pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +7 -12
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +14 -19
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +105 -2256
- pulumi_vault/database/outputs.py +54 -199
- pulumi_vault/database/secret_backend_connection.py +14 -19
- pulumi_vault/database/secret_backend_role.py +14 -19
- pulumi_vault/database/secret_backend_static_role.py +1 -69
- pulumi_vault/database/secrets_mount.py +14 -19
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +3 -62
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +5 -25
- pulumi_vault/generic/secret.py +7 -12
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +5 -18
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +8 -28
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +7 -26
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +5 -35
- pulumi_vault/identity/get_group.py +6 -42
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +5 -16
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +3 -8
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +28 -33
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +3 -55
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +14 -19
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +4 -36
- pulumi_vault/kv/get_secret.py +5 -20
- pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
- pulumi_vault/kv/get_secret_v2.py +8 -27
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +3 -8
- pulumi_vault/kv/secret.py +7 -12
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +28 -33
- pulumi_vault/ldap/auth_backend.py +0 -52
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +14 -19
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +16 -21
- pulumi_vault/namespace.py +14 -19
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +8 -49
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +14 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +5 -18
- pulumi_vault/pkisecret/outputs.py +12 -17
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +14 -19
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +14 -19
- pulumi_vault/secrets/sync_azure_destination.py +14 -19
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +14 -19
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +28 -67
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +14 -38
- pulumi_vault/transform/get_encode.py +14 -38
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +14 -19
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +7 -12
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
- pulumi_vault-6.4.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
pulumi_vault/database/outputs.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -68,8 +63,6 @@ class SecretBackendConnectionCassandra(dict):
|
|
68
63
|
suggest = "pem_json"
|
69
64
|
elif key == "protocolVersion":
|
70
65
|
suggest = "protocol_version"
|
71
|
-
elif key == "skipVerification":
|
72
|
-
suggest = "skip_verification"
|
73
66
|
|
74
67
|
if suggest:
|
75
68
|
pulumi.log.warn(f"Key '{key}' not found in SecretBackendConnectionCassandra. Access the value via the '{suggest}' property getter instead.")
|
@@ -91,7 +84,6 @@ class SecretBackendConnectionCassandra(dict):
|
|
91
84
|
pem_json: Optional[str] = None,
|
92
85
|
port: Optional[int] = None,
|
93
86
|
protocol_version: Optional[int] = None,
|
94
|
-
skip_verification: Optional[bool] = None,
|
95
87
|
tls: Optional[bool] = None,
|
96
88
|
username: Optional[str] = None):
|
97
89
|
"""
|
@@ -103,7 +95,6 @@ class SecretBackendConnectionCassandra(dict):
|
|
103
95
|
:param str pem_json: Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
104
96
|
:param int port: The transport port to use to connect to Cassandra.
|
105
97
|
:param int protocol_version: The CQL protocol version to use.
|
106
|
-
:param bool skip_verification: Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
107
98
|
:param bool tls: Whether to use TLS when connecting to Cassandra.
|
108
99
|
:param str username: The username to use when authenticating with Cassandra.
|
109
100
|
"""
|
@@ -123,8 +114,6 @@ class SecretBackendConnectionCassandra(dict):
|
|
123
114
|
pulumi.set(__self__, "port", port)
|
124
115
|
if protocol_version is not None:
|
125
116
|
pulumi.set(__self__, "protocol_version", protocol_version)
|
126
|
-
if skip_verification is not None:
|
127
|
-
pulumi.set(__self__, "skip_verification", skip_verification)
|
128
117
|
if tls is not None:
|
129
118
|
pulumi.set(__self__, "tls", tls)
|
130
119
|
if username is not None:
|
@@ -194,14 +183,6 @@ class SecretBackendConnectionCassandra(dict):
|
|
194
183
|
"""
|
195
184
|
return pulumi.get(self, "protocol_version")
|
196
185
|
|
197
|
-
@property
|
198
|
-
@pulumi.getter(name="skipVerification")
|
199
|
-
def skip_verification(self) -> Optional[bool]:
|
200
|
-
"""
|
201
|
-
Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
202
|
-
"""
|
203
|
-
return pulumi.get(self, "skip_verification")
|
204
|
-
|
205
186
|
@property
|
206
187
|
@pulumi.getter
|
207
188
|
def tls(self) -> Optional[bool]:
|
@@ -1928,16 +1909,8 @@ class SecretBackendConnectionPostgresql(dict):
|
|
1928
1909
|
suggest = "max_idle_connections"
|
1929
1910
|
elif key == "maxOpenConnections":
|
1930
1911
|
suggest = "max_open_connections"
|
1931
|
-
elif key == "privateKey":
|
1932
|
-
suggest = "private_key"
|
1933
|
-
elif key == "selfManaged":
|
1934
|
-
suggest = "self_managed"
|
1935
1912
|
elif key == "serviceAccountJson":
|
1936
1913
|
suggest = "service_account_json"
|
1937
|
-
elif key == "tlsCa":
|
1938
|
-
suggest = "tls_ca"
|
1939
|
-
elif key == "tlsCertificate":
|
1940
|
-
suggest = "tls_certificate"
|
1941
1914
|
elif key == "usernameTemplate":
|
1942
1915
|
suggest = "username_template"
|
1943
1916
|
|
@@ -1960,11 +1933,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
1960
1933
|
max_idle_connections: Optional[int] = None,
|
1961
1934
|
max_open_connections: Optional[int] = None,
|
1962
1935
|
password: Optional[str] = None,
|
1963
|
-
private_key: Optional[str] = None,
|
1964
|
-
self_managed: Optional[bool] = None,
|
1965
1936
|
service_account_json: Optional[str] = None,
|
1966
|
-
tls_ca: Optional[str] = None,
|
1967
|
-
tls_certificate: Optional[str] = None,
|
1968
1937
|
username: Optional[str] = None,
|
1969
1938
|
username_template: Optional[str] = None):
|
1970
1939
|
"""
|
@@ -1975,11 +1944,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
1975
1944
|
:param int max_idle_connections: Maximum number of idle connections to the database.
|
1976
1945
|
:param int max_open_connections: Maximum number of open connections to the database.
|
1977
1946
|
:param str password: The root credential password used in the connection URL
|
1978
|
-
:param str private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
|
1979
|
-
:param bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
|
1980
1947
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
1981
|
-
:param str tls_ca: The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
1982
|
-
:param str tls_certificate: The x509 client certificate for connecting to the database. Must be PEM encoded.
|
1983
1948
|
:param str username: The root credential username used in the connection URL
|
1984
1949
|
:param str username_template: Username generation template.
|
1985
1950
|
"""
|
@@ -1997,16 +1962,8 @@ class SecretBackendConnectionPostgresql(dict):
|
|
1997
1962
|
pulumi.set(__self__, "max_open_connections", max_open_connections)
|
1998
1963
|
if password is not None:
|
1999
1964
|
pulumi.set(__self__, "password", password)
|
2000
|
-
if private_key is not None:
|
2001
|
-
pulumi.set(__self__, "private_key", private_key)
|
2002
|
-
if self_managed is not None:
|
2003
|
-
pulumi.set(__self__, "self_managed", self_managed)
|
2004
1965
|
if service_account_json is not None:
|
2005
1966
|
pulumi.set(__self__, "service_account_json", service_account_json)
|
2006
|
-
if tls_ca is not None:
|
2007
|
-
pulumi.set(__self__, "tls_ca", tls_ca)
|
2008
|
-
if tls_certificate is not None:
|
2009
|
-
pulumi.set(__self__, "tls_certificate", tls_certificate)
|
2010
1967
|
if username is not None:
|
2011
1968
|
pulumi.set(__self__, "username", username)
|
2012
1969
|
if username_template is not None:
|
@@ -2068,22 +2025,6 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2068
2025
|
"""
|
2069
2026
|
return pulumi.get(self, "password")
|
2070
2027
|
|
2071
|
-
@property
|
2072
|
-
@pulumi.getter(name="privateKey")
|
2073
|
-
def private_key(self) -> Optional[str]:
|
2074
|
-
"""
|
2075
|
-
The secret key used for the x509 client certificate. Must be PEM encoded.
|
2076
|
-
"""
|
2077
|
-
return pulumi.get(self, "private_key")
|
2078
|
-
|
2079
|
-
@property
|
2080
|
-
@pulumi.getter(name="selfManaged")
|
2081
|
-
def self_managed(self) -> Optional[bool]:
|
2082
|
-
"""
|
2083
|
-
If set, allows onboarding static roles with a rootless connection configuration.
|
2084
|
-
"""
|
2085
|
-
return pulumi.get(self, "self_managed")
|
2086
|
-
|
2087
2028
|
@property
|
2088
2029
|
@pulumi.getter(name="serviceAccountJson")
|
2089
2030
|
def service_account_json(self) -> Optional[str]:
|
@@ -2092,22 +2033,6 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2092
2033
|
"""
|
2093
2034
|
return pulumi.get(self, "service_account_json")
|
2094
2035
|
|
2095
|
-
@property
|
2096
|
-
@pulumi.getter(name="tlsCa")
|
2097
|
-
def tls_ca(self) -> Optional[str]:
|
2098
|
-
"""
|
2099
|
-
The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
2100
|
-
"""
|
2101
|
-
return pulumi.get(self, "tls_ca")
|
2102
|
-
|
2103
|
-
@property
|
2104
|
-
@pulumi.getter(name="tlsCertificate")
|
2105
|
-
def tls_certificate(self) -> Optional[str]:
|
2106
|
-
"""
|
2107
|
-
The x509 client certificate for connecting to the database. Must be PEM encoded.
|
2108
|
-
"""
|
2109
|
-
return pulumi.get(self, "tls_certificate")
|
2110
|
-
|
2111
2036
|
@property
|
2112
2037
|
@pulumi.getter
|
2113
2038
|
def username(self) -> Optional[str]:
|
@@ -2553,8 +2478,6 @@ class SecretsMountCassandra(dict):
|
|
2553
2478
|
suggest = "protocol_version"
|
2554
2479
|
elif key == "rootRotationStatements":
|
2555
2480
|
suggest = "root_rotation_statements"
|
2556
|
-
elif key == "skipVerification":
|
2557
|
-
suggest = "skip_verification"
|
2558
2481
|
elif key == "verifyConnection":
|
2559
2482
|
suggest = "verify_connection"
|
2560
2483
|
|
@@ -2573,7 +2496,7 @@ class SecretsMountCassandra(dict):
|
|
2573
2496
|
name: str,
|
2574
2497
|
allowed_roles: Optional[Sequence[str]] = None,
|
2575
2498
|
connect_timeout: Optional[int] = None,
|
2576
|
-
data: Optional[Mapping[str,
|
2499
|
+
data: Optional[Mapping[str, Any]] = None,
|
2577
2500
|
hosts: Optional[Sequence[str]] = None,
|
2578
2501
|
insecure_tls: Optional[bool] = None,
|
2579
2502
|
password: Optional[str] = None,
|
@@ -2583,7 +2506,6 @@ class SecretsMountCassandra(dict):
|
|
2583
2506
|
port: Optional[int] = None,
|
2584
2507
|
protocol_version: Optional[int] = None,
|
2585
2508
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
2586
|
-
skip_verification: Optional[bool] = None,
|
2587
2509
|
tls: Optional[bool] = None,
|
2588
2510
|
username: Optional[str] = None,
|
2589
2511
|
verify_connection: Optional[bool] = None):
|
@@ -2592,7 +2514,7 @@ class SecretsMountCassandra(dict):
|
|
2592
2514
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
2593
2515
|
connection.
|
2594
2516
|
:param int connect_timeout: The number of seconds to use as a connection timeout.
|
2595
|
-
:param Mapping[str,
|
2517
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2596
2518
|
|
2597
2519
|
Supported list of database secrets engines that can be configured:
|
2598
2520
|
:param Sequence[str] hosts: Cassandra hosts to connect to.
|
@@ -2604,7 +2526,6 @@ class SecretsMountCassandra(dict):
|
|
2604
2526
|
:param int port: The transport port to use to connect to Cassandra.
|
2605
2527
|
:param int protocol_version: The CQL protocol version to use.
|
2606
2528
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
2607
|
-
:param bool skip_verification: Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
2608
2529
|
:param bool tls: Whether to use TLS when connecting to Cassandra.
|
2609
2530
|
:param str username: The username to use when authenticating with Cassandra.
|
2610
2531
|
:param bool verify_connection: Whether the connection should be verified on
|
@@ -2635,8 +2556,6 @@ class SecretsMountCassandra(dict):
|
|
2635
2556
|
pulumi.set(__self__, "protocol_version", protocol_version)
|
2636
2557
|
if root_rotation_statements is not None:
|
2637
2558
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
2638
|
-
if skip_verification is not None:
|
2639
|
-
pulumi.set(__self__, "skip_verification", skip_verification)
|
2640
2559
|
if tls is not None:
|
2641
2560
|
pulumi.set(__self__, "tls", tls)
|
2642
2561
|
if username is not None:
|
@@ -2671,7 +2590,7 @@ class SecretsMountCassandra(dict):
|
|
2671
2590
|
|
2672
2591
|
@property
|
2673
2592
|
@pulumi.getter
|
2674
|
-
def data(self) -> Optional[Mapping[str,
|
2593
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
2675
2594
|
"""
|
2676
2595
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2677
2596
|
|
@@ -2751,14 +2670,6 @@ class SecretsMountCassandra(dict):
|
|
2751
2670
|
"""
|
2752
2671
|
return pulumi.get(self, "root_rotation_statements")
|
2753
2672
|
|
2754
|
-
@property
|
2755
|
-
@pulumi.getter(name="skipVerification")
|
2756
|
-
def skip_verification(self) -> Optional[bool]:
|
2757
|
-
"""
|
2758
|
-
Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
2759
|
-
"""
|
2760
|
-
return pulumi.get(self, "skip_verification")
|
2761
|
-
|
2762
2673
|
@property
|
2763
2674
|
@pulumi.getter
|
2764
2675
|
def tls(self) -> Optional[bool]:
|
@@ -2826,7 +2737,7 @@ class SecretsMountCouchbase(dict):
|
|
2826
2737
|
allowed_roles: Optional[Sequence[str]] = None,
|
2827
2738
|
base64_pem: Optional[str] = None,
|
2828
2739
|
bucket_name: Optional[str] = None,
|
2829
|
-
data: Optional[Mapping[str,
|
2740
|
+
data: Optional[Mapping[str, Any]] = None,
|
2830
2741
|
insecure_tls: Optional[bool] = None,
|
2831
2742
|
plugin_name: Optional[str] = None,
|
2832
2743
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
@@ -2842,7 +2753,7 @@ class SecretsMountCouchbase(dict):
|
|
2842
2753
|
connection.
|
2843
2754
|
:param str base64_pem: Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
|
2844
2755
|
:param str bucket_name: Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
|
2845
|
-
:param Mapping[str,
|
2756
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2846
2757
|
|
2847
2758
|
Supported list of database secrets engines that can be configured:
|
2848
2759
|
:param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
|
@@ -2937,7 +2848,7 @@ class SecretsMountCouchbase(dict):
|
|
2937
2848
|
|
2938
2849
|
@property
|
2939
2850
|
@pulumi.getter
|
2940
|
-
def data(self) -> Optional[Mapping[str,
|
2851
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
2941
2852
|
"""
|
2942
2853
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2943
2854
|
|
@@ -3042,7 +2953,7 @@ class SecretsMountElasticsearch(dict):
|
|
3042
2953
|
ca_path: Optional[str] = None,
|
3043
2954
|
client_cert: Optional[str] = None,
|
3044
2955
|
client_key: Optional[str] = None,
|
3045
|
-
data: Optional[Mapping[str,
|
2956
|
+
data: Optional[Mapping[str, Any]] = None,
|
3046
2957
|
insecure: Optional[bool] = None,
|
3047
2958
|
plugin_name: Optional[str] = None,
|
3048
2959
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
@@ -3060,7 +2971,7 @@ class SecretsMountElasticsearch(dict):
|
|
3060
2971
|
:param str ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
3061
2972
|
:param str client_cert: The path to the certificate for the Elasticsearch client to present for communication
|
3062
2973
|
:param str client_key: The path to the key for the Elasticsearch client to use for communication
|
3063
|
-
:param Mapping[str,
|
2974
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3064
2975
|
|
3065
2976
|
Supported list of database secrets engines that can be configured:
|
3066
2977
|
:param bool insecure: Whether to disable certificate verification
|
@@ -3175,7 +3086,7 @@ class SecretsMountElasticsearch(dict):
|
|
3175
3086
|
|
3176
3087
|
@property
|
3177
3088
|
@pulumi.getter
|
3178
|
-
def data(self) -> Optional[Mapping[str,
|
3089
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
3179
3090
|
"""
|
3180
3091
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3181
3092
|
|
@@ -3272,7 +3183,7 @@ class SecretsMountHana(dict):
|
|
3272
3183
|
name: str,
|
3273
3184
|
allowed_roles: Optional[Sequence[str]] = None,
|
3274
3185
|
connection_url: Optional[str] = None,
|
3275
|
-
data: Optional[Mapping[str,
|
3186
|
+
data: Optional[Mapping[str, Any]] = None,
|
3276
3187
|
disable_escaping: Optional[bool] = None,
|
3277
3188
|
max_connection_lifetime: Optional[int] = None,
|
3278
3189
|
max_idle_connections: Optional[int] = None,
|
@@ -3287,7 +3198,7 @@ class SecretsMountHana(dict):
|
|
3287
3198
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3288
3199
|
connection.
|
3289
3200
|
:param str connection_url: Connection string to use to connect to the database.
|
3290
|
-
:param Mapping[str,
|
3201
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3291
3202
|
|
3292
3203
|
Supported list of database secrets engines that can be configured:
|
3293
3204
|
:param bool disable_escaping: Disable special character escaping in username and password
|
@@ -3354,7 +3265,7 @@ class SecretsMountHana(dict):
|
|
3354
3265
|
|
3355
3266
|
@property
|
3356
3267
|
@pulumi.getter
|
3357
|
-
def data(self) -> Optional[Mapping[str,
|
3268
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
3358
3269
|
"""
|
3359
3270
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3360
3271
|
|
@@ -3478,7 +3389,7 @@ class SecretsMountInfluxdb(dict):
|
|
3478
3389
|
username: str,
|
3479
3390
|
allowed_roles: Optional[Sequence[str]] = None,
|
3480
3391
|
connect_timeout: Optional[int] = None,
|
3481
|
-
data: Optional[Mapping[str,
|
3392
|
+
data: Optional[Mapping[str, Any]] = None,
|
3482
3393
|
insecure_tls: Optional[bool] = None,
|
3483
3394
|
pem_bundle: Optional[str] = None,
|
3484
3395
|
pem_json: Optional[str] = None,
|
@@ -3496,7 +3407,7 @@ class SecretsMountInfluxdb(dict):
|
|
3496
3407
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3497
3408
|
connection.
|
3498
3409
|
:param int connect_timeout: The number of seconds to use as a connection timeout.
|
3499
|
-
:param Mapping[str,
|
3410
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3500
3411
|
|
3501
3412
|
Supported list of database secrets engines that can be configured:
|
3502
3413
|
:param bool insecure_tls: Whether to skip verification of the server certificate when using TLS.
|
@@ -3590,7 +3501,7 @@ class SecretsMountInfluxdb(dict):
|
|
3590
3501
|
|
3591
3502
|
@property
|
3592
3503
|
@pulumi.getter
|
3593
|
-
def data(self) -> Optional[Mapping[str,
|
3504
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
3594
3505
|
"""
|
3595
3506
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3596
3507
|
|
@@ -3711,7 +3622,7 @@ class SecretsMountMongodb(dict):
|
|
3711
3622
|
name: str,
|
3712
3623
|
allowed_roles: Optional[Sequence[str]] = None,
|
3713
3624
|
connection_url: Optional[str] = None,
|
3714
|
-
data: Optional[Mapping[str,
|
3625
|
+
data: Optional[Mapping[str, Any]] = None,
|
3715
3626
|
max_connection_lifetime: Optional[int] = None,
|
3716
3627
|
max_idle_connections: Optional[int] = None,
|
3717
3628
|
max_open_connections: Optional[int] = None,
|
@@ -3726,7 +3637,7 @@ class SecretsMountMongodb(dict):
|
|
3726
3637
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3727
3638
|
connection.
|
3728
3639
|
:param str connection_url: Connection string to use to connect to the database.
|
3729
|
-
:param Mapping[str,
|
3640
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3730
3641
|
|
3731
3642
|
Supported list of database secrets engines that can be configured:
|
3732
3643
|
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -3793,7 +3704,7 @@ class SecretsMountMongodb(dict):
|
|
3793
3704
|
|
3794
3705
|
@property
|
3795
3706
|
@pulumi.getter
|
3796
|
-
def data(self) -> Optional[Mapping[str,
|
3707
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
3797
3708
|
"""
|
3798
3709
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3799
3710
|
|
@@ -3912,7 +3823,7 @@ class SecretsMountMongodbatla(dict):
|
|
3912
3823
|
project_id: str,
|
3913
3824
|
public_key: str,
|
3914
3825
|
allowed_roles: Optional[Sequence[str]] = None,
|
3915
|
-
data: Optional[Mapping[str,
|
3826
|
+
data: Optional[Mapping[str, Any]] = None,
|
3916
3827
|
plugin_name: Optional[str] = None,
|
3917
3828
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
3918
3829
|
verify_connection: Optional[bool] = None):
|
@@ -3923,7 +3834,7 @@ class SecretsMountMongodbatla(dict):
|
|
3923
3834
|
:param str public_key: The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
|
3924
3835
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3925
3836
|
connection.
|
3926
|
-
:param Mapping[str,
|
3837
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3927
3838
|
|
3928
3839
|
Supported list of database secrets engines that can be configured:
|
3929
3840
|
:param str plugin_name: Specifies the name of the plugin to use.
|
@@ -3989,7 +3900,7 @@ class SecretsMountMongodbatla(dict):
|
|
3989
3900
|
|
3990
3901
|
@property
|
3991
3902
|
@pulumi.getter
|
3992
|
-
def data(self) -> Optional[Mapping[str,
|
3903
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
3993
3904
|
"""
|
3994
3905
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3995
3906
|
|
@@ -4067,7 +3978,7 @@ class SecretsMountMssql(dict):
|
|
4067
3978
|
allowed_roles: Optional[Sequence[str]] = None,
|
4068
3979
|
connection_url: Optional[str] = None,
|
4069
3980
|
contained_db: Optional[bool] = None,
|
4070
|
-
data: Optional[Mapping[str,
|
3981
|
+
data: Optional[Mapping[str, Any]] = None,
|
4071
3982
|
disable_escaping: Optional[bool] = None,
|
4072
3983
|
max_connection_lifetime: Optional[int] = None,
|
4073
3984
|
max_idle_connections: Optional[int] = None,
|
@@ -4084,7 +3995,7 @@ class SecretsMountMssql(dict):
|
|
4084
3995
|
connection.
|
4085
3996
|
:param str connection_url: Connection string to use to connect to the database.
|
4086
3997
|
:param bool contained_db: Set to true when the target is a Contained Database, e.g. AzureSQL.
|
4087
|
-
:param Mapping[str,
|
3998
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4088
3999
|
|
4089
4000
|
Supported list of database secrets engines that can be configured:
|
4090
4001
|
:param bool disable_escaping: Disable special character escaping in username and password
|
@@ -4164,7 +4075,7 @@ class SecretsMountMssql(dict):
|
|
4164
4075
|
|
4165
4076
|
@property
|
4166
4077
|
@pulumi.getter
|
4167
|
-
def data(self) -> Optional[Mapping[str,
|
4078
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
4168
4079
|
"""
|
4169
4080
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4170
4081
|
|
@@ -4302,7 +4213,7 @@ class SecretsMountMysql(dict):
|
|
4302
4213
|
allowed_roles: Optional[Sequence[str]] = None,
|
4303
4214
|
auth_type: Optional[str] = None,
|
4304
4215
|
connection_url: Optional[str] = None,
|
4305
|
-
data: Optional[Mapping[str,
|
4216
|
+
data: Optional[Mapping[str, Any]] = None,
|
4306
4217
|
max_connection_lifetime: Optional[int] = None,
|
4307
4218
|
max_idle_connections: Optional[int] = None,
|
4308
4219
|
max_open_connections: Optional[int] = None,
|
@@ -4321,7 +4232,7 @@ class SecretsMountMysql(dict):
|
|
4321
4232
|
connection.
|
4322
4233
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4323
4234
|
:param str connection_url: Connection string to use to connect to the database.
|
4324
|
-
:param Mapping[str,
|
4235
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4325
4236
|
|
4326
4237
|
Supported list of database secrets engines that can be configured:
|
4327
4238
|
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -4407,7 +4318,7 @@ class SecretsMountMysql(dict):
|
|
4407
4318
|
|
4408
4319
|
@property
|
4409
4320
|
@pulumi.getter
|
4410
|
-
def data(self) -> Optional[Mapping[str,
|
4321
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
4411
4322
|
"""
|
4412
4323
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4413
4324
|
|
@@ -4561,7 +4472,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4561
4472
|
allowed_roles: Optional[Sequence[str]] = None,
|
4562
4473
|
auth_type: Optional[str] = None,
|
4563
4474
|
connection_url: Optional[str] = None,
|
4564
|
-
data: Optional[Mapping[str,
|
4475
|
+
data: Optional[Mapping[str, Any]] = None,
|
4565
4476
|
max_connection_lifetime: Optional[int] = None,
|
4566
4477
|
max_idle_connections: Optional[int] = None,
|
4567
4478
|
max_open_connections: Optional[int] = None,
|
@@ -4580,7 +4491,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4580
4491
|
connection.
|
4581
4492
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4582
4493
|
:param str connection_url: Connection string to use to connect to the database.
|
4583
|
-
:param Mapping[str,
|
4494
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4584
4495
|
|
4585
4496
|
Supported list of database secrets engines that can be configured:
|
4586
4497
|
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -4666,7 +4577,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4666
4577
|
|
4667
4578
|
@property
|
4668
4579
|
@pulumi.getter
|
4669
|
-
def data(self) -> Optional[Mapping[str,
|
4580
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
4670
4581
|
"""
|
4671
4582
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4672
4583
|
|
@@ -4820,7 +4731,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
4820
4731
|
allowed_roles: Optional[Sequence[str]] = None,
|
4821
4732
|
auth_type: Optional[str] = None,
|
4822
4733
|
connection_url: Optional[str] = None,
|
4823
|
-
data: Optional[Mapping[str,
|
4734
|
+
data: Optional[Mapping[str, Any]] = None,
|
4824
4735
|
max_connection_lifetime: Optional[int] = None,
|
4825
4736
|
max_idle_connections: Optional[int] = None,
|
4826
4737
|
max_open_connections: Optional[int] = None,
|
@@ -4839,7 +4750,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
4839
4750
|
connection.
|
4840
4751
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4841
4752
|
:param str connection_url: Connection string to use to connect to the database.
|
4842
|
-
:param Mapping[str,
|
4753
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4843
4754
|
|
4844
4755
|
Supported list of database secrets engines that can be configured:
|
4845
4756
|
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -4925,7 +4836,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
4925
4836
|
|
4926
4837
|
@property
|
4927
4838
|
@pulumi.getter
|
4928
|
-
def data(self) -> Optional[Mapping[str,
|
4839
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
4929
4840
|
"""
|
4930
4841
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4931
4842
|
|
@@ -5079,7 +4990,7 @@ class SecretsMountMysqlRd(dict):
|
|
5079
4990
|
allowed_roles: Optional[Sequence[str]] = None,
|
5080
4991
|
auth_type: Optional[str] = None,
|
5081
4992
|
connection_url: Optional[str] = None,
|
5082
|
-
data: Optional[Mapping[str,
|
4993
|
+
data: Optional[Mapping[str, Any]] = None,
|
5083
4994
|
max_connection_lifetime: Optional[int] = None,
|
5084
4995
|
max_idle_connections: Optional[int] = None,
|
5085
4996
|
max_open_connections: Optional[int] = None,
|
@@ -5098,7 +5009,7 @@ class SecretsMountMysqlRd(dict):
|
|
5098
5009
|
connection.
|
5099
5010
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5100
5011
|
:param str connection_url: Connection string to use to connect to the database.
|
5101
|
-
:param Mapping[str,
|
5012
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5102
5013
|
|
5103
5014
|
Supported list of database secrets engines that can be configured:
|
5104
5015
|
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -5184,7 +5095,7 @@ class SecretsMountMysqlRd(dict):
|
|
5184
5095
|
|
5185
5096
|
@property
|
5186
5097
|
@pulumi.getter
|
5187
|
-
def data(self) -> Optional[Mapping[str,
|
5098
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
5188
5099
|
"""
|
5189
5100
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5190
5101
|
|
@@ -5333,7 +5244,7 @@ class SecretsMountOracle(dict):
|
|
5333
5244
|
name: str,
|
5334
5245
|
allowed_roles: Optional[Sequence[str]] = None,
|
5335
5246
|
connection_url: Optional[str] = None,
|
5336
|
-
data: Optional[Mapping[str,
|
5247
|
+
data: Optional[Mapping[str, Any]] = None,
|
5337
5248
|
disconnect_sessions: Optional[bool] = None,
|
5338
5249
|
max_connection_lifetime: Optional[int] = None,
|
5339
5250
|
max_idle_connections: Optional[int] = None,
|
@@ -5350,7 +5261,7 @@ class SecretsMountOracle(dict):
|
|
5350
5261
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
5351
5262
|
connection.
|
5352
5263
|
:param str connection_url: Connection string to use to connect to the database.
|
5353
|
-
:param Mapping[str,
|
5264
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5354
5265
|
|
5355
5266
|
Supported list of database secrets engines that can be configured:
|
5356
5267
|
:param bool disconnect_sessions: Set to true to disconnect any open sessions prior to running the revocation statements.
|
@@ -5423,7 +5334,7 @@ class SecretsMountOracle(dict):
|
|
5423
5334
|
|
5424
5335
|
@property
|
5425
5336
|
@pulumi.getter
|
5426
|
-
def data(self) -> Optional[Mapping[str,
|
5337
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
5427
5338
|
"""
|
5428
5339
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5429
5340
|
|
@@ -5542,18 +5453,10 @@ class SecretsMountPostgresql(dict):
|
|
5542
5453
|
suggest = "max_open_connections"
|
5543
5454
|
elif key == "pluginName":
|
5544
5455
|
suggest = "plugin_name"
|
5545
|
-
elif key == "privateKey":
|
5546
|
-
suggest = "private_key"
|
5547
5456
|
elif key == "rootRotationStatements":
|
5548
5457
|
suggest = "root_rotation_statements"
|
5549
|
-
elif key == "selfManaged":
|
5550
|
-
suggest = "self_managed"
|
5551
5458
|
elif key == "serviceAccountJson":
|
5552
5459
|
suggest = "service_account_json"
|
5553
|
-
elif key == "tlsCa":
|
5554
|
-
suggest = "tls_ca"
|
5555
|
-
elif key == "tlsCertificate":
|
5556
|
-
suggest = "tls_certificate"
|
5557
5460
|
elif key == "usernameTemplate":
|
5558
5461
|
suggest = "username_template"
|
5559
5462
|
elif key == "verifyConnection":
|
@@ -5575,19 +5478,15 @@ class SecretsMountPostgresql(dict):
|
|
5575
5478
|
allowed_roles: Optional[Sequence[str]] = None,
|
5576
5479
|
auth_type: Optional[str] = None,
|
5577
5480
|
connection_url: Optional[str] = None,
|
5578
|
-
data: Optional[Mapping[str,
|
5481
|
+
data: Optional[Mapping[str, Any]] = None,
|
5579
5482
|
disable_escaping: Optional[bool] = None,
|
5580
5483
|
max_connection_lifetime: Optional[int] = None,
|
5581
5484
|
max_idle_connections: Optional[int] = None,
|
5582
5485
|
max_open_connections: Optional[int] = None,
|
5583
5486
|
password: Optional[str] = None,
|
5584
5487
|
plugin_name: Optional[str] = None,
|
5585
|
-
private_key: Optional[str] = None,
|
5586
5488
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
5587
|
-
self_managed: Optional[bool] = None,
|
5588
5489
|
service_account_json: Optional[str] = None,
|
5589
|
-
tls_ca: Optional[str] = None,
|
5590
|
-
tls_certificate: Optional[str] = None,
|
5591
5490
|
username: Optional[str] = None,
|
5592
5491
|
username_template: Optional[str] = None,
|
5593
5492
|
verify_connection: Optional[bool] = None):
|
@@ -5597,7 +5496,7 @@ class SecretsMountPostgresql(dict):
|
|
5597
5496
|
connection.
|
5598
5497
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5599
5498
|
:param str connection_url: Connection string to use to connect to the database.
|
5600
|
-
:param Mapping[str,
|
5499
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5601
5500
|
|
5602
5501
|
Supported list of database secrets engines that can be configured:
|
5603
5502
|
:param bool disable_escaping: Disable special character escaping in username and password
|
@@ -5606,12 +5505,8 @@ class SecretsMountPostgresql(dict):
|
|
5606
5505
|
:param int max_open_connections: Maximum number of open connections to the database.
|
5607
5506
|
:param str password: The root credential password used in the connection URL
|
5608
5507
|
:param str plugin_name: Specifies the name of the plugin to use.
|
5609
|
-
:param str private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
|
5610
5508
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5611
|
-
:param bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
|
5612
5509
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
5613
|
-
:param str tls_ca: The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
5614
|
-
:param str tls_certificate: The x509 client certificate for connecting to the database. Must be PEM encoded.
|
5615
5510
|
:param str username: The root credential username used in the connection URL
|
5616
5511
|
:param str username_template: Username generation template.
|
5617
5512
|
:param bool verify_connection: Whether the connection should be verified on
|
@@ -5638,18 +5533,10 @@ class SecretsMountPostgresql(dict):
|
|
5638
5533
|
pulumi.set(__self__, "password", password)
|
5639
5534
|
if plugin_name is not None:
|
5640
5535
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
5641
|
-
if private_key is not None:
|
5642
|
-
pulumi.set(__self__, "private_key", private_key)
|
5643
5536
|
if root_rotation_statements is not None:
|
5644
5537
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
5645
|
-
if self_managed is not None:
|
5646
|
-
pulumi.set(__self__, "self_managed", self_managed)
|
5647
5538
|
if service_account_json is not None:
|
5648
5539
|
pulumi.set(__self__, "service_account_json", service_account_json)
|
5649
|
-
if tls_ca is not None:
|
5650
|
-
pulumi.set(__self__, "tls_ca", tls_ca)
|
5651
|
-
if tls_certificate is not None:
|
5652
|
-
pulumi.set(__self__, "tls_certificate", tls_certificate)
|
5653
5540
|
if username is not None:
|
5654
5541
|
pulumi.set(__self__, "username", username)
|
5655
5542
|
if username_template is not None:
|
@@ -5692,7 +5579,7 @@ class SecretsMountPostgresql(dict):
|
|
5692
5579
|
|
5693
5580
|
@property
|
5694
5581
|
@pulumi.getter
|
5695
|
-
def data(self) -> Optional[Mapping[str,
|
5582
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
5696
5583
|
"""
|
5697
5584
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5698
5585
|
|
@@ -5748,14 +5635,6 @@ class SecretsMountPostgresql(dict):
|
|
5748
5635
|
"""
|
5749
5636
|
return pulumi.get(self, "plugin_name")
|
5750
5637
|
|
5751
|
-
@property
|
5752
|
-
@pulumi.getter(name="privateKey")
|
5753
|
-
def private_key(self) -> Optional[str]:
|
5754
|
-
"""
|
5755
|
-
The secret key used for the x509 client certificate. Must be PEM encoded.
|
5756
|
-
"""
|
5757
|
-
return pulumi.get(self, "private_key")
|
5758
|
-
|
5759
5638
|
@property
|
5760
5639
|
@pulumi.getter(name="rootRotationStatements")
|
5761
5640
|
def root_rotation_statements(self) -> Optional[Sequence[str]]:
|
@@ -5764,14 +5643,6 @@ class SecretsMountPostgresql(dict):
|
|
5764
5643
|
"""
|
5765
5644
|
return pulumi.get(self, "root_rotation_statements")
|
5766
5645
|
|
5767
|
-
@property
|
5768
|
-
@pulumi.getter(name="selfManaged")
|
5769
|
-
def self_managed(self) -> Optional[bool]:
|
5770
|
-
"""
|
5771
|
-
If set, allows onboarding static roles with a rootless connection configuration.
|
5772
|
-
"""
|
5773
|
-
return pulumi.get(self, "self_managed")
|
5774
|
-
|
5775
5646
|
@property
|
5776
5647
|
@pulumi.getter(name="serviceAccountJson")
|
5777
5648
|
def service_account_json(self) -> Optional[str]:
|
@@ -5780,22 +5651,6 @@ class SecretsMountPostgresql(dict):
|
|
5780
5651
|
"""
|
5781
5652
|
return pulumi.get(self, "service_account_json")
|
5782
5653
|
|
5783
|
-
@property
|
5784
|
-
@pulumi.getter(name="tlsCa")
|
5785
|
-
def tls_ca(self) -> Optional[str]:
|
5786
|
-
"""
|
5787
|
-
The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
5788
|
-
"""
|
5789
|
-
return pulumi.get(self, "tls_ca")
|
5790
|
-
|
5791
|
-
@property
|
5792
|
-
@pulumi.getter(name="tlsCertificate")
|
5793
|
-
def tls_certificate(self) -> Optional[str]:
|
5794
|
-
"""
|
5795
|
-
The x509 client certificate for connecting to the database. Must be PEM encoded.
|
5796
|
-
"""
|
5797
|
-
return pulumi.get(self, "tls_certificate")
|
5798
|
-
|
5799
5654
|
@property
|
5800
5655
|
@pulumi.getter
|
5801
5656
|
def username(self) -> Optional[str]:
|
@@ -5858,7 +5713,7 @@ class SecretsMountRedi(dict):
|
|
5858
5713
|
username: str,
|
5859
5714
|
allowed_roles: Optional[Sequence[str]] = None,
|
5860
5715
|
ca_cert: Optional[str] = None,
|
5861
|
-
data: Optional[Mapping[str,
|
5716
|
+
data: Optional[Mapping[str, Any]] = None,
|
5862
5717
|
insecure_tls: Optional[bool] = None,
|
5863
5718
|
plugin_name: Optional[str] = None,
|
5864
5719
|
port: Optional[int] = None,
|
@@ -5873,7 +5728,7 @@ class SecretsMountRedi(dict):
|
|
5873
5728
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
5874
5729
|
connection.
|
5875
5730
|
:param str ca_cert: The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
|
5876
|
-
:param Mapping[str,
|
5731
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5877
5732
|
|
5878
5733
|
Supported list of database secrets engines that can be configured:
|
5879
5734
|
:param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
|
@@ -5958,7 +5813,7 @@ class SecretsMountRedi(dict):
|
|
5958
5813
|
|
5959
5814
|
@property
|
5960
5815
|
@pulumi.getter
|
5961
|
-
def data(self) -> Optional[Mapping[str,
|
5816
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
5962
5817
|
"""
|
5963
5818
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5964
5819
|
|
@@ -6045,7 +5900,7 @@ class SecretsMountRedisElasticach(dict):
|
|
6045
5900
|
name: str,
|
6046
5901
|
url: str,
|
6047
5902
|
allowed_roles: Optional[Sequence[str]] = None,
|
6048
|
-
data: Optional[Mapping[str,
|
5903
|
+
data: Optional[Mapping[str, Any]] = None,
|
6049
5904
|
password: Optional[str] = None,
|
6050
5905
|
plugin_name: Optional[str] = None,
|
6051
5906
|
region: Optional[str] = None,
|
@@ -6057,7 +5912,7 @@ class SecretsMountRedisElasticach(dict):
|
|
6057
5912
|
:param str url: The configuration endpoint for the ElastiCache cluster to connect to.
|
6058
5913
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
6059
5914
|
connection.
|
6060
|
-
:param Mapping[str,
|
5915
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6061
5916
|
|
6062
5917
|
Supported list of database secrets engines that can be configured:
|
6063
5918
|
:param str password: The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
@@ -6114,7 +5969,7 @@ class SecretsMountRedisElasticach(dict):
|
|
6114
5969
|
|
6115
5970
|
@property
|
6116
5971
|
@pulumi.getter
|
6117
|
-
def data(self) -> Optional[Mapping[str,
|
5972
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
6118
5973
|
"""
|
6119
5974
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6120
5975
|
|
@@ -6213,7 +6068,7 @@ class SecretsMountRedshift(dict):
|
|
6213
6068
|
name: str,
|
6214
6069
|
allowed_roles: Optional[Sequence[str]] = None,
|
6215
6070
|
connection_url: Optional[str] = None,
|
6216
|
-
data: Optional[Mapping[str,
|
6071
|
+
data: Optional[Mapping[str, Any]] = None,
|
6217
6072
|
disable_escaping: Optional[bool] = None,
|
6218
6073
|
max_connection_lifetime: Optional[int] = None,
|
6219
6074
|
max_idle_connections: Optional[int] = None,
|
@@ -6229,7 +6084,7 @@ class SecretsMountRedshift(dict):
|
|
6229
6084
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
6230
6085
|
connection.
|
6231
6086
|
:param str connection_url: Connection string to use to connect to the database.
|
6232
|
-
:param Mapping[str,
|
6087
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6233
6088
|
|
6234
6089
|
Supported list of database secrets engines that can be configured:
|
6235
6090
|
:param bool disable_escaping: Disable special character escaping in username and password
|
@@ -6299,7 +6154,7 @@ class SecretsMountRedshift(dict):
|
|
6299
6154
|
|
6300
6155
|
@property
|
6301
6156
|
@pulumi.getter
|
6302
|
-
def data(self) -> Optional[Mapping[str,
|
6157
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
6303
6158
|
"""
|
6304
6159
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6305
6160
|
|
@@ -6428,7 +6283,7 @@ class SecretsMountSnowflake(dict):
|
|
6428
6283
|
name: str,
|
6429
6284
|
allowed_roles: Optional[Sequence[str]] = None,
|
6430
6285
|
connection_url: Optional[str] = None,
|
6431
|
-
data: Optional[Mapping[str,
|
6286
|
+
data: Optional[Mapping[str, Any]] = None,
|
6432
6287
|
max_connection_lifetime: Optional[int] = None,
|
6433
6288
|
max_idle_connections: Optional[int] = None,
|
6434
6289
|
max_open_connections: Optional[int] = None,
|
@@ -6443,7 +6298,7 @@ class SecretsMountSnowflake(dict):
|
|
6443
6298
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
6444
6299
|
connection.
|
6445
6300
|
:param str connection_url: Connection string to use to connect to the database.
|
6446
|
-
:param Mapping[str,
|
6301
|
+
:param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6447
6302
|
|
6448
6303
|
Supported list of database secrets engines that can be configured:
|
6449
6304
|
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -6510,7 +6365,7 @@ class SecretsMountSnowflake(dict):
|
|
6510
6365
|
|
6511
6366
|
@property
|
6512
6367
|
@pulumi.getter
|
6513
|
-
def data(self) -> Optional[Mapping[str,
|
6368
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
6514
6369
|
"""
|
6515
6370
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6516
6371
|
|