pulumi-vault 6.5.0a1736850018__py3-none-any.whl → 6.6.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (48) hide show
  1. pulumi_vault/__init__.py +32 -0
  2. pulumi_vault/_utilities.py +8 -4
  3. pulumi_vault/aws/auth_backend_client.py +228 -4
  4. pulumi_vault/aws/auth_backend_sts_role.py +47 -0
  5. pulumi_vault/aws/secret_backend.py +395 -38
  6. pulumi_vault/aws/secret_backend_static_role.py +217 -0
  7. pulumi_vault/azure/auth_backend_config.py +257 -5
  8. pulumi_vault/azure/backend.py +249 -4
  9. pulumi_vault/database/_inputs.py +1740 -44
  10. pulumi_vault/database/outputs.py +1198 -18
  11. pulumi_vault/database/secret_backend_connection.py +220 -0
  12. pulumi_vault/database/secret_backend_static_role.py +143 -1
  13. pulumi_vault/database/secrets_mount.py +8 -0
  14. pulumi_vault/gcp/auth_backend.py +222 -2
  15. pulumi_vault/gcp/secret_backend.py +244 -4
  16. pulumi_vault/ldap/auth_backend.py +222 -2
  17. pulumi_vault/ldap/secret_backend.py +222 -2
  18. pulumi_vault/pkisecret/__init__.py +6 -0
  19. pulumi_vault/pkisecret/_inputs.py +34 -6
  20. pulumi_vault/pkisecret/backend_acme_eab.py +549 -0
  21. pulumi_vault/pkisecret/backend_config_acme.py +689 -0
  22. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1376 -0
  23. pulumi_vault/pkisecret/backend_config_cmpv2.py +572 -0
  24. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  25. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  26. pulumi_vault/pkisecret/get_backend_issuer.py +114 -1
  27. pulumi_vault/pkisecret/outputs.py +40 -4
  28. pulumi_vault/pkisecret/secret_backend_cert.py +148 -7
  29. pulumi_vault/pkisecret/secret_backend_crl_config.py +54 -0
  30. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +141 -0
  31. pulumi_vault/pkisecret/secret_backend_issuer.py +265 -0
  32. pulumi_vault/pkisecret/secret_backend_role.py +299 -3
  33. pulumi_vault/pkisecret/secret_backend_root_cert.py +423 -0
  34. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +581 -3
  35. pulumi_vault/pkisecret/secret_backend_sign.py +94 -0
  36. pulumi_vault/pulumi-plugin.json +1 -1
  37. pulumi_vault/ssh/__init__.py +1 -0
  38. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  39. pulumi_vault/ssh/secret_backend_role.py +27 -0
  40. pulumi_vault/terraformcloud/secret_role.py +7 -7
  41. pulumi_vault/transit/__init__.py +2 -0
  42. pulumi_vault/transit/get_sign.py +324 -0
  43. pulumi_vault/transit/get_verify.py +354 -0
  44. pulumi_vault/transit/secret_backend_key.py +162 -0
  45. {pulumi_vault-6.5.0a1736850018.dist-info → pulumi_vault-6.6.0.dist-info}/METADATA +1 -1
  46. {pulumi_vault-6.5.0a1736850018.dist-info → pulumi_vault-6.6.0.dist-info}/RECORD +48 -39
  47. {pulumi_vault-6.5.0a1736850018.dist-info → pulumi_vault-6.6.0.dist-info}/WHEEL +1 -1
  48. {pulumi_vault-6.5.0a1736850018.dist-info → pulumi_vault-6.6.0.dist-info}/top_level.txt +0 -0
@@ -2625,6 +2625,10 @@ if not MYPY:
2625
2625
  """
2626
2626
  The root credential password used in the connection URL
2627
2627
  """
2628
+ password_authentication: NotRequired[pulumi.Input[str]]
2629
+ """
2630
+ When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
2631
+ """
2628
2632
  private_key: NotRequired[pulumi.Input[str]]
2629
2633
  """
2630
2634
  The secret key used for the x509 client certificate. Must be PEM encoded.
@@ -2666,6 +2670,7 @@ class SecretBackendConnectionPostgresqlArgs:
2666
2670
  max_idle_connections: Optional[pulumi.Input[int]] = None,
2667
2671
  max_open_connections: Optional[pulumi.Input[int]] = None,
2668
2672
  password: Optional[pulumi.Input[str]] = None,
2673
+ password_authentication: Optional[pulumi.Input[str]] = None,
2669
2674
  private_key: Optional[pulumi.Input[str]] = None,
2670
2675
  self_managed: Optional[pulumi.Input[bool]] = None,
2671
2676
  service_account_json: Optional[pulumi.Input[str]] = None,
@@ -2681,6 +2686,7 @@ class SecretBackendConnectionPostgresqlArgs:
2681
2686
  :param pulumi.Input[int] max_idle_connections: Maximum number of idle connections to the database.
2682
2687
  :param pulumi.Input[int] max_open_connections: Maximum number of open connections to the database.
2683
2688
  :param pulumi.Input[str] password: The root credential password used in the connection URL
2689
+ :param pulumi.Input[str] password_authentication: When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
2684
2690
  :param pulumi.Input[str] private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
2685
2691
  :param pulumi.Input[bool] self_managed: If set, allows onboarding static roles with a rootless connection configuration.
2686
2692
  :param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
@@ -2703,6 +2709,8 @@ class SecretBackendConnectionPostgresqlArgs:
2703
2709
  pulumi.set(__self__, "max_open_connections", max_open_connections)
2704
2710
  if password is not None:
2705
2711
  pulumi.set(__self__, "password", password)
2712
+ if password_authentication is not None:
2713
+ pulumi.set(__self__, "password_authentication", password_authentication)
2706
2714
  if private_key is not None:
2707
2715
  pulumi.set(__self__, "private_key", private_key)
2708
2716
  if self_managed is not None:
@@ -2802,6 +2810,18 @@ class SecretBackendConnectionPostgresqlArgs:
2802
2810
  def password(self, value: Optional[pulumi.Input[str]]):
2803
2811
  pulumi.set(self, "password", value)
2804
2812
 
2813
+ @property
2814
+ @pulumi.getter(name="passwordAuthentication")
2815
+ def password_authentication(self) -> Optional[pulumi.Input[str]]:
2816
+ """
2817
+ When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
2818
+ """
2819
+ return pulumi.get(self, "password_authentication")
2820
+
2821
+ @password_authentication.setter
2822
+ def password_authentication(self, value: Optional[pulumi.Input[str]]):
2823
+ pulumi.set(self, "password_authentication", value)
2824
+
2805
2825
  @property
2806
2826
  @pulumi.getter(name="privateKey")
2807
2827
  def private_key(self) -> Optional[pulumi.Input[str]]:
@@ -3469,6 +3489,10 @@ if not MYPY:
3469
3489
  data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
3470
3490
  """
3471
3491
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3492
+ """
3493
+ disable_automated_rotation: NotRequired[pulumi.Input[bool]]
3494
+ """
3495
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
3472
3496
 
3473
3497
  Supported list of database secrets engines that can be configured:
3474
3498
  """
@@ -3508,6 +3532,22 @@ if not MYPY:
3508
3532
  """
3509
3533
  A list of database statements to be executed to rotate the root user's credentials.
3510
3534
  """
3535
+ rotation_period: NotRequired[pulumi.Input[int]]
3536
+ """
3537
+ The amount of time in seconds Vault should wait before rotating the root credential.
3538
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
3539
+ """
3540
+ rotation_schedule: NotRequired[pulumi.Input[str]]
3541
+ """
3542
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
3543
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
3544
+ """
3545
+ rotation_window: NotRequired[pulumi.Input[int]]
3546
+ """
3547
+ The maximum amount of time in seconds allowed to complete
3548
+ a rotation when a scheduled token rotation occurs. The default rotation window is
3549
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
3550
+ """
3511
3551
  skip_verification: NotRequired[pulumi.Input[bool]]
3512
3552
  """
3513
3553
  Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
@@ -3535,6 +3575,7 @@ class SecretsMountCassandraArgs:
3535
3575
  allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
3536
3576
  connect_timeout: Optional[pulumi.Input[int]] = None,
3537
3577
  data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
3578
+ disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
3538
3579
  hosts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
3539
3580
  insecure_tls: Optional[pulumi.Input[bool]] = None,
3540
3581
  password: Optional[pulumi.Input[str]] = None,
@@ -3544,6 +3585,9 @@ class SecretsMountCassandraArgs:
3544
3585
  port: Optional[pulumi.Input[int]] = None,
3545
3586
  protocol_version: Optional[pulumi.Input[int]] = None,
3546
3587
  root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
3588
+ rotation_period: Optional[pulumi.Input[int]] = None,
3589
+ rotation_schedule: Optional[pulumi.Input[str]] = None,
3590
+ rotation_window: Optional[pulumi.Input[int]] = None,
3547
3591
  skip_verification: Optional[pulumi.Input[bool]] = None,
3548
3592
  tls: Optional[pulumi.Input[bool]] = None,
3549
3593
  username: Optional[pulumi.Input[str]] = None,
@@ -3554,6 +3598,7 @@ class SecretsMountCassandraArgs:
3554
3598
  connection.
3555
3599
  :param pulumi.Input[int] connect_timeout: The number of seconds to use as a connection timeout.
3556
3600
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3601
+ :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
3557
3602
 
3558
3603
  Supported list of database secrets engines that can be configured:
3559
3604
  :param pulumi.Input[Sequence[pulumi.Input[str]]] hosts: Cassandra hosts to connect to.
@@ -3565,6 +3610,13 @@ class SecretsMountCassandraArgs:
3565
3610
  :param pulumi.Input[int] port: The transport port to use to connect to Cassandra.
3566
3611
  :param pulumi.Input[int] protocol_version: The CQL protocol version to use.
3567
3612
  :param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
3613
+ :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
3614
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
3615
+ :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
3616
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
3617
+ :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
3618
+ a rotation when a scheduled token rotation occurs. The default rotation window is
3619
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
3568
3620
  :param pulumi.Input[bool] skip_verification: Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
3569
3621
  :param pulumi.Input[bool] tls: Whether to use TLS when connecting to Cassandra.
3570
3622
  :param pulumi.Input[str] username: The username to use when authenticating with Cassandra.
@@ -3578,6 +3630,8 @@ class SecretsMountCassandraArgs:
3578
3630
  pulumi.set(__self__, "connect_timeout", connect_timeout)
3579
3631
  if data is not None:
3580
3632
  pulumi.set(__self__, "data", data)
3633
+ if disable_automated_rotation is not None:
3634
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
3581
3635
  if hosts is not None:
3582
3636
  pulumi.set(__self__, "hosts", hosts)
3583
3637
  if insecure_tls is not None:
@@ -3596,6 +3650,12 @@ class SecretsMountCassandraArgs:
3596
3650
  pulumi.set(__self__, "protocol_version", protocol_version)
3597
3651
  if root_rotation_statements is not None:
3598
3652
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
3653
+ if rotation_period is not None:
3654
+ pulumi.set(__self__, "rotation_period", rotation_period)
3655
+ if rotation_schedule is not None:
3656
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
3657
+ if rotation_window is not None:
3658
+ pulumi.set(__self__, "rotation_window", rotation_window)
3599
3659
  if skip_verification is not None:
3600
3660
  pulumi.set(__self__, "skip_verification", skip_verification)
3601
3661
  if tls is not None:
@@ -3647,8 +3707,6 @@ class SecretsMountCassandraArgs:
3647
3707
  def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
3648
3708
  """
3649
3709
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3650
-
3651
- Supported list of database secrets engines that can be configured:
3652
3710
  """
3653
3711
  return pulumi.get(self, "data")
3654
3712
 
@@ -3656,6 +3714,20 @@ class SecretsMountCassandraArgs:
3656
3714
  def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
3657
3715
  pulumi.set(self, "data", value)
3658
3716
 
3717
+ @property
3718
+ @pulumi.getter(name="disableAutomatedRotation")
3719
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
3720
+ """
3721
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
3722
+
3723
+ Supported list of database secrets engines that can be configured:
3724
+ """
3725
+ return pulumi.get(self, "disable_automated_rotation")
3726
+
3727
+ @disable_automated_rotation.setter
3728
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
3729
+ pulumi.set(self, "disable_automated_rotation", value)
3730
+
3659
3731
  @property
3660
3732
  @pulumi.getter
3661
3733
  def hosts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
@@ -3764,6 +3836,46 @@ class SecretsMountCassandraArgs:
3764
3836
  def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
3765
3837
  pulumi.set(self, "root_rotation_statements", value)
3766
3838
 
3839
+ @property
3840
+ @pulumi.getter(name="rotationPeriod")
3841
+ def rotation_period(self) -> Optional[pulumi.Input[int]]:
3842
+ """
3843
+ The amount of time in seconds Vault should wait before rotating the root credential.
3844
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
3845
+ """
3846
+ return pulumi.get(self, "rotation_period")
3847
+
3848
+ @rotation_period.setter
3849
+ def rotation_period(self, value: Optional[pulumi.Input[int]]):
3850
+ pulumi.set(self, "rotation_period", value)
3851
+
3852
+ @property
3853
+ @pulumi.getter(name="rotationSchedule")
3854
+ def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
3855
+ """
3856
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
3857
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
3858
+ """
3859
+ return pulumi.get(self, "rotation_schedule")
3860
+
3861
+ @rotation_schedule.setter
3862
+ def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
3863
+ pulumi.set(self, "rotation_schedule", value)
3864
+
3865
+ @property
3866
+ @pulumi.getter(name="rotationWindow")
3867
+ def rotation_window(self) -> Optional[pulumi.Input[int]]:
3868
+ """
3869
+ The maximum amount of time in seconds allowed to complete
3870
+ a rotation when a scheduled token rotation occurs. The default rotation window is
3871
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
3872
+ """
3873
+ return pulumi.get(self, "rotation_window")
3874
+
3875
+ @rotation_window.setter
3876
+ def rotation_window(self, value: Optional[pulumi.Input[int]]):
3877
+ pulumi.set(self, "rotation_window", value)
3878
+
3767
3879
  @property
3768
3880
  @pulumi.getter(name="skipVerification")
3769
3881
  def skip_verification(self) -> Optional[pulumi.Input[bool]]:
@@ -3848,6 +3960,10 @@ if not MYPY:
3848
3960
  data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
3849
3961
  """
3850
3962
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3963
+ """
3964
+ disable_automated_rotation: NotRequired[pulumi.Input[bool]]
3965
+ """
3966
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
3851
3967
 
3852
3968
  Supported list of database secrets engines that can be configured:
3853
3969
  """
@@ -3863,6 +3979,22 @@ if not MYPY:
3863
3979
  """
3864
3980
  A list of database statements to be executed to rotate the root user's credentials.
3865
3981
  """
3982
+ rotation_period: NotRequired[pulumi.Input[int]]
3983
+ """
3984
+ The amount of time in seconds Vault should wait before rotating the root credential.
3985
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
3986
+ """
3987
+ rotation_schedule: NotRequired[pulumi.Input[str]]
3988
+ """
3989
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
3990
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
3991
+ """
3992
+ rotation_window: NotRequired[pulumi.Input[int]]
3993
+ """
3994
+ The maximum amount of time in seconds allowed to complete
3995
+ a rotation when a scheduled token rotation occurs. The default rotation window is
3996
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
3997
+ """
3866
3998
  tls: NotRequired[pulumi.Input[bool]]
3867
3999
  """
3868
4000
  Specifies whether to use TLS when connecting to Couchbase.
@@ -3890,9 +4022,13 @@ class SecretsMountCouchbaseArgs:
3890
4022
  base64_pem: Optional[pulumi.Input[str]] = None,
3891
4023
  bucket_name: Optional[pulumi.Input[str]] = None,
3892
4024
  data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
4025
+ disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
3893
4026
  insecure_tls: Optional[pulumi.Input[bool]] = None,
3894
4027
  plugin_name: Optional[pulumi.Input[str]] = None,
3895
4028
  root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
4029
+ rotation_period: Optional[pulumi.Input[int]] = None,
4030
+ rotation_schedule: Optional[pulumi.Input[str]] = None,
4031
+ rotation_window: Optional[pulumi.Input[int]] = None,
3896
4032
  tls: Optional[pulumi.Input[bool]] = None,
3897
4033
  username_template: Optional[pulumi.Input[str]] = None,
3898
4034
  verify_connection: Optional[pulumi.Input[bool]] = None):
@@ -3906,11 +4042,19 @@ class SecretsMountCouchbaseArgs:
3906
4042
  :param pulumi.Input[str] base64_pem: Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
3907
4043
  :param pulumi.Input[str] bucket_name: Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
3908
4044
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4045
+ :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
3909
4046
 
3910
4047
  Supported list of database secrets engines that can be configured:
3911
4048
  :param pulumi.Input[bool] insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
3912
4049
  :param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
3913
4050
  :param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
4051
+ :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
4052
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
4053
+ :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
4054
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
4055
+ :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
4056
+ a rotation when a scheduled token rotation occurs. The default rotation window is
4057
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
3914
4058
  :param pulumi.Input[bool] tls: Specifies whether to use TLS when connecting to Couchbase.
3915
4059
  :param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated.
3916
4060
  :param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
@@ -3928,12 +4072,20 @@ class SecretsMountCouchbaseArgs:
3928
4072
  pulumi.set(__self__, "bucket_name", bucket_name)
3929
4073
  if data is not None:
3930
4074
  pulumi.set(__self__, "data", data)
4075
+ if disable_automated_rotation is not None:
4076
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
3931
4077
  if insecure_tls is not None:
3932
4078
  pulumi.set(__self__, "insecure_tls", insecure_tls)
3933
4079
  if plugin_name is not None:
3934
4080
  pulumi.set(__self__, "plugin_name", plugin_name)
3935
4081
  if root_rotation_statements is not None:
3936
4082
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
4083
+ if rotation_period is not None:
4084
+ pulumi.set(__self__, "rotation_period", rotation_period)
4085
+ if rotation_schedule is not None:
4086
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
4087
+ if rotation_window is not None:
4088
+ pulumi.set(__self__, "rotation_window", rotation_window)
3937
4089
  if tls is not None:
3938
4090
  pulumi.set(__self__, "tls", tls)
3939
4091
  if username_template is not None:
@@ -4031,8 +4183,6 @@ class SecretsMountCouchbaseArgs:
4031
4183
  def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
4032
4184
  """
4033
4185
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4034
-
4035
- Supported list of database secrets engines that can be configured:
4036
4186
  """
4037
4187
  return pulumi.get(self, "data")
4038
4188
 
@@ -4040,6 +4190,20 @@ class SecretsMountCouchbaseArgs:
4040
4190
  def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
4041
4191
  pulumi.set(self, "data", value)
4042
4192
 
4193
+ @property
4194
+ @pulumi.getter(name="disableAutomatedRotation")
4195
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
4196
+ """
4197
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
4198
+
4199
+ Supported list of database secrets engines that can be configured:
4200
+ """
4201
+ return pulumi.get(self, "disable_automated_rotation")
4202
+
4203
+ @disable_automated_rotation.setter
4204
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
4205
+ pulumi.set(self, "disable_automated_rotation", value)
4206
+
4043
4207
  @property
4044
4208
  @pulumi.getter(name="insecureTls")
4045
4209
  def insecure_tls(self) -> Optional[pulumi.Input[bool]]:
@@ -4076,6 +4240,46 @@ class SecretsMountCouchbaseArgs:
4076
4240
  def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
4077
4241
  pulumi.set(self, "root_rotation_statements", value)
4078
4242
 
4243
+ @property
4244
+ @pulumi.getter(name="rotationPeriod")
4245
+ def rotation_period(self) -> Optional[pulumi.Input[int]]:
4246
+ """
4247
+ The amount of time in seconds Vault should wait before rotating the root credential.
4248
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
4249
+ """
4250
+ return pulumi.get(self, "rotation_period")
4251
+
4252
+ @rotation_period.setter
4253
+ def rotation_period(self, value: Optional[pulumi.Input[int]]):
4254
+ pulumi.set(self, "rotation_period", value)
4255
+
4256
+ @property
4257
+ @pulumi.getter(name="rotationSchedule")
4258
+ def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
4259
+ """
4260
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
4261
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
4262
+ """
4263
+ return pulumi.get(self, "rotation_schedule")
4264
+
4265
+ @rotation_schedule.setter
4266
+ def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
4267
+ pulumi.set(self, "rotation_schedule", value)
4268
+
4269
+ @property
4270
+ @pulumi.getter(name="rotationWindow")
4271
+ def rotation_window(self) -> Optional[pulumi.Input[int]]:
4272
+ """
4273
+ The maximum amount of time in seconds allowed to complete
4274
+ a rotation when a scheduled token rotation occurs. The default rotation window is
4275
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
4276
+ """
4277
+ return pulumi.get(self, "rotation_window")
4278
+
4279
+ @rotation_window.setter
4280
+ def rotation_window(self, value: Optional[pulumi.Input[int]]):
4281
+ pulumi.set(self, "rotation_window", value)
4282
+
4079
4283
  @property
4080
4284
  @pulumi.getter
4081
4285
  def tls(self) -> Optional[pulumi.Input[bool]]:
@@ -4156,6 +4360,10 @@ if not MYPY:
4156
4360
  data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
4157
4361
  """
4158
4362
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4363
+ """
4364
+ disable_automated_rotation: NotRequired[pulumi.Input[bool]]
4365
+ """
4366
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
4159
4367
 
4160
4368
  Supported list of database secrets engines that can be configured:
4161
4369
  """
@@ -4171,6 +4379,22 @@ if not MYPY:
4171
4379
  """
4172
4380
  A list of database statements to be executed to rotate the root user's credentials.
4173
4381
  """
4382
+ rotation_period: NotRequired[pulumi.Input[int]]
4383
+ """
4384
+ The amount of time in seconds Vault should wait before rotating the root credential.
4385
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
4386
+ """
4387
+ rotation_schedule: NotRequired[pulumi.Input[str]]
4388
+ """
4389
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
4390
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
4391
+ """
4392
+ rotation_window: NotRequired[pulumi.Input[int]]
4393
+ """
4394
+ The maximum amount of time in seconds allowed to complete
4395
+ a rotation when a scheduled token rotation occurs. The default rotation window is
4396
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
4397
+ """
4174
4398
  tls_server_name: NotRequired[pulumi.Input[str]]
4175
4399
  """
4176
4400
  This, if set, is used to set the SNI host when connecting via TLS
@@ -4200,9 +4424,13 @@ class SecretsMountElasticsearchArgs:
4200
4424
  client_cert: Optional[pulumi.Input[str]] = None,
4201
4425
  client_key: Optional[pulumi.Input[str]] = None,
4202
4426
  data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
4427
+ disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
4203
4428
  insecure: Optional[pulumi.Input[bool]] = None,
4204
4429
  plugin_name: Optional[pulumi.Input[str]] = None,
4205
4430
  root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
4431
+ rotation_period: Optional[pulumi.Input[int]] = None,
4432
+ rotation_schedule: Optional[pulumi.Input[str]] = None,
4433
+ rotation_window: Optional[pulumi.Input[int]] = None,
4206
4434
  tls_server_name: Optional[pulumi.Input[str]] = None,
4207
4435
  username_template: Optional[pulumi.Input[str]] = None,
4208
4436
  verify_connection: Optional[pulumi.Input[bool]] = None):
@@ -4218,11 +4446,19 @@ class SecretsMountElasticsearchArgs:
4218
4446
  :param pulumi.Input[str] client_cert: The path to the certificate for the Elasticsearch client to present for communication
4219
4447
  :param pulumi.Input[str] client_key: The path to the key for the Elasticsearch client to use for communication
4220
4448
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4449
+ :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
4221
4450
 
4222
4451
  Supported list of database secrets engines that can be configured:
4223
4452
  :param pulumi.Input[bool] insecure: Whether to disable certificate verification
4224
4453
  :param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
4225
4454
  :param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
4455
+ :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
4456
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
4457
+ :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
4458
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
4459
+ :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
4460
+ a rotation when a scheduled token rotation occurs. The default rotation window is
4461
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
4226
4462
  :param pulumi.Input[str] tls_server_name: This, if set, is used to set the SNI host when connecting via TLS
4227
4463
  :param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated.
4228
4464
  :param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
@@ -4244,12 +4480,20 @@ class SecretsMountElasticsearchArgs:
4244
4480
  pulumi.set(__self__, "client_key", client_key)
4245
4481
  if data is not None:
4246
4482
  pulumi.set(__self__, "data", data)
4483
+ if disable_automated_rotation is not None:
4484
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
4247
4485
  if insecure is not None:
4248
4486
  pulumi.set(__self__, "insecure", insecure)
4249
4487
  if plugin_name is not None:
4250
4488
  pulumi.set(__self__, "plugin_name", plugin_name)
4251
4489
  if root_rotation_statements is not None:
4252
4490
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
4491
+ if rotation_period is not None:
4492
+ pulumi.set(__self__, "rotation_period", rotation_period)
4493
+ if rotation_schedule is not None:
4494
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
4495
+ if rotation_window is not None:
4496
+ pulumi.set(__self__, "rotation_window", rotation_window)
4253
4497
  if tls_server_name is not None:
4254
4498
  pulumi.set(__self__, "tls_server_name", tls_server_name)
4255
4499
  if username_template is not None:
@@ -4371,8 +4615,6 @@ class SecretsMountElasticsearchArgs:
4371
4615
  def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
4372
4616
  """
4373
4617
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4374
-
4375
- Supported list of database secrets engines that can be configured:
4376
4618
  """
4377
4619
  return pulumi.get(self, "data")
4378
4620
 
@@ -4380,6 +4622,20 @@ class SecretsMountElasticsearchArgs:
4380
4622
  def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
4381
4623
  pulumi.set(self, "data", value)
4382
4624
 
4625
+ @property
4626
+ @pulumi.getter(name="disableAutomatedRotation")
4627
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
4628
+ """
4629
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
4630
+
4631
+ Supported list of database secrets engines that can be configured:
4632
+ """
4633
+ return pulumi.get(self, "disable_automated_rotation")
4634
+
4635
+ @disable_automated_rotation.setter
4636
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
4637
+ pulumi.set(self, "disable_automated_rotation", value)
4638
+
4383
4639
  @property
4384
4640
  @pulumi.getter
4385
4641
  def insecure(self) -> Optional[pulumi.Input[bool]]:
@@ -4416,6 +4672,46 @@ class SecretsMountElasticsearchArgs:
4416
4672
  def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
4417
4673
  pulumi.set(self, "root_rotation_statements", value)
4418
4674
 
4675
+ @property
4676
+ @pulumi.getter(name="rotationPeriod")
4677
+ def rotation_period(self) -> Optional[pulumi.Input[int]]:
4678
+ """
4679
+ The amount of time in seconds Vault should wait before rotating the root credential.
4680
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
4681
+ """
4682
+ return pulumi.get(self, "rotation_period")
4683
+
4684
+ @rotation_period.setter
4685
+ def rotation_period(self, value: Optional[pulumi.Input[int]]):
4686
+ pulumi.set(self, "rotation_period", value)
4687
+
4688
+ @property
4689
+ @pulumi.getter(name="rotationSchedule")
4690
+ def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
4691
+ """
4692
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
4693
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
4694
+ """
4695
+ return pulumi.get(self, "rotation_schedule")
4696
+
4697
+ @rotation_schedule.setter
4698
+ def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
4699
+ pulumi.set(self, "rotation_schedule", value)
4700
+
4701
+ @property
4702
+ @pulumi.getter(name="rotationWindow")
4703
+ def rotation_window(self) -> Optional[pulumi.Input[int]]:
4704
+ """
4705
+ The maximum amount of time in seconds allowed to complete
4706
+ a rotation when a scheduled token rotation occurs. The default rotation window is
4707
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
4708
+ """
4709
+ return pulumi.get(self, "rotation_window")
4710
+
4711
+ @rotation_window.setter
4712
+ def rotation_window(self, value: Optional[pulumi.Input[int]]):
4713
+ pulumi.set(self, "rotation_window", value)
4714
+
4419
4715
  @property
4420
4716
  @pulumi.getter(name="tlsServerName")
4421
4717
  def tls_server_name(self) -> Optional[pulumi.Input[str]]:
@@ -4472,6 +4768,10 @@ if not MYPY:
4472
4768
  data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
4473
4769
  """
4474
4770
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4771
+ """
4772
+ disable_automated_rotation: NotRequired[pulumi.Input[bool]]
4773
+ """
4774
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
4475
4775
 
4476
4776
  Supported list of database secrets engines that can be configured:
4477
4777
  """
@@ -4503,6 +4803,22 @@ if not MYPY:
4503
4803
  """
4504
4804
  A list of database statements to be executed to rotate the root user's credentials.
4505
4805
  """
4806
+ rotation_period: NotRequired[pulumi.Input[int]]
4807
+ """
4808
+ The amount of time in seconds Vault should wait before rotating the root credential.
4809
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
4810
+ """
4811
+ rotation_schedule: NotRequired[pulumi.Input[str]]
4812
+ """
4813
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
4814
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
4815
+ """
4816
+ rotation_window: NotRequired[pulumi.Input[int]]
4817
+ """
4818
+ The maximum amount of time in seconds allowed to complete
4819
+ a rotation when a scheduled token rotation occurs. The default rotation window is
4820
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
4821
+ """
4506
4822
  username: NotRequired[pulumi.Input[str]]
4507
4823
  """
4508
4824
  The root credential username used in the connection URL
@@ -4522,6 +4838,7 @@ class SecretsMountHanaArgs:
4522
4838
  allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
4523
4839
  connection_url: Optional[pulumi.Input[str]] = None,
4524
4840
  data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
4841
+ disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
4525
4842
  disable_escaping: Optional[pulumi.Input[bool]] = None,
4526
4843
  max_connection_lifetime: Optional[pulumi.Input[int]] = None,
4527
4844
  max_idle_connections: Optional[pulumi.Input[int]] = None,
@@ -4529,6 +4846,9 @@ class SecretsMountHanaArgs:
4529
4846
  password: Optional[pulumi.Input[str]] = None,
4530
4847
  plugin_name: Optional[pulumi.Input[str]] = None,
4531
4848
  root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
4849
+ rotation_period: Optional[pulumi.Input[int]] = None,
4850
+ rotation_schedule: Optional[pulumi.Input[str]] = None,
4851
+ rotation_window: Optional[pulumi.Input[int]] = None,
4532
4852
  username: Optional[pulumi.Input[str]] = None,
4533
4853
  verify_connection: Optional[pulumi.Input[bool]] = None):
4534
4854
  """
@@ -4537,6 +4857,7 @@ class SecretsMountHanaArgs:
4537
4857
  connection.
4538
4858
  :param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
4539
4859
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4860
+ :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
4540
4861
 
4541
4862
  Supported list of database secrets engines that can be configured:
4542
4863
  :param pulumi.Input[bool] disable_escaping: Disable special character escaping in username and password
@@ -4546,6 +4867,13 @@ class SecretsMountHanaArgs:
4546
4867
  :param pulumi.Input[str] password: The root credential password used in the connection URL
4547
4868
  :param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
4548
4869
  :param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
4870
+ :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
4871
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
4872
+ :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
4873
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
4874
+ :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
4875
+ a rotation when a scheduled token rotation occurs. The default rotation window is
4876
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
4549
4877
  :param pulumi.Input[str] username: The root credential username used in the connection URL
4550
4878
  :param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
4551
4879
  initial configuration or not.
@@ -4557,6 +4885,8 @@ class SecretsMountHanaArgs:
4557
4885
  pulumi.set(__self__, "connection_url", connection_url)
4558
4886
  if data is not None:
4559
4887
  pulumi.set(__self__, "data", data)
4888
+ if disable_automated_rotation is not None:
4889
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
4560
4890
  if disable_escaping is not None:
4561
4891
  pulumi.set(__self__, "disable_escaping", disable_escaping)
4562
4892
  if max_connection_lifetime is not None:
@@ -4571,6 +4901,12 @@ class SecretsMountHanaArgs:
4571
4901
  pulumi.set(__self__, "plugin_name", plugin_name)
4572
4902
  if root_rotation_statements is not None:
4573
4903
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
4904
+ if rotation_period is not None:
4905
+ pulumi.set(__self__, "rotation_period", rotation_period)
4906
+ if rotation_schedule is not None:
4907
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
4908
+ if rotation_window is not None:
4909
+ pulumi.set(__self__, "rotation_window", rotation_window)
4574
4910
  if username is not None:
4575
4911
  pulumi.set(__self__, "username", username)
4576
4912
  if verify_connection is not None:
@@ -4618,8 +4954,6 @@ class SecretsMountHanaArgs:
4618
4954
  def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
4619
4955
  """
4620
4956
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4621
-
4622
- Supported list of database secrets engines that can be configured:
4623
4957
  """
4624
4958
  return pulumi.get(self, "data")
4625
4959
 
@@ -4627,6 +4961,20 @@ class SecretsMountHanaArgs:
4627
4961
  def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
4628
4962
  pulumi.set(self, "data", value)
4629
4963
 
4964
+ @property
4965
+ @pulumi.getter(name="disableAutomatedRotation")
4966
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
4967
+ """
4968
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
4969
+
4970
+ Supported list of database secrets engines that can be configured:
4971
+ """
4972
+ return pulumi.get(self, "disable_automated_rotation")
4973
+
4974
+ @disable_automated_rotation.setter
4975
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
4976
+ pulumi.set(self, "disable_automated_rotation", value)
4977
+
4630
4978
  @property
4631
4979
  @pulumi.getter(name="disableEscaping")
4632
4980
  def disable_escaping(self) -> Optional[pulumi.Input[bool]]:
@@ -4711,6 +5059,46 @@ class SecretsMountHanaArgs:
4711
5059
  def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
4712
5060
  pulumi.set(self, "root_rotation_statements", value)
4713
5061
 
5062
+ @property
5063
+ @pulumi.getter(name="rotationPeriod")
5064
+ def rotation_period(self) -> Optional[pulumi.Input[int]]:
5065
+ """
5066
+ The amount of time in seconds Vault should wait before rotating the root credential.
5067
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
5068
+ """
5069
+ return pulumi.get(self, "rotation_period")
5070
+
5071
+ @rotation_period.setter
5072
+ def rotation_period(self, value: Optional[pulumi.Input[int]]):
5073
+ pulumi.set(self, "rotation_period", value)
5074
+
5075
+ @property
5076
+ @pulumi.getter(name="rotationSchedule")
5077
+ def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
5078
+ """
5079
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
5080
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
5081
+ """
5082
+ return pulumi.get(self, "rotation_schedule")
5083
+
5084
+ @rotation_schedule.setter
5085
+ def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
5086
+ pulumi.set(self, "rotation_schedule", value)
5087
+
5088
+ @property
5089
+ @pulumi.getter(name="rotationWindow")
5090
+ def rotation_window(self) -> Optional[pulumi.Input[int]]:
5091
+ """
5092
+ The maximum amount of time in seconds allowed to complete
5093
+ a rotation when a scheduled token rotation occurs. The default rotation window is
5094
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
5095
+ """
5096
+ return pulumi.get(self, "rotation_window")
5097
+
5098
+ @rotation_window.setter
5099
+ def rotation_window(self, value: Optional[pulumi.Input[int]]):
5100
+ pulumi.set(self, "rotation_window", value)
5101
+
4714
5102
  @property
4715
5103
  @pulumi.getter
4716
5104
  def username(self) -> Optional[pulumi.Input[str]]:
@@ -4767,6 +5155,10 @@ if not MYPY:
4767
5155
  data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
4768
5156
  """
4769
5157
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5158
+ """
5159
+ disable_automated_rotation: NotRequired[pulumi.Input[bool]]
5160
+ """
5161
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
4770
5162
 
4771
5163
  Supported list of database secrets engines that can be configured:
4772
5164
  """
@@ -4794,6 +5186,22 @@ if not MYPY:
4794
5186
  """
4795
5187
  A list of database statements to be executed to rotate the root user's credentials.
4796
5188
  """
5189
+ rotation_period: NotRequired[pulumi.Input[int]]
5190
+ """
5191
+ The amount of time in seconds Vault should wait before rotating the root credential.
5192
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
5193
+ """
5194
+ rotation_schedule: NotRequired[pulumi.Input[str]]
5195
+ """
5196
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
5197
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
5198
+ """
5199
+ rotation_window: NotRequired[pulumi.Input[int]]
5200
+ """
5201
+ The maximum amount of time in seconds allowed to complete
5202
+ a rotation when a scheduled token rotation occurs. The default rotation window is
5203
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
5204
+ """
4797
5205
  tls: NotRequired[pulumi.Input[bool]]
4798
5206
  """
4799
5207
  Whether to use TLS when connecting to Influxdb.
@@ -4820,12 +5228,16 @@ class SecretsMountInfluxdbArgs:
4820
5228
  allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
4821
5229
  connect_timeout: Optional[pulumi.Input[int]] = None,
4822
5230
  data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
5231
+ disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
4823
5232
  insecure_tls: Optional[pulumi.Input[bool]] = None,
4824
5233
  pem_bundle: Optional[pulumi.Input[str]] = None,
4825
5234
  pem_json: Optional[pulumi.Input[str]] = None,
4826
5235
  plugin_name: Optional[pulumi.Input[str]] = None,
4827
5236
  port: Optional[pulumi.Input[int]] = None,
4828
5237
  root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
5238
+ rotation_period: Optional[pulumi.Input[int]] = None,
5239
+ rotation_schedule: Optional[pulumi.Input[str]] = None,
5240
+ rotation_window: Optional[pulumi.Input[int]] = None,
4829
5241
  tls: Optional[pulumi.Input[bool]] = None,
4830
5242
  username_template: Optional[pulumi.Input[str]] = None,
4831
5243
  verify_connection: Optional[pulumi.Input[bool]] = None):
@@ -4838,6 +5250,7 @@ class SecretsMountInfluxdbArgs:
4838
5250
  connection.
4839
5251
  :param pulumi.Input[int] connect_timeout: The number of seconds to use as a connection timeout.
4840
5252
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5253
+ :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
4841
5254
 
4842
5255
  Supported list of database secrets engines that can be configured:
4843
5256
  :param pulumi.Input[bool] insecure_tls: Whether to skip verification of the server certificate when using TLS.
@@ -4846,6 +5259,13 @@ class SecretsMountInfluxdbArgs:
4846
5259
  :param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
4847
5260
  :param pulumi.Input[int] port: The transport port to use to connect to Influxdb.
4848
5261
  :param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
5262
+ :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
5263
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
5264
+ :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
5265
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
5266
+ :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
5267
+ a rotation when a scheduled token rotation occurs. The default rotation window is
5268
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
4849
5269
  :param pulumi.Input[bool] tls: Whether to use TLS when connecting to Influxdb.
4850
5270
  :param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated.
4851
5271
  :param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
@@ -4861,6 +5281,8 @@ class SecretsMountInfluxdbArgs:
4861
5281
  pulumi.set(__self__, "connect_timeout", connect_timeout)
4862
5282
  if data is not None:
4863
5283
  pulumi.set(__self__, "data", data)
5284
+ if disable_automated_rotation is not None:
5285
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
4864
5286
  if insecure_tls is not None:
4865
5287
  pulumi.set(__self__, "insecure_tls", insecure_tls)
4866
5288
  if pem_bundle is not None:
@@ -4873,6 +5295,12 @@ class SecretsMountInfluxdbArgs:
4873
5295
  pulumi.set(__self__, "port", port)
4874
5296
  if root_rotation_statements is not None:
4875
5297
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
5298
+ if rotation_period is not None:
5299
+ pulumi.set(__self__, "rotation_period", rotation_period)
5300
+ if rotation_schedule is not None:
5301
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
5302
+ if rotation_window is not None:
5303
+ pulumi.set(__self__, "rotation_window", rotation_window)
4876
5304
  if tls is not None:
4877
5305
  pulumi.set(__self__, "tls", tls)
4878
5306
  if username_template is not None:
@@ -4958,8 +5386,6 @@ class SecretsMountInfluxdbArgs:
4958
5386
  def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
4959
5387
  """
4960
5388
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4961
-
4962
- Supported list of database secrets engines that can be configured:
4963
5389
  """
4964
5390
  return pulumi.get(self, "data")
4965
5391
 
@@ -4967,6 +5393,20 @@ class SecretsMountInfluxdbArgs:
4967
5393
  def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
4968
5394
  pulumi.set(self, "data", value)
4969
5395
 
5396
+ @property
5397
+ @pulumi.getter(name="disableAutomatedRotation")
5398
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
5399
+ """
5400
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
5401
+
5402
+ Supported list of database secrets engines that can be configured:
5403
+ """
5404
+ return pulumi.get(self, "disable_automated_rotation")
5405
+
5406
+ @disable_automated_rotation.setter
5407
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
5408
+ pulumi.set(self, "disable_automated_rotation", value)
5409
+
4970
5410
  @property
4971
5411
  @pulumi.getter(name="insecureTls")
4972
5412
  def insecure_tls(self) -> Optional[pulumi.Input[bool]]:
@@ -5039,6 +5479,46 @@ class SecretsMountInfluxdbArgs:
5039
5479
  def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
5040
5480
  pulumi.set(self, "root_rotation_statements", value)
5041
5481
 
5482
+ @property
5483
+ @pulumi.getter(name="rotationPeriod")
5484
+ def rotation_period(self) -> Optional[pulumi.Input[int]]:
5485
+ """
5486
+ The amount of time in seconds Vault should wait before rotating the root credential.
5487
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
5488
+ """
5489
+ return pulumi.get(self, "rotation_period")
5490
+
5491
+ @rotation_period.setter
5492
+ def rotation_period(self, value: Optional[pulumi.Input[int]]):
5493
+ pulumi.set(self, "rotation_period", value)
5494
+
5495
+ @property
5496
+ @pulumi.getter(name="rotationSchedule")
5497
+ def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
5498
+ """
5499
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
5500
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
5501
+ """
5502
+ return pulumi.get(self, "rotation_schedule")
5503
+
5504
+ @rotation_schedule.setter
5505
+ def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
5506
+ pulumi.set(self, "rotation_schedule", value)
5507
+
5508
+ @property
5509
+ @pulumi.getter(name="rotationWindow")
5510
+ def rotation_window(self) -> Optional[pulumi.Input[int]]:
5511
+ """
5512
+ The maximum amount of time in seconds allowed to complete
5513
+ a rotation when a scheduled token rotation occurs. The default rotation window is
5514
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
5515
+ """
5516
+ return pulumi.get(self, "rotation_window")
5517
+
5518
+ @rotation_window.setter
5519
+ def rotation_window(self, value: Optional[pulumi.Input[int]]):
5520
+ pulumi.set(self, "rotation_window", value)
5521
+
5042
5522
  @property
5043
5523
  @pulumi.getter
5044
5524
  def tls(self) -> Optional[pulumi.Input[bool]]:
@@ -5095,6 +5575,10 @@ if not MYPY:
5095
5575
  data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
5096
5576
  """
5097
5577
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5578
+ """
5579
+ disable_automated_rotation: NotRequired[pulumi.Input[bool]]
5580
+ """
5581
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
5098
5582
 
5099
5583
  Supported list of database secrets engines that can be configured:
5100
5584
  """
@@ -5122,6 +5606,22 @@ if not MYPY:
5122
5606
  """
5123
5607
  A list of database statements to be executed to rotate the root user's credentials.
5124
5608
  """
5609
+ rotation_period: NotRequired[pulumi.Input[int]]
5610
+ """
5611
+ The amount of time in seconds Vault should wait before rotating the root credential.
5612
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
5613
+ """
5614
+ rotation_schedule: NotRequired[pulumi.Input[str]]
5615
+ """
5616
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
5617
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
5618
+ """
5619
+ rotation_window: NotRequired[pulumi.Input[int]]
5620
+ """
5621
+ The maximum amount of time in seconds allowed to complete
5622
+ a rotation when a scheduled token rotation occurs. The default rotation window is
5623
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
5624
+ """
5125
5625
  username: NotRequired[pulumi.Input[str]]
5126
5626
  """
5127
5627
  The root credential username used in the connection URL
@@ -5145,12 +5645,16 @@ class SecretsMountMongodbArgs:
5145
5645
  allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
5146
5646
  connection_url: Optional[pulumi.Input[str]] = None,
5147
5647
  data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
5648
+ disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
5148
5649
  max_connection_lifetime: Optional[pulumi.Input[int]] = None,
5149
5650
  max_idle_connections: Optional[pulumi.Input[int]] = None,
5150
5651
  max_open_connections: Optional[pulumi.Input[int]] = None,
5151
5652
  password: Optional[pulumi.Input[str]] = None,
5152
5653
  plugin_name: Optional[pulumi.Input[str]] = None,
5153
5654
  root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
5655
+ rotation_period: Optional[pulumi.Input[int]] = None,
5656
+ rotation_schedule: Optional[pulumi.Input[str]] = None,
5657
+ rotation_window: Optional[pulumi.Input[int]] = None,
5154
5658
  username: Optional[pulumi.Input[str]] = None,
5155
5659
  username_template: Optional[pulumi.Input[str]] = None,
5156
5660
  verify_connection: Optional[pulumi.Input[bool]] = None):
@@ -5160,6 +5664,7 @@ class SecretsMountMongodbArgs:
5160
5664
  connection.
5161
5665
  :param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
5162
5666
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5667
+ :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
5163
5668
 
5164
5669
  Supported list of database secrets engines that can be configured:
5165
5670
  :param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
@@ -5168,6 +5673,13 @@ class SecretsMountMongodbArgs:
5168
5673
  :param pulumi.Input[str] password: The root credential password used in the connection URL
5169
5674
  :param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
5170
5675
  :param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
5676
+ :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
5677
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
5678
+ :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
5679
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
5680
+ :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
5681
+ a rotation when a scheduled token rotation occurs. The default rotation window is
5682
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
5171
5683
  :param pulumi.Input[str] username: The root credential username used in the connection URL
5172
5684
  :param pulumi.Input[str] username_template: Username generation template.
5173
5685
  :param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
@@ -5180,6 +5692,8 @@ class SecretsMountMongodbArgs:
5180
5692
  pulumi.set(__self__, "connection_url", connection_url)
5181
5693
  if data is not None:
5182
5694
  pulumi.set(__self__, "data", data)
5695
+ if disable_automated_rotation is not None:
5696
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
5183
5697
  if max_connection_lifetime is not None:
5184
5698
  pulumi.set(__self__, "max_connection_lifetime", max_connection_lifetime)
5185
5699
  if max_idle_connections is not None:
@@ -5192,6 +5706,12 @@ class SecretsMountMongodbArgs:
5192
5706
  pulumi.set(__self__, "plugin_name", plugin_name)
5193
5707
  if root_rotation_statements is not None:
5194
5708
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
5709
+ if rotation_period is not None:
5710
+ pulumi.set(__self__, "rotation_period", rotation_period)
5711
+ if rotation_schedule is not None:
5712
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
5713
+ if rotation_window is not None:
5714
+ pulumi.set(__self__, "rotation_window", rotation_window)
5195
5715
  if username is not None:
5196
5716
  pulumi.set(__self__, "username", username)
5197
5717
  if username_template is not None:
@@ -5241,8 +5761,6 @@ class SecretsMountMongodbArgs:
5241
5761
  def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
5242
5762
  """
5243
5763
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5244
-
5245
- Supported list of database secrets engines that can be configured:
5246
5764
  """
5247
5765
  return pulumi.get(self, "data")
5248
5766
 
@@ -5250,6 +5768,20 @@ class SecretsMountMongodbArgs:
5250
5768
  def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
5251
5769
  pulumi.set(self, "data", value)
5252
5770
 
5771
+ @property
5772
+ @pulumi.getter(name="disableAutomatedRotation")
5773
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
5774
+ """
5775
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
5776
+
5777
+ Supported list of database secrets engines that can be configured:
5778
+ """
5779
+ return pulumi.get(self, "disable_automated_rotation")
5780
+
5781
+ @disable_automated_rotation.setter
5782
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
5783
+ pulumi.set(self, "disable_automated_rotation", value)
5784
+
5253
5785
  @property
5254
5786
  @pulumi.getter(name="maxConnectionLifetime")
5255
5787
  def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
@@ -5322,6 +5854,46 @@ class SecretsMountMongodbArgs:
5322
5854
  def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
5323
5855
  pulumi.set(self, "root_rotation_statements", value)
5324
5856
 
5857
+ @property
5858
+ @pulumi.getter(name="rotationPeriod")
5859
+ def rotation_period(self) -> Optional[pulumi.Input[int]]:
5860
+ """
5861
+ The amount of time in seconds Vault should wait before rotating the root credential.
5862
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
5863
+ """
5864
+ return pulumi.get(self, "rotation_period")
5865
+
5866
+ @rotation_period.setter
5867
+ def rotation_period(self, value: Optional[pulumi.Input[int]]):
5868
+ pulumi.set(self, "rotation_period", value)
5869
+
5870
+ @property
5871
+ @pulumi.getter(name="rotationSchedule")
5872
+ def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
5873
+ """
5874
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
5875
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
5876
+ """
5877
+ return pulumi.get(self, "rotation_schedule")
5878
+
5879
+ @rotation_schedule.setter
5880
+ def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
5881
+ pulumi.set(self, "rotation_schedule", value)
5882
+
5883
+ @property
5884
+ @pulumi.getter(name="rotationWindow")
5885
+ def rotation_window(self) -> Optional[pulumi.Input[int]]:
5886
+ """
5887
+ The maximum amount of time in seconds allowed to complete
5888
+ a rotation when a scheduled token rotation occurs. The default rotation window is
5889
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
5890
+ """
5891
+ return pulumi.get(self, "rotation_window")
5892
+
5893
+ @rotation_window.setter
5894
+ def rotation_window(self, value: Optional[pulumi.Input[int]]):
5895
+ pulumi.set(self, "rotation_window", value)
5896
+
5325
5897
  @property
5326
5898
  @pulumi.getter
5327
5899
  def username(self) -> Optional[pulumi.Input[str]]:
@@ -5386,6 +5958,10 @@ if not MYPY:
5386
5958
  data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
5387
5959
  """
5388
5960
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5961
+ """
5962
+ disable_automated_rotation: NotRequired[pulumi.Input[bool]]
5963
+ """
5964
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
5389
5965
 
5390
5966
  Supported list of database secrets engines that can be configured:
5391
5967
  """
@@ -5397,6 +5973,22 @@ if not MYPY:
5397
5973
  """
5398
5974
  A list of database statements to be executed to rotate the root user's credentials.
5399
5975
  """
5976
+ rotation_period: NotRequired[pulumi.Input[int]]
5977
+ """
5978
+ The amount of time in seconds Vault should wait before rotating the root credential.
5979
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
5980
+ """
5981
+ rotation_schedule: NotRequired[pulumi.Input[str]]
5982
+ """
5983
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
5984
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
5985
+ """
5986
+ rotation_window: NotRequired[pulumi.Input[int]]
5987
+ """
5988
+ The maximum amount of time in seconds allowed to complete
5989
+ a rotation when a scheduled token rotation occurs. The default rotation window is
5990
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
5991
+ """
5400
5992
  verify_connection: NotRequired[pulumi.Input[bool]]
5401
5993
  """
5402
5994
  Whether the connection should be verified on
@@ -5414,8 +6006,12 @@ class SecretsMountMongodbatlaArgs:
5414
6006
  public_key: pulumi.Input[str],
5415
6007
  allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
5416
6008
  data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
6009
+ disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
5417
6010
  plugin_name: Optional[pulumi.Input[str]] = None,
5418
6011
  root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
6012
+ rotation_period: Optional[pulumi.Input[int]] = None,
6013
+ rotation_schedule: Optional[pulumi.Input[str]] = None,
6014
+ rotation_window: Optional[pulumi.Input[int]] = None,
5419
6015
  verify_connection: Optional[pulumi.Input[bool]] = None):
5420
6016
  """
5421
6017
  :param pulumi.Input[str] name: Name of the database connection.
@@ -5425,10 +6021,18 @@ class SecretsMountMongodbatlaArgs:
5425
6021
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
5426
6022
  connection.
5427
6023
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6024
+ :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
5428
6025
 
5429
6026
  Supported list of database secrets engines that can be configured:
5430
6027
  :param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
5431
6028
  :param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
6029
+ :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
6030
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
6031
+ :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
6032
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
6033
+ :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
6034
+ a rotation when a scheduled token rotation occurs. The default rotation window is
6035
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
5432
6036
  :param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
5433
6037
  initial configuration or not.
5434
6038
  """
@@ -5440,10 +6044,18 @@ class SecretsMountMongodbatlaArgs:
5440
6044
  pulumi.set(__self__, "allowed_roles", allowed_roles)
5441
6045
  if data is not None:
5442
6046
  pulumi.set(__self__, "data", data)
6047
+ if disable_automated_rotation is not None:
6048
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
5443
6049
  if plugin_name is not None:
5444
6050
  pulumi.set(__self__, "plugin_name", plugin_name)
5445
6051
  if root_rotation_statements is not None:
5446
6052
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
6053
+ if rotation_period is not None:
6054
+ pulumi.set(__self__, "rotation_period", rotation_period)
6055
+ if rotation_schedule is not None:
6056
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
6057
+ if rotation_window is not None:
6058
+ pulumi.set(__self__, "rotation_window", rotation_window)
5447
6059
  if verify_connection is not None:
5448
6060
  pulumi.set(__self__, "verify_connection", verify_connection)
5449
6061
 
@@ -5513,8 +6125,6 @@ class SecretsMountMongodbatlaArgs:
5513
6125
  def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
5514
6126
  """
5515
6127
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5516
-
5517
- Supported list of database secrets engines that can be configured:
5518
6128
  """
5519
6129
  return pulumi.get(self, "data")
5520
6130
 
@@ -5522,6 +6132,20 @@ class SecretsMountMongodbatlaArgs:
5522
6132
  def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
5523
6133
  pulumi.set(self, "data", value)
5524
6134
 
6135
+ @property
6136
+ @pulumi.getter(name="disableAutomatedRotation")
6137
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
6138
+ """
6139
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
6140
+
6141
+ Supported list of database secrets engines that can be configured:
6142
+ """
6143
+ return pulumi.get(self, "disable_automated_rotation")
6144
+
6145
+ @disable_automated_rotation.setter
6146
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
6147
+ pulumi.set(self, "disable_automated_rotation", value)
6148
+
5525
6149
  @property
5526
6150
  @pulumi.getter(name="pluginName")
5527
6151
  def plugin_name(self) -> Optional[pulumi.Input[str]]:
@@ -5546,6 +6170,46 @@ class SecretsMountMongodbatlaArgs:
5546
6170
  def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
5547
6171
  pulumi.set(self, "root_rotation_statements", value)
5548
6172
 
6173
+ @property
6174
+ @pulumi.getter(name="rotationPeriod")
6175
+ def rotation_period(self) -> Optional[pulumi.Input[int]]:
6176
+ """
6177
+ The amount of time in seconds Vault should wait before rotating the root credential.
6178
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
6179
+ """
6180
+ return pulumi.get(self, "rotation_period")
6181
+
6182
+ @rotation_period.setter
6183
+ def rotation_period(self, value: Optional[pulumi.Input[int]]):
6184
+ pulumi.set(self, "rotation_period", value)
6185
+
6186
+ @property
6187
+ @pulumi.getter(name="rotationSchedule")
6188
+ def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
6189
+ """
6190
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
6191
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
6192
+ """
6193
+ return pulumi.get(self, "rotation_schedule")
6194
+
6195
+ @rotation_schedule.setter
6196
+ def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
6197
+ pulumi.set(self, "rotation_schedule", value)
6198
+
6199
+ @property
6200
+ @pulumi.getter(name="rotationWindow")
6201
+ def rotation_window(self) -> Optional[pulumi.Input[int]]:
6202
+ """
6203
+ The maximum amount of time in seconds allowed to complete
6204
+ a rotation when a scheduled token rotation occurs. The default rotation window is
6205
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
6206
+ """
6207
+ return pulumi.get(self, "rotation_window")
6208
+
6209
+ @rotation_window.setter
6210
+ def rotation_window(self, value: Optional[pulumi.Input[int]]):
6211
+ pulumi.set(self, "rotation_window", value)
6212
+
5549
6213
  @property
5550
6214
  @pulumi.getter(name="verifyConnection")
5551
6215
  def verify_connection(self) -> Optional[pulumi.Input[bool]]:
@@ -5582,6 +6246,10 @@ if not MYPY:
5582
6246
  data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
5583
6247
  """
5584
6248
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6249
+ """
6250
+ disable_automated_rotation: NotRequired[pulumi.Input[bool]]
6251
+ """
6252
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
5585
6253
 
5586
6254
  Supported list of database secrets engines that can be configured:
5587
6255
  """
@@ -5613,6 +6281,22 @@ if not MYPY:
5613
6281
  """
5614
6282
  A list of database statements to be executed to rotate the root user's credentials.
5615
6283
  """
6284
+ rotation_period: NotRequired[pulumi.Input[int]]
6285
+ """
6286
+ The amount of time in seconds Vault should wait before rotating the root credential.
6287
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
6288
+ """
6289
+ rotation_schedule: NotRequired[pulumi.Input[str]]
6290
+ """
6291
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
6292
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
6293
+ """
6294
+ rotation_window: NotRequired[pulumi.Input[int]]
6295
+ """
6296
+ The maximum amount of time in seconds allowed to complete
6297
+ a rotation when a scheduled token rotation occurs. The default rotation window is
6298
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
6299
+ """
5616
6300
  username: NotRequired[pulumi.Input[str]]
5617
6301
  """
5618
6302
  The root credential username used in the connection URL
@@ -5637,6 +6321,7 @@ class SecretsMountMssqlArgs:
5637
6321
  connection_url: Optional[pulumi.Input[str]] = None,
5638
6322
  contained_db: Optional[pulumi.Input[bool]] = None,
5639
6323
  data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
6324
+ disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
5640
6325
  disable_escaping: Optional[pulumi.Input[bool]] = None,
5641
6326
  max_connection_lifetime: Optional[pulumi.Input[int]] = None,
5642
6327
  max_idle_connections: Optional[pulumi.Input[int]] = None,
@@ -5644,6 +6329,9 @@ class SecretsMountMssqlArgs:
5644
6329
  password: Optional[pulumi.Input[str]] = None,
5645
6330
  plugin_name: Optional[pulumi.Input[str]] = None,
5646
6331
  root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
6332
+ rotation_period: Optional[pulumi.Input[int]] = None,
6333
+ rotation_schedule: Optional[pulumi.Input[str]] = None,
6334
+ rotation_window: Optional[pulumi.Input[int]] = None,
5647
6335
  username: Optional[pulumi.Input[str]] = None,
5648
6336
  username_template: Optional[pulumi.Input[str]] = None,
5649
6337
  verify_connection: Optional[pulumi.Input[bool]] = None):
@@ -5654,6 +6342,7 @@ class SecretsMountMssqlArgs:
5654
6342
  :param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
5655
6343
  :param pulumi.Input[bool] contained_db: Set to true when the target is a Contained Database, e.g. AzureSQL.
5656
6344
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6345
+ :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
5657
6346
 
5658
6347
  Supported list of database secrets engines that can be configured:
5659
6348
  :param pulumi.Input[bool] disable_escaping: Disable special character escaping in username and password
@@ -5663,6 +6352,13 @@ class SecretsMountMssqlArgs:
5663
6352
  :param pulumi.Input[str] password: The root credential password used in the connection URL
5664
6353
  :param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
5665
6354
  :param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
6355
+ :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
6356
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
6357
+ :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
6358
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
6359
+ :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
6360
+ a rotation when a scheduled token rotation occurs. The default rotation window is
6361
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
5666
6362
  :param pulumi.Input[str] username: The root credential username used in the connection URL
5667
6363
  :param pulumi.Input[str] username_template: Username generation template.
5668
6364
  :param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
@@ -5677,6 +6373,8 @@ class SecretsMountMssqlArgs:
5677
6373
  pulumi.set(__self__, "contained_db", contained_db)
5678
6374
  if data is not None:
5679
6375
  pulumi.set(__self__, "data", data)
6376
+ if disable_automated_rotation is not None:
6377
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
5680
6378
  if disable_escaping is not None:
5681
6379
  pulumi.set(__self__, "disable_escaping", disable_escaping)
5682
6380
  if max_connection_lifetime is not None:
@@ -5691,6 +6389,12 @@ class SecretsMountMssqlArgs:
5691
6389
  pulumi.set(__self__, "plugin_name", plugin_name)
5692
6390
  if root_rotation_statements is not None:
5693
6391
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
6392
+ if rotation_period is not None:
6393
+ pulumi.set(__self__, "rotation_period", rotation_period)
6394
+ if rotation_schedule is not None:
6395
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
6396
+ if rotation_window is not None:
6397
+ pulumi.set(__self__, "rotation_window", rotation_window)
5694
6398
  if username is not None:
5695
6399
  pulumi.set(__self__, "username", username)
5696
6400
  if username_template is not None:
@@ -5752,8 +6456,6 @@ class SecretsMountMssqlArgs:
5752
6456
  def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
5753
6457
  """
5754
6458
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5755
-
5756
- Supported list of database secrets engines that can be configured:
5757
6459
  """
5758
6460
  return pulumi.get(self, "data")
5759
6461
 
@@ -5761,6 +6463,20 @@ class SecretsMountMssqlArgs:
5761
6463
  def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
5762
6464
  pulumi.set(self, "data", value)
5763
6465
 
6466
+ @property
6467
+ @pulumi.getter(name="disableAutomatedRotation")
6468
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
6469
+ """
6470
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
6471
+
6472
+ Supported list of database secrets engines that can be configured:
6473
+ """
6474
+ return pulumi.get(self, "disable_automated_rotation")
6475
+
6476
+ @disable_automated_rotation.setter
6477
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
6478
+ pulumi.set(self, "disable_automated_rotation", value)
6479
+
5764
6480
  @property
5765
6481
  @pulumi.getter(name="disableEscaping")
5766
6482
  def disable_escaping(self) -> Optional[pulumi.Input[bool]]:
@@ -5846,19 +6562,59 @@ class SecretsMountMssqlArgs:
5846
6562
  pulumi.set(self, "root_rotation_statements", value)
5847
6563
 
5848
6564
  @property
5849
- @pulumi.getter
5850
- def username(self) -> Optional[pulumi.Input[str]]:
6565
+ @pulumi.getter(name="rotationPeriod")
6566
+ def rotation_period(self) -> Optional[pulumi.Input[int]]:
5851
6567
  """
5852
- The root credential username used in the connection URL
6568
+ The amount of time in seconds Vault should wait before rotating the root credential.
6569
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
5853
6570
  """
5854
- return pulumi.get(self, "username")
6571
+ return pulumi.get(self, "rotation_period")
5855
6572
 
5856
- @username.setter
5857
- def username(self, value: Optional[pulumi.Input[str]]):
5858
- pulumi.set(self, "username", value)
6573
+ @rotation_period.setter
6574
+ def rotation_period(self, value: Optional[pulumi.Input[int]]):
6575
+ pulumi.set(self, "rotation_period", value)
5859
6576
 
5860
6577
  @property
5861
- @pulumi.getter(name="usernameTemplate")
6578
+ @pulumi.getter(name="rotationSchedule")
6579
+ def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
6580
+ """
6581
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
6582
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
6583
+ """
6584
+ return pulumi.get(self, "rotation_schedule")
6585
+
6586
+ @rotation_schedule.setter
6587
+ def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
6588
+ pulumi.set(self, "rotation_schedule", value)
6589
+
6590
+ @property
6591
+ @pulumi.getter(name="rotationWindow")
6592
+ def rotation_window(self) -> Optional[pulumi.Input[int]]:
6593
+ """
6594
+ The maximum amount of time in seconds allowed to complete
6595
+ a rotation when a scheduled token rotation occurs. The default rotation window is
6596
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
6597
+ """
6598
+ return pulumi.get(self, "rotation_window")
6599
+
6600
+ @rotation_window.setter
6601
+ def rotation_window(self, value: Optional[pulumi.Input[int]]):
6602
+ pulumi.set(self, "rotation_window", value)
6603
+
6604
+ @property
6605
+ @pulumi.getter
6606
+ def username(self) -> Optional[pulumi.Input[str]]:
6607
+ """
6608
+ The root credential username used in the connection URL
6609
+ """
6610
+ return pulumi.get(self, "username")
6611
+
6612
+ @username.setter
6613
+ def username(self, value: Optional[pulumi.Input[str]]):
6614
+ pulumi.set(self, "username", value)
6615
+
6616
+ @property
6617
+ @pulumi.getter(name="usernameTemplate")
5862
6618
  def username_template(self) -> Optional[pulumi.Input[str]]:
5863
6619
  """
5864
6620
  Username generation template.
@@ -5905,6 +6661,10 @@ if not MYPY:
5905
6661
  data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
5906
6662
  """
5907
6663
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6664
+ """
6665
+ disable_automated_rotation: NotRequired[pulumi.Input[bool]]
6666
+ """
6667
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
5908
6668
 
5909
6669
  Supported list of database secrets engines that can be configured:
5910
6670
  """
@@ -5932,6 +6692,22 @@ if not MYPY:
5932
6692
  """
5933
6693
  A list of database statements to be executed to rotate the root user's credentials.
5934
6694
  """
6695
+ rotation_period: NotRequired[pulumi.Input[int]]
6696
+ """
6697
+ The amount of time in seconds Vault should wait before rotating the root credential.
6698
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
6699
+ """
6700
+ rotation_schedule: NotRequired[pulumi.Input[str]]
6701
+ """
6702
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
6703
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
6704
+ """
6705
+ rotation_window: NotRequired[pulumi.Input[int]]
6706
+ """
6707
+ The maximum amount of time in seconds allowed to complete
6708
+ a rotation when a scheduled token rotation occurs. The default rotation window is
6709
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
6710
+ """
5935
6711
  service_account_json: NotRequired[pulumi.Input[str]]
5936
6712
  """
5937
6713
  A JSON encoded credential for use with IAM authorization
@@ -5968,12 +6744,16 @@ class SecretsMountMysqlArgs:
5968
6744
  auth_type: Optional[pulumi.Input[str]] = None,
5969
6745
  connection_url: Optional[pulumi.Input[str]] = None,
5970
6746
  data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
6747
+ disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
5971
6748
  max_connection_lifetime: Optional[pulumi.Input[int]] = None,
5972
6749
  max_idle_connections: Optional[pulumi.Input[int]] = None,
5973
6750
  max_open_connections: Optional[pulumi.Input[int]] = None,
5974
6751
  password: Optional[pulumi.Input[str]] = None,
5975
6752
  plugin_name: Optional[pulumi.Input[str]] = None,
5976
6753
  root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
6754
+ rotation_period: Optional[pulumi.Input[int]] = None,
6755
+ rotation_schedule: Optional[pulumi.Input[str]] = None,
6756
+ rotation_window: Optional[pulumi.Input[int]] = None,
5977
6757
  service_account_json: Optional[pulumi.Input[str]] = None,
5978
6758
  tls_ca: Optional[pulumi.Input[str]] = None,
5979
6759
  tls_certificate_key: Optional[pulumi.Input[str]] = None,
@@ -5987,6 +6767,7 @@ class SecretsMountMysqlArgs:
5987
6767
  :param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
5988
6768
  :param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
5989
6769
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6770
+ :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
5990
6771
 
5991
6772
  Supported list of database secrets engines that can be configured:
5992
6773
  :param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
@@ -5995,6 +6776,13 @@ class SecretsMountMysqlArgs:
5995
6776
  :param pulumi.Input[str] password: The root credential password used in the connection URL
5996
6777
  :param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
5997
6778
  :param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
6779
+ :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
6780
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
6781
+ :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
6782
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
6783
+ :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
6784
+ a rotation when a scheduled token rotation occurs. The default rotation window is
6785
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
5998
6786
  :param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
5999
6787
  :param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
6000
6788
  :param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
@@ -6012,6 +6800,8 @@ class SecretsMountMysqlArgs:
6012
6800
  pulumi.set(__self__, "connection_url", connection_url)
6013
6801
  if data is not None:
6014
6802
  pulumi.set(__self__, "data", data)
6803
+ if disable_automated_rotation is not None:
6804
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
6015
6805
  if max_connection_lifetime is not None:
6016
6806
  pulumi.set(__self__, "max_connection_lifetime", max_connection_lifetime)
6017
6807
  if max_idle_connections is not None:
@@ -6024,6 +6814,12 @@ class SecretsMountMysqlArgs:
6024
6814
  pulumi.set(__self__, "plugin_name", plugin_name)
6025
6815
  if root_rotation_statements is not None:
6026
6816
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
6817
+ if rotation_period is not None:
6818
+ pulumi.set(__self__, "rotation_period", rotation_period)
6819
+ if rotation_schedule is not None:
6820
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
6821
+ if rotation_window is not None:
6822
+ pulumi.set(__self__, "rotation_window", rotation_window)
6027
6823
  if service_account_json is not None:
6028
6824
  pulumi.set(__self__, "service_account_json", service_account_json)
6029
6825
  if tls_ca is not None:
@@ -6091,8 +6887,6 @@ class SecretsMountMysqlArgs:
6091
6887
  def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
6092
6888
  """
6093
6889
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6094
-
6095
- Supported list of database secrets engines that can be configured:
6096
6890
  """
6097
6891
  return pulumi.get(self, "data")
6098
6892
 
@@ -6100,6 +6894,20 @@ class SecretsMountMysqlArgs:
6100
6894
  def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
6101
6895
  pulumi.set(self, "data", value)
6102
6896
 
6897
+ @property
6898
+ @pulumi.getter(name="disableAutomatedRotation")
6899
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
6900
+ """
6901
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
6902
+
6903
+ Supported list of database secrets engines that can be configured:
6904
+ """
6905
+ return pulumi.get(self, "disable_automated_rotation")
6906
+
6907
+ @disable_automated_rotation.setter
6908
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
6909
+ pulumi.set(self, "disable_automated_rotation", value)
6910
+
6103
6911
  @property
6104
6912
  @pulumi.getter(name="maxConnectionLifetime")
6105
6913
  def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
@@ -6172,6 +6980,46 @@ class SecretsMountMysqlArgs:
6172
6980
  def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
6173
6981
  pulumi.set(self, "root_rotation_statements", value)
6174
6982
 
6983
+ @property
6984
+ @pulumi.getter(name="rotationPeriod")
6985
+ def rotation_period(self) -> Optional[pulumi.Input[int]]:
6986
+ """
6987
+ The amount of time in seconds Vault should wait before rotating the root credential.
6988
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
6989
+ """
6990
+ return pulumi.get(self, "rotation_period")
6991
+
6992
+ @rotation_period.setter
6993
+ def rotation_period(self, value: Optional[pulumi.Input[int]]):
6994
+ pulumi.set(self, "rotation_period", value)
6995
+
6996
+ @property
6997
+ @pulumi.getter(name="rotationSchedule")
6998
+ def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
6999
+ """
7000
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
7001
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
7002
+ """
7003
+ return pulumi.get(self, "rotation_schedule")
7004
+
7005
+ @rotation_schedule.setter
7006
+ def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
7007
+ pulumi.set(self, "rotation_schedule", value)
7008
+
7009
+ @property
7010
+ @pulumi.getter(name="rotationWindow")
7011
+ def rotation_window(self) -> Optional[pulumi.Input[int]]:
7012
+ """
7013
+ The maximum amount of time in seconds allowed to complete
7014
+ a rotation when a scheduled token rotation occurs. The default rotation window is
7015
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
7016
+ """
7017
+ return pulumi.get(self, "rotation_window")
7018
+
7019
+ @rotation_window.setter
7020
+ def rotation_window(self, value: Optional[pulumi.Input[int]]):
7021
+ pulumi.set(self, "rotation_window", value)
7022
+
6175
7023
  @property
6176
7024
  @pulumi.getter(name="serviceAccountJson")
6177
7025
  def service_account_json(self) -> Optional[pulumi.Input[str]]:
@@ -6268,6 +7116,10 @@ if not MYPY:
6268
7116
  data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
6269
7117
  """
6270
7118
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
7119
+ """
7120
+ disable_automated_rotation: NotRequired[pulumi.Input[bool]]
7121
+ """
7122
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
6271
7123
 
6272
7124
  Supported list of database secrets engines that can be configured:
6273
7125
  """
@@ -6295,6 +7147,22 @@ if not MYPY:
6295
7147
  """
6296
7148
  A list of database statements to be executed to rotate the root user's credentials.
6297
7149
  """
7150
+ rotation_period: NotRequired[pulumi.Input[int]]
7151
+ """
7152
+ The amount of time in seconds Vault should wait before rotating the root credential.
7153
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
7154
+ """
7155
+ rotation_schedule: NotRequired[pulumi.Input[str]]
7156
+ """
7157
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
7158
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
7159
+ """
7160
+ rotation_window: NotRequired[pulumi.Input[int]]
7161
+ """
7162
+ The maximum amount of time in seconds allowed to complete
7163
+ a rotation when a scheduled token rotation occurs. The default rotation window is
7164
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
7165
+ """
6298
7166
  service_account_json: NotRequired[pulumi.Input[str]]
6299
7167
  """
6300
7168
  A JSON encoded credential for use with IAM authorization
@@ -6331,12 +7199,16 @@ class SecretsMountMysqlAuroraArgs:
6331
7199
  auth_type: Optional[pulumi.Input[str]] = None,
6332
7200
  connection_url: Optional[pulumi.Input[str]] = None,
6333
7201
  data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
7202
+ disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
6334
7203
  max_connection_lifetime: Optional[pulumi.Input[int]] = None,
6335
7204
  max_idle_connections: Optional[pulumi.Input[int]] = None,
6336
7205
  max_open_connections: Optional[pulumi.Input[int]] = None,
6337
7206
  password: Optional[pulumi.Input[str]] = None,
6338
7207
  plugin_name: Optional[pulumi.Input[str]] = None,
6339
7208
  root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
7209
+ rotation_period: Optional[pulumi.Input[int]] = None,
7210
+ rotation_schedule: Optional[pulumi.Input[str]] = None,
7211
+ rotation_window: Optional[pulumi.Input[int]] = None,
6340
7212
  service_account_json: Optional[pulumi.Input[str]] = None,
6341
7213
  tls_ca: Optional[pulumi.Input[str]] = None,
6342
7214
  tls_certificate_key: Optional[pulumi.Input[str]] = None,
@@ -6350,6 +7222,7 @@ class SecretsMountMysqlAuroraArgs:
6350
7222
  :param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
6351
7223
  :param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
6352
7224
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
7225
+ :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
6353
7226
 
6354
7227
  Supported list of database secrets engines that can be configured:
6355
7228
  :param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
@@ -6358,6 +7231,13 @@ class SecretsMountMysqlAuroraArgs:
6358
7231
  :param pulumi.Input[str] password: The root credential password used in the connection URL
6359
7232
  :param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
6360
7233
  :param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
7234
+ :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
7235
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
7236
+ :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
7237
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
7238
+ :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
7239
+ a rotation when a scheduled token rotation occurs. The default rotation window is
7240
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
6361
7241
  :param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
6362
7242
  :param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
6363
7243
  :param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
@@ -6375,6 +7255,8 @@ class SecretsMountMysqlAuroraArgs:
6375
7255
  pulumi.set(__self__, "connection_url", connection_url)
6376
7256
  if data is not None:
6377
7257
  pulumi.set(__self__, "data", data)
7258
+ if disable_automated_rotation is not None:
7259
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
6378
7260
  if max_connection_lifetime is not None:
6379
7261
  pulumi.set(__self__, "max_connection_lifetime", max_connection_lifetime)
6380
7262
  if max_idle_connections is not None:
@@ -6387,6 +7269,12 @@ class SecretsMountMysqlAuroraArgs:
6387
7269
  pulumi.set(__self__, "plugin_name", plugin_name)
6388
7270
  if root_rotation_statements is not None:
6389
7271
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
7272
+ if rotation_period is not None:
7273
+ pulumi.set(__self__, "rotation_period", rotation_period)
7274
+ if rotation_schedule is not None:
7275
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
7276
+ if rotation_window is not None:
7277
+ pulumi.set(__self__, "rotation_window", rotation_window)
6390
7278
  if service_account_json is not None:
6391
7279
  pulumi.set(__self__, "service_account_json", service_account_json)
6392
7280
  if tls_ca is not None:
@@ -6454,8 +7342,6 @@ class SecretsMountMysqlAuroraArgs:
6454
7342
  def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
6455
7343
  """
6456
7344
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6457
-
6458
- Supported list of database secrets engines that can be configured:
6459
7345
  """
6460
7346
  return pulumi.get(self, "data")
6461
7347
 
@@ -6463,6 +7349,20 @@ class SecretsMountMysqlAuroraArgs:
6463
7349
  def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
6464
7350
  pulumi.set(self, "data", value)
6465
7351
 
7352
+ @property
7353
+ @pulumi.getter(name="disableAutomatedRotation")
7354
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
7355
+ """
7356
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
7357
+
7358
+ Supported list of database secrets engines that can be configured:
7359
+ """
7360
+ return pulumi.get(self, "disable_automated_rotation")
7361
+
7362
+ @disable_automated_rotation.setter
7363
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
7364
+ pulumi.set(self, "disable_automated_rotation", value)
7365
+
6466
7366
  @property
6467
7367
  @pulumi.getter(name="maxConnectionLifetime")
6468
7368
  def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
@@ -6535,6 +7435,46 @@ class SecretsMountMysqlAuroraArgs:
6535
7435
  def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
6536
7436
  pulumi.set(self, "root_rotation_statements", value)
6537
7437
 
7438
+ @property
7439
+ @pulumi.getter(name="rotationPeriod")
7440
+ def rotation_period(self) -> Optional[pulumi.Input[int]]:
7441
+ """
7442
+ The amount of time in seconds Vault should wait before rotating the root credential.
7443
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
7444
+ """
7445
+ return pulumi.get(self, "rotation_period")
7446
+
7447
+ @rotation_period.setter
7448
+ def rotation_period(self, value: Optional[pulumi.Input[int]]):
7449
+ pulumi.set(self, "rotation_period", value)
7450
+
7451
+ @property
7452
+ @pulumi.getter(name="rotationSchedule")
7453
+ def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
7454
+ """
7455
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
7456
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
7457
+ """
7458
+ return pulumi.get(self, "rotation_schedule")
7459
+
7460
+ @rotation_schedule.setter
7461
+ def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
7462
+ pulumi.set(self, "rotation_schedule", value)
7463
+
7464
+ @property
7465
+ @pulumi.getter(name="rotationWindow")
7466
+ def rotation_window(self) -> Optional[pulumi.Input[int]]:
7467
+ """
7468
+ The maximum amount of time in seconds allowed to complete
7469
+ a rotation when a scheduled token rotation occurs. The default rotation window is
7470
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
7471
+ """
7472
+ return pulumi.get(self, "rotation_window")
7473
+
7474
+ @rotation_window.setter
7475
+ def rotation_window(self, value: Optional[pulumi.Input[int]]):
7476
+ pulumi.set(self, "rotation_window", value)
7477
+
6538
7478
  @property
6539
7479
  @pulumi.getter(name="serviceAccountJson")
6540
7480
  def service_account_json(self) -> Optional[pulumi.Input[str]]:
@@ -6631,6 +7571,10 @@ if not MYPY:
6631
7571
  data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
6632
7572
  """
6633
7573
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
7574
+ """
7575
+ disable_automated_rotation: NotRequired[pulumi.Input[bool]]
7576
+ """
7577
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
6634
7578
 
6635
7579
  Supported list of database secrets engines that can be configured:
6636
7580
  """
@@ -6658,6 +7602,22 @@ if not MYPY:
6658
7602
  """
6659
7603
  A list of database statements to be executed to rotate the root user's credentials.
6660
7604
  """
7605
+ rotation_period: NotRequired[pulumi.Input[int]]
7606
+ """
7607
+ The amount of time in seconds Vault should wait before rotating the root credential.
7608
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
7609
+ """
7610
+ rotation_schedule: NotRequired[pulumi.Input[str]]
7611
+ """
7612
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
7613
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
7614
+ """
7615
+ rotation_window: NotRequired[pulumi.Input[int]]
7616
+ """
7617
+ The maximum amount of time in seconds allowed to complete
7618
+ a rotation when a scheduled token rotation occurs. The default rotation window is
7619
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
7620
+ """
6661
7621
  service_account_json: NotRequired[pulumi.Input[str]]
6662
7622
  """
6663
7623
  A JSON encoded credential for use with IAM authorization
@@ -6694,12 +7654,16 @@ class SecretsMountMysqlLegacyArgs:
6694
7654
  auth_type: Optional[pulumi.Input[str]] = None,
6695
7655
  connection_url: Optional[pulumi.Input[str]] = None,
6696
7656
  data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
7657
+ disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
6697
7658
  max_connection_lifetime: Optional[pulumi.Input[int]] = None,
6698
7659
  max_idle_connections: Optional[pulumi.Input[int]] = None,
6699
7660
  max_open_connections: Optional[pulumi.Input[int]] = None,
6700
7661
  password: Optional[pulumi.Input[str]] = None,
6701
7662
  plugin_name: Optional[pulumi.Input[str]] = None,
6702
7663
  root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
7664
+ rotation_period: Optional[pulumi.Input[int]] = None,
7665
+ rotation_schedule: Optional[pulumi.Input[str]] = None,
7666
+ rotation_window: Optional[pulumi.Input[int]] = None,
6703
7667
  service_account_json: Optional[pulumi.Input[str]] = None,
6704
7668
  tls_ca: Optional[pulumi.Input[str]] = None,
6705
7669
  tls_certificate_key: Optional[pulumi.Input[str]] = None,
@@ -6713,6 +7677,7 @@ class SecretsMountMysqlLegacyArgs:
6713
7677
  :param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
6714
7678
  :param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
6715
7679
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
7680
+ :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
6716
7681
 
6717
7682
  Supported list of database secrets engines that can be configured:
6718
7683
  :param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
@@ -6721,6 +7686,13 @@ class SecretsMountMysqlLegacyArgs:
6721
7686
  :param pulumi.Input[str] password: The root credential password used in the connection URL
6722
7687
  :param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
6723
7688
  :param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
7689
+ :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
7690
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
7691
+ :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
7692
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
7693
+ :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
7694
+ a rotation when a scheduled token rotation occurs. The default rotation window is
7695
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
6724
7696
  :param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
6725
7697
  :param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
6726
7698
  :param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
@@ -6738,6 +7710,8 @@ class SecretsMountMysqlLegacyArgs:
6738
7710
  pulumi.set(__self__, "connection_url", connection_url)
6739
7711
  if data is not None:
6740
7712
  pulumi.set(__self__, "data", data)
7713
+ if disable_automated_rotation is not None:
7714
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
6741
7715
  if max_connection_lifetime is not None:
6742
7716
  pulumi.set(__self__, "max_connection_lifetime", max_connection_lifetime)
6743
7717
  if max_idle_connections is not None:
@@ -6750,6 +7724,12 @@ class SecretsMountMysqlLegacyArgs:
6750
7724
  pulumi.set(__self__, "plugin_name", plugin_name)
6751
7725
  if root_rotation_statements is not None:
6752
7726
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
7727
+ if rotation_period is not None:
7728
+ pulumi.set(__self__, "rotation_period", rotation_period)
7729
+ if rotation_schedule is not None:
7730
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
7731
+ if rotation_window is not None:
7732
+ pulumi.set(__self__, "rotation_window", rotation_window)
6753
7733
  if service_account_json is not None:
6754
7734
  pulumi.set(__self__, "service_account_json", service_account_json)
6755
7735
  if tls_ca is not None:
@@ -6817,8 +7797,6 @@ class SecretsMountMysqlLegacyArgs:
6817
7797
  def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
6818
7798
  """
6819
7799
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6820
-
6821
- Supported list of database secrets engines that can be configured:
6822
7800
  """
6823
7801
  return pulumi.get(self, "data")
6824
7802
 
@@ -6826,6 +7804,20 @@ class SecretsMountMysqlLegacyArgs:
6826
7804
  def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
6827
7805
  pulumi.set(self, "data", value)
6828
7806
 
7807
+ @property
7808
+ @pulumi.getter(name="disableAutomatedRotation")
7809
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
7810
+ """
7811
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
7812
+
7813
+ Supported list of database secrets engines that can be configured:
7814
+ """
7815
+ return pulumi.get(self, "disable_automated_rotation")
7816
+
7817
+ @disable_automated_rotation.setter
7818
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
7819
+ pulumi.set(self, "disable_automated_rotation", value)
7820
+
6829
7821
  @property
6830
7822
  @pulumi.getter(name="maxConnectionLifetime")
6831
7823
  def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
@@ -6898,6 +7890,46 @@ class SecretsMountMysqlLegacyArgs:
6898
7890
  def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
6899
7891
  pulumi.set(self, "root_rotation_statements", value)
6900
7892
 
7893
+ @property
7894
+ @pulumi.getter(name="rotationPeriod")
7895
+ def rotation_period(self) -> Optional[pulumi.Input[int]]:
7896
+ """
7897
+ The amount of time in seconds Vault should wait before rotating the root credential.
7898
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
7899
+ """
7900
+ return pulumi.get(self, "rotation_period")
7901
+
7902
+ @rotation_period.setter
7903
+ def rotation_period(self, value: Optional[pulumi.Input[int]]):
7904
+ pulumi.set(self, "rotation_period", value)
7905
+
7906
+ @property
7907
+ @pulumi.getter(name="rotationSchedule")
7908
+ def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
7909
+ """
7910
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
7911
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
7912
+ """
7913
+ return pulumi.get(self, "rotation_schedule")
7914
+
7915
+ @rotation_schedule.setter
7916
+ def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
7917
+ pulumi.set(self, "rotation_schedule", value)
7918
+
7919
+ @property
7920
+ @pulumi.getter(name="rotationWindow")
7921
+ def rotation_window(self) -> Optional[pulumi.Input[int]]:
7922
+ """
7923
+ The maximum amount of time in seconds allowed to complete
7924
+ a rotation when a scheduled token rotation occurs. The default rotation window is
7925
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
7926
+ """
7927
+ return pulumi.get(self, "rotation_window")
7928
+
7929
+ @rotation_window.setter
7930
+ def rotation_window(self, value: Optional[pulumi.Input[int]]):
7931
+ pulumi.set(self, "rotation_window", value)
7932
+
6901
7933
  @property
6902
7934
  @pulumi.getter(name="serviceAccountJson")
6903
7935
  def service_account_json(self) -> Optional[pulumi.Input[str]]:
@@ -6994,6 +8026,10 @@ if not MYPY:
6994
8026
  data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
6995
8027
  """
6996
8028
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
8029
+ """
8030
+ disable_automated_rotation: NotRequired[pulumi.Input[bool]]
8031
+ """
8032
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
6997
8033
 
6998
8034
  Supported list of database secrets engines that can be configured:
6999
8035
  """
@@ -7021,6 +8057,22 @@ if not MYPY:
7021
8057
  """
7022
8058
  A list of database statements to be executed to rotate the root user's credentials.
7023
8059
  """
8060
+ rotation_period: NotRequired[pulumi.Input[int]]
8061
+ """
8062
+ The amount of time in seconds Vault should wait before rotating the root credential.
8063
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
8064
+ """
8065
+ rotation_schedule: NotRequired[pulumi.Input[str]]
8066
+ """
8067
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
8068
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
8069
+ """
8070
+ rotation_window: NotRequired[pulumi.Input[int]]
8071
+ """
8072
+ The maximum amount of time in seconds allowed to complete
8073
+ a rotation when a scheduled token rotation occurs. The default rotation window is
8074
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
8075
+ """
7024
8076
  service_account_json: NotRequired[pulumi.Input[str]]
7025
8077
  """
7026
8078
  A JSON encoded credential for use with IAM authorization
@@ -7057,12 +8109,16 @@ class SecretsMountMysqlRdArgs:
7057
8109
  auth_type: Optional[pulumi.Input[str]] = None,
7058
8110
  connection_url: Optional[pulumi.Input[str]] = None,
7059
8111
  data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
8112
+ disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
7060
8113
  max_connection_lifetime: Optional[pulumi.Input[int]] = None,
7061
8114
  max_idle_connections: Optional[pulumi.Input[int]] = None,
7062
8115
  max_open_connections: Optional[pulumi.Input[int]] = None,
7063
8116
  password: Optional[pulumi.Input[str]] = None,
7064
8117
  plugin_name: Optional[pulumi.Input[str]] = None,
7065
8118
  root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
8119
+ rotation_period: Optional[pulumi.Input[int]] = None,
8120
+ rotation_schedule: Optional[pulumi.Input[str]] = None,
8121
+ rotation_window: Optional[pulumi.Input[int]] = None,
7066
8122
  service_account_json: Optional[pulumi.Input[str]] = None,
7067
8123
  tls_ca: Optional[pulumi.Input[str]] = None,
7068
8124
  tls_certificate_key: Optional[pulumi.Input[str]] = None,
@@ -7076,6 +8132,7 @@ class SecretsMountMysqlRdArgs:
7076
8132
  :param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
7077
8133
  :param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
7078
8134
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
8135
+ :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
7079
8136
 
7080
8137
  Supported list of database secrets engines that can be configured:
7081
8138
  :param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
@@ -7084,6 +8141,13 @@ class SecretsMountMysqlRdArgs:
7084
8141
  :param pulumi.Input[str] password: The root credential password used in the connection URL
7085
8142
  :param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
7086
8143
  :param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
8144
+ :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
8145
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
8146
+ :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
8147
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
8148
+ :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
8149
+ a rotation when a scheduled token rotation occurs. The default rotation window is
8150
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
7087
8151
  :param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
7088
8152
  :param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
7089
8153
  :param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
@@ -7101,6 +8165,8 @@ class SecretsMountMysqlRdArgs:
7101
8165
  pulumi.set(__self__, "connection_url", connection_url)
7102
8166
  if data is not None:
7103
8167
  pulumi.set(__self__, "data", data)
8168
+ if disable_automated_rotation is not None:
8169
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
7104
8170
  if max_connection_lifetime is not None:
7105
8171
  pulumi.set(__self__, "max_connection_lifetime", max_connection_lifetime)
7106
8172
  if max_idle_connections is not None:
@@ -7113,6 +8179,12 @@ class SecretsMountMysqlRdArgs:
7113
8179
  pulumi.set(__self__, "plugin_name", plugin_name)
7114
8180
  if root_rotation_statements is not None:
7115
8181
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
8182
+ if rotation_period is not None:
8183
+ pulumi.set(__self__, "rotation_period", rotation_period)
8184
+ if rotation_schedule is not None:
8185
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
8186
+ if rotation_window is not None:
8187
+ pulumi.set(__self__, "rotation_window", rotation_window)
7116
8188
  if service_account_json is not None:
7117
8189
  pulumi.set(__self__, "service_account_json", service_account_json)
7118
8190
  if tls_ca is not None:
@@ -7180,8 +8252,6 @@ class SecretsMountMysqlRdArgs:
7180
8252
  def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
7181
8253
  """
7182
8254
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
7183
-
7184
- Supported list of database secrets engines that can be configured:
7185
8255
  """
7186
8256
  return pulumi.get(self, "data")
7187
8257
 
@@ -7189,6 +8259,20 @@ class SecretsMountMysqlRdArgs:
7189
8259
  def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
7190
8260
  pulumi.set(self, "data", value)
7191
8261
 
8262
+ @property
8263
+ @pulumi.getter(name="disableAutomatedRotation")
8264
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
8265
+ """
8266
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
8267
+
8268
+ Supported list of database secrets engines that can be configured:
8269
+ """
8270
+ return pulumi.get(self, "disable_automated_rotation")
8271
+
8272
+ @disable_automated_rotation.setter
8273
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
8274
+ pulumi.set(self, "disable_automated_rotation", value)
8275
+
7192
8276
  @property
7193
8277
  @pulumi.getter(name="maxConnectionLifetime")
7194
8278
  def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
@@ -7261,6 +8345,46 @@ class SecretsMountMysqlRdArgs:
7261
8345
  def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
7262
8346
  pulumi.set(self, "root_rotation_statements", value)
7263
8347
 
8348
+ @property
8349
+ @pulumi.getter(name="rotationPeriod")
8350
+ def rotation_period(self) -> Optional[pulumi.Input[int]]:
8351
+ """
8352
+ The amount of time in seconds Vault should wait before rotating the root credential.
8353
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
8354
+ """
8355
+ return pulumi.get(self, "rotation_period")
8356
+
8357
+ @rotation_period.setter
8358
+ def rotation_period(self, value: Optional[pulumi.Input[int]]):
8359
+ pulumi.set(self, "rotation_period", value)
8360
+
8361
+ @property
8362
+ @pulumi.getter(name="rotationSchedule")
8363
+ def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
8364
+ """
8365
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
8366
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
8367
+ """
8368
+ return pulumi.get(self, "rotation_schedule")
8369
+
8370
+ @rotation_schedule.setter
8371
+ def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
8372
+ pulumi.set(self, "rotation_schedule", value)
8373
+
8374
+ @property
8375
+ @pulumi.getter(name="rotationWindow")
8376
+ def rotation_window(self) -> Optional[pulumi.Input[int]]:
8377
+ """
8378
+ The maximum amount of time in seconds allowed to complete
8379
+ a rotation when a scheduled token rotation occurs. The default rotation window is
8380
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
8381
+ """
8382
+ return pulumi.get(self, "rotation_window")
8383
+
8384
+ @rotation_window.setter
8385
+ def rotation_window(self, value: Optional[pulumi.Input[int]]):
8386
+ pulumi.set(self, "rotation_window", value)
8387
+
7264
8388
  @property
7265
8389
  @pulumi.getter(name="serviceAccountJson")
7266
8390
  def service_account_json(self) -> Optional[pulumi.Input[str]]:
@@ -7353,6 +8477,10 @@ if not MYPY:
7353
8477
  data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
7354
8478
  """
7355
8479
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
8480
+ """
8481
+ disable_automated_rotation: NotRequired[pulumi.Input[bool]]
8482
+ """
8483
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
7356
8484
 
7357
8485
  Supported list of database secrets engines that can be configured:
7358
8486
  """
@@ -7384,6 +8512,22 @@ if not MYPY:
7384
8512
  """
7385
8513
  A list of database statements to be executed to rotate the root user's credentials.
7386
8514
  """
8515
+ rotation_period: NotRequired[pulumi.Input[int]]
8516
+ """
8517
+ The amount of time in seconds Vault should wait before rotating the root credential.
8518
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
8519
+ """
8520
+ rotation_schedule: NotRequired[pulumi.Input[str]]
8521
+ """
8522
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
8523
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
8524
+ """
8525
+ rotation_window: NotRequired[pulumi.Input[int]]
8526
+ """
8527
+ The maximum amount of time in seconds allowed to complete
8528
+ a rotation when a scheduled token rotation occurs. The default rotation window is
8529
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
8530
+ """
7387
8531
  split_statements: NotRequired[pulumi.Input[bool]]
7388
8532
  """
7389
8533
  Set to true in order to split statements after semi-colons.
@@ -7411,6 +8555,7 @@ class SecretsMountOracleArgs:
7411
8555
  allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
7412
8556
  connection_url: Optional[pulumi.Input[str]] = None,
7413
8557
  data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
8558
+ disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
7414
8559
  disconnect_sessions: Optional[pulumi.Input[bool]] = None,
7415
8560
  max_connection_lifetime: Optional[pulumi.Input[int]] = None,
7416
8561
  max_idle_connections: Optional[pulumi.Input[int]] = None,
@@ -7418,6 +8563,9 @@ class SecretsMountOracleArgs:
7418
8563
  password: Optional[pulumi.Input[str]] = None,
7419
8564
  plugin_name: Optional[pulumi.Input[str]] = None,
7420
8565
  root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
8566
+ rotation_period: Optional[pulumi.Input[int]] = None,
8567
+ rotation_schedule: Optional[pulumi.Input[str]] = None,
8568
+ rotation_window: Optional[pulumi.Input[int]] = None,
7421
8569
  split_statements: Optional[pulumi.Input[bool]] = None,
7422
8570
  username: Optional[pulumi.Input[str]] = None,
7423
8571
  username_template: Optional[pulumi.Input[str]] = None,
@@ -7428,6 +8576,7 @@ class SecretsMountOracleArgs:
7428
8576
  connection.
7429
8577
  :param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
7430
8578
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
8579
+ :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
7431
8580
 
7432
8581
  Supported list of database secrets engines that can be configured:
7433
8582
  :param pulumi.Input[bool] disconnect_sessions: Set to true to disconnect any open sessions prior to running the revocation statements.
@@ -7437,6 +8586,13 @@ class SecretsMountOracleArgs:
7437
8586
  :param pulumi.Input[str] password: The root credential password used in the connection URL
7438
8587
  :param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
7439
8588
  :param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
8589
+ :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
8590
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
8591
+ :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
8592
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
8593
+ :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
8594
+ a rotation when a scheduled token rotation occurs. The default rotation window is
8595
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
7440
8596
  :param pulumi.Input[bool] split_statements: Set to true in order to split statements after semi-colons.
7441
8597
  :param pulumi.Input[str] username: The root credential username used in the connection URL
7442
8598
  :param pulumi.Input[str] username_template: Username generation template.
@@ -7450,6 +8606,8 @@ class SecretsMountOracleArgs:
7450
8606
  pulumi.set(__self__, "connection_url", connection_url)
7451
8607
  if data is not None:
7452
8608
  pulumi.set(__self__, "data", data)
8609
+ if disable_automated_rotation is not None:
8610
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
7453
8611
  if disconnect_sessions is not None:
7454
8612
  pulumi.set(__self__, "disconnect_sessions", disconnect_sessions)
7455
8613
  if max_connection_lifetime is not None:
@@ -7464,6 +8622,12 @@ class SecretsMountOracleArgs:
7464
8622
  pulumi.set(__self__, "plugin_name", plugin_name)
7465
8623
  if root_rotation_statements is not None:
7466
8624
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
8625
+ if rotation_period is not None:
8626
+ pulumi.set(__self__, "rotation_period", rotation_period)
8627
+ if rotation_schedule is not None:
8628
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
8629
+ if rotation_window is not None:
8630
+ pulumi.set(__self__, "rotation_window", rotation_window)
7467
8631
  if split_statements is not None:
7468
8632
  pulumi.set(__self__, "split_statements", split_statements)
7469
8633
  if username is not None:
@@ -7515,8 +8679,6 @@ class SecretsMountOracleArgs:
7515
8679
  def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
7516
8680
  """
7517
8681
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
7518
-
7519
- Supported list of database secrets engines that can be configured:
7520
8682
  """
7521
8683
  return pulumi.get(self, "data")
7522
8684
 
@@ -7524,6 +8686,20 @@ class SecretsMountOracleArgs:
7524
8686
  def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
7525
8687
  pulumi.set(self, "data", value)
7526
8688
 
8689
+ @property
8690
+ @pulumi.getter(name="disableAutomatedRotation")
8691
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
8692
+ """
8693
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
8694
+
8695
+ Supported list of database secrets engines that can be configured:
8696
+ """
8697
+ return pulumi.get(self, "disable_automated_rotation")
8698
+
8699
+ @disable_automated_rotation.setter
8700
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
8701
+ pulumi.set(self, "disable_automated_rotation", value)
8702
+
7527
8703
  @property
7528
8704
  @pulumi.getter(name="disconnectSessions")
7529
8705
  def disconnect_sessions(self) -> Optional[pulumi.Input[bool]]:
@@ -7608,6 +8784,46 @@ class SecretsMountOracleArgs:
7608
8784
  def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
7609
8785
  pulumi.set(self, "root_rotation_statements", value)
7610
8786
 
8787
+ @property
8788
+ @pulumi.getter(name="rotationPeriod")
8789
+ def rotation_period(self) -> Optional[pulumi.Input[int]]:
8790
+ """
8791
+ The amount of time in seconds Vault should wait before rotating the root credential.
8792
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
8793
+ """
8794
+ return pulumi.get(self, "rotation_period")
8795
+
8796
+ @rotation_period.setter
8797
+ def rotation_period(self, value: Optional[pulumi.Input[int]]):
8798
+ pulumi.set(self, "rotation_period", value)
8799
+
8800
+ @property
8801
+ @pulumi.getter(name="rotationSchedule")
8802
+ def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
8803
+ """
8804
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
8805
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
8806
+ """
8807
+ return pulumi.get(self, "rotation_schedule")
8808
+
8809
+ @rotation_schedule.setter
8810
+ def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
8811
+ pulumi.set(self, "rotation_schedule", value)
8812
+
8813
+ @property
8814
+ @pulumi.getter(name="rotationWindow")
8815
+ def rotation_window(self) -> Optional[pulumi.Input[int]]:
8816
+ """
8817
+ The maximum amount of time in seconds allowed to complete
8818
+ a rotation when a scheduled token rotation occurs. The default rotation window is
8819
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
8820
+ """
8821
+ return pulumi.get(self, "rotation_window")
8822
+
8823
+ @rotation_window.setter
8824
+ def rotation_window(self, value: Optional[pulumi.Input[int]]):
8825
+ pulumi.set(self, "rotation_window", value)
8826
+
7611
8827
  @property
7612
8828
  @pulumi.getter(name="splitStatements")
7613
8829
  def split_statements(self) -> Optional[pulumi.Input[bool]]:
@@ -7680,6 +8896,10 @@ if not MYPY:
7680
8896
  data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
7681
8897
  """
7682
8898
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
8899
+ """
8900
+ disable_automated_rotation: NotRequired[pulumi.Input[bool]]
8901
+ """
8902
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
7683
8903
 
7684
8904
  Supported list of database secrets engines that can be configured:
7685
8905
  """
@@ -7703,6 +8923,10 @@ if not MYPY:
7703
8923
  """
7704
8924
  The root credential password used in the connection URL
7705
8925
  """
8926
+ password_authentication: NotRequired[pulumi.Input[str]]
8927
+ """
8928
+ When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
8929
+ """
7706
8930
  plugin_name: NotRequired[pulumi.Input[str]]
7707
8931
  """
7708
8932
  Specifies the name of the plugin to use.
@@ -7715,6 +8939,22 @@ if not MYPY:
7715
8939
  """
7716
8940
  A list of database statements to be executed to rotate the root user's credentials.
7717
8941
  """
8942
+ rotation_period: NotRequired[pulumi.Input[int]]
8943
+ """
8944
+ The amount of time in seconds Vault should wait before rotating the root credential.
8945
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
8946
+ """
8947
+ rotation_schedule: NotRequired[pulumi.Input[str]]
8948
+ """
8949
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
8950
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
8951
+ """
8952
+ rotation_window: NotRequired[pulumi.Input[int]]
8953
+ """
8954
+ The maximum amount of time in seconds allowed to complete
8955
+ a rotation when a scheduled token rotation occurs. The default rotation window is
8956
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
8957
+ """
7718
8958
  self_managed: NotRequired[pulumi.Input[bool]]
7719
8959
  """
7720
8960
  If set, allows onboarding static roles with a rootless connection configuration.
@@ -7755,14 +8995,19 @@ class SecretsMountPostgresqlArgs:
7755
8995
  auth_type: Optional[pulumi.Input[str]] = None,
7756
8996
  connection_url: Optional[pulumi.Input[str]] = None,
7757
8997
  data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
8998
+ disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
7758
8999
  disable_escaping: Optional[pulumi.Input[bool]] = None,
7759
9000
  max_connection_lifetime: Optional[pulumi.Input[int]] = None,
7760
9001
  max_idle_connections: Optional[pulumi.Input[int]] = None,
7761
9002
  max_open_connections: Optional[pulumi.Input[int]] = None,
7762
9003
  password: Optional[pulumi.Input[str]] = None,
9004
+ password_authentication: Optional[pulumi.Input[str]] = None,
7763
9005
  plugin_name: Optional[pulumi.Input[str]] = None,
7764
9006
  private_key: Optional[pulumi.Input[str]] = None,
7765
9007
  root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
9008
+ rotation_period: Optional[pulumi.Input[int]] = None,
9009
+ rotation_schedule: Optional[pulumi.Input[str]] = None,
9010
+ rotation_window: Optional[pulumi.Input[int]] = None,
7766
9011
  self_managed: Optional[pulumi.Input[bool]] = None,
7767
9012
  service_account_json: Optional[pulumi.Input[str]] = None,
7768
9013
  tls_ca: Optional[pulumi.Input[str]] = None,
@@ -7777,6 +9022,7 @@ class SecretsMountPostgresqlArgs:
7777
9022
  :param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
7778
9023
  :param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
7779
9024
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
9025
+ :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
7780
9026
 
7781
9027
  Supported list of database secrets engines that can be configured:
7782
9028
  :param pulumi.Input[bool] disable_escaping: Disable special character escaping in username and password
@@ -7784,9 +9030,17 @@ class SecretsMountPostgresqlArgs:
7784
9030
  :param pulumi.Input[int] max_idle_connections: Maximum number of idle connections to the database.
7785
9031
  :param pulumi.Input[int] max_open_connections: Maximum number of open connections to the database.
7786
9032
  :param pulumi.Input[str] password: The root credential password used in the connection URL
9033
+ :param pulumi.Input[str] password_authentication: When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
7787
9034
  :param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
7788
9035
  :param pulumi.Input[str] private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
7789
9036
  :param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
9037
+ :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
9038
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
9039
+ :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
9040
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
9041
+ :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
9042
+ a rotation when a scheduled token rotation occurs. The default rotation window is
9043
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
7790
9044
  :param pulumi.Input[bool] self_managed: If set, allows onboarding static roles with a rootless connection configuration.
7791
9045
  :param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
7792
9046
  :param pulumi.Input[str] tls_ca: The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
@@ -7805,6 +9059,8 @@ class SecretsMountPostgresqlArgs:
7805
9059
  pulumi.set(__self__, "connection_url", connection_url)
7806
9060
  if data is not None:
7807
9061
  pulumi.set(__self__, "data", data)
9062
+ if disable_automated_rotation is not None:
9063
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
7808
9064
  if disable_escaping is not None:
7809
9065
  pulumi.set(__self__, "disable_escaping", disable_escaping)
7810
9066
  if max_connection_lifetime is not None:
@@ -7815,12 +9071,20 @@ class SecretsMountPostgresqlArgs:
7815
9071
  pulumi.set(__self__, "max_open_connections", max_open_connections)
7816
9072
  if password is not None:
7817
9073
  pulumi.set(__self__, "password", password)
9074
+ if password_authentication is not None:
9075
+ pulumi.set(__self__, "password_authentication", password_authentication)
7818
9076
  if plugin_name is not None:
7819
9077
  pulumi.set(__self__, "plugin_name", plugin_name)
7820
9078
  if private_key is not None:
7821
9079
  pulumi.set(__self__, "private_key", private_key)
7822
9080
  if root_rotation_statements is not None:
7823
9081
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
9082
+ if rotation_period is not None:
9083
+ pulumi.set(__self__, "rotation_period", rotation_period)
9084
+ if rotation_schedule is not None:
9085
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
9086
+ if rotation_window is not None:
9087
+ pulumi.set(__self__, "rotation_window", rotation_window)
7824
9088
  if self_managed is not None:
7825
9089
  pulumi.set(__self__, "self_managed", self_managed)
7826
9090
  if service_account_json is not None:
@@ -7890,8 +9154,6 @@ class SecretsMountPostgresqlArgs:
7890
9154
  def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
7891
9155
  """
7892
9156
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
7893
-
7894
- Supported list of database secrets engines that can be configured:
7895
9157
  """
7896
9158
  return pulumi.get(self, "data")
7897
9159
 
@@ -7899,6 +9161,20 @@ class SecretsMountPostgresqlArgs:
7899
9161
  def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
7900
9162
  pulumi.set(self, "data", value)
7901
9163
 
9164
+ @property
9165
+ @pulumi.getter(name="disableAutomatedRotation")
9166
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
9167
+ """
9168
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
9169
+
9170
+ Supported list of database secrets engines that can be configured:
9171
+ """
9172
+ return pulumi.get(self, "disable_automated_rotation")
9173
+
9174
+ @disable_automated_rotation.setter
9175
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
9176
+ pulumi.set(self, "disable_automated_rotation", value)
9177
+
7902
9178
  @property
7903
9179
  @pulumi.getter(name="disableEscaping")
7904
9180
  def disable_escaping(self) -> Optional[pulumi.Input[bool]]:
@@ -7959,6 +9235,18 @@ class SecretsMountPostgresqlArgs:
7959
9235
  def password(self, value: Optional[pulumi.Input[str]]):
7960
9236
  pulumi.set(self, "password", value)
7961
9237
 
9238
+ @property
9239
+ @pulumi.getter(name="passwordAuthentication")
9240
+ def password_authentication(self) -> Optional[pulumi.Input[str]]:
9241
+ """
9242
+ When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
9243
+ """
9244
+ return pulumi.get(self, "password_authentication")
9245
+
9246
+ @password_authentication.setter
9247
+ def password_authentication(self, value: Optional[pulumi.Input[str]]):
9248
+ pulumi.set(self, "password_authentication", value)
9249
+
7962
9250
  @property
7963
9251
  @pulumi.getter(name="pluginName")
7964
9252
  def plugin_name(self) -> Optional[pulumi.Input[str]]:
@@ -7995,6 +9283,46 @@ class SecretsMountPostgresqlArgs:
7995
9283
  def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
7996
9284
  pulumi.set(self, "root_rotation_statements", value)
7997
9285
 
9286
+ @property
9287
+ @pulumi.getter(name="rotationPeriod")
9288
+ def rotation_period(self) -> Optional[pulumi.Input[int]]:
9289
+ """
9290
+ The amount of time in seconds Vault should wait before rotating the root credential.
9291
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
9292
+ """
9293
+ return pulumi.get(self, "rotation_period")
9294
+
9295
+ @rotation_period.setter
9296
+ def rotation_period(self, value: Optional[pulumi.Input[int]]):
9297
+ pulumi.set(self, "rotation_period", value)
9298
+
9299
+ @property
9300
+ @pulumi.getter(name="rotationSchedule")
9301
+ def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
9302
+ """
9303
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
9304
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
9305
+ """
9306
+ return pulumi.get(self, "rotation_schedule")
9307
+
9308
+ @rotation_schedule.setter
9309
+ def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
9310
+ pulumi.set(self, "rotation_schedule", value)
9311
+
9312
+ @property
9313
+ @pulumi.getter(name="rotationWindow")
9314
+ def rotation_window(self) -> Optional[pulumi.Input[int]]:
9315
+ """
9316
+ The maximum amount of time in seconds allowed to complete
9317
+ a rotation when a scheduled token rotation occurs. The default rotation window is
9318
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
9319
+ """
9320
+ return pulumi.get(self, "rotation_window")
9321
+
9322
+ @rotation_window.setter
9323
+ def rotation_window(self, value: Optional[pulumi.Input[int]]):
9324
+ pulumi.set(self, "rotation_window", value)
9325
+
7998
9326
  @property
7999
9327
  @pulumi.getter(name="selfManaged")
8000
9328
  def self_managed(self) -> Optional[pulumi.Input[bool]]:
@@ -8111,6 +9439,10 @@ if not MYPY:
8111
9439
  data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
8112
9440
  """
8113
9441
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
9442
+ """
9443
+ disable_automated_rotation: NotRequired[pulumi.Input[bool]]
9444
+ """
9445
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
8114
9446
 
8115
9447
  Supported list of database secrets engines that can be configured:
8116
9448
  """
@@ -8130,6 +9462,22 @@ if not MYPY:
8130
9462
  """
8131
9463
  A list of database statements to be executed to rotate the root user's credentials.
8132
9464
  """
9465
+ rotation_period: NotRequired[pulumi.Input[int]]
9466
+ """
9467
+ The amount of time in seconds Vault should wait before rotating the root credential.
9468
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
9469
+ """
9470
+ rotation_schedule: NotRequired[pulumi.Input[str]]
9471
+ """
9472
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
9473
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
9474
+ """
9475
+ rotation_window: NotRequired[pulumi.Input[int]]
9476
+ """
9477
+ The maximum amount of time in seconds allowed to complete
9478
+ a rotation when a scheduled token rotation occurs. The default rotation window is
9479
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
9480
+ """
8133
9481
  tls: NotRequired[pulumi.Input[bool]]
8134
9482
  """
8135
9483
  Specifies whether to use TLS when connecting to Redis.
@@ -8152,10 +9500,14 @@ class SecretsMountRediArgs:
8152
9500
  allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
8153
9501
  ca_cert: Optional[pulumi.Input[str]] = None,
8154
9502
  data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
9503
+ disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
8155
9504
  insecure_tls: Optional[pulumi.Input[bool]] = None,
8156
9505
  plugin_name: Optional[pulumi.Input[str]] = None,
8157
9506
  port: Optional[pulumi.Input[int]] = None,
8158
9507
  root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
9508
+ rotation_period: Optional[pulumi.Input[int]] = None,
9509
+ rotation_schedule: Optional[pulumi.Input[str]] = None,
9510
+ rotation_window: Optional[pulumi.Input[int]] = None,
8159
9511
  tls: Optional[pulumi.Input[bool]] = None,
8160
9512
  verify_connection: Optional[pulumi.Input[bool]] = None):
8161
9513
  """
@@ -8167,12 +9519,20 @@ class SecretsMountRediArgs:
8167
9519
  connection.
8168
9520
  :param pulumi.Input[str] ca_cert: The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
8169
9521
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
9522
+ :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
8170
9523
 
8171
9524
  Supported list of database secrets engines that can be configured:
8172
9525
  :param pulumi.Input[bool] insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
8173
9526
  :param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
8174
9527
  :param pulumi.Input[int] port: The transport port to use to connect to Redis.
8175
9528
  :param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
9529
+ :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
9530
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
9531
+ :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
9532
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
9533
+ :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
9534
+ a rotation when a scheduled token rotation occurs. The default rotation window is
9535
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
8176
9536
  :param pulumi.Input[bool] tls: Specifies whether to use TLS when connecting to Redis.
8177
9537
  :param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
8178
9538
  initial configuration or not.
@@ -8187,6 +9547,8 @@ class SecretsMountRediArgs:
8187
9547
  pulumi.set(__self__, "ca_cert", ca_cert)
8188
9548
  if data is not None:
8189
9549
  pulumi.set(__self__, "data", data)
9550
+ if disable_automated_rotation is not None:
9551
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
8190
9552
  if insecure_tls is not None:
8191
9553
  pulumi.set(__self__, "insecure_tls", insecure_tls)
8192
9554
  if plugin_name is not None:
@@ -8195,6 +9557,12 @@ class SecretsMountRediArgs:
8195
9557
  pulumi.set(__self__, "port", port)
8196
9558
  if root_rotation_statements is not None:
8197
9559
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
9560
+ if rotation_period is not None:
9561
+ pulumi.set(__self__, "rotation_period", rotation_period)
9562
+ if rotation_schedule is not None:
9563
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
9564
+ if rotation_window is not None:
9565
+ pulumi.set(__self__, "rotation_window", rotation_window)
8198
9566
  if tls is not None:
8199
9567
  pulumi.set(__self__, "tls", tls)
8200
9568
  if verify_connection is not None:
@@ -8278,8 +9646,6 @@ class SecretsMountRediArgs:
8278
9646
  def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
8279
9647
  """
8280
9648
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
8281
-
8282
- Supported list of database secrets engines that can be configured:
8283
9649
  """
8284
9650
  return pulumi.get(self, "data")
8285
9651
 
@@ -8287,6 +9653,20 @@ class SecretsMountRediArgs:
8287
9653
  def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
8288
9654
  pulumi.set(self, "data", value)
8289
9655
 
9656
+ @property
9657
+ @pulumi.getter(name="disableAutomatedRotation")
9658
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
9659
+ """
9660
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
9661
+
9662
+ Supported list of database secrets engines that can be configured:
9663
+ """
9664
+ return pulumi.get(self, "disable_automated_rotation")
9665
+
9666
+ @disable_automated_rotation.setter
9667
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
9668
+ pulumi.set(self, "disable_automated_rotation", value)
9669
+
8290
9670
  @property
8291
9671
  @pulumi.getter(name="insecureTls")
8292
9672
  def insecure_tls(self) -> Optional[pulumi.Input[bool]]:
@@ -8335,6 +9715,46 @@ class SecretsMountRediArgs:
8335
9715
  def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
8336
9716
  pulumi.set(self, "root_rotation_statements", value)
8337
9717
 
9718
+ @property
9719
+ @pulumi.getter(name="rotationPeriod")
9720
+ def rotation_period(self) -> Optional[pulumi.Input[int]]:
9721
+ """
9722
+ The amount of time in seconds Vault should wait before rotating the root credential.
9723
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
9724
+ """
9725
+ return pulumi.get(self, "rotation_period")
9726
+
9727
+ @rotation_period.setter
9728
+ def rotation_period(self, value: Optional[pulumi.Input[int]]):
9729
+ pulumi.set(self, "rotation_period", value)
9730
+
9731
+ @property
9732
+ @pulumi.getter(name="rotationSchedule")
9733
+ def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
9734
+ """
9735
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
9736
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
9737
+ """
9738
+ return pulumi.get(self, "rotation_schedule")
9739
+
9740
+ @rotation_schedule.setter
9741
+ def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
9742
+ pulumi.set(self, "rotation_schedule", value)
9743
+
9744
+ @property
9745
+ @pulumi.getter(name="rotationWindow")
9746
+ def rotation_window(self) -> Optional[pulumi.Input[int]]:
9747
+ """
9748
+ The maximum amount of time in seconds allowed to complete
9749
+ a rotation when a scheduled token rotation occurs. The default rotation window is
9750
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
9751
+ """
9752
+ return pulumi.get(self, "rotation_window")
9753
+
9754
+ @rotation_window.setter
9755
+ def rotation_window(self, value: Optional[pulumi.Input[int]]):
9756
+ pulumi.set(self, "rotation_window", value)
9757
+
8338
9758
  @property
8339
9759
  @pulumi.getter
8340
9760
  def tls(self) -> Optional[pulumi.Input[bool]]:
@@ -8379,6 +9799,10 @@ if not MYPY:
8379
9799
  data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
8380
9800
  """
8381
9801
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
9802
+ """
9803
+ disable_automated_rotation: NotRequired[pulumi.Input[bool]]
9804
+ """
9805
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
8382
9806
 
8383
9807
  Supported list of database secrets engines that can be configured:
8384
9808
  """
@@ -8398,6 +9822,22 @@ if not MYPY:
8398
9822
  """
8399
9823
  A list of database statements to be executed to rotate the root user's credentials.
8400
9824
  """
9825
+ rotation_period: NotRequired[pulumi.Input[int]]
9826
+ """
9827
+ The amount of time in seconds Vault should wait before rotating the root credential.
9828
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
9829
+ """
9830
+ rotation_schedule: NotRequired[pulumi.Input[str]]
9831
+ """
9832
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
9833
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
9834
+ """
9835
+ rotation_window: NotRequired[pulumi.Input[int]]
9836
+ """
9837
+ The maximum amount of time in seconds allowed to complete
9838
+ a rotation when a scheduled token rotation occurs. The default rotation window is
9839
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
9840
+ """
8401
9841
  username: NotRequired[pulumi.Input[str]]
8402
9842
  """
8403
9843
  The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
@@ -8417,10 +9857,14 @@ class SecretsMountRedisElasticachArgs:
8417
9857
  url: pulumi.Input[str],
8418
9858
  allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
8419
9859
  data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
9860
+ disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
8420
9861
  password: Optional[pulumi.Input[str]] = None,
8421
9862
  plugin_name: Optional[pulumi.Input[str]] = None,
8422
9863
  region: Optional[pulumi.Input[str]] = None,
8423
9864
  root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
9865
+ rotation_period: Optional[pulumi.Input[int]] = None,
9866
+ rotation_schedule: Optional[pulumi.Input[str]] = None,
9867
+ rotation_window: Optional[pulumi.Input[int]] = None,
8424
9868
  username: Optional[pulumi.Input[str]] = None,
8425
9869
  verify_connection: Optional[pulumi.Input[bool]] = None):
8426
9870
  """
@@ -8429,12 +9873,20 @@ class SecretsMountRedisElasticachArgs:
8429
9873
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
8430
9874
  connection.
8431
9875
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
9876
+ :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
8432
9877
 
8433
9878
  Supported list of database secrets engines that can be configured:
8434
9879
  :param pulumi.Input[str] password: The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
8435
9880
  :param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
8436
9881
  :param pulumi.Input[str] region: The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
8437
9882
  :param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
9883
+ :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
9884
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
9885
+ :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
9886
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
9887
+ :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
9888
+ a rotation when a scheduled token rotation occurs. The default rotation window is
9889
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
8438
9890
  :param pulumi.Input[str] username: The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
8439
9891
  :param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
8440
9892
  initial configuration or not.
@@ -8445,6 +9897,8 @@ class SecretsMountRedisElasticachArgs:
8445
9897
  pulumi.set(__self__, "allowed_roles", allowed_roles)
8446
9898
  if data is not None:
8447
9899
  pulumi.set(__self__, "data", data)
9900
+ if disable_automated_rotation is not None:
9901
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
8448
9902
  if password is not None:
8449
9903
  pulumi.set(__self__, "password", password)
8450
9904
  if plugin_name is not None:
@@ -8453,6 +9907,12 @@ class SecretsMountRedisElasticachArgs:
8453
9907
  pulumi.set(__self__, "region", region)
8454
9908
  if root_rotation_statements is not None:
8455
9909
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
9910
+ if rotation_period is not None:
9911
+ pulumi.set(__self__, "rotation_period", rotation_period)
9912
+ if rotation_schedule is not None:
9913
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
9914
+ if rotation_window is not None:
9915
+ pulumi.set(__self__, "rotation_window", rotation_window)
8456
9916
  if username is not None:
8457
9917
  pulumi.set(__self__, "username", username)
8458
9918
  if verify_connection is not None:
@@ -8500,8 +9960,6 @@ class SecretsMountRedisElasticachArgs:
8500
9960
  def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
8501
9961
  """
8502
9962
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
8503
-
8504
- Supported list of database secrets engines that can be configured:
8505
9963
  """
8506
9964
  return pulumi.get(self, "data")
8507
9965
 
@@ -8509,6 +9967,20 @@ class SecretsMountRedisElasticachArgs:
8509
9967
  def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
8510
9968
  pulumi.set(self, "data", value)
8511
9969
 
9970
+ @property
9971
+ @pulumi.getter(name="disableAutomatedRotation")
9972
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
9973
+ """
9974
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
9975
+
9976
+ Supported list of database secrets engines that can be configured:
9977
+ """
9978
+ return pulumi.get(self, "disable_automated_rotation")
9979
+
9980
+ @disable_automated_rotation.setter
9981
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
9982
+ pulumi.set(self, "disable_automated_rotation", value)
9983
+
8512
9984
  @property
8513
9985
  @pulumi.getter
8514
9986
  def password(self) -> Optional[pulumi.Input[str]]:
@@ -8557,6 +10029,46 @@ class SecretsMountRedisElasticachArgs:
8557
10029
  def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
8558
10030
  pulumi.set(self, "root_rotation_statements", value)
8559
10031
 
10032
+ @property
10033
+ @pulumi.getter(name="rotationPeriod")
10034
+ def rotation_period(self) -> Optional[pulumi.Input[int]]:
10035
+ """
10036
+ The amount of time in seconds Vault should wait before rotating the root credential.
10037
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
10038
+ """
10039
+ return pulumi.get(self, "rotation_period")
10040
+
10041
+ @rotation_period.setter
10042
+ def rotation_period(self, value: Optional[pulumi.Input[int]]):
10043
+ pulumi.set(self, "rotation_period", value)
10044
+
10045
+ @property
10046
+ @pulumi.getter(name="rotationSchedule")
10047
+ def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
10048
+ """
10049
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
10050
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
10051
+ """
10052
+ return pulumi.get(self, "rotation_schedule")
10053
+
10054
+ @rotation_schedule.setter
10055
+ def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
10056
+ pulumi.set(self, "rotation_schedule", value)
10057
+
10058
+ @property
10059
+ @pulumi.getter(name="rotationWindow")
10060
+ def rotation_window(self) -> Optional[pulumi.Input[int]]:
10061
+ """
10062
+ The maximum amount of time in seconds allowed to complete
10063
+ a rotation when a scheduled token rotation occurs. The default rotation window is
10064
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
10065
+ """
10066
+ return pulumi.get(self, "rotation_window")
10067
+
10068
+ @rotation_window.setter
10069
+ def rotation_window(self, value: Optional[pulumi.Input[int]]):
10070
+ pulumi.set(self, "rotation_window", value)
10071
+
8560
10072
  @property
8561
10073
  @pulumi.getter
8562
10074
  def username(self) -> Optional[pulumi.Input[str]]:
@@ -8601,6 +10113,10 @@ if not MYPY:
8601
10113
  data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
8602
10114
  """
8603
10115
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
10116
+ """
10117
+ disable_automated_rotation: NotRequired[pulumi.Input[bool]]
10118
+ """
10119
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
8604
10120
 
8605
10121
  Supported list of database secrets engines that can be configured:
8606
10122
  """
@@ -8632,6 +10148,22 @@ if not MYPY:
8632
10148
  """
8633
10149
  A list of database statements to be executed to rotate the root user's credentials.
8634
10150
  """
10151
+ rotation_period: NotRequired[pulumi.Input[int]]
10152
+ """
10153
+ The amount of time in seconds Vault should wait before rotating the root credential.
10154
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
10155
+ """
10156
+ rotation_schedule: NotRequired[pulumi.Input[str]]
10157
+ """
10158
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
10159
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
10160
+ """
10161
+ rotation_window: NotRequired[pulumi.Input[int]]
10162
+ """
10163
+ The maximum amount of time in seconds allowed to complete
10164
+ a rotation when a scheduled token rotation occurs. The default rotation window is
10165
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
10166
+ """
8635
10167
  username: NotRequired[pulumi.Input[str]]
8636
10168
  """
8637
10169
  The root credential username used in the connection URL
@@ -8655,6 +10187,7 @@ class SecretsMountRedshiftArgs:
8655
10187
  allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
8656
10188
  connection_url: Optional[pulumi.Input[str]] = None,
8657
10189
  data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
10190
+ disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
8658
10191
  disable_escaping: Optional[pulumi.Input[bool]] = None,
8659
10192
  max_connection_lifetime: Optional[pulumi.Input[int]] = None,
8660
10193
  max_idle_connections: Optional[pulumi.Input[int]] = None,
@@ -8662,6 +10195,9 @@ class SecretsMountRedshiftArgs:
8662
10195
  password: Optional[pulumi.Input[str]] = None,
8663
10196
  plugin_name: Optional[pulumi.Input[str]] = None,
8664
10197
  root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
10198
+ rotation_period: Optional[pulumi.Input[int]] = None,
10199
+ rotation_schedule: Optional[pulumi.Input[str]] = None,
10200
+ rotation_window: Optional[pulumi.Input[int]] = None,
8665
10201
  username: Optional[pulumi.Input[str]] = None,
8666
10202
  username_template: Optional[pulumi.Input[str]] = None,
8667
10203
  verify_connection: Optional[pulumi.Input[bool]] = None):
@@ -8671,6 +10207,7 @@ class SecretsMountRedshiftArgs:
8671
10207
  connection.
8672
10208
  :param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
8673
10209
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
10210
+ :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
8674
10211
 
8675
10212
  Supported list of database secrets engines that can be configured:
8676
10213
  :param pulumi.Input[bool] disable_escaping: Disable special character escaping in username and password
@@ -8680,6 +10217,13 @@ class SecretsMountRedshiftArgs:
8680
10217
  :param pulumi.Input[str] password: The root credential password used in the connection URL
8681
10218
  :param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
8682
10219
  :param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
10220
+ :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
10221
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
10222
+ :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
10223
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
10224
+ :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
10225
+ a rotation when a scheduled token rotation occurs. The default rotation window is
10226
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
8683
10227
  :param pulumi.Input[str] username: The root credential username used in the connection URL
8684
10228
  :param pulumi.Input[str] username_template: Username generation template.
8685
10229
  :param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
@@ -8692,6 +10236,8 @@ class SecretsMountRedshiftArgs:
8692
10236
  pulumi.set(__self__, "connection_url", connection_url)
8693
10237
  if data is not None:
8694
10238
  pulumi.set(__self__, "data", data)
10239
+ if disable_automated_rotation is not None:
10240
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
8695
10241
  if disable_escaping is not None:
8696
10242
  pulumi.set(__self__, "disable_escaping", disable_escaping)
8697
10243
  if max_connection_lifetime is not None:
@@ -8706,6 +10252,12 @@ class SecretsMountRedshiftArgs:
8706
10252
  pulumi.set(__self__, "plugin_name", plugin_name)
8707
10253
  if root_rotation_statements is not None:
8708
10254
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
10255
+ if rotation_period is not None:
10256
+ pulumi.set(__self__, "rotation_period", rotation_period)
10257
+ if rotation_schedule is not None:
10258
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
10259
+ if rotation_window is not None:
10260
+ pulumi.set(__self__, "rotation_window", rotation_window)
8709
10261
  if username is not None:
8710
10262
  pulumi.set(__self__, "username", username)
8711
10263
  if username_template is not None:
@@ -8755,8 +10307,6 @@ class SecretsMountRedshiftArgs:
8755
10307
  def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
8756
10308
  """
8757
10309
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
8758
-
8759
- Supported list of database secrets engines that can be configured:
8760
10310
  """
8761
10311
  return pulumi.get(self, "data")
8762
10312
 
@@ -8764,6 +10314,20 @@ class SecretsMountRedshiftArgs:
8764
10314
  def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
8765
10315
  pulumi.set(self, "data", value)
8766
10316
 
10317
+ @property
10318
+ @pulumi.getter(name="disableAutomatedRotation")
10319
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
10320
+ """
10321
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
10322
+
10323
+ Supported list of database secrets engines that can be configured:
10324
+ """
10325
+ return pulumi.get(self, "disable_automated_rotation")
10326
+
10327
+ @disable_automated_rotation.setter
10328
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
10329
+ pulumi.set(self, "disable_automated_rotation", value)
10330
+
8767
10331
  @property
8768
10332
  @pulumi.getter(name="disableEscaping")
8769
10333
  def disable_escaping(self) -> Optional[pulumi.Input[bool]]:
@@ -8848,6 +10412,46 @@ class SecretsMountRedshiftArgs:
8848
10412
  def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
8849
10413
  pulumi.set(self, "root_rotation_statements", value)
8850
10414
 
10415
+ @property
10416
+ @pulumi.getter(name="rotationPeriod")
10417
+ def rotation_period(self) -> Optional[pulumi.Input[int]]:
10418
+ """
10419
+ The amount of time in seconds Vault should wait before rotating the root credential.
10420
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
10421
+ """
10422
+ return pulumi.get(self, "rotation_period")
10423
+
10424
+ @rotation_period.setter
10425
+ def rotation_period(self, value: Optional[pulumi.Input[int]]):
10426
+ pulumi.set(self, "rotation_period", value)
10427
+
10428
+ @property
10429
+ @pulumi.getter(name="rotationSchedule")
10430
+ def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
10431
+ """
10432
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
10433
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
10434
+ """
10435
+ return pulumi.get(self, "rotation_schedule")
10436
+
10437
+ @rotation_schedule.setter
10438
+ def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
10439
+ pulumi.set(self, "rotation_schedule", value)
10440
+
10441
+ @property
10442
+ @pulumi.getter(name="rotationWindow")
10443
+ def rotation_window(self) -> Optional[pulumi.Input[int]]:
10444
+ """
10445
+ The maximum amount of time in seconds allowed to complete
10446
+ a rotation when a scheduled token rotation occurs. The default rotation window is
10447
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
10448
+ """
10449
+ return pulumi.get(self, "rotation_window")
10450
+
10451
+ @rotation_window.setter
10452
+ def rotation_window(self, value: Optional[pulumi.Input[int]]):
10453
+ pulumi.set(self, "rotation_window", value)
10454
+
8851
10455
  @property
8852
10456
  @pulumi.getter
8853
10457
  def username(self) -> Optional[pulumi.Input[str]]:
@@ -8904,6 +10508,10 @@ if not MYPY:
8904
10508
  data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
8905
10509
  """
8906
10510
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
10511
+ """
10512
+ disable_automated_rotation: NotRequired[pulumi.Input[bool]]
10513
+ """
10514
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
8907
10515
 
8908
10516
  Supported list of database secrets engines that can be configured:
8909
10517
  """
@@ -8931,6 +10539,22 @@ if not MYPY:
8931
10539
  """
8932
10540
  A list of database statements to be executed to rotate the root user's credentials.
8933
10541
  """
10542
+ rotation_period: NotRequired[pulumi.Input[int]]
10543
+ """
10544
+ The amount of time in seconds Vault should wait before rotating the root credential.
10545
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
10546
+ """
10547
+ rotation_schedule: NotRequired[pulumi.Input[str]]
10548
+ """
10549
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
10550
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
10551
+ """
10552
+ rotation_window: NotRequired[pulumi.Input[int]]
10553
+ """
10554
+ The maximum amount of time in seconds allowed to complete
10555
+ a rotation when a scheduled token rotation occurs. The default rotation window is
10556
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
10557
+ """
8934
10558
  username: NotRequired[pulumi.Input[str]]
8935
10559
  """
8936
10560
  The root credential username used in the connection URL
@@ -8954,12 +10578,16 @@ class SecretsMountSnowflakeArgs:
8954
10578
  allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
8955
10579
  connection_url: Optional[pulumi.Input[str]] = None,
8956
10580
  data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
10581
+ disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
8957
10582
  max_connection_lifetime: Optional[pulumi.Input[int]] = None,
8958
10583
  max_idle_connections: Optional[pulumi.Input[int]] = None,
8959
10584
  max_open_connections: Optional[pulumi.Input[int]] = None,
8960
10585
  password: Optional[pulumi.Input[str]] = None,
8961
10586
  plugin_name: Optional[pulumi.Input[str]] = None,
8962
10587
  root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
10588
+ rotation_period: Optional[pulumi.Input[int]] = None,
10589
+ rotation_schedule: Optional[pulumi.Input[str]] = None,
10590
+ rotation_window: Optional[pulumi.Input[int]] = None,
8963
10591
  username: Optional[pulumi.Input[str]] = None,
8964
10592
  username_template: Optional[pulumi.Input[str]] = None,
8965
10593
  verify_connection: Optional[pulumi.Input[bool]] = None):
@@ -8969,6 +10597,7 @@ class SecretsMountSnowflakeArgs:
8969
10597
  connection.
8970
10598
  :param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
8971
10599
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
10600
+ :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
8972
10601
 
8973
10602
  Supported list of database secrets engines that can be configured:
8974
10603
  :param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
@@ -8977,6 +10606,13 @@ class SecretsMountSnowflakeArgs:
8977
10606
  :param pulumi.Input[str] password: The root credential password used in the connection URL
8978
10607
  :param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
8979
10608
  :param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
10609
+ :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
10610
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
10611
+ :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
10612
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
10613
+ :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
10614
+ a rotation when a scheduled token rotation occurs. The default rotation window is
10615
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
8980
10616
  :param pulumi.Input[str] username: The root credential username used in the connection URL
8981
10617
  :param pulumi.Input[str] username_template: Username generation template.
8982
10618
  :param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
@@ -8989,6 +10625,8 @@ class SecretsMountSnowflakeArgs:
8989
10625
  pulumi.set(__self__, "connection_url", connection_url)
8990
10626
  if data is not None:
8991
10627
  pulumi.set(__self__, "data", data)
10628
+ if disable_automated_rotation is not None:
10629
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
8992
10630
  if max_connection_lifetime is not None:
8993
10631
  pulumi.set(__self__, "max_connection_lifetime", max_connection_lifetime)
8994
10632
  if max_idle_connections is not None:
@@ -9001,6 +10639,12 @@ class SecretsMountSnowflakeArgs:
9001
10639
  pulumi.set(__self__, "plugin_name", plugin_name)
9002
10640
  if root_rotation_statements is not None:
9003
10641
  pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
10642
+ if rotation_period is not None:
10643
+ pulumi.set(__self__, "rotation_period", rotation_period)
10644
+ if rotation_schedule is not None:
10645
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
10646
+ if rotation_window is not None:
10647
+ pulumi.set(__self__, "rotation_window", rotation_window)
9004
10648
  if username is not None:
9005
10649
  pulumi.set(__self__, "username", username)
9006
10650
  if username_template is not None:
@@ -9050,8 +10694,6 @@ class SecretsMountSnowflakeArgs:
9050
10694
  def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
9051
10695
  """
9052
10696
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
9053
-
9054
- Supported list of database secrets engines that can be configured:
9055
10697
  """
9056
10698
  return pulumi.get(self, "data")
9057
10699
 
@@ -9059,6 +10701,20 @@ class SecretsMountSnowflakeArgs:
9059
10701
  def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
9060
10702
  pulumi.set(self, "data", value)
9061
10703
 
10704
+ @property
10705
+ @pulumi.getter(name="disableAutomatedRotation")
10706
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
10707
+ """
10708
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
10709
+
10710
+ Supported list of database secrets engines that can be configured:
10711
+ """
10712
+ return pulumi.get(self, "disable_automated_rotation")
10713
+
10714
+ @disable_automated_rotation.setter
10715
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
10716
+ pulumi.set(self, "disable_automated_rotation", value)
10717
+
9062
10718
  @property
9063
10719
  @pulumi.getter(name="maxConnectionLifetime")
9064
10720
  def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
@@ -9131,6 +10787,46 @@ class SecretsMountSnowflakeArgs:
9131
10787
  def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
9132
10788
  pulumi.set(self, "root_rotation_statements", value)
9133
10789
 
10790
+ @property
10791
+ @pulumi.getter(name="rotationPeriod")
10792
+ def rotation_period(self) -> Optional[pulumi.Input[int]]:
10793
+ """
10794
+ The amount of time in seconds Vault should wait before rotating the root credential.
10795
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
10796
+ """
10797
+ return pulumi.get(self, "rotation_period")
10798
+
10799
+ @rotation_period.setter
10800
+ def rotation_period(self, value: Optional[pulumi.Input[int]]):
10801
+ pulumi.set(self, "rotation_period", value)
10802
+
10803
+ @property
10804
+ @pulumi.getter(name="rotationSchedule")
10805
+ def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
10806
+ """
10807
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
10808
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
10809
+ """
10810
+ return pulumi.get(self, "rotation_schedule")
10811
+
10812
+ @rotation_schedule.setter
10813
+ def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
10814
+ pulumi.set(self, "rotation_schedule", value)
10815
+
10816
+ @property
10817
+ @pulumi.getter(name="rotationWindow")
10818
+ def rotation_window(self) -> Optional[pulumi.Input[int]]:
10819
+ """
10820
+ The maximum amount of time in seconds allowed to complete
10821
+ a rotation when a scheduled token rotation occurs. The default rotation window is
10822
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
10823
+ """
10824
+ return pulumi.get(self, "rotation_window")
10825
+
10826
+ @rotation_window.setter
10827
+ def rotation_window(self, value: Optional[pulumi.Input[int]]):
10828
+ pulumi.set(self, "rotation_window", value)
10829
+
9134
10830
  @property
9135
10831
  @pulumi.getter
9136
10832
  def username(self) -> Optional[pulumi.Input[str]]: