pulumi-vault 6.3.0a1723010642__py3-none-any.whl → 6.3.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +19 -4
- pulumi_vault/ad/secret_backend.py +5 -0
- pulumi_vault/ad/secret_library.py +5 -0
- pulumi_vault/ad/secret_role.py +5 -0
- pulumi_vault/alicloud/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_login.py +5 -0
- pulumi_vault/approle/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
- pulumi_vault/audit.py +5 -0
- pulumi_vault/audit_request_header.py +5 -0
- pulumi_vault/auth_backend.py +10 -5
- pulumi_vault/aws/auth_backend_cert.py +5 -0
- pulumi_vault/aws/auth_backend_client.py +5 -0
- pulumi_vault/aws/auth_backend_config_identity.py +5 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
- pulumi_vault/aws/auth_backend_login.py +12 -7
- pulumi_vault/aws/auth_backend_role.py +5 -0
- pulumi_vault/aws/auth_backend_role_tag.py +5 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
- pulumi_vault/aws/auth_backend_sts_role.py +5 -0
- pulumi_vault/aws/get_access_credentials.py +31 -4
- pulumi_vault/aws/get_static_access_credentials.py +18 -4
- pulumi_vault/aws/secret_backend.py +5 -0
- pulumi_vault/aws/secret_backend_role.py +120 -0
- pulumi_vault/aws/secret_backend_static_role.py +5 -0
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +5 -0
- pulumi_vault/azure/auth_backend_role.py +5 -0
- pulumi_vault/azure/backend.py +5 -0
- pulumi_vault/azure/backend_role.py +23 -18
- pulumi_vault/azure/get_access_credentials.py +36 -4
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +5 -0
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +21 -0
- pulumi_vault/config/outputs.py +5 -0
- pulumi_vault/config/ui_custom_message.py +24 -19
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +5 -0
- pulumi_vault/consul/secret_backend_role.py +5 -0
- pulumi_vault/database/_inputs.py +2091 -140
- pulumi_vault/database/outputs.py +59 -54
- pulumi_vault/database/secret_backend_connection.py +115 -110
- pulumi_vault/database/secret_backend_role.py +25 -20
- pulumi_vault/database/secret_backend_static_role.py +11 -6
- pulumi_vault/database/secrets_mount.py +139 -134
- pulumi_vault/egp_policy.py +5 -0
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +15 -10
- pulumi_vault/gcp/auth_backend_role.py +5 -0
- pulumi_vault/gcp/get_auth_backend_role.py +42 -4
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +5 -0
- pulumi_vault/gcp/secret_impersonated_account.py +5 -0
- pulumi_vault/gcp/secret_roleset.py +18 -13
- pulumi_vault/gcp/secret_static_account.py +18 -13
- pulumi_vault/generic/endpoint.py +5 -0
- pulumi_vault/generic/get_secret.py +25 -5
- pulumi_vault/generic/secret.py +12 -7
- pulumi_vault/get_auth_backend.py +21 -4
- pulumi_vault/get_auth_backends.py +16 -4
- pulumi_vault/get_namespace.py +18 -5
- pulumi_vault/get_namespaces.py +13 -4
- pulumi_vault/get_nomad_access_token.py +28 -8
- pulumi_vault/get_policy_document.py +27 -16
- pulumi_vault/get_raft_autopilot_state.py +26 -7
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +10 -5
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +5 -0
- pulumi_vault/github/user.py +5 -0
- pulumi_vault/identity/entity.py +5 -0
- pulumi_vault/identity/entity_alias.py +5 -0
- pulumi_vault/identity/entity_policies.py +5 -0
- pulumi_vault/identity/get_entity.py +37 -7
- pulumi_vault/identity/get_group.py +42 -6
- pulumi_vault/identity/get_oidc_client_creds.py +16 -4
- pulumi_vault/identity/get_oidc_openid_config.py +26 -4
- pulumi_vault/identity/get_oidc_public_keys.py +16 -5
- pulumi_vault/identity/group.py +5 -0
- pulumi_vault/identity/group_alias.py +5 -0
- pulumi_vault/identity/group_member_entity_ids.py +5 -0
- pulumi_vault/identity/group_member_group_ids.py +5 -0
- pulumi_vault/identity/group_policies.py +5 -0
- pulumi_vault/identity/mfa_duo.py +5 -0
- pulumi_vault/identity/mfa_login_enforcement.py +5 -0
- pulumi_vault/identity/mfa_okta.py +5 -0
- pulumi_vault/identity/mfa_pingid.py +5 -0
- pulumi_vault/identity/mfa_totp.py +5 -0
- pulumi_vault/identity/oidc.py +5 -0
- pulumi_vault/identity/oidc_assignment.py +5 -0
- pulumi_vault/identity/oidc_client.py +5 -0
- pulumi_vault/identity/oidc_key.py +5 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
- pulumi_vault/identity/oidc_provider.py +5 -0
- pulumi_vault/identity/oidc_role.py +5 -0
- pulumi_vault/identity/oidc_scope.py +5 -0
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +14 -9
- pulumi_vault/jwt/auth_backend_role.py +33 -28
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +5 -0
- pulumi_vault/kmip/secret_role.py +5 -0
- pulumi_vault/kmip/secret_scope.py +5 -0
- pulumi_vault/kubernetes/auth_backend_config.py +5 -0
- pulumi_vault/kubernetes/auth_backend_role.py +5 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
- pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
- pulumi_vault/kubernetes/get_service_account_token.py +28 -4
- pulumi_vault/kubernetes/secret_backend.py +19 -14
- pulumi_vault/kubernetes/secret_backend_role.py +5 -0
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +20 -5
- pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
- pulumi_vault/kv/get_secret_v2.py +27 -6
- pulumi_vault/kv/get_secrets_list.py +15 -4
- pulumi_vault/kv/get_secrets_list_v2.py +18 -4
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +12 -7
- pulumi_vault/kv/secret_backend_v2.py +5 -0
- pulumi_vault/kv/secret_v2.py +46 -41
- pulumi_vault/ldap/auth_backend.py +5 -0
- pulumi_vault/ldap/auth_backend_group.py +5 -0
- pulumi_vault/ldap/auth_backend_user.py +5 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
- pulumi_vault/ldap/get_static_credentials.py +23 -4
- pulumi_vault/ldap/secret_backend.py +19 -14
- pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
- pulumi_vault/ldap/secret_backend_library_set.py +5 -0
- pulumi_vault/ldap/secret_backend_static_role.py +5 -0
- pulumi_vault/managed/_inputs.py +205 -0
- pulumi_vault/managed/keys.py +20 -15
- pulumi_vault/managed/outputs.py +5 -0
- pulumi_vault/mfa_duo.py +5 -0
- pulumi_vault/mfa_okta.py +5 -0
- pulumi_vault/mfa_pingid.py +5 -0
- pulumi_vault/mfa_totp.py +5 -0
- pulumi_vault/mongodbatlas/secret_backend.py +5 -0
- pulumi_vault/mongodbatlas/secret_role.py +5 -0
- pulumi_vault/mount.py +35 -23
- pulumi_vault/namespace.py +19 -14
- pulumi_vault/nomad_secret_backend.py +5 -0
- pulumi_vault/nomad_secret_role.py +5 -0
- pulumi_vault/okta/_inputs.py +39 -0
- pulumi_vault/okta/auth_backend.py +31 -26
- pulumi_vault/okta/auth_backend_group.py +5 -0
- pulumi_vault/okta/auth_backend_user.py +5 -0
- pulumi_vault/okta/outputs.py +5 -0
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +5 -0
- pulumi_vault/pkisecret/_inputs.py +49 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
- pulumi_vault/pkisecret/backend_config_est.py +24 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
- pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
- pulumi_vault/pkisecret/get_backend_key.py +19 -4
- pulumi_vault/pkisecret/get_backend_keys.py +18 -5
- pulumi_vault/pkisecret/outputs.py +17 -12
- pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
- pulumi_vault/pkisecret/secret_backend_key.py +5 -0
- pulumi_vault/pkisecret/secret_backend_role.py +10 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
- pulumi_vault/plugin.py +5 -0
- pulumi_vault/plugin_pinned_version.py +5 -0
- pulumi_vault/policy.py +5 -0
- pulumi_vault/provider.py +47 -42
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +5 -0
- pulumi_vault/quota_rate_limit.py +5 -0
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +5 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
- pulumi_vault/raft_autopilot.py +5 -0
- pulumi_vault/raft_snapshot_agent_config.py +5 -0
- pulumi_vault/rgp_policy.py +5 -0
- pulumi_vault/saml/auth_backend.py +5 -0
- pulumi_vault/saml/auth_backend_role.py +19 -14
- pulumi_vault/secrets/_inputs.py +30 -0
- pulumi_vault/secrets/outputs.py +5 -0
- pulumi_vault/secrets/sync_association.py +7 -2
- pulumi_vault/secrets/sync_aws_destination.py +19 -14
- pulumi_vault/secrets/sync_azure_destination.py +19 -14
- pulumi_vault/secrets/sync_config.py +5 -0
- pulumi_vault/secrets/sync_gcp_destination.py +19 -14
- pulumi_vault/secrets/sync_gh_destination.py +5 -0
- pulumi_vault/secrets/sync_github_apps.py +5 -0
- pulumi_vault/secrets/sync_vercel_destination.py +5 -0
- pulumi_vault/ssh/_inputs.py +22 -0
- pulumi_vault/ssh/outputs.py +5 -0
- pulumi_vault/ssh/secret_backend_ca.py +5 -0
- pulumi_vault/ssh/secret_backend_role.py +38 -33
- pulumi_vault/terraformcloud/secret_backend.py +5 -0
- pulumi_vault/terraformcloud/secret_creds.py +5 -0
- pulumi_vault/terraformcloud/secret_role.py +5 -0
- pulumi_vault/token.py +5 -0
- pulumi_vault/tokenauth/auth_backend_role.py +5 -14
- pulumi_vault/transform/alphabet.py +5 -0
- pulumi_vault/transform/get_decode.py +38 -14
- pulumi_vault/transform/get_encode.py +38 -14
- pulumi_vault/transform/role.py +5 -0
- pulumi_vault/transform/template.py +19 -14
- pulumi_vault/transform/transformation.py +5 -0
- pulumi_vault/transit/get_decrypt.py +21 -4
- pulumi_vault/transit/get_encrypt.py +23 -4
- pulumi_vault/transit/secret_backend_key.py +12 -7
- pulumi_vault/transit/secret_cache_config.py +5 -0
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/METADATA +3 -2
- pulumi_vault-6.3.1.dist-info/RECORD +256 -0
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/WHEEL +1 -1
- pulumi_vault-6.3.0a1723010642.dist-info/RECORD +0 -256
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/top_level.txt +0 -0
pulumi_vault/database/outputs.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -2496,7 +2501,7 @@ class SecretsMountCassandra(dict):
|
|
2496
2501
|
name: str,
|
2497
2502
|
allowed_roles: Optional[Sequence[str]] = None,
|
2498
2503
|
connect_timeout: Optional[int] = None,
|
2499
|
-
data: Optional[Mapping[str,
|
2504
|
+
data: Optional[Mapping[str, str]] = None,
|
2500
2505
|
hosts: Optional[Sequence[str]] = None,
|
2501
2506
|
insecure_tls: Optional[bool] = None,
|
2502
2507
|
password: Optional[str] = None,
|
@@ -2514,7 +2519,7 @@ class SecretsMountCassandra(dict):
|
|
2514
2519
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
2515
2520
|
connection.
|
2516
2521
|
:param int connect_timeout: The number of seconds to use as a connection timeout.
|
2517
|
-
:param Mapping[str,
|
2522
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2518
2523
|
|
2519
2524
|
Supported list of database secrets engines that can be configured:
|
2520
2525
|
:param Sequence[str] hosts: Cassandra hosts to connect to.
|
@@ -2590,7 +2595,7 @@ class SecretsMountCassandra(dict):
|
|
2590
2595
|
|
2591
2596
|
@property
|
2592
2597
|
@pulumi.getter
|
2593
|
-
def data(self) -> Optional[Mapping[str,
|
2598
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
2594
2599
|
"""
|
2595
2600
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2596
2601
|
|
@@ -2737,7 +2742,7 @@ class SecretsMountCouchbase(dict):
|
|
2737
2742
|
allowed_roles: Optional[Sequence[str]] = None,
|
2738
2743
|
base64_pem: Optional[str] = None,
|
2739
2744
|
bucket_name: Optional[str] = None,
|
2740
|
-
data: Optional[Mapping[str,
|
2745
|
+
data: Optional[Mapping[str, str]] = None,
|
2741
2746
|
insecure_tls: Optional[bool] = None,
|
2742
2747
|
plugin_name: Optional[str] = None,
|
2743
2748
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
@@ -2753,7 +2758,7 @@ class SecretsMountCouchbase(dict):
|
|
2753
2758
|
connection.
|
2754
2759
|
:param str base64_pem: Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
|
2755
2760
|
:param str bucket_name: Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
|
2756
|
-
:param Mapping[str,
|
2761
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2757
2762
|
|
2758
2763
|
Supported list of database secrets engines that can be configured:
|
2759
2764
|
:param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
|
@@ -2848,7 +2853,7 @@ class SecretsMountCouchbase(dict):
|
|
2848
2853
|
|
2849
2854
|
@property
|
2850
2855
|
@pulumi.getter
|
2851
|
-
def data(self) -> Optional[Mapping[str,
|
2856
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
2852
2857
|
"""
|
2853
2858
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2854
2859
|
|
@@ -2953,7 +2958,7 @@ class SecretsMountElasticsearch(dict):
|
|
2953
2958
|
ca_path: Optional[str] = None,
|
2954
2959
|
client_cert: Optional[str] = None,
|
2955
2960
|
client_key: Optional[str] = None,
|
2956
|
-
data: Optional[Mapping[str,
|
2961
|
+
data: Optional[Mapping[str, str]] = None,
|
2957
2962
|
insecure: Optional[bool] = None,
|
2958
2963
|
plugin_name: Optional[str] = None,
|
2959
2964
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
@@ -2971,7 +2976,7 @@ class SecretsMountElasticsearch(dict):
|
|
2971
2976
|
:param str ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
2972
2977
|
:param str client_cert: The path to the certificate for the Elasticsearch client to present for communication
|
2973
2978
|
:param str client_key: The path to the key for the Elasticsearch client to use for communication
|
2974
|
-
:param Mapping[str,
|
2979
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2975
2980
|
|
2976
2981
|
Supported list of database secrets engines that can be configured:
|
2977
2982
|
:param bool insecure: Whether to disable certificate verification
|
@@ -3086,7 +3091,7 @@ class SecretsMountElasticsearch(dict):
|
|
3086
3091
|
|
3087
3092
|
@property
|
3088
3093
|
@pulumi.getter
|
3089
|
-
def data(self) -> Optional[Mapping[str,
|
3094
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
3090
3095
|
"""
|
3091
3096
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3092
3097
|
|
@@ -3183,7 +3188,7 @@ class SecretsMountHana(dict):
|
|
3183
3188
|
name: str,
|
3184
3189
|
allowed_roles: Optional[Sequence[str]] = None,
|
3185
3190
|
connection_url: Optional[str] = None,
|
3186
|
-
data: Optional[Mapping[str,
|
3191
|
+
data: Optional[Mapping[str, str]] = None,
|
3187
3192
|
disable_escaping: Optional[bool] = None,
|
3188
3193
|
max_connection_lifetime: Optional[int] = None,
|
3189
3194
|
max_idle_connections: Optional[int] = None,
|
@@ -3198,7 +3203,7 @@ class SecretsMountHana(dict):
|
|
3198
3203
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3199
3204
|
connection.
|
3200
3205
|
:param str connection_url: Connection string to use to connect to the database.
|
3201
|
-
:param Mapping[str,
|
3206
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3202
3207
|
|
3203
3208
|
Supported list of database secrets engines that can be configured:
|
3204
3209
|
:param bool disable_escaping: Disable special character escaping in username and password
|
@@ -3265,7 +3270,7 @@ class SecretsMountHana(dict):
|
|
3265
3270
|
|
3266
3271
|
@property
|
3267
3272
|
@pulumi.getter
|
3268
|
-
def data(self) -> Optional[Mapping[str,
|
3273
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
3269
3274
|
"""
|
3270
3275
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3271
3276
|
|
@@ -3389,7 +3394,7 @@ class SecretsMountInfluxdb(dict):
|
|
3389
3394
|
username: str,
|
3390
3395
|
allowed_roles: Optional[Sequence[str]] = None,
|
3391
3396
|
connect_timeout: Optional[int] = None,
|
3392
|
-
data: Optional[Mapping[str,
|
3397
|
+
data: Optional[Mapping[str, str]] = None,
|
3393
3398
|
insecure_tls: Optional[bool] = None,
|
3394
3399
|
pem_bundle: Optional[str] = None,
|
3395
3400
|
pem_json: Optional[str] = None,
|
@@ -3407,7 +3412,7 @@ class SecretsMountInfluxdb(dict):
|
|
3407
3412
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3408
3413
|
connection.
|
3409
3414
|
:param int connect_timeout: The number of seconds to use as a connection timeout.
|
3410
|
-
:param Mapping[str,
|
3415
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3411
3416
|
|
3412
3417
|
Supported list of database secrets engines that can be configured:
|
3413
3418
|
:param bool insecure_tls: Whether to skip verification of the server certificate when using TLS.
|
@@ -3501,7 +3506,7 @@ class SecretsMountInfluxdb(dict):
|
|
3501
3506
|
|
3502
3507
|
@property
|
3503
3508
|
@pulumi.getter
|
3504
|
-
def data(self) -> Optional[Mapping[str,
|
3509
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
3505
3510
|
"""
|
3506
3511
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3507
3512
|
|
@@ -3622,7 +3627,7 @@ class SecretsMountMongodb(dict):
|
|
3622
3627
|
name: str,
|
3623
3628
|
allowed_roles: Optional[Sequence[str]] = None,
|
3624
3629
|
connection_url: Optional[str] = None,
|
3625
|
-
data: Optional[Mapping[str,
|
3630
|
+
data: Optional[Mapping[str, str]] = None,
|
3626
3631
|
max_connection_lifetime: Optional[int] = None,
|
3627
3632
|
max_idle_connections: Optional[int] = None,
|
3628
3633
|
max_open_connections: Optional[int] = None,
|
@@ -3637,7 +3642,7 @@ class SecretsMountMongodb(dict):
|
|
3637
3642
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3638
3643
|
connection.
|
3639
3644
|
:param str connection_url: Connection string to use to connect to the database.
|
3640
|
-
:param Mapping[str,
|
3645
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3641
3646
|
|
3642
3647
|
Supported list of database secrets engines that can be configured:
|
3643
3648
|
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -3704,7 +3709,7 @@ class SecretsMountMongodb(dict):
|
|
3704
3709
|
|
3705
3710
|
@property
|
3706
3711
|
@pulumi.getter
|
3707
|
-
def data(self) -> Optional[Mapping[str,
|
3712
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
3708
3713
|
"""
|
3709
3714
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3710
3715
|
|
@@ -3823,7 +3828,7 @@ class SecretsMountMongodbatla(dict):
|
|
3823
3828
|
project_id: str,
|
3824
3829
|
public_key: str,
|
3825
3830
|
allowed_roles: Optional[Sequence[str]] = None,
|
3826
|
-
data: Optional[Mapping[str,
|
3831
|
+
data: Optional[Mapping[str, str]] = None,
|
3827
3832
|
plugin_name: Optional[str] = None,
|
3828
3833
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
3829
3834
|
verify_connection: Optional[bool] = None):
|
@@ -3834,7 +3839,7 @@ class SecretsMountMongodbatla(dict):
|
|
3834
3839
|
:param str public_key: The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
|
3835
3840
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3836
3841
|
connection.
|
3837
|
-
:param Mapping[str,
|
3842
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3838
3843
|
|
3839
3844
|
Supported list of database secrets engines that can be configured:
|
3840
3845
|
:param str plugin_name: Specifies the name of the plugin to use.
|
@@ -3900,7 +3905,7 @@ class SecretsMountMongodbatla(dict):
|
|
3900
3905
|
|
3901
3906
|
@property
|
3902
3907
|
@pulumi.getter
|
3903
|
-
def data(self) -> Optional[Mapping[str,
|
3908
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
3904
3909
|
"""
|
3905
3910
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3906
3911
|
|
@@ -3978,7 +3983,7 @@ class SecretsMountMssql(dict):
|
|
3978
3983
|
allowed_roles: Optional[Sequence[str]] = None,
|
3979
3984
|
connection_url: Optional[str] = None,
|
3980
3985
|
contained_db: Optional[bool] = None,
|
3981
|
-
data: Optional[Mapping[str,
|
3986
|
+
data: Optional[Mapping[str, str]] = None,
|
3982
3987
|
disable_escaping: Optional[bool] = None,
|
3983
3988
|
max_connection_lifetime: Optional[int] = None,
|
3984
3989
|
max_idle_connections: Optional[int] = None,
|
@@ -3995,7 +4000,7 @@ class SecretsMountMssql(dict):
|
|
3995
4000
|
connection.
|
3996
4001
|
:param str connection_url: Connection string to use to connect to the database.
|
3997
4002
|
:param bool contained_db: Set to true when the target is a Contained Database, e.g. AzureSQL.
|
3998
|
-
:param Mapping[str,
|
4003
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3999
4004
|
|
4000
4005
|
Supported list of database secrets engines that can be configured:
|
4001
4006
|
:param bool disable_escaping: Disable special character escaping in username and password
|
@@ -4075,7 +4080,7 @@ class SecretsMountMssql(dict):
|
|
4075
4080
|
|
4076
4081
|
@property
|
4077
4082
|
@pulumi.getter
|
4078
|
-
def data(self) -> Optional[Mapping[str,
|
4083
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
4079
4084
|
"""
|
4080
4085
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4081
4086
|
|
@@ -4213,7 +4218,7 @@ class SecretsMountMysql(dict):
|
|
4213
4218
|
allowed_roles: Optional[Sequence[str]] = None,
|
4214
4219
|
auth_type: Optional[str] = None,
|
4215
4220
|
connection_url: Optional[str] = None,
|
4216
|
-
data: Optional[Mapping[str,
|
4221
|
+
data: Optional[Mapping[str, str]] = None,
|
4217
4222
|
max_connection_lifetime: Optional[int] = None,
|
4218
4223
|
max_idle_connections: Optional[int] = None,
|
4219
4224
|
max_open_connections: Optional[int] = None,
|
@@ -4232,7 +4237,7 @@ class SecretsMountMysql(dict):
|
|
4232
4237
|
connection.
|
4233
4238
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4234
4239
|
:param str connection_url: Connection string to use to connect to the database.
|
4235
|
-
:param Mapping[str,
|
4240
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4236
4241
|
|
4237
4242
|
Supported list of database secrets engines that can be configured:
|
4238
4243
|
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -4318,7 +4323,7 @@ class SecretsMountMysql(dict):
|
|
4318
4323
|
|
4319
4324
|
@property
|
4320
4325
|
@pulumi.getter
|
4321
|
-
def data(self) -> Optional[Mapping[str,
|
4326
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
4322
4327
|
"""
|
4323
4328
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4324
4329
|
|
@@ -4472,7 +4477,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4472
4477
|
allowed_roles: Optional[Sequence[str]] = None,
|
4473
4478
|
auth_type: Optional[str] = None,
|
4474
4479
|
connection_url: Optional[str] = None,
|
4475
|
-
data: Optional[Mapping[str,
|
4480
|
+
data: Optional[Mapping[str, str]] = None,
|
4476
4481
|
max_connection_lifetime: Optional[int] = None,
|
4477
4482
|
max_idle_connections: Optional[int] = None,
|
4478
4483
|
max_open_connections: Optional[int] = None,
|
@@ -4491,7 +4496,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4491
4496
|
connection.
|
4492
4497
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4493
4498
|
:param str connection_url: Connection string to use to connect to the database.
|
4494
|
-
:param Mapping[str,
|
4499
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4495
4500
|
|
4496
4501
|
Supported list of database secrets engines that can be configured:
|
4497
4502
|
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -4577,7 +4582,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4577
4582
|
|
4578
4583
|
@property
|
4579
4584
|
@pulumi.getter
|
4580
|
-
def data(self) -> Optional[Mapping[str,
|
4585
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
4581
4586
|
"""
|
4582
4587
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4583
4588
|
|
@@ -4731,7 +4736,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
4731
4736
|
allowed_roles: Optional[Sequence[str]] = None,
|
4732
4737
|
auth_type: Optional[str] = None,
|
4733
4738
|
connection_url: Optional[str] = None,
|
4734
|
-
data: Optional[Mapping[str,
|
4739
|
+
data: Optional[Mapping[str, str]] = None,
|
4735
4740
|
max_connection_lifetime: Optional[int] = None,
|
4736
4741
|
max_idle_connections: Optional[int] = None,
|
4737
4742
|
max_open_connections: Optional[int] = None,
|
@@ -4750,7 +4755,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
4750
4755
|
connection.
|
4751
4756
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4752
4757
|
:param str connection_url: Connection string to use to connect to the database.
|
4753
|
-
:param Mapping[str,
|
4758
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4754
4759
|
|
4755
4760
|
Supported list of database secrets engines that can be configured:
|
4756
4761
|
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -4836,7 +4841,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
4836
4841
|
|
4837
4842
|
@property
|
4838
4843
|
@pulumi.getter
|
4839
|
-
def data(self) -> Optional[Mapping[str,
|
4844
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
4840
4845
|
"""
|
4841
4846
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4842
4847
|
|
@@ -4990,7 +4995,7 @@ class SecretsMountMysqlRd(dict):
|
|
4990
4995
|
allowed_roles: Optional[Sequence[str]] = None,
|
4991
4996
|
auth_type: Optional[str] = None,
|
4992
4997
|
connection_url: Optional[str] = None,
|
4993
|
-
data: Optional[Mapping[str,
|
4998
|
+
data: Optional[Mapping[str, str]] = None,
|
4994
4999
|
max_connection_lifetime: Optional[int] = None,
|
4995
5000
|
max_idle_connections: Optional[int] = None,
|
4996
5001
|
max_open_connections: Optional[int] = None,
|
@@ -5009,7 +5014,7 @@ class SecretsMountMysqlRd(dict):
|
|
5009
5014
|
connection.
|
5010
5015
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5011
5016
|
:param str connection_url: Connection string to use to connect to the database.
|
5012
|
-
:param Mapping[str,
|
5017
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5013
5018
|
|
5014
5019
|
Supported list of database secrets engines that can be configured:
|
5015
5020
|
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -5095,7 +5100,7 @@ class SecretsMountMysqlRd(dict):
|
|
5095
5100
|
|
5096
5101
|
@property
|
5097
5102
|
@pulumi.getter
|
5098
|
-
def data(self) -> Optional[Mapping[str,
|
5103
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
5099
5104
|
"""
|
5100
5105
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5101
5106
|
|
@@ -5244,7 +5249,7 @@ class SecretsMountOracle(dict):
|
|
5244
5249
|
name: str,
|
5245
5250
|
allowed_roles: Optional[Sequence[str]] = None,
|
5246
5251
|
connection_url: Optional[str] = None,
|
5247
|
-
data: Optional[Mapping[str,
|
5252
|
+
data: Optional[Mapping[str, str]] = None,
|
5248
5253
|
disconnect_sessions: Optional[bool] = None,
|
5249
5254
|
max_connection_lifetime: Optional[int] = None,
|
5250
5255
|
max_idle_connections: Optional[int] = None,
|
@@ -5261,7 +5266,7 @@ class SecretsMountOracle(dict):
|
|
5261
5266
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
5262
5267
|
connection.
|
5263
5268
|
:param str connection_url: Connection string to use to connect to the database.
|
5264
|
-
:param Mapping[str,
|
5269
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5265
5270
|
|
5266
5271
|
Supported list of database secrets engines that can be configured:
|
5267
5272
|
:param bool disconnect_sessions: Set to true to disconnect any open sessions prior to running the revocation statements.
|
@@ -5334,7 +5339,7 @@ class SecretsMountOracle(dict):
|
|
5334
5339
|
|
5335
5340
|
@property
|
5336
5341
|
@pulumi.getter
|
5337
|
-
def data(self) -> Optional[Mapping[str,
|
5342
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
5338
5343
|
"""
|
5339
5344
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5340
5345
|
|
@@ -5478,7 +5483,7 @@ class SecretsMountPostgresql(dict):
|
|
5478
5483
|
allowed_roles: Optional[Sequence[str]] = None,
|
5479
5484
|
auth_type: Optional[str] = None,
|
5480
5485
|
connection_url: Optional[str] = None,
|
5481
|
-
data: Optional[Mapping[str,
|
5486
|
+
data: Optional[Mapping[str, str]] = None,
|
5482
5487
|
disable_escaping: Optional[bool] = None,
|
5483
5488
|
max_connection_lifetime: Optional[int] = None,
|
5484
5489
|
max_idle_connections: Optional[int] = None,
|
@@ -5496,7 +5501,7 @@ class SecretsMountPostgresql(dict):
|
|
5496
5501
|
connection.
|
5497
5502
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5498
5503
|
:param str connection_url: Connection string to use to connect to the database.
|
5499
|
-
:param Mapping[str,
|
5504
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5500
5505
|
|
5501
5506
|
Supported list of database secrets engines that can be configured:
|
5502
5507
|
:param bool disable_escaping: Disable special character escaping in username and password
|
@@ -5579,7 +5584,7 @@ class SecretsMountPostgresql(dict):
|
|
5579
5584
|
|
5580
5585
|
@property
|
5581
5586
|
@pulumi.getter
|
5582
|
-
def data(self) -> Optional[Mapping[str,
|
5587
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
5583
5588
|
"""
|
5584
5589
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5585
5590
|
|
@@ -5713,7 +5718,7 @@ class SecretsMountRedi(dict):
|
|
5713
5718
|
username: str,
|
5714
5719
|
allowed_roles: Optional[Sequence[str]] = None,
|
5715
5720
|
ca_cert: Optional[str] = None,
|
5716
|
-
data: Optional[Mapping[str,
|
5721
|
+
data: Optional[Mapping[str, str]] = None,
|
5717
5722
|
insecure_tls: Optional[bool] = None,
|
5718
5723
|
plugin_name: Optional[str] = None,
|
5719
5724
|
port: Optional[int] = None,
|
@@ -5728,7 +5733,7 @@ class SecretsMountRedi(dict):
|
|
5728
5733
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
5729
5734
|
connection.
|
5730
5735
|
:param str ca_cert: The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
|
5731
|
-
:param Mapping[str,
|
5736
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5732
5737
|
|
5733
5738
|
Supported list of database secrets engines that can be configured:
|
5734
5739
|
:param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
|
@@ -5813,7 +5818,7 @@ class SecretsMountRedi(dict):
|
|
5813
5818
|
|
5814
5819
|
@property
|
5815
5820
|
@pulumi.getter
|
5816
|
-
def data(self) -> Optional[Mapping[str,
|
5821
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
5817
5822
|
"""
|
5818
5823
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5819
5824
|
|
@@ -5900,7 +5905,7 @@ class SecretsMountRedisElasticach(dict):
|
|
5900
5905
|
name: str,
|
5901
5906
|
url: str,
|
5902
5907
|
allowed_roles: Optional[Sequence[str]] = None,
|
5903
|
-
data: Optional[Mapping[str,
|
5908
|
+
data: Optional[Mapping[str, str]] = None,
|
5904
5909
|
password: Optional[str] = None,
|
5905
5910
|
plugin_name: Optional[str] = None,
|
5906
5911
|
region: Optional[str] = None,
|
@@ -5912,7 +5917,7 @@ class SecretsMountRedisElasticach(dict):
|
|
5912
5917
|
:param str url: The configuration endpoint for the ElastiCache cluster to connect to.
|
5913
5918
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
5914
5919
|
connection.
|
5915
|
-
:param Mapping[str,
|
5920
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5916
5921
|
|
5917
5922
|
Supported list of database secrets engines that can be configured:
|
5918
5923
|
:param str password: The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
@@ -5969,7 +5974,7 @@ class SecretsMountRedisElasticach(dict):
|
|
5969
5974
|
|
5970
5975
|
@property
|
5971
5976
|
@pulumi.getter
|
5972
|
-
def data(self) -> Optional[Mapping[str,
|
5977
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
5973
5978
|
"""
|
5974
5979
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5975
5980
|
|
@@ -6068,7 +6073,7 @@ class SecretsMountRedshift(dict):
|
|
6068
6073
|
name: str,
|
6069
6074
|
allowed_roles: Optional[Sequence[str]] = None,
|
6070
6075
|
connection_url: Optional[str] = None,
|
6071
|
-
data: Optional[Mapping[str,
|
6076
|
+
data: Optional[Mapping[str, str]] = None,
|
6072
6077
|
disable_escaping: Optional[bool] = None,
|
6073
6078
|
max_connection_lifetime: Optional[int] = None,
|
6074
6079
|
max_idle_connections: Optional[int] = None,
|
@@ -6084,7 +6089,7 @@ class SecretsMountRedshift(dict):
|
|
6084
6089
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
6085
6090
|
connection.
|
6086
6091
|
:param str connection_url: Connection string to use to connect to the database.
|
6087
|
-
:param Mapping[str,
|
6092
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6088
6093
|
|
6089
6094
|
Supported list of database secrets engines that can be configured:
|
6090
6095
|
:param bool disable_escaping: Disable special character escaping in username and password
|
@@ -6154,7 +6159,7 @@ class SecretsMountRedshift(dict):
|
|
6154
6159
|
|
6155
6160
|
@property
|
6156
6161
|
@pulumi.getter
|
6157
|
-
def data(self) -> Optional[Mapping[str,
|
6162
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
6158
6163
|
"""
|
6159
6164
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6160
6165
|
|
@@ -6283,7 +6288,7 @@ class SecretsMountSnowflake(dict):
|
|
6283
6288
|
name: str,
|
6284
6289
|
allowed_roles: Optional[Sequence[str]] = None,
|
6285
6290
|
connection_url: Optional[str] = None,
|
6286
|
-
data: Optional[Mapping[str,
|
6291
|
+
data: Optional[Mapping[str, str]] = None,
|
6287
6292
|
max_connection_lifetime: Optional[int] = None,
|
6288
6293
|
max_idle_connections: Optional[int] = None,
|
6289
6294
|
max_open_connections: Optional[int] = None,
|
@@ -6298,7 +6303,7 @@ class SecretsMountSnowflake(dict):
|
|
6298
6303
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
6299
6304
|
connection.
|
6300
6305
|
:param str connection_url: Connection string to use to connect to the database.
|
6301
|
-
:param Mapping[str,
|
6306
|
+
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6302
6307
|
|
6303
6308
|
Supported list of database secrets engines that can be configured:
|
6304
6309
|
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -6365,7 +6370,7 @@ class SecretsMountSnowflake(dict):
|
|
6365
6370
|
|
6366
6371
|
@property
|
6367
6372
|
@pulumi.getter
|
6368
|
-
def data(self) -> Optional[Mapping[str,
|
6373
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
6369
6374
|
"""
|
6370
6375
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6371
6376
|
|