
"""
|
2611
|
-
The username
|
2447
|
+
The root credential username used in the connection URL
|
2612
2448
|
"""
|
2613
2449
|
return pulumi.get(self, "username")
|
2614
2450
|
|
@@ -2616,7 +2452,7 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2616
2452
|
@pulumi.getter(name="usernameTemplate")
|
2617
2453
|
def username_template(self) -> Optional[str]:
|
2618
2454
|
"""
|
2619
|
-
|
2455
|
+
Username generation template.
|
2620
2456
|
"""
|
2621
2457
|
return pulumi.get(self, "username_template")
|
2622
2458
|
|
@@ -2677,25 +2513,21 @@ class SecretsMountCassandra(dict):
|
|
2677
2513
|
:param str name: Name of the database connection.
|
2678
2514
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
2679
2515
|
connection.
|
2680
|
-
:param int connect_timeout: The number of seconds to use as a connection
|
2681
|
-
timeout.
|
2516
|
+
:param int connect_timeout: The number of seconds to use as a connection timeout.
|
2682
2517
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2683
2518
|
|
2684
2519
|
Supported list of database secrets engines that can be configured:
|
2685
|
-
:param Sequence[str] hosts:
|
2686
|
-
:param bool insecure_tls: Whether to skip verification of the server
|
2687
|
-
|
2688
|
-
:param str
|
2689
|
-
:param str
|
2690
|
-
chain.
|
2691
|
-
:param str pem_json: A JSON structure configuring the certificate chain.
|
2520
|
+
:param Sequence[str] hosts: Cassandra hosts to connect to.
|
2521
|
+
:param bool insecure_tls: Whether to skip verification of the server certificate when using TLS.
|
2522
|
+
:param str password: The password to use when authenticating with Cassandra.
|
2523
|
+
:param str pem_bundle: Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
2524
|
+
:param str pem_json: Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
2692
2525
|
:param str plugin_name: Specifies the name of the plugin to use.
|
2693
|
-
:param int port: The
|
2694
|
-
part of the host.
|
2526
|
+
:param int port: The transport port to use to connect to Cassandra.
|
2695
2527
|
:param int protocol_version: The CQL protocol version to use.
|
2696
2528
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
2697
2529
|
:param bool tls: Whether to use TLS when connecting to Cassandra.
|
2698
|
-
:param str username: The
|
2530
|
+
:param str username: The username to use when authenticating with Cassandra.
|
2699
2531
|
:param bool verify_connection: Whether the connection should be verified on
|
2700
2532
|
initial configuration or not.
|
2701
2533
|
"""
|
@@ -2752,8 +2584,7 @@ class SecretsMountCassandra(dict):
|
|
2752
2584
|
@pulumi.getter(name="connectTimeout")
|
2753
2585
|
def connect_timeout(self) -> Optional[int]:
|
2754
2586
|
"""
|
2755
|
-
The number of seconds to use as a connection
|
2756
|
-
timeout.
|
2587
|
+
The number of seconds to use as a connection timeout.
|
2757
2588
|
"""
|
2758
2589
|
return pulumi.get(self, "connect_timeout")
|
2759
2590
|
|
@@ -2771,7 +2602,7 @@ class SecretsMountCassandra(dict):
|
|
2771
2602
|
@pulumi.getter
|
2772
2603
|
def hosts(self) -> Optional[Sequence[str]]:
|
2773
2604
|
"""
|
2774
|
-
|
2605
|
+
Cassandra hosts to connect to.
|
2775
2606
|
"""
|
2776
2607
|
return pulumi.get(self, "hosts")
|
2777
2608
|
|
@@ -2779,8 +2610,7 @@ class SecretsMountCassandra(dict):
|
|
2779
2610
|
@pulumi.getter(name="insecureTls")
|
2780
2611
|
def insecure_tls(self) -> Optional[bool]:
|
2781
2612
|
"""
|
2782
|
-
Whether to skip verification of the server
|
2783
|
-
certificate when using TLS.
|
2613
|
+
Whether to skip verification of the server certificate when using TLS.
|
2784
2614
|
"""
|
2785
2615
|
return pulumi.get(self, "insecure_tls")
|
2786
2616
|
|
@@ -2788,7 +2618,7 @@ class SecretsMountCassandra(dict):
|
|
2788
2618
|
@pulumi.getter
|
2789
2619
|
def password(self) -> Optional[str]:
|
2790
2620
|
"""
|
2791
|
-
The
|
2621
|
+
The password to use when authenticating with Cassandra.
|
2792
2622
|
"""
|
2793
2623
|
return pulumi.get(self, "password")
|
2794
2624
|
|
@@ -2796,8 +2626,7 @@ class SecretsMountCassandra(dict):
|
|
2796
2626
|
@pulumi.getter(name="pemBundle")
|
2797
2627
|
def pem_bundle(self) -> Optional[str]:
|
2798
2628
|
"""
|
2799
|
-
Concatenated PEM blocks
|
2800
|
-
chain.
|
2629
|
+
Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
2801
2630
|
"""
|
2802
2631
|
return pulumi.get(self, "pem_bundle")
|
2803
2632
|
|
@@ -2805,7 +2634,7 @@ class SecretsMountCassandra(dict):
|
|
2805
2634
|
@pulumi.getter(name="pemJson")
|
2806
2635
|
def pem_json(self) -> Optional[str]:
|
2807
2636
|
"""
|
2808
|
-
|
2637
|
+
Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
2809
2638
|
"""
|
2810
2639
|
return pulumi.get(self, "pem_json")
|
2811
2640
|
|
@@ -2821,8 +2650,7 @@ class SecretsMountCassandra(dict):
|
|
2821
2650
|
@pulumi.getter
|
2822
2651
|
def port(self) -> Optional[int]:
|
2823
2652
|
"""
|
2824
|
-
The
|
2825
|
-
part of the host.
|
2653
|
+
The transport port to use to connect to Cassandra.
|
2826
2654
|
"""
|
2827
2655
|
return pulumi.get(self, "port")
|
2828
2656
|
|
@@ -2854,7 +2682,7 @@ class SecretsMountCassandra(dict):
|
|
2854
2682
|
@pulumi.getter
|
2855
2683
|
def username(self) -> Optional[str]:
|
2856
2684
|
"""
|
2857
|
-
The
|
2685
|
+
The username to use when authenticating with Cassandra.
|
2858
2686
|
"""
|
2859
2687
|
return pulumi.get(self, "username")
|
2860
2688
|
|
@@ -2917,10 +2745,10 @@ class SecretsMountCouchbase(dict):
|
|
2917
2745
|
username_template: Optional[str] = None,
|
2918
2746
|
verify_connection: Optional[bool] = None):
|
2919
2747
|
"""
|
2920
|
-
:param Sequence[str] hosts:
|
2748
|
+
:param Sequence[str] hosts: A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
|
2921
2749
|
:param str name: Name of the database connection.
|
2922
|
-
:param str password:
|
2923
|
-
:param str username:
|
2750
|
+
:param str password: Specifies the password corresponding to the given username.
|
2751
|
+
:param str username: Specifies the username for Vault to use.
|
2924
2752
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
2925
2753
|
connection.
|
2926
2754
|
:param str base64_pem: Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
|
@@ -2928,12 +2756,11 @@ class SecretsMountCouchbase(dict):
|
|
2928
2756
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2929
2757
|
|
2930
2758
|
Supported list of database secrets engines that can be configured:
|
2931
|
-
:param bool insecure_tls:
|
2932
|
-
certificate when using TLS.
|
2759
|
+
:param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
|
2933
2760
|
:param str plugin_name: Specifies the name of the plugin to use.
|
2934
2761
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
2935
|
-
:param bool tls:
|
2936
|
-
:param str username_template:
|
2762
|
+
:param bool tls: Specifies whether to use TLS when connecting to Couchbase.
|
2763
|
+
:param str username_template: Template describing how dynamic usernames are generated.
|
2937
2764
|
:param bool verify_connection: Whether the connection should be verified on
|
2938
2765
|
initial configuration or not.
|
2939
2766
|
"""
|
@@ -2966,7 +2793,7 @@ class SecretsMountCouchbase(dict):
|
|
2966
2793
|
@pulumi.getter
|
2967
2794
|
def hosts(self) -> Sequence[str]:
|
2968
2795
|
"""
|
2969
|
-
|
2796
|
+
A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
|
2970
2797
|
"""
|
2971
2798
|
return pulumi.get(self, "hosts")
|
2972
2799
|
|
@@ -2982,7 +2809,7 @@ class SecretsMountCouchbase(dict):
|
|
2982
2809
|
@pulumi.getter
|
2983
2810
|
def password(self) -> str:
|
2984
2811
|
"""
|
2985
|
-
|
2812
|
+
Specifies the password corresponding to the given username.
|
2986
2813
|
"""
|
2987
2814
|
return pulumi.get(self, "password")
|
2988
2815
|
|
@@ -2990,7 +2817,7 @@ class SecretsMountCouchbase(dict):
|
|
2990
2817
|
@pulumi.getter
|
2991
2818
|
def username(self) -> str:
|
2992
2819
|
"""
|
2993
|
-
|
2820
|
+
Specifies the username for Vault to use.
|
2994
2821
|
"""
|
2995
2822
|
return pulumi.get(self, "username")
|
2996
2823
|
|
@@ -3033,8 +2860,7 @@ class SecretsMountCouchbase(dict):
|
|
3033
2860
|
@pulumi.getter(name="insecureTls")
|
3034
2861
|
def insecure_tls(self) -> Optional[bool]:
|
3035
2862
|
"""
|
3036
|
-
|
3037
|
-
certificate when using TLS.
|
2863
|
+
Specifies whether to skip verification of the server certificate when using TLS.
|
3038
2864
|
"""
|
3039
2865
|
return pulumi.get(self, "insecure_tls")
|
3040
2866
|
|
@@ -3058,7 +2884,7 @@ class SecretsMountCouchbase(dict):
|
|
3058
2884
|
@pulumi.getter
|
3059
2885
|
def tls(self) -> Optional[bool]:
|
3060
2886
|
"""
|
3061
|
-
|
2887
|
+
Specifies whether to use TLS when connecting to Couchbase.
|
3062
2888
|
"""
|
3063
2889
|
return pulumi.get(self, "tls")
|
3064
2890
|
|
@@ -3066,7 +2892,7 @@ class SecretsMountCouchbase(dict):
|
|
3066
2892
|
@pulumi.getter(name="usernameTemplate")
|
3067
2893
|
def username_template(self) -> Optional[str]:
|
3068
2894
|
"""
|
3069
|
-
|
2895
|
+
Template describing how dynamic usernames are generated.
|
3070
2896
|
"""
|
3071
2897
|
return pulumi.get(self, "username_template")
|
3072
2898
|
|
@@ -3136,24 +2962,23 @@ class SecretsMountElasticsearch(dict):
|
|
3136
2962
|
verify_connection: Optional[bool] = None):
|
3137
2963
|
"""
|
3138
2964
|
:param str name: Name of the database connection.
|
3139
|
-
:param str password: The
|
3140
|
-
:param str url: The URL for Elasticsearch's API
|
3141
|
-
|
3142
|
-
:param str username: The root credential username used in the connection URL.
|
2965
|
+
:param str password: The password to be used in the connection URL
|
2966
|
+
:param str url: The URL for Elasticsearch's API
|
2967
|
+
:param str username: The username to be used in the connection URL
|
3143
2968
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3144
2969
|
connection.
|
3145
|
-
:param str ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
3146
|
-
:param str ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
3147
|
-
:param str client_cert: The path to the certificate for the Elasticsearch client to present for communication
|
3148
|
-
:param str client_key: The path to the key for the Elasticsearch client to use for communication
|
2970
|
+
:param str ca_cert: The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
2971
|
+
:param str ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
2972
|
+
:param str client_cert: The path to the certificate for the Elasticsearch client to present for communication
|
2973
|
+
:param str client_key: The path to the key for the Elasticsearch client to use for communication
|
3149
2974
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3150
2975
|
|
3151
2976
|
Supported list of database secrets engines that can be configured:
|
3152
|
-
:param bool insecure: Whether to disable certificate verification
|
2977
|
+
:param bool insecure: Whether to disable certificate verification
|
3153
2978
|
:param str plugin_name: Specifies the name of the plugin to use.
|
3154
2979
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
3155
|
-
:param str tls_server_name: This, if set, is used to set the SNI host when connecting via TLS
|
3156
|
-
:param str username_template:
|
2980
|
+
:param str tls_server_name: This, if set, is used to set the SNI host when connecting via TLS
|
2981
|
+
:param str username_template: Template describing how dynamic usernames are generated.
|
3157
2982
|
:param bool verify_connection: Whether the connection should be verified on
|
3158
2983
|
initial configuration or not.
|
3159
2984
|
"""
|
@@ -3198,7 +3023,7 @@ class SecretsMountElasticsearch(dict):
|
|
3198
3023
|
@pulumi.getter
|
3199
3024
|
def password(self) -> str:
|
3200
3025
|
"""
|
3201
|
-
The
|
3026
|
+
The password to be used in the connection URL
|
3202
3027
|
"""
|
3203
3028
|
return pulumi.get(self, "password")
|
3204
3029
|
|
@@ -3206,8 +3031,7 @@ class SecretsMountElasticsearch(dict):
|
|
3206
3031
|
@pulumi.getter
|
3207
3032
|
def url(self) -> str:
|
3208
3033
|
"""
|
3209
|
-
The URL for Elasticsearch's API
|
3210
|
-
by trusted CA if used.
|
3034
|
+
The URL for Elasticsearch's API
|
3211
3035
|
"""
|
3212
3036
|
return pulumi.get(self, "url")
|
3213
3037
|
|
@@ -3215,7 +3039,7 @@ class SecretsMountElasticsearch(dict):
|
|
3215
3039
|
@pulumi.getter
|
3216
3040
|
def username(self) -> str:
|
3217
3041
|
"""
|
3218
|
-
The
|
3042
|
+
The username to be used in the connection URL
|
3219
3043
|
"""
|
3220
3044
|
return pulumi.get(self, "username")
|
3221
3045
|
|
@@ -3232,7 +3056,7 @@ class SecretsMountElasticsearch(dict):
|
|
3232
3056
|
@pulumi.getter(name="caCert")
|
3233
3057
|
def ca_cert(self) -> Optional[str]:
|
3234
3058
|
"""
|
3235
|
-
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
3059
|
+
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
3236
3060
|
"""
|
3237
3061
|
return pulumi.get(self, "ca_cert")
|
3238
3062
|
|
@@ -3240,7 +3064,7 @@ class SecretsMountElasticsearch(dict):
|
|
3240
3064
|
@pulumi.getter(name="caPath")
|
3241
3065
|
def ca_path(self) -> Optional[str]:
|
3242
3066
|
"""
|
3243
|
-
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
3067
|
+
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
3244
3068
|
"""
|
3245
3069
|
return pulumi.get(self, "ca_path")
|
3246
3070
|
|
@@ -3248,7 +3072,7 @@ class SecretsMountElasticsearch(dict):
|
|
3248
3072
|
@pulumi.getter(name="clientCert")
|
3249
3073
|
def client_cert(self) -> Optional[str]:
|
3250
3074
|
"""
|
3251
|
-
The path to the certificate for the Elasticsearch client to present for communication
|
3075
|
+
The path to the certificate for the Elasticsearch client to present for communication
|
3252
3076
|
"""
|
3253
3077
|
return pulumi.get(self, "client_cert")
|
3254
3078
|
|
@@ -3256,7 +3080,7 @@ class SecretsMountElasticsearch(dict):
|
|
3256
3080
|
@pulumi.getter(name="clientKey")
|
3257
3081
|
def client_key(self) -> Optional[str]:
|
3258
3082
|
"""
|
3259
|
-
The path to the key for the Elasticsearch client to use for communication
|
3083
|
+
The path to the key for the Elasticsearch client to use for communication
|
3260
3084
|
"""
|
3261
3085
|
return pulumi.get(self, "client_key")
|
3262
3086
|
|
@@ -3274,7 +3098,7 @@ class SecretsMountElasticsearch(dict):
|
|
3274
3098
|
@pulumi.getter
|
3275
3099
|
def insecure(self) -> Optional[bool]:
|
3276
3100
|
"""
|
3277
|
-
Whether to disable certificate verification
|
3101
|
+
Whether to disable certificate verification
|
3278
3102
|
"""
|
3279
3103
|
return pulumi.get(self, "insecure")
|
3280
3104
|
|
@@ -3298,7 +3122,7 @@ class SecretsMountElasticsearch(dict):
|
|
3298
3122
|
@pulumi.getter(name="tlsServerName")
|
3299
3123
|
def tls_server_name(self) -> Optional[str]:
|
3300
3124
|
"""
|
3301
|
-
This, if set, is used to set the SNI host when connecting via TLS
|
3125
|
+
This, if set, is used to set the SNI host when connecting via TLS
|
3302
3126
|
"""
|
3303
3127
|
return pulumi.get(self, "tls_server_name")
|
3304
3128
|
|
@@ -3306,7 +3130,7 @@ class SecretsMountElasticsearch(dict):
|
|
3306
3130
|
@pulumi.getter(name="usernameTemplate")
|
3307
3131
|
def username_template(self) -> Optional[str]:
|
3308
3132
|
"""
|
3309
|
-
|
3133
|
+
Template describing how dynamic usernames are generated.
|
3310
3134
|
"""
|
3311
3135
|
return pulumi.get(self, "username_template")
|
3312
3136
|
|
@@ -3373,21 +3197,18 @@ class SecretsMountHana(dict):
|
|
3373
3197
|
:param str name: Name of the database connection.
|
3374
3198
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3375
3199
|
connection.
|
3376
|
-
:param str connection_url:
|
3377
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
3200
|
+
:param str connection_url: Connection string to use to connect to the database.
|
3378
3201
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3379
3202
|
|
3380
3203
|
Supported list of database secrets engines that can be configured:
|
3381
|
-
:param bool disable_escaping: Disable special character escaping in username and password
|
3382
|
-
:param int max_connection_lifetime:
|
3383
|
-
:param int max_idle_connections:
|
3384
|
-
|
3385
|
-
:param
|
3386
|
-
the database.
|
3387
|
-
:param str password: The root credential password used in the connection URL.
|
3204
|
+
:param bool disable_escaping: Disable special character escaping in username and password
|
3205
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
3206
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
3207
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
3208
|
+
:param str password: The root credential password used in the connection URL
|
3388
3209
|
:param str plugin_name: Specifies the name of the plugin to use.
|
3389
3210
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
3390
|
-
:param str username: The root credential username used in the connection URL
|
3211
|
+
:param str username: The root credential username used in the connection URL
|
3391
3212
|
:param bool verify_connection: Whether the connection should be verified on
|
3392
3213
|
initial configuration or not.
|
3393
3214
|
"""
|
@@ -3438,8 +3259,7 @@ class SecretsMountHana(dict):
|
|
3438
3259
|
@pulumi.getter(name="connectionUrl")
|
3439
3260
|
def connection_url(self) -> Optional[str]:
|
3440
3261
|
"""
|
3441
|
-
|
3442
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
3262
|
+
Connection string to use to connect to the database.
|
3443
3263
|
"""
|
3444
3264
|
return pulumi.get(self, "connection_url")
|
3445
3265
|
|
@@ -3457,7 +3277,7 @@ class SecretsMountHana(dict):
|
|
3457
3277
|
@pulumi.getter(name="disableEscaping")
|
3458
3278
|
def disable_escaping(self) -> Optional[bool]:
|
3459
3279
|
"""
|
3460
|
-
Disable special character escaping in username and password
|
3280
|
+
Disable special character escaping in username and password
|
3461
3281
|
"""
|
3462
3282
|
return pulumi.get(self, "disable_escaping")
|
3463
3283
|
|
@@ -3465,7 +3285,7 @@ class SecretsMountHana(dict):
|
|
3465
3285
|
@pulumi.getter(name="maxConnectionLifetime")
|
3466
3286
|
def max_connection_lifetime(self) -> Optional[int]:
|
3467
3287
|
"""
|
3468
|
-
|
3288
|
+
Maximum number of seconds a connection may be reused.
|
3469
3289
|
"""
|
3470
3290
|
return pulumi.get(self, "max_connection_lifetime")
|
3471
3291
|
|
@@ -3473,8 +3293,7 @@ class SecretsMountHana(dict):
|
|
3473
3293
|
@pulumi.getter(name="maxIdleConnections")
|
3474
3294
|
def max_idle_connections(self) -> Optional[int]:
|
3475
3295
|
"""
|
3476
|
-
|
3477
|
-
the database.
|
3296
|
+
Maximum number of idle connections to the database.
|
3478
3297
|
"""
|
3479
3298
|
return pulumi.get(self, "max_idle_connections")
|
3480
3299
|
|
@@ -3482,8 +3301,7 @@ class SecretsMountHana(dict):
|
|
3482
3301
|
@pulumi.getter(name="maxOpenConnections")
|
3483
3302
|
def max_open_connections(self) -> Optional[int]:
|
3484
3303
|
"""
|
3485
|
-
|
3486
|
-
the database.
|
3304
|
+
Maximum number of open connections to the database.
|
3487
3305
|
"""
|
3488
3306
|
return pulumi.get(self, "max_open_connections")
|
3489
3307
|
|
@@ -3491,7 +3309,7 @@ class SecretsMountHana(dict):
|
|
3491
3309
|
@pulumi.getter
|
3492
3310
|
def password(self) -> Optional[str]:
|
3493
3311
|
"""
|
3494
|
-
The root credential password used in the connection URL
|
3312
|
+
The root credential password used in the connection URL
|
3495
3313
|
"""
|
3496
3314
|
return pulumi.get(self, "password")
|
3497
3315
|
|
@@ -3515,7 +3333,7 @@ class SecretsMountHana(dict):
|
|
3515
3333
|
@pulumi.getter
|
3516
3334
|
def username(self) -> Optional[str]:
|
3517
3335
|
"""
|
3518
|
-
The root credential username used in the connection URL
|
3336
|
+
The root credential username used in the connection URL
|
3519
3337
|
"""
|
3520
3338
|
return pulumi.get(self, "username")
|
3521
3339
|
|
@@ -3582,28 +3400,24 @@ class SecretsMountInfluxdb(dict):
|
|
3582
3400
|
username_template: Optional[str] = None,
|
3583
3401
|
verify_connection: Optional[bool] = None):
|
3584
3402
|
"""
|
3585
|
-
:param str host:
|
3403
|
+
:param str host: Influxdb host to connect to.
|
3586
3404
|
:param str name: Name of the database connection.
|
3587
|
-
:param str password:
|
3588
|
-
:param str username:
|
3405
|
+
:param str password: Specifies the password corresponding to the given username.
|
3406
|
+
:param str username: Specifies the username to use for superuser access.
|
3589
3407
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3590
3408
|
connection.
|
3591
|
-
:param int connect_timeout: The number of seconds to use as a connection
|
3592
|
-
timeout.
|
3409
|
+
:param int connect_timeout: The number of seconds to use as a connection timeout.
|
3593
3410
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3594
3411
|
|
3595
3412
|
Supported list of database secrets engines that can be configured:
|
3596
|
-
:param bool insecure_tls: Whether to skip verification of the server
|
3597
|
-
|
3598
|
-
:param str
|
3599
|
-
chain.
|
3600
|
-
:param str pem_json: A JSON structure configuring the certificate chain.
|
3413
|
+
:param bool insecure_tls: Whether to skip verification of the server certificate when using TLS.
|
3414
|
+
:param str pem_bundle: Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
3415
|
+
:param str pem_json: Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
3601
3416
|
:param str plugin_name: Specifies the name of the plugin to use.
|
3602
|
-
:param int port: The
|
3603
|
-
part of the host.
|
3417
|
+
:param int port: The transport port to use to connect to Influxdb.
|
3604
3418
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
3605
|
-
:param bool tls: Whether to use TLS when connecting to
|
3606
|
-
:param str username_template:
|
3419
|
+
:param bool tls: Whether to use TLS when connecting to Influxdb.
|
3420
|
+
:param str username_template: Template describing how dynamic usernames are generated.
|
3607
3421
|
:param bool verify_connection: Whether the connection should be verified on
|
3608
3422
|
initial configuration or not.
|
3609
3423
|
"""
|
@@ -3640,7 +3454,7 @@ class SecretsMountInfluxdb(dict):
|
|
3640
3454
|
@pulumi.getter
|
3641
3455
|
def host(self) -> str:
|
3642
3456
|
"""
|
3643
|
-
|
3457
|
+
Influxdb host to connect to.
|
3644
3458
|
"""
|
3645
3459
|
return pulumi.get(self, "host")
|
3646
3460
|
|
@@ -3656,7 +3470,7 @@ class SecretsMountInfluxdb(dict):
|
|
3656
3470
|
@pulumi.getter
|
3657
3471
|
def password(self) -> str:
|
3658
3472
|
"""
|
3659
|
-
|
3473
|
+
Specifies the password corresponding to the given username.
|
3660
3474
|
"""
|
3661
3475
|
return pulumi.get(self, "password")
|
3662
3476
|
|
@@ -3664,7 +3478,7 @@ class SecretsMountInfluxdb(dict):
|
|
3664
3478
|
@pulumi.getter
|
3665
3479
|
def username(self) -> str:
|
3666
3480
|
"""
|
3667
|
-
|
3481
|
+
Specifies the username to use for superuser access.
|
3668
3482
|
"""
|
3669
3483
|
return pulumi.get(self, "username")
|
3670
3484
|
|
@@ -3681,8 +3495,7 @@ class SecretsMountInfluxdb(dict):
|
|
3681
3495
|
@pulumi.getter(name="connectTimeout")
|
3682
3496
|
def connect_timeout(self) -> Optional[int]:
|
3683
3497
|
"""
|
3684
|
-
The number of seconds to use as a connection
|
3685
|
-
timeout.
|
3498
|
+
The number of seconds to use as a connection timeout.
|
3686
3499
|
"""
|
3687
3500
|
return pulumi.get(self, "connect_timeout")
|
3688
3501
|
|
@@ -3700,8 +3513,7 @@ class SecretsMountInfluxdb(dict):
|
|
3700
3513
|
@pulumi.getter(name="insecureTls")
|
3701
3514
|
def insecure_tls(self) -> Optional[bool]:
|
3702
3515
|
"""
|
3703
|
-
Whether to skip verification of the server
|
3704
|
-
certificate when using TLS.
|
3516
|
+
Whether to skip verification of the server certificate when using TLS.
|
3705
3517
|
"""
|
3706
3518
|
return pulumi.get(self, "insecure_tls")
|
3707
3519
|
|
@@ -3709,8 +3521,7 @@ class SecretsMountInfluxdb(dict):
|
|
3709
3521
|
@pulumi.getter(name="pemBundle")
|
3710
3522
|
def pem_bundle(self) -> Optional[str]:
|
3711
3523
|
"""
|
3712
|
-
Concatenated PEM blocks
|
3713
|
-
chain.
|
3524
|
+
Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
3714
3525
|
"""
|
3715
3526
|
return pulumi.get(self, "pem_bundle")
|
3716
3527
|
|
@@ -3718,7 +3529,7 @@ class SecretsMountInfluxdb(dict):
|
|
3718
3529
|
@pulumi.getter(name="pemJson")
|
3719
3530
|
def pem_json(self) -> Optional[str]:
|
3720
3531
|
"""
|
3721
|
-
|
3532
|
+
Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
3722
3533
|
"""
|
3723
3534
|
return pulumi.get(self, "pem_json")
|
3724
3535
|
|
@@ -3734,8 +3545,7 @@ class SecretsMountInfluxdb(dict):
|
|
3734
3545
|
@pulumi.getter
|
3735
3546
|
def port(self) -> Optional[int]:
|
3736
3547
|
"""
|
3737
|
-
The
|
3738
|
-
part of the host.
|
3548
|
+
The transport port to use to connect to Influxdb.
|
3739
3549
|
"""
|
3740
3550
|
return pulumi.get(self, "port")
|
3741
3551
|
|
@@ -3751,7 +3561,7 @@ class SecretsMountInfluxdb(dict):
|
|
3751
3561
|
@pulumi.getter
|
3752
3562
|
def tls(self) -> Optional[bool]:
|
3753
3563
|
"""
|
3754
|
-
Whether to use TLS when connecting to
|
3564
|
+
Whether to use TLS when connecting to Influxdb.
|
3755
3565
|
"""
|
3756
3566
|
return pulumi.get(self, "tls")
|
3757
3567
|
|
@@ -3759,7 +3569,7 @@ class SecretsMountInfluxdb(dict):
|
|
3759
3569
|
@pulumi.getter(name="usernameTemplate")
|
3760
3570
|
def username_template(self) -> Optional[str]:
|
3761
3571
|
"""
|
3762
|
-
|
3572
|
+
Template describing how dynamic usernames are generated.
|
3763
3573
|
"""
|
3764
3574
|
return pulumi.get(self, "username_template")
|
3765
3575
|
|
@@ -3826,21 +3636,18 @@ class SecretsMountMongodb(dict):
|
|
3826
3636
|
:param str name: Name of the database connection.
|
3827
3637
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3828
3638
|
connection.
|
3829
|
-
:param str connection_url:
|
3830
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
3639
|
+
:param str connection_url: Connection string to use to connect to the database.
|
3831
3640
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3832
3641
|
|
3833
3642
|
Supported list of database secrets engines that can be configured:
|
3834
|
-
:param int max_connection_lifetime:
|
3835
|
-
:param int max_idle_connections:
|
3836
|
-
|
3837
|
-
:param
|
3838
|
-
the database.
|
3839
|
-
:param str password: The root credential password used in the connection URL.
|
3643
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
3644
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
3645
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
3646
|
+
:param str password: The root credential password used in the connection URL
|
3840
3647
|
:param str plugin_name: Specifies the name of the plugin to use.
|
3841
3648
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
3842
|
-
:param str username: The root credential username used in the connection URL
|
3843
|
-
:param str username_template:
|
3649
|
+
:param str username: The root credential username used in the connection URL
|
3650
|
+
:param str username_template: Username generation template.
|
3844
3651
|
:param bool verify_connection: Whether the connection should be verified on
|
3845
3652
|
initial configuration or not.
|
3846
3653
|
"""
|
@@ -3891,8 +3698,7 @@ class SecretsMountMongodb(dict):
|
|
3891
3698
|
@pulumi.getter(name="connectionUrl")
|
3892
3699
|
def connection_url(self) -> Optional[str]:
|
3893
3700
|
"""
|
3894
|
-
|
3895
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
3701
|
+
Connection string to use to connect to the database.
|
3896
3702
|
"""
|
3897
3703
|
return pulumi.get(self, "connection_url")
|
3898
3704
|
|
@@ -3910,7 +3716,7 @@ class SecretsMountMongodb(dict):
|
|
3910
3716
|
@pulumi.getter(name="maxConnectionLifetime")
|
3911
3717
|
def max_connection_lifetime(self) -> Optional[int]:
|
3912
3718
|
"""
|
3913
|
-
|
3719
|
+
Maximum number of seconds a connection may be reused.
|
3914
3720
|
"""
|
3915
3721
|
return pulumi.get(self, "max_connection_lifetime")
|
3916
3722
|
|
@@ -3918,8 +3724,7 @@ class SecretsMountMongodb(dict):
|
|
3918
3724
|
@pulumi.getter(name="maxIdleConnections")
|
3919
3725
|
def max_idle_connections(self) -> Optional[int]:
|
3920
3726
|
"""
|
3921
|
-
|
3922
|
-
the database.
|
3727
|
+
Maximum number of idle connections to the database.
|
3923
3728
|
"""
|
3924
3729
|
return pulumi.get(self, "max_idle_connections")
|
3925
3730
|
|
@@ -3927,8 +3732,7 @@ class SecretsMountMongodb(dict):
|
|
3927
3732
|
@pulumi.getter(name="maxOpenConnections")
|
3928
3733
|
def max_open_connections(self) -> Optional[int]:
|
3929
3734
|
"""
|
3930
|
-
|
3931
|
-
the database.
|
3735
|
+
Maximum number of open connections to the database.
|
3932
3736
|
"""
|
3933
3737
|
return pulumi.get(self, "max_open_connections")
|
3934
3738
|
|
@@ -3936,7 +3740,7 @@ class SecretsMountMongodb(dict):
|
|
3936
3740
|
@pulumi.getter
|
3937
3741
|
def password(self) -> Optional[str]:
|
3938
3742
|
"""
|
3939
|
-
The root credential password used in the connection URL
|
3743
|
+
The root credential password used in the connection URL
|
3940
3744
|
"""
|
3941
3745
|
return pulumi.get(self, "password")
|
3942
3746
|
|
@@ -3960,7 +3764,7 @@ class SecretsMountMongodb(dict):
|
|
3960
3764
|
@pulumi.getter
|
3961
3765
|
def username(self) -> Optional[str]:
|
3962
3766
|
"""
|
3963
|
-
The root credential username used in the connection URL
|
3767
|
+
The root credential username used in the connection URL
|
3964
3768
|
"""
|
3965
3769
|
return pulumi.get(self, "username")
|
3966
3770
|
|
@@ -3968,7 +3772,7 @@ class SecretsMountMongodb(dict):
|
|
3968
3772
|
@pulumi.getter(name="usernameTemplate")
|
3969
3773
|
def username_template(self) -> Optional[str]:
|
3970
3774
|
"""
|
3971
|
-
|
3775
|
+
Username generation template.
|
3972
3776
|
"""
|
3973
3777
|
return pulumi.get(self, "username_template")
|
3974
3778
|
|
@@ -4189,25 +3993,20 @@ class SecretsMountMssql(dict):
|
|
4189
3993
|
:param str name: Name of the database connection.
|
4190
3994
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
4191
3995
|
connection.
|
4192
|
-
:param str connection_url:
|
4193
|
-
|
4194
|
-
:param bool contained_db: For Vault v1.9+. Set to true when the target is a
|
4195
|
-
Contained Database, e.g. AzureSQL.
|
4196
|
-
See [Vault docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
|
3996
|
+
:param str connection_url: Connection string to use to connect to the database.
|
3997
|
+
:param bool contained_db: Set to true when the target is a Contained Database, e.g. AzureSQL.
|
4197
3998
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4198
3999
|
|
4199
4000
|
Supported list of database secrets engines that can be configured:
|
4200
|
-
:param bool disable_escaping: Disable special character escaping in username and password
|
4201
|
-
:param int max_connection_lifetime:
|
4202
|
-
:param int max_idle_connections:
|
4203
|
-
|
4204
|
-
:param
|
4205
|
-
the database.
|
4206
|
-
:param str password: The root credential password used in the connection URL.
|
4001
|
+
:param bool disable_escaping: Disable special character escaping in username and password
|
4002
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
4003
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
4004
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
4005
|
+
:param str password: The root credential password used in the connection URL
|
4207
4006
|
:param str plugin_name: Specifies the name of the plugin to use.
|
4208
4007
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
4209
|
-
:param str username: The root credential username used in the connection URL
|
4210
|
-
:param str username_template:
|
4008
|
+
:param str username: The root credential username used in the connection URL
|
4009
|
+
:param str username_template: Username generation template.
|
4211
4010
|
:param bool verify_connection: Whether the connection should be verified on
|
4212
4011
|
initial configuration or not.
|
4213
4012
|
"""
|
@@ -4262,8 +4061,7 @@ class SecretsMountMssql(dict):
|
|
4262
4061
|
@pulumi.getter(name="connectionUrl")
|
4263
4062
|
def connection_url(self) -> Optional[str]:
|
4264
4063
|
"""
|
4265
|
-
|
4266
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4064
|
+
Connection string to use to connect to the database.
|
4267
4065
|
"""
|
4268
4066
|
return pulumi.get(self, "connection_url")
|
4269
4067
|
|
@@ -4271,9 +4069,7 @@ class SecretsMountMssql(dict):
|
|
4271
4069
|
@pulumi.getter(name="containedDb")
|
4272
4070
|
def contained_db(self) -> Optional[bool]:
|
4273
4071
|
"""
|
4274
|
-
|
4275
|
-
Contained Database, e.g. AzureSQL.
|
4276
|
-
See [Vault docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
|
4072
|
+
Set to true when the target is a Contained Database, e.g. AzureSQL.
|
4277
4073
|
"""
|
4278
4074
|
return pulumi.get(self, "contained_db")
|
4279
4075
|
|
@@ -4291,7 +4087,7 @@ class SecretsMountMssql(dict):
|
|
4291
4087
|
@pulumi.getter(name="disableEscaping")
|
4292
4088
|
def disable_escaping(self) -> Optional[bool]:
|
4293
4089
|
"""
|
4294
|
-
Disable special character escaping in username and password
|
4090
|
+
Disable special character escaping in username and password
|
4295
4091
|
"""
|
4296
4092
|
return pulumi.get(self, "disable_escaping")
|
4297
4093
|
|
@@ -4299,7 +4095,7 @@ class SecretsMountMssql(dict):
|
|
4299
4095
|
@pulumi.getter(name="maxConnectionLifetime")
|
4300
4096
|
def max_connection_lifetime(self) -> Optional[int]:
|
4301
4097
|
"""
|
4302
|
-
|
4098
|
+
Maximum number of seconds a connection may be reused.
|
4303
4099
|
"""
|
4304
4100
|
return pulumi.get(self, "max_connection_lifetime")
|
4305
4101
|
|
@@ -4307,8 +4103,7 @@ class SecretsMountMssql(dict):
|
|
4307
4103
|
@pulumi.getter(name="maxIdleConnections")
|
4308
4104
|
def max_idle_connections(self) -> Optional[int]:
|
4309
4105
|
"""
|
4310
|
-
|
4311
|
-
the database.
|
4106
|
+
Maximum number of idle connections to the database.
|
4312
4107
|
"""
|
4313
4108
|
return pulumi.get(self, "max_idle_connections")
|
4314
4109
|
|
@@ -4316,8 +4111,7 @@ class SecretsMountMssql(dict):
|
|
4316
4111
|
@pulumi.getter(name="maxOpenConnections")
|
4317
4112
|
def max_open_connections(self) -> Optional[int]:
|
4318
4113
|
"""
|
4319
|
-
|
4320
|
-
the database.
|
4114
|
+
Maximum number of open connections to the database.
|
4321
4115
|
"""
|
4322
4116
|
return pulumi.get(self, "max_open_connections")
|
4323
4117
|
|
@@ -4325,7 +4119,7 @@ class SecretsMountMssql(dict):
|
|
4325
4119
|
@pulumi.getter
|
4326
4120
|
def password(self) -> Optional[str]:
|
4327
4121
|
"""
|
4328
|
-
The root credential password used in the connection URL
|
4122
|
+
The root credential password used in the connection URL
|
4329
4123
|
"""
|
4330
4124
|
return pulumi.get(self, "password")
|
4331
4125
|
|
@@ -4349,7 +4143,7 @@ class SecretsMountMssql(dict):
|
|
4349
4143
|
@pulumi.getter
|
4350
4144
|
def username(self) -> Optional[str]:
|
4351
4145
|
"""
|
4352
|
-
The root credential username used in the connection URL
|
4146
|
+
The root credential username used in the connection URL
|
4353
4147
|
"""
|
4354
4148
|
return pulumi.get(self, "username")
|
4355
4149
|
|
@@ -4357,7 +4151,7 @@ class SecretsMountMssql(dict):
|
|
4357
4151
|
@pulumi.getter(name="usernameTemplate")
|
4358
4152
|
def username_template(self) -> Optional[str]:
|
4359
4153
|
"""
|
4360
|
-
|
4154
|
+
Username generation template.
|
4361
4155
|
"""
|
4362
4156
|
return pulumi.get(self, "username_template")
|
4363
4157
|
|
@@ -4437,24 +4231,21 @@ class SecretsMountMysql(dict):
|
|
4437
4231
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
4438
4232
|
connection.
|
4439
4233
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4440
|
-
:param str connection_url:
|
4441
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4234
|
+
:param str connection_url: Connection string to use to connect to the database.
|
4442
4235
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4443
4236
|
|
4444
4237
|
Supported list of database secrets engines that can be configured:
|
4445
|
-
:param int max_connection_lifetime:
|
4446
|
-
:param int max_idle_connections:
|
4447
|
-
|
4448
|
-
:param
|
4449
|
-
the database.
|
4450
|
-
:param str password: The root credential password used in the connection URL.
|
4238
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
4239
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
4240
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
4241
|
+
:param str password: The root credential password used in the connection URL
|
4451
4242
|
:param str plugin_name: Specifies the name of the plugin to use.
|
4452
4243
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
4453
4244
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
4454
4245
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
4455
4246
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
4456
|
-
:param str username: The root credential username used in the connection URL
|
4457
|
-
:param str username_template:
|
4247
|
+
:param str username: The root credential username used in the connection URL
|
4248
|
+
:param str username_template: Username generation template.
|
4458
4249
|
:param bool verify_connection: Whether the connection should be verified on
|
4459
4250
|
initial configuration or not.
|
4460
4251
|
"""
|
@@ -4521,8 +4312,7 @@ class SecretsMountMysql(dict):
|
|
4521
4312
|
@pulumi.getter(name="connectionUrl")
|
4522
4313
|
def connection_url(self) -> Optional[str]:
|
4523
4314
|
"""
|
4524
|
-
|
4525
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4315
|
+
Connection string to use to connect to the database.
|
4526
4316
|
"""
|
4527
4317
|
return pulumi.get(self, "connection_url")
|
4528
4318
|
|
@@ -4540,7 +4330,7 @@ class SecretsMountMysql(dict):
|
|
4540
4330
|
@pulumi.getter(name="maxConnectionLifetime")
|
4541
4331
|
def max_connection_lifetime(self) -> Optional[int]:
|
4542
4332
|
"""
|
4543
|
-
|
4333
|
+
Maximum number of seconds a connection may be reused.
|
4544
4334
|
"""
|
4545
4335
|
return pulumi.get(self, "max_connection_lifetime")
|
4546
4336
|
|
@@ -4548,8 +4338,7 @@ class SecretsMountMysql(dict):
|
|
4548
4338
|
@pulumi.getter(name="maxIdleConnections")
|
4549
4339
|
def max_idle_connections(self) -> Optional[int]:
|
4550
4340
|
"""
|
4551
|
-
|
4552
|
-
the database.
|
4341
|
+
Maximum number of idle connections to the database.
|
4553
4342
|
"""
|
4554
4343
|
return pulumi.get(self, "max_idle_connections")
|
4555
4344
|
|
@@ -4557,8 +4346,7 @@ class SecretsMountMysql(dict):
|
|
4557
4346
|
@pulumi.getter(name="maxOpenConnections")
|
4558
4347
|
def max_open_connections(self) -> Optional[int]:
|
4559
4348
|
"""
|
4560
|
-
|
4561
|
-
the database.
|
4349
|
+
Maximum number of open connections to the database.
|
4562
4350
|
"""
|
4563
4351
|
return pulumi.get(self, "max_open_connections")
|
4564
4352
|
|
@@ -4566,7 +4354,7 @@ class SecretsMountMysql(dict):
|
|
4566
4354
|
@pulumi.getter
|
4567
4355
|
def password(self) -> Optional[str]:
|
4568
4356
|
"""
|
4569
|
-
The root credential password used in the connection URL
|
4357
|
+
The root credential password used in the connection URL
|
4570
4358
|
"""
|
4571
4359
|
return pulumi.get(self, "password")
|
4572
4360
|
|
@@ -4614,7 +4402,7 @@ class SecretsMountMysql(dict):
|
|
4614
4402
|
@pulumi.getter
|
4615
4403
|
def username(self) -> Optional[str]:
|
4616
4404
|
"""
|
4617
|
-
The root credential username used in the connection URL
|
4405
|
+
The root credential username used in the connection URL
|
4618
4406
|
"""
|
4619
4407
|
return pulumi.get(self, "username")
|
4620
4408
|
|
@@ -4622,7 +4410,7 @@ class SecretsMountMysql(dict):
|
|
4622
4410
|
@pulumi.getter(name="usernameTemplate")
|
4623
4411
|
def username_template(self) -> Optional[str]:
|
4624
4412
|
"""
|
4625
|
-
|
4413
|
+
Username generation template.
|
4626
4414
|
"""
|
4627
4415
|
return pulumi.get(self, "username_template")
|
4628
4416
|
|
@@ -4702,24 +4490,21 @@ class SecretsMountMysqlAurora(dict):
|
|
4702
4490
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
4703
4491
|
connection.
|
4704
4492
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4705
|
-
:param str connection_url:
|
4706
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4493
|
+
:param str connection_url: Connection string to use to connect to the database.
|
4707
4494
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4708
4495
|
|
4709
4496
|
Supported list of database secrets engines that can be configured:
|
4710
|
-
:param int max_connection_lifetime:
|
4711
|
-
:param int max_idle_connections:
|
4712
|
-
|
4713
|
-
:param
|
4714
|
-
the database.
|
4715
|
-
:param str password: The root credential password used in the connection URL.
|
4497
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
4498
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
4499
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
4500
|
+
:param str password: The root credential password used in the connection URL
|
4716
4501
|
:param str plugin_name: Specifies the name of the plugin to use.
|
4717
4502
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
4718
4503
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
4719
4504
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
4720
4505
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
4721
|
-
:param str username: The root credential username used in the connection URL
|
4722
|
-
:param str username_template:
|
4506
|
+
:param str username: The root credential username used in the connection URL
|
4507
|
+
:param str username_template: Username generation template.
|
4723
4508
|
:param bool verify_connection: Whether the connection should be verified on
|
4724
4509
|
initial configuration or not.
|
4725
4510
|
"""
|
@@ -4786,8 +4571,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4786
4571
|
@pulumi.getter(name="connectionUrl")
|
4787
4572
|
def connection_url(self) -> Optional[str]:
|
4788
4573
|
"""
|
4789
|
-
|
4790
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4574
|
+
Connection string to use to connect to the database.
|
4791
4575
|
"""
|
4792
4576
|
return pulumi.get(self, "connection_url")
|
4793
4577
|
|
@@ -4805,7 +4589,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4805
4589
|
@pulumi.getter(name="maxConnectionLifetime")
|
4806
4590
|
def max_connection_lifetime(self) -> Optional[int]:
|
4807
4591
|
"""
|
4808
|
-
|
4592
|
+
Maximum number of seconds a connection may be reused.
|
4809
4593
|
"""
|
4810
4594
|
return pulumi.get(self, "max_connection_lifetime")
|
4811
4595
|
|
@@ -4813,8 +4597,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4813
4597
|
@pulumi.getter(name="maxIdleConnections")
|
4814
4598
|
def max_idle_connections(self) -> Optional[int]:
|
4815
4599
|
"""
|
4816
|
-
|
4817
|
-
the database.
|
4600
|
+
Maximum number of idle connections to the database.
|
4818
4601
|
"""
|
4819
4602
|
return pulumi.get(self, "max_idle_connections")
|
4820
4603
|
|
@@ -4822,8 +4605,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4822
4605
|
@pulumi.getter(name="maxOpenConnections")
|
4823
4606
|
def max_open_connections(self) -> Optional[int]:
|
4824
4607
|
"""
|
4825
|
-
|
4826
|
-
the database.
|
4608
|
+
Maximum number of open connections to the database.
|
4827
4609
|
"""
|
4828
4610
|
return pulumi.get(self, "max_open_connections")
|
4829
4611
|
|
@@ -4831,7 +4613,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4831
4613
|
@pulumi.getter
|
4832
4614
|
def password(self) -> Optional[str]:
|
4833
4615
|
"""
|
4834
|
-
The root credential password used in the connection URL
|
4616
|
+
The root credential password used in the connection URL
|
4835
4617
|
"""
|
4836
4618
|
return pulumi.get(self, "password")
|
4837
4619
|
|
@@ -4879,7 +4661,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4879
4661
|
@pulumi.getter
|
4880
4662
|
def username(self) -> Optional[str]:
|
4881
4663
|
"""
|
4882
|
-
The root credential username used in the connection URL
|
4664
|
+
The root credential username used in the connection URL
|
4883
4665
|
"""
|
4884
4666
|
return pulumi.get(self, "username")
|
4885
4667
|
|
@@ -4887,7 +4669,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4887
4669
|
@pulumi.getter(name="usernameTemplate")
|
4888
4670
|
def username_template(self) -> Optional[str]:
|
4889
4671
|
"""
|
4890
|
-
|
4672
|
+
Username generation template.
|
4891
4673
|
"""
|
4892
4674
|
return pulumi.get(self, "username_template")
|
4893
4675
|
|
@@ -4967,24 +4749,21 @@ class SecretsMountMysqlLegacy(dict):
|
|
4967
4749
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
4968
4750
|
connection.
|
4969
4751
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4970
|
-
:param str connection_url:
|
4971
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4752
|
+
:param str connection_url: Connection string to use to connect to the database.
|
4972
4753
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4973
4754
|
|
4974
4755
|
Supported list of database secrets engines that can be configured:
|
4975
|
-
:param int max_connection_lifetime:
|
4976
|
-
:param int max_idle_connections:
|
4977
|
-
|
4978
|
-
:param
|
4979
|
-
the database.
|
4980
|
-
:param str password: The root credential password used in the connection URL.
|
4756
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
4757
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
4758
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
4759
|
+
:param str password: The root credential password used in the connection URL
|
4981
4760
|
:param str plugin_name: Specifies the name of the plugin to use.
|
4982
4761
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
4983
4762
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
4984
4763
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
4985
4764
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
4986
|
-
:param str username: The root credential username used in the connection URL
|
4987
|
-
:param str username_template:
|
4765
|
+
:param str username: The root credential username used in the connection URL
|
4766
|
+
:param str username_template: Username generation template.
|
4988
4767
|
:param bool verify_connection: Whether the connection should be verified on
|
4989
4768
|
initial configuration or not.
|
4990
4769
|
"""
|
@@ -5051,8 +4830,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
5051
4830
|
@pulumi.getter(name="connectionUrl")
|
5052
4831
|
def connection_url(self) -> Optional[str]:
|
5053
4832
|
"""
|
5054
|
-
|
5055
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
4833
|
+
Connection string to use to connect to the database.
|
5056
4834
|
"""
|
5057
4835
|
return pulumi.get(self, "connection_url")
|
5058
4836
|
|
@@ -5070,7 +4848,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
5070
4848
|
@pulumi.getter(name="maxConnectionLifetime")
|
5071
4849
|
def max_connection_lifetime(self) -> Optional[int]:
|
5072
4850
|
"""
|
5073
|
-
|
4851
|
+
Maximum number of seconds a connection may be reused.
|
5074
4852
|
"""
|
5075
4853
|
return pulumi.get(self, "max_connection_lifetime")
|
5076
4854
|
|
@@ -5078,8 +4856,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
5078
4856
|
@pulumi.getter(name="maxIdleConnections")
|
5079
4857
|
def max_idle_connections(self) -> Optional[int]:
|
5080
4858
|
"""
|
5081
|
-
|
5082
|
-
the database.
|
4859
|
+
Maximum number of idle connections to the database.
|
5083
4860
|
"""
|
5084
4861
|
return pulumi.get(self, "max_idle_connections")
|
5085
4862
|
|
@@ -5087,8 +4864,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
5087
4864
|
@pulumi.getter(name="maxOpenConnections")
|
5088
4865
|
def max_open_connections(self) -> Optional[int]:
|
5089
4866
|
"""
|
5090
|
-
|
5091
|
-
the database.
|
4867
|
+
Maximum number of open connections to the database.
|
5092
4868
|
"""
|
5093
4869
|
return pulumi.get(self, "max_open_connections")
|
5094
4870
|
|
@@ -5096,7 +4872,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
5096
4872
|
@pulumi.getter
|
5097
4873
|
def password(self) -> Optional[str]:
|
5098
4874
|
"""
|
5099
|
-
The root credential password used in the connection URL
|
4875
|
+
The root credential password used in the connection URL
|
5100
4876
|
"""
|
5101
4877
|
return pulumi.get(self, "password")
|
5102
4878
|
|
@@ -5144,7 +4920,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
5144
4920
|
@pulumi.getter
|
5145
4921
|
def username(self) -> Optional[str]:
|
5146
4922
|
"""
|
5147
|
-
The root credential username used in the connection URL
|
4923
|
+
The root credential username used in the connection URL
|
5148
4924
|
"""
|
5149
4925
|
return pulumi.get(self, "username")
|
5150
4926
|
|
@@ -5152,7 +4928,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
5152
4928
|
@pulumi.getter(name="usernameTemplate")
|
5153
4929
|
def username_template(self) -> Optional[str]:
|
5154
4930
|
"""
|
5155
|
-
|
4931
|
+
Username generation template.
|
5156
4932
|
"""
|
5157
4933
|
return pulumi.get(self, "username_template")
|
5158
4934
|
|
@@ -5232,24 +5008,21 @@ class SecretsMountMysqlRd(dict):
|
|
5232
5008
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
5233
5009
|
connection.
|
5234
5010
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5235
|
-
:param str connection_url:
|
5236
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
5011
|
+
:param str connection_url: Connection string to use to connect to the database.
|
5237
5012
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5238
5013
|
|
5239
5014
|
Supported list of database secrets engines that can be configured:
|
5240
|
-
:param int max_connection_lifetime:
|
5241
|
-
:param int max_idle_connections:
|
5242
|
-
|
5243
|
-
:param
|
5244
|
-
the database.
|
5245
|
-
:param str password: The root credential password used in the connection URL.
|
5015
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
5016
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
5017
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
5018
|
+
:param str password: The root credential password used in the connection URL
|
5246
5019
|
:param str plugin_name: Specifies the name of the plugin to use.
|
5247
5020
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5248
5021
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
5249
5022
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
5250
5023
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
5251
|
-
:param str username: The root credential username used in the connection URL
|
5252
|
-
:param str username_template:
|
5024
|
+
:param str username: The root credential username used in the connection URL
|
5025
|
+
:param str username_template: Username generation template.
|
5253
5026
|
:param bool verify_connection: Whether the connection should be verified on
|
5254
5027
|
initial configuration or not.
|
5255
5028
|
"""
|
@@ -5316,8 +5089,7 @@ class SecretsMountMysqlRd(dict):
|
|
5316
5089
|
@pulumi.getter(name="connectionUrl")
|
5317
5090
|
def connection_url(self) -> Optional[str]:
|
5318
5091
|
"""
|
5319
|
-
|
5320
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
5092
|
+
Connection string to use to connect to the database.
|
5321
5093
|
"""
|
5322
5094
|
return pulumi.get(self, "connection_url")
|
5323
5095
|
|
@@ -5335,7 +5107,7 @@ class SecretsMountMysqlRd(dict):
|
|
5335
5107
|
@pulumi.getter(name="maxConnectionLifetime")
|
5336
5108
|
def max_connection_lifetime(self) -> Optional[int]:
|
5337
5109
|
"""
|
5338
|
-
|
5110
|
+
Maximum number of seconds a connection may be reused.
|
5339
5111
|
"""
|
5340
5112
|
return pulumi.get(self, "max_connection_lifetime")
|
5341
5113
|
|
@@ -5343,8 +5115,7 @@ class SecretsMountMysqlRd(dict):
|
|
5343
5115
|
@pulumi.getter(name="maxIdleConnections")
|
5344
5116
|
def max_idle_connections(self) -> Optional[int]:
|
5345
5117
|
"""
|
5346
|
-
|
5347
|
-
the database.
|
5118
|
+
Maximum number of idle connections to the database.
|
5348
5119
|
"""
|
5349
5120
|
return pulumi.get(self, "max_idle_connections")
|
5350
5121
|
|
@@ -5352,8 +5123,7 @@ class SecretsMountMysqlRd(dict):
|
|
5352
5123
|
@pulumi.getter(name="maxOpenConnections")
|
5353
5124
|
def max_open_connections(self) -> Optional[int]:
|
5354
5125
|
"""
|
5355
|
-
|
5356
|
-
the database.
|
5126
|
+
Maximum number of open connections to the database.
|
5357
5127
|
"""
|
5358
5128
|
return pulumi.get(self, "max_open_connections")
|
5359
5129
|
|
@@ -5361,7 +5131,7 @@ class SecretsMountMysqlRd(dict):
|
|
5361
5131
|
@pulumi.getter
|
5362
5132
|
def password(self) -> Optional[str]:
|
5363
5133
|
"""
|
5364
|
-
The root credential password used in the connection URL
|
5134
|
+
The root credential password used in the connection URL
|
5365
5135
|
"""
|
5366
5136
|
return pulumi.get(self, "password")
|
5367
5137
|
|
@@ -5409,7 +5179,7 @@ class SecretsMountMysqlRd(dict):
|
|
5409
5179
|
@pulumi.getter
|
5410
5180
|
def username(self) -> Optional[str]:
|
5411
5181
|
"""
|
5412
|
-
The root credential username used in the connection URL
|
5182
|
+
The root credential username used in the connection URL
|
5413
5183
|
"""
|
5414
5184
|
return pulumi.get(self, "username")
|
5415
5185
|
|
@@ -5417,7 +5187,7 @@ class SecretsMountMysqlRd(dict):
|
|
5417
5187
|
@pulumi.getter(name="usernameTemplate")
|
5418
5188
|
def username_template(self) -> Optional[str]:
|
5419
5189
|
"""
|
5420
|
-
|
5190
|
+
Username generation template.
|
5421
5191
|
"""
|
5422
5192
|
return pulumi.get(self, "username_template")
|
5423
5193
|
|
@@ -5490,23 +5260,20 @@ class SecretsMountOracle(dict):
|
|
5490
5260
|
:param str name: Name of the database connection.
|
5491
5261
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
5492
5262
|
connection.
|
5493
|
-
:param str connection_url:
|
5494
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
5263
|
+
:param str connection_url: Connection string to use to connect to the database.
|
5495
5264
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5496
5265
|
|
5497
5266
|
Supported list of database secrets engines that can be configured:
|
5498
5267
|
:param bool disconnect_sessions: Set to true to disconnect any open sessions prior to running the revocation statements.
|
5499
|
-
:param int max_connection_lifetime:
|
5500
|
-
:param int max_idle_connections:
|
5501
|
-
|
5502
|
-
:param
|
5503
|
-
the database.
|
5504
|
-
:param str password: The root credential password used in the connection URL.
|
5268
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
5269
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
5270
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
5271
|
+
:param str password: The root credential password used in the connection URL
|
5505
5272
|
:param str plugin_name: Specifies the name of the plugin to use.
|
5506
5273
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5507
5274
|
:param bool split_statements: Set to true in order to split statements after semi-colons.
|
5508
|
-
:param str username: The root credential username used in the connection URL
|
5509
|
-
:param str username_template:
|
5275
|
+
:param str username: The root credential username used in the connection URL
|
5276
|
+
:param str username_template: Username generation template.
|
5510
5277
|
:param bool verify_connection: Whether the connection should be verified on
|
5511
5278
|
initial configuration or not.
|
5512
5279
|
"""
|
@@ -5561,8 +5328,7 @@ class SecretsMountOracle(dict):
|
|
5561
5328
|
@pulumi.getter(name="connectionUrl")
|
5562
5329
|
def connection_url(self) -> Optional[str]:
|
5563
5330
|
"""
|
5564
|
-
|
5565
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
5331
|
+
Connection string to use to connect to the database.
|
5566
5332
|
"""
|
5567
5333
|
return pulumi.get(self, "connection_url")
|
5568
5334
|
|
@@ -5588,7 +5354,7 @@ class SecretsMountOracle(dict):
|
|
5588
5354
|
@pulumi.getter(name="maxConnectionLifetime")
|
5589
5355
|
def max_connection_lifetime(self) -> Optional[int]:
|
5590
5356
|
"""
|
5591
|
-
|
5357
|
+
Maximum number of seconds a connection may be reused.
|
5592
5358
|
"""
|
5593
5359
|
return pulumi.get(self, "max_connection_lifetime")
|
5594
5360
|
|
@@ -5596,8 +5362,7 @@ class SecretsMountOracle(dict):
|
|
5596
5362
|
@pulumi.getter(name="maxIdleConnections")
|
5597
5363
|
def max_idle_connections(self) -> Optional[int]:
|
5598
5364
|
"""
|
5599
|
-
|
5600
|
-
the database.
|
5365
|
+
Maximum number of idle connections to the database.
|
5601
5366
|
"""
|
5602
5367
|
return pulumi.get(self, "max_idle_connections")
|
5603
5368
|
|
@@ -5605,8 +5370,7 @@ class SecretsMountOracle(dict):
|
|
5605
5370
|
@pulumi.getter(name="maxOpenConnections")
|
5606
5371
|
def max_open_connections(self) -> Optional[int]:
|
5607
5372
|
"""
|
5608
|
-
|
5609
|
-
the database.
|
5373
|
+
Maximum number of open connections to the database.
|
5610
5374
|
"""
|
5611
5375
|
return pulumi.get(self, "max_open_connections")
|
5612
5376
|
|
@@ -5614,7 +5378,7 @@ class SecretsMountOracle(dict):
|
|
5614
5378
|
@pulumi.getter
|
5615
5379
|
def password(self) -> Optional[str]:
|
5616
5380
|
"""
|
5617
|
-
The root credential password used in the connection URL
|
5381
|
+
The root credential password used in the connection URL
|
5618
5382
|
"""
|
5619
5383
|
return pulumi.get(self, "password")
|
5620
5384
|
|
@@ -5646,7 +5410,7 @@ class SecretsMountOracle(dict):
|
|
5646
5410
|
@pulumi.getter
|
5647
5411
|
def username(self) -> Optional[str]:
|
5648
5412
|
"""
|
5649
|
-
The root credential username used in the connection URL
|
5413
|
+
The root credential username used in the connection URL
|
5650
5414
|
"""
|
5651
5415
|
return pulumi.get(self, "username")
|
5652
5416
|
|
@@ -5654,7 +5418,7 @@ class SecretsMountOracle(dict):
|
|
5654
5418
|
@pulumi.getter(name="usernameTemplate")
|
5655
5419
|
def username_template(self) -> Optional[str]:
|
5656
5420
|
"""
|
5657
|
-
|
5421
|
+
Username generation template.
|
5658
5422
|
"""
|
5659
5423
|
return pulumi.get(self, "username_template")
|
5660
5424
|
|
@@ -5731,23 +5495,20 @@ class SecretsMountPostgresql(dict):
|
|
5731
5495
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
5732
5496
|
connection.
|
5733
5497
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5734
|
-
:param str connection_url:
|
5735
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
5498
|
+
:param str connection_url: Connection string to use to connect to the database.
|
5736
5499
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5737
5500
|
|
5738
5501
|
Supported list of database secrets engines that can be configured:
|
5739
|
-
:param bool disable_escaping: Disable special character escaping in username and password
|
5740
|
-
:param int max_connection_lifetime:
|
5741
|
-
:param int max_idle_connections:
|
5742
|
-
|
5743
|
-
:param
|
5744
|
-
the database.
|
5745
|
-
:param str password: The root credential password used in the connection URL.
|
5502
|
+
:param bool disable_escaping: Disable special character escaping in username and password
|
5503
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
5504
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
5505
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
5506
|
+
:param str password: The root credential password used in the connection URL
|
5746
5507
|
:param str plugin_name: Specifies the name of the plugin to use.
|
5747
5508
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5748
5509
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
5749
|
-
:param str username: The root credential username used in the connection URL
|
5750
|
-
:param str username_template:
|
5510
|
+
:param str username: The root credential username used in the connection URL
|
5511
|
+
:param str username_template: Username generation template.
|
5751
5512
|
:param bool verify_connection: Whether the connection should be verified on
|
5752
5513
|
initial configuration or not.
|
5753
5514
|
"""
|
@@ -5812,8 +5573,7 @@ class SecretsMountPostgresql(dict):
|
|
5812
5573
|
@pulumi.getter(name="connectionUrl")
|
5813
5574
|
def connection_url(self) -> Optional[str]:
|
5814
5575
|
"""
|
5815
|
-
|
5816
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
5576
|
+
Connection string to use to connect to the database.
|
5817
5577
|
"""
|
5818
5578
|
return pulumi.get(self, "connection_url")
|
5819
5579
|
|
@@ -5831,7 +5591,7 @@ class SecretsMountPostgresql(dict):
|
|
5831
5591
|
@pulumi.getter(name="disableEscaping")
|
5832
5592
|
def disable_escaping(self) -> Optional[bool]:
|
5833
5593
|
"""
|
5834
|
-
Disable special character escaping in username and password
|
5594
|
+
Disable special character escaping in username and password
|
5835
5595
|
"""
|
5836
5596
|
return pulumi.get(self, "disable_escaping")
|
5837
5597
|
|
@@ -5839,7 +5599,7 @@ class SecretsMountPostgresql(dict):
|
|
5839
5599
|
@pulumi.getter(name="maxConnectionLifetime")
|
5840
5600
|
def max_connection_lifetime(self) -> Optional[int]:
|
5841
5601
|
"""
|
5842
|
-
|
5602
|
+
Maximum number of seconds a connection may be reused.
|
5843
5603
|
"""
|
5844
5604
|
return pulumi.get(self, "max_connection_lifetime")
|
5845
5605
|
|
@@ -5847,8 +5607,7 @@ class SecretsMountPostgresql(dict):
|
|
5847
5607
|
@pulumi.getter(name="maxIdleConnections")
|
5848
5608
|
def max_idle_connections(self) -> Optional[int]:
|
5849
5609
|
"""
|
5850
|
-
|
5851
|
-
the database.
|
5610
|
+
Maximum number of idle connections to the database.
|
5852
5611
|
"""
|
5853
5612
|
return pulumi.get(self, "max_idle_connections")
|
5854
5613
|
|
@@ -5856,8 +5615,7 @@ class SecretsMountPostgresql(dict):
|
|
5856
5615
|
@pulumi.getter(name="maxOpenConnections")
|
5857
5616
|
def max_open_connections(self) -> Optional[int]:
|
5858
5617
|
"""
|
5859
|
-
|
5860
|
-
the database.
|
5618
|
+
Maximum number of open connections to the database.
|
5861
5619
|
"""
|
5862
5620
|
return pulumi.get(self, "max_open_connections")
|
5863
5621
|
|
@@ -5865,7 +5623,7 @@ class SecretsMountPostgresql(dict):
|
|
5865
5623
|
@pulumi.getter
|
5866
5624
|
def password(self) -> Optional[str]:
|
5867
5625
|
"""
|
5868
|
-
The root credential password used in the connection URL
|
5626
|
+
The root credential password used in the connection URL
|
5869
5627
|
"""
|
5870
5628
|
return pulumi.get(self, "password")
|
5871
5629
|
|
@@ -5897,7 +5655,7 @@ class SecretsMountPostgresql(dict):
|
|
5897
5655
|
@pulumi.getter
|
5898
5656
|
def username(self) -> Optional[str]:
|
5899
5657
|
"""
|
5900
|
-
The root credential username used in the connection URL
|
5658
|
+
The root credential username used in the connection URL
|
5901
5659
|
"""
|
5902
5660
|
return pulumi.get(self, "username")
|
5903
5661
|
|
@@ -5905,7 +5663,7 @@ class SecretsMountPostgresql(dict):
|
|
5905
5663
|
@pulumi.getter(name="usernameTemplate")
|
5906
5664
|
def username_template(self) -> Optional[str]:
|
5907
5665
|
"""
|
5908
|
-
|
5666
|
+
Username generation template.
|
5909
5667
|
"""
|
5910
5668
|
return pulumi.get(self, "username_template")
|
5911
5669
|
|
@@ -5963,23 +5721,21 @@ class SecretsMountRedi(dict):
|
|
5963
5721
|
tls: Optional[bool] = None,
|
5964
5722
|
verify_connection: Optional[bool] = None):
|
5965
5723
|
"""
|
5966
|
-
:param str host:
|
5724
|
+
:param str host: Specifies the host to connect to
|
5967
5725
|
:param str name: Name of the database connection.
|
5968
|
-
:param str password:
|
5969
|
-
:param str username:
|
5726
|
+
:param str password: Specifies the password corresponding to the given username.
|
5727
|
+
:param str username: Specifies the username for Vault to use.
|
5970
5728
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
5971
5729
|
connection.
|
5972
|
-
:param str ca_cert: The
|
5730
|
+
:param str ca_cert: The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
|
5973
5731
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5974
5732
|
|
5975
5733
|
Supported list of database secrets engines that can be configured:
|
5976
|
-
:param bool insecure_tls:
|
5977
|
-
certificate when using TLS.
|
5734
|
+
:param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
|
5978
5735
|
:param str plugin_name: Specifies the name of the plugin to use.
|
5979
|
-
:param int port: The
|
5980
|
-
part of the host.
|
5736
|
+
:param int port: The transport port to use to connect to Redis.
|
5981
5737
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5982
|
-
:param bool tls:
|
5738
|
+
:param bool tls: Specifies whether to use TLS when connecting to Redis.
|
5983
5739
|
:param bool verify_connection: Whether the connection should be verified on
|
5984
5740
|
initial configuration or not.
|
5985
5741
|
"""
|
@@ -6010,7 +5766,7 @@ class SecretsMountRedi(dict):
|
|
6010
5766
|
@pulumi.getter
|
6011
5767
|
def host(self) -> str:
|
6012
5768
|
"""
|
6013
|
-
|
5769
|
+
Specifies the host to connect to
|
6014
5770
|
"""
|
6015
5771
|
return pulumi.get(self, "host")
|
6016
5772
|
|
@@ -6026,7 +5782,7 @@ class SecretsMountRedi(dict):
|
|
6026
5782
|
@pulumi.getter
|
6027
5783
|
def password(self) -> str:
|
6028
5784
|
"""
|
6029
|
-
|
5785
|
+
Specifies the password corresponding to the given username.
|
6030
5786
|
"""
|
6031
5787
|
return pulumi.get(self, "password")
|
6032
5788
|
|
@@ -6034,7 +5790,7 @@ class SecretsMountRedi(dict):
|
|
6034
5790
|
@pulumi.getter
|
6035
5791
|
def username(self) -> str:
|
6036
5792
|
"""
|
6037
|
-
|
5793
|
+
Specifies the username for Vault to use.
|
6038
5794
|
"""
|
6039
5795
|
return pulumi.get(self, "username")
|
6040
5796
|
|
@@ -6051,7 +5807,7 @@ class SecretsMountRedi(dict):
|
|
6051
5807
|
@pulumi.getter(name="caCert")
|
6052
5808
|
def ca_cert(self) -> Optional[str]:
|
6053
5809
|
"""
|
6054
|
-
The
|
5810
|
+
The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
|
6055
5811
|
"""
|
6056
5812
|
return pulumi.get(self, "ca_cert")
|
6057
5813
|
|
@@ -6069,8 +5825,7 @@ class SecretsMountRedi(dict):
|
|
6069
5825
|
@pulumi.getter(name="insecureTls")
|
6070
5826
|
def insecure_tls(self) -> Optional[bool]:
|
6071
5827
|
"""
|
6072
|
-
|
6073
|
-
certificate when using TLS.
|
5828
|
+
Specifies whether to skip verification of the server certificate when using TLS.
|
6074
5829
|
"""
|
6075
5830
|
return pulumi.get(self, "insecure_tls")
|
6076
5831
|
|
@@ -6086,8 +5841,7 @@ class SecretsMountRedi(dict):
|
|
6086
5841
|
@pulumi.getter
|
6087
5842
|
def port(self) -> Optional[int]:
|
6088
5843
|
"""
|
6089
|
-
The
|
6090
|
-
part of the host.
|
5844
|
+
The transport port to use to connect to Redis.
|
6091
5845
|
"""
|
6092
5846
|
return pulumi.get(self, "port")
|
6093
5847
|
|
@@ -6103,7 +5857,7 @@ class SecretsMountRedi(dict):
|
|
6103
5857
|
@pulumi.getter
|
6104
5858
|
def tls(self) -> Optional[bool]:
|
6105
5859
|
"""
|
6106
|
-
|
5860
|
+
Specifies whether to use TLS when connecting to Redis.
|
6107
5861
|
"""
|
6108
5862
|
return pulumi.get(self, "tls")
|
6109
5863
|
|
@@ -6155,19 +5909,17 @@ class SecretsMountRedisElasticach(dict):
|
|
6155
5909
|
verify_connection: Optional[bool] = None):
|
6156
5910
|
"""
|
6157
5911
|
:param str name: Name of the database connection.
|
6158
|
-
:param str url: The
|
6159
|
-
by trusted CA if used.
|
5912
|
+
:param str url: The configuration endpoint for the ElastiCache cluster to connect to.
|
6160
5913
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
6161
5914
|
connection.
|
6162
5915
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6163
5916
|
|
6164
5917
|
Supported list of database secrets engines that can be configured:
|
6165
|
-
:param str password: The
|
5918
|
+
:param str password: The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
6166
5919
|
:param str plugin_name: Specifies the name of the plugin to use.
|
6167
|
-
:param str region: The AWS region where the ElastiCache cluster is hosted.
|
6168
|
-
If omitted the plugin tries to infer the region from the environment.
|
5920
|
+
:param str region: The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
|
6169
5921
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
6170
|
-
:param str username: The
|
5922
|
+
:param str username: The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
6171
5923
|
:param bool verify_connection: Whether the connection should be verified on
|
6172
5924
|
initial configuration or not.
|
6173
5925
|
"""
|
@@ -6202,8 +5954,7 @@ class SecretsMountRedisElasticach(dict):
|
|
6202
5954
|
@pulumi.getter
|
6203
5955
|
def url(self) -> str:
|
6204
5956
|
"""
|
6205
|
-
The
|
6206
|
-
by trusted CA if used.
|
5957
|
+
The configuration endpoint for the ElastiCache cluster to connect to.
|
6207
5958
|
"""
|
6208
5959
|
return pulumi.get(self, "url")
|
6209
5960
|
|
@@ -6230,7 +5981,7 @@ class SecretsMountRedisElasticach(dict):
|
|
6230
5981
|
@pulumi.getter
|
6231
5982
|
def password(self) -> Optional[str]:
|
6232
5983
|
"""
|
6233
|
-
The
|
5984
|
+
The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
6234
5985
|
"""
|
6235
5986
|
return pulumi.get(self, "password")
|
6236
5987
|
|
@@ -6246,8 +5997,7 @@ class SecretsMountRedisElasticach(dict):
|
|
6246
5997
|
@pulumi.getter
|
6247
5998
|
def region(self) -> Optional[str]:
|
6248
5999
|
"""
|
6249
|
-
The AWS region where the ElastiCache cluster is hosted.
|
6250
|
-
If omitted the plugin tries to infer the region from the environment.
|
6000
|
+
The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
|
6251
6001
|
"""
|
6252
6002
|
return pulumi.get(self, "region")
|
6253
6003
|
|
@@ -6263,7 +6013,7 @@ class SecretsMountRedisElasticach(dict):
|
|
6263
6013
|
@pulumi.getter
|
6264
6014
|
def username(self) -> Optional[str]:
|
6265
6015
|
"""
|
6266
|
-
The
|
6016
|
+
The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
6267
6017
|
"""
|
6268
6018
|
return pulumi.get(self, "username")
|
6269
6019
|
|
@@ -6333,22 +6083,19 @@ class SecretsMountRedshift(dict):
|
|
6333
6083
|
:param str name: Name of the database connection.
|
6334
6084
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
6335
6085
|
connection.
|
6336
|
-
:param str connection_url:
|
6337
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
6086
|
+
:param str connection_url: Connection string to use to connect to the database.
|
6338
6087
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6339
6088
|
|
6340
6089
|
Supported list of database secrets engines that can be configured:
|
6341
|
-
:param bool disable_escaping: Disable special character escaping in username and password
|
6342
|
-
:param int max_connection_lifetime:
|
6343
|
-
:param int max_idle_connections:
|
6344
|
-
|
6345
|
-
:param
|
6346
|
-
the database.
|
6347
|
-
:param str password: The root credential password used in the connection URL.
|
6090
|
+
:param bool disable_escaping: Disable special character escaping in username and password
|
6091
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
6092
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
6093
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
6094
|
+
:param str password: The root credential password used in the connection URL
|
6348
6095
|
:param str plugin_name: Specifies the name of the plugin to use.
|
6349
6096
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
6350
|
-
:param str username: The root credential username used in the connection URL
|
6351
|
-
:param str username_template:
|
6097
|
+
:param str username: The root credential username used in the connection URL
|
6098
|
+
:param str username_template: Username generation template.
|
6352
6099
|
:param bool verify_connection: Whether the connection should be verified on
|
6353
6100
|
initial configuration or not.
|
6354
6101
|
"""
|
@@ -6401,8 +6148,7 @@ class SecretsMountRedshift(dict):
|
|
6401
6148
|
@pulumi.getter(name="connectionUrl")
|
6402
6149
|
def connection_url(self) -> Optional[str]:
|
6403
6150
|
"""
|
6404
|
-
|
6405
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
6151
|
+
Connection string to use to connect to the database.
|
6406
6152
|
"""
|
6407
6153
|
return pulumi.get(self, "connection_url")
|
6408
6154
|
|
@@ -6420,7 +6166,7 @@ class SecretsMountRedshift(dict):
|
|
6420
6166
|
@pulumi.getter(name="disableEscaping")
|
6421
6167
|
def disable_escaping(self) -> Optional[bool]:
|
6422
6168
|
"""
|
6423
|
-
Disable special character escaping in username and password
|
6169
|
+
Disable special character escaping in username and password
|
6424
6170
|
"""
|
6425
6171
|
return pulumi.get(self, "disable_escaping")
|
6426
6172
|
|
@@ -6428,7 +6174,7 @@ class SecretsMountRedshift(dict):
|
|
6428
6174
|
@pulumi.getter(name="maxConnectionLifetime")
|
6429
6175
|
def max_connection_lifetime(self) -> Optional[int]:
|
6430
6176
|
"""
|
6431
|
-
|
6177
|
+
Maximum number of seconds a connection may be reused.
|
6432
6178
|
"""
|
6433
6179
|
return pulumi.get(self, "max_connection_lifetime")
|
6434
6180
|
|
@@ -6436,8 +6182,7 @@ class SecretsMountRedshift(dict):
|
|
6436
6182
|
@pulumi.getter(name="maxIdleConnections")
|
6437
6183
|
def max_idle_connections(self) -> Optional[int]:
|
6438
6184
|
"""
|
6439
|
-
|
6440
|
-
the database.
|
6185
|
+
Maximum number of idle connections to the database.
|
6441
6186
|
"""
|
6442
6187
|
return pulumi.get(self, "max_idle_connections")
|
6443
6188
|
|
@@ -6445,8 +6190,7 @@ class SecretsMountRedshift(dict):
|
|
6445
6190
|
@pulumi.getter(name="maxOpenConnections")
|
6446
6191
|
def max_open_connections(self) -> Optional[int]:
|
6447
6192
|
"""
|
6448
|
-
|
6449
|
-
the database.
|
6193
|
+
Maximum number of open connections to the database.
|
6450
6194
|
"""
|
6451
6195
|
return pulumi.get(self, "max_open_connections")
|
6452
6196
|
|
@@ -6454,7 +6198,7 @@ class SecretsMountRedshift(dict):
|
|
6454
6198
|
@pulumi.getter
|
6455
6199
|
def password(self) -> Optional[str]:
|
6456
6200
|
"""
|
6457
|
-
The root credential password used in the connection URL
|
6201
|
+
The root credential password used in the connection URL
|
6458
6202
|
"""
|
6459
6203
|
return pulumi.get(self, "password")
|
6460
6204
|
|
@@ -6478,7 +6222,7 @@ class SecretsMountRedshift(dict):
|
|
6478
6222
|
@pulumi.getter
|
6479
6223
|
def username(self) -> Optional[str]:
|
6480
6224
|
"""
|
6481
|
-
The root credential username used in the connection URL
|
6225
|
+
The root credential username used in the connection URL
|
6482
6226
|
"""
|
6483
6227
|
return pulumi.get(self, "username")
|
6484
6228
|
|
@@ -6486,7 +6230,7 @@ class SecretsMountRedshift(dict):
|
|
6486
6230
|
@pulumi.getter(name="usernameTemplate")
|
6487
6231
|
def username_template(self) -> Optional[str]:
|
6488
6232
|
"""
|
6489
|
-
|
6233
|
+
Username generation template.
|
6490
6234
|
"""
|
6491
6235
|
return pulumi.get(self, "username_template")
|
6492
6236
|
|
@@ -6553,21 +6297,18 @@ class SecretsMountSnowflake(dict):
|
|
6553
6297
|
:param str name: Name of the database connection.
|
6554
6298
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
6555
6299
|
connection.
|
6556
|
-
:param str connection_url:
|
6557
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
6300
|
+
:param str connection_url: Connection string to use to connect to the database.
|
6558
6301
|
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6559
6302
|
|
6560
6303
|
Supported list of database secrets engines that can be configured:
|
6561
|
-
:param int max_connection_lifetime:
|
6562
|
-
:param int max_idle_connections:
|
6563
|
-
|
6564
|
-
:param
|
6565
|
-
the database.
|
6566
|
-
:param str password: The root credential password used in the connection URL.
|
6304
|
+
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
6305
|
+
:param int max_idle_connections: Maximum number of idle connections to the database.
|
6306
|
+
:param int max_open_connections: Maximum number of open connections to the database.
|
6307
|
+
:param str password: The root credential password used in the connection URL
|
6567
6308
|
:param str plugin_name: Specifies the name of the plugin to use.
|
6568
6309
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
6569
|
-
:param str username: The root credential username used in the connection URL
|
6570
|
-
:param str username_template:
|
6310
|
+
:param str username: The root credential username used in the connection URL
|
6311
|
+
:param str username_template: Username generation template.
|
6571
6312
|
:param bool verify_connection: Whether the connection should be verified on
|
6572
6313
|
initial configuration or not.
|
6573
6314
|
"""
|
@@ -6618,8 +6359,7 @@ class SecretsMountSnowflake(dict):
|
|
6618
6359
|
@pulumi.getter(name="connectionUrl")
|
6619
6360
|
def connection_url(self) -> Optional[str]:
|
6620
6361
|
"""
|
6621
|
-
|
6622
|
-
See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
6362
|
+
Connection string to use to connect to the database.
|
6623
6363
|
"""
|
6624
6364
|
return pulumi.get(self, "connection_url")
|
6625
6365
|
|
@@ -6637,7 +6377,7 @@ class SecretsMountSnowflake(dict):
|
|
6637
6377
|
@pulumi.getter(name="maxConnectionLifetime")
|
6638
6378
|
def max_connection_lifetime(self) -> Optional[int]:
|
6639
6379
|
"""
|
6640
|
-
|
6380
|
+
Maximum number of seconds a connection may be reused.
|
6641
6381
|
"""
|
6642
6382
|
return pulumi.get(self, "max_connection_lifetime")
|
6643
6383
|
|
@@ -6645,8 +6385,7 @@ class SecretsMountSnowflake(dict):
|
|
6645
6385
|
@pulumi.getter(name="maxIdleConnections")
|
6646
6386
|
def max_idle_connections(self) -> Optional[int]:
|
6647
6387
|
"""
|
6648
|
-
|
6649
|
-
the database.
|
6388
|
+
Maximum number of idle connections to the database.
|
6650
6389
|
"""
|
6651
6390
|
return pulumi.get(self, "max_idle_connections")
|
6652
6391
|
|
@@ -6654,8 +6393,7 @@ class SecretsMountSnowflake(dict):
|
|
6654
6393
|
@pulumi.getter(name="maxOpenConnections")
|
6655
6394
|
def max_open_connections(self) -> Optional[int]:
|
6656
6395
|
"""
|
6657
|
-
|
6658
|
-
the database.
|
6396
|
+
Maximum number of open connections to the database.
|
6659
6397
|
"""
|
6660
6398
|
return pulumi.get(self, "max_open_connections")
|
6661
6399
|
|
@@ -6663,7 +6401,7 @@ class SecretsMountSnowflake(dict):
|
|
6663
6401
|
@pulumi.getter
|
6664
6402
|
def password(self) -> Optional[str]:
|
6665
6403
|
"""
|
6666
|
-
The root credential password used in the connection URL
|
6404
|
+
The root credential password used in the connection URL
|
6667
6405
|
"""
|
6668
6406
|
return pulumi.get(self, "password")
|
6669
6407
|
|
@@ -6687,7 +6425,7 @@ class SecretsMountSnowflake(dict):
|
|
6687
6425
|
@pulumi.getter
|
6688
6426
|
def username(self) -> Optional[str]:
|
6689
6427
|
"""
|
6690
|
-
The root credential username used in the connection URL
|
6428
|
+
The root credential username used in the connection URL
|
6691
6429
|
"""
|
6692
6430
|
return pulumi.get(self, "username")
|
6693
6431
|
|
@@ -6695,7 +6433,7 @@ class SecretsMountSnowflake(dict):
|
|
6695
6433
|
@pulumi.getter(name="usernameTemplate")
|
6696
6434
|
def username_template(self) -> Optional[str]:
|
6697
6435
|
"""
|
6698
|
-
|
6436
|
+
Username generation template.
|
6699
6437
|
"""
|
6700
6438
|
return pulumi.get(self, "username_template")
|
6701
6439
|
|