pulumi-vault 6.3.0a1723010642__py3-none-any.whl → 6.3.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +19 -4
- pulumi_vault/ad/secret_backend.py +5 -0
- pulumi_vault/ad/secret_library.py +5 -0
- pulumi_vault/ad/secret_role.py +5 -0
- pulumi_vault/alicloud/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_login.py +5 -0
- pulumi_vault/approle/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
- pulumi_vault/audit.py +5 -0
- pulumi_vault/audit_request_header.py +5 -0
- pulumi_vault/auth_backend.py +10 -5
- pulumi_vault/aws/auth_backend_cert.py +5 -0
- pulumi_vault/aws/auth_backend_client.py +5 -0
- pulumi_vault/aws/auth_backend_config_identity.py +5 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
- pulumi_vault/aws/auth_backend_login.py +12 -7
- pulumi_vault/aws/auth_backend_role.py +5 -0
- pulumi_vault/aws/auth_backend_role_tag.py +5 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
- pulumi_vault/aws/auth_backend_sts_role.py +5 -0
- pulumi_vault/aws/get_access_credentials.py +31 -4
- pulumi_vault/aws/get_static_access_credentials.py +18 -4
- pulumi_vault/aws/secret_backend.py +5 -0
- pulumi_vault/aws/secret_backend_role.py +120 -0
- pulumi_vault/aws/secret_backend_static_role.py +5 -0
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +5 -0
- pulumi_vault/azure/auth_backend_role.py +5 -0
- pulumi_vault/azure/backend.py +5 -0
- pulumi_vault/azure/backend_role.py +23 -18
- pulumi_vault/azure/get_access_credentials.py +36 -4
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +5 -0
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +21 -0
- pulumi_vault/config/outputs.py +5 -0
- pulumi_vault/config/ui_custom_message.py +24 -19
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +5 -0
- pulumi_vault/consul/secret_backend_role.py +5 -0
- pulumi_vault/database/_inputs.py +2091 -140
- pulumi_vault/database/outputs.py +59 -54
- pulumi_vault/database/secret_backend_connection.py +115 -110
- pulumi_vault/database/secret_backend_role.py +25 -20
- pulumi_vault/database/secret_backend_static_role.py +11 -6
- pulumi_vault/database/secrets_mount.py +139 -134
- pulumi_vault/egp_policy.py +5 -0
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +15 -10
- pulumi_vault/gcp/auth_backend_role.py +5 -0
- pulumi_vault/gcp/get_auth_backend_role.py +42 -4
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +5 -0
- pulumi_vault/gcp/secret_impersonated_account.py +5 -0
- pulumi_vault/gcp/secret_roleset.py +18 -13
- pulumi_vault/gcp/secret_static_account.py +18 -13
- pulumi_vault/generic/endpoint.py +5 -0
- pulumi_vault/generic/get_secret.py +25 -5
- pulumi_vault/generic/secret.py +12 -7
- pulumi_vault/get_auth_backend.py +21 -4
- pulumi_vault/get_auth_backends.py +16 -4
- pulumi_vault/get_namespace.py +18 -5
- pulumi_vault/get_namespaces.py +13 -4
- pulumi_vault/get_nomad_access_token.py +28 -8
- pulumi_vault/get_policy_document.py +27 -16
- pulumi_vault/get_raft_autopilot_state.py +26 -7
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +10 -5
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +5 -0
- pulumi_vault/github/user.py +5 -0
- pulumi_vault/identity/entity.py +5 -0
- pulumi_vault/identity/entity_alias.py +5 -0
- pulumi_vault/identity/entity_policies.py +5 -0
- pulumi_vault/identity/get_entity.py +37 -7
- pulumi_vault/identity/get_group.py +42 -6
- pulumi_vault/identity/get_oidc_client_creds.py +16 -4
- pulumi_vault/identity/get_oidc_openid_config.py +26 -4
- pulumi_vault/identity/get_oidc_public_keys.py +16 -5
- pulumi_vault/identity/group.py +5 -0
- pulumi_vault/identity/group_alias.py +5 -0
- pulumi_vault/identity/group_member_entity_ids.py +5 -0
- pulumi_vault/identity/group_member_group_ids.py +5 -0
- pulumi_vault/identity/group_policies.py +5 -0
- pulumi_vault/identity/mfa_duo.py +5 -0
- pulumi_vault/identity/mfa_login_enforcement.py +5 -0
- pulumi_vault/identity/mfa_okta.py +5 -0
- pulumi_vault/identity/mfa_pingid.py +5 -0
- pulumi_vault/identity/mfa_totp.py +5 -0
- pulumi_vault/identity/oidc.py +5 -0
- pulumi_vault/identity/oidc_assignment.py +5 -0
- pulumi_vault/identity/oidc_client.py +5 -0
- pulumi_vault/identity/oidc_key.py +5 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
- pulumi_vault/identity/oidc_provider.py +5 -0
- pulumi_vault/identity/oidc_role.py +5 -0
- pulumi_vault/identity/oidc_scope.py +5 -0
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +14 -9
- pulumi_vault/jwt/auth_backend_role.py +33 -28
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +5 -0
- pulumi_vault/kmip/secret_role.py +5 -0
- pulumi_vault/kmip/secret_scope.py +5 -0
- pulumi_vault/kubernetes/auth_backend_config.py +5 -0
- pulumi_vault/kubernetes/auth_backend_role.py +5 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
- pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
- pulumi_vault/kubernetes/get_service_account_token.py +28 -4
- pulumi_vault/kubernetes/secret_backend.py +19 -14
- pulumi_vault/kubernetes/secret_backend_role.py +5 -0
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +20 -5
- pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
- pulumi_vault/kv/get_secret_v2.py +27 -6
- pulumi_vault/kv/get_secrets_list.py +15 -4
- pulumi_vault/kv/get_secrets_list_v2.py +18 -4
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +12 -7
- pulumi_vault/kv/secret_backend_v2.py +5 -0
- pulumi_vault/kv/secret_v2.py +46 -41
- pulumi_vault/ldap/auth_backend.py +5 -0
- pulumi_vault/ldap/auth_backend_group.py +5 -0
- pulumi_vault/ldap/auth_backend_user.py +5 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
- pulumi_vault/ldap/get_static_credentials.py +23 -4
- pulumi_vault/ldap/secret_backend.py +19 -14
- pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
- pulumi_vault/ldap/secret_backend_library_set.py +5 -0
- pulumi_vault/ldap/secret_backend_static_role.py +5 -0
- pulumi_vault/managed/_inputs.py +205 -0
- pulumi_vault/managed/keys.py +20 -15
- pulumi_vault/managed/outputs.py +5 -0
- pulumi_vault/mfa_duo.py +5 -0
- pulumi_vault/mfa_okta.py +5 -0
- pulumi_vault/mfa_pingid.py +5 -0
- pulumi_vault/mfa_totp.py +5 -0
- pulumi_vault/mongodbatlas/secret_backend.py +5 -0
- pulumi_vault/mongodbatlas/secret_role.py +5 -0
- pulumi_vault/mount.py +35 -23
- pulumi_vault/namespace.py +19 -14
- pulumi_vault/nomad_secret_backend.py +5 -0
- pulumi_vault/nomad_secret_role.py +5 -0
- pulumi_vault/okta/_inputs.py +39 -0
- pulumi_vault/okta/auth_backend.py +31 -26
- pulumi_vault/okta/auth_backend_group.py +5 -0
- pulumi_vault/okta/auth_backend_user.py +5 -0
- pulumi_vault/okta/outputs.py +5 -0
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +5 -0
- pulumi_vault/pkisecret/_inputs.py +49 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
- pulumi_vault/pkisecret/backend_config_est.py +24 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
- pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
- pulumi_vault/pkisecret/get_backend_key.py +19 -4
- pulumi_vault/pkisecret/get_backend_keys.py +18 -5
- pulumi_vault/pkisecret/outputs.py +17 -12
- pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
- pulumi_vault/pkisecret/secret_backend_key.py +5 -0
- pulumi_vault/pkisecret/secret_backend_role.py +10 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
- pulumi_vault/plugin.py +5 -0
- pulumi_vault/plugin_pinned_version.py +5 -0
- pulumi_vault/policy.py +5 -0
- pulumi_vault/provider.py +47 -42
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +5 -0
- pulumi_vault/quota_rate_limit.py +5 -0
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +5 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
- pulumi_vault/raft_autopilot.py +5 -0
- pulumi_vault/raft_snapshot_agent_config.py +5 -0
- pulumi_vault/rgp_policy.py +5 -0
- pulumi_vault/saml/auth_backend.py +5 -0
- pulumi_vault/saml/auth_backend_role.py +19 -14
- pulumi_vault/secrets/_inputs.py +30 -0
- pulumi_vault/secrets/outputs.py +5 -0
- pulumi_vault/secrets/sync_association.py +7 -2
- pulumi_vault/secrets/sync_aws_destination.py +19 -14
- pulumi_vault/secrets/sync_azure_destination.py +19 -14
- pulumi_vault/secrets/sync_config.py +5 -0
- pulumi_vault/secrets/sync_gcp_destination.py +19 -14
- pulumi_vault/secrets/sync_gh_destination.py +5 -0
- pulumi_vault/secrets/sync_github_apps.py +5 -0
- pulumi_vault/secrets/sync_vercel_destination.py +5 -0
- pulumi_vault/ssh/_inputs.py +22 -0
- pulumi_vault/ssh/outputs.py +5 -0
- pulumi_vault/ssh/secret_backend_ca.py +5 -0
- pulumi_vault/ssh/secret_backend_role.py +38 -33
- pulumi_vault/terraformcloud/secret_backend.py +5 -0
- pulumi_vault/terraformcloud/secret_creds.py +5 -0
- pulumi_vault/terraformcloud/secret_role.py +5 -0
- pulumi_vault/token.py +5 -0
- pulumi_vault/tokenauth/auth_backend_role.py +5 -14
- pulumi_vault/transform/alphabet.py +5 -0
- pulumi_vault/transform/get_decode.py +38 -14
- pulumi_vault/transform/get_encode.py +38 -14
- pulumi_vault/transform/role.py +5 -0
- pulumi_vault/transform/template.py +19 -14
- pulumi_vault/transform/transformation.py +5 -0
- pulumi_vault/transit/get_decrypt.py +21 -4
- pulumi_vault/transit/get_encrypt.py +23 -4
- pulumi_vault/transit/secret_backend_key.py +12 -7
- pulumi_vault/transit/secret_cache_config.py +5 -0
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/METADATA +3 -2
- pulumi_vault-6.3.1.dist-info/RECORD +256 -0
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/WHEEL +1 -1
- pulumi_vault-6.3.0a1723010642.dist-info/RECORD +0 -256
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/top_level.txt +0 -0
pulumi_vault/database/_inputs.py
CHANGED
@@ -4,50 +4,138 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
13
18
|
'SecretBackendConnectionCassandraArgs',
|
19
|
+
'SecretBackendConnectionCassandraArgsDict',
|
14
20
|
'SecretBackendConnectionCouchbaseArgs',
|
21
|
+
'SecretBackendConnectionCouchbaseArgsDict',
|
15
22
|
'SecretBackendConnectionElasticsearchArgs',
|
23
|
+
'SecretBackendConnectionElasticsearchArgsDict',
|
16
24
|
'SecretBackendConnectionHanaArgs',
|
25
|
+
'SecretBackendConnectionHanaArgsDict',
|
17
26
|
'SecretBackendConnectionInfluxdbArgs',
|
27
|
+
'SecretBackendConnectionInfluxdbArgsDict',
|
18
28
|
'SecretBackendConnectionMongodbArgs',
|
29
|
+
'SecretBackendConnectionMongodbArgsDict',
|
19
30
|
'SecretBackendConnectionMongodbatlasArgs',
|
31
|
+
'SecretBackendConnectionMongodbatlasArgsDict',
|
20
32
|
'SecretBackendConnectionMssqlArgs',
|
33
|
+
'SecretBackendConnectionMssqlArgsDict',
|
21
34
|
'SecretBackendConnectionMysqlArgs',
|
35
|
+
'SecretBackendConnectionMysqlArgsDict',
|
22
36
|
'SecretBackendConnectionMysqlAuroraArgs',
|
37
|
+
'SecretBackendConnectionMysqlAuroraArgsDict',
|
23
38
|
'SecretBackendConnectionMysqlLegacyArgs',
|
39
|
+
'SecretBackendConnectionMysqlLegacyArgsDict',
|
24
40
|
'SecretBackendConnectionMysqlRdsArgs',
|
41
|
+
'SecretBackendConnectionMysqlRdsArgsDict',
|
25
42
|
'SecretBackendConnectionOracleArgs',
|
43
|
+
'SecretBackendConnectionOracleArgsDict',
|
26
44
|
'SecretBackendConnectionPostgresqlArgs',
|
45
|
+
'SecretBackendConnectionPostgresqlArgsDict',
|
27
46
|
'SecretBackendConnectionRedisArgs',
|
47
|
+
'SecretBackendConnectionRedisArgsDict',
|
28
48
|
'SecretBackendConnectionRedisElasticacheArgs',
|
49
|
+
'SecretBackendConnectionRedisElasticacheArgsDict',
|
29
50
|
'SecretBackendConnectionRedshiftArgs',
|
51
|
+
'SecretBackendConnectionRedshiftArgsDict',
|
30
52
|
'SecretBackendConnectionSnowflakeArgs',
|
53
|
+
'SecretBackendConnectionSnowflakeArgsDict',
|
31
54
|
'SecretsMountCassandraArgs',
|
55
|
+
'SecretsMountCassandraArgsDict',
|
32
56
|
'SecretsMountCouchbaseArgs',
|
57
|
+
'SecretsMountCouchbaseArgsDict',
|
33
58
|
'SecretsMountElasticsearchArgs',
|
59
|
+
'SecretsMountElasticsearchArgsDict',
|
34
60
|
'SecretsMountHanaArgs',
|
61
|
+
'SecretsMountHanaArgsDict',
|
35
62
|
'SecretsMountInfluxdbArgs',
|
63
|
+
'SecretsMountInfluxdbArgsDict',
|
36
64
|
'SecretsMountMongodbArgs',
|
65
|
+
'SecretsMountMongodbArgsDict',
|
37
66
|
'SecretsMountMongodbatlaArgs',
|
67
|
+
'SecretsMountMongodbatlaArgsDict',
|
38
68
|
'SecretsMountMssqlArgs',
|
69
|
+
'SecretsMountMssqlArgsDict',
|
39
70
|
'SecretsMountMysqlArgs',
|
71
|
+
'SecretsMountMysqlArgsDict',
|
40
72
|
'SecretsMountMysqlAuroraArgs',
|
73
|
+
'SecretsMountMysqlAuroraArgsDict',
|
41
74
|
'SecretsMountMysqlLegacyArgs',
|
75
|
+
'SecretsMountMysqlLegacyArgsDict',
|
42
76
|
'SecretsMountMysqlRdArgs',
|
77
|
+
'SecretsMountMysqlRdArgsDict',
|
43
78
|
'SecretsMountOracleArgs',
|
79
|
+
'SecretsMountOracleArgsDict',
|
44
80
|
'SecretsMountPostgresqlArgs',
|
81
|
+
'SecretsMountPostgresqlArgsDict',
|
45
82
|
'SecretsMountRediArgs',
|
83
|
+
'SecretsMountRediArgsDict',
|
46
84
|
'SecretsMountRedisElasticachArgs',
|
85
|
+
'SecretsMountRedisElasticachArgsDict',
|
47
86
|
'SecretsMountRedshiftArgs',
|
87
|
+
'SecretsMountRedshiftArgsDict',
|
48
88
|
'SecretsMountSnowflakeArgs',
|
89
|
+
'SecretsMountSnowflakeArgsDict',
|
49
90
|
]
|
50
91
|
|
92
|
+
MYPY = False
|
93
|
+
|
94
|
+
if not MYPY:
|
95
|
+
class SecretBackendConnectionCassandraArgsDict(TypedDict):
|
96
|
+
connect_timeout: NotRequired[pulumi.Input[int]]
|
97
|
+
"""
|
98
|
+
The number of seconds to use as a connection timeout.
|
99
|
+
"""
|
100
|
+
hosts: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
101
|
+
"""
|
102
|
+
Cassandra hosts to connect to.
|
103
|
+
"""
|
104
|
+
insecure_tls: NotRequired[pulumi.Input[bool]]
|
105
|
+
"""
|
106
|
+
Whether to skip verification of the server certificate when using TLS.
|
107
|
+
"""
|
108
|
+
password: NotRequired[pulumi.Input[str]]
|
109
|
+
"""
|
110
|
+
The password to use when authenticating with Cassandra.
|
111
|
+
"""
|
112
|
+
pem_bundle: NotRequired[pulumi.Input[str]]
|
113
|
+
"""
|
114
|
+
Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
115
|
+
"""
|
116
|
+
pem_json: NotRequired[pulumi.Input[str]]
|
117
|
+
"""
|
118
|
+
Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
119
|
+
"""
|
120
|
+
port: NotRequired[pulumi.Input[int]]
|
121
|
+
"""
|
122
|
+
The transport port to use to connect to Cassandra.
|
123
|
+
"""
|
124
|
+
protocol_version: NotRequired[pulumi.Input[int]]
|
125
|
+
"""
|
126
|
+
The CQL protocol version to use.
|
127
|
+
"""
|
128
|
+
tls: NotRequired[pulumi.Input[bool]]
|
129
|
+
"""
|
130
|
+
Whether to use TLS when connecting to Cassandra.
|
131
|
+
"""
|
132
|
+
username: NotRequired[pulumi.Input[str]]
|
133
|
+
"""
|
134
|
+
The username to use when authenticating with Cassandra.
|
135
|
+
"""
|
136
|
+
elif False:
|
137
|
+
SecretBackendConnectionCassandraArgsDict: TypeAlias = Mapping[str, Any]
|
138
|
+
|
51
139
|
@pulumi.input_type
|
52
140
|
class SecretBackendConnectionCassandraArgs:
|
53
141
|
def __init__(__self__, *,
|
@@ -215,6 +303,43 @@ class SecretBackendConnectionCassandraArgs:
|
|
215
303
|
pulumi.set(self, "username", value)
|
216
304
|
|
217
305
|
|
306
|
+
if not MYPY:
|
307
|
+
class SecretBackendConnectionCouchbaseArgsDict(TypedDict):
|
308
|
+
hosts: pulumi.Input[Sequence[pulumi.Input[str]]]
|
309
|
+
"""
|
310
|
+
A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
|
311
|
+
"""
|
312
|
+
password: pulumi.Input[str]
|
313
|
+
"""
|
314
|
+
Specifies the password corresponding to the given username.
|
315
|
+
"""
|
316
|
+
username: pulumi.Input[str]
|
317
|
+
"""
|
318
|
+
Specifies the username for Vault to use.
|
319
|
+
"""
|
320
|
+
base64_pem: NotRequired[pulumi.Input[str]]
|
321
|
+
"""
|
322
|
+
Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
|
323
|
+
"""
|
324
|
+
bucket_name: NotRequired[pulumi.Input[str]]
|
325
|
+
"""
|
326
|
+
Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
|
327
|
+
"""
|
328
|
+
insecure_tls: NotRequired[pulumi.Input[bool]]
|
329
|
+
"""
|
330
|
+
Specifies whether to skip verification of the server certificate when using TLS.
|
331
|
+
"""
|
332
|
+
tls: NotRequired[pulumi.Input[bool]]
|
333
|
+
"""
|
334
|
+
Specifies whether to use TLS when connecting to Couchbase.
|
335
|
+
"""
|
336
|
+
username_template: NotRequired[pulumi.Input[str]]
|
337
|
+
"""
|
338
|
+
Template describing how dynamic usernames are generated.
|
339
|
+
"""
|
340
|
+
elif False:
|
341
|
+
SecretBackendConnectionCouchbaseArgsDict: TypeAlias = Mapping[str, Any]
|
342
|
+
|
218
343
|
@pulumi.input_type
|
219
344
|
class SecretBackendConnectionCouchbaseArgs:
|
220
345
|
def __init__(__self__, *,
|
@@ -347,6 +472,51 @@ class SecretBackendConnectionCouchbaseArgs:
|
|
347
472
|
pulumi.set(self, "username_template", value)
|
348
473
|
|
349
474
|
|
475
|
+
if not MYPY:
|
476
|
+
class SecretBackendConnectionElasticsearchArgsDict(TypedDict):
|
477
|
+
password: pulumi.Input[str]
|
478
|
+
"""
|
479
|
+
The password to be used in the connection URL
|
480
|
+
"""
|
481
|
+
url: pulumi.Input[str]
|
482
|
+
"""
|
483
|
+
The URL for Elasticsearch's API
|
484
|
+
"""
|
485
|
+
username: pulumi.Input[str]
|
486
|
+
"""
|
487
|
+
The username to be used in the connection URL
|
488
|
+
"""
|
489
|
+
ca_cert: NotRequired[pulumi.Input[str]]
|
490
|
+
"""
|
491
|
+
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
492
|
+
"""
|
493
|
+
ca_path: NotRequired[pulumi.Input[str]]
|
494
|
+
"""
|
495
|
+
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
496
|
+
"""
|
497
|
+
client_cert: NotRequired[pulumi.Input[str]]
|
498
|
+
"""
|
499
|
+
The path to the certificate for the Elasticsearch client to present for communication
|
500
|
+
"""
|
501
|
+
client_key: NotRequired[pulumi.Input[str]]
|
502
|
+
"""
|
503
|
+
The path to the key for the Elasticsearch client to use for communication
|
504
|
+
"""
|
505
|
+
insecure: NotRequired[pulumi.Input[bool]]
|
506
|
+
"""
|
507
|
+
Whether to disable certificate verification
|
508
|
+
"""
|
509
|
+
tls_server_name: NotRequired[pulumi.Input[str]]
|
510
|
+
"""
|
511
|
+
This, if set, is used to set the SNI host when connecting via TLS
|
512
|
+
"""
|
513
|
+
username_template: NotRequired[pulumi.Input[str]]
|
514
|
+
"""
|
515
|
+
Template describing how dynamic usernames are generated.
|
516
|
+
"""
|
517
|
+
elif False:
|
518
|
+
SecretBackendConnectionElasticsearchArgsDict: TypeAlias = Mapping[str, Any]
|
519
|
+
|
350
520
|
@pulumi.input_type
|
351
521
|
class SecretBackendConnectionElasticsearchArgs:
|
352
522
|
def __init__(__self__, *,
|
@@ -511,6 +681,39 @@ class SecretBackendConnectionElasticsearchArgs:
|
|
511
681
|
pulumi.set(self, "username_template", value)
|
512
682
|
|
513
683
|
|
684
|
+
if not MYPY:
|
685
|
+
class SecretBackendConnectionHanaArgsDict(TypedDict):
|
686
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
687
|
+
"""
|
688
|
+
Connection string to use to connect to the database.
|
689
|
+
"""
|
690
|
+
disable_escaping: NotRequired[pulumi.Input[bool]]
|
691
|
+
"""
|
692
|
+
Disable special character escaping in username and password
|
693
|
+
"""
|
694
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
695
|
+
"""
|
696
|
+
Maximum number of seconds a connection may be reused.
|
697
|
+
"""
|
698
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
699
|
+
"""
|
700
|
+
Maximum number of idle connections to the database.
|
701
|
+
"""
|
702
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
703
|
+
"""
|
704
|
+
Maximum number of open connections to the database.
|
705
|
+
"""
|
706
|
+
password: NotRequired[pulumi.Input[str]]
|
707
|
+
"""
|
708
|
+
The root credential password used in the connection URL
|
709
|
+
"""
|
710
|
+
username: NotRequired[pulumi.Input[str]]
|
711
|
+
"""
|
712
|
+
The root credential username used in the connection URL
|
713
|
+
"""
|
714
|
+
elif False:
|
715
|
+
SecretBackendConnectionHanaArgsDict: TypeAlias = Mapping[str, Any]
|
716
|
+
|
514
717
|
@pulumi.input_type
|
515
718
|
class SecretBackendConnectionHanaArgs:
|
516
719
|
def __init__(__self__, *,
|
@@ -630,6 +833,51 @@ class SecretBackendConnectionHanaArgs:
|
|
630
833
|
pulumi.set(self, "username", value)
|
631
834
|
|
632
835
|
|
836
|
+
if not MYPY:
|
837
|
+
class SecretBackendConnectionInfluxdbArgsDict(TypedDict):
|
838
|
+
host: pulumi.Input[str]
|
839
|
+
"""
|
840
|
+
Influxdb host to connect to.
|
841
|
+
"""
|
842
|
+
password: pulumi.Input[str]
|
843
|
+
"""
|
844
|
+
Specifies the password corresponding to the given username.
|
845
|
+
"""
|
846
|
+
username: pulumi.Input[str]
|
847
|
+
"""
|
848
|
+
Specifies the username to use for superuser access.
|
849
|
+
"""
|
850
|
+
connect_timeout: NotRequired[pulumi.Input[int]]
|
851
|
+
"""
|
852
|
+
The number of seconds to use as a connection timeout.
|
853
|
+
"""
|
854
|
+
insecure_tls: NotRequired[pulumi.Input[bool]]
|
855
|
+
"""
|
856
|
+
Whether to skip verification of the server certificate when using TLS.
|
857
|
+
"""
|
858
|
+
pem_bundle: NotRequired[pulumi.Input[str]]
|
859
|
+
"""
|
860
|
+
Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
861
|
+
"""
|
862
|
+
pem_json: NotRequired[pulumi.Input[str]]
|
863
|
+
"""
|
864
|
+
Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
865
|
+
"""
|
866
|
+
port: NotRequired[pulumi.Input[int]]
|
867
|
+
"""
|
868
|
+
The transport port to use to connect to Influxdb.
|
869
|
+
"""
|
870
|
+
tls: NotRequired[pulumi.Input[bool]]
|
871
|
+
"""
|
872
|
+
Whether to use TLS when connecting to Influxdb.
|
873
|
+
"""
|
874
|
+
username_template: NotRequired[pulumi.Input[str]]
|
875
|
+
"""
|
876
|
+
Template describing how dynamic usernames are generated.
|
877
|
+
"""
|
878
|
+
elif False:
|
879
|
+
SecretBackendConnectionInfluxdbArgsDict: TypeAlias = Mapping[str, Any]
|
880
|
+
|
633
881
|
@pulumi.input_type
|
634
882
|
class SecretBackendConnectionInfluxdbArgs:
|
635
883
|
def __init__(__self__, *,
|
@@ -794,6 +1042,39 @@ class SecretBackendConnectionInfluxdbArgs:
|
|
794
1042
|
pulumi.set(self, "username_template", value)
|
795
1043
|
|
796
1044
|
|
1045
|
+
if not MYPY:
|
1046
|
+
class SecretBackendConnectionMongodbArgsDict(TypedDict):
|
1047
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
1048
|
+
"""
|
1049
|
+
Connection string to use to connect to the database.
|
1050
|
+
"""
|
1051
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
1052
|
+
"""
|
1053
|
+
Maximum number of seconds a connection may be reused.
|
1054
|
+
"""
|
1055
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
1056
|
+
"""
|
1057
|
+
Maximum number of idle connections to the database.
|
1058
|
+
"""
|
1059
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
1060
|
+
"""
|
1061
|
+
Maximum number of open connections to the database.
|
1062
|
+
"""
|
1063
|
+
password: NotRequired[pulumi.Input[str]]
|
1064
|
+
"""
|
1065
|
+
The root credential password used in the connection URL
|
1066
|
+
"""
|
1067
|
+
username: NotRequired[pulumi.Input[str]]
|
1068
|
+
"""
|
1069
|
+
The root credential username used in the connection URL
|
1070
|
+
"""
|
1071
|
+
username_template: NotRequired[pulumi.Input[str]]
|
1072
|
+
"""
|
1073
|
+
Username generation template.
|
1074
|
+
"""
|
1075
|
+
elif False:
|
1076
|
+
SecretBackendConnectionMongodbArgsDict: TypeAlias = Mapping[str, Any]
|
1077
|
+
|
797
1078
|
@pulumi.input_type
|
798
1079
|
class SecretBackendConnectionMongodbArgs:
|
799
1080
|
def __init__(__self__, *,
|
@@ -913,6 +1194,23 @@ class SecretBackendConnectionMongodbArgs:
|
|
913
1194
|
pulumi.set(self, "username_template", value)
|
914
1195
|
|
915
1196
|
|
1197
|
+
if not MYPY:
|
1198
|
+
class SecretBackendConnectionMongodbatlasArgsDict(TypedDict):
|
1199
|
+
private_key: pulumi.Input[str]
|
1200
|
+
"""
|
1201
|
+
The Private Programmatic API Key used to connect with MongoDB Atlas API.
|
1202
|
+
"""
|
1203
|
+
project_id: pulumi.Input[str]
|
1204
|
+
"""
|
1205
|
+
The Project ID the Database User should be created within.
|
1206
|
+
"""
|
1207
|
+
public_key: pulumi.Input[str]
|
1208
|
+
"""
|
1209
|
+
The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
|
1210
|
+
"""
|
1211
|
+
elif False:
|
1212
|
+
SecretBackendConnectionMongodbatlasArgsDict: TypeAlias = Mapping[str, Any]
|
1213
|
+
|
916
1214
|
@pulumi.input_type
|
917
1215
|
class SecretBackendConnectionMongodbatlasArgs:
|
918
1216
|
def __init__(__self__, *,
|
@@ -965,6 +1263,47 @@ class SecretBackendConnectionMongodbatlasArgs:
|
|
965
1263
|
pulumi.set(self, "public_key", value)
|
966
1264
|
|
967
1265
|
|
1266
|
+
if not MYPY:
|
1267
|
+
class SecretBackendConnectionMssqlArgsDict(TypedDict):
|
1268
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
1269
|
+
"""
|
1270
|
+
Connection string to use to connect to the database.
|
1271
|
+
"""
|
1272
|
+
contained_db: NotRequired[pulumi.Input[bool]]
|
1273
|
+
"""
|
1274
|
+
Set to true when the target is a Contained Database, e.g. AzureSQL.
|
1275
|
+
"""
|
1276
|
+
disable_escaping: NotRequired[pulumi.Input[bool]]
|
1277
|
+
"""
|
1278
|
+
Disable special character escaping in username and password
|
1279
|
+
"""
|
1280
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
1281
|
+
"""
|
1282
|
+
Maximum number of seconds a connection may be reused.
|
1283
|
+
"""
|
1284
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
1285
|
+
"""
|
1286
|
+
Maximum number of idle connections to the database.
|
1287
|
+
"""
|
1288
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
1289
|
+
"""
|
1290
|
+
Maximum number of open connections to the database.
|
1291
|
+
"""
|
1292
|
+
password: NotRequired[pulumi.Input[str]]
|
1293
|
+
"""
|
1294
|
+
The root credential password used in the connection URL
|
1295
|
+
"""
|
1296
|
+
username: NotRequired[pulumi.Input[str]]
|
1297
|
+
"""
|
1298
|
+
The root credential username used in the connection URL
|
1299
|
+
"""
|
1300
|
+
username_template: NotRequired[pulumi.Input[str]]
|
1301
|
+
"""
|
1302
|
+
Username generation template.
|
1303
|
+
"""
|
1304
|
+
elif False:
|
1305
|
+
SecretBackendConnectionMssqlArgsDict: TypeAlias = Mapping[str, Any]
|
1306
|
+
|
968
1307
|
@pulumi.input_type
|
969
1308
|
class SecretBackendConnectionMssqlArgs:
|
970
1309
|
def __init__(__self__, *,
|
@@ -1116,6 +1455,55 @@ class SecretBackendConnectionMssqlArgs:
|
|
1116
1455
|
pulumi.set(self, "username_template", value)
|
1117
1456
|
|
1118
1457
|
|
1458
|
+
if not MYPY:
|
1459
|
+
class SecretBackendConnectionMysqlArgsDict(TypedDict):
|
1460
|
+
auth_type: NotRequired[pulumi.Input[str]]
|
1461
|
+
"""
|
1462
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1463
|
+
"""
|
1464
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
1465
|
+
"""
|
1466
|
+
Connection string to use to connect to the database.
|
1467
|
+
"""
|
1468
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
1469
|
+
"""
|
1470
|
+
Maximum number of seconds a connection may be reused.
|
1471
|
+
"""
|
1472
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
1473
|
+
"""
|
1474
|
+
Maximum number of idle connections to the database.
|
1475
|
+
"""
|
1476
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
1477
|
+
"""
|
1478
|
+
Maximum number of open connections to the database.
|
1479
|
+
"""
|
1480
|
+
password: NotRequired[pulumi.Input[str]]
|
1481
|
+
"""
|
1482
|
+
The root credential password used in the connection URL
|
1483
|
+
"""
|
1484
|
+
service_account_json: NotRequired[pulumi.Input[str]]
|
1485
|
+
"""
|
1486
|
+
A JSON encoded credential for use with IAM authorization
|
1487
|
+
"""
|
1488
|
+
tls_ca: NotRequired[pulumi.Input[str]]
|
1489
|
+
"""
|
1490
|
+
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1491
|
+
"""
|
1492
|
+
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
1493
|
+
"""
|
1494
|
+
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1495
|
+
"""
|
1496
|
+
username: NotRequired[pulumi.Input[str]]
|
1497
|
+
"""
|
1498
|
+
The root credential username used in the connection URL
|
1499
|
+
"""
|
1500
|
+
username_template: NotRequired[pulumi.Input[str]]
|
1501
|
+
"""
|
1502
|
+
Username generation template.
|
1503
|
+
"""
|
1504
|
+
elif False:
|
1505
|
+
SecretBackendConnectionMysqlArgsDict: TypeAlias = Mapping[str, Any]
|
1506
|
+
|
1119
1507
|
@pulumi.input_type
|
1120
1508
|
class SecretBackendConnectionMysqlArgs:
|
1121
1509
|
def __init__(__self__, *,
|
@@ -1299,28 +1687,77 @@ class SecretBackendConnectionMysqlArgs:
|
|
1299
1687
|
pulumi.set(self, "username_template", value)
|
1300
1688
|
|
1301
1689
|
|
1302
|
-
|
1303
|
-
class
|
1304
|
-
|
1305
|
-
auth_type: Optional[pulumi.Input[str]] = None,
|
1306
|
-
connection_url: Optional[pulumi.Input[str]] = None,
|
1307
|
-
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
1308
|
-
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
1309
|
-
max_open_connections: Optional[pulumi.Input[int]] = None,
|
1310
|
-
password: Optional[pulumi.Input[str]] = None,
|
1311
|
-
service_account_json: Optional[pulumi.Input[str]] = None,
|
1312
|
-
tls_ca: Optional[pulumi.Input[str]] = None,
|
1313
|
-
tls_certificate_key: Optional[pulumi.Input[str]] = None,
|
1314
|
-
username: Optional[pulumi.Input[str]] = None,
|
1315
|
-
username_template: Optional[pulumi.Input[str]] = None):
|
1690
|
+
if not MYPY:
|
1691
|
+
class SecretBackendConnectionMysqlAuroraArgsDict(TypedDict):
|
1692
|
+
auth_type: NotRequired[pulumi.Input[str]]
|
1316
1693
|
"""
|
1317
|
-
|
1318
|
-
|
1319
|
-
:
|
1320
|
-
|
1321
|
-
|
1322
|
-
|
1323
|
-
:
|
1694
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1695
|
+
"""
|
1696
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
1697
|
+
"""
|
1698
|
+
Connection string to use to connect to the database.
|
1699
|
+
"""
|
1700
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
1701
|
+
"""
|
1702
|
+
Maximum number of seconds a connection may be reused.
|
1703
|
+
"""
|
1704
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
1705
|
+
"""
|
1706
|
+
Maximum number of idle connections to the database.
|
1707
|
+
"""
|
1708
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
1709
|
+
"""
|
1710
|
+
Maximum number of open connections to the database.
|
1711
|
+
"""
|
1712
|
+
password: NotRequired[pulumi.Input[str]]
|
1713
|
+
"""
|
1714
|
+
The root credential password used in the connection URL
|
1715
|
+
"""
|
1716
|
+
service_account_json: NotRequired[pulumi.Input[str]]
|
1717
|
+
"""
|
1718
|
+
A JSON encoded credential for use with IAM authorization
|
1719
|
+
"""
|
1720
|
+
tls_ca: NotRequired[pulumi.Input[str]]
|
1721
|
+
"""
|
1722
|
+
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1723
|
+
"""
|
1724
|
+
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
1725
|
+
"""
|
1726
|
+
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1727
|
+
"""
|
1728
|
+
username: NotRequired[pulumi.Input[str]]
|
1729
|
+
"""
|
1730
|
+
The root credential username used in the connection URL
|
1731
|
+
"""
|
1732
|
+
username_template: NotRequired[pulumi.Input[str]]
|
1733
|
+
"""
|
1734
|
+
Username generation template.
|
1735
|
+
"""
|
1736
|
+
elif False:
|
1737
|
+
SecretBackendConnectionMysqlAuroraArgsDict: TypeAlias = Mapping[str, Any]
|
1738
|
+
|
1739
|
+
@pulumi.input_type
|
1740
|
+
class SecretBackendConnectionMysqlAuroraArgs:
|
1741
|
+
def __init__(__self__, *,
|
1742
|
+
auth_type: Optional[pulumi.Input[str]] = None,
|
1743
|
+
connection_url: Optional[pulumi.Input[str]] = None,
|
1744
|
+
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
1745
|
+
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
1746
|
+
max_open_connections: Optional[pulumi.Input[int]] = None,
|
1747
|
+
password: Optional[pulumi.Input[str]] = None,
|
1748
|
+
service_account_json: Optional[pulumi.Input[str]] = None,
|
1749
|
+
tls_ca: Optional[pulumi.Input[str]] = None,
|
1750
|
+
tls_certificate_key: Optional[pulumi.Input[str]] = None,
|
1751
|
+
username: Optional[pulumi.Input[str]] = None,
|
1752
|
+
username_template: Optional[pulumi.Input[str]] = None):
|
1753
|
+
"""
|
1754
|
+
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1755
|
+
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
1756
|
+
:param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
1757
|
+
:param pulumi.Input[int] max_idle_connections: Maximum number of idle connections to the database.
|
1758
|
+
:param pulumi.Input[int] max_open_connections: Maximum number of open connections to the database.
|
1759
|
+
:param pulumi.Input[str] password: The root credential password used in the connection URL
|
1760
|
+
:param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
|
1324
1761
|
:param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1325
1762
|
:param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1326
1763
|
:param pulumi.Input[str] username: The root credential username used in the connection URL
|
@@ -1482,6 +1919,55 @@ class SecretBackendConnectionMysqlAuroraArgs:
|
|
1482
1919
|
pulumi.set(self, "username_template", value)
|
1483
1920
|
|
1484
1921
|
|
1922
|
+
if not MYPY:
|
1923
|
+
class SecretBackendConnectionMysqlLegacyArgsDict(TypedDict):
|
1924
|
+
auth_type: NotRequired[pulumi.Input[str]]
|
1925
|
+
"""
|
1926
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1927
|
+
"""
|
1928
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
1929
|
+
"""
|
1930
|
+
Connection string to use to connect to the database.
|
1931
|
+
"""
|
1932
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
1933
|
+
"""
|
1934
|
+
Maximum number of seconds a connection may be reused.
|
1935
|
+
"""
|
1936
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
1937
|
+
"""
|
1938
|
+
Maximum number of idle connections to the database.
|
1939
|
+
"""
|
1940
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
1941
|
+
"""
|
1942
|
+
Maximum number of open connections to the database.
|
1943
|
+
"""
|
1944
|
+
password: NotRequired[pulumi.Input[str]]
|
1945
|
+
"""
|
1946
|
+
The root credential password used in the connection URL
|
1947
|
+
"""
|
1948
|
+
service_account_json: NotRequired[pulumi.Input[str]]
|
1949
|
+
"""
|
1950
|
+
A JSON encoded credential for use with IAM authorization
|
1951
|
+
"""
|
1952
|
+
tls_ca: NotRequired[pulumi.Input[str]]
|
1953
|
+
"""
|
1954
|
+
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1955
|
+
"""
|
1956
|
+
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
1957
|
+
"""
|
1958
|
+
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1959
|
+
"""
|
1960
|
+
username: NotRequired[pulumi.Input[str]]
|
1961
|
+
"""
|
1962
|
+
The root credential username used in the connection URL
|
1963
|
+
"""
|
1964
|
+
username_template: NotRequired[pulumi.Input[str]]
|
1965
|
+
"""
|
1966
|
+
Username generation template.
|
1967
|
+
"""
|
1968
|
+
elif False:
|
1969
|
+
SecretBackendConnectionMysqlLegacyArgsDict: TypeAlias = Mapping[str, Any]
|
1970
|
+
|
1485
1971
|
@pulumi.input_type
|
1486
1972
|
class SecretBackendConnectionMysqlLegacyArgs:
|
1487
1973
|
def __init__(__self__, *,
|
@@ -1665,6 +2151,55 @@ class SecretBackendConnectionMysqlLegacyArgs:
|
|
1665
2151
|
pulumi.set(self, "username_template", value)
|
1666
2152
|
|
1667
2153
|
|
2154
|
+
if not MYPY:
|
2155
|
+
class SecretBackendConnectionMysqlRdsArgsDict(TypedDict):
|
2156
|
+
auth_type: NotRequired[pulumi.Input[str]]
|
2157
|
+
"""
|
2158
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
2159
|
+
"""
|
2160
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
2161
|
+
"""
|
2162
|
+
Connection string to use to connect to the database.
|
2163
|
+
"""
|
2164
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
2165
|
+
"""
|
2166
|
+
Maximum number of seconds a connection may be reused.
|
2167
|
+
"""
|
2168
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
2169
|
+
"""
|
2170
|
+
Maximum number of idle connections to the database.
|
2171
|
+
"""
|
2172
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
2173
|
+
"""
|
2174
|
+
Maximum number of open connections to the database.
|
2175
|
+
"""
|
2176
|
+
password: NotRequired[pulumi.Input[str]]
|
2177
|
+
"""
|
2178
|
+
The root credential password used in the connection URL
|
2179
|
+
"""
|
2180
|
+
service_account_json: NotRequired[pulumi.Input[str]]
|
2181
|
+
"""
|
2182
|
+
A JSON encoded credential for use with IAM authorization
|
2183
|
+
"""
|
2184
|
+
tls_ca: NotRequired[pulumi.Input[str]]
|
2185
|
+
"""
|
2186
|
+
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
2187
|
+
"""
|
2188
|
+
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
2189
|
+
"""
|
2190
|
+
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
2191
|
+
"""
|
2192
|
+
username: NotRequired[pulumi.Input[str]]
|
2193
|
+
"""
|
2194
|
+
The root credential username used in the connection URL
|
2195
|
+
"""
|
2196
|
+
username_template: NotRequired[pulumi.Input[str]]
|
2197
|
+
"""
|
2198
|
+
Username generation template.
|
2199
|
+
"""
|
2200
|
+
elif False:
|
2201
|
+
SecretBackendConnectionMysqlRdsArgsDict: TypeAlias = Mapping[str, Any]
|
2202
|
+
|
1668
2203
|
@pulumi.input_type
|
1669
2204
|
class SecretBackendConnectionMysqlRdsArgs:
|
1670
2205
|
def __init__(__self__, *,
|
@@ -1848,6 +2383,47 @@ class SecretBackendConnectionMysqlRdsArgs:
|
|
1848
2383
|
pulumi.set(self, "username_template", value)
|
1849
2384
|
|
1850
2385
|
|
2386
|
+
if not MYPY:
|
2387
|
+
class SecretBackendConnectionOracleArgsDict(TypedDict):
|
2388
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
2389
|
+
"""
|
2390
|
+
Connection string to use to connect to the database.
|
2391
|
+
"""
|
2392
|
+
disconnect_sessions: NotRequired[pulumi.Input[bool]]
|
2393
|
+
"""
|
2394
|
+
Set to true to disconnect any open sessions prior to running the revocation statements.
|
2395
|
+
"""
|
2396
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
2397
|
+
"""
|
2398
|
+
Maximum number of seconds a connection may be reused.
|
2399
|
+
"""
|
2400
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
2401
|
+
"""
|
2402
|
+
Maximum number of idle connections to the database.
|
2403
|
+
"""
|
2404
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
2405
|
+
"""
|
2406
|
+
Maximum number of open connections to the database.
|
2407
|
+
"""
|
2408
|
+
password: NotRequired[pulumi.Input[str]]
|
2409
|
+
"""
|
2410
|
+
The root credential password used in the connection URL
|
2411
|
+
"""
|
2412
|
+
split_statements: NotRequired[pulumi.Input[bool]]
|
2413
|
+
"""
|
2414
|
+
Set to true in order to split statements after semi-colons.
|
2415
|
+
"""
|
2416
|
+
username: NotRequired[pulumi.Input[str]]
|
2417
|
+
"""
|
2418
|
+
The root credential username used in the connection URL
|
2419
|
+
"""
|
2420
|
+
username_template: NotRequired[pulumi.Input[str]]
|
2421
|
+
"""
|
2422
|
+
Username generation template.
|
2423
|
+
"""
|
2424
|
+
elif False:
|
2425
|
+
SecretBackendConnectionOracleArgsDict: TypeAlias = Mapping[str, Any]
|
2426
|
+
|
1851
2427
|
@pulumi.input_type
|
1852
2428
|
class SecretBackendConnectionOracleArgs:
|
1853
2429
|
def __init__(__self__, *,
|
@@ -1999,6 +2575,51 @@ class SecretBackendConnectionOracleArgs:
|
|
1999
2575
|
pulumi.set(self, "username_template", value)
|
2000
2576
|
|
2001
2577
|
|
2578
|
+
if not MYPY:
|
2579
|
+
class SecretBackendConnectionPostgresqlArgsDict(TypedDict):
|
2580
|
+
auth_type: NotRequired[pulumi.Input[str]]
|
2581
|
+
"""
|
2582
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
2583
|
+
"""
|
2584
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
2585
|
+
"""
|
2586
|
+
Connection string to use to connect to the database.
|
2587
|
+
"""
|
2588
|
+
disable_escaping: NotRequired[pulumi.Input[bool]]
|
2589
|
+
"""
|
2590
|
+
Disable special character escaping in username and password
|
2591
|
+
"""
|
2592
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
2593
|
+
"""
|
2594
|
+
Maximum number of seconds a connection may be reused.
|
2595
|
+
"""
|
2596
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
2597
|
+
"""
|
2598
|
+
Maximum number of idle connections to the database.
|
2599
|
+
"""
|
2600
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
2601
|
+
"""
|
2602
|
+
Maximum number of open connections to the database.
|
2603
|
+
"""
|
2604
|
+
password: NotRequired[pulumi.Input[str]]
|
2605
|
+
"""
|
2606
|
+
The root credential password used in the connection URL
|
2607
|
+
"""
|
2608
|
+
service_account_json: NotRequired[pulumi.Input[str]]
|
2609
|
+
"""
|
2610
|
+
A JSON encoded credential for use with IAM authorization
|
2611
|
+
"""
|
2612
|
+
username: NotRequired[pulumi.Input[str]]
|
2613
|
+
"""
|
2614
|
+
The root credential username used in the connection URL
|
2615
|
+
"""
|
2616
|
+
username_template: NotRequired[pulumi.Input[str]]
|
2617
|
+
"""
|
2618
|
+
Username generation template.
|
2619
|
+
"""
|
2620
|
+
elif False:
|
2621
|
+
SecretBackendConnectionPostgresqlArgsDict: TypeAlias = Mapping[str, Any]
|
2622
|
+
|
2002
2623
|
@pulumi.input_type
|
2003
2624
|
class SecretBackendConnectionPostgresqlArgs:
|
2004
2625
|
def __init__(__self__, *,
|
@@ -2166,6 +2787,39 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2166
2787
|
pulumi.set(self, "username_template", value)
|
2167
2788
|
|
2168
2789
|
|
2790
|
+
if not MYPY:
|
2791
|
+
class SecretBackendConnectionRedisArgsDict(TypedDict):
|
2792
|
+
host: pulumi.Input[str]
|
2793
|
+
"""
|
2794
|
+
Specifies the host to connect to
|
2795
|
+
"""
|
2796
|
+
password: pulumi.Input[str]
|
2797
|
+
"""
|
2798
|
+
Specifies the password corresponding to the given username.
|
2799
|
+
"""
|
2800
|
+
username: pulumi.Input[str]
|
2801
|
+
"""
|
2802
|
+
Specifies the username for Vault to use.
|
2803
|
+
"""
|
2804
|
+
ca_cert: NotRequired[pulumi.Input[str]]
|
2805
|
+
"""
|
2806
|
+
The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
|
2807
|
+
"""
|
2808
|
+
insecure_tls: NotRequired[pulumi.Input[bool]]
|
2809
|
+
"""
|
2810
|
+
Specifies whether to skip verification of the server certificate when using TLS.
|
2811
|
+
"""
|
2812
|
+
port: NotRequired[pulumi.Input[int]]
|
2813
|
+
"""
|
2814
|
+
The transport port to use to connect to Redis.
|
2815
|
+
"""
|
2816
|
+
tls: NotRequired[pulumi.Input[bool]]
|
2817
|
+
"""
|
2818
|
+
Specifies whether to use TLS when connecting to Redis.
|
2819
|
+
"""
|
2820
|
+
elif False:
|
2821
|
+
SecretBackendConnectionRedisArgsDict: TypeAlias = Mapping[str, Any]
|
2822
|
+
|
2169
2823
|
@pulumi.input_type
|
2170
2824
|
class SecretBackendConnectionRedisArgs:
|
2171
2825
|
def __init__(__self__, *,
|
@@ -2282,6 +2936,27 @@ class SecretBackendConnectionRedisArgs:
|
|
2282
2936
|
pulumi.set(self, "tls", value)
|
2283
2937
|
|
2284
2938
|
|
2939
|
+
if not MYPY:
|
2940
|
+
class SecretBackendConnectionRedisElasticacheArgsDict(TypedDict):
|
2941
|
+
url: pulumi.Input[str]
|
2942
|
+
"""
|
2943
|
+
The configuration endpoint for the ElastiCache cluster to connect to.
|
2944
|
+
"""
|
2945
|
+
password: NotRequired[pulumi.Input[str]]
|
2946
|
+
"""
|
2947
|
+
The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
2948
|
+
"""
|
2949
|
+
region: NotRequired[pulumi.Input[str]]
|
2950
|
+
"""
|
2951
|
+
The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
|
2952
|
+
"""
|
2953
|
+
username: NotRequired[pulumi.Input[str]]
|
2954
|
+
"""
|
2955
|
+
The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
2956
|
+
"""
|
2957
|
+
elif False:
|
2958
|
+
SecretBackendConnectionRedisElasticacheArgsDict: TypeAlias = Mapping[str, Any]
|
2959
|
+
|
2285
2960
|
@pulumi.input_type
|
2286
2961
|
class SecretBackendConnectionRedisElasticacheArgs:
|
2287
2962
|
def __init__(__self__, *,
|
@@ -2352,6 +3027,43 @@ class SecretBackendConnectionRedisElasticacheArgs:
|
|
2352
3027
|
pulumi.set(self, "username", value)
|
2353
3028
|
|
2354
3029
|
|
3030
|
+
if not MYPY:
|
3031
|
+
class SecretBackendConnectionRedshiftArgsDict(TypedDict):
|
3032
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
3033
|
+
"""
|
3034
|
+
Connection string to use to connect to the database.
|
3035
|
+
"""
|
3036
|
+
disable_escaping: NotRequired[pulumi.Input[bool]]
|
3037
|
+
"""
|
3038
|
+
Disable special character escaping in username and password
|
3039
|
+
"""
|
3040
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
3041
|
+
"""
|
3042
|
+
Maximum number of seconds a connection may be reused.
|
3043
|
+
"""
|
3044
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
3045
|
+
"""
|
3046
|
+
Maximum number of idle connections to the database.
|
3047
|
+
"""
|
3048
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
3049
|
+
"""
|
3050
|
+
Maximum number of open connections to the database.
|
3051
|
+
"""
|
3052
|
+
password: NotRequired[pulumi.Input[str]]
|
3053
|
+
"""
|
3054
|
+
The root credential password used in the connection URL
|
3055
|
+
"""
|
3056
|
+
username: NotRequired[pulumi.Input[str]]
|
3057
|
+
"""
|
3058
|
+
The root credential username used in the connection URL
|
3059
|
+
"""
|
3060
|
+
username_template: NotRequired[pulumi.Input[str]]
|
3061
|
+
"""
|
3062
|
+
Username generation template.
|
3063
|
+
"""
|
3064
|
+
elif False:
|
3065
|
+
SecretBackendConnectionRedshiftArgsDict: TypeAlias = Mapping[str, Any]
|
3066
|
+
|
2355
3067
|
@pulumi.input_type
|
2356
3068
|
class SecretBackendConnectionRedshiftArgs:
|
2357
3069
|
def __init__(__self__, *,
|
@@ -2487,21 +3199,54 @@ class SecretBackendConnectionRedshiftArgs:
|
|
2487
3199
|
pulumi.set(self, "username_template", value)
|
2488
3200
|
|
2489
3201
|
|
2490
|
-
|
2491
|
-
class
|
2492
|
-
|
2493
|
-
connection_url: Optional[pulumi.Input[str]] = None,
|
2494
|
-
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
2495
|
-
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
2496
|
-
max_open_connections: Optional[pulumi.Input[int]] = None,
|
2497
|
-
password: Optional[pulumi.Input[str]] = None,
|
2498
|
-
username: Optional[pulumi.Input[str]] = None,
|
2499
|
-
username_template: Optional[pulumi.Input[str]] = None):
|
3202
|
+
if not MYPY:
|
3203
|
+
class SecretBackendConnectionSnowflakeArgsDict(TypedDict):
|
3204
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
2500
3205
|
"""
|
2501
|
-
|
2502
|
-
|
2503
|
-
:
|
2504
|
-
|
3206
|
+
Connection string to use to connect to the database.
|
3207
|
+
"""
|
3208
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
3209
|
+
"""
|
3210
|
+
Maximum number of seconds a connection may be reused.
|
3211
|
+
"""
|
3212
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
3213
|
+
"""
|
3214
|
+
Maximum number of idle connections to the database.
|
3215
|
+
"""
|
3216
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
3217
|
+
"""
|
3218
|
+
Maximum number of open connections to the database.
|
3219
|
+
"""
|
3220
|
+
password: NotRequired[pulumi.Input[str]]
|
3221
|
+
"""
|
3222
|
+
The root credential password used in the connection URL
|
3223
|
+
"""
|
3224
|
+
username: NotRequired[pulumi.Input[str]]
|
3225
|
+
"""
|
3226
|
+
The root credential username used in the connection URL
|
3227
|
+
"""
|
3228
|
+
username_template: NotRequired[pulumi.Input[str]]
|
3229
|
+
"""
|
3230
|
+
Username generation template.
|
3231
|
+
"""
|
3232
|
+
elif False:
|
3233
|
+
SecretBackendConnectionSnowflakeArgsDict: TypeAlias = Mapping[str, Any]
|
3234
|
+
|
3235
|
+
@pulumi.input_type
|
3236
|
+
class SecretBackendConnectionSnowflakeArgs:
|
3237
|
+
def __init__(__self__, *,
|
3238
|
+
connection_url: Optional[pulumi.Input[str]] = None,
|
3239
|
+
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
3240
|
+
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
3241
|
+
max_open_connections: Optional[pulumi.Input[int]] = None,
|
3242
|
+
password: Optional[pulumi.Input[str]] = None,
|
3243
|
+
username: Optional[pulumi.Input[str]] = None,
|
3244
|
+
username_template: Optional[pulumi.Input[str]] = None):
|
3245
|
+
"""
|
3246
|
+
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
3247
|
+
:param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
3248
|
+
:param pulumi.Input[int] max_idle_connections: Maximum number of idle connections to the database.
|
3249
|
+
:param pulumi.Input[int] max_open_connections: Maximum number of open connections to the database.
|
2505
3250
|
:param pulumi.Input[str] password: The root credential password used in the connection URL
|
2506
3251
|
:param pulumi.Input[str] username: The root credential username used in the connection URL
|
2507
3252
|
:param pulumi.Input[str] username_template: Username generation template.
|
@@ -2606,13 +3351,86 @@ class SecretBackendConnectionSnowflakeArgs:
|
|
2606
3351
|
pulumi.set(self, "username_template", value)
|
2607
3352
|
|
2608
3353
|
|
3354
|
+
if not MYPY:
|
3355
|
+
class SecretsMountCassandraArgsDict(TypedDict):
|
3356
|
+
name: pulumi.Input[str]
|
3357
|
+
"""
|
3358
|
+
Name of the database connection.
|
3359
|
+
"""
|
3360
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
3361
|
+
"""
|
3362
|
+
A list of roles that are allowed to use this
|
3363
|
+
connection.
|
3364
|
+
"""
|
3365
|
+
connect_timeout: NotRequired[pulumi.Input[int]]
|
3366
|
+
"""
|
3367
|
+
The number of seconds to use as a connection timeout.
|
3368
|
+
"""
|
3369
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
3370
|
+
"""
|
3371
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3372
|
+
|
3373
|
+
Supported list of database secrets engines that can be configured:
|
3374
|
+
"""
|
3375
|
+
hosts: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
3376
|
+
"""
|
3377
|
+
Cassandra hosts to connect to.
|
3378
|
+
"""
|
3379
|
+
insecure_tls: NotRequired[pulumi.Input[bool]]
|
3380
|
+
"""
|
3381
|
+
Whether to skip verification of the server certificate when using TLS.
|
3382
|
+
"""
|
3383
|
+
password: NotRequired[pulumi.Input[str]]
|
3384
|
+
"""
|
3385
|
+
The password to use when authenticating with Cassandra.
|
3386
|
+
"""
|
3387
|
+
pem_bundle: NotRequired[pulumi.Input[str]]
|
3388
|
+
"""
|
3389
|
+
Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
3390
|
+
"""
|
3391
|
+
pem_json: NotRequired[pulumi.Input[str]]
|
3392
|
+
"""
|
3393
|
+
Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
3394
|
+
"""
|
3395
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
3396
|
+
"""
|
3397
|
+
Specifies the name of the plugin to use.
|
3398
|
+
"""
|
3399
|
+
port: NotRequired[pulumi.Input[int]]
|
3400
|
+
"""
|
3401
|
+
The transport port to use to connect to Cassandra.
|
3402
|
+
"""
|
3403
|
+
protocol_version: NotRequired[pulumi.Input[int]]
|
3404
|
+
"""
|
3405
|
+
The CQL protocol version to use.
|
3406
|
+
"""
|
3407
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
3408
|
+
"""
|
3409
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
3410
|
+
"""
|
3411
|
+
tls: NotRequired[pulumi.Input[bool]]
|
3412
|
+
"""
|
3413
|
+
Whether to use TLS when connecting to Cassandra.
|
3414
|
+
"""
|
3415
|
+
username: NotRequired[pulumi.Input[str]]
|
3416
|
+
"""
|
3417
|
+
The username to use when authenticating with Cassandra.
|
3418
|
+
"""
|
3419
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
3420
|
+
"""
|
3421
|
+
Whether the connection should be verified on
|
3422
|
+
initial configuration or not.
|
3423
|
+
"""
|
3424
|
+
elif False:
|
3425
|
+
SecretsMountCassandraArgsDict: TypeAlias = Mapping[str, Any]
|
3426
|
+
|
2609
3427
|
@pulumi.input_type
|
2610
3428
|
class SecretsMountCassandraArgs:
|
2611
3429
|
def __init__(__self__, *,
|
2612
3430
|
name: pulumi.Input[str],
|
2613
3431
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
2614
3432
|
connect_timeout: Optional[pulumi.Input[int]] = None,
|
2615
|
-
data: Optional[pulumi.Input[Mapping[str,
|
3433
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
2616
3434
|
hosts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
2617
3435
|
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
2618
3436
|
password: Optional[pulumi.Input[str]] = None,
|
@@ -2630,7 +3448,7 @@ class SecretsMountCassandraArgs:
|
|
2630
3448
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
2631
3449
|
connection.
|
2632
3450
|
:param pulumi.Input[int] connect_timeout: The number of seconds to use as a connection timeout.
|
2633
|
-
:param pulumi.Input[Mapping[str,
|
3451
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2634
3452
|
|
2635
3453
|
Supported list of database secrets engines that can be configured:
|
2636
3454
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] hosts: Cassandra hosts to connect to.
|
@@ -2718,7 +3536,7 @@ class SecretsMountCassandraArgs:
|
|
2718
3536
|
|
2719
3537
|
@property
|
2720
3538
|
@pulumi.getter
|
2721
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
3539
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
2722
3540
|
"""
|
2723
3541
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2724
3542
|
|
@@ -2727,7 +3545,7 @@ class SecretsMountCassandraArgs:
|
|
2727
3545
|
return pulumi.get(self, "data")
|
2728
3546
|
|
2729
3547
|
@data.setter
|
2730
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
3548
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
2731
3549
|
pulumi.set(self, "data", value)
|
2732
3550
|
|
2733
3551
|
@property
|
@@ -2876,6 +3694,71 @@ class SecretsMountCassandraArgs:
|
|
2876
3694
|
pulumi.set(self, "verify_connection", value)
|
2877
3695
|
|
2878
3696
|
|
3697
|
+
if not MYPY:
|
3698
|
+
class SecretsMountCouchbaseArgsDict(TypedDict):
|
3699
|
+
hosts: pulumi.Input[Sequence[pulumi.Input[str]]]
|
3700
|
+
"""
|
3701
|
+
A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
|
3702
|
+
"""
|
3703
|
+
name: pulumi.Input[str]
|
3704
|
+
"""
|
3705
|
+
Name of the database connection.
|
3706
|
+
"""
|
3707
|
+
password: pulumi.Input[str]
|
3708
|
+
"""
|
3709
|
+
Specifies the password corresponding to the given username.
|
3710
|
+
"""
|
3711
|
+
username: pulumi.Input[str]
|
3712
|
+
"""
|
3713
|
+
Specifies the username for Vault to use.
|
3714
|
+
"""
|
3715
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
3716
|
+
"""
|
3717
|
+
A list of roles that are allowed to use this
|
3718
|
+
connection.
|
3719
|
+
"""
|
3720
|
+
base64_pem: NotRequired[pulumi.Input[str]]
|
3721
|
+
"""
|
3722
|
+
Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
|
3723
|
+
"""
|
3724
|
+
bucket_name: NotRequired[pulumi.Input[str]]
|
3725
|
+
"""
|
3726
|
+
Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
|
3727
|
+
"""
|
3728
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
3729
|
+
"""
|
3730
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3731
|
+
|
3732
|
+
Supported list of database secrets engines that can be configured:
|
3733
|
+
"""
|
3734
|
+
insecure_tls: NotRequired[pulumi.Input[bool]]
|
3735
|
+
"""
|
3736
|
+
Specifies whether to skip verification of the server certificate when using TLS.
|
3737
|
+
"""
|
3738
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
3739
|
+
"""
|
3740
|
+
Specifies the name of the plugin to use.
|
3741
|
+
"""
|
3742
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
3743
|
+
"""
|
3744
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
3745
|
+
"""
|
3746
|
+
tls: NotRequired[pulumi.Input[bool]]
|
3747
|
+
"""
|
3748
|
+
Specifies whether to use TLS when connecting to Couchbase.
|
3749
|
+
"""
|
3750
|
+
username_template: NotRequired[pulumi.Input[str]]
|
3751
|
+
"""
|
3752
|
+
Template describing how dynamic usernames are generated.
|
3753
|
+
"""
|
3754
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
3755
|
+
"""
|
3756
|
+
Whether the connection should be verified on
|
3757
|
+
initial configuration or not.
|
3758
|
+
"""
|
3759
|
+
elif False:
|
3760
|
+
SecretsMountCouchbaseArgsDict: TypeAlias = Mapping[str, Any]
|
3761
|
+
|
2879
3762
|
@pulumi.input_type
|
2880
3763
|
class SecretsMountCouchbaseArgs:
|
2881
3764
|
def __init__(__self__, *,
|
@@ -2886,7 +3769,7 @@ class SecretsMountCouchbaseArgs:
|
|
2886
3769
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
2887
3770
|
base64_pem: Optional[pulumi.Input[str]] = None,
|
2888
3771
|
bucket_name: Optional[pulumi.Input[str]] = None,
|
2889
|
-
data: Optional[pulumi.Input[Mapping[str,
|
3772
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
2890
3773
|
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
2891
3774
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
2892
3775
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -2902,7 +3785,7 @@ class SecretsMountCouchbaseArgs:
|
|
2902
3785
|
connection.
|
2903
3786
|
:param pulumi.Input[str] base64_pem: Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
|
2904
3787
|
:param pulumi.Input[str] bucket_name: Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
|
2905
|
-
:param pulumi.Input[Mapping[str,
|
3788
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2906
3789
|
|
2907
3790
|
Supported list of database secrets engines that can be configured:
|
2908
3791
|
:param pulumi.Input[bool] insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
|
@@ -3025,7 +3908,7 @@ class SecretsMountCouchbaseArgs:
|
|
3025
3908
|
|
3026
3909
|
@property
|
3027
3910
|
@pulumi.getter
|
3028
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
3911
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
3029
3912
|
"""
|
3030
3913
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3031
3914
|
|
@@ -3034,7 +3917,7 @@ class SecretsMountCouchbaseArgs:
|
|
3034
3917
|
return pulumi.get(self, "data")
|
3035
3918
|
|
3036
3919
|
@data.setter
|
3037
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
3920
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
3038
3921
|
pulumi.set(self, "data", value)
|
3039
3922
|
|
3040
3923
|
@property
|
@@ -3111,6 +3994,79 @@ class SecretsMountCouchbaseArgs:
|
|
3111
3994
|
pulumi.set(self, "verify_connection", value)
|
3112
3995
|
|
3113
3996
|
|
3997
|
+
if not MYPY:
|
3998
|
+
class SecretsMountElasticsearchArgsDict(TypedDict):
|
3999
|
+
name: pulumi.Input[str]
|
4000
|
+
"""
|
4001
|
+
Name of the database connection.
|
4002
|
+
"""
|
4003
|
+
password: pulumi.Input[str]
|
4004
|
+
"""
|
4005
|
+
The password to be used in the connection URL
|
4006
|
+
"""
|
4007
|
+
url: pulumi.Input[str]
|
4008
|
+
"""
|
4009
|
+
The URL for Elasticsearch's API
|
4010
|
+
"""
|
4011
|
+
username: pulumi.Input[str]
|
4012
|
+
"""
|
4013
|
+
The username to be used in the connection URL
|
4014
|
+
"""
|
4015
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4016
|
+
"""
|
4017
|
+
A list of roles that are allowed to use this
|
4018
|
+
connection.
|
4019
|
+
"""
|
4020
|
+
ca_cert: NotRequired[pulumi.Input[str]]
|
4021
|
+
"""
|
4022
|
+
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
4023
|
+
"""
|
4024
|
+
ca_path: NotRequired[pulumi.Input[str]]
|
4025
|
+
"""
|
4026
|
+
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
4027
|
+
"""
|
4028
|
+
client_cert: NotRequired[pulumi.Input[str]]
|
4029
|
+
"""
|
4030
|
+
The path to the certificate for the Elasticsearch client to present for communication
|
4031
|
+
"""
|
4032
|
+
client_key: NotRequired[pulumi.Input[str]]
|
4033
|
+
"""
|
4034
|
+
The path to the key for the Elasticsearch client to use for communication
|
4035
|
+
"""
|
4036
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
4037
|
+
"""
|
4038
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4039
|
+
|
4040
|
+
Supported list of database secrets engines that can be configured:
|
4041
|
+
"""
|
4042
|
+
insecure: NotRequired[pulumi.Input[bool]]
|
4043
|
+
"""
|
4044
|
+
Whether to disable certificate verification
|
4045
|
+
"""
|
4046
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
4047
|
+
"""
|
4048
|
+
Specifies the name of the plugin to use.
|
4049
|
+
"""
|
4050
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4051
|
+
"""
|
4052
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
4053
|
+
"""
|
4054
|
+
tls_server_name: NotRequired[pulumi.Input[str]]
|
4055
|
+
"""
|
4056
|
+
This, if set, is used to set the SNI host when connecting via TLS
|
4057
|
+
"""
|
4058
|
+
username_template: NotRequired[pulumi.Input[str]]
|
4059
|
+
"""
|
4060
|
+
Template describing how dynamic usernames are generated.
|
4061
|
+
"""
|
4062
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
4063
|
+
"""
|
4064
|
+
Whether the connection should be verified on
|
4065
|
+
initial configuration or not.
|
4066
|
+
"""
|
4067
|
+
elif False:
|
4068
|
+
SecretsMountElasticsearchArgsDict: TypeAlias = Mapping[str, Any]
|
4069
|
+
|
3114
4070
|
@pulumi.input_type
|
3115
4071
|
class SecretsMountElasticsearchArgs:
|
3116
4072
|
def __init__(__self__, *,
|
@@ -3123,7 +4079,7 @@ class SecretsMountElasticsearchArgs:
|
|
3123
4079
|
ca_path: Optional[pulumi.Input[str]] = None,
|
3124
4080
|
client_cert: Optional[pulumi.Input[str]] = None,
|
3125
4081
|
client_key: Optional[pulumi.Input[str]] = None,
|
3126
|
-
data: Optional[pulumi.Input[Mapping[str,
|
4082
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
3127
4083
|
insecure: Optional[pulumi.Input[bool]] = None,
|
3128
4084
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
3129
4085
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -3141,7 +4097,7 @@ class SecretsMountElasticsearchArgs:
|
|
3141
4097
|
:param pulumi.Input[str] ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
3142
4098
|
:param pulumi.Input[str] client_cert: The path to the certificate for the Elasticsearch client to present for communication
|
3143
4099
|
:param pulumi.Input[str] client_key: The path to the key for the Elasticsearch client to use for communication
|
3144
|
-
:param pulumi.Input[Mapping[str,
|
4100
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3145
4101
|
|
3146
4102
|
Supported list of database secrets engines that can be configured:
|
3147
4103
|
:param pulumi.Input[bool] insecure: Whether to disable certificate verification
|
@@ -3292,7 +4248,7 @@ class SecretsMountElasticsearchArgs:
|
|
3292
4248
|
|
3293
4249
|
@property
|
3294
4250
|
@pulumi.getter
|
3295
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
4251
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
3296
4252
|
"""
|
3297
4253
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3298
4254
|
|
@@ -3301,7 +4257,7 @@ class SecretsMountElasticsearchArgs:
|
|
3301
4257
|
return pulumi.get(self, "data")
|
3302
4258
|
|
3303
4259
|
@data.setter
|
3304
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
4260
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
3305
4261
|
pulumi.set(self, "data", value)
|
3306
4262
|
|
3307
4263
|
@property
|
@@ -3378,13 +4334,74 @@ class SecretsMountElasticsearchArgs:
|
|
3378
4334
|
pulumi.set(self, "verify_connection", value)
|
3379
4335
|
|
3380
4336
|
|
4337
|
+
if not MYPY:
|
4338
|
+
class SecretsMountHanaArgsDict(TypedDict):
|
4339
|
+
name: pulumi.Input[str]
|
4340
|
+
"""
|
4341
|
+
Name of the database connection.
|
4342
|
+
"""
|
4343
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4344
|
+
"""
|
4345
|
+
A list of roles that are allowed to use this
|
4346
|
+
connection.
|
4347
|
+
"""
|
4348
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
4349
|
+
"""
|
4350
|
+
Connection string to use to connect to the database.
|
4351
|
+
"""
|
4352
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
4353
|
+
"""
|
4354
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4355
|
+
|
4356
|
+
Supported list of database secrets engines that can be configured:
|
4357
|
+
"""
|
4358
|
+
disable_escaping: NotRequired[pulumi.Input[bool]]
|
4359
|
+
"""
|
4360
|
+
Disable special character escaping in username and password
|
4361
|
+
"""
|
4362
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
4363
|
+
"""
|
4364
|
+
Maximum number of seconds a connection may be reused.
|
4365
|
+
"""
|
4366
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
4367
|
+
"""
|
4368
|
+
Maximum number of idle connections to the database.
|
4369
|
+
"""
|
4370
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
4371
|
+
"""
|
4372
|
+
Maximum number of open connections to the database.
|
4373
|
+
"""
|
4374
|
+
password: NotRequired[pulumi.Input[str]]
|
4375
|
+
"""
|
4376
|
+
The root credential password used in the connection URL
|
4377
|
+
"""
|
4378
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
4379
|
+
"""
|
4380
|
+
Specifies the name of the plugin to use.
|
4381
|
+
"""
|
4382
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4383
|
+
"""
|
4384
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
4385
|
+
"""
|
4386
|
+
username: NotRequired[pulumi.Input[str]]
|
4387
|
+
"""
|
4388
|
+
The root credential username used in the connection URL
|
4389
|
+
"""
|
4390
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
4391
|
+
"""
|
4392
|
+
Whether the connection should be verified on
|
4393
|
+
initial configuration or not.
|
4394
|
+
"""
|
4395
|
+
elif False:
|
4396
|
+
SecretsMountHanaArgsDict: TypeAlias = Mapping[str, Any]
|
4397
|
+
|
3381
4398
|
@pulumi.input_type
|
3382
4399
|
class SecretsMountHanaArgs:
|
3383
4400
|
def __init__(__self__, *,
|
3384
4401
|
name: pulumi.Input[str],
|
3385
4402
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
3386
4403
|
connection_url: Optional[pulumi.Input[str]] = None,
|
3387
|
-
data: Optional[pulumi.Input[Mapping[str,
|
4404
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
3388
4405
|
disable_escaping: Optional[pulumi.Input[bool]] = None,
|
3389
4406
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
3390
4407
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
@@ -3399,7 +4416,7 @@ class SecretsMountHanaArgs:
|
|
3399
4416
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
3400
4417
|
connection.
|
3401
4418
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
3402
|
-
:param pulumi.Input[Mapping[str,
|
4419
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3403
4420
|
|
3404
4421
|
Supported list of database secrets engines that can be configured:
|
3405
4422
|
:param pulumi.Input[bool] disable_escaping: Disable special character escaping in username and password
|
@@ -3478,7 +4495,7 @@ class SecretsMountHanaArgs:
|
|
3478
4495
|
|
3479
4496
|
@property
|
3480
4497
|
@pulumi.getter
|
3481
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
4498
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
3482
4499
|
"""
|
3483
4500
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3484
4501
|
|
@@ -3487,7 +4504,7 @@ class SecretsMountHanaArgs:
|
|
3487
4504
|
return pulumi.get(self, "data")
|
3488
4505
|
|
3489
4506
|
@data.setter
|
3490
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
4507
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
3491
4508
|
pulumi.set(self, "data", value)
|
3492
4509
|
|
3493
4510
|
@property
|
@@ -3600,6 +4617,79 @@ class SecretsMountHanaArgs:
|
|
3600
4617
|
pulumi.set(self, "verify_connection", value)
|
3601
4618
|
|
3602
4619
|
|
4620
|
+
if not MYPY:
|
4621
|
+
class SecretsMountInfluxdbArgsDict(TypedDict):
|
4622
|
+
host: pulumi.Input[str]
|
4623
|
+
"""
|
4624
|
+
Influxdb host to connect to.
|
4625
|
+
"""
|
4626
|
+
name: pulumi.Input[str]
|
4627
|
+
"""
|
4628
|
+
Name of the database connection.
|
4629
|
+
"""
|
4630
|
+
password: pulumi.Input[str]
|
4631
|
+
"""
|
4632
|
+
Specifies the password corresponding to the given username.
|
4633
|
+
"""
|
4634
|
+
username: pulumi.Input[str]
|
4635
|
+
"""
|
4636
|
+
Specifies the username to use for superuser access.
|
4637
|
+
"""
|
4638
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4639
|
+
"""
|
4640
|
+
A list of roles that are allowed to use this
|
4641
|
+
connection.
|
4642
|
+
"""
|
4643
|
+
connect_timeout: NotRequired[pulumi.Input[int]]
|
4644
|
+
"""
|
4645
|
+
The number of seconds to use as a connection timeout.
|
4646
|
+
"""
|
4647
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
4648
|
+
"""
|
4649
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4650
|
+
|
4651
|
+
Supported list of database secrets engines that can be configured:
|
4652
|
+
"""
|
4653
|
+
insecure_tls: NotRequired[pulumi.Input[bool]]
|
4654
|
+
"""
|
4655
|
+
Whether to skip verification of the server certificate when using TLS.
|
4656
|
+
"""
|
4657
|
+
pem_bundle: NotRequired[pulumi.Input[str]]
|
4658
|
+
"""
|
4659
|
+
Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
4660
|
+
"""
|
4661
|
+
pem_json: NotRequired[pulumi.Input[str]]
|
4662
|
+
"""
|
4663
|
+
Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
4664
|
+
"""
|
4665
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
4666
|
+
"""
|
4667
|
+
Specifies the name of the plugin to use.
|
4668
|
+
"""
|
4669
|
+
port: NotRequired[pulumi.Input[int]]
|
4670
|
+
"""
|
4671
|
+
The transport port to use to connect to Influxdb.
|
4672
|
+
"""
|
4673
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4674
|
+
"""
|
4675
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
4676
|
+
"""
|
4677
|
+
tls: NotRequired[pulumi.Input[bool]]
|
4678
|
+
"""
|
4679
|
+
Whether to use TLS when connecting to Influxdb.
|
4680
|
+
"""
|
4681
|
+
username_template: NotRequired[pulumi.Input[str]]
|
4682
|
+
"""
|
4683
|
+
Template describing how dynamic usernames are generated.
|
4684
|
+
"""
|
4685
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
4686
|
+
"""
|
4687
|
+
Whether the connection should be verified on
|
4688
|
+
initial configuration or not.
|
4689
|
+
"""
|
4690
|
+
elif False:
|
4691
|
+
SecretsMountInfluxdbArgsDict: TypeAlias = Mapping[str, Any]
|
4692
|
+
|
3603
4693
|
@pulumi.input_type
|
3604
4694
|
class SecretsMountInfluxdbArgs:
|
3605
4695
|
def __init__(__self__, *,
|
@@ -3609,7 +4699,7 @@ class SecretsMountInfluxdbArgs:
|
|
3609
4699
|
username: pulumi.Input[str],
|
3610
4700
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
3611
4701
|
connect_timeout: Optional[pulumi.Input[int]] = None,
|
3612
|
-
data: Optional[pulumi.Input[Mapping[str,
|
4702
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
3613
4703
|
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
3614
4704
|
pem_bundle: Optional[pulumi.Input[str]] = None,
|
3615
4705
|
pem_json: Optional[pulumi.Input[str]] = None,
|
@@ -3627,7 +4717,7 @@ class SecretsMountInfluxdbArgs:
|
|
3627
4717
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
3628
4718
|
connection.
|
3629
4719
|
:param pulumi.Input[int] connect_timeout: The number of seconds to use as a connection timeout.
|
3630
|
-
:param pulumi.Input[Mapping[str,
|
4720
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3631
4721
|
|
3632
4722
|
Supported list of database secrets engines that can be configured:
|
3633
4723
|
:param pulumi.Input[bool] insecure_tls: Whether to skip verification of the server certificate when using TLS.
|
@@ -3745,7 +4835,7 @@ class SecretsMountInfluxdbArgs:
|
|
3745
4835
|
|
3746
4836
|
@property
|
3747
4837
|
@pulumi.getter
|
3748
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
4838
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
3749
4839
|
"""
|
3750
4840
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3751
4841
|
|
@@ -3754,7 +4844,7 @@ class SecretsMountInfluxdbArgs:
|
|
3754
4844
|
return pulumi.get(self, "data")
|
3755
4845
|
|
3756
4846
|
@data.setter
|
3757
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
4847
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
3758
4848
|
pulumi.set(self, "data", value)
|
3759
4849
|
|
3760
4850
|
@property
|
@@ -3867,13 +4957,74 @@ class SecretsMountInfluxdbArgs:
|
|
3867
4957
|
pulumi.set(self, "verify_connection", value)
|
3868
4958
|
|
3869
4959
|
|
4960
|
+
if not MYPY:
|
4961
|
+
class SecretsMountMongodbArgsDict(TypedDict):
|
4962
|
+
name: pulumi.Input[str]
|
4963
|
+
"""
|
4964
|
+
Name of the database connection.
|
4965
|
+
"""
|
4966
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4967
|
+
"""
|
4968
|
+
A list of roles that are allowed to use this
|
4969
|
+
connection.
|
4970
|
+
"""
|
4971
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
4972
|
+
"""
|
4973
|
+
Connection string to use to connect to the database.
|
4974
|
+
"""
|
4975
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
4976
|
+
"""
|
4977
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4978
|
+
|
4979
|
+
Supported list of database secrets engines that can be configured:
|
4980
|
+
"""
|
4981
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
4982
|
+
"""
|
4983
|
+
Maximum number of seconds a connection may be reused.
|
4984
|
+
"""
|
4985
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
4986
|
+
"""
|
4987
|
+
Maximum number of idle connections to the database.
|
4988
|
+
"""
|
4989
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
4990
|
+
"""
|
4991
|
+
Maximum number of open connections to the database.
|
4992
|
+
"""
|
4993
|
+
password: NotRequired[pulumi.Input[str]]
|
4994
|
+
"""
|
4995
|
+
The root credential password used in the connection URL
|
4996
|
+
"""
|
4997
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
4998
|
+
"""
|
4999
|
+
Specifies the name of the plugin to use.
|
5000
|
+
"""
|
5001
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5002
|
+
"""
|
5003
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
5004
|
+
"""
|
5005
|
+
username: NotRequired[pulumi.Input[str]]
|
5006
|
+
"""
|
5007
|
+
The root credential username used in the connection URL
|
5008
|
+
"""
|
5009
|
+
username_template: NotRequired[pulumi.Input[str]]
|
5010
|
+
"""
|
5011
|
+
Username generation template.
|
5012
|
+
"""
|
5013
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
5014
|
+
"""
|
5015
|
+
Whether the connection should be verified on
|
5016
|
+
initial configuration or not.
|
5017
|
+
"""
|
5018
|
+
elif False:
|
5019
|
+
SecretsMountMongodbArgsDict: TypeAlias = Mapping[str, Any]
|
5020
|
+
|
3870
5021
|
@pulumi.input_type
|
3871
5022
|
class SecretsMountMongodbArgs:
|
3872
5023
|
def __init__(__self__, *,
|
3873
5024
|
name: pulumi.Input[str],
|
3874
5025
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
3875
5026
|
connection_url: Optional[pulumi.Input[str]] = None,
|
3876
|
-
data: Optional[pulumi.Input[Mapping[str,
|
5027
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
3877
5028
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
3878
5029
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
3879
5030
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
@@ -3888,7 +5039,7 @@ class SecretsMountMongodbArgs:
|
|
3888
5039
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
3889
5040
|
connection.
|
3890
5041
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
3891
|
-
:param pulumi.Input[Mapping[str,
|
5042
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3892
5043
|
|
3893
5044
|
Supported list of database secrets engines that can be configured:
|
3894
5045
|
:param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -3967,7 +5118,7 @@ class SecretsMountMongodbArgs:
|
|
3967
5118
|
|
3968
5119
|
@property
|
3969
5120
|
@pulumi.getter
|
3970
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
5121
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
3971
5122
|
"""
|
3972
5123
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3973
5124
|
|
@@ -3976,7 +5127,7 @@ class SecretsMountMongodbArgs:
|
|
3976
5127
|
return pulumi.get(self, "data")
|
3977
5128
|
|
3978
5129
|
@data.setter
|
3979
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
5130
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
3980
5131
|
pulumi.set(self, "data", value)
|
3981
5132
|
|
3982
5133
|
@property
|
@@ -4089,6 +5240,51 @@ class SecretsMountMongodbArgs:
|
|
4089
5240
|
pulumi.set(self, "verify_connection", value)
|
4090
5241
|
|
4091
5242
|
|
5243
|
+
if not MYPY:
|
5244
|
+
class SecretsMountMongodbatlaArgsDict(TypedDict):
|
5245
|
+
name: pulumi.Input[str]
|
5246
|
+
"""
|
5247
|
+
Name of the database connection.
|
5248
|
+
"""
|
5249
|
+
private_key: pulumi.Input[str]
|
5250
|
+
"""
|
5251
|
+
The Private Programmatic API Key used to connect with MongoDB Atlas API.
|
5252
|
+
"""
|
5253
|
+
project_id: pulumi.Input[str]
|
5254
|
+
"""
|
5255
|
+
The Project ID the Database User should be created within.
|
5256
|
+
"""
|
5257
|
+
public_key: pulumi.Input[str]
|
5258
|
+
"""
|
5259
|
+
The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
|
5260
|
+
"""
|
5261
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5262
|
+
"""
|
5263
|
+
A list of roles that are allowed to use this
|
5264
|
+
connection.
|
5265
|
+
"""
|
5266
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
5267
|
+
"""
|
5268
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5269
|
+
|
5270
|
+
Supported list of database secrets engines that can be configured:
|
5271
|
+
"""
|
5272
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
5273
|
+
"""
|
5274
|
+
Specifies the name of the plugin to use.
|
5275
|
+
"""
|
5276
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5277
|
+
"""
|
5278
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
5279
|
+
"""
|
5280
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
5281
|
+
"""
|
5282
|
+
Whether the connection should be verified on
|
5283
|
+
initial configuration or not.
|
5284
|
+
"""
|
5285
|
+
elif False:
|
5286
|
+
SecretsMountMongodbatlaArgsDict: TypeAlias = Mapping[str, Any]
|
5287
|
+
|
4092
5288
|
@pulumi.input_type
|
4093
5289
|
class SecretsMountMongodbatlaArgs:
|
4094
5290
|
def __init__(__self__, *,
|
@@ -4097,7 +5293,7 @@ class SecretsMountMongodbatlaArgs:
|
|
4097
5293
|
project_id: pulumi.Input[str],
|
4098
5294
|
public_key: pulumi.Input[str],
|
4099
5295
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
4100
|
-
data: Optional[pulumi.Input[Mapping[str,
|
5296
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
4101
5297
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
4102
5298
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
4103
5299
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
@@ -4108,7 +5304,7 @@ class SecretsMountMongodbatlaArgs:
|
|
4108
5304
|
:param pulumi.Input[str] public_key: The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
|
4109
5305
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
4110
5306
|
connection.
|
4111
|
-
:param pulumi.Input[Mapping[str,
|
5307
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4112
5308
|
|
4113
5309
|
Supported list of database secrets engines that can be configured:
|
4114
5310
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
@@ -4194,7 +5390,7 @@ class SecretsMountMongodbatlaArgs:
|
|
4194
5390
|
|
4195
5391
|
@property
|
4196
5392
|
@pulumi.getter
|
4197
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
5393
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
4198
5394
|
"""
|
4199
5395
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4200
5396
|
|
@@ -4203,7 +5399,7 @@ class SecretsMountMongodbatlaArgs:
|
|
4203
5399
|
return pulumi.get(self, "data")
|
4204
5400
|
|
4205
5401
|
@data.setter
|
4206
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
5402
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
4207
5403
|
pulumi.set(self, "data", value)
|
4208
5404
|
|
4209
5405
|
@property
|
@@ -4244,6 +5440,75 @@ class SecretsMountMongodbatlaArgs:
|
|
4244
5440
|
pulumi.set(self, "verify_connection", value)
|
4245
5441
|
|
4246
5442
|
|
5443
|
+
if not MYPY:
|
5444
|
+
class SecretsMountMssqlArgsDict(TypedDict):
|
5445
|
+
name: pulumi.Input[str]
|
5446
|
+
"""
|
5447
|
+
Name of the database connection.
|
5448
|
+
"""
|
5449
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5450
|
+
"""
|
5451
|
+
A list of roles that are allowed to use this
|
5452
|
+
connection.
|
5453
|
+
"""
|
5454
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
5455
|
+
"""
|
5456
|
+
Connection string to use to connect to the database.
|
5457
|
+
"""
|
5458
|
+
contained_db: NotRequired[pulumi.Input[bool]]
|
5459
|
+
"""
|
5460
|
+
Set to true when the target is a Contained Database, e.g. AzureSQL.
|
5461
|
+
"""
|
5462
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
5463
|
+
"""
|
5464
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5465
|
+
|
5466
|
+
Supported list of database secrets engines that can be configured:
|
5467
|
+
"""
|
5468
|
+
disable_escaping: NotRequired[pulumi.Input[bool]]
|
5469
|
+
"""
|
5470
|
+
Disable special character escaping in username and password
|
5471
|
+
"""
|
5472
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
5473
|
+
"""
|
5474
|
+
Maximum number of seconds a connection may be reused.
|
5475
|
+
"""
|
5476
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
5477
|
+
"""
|
5478
|
+
Maximum number of idle connections to the database.
|
5479
|
+
"""
|
5480
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
5481
|
+
"""
|
5482
|
+
Maximum number of open connections to the database.
|
5483
|
+
"""
|
5484
|
+
password: NotRequired[pulumi.Input[str]]
|
5485
|
+
"""
|
5486
|
+
The root credential password used in the connection URL
|
5487
|
+
"""
|
5488
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
5489
|
+
"""
|
5490
|
+
Specifies the name of the plugin to use.
|
5491
|
+
"""
|
5492
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5493
|
+
"""
|
5494
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
5495
|
+
"""
|
5496
|
+
username: NotRequired[pulumi.Input[str]]
|
5497
|
+
"""
|
5498
|
+
The root credential username used in the connection URL
|
5499
|
+
"""
|
5500
|
+
username_template: NotRequired[pulumi.Input[str]]
|
5501
|
+
"""
|
5502
|
+
Username generation template.
|
5503
|
+
"""
|
5504
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
5505
|
+
"""
|
5506
|
+
Whether the connection should be verified on
|
5507
|
+
initial configuration or not.
|
5508
|
+
"""
|
5509
|
+
elif False:
|
5510
|
+
SecretsMountMssqlArgsDict: TypeAlias = Mapping[str, Any]
|
5511
|
+
|
4247
5512
|
@pulumi.input_type
|
4248
5513
|
class SecretsMountMssqlArgs:
|
4249
5514
|
def __init__(__self__, *,
|
@@ -4251,7 +5516,7 @@ class SecretsMountMssqlArgs:
|
|
4251
5516
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
4252
5517
|
connection_url: Optional[pulumi.Input[str]] = None,
|
4253
5518
|
contained_db: Optional[pulumi.Input[bool]] = None,
|
4254
|
-
data: Optional[pulumi.Input[Mapping[str,
|
5519
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
4255
5520
|
disable_escaping: Optional[pulumi.Input[bool]] = None,
|
4256
5521
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
4257
5522
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
@@ -4268,7 +5533,7 @@ class SecretsMountMssqlArgs:
|
|
4268
5533
|
connection.
|
4269
5534
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
4270
5535
|
:param pulumi.Input[bool] contained_db: Set to true when the target is a Contained Database, e.g. AzureSQL.
|
4271
|
-
:param pulumi.Input[Mapping[str,
|
5536
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4272
5537
|
|
4273
5538
|
Supported list of database secrets engines that can be configured:
|
4274
5539
|
:param pulumi.Input[bool] disable_escaping: Disable special character escaping in username and password
|
@@ -4364,7 +5629,7 @@ class SecretsMountMssqlArgs:
|
|
4364
5629
|
|
4365
5630
|
@property
|
4366
5631
|
@pulumi.getter
|
4367
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
5632
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
4368
5633
|
"""
|
4369
5634
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4370
5635
|
|
@@ -4373,7 +5638,7 @@ class SecretsMountMssqlArgs:
|
|
4373
5638
|
return pulumi.get(self, "data")
|
4374
5639
|
|
4375
5640
|
@data.setter
|
4376
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
5641
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
4377
5642
|
pulumi.set(self, "data", value)
|
4378
5643
|
|
4379
5644
|
@property
|
@@ -4498,6 +5763,83 @@ class SecretsMountMssqlArgs:
|
|
4498
5763
|
pulumi.set(self, "verify_connection", value)
|
4499
5764
|
|
4500
5765
|
|
5766
|
+
if not MYPY:
|
5767
|
+
class SecretsMountMysqlArgsDict(TypedDict):
|
5768
|
+
name: pulumi.Input[str]
|
5769
|
+
"""
|
5770
|
+
Name of the database connection.
|
5771
|
+
"""
|
5772
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5773
|
+
"""
|
5774
|
+
A list of roles that are allowed to use this
|
5775
|
+
connection.
|
5776
|
+
"""
|
5777
|
+
auth_type: NotRequired[pulumi.Input[str]]
|
5778
|
+
"""
|
5779
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5780
|
+
"""
|
5781
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
5782
|
+
"""
|
5783
|
+
Connection string to use to connect to the database.
|
5784
|
+
"""
|
5785
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
5786
|
+
"""
|
5787
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5788
|
+
|
5789
|
+
Supported list of database secrets engines that can be configured:
|
5790
|
+
"""
|
5791
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
5792
|
+
"""
|
5793
|
+
Maximum number of seconds a connection may be reused.
|
5794
|
+
"""
|
5795
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
5796
|
+
"""
|
5797
|
+
Maximum number of idle connections to the database.
|
5798
|
+
"""
|
5799
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
5800
|
+
"""
|
5801
|
+
Maximum number of open connections to the database.
|
5802
|
+
"""
|
5803
|
+
password: NotRequired[pulumi.Input[str]]
|
5804
|
+
"""
|
5805
|
+
The root credential password used in the connection URL
|
5806
|
+
"""
|
5807
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
5808
|
+
"""
|
5809
|
+
Specifies the name of the plugin to use.
|
5810
|
+
"""
|
5811
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5812
|
+
"""
|
5813
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
5814
|
+
"""
|
5815
|
+
service_account_json: NotRequired[pulumi.Input[str]]
|
5816
|
+
"""
|
5817
|
+
A JSON encoded credential for use with IAM authorization
|
5818
|
+
"""
|
5819
|
+
tls_ca: NotRequired[pulumi.Input[str]]
|
5820
|
+
"""
|
5821
|
+
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
5822
|
+
"""
|
5823
|
+
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
5824
|
+
"""
|
5825
|
+
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
5826
|
+
"""
|
5827
|
+
username: NotRequired[pulumi.Input[str]]
|
5828
|
+
"""
|
5829
|
+
The root credential username used in the connection URL
|
5830
|
+
"""
|
5831
|
+
username_template: NotRequired[pulumi.Input[str]]
|
5832
|
+
"""
|
5833
|
+
Username generation template.
|
5834
|
+
"""
|
5835
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
5836
|
+
"""
|
5837
|
+
Whether the connection should be verified on
|
5838
|
+
initial configuration or not.
|
5839
|
+
"""
|
5840
|
+
elif False:
|
5841
|
+
SecretsMountMysqlArgsDict: TypeAlias = Mapping[str, Any]
|
5842
|
+
|
4501
5843
|
@pulumi.input_type
|
4502
5844
|
class SecretsMountMysqlArgs:
|
4503
5845
|
def __init__(__self__, *,
|
@@ -4505,7 +5847,7 @@ class SecretsMountMysqlArgs:
|
|
4505
5847
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
4506
5848
|
auth_type: Optional[pulumi.Input[str]] = None,
|
4507
5849
|
connection_url: Optional[pulumi.Input[str]] = None,
|
4508
|
-
data: Optional[pulumi.Input[Mapping[str,
|
5850
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
4509
5851
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
4510
5852
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
4511
5853
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
@@ -4524,7 +5866,7 @@ class SecretsMountMysqlArgs:
|
|
4524
5866
|
connection.
|
4525
5867
|
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4526
5868
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
4527
|
-
:param pulumi.Input[Mapping[str,
|
5869
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4528
5870
|
|
4529
5871
|
Supported list of database secrets engines that can be configured:
|
4530
5872
|
:param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -4626,7 +5968,7 @@ class SecretsMountMysqlArgs:
|
|
4626
5968
|
|
4627
5969
|
@property
|
4628
5970
|
@pulumi.getter
|
4629
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
5971
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
4630
5972
|
"""
|
4631
5973
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4632
5974
|
|
@@ -4635,7 +5977,7 @@ class SecretsMountMysqlArgs:
|
|
4635
5977
|
return pulumi.get(self, "data")
|
4636
5978
|
|
4637
5979
|
@data.setter
|
4638
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
5980
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
4639
5981
|
pulumi.set(self, "data", value)
|
4640
5982
|
|
4641
5983
|
@property
|
@@ -4784,6 +6126,83 @@ class SecretsMountMysqlArgs:
|
|
4784
6126
|
pulumi.set(self, "verify_connection", value)
|
4785
6127
|
|
4786
6128
|
|
6129
|
+
if not MYPY:
|
6130
|
+
class SecretsMountMysqlAuroraArgsDict(TypedDict):
|
6131
|
+
name: pulumi.Input[str]
|
6132
|
+
"""
|
6133
|
+
Name of the database connection.
|
6134
|
+
"""
|
6135
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
6136
|
+
"""
|
6137
|
+
A list of roles that are allowed to use this
|
6138
|
+
connection.
|
6139
|
+
"""
|
6140
|
+
auth_type: NotRequired[pulumi.Input[str]]
|
6141
|
+
"""
|
6142
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
6143
|
+
"""
|
6144
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
6145
|
+
"""
|
6146
|
+
Connection string to use to connect to the database.
|
6147
|
+
"""
|
6148
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
6149
|
+
"""
|
6150
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6151
|
+
|
6152
|
+
Supported list of database secrets engines that can be configured:
|
6153
|
+
"""
|
6154
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
6155
|
+
"""
|
6156
|
+
Maximum number of seconds a connection may be reused.
|
6157
|
+
"""
|
6158
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
6159
|
+
"""
|
6160
|
+
Maximum number of idle connections to the database.
|
6161
|
+
"""
|
6162
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
6163
|
+
"""
|
6164
|
+
Maximum number of open connections to the database.
|
6165
|
+
"""
|
6166
|
+
password: NotRequired[pulumi.Input[str]]
|
6167
|
+
"""
|
6168
|
+
The root credential password used in the connection URL
|
6169
|
+
"""
|
6170
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
6171
|
+
"""
|
6172
|
+
Specifies the name of the plugin to use.
|
6173
|
+
"""
|
6174
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
6175
|
+
"""
|
6176
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
6177
|
+
"""
|
6178
|
+
service_account_json: NotRequired[pulumi.Input[str]]
|
6179
|
+
"""
|
6180
|
+
A JSON encoded credential for use with IAM authorization
|
6181
|
+
"""
|
6182
|
+
tls_ca: NotRequired[pulumi.Input[str]]
|
6183
|
+
"""
|
6184
|
+
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
6185
|
+
"""
|
6186
|
+
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
6187
|
+
"""
|
6188
|
+
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
6189
|
+
"""
|
6190
|
+
username: NotRequired[pulumi.Input[str]]
|
6191
|
+
"""
|
6192
|
+
The root credential username used in the connection URL
|
6193
|
+
"""
|
6194
|
+
username_template: NotRequired[pulumi.Input[str]]
|
6195
|
+
"""
|
6196
|
+
Username generation template.
|
6197
|
+
"""
|
6198
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
6199
|
+
"""
|
6200
|
+
Whether the connection should be verified on
|
6201
|
+
initial configuration or not.
|
6202
|
+
"""
|
6203
|
+
elif False:
|
6204
|
+
SecretsMountMysqlAuroraArgsDict: TypeAlias = Mapping[str, Any]
|
6205
|
+
|
4787
6206
|
@pulumi.input_type
|
4788
6207
|
class SecretsMountMysqlAuroraArgs:
|
4789
6208
|
def __init__(__self__, *,
|
@@ -4791,7 +6210,7 @@ class SecretsMountMysqlAuroraArgs:
|
|
4791
6210
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
4792
6211
|
auth_type: Optional[pulumi.Input[str]] = None,
|
4793
6212
|
connection_url: Optional[pulumi.Input[str]] = None,
|
4794
|
-
data: Optional[pulumi.Input[Mapping[str,
|
6213
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
4795
6214
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
4796
6215
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
4797
6216
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
@@ -4810,7 +6229,7 @@ class SecretsMountMysqlAuroraArgs:
|
|
4810
6229
|
connection.
|
4811
6230
|
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4812
6231
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
4813
|
-
:param pulumi.Input[Mapping[str,
|
6232
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4814
6233
|
|
4815
6234
|
Supported list of database secrets engines that can be configured:
|
4816
6235
|
:param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -4912,7 +6331,7 @@ class SecretsMountMysqlAuroraArgs:
|
|
4912
6331
|
|
4913
6332
|
@property
|
4914
6333
|
@pulumi.getter
|
4915
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
6334
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
4916
6335
|
"""
|
4917
6336
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4918
6337
|
|
@@ -4921,7 +6340,7 @@ class SecretsMountMysqlAuroraArgs:
|
|
4921
6340
|
return pulumi.get(self, "data")
|
4922
6341
|
|
4923
6342
|
@data.setter
|
4924
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
6343
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
4925
6344
|
pulumi.set(self, "data", value)
|
4926
6345
|
|
4927
6346
|
@property
|
@@ -5070,6 +6489,83 @@ class SecretsMountMysqlAuroraArgs:
|
|
5070
6489
|
pulumi.set(self, "verify_connection", value)
|
5071
6490
|
|
5072
6491
|
|
6492
|
+
if not MYPY:
|
6493
|
+
class SecretsMountMysqlLegacyArgsDict(TypedDict):
|
6494
|
+
name: pulumi.Input[str]
|
6495
|
+
"""
|
6496
|
+
Name of the database connection.
|
6497
|
+
"""
|
6498
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
6499
|
+
"""
|
6500
|
+
A list of roles that are allowed to use this
|
6501
|
+
connection.
|
6502
|
+
"""
|
6503
|
+
auth_type: NotRequired[pulumi.Input[str]]
|
6504
|
+
"""
|
6505
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
6506
|
+
"""
|
6507
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
6508
|
+
"""
|
6509
|
+
Connection string to use to connect to the database.
|
6510
|
+
"""
|
6511
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
6512
|
+
"""
|
6513
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6514
|
+
|
6515
|
+
Supported list of database secrets engines that can be configured:
|
6516
|
+
"""
|
6517
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
6518
|
+
"""
|
6519
|
+
Maximum number of seconds a connection may be reused.
|
6520
|
+
"""
|
6521
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
6522
|
+
"""
|
6523
|
+
Maximum number of idle connections to the database.
|
6524
|
+
"""
|
6525
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
6526
|
+
"""
|
6527
|
+
Maximum number of open connections to the database.
|
6528
|
+
"""
|
6529
|
+
password: NotRequired[pulumi.Input[str]]
|
6530
|
+
"""
|
6531
|
+
The root credential password used in the connection URL
|
6532
|
+
"""
|
6533
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
6534
|
+
"""
|
6535
|
+
Specifies the name of the plugin to use.
|
6536
|
+
"""
|
6537
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
6538
|
+
"""
|
6539
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
6540
|
+
"""
|
6541
|
+
service_account_json: NotRequired[pulumi.Input[str]]
|
6542
|
+
"""
|
6543
|
+
A JSON encoded credential for use with IAM authorization
|
6544
|
+
"""
|
6545
|
+
tls_ca: NotRequired[pulumi.Input[str]]
|
6546
|
+
"""
|
6547
|
+
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
6548
|
+
"""
|
6549
|
+
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
6550
|
+
"""
|
6551
|
+
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
6552
|
+
"""
|
6553
|
+
username: NotRequired[pulumi.Input[str]]
|
6554
|
+
"""
|
6555
|
+
The root credential username used in the connection URL
|
6556
|
+
"""
|
6557
|
+
username_template: NotRequired[pulumi.Input[str]]
|
6558
|
+
"""
|
6559
|
+
Username generation template.
|
6560
|
+
"""
|
6561
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
6562
|
+
"""
|
6563
|
+
Whether the connection should be verified on
|
6564
|
+
initial configuration or not.
|
6565
|
+
"""
|
6566
|
+
elif False:
|
6567
|
+
SecretsMountMysqlLegacyArgsDict: TypeAlias = Mapping[str, Any]
|
6568
|
+
|
5073
6569
|
@pulumi.input_type
|
5074
6570
|
class SecretsMountMysqlLegacyArgs:
|
5075
6571
|
def __init__(__self__, *,
|
@@ -5077,7 +6573,7 @@ class SecretsMountMysqlLegacyArgs:
|
|
5077
6573
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
5078
6574
|
auth_type: Optional[pulumi.Input[str]] = None,
|
5079
6575
|
connection_url: Optional[pulumi.Input[str]] = None,
|
5080
|
-
data: Optional[pulumi.Input[Mapping[str,
|
6576
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
5081
6577
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
5082
6578
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
5083
6579
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
@@ -5096,7 +6592,7 @@ class SecretsMountMysqlLegacyArgs:
|
|
5096
6592
|
connection.
|
5097
6593
|
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5098
6594
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
5099
|
-
:param pulumi.Input[Mapping[str,
|
6595
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5100
6596
|
|
5101
6597
|
Supported list of database secrets engines that can be configured:
|
5102
6598
|
:param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -5198,7 +6694,7 @@ class SecretsMountMysqlLegacyArgs:
|
|
5198
6694
|
|
5199
6695
|
@property
|
5200
6696
|
@pulumi.getter
|
5201
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
6697
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
5202
6698
|
"""
|
5203
6699
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5204
6700
|
|
@@ -5207,7 +6703,7 @@ class SecretsMountMysqlLegacyArgs:
|
|
5207
6703
|
return pulumi.get(self, "data")
|
5208
6704
|
|
5209
6705
|
@data.setter
|
5210
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
6706
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
5211
6707
|
pulumi.set(self, "data", value)
|
5212
6708
|
|
5213
6709
|
@property
|
@@ -5356,6 +6852,83 @@ class SecretsMountMysqlLegacyArgs:
|
|
5356
6852
|
pulumi.set(self, "verify_connection", value)
|
5357
6853
|
|
5358
6854
|
|
6855
|
+
if not MYPY:
|
6856
|
+
class SecretsMountMysqlRdArgsDict(TypedDict):
|
6857
|
+
name: pulumi.Input[str]
|
6858
|
+
"""
|
6859
|
+
Name of the database connection.
|
6860
|
+
"""
|
6861
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
6862
|
+
"""
|
6863
|
+
A list of roles that are allowed to use this
|
6864
|
+
connection.
|
6865
|
+
"""
|
6866
|
+
auth_type: NotRequired[pulumi.Input[str]]
|
6867
|
+
"""
|
6868
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
6869
|
+
"""
|
6870
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
6871
|
+
"""
|
6872
|
+
Connection string to use to connect to the database.
|
6873
|
+
"""
|
6874
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
6875
|
+
"""
|
6876
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6877
|
+
|
6878
|
+
Supported list of database secrets engines that can be configured:
|
6879
|
+
"""
|
6880
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
6881
|
+
"""
|
6882
|
+
Maximum number of seconds a connection may be reused.
|
6883
|
+
"""
|
6884
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
6885
|
+
"""
|
6886
|
+
Maximum number of idle connections to the database.
|
6887
|
+
"""
|
6888
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
6889
|
+
"""
|
6890
|
+
Maximum number of open connections to the database.
|
6891
|
+
"""
|
6892
|
+
password: NotRequired[pulumi.Input[str]]
|
6893
|
+
"""
|
6894
|
+
The root credential password used in the connection URL
|
6895
|
+
"""
|
6896
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
6897
|
+
"""
|
6898
|
+
Specifies the name of the plugin to use.
|
6899
|
+
"""
|
6900
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
6901
|
+
"""
|
6902
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
6903
|
+
"""
|
6904
|
+
service_account_json: NotRequired[pulumi.Input[str]]
|
6905
|
+
"""
|
6906
|
+
A JSON encoded credential for use with IAM authorization
|
6907
|
+
"""
|
6908
|
+
tls_ca: NotRequired[pulumi.Input[str]]
|
6909
|
+
"""
|
6910
|
+
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
6911
|
+
"""
|
6912
|
+
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
6913
|
+
"""
|
6914
|
+
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
6915
|
+
"""
|
6916
|
+
username: NotRequired[pulumi.Input[str]]
|
6917
|
+
"""
|
6918
|
+
The root credential username used in the connection URL
|
6919
|
+
"""
|
6920
|
+
username_template: NotRequired[pulumi.Input[str]]
|
6921
|
+
"""
|
6922
|
+
Username generation template.
|
6923
|
+
"""
|
6924
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
6925
|
+
"""
|
6926
|
+
Whether the connection should be verified on
|
6927
|
+
initial configuration or not.
|
6928
|
+
"""
|
6929
|
+
elif False:
|
6930
|
+
SecretsMountMysqlRdArgsDict: TypeAlias = Mapping[str, Any]
|
6931
|
+
|
5359
6932
|
@pulumi.input_type
|
5360
6933
|
class SecretsMountMysqlRdArgs:
|
5361
6934
|
def __init__(__self__, *,
|
@@ -5363,7 +6936,7 @@ class SecretsMountMysqlRdArgs:
|
|
5363
6936
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
5364
6937
|
auth_type: Optional[pulumi.Input[str]] = None,
|
5365
6938
|
connection_url: Optional[pulumi.Input[str]] = None,
|
5366
|
-
data: Optional[pulumi.Input[Mapping[str,
|
6939
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
5367
6940
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
5368
6941
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
5369
6942
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
@@ -5382,7 +6955,7 @@ class SecretsMountMysqlRdArgs:
|
|
5382
6955
|
connection.
|
5383
6956
|
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5384
6957
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
5385
|
-
:param pulumi.Input[Mapping[str,
|
6958
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5386
6959
|
|
5387
6960
|
Supported list of database secrets engines that can be configured:
|
5388
6961
|
:param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -5484,7 +7057,7 @@ class SecretsMountMysqlRdArgs:
|
|
5484
7057
|
|
5485
7058
|
@property
|
5486
7059
|
@pulumi.getter
|
5487
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
7060
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
5488
7061
|
"""
|
5489
7062
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5490
7063
|
|
@@ -5493,7 +7066,7 @@ class SecretsMountMysqlRdArgs:
|
|
5493
7066
|
return pulumi.get(self, "data")
|
5494
7067
|
|
5495
7068
|
@data.setter
|
5496
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
7069
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
5497
7070
|
pulumi.set(self, "data", value)
|
5498
7071
|
|
5499
7072
|
@property
|
@@ -5598,49 +7171,118 @@ class SecretsMountMysqlRdArgs:
|
|
5598
7171
|
"""
|
5599
7172
|
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
5600
7173
|
"""
|
5601
|
-
return pulumi.get(self, "tls_certificate_key")
|
5602
|
-
|
5603
|
-
@tls_certificate_key.setter
|
5604
|
-
def tls_certificate_key(self, value: Optional[pulumi.Input[str]]):
|
5605
|
-
pulumi.set(self, "tls_certificate_key", value)
|
5606
|
-
|
5607
|
-
@property
|
5608
|
-
@pulumi.getter
|
5609
|
-
def username(self) -> Optional[pulumi.Input[str]]:
|
7174
|
+
return pulumi.get(self, "tls_certificate_key")
|
7175
|
+
|
7176
|
+
@tls_certificate_key.setter
|
7177
|
+
def tls_certificate_key(self, value: Optional[pulumi.Input[str]]):
|
7178
|
+
pulumi.set(self, "tls_certificate_key", value)
|
7179
|
+
|
7180
|
+
@property
|
7181
|
+
@pulumi.getter
|
7182
|
+
def username(self) -> Optional[pulumi.Input[str]]:
|
7183
|
+
"""
|
7184
|
+
The root credential username used in the connection URL
|
7185
|
+
"""
|
7186
|
+
return pulumi.get(self, "username")
|
7187
|
+
|
7188
|
+
@username.setter
|
7189
|
+
def username(self, value: Optional[pulumi.Input[str]]):
|
7190
|
+
pulumi.set(self, "username", value)
|
7191
|
+
|
7192
|
+
@property
|
7193
|
+
@pulumi.getter(name="usernameTemplate")
|
7194
|
+
def username_template(self) -> Optional[pulumi.Input[str]]:
|
7195
|
+
"""
|
7196
|
+
Username generation template.
|
7197
|
+
"""
|
7198
|
+
return pulumi.get(self, "username_template")
|
7199
|
+
|
7200
|
+
@username_template.setter
|
7201
|
+
def username_template(self, value: Optional[pulumi.Input[str]]):
|
7202
|
+
pulumi.set(self, "username_template", value)
|
7203
|
+
|
7204
|
+
@property
|
7205
|
+
@pulumi.getter(name="verifyConnection")
|
7206
|
+
def verify_connection(self) -> Optional[pulumi.Input[bool]]:
|
7207
|
+
"""
|
7208
|
+
Whether the connection should be verified on
|
7209
|
+
initial configuration or not.
|
7210
|
+
"""
|
7211
|
+
return pulumi.get(self, "verify_connection")
|
7212
|
+
|
7213
|
+
@verify_connection.setter
|
7214
|
+
def verify_connection(self, value: Optional[pulumi.Input[bool]]):
|
7215
|
+
pulumi.set(self, "verify_connection", value)
|
7216
|
+
|
7217
|
+
|
7218
|
+
if not MYPY:
|
7219
|
+
class SecretsMountOracleArgsDict(TypedDict):
|
7220
|
+
name: pulumi.Input[str]
|
7221
|
+
"""
|
7222
|
+
Name of the database connection.
|
7223
|
+
"""
|
7224
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
7225
|
+
"""
|
7226
|
+
A list of roles that are allowed to use this
|
7227
|
+
connection.
|
7228
|
+
"""
|
7229
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
7230
|
+
"""
|
7231
|
+
Connection string to use to connect to the database.
|
7232
|
+
"""
|
7233
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
7234
|
+
"""
|
7235
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7236
|
+
|
7237
|
+
Supported list of database secrets engines that can be configured:
|
7238
|
+
"""
|
7239
|
+
disconnect_sessions: NotRequired[pulumi.Input[bool]]
|
7240
|
+
"""
|
7241
|
+
Set to true to disconnect any open sessions prior to running the revocation statements.
|
7242
|
+
"""
|
7243
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
7244
|
+
"""
|
7245
|
+
Maximum number of seconds a connection may be reused.
|
7246
|
+
"""
|
7247
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
7248
|
+
"""
|
7249
|
+
Maximum number of idle connections to the database.
|
7250
|
+
"""
|
7251
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
7252
|
+
"""
|
7253
|
+
Maximum number of open connections to the database.
|
7254
|
+
"""
|
7255
|
+
password: NotRequired[pulumi.Input[str]]
|
7256
|
+
"""
|
7257
|
+
The root credential password used in the connection URL
|
7258
|
+
"""
|
7259
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
7260
|
+
"""
|
7261
|
+
Specifies the name of the plugin to use.
|
7262
|
+
"""
|
7263
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
7264
|
+
"""
|
7265
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
7266
|
+
"""
|
7267
|
+
split_statements: NotRequired[pulumi.Input[bool]]
|
7268
|
+
"""
|
7269
|
+
Set to true in order to split statements after semi-colons.
|
7270
|
+
"""
|
7271
|
+
username: NotRequired[pulumi.Input[str]]
|
5610
7272
|
"""
|
5611
7273
|
The root credential username used in the connection URL
|
5612
7274
|
"""
|
5613
|
-
|
5614
|
-
|
5615
|
-
@username.setter
|
5616
|
-
def username(self, value: Optional[pulumi.Input[str]]):
|
5617
|
-
pulumi.set(self, "username", value)
|
5618
|
-
|
5619
|
-
@property
|
5620
|
-
@pulumi.getter(name="usernameTemplate")
|
5621
|
-
def username_template(self) -> Optional[pulumi.Input[str]]:
|
7275
|
+
username_template: NotRequired[pulumi.Input[str]]
|
5622
7276
|
"""
|
5623
7277
|
Username generation template.
|
5624
7278
|
"""
|
5625
|
-
|
5626
|
-
|
5627
|
-
@username_template.setter
|
5628
|
-
def username_template(self, value: Optional[pulumi.Input[str]]):
|
5629
|
-
pulumi.set(self, "username_template", value)
|
5630
|
-
|
5631
|
-
@property
|
5632
|
-
@pulumi.getter(name="verifyConnection")
|
5633
|
-
def verify_connection(self) -> Optional[pulumi.Input[bool]]:
|
7279
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
5634
7280
|
"""
|
5635
7281
|
Whether the connection should be verified on
|
5636
7282
|
initial configuration or not.
|
5637
7283
|
"""
|
5638
|
-
|
5639
|
-
|
5640
|
-
@verify_connection.setter
|
5641
|
-
def verify_connection(self, value: Optional[pulumi.Input[bool]]):
|
5642
|
-
pulumi.set(self, "verify_connection", value)
|
5643
|
-
|
7284
|
+
elif False:
|
7285
|
+
SecretsMountOracleArgsDict: TypeAlias = Mapping[str, Any]
|
5644
7286
|
|
5645
7287
|
@pulumi.input_type
|
5646
7288
|
class SecretsMountOracleArgs:
|
@@ -5648,7 +7290,7 @@ class SecretsMountOracleArgs:
|
|
5648
7290
|
name: pulumi.Input[str],
|
5649
7291
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
5650
7292
|
connection_url: Optional[pulumi.Input[str]] = None,
|
5651
|
-
data: Optional[pulumi.Input[Mapping[str,
|
7293
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
5652
7294
|
disconnect_sessions: Optional[pulumi.Input[bool]] = None,
|
5653
7295
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
5654
7296
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
@@ -5665,7 +7307,7 @@ class SecretsMountOracleArgs:
|
|
5665
7307
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
5666
7308
|
connection.
|
5667
7309
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
5668
|
-
:param pulumi.Input[Mapping[str,
|
7310
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5669
7311
|
|
5670
7312
|
Supported list of database secrets engines that can be configured:
|
5671
7313
|
:param pulumi.Input[bool] disconnect_sessions: Set to true to disconnect any open sessions prior to running the revocation statements.
|
@@ -5750,7 +7392,7 @@ class SecretsMountOracleArgs:
|
|
5750
7392
|
|
5751
7393
|
@property
|
5752
7394
|
@pulumi.getter
|
5753
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
7395
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
5754
7396
|
"""
|
5755
7397
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5756
7398
|
|
@@ -5759,7 +7401,7 @@ class SecretsMountOracleArgs:
|
|
5759
7401
|
return pulumi.get(self, "data")
|
5760
7402
|
|
5761
7403
|
@data.setter
|
5762
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
7404
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
5763
7405
|
pulumi.set(self, "data", value)
|
5764
7406
|
|
5765
7407
|
@property
|
@@ -5896,6 +7538,79 @@ class SecretsMountOracleArgs:
|
|
5896
7538
|
pulumi.set(self, "verify_connection", value)
|
5897
7539
|
|
5898
7540
|
|
7541
|
+
if not MYPY:
|
7542
|
+
class SecretsMountPostgresqlArgsDict(TypedDict):
|
7543
|
+
name: pulumi.Input[str]
|
7544
|
+
"""
|
7545
|
+
Name of the database connection.
|
7546
|
+
"""
|
7547
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
7548
|
+
"""
|
7549
|
+
A list of roles that are allowed to use this
|
7550
|
+
connection.
|
7551
|
+
"""
|
7552
|
+
auth_type: NotRequired[pulumi.Input[str]]
|
7553
|
+
"""
|
7554
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
7555
|
+
"""
|
7556
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
7557
|
+
"""
|
7558
|
+
Connection string to use to connect to the database.
|
7559
|
+
"""
|
7560
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
7561
|
+
"""
|
7562
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7563
|
+
|
7564
|
+
Supported list of database secrets engines that can be configured:
|
7565
|
+
"""
|
7566
|
+
disable_escaping: NotRequired[pulumi.Input[bool]]
|
7567
|
+
"""
|
7568
|
+
Disable special character escaping in username and password
|
7569
|
+
"""
|
7570
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
7571
|
+
"""
|
7572
|
+
Maximum number of seconds a connection may be reused.
|
7573
|
+
"""
|
7574
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
7575
|
+
"""
|
7576
|
+
Maximum number of idle connections to the database.
|
7577
|
+
"""
|
7578
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
7579
|
+
"""
|
7580
|
+
Maximum number of open connections to the database.
|
7581
|
+
"""
|
7582
|
+
password: NotRequired[pulumi.Input[str]]
|
7583
|
+
"""
|
7584
|
+
The root credential password used in the connection URL
|
7585
|
+
"""
|
7586
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
7587
|
+
"""
|
7588
|
+
Specifies the name of the plugin to use.
|
7589
|
+
"""
|
7590
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
7591
|
+
"""
|
7592
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
7593
|
+
"""
|
7594
|
+
service_account_json: NotRequired[pulumi.Input[str]]
|
7595
|
+
"""
|
7596
|
+
A JSON encoded credential for use with IAM authorization
|
7597
|
+
"""
|
7598
|
+
username: NotRequired[pulumi.Input[str]]
|
7599
|
+
"""
|
7600
|
+
The root credential username used in the connection URL
|
7601
|
+
"""
|
7602
|
+
username_template: NotRequired[pulumi.Input[str]]
|
7603
|
+
"""
|
7604
|
+
Username generation template.
|
7605
|
+
"""
|
7606
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
7607
|
+
"""
|
7608
|
+
Whether the connection should be verified on
|
7609
|
+
initial configuration or not.
|
7610
|
+
"""
|
7611
|
+
elif False:
|
7612
|
+
SecretsMountPostgresqlArgsDict: TypeAlias = Mapping[str, Any]
|
7613
|
+
|
5899
7614
|
@pulumi.input_type
|
5900
7615
|
class SecretsMountPostgresqlArgs:
|
5901
7616
|
def __init__(__self__, *,
|
@@ -5903,7 +7618,7 @@ class SecretsMountPostgresqlArgs:
|
|
5903
7618
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
5904
7619
|
auth_type: Optional[pulumi.Input[str]] = None,
|
5905
7620
|
connection_url: Optional[pulumi.Input[str]] = None,
|
5906
|
-
data: Optional[pulumi.Input[Mapping[str,
|
7621
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
5907
7622
|
disable_escaping: Optional[pulumi.Input[bool]] = None,
|
5908
7623
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
5909
7624
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
@@ -5921,7 +7636,7 @@ class SecretsMountPostgresqlArgs:
|
|
5921
7636
|
connection.
|
5922
7637
|
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5923
7638
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
5924
|
-
:param pulumi.Input[Mapping[str,
|
7639
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5925
7640
|
|
5926
7641
|
Supported list of database secrets engines that can be configured:
|
5927
7642
|
:param pulumi.Input[bool] disable_escaping: Disable special character escaping in username and password
|
@@ -6020,7 +7735,7 @@ class SecretsMountPostgresqlArgs:
|
|
6020
7735
|
|
6021
7736
|
@property
|
6022
7737
|
@pulumi.getter
|
6023
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
7738
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
6024
7739
|
"""
|
6025
7740
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6026
7741
|
|
@@ -6029,7 +7744,7 @@ class SecretsMountPostgresqlArgs:
|
|
6029
7744
|
return pulumi.get(self, "data")
|
6030
7745
|
|
6031
7746
|
@data.setter
|
6032
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
7747
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
6033
7748
|
pulumi.set(self, "data", value)
|
6034
7749
|
|
6035
7750
|
@property
|
@@ -6166,6 +7881,67 @@ class SecretsMountPostgresqlArgs:
|
|
6166
7881
|
pulumi.set(self, "verify_connection", value)
|
6167
7882
|
|
6168
7883
|
|
7884
|
+
if not MYPY:
|
7885
|
+
class SecretsMountRediArgsDict(TypedDict):
|
7886
|
+
host: pulumi.Input[str]
|
7887
|
+
"""
|
7888
|
+
Specifies the host to connect to
|
7889
|
+
"""
|
7890
|
+
name: pulumi.Input[str]
|
7891
|
+
"""
|
7892
|
+
Name of the database connection.
|
7893
|
+
"""
|
7894
|
+
password: pulumi.Input[str]
|
7895
|
+
"""
|
7896
|
+
Specifies the password corresponding to the given username.
|
7897
|
+
"""
|
7898
|
+
username: pulumi.Input[str]
|
7899
|
+
"""
|
7900
|
+
Specifies the username for Vault to use.
|
7901
|
+
"""
|
7902
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
7903
|
+
"""
|
7904
|
+
A list of roles that are allowed to use this
|
7905
|
+
connection.
|
7906
|
+
"""
|
7907
|
+
ca_cert: NotRequired[pulumi.Input[str]]
|
7908
|
+
"""
|
7909
|
+
The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
|
7910
|
+
"""
|
7911
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
7912
|
+
"""
|
7913
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7914
|
+
|
7915
|
+
Supported list of database secrets engines that can be configured:
|
7916
|
+
"""
|
7917
|
+
insecure_tls: NotRequired[pulumi.Input[bool]]
|
7918
|
+
"""
|
7919
|
+
Specifies whether to skip verification of the server certificate when using TLS.
|
7920
|
+
"""
|
7921
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
7922
|
+
"""
|
7923
|
+
Specifies the name of the plugin to use.
|
7924
|
+
"""
|
7925
|
+
port: NotRequired[pulumi.Input[int]]
|
7926
|
+
"""
|
7927
|
+
The transport port to use to connect to Redis.
|
7928
|
+
"""
|
7929
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
7930
|
+
"""
|
7931
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
7932
|
+
"""
|
7933
|
+
tls: NotRequired[pulumi.Input[bool]]
|
7934
|
+
"""
|
7935
|
+
Specifies whether to use TLS when connecting to Redis.
|
7936
|
+
"""
|
7937
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
7938
|
+
"""
|
7939
|
+
Whether the connection should be verified on
|
7940
|
+
initial configuration or not.
|
7941
|
+
"""
|
7942
|
+
elif False:
|
7943
|
+
SecretsMountRediArgsDict: TypeAlias = Mapping[str, Any]
|
7944
|
+
|
6169
7945
|
@pulumi.input_type
|
6170
7946
|
class SecretsMountRediArgs:
|
6171
7947
|
def __init__(__self__, *,
|
@@ -6175,7 +7951,7 @@ class SecretsMountRediArgs:
|
|
6175
7951
|
username: pulumi.Input[str],
|
6176
7952
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
6177
7953
|
ca_cert: Optional[pulumi.Input[str]] = None,
|
6178
|
-
data: Optional[pulumi.Input[Mapping[str,
|
7954
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
6179
7955
|
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
6180
7956
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
6181
7957
|
port: Optional[pulumi.Input[int]] = None,
|
@@ -6190,7 +7966,7 @@ class SecretsMountRediArgs:
|
|
6190
7966
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
6191
7967
|
connection.
|
6192
7968
|
:param pulumi.Input[str] ca_cert: The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
|
6193
|
-
:param pulumi.Input[Mapping[str,
|
7969
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6194
7970
|
|
6195
7971
|
Supported list of database secrets engines that can be configured:
|
6196
7972
|
:param pulumi.Input[bool] insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
|
@@ -6299,7 +8075,7 @@ class SecretsMountRediArgs:
|
|
6299
8075
|
|
6300
8076
|
@property
|
6301
8077
|
@pulumi.getter
|
6302
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
8078
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
6303
8079
|
"""
|
6304
8080
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6305
8081
|
|
@@ -6308,7 +8084,7 @@ class SecretsMountRediArgs:
|
|
6308
8084
|
return pulumi.get(self, "data")
|
6309
8085
|
|
6310
8086
|
@data.setter
|
6311
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
8087
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
6312
8088
|
pulumi.set(self, "data", value)
|
6313
8089
|
|
6314
8090
|
@property
|
@@ -6385,13 +8161,62 @@ class SecretsMountRediArgs:
|
|
6385
8161
|
pulumi.set(self, "verify_connection", value)
|
6386
8162
|
|
6387
8163
|
|
8164
|
+
if not MYPY:
|
8165
|
+
class SecretsMountRedisElasticachArgsDict(TypedDict):
|
8166
|
+
name: pulumi.Input[str]
|
8167
|
+
"""
|
8168
|
+
Name of the database connection.
|
8169
|
+
"""
|
8170
|
+
url: pulumi.Input[str]
|
8171
|
+
"""
|
8172
|
+
The configuration endpoint for the ElastiCache cluster to connect to.
|
8173
|
+
"""
|
8174
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
8175
|
+
"""
|
8176
|
+
A list of roles that are allowed to use this
|
8177
|
+
connection.
|
8178
|
+
"""
|
8179
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
8180
|
+
"""
|
8181
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8182
|
+
|
8183
|
+
Supported list of database secrets engines that can be configured:
|
8184
|
+
"""
|
8185
|
+
password: NotRequired[pulumi.Input[str]]
|
8186
|
+
"""
|
8187
|
+
The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
8188
|
+
"""
|
8189
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
8190
|
+
"""
|
8191
|
+
Specifies the name of the plugin to use.
|
8192
|
+
"""
|
8193
|
+
region: NotRequired[pulumi.Input[str]]
|
8194
|
+
"""
|
8195
|
+
The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
|
8196
|
+
"""
|
8197
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
8198
|
+
"""
|
8199
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
8200
|
+
"""
|
8201
|
+
username: NotRequired[pulumi.Input[str]]
|
8202
|
+
"""
|
8203
|
+
The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
8204
|
+
"""
|
8205
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
8206
|
+
"""
|
8207
|
+
Whether the connection should be verified on
|
8208
|
+
initial configuration or not.
|
8209
|
+
"""
|
8210
|
+
elif False:
|
8211
|
+
SecretsMountRedisElasticachArgsDict: TypeAlias = Mapping[str, Any]
|
8212
|
+
|
6388
8213
|
@pulumi.input_type
|
6389
8214
|
class SecretsMountRedisElasticachArgs:
|
6390
8215
|
def __init__(__self__, *,
|
6391
8216
|
name: pulumi.Input[str],
|
6392
8217
|
url: pulumi.Input[str],
|
6393
8218
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
6394
|
-
data: Optional[pulumi.Input[Mapping[str,
|
8219
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
6395
8220
|
password: Optional[pulumi.Input[str]] = None,
|
6396
8221
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
6397
8222
|
region: Optional[pulumi.Input[str]] = None,
|
@@ -6403,7 +8228,7 @@ class SecretsMountRedisElasticachArgs:
|
|
6403
8228
|
:param pulumi.Input[str] url: The configuration endpoint for the ElastiCache cluster to connect to.
|
6404
8229
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
6405
8230
|
connection.
|
6406
|
-
:param pulumi.Input[Mapping[str,
|
8231
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6407
8232
|
|
6408
8233
|
Supported list of database secrets engines that can be configured:
|
6409
8234
|
:param pulumi.Input[str] password: The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
@@ -6472,7 +8297,7 @@ class SecretsMountRedisElasticachArgs:
|
|
6472
8297
|
|
6473
8298
|
@property
|
6474
8299
|
@pulumi.getter
|
6475
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
8300
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
6476
8301
|
"""
|
6477
8302
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6478
8303
|
|
@@ -6481,7 +8306,7 @@ class SecretsMountRedisElasticachArgs:
|
|
6481
8306
|
return pulumi.get(self, "data")
|
6482
8307
|
|
6483
8308
|
@data.setter
|
6484
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
8309
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
6485
8310
|
pulumi.set(self, "data", value)
|
6486
8311
|
|
6487
8312
|
@property
|
@@ -6558,13 +8383,78 @@ class SecretsMountRedisElasticachArgs:
|
|
6558
8383
|
pulumi.set(self, "verify_connection", value)
|
6559
8384
|
|
6560
8385
|
|
8386
|
+
if not MYPY:
|
8387
|
+
class SecretsMountRedshiftArgsDict(TypedDict):
|
8388
|
+
name: pulumi.Input[str]
|
8389
|
+
"""
|
8390
|
+
Name of the database connection.
|
8391
|
+
"""
|
8392
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
8393
|
+
"""
|
8394
|
+
A list of roles that are allowed to use this
|
8395
|
+
connection.
|
8396
|
+
"""
|
8397
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
8398
|
+
"""
|
8399
|
+
Connection string to use to connect to the database.
|
8400
|
+
"""
|
8401
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
8402
|
+
"""
|
8403
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8404
|
+
|
8405
|
+
Supported list of database secrets engines that can be configured:
|
8406
|
+
"""
|
8407
|
+
disable_escaping: NotRequired[pulumi.Input[bool]]
|
8408
|
+
"""
|
8409
|
+
Disable special character escaping in username and password
|
8410
|
+
"""
|
8411
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
8412
|
+
"""
|
8413
|
+
Maximum number of seconds a connection may be reused.
|
8414
|
+
"""
|
8415
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
8416
|
+
"""
|
8417
|
+
Maximum number of idle connections to the database.
|
8418
|
+
"""
|
8419
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
8420
|
+
"""
|
8421
|
+
Maximum number of open connections to the database.
|
8422
|
+
"""
|
8423
|
+
password: NotRequired[pulumi.Input[str]]
|
8424
|
+
"""
|
8425
|
+
The root credential password used in the connection URL
|
8426
|
+
"""
|
8427
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
8428
|
+
"""
|
8429
|
+
Specifies the name of the plugin to use.
|
8430
|
+
"""
|
8431
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
8432
|
+
"""
|
8433
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
8434
|
+
"""
|
8435
|
+
username: NotRequired[pulumi.Input[str]]
|
8436
|
+
"""
|
8437
|
+
The root credential username used in the connection URL
|
8438
|
+
"""
|
8439
|
+
username_template: NotRequired[pulumi.Input[str]]
|
8440
|
+
"""
|
8441
|
+
Username generation template.
|
8442
|
+
"""
|
8443
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
8444
|
+
"""
|
8445
|
+
Whether the connection should be verified on
|
8446
|
+
initial configuration or not.
|
8447
|
+
"""
|
8448
|
+
elif False:
|
8449
|
+
SecretsMountRedshiftArgsDict: TypeAlias = Mapping[str, Any]
|
8450
|
+
|
6561
8451
|
@pulumi.input_type
|
6562
8452
|
class SecretsMountRedshiftArgs:
|
6563
8453
|
def __init__(__self__, *,
|
6564
8454
|
name: pulumi.Input[str],
|
6565
8455
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
6566
8456
|
connection_url: Optional[pulumi.Input[str]] = None,
|
6567
|
-
data: Optional[pulumi.Input[Mapping[str,
|
8457
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
6568
8458
|
disable_escaping: Optional[pulumi.Input[bool]] = None,
|
6569
8459
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
6570
8460
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
@@ -6580,7 +8470,7 @@ class SecretsMountRedshiftArgs:
|
|
6580
8470
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
6581
8471
|
connection.
|
6582
8472
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
6583
|
-
:param pulumi.Input[Mapping[str,
|
8473
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6584
8474
|
|
6585
8475
|
Supported list of database secrets engines that can be configured:
|
6586
8476
|
:param pulumi.Input[bool] disable_escaping: Disable special character escaping in username and password
|
@@ -6662,7 +8552,7 @@ class SecretsMountRedshiftArgs:
|
|
6662
8552
|
|
6663
8553
|
@property
|
6664
8554
|
@pulumi.getter
|
6665
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
8555
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
6666
8556
|
"""
|
6667
8557
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6668
8558
|
|
@@ -6671,7 +8561,7 @@ class SecretsMountRedshiftArgs:
|
|
6671
8561
|
return pulumi.get(self, "data")
|
6672
8562
|
|
6673
8563
|
@data.setter
|
6674
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
8564
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
6675
8565
|
pulumi.set(self, "data", value)
|
6676
8566
|
|
6677
8567
|
@property
|
@@ -6796,13 +8686,74 @@ class SecretsMountRedshiftArgs:
|
|
6796
8686
|
pulumi.set(self, "verify_connection", value)
|
6797
8687
|
|
6798
8688
|
|
8689
|
+
if not MYPY:
|
8690
|
+
class SecretsMountSnowflakeArgsDict(TypedDict):
|
8691
|
+
name: pulumi.Input[str]
|
8692
|
+
"""
|
8693
|
+
Name of the database connection.
|
8694
|
+
"""
|
8695
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
8696
|
+
"""
|
8697
|
+
A list of roles that are allowed to use this
|
8698
|
+
connection.
|
8699
|
+
"""
|
8700
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
8701
|
+
"""
|
8702
|
+
Connection string to use to connect to the database.
|
8703
|
+
"""
|
8704
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
8705
|
+
"""
|
8706
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8707
|
+
|
8708
|
+
Supported list of database secrets engines that can be configured:
|
8709
|
+
"""
|
8710
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
8711
|
+
"""
|
8712
|
+
Maximum number of seconds a connection may be reused.
|
8713
|
+
"""
|
8714
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
8715
|
+
"""
|
8716
|
+
Maximum number of idle connections to the database.
|
8717
|
+
"""
|
8718
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
8719
|
+
"""
|
8720
|
+
Maximum number of open connections to the database.
|
8721
|
+
"""
|
8722
|
+
password: NotRequired[pulumi.Input[str]]
|
8723
|
+
"""
|
8724
|
+
The root credential password used in the connection URL
|
8725
|
+
"""
|
8726
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
8727
|
+
"""
|
8728
|
+
Specifies the name of the plugin to use.
|
8729
|
+
"""
|
8730
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
8731
|
+
"""
|
8732
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
8733
|
+
"""
|
8734
|
+
username: NotRequired[pulumi.Input[str]]
|
8735
|
+
"""
|
8736
|
+
The root credential username used in the connection URL
|
8737
|
+
"""
|
8738
|
+
username_template: NotRequired[pulumi.Input[str]]
|
8739
|
+
"""
|
8740
|
+
Username generation template.
|
8741
|
+
"""
|
8742
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
8743
|
+
"""
|
8744
|
+
Whether the connection should be verified on
|
8745
|
+
initial configuration or not.
|
8746
|
+
"""
|
8747
|
+
elif False:
|
8748
|
+
SecretsMountSnowflakeArgsDict: TypeAlias = Mapping[str, Any]
|
8749
|
+
|
6799
8750
|
@pulumi.input_type
|
6800
8751
|
class SecretsMountSnowflakeArgs:
|
6801
8752
|
def __init__(__self__, *,
|
6802
8753
|
name: pulumi.Input[str],
|
6803
8754
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
6804
8755
|
connection_url: Optional[pulumi.Input[str]] = None,
|
6805
|
-
data: Optional[pulumi.Input[Mapping[str,
|
8756
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
6806
8757
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
6807
8758
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
6808
8759
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
@@ -6817,7 +8768,7 @@ class SecretsMountSnowflakeArgs:
|
|
6817
8768
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
6818
8769
|
connection.
|
6819
8770
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
6820
|
-
:param pulumi.Input[Mapping[str,
|
8771
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6821
8772
|
|
6822
8773
|
Supported list of database secrets engines that can be configured:
|
6823
8774
|
:param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -6896,7 +8847,7 @@ class SecretsMountSnowflakeArgs:
|
|
6896
8847
|
|
6897
8848
|
@property
|
6898
8849
|
@pulumi.getter
|
6899
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
8850
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
6900
8851
|
"""
|
6901
8852
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6902
8853
|
|
@@ -6905,7 +8856,7 @@ class SecretsMountSnowflakeArgs:
|
|
6905
8856
|
return pulumi.get(self, "data")
|
6906
8857
|
|
6907
8858
|
@data.setter
|
6908
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
8859
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
6909
8860
|
pulumi.set(self, "data", value)
|
6910
8861
|
|
6911
8862
|
@property
|