pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723820369__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +0 -5
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +0 -5
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +34 -2185
- pulumi_vault/database/outputs.py +0 -145
- pulumi_vault/database/secret_backend_connection.py +0 -5
- pulumi_vault/database/secret_backend_role.py +0 -5
- pulumi_vault/database/secret_backend_static_role.py +1 -69
- pulumi_vault/database/secrets_mount.py +0 -5
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +3 -62
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +4 -24
- pulumi_vault/generic/secret.py +0 -5
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +4 -17
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +4 -18
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +4 -23
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +4 -34
- pulumi_vault/identity/get_group.py +4 -40
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +4 -15
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +0 -5
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +0 -5
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +3 -55
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +0 -5
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +0 -32
- pulumi_vault/kv/get_secret.py +4 -19
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -23
- pulumi_vault/kv/get_secret_v2.py +6 -25
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +0 -5
- pulumi_vault/kv/secret.py +0 -5
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +0 -5
- pulumi_vault/ldap/auth_backend.py +0 -52
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +0 -5
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +0 -5
- pulumi_vault/namespace.py +0 -5
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +0 -41
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +0 -5
- pulumi_vault/pkisecret/get_backend_config_est.py +4 -22
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -17
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +4 -17
- pulumi_vault/pkisecret/outputs.py +0 -5
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +0 -5
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +0 -5
- pulumi_vault/secrets/sync_azure_destination.py +0 -5
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +0 -5
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +0 -39
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +4 -28
- pulumi_vault/transform/get_encode.py +4 -28
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +0 -5
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +0 -5
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723820369.dist-info/RECORD +256 -0
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/WHEEL +1 -1
- pulumi_vault-6.4.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/top_level.txt +0 -0
pulumi_vault/database/_inputs.py
CHANGED
@@ -4,142 +4,50 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
18
13
|
'SecretBackendConnectionCassandraArgs',
|
19
|
-
'SecretBackendConnectionCassandraArgsDict',
|
20
14
|
'SecretBackendConnectionCouchbaseArgs',
|
21
|
-
'SecretBackendConnectionCouchbaseArgsDict',
|
22
15
|
'SecretBackendConnectionElasticsearchArgs',
|
23
|
-
'SecretBackendConnectionElasticsearchArgsDict',
|
24
16
|
'SecretBackendConnectionHanaArgs',
|
25
|
-
'SecretBackendConnectionHanaArgsDict',
|
26
17
|
'SecretBackendConnectionInfluxdbArgs',
|
27
|
-
'SecretBackendConnectionInfluxdbArgsDict',
|
28
18
|
'SecretBackendConnectionMongodbArgs',
|
29
|
-
'SecretBackendConnectionMongodbArgsDict',
|
30
19
|
'SecretBackendConnectionMongodbatlasArgs',
|
31
|
-
'SecretBackendConnectionMongodbatlasArgsDict',
|
32
20
|
'SecretBackendConnectionMssqlArgs',
|
33
|
-
'SecretBackendConnectionMssqlArgsDict',
|
34
21
|
'SecretBackendConnectionMysqlArgs',
|
35
|
-
'SecretBackendConnectionMysqlArgsDict',
|
36
22
|
'SecretBackendConnectionMysqlAuroraArgs',
|
37
|
-
'SecretBackendConnectionMysqlAuroraArgsDict',
|
38
23
|
'SecretBackendConnectionMysqlLegacyArgs',
|
39
|
-
'SecretBackendConnectionMysqlLegacyArgsDict',
|
40
24
|
'SecretBackendConnectionMysqlRdsArgs',
|
41
|
-
'SecretBackendConnectionMysqlRdsArgsDict',
|
42
25
|
'SecretBackendConnectionOracleArgs',
|
43
|
-
'SecretBackendConnectionOracleArgsDict',
|
44
26
|
'SecretBackendConnectionPostgresqlArgs',
|
45
|
-
'SecretBackendConnectionPostgresqlArgsDict',
|
46
27
|
'SecretBackendConnectionRedisArgs',
|
47
|
-
'SecretBackendConnectionRedisArgsDict',
|
48
28
|
'SecretBackendConnectionRedisElasticacheArgs',
|
49
|
-
'SecretBackendConnectionRedisElasticacheArgsDict',
|
50
29
|
'SecretBackendConnectionRedshiftArgs',
|
51
|
-
'SecretBackendConnectionRedshiftArgsDict',
|
52
30
|
'SecretBackendConnectionSnowflakeArgs',
|
53
|
-
'SecretBackendConnectionSnowflakeArgsDict',
|
54
31
|
'SecretsMountCassandraArgs',
|
55
|
-
'SecretsMountCassandraArgsDict',
|
56
32
|
'SecretsMountCouchbaseArgs',
|
57
|
-
'SecretsMountCouchbaseArgsDict',
|
58
33
|
'SecretsMountElasticsearchArgs',
|
59
|
-
'SecretsMountElasticsearchArgsDict',
|
60
34
|
'SecretsMountHanaArgs',
|
61
|
-
'SecretsMountHanaArgsDict',
|
62
35
|
'SecretsMountInfluxdbArgs',
|
63
|
-
'SecretsMountInfluxdbArgsDict',
|
64
36
|
'SecretsMountMongodbArgs',
|
65
|
-
'SecretsMountMongodbArgsDict',
|
66
37
|
'SecretsMountMongodbatlaArgs',
|
67
|
-
'SecretsMountMongodbatlaArgsDict',
|
68
38
|
'SecretsMountMssqlArgs',
|
69
|
-
'SecretsMountMssqlArgsDict',
|
70
39
|
'SecretsMountMysqlArgs',
|
71
|
-
'SecretsMountMysqlArgsDict',
|
72
40
|
'SecretsMountMysqlAuroraArgs',
|
73
|
-
'SecretsMountMysqlAuroraArgsDict',
|
74
41
|
'SecretsMountMysqlLegacyArgs',
|
75
|
-
'SecretsMountMysqlLegacyArgsDict',
|
76
42
|
'SecretsMountMysqlRdArgs',
|
77
|
-
'SecretsMountMysqlRdArgsDict',
|
78
43
|
'SecretsMountOracleArgs',
|
79
|
-
'SecretsMountOracleArgsDict',
|
80
44
|
'SecretsMountPostgresqlArgs',
|
81
|
-
'SecretsMountPostgresqlArgsDict',
|
82
45
|
'SecretsMountRediArgs',
|
83
|
-
'SecretsMountRediArgsDict',
|
84
46
|
'SecretsMountRedisElasticachArgs',
|
85
|
-
'SecretsMountRedisElasticachArgsDict',
|
86
47
|
'SecretsMountRedshiftArgs',
|
87
|
-
'SecretsMountRedshiftArgsDict',
|
88
48
|
'SecretsMountSnowflakeArgs',
|
89
|
-
'SecretsMountSnowflakeArgsDict',
|
90
49
|
]
|
91
50
|
|
92
|
-
MYPY = False
|
93
|
-
|
94
|
-
if not MYPY:
|
95
|
-
class SecretBackendConnectionCassandraArgsDict(TypedDict):
|
96
|
-
connect_timeout: NotRequired[pulumi.Input[int]]
|
97
|
-
"""
|
98
|
-
The number of seconds to use as a connection timeout.
|
99
|
-
"""
|
100
|
-
hosts: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
101
|
-
"""
|
102
|
-
Cassandra hosts to connect to.
|
103
|
-
"""
|
104
|
-
insecure_tls: NotRequired[pulumi.Input[bool]]
|
105
|
-
"""
|
106
|
-
Whether to skip verification of the server certificate when using TLS.
|
107
|
-
"""
|
108
|
-
password: NotRequired[pulumi.Input[str]]
|
109
|
-
"""
|
110
|
-
The password to use when authenticating with Cassandra.
|
111
|
-
"""
|
112
|
-
pem_bundle: NotRequired[pulumi.Input[str]]
|
113
|
-
"""
|
114
|
-
Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
115
|
-
"""
|
116
|
-
pem_json: NotRequired[pulumi.Input[str]]
|
117
|
-
"""
|
118
|
-
Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
119
|
-
"""
|
120
|
-
port: NotRequired[pulumi.Input[int]]
|
121
|
-
"""
|
122
|
-
The transport port to use to connect to Cassandra.
|
123
|
-
"""
|
124
|
-
protocol_version: NotRequired[pulumi.Input[int]]
|
125
|
-
"""
|
126
|
-
The CQL protocol version to use.
|
127
|
-
"""
|
128
|
-
skip_verification: NotRequired[pulumi.Input[bool]]
|
129
|
-
"""
|
130
|
-
Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
131
|
-
"""
|
132
|
-
tls: NotRequired[pulumi.Input[bool]]
|
133
|
-
"""
|
134
|
-
Whether to use TLS when connecting to Cassandra.
|
135
|
-
"""
|
136
|
-
username: NotRequired[pulumi.Input[str]]
|
137
|
-
"""
|
138
|
-
The username to use when authenticating with Cassandra.
|
139
|
-
"""
|
140
|
-
elif False:
|
141
|
-
SecretBackendConnectionCassandraArgsDict: TypeAlias = Mapping[str, Any]
|
142
|
-
|
143
51
|
@pulumi.input_type
|
144
52
|
class SecretBackendConnectionCassandraArgs:
|
145
53
|
def __init__(__self__, *,
|
@@ -151,7 +59,6 @@ class SecretBackendConnectionCassandraArgs:
|
|
151
59
|
pem_json: Optional[pulumi.Input[str]] = None,
|
152
60
|
port: Optional[pulumi.Input[int]] = None,
|
153
61
|
protocol_version: Optional[pulumi.Input[int]] = None,
|
154
|
-
skip_verification: Optional[pulumi.Input[bool]] = None,
|
155
62
|
tls: Optional[pulumi.Input[bool]] = None,
|
156
63
|
username: Optional[pulumi.Input[str]] = None):
|
157
64
|
"""
|
@@ -163,7 +70,6 @@ class SecretBackendConnectionCassandraArgs:
|
|
163
70
|
:param pulumi.Input[str] pem_json: Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
164
71
|
:param pulumi.Input[int] port: The transport port to use to connect to Cassandra.
|
165
72
|
:param pulumi.Input[int] protocol_version: The CQL protocol version to use.
|
166
|
-
:param pulumi.Input[bool] skip_verification: Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
167
73
|
:param pulumi.Input[bool] tls: Whether to use TLS when connecting to Cassandra.
|
168
74
|
:param pulumi.Input[str] username: The username to use when authenticating with Cassandra.
|
169
75
|
"""
|
@@ -183,8 +89,6 @@ class SecretBackendConnectionCassandraArgs:
|
|
183
89
|
pulumi.set(__self__, "port", port)
|
184
90
|
if protocol_version is not None:
|
185
91
|
pulumi.set(__self__, "protocol_version", protocol_version)
|
186
|
-
if skip_verification is not None:
|
187
|
-
pulumi.set(__self__, "skip_verification", skip_verification)
|
188
92
|
if tls is not None:
|
189
93
|
pulumi.set(__self__, "tls", tls)
|
190
94
|
if username is not None:
|
@@ -286,18 +190,6 @@ class SecretBackendConnectionCassandraArgs:
|
|
286
190
|
def protocol_version(self, value: Optional[pulumi.Input[int]]):
|
287
191
|
pulumi.set(self, "protocol_version", value)
|
288
192
|
|
289
|
-
@property
|
290
|
-
@pulumi.getter(name="skipVerification")
|
291
|
-
def skip_verification(self) -> Optional[pulumi.Input[bool]]:
|
292
|
-
"""
|
293
|
-
Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
294
|
-
"""
|
295
|
-
return pulumi.get(self, "skip_verification")
|
296
|
-
|
297
|
-
@skip_verification.setter
|
298
|
-
def skip_verification(self, value: Optional[pulumi.Input[bool]]):
|
299
|
-
pulumi.set(self, "skip_verification", value)
|
300
|
-
|
301
193
|
@property
|
302
194
|
@pulumi.getter
|
303
195
|
def tls(self) -> Optional[pulumi.Input[bool]]:
|
@@ -323,43 +215,6 @@ class SecretBackendConnectionCassandraArgs:
|
|
323
215
|
pulumi.set(self, "username", value)
|
324
216
|
|
325
217
|
|
326
|
-
if not MYPY:
|
327
|
-
class SecretBackendConnectionCouchbaseArgsDict(TypedDict):
|
328
|
-
hosts: pulumi.Input[Sequence[pulumi.Input[str]]]
|
329
|
-
"""
|
330
|
-
A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
|
331
|
-
"""
|
332
|
-
password: pulumi.Input[str]
|
333
|
-
"""
|
334
|
-
Specifies the password corresponding to the given username.
|
335
|
-
"""
|
336
|
-
username: pulumi.Input[str]
|
337
|
-
"""
|
338
|
-
Specifies the username for Vault to use.
|
339
|
-
"""
|
340
|
-
base64_pem: NotRequired[pulumi.Input[str]]
|
341
|
-
"""
|
342
|
-
Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
|
343
|
-
"""
|
344
|
-
bucket_name: NotRequired[pulumi.Input[str]]
|
345
|
-
"""
|
346
|
-
Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
|
347
|
-
"""
|
348
|
-
insecure_tls: NotRequired[pulumi.Input[bool]]
|
349
|
-
"""
|
350
|
-
Specifies whether to skip verification of the server certificate when using TLS.
|
351
|
-
"""
|
352
|
-
tls: NotRequired[pulumi.Input[bool]]
|
353
|
-
"""
|
354
|
-
Specifies whether to use TLS when connecting to Couchbase.
|
355
|
-
"""
|
356
|
-
username_template: NotRequired[pulumi.Input[str]]
|
357
|
-
"""
|
358
|
-
Template describing how dynamic usernames are generated.
|
359
|
-
"""
|
360
|
-
elif False:
|
361
|
-
SecretBackendConnectionCouchbaseArgsDict: TypeAlias = Mapping[str, Any]
|
362
|
-
|
363
218
|
@pulumi.input_type
|
364
219
|
class SecretBackendConnectionCouchbaseArgs:
|
365
220
|
def __init__(__self__, *,
|
@@ -492,51 +347,6 @@ class SecretBackendConnectionCouchbaseArgs:
|
|
492
347
|
pulumi.set(self, "username_template", value)
|
493
348
|
|
494
349
|
|
495
|
-
if not MYPY:
|
496
|
-
class SecretBackendConnectionElasticsearchArgsDict(TypedDict):
|
497
|
-
password: pulumi.Input[str]
|
498
|
-
"""
|
499
|
-
The password to be used in the connection URL
|
500
|
-
"""
|
501
|
-
url: pulumi.Input[str]
|
502
|
-
"""
|
503
|
-
The URL for Elasticsearch's API
|
504
|
-
"""
|
505
|
-
username: pulumi.Input[str]
|
506
|
-
"""
|
507
|
-
The username to be used in the connection URL
|
508
|
-
"""
|
509
|
-
ca_cert: NotRequired[pulumi.Input[str]]
|
510
|
-
"""
|
511
|
-
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
512
|
-
"""
|
513
|
-
ca_path: NotRequired[pulumi.Input[str]]
|
514
|
-
"""
|
515
|
-
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
516
|
-
"""
|
517
|
-
client_cert: NotRequired[pulumi.Input[str]]
|
518
|
-
"""
|
519
|
-
The path to the certificate for the Elasticsearch client to present for communication
|
520
|
-
"""
|
521
|
-
client_key: NotRequired[pulumi.Input[str]]
|
522
|
-
"""
|
523
|
-
The path to the key for the Elasticsearch client to use for communication
|
524
|
-
"""
|
525
|
-
insecure: NotRequired[pulumi.Input[bool]]
|
526
|
-
"""
|
527
|
-
Whether to disable certificate verification
|
528
|
-
"""
|
529
|
-
tls_server_name: NotRequired[pulumi.Input[str]]
|
530
|
-
"""
|
531
|
-
This, if set, is used to set the SNI host when connecting via TLS
|
532
|
-
"""
|
533
|
-
username_template: NotRequired[pulumi.Input[str]]
|
534
|
-
"""
|
535
|
-
Template describing how dynamic usernames are generated.
|
536
|
-
"""
|
537
|
-
elif False:
|
538
|
-
SecretBackendConnectionElasticsearchArgsDict: TypeAlias = Mapping[str, Any]
|
539
|
-
|
540
350
|
@pulumi.input_type
|
541
351
|
class SecretBackendConnectionElasticsearchArgs:
|
542
352
|
def __init__(__self__, *,
|
@@ -701,39 +511,6 @@ class SecretBackendConnectionElasticsearchArgs:
|
|
701
511
|
pulumi.set(self, "username_template", value)
|
702
512
|
|
703
513
|
|
704
|
-
if not MYPY:
|
705
|
-
class SecretBackendConnectionHanaArgsDict(TypedDict):
|
706
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
707
|
-
"""
|
708
|
-
Connection string to use to connect to the database.
|
709
|
-
"""
|
710
|
-
disable_escaping: NotRequired[pulumi.Input[bool]]
|
711
|
-
"""
|
712
|
-
Disable special character escaping in username and password
|
713
|
-
"""
|
714
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
715
|
-
"""
|
716
|
-
Maximum number of seconds a connection may be reused.
|
717
|
-
"""
|
718
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
719
|
-
"""
|
720
|
-
Maximum number of idle connections to the database.
|
721
|
-
"""
|
722
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
723
|
-
"""
|
724
|
-
Maximum number of open connections to the database.
|
725
|
-
"""
|
726
|
-
password: NotRequired[pulumi.Input[str]]
|
727
|
-
"""
|
728
|
-
The root credential password used in the connection URL
|
729
|
-
"""
|
730
|
-
username: NotRequired[pulumi.Input[str]]
|
731
|
-
"""
|
732
|
-
The root credential username used in the connection URL
|
733
|
-
"""
|
734
|
-
elif False:
|
735
|
-
SecretBackendConnectionHanaArgsDict: TypeAlias = Mapping[str, Any]
|
736
|
-
|
737
514
|
@pulumi.input_type
|
738
515
|
class SecretBackendConnectionHanaArgs:
|
739
516
|
def __init__(__self__, *,
|
@@ -853,51 +630,6 @@ class SecretBackendConnectionHanaArgs:
|
|
853
630
|
pulumi.set(self, "username", value)
|
854
631
|
|
855
632
|
|
856
|
-
if not MYPY:
|
857
|
-
class SecretBackendConnectionInfluxdbArgsDict(TypedDict):
|
858
|
-
host: pulumi.Input[str]
|
859
|
-
"""
|
860
|
-
Influxdb host to connect to.
|
861
|
-
"""
|
862
|
-
password: pulumi.Input[str]
|
863
|
-
"""
|
864
|
-
Specifies the password corresponding to the given username.
|
865
|
-
"""
|
866
|
-
username: pulumi.Input[str]
|
867
|
-
"""
|
868
|
-
Specifies the username to use for superuser access.
|
869
|
-
"""
|
870
|
-
connect_timeout: NotRequired[pulumi.Input[int]]
|
871
|
-
"""
|
872
|
-
The number of seconds to use as a connection timeout.
|
873
|
-
"""
|
874
|
-
insecure_tls: NotRequired[pulumi.Input[bool]]
|
875
|
-
"""
|
876
|
-
Whether to skip verification of the server certificate when using TLS.
|
877
|
-
"""
|
878
|
-
pem_bundle: NotRequired[pulumi.Input[str]]
|
879
|
-
"""
|
880
|
-
Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
881
|
-
"""
|
882
|
-
pem_json: NotRequired[pulumi.Input[str]]
|
883
|
-
"""
|
884
|
-
Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
885
|
-
"""
|
886
|
-
port: NotRequired[pulumi.Input[int]]
|
887
|
-
"""
|
888
|
-
The transport port to use to connect to Influxdb.
|
889
|
-
"""
|
890
|
-
tls: NotRequired[pulumi.Input[bool]]
|
891
|
-
"""
|
892
|
-
Whether to use TLS when connecting to Influxdb.
|
893
|
-
"""
|
894
|
-
username_template: NotRequired[pulumi.Input[str]]
|
895
|
-
"""
|
896
|
-
Template describing how dynamic usernames are generated.
|
897
|
-
"""
|
898
|
-
elif False:
|
899
|
-
SecretBackendConnectionInfluxdbArgsDict: TypeAlias = Mapping[str, Any]
|
900
|
-
|
901
633
|
@pulumi.input_type
|
902
634
|
class SecretBackendConnectionInfluxdbArgs:
|
903
635
|
def __init__(__self__, *,
|
@@ -1062,39 +794,6 @@ class SecretBackendConnectionInfluxdbArgs:
|
|
1062
794
|
pulumi.set(self, "username_template", value)
|
1063
795
|
|
1064
796
|
|
1065
|
-
if not MYPY:
|
1066
|
-
class SecretBackendConnectionMongodbArgsDict(TypedDict):
|
1067
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
1068
|
-
"""
|
1069
|
-
Connection string to use to connect to the database.
|
1070
|
-
"""
|
1071
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
1072
|
-
"""
|
1073
|
-
Maximum number of seconds a connection may be reused.
|
1074
|
-
"""
|
1075
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
1076
|
-
"""
|
1077
|
-
Maximum number of idle connections to the database.
|
1078
|
-
"""
|
1079
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
1080
|
-
"""
|
1081
|
-
Maximum number of open connections to the database.
|
1082
|
-
"""
|
1083
|
-
password: NotRequired[pulumi.Input[str]]
|
1084
|
-
"""
|
1085
|
-
The root credential password used in the connection URL
|
1086
|
-
"""
|
1087
|
-
username: NotRequired[pulumi.Input[str]]
|
1088
|
-
"""
|
1089
|
-
The root credential username used in the connection URL
|
1090
|
-
"""
|
1091
|
-
username_template: NotRequired[pulumi.Input[str]]
|
1092
|
-
"""
|
1093
|
-
Username generation template.
|
1094
|
-
"""
|
1095
|
-
elif False:
|
1096
|
-
SecretBackendConnectionMongodbArgsDict: TypeAlias = Mapping[str, Any]
|
1097
|
-
|
1098
797
|
@pulumi.input_type
|
1099
798
|
class SecretBackendConnectionMongodbArgs:
|
1100
799
|
def __init__(__self__, *,
|
@@ -1214,23 +913,6 @@ class SecretBackendConnectionMongodbArgs:
|
|
1214
913
|
pulumi.set(self, "username_template", value)
|
1215
914
|
|
1216
915
|
|
1217
|
-
if not MYPY:
|
1218
|
-
class SecretBackendConnectionMongodbatlasArgsDict(TypedDict):
|
1219
|
-
private_key: pulumi.Input[str]
|
1220
|
-
"""
|
1221
|
-
The Private Programmatic API Key used to connect with MongoDB Atlas API.
|
1222
|
-
"""
|
1223
|
-
project_id: pulumi.Input[str]
|
1224
|
-
"""
|
1225
|
-
The Project ID the Database User should be created within.
|
1226
|
-
"""
|
1227
|
-
public_key: pulumi.Input[str]
|
1228
|
-
"""
|
1229
|
-
The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
|
1230
|
-
"""
|
1231
|
-
elif False:
|
1232
|
-
SecretBackendConnectionMongodbatlasArgsDict: TypeAlias = Mapping[str, Any]
|
1233
|
-
|
1234
916
|
@pulumi.input_type
|
1235
917
|
class SecretBackendConnectionMongodbatlasArgs:
|
1236
918
|
def __init__(__self__, *,
|
@@ -1283,47 +965,6 @@ class SecretBackendConnectionMongodbatlasArgs:
|
|
1283
965
|
pulumi.set(self, "public_key", value)
|
1284
966
|
|
1285
967
|
|
1286
|
-
if not MYPY:
|
1287
|
-
class SecretBackendConnectionMssqlArgsDict(TypedDict):
|
1288
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
1289
|
-
"""
|
1290
|
-
Connection string to use to connect to the database.
|
1291
|
-
"""
|
1292
|
-
contained_db: NotRequired[pulumi.Input[bool]]
|
1293
|
-
"""
|
1294
|
-
Set to true when the target is a Contained Database, e.g. AzureSQL.
|
1295
|
-
"""
|
1296
|
-
disable_escaping: NotRequired[pulumi.Input[bool]]
|
1297
|
-
"""
|
1298
|
-
Disable special character escaping in username and password
|
1299
|
-
"""
|
1300
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
1301
|
-
"""
|
1302
|
-
Maximum number of seconds a connection may be reused.
|
1303
|
-
"""
|
1304
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
1305
|
-
"""
|
1306
|
-
Maximum number of idle connections to the database.
|
1307
|
-
"""
|
1308
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
1309
|
-
"""
|
1310
|
-
Maximum number of open connections to the database.
|
1311
|
-
"""
|
1312
|
-
password: NotRequired[pulumi.Input[str]]
|
1313
|
-
"""
|
1314
|
-
The root credential password used in the connection URL
|
1315
|
-
"""
|
1316
|
-
username: NotRequired[pulumi.Input[str]]
|
1317
|
-
"""
|
1318
|
-
The root credential username used in the connection URL
|
1319
|
-
"""
|
1320
|
-
username_template: NotRequired[pulumi.Input[str]]
|
1321
|
-
"""
|
1322
|
-
Username generation template.
|
1323
|
-
"""
|
1324
|
-
elif False:
|
1325
|
-
SecretBackendConnectionMssqlArgsDict: TypeAlias = Mapping[str, Any]
|
1326
|
-
|
1327
968
|
@pulumi.input_type
|
1328
969
|
class SecretBackendConnectionMssqlArgs:
|
1329
970
|
def __init__(__self__, *,
|
@@ -1475,55 +1116,6 @@ class SecretBackendConnectionMssqlArgs:
|
|
1475
1116
|
pulumi.set(self, "username_template", value)
|
1476
1117
|
|
1477
1118
|
|
1478
|
-
if not MYPY:
|
1479
|
-
class SecretBackendConnectionMysqlArgsDict(TypedDict):
|
1480
|
-
auth_type: NotRequired[pulumi.Input[str]]
|
1481
|
-
"""
|
1482
|
-
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1483
|
-
"""
|
1484
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
1485
|
-
"""
|
1486
|
-
Connection string to use to connect to the database.
|
1487
|
-
"""
|
1488
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
1489
|
-
"""
|
1490
|
-
Maximum number of seconds a connection may be reused.
|
1491
|
-
"""
|
1492
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
1493
|
-
"""
|
1494
|
-
Maximum number of idle connections to the database.
|
1495
|
-
"""
|
1496
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
1497
|
-
"""
|
1498
|
-
Maximum number of open connections to the database.
|
1499
|
-
"""
|
1500
|
-
password: NotRequired[pulumi.Input[str]]
|
1501
|
-
"""
|
1502
|
-
The root credential password used in the connection URL
|
1503
|
-
"""
|
1504
|
-
service_account_json: NotRequired[pulumi.Input[str]]
|
1505
|
-
"""
|
1506
|
-
A JSON encoded credential for use with IAM authorization
|
1507
|
-
"""
|
1508
|
-
tls_ca: NotRequired[pulumi.Input[str]]
|
1509
|
-
"""
|
1510
|
-
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1511
|
-
"""
|
1512
|
-
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
1513
|
-
"""
|
1514
|
-
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1515
|
-
"""
|
1516
|
-
username: NotRequired[pulumi.Input[str]]
|
1517
|
-
"""
|
1518
|
-
The root credential username used in the connection URL
|
1519
|
-
"""
|
1520
|
-
username_template: NotRequired[pulumi.Input[str]]
|
1521
|
-
"""
|
1522
|
-
Username generation template.
|
1523
|
-
"""
|
1524
|
-
elif False:
|
1525
|
-
SecretBackendConnectionMysqlArgsDict: TypeAlias = Mapping[str, Any]
|
1526
|
-
|
1527
1119
|
@pulumi.input_type
|
1528
1120
|
class SecretBackendConnectionMysqlArgs:
|
1529
1121
|
def __init__(__self__, *,
|
@@ -1707,69 +1299,20 @@ class SecretBackendConnectionMysqlArgs:
|
|
1707
1299
|
pulumi.set(self, "username_template", value)
|
1708
1300
|
|
1709
1301
|
|
1710
|
-
|
1711
|
-
|
1712
|
-
|
1713
|
-
|
1714
|
-
|
1715
|
-
|
1716
|
-
|
1717
|
-
|
1718
|
-
|
1719
|
-
|
1720
|
-
|
1721
|
-
|
1722
|
-
|
1723
|
-
|
1724
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
1725
|
-
"""
|
1726
|
-
Maximum number of idle connections to the database.
|
1727
|
-
"""
|
1728
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
1729
|
-
"""
|
1730
|
-
Maximum number of open connections to the database.
|
1731
|
-
"""
|
1732
|
-
password: NotRequired[pulumi.Input[str]]
|
1733
|
-
"""
|
1734
|
-
The root credential password used in the connection URL
|
1735
|
-
"""
|
1736
|
-
service_account_json: NotRequired[pulumi.Input[str]]
|
1737
|
-
"""
|
1738
|
-
A JSON encoded credential for use with IAM authorization
|
1739
|
-
"""
|
1740
|
-
tls_ca: NotRequired[pulumi.Input[str]]
|
1741
|
-
"""
|
1742
|
-
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1743
|
-
"""
|
1744
|
-
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
1745
|
-
"""
|
1746
|
-
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1747
|
-
"""
|
1748
|
-
username: NotRequired[pulumi.Input[str]]
|
1749
|
-
"""
|
1750
|
-
The root credential username used in the connection URL
|
1751
|
-
"""
|
1752
|
-
username_template: NotRequired[pulumi.Input[str]]
|
1753
|
-
"""
|
1754
|
-
Username generation template.
|
1755
|
-
"""
|
1756
|
-
elif False:
|
1757
|
-
SecretBackendConnectionMysqlAuroraArgsDict: TypeAlias = Mapping[str, Any]
|
1758
|
-
|
1759
|
-
@pulumi.input_type
|
1760
|
-
class SecretBackendConnectionMysqlAuroraArgs:
|
1761
|
-
def __init__(__self__, *,
|
1762
|
-
auth_type: Optional[pulumi.Input[str]] = None,
|
1763
|
-
connection_url: Optional[pulumi.Input[str]] = None,
|
1764
|
-
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
1765
|
-
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
1766
|
-
max_open_connections: Optional[pulumi.Input[int]] = None,
|
1767
|
-
password: Optional[pulumi.Input[str]] = None,
|
1768
|
-
service_account_json: Optional[pulumi.Input[str]] = None,
|
1769
|
-
tls_ca: Optional[pulumi.Input[str]] = None,
|
1770
|
-
tls_certificate_key: Optional[pulumi.Input[str]] = None,
|
1771
|
-
username: Optional[pulumi.Input[str]] = None,
|
1772
|
-
username_template: Optional[pulumi.Input[str]] = None):
|
1302
|
+
@pulumi.input_type
|
1303
|
+
class SecretBackendConnectionMysqlAuroraArgs:
|
1304
|
+
def __init__(__self__, *,
|
1305
|
+
auth_type: Optional[pulumi.Input[str]] = None,
|
1306
|
+
connection_url: Optional[pulumi.Input[str]] = None,
|
1307
|
+
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
1308
|
+
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
1309
|
+
max_open_connections: Optional[pulumi.Input[int]] = None,
|
1310
|
+
password: Optional[pulumi.Input[str]] = None,
|
1311
|
+
service_account_json: Optional[pulumi.Input[str]] = None,
|
1312
|
+
tls_ca: Optional[pulumi.Input[str]] = None,
|
1313
|
+
tls_certificate_key: Optional[pulumi.Input[str]] = None,
|
1314
|
+
username: Optional[pulumi.Input[str]] = None,
|
1315
|
+
username_template: Optional[pulumi.Input[str]] = None):
|
1773
1316
|
"""
|
1774
1317
|
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1775
1318
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
@@ -1939,55 +1482,6 @@ class SecretBackendConnectionMysqlAuroraArgs:
|
|
1939
1482
|
pulumi.set(self, "username_template", value)
|
1940
1483
|
|
1941
1484
|
|
1942
|
-
if not MYPY:
|
1943
|
-
class SecretBackendConnectionMysqlLegacyArgsDict(TypedDict):
|
1944
|
-
auth_type: NotRequired[pulumi.Input[str]]
|
1945
|
-
"""
|
1946
|
-
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1947
|
-
"""
|
1948
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
1949
|
-
"""
|
1950
|
-
Connection string to use to connect to the database.
|
1951
|
-
"""
|
1952
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
1953
|
-
"""
|
1954
|
-
Maximum number of seconds a connection may be reused.
|
1955
|
-
"""
|
1956
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
1957
|
-
"""
|
1958
|
-
Maximum number of idle connections to the database.
|
1959
|
-
"""
|
1960
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
1961
|
-
"""
|
1962
|
-
Maximum number of open connections to the database.
|
1963
|
-
"""
|
1964
|
-
password: NotRequired[pulumi.Input[str]]
|
1965
|
-
"""
|
1966
|
-
The root credential password used in the connection URL
|
1967
|
-
"""
|
1968
|
-
service_account_json: NotRequired[pulumi.Input[str]]
|
1969
|
-
"""
|
1970
|
-
A JSON encoded credential for use with IAM authorization
|
1971
|
-
"""
|
1972
|
-
tls_ca: NotRequired[pulumi.Input[str]]
|
1973
|
-
"""
|
1974
|
-
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1975
|
-
"""
|
1976
|
-
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
1977
|
-
"""
|
1978
|
-
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1979
|
-
"""
|
1980
|
-
username: NotRequired[pulumi.Input[str]]
|
1981
|
-
"""
|
1982
|
-
The root credential username used in the connection URL
|
1983
|
-
"""
|
1984
|
-
username_template: NotRequired[pulumi.Input[str]]
|
1985
|
-
"""
|
1986
|
-
Username generation template.
|
1987
|
-
"""
|
1988
|
-
elif False:
|
1989
|
-
SecretBackendConnectionMysqlLegacyArgsDict: TypeAlias = Mapping[str, Any]
|
1990
|
-
|
1991
1485
|
@pulumi.input_type
|
1992
1486
|
class SecretBackendConnectionMysqlLegacyArgs:
|
1993
1487
|
def __init__(__self__, *,
|
@@ -2171,55 +1665,6 @@ class SecretBackendConnectionMysqlLegacyArgs:
|
|
2171
1665
|
pulumi.set(self, "username_template", value)
|
2172
1666
|
|
2173
1667
|
|
2174
|
-
if not MYPY:
|
2175
|
-
class SecretBackendConnectionMysqlRdsArgsDict(TypedDict):
|
2176
|
-
auth_type: NotRequired[pulumi.Input[str]]
|
2177
|
-
"""
|
2178
|
-
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
2179
|
-
"""
|
2180
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
2181
|
-
"""
|
2182
|
-
Connection string to use to connect to the database.
|
2183
|
-
"""
|
2184
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
2185
|
-
"""
|
2186
|
-
Maximum number of seconds a connection may be reused.
|
2187
|
-
"""
|
2188
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
2189
|
-
"""
|
2190
|
-
Maximum number of idle connections to the database.
|
2191
|
-
"""
|
2192
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
2193
|
-
"""
|
2194
|
-
Maximum number of open connections to the database.
|
2195
|
-
"""
|
2196
|
-
password: NotRequired[pulumi.Input[str]]
|
2197
|
-
"""
|
2198
|
-
The root credential password used in the connection URL
|
2199
|
-
"""
|
2200
|
-
service_account_json: NotRequired[pulumi.Input[str]]
|
2201
|
-
"""
|
2202
|
-
A JSON encoded credential for use with IAM authorization
|
2203
|
-
"""
|
2204
|
-
tls_ca: NotRequired[pulumi.Input[str]]
|
2205
|
-
"""
|
2206
|
-
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
2207
|
-
"""
|
2208
|
-
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
2209
|
-
"""
|
2210
|
-
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
2211
|
-
"""
|
2212
|
-
username: NotRequired[pulumi.Input[str]]
|
2213
|
-
"""
|
2214
|
-
The root credential username used in the connection URL
|
2215
|
-
"""
|
2216
|
-
username_template: NotRequired[pulumi.Input[str]]
|
2217
|
-
"""
|
2218
|
-
Username generation template.
|
2219
|
-
"""
|
2220
|
-
elif False:
|
2221
|
-
SecretBackendConnectionMysqlRdsArgsDict: TypeAlias = Mapping[str, Any]
|
2222
|
-
|
2223
1668
|
@pulumi.input_type
|
2224
1669
|
class SecretBackendConnectionMysqlRdsArgs:
|
2225
1670
|
def __init__(__self__, *,
|
@@ -2403,47 +1848,6 @@ class SecretBackendConnectionMysqlRdsArgs:
|
|
2403
1848
|
pulumi.set(self, "username_template", value)
|
2404
1849
|
|
2405
1850
|
|
2406
|
-
if not MYPY:
|
2407
|
-
class SecretBackendConnectionOracleArgsDict(TypedDict):
|
2408
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
2409
|
-
"""
|
2410
|
-
Connection string to use to connect to the database.
|
2411
|
-
"""
|
2412
|
-
disconnect_sessions: NotRequired[pulumi.Input[bool]]
|
2413
|
-
"""
|
2414
|
-
Set to true to disconnect any open sessions prior to running the revocation statements.
|
2415
|
-
"""
|
2416
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
2417
|
-
"""
|
2418
|
-
Maximum number of seconds a connection may be reused.
|
2419
|
-
"""
|
2420
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
2421
|
-
"""
|
2422
|
-
Maximum number of idle connections to the database.
|
2423
|
-
"""
|
2424
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
2425
|
-
"""
|
2426
|
-
Maximum number of open connections to the database.
|
2427
|
-
"""
|
2428
|
-
password: NotRequired[pulumi.Input[str]]
|
2429
|
-
"""
|
2430
|
-
The root credential password used in the connection URL
|
2431
|
-
"""
|
2432
|
-
split_statements: NotRequired[pulumi.Input[bool]]
|
2433
|
-
"""
|
2434
|
-
Set to true in order to split statements after semi-colons.
|
2435
|
-
"""
|
2436
|
-
username: NotRequired[pulumi.Input[str]]
|
2437
|
-
"""
|
2438
|
-
The root credential username used in the connection URL
|
2439
|
-
"""
|
2440
|
-
username_template: NotRequired[pulumi.Input[str]]
|
2441
|
-
"""
|
2442
|
-
Username generation template.
|
2443
|
-
"""
|
2444
|
-
elif False:
|
2445
|
-
SecretBackendConnectionOracleArgsDict: TypeAlias = Mapping[str, Any]
|
2446
|
-
|
2447
1851
|
@pulumi.input_type
|
2448
1852
|
class SecretBackendConnectionOracleArgs:
|
2449
1853
|
def __init__(__self__, *,
|
@@ -2595,67 +1999,6 @@ class SecretBackendConnectionOracleArgs:
|
|
2595
1999
|
pulumi.set(self, "username_template", value)
|
2596
2000
|
|
2597
2001
|
|
2598
|
-
if not MYPY:
|
2599
|
-
class SecretBackendConnectionPostgresqlArgsDict(TypedDict):
|
2600
|
-
auth_type: NotRequired[pulumi.Input[str]]
|
2601
|
-
"""
|
2602
|
-
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
2603
|
-
"""
|
2604
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
2605
|
-
"""
|
2606
|
-
Connection string to use to connect to the database.
|
2607
|
-
"""
|
2608
|
-
disable_escaping: NotRequired[pulumi.Input[bool]]
|
2609
|
-
"""
|
2610
|
-
Disable special character escaping in username and password
|
2611
|
-
"""
|
2612
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
2613
|
-
"""
|
2614
|
-
Maximum number of seconds a connection may be reused.
|
2615
|
-
"""
|
2616
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
2617
|
-
"""
|
2618
|
-
Maximum number of idle connections to the database.
|
2619
|
-
"""
|
2620
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
2621
|
-
"""
|
2622
|
-
Maximum number of open connections to the database.
|
2623
|
-
"""
|
2624
|
-
password: NotRequired[pulumi.Input[str]]
|
2625
|
-
"""
|
2626
|
-
The root credential password used in the connection URL
|
2627
|
-
"""
|
2628
|
-
private_key: NotRequired[pulumi.Input[str]]
|
2629
|
-
"""
|
2630
|
-
The secret key used for the x509 client certificate. Must be PEM encoded.
|
2631
|
-
"""
|
2632
|
-
self_managed: NotRequired[pulumi.Input[bool]]
|
2633
|
-
"""
|
2634
|
-
If set, allows onboarding static roles with a rootless connection configuration.
|
2635
|
-
"""
|
2636
|
-
service_account_json: NotRequired[pulumi.Input[str]]
|
2637
|
-
"""
|
2638
|
-
A JSON encoded credential for use with IAM authorization
|
2639
|
-
"""
|
2640
|
-
tls_ca: NotRequired[pulumi.Input[str]]
|
2641
|
-
"""
|
2642
|
-
The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
2643
|
-
"""
|
2644
|
-
tls_certificate: NotRequired[pulumi.Input[str]]
|
2645
|
-
"""
|
2646
|
-
The x509 client certificate for connecting to the database. Must be PEM encoded.
|
2647
|
-
"""
|
2648
|
-
username: NotRequired[pulumi.Input[str]]
|
2649
|
-
"""
|
2650
|
-
The root credential username used in the connection URL
|
2651
|
-
"""
|
2652
|
-
username_template: NotRequired[pulumi.Input[str]]
|
2653
|
-
"""
|
2654
|
-
Username generation template.
|
2655
|
-
"""
|
2656
|
-
elif False:
|
2657
|
-
SecretBackendConnectionPostgresqlArgsDict: TypeAlias = Mapping[str, Any]
|
2658
|
-
|
2659
2002
|
@pulumi.input_type
|
2660
2003
|
class SecretBackendConnectionPostgresqlArgs:
|
2661
2004
|
def __init__(__self__, *,
|
@@ -2666,11 +2009,7 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2666
2009
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
2667
2010
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
2668
2011
|
password: Optional[pulumi.Input[str]] = None,
|
2669
|
-
private_key: Optional[pulumi.Input[str]] = None,
|
2670
|
-
self_managed: Optional[pulumi.Input[bool]] = None,
|
2671
2012
|
service_account_json: Optional[pulumi.Input[str]] = None,
|
2672
|
-
tls_ca: Optional[pulumi.Input[str]] = None,
|
2673
|
-
tls_certificate: Optional[pulumi.Input[str]] = None,
|
2674
2013
|
username: Optional[pulumi.Input[str]] = None,
|
2675
2014
|
username_template: Optional[pulumi.Input[str]] = None):
|
2676
2015
|
"""
|
@@ -2681,11 +2020,7 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2681
2020
|
:param pulumi.Input[int] max_idle_connections: Maximum number of idle connections to the database.
|
2682
2021
|
:param pulumi.Input[int] max_open_connections: Maximum number of open connections to the database.
|
2683
2022
|
:param pulumi.Input[str] password: The root credential password used in the connection URL
|
2684
|
-
:param pulumi.Input[str] private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
|
2685
|
-
:param pulumi.Input[bool] self_managed: If set, allows onboarding static roles with a rootless connection configuration.
|
2686
2023
|
:param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
|
2687
|
-
:param pulumi.Input[str] tls_ca: The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
2688
|
-
:param pulumi.Input[str] tls_certificate: The x509 client certificate for connecting to the database. Must be PEM encoded.
|
2689
2024
|
:param pulumi.Input[str] username: The root credential username used in the connection URL
|
2690
2025
|
:param pulumi.Input[str] username_template: Username generation template.
|
2691
2026
|
"""
|
@@ -2703,16 +2038,8 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2703
2038
|
pulumi.set(__self__, "max_open_connections", max_open_connections)
|
2704
2039
|
if password is not None:
|
2705
2040
|
pulumi.set(__self__, "password", password)
|
2706
|
-
if private_key is not None:
|
2707
|
-
pulumi.set(__self__, "private_key", private_key)
|
2708
|
-
if self_managed is not None:
|
2709
|
-
pulumi.set(__self__, "self_managed", self_managed)
|
2710
2041
|
if service_account_json is not None:
|
2711
2042
|
pulumi.set(__self__, "service_account_json", service_account_json)
|
2712
|
-
if tls_ca is not None:
|
2713
|
-
pulumi.set(__self__, "tls_ca", tls_ca)
|
2714
|
-
if tls_certificate is not None:
|
2715
|
-
pulumi.set(__self__, "tls_certificate", tls_certificate)
|
2716
2043
|
if username is not None:
|
2717
2044
|
pulumi.set(__self__, "username", username)
|
2718
2045
|
if username_template is not None:
|
@@ -2802,30 +2129,6 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2802
2129
|
def password(self, value: Optional[pulumi.Input[str]]):
|
2803
2130
|
pulumi.set(self, "password", value)
|
2804
2131
|
|
2805
|
-
@property
|
2806
|
-
@pulumi.getter(name="privateKey")
|
2807
|
-
def private_key(self) -> Optional[pulumi.Input[str]]:
|
2808
|
-
"""
|
2809
|
-
The secret key used for the x509 client certificate. Must be PEM encoded.
|
2810
|
-
"""
|
2811
|
-
return pulumi.get(self, "private_key")
|
2812
|
-
|
2813
|
-
@private_key.setter
|
2814
|
-
def private_key(self, value: Optional[pulumi.Input[str]]):
|
2815
|
-
pulumi.set(self, "private_key", value)
|
2816
|
-
|
2817
|
-
@property
|
2818
|
-
@pulumi.getter(name="selfManaged")
|
2819
|
-
def self_managed(self) -> Optional[pulumi.Input[bool]]:
|
2820
|
-
"""
|
2821
|
-
If set, allows onboarding static roles with a rootless connection configuration.
|
2822
|
-
"""
|
2823
|
-
return pulumi.get(self, "self_managed")
|
2824
|
-
|
2825
|
-
@self_managed.setter
|
2826
|
-
def self_managed(self, value: Optional[pulumi.Input[bool]]):
|
2827
|
-
pulumi.set(self, "self_managed", value)
|
2828
|
-
|
2829
2132
|
@property
|
2830
2133
|
@pulumi.getter(name="serviceAccountJson")
|
2831
2134
|
def service_account_json(self) -> Optional[pulumi.Input[str]]:
|
@@ -2838,30 +2141,6 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2838
2141
|
def service_account_json(self, value: Optional[pulumi.Input[str]]):
|
2839
2142
|
pulumi.set(self, "service_account_json", value)
|
2840
2143
|
|
2841
|
-
@property
|
2842
|
-
@pulumi.getter(name="tlsCa")
|
2843
|
-
def tls_ca(self) -> Optional[pulumi.Input[str]]:
|
2844
|
-
"""
|
2845
|
-
The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
2846
|
-
"""
|
2847
|
-
return pulumi.get(self, "tls_ca")
|
2848
|
-
|
2849
|
-
@tls_ca.setter
|
2850
|
-
def tls_ca(self, value: Optional[pulumi.Input[str]]):
|
2851
|
-
pulumi.set(self, "tls_ca", value)
|
2852
|
-
|
2853
|
-
@property
|
2854
|
-
@pulumi.getter(name="tlsCertificate")
|
2855
|
-
def tls_certificate(self) -> Optional[pulumi.Input[str]]:
|
2856
|
-
"""
|
2857
|
-
The x509 client certificate for connecting to the database. Must be PEM encoded.
|
2858
|
-
"""
|
2859
|
-
return pulumi.get(self, "tls_certificate")
|
2860
|
-
|
2861
|
-
@tls_certificate.setter
|
2862
|
-
def tls_certificate(self, value: Optional[pulumi.Input[str]]):
|
2863
|
-
pulumi.set(self, "tls_certificate", value)
|
2864
|
-
|
2865
2144
|
@property
|
2866
2145
|
@pulumi.getter
|
2867
2146
|
def username(self) -> Optional[pulumi.Input[str]]:
|
@@ -2887,39 +2166,6 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2887
2166
|
pulumi.set(self, "username_template", value)
|
2888
2167
|
|
2889
2168
|
|
2890
|
-
if not MYPY:
|
2891
|
-
class SecretBackendConnectionRedisArgsDict(TypedDict):
|
2892
|
-
host: pulumi.Input[str]
|
2893
|
-
"""
|
2894
|
-
Specifies the host to connect to
|
2895
|
-
"""
|
2896
|
-
password: pulumi.Input[str]
|
2897
|
-
"""
|
2898
|
-
Specifies the password corresponding to the given username.
|
2899
|
-
"""
|
2900
|
-
username: pulumi.Input[str]
|
2901
|
-
"""
|
2902
|
-
Specifies the username for Vault to use.
|
2903
|
-
"""
|
2904
|
-
ca_cert: NotRequired[pulumi.Input[str]]
|
2905
|
-
"""
|
2906
|
-
The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
|
2907
|
-
"""
|
2908
|
-
insecure_tls: NotRequired[pulumi.Input[bool]]
|
2909
|
-
"""
|
2910
|
-
Specifies whether to skip verification of the server certificate when using TLS.
|
2911
|
-
"""
|
2912
|
-
port: NotRequired[pulumi.Input[int]]
|
2913
|
-
"""
|
2914
|
-
The transport port to use to connect to Redis.
|
2915
|
-
"""
|
2916
|
-
tls: NotRequired[pulumi.Input[bool]]
|
2917
|
-
"""
|
2918
|
-
Specifies whether to use TLS when connecting to Redis.
|
2919
|
-
"""
|
2920
|
-
elif False:
|
2921
|
-
SecretBackendConnectionRedisArgsDict: TypeAlias = Mapping[str, Any]
|
2922
|
-
|
2923
2169
|
@pulumi.input_type
|
2924
2170
|
class SecretBackendConnectionRedisArgs:
|
2925
2171
|
def __init__(__self__, *,
|
@@ -3036,27 +2282,6 @@ class SecretBackendConnectionRedisArgs:
|
|
3036
2282
|
pulumi.set(self, "tls", value)
|
3037
2283
|
|
3038
2284
|
|
3039
|
-
if not MYPY:
|
3040
|
-
class SecretBackendConnectionRedisElasticacheArgsDict(TypedDict):
|
3041
|
-
url: pulumi.Input[str]
|
3042
|
-
"""
|
3043
|
-
The configuration endpoint for the ElastiCache cluster to connect to.
|
3044
|
-
"""
|
3045
|
-
password: NotRequired[pulumi.Input[str]]
|
3046
|
-
"""
|
3047
|
-
The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
3048
|
-
"""
|
3049
|
-
region: NotRequired[pulumi.Input[str]]
|
3050
|
-
"""
|
3051
|
-
The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
|
3052
|
-
"""
|
3053
|
-
username: NotRequired[pulumi.Input[str]]
|
3054
|
-
"""
|
3055
|
-
The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
3056
|
-
"""
|
3057
|
-
elif False:
|
3058
|
-
SecretBackendConnectionRedisElasticacheArgsDict: TypeAlias = Mapping[str, Any]
|
3059
|
-
|
3060
2285
|
@pulumi.input_type
|
3061
2286
|
class SecretBackendConnectionRedisElasticacheArgs:
|
3062
2287
|
def __init__(__self__, *,
|
@@ -3127,43 +2352,6 @@ class SecretBackendConnectionRedisElasticacheArgs:
|
|
3127
2352
|
pulumi.set(self, "username", value)
|
3128
2353
|
|
3129
2354
|
|
3130
|
-
if not MYPY:
|
3131
|
-
class SecretBackendConnectionRedshiftArgsDict(TypedDict):
|
3132
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
3133
|
-
"""
|
3134
|
-
Connection string to use to connect to the database.
|
3135
|
-
"""
|
3136
|
-
disable_escaping: NotRequired[pulumi.Input[bool]]
|
3137
|
-
"""
|
3138
|
-
Disable special character escaping in username and password
|
3139
|
-
"""
|
3140
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
3141
|
-
"""
|
3142
|
-
Maximum number of seconds a connection may be reused.
|
3143
|
-
"""
|
3144
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
3145
|
-
"""
|
3146
|
-
Maximum number of idle connections to the database.
|
3147
|
-
"""
|
3148
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
3149
|
-
"""
|
3150
|
-
Maximum number of open connections to the database.
|
3151
|
-
"""
|
3152
|
-
password: NotRequired[pulumi.Input[str]]
|
3153
|
-
"""
|
3154
|
-
The root credential password used in the connection URL
|
3155
|
-
"""
|
3156
|
-
username: NotRequired[pulumi.Input[str]]
|
3157
|
-
"""
|
3158
|
-
The root credential username used in the connection URL
|
3159
|
-
"""
|
3160
|
-
username_template: NotRequired[pulumi.Input[str]]
|
3161
|
-
"""
|
3162
|
-
Username generation template.
|
3163
|
-
"""
|
3164
|
-
elif False:
|
3165
|
-
SecretBackendConnectionRedshiftArgsDict: TypeAlias = Mapping[str, Any]
|
3166
|
-
|
3167
2355
|
@pulumi.input_type
|
3168
2356
|
class SecretBackendConnectionRedshiftArgs:
|
3169
2357
|
def __init__(__self__, *,
|
@@ -3299,39 +2487,6 @@ class SecretBackendConnectionRedshiftArgs:
|
|
3299
2487
|
pulumi.set(self, "username_template", value)
|
3300
2488
|
|
3301
2489
|
|
3302
|
-
if not MYPY:
|
3303
|
-
class SecretBackendConnectionSnowflakeArgsDict(TypedDict):
|
3304
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
3305
|
-
"""
|
3306
|
-
Connection string to use to connect to the database.
|
3307
|
-
"""
|
3308
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
3309
|
-
"""
|
3310
|
-
Maximum number of seconds a connection may be reused.
|
3311
|
-
"""
|
3312
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
3313
|
-
"""
|
3314
|
-
Maximum number of idle connections to the database.
|
3315
|
-
"""
|
3316
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
3317
|
-
"""
|
3318
|
-
Maximum number of open connections to the database.
|
3319
|
-
"""
|
3320
|
-
password: NotRequired[pulumi.Input[str]]
|
3321
|
-
"""
|
3322
|
-
The root credential password used in the connection URL
|
3323
|
-
"""
|
3324
|
-
username: NotRequired[pulumi.Input[str]]
|
3325
|
-
"""
|
3326
|
-
The root credential username used in the connection URL
|
3327
|
-
"""
|
3328
|
-
username_template: NotRequired[pulumi.Input[str]]
|
3329
|
-
"""
|
3330
|
-
Username generation template.
|
3331
|
-
"""
|
3332
|
-
elif False:
|
3333
|
-
SecretBackendConnectionSnowflakeArgsDict: TypeAlias = Mapping[str, Any]
|
3334
|
-
|
3335
2490
|
@pulumi.input_type
|
3336
2491
|
class SecretBackendConnectionSnowflakeArgs:
|
3337
2492
|
def __init__(__self__, *,
|
@@ -3451,83 +2606,6 @@ class SecretBackendConnectionSnowflakeArgs:
|
|
3451
2606
|
pulumi.set(self, "username_template", value)
|
3452
2607
|
|
3453
2608
|
|
3454
|
-
if not MYPY:
|
3455
|
-
class SecretsMountCassandraArgsDict(TypedDict):
|
3456
|
-
name: pulumi.Input[str]
|
3457
|
-
"""
|
3458
|
-
Name of the database connection.
|
3459
|
-
"""
|
3460
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
3461
|
-
"""
|
3462
|
-
A list of roles that are allowed to use this
|
3463
|
-
connection.
|
3464
|
-
"""
|
3465
|
-
connect_timeout: NotRequired[pulumi.Input[int]]
|
3466
|
-
"""
|
3467
|
-
The number of seconds to use as a connection timeout.
|
3468
|
-
"""
|
3469
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
3470
|
-
"""
|
3471
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3472
|
-
|
3473
|
-
Supported list of database secrets engines that can be configured:
|
3474
|
-
"""
|
3475
|
-
hosts: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
3476
|
-
"""
|
3477
|
-
Cassandra hosts to connect to.
|
3478
|
-
"""
|
3479
|
-
insecure_tls: NotRequired[pulumi.Input[bool]]
|
3480
|
-
"""
|
3481
|
-
Whether to skip verification of the server certificate when using TLS.
|
3482
|
-
"""
|
3483
|
-
password: NotRequired[pulumi.Input[str]]
|
3484
|
-
"""
|
3485
|
-
The password to use when authenticating with Cassandra.
|
3486
|
-
"""
|
3487
|
-
pem_bundle: NotRequired[pulumi.Input[str]]
|
3488
|
-
"""
|
3489
|
-
Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
3490
|
-
"""
|
3491
|
-
pem_json: NotRequired[pulumi.Input[str]]
|
3492
|
-
"""
|
3493
|
-
Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
3494
|
-
"""
|
3495
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
3496
|
-
"""
|
3497
|
-
Specifies the name of the plugin to use.
|
3498
|
-
"""
|
3499
|
-
port: NotRequired[pulumi.Input[int]]
|
3500
|
-
"""
|
3501
|
-
The transport port to use to connect to Cassandra.
|
3502
|
-
"""
|
3503
|
-
protocol_version: NotRequired[pulumi.Input[int]]
|
3504
|
-
"""
|
3505
|
-
The CQL protocol version to use.
|
3506
|
-
"""
|
3507
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
3508
|
-
"""
|
3509
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
3510
|
-
"""
|
3511
|
-
skip_verification: NotRequired[pulumi.Input[bool]]
|
3512
|
-
"""
|
3513
|
-
Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
3514
|
-
"""
|
3515
|
-
tls: NotRequired[pulumi.Input[bool]]
|
3516
|
-
"""
|
3517
|
-
Whether to use TLS when connecting to Cassandra.
|
3518
|
-
"""
|
3519
|
-
username: NotRequired[pulumi.Input[str]]
|
3520
|
-
"""
|
3521
|
-
The username to use when authenticating with Cassandra.
|
3522
|
-
"""
|
3523
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
3524
|
-
"""
|
3525
|
-
Whether the connection should be verified on
|
3526
|
-
initial configuration or not.
|
3527
|
-
"""
|
3528
|
-
elif False:
|
3529
|
-
SecretsMountCassandraArgsDict: TypeAlias = Mapping[str, Any]
|
3530
|
-
|
3531
2609
|
@pulumi.input_type
|
3532
2610
|
class SecretsMountCassandraArgs:
|
3533
2611
|
def __init__(__self__, *,
|
@@ -3544,7 +2622,6 @@ class SecretsMountCassandraArgs:
|
|
3544
2622
|
port: Optional[pulumi.Input[int]] = None,
|
3545
2623
|
protocol_version: Optional[pulumi.Input[int]] = None,
|
3546
2624
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
3547
|
-
skip_verification: Optional[pulumi.Input[bool]] = None,
|
3548
2625
|
tls: Optional[pulumi.Input[bool]] = None,
|
3549
2626
|
username: Optional[pulumi.Input[str]] = None,
|
3550
2627
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
@@ -3565,7 +2642,6 @@ class SecretsMountCassandraArgs:
|
|
3565
2642
|
:param pulumi.Input[int] port: The transport port to use to connect to Cassandra.
|
3566
2643
|
:param pulumi.Input[int] protocol_version: The CQL protocol version to use.
|
3567
2644
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
3568
|
-
:param pulumi.Input[bool] skip_verification: Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
3569
2645
|
:param pulumi.Input[bool] tls: Whether to use TLS when connecting to Cassandra.
|
3570
2646
|
:param pulumi.Input[str] username: The username to use when authenticating with Cassandra.
|
3571
2647
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
@@ -3596,8 +2672,6 @@ class SecretsMountCassandraArgs:
|
|
3596
2672
|
pulumi.set(__self__, "protocol_version", protocol_version)
|
3597
2673
|
if root_rotation_statements is not None:
|
3598
2674
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
3599
|
-
if skip_verification is not None:
|
3600
|
-
pulumi.set(__self__, "skip_verification", skip_verification)
|
3601
2675
|
if tls is not None:
|
3602
2676
|
pulumi.set(__self__, "tls", tls)
|
3603
2677
|
if username is not None:
|
@@ -3764,18 +2838,6 @@ class SecretsMountCassandraArgs:
|
|
3764
2838
|
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
3765
2839
|
pulumi.set(self, "root_rotation_statements", value)
|
3766
2840
|
|
3767
|
-
@property
|
3768
|
-
@pulumi.getter(name="skipVerification")
|
3769
|
-
def skip_verification(self) -> Optional[pulumi.Input[bool]]:
|
3770
|
-
"""
|
3771
|
-
Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
3772
|
-
"""
|
3773
|
-
return pulumi.get(self, "skip_verification")
|
3774
|
-
|
3775
|
-
@skip_verification.setter
|
3776
|
-
def skip_verification(self, value: Optional[pulumi.Input[bool]]):
|
3777
|
-
pulumi.set(self, "skip_verification", value)
|
3778
|
-
|
3779
2841
|
@property
|
3780
2842
|
@pulumi.getter
|
3781
2843
|
def tls(self) -> Optional[pulumi.Input[bool]]:
|
@@ -3814,71 +2876,6 @@ class SecretsMountCassandraArgs:
|
|
3814
2876
|
pulumi.set(self, "verify_connection", value)
|
3815
2877
|
|
3816
2878
|
|
3817
|
-
if not MYPY:
|
3818
|
-
class SecretsMountCouchbaseArgsDict(TypedDict):
|
3819
|
-
hosts: pulumi.Input[Sequence[pulumi.Input[str]]]
|
3820
|
-
"""
|
3821
|
-
A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
|
3822
|
-
"""
|
3823
|
-
name: pulumi.Input[str]
|
3824
|
-
"""
|
3825
|
-
Name of the database connection.
|
3826
|
-
"""
|
3827
|
-
password: pulumi.Input[str]
|
3828
|
-
"""
|
3829
|
-
Specifies the password corresponding to the given username.
|
3830
|
-
"""
|
3831
|
-
username: pulumi.Input[str]
|
3832
|
-
"""
|
3833
|
-
Specifies the username for Vault to use.
|
3834
|
-
"""
|
3835
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
3836
|
-
"""
|
3837
|
-
A list of roles that are allowed to use this
|
3838
|
-
connection.
|
3839
|
-
"""
|
3840
|
-
base64_pem: NotRequired[pulumi.Input[str]]
|
3841
|
-
"""
|
3842
|
-
Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
|
3843
|
-
"""
|
3844
|
-
bucket_name: NotRequired[pulumi.Input[str]]
|
3845
|
-
"""
|
3846
|
-
Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
|
3847
|
-
"""
|
3848
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
3849
|
-
"""
|
3850
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3851
|
-
|
3852
|
-
Supported list of database secrets engines that can be configured:
|
3853
|
-
"""
|
3854
|
-
insecure_tls: NotRequired[pulumi.Input[bool]]
|
3855
|
-
"""
|
3856
|
-
Specifies whether to skip verification of the server certificate when using TLS.
|
3857
|
-
"""
|
3858
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
3859
|
-
"""
|
3860
|
-
Specifies the name of the plugin to use.
|
3861
|
-
"""
|
3862
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
3863
|
-
"""
|
3864
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
3865
|
-
"""
|
3866
|
-
tls: NotRequired[pulumi.Input[bool]]
|
3867
|
-
"""
|
3868
|
-
Specifies whether to use TLS when connecting to Couchbase.
|
3869
|
-
"""
|
3870
|
-
username_template: NotRequired[pulumi.Input[str]]
|
3871
|
-
"""
|
3872
|
-
Template describing how dynamic usernames are generated.
|
3873
|
-
"""
|
3874
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
3875
|
-
"""
|
3876
|
-
Whether the connection should be verified on
|
3877
|
-
initial configuration or not.
|
3878
|
-
"""
|
3879
|
-
elif False:
|
3880
|
-
SecretsMountCouchbaseArgsDict: TypeAlias = Mapping[str, Any]
|
3881
|
-
|
3882
2879
|
@pulumi.input_type
|
3883
2880
|
class SecretsMountCouchbaseArgs:
|
3884
2881
|
def __init__(__self__, *,
|
@@ -4114,79 +3111,6 @@ class SecretsMountCouchbaseArgs:
|
|
4114
3111
|
pulumi.set(self, "verify_connection", value)
|
4115
3112
|
|
4116
3113
|
|
4117
|
-
if not MYPY:
|
4118
|
-
class SecretsMountElasticsearchArgsDict(TypedDict):
|
4119
|
-
name: pulumi.Input[str]
|
4120
|
-
"""
|
4121
|
-
Name of the database connection.
|
4122
|
-
"""
|
4123
|
-
password: pulumi.Input[str]
|
4124
|
-
"""
|
4125
|
-
The password to be used in the connection URL
|
4126
|
-
"""
|
4127
|
-
url: pulumi.Input[str]
|
4128
|
-
"""
|
4129
|
-
The URL for Elasticsearch's API
|
4130
|
-
"""
|
4131
|
-
username: pulumi.Input[str]
|
4132
|
-
"""
|
4133
|
-
The username to be used in the connection URL
|
4134
|
-
"""
|
4135
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4136
|
-
"""
|
4137
|
-
A list of roles that are allowed to use this
|
4138
|
-
connection.
|
4139
|
-
"""
|
4140
|
-
ca_cert: NotRequired[pulumi.Input[str]]
|
4141
|
-
"""
|
4142
|
-
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
4143
|
-
"""
|
4144
|
-
ca_path: NotRequired[pulumi.Input[str]]
|
4145
|
-
"""
|
4146
|
-
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
4147
|
-
"""
|
4148
|
-
client_cert: NotRequired[pulumi.Input[str]]
|
4149
|
-
"""
|
4150
|
-
The path to the certificate for the Elasticsearch client to present for communication
|
4151
|
-
"""
|
4152
|
-
client_key: NotRequired[pulumi.Input[str]]
|
4153
|
-
"""
|
4154
|
-
The path to the key for the Elasticsearch client to use for communication
|
4155
|
-
"""
|
4156
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
4157
|
-
"""
|
4158
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4159
|
-
|
4160
|
-
Supported list of database secrets engines that can be configured:
|
4161
|
-
"""
|
4162
|
-
insecure: NotRequired[pulumi.Input[bool]]
|
4163
|
-
"""
|
4164
|
-
Whether to disable certificate verification
|
4165
|
-
"""
|
4166
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
4167
|
-
"""
|
4168
|
-
Specifies the name of the plugin to use.
|
4169
|
-
"""
|
4170
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4171
|
-
"""
|
4172
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
4173
|
-
"""
|
4174
|
-
tls_server_name: NotRequired[pulumi.Input[str]]
|
4175
|
-
"""
|
4176
|
-
This, if set, is used to set the SNI host when connecting via TLS
|
4177
|
-
"""
|
4178
|
-
username_template: NotRequired[pulumi.Input[str]]
|
4179
|
-
"""
|
4180
|
-
Template describing how dynamic usernames are generated.
|
4181
|
-
"""
|
4182
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
4183
|
-
"""
|
4184
|
-
Whether the connection should be verified on
|
4185
|
-
initial configuration or not.
|
4186
|
-
"""
|
4187
|
-
elif False:
|
4188
|
-
SecretsMountElasticsearchArgsDict: TypeAlias = Mapping[str, Any]
|
4189
|
-
|
4190
3114
|
@pulumi.input_type
|
4191
3115
|
class SecretsMountElasticsearchArgs:
|
4192
3116
|
def __init__(__self__, *,
|
@@ -4454,67 +3378,6 @@ class SecretsMountElasticsearchArgs:
|
|
4454
3378
|
pulumi.set(self, "verify_connection", value)
|
4455
3379
|
|
4456
3380
|
|
4457
|
-
if not MYPY:
|
4458
|
-
class SecretsMountHanaArgsDict(TypedDict):
|
4459
|
-
name: pulumi.Input[str]
|
4460
|
-
"""
|
4461
|
-
Name of the database connection.
|
4462
|
-
"""
|
4463
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4464
|
-
"""
|
4465
|
-
A list of roles that are allowed to use this
|
4466
|
-
connection.
|
4467
|
-
"""
|
4468
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
4469
|
-
"""
|
4470
|
-
Connection string to use to connect to the database.
|
4471
|
-
"""
|
4472
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
4473
|
-
"""
|
4474
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4475
|
-
|
4476
|
-
Supported list of database secrets engines that can be configured:
|
4477
|
-
"""
|
4478
|
-
disable_escaping: NotRequired[pulumi.Input[bool]]
|
4479
|
-
"""
|
4480
|
-
Disable special character escaping in username and password
|
4481
|
-
"""
|
4482
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
4483
|
-
"""
|
4484
|
-
Maximum number of seconds a connection may be reused.
|
4485
|
-
"""
|
4486
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
4487
|
-
"""
|
4488
|
-
Maximum number of idle connections to the database.
|
4489
|
-
"""
|
4490
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
4491
|
-
"""
|
4492
|
-
Maximum number of open connections to the database.
|
4493
|
-
"""
|
4494
|
-
password: NotRequired[pulumi.Input[str]]
|
4495
|
-
"""
|
4496
|
-
The root credential password used in the connection URL
|
4497
|
-
"""
|
4498
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
4499
|
-
"""
|
4500
|
-
Specifies the name of the plugin to use.
|
4501
|
-
"""
|
4502
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4503
|
-
"""
|
4504
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
4505
|
-
"""
|
4506
|
-
username: NotRequired[pulumi.Input[str]]
|
4507
|
-
"""
|
4508
|
-
The root credential username used in the connection URL
|
4509
|
-
"""
|
4510
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
4511
|
-
"""
|
4512
|
-
Whether the connection should be verified on
|
4513
|
-
initial configuration or not.
|
4514
|
-
"""
|
4515
|
-
elif False:
|
4516
|
-
SecretsMountHanaArgsDict: TypeAlias = Mapping[str, Any]
|
4517
|
-
|
4518
3381
|
@pulumi.input_type
|
4519
3382
|
class SecretsMountHanaArgs:
|
4520
3383
|
def __init__(__self__, *,
|
@@ -4737,79 +3600,6 @@ class SecretsMountHanaArgs:
|
|
4737
3600
|
pulumi.set(self, "verify_connection", value)
|
4738
3601
|
|
4739
3602
|
|
4740
|
-
if not MYPY:
|
4741
|
-
class SecretsMountInfluxdbArgsDict(TypedDict):
|
4742
|
-
host: pulumi.Input[str]
|
4743
|
-
"""
|
4744
|
-
Influxdb host to connect to.
|
4745
|
-
"""
|
4746
|
-
name: pulumi.Input[str]
|
4747
|
-
"""
|
4748
|
-
Name of the database connection.
|
4749
|
-
"""
|
4750
|
-
password: pulumi.Input[str]
|
4751
|
-
"""
|
4752
|
-
Specifies the password corresponding to the given username.
|
4753
|
-
"""
|
4754
|
-
username: pulumi.Input[str]
|
4755
|
-
"""
|
4756
|
-
Specifies the username to use for superuser access.
|
4757
|
-
"""
|
4758
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4759
|
-
"""
|
4760
|
-
A list of roles that are allowed to use this
|
4761
|
-
connection.
|
4762
|
-
"""
|
4763
|
-
connect_timeout: NotRequired[pulumi.Input[int]]
|
4764
|
-
"""
|
4765
|
-
The number of seconds to use as a connection timeout.
|
4766
|
-
"""
|
4767
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
4768
|
-
"""
|
4769
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4770
|
-
|
4771
|
-
Supported list of database secrets engines that can be configured:
|
4772
|
-
"""
|
4773
|
-
insecure_tls: NotRequired[pulumi.Input[bool]]
|
4774
|
-
"""
|
4775
|
-
Whether to skip verification of the server certificate when using TLS.
|
4776
|
-
"""
|
4777
|
-
pem_bundle: NotRequired[pulumi.Input[str]]
|
4778
|
-
"""
|
4779
|
-
Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
4780
|
-
"""
|
4781
|
-
pem_json: NotRequired[pulumi.Input[str]]
|
4782
|
-
"""
|
4783
|
-
Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
4784
|
-
"""
|
4785
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
4786
|
-
"""
|
4787
|
-
Specifies the name of the plugin to use.
|
4788
|
-
"""
|
4789
|
-
port: NotRequired[pulumi.Input[int]]
|
4790
|
-
"""
|
4791
|
-
The transport port to use to connect to Influxdb.
|
4792
|
-
"""
|
4793
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4794
|
-
"""
|
4795
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
4796
|
-
"""
|
4797
|
-
tls: NotRequired[pulumi.Input[bool]]
|
4798
|
-
"""
|
4799
|
-
Whether to use TLS when connecting to Influxdb.
|
4800
|
-
"""
|
4801
|
-
username_template: NotRequired[pulumi.Input[str]]
|
4802
|
-
"""
|
4803
|
-
Template describing how dynamic usernames are generated.
|
4804
|
-
"""
|
4805
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
4806
|
-
"""
|
4807
|
-
Whether the connection should be verified on
|
4808
|
-
initial configuration or not.
|
4809
|
-
"""
|
4810
|
-
elif False:
|
4811
|
-
SecretsMountInfluxdbArgsDict: TypeAlias = Mapping[str, Any]
|
4812
|
-
|
4813
3603
|
@pulumi.input_type
|
4814
3604
|
class SecretsMountInfluxdbArgs:
|
4815
3605
|
def __init__(__self__, *,
|
@@ -5077,67 +3867,6 @@ class SecretsMountInfluxdbArgs:
|
|
5077
3867
|
pulumi.set(self, "verify_connection", value)
|
5078
3868
|
|
5079
3869
|
|
5080
|
-
if not MYPY:
|
5081
|
-
class SecretsMountMongodbArgsDict(TypedDict):
|
5082
|
-
name: pulumi.Input[str]
|
5083
|
-
"""
|
5084
|
-
Name of the database connection.
|
5085
|
-
"""
|
5086
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5087
|
-
"""
|
5088
|
-
A list of roles that are allowed to use this
|
5089
|
-
connection.
|
5090
|
-
"""
|
5091
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
5092
|
-
"""
|
5093
|
-
Connection string to use to connect to the database.
|
5094
|
-
"""
|
5095
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
5096
|
-
"""
|
5097
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5098
|
-
|
5099
|
-
Supported list of database secrets engines that can be configured:
|
5100
|
-
"""
|
5101
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
5102
|
-
"""
|
5103
|
-
Maximum number of seconds a connection may be reused.
|
5104
|
-
"""
|
5105
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
5106
|
-
"""
|
5107
|
-
Maximum number of idle connections to the database.
|
5108
|
-
"""
|
5109
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
5110
|
-
"""
|
5111
|
-
Maximum number of open connections to the database.
|
5112
|
-
"""
|
5113
|
-
password: NotRequired[pulumi.Input[str]]
|
5114
|
-
"""
|
5115
|
-
The root credential password used in the connection URL
|
5116
|
-
"""
|
5117
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
5118
|
-
"""
|
5119
|
-
Specifies the name of the plugin to use.
|
5120
|
-
"""
|
5121
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5122
|
-
"""
|
5123
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
5124
|
-
"""
|
5125
|
-
username: NotRequired[pulumi.Input[str]]
|
5126
|
-
"""
|
5127
|
-
The root credential username used in the connection URL
|
5128
|
-
"""
|
5129
|
-
username_template: NotRequired[pulumi.Input[str]]
|
5130
|
-
"""
|
5131
|
-
Username generation template.
|
5132
|
-
"""
|
5133
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
5134
|
-
"""
|
5135
|
-
Whether the connection should be verified on
|
5136
|
-
initial configuration or not.
|
5137
|
-
"""
|
5138
|
-
elif False:
|
5139
|
-
SecretsMountMongodbArgsDict: TypeAlias = Mapping[str, Any]
|
5140
|
-
|
5141
3870
|
@pulumi.input_type
|
5142
3871
|
class SecretsMountMongodbArgs:
|
5143
3872
|
def __init__(__self__, *,
|
@@ -5360,51 +4089,6 @@ class SecretsMountMongodbArgs:
|
|
5360
4089
|
pulumi.set(self, "verify_connection", value)
|
5361
4090
|
|
5362
4091
|
|
5363
|
-
if not MYPY:
|
5364
|
-
class SecretsMountMongodbatlaArgsDict(TypedDict):
|
5365
|
-
name: pulumi.Input[str]
|
5366
|
-
"""
|
5367
|
-
Name of the database connection.
|
5368
|
-
"""
|
5369
|
-
private_key: pulumi.Input[str]
|
5370
|
-
"""
|
5371
|
-
The Private Programmatic API Key used to connect with MongoDB Atlas API.
|
5372
|
-
"""
|
5373
|
-
project_id: pulumi.Input[str]
|
5374
|
-
"""
|
5375
|
-
The Project ID the Database User should be created within.
|
5376
|
-
"""
|
5377
|
-
public_key: pulumi.Input[str]
|
5378
|
-
"""
|
5379
|
-
The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
|
5380
|
-
"""
|
5381
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5382
|
-
"""
|
5383
|
-
A list of roles that are allowed to use this
|
5384
|
-
connection.
|
5385
|
-
"""
|
5386
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
5387
|
-
"""
|
5388
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5389
|
-
|
5390
|
-
Supported list of database secrets engines that can be configured:
|
5391
|
-
"""
|
5392
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
5393
|
-
"""
|
5394
|
-
Specifies the name of the plugin to use.
|
5395
|
-
"""
|
5396
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5397
|
-
"""
|
5398
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
5399
|
-
"""
|
5400
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
5401
|
-
"""
|
5402
|
-
Whether the connection should be verified on
|
5403
|
-
initial configuration or not.
|
5404
|
-
"""
|
5405
|
-
elif False:
|
5406
|
-
SecretsMountMongodbatlaArgsDict: TypeAlias = Mapping[str, Any]
|
5407
|
-
|
5408
4092
|
@pulumi.input_type
|
5409
4093
|
class SecretsMountMongodbatlaArgs:
|
5410
4094
|
def __init__(__self__, *,
|
@@ -5560,75 +4244,6 @@ class SecretsMountMongodbatlaArgs:
|
|
5560
4244
|
pulumi.set(self, "verify_connection", value)
|
5561
4245
|
|
5562
4246
|
|
5563
|
-
if not MYPY:
|
5564
|
-
class SecretsMountMssqlArgsDict(TypedDict):
|
5565
|
-
name: pulumi.Input[str]
|
5566
|
-
"""
|
5567
|
-
Name of the database connection.
|
5568
|
-
"""
|
5569
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5570
|
-
"""
|
5571
|
-
A list of roles that are allowed to use this
|
5572
|
-
connection.
|
5573
|
-
"""
|
5574
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
5575
|
-
"""
|
5576
|
-
Connection string to use to connect to the database.
|
5577
|
-
"""
|
5578
|
-
contained_db: NotRequired[pulumi.Input[bool]]
|
5579
|
-
"""
|
5580
|
-
Set to true when the target is a Contained Database, e.g. AzureSQL.
|
5581
|
-
"""
|
5582
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
5583
|
-
"""
|
5584
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5585
|
-
|
5586
|
-
Supported list of database secrets engines that can be configured:
|
5587
|
-
"""
|
5588
|
-
disable_escaping: NotRequired[pulumi.Input[bool]]
|
5589
|
-
"""
|
5590
|
-
Disable special character escaping in username and password
|
5591
|
-
"""
|
5592
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
5593
|
-
"""
|
5594
|
-
Maximum number of seconds a connection may be reused.
|
5595
|
-
"""
|
5596
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
5597
|
-
"""
|
5598
|
-
Maximum number of idle connections to the database.
|
5599
|
-
"""
|
5600
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
5601
|
-
"""
|
5602
|
-
Maximum number of open connections to the database.
|
5603
|
-
"""
|
5604
|
-
password: NotRequired[pulumi.Input[str]]
|
5605
|
-
"""
|
5606
|
-
The root credential password used in the connection URL
|
5607
|
-
"""
|
5608
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
5609
|
-
"""
|
5610
|
-
Specifies the name of the plugin to use.
|
5611
|
-
"""
|
5612
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5613
|
-
"""
|
5614
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
5615
|
-
"""
|
5616
|
-
username: NotRequired[pulumi.Input[str]]
|
5617
|
-
"""
|
5618
|
-
The root credential username used in the connection URL
|
5619
|
-
"""
|
5620
|
-
username_template: NotRequired[pulumi.Input[str]]
|
5621
|
-
"""
|
5622
|
-
Username generation template.
|
5623
|
-
"""
|
5624
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
5625
|
-
"""
|
5626
|
-
Whether the connection should be verified on
|
5627
|
-
initial configuration or not.
|
5628
|
-
"""
|
5629
|
-
elif False:
|
5630
|
-
SecretsMountMssqlArgsDict: TypeAlias = Mapping[str, Any]
|
5631
|
-
|
5632
4247
|
@pulumi.input_type
|
5633
4248
|
class SecretsMountMssqlArgs:
|
5634
4249
|
def __init__(__self__, *,
|
@@ -5883,83 +4498,6 @@ class SecretsMountMssqlArgs:
|
|
5883
4498
|
pulumi.set(self, "verify_connection", value)
|
5884
4499
|
|
5885
4500
|
|
5886
|
-
if not MYPY:
|
5887
|
-
class SecretsMountMysqlArgsDict(TypedDict):
|
5888
|
-
name: pulumi.Input[str]
|
5889
|
-
"""
|
5890
|
-
Name of the database connection.
|
5891
|
-
"""
|
5892
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5893
|
-
"""
|
5894
|
-
A list of roles that are allowed to use this
|
5895
|
-
connection.
|
5896
|
-
"""
|
5897
|
-
auth_type: NotRequired[pulumi.Input[str]]
|
5898
|
-
"""
|
5899
|
-
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5900
|
-
"""
|
5901
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
5902
|
-
"""
|
5903
|
-
Connection string to use to connect to the database.
|
5904
|
-
"""
|
5905
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
5906
|
-
"""
|
5907
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5908
|
-
|
5909
|
-
Supported list of database secrets engines that can be configured:
|
5910
|
-
"""
|
5911
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
5912
|
-
"""
|
5913
|
-
Maximum number of seconds a connection may be reused.
|
5914
|
-
"""
|
5915
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
5916
|
-
"""
|
5917
|
-
Maximum number of idle connections to the database.
|
5918
|
-
"""
|
5919
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
5920
|
-
"""
|
5921
|
-
Maximum number of open connections to the database.
|
5922
|
-
"""
|
5923
|
-
password: NotRequired[pulumi.Input[str]]
|
5924
|
-
"""
|
5925
|
-
The root credential password used in the connection URL
|
5926
|
-
"""
|
5927
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
5928
|
-
"""
|
5929
|
-
Specifies the name of the plugin to use.
|
5930
|
-
"""
|
5931
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5932
|
-
"""
|
5933
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
5934
|
-
"""
|
5935
|
-
service_account_json: NotRequired[pulumi.Input[str]]
|
5936
|
-
"""
|
5937
|
-
A JSON encoded credential for use with IAM authorization
|
5938
|
-
"""
|
5939
|
-
tls_ca: NotRequired[pulumi.Input[str]]
|
5940
|
-
"""
|
5941
|
-
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
5942
|
-
"""
|
5943
|
-
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
5944
|
-
"""
|
5945
|
-
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
5946
|
-
"""
|
5947
|
-
username: NotRequired[pulumi.Input[str]]
|
5948
|
-
"""
|
5949
|
-
The root credential username used in the connection URL
|
5950
|
-
"""
|
5951
|
-
username_template: NotRequired[pulumi.Input[str]]
|
5952
|
-
"""
|
5953
|
-
Username generation template.
|
5954
|
-
"""
|
5955
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
5956
|
-
"""
|
5957
|
-
Whether the connection should be verified on
|
5958
|
-
initial configuration or not.
|
5959
|
-
"""
|
5960
|
-
elif False:
|
5961
|
-
SecretsMountMysqlArgsDict: TypeAlias = Mapping[str, Any]
|
5962
|
-
|
5963
4501
|
@pulumi.input_type
|
5964
4502
|
class SecretsMountMysqlArgs:
|
5965
4503
|
def __init__(__self__, *,
|
@@ -6246,103 +4784,26 @@ class SecretsMountMysqlArgs:
|
|
6246
4784
|
pulumi.set(self, "verify_connection", value)
|
6247
4785
|
|
6248
4786
|
|
6249
|
-
|
6250
|
-
|
6251
|
-
|
6252
|
-
|
6253
|
-
|
6254
|
-
|
6255
|
-
|
6256
|
-
|
6257
|
-
|
6258
|
-
|
6259
|
-
|
6260
|
-
|
6261
|
-
|
6262
|
-
|
6263
|
-
|
6264
|
-
|
6265
|
-
|
6266
|
-
|
6267
|
-
|
6268
|
-
|
6269
|
-
"""
|
6270
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6271
|
-
|
6272
|
-
Supported list of database secrets engines that can be configured:
|
6273
|
-
"""
|
6274
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
6275
|
-
"""
|
6276
|
-
Maximum number of seconds a connection may be reused.
|
6277
|
-
"""
|
6278
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
6279
|
-
"""
|
6280
|
-
Maximum number of idle connections to the database.
|
6281
|
-
"""
|
6282
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
6283
|
-
"""
|
6284
|
-
Maximum number of open connections to the database.
|
6285
|
-
"""
|
6286
|
-
password: NotRequired[pulumi.Input[str]]
|
6287
|
-
"""
|
6288
|
-
The root credential password used in the connection URL
|
6289
|
-
"""
|
6290
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
6291
|
-
"""
|
6292
|
-
Specifies the name of the plugin to use.
|
6293
|
-
"""
|
6294
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
6295
|
-
"""
|
6296
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
6297
|
-
"""
|
6298
|
-
service_account_json: NotRequired[pulumi.Input[str]]
|
6299
|
-
"""
|
6300
|
-
A JSON encoded credential for use with IAM authorization
|
6301
|
-
"""
|
6302
|
-
tls_ca: NotRequired[pulumi.Input[str]]
|
6303
|
-
"""
|
6304
|
-
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
6305
|
-
"""
|
6306
|
-
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
6307
|
-
"""
|
6308
|
-
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
6309
|
-
"""
|
6310
|
-
username: NotRequired[pulumi.Input[str]]
|
6311
|
-
"""
|
6312
|
-
The root credential username used in the connection URL
|
6313
|
-
"""
|
6314
|
-
username_template: NotRequired[pulumi.Input[str]]
|
6315
|
-
"""
|
6316
|
-
Username generation template.
|
6317
|
-
"""
|
6318
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
6319
|
-
"""
|
6320
|
-
Whether the connection should be verified on
|
6321
|
-
initial configuration or not.
|
6322
|
-
"""
|
6323
|
-
elif False:
|
6324
|
-
SecretsMountMysqlAuroraArgsDict: TypeAlias = Mapping[str, Any]
|
6325
|
-
|
6326
|
-
@pulumi.input_type
|
6327
|
-
class SecretsMountMysqlAuroraArgs:
|
6328
|
-
def __init__(__self__, *,
|
6329
|
-
name: pulumi.Input[str],
|
6330
|
-
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
6331
|
-
auth_type: Optional[pulumi.Input[str]] = None,
|
6332
|
-
connection_url: Optional[pulumi.Input[str]] = None,
|
6333
|
-
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
6334
|
-
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
6335
|
-
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
6336
|
-
max_open_connections: Optional[pulumi.Input[int]] = None,
|
6337
|
-
password: Optional[pulumi.Input[str]] = None,
|
6338
|
-
plugin_name: Optional[pulumi.Input[str]] = None,
|
6339
|
-
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
6340
|
-
service_account_json: Optional[pulumi.Input[str]] = None,
|
6341
|
-
tls_ca: Optional[pulumi.Input[str]] = None,
|
6342
|
-
tls_certificate_key: Optional[pulumi.Input[str]] = None,
|
6343
|
-
username: Optional[pulumi.Input[str]] = None,
|
6344
|
-
username_template: Optional[pulumi.Input[str]] = None,
|
6345
|
-
verify_connection: Optional[pulumi.Input[bool]] = None):
|
4787
|
+
@pulumi.input_type
|
4788
|
+
class SecretsMountMysqlAuroraArgs:
|
4789
|
+
def __init__(__self__, *,
|
4790
|
+
name: pulumi.Input[str],
|
4791
|
+
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
4792
|
+
auth_type: Optional[pulumi.Input[str]] = None,
|
4793
|
+
connection_url: Optional[pulumi.Input[str]] = None,
|
4794
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
4795
|
+
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
4796
|
+
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
4797
|
+
max_open_connections: Optional[pulumi.Input[int]] = None,
|
4798
|
+
password: Optional[pulumi.Input[str]] = None,
|
4799
|
+
plugin_name: Optional[pulumi.Input[str]] = None,
|
4800
|
+
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
4801
|
+
service_account_json: Optional[pulumi.Input[str]] = None,
|
4802
|
+
tls_ca: Optional[pulumi.Input[str]] = None,
|
4803
|
+
tls_certificate_key: Optional[pulumi.Input[str]] = None,
|
4804
|
+
username: Optional[pulumi.Input[str]] = None,
|
4805
|
+
username_template: Optional[pulumi.Input[str]] = None,
|
4806
|
+
verify_connection: Optional[pulumi.Input[bool]] = None):
|
6346
4807
|
"""
|
6347
4808
|
:param pulumi.Input[str] name: Name of the database connection.
|
6348
4809
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
@@ -6609,83 +5070,6 @@ class SecretsMountMysqlAuroraArgs:
|
|
6609
5070
|
pulumi.set(self, "verify_connection", value)
|
6610
5071
|
|
6611
5072
|
|
6612
|
-
if not MYPY:
|
6613
|
-
class SecretsMountMysqlLegacyArgsDict(TypedDict):
|
6614
|
-
name: pulumi.Input[str]
|
6615
|
-
"""
|
6616
|
-
Name of the database connection.
|
6617
|
-
"""
|
6618
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
6619
|
-
"""
|
6620
|
-
A list of roles that are allowed to use this
|
6621
|
-
connection.
|
6622
|
-
"""
|
6623
|
-
auth_type: NotRequired[pulumi.Input[str]]
|
6624
|
-
"""
|
6625
|
-
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
6626
|
-
"""
|
6627
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
6628
|
-
"""
|
6629
|
-
Connection string to use to connect to the database.
|
6630
|
-
"""
|
6631
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
6632
|
-
"""
|
6633
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6634
|
-
|
6635
|
-
Supported list of database secrets engines that can be configured:
|
6636
|
-
"""
|
6637
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
6638
|
-
"""
|
6639
|
-
Maximum number of seconds a connection may be reused.
|
6640
|
-
"""
|
6641
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
6642
|
-
"""
|
6643
|
-
Maximum number of idle connections to the database.
|
6644
|
-
"""
|
6645
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
6646
|
-
"""
|
6647
|
-
Maximum number of open connections to the database.
|
6648
|
-
"""
|
6649
|
-
password: NotRequired[pulumi.Input[str]]
|
6650
|
-
"""
|
6651
|
-
The root credential password used in the connection URL
|
6652
|
-
"""
|
6653
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
6654
|
-
"""
|
6655
|
-
Specifies the name of the plugin to use.
|
6656
|
-
"""
|
6657
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
6658
|
-
"""
|
6659
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
6660
|
-
"""
|
6661
|
-
service_account_json: NotRequired[pulumi.Input[str]]
|
6662
|
-
"""
|
6663
|
-
A JSON encoded credential for use with IAM authorization
|
6664
|
-
"""
|
6665
|
-
tls_ca: NotRequired[pulumi.Input[str]]
|
6666
|
-
"""
|
6667
|
-
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
6668
|
-
"""
|
6669
|
-
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
6670
|
-
"""
|
6671
|
-
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
6672
|
-
"""
|
6673
|
-
username: NotRequired[pulumi.Input[str]]
|
6674
|
-
"""
|
6675
|
-
The root credential username used in the connection URL
|
6676
|
-
"""
|
6677
|
-
username_template: NotRequired[pulumi.Input[str]]
|
6678
|
-
"""
|
6679
|
-
Username generation template.
|
6680
|
-
"""
|
6681
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
6682
|
-
"""
|
6683
|
-
Whether the connection should be verified on
|
6684
|
-
initial configuration or not.
|
6685
|
-
"""
|
6686
|
-
elif False:
|
6687
|
-
SecretsMountMysqlLegacyArgsDict: TypeAlias = Mapping[str, Any]
|
6688
|
-
|
6689
5073
|
@pulumi.input_type
|
6690
5074
|
class SecretsMountMysqlLegacyArgs:
|
6691
5075
|
def __init__(__self__, *,
|
@@ -6972,83 +5356,6 @@ class SecretsMountMysqlLegacyArgs:
|
|
6972
5356
|
pulumi.set(self, "verify_connection", value)
|
6973
5357
|
|
6974
5358
|
|
6975
|
-
if not MYPY:
|
6976
|
-
class SecretsMountMysqlRdArgsDict(TypedDict):
|
6977
|
-
name: pulumi.Input[str]
|
6978
|
-
"""
|
6979
|
-
Name of the database connection.
|
6980
|
-
"""
|
6981
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
6982
|
-
"""
|
6983
|
-
A list of roles that are allowed to use this
|
6984
|
-
connection.
|
6985
|
-
"""
|
6986
|
-
auth_type: NotRequired[pulumi.Input[str]]
|
6987
|
-
"""
|
6988
|
-
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
6989
|
-
"""
|
6990
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
6991
|
-
"""
|
6992
|
-
Connection string to use to connect to the database.
|
6993
|
-
"""
|
6994
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
6995
|
-
"""
|
6996
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6997
|
-
|
6998
|
-
Supported list of database secrets engines that can be configured:
|
6999
|
-
"""
|
7000
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
7001
|
-
"""
|
7002
|
-
Maximum number of seconds a connection may be reused.
|
7003
|
-
"""
|
7004
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
7005
|
-
"""
|
7006
|
-
Maximum number of idle connections to the database.
|
7007
|
-
"""
|
7008
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
7009
|
-
"""
|
7010
|
-
Maximum number of open connections to the database.
|
7011
|
-
"""
|
7012
|
-
password: NotRequired[pulumi.Input[str]]
|
7013
|
-
"""
|
7014
|
-
The root credential password used in the connection URL
|
7015
|
-
"""
|
7016
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
7017
|
-
"""
|
7018
|
-
Specifies the name of the plugin to use.
|
7019
|
-
"""
|
7020
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
7021
|
-
"""
|
7022
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
7023
|
-
"""
|
7024
|
-
service_account_json: NotRequired[pulumi.Input[str]]
|
7025
|
-
"""
|
7026
|
-
A JSON encoded credential for use with IAM authorization
|
7027
|
-
"""
|
7028
|
-
tls_ca: NotRequired[pulumi.Input[str]]
|
7029
|
-
"""
|
7030
|
-
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
7031
|
-
"""
|
7032
|
-
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
7033
|
-
"""
|
7034
|
-
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
7035
|
-
"""
|
7036
|
-
username: NotRequired[pulumi.Input[str]]
|
7037
|
-
"""
|
7038
|
-
The root credential username used in the connection URL
|
7039
|
-
"""
|
7040
|
-
username_template: NotRequired[pulumi.Input[str]]
|
7041
|
-
"""
|
7042
|
-
Username generation template.
|
7043
|
-
"""
|
7044
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
7045
|
-
"""
|
7046
|
-
Whether the connection should be verified on
|
7047
|
-
initial configuration or not.
|
7048
|
-
"""
|
7049
|
-
elif False:
|
7050
|
-
SecretsMountMysqlRdArgsDict: TypeAlias = Mapping[str, Any]
|
7051
|
-
|
7052
5359
|
@pulumi.input_type
|
7053
5360
|
class SecretsMountMysqlRdArgs:
|
7054
5361
|
def __init__(__self__, *,
|
@@ -7335,75 +5642,6 @@ class SecretsMountMysqlRdArgs:
|
|
7335
5642
|
pulumi.set(self, "verify_connection", value)
|
7336
5643
|
|
7337
5644
|
|
7338
|
-
if not MYPY:
|
7339
|
-
class SecretsMountOracleArgsDict(TypedDict):
|
7340
|
-
name: pulumi.Input[str]
|
7341
|
-
"""
|
7342
|
-
Name of the database connection.
|
7343
|
-
"""
|
7344
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
7345
|
-
"""
|
7346
|
-
A list of roles that are allowed to use this
|
7347
|
-
connection.
|
7348
|
-
"""
|
7349
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
7350
|
-
"""
|
7351
|
-
Connection string to use to connect to the database.
|
7352
|
-
"""
|
7353
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
7354
|
-
"""
|
7355
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7356
|
-
|
7357
|
-
Supported list of database secrets engines that can be configured:
|
7358
|
-
"""
|
7359
|
-
disconnect_sessions: NotRequired[pulumi.Input[bool]]
|
7360
|
-
"""
|
7361
|
-
Set to true to disconnect any open sessions prior to running the revocation statements.
|
7362
|
-
"""
|
7363
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
7364
|
-
"""
|
7365
|
-
Maximum number of seconds a connection may be reused.
|
7366
|
-
"""
|
7367
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
7368
|
-
"""
|
7369
|
-
Maximum number of idle connections to the database.
|
7370
|
-
"""
|
7371
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
7372
|
-
"""
|
7373
|
-
Maximum number of open connections to the database.
|
7374
|
-
"""
|
7375
|
-
password: NotRequired[pulumi.Input[str]]
|
7376
|
-
"""
|
7377
|
-
The root credential password used in the connection URL
|
7378
|
-
"""
|
7379
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
7380
|
-
"""
|
7381
|
-
Specifies the name of the plugin to use.
|
7382
|
-
"""
|
7383
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
7384
|
-
"""
|
7385
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
7386
|
-
"""
|
7387
|
-
split_statements: NotRequired[pulumi.Input[bool]]
|
7388
|
-
"""
|
7389
|
-
Set to true in order to split statements after semi-colons.
|
7390
|
-
"""
|
7391
|
-
username: NotRequired[pulumi.Input[str]]
|
7392
|
-
"""
|
7393
|
-
The root credential username used in the connection URL
|
7394
|
-
"""
|
7395
|
-
username_template: NotRequired[pulumi.Input[str]]
|
7396
|
-
"""
|
7397
|
-
Username generation template.
|
7398
|
-
"""
|
7399
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
7400
|
-
"""
|
7401
|
-
Whether the connection should be verified on
|
7402
|
-
initial configuration or not.
|
7403
|
-
"""
|
7404
|
-
elif False:
|
7405
|
-
SecretsMountOracleArgsDict: TypeAlias = Mapping[str, Any]
|
7406
|
-
|
7407
5645
|
@pulumi.input_type
|
7408
5646
|
class SecretsMountOracleArgs:
|
7409
5647
|
def __init__(__self__, *,
|
@@ -7658,95 +5896,6 @@ class SecretsMountOracleArgs:
|
|
7658
5896
|
pulumi.set(self, "verify_connection", value)
|
7659
5897
|
|
7660
5898
|
|
7661
|
-
if not MYPY:
|
7662
|
-
class SecretsMountPostgresqlArgsDict(TypedDict):
|
7663
|
-
name: pulumi.Input[str]
|
7664
|
-
"""
|
7665
|
-
Name of the database connection.
|
7666
|
-
"""
|
7667
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
7668
|
-
"""
|
7669
|
-
A list of roles that are allowed to use this
|
7670
|
-
connection.
|
7671
|
-
"""
|
7672
|
-
auth_type: NotRequired[pulumi.Input[str]]
|
7673
|
-
"""
|
7674
|
-
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
7675
|
-
"""
|
7676
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
7677
|
-
"""
|
7678
|
-
Connection string to use to connect to the database.
|
7679
|
-
"""
|
7680
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
7681
|
-
"""
|
7682
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7683
|
-
|
7684
|
-
Supported list of database secrets engines that can be configured:
|
7685
|
-
"""
|
7686
|
-
disable_escaping: NotRequired[pulumi.Input[bool]]
|
7687
|
-
"""
|
7688
|
-
Disable special character escaping in username and password
|
7689
|
-
"""
|
7690
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
7691
|
-
"""
|
7692
|
-
Maximum number of seconds a connection may be reused.
|
7693
|
-
"""
|
7694
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
7695
|
-
"""
|
7696
|
-
Maximum number of idle connections to the database.
|
7697
|
-
"""
|
7698
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
7699
|
-
"""
|
7700
|
-
Maximum number of open connections to the database.
|
7701
|
-
"""
|
7702
|
-
password: NotRequired[pulumi.Input[str]]
|
7703
|
-
"""
|
7704
|
-
The root credential password used in the connection URL
|
7705
|
-
"""
|
7706
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
7707
|
-
"""
|
7708
|
-
Specifies the name of the plugin to use.
|
7709
|
-
"""
|
7710
|
-
private_key: NotRequired[pulumi.Input[str]]
|
7711
|
-
"""
|
7712
|
-
The secret key used for the x509 client certificate. Must be PEM encoded.
|
7713
|
-
"""
|
7714
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
7715
|
-
"""
|
7716
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
7717
|
-
"""
|
7718
|
-
self_managed: NotRequired[pulumi.Input[bool]]
|
7719
|
-
"""
|
7720
|
-
If set, allows onboarding static roles with a rootless connection configuration.
|
7721
|
-
"""
|
7722
|
-
service_account_json: NotRequired[pulumi.Input[str]]
|
7723
|
-
"""
|
7724
|
-
A JSON encoded credential for use with IAM authorization
|
7725
|
-
"""
|
7726
|
-
tls_ca: NotRequired[pulumi.Input[str]]
|
7727
|
-
"""
|
7728
|
-
The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
7729
|
-
"""
|
7730
|
-
tls_certificate: NotRequired[pulumi.Input[str]]
|
7731
|
-
"""
|
7732
|
-
The x509 client certificate for connecting to the database. Must be PEM encoded.
|
7733
|
-
"""
|
7734
|
-
username: NotRequired[pulumi.Input[str]]
|
7735
|
-
"""
|
7736
|
-
The root credential username used in the connection URL
|
7737
|
-
"""
|
7738
|
-
username_template: NotRequired[pulumi.Input[str]]
|
7739
|
-
"""
|
7740
|
-
Username generation template.
|
7741
|
-
"""
|
7742
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
7743
|
-
"""
|
7744
|
-
Whether the connection should be verified on
|
7745
|
-
initial configuration or not.
|
7746
|
-
"""
|
7747
|
-
elif False:
|
7748
|
-
SecretsMountPostgresqlArgsDict: TypeAlias = Mapping[str, Any]
|
7749
|
-
|
7750
5899
|
@pulumi.input_type
|
7751
5900
|
class SecretsMountPostgresqlArgs:
|
7752
5901
|
def __init__(__self__, *,
|
@@ -7761,12 +5910,8 @@ class SecretsMountPostgresqlArgs:
|
|
7761
5910
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
7762
5911
|
password: Optional[pulumi.Input[str]] = None,
|
7763
5912
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
7764
|
-
private_key: Optional[pulumi.Input[str]] = None,
|
7765
5913
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
7766
|
-
self_managed: Optional[pulumi.Input[bool]] = None,
|
7767
5914
|
service_account_json: Optional[pulumi.Input[str]] = None,
|
7768
|
-
tls_ca: Optional[pulumi.Input[str]] = None,
|
7769
|
-
tls_certificate: Optional[pulumi.Input[str]] = None,
|
7770
5915
|
username: Optional[pulumi.Input[str]] = None,
|
7771
5916
|
username_template: Optional[pulumi.Input[str]] = None,
|
7772
5917
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
@@ -7785,12 +5930,8 @@ class SecretsMountPostgresqlArgs:
|
|
7785
5930
|
:param pulumi.Input[int] max_open_connections: Maximum number of open connections to the database.
|
7786
5931
|
:param pulumi.Input[str] password: The root credential password used in the connection URL
|
7787
5932
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
7788
|
-
:param pulumi.Input[str] private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
|
7789
5933
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
7790
|
-
:param pulumi.Input[bool] self_managed: If set, allows onboarding static roles with a rootless connection configuration.
|
7791
5934
|
:param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
|
7792
|
-
:param pulumi.Input[str] tls_ca: The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
7793
|
-
:param pulumi.Input[str] tls_certificate: The x509 client certificate for connecting to the database. Must be PEM encoded.
|
7794
5935
|
:param pulumi.Input[str] username: The root credential username used in the connection URL
|
7795
5936
|
:param pulumi.Input[str] username_template: Username generation template.
|
7796
5937
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
@@ -7817,18 +5958,10 @@ class SecretsMountPostgresqlArgs:
|
|
7817
5958
|
pulumi.set(__self__, "password", password)
|
7818
5959
|
if plugin_name is not None:
|
7819
5960
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
7820
|
-
if private_key is not None:
|
7821
|
-
pulumi.set(__self__, "private_key", private_key)
|
7822
5961
|
if root_rotation_statements is not None:
|
7823
5962
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
7824
|
-
if self_managed is not None:
|
7825
|
-
pulumi.set(__self__, "self_managed", self_managed)
|
7826
5963
|
if service_account_json is not None:
|
7827
5964
|
pulumi.set(__self__, "service_account_json", service_account_json)
|
7828
|
-
if tls_ca is not None:
|
7829
|
-
pulumi.set(__self__, "tls_ca", tls_ca)
|
7830
|
-
if tls_certificate is not None:
|
7831
|
-
pulumi.set(__self__, "tls_certificate", tls_certificate)
|
7832
5965
|
if username is not None:
|
7833
5966
|
pulumi.set(__self__, "username", username)
|
7834
5967
|
if username_template is not None:
|
@@ -7971,18 +6104,6 @@ class SecretsMountPostgresqlArgs:
|
|
7971
6104
|
def plugin_name(self, value: Optional[pulumi.Input[str]]):
|
7972
6105
|
pulumi.set(self, "plugin_name", value)
|
7973
6106
|
|
7974
|
-
@property
|
7975
|
-
@pulumi.getter(name="privateKey")
|
7976
|
-
def private_key(self) -> Optional[pulumi.Input[str]]:
|
7977
|
-
"""
|
7978
|
-
The secret key used for the x509 client certificate. Must be PEM encoded.
|
7979
|
-
"""
|
7980
|
-
return pulumi.get(self, "private_key")
|
7981
|
-
|
7982
|
-
@private_key.setter
|
7983
|
-
def private_key(self, value: Optional[pulumi.Input[str]]):
|
7984
|
-
pulumi.set(self, "private_key", value)
|
7985
|
-
|
7986
6107
|
@property
|
7987
6108
|
@pulumi.getter(name="rootRotationStatements")
|
7988
6109
|
def root_rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -7995,18 +6116,6 @@ class SecretsMountPostgresqlArgs:
|
|
7995
6116
|
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
7996
6117
|
pulumi.set(self, "root_rotation_statements", value)
|
7997
6118
|
|
7998
|
-
@property
|
7999
|
-
@pulumi.getter(name="selfManaged")
|
8000
|
-
def self_managed(self) -> Optional[pulumi.Input[bool]]:
|
8001
|
-
"""
|
8002
|
-
If set, allows onboarding static roles with a rootless connection configuration.
|
8003
|
-
"""
|
8004
|
-
return pulumi.get(self, "self_managed")
|
8005
|
-
|
8006
|
-
@self_managed.setter
|
8007
|
-
def self_managed(self, value: Optional[pulumi.Input[bool]]):
|
8008
|
-
pulumi.set(self, "self_managed", value)
|
8009
|
-
|
8010
6119
|
@property
|
8011
6120
|
@pulumi.getter(name="serviceAccountJson")
|
8012
6121
|
def service_account_json(self) -> Optional[pulumi.Input[str]]:
|
@@ -8019,30 +6128,6 @@ class SecretsMountPostgresqlArgs:
|
|
8019
6128
|
def service_account_json(self, value: Optional[pulumi.Input[str]]):
|
8020
6129
|
pulumi.set(self, "service_account_json", value)
|
8021
6130
|
|
8022
|
-
@property
|
8023
|
-
@pulumi.getter(name="tlsCa")
|
8024
|
-
def tls_ca(self) -> Optional[pulumi.Input[str]]:
|
8025
|
-
"""
|
8026
|
-
The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
8027
|
-
"""
|
8028
|
-
return pulumi.get(self, "tls_ca")
|
8029
|
-
|
8030
|
-
@tls_ca.setter
|
8031
|
-
def tls_ca(self, value: Optional[pulumi.Input[str]]):
|
8032
|
-
pulumi.set(self, "tls_ca", value)
|
8033
|
-
|
8034
|
-
@property
|
8035
|
-
@pulumi.getter(name="tlsCertificate")
|
8036
|
-
def tls_certificate(self) -> Optional[pulumi.Input[str]]:
|
8037
|
-
"""
|
8038
|
-
The x509 client certificate for connecting to the database. Must be PEM encoded.
|
8039
|
-
"""
|
8040
|
-
return pulumi.get(self, "tls_certificate")
|
8041
|
-
|
8042
|
-
@tls_certificate.setter
|
8043
|
-
def tls_certificate(self, value: Optional[pulumi.Input[str]]):
|
8044
|
-
pulumi.set(self, "tls_certificate", value)
|
8045
|
-
|
8046
6131
|
@property
|
8047
6132
|
@pulumi.getter
|
8048
6133
|
def username(self) -> Optional[pulumi.Input[str]]:
|
@@ -8081,67 +6166,6 @@ class SecretsMountPostgresqlArgs:
|
|
8081
6166
|
pulumi.set(self, "verify_connection", value)
|
8082
6167
|
|
8083
6168
|
|
8084
|
-
if not MYPY:
|
8085
|
-
class SecretsMountRediArgsDict(TypedDict):
|
8086
|
-
host: pulumi.Input[str]
|
8087
|
-
"""
|
8088
|
-
Specifies the host to connect to
|
8089
|
-
"""
|
8090
|
-
name: pulumi.Input[str]
|
8091
|
-
"""
|
8092
|
-
Name of the database connection.
|
8093
|
-
"""
|
8094
|
-
password: pulumi.Input[str]
|
8095
|
-
"""
|
8096
|
-
Specifies the password corresponding to the given username.
|
8097
|
-
"""
|
8098
|
-
username: pulumi.Input[str]
|
8099
|
-
"""
|
8100
|
-
Specifies the username for Vault to use.
|
8101
|
-
"""
|
8102
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
8103
|
-
"""
|
8104
|
-
A list of roles that are allowed to use this
|
8105
|
-
connection.
|
8106
|
-
"""
|
8107
|
-
ca_cert: NotRequired[pulumi.Input[str]]
|
8108
|
-
"""
|
8109
|
-
The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
|
8110
|
-
"""
|
8111
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
8112
|
-
"""
|
8113
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8114
|
-
|
8115
|
-
Supported list of database secrets engines that can be configured:
|
8116
|
-
"""
|
8117
|
-
insecure_tls: NotRequired[pulumi.Input[bool]]
|
8118
|
-
"""
|
8119
|
-
Specifies whether to skip verification of the server certificate when using TLS.
|
8120
|
-
"""
|
8121
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
8122
|
-
"""
|
8123
|
-
Specifies the name of the plugin to use.
|
8124
|
-
"""
|
8125
|
-
port: NotRequired[pulumi.Input[int]]
|
8126
|
-
"""
|
8127
|
-
The transport port to use to connect to Redis.
|
8128
|
-
"""
|
8129
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
8130
|
-
"""
|
8131
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
8132
|
-
"""
|
8133
|
-
tls: NotRequired[pulumi.Input[bool]]
|
8134
|
-
"""
|
8135
|
-
Specifies whether to use TLS when connecting to Redis.
|
8136
|
-
"""
|
8137
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
8138
|
-
"""
|
8139
|
-
Whether the connection should be verified on
|
8140
|
-
initial configuration or not.
|
8141
|
-
"""
|
8142
|
-
elif False:
|
8143
|
-
SecretsMountRediArgsDict: TypeAlias = Mapping[str, Any]
|
8144
|
-
|
8145
6169
|
@pulumi.input_type
|
8146
6170
|
class SecretsMountRediArgs:
|
8147
6171
|
def __init__(__self__, *,
|
@@ -8361,55 +6385,6 @@ class SecretsMountRediArgs:
|
|
8361
6385
|
pulumi.set(self, "verify_connection", value)
|
8362
6386
|
|
8363
6387
|
|
8364
|
-
if not MYPY:
|
8365
|
-
class SecretsMountRedisElasticachArgsDict(TypedDict):
|
8366
|
-
name: pulumi.Input[str]
|
8367
|
-
"""
|
8368
|
-
Name of the database connection.
|
8369
|
-
"""
|
8370
|
-
url: pulumi.Input[str]
|
8371
|
-
"""
|
8372
|
-
The configuration endpoint for the ElastiCache cluster to connect to.
|
8373
|
-
"""
|
8374
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
8375
|
-
"""
|
8376
|
-
A list of roles that are allowed to use this
|
8377
|
-
connection.
|
8378
|
-
"""
|
8379
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
8380
|
-
"""
|
8381
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8382
|
-
|
8383
|
-
Supported list of database secrets engines that can be configured:
|
8384
|
-
"""
|
8385
|
-
password: NotRequired[pulumi.Input[str]]
|
8386
|
-
"""
|
8387
|
-
The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
8388
|
-
"""
|
8389
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
8390
|
-
"""
|
8391
|
-
Specifies the name of the plugin to use.
|
8392
|
-
"""
|
8393
|
-
region: NotRequired[pulumi.Input[str]]
|
8394
|
-
"""
|
8395
|
-
The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
|
8396
|
-
"""
|
8397
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
8398
|
-
"""
|
8399
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
8400
|
-
"""
|
8401
|
-
username: NotRequired[pulumi.Input[str]]
|
8402
|
-
"""
|
8403
|
-
The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
8404
|
-
"""
|
8405
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
8406
|
-
"""
|
8407
|
-
Whether the connection should be verified on
|
8408
|
-
initial configuration or not.
|
8409
|
-
"""
|
8410
|
-
elif False:
|
8411
|
-
SecretsMountRedisElasticachArgsDict: TypeAlias = Mapping[str, Any]
|
8412
|
-
|
8413
6388
|
@pulumi.input_type
|
8414
6389
|
class SecretsMountRedisElasticachArgs:
|
8415
6390
|
def __init__(__self__, *,
|
@@ -8583,71 +6558,6 @@ class SecretsMountRedisElasticachArgs:
|
|
8583
6558
|
pulumi.set(self, "verify_connection", value)
|
8584
6559
|
|
8585
6560
|
|
8586
|
-
if not MYPY:
|
8587
|
-
class SecretsMountRedshiftArgsDict(TypedDict):
|
8588
|
-
name: pulumi.Input[str]
|
8589
|
-
"""
|
8590
|
-
Name of the database connection.
|
8591
|
-
"""
|
8592
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
8593
|
-
"""
|
8594
|
-
A list of roles that are allowed to use this
|
8595
|
-
connection.
|
8596
|
-
"""
|
8597
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
8598
|
-
"""
|
8599
|
-
Connection string to use to connect to the database.
|
8600
|
-
"""
|
8601
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
8602
|
-
"""
|
8603
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8604
|
-
|
8605
|
-
Supported list of database secrets engines that can be configured:
|
8606
|
-
"""
|
8607
|
-
disable_escaping: NotRequired[pulumi.Input[bool]]
|
8608
|
-
"""
|
8609
|
-
Disable special character escaping in username and password
|
8610
|
-
"""
|
8611
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
8612
|
-
"""
|
8613
|
-
Maximum number of seconds a connection may be reused.
|
8614
|
-
"""
|
8615
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
8616
|
-
"""
|
8617
|
-
Maximum number of idle connections to the database.
|
8618
|
-
"""
|
8619
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
8620
|
-
"""
|
8621
|
-
Maximum number of open connections to the database.
|
8622
|
-
"""
|
8623
|
-
password: NotRequired[pulumi.Input[str]]
|
8624
|
-
"""
|
8625
|
-
The root credential password used in the connection URL
|
8626
|
-
"""
|
8627
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
8628
|
-
"""
|
8629
|
-
Specifies the name of the plugin to use.
|
8630
|
-
"""
|
8631
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
8632
|
-
"""
|
8633
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
8634
|
-
"""
|
8635
|
-
username: NotRequired[pulumi.Input[str]]
|
8636
|
-
"""
|
8637
|
-
The root credential username used in the connection URL
|
8638
|
-
"""
|
8639
|
-
username_template: NotRequired[pulumi.Input[str]]
|
8640
|
-
"""
|
8641
|
-
Username generation template.
|
8642
|
-
"""
|
8643
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
8644
|
-
"""
|
8645
|
-
Whether the connection should be verified on
|
8646
|
-
initial configuration or not.
|
8647
|
-
"""
|
8648
|
-
elif False:
|
8649
|
-
SecretsMountRedshiftArgsDict: TypeAlias = Mapping[str, Any]
|
8650
|
-
|
8651
6561
|
@pulumi.input_type
|
8652
6562
|
class SecretsMountRedshiftArgs:
|
8653
6563
|
def __init__(__self__, *,
|
@@ -8886,67 +6796,6 @@ class SecretsMountRedshiftArgs:
|
|
8886
6796
|
pulumi.set(self, "verify_connection", value)
|
8887
6797
|
|
8888
6798
|
|
8889
|
-
if not MYPY:
|
8890
|
-
class SecretsMountSnowflakeArgsDict(TypedDict):
|
8891
|
-
name: pulumi.Input[str]
|
8892
|
-
"""
|
8893
|
-
Name of the database connection.
|
8894
|
-
"""
|
8895
|
-
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
8896
|
-
"""
|
8897
|
-
A list of roles that are allowed to use this
|
8898
|
-
connection.
|
8899
|
-
"""
|
8900
|
-
connection_url: NotRequired[pulumi.Input[str]]
|
8901
|
-
"""
|
8902
|
-
Connection string to use to connect to the database.
|
8903
|
-
"""
|
8904
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
8905
|
-
"""
|
8906
|
-
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8907
|
-
|
8908
|
-
Supported list of database secrets engines that can be configured:
|
8909
|
-
"""
|
8910
|
-
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
8911
|
-
"""
|
8912
|
-
Maximum number of seconds a connection may be reused.
|
8913
|
-
"""
|
8914
|
-
max_idle_connections: NotRequired[pulumi.Input[int]]
|
8915
|
-
"""
|
8916
|
-
Maximum number of idle connections to the database.
|
8917
|
-
"""
|
8918
|
-
max_open_connections: NotRequired[pulumi.Input[int]]
|
8919
|
-
"""
|
8920
|
-
Maximum number of open connections to the database.
|
8921
|
-
"""
|
8922
|
-
password: NotRequired[pulumi.Input[str]]
|
8923
|
-
"""
|
8924
|
-
The root credential password used in the connection URL
|
8925
|
-
"""
|
8926
|
-
plugin_name: NotRequired[pulumi.Input[str]]
|
8927
|
-
"""
|
8928
|
-
Specifies the name of the plugin to use.
|
8929
|
-
"""
|
8930
|
-
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
8931
|
-
"""
|
8932
|
-
A list of database statements to be executed to rotate the root user's credentials.
|
8933
|
-
"""
|
8934
|
-
username: NotRequired[pulumi.Input[str]]
|
8935
|
-
"""
|
8936
|
-
The root credential username used in the connection URL
|
8937
|
-
"""
|
8938
|
-
username_template: NotRequired[pulumi.Input[str]]
|
8939
|
-
"""
|
8940
|
-
Username generation template.
|
8941
|
-
"""
|
8942
|
-
verify_connection: NotRequired[pulumi.Input[bool]]
|
8943
|
-
"""
|
8944
|
-
Whether the connection should be verified on
|
8945
|
-
initial configuration or not.
|
8946
|
-
"""
|
8947
|
-
elif False:
|
8948
|
-
SecretsMountSnowflakeArgsDict: TypeAlias = Mapping[str, Any]
|
8949
|
-
|
8950
6799
|
@pulumi.input_type
|
8951
6800
|
class SecretsMountSnowflakeArgs:
|
8952
6801
|
def __init__(__self__, *,
|