pulumi-vault 6.3.0a1723010642__py3-none-any.whl → 6.3.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +560 -0
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +19 -4
  4. pulumi_vault/ad/secret_backend.py +5 -0
  5. pulumi_vault/ad/secret_library.py +5 -0
  6. pulumi_vault/ad/secret_role.py +5 -0
  7. pulumi_vault/alicloud/auth_backend_role.py +5 -0
  8. pulumi_vault/approle/auth_backend_login.py +5 -0
  9. pulumi_vault/approle/auth_backend_role.py +5 -0
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
  11. pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
  12. pulumi_vault/audit.py +5 -0
  13. pulumi_vault/audit_request_header.py +5 -0
  14. pulumi_vault/auth_backend.py +10 -5
  15. pulumi_vault/aws/auth_backend_cert.py +5 -0
  16. pulumi_vault/aws/auth_backend_client.py +5 -0
  17. pulumi_vault/aws/auth_backend_config_identity.py +5 -0
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
  19. pulumi_vault/aws/auth_backend_login.py +12 -7
  20. pulumi_vault/aws/auth_backend_role.py +5 -0
  21. pulumi_vault/aws/auth_backend_role_tag.py +5 -0
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
  23. pulumi_vault/aws/auth_backend_sts_role.py +5 -0
  24. pulumi_vault/aws/get_access_credentials.py +31 -4
  25. pulumi_vault/aws/get_static_access_credentials.py +18 -4
  26. pulumi_vault/aws/secret_backend.py +5 -0
  27. pulumi_vault/aws/secret_backend_role.py +120 -0
  28. pulumi_vault/aws/secret_backend_static_role.py +5 -0
  29. pulumi_vault/azure/_inputs.py +24 -0
  30. pulumi_vault/azure/auth_backend_config.py +5 -0
  31. pulumi_vault/azure/auth_backend_role.py +5 -0
  32. pulumi_vault/azure/backend.py +5 -0
  33. pulumi_vault/azure/backend_role.py +23 -18
  34. pulumi_vault/azure/get_access_credentials.py +36 -4
  35. pulumi_vault/azure/outputs.py +5 -0
  36. pulumi_vault/cert_auth_backend_role.py +5 -0
  37. pulumi_vault/config/__init__.pyi +5 -0
  38. pulumi_vault/config/_inputs.py +21 -0
  39. pulumi_vault/config/outputs.py +5 -0
  40. pulumi_vault/config/ui_custom_message.py +24 -19
  41. pulumi_vault/config/vars.py +5 -0
  42. pulumi_vault/consul/secret_backend.py +5 -0
  43. pulumi_vault/consul/secret_backend_role.py +5 -0
  44. pulumi_vault/database/_inputs.py +2091 -140
  45. pulumi_vault/database/outputs.py +59 -54
  46. pulumi_vault/database/secret_backend_connection.py +115 -110
  47. pulumi_vault/database/secret_backend_role.py +25 -20
  48. pulumi_vault/database/secret_backend_static_role.py +11 -6
  49. pulumi_vault/database/secrets_mount.py +139 -134
  50. pulumi_vault/egp_policy.py +5 -0
  51. pulumi_vault/gcp/_inputs.py +111 -0
  52. pulumi_vault/gcp/auth_backend.py +15 -10
  53. pulumi_vault/gcp/auth_backend_role.py +5 -0
  54. pulumi_vault/gcp/get_auth_backend_role.py +42 -4
  55. pulumi_vault/gcp/outputs.py +5 -0
  56. pulumi_vault/gcp/secret_backend.py +5 -0
  57. pulumi_vault/gcp/secret_impersonated_account.py +5 -0
  58. pulumi_vault/gcp/secret_roleset.py +18 -13
  59. pulumi_vault/gcp/secret_static_account.py +18 -13
  60. pulumi_vault/generic/endpoint.py +5 -0
  61. pulumi_vault/generic/get_secret.py +25 -5
  62. pulumi_vault/generic/secret.py +12 -7
  63. pulumi_vault/get_auth_backend.py +21 -4
  64. pulumi_vault/get_auth_backends.py +16 -4
  65. pulumi_vault/get_namespace.py +18 -5
  66. pulumi_vault/get_namespaces.py +13 -4
  67. pulumi_vault/get_nomad_access_token.py +28 -8
  68. pulumi_vault/get_policy_document.py +27 -16
  69. pulumi_vault/get_raft_autopilot_state.py +26 -7
  70. pulumi_vault/github/_inputs.py +55 -0
  71. pulumi_vault/github/auth_backend.py +10 -5
  72. pulumi_vault/github/outputs.py +5 -0
  73. pulumi_vault/github/team.py +5 -0
  74. pulumi_vault/github/user.py +5 -0
  75. pulumi_vault/identity/entity.py +5 -0
  76. pulumi_vault/identity/entity_alias.py +5 -0
  77. pulumi_vault/identity/entity_policies.py +5 -0
  78. pulumi_vault/identity/get_entity.py +37 -7
  79. pulumi_vault/identity/get_group.py +42 -6
  80. pulumi_vault/identity/get_oidc_client_creds.py +16 -4
  81. pulumi_vault/identity/get_oidc_openid_config.py +26 -4
  82. pulumi_vault/identity/get_oidc_public_keys.py +16 -5
  83. pulumi_vault/identity/group.py +5 -0
  84. pulumi_vault/identity/group_alias.py +5 -0
  85. pulumi_vault/identity/group_member_entity_ids.py +5 -0
  86. pulumi_vault/identity/group_member_group_ids.py +5 -0
  87. pulumi_vault/identity/group_policies.py +5 -0
  88. pulumi_vault/identity/mfa_duo.py +5 -0
  89. pulumi_vault/identity/mfa_login_enforcement.py +5 -0
  90. pulumi_vault/identity/mfa_okta.py +5 -0
  91. pulumi_vault/identity/mfa_pingid.py +5 -0
  92. pulumi_vault/identity/mfa_totp.py +5 -0
  93. pulumi_vault/identity/oidc.py +5 -0
  94. pulumi_vault/identity/oidc_assignment.py +5 -0
  95. pulumi_vault/identity/oidc_client.py +5 -0
  96. pulumi_vault/identity/oidc_key.py +5 -0
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
  98. pulumi_vault/identity/oidc_provider.py +5 -0
  99. pulumi_vault/identity/oidc_role.py +5 -0
  100. pulumi_vault/identity/oidc_scope.py +5 -0
  101. pulumi_vault/identity/outputs.py +8 -3
  102. pulumi_vault/jwt/_inputs.py +55 -0
  103. pulumi_vault/jwt/auth_backend.py +14 -9
  104. pulumi_vault/jwt/auth_backend_role.py +33 -28
  105. pulumi_vault/jwt/outputs.py +5 -0
  106. pulumi_vault/kmip/secret_backend.py +5 -0
  107. pulumi_vault/kmip/secret_role.py +5 -0
  108. pulumi_vault/kmip/secret_scope.py +5 -0
  109. pulumi_vault/kubernetes/auth_backend_config.py +5 -0
  110. pulumi_vault/kubernetes/auth_backend_role.py +5 -0
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
  113. pulumi_vault/kubernetes/get_service_account_token.py +28 -4
  114. pulumi_vault/kubernetes/secret_backend.py +19 -14
  115. pulumi_vault/kubernetes/secret_backend_role.py +5 -0
  116. pulumi_vault/kv/_inputs.py +36 -4
  117. pulumi_vault/kv/get_secret.py +20 -5
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
  119. pulumi_vault/kv/get_secret_v2.py +27 -6
  120. pulumi_vault/kv/get_secrets_list.py +15 -4
  121. pulumi_vault/kv/get_secrets_list_v2.py +18 -4
  122. pulumi_vault/kv/outputs.py +8 -3
  123. pulumi_vault/kv/secret.py +12 -7
  124. pulumi_vault/kv/secret_backend_v2.py +5 -0
  125. pulumi_vault/kv/secret_v2.py +46 -41
  126. pulumi_vault/ldap/auth_backend.py +5 -0
  127. pulumi_vault/ldap/auth_backend_group.py +5 -0
  128. pulumi_vault/ldap/auth_backend_user.py +5 -0
  129. pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
  130. pulumi_vault/ldap/get_static_credentials.py +23 -4
  131. pulumi_vault/ldap/secret_backend.py +19 -14
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
  133. pulumi_vault/ldap/secret_backend_library_set.py +5 -0
  134. pulumi_vault/ldap/secret_backend_static_role.py +5 -0
  135. pulumi_vault/managed/_inputs.py +205 -0
  136. pulumi_vault/managed/keys.py +20 -15
  137. pulumi_vault/managed/outputs.py +5 -0
  138. pulumi_vault/mfa_duo.py +5 -0
  139. pulumi_vault/mfa_okta.py +5 -0
  140. pulumi_vault/mfa_pingid.py +5 -0
  141. pulumi_vault/mfa_totp.py +5 -0
  142. pulumi_vault/mongodbatlas/secret_backend.py +5 -0
  143. pulumi_vault/mongodbatlas/secret_role.py +5 -0
  144. pulumi_vault/mount.py +35 -23
  145. pulumi_vault/namespace.py +19 -14
  146. pulumi_vault/nomad_secret_backend.py +5 -0
  147. pulumi_vault/nomad_secret_role.py +5 -0
  148. pulumi_vault/okta/_inputs.py +39 -0
  149. pulumi_vault/okta/auth_backend.py +31 -26
  150. pulumi_vault/okta/auth_backend_group.py +5 -0
  151. pulumi_vault/okta/auth_backend_user.py +5 -0
  152. pulumi_vault/okta/outputs.py +5 -0
  153. pulumi_vault/outputs.py +5 -0
  154. pulumi_vault/password_policy.py +5 -0
  155. pulumi_vault/pkisecret/_inputs.py +49 -8
  156. pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
  157. pulumi_vault/pkisecret/backend_config_est.py +24 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
  159. pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
  160. pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
  161. pulumi_vault/pkisecret/get_backend_key.py +19 -4
  162. pulumi_vault/pkisecret/get_backend_keys.py +18 -5
  163. pulumi_vault/pkisecret/outputs.py +17 -12
  164. pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
  172. pulumi_vault/pkisecret/secret_backend_key.py +5 -0
  173. pulumi_vault/pkisecret/secret_backend_role.py +10 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
  176. pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
  177. pulumi_vault/plugin.py +5 -0
  178. pulumi_vault/plugin_pinned_version.py +5 -0
  179. pulumi_vault/policy.py +5 -0
  180. pulumi_vault/provider.py +47 -42
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +5 -0
  183. pulumi_vault/quota_rate_limit.py +5 -0
  184. pulumi_vault/rabbitmq/_inputs.py +61 -0
  185. pulumi_vault/rabbitmq/outputs.py +5 -0
  186. pulumi_vault/rabbitmq/secret_backend.py +5 -0
  187. pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
  188. pulumi_vault/raft_autopilot.py +5 -0
  189. pulumi_vault/raft_snapshot_agent_config.py +5 -0
  190. pulumi_vault/rgp_policy.py +5 -0
  191. pulumi_vault/saml/auth_backend.py +5 -0
  192. pulumi_vault/saml/auth_backend_role.py +19 -14
  193. pulumi_vault/secrets/_inputs.py +30 -0
  194. pulumi_vault/secrets/outputs.py +5 -0
  195. pulumi_vault/secrets/sync_association.py +7 -2
  196. pulumi_vault/secrets/sync_aws_destination.py +19 -14
  197. pulumi_vault/secrets/sync_azure_destination.py +19 -14
  198. pulumi_vault/secrets/sync_config.py +5 -0
  199. pulumi_vault/secrets/sync_gcp_destination.py +19 -14
  200. pulumi_vault/secrets/sync_gh_destination.py +5 -0
  201. pulumi_vault/secrets/sync_github_apps.py +5 -0
  202. pulumi_vault/secrets/sync_vercel_destination.py +5 -0
  203. pulumi_vault/ssh/_inputs.py +22 -0
  204. pulumi_vault/ssh/outputs.py +5 -0
  205. pulumi_vault/ssh/secret_backend_ca.py +5 -0
  206. pulumi_vault/ssh/secret_backend_role.py +38 -33
  207. pulumi_vault/terraformcloud/secret_backend.py +5 -0
  208. pulumi_vault/terraformcloud/secret_creds.py +5 -0
  209. pulumi_vault/terraformcloud/secret_role.py +5 -0
  210. pulumi_vault/token.py +5 -0
  211. pulumi_vault/tokenauth/auth_backend_role.py +5 -14
  212. pulumi_vault/transform/alphabet.py +5 -0
  213. pulumi_vault/transform/get_decode.py +38 -14
  214. pulumi_vault/transform/get_encode.py +38 -14
  215. pulumi_vault/transform/role.py +5 -0
  216. pulumi_vault/transform/template.py +19 -14
  217. pulumi_vault/transform/transformation.py +5 -0
  218. pulumi_vault/transit/get_decrypt.py +21 -4
  219. pulumi_vault/transit/get_encrypt.py +23 -4
  220. pulumi_vault/transit/secret_backend_key.py +12 -7
  221. pulumi_vault/transit/secret_cache_config.py +5 -0
  222. {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/METADATA +3 -2
  223. pulumi_vault-6.3.1.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.3.0a1723010642.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -20,7 +25,7 @@ class SecretBackendConnectionArgs:
20
25
  allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
21
26
  cassandra: Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']] = None,
22
27
  couchbase: Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']] = None,
23
- data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
28
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
24
29
  elasticsearch: Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']] = None,
25
30
  hana: Optional[pulumi.Input['SecretBackendConnectionHanaArgs']] = None,
26
31
  influxdb: Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']] = None,
@@ -49,7 +54,7 @@ class SecretBackendConnectionArgs:
49
54
  connection.
50
55
  :param pulumi.Input['SecretBackendConnectionCassandraArgs'] cassandra: A nested block containing configuration options for Cassandra connections.
51
56
  :param pulumi.Input['SecretBackendConnectionCouchbaseArgs'] couchbase: A nested block containing configuration options for Couchbase connections.
52
- :param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
57
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
53
58
  :param pulumi.Input['SecretBackendConnectionElasticsearchArgs'] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
54
59
  :param pulumi.Input['SecretBackendConnectionHanaArgs'] hana: A nested block containing configuration options for SAP HanaDB connections.
55
60
  :param pulumi.Input['SecretBackendConnectionInfluxdbArgs'] influxdb: A nested block containing configuration options for InfluxDB connections.
@@ -181,14 +186,14 @@ class SecretBackendConnectionArgs:
181
186
 
182
187
  @property
183
188
  @pulumi.getter
184
- def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
189
+ def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
185
190
  """
186
191
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
187
192
  """
188
193
  return pulumi.get(self, "data")
189
194
 
190
195
  @data.setter
191
- def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
196
+ def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
192
197
  pulumi.set(self, "data", value)
193
198
 
194
199
  @property
@@ -457,7 +462,7 @@ class _SecretBackendConnectionState:
457
462
  backend: Optional[pulumi.Input[str]] = None,
458
463
  cassandra: Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']] = None,
459
464
  couchbase: Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']] = None,
460
- data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
465
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
461
466
  elasticsearch: Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']] = None,
462
467
  hana: Optional[pulumi.Input['SecretBackendConnectionHanaArgs']] = None,
463
468
  influxdb: Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']] = None,
@@ -486,7 +491,7 @@ class _SecretBackendConnectionState:
486
491
  :param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
487
492
  :param pulumi.Input['SecretBackendConnectionCassandraArgs'] cassandra: A nested block containing configuration options for Cassandra connections.
488
493
  :param pulumi.Input['SecretBackendConnectionCouchbaseArgs'] couchbase: A nested block containing configuration options for Couchbase connections.
489
- :param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
494
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
490
495
  :param pulumi.Input['SecretBackendConnectionElasticsearchArgs'] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
491
496
  :param pulumi.Input['SecretBackendConnectionHanaArgs'] hana: A nested block containing configuration options for SAP HanaDB connections.
492
497
  :param pulumi.Input['SecretBackendConnectionInfluxdbArgs'] influxdb: A nested block containing configuration options for InfluxDB connections.
@@ -619,14 +624,14 @@ class _SecretBackendConnectionState:
619
624
 
620
625
  @property
621
626
  @pulumi.getter
622
- def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
627
+ def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
623
628
  """
624
629
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
625
630
  """
626
631
  return pulumi.get(self, "data")
627
632
 
628
633
  @data.setter
629
- def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
634
+ def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
630
635
  pulumi.set(self, "data", value)
631
636
 
632
637
  @property
@@ -895,29 +900,29 @@ class SecretBackendConnection(pulumi.CustomResource):
895
900
  opts: Optional[pulumi.ResourceOptions] = None,
896
901
  allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
897
902
  backend: Optional[pulumi.Input[str]] = None,
898
- cassandra: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionCassandraArgs']]] = None,
899
- couchbase: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionCouchbaseArgs']]] = None,
900
- data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
901
- elasticsearch: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionElasticsearchArgs']]] = None,
902
- hana: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionHanaArgs']]] = None,
903
- influxdb: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionInfluxdbArgs']]] = None,
904
- mongodb: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionMongodbArgs']]] = None,
905
- mongodbatlas: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionMongodbatlasArgs']]] = None,
906
- mssql: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionMssqlArgs']]] = None,
907
- mysql: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionMysqlArgs']]] = None,
908
- mysql_aurora: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionMysqlAuroraArgs']]] = None,
909
- mysql_legacy: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionMysqlLegacyArgs']]] = None,
910
- mysql_rds: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionMysqlRdsArgs']]] = None,
903
+ cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
904
+ couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
905
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
906
+ elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
907
+ hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
908
+ influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
909
+ mongodb: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbArgs', 'SecretBackendConnectionMongodbArgsDict']]] = None,
910
+ mongodbatlas: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbatlasArgs', 'SecretBackendConnectionMongodbatlasArgsDict']]] = None,
911
+ mssql: Optional[pulumi.Input[Union['SecretBackendConnectionMssqlArgs', 'SecretBackendConnectionMssqlArgsDict']]] = None,
912
+ mysql: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlArgs', 'SecretBackendConnectionMysqlArgsDict']]] = None,
913
+ mysql_aurora: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']]] = None,
914
+ mysql_legacy: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']]] = None,
915
+ mysql_rds: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']]] = None,
911
916
  name: Optional[pulumi.Input[str]] = None,
912
917
  namespace: Optional[pulumi.Input[str]] = None,
913
- oracle: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionOracleArgs']]] = None,
918
+ oracle: Optional[pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']]] = None,
914
919
  plugin_name: Optional[pulumi.Input[str]] = None,
915
- postgresql: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionPostgresqlArgs']]] = None,
916
- redis: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionRedisArgs']]] = None,
917
- redis_elasticache: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionRedisElasticacheArgs']]] = None,
918
- redshift: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionRedshiftArgs']]] = None,
920
+ postgresql: Optional[pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']]] = None,
921
+ redis: Optional[pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']]] = None,
922
+ redis_elasticache: Optional[pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']]] = None,
923
+ redshift: Optional[pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']]] = None,
919
924
  root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
920
- snowflake: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionSnowflakeArgs']]] = None,
925
+ snowflake: Optional[pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']]] = None,
921
926
  verify_connection: Optional[pulumi.Input[bool]] = None,
922
927
  __props__=None):
923
928
  """
@@ -937,9 +942,9 @@ class SecretBackendConnection(pulumi.CustomResource):
937
942
  "dev",
938
943
  "prod",
939
944
  ],
940
- postgresql=vault.database.SecretBackendConnectionPostgresqlArgs(
941
- connection_url="postgres://username:password@host:port/database",
942
- ))
945
+ postgresql={
946
+ "connection_url": "postgres://username:password@host:port/database",
947
+ })
943
948
  ```
944
949
 
945
950
  ## Import
@@ -955,34 +960,34 @@ class SecretBackendConnection(pulumi.CustomResource):
955
960
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
956
961
  connection.
957
962
  :param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
958
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionCassandraArgs']] cassandra: A nested block containing configuration options for Cassandra connections.
959
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionCouchbaseArgs']] couchbase: A nested block containing configuration options for Couchbase connections.
960
- :param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
961
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionElasticsearchArgs']] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
962
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionHanaArgs']] hana: A nested block containing configuration options for SAP HanaDB connections.
963
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionInfluxdbArgs']] influxdb: A nested block containing configuration options for InfluxDB connections.
964
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionMongodbArgs']] mongodb: A nested block containing configuration options for MongoDB connections.
965
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionMongodbatlasArgs']] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
966
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionMssqlArgs']] mssql: A nested block containing configuration options for MSSQL connections.
967
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionMysqlArgs']] mysql: A nested block containing configuration options for MySQL connections.
968
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionMysqlAuroraArgs']] mysql_aurora: A nested block containing configuration options for Aurora MySQL connections.
969
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionMysqlLegacyArgs']] mysql_legacy: A nested block containing configuration options for legacy MySQL connections.
970
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionMysqlRdsArgs']] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
963
+ :param pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']] cassandra: A nested block containing configuration options for Cassandra connections.
964
+ :param pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']] couchbase: A nested block containing configuration options for Couchbase connections.
965
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
966
+ :param pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
967
+ :param pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']] hana: A nested block containing configuration options for SAP HanaDB connections.
968
+ :param pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']] influxdb: A nested block containing configuration options for InfluxDB connections.
969
+ :param pulumi.Input[Union['SecretBackendConnectionMongodbArgs', 'SecretBackendConnectionMongodbArgsDict']] mongodb: A nested block containing configuration options for MongoDB connections.
970
+ :param pulumi.Input[Union['SecretBackendConnectionMongodbatlasArgs', 'SecretBackendConnectionMongodbatlasArgsDict']] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
971
+ :param pulumi.Input[Union['SecretBackendConnectionMssqlArgs', 'SecretBackendConnectionMssqlArgsDict']] mssql: A nested block containing configuration options for MSSQL connections.
972
+ :param pulumi.Input[Union['SecretBackendConnectionMysqlArgs', 'SecretBackendConnectionMysqlArgsDict']] mysql: A nested block containing configuration options for MySQL connections.
973
+ :param pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']] mysql_aurora: A nested block containing configuration options for Aurora MySQL connections.
974
+ :param pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']] mysql_legacy: A nested block containing configuration options for legacy MySQL connections.
975
+ :param pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
971
976
  :param pulumi.Input[str] name: A unique name to give the database connection.
972
977
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
973
978
  The value should not contain leading or trailing forward slashes.
974
979
  The `namespace` is always relative to the provider's configured namespace.
975
980
  *Available only for Vault Enterprise*.
976
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionOracleArgs']] oracle: A nested block containing configuration options for Oracle connections.
981
+ :param pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']] oracle: A nested block containing configuration options for Oracle connections.
977
982
  :param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
978
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionPostgresqlArgs']] postgresql: A nested block containing configuration options for PostgreSQL connections.
979
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionRedisArgs']] redis: A nested block containing configuration options for Redis connections.
980
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionRedisElasticacheArgs']] redis_elasticache: A nested block containing configuration options for Redis ElastiCache connections.
983
+ :param pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']] postgresql: A nested block containing configuration options for PostgreSQL connections.
984
+ :param pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']] redis: A nested block containing configuration options for Redis connections.
985
+ :param pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']] redis_elasticache: A nested block containing configuration options for Redis ElastiCache connections.
981
986
 
982
987
  Exactly one of the nested blocks of configuration options must be supplied.
983
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionRedshiftArgs']] redshift: Connection parameters for the redshift-database-plugin plugin.
988
+ :param pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']] redshift: Connection parameters for the redshift-database-plugin plugin.
984
989
  :param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
985
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionSnowflakeArgs']] snowflake: A nested block containing configuration options for Snowflake connections.
990
+ :param pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']] snowflake: A nested block containing configuration options for Snowflake connections.
986
991
  :param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
987
992
  initial configuration or not.
988
993
  """
@@ -1009,9 +1014,9 @@ class SecretBackendConnection(pulumi.CustomResource):
1009
1014
  "dev",
1010
1015
  "prod",
1011
1016
  ],
1012
- postgresql=vault.database.SecretBackendConnectionPostgresqlArgs(
1013
- connection_url="postgres://username:password@host:port/database",
1014
- ))
1017
+ postgresql={
1018
+ "connection_url": "postgres://username:password@host:port/database",
1019
+ })
1015
1020
  ```
1016
1021
 
1017
1022
  ## Import
@@ -1039,29 +1044,29 @@ class SecretBackendConnection(pulumi.CustomResource):
1039
1044
  opts: Optional[pulumi.ResourceOptions] = None,
1040
1045
  allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1041
1046
  backend: Optional[pulumi.Input[str]] = None,
1042
- cassandra: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionCassandraArgs']]] = None,
1043
- couchbase: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionCouchbaseArgs']]] = None,
1044
- data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1045
- elasticsearch: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionElasticsearchArgs']]] = None,
1046
- hana: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionHanaArgs']]] = None,
1047
- influxdb: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionInfluxdbArgs']]] = None,
1048
- mongodb: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionMongodbArgs']]] = None,
1049
- mongodbatlas: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionMongodbatlasArgs']]] = None,
1050
- mssql: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionMssqlArgs']]] = None,
1051
- mysql: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionMysqlArgs']]] = None,
1052
- mysql_aurora: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionMysqlAuroraArgs']]] = None,
1053
- mysql_legacy: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionMysqlLegacyArgs']]] = None,
1054
- mysql_rds: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionMysqlRdsArgs']]] = None,
1047
+ cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
1048
+ couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
1049
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1050
+ elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
1051
+ hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
1052
+ influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
1053
+ mongodb: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbArgs', 'SecretBackendConnectionMongodbArgsDict']]] = None,
1054
+ mongodbatlas: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbatlasArgs', 'SecretBackendConnectionMongodbatlasArgsDict']]] = None,
1055
+ mssql: Optional[pulumi.Input[Union['SecretBackendConnectionMssqlArgs', 'SecretBackendConnectionMssqlArgsDict']]] = None,
1056
+ mysql: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlArgs', 'SecretBackendConnectionMysqlArgsDict']]] = None,
1057
+ mysql_aurora: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']]] = None,
1058
+ mysql_legacy: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']]] = None,
1059
+ mysql_rds: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']]] = None,
1055
1060
  name: Optional[pulumi.Input[str]] = None,
1056
1061
  namespace: Optional[pulumi.Input[str]] = None,
1057
- oracle: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionOracleArgs']]] = None,
1062
+ oracle: Optional[pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']]] = None,
1058
1063
  plugin_name: Optional[pulumi.Input[str]] = None,
1059
- postgresql: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionPostgresqlArgs']]] = None,
1060
- redis: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionRedisArgs']]] = None,
1061
- redis_elasticache: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionRedisElasticacheArgs']]] = None,
1062
- redshift: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionRedshiftArgs']]] = None,
1064
+ postgresql: Optional[pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']]] = None,
1065
+ redis: Optional[pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']]] = None,
1066
+ redis_elasticache: Optional[pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']]] = None,
1067
+ redshift: Optional[pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']]] = None,
1063
1068
  root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1064
- snowflake: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionSnowflakeArgs']]] = None,
1069
+ snowflake: Optional[pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']]] = None,
1065
1070
  verify_connection: Optional[pulumi.Input[bool]] = None,
1066
1071
  __props__=None):
1067
1072
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
@@ -1112,29 +1117,29 @@ class SecretBackendConnection(pulumi.CustomResource):
1112
1117
  opts: Optional[pulumi.ResourceOptions] = None,
1113
1118
  allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1114
1119
  backend: Optional[pulumi.Input[str]] = None,
1115
- cassandra: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionCassandraArgs']]] = None,
1116
- couchbase: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionCouchbaseArgs']]] = None,
1117
- data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1118
- elasticsearch: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionElasticsearchArgs']]] = None,
1119
- hana: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionHanaArgs']]] = None,
1120
- influxdb: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionInfluxdbArgs']]] = None,
1121
- mongodb: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionMongodbArgs']]] = None,
1122
- mongodbatlas: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionMongodbatlasArgs']]] = None,
1123
- mssql: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionMssqlArgs']]] = None,
1124
- mysql: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionMysqlArgs']]] = None,
1125
- mysql_aurora: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionMysqlAuroraArgs']]] = None,
1126
- mysql_legacy: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionMysqlLegacyArgs']]] = None,
1127
- mysql_rds: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionMysqlRdsArgs']]] = None,
1120
+ cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
1121
+ couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
1122
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1123
+ elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
1124
+ hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
1125
+ influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
1126
+ mongodb: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbArgs', 'SecretBackendConnectionMongodbArgsDict']]] = None,
1127
+ mongodbatlas: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbatlasArgs', 'SecretBackendConnectionMongodbatlasArgsDict']]] = None,
1128
+ mssql: Optional[pulumi.Input[Union['SecretBackendConnectionMssqlArgs', 'SecretBackendConnectionMssqlArgsDict']]] = None,
1129
+ mysql: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlArgs', 'SecretBackendConnectionMysqlArgsDict']]] = None,
1130
+ mysql_aurora: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']]] = None,
1131
+ mysql_legacy: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']]] = None,
1132
+ mysql_rds: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']]] = None,
1128
1133
  name: Optional[pulumi.Input[str]] = None,
1129
1134
  namespace: Optional[pulumi.Input[str]] = None,
1130
- oracle: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionOracleArgs']]] = None,
1135
+ oracle: Optional[pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']]] = None,
1131
1136
  plugin_name: Optional[pulumi.Input[str]] = None,
1132
- postgresql: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionPostgresqlArgs']]] = None,
1133
- redis: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionRedisArgs']]] = None,
1134
- redis_elasticache: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionRedisElasticacheArgs']]] = None,
1135
- redshift: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionRedshiftArgs']]] = None,
1137
+ postgresql: Optional[pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']]] = None,
1138
+ redis: Optional[pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']]] = None,
1139
+ redis_elasticache: Optional[pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']]] = None,
1140
+ redshift: Optional[pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']]] = None,
1136
1141
  root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1137
- snowflake: Optional[pulumi.Input[pulumi.InputType['SecretBackendConnectionSnowflakeArgs']]] = None,
1142
+ snowflake: Optional[pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']]] = None,
1138
1143
  verify_connection: Optional[pulumi.Input[bool]] = None) -> 'SecretBackendConnection':
1139
1144
  """
1140
1145
  Get an existing SecretBackendConnection resource's state with the given name, id, and optional extra
@@ -1146,34 +1151,34 @@ class SecretBackendConnection(pulumi.CustomResource):
1146
1151
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
1147
1152
  connection.
1148
1153
  :param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
1149
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionCassandraArgs']] cassandra: A nested block containing configuration options for Cassandra connections.
1150
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionCouchbaseArgs']] couchbase: A nested block containing configuration options for Couchbase connections.
1151
- :param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
1152
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionElasticsearchArgs']] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
1153
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionHanaArgs']] hana: A nested block containing configuration options for SAP HanaDB connections.
1154
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionInfluxdbArgs']] influxdb: A nested block containing configuration options for InfluxDB connections.
1155
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionMongodbArgs']] mongodb: A nested block containing configuration options for MongoDB connections.
1156
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionMongodbatlasArgs']] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
1157
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionMssqlArgs']] mssql: A nested block containing configuration options for MSSQL connections.
1158
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionMysqlArgs']] mysql: A nested block containing configuration options for MySQL connections.
1159
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionMysqlAuroraArgs']] mysql_aurora: A nested block containing configuration options for Aurora MySQL connections.
1160
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionMysqlLegacyArgs']] mysql_legacy: A nested block containing configuration options for legacy MySQL connections.
1161
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionMysqlRdsArgs']] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
1154
+ :param pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']] cassandra: A nested block containing configuration options for Cassandra connections.
1155
+ :param pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']] couchbase: A nested block containing configuration options for Couchbase connections.
1156
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
1157
+ :param pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
1158
+ :param pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']] hana: A nested block containing configuration options for SAP HanaDB connections.
1159
+ :param pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']] influxdb: A nested block containing configuration options for InfluxDB connections.
1160
+ :param pulumi.Input[Union['SecretBackendConnectionMongodbArgs', 'SecretBackendConnectionMongodbArgsDict']] mongodb: A nested block containing configuration options for MongoDB connections.
1161
+ :param pulumi.Input[Union['SecretBackendConnectionMongodbatlasArgs', 'SecretBackendConnectionMongodbatlasArgsDict']] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
1162
+ :param pulumi.Input[Union['SecretBackendConnectionMssqlArgs', 'SecretBackendConnectionMssqlArgsDict']] mssql: A nested block containing configuration options for MSSQL connections.
1163
+ :param pulumi.Input[Union['SecretBackendConnectionMysqlArgs', 'SecretBackendConnectionMysqlArgsDict']] mysql: A nested block containing configuration options for MySQL connections.
1164
+ :param pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']] mysql_aurora: A nested block containing configuration options for Aurora MySQL connections.
1165
+ :param pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']] mysql_legacy: A nested block containing configuration options for legacy MySQL connections.
1166
+ :param pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
1162
1167
  :param pulumi.Input[str] name: A unique name to give the database connection.
1163
1168
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1164
1169
  The value should not contain leading or trailing forward slashes.
1165
1170
  The `namespace` is always relative to the provider's configured namespace.
1166
1171
  *Available only for Vault Enterprise*.
1167
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionOracleArgs']] oracle: A nested block containing configuration options for Oracle connections.
1172
+ :param pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']] oracle: A nested block containing configuration options for Oracle connections.
1168
1173
  :param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
1169
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionPostgresqlArgs']] postgresql: A nested block containing configuration options for PostgreSQL connections.
1170
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionRedisArgs']] redis: A nested block containing configuration options for Redis connections.
1171
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionRedisElasticacheArgs']] redis_elasticache: A nested block containing configuration options for Redis ElastiCache connections.
1174
+ :param pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']] postgresql: A nested block containing configuration options for PostgreSQL connections.
1175
+ :param pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']] redis: A nested block containing configuration options for Redis connections.
1176
+ :param pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']] redis_elasticache: A nested block containing configuration options for Redis ElastiCache connections.
1172
1177
 
1173
1178
  Exactly one of the nested blocks of configuration options must be supplied.
1174
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionRedshiftArgs']] redshift: Connection parameters for the redshift-database-plugin plugin.
1179
+ :param pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']] redshift: Connection parameters for the redshift-database-plugin plugin.
1175
1180
  :param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
1176
- :param pulumi.Input[pulumi.InputType['SecretBackendConnectionSnowflakeArgs']] snowflake: A nested block containing configuration options for Snowflake connections.
1181
+ :param pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']] snowflake: A nested block containing configuration options for Snowflake connections.
1177
1182
  :param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
1178
1183
  initial configuration or not.
1179
1184
  """
@@ -1244,7 +1249,7 @@ class SecretBackendConnection(pulumi.CustomResource):
1244
1249
 
1245
1250
  @property
1246
1251
  @pulumi.getter
1247
- def data(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
1252
+ def data(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1248
1253
  """
1249
1254
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
1250
1255
  """
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
@@ -17,7 +22,7 @@ class SecretBackendRoleArgs:
17
22
  backend: pulumi.Input[str],
18
23
  creation_statements: pulumi.Input[Sequence[pulumi.Input[str]]],
19
24
  db_name: pulumi.Input[str],
20
- credential_config: Optional[pulumi.Input[Mapping[str, Any]]] = None,
25
+ credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
21
26
  credential_type: Optional[pulumi.Input[str]] = None,
22
27
  default_ttl: Optional[pulumi.Input[int]] = None,
23
28
  max_ttl: Optional[pulumi.Input[int]] = None,
@@ -33,7 +38,7 @@ class SecretBackendRoleArgs:
33
38
  creating a user.
34
39
  :param pulumi.Input[str] db_name: The unique name of the database connection to use for
35
40
  the role.
36
- :param pulumi.Input[Mapping[str, Any]] credential_config: Specifies the configuration
41
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] credential_config: Specifies the configuration
37
42
  for the given `credential_type`.
38
43
 
39
44
  The following options are available for each `credential_type` value:
@@ -118,7 +123,7 @@ class SecretBackendRoleArgs:
118
123
 
119
124
  @property
120
125
  @pulumi.getter(name="credentialConfig")
121
- def credential_config(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
126
+ def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
122
127
  """
123
128
  Specifies the configuration
124
129
  for the given `credential_type`.
@@ -128,7 +133,7 @@ class SecretBackendRoleArgs:
128
133
  return pulumi.get(self, "credential_config")
129
134
 
130
135
  @credential_config.setter
131
- def credential_config(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
136
+ def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
132
137
  pulumi.set(self, "credential_config", value)
133
138
 
134
139
  @property
@@ -243,7 +248,7 @@ class _SecretBackendRoleState:
243
248
  def __init__(__self__, *,
244
249
  backend: Optional[pulumi.Input[str]] = None,
245
250
  creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
246
- credential_config: Optional[pulumi.Input[Mapping[str, Any]]] = None,
251
+ credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
247
252
  credential_type: Optional[pulumi.Input[str]] = None,
248
253
  db_name: Optional[pulumi.Input[str]] = None,
249
254
  default_ttl: Optional[pulumi.Input[int]] = None,
@@ -258,7 +263,7 @@ class _SecretBackendRoleState:
258
263
  :param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
259
264
  :param pulumi.Input[Sequence[pulumi.Input[str]]] creation_statements: The database statements to execute when
260
265
  creating a user.
261
- :param pulumi.Input[Mapping[str, Any]] credential_config: Specifies the configuration
266
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] credential_config: Specifies the configuration
262
267
  for the given `credential_type`.
263
268
 
264
269
  The following options are available for each `credential_type` value:
@@ -335,7 +340,7 @@ class _SecretBackendRoleState:
335
340
 
336
341
  @property
337
342
  @pulumi.getter(name="credentialConfig")
338
- def credential_config(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
343
+ def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
339
344
  """
340
345
  Specifies the configuration
341
346
  for the given `credential_type`.
@@ -345,7 +350,7 @@ class _SecretBackendRoleState:
345
350
  return pulumi.get(self, "credential_config")
346
351
 
347
352
  @credential_config.setter
348
- def credential_config(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
353
+ def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
349
354
  pulumi.set(self, "credential_config", value)
350
355
 
351
356
  @property
@@ -475,7 +480,7 @@ class SecretBackendRole(pulumi.CustomResource):
475
480
  opts: Optional[pulumi.ResourceOptions] = None,
476
481
  backend: Optional[pulumi.Input[str]] = None,
477
482
  creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
478
- credential_config: Optional[pulumi.Input[Mapping[str, Any]]] = None,
483
+ credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
479
484
  credential_type: Optional[pulumi.Input[str]] = None,
480
485
  db_name: Optional[pulumi.Input[str]] = None,
481
486
  default_ttl: Optional[pulumi.Input[int]] = None,
@@ -503,9 +508,9 @@ class SecretBackendRole(pulumi.CustomResource):
503
508
  "dev",
504
509
  "prod",
505
510
  ],
506
- postgresql=vault.database.SecretBackendConnectionPostgresqlArgs(
507
- connection_url="postgres://username:password@host:port/database",
508
- ))
511
+ postgresql={
512
+ "connection_url": "postgres://username:password@host:port/database",
513
+ })
509
514
  role = vault.database.SecretBackendRole("role",
510
515
  backend=db.path,
511
516
  name="dev",
@@ -526,7 +531,7 @@ class SecretBackendRole(pulumi.CustomResource):
526
531
  :param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
527
532
  :param pulumi.Input[Sequence[pulumi.Input[str]]] creation_statements: The database statements to execute when
528
533
  creating a user.
529
- :param pulumi.Input[Mapping[str, Any]] credential_config: Specifies the configuration
534
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] credential_config: Specifies the configuration
530
535
  for the given `credential_type`.
531
536
 
532
537
  The following options are available for each `credential_type` value:
@@ -574,9 +579,9 @@ class SecretBackendRole(pulumi.CustomResource):
574
579
  "dev",
575
580
  "prod",
576
581
  ],
577
- postgresql=vault.database.SecretBackendConnectionPostgresqlArgs(
578
- connection_url="postgres://username:password@host:port/database",
579
- ))
582
+ postgresql={
583
+ "connection_url": "postgres://username:password@host:port/database",
584
+ })
580
585
  role = vault.database.SecretBackendRole("role",
581
586
  backend=db.path,
582
587
  name="dev",
@@ -609,7 +614,7 @@ class SecretBackendRole(pulumi.CustomResource):
609
614
  opts: Optional[pulumi.ResourceOptions] = None,
610
615
  backend: Optional[pulumi.Input[str]] = None,
611
616
  creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
612
- credential_config: Optional[pulumi.Input[Mapping[str, Any]]] = None,
617
+ credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
613
618
  credential_type: Optional[pulumi.Input[str]] = None,
614
619
  db_name: Optional[pulumi.Input[str]] = None,
615
620
  default_ttl: Optional[pulumi.Input[int]] = None,
@@ -658,7 +663,7 @@ class SecretBackendRole(pulumi.CustomResource):
658
663
  opts: Optional[pulumi.ResourceOptions] = None,
659
664
  backend: Optional[pulumi.Input[str]] = None,
660
665
  creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
661
- credential_config: Optional[pulumi.Input[Mapping[str, Any]]] = None,
666
+ credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
662
667
  credential_type: Optional[pulumi.Input[str]] = None,
663
668
  db_name: Optional[pulumi.Input[str]] = None,
664
669
  default_ttl: Optional[pulumi.Input[int]] = None,
@@ -678,7 +683,7 @@ class SecretBackendRole(pulumi.CustomResource):
678
683
  :param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
679
684
  :param pulumi.Input[Sequence[pulumi.Input[str]]] creation_statements: The database statements to execute when
680
685
  creating a user.
681
- :param pulumi.Input[Mapping[str, Any]] credential_config: Specifies the configuration
686
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] credential_config: Specifies the configuration
682
687
  for the given `credential_type`.
683
688
 
684
689
  The following options are available for each `credential_type` value:
@@ -740,7 +745,7 @@ class SecretBackendRole(pulumi.CustomResource):
740
745
 
741
746
  @property
742
747
  @pulumi.getter(name="credentialConfig")
743
- def credential_config(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
748
+ def credential_config(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
744
749
  """
745
750
  Specifies the configuration
746
751
  for the given `credential_type`.
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
@@ -381,9 +386,9 @@ class SecretBackendStaticRole(pulumi.CustomResource):
381
386
  backend=db.path,
382
387
  name="postgres",
383
388
  allowed_roles=["*"],
384
- postgresql=vault.database.SecretBackendConnectionPostgresqlArgs(
385
- connection_url="postgres://username:password@host:port/database",
386
- ))
389
+ postgresql={
390
+ "connection_url": "postgres://username:password@host:port/database",
391
+ })
387
392
  # configure a static role with period-based rotations
388
393
  period_role = vault.database.SecretBackendStaticRole("period_role",
389
394
  backend=db.path,
@@ -456,9 +461,9 @@ class SecretBackendStaticRole(pulumi.CustomResource):
456
461
  backend=db.path,
457
462
  name="postgres",
458
463
  allowed_roles=["*"],
459
- postgresql=vault.database.SecretBackendConnectionPostgresqlArgs(
460
- connection_url="postgres://username:password@host:port/database",
461
- ))
464
+ postgresql={
465
+ "connection_url": "postgres://username:password@host:port/database",
466
+ })
462
467
  # configure a static role with period-based rotations
463
468
  period_role = vault.database.SecretBackendStaticRole("period_role",
464
469
  backend=db.path,