pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +7 -12
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +14 -19
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +105 -2256
- pulumi_vault/database/outputs.py +54 -199
- pulumi_vault/database/secret_backend_connection.py +14 -19
- pulumi_vault/database/secret_backend_role.py +14 -19
- pulumi_vault/database/secret_backend_static_role.py +1 -69
- pulumi_vault/database/secrets_mount.py +14 -19
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +3 -62
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +5 -25
- pulumi_vault/generic/secret.py +7 -12
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +5 -18
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +8 -28
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +7 -26
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +5 -35
- pulumi_vault/identity/get_group.py +6 -42
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +5 -16
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +3 -8
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +28 -33
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +3 -55
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +14 -19
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +4 -36
- pulumi_vault/kv/get_secret.py +5 -20
- pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
- pulumi_vault/kv/get_secret_v2.py +8 -27
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +3 -8
- pulumi_vault/kv/secret.py +7 -12
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +28 -33
- pulumi_vault/ldap/auth_backend.py +0 -52
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +14 -19
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +16 -21
- pulumi_vault/namespace.py +14 -19
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +8 -49
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +14 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +5 -18
- pulumi_vault/pkisecret/outputs.py +12 -17
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +14 -19
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +14 -19
- pulumi_vault/secrets/sync_azure_destination.py +14 -19
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +14 -19
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +28 -67
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +14 -38
- pulumi_vault/transform/get_encode.py +14 -38
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +14 -19
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +7 -12
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
- pulumi_vault-6.4.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
pulumi_vault/database/_inputs.py
CHANGED
@@ -4,142 +4,50 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
18
13
|
'SecretBackendConnectionCassandraArgs',
|
19
|
-
'SecretBackendConnectionCassandraArgsDict',
|
20
14
|
'SecretBackendConnectionCouchbaseArgs',
|
21
|
-
'SecretBackendConnectionCouchbaseArgsDict',
|
22
15
|
'SecretBackendConnectionElasticsearchArgs',
|
23
|
-
'SecretBackendConnectionElasticsearchArgsDict',
|
24
16
|
'SecretBackendConnectionHanaArgs',
|
25
|
-
'SecretBackendConnectionHanaArgsDict',
|
26
17
|
'SecretBackendConnectionInfluxdbArgs',
|
27
|
-
'SecretBackendConnectionInfluxdbArgsDict',
|
28
18
|
'SecretBackendConnectionMongodbArgs',
|
29
|
-
'SecretBackendConnectionMongodbArgsDict',
|
30
19
|
'SecretBackendConnectionMongodbatlasArgs',
|
31
|
-
'SecretBackendConnectionMongodbatlasArgsDict',
|
32
20
|
'SecretBackendConnectionMssqlArgs',
|
33
|
-
'SecretBackendConnectionMssqlArgsDict',
|
34
21
|
'SecretBackendConnectionMysqlArgs',
|
35
|
-
'SecretBackendConnectionMysqlArgsDict',
|
36
22
|
'SecretBackendConnectionMysqlAuroraArgs',
|
37
|
-
'SecretBackendConnectionMysqlAuroraArgsDict',
|
38
23
|
'SecretBackendConnectionMysqlLegacyArgs',
|
39
|
-
'SecretBackendConnectionMysqlLegacyArgsDict',
|
40
24
|
'SecretBackendConnectionMysqlRdsArgs',
|
41
|
-
'SecretBackendConnectionMysqlRdsArgsDict',
|
42
25
|
'SecretBackendConnectionOracleArgs',
|
43
|
-
'SecretBackendConnectionOracleArgsDict',
|
44
26
|
'SecretBackendConnectionPostgresqlArgs',
|
45
|
-
'SecretBackendConnectionPostgresqlArgsDict',
|
46
27
|
'SecretBackendConnectionRedisArgs',
|
47
|
-
'SecretBackendConnectionRedisArgsDict',
|
48
28
|
'SecretBackendConnectionRedisElasticacheArgs',
|
49
|
-
'SecretBackendConnectionRedisElasticacheArgsDict',
|
50
29
|
'SecretBackendConnectionRedshiftArgs',
|
51
|
-
'SecretBackendConnectionRedshiftArgsDict',
|
52
30
|
'SecretBackendConnectionSnowflakeArgs',
|
53
|
-
'SecretBackendConnectionSnowflakeArgsDict',
|
54
31
|
'SecretsMountCassandraArgs',
|
55
|
-
'SecretsMountCassandraArgsDict',
|
56
32
|
'SecretsMountCouchbaseArgs',
|
57
|
-
'SecretsMountCouchbaseArgsDict',
|
58
33
|
'SecretsMountElasticsearchArgs',
|
59
|
-
'SecretsMountElasticsearchArgsDict',
|
60
34
|
'SecretsMountHanaArgs',
|
61
|
-
'SecretsMountHanaArgsDict',
|
62
35
|
'SecretsMountInfluxdbArgs',
|
63
|
-
'SecretsMountInfluxdbArgsDict',
|
64
36
|
'SecretsMountMongodbArgs',
|
65
|
-
'SecretsMountMongodbArgsDict',
|
66
37
|
'SecretsMountMongodbatlaArgs',
|
67
|
-
'SecretsMountMongodbatlaArgsDict',
|
68
38
|
'SecretsMountMssqlArgs',
|
69
|
-
'SecretsMountMssqlArgsDict',
|
70
39
|
'SecretsMountMysqlArgs',
|
71
|
-
'SecretsMountMysqlArgsDict',
|
72
40
|
'SecretsMountMysqlAuroraArgs',
|
73
|
-
'SecretsMountMysqlAuroraArgsDict',
|
74
41
|
'SecretsMountMysqlLegacyArgs',
|
75
|
-
'SecretsMountMysqlLegacyArgsDict',
|
76
42
|
'SecretsMountMysqlRdArgs',
|
77
|
-
'SecretsMountMysqlRdArgsDict',
|
78
43
|
'SecretsMountOracleArgs',
|
79
|
-
'SecretsMountOracleArgsDict',
|
80
44
|
'SecretsMountPostgresqlArgs',
|
81
|
-
'SecretsMountPostgresqlArgsDict',
|
82
45
|
'SecretsMountRediArgs',
|
83
|
-
'SecretsMountRediArgsDict',
|
84
46
|
'SecretsMountRedisElasticachArgs',
|
85
|
-
'SecretsMountRedisElasticachArgsDict',
|
86
47
|
'SecretsMountRedshiftArgs',
|
87
|
-
'SecretsMountRedshiftArgsDict',
|
88
48
|
'SecretsMountSnowflakeArgs',
|
89
|
-
'SecretsMountSnowflakeArgsDict',
|
90
49
|
]
|
91
50
|
|
92
|
-
MYPY = False
|
93
|
-
|
94
|
-
if not MYPY:
|
95
|
-
class SecretBackendConnectionCassandraArgsDict(TypedDict):
|
96
|
-
connect_timeout: NotRequired[pulumi.Input[int]]
|
97
|
-
"""
|
98
|
-
The number of seconds to use as a connection timeout.
|
99
|
-
"""
|
100
|
-
hosts: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
101
|
-
"""
|
102
|
-
Cassandra hosts to connect to.
|
103
|
-
"""
|
104
|
-
insecure_tls: NotRequired[pulumi.Input[bool]]
|
105
|
-
"""
|
106
|
-
Whether to skip verification of the server certificate when using TLS.
|
107
|
-
"""
|
108
|
-
password: NotRequired[pulumi.Input[str]]
|
109
|
-
"""
|
110
|
-
The password to use when authenticating with Cassandra.
|
111
|
-
"""
|
112
|
-
pem_bundle: NotRequired[pulumi.Input[str]]
|
113
|
-
"""
|
114
|
-
Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
115
|
-
"""
|
116
|
-
pem_json: NotRequired[pulumi.Input[str]]
|
117
|
-
"""
|
118
|
-
Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
119
|
-
"""
|
120
|
-
port: NotRequired[pulumi.Input[int]]
|
121
|
-
"""
|
122
|
-
The transport port to use to connect to Cassandra.
|
123
|
-
"""
|
124
|
-
protocol_version: NotRequired[pulumi.Input[int]]
|
125
|
-
"""
|
126
|
-
The CQL protocol version to use.
|
127
|
-
"""
|
128
|
-
skip_verification: NotRequired[pulumi.Input[bool]]
|
129
|
-
"""
|
130
|
-
Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
131
|
-
"""
|
132
|
-
tls: NotRequired[pulumi.Input[bool]]
|
133
|
-
"""
|
134
|
-
Whether to use TLS when connecting to Cassandra.
|
135
|
-
"""
|
136
|
-
username: NotRequired[pulumi.Input[str]]
|
137
|
-
"""
|
138
|
-
The username to use when authenticating with Cassandra.
|
139
|
-
"""
|
140
|
-
elif False:
|
141
|
-
SecretBackendConnectionCassandraArgsDict: TypeAlias = Mapping[str, Any]
|
142
|
-
|
143
51
|
@pulumi.input_type
|
144
52
|
class SecretBackendConnectionCassandraArgs:
|
145
53
|
def __init__(__self__, *,
|
@@ -151,7 +59,6 @@ class SecretBackendConnectionCassandraArgs:
|
|
151
59
|
pem_json: Optional[pulumi.Input[str]] = None,
|
152
60
|
port: Optional[pulumi.Input[int]] = None,
|
153
61
|
protocol_version: Optional[pulumi.Input[int]] = None,
|
154
|
-
skip_verification: Optional[pulumi.Input[bool]] = None,
|
155
62
|
tls: Optional[pulumi.Input[bool]] = None,
|
156
63
|
username: Optional[pulumi.Input[str]] = None):
|
157
64
|
"""
|
@@ -163,7 +70,6 @@ class SecretBackendConnectionCassandraArgs:
|
|
163
70
|
:param pulumi.Input[str] pem_json: Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
164
71
|
:param pulumi.Input[int] port: The transport port to use to connect to Cassandra.
|
165
72
|
:param pulumi.Input[int] protocol_version: The CQL protocol version to use.
|
166
|
-
:param pulumi.Input[bool] skip_verification: Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
167
73
|
:param pulumi.Input[bool] tls: Whether to use TLS when connecting to Cassandra.
|
168
74
|
:param pulumi.Input[str] username: The username to use when authenticating with Cassandra.
|
169
75
|
"""
|
@@ -183,8 +89,6 @@ class SecretBackendConnectionCassandraArgs:
|
|
183
89
|
pulumi.set(__self__, "port", port)
|
184
90
|
if protocol_version is not None:
|
185
91
|
pulumi.set(__self__, "protocol_version", protocol_version)
|
186
|
-
if skip_verification is not None:
|
187
|
-
pulumi.set(__self__, "skip_verification", skip_verification)
|
188
92
|
if tls is not None:
|
189
93
|
pulumi.set(__self__, "tls", tls)
|
190
94
|
if username is not None:
|
@@ -286,18 +190,6 @@ class SecretBackendConnectionCassandraArgs:
|
|
286
190
|
def protocol_version(self, value: Optional[pulumi.Input[int]]):
|
287
191
|
pulumi.set(self, "protocol_version", value)
|
288
192
|
|
289
|
-
@property
|
290
|
-
@pulumi.getter(name="skipVerification")
|
291
|
-
def skip_verification(self) -> Optional[pulumi.Input[bool]]:
|
292
|
-
"""
|
293
|
-
Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
294
|
-
"""
|
295
|
-
return pulumi.get(self, "skip_verification")
|
296
|
-
|
297
|
-
@skip_verification.setter
|
298
|
-
def skip_verification(self, value: Optional[pulumi.Input[bool]]):
|
299
|
-
pulumi.set(self, "skip_verification", value)
|
300
|
-
|
301
193
|
@property
|
302
194
|
@pulumi.getter
|
303
195
|
def tls(self) -> Optional[pulumi.Input[bool]]:
|
@@ -323,43 +215,6 @@ class SecretBackendConnectionCassandraArgs:
|
|
323
215
|
pulumi.set(self, "username", value)
|
324
216
|
|
325
217
|
|
326
|
-
if not MYPY:
|
327
|
-
class SecretBackendConnectionCouchbaseArgsDict(TypedDict):
|
328
|
-
hosts: pulumi.Input[Sequence[pulumi.Input[str]]]
|
329
|
-
"""
|
330
|
-
A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
|
331
|
-
"""
|
332
|
-
password: pulumi.Input[str]
|
333
|
-
"""
|
334
|
-
Specifies the password corresponding to the given username.
|
335
|
-
"""
|
336
|
-
username: pulumi.Input[str]
|
337
|
-
"""
|
338
|
-
Specifies the username for Vault to use.
|
339
|
-
"""
|
340
|
-
base64_pem: NotRequired[pulumi.Input[str]]
|
341
|
-
"""
|
342
|
-
Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
|
343
|
-
"""
|
344
|
-
bucket_name: NotRequired[pulumi.Input[str]]
|
345
|
-
"""
|
346
|
-
Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
|
347
|
-
"""
|
348
|
-
insecure_tls: NotRequired[pulumi.Input[bool]]
|
349
|
-
"""
|
350
|
-
Specifies whether to skip verification of the server certificate when using TLS.
|
351
|
-
"""
|
352
|
-
tls: NotRequired[pulumi.Input[bool]]
|
353
|
-
"""
|
354
|
-
Specifies whether to use TLS when connecting to Couchbase.
|
355
|
-
"""
|
356
|
-
username_template: NotRequired[pulumi.Input[str]]
|
357
|
-
"""
|
358
|
-
Template describing how dynamic usernames are generated.
|
359
|
-
"""
|
360
|
-
elif False:
|
361
|
-
SecretBackendConnectionCouchbaseArgsDict: TypeAlias = Mapping[str, Any]
|
362
|
-
|
363
218
|
@pulumi.input_type
|
364
219
|
class SecretBackendConnectionCouchbaseArgs:
|
365
220
|
def __init__(__self__, *,
|
@@ -492,51 +347,6 @@ class SecretBackendConnectionCouchbaseArgs:
|
|
492
347
|
pulumi.set(self, "username_template", value)
|
493
348
|
|
494
349
|
|
495
|
-
if not MYPY:
|
496
|
-
class SecretBackendConnectionElasticsearchArgsDict(TypedDict):
|
497
|
-
password: pulumi.Input[str]
|
498
|
-
"""
|
499
|
-
The password to be used in the connection URL
|
500
|
-
"""
|
501
|
-
url: pulumi.Input[str]
|
502
|
-
"""
|
503
|
-
The URL for Elasticsearch's API
|
504
|
-
"""
|
505
|
-
username: pulumi.Input[str]
|
506
|
-
"""
|
507
|
-
The username to be used in the connection URL
|
508
|
-
"""
|
509
|
-
ca_cert: NotRequired[pulumi.Input[str]]
|
510
|
-
"""
|
511
|
-
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
512
|
-
"""
|
513
|
-
ca_path: NotRequired[pulumi.Input[str]]
|
514
|
-
"""
|
515
|
-
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
516
|
-
"""
|
517
|
-
client_cert: NotRequired[pulumi.Input[str]]
|
518
|
-
"""
|
519
|
-
The path to the certificate for the Elasticsearch client to present for communication
|
520
|
-
"""
|
521
|
-
client_key: NotRequired[pulumi.Input[str]]
|
522
|
-
"""
|
523
|
-
The path to the key for the Elasticsearch client to use for communication
|
524
|
-
"""
|
525
|
-
insecure: NotRequired[pulumi.Input[bool]]
|
526
|
-
"""
|
527
|
-
Whether to disable certificate verification
|
528
|
-
"""
|
529
|
-
tls_server_name: NotRequired[pulumi.Input[str]]
|
530
|
-
"""
|
531
|
-
This, if set, is used to set the SNI host when connecting via TLS
|
532
|
-
"""
|
533
|
-
username_template: NotRequired[pulumi.Input[str]]
|
534
|
-
"""
|
535
|
-
Template describing how dynamic usernames are generated.
|
536
|
-
"""
|
537
|
-
elif False:
|
538
|
-
SecretBackendConnectionElasticsearchArgsDict: TypeAlias = Mapping[str, Any]
|
539
|
-
|
540
350
|
@pulumi.input_type
|
541
351
|
class SecretBackendConnectionElasticsearchArgs:
|
542
352
|
def __init__(__self__, *,
|
@@ -701,39 +511,6 @@ class SecretBackendConnectionElasticsearchArgs:
|
|
701
511
|
pulumi.set(self, "username_template", value)
|
702
512
|
|
703
513
|
|
704
|
-
if not MYPY:
|
705
|
-
class SecretBackendConnectionHanaArgsDict(TypedDict):
|
706
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
707
|
-
"""
|
708
|
-
Connection string to use to connect to the database.
|
709
|
-
"""
|
710
|
-
disable_escaping: NotRequired[pulumi.Input[bool]]
|
711
|
-
"""
|
712
|
-
Disable special character escaping in username and password
|
713
|
-
"""
|
714
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
715
|
-
"""
|
716
|
-
Maximum number of seconds a connection may be reused.
|
717
|
-
"""
|
718
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
719
|
-
"""
|
720
|
-
Maximum number of idle connections to the database.
|
721
|
-
"""
|
722
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
723
|
-
"""
|
724
|
-
Maximum number of open connections to the database.
|
725
|
-
"""
|
726
|
-
password: NotRequired[pulumi.Input[str]]
|
727
|
-
"""
|
728
|
-
The root credential password used in the connection URL
|
729
|
-
"""
|
730
|
-
username: NotRequired[pulumi.Input[str]]
|
731
|
-
"""
|
732
|
-
The root credential username used in the connection URL
|
733
|
-
"""
|
734
|
-
elif False:
|
735
|
-
SecretBackendConnectionHanaArgsDict: TypeAlias = Mapping[str, Any]
|
736
|
-
|
737
514
|
@pulumi.input_type
|
738
515
|
class SecretBackendConnectionHanaArgs:
|
739
516
|
def __init__(__self__, *,
|
@@ -853,51 +630,6 @@ class SecretBackendConnectionHanaArgs:
|
|
853
630
|
pulumi.set(self, "username", value)
|
854
631
|
|
855
632
|
|
856
|
-
if not MYPY:
|
857
|
-
class SecretBackendConnectionInfluxdbArgsDict(TypedDict):
|
858
|
-
host: pulumi.Input[str]
|
859
|
-
"""
|
860
|
-
Influxdb host to connect to.
|
861
|
-
"""
|
862
|
-
password: pulumi.Input[str]
|
863
|
-
"""
|
864
|
-
Specifies the password corresponding to the given username.
|
865
|
-
"""
|
866
|
-
username: pulumi.Input[str]
|
867
|
-
"""
|
868
|
-
Specifies the username to use for superuser access.
|
869
|
-
"""
|
870
|
-
connect_timeout: NotRequired[pulumi.Input[int]]
|
871
|
-
"""
|
872
|
-
The number of seconds to use as a connection timeout.
|
873
|
-
"""
|
874
|
-
insecure_tls: NotRequired[pulumi.Input[bool]]
|
875
|
-
"""
|
876
|
-
Whether to skip verification of the server certificate when using TLS.
|
877
|
-
"""
|
878
|
-
pem_bundle: NotRequired[pulumi.Input[str]]
|
879
|
-
"""
|
880
|
-
Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
881
|
-
"""
|
882
|
-
pem_json: NotRequired[pulumi.Input[str]]
|
883
|
-
"""
|
884
|
-
Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
885
|
-
"""
|
886
|
-
port: NotRequired[pulumi.Input[int]]
|
887
|
-
"""
|
888
|
-
The transport port to use to connect to Influxdb.
|
889
|
-
"""
|
890
|
-
tls: NotRequired[pulumi.Input[bool]]
|
891
|
-
"""
|
892
|
-
Whether to use TLS when connecting to Influxdb.
|
893
|
-
"""
|
894
|
-
username_template: NotRequired[pulumi.Input[str]]
|
895
|
-
"""
|
896
|
-
Template describing how dynamic usernames are generated.
|
897
|
-
"""
|
898
|
-
elif False:
|
899
|
-
SecretBackendConnectionInfluxdbArgsDict: TypeAlias = Mapping[str, Any]
|
900
|
-
|
901
633
|
@pulumi.input_type
|
902
634
|
class SecretBackendConnectionInfluxdbArgs:
|
903
635
|
def __init__(__self__, *,
|
@@ -1062,39 +794,6 @@ class SecretBackendConnectionInfluxdbArgs:
|
|
1062
794
|
pulumi.set(self, "username_template", value)
|
1063
795
|
|
1064
796
|
|
1065
|
-
if not MYPY:
|
1066
|
-
class SecretBackendConnectionMongodbArgsDict(TypedDict):
|
1067
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
1068
|
-
"""
|
1069
|
-
Connection string to use to connect to the database.
|
1070
|
-
"""
|
1071
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
1072
|
-
"""
|
1073
|
-
Maximum number of seconds a connection may be reused.
|
1074
|
-
"""
|
1075
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
1076
|
-
"""
|
1077
|
-
Maximum number of idle connections to the database.
|
1078
|
-
"""
|
1079
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
1080
|
-
"""
|
1081
|
-
Maximum number of open connections to the database.
|
1082
|
-
"""
|
1083
|
-
password: NotRequired[pulumi.Input[str]]
|
1084
|
-
"""
|
1085
|
-
The root credential password used in the connection URL
|
1086
|
-
"""
|
1087
|
-
username: NotRequired[pulumi.Input[str]]
|
1088
|
-
"""
|
1089
|
-
The root credential username used in the connection URL
|
1090
|
-
"""
|
1091
|
-
username_template: NotRequired[pulumi.Input[str]]
|
1092
|
-
"""
|
1093
|
-
Username generation template.
|
1094
|
-
"""
|
1095
|
-
elif False:
|
1096
|
-
SecretBackendConnectionMongodbArgsDict: TypeAlias = Mapping[str, Any]
|
1097
|
-
|
1098
797
|
@pulumi.input_type
|
1099
798
|
class SecretBackendConnectionMongodbArgs:
|
1100
799
|
def __init__(__self__, *,
|
@@ -1214,23 +913,6 @@ class SecretBackendConnectionMongodbArgs:
|
|
1214
913
|
pulumi.set(self, "username_template", value)
|
1215
914
|
|
1216
915
|
|
1217
|
-
if not MYPY:
|
1218
|
-
class SecretBackendConnectionMongodbatlasArgsDict(TypedDict):
|
1219
|
-
private_key: pulumi.Input[str]
|
1220
|
-
"""
|
1221
|
-
The Private Programmatic API Key used to connect with MongoDB Atlas API.
|
1222
|
-
"""
|
1223
|
-
project_id: pulumi.Input[str]
|
1224
|
-
"""
|
1225
|
-
The Project ID the Database User should be created within.
|
1226
|
-
"""
|
1227
|
-
public_key: pulumi.Input[str]
|
1228
|
-
"""
|
1229
|
-
The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
|
1230
|
-
"""
|
1231
|
-
elif False:
|
1232
|
-
SecretBackendConnectionMongodbatlasArgsDict: TypeAlias = Mapping[str, Any]
|
1233
|
-
|
1234
916
|
@pulumi.input_type
|
1235
917
|
class SecretBackendConnectionMongodbatlasArgs:
|
1236
918
|
def __init__(__self__, *,
|
@@ -1283,47 +965,6 @@ class SecretBackendConnectionMongodbatlasArgs:
|
|
1283
965
|
pulumi.set(self, "public_key", value)
|
1284
966
|
|
1285
967
|
|
1286
|
-
if not MYPY:
|
1287
|
-
class SecretBackendConnectionMssqlArgsDict(TypedDict):
|
1288
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
1289
|
-
"""
|
1290
|
-
Connection string to use to connect to the database.
|
1291
|
-
"""
|
1292
|
-
contained_db: NotRequired[pulumi.Input[bool]]
|
1293
|
-
"""
|
1294
|
-
Set to true when the target is a Contained Database, e.g. AzureSQL.
|
1295
|
-
"""
|
1296
|
-
disable_escaping: NotRequired[pulumi.Input[bool]]
|
1297
|
-
"""
|
1298
|
-
Disable special character escaping in username and password
|
1299
|
-
"""
|
1300
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
1301
|
-
"""
|
1302
|
-
Maximum number of seconds a connection may be reused.
|
1303
|
-
"""
|
1304
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
1305
|
-
"""
|
1306
|
-
Maximum number of idle connections to the database.
|
1307
|
-
"""
|
1308
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
1309
|
-
"""
|
1310
|
-
Maximum number of open connections to the database.
|
1311
|
-
"""
|
1312
|
-
password: NotRequired[pulumi.Input[str]]
|
1313
|
-
"""
|
1314
|
-
The root credential password used in the connection URL
|
1315
|
-
"""
|
1316
|
-
username: NotRequired[pulumi.Input[str]]
|
1317
|
-
"""
|
1318
|
-
The root credential username used in the connection URL
|
1319
|
-
"""
|
1320
|
-
username_template: NotRequired[pulumi.Input[str]]
|
1321
|
-
"""
|
1322
|
-
Username generation template.
|
1323
|
-
"""
|
1324
|
-
elif False:
|
1325
|
-
SecretBackendConnectionMssqlArgsDict: TypeAlias = Mapping[str, Any]
|
1326
|
-
|
1327
968
|
@pulumi.input_type
|
1328
969
|
class SecretBackendConnectionMssqlArgs:
|
1329
970
|
def __init__(__self__, *,
|
@@ -1475,55 +1116,6 @@ class SecretBackendConnectionMssqlArgs:
|
|
1475
1116
|
pulumi.set(self, "username_template", value)
|
1476
1117
|
|
1477
1118
|
|
1478
|
-
if not MYPY:
|
1479
|
-
class SecretBackendConnectionMysqlArgsDict(TypedDict):
|
1480
|
-
auth_type: NotRequired[pulumi.Input[str]]
|
1481
|
-
"""
|
1482
|
-
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1483
|
-
"""
|
1484
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
1485
|
-
"""
|
1486
|
-
Connection string to use to connect to the database.
|
1487
|
-
"""
|
1488
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
1489
|
-
"""
|
1490
|
-
Maximum number of seconds a connection may be reused.
|
1491
|
-
"""
|
1492
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
1493
|
-
"""
|
1494
|
-
Maximum number of idle connections to the database.
|
1495
|
-
"""
|
1496
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
1497
|
-
"""
|
1498
|
-
Maximum number of open connections to the database.
|
1499
|
-
"""
|
1500
|
-
password: NotRequired[pulumi.Input[str]]
|
1501
|
-
"""
|
1502
|
-
The root credential password used in the connection URL
|
1503
|
-
"""
|
1504
|
-
service_account_json: NotRequired[pulumi.Input[str]]
|
1505
|
-
"""
|
1506
|
-
A JSON encoded credential for use with IAM authorization
|
1507
|
-
"""
|
1508
|
-
tls_ca: NotRequired[pulumi.Input[str]]
|
1509
|
-
"""
|
1510
|
-
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1511
|
-
"""
|
1512
|
-
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
1513
|
-
"""
|
1514
|
-
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1515
|
-
"""
|
1516
|
-
username: NotRequired[pulumi.Input[str]]
|
1517
|
-
"""
|
1518
|
-
The root credential username used in the connection URL
|
1519
|
-
"""
|
1520
|
-
username_template: NotRequired[pulumi.Input[str]]
|
1521
|
-
"""
|
1522
|
-
Username generation template.
|
1523
|
-
"""
|
1524
|
-
elif False:
|
1525
|
-
SecretBackendConnectionMysqlArgsDict: TypeAlias = Mapping[str, Any]
|
1526
|
-
|
1527
1119
|
@pulumi.input_type
|
1528
1120
|
class SecretBackendConnectionMysqlArgs:
|
1529
1121
|
def __init__(__self__, *,
|
@@ -1707,69 +1299,20 @@ class SecretBackendConnectionMysqlArgs:
|
|
1707
1299
|
pulumi.set(self, "username_template", value)
|
1708
1300
|
|
1709
1301
|
|
1710
|
-
|
1711
|
-
|
1712
|
-
|
1713
|
-
|
1714
|
-
|
1715
|
-
|
1716
|
-
|
1717
|
-
|
1718
|
-
|
1719
|
-
|
1720
|
-
|
1721
|
-
|
1722
|
-
|
1723
|
-
|
1724
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
1725
|
-
"""
|
1726
|
-
Maximum number of idle connections to the database.
|
1727
|
-
"""
|
1728
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
1729
|
-
"""
|
1730
|
-
Maximum number of open connections to the database.
|
1731
|
-
"""
|
1732
|
-
password: NotRequired[pulumi.Input[str]]
|
1733
|
-
"""
|
1734
|
-
The root credential password used in the connection URL
|
1735
|
-
"""
|
1736
|
-
service_account_json: NotRequired[pulumi.Input[str]]
|
1737
|
-
"""
|
1738
|
-
A JSON encoded credential for use with IAM authorization
|
1739
|
-
"""
|
1740
|
-
tls_ca: NotRequired[pulumi.Input[str]]
|
1741
|
-
"""
|
1742
|
-
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1743
|
-
"""
|
1744
|
-
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
1745
|
-
"""
|
1746
|
-
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1747
|
-
"""
|
1748
|
-
username: NotRequired[pulumi.Input[str]]
|
1749
|
-
"""
|
1750
|
-
The root credential username used in the connection URL
|
1751
|
-
"""
|
1752
|
-
username_template: NotRequired[pulumi.Input[str]]
|
1753
|
-
"""
|
1754
|
-
Username generation template.
|
1755
|
-
"""
|
1756
|
-
elif False:
|
1757
|
-
SecretBackendConnectionMysqlAuroraArgsDict: TypeAlias = Mapping[str, Any]
|
1758
|
-
|
1759
|
-
@pulumi.input_type
|
1760
|
-
class SecretBackendConnectionMysqlAuroraArgs:
|
1761
|
-
def __init__(__self__, *,
|
1762
|
-
auth_type: Optional[pulumi.Input[str]] = None,
|
1763
|
-
connection_url: Optional[pulumi.Input[str]] = None,
|
1764
|
-
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
1765
|
-
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
1766
|
-
max_open_connections: Optional[pulumi.Input[int]] = None,
|
1767
|
-
password: Optional[pulumi.Input[str]] = None,
|
1768
|
-
service_account_json: Optional[pulumi.Input[str]] = None,
|
1769
|
-
tls_ca: Optional[pulumi.Input[str]] = None,
|
1770
|
-
tls_certificate_key: Optional[pulumi.Input[str]] = None,
|
1771
|
-
username: Optional[pulumi.Input[str]] = None,
|
1772
|
-
username_template: Optional[pulumi.Input[str]] = None):
|
1302
|
+
@pulumi.input_type
|
1303
|
+
class SecretBackendConnectionMysqlAuroraArgs:
|
1304
|
+
def __init__(__self__, *,
|
1305
|
+
auth_type: Optional[pulumi.Input[str]] = None,
|
1306
|
+
connection_url: Optional[pulumi.Input[str]] = None,
|
1307
|
+
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
1308
|
+
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
1309
|
+
max_open_connections: Optional[pulumi.Input[int]] = None,
|
1310
|
+
password: Optional[pulumi.Input[str]] = None,
|
1311
|
+
service_account_json: Optional[pulumi.Input[str]] = None,
|
1312
|
+
tls_ca: Optional[pulumi.Input[str]] = None,
|
1313
|
+
tls_certificate_key: Optional[pulumi.Input[str]] = None,
|
1314
|
+
username: Optional[pulumi.Input[str]] = None,
|
1315
|
+
username_template: Optional[pulumi.Input[str]] = None):
|
1773
1316
|
"""
|
1774
1317
|
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1775
1318
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
@@ -1939,55 +1482,6 @@ class SecretBackendConnectionMysqlAuroraArgs:
|
|
1939
1482
|
pulumi.set(self, "username_template", value)
|
1940
1483
|
|
1941
1484
|
|
1942
|
-
if not MYPY:
|
1943
|
-
class SecretBackendConnectionMysqlLegacyArgsDict(TypedDict):
|
1944
|
-
auth_type: NotRequired[pulumi.Input[str]]
|
1945
|
-
"""
|
1946
|
-
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1947
|
-
"""
|
1948
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
1949
|
-
"""
|
1950
|
-
Connection string to use to connect to the database.
|
1951
|
-
"""
|
1952
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
1953
|
-
"""
|
1954
|
-
Maximum number of seconds a connection may be reused.
|
1955
|
-
"""
|
1956
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
1957
|
-
"""
|
1958
|
-
Maximum number of idle connections to the database.
|
1959
|
-
"""
|
1960
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
1961
|
-
"""
|
1962
|
-
Maximum number of open connections to the database.
|
1963
|
-
"""
|
1964
|
-
password: NotRequired[pulumi.Input[str]]
|
1965
|
-
"""
|
1966
|
-
The root credential password used in the connection URL
|
1967
|
-
"""
|
1968
|
-
service_account_json: NotRequired[pulumi.Input[str]]
|
1969
|
-
"""
|
1970
|
-
A JSON encoded credential for use with IAM authorization
|
1971
|
-
"""
|
1972
|
-
tls_ca: NotRequired[pulumi.Input[str]]
|
1973
|
-
"""
|
1974
|
-
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1975
|
-
"""
|
1976
|
-
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
1977
|
-
"""
|
1978
|
-
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1979
|
-
"""
|
1980
|
-
username: NotRequired[pulumi.Input[str]]
|
1981
|
-
"""
|
1982
|
-
The root credential username used in the connection URL
|
1983
|
-
"""
|
1984
|
-
username_template: NotRequired[pulumi.Input[str]]
|
1985
|
-
"""
|
1986
|
-
Username generation template.
|
1987
|
-
"""
|
1988
|
-
elif False:
|
1989
|
-
SecretBackendConnectionMysqlLegacyArgsDict: TypeAlias = Mapping[str, Any]
|
1990
|
-
|
1991
1485
|
@pulumi.input_type
|
1992
1486
|
class SecretBackendConnectionMysqlLegacyArgs:
|
1993
1487
|
def __init__(__self__, *,
|
@@ -2171,55 +1665,6 @@ class SecretBackendConnectionMysqlLegacyArgs:
|
|
2171
1665
|
pulumi.set(self, "username_template", value)
|
2172
1666
|
|
2173
1667
|
|
2174
|
-
if not MYPY:
|
2175
|
-
class SecretBackendConnectionMysqlRdsArgsDict(TypedDict):
|
2176
|
-
auth_type: NotRequired[pulumi.Input[str]]
|
2177
|
-
"""
|
2178
|
-
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
2179
|
-
"""
|
2180
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
2181
|
-
"""
|
2182
|
-
Connection string to use to connect to the database.
|
2183
|
-
"""
|
2184
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
2185
|
-
"""
|
2186
|
-
Maximum number of seconds a connection may be reused.
|
2187
|
-
"""
|
2188
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
2189
|
-
"""
|
2190
|
-
Maximum number of idle connections to the database.
|
2191
|
-
"""
|
2192
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
2193
|
-
"""
|
2194
|
-
Maximum number of open connections to the database.
|
2195
|
-
"""
|
2196
|
-
password: NotRequired[pulumi.Input[str]]
|
2197
|
-
"""
|
2198
|
-
The root credential password used in the connection URL
|
2199
|
-
"""
|
2200
|
-
service_account_json: NotRequired[pulumi.Input[str]]
|
2201
|
-
"""
|
2202
|
-
A JSON encoded credential for use with IAM authorization
|
2203
|
-
"""
|
2204
|
-
tls_ca: NotRequired[pulumi.Input[str]]
|
2205
|
-
"""
|
2206
|
-
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
2207
|
-
"""
|
2208
|
-
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
2209
|
-
"""
|
2210
|
-
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
2211
|
-
"""
|
2212
|
-
username: NotRequired[pulumi.Input[str]]
|
2213
|
-
"""
|
2214
|
-
The root credential username used in the connection URL
|
2215
|
-
"""
|
2216
|
-
username_template: NotRequired[pulumi.Input[str]]
|
2217
|
-
"""
|
2218
|
-
Username generation template.
|
2219
|
-
"""
|
2220
|
-
elif False:
|
2221
|
-
SecretBackendConnectionMysqlRdsArgsDict: TypeAlias = Mapping[str, Any]
|
2222
|
-
|
2223
1668
|
@pulumi.input_type
|
2224
1669
|
class SecretBackendConnectionMysqlRdsArgs:
|
2225
1670
|
def __init__(__self__, *,
|
@@ -2403,47 +1848,6 @@ class SecretBackendConnectionMysqlRdsArgs:
|
|
2403
1848
|
pulumi.set(self, "username_template", value)
|
2404
1849
|
|
2405
1850
|
|
2406
|
-
if not MYPY:
|
2407
|
-
class SecretBackendConnectionOracleArgsDict(TypedDict):
|
2408
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
2409
|
-
"""
|
2410
|
-
Connection string to use to connect to the database.
|
2411
|
-
"""
|
2412
|
-
disconnect_sessions: NotRequired[pulumi.Input[bool]]
|
2413
|
-
"""
|
2414
|
-
Set to true to disconnect any open sessions prior to running the revocation statements.
|
2415
|
-
"""
|
2416
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
2417
|
-
"""
|
2418
|
-
Maximum number of seconds a connection may be reused.
|
2419
|
-
"""
|
2420
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
2421
|
-
"""
|
2422
|
-
Maximum number of idle connections to the database.
|
2423
|
-
"""
|
2424
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
2425
|
-
"""
|
2426
|
-
Maximum number of open connections to the database.
|
2427
|
-
"""
|
2428
|
-
password: NotRequired[pulumi.Input[str]]
|
2429
|
-
"""
|
2430
|
-
The root credential password used in the connection URL
|
2431
|
-
"""
|
2432
|
-
split_statements: NotRequired[pulumi.Input[bool]]
|
2433
|
-
"""
|
2434
|
-
Set to true in order to split statements after semi-colons.
|
2435
|
-
"""
|
2436
|
-
username: NotRequired[pulumi.Input[str]]
|
2437
|
-
"""
|
2438
|
-
The root credential username used in the connection URL
|
2439
|
-
"""
|
2440
|
-
username_template: NotRequired[pulumi.Input[str]]
|
2441
|
-
"""
|
2442
|
-
Username generation template.
|
2443
|
-
"""
|
2444
|
-
elif False:
|
2445
|
-
SecretBackendConnectionOracleArgsDict: TypeAlias = Mapping[str, Any]
|
2446
|
-
|
2447
1851
|
@pulumi.input_type
|
2448
1852
|
class SecretBackendConnectionOracleArgs:
|
2449
1853
|
def __init__(__self__, *,
|
@@ -2595,67 +1999,6 @@ class SecretBackendConnectionOracleArgs:
|
|
2595
1999
|
pulumi.set(self, "username_template", value)
|
2596
2000
|
|
2597
2001
|
|
2598
|
-
if not MYPY:
|
2599
|
-
class SecretBackendConnectionPostgresqlArgsDict(TypedDict):
|
2600
|
-
auth_type: NotRequired[pulumi.Input[str]]
|
2601
|
-
"""
|
2602
|
-
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
2603
|
-
"""
|
2604
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
2605
|
-
"""
|
2606
|
-
Connection string to use to connect to the database.
|
2607
|
-
"""
|
2608
|
-
disable_escaping: NotRequired[pulumi.Input[bool]]
|
2609
|
-
"""
|
2610
|
-
Disable special character escaping in username and password
|
2611
|
-
"""
|
2612
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
2613
|
-
"""
|
2614
|
-
Maximum number of seconds a connection may be reused.
|
2615
|
-
"""
|
2616
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
2617
|
-
"""
|
2618
|
-
Maximum number of idle connections to the database.
|
2619
|
-
"""
|
2620
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
2621
|
-
"""
|
2622
|
-
Maximum number of open connections to the database.
|
2623
|
-
"""
|
2624
|
-
password: NotRequired[pulumi.Input[str]]
|
2625
|
-
"""
|
2626
|
-
The root credential password used in the connection URL
|
2627
|
-
"""
|
2628
|
-
private_key: NotRequired[pulumi.Input[str]]
|
2629
|
-
"""
|
2630
|
-
The secret key used for the x509 client certificate. Must be PEM encoded.
|
2631
|
-
"""
|
2632
|
-
self_managed: NotRequired[pulumi.Input[bool]]
|
2633
|
-
"""
|
2634
|
-
If set, allows onboarding static roles with a rootless connection configuration.
|
2635
|
-
"""
|
2636
|
-
service_account_json: NotRequired[pulumi.Input[str]]
|
2637
|
-
"""
|
2638
|
-
A JSON encoded credential for use with IAM authorization
|
2639
|
-
"""
|
2640
|
-
tls_ca: NotRequired[pulumi.Input[str]]
|
2641
|
-
"""
|
2642
|
-
The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
2643
|
-
"""
|
2644
|
-
tls_certificate: NotRequired[pulumi.Input[str]]
|
2645
|
-
"""
|
2646
|
-
The x509 client certificate for connecting to the database. Must be PEM encoded.
|
2647
|
-
"""
|
2648
|
-
username: NotRequired[pulumi.Input[str]]
|
2649
|
-
"""
|
2650
|
-
The root credential username used in the connection URL
|
2651
|
-
"""
|
2652
|
-
username_template: NotRequired[pulumi.Input[str]]
|
2653
|
-
"""
|
2654
|
-
Username generation template.
|
2655
|
-
"""
|
2656
|
-
elif False:
|
2657
|
-
SecretBackendConnectionPostgresqlArgsDict: TypeAlias = Mapping[str, Any]
|
2658
|
-
|
2659
2002
|
@pulumi.input_type
|
2660
2003
|
class SecretBackendConnectionPostgresqlArgs:
|
2661
2004
|
def __init__(__self__, *,
|
@@ -2666,11 +2009,7 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2666
2009
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
2667
2010
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
2668
2011
|
password: Optional[pulumi.Input[str]] = None,
|
2669
|
-
private_key: Optional[pulumi.Input[str]] = None,
|
2670
|
-
self_managed: Optional[pulumi.Input[bool]] = None,
|
2671
2012
|
service_account_json: Optional[pulumi.Input[str]] = None,
|
2672
|
-
tls_ca: Optional[pulumi.Input[str]] = None,
|
2673
|
-
tls_certificate: Optional[pulumi.Input[str]] = None,
|
2674
2013
|
username: Optional[pulumi.Input[str]] = None,
|
2675
2014
|
username_template: Optional[pulumi.Input[str]] = None):
|
2676
2015
|
"""
|
@@ -2681,11 +2020,7 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2681
2020
|
:param pulumi.Input[int] max_idle_connections: Maximum number of idle connections to the database.
|
2682
2021
|
:param pulumi.Input[int] max_open_connections: Maximum number of open connections to the database.
|
2683
2022
|
:param pulumi.Input[str] password: The root credential password used in the connection URL
|
2684
|
-
:param pulumi.Input[str] private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
|
2685
|
-
:param pulumi.Input[bool] self_managed: If set, allows onboarding static roles with a rootless connection configuration.
|
2686
2023
|
:param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
|
2687
|
-
:param pulumi.Input[str] tls_ca: The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
2688
|
-
:param pulumi.Input[str] tls_certificate: The x509 client certificate for connecting to the database. Must be PEM encoded.
|
2689
2024
|
:param pulumi.Input[str] username: The root credential username used in the connection URL
|
2690
2025
|
:param pulumi.Input[str] username_template: Username generation template.
|
2691
2026
|
"""
|
@@ -2703,16 +2038,8 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2703
2038
|
pulumi.set(__self__, "max_open_connections", max_open_connections)
|
2704
2039
|
if password is not None:
|
2705
2040
|
pulumi.set(__self__, "password", password)
|
2706
|
-
if private_key is not None:
|
2707
|
-
pulumi.set(__self__, "private_key", private_key)
|
2708
|
-
if self_managed is not None:
|
2709
|
-
pulumi.set(__self__, "self_managed", self_managed)
|
2710
2041
|
if service_account_json is not None:
|
2711
2042
|
pulumi.set(__self__, "service_account_json", service_account_json)
|
2712
|
-
if tls_ca is not None:
|
2713
|
-
pulumi.set(__self__, "tls_ca", tls_ca)
|
2714
|
-
if tls_certificate is not None:
|
2715
|
-
pulumi.set(__self__, "tls_certificate", tls_certificate)
|
2716
2043
|
if username is not None:
|
2717
2044
|
pulumi.set(__self__, "username", username)
|
2718
2045
|
if username_template is not None:
|
@@ -2802,30 +2129,6 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2802
2129
|
def password(self, value: Optional[pulumi.Input[str]]):
|
2803
2130
|
pulumi.set(self, "password", value)
|
2804
2131
|
|
2805
|
-
@property
|
2806
|
-
@pulumi.getter(name="privateKey")
|
2807
|
-
def private_key(self) -> Optional[pulumi.Input[str]]:
|
2808
|
-
"""
|
2809
|
-
The secret key used for the x509 client certificate. Must be PEM encoded.
|
2810
|
-
"""
|
2811
|
-
return pulumi.get(self, "private_key")
|
2812
|
-
|
2813
|
-
@private_key.setter
|
2814
|
-
def private_key(self, value: Optional[pulumi.Input[str]]):
|
2815
|
-
pulumi.set(self, "private_key", value)
|
2816
|
-
|
2817
|
-
@property
|
2818
|
-
@pulumi.getter(name="selfManaged")
|
2819
|
-
def self_managed(self) -> Optional[pulumi.Input[bool]]:
|
2820
|
-
"""
|
2821
|
-
If set, allows onboarding static roles with a rootless connection configuration.
|
2822
|
-
"""
|
2823
|
-
return pulumi.get(self, "self_managed")
|
2824
|
-
|
2825
|
-
@self_managed.setter
|
2826
|
-
def self_managed(self, value: Optional[pulumi.Input[bool]]):
|
2827
|
-
pulumi.set(self, "self_managed", value)
|
2828
|
-
|
2829
2132
|
@property
|
2830
2133
|
@pulumi.getter(name="serviceAccountJson")
|
2831
2134
|
def service_account_json(self) -> Optional[pulumi.Input[str]]:
|
@@ -2838,30 +2141,6 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2838
2141
|
def service_account_json(self, value: Optional[pulumi.Input[str]]):
|
2839
2142
|
pulumi.set(self, "service_account_json", value)
|
2840
2143
|
|
2841
|
-
@property
|
2842
|
-
@pulumi.getter(name="tlsCa")
|
2843
|
-
def tls_ca(self) -> Optional[pulumi.Input[str]]:
|
2844
|
-
"""
|
2845
|
-
The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
2846
|
-
"""
|
2847
|
-
return pulumi.get(self, "tls_ca")
|
2848
|
-
|
2849
|
-
@tls_ca.setter
|
2850
|
-
def tls_ca(self, value: Optional[pulumi.Input[str]]):
|
2851
|
-
pulumi.set(self, "tls_ca", value)
|
2852
|
-
|
2853
|
-
@property
|
2854
|
-
@pulumi.getter(name="tlsCertificate")
|
2855
|
-
def tls_certificate(self) -> Optional[pulumi.Input[str]]:
|
2856
|
-
"""
|
2857
|
-
The x509 client certificate for connecting to the database. Must be PEM encoded.
|
2858
|
-
"""
|
2859
|
-
return pulumi.get(self, "tls_certificate")
|
2860
|
-
|
2861
|
-
@tls_certificate.setter
|
2862
|
-
def tls_certificate(self, value: Optional[pulumi.Input[str]]):
|
2863
|
-
pulumi.set(self, "tls_certificate", value)
|
2864
|
-
|
2865
2144
|
@property
|
2866
2145
|
@pulumi.getter
|
2867
2146
|
def username(self) -> Optional[pulumi.Input[str]]:
|
@@ -2887,39 +2166,6 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2887
2166
|
pulumi.set(self, "username_template", value)
|
2888
2167
|
|
2889
2168
|
|
2890
|
-
if not MYPY:
|
2891
|
-
class SecretBackendConnectionRedisArgsDict(TypedDict):
|
2892
|
-
host: pulumi.Input[str]
|
2893
|
-
"""
|
2894
|
-
Specifies the host to connect to
|
2895
|
-
"""
|
2896
|
-
password: pulumi.Input[str]
|
2897
|
-
"""
|
2898
|
-
Specifies the password corresponding to the given username.
|
2899
|
-
"""
|
2900
|
-
username: pulumi.Input[str]
|
2901
|
-
"""
|
2902
|
-
Specifies the username for Vault to use.
|
2903
|
-
"""
|
2904
|
-
ca_cert: NotRequired[pulumi.Input[str]]
|
2905
|
-
"""
|
2906
|
-
The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
|
2907
|
-
"""
|
2908
|
-
insecure_tls: NotRequired[pulumi.Input[bool]]
|
2909
|
-
"""
|
2910
|
-
Specifies whether to skip verification of the server certificate when using TLS.
|
2911
|
-
"""
|
2912
|
-
port: NotRequired[pulumi.Input[int]]
|
2913
|
-
"""
|
2914
|
-
The transport port to use to connect to Redis.
|
2915
|
-
"""
|
2916
|
-
tls: NotRequired[pulumi.Input[bool]]
|
2917
|
-
"""
|
2918
|
-
Specifies whether to use TLS when connecting to Redis.
|
2919
|
-
"""
|
2920
|
-
elif False:
|
2921
|
-
SecretBackendConnectionRedisArgsDict: TypeAlias = Mapping[str, Any]
|
2922
|
-
|
2923
2169
|
@pulumi.input_type
|
2924
2170
|
class SecretBackendConnectionRedisArgs:
|
2925
2171
|
def __init__(__self__, *,
|
@@ -3036,27 +2282,6 @@ class SecretBackendConnectionRedisArgs:
|
|
3036
2282
|
pulumi.set(self, "tls", value)
|
3037
2283
|
|
3038
2284
|
|
3039
|
-
if not MYPY:
|
3040
|
-
class SecretBackendConnectionRedisElasticacheArgsDict(TypedDict):
|
3041
|
-
url: pulumi.Input[str]
|
3042
|
-
"""
|
3043
|
-
The configuration endpoint for the ElastiCache cluster to connect to.
|
3044
|
-
"""
|
3045
|
-
password: NotRequired[pulumi.Input[str]]
|
3046
|
-
"""
|
3047
|
-
The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
3048
|
-
"""
|
3049
|
-
region: NotRequired[pulumi.Input[str]]
|
3050
|
-
"""
|
3051
|
-
The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
|
3052
|
-
"""
|
3053
|
-
username: NotRequired[pulumi.Input[str]]
|
3054
|
-
"""
|
3055
|
-
The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
3056
|
-
"""
|
3057
|
-
elif False:
|
3058
|
-
SecretBackendConnectionRedisElasticacheArgsDict: TypeAlias = Mapping[str, Any]
|
3059
|
-
|
3060
2285
|
@pulumi.input_type
|
3061
2286
|
class SecretBackendConnectionRedisElasticacheArgs:
|
3062
2287
|
def __init__(__self__, *,
|
@@ -3127,43 +2352,6 @@ class SecretBackendConnectionRedisElasticacheArgs:
|
|
3127
2352
|
pulumi.set(self, "username", value)
|
3128
2353
|
|
3129
2354
|
|
3130
|
-
if not MYPY:
|
3131
|
-
class SecretBackendConnectionRedshiftArgsDict(TypedDict):
|
3132
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
3133
|
-
"""
|
3134
|
-
Connection string to use to connect to the database.
|
3135
|
-
"""
|
3136
|
-
disable_escaping: NotRequired[pulumi.Input[bool]]
|
3137
|
-
"""
|
3138
|
-
Disable special character escaping in username and password
|
3139
|
-
"""
|
3140
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
3141
|
-
"""
|
3142
|
-
Maximum number of seconds a connection may be reused.
|
3143
|
-
"""
|
3144
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
3145
|
-
"""
|
3146
|
-
Maximum number of idle connections to the database.
|
3147
|
-
"""
|
3148
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
3149
|
-
"""
|
3150
|
-
Maximum number of open connections to the database.
|
3151
|
-
"""
|
3152
|
-
password: NotRequired[pulumi.Input[str]]
|
3153
|
-
"""
|
3154
|
-
The root credential password used in the connection URL
|
3155
|
-
"""
|
3156
|
-
username: NotRequired[pulumi.Input[str]]
|
3157
|
-
"""
|
3158
|
-
The root credential username used in the connection URL
|
3159
|
-
"""
|
3160
|
-
username_template: NotRequired[pulumi.Input[str]]
|
3161
|
-
"""
|
3162
|
-
Username generation template.
|
3163
|
-
"""
|
3164
|
-
elif False:
|
3165
|
-
SecretBackendConnectionRedshiftArgsDict: TypeAlias = Mapping[str, Any]
|
3166
|
-
|
3167
2355
|
@pulumi.input_type
|
3168
2356
|
class SecretBackendConnectionRedshiftArgs:
|
3169
2357
|
def __init__(__self__, *,
|
@@ -3299,39 +2487,6 @@ class SecretBackendConnectionRedshiftArgs:
|
|
3299
2487
|
pulumi.set(self, "username_template", value)
|
3300
2488
|
|
3301
2489
|
|
3302
|
-
if not MYPY:
|
3303
|
-
class SecretBackendConnectionSnowflakeArgsDict(TypedDict):
|
3304
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
3305
|
-
"""
|
3306
|
-
Connection string to use to connect to the database.
|
3307
|
-
"""
|
3308
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
3309
|
-
"""
|
3310
|
-
Maximum number of seconds a connection may be reused.
|
3311
|
-
"""
|
3312
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
3313
|
-
"""
|
3314
|
-
Maximum number of idle connections to the database.
|
3315
|
-
"""
|
3316
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
3317
|
-
"""
|
3318
|
-
Maximum number of open connections to the database.
|
3319
|
-
"""
|
3320
|
-
password: NotRequired[pulumi.Input[str]]
|
3321
|
-
"""
|
3322
|
-
The root credential password used in the connection URL
|
3323
|
-
"""
|
3324
|
-
username: NotRequired[pulumi.Input[str]]
|
3325
|
-
"""
|
3326
|
-
The root credential username used in the connection URL
|
3327
|
-
"""
|
3328
|
-
username_template: NotRequired[pulumi.Input[str]]
|
3329
|
-
"""
|
3330
|
-
Username generation template.
|
3331
|
-
"""
|
3332
|
-
elif False:
|
3333
|
-
SecretBackendConnectionSnowflakeArgsDict: TypeAlias = Mapping[str, Any]
|
3334
|
-
|
3335
2490
|
@pulumi.input_type
|
3336
2491
|
class SecretBackendConnectionSnowflakeArgs:
|
3337
2492
|
def __init__(__self__, *,
|
@@ -3451,90 +2606,13 @@ class SecretBackendConnectionSnowflakeArgs:
|
|
3451
2606
|
pulumi.set(self, "username_template", value)
|
3452
2607
|
|
3453
2608
|
|
3454
|
-
if not MYPY:
|
3455
|
-
class SecretsMountCassandraArgsDict(TypedDict):
|
3456
|
-
name: pulumi.Input[str]
|
3457
|
-
"""
|
3458
|
-
Name of the database connection.
|
3459
|
-
"""
|
3460
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
3461
|
-
"""
|
3462
|
-
A list of roles that are allowed to use this
|
3463
|
-
connection.
|
3464
|
-
"""
|
3465
|
-
connect_timeout: NotRequired[pulumi.Input[int]]
|
3466
|
-
"""
|
3467
|
-
The number of seconds to use as a connection timeout.
|
3468
|
-
"""
|
3469
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
3470
|
-
"""
|
3471
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3472
|
-
|
3473
|
-
Supported list of database secrets engines that can be configured:
|
3474
|
-
"""
|
3475
|
-
hosts: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
3476
|
-
"""
|
3477
|
-
Cassandra hosts to connect to.
|
3478
|
-
"""
|
3479
|
-
insecure_tls: NotRequired[pulumi.Input[bool]]
|
3480
|
-
"""
|
3481
|
-
Whether to skip verification of the server certificate when using TLS.
|
3482
|
-
"""
|
3483
|
-
password: NotRequired[pulumi.Input[str]]
|
3484
|
-
"""
|
3485
|
-
The password to use when authenticating with Cassandra.
|
3486
|
-
"""
|
3487
|
-
pem_bundle: NotRequired[pulumi.Input[str]]
|
3488
|
-
"""
|
3489
|
-
Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
3490
|
-
"""
|
3491
|
-
pem_json: NotRequired[pulumi.Input[str]]
|
3492
|
-
"""
|
3493
|
-
Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
3494
|
-
"""
|
3495
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
3496
|
-
"""
|
3497
|
-
Specifies the name of the plugin to use.
|
3498
|
-
"""
|
3499
|
-
port: NotRequired[pulumi.Input[int]]
|
3500
|
-
"""
|
3501
|
-
The transport port to use to connect to Cassandra.
|
3502
|
-
"""
|
3503
|
-
protocol_version: NotRequired[pulumi.Input[int]]
|
3504
|
-
"""
|
3505
|
-
The CQL protocol version to use.
|
3506
|
-
"""
|
3507
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
3508
|
-
"""
|
3509
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
3510
|
-
"""
|
3511
|
-
skip_verification: NotRequired[pulumi.Input[bool]]
|
3512
|
-
"""
|
3513
|
-
Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
3514
|
-
"""
|
3515
|
-
tls: NotRequired[pulumi.Input[bool]]
|
3516
|
-
"""
|
3517
|
-
Whether to use TLS when connecting to Cassandra.
|
3518
|
-
"""
|
3519
|
-
username: NotRequired[pulumi.Input[str]]
|
3520
|
-
"""
|
3521
|
-
The username to use when authenticating with Cassandra.
|
3522
|
-
"""
|
3523
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
3524
|
-
"""
|
3525
|
-
Whether the connection should be verified on
|
3526
|
-
initial configuration or not.
|
3527
|
-
"""
|
3528
|
-
elif False:
|
3529
|
-
SecretsMountCassandraArgsDict: TypeAlias = Mapping[str, Any]
|
3530
|
-
|
3531
2609
|
@pulumi.input_type
|
3532
2610
|
class SecretsMountCassandraArgs:
|
3533
2611
|
def __init__(__self__, *,
|
3534
2612
|
name: pulumi.Input[str],
|
3535
2613
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
3536
2614
|
connect_timeout: Optional[pulumi.Input[int]] = None,
|
3537
|
-
data: Optional[pulumi.Input[Mapping[str,
|
2615
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
3538
2616
|
hosts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
3539
2617
|
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
3540
2618
|
password: Optional[pulumi.Input[str]] = None,
|
@@ -3544,7 +2622,6 @@ class SecretsMountCassandraArgs:
|
|
3544
2622
|
port: Optional[pulumi.Input[int]] = None,
|
3545
2623
|
protocol_version: Optional[pulumi.Input[int]] = None,
|
3546
2624
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
3547
|
-
skip_verification: Optional[pulumi.Input[bool]] = None,
|
3548
2625
|
tls: Optional[pulumi.Input[bool]] = None,
|
3549
2626
|
username: Optional[pulumi.Input[str]] = None,
|
3550
2627
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
@@ -3553,7 +2630,7 @@ class SecretsMountCassandraArgs:
|
|
3553
2630
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
3554
2631
|
connection.
|
3555
2632
|
:param pulumi.Input[int] connect_timeout: The number of seconds to use as a connection timeout.
|
3556
|
-
:param pulumi.Input[Mapping[str,
|
2633
|
+
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3557
2634
|
|
3558
2635
|
Supported list of database secrets engines that can be configured:
|
3559
2636
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] hosts: Cassandra hosts to connect to.
|
@@ -3565,7 +2642,6 @@ class SecretsMountCassandraArgs:
|
|
3565
2642
|
:param pulumi.Input[int] port: The transport port to use to connect to Cassandra.
|
3566
2643
|
:param pulumi.Input[int] protocol_version: The CQL protocol version to use.
|
3567
2644
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
3568
|
-
:param pulumi.Input[bool] skip_verification: Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
3569
2645
|
:param pulumi.Input[bool] tls: Whether to use TLS when connecting to Cassandra.
|
3570
2646
|
:param pulumi.Input[str] username: The username to use when authenticating with Cassandra.
|
3571
2647
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
@@ -3596,8 +2672,6 @@ class SecretsMountCassandraArgs:
|
|
3596
2672
|
pulumi.set(__self__, "protocol_version", protocol_version)
|
3597
2673
|
if root_rotation_statements is not None:
|
3598
2674
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
3599
|
-
if skip_verification is not None:
|
3600
|
-
pulumi.set(__self__, "skip_verification", skip_verification)
|
3601
2675
|
if tls is not None:
|
3602
2676
|
pulumi.set(__self__, "tls", tls)
|
3603
2677
|
if username is not None:
|
@@ -3644,7 +2718,7 @@ class SecretsMountCassandraArgs:
|
|
3644
2718
|
|
3645
2719
|
@property
|
3646
2720
|
@pulumi.getter
|
3647
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
2721
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
3648
2722
|
"""
|
3649
2723
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3650
2724
|
|
@@ -3653,7 +2727,7 @@ class SecretsMountCassandraArgs:
|
|
3653
2727
|
return pulumi.get(self, "data")
|
3654
2728
|
|
3655
2729
|
@data.setter
|
3656
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
2730
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
3657
2731
|
pulumi.set(self, "data", value)
|
3658
2732
|
|
3659
2733
|
@property
|
@@ -3764,18 +2838,6 @@ class SecretsMountCassandraArgs:
|
|
3764
2838
|
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
3765
2839
|
pulumi.set(self, "root_rotation_statements", value)
|
3766
2840
|
|
3767
|
-
@property
|
3768
|
-
@pulumi.getter(name="skipVerification")
|
3769
|
-
def skip_verification(self) -> Optional[pulumi.Input[bool]]:
|
3770
|
-
"""
|
3771
|
-
Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
3772
|
-
"""
|
3773
|
-
return pulumi.get(self, "skip_verification")
|
3774
|
-
|
3775
|
-
@skip_verification.setter
|
3776
|
-
def skip_verification(self, value: Optional[pulumi.Input[bool]]):
|
3777
|
-
pulumi.set(self, "skip_verification", value)
|
3778
|
-
|
3779
2841
|
@property
|
3780
2842
|
@pulumi.getter
|
3781
2843
|
def tls(self) -> Optional[pulumi.Input[bool]]:
|
@@ -3814,71 +2876,6 @@ class SecretsMountCassandraArgs:
|
|
3814
2876
|
pulumi.set(self, "verify_connection", value)
|
3815
2877
|
|
3816
2878
|
|
3817
|
-
if not MYPY:
|
3818
|
-
class SecretsMountCouchbaseArgsDict(TypedDict):
|
3819
|
-
hosts: pulumi.Input[Sequence[pulumi.Input[str]]]
|
3820
|
-
"""
|
3821
|
-
A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
|
3822
|
-
"""
|
3823
|
-
name: pulumi.Input[str]
|
3824
|
-
"""
|
3825
|
-
Name of the database connection.
|
3826
|
-
"""
|
3827
|
-
password: pulumi.Input[str]
|
3828
|
-
"""
|
3829
|
-
Specifies the password corresponding to the given username.
|
3830
|
-
"""
|
3831
|
-
username: pulumi.Input[str]
|
3832
|
-
"""
|
3833
|
-
Specifies the username for Vault to use.
|
3834
|
-
"""
|
3835
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
3836
|
-
"""
|
3837
|
-
A list of roles that are allowed to use this
|
3838
|
-
connection.
|
3839
|
-
"""
|
3840
|
-
base64_pem: NotRequired[pulumi.Input[str]]
|
3841
|
-
"""
|
3842
|
-
Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
|
3843
|
-
"""
|
3844
|
-
bucket_name: NotRequired[pulumi.Input[str]]
|
3845
|
-
"""
|
3846
|
-
Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
|
3847
|
-
"""
|
3848
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
3849
|
-
"""
|
3850
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3851
|
-
|
3852
|
-
Supported list of database secrets engines that can be configured:
|
3853
|
-
"""
|
3854
|
-
insecure_tls: NotRequired[pulumi.Input[bool]]
|
3855
|
-
"""
|
3856
|
-
Specifies whether to skip verification of the server certificate when using TLS.
|
3857
|
-
"""
|
3858
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
3859
|
-
"""
|
3860
|
-
Specifies the name of the plugin to use.
|
3861
|
-
"""
|
3862
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
3863
|
-
"""
|
3864
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
3865
|
-
"""
|
3866
|
-
tls: NotRequired[pulumi.Input[bool]]
|
3867
|
-
"""
|
3868
|
-
Specifies whether to use TLS when connecting to Couchbase.
|
3869
|
-
"""
|
3870
|
-
username_template: NotRequired[pulumi.Input[str]]
|
3871
|
-
"""
|
3872
|
-
Template describing how dynamic usernames are generated.
|
3873
|
-
"""
|
3874
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
3875
|
-
"""
|
3876
|
-
Whether the connection should be verified on
|
3877
|
-
initial configuration or not.
|
3878
|
-
"""
|
3879
|
-
elif False:
|
3880
|
-
SecretsMountCouchbaseArgsDict: TypeAlias = Mapping[str, Any]
|
3881
|
-
|
3882
2879
|
@pulumi.input_type
|
3883
2880
|
class SecretsMountCouchbaseArgs:
|
3884
2881
|
def __init__(__self__, *,
|
@@ -3889,7 +2886,7 @@ class SecretsMountCouchbaseArgs:
|
|
3889
2886
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
3890
2887
|
base64_pem: Optional[pulumi.Input[str]] = None,
|
3891
2888
|
bucket_name: Optional[pulumi.Input[str]] = None,
|
3892
|
-
data: Optional[pulumi.Input[Mapping[str,
|
2889
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
3893
2890
|
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
3894
2891
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
3895
2892
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -3905,7 +2902,7 @@ class SecretsMountCouchbaseArgs:
|
|
3905
2902
|
connection.
|
3906
2903
|
:param pulumi.Input[str] base64_pem: Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
|
3907
2904
|
:param pulumi.Input[str] bucket_name: Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
|
3908
|
-
:param pulumi.Input[Mapping[str,
|
2905
|
+
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3909
2906
|
|
3910
2907
|
Supported list of database secrets engines that can be configured:
|
3911
2908
|
:param pulumi.Input[bool] insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
|
@@ -4028,7 +3025,7 @@ class SecretsMountCouchbaseArgs:
|
|
4028
3025
|
|
4029
3026
|
@property
|
4030
3027
|
@pulumi.getter
|
4031
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
3028
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
4032
3029
|
"""
|
4033
3030
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4034
3031
|
|
@@ -4037,7 +3034,7 @@ class SecretsMountCouchbaseArgs:
|
|
4037
3034
|
return pulumi.get(self, "data")
|
4038
3035
|
|
4039
3036
|
@data.setter
|
4040
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
3037
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
4041
3038
|
pulumi.set(self, "data", value)
|
4042
3039
|
|
4043
3040
|
@property
|
@@ -4114,79 +3111,6 @@ class SecretsMountCouchbaseArgs:
|
|
4114
3111
|
pulumi.set(self, "verify_connection", value)
|
4115
3112
|
|
4116
3113
|
|
4117
|
-
if not MYPY:
|
4118
|
-
class SecretsMountElasticsearchArgsDict(TypedDict):
|
4119
|
-
name: pulumi.Input[str]
|
4120
|
-
"""
|
4121
|
-
Name of the database connection.
|
4122
|
-
"""
|
4123
|
-
password: pulumi.Input[str]
|
4124
|
-
"""
|
4125
|
-
The password to be used in the connection URL
|
4126
|
-
"""
|
4127
|
-
url: pulumi.Input[str]
|
4128
|
-
"""
|
4129
|
-
The URL for Elasticsearch's API
|
4130
|
-
"""
|
4131
|
-
username: pulumi.Input[str]
|
4132
|
-
"""
|
4133
|
-
The username to be used in the connection URL
|
4134
|
-
"""
|
4135
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4136
|
-
"""
|
4137
|
-
A list of roles that are allowed to use this
|
4138
|
-
connection.
|
4139
|
-
"""
|
4140
|
-
ca_cert: NotRequired[pulumi.Input[str]]
|
4141
|
-
"""
|
4142
|
-
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
4143
|
-
"""
|
4144
|
-
ca_path: NotRequired[pulumi.Input[str]]
|
4145
|
-
"""
|
4146
|
-
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
4147
|
-
"""
|
4148
|
-
client_cert: NotRequired[pulumi.Input[str]]
|
4149
|
-
"""
|
4150
|
-
The path to the certificate for the Elasticsearch client to present for communication
|
4151
|
-
"""
|
4152
|
-
client_key: NotRequired[pulumi.Input[str]]
|
4153
|
-
"""
|
4154
|
-
The path to the key for the Elasticsearch client to use for communication
|
4155
|
-
"""
|
4156
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
4157
|
-
"""
|
4158
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4159
|
-
|
4160
|
-
Supported list of database secrets engines that can be configured:
|
4161
|
-
"""
|
4162
|
-
insecure: NotRequired[pulumi.Input[bool]]
|
4163
|
-
"""
|
4164
|
-
Whether to disable certificate verification
|
4165
|
-
"""
|
4166
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
4167
|
-
"""
|
4168
|
-
Specifies the name of the plugin to use.
|
4169
|
-
"""
|
4170
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4171
|
-
"""
|
4172
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
4173
|
-
"""
|
4174
|
-
tls_server_name: NotRequired[pulumi.Input[str]]
|
4175
|
-
"""
|
4176
|
-
This, if set, is used to set the SNI host when connecting via TLS
|
4177
|
-
"""
|
4178
|
-
username_template: NotRequired[pulumi.Input[str]]
|
4179
|
-
"""
|
4180
|
-
Template describing how dynamic usernames are generated.
|
4181
|
-
"""
|
4182
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
4183
|
-
"""
|
4184
|
-
Whether the connection should be verified on
|
4185
|
-
initial configuration or not.
|
4186
|
-
"""
|
4187
|
-
elif False:
|
4188
|
-
SecretsMountElasticsearchArgsDict: TypeAlias = Mapping[str, Any]
|
4189
|
-
|
4190
3114
|
@pulumi.input_type
|
4191
3115
|
class SecretsMountElasticsearchArgs:
|
4192
3116
|
def __init__(__self__, *,
|
@@ -4199,7 +3123,7 @@ class SecretsMountElasticsearchArgs:
|
|
4199
3123
|
ca_path: Optional[pulumi.Input[str]] = None,
|
4200
3124
|
client_cert: Optional[pulumi.Input[str]] = None,
|
4201
3125
|
client_key: Optional[pulumi.Input[str]] = None,
|
4202
|
-
data: Optional[pulumi.Input[Mapping[str,
|
3126
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
4203
3127
|
insecure: Optional[pulumi.Input[bool]] = None,
|
4204
3128
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
4205
3129
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -4217,7 +3141,7 @@ class SecretsMountElasticsearchArgs:
|
|
4217
3141
|
:param pulumi.Input[str] ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
4218
3142
|
:param pulumi.Input[str] client_cert: The path to the certificate for the Elasticsearch client to present for communication
|
4219
3143
|
:param pulumi.Input[str] client_key: The path to the key for the Elasticsearch client to use for communication
|
4220
|
-
:param pulumi.Input[Mapping[str,
|
3144
|
+
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4221
3145
|
|
4222
3146
|
Supported list of database secrets engines that can be configured:
|
4223
3147
|
:param pulumi.Input[bool] insecure: Whether to disable certificate verification
|
@@ -4368,7 +3292,7 @@ class SecretsMountElasticsearchArgs:
|
|
4368
3292
|
|
4369
3293
|
@property
|
4370
3294
|
@pulumi.getter
|
4371
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
3295
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
4372
3296
|
"""
|
4373
3297
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4374
3298
|
|
@@ -4377,7 +3301,7 @@ class SecretsMountElasticsearchArgs:
|
|
4377
3301
|
return pulumi.get(self, "data")
|
4378
3302
|
|
4379
3303
|
@data.setter
|
4380
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
3304
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
4381
3305
|
pulumi.set(self, "data", value)
|
4382
3306
|
|
4383
3307
|
@property
|
@@ -4454,74 +3378,13 @@ class SecretsMountElasticsearchArgs:
|
|
4454
3378
|
pulumi.set(self, "verify_connection", value)
|
4455
3379
|
|
4456
3380
|
|
4457
|
-
if not MYPY:
|
4458
|
-
class SecretsMountHanaArgsDict(TypedDict):
|
4459
|
-
name: pulumi.Input[str]
|
4460
|
-
"""
|
4461
|
-
Name of the database connection.
|
4462
|
-
"""
|
4463
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4464
|
-
"""
|
4465
|
-
A list of roles that are allowed to use this
|
4466
|
-
connection.
|
4467
|
-
"""
|
4468
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
4469
|
-
"""
|
4470
|
-
Connection string to use to connect to the database.
|
4471
|
-
"""
|
4472
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
4473
|
-
"""
|
4474
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4475
|
-
|
4476
|
-
Supported list of database secrets engines that can be configured:
|
4477
|
-
"""
|
4478
|
-
disable_escaping: NotRequired[pulumi.Input[bool]]
|
4479
|
-
"""
|
4480
|
-
Disable special character escaping in username and password
|
4481
|
-
"""
|
4482
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
4483
|
-
"""
|
4484
|
-
Maximum number of seconds a connection may be reused.
|
4485
|
-
"""
|
4486
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
4487
|
-
"""
|
4488
|
-
Maximum number of idle connections to the database.
|
4489
|
-
"""
|
4490
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
4491
|
-
"""
|
4492
|
-
Maximum number of open connections to the database.
|
4493
|
-
"""
|
4494
|
-
password: NotRequired[pulumi.Input[str]]
|
4495
|
-
"""
|
4496
|
-
The root credential password used in the connection URL
|
4497
|
-
"""
|
4498
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
4499
|
-
"""
|
4500
|
-
Specifies the name of the plugin to use.
|
4501
|
-
"""
|
4502
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4503
|
-
"""
|
4504
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
4505
|
-
"""
|
4506
|
-
username: NotRequired[pulumi.Input[str]]
|
4507
|
-
"""
|
4508
|
-
The root credential username used in the connection URL
|
4509
|
-
"""
|
4510
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
4511
|
-
"""
|
4512
|
-
Whether the connection should be verified on
|
4513
|
-
initial configuration or not.
|
4514
|
-
"""
|
4515
|
-
elif False:
|
4516
|
-
SecretsMountHanaArgsDict: TypeAlias = Mapping[str, Any]
|
4517
|
-
|
4518
3381
|
@pulumi.input_type
|
4519
3382
|
class SecretsMountHanaArgs:
|
4520
3383
|
def __init__(__self__, *,
|
4521
3384
|
name: pulumi.Input[str],
|
4522
3385
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
4523
3386
|
connection_url: Optional[pulumi.Input[str]] = None,
|
4524
|
-
data: Optional[pulumi.Input[Mapping[str,
|
3387
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
4525
3388
|
disable_escaping: Optional[pulumi.Input[bool]] = None,
|
4526
3389
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
4527
3390
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
@@ -4536,7 +3399,7 @@ class SecretsMountHanaArgs:
|
|
4536
3399
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
4537
3400
|
connection.
|
4538
3401
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
4539
|
-
:param pulumi.Input[Mapping[str,
|
3402
|
+
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4540
3403
|
|
4541
3404
|
Supported list of database secrets engines that can be configured:
|
4542
3405
|
:param pulumi.Input[bool] disable_escaping: Disable special character escaping in username and password
|
@@ -4615,7 +3478,7 @@ class SecretsMountHanaArgs:
|
|
4615
3478
|
|
4616
3479
|
@property
|
4617
3480
|
@pulumi.getter
|
4618
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
3481
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
4619
3482
|
"""
|
4620
3483
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4621
3484
|
|
@@ -4624,7 +3487,7 @@ class SecretsMountHanaArgs:
|
|
4624
3487
|
return pulumi.get(self, "data")
|
4625
3488
|
|
4626
3489
|
@data.setter
|
4627
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
3490
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
4628
3491
|
pulumi.set(self, "data", value)
|
4629
3492
|
|
4630
3493
|
@property
|
@@ -4737,79 +3600,6 @@ class SecretsMountHanaArgs:
|
|
4737
3600
|
pulumi.set(self, "verify_connection", value)
|
4738
3601
|
|
4739
3602
|
|
4740
|
-
if not MYPY:
|
4741
|
-
class SecretsMountInfluxdbArgsDict(TypedDict):
|
4742
|
-
host: pulumi.Input[str]
|
4743
|
-
"""
|
4744
|
-
Influxdb host to connect to.
|
4745
|
-
"""
|
4746
|
-
name: pulumi.Input[str]
|
4747
|
-
"""
|
4748
|
-
Name of the database connection.
|
4749
|
-
"""
|
4750
|
-
password: pulumi.Input[str]
|
4751
|
-
"""
|
4752
|
-
Specifies the password corresponding to the given username.
|
4753
|
-
"""
|
4754
|
-
username: pulumi.Input[str]
|
4755
|
-
"""
|
4756
|
-
Specifies the username to use for superuser access.
|
4757
|
-
"""
|
4758
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4759
|
-
"""
|
4760
|
-
A list of roles that are allowed to use this
|
4761
|
-
connection.
|
4762
|
-
"""
|
4763
|
-
connect_timeout: NotRequired[pulumi.Input[int]]
|
4764
|
-
"""
|
4765
|
-
The number of seconds to use as a connection timeout.
|
4766
|
-
"""
|
4767
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
4768
|
-
"""
|
4769
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4770
|
-
|
4771
|
-
Supported list of database secrets engines that can be configured:
|
4772
|
-
"""
|
4773
|
-
insecure_tls: NotRequired[pulumi.Input[bool]]
|
4774
|
-
"""
|
4775
|
-
Whether to skip verification of the server certificate when using TLS.
|
4776
|
-
"""
|
4777
|
-
pem_bundle: NotRequired[pulumi.Input[str]]
|
4778
|
-
"""
|
4779
|
-
Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
4780
|
-
"""
|
4781
|
-
pem_json: NotRequired[pulumi.Input[str]]
|
4782
|
-
"""
|
4783
|
-
Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
4784
|
-
"""
|
4785
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
4786
|
-
"""
|
4787
|
-
Specifies the name of the plugin to use.
|
4788
|
-
"""
|
4789
|
-
port: NotRequired[pulumi.Input[int]]
|
4790
|
-
"""
|
4791
|
-
The transport port to use to connect to Influxdb.
|
4792
|
-
"""
|
4793
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4794
|
-
"""
|
4795
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
4796
|
-
"""
|
4797
|
-
tls: NotRequired[pulumi.Input[bool]]
|
4798
|
-
"""
|
4799
|
-
Whether to use TLS when connecting to Influxdb.
|
4800
|
-
"""
|
4801
|
-
username_template: NotRequired[pulumi.Input[str]]
|
4802
|
-
"""
|
4803
|
-
Template describing how dynamic usernames are generated.
|
4804
|
-
"""
|
4805
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
4806
|
-
"""
|
4807
|
-
Whether the connection should be verified on
|
4808
|
-
initial configuration or not.
|
4809
|
-
"""
|
4810
|
-
elif False:
|
4811
|
-
SecretsMountInfluxdbArgsDict: TypeAlias = Mapping[str, Any]
|
4812
|
-
|
4813
3603
|
@pulumi.input_type
|
4814
3604
|
class SecretsMountInfluxdbArgs:
|
4815
3605
|
def __init__(__self__, *,
|
@@ -4819,7 +3609,7 @@ class SecretsMountInfluxdbArgs:
|
|
4819
3609
|
username: pulumi.Input[str],
|
4820
3610
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
4821
3611
|
connect_timeout: Optional[pulumi.Input[int]] = None,
|
4822
|
-
data: Optional[pulumi.Input[Mapping[str,
|
3612
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
4823
3613
|
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
4824
3614
|
pem_bundle: Optional[pulumi.Input[str]] = None,
|
4825
3615
|
pem_json: Optional[pulumi.Input[str]] = None,
|
@@ -4837,7 +3627,7 @@ class SecretsMountInfluxdbArgs:
|
|
4837
3627
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
4838
3628
|
connection.
|
4839
3629
|
:param pulumi.Input[int] connect_timeout: The number of seconds to use as a connection timeout.
|
4840
|
-
:param pulumi.Input[Mapping[str,
|
3630
|
+
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4841
3631
|
|
4842
3632
|
Supported list of database secrets engines that can be configured:
|
4843
3633
|
:param pulumi.Input[bool] insecure_tls: Whether to skip verification of the server certificate when using TLS.
|
@@ -4955,7 +3745,7 @@ class SecretsMountInfluxdbArgs:
|
|
4955
3745
|
|
4956
3746
|
@property
|
4957
3747
|
@pulumi.getter
|
4958
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
3748
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
4959
3749
|
"""
|
4960
3750
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4961
3751
|
|
@@ -4964,7 +3754,7 @@ class SecretsMountInfluxdbArgs:
|
|
4964
3754
|
return pulumi.get(self, "data")
|
4965
3755
|
|
4966
3756
|
@data.setter
|
4967
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
3757
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
4968
3758
|
pulumi.set(self, "data", value)
|
4969
3759
|
|
4970
3760
|
@property
|
@@ -5077,74 +3867,13 @@ class SecretsMountInfluxdbArgs:
|
|
5077
3867
|
pulumi.set(self, "verify_connection", value)
|
5078
3868
|
|
5079
3869
|
|
5080
|
-
if not MYPY:
|
5081
|
-
class SecretsMountMongodbArgsDict(TypedDict):
|
5082
|
-
name: pulumi.Input[str]
|
5083
|
-
"""
|
5084
|
-
Name of the database connection.
|
5085
|
-
"""
|
5086
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5087
|
-
"""
|
5088
|
-
A list of roles that are allowed to use this
|
5089
|
-
connection.
|
5090
|
-
"""
|
5091
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
5092
|
-
"""
|
5093
|
-
Connection string to use to connect to the database.
|
5094
|
-
"""
|
5095
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
5096
|
-
"""
|
5097
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5098
|
-
|
5099
|
-
Supported list of database secrets engines that can be configured:
|
5100
|
-
"""
|
5101
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
5102
|
-
"""
|
5103
|
-
Maximum number of seconds a connection may be reused.
|
5104
|
-
"""
|
5105
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
5106
|
-
"""
|
5107
|
-
Maximum number of idle connections to the database.
|
5108
|
-
"""
|
5109
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
5110
|
-
"""
|
5111
|
-
Maximum number of open connections to the database.
|
5112
|
-
"""
|
5113
|
-
password: NotRequired[pulumi.Input[str]]
|
5114
|
-
"""
|
5115
|
-
The root credential password used in the connection URL
|
5116
|
-
"""
|
5117
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
5118
|
-
"""
|
5119
|
-
Specifies the name of the plugin to use.
|
5120
|
-
"""
|
5121
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5122
|
-
"""
|
5123
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
5124
|
-
"""
|
5125
|
-
username: NotRequired[pulumi.Input[str]]
|
5126
|
-
"""
|
5127
|
-
The root credential username used in the connection URL
|
5128
|
-
"""
|
5129
|
-
username_template: NotRequired[pulumi.Input[str]]
|
5130
|
-
"""
|
5131
|
-
Username generation template.
|
5132
|
-
"""
|
5133
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
5134
|
-
"""
|
5135
|
-
Whether the connection should be verified on
|
5136
|
-
initial configuration or not.
|
5137
|
-
"""
|
5138
|
-
elif False:
|
5139
|
-
SecretsMountMongodbArgsDict: TypeAlias = Mapping[str, Any]
|
5140
|
-
|
5141
3870
|
@pulumi.input_type
|
5142
3871
|
class SecretsMountMongodbArgs:
|
5143
3872
|
def __init__(__self__, *,
|
5144
3873
|
name: pulumi.Input[str],
|
5145
3874
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
5146
3875
|
connection_url: Optional[pulumi.Input[str]] = None,
|
5147
|
-
data: Optional[pulumi.Input[Mapping[str,
|
3876
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
5148
3877
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
5149
3878
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
5150
3879
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
@@ -5159,7 +3888,7 @@ class SecretsMountMongodbArgs:
|
|
5159
3888
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
5160
3889
|
connection.
|
5161
3890
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
5162
|
-
:param pulumi.Input[Mapping[str,
|
3891
|
+
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5163
3892
|
|
5164
3893
|
Supported list of database secrets engines that can be configured:
|
5165
3894
|
:param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -5238,7 +3967,7 @@ class SecretsMountMongodbArgs:
|
|
5238
3967
|
|
5239
3968
|
@property
|
5240
3969
|
@pulumi.getter
|
5241
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
3970
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
5242
3971
|
"""
|
5243
3972
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5244
3973
|
|
@@ -5247,7 +3976,7 @@ class SecretsMountMongodbArgs:
|
|
5247
3976
|
return pulumi.get(self, "data")
|
5248
3977
|
|
5249
3978
|
@data.setter
|
5250
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
3979
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
5251
3980
|
pulumi.set(self, "data", value)
|
5252
3981
|
|
5253
3982
|
@property
|
@@ -5360,51 +4089,6 @@ class SecretsMountMongodbArgs:
|
|
5360
4089
|
pulumi.set(self, "verify_connection", value)
|
5361
4090
|
|
5362
4091
|
|
5363
|
-
if not MYPY:
|
5364
|
-
class SecretsMountMongodbatlaArgsDict(TypedDict):
|
5365
|
-
name: pulumi.Input[str]
|
5366
|
-
"""
|
5367
|
-
Name of the database connection.
|
5368
|
-
"""
|
5369
|
-
private_key: pulumi.Input[str]
|
5370
|
-
"""
|
5371
|
-
The Private Programmatic API Key used to connect with MongoDB Atlas API.
|
5372
|
-
"""
|
5373
|
-
project_id: pulumi.Input[str]
|
5374
|
-
"""
|
5375
|
-
The Project ID the Database User should be created within.
|
5376
|
-
"""
|
5377
|
-
public_key: pulumi.Input[str]
|
5378
|
-
"""
|
5379
|
-
The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
|
5380
|
-
"""
|
5381
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5382
|
-
"""
|
5383
|
-
A list of roles that are allowed to use this
|
5384
|
-
connection.
|
5385
|
-
"""
|
5386
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
5387
|
-
"""
|
5388
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5389
|
-
|
5390
|
-
Supported list of database secrets engines that can be configured:
|
5391
|
-
"""
|
5392
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
5393
|
-
"""
|
5394
|
-
Specifies the name of the plugin to use.
|
5395
|
-
"""
|
5396
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5397
|
-
"""
|
5398
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
5399
|
-
"""
|
5400
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
5401
|
-
"""
|
5402
|
-
Whether the connection should be verified on
|
5403
|
-
initial configuration or not.
|
5404
|
-
"""
|
5405
|
-
elif False:
|
5406
|
-
SecretsMountMongodbatlaArgsDict: TypeAlias = Mapping[str, Any]
|
5407
|
-
|
5408
4092
|
@pulumi.input_type
|
5409
4093
|
class SecretsMountMongodbatlaArgs:
|
5410
4094
|
def __init__(__self__, *,
|
@@ -5413,7 +4097,7 @@ class SecretsMountMongodbatlaArgs:
|
|
5413
4097
|
project_id: pulumi.Input[str],
|
5414
4098
|
public_key: pulumi.Input[str],
|
5415
4099
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
5416
|
-
data: Optional[pulumi.Input[Mapping[str,
|
4100
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
5417
4101
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
5418
4102
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
5419
4103
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
@@ -5424,7 +4108,7 @@ class SecretsMountMongodbatlaArgs:
|
|
5424
4108
|
:param pulumi.Input[str] public_key: The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
|
5425
4109
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
5426
4110
|
connection.
|
5427
|
-
:param pulumi.Input[Mapping[str,
|
4111
|
+
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5428
4112
|
|
5429
4113
|
Supported list of database secrets engines that can be configured:
|
5430
4114
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
@@ -5510,7 +4194,7 @@ class SecretsMountMongodbatlaArgs:
|
|
5510
4194
|
|
5511
4195
|
@property
|
5512
4196
|
@pulumi.getter
|
5513
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
4197
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
5514
4198
|
"""
|
5515
4199
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5516
4200
|
|
@@ -5519,7 +4203,7 @@ class SecretsMountMongodbatlaArgs:
|
|
5519
4203
|
return pulumi.get(self, "data")
|
5520
4204
|
|
5521
4205
|
@data.setter
|
5522
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
4206
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
5523
4207
|
pulumi.set(self, "data", value)
|
5524
4208
|
|
5525
4209
|
@property
|
@@ -5560,75 +4244,6 @@ class SecretsMountMongodbatlaArgs:
|
|
5560
4244
|
pulumi.set(self, "verify_connection", value)
|
5561
4245
|
|
5562
4246
|
|
5563
|
-
if not MYPY:
|
5564
|
-
class SecretsMountMssqlArgsDict(TypedDict):
|
5565
|
-
name: pulumi.Input[str]
|
5566
|
-
"""
|
5567
|
-
Name of the database connection.
|
5568
|
-
"""
|
5569
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5570
|
-
"""
|
5571
|
-
A list of roles that are allowed to use this
|
5572
|
-
connection.
|
5573
|
-
"""
|
5574
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
5575
|
-
"""
|
5576
|
-
Connection string to use to connect to the database.
|
5577
|
-
"""
|
5578
|
-
contained_db: NotRequired[pulumi.Input[bool]]
|
5579
|
-
"""
|
5580
|
-
Set to true when the target is a Contained Database, e.g. AzureSQL.
|
5581
|
-
"""
|
5582
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
5583
|
-
"""
|
5584
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5585
|
-
|
5586
|
-
Supported list of database secrets engines that can be configured:
|
5587
|
-
"""
|
5588
|
-
disable_escaping: NotRequired[pulumi.Input[bool]]
|
5589
|
-
"""
|
5590
|
-
Disable special character escaping in username and password
|
5591
|
-
"""
|
5592
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
5593
|
-
"""
|
5594
|
-
Maximum number of seconds a connection may be reused.
|
5595
|
-
"""
|
5596
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
5597
|
-
"""
|
5598
|
-
Maximum number of idle connections to the database.
|
5599
|
-
"""
|
5600
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
5601
|
-
"""
|
5602
|
-
Maximum number of open connections to the database.
|
5603
|
-
"""
|
5604
|
-
password: NotRequired[pulumi.Input[str]]
|
5605
|
-
"""
|
5606
|
-
The root credential password used in the connection URL
|
5607
|
-
"""
|
5608
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
5609
|
-
"""
|
5610
|
-
Specifies the name of the plugin to use.
|
5611
|
-
"""
|
5612
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5613
|
-
"""
|
5614
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
5615
|
-
"""
|
5616
|
-
username: NotRequired[pulumi.Input[str]]
|
5617
|
-
"""
|
5618
|
-
The root credential username used in the connection URL
|
5619
|
-
"""
|
5620
|
-
username_template: NotRequired[pulumi.Input[str]]
|
5621
|
-
"""
|
5622
|
-
Username generation template.
|
5623
|
-
"""
|
5624
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
5625
|
-
"""
|
5626
|
-
Whether the connection should be verified on
|
5627
|
-
initial configuration or not.
|
5628
|
-
"""
|
5629
|
-
elif False:
|
5630
|
-
SecretsMountMssqlArgsDict: TypeAlias = Mapping[str, Any]
|
5631
|
-
|
5632
4247
|
@pulumi.input_type
|
5633
4248
|
class SecretsMountMssqlArgs:
|
5634
4249
|
def __init__(__self__, *,
|
@@ -5636,7 +4251,7 @@ class SecretsMountMssqlArgs:
|
|
5636
4251
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
5637
4252
|
connection_url: Optional[pulumi.Input[str]] = None,
|
5638
4253
|
contained_db: Optional[pulumi.Input[bool]] = None,
|
5639
|
-
data: Optional[pulumi.Input[Mapping[str,
|
4254
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
5640
4255
|
disable_escaping: Optional[pulumi.Input[bool]] = None,
|
5641
4256
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
5642
4257
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
@@ -5653,7 +4268,7 @@ class SecretsMountMssqlArgs:
|
|
5653
4268
|
connection.
|
5654
4269
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
5655
4270
|
:param pulumi.Input[bool] contained_db: Set to true when the target is a Contained Database, e.g. AzureSQL.
|
5656
|
-
:param pulumi.Input[Mapping[str,
|
4271
|
+
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5657
4272
|
|
5658
4273
|
Supported list of database secrets engines that can be configured:
|
5659
4274
|
:param pulumi.Input[bool] disable_escaping: Disable special character escaping in username and password
|
@@ -5749,7 +4364,7 @@ class SecretsMountMssqlArgs:
|
|
5749
4364
|
|
5750
4365
|
@property
|
5751
4366
|
@pulumi.getter
|
5752
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
4367
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
5753
4368
|
"""
|
5754
4369
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5755
4370
|
|
@@ -5758,7 +4373,7 @@ class SecretsMountMssqlArgs:
|
|
5758
4373
|
return pulumi.get(self, "data")
|
5759
4374
|
|
5760
4375
|
@data.setter
|
5761
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
4376
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
5762
4377
|
pulumi.set(self, "data", value)
|
5763
4378
|
|
5764
4379
|
@property
|
@@ -5883,83 +4498,6 @@ class SecretsMountMssqlArgs:
|
|
5883
4498
|
pulumi.set(self, "verify_connection", value)
|
5884
4499
|
|
5885
4500
|
|
5886
|
-
if not MYPY:
|
5887
|
-
class SecretsMountMysqlArgsDict(TypedDict):
|
5888
|
-
name: pulumi.Input[str]
|
5889
|
-
"""
|
5890
|
-
Name of the database connection.
|
5891
|
-
"""
|
5892
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5893
|
-
"""
|
5894
|
-
A list of roles that are allowed to use this
|
5895
|
-
connection.
|
5896
|
-
"""
|
5897
|
-
auth_type: NotRequired[pulumi.Input[str]]
|
5898
|
-
"""
|
5899
|
-
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5900
|
-
"""
|
5901
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
5902
|
-
"""
|
5903
|
-
Connection string to use to connect to the database.
|
5904
|
-
"""
|
5905
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
5906
|
-
"""
|
5907
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5908
|
-
|
5909
|
-
Supported list of database secrets engines that can be configured:
|
5910
|
-
"""
|
5911
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
5912
|
-
"""
|
5913
|
-
Maximum number of seconds a connection may be reused.
|
5914
|
-
"""
|
5915
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
5916
|
-
"""
|
5917
|
-
Maximum number of idle connections to the database.
|
5918
|
-
"""
|
5919
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
5920
|
-
"""
|
5921
|
-
Maximum number of open connections to the database.
|
5922
|
-
"""
|
5923
|
-
password: NotRequired[pulumi.Input[str]]
|
5924
|
-
"""
|
5925
|
-
The root credential password used in the connection URL
|
5926
|
-
"""
|
5927
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
5928
|
-
"""
|
5929
|
-
Specifies the name of the plugin to use.
|
5930
|
-
"""
|
5931
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5932
|
-
"""
|
5933
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
5934
|
-
"""
|
5935
|
-
service_account_json: NotRequired[pulumi.Input[str]]
|
5936
|
-
"""
|
5937
|
-
A JSON encoded credential for use with IAM authorization
|
5938
|
-
"""
|
5939
|
-
tls_ca: NotRequired[pulumi.Input[str]]
|
5940
|
-
"""
|
5941
|
-
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
5942
|
-
"""
|
5943
|
-
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
5944
|
-
"""
|
5945
|
-
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
5946
|
-
"""
|
5947
|
-
username: NotRequired[pulumi.Input[str]]
|
5948
|
-
"""
|
5949
|
-
The root credential username used in the connection URL
|
5950
|
-
"""
|
5951
|
-
username_template: NotRequired[pulumi.Input[str]]
|
5952
|
-
"""
|
5953
|
-
Username generation template.
|
5954
|
-
"""
|
5955
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
5956
|
-
"""
|
5957
|
-
Whether the connection should be verified on
|
5958
|
-
initial configuration or not.
|
5959
|
-
"""
|
5960
|
-
elif False:
|
5961
|
-
SecretsMountMysqlArgsDict: TypeAlias = Mapping[str, Any]
|
5962
|
-
|
5963
4501
|
@pulumi.input_type
|
5964
4502
|
class SecretsMountMysqlArgs:
|
5965
4503
|
def __init__(__self__, *,
|
@@ -5967,7 +4505,7 @@ class SecretsMountMysqlArgs:
|
|
5967
4505
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
5968
4506
|
auth_type: Optional[pulumi.Input[str]] = None,
|
5969
4507
|
connection_url: Optional[pulumi.Input[str]] = None,
|
5970
|
-
data: Optional[pulumi.Input[Mapping[str,
|
4508
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
5971
4509
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
5972
4510
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
5973
4511
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
@@ -5986,7 +4524,7 @@ class SecretsMountMysqlArgs:
|
|
5986
4524
|
connection.
|
5987
4525
|
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5988
4526
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
5989
|
-
:param pulumi.Input[Mapping[str,
|
4527
|
+
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5990
4528
|
|
5991
4529
|
Supported list of database secrets engines that can be configured:
|
5992
4530
|
:param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -6088,7 +4626,7 @@ class SecretsMountMysqlArgs:
|
|
6088
4626
|
|
6089
4627
|
@property
|
6090
4628
|
@pulumi.getter
|
6091
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
4629
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
6092
4630
|
"""
|
6093
4631
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6094
4632
|
|
@@ -6097,7 +4635,7 @@ class SecretsMountMysqlArgs:
|
|
6097
4635
|
return pulumi.get(self, "data")
|
6098
4636
|
|
6099
4637
|
@data.setter
|
6100
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
4638
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
6101
4639
|
pulumi.set(self, "data", value)
|
6102
4640
|
|
6103
4641
|
@property
|
@@ -6246,110 +4784,33 @@ class SecretsMountMysqlArgs:
|
|
6246
4784
|
pulumi.set(self, "verify_connection", value)
|
6247
4785
|
|
6248
4786
|
|
6249
|
-
|
6250
|
-
|
6251
|
-
|
6252
|
-
|
6253
|
-
|
6254
|
-
|
6255
|
-
|
6256
|
-
|
6257
|
-
|
6258
|
-
|
6259
|
-
|
6260
|
-
|
6261
|
-
|
6262
|
-
|
6263
|
-
|
6264
|
-
|
6265
|
-
|
6266
|
-
|
6267
|
-
|
6268
|
-
|
6269
|
-
"""
|
6270
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6271
|
-
|
6272
|
-
Supported list of database secrets engines that can be configured:
|
6273
|
-
"""
|
6274
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
6275
|
-
"""
|
6276
|
-
Maximum number of seconds a connection may be reused.
|
6277
|
-
"""
|
6278
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
6279
|
-
"""
|
6280
|
-
Maximum number of idle connections to the database.
|
6281
|
-
"""
|
6282
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
6283
|
-
"""
|
6284
|
-
Maximum number of open connections to the database.
|
6285
|
-
"""
|
6286
|
-
password: NotRequired[pulumi.Input[str]]
|
6287
|
-
"""
|
6288
|
-
The root credential password used in the connection URL
|
6289
|
-
"""
|
6290
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
6291
|
-
"""
|
6292
|
-
Specifies the name of the plugin to use.
|
6293
|
-
"""
|
6294
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
6295
|
-
"""
|
6296
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
6297
|
-
"""
|
6298
|
-
service_account_json: NotRequired[pulumi.Input[str]]
|
6299
|
-
"""
|
6300
|
-
A JSON encoded credential for use with IAM authorization
|
6301
|
-
"""
|
6302
|
-
tls_ca: NotRequired[pulumi.Input[str]]
|
6303
|
-
"""
|
6304
|
-
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
6305
|
-
"""
|
6306
|
-
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
6307
|
-
"""
|
6308
|
-
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
6309
|
-
"""
|
6310
|
-
username: NotRequired[pulumi.Input[str]]
|
6311
|
-
"""
|
6312
|
-
The root credential username used in the connection URL
|
6313
|
-
"""
|
6314
|
-
username_template: NotRequired[pulumi.Input[str]]
|
6315
|
-
"""
|
6316
|
-
Username generation template.
|
6317
|
-
"""
|
6318
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
6319
|
-
"""
|
6320
|
-
Whether the connection should be verified on
|
6321
|
-
initial configuration or not.
|
6322
|
-
"""
|
6323
|
-
elif False:
|
6324
|
-
SecretsMountMysqlAuroraArgsDict: TypeAlias = Mapping[str, Any]
|
6325
|
-
|
6326
|
-
@pulumi.input_type
|
6327
|
-
class SecretsMountMysqlAuroraArgs:
|
6328
|
-
def __init__(__self__, *,
|
6329
|
-
name: pulumi.Input[str],
|
6330
|
-
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
6331
|
-
auth_type: Optional[pulumi.Input[str]] = None,
|
6332
|
-
connection_url: Optional[pulumi.Input[str]] = None,
|
6333
|
-
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
6334
|
-
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
6335
|
-
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
6336
|
-
max_open_connections: Optional[pulumi.Input[int]] = None,
|
6337
|
-
password: Optional[pulumi.Input[str]] = None,
|
6338
|
-
plugin_name: Optional[pulumi.Input[str]] = None,
|
6339
|
-
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
6340
|
-
service_account_json: Optional[pulumi.Input[str]] = None,
|
6341
|
-
tls_ca: Optional[pulumi.Input[str]] = None,
|
6342
|
-
tls_certificate_key: Optional[pulumi.Input[str]] = None,
|
6343
|
-
username: Optional[pulumi.Input[str]] = None,
|
6344
|
-
username_template: Optional[pulumi.Input[str]] = None,
|
6345
|
-
verify_connection: Optional[pulumi.Input[bool]] = None):
|
4787
|
+
@pulumi.input_type
|
4788
|
+
class SecretsMountMysqlAuroraArgs:
|
4789
|
+
def __init__(__self__, *,
|
4790
|
+
name: pulumi.Input[str],
|
4791
|
+
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
4792
|
+
auth_type: Optional[pulumi.Input[str]] = None,
|
4793
|
+
connection_url: Optional[pulumi.Input[str]] = None,
|
4794
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
4795
|
+
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
4796
|
+
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
4797
|
+
max_open_connections: Optional[pulumi.Input[int]] = None,
|
4798
|
+
password: Optional[pulumi.Input[str]] = None,
|
4799
|
+
plugin_name: Optional[pulumi.Input[str]] = None,
|
4800
|
+
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
4801
|
+
service_account_json: Optional[pulumi.Input[str]] = None,
|
4802
|
+
tls_ca: Optional[pulumi.Input[str]] = None,
|
4803
|
+
tls_certificate_key: Optional[pulumi.Input[str]] = None,
|
4804
|
+
username: Optional[pulumi.Input[str]] = None,
|
4805
|
+
username_template: Optional[pulumi.Input[str]] = None,
|
4806
|
+
verify_connection: Optional[pulumi.Input[bool]] = None):
|
6346
4807
|
"""
|
6347
4808
|
:param pulumi.Input[str] name: Name of the database connection.
|
6348
4809
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
6349
4810
|
connection.
|
6350
4811
|
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
6351
4812
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
6352
|
-
:param pulumi.Input[Mapping[str,
|
4813
|
+
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6353
4814
|
|
6354
4815
|
Supported list of database secrets engines that can be configured:
|
6355
4816
|
:param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -6451,7 +4912,7 @@ class SecretsMountMysqlAuroraArgs:
|
|
6451
4912
|
|
6452
4913
|
@property
|
6453
4914
|
@pulumi.getter
|
6454
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
4915
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
6455
4916
|
"""
|
6456
4917
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6457
4918
|
|
@@ -6460,7 +4921,7 @@ class SecretsMountMysqlAuroraArgs:
|
|
6460
4921
|
return pulumi.get(self, "data")
|
6461
4922
|
|
6462
4923
|
@data.setter
|
6463
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
4924
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
6464
4925
|
pulumi.set(self, "data", value)
|
6465
4926
|
|
6466
4927
|
@property
|
@@ -6609,83 +5070,6 @@ class SecretsMountMysqlAuroraArgs:
|
|
6609
5070
|
pulumi.set(self, "verify_connection", value)
|
6610
5071
|
|
6611
5072
|
|
6612
|
-
if not MYPY:
|
6613
|
-
class SecretsMountMysqlLegacyArgsDict(TypedDict):
|
6614
|
-
name: pulumi.Input[str]
|
6615
|
-
"""
|
6616
|
-
Name of the database connection.
|
6617
|
-
"""
|
6618
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
6619
|
-
"""
|
6620
|
-
A list of roles that are allowed to use this
|
6621
|
-
connection.
|
6622
|
-
"""
|
6623
|
-
auth_type: NotRequired[pulumi.Input[str]]
|
6624
|
-
"""
|
6625
|
-
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
6626
|
-
"""
|
6627
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
6628
|
-
"""
|
6629
|
-
Connection string to use to connect to the database.
|
6630
|
-
"""
|
6631
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
6632
|
-
"""
|
6633
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6634
|
-
|
6635
|
-
Supported list of database secrets engines that can be configured:
|
6636
|
-
"""
|
6637
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
6638
|
-
"""
|
6639
|
-
Maximum number of seconds a connection may be reused.
|
6640
|
-
"""
|
6641
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
6642
|
-
"""
|
6643
|
-
Maximum number of idle connections to the database.
|
6644
|
-
"""
|
6645
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
6646
|
-
"""
|
6647
|
-
Maximum number of open connections to the database.
|
6648
|
-
"""
|
6649
|
-
password: NotRequired[pulumi.Input[str]]
|
6650
|
-
"""
|
6651
|
-
The root credential password used in the connection URL
|
6652
|
-
"""
|
6653
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
6654
|
-
"""
|
6655
|
-
Specifies the name of the plugin to use.
|
6656
|
-
"""
|
6657
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
6658
|
-
"""
|
6659
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
6660
|
-
"""
|
6661
|
-
service_account_json: NotRequired[pulumi.Input[str]]
|
6662
|
-
"""
|
6663
|
-
A JSON encoded credential for use with IAM authorization
|
6664
|
-
"""
|
6665
|
-
tls_ca: NotRequired[pulumi.Input[str]]
|
6666
|
-
"""
|
6667
|
-
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
6668
|
-
"""
|
6669
|
-
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
6670
|
-
"""
|
6671
|
-
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
6672
|
-
"""
|
6673
|
-
username: NotRequired[pulumi.Input[str]]
|
6674
|
-
"""
|
6675
|
-
The root credential username used in the connection URL
|
6676
|
-
"""
|
6677
|
-
username_template: NotRequired[pulumi.Input[str]]
|
6678
|
-
"""
|
6679
|
-
Username generation template.
|
6680
|
-
"""
|
6681
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
6682
|
-
"""
|
6683
|
-
Whether the connection should be verified on
|
6684
|
-
initial configuration or not.
|
6685
|
-
"""
|
6686
|
-
elif False:
|
6687
|
-
SecretsMountMysqlLegacyArgsDict: TypeAlias = Mapping[str, Any]
|
6688
|
-
|
6689
5073
|
@pulumi.input_type
|
6690
5074
|
class SecretsMountMysqlLegacyArgs:
|
6691
5075
|
def __init__(__self__, *,
|
@@ -6693,7 +5077,7 @@ class SecretsMountMysqlLegacyArgs:
|
|
6693
5077
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
6694
5078
|
auth_type: Optional[pulumi.Input[str]] = None,
|
6695
5079
|
connection_url: Optional[pulumi.Input[str]] = None,
|
6696
|
-
data: Optional[pulumi.Input[Mapping[str,
|
5080
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
6697
5081
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
6698
5082
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
6699
5083
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
@@ -6712,7 +5096,7 @@ class SecretsMountMysqlLegacyArgs:
|
|
6712
5096
|
connection.
|
6713
5097
|
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
6714
5098
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
6715
|
-
:param pulumi.Input[Mapping[str,
|
5099
|
+
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6716
5100
|
|
6717
5101
|
Supported list of database secrets engines that can be configured:
|
6718
5102
|
:param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -6814,7 +5198,7 @@ class SecretsMountMysqlLegacyArgs:
|
|
6814
5198
|
|
6815
5199
|
@property
|
6816
5200
|
@pulumi.getter
|
6817
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
5201
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
6818
5202
|
"""
|
6819
5203
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6820
5204
|
|
@@ -6823,7 +5207,7 @@ class SecretsMountMysqlLegacyArgs:
|
|
6823
5207
|
return pulumi.get(self, "data")
|
6824
5208
|
|
6825
5209
|
@data.setter
|
6826
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
5210
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
6827
5211
|
pulumi.set(self, "data", value)
|
6828
5212
|
|
6829
5213
|
@property
|
@@ -6972,83 +5356,6 @@ class SecretsMountMysqlLegacyArgs:
|
|
6972
5356
|
pulumi.set(self, "verify_connection", value)
|
6973
5357
|
|
6974
5358
|
|
6975
|
-
if not MYPY:
|
6976
|
-
class SecretsMountMysqlRdArgsDict(TypedDict):
|
6977
|
-
name: pulumi.Input[str]
|
6978
|
-
"""
|
6979
|
-
Name of the database connection.
|
6980
|
-
"""
|
6981
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
6982
|
-
"""
|
6983
|
-
A list of roles that are allowed to use this
|
6984
|
-
connection.
|
6985
|
-
"""
|
6986
|
-
auth_type: NotRequired[pulumi.Input[str]]
|
6987
|
-
"""
|
6988
|
-
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
6989
|
-
"""
|
6990
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
6991
|
-
"""
|
6992
|
-
Connection string to use to connect to the database.
|
6993
|
-
"""
|
6994
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
6995
|
-
"""
|
6996
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6997
|
-
|
6998
|
-
Supported list of database secrets engines that can be configured:
|
6999
|
-
"""
|
7000
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
7001
|
-
"""
|
7002
|
-
Maximum number of seconds a connection may be reused.
|
7003
|
-
"""
|
7004
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
7005
|
-
"""
|
7006
|
-
Maximum number of idle connections to the database.
|
7007
|
-
"""
|
7008
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
7009
|
-
"""
|
7010
|
-
Maximum number of open connections to the database.
|
7011
|
-
"""
|
7012
|
-
password: NotRequired[pulumi.Input[str]]
|
7013
|
-
"""
|
7014
|
-
The root credential password used in the connection URL
|
7015
|
-
"""
|
7016
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
7017
|
-
"""
|
7018
|
-
Specifies the name of the plugin to use.
|
7019
|
-
"""
|
7020
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
7021
|
-
"""
|
7022
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
7023
|
-
"""
|
7024
|
-
service_account_json: NotRequired[pulumi.Input[str]]
|
7025
|
-
"""
|
7026
|
-
A JSON encoded credential for use with IAM authorization
|
7027
|
-
"""
|
7028
|
-
tls_ca: NotRequired[pulumi.Input[str]]
|
7029
|
-
"""
|
7030
|
-
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
7031
|
-
"""
|
7032
|
-
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
7033
|
-
"""
|
7034
|
-
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
7035
|
-
"""
|
7036
|
-
username: NotRequired[pulumi.Input[str]]
|
7037
|
-
"""
|
7038
|
-
The root credential username used in the connection URL
|
7039
|
-
"""
|
7040
|
-
username_template: NotRequired[pulumi.Input[str]]
|
7041
|
-
"""
|
7042
|
-
Username generation template.
|
7043
|
-
"""
|
7044
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
7045
|
-
"""
|
7046
|
-
Whether the connection should be verified on
|
7047
|
-
initial configuration or not.
|
7048
|
-
"""
|
7049
|
-
elif False:
|
7050
|
-
SecretsMountMysqlRdArgsDict: TypeAlias = Mapping[str, Any]
|
7051
|
-
|
7052
5359
|
@pulumi.input_type
|
7053
5360
|
class SecretsMountMysqlRdArgs:
|
7054
5361
|
def __init__(__self__, *,
|
@@ -7056,7 +5363,7 @@ class SecretsMountMysqlRdArgs:
|
|
7056
5363
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
7057
5364
|
auth_type: Optional[pulumi.Input[str]] = None,
|
7058
5365
|
connection_url: Optional[pulumi.Input[str]] = None,
|
7059
|
-
data: Optional[pulumi.Input[Mapping[str,
|
5366
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
7060
5367
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
7061
5368
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
7062
5369
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
@@ -7075,7 +5382,7 @@ class SecretsMountMysqlRdArgs:
|
|
7075
5382
|
connection.
|
7076
5383
|
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
7077
5384
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
7078
|
-
:param pulumi.Input[Mapping[str,
|
5385
|
+
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7079
5386
|
|
7080
5387
|
Supported list of database secrets engines that can be configured:
|
7081
5388
|
:param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -7177,7 +5484,7 @@ class SecretsMountMysqlRdArgs:
|
|
7177
5484
|
|
7178
5485
|
@property
|
7179
5486
|
@pulumi.getter
|
7180
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
5487
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
7181
5488
|
"""
|
7182
5489
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7183
5490
|
|
@@ -7186,7 +5493,7 @@ class SecretsMountMysqlRdArgs:
|
|
7186
5493
|
return pulumi.get(self, "data")
|
7187
5494
|
|
7188
5495
|
@data.setter
|
7189
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
5496
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
7190
5497
|
pulumi.set(self, "data", value)
|
7191
5498
|
|
7192
5499
|
@property
|
@@ -7335,82 +5642,13 @@ class SecretsMountMysqlRdArgs:
|
|
7335
5642
|
pulumi.set(self, "verify_connection", value)
|
7336
5643
|
|
7337
5644
|
|
7338
|
-
if not MYPY:
|
7339
|
-
class SecretsMountOracleArgsDict(TypedDict):
|
7340
|
-
name: pulumi.Input[str]
|
7341
|
-
"""
|
7342
|
-
Name of the database connection.
|
7343
|
-
"""
|
7344
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
7345
|
-
"""
|
7346
|
-
A list of roles that are allowed to use this
|
7347
|
-
connection.
|
7348
|
-
"""
|
7349
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
7350
|
-
"""
|
7351
|
-
Connection string to use to connect to the database.
|
7352
|
-
"""
|
7353
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
7354
|
-
"""
|
7355
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7356
|
-
|
7357
|
-
Supported list of database secrets engines that can be configured:
|
7358
|
-
"""
|
7359
|
-
disconnect_sessions: NotRequired[pulumi.Input[bool]]
|
7360
|
-
"""
|
7361
|
-
Set to true to disconnect any open sessions prior to running the revocation statements.
|
7362
|
-
"""
|
7363
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
7364
|
-
"""
|
7365
|
-
Maximum number of seconds a connection may be reused.
|
7366
|
-
"""
|
7367
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
7368
|
-
"""
|
7369
|
-
Maximum number of idle connections to the database.
|
7370
|
-
"""
|
7371
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
7372
|
-
"""
|
7373
|
-
Maximum number of open connections to the database.
|
7374
|
-
"""
|
7375
|
-
password: NotRequired[pulumi.Input[str]]
|
7376
|
-
"""
|
7377
|
-
The root credential password used in the connection URL
|
7378
|
-
"""
|
7379
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
7380
|
-
"""
|
7381
|
-
Specifies the name of the plugin to use.
|
7382
|
-
"""
|
7383
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
7384
|
-
"""
|
7385
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
7386
|
-
"""
|
7387
|
-
split_statements: NotRequired[pulumi.Input[bool]]
|
7388
|
-
"""
|
7389
|
-
Set to true in order to split statements after semi-colons.
|
7390
|
-
"""
|
7391
|
-
username: NotRequired[pulumi.Input[str]]
|
7392
|
-
"""
|
7393
|
-
The root credential username used in the connection URL
|
7394
|
-
"""
|
7395
|
-
username_template: NotRequired[pulumi.Input[str]]
|
7396
|
-
"""
|
7397
|
-
Username generation template.
|
7398
|
-
"""
|
7399
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
7400
|
-
"""
|
7401
|
-
Whether the connection should be verified on
|
7402
|
-
initial configuration or not.
|
7403
|
-
"""
|
7404
|
-
elif False:
|
7405
|
-
SecretsMountOracleArgsDict: TypeAlias = Mapping[str, Any]
|
7406
|
-
|
7407
5645
|
@pulumi.input_type
|
7408
5646
|
class SecretsMountOracleArgs:
|
7409
5647
|
def __init__(__self__, *,
|
7410
5648
|
name: pulumi.Input[str],
|
7411
5649
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
7412
5650
|
connection_url: Optional[pulumi.Input[str]] = None,
|
7413
|
-
data: Optional[pulumi.Input[Mapping[str,
|
5651
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
7414
5652
|
disconnect_sessions: Optional[pulumi.Input[bool]] = None,
|
7415
5653
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
7416
5654
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
@@ -7427,7 +5665,7 @@ class SecretsMountOracleArgs:
|
|
7427
5665
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
7428
5666
|
connection.
|
7429
5667
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
7430
|
-
:param pulumi.Input[Mapping[str,
|
5668
|
+
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7431
5669
|
|
7432
5670
|
Supported list of database secrets engines that can be configured:
|
7433
5671
|
:param pulumi.Input[bool] disconnect_sessions: Set to true to disconnect any open sessions prior to running the revocation statements.
|
@@ -7512,7 +5750,7 @@ class SecretsMountOracleArgs:
|
|
7512
5750
|
|
7513
5751
|
@property
|
7514
5752
|
@pulumi.getter
|
7515
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
5753
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
7516
5754
|
"""
|
7517
5755
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7518
5756
|
|
@@ -7521,7 +5759,7 @@ class SecretsMountOracleArgs:
|
|
7521
5759
|
return pulumi.get(self, "data")
|
7522
5760
|
|
7523
5761
|
@data.setter
|
7524
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
5762
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
7525
5763
|
pulumi.set(self, "data", value)
|
7526
5764
|
|
7527
5765
|
@property
|
@@ -7658,95 +5896,6 @@ class SecretsMountOracleArgs:
|
|
7658
5896
|
pulumi.set(self, "verify_connection", value)
|
7659
5897
|
|
7660
5898
|
|
7661
|
-
if not MYPY:
|
7662
|
-
class SecretsMountPostgresqlArgsDict(TypedDict):
|
7663
|
-
name: pulumi.Input[str]
|
7664
|
-
"""
|
7665
|
-
Name of the database connection.
|
7666
|
-
"""
|
7667
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
7668
|
-
"""
|
7669
|
-
A list of roles that are allowed to use this
|
7670
|
-
connection.
|
7671
|
-
"""
|
7672
|
-
auth_type: NotRequired[pulumi.Input[str]]
|
7673
|
-
"""
|
7674
|
-
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
7675
|
-
"""
|
7676
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
7677
|
-
"""
|
7678
|
-
Connection string to use to connect to the database.
|
7679
|
-
"""
|
7680
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
7681
|
-
"""
|
7682
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7683
|
-
|
7684
|
-
Supported list of database secrets engines that can be configured:
|
7685
|
-
"""
|
7686
|
-
disable_escaping: NotRequired[pulumi.Input[bool]]
|
7687
|
-
"""
|
7688
|
-
Disable special character escaping in username and password
|
7689
|
-
"""
|
7690
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
7691
|
-
"""
|
7692
|
-
Maximum number of seconds a connection may be reused.
|
7693
|
-
"""
|
7694
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
7695
|
-
"""
|
7696
|
-
Maximum number of idle connections to the database.
|
7697
|
-
"""
|
7698
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
7699
|
-
"""
|
7700
|
-
Maximum number of open connections to the database.
|
7701
|
-
"""
|
7702
|
-
password: NotRequired[pulumi.Input[str]]
|
7703
|
-
"""
|
7704
|
-
The root credential password used in the connection URL
|
7705
|
-
"""
|
7706
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
7707
|
-
"""
|
7708
|
-
Specifies the name of the plugin to use.
|
7709
|
-
"""
|
7710
|
-
private_key: NotRequired[pulumi.Input[str]]
|
7711
|
-
"""
|
7712
|
-
The secret key used for the x509 client certificate. Must be PEM encoded.
|
7713
|
-
"""
|
7714
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
7715
|
-
"""
|
7716
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
7717
|
-
"""
|
7718
|
-
self_managed: NotRequired[pulumi.Input[bool]]
|
7719
|
-
"""
|
7720
|
-
If set, allows onboarding static roles with a rootless connection configuration.
|
7721
|
-
"""
|
7722
|
-
service_account_json: NotRequired[pulumi.Input[str]]
|
7723
|
-
"""
|
7724
|
-
A JSON encoded credential for use with IAM authorization
|
7725
|
-
"""
|
7726
|
-
tls_ca: NotRequired[pulumi.Input[str]]
|
7727
|
-
"""
|
7728
|
-
The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
7729
|
-
"""
|
7730
|
-
tls_certificate: NotRequired[pulumi.Input[str]]
|
7731
|
-
"""
|
7732
|
-
The x509 client certificate for connecting to the database. Must be PEM encoded.
|
7733
|
-
"""
|
7734
|
-
username: NotRequired[pulumi.Input[str]]
|
7735
|
-
"""
|
7736
|
-
The root credential username used in the connection URL
|
7737
|
-
"""
|
7738
|
-
username_template: NotRequired[pulumi.Input[str]]
|
7739
|
-
"""
|
7740
|
-
Username generation template.
|
7741
|
-
"""
|
7742
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
7743
|
-
"""
|
7744
|
-
Whether the connection should be verified on
|
7745
|
-
initial configuration or not.
|
7746
|
-
"""
|
7747
|
-
elif False:
|
7748
|
-
SecretsMountPostgresqlArgsDict: TypeAlias = Mapping[str, Any]
|
7749
|
-
|
7750
5899
|
@pulumi.input_type
|
7751
5900
|
class SecretsMountPostgresqlArgs:
|
7752
5901
|
def __init__(__self__, *,
|
@@ -7754,19 +5903,15 @@ class SecretsMountPostgresqlArgs:
|
|
7754
5903
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
7755
5904
|
auth_type: Optional[pulumi.Input[str]] = None,
|
7756
5905
|
connection_url: Optional[pulumi.Input[str]] = None,
|
7757
|
-
data: Optional[pulumi.Input[Mapping[str,
|
5906
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
7758
5907
|
disable_escaping: Optional[pulumi.Input[bool]] = None,
|
7759
5908
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
7760
5909
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
7761
5910
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
7762
5911
|
password: Optional[pulumi.Input[str]] = None,
|
7763
5912
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
7764
|
-
private_key: Optional[pulumi.Input[str]] = None,
|
7765
5913
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
7766
|
-
self_managed: Optional[pulumi.Input[bool]] = None,
|
7767
5914
|
service_account_json: Optional[pulumi.Input[str]] = None,
|
7768
|
-
tls_ca: Optional[pulumi.Input[str]] = None,
|
7769
|
-
tls_certificate: Optional[pulumi.Input[str]] = None,
|
7770
5915
|
username: Optional[pulumi.Input[str]] = None,
|
7771
5916
|
username_template: Optional[pulumi.Input[str]] = None,
|
7772
5917
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
@@ -7776,7 +5921,7 @@ class SecretsMountPostgresqlArgs:
|
|
7776
5921
|
connection.
|
7777
5922
|
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
7778
5923
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
7779
|
-
:param pulumi.Input[Mapping[str,
|
5924
|
+
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7780
5925
|
|
7781
5926
|
Supported list of database secrets engines that can be configured:
|
7782
5927
|
:param pulumi.Input[bool] disable_escaping: Disable special character escaping in username and password
|
@@ -7785,12 +5930,8 @@ class SecretsMountPostgresqlArgs:
|
|
7785
5930
|
:param pulumi.Input[int] max_open_connections: Maximum number of open connections to the database.
|
7786
5931
|
:param pulumi.Input[str] password: The root credential password used in the connection URL
|
7787
5932
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
7788
|
-
:param pulumi.Input[str] private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
|
7789
5933
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
7790
|
-
:param pulumi.Input[bool] self_managed: If set, allows onboarding static roles with a rootless connection configuration.
|
7791
5934
|
:param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
|
7792
|
-
:param pulumi.Input[str] tls_ca: The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
7793
|
-
:param pulumi.Input[str] tls_certificate: The x509 client certificate for connecting to the database. Must be PEM encoded.
|
7794
5935
|
:param pulumi.Input[str] username: The root credential username used in the connection URL
|
7795
5936
|
:param pulumi.Input[str] username_template: Username generation template.
|
7796
5937
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
@@ -7817,18 +5958,10 @@ class SecretsMountPostgresqlArgs:
|
|
7817
5958
|
pulumi.set(__self__, "password", password)
|
7818
5959
|
if plugin_name is not None:
|
7819
5960
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
7820
|
-
if private_key is not None:
|
7821
|
-
pulumi.set(__self__, "private_key", private_key)
|
7822
5961
|
if root_rotation_statements is not None:
|
7823
5962
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
7824
|
-
if self_managed is not None:
|
7825
|
-
pulumi.set(__self__, "self_managed", self_managed)
|
7826
5963
|
if service_account_json is not None:
|
7827
5964
|
pulumi.set(__self__, "service_account_json", service_account_json)
|
7828
|
-
if tls_ca is not None:
|
7829
|
-
pulumi.set(__self__, "tls_ca", tls_ca)
|
7830
|
-
if tls_certificate is not None:
|
7831
|
-
pulumi.set(__self__, "tls_certificate", tls_certificate)
|
7832
5965
|
if username is not None:
|
7833
5966
|
pulumi.set(__self__, "username", username)
|
7834
5967
|
if username_template is not None:
|
@@ -7887,7 +6020,7 @@ class SecretsMountPostgresqlArgs:
|
|
7887
6020
|
|
7888
6021
|
@property
|
7889
6022
|
@pulumi.getter
|
7890
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
6023
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
7891
6024
|
"""
|
7892
6025
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7893
6026
|
|
@@ -7896,7 +6029,7 @@ class SecretsMountPostgresqlArgs:
|
|
7896
6029
|
return pulumi.get(self, "data")
|
7897
6030
|
|
7898
6031
|
@data.setter
|
7899
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
6032
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
7900
6033
|
pulumi.set(self, "data", value)
|
7901
6034
|
|
7902
6035
|
@property
|
@@ -7971,18 +6104,6 @@ class SecretsMountPostgresqlArgs:
|
|
7971
6104
|
def plugin_name(self, value: Optional[pulumi.Input[str]]):
|
7972
6105
|
pulumi.set(self, "plugin_name", value)
|
7973
6106
|
|
7974
|
-
@property
|
7975
|
-
@pulumi.getter(name="privateKey")
|
7976
|
-
def private_key(self) -> Optional[pulumi.Input[str]]:
|
7977
|
-
"""
|
7978
|
-
The secret key used for the x509 client certificate. Must be PEM encoded.
|
7979
|
-
"""
|
7980
|
-
return pulumi.get(self, "private_key")
|
7981
|
-
|
7982
|
-
@private_key.setter
|
7983
|
-
def private_key(self, value: Optional[pulumi.Input[str]]):
|
7984
|
-
pulumi.set(self, "private_key", value)
|
7985
|
-
|
7986
6107
|
@property
|
7987
6108
|
@pulumi.getter(name="rootRotationStatements")
|
7988
6109
|
def root_rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -7995,18 +6116,6 @@ class SecretsMountPostgresqlArgs:
|
|
7995
6116
|
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
7996
6117
|
pulumi.set(self, "root_rotation_statements", value)
|
7997
6118
|
|
7998
|
-
@property
|
7999
|
-
@pulumi.getter(name="selfManaged")
|
8000
|
-
def self_managed(self) -> Optional[pulumi.Input[bool]]:
|
8001
|
-
"""
|
8002
|
-
If set, allows onboarding static roles with a rootless connection configuration.
|
8003
|
-
"""
|
8004
|
-
return pulumi.get(self, "self_managed")
|
8005
|
-
|
8006
|
-
@self_managed.setter
|
8007
|
-
def self_managed(self, value: Optional[pulumi.Input[bool]]):
|
8008
|
-
pulumi.set(self, "self_managed", value)
|
8009
|
-
|
8010
6119
|
@property
|
8011
6120
|
@pulumi.getter(name="serviceAccountJson")
|
8012
6121
|
def service_account_json(self) -> Optional[pulumi.Input[str]]:
|
@@ -8019,30 +6128,6 @@ class SecretsMountPostgresqlArgs:
|
|
8019
6128
|
def service_account_json(self, value: Optional[pulumi.Input[str]]):
|
8020
6129
|
pulumi.set(self, "service_account_json", value)
|
8021
6130
|
|
8022
|
-
@property
|
8023
|
-
@pulumi.getter(name="tlsCa")
|
8024
|
-
def tls_ca(self) -> Optional[pulumi.Input[str]]:
|
8025
|
-
"""
|
8026
|
-
The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
8027
|
-
"""
|
8028
|
-
return pulumi.get(self, "tls_ca")
|
8029
|
-
|
8030
|
-
@tls_ca.setter
|
8031
|
-
def tls_ca(self, value: Optional[pulumi.Input[str]]):
|
8032
|
-
pulumi.set(self, "tls_ca", value)
|
8033
|
-
|
8034
|
-
@property
|
8035
|
-
@pulumi.getter(name="tlsCertificate")
|
8036
|
-
def tls_certificate(self) -> Optional[pulumi.Input[str]]:
|
8037
|
-
"""
|
8038
|
-
The x509 client certificate for connecting to the database. Must be PEM encoded.
|
8039
|
-
"""
|
8040
|
-
return pulumi.get(self, "tls_certificate")
|
8041
|
-
|
8042
|
-
@tls_certificate.setter
|
8043
|
-
def tls_certificate(self, value: Optional[pulumi.Input[str]]):
|
8044
|
-
pulumi.set(self, "tls_certificate", value)
|
8045
|
-
|
8046
6131
|
@property
|
8047
6132
|
@pulumi.getter
|
8048
6133
|
def username(self) -> Optional[pulumi.Input[str]]:
|
@@ -8081,67 +6166,6 @@ class SecretsMountPostgresqlArgs:
|
|
8081
6166
|
pulumi.set(self, "verify_connection", value)
|
8082
6167
|
|
8083
6168
|
|
8084
|
-
if not MYPY:
|
8085
|
-
class SecretsMountRediArgsDict(TypedDict):
|
8086
|
-
host: pulumi.Input[str]
|
8087
|
-
"""
|
8088
|
-
Specifies the host to connect to
|
8089
|
-
"""
|
8090
|
-
name: pulumi.Input[str]
|
8091
|
-
"""
|
8092
|
-
Name of the database connection.
|
8093
|
-
"""
|
8094
|
-
password: pulumi.Input[str]
|
8095
|
-
"""
|
8096
|
-
Specifies the password corresponding to the given username.
|
8097
|
-
"""
|
8098
|
-
username: pulumi.Input[str]
|
8099
|
-
"""
|
8100
|
-
Specifies the username for Vault to use.
|
8101
|
-
"""
|
8102
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
8103
|
-
"""
|
8104
|
-
A list of roles that are allowed to use this
|
8105
|
-
connection.
|
8106
|
-
"""
|
8107
|
-
ca_cert: NotRequired[pulumi.Input[str]]
|
8108
|
-
"""
|
8109
|
-
The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
|
8110
|
-
"""
|
8111
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
8112
|
-
"""
|
8113
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8114
|
-
|
8115
|
-
Supported list of database secrets engines that can be configured:
|
8116
|
-
"""
|
8117
|
-
insecure_tls: NotRequired[pulumi.Input[bool]]
|
8118
|
-
"""
|
8119
|
-
Specifies whether to skip verification of the server certificate when using TLS.
|
8120
|
-
"""
|
8121
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
8122
|
-
"""
|
8123
|
-
Specifies the name of the plugin to use.
|
8124
|
-
"""
|
8125
|
-
port: NotRequired[pulumi.Input[int]]
|
8126
|
-
"""
|
8127
|
-
The transport port to use to connect to Redis.
|
8128
|
-
"""
|
8129
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
8130
|
-
"""
|
8131
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
8132
|
-
"""
|
8133
|
-
tls: NotRequired[pulumi.Input[bool]]
|
8134
|
-
"""
|
8135
|
-
Specifies whether to use TLS when connecting to Redis.
|
8136
|
-
"""
|
8137
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
8138
|
-
"""
|
8139
|
-
Whether the connection should be verified on
|
8140
|
-
initial configuration or not.
|
8141
|
-
"""
|
8142
|
-
elif False:
|
8143
|
-
SecretsMountRediArgsDict: TypeAlias = Mapping[str, Any]
|
8144
|
-
|
8145
6169
|
@pulumi.input_type
|
8146
6170
|
class SecretsMountRediArgs:
|
8147
6171
|
def __init__(__self__, *,
|
@@ -8151,7 +6175,7 @@ class SecretsMountRediArgs:
|
|
8151
6175
|
username: pulumi.Input[str],
|
8152
6176
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
8153
6177
|
ca_cert: Optional[pulumi.Input[str]] = None,
|
8154
|
-
data: Optional[pulumi.Input[Mapping[str,
|
6178
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
8155
6179
|
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
8156
6180
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
8157
6181
|
port: Optional[pulumi.Input[int]] = None,
|
@@ -8166,7 +6190,7 @@ class SecretsMountRediArgs:
|
|
8166
6190
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
8167
6191
|
connection.
|
8168
6192
|
:param pulumi.Input[str] ca_cert: The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
|
8169
|
-
:param pulumi.Input[Mapping[str,
|
6193
|
+
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8170
6194
|
|
8171
6195
|
Supported list of database secrets engines that can be configured:
|
8172
6196
|
:param pulumi.Input[bool] insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
|
@@ -8275,7 +6299,7 @@ class SecretsMountRediArgs:
|
|
8275
6299
|
|
8276
6300
|
@property
|
8277
6301
|
@pulumi.getter
|
8278
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
6302
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
8279
6303
|
"""
|
8280
6304
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8281
6305
|
|
@@ -8284,7 +6308,7 @@ class SecretsMountRediArgs:
|
|
8284
6308
|
return pulumi.get(self, "data")
|
8285
6309
|
|
8286
6310
|
@data.setter
|
8287
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
6311
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
8288
6312
|
pulumi.set(self, "data", value)
|
8289
6313
|
|
8290
6314
|
@property
|
@@ -8361,62 +6385,13 @@ class SecretsMountRediArgs:
|
|
8361
6385
|
pulumi.set(self, "verify_connection", value)
|
8362
6386
|
|
8363
6387
|
|
8364
|
-
if not MYPY:
|
8365
|
-
class SecretsMountRedisElasticachArgsDict(TypedDict):
|
8366
|
-
name: pulumi.Input[str]
|
8367
|
-
"""
|
8368
|
-
Name of the database connection.
|
8369
|
-
"""
|
8370
|
-
url: pulumi.Input[str]
|
8371
|
-
"""
|
8372
|
-
The configuration endpoint for the ElastiCache cluster to connect to.
|
8373
|
-
"""
|
8374
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
8375
|
-
"""
|
8376
|
-
A list of roles that are allowed to use this
|
8377
|
-
connection.
|
8378
|
-
"""
|
8379
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
8380
|
-
"""
|
8381
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8382
|
-
|
8383
|
-
Supported list of database secrets engines that can be configured:
|
8384
|
-
"""
|
8385
|
-
password: NotRequired[pulumi.Input[str]]
|
8386
|
-
"""
|
8387
|
-
The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
8388
|
-
"""
|
8389
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
8390
|
-
"""
|
8391
|
-
Specifies the name of the plugin to use.
|
8392
|
-
"""
|
8393
|
-
region: NotRequired[pulumi.Input[str]]
|
8394
|
-
"""
|
8395
|
-
The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
|
8396
|
-
"""
|
8397
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
8398
|
-
"""
|
8399
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
8400
|
-
"""
|
8401
|
-
username: NotRequired[pulumi.Input[str]]
|
8402
|
-
"""
|
8403
|
-
The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
8404
|
-
"""
|
8405
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
8406
|
-
"""
|
8407
|
-
Whether the connection should be verified on
|
8408
|
-
initial configuration or not.
|
8409
|
-
"""
|
8410
|
-
elif False:
|
8411
|
-
SecretsMountRedisElasticachArgsDict: TypeAlias = Mapping[str, Any]
|
8412
|
-
|
8413
6388
|
@pulumi.input_type
|
8414
6389
|
class SecretsMountRedisElasticachArgs:
|
8415
6390
|
def __init__(__self__, *,
|
8416
6391
|
name: pulumi.Input[str],
|
8417
6392
|
url: pulumi.Input[str],
|
8418
6393
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
8419
|
-
data: Optional[pulumi.Input[Mapping[str,
|
6394
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
8420
6395
|
password: Optional[pulumi.Input[str]] = None,
|
8421
6396
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
8422
6397
|
region: Optional[pulumi.Input[str]] = None,
|
@@ -8428,7 +6403,7 @@ class SecretsMountRedisElasticachArgs:
|
|
8428
6403
|
:param pulumi.Input[str] url: The configuration endpoint for the ElastiCache cluster to connect to.
|
8429
6404
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
8430
6405
|
connection.
|
8431
|
-
:param pulumi.Input[Mapping[str,
|
6406
|
+
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8432
6407
|
|
8433
6408
|
Supported list of database secrets engines that can be configured:
|
8434
6409
|
:param pulumi.Input[str] password: The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
@@ -8497,7 +6472,7 @@ class SecretsMountRedisElasticachArgs:
|
|
8497
6472
|
|
8498
6473
|
@property
|
8499
6474
|
@pulumi.getter
|
8500
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
6475
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
8501
6476
|
"""
|
8502
6477
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8503
6478
|
|
@@ -8506,7 +6481,7 @@ class SecretsMountRedisElasticachArgs:
|
|
8506
6481
|
return pulumi.get(self, "data")
|
8507
6482
|
|
8508
6483
|
@data.setter
|
8509
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
6484
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
8510
6485
|
pulumi.set(self, "data", value)
|
8511
6486
|
|
8512
6487
|
@property
|
@@ -8583,78 +6558,13 @@ class SecretsMountRedisElasticachArgs:
|
|
8583
6558
|
pulumi.set(self, "verify_connection", value)
|
8584
6559
|
|
8585
6560
|
|
8586
|
-
if not MYPY:
|
8587
|
-
class SecretsMountRedshiftArgsDict(TypedDict):
|
8588
|
-
name: pulumi.Input[str]
|
8589
|
-
"""
|
8590
|
-
Name of the database connection.
|
8591
|
-
"""
|
8592
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
8593
|
-
"""
|
8594
|
-
A list of roles that are allowed to use this
|
8595
|
-
connection.
|
8596
|
-
"""
|
8597
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
8598
|
-
"""
|
8599
|
-
Connection string to use to connect to the database.
|
8600
|
-
"""
|
8601
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
8602
|
-
"""
|
8603
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8604
|
-
|
8605
|
-
Supported list of database secrets engines that can be configured:
|
8606
|
-
"""
|
8607
|
-
disable_escaping: NotRequired[pulumi.Input[bool]]
|
8608
|
-
"""
|
8609
|
-
Disable special character escaping in username and password
|
8610
|
-
"""
|
8611
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
8612
|
-
"""
|
8613
|
-
Maximum number of seconds a connection may be reused.
|
8614
|
-
"""
|
8615
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
8616
|
-
"""
|
8617
|
-
Maximum number of idle connections to the database.
|
8618
|
-
"""
|
8619
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
8620
|
-
"""
|
8621
|
-
Maximum number of open connections to the database.
|
8622
|
-
"""
|
8623
|
-
password: NotRequired[pulumi.Input[str]]
|
8624
|
-
"""
|
8625
|
-
The root credential password used in the connection URL
|
8626
|
-
"""
|
8627
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
8628
|
-
"""
|
8629
|
-
Specifies the name of the plugin to use.
|
8630
|
-
"""
|
8631
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
8632
|
-
"""
|
8633
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
8634
|
-
"""
|
8635
|
-
username: NotRequired[pulumi.Input[str]]
|
8636
|
-
"""
|
8637
|
-
The root credential username used in the connection URL
|
8638
|
-
"""
|
8639
|
-
username_template: NotRequired[pulumi.Input[str]]
|
8640
|
-
"""
|
8641
|
-
Username generation template.
|
8642
|
-
"""
|
8643
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
8644
|
-
"""
|
8645
|
-
Whether the connection should be verified on
|
8646
|
-
initial configuration or not.
|
8647
|
-
"""
|
8648
|
-
elif False:
|
8649
|
-
SecretsMountRedshiftArgsDict: TypeAlias = Mapping[str, Any]
|
8650
|
-
|
8651
6561
|
@pulumi.input_type
|
8652
6562
|
class SecretsMountRedshiftArgs:
|
8653
6563
|
def __init__(__self__, *,
|
8654
6564
|
name: pulumi.Input[str],
|
8655
6565
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
8656
6566
|
connection_url: Optional[pulumi.Input[str]] = None,
|
8657
|
-
data: Optional[pulumi.Input[Mapping[str,
|
6567
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
8658
6568
|
disable_escaping: Optional[pulumi.Input[bool]] = None,
|
8659
6569
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
8660
6570
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
@@ -8670,7 +6580,7 @@ class SecretsMountRedshiftArgs:
|
|
8670
6580
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
8671
6581
|
connection.
|
8672
6582
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
8673
|
-
:param pulumi.Input[Mapping[str,
|
6583
|
+
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8674
6584
|
|
8675
6585
|
Supported list of database secrets engines that can be configured:
|
8676
6586
|
:param pulumi.Input[bool] disable_escaping: Disable special character escaping in username and password
|
@@ -8752,7 +6662,7 @@ class SecretsMountRedshiftArgs:
|
|
8752
6662
|
|
8753
6663
|
@property
|
8754
6664
|
@pulumi.getter
|
8755
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
6665
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
8756
6666
|
"""
|
8757
6667
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8758
6668
|
|
@@ -8761,7 +6671,7 @@ class SecretsMountRedshiftArgs:
|
|
8761
6671
|
return pulumi.get(self, "data")
|
8762
6672
|
|
8763
6673
|
@data.setter
|
8764
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
6674
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
8765
6675
|
pulumi.set(self, "data", value)
|
8766
6676
|
|
8767
6677
|
@property
|
@@ -8886,74 +6796,13 @@ class SecretsMountRedshiftArgs:
|
|
8886
6796
|
pulumi.set(self, "verify_connection", value)
|
8887
6797
|
|
8888
6798
|
|
8889
|
-
if not MYPY:
|
8890
|
-
class SecretsMountSnowflakeArgsDict(TypedDict):
|
8891
|
-
name: pulumi.Input[str]
|
8892
|
-
"""
|
8893
|
-
Name of the database connection.
|
8894
|
-
"""
|
8895
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
8896
|
-
"""
|
8897
|
-
A list of roles that are allowed to use this
|
8898
|
-
connection.
|
8899
|
-
"""
|
8900
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
8901
|
-
"""
|
8902
|
-
Connection string to use to connect to the database.
|
8903
|
-
"""
|
8904
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
8905
|
-
"""
|
8906
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8907
|
-
|
8908
|
-
Supported list of database secrets engines that can be configured:
|
8909
|
-
"""
|
8910
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
8911
|
-
"""
|
8912
|
-
Maximum number of seconds a connection may be reused.
|
8913
|
-
"""
|
8914
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
8915
|
-
"""
|
8916
|
-
Maximum number of idle connections to the database.
|
8917
|
-
"""
|
8918
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
8919
|
-
"""
|
8920
|
-
Maximum number of open connections to the database.
|
8921
|
-
"""
|
8922
|
-
password: NotRequired[pulumi.Input[str]]
|
8923
|
-
"""
|
8924
|
-
The root credential password used in the connection URL
|
8925
|
-
"""
|
8926
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
8927
|
-
"""
|
8928
|
-
Specifies the name of the plugin to use.
|
8929
|
-
"""
|
8930
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
8931
|
-
"""
|
8932
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
8933
|
-
"""
|
8934
|
-
username: NotRequired[pulumi.Input[str]]
|
8935
|
-
"""
|
8936
|
-
The root credential username used in the connection URL
|
8937
|
-
"""
|
8938
|
-
username_template: NotRequired[pulumi.Input[str]]
|
8939
|
-
"""
|
8940
|
-
Username generation template.
|
8941
|
-
"""
|
8942
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
8943
|
-
"""
|
8944
|
-
Whether the connection should be verified on
|
8945
|
-
initial configuration or not.
|
8946
|
-
"""
|
8947
|
-
elif False:
|
8948
|
-
SecretsMountSnowflakeArgsDict: TypeAlias = Mapping[str, Any]
|
8949
|
-
|
8950
6799
|
@pulumi.input_type
|
8951
6800
|
class SecretsMountSnowflakeArgs:
|
8952
6801
|
def __init__(__self__, *,
|
8953
6802
|
name: pulumi.Input[str],
|
8954
6803
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
8955
6804
|
connection_url: Optional[pulumi.Input[str]] = None,
|
8956
|
-
data: Optional[pulumi.Input[Mapping[str,
|
6805
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
8957
6806
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
8958
6807
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
8959
6808
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
@@ -8968,7 +6817,7 @@ class SecretsMountSnowflakeArgs:
|
|
8968
6817
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
8969
6818
|
connection.
|
8970
6819
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
8971
|
-
:param pulumi.Input[Mapping[str,
|
6820
|
+
:param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8972
6821
|
|
8973
6822
|
Supported list of database secrets engines that can be configured:
|
8974
6823
|
:param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -9047,7 +6896,7 @@ class SecretsMountSnowflakeArgs:
|
|
9047
6896
|
|
9048
6897
|
@property
|
9049
6898
|
@pulumi.getter
|
9050
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
6899
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
9051
6900
|
"""
|
9052
6901
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
9053
6902
|
|
@@ -9056,7 +6905,7 @@ class SecretsMountSnowflakeArgs:
|
|
9056
6905
|
return pulumi.get(self, "data")
|
9057
6906
|
|
9058
6907
|
@data.setter
|
9059
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
6908
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
9060
6909
|
pulumi.set(self, "data", value)
|
9061
6910
|
|
9062
6911
|
@property
|