pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +0 -560
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +4 -19
  4. pulumi_vault/ad/secret_backend.py +0 -5
  5. pulumi_vault/ad/secret_library.py +0 -5
  6. pulumi_vault/ad/secret_role.py +0 -5
  7. pulumi_vault/alicloud/auth_backend_role.py +0 -5
  8. pulumi_vault/approle/auth_backend_login.py +0 -5
  9. pulumi_vault/approle/auth_backend_role.py +0 -5
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
  11. pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
  12. pulumi_vault/audit.py +0 -5
  13. pulumi_vault/audit_request_header.py +0 -5
  14. pulumi_vault/auth_backend.py +0 -5
  15. pulumi_vault/aws/auth_backend_cert.py +0 -5
  16. pulumi_vault/aws/auth_backend_client.py +0 -5
  17. pulumi_vault/aws/auth_backend_config_identity.py +0 -5
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
  19. pulumi_vault/aws/auth_backend_login.py +7 -12
  20. pulumi_vault/aws/auth_backend_role.py +0 -5
  21. pulumi_vault/aws/auth_backend_role_tag.py +0 -5
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
  23. pulumi_vault/aws/auth_backend_sts_role.py +0 -5
  24. pulumi_vault/aws/get_access_credentials.py +4 -31
  25. pulumi_vault/aws/get_static_access_credentials.py +4 -18
  26. pulumi_vault/aws/secret_backend.py +0 -5
  27. pulumi_vault/aws/secret_backend_role.py +0 -5
  28. pulumi_vault/aws/secret_backend_static_role.py +0 -5
  29. pulumi_vault/azure/_inputs.py +0 -24
  30. pulumi_vault/azure/auth_backend_config.py +0 -5
  31. pulumi_vault/azure/auth_backend_role.py +0 -5
  32. pulumi_vault/azure/backend.py +0 -5
  33. pulumi_vault/azure/backend_role.py +0 -5
  34. pulumi_vault/azure/get_access_credentials.py +4 -36
  35. pulumi_vault/azure/outputs.py +0 -5
  36. pulumi_vault/cert_auth_backend_role.py +0 -5
  37. pulumi_vault/config/__init__.pyi +0 -5
  38. pulumi_vault/config/_inputs.py +0 -21
  39. pulumi_vault/config/outputs.py +0 -5
  40. pulumi_vault/config/ui_custom_message.py +14 -19
  41. pulumi_vault/config/vars.py +0 -5
  42. pulumi_vault/consul/secret_backend.py +0 -5
  43. pulumi_vault/consul/secret_backend_role.py +0 -5
  44. pulumi_vault/database/_inputs.py +105 -2256
  45. pulumi_vault/database/outputs.py +54 -199
  46. pulumi_vault/database/secret_backend_connection.py +14 -19
  47. pulumi_vault/database/secret_backend_role.py +14 -19
  48. pulumi_vault/database/secret_backend_static_role.py +1 -69
  49. pulumi_vault/database/secrets_mount.py +14 -19
  50. pulumi_vault/egp_policy.py +0 -5
  51. pulumi_vault/gcp/_inputs.py +0 -111
  52. pulumi_vault/gcp/auth_backend.py +0 -5
  53. pulumi_vault/gcp/auth_backend_role.py +0 -5
  54. pulumi_vault/gcp/get_auth_backend_role.py +4 -42
  55. pulumi_vault/gcp/outputs.py +0 -5
  56. pulumi_vault/gcp/secret_backend.py +0 -5
  57. pulumi_vault/gcp/secret_impersonated_account.py +3 -62
  58. pulumi_vault/gcp/secret_roleset.py +0 -5
  59. pulumi_vault/gcp/secret_static_account.py +0 -5
  60. pulumi_vault/generic/endpoint.py +0 -5
  61. pulumi_vault/generic/get_secret.py +5 -25
  62. pulumi_vault/generic/secret.py +7 -12
  63. pulumi_vault/get_auth_backend.py +4 -21
  64. pulumi_vault/get_auth_backends.py +4 -16
  65. pulumi_vault/get_namespace.py +5 -18
  66. pulumi_vault/get_namespaces.py +4 -13
  67. pulumi_vault/get_nomad_access_token.py +8 -28
  68. pulumi_vault/get_policy_document.py +4 -15
  69. pulumi_vault/get_raft_autopilot_state.py +7 -26
  70. pulumi_vault/github/_inputs.py +0 -55
  71. pulumi_vault/github/auth_backend.py +0 -5
  72. pulumi_vault/github/outputs.py +0 -5
  73. pulumi_vault/github/team.py +0 -5
  74. pulumi_vault/github/user.py +0 -5
  75. pulumi_vault/identity/entity.py +0 -5
  76. pulumi_vault/identity/entity_alias.py +0 -5
  77. pulumi_vault/identity/entity_policies.py +0 -5
  78. pulumi_vault/identity/get_entity.py +5 -35
  79. pulumi_vault/identity/get_group.py +6 -42
  80. pulumi_vault/identity/get_oidc_client_creds.py +4 -16
  81. pulumi_vault/identity/get_oidc_openid_config.py +4 -26
  82. pulumi_vault/identity/get_oidc_public_keys.py +5 -16
  83. pulumi_vault/identity/group.py +0 -5
  84. pulumi_vault/identity/group_alias.py +0 -5
  85. pulumi_vault/identity/group_member_entity_ids.py +0 -5
  86. pulumi_vault/identity/group_member_group_ids.py +0 -5
  87. pulumi_vault/identity/group_policies.py +0 -5
  88. pulumi_vault/identity/mfa_duo.py +0 -5
  89. pulumi_vault/identity/mfa_login_enforcement.py +0 -5
  90. pulumi_vault/identity/mfa_okta.py +0 -5
  91. pulumi_vault/identity/mfa_pingid.py +0 -5
  92. pulumi_vault/identity/mfa_totp.py +0 -5
  93. pulumi_vault/identity/oidc.py +0 -5
  94. pulumi_vault/identity/oidc_assignment.py +0 -5
  95. pulumi_vault/identity/oidc_client.py +0 -5
  96. pulumi_vault/identity/oidc_key.py +0 -5
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
  98. pulumi_vault/identity/oidc_provider.py +0 -5
  99. pulumi_vault/identity/oidc_role.py +0 -5
  100. pulumi_vault/identity/oidc_scope.py +0 -5
  101. pulumi_vault/identity/outputs.py +3 -8
  102. pulumi_vault/jwt/_inputs.py +0 -55
  103. pulumi_vault/jwt/auth_backend.py +0 -5
  104. pulumi_vault/jwt/auth_backend_role.py +28 -33
  105. pulumi_vault/jwt/outputs.py +0 -5
  106. pulumi_vault/kmip/secret_backend.py +0 -5
  107. pulumi_vault/kmip/secret_role.py +0 -5
  108. pulumi_vault/kmip/secret_scope.py +0 -5
  109. pulumi_vault/kubernetes/auth_backend_config.py +3 -55
  110. pulumi_vault/kubernetes/auth_backend_role.py +0 -5
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
  113. pulumi_vault/kubernetes/get_service_account_token.py +4 -28
  114. pulumi_vault/kubernetes/secret_backend.py +14 -19
  115. pulumi_vault/kubernetes/secret_backend_role.py +0 -5
  116. pulumi_vault/kv/_inputs.py +4 -36
  117. pulumi_vault/kv/get_secret.py +5 -20
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
  119. pulumi_vault/kv/get_secret_v2.py +8 -27
  120. pulumi_vault/kv/get_secrets_list.py +4 -15
  121. pulumi_vault/kv/get_secrets_list_v2.py +4 -18
  122. pulumi_vault/kv/outputs.py +3 -8
  123. pulumi_vault/kv/secret.py +7 -12
  124. pulumi_vault/kv/secret_backend_v2.py +0 -5
  125. pulumi_vault/kv/secret_v2.py +28 -33
  126. pulumi_vault/ldap/auth_backend.py +0 -52
  127. pulumi_vault/ldap/auth_backend_group.py +0 -5
  128. pulumi_vault/ldap/auth_backend_user.py +0 -5
  129. pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
  130. pulumi_vault/ldap/get_static_credentials.py +4 -23
  131. pulumi_vault/ldap/secret_backend.py +14 -19
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
  133. pulumi_vault/ldap/secret_backend_library_set.py +0 -5
  134. pulumi_vault/ldap/secret_backend_static_role.py +0 -5
  135. pulumi_vault/managed/_inputs.py +0 -205
  136. pulumi_vault/managed/keys.py +0 -5
  137. pulumi_vault/managed/outputs.py +0 -5
  138. pulumi_vault/mfa_duo.py +0 -5
  139. pulumi_vault/mfa_okta.py +0 -5
  140. pulumi_vault/mfa_pingid.py +0 -5
  141. pulumi_vault/mfa_totp.py +0 -5
  142. pulumi_vault/mongodbatlas/secret_backend.py +0 -5
  143. pulumi_vault/mongodbatlas/secret_role.py +0 -5
  144. pulumi_vault/mount.py +16 -21
  145. pulumi_vault/namespace.py +14 -19
  146. pulumi_vault/nomad_secret_backend.py +0 -5
  147. pulumi_vault/nomad_secret_role.py +0 -5
  148. pulumi_vault/okta/_inputs.py +0 -39
  149. pulumi_vault/okta/auth_backend.py +0 -5
  150. pulumi_vault/okta/auth_backend_group.py +0 -5
  151. pulumi_vault/okta/auth_backend_user.py +0 -5
  152. pulumi_vault/okta/outputs.py +0 -5
  153. pulumi_vault/outputs.py +0 -5
  154. pulumi_vault/password_policy.py +0 -5
  155. pulumi_vault/pkisecret/_inputs.py +8 -49
  156. pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
  157. pulumi_vault/pkisecret/backend_config_est.py +14 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
  159. pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
  160. pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
  161. pulumi_vault/pkisecret/get_backend_key.py +4 -19
  162. pulumi_vault/pkisecret/get_backend_keys.py +5 -18
  163. pulumi_vault/pkisecret/outputs.py +12 -17
  164. pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
  172. pulumi_vault/pkisecret/secret_backend_key.py +0 -5
  173. pulumi_vault/pkisecret/secret_backend_role.py +0 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
  176. pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
  177. pulumi_vault/plugin.py +0 -5
  178. pulumi_vault/plugin_pinned_version.py +0 -5
  179. pulumi_vault/policy.py +0 -5
  180. pulumi_vault/provider.py +0 -5
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +0 -5
  183. pulumi_vault/quota_rate_limit.py +0 -5
  184. pulumi_vault/rabbitmq/_inputs.py +0 -61
  185. pulumi_vault/rabbitmq/outputs.py +0 -5
  186. pulumi_vault/rabbitmq/secret_backend.py +0 -5
  187. pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
  188. pulumi_vault/raft_autopilot.py +0 -5
  189. pulumi_vault/raft_snapshot_agent_config.py +0 -5
  190. pulumi_vault/rgp_policy.py +0 -5
  191. pulumi_vault/saml/auth_backend.py +0 -5
  192. pulumi_vault/saml/auth_backend_role.py +14 -19
  193. pulumi_vault/secrets/_inputs.py +0 -30
  194. pulumi_vault/secrets/outputs.py +0 -5
  195. pulumi_vault/secrets/sync_association.py +0 -5
  196. pulumi_vault/secrets/sync_aws_destination.py +14 -19
  197. pulumi_vault/secrets/sync_azure_destination.py +14 -19
  198. pulumi_vault/secrets/sync_config.py +0 -5
  199. pulumi_vault/secrets/sync_gcp_destination.py +14 -19
  200. pulumi_vault/secrets/sync_gh_destination.py +0 -5
  201. pulumi_vault/secrets/sync_github_apps.py +0 -5
  202. pulumi_vault/secrets/sync_vercel_destination.py +0 -5
  203. pulumi_vault/ssh/_inputs.py +0 -22
  204. pulumi_vault/ssh/outputs.py +0 -5
  205. pulumi_vault/ssh/secret_backend_ca.py +0 -5
  206. pulumi_vault/ssh/secret_backend_role.py +28 -67
  207. pulumi_vault/terraformcloud/secret_backend.py +0 -5
  208. pulumi_vault/terraformcloud/secret_creds.py +0 -5
  209. pulumi_vault/terraformcloud/secret_role.py +0 -5
  210. pulumi_vault/token.py +0 -5
  211. pulumi_vault/tokenauth/auth_backend_role.py +14 -5
  212. pulumi_vault/transform/alphabet.py +0 -5
  213. pulumi_vault/transform/get_decode.py +14 -38
  214. pulumi_vault/transform/get_encode.py +14 -38
  215. pulumi_vault/transform/role.py +0 -5
  216. pulumi_vault/transform/template.py +14 -19
  217. pulumi_vault/transform/transformation.py +0 -5
  218. pulumi_vault/transit/get_decrypt.py +4 -21
  219. pulumi_vault/transit/get_encrypt.py +4 -23
  220. pulumi_vault/transit/secret_backend_key.py +7 -12
  221. pulumi_vault/transit/secret_cache_config.py +0 -5
  222. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
  223. pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.4.0.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -68,8 +63,6 @@ class SecretBackendConnectionCassandra(dict):
68
63
  suggest = "pem_json"
69
64
  elif key == "protocolVersion":
70
65
  suggest = "protocol_version"
71
- elif key == "skipVerification":
72
- suggest = "skip_verification"
73
66
 
74
67
  if suggest:
75
68
  pulumi.log.warn(f"Key '{key}' not found in SecretBackendConnectionCassandra. Access the value via the '{suggest}' property getter instead.")
@@ -91,7 +84,6 @@ class SecretBackendConnectionCassandra(dict):
91
84
  pem_json: Optional[str] = None,
92
85
  port: Optional[int] = None,
93
86
  protocol_version: Optional[int] = None,
94
- skip_verification: Optional[bool] = None,
95
87
  tls: Optional[bool] = None,
96
88
  username: Optional[str] = None):
97
89
  """
@@ -103,7 +95,6 @@ class SecretBackendConnectionCassandra(dict):
103
95
  :param str pem_json: Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
104
96
  :param int port: The transport port to use to connect to Cassandra.
105
97
  :param int protocol_version: The CQL protocol version to use.
106
- :param bool skip_verification: Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
107
98
  :param bool tls: Whether to use TLS when connecting to Cassandra.
108
99
  :param str username: The username to use when authenticating with Cassandra.
109
100
  """
@@ -123,8 +114,6 @@ class SecretBackendConnectionCassandra(dict):
123
114
  pulumi.set(__self__, "port", port)
124
115
  if protocol_version is not None:
125
116
  pulumi.set(__self__, "protocol_version", protocol_version)
126
- if skip_verification is not None:
127
- pulumi.set(__self__, "skip_verification", skip_verification)
128
117
  if tls is not None:
129
118
  pulumi.set(__self__, "tls", tls)
130
119
  if username is not None:
@@ -194,14 +183,6 @@ class SecretBackendConnectionCassandra(dict):
194
183
  """
195
184
  return pulumi.get(self, "protocol_version")
196
185
 
197
- @property
198
- @pulumi.getter(name="skipVerification")
199
- def skip_verification(self) -> Optional[bool]:
200
- """
201
- Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
202
- """
203
- return pulumi.get(self, "skip_verification")
204
-
205
186
  @property
206
187
  @pulumi.getter
207
188
  def tls(self) -> Optional[bool]:
@@ -1928,16 +1909,8 @@ class SecretBackendConnectionPostgresql(dict):
1928
1909
  suggest = "max_idle_connections"
1929
1910
  elif key == "maxOpenConnections":
1930
1911
  suggest = "max_open_connections"
1931
- elif key == "privateKey":
1932
- suggest = "private_key"
1933
- elif key == "selfManaged":
1934
- suggest = "self_managed"
1935
1912
  elif key == "serviceAccountJson":
1936
1913
  suggest = "service_account_json"
1937
- elif key == "tlsCa":
1938
- suggest = "tls_ca"
1939
- elif key == "tlsCertificate":
1940
- suggest = "tls_certificate"
1941
1914
  elif key == "usernameTemplate":
1942
1915
  suggest = "username_template"
1943
1916
 
@@ -1960,11 +1933,7 @@ class SecretBackendConnectionPostgresql(dict):
1960
1933
  max_idle_connections: Optional[int] = None,
1961
1934
  max_open_connections: Optional[int] = None,
1962
1935
  password: Optional[str] = None,
1963
- private_key: Optional[str] = None,
1964
- self_managed: Optional[bool] = None,
1965
1936
  service_account_json: Optional[str] = None,
1966
- tls_ca: Optional[str] = None,
1967
- tls_certificate: Optional[str] = None,
1968
1937
  username: Optional[str] = None,
1969
1938
  username_template: Optional[str] = None):
1970
1939
  """
@@ -1975,11 +1944,7 @@ class SecretBackendConnectionPostgresql(dict):
1975
1944
  :param int max_idle_connections: Maximum number of idle connections to the database.
1976
1945
  :param int max_open_connections: Maximum number of open connections to the database.
1977
1946
  :param str password: The root credential password used in the connection URL
1978
- :param str private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
1979
- :param bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
1980
1947
  :param str service_account_json: A JSON encoded credential for use with IAM authorization
1981
- :param str tls_ca: The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
1982
- :param str tls_certificate: The x509 client certificate for connecting to the database. Must be PEM encoded.
1983
1948
  :param str username: The root credential username used in the connection URL
1984
1949
  :param str username_template: Username generation template.
1985
1950
  """
@@ -1997,16 +1962,8 @@ class SecretBackendConnectionPostgresql(dict):
1997
1962
  pulumi.set(__self__, "max_open_connections", max_open_connections)
1998
1963
  if password is not None:
1999
1964
  pulumi.set(__self__, "password", password)
2000
- if private_key is not None:
2001
- pulumi.set(__self__, "private_key", private_key)
2002
- if self_managed is not None:
2003
- pulumi.set(__self__, "self_managed", self_managed)
2004
1965
  if service_account_json is not None:
2005
1966
  pulumi.set(__self__, "service_account_json", service_account_json)
2006
- if tls_ca is not None:
2007
- pulumi.set(__self__, "tls_ca", tls_ca)
2008
- if tls_certificate is not None:
2009
- pulumi.set(__self__, "tls_certificate", tls_certificate)
2010
1967
  if username is not None:
2011
1968
  pulumi.set(__self__, "username", username)
2012
1969
  if username_template is not None:
@@ -2068,22 +2025,6 @@ class SecretBackendConnectionPostgresql(dict):
2068
2025
  """
2069
2026
  return pulumi.get(self, "password")
2070
2027
 
2071
- @property
2072
- @pulumi.getter(name="privateKey")
2073
- def private_key(self) -> Optional[str]:
2074
- """
2075
- The secret key used for the x509 client certificate. Must be PEM encoded.
2076
- """
2077
- return pulumi.get(self, "private_key")
2078
-
2079
- @property
2080
- @pulumi.getter(name="selfManaged")
2081
- def self_managed(self) -> Optional[bool]:
2082
- """
2083
- If set, allows onboarding static roles with a rootless connection configuration.
2084
- """
2085
- return pulumi.get(self, "self_managed")
2086
-
2087
2028
  @property
2088
2029
  @pulumi.getter(name="serviceAccountJson")
2089
2030
  def service_account_json(self) -> Optional[str]:
@@ -2092,22 +2033,6 @@ class SecretBackendConnectionPostgresql(dict):
2092
2033
  """
2093
2034
  return pulumi.get(self, "service_account_json")
2094
2035
 
2095
- @property
2096
- @pulumi.getter(name="tlsCa")
2097
- def tls_ca(self) -> Optional[str]:
2098
- """
2099
- The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
2100
- """
2101
- return pulumi.get(self, "tls_ca")
2102
-
2103
- @property
2104
- @pulumi.getter(name="tlsCertificate")
2105
- def tls_certificate(self) -> Optional[str]:
2106
- """
2107
- The x509 client certificate for connecting to the database. Must be PEM encoded.
2108
- """
2109
- return pulumi.get(self, "tls_certificate")
2110
-
2111
2036
  @property
2112
2037
  @pulumi.getter
2113
2038
  def username(self) -> Optional[str]:
@@ -2553,8 +2478,6 @@ class SecretsMountCassandra(dict):
2553
2478
  suggest = "protocol_version"
2554
2479
  elif key == "rootRotationStatements":
2555
2480
  suggest = "root_rotation_statements"
2556
- elif key == "skipVerification":
2557
- suggest = "skip_verification"
2558
2481
  elif key == "verifyConnection":
2559
2482
  suggest = "verify_connection"
2560
2483
 
@@ -2573,7 +2496,7 @@ class SecretsMountCassandra(dict):
2573
2496
  name: str,
2574
2497
  allowed_roles: Optional[Sequence[str]] = None,
2575
2498
  connect_timeout: Optional[int] = None,
2576
- data: Optional[Mapping[str, str]] = None,
2499
+ data: Optional[Mapping[str, Any]] = None,
2577
2500
  hosts: Optional[Sequence[str]] = None,
2578
2501
  insecure_tls: Optional[bool] = None,
2579
2502
  password: Optional[str] = None,
@@ -2583,7 +2506,6 @@ class SecretsMountCassandra(dict):
2583
2506
  port: Optional[int] = None,
2584
2507
  protocol_version: Optional[int] = None,
2585
2508
  root_rotation_statements: Optional[Sequence[str]] = None,
2586
- skip_verification: Optional[bool] = None,
2587
2509
  tls: Optional[bool] = None,
2588
2510
  username: Optional[str] = None,
2589
2511
  verify_connection: Optional[bool] = None):
@@ -2592,7 +2514,7 @@ class SecretsMountCassandra(dict):
2592
2514
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
2593
2515
  connection.
2594
2516
  :param int connect_timeout: The number of seconds to use as a connection timeout.
2595
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2517
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2596
2518
 
2597
2519
  Supported list of database secrets engines that can be configured:
2598
2520
  :param Sequence[str] hosts: Cassandra hosts to connect to.
@@ -2604,7 +2526,6 @@ class SecretsMountCassandra(dict):
2604
2526
  :param int port: The transport port to use to connect to Cassandra.
2605
2527
  :param int protocol_version: The CQL protocol version to use.
2606
2528
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
2607
- :param bool skip_verification: Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
2608
2529
  :param bool tls: Whether to use TLS when connecting to Cassandra.
2609
2530
  :param str username: The username to use when authenticating with Cassandra.
2610
2531
  :param bool verify_connection: Whether the connection should be verified on
@@ -2635,8 +2556,6 @@ class SecretsMountCassandra(dict):
2635
2556
  pulumi.set(__self__, "protocol_version", protocol_version)
2636
2557
  if root_rotation_statements is not None:
2637
2558
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
2638
- if skip_verification is not None:
2639
- pulumi.set(__self__, "skip_verification", skip_verification)
2640
2559
  if tls is not None:
2641
2560
  pulumi.set(__self__, "tls", tls)
2642
2561
  if username is not None:
@@ -2671,7 +2590,7 @@ class SecretsMountCassandra(dict):
2671
2590
 
2672
2591
  @property
2673
2592
  @pulumi.getter
2674
- def data(self) -> Optional[Mapping[str, str]]:
2593
+ def data(self) -> Optional[Mapping[str, Any]]:
2675
2594
  """
2676
2595
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2677
2596
 
@@ -2751,14 +2670,6 @@ class SecretsMountCassandra(dict):
2751
2670
  """
2752
2671
  return pulumi.get(self, "root_rotation_statements")
2753
2672
 
2754
- @property
2755
- @pulumi.getter(name="skipVerification")
2756
- def skip_verification(self) -> Optional[bool]:
2757
- """
2758
- Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
2759
- """
2760
- return pulumi.get(self, "skip_verification")
2761
-
2762
2673
  @property
2763
2674
  @pulumi.getter
2764
2675
  def tls(self) -> Optional[bool]:
@@ -2826,7 +2737,7 @@ class SecretsMountCouchbase(dict):
2826
2737
  allowed_roles: Optional[Sequence[str]] = None,
2827
2738
  base64_pem: Optional[str] = None,
2828
2739
  bucket_name: Optional[str] = None,
2829
- data: Optional[Mapping[str, str]] = None,
2740
+ data: Optional[Mapping[str, Any]] = None,
2830
2741
  insecure_tls: Optional[bool] = None,
2831
2742
  plugin_name: Optional[str] = None,
2832
2743
  root_rotation_statements: Optional[Sequence[str]] = None,
@@ -2842,7 +2753,7 @@ class SecretsMountCouchbase(dict):
2842
2753
  connection.
2843
2754
  :param str base64_pem: Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
2844
2755
  :param str bucket_name: Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
2845
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2756
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2846
2757
 
2847
2758
  Supported list of database secrets engines that can be configured:
2848
2759
  :param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
@@ -2937,7 +2848,7 @@ class SecretsMountCouchbase(dict):
2937
2848
 
2938
2849
  @property
2939
2850
  @pulumi.getter
2940
- def data(self) -> Optional[Mapping[str, str]]:
2851
+ def data(self) -> Optional[Mapping[str, Any]]:
2941
2852
  """
2942
2853
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2943
2854
 
@@ -3042,7 +2953,7 @@ class SecretsMountElasticsearch(dict):
3042
2953
  ca_path: Optional[str] = None,
3043
2954
  client_cert: Optional[str] = None,
3044
2955
  client_key: Optional[str] = None,
3045
- data: Optional[Mapping[str, str]] = None,
2956
+ data: Optional[Mapping[str, Any]] = None,
3046
2957
  insecure: Optional[bool] = None,
3047
2958
  plugin_name: Optional[str] = None,
3048
2959
  root_rotation_statements: Optional[Sequence[str]] = None,
@@ -3060,7 +2971,7 @@ class SecretsMountElasticsearch(dict):
3060
2971
  :param str ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
3061
2972
  :param str client_cert: The path to the certificate for the Elasticsearch client to present for communication
3062
2973
  :param str client_key: The path to the key for the Elasticsearch client to use for communication
3063
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2974
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3064
2975
 
3065
2976
  Supported list of database secrets engines that can be configured:
3066
2977
  :param bool insecure: Whether to disable certificate verification
@@ -3175,7 +3086,7 @@ class SecretsMountElasticsearch(dict):
3175
3086
 
3176
3087
  @property
3177
3088
  @pulumi.getter
3178
- def data(self) -> Optional[Mapping[str, str]]:
3089
+ def data(self) -> Optional[Mapping[str, Any]]:
3179
3090
  """
3180
3091
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3181
3092
 
@@ -3272,7 +3183,7 @@ class SecretsMountHana(dict):
3272
3183
  name: str,
3273
3184
  allowed_roles: Optional[Sequence[str]] = None,
3274
3185
  connection_url: Optional[str] = None,
3275
- data: Optional[Mapping[str, str]] = None,
3186
+ data: Optional[Mapping[str, Any]] = None,
3276
3187
  disable_escaping: Optional[bool] = None,
3277
3188
  max_connection_lifetime: Optional[int] = None,
3278
3189
  max_idle_connections: Optional[int] = None,
@@ -3287,7 +3198,7 @@ class SecretsMountHana(dict):
3287
3198
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
3288
3199
  connection.
3289
3200
  :param str connection_url: Connection string to use to connect to the database.
3290
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3201
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3291
3202
 
3292
3203
  Supported list of database secrets engines that can be configured:
3293
3204
  :param bool disable_escaping: Disable special character escaping in username and password
@@ -3354,7 +3265,7 @@ class SecretsMountHana(dict):
3354
3265
 
3355
3266
  @property
3356
3267
  @pulumi.getter
3357
- def data(self) -> Optional[Mapping[str, str]]:
3268
+ def data(self) -> Optional[Mapping[str, Any]]:
3358
3269
  """
3359
3270
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3360
3271
 
@@ -3478,7 +3389,7 @@ class SecretsMountInfluxdb(dict):
3478
3389
  username: str,
3479
3390
  allowed_roles: Optional[Sequence[str]] = None,
3480
3391
  connect_timeout: Optional[int] = None,
3481
- data: Optional[Mapping[str, str]] = None,
3392
+ data: Optional[Mapping[str, Any]] = None,
3482
3393
  insecure_tls: Optional[bool] = None,
3483
3394
  pem_bundle: Optional[str] = None,
3484
3395
  pem_json: Optional[str] = None,
@@ -3496,7 +3407,7 @@ class SecretsMountInfluxdb(dict):
3496
3407
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
3497
3408
  connection.
3498
3409
  :param int connect_timeout: The number of seconds to use as a connection timeout.
3499
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3410
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3500
3411
 
3501
3412
  Supported list of database secrets engines that can be configured:
3502
3413
  :param bool insecure_tls: Whether to skip verification of the server certificate when using TLS.
@@ -3590,7 +3501,7 @@ class SecretsMountInfluxdb(dict):
3590
3501
 
3591
3502
  @property
3592
3503
  @pulumi.getter
3593
- def data(self) -> Optional[Mapping[str, str]]:
3504
+ def data(self) -> Optional[Mapping[str, Any]]:
3594
3505
  """
3595
3506
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3596
3507
 
@@ -3711,7 +3622,7 @@ class SecretsMountMongodb(dict):
3711
3622
  name: str,
3712
3623
  allowed_roles: Optional[Sequence[str]] = None,
3713
3624
  connection_url: Optional[str] = None,
3714
- data: Optional[Mapping[str, str]] = None,
3625
+ data: Optional[Mapping[str, Any]] = None,
3715
3626
  max_connection_lifetime: Optional[int] = None,
3716
3627
  max_idle_connections: Optional[int] = None,
3717
3628
  max_open_connections: Optional[int] = None,
@@ -3726,7 +3637,7 @@ class SecretsMountMongodb(dict):
3726
3637
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
3727
3638
  connection.
3728
3639
  :param str connection_url: Connection string to use to connect to the database.
3729
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3640
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3730
3641
 
3731
3642
  Supported list of database secrets engines that can be configured:
3732
3643
  :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
@@ -3793,7 +3704,7 @@ class SecretsMountMongodb(dict):
3793
3704
 
3794
3705
  @property
3795
3706
  @pulumi.getter
3796
- def data(self) -> Optional[Mapping[str, str]]:
3707
+ def data(self) -> Optional[Mapping[str, Any]]:
3797
3708
  """
3798
3709
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3799
3710
 
@@ -3912,7 +3823,7 @@ class SecretsMountMongodbatla(dict):
3912
3823
  project_id: str,
3913
3824
  public_key: str,
3914
3825
  allowed_roles: Optional[Sequence[str]] = None,
3915
- data: Optional[Mapping[str, str]] = None,
3826
+ data: Optional[Mapping[str, Any]] = None,
3916
3827
  plugin_name: Optional[str] = None,
3917
3828
  root_rotation_statements: Optional[Sequence[str]] = None,
3918
3829
  verify_connection: Optional[bool] = None):
@@ -3923,7 +3834,7 @@ class SecretsMountMongodbatla(dict):
3923
3834
  :param str public_key: The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
3924
3835
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
3925
3836
  connection.
3926
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3837
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3927
3838
 
3928
3839
  Supported list of database secrets engines that can be configured:
3929
3840
  :param str plugin_name: Specifies the name of the plugin to use.
@@ -3989,7 +3900,7 @@ class SecretsMountMongodbatla(dict):
3989
3900
 
3990
3901
  @property
3991
3902
  @pulumi.getter
3992
- def data(self) -> Optional[Mapping[str, str]]:
3903
+ def data(self) -> Optional[Mapping[str, Any]]:
3993
3904
  """
3994
3905
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3995
3906
 
@@ -4067,7 +3978,7 @@ class SecretsMountMssql(dict):
4067
3978
  allowed_roles: Optional[Sequence[str]] = None,
4068
3979
  connection_url: Optional[str] = None,
4069
3980
  contained_db: Optional[bool] = None,
4070
- data: Optional[Mapping[str, str]] = None,
3981
+ data: Optional[Mapping[str, Any]] = None,
4071
3982
  disable_escaping: Optional[bool] = None,
4072
3983
  max_connection_lifetime: Optional[int] = None,
4073
3984
  max_idle_connections: Optional[int] = None,
@@ -4084,7 +3995,7 @@ class SecretsMountMssql(dict):
4084
3995
  connection.
4085
3996
  :param str connection_url: Connection string to use to connect to the database.
4086
3997
  :param bool contained_db: Set to true when the target is a Contained Database, e.g. AzureSQL.
4087
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3998
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4088
3999
 
4089
4000
  Supported list of database secrets engines that can be configured:
4090
4001
  :param bool disable_escaping: Disable special character escaping in username and password
@@ -4164,7 +4075,7 @@ class SecretsMountMssql(dict):
4164
4075
 
4165
4076
  @property
4166
4077
  @pulumi.getter
4167
- def data(self) -> Optional[Mapping[str, str]]:
4078
+ def data(self) -> Optional[Mapping[str, Any]]:
4168
4079
  """
4169
4080
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4170
4081
 
@@ -4302,7 +4213,7 @@ class SecretsMountMysql(dict):
4302
4213
  allowed_roles: Optional[Sequence[str]] = None,
4303
4214
  auth_type: Optional[str] = None,
4304
4215
  connection_url: Optional[str] = None,
4305
- data: Optional[Mapping[str, str]] = None,
4216
+ data: Optional[Mapping[str, Any]] = None,
4306
4217
  max_connection_lifetime: Optional[int] = None,
4307
4218
  max_idle_connections: Optional[int] = None,
4308
4219
  max_open_connections: Optional[int] = None,
@@ -4321,7 +4232,7 @@ class SecretsMountMysql(dict):
4321
4232
  connection.
4322
4233
  :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
4323
4234
  :param str connection_url: Connection string to use to connect to the database.
4324
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4235
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4325
4236
 
4326
4237
  Supported list of database secrets engines that can be configured:
4327
4238
  :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
@@ -4407,7 +4318,7 @@ class SecretsMountMysql(dict):
4407
4318
 
4408
4319
  @property
4409
4320
  @pulumi.getter
4410
- def data(self) -> Optional[Mapping[str, str]]:
4321
+ def data(self) -> Optional[Mapping[str, Any]]:
4411
4322
  """
4412
4323
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4413
4324
 
@@ -4561,7 +4472,7 @@ class SecretsMountMysqlAurora(dict):
4561
4472
  allowed_roles: Optional[Sequence[str]] = None,
4562
4473
  auth_type: Optional[str] = None,
4563
4474
  connection_url: Optional[str] = None,
4564
- data: Optional[Mapping[str, str]] = None,
4475
+ data: Optional[Mapping[str, Any]] = None,
4565
4476
  max_connection_lifetime: Optional[int] = None,
4566
4477
  max_idle_connections: Optional[int] = None,
4567
4478
  max_open_connections: Optional[int] = None,
@@ -4580,7 +4491,7 @@ class SecretsMountMysqlAurora(dict):
4580
4491
  connection.
4581
4492
  :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
4582
4493
  :param str connection_url: Connection string to use to connect to the database.
4583
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4494
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4584
4495
 
4585
4496
  Supported list of database secrets engines that can be configured:
4586
4497
  :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
@@ -4666,7 +4577,7 @@ class SecretsMountMysqlAurora(dict):
4666
4577
 
4667
4578
  @property
4668
4579
  @pulumi.getter
4669
- def data(self) -> Optional[Mapping[str, str]]:
4580
+ def data(self) -> Optional[Mapping[str, Any]]:
4670
4581
  """
4671
4582
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4672
4583
 
@@ -4820,7 +4731,7 @@ class SecretsMountMysqlLegacy(dict):
4820
4731
  allowed_roles: Optional[Sequence[str]] = None,
4821
4732
  auth_type: Optional[str] = None,
4822
4733
  connection_url: Optional[str] = None,
4823
- data: Optional[Mapping[str, str]] = None,
4734
+ data: Optional[Mapping[str, Any]] = None,
4824
4735
  max_connection_lifetime: Optional[int] = None,
4825
4736
  max_idle_connections: Optional[int] = None,
4826
4737
  max_open_connections: Optional[int] = None,
@@ -4839,7 +4750,7 @@ class SecretsMountMysqlLegacy(dict):
4839
4750
  connection.
4840
4751
  :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
4841
4752
  :param str connection_url: Connection string to use to connect to the database.
4842
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4753
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4843
4754
 
4844
4755
  Supported list of database secrets engines that can be configured:
4845
4756
  :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
@@ -4925,7 +4836,7 @@ class SecretsMountMysqlLegacy(dict):
4925
4836
 
4926
4837
  @property
4927
4838
  @pulumi.getter
4928
- def data(self) -> Optional[Mapping[str, str]]:
4839
+ def data(self) -> Optional[Mapping[str, Any]]:
4929
4840
  """
4930
4841
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4931
4842
 
@@ -5079,7 +4990,7 @@ class SecretsMountMysqlRd(dict):
5079
4990
  allowed_roles: Optional[Sequence[str]] = None,
5080
4991
  auth_type: Optional[str] = None,
5081
4992
  connection_url: Optional[str] = None,
5082
- data: Optional[Mapping[str, str]] = None,
4993
+ data: Optional[Mapping[str, Any]] = None,
5083
4994
  max_connection_lifetime: Optional[int] = None,
5084
4995
  max_idle_connections: Optional[int] = None,
5085
4996
  max_open_connections: Optional[int] = None,
@@ -5098,7 +5009,7 @@ class SecretsMountMysqlRd(dict):
5098
5009
  connection.
5099
5010
  :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
5100
5011
  :param str connection_url: Connection string to use to connect to the database.
5101
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5012
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5102
5013
 
5103
5014
  Supported list of database secrets engines that can be configured:
5104
5015
  :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
@@ -5184,7 +5095,7 @@ class SecretsMountMysqlRd(dict):
5184
5095
 
5185
5096
  @property
5186
5097
  @pulumi.getter
5187
- def data(self) -> Optional[Mapping[str, str]]:
5098
+ def data(self) -> Optional[Mapping[str, Any]]:
5188
5099
  """
5189
5100
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5190
5101
 
@@ -5333,7 +5244,7 @@ class SecretsMountOracle(dict):
5333
5244
  name: str,
5334
5245
  allowed_roles: Optional[Sequence[str]] = None,
5335
5246
  connection_url: Optional[str] = None,
5336
- data: Optional[Mapping[str, str]] = None,
5247
+ data: Optional[Mapping[str, Any]] = None,
5337
5248
  disconnect_sessions: Optional[bool] = None,
5338
5249
  max_connection_lifetime: Optional[int] = None,
5339
5250
  max_idle_connections: Optional[int] = None,
@@ -5350,7 +5261,7 @@ class SecretsMountOracle(dict):
5350
5261
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
5351
5262
  connection.
5352
5263
  :param str connection_url: Connection string to use to connect to the database.
5353
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5264
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5354
5265
 
5355
5266
  Supported list of database secrets engines that can be configured:
5356
5267
  :param bool disconnect_sessions: Set to true to disconnect any open sessions prior to running the revocation statements.
@@ -5423,7 +5334,7 @@ class SecretsMountOracle(dict):
5423
5334
 
5424
5335
  @property
5425
5336
  @pulumi.getter
5426
- def data(self) -> Optional[Mapping[str, str]]:
5337
+ def data(self) -> Optional[Mapping[str, Any]]:
5427
5338
  """
5428
5339
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5429
5340
 
@@ -5542,18 +5453,10 @@ class SecretsMountPostgresql(dict):
5542
5453
  suggest = "max_open_connections"
5543
5454
  elif key == "pluginName":
5544
5455
  suggest = "plugin_name"
5545
- elif key == "privateKey":
5546
- suggest = "private_key"
5547
5456
  elif key == "rootRotationStatements":
5548
5457
  suggest = "root_rotation_statements"
5549
- elif key == "selfManaged":
5550
- suggest = "self_managed"
5551
5458
  elif key == "serviceAccountJson":
5552
5459
  suggest = "service_account_json"
5553
- elif key == "tlsCa":
5554
- suggest = "tls_ca"
5555
- elif key == "tlsCertificate":
5556
- suggest = "tls_certificate"
5557
5460
  elif key == "usernameTemplate":
5558
5461
  suggest = "username_template"
5559
5462
  elif key == "verifyConnection":
@@ -5575,19 +5478,15 @@ class SecretsMountPostgresql(dict):
5575
5478
  allowed_roles: Optional[Sequence[str]] = None,
5576
5479
  auth_type: Optional[str] = None,
5577
5480
  connection_url: Optional[str] = None,
5578
- data: Optional[Mapping[str, str]] = None,
5481
+ data: Optional[Mapping[str, Any]] = None,
5579
5482
  disable_escaping: Optional[bool] = None,
5580
5483
  max_connection_lifetime: Optional[int] = None,
5581
5484
  max_idle_connections: Optional[int] = None,
5582
5485
  max_open_connections: Optional[int] = None,
5583
5486
  password: Optional[str] = None,
5584
5487
  plugin_name: Optional[str] = None,
5585
- private_key: Optional[str] = None,
5586
5488
  root_rotation_statements: Optional[Sequence[str]] = None,
5587
- self_managed: Optional[bool] = None,
5588
5489
  service_account_json: Optional[str] = None,
5589
- tls_ca: Optional[str] = None,
5590
- tls_certificate: Optional[str] = None,
5591
5490
  username: Optional[str] = None,
5592
5491
  username_template: Optional[str] = None,
5593
5492
  verify_connection: Optional[bool] = None):
@@ -5597,7 +5496,7 @@ class SecretsMountPostgresql(dict):
5597
5496
  connection.
5598
5497
  :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
5599
5498
  :param str connection_url: Connection string to use to connect to the database.
5600
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5499
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5601
5500
 
5602
5501
  Supported list of database secrets engines that can be configured:
5603
5502
  :param bool disable_escaping: Disable special character escaping in username and password
@@ -5606,12 +5505,8 @@ class SecretsMountPostgresql(dict):
5606
5505
  :param int max_open_connections: Maximum number of open connections to the database.
5607
5506
  :param str password: The root credential password used in the connection URL
5608
5507
  :param str plugin_name: Specifies the name of the plugin to use.
5609
- :param str private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
5610
5508
  :param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
5611
- :param bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
5612
5509
  :param str service_account_json: A JSON encoded credential for use with IAM authorization
5613
- :param str tls_ca: The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
5614
- :param str tls_certificate: The x509 client certificate for connecting to the database. Must be PEM encoded.
5615
5510
  :param str username: The root credential username used in the connection URL
5616
5511
  :param str username_template: Username generation template.
5617
5512
  :param bool verify_connection: Whether the connection should be verified on
@@ -5638,18 +5533,10 @@ class SecretsMountPostgresql(dict):
5638
5533
  pulumi.set(__self__, "password", password)
5639
5534
  if plugin_name is not None:
5640
5535
  pulumi.set(__self__, "plugin_name", plugin_name)
5641
- if private_key is not None:
5642
- pulumi.set(__self__, "private_key", private_key)
5643
5536
  if root_rotation_statements is not None:
5644
5537
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
5645
- if self_managed is not None:
5646
- pulumi.set(__self__, "self_managed", self_managed)
5647
5538
  if service_account_json is not None:
5648
5539
  pulumi.set(__self__, "service_account_json", service_account_json)
5649
- if tls_ca is not None:
5650
- pulumi.set(__self__, "tls_ca", tls_ca)
5651
- if tls_certificate is not None:
5652
- pulumi.set(__self__, "tls_certificate", tls_certificate)
5653
5540
  if username is not None:
5654
5541
  pulumi.set(__self__, "username", username)
5655
5542
  if username_template is not None:
@@ -5692,7 +5579,7 @@ class SecretsMountPostgresql(dict):
5692
5579
 
5693
5580
  @property
5694
5581
  @pulumi.getter
5695
- def data(self) -> Optional[Mapping[str, str]]:
5582
+ def data(self) -> Optional[Mapping[str, Any]]:
5696
5583
  """
5697
5584
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5698
5585
 
@@ -5748,14 +5635,6 @@ class SecretsMountPostgresql(dict):
5748
5635
  """
5749
5636
  return pulumi.get(self, "plugin_name")
5750
5637
 
5751
- @property
5752
- @pulumi.getter(name="privateKey")
5753
- def private_key(self) -> Optional[str]:
5754
- """
5755
- The secret key used for the x509 client certificate. Must be PEM encoded.
5756
- """
5757
- return pulumi.get(self, "private_key")
5758
-
5759
5638
  @property
5760
5639
  @pulumi.getter(name="rootRotationStatements")
5761
5640
  def root_rotation_statements(self) -> Optional[Sequence[str]]:
@@ -5764,14 +5643,6 @@ class SecretsMountPostgresql(dict):
5764
5643
  """
5765
5644
  return pulumi.get(self, "root_rotation_statements")
5766
5645
 
5767
- @property
5768
- @pulumi.getter(name="selfManaged")
5769
- def self_managed(self) -> Optional[bool]:
5770
- """
5771
- If set, allows onboarding static roles with a rootless connection configuration.
5772
- """
5773
- return pulumi.get(self, "self_managed")
5774
-
5775
5646
  @property
5776
5647
  @pulumi.getter(name="serviceAccountJson")
5777
5648
  def service_account_json(self) -> Optional[str]:
@@ -5780,22 +5651,6 @@ class SecretsMountPostgresql(dict):
5780
5651
  """
5781
5652
  return pulumi.get(self, "service_account_json")
5782
5653
 
5783
- @property
5784
- @pulumi.getter(name="tlsCa")
5785
- def tls_ca(self) -> Optional[str]:
5786
- """
5787
- The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
5788
- """
5789
- return pulumi.get(self, "tls_ca")
5790
-
5791
- @property
5792
- @pulumi.getter(name="tlsCertificate")
5793
- def tls_certificate(self) -> Optional[str]:
5794
- """
5795
- The x509 client certificate for connecting to the database. Must be PEM encoded.
5796
- """
5797
- return pulumi.get(self, "tls_certificate")
5798
-
5799
5654
  @property
5800
5655
  @pulumi.getter
5801
5656
  def username(self) -> Optional[str]:
@@ -5858,7 +5713,7 @@ class SecretsMountRedi(dict):
5858
5713
  username: str,
5859
5714
  allowed_roles: Optional[Sequence[str]] = None,
5860
5715
  ca_cert: Optional[str] = None,
5861
- data: Optional[Mapping[str, str]] = None,
5716
+ data: Optional[Mapping[str, Any]] = None,
5862
5717
  insecure_tls: Optional[bool] = None,
5863
5718
  plugin_name: Optional[str] = None,
5864
5719
  port: Optional[int] = None,
@@ -5873,7 +5728,7 @@ class SecretsMountRedi(dict):
5873
5728
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
5874
5729
  connection.
5875
5730
  :param str ca_cert: The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
5876
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5731
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5877
5732
 
5878
5733
  Supported list of database secrets engines that can be configured:
5879
5734
  :param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
@@ -5958,7 +5813,7 @@ class SecretsMountRedi(dict):
5958
5813
 
5959
5814
  @property
5960
5815
  @pulumi.getter
5961
- def data(self) -> Optional[Mapping[str, str]]:
5816
+ def data(self) -> Optional[Mapping[str, Any]]:
5962
5817
  """
5963
5818
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5964
5819
 
@@ -6045,7 +5900,7 @@ class SecretsMountRedisElasticach(dict):
6045
5900
  name: str,
6046
5901
  url: str,
6047
5902
  allowed_roles: Optional[Sequence[str]] = None,
6048
- data: Optional[Mapping[str, str]] = None,
5903
+ data: Optional[Mapping[str, Any]] = None,
6049
5904
  password: Optional[str] = None,
6050
5905
  plugin_name: Optional[str] = None,
6051
5906
  region: Optional[str] = None,
@@ -6057,7 +5912,7 @@ class SecretsMountRedisElasticach(dict):
6057
5912
  :param str url: The configuration endpoint for the ElastiCache cluster to connect to.
6058
5913
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
6059
5914
  connection.
6060
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5915
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6061
5916
 
6062
5917
  Supported list of database secrets engines that can be configured:
6063
5918
  :param str password: The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
@@ -6114,7 +5969,7 @@ class SecretsMountRedisElasticach(dict):
6114
5969
 
6115
5970
  @property
6116
5971
  @pulumi.getter
6117
- def data(self) -> Optional[Mapping[str, str]]:
5972
+ def data(self) -> Optional[Mapping[str, Any]]:
6118
5973
  """
6119
5974
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6120
5975
 
@@ -6213,7 +6068,7 @@ class SecretsMountRedshift(dict):
6213
6068
  name: str,
6214
6069
  allowed_roles: Optional[Sequence[str]] = None,
6215
6070
  connection_url: Optional[str] = None,
6216
- data: Optional[Mapping[str, str]] = None,
6071
+ data: Optional[Mapping[str, Any]] = None,
6217
6072
  disable_escaping: Optional[bool] = None,
6218
6073
  max_connection_lifetime: Optional[int] = None,
6219
6074
  max_idle_connections: Optional[int] = None,
@@ -6229,7 +6084,7 @@ class SecretsMountRedshift(dict):
6229
6084
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
6230
6085
  connection.
6231
6086
  :param str connection_url: Connection string to use to connect to the database.
6232
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6087
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6233
6088
 
6234
6089
  Supported list of database secrets engines that can be configured:
6235
6090
  :param bool disable_escaping: Disable special character escaping in username and password
@@ -6299,7 +6154,7 @@ class SecretsMountRedshift(dict):
6299
6154
 
6300
6155
  @property
6301
6156
  @pulumi.getter
6302
- def data(self) -> Optional[Mapping[str, str]]:
6157
+ def data(self) -> Optional[Mapping[str, Any]]:
6303
6158
  """
6304
6159
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6305
6160
 
@@ -6428,7 +6283,7 @@ class SecretsMountSnowflake(dict):
6428
6283
  name: str,
6429
6284
  allowed_roles: Optional[Sequence[str]] = None,
6430
6285
  connection_url: Optional[str] = None,
6431
- data: Optional[Mapping[str, str]] = None,
6286
+ data: Optional[Mapping[str, Any]] = None,
6432
6287
  max_connection_lifetime: Optional[int] = None,
6433
6288
  max_idle_connections: Optional[int] = None,
6434
6289
  max_open_connections: Optional[int] = None,
@@ -6443,7 +6298,7 @@ class SecretsMountSnowflake(dict):
6443
6298
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
6444
6299
  connection.
6445
6300
  :param str connection_url: Connection string to use to connect to the database.
6446
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6301
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6447
6302
 
6448
6303
  Supported list of database secrets engines that can be configured:
6449
6304
  :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
@@ -6510,7 +6365,7 @@ class SecretsMountSnowflake(dict):
6510
6365
 
6511
6366
  @property
6512
6367
  @pulumi.getter
6513
- def data(self) -> Optional[Mapping[str, str]]:
6368
+ def data(self) -> Optional[Mapping[str, Any]]:
6514
6369
  """
6515
6370
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6516
6371