pulumi-vault 6.5.0a1736850018__py3-none-any.whl → 6.6.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +32 -0
- pulumi_vault/_utilities.py +8 -4
- pulumi_vault/aws/auth_backend_client.py +228 -4
- pulumi_vault/aws/auth_backend_sts_role.py +47 -0
- pulumi_vault/aws/secret_backend.py +395 -38
- pulumi_vault/aws/secret_backend_static_role.py +217 -0
- pulumi_vault/azure/auth_backend_config.py +257 -5
- pulumi_vault/azure/backend.py +249 -4
- pulumi_vault/database/_inputs.py +1740 -44
- pulumi_vault/database/outputs.py +1198 -18
- pulumi_vault/database/secret_backend_connection.py +220 -0
- pulumi_vault/database/secret_backend_static_role.py +143 -1
- pulumi_vault/database/secrets_mount.py +8 -0
- pulumi_vault/gcp/auth_backend.py +222 -2
- pulumi_vault/gcp/secret_backend.py +244 -4
- pulumi_vault/ldap/auth_backend.py +222 -2
- pulumi_vault/ldap/secret_backend.py +222 -2
- pulumi_vault/pkisecret/__init__.py +6 -0
- pulumi_vault/pkisecret/_inputs.py +34 -6
- pulumi_vault/pkisecret/backend_acme_eab.py +549 -0
- pulumi_vault/pkisecret/backend_config_acme.py +689 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1376 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +572 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +114 -1
- pulumi_vault/pkisecret/outputs.py +40 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +148 -7
- pulumi_vault/pkisecret/secret_backend_crl_config.py +54 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +141 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +265 -0
- pulumi_vault/pkisecret/secret_backend_role.py +299 -3
- pulumi_vault/pkisecret/secret_backend_root_cert.py +423 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +581 -3
- pulumi_vault/pkisecret/secret_backend_sign.py +94 -0
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/secret_backend_role.py +27 -0
- pulumi_vault/terraformcloud/secret_role.py +7 -7
- pulumi_vault/transit/__init__.py +2 -0
- pulumi_vault/transit/get_sign.py +324 -0
- pulumi_vault/transit/get_verify.py +354 -0
- pulumi_vault/transit/secret_backend_key.py +162 -0
- {pulumi_vault-6.5.0a1736850018.dist-info → pulumi_vault-6.6.0.dist-info}/METADATA +1 -1
- {pulumi_vault-6.5.0a1736850018.dist-info → pulumi_vault-6.6.0.dist-info}/RECORD +48 -39
- {pulumi_vault-6.5.0a1736850018.dist-info → pulumi_vault-6.6.0.dist-info}/WHEEL +1 -1
- {pulumi_vault-6.5.0a1736850018.dist-info → pulumi_vault-6.6.0.dist-info}/top_level.txt +0 -0
pulumi_vault/database/_inputs.py
CHANGED
@@ -2625,6 +2625,10 @@ if not MYPY:
|
|
2625
2625
|
"""
|
2626
2626
|
The root credential password used in the connection URL
|
2627
2627
|
"""
|
2628
|
+
password_authentication: NotRequired[pulumi.Input[str]]
|
2629
|
+
"""
|
2630
|
+
When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
2631
|
+
"""
|
2628
2632
|
private_key: NotRequired[pulumi.Input[str]]
|
2629
2633
|
"""
|
2630
2634
|
The secret key used for the x509 client certificate. Must be PEM encoded.
|
@@ -2666,6 +2670,7 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2666
2670
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
2667
2671
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
2668
2672
|
password: Optional[pulumi.Input[str]] = None,
|
2673
|
+
password_authentication: Optional[pulumi.Input[str]] = None,
|
2669
2674
|
private_key: Optional[pulumi.Input[str]] = None,
|
2670
2675
|
self_managed: Optional[pulumi.Input[bool]] = None,
|
2671
2676
|
service_account_json: Optional[pulumi.Input[str]] = None,
|
@@ -2681,6 +2686,7 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2681
2686
|
:param pulumi.Input[int] max_idle_connections: Maximum number of idle connections to the database.
|
2682
2687
|
:param pulumi.Input[int] max_open_connections: Maximum number of open connections to the database.
|
2683
2688
|
:param pulumi.Input[str] password: The root credential password used in the connection URL
|
2689
|
+
:param pulumi.Input[str] password_authentication: When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
2684
2690
|
:param pulumi.Input[str] private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
|
2685
2691
|
:param pulumi.Input[bool] self_managed: If set, allows onboarding static roles with a rootless connection configuration.
|
2686
2692
|
:param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
|
@@ -2703,6 +2709,8 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2703
2709
|
pulumi.set(__self__, "max_open_connections", max_open_connections)
|
2704
2710
|
if password is not None:
|
2705
2711
|
pulumi.set(__self__, "password", password)
|
2712
|
+
if password_authentication is not None:
|
2713
|
+
pulumi.set(__self__, "password_authentication", password_authentication)
|
2706
2714
|
if private_key is not None:
|
2707
2715
|
pulumi.set(__self__, "private_key", private_key)
|
2708
2716
|
if self_managed is not None:
|
@@ -2802,6 +2810,18 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2802
2810
|
def password(self, value: Optional[pulumi.Input[str]]):
|
2803
2811
|
pulumi.set(self, "password", value)
|
2804
2812
|
|
2813
|
+
@property
|
2814
|
+
@pulumi.getter(name="passwordAuthentication")
|
2815
|
+
def password_authentication(self) -> Optional[pulumi.Input[str]]:
|
2816
|
+
"""
|
2817
|
+
When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
2818
|
+
"""
|
2819
|
+
return pulumi.get(self, "password_authentication")
|
2820
|
+
|
2821
|
+
@password_authentication.setter
|
2822
|
+
def password_authentication(self, value: Optional[pulumi.Input[str]]):
|
2823
|
+
pulumi.set(self, "password_authentication", value)
|
2824
|
+
|
2805
2825
|
@property
|
2806
2826
|
@pulumi.getter(name="privateKey")
|
2807
2827
|
def private_key(self) -> Optional[pulumi.Input[str]]:
|
@@ -3469,6 +3489,10 @@ if not MYPY:
|
|
3469
3489
|
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
3470
3490
|
"""
|
3471
3491
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3492
|
+
"""
|
3493
|
+
disable_automated_rotation: NotRequired[pulumi.Input[bool]]
|
3494
|
+
"""
|
3495
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
3472
3496
|
|
3473
3497
|
Supported list of database secrets engines that can be configured:
|
3474
3498
|
"""
|
@@ -3508,6 +3532,22 @@ if not MYPY:
|
|
3508
3532
|
"""
|
3509
3533
|
A list of database statements to be executed to rotate the root user's credentials.
|
3510
3534
|
"""
|
3535
|
+
rotation_period: NotRequired[pulumi.Input[int]]
|
3536
|
+
"""
|
3537
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
3538
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
3539
|
+
"""
|
3540
|
+
rotation_schedule: NotRequired[pulumi.Input[str]]
|
3541
|
+
"""
|
3542
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
3543
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
3544
|
+
"""
|
3545
|
+
rotation_window: NotRequired[pulumi.Input[int]]
|
3546
|
+
"""
|
3547
|
+
The maximum amount of time in seconds allowed to complete
|
3548
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
3549
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
3550
|
+
"""
|
3511
3551
|
skip_verification: NotRequired[pulumi.Input[bool]]
|
3512
3552
|
"""
|
3513
3553
|
Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
@@ -3535,6 +3575,7 @@ class SecretsMountCassandraArgs:
|
|
3535
3575
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
3536
3576
|
connect_timeout: Optional[pulumi.Input[int]] = None,
|
3537
3577
|
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
3578
|
+
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
3538
3579
|
hosts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
3539
3580
|
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
3540
3581
|
password: Optional[pulumi.Input[str]] = None,
|
@@ -3544,6 +3585,9 @@ class SecretsMountCassandraArgs:
|
|
3544
3585
|
port: Optional[pulumi.Input[int]] = None,
|
3545
3586
|
protocol_version: Optional[pulumi.Input[int]] = None,
|
3546
3587
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
3588
|
+
rotation_period: Optional[pulumi.Input[int]] = None,
|
3589
|
+
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
3590
|
+
rotation_window: Optional[pulumi.Input[int]] = None,
|
3547
3591
|
skip_verification: Optional[pulumi.Input[bool]] = None,
|
3548
3592
|
tls: Optional[pulumi.Input[bool]] = None,
|
3549
3593
|
username: Optional[pulumi.Input[str]] = None,
|
@@ -3554,6 +3598,7 @@ class SecretsMountCassandraArgs:
|
|
3554
3598
|
connection.
|
3555
3599
|
:param pulumi.Input[int] connect_timeout: The number of seconds to use as a connection timeout.
|
3556
3600
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3601
|
+
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
3557
3602
|
|
3558
3603
|
Supported list of database secrets engines that can be configured:
|
3559
3604
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] hosts: Cassandra hosts to connect to.
|
@@ -3565,6 +3610,13 @@ class SecretsMountCassandraArgs:
|
|
3565
3610
|
:param pulumi.Input[int] port: The transport port to use to connect to Cassandra.
|
3566
3611
|
:param pulumi.Input[int] protocol_version: The CQL protocol version to use.
|
3567
3612
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
3613
|
+
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
3614
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
3615
|
+
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
3616
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
3617
|
+
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
3618
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
3619
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
3568
3620
|
:param pulumi.Input[bool] skip_verification: Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
3569
3621
|
:param pulumi.Input[bool] tls: Whether to use TLS when connecting to Cassandra.
|
3570
3622
|
:param pulumi.Input[str] username: The username to use when authenticating with Cassandra.
|
@@ -3578,6 +3630,8 @@ class SecretsMountCassandraArgs:
|
|
3578
3630
|
pulumi.set(__self__, "connect_timeout", connect_timeout)
|
3579
3631
|
if data is not None:
|
3580
3632
|
pulumi.set(__self__, "data", data)
|
3633
|
+
if disable_automated_rotation is not None:
|
3634
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
3581
3635
|
if hosts is not None:
|
3582
3636
|
pulumi.set(__self__, "hosts", hosts)
|
3583
3637
|
if insecure_tls is not None:
|
@@ -3596,6 +3650,12 @@ class SecretsMountCassandraArgs:
|
|
3596
3650
|
pulumi.set(__self__, "protocol_version", protocol_version)
|
3597
3651
|
if root_rotation_statements is not None:
|
3598
3652
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
3653
|
+
if rotation_period is not None:
|
3654
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
3655
|
+
if rotation_schedule is not None:
|
3656
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
3657
|
+
if rotation_window is not None:
|
3658
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
3599
3659
|
if skip_verification is not None:
|
3600
3660
|
pulumi.set(__self__, "skip_verification", skip_verification)
|
3601
3661
|
if tls is not None:
|
@@ -3647,8 +3707,6 @@ class SecretsMountCassandraArgs:
|
|
3647
3707
|
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
3648
3708
|
"""
|
3649
3709
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3650
|
-
|
3651
|
-
Supported list of database secrets engines that can be configured:
|
3652
3710
|
"""
|
3653
3711
|
return pulumi.get(self, "data")
|
3654
3712
|
|
@@ -3656,6 +3714,20 @@ class SecretsMountCassandraArgs:
|
|
3656
3714
|
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
3657
3715
|
pulumi.set(self, "data", value)
|
3658
3716
|
|
3717
|
+
@property
|
3718
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
3719
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
|
3720
|
+
"""
|
3721
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
3722
|
+
|
3723
|
+
Supported list of database secrets engines that can be configured:
|
3724
|
+
"""
|
3725
|
+
return pulumi.get(self, "disable_automated_rotation")
|
3726
|
+
|
3727
|
+
@disable_automated_rotation.setter
|
3728
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
|
3729
|
+
pulumi.set(self, "disable_automated_rotation", value)
|
3730
|
+
|
3659
3731
|
@property
|
3660
3732
|
@pulumi.getter
|
3661
3733
|
def hosts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -3764,6 +3836,46 @@ class SecretsMountCassandraArgs:
|
|
3764
3836
|
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
3765
3837
|
pulumi.set(self, "root_rotation_statements", value)
|
3766
3838
|
|
3839
|
+
@property
|
3840
|
+
@pulumi.getter(name="rotationPeriod")
|
3841
|
+
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
3842
|
+
"""
|
3843
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
3844
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
3845
|
+
"""
|
3846
|
+
return pulumi.get(self, "rotation_period")
|
3847
|
+
|
3848
|
+
@rotation_period.setter
|
3849
|
+
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
3850
|
+
pulumi.set(self, "rotation_period", value)
|
3851
|
+
|
3852
|
+
@property
|
3853
|
+
@pulumi.getter(name="rotationSchedule")
|
3854
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
3855
|
+
"""
|
3856
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
3857
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
3858
|
+
"""
|
3859
|
+
return pulumi.get(self, "rotation_schedule")
|
3860
|
+
|
3861
|
+
@rotation_schedule.setter
|
3862
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
3863
|
+
pulumi.set(self, "rotation_schedule", value)
|
3864
|
+
|
3865
|
+
@property
|
3866
|
+
@pulumi.getter(name="rotationWindow")
|
3867
|
+
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
3868
|
+
"""
|
3869
|
+
The maximum amount of time in seconds allowed to complete
|
3870
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
3871
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
3872
|
+
"""
|
3873
|
+
return pulumi.get(self, "rotation_window")
|
3874
|
+
|
3875
|
+
@rotation_window.setter
|
3876
|
+
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
3877
|
+
pulumi.set(self, "rotation_window", value)
|
3878
|
+
|
3767
3879
|
@property
|
3768
3880
|
@pulumi.getter(name="skipVerification")
|
3769
3881
|
def skip_verification(self) -> Optional[pulumi.Input[bool]]:
|
@@ -3848,6 +3960,10 @@ if not MYPY:
|
|
3848
3960
|
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
3849
3961
|
"""
|
3850
3962
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3963
|
+
"""
|
3964
|
+
disable_automated_rotation: NotRequired[pulumi.Input[bool]]
|
3965
|
+
"""
|
3966
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
3851
3967
|
|
3852
3968
|
Supported list of database secrets engines that can be configured:
|
3853
3969
|
"""
|
@@ -3863,6 +3979,22 @@ if not MYPY:
|
|
3863
3979
|
"""
|
3864
3980
|
A list of database statements to be executed to rotate the root user's credentials.
|
3865
3981
|
"""
|
3982
|
+
rotation_period: NotRequired[pulumi.Input[int]]
|
3983
|
+
"""
|
3984
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
3985
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
3986
|
+
"""
|
3987
|
+
rotation_schedule: NotRequired[pulumi.Input[str]]
|
3988
|
+
"""
|
3989
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
3990
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
3991
|
+
"""
|
3992
|
+
rotation_window: NotRequired[pulumi.Input[int]]
|
3993
|
+
"""
|
3994
|
+
The maximum amount of time in seconds allowed to complete
|
3995
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
3996
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
3997
|
+
"""
|
3866
3998
|
tls: NotRequired[pulumi.Input[bool]]
|
3867
3999
|
"""
|
3868
4000
|
Specifies whether to use TLS when connecting to Couchbase.
|
@@ -3890,9 +4022,13 @@ class SecretsMountCouchbaseArgs:
|
|
3890
4022
|
base64_pem: Optional[pulumi.Input[str]] = None,
|
3891
4023
|
bucket_name: Optional[pulumi.Input[str]] = None,
|
3892
4024
|
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
4025
|
+
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
3893
4026
|
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
3894
4027
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
3895
4028
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
4029
|
+
rotation_period: Optional[pulumi.Input[int]] = None,
|
4030
|
+
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
4031
|
+
rotation_window: Optional[pulumi.Input[int]] = None,
|
3896
4032
|
tls: Optional[pulumi.Input[bool]] = None,
|
3897
4033
|
username_template: Optional[pulumi.Input[str]] = None,
|
3898
4034
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
@@ -3906,11 +4042,19 @@ class SecretsMountCouchbaseArgs:
|
|
3906
4042
|
:param pulumi.Input[str] base64_pem: Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
|
3907
4043
|
:param pulumi.Input[str] bucket_name: Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
|
3908
4044
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4045
|
+
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
3909
4046
|
|
3910
4047
|
Supported list of database secrets engines that can be configured:
|
3911
4048
|
:param pulumi.Input[bool] insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
|
3912
4049
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
3913
4050
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
4051
|
+
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
4052
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
4053
|
+
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
4054
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
4055
|
+
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
4056
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
4057
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
3914
4058
|
:param pulumi.Input[bool] tls: Specifies whether to use TLS when connecting to Couchbase.
|
3915
4059
|
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated.
|
3916
4060
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
@@ -3928,12 +4072,20 @@ class SecretsMountCouchbaseArgs:
|
|
3928
4072
|
pulumi.set(__self__, "bucket_name", bucket_name)
|
3929
4073
|
if data is not None:
|
3930
4074
|
pulumi.set(__self__, "data", data)
|
4075
|
+
if disable_automated_rotation is not None:
|
4076
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
3931
4077
|
if insecure_tls is not None:
|
3932
4078
|
pulumi.set(__self__, "insecure_tls", insecure_tls)
|
3933
4079
|
if plugin_name is not None:
|
3934
4080
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
3935
4081
|
if root_rotation_statements is not None:
|
3936
4082
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
4083
|
+
if rotation_period is not None:
|
4084
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
4085
|
+
if rotation_schedule is not None:
|
4086
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
4087
|
+
if rotation_window is not None:
|
4088
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
3937
4089
|
if tls is not None:
|
3938
4090
|
pulumi.set(__self__, "tls", tls)
|
3939
4091
|
if username_template is not None:
|
@@ -4031,8 +4183,6 @@ class SecretsMountCouchbaseArgs:
|
|
4031
4183
|
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
4032
4184
|
"""
|
4033
4185
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4034
|
-
|
4035
|
-
Supported list of database secrets engines that can be configured:
|
4036
4186
|
"""
|
4037
4187
|
return pulumi.get(self, "data")
|
4038
4188
|
|
@@ -4040,6 +4190,20 @@ class SecretsMountCouchbaseArgs:
|
|
4040
4190
|
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
4041
4191
|
pulumi.set(self, "data", value)
|
4042
4192
|
|
4193
|
+
@property
|
4194
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
4195
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
|
4196
|
+
"""
|
4197
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
4198
|
+
|
4199
|
+
Supported list of database secrets engines that can be configured:
|
4200
|
+
"""
|
4201
|
+
return pulumi.get(self, "disable_automated_rotation")
|
4202
|
+
|
4203
|
+
@disable_automated_rotation.setter
|
4204
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
|
4205
|
+
pulumi.set(self, "disable_automated_rotation", value)
|
4206
|
+
|
4043
4207
|
@property
|
4044
4208
|
@pulumi.getter(name="insecureTls")
|
4045
4209
|
def insecure_tls(self) -> Optional[pulumi.Input[bool]]:
|
@@ -4076,6 +4240,46 @@ class SecretsMountCouchbaseArgs:
|
|
4076
4240
|
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
4077
4241
|
pulumi.set(self, "root_rotation_statements", value)
|
4078
4242
|
|
4243
|
+
@property
|
4244
|
+
@pulumi.getter(name="rotationPeriod")
|
4245
|
+
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
4246
|
+
"""
|
4247
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
4248
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
4249
|
+
"""
|
4250
|
+
return pulumi.get(self, "rotation_period")
|
4251
|
+
|
4252
|
+
@rotation_period.setter
|
4253
|
+
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
4254
|
+
pulumi.set(self, "rotation_period", value)
|
4255
|
+
|
4256
|
+
@property
|
4257
|
+
@pulumi.getter(name="rotationSchedule")
|
4258
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
4259
|
+
"""
|
4260
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
4261
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
4262
|
+
"""
|
4263
|
+
return pulumi.get(self, "rotation_schedule")
|
4264
|
+
|
4265
|
+
@rotation_schedule.setter
|
4266
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
4267
|
+
pulumi.set(self, "rotation_schedule", value)
|
4268
|
+
|
4269
|
+
@property
|
4270
|
+
@pulumi.getter(name="rotationWindow")
|
4271
|
+
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
4272
|
+
"""
|
4273
|
+
The maximum amount of time in seconds allowed to complete
|
4274
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
4275
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
4276
|
+
"""
|
4277
|
+
return pulumi.get(self, "rotation_window")
|
4278
|
+
|
4279
|
+
@rotation_window.setter
|
4280
|
+
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
4281
|
+
pulumi.set(self, "rotation_window", value)
|
4282
|
+
|
4079
4283
|
@property
|
4080
4284
|
@pulumi.getter
|
4081
4285
|
def tls(self) -> Optional[pulumi.Input[bool]]:
|
@@ -4156,6 +4360,10 @@ if not MYPY:
|
|
4156
4360
|
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
4157
4361
|
"""
|
4158
4362
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4363
|
+
"""
|
4364
|
+
disable_automated_rotation: NotRequired[pulumi.Input[bool]]
|
4365
|
+
"""
|
4366
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
4159
4367
|
|
4160
4368
|
Supported list of database secrets engines that can be configured:
|
4161
4369
|
"""
|
@@ -4171,6 +4379,22 @@ if not MYPY:
|
|
4171
4379
|
"""
|
4172
4380
|
A list of database statements to be executed to rotate the root user's credentials.
|
4173
4381
|
"""
|
4382
|
+
rotation_period: NotRequired[pulumi.Input[int]]
|
4383
|
+
"""
|
4384
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
4385
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
4386
|
+
"""
|
4387
|
+
rotation_schedule: NotRequired[pulumi.Input[str]]
|
4388
|
+
"""
|
4389
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
4390
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
4391
|
+
"""
|
4392
|
+
rotation_window: NotRequired[pulumi.Input[int]]
|
4393
|
+
"""
|
4394
|
+
The maximum amount of time in seconds allowed to complete
|
4395
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
4396
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
4397
|
+
"""
|
4174
4398
|
tls_server_name: NotRequired[pulumi.Input[str]]
|
4175
4399
|
"""
|
4176
4400
|
This, if set, is used to set the SNI host when connecting via TLS
|
@@ -4200,9 +4424,13 @@ class SecretsMountElasticsearchArgs:
|
|
4200
4424
|
client_cert: Optional[pulumi.Input[str]] = None,
|
4201
4425
|
client_key: Optional[pulumi.Input[str]] = None,
|
4202
4426
|
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
4427
|
+
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
4203
4428
|
insecure: Optional[pulumi.Input[bool]] = None,
|
4204
4429
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
4205
4430
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
4431
|
+
rotation_period: Optional[pulumi.Input[int]] = None,
|
4432
|
+
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
4433
|
+
rotation_window: Optional[pulumi.Input[int]] = None,
|
4206
4434
|
tls_server_name: Optional[pulumi.Input[str]] = None,
|
4207
4435
|
username_template: Optional[pulumi.Input[str]] = None,
|
4208
4436
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
@@ -4218,11 +4446,19 @@ class SecretsMountElasticsearchArgs:
|
|
4218
4446
|
:param pulumi.Input[str] client_cert: The path to the certificate for the Elasticsearch client to present for communication
|
4219
4447
|
:param pulumi.Input[str] client_key: The path to the key for the Elasticsearch client to use for communication
|
4220
4448
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4449
|
+
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
4221
4450
|
|
4222
4451
|
Supported list of database secrets engines that can be configured:
|
4223
4452
|
:param pulumi.Input[bool] insecure: Whether to disable certificate verification
|
4224
4453
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
4225
4454
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
4455
|
+
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
4456
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
4457
|
+
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
4458
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
4459
|
+
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
4460
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
4461
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
4226
4462
|
:param pulumi.Input[str] tls_server_name: This, if set, is used to set the SNI host when connecting via TLS
|
4227
4463
|
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated.
|
4228
4464
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
@@ -4244,12 +4480,20 @@ class SecretsMountElasticsearchArgs:
|
|
4244
4480
|
pulumi.set(__self__, "client_key", client_key)
|
4245
4481
|
if data is not None:
|
4246
4482
|
pulumi.set(__self__, "data", data)
|
4483
|
+
if disable_automated_rotation is not None:
|
4484
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
4247
4485
|
if insecure is not None:
|
4248
4486
|
pulumi.set(__self__, "insecure", insecure)
|
4249
4487
|
if plugin_name is not None:
|
4250
4488
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
4251
4489
|
if root_rotation_statements is not None:
|
4252
4490
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
4491
|
+
if rotation_period is not None:
|
4492
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
4493
|
+
if rotation_schedule is not None:
|
4494
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
4495
|
+
if rotation_window is not None:
|
4496
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
4253
4497
|
if tls_server_name is not None:
|
4254
4498
|
pulumi.set(__self__, "tls_server_name", tls_server_name)
|
4255
4499
|
if username_template is not None:
|
@@ -4371,8 +4615,6 @@ class SecretsMountElasticsearchArgs:
|
|
4371
4615
|
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
4372
4616
|
"""
|
4373
4617
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4374
|
-
|
4375
|
-
Supported list of database secrets engines that can be configured:
|
4376
4618
|
"""
|
4377
4619
|
return pulumi.get(self, "data")
|
4378
4620
|
|
@@ -4380,6 +4622,20 @@ class SecretsMountElasticsearchArgs:
|
|
4380
4622
|
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
4381
4623
|
pulumi.set(self, "data", value)
|
4382
4624
|
|
4625
|
+
@property
|
4626
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
4627
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
|
4628
|
+
"""
|
4629
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
4630
|
+
|
4631
|
+
Supported list of database secrets engines that can be configured:
|
4632
|
+
"""
|
4633
|
+
return pulumi.get(self, "disable_automated_rotation")
|
4634
|
+
|
4635
|
+
@disable_automated_rotation.setter
|
4636
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
|
4637
|
+
pulumi.set(self, "disable_automated_rotation", value)
|
4638
|
+
|
4383
4639
|
@property
|
4384
4640
|
@pulumi.getter
|
4385
4641
|
def insecure(self) -> Optional[pulumi.Input[bool]]:
|
@@ -4416,6 +4672,46 @@ class SecretsMountElasticsearchArgs:
|
|
4416
4672
|
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
4417
4673
|
pulumi.set(self, "root_rotation_statements", value)
|
4418
4674
|
|
4675
|
+
@property
|
4676
|
+
@pulumi.getter(name="rotationPeriod")
|
4677
|
+
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
4678
|
+
"""
|
4679
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
4680
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
4681
|
+
"""
|
4682
|
+
return pulumi.get(self, "rotation_period")
|
4683
|
+
|
4684
|
+
@rotation_period.setter
|
4685
|
+
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
4686
|
+
pulumi.set(self, "rotation_period", value)
|
4687
|
+
|
4688
|
+
@property
|
4689
|
+
@pulumi.getter(name="rotationSchedule")
|
4690
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
4691
|
+
"""
|
4692
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
4693
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
4694
|
+
"""
|
4695
|
+
return pulumi.get(self, "rotation_schedule")
|
4696
|
+
|
4697
|
+
@rotation_schedule.setter
|
4698
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
4699
|
+
pulumi.set(self, "rotation_schedule", value)
|
4700
|
+
|
4701
|
+
@property
|
4702
|
+
@pulumi.getter(name="rotationWindow")
|
4703
|
+
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
4704
|
+
"""
|
4705
|
+
The maximum amount of time in seconds allowed to complete
|
4706
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
4707
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
4708
|
+
"""
|
4709
|
+
return pulumi.get(self, "rotation_window")
|
4710
|
+
|
4711
|
+
@rotation_window.setter
|
4712
|
+
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
4713
|
+
pulumi.set(self, "rotation_window", value)
|
4714
|
+
|
4419
4715
|
@property
|
4420
4716
|
@pulumi.getter(name="tlsServerName")
|
4421
4717
|
def tls_server_name(self) -> Optional[pulumi.Input[str]]:
|
@@ -4472,6 +4768,10 @@ if not MYPY:
|
|
4472
4768
|
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
4473
4769
|
"""
|
4474
4770
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4771
|
+
"""
|
4772
|
+
disable_automated_rotation: NotRequired[pulumi.Input[bool]]
|
4773
|
+
"""
|
4774
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
4475
4775
|
|
4476
4776
|
Supported list of database secrets engines that can be configured:
|
4477
4777
|
"""
|
@@ -4503,6 +4803,22 @@ if not MYPY:
|
|
4503
4803
|
"""
|
4504
4804
|
A list of database statements to be executed to rotate the root user's credentials.
|
4505
4805
|
"""
|
4806
|
+
rotation_period: NotRequired[pulumi.Input[int]]
|
4807
|
+
"""
|
4808
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
4809
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
4810
|
+
"""
|
4811
|
+
rotation_schedule: NotRequired[pulumi.Input[str]]
|
4812
|
+
"""
|
4813
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
4814
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
4815
|
+
"""
|
4816
|
+
rotation_window: NotRequired[pulumi.Input[int]]
|
4817
|
+
"""
|
4818
|
+
The maximum amount of time in seconds allowed to complete
|
4819
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
4820
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
4821
|
+
"""
|
4506
4822
|
username: NotRequired[pulumi.Input[str]]
|
4507
4823
|
"""
|
4508
4824
|
The root credential username used in the connection URL
|
@@ -4522,6 +4838,7 @@ class SecretsMountHanaArgs:
|
|
4522
4838
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
4523
4839
|
connection_url: Optional[pulumi.Input[str]] = None,
|
4524
4840
|
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
4841
|
+
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
4525
4842
|
disable_escaping: Optional[pulumi.Input[bool]] = None,
|
4526
4843
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
4527
4844
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
@@ -4529,6 +4846,9 @@ class SecretsMountHanaArgs:
|
|
4529
4846
|
password: Optional[pulumi.Input[str]] = None,
|
4530
4847
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
4531
4848
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
4849
|
+
rotation_period: Optional[pulumi.Input[int]] = None,
|
4850
|
+
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
4851
|
+
rotation_window: Optional[pulumi.Input[int]] = None,
|
4532
4852
|
username: Optional[pulumi.Input[str]] = None,
|
4533
4853
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
4534
4854
|
"""
|
@@ -4537,6 +4857,7 @@ class SecretsMountHanaArgs:
|
|
4537
4857
|
connection.
|
4538
4858
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
4539
4859
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4860
|
+
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
4540
4861
|
|
4541
4862
|
Supported list of database secrets engines that can be configured:
|
4542
4863
|
:param pulumi.Input[bool] disable_escaping: Disable special character escaping in username and password
|
@@ -4546,6 +4867,13 @@ class SecretsMountHanaArgs:
|
|
4546
4867
|
:param pulumi.Input[str] password: The root credential password used in the connection URL
|
4547
4868
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
4548
4869
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
4870
|
+
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
4871
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
4872
|
+
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
4873
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
4874
|
+
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
4875
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
4876
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
4549
4877
|
:param pulumi.Input[str] username: The root credential username used in the connection URL
|
4550
4878
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
4551
4879
|
initial configuration or not.
|
@@ -4557,6 +4885,8 @@ class SecretsMountHanaArgs:
|
|
4557
4885
|
pulumi.set(__self__, "connection_url", connection_url)
|
4558
4886
|
if data is not None:
|
4559
4887
|
pulumi.set(__self__, "data", data)
|
4888
|
+
if disable_automated_rotation is not None:
|
4889
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
4560
4890
|
if disable_escaping is not None:
|
4561
4891
|
pulumi.set(__self__, "disable_escaping", disable_escaping)
|
4562
4892
|
if max_connection_lifetime is not None:
|
@@ -4571,6 +4901,12 @@ class SecretsMountHanaArgs:
|
|
4571
4901
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
4572
4902
|
if root_rotation_statements is not None:
|
4573
4903
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
4904
|
+
if rotation_period is not None:
|
4905
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
4906
|
+
if rotation_schedule is not None:
|
4907
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
4908
|
+
if rotation_window is not None:
|
4909
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
4574
4910
|
if username is not None:
|
4575
4911
|
pulumi.set(__self__, "username", username)
|
4576
4912
|
if verify_connection is not None:
|
@@ -4618,8 +4954,6 @@ class SecretsMountHanaArgs:
|
|
4618
4954
|
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
4619
4955
|
"""
|
4620
4956
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4621
|
-
|
4622
|
-
Supported list of database secrets engines that can be configured:
|
4623
4957
|
"""
|
4624
4958
|
return pulumi.get(self, "data")
|
4625
4959
|
|
@@ -4627,6 +4961,20 @@ class SecretsMountHanaArgs:
|
|
4627
4961
|
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
4628
4962
|
pulumi.set(self, "data", value)
|
4629
4963
|
|
4964
|
+
@property
|
4965
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
4966
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
|
4967
|
+
"""
|
4968
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
4969
|
+
|
4970
|
+
Supported list of database secrets engines that can be configured:
|
4971
|
+
"""
|
4972
|
+
return pulumi.get(self, "disable_automated_rotation")
|
4973
|
+
|
4974
|
+
@disable_automated_rotation.setter
|
4975
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
|
4976
|
+
pulumi.set(self, "disable_automated_rotation", value)
|
4977
|
+
|
4630
4978
|
@property
|
4631
4979
|
@pulumi.getter(name="disableEscaping")
|
4632
4980
|
def disable_escaping(self) -> Optional[pulumi.Input[bool]]:
|
@@ -4711,6 +5059,46 @@ class SecretsMountHanaArgs:
|
|
4711
5059
|
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
4712
5060
|
pulumi.set(self, "root_rotation_statements", value)
|
4713
5061
|
|
5062
|
+
@property
|
5063
|
+
@pulumi.getter(name="rotationPeriod")
|
5064
|
+
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
5065
|
+
"""
|
5066
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
5067
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
5068
|
+
"""
|
5069
|
+
return pulumi.get(self, "rotation_period")
|
5070
|
+
|
5071
|
+
@rotation_period.setter
|
5072
|
+
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
5073
|
+
pulumi.set(self, "rotation_period", value)
|
5074
|
+
|
5075
|
+
@property
|
5076
|
+
@pulumi.getter(name="rotationSchedule")
|
5077
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
5078
|
+
"""
|
5079
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
5080
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
5081
|
+
"""
|
5082
|
+
return pulumi.get(self, "rotation_schedule")
|
5083
|
+
|
5084
|
+
@rotation_schedule.setter
|
5085
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
5086
|
+
pulumi.set(self, "rotation_schedule", value)
|
5087
|
+
|
5088
|
+
@property
|
5089
|
+
@pulumi.getter(name="rotationWindow")
|
5090
|
+
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
5091
|
+
"""
|
5092
|
+
The maximum amount of time in seconds allowed to complete
|
5093
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
5094
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
5095
|
+
"""
|
5096
|
+
return pulumi.get(self, "rotation_window")
|
5097
|
+
|
5098
|
+
@rotation_window.setter
|
5099
|
+
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
5100
|
+
pulumi.set(self, "rotation_window", value)
|
5101
|
+
|
4714
5102
|
@property
|
4715
5103
|
@pulumi.getter
|
4716
5104
|
def username(self) -> Optional[pulumi.Input[str]]:
|
@@ -4767,6 +5155,10 @@ if not MYPY:
|
|
4767
5155
|
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
4768
5156
|
"""
|
4769
5157
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5158
|
+
"""
|
5159
|
+
disable_automated_rotation: NotRequired[pulumi.Input[bool]]
|
5160
|
+
"""
|
5161
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
4770
5162
|
|
4771
5163
|
Supported list of database secrets engines that can be configured:
|
4772
5164
|
"""
|
@@ -4794,6 +5186,22 @@ if not MYPY:
|
|
4794
5186
|
"""
|
4795
5187
|
A list of database statements to be executed to rotate the root user's credentials.
|
4796
5188
|
"""
|
5189
|
+
rotation_period: NotRequired[pulumi.Input[int]]
|
5190
|
+
"""
|
5191
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
5192
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
5193
|
+
"""
|
5194
|
+
rotation_schedule: NotRequired[pulumi.Input[str]]
|
5195
|
+
"""
|
5196
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
5197
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
5198
|
+
"""
|
5199
|
+
rotation_window: NotRequired[pulumi.Input[int]]
|
5200
|
+
"""
|
5201
|
+
The maximum amount of time in seconds allowed to complete
|
5202
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
5203
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
5204
|
+
"""
|
4797
5205
|
tls: NotRequired[pulumi.Input[bool]]
|
4798
5206
|
"""
|
4799
5207
|
Whether to use TLS when connecting to Influxdb.
|
@@ -4820,12 +5228,16 @@ class SecretsMountInfluxdbArgs:
|
|
4820
5228
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
4821
5229
|
connect_timeout: Optional[pulumi.Input[int]] = None,
|
4822
5230
|
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
5231
|
+
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
4823
5232
|
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
4824
5233
|
pem_bundle: Optional[pulumi.Input[str]] = None,
|
4825
5234
|
pem_json: Optional[pulumi.Input[str]] = None,
|
4826
5235
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
4827
5236
|
port: Optional[pulumi.Input[int]] = None,
|
4828
5237
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
5238
|
+
rotation_period: Optional[pulumi.Input[int]] = None,
|
5239
|
+
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
5240
|
+
rotation_window: Optional[pulumi.Input[int]] = None,
|
4829
5241
|
tls: Optional[pulumi.Input[bool]] = None,
|
4830
5242
|
username_template: Optional[pulumi.Input[str]] = None,
|
4831
5243
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
@@ -4838,6 +5250,7 @@ class SecretsMountInfluxdbArgs:
|
|
4838
5250
|
connection.
|
4839
5251
|
:param pulumi.Input[int] connect_timeout: The number of seconds to use as a connection timeout.
|
4840
5252
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5253
|
+
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
4841
5254
|
|
4842
5255
|
Supported list of database secrets engines that can be configured:
|
4843
5256
|
:param pulumi.Input[bool] insecure_tls: Whether to skip verification of the server certificate when using TLS.
|
@@ -4846,6 +5259,13 @@ class SecretsMountInfluxdbArgs:
|
|
4846
5259
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
4847
5260
|
:param pulumi.Input[int] port: The transport port to use to connect to Influxdb.
|
4848
5261
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5262
|
+
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
5263
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
5264
|
+
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
5265
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
5266
|
+
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
5267
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
5268
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
4849
5269
|
:param pulumi.Input[bool] tls: Whether to use TLS when connecting to Influxdb.
|
4850
5270
|
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated.
|
4851
5271
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
@@ -4861,6 +5281,8 @@ class SecretsMountInfluxdbArgs:
|
|
4861
5281
|
pulumi.set(__self__, "connect_timeout", connect_timeout)
|
4862
5282
|
if data is not None:
|
4863
5283
|
pulumi.set(__self__, "data", data)
|
5284
|
+
if disable_automated_rotation is not None:
|
5285
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
4864
5286
|
if insecure_tls is not None:
|
4865
5287
|
pulumi.set(__self__, "insecure_tls", insecure_tls)
|
4866
5288
|
if pem_bundle is not None:
|
@@ -4873,6 +5295,12 @@ class SecretsMountInfluxdbArgs:
|
|
4873
5295
|
pulumi.set(__self__, "port", port)
|
4874
5296
|
if root_rotation_statements is not None:
|
4875
5297
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
5298
|
+
if rotation_period is not None:
|
5299
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
5300
|
+
if rotation_schedule is not None:
|
5301
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
5302
|
+
if rotation_window is not None:
|
5303
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
4876
5304
|
if tls is not None:
|
4877
5305
|
pulumi.set(__self__, "tls", tls)
|
4878
5306
|
if username_template is not None:
|
@@ -4958,8 +5386,6 @@ class SecretsMountInfluxdbArgs:
|
|
4958
5386
|
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
4959
5387
|
"""
|
4960
5388
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4961
|
-
|
4962
|
-
Supported list of database secrets engines that can be configured:
|
4963
5389
|
"""
|
4964
5390
|
return pulumi.get(self, "data")
|
4965
5391
|
|
@@ -4967,6 +5393,20 @@ class SecretsMountInfluxdbArgs:
|
|
4967
5393
|
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
4968
5394
|
pulumi.set(self, "data", value)
|
4969
5395
|
|
5396
|
+
@property
|
5397
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
5398
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
|
5399
|
+
"""
|
5400
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
5401
|
+
|
5402
|
+
Supported list of database secrets engines that can be configured:
|
5403
|
+
"""
|
5404
|
+
return pulumi.get(self, "disable_automated_rotation")
|
5405
|
+
|
5406
|
+
@disable_automated_rotation.setter
|
5407
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
|
5408
|
+
pulumi.set(self, "disable_automated_rotation", value)
|
5409
|
+
|
4970
5410
|
@property
|
4971
5411
|
@pulumi.getter(name="insecureTls")
|
4972
5412
|
def insecure_tls(self) -> Optional[pulumi.Input[bool]]:
|
@@ -5039,6 +5479,46 @@ class SecretsMountInfluxdbArgs:
|
|
5039
5479
|
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
5040
5480
|
pulumi.set(self, "root_rotation_statements", value)
|
5041
5481
|
|
5482
|
+
@property
|
5483
|
+
@pulumi.getter(name="rotationPeriod")
|
5484
|
+
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
5485
|
+
"""
|
5486
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
5487
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
5488
|
+
"""
|
5489
|
+
return pulumi.get(self, "rotation_period")
|
5490
|
+
|
5491
|
+
@rotation_period.setter
|
5492
|
+
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
5493
|
+
pulumi.set(self, "rotation_period", value)
|
5494
|
+
|
5495
|
+
@property
|
5496
|
+
@pulumi.getter(name="rotationSchedule")
|
5497
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
5498
|
+
"""
|
5499
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
5500
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
5501
|
+
"""
|
5502
|
+
return pulumi.get(self, "rotation_schedule")
|
5503
|
+
|
5504
|
+
@rotation_schedule.setter
|
5505
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
5506
|
+
pulumi.set(self, "rotation_schedule", value)
|
5507
|
+
|
5508
|
+
@property
|
5509
|
+
@pulumi.getter(name="rotationWindow")
|
5510
|
+
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
5511
|
+
"""
|
5512
|
+
The maximum amount of time in seconds allowed to complete
|
5513
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
5514
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
5515
|
+
"""
|
5516
|
+
return pulumi.get(self, "rotation_window")
|
5517
|
+
|
5518
|
+
@rotation_window.setter
|
5519
|
+
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
5520
|
+
pulumi.set(self, "rotation_window", value)
|
5521
|
+
|
5042
5522
|
@property
|
5043
5523
|
@pulumi.getter
|
5044
5524
|
def tls(self) -> Optional[pulumi.Input[bool]]:
|
@@ -5095,6 +5575,10 @@ if not MYPY:
|
|
5095
5575
|
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
5096
5576
|
"""
|
5097
5577
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5578
|
+
"""
|
5579
|
+
disable_automated_rotation: NotRequired[pulumi.Input[bool]]
|
5580
|
+
"""
|
5581
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
5098
5582
|
|
5099
5583
|
Supported list of database secrets engines that can be configured:
|
5100
5584
|
"""
|
@@ -5122,6 +5606,22 @@ if not MYPY:
|
|
5122
5606
|
"""
|
5123
5607
|
A list of database statements to be executed to rotate the root user's credentials.
|
5124
5608
|
"""
|
5609
|
+
rotation_period: NotRequired[pulumi.Input[int]]
|
5610
|
+
"""
|
5611
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
5612
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
5613
|
+
"""
|
5614
|
+
rotation_schedule: NotRequired[pulumi.Input[str]]
|
5615
|
+
"""
|
5616
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
5617
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
5618
|
+
"""
|
5619
|
+
rotation_window: NotRequired[pulumi.Input[int]]
|
5620
|
+
"""
|
5621
|
+
The maximum amount of time in seconds allowed to complete
|
5622
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
5623
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
5624
|
+
"""
|
5125
5625
|
username: NotRequired[pulumi.Input[str]]
|
5126
5626
|
"""
|
5127
5627
|
The root credential username used in the connection URL
|
@@ -5145,12 +5645,16 @@ class SecretsMountMongodbArgs:
|
|
5145
5645
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
5146
5646
|
connection_url: Optional[pulumi.Input[str]] = None,
|
5147
5647
|
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
5648
|
+
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
5148
5649
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
5149
5650
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
5150
5651
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
5151
5652
|
password: Optional[pulumi.Input[str]] = None,
|
5152
5653
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
5153
5654
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
5655
|
+
rotation_period: Optional[pulumi.Input[int]] = None,
|
5656
|
+
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
5657
|
+
rotation_window: Optional[pulumi.Input[int]] = None,
|
5154
5658
|
username: Optional[pulumi.Input[str]] = None,
|
5155
5659
|
username_template: Optional[pulumi.Input[str]] = None,
|
5156
5660
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
@@ -5160,6 +5664,7 @@ class SecretsMountMongodbArgs:
|
|
5160
5664
|
connection.
|
5161
5665
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
5162
5666
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5667
|
+
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
5163
5668
|
|
5164
5669
|
Supported list of database secrets engines that can be configured:
|
5165
5670
|
:param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -5168,6 +5673,13 @@ class SecretsMountMongodbArgs:
|
|
5168
5673
|
:param pulumi.Input[str] password: The root credential password used in the connection URL
|
5169
5674
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
5170
5675
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5676
|
+
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
5677
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
5678
|
+
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
5679
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
5680
|
+
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
5681
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
5682
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
5171
5683
|
:param pulumi.Input[str] username: The root credential username used in the connection URL
|
5172
5684
|
:param pulumi.Input[str] username_template: Username generation template.
|
5173
5685
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
@@ -5180,6 +5692,8 @@ class SecretsMountMongodbArgs:
|
|
5180
5692
|
pulumi.set(__self__, "connection_url", connection_url)
|
5181
5693
|
if data is not None:
|
5182
5694
|
pulumi.set(__self__, "data", data)
|
5695
|
+
if disable_automated_rotation is not None:
|
5696
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
5183
5697
|
if max_connection_lifetime is not None:
|
5184
5698
|
pulumi.set(__self__, "max_connection_lifetime", max_connection_lifetime)
|
5185
5699
|
if max_idle_connections is not None:
|
@@ -5192,6 +5706,12 @@ class SecretsMountMongodbArgs:
|
|
5192
5706
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
5193
5707
|
if root_rotation_statements is not None:
|
5194
5708
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
5709
|
+
if rotation_period is not None:
|
5710
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
5711
|
+
if rotation_schedule is not None:
|
5712
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
5713
|
+
if rotation_window is not None:
|
5714
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
5195
5715
|
if username is not None:
|
5196
5716
|
pulumi.set(__self__, "username", username)
|
5197
5717
|
if username_template is not None:
|
@@ -5241,8 +5761,6 @@ class SecretsMountMongodbArgs:
|
|
5241
5761
|
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
5242
5762
|
"""
|
5243
5763
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5244
|
-
|
5245
|
-
Supported list of database secrets engines that can be configured:
|
5246
5764
|
"""
|
5247
5765
|
return pulumi.get(self, "data")
|
5248
5766
|
|
@@ -5250,6 +5768,20 @@ class SecretsMountMongodbArgs:
|
|
5250
5768
|
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
5251
5769
|
pulumi.set(self, "data", value)
|
5252
5770
|
|
5771
|
+
@property
|
5772
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
5773
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
|
5774
|
+
"""
|
5775
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
5776
|
+
|
5777
|
+
Supported list of database secrets engines that can be configured:
|
5778
|
+
"""
|
5779
|
+
return pulumi.get(self, "disable_automated_rotation")
|
5780
|
+
|
5781
|
+
@disable_automated_rotation.setter
|
5782
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
|
5783
|
+
pulumi.set(self, "disable_automated_rotation", value)
|
5784
|
+
|
5253
5785
|
@property
|
5254
5786
|
@pulumi.getter(name="maxConnectionLifetime")
|
5255
5787
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
@@ -5322,6 +5854,46 @@ class SecretsMountMongodbArgs:
|
|
5322
5854
|
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
5323
5855
|
pulumi.set(self, "root_rotation_statements", value)
|
5324
5856
|
|
5857
|
+
@property
|
5858
|
+
@pulumi.getter(name="rotationPeriod")
|
5859
|
+
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
5860
|
+
"""
|
5861
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
5862
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
5863
|
+
"""
|
5864
|
+
return pulumi.get(self, "rotation_period")
|
5865
|
+
|
5866
|
+
@rotation_period.setter
|
5867
|
+
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
5868
|
+
pulumi.set(self, "rotation_period", value)
|
5869
|
+
|
5870
|
+
@property
|
5871
|
+
@pulumi.getter(name="rotationSchedule")
|
5872
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
5873
|
+
"""
|
5874
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
5875
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
5876
|
+
"""
|
5877
|
+
return pulumi.get(self, "rotation_schedule")
|
5878
|
+
|
5879
|
+
@rotation_schedule.setter
|
5880
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
5881
|
+
pulumi.set(self, "rotation_schedule", value)
|
5882
|
+
|
5883
|
+
@property
|
5884
|
+
@pulumi.getter(name="rotationWindow")
|
5885
|
+
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
5886
|
+
"""
|
5887
|
+
The maximum amount of time in seconds allowed to complete
|
5888
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
5889
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
5890
|
+
"""
|
5891
|
+
return pulumi.get(self, "rotation_window")
|
5892
|
+
|
5893
|
+
@rotation_window.setter
|
5894
|
+
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
5895
|
+
pulumi.set(self, "rotation_window", value)
|
5896
|
+
|
5325
5897
|
@property
|
5326
5898
|
@pulumi.getter
|
5327
5899
|
def username(self) -> Optional[pulumi.Input[str]]:
|
@@ -5386,6 +5958,10 @@ if not MYPY:
|
|
5386
5958
|
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
5387
5959
|
"""
|
5388
5960
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5961
|
+
"""
|
5962
|
+
disable_automated_rotation: NotRequired[pulumi.Input[bool]]
|
5963
|
+
"""
|
5964
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
5389
5965
|
|
5390
5966
|
Supported list of database secrets engines that can be configured:
|
5391
5967
|
"""
|
@@ -5397,6 +5973,22 @@ if not MYPY:
|
|
5397
5973
|
"""
|
5398
5974
|
A list of database statements to be executed to rotate the root user's credentials.
|
5399
5975
|
"""
|
5976
|
+
rotation_period: NotRequired[pulumi.Input[int]]
|
5977
|
+
"""
|
5978
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
5979
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
5980
|
+
"""
|
5981
|
+
rotation_schedule: NotRequired[pulumi.Input[str]]
|
5982
|
+
"""
|
5983
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
5984
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
5985
|
+
"""
|
5986
|
+
rotation_window: NotRequired[pulumi.Input[int]]
|
5987
|
+
"""
|
5988
|
+
The maximum amount of time in seconds allowed to complete
|
5989
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
5990
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
5991
|
+
"""
|
5400
5992
|
verify_connection: NotRequired[pulumi.Input[bool]]
|
5401
5993
|
"""
|
5402
5994
|
Whether the connection should be verified on
|
@@ -5414,8 +6006,12 @@ class SecretsMountMongodbatlaArgs:
|
|
5414
6006
|
public_key: pulumi.Input[str],
|
5415
6007
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
5416
6008
|
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
6009
|
+
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
5417
6010
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
5418
6011
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
6012
|
+
rotation_period: Optional[pulumi.Input[int]] = None,
|
6013
|
+
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
6014
|
+
rotation_window: Optional[pulumi.Input[int]] = None,
|
5419
6015
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
5420
6016
|
"""
|
5421
6017
|
:param pulumi.Input[str] name: Name of the database connection.
|
@@ -5425,10 +6021,18 @@ class SecretsMountMongodbatlaArgs:
|
|
5425
6021
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
5426
6022
|
connection.
|
5427
6023
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6024
|
+
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
5428
6025
|
|
5429
6026
|
Supported list of database secrets engines that can be configured:
|
5430
6027
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
5431
6028
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
6029
|
+
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
6030
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
6031
|
+
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
6032
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
6033
|
+
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
6034
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
6035
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
5432
6036
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
5433
6037
|
initial configuration or not.
|
5434
6038
|
"""
|
@@ -5440,10 +6044,18 @@ class SecretsMountMongodbatlaArgs:
|
|
5440
6044
|
pulumi.set(__self__, "allowed_roles", allowed_roles)
|
5441
6045
|
if data is not None:
|
5442
6046
|
pulumi.set(__self__, "data", data)
|
6047
|
+
if disable_automated_rotation is not None:
|
6048
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
5443
6049
|
if plugin_name is not None:
|
5444
6050
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
5445
6051
|
if root_rotation_statements is not None:
|
5446
6052
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
6053
|
+
if rotation_period is not None:
|
6054
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
6055
|
+
if rotation_schedule is not None:
|
6056
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
6057
|
+
if rotation_window is not None:
|
6058
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
5447
6059
|
if verify_connection is not None:
|
5448
6060
|
pulumi.set(__self__, "verify_connection", verify_connection)
|
5449
6061
|
|
@@ -5513,8 +6125,6 @@ class SecretsMountMongodbatlaArgs:
|
|
5513
6125
|
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
5514
6126
|
"""
|
5515
6127
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5516
|
-
|
5517
|
-
Supported list of database secrets engines that can be configured:
|
5518
6128
|
"""
|
5519
6129
|
return pulumi.get(self, "data")
|
5520
6130
|
|
@@ -5522,6 +6132,20 @@ class SecretsMountMongodbatlaArgs:
|
|
5522
6132
|
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
5523
6133
|
pulumi.set(self, "data", value)
|
5524
6134
|
|
6135
|
+
@property
|
6136
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
6137
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
|
6138
|
+
"""
|
6139
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
6140
|
+
|
6141
|
+
Supported list of database secrets engines that can be configured:
|
6142
|
+
"""
|
6143
|
+
return pulumi.get(self, "disable_automated_rotation")
|
6144
|
+
|
6145
|
+
@disable_automated_rotation.setter
|
6146
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
|
6147
|
+
pulumi.set(self, "disable_automated_rotation", value)
|
6148
|
+
|
5525
6149
|
@property
|
5526
6150
|
@pulumi.getter(name="pluginName")
|
5527
6151
|
def plugin_name(self) -> Optional[pulumi.Input[str]]:
|
@@ -5546,6 +6170,46 @@ class SecretsMountMongodbatlaArgs:
|
|
5546
6170
|
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
5547
6171
|
pulumi.set(self, "root_rotation_statements", value)
|
5548
6172
|
|
6173
|
+
@property
|
6174
|
+
@pulumi.getter(name="rotationPeriod")
|
6175
|
+
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
6176
|
+
"""
|
6177
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
6178
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
6179
|
+
"""
|
6180
|
+
return pulumi.get(self, "rotation_period")
|
6181
|
+
|
6182
|
+
@rotation_period.setter
|
6183
|
+
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
6184
|
+
pulumi.set(self, "rotation_period", value)
|
6185
|
+
|
6186
|
+
@property
|
6187
|
+
@pulumi.getter(name="rotationSchedule")
|
6188
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
6189
|
+
"""
|
6190
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
6191
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
6192
|
+
"""
|
6193
|
+
return pulumi.get(self, "rotation_schedule")
|
6194
|
+
|
6195
|
+
@rotation_schedule.setter
|
6196
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
6197
|
+
pulumi.set(self, "rotation_schedule", value)
|
6198
|
+
|
6199
|
+
@property
|
6200
|
+
@pulumi.getter(name="rotationWindow")
|
6201
|
+
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
6202
|
+
"""
|
6203
|
+
The maximum amount of time in seconds allowed to complete
|
6204
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
6205
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
6206
|
+
"""
|
6207
|
+
return pulumi.get(self, "rotation_window")
|
6208
|
+
|
6209
|
+
@rotation_window.setter
|
6210
|
+
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
6211
|
+
pulumi.set(self, "rotation_window", value)
|
6212
|
+
|
5549
6213
|
@property
|
5550
6214
|
@pulumi.getter(name="verifyConnection")
|
5551
6215
|
def verify_connection(self) -> Optional[pulumi.Input[bool]]:
|
@@ -5582,6 +6246,10 @@ if not MYPY:
|
|
5582
6246
|
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
5583
6247
|
"""
|
5584
6248
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6249
|
+
"""
|
6250
|
+
disable_automated_rotation: NotRequired[pulumi.Input[bool]]
|
6251
|
+
"""
|
6252
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
5585
6253
|
|
5586
6254
|
Supported list of database secrets engines that can be configured:
|
5587
6255
|
"""
|
@@ -5613,6 +6281,22 @@ if not MYPY:
|
|
5613
6281
|
"""
|
5614
6282
|
A list of database statements to be executed to rotate the root user's credentials.
|
5615
6283
|
"""
|
6284
|
+
rotation_period: NotRequired[pulumi.Input[int]]
|
6285
|
+
"""
|
6286
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
6287
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
6288
|
+
"""
|
6289
|
+
rotation_schedule: NotRequired[pulumi.Input[str]]
|
6290
|
+
"""
|
6291
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
6292
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
6293
|
+
"""
|
6294
|
+
rotation_window: NotRequired[pulumi.Input[int]]
|
6295
|
+
"""
|
6296
|
+
The maximum amount of time in seconds allowed to complete
|
6297
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
6298
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
6299
|
+
"""
|
5616
6300
|
username: NotRequired[pulumi.Input[str]]
|
5617
6301
|
"""
|
5618
6302
|
The root credential username used in the connection URL
|
@@ -5637,6 +6321,7 @@ class SecretsMountMssqlArgs:
|
|
5637
6321
|
connection_url: Optional[pulumi.Input[str]] = None,
|
5638
6322
|
contained_db: Optional[pulumi.Input[bool]] = None,
|
5639
6323
|
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
6324
|
+
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
5640
6325
|
disable_escaping: Optional[pulumi.Input[bool]] = None,
|
5641
6326
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
5642
6327
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
@@ -5644,6 +6329,9 @@ class SecretsMountMssqlArgs:
|
|
5644
6329
|
password: Optional[pulumi.Input[str]] = None,
|
5645
6330
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
5646
6331
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
6332
|
+
rotation_period: Optional[pulumi.Input[int]] = None,
|
6333
|
+
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
6334
|
+
rotation_window: Optional[pulumi.Input[int]] = None,
|
5647
6335
|
username: Optional[pulumi.Input[str]] = None,
|
5648
6336
|
username_template: Optional[pulumi.Input[str]] = None,
|
5649
6337
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
@@ -5654,6 +6342,7 @@ class SecretsMountMssqlArgs:
|
|
5654
6342
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
5655
6343
|
:param pulumi.Input[bool] contained_db: Set to true when the target is a Contained Database, e.g. AzureSQL.
|
5656
6344
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6345
|
+
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
5657
6346
|
|
5658
6347
|
Supported list of database secrets engines that can be configured:
|
5659
6348
|
:param pulumi.Input[bool] disable_escaping: Disable special character escaping in username and password
|
@@ -5663,6 +6352,13 @@ class SecretsMountMssqlArgs:
|
|
5663
6352
|
:param pulumi.Input[str] password: The root credential password used in the connection URL
|
5664
6353
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
5665
6354
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
6355
|
+
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
6356
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
6357
|
+
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
6358
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
6359
|
+
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
6360
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
6361
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
5666
6362
|
:param pulumi.Input[str] username: The root credential username used in the connection URL
|
5667
6363
|
:param pulumi.Input[str] username_template: Username generation template.
|
5668
6364
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
@@ -5677,6 +6373,8 @@ class SecretsMountMssqlArgs:
|
|
5677
6373
|
pulumi.set(__self__, "contained_db", contained_db)
|
5678
6374
|
if data is not None:
|
5679
6375
|
pulumi.set(__self__, "data", data)
|
6376
|
+
if disable_automated_rotation is not None:
|
6377
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
5680
6378
|
if disable_escaping is not None:
|
5681
6379
|
pulumi.set(__self__, "disable_escaping", disable_escaping)
|
5682
6380
|
if max_connection_lifetime is not None:
|
@@ -5691,6 +6389,12 @@ class SecretsMountMssqlArgs:
|
|
5691
6389
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
5692
6390
|
if root_rotation_statements is not None:
|
5693
6391
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
6392
|
+
if rotation_period is not None:
|
6393
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
6394
|
+
if rotation_schedule is not None:
|
6395
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
6396
|
+
if rotation_window is not None:
|
6397
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
5694
6398
|
if username is not None:
|
5695
6399
|
pulumi.set(__self__, "username", username)
|
5696
6400
|
if username_template is not None:
|
@@ -5752,8 +6456,6 @@ class SecretsMountMssqlArgs:
|
|
5752
6456
|
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
5753
6457
|
"""
|
5754
6458
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5755
|
-
|
5756
|
-
Supported list of database secrets engines that can be configured:
|
5757
6459
|
"""
|
5758
6460
|
return pulumi.get(self, "data")
|
5759
6461
|
|
@@ -5761,6 +6463,20 @@ class SecretsMountMssqlArgs:
|
|
5761
6463
|
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
5762
6464
|
pulumi.set(self, "data", value)
|
5763
6465
|
|
6466
|
+
@property
|
6467
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
6468
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
|
6469
|
+
"""
|
6470
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
6471
|
+
|
6472
|
+
Supported list of database secrets engines that can be configured:
|
6473
|
+
"""
|
6474
|
+
return pulumi.get(self, "disable_automated_rotation")
|
6475
|
+
|
6476
|
+
@disable_automated_rotation.setter
|
6477
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
|
6478
|
+
pulumi.set(self, "disable_automated_rotation", value)
|
6479
|
+
|
5764
6480
|
@property
|
5765
6481
|
@pulumi.getter(name="disableEscaping")
|
5766
6482
|
def disable_escaping(self) -> Optional[pulumi.Input[bool]]:
|
@@ -5846,19 +6562,59 @@ class SecretsMountMssqlArgs:
|
|
5846
6562
|
pulumi.set(self, "root_rotation_statements", value)
|
5847
6563
|
|
5848
6564
|
@property
|
5849
|
-
@pulumi.getter
|
5850
|
-
def
|
6565
|
+
@pulumi.getter(name="rotationPeriod")
|
6566
|
+
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
5851
6567
|
"""
|
5852
|
-
The
|
6568
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
6569
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
5853
6570
|
"""
|
5854
|
-
return pulumi.get(self, "
|
6571
|
+
return pulumi.get(self, "rotation_period")
|
5855
6572
|
|
5856
|
-
@
|
5857
|
-
def
|
5858
|
-
pulumi.set(self, "
|
6573
|
+
@rotation_period.setter
|
6574
|
+
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
6575
|
+
pulumi.set(self, "rotation_period", value)
|
5859
6576
|
|
5860
6577
|
@property
|
5861
|
-
@pulumi.getter(name="
|
6578
|
+
@pulumi.getter(name="rotationSchedule")
|
6579
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
6580
|
+
"""
|
6581
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
6582
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
6583
|
+
"""
|
6584
|
+
return pulumi.get(self, "rotation_schedule")
|
6585
|
+
|
6586
|
+
@rotation_schedule.setter
|
6587
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
6588
|
+
pulumi.set(self, "rotation_schedule", value)
|
6589
|
+
|
6590
|
+
@property
|
6591
|
+
@pulumi.getter(name="rotationWindow")
|
6592
|
+
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
6593
|
+
"""
|
6594
|
+
The maximum amount of time in seconds allowed to complete
|
6595
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
6596
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
6597
|
+
"""
|
6598
|
+
return pulumi.get(self, "rotation_window")
|
6599
|
+
|
6600
|
+
@rotation_window.setter
|
6601
|
+
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
6602
|
+
pulumi.set(self, "rotation_window", value)
|
6603
|
+
|
6604
|
+
@property
|
6605
|
+
@pulumi.getter
|
6606
|
+
def username(self) -> Optional[pulumi.Input[str]]:
|
6607
|
+
"""
|
6608
|
+
The root credential username used in the connection URL
|
6609
|
+
"""
|
6610
|
+
return pulumi.get(self, "username")
|
6611
|
+
|
6612
|
+
@username.setter
|
6613
|
+
def username(self, value: Optional[pulumi.Input[str]]):
|
6614
|
+
pulumi.set(self, "username", value)
|
6615
|
+
|
6616
|
+
@property
|
6617
|
+
@pulumi.getter(name="usernameTemplate")
|
5862
6618
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
5863
6619
|
"""
|
5864
6620
|
Username generation template.
|
@@ -5905,6 +6661,10 @@ if not MYPY:
|
|
5905
6661
|
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
5906
6662
|
"""
|
5907
6663
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6664
|
+
"""
|
6665
|
+
disable_automated_rotation: NotRequired[pulumi.Input[bool]]
|
6666
|
+
"""
|
6667
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
5908
6668
|
|
5909
6669
|
Supported list of database secrets engines that can be configured:
|
5910
6670
|
"""
|
@@ -5932,6 +6692,22 @@ if not MYPY:
|
|
5932
6692
|
"""
|
5933
6693
|
A list of database statements to be executed to rotate the root user's credentials.
|
5934
6694
|
"""
|
6695
|
+
rotation_period: NotRequired[pulumi.Input[int]]
|
6696
|
+
"""
|
6697
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
6698
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
6699
|
+
"""
|
6700
|
+
rotation_schedule: NotRequired[pulumi.Input[str]]
|
6701
|
+
"""
|
6702
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
6703
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
6704
|
+
"""
|
6705
|
+
rotation_window: NotRequired[pulumi.Input[int]]
|
6706
|
+
"""
|
6707
|
+
The maximum amount of time in seconds allowed to complete
|
6708
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
6709
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
6710
|
+
"""
|
5935
6711
|
service_account_json: NotRequired[pulumi.Input[str]]
|
5936
6712
|
"""
|
5937
6713
|
A JSON encoded credential for use with IAM authorization
|
@@ -5968,12 +6744,16 @@ class SecretsMountMysqlArgs:
|
|
5968
6744
|
auth_type: Optional[pulumi.Input[str]] = None,
|
5969
6745
|
connection_url: Optional[pulumi.Input[str]] = None,
|
5970
6746
|
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
6747
|
+
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
5971
6748
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
5972
6749
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
5973
6750
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
5974
6751
|
password: Optional[pulumi.Input[str]] = None,
|
5975
6752
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
5976
6753
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
6754
|
+
rotation_period: Optional[pulumi.Input[int]] = None,
|
6755
|
+
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
6756
|
+
rotation_window: Optional[pulumi.Input[int]] = None,
|
5977
6757
|
service_account_json: Optional[pulumi.Input[str]] = None,
|
5978
6758
|
tls_ca: Optional[pulumi.Input[str]] = None,
|
5979
6759
|
tls_certificate_key: Optional[pulumi.Input[str]] = None,
|
@@ -5987,6 +6767,7 @@ class SecretsMountMysqlArgs:
|
|
5987
6767
|
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5988
6768
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
5989
6769
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6770
|
+
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
5990
6771
|
|
5991
6772
|
Supported list of database secrets engines that can be configured:
|
5992
6773
|
:param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -5995,6 +6776,13 @@ class SecretsMountMysqlArgs:
|
|
5995
6776
|
:param pulumi.Input[str] password: The root credential password used in the connection URL
|
5996
6777
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
5997
6778
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
6779
|
+
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
6780
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
6781
|
+
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
6782
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
6783
|
+
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
6784
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
6785
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
5998
6786
|
:param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
|
5999
6787
|
:param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
6000
6788
|
:param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
@@ -6012,6 +6800,8 @@ class SecretsMountMysqlArgs:
|
|
6012
6800
|
pulumi.set(__self__, "connection_url", connection_url)
|
6013
6801
|
if data is not None:
|
6014
6802
|
pulumi.set(__self__, "data", data)
|
6803
|
+
if disable_automated_rotation is not None:
|
6804
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
6015
6805
|
if max_connection_lifetime is not None:
|
6016
6806
|
pulumi.set(__self__, "max_connection_lifetime", max_connection_lifetime)
|
6017
6807
|
if max_idle_connections is not None:
|
@@ -6024,6 +6814,12 @@ class SecretsMountMysqlArgs:
|
|
6024
6814
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
6025
6815
|
if root_rotation_statements is not None:
|
6026
6816
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
6817
|
+
if rotation_period is not None:
|
6818
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
6819
|
+
if rotation_schedule is not None:
|
6820
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
6821
|
+
if rotation_window is not None:
|
6822
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
6027
6823
|
if service_account_json is not None:
|
6028
6824
|
pulumi.set(__self__, "service_account_json", service_account_json)
|
6029
6825
|
if tls_ca is not None:
|
@@ -6091,8 +6887,6 @@ class SecretsMountMysqlArgs:
|
|
6091
6887
|
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
6092
6888
|
"""
|
6093
6889
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6094
|
-
|
6095
|
-
Supported list of database secrets engines that can be configured:
|
6096
6890
|
"""
|
6097
6891
|
return pulumi.get(self, "data")
|
6098
6892
|
|
@@ -6100,6 +6894,20 @@ class SecretsMountMysqlArgs:
|
|
6100
6894
|
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
6101
6895
|
pulumi.set(self, "data", value)
|
6102
6896
|
|
6897
|
+
@property
|
6898
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
6899
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
|
6900
|
+
"""
|
6901
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
6902
|
+
|
6903
|
+
Supported list of database secrets engines that can be configured:
|
6904
|
+
"""
|
6905
|
+
return pulumi.get(self, "disable_automated_rotation")
|
6906
|
+
|
6907
|
+
@disable_automated_rotation.setter
|
6908
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
|
6909
|
+
pulumi.set(self, "disable_automated_rotation", value)
|
6910
|
+
|
6103
6911
|
@property
|
6104
6912
|
@pulumi.getter(name="maxConnectionLifetime")
|
6105
6913
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
@@ -6172,6 +6980,46 @@ class SecretsMountMysqlArgs:
|
|
6172
6980
|
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
6173
6981
|
pulumi.set(self, "root_rotation_statements", value)
|
6174
6982
|
|
6983
|
+
@property
|
6984
|
+
@pulumi.getter(name="rotationPeriod")
|
6985
|
+
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
6986
|
+
"""
|
6987
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
6988
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
6989
|
+
"""
|
6990
|
+
return pulumi.get(self, "rotation_period")
|
6991
|
+
|
6992
|
+
@rotation_period.setter
|
6993
|
+
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
6994
|
+
pulumi.set(self, "rotation_period", value)
|
6995
|
+
|
6996
|
+
@property
|
6997
|
+
@pulumi.getter(name="rotationSchedule")
|
6998
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
6999
|
+
"""
|
7000
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
7001
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
7002
|
+
"""
|
7003
|
+
return pulumi.get(self, "rotation_schedule")
|
7004
|
+
|
7005
|
+
@rotation_schedule.setter
|
7006
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
7007
|
+
pulumi.set(self, "rotation_schedule", value)
|
7008
|
+
|
7009
|
+
@property
|
7010
|
+
@pulumi.getter(name="rotationWindow")
|
7011
|
+
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
7012
|
+
"""
|
7013
|
+
The maximum amount of time in seconds allowed to complete
|
7014
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
7015
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
7016
|
+
"""
|
7017
|
+
return pulumi.get(self, "rotation_window")
|
7018
|
+
|
7019
|
+
@rotation_window.setter
|
7020
|
+
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
7021
|
+
pulumi.set(self, "rotation_window", value)
|
7022
|
+
|
6175
7023
|
@property
|
6176
7024
|
@pulumi.getter(name="serviceAccountJson")
|
6177
7025
|
def service_account_json(self) -> Optional[pulumi.Input[str]]:
|
@@ -6268,6 +7116,10 @@ if not MYPY:
|
|
6268
7116
|
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
6269
7117
|
"""
|
6270
7118
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7119
|
+
"""
|
7120
|
+
disable_automated_rotation: NotRequired[pulumi.Input[bool]]
|
7121
|
+
"""
|
7122
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
6271
7123
|
|
6272
7124
|
Supported list of database secrets engines that can be configured:
|
6273
7125
|
"""
|
@@ -6295,6 +7147,22 @@ if not MYPY:
|
|
6295
7147
|
"""
|
6296
7148
|
A list of database statements to be executed to rotate the root user's credentials.
|
6297
7149
|
"""
|
7150
|
+
rotation_period: NotRequired[pulumi.Input[int]]
|
7151
|
+
"""
|
7152
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
7153
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
7154
|
+
"""
|
7155
|
+
rotation_schedule: NotRequired[pulumi.Input[str]]
|
7156
|
+
"""
|
7157
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
7158
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
7159
|
+
"""
|
7160
|
+
rotation_window: NotRequired[pulumi.Input[int]]
|
7161
|
+
"""
|
7162
|
+
The maximum amount of time in seconds allowed to complete
|
7163
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
7164
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
7165
|
+
"""
|
6298
7166
|
service_account_json: NotRequired[pulumi.Input[str]]
|
6299
7167
|
"""
|
6300
7168
|
A JSON encoded credential for use with IAM authorization
|
@@ -6331,12 +7199,16 @@ class SecretsMountMysqlAuroraArgs:
|
|
6331
7199
|
auth_type: Optional[pulumi.Input[str]] = None,
|
6332
7200
|
connection_url: Optional[pulumi.Input[str]] = None,
|
6333
7201
|
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
7202
|
+
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
6334
7203
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
6335
7204
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
6336
7205
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
6337
7206
|
password: Optional[pulumi.Input[str]] = None,
|
6338
7207
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
6339
7208
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
7209
|
+
rotation_period: Optional[pulumi.Input[int]] = None,
|
7210
|
+
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
7211
|
+
rotation_window: Optional[pulumi.Input[int]] = None,
|
6340
7212
|
service_account_json: Optional[pulumi.Input[str]] = None,
|
6341
7213
|
tls_ca: Optional[pulumi.Input[str]] = None,
|
6342
7214
|
tls_certificate_key: Optional[pulumi.Input[str]] = None,
|
@@ -6350,6 +7222,7 @@ class SecretsMountMysqlAuroraArgs:
|
|
6350
7222
|
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
6351
7223
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
6352
7224
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7225
|
+
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
6353
7226
|
|
6354
7227
|
Supported list of database secrets engines that can be configured:
|
6355
7228
|
:param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -6358,6 +7231,13 @@ class SecretsMountMysqlAuroraArgs:
|
|
6358
7231
|
:param pulumi.Input[str] password: The root credential password used in the connection URL
|
6359
7232
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
6360
7233
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
7234
|
+
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
7235
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
7236
|
+
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
7237
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
7238
|
+
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
7239
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
7240
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
6361
7241
|
:param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
|
6362
7242
|
:param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
6363
7243
|
:param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
@@ -6375,6 +7255,8 @@ class SecretsMountMysqlAuroraArgs:
|
|
6375
7255
|
pulumi.set(__self__, "connection_url", connection_url)
|
6376
7256
|
if data is not None:
|
6377
7257
|
pulumi.set(__self__, "data", data)
|
7258
|
+
if disable_automated_rotation is not None:
|
7259
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
6378
7260
|
if max_connection_lifetime is not None:
|
6379
7261
|
pulumi.set(__self__, "max_connection_lifetime", max_connection_lifetime)
|
6380
7262
|
if max_idle_connections is not None:
|
@@ -6387,6 +7269,12 @@ class SecretsMountMysqlAuroraArgs:
|
|
6387
7269
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
6388
7270
|
if root_rotation_statements is not None:
|
6389
7271
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
7272
|
+
if rotation_period is not None:
|
7273
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
7274
|
+
if rotation_schedule is not None:
|
7275
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
7276
|
+
if rotation_window is not None:
|
7277
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
6390
7278
|
if service_account_json is not None:
|
6391
7279
|
pulumi.set(__self__, "service_account_json", service_account_json)
|
6392
7280
|
if tls_ca is not None:
|
@@ -6454,8 +7342,6 @@ class SecretsMountMysqlAuroraArgs:
|
|
6454
7342
|
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
6455
7343
|
"""
|
6456
7344
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6457
|
-
|
6458
|
-
Supported list of database secrets engines that can be configured:
|
6459
7345
|
"""
|
6460
7346
|
return pulumi.get(self, "data")
|
6461
7347
|
|
@@ -6463,6 +7349,20 @@ class SecretsMountMysqlAuroraArgs:
|
|
6463
7349
|
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
6464
7350
|
pulumi.set(self, "data", value)
|
6465
7351
|
|
7352
|
+
@property
|
7353
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
7354
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
|
7355
|
+
"""
|
7356
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
7357
|
+
|
7358
|
+
Supported list of database secrets engines that can be configured:
|
7359
|
+
"""
|
7360
|
+
return pulumi.get(self, "disable_automated_rotation")
|
7361
|
+
|
7362
|
+
@disable_automated_rotation.setter
|
7363
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
|
7364
|
+
pulumi.set(self, "disable_automated_rotation", value)
|
7365
|
+
|
6466
7366
|
@property
|
6467
7367
|
@pulumi.getter(name="maxConnectionLifetime")
|
6468
7368
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
@@ -6535,6 +7435,46 @@ class SecretsMountMysqlAuroraArgs:
|
|
6535
7435
|
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
6536
7436
|
pulumi.set(self, "root_rotation_statements", value)
|
6537
7437
|
|
7438
|
+
@property
|
7439
|
+
@pulumi.getter(name="rotationPeriod")
|
7440
|
+
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
7441
|
+
"""
|
7442
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
7443
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
7444
|
+
"""
|
7445
|
+
return pulumi.get(self, "rotation_period")
|
7446
|
+
|
7447
|
+
@rotation_period.setter
|
7448
|
+
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
7449
|
+
pulumi.set(self, "rotation_period", value)
|
7450
|
+
|
7451
|
+
@property
|
7452
|
+
@pulumi.getter(name="rotationSchedule")
|
7453
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
7454
|
+
"""
|
7455
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
7456
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
7457
|
+
"""
|
7458
|
+
return pulumi.get(self, "rotation_schedule")
|
7459
|
+
|
7460
|
+
@rotation_schedule.setter
|
7461
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
7462
|
+
pulumi.set(self, "rotation_schedule", value)
|
7463
|
+
|
7464
|
+
@property
|
7465
|
+
@pulumi.getter(name="rotationWindow")
|
7466
|
+
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
7467
|
+
"""
|
7468
|
+
The maximum amount of time in seconds allowed to complete
|
7469
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
7470
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
7471
|
+
"""
|
7472
|
+
return pulumi.get(self, "rotation_window")
|
7473
|
+
|
7474
|
+
@rotation_window.setter
|
7475
|
+
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
7476
|
+
pulumi.set(self, "rotation_window", value)
|
7477
|
+
|
6538
7478
|
@property
|
6539
7479
|
@pulumi.getter(name="serviceAccountJson")
|
6540
7480
|
def service_account_json(self) -> Optional[pulumi.Input[str]]:
|
@@ -6631,6 +7571,10 @@ if not MYPY:
|
|
6631
7571
|
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
6632
7572
|
"""
|
6633
7573
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7574
|
+
"""
|
7575
|
+
disable_automated_rotation: NotRequired[pulumi.Input[bool]]
|
7576
|
+
"""
|
7577
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
6634
7578
|
|
6635
7579
|
Supported list of database secrets engines that can be configured:
|
6636
7580
|
"""
|
@@ -6658,6 +7602,22 @@ if not MYPY:
|
|
6658
7602
|
"""
|
6659
7603
|
A list of database statements to be executed to rotate the root user's credentials.
|
6660
7604
|
"""
|
7605
|
+
rotation_period: NotRequired[pulumi.Input[int]]
|
7606
|
+
"""
|
7607
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
7608
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
7609
|
+
"""
|
7610
|
+
rotation_schedule: NotRequired[pulumi.Input[str]]
|
7611
|
+
"""
|
7612
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
7613
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
7614
|
+
"""
|
7615
|
+
rotation_window: NotRequired[pulumi.Input[int]]
|
7616
|
+
"""
|
7617
|
+
The maximum amount of time in seconds allowed to complete
|
7618
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
7619
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
7620
|
+
"""
|
6661
7621
|
service_account_json: NotRequired[pulumi.Input[str]]
|
6662
7622
|
"""
|
6663
7623
|
A JSON encoded credential for use with IAM authorization
|
@@ -6694,12 +7654,16 @@ class SecretsMountMysqlLegacyArgs:
|
|
6694
7654
|
auth_type: Optional[pulumi.Input[str]] = None,
|
6695
7655
|
connection_url: Optional[pulumi.Input[str]] = None,
|
6696
7656
|
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
7657
|
+
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
6697
7658
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
6698
7659
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
6699
7660
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
6700
7661
|
password: Optional[pulumi.Input[str]] = None,
|
6701
7662
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
6702
7663
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
7664
|
+
rotation_period: Optional[pulumi.Input[int]] = None,
|
7665
|
+
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
7666
|
+
rotation_window: Optional[pulumi.Input[int]] = None,
|
6703
7667
|
service_account_json: Optional[pulumi.Input[str]] = None,
|
6704
7668
|
tls_ca: Optional[pulumi.Input[str]] = None,
|
6705
7669
|
tls_certificate_key: Optional[pulumi.Input[str]] = None,
|
@@ -6713,6 +7677,7 @@ class SecretsMountMysqlLegacyArgs:
|
|
6713
7677
|
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
6714
7678
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
6715
7679
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7680
|
+
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
6716
7681
|
|
6717
7682
|
Supported list of database secrets engines that can be configured:
|
6718
7683
|
:param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -6721,6 +7686,13 @@ class SecretsMountMysqlLegacyArgs:
|
|
6721
7686
|
:param pulumi.Input[str] password: The root credential password used in the connection URL
|
6722
7687
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
6723
7688
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
7689
|
+
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
7690
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
7691
|
+
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
7692
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
7693
|
+
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
7694
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
7695
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
6724
7696
|
:param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
|
6725
7697
|
:param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
6726
7698
|
:param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
@@ -6738,6 +7710,8 @@ class SecretsMountMysqlLegacyArgs:
|
|
6738
7710
|
pulumi.set(__self__, "connection_url", connection_url)
|
6739
7711
|
if data is not None:
|
6740
7712
|
pulumi.set(__self__, "data", data)
|
7713
|
+
if disable_automated_rotation is not None:
|
7714
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
6741
7715
|
if max_connection_lifetime is not None:
|
6742
7716
|
pulumi.set(__self__, "max_connection_lifetime", max_connection_lifetime)
|
6743
7717
|
if max_idle_connections is not None:
|
@@ -6750,6 +7724,12 @@ class SecretsMountMysqlLegacyArgs:
|
|
6750
7724
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
6751
7725
|
if root_rotation_statements is not None:
|
6752
7726
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
7727
|
+
if rotation_period is not None:
|
7728
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
7729
|
+
if rotation_schedule is not None:
|
7730
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
7731
|
+
if rotation_window is not None:
|
7732
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
6753
7733
|
if service_account_json is not None:
|
6754
7734
|
pulumi.set(__self__, "service_account_json", service_account_json)
|
6755
7735
|
if tls_ca is not None:
|
@@ -6817,8 +7797,6 @@ class SecretsMountMysqlLegacyArgs:
|
|
6817
7797
|
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
6818
7798
|
"""
|
6819
7799
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6820
|
-
|
6821
|
-
Supported list of database secrets engines that can be configured:
|
6822
7800
|
"""
|
6823
7801
|
return pulumi.get(self, "data")
|
6824
7802
|
|
@@ -6826,6 +7804,20 @@ class SecretsMountMysqlLegacyArgs:
|
|
6826
7804
|
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
6827
7805
|
pulumi.set(self, "data", value)
|
6828
7806
|
|
7807
|
+
@property
|
7808
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
7809
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
|
7810
|
+
"""
|
7811
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
7812
|
+
|
7813
|
+
Supported list of database secrets engines that can be configured:
|
7814
|
+
"""
|
7815
|
+
return pulumi.get(self, "disable_automated_rotation")
|
7816
|
+
|
7817
|
+
@disable_automated_rotation.setter
|
7818
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
|
7819
|
+
pulumi.set(self, "disable_automated_rotation", value)
|
7820
|
+
|
6829
7821
|
@property
|
6830
7822
|
@pulumi.getter(name="maxConnectionLifetime")
|
6831
7823
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
@@ -6898,6 +7890,46 @@ class SecretsMountMysqlLegacyArgs:
|
|
6898
7890
|
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
6899
7891
|
pulumi.set(self, "root_rotation_statements", value)
|
6900
7892
|
|
7893
|
+
@property
|
7894
|
+
@pulumi.getter(name="rotationPeriod")
|
7895
|
+
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
7896
|
+
"""
|
7897
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
7898
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
7899
|
+
"""
|
7900
|
+
return pulumi.get(self, "rotation_period")
|
7901
|
+
|
7902
|
+
@rotation_period.setter
|
7903
|
+
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
7904
|
+
pulumi.set(self, "rotation_period", value)
|
7905
|
+
|
7906
|
+
@property
|
7907
|
+
@pulumi.getter(name="rotationSchedule")
|
7908
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
7909
|
+
"""
|
7910
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
7911
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
7912
|
+
"""
|
7913
|
+
return pulumi.get(self, "rotation_schedule")
|
7914
|
+
|
7915
|
+
@rotation_schedule.setter
|
7916
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
7917
|
+
pulumi.set(self, "rotation_schedule", value)
|
7918
|
+
|
7919
|
+
@property
|
7920
|
+
@pulumi.getter(name="rotationWindow")
|
7921
|
+
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
7922
|
+
"""
|
7923
|
+
The maximum amount of time in seconds allowed to complete
|
7924
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
7925
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
7926
|
+
"""
|
7927
|
+
return pulumi.get(self, "rotation_window")
|
7928
|
+
|
7929
|
+
@rotation_window.setter
|
7930
|
+
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
7931
|
+
pulumi.set(self, "rotation_window", value)
|
7932
|
+
|
6901
7933
|
@property
|
6902
7934
|
@pulumi.getter(name="serviceAccountJson")
|
6903
7935
|
def service_account_json(self) -> Optional[pulumi.Input[str]]:
|
@@ -6994,6 +8026,10 @@ if not MYPY:
|
|
6994
8026
|
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
6995
8027
|
"""
|
6996
8028
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8029
|
+
"""
|
8030
|
+
disable_automated_rotation: NotRequired[pulumi.Input[bool]]
|
8031
|
+
"""
|
8032
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
6997
8033
|
|
6998
8034
|
Supported list of database secrets engines that can be configured:
|
6999
8035
|
"""
|
@@ -7021,6 +8057,22 @@ if not MYPY:
|
|
7021
8057
|
"""
|
7022
8058
|
A list of database statements to be executed to rotate the root user's credentials.
|
7023
8059
|
"""
|
8060
|
+
rotation_period: NotRequired[pulumi.Input[int]]
|
8061
|
+
"""
|
8062
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
8063
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
8064
|
+
"""
|
8065
|
+
rotation_schedule: NotRequired[pulumi.Input[str]]
|
8066
|
+
"""
|
8067
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
8068
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
8069
|
+
"""
|
8070
|
+
rotation_window: NotRequired[pulumi.Input[int]]
|
8071
|
+
"""
|
8072
|
+
The maximum amount of time in seconds allowed to complete
|
8073
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
8074
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
8075
|
+
"""
|
7024
8076
|
service_account_json: NotRequired[pulumi.Input[str]]
|
7025
8077
|
"""
|
7026
8078
|
A JSON encoded credential for use with IAM authorization
|
@@ -7057,12 +8109,16 @@ class SecretsMountMysqlRdArgs:
|
|
7057
8109
|
auth_type: Optional[pulumi.Input[str]] = None,
|
7058
8110
|
connection_url: Optional[pulumi.Input[str]] = None,
|
7059
8111
|
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
8112
|
+
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
7060
8113
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
7061
8114
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
7062
8115
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
7063
8116
|
password: Optional[pulumi.Input[str]] = None,
|
7064
8117
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
7065
8118
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
8119
|
+
rotation_period: Optional[pulumi.Input[int]] = None,
|
8120
|
+
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
8121
|
+
rotation_window: Optional[pulumi.Input[int]] = None,
|
7066
8122
|
service_account_json: Optional[pulumi.Input[str]] = None,
|
7067
8123
|
tls_ca: Optional[pulumi.Input[str]] = None,
|
7068
8124
|
tls_certificate_key: Optional[pulumi.Input[str]] = None,
|
@@ -7076,6 +8132,7 @@ class SecretsMountMysqlRdArgs:
|
|
7076
8132
|
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
7077
8133
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
7078
8134
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8135
|
+
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
7079
8136
|
|
7080
8137
|
Supported list of database secrets engines that can be configured:
|
7081
8138
|
:param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -7084,6 +8141,13 @@ class SecretsMountMysqlRdArgs:
|
|
7084
8141
|
:param pulumi.Input[str] password: The root credential password used in the connection URL
|
7085
8142
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
7086
8143
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
8144
|
+
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
8145
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
8146
|
+
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
8147
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
8148
|
+
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
8149
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
8150
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
7087
8151
|
:param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
|
7088
8152
|
:param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
7089
8153
|
:param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
@@ -7101,6 +8165,8 @@ class SecretsMountMysqlRdArgs:
|
|
7101
8165
|
pulumi.set(__self__, "connection_url", connection_url)
|
7102
8166
|
if data is not None:
|
7103
8167
|
pulumi.set(__self__, "data", data)
|
8168
|
+
if disable_automated_rotation is not None:
|
8169
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
7104
8170
|
if max_connection_lifetime is not None:
|
7105
8171
|
pulumi.set(__self__, "max_connection_lifetime", max_connection_lifetime)
|
7106
8172
|
if max_idle_connections is not None:
|
@@ -7113,6 +8179,12 @@ class SecretsMountMysqlRdArgs:
|
|
7113
8179
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
7114
8180
|
if root_rotation_statements is not None:
|
7115
8181
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
8182
|
+
if rotation_period is not None:
|
8183
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
8184
|
+
if rotation_schedule is not None:
|
8185
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
8186
|
+
if rotation_window is not None:
|
8187
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
7116
8188
|
if service_account_json is not None:
|
7117
8189
|
pulumi.set(__self__, "service_account_json", service_account_json)
|
7118
8190
|
if tls_ca is not None:
|
@@ -7180,8 +8252,6 @@ class SecretsMountMysqlRdArgs:
|
|
7180
8252
|
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
7181
8253
|
"""
|
7182
8254
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7183
|
-
|
7184
|
-
Supported list of database secrets engines that can be configured:
|
7185
8255
|
"""
|
7186
8256
|
return pulumi.get(self, "data")
|
7187
8257
|
|
@@ -7189,6 +8259,20 @@ class SecretsMountMysqlRdArgs:
|
|
7189
8259
|
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
7190
8260
|
pulumi.set(self, "data", value)
|
7191
8261
|
|
8262
|
+
@property
|
8263
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
8264
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
|
8265
|
+
"""
|
8266
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
8267
|
+
|
8268
|
+
Supported list of database secrets engines that can be configured:
|
8269
|
+
"""
|
8270
|
+
return pulumi.get(self, "disable_automated_rotation")
|
8271
|
+
|
8272
|
+
@disable_automated_rotation.setter
|
8273
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
|
8274
|
+
pulumi.set(self, "disable_automated_rotation", value)
|
8275
|
+
|
7192
8276
|
@property
|
7193
8277
|
@pulumi.getter(name="maxConnectionLifetime")
|
7194
8278
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
@@ -7261,6 +8345,46 @@ class SecretsMountMysqlRdArgs:
|
|
7261
8345
|
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
7262
8346
|
pulumi.set(self, "root_rotation_statements", value)
|
7263
8347
|
|
8348
|
+
@property
|
8349
|
+
@pulumi.getter(name="rotationPeriod")
|
8350
|
+
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
8351
|
+
"""
|
8352
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
8353
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
8354
|
+
"""
|
8355
|
+
return pulumi.get(self, "rotation_period")
|
8356
|
+
|
8357
|
+
@rotation_period.setter
|
8358
|
+
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
8359
|
+
pulumi.set(self, "rotation_period", value)
|
8360
|
+
|
8361
|
+
@property
|
8362
|
+
@pulumi.getter(name="rotationSchedule")
|
8363
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
8364
|
+
"""
|
8365
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
8366
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
8367
|
+
"""
|
8368
|
+
return pulumi.get(self, "rotation_schedule")
|
8369
|
+
|
8370
|
+
@rotation_schedule.setter
|
8371
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
8372
|
+
pulumi.set(self, "rotation_schedule", value)
|
8373
|
+
|
8374
|
+
@property
|
8375
|
+
@pulumi.getter(name="rotationWindow")
|
8376
|
+
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
8377
|
+
"""
|
8378
|
+
The maximum amount of time in seconds allowed to complete
|
8379
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
8380
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
8381
|
+
"""
|
8382
|
+
return pulumi.get(self, "rotation_window")
|
8383
|
+
|
8384
|
+
@rotation_window.setter
|
8385
|
+
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
8386
|
+
pulumi.set(self, "rotation_window", value)
|
8387
|
+
|
7264
8388
|
@property
|
7265
8389
|
@pulumi.getter(name="serviceAccountJson")
|
7266
8390
|
def service_account_json(self) -> Optional[pulumi.Input[str]]:
|
@@ -7353,6 +8477,10 @@ if not MYPY:
|
|
7353
8477
|
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
7354
8478
|
"""
|
7355
8479
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8480
|
+
"""
|
8481
|
+
disable_automated_rotation: NotRequired[pulumi.Input[bool]]
|
8482
|
+
"""
|
8483
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
7356
8484
|
|
7357
8485
|
Supported list of database secrets engines that can be configured:
|
7358
8486
|
"""
|
@@ -7384,6 +8512,22 @@ if not MYPY:
|
|
7384
8512
|
"""
|
7385
8513
|
A list of database statements to be executed to rotate the root user's credentials.
|
7386
8514
|
"""
|
8515
|
+
rotation_period: NotRequired[pulumi.Input[int]]
|
8516
|
+
"""
|
8517
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
8518
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
8519
|
+
"""
|
8520
|
+
rotation_schedule: NotRequired[pulumi.Input[str]]
|
8521
|
+
"""
|
8522
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
8523
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
8524
|
+
"""
|
8525
|
+
rotation_window: NotRequired[pulumi.Input[int]]
|
8526
|
+
"""
|
8527
|
+
The maximum amount of time in seconds allowed to complete
|
8528
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
8529
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
8530
|
+
"""
|
7387
8531
|
split_statements: NotRequired[pulumi.Input[bool]]
|
7388
8532
|
"""
|
7389
8533
|
Set to true in order to split statements after semi-colons.
|
@@ -7411,6 +8555,7 @@ class SecretsMountOracleArgs:
|
|
7411
8555
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
7412
8556
|
connection_url: Optional[pulumi.Input[str]] = None,
|
7413
8557
|
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
8558
|
+
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
7414
8559
|
disconnect_sessions: Optional[pulumi.Input[bool]] = None,
|
7415
8560
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
7416
8561
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
@@ -7418,6 +8563,9 @@ class SecretsMountOracleArgs:
|
|
7418
8563
|
password: Optional[pulumi.Input[str]] = None,
|
7419
8564
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
7420
8565
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
8566
|
+
rotation_period: Optional[pulumi.Input[int]] = None,
|
8567
|
+
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
8568
|
+
rotation_window: Optional[pulumi.Input[int]] = None,
|
7421
8569
|
split_statements: Optional[pulumi.Input[bool]] = None,
|
7422
8570
|
username: Optional[pulumi.Input[str]] = None,
|
7423
8571
|
username_template: Optional[pulumi.Input[str]] = None,
|
@@ -7428,6 +8576,7 @@ class SecretsMountOracleArgs:
|
|
7428
8576
|
connection.
|
7429
8577
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
7430
8578
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8579
|
+
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
7431
8580
|
|
7432
8581
|
Supported list of database secrets engines that can be configured:
|
7433
8582
|
:param pulumi.Input[bool] disconnect_sessions: Set to true to disconnect any open sessions prior to running the revocation statements.
|
@@ -7437,6 +8586,13 @@ class SecretsMountOracleArgs:
|
|
7437
8586
|
:param pulumi.Input[str] password: The root credential password used in the connection URL
|
7438
8587
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
7439
8588
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
8589
|
+
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
8590
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
8591
|
+
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
8592
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
8593
|
+
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
8594
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
8595
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
7440
8596
|
:param pulumi.Input[bool] split_statements: Set to true in order to split statements after semi-colons.
|
7441
8597
|
:param pulumi.Input[str] username: The root credential username used in the connection URL
|
7442
8598
|
:param pulumi.Input[str] username_template: Username generation template.
|
@@ -7450,6 +8606,8 @@ class SecretsMountOracleArgs:
|
|
7450
8606
|
pulumi.set(__self__, "connection_url", connection_url)
|
7451
8607
|
if data is not None:
|
7452
8608
|
pulumi.set(__self__, "data", data)
|
8609
|
+
if disable_automated_rotation is not None:
|
8610
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
7453
8611
|
if disconnect_sessions is not None:
|
7454
8612
|
pulumi.set(__self__, "disconnect_sessions", disconnect_sessions)
|
7455
8613
|
if max_connection_lifetime is not None:
|
@@ -7464,6 +8622,12 @@ class SecretsMountOracleArgs:
|
|
7464
8622
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
7465
8623
|
if root_rotation_statements is not None:
|
7466
8624
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
8625
|
+
if rotation_period is not None:
|
8626
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
8627
|
+
if rotation_schedule is not None:
|
8628
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
8629
|
+
if rotation_window is not None:
|
8630
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
7467
8631
|
if split_statements is not None:
|
7468
8632
|
pulumi.set(__self__, "split_statements", split_statements)
|
7469
8633
|
if username is not None:
|
@@ -7515,8 +8679,6 @@ class SecretsMountOracleArgs:
|
|
7515
8679
|
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
7516
8680
|
"""
|
7517
8681
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7518
|
-
|
7519
|
-
Supported list of database secrets engines that can be configured:
|
7520
8682
|
"""
|
7521
8683
|
return pulumi.get(self, "data")
|
7522
8684
|
|
@@ -7524,6 +8686,20 @@ class SecretsMountOracleArgs:
|
|
7524
8686
|
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
7525
8687
|
pulumi.set(self, "data", value)
|
7526
8688
|
|
8689
|
+
@property
|
8690
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
8691
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
|
8692
|
+
"""
|
8693
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
8694
|
+
|
8695
|
+
Supported list of database secrets engines that can be configured:
|
8696
|
+
"""
|
8697
|
+
return pulumi.get(self, "disable_automated_rotation")
|
8698
|
+
|
8699
|
+
@disable_automated_rotation.setter
|
8700
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
|
8701
|
+
pulumi.set(self, "disable_automated_rotation", value)
|
8702
|
+
|
7527
8703
|
@property
|
7528
8704
|
@pulumi.getter(name="disconnectSessions")
|
7529
8705
|
def disconnect_sessions(self) -> Optional[pulumi.Input[bool]]:
|
@@ -7608,6 +8784,46 @@ class SecretsMountOracleArgs:
|
|
7608
8784
|
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
7609
8785
|
pulumi.set(self, "root_rotation_statements", value)
|
7610
8786
|
|
8787
|
+
@property
|
8788
|
+
@pulumi.getter(name="rotationPeriod")
|
8789
|
+
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
8790
|
+
"""
|
8791
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
8792
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
8793
|
+
"""
|
8794
|
+
return pulumi.get(self, "rotation_period")
|
8795
|
+
|
8796
|
+
@rotation_period.setter
|
8797
|
+
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
8798
|
+
pulumi.set(self, "rotation_period", value)
|
8799
|
+
|
8800
|
+
@property
|
8801
|
+
@pulumi.getter(name="rotationSchedule")
|
8802
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
8803
|
+
"""
|
8804
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
8805
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
8806
|
+
"""
|
8807
|
+
return pulumi.get(self, "rotation_schedule")
|
8808
|
+
|
8809
|
+
@rotation_schedule.setter
|
8810
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
8811
|
+
pulumi.set(self, "rotation_schedule", value)
|
8812
|
+
|
8813
|
+
@property
|
8814
|
+
@pulumi.getter(name="rotationWindow")
|
8815
|
+
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
8816
|
+
"""
|
8817
|
+
The maximum amount of time in seconds allowed to complete
|
8818
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
8819
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
8820
|
+
"""
|
8821
|
+
return pulumi.get(self, "rotation_window")
|
8822
|
+
|
8823
|
+
@rotation_window.setter
|
8824
|
+
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
8825
|
+
pulumi.set(self, "rotation_window", value)
|
8826
|
+
|
7611
8827
|
@property
|
7612
8828
|
@pulumi.getter(name="splitStatements")
|
7613
8829
|
def split_statements(self) -> Optional[pulumi.Input[bool]]:
|
@@ -7680,6 +8896,10 @@ if not MYPY:
|
|
7680
8896
|
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
7681
8897
|
"""
|
7682
8898
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8899
|
+
"""
|
8900
|
+
disable_automated_rotation: NotRequired[pulumi.Input[bool]]
|
8901
|
+
"""
|
8902
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
7683
8903
|
|
7684
8904
|
Supported list of database secrets engines that can be configured:
|
7685
8905
|
"""
|
@@ -7703,6 +8923,10 @@ if not MYPY:
|
|
7703
8923
|
"""
|
7704
8924
|
The root credential password used in the connection URL
|
7705
8925
|
"""
|
8926
|
+
password_authentication: NotRequired[pulumi.Input[str]]
|
8927
|
+
"""
|
8928
|
+
When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
8929
|
+
"""
|
7706
8930
|
plugin_name: NotRequired[pulumi.Input[str]]
|
7707
8931
|
"""
|
7708
8932
|
Specifies the name of the plugin to use.
|
@@ -7715,6 +8939,22 @@ if not MYPY:
|
|
7715
8939
|
"""
|
7716
8940
|
A list of database statements to be executed to rotate the root user's credentials.
|
7717
8941
|
"""
|
8942
|
+
rotation_period: NotRequired[pulumi.Input[int]]
|
8943
|
+
"""
|
8944
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
8945
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
8946
|
+
"""
|
8947
|
+
rotation_schedule: NotRequired[pulumi.Input[str]]
|
8948
|
+
"""
|
8949
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
8950
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
8951
|
+
"""
|
8952
|
+
rotation_window: NotRequired[pulumi.Input[int]]
|
8953
|
+
"""
|
8954
|
+
The maximum amount of time in seconds allowed to complete
|
8955
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
8956
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
8957
|
+
"""
|
7718
8958
|
self_managed: NotRequired[pulumi.Input[bool]]
|
7719
8959
|
"""
|
7720
8960
|
If set, allows onboarding static roles with a rootless connection configuration.
|
@@ -7755,14 +8995,19 @@ class SecretsMountPostgresqlArgs:
|
|
7755
8995
|
auth_type: Optional[pulumi.Input[str]] = None,
|
7756
8996
|
connection_url: Optional[pulumi.Input[str]] = None,
|
7757
8997
|
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
8998
|
+
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
7758
8999
|
disable_escaping: Optional[pulumi.Input[bool]] = None,
|
7759
9000
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
7760
9001
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
7761
9002
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
7762
9003
|
password: Optional[pulumi.Input[str]] = None,
|
9004
|
+
password_authentication: Optional[pulumi.Input[str]] = None,
|
7763
9005
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
7764
9006
|
private_key: Optional[pulumi.Input[str]] = None,
|
7765
9007
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
9008
|
+
rotation_period: Optional[pulumi.Input[int]] = None,
|
9009
|
+
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
9010
|
+
rotation_window: Optional[pulumi.Input[int]] = None,
|
7766
9011
|
self_managed: Optional[pulumi.Input[bool]] = None,
|
7767
9012
|
service_account_json: Optional[pulumi.Input[str]] = None,
|
7768
9013
|
tls_ca: Optional[pulumi.Input[str]] = None,
|
@@ -7777,6 +9022,7 @@ class SecretsMountPostgresqlArgs:
|
|
7777
9022
|
:param pulumi.Input[str] auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
7778
9023
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
7779
9024
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
9025
|
+
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
7780
9026
|
|
7781
9027
|
Supported list of database secrets engines that can be configured:
|
7782
9028
|
:param pulumi.Input[bool] disable_escaping: Disable special character escaping in username and password
|
@@ -7784,9 +9030,17 @@ class SecretsMountPostgresqlArgs:
|
|
7784
9030
|
:param pulumi.Input[int] max_idle_connections: Maximum number of idle connections to the database.
|
7785
9031
|
:param pulumi.Input[int] max_open_connections: Maximum number of open connections to the database.
|
7786
9032
|
:param pulumi.Input[str] password: The root credential password used in the connection URL
|
9033
|
+
:param pulumi.Input[str] password_authentication: When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
7787
9034
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
7788
9035
|
:param pulumi.Input[str] private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
|
7789
9036
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
9037
|
+
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
9038
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
9039
|
+
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
9040
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
9041
|
+
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
9042
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
9043
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
7790
9044
|
:param pulumi.Input[bool] self_managed: If set, allows onboarding static roles with a rootless connection configuration.
|
7791
9045
|
:param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
|
7792
9046
|
:param pulumi.Input[str] tls_ca: The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
@@ -7805,6 +9059,8 @@ class SecretsMountPostgresqlArgs:
|
|
7805
9059
|
pulumi.set(__self__, "connection_url", connection_url)
|
7806
9060
|
if data is not None:
|
7807
9061
|
pulumi.set(__self__, "data", data)
|
9062
|
+
if disable_automated_rotation is not None:
|
9063
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
7808
9064
|
if disable_escaping is not None:
|
7809
9065
|
pulumi.set(__self__, "disable_escaping", disable_escaping)
|
7810
9066
|
if max_connection_lifetime is not None:
|
@@ -7815,12 +9071,20 @@ class SecretsMountPostgresqlArgs:
|
|
7815
9071
|
pulumi.set(__self__, "max_open_connections", max_open_connections)
|
7816
9072
|
if password is not None:
|
7817
9073
|
pulumi.set(__self__, "password", password)
|
9074
|
+
if password_authentication is not None:
|
9075
|
+
pulumi.set(__self__, "password_authentication", password_authentication)
|
7818
9076
|
if plugin_name is not None:
|
7819
9077
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
7820
9078
|
if private_key is not None:
|
7821
9079
|
pulumi.set(__self__, "private_key", private_key)
|
7822
9080
|
if root_rotation_statements is not None:
|
7823
9081
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
9082
|
+
if rotation_period is not None:
|
9083
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
9084
|
+
if rotation_schedule is not None:
|
9085
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
9086
|
+
if rotation_window is not None:
|
9087
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
7824
9088
|
if self_managed is not None:
|
7825
9089
|
pulumi.set(__self__, "self_managed", self_managed)
|
7826
9090
|
if service_account_json is not None:
|
@@ -7890,8 +9154,6 @@ class SecretsMountPostgresqlArgs:
|
|
7890
9154
|
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
7891
9155
|
"""
|
7892
9156
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7893
|
-
|
7894
|
-
Supported list of database secrets engines that can be configured:
|
7895
9157
|
"""
|
7896
9158
|
return pulumi.get(self, "data")
|
7897
9159
|
|
@@ -7899,6 +9161,20 @@ class SecretsMountPostgresqlArgs:
|
|
7899
9161
|
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
7900
9162
|
pulumi.set(self, "data", value)
|
7901
9163
|
|
9164
|
+
@property
|
9165
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
9166
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
|
9167
|
+
"""
|
9168
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
9169
|
+
|
9170
|
+
Supported list of database secrets engines that can be configured:
|
9171
|
+
"""
|
9172
|
+
return pulumi.get(self, "disable_automated_rotation")
|
9173
|
+
|
9174
|
+
@disable_automated_rotation.setter
|
9175
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
|
9176
|
+
pulumi.set(self, "disable_automated_rotation", value)
|
9177
|
+
|
7902
9178
|
@property
|
7903
9179
|
@pulumi.getter(name="disableEscaping")
|
7904
9180
|
def disable_escaping(self) -> Optional[pulumi.Input[bool]]:
|
@@ -7959,6 +9235,18 @@ class SecretsMountPostgresqlArgs:
|
|
7959
9235
|
def password(self, value: Optional[pulumi.Input[str]]):
|
7960
9236
|
pulumi.set(self, "password", value)
|
7961
9237
|
|
9238
|
+
@property
|
9239
|
+
@pulumi.getter(name="passwordAuthentication")
|
9240
|
+
def password_authentication(self) -> Optional[pulumi.Input[str]]:
|
9241
|
+
"""
|
9242
|
+
When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
9243
|
+
"""
|
9244
|
+
return pulumi.get(self, "password_authentication")
|
9245
|
+
|
9246
|
+
@password_authentication.setter
|
9247
|
+
def password_authentication(self, value: Optional[pulumi.Input[str]]):
|
9248
|
+
pulumi.set(self, "password_authentication", value)
|
9249
|
+
|
7962
9250
|
@property
|
7963
9251
|
@pulumi.getter(name="pluginName")
|
7964
9252
|
def plugin_name(self) -> Optional[pulumi.Input[str]]:
|
@@ -7995,6 +9283,46 @@ class SecretsMountPostgresqlArgs:
|
|
7995
9283
|
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
7996
9284
|
pulumi.set(self, "root_rotation_statements", value)
|
7997
9285
|
|
9286
|
+
@property
|
9287
|
+
@pulumi.getter(name="rotationPeriod")
|
9288
|
+
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
9289
|
+
"""
|
9290
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
9291
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
9292
|
+
"""
|
9293
|
+
return pulumi.get(self, "rotation_period")
|
9294
|
+
|
9295
|
+
@rotation_period.setter
|
9296
|
+
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
9297
|
+
pulumi.set(self, "rotation_period", value)
|
9298
|
+
|
9299
|
+
@property
|
9300
|
+
@pulumi.getter(name="rotationSchedule")
|
9301
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
9302
|
+
"""
|
9303
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
9304
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
9305
|
+
"""
|
9306
|
+
return pulumi.get(self, "rotation_schedule")
|
9307
|
+
|
9308
|
+
@rotation_schedule.setter
|
9309
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
9310
|
+
pulumi.set(self, "rotation_schedule", value)
|
9311
|
+
|
9312
|
+
@property
|
9313
|
+
@pulumi.getter(name="rotationWindow")
|
9314
|
+
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
9315
|
+
"""
|
9316
|
+
The maximum amount of time in seconds allowed to complete
|
9317
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
9318
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
9319
|
+
"""
|
9320
|
+
return pulumi.get(self, "rotation_window")
|
9321
|
+
|
9322
|
+
@rotation_window.setter
|
9323
|
+
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
9324
|
+
pulumi.set(self, "rotation_window", value)
|
9325
|
+
|
7998
9326
|
@property
|
7999
9327
|
@pulumi.getter(name="selfManaged")
|
8000
9328
|
def self_managed(self) -> Optional[pulumi.Input[bool]]:
|
@@ -8111,6 +9439,10 @@ if not MYPY:
|
|
8111
9439
|
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
8112
9440
|
"""
|
8113
9441
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
9442
|
+
"""
|
9443
|
+
disable_automated_rotation: NotRequired[pulumi.Input[bool]]
|
9444
|
+
"""
|
9445
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
8114
9446
|
|
8115
9447
|
Supported list of database secrets engines that can be configured:
|
8116
9448
|
"""
|
@@ -8130,6 +9462,22 @@ if not MYPY:
|
|
8130
9462
|
"""
|
8131
9463
|
A list of database statements to be executed to rotate the root user's credentials.
|
8132
9464
|
"""
|
9465
|
+
rotation_period: NotRequired[pulumi.Input[int]]
|
9466
|
+
"""
|
9467
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
9468
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
9469
|
+
"""
|
9470
|
+
rotation_schedule: NotRequired[pulumi.Input[str]]
|
9471
|
+
"""
|
9472
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
9473
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
9474
|
+
"""
|
9475
|
+
rotation_window: NotRequired[pulumi.Input[int]]
|
9476
|
+
"""
|
9477
|
+
The maximum amount of time in seconds allowed to complete
|
9478
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
9479
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
9480
|
+
"""
|
8133
9481
|
tls: NotRequired[pulumi.Input[bool]]
|
8134
9482
|
"""
|
8135
9483
|
Specifies whether to use TLS when connecting to Redis.
|
@@ -8152,10 +9500,14 @@ class SecretsMountRediArgs:
|
|
8152
9500
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
8153
9501
|
ca_cert: Optional[pulumi.Input[str]] = None,
|
8154
9502
|
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
9503
|
+
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
8155
9504
|
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
8156
9505
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
8157
9506
|
port: Optional[pulumi.Input[int]] = None,
|
8158
9507
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
9508
|
+
rotation_period: Optional[pulumi.Input[int]] = None,
|
9509
|
+
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
9510
|
+
rotation_window: Optional[pulumi.Input[int]] = None,
|
8159
9511
|
tls: Optional[pulumi.Input[bool]] = None,
|
8160
9512
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
8161
9513
|
"""
|
@@ -8167,12 +9519,20 @@ class SecretsMountRediArgs:
|
|
8167
9519
|
connection.
|
8168
9520
|
:param pulumi.Input[str] ca_cert: The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
|
8169
9521
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
9522
|
+
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
8170
9523
|
|
8171
9524
|
Supported list of database secrets engines that can be configured:
|
8172
9525
|
:param pulumi.Input[bool] insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
|
8173
9526
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
8174
9527
|
:param pulumi.Input[int] port: The transport port to use to connect to Redis.
|
8175
9528
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
9529
|
+
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
9530
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
9531
|
+
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
9532
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
9533
|
+
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
9534
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
9535
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
8176
9536
|
:param pulumi.Input[bool] tls: Specifies whether to use TLS when connecting to Redis.
|
8177
9537
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
8178
9538
|
initial configuration or not.
|
@@ -8187,6 +9547,8 @@ class SecretsMountRediArgs:
|
|
8187
9547
|
pulumi.set(__self__, "ca_cert", ca_cert)
|
8188
9548
|
if data is not None:
|
8189
9549
|
pulumi.set(__self__, "data", data)
|
9550
|
+
if disable_automated_rotation is not None:
|
9551
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
8190
9552
|
if insecure_tls is not None:
|
8191
9553
|
pulumi.set(__self__, "insecure_tls", insecure_tls)
|
8192
9554
|
if plugin_name is not None:
|
@@ -8195,6 +9557,12 @@ class SecretsMountRediArgs:
|
|
8195
9557
|
pulumi.set(__self__, "port", port)
|
8196
9558
|
if root_rotation_statements is not None:
|
8197
9559
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
9560
|
+
if rotation_period is not None:
|
9561
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
9562
|
+
if rotation_schedule is not None:
|
9563
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
9564
|
+
if rotation_window is not None:
|
9565
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
8198
9566
|
if tls is not None:
|
8199
9567
|
pulumi.set(__self__, "tls", tls)
|
8200
9568
|
if verify_connection is not None:
|
@@ -8278,8 +9646,6 @@ class SecretsMountRediArgs:
|
|
8278
9646
|
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
8279
9647
|
"""
|
8280
9648
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8281
|
-
|
8282
|
-
Supported list of database secrets engines that can be configured:
|
8283
9649
|
"""
|
8284
9650
|
return pulumi.get(self, "data")
|
8285
9651
|
|
@@ -8287,6 +9653,20 @@ class SecretsMountRediArgs:
|
|
8287
9653
|
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
8288
9654
|
pulumi.set(self, "data", value)
|
8289
9655
|
|
9656
|
+
@property
|
9657
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
9658
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
|
9659
|
+
"""
|
9660
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
9661
|
+
|
9662
|
+
Supported list of database secrets engines that can be configured:
|
9663
|
+
"""
|
9664
|
+
return pulumi.get(self, "disable_automated_rotation")
|
9665
|
+
|
9666
|
+
@disable_automated_rotation.setter
|
9667
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
|
9668
|
+
pulumi.set(self, "disable_automated_rotation", value)
|
9669
|
+
|
8290
9670
|
@property
|
8291
9671
|
@pulumi.getter(name="insecureTls")
|
8292
9672
|
def insecure_tls(self) -> Optional[pulumi.Input[bool]]:
|
@@ -8335,6 +9715,46 @@ class SecretsMountRediArgs:
|
|
8335
9715
|
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
8336
9716
|
pulumi.set(self, "root_rotation_statements", value)
|
8337
9717
|
|
9718
|
+
@property
|
9719
|
+
@pulumi.getter(name="rotationPeriod")
|
9720
|
+
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
9721
|
+
"""
|
9722
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
9723
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
9724
|
+
"""
|
9725
|
+
return pulumi.get(self, "rotation_period")
|
9726
|
+
|
9727
|
+
@rotation_period.setter
|
9728
|
+
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
9729
|
+
pulumi.set(self, "rotation_period", value)
|
9730
|
+
|
9731
|
+
@property
|
9732
|
+
@pulumi.getter(name="rotationSchedule")
|
9733
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
9734
|
+
"""
|
9735
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
9736
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
9737
|
+
"""
|
9738
|
+
return pulumi.get(self, "rotation_schedule")
|
9739
|
+
|
9740
|
+
@rotation_schedule.setter
|
9741
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
9742
|
+
pulumi.set(self, "rotation_schedule", value)
|
9743
|
+
|
9744
|
+
@property
|
9745
|
+
@pulumi.getter(name="rotationWindow")
|
9746
|
+
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
9747
|
+
"""
|
9748
|
+
The maximum amount of time in seconds allowed to complete
|
9749
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
9750
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
9751
|
+
"""
|
9752
|
+
return pulumi.get(self, "rotation_window")
|
9753
|
+
|
9754
|
+
@rotation_window.setter
|
9755
|
+
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
9756
|
+
pulumi.set(self, "rotation_window", value)
|
9757
|
+
|
8338
9758
|
@property
|
8339
9759
|
@pulumi.getter
|
8340
9760
|
def tls(self) -> Optional[pulumi.Input[bool]]:
|
@@ -8379,6 +9799,10 @@ if not MYPY:
|
|
8379
9799
|
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
8380
9800
|
"""
|
8381
9801
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
9802
|
+
"""
|
9803
|
+
disable_automated_rotation: NotRequired[pulumi.Input[bool]]
|
9804
|
+
"""
|
9805
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
8382
9806
|
|
8383
9807
|
Supported list of database secrets engines that can be configured:
|
8384
9808
|
"""
|
@@ -8398,6 +9822,22 @@ if not MYPY:
|
|
8398
9822
|
"""
|
8399
9823
|
A list of database statements to be executed to rotate the root user's credentials.
|
8400
9824
|
"""
|
9825
|
+
rotation_period: NotRequired[pulumi.Input[int]]
|
9826
|
+
"""
|
9827
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
9828
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
9829
|
+
"""
|
9830
|
+
rotation_schedule: NotRequired[pulumi.Input[str]]
|
9831
|
+
"""
|
9832
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
9833
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
9834
|
+
"""
|
9835
|
+
rotation_window: NotRequired[pulumi.Input[int]]
|
9836
|
+
"""
|
9837
|
+
The maximum amount of time in seconds allowed to complete
|
9838
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
9839
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
9840
|
+
"""
|
8401
9841
|
username: NotRequired[pulumi.Input[str]]
|
8402
9842
|
"""
|
8403
9843
|
The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
@@ -8417,10 +9857,14 @@ class SecretsMountRedisElasticachArgs:
|
|
8417
9857
|
url: pulumi.Input[str],
|
8418
9858
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
8419
9859
|
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
9860
|
+
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
8420
9861
|
password: Optional[pulumi.Input[str]] = None,
|
8421
9862
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
8422
9863
|
region: Optional[pulumi.Input[str]] = None,
|
8423
9864
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
9865
|
+
rotation_period: Optional[pulumi.Input[int]] = None,
|
9866
|
+
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
9867
|
+
rotation_window: Optional[pulumi.Input[int]] = None,
|
8424
9868
|
username: Optional[pulumi.Input[str]] = None,
|
8425
9869
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
8426
9870
|
"""
|
@@ -8429,12 +9873,20 @@ class SecretsMountRedisElasticachArgs:
|
|
8429
9873
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
8430
9874
|
connection.
|
8431
9875
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
9876
|
+
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
8432
9877
|
|
8433
9878
|
Supported list of database secrets engines that can be configured:
|
8434
9879
|
:param pulumi.Input[str] password: The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
8435
9880
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
8436
9881
|
:param pulumi.Input[str] region: The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
|
8437
9882
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
9883
|
+
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
9884
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
9885
|
+
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
9886
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
9887
|
+
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
9888
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
9889
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
8438
9890
|
:param pulumi.Input[str] username: The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
8439
9891
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
8440
9892
|
initial configuration or not.
|
@@ -8445,6 +9897,8 @@ class SecretsMountRedisElasticachArgs:
|
|
8445
9897
|
pulumi.set(__self__, "allowed_roles", allowed_roles)
|
8446
9898
|
if data is not None:
|
8447
9899
|
pulumi.set(__self__, "data", data)
|
9900
|
+
if disable_automated_rotation is not None:
|
9901
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
8448
9902
|
if password is not None:
|
8449
9903
|
pulumi.set(__self__, "password", password)
|
8450
9904
|
if plugin_name is not None:
|
@@ -8453,6 +9907,12 @@ class SecretsMountRedisElasticachArgs:
|
|
8453
9907
|
pulumi.set(__self__, "region", region)
|
8454
9908
|
if root_rotation_statements is not None:
|
8455
9909
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
9910
|
+
if rotation_period is not None:
|
9911
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
9912
|
+
if rotation_schedule is not None:
|
9913
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
9914
|
+
if rotation_window is not None:
|
9915
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
8456
9916
|
if username is not None:
|
8457
9917
|
pulumi.set(__self__, "username", username)
|
8458
9918
|
if verify_connection is not None:
|
@@ -8500,8 +9960,6 @@ class SecretsMountRedisElasticachArgs:
|
|
8500
9960
|
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
8501
9961
|
"""
|
8502
9962
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8503
|
-
|
8504
|
-
Supported list of database secrets engines that can be configured:
|
8505
9963
|
"""
|
8506
9964
|
return pulumi.get(self, "data")
|
8507
9965
|
|
@@ -8509,6 +9967,20 @@ class SecretsMountRedisElasticachArgs:
|
|
8509
9967
|
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
8510
9968
|
pulumi.set(self, "data", value)
|
8511
9969
|
|
9970
|
+
@property
|
9971
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
9972
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
|
9973
|
+
"""
|
9974
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
9975
|
+
|
9976
|
+
Supported list of database secrets engines that can be configured:
|
9977
|
+
"""
|
9978
|
+
return pulumi.get(self, "disable_automated_rotation")
|
9979
|
+
|
9980
|
+
@disable_automated_rotation.setter
|
9981
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
|
9982
|
+
pulumi.set(self, "disable_automated_rotation", value)
|
9983
|
+
|
8512
9984
|
@property
|
8513
9985
|
@pulumi.getter
|
8514
9986
|
def password(self) -> Optional[pulumi.Input[str]]:
|
@@ -8557,6 +10029,46 @@ class SecretsMountRedisElasticachArgs:
|
|
8557
10029
|
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
8558
10030
|
pulumi.set(self, "root_rotation_statements", value)
|
8559
10031
|
|
10032
|
+
@property
|
10033
|
+
@pulumi.getter(name="rotationPeriod")
|
10034
|
+
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
10035
|
+
"""
|
10036
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
10037
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
10038
|
+
"""
|
10039
|
+
return pulumi.get(self, "rotation_period")
|
10040
|
+
|
10041
|
+
@rotation_period.setter
|
10042
|
+
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
10043
|
+
pulumi.set(self, "rotation_period", value)
|
10044
|
+
|
10045
|
+
@property
|
10046
|
+
@pulumi.getter(name="rotationSchedule")
|
10047
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
10048
|
+
"""
|
10049
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
10050
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
10051
|
+
"""
|
10052
|
+
return pulumi.get(self, "rotation_schedule")
|
10053
|
+
|
10054
|
+
@rotation_schedule.setter
|
10055
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
10056
|
+
pulumi.set(self, "rotation_schedule", value)
|
10057
|
+
|
10058
|
+
@property
|
10059
|
+
@pulumi.getter(name="rotationWindow")
|
10060
|
+
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
10061
|
+
"""
|
10062
|
+
The maximum amount of time in seconds allowed to complete
|
10063
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
10064
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
10065
|
+
"""
|
10066
|
+
return pulumi.get(self, "rotation_window")
|
10067
|
+
|
10068
|
+
@rotation_window.setter
|
10069
|
+
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
10070
|
+
pulumi.set(self, "rotation_window", value)
|
10071
|
+
|
8560
10072
|
@property
|
8561
10073
|
@pulumi.getter
|
8562
10074
|
def username(self) -> Optional[pulumi.Input[str]]:
|
@@ -8601,6 +10113,10 @@ if not MYPY:
|
|
8601
10113
|
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
8602
10114
|
"""
|
8603
10115
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
10116
|
+
"""
|
10117
|
+
disable_automated_rotation: NotRequired[pulumi.Input[bool]]
|
10118
|
+
"""
|
10119
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
8604
10120
|
|
8605
10121
|
Supported list of database secrets engines that can be configured:
|
8606
10122
|
"""
|
@@ -8632,6 +10148,22 @@ if not MYPY:
|
|
8632
10148
|
"""
|
8633
10149
|
A list of database statements to be executed to rotate the root user's credentials.
|
8634
10150
|
"""
|
10151
|
+
rotation_period: NotRequired[pulumi.Input[int]]
|
10152
|
+
"""
|
10153
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
10154
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
10155
|
+
"""
|
10156
|
+
rotation_schedule: NotRequired[pulumi.Input[str]]
|
10157
|
+
"""
|
10158
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
10159
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
10160
|
+
"""
|
10161
|
+
rotation_window: NotRequired[pulumi.Input[int]]
|
10162
|
+
"""
|
10163
|
+
The maximum amount of time in seconds allowed to complete
|
10164
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
10165
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
10166
|
+
"""
|
8635
10167
|
username: NotRequired[pulumi.Input[str]]
|
8636
10168
|
"""
|
8637
10169
|
The root credential username used in the connection URL
|
@@ -8655,6 +10187,7 @@ class SecretsMountRedshiftArgs:
|
|
8655
10187
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
8656
10188
|
connection_url: Optional[pulumi.Input[str]] = None,
|
8657
10189
|
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
10190
|
+
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
8658
10191
|
disable_escaping: Optional[pulumi.Input[bool]] = None,
|
8659
10192
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
8660
10193
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
@@ -8662,6 +10195,9 @@ class SecretsMountRedshiftArgs:
|
|
8662
10195
|
password: Optional[pulumi.Input[str]] = None,
|
8663
10196
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
8664
10197
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
10198
|
+
rotation_period: Optional[pulumi.Input[int]] = None,
|
10199
|
+
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
10200
|
+
rotation_window: Optional[pulumi.Input[int]] = None,
|
8665
10201
|
username: Optional[pulumi.Input[str]] = None,
|
8666
10202
|
username_template: Optional[pulumi.Input[str]] = None,
|
8667
10203
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
@@ -8671,6 +10207,7 @@ class SecretsMountRedshiftArgs:
|
|
8671
10207
|
connection.
|
8672
10208
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
8673
10209
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
10210
|
+
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
8674
10211
|
|
8675
10212
|
Supported list of database secrets engines that can be configured:
|
8676
10213
|
:param pulumi.Input[bool] disable_escaping: Disable special character escaping in username and password
|
@@ -8680,6 +10217,13 @@ class SecretsMountRedshiftArgs:
|
|
8680
10217
|
:param pulumi.Input[str] password: The root credential password used in the connection URL
|
8681
10218
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
8682
10219
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
10220
|
+
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
10221
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
10222
|
+
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
10223
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
10224
|
+
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
10225
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
10226
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
8683
10227
|
:param pulumi.Input[str] username: The root credential username used in the connection URL
|
8684
10228
|
:param pulumi.Input[str] username_template: Username generation template.
|
8685
10229
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
@@ -8692,6 +10236,8 @@ class SecretsMountRedshiftArgs:
|
|
8692
10236
|
pulumi.set(__self__, "connection_url", connection_url)
|
8693
10237
|
if data is not None:
|
8694
10238
|
pulumi.set(__self__, "data", data)
|
10239
|
+
if disable_automated_rotation is not None:
|
10240
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
8695
10241
|
if disable_escaping is not None:
|
8696
10242
|
pulumi.set(__self__, "disable_escaping", disable_escaping)
|
8697
10243
|
if max_connection_lifetime is not None:
|
@@ -8706,6 +10252,12 @@ class SecretsMountRedshiftArgs:
|
|
8706
10252
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
8707
10253
|
if root_rotation_statements is not None:
|
8708
10254
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
10255
|
+
if rotation_period is not None:
|
10256
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
10257
|
+
if rotation_schedule is not None:
|
10258
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
10259
|
+
if rotation_window is not None:
|
10260
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
8709
10261
|
if username is not None:
|
8710
10262
|
pulumi.set(__self__, "username", username)
|
8711
10263
|
if username_template is not None:
|
@@ -8755,8 +10307,6 @@ class SecretsMountRedshiftArgs:
|
|
8755
10307
|
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
8756
10308
|
"""
|
8757
10309
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
8758
|
-
|
8759
|
-
Supported list of database secrets engines that can be configured:
|
8760
10310
|
"""
|
8761
10311
|
return pulumi.get(self, "data")
|
8762
10312
|
|
@@ -8764,6 +10314,20 @@ class SecretsMountRedshiftArgs:
|
|
8764
10314
|
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
8765
10315
|
pulumi.set(self, "data", value)
|
8766
10316
|
|
10317
|
+
@property
|
10318
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
10319
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
|
10320
|
+
"""
|
10321
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
10322
|
+
|
10323
|
+
Supported list of database secrets engines that can be configured:
|
10324
|
+
"""
|
10325
|
+
return pulumi.get(self, "disable_automated_rotation")
|
10326
|
+
|
10327
|
+
@disable_automated_rotation.setter
|
10328
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
|
10329
|
+
pulumi.set(self, "disable_automated_rotation", value)
|
10330
|
+
|
8767
10331
|
@property
|
8768
10332
|
@pulumi.getter(name="disableEscaping")
|
8769
10333
|
def disable_escaping(self) -> Optional[pulumi.Input[bool]]:
|
@@ -8848,6 +10412,46 @@ class SecretsMountRedshiftArgs:
|
|
8848
10412
|
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
8849
10413
|
pulumi.set(self, "root_rotation_statements", value)
|
8850
10414
|
|
10415
|
+
@property
|
10416
|
+
@pulumi.getter(name="rotationPeriod")
|
10417
|
+
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
10418
|
+
"""
|
10419
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
10420
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
10421
|
+
"""
|
10422
|
+
return pulumi.get(self, "rotation_period")
|
10423
|
+
|
10424
|
+
@rotation_period.setter
|
10425
|
+
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
10426
|
+
pulumi.set(self, "rotation_period", value)
|
10427
|
+
|
10428
|
+
@property
|
10429
|
+
@pulumi.getter(name="rotationSchedule")
|
10430
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
10431
|
+
"""
|
10432
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
10433
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
10434
|
+
"""
|
10435
|
+
return pulumi.get(self, "rotation_schedule")
|
10436
|
+
|
10437
|
+
@rotation_schedule.setter
|
10438
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
10439
|
+
pulumi.set(self, "rotation_schedule", value)
|
10440
|
+
|
10441
|
+
@property
|
10442
|
+
@pulumi.getter(name="rotationWindow")
|
10443
|
+
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
10444
|
+
"""
|
10445
|
+
The maximum amount of time in seconds allowed to complete
|
10446
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
10447
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
10448
|
+
"""
|
10449
|
+
return pulumi.get(self, "rotation_window")
|
10450
|
+
|
10451
|
+
@rotation_window.setter
|
10452
|
+
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
10453
|
+
pulumi.set(self, "rotation_window", value)
|
10454
|
+
|
8851
10455
|
@property
|
8852
10456
|
@pulumi.getter
|
8853
10457
|
def username(self) -> Optional[pulumi.Input[str]]:
|
@@ -8904,6 +10508,10 @@ if not MYPY:
|
|
8904
10508
|
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
8905
10509
|
"""
|
8906
10510
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
10511
|
+
"""
|
10512
|
+
disable_automated_rotation: NotRequired[pulumi.Input[bool]]
|
10513
|
+
"""
|
10514
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
8907
10515
|
|
8908
10516
|
Supported list of database secrets engines that can be configured:
|
8909
10517
|
"""
|
@@ -8931,6 +10539,22 @@ if not MYPY:
|
|
8931
10539
|
"""
|
8932
10540
|
A list of database statements to be executed to rotate the root user's credentials.
|
8933
10541
|
"""
|
10542
|
+
rotation_period: NotRequired[pulumi.Input[int]]
|
10543
|
+
"""
|
10544
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
10545
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
10546
|
+
"""
|
10547
|
+
rotation_schedule: NotRequired[pulumi.Input[str]]
|
10548
|
+
"""
|
10549
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
10550
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
10551
|
+
"""
|
10552
|
+
rotation_window: NotRequired[pulumi.Input[int]]
|
10553
|
+
"""
|
10554
|
+
The maximum amount of time in seconds allowed to complete
|
10555
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
10556
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
10557
|
+
"""
|
8934
10558
|
username: NotRequired[pulumi.Input[str]]
|
8935
10559
|
"""
|
8936
10560
|
The root credential username used in the connection URL
|
@@ -8954,12 +10578,16 @@ class SecretsMountSnowflakeArgs:
|
|
8954
10578
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
8955
10579
|
connection_url: Optional[pulumi.Input[str]] = None,
|
8956
10580
|
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
10581
|
+
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
8957
10582
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
8958
10583
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
8959
10584
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
8960
10585
|
password: Optional[pulumi.Input[str]] = None,
|
8961
10586
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
8962
10587
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
10588
|
+
rotation_period: Optional[pulumi.Input[int]] = None,
|
10589
|
+
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
10590
|
+
rotation_window: Optional[pulumi.Input[int]] = None,
|
8963
10591
|
username: Optional[pulumi.Input[str]] = None,
|
8964
10592
|
username_template: Optional[pulumi.Input[str]] = None,
|
8965
10593
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
@@ -8969,6 +10597,7 @@ class SecretsMountSnowflakeArgs:
|
|
8969
10597
|
connection.
|
8970
10598
|
:param pulumi.Input[str] connection_url: Connection string to use to connect to the database.
|
8971
10599
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
10600
|
+
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
8972
10601
|
|
8973
10602
|
Supported list of database secrets engines that can be configured:
|
8974
10603
|
:param pulumi.Input[int] max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -8977,6 +10606,13 @@ class SecretsMountSnowflakeArgs:
|
|
8977
10606
|
:param pulumi.Input[str] password: The root credential password used in the connection URL
|
8978
10607
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
8979
10608
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
10609
|
+
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
10610
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
10611
|
+
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
10612
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
10613
|
+
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
10614
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
10615
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
8980
10616
|
:param pulumi.Input[str] username: The root credential username used in the connection URL
|
8981
10617
|
:param pulumi.Input[str] username_template: Username generation template.
|
8982
10618
|
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
@@ -8989,6 +10625,8 @@ class SecretsMountSnowflakeArgs:
|
|
8989
10625
|
pulumi.set(__self__, "connection_url", connection_url)
|
8990
10626
|
if data is not None:
|
8991
10627
|
pulumi.set(__self__, "data", data)
|
10628
|
+
if disable_automated_rotation is not None:
|
10629
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
8992
10630
|
if max_connection_lifetime is not None:
|
8993
10631
|
pulumi.set(__self__, "max_connection_lifetime", max_connection_lifetime)
|
8994
10632
|
if max_idle_connections is not None:
|
@@ -9001,6 +10639,12 @@ class SecretsMountSnowflakeArgs:
|
|
9001
10639
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
9002
10640
|
if root_rotation_statements is not None:
|
9003
10641
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
10642
|
+
if rotation_period is not None:
|
10643
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
10644
|
+
if rotation_schedule is not None:
|
10645
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
10646
|
+
if rotation_window is not None:
|
10647
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
9004
10648
|
if username is not None:
|
9005
10649
|
pulumi.set(__self__, "username", username)
|
9006
10650
|
if username_template is not None:
|
@@ -9050,8 +10694,6 @@ class SecretsMountSnowflakeArgs:
|
|
9050
10694
|
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
9051
10695
|
"""
|
9052
10696
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
9053
|
-
|
9054
|
-
Supported list of database secrets engines that can be configured:
|
9055
10697
|
"""
|
9056
10698
|
return pulumi.get(self, "data")
|
9057
10699
|
|
@@ -9059,6 +10701,20 @@ class SecretsMountSnowflakeArgs:
|
|
9059
10701
|
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
9060
10702
|
pulumi.set(self, "data", value)
|
9061
10703
|
|
10704
|
+
@property
|
10705
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
10706
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
|
10707
|
+
"""
|
10708
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
10709
|
+
|
10710
|
+
Supported list of database secrets engines that can be configured:
|
10711
|
+
"""
|
10712
|
+
return pulumi.get(self, "disable_automated_rotation")
|
10713
|
+
|
10714
|
+
@disable_automated_rotation.setter
|
10715
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
|
10716
|
+
pulumi.set(self, "disable_automated_rotation", value)
|
10717
|
+
|
9062
10718
|
@property
|
9063
10719
|
@pulumi.getter(name="maxConnectionLifetime")
|
9064
10720
|
def max_connection_lifetime(self) -> Optional[pulumi.Input[int]]:
|
@@ -9131,6 +10787,46 @@ class SecretsMountSnowflakeArgs:
|
|
9131
10787
|
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
9132
10788
|
pulumi.set(self, "root_rotation_statements", value)
|
9133
10789
|
|
10790
|
+
@property
|
10791
|
+
@pulumi.getter(name="rotationPeriod")
|
10792
|
+
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
10793
|
+
"""
|
10794
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
10795
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
10796
|
+
"""
|
10797
|
+
return pulumi.get(self, "rotation_period")
|
10798
|
+
|
10799
|
+
@rotation_period.setter
|
10800
|
+
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
10801
|
+
pulumi.set(self, "rotation_period", value)
|
10802
|
+
|
10803
|
+
@property
|
10804
|
+
@pulumi.getter(name="rotationSchedule")
|
10805
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
10806
|
+
"""
|
10807
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
10808
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
10809
|
+
"""
|
10810
|
+
return pulumi.get(self, "rotation_schedule")
|
10811
|
+
|
10812
|
+
@rotation_schedule.setter
|
10813
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
10814
|
+
pulumi.set(self, "rotation_schedule", value)
|
10815
|
+
|
10816
|
+
@property
|
10817
|
+
@pulumi.getter(name="rotationWindow")
|
10818
|
+
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
10819
|
+
"""
|
10820
|
+
The maximum amount of time in seconds allowed to complete
|
10821
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
10822
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
10823
|
+
"""
|
10824
|
+
return pulumi.get(self, "rotation_window")
|
10825
|
+
|
10826
|
+
@rotation_window.setter
|
10827
|
+
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
10828
|
+
pulumi.set(self, "rotation_window", value)
|
10829
|
+
|
9134
10830
|
@property
|
9135
10831
|
@pulumi.getter
|
9136
10832
|
def username(self) -> Optional[pulumi.Input[str]]:
|