pulumi-vault 6.4.0a1728108872__py3-none-any.whl → 6.4.0a1729059229__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +19 -4
- pulumi_vault/ad/secret_backend.py +5 -0
- pulumi_vault/ad/secret_library.py +5 -0
- pulumi_vault/ad/secret_role.py +5 -0
- pulumi_vault/alicloud/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_login.py +5 -0
- pulumi_vault/approle/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
- pulumi_vault/audit.py +5 -0
- pulumi_vault/audit_request_header.py +5 -0
- pulumi_vault/auth_backend.py +5 -0
- pulumi_vault/aws/auth_backend_cert.py +5 -0
- pulumi_vault/aws/auth_backend_client.py +5 -0
- pulumi_vault/aws/auth_backend_config_identity.py +5 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
- pulumi_vault/aws/auth_backend_login.py +5 -0
- pulumi_vault/aws/auth_backend_role.py +5 -0
- pulumi_vault/aws/auth_backend_role_tag.py +5 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
- pulumi_vault/aws/auth_backend_sts_role.py +5 -0
- pulumi_vault/aws/get_access_credentials.py +31 -4
- pulumi_vault/aws/get_static_access_credentials.py +18 -4
- pulumi_vault/aws/secret_backend.py +5 -0
- pulumi_vault/aws/secret_backend_role.py +5 -0
- pulumi_vault/aws/secret_backend_static_role.py +5 -0
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +5 -0
- pulumi_vault/azure/auth_backend_role.py +5 -0
- pulumi_vault/azure/backend.py +5 -0
- pulumi_vault/azure/backend_role.py +5 -0
- pulumi_vault/azure/get_access_credentials.py +36 -4
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +5 -0
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +21 -0
- pulumi_vault/config/outputs.py +5 -0
- pulumi_vault/config/ui_custom_message.py +5 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +5 -0
- pulumi_vault/consul/secret_backend_role.py +5 -0
- pulumi_vault/database/_inputs.py +2019 -68
- pulumi_vault/database/outputs.py +5 -0
- pulumi_vault/database/secret_backend_connection.py +5 -0
- pulumi_vault/database/secret_backend_role.py +5 -0
- pulumi_vault/database/secret_backend_static_role.py +5 -0
- pulumi_vault/database/secrets_mount.py +5 -0
- pulumi_vault/egp_policy.py +5 -0
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +5 -0
- pulumi_vault/gcp/auth_backend_role.py +5 -0
- pulumi_vault/gcp/get_auth_backend_role.py +42 -4
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +5 -0
- pulumi_vault/gcp/secret_impersonated_account.py +5 -0
- pulumi_vault/gcp/secret_roleset.py +5 -0
- pulumi_vault/gcp/secret_static_account.py +5 -0
- pulumi_vault/generic/endpoint.py +5 -0
- pulumi_vault/generic/get_secret.py +24 -4
- pulumi_vault/generic/secret.py +5 -0
- pulumi_vault/get_auth_backend.py +21 -4
- pulumi_vault/get_auth_backends.py +16 -4
- pulumi_vault/get_namespace.py +17 -4
- pulumi_vault/get_namespaces.py +13 -4
- pulumi_vault/get_nomad_access_token.py +18 -4
- pulumi_vault/get_policy_document.py +15 -4
- pulumi_vault/get_raft_autopilot_state.py +23 -4
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +5 -0
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +5 -0
- pulumi_vault/github/user.py +5 -0
- pulumi_vault/identity/entity.py +5 -0
- pulumi_vault/identity/entity_alias.py +5 -0
- pulumi_vault/identity/entity_policies.py +5 -0
- pulumi_vault/identity/get_entity.py +34 -4
- pulumi_vault/identity/get_group.py +40 -4
- pulumi_vault/identity/get_oidc_client_creds.py +16 -4
- pulumi_vault/identity/get_oidc_openid_config.py +26 -4
- pulumi_vault/identity/get_oidc_public_keys.py +15 -4
- pulumi_vault/identity/group.py +5 -0
- pulumi_vault/identity/group_alias.py +5 -0
- pulumi_vault/identity/group_member_entity_ids.py +5 -0
- pulumi_vault/identity/group_member_group_ids.py +5 -0
- pulumi_vault/identity/group_policies.py +5 -0
- pulumi_vault/identity/mfa_duo.py +5 -0
- pulumi_vault/identity/mfa_login_enforcement.py +5 -0
- pulumi_vault/identity/mfa_okta.py +5 -0
- pulumi_vault/identity/mfa_pingid.py +5 -0
- pulumi_vault/identity/mfa_totp.py +5 -0
- pulumi_vault/identity/oidc.py +5 -0
- pulumi_vault/identity/oidc_assignment.py +5 -0
- pulumi_vault/identity/oidc_client.py +5 -0
- pulumi_vault/identity/oidc_key.py +5 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
- pulumi_vault/identity/oidc_provider.py +5 -0
- pulumi_vault/identity/oidc_role.py +5 -0
- pulumi_vault/identity/oidc_scope.py +5 -0
- pulumi_vault/identity/outputs.py +5 -0
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +5 -0
- pulumi_vault/jwt/auth_backend_role.py +5 -0
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +5 -0
- pulumi_vault/kmip/secret_role.py +5 -0
- pulumi_vault/kmip/secret_scope.py +5 -0
- pulumi_vault/kubernetes/auth_backend_config.py +5 -0
- pulumi_vault/kubernetes/auth_backend_role.py +5 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
- pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
- pulumi_vault/kubernetes/get_service_account_token.py +28 -4
- pulumi_vault/kubernetes/secret_backend.py +5 -0
- pulumi_vault/kubernetes/secret_backend_role.py +5 -0
- pulumi_vault/kv/_inputs.py +32 -0
- pulumi_vault/kv/get_secret.py +19 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +23 -4
- pulumi_vault/kv/get_secret_v2.py +25 -4
- pulumi_vault/kv/get_secrets_list.py +15 -4
- pulumi_vault/kv/get_secrets_list_v2.py +18 -4
- pulumi_vault/kv/outputs.py +5 -0
- pulumi_vault/kv/secret.py +5 -0
- pulumi_vault/kv/secret_backend_v2.py +5 -0
- pulumi_vault/kv/secret_v2.py +5 -0
- pulumi_vault/ldap/auth_backend.py +5 -0
- pulumi_vault/ldap/auth_backend_group.py +5 -0
- pulumi_vault/ldap/auth_backend_user.py +5 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
- pulumi_vault/ldap/get_static_credentials.py +23 -4
- pulumi_vault/ldap/secret_backend.py +5 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
- pulumi_vault/ldap/secret_backend_library_set.py +5 -0
- pulumi_vault/ldap/secret_backend_static_role.py +5 -0
- pulumi_vault/managed/_inputs.py +205 -0
- pulumi_vault/managed/keys.py +5 -0
- pulumi_vault/managed/outputs.py +5 -0
- pulumi_vault/mfa_duo.py +5 -0
- pulumi_vault/mfa_okta.py +5 -0
- pulumi_vault/mfa_pingid.py +5 -0
- pulumi_vault/mfa_totp.py +5 -0
- pulumi_vault/mongodbatlas/secret_backend.py +5 -0
- pulumi_vault/mongodbatlas/secret_role.py +5 -0
- pulumi_vault/mount.py +5 -0
- pulumi_vault/namespace.py +5 -0
- pulumi_vault/nomad_secret_backend.py +5 -0
- pulumi_vault/nomad_secret_role.py +5 -0
- pulumi_vault/okta/_inputs.py +39 -0
- pulumi_vault/okta/auth_backend.py +5 -0
- pulumi_vault/okta/auth_backend_group.py +5 -0
- pulumi_vault/okta/auth_backend_user.py +5 -0
- pulumi_vault/okta/outputs.py +5 -0
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +5 -0
- pulumi_vault/pkisecret/_inputs.py +41 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
- pulumi_vault/pkisecret/backend_config_est.py +5 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +22 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +17 -4
- pulumi_vault/pkisecret/get_backend_key.py +19 -4
- pulumi_vault/pkisecret/get_backend_keys.py +17 -4
- pulumi_vault/pkisecret/outputs.py +5 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
- pulumi_vault/pkisecret/secret_backend_key.py +5 -0
- pulumi_vault/pkisecret/secret_backend_role.py +5 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
- pulumi_vault/plugin.py +5 -0
- pulumi_vault/plugin_pinned_version.py +5 -0
- pulumi_vault/policy.py +5 -0
- pulumi_vault/provider.py +5 -0
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +5 -0
- pulumi_vault/quota_rate_limit.py +5 -0
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +5 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +5 -0
- pulumi_vault/raft_autopilot.py +5 -0
- pulumi_vault/raft_snapshot_agent_config.py +5 -0
- pulumi_vault/rgp_policy.py +5 -0
- pulumi_vault/saml/auth_backend.py +5 -0
- pulumi_vault/saml/auth_backend_role.py +5 -0
- pulumi_vault/secrets/_inputs.py +30 -0
- pulumi_vault/secrets/outputs.py +5 -0
- pulumi_vault/secrets/sync_association.py +5 -0
- pulumi_vault/secrets/sync_aws_destination.py +5 -0
- pulumi_vault/secrets/sync_azure_destination.py +5 -0
- pulumi_vault/secrets/sync_config.py +5 -0
- pulumi_vault/secrets/sync_gcp_destination.py +5 -0
- pulumi_vault/secrets/sync_gh_destination.py +5 -0
- pulumi_vault/secrets/sync_github_apps.py +5 -0
- pulumi_vault/secrets/sync_vercel_destination.py +5 -0
- pulumi_vault/ssh/_inputs.py +22 -0
- pulumi_vault/ssh/outputs.py +5 -0
- pulumi_vault/ssh/secret_backend_ca.py +5 -0
- pulumi_vault/ssh/secret_backend_role.py +5 -0
- pulumi_vault/terraformcloud/secret_backend.py +5 -0
- pulumi_vault/terraformcloud/secret_creds.py +5 -0
- pulumi_vault/terraformcloud/secret_role.py +5 -0
- pulumi_vault/token.py +5 -0
- pulumi_vault/tokenauth/auth_backend_role.py +5 -0
- pulumi_vault/transform/alphabet.py +5 -0
- pulumi_vault/transform/get_decode.py +28 -4
- pulumi_vault/transform/get_encode.py +28 -4
- pulumi_vault/transform/role.py +5 -0
- pulumi_vault/transform/template.py +5 -0
- pulumi_vault/transform/transformation.py +5 -0
- pulumi_vault/transit/get_decrypt.py +21 -4
- pulumi_vault/transit/get_encrypt.py +23 -4
- pulumi_vault/transit/secret_backend_key.py +5 -0
- pulumi_vault/transit/secret_cache_config.py +5 -0
- {pulumi_vault-6.4.0a1728108872.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/METADATA +3 -2
- pulumi_vault-6.4.0a1729059229.dist-info/RECORD +256 -0
- pulumi_vault-6.4.0a1728108872.dist-info/RECORD +0 -256
- {pulumi_vault-6.4.0a1728108872.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.4.0a1728108872.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/top_level.txt +0 -0
pulumi_vault/database/_inputs.py
CHANGED
@@ -4,50 +4,138 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
13
18
|
'SecretBackendConnectionCassandraArgs',
|
19
|
+
'SecretBackendConnectionCassandraArgsDict',
|
14
20
|
'SecretBackendConnectionCouchbaseArgs',
|
21
|
+
'SecretBackendConnectionCouchbaseArgsDict',
|
15
22
|
'SecretBackendConnectionElasticsearchArgs',
|
23
|
+
'SecretBackendConnectionElasticsearchArgsDict',
|
16
24
|
'SecretBackendConnectionHanaArgs',
|
25
|
+
'SecretBackendConnectionHanaArgsDict',
|
17
26
|
'SecretBackendConnectionInfluxdbArgs',
|
27
|
+
'SecretBackendConnectionInfluxdbArgsDict',
|
18
28
|
'SecretBackendConnectionMongodbArgs',
|
29
|
+
'SecretBackendConnectionMongodbArgsDict',
|
19
30
|
'SecretBackendConnectionMongodbatlasArgs',
|
31
|
+
'SecretBackendConnectionMongodbatlasArgsDict',
|
20
32
|
'SecretBackendConnectionMssqlArgs',
|
33
|
+
'SecretBackendConnectionMssqlArgsDict',
|
21
34
|
'SecretBackendConnectionMysqlArgs',
|
35
|
+
'SecretBackendConnectionMysqlArgsDict',
|
22
36
|
'SecretBackendConnectionMysqlAuroraArgs',
|
37
|
+
'SecretBackendConnectionMysqlAuroraArgsDict',
|
23
38
|
'SecretBackendConnectionMysqlLegacyArgs',
|
39
|
+
'SecretBackendConnectionMysqlLegacyArgsDict',
|
24
40
|
'SecretBackendConnectionMysqlRdsArgs',
|
41
|
+
'SecretBackendConnectionMysqlRdsArgsDict',
|
25
42
|
'SecretBackendConnectionOracleArgs',
|
43
|
+
'SecretBackendConnectionOracleArgsDict',
|
26
44
|
'SecretBackendConnectionPostgresqlArgs',
|
45
|
+
'SecretBackendConnectionPostgresqlArgsDict',
|
27
46
|
'SecretBackendConnectionRedisArgs',
|
47
|
+
'SecretBackendConnectionRedisArgsDict',
|
28
48
|
'SecretBackendConnectionRedisElasticacheArgs',
|
49
|
+
'SecretBackendConnectionRedisElasticacheArgsDict',
|
29
50
|
'SecretBackendConnectionRedshiftArgs',
|
51
|
+
'SecretBackendConnectionRedshiftArgsDict',
|
30
52
|
'SecretBackendConnectionSnowflakeArgs',
|
53
|
+
'SecretBackendConnectionSnowflakeArgsDict',
|
31
54
|
'SecretsMountCassandraArgs',
|
55
|
+
'SecretsMountCassandraArgsDict',
|
32
56
|
'SecretsMountCouchbaseArgs',
|
57
|
+
'SecretsMountCouchbaseArgsDict',
|
33
58
|
'SecretsMountElasticsearchArgs',
|
59
|
+
'SecretsMountElasticsearchArgsDict',
|
34
60
|
'SecretsMountHanaArgs',
|
61
|
+
'SecretsMountHanaArgsDict',
|
35
62
|
'SecretsMountInfluxdbArgs',
|
63
|
+
'SecretsMountInfluxdbArgsDict',
|
36
64
|
'SecretsMountMongodbArgs',
|
65
|
+
'SecretsMountMongodbArgsDict',
|
37
66
|
'SecretsMountMongodbatlaArgs',
|
67
|
+
'SecretsMountMongodbatlaArgsDict',
|
38
68
|
'SecretsMountMssqlArgs',
|
69
|
+
'SecretsMountMssqlArgsDict',
|
39
70
|
'SecretsMountMysqlArgs',
|
71
|
+
'SecretsMountMysqlArgsDict',
|
40
72
|
'SecretsMountMysqlAuroraArgs',
|
73
|
+
'SecretsMountMysqlAuroraArgsDict',
|
41
74
|
'SecretsMountMysqlLegacyArgs',
|
75
|
+
'SecretsMountMysqlLegacyArgsDict',
|
42
76
|
'SecretsMountMysqlRdArgs',
|
77
|
+
'SecretsMountMysqlRdArgsDict',
|
43
78
|
'SecretsMountOracleArgs',
|
79
|
+
'SecretsMountOracleArgsDict',
|
44
80
|
'SecretsMountPostgresqlArgs',
|
81
|
+
'SecretsMountPostgresqlArgsDict',
|
45
82
|
'SecretsMountRediArgs',
|
83
|
+
'SecretsMountRediArgsDict',
|
46
84
|
'SecretsMountRedisElasticachArgs',
|
85
|
+
'SecretsMountRedisElasticachArgsDict',
|
47
86
|
'SecretsMountRedshiftArgs',
|
87
|
+
'SecretsMountRedshiftArgsDict',
|
48
88
|
'SecretsMountSnowflakeArgs',
|
89
|
+
'SecretsMountSnowflakeArgsDict',
|
49
90
|
]
|
50
91
|
|
92
|
+
MYPY = False
|
93
|
+
|
94
|
+
if not MYPY:
|
95
|
+
class SecretBackendConnectionCassandraArgsDict(TypedDict):
|
96
|
+
connect_timeout: NotRequired[pulumi.Input[int]]
|
97
|
+
"""
|
98
|
+
The number of seconds to use as a connection timeout.
|
99
|
+
"""
|
100
|
+
hosts: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
101
|
+
"""
|
102
|
+
Cassandra hosts to connect to.
|
103
|
+
"""
|
104
|
+
insecure_tls: NotRequired[pulumi.Input[bool]]
|
105
|
+
"""
|
106
|
+
Whether to skip verification of the server certificate when using TLS.
|
107
|
+
"""
|
108
|
+
password: NotRequired[pulumi.Input[str]]
|
109
|
+
"""
|
110
|
+
The password to use when authenticating with Cassandra.
|
111
|
+
"""
|
112
|
+
pem_bundle: NotRequired[pulumi.Input[str]]
|
113
|
+
"""
|
114
|
+
Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
115
|
+
"""
|
116
|
+
pem_json: NotRequired[pulumi.Input[str]]
|
117
|
+
"""
|
118
|
+
Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
119
|
+
"""
|
120
|
+
port: NotRequired[pulumi.Input[int]]
|
121
|
+
"""
|
122
|
+
The transport port to use to connect to Cassandra.
|
123
|
+
"""
|
124
|
+
protocol_version: NotRequired[pulumi.Input[int]]
|
125
|
+
"""
|
126
|
+
The CQL protocol version to use.
|
127
|
+
"""
|
128
|
+
tls: NotRequired[pulumi.Input[bool]]
|
129
|
+
"""
|
130
|
+
Whether to use TLS when connecting to Cassandra.
|
131
|
+
"""
|
132
|
+
username: NotRequired[pulumi.Input[str]]
|
133
|
+
"""
|
134
|
+
The username to use when authenticating with Cassandra.
|
135
|
+
"""
|
136
|
+
elif False:
|
137
|
+
SecretBackendConnectionCassandraArgsDict: TypeAlias = Mapping[str, Any]
|
138
|
+
|
51
139
|
@pulumi.input_type
|
52
140
|
class SecretBackendConnectionCassandraArgs:
|
53
141
|
def __init__(__self__, *,
|
@@ -215,6 +303,43 @@ class SecretBackendConnectionCassandraArgs:
|
|
215
303
|
pulumi.set(self, "username", value)
|
216
304
|
|
217
305
|
|
306
|
+
if not MYPY:
|
307
|
+
class SecretBackendConnectionCouchbaseArgsDict(TypedDict):
|
308
|
+
hosts: pulumi.Input[Sequence[pulumi.Input[str]]]
|
309
|
+
"""
|
310
|
+
A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
|
311
|
+
"""
|
312
|
+
password: pulumi.Input[str]
|
313
|
+
"""
|
314
|
+
Specifies the password corresponding to the given username.
|
315
|
+
"""
|
316
|
+
username: pulumi.Input[str]
|
317
|
+
"""
|
318
|
+
Specifies the username for Vault to use.
|
319
|
+
"""
|
320
|
+
base64_pem: NotRequired[pulumi.Input[str]]
|
321
|
+
"""
|
322
|
+
Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
|
323
|
+
"""
|
324
|
+
bucket_name: NotRequired[pulumi.Input[str]]
|
325
|
+
"""
|
326
|
+
Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
|
327
|
+
"""
|
328
|
+
insecure_tls: NotRequired[pulumi.Input[bool]]
|
329
|
+
"""
|
330
|
+
Specifies whether to skip verification of the server certificate when using TLS.
|
331
|
+
"""
|
332
|
+
tls: NotRequired[pulumi.Input[bool]]
|
333
|
+
"""
|
334
|
+
Specifies whether to use TLS when connecting to Couchbase.
|
335
|
+
"""
|
336
|
+
username_template: NotRequired[pulumi.Input[str]]
|
337
|
+
"""
|
338
|
+
Template describing how dynamic usernames are generated.
|
339
|
+
"""
|
340
|
+
elif False:
|
341
|
+
SecretBackendConnectionCouchbaseArgsDict: TypeAlias = Mapping[str, Any]
|
342
|
+
|
218
343
|
@pulumi.input_type
|
219
344
|
class SecretBackendConnectionCouchbaseArgs:
|
220
345
|
def __init__(__self__, *,
|
@@ -347,6 +472,51 @@ class SecretBackendConnectionCouchbaseArgs:
|
|
347
472
|
pulumi.set(self, "username_template", value)
|
348
473
|
|
349
474
|
|
475
|
+
if not MYPY:
|
476
|
+
class SecretBackendConnectionElasticsearchArgsDict(TypedDict):
|
477
|
+
password: pulumi.Input[str]
|
478
|
+
"""
|
479
|
+
The password to be used in the connection URL
|
480
|
+
"""
|
481
|
+
url: pulumi.Input[str]
|
482
|
+
"""
|
483
|
+
The URL for Elasticsearch's API
|
484
|
+
"""
|
485
|
+
username: pulumi.Input[str]
|
486
|
+
"""
|
487
|
+
The username to be used in the connection URL
|
488
|
+
"""
|
489
|
+
ca_cert: NotRequired[pulumi.Input[str]]
|
490
|
+
"""
|
491
|
+
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
492
|
+
"""
|
493
|
+
ca_path: NotRequired[pulumi.Input[str]]
|
494
|
+
"""
|
495
|
+
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
496
|
+
"""
|
497
|
+
client_cert: NotRequired[pulumi.Input[str]]
|
498
|
+
"""
|
499
|
+
The path to the certificate for the Elasticsearch client to present for communication
|
500
|
+
"""
|
501
|
+
client_key: NotRequired[pulumi.Input[str]]
|
502
|
+
"""
|
503
|
+
The path to the key for the Elasticsearch client to use for communication
|
504
|
+
"""
|
505
|
+
insecure: NotRequired[pulumi.Input[bool]]
|
506
|
+
"""
|
507
|
+
Whether to disable certificate verification
|
508
|
+
"""
|
509
|
+
tls_server_name: NotRequired[pulumi.Input[str]]
|
510
|
+
"""
|
511
|
+
This, if set, is used to set the SNI host when connecting via TLS
|
512
|
+
"""
|
513
|
+
username_template: NotRequired[pulumi.Input[str]]
|
514
|
+
"""
|
515
|
+
Template describing how dynamic usernames are generated.
|
516
|
+
"""
|
517
|
+
elif False:
|
518
|
+
SecretBackendConnectionElasticsearchArgsDict: TypeAlias = Mapping[str, Any]
|
519
|
+
|
350
520
|
@pulumi.input_type
|
351
521
|
class SecretBackendConnectionElasticsearchArgs:
|
352
522
|
def __init__(__self__, *,
|
@@ -511,6 +681,39 @@ class SecretBackendConnectionElasticsearchArgs:
|
|
511
681
|
pulumi.set(self, "username_template", value)
|
512
682
|
|
513
683
|
|
684
|
+
if not MYPY:
|
685
|
+
class SecretBackendConnectionHanaArgsDict(TypedDict):
|
686
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
687
|
+
"""
|
688
|
+
Connection string to use to connect to the database.
|
689
|
+
"""
|
690
|
+
disable_escaping: NotRequired[pulumi.Input[bool]]
|
691
|
+
"""
|
692
|
+
Disable special character escaping in username and password
|
693
|
+
"""
|
694
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
695
|
+
"""
|
696
|
+
Maximum number of seconds a connection may be reused.
|
697
|
+
"""
|
698
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
699
|
+
"""
|
700
|
+
Maximum number of idle connections to the database.
|
701
|
+
"""
|
702
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
703
|
+
"""
|
704
|
+
Maximum number of open connections to the database.
|
705
|
+
"""
|
706
|
+
password: NotRequired[pulumi.Input[str]]
|
707
|
+
"""
|
708
|
+
The root credential password used in the connection URL
|
709
|
+
"""
|
710
|
+
username: NotRequired[pulumi.Input[str]]
|
711
|
+
"""
|
712
|
+
The root credential username used in the connection URL
|
713
|
+
"""
|
714
|
+
elif False:
|
715
|
+
SecretBackendConnectionHanaArgsDict: TypeAlias = Mapping[str, Any]
|
716
|
+
|
514
717
|
@pulumi.input_type
|
515
718
|
class SecretBackendConnectionHanaArgs:
|
516
719
|
def __init__(__self__, *,
|
@@ -630,6 +833,51 @@ class SecretBackendConnectionHanaArgs:
|
|
630
833
|
pulumi.set(self, "username", value)
|
631
834
|
|
632
835
|
|
836
|
+
if not MYPY:
|
837
|
+
class SecretBackendConnectionInfluxdbArgsDict(TypedDict):
|
838
|
+
host: pulumi.Input[str]
|
839
|
+
"""
|
840
|
+
Influxdb host to connect to.
|
841
|
+
"""
|
842
|
+
password: pulumi.Input[str]
|
843
|
+
"""
|
844
|
+
Specifies the password corresponding to the given username.
|
845
|
+
"""
|
846
|
+
username: pulumi.Input[str]
|
847
|
+
"""
|
848
|
+
Specifies the username to use for superuser access.
|
849
|
+
"""
|
850
|
+
connect_timeout: NotRequired[pulumi.Input[int]]
|
851
|
+
"""
|
852
|
+
The number of seconds to use as a connection timeout.
|
853
|
+
"""
|
854
|
+
insecure_tls: NotRequired[pulumi.Input[bool]]
|
855
|
+
"""
|
856
|
+
Whether to skip verification of the server certificate when using TLS.
|
857
|
+
"""
|
858
|
+
pem_bundle: NotRequired[pulumi.Input[str]]
|
859
|
+
"""
|
860
|
+
Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
861
|
+
"""
|
862
|
+
pem_json: NotRequired[pulumi.Input[str]]
|
863
|
+
"""
|
864
|
+
Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
865
|
+
"""
|
866
|
+
port: NotRequired[pulumi.Input[int]]
|
867
|
+
"""
|
868
|
+
The transport port to use to connect to Influxdb.
|
869
|
+
"""
|
870
|
+
tls: NotRequired[pulumi.Input[bool]]
|
871
|
+
"""
|
872
|
+
Whether to use TLS when connecting to Influxdb.
|
873
|
+
"""
|
874
|
+
username_template: NotRequired[pulumi.Input[str]]
|
875
|
+
"""
|
876
|
+
Template describing how dynamic usernames are generated.
|
877
|
+
"""
|
878
|
+
elif False:
|
879
|
+
SecretBackendConnectionInfluxdbArgsDict: TypeAlias = Mapping[str, Any]
|
880
|
+
|
633
881
|
@pulumi.input_type
|
634
882
|
class SecretBackendConnectionInfluxdbArgs:
|
635
883
|
def __init__(__self__, *,
|
@@ -794,6 +1042,39 @@ class SecretBackendConnectionInfluxdbArgs:
|
|
794
1042
|
pulumi.set(self, "username_template", value)
|
795
1043
|
|
796
1044
|
|
1045
|
+
if not MYPY:
|
1046
|
+
class SecretBackendConnectionMongodbArgsDict(TypedDict):
|
1047
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
1048
|
+
"""
|
1049
|
+
Connection string to use to connect to the database.
|
1050
|
+
"""
|
1051
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
1052
|
+
"""
|
1053
|
+
Maximum number of seconds a connection may be reused.
|
1054
|
+
"""
|
1055
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
1056
|
+
"""
|
1057
|
+
Maximum number of idle connections to the database.
|
1058
|
+
"""
|
1059
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
1060
|
+
"""
|
1061
|
+
Maximum number of open connections to the database.
|
1062
|
+
"""
|
1063
|
+
password: NotRequired[pulumi.Input[str]]
|
1064
|
+
"""
|
1065
|
+
The root credential password used in the connection URL
|
1066
|
+
"""
|
1067
|
+
username: NotRequired[pulumi.Input[str]]
|
1068
|
+
"""
|
1069
|
+
The root credential username used in the connection URL
|
1070
|
+
"""
|
1071
|
+
username_template: NotRequired[pulumi.Input[str]]
|
1072
|
+
"""
|
1073
|
+
Username generation template.
|
1074
|
+
"""
|
1075
|
+
elif False:
|
1076
|
+
SecretBackendConnectionMongodbArgsDict: TypeAlias = Mapping[str, Any]
|
1077
|
+
|
797
1078
|
@pulumi.input_type
|
798
1079
|
class SecretBackendConnectionMongodbArgs:
|
799
1080
|
def __init__(__self__, *,
|
@@ -913,6 +1194,23 @@ class SecretBackendConnectionMongodbArgs:
|
|
913
1194
|
pulumi.set(self, "username_template", value)
|
914
1195
|
|
915
1196
|
|
1197
|
+
if not MYPY:
|
1198
|
+
class SecretBackendConnectionMongodbatlasArgsDict(TypedDict):
|
1199
|
+
private_key: pulumi.Input[str]
|
1200
|
+
"""
|
1201
|
+
The Private Programmatic API Key used to connect with MongoDB Atlas API.
|
1202
|
+
"""
|
1203
|
+
project_id: pulumi.Input[str]
|
1204
|
+
"""
|
1205
|
+
The Project ID the Database User should be created within.
|
1206
|
+
"""
|
1207
|
+
public_key: pulumi.Input[str]
|
1208
|
+
"""
|
1209
|
+
The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
|
1210
|
+
"""
|
1211
|
+
elif False:
|
1212
|
+
SecretBackendConnectionMongodbatlasArgsDict: TypeAlias = Mapping[str, Any]
|
1213
|
+
|
916
1214
|
@pulumi.input_type
|
917
1215
|
class SecretBackendConnectionMongodbatlasArgs:
|
918
1216
|
def __init__(__self__, *,
|
@@ -965,6 +1263,47 @@ class SecretBackendConnectionMongodbatlasArgs:
|
|
965
1263
|
pulumi.set(self, "public_key", value)
|
966
1264
|
|
967
1265
|
|
1266
|
+
if not MYPY:
|
1267
|
+
class SecretBackendConnectionMssqlArgsDict(TypedDict):
|
1268
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
1269
|
+
"""
|
1270
|
+
Connection string to use to connect to the database.
|
1271
|
+
"""
|
1272
|
+
contained_db: NotRequired[pulumi.Input[bool]]
|
1273
|
+
"""
|
1274
|
+
Set to true when the target is a Contained Database, e.g. AzureSQL.
|
1275
|
+
"""
|
1276
|
+
disable_escaping: NotRequired[pulumi.Input[bool]]
|
1277
|
+
"""
|
1278
|
+
Disable special character escaping in username and password
|
1279
|
+
"""
|
1280
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
1281
|
+
"""
|
1282
|
+
Maximum number of seconds a connection may be reused.
|
1283
|
+
"""
|
1284
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
1285
|
+
"""
|
1286
|
+
Maximum number of idle connections to the database.
|
1287
|
+
"""
|
1288
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
1289
|
+
"""
|
1290
|
+
Maximum number of open connections to the database.
|
1291
|
+
"""
|
1292
|
+
password: NotRequired[pulumi.Input[str]]
|
1293
|
+
"""
|
1294
|
+
The root credential password used in the connection URL
|
1295
|
+
"""
|
1296
|
+
username: NotRequired[pulumi.Input[str]]
|
1297
|
+
"""
|
1298
|
+
The root credential username used in the connection URL
|
1299
|
+
"""
|
1300
|
+
username_template: NotRequired[pulumi.Input[str]]
|
1301
|
+
"""
|
1302
|
+
Username generation template.
|
1303
|
+
"""
|
1304
|
+
elif False:
|
1305
|
+
SecretBackendConnectionMssqlArgsDict: TypeAlias = Mapping[str, Any]
|
1306
|
+
|
968
1307
|
@pulumi.input_type
|
969
1308
|
class SecretBackendConnectionMssqlArgs:
|
970
1309
|
def __init__(__self__, *,
|
@@ -1116,6 +1455,55 @@ class SecretBackendConnectionMssqlArgs:
|
|
1116
1455
|
pulumi.set(self, "username_template", value)
|
1117
1456
|
|
1118
1457
|
|
1458
|
+
if not MYPY:
|
1459
|
+
class SecretBackendConnectionMysqlArgsDict(TypedDict):
|
1460
|
+
auth_type: NotRequired[pulumi.Input[str]]
|
1461
|
+
"""
|
1462
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1463
|
+
"""
|
1464
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
1465
|
+
"""
|
1466
|
+
Connection string to use to connect to the database.
|
1467
|
+
"""
|
1468
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
1469
|
+
"""
|
1470
|
+
Maximum number of seconds a connection may be reused.
|
1471
|
+
"""
|
1472
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
1473
|
+
"""
|
1474
|
+
Maximum number of idle connections to the database.
|
1475
|
+
"""
|
1476
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
1477
|
+
"""
|
1478
|
+
Maximum number of open connections to the database.
|
1479
|
+
"""
|
1480
|
+
password: NotRequired[pulumi.Input[str]]
|
1481
|
+
"""
|
1482
|
+
The root credential password used in the connection URL
|
1483
|
+
"""
|
1484
|
+
service_account_json: NotRequired[pulumi.Input[str]]
|
1485
|
+
"""
|
1486
|
+
A JSON encoded credential for use with IAM authorization
|
1487
|
+
"""
|
1488
|
+
tls_ca: NotRequired[pulumi.Input[str]]
|
1489
|
+
"""
|
1490
|
+
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1491
|
+
"""
|
1492
|
+
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
1493
|
+
"""
|
1494
|
+
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1495
|
+
"""
|
1496
|
+
username: NotRequired[pulumi.Input[str]]
|
1497
|
+
"""
|
1498
|
+
The root credential username used in the connection URL
|
1499
|
+
"""
|
1500
|
+
username_template: NotRequired[pulumi.Input[str]]
|
1501
|
+
"""
|
1502
|
+
Username generation template.
|
1503
|
+
"""
|
1504
|
+
elif False:
|
1505
|
+
SecretBackendConnectionMysqlArgsDict: TypeAlias = Mapping[str, Any]
|
1506
|
+
|
1119
1507
|
@pulumi.input_type
|
1120
1508
|
class SecretBackendConnectionMysqlArgs:
|
1121
1509
|
def __init__(__self__, *,
|
@@ -1299,28 +1687,77 @@ class SecretBackendConnectionMysqlArgs:
|
|
1299
1687
|
pulumi.set(self, "username_template", value)
|
1300
1688
|
|
1301
1689
|
|
1302
|
-
|
1303
|
-
class
|
1304
|
-
|
1305
|
-
auth_type: Optional[pulumi.Input[str]] = None,
|
1306
|
-
connection_url: Optional[pulumi.Input[str]] = None,
|
1307
|
-
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
1308
|
-
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
1309
|
-
max_open_connections: Optional[pulumi.Input[int]] = None,
|
1310
|
-
password: Optional[pulumi.Input[str]] = None,
|
1311
|
-
service_account_json: Optional[pulumi.Input[str]] = None,
|
1312
|
-
tls_ca: Optional[pulumi.Input[str]] = None,
|
1313
|
-
tls_certificate_key: Optional[pulumi.Input[str]] = None,
|
1314
|
-
username: Optional[pulumi.Input[str]] = None,
|
1315
|
-
username_template: Optional[pulumi.Input[str]] = None):
|
1690
|
+
if not MYPY:
|
1691
|
+
class SecretBackendConnectionMysqlAuroraArgsDict(TypedDict):
|
1692
|
+
auth_type: NotRequired[pulumi.Input[str]]
|
1316
1693
|
"""
|
1317
|
-
|
1318
|
-
|
1319
|
-
:
|
1320
|
-
|
1321
|
-
|
1322
|
-
|
1323
|
-
:
|
1694
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1695
|
+
"""
|
1696
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
1697
|
+
"""
|
1698
|
+
Connection string to use to connect to the database.
|
1699
|
+
"""
|
1700
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
1701
|
+
"""
|
1702
|
+
Maximum number of seconds a connection may be reused.
|
1703
|
+
"""
|
1704
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
1705
|
+
"""
|
1706
|
+
Maximum number of idle connections to the database.
|
1707
|
+
"""
|
1708
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
1709
|
+
"""
|
1710
|
+
Maximum number of open connections to the database.
|
1711
|
+
"""
|
1712
|
+
password: NotRequired[pulumi.Input[str]]
|
1713
|
+
"""
|
1714
|
+
The root credential password used in the connection URL
|
1715
|
+
"""
|
1716
|
+
service_account_json: NotRequired[pulumi.Input[str]]
|
1717
|
+
"""
|
1718
|
+
A JSON encoded credential for use with IAM authorization
|
1719
|
+
"""
|
1720
|
+
tls_ca: NotRequired[pulumi.Input[str]]
|
1721
|
+
"""
|
1722
|
+
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1723
|
+
"""
|
1724
|
+
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
1725
|
+
"""
|
1726
|
+
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1727
|
+
"""
|
1728
|
+
username: NotRequired[pulumi.Input[str]]
|
1729
|
+
"""
|
1730
|
+
The root credential username used in the connection URL
|
1731
|
+
"""
|
1732
|
+
username_template: NotRequired[pulumi.Input[str]]
|
1733
|
+
"""
|
1734
|
+
Username generation template.
|
1735
|
+
"""
|
1736
|
+
elif False:
|
1737
|
+
SecretBackendConnectionMysqlAuroraArgsDict: TypeAlias = Mapping[str, Any]
|
1738
|
+
|
1739
|
+
@pulumi.input_type
|
1740
|
+
class SecretBackendConnectionMysqlAuroraArgs:
|
1741
|
+
def __init__(__self__, *,
|
1742
|
+
auth_type: Optional[pulumi.Input[str]] = None,
|
1743
|
+
connection_url: Optional[pulumi.Input[str]] = None,
|
1744
|
+
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
1745
|
+
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
1746
|
+
max_open_connections: Optional[pulumi.Input[int]] = None,
|
1747
|
+
password: Optional[pulumi.Input[str]] = None,
|
1748
|
+
service_account_json: Optional[pulumi.Input[str]] = None,
|
1749
|
+
tls_ca: Optional[pulumi.Input[str]] = None,
|
1750
|
+
tls_certificate_key: Optional[pulumi.Input[str]] = None,
|
1751
|
+
username: Optional[pulumi.Input[str]] = None,
|
1752
|
+
username_template: Optional[pulumi.Input[str]] = None):
|
1753
|
+
"""
|
1754
|
+
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1755
|
+
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
1756
|
+
:param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
1757
|
+
:param pulumi.Input[int] max_idle_connections: Maximum number of idle connections to the database.
|
1758
|
+
:param pulumi.Input[int] max_open_connections: Maximum number of open connections to the database.
|
1759
|
+
:param pulumi.Input[str] password: The root credential password used in the connection URL
|
1760
|
+
:param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
|
1324
1761
|
:param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1325
1762
|
:param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1326
1763
|
:param pulumi.Input[str] username: The root credential username used in the connection URL
|
@@ -1482,6 +1919,55 @@ class SecretBackendConnectionMysqlAuroraArgs:
|
|
1482
1919
|
pulumi.set(self, "username_template", value)
|
1483
1920
|
|
1484
1921
|
|
1922
|
+
if not MYPY:
|
1923
|
+
class SecretBackendConnectionMysqlLegacyArgsDict(TypedDict):
|
1924
|
+
auth_type: NotRequired[pulumi.Input[str]]
|
1925
|
+
"""
|
1926
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
1927
|
+
"""
|
1928
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
1929
|
+
"""
|
1930
|
+
Connection string to use to connect to the database.
|
1931
|
+
"""
|
1932
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
1933
|
+
"""
|
1934
|
+
Maximum number of seconds a connection may be reused.
|
1935
|
+
"""
|
1936
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
1937
|
+
"""
|
1938
|
+
Maximum number of idle connections to the database.
|
1939
|
+
"""
|
1940
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
1941
|
+
"""
|
1942
|
+
Maximum number of open connections to the database.
|
1943
|
+
"""
|
1944
|
+
password: NotRequired[pulumi.Input[str]]
|
1945
|
+
"""
|
1946
|
+
The root credential password used in the connection URL
|
1947
|
+
"""
|
1948
|
+
service_account_json: NotRequired[pulumi.Input[str]]
|
1949
|
+
"""
|
1950
|
+
A JSON encoded credential for use with IAM authorization
|
1951
|
+
"""
|
1952
|
+
tls_ca: NotRequired[pulumi.Input[str]]
|
1953
|
+
"""
|
1954
|
+
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1955
|
+
"""
|
1956
|
+
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
1957
|
+
"""
|
1958
|
+
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1959
|
+
"""
|
1960
|
+
username: NotRequired[pulumi.Input[str]]
|
1961
|
+
"""
|
1962
|
+
The root credential username used in the connection URL
|
1963
|
+
"""
|
1964
|
+
username_template: NotRequired[pulumi.Input[str]]
|
1965
|
+
"""
|
1966
|
+
Username generation template.
|
1967
|
+
"""
|
1968
|
+
elif False:
|
1969
|
+
SecretBackendConnectionMysqlLegacyArgsDict: TypeAlias = Mapping[str, Any]
|
1970
|
+
|
1485
1971
|
@pulumi.input_type
|
1486
1972
|
class SecretBackendConnectionMysqlLegacyArgs:
|
1487
1973
|
def __init__(__self__, *,
|
@@ -1665,6 +2151,55 @@ class SecretBackendConnectionMysqlLegacyArgs:
|
|
1665
2151
|
pulumi.set(self, "username_template", value)
|
1666
2152
|
|
1667
2153
|
|
2154
|
+
if not MYPY:
|
2155
|
+
class SecretBackendConnectionMysqlRdsArgsDict(TypedDict):
|
2156
|
+
auth_type: NotRequired[pulumi.Input[str]]
|
2157
|
+
"""
|
2158
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
2159
|
+
"""
|
2160
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
2161
|
+
"""
|
2162
|
+
Connection string to use to connect to the database.
|
2163
|
+
"""
|
2164
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
2165
|
+
"""
|
2166
|
+
Maximum number of seconds a connection may be reused.
|
2167
|
+
"""
|
2168
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
2169
|
+
"""
|
2170
|
+
Maximum number of idle connections to the database.
|
2171
|
+
"""
|
2172
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
2173
|
+
"""
|
2174
|
+
Maximum number of open connections to the database.
|
2175
|
+
"""
|
2176
|
+
password: NotRequired[pulumi.Input[str]]
|
2177
|
+
"""
|
2178
|
+
The root credential password used in the connection URL
|
2179
|
+
"""
|
2180
|
+
service_account_json: NotRequired[pulumi.Input[str]]
|
2181
|
+
"""
|
2182
|
+
A JSON encoded credential for use with IAM authorization
|
2183
|
+
"""
|
2184
|
+
tls_ca: NotRequired[pulumi.Input[str]]
|
2185
|
+
"""
|
2186
|
+
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
2187
|
+
"""
|
2188
|
+
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
2189
|
+
"""
|
2190
|
+
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
2191
|
+
"""
|
2192
|
+
username: NotRequired[pulumi.Input[str]]
|
2193
|
+
"""
|
2194
|
+
The root credential username used in the connection URL
|
2195
|
+
"""
|
2196
|
+
username_template: NotRequired[pulumi.Input[str]]
|
2197
|
+
"""
|
2198
|
+
Username generation template.
|
2199
|
+
"""
|
2200
|
+
elif False:
|
2201
|
+
SecretBackendConnectionMysqlRdsArgsDict: TypeAlias = Mapping[str, Any]
|
2202
|
+
|
1668
2203
|
@pulumi.input_type
|
1669
2204
|
class SecretBackendConnectionMysqlRdsArgs:
|
1670
2205
|
def __init__(__self__, *,
|
@@ -1848,6 +2383,47 @@ class SecretBackendConnectionMysqlRdsArgs:
|
|
1848
2383
|
pulumi.set(self, "username_template", value)
|
1849
2384
|
|
1850
2385
|
|
2386
|
+
if not MYPY:
|
2387
|
+
class SecretBackendConnectionOracleArgsDict(TypedDict):
|
2388
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
2389
|
+
"""
|
2390
|
+
Connection string to use to connect to the database.
|
2391
|
+
"""
|
2392
|
+
disconnect_sessions: NotRequired[pulumi.Input[bool]]
|
2393
|
+
"""
|
2394
|
+
Set to true to disconnect any open sessions prior to running the revocation statements.
|
2395
|
+
"""
|
2396
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
2397
|
+
"""
|
2398
|
+
Maximum number of seconds a connection may be reused.
|
2399
|
+
"""
|
2400
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
2401
|
+
"""
|
2402
|
+
Maximum number of idle connections to the database.
|
2403
|
+
"""
|
2404
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
2405
|
+
"""
|
2406
|
+
Maximum number of open connections to the database.
|
2407
|
+
"""
|
2408
|
+
password: NotRequired[pulumi.Input[str]]
|
2409
|
+
"""
|
2410
|
+
The root credential password used in the connection URL
|
2411
|
+
"""
|
2412
|
+
split_statements: NotRequired[pulumi.Input[bool]]
|
2413
|
+
"""
|
2414
|
+
Set to true in order to split statements after semi-colons.
|
2415
|
+
"""
|
2416
|
+
username: NotRequired[pulumi.Input[str]]
|
2417
|
+
"""
|
2418
|
+
The root credential username used in the connection URL
|
2419
|
+
"""
|
2420
|
+
username_template: NotRequired[pulumi.Input[str]]
|
2421
|
+
"""
|
2422
|
+
Username generation template.
|
2423
|
+
"""
|
2424
|
+
elif False:
|
2425
|
+
SecretBackendConnectionOracleArgsDict: TypeAlias = Mapping[str, Any]
|
2426
|
+
|
1851
2427
|
@pulumi.input_type
|
1852
2428
|
class SecretBackendConnectionOracleArgs:
|
1853
2429
|
def __init__(__self__, *,
|
@@ -1999,6 +2575,51 @@ class SecretBackendConnectionOracleArgs:
|
|
1999
2575
|
pulumi.set(self, "username_template", value)
|
2000
2576
|
|
2001
2577
|
|
2578
|
+
if not MYPY:
|
2579
|
+
class SecretBackendConnectionPostgresqlArgsDict(TypedDict):
|
2580
|
+
auth_type: NotRequired[pulumi.Input[str]]
|
2581
|
+
"""
|
2582
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
2583
|
+
"""
|
2584
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
2585
|
+
"""
|
2586
|
+
Connection string to use to connect to the database.
|
2587
|
+
"""
|
2588
|
+
disable_escaping: NotRequired[pulumi.Input[bool]]
|
2589
|
+
"""
|
2590
|
+
Disable special character escaping in username and password
|
2591
|
+
"""
|
2592
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
2593
|
+
"""
|
2594
|
+
Maximum number of seconds a connection may be reused.
|
2595
|
+
"""
|
2596
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
2597
|
+
"""
|
2598
|
+
Maximum number of idle connections to the database.
|
2599
|
+
"""
|
2600
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
2601
|
+
"""
|
2602
|
+
Maximum number of open connections to the database.
|
2603
|
+
"""
|
2604
|
+
password: NotRequired[pulumi.Input[str]]
|
2605
|
+
"""
|
2606
|
+
The root credential password used in the connection URL
|
2607
|
+
"""
|
2608
|
+
service_account_json: NotRequired[pulumi.Input[str]]
|
2609
|
+
"""
|
2610
|
+
A JSON encoded credential for use with IAM authorization
|
2611
|
+
"""
|
2612
|
+
username: NotRequired[pulumi.Input[str]]
|
2613
|
+
"""
|
2614
|
+
The root credential username used in the connection URL
|
2615
|
+
"""
|
2616
|
+
username_template: NotRequired[pulumi.Input[str]]
|
2617
|
+
"""
|
2618
|
+
Username generation template.
|
2619
|
+
"""
|
2620
|
+
elif False:
|
2621
|
+
SecretBackendConnectionPostgresqlArgsDict: TypeAlias = Mapping[str, Any]
|
2622
|
+
|
2002
2623
|
@pulumi.input_type
|
2003
2624
|
class SecretBackendConnectionPostgresqlArgs:
|
2004
2625
|
def __init__(__self__, *,
|
@@ -2166,6 +2787,39 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2166
2787
|
pulumi.set(self, "username_template", value)
|
2167
2788
|
|
2168
2789
|
|
2790
|
+
if not MYPY:
|
2791
|
+
class SecretBackendConnectionRedisArgsDict(TypedDict):
|
2792
|
+
host: pulumi.Input[str]
|
2793
|
+
"""
|
2794
|
+
Specifies the host to connect to
|
2795
|
+
"""
|
2796
|
+
password: pulumi.Input[str]
|
2797
|
+
"""
|
2798
|
+
Specifies the password corresponding to the given username.
|
2799
|
+
"""
|
2800
|
+
username: pulumi.Input[str]
|
2801
|
+
"""
|
2802
|
+
Specifies the username for Vault to use.
|
2803
|
+
"""
|
2804
|
+
ca_cert: NotRequired[pulumi.Input[str]]
|
2805
|
+
"""
|
2806
|
+
The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
|
2807
|
+
"""
|
2808
|
+
insecure_tls: NotRequired[pulumi.Input[bool]]
|
2809
|
+
"""
|
2810
|
+
Specifies whether to skip verification of the server certificate when using TLS.
|
2811
|
+
"""
|
2812
|
+
port: NotRequired[pulumi.Input[int]]
|
2813
|
+
"""
|
2814
|
+
The transport port to use to connect to Redis.
|
2815
|
+
"""
|
2816
|
+
tls: NotRequired[pulumi.Input[bool]]
|
2817
|
+
"""
|
2818
|
+
Specifies whether to use TLS when connecting to Redis.
|
2819
|
+
"""
|
2820
|
+
elif False:
|
2821
|
+
SecretBackendConnectionRedisArgsDict: TypeAlias = Mapping[str, Any]
|
2822
|
+
|
2169
2823
|
@pulumi.input_type
|
2170
2824
|
class SecretBackendConnectionRedisArgs:
|
2171
2825
|
def __init__(__self__, *,
|
@@ -2282,6 +2936,27 @@ class SecretBackendConnectionRedisArgs:
|
|
2282
2936
|
pulumi.set(self, "tls", value)
|
2283
2937
|
|
2284
2938
|
|
2939
|
+
if not MYPY:
|
2940
|
+
class SecretBackendConnectionRedisElasticacheArgsDict(TypedDict):
|
2941
|
+
url: pulumi.Input[str]
|
2942
|
+
"""
|
2943
|
+
The configuration endpoint for the ElastiCache cluster to connect to.
|
2944
|
+
"""
|
2945
|
+
password: NotRequired[pulumi.Input[str]]
|
2946
|
+
"""
|
2947
|
+
The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
2948
|
+
"""
|
2949
|
+
region: NotRequired[pulumi.Input[str]]
|
2950
|
+
"""
|
2951
|
+
The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
|
2952
|
+
"""
|
2953
|
+
username: NotRequired[pulumi.Input[str]]
|
2954
|
+
"""
|
2955
|
+
The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
2956
|
+
"""
|
2957
|
+
elif False:
|
2958
|
+
SecretBackendConnectionRedisElasticacheArgsDict: TypeAlias = Mapping[str, Any]
|
2959
|
+
|
2285
2960
|
@pulumi.input_type
|
2286
2961
|
class SecretBackendConnectionRedisElasticacheArgs:
|
2287
2962
|
def __init__(__self__, *,
|
@@ -2352,6 +3027,43 @@ class SecretBackendConnectionRedisElasticacheArgs:
|
|
2352
3027
|
pulumi.set(self, "username", value)
|
2353
3028
|
|
2354
3029
|
|
3030
|
+
if not MYPY:
|
3031
|
+
class SecretBackendConnectionRedshiftArgsDict(TypedDict):
|
3032
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
3033
|
+
"""
|
3034
|
+
Connection string to use to connect to the database.
|
3035
|
+
"""
|
3036
|
+
disable_escaping: NotRequired[pulumi.Input[bool]]
|
3037
|
+
"""
|
3038
|
+
Disable special character escaping in username and password
|
3039
|
+
"""
|
3040
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
3041
|
+
"""
|
3042
|
+
Maximum number of seconds a connection may be reused.
|
3043
|
+
"""
|
3044
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
3045
|
+
"""
|
3046
|
+
Maximum number of idle connections to the database.
|
3047
|
+
"""
|
3048
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
3049
|
+
"""
|
3050
|
+
Maximum number of open connections to the database.
|
3051
|
+
"""
|
3052
|
+
password: NotRequired[pulumi.Input[str]]
|
3053
|
+
"""
|
3054
|
+
The root credential password used in the connection URL
|
3055
|
+
"""
|
3056
|
+
username: NotRequired[pulumi.Input[str]]
|
3057
|
+
"""
|
3058
|
+
The root credential username used in the connection URL
|
3059
|
+
"""
|
3060
|
+
username_template: NotRequired[pulumi.Input[str]]
|
3061
|
+
"""
|
3062
|
+
Username generation template.
|
3063
|
+
"""
|
3064
|
+
elif False:
|
3065
|
+
SecretBackendConnectionRedshiftArgsDict: TypeAlias = Mapping[str, Any]
|
3066
|
+
|
2355
3067
|
@pulumi.input_type
|
2356
3068
|
class SecretBackendConnectionRedshiftArgs:
|
2357
3069
|
def __init__(__self__, *,
|
@@ -2487,21 +3199,54 @@ class SecretBackendConnectionRedshiftArgs:
|
|
2487
3199
|
pulumi.set(self, "username_template", value)
|
2488
3200
|
|
2489
3201
|
|
2490
|
-
|
2491
|
-
class
|
2492
|
-
|
2493
|
-
connection_url: Optional[pulumi.Input[str]] = None,
|
2494
|
-
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
2495
|
-
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
2496
|
-
max_open_connections: Optional[pulumi.Input[int]] = None,
|
2497
|
-
password: Optional[pulumi.Input[str]] = None,
|
2498
|
-
username: Optional[pulumi.Input[str]] = None,
|
2499
|
-
username_template: Optional[pulumi.Input[str]] = None):
|
3202
|
+
if not MYPY:
|
3203
|
+
class SecretBackendConnectionSnowflakeArgsDict(TypedDict):
|
3204
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
2500
3205
|
"""
|
2501
|
-
|
2502
|
-
|
2503
|
-
:
|
2504
|
-
|
3206
|
+
Connection string to use to connect to the database.
|
3207
|
+
"""
|
3208
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
3209
|
+
"""
|
3210
|
+
Maximum number of seconds a connection may be reused.
|
3211
|
+
"""
|
3212
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
3213
|
+
"""
|
3214
|
+
Maximum number of idle connections to the database.
|
3215
|
+
"""
|
3216
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
3217
|
+
"""
|
3218
|
+
Maximum number of open connections to the database.
|
3219
|
+
"""
|
3220
|
+
password: NotRequired[pulumi.Input[str]]
|
3221
|
+
"""
|
3222
|
+
The root credential password used in the connection URL
|
3223
|
+
"""
|
3224
|
+
username: NotRequired[pulumi.Input[str]]
|
3225
|
+
"""
|
3226
|
+
The root credential username used in the connection URL
|
3227
|
+
"""
|
3228
|
+
username_template: NotRequired[pulumi.Input[str]]
|
3229
|
+
"""
|
3230
|
+
Username generation template.
|
3231
|
+
"""
|
3232
|
+
elif False:
|
3233
|
+
SecretBackendConnectionSnowflakeArgsDict: TypeAlias = Mapping[str, Any]
|
3234
|
+
|
3235
|
+
@pulumi.input_type
|
3236
|
+
class SecretBackendConnectionSnowflakeArgs:
|
3237
|
+
def __init__(__self__, *,
|
3238
|
+
connection_url: Optional[pulumi.Input[str]] = None,
|
3239
|
+
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
3240
|
+
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
3241
|
+
max_open_connections: Optional[pulumi.Input[int]] = None,
|
3242
|
+
password: Optional[pulumi.Input[str]] = None,
|
3243
|
+
username: Optional[pulumi.Input[str]] = None,
|
3244
|
+
username_template: Optional[pulumi.Input[str]] = None):
|
3245
|
+
"""
|
3246
|
+
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
3247
|
+
:param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
3248
|
+
:param pulumi.Input[int] max_idle_connections: Maximum number of idle connections to the database.
|
3249
|
+
:param pulumi.Input[int] max_open_connections: Maximum number of open connections to the database.
|
2505
3250
|
:param pulumi.Input[str] password: The root credential password used in the connection URL
|
2506
3251
|
:param pulumi.Input[str] username: The root credential username used in the connection URL
|
2507
3252
|
:param pulumi.Input[str] username_template: Username generation template.
|
@@ -2606,6 +3351,79 @@ class SecretBackendConnectionSnowflakeArgs:
|
|
2606
3351
|
pulumi.set(self, "username_template", value)
|
2607
3352
|
|
2608
3353
|
|
3354
|
+
if not MYPY:
|
3355
|
+
class SecretsMountCassandraArgsDict(TypedDict):
|
3356
|
+
name: pulumi.Input[str]
|
3357
|
+
"""
|
3358
|
+
Name of the database connection.
|
3359
|
+
"""
|
3360
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
3361
|
+
"""
|
3362
|
+
A list of roles that are allowed to use this
|
3363
|
+
connection.
|
3364
|
+
"""
|
3365
|
+
connect_timeout: NotRequired[pulumi.Input[int]]
|
3366
|
+
"""
|
3367
|
+
The number of seconds to use as a connection timeout.
|
3368
|
+
"""
|
3369
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
3370
|
+
"""
|
3371
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3372
|
+
|
3373
|
+
Supported list of database secrets engines that can be configured:
|
3374
|
+
"""
|
3375
|
+
hosts: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
3376
|
+
"""
|
3377
|
+
Cassandra hosts to connect to.
|
3378
|
+
"""
|
3379
|
+
insecure_tls: NotRequired[pulumi.Input[bool]]
|
3380
|
+
"""
|
3381
|
+
Whether to skip verification of the server certificate when using TLS.
|
3382
|
+
"""
|
3383
|
+
password: NotRequired[pulumi.Input[str]]
|
3384
|
+
"""
|
3385
|
+
The password to use when authenticating with Cassandra.
|
3386
|
+
"""
|
3387
|
+
pem_bundle: NotRequired[pulumi.Input[str]]
|
3388
|
+
"""
|
3389
|
+
Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
3390
|
+
"""
|
3391
|
+
pem_json: NotRequired[pulumi.Input[str]]
|
3392
|
+
"""
|
3393
|
+
Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
3394
|
+
"""
|
3395
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
3396
|
+
"""
|
3397
|
+
Specifies the name of the plugin to use.
|
3398
|
+
"""
|
3399
|
+
port: NotRequired[pulumi.Input[int]]
|
3400
|
+
"""
|
3401
|
+
The transport port to use to connect to Cassandra.
|
3402
|
+
"""
|
3403
|
+
protocol_version: NotRequired[pulumi.Input[int]]
|
3404
|
+
"""
|
3405
|
+
The CQL protocol version to use.
|
3406
|
+
"""
|
3407
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
3408
|
+
"""
|
3409
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
3410
|
+
"""
|
3411
|
+
tls: NotRequired[pulumi.Input[bool]]
|
3412
|
+
"""
|
3413
|
+
Whether to use TLS when connecting to Cassandra.
|
3414
|
+
"""
|
3415
|
+
username: NotRequired[pulumi.Input[str]]
|
3416
|
+
"""
|
3417
|
+
The username to use when authenticating with Cassandra.
|
3418
|
+
"""
|
3419
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
3420
|
+
"""
|
3421
|
+
Whether the connection should be verified on
|
3422
|
+
initial configuration or not.
|
3423
|
+
"""
|
3424
|
+
elif False:
|
3425
|
+
SecretsMountCassandraArgsDict: TypeAlias = Mapping[str, Any]
|
3426
|
+
|
2609
3427
|
@pulumi.input_type
|
2610
3428
|
class SecretsMountCassandraArgs:
|
2611
3429
|
def __init__(__self__, *,
|
@@ -2876,6 +3694,71 @@ class SecretsMountCassandraArgs:
|
|
2876
3694
|
pulumi.set(self, "verify_connection", value)
|
2877
3695
|
|
2878
3696
|
|
3697
|
+
if not MYPY:
|
3698
|
+
class SecretsMountCouchbaseArgsDict(TypedDict):
|
3699
|
+
hosts: pulumi.Input[Sequence[pulumi.Input[str]]]
|
3700
|
+
"""
|
3701
|
+
A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
|
3702
|
+
"""
|
3703
|
+
name: pulumi.Input[str]
|
3704
|
+
"""
|
3705
|
+
Name of the database connection.
|
3706
|
+
"""
|
3707
|
+
password: pulumi.Input[str]
|
3708
|
+
"""
|
3709
|
+
Specifies the password corresponding to the given username.
|
3710
|
+
"""
|
3711
|
+
username: pulumi.Input[str]
|
3712
|
+
"""
|
3713
|
+
Specifies the username for Vault to use.
|
3714
|
+
"""
|
3715
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
3716
|
+
"""
|
3717
|
+
A list of roles that are allowed to use this
|
3718
|
+
connection.
|
3719
|
+
"""
|
3720
|
+
base64_pem: NotRequired[pulumi.Input[str]]
|
3721
|
+
"""
|
3722
|
+
Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
|
3723
|
+
"""
|
3724
|
+
bucket_name: NotRequired[pulumi.Input[str]]
|
3725
|
+
"""
|
3726
|
+
Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
|
3727
|
+
"""
|
3728
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
3729
|
+
"""
|
3730
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3731
|
+
|
3732
|
+
Supported list of database secrets engines that can be configured:
|
3733
|
+
"""
|
3734
|
+
insecure_tls: NotRequired[pulumi.Input[bool]]
|
3735
|
+
"""
|
3736
|
+
Specifies whether to skip verification of the server certificate when using TLS.
|
3737
|
+
"""
|
3738
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
3739
|
+
"""
|
3740
|
+
Specifies the name of the plugin to use.
|
3741
|
+
"""
|
3742
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
3743
|
+
"""
|
3744
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
3745
|
+
"""
|
3746
|
+
tls: NotRequired[pulumi.Input[bool]]
|
3747
|
+
"""
|
3748
|
+
Specifies whether to use TLS when connecting to Couchbase.
|
3749
|
+
"""
|
3750
|
+
username_template: NotRequired[pulumi.Input[str]]
|
3751
|
+
"""
|
3752
|
+
Template describing how dynamic usernames are generated.
|
3753
|
+
"""
|
3754
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
3755
|
+
"""
|
3756
|
+
Whether the connection should be verified on
|
3757
|
+
initial configuration or not.
|
3758
|
+
"""
|
3759
|
+
elif False:
|
3760
|
+
SecretsMountCouchbaseArgsDict: TypeAlias = Mapping[str, Any]
|
3761
|
+
|
2879
3762
|
@pulumi.input_type
|
2880
3763
|
class SecretsMountCouchbaseArgs:
|
2881
3764
|
def __init__(__self__, *,
|
@@ -3111,6 +3994,79 @@ class SecretsMountCouchbaseArgs:
|
|
3111
3994
|
pulumi.set(self, "verify_connection", value)
|
3112
3995
|
|
3113
3996
|
|
3997
|
+
if not MYPY:
|
3998
|
+
class SecretsMountElasticsearchArgsDict(TypedDict):
|
3999
|
+
name: pulumi.Input[str]
|
4000
|
+
"""
|
4001
|
+
Name of the database connection.
|
4002
|
+
"""
|
4003
|
+
password: pulumi.Input[str]
|
4004
|
+
"""
|
4005
|
+
The password to be used in the connection URL
|
4006
|
+
"""
|
4007
|
+
url: pulumi.Input[str]
|
4008
|
+
"""
|
4009
|
+
The URL for Elasticsearch's API
|
4010
|
+
"""
|
4011
|
+
username: pulumi.Input[str]
|
4012
|
+
"""
|
4013
|
+
The username to be used in the connection URL
|
4014
|
+
"""
|
4015
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4016
|
+
"""
|
4017
|
+
A list of roles that are allowed to use this
|
4018
|
+
connection.
|
4019
|
+
"""
|
4020
|
+
ca_cert: NotRequired[pulumi.Input[str]]
|
4021
|
+
"""
|
4022
|
+
The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
|
4023
|
+
"""
|
4024
|
+
ca_path: NotRequired[pulumi.Input[str]]
|
4025
|
+
"""
|
4026
|
+
The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
|
4027
|
+
"""
|
4028
|
+
client_cert: NotRequired[pulumi.Input[str]]
|
4029
|
+
"""
|
4030
|
+
The path to the certificate for the Elasticsearch client to present for communication
|
4031
|
+
"""
|
4032
|
+
client_key: NotRequired[pulumi.Input[str]]
|
4033
|
+
"""
|
4034
|
+
The path to the key for the Elasticsearch client to use for communication
|
4035
|
+
"""
|
4036
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
4037
|
+
"""
|
4038
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4039
|
+
|
4040
|
+
Supported list of database secrets engines that can be configured:
|
4041
|
+
"""
|
4042
|
+
insecure: NotRequired[pulumi.Input[bool]]
|
4043
|
+
"""
|
4044
|
+
Whether to disable certificate verification
|
4045
|
+
"""
|
4046
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
4047
|
+
"""
|
4048
|
+
Specifies the name of the plugin to use.
|
4049
|
+
"""
|
4050
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4051
|
+
"""
|
4052
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
4053
|
+
"""
|
4054
|
+
tls_server_name: NotRequired[pulumi.Input[str]]
|
4055
|
+
"""
|
4056
|
+
This, if set, is used to set the SNI host when connecting via TLS
|
4057
|
+
"""
|
4058
|
+
username_template: NotRequired[pulumi.Input[str]]
|
4059
|
+
"""
|
4060
|
+
Template describing how dynamic usernames are generated.
|
4061
|
+
"""
|
4062
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
4063
|
+
"""
|
4064
|
+
Whether the connection should be verified on
|
4065
|
+
initial configuration or not.
|
4066
|
+
"""
|
4067
|
+
elif False:
|
4068
|
+
SecretsMountElasticsearchArgsDict: TypeAlias = Mapping[str, Any]
|
4069
|
+
|
3114
4070
|
@pulumi.input_type
|
3115
4071
|
class SecretsMountElasticsearchArgs:
|
3116
4072
|
def __init__(__self__, *,
|
@@ -3378,6 +4334,67 @@ class SecretsMountElasticsearchArgs:
|
|
3378
4334
|
pulumi.set(self, "verify_connection", value)
|
3379
4335
|
|
3380
4336
|
|
4337
|
+
if not MYPY:
|
4338
|
+
class SecretsMountHanaArgsDict(TypedDict):
|
4339
|
+
name: pulumi.Input[str]
|
4340
|
+
"""
|
4341
|
+
Name of the database connection.
|
4342
|
+
"""
|
4343
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4344
|
+
"""
|
4345
|
+
A list of roles that are allowed to use this
|
4346
|
+
connection.
|
4347
|
+
"""
|
4348
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
4349
|
+
"""
|
4350
|
+
Connection string to use to connect to the database.
|
4351
|
+
"""
|
4352
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
4353
|
+
"""
|
4354
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4355
|
+
|
4356
|
+
Supported list of database secrets engines that can be configured:
|
4357
|
+
"""
|
4358
|
+
disable_escaping: NotRequired[pulumi.Input[bool]]
|
4359
|
+
"""
|
4360
|
+
Disable special character escaping in username and password
|
4361
|
+
"""
|
4362
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
4363
|
+
"""
|
4364
|
+
Maximum number of seconds a connection may be reused.
|
4365
|
+
"""
|
4366
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
4367
|
+
"""
|
4368
|
+
Maximum number of idle connections to the database.
|
4369
|
+
"""
|
4370
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
4371
|
+
"""
|
4372
|
+
Maximum number of open connections to the database.
|
4373
|
+
"""
|
4374
|
+
password: NotRequired[pulumi.Input[str]]
|
4375
|
+
"""
|
4376
|
+
The root credential password used in the connection URL
|
4377
|
+
"""
|
4378
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
4379
|
+
"""
|
4380
|
+
Specifies the name of the plugin to use.
|
4381
|
+
"""
|
4382
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4383
|
+
"""
|
4384
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
4385
|
+
"""
|
4386
|
+
username: NotRequired[pulumi.Input[str]]
|
4387
|
+
"""
|
4388
|
+
The root credential username used in the connection URL
|
4389
|
+
"""
|
4390
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
4391
|
+
"""
|
4392
|
+
Whether the connection should be verified on
|
4393
|
+
initial configuration or not.
|
4394
|
+
"""
|
4395
|
+
elif False:
|
4396
|
+
SecretsMountHanaArgsDict: TypeAlias = Mapping[str, Any]
|
4397
|
+
|
3381
4398
|
@pulumi.input_type
|
3382
4399
|
class SecretsMountHanaArgs:
|
3383
4400
|
def __init__(__self__, *,
|
@@ -3600,6 +4617,79 @@ class SecretsMountHanaArgs:
|
|
3600
4617
|
pulumi.set(self, "verify_connection", value)
|
3601
4618
|
|
3602
4619
|
|
4620
|
+
if not MYPY:
|
4621
|
+
class SecretsMountInfluxdbArgsDict(TypedDict):
|
4622
|
+
host: pulumi.Input[str]
|
4623
|
+
"""
|
4624
|
+
Influxdb host to connect to.
|
4625
|
+
"""
|
4626
|
+
name: pulumi.Input[str]
|
4627
|
+
"""
|
4628
|
+
Name of the database connection.
|
4629
|
+
"""
|
4630
|
+
password: pulumi.Input[str]
|
4631
|
+
"""
|
4632
|
+
Specifies the password corresponding to the given username.
|
4633
|
+
"""
|
4634
|
+
username: pulumi.Input[str]
|
4635
|
+
"""
|
4636
|
+
Specifies the username to use for superuser access.
|
4637
|
+
"""
|
4638
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4639
|
+
"""
|
4640
|
+
A list of roles that are allowed to use this
|
4641
|
+
connection.
|
4642
|
+
"""
|
4643
|
+
connect_timeout: NotRequired[pulumi.Input[int]]
|
4644
|
+
"""
|
4645
|
+
The number of seconds to use as a connection timeout.
|
4646
|
+
"""
|
4647
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
4648
|
+
"""
|
4649
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4650
|
+
|
4651
|
+
Supported list of database secrets engines that can be configured:
|
4652
|
+
"""
|
4653
|
+
insecure_tls: NotRequired[pulumi.Input[bool]]
|
4654
|
+
"""
|
4655
|
+
Whether to skip verification of the server certificate when using TLS.
|
4656
|
+
"""
|
4657
|
+
pem_bundle: NotRequired[pulumi.Input[str]]
|
4658
|
+
"""
|
4659
|
+
Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
4660
|
+
"""
|
4661
|
+
pem_json: NotRequired[pulumi.Input[str]]
|
4662
|
+
"""
|
4663
|
+
Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
|
4664
|
+
"""
|
4665
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
4666
|
+
"""
|
4667
|
+
Specifies the name of the plugin to use.
|
4668
|
+
"""
|
4669
|
+
port: NotRequired[pulumi.Input[int]]
|
4670
|
+
"""
|
4671
|
+
The transport port to use to connect to Influxdb.
|
4672
|
+
"""
|
4673
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4674
|
+
"""
|
4675
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
4676
|
+
"""
|
4677
|
+
tls: NotRequired[pulumi.Input[bool]]
|
4678
|
+
"""
|
4679
|
+
Whether to use TLS when connecting to Influxdb.
|
4680
|
+
"""
|
4681
|
+
username_template: NotRequired[pulumi.Input[str]]
|
4682
|
+
"""
|
4683
|
+
Template describing how dynamic usernames are generated.
|
4684
|
+
"""
|
4685
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
4686
|
+
"""
|
4687
|
+
Whether the connection should be verified on
|
4688
|
+
initial configuration or not.
|
4689
|
+
"""
|
4690
|
+
elif False:
|
4691
|
+
SecretsMountInfluxdbArgsDict: TypeAlias = Mapping[str, Any]
|
4692
|
+
|
3603
4693
|
@pulumi.input_type
|
3604
4694
|
class SecretsMountInfluxdbArgs:
|
3605
4695
|
def __init__(__self__, *,
|
@@ -3867,6 +4957,67 @@ class SecretsMountInfluxdbArgs:
|
|
3867
4957
|
pulumi.set(self, "verify_connection", value)
|
3868
4958
|
|
3869
4959
|
|
4960
|
+
if not MYPY:
|
4961
|
+
class SecretsMountMongodbArgsDict(TypedDict):
|
4962
|
+
name: pulumi.Input[str]
|
4963
|
+
"""
|
4964
|
+
Name of the database connection.
|
4965
|
+
"""
|
4966
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4967
|
+
"""
|
4968
|
+
A list of roles that are allowed to use this
|
4969
|
+
connection.
|
4970
|
+
"""
|
4971
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
4972
|
+
"""
|
4973
|
+
Connection string to use to connect to the database.
|
4974
|
+
"""
|
4975
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
4976
|
+
"""
|
4977
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4978
|
+
|
4979
|
+
Supported list of database secrets engines that can be configured:
|
4980
|
+
"""
|
4981
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
4982
|
+
"""
|
4983
|
+
Maximum number of seconds a connection may be reused.
|
4984
|
+
"""
|
4985
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
4986
|
+
"""
|
4987
|
+
Maximum number of idle connections to the database.
|
4988
|
+
"""
|
4989
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
4990
|
+
"""
|
4991
|
+
Maximum number of open connections to the database.
|
4992
|
+
"""
|
4993
|
+
password: NotRequired[pulumi.Input[str]]
|
4994
|
+
"""
|
4995
|
+
The root credential password used in the connection URL
|
4996
|
+
"""
|
4997
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
4998
|
+
"""
|
4999
|
+
Specifies the name of the plugin to use.
|
5000
|
+
"""
|
5001
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5002
|
+
"""
|
5003
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
5004
|
+
"""
|
5005
|
+
username: NotRequired[pulumi.Input[str]]
|
5006
|
+
"""
|
5007
|
+
The root credential username used in the connection URL
|
5008
|
+
"""
|
5009
|
+
username_template: NotRequired[pulumi.Input[str]]
|
5010
|
+
"""
|
5011
|
+
Username generation template.
|
5012
|
+
"""
|
5013
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
5014
|
+
"""
|
5015
|
+
Whether the connection should be verified on
|
5016
|
+
initial configuration or not.
|
5017
|
+
"""
|
5018
|
+
elif False:
|
5019
|
+
SecretsMountMongodbArgsDict: TypeAlias = Mapping[str, Any]
|
5020
|
+
|
3870
5021
|
@pulumi.input_type
|
3871
5022
|
class SecretsMountMongodbArgs:
|
3872
5023
|
def __init__(__self__, *,
|
@@ -4089,6 +5240,51 @@ class SecretsMountMongodbArgs:
|
|
4089
5240
|
pulumi.set(self, "verify_connection", value)
|
4090
5241
|
|
4091
5242
|
|
5243
|
+
if not MYPY:
|
5244
|
+
class SecretsMountMongodbatlaArgsDict(TypedDict):
|
5245
|
+
name: pulumi.Input[str]
|
5246
|
+
"""
|
5247
|
+
Name of the database connection.
|
5248
|
+
"""
|
5249
|
+
private_key: pulumi.Input[str]
|
5250
|
+
"""
|
5251
|
+
The Private Programmatic API Key used to connect with MongoDB Atlas API.
|
5252
|
+
"""
|
5253
|
+
project_id: pulumi.Input[str]
|
5254
|
+
"""
|
5255
|
+
The Project ID the Database User should be created within.
|
5256
|
+
"""
|
5257
|
+
public_key: pulumi.Input[str]
|
5258
|
+
"""
|
5259
|
+
The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
|
5260
|
+
"""
|
5261
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5262
|
+
"""
|
5263
|
+
A list of roles that are allowed to use this
|
5264
|
+
connection.
|
5265
|
+
"""
|
5266
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
5267
|
+
"""
|
5268
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5269
|
+
|
5270
|
+
Supported list of database secrets engines that can be configured:
|
5271
|
+
"""
|
5272
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
5273
|
+
"""
|
5274
|
+
Specifies the name of the plugin to use.
|
5275
|
+
"""
|
5276
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5277
|
+
"""
|
5278
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
5279
|
+
"""
|
5280
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
5281
|
+
"""
|
5282
|
+
Whether the connection should be verified on
|
5283
|
+
initial configuration or not.
|
5284
|
+
"""
|
5285
|
+
elif False:
|
5286
|
+
SecretsMountMongodbatlaArgsDict: TypeAlias = Mapping[str, Any]
|
5287
|
+
|
4092
5288
|
@pulumi.input_type
|
4093
5289
|
class SecretsMountMongodbatlaArgs:
|
4094
5290
|
def __init__(__self__, *,
|
@@ -4244,6 +5440,75 @@ class SecretsMountMongodbatlaArgs:
|
|
4244
5440
|
pulumi.set(self, "verify_connection", value)
|
4245
5441
|
|
4246
5442
|
|
5443
|
+
if not MYPY:
|
5444
|
+
class SecretsMountMssqlArgsDict(TypedDict):
|
5445
|
+
name: pulumi.Input[str]
|
5446
|
+
"""
|
5447
|
+
Name of the database connection.
|
5448
|
+
"""
|
5449
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5450
|
+
"""
|
5451
|
+
A list of roles that are allowed to use this
|
5452
|
+
connection.
|
5453
|
+
"""
|
5454
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
5455
|
+
"""
|
5456
|
+
Connection string to use to connect to the database.
|
5457
|
+
"""
|
5458
|
+
contained_db: NotRequired[pulumi.Input[bool]]
|
5459
|
+
"""
|
5460
|
+
Set to true when the target is a Contained Database, e.g. AzureSQL.
|
5461
|
+
"""
|
5462
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
5463
|
+
"""
|
5464
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5465
|
+
|
5466
|
+
Supported list of database secrets engines that can be configured:
|
5467
|
+
"""
|
5468
|
+
disable_escaping: NotRequired[pulumi.Input[bool]]
|
5469
|
+
"""
|
5470
|
+
Disable special character escaping in username and password
|
5471
|
+
"""
|
5472
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
5473
|
+
"""
|
5474
|
+
Maximum number of seconds a connection may be reused.
|
5475
|
+
"""
|
5476
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
5477
|
+
"""
|
5478
|
+
Maximum number of idle connections to the database.
|
5479
|
+
"""
|
5480
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
5481
|
+
"""
|
5482
|
+
Maximum number of open connections to the database.
|
5483
|
+
"""
|
5484
|
+
password: NotRequired[pulumi.Input[str]]
|
5485
|
+
"""
|
5486
|
+
The root credential password used in the connection URL
|
5487
|
+
"""
|
5488
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
5489
|
+
"""
|
5490
|
+
Specifies the name of the plugin to use.
|
5491
|
+
"""
|
5492
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5493
|
+
"""
|
5494
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
5495
|
+
"""
|
5496
|
+
username: NotRequired[pulumi.Input[str]]
|
5497
|
+
"""
|
5498
|
+
The root credential username used in the connection URL
|
5499
|
+
"""
|
5500
|
+
username_template: NotRequired[pulumi.Input[str]]
|
5501
|
+
"""
|
5502
|
+
Username generation template.
|
5503
|
+
"""
|
5504
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
5505
|
+
"""
|
5506
|
+
Whether the connection should be verified on
|
5507
|
+
initial configuration or not.
|
5508
|
+
"""
|
5509
|
+
elif False:
|
5510
|
+
SecretsMountMssqlArgsDict: TypeAlias = Mapping[str, Any]
|
5511
|
+
|
4247
5512
|
@pulumi.input_type
|
4248
5513
|
class SecretsMountMssqlArgs:
|
4249
5514
|
def __init__(__self__, *,
|
@@ -4498,6 +5763,83 @@ class SecretsMountMssqlArgs:
|
|
4498
5763
|
pulumi.set(self, "verify_connection", value)
|
4499
5764
|
|
4500
5765
|
|
5766
|
+
if not MYPY:
|
5767
|
+
class SecretsMountMysqlArgsDict(TypedDict):
|
5768
|
+
name: pulumi.Input[str]
|
5769
|
+
"""
|
5770
|
+
Name of the database connection.
|
5771
|
+
"""
|
5772
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5773
|
+
"""
|
5774
|
+
A list of roles that are allowed to use this
|
5775
|
+
connection.
|
5776
|
+
"""
|
5777
|
+
auth_type: NotRequired[pulumi.Input[str]]
|
5778
|
+
"""
|
5779
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5780
|
+
"""
|
5781
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
5782
|
+
"""
|
5783
|
+
Connection string to use to connect to the database.
|
5784
|
+
"""
|
5785
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
5786
|
+
"""
|
5787
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5788
|
+
|
5789
|
+
Supported list of database secrets engines that can be configured:
|
5790
|
+
"""
|
5791
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
5792
|
+
"""
|
5793
|
+
Maximum number of seconds a connection may be reused.
|
5794
|
+
"""
|
5795
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
5796
|
+
"""
|
5797
|
+
Maximum number of idle connections to the database.
|
5798
|
+
"""
|
5799
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
5800
|
+
"""
|
5801
|
+
Maximum number of open connections to the database.
|
5802
|
+
"""
|
5803
|
+
password: NotRequired[pulumi.Input[str]]
|
5804
|
+
"""
|
5805
|
+
The root credential password used in the connection URL
|
5806
|
+
"""
|
5807
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
5808
|
+
"""
|
5809
|
+
Specifies the name of the plugin to use.
|
5810
|
+
"""
|
5811
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5812
|
+
"""
|
5813
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
5814
|
+
"""
|
5815
|
+
service_account_json: NotRequired[pulumi.Input[str]]
|
5816
|
+
"""
|
5817
|
+
A JSON encoded credential for use with IAM authorization
|
5818
|
+
"""
|
5819
|
+
tls_ca: NotRequired[pulumi.Input[str]]
|
5820
|
+
"""
|
5821
|
+
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
5822
|
+
"""
|
5823
|
+
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
5824
|
+
"""
|
5825
|
+
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
5826
|
+
"""
|
5827
|
+
username: NotRequired[pulumi.Input[str]]
|
5828
|
+
"""
|
5829
|
+
The root credential username used in the connection URL
|
5830
|
+
"""
|
5831
|
+
username_template: NotRequired[pulumi.Input[str]]
|
5832
|
+
"""
|
5833
|
+
Username generation template.
|
5834
|
+
"""
|
5835
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
5836
|
+
"""
|
5837
|
+
Whether the connection should be verified on
|
5838
|
+
initial configuration or not.
|
5839
|
+
"""
|
5840
|
+
elif False:
|
5841
|
+
SecretsMountMysqlArgsDict: TypeAlias = Mapping[str, Any]
|
5842
|
+
|
4501
5843
|
@pulumi.input_type
|
4502
5844
|
class SecretsMountMysqlArgs:
|
4503
5845
|
def __init__(__self__, *,
|
@@ -4784,6 +6126,83 @@ class SecretsMountMysqlArgs:
|
|
4784
6126
|
pulumi.set(self, "verify_connection", value)
|
4785
6127
|
|
4786
6128
|
|
6129
|
+
if not MYPY:
|
6130
|
+
class SecretsMountMysqlAuroraArgsDict(TypedDict):
|
6131
|
+
name: pulumi.Input[str]
|
6132
|
+
"""
|
6133
|
+
Name of the database connection.
|
6134
|
+
"""
|
6135
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
6136
|
+
"""
|
6137
|
+
A list of roles that are allowed to use this
|
6138
|
+
connection.
|
6139
|
+
"""
|
6140
|
+
auth_type: NotRequired[pulumi.Input[str]]
|
6141
|
+
"""
|
6142
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
6143
|
+
"""
|
6144
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
6145
|
+
"""
|
6146
|
+
Connection string to use to connect to the database.
|
6147
|
+
"""
|
6148
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
6149
|
+
"""
|
6150
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6151
|
+
|
6152
|
+
Supported list of database secrets engines that can be configured:
|
6153
|
+
"""
|
6154
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
6155
|
+
"""
|
6156
|
+
Maximum number of seconds a connection may be reused.
|
6157
|
+
"""
|
6158
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
6159
|
+
"""
|
6160
|
+
Maximum number of idle connections to the database.
|
6161
|
+
"""
|
6162
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
6163
|
+
"""
|
6164
|
+
Maximum number of open connections to the database.
|
6165
|
+
"""
|
6166
|
+
password: NotRequired[pulumi.Input[str]]
|
6167
|
+
"""
|
6168
|
+
The root credential password used in the connection URL
|
6169
|
+
"""
|
6170
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
6171
|
+
"""
|
6172
|
+
Specifies the name of the plugin to use.
|
6173
|
+
"""
|
6174
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
6175
|
+
"""
|
6176
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
6177
|
+
"""
|
6178
|
+
service_account_json: NotRequired[pulumi.Input[str]]
|
6179
|
+
"""
|
6180
|
+
A JSON encoded credential for use with IAM authorization
|
6181
|
+
"""
|
6182
|
+
tls_ca: NotRequired[pulumi.Input[str]]
|
6183
|
+
"""
|
6184
|
+
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
6185
|
+
"""
|
6186
|
+
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
6187
|
+
"""
|
6188
|
+
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
6189
|
+
"""
|
6190
|
+
username: NotRequired[pulumi.Input[str]]
|
6191
|
+
"""
|
6192
|
+
The root credential username used in the connection URL
|
6193
|
+
"""
|
6194
|
+
username_template: NotRequired[pulumi.Input[str]]
|
6195
|
+
"""
|
6196
|
+
Username generation template.
|
6197
|
+
"""
|
6198
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
6199
|
+
"""
|
6200
|
+
Whether the connection should be verified on
|
6201
|
+
initial configuration or not.
|
6202
|
+
"""
|
6203
|
+
elif False:
|
6204
|
+
SecretsMountMysqlAuroraArgsDict: TypeAlias = Mapping[str, Any]
|
6205
|
+
|
4787
6206
|
@pulumi.input_type
|
4788
6207
|
class SecretsMountMysqlAuroraArgs:
|
4789
6208
|
def __init__(__self__, *,
|
@@ -5070,6 +6489,83 @@ class SecretsMountMysqlAuroraArgs:
|
|
5070
6489
|
pulumi.set(self, "verify_connection", value)
|
5071
6490
|
|
5072
6491
|
|
6492
|
+
if not MYPY:
|
6493
|
+
class SecretsMountMysqlLegacyArgsDict(TypedDict):
|
6494
|
+
name: pulumi.Input[str]
|
6495
|
+
"""
|
6496
|
+
Name of the database connection.
|
6497
|
+
"""
|
6498
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
6499
|
+
"""
|
6500
|
+
A list of roles that are allowed to use this
|
6501
|
+
connection.
|
6502
|
+
"""
|
6503
|
+
auth_type: NotRequired[pulumi.Input[str]]
|
6504
|
+
"""
|
6505
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
6506
|
+
"""
|
6507
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
6508
|
+
"""
|
6509
|
+
Connection string to use to connect to the database.
|
6510
|
+
"""
|
6511
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
6512
|
+
"""
|
6513
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6514
|
+
|
6515
|
+
Supported list of database secrets engines that can be configured:
|
6516
|
+
"""
|
6517
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
6518
|
+
"""
|
6519
|
+
Maximum number of seconds a connection may be reused.
|
6520
|
+
"""
|
6521
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
6522
|
+
"""
|
6523
|
+
Maximum number of idle connections to the database.
|
6524
|
+
"""
|
6525
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
6526
|
+
"""
|
6527
|
+
Maximum number of open connections to the database.
|
6528
|
+
"""
|
6529
|
+
password: NotRequired[pulumi.Input[str]]
|
6530
|
+
"""
|
6531
|
+
The root credential password used in the connection URL
|
6532
|
+
"""
|
6533
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
6534
|
+
"""
|
6535
|
+
Specifies the name of the plugin to use.
|
6536
|
+
"""
|
6537
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
6538
|
+
"""
|
6539
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
6540
|
+
"""
|
6541
|
+
service_account_json: NotRequired[pulumi.Input[str]]
|
6542
|
+
"""
|
6543
|
+
A JSON encoded credential for use with IAM authorization
|
6544
|
+
"""
|
6545
|
+
tls_ca: NotRequired[pulumi.Input[str]]
|
6546
|
+
"""
|
6547
|
+
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
6548
|
+
"""
|
6549
|
+
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
6550
|
+
"""
|
6551
|
+
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
6552
|
+
"""
|
6553
|
+
username: NotRequired[pulumi.Input[str]]
|
6554
|
+
"""
|
6555
|
+
The root credential username used in the connection URL
|
6556
|
+
"""
|
6557
|
+
username_template: NotRequired[pulumi.Input[str]]
|
6558
|
+
"""
|
6559
|
+
Username generation template.
|
6560
|
+
"""
|
6561
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
6562
|
+
"""
|
6563
|
+
Whether the connection should be verified on
|
6564
|
+
initial configuration or not.
|
6565
|
+
"""
|
6566
|
+
elif False:
|
6567
|
+
SecretsMountMysqlLegacyArgsDict: TypeAlias = Mapping[str, Any]
|
6568
|
+
|
5073
6569
|
@pulumi.input_type
|
5074
6570
|
class SecretsMountMysqlLegacyArgs:
|
5075
6571
|
def __init__(__self__, *,
|
@@ -5356,6 +6852,83 @@ class SecretsMountMysqlLegacyArgs:
|
|
5356
6852
|
pulumi.set(self, "verify_connection", value)
|
5357
6853
|
|
5358
6854
|
|
6855
|
+
if not MYPY:
|
6856
|
+
class SecretsMountMysqlRdArgsDict(TypedDict):
|
6857
|
+
name: pulumi.Input[str]
|
6858
|
+
"""
|
6859
|
+
Name of the database connection.
|
6860
|
+
"""
|
6861
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
6862
|
+
"""
|
6863
|
+
A list of roles that are allowed to use this
|
6864
|
+
connection.
|
6865
|
+
"""
|
6866
|
+
auth_type: NotRequired[pulumi.Input[str]]
|
6867
|
+
"""
|
6868
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
6869
|
+
"""
|
6870
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
6871
|
+
"""
|
6872
|
+
Connection string to use to connect to the database.
|
6873
|
+
"""
|
6874
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
6875
|
+
"""
|
6876
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6877
|
+
|
6878
|
+
Supported list of database secrets engines that can be configured:
|
6879
|
+
"""
|
6880
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
6881
|
+
"""
|
6882
|
+
Maximum number of seconds a connection may be reused.
|
6883
|
+
"""
|
6884
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
6885
|
+
"""
|
6886
|
+
Maximum number of idle connections to the database.
|
6887
|
+
"""
|
6888
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
6889
|
+
"""
|
6890
|
+
Maximum number of open connections to the database.
|
6891
|
+
"""
|
6892
|
+
password: NotRequired[pulumi.Input[str]]
|
6893
|
+
"""
|
6894
|
+
The root credential password used in the connection URL
|
6895
|
+
"""
|
6896
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
6897
|
+
"""
|
6898
|
+
Specifies the name of the plugin to use.
|
6899
|
+
"""
|
6900
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
6901
|
+
"""
|
6902
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
6903
|
+
"""
|
6904
|
+
service_account_json: NotRequired[pulumi.Input[str]]
|
6905
|
+
"""
|
6906
|
+
A JSON encoded credential for use with IAM authorization
|
6907
|
+
"""
|
6908
|
+
tls_ca: NotRequired[pulumi.Input[str]]
|
6909
|
+
"""
|
6910
|
+
x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
6911
|
+
"""
|
6912
|
+
tls_certificate_key: NotRequired[pulumi.Input[str]]
|
6913
|
+
"""
|
6914
|
+
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
6915
|
+
"""
|
6916
|
+
username: NotRequired[pulumi.Input[str]]
|
6917
|
+
"""
|
6918
|
+
The root credential username used in the connection URL
|
6919
|
+
"""
|
6920
|
+
username_template: NotRequired[pulumi.Input[str]]
|
6921
|
+
"""
|
6922
|
+
Username generation template.
|
6923
|
+
"""
|
6924
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
6925
|
+
"""
|
6926
|
+
Whether the connection should be verified on
|
6927
|
+
initial configuration or not.
|
6928
|
+
"""
|
6929
|
+
elif False:
|
6930
|
+
SecretsMountMysqlRdArgsDict: TypeAlias = Mapping[str, Any]
|
6931
|
+
|
5359
6932
|
@pulumi.input_type
|
5360
6933
|
class SecretsMountMysqlRdArgs:
|
5361
6934
|
def __init__(__self__, *,
|
@@ -5598,49 +7171,118 @@ class SecretsMountMysqlRdArgs:
|
|
5598
7171
|
"""
|
5599
7172
|
x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
5600
7173
|
"""
|
5601
|
-
return pulumi.get(self, "tls_certificate_key")
|
5602
|
-
|
5603
|
-
@tls_certificate_key.setter
|
5604
|
-
def tls_certificate_key(self, value: Optional[pulumi.Input[str]]):
|
5605
|
-
pulumi.set(self, "tls_certificate_key", value)
|
5606
|
-
|
5607
|
-
@property
|
5608
|
-
@pulumi.getter
|
5609
|
-
def username(self) -> Optional[pulumi.Input[str]]:
|
7174
|
+
return pulumi.get(self, "tls_certificate_key")
|
7175
|
+
|
7176
|
+
@tls_certificate_key.setter
|
7177
|
+
def tls_certificate_key(self, value: Optional[pulumi.Input[str]]):
|
7178
|
+
pulumi.set(self, "tls_certificate_key", value)
|
7179
|
+
|
7180
|
+
@property
|
7181
|
+
@pulumi.getter
|
7182
|
+
def username(self) -> Optional[pulumi.Input[str]]:
|
7183
|
+
"""
|
7184
|
+
The root credential username used in the connection URL
|
7185
|
+
"""
|
7186
|
+
return pulumi.get(self, "username")
|
7187
|
+
|
7188
|
+
@username.setter
|
7189
|
+
def username(self, value: Optional[pulumi.Input[str]]):
|
7190
|
+
pulumi.set(self, "username", value)
|
7191
|
+
|
7192
|
+
@property
|
7193
|
+
@pulumi.getter(name="usernameTemplate")
|
7194
|
+
def username_template(self) -> Optional[pulumi.Input[str]]:
|
7195
|
+
"""
|
7196
|
+
Username generation template.
|
7197
|
+
"""
|
7198
|
+
return pulumi.get(self, "username_template")
|
7199
|
+
|
7200
|
+
@username_template.setter
|
7201
|
+
def username_template(self, value: Optional[pulumi.Input[str]]):
|
7202
|
+
pulumi.set(self, "username_template", value)
|
7203
|
+
|
7204
|
+
@property
|
7205
|
+
@pulumi.getter(name="verifyConnection")
|
7206
|
+
def verify_connection(self) -> Optional[pulumi.Input[bool]]:
|
7207
|
+
"""
|
7208
|
+
Whether the connection should be verified on
|
7209
|
+
initial configuration or not.
|
7210
|
+
"""
|
7211
|
+
return pulumi.get(self, "verify_connection")
|
7212
|
+
|
7213
|
+
@verify_connection.setter
|
7214
|
+
def verify_connection(self, value: Optional[pulumi.Input[bool]]):
|
7215
|
+
pulumi.set(self, "verify_connection", value)
|
7216
|
+
|
7217
|
+
|
7218
|
+
if not MYPY:
|
7219
|
+
class SecretsMountOracleArgsDict(TypedDict):
|
7220
|
+
name: pulumi.Input[str]
|
7221
|
+
"""
|
7222
|
+
Name of the database connection.
|
7223
|
+
"""
|
7224
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
7225
|
+
"""
|
7226
|
+
A list of roles that are allowed to use this
|
7227
|
+
connection.
|
7228
|
+
"""
|
7229
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
7230
|
+
"""
|
7231
|
+
Connection string to use to connect to the database.
|
7232
|
+
"""
|
7233
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
7234
|
+
"""
|
7235
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7236
|
+
|
7237
|
+
Supported list of database secrets engines that can be configured:
|
7238
|
+
"""
|
7239
|
+
disconnect_sessions: NotRequired[pulumi.Input[bool]]
|
7240
|
+
"""
|
7241
|
+
Set to true to disconnect any open sessions prior to running the revocation statements.
|
7242
|
+
"""
|
7243
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
7244
|
+
"""
|
7245
|
+
Maximum number of seconds a connection may be reused.
|
7246
|
+
"""
|
7247
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
7248
|
+
"""
|
7249
|
+
Maximum number of idle connections to the database.
|
7250
|
+
"""
|
7251
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
7252
|
+
"""
|
7253
|
+
Maximum number of open connections to the database.
|
7254
|
+
"""
|
7255
|
+
password: NotRequired[pulumi.Input[str]]
|
7256
|
+
"""
|
7257
|
+
The root credential password used in the connection URL
|
7258
|
+
"""
|
7259
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
7260
|
+
"""
|
7261
|
+
Specifies the name of the plugin to use.
|
7262
|
+
"""
|
7263
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
7264
|
+
"""
|
7265
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
7266
|
+
"""
|
7267
|
+
split_statements: NotRequired[pulumi.Input[bool]]
|
7268
|
+
"""
|
7269
|
+
Set to true in order to split statements after semi-colons.
|
7270
|
+
"""
|
7271
|
+
username: NotRequired[pulumi.Input[str]]
|
5610
7272
|
"""
|
5611
7273
|
The root credential username used in the connection URL
|
5612
7274
|
"""
|
5613
|
-
|
5614
|
-
|
5615
|
-
@username.setter
|
5616
|
-
def username(self, value: Optional[pulumi.Input[str]]):
|
5617
|
-
pulumi.set(self, "username", value)
|
5618
|
-
|
5619
|
-
@property
|
5620
|
-
@pulumi.getter(name="usernameTemplate")
|
5621
|
-
def username_template(self) -> Optional[pulumi.Input[str]]:
|
7275
|
+
username_template: NotRequired[pulumi.Input[str]]
|
5622
7276
|
"""
|
5623
7277
|
Username generation template.
|
5624
7278
|
"""
|
5625
|
-
|
5626
|
-
|
5627
|
-
@username_template.setter
|
5628
|
-
def username_template(self, value: Optional[pulumi.Input[str]]):
|
5629
|
-
pulumi.set(self, "username_template", value)
|
5630
|
-
|
5631
|
-
@property
|
5632
|
-
@pulumi.getter(name="verifyConnection")
|
5633
|
-
def verify_connection(self) -> Optional[pulumi.Input[bool]]:
|
7279
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
5634
7280
|
"""
|
5635
7281
|
Whether the connection should be verified on
|
5636
7282
|
initial configuration or not.
|
5637
7283
|
"""
|
5638
|
-
|
5639
|
-
|
5640
|
-
@verify_connection.setter
|
5641
|
-
def verify_connection(self, value: Optional[pulumi.Input[bool]]):
|
5642
|
-
pulumi.set(self, "verify_connection", value)
|
5643
|
-
|
7284
|
+
elif False:
|
7285
|
+
SecretsMountOracleArgsDict: TypeAlias = Mapping[str, Any]
|
5644
7286
|
|
5645
7287
|
@pulumi.input_type
|
5646
7288
|
class SecretsMountOracleArgs:
|
@@ -5896,6 +7538,79 @@ class SecretsMountOracleArgs:
|
|
5896
7538
|
pulumi.set(self, "verify_connection", value)
|
5897
7539
|
|
5898
7540
|
|
7541
|
+
if not MYPY:
|
7542
|
+
class SecretsMountPostgresqlArgsDict(TypedDict):
|
7543
|
+
name: pulumi.Input[str]
|
7544
|
+
"""
|
7545
|
+
Name of the database connection.
|
7546
|
+
"""
|
7547
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
7548
|
+
"""
|
7549
|
+
A list of roles that are allowed to use this
|
7550
|
+
connection.
|
7551
|
+
"""
|
7552
|
+
auth_type: NotRequired[pulumi.Input[str]]
|
7553
|
+
"""
|
7554
|
+
Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
7555
|
+
"""
|
7556
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
7557
|
+
"""
|
7558
|
+
Connection string to use to connect to the database.
|
7559
|
+
"""
|
7560
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
7561
|
+
"""
|
7562
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7563
|
+
|
7564
|
+
Supported list of database secrets engines that can be configured:
|
7565
|
+
"""
|
7566
|
+
disable_escaping: NotRequired[pulumi.Input[bool]]
|
7567
|
+
"""
|
7568
|
+
Disable special character escaping in username and password
|
7569
|
+
"""
|
7570
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
7571
|
+
"""
|
7572
|
+
Maximum number of seconds a connection may be reused.
|
7573
|
+
"""
|
7574
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
7575
|
+
"""
|
7576
|
+
Maximum number of idle connections to the database.
|
7577
|
+
"""
|
7578
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
7579
|
+
"""
|
7580
|
+
Maximum number of open connections to the database.
|
7581
|
+
"""
|
7582
|
+
password: NotRequired[pulumi.Input[str]]
|
7583
|
+
"""
|
7584
|
+
The root credential password used in the connection URL
|
7585
|
+
"""
|
7586
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
7587
|
+
"""
|
7588
|
+
Specifies the name of the plugin to use.
|
7589
|
+
"""
|
7590
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
7591
|
+
"""
|
7592
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
7593
|
+
"""
|
7594
|
+
service_account_json: NotRequired[pulumi.Input[str]]
|
7595
|
+
"""
|
7596
|
+
A JSON encoded credential for use with IAM authorization
|
7597
|
+
"""
|
7598
|
+
username: NotRequired[pulumi.Input[str]]
|
7599
|
+
"""
|
7600
|
+
The root credential username used in the connection URL
|
7601
|
+
"""
|
7602
|
+
username_template: NotRequired[pulumi.Input[str]]
|
7603
|
+
"""
|
7604
|
+
Username generation template.
|
7605
|
+
"""
|
7606
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
7607
|
+
"""
|
7608
|
+
Whether the connection should be verified on
|
7609
|
+
initial configuration or not.
|
7610
|
+
"""
|
7611
|
+
elif False:
|
7612
|
+
SecretsMountPostgresqlArgsDict: TypeAlias = Mapping[str, Any]
|
7613
|
+
|
5899
7614
|
@pulumi.input_type
|
5900
7615
|
class SecretsMountPostgresqlArgs:
|
5901
7616
|
def __init__(__self__, *,
|
@@ -6166,6 +7881,67 @@ class SecretsMountPostgresqlArgs:
|
|
6166
7881
|
pulumi.set(self, "verify_connection", value)
|
6167
7882
|
|
6168
7883
|
|
7884
|
+
if not MYPY:
|
7885
|
+
class SecretsMountRediArgsDict(TypedDict):
|
7886
|
+
host: pulumi.Input[str]
|
7887
|
+
"""
|
7888
|
+
Specifies the host to connect to
|
7889
|
+
"""
|
7890
|
+
name: pulumi.Input[str]
|
7891
|
+
"""
|
7892
|
+
Name of the database connection.
|
7893
|
+
"""
|
7894
|
+
password: pulumi.Input[str]
|
7895
|
+
"""
|
7896
|
+
Specifies the password corresponding to the given username.
|
7897
|
+
"""
|
7898
|
+
username: pulumi.Input[str]
|
7899
|
+
"""
|
7900
|
+
Specifies the username for Vault to use.
|
7901
|
+
"""
|
7902
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
7903
|
+
"""
|
7904
|
+
A list of roles that are allowed to use this
|
7905
|
+
connection.
|
7906
|
+
"""
|
7907
|
+
ca_cert: NotRequired[pulumi.Input[str]]
|
7908
|
+
"""
|
7909
|
+
The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
|
7910
|
+
"""
|
7911
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
7912
|
+
"""
|
7913
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7914
|
+
|
7915
|
+
Supported list of database secrets engines that can be configured:
|
7916
|
+
"""
|
7917
|
+
insecure_tls: NotRequired[pulumi.Input[bool]]
|
7918
|
+
"""
|
7919
|
+
Specifies whether to skip verification of the server certificate when using TLS.
|
7920
|
+
"""
|
7921
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
7922
|
+
"""
|
7923
|
+
Specifies the name of the plugin to use.
|
7924
|
+
"""
|
7925
|
+
port: NotRequired[pulumi.Input[int]]
|
7926
|
+
"""
|
7927
|
+
The transport port to use to connect to Redis.
|
7928
|
+
"""
|
7929
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
7930
|
+
"""
|
7931
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
7932
|
+
"""
|
7933
|
+
tls: NotRequired[pulumi.Input[bool]]
|
7934
|
+
"""
|
7935
|
+
Specifies whether to use TLS when connecting to Redis.
|
7936
|
+
"""
|
7937
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
7938
|
+
"""
|
7939
|
+
Whether the connection should be verified on
|
7940
|
+
initial configuration or not.
|
7941
|
+
"""
|
7942
|
+
elif False:
|
7943
|
+
SecretsMountRediArgsDict: TypeAlias = Mapping[str, Any]
|
7944
|
+
|
6169
7945
|
@pulumi.input_type
|
6170
7946
|
class SecretsMountRediArgs:
|
6171
7947
|
def __init__(__self__, *,
|
@@ -6385,6 +8161,55 @@ class SecretsMountRediArgs:
|
|
6385
8161
|
pulumi.set(self, "verify_connection", value)
|
6386
8162
|
|
6387
8163
|
|
8164
|
+
if not MYPY:
|
8165
|
+
class SecretsMountRedisElasticachArgsDict(TypedDict):
|
8166
|
+
name: pulumi.Input[str]
|
8167
|
+
"""
|
8168
|
+
Name of the database connection.
|
8169
|
+
"""
|
8170
|
+
url: pulumi.Input[str]
|
8171
|
+
"""
|
8172
|
+
The configuration endpoint for the ElastiCache cluster to connect to.
|
8173
|
+
"""
|
8174
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
8175
|
+
"""
|
8176
|
+
A list of roles that are allowed to use this
|
8177
|
+
connection.
|
8178
|
+
"""
|
8179
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
8180
|
+
"""
|
8181
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8182
|
+
|
8183
|
+
Supported list of database secrets engines that can be configured:
|
8184
|
+
"""
|
8185
|
+
password: NotRequired[pulumi.Input[str]]
|
8186
|
+
"""
|
8187
|
+
The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
8188
|
+
"""
|
8189
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
8190
|
+
"""
|
8191
|
+
Specifies the name of the plugin to use.
|
8192
|
+
"""
|
8193
|
+
region: NotRequired[pulumi.Input[str]]
|
8194
|
+
"""
|
8195
|
+
The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
|
8196
|
+
"""
|
8197
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
8198
|
+
"""
|
8199
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
8200
|
+
"""
|
8201
|
+
username: NotRequired[pulumi.Input[str]]
|
8202
|
+
"""
|
8203
|
+
The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
8204
|
+
"""
|
8205
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
8206
|
+
"""
|
8207
|
+
Whether the connection should be verified on
|
8208
|
+
initial configuration or not.
|
8209
|
+
"""
|
8210
|
+
elif False:
|
8211
|
+
SecretsMountRedisElasticachArgsDict: TypeAlias = Mapping[str, Any]
|
8212
|
+
|
6388
8213
|
@pulumi.input_type
|
6389
8214
|
class SecretsMountRedisElasticachArgs:
|
6390
8215
|
def __init__(__self__, *,
|
@@ -6558,6 +8383,71 @@ class SecretsMountRedisElasticachArgs:
|
|
6558
8383
|
pulumi.set(self, "verify_connection", value)
|
6559
8384
|
|
6560
8385
|
|
8386
|
+
if not MYPY:
|
8387
|
+
class SecretsMountRedshiftArgsDict(TypedDict):
|
8388
|
+
name: pulumi.Input[str]
|
8389
|
+
"""
|
8390
|
+
Name of the database connection.
|
8391
|
+
"""
|
8392
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
8393
|
+
"""
|
8394
|
+
A list of roles that are allowed to use this
|
8395
|
+
connection.
|
8396
|
+
"""
|
8397
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
8398
|
+
"""
|
8399
|
+
Connection string to use to connect to the database.
|
8400
|
+
"""
|
8401
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
8402
|
+
"""
|
8403
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8404
|
+
|
8405
|
+
Supported list of database secrets engines that can be configured:
|
8406
|
+
"""
|
8407
|
+
disable_escaping: NotRequired[pulumi.Input[bool]]
|
8408
|
+
"""
|
8409
|
+
Disable special character escaping in username and password
|
8410
|
+
"""
|
8411
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
8412
|
+
"""
|
8413
|
+
Maximum number of seconds a connection may be reused.
|
8414
|
+
"""
|
8415
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
8416
|
+
"""
|
8417
|
+
Maximum number of idle connections to the database.
|
8418
|
+
"""
|
8419
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
8420
|
+
"""
|
8421
|
+
Maximum number of open connections to the database.
|
8422
|
+
"""
|
8423
|
+
password: NotRequired[pulumi.Input[str]]
|
8424
|
+
"""
|
8425
|
+
The root credential password used in the connection URL
|
8426
|
+
"""
|
8427
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
8428
|
+
"""
|
8429
|
+
Specifies the name of the plugin to use.
|
8430
|
+
"""
|
8431
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
8432
|
+
"""
|
8433
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
8434
|
+
"""
|
8435
|
+
username: NotRequired[pulumi.Input[str]]
|
8436
|
+
"""
|
8437
|
+
The root credential username used in the connection URL
|
8438
|
+
"""
|
8439
|
+
username_template: NotRequired[pulumi.Input[str]]
|
8440
|
+
"""
|
8441
|
+
Username generation template.
|
8442
|
+
"""
|
8443
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
8444
|
+
"""
|
8445
|
+
Whether the connection should be verified on
|
8446
|
+
initial configuration or not.
|
8447
|
+
"""
|
8448
|
+
elif False:
|
8449
|
+
SecretsMountRedshiftArgsDict: TypeAlias = Mapping[str, Any]
|
8450
|
+
|
6561
8451
|
@pulumi.input_type
|
6562
8452
|
class SecretsMountRedshiftArgs:
|
6563
8453
|
def __init__(__self__, *,
|
@@ -6796,6 +8686,67 @@ class SecretsMountRedshiftArgs:
|
|
6796
8686
|
pulumi.set(self, "verify_connection", value)
|
6797
8687
|
|
6798
8688
|
|
8689
|
+
if not MYPY:
|
8690
|
+
class SecretsMountSnowflakeArgsDict(TypedDict):
|
8691
|
+
name: pulumi.Input[str]
|
8692
|
+
"""
|
8693
|
+
Name of the database connection.
|
8694
|
+
"""
|
8695
|
+
allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
8696
|
+
"""
|
8697
|
+
A list of roles that are allowed to use this
|
8698
|
+
connection.
|
8699
|
+
"""
|
8700
|
+
connection_url: NotRequired[pulumi.Input[str]]
|
8701
|
+
"""
|
8702
|
+
Connection string to use to connect to the database.
|
8703
|
+
"""
|
8704
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
8705
|
+
"""
|
8706
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8707
|
+
|
8708
|
+
Supported list of database secrets engines that can be configured:
|
8709
|
+
"""
|
8710
|
+
max_connection_lifetime: NotRequired[pulumi.Input[int]]
|
8711
|
+
"""
|
8712
|
+
Maximum number of seconds a connection may be reused.
|
8713
|
+
"""
|
8714
|
+
max_idle_connections: NotRequired[pulumi.Input[int]]
|
8715
|
+
"""
|
8716
|
+
Maximum number of idle connections to the database.
|
8717
|
+
"""
|
8718
|
+
max_open_connections: NotRequired[pulumi.Input[int]]
|
8719
|
+
"""
|
8720
|
+
Maximum number of open connections to the database.
|
8721
|
+
"""
|
8722
|
+
password: NotRequired[pulumi.Input[str]]
|
8723
|
+
"""
|
8724
|
+
The root credential password used in the connection URL
|
8725
|
+
"""
|
8726
|
+
plugin_name: NotRequired[pulumi.Input[str]]
|
8727
|
+
"""
|
8728
|
+
Specifies the name of the plugin to use.
|
8729
|
+
"""
|
8730
|
+
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
8731
|
+
"""
|
8732
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
8733
|
+
"""
|
8734
|
+
username: NotRequired[pulumi.Input[str]]
|
8735
|
+
"""
|
8736
|
+
The root credential username used in the connection URL
|
8737
|
+
"""
|
8738
|
+
username_template: NotRequired[pulumi.Input[str]]
|
8739
|
+
"""
|
8740
|
+
Username generation template.
|
8741
|
+
"""
|
8742
|
+
verify_connection: NotRequired[pulumi.Input[bool]]
|
8743
|
+
"""
|
8744
|
+
Whether the connection should be verified on
|
8745
|
+
initial configuration or not.
|
8746
|
+
"""
|
8747
|
+
elif False:
|
8748
|
+
SecretsMountSnowflakeArgsDict: TypeAlias = Mapping[str, Any]
|
8749
|
+
|
6799
8750
|
@pulumi.input_type
|
6800
8751
|
class SecretsMountSnowflakeArgs:
|
6801
8752
|
def __init__(__self__, *,
|