pulumi-vault 6.3.0a1723010642__py3-none-any.whl → 6.3.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +19 -4
- pulumi_vault/ad/secret_backend.py +5 -0
- pulumi_vault/ad/secret_library.py +5 -0
- pulumi_vault/ad/secret_role.py +5 -0
- pulumi_vault/alicloud/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_login.py +5 -0
- pulumi_vault/approle/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
- pulumi_vault/audit.py +5 -0
- pulumi_vault/audit_request_header.py +5 -0
- pulumi_vault/auth_backend.py +10 -5
- pulumi_vault/aws/auth_backend_cert.py +5 -0
- pulumi_vault/aws/auth_backend_client.py +5 -0
- pulumi_vault/aws/auth_backend_config_identity.py +5 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
- pulumi_vault/aws/auth_backend_login.py +12 -7
- pulumi_vault/aws/auth_backend_role.py +5 -0
- pulumi_vault/aws/auth_backend_role_tag.py +5 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
- pulumi_vault/aws/auth_backend_sts_role.py +5 -0
- pulumi_vault/aws/get_access_credentials.py +31 -4
- pulumi_vault/aws/get_static_access_credentials.py +18 -4
- pulumi_vault/aws/secret_backend.py +5 -0
- pulumi_vault/aws/secret_backend_role.py +120 -0
- pulumi_vault/aws/secret_backend_static_role.py +5 -0
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +5 -0
- pulumi_vault/azure/auth_backend_role.py +5 -0
- pulumi_vault/azure/backend.py +5 -0
- pulumi_vault/azure/backend_role.py +23 -18
- pulumi_vault/azure/get_access_credentials.py +36 -4
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +5 -0
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +21 -0
- pulumi_vault/config/outputs.py +5 -0
- pulumi_vault/config/ui_custom_message.py +24 -19
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +5 -0
- pulumi_vault/consul/secret_backend_role.py +5 -0
- pulumi_vault/database/_inputs.py +2091 -140
- pulumi_vault/database/outputs.py +59 -54
- pulumi_vault/database/secret_backend_connection.py +115 -110
- pulumi_vault/database/secret_backend_role.py +25 -20
- pulumi_vault/database/secret_backend_static_role.py +11 -6
- pulumi_vault/database/secrets_mount.py +139 -134
- pulumi_vault/egp_policy.py +5 -0
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +15 -10
- pulumi_vault/gcp/auth_backend_role.py +5 -0
- pulumi_vault/gcp/get_auth_backend_role.py +42 -4
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +5 -0
- pulumi_vault/gcp/secret_impersonated_account.py +5 -0
- pulumi_vault/gcp/secret_roleset.py +18 -13
- pulumi_vault/gcp/secret_static_account.py +18 -13
- pulumi_vault/generic/endpoint.py +5 -0
- pulumi_vault/generic/get_secret.py +25 -5
- pulumi_vault/generic/secret.py +12 -7
- pulumi_vault/get_auth_backend.py +21 -4
- pulumi_vault/get_auth_backends.py +16 -4
- pulumi_vault/get_namespace.py +18 -5
- pulumi_vault/get_namespaces.py +13 -4
- pulumi_vault/get_nomad_access_token.py +28 -8
- pulumi_vault/get_policy_document.py +27 -16
- pulumi_vault/get_raft_autopilot_state.py +26 -7
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +10 -5
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +5 -0
- pulumi_vault/github/user.py +5 -0
- pulumi_vault/identity/entity.py +5 -0
- pulumi_vault/identity/entity_alias.py +5 -0
- pulumi_vault/identity/entity_policies.py +5 -0
- pulumi_vault/identity/get_entity.py +37 -7
- pulumi_vault/identity/get_group.py +42 -6
- pulumi_vault/identity/get_oidc_client_creds.py +16 -4
- pulumi_vault/identity/get_oidc_openid_config.py +26 -4
- pulumi_vault/identity/get_oidc_public_keys.py +16 -5
- pulumi_vault/identity/group.py +5 -0
- pulumi_vault/identity/group_alias.py +5 -0
- pulumi_vault/identity/group_member_entity_ids.py +5 -0
- pulumi_vault/identity/group_member_group_ids.py +5 -0
- pulumi_vault/identity/group_policies.py +5 -0
- pulumi_vault/identity/mfa_duo.py +5 -0
- pulumi_vault/identity/mfa_login_enforcement.py +5 -0
- pulumi_vault/identity/mfa_okta.py +5 -0
- pulumi_vault/identity/mfa_pingid.py +5 -0
- pulumi_vault/identity/mfa_totp.py +5 -0
- pulumi_vault/identity/oidc.py +5 -0
- pulumi_vault/identity/oidc_assignment.py +5 -0
- pulumi_vault/identity/oidc_client.py +5 -0
- pulumi_vault/identity/oidc_key.py +5 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
- pulumi_vault/identity/oidc_provider.py +5 -0
- pulumi_vault/identity/oidc_role.py +5 -0
- pulumi_vault/identity/oidc_scope.py +5 -0
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +14 -9
- pulumi_vault/jwt/auth_backend_role.py +33 -28
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +5 -0
- pulumi_vault/kmip/secret_role.py +5 -0
- pulumi_vault/kmip/secret_scope.py +5 -0
- pulumi_vault/kubernetes/auth_backend_config.py +5 -0
- pulumi_vault/kubernetes/auth_backend_role.py +5 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
- pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
- pulumi_vault/kubernetes/get_service_account_token.py +28 -4
- pulumi_vault/kubernetes/secret_backend.py +19 -14
- pulumi_vault/kubernetes/secret_backend_role.py +5 -0
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +20 -5
- pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
- pulumi_vault/kv/get_secret_v2.py +27 -6
- pulumi_vault/kv/get_secrets_list.py +15 -4
- pulumi_vault/kv/get_secrets_list_v2.py +18 -4
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +12 -7
- pulumi_vault/kv/secret_backend_v2.py +5 -0
- pulumi_vault/kv/secret_v2.py +46 -41
- pulumi_vault/ldap/auth_backend.py +5 -0
- pulumi_vault/ldap/auth_backend_group.py +5 -0
- pulumi_vault/ldap/auth_backend_user.py +5 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
- pulumi_vault/ldap/get_static_credentials.py +23 -4
- pulumi_vault/ldap/secret_backend.py +19 -14
- pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
- pulumi_vault/ldap/secret_backend_library_set.py +5 -0
- pulumi_vault/ldap/secret_backend_static_role.py +5 -0
- pulumi_vault/managed/_inputs.py +205 -0
- pulumi_vault/managed/keys.py +20 -15
- pulumi_vault/managed/outputs.py +5 -0
- pulumi_vault/mfa_duo.py +5 -0
- pulumi_vault/mfa_okta.py +5 -0
- pulumi_vault/mfa_pingid.py +5 -0
- pulumi_vault/mfa_totp.py +5 -0
- pulumi_vault/mongodbatlas/secret_backend.py +5 -0
- pulumi_vault/mongodbatlas/secret_role.py +5 -0
- pulumi_vault/mount.py +35 -23
- pulumi_vault/namespace.py +19 -14
- pulumi_vault/nomad_secret_backend.py +5 -0
- pulumi_vault/nomad_secret_role.py +5 -0
- pulumi_vault/okta/_inputs.py +39 -0
- pulumi_vault/okta/auth_backend.py +31 -26
- pulumi_vault/okta/auth_backend_group.py +5 -0
- pulumi_vault/okta/auth_backend_user.py +5 -0
- pulumi_vault/okta/outputs.py +5 -0
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +5 -0
- pulumi_vault/pkisecret/_inputs.py +49 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
- pulumi_vault/pkisecret/backend_config_est.py +24 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
- pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
- pulumi_vault/pkisecret/get_backend_key.py +19 -4
- pulumi_vault/pkisecret/get_backend_keys.py +18 -5
- pulumi_vault/pkisecret/outputs.py +17 -12
- pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
- pulumi_vault/pkisecret/secret_backend_key.py +5 -0
- pulumi_vault/pkisecret/secret_backend_role.py +10 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
- pulumi_vault/plugin.py +5 -0
- pulumi_vault/plugin_pinned_version.py +5 -0
- pulumi_vault/policy.py +5 -0
- pulumi_vault/provider.py +47 -42
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +5 -0
- pulumi_vault/quota_rate_limit.py +5 -0
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +5 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
- pulumi_vault/raft_autopilot.py +5 -0
- pulumi_vault/raft_snapshot_agent_config.py +5 -0
- pulumi_vault/rgp_policy.py +5 -0
- pulumi_vault/saml/auth_backend.py +5 -0
- pulumi_vault/saml/auth_backend_role.py +19 -14
- pulumi_vault/secrets/_inputs.py +30 -0
- pulumi_vault/secrets/outputs.py +5 -0
- pulumi_vault/secrets/sync_association.py +7 -2
- pulumi_vault/secrets/sync_aws_destination.py +19 -14
- pulumi_vault/secrets/sync_azure_destination.py +19 -14
- pulumi_vault/secrets/sync_config.py +5 -0
- pulumi_vault/secrets/sync_gcp_destination.py +19 -14
- pulumi_vault/secrets/sync_gh_destination.py +5 -0
- pulumi_vault/secrets/sync_github_apps.py +5 -0
- pulumi_vault/secrets/sync_vercel_destination.py +5 -0
- pulumi_vault/ssh/_inputs.py +22 -0
- pulumi_vault/ssh/outputs.py +5 -0
- pulumi_vault/ssh/secret_backend_ca.py +5 -0
- pulumi_vault/ssh/secret_backend_role.py +38 -33
- pulumi_vault/terraformcloud/secret_backend.py +5 -0
- pulumi_vault/terraformcloud/secret_creds.py +5 -0
- pulumi_vault/terraformcloud/secret_role.py +5 -0
- pulumi_vault/token.py +5 -0
- pulumi_vault/tokenauth/auth_backend_role.py +5 -14
- pulumi_vault/transform/alphabet.py +5 -0
- pulumi_vault/transform/get_decode.py +38 -14
- pulumi_vault/transform/get_encode.py +38 -14
- pulumi_vault/transform/role.py +5 -0
- pulumi_vault/transform/template.py +19 -14
- pulumi_vault/transform/transformation.py +5 -0
- pulumi_vault/transit/get_decrypt.py +21 -4
- pulumi_vault/transit/get_encrypt.py +23 -4
- pulumi_vault/transit/secret_backend_key.py +12 -7
- pulumi_vault/transit/secret_cache_config.py +5 -0
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/METADATA +3 -2
- pulumi_vault-6.3.1.dist-info/RECORD +256 -0
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/WHEEL +1 -1
- pulumi_vault-6.3.0a1723010642.dist-info/RECORD +0 -256
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -20,7 +25,7 @@ class SecretBackendConnectionArgs:
|
|
20
25
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
21
26
|
cassandra: Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']] = None,
|
22
27
|
couchbase: Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']] = None,
|
23
|
-
data: Optional[pulumi.Input[Mapping[str,
|
28
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
24
29
|
elasticsearch: Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']] = None,
|
25
30
|
hana: Optional[pulumi.Input['SecretBackendConnectionHanaArgs']] = None,
|
26
31
|
influxdb: Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']] = None,
|
@@ -49,7 +54,7 @@ class SecretBackendConnectionArgs:
|
|
49
54
|
connection.
|
50
55
|
:param pulumi.Input['SecretBackendConnectionCassandraArgs'] cassandra: A nested block containing configuration options for Cassandra connections.
|
51
56
|
:param pulumi.Input['SecretBackendConnectionCouchbaseArgs'] couchbase: A nested block containing configuration options for Couchbase connections.
|
52
|
-
:param pulumi.Input[Mapping[str,
|
57
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
53
58
|
:param pulumi.Input['SecretBackendConnectionElasticsearchArgs'] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
|
54
59
|
:param pulumi.Input['SecretBackendConnectionHanaArgs'] hana: A nested block containing configuration options for SAP HanaDB connections.
|
55
60
|
:param pulumi.Input['SecretBackendConnectionInfluxdbArgs'] influxdb: A nested block containing configuration options for InfluxDB connections.
|
@@ -181,14 +186,14 @@ class SecretBackendConnectionArgs:
|
|
181
186
|
|
182
187
|
@property
|
183
188
|
@pulumi.getter
|
184
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
189
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
185
190
|
"""
|
186
191
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
187
192
|
"""
|
188
193
|
return pulumi.get(self, "data")
|
189
194
|
|
190
195
|
@data.setter
|
191
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
196
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
192
197
|
pulumi.set(self, "data", value)
|
193
198
|
|
194
199
|
@property
|
@@ -457,7 +462,7 @@ class _SecretBackendConnectionState:
|
|
457
462
|
backend: Optional[pulumi.Input[str]] = None,
|
458
463
|
cassandra: Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']] = None,
|
459
464
|
couchbase: Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']] = None,
|
460
|
-
data: Optional[pulumi.Input[Mapping[str,
|
465
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
461
466
|
elasticsearch: Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']] = None,
|
462
467
|
hana: Optional[pulumi.Input['SecretBackendConnectionHanaArgs']] = None,
|
463
468
|
influxdb: Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']] = None,
|
@@ -486,7 +491,7 @@ class _SecretBackendConnectionState:
|
|
486
491
|
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
487
492
|
:param pulumi.Input['SecretBackendConnectionCassandraArgs'] cassandra: A nested block containing configuration options for Cassandra connections.
|
488
493
|
:param pulumi.Input['SecretBackendConnectionCouchbaseArgs'] couchbase: A nested block containing configuration options for Couchbase connections.
|
489
|
-
:param pulumi.Input[Mapping[str,
|
494
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
490
495
|
:param pulumi.Input['SecretBackendConnectionElasticsearchArgs'] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
|
491
496
|
:param pulumi.Input['SecretBackendConnectionHanaArgs'] hana: A nested block containing configuration options for SAP HanaDB connections.
|
492
497
|
:param pulumi.Input['SecretBackendConnectionInfluxdbArgs'] influxdb: A nested block containing configuration options for InfluxDB connections.
|
@@ -619,14 +624,14 @@ class _SecretBackendConnectionState:
|
|
619
624
|
|
620
625
|
@property
|
621
626
|
@pulumi.getter
|
622
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
627
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
623
628
|
"""
|
624
629
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
625
630
|
"""
|
626
631
|
return pulumi.get(self, "data")
|
627
632
|
|
628
633
|
@data.setter
|
629
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
634
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
630
635
|
pulumi.set(self, "data", value)
|
631
636
|
|
632
637
|
@property
|
@@ -895,29 +900,29 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
895
900
|
opts: Optional[pulumi.ResourceOptions] = None,
|
896
901
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
897
902
|
backend: Optional[pulumi.Input[str]] = None,
|
898
|
-
cassandra: Optional[pulumi.Input[
|
899
|
-
couchbase: Optional[pulumi.Input[
|
900
|
-
data: Optional[pulumi.Input[Mapping[str,
|
901
|
-
elasticsearch: Optional[pulumi.Input[
|
902
|
-
hana: Optional[pulumi.Input[
|
903
|
-
influxdb: Optional[pulumi.Input[
|
904
|
-
mongodb: Optional[pulumi.Input[
|
905
|
-
mongodbatlas: Optional[pulumi.Input[
|
906
|
-
mssql: Optional[pulumi.Input[
|
907
|
-
mysql: Optional[pulumi.Input[
|
908
|
-
mysql_aurora: Optional[pulumi.Input[
|
909
|
-
mysql_legacy: Optional[pulumi.Input[
|
910
|
-
mysql_rds: Optional[pulumi.Input[
|
903
|
+
cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
|
904
|
+
couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
|
905
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
906
|
+
elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
|
907
|
+
hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
|
908
|
+
influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
|
909
|
+
mongodb: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbArgs', 'SecretBackendConnectionMongodbArgsDict']]] = None,
|
910
|
+
mongodbatlas: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbatlasArgs', 'SecretBackendConnectionMongodbatlasArgsDict']]] = None,
|
911
|
+
mssql: Optional[pulumi.Input[Union['SecretBackendConnectionMssqlArgs', 'SecretBackendConnectionMssqlArgsDict']]] = None,
|
912
|
+
mysql: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlArgs', 'SecretBackendConnectionMysqlArgsDict']]] = None,
|
913
|
+
mysql_aurora: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']]] = None,
|
914
|
+
mysql_legacy: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']]] = None,
|
915
|
+
mysql_rds: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']]] = None,
|
911
916
|
name: Optional[pulumi.Input[str]] = None,
|
912
917
|
namespace: Optional[pulumi.Input[str]] = None,
|
913
|
-
oracle: Optional[pulumi.Input[
|
918
|
+
oracle: Optional[pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']]] = None,
|
914
919
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
915
|
-
postgresql: Optional[pulumi.Input[
|
916
|
-
redis: Optional[pulumi.Input[
|
917
|
-
redis_elasticache: Optional[pulumi.Input[
|
918
|
-
redshift: Optional[pulumi.Input[
|
920
|
+
postgresql: Optional[pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']]] = None,
|
921
|
+
redis: Optional[pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']]] = None,
|
922
|
+
redis_elasticache: Optional[pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']]] = None,
|
923
|
+
redshift: Optional[pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']]] = None,
|
919
924
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
920
|
-
snowflake: Optional[pulumi.Input[
|
925
|
+
snowflake: Optional[pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']]] = None,
|
921
926
|
verify_connection: Optional[pulumi.Input[bool]] = None,
|
922
927
|
__props__=None):
|
923
928
|
"""
|
@@ -937,9 +942,9 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
937
942
|
"dev",
|
938
943
|
"prod",
|
939
944
|
],
|
940
|
-
postgresql=
|
941
|
-
connection_url
|
942
|
-
)
|
945
|
+
postgresql={
|
946
|
+
"connection_url": "postgres://username:password@host:port/database",
|
947
|
+
})
|
943
948
|
```
|
944
949
|
|
945
950
|
## Import
|
@@ -955,34 +960,34 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
955
960
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
956
961
|
connection.
|
957
962
|
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
958
|
-
:param pulumi.Input[
|
959
|
-
:param pulumi.Input[
|
960
|
-
:param pulumi.Input[Mapping[str,
|
961
|
-
:param pulumi.Input[
|
962
|
-
:param pulumi.Input[
|
963
|
-
:param pulumi.Input[
|
964
|
-
:param pulumi.Input[
|
965
|
-
:param pulumi.Input[
|
966
|
-
:param pulumi.Input[
|
967
|
-
:param pulumi.Input[
|
968
|
-
:param pulumi.Input[
|
969
|
-
:param pulumi.Input[
|
970
|
-
:param pulumi.Input[
|
963
|
+
:param pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']] cassandra: A nested block containing configuration options for Cassandra connections.
|
964
|
+
:param pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']] couchbase: A nested block containing configuration options for Couchbase connections.
|
965
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
966
|
+
:param pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
|
967
|
+
:param pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']] hana: A nested block containing configuration options for SAP HanaDB connections.
|
968
|
+
:param pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']] influxdb: A nested block containing configuration options for InfluxDB connections.
|
969
|
+
:param pulumi.Input[Union['SecretBackendConnectionMongodbArgs', 'SecretBackendConnectionMongodbArgsDict']] mongodb: A nested block containing configuration options for MongoDB connections.
|
970
|
+
:param pulumi.Input[Union['SecretBackendConnectionMongodbatlasArgs', 'SecretBackendConnectionMongodbatlasArgsDict']] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
|
971
|
+
:param pulumi.Input[Union['SecretBackendConnectionMssqlArgs', 'SecretBackendConnectionMssqlArgsDict']] mssql: A nested block containing configuration options for MSSQL connections.
|
972
|
+
:param pulumi.Input[Union['SecretBackendConnectionMysqlArgs', 'SecretBackendConnectionMysqlArgsDict']] mysql: A nested block containing configuration options for MySQL connections.
|
973
|
+
:param pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']] mysql_aurora: A nested block containing configuration options for Aurora MySQL connections.
|
974
|
+
:param pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']] mysql_legacy: A nested block containing configuration options for legacy MySQL connections.
|
975
|
+
:param pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
|
971
976
|
:param pulumi.Input[str] name: A unique name to give the database connection.
|
972
977
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
973
978
|
The value should not contain leading or trailing forward slashes.
|
974
979
|
The `namespace` is always relative to the provider's configured namespace.
|
975
980
|
*Available only for Vault Enterprise*.
|
976
|
-
:param pulumi.Input[
|
981
|
+
:param pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']] oracle: A nested block containing configuration options for Oracle connections.
|
977
982
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
978
|
-
:param pulumi.Input[
|
979
|
-
:param pulumi.Input[
|
980
|
-
:param pulumi.Input[
|
983
|
+
:param pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']] postgresql: A nested block containing configuration options for PostgreSQL connections.
|
984
|
+
:param pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']] redis: A nested block containing configuration options for Redis connections.
|
985
|
+
:param pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']] redis_elasticache: A nested block containing configuration options for Redis ElastiCache connections.
|
981
986
|
|
982
987
|
Exactly one of the nested blocks of configuration options must be supplied.
|
983
|
-
:param pulumi.Input[
|
988
|
+
:param pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']] redshift: Connection parameters for the redshift-database-plugin plugin.
|
984
989
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
985
|
-
:param pulumi.Input[
|
990
|
+
:param pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']] snowflake: A nested block containing configuration options for Snowflake connections.
|
986
991
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
987
992
|
initial configuration or not.
|
988
993
|
"""
|
@@ -1009,9 +1014,9 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1009
1014
|
"dev",
|
1010
1015
|
"prod",
|
1011
1016
|
],
|
1012
|
-
postgresql=
|
1013
|
-
connection_url
|
1014
|
-
)
|
1017
|
+
postgresql={
|
1018
|
+
"connection_url": "postgres://username:password@host:port/database",
|
1019
|
+
})
|
1015
1020
|
```
|
1016
1021
|
|
1017
1022
|
## Import
|
@@ -1039,29 +1044,29 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1039
1044
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1040
1045
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1041
1046
|
backend: Optional[pulumi.Input[str]] = None,
|
1042
|
-
cassandra: Optional[pulumi.Input[
|
1043
|
-
couchbase: Optional[pulumi.Input[
|
1044
|
-
data: Optional[pulumi.Input[Mapping[str,
|
1045
|
-
elasticsearch: Optional[pulumi.Input[
|
1046
|
-
hana: Optional[pulumi.Input[
|
1047
|
-
influxdb: Optional[pulumi.Input[
|
1048
|
-
mongodb: Optional[pulumi.Input[
|
1049
|
-
mongodbatlas: Optional[pulumi.Input[
|
1050
|
-
mssql: Optional[pulumi.Input[
|
1051
|
-
mysql: Optional[pulumi.Input[
|
1052
|
-
mysql_aurora: Optional[pulumi.Input[
|
1053
|
-
mysql_legacy: Optional[pulumi.Input[
|
1054
|
-
mysql_rds: Optional[pulumi.Input[
|
1047
|
+
cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
|
1048
|
+
couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
|
1049
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
1050
|
+
elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
|
1051
|
+
hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
|
1052
|
+
influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
|
1053
|
+
mongodb: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbArgs', 'SecretBackendConnectionMongodbArgsDict']]] = None,
|
1054
|
+
mongodbatlas: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbatlasArgs', 'SecretBackendConnectionMongodbatlasArgsDict']]] = None,
|
1055
|
+
mssql: Optional[pulumi.Input[Union['SecretBackendConnectionMssqlArgs', 'SecretBackendConnectionMssqlArgsDict']]] = None,
|
1056
|
+
mysql: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlArgs', 'SecretBackendConnectionMysqlArgsDict']]] = None,
|
1057
|
+
mysql_aurora: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']]] = None,
|
1058
|
+
mysql_legacy: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']]] = None,
|
1059
|
+
mysql_rds: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']]] = None,
|
1055
1060
|
name: Optional[pulumi.Input[str]] = None,
|
1056
1061
|
namespace: Optional[pulumi.Input[str]] = None,
|
1057
|
-
oracle: Optional[pulumi.Input[
|
1062
|
+
oracle: Optional[pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']]] = None,
|
1058
1063
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
1059
|
-
postgresql: Optional[pulumi.Input[
|
1060
|
-
redis: Optional[pulumi.Input[
|
1061
|
-
redis_elasticache: Optional[pulumi.Input[
|
1062
|
-
redshift: Optional[pulumi.Input[
|
1064
|
+
postgresql: Optional[pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']]] = None,
|
1065
|
+
redis: Optional[pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']]] = None,
|
1066
|
+
redis_elasticache: Optional[pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']]] = None,
|
1067
|
+
redshift: Optional[pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']]] = None,
|
1063
1068
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1064
|
-
snowflake: Optional[pulumi.Input[
|
1069
|
+
snowflake: Optional[pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']]] = None,
|
1065
1070
|
verify_connection: Optional[pulumi.Input[bool]] = None,
|
1066
1071
|
__props__=None):
|
1067
1072
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -1112,29 +1117,29 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1112
1117
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1113
1118
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1114
1119
|
backend: Optional[pulumi.Input[str]] = None,
|
1115
|
-
cassandra: Optional[pulumi.Input[
|
1116
|
-
couchbase: Optional[pulumi.Input[
|
1117
|
-
data: Optional[pulumi.Input[Mapping[str,
|
1118
|
-
elasticsearch: Optional[pulumi.Input[
|
1119
|
-
hana: Optional[pulumi.Input[
|
1120
|
-
influxdb: Optional[pulumi.Input[
|
1121
|
-
mongodb: Optional[pulumi.Input[
|
1122
|
-
mongodbatlas: Optional[pulumi.Input[
|
1123
|
-
mssql: Optional[pulumi.Input[
|
1124
|
-
mysql: Optional[pulumi.Input[
|
1125
|
-
mysql_aurora: Optional[pulumi.Input[
|
1126
|
-
mysql_legacy: Optional[pulumi.Input[
|
1127
|
-
mysql_rds: Optional[pulumi.Input[
|
1120
|
+
cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
|
1121
|
+
couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
|
1122
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
1123
|
+
elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
|
1124
|
+
hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
|
1125
|
+
influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
|
1126
|
+
mongodb: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbArgs', 'SecretBackendConnectionMongodbArgsDict']]] = None,
|
1127
|
+
mongodbatlas: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbatlasArgs', 'SecretBackendConnectionMongodbatlasArgsDict']]] = None,
|
1128
|
+
mssql: Optional[pulumi.Input[Union['SecretBackendConnectionMssqlArgs', 'SecretBackendConnectionMssqlArgsDict']]] = None,
|
1129
|
+
mysql: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlArgs', 'SecretBackendConnectionMysqlArgsDict']]] = None,
|
1130
|
+
mysql_aurora: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']]] = None,
|
1131
|
+
mysql_legacy: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']]] = None,
|
1132
|
+
mysql_rds: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']]] = None,
|
1128
1133
|
name: Optional[pulumi.Input[str]] = None,
|
1129
1134
|
namespace: Optional[pulumi.Input[str]] = None,
|
1130
|
-
oracle: Optional[pulumi.Input[
|
1135
|
+
oracle: Optional[pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']]] = None,
|
1131
1136
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
1132
|
-
postgresql: Optional[pulumi.Input[
|
1133
|
-
redis: Optional[pulumi.Input[
|
1134
|
-
redis_elasticache: Optional[pulumi.Input[
|
1135
|
-
redshift: Optional[pulumi.Input[
|
1137
|
+
postgresql: Optional[pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']]] = None,
|
1138
|
+
redis: Optional[pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']]] = None,
|
1139
|
+
redis_elasticache: Optional[pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']]] = None,
|
1140
|
+
redshift: Optional[pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']]] = None,
|
1136
1141
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1137
|
-
snowflake: Optional[pulumi.Input[
|
1142
|
+
snowflake: Optional[pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']]] = None,
|
1138
1143
|
verify_connection: Optional[pulumi.Input[bool]] = None) -> 'SecretBackendConnection':
|
1139
1144
|
"""
|
1140
1145
|
Get an existing SecretBackendConnection resource's state with the given name, id, and optional extra
|
@@ -1146,34 +1151,34 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1146
1151
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
1147
1152
|
connection.
|
1148
1153
|
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
1149
|
-
:param pulumi.Input[
|
1150
|
-
:param pulumi.Input[
|
1151
|
-
:param pulumi.Input[Mapping[str,
|
1152
|
-
:param pulumi.Input[
|
1153
|
-
:param pulumi.Input[
|
1154
|
-
:param pulumi.Input[
|
1155
|
-
:param pulumi.Input[
|
1156
|
-
:param pulumi.Input[
|
1157
|
-
:param pulumi.Input[
|
1158
|
-
:param pulumi.Input[
|
1159
|
-
:param pulumi.Input[
|
1160
|
-
:param pulumi.Input[
|
1161
|
-
:param pulumi.Input[
|
1154
|
+
:param pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']] cassandra: A nested block containing configuration options for Cassandra connections.
|
1155
|
+
:param pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']] couchbase: A nested block containing configuration options for Couchbase connections.
|
1156
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
1157
|
+
:param pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
|
1158
|
+
:param pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']] hana: A nested block containing configuration options for SAP HanaDB connections.
|
1159
|
+
:param pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']] influxdb: A nested block containing configuration options for InfluxDB connections.
|
1160
|
+
:param pulumi.Input[Union['SecretBackendConnectionMongodbArgs', 'SecretBackendConnectionMongodbArgsDict']] mongodb: A nested block containing configuration options for MongoDB connections.
|
1161
|
+
:param pulumi.Input[Union['SecretBackendConnectionMongodbatlasArgs', 'SecretBackendConnectionMongodbatlasArgsDict']] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
|
1162
|
+
:param pulumi.Input[Union['SecretBackendConnectionMssqlArgs', 'SecretBackendConnectionMssqlArgsDict']] mssql: A nested block containing configuration options for MSSQL connections.
|
1163
|
+
:param pulumi.Input[Union['SecretBackendConnectionMysqlArgs', 'SecretBackendConnectionMysqlArgsDict']] mysql: A nested block containing configuration options for MySQL connections.
|
1164
|
+
:param pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']] mysql_aurora: A nested block containing configuration options for Aurora MySQL connections.
|
1165
|
+
:param pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']] mysql_legacy: A nested block containing configuration options for legacy MySQL connections.
|
1166
|
+
:param pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
|
1162
1167
|
:param pulumi.Input[str] name: A unique name to give the database connection.
|
1163
1168
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1164
1169
|
The value should not contain leading or trailing forward slashes.
|
1165
1170
|
The `namespace` is always relative to the provider's configured namespace.
|
1166
1171
|
*Available only for Vault Enterprise*.
|
1167
|
-
:param pulumi.Input[
|
1172
|
+
:param pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']] oracle: A nested block containing configuration options for Oracle connections.
|
1168
1173
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
1169
|
-
:param pulumi.Input[
|
1170
|
-
:param pulumi.Input[
|
1171
|
-
:param pulumi.Input[
|
1174
|
+
:param pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']] postgresql: A nested block containing configuration options for PostgreSQL connections.
|
1175
|
+
:param pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']] redis: A nested block containing configuration options for Redis connections.
|
1176
|
+
:param pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']] redis_elasticache: A nested block containing configuration options for Redis ElastiCache connections.
|
1172
1177
|
|
1173
1178
|
Exactly one of the nested blocks of configuration options must be supplied.
|
1174
|
-
:param pulumi.Input[
|
1179
|
+
:param pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']] redshift: Connection parameters for the redshift-database-plugin plugin.
|
1175
1180
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
1176
|
-
:param pulumi.Input[
|
1181
|
+
:param pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']] snowflake: A nested block containing configuration options for Snowflake connections.
|
1177
1182
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
1178
1183
|
initial configuration or not.
|
1179
1184
|
"""
|
@@ -1244,7 +1249,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1244
1249
|
|
1245
1250
|
@property
|
1246
1251
|
@pulumi.getter
|
1247
|
-
def data(self) -> pulumi.Output[Optional[Mapping[str,
|
1252
|
+
def data(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
1248
1253
|
"""
|
1249
1254
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
1250
1255
|
"""
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
|
@@ -17,7 +22,7 @@ class SecretBackendRoleArgs:
|
|
17
22
|
backend: pulumi.Input[str],
|
18
23
|
creation_statements: pulumi.Input[Sequence[pulumi.Input[str]]],
|
19
24
|
db_name: pulumi.Input[str],
|
20
|
-
credential_config: Optional[pulumi.Input[Mapping[str,
|
25
|
+
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
21
26
|
credential_type: Optional[pulumi.Input[str]] = None,
|
22
27
|
default_ttl: Optional[pulumi.Input[int]] = None,
|
23
28
|
max_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -33,7 +38,7 @@ class SecretBackendRoleArgs:
|
|
33
38
|
creating a user.
|
34
39
|
:param pulumi.Input[str] db_name: The unique name of the database connection to use for
|
35
40
|
the role.
|
36
|
-
:param pulumi.Input[Mapping[str,
|
41
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] credential_config: Specifies the configuration
|
37
42
|
for the given `credential_type`.
|
38
43
|
|
39
44
|
The following options are available for each `credential_type` value:
|
@@ -118,7 +123,7 @@ class SecretBackendRoleArgs:
|
|
118
123
|
|
119
124
|
@property
|
120
125
|
@pulumi.getter(name="credentialConfig")
|
121
|
-
def credential_config(self) -> Optional[pulumi.Input[Mapping[str,
|
126
|
+
def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
122
127
|
"""
|
123
128
|
Specifies the configuration
|
124
129
|
for the given `credential_type`.
|
@@ -128,7 +133,7 @@ class SecretBackendRoleArgs:
|
|
128
133
|
return pulumi.get(self, "credential_config")
|
129
134
|
|
130
135
|
@credential_config.setter
|
131
|
-
def credential_config(self, value: Optional[pulumi.Input[Mapping[str,
|
136
|
+
def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
132
137
|
pulumi.set(self, "credential_config", value)
|
133
138
|
|
134
139
|
@property
|
@@ -243,7 +248,7 @@ class _SecretBackendRoleState:
|
|
243
248
|
def __init__(__self__, *,
|
244
249
|
backend: Optional[pulumi.Input[str]] = None,
|
245
250
|
creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
246
|
-
credential_config: Optional[pulumi.Input[Mapping[str,
|
251
|
+
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
247
252
|
credential_type: Optional[pulumi.Input[str]] = None,
|
248
253
|
db_name: Optional[pulumi.Input[str]] = None,
|
249
254
|
default_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -258,7 +263,7 @@ class _SecretBackendRoleState:
|
|
258
263
|
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
259
264
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] creation_statements: The database statements to execute when
|
260
265
|
creating a user.
|
261
|
-
:param pulumi.Input[Mapping[str,
|
266
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] credential_config: Specifies the configuration
|
262
267
|
for the given `credential_type`.
|
263
268
|
|
264
269
|
The following options are available for each `credential_type` value:
|
@@ -335,7 +340,7 @@ class _SecretBackendRoleState:
|
|
335
340
|
|
336
341
|
@property
|
337
342
|
@pulumi.getter(name="credentialConfig")
|
338
|
-
def credential_config(self) -> Optional[pulumi.Input[Mapping[str,
|
343
|
+
def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
339
344
|
"""
|
340
345
|
Specifies the configuration
|
341
346
|
for the given `credential_type`.
|
@@ -345,7 +350,7 @@ class _SecretBackendRoleState:
|
|
345
350
|
return pulumi.get(self, "credential_config")
|
346
351
|
|
347
352
|
@credential_config.setter
|
348
|
-
def credential_config(self, value: Optional[pulumi.Input[Mapping[str,
|
353
|
+
def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
349
354
|
pulumi.set(self, "credential_config", value)
|
350
355
|
|
351
356
|
@property
|
@@ -475,7 +480,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
475
480
|
opts: Optional[pulumi.ResourceOptions] = None,
|
476
481
|
backend: Optional[pulumi.Input[str]] = None,
|
477
482
|
creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
478
|
-
credential_config: Optional[pulumi.Input[Mapping[str,
|
483
|
+
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
479
484
|
credential_type: Optional[pulumi.Input[str]] = None,
|
480
485
|
db_name: Optional[pulumi.Input[str]] = None,
|
481
486
|
default_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -503,9 +508,9 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
503
508
|
"dev",
|
504
509
|
"prod",
|
505
510
|
],
|
506
|
-
postgresql=
|
507
|
-
connection_url
|
508
|
-
)
|
511
|
+
postgresql={
|
512
|
+
"connection_url": "postgres://username:password@host:port/database",
|
513
|
+
})
|
509
514
|
role = vault.database.SecretBackendRole("role",
|
510
515
|
backend=db.path,
|
511
516
|
name="dev",
|
@@ -526,7 +531,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
526
531
|
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
527
532
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] creation_statements: The database statements to execute when
|
528
533
|
creating a user.
|
529
|
-
:param pulumi.Input[Mapping[str,
|
534
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] credential_config: Specifies the configuration
|
530
535
|
for the given `credential_type`.
|
531
536
|
|
532
537
|
The following options are available for each `credential_type` value:
|
@@ -574,9 +579,9 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
574
579
|
"dev",
|
575
580
|
"prod",
|
576
581
|
],
|
577
|
-
postgresql=
|
578
|
-
connection_url
|
579
|
-
)
|
582
|
+
postgresql={
|
583
|
+
"connection_url": "postgres://username:password@host:port/database",
|
584
|
+
})
|
580
585
|
role = vault.database.SecretBackendRole("role",
|
581
586
|
backend=db.path,
|
582
587
|
name="dev",
|
@@ -609,7 +614,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
609
614
|
opts: Optional[pulumi.ResourceOptions] = None,
|
610
615
|
backend: Optional[pulumi.Input[str]] = None,
|
611
616
|
creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
612
|
-
credential_config: Optional[pulumi.Input[Mapping[str,
|
617
|
+
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
613
618
|
credential_type: Optional[pulumi.Input[str]] = None,
|
614
619
|
db_name: Optional[pulumi.Input[str]] = None,
|
615
620
|
default_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -658,7 +663,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
658
663
|
opts: Optional[pulumi.ResourceOptions] = None,
|
659
664
|
backend: Optional[pulumi.Input[str]] = None,
|
660
665
|
creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
661
|
-
credential_config: Optional[pulumi.Input[Mapping[str,
|
666
|
+
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
662
667
|
credential_type: Optional[pulumi.Input[str]] = None,
|
663
668
|
db_name: Optional[pulumi.Input[str]] = None,
|
664
669
|
default_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -678,7 +683,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
678
683
|
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
679
684
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] creation_statements: The database statements to execute when
|
680
685
|
creating a user.
|
681
|
-
:param pulumi.Input[Mapping[str,
|
686
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] credential_config: Specifies the configuration
|
682
687
|
for the given `credential_type`.
|
683
688
|
|
684
689
|
The following options are available for each `credential_type` value:
|
@@ -740,7 +745,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
740
745
|
|
741
746
|
@property
|
742
747
|
@pulumi.getter(name="credentialConfig")
|
743
|
-
def credential_config(self) -> pulumi.Output[Optional[Mapping[str,
|
748
|
+
def credential_config(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
744
749
|
"""
|
745
750
|
Specifies the configuration
|
746
751
|
for the given `credential_type`.
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
|
@@ -381,9 +386,9 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
381
386
|
backend=db.path,
|
382
387
|
name="postgres",
|
383
388
|
allowed_roles=["*"],
|
384
|
-
postgresql=
|
385
|
-
connection_url
|
386
|
-
)
|
389
|
+
postgresql={
|
390
|
+
"connection_url": "postgres://username:password@host:port/database",
|
391
|
+
})
|
387
392
|
# configure a static role with period-based rotations
|
388
393
|
period_role = vault.database.SecretBackendStaticRole("period_role",
|
389
394
|
backend=db.path,
|
@@ -456,9 +461,9 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
456
461
|
backend=db.path,
|
457
462
|
name="postgres",
|
458
463
|
allowed_roles=["*"],
|
459
|
-
postgresql=
|
460
|
-
connection_url
|
461
|
-
)
|
464
|
+
postgresql={
|
465
|
+
"connection_url": "postgres://username:password@host:port/database",
|
466
|
+
})
|
462
467
|
# configure a static role with period-based rotations
|
463
468
|
period_role = vault.database.SecretBackendStaticRole("period_role",
|
464
469
|
backend=db.path,
|