pulumi-vault 6.3.2a1729803197__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -5
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +7 -12
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +14 -19
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +105 -2056
- pulumi_vault/database/outputs.py +54 -59
- pulumi_vault/database/secret_backend_connection.py +14 -19
- pulumi_vault/database/secret_backend_role.py +14 -19
- pulumi_vault/database/secret_backend_static_role.py +0 -5
- pulumi_vault/database/secrets_mount.py +14 -19
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +0 -5
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +5 -25
- pulumi_vault/generic/secret.py +7 -12
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +5 -18
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +8 -28
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +7 -26
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +5 -35
- pulumi_vault/identity/get_group.py +6 -42
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +5 -16
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +3 -8
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +28 -33
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +0 -5
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +4 -26
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +14 -19
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +4 -36
- pulumi_vault/kv/get_secret.py +5 -20
- pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
- pulumi_vault/kv/get_secret_v2.py +6 -27
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +3 -8
- pulumi_vault/kv/secret.py +7 -12
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +28 -33
- pulumi_vault/ldap/auth_backend.py +0 -5
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +14 -19
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +16 -21
- pulumi_vault/namespace.py +14 -19
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +8 -49
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +14 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +5 -18
- pulumi_vault/pkisecret/outputs.py +12 -17
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +14 -19
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +14 -19
- pulumi_vault/secrets/sync_azure_destination.py +14 -19
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +14 -19
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +28 -33
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +14 -38
- pulumi_vault/transform/get_encode.py +14 -38
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +14 -19
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +7 -12
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
- {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
- pulumi_vault-6.3.2a1729803197.dist-info/RECORD +0 -256
- {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
pulumi_vault/database/outputs.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -2501,7 +2496,7 @@ class SecretsMountCassandra(dict):
|
|
2501
2496
|
name: str,
|
2502
2497
|
allowed_roles: Optional[Sequence[str]] = None,
|
2503
2498
|
connect_timeout: Optional[int] = None,
|
2504
|
-
data: Optional[Mapping[str,
|
2499
|
+
data: Optional[Mapping[str, Any]] = None,
|
2505
2500
|
hosts: Optional[Sequence[str]] = None,
|
2506
2501
|
insecure_tls: Optional[bool] = None,
|
2507
2502
|
password: Optional[str] = None,
|
@@ -2519,7 +2514,7 @@ class SecretsMountCassandra(dict):
|
|
2519
2514
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
2520
2515
|
connection.
|
2521
2516
|
:param int connect_timeout: The number of seconds to use as a connection timeout.
|
2522
|
-
:param Mapping[str,
|
2517
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2523
2518
|
|
2524
2519
|
Supported list of database secrets engines that can be configured:
|
2525
2520
|
:param Sequence[str] hosts: Cassandra hosts to connect to.
|
@@ -2595,7 +2590,7 @@ class SecretsMountCassandra(dict):
|
|
2595
2590
|
|
2596
2591
|
@property
|
2597
2592
|
@pulumi.getter
|
2598
|
-
def data(self) -> Optional[Mapping[str,
|
2593
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
2599
2594
|
"""
|
2600
2595
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2601
2596
|
|
@@ -2742,7 +2737,7 @@ class SecretsMountCouchbase(dict):
|
|
2742
2737
|
allowed_roles: Optional[Sequence[str]] = None,
|
2743
2738
|
base64_pem: Optional[str] = None,
|
2744
2739
|
bucket_name: Optional[str] = None,
|
2745
|
-
data: Optional[Mapping[str,
|
2740
|
+
data: Optional[Mapping[str, Any]] = None,
|
2746
2741
|
insecure_tls: Optional[bool] = None,
|
2747
2742
|
plugin_name: Optional[str] = None,
|
2748
2743
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
@@ -2758,7 +2753,7 @@ class SecretsMountCouchbase(dict):
|
|
2758
2753
|
connection.
|
2759
2754
|
:param str base64_pem: Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
|
2760
2755
|
:param str bucket_name: Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
|
2761
|
-
:param Mapping[str,
|
2756
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2762
2757
|
|
2763
2758
|
Supported list of database secrets engines that can be configured:
|
2764
2759
|
:param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
|
@@ -2853,7 +2848,7 @@ class SecretsMountCouchbase(dict):
|
|
2853
2848
|
|
2854
2849
|
@property
|
2855
2850
|
@pulumi.getter
|
2856
|
-
def data(self) -> Optional[Mapping[str,
|
2851
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
2857
2852
|
"""
|
2858
2853
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2859
2854
|
|
@@ -2958,7 +2953,7 @@ class SecretsMountElasticsearch(dict):
|
|
2958
2953
|
ca_path: Optional[str] = None,
|
2959
2954
|
client_cert: Optional[str] = None,
|
2960
2955
|
client_key: Optional[str] = None,
|
2961
|
-
data: Optional[Mapping[str,
|
2956
|
+
data: Optional[Mapping[str, Any]] = None,
|
2962
2957
|
insecure: Optional[bool] = None,
|
2963
2958
|
plugin_name: Optional[str] = None,
|
2964
2959
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
@@ -2976,7 +2971,7 @@ class SecretsMountElasticsearch(dict):
|
|
2976
2971
|
:param str ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
2977
2972
|
:param str client_cert: The path to the certificate for the Elasticsearch client to present for communication
|
2978
2973
|
:param str client_key: The path to the key for the Elasticsearch client to use for communication
|
2979
|
-
:param Mapping[str,
|
2974
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2980
2975
|
|
2981
2976
|
Supported list of database secrets engines that can be configured:
|
2982
2977
|
:param bool insecure: Whether to disable certificate verification
|
@@ -3091,7 +3086,7 @@ class SecretsMountElasticsearch(dict):
|
|
3091
3086
|
|
3092
3087
|
@property
|
3093
3088
|
@pulumi.getter
|
3094
|
-
def data(self) -> Optional[Mapping[str,
|
3089
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
3095
3090
|
"""
|
3096
3091
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3097
3092
|
|
@@ -3188,7 +3183,7 @@ class SecretsMountHana(dict):
|
|
3188
3183
|
name: str,
|
3189
3184
|
allowed_roles: Optional[Sequence[str]] = None,
|
3190
3185
|
connection_url: Optional[str] = None,
|
3191
|
-
data: Optional[Mapping[str,
|
3186
|
+
data: Optional[Mapping[str, Any]] = None,
|
3192
3187
|
disable_escaping: Optional[bool] = None,
|
3193
3188
|
max_connection_lifetime: Optional[int] = None,
|
3194
3189
|
max_idle_connections: Optional[int] = None,
|
@@ -3203,7 +3198,7 @@ class SecretsMountHana(dict):
|
|
3203
3198
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3204
3199
|
connection.
|
3205
3200
|
:param str connection_url: Connection string to use to connect to the database.
|
3206
|
-
:param Mapping[str,
|
3201
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3207
3202
|
|
3208
3203
|
Supported list of database secrets engines that can be configured:
|
3209
3204
|
:param bool disable_escaping: Disable special character escaping in username and password
|
@@ -3270,7 +3265,7 @@ class SecretsMountHana(dict):
|
|
3270
3265
|
|
3271
3266
|
@property
|
3272
3267
|
@pulumi.getter
|
3273
|
-
def data(self) -> Optional[Mapping[str,
|
3268
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
3274
3269
|
"""
|
3275
3270
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3276
3271
|
|
@@ -3394,7 +3389,7 @@ class SecretsMountInfluxdb(dict):
|
|
3394
3389
|
username: str,
|
3395
3390
|
allowed_roles: Optional[Sequence[str]] = None,
|
3396
3391
|
connect_timeout: Optional[int] = None,
|
3397
|
-
data: Optional[Mapping[str,
|
3392
|
+
data: Optional[Mapping[str, Any]] = None,
|
3398
3393
|
insecure_tls: Optional[bool] = None,
|
3399
3394
|
pem_bundle: Optional[str] = None,
|
3400
3395
|
pem_json: Optional[str] = None,
|
@@ -3412,7 +3407,7 @@ class SecretsMountInfluxdb(dict):
|
|
3412
3407
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3413
3408
|
connection.
|
3414
3409
|
:param int connect_timeout: The number of seconds to use as a connection timeout.
|
3415
|
-
:param Mapping[str,
|
3410
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3416
3411
|
|
3417
3412
|
Supported list of database secrets engines that can be configured:
|
3418
3413
|
:param bool insecure_tls: Whether to skip verification of the server certificate when using TLS.
|
@@ -3506,7 +3501,7 @@ class SecretsMountInfluxdb(dict):
|
|
3506
3501
|
|
3507
3502
|
@property
|
3508
3503
|
@pulumi.getter
|
3509
|
-
def data(self) -> Optional[Mapping[str,
|
3504
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
3510
3505
|
"""
|
3511
3506
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3512
3507
|
|
@@ -3627,7 +3622,7 @@ class SecretsMountMongodb(dict):
|
|
3627
3622
|
name: str,
|
3628
3623
|
allowed_roles: Optional[Sequence[str]] = None,
|
3629
3624
|
connection_url: Optional[str] = None,
|
3630
|
-
data: Optional[Mapping[str,
|
3625
|
+
data: Optional[Mapping[str, Any]] = None,
|
3631
3626
|
max_connection_lifetime: Optional[int] = None,
|
3632
3627
|
max_idle_connections: Optional[int] = None,
|
3633
3628
|
max_open_connections: Optional[int] = None,
|
@@ -3642,7 +3637,7 @@ class SecretsMountMongodb(dict):
|
|
3642
3637
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3643
3638
|
connection.
|
3644
3639
|
:param str connection_url: Connection string to use to connect to the database.
|
3645
|
-
:param Mapping[str,
|
3640
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3646
3641
|
|
3647
3642
|
Supported list of database secrets engines that can be configured:
|
3648
3643
|
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -3709,7 +3704,7 @@ class SecretsMountMongodb(dict):
|
|
3709
3704
|
|
3710
3705
|
@property
|
3711
3706
|
@pulumi.getter
|
3712
|
-
def data(self) -> Optional[Mapping[str,
|
3707
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
3713
3708
|
"""
|
3714
3709
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3715
3710
|
|
@@ -3828,7 +3823,7 @@ class SecretsMountMongodbatla(dict):
|
|
3828
3823
|
project_id: str,
|
3829
3824
|
public_key: str,
|
3830
3825
|
allowed_roles: Optional[Sequence[str]] = None,
|
3831
|
-
data: Optional[Mapping[str,
|
3826
|
+
data: Optional[Mapping[str, Any]] = None,
|
3832
3827
|
plugin_name: Optional[str] = None,
|
3833
3828
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
3834
3829
|
verify_connection: Optional[bool] = None):
|
@@ -3839,7 +3834,7 @@ class SecretsMountMongodbatla(dict):
|
|
3839
3834
|
:param str public_key: The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
|
3840
3835
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3841
3836
|
connection.
|
3842
|
-
:param Mapping[str,
|
3837
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3843
3838
|
|
3844
3839
|
Supported list of database secrets engines that can be configured:
|
3845
3840
|
:param str plugin_name: Specifies the name of the plugin to use.
|
@@ -3905,7 +3900,7 @@ class SecretsMountMongodbatla(dict):
|
|
3905
3900
|
|
3906
3901
|
@property
|
3907
3902
|
@pulumi.getter
|
3908
|
-
def data(self) -> Optional[Mapping[str,
|
3903
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
3909
3904
|
"""
|
3910
3905
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3911
3906
|
|
@@ -3983,7 +3978,7 @@ class SecretsMountMssql(dict):
|
|
3983
3978
|
allowed_roles: Optional[Sequence[str]] = None,
|
3984
3979
|
connection_url: Optional[str] = None,
|
3985
3980
|
contained_db: Optional[bool] = None,
|
3986
|
-
data: Optional[Mapping[str,
|
3981
|
+
data: Optional[Mapping[str, Any]] = None,
|
3987
3982
|
disable_escaping: Optional[bool] = None,
|
3988
3983
|
max_connection_lifetime: Optional[int] = None,
|
3989
3984
|
max_idle_connections: Optional[int] = None,
|
@@ -4000,7 +3995,7 @@ class SecretsMountMssql(dict):
|
|
4000
3995
|
connection.
|
4001
3996
|
:param str connection_url: Connection string to use to connect to the database.
|
4002
3997
|
:param bool contained_db: Set to true when the target is a Contained Database, e.g. AzureSQL.
|
4003
|
-
:param Mapping[str,
|
3998
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4004
3999
|
|
4005
4000
|
Supported list of database secrets engines that can be configured:
|
4006
4001
|
:param bool disable_escaping: Disable special character escaping in username and password
|
@@ -4080,7 +4075,7 @@ class SecretsMountMssql(dict):
|
|
4080
4075
|
|
4081
4076
|
@property
|
4082
4077
|
@pulumi.getter
|
4083
|
-
def data(self) -> Optional[Mapping[str,
|
4078
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
4084
4079
|
"""
|
4085
4080
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4086
4081
|
|
@@ -4218,7 +4213,7 @@ class SecretsMountMysql(dict):
|
|
4218
4213
|
allowed_roles: Optional[Sequence[str]] = None,
|
4219
4214
|
auth_type: Optional[str] = None,
|
4220
4215
|
connection_url: Optional[str] = None,
|
4221
|
-
data: Optional[Mapping[str,
|
4216
|
+
data: Optional[Mapping[str, Any]] = None,
|
4222
4217
|
max_connection_lifetime: Optional[int] = None,
|
4223
4218
|
max_idle_connections: Optional[int] = None,
|
4224
4219
|
max_open_connections: Optional[int] = None,
|
@@ -4237,7 +4232,7 @@ class SecretsMountMysql(dict):
|
|
4237
4232
|
connection.
|
4238
4233
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4239
4234
|
:param str connection_url: Connection string to use to connect to the database.
|
4240
|
-
:param Mapping[str,
|
4235
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4241
4236
|
|
4242
4237
|
Supported list of database secrets engines that can be configured:
|
4243
4238
|
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -4323,7 +4318,7 @@ class SecretsMountMysql(dict):
|
|
4323
4318
|
|
4324
4319
|
@property
|
4325
4320
|
@pulumi.getter
|
4326
|
-
def data(self) -> Optional[Mapping[str,
|
4321
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
4327
4322
|
"""
|
4328
4323
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4329
4324
|
|
@@ -4477,7 +4472,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4477
4472
|
allowed_roles: Optional[Sequence[str]] = None,
|
4478
4473
|
auth_type: Optional[str] = None,
|
4479
4474
|
connection_url: Optional[str] = None,
|
4480
|
-
data: Optional[Mapping[str,
|
4475
|
+
data: Optional[Mapping[str, Any]] = None,
|
4481
4476
|
max_connection_lifetime: Optional[int] = None,
|
4482
4477
|
max_idle_connections: Optional[int] = None,
|
4483
4478
|
max_open_connections: Optional[int] = None,
|
@@ -4496,7 +4491,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4496
4491
|
connection.
|
4497
4492
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4498
4493
|
:param str connection_url: Connection string to use to connect to the database.
|
4499
|
-
:param Mapping[str,
|
4494
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4500
4495
|
|
4501
4496
|
Supported list of database secrets engines that can be configured:
|
4502
4497
|
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -4582,7 +4577,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4582
4577
|
|
4583
4578
|
@property
|
4584
4579
|
@pulumi.getter
|
4585
|
-
def data(self) -> Optional[Mapping[str,
|
4580
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
4586
4581
|
"""
|
4587
4582
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4588
4583
|
|
@@ -4736,7 +4731,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
4736
4731
|
allowed_roles: Optional[Sequence[str]] = None,
|
4737
4732
|
auth_type: Optional[str] = None,
|
4738
4733
|
connection_url: Optional[str] = None,
|
4739
|
-
data: Optional[Mapping[str,
|
4734
|
+
data: Optional[Mapping[str, Any]] = None,
|
4740
4735
|
max_connection_lifetime: Optional[int] = None,
|
4741
4736
|
max_idle_connections: Optional[int] = None,
|
4742
4737
|
max_open_connections: Optional[int] = None,
|
@@ -4755,7 +4750,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
4755
4750
|
connection.
|
4756
4751
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4757
4752
|
:param str connection_url: Connection string to use to connect to the database.
|
4758
|
-
:param Mapping[str,
|
4753
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4759
4754
|
|
4760
4755
|
Supported list of database secrets engines that can be configured:
|
4761
4756
|
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -4841,7 +4836,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
4841
4836
|
|
4842
4837
|
@property
|
4843
4838
|
@pulumi.getter
|
4844
|
-
def data(self) -> Optional[Mapping[str,
|
4839
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
4845
4840
|
"""
|
4846
4841
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4847
4842
|
|
@@ -4995,7 +4990,7 @@ class SecretsMountMysqlRd(dict):
|
|
4995
4990
|
allowed_roles: Optional[Sequence[str]] = None,
|
4996
4991
|
auth_type: Optional[str] = None,
|
4997
4992
|
connection_url: Optional[str] = None,
|
4998
|
-
data: Optional[Mapping[str,
|
4993
|
+
data: Optional[Mapping[str, Any]] = None,
|
4999
4994
|
max_connection_lifetime: Optional[int] = None,
|
5000
4995
|
max_idle_connections: Optional[int] = None,
|
5001
4996
|
max_open_connections: Optional[int] = None,
|
@@ -5014,7 +5009,7 @@ class SecretsMountMysqlRd(dict):
|
|
5014
5009
|
connection.
|
5015
5010
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5016
5011
|
:param str connection_url: Connection string to use to connect to the database.
|
5017
|
-
:param Mapping[str,
|
5012
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5018
5013
|
|
5019
5014
|
Supported list of database secrets engines that can be configured:
|
5020
5015
|
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -5100,7 +5095,7 @@ class SecretsMountMysqlRd(dict):
|
|
5100
5095
|
|
5101
5096
|
@property
|
5102
5097
|
@pulumi.getter
|
5103
|
-
def data(self) -> Optional[Mapping[str,
|
5098
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
5104
5099
|
"""
|
5105
5100
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5106
5101
|
|
@@ -5249,7 +5244,7 @@ class SecretsMountOracle(dict):
|
|
5249
5244
|
name: str,
|
5250
5245
|
allowed_roles: Optional[Sequence[str]] = None,
|
5251
5246
|
connection_url: Optional[str] = None,
|
5252
|
-
data: Optional[Mapping[str,
|
5247
|
+
data: Optional[Mapping[str, Any]] = None,
|
5253
5248
|
disconnect_sessions: Optional[bool] = None,
|
5254
5249
|
max_connection_lifetime: Optional[int] = None,
|
5255
5250
|
max_idle_connections: Optional[int] = None,
|
@@ -5266,7 +5261,7 @@ class SecretsMountOracle(dict):
|
|
5266
5261
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
5267
5262
|
connection.
|
5268
5263
|
:param str connection_url: Connection string to use to connect to the database.
|
5269
|
-
:param Mapping[str,
|
5264
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5270
5265
|
|
5271
5266
|
Supported list of database secrets engines that can be configured:
|
5272
5267
|
:param bool disconnect_sessions: Set to true to disconnect any open sessions prior to running the revocation statements.
|
@@ -5339,7 +5334,7 @@ class SecretsMountOracle(dict):
|
|
5339
5334
|
|
5340
5335
|
@property
|
5341
5336
|
@pulumi.getter
|
5342
|
-
def data(self) -> Optional[Mapping[str,
|
5337
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
5343
5338
|
"""
|
5344
5339
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5345
5340
|
|
@@ -5483,7 +5478,7 @@ class SecretsMountPostgresql(dict):
|
|
5483
5478
|
allowed_roles: Optional[Sequence[str]] = None,
|
5484
5479
|
auth_type: Optional[str] = None,
|
5485
5480
|
connection_url: Optional[str] = None,
|
5486
|
-
data: Optional[Mapping[str,
|
5481
|
+
data: Optional[Mapping[str, Any]] = None,
|
5487
5482
|
disable_escaping: Optional[bool] = None,
|
5488
5483
|
max_connection_lifetime: Optional[int] = None,
|
5489
5484
|
max_idle_connections: Optional[int] = None,
|
@@ -5501,7 +5496,7 @@ class SecretsMountPostgresql(dict):
|
|
5501
5496
|
connection.
|
5502
5497
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5503
5498
|
:param str connection_url: Connection string to use to connect to the database.
|
5504
|
-
:param Mapping[str,
|
5499
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5505
5500
|
|
5506
5501
|
Supported list of database secrets engines that can be configured:
|
5507
5502
|
:param bool disable_escaping: Disable special character escaping in username and password
|
@@ -5584,7 +5579,7 @@ class SecretsMountPostgresql(dict):
|
|
5584
5579
|
|
5585
5580
|
@property
|
5586
5581
|
@pulumi.getter
|
5587
|
-
def data(self) -> Optional[Mapping[str,
|
5582
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
5588
5583
|
"""
|
5589
5584
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5590
5585
|
|
@@ -5718,7 +5713,7 @@ class SecretsMountRedi(dict):
|
|
5718
5713
|
username: str,
|
5719
5714
|
allowed_roles: Optional[Sequence[str]] = None,
|
5720
5715
|
ca_cert: Optional[str] = None,
|
5721
|
-
data: Optional[Mapping[str,
|
5716
|
+
data: Optional[Mapping[str, Any]] = None,
|
5722
5717
|
insecure_tls: Optional[bool] = None,
|
5723
5718
|
plugin_name: Optional[str] = None,
|
5724
5719
|
port: Optional[int] = None,
|
@@ -5733,7 +5728,7 @@ class SecretsMountRedi(dict):
|
|
5733
5728
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
5734
5729
|
connection.
|
5735
5730
|
:param str ca_cert: The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
|
5736
|
-
:param Mapping[str,
|
5731
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5737
5732
|
|
5738
5733
|
Supported list of database secrets engines that can be configured:
|
5739
5734
|
:param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
|
@@ -5818,7 +5813,7 @@ class SecretsMountRedi(dict):
|
|
5818
5813
|
|
5819
5814
|
@property
|
5820
5815
|
@pulumi.getter
|
5821
|
-
def data(self) -> Optional[Mapping[str,
|
5816
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
5822
5817
|
"""
|
5823
5818
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5824
5819
|
|
@@ -5905,7 +5900,7 @@ class SecretsMountRedisElasticach(dict):
|
|
5905
5900
|
name: str,
|
5906
5901
|
url: str,
|
5907
5902
|
allowed_roles: Optional[Sequence[str]] = None,
|
5908
|
-
data: Optional[Mapping[str,
|
5903
|
+
data: Optional[Mapping[str, Any]] = None,
|
5909
5904
|
password: Optional[str] = None,
|
5910
5905
|
plugin_name: Optional[str] = None,
|
5911
5906
|
region: Optional[str] = None,
|
@@ -5917,7 +5912,7 @@ class SecretsMountRedisElasticach(dict):
|
|
5917
5912
|
:param str url: The configuration endpoint for the ElastiCache cluster to connect to.
|
5918
5913
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
5919
5914
|
connection.
|
5920
|
-
:param Mapping[str,
|
5915
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5921
5916
|
|
5922
5917
|
Supported list of database secrets engines that can be configured:
|
5923
5918
|
:param str password: The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
@@ -5974,7 +5969,7 @@ class SecretsMountRedisElasticach(dict):
|
|
5974
5969
|
|
5975
5970
|
@property
|
5976
5971
|
@pulumi.getter
|
5977
|
-
def data(self) -> Optional[Mapping[str,
|
5972
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
5978
5973
|
"""
|
5979
5974
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5980
5975
|
|
@@ -6073,7 +6068,7 @@ class SecretsMountRedshift(dict):
|
|
6073
6068
|
name: str,
|
6074
6069
|
allowed_roles: Optional[Sequence[str]] = None,
|
6075
6070
|
connection_url: Optional[str] = None,
|
6076
|
-
data: Optional[Mapping[str,
|
6071
|
+
data: Optional[Mapping[str, Any]] = None,
|
6077
6072
|
disable_escaping: Optional[bool] = None,
|
6078
6073
|
max_connection_lifetime: Optional[int] = None,
|
6079
6074
|
max_idle_connections: Optional[int] = None,
|
@@ -6089,7 +6084,7 @@ class SecretsMountRedshift(dict):
|
|
6089
6084
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
6090
6085
|
connection.
|
6091
6086
|
:param str connection_url: Connection string to use to connect to the database.
|
6092
|
-
:param Mapping[str,
|
6087
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6093
6088
|
|
6094
6089
|
Supported list of database secrets engines that can be configured:
|
6095
6090
|
:param bool disable_escaping: Disable special character escaping in username and password
|
@@ -6159,7 +6154,7 @@ class SecretsMountRedshift(dict):
|
|
6159
6154
|
|
6160
6155
|
@property
|
6161
6156
|
@pulumi.getter
|
6162
|
-
def data(self) -> Optional[Mapping[str,
|
6157
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
6163
6158
|
"""
|
6164
6159
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6165
6160
|
|
@@ -6288,7 +6283,7 @@ class SecretsMountSnowflake(dict):
|
|
6288
6283
|
name: str,
|
6289
6284
|
allowed_roles: Optional[Sequence[str]] = None,
|
6290
6285
|
connection_url: Optional[str] = None,
|
6291
|
-
data: Optional[Mapping[str,
|
6286
|
+
data: Optional[Mapping[str, Any]] = None,
|
6292
6287
|
max_connection_lifetime: Optional[int] = None,
|
6293
6288
|
max_idle_connections: Optional[int] = None,
|
6294
6289
|
max_open_connections: Optional[int] = None,
|
@@ -6303,7 +6298,7 @@ class SecretsMountSnowflake(dict):
|
|
6303
6298
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
6304
6299
|
connection.
|
6305
6300
|
:param str connection_url: Connection string to use to connect to the database.
|
6306
|
-
:param Mapping[str,
|
6301
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6307
6302
|
|
6308
6303
|
Supported list of database secrets engines that can be configured:
|
6309
6304
|
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -6370,7 +6365,7 @@ class SecretsMountSnowflake(dict):
|
|
6370
6365
|
|
6371
6366
|
@property
|
6372
6367
|
@pulumi.getter
|
6373
|
-
def data(self) -> Optional[Mapping[str,
|
6368
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
6374
6369
|
"""
|
6375
6370
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6376
6371
|
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
@@ -25,7 +20,7 @@ class SecretBackendConnectionArgs:
|
|
25
20
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
26
21
|
cassandra: Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']] = None,
|
27
22
|
couchbase: Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']] = None,
|
28
|
-
data: Optional[pulumi.Input[Mapping[str,
|
23
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
29
24
|
elasticsearch: Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']] = None,
|
30
25
|
hana: Optional[pulumi.Input['SecretBackendConnectionHanaArgs']] = None,
|
31
26
|
influxdb: Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']] = None,
|
@@ -54,7 +49,7 @@ class SecretBackendConnectionArgs:
|
|
54
49
|
connection.
|
55
50
|
:param pulumi.Input['SecretBackendConnectionCassandraArgs'] cassandra: A nested block containing configuration options for Cassandra connections.
|
56
51
|
:param pulumi.Input['SecretBackendConnectionCouchbaseArgs'] couchbase: A nested block containing configuration options for Couchbase connections.
|
57
|
-
:param pulumi.Input[Mapping[str,
|
52
|
+
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
58
53
|
:param pulumi.Input['SecretBackendConnectionElasticsearchArgs'] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
|
59
54
|
:param pulumi.Input['SecretBackendConnectionHanaArgs'] hana: A nested block containing configuration options for SAP HanaDB connections.
|
60
55
|
:param pulumi.Input['SecretBackendConnectionInfluxdbArgs'] influxdb: A nested block containing configuration options for InfluxDB connections.
|
@@ -186,14 +181,14 @@ class SecretBackendConnectionArgs:
|
|
186
181
|
|
187
182
|
@property
|
188
183
|
@pulumi.getter
|
189
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
184
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
190
185
|
"""
|
191
186
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
192
187
|
"""
|
193
188
|
return pulumi.get(self, "data")
|
194
189
|
|
195
190
|
@data.setter
|
196
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
191
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
197
192
|
pulumi.set(self, "data", value)
|
198
193
|
|
199
194
|
@property
|
@@ -462,7 +457,7 @@ class _SecretBackendConnectionState:
|
|
462
457
|
backend: Optional[pulumi.Input[str]] = None,
|
463
458
|
cassandra: Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']] = None,
|
464
459
|
couchbase: Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']] = None,
|
465
|
-
data: Optional[pulumi.Input[Mapping[str,
|
460
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
466
461
|
elasticsearch: Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']] = None,
|
467
462
|
hana: Optional[pulumi.Input['SecretBackendConnectionHanaArgs']] = None,
|
468
463
|
influxdb: Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']] = None,
|
@@ -491,7 +486,7 @@ class _SecretBackendConnectionState:
|
|
491
486
|
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
492
487
|
:param pulumi.Input['SecretBackendConnectionCassandraArgs'] cassandra: A nested block containing configuration options for Cassandra connections.
|
493
488
|
:param pulumi.Input['SecretBackendConnectionCouchbaseArgs'] couchbase: A nested block containing configuration options for Couchbase connections.
|
494
|
-
:param pulumi.Input[Mapping[str,
|
489
|
+
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
495
490
|
:param pulumi.Input['SecretBackendConnectionElasticsearchArgs'] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
|
496
491
|
:param pulumi.Input['SecretBackendConnectionHanaArgs'] hana: A nested block containing configuration options for SAP HanaDB connections.
|
497
492
|
:param pulumi.Input['SecretBackendConnectionInfluxdbArgs'] influxdb: A nested block containing configuration options for InfluxDB connections.
|
@@ -624,14 +619,14 @@ class _SecretBackendConnectionState:
|
|
624
619
|
|
625
620
|
@property
|
626
621
|
@pulumi.getter
|
627
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
622
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
628
623
|
"""
|
629
624
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
630
625
|
"""
|
631
626
|
return pulumi.get(self, "data")
|
632
627
|
|
633
628
|
@data.setter
|
634
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
629
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
635
630
|
pulumi.set(self, "data", value)
|
636
631
|
|
637
632
|
@property
|
@@ -902,7 +897,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
902
897
|
backend: Optional[pulumi.Input[str]] = None,
|
903
898
|
cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
|
904
899
|
couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
|
905
|
-
data: Optional[pulumi.Input[Mapping[str,
|
900
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
906
901
|
elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
|
907
902
|
hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
|
908
903
|
influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
|
@@ -962,7 +957,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
962
957
|
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
963
958
|
:param pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']] cassandra: A nested block containing configuration options for Cassandra connections.
|
964
959
|
:param pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']] couchbase: A nested block containing configuration options for Couchbase connections.
|
965
|
-
:param pulumi.Input[Mapping[str,
|
960
|
+
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
966
961
|
:param pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
|
967
962
|
:param pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']] hana: A nested block containing configuration options for SAP HanaDB connections.
|
968
963
|
:param pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']] influxdb: A nested block containing configuration options for InfluxDB connections.
|
@@ -1046,7 +1041,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1046
1041
|
backend: Optional[pulumi.Input[str]] = None,
|
1047
1042
|
cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
|
1048
1043
|
couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
|
1049
|
-
data: Optional[pulumi.Input[Mapping[str,
|
1044
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1050
1045
|
elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
|
1051
1046
|
hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
|
1052
1047
|
influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
|
@@ -1119,7 +1114,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1119
1114
|
backend: Optional[pulumi.Input[str]] = None,
|
1120
1115
|
cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
|
1121
1116
|
couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
|
1122
|
-
data: Optional[pulumi.Input[Mapping[str,
|
1117
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1123
1118
|
elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
|
1124
1119
|
hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
|
1125
1120
|
influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
|
@@ -1153,7 +1148,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1153
1148
|
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
1154
1149
|
:param pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']] cassandra: A nested block containing configuration options for Cassandra connections.
|
1155
1150
|
:param pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']] couchbase: A nested block containing configuration options for Couchbase connections.
|
1156
|
-
:param pulumi.Input[Mapping[str,
|
1151
|
+
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
1157
1152
|
:param pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
|
1158
1153
|
:param pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']] hana: A nested block containing configuration options for SAP HanaDB connections.
|
1159
1154
|
:param pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']] influxdb: A nested block containing configuration options for InfluxDB connections.
|
@@ -1249,7 +1244,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1249
1244
|
|
1250
1245
|
@property
|
1251
1246
|
@pulumi.getter
|
1252
|
-
def data(self) -> pulumi.Output[Optional[Mapping[str,
|
1247
|
+
def data(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
|
1253
1248
|
"""
|
1254
1249
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
1255
1250
|
"""
|