pulumi-vault 6.4.0a1728108872__py3-none-any.whl → 6.4.0a1729059229__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +560 -0
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +19 -4
  4. pulumi_vault/ad/secret_backend.py +5 -0
  5. pulumi_vault/ad/secret_library.py +5 -0
  6. pulumi_vault/ad/secret_role.py +5 -0
  7. pulumi_vault/alicloud/auth_backend_role.py +5 -0
  8. pulumi_vault/approle/auth_backend_login.py +5 -0
  9. pulumi_vault/approle/auth_backend_role.py +5 -0
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
  11. pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
  12. pulumi_vault/audit.py +5 -0
  13. pulumi_vault/audit_request_header.py +5 -0
  14. pulumi_vault/auth_backend.py +5 -0
  15. pulumi_vault/aws/auth_backend_cert.py +5 -0
  16. pulumi_vault/aws/auth_backend_client.py +5 -0
  17. pulumi_vault/aws/auth_backend_config_identity.py +5 -0
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
  19. pulumi_vault/aws/auth_backend_login.py +5 -0
  20. pulumi_vault/aws/auth_backend_role.py +5 -0
  21. pulumi_vault/aws/auth_backend_role_tag.py +5 -0
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
  23. pulumi_vault/aws/auth_backend_sts_role.py +5 -0
  24. pulumi_vault/aws/get_access_credentials.py +31 -4
  25. pulumi_vault/aws/get_static_access_credentials.py +18 -4
  26. pulumi_vault/aws/secret_backend.py +5 -0
  27. pulumi_vault/aws/secret_backend_role.py +5 -0
  28. pulumi_vault/aws/secret_backend_static_role.py +5 -0
  29. pulumi_vault/azure/_inputs.py +24 -0
  30. pulumi_vault/azure/auth_backend_config.py +5 -0
  31. pulumi_vault/azure/auth_backend_role.py +5 -0
  32. pulumi_vault/azure/backend.py +5 -0
  33. pulumi_vault/azure/backend_role.py +5 -0
  34. pulumi_vault/azure/get_access_credentials.py +36 -4
  35. pulumi_vault/azure/outputs.py +5 -0
  36. pulumi_vault/cert_auth_backend_role.py +5 -0
  37. pulumi_vault/config/__init__.pyi +5 -0
  38. pulumi_vault/config/_inputs.py +21 -0
  39. pulumi_vault/config/outputs.py +5 -0
  40. pulumi_vault/config/ui_custom_message.py +5 -0
  41. pulumi_vault/config/vars.py +5 -0
  42. pulumi_vault/consul/secret_backend.py +5 -0
  43. pulumi_vault/consul/secret_backend_role.py +5 -0
  44. pulumi_vault/database/_inputs.py +2019 -68
  45. pulumi_vault/database/outputs.py +5 -0
  46. pulumi_vault/database/secret_backend_connection.py +5 -0
  47. pulumi_vault/database/secret_backend_role.py +5 -0
  48. pulumi_vault/database/secret_backend_static_role.py +5 -0
  49. pulumi_vault/database/secrets_mount.py +5 -0
  50. pulumi_vault/egp_policy.py +5 -0
  51. pulumi_vault/gcp/_inputs.py +111 -0
  52. pulumi_vault/gcp/auth_backend.py +5 -0
  53. pulumi_vault/gcp/auth_backend_role.py +5 -0
  54. pulumi_vault/gcp/get_auth_backend_role.py +42 -4
  55. pulumi_vault/gcp/outputs.py +5 -0
  56. pulumi_vault/gcp/secret_backend.py +5 -0
  57. pulumi_vault/gcp/secret_impersonated_account.py +5 -0
  58. pulumi_vault/gcp/secret_roleset.py +5 -0
  59. pulumi_vault/gcp/secret_static_account.py +5 -0
  60. pulumi_vault/generic/endpoint.py +5 -0
  61. pulumi_vault/generic/get_secret.py +24 -4
  62. pulumi_vault/generic/secret.py +5 -0
  63. pulumi_vault/get_auth_backend.py +21 -4
  64. pulumi_vault/get_auth_backends.py +16 -4
  65. pulumi_vault/get_namespace.py +17 -4
  66. pulumi_vault/get_namespaces.py +13 -4
  67. pulumi_vault/get_nomad_access_token.py +18 -4
  68. pulumi_vault/get_policy_document.py +15 -4
  69. pulumi_vault/get_raft_autopilot_state.py +23 -4
  70. pulumi_vault/github/_inputs.py +55 -0
  71. pulumi_vault/github/auth_backend.py +5 -0
  72. pulumi_vault/github/outputs.py +5 -0
  73. pulumi_vault/github/team.py +5 -0
  74. pulumi_vault/github/user.py +5 -0
  75. pulumi_vault/identity/entity.py +5 -0
  76. pulumi_vault/identity/entity_alias.py +5 -0
  77. pulumi_vault/identity/entity_policies.py +5 -0
  78. pulumi_vault/identity/get_entity.py +34 -4
  79. pulumi_vault/identity/get_group.py +40 -4
  80. pulumi_vault/identity/get_oidc_client_creds.py +16 -4
  81. pulumi_vault/identity/get_oidc_openid_config.py +26 -4
  82. pulumi_vault/identity/get_oidc_public_keys.py +15 -4
  83. pulumi_vault/identity/group.py +5 -0
  84. pulumi_vault/identity/group_alias.py +5 -0
  85. pulumi_vault/identity/group_member_entity_ids.py +5 -0
  86. pulumi_vault/identity/group_member_group_ids.py +5 -0
  87. pulumi_vault/identity/group_policies.py +5 -0
  88. pulumi_vault/identity/mfa_duo.py +5 -0
  89. pulumi_vault/identity/mfa_login_enforcement.py +5 -0
  90. pulumi_vault/identity/mfa_okta.py +5 -0
  91. pulumi_vault/identity/mfa_pingid.py +5 -0
  92. pulumi_vault/identity/mfa_totp.py +5 -0
  93. pulumi_vault/identity/oidc.py +5 -0
  94. pulumi_vault/identity/oidc_assignment.py +5 -0
  95. pulumi_vault/identity/oidc_client.py +5 -0
  96. pulumi_vault/identity/oidc_key.py +5 -0
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
  98. pulumi_vault/identity/oidc_provider.py +5 -0
  99. pulumi_vault/identity/oidc_role.py +5 -0
  100. pulumi_vault/identity/oidc_scope.py +5 -0
  101. pulumi_vault/identity/outputs.py +5 -0
  102. pulumi_vault/jwt/_inputs.py +55 -0
  103. pulumi_vault/jwt/auth_backend.py +5 -0
  104. pulumi_vault/jwt/auth_backend_role.py +5 -0
  105. pulumi_vault/jwt/outputs.py +5 -0
  106. pulumi_vault/kmip/secret_backend.py +5 -0
  107. pulumi_vault/kmip/secret_role.py +5 -0
  108. pulumi_vault/kmip/secret_scope.py +5 -0
  109. pulumi_vault/kubernetes/auth_backend_config.py +5 -0
  110. pulumi_vault/kubernetes/auth_backend_role.py +5 -0
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
  113. pulumi_vault/kubernetes/get_service_account_token.py +28 -4
  114. pulumi_vault/kubernetes/secret_backend.py +5 -0
  115. pulumi_vault/kubernetes/secret_backend_role.py +5 -0
  116. pulumi_vault/kv/_inputs.py +32 -0
  117. pulumi_vault/kv/get_secret.py +19 -4
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +23 -4
  119. pulumi_vault/kv/get_secret_v2.py +25 -4
  120. pulumi_vault/kv/get_secrets_list.py +15 -4
  121. pulumi_vault/kv/get_secrets_list_v2.py +18 -4
  122. pulumi_vault/kv/outputs.py +5 -0
  123. pulumi_vault/kv/secret.py +5 -0
  124. pulumi_vault/kv/secret_backend_v2.py +5 -0
  125. pulumi_vault/kv/secret_v2.py +5 -0
  126. pulumi_vault/ldap/auth_backend.py +5 -0
  127. pulumi_vault/ldap/auth_backend_group.py +5 -0
  128. pulumi_vault/ldap/auth_backend_user.py +5 -0
  129. pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
  130. pulumi_vault/ldap/get_static_credentials.py +23 -4
  131. pulumi_vault/ldap/secret_backend.py +5 -0
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
  133. pulumi_vault/ldap/secret_backend_library_set.py +5 -0
  134. pulumi_vault/ldap/secret_backend_static_role.py +5 -0
  135. pulumi_vault/managed/_inputs.py +205 -0
  136. pulumi_vault/managed/keys.py +5 -0
  137. pulumi_vault/managed/outputs.py +5 -0
  138. pulumi_vault/mfa_duo.py +5 -0
  139. pulumi_vault/mfa_okta.py +5 -0
  140. pulumi_vault/mfa_pingid.py +5 -0
  141. pulumi_vault/mfa_totp.py +5 -0
  142. pulumi_vault/mongodbatlas/secret_backend.py +5 -0
  143. pulumi_vault/mongodbatlas/secret_role.py +5 -0
  144. pulumi_vault/mount.py +5 -0
  145. pulumi_vault/namespace.py +5 -0
  146. pulumi_vault/nomad_secret_backend.py +5 -0
  147. pulumi_vault/nomad_secret_role.py +5 -0
  148. pulumi_vault/okta/_inputs.py +39 -0
  149. pulumi_vault/okta/auth_backend.py +5 -0
  150. pulumi_vault/okta/auth_backend_group.py +5 -0
  151. pulumi_vault/okta/auth_backend_user.py +5 -0
  152. pulumi_vault/okta/outputs.py +5 -0
  153. pulumi_vault/outputs.py +5 -0
  154. pulumi_vault/password_policy.py +5 -0
  155. pulumi_vault/pkisecret/_inputs.py +41 -0
  156. pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
  157. pulumi_vault/pkisecret/backend_config_est.py +5 -0
  158. pulumi_vault/pkisecret/get_backend_config_est.py +22 -4
  159. pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
  160. pulumi_vault/pkisecret/get_backend_issuers.py +17 -4
  161. pulumi_vault/pkisecret/get_backend_key.py +19 -4
  162. pulumi_vault/pkisecret/get_backend_keys.py +17 -4
  163. pulumi_vault/pkisecret/outputs.py +5 -0
  164. pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
  172. pulumi_vault/pkisecret/secret_backend_key.py +5 -0
  173. pulumi_vault/pkisecret/secret_backend_role.py +5 -0
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
  176. pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
  177. pulumi_vault/plugin.py +5 -0
  178. pulumi_vault/plugin_pinned_version.py +5 -0
  179. pulumi_vault/policy.py +5 -0
  180. pulumi_vault/provider.py +5 -0
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +5 -0
  183. pulumi_vault/quota_rate_limit.py +5 -0
  184. pulumi_vault/rabbitmq/_inputs.py +61 -0
  185. pulumi_vault/rabbitmq/outputs.py +5 -0
  186. pulumi_vault/rabbitmq/secret_backend.py +5 -0
  187. pulumi_vault/rabbitmq/secret_backend_role.py +5 -0
  188. pulumi_vault/raft_autopilot.py +5 -0
  189. pulumi_vault/raft_snapshot_agent_config.py +5 -0
  190. pulumi_vault/rgp_policy.py +5 -0
  191. pulumi_vault/saml/auth_backend.py +5 -0
  192. pulumi_vault/saml/auth_backend_role.py +5 -0
  193. pulumi_vault/secrets/_inputs.py +30 -0
  194. pulumi_vault/secrets/outputs.py +5 -0
  195. pulumi_vault/secrets/sync_association.py +5 -0
  196. pulumi_vault/secrets/sync_aws_destination.py +5 -0
  197. pulumi_vault/secrets/sync_azure_destination.py +5 -0
  198. pulumi_vault/secrets/sync_config.py +5 -0
  199. pulumi_vault/secrets/sync_gcp_destination.py +5 -0
  200. pulumi_vault/secrets/sync_gh_destination.py +5 -0
  201. pulumi_vault/secrets/sync_github_apps.py +5 -0
  202. pulumi_vault/secrets/sync_vercel_destination.py +5 -0
  203. pulumi_vault/ssh/_inputs.py +22 -0
  204. pulumi_vault/ssh/outputs.py +5 -0
  205. pulumi_vault/ssh/secret_backend_ca.py +5 -0
  206. pulumi_vault/ssh/secret_backend_role.py +5 -0
  207. pulumi_vault/terraformcloud/secret_backend.py +5 -0
  208. pulumi_vault/terraformcloud/secret_creds.py +5 -0
  209. pulumi_vault/terraformcloud/secret_role.py +5 -0
  210. pulumi_vault/token.py +5 -0
  211. pulumi_vault/tokenauth/auth_backend_role.py +5 -0
  212. pulumi_vault/transform/alphabet.py +5 -0
  213. pulumi_vault/transform/get_decode.py +28 -4
  214. pulumi_vault/transform/get_encode.py +28 -4
  215. pulumi_vault/transform/role.py +5 -0
  216. pulumi_vault/transform/template.py +5 -0
  217. pulumi_vault/transform/transformation.py +5 -0
  218. pulumi_vault/transit/get_decrypt.py +21 -4
  219. pulumi_vault/transit/get_encrypt.py +23 -4
  220. pulumi_vault/transit/secret_backend_key.py +5 -0
  221. pulumi_vault/transit/secret_cache_config.py +5 -0
  222. {pulumi_vault-6.4.0a1728108872.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/METADATA +3 -2
  223. pulumi_vault-6.4.0a1729059229.dist-info/RECORD +256 -0
  224. pulumi_vault-6.4.0a1728108872.dist-info/RECORD +0 -256
  225. {pulumi_vault-6.4.0a1728108872.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/WHEEL +0 -0
  226. {pulumi_vault-6.4.0a1728108872.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/top_level.txt +0 -0
@@ -4,50 +4,138 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
13
18
  'SecretBackendConnectionCassandraArgs',
19
+ 'SecretBackendConnectionCassandraArgsDict',
14
20
  'SecretBackendConnectionCouchbaseArgs',
21
+ 'SecretBackendConnectionCouchbaseArgsDict',
15
22
  'SecretBackendConnectionElasticsearchArgs',
23
+ 'SecretBackendConnectionElasticsearchArgsDict',
16
24
  'SecretBackendConnectionHanaArgs',
25
+ 'SecretBackendConnectionHanaArgsDict',
17
26
  'SecretBackendConnectionInfluxdbArgs',
27
+ 'SecretBackendConnectionInfluxdbArgsDict',
18
28
  'SecretBackendConnectionMongodbArgs',
29
+ 'SecretBackendConnectionMongodbArgsDict',
19
30
  'SecretBackendConnectionMongodbatlasArgs',
31
+ 'SecretBackendConnectionMongodbatlasArgsDict',
20
32
  'SecretBackendConnectionMssqlArgs',
33
+ 'SecretBackendConnectionMssqlArgsDict',
21
34
  'SecretBackendConnectionMysqlArgs',
35
+ 'SecretBackendConnectionMysqlArgsDict',
22
36
  'SecretBackendConnectionMysqlAuroraArgs',
37
+ 'SecretBackendConnectionMysqlAuroraArgsDict',
23
38
  'SecretBackendConnectionMysqlLegacyArgs',
39
+ 'SecretBackendConnectionMysqlLegacyArgsDict',
24
40
  'SecretBackendConnectionMysqlRdsArgs',
41
+ 'SecretBackendConnectionMysqlRdsArgsDict',
25
42
  'SecretBackendConnectionOracleArgs',
43
+ 'SecretBackendConnectionOracleArgsDict',
26
44
  'SecretBackendConnectionPostgresqlArgs',
45
+ 'SecretBackendConnectionPostgresqlArgsDict',
27
46
  'SecretBackendConnectionRedisArgs',
47
+ 'SecretBackendConnectionRedisArgsDict',
28
48
  'SecretBackendConnectionRedisElasticacheArgs',
49
+ 'SecretBackendConnectionRedisElasticacheArgsDict',
29
50
  'SecretBackendConnectionRedshiftArgs',
51
+ 'SecretBackendConnectionRedshiftArgsDict',
30
52
  'SecretBackendConnectionSnowflakeArgs',
53
+ 'SecretBackendConnectionSnowflakeArgsDict',
31
54
  'SecretsMountCassandraArgs',
55
+ 'SecretsMountCassandraArgsDict',
32
56
  'SecretsMountCouchbaseArgs',
57
+ 'SecretsMountCouchbaseArgsDict',
33
58
  'SecretsMountElasticsearchArgs',
59
+ 'SecretsMountElasticsearchArgsDict',
34
60
  'SecretsMountHanaArgs',
61
+ 'SecretsMountHanaArgsDict',
35
62
  'SecretsMountInfluxdbArgs',
63
+ 'SecretsMountInfluxdbArgsDict',
36
64
  'SecretsMountMongodbArgs',
65
+ 'SecretsMountMongodbArgsDict',
37
66
  'SecretsMountMongodbatlaArgs',
67
+ 'SecretsMountMongodbatlaArgsDict',
38
68
  'SecretsMountMssqlArgs',
69
+ 'SecretsMountMssqlArgsDict',
39
70
  'SecretsMountMysqlArgs',
71
+ 'SecretsMountMysqlArgsDict',
40
72
  'SecretsMountMysqlAuroraArgs',
73
+ 'SecretsMountMysqlAuroraArgsDict',
41
74
  'SecretsMountMysqlLegacyArgs',
75
+ 'SecretsMountMysqlLegacyArgsDict',
42
76
  'SecretsMountMysqlRdArgs',
77
+ 'SecretsMountMysqlRdArgsDict',
43
78
  'SecretsMountOracleArgs',
79
+ 'SecretsMountOracleArgsDict',
44
80
  'SecretsMountPostgresqlArgs',
81
+ 'SecretsMountPostgresqlArgsDict',
45
82
  'SecretsMountRediArgs',
83
+ 'SecretsMountRediArgsDict',
46
84
  'SecretsMountRedisElasticachArgs',
85
+ 'SecretsMountRedisElasticachArgsDict',
47
86
  'SecretsMountRedshiftArgs',
87
+ 'SecretsMountRedshiftArgsDict',
48
88
  'SecretsMountSnowflakeArgs',
89
+ 'SecretsMountSnowflakeArgsDict',
49
90
  ]
50
91
 
92
+ MYPY = False
93
+
94
+ if not MYPY:
95
+ class SecretBackendConnectionCassandraArgsDict(TypedDict):
96
+ connect_timeout: NotRequired[pulumi.Input[int]]
97
+ """
98
+ The number of seconds to use as a connection timeout.
99
+ """
100
+ hosts: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
101
+ """
102
+ Cassandra hosts to connect to.
103
+ """
104
+ insecure_tls: NotRequired[pulumi.Input[bool]]
105
+ """
106
+ Whether to skip verification of the server certificate when using TLS.
107
+ """
108
+ password: NotRequired[pulumi.Input[str]]
109
+ """
110
+ The password to use when authenticating with Cassandra.
111
+ """
112
+ pem_bundle: NotRequired[pulumi.Input[str]]
113
+ """
114
+ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
115
+ """
116
+ pem_json: NotRequired[pulumi.Input[str]]
117
+ """
118
+ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
119
+ """
120
+ port: NotRequired[pulumi.Input[int]]
121
+ """
122
+ The transport port to use to connect to Cassandra.
123
+ """
124
+ protocol_version: NotRequired[pulumi.Input[int]]
125
+ """
126
+ The CQL protocol version to use.
127
+ """
128
+ tls: NotRequired[pulumi.Input[bool]]
129
+ """
130
+ Whether to use TLS when connecting to Cassandra.
131
+ """
132
+ username: NotRequired[pulumi.Input[str]]
133
+ """
134
+ The username to use when authenticating with Cassandra.
135
+ """
136
+ elif False:
137
+ SecretBackendConnectionCassandraArgsDict: TypeAlias = Mapping[str, Any]
138
+
51
139
  @pulumi.input_type
52
140
  class SecretBackendConnectionCassandraArgs:
53
141
  def __init__(__self__, *,
@@ -215,6 +303,43 @@ class SecretBackendConnectionCassandraArgs:
215
303
  pulumi.set(self, "username", value)
216
304
 
217
305
 
306
+ if not MYPY:
307
+ class SecretBackendConnectionCouchbaseArgsDict(TypedDict):
308
+ hosts: pulumi.Input[Sequence[pulumi.Input[str]]]
309
+ """
310
+ A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
311
+ """
312
+ password: pulumi.Input[str]
313
+ """
314
+ Specifies the password corresponding to the given username.
315
+ """
316
+ username: pulumi.Input[str]
317
+ """
318
+ Specifies the username for Vault to use.
319
+ """
320
+ base64_pem: NotRequired[pulumi.Input[str]]
321
+ """
322
+ Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
323
+ """
324
+ bucket_name: NotRequired[pulumi.Input[str]]
325
+ """
326
+ Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
327
+ """
328
+ insecure_tls: NotRequired[pulumi.Input[bool]]
329
+ """
330
+ Specifies whether to skip verification of the server certificate when using TLS.
331
+ """
332
+ tls: NotRequired[pulumi.Input[bool]]
333
+ """
334
+ Specifies whether to use TLS when connecting to Couchbase.
335
+ """
336
+ username_template: NotRequired[pulumi.Input[str]]
337
+ """
338
+ Template describing how dynamic usernames are generated.
339
+ """
340
+ elif False:
341
+ SecretBackendConnectionCouchbaseArgsDict: TypeAlias = Mapping[str, Any]
342
+
218
343
  @pulumi.input_type
219
344
  class SecretBackendConnectionCouchbaseArgs:
220
345
  def __init__(__self__, *,
@@ -347,6 +472,51 @@ class SecretBackendConnectionCouchbaseArgs:
347
472
  pulumi.set(self, "username_template", value)
348
473
 
349
474
 
475
+ if not MYPY:
476
+ class SecretBackendConnectionElasticsearchArgsDict(TypedDict):
477
+ password: pulumi.Input[str]
478
+ """
479
+ The password to be used in the connection URL
480
+ """
481
+ url: pulumi.Input[str]
482
+ """
483
+ The URL for Elasticsearch's API
484
+ """
485
+ username: pulumi.Input[str]
486
+ """
487
+ The username to be used in the connection URL
488
+ """
489
+ ca_cert: NotRequired[pulumi.Input[str]]
490
+ """
491
+ The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
492
+ """
493
+ ca_path: NotRequired[pulumi.Input[str]]
494
+ """
495
+ The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
496
+ """
497
+ client_cert: NotRequired[pulumi.Input[str]]
498
+ """
499
+ The path to the certificate for the Elasticsearch client to present for communication
500
+ """
501
+ client_key: NotRequired[pulumi.Input[str]]
502
+ """
503
+ The path to the key for the Elasticsearch client to use for communication
504
+ """
505
+ insecure: NotRequired[pulumi.Input[bool]]
506
+ """
507
+ Whether to disable certificate verification
508
+ """
509
+ tls_server_name: NotRequired[pulumi.Input[str]]
510
+ """
511
+ This, if set, is used to set the SNI host when connecting via TLS
512
+ """
513
+ username_template: NotRequired[pulumi.Input[str]]
514
+ """
515
+ Template describing how dynamic usernames are generated.
516
+ """
517
+ elif False:
518
+ SecretBackendConnectionElasticsearchArgsDict: TypeAlias = Mapping[str, Any]
519
+
350
520
  @pulumi.input_type
351
521
  class SecretBackendConnectionElasticsearchArgs:
352
522
  def __init__(__self__, *,
@@ -511,6 +681,39 @@ class SecretBackendConnectionElasticsearchArgs:
511
681
  pulumi.set(self, "username_template", value)
512
682
 
513
683
 
684
+ if not MYPY:
685
+ class SecretBackendConnectionHanaArgsDict(TypedDict):
686
+ connection_url: NotRequired[pulumi.Input[str]]
687
+ """
688
+ Connection string to use to connect to the database.
689
+ """
690
+ disable_escaping: NotRequired[pulumi.Input[bool]]
691
+ """
692
+ Disable special character escaping in username and password
693
+ """
694
+ max_connection_lifetime: NotRequired[pulumi.Input[int]]
695
+ """
696
+ Maximum number of seconds a connection may be reused.
697
+ """
698
+ max_idle_connections: NotRequired[pulumi.Input[int]]
699
+ """
700
+ Maximum number of idle connections to the database.
701
+ """
702
+ max_open_connections: NotRequired[pulumi.Input[int]]
703
+ """
704
+ Maximum number of open connections to the database.
705
+ """
706
+ password: NotRequired[pulumi.Input[str]]
707
+ """
708
+ The root credential password used in the connection URL
709
+ """
710
+ username: NotRequired[pulumi.Input[str]]
711
+ """
712
+ The root credential username used in the connection URL
713
+ """
714
+ elif False:
715
+ SecretBackendConnectionHanaArgsDict: TypeAlias = Mapping[str, Any]
716
+
514
717
  @pulumi.input_type
515
718
  class SecretBackendConnectionHanaArgs:
516
719
  def __init__(__self__, *,
@@ -630,6 +833,51 @@ class SecretBackendConnectionHanaArgs:
630
833
  pulumi.set(self, "username", value)
631
834
 
632
835
 
836
+ if not MYPY:
837
+ class SecretBackendConnectionInfluxdbArgsDict(TypedDict):
838
+ host: pulumi.Input[str]
839
+ """
840
+ Influxdb host to connect to.
841
+ """
842
+ password: pulumi.Input[str]
843
+ """
844
+ Specifies the password corresponding to the given username.
845
+ """
846
+ username: pulumi.Input[str]
847
+ """
848
+ Specifies the username to use for superuser access.
849
+ """
850
+ connect_timeout: NotRequired[pulumi.Input[int]]
851
+ """
852
+ The number of seconds to use as a connection timeout.
853
+ """
854
+ insecure_tls: NotRequired[pulumi.Input[bool]]
855
+ """
856
+ Whether to skip verification of the server certificate when using TLS.
857
+ """
858
+ pem_bundle: NotRequired[pulumi.Input[str]]
859
+ """
860
+ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
861
+ """
862
+ pem_json: NotRequired[pulumi.Input[str]]
863
+ """
864
+ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
865
+ """
866
+ port: NotRequired[pulumi.Input[int]]
867
+ """
868
+ The transport port to use to connect to Influxdb.
869
+ """
870
+ tls: NotRequired[pulumi.Input[bool]]
871
+ """
872
+ Whether to use TLS when connecting to Influxdb.
873
+ """
874
+ username_template: NotRequired[pulumi.Input[str]]
875
+ """
876
+ Template describing how dynamic usernames are generated.
877
+ """
878
+ elif False:
879
+ SecretBackendConnectionInfluxdbArgsDict: TypeAlias = Mapping[str, Any]
880
+
633
881
  @pulumi.input_type
634
882
  class SecretBackendConnectionInfluxdbArgs:
635
883
  def __init__(__self__, *,
@@ -794,6 +1042,39 @@ class SecretBackendConnectionInfluxdbArgs:
794
1042
  pulumi.set(self, "username_template", value)
795
1043
 
796
1044
 
1045
+ if not MYPY:
1046
+ class SecretBackendConnectionMongodbArgsDict(TypedDict):
1047
+ connection_url: NotRequired[pulumi.Input[str]]
1048
+ """
1049
+ Connection string to use to connect to the database.
1050
+ """
1051
+ max_connection_lifetime: NotRequired[pulumi.Input[int]]
1052
+ """
1053
+ Maximum number of seconds a connection may be reused.
1054
+ """
1055
+ max_idle_connections: NotRequired[pulumi.Input[int]]
1056
+ """
1057
+ Maximum number of idle connections to the database.
1058
+ """
1059
+ max_open_connections: NotRequired[pulumi.Input[int]]
1060
+ """
1061
+ Maximum number of open connections to the database.
1062
+ """
1063
+ password: NotRequired[pulumi.Input[str]]
1064
+ """
1065
+ The root credential password used in the connection URL
1066
+ """
1067
+ username: NotRequired[pulumi.Input[str]]
1068
+ """
1069
+ The root credential username used in the connection URL
1070
+ """
1071
+ username_template: NotRequired[pulumi.Input[str]]
1072
+ """
1073
+ Username generation template.
1074
+ """
1075
+ elif False:
1076
+ SecretBackendConnectionMongodbArgsDict: TypeAlias = Mapping[str, Any]
1077
+
797
1078
  @pulumi.input_type
798
1079
  class SecretBackendConnectionMongodbArgs:
799
1080
  def __init__(__self__, *,
@@ -913,6 +1194,23 @@ class SecretBackendConnectionMongodbArgs:
913
1194
  pulumi.set(self, "username_template", value)
914
1195
 
915
1196
 
1197
+ if not MYPY:
1198
+ class SecretBackendConnectionMongodbatlasArgsDict(TypedDict):
1199
+ private_key: pulumi.Input[str]
1200
+ """
1201
+ The Private Programmatic API Key used to connect with MongoDB Atlas API.
1202
+ """
1203
+ project_id: pulumi.Input[str]
1204
+ """
1205
+ The Project ID the Database User should be created within.
1206
+ """
1207
+ public_key: pulumi.Input[str]
1208
+ """
1209
+ The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
1210
+ """
1211
+ elif False:
1212
+ SecretBackendConnectionMongodbatlasArgsDict: TypeAlias = Mapping[str, Any]
1213
+
916
1214
  @pulumi.input_type
917
1215
  class SecretBackendConnectionMongodbatlasArgs:
918
1216
  def __init__(__self__, *,
@@ -965,6 +1263,47 @@ class SecretBackendConnectionMongodbatlasArgs:
965
1263
  pulumi.set(self, "public_key", value)
966
1264
 
967
1265
 
1266
+ if not MYPY:
1267
+ class SecretBackendConnectionMssqlArgsDict(TypedDict):
1268
+ connection_url: NotRequired[pulumi.Input[str]]
1269
+ """
1270
+ Connection string to use to connect to the database.
1271
+ """
1272
+ contained_db: NotRequired[pulumi.Input[bool]]
1273
+ """
1274
+ Set to true when the target is a Contained Database, e.g. AzureSQL.
1275
+ """
1276
+ disable_escaping: NotRequired[pulumi.Input[bool]]
1277
+ """
1278
+ Disable special character escaping in username and password
1279
+ """
1280
+ max_connection_lifetime: NotRequired[pulumi.Input[int]]
1281
+ """
1282
+ Maximum number of seconds a connection may be reused.
1283
+ """
1284
+ max_idle_connections: NotRequired[pulumi.Input[int]]
1285
+ """
1286
+ Maximum number of idle connections to the database.
1287
+ """
1288
+ max_open_connections: NotRequired[pulumi.Input[int]]
1289
+ """
1290
+ Maximum number of open connections to the database.
1291
+ """
1292
+ password: NotRequired[pulumi.Input[str]]
1293
+ """
1294
+ The root credential password used in the connection URL
1295
+ """
1296
+ username: NotRequired[pulumi.Input[str]]
1297
+ """
1298
+ The root credential username used in the connection URL
1299
+ """
1300
+ username_template: NotRequired[pulumi.Input[str]]
1301
+ """
1302
+ Username generation template.
1303
+ """
1304
+ elif False:
1305
+ SecretBackendConnectionMssqlArgsDict: TypeAlias = Mapping[str, Any]
1306
+
968
1307
  @pulumi.input_type
969
1308
  class SecretBackendConnectionMssqlArgs:
970
1309
  def __init__(__self__, *,
@@ -1116,6 +1455,55 @@ class SecretBackendConnectionMssqlArgs:
1116
1455
  pulumi.set(self, "username_template", value)
1117
1456
 
1118
1457
 
1458
+ if not MYPY:
1459
+ class SecretBackendConnectionMysqlArgsDict(TypedDict):
1460
+ auth_type: NotRequired[pulumi.Input[str]]
1461
+ """
1462
+ Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
1463
+ """
1464
+ connection_url: NotRequired[pulumi.Input[str]]
1465
+ """
1466
+ Connection string to use to connect to the database.
1467
+ """
1468
+ max_connection_lifetime: NotRequired[pulumi.Input[int]]
1469
+ """
1470
+ Maximum number of seconds a connection may be reused.
1471
+ """
1472
+ max_idle_connections: NotRequired[pulumi.Input[int]]
1473
+ """
1474
+ Maximum number of idle connections to the database.
1475
+ """
1476
+ max_open_connections: NotRequired[pulumi.Input[int]]
1477
+ """
1478
+ Maximum number of open connections to the database.
1479
+ """
1480
+ password: NotRequired[pulumi.Input[str]]
1481
+ """
1482
+ The root credential password used in the connection URL
1483
+ """
1484
+ service_account_json: NotRequired[pulumi.Input[str]]
1485
+ """
1486
+ A JSON encoded credential for use with IAM authorization
1487
+ """
1488
+ tls_ca: NotRequired[pulumi.Input[str]]
1489
+ """
1490
+ x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
1491
+ """
1492
+ tls_certificate_key: NotRequired[pulumi.Input[str]]
1493
+ """
1494
+ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
1495
+ """
1496
+ username: NotRequired[pulumi.Input[str]]
1497
+ """
1498
+ The root credential username used in the connection URL
1499
+ """
1500
+ username_template: NotRequired[pulumi.Input[str]]
1501
+ """
1502
+ Username generation template.
1503
+ """
1504
+ elif False:
1505
+ SecretBackendConnectionMysqlArgsDict: TypeAlias = Mapping[str, Any]
1506
+
1119
1507
  @pulumi.input_type
1120
1508
  class SecretBackendConnectionMysqlArgs:
1121
1509
  def __init__(__self__, *,
@@ -1299,28 +1687,77 @@ class SecretBackendConnectionMysqlArgs:
1299
1687
  pulumi.set(self, "username_template", value)
1300
1688
 
1301
1689
 
1302
- @pulumi.input_type
1303
- class SecretBackendConnectionMysqlAuroraArgs:
1304
- def __init__(__self__, *,
1305
- auth_type: Optional[pulumi.Input[str]] = None,
1306
- connection_url: Optional[pulumi.Input[str]] = None,
1307
- max_connection_lifetime: Optional[pulumi.Input[int]] = None,
1308
- max_idle_connections: Optional[pulumi.Input[int]] = None,
1309
- max_open_connections: Optional[pulumi.Input[int]] = None,
1310
- password: Optional[pulumi.Input[str]] = None,
1311
- service_account_json: Optional[pulumi.Input[str]] = None,
1312
- tls_ca: Optional[pulumi.Input[str]] = None,
1313
- tls_certificate_key: Optional[pulumi.Input[str]] = None,
1314
- username: Optional[pulumi.Input[str]] = None,
1315
- username_template: Optional[pulumi.Input[str]] = None):
1690
+ if not MYPY:
1691
+ class SecretBackendConnectionMysqlAuroraArgsDict(TypedDict):
1692
+ auth_type: NotRequired[pulumi.Input[str]]
1316
1693
  """
1317
- :param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
1318
- :param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
1319
- :param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
1320
- :param pulumi.Input[int] max_idle_connections: Maximum number of idle connections to the database.
1321
- :param pulumi.Input[int] max_open_connections: Maximum number of open connections to the database.
1322
- :param pulumi.Input[str] password: The root credential password used in the connection URL
1323
- :param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
1694
+ Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
1695
+ """
1696
+ connection_url: NotRequired[pulumi.Input[str]]
1697
+ """
1698
+ Connection string to use to connect to the database.
1699
+ """
1700
+ max_connection_lifetime: NotRequired[pulumi.Input[int]]
1701
+ """
1702
+ Maximum number of seconds a connection may be reused.
1703
+ """
1704
+ max_idle_connections: NotRequired[pulumi.Input[int]]
1705
+ """
1706
+ Maximum number of idle connections to the database.
1707
+ """
1708
+ max_open_connections: NotRequired[pulumi.Input[int]]
1709
+ """
1710
+ Maximum number of open connections to the database.
1711
+ """
1712
+ password: NotRequired[pulumi.Input[str]]
1713
+ """
1714
+ The root credential password used in the connection URL
1715
+ """
1716
+ service_account_json: NotRequired[pulumi.Input[str]]
1717
+ """
1718
+ A JSON encoded credential for use with IAM authorization
1719
+ """
1720
+ tls_ca: NotRequired[pulumi.Input[str]]
1721
+ """
1722
+ x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
1723
+ """
1724
+ tls_certificate_key: NotRequired[pulumi.Input[str]]
1725
+ """
1726
+ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
1727
+ """
1728
+ username: NotRequired[pulumi.Input[str]]
1729
+ """
1730
+ The root credential username used in the connection URL
1731
+ """
1732
+ username_template: NotRequired[pulumi.Input[str]]
1733
+ """
1734
+ Username generation template.
1735
+ """
1736
+ elif False:
1737
+ SecretBackendConnectionMysqlAuroraArgsDict: TypeAlias = Mapping[str, Any]
1738
+
1739
+ @pulumi.input_type
1740
+ class SecretBackendConnectionMysqlAuroraArgs:
1741
+ def __init__(__self__, *,
1742
+ auth_type: Optional[pulumi.Input[str]] = None,
1743
+ connection_url: Optional[pulumi.Input[str]] = None,
1744
+ max_connection_lifetime: Optional[pulumi.Input[int]] = None,
1745
+ max_idle_connections: Optional[pulumi.Input[int]] = None,
1746
+ max_open_connections: Optional[pulumi.Input[int]] = None,
1747
+ password: Optional[pulumi.Input[str]] = None,
1748
+ service_account_json: Optional[pulumi.Input[str]] = None,
1749
+ tls_ca: Optional[pulumi.Input[str]] = None,
1750
+ tls_certificate_key: Optional[pulumi.Input[str]] = None,
1751
+ username: Optional[pulumi.Input[str]] = None,
1752
+ username_template: Optional[pulumi.Input[str]] = None):
1753
+ """
1754
+ :param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
1755
+ :param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
1756
+ :param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
1757
+ :param pulumi.Input[int] max_idle_connections: Maximum number of idle connections to the database.
1758
+ :param pulumi.Input[int] max_open_connections: Maximum number of open connections to the database.
1759
+ :param pulumi.Input[str] password: The root credential password used in the connection URL
1760
+ :param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
1324
1761
  :param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
1325
1762
  :param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
1326
1763
  :param pulumi.Input[str] username: The root credential username used in the connection URL
@@ -1482,6 +1919,55 @@ class SecretBackendConnectionMysqlAuroraArgs:
1482
1919
  pulumi.set(self, "username_template", value)
1483
1920
 
1484
1921
 
1922
+ if not MYPY:
1923
+ class SecretBackendConnectionMysqlLegacyArgsDict(TypedDict):
1924
+ auth_type: NotRequired[pulumi.Input[str]]
1925
+ """
1926
+ Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
1927
+ """
1928
+ connection_url: NotRequired[pulumi.Input[str]]
1929
+ """
1930
+ Connection string to use to connect to the database.
1931
+ """
1932
+ max_connection_lifetime: NotRequired[pulumi.Input[int]]
1933
+ """
1934
+ Maximum number of seconds a connection may be reused.
1935
+ """
1936
+ max_idle_connections: NotRequired[pulumi.Input[int]]
1937
+ """
1938
+ Maximum number of idle connections to the database.
1939
+ """
1940
+ max_open_connections: NotRequired[pulumi.Input[int]]
1941
+ """
1942
+ Maximum number of open connections to the database.
1943
+ """
1944
+ password: NotRequired[pulumi.Input[str]]
1945
+ """
1946
+ The root credential password used in the connection URL
1947
+ """
1948
+ service_account_json: NotRequired[pulumi.Input[str]]
1949
+ """
1950
+ A JSON encoded credential for use with IAM authorization
1951
+ """
1952
+ tls_ca: NotRequired[pulumi.Input[str]]
1953
+ """
1954
+ x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
1955
+ """
1956
+ tls_certificate_key: NotRequired[pulumi.Input[str]]
1957
+ """
1958
+ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
1959
+ """
1960
+ username: NotRequired[pulumi.Input[str]]
1961
+ """
1962
+ The root credential username used in the connection URL
1963
+ """
1964
+ username_template: NotRequired[pulumi.Input[str]]
1965
+ """
1966
+ Username generation template.
1967
+ """
1968
+ elif False:
1969
+ SecretBackendConnectionMysqlLegacyArgsDict: TypeAlias = Mapping[str, Any]
1970
+
1485
1971
  @pulumi.input_type
1486
1972
  class SecretBackendConnectionMysqlLegacyArgs:
1487
1973
  def __init__(__self__, *,
@@ -1665,6 +2151,55 @@ class SecretBackendConnectionMysqlLegacyArgs:
1665
2151
  pulumi.set(self, "username_template", value)
1666
2152
 
1667
2153
 
2154
+ if not MYPY:
2155
+ class SecretBackendConnectionMysqlRdsArgsDict(TypedDict):
2156
+ auth_type: NotRequired[pulumi.Input[str]]
2157
+ """
2158
+ Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
2159
+ """
2160
+ connection_url: NotRequired[pulumi.Input[str]]
2161
+ """
2162
+ Connection string to use to connect to the database.
2163
+ """
2164
+ max_connection_lifetime: NotRequired[pulumi.Input[int]]
2165
+ """
2166
+ Maximum number of seconds a connection may be reused.
2167
+ """
2168
+ max_idle_connections: NotRequired[pulumi.Input[int]]
2169
+ """
2170
+ Maximum number of idle connections to the database.
2171
+ """
2172
+ max_open_connections: NotRequired[pulumi.Input[int]]
2173
+ """
2174
+ Maximum number of open connections to the database.
2175
+ """
2176
+ password: NotRequired[pulumi.Input[str]]
2177
+ """
2178
+ The root credential password used in the connection URL
2179
+ """
2180
+ service_account_json: NotRequired[pulumi.Input[str]]
2181
+ """
2182
+ A JSON encoded credential for use with IAM authorization
2183
+ """
2184
+ tls_ca: NotRequired[pulumi.Input[str]]
2185
+ """
2186
+ x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
2187
+ """
2188
+ tls_certificate_key: NotRequired[pulumi.Input[str]]
2189
+ """
2190
+ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
2191
+ """
2192
+ username: NotRequired[pulumi.Input[str]]
2193
+ """
2194
+ The root credential username used in the connection URL
2195
+ """
2196
+ username_template: NotRequired[pulumi.Input[str]]
2197
+ """
2198
+ Username generation template.
2199
+ """
2200
+ elif False:
2201
+ SecretBackendConnectionMysqlRdsArgsDict: TypeAlias = Mapping[str, Any]
2202
+
1668
2203
  @pulumi.input_type
1669
2204
  class SecretBackendConnectionMysqlRdsArgs:
1670
2205
  def __init__(__self__, *,
@@ -1848,6 +2383,47 @@ class SecretBackendConnectionMysqlRdsArgs:
1848
2383
  pulumi.set(self, "username_template", value)
1849
2384
 
1850
2385
 
2386
+ if not MYPY:
2387
+ class SecretBackendConnectionOracleArgsDict(TypedDict):
2388
+ connection_url: NotRequired[pulumi.Input[str]]
2389
+ """
2390
+ Connection string to use to connect to the database.
2391
+ """
2392
+ disconnect_sessions: NotRequired[pulumi.Input[bool]]
2393
+ """
2394
+ Set to true to disconnect any open sessions prior to running the revocation statements.
2395
+ """
2396
+ max_connection_lifetime: NotRequired[pulumi.Input[int]]
2397
+ """
2398
+ Maximum number of seconds a connection may be reused.
2399
+ """
2400
+ max_idle_connections: NotRequired[pulumi.Input[int]]
2401
+ """
2402
+ Maximum number of idle connections to the database.
2403
+ """
2404
+ max_open_connections: NotRequired[pulumi.Input[int]]
2405
+ """
2406
+ Maximum number of open connections to the database.
2407
+ """
2408
+ password: NotRequired[pulumi.Input[str]]
2409
+ """
2410
+ The root credential password used in the connection URL
2411
+ """
2412
+ split_statements: NotRequired[pulumi.Input[bool]]
2413
+ """
2414
+ Set to true in order to split statements after semi-colons.
2415
+ """
2416
+ username: NotRequired[pulumi.Input[str]]
2417
+ """
2418
+ The root credential username used in the connection URL
2419
+ """
2420
+ username_template: NotRequired[pulumi.Input[str]]
2421
+ """
2422
+ Username generation template.
2423
+ """
2424
+ elif False:
2425
+ SecretBackendConnectionOracleArgsDict: TypeAlias = Mapping[str, Any]
2426
+
1851
2427
  @pulumi.input_type
1852
2428
  class SecretBackendConnectionOracleArgs:
1853
2429
  def __init__(__self__, *,
@@ -1999,6 +2575,51 @@ class SecretBackendConnectionOracleArgs:
1999
2575
  pulumi.set(self, "username_template", value)
2000
2576
 
2001
2577
 
2578
+ if not MYPY:
2579
+ class SecretBackendConnectionPostgresqlArgsDict(TypedDict):
2580
+ auth_type: NotRequired[pulumi.Input[str]]
2581
+ """
2582
+ Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
2583
+ """
2584
+ connection_url: NotRequired[pulumi.Input[str]]
2585
+ """
2586
+ Connection string to use to connect to the database.
2587
+ """
2588
+ disable_escaping: NotRequired[pulumi.Input[bool]]
2589
+ """
2590
+ Disable special character escaping in username and password
2591
+ """
2592
+ max_connection_lifetime: NotRequired[pulumi.Input[int]]
2593
+ """
2594
+ Maximum number of seconds a connection may be reused.
2595
+ """
2596
+ max_idle_connections: NotRequired[pulumi.Input[int]]
2597
+ """
2598
+ Maximum number of idle connections to the database.
2599
+ """
2600
+ max_open_connections: NotRequired[pulumi.Input[int]]
2601
+ """
2602
+ Maximum number of open connections to the database.
2603
+ """
2604
+ password: NotRequired[pulumi.Input[str]]
2605
+ """
2606
+ The root credential password used in the connection URL
2607
+ """
2608
+ service_account_json: NotRequired[pulumi.Input[str]]
2609
+ """
2610
+ A JSON encoded credential for use with IAM authorization
2611
+ """
2612
+ username: NotRequired[pulumi.Input[str]]
2613
+ """
2614
+ The root credential username used in the connection URL
2615
+ """
2616
+ username_template: NotRequired[pulumi.Input[str]]
2617
+ """
2618
+ Username generation template.
2619
+ """
2620
+ elif False:
2621
+ SecretBackendConnectionPostgresqlArgsDict: TypeAlias = Mapping[str, Any]
2622
+
2002
2623
  @pulumi.input_type
2003
2624
  class SecretBackendConnectionPostgresqlArgs:
2004
2625
  def __init__(__self__, *,
@@ -2166,6 +2787,39 @@ class SecretBackendConnectionPostgresqlArgs:
2166
2787
  pulumi.set(self, "username_template", value)
2167
2788
 
2168
2789
 
2790
+ if not MYPY:
2791
+ class SecretBackendConnectionRedisArgsDict(TypedDict):
2792
+ host: pulumi.Input[str]
2793
+ """
2794
+ Specifies the host to connect to
2795
+ """
2796
+ password: pulumi.Input[str]
2797
+ """
2798
+ Specifies the password corresponding to the given username.
2799
+ """
2800
+ username: pulumi.Input[str]
2801
+ """
2802
+ Specifies the username for Vault to use.
2803
+ """
2804
+ ca_cert: NotRequired[pulumi.Input[str]]
2805
+ """
2806
+ The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
2807
+ """
2808
+ insecure_tls: NotRequired[pulumi.Input[bool]]
2809
+ """
2810
+ Specifies whether to skip verification of the server certificate when using TLS.
2811
+ """
2812
+ port: NotRequired[pulumi.Input[int]]
2813
+ """
2814
+ The transport port to use to connect to Redis.
2815
+ """
2816
+ tls: NotRequired[pulumi.Input[bool]]
2817
+ """
2818
+ Specifies whether to use TLS when connecting to Redis.
2819
+ """
2820
+ elif False:
2821
+ SecretBackendConnectionRedisArgsDict: TypeAlias = Mapping[str, Any]
2822
+
2169
2823
  @pulumi.input_type
2170
2824
  class SecretBackendConnectionRedisArgs:
2171
2825
  def __init__(__self__, *,
@@ -2282,6 +2936,27 @@ class SecretBackendConnectionRedisArgs:
2282
2936
  pulumi.set(self, "tls", value)
2283
2937
 
2284
2938
 
2939
+ if not MYPY:
2940
+ class SecretBackendConnectionRedisElasticacheArgsDict(TypedDict):
2941
+ url: pulumi.Input[str]
2942
+ """
2943
+ The configuration endpoint for the ElastiCache cluster to connect to.
2944
+ """
2945
+ password: NotRequired[pulumi.Input[str]]
2946
+ """
2947
+ The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
2948
+ """
2949
+ region: NotRequired[pulumi.Input[str]]
2950
+ """
2951
+ The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
2952
+ """
2953
+ username: NotRequired[pulumi.Input[str]]
2954
+ """
2955
+ The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
2956
+ """
2957
+ elif False:
2958
+ SecretBackendConnectionRedisElasticacheArgsDict: TypeAlias = Mapping[str, Any]
2959
+
2285
2960
  @pulumi.input_type
2286
2961
  class SecretBackendConnectionRedisElasticacheArgs:
2287
2962
  def __init__(__self__, *,
@@ -2352,6 +3027,43 @@ class SecretBackendConnectionRedisElasticacheArgs:
2352
3027
  pulumi.set(self, "username", value)
2353
3028
 
2354
3029
 
3030
+ if not MYPY:
3031
+ class SecretBackendConnectionRedshiftArgsDict(TypedDict):
3032
+ connection_url: NotRequired[pulumi.Input[str]]
3033
+ """
3034
+ Connection string to use to connect to the database.
3035
+ """
3036
+ disable_escaping: NotRequired[pulumi.Input[bool]]
3037
+ """
3038
+ Disable special character escaping in username and password
3039
+ """
3040
+ max_connection_lifetime: NotRequired[pulumi.Input[int]]
3041
+ """
3042
+ Maximum number of seconds a connection may be reused.
3043
+ """
3044
+ max_idle_connections: NotRequired[pulumi.Input[int]]
3045
+ """
3046
+ Maximum number of idle connections to the database.
3047
+ """
3048
+ max_open_connections: NotRequired[pulumi.Input[int]]
3049
+ """
3050
+ Maximum number of open connections to the database.
3051
+ """
3052
+ password: NotRequired[pulumi.Input[str]]
3053
+ """
3054
+ The root credential password used in the connection URL
3055
+ """
3056
+ username: NotRequired[pulumi.Input[str]]
3057
+ """
3058
+ The root credential username used in the connection URL
3059
+ """
3060
+ username_template: NotRequired[pulumi.Input[str]]
3061
+ """
3062
+ Username generation template.
3063
+ """
3064
+ elif False:
3065
+ SecretBackendConnectionRedshiftArgsDict: TypeAlias = Mapping[str, Any]
3066
+
2355
3067
  @pulumi.input_type
2356
3068
  class SecretBackendConnectionRedshiftArgs:
2357
3069
  def __init__(__self__, *,
@@ -2487,21 +3199,54 @@ class SecretBackendConnectionRedshiftArgs:
2487
3199
  pulumi.set(self, "username_template", value)
2488
3200
 
2489
3201
 
2490
- @pulumi.input_type
2491
- class SecretBackendConnectionSnowflakeArgs:
2492
- def __init__(__self__, *,
2493
- connection_url: Optional[pulumi.Input[str]] = None,
2494
- max_connection_lifetime: Optional[pulumi.Input[int]] = None,
2495
- max_idle_connections: Optional[pulumi.Input[int]] = None,
2496
- max_open_connections: Optional[pulumi.Input[int]] = None,
2497
- password: Optional[pulumi.Input[str]] = None,
2498
- username: Optional[pulumi.Input[str]] = None,
2499
- username_template: Optional[pulumi.Input[str]] = None):
3202
+ if not MYPY:
3203
+ class SecretBackendConnectionSnowflakeArgsDict(TypedDict):
3204
+ connection_url: NotRequired[pulumi.Input[str]]
2500
3205
  """
2501
- :param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
2502
- :param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
2503
- :param pulumi.Input[int] max_idle_connections: Maximum number of idle connections to the database.
2504
- :param pulumi.Input[int] max_open_connections: Maximum number of open connections to the database.
3206
+ Connection string to use to connect to the database.
3207
+ """
3208
+ max_connection_lifetime: NotRequired[pulumi.Input[int]]
3209
+ """
3210
+ Maximum number of seconds a connection may be reused.
3211
+ """
3212
+ max_idle_connections: NotRequired[pulumi.Input[int]]
3213
+ """
3214
+ Maximum number of idle connections to the database.
3215
+ """
3216
+ max_open_connections: NotRequired[pulumi.Input[int]]
3217
+ """
3218
+ Maximum number of open connections to the database.
3219
+ """
3220
+ password: NotRequired[pulumi.Input[str]]
3221
+ """
3222
+ The root credential password used in the connection URL
3223
+ """
3224
+ username: NotRequired[pulumi.Input[str]]
3225
+ """
3226
+ The root credential username used in the connection URL
3227
+ """
3228
+ username_template: NotRequired[pulumi.Input[str]]
3229
+ """
3230
+ Username generation template.
3231
+ """
3232
+ elif False:
3233
+ SecretBackendConnectionSnowflakeArgsDict: TypeAlias = Mapping[str, Any]
3234
+
3235
+ @pulumi.input_type
3236
+ class SecretBackendConnectionSnowflakeArgs:
3237
+ def __init__(__self__, *,
3238
+ connection_url: Optional[pulumi.Input[str]] = None,
3239
+ max_connection_lifetime: Optional[pulumi.Input[int]] = None,
3240
+ max_idle_connections: Optional[pulumi.Input[int]] = None,
3241
+ max_open_connections: Optional[pulumi.Input[int]] = None,
3242
+ password: Optional[pulumi.Input[str]] = None,
3243
+ username: Optional[pulumi.Input[str]] = None,
3244
+ username_template: Optional[pulumi.Input[str]] = None):
3245
+ """
3246
+ :param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
3247
+ :param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
3248
+ :param pulumi.Input[int] max_idle_connections: Maximum number of idle connections to the database.
3249
+ :param pulumi.Input[int] max_open_connections: Maximum number of open connections to the database.
2505
3250
  :param pulumi.Input[str] password: The root credential password used in the connection URL
2506
3251
  :param pulumi.Input[str] username: The root credential username used in the connection URL
2507
3252
  :param pulumi.Input[str] username_template: Username generation template.
@@ -2606,6 +3351,79 @@ class SecretBackendConnectionSnowflakeArgs:
2606
3351
  pulumi.set(self, "username_template", value)
2607
3352
 
2608
3353
 
3354
+ if not MYPY:
3355
+ class SecretsMountCassandraArgsDict(TypedDict):
3356
+ name: pulumi.Input[str]
3357
+ """
3358
+ Name of the database connection.
3359
+ """
3360
+ allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
3361
+ """
3362
+ A list of roles that are allowed to use this
3363
+ connection.
3364
+ """
3365
+ connect_timeout: NotRequired[pulumi.Input[int]]
3366
+ """
3367
+ The number of seconds to use as a connection timeout.
3368
+ """
3369
+ data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
3370
+ """
3371
+ A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3372
+
3373
+ Supported list of database secrets engines that can be configured:
3374
+ """
3375
+ hosts: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
3376
+ """
3377
+ Cassandra hosts to connect to.
3378
+ """
3379
+ insecure_tls: NotRequired[pulumi.Input[bool]]
3380
+ """
3381
+ Whether to skip verification of the server certificate when using TLS.
3382
+ """
3383
+ password: NotRequired[pulumi.Input[str]]
3384
+ """
3385
+ The password to use when authenticating with Cassandra.
3386
+ """
3387
+ pem_bundle: NotRequired[pulumi.Input[str]]
3388
+ """
3389
+ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
3390
+ """
3391
+ pem_json: NotRequired[pulumi.Input[str]]
3392
+ """
3393
+ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
3394
+ """
3395
+ plugin_name: NotRequired[pulumi.Input[str]]
3396
+ """
3397
+ Specifies the name of the plugin to use.
3398
+ """
3399
+ port: NotRequired[pulumi.Input[int]]
3400
+ """
3401
+ The transport port to use to connect to Cassandra.
3402
+ """
3403
+ protocol_version: NotRequired[pulumi.Input[int]]
3404
+ """
3405
+ The CQL protocol version to use.
3406
+ """
3407
+ root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
3408
+ """
3409
+ A list of database statements to be executed to rotate the root user's credentials.
3410
+ """
3411
+ tls: NotRequired[pulumi.Input[bool]]
3412
+ """
3413
+ Whether to use TLS when connecting to Cassandra.
3414
+ """
3415
+ username: NotRequired[pulumi.Input[str]]
3416
+ """
3417
+ The username to use when authenticating with Cassandra.
3418
+ """
3419
+ verify_connection: NotRequired[pulumi.Input[bool]]
3420
+ """
3421
+ Whether the connection should be verified on
3422
+ initial configuration or not.
3423
+ """
3424
+ elif False:
3425
+ SecretsMountCassandraArgsDict: TypeAlias = Mapping[str, Any]
3426
+
2609
3427
  @pulumi.input_type
2610
3428
  class SecretsMountCassandraArgs:
2611
3429
  def __init__(__self__, *,
@@ -2876,6 +3694,71 @@ class SecretsMountCassandraArgs:
2876
3694
  pulumi.set(self, "verify_connection", value)
2877
3695
 
2878
3696
 
3697
+ if not MYPY:
3698
+ class SecretsMountCouchbaseArgsDict(TypedDict):
3699
+ hosts: pulumi.Input[Sequence[pulumi.Input[str]]]
3700
+ """
3701
+ A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`.
3702
+ """
3703
+ name: pulumi.Input[str]
3704
+ """
3705
+ Name of the database connection.
3706
+ """
3707
+ password: pulumi.Input[str]
3708
+ """
3709
+ Specifies the password corresponding to the given username.
3710
+ """
3711
+ username: pulumi.Input[str]
3712
+ """
3713
+ Specifies the username for Vault to use.
3714
+ """
3715
+ allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
3716
+ """
3717
+ A list of roles that are allowed to use this
3718
+ connection.
3719
+ """
3720
+ base64_pem: NotRequired[pulumi.Input[str]]
3721
+ """
3722
+ Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
3723
+ """
3724
+ bucket_name: NotRequired[pulumi.Input[str]]
3725
+ """
3726
+ Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
3727
+ """
3728
+ data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
3729
+ """
3730
+ A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3731
+
3732
+ Supported list of database secrets engines that can be configured:
3733
+ """
3734
+ insecure_tls: NotRequired[pulumi.Input[bool]]
3735
+ """
3736
+ Specifies whether to skip verification of the server certificate when using TLS.
3737
+ """
3738
+ plugin_name: NotRequired[pulumi.Input[str]]
3739
+ """
3740
+ Specifies the name of the plugin to use.
3741
+ """
3742
+ root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
3743
+ """
3744
+ A list of database statements to be executed to rotate the root user's credentials.
3745
+ """
3746
+ tls: NotRequired[pulumi.Input[bool]]
3747
+ """
3748
+ Specifies whether to use TLS when connecting to Couchbase.
3749
+ """
3750
+ username_template: NotRequired[pulumi.Input[str]]
3751
+ """
3752
+ Template describing how dynamic usernames are generated.
3753
+ """
3754
+ verify_connection: NotRequired[pulumi.Input[bool]]
3755
+ """
3756
+ Whether the connection should be verified on
3757
+ initial configuration or not.
3758
+ """
3759
+ elif False:
3760
+ SecretsMountCouchbaseArgsDict: TypeAlias = Mapping[str, Any]
3761
+
2879
3762
  @pulumi.input_type
2880
3763
  class SecretsMountCouchbaseArgs:
2881
3764
  def __init__(__self__, *,
@@ -3111,6 +3994,79 @@ class SecretsMountCouchbaseArgs:
3111
3994
  pulumi.set(self, "verify_connection", value)
3112
3995
 
3113
3996
 
3997
+ if not MYPY:
3998
+ class SecretsMountElasticsearchArgsDict(TypedDict):
3999
+ name: pulumi.Input[str]
4000
+ """
4001
+ Name of the database connection.
4002
+ """
4003
+ password: pulumi.Input[str]
4004
+ """
4005
+ The password to be used in the connection URL
4006
+ """
4007
+ url: pulumi.Input[str]
4008
+ """
4009
+ The URL for Elasticsearch's API
4010
+ """
4011
+ username: pulumi.Input[str]
4012
+ """
4013
+ The username to be used in the connection URL
4014
+ """
4015
+ allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
4016
+ """
4017
+ A list of roles that are allowed to use this
4018
+ connection.
4019
+ """
4020
+ ca_cert: NotRequired[pulumi.Input[str]]
4021
+ """
4022
+ The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity
4023
+ """
4024
+ ca_path: NotRequired[pulumi.Input[str]]
4025
+ """
4026
+ The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
4027
+ """
4028
+ client_cert: NotRequired[pulumi.Input[str]]
4029
+ """
4030
+ The path to the certificate for the Elasticsearch client to present for communication
4031
+ """
4032
+ client_key: NotRequired[pulumi.Input[str]]
4033
+ """
4034
+ The path to the key for the Elasticsearch client to use for communication
4035
+ """
4036
+ data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
4037
+ """
4038
+ A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4039
+
4040
+ Supported list of database secrets engines that can be configured:
4041
+ """
4042
+ insecure: NotRequired[pulumi.Input[bool]]
4043
+ """
4044
+ Whether to disable certificate verification
4045
+ """
4046
+ plugin_name: NotRequired[pulumi.Input[str]]
4047
+ """
4048
+ Specifies the name of the plugin to use.
4049
+ """
4050
+ root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
4051
+ """
4052
+ A list of database statements to be executed to rotate the root user's credentials.
4053
+ """
4054
+ tls_server_name: NotRequired[pulumi.Input[str]]
4055
+ """
4056
+ This, if set, is used to set the SNI host when connecting via TLS
4057
+ """
4058
+ username_template: NotRequired[pulumi.Input[str]]
4059
+ """
4060
+ Template describing how dynamic usernames are generated.
4061
+ """
4062
+ verify_connection: NotRequired[pulumi.Input[bool]]
4063
+ """
4064
+ Whether the connection should be verified on
4065
+ initial configuration or not.
4066
+ """
4067
+ elif False:
4068
+ SecretsMountElasticsearchArgsDict: TypeAlias = Mapping[str, Any]
4069
+
3114
4070
  @pulumi.input_type
3115
4071
  class SecretsMountElasticsearchArgs:
3116
4072
  def __init__(__self__, *,
@@ -3378,6 +4334,67 @@ class SecretsMountElasticsearchArgs:
3378
4334
  pulumi.set(self, "verify_connection", value)
3379
4335
 
3380
4336
 
4337
+ if not MYPY:
4338
+ class SecretsMountHanaArgsDict(TypedDict):
4339
+ name: pulumi.Input[str]
4340
+ """
4341
+ Name of the database connection.
4342
+ """
4343
+ allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
4344
+ """
4345
+ A list of roles that are allowed to use this
4346
+ connection.
4347
+ """
4348
+ connection_url: NotRequired[pulumi.Input[str]]
4349
+ """
4350
+ Connection string to use to connect to the database.
4351
+ """
4352
+ data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
4353
+ """
4354
+ A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4355
+
4356
+ Supported list of database secrets engines that can be configured:
4357
+ """
4358
+ disable_escaping: NotRequired[pulumi.Input[bool]]
4359
+ """
4360
+ Disable special character escaping in username and password
4361
+ """
4362
+ max_connection_lifetime: NotRequired[pulumi.Input[int]]
4363
+ """
4364
+ Maximum number of seconds a connection may be reused.
4365
+ """
4366
+ max_idle_connections: NotRequired[pulumi.Input[int]]
4367
+ """
4368
+ Maximum number of idle connections to the database.
4369
+ """
4370
+ max_open_connections: NotRequired[pulumi.Input[int]]
4371
+ """
4372
+ Maximum number of open connections to the database.
4373
+ """
4374
+ password: NotRequired[pulumi.Input[str]]
4375
+ """
4376
+ The root credential password used in the connection URL
4377
+ """
4378
+ plugin_name: NotRequired[pulumi.Input[str]]
4379
+ """
4380
+ Specifies the name of the plugin to use.
4381
+ """
4382
+ root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
4383
+ """
4384
+ A list of database statements to be executed to rotate the root user's credentials.
4385
+ """
4386
+ username: NotRequired[pulumi.Input[str]]
4387
+ """
4388
+ The root credential username used in the connection URL
4389
+ """
4390
+ verify_connection: NotRequired[pulumi.Input[bool]]
4391
+ """
4392
+ Whether the connection should be verified on
4393
+ initial configuration or not.
4394
+ """
4395
+ elif False:
4396
+ SecretsMountHanaArgsDict: TypeAlias = Mapping[str, Any]
4397
+
3381
4398
  @pulumi.input_type
3382
4399
  class SecretsMountHanaArgs:
3383
4400
  def __init__(__self__, *,
@@ -3600,6 +4617,79 @@ class SecretsMountHanaArgs:
3600
4617
  pulumi.set(self, "verify_connection", value)
3601
4618
 
3602
4619
 
4620
+ if not MYPY:
4621
+ class SecretsMountInfluxdbArgsDict(TypedDict):
4622
+ host: pulumi.Input[str]
4623
+ """
4624
+ Influxdb host to connect to.
4625
+ """
4626
+ name: pulumi.Input[str]
4627
+ """
4628
+ Name of the database connection.
4629
+ """
4630
+ password: pulumi.Input[str]
4631
+ """
4632
+ Specifies the password corresponding to the given username.
4633
+ """
4634
+ username: pulumi.Input[str]
4635
+ """
4636
+ Specifies the username to use for superuser access.
4637
+ """
4638
+ allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
4639
+ """
4640
+ A list of roles that are allowed to use this
4641
+ connection.
4642
+ """
4643
+ connect_timeout: NotRequired[pulumi.Input[int]]
4644
+ """
4645
+ The number of seconds to use as a connection timeout.
4646
+ """
4647
+ data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
4648
+ """
4649
+ A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4650
+
4651
+ Supported list of database secrets engines that can be configured:
4652
+ """
4653
+ insecure_tls: NotRequired[pulumi.Input[bool]]
4654
+ """
4655
+ Whether to skip verification of the server certificate when using TLS.
4656
+ """
4657
+ pem_bundle: NotRequired[pulumi.Input[str]]
4658
+ """
4659
+ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
4660
+ """
4661
+ pem_json: NotRequired[pulumi.Input[str]]
4662
+ """
4663
+ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate.
4664
+ """
4665
+ plugin_name: NotRequired[pulumi.Input[str]]
4666
+ """
4667
+ Specifies the name of the plugin to use.
4668
+ """
4669
+ port: NotRequired[pulumi.Input[int]]
4670
+ """
4671
+ The transport port to use to connect to Influxdb.
4672
+ """
4673
+ root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
4674
+ """
4675
+ A list of database statements to be executed to rotate the root user's credentials.
4676
+ """
4677
+ tls: NotRequired[pulumi.Input[bool]]
4678
+ """
4679
+ Whether to use TLS when connecting to Influxdb.
4680
+ """
4681
+ username_template: NotRequired[pulumi.Input[str]]
4682
+ """
4683
+ Template describing how dynamic usernames are generated.
4684
+ """
4685
+ verify_connection: NotRequired[pulumi.Input[bool]]
4686
+ """
4687
+ Whether the connection should be verified on
4688
+ initial configuration or not.
4689
+ """
4690
+ elif False:
4691
+ SecretsMountInfluxdbArgsDict: TypeAlias = Mapping[str, Any]
4692
+
3603
4693
  @pulumi.input_type
3604
4694
  class SecretsMountInfluxdbArgs:
3605
4695
  def __init__(__self__, *,
@@ -3867,6 +4957,67 @@ class SecretsMountInfluxdbArgs:
3867
4957
  pulumi.set(self, "verify_connection", value)
3868
4958
 
3869
4959
 
4960
+ if not MYPY:
4961
+ class SecretsMountMongodbArgsDict(TypedDict):
4962
+ name: pulumi.Input[str]
4963
+ """
4964
+ Name of the database connection.
4965
+ """
4966
+ allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
4967
+ """
4968
+ A list of roles that are allowed to use this
4969
+ connection.
4970
+ """
4971
+ connection_url: NotRequired[pulumi.Input[str]]
4972
+ """
4973
+ Connection string to use to connect to the database.
4974
+ """
4975
+ data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
4976
+ """
4977
+ A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4978
+
4979
+ Supported list of database secrets engines that can be configured:
4980
+ """
4981
+ max_connection_lifetime: NotRequired[pulumi.Input[int]]
4982
+ """
4983
+ Maximum number of seconds a connection may be reused.
4984
+ """
4985
+ max_idle_connections: NotRequired[pulumi.Input[int]]
4986
+ """
4987
+ Maximum number of idle connections to the database.
4988
+ """
4989
+ max_open_connections: NotRequired[pulumi.Input[int]]
4990
+ """
4991
+ Maximum number of open connections to the database.
4992
+ """
4993
+ password: NotRequired[pulumi.Input[str]]
4994
+ """
4995
+ The root credential password used in the connection URL
4996
+ """
4997
+ plugin_name: NotRequired[pulumi.Input[str]]
4998
+ """
4999
+ Specifies the name of the plugin to use.
5000
+ """
5001
+ root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
5002
+ """
5003
+ A list of database statements to be executed to rotate the root user's credentials.
5004
+ """
5005
+ username: NotRequired[pulumi.Input[str]]
5006
+ """
5007
+ The root credential username used in the connection URL
5008
+ """
5009
+ username_template: NotRequired[pulumi.Input[str]]
5010
+ """
5011
+ Username generation template.
5012
+ """
5013
+ verify_connection: NotRequired[pulumi.Input[bool]]
5014
+ """
5015
+ Whether the connection should be verified on
5016
+ initial configuration or not.
5017
+ """
5018
+ elif False:
5019
+ SecretsMountMongodbArgsDict: TypeAlias = Mapping[str, Any]
5020
+
3870
5021
  @pulumi.input_type
3871
5022
  class SecretsMountMongodbArgs:
3872
5023
  def __init__(__self__, *,
@@ -4089,6 +5240,51 @@ class SecretsMountMongodbArgs:
4089
5240
  pulumi.set(self, "verify_connection", value)
4090
5241
 
4091
5242
 
5243
+ if not MYPY:
5244
+ class SecretsMountMongodbatlaArgsDict(TypedDict):
5245
+ name: pulumi.Input[str]
5246
+ """
5247
+ Name of the database connection.
5248
+ """
5249
+ private_key: pulumi.Input[str]
5250
+ """
5251
+ The Private Programmatic API Key used to connect with MongoDB Atlas API.
5252
+ """
5253
+ project_id: pulumi.Input[str]
5254
+ """
5255
+ The Project ID the Database User should be created within.
5256
+ """
5257
+ public_key: pulumi.Input[str]
5258
+ """
5259
+ The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
5260
+ """
5261
+ allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
5262
+ """
5263
+ A list of roles that are allowed to use this
5264
+ connection.
5265
+ """
5266
+ data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
5267
+ """
5268
+ A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5269
+
5270
+ Supported list of database secrets engines that can be configured:
5271
+ """
5272
+ plugin_name: NotRequired[pulumi.Input[str]]
5273
+ """
5274
+ Specifies the name of the plugin to use.
5275
+ """
5276
+ root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
5277
+ """
5278
+ A list of database statements to be executed to rotate the root user's credentials.
5279
+ """
5280
+ verify_connection: NotRequired[pulumi.Input[bool]]
5281
+ """
5282
+ Whether the connection should be verified on
5283
+ initial configuration or not.
5284
+ """
5285
+ elif False:
5286
+ SecretsMountMongodbatlaArgsDict: TypeAlias = Mapping[str, Any]
5287
+
4092
5288
  @pulumi.input_type
4093
5289
  class SecretsMountMongodbatlaArgs:
4094
5290
  def __init__(__self__, *,
@@ -4244,6 +5440,75 @@ class SecretsMountMongodbatlaArgs:
4244
5440
  pulumi.set(self, "verify_connection", value)
4245
5441
 
4246
5442
 
5443
+ if not MYPY:
5444
+ class SecretsMountMssqlArgsDict(TypedDict):
5445
+ name: pulumi.Input[str]
5446
+ """
5447
+ Name of the database connection.
5448
+ """
5449
+ allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
5450
+ """
5451
+ A list of roles that are allowed to use this
5452
+ connection.
5453
+ """
5454
+ connection_url: NotRequired[pulumi.Input[str]]
5455
+ """
5456
+ Connection string to use to connect to the database.
5457
+ """
5458
+ contained_db: NotRequired[pulumi.Input[bool]]
5459
+ """
5460
+ Set to true when the target is a Contained Database, e.g. AzureSQL.
5461
+ """
5462
+ data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
5463
+ """
5464
+ A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5465
+
5466
+ Supported list of database secrets engines that can be configured:
5467
+ """
5468
+ disable_escaping: NotRequired[pulumi.Input[bool]]
5469
+ """
5470
+ Disable special character escaping in username and password
5471
+ """
5472
+ max_connection_lifetime: NotRequired[pulumi.Input[int]]
5473
+ """
5474
+ Maximum number of seconds a connection may be reused.
5475
+ """
5476
+ max_idle_connections: NotRequired[pulumi.Input[int]]
5477
+ """
5478
+ Maximum number of idle connections to the database.
5479
+ """
5480
+ max_open_connections: NotRequired[pulumi.Input[int]]
5481
+ """
5482
+ Maximum number of open connections to the database.
5483
+ """
5484
+ password: NotRequired[pulumi.Input[str]]
5485
+ """
5486
+ The root credential password used in the connection URL
5487
+ """
5488
+ plugin_name: NotRequired[pulumi.Input[str]]
5489
+ """
5490
+ Specifies the name of the plugin to use.
5491
+ """
5492
+ root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
5493
+ """
5494
+ A list of database statements to be executed to rotate the root user's credentials.
5495
+ """
5496
+ username: NotRequired[pulumi.Input[str]]
5497
+ """
5498
+ The root credential username used in the connection URL
5499
+ """
5500
+ username_template: NotRequired[pulumi.Input[str]]
5501
+ """
5502
+ Username generation template.
5503
+ """
5504
+ verify_connection: NotRequired[pulumi.Input[bool]]
5505
+ """
5506
+ Whether the connection should be verified on
5507
+ initial configuration or not.
5508
+ """
5509
+ elif False:
5510
+ SecretsMountMssqlArgsDict: TypeAlias = Mapping[str, Any]
5511
+
4247
5512
  @pulumi.input_type
4248
5513
  class SecretsMountMssqlArgs:
4249
5514
  def __init__(__self__, *,
@@ -4498,6 +5763,83 @@ class SecretsMountMssqlArgs:
4498
5763
  pulumi.set(self, "verify_connection", value)
4499
5764
 
4500
5765
 
5766
+ if not MYPY:
5767
+ class SecretsMountMysqlArgsDict(TypedDict):
5768
+ name: pulumi.Input[str]
5769
+ """
5770
+ Name of the database connection.
5771
+ """
5772
+ allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
5773
+ """
5774
+ A list of roles that are allowed to use this
5775
+ connection.
5776
+ """
5777
+ auth_type: NotRequired[pulumi.Input[str]]
5778
+ """
5779
+ Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
5780
+ """
5781
+ connection_url: NotRequired[pulumi.Input[str]]
5782
+ """
5783
+ Connection string to use to connect to the database.
5784
+ """
5785
+ data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
5786
+ """
5787
+ A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5788
+
5789
+ Supported list of database secrets engines that can be configured:
5790
+ """
5791
+ max_connection_lifetime: NotRequired[pulumi.Input[int]]
5792
+ """
5793
+ Maximum number of seconds a connection may be reused.
5794
+ """
5795
+ max_idle_connections: NotRequired[pulumi.Input[int]]
5796
+ """
5797
+ Maximum number of idle connections to the database.
5798
+ """
5799
+ max_open_connections: NotRequired[pulumi.Input[int]]
5800
+ """
5801
+ Maximum number of open connections to the database.
5802
+ """
5803
+ password: NotRequired[pulumi.Input[str]]
5804
+ """
5805
+ The root credential password used in the connection URL
5806
+ """
5807
+ plugin_name: NotRequired[pulumi.Input[str]]
5808
+ """
5809
+ Specifies the name of the plugin to use.
5810
+ """
5811
+ root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
5812
+ """
5813
+ A list of database statements to be executed to rotate the root user's credentials.
5814
+ """
5815
+ service_account_json: NotRequired[pulumi.Input[str]]
5816
+ """
5817
+ A JSON encoded credential for use with IAM authorization
5818
+ """
5819
+ tls_ca: NotRequired[pulumi.Input[str]]
5820
+ """
5821
+ x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
5822
+ """
5823
+ tls_certificate_key: NotRequired[pulumi.Input[str]]
5824
+ """
5825
+ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
5826
+ """
5827
+ username: NotRequired[pulumi.Input[str]]
5828
+ """
5829
+ The root credential username used in the connection URL
5830
+ """
5831
+ username_template: NotRequired[pulumi.Input[str]]
5832
+ """
5833
+ Username generation template.
5834
+ """
5835
+ verify_connection: NotRequired[pulumi.Input[bool]]
5836
+ """
5837
+ Whether the connection should be verified on
5838
+ initial configuration or not.
5839
+ """
5840
+ elif False:
5841
+ SecretsMountMysqlArgsDict: TypeAlias = Mapping[str, Any]
5842
+
4501
5843
  @pulumi.input_type
4502
5844
  class SecretsMountMysqlArgs:
4503
5845
  def __init__(__self__, *,
@@ -4784,6 +6126,83 @@ class SecretsMountMysqlArgs:
4784
6126
  pulumi.set(self, "verify_connection", value)
4785
6127
 
4786
6128
 
6129
+ if not MYPY:
6130
+ class SecretsMountMysqlAuroraArgsDict(TypedDict):
6131
+ name: pulumi.Input[str]
6132
+ """
6133
+ Name of the database connection.
6134
+ """
6135
+ allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
6136
+ """
6137
+ A list of roles that are allowed to use this
6138
+ connection.
6139
+ """
6140
+ auth_type: NotRequired[pulumi.Input[str]]
6141
+ """
6142
+ Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
6143
+ """
6144
+ connection_url: NotRequired[pulumi.Input[str]]
6145
+ """
6146
+ Connection string to use to connect to the database.
6147
+ """
6148
+ data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
6149
+ """
6150
+ A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6151
+
6152
+ Supported list of database secrets engines that can be configured:
6153
+ """
6154
+ max_connection_lifetime: NotRequired[pulumi.Input[int]]
6155
+ """
6156
+ Maximum number of seconds a connection may be reused.
6157
+ """
6158
+ max_idle_connections: NotRequired[pulumi.Input[int]]
6159
+ """
6160
+ Maximum number of idle connections to the database.
6161
+ """
6162
+ max_open_connections: NotRequired[pulumi.Input[int]]
6163
+ """
6164
+ Maximum number of open connections to the database.
6165
+ """
6166
+ password: NotRequired[pulumi.Input[str]]
6167
+ """
6168
+ The root credential password used in the connection URL
6169
+ """
6170
+ plugin_name: NotRequired[pulumi.Input[str]]
6171
+ """
6172
+ Specifies the name of the plugin to use.
6173
+ """
6174
+ root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
6175
+ """
6176
+ A list of database statements to be executed to rotate the root user's credentials.
6177
+ """
6178
+ service_account_json: NotRequired[pulumi.Input[str]]
6179
+ """
6180
+ A JSON encoded credential for use with IAM authorization
6181
+ """
6182
+ tls_ca: NotRequired[pulumi.Input[str]]
6183
+ """
6184
+ x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
6185
+ """
6186
+ tls_certificate_key: NotRequired[pulumi.Input[str]]
6187
+ """
6188
+ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
6189
+ """
6190
+ username: NotRequired[pulumi.Input[str]]
6191
+ """
6192
+ The root credential username used in the connection URL
6193
+ """
6194
+ username_template: NotRequired[pulumi.Input[str]]
6195
+ """
6196
+ Username generation template.
6197
+ """
6198
+ verify_connection: NotRequired[pulumi.Input[bool]]
6199
+ """
6200
+ Whether the connection should be verified on
6201
+ initial configuration or not.
6202
+ """
6203
+ elif False:
6204
+ SecretsMountMysqlAuroraArgsDict: TypeAlias = Mapping[str, Any]
6205
+
4787
6206
  @pulumi.input_type
4788
6207
  class SecretsMountMysqlAuroraArgs:
4789
6208
  def __init__(__self__, *,
@@ -5070,6 +6489,83 @@ class SecretsMountMysqlAuroraArgs:
5070
6489
  pulumi.set(self, "verify_connection", value)
5071
6490
 
5072
6491
 
6492
+ if not MYPY:
6493
+ class SecretsMountMysqlLegacyArgsDict(TypedDict):
6494
+ name: pulumi.Input[str]
6495
+ """
6496
+ Name of the database connection.
6497
+ """
6498
+ allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
6499
+ """
6500
+ A list of roles that are allowed to use this
6501
+ connection.
6502
+ """
6503
+ auth_type: NotRequired[pulumi.Input[str]]
6504
+ """
6505
+ Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
6506
+ """
6507
+ connection_url: NotRequired[pulumi.Input[str]]
6508
+ """
6509
+ Connection string to use to connect to the database.
6510
+ """
6511
+ data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
6512
+ """
6513
+ A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6514
+
6515
+ Supported list of database secrets engines that can be configured:
6516
+ """
6517
+ max_connection_lifetime: NotRequired[pulumi.Input[int]]
6518
+ """
6519
+ Maximum number of seconds a connection may be reused.
6520
+ """
6521
+ max_idle_connections: NotRequired[pulumi.Input[int]]
6522
+ """
6523
+ Maximum number of idle connections to the database.
6524
+ """
6525
+ max_open_connections: NotRequired[pulumi.Input[int]]
6526
+ """
6527
+ Maximum number of open connections to the database.
6528
+ """
6529
+ password: NotRequired[pulumi.Input[str]]
6530
+ """
6531
+ The root credential password used in the connection URL
6532
+ """
6533
+ plugin_name: NotRequired[pulumi.Input[str]]
6534
+ """
6535
+ Specifies the name of the plugin to use.
6536
+ """
6537
+ root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
6538
+ """
6539
+ A list of database statements to be executed to rotate the root user's credentials.
6540
+ """
6541
+ service_account_json: NotRequired[pulumi.Input[str]]
6542
+ """
6543
+ A JSON encoded credential for use with IAM authorization
6544
+ """
6545
+ tls_ca: NotRequired[pulumi.Input[str]]
6546
+ """
6547
+ x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
6548
+ """
6549
+ tls_certificate_key: NotRequired[pulumi.Input[str]]
6550
+ """
6551
+ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
6552
+ """
6553
+ username: NotRequired[pulumi.Input[str]]
6554
+ """
6555
+ The root credential username used in the connection URL
6556
+ """
6557
+ username_template: NotRequired[pulumi.Input[str]]
6558
+ """
6559
+ Username generation template.
6560
+ """
6561
+ verify_connection: NotRequired[pulumi.Input[bool]]
6562
+ """
6563
+ Whether the connection should be verified on
6564
+ initial configuration or not.
6565
+ """
6566
+ elif False:
6567
+ SecretsMountMysqlLegacyArgsDict: TypeAlias = Mapping[str, Any]
6568
+
5073
6569
  @pulumi.input_type
5074
6570
  class SecretsMountMysqlLegacyArgs:
5075
6571
  def __init__(__self__, *,
@@ -5356,6 +6852,83 @@ class SecretsMountMysqlLegacyArgs:
5356
6852
  pulumi.set(self, "verify_connection", value)
5357
6853
 
5358
6854
 
6855
+ if not MYPY:
6856
+ class SecretsMountMysqlRdArgsDict(TypedDict):
6857
+ name: pulumi.Input[str]
6858
+ """
6859
+ Name of the database connection.
6860
+ """
6861
+ allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
6862
+ """
6863
+ A list of roles that are allowed to use this
6864
+ connection.
6865
+ """
6866
+ auth_type: NotRequired[pulumi.Input[str]]
6867
+ """
6868
+ Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
6869
+ """
6870
+ connection_url: NotRequired[pulumi.Input[str]]
6871
+ """
6872
+ Connection string to use to connect to the database.
6873
+ """
6874
+ data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
6875
+ """
6876
+ A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6877
+
6878
+ Supported list of database secrets engines that can be configured:
6879
+ """
6880
+ max_connection_lifetime: NotRequired[pulumi.Input[int]]
6881
+ """
6882
+ Maximum number of seconds a connection may be reused.
6883
+ """
6884
+ max_idle_connections: NotRequired[pulumi.Input[int]]
6885
+ """
6886
+ Maximum number of idle connections to the database.
6887
+ """
6888
+ max_open_connections: NotRequired[pulumi.Input[int]]
6889
+ """
6890
+ Maximum number of open connections to the database.
6891
+ """
6892
+ password: NotRequired[pulumi.Input[str]]
6893
+ """
6894
+ The root credential password used in the connection URL
6895
+ """
6896
+ plugin_name: NotRequired[pulumi.Input[str]]
6897
+ """
6898
+ Specifies the name of the plugin to use.
6899
+ """
6900
+ root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
6901
+ """
6902
+ A list of database statements to be executed to rotate the root user's credentials.
6903
+ """
6904
+ service_account_json: NotRequired[pulumi.Input[str]]
6905
+ """
6906
+ A JSON encoded credential for use with IAM authorization
6907
+ """
6908
+ tls_ca: NotRequired[pulumi.Input[str]]
6909
+ """
6910
+ x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
6911
+ """
6912
+ tls_certificate_key: NotRequired[pulumi.Input[str]]
6913
+ """
6914
+ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
6915
+ """
6916
+ username: NotRequired[pulumi.Input[str]]
6917
+ """
6918
+ The root credential username used in the connection URL
6919
+ """
6920
+ username_template: NotRequired[pulumi.Input[str]]
6921
+ """
6922
+ Username generation template.
6923
+ """
6924
+ verify_connection: NotRequired[pulumi.Input[bool]]
6925
+ """
6926
+ Whether the connection should be verified on
6927
+ initial configuration or not.
6928
+ """
6929
+ elif False:
6930
+ SecretsMountMysqlRdArgsDict: TypeAlias = Mapping[str, Any]
6931
+
5359
6932
  @pulumi.input_type
5360
6933
  class SecretsMountMysqlRdArgs:
5361
6934
  def __init__(__self__, *,
@@ -5598,49 +7171,118 @@ class SecretsMountMysqlRdArgs:
5598
7171
  """
5599
7172
  x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
5600
7173
  """
5601
- return pulumi.get(self, "tls_certificate_key")
5602
-
5603
- @tls_certificate_key.setter
5604
- def tls_certificate_key(self, value: Optional[pulumi.Input[str]]):
5605
- pulumi.set(self, "tls_certificate_key", value)
5606
-
5607
- @property
5608
- @pulumi.getter
5609
- def username(self) -> Optional[pulumi.Input[str]]:
7174
+ return pulumi.get(self, "tls_certificate_key")
7175
+
7176
+ @tls_certificate_key.setter
7177
+ def tls_certificate_key(self, value: Optional[pulumi.Input[str]]):
7178
+ pulumi.set(self, "tls_certificate_key", value)
7179
+
7180
+ @property
7181
+ @pulumi.getter
7182
+ def username(self) -> Optional[pulumi.Input[str]]:
7183
+ """
7184
+ The root credential username used in the connection URL
7185
+ """
7186
+ return pulumi.get(self, "username")
7187
+
7188
+ @username.setter
7189
+ def username(self, value: Optional[pulumi.Input[str]]):
7190
+ pulumi.set(self, "username", value)
7191
+
7192
+ @property
7193
+ @pulumi.getter(name="usernameTemplate")
7194
+ def username_template(self) -> Optional[pulumi.Input[str]]:
7195
+ """
7196
+ Username generation template.
7197
+ """
7198
+ return pulumi.get(self, "username_template")
7199
+
7200
+ @username_template.setter
7201
+ def username_template(self, value: Optional[pulumi.Input[str]]):
7202
+ pulumi.set(self, "username_template", value)
7203
+
7204
+ @property
7205
+ @pulumi.getter(name="verifyConnection")
7206
+ def verify_connection(self) -> Optional[pulumi.Input[bool]]:
7207
+ """
7208
+ Whether the connection should be verified on
7209
+ initial configuration or not.
7210
+ """
7211
+ return pulumi.get(self, "verify_connection")
7212
+
7213
+ @verify_connection.setter
7214
+ def verify_connection(self, value: Optional[pulumi.Input[bool]]):
7215
+ pulumi.set(self, "verify_connection", value)
7216
+
7217
+
7218
+ if not MYPY:
7219
+ class SecretsMountOracleArgsDict(TypedDict):
7220
+ name: pulumi.Input[str]
7221
+ """
7222
+ Name of the database connection.
7223
+ """
7224
+ allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
7225
+ """
7226
+ A list of roles that are allowed to use this
7227
+ connection.
7228
+ """
7229
+ connection_url: NotRequired[pulumi.Input[str]]
7230
+ """
7231
+ Connection string to use to connect to the database.
7232
+ """
7233
+ data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
7234
+ """
7235
+ A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
7236
+
7237
+ Supported list of database secrets engines that can be configured:
7238
+ """
7239
+ disconnect_sessions: NotRequired[pulumi.Input[bool]]
7240
+ """
7241
+ Set to true to disconnect any open sessions prior to running the revocation statements.
7242
+ """
7243
+ max_connection_lifetime: NotRequired[pulumi.Input[int]]
7244
+ """
7245
+ Maximum number of seconds a connection may be reused.
7246
+ """
7247
+ max_idle_connections: NotRequired[pulumi.Input[int]]
7248
+ """
7249
+ Maximum number of idle connections to the database.
7250
+ """
7251
+ max_open_connections: NotRequired[pulumi.Input[int]]
7252
+ """
7253
+ Maximum number of open connections to the database.
7254
+ """
7255
+ password: NotRequired[pulumi.Input[str]]
7256
+ """
7257
+ The root credential password used in the connection URL
7258
+ """
7259
+ plugin_name: NotRequired[pulumi.Input[str]]
7260
+ """
7261
+ Specifies the name of the plugin to use.
7262
+ """
7263
+ root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
7264
+ """
7265
+ A list of database statements to be executed to rotate the root user's credentials.
7266
+ """
7267
+ split_statements: NotRequired[pulumi.Input[bool]]
7268
+ """
7269
+ Set to true in order to split statements after semi-colons.
7270
+ """
7271
+ username: NotRequired[pulumi.Input[str]]
5610
7272
  """
5611
7273
  The root credential username used in the connection URL
5612
7274
  """
5613
- return pulumi.get(self, "username")
5614
-
5615
- @username.setter
5616
- def username(self, value: Optional[pulumi.Input[str]]):
5617
- pulumi.set(self, "username", value)
5618
-
5619
- @property
5620
- @pulumi.getter(name="usernameTemplate")
5621
- def username_template(self) -> Optional[pulumi.Input[str]]:
7275
+ username_template: NotRequired[pulumi.Input[str]]
5622
7276
  """
5623
7277
  Username generation template.
5624
7278
  """
5625
- return pulumi.get(self, "username_template")
5626
-
5627
- @username_template.setter
5628
- def username_template(self, value: Optional[pulumi.Input[str]]):
5629
- pulumi.set(self, "username_template", value)
5630
-
5631
- @property
5632
- @pulumi.getter(name="verifyConnection")
5633
- def verify_connection(self) -> Optional[pulumi.Input[bool]]:
7279
+ verify_connection: NotRequired[pulumi.Input[bool]]
5634
7280
  """
5635
7281
  Whether the connection should be verified on
5636
7282
  initial configuration or not.
5637
7283
  """
5638
- return pulumi.get(self, "verify_connection")
5639
-
5640
- @verify_connection.setter
5641
- def verify_connection(self, value: Optional[pulumi.Input[bool]]):
5642
- pulumi.set(self, "verify_connection", value)
5643
-
7284
+ elif False:
7285
+ SecretsMountOracleArgsDict: TypeAlias = Mapping[str, Any]
5644
7286
 
5645
7287
  @pulumi.input_type
5646
7288
  class SecretsMountOracleArgs:
@@ -5896,6 +7538,79 @@ class SecretsMountOracleArgs:
5896
7538
  pulumi.set(self, "verify_connection", value)
5897
7539
 
5898
7540
 
7541
+ if not MYPY:
7542
+ class SecretsMountPostgresqlArgsDict(TypedDict):
7543
+ name: pulumi.Input[str]
7544
+ """
7545
+ Name of the database connection.
7546
+ """
7547
+ allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
7548
+ """
7549
+ A list of roles that are allowed to use this
7550
+ connection.
7551
+ """
7552
+ auth_type: NotRequired[pulumi.Input[str]]
7553
+ """
7554
+ Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
7555
+ """
7556
+ connection_url: NotRequired[pulumi.Input[str]]
7557
+ """
7558
+ Connection string to use to connect to the database.
7559
+ """
7560
+ data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
7561
+ """
7562
+ A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
7563
+
7564
+ Supported list of database secrets engines that can be configured:
7565
+ """
7566
+ disable_escaping: NotRequired[pulumi.Input[bool]]
7567
+ """
7568
+ Disable special character escaping in username and password
7569
+ """
7570
+ max_connection_lifetime: NotRequired[pulumi.Input[int]]
7571
+ """
7572
+ Maximum number of seconds a connection may be reused.
7573
+ """
7574
+ max_idle_connections: NotRequired[pulumi.Input[int]]
7575
+ """
7576
+ Maximum number of idle connections to the database.
7577
+ """
7578
+ max_open_connections: NotRequired[pulumi.Input[int]]
7579
+ """
7580
+ Maximum number of open connections to the database.
7581
+ """
7582
+ password: NotRequired[pulumi.Input[str]]
7583
+ """
7584
+ The root credential password used in the connection URL
7585
+ """
7586
+ plugin_name: NotRequired[pulumi.Input[str]]
7587
+ """
7588
+ Specifies the name of the plugin to use.
7589
+ """
7590
+ root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
7591
+ """
7592
+ A list of database statements to be executed to rotate the root user's credentials.
7593
+ """
7594
+ service_account_json: NotRequired[pulumi.Input[str]]
7595
+ """
7596
+ A JSON encoded credential for use with IAM authorization
7597
+ """
7598
+ username: NotRequired[pulumi.Input[str]]
7599
+ """
7600
+ The root credential username used in the connection URL
7601
+ """
7602
+ username_template: NotRequired[pulumi.Input[str]]
7603
+ """
7604
+ Username generation template.
7605
+ """
7606
+ verify_connection: NotRequired[pulumi.Input[bool]]
7607
+ """
7608
+ Whether the connection should be verified on
7609
+ initial configuration or not.
7610
+ """
7611
+ elif False:
7612
+ SecretsMountPostgresqlArgsDict: TypeAlias = Mapping[str, Any]
7613
+
5899
7614
  @pulumi.input_type
5900
7615
  class SecretsMountPostgresqlArgs:
5901
7616
  def __init__(__self__, *,
@@ -6166,6 +7881,67 @@ class SecretsMountPostgresqlArgs:
6166
7881
  pulumi.set(self, "verify_connection", value)
6167
7882
 
6168
7883
 
7884
+ if not MYPY:
7885
+ class SecretsMountRediArgsDict(TypedDict):
7886
+ host: pulumi.Input[str]
7887
+ """
7888
+ Specifies the host to connect to
7889
+ """
7890
+ name: pulumi.Input[str]
7891
+ """
7892
+ Name of the database connection.
7893
+ """
7894
+ password: pulumi.Input[str]
7895
+ """
7896
+ Specifies the password corresponding to the given username.
7897
+ """
7898
+ username: pulumi.Input[str]
7899
+ """
7900
+ Specifies the username for Vault to use.
7901
+ """
7902
+ allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
7903
+ """
7904
+ A list of roles that are allowed to use this
7905
+ connection.
7906
+ """
7907
+ ca_cert: NotRequired[pulumi.Input[str]]
7908
+ """
7909
+ The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
7910
+ """
7911
+ data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
7912
+ """
7913
+ A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
7914
+
7915
+ Supported list of database secrets engines that can be configured:
7916
+ """
7917
+ insecure_tls: NotRequired[pulumi.Input[bool]]
7918
+ """
7919
+ Specifies whether to skip verification of the server certificate when using TLS.
7920
+ """
7921
+ plugin_name: NotRequired[pulumi.Input[str]]
7922
+ """
7923
+ Specifies the name of the plugin to use.
7924
+ """
7925
+ port: NotRequired[pulumi.Input[int]]
7926
+ """
7927
+ The transport port to use to connect to Redis.
7928
+ """
7929
+ root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
7930
+ """
7931
+ A list of database statements to be executed to rotate the root user's credentials.
7932
+ """
7933
+ tls: NotRequired[pulumi.Input[bool]]
7934
+ """
7935
+ Specifies whether to use TLS when connecting to Redis.
7936
+ """
7937
+ verify_connection: NotRequired[pulumi.Input[bool]]
7938
+ """
7939
+ Whether the connection should be verified on
7940
+ initial configuration or not.
7941
+ """
7942
+ elif False:
7943
+ SecretsMountRediArgsDict: TypeAlias = Mapping[str, Any]
7944
+
6169
7945
  @pulumi.input_type
6170
7946
  class SecretsMountRediArgs:
6171
7947
  def __init__(__self__, *,
@@ -6385,6 +8161,55 @@ class SecretsMountRediArgs:
6385
8161
  pulumi.set(self, "verify_connection", value)
6386
8162
 
6387
8163
 
8164
+ if not MYPY:
8165
+ class SecretsMountRedisElasticachArgsDict(TypedDict):
8166
+ name: pulumi.Input[str]
8167
+ """
8168
+ Name of the database connection.
8169
+ """
8170
+ url: pulumi.Input[str]
8171
+ """
8172
+ The configuration endpoint for the ElastiCache cluster to connect to.
8173
+ """
8174
+ allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
8175
+ """
8176
+ A list of roles that are allowed to use this
8177
+ connection.
8178
+ """
8179
+ data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
8180
+ """
8181
+ A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
8182
+
8183
+ Supported list of database secrets engines that can be configured:
8184
+ """
8185
+ password: NotRequired[pulumi.Input[str]]
8186
+ """
8187
+ The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
8188
+ """
8189
+ plugin_name: NotRequired[pulumi.Input[str]]
8190
+ """
8191
+ Specifies the name of the plugin to use.
8192
+ """
8193
+ region: NotRequired[pulumi.Input[str]]
8194
+ """
8195
+ The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
8196
+ """
8197
+ root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
8198
+ """
8199
+ A list of database statements to be executed to rotate the root user's credentials.
8200
+ """
8201
+ username: NotRequired[pulumi.Input[str]]
8202
+ """
8203
+ The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
8204
+ """
8205
+ verify_connection: NotRequired[pulumi.Input[bool]]
8206
+ """
8207
+ Whether the connection should be verified on
8208
+ initial configuration or not.
8209
+ """
8210
+ elif False:
8211
+ SecretsMountRedisElasticachArgsDict: TypeAlias = Mapping[str, Any]
8212
+
6388
8213
  @pulumi.input_type
6389
8214
  class SecretsMountRedisElasticachArgs:
6390
8215
  def __init__(__self__, *,
@@ -6558,6 +8383,71 @@ class SecretsMountRedisElasticachArgs:
6558
8383
  pulumi.set(self, "verify_connection", value)
6559
8384
 
6560
8385
 
8386
+ if not MYPY:
8387
+ class SecretsMountRedshiftArgsDict(TypedDict):
8388
+ name: pulumi.Input[str]
8389
+ """
8390
+ Name of the database connection.
8391
+ """
8392
+ allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
8393
+ """
8394
+ A list of roles that are allowed to use this
8395
+ connection.
8396
+ """
8397
+ connection_url: NotRequired[pulumi.Input[str]]
8398
+ """
8399
+ Connection string to use to connect to the database.
8400
+ """
8401
+ data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
8402
+ """
8403
+ A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
8404
+
8405
+ Supported list of database secrets engines that can be configured:
8406
+ """
8407
+ disable_escaping: NotRequired[pulumi.Input[bool]]
8408
+ """
8409
+ Disable special character escaping in username and password
8410
+ """
8411
+ max_connection_lifetime: NotRequired[pulumi.Input[int]]
8412
+ """
8413
+ Maximum number of seconds a connection may be reused.
8414
+ """
8415
+ max_idle_connections: NotRequired[pulumi.Input[int]]
8416
+ """
8417
+ Maximum number of idle connections to the database.
8418
+ """
8419
+ max_open_connections: NotRequired[pulumi.Input[int]]
8420
+ """
8421
+ Maximum number of open connections to the database.
8422
+ """
8423
+ password: NotRequired[pulumi.Input[str]]
8424
+ """
8425
+ The root credential password used in the connection URL
8426
+ """
8427
+ plugin_name: NotRequired[pulumi.Input[str]]
8428
+ """
8429
+ Specifies the name of the plugin to use.
8430
+ """
8431
+ root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
8432
+ """
8433
+ A list of database statements to be executed to rotate the root user's credentials.
8434
+ """
8435
+ username: NotRequired[pulumi.Input[str]]
8436
+ """
8437
+ The root credential username used in the connection URL
8438
+ """
8439
+ username_template: NotRequired[pulumi.Input[str]]
8440
+ """
8441
+ Username generation template.
8442
+ """
8443
+ verify_connection: NotRequired[pulumi.Input[bool]]
8444
+ """
8445
+ Whether the connection should be verified on
8446
+ initial configuration or not.
8447
+ """
8448
+ elif False:
8449
+ SecretsMountRedshiftArgsDict: TypeAlias = Mapping[str, Any]
8450
+
6561
8451
  @pulumi.input_type
6562
8452
  class SecretsMountRedshiftArgs:
6563
8453
  def __init__(__self__, *,
@@ -6796,6 +8686,67 @@ class SecretsMountRedshiftArgs:
6796
8686
  pulumi.set(self, "verify_connection", value)
6797
8687
 
6798
8688
 
8689
+ if not MYPY:
8690
+ class SecretsMountSnowflakeArgsDict(TypedDict):
8691
+ name: pulumi.Input[str]
8692
+ """
8693
+ Name of the database connection.
8694
+ """
8695
+ allowed_roles: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
8696
+ """
8697
+ A list of roles that are allowed to use this
8698
+ connection.
8699
+ """
8700
+ connection_url: NotRequired[pulumi.Input[str]]
8701
+ """
8702
+ Connection string to use to connect to the database.
8703
+ """
8704
+ data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
8705
+ """
8706
+ A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
8707
+
8708
+ Supported list of database secrets engines that can be configured:
8709
+ """
8710
+ max_connection_lifetime: NotRequired[pulumi.Input[int]]
8711
+ """
8712
+ Maximum number of seconds a connection may be reused.
8713
+ """
8714
+ max_idle_connections: NotRequired[pulumi.Input[int]]
8715
+ """
8716
+ Maximum number of idle connections to the database.
8717
+ """
8718
+ max_open_connections: NotRequired[pulumi.Input[int]]
8719
+ """
8720
+ Maximum number of open connections to the database.
8721
+ """
8722
+ password: NotRequired[pulumi.Input[str]]
8723
+ """
8724
+ The root credential password used in the connection URL
8725
+ """
8726
+ plugin_name: NotRequired[pulumi.Input[str]]
8727
+ """
8728
+ Specifies the name of the plugin to use.
8729
+ """
8730
+ root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
8731
+ """
8732
+ A list of database statements to be executed to rotate the root user's credentials.
8733
+ """
8734
+ username: NotRequired[pulumi.Input[str]]
8735
+ """
8736
+ The root credential username used in the connection URL
8737
+ """
8738
+ username_template: NotRequired[pulumi.Input[str]]
8739
+ """
8740
+ Username generation template.
8741
+ """
8742
+ verify_connection: NotRequired[pulumi.Input[bool]]
8743
+ """
8744
+ Whether the connection should be verified on
8745
+ initial configuration or not.
8746
+ """
8747
+ elif False:
8748
+ SecretsMountSnowflakeArgsDict: TypeAlias = Mapping[str, Any]
8749
+
6799
8750
  @pulumi.input_type
6800
8751
  class SecretsMountSnowflakeArgs:
6801
8752
  def __init__(__self__, *,