pulumi-vault 6.5.0a1736850018__py3-none-any.whl → 6.6.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +32 -0
- pulumi_vault/_utilities.py +8 -4
- pulumi_vault/aws/auth_backend_client.py +228 -4
- pulumi_vault/aws/auth_backend_sts_role.py +47 -0
- pulumi_vault/aws/secret_backend.py +395 -38
- pulumi_vault/aws/secret_backend_static_role.py +217 -0
- pulumi_vault/azure/auth_backend_config.py +257 -5
- pulumi_vault/azure/backend.py +249 -4
- pulumi_vault/database/_inputs.py +1740 -44
- pulumi_vault/database/outputs.py +1198 -18
- pulumi_vault/database/secret_backend_connection.py +220 -0
- pulumi_vault/database/secret_backend_static_role.py +143 -1
- pulumi_vault/database/secrets_mount.py +8 -0
- pulumi_vault/gcp/auth_backend.py +222 -2
- pulumi_vault/gcp/secret_backend.py +244 -4
- pulumi_vault/ldap/auth_backend.py +222 -2
- pulumi_vault/ldap/secret_backend.py +222 -2
- pulumi_vault/pkisecret/__init__.py +6 -0
- pulumi_vault/pkisecret/_inputs.py +34 -6
- pulumi_vault/pkisecret/backend_acme_eab.py +549 -0
- pulumi_vault/pkisecret/backend_config_acme.py +689 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1376 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +572 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +114 -1
- pulumi_vault/pkisecret/outputs.py +40 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +148 -7
- pulumi_vault/pkisecret/secret_backend_crl_config.py +54 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +141 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +265 -0
- pulumi_vault/pkisecret/secret_backend_role.py +299 -3
- pulumi_vault/pkisecret/secret_backend_root_cert.py +423 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +581 -3
- pulumi_vault/pkisecret/secret_backend_sign.py +94 -0
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/secret_backend_role.py +27 -0
- pulumi_vault/terraformcloud/secret_role.py +7 -7
- pulumi_vault/transit/__init__.py +2 -0
- pulumi_vault/transit/get_sign.py +324 -0
- pulumi_vault/transit/get_verify.py +354 -0
- pulumi_vault/transit/secret_backend_key.py +162 -0
- {pulumi_vault-6.5.0a1736850018.dist-info → pulumi_vault-6.6.0.dist-info}/METADATA +1 -1
- {pulumi_vault-6.5.0a1736850018.dist-info → pulumi_vault-6.6.0.dist-info}/RECORD +48 -39
- {pulumi_vault-6.5.0a1736850018.dist-info → pulumi_vault-6.6.0.dist-info}/WHEEL +1 -1
- {pulumi_vault-6.5.0a1736850018.dist-info → pulumi_vault-6.6.0.dist-info}/top_level.txt +0 -0
pulumi_vault/database/outputs.py
CHANGED
@@ -1928,6 +1928,8 @@ class SecretBackendConnectionPostgresql(dict):
|
|
1928
1928
|
suggest = "max_idle_connections"
|
1929
1929
|
elif key == "maxOpenConnections":
|
1930
1930
|
suggest = "max_open_connections"
|
1931
|
+
elif key == "passwordAuthentication":
|
1932
|
+
suggest = "password_authentication"
|
1931
1933
|
elif key == "privateKey":
|
1932
1934
|
suggest = "private_key"
|
1933
1935
|
elif key == "selfManaged":
|
@@ -1960,6 +1962,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
1960
1962
|
max_idle_connections: Optional[int] = None,
|
1961
1963
|
max_open_connections: Optional[int] = None,
|
1962
1964
|
password: Optional[str] = None,
|
1965
|
+
password_authentication: Optional[str] = None,
|
1963
1966
|
private_key: Optional[str] = None,
|
1964
1967
|
self_managed: Optional[bool] = None,
|
1965
1968
|
service_account_json: Optional[str] = None,
|
@@ -1975,6 +1978,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
1975
1978
|
:param int max_idle_connections: Maximum number of idle connections to the database.
|
1976
1979
|
:param int max_open_connections: Maximum number of open connections to the database.
|
1977
1980
|
:param str password: The root credential password used in the connection URL
|
1981
|
+
:param str password_authentication: When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
1978
1982
|
:param str private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
|
1979
1983
|
:param bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
|
1980
1984
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
@@ -1997,6 +2001,8 @@ class SecretBackendConnectionPostgresql(dict):
|
|
1997
2001
|
pulumi.set(__self__, "max_open_connections", max_open_connections)
|
1998
2002
|
if password is not None:
|
1999
2003
|
pulumi.set(__self__, "password", password)
|
2004
|
+
if password_authentication is not None:
|
2005
|
+
pulumi.set(__self__, "password_authentication", password_authentication)
|
2000
2006
|
if private_key is not None:
|
2001
2007
|
pulumi.set(__self__, "private_key", private_key)
|
2002
2008
|
if self_managed is not None:
|
@@ -2068,6 +2074,14 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2068
2074
|
"""
|
2069
2075
|
return pulumi.get(self, "password")
|
2070
2076
|
|
2077
|
+
@property
|
2078
|
+
@pulumi.getter(name="passwordAuthentication")
|
2079
|
+
def password_authentication(self) -> Optional[str]:
|
2080
|
+
"""
|
2081
|
+
When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
2082
|
+
"""
|
2083
|
+
return pulumi.get(self, "password_authentication")
|
2084
|
+
|
2071
2085
|
@property
|
2072
2086
|
@pulumi.getter(name="privateKey")
|
2073
2087
|
def private_key(self) -> Optional[str]:
|
@@ -2541,6 +2555,8 @@ class SecretsMountCassandra(dict):
|
|
2541
2555
|
suggest = "allowed_roles"
|
2542
2556
|
elif key == "connectTimeout":
|
2543
2557
|
suggest = "connect_timeout"
|
2558
|
+
elif key == "disableAutomatedRotation":
|
2559
|
+
suggest = "disable_automated_rotation"
|
2544
2560
|
elif key == "insecureTls":
|
2545
2561
|
suggest = "insecure_tls"
|
2546
2562
|
elif key == "pemBundle":
|
@@ -2553,6 +2569,12 @@ class SecretsMountCassandra(dict):
|
|
2553
2569
|
suggest = "protocol_version"
|
2554
2570
|
elif key == "rootRotationStatements":
|
2555
2571
|
suggest = "root_rotation_statements"
|
2572
|
+
elif key == "rotationPeriod":
|
2573
|
+
suggest = "rotation_period"
|
2574
|
+
elif key == "rotationSchedule":
|
2575
|
+
suggest = "rotation_schedule"
|
2576
|
+
elif key == "rotationWindow":
|
2577
|
+
suggest = "rotation_window"
|
2556
2578
|
elif key == "skipVerification":
|
2557
2579
|
suggest = "skip_verification"
|
2558
2580
|
elif key == "verifyConnection":
|
@@ -2574,6 +2596,7 @@ class SecretsMountCassandra(dict):
|
|
2574
2596
|
allowed_roles: Optional[Sequence[str]] = None,
|
2575
2597
|
connect_timeout: Optional[int] = None,
|
2576
2598
|
data: Optional[Mapping[str, str]] = None,
|
2599
|
+
disable_automated_rotation: Optional[bool] = None,
|
2577
2600
|
hosts: Optional[Sequence[str]] = None,
|
2578
2601
|
insecure_tls: Optional[bool] = None,
|
2579
2602
|
password: Optional[str] = None,
|
@@ -2583,6 +2606,9 @@ class SecretsMountCassandra(dict):
|
|
2583
2606
|
port: Optional[int] = None,
|
2584
2607
|
protocol_version: Optional[int] = None,
|
2585
2608
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
2609
|
+
rotation_period: Optional[int] = None,
|
2610
|
+
rotation_schedule: Optional[str] = None,
|
2611
|
+
rotation_window: Optional[int] = None,
|
2586
2612
|
skip_verification: Optional[bool] = None,
|
2587
2613
|
tls: Optional[bool] = None,
|
2588
2614
|
username: Optional[str] = None,
|
@@ -2593,6 +2619,7 @@ class SecretsMountCassandra(dict):
|
|
2593
2619
|
connection.
|
2594
2620
|
:param int connect_timeout: The number of seconds to use as a connection timeout.
|
2595
2621
|
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2622
|
+
:param bool disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
2596
2623
|
|
2597
2624
|
Supported list of database secrets engines that can be configured:
|
2598
2625
|
:param Sequence[str] hosts: Cassandra hosts to connect to.
|
@@ -2604,6 +2631,13 @@ class SecretsMountCassandra(dict):
|
|
2604
2631
|
:param int port: The transport port to use to connect to Cassandra.
|
2605
2632
|
:param int protocol_version: The CQL protocol version to use.
|
2606
2633
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
2634
|
+
:param int rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
2635
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
2636
|
+
:param str rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
2637
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
2638
|
+
:param int rotation_window: The maximum amount of time in seconds allowed to complete
|
2639
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
2640
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
2607
2641
|
:param bool skip_verification: Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
|
2608
2642
|
:param bool tls: Whether to use TLS when connecting to Cassandra.
|
2609
2643
|
:param str username: The username to use when authenticating with Cassandra.
|
@@ -2617,6 +2651,8 @@ class SecretsMountCassandra(dict):
|
|
2617
2651
|
pulumi.set(__self__, "connect_timeout", connect_timeout)
|
2618
2652
|
if data is not None:
|
2619
2653
|
pulumi.set(__self__, "data", data)
|
2654
|
+
if disable_automated_rotation is not None:
|
2655
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
2620
2656
|
if hosts is not None:
|
2621
2657
|
pulumi.set(__self__, "hosts", hosts)
|
2622
2658
|
if insecure_tls is not None:
|
@@ -2635,6 +2671,12 @@ class SecretsMountCassandra(dict):
|
|
2635
2671
|
pulumi.set(__self__, "protocol_version", protocol_version)
|
2636
2672
|
if root_rotation_statements is not None:
|
2637
2673
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
2674
|
+
if rotation_period is not None:
|
2675
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
2676
|
+
if rotation_schedule is not None:
|
2677
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
2678
|
+
if rotation_window is not None:
|
2679
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
2638
2680
|
if skip_verification is not None:
|
2639
2681
|
pulumi.set(__self__, "skip_verification", skip_verification)
|
2640
2682
|
if tls is not None:
|
@@ -2674,10 +2716,18 @@ class SecretsMountCassandra(dict):
|
|
2674
2716
|
def data(self) -> Optional[Mapping[str, str]]:
|
2675
2717
|
"""
|
2676
2718
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2719
|
+
"""
|
2720
|
+
return pulumi.get(self, "data")
|
2721
|
+
|
2722
|
+
@property
|
2723
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
2724
|
+
def disable_automated_rotation(self) -> Optional[bool]:
|
2725
|
+
"""
|
2726
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
2677
2727
|
|
2678
2728
|
Supported list of database secrets engines that can be configured:
|
2679
2729
|
"""
|
2680
|
-
return pulumi.get(self, "
|
2730
|
+
return pulumi.get(self, "disable_automated_rotation")
|
2681
2731
|
|
2682
2732
|
@property
|
2683
2733
|
@pulumi.getter
|
@@ -2751,6 +2801,34 @@ class SecretsMountCassandra(dict):
|
|
2751
2801
|
"""
|
2752
2802
|
return pulumi.get(self, "root_rotation_statements")
|
2753
2803
|
|
2804
|
+
@property
|
2805
|
+
@pulumi.getter(name="rotationPeriod")
|
2806
|
+
def rotation_period(self) -> Optional[int]:
|
2807
|
+
"""
|
2808
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
2809
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
2810
|
+
"""
|
2811
|
+
return pulumi.get(self, "rotation_period")
|
2812
|
+
|
2813
|
+
@property
|
2814
|
+
@pulumi.getter(name="rotationSchedule")
|
2815
|
+
def rotation_schedule(self) -> Optional[str]:
|
2816
|
+
"""
|
2817
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
2818
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
2819
|
+
"""
|
2820
|
+
return pulumi.get(self, "rotation_schedule")
|
2821
|
+
|
2822
|
+
@property
|
2823
|
+
@pulumi.getter(name="rotationWindow")
|
2824
|
+
def rotation_window(self) -> Optional[int]:
|
2825
|
+
"""
|
2826
|
+
The maximum amount of time in seconds allowed to complete
|
2827
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
2828
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
2829
|
+
"""
|
2830
|
+
return pulumi.get(self, "rotation_window")
|
2831
|
+
|
2754
2832
|
@property
|
2755
2833
|
@pulumi.getter(name="skipVerification")
|
2756
2834
|
def skip_verification(self) -> Optional[bool]:
|
@@ -2796,12 +2874,20 @@ class SecretsMountCouchbase(dict):
|
|
2796
2874
|
suggest = "base64_pem"
|
2797
2875
|
elif key == "bucketName":
|
2798
2876
|
suggest = "bucket_name"
|
2877
|
+
elif key == "disableAutomatedRotation":
|
2878
|
+
suggest = "disable_automated_rotation"
|
2799
2879
|
elif key == "insecureTls":
|
2800
2880
|
suggest = "insecure_tls"
|
2801
2881
|
elif key == "pluginName":
|
2802
2882
|
suggest = "plugin_name"
|
2803
2883
|
elif key == "rootRotationStatements":
|
2804
2884
|
suggest = "root_rotation_statements"
|
2885
|
+
elif key == "rotationPeriod":
|
2886
|
+
suggest = "rotation_period"
|
2887
|
+
elif key == "rotationSchedule":
|
2888
|
+
suggest = "rotation_schedule"
|
2889
|
+
elif key == "rotationWindow":
|
2890
|
+
suggest = "rotation_window"
|
2805
2891
|
elif key == "usernameTemplate":
|
2806
2892
|
suggest = "username_template"
|
2807
2893
|
elif key == "verifyConnection":
|
@@ -2827,9 +2913,13 @@ class SecretsMountCouchbase(dict):
|
|
2827
2913
|
base64_pem: Optional[str] = None,
|
2828
2914
|
bucket_name: Optional[str] = None,
|
2829
2915
|
data: Optional[Mapping[str, str]] = None,
|
2916
|
+
disable_automated_rotation: Optional[bool] = None,
|
2830
2917
|
insecure_tls: Optional[bool] = None,
|
2831
2918
|
plugin_name: Optional[str] = None,
|
2832
2919
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
2920
|
+
rotation_period: Optional[int] = None,
|
2921
|
+
rotation_schedule: Optional[str] = None,
|
2922
|
+
rotation_window: Optional[int] = None,
|
2833
2923
|
tls: Optional[bool] = None,
|
2834
2924
|
username_template: Optional[str] = None,
|
2835
2925
|
verify_connection: Optional[bool] = None):
|
@@ -2843,11 +2933,19 @@ class SecretsMountCouchbase(dict):
|
|
2843
2933
|
:param str base64_pem: Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
|
2844
2934
|
:param str bucket_name: Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
|
2845
2935
|
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
2936
|
+
:param bool disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
2846
2937
|
|
2847
2938
|
Supported list of database secrets engines that can be configured:
|
2848
2939
|
:param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
|
2849
2940
|
:param str plugin_name: Specifies the name of the plugin to use.
|
2850
2941
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
2942
|
+
:param int rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
2943
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
2944
|
+
:param str rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
2945
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
2946
|
+
:param int rotation_window: The maximum amount of time in seconds allowed to complete
|
2947
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
2948
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
2851
2949
|
:param bool tls: Specifies whether to use TLS when connecting to Couchbase.
|
2852
2950
|
:param str username_template: Template describing how dynamic usernames are generated.
|
2853
2951
|
:param bool verify_connection: Whether the connection should be verified on
|
@@ -2865,12 +2963,20 @@ class SecretsMountCouchbase(dict):
|
|
2865
2963
|
pulumi.set(__self__, "bucket_name", bucket_name)
|
2866
2964
|
if data is not None:
|
2867
2965
|
pulumi.set(__self__, "data", data)
|
2966
|
+
if disable_automated_rotation is not None:
|
2967
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
2868
2968
|
if insecure_tls is not None:
|
2869
2969
|
pulumi.set(__self__, "insecure_tls", insecure_tls)
|
2870
2970
|
if plugin_name is not None:
|
2871
2971
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
2872
2972
|
if root_rotation_statements is not None:
|
2873
2973
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
2974
|
+
if rotation_period is not None:
|
2975
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
2976
|
+
if rotation_schedule is not None:
|
2977
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
2978
|
+
if rotation_window is not None:
|
2979
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
2874
2980
|
if tls is not None:
|
2875
2981
|
pulumi.set(__self__, "tls", tls)
|
2876
2982
|
if username_template is not None:
|
@@ -2940,10 +3046,18 @@ class SecretsMountCouchbase(dict):
|
|
2940
3046
|
def data(self) -> Optional[Mapping[str, str]]:
|
2941
3047
|
"""
|
2942
3048
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3049
|
+
"""
|
3050
|
+
return pulumi.get(self, "data")
|
3051
|
+
|
3052
|
+
@property
|
3053
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
3054
|
+
def disable_automated_rotation(self) -> Optional[bool]:
|
3055
|
+
"""
|
3056
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
2943
3057
|
|
2944
3058
|
Supported list of database secrets engines that can be configured:
|
2945
3059
|
"""
|
2946
|
-
return pulumi.get(self, "
|
3060
|
+
return pulumi.get(self, "disable_automated_rotation")
|
2947
3061
|
|
2948
3062
|
@property
|
2949
3063
|
@pulumi.getter(name="insecureTls")
|
@@ -2969,6 +3083,34 @@ class SecretsMountCouchbase(dict):
|
|
2969
3083
|
"""
|
2970
3084
|
return pulumi.get(self, "root_rotation_statements")
|
2971
3085
|
|
3086
|
+
@property
|
3087
|
+
@pulumi.getter(name="rotationPeriod")
|
3088
|
+
def rotation_period(self) -> Optional[int]:
|
3089
|
+
"""
|
3090
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
3091
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
3092
|
+
"""
|
3093
|
+
return pulumi.get(self, "rotation_period")
|
3094
|
+
|
3095
|
+
@property
|
3096
|
+
@pulumi.getter(name="rotationSchedule")
|
3097
|
+
def rotation_schedule(self) -> Optional[str]:
|
3098
|
+
"""
|
3099
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
3100
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
3101
|
+
"""
|
3102
|
+
return pulumi.get(self, "rotation_schedule")
|
3103
|
+
|
3104
|
+
@property
|
3105
|
+
@pulumi.getter(name="rotationWindow")
|
3106
|
+
def rotation_window(self) -> Optional[int]:
|
3107
|
+
"""
|
3108
|
+
The maximum amount of time in seconds allowed to complete
|
3109
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
3110
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
3111
|
+
"""
|
3112
|
+
return pulumi.get(self, "rotation_window")
|
3113
|
+
|
2972
3114
|
@property
|
2973
3115
|
@pulumi.getter
|
2974
3116
|
def tls(self) -> Optional[bool]:
|
@@ -3010,10 +3152,18 @@ class SecretsMountElasticsearch(dict):
|
|
3010
3152
|
suggest = "client_cert"
|
3011
3153
|
elif key == "clientKey":
|
3012
3154
|
suggest = "client_key"
|
3155
|
+
elif key == "disableAutomatedRotation":
|
3156
|
+
suggest = "disable_automated_rotation"
|
3013
3157
|
elif key == "pluginName":
|
3014
3158
|
suggest = "plugin_name"
|
3015
3159
|
elif key == "rootRotationStatements":
|
3016
3160
|
suggest = "root_rotation_statements"
|
3161
|
+
elif key == "rotationPeriod":
|
3162
|
+
suggest = "rotation_period"
|
3163
|
+
elif key == "rotationSchedule":
|
3164
|
+
suggest = "rotation_schedule"
|
3165
|
+
elif key == "rotationWindow":
|
3166
|
+
suggest = "rotation_window"
|
3017
3167
|
elif key == "tlsServerName":
|
3018
3168
|
suggest = "tls_server_name"
|
3019
3169
|
elif key == "usernameTemplate":
|
@@ -3043,9 +3193,13 @@ class SecretsMountElasticsearch(dict):
|
|
3043
3193
|
client_cert: Optional[str] = None,
|
3044
3194
|
client_key: Optional[str] = None,
|
3045
3195
|
data: Optional[Mapping[str, str]] = None,
|
3196
|
+
disable_automated_rotation: Optional[bool] = None,
|
3046
3197
|
insecure: Optional[bool] = None,
|
3047
3198
|
plugin_name: Optional[str] = None,
|
3048
3199
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
3200
|
+
rotation_period: Optional[int] = None,
|
3201
|
+
rotation_schedule: Optional[str] = None,
|
3202
|
+
rotation_window: Optional[int] = None,
|
3049
3203
|
tls_server_name: Optional[str] = None,
|
3050
3204
|
username_template: Optional[str] = None,
|
3051
3205
|
verify_connection: Optional[bool] = None):
|
@@ -3061,11 +3215,19 @@ class SecretsMountElasticsearch(dict):
|
|
3061
3215
|
:param str client_cert: The path to the certificate for the Elasticsearch client to present for communication
|
3062
3216
|
:param str client_key: The path to the key for the Elasticsearch client to use for communication
|
3063
3217
|
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3218
|
+
:param bool disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
3064
3219
|
|
3065
3220
|
Supported list of database secrets engines that can be configured:
|
3066
3221
|
:param bool insecure: Whether to disable certificate verification
|
3067
3222
|
:param str plugin_name: Specifies the name of the plugin to use.
|
3068
3223
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
3224
|
+
:param int rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
3225
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
3226
|
+
:param str rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
3227
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
3228
|
+
:param int rotation_window: The maximum amount of time in seconds allowed to complete
|
3229
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
3230
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
3069
3231
|
:param str tls_server_name: This, if set, is used to set the SNI host when connecting via TLS
|
3070
3232
|
:param str username_template: Template describing how dynamic usernames are generated.
|
3071
3233
|
:param bool verify_connection: Whether the connection should be verified on
|
@@ -3087,12 +3249,20 @@ class SecretsMountElasticsearch(dict):
|
|
3087
3249
|
pulumi.set(__self__, "client_key", client_key)
|
3088
3250
|
if data is not None:
|
3089
3251
|
pulumi.set(__self__, "data", data)
|
3252
|
+
if disable_automated_rotation is not None:
|
3253
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
3090
3254
|
if insecure is not None:
|
3091
3255
|
pulumi.set(__self__, "insecure", insecure)
|
3092
3256
|
if plugin_name is not None:
|
3093
3257
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
3094
3258
|
if root_rotation_statements is not None:
|
3095
3259
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
3260
|
+
if rotation_period is not None:
|
3261
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
3262
|
+
if rotation_schedule is not None:
|
3263
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
3264
|
+
if rotation_window is not None:
|
3265
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
3096
3266
|
if tls_server_name is not None:
|
3097
3267
|
pulumi.set(__self__, "tls_server_name", tls_server_name)
|
3098
3268
|
if username_template is not None:
|
@@ -3178,10 +3348,18 @@ class SecretsMountElasticsearch(dict):
|
|
3178
3348
|
def data(self) -> Optional[Mapping[str, str]]:
|
3179
3349
|
"""
|
3180
3350
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3351
|
+
"""
|
3352
|
+
return pulumi.get(self, "data")
|
3353
|
+
|
3354
|
+
@property
|
3355
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
3356
|
+
def disable_automated_rotation(self) -> Optional[bool]:
|
3357
|
+
"""
|
3358
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
3181
3359
|
|
3182
3360
|
Supported list of database secrets engines that can be configured:
|
3183
3361
|
"""
|
3184
|
-
return pulumi.get(self, "
|
3362
|
+
return pulumi.get(self, "disable_automated_rotation")
|
3185
3363
|
|
3186
3364
|
@property
|
3187
3365
|
@pulumi.getter
|
@@ -3207,6 +3385,34 @@ class SecretsMountElasticsearch(dict):
|
|
3207
3385
|
"""
|
3208
3386
|
return pulumi.get(self, "root_rotation_statements")
|
3209
3387
|
|
3388
|
+
@property
|
3389
|
+
@pulumi.getter(name="rotationPeriod")
|
3390
|
+
def rotation_period(self) -> Optional[int]:
|
3391
|
+
"""
|
3392
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
3393
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
3394
|
+
"""
|
3395
|
+
return pulumi.get(self, "rotation_period")
|
3396
|
+
|
3397
|
+
@property
|
3398
|
+
@pulumi.getter(name="rotationSchedule")
|
3399
|
+
def rotation_schedule(self) -> Optional[str]:
|
3400
|
+
"""
|
3401
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
3402
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
3403
|
+
"""
|
3404
|
+
return pulumi.get(self, "rotation_schedule")
|
3405
|
+
|
3406
|
+
@property
|
3407
|
+
@pulumi.getter(name="rotationWindow")
|
3408
|
+
def rotation_window(self) -> Optional[int]:
|
3409
|
+
"""
|
3410
|
+
The maximum amount of time in seconds allowed to complete
|
3411
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
3412
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
3413
|
+
"""
|
3414
|
+
return pulumi.get(self, "rotation_window")
|
3415
|
+
|
3210
3416
|
@property
|
3211
3417
|
@pulumi.getter(name="tlsServerName")
|
3212
3418
|
def tls_server_name(self) -> Optional[str]:
|
@@ -3242,6 +3448,8 @@ class SecretsMountHana(dict):
|
|
3242
3448
|
suggest = "allowed_roles"
|
3243
3449
|
elif key == "connectionUrl":
|
3244
3450
|
suggest = "connection_url"
|
3451
|
+
elif key == "disableAutomatedRotation":
|
3452
|
+
suggest = "disable_automated_rotation"
|
3245
3453
|
elif key == "disableEscaping":
|
3246
3454
|
suggest = "disable_escaping"
|
3247
3455
|
elif key == "maxConnectionLifetime":
|
@@ -3254,6 +3462,12 @@ class SecretsMountHana(dict):
|
|
3254
3462
|
suggest = "plugin_name"
|
3255
3463
|
elif key == "rootRotationStatements":
|
3256
3464
|
suggest = "root_rotation_statements"
|
3465
|
+
elif key == "rotationPeriod":
|
3466
|
+
suggest = "rotation_period"
|
3467
|
+
elif key == "rotationSchedule":
|
3468
|
+
suggest = "rotation_schedule"
|
3469
|
+
elif key == "rotationWindow":
|
3470
|
+
suggest = "rotation_window"
|
3257
3471
|
elif key == "verifyConnection":
|
3258
3472
|
suggest = "verify_connection"
|
3259
3473
|
|
@@ -3273,6 +3487,7 @@ class SecretsMountHana(dict):
|
|
3273
3487
|
allowed_roles: Optional[Sequence[str]] = None,
|
3274
3488
|
connection_url: Optional[str] = None,
|
3275
3489
|
data: Optional[Mapping[str, str]] = None,
|
3490
|
+
disable_automated_rotation: Optional[bool] = None,
|
3276
3491
|
disable_escaping: Optional[bool] = None,
|
3277
3492
|
max_connection_lifetime: Optional[int] = None,
|
3278
3493
|
max_idle_connections: Optional[int] = None,
|
@@ -3280,6 +3495,9 @@ class SecretsMountHana(dict):
|
|
3280
3495
|
password: Optional[str] = None,
|
3281
3496
|
plugin_name: Optional[str] = None,
|
3282
3497
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
3498
|
+
rotation_period: Optional[int] = None,
|
3499
|
+
rotation_schedule: Optional[str] = None,
|
3500
|
+
rotation_window: Optional[int] = None,
|
3283
3501
|
username: Optional[str] = None,
|
3284
3502
|
verify_connection: Optional[bool] = None):
|
3285
3503
|
"""
|
@@ -3288,6 +3506,7 @@ class SecretsMountHana(dict):
|
|
3288
3506
|
connection.
|
3289
3507
|
:param str connection_url: Connection string to use to connect to the database.
|
3290
3508
|
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3509
|
+
:param bool disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
3291
3510
|
|
3292
3511
|
Supported list of database secrets engines that can be configured:
|
3293
3512
|
:param bool disable_escaping: Disable special character escaping in username and password
|
@@ -3297,6 +3516,13 @@ class SecretsMountHana(dict):
|
|
3297
3516
|
:param str password: The root credential password used in the connection URL
|
3298
3517
|
:param str plugin_name: Specifies the name of the plugin to use.
|
3299
3518
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
3519
|
+
:param int rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
3520
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
3521
|
+
:param str rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
3522
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
3523
|
+
:param int rotation_window: The maximum amount of time in seconds allowed to complete
|
3524
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
3525
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
3300
3526
|
:param str username: The root credential username used in the connection URL
|
3301
3527
|
:param bool verify_connection: Whether the connection should be verified on
|
3302
3528
|
initial configuration or not.
|
@@ -3308,6 +3534,8 @@ class SecretsMountHana(dict):
|
|
3308
3534
|
pulumi.set(__self__, "connection_url", connection_url)
|
3309
3535
|
if data is not None:
|
3310
3536
|
pulumi.set(__self__, "data", data)
|
3537
|
+
if disable_automated_rotation is not None:
|
3538
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
3311
3539
|
if disable_escaping is not None:
|
3312
3540
|
pulumi.set(__self__, "disable_escaping", disable_escaping)
|
3313
3541
|
if max_connection_lifetime is not None:
|
@@ -3322,6 +3550,12 @@ class SecretsMountHana(dict):
|
|
3322
3550
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
3323
3551
|
if root_rotation_statements is not None:
|
3324
3552
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
3553
|
+
if rotation_period is not None:
|
3554
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
3555
|
+
if rotation_schedule is not None:
|
3556
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
3557
|
+
if rotation_window is not None:
|
3558
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
3325
3559
|
if username is not None:
|
3326
3560
|
pulumi.set(__self__, "username", username)
|
3327
3561
|
if verify_connection is not None:
|
@@ -3357,10 +3591,18 @@ class SecretsMountHana(dict):
|
|
3357
3591
|
def data(self) -> Optional[Mapping[str, str]]:
|
3358
3592
|
"""
|
3359
3593
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3594
|
+
"""
|
3595
|
+
return pulumi.get(self, "data")
|
3596
|
+
|
3597
|
+
@property
|
3598
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
3599
|
+
def disable_automated_rotation(self) -> Optional[bool]:
|
3600
|
+
"""
|
3601
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
3360
3602
|
|
3361
3603
|
Supported list of database secrets engines that can be configured:
|
3362
3604
|
"""
|
3363
|
-
return pulumi.get(self, "
|
3605
|
+
return pulumi.get(self, "disable_automated_rotation")
|
3364
3606
|
|
3365
3607
|
@property
|
3366
3608
|
@pulumi.getter(name="disableEscaping")
|
@@ -3418,6 +3660,34 @@ class SecretsMountHana(dict):
|
|
3418
3660
|
"""
|
3419
3661
|
return pulumi.get(self, "root_rotation_statements")
|
3420
3662
|
|
3663
|
+
@property
|
3664
|
+
@pulumi.getter(name="rotationPeriod")
|
3665
|
+
def rotation_period(self) -> Optional[int]:
|
3666
|
+
"""
|
3667
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
3668
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
3669
|
+
"""
|
3670
|
+
return pulumi.get(self, "rotation_period")
|
3671
|
+
|
3672
|
+
@property
|
3673
|
+
@pulumi.getter(name="rotationSchedule")
|
3674
|
+
def rotation_schedule(self) -> Optional[str]:
|
3675
|
+
"""
|
3676
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
3677
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
3678
|
+
"""
|
3679
|
+
return pulumi.get(self, "rotation_schedule")
|
3680
|
+
|
3681
|
+
@property
|
3682
|
+
@pulumi.getter(name="rotationWindow")
|
3683
|
+
def rotation_window(self) -> Optional[int]:
|
3684
|
+
"""
|
3685
|
+
The maximum amount of time in seconds allowed to complete
|
3686
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
3687
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
3688
|
+
"""
|
3689
|
+
return pulumi.get(self, "rotation_window")
|
3690
|
+
|
3421
3691
|
@property
|
3422
3692
|
@pulumi.getter
|
3423
3693
|
def username(self) -> Optional[str]:
|
@@ -3445,6 +3715,8 @@ class SecretsMountInfluxdb(dict):
|
|
3445
3715
|
suggest = "allowed_roles"
|
3446
3716
|
elif key == "connectTimeout":
|
3447
3717
|
suggest = "connect_timeout"
|
3718
|
+
elif key == "disableAutomatedRotation":
|
3719
|
+
suggest = "disable_automated_rotation"
|
3448
3720
|
elif key == "insecureTls":
|
3449
3721
|
suggest = "insecure_tls"
|
3450
3722
|
elif key == "pemBundle":
|
@@ -3455,6 +3727,12 @@ class SecretsMountInfluxdb(dict):
|
|
3455
3727
|
suggest = "plugin_name"
|
3456
3728
|
elif key == "rootRotationStatements":
|
3457
3729
|
suggest = "root_rotation_statements"
|
3730
|
+
elif key == "rotationPeriod":
|
3731
|
+
suggest = "rotation_period"
|
3732
|
+
elif key == "rotationSchedule":
|
3733
|
+
suggest = "rotation_schedule"
|
3734
|
+
elif key == "rotationWindow":
|
3735
|
+
suggest = "rotation_window"
|
3458
3736
|
elif key == "usernameTemplate":
|
3459
3737
|
suggest = "username_template"
|
3460
3738
|
elif key == "verifyConnection":
|
@@ -3479,12 +3757,16 @@ class SecretsMountInfluxdb(dict):
|
|
3479
3757
|
allowed_roles: Optional[Sequence[str]] = None,
|
3480
3758
|
connect_timeout: Optional[int] = None,
|
3481
3759
|
data: Optional[Mapping[str, str]] = None,
|
3760
|
+
disable_automated_rotation: Optional[bool] = None,
|
3482
3761
|
insecure_tls: Optional[bool] = None,
|
3483
3762
|
pem_bundle: Optional[str] = None,
|
3484
3763
|
pem_json: Optional[str] = None,
|
3485
3764
|
plugin_name: Optional[str] = None,
|
3486
3765
|
port: Optional[int] = None,
|
3487
3766
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
3767
|
+
rotation_period: Optional[int] = None,
|
3768
|
+
rotation_schedule: Optional[str] = None,
|
3769
|
+
rotation_window: Optional[int] = None,
|
3488
3770
|
tls: Optional[bool] = None,
|
3489
3771
|
username_template: Optional[str] = None,
|
3490
3772
|
verify_connection: Optional[bool] = None):
|
@@ -3497,6 +3779,7 @@ class SecretsMountInfluxdb(dict):
|
|
3497
3779
|
connection.
|
3498
3780
|
:param int connect_timeout: The number of seconds to use as a connection timeout.
|
3499
3781
|
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3782
|
+
:param bool disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
3500
3783
|
|
3501
3784
|
Supported list of database secrets engines that can be configured:
|
3502
3785
|
:param bool insecure_tls: Whether to skip verification of the server certificate when using TLS.
|
@@ -3505,6 +3788,13 @@ class SecretsMountInfluxdb(dict):
|
|
3505
3788
|
:param str plugin_name: Specifies the name of the plugin to use.
|
3506
3789
|
:param int port: The transport port to use to connect to Influxdb.
|
3507
3790
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
3791
|
+
:param int rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
3792
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
3793
|
+
:param str rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
3794
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
3795
|
+
:param int rotation_window: The maximum amount of time in seconds allowed to complete
|
3796
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
3797
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
3508
3798
|
:param bool tls: Whether to use TLS when connecting to Influxdb.
|
3509
3799
|
:param str username_template: Template describing how dynamic usernames are generated.
|
3510
3800
|
:param bool verify_connection: Whether the connection should be verified on
|
@@ -3520,6 +3810,8 @@ class SecretsMountInfluxdb(dict):
|
|
3520
3810
|
pulumi.set(__self__, "connect_timeout", connect_timeout)
|
3521
3811
|
if data is not None:
|
3522
3812
|
pulumi.set(__self__, "data", data)
|
3813
|
+
if disable_automated_rotation is not None:
|
3814
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
3523
3815
|
if insecure_tls is not None:
|
3524
3816
|
pulumi.set(__self__, "insecure_tls", insecure_tls)
|
3525
3817
|
if pem_bundle is not None:
|
@@ -3532,6 +3824,12 @@ class SecretsMountInfluxdb(dict):
|
|
3532
3824
|
pulumi.set(__self__, "port", port)
|
3533
3825
|
if root_rotation_statements is not None:
|
3534
3826
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
3827
|
+
if rotation_period is not None:
|
3828
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
3829
|
+
if rotation_schedule is not None:
|
3830
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
3831
|
+
if rotation_window is not None:
|
3832
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
3535
3833
|
if tls is not None:
|
3536
3834
|
pulumi.set(__self__, "tls", tls)
|
3537
3835
|
if username_template is not None:
|
@@ -3593,10 +3891,18 @@ class SecretsMountInfluxdb(dict):
|
|
3593
3891
|
def data(self) -> Optional[Mapping[str, str]]:
|
3594
3892
|
"""
|
3595
3893
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
3894
|
+
"""
|
3895
|
+
return pulumi.get(self, "data")
|
3896
|
+
|
3897
|
+
@property
|
3898
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
3899
|
+
def disable_automated_rotation(self) -> Optional[bool]:
|
3900
|
+
"""
|
3901
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
3596
3902
|
|
3597
3903
|
Supported list of database secrets engines that can be configured:
|
3598
3904
|
"""
|
3599
|
-
return pulumi.get(self, "
|
3905
|
+
return pulumi.get(self, "disable_automated_rotation")
|
3600
3906
|
|
3601
3907
|
@property
|
3602
3908
|
@pulumi.getter(name="insecureTls")
|
@@ -3646,6 +3952,34 @@ class SecretsMountInfluxdb(dict):
|
|
3646
3952
|
"""
|
3647
3953
|
return pulumi.get(self, "root_rotation_statements")
|
3648
3954
|
|
3955
|
+
@property
|
3956
|
+
@pulumi.getter(name="rotationPeriod")
|
3957
|
+
def rotation_period(self) -> Optional[int]:
|
3958
|
+
"""
|
3959
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
3960
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
3961
|
+
"""
|
3962
|
+
return pulumi.get(self, "rotation_period")
|
3963
|
+
|
3964
|
+
@property
|
3965
|
+
@pulumi.getter(name="rotationSchedule")
|
3966
|
+
def rotation_schedule(self) -> Optional[str]:
|
3967
|
+
"""
|
3968
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
3969
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
3970
|
+
"""
|
3971
|
+
return pulumi.get(self, "rotation_schedule")
|
3972
|
+
|
3973
|
+
@property
|
3974
|
+
@pulumi.getter(name="rotationWindow")
|
3975
|
+
def rotation_window(self) -> Optional[int]:
|
3976
|
+
"""
|
3977
|
+
The maximum amount of time in seconds allowed to complete
|
3978
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
3979
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
3980
|
+
"""
|
3981
|
+
return pulumi.get(self, "rotation_window")
|
3982
|
+
|
3649
3983
|
@property
|
3650
3984
|
@pulumi.getter
|
3651
3985
|
def tls(self) -> Optional[bool]:
|
@@ -3681,6 +4015,8 @@ class SecretsMountMongodb(dict):
|
|
3681
4015
|
suggest = "allowed_roles"
|
3682
4016
|
elif key == "connectionUrl":
|
3683
4017
|
suggest = "connection_url"
|
4018
|
+
elif key == "disableAutomatedRotation":
|
4019
|
+
suggest = "disable_automated_rotation"
|
3684
4020
|
elif key == "maxConnectionLifetime":
|
3685
4021
|
suggest = "max_connection_lifetime"
|
3686
4022
|
elif key == "maxIdleConnections":
|
@@ -3691,6 +4027,12 @@ class SecretsMountMongodb(dict):
|
|
3691
4027
|
suggest = "plugin_name"
|
3692
4028
|
elif key == "rootRotationStatements":
|
3693
4029
|
suggest = "root_rotation_statements"
|
4030
|
+
elif key == "rotationPeriod":
|
4031
|
+
suggest = "rotation_period"
|
4032
|
+
elif key == "rotationSchedule":
|
4033
|
+
suggest = "rotation_schedule"
|
4034
|
+
elif key == "rotationWindow":
|
4035
|
+
suggest = "rotation_window"
|
3694
4036
|
elif key == "usernameTemplate":
|
3695
4037
|
suggest = "username_template"
|
3696
4038
|
elif key == "verifyConnection":
|
@@ -3712,12 +4054,16 @@ class SecretsMountMongodb(dict):
|
|
3712
4054
|
allowed_roles: Optional[Sequence[str]] = None,
|
3713
4055
|
connection_url: Optional[str] = None,
|
3714
4056
|
data: Optional[Mapping[str, str]] = None,
|
4057
|
+
disable_automated_rotation: Optional[bool] = None,
|
3715
4058
|
max_connection_lifetime: Optional[int] = None,
|
3716
4059
|
max_idle_connections: Optional[int] = None,
|
3717
4060
|
max_open_connections: Optional[int] = None,
|
3718
4061
|
password: Optional[str] = None,
|
3719
4062
|
plugin_name: Optional[str] = None,
|
3720
4063
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
4064
|
+
rotation_period: Optional[int] = None,
|
4065
|
+
rotation_schedule: Optional[str] = None,
|
4066
|
+
rotation_window: Optional[int] = None,
|
3721
4067
|
username: Optional[str] = None,
|
3722
4068
|
username_template: Optional[str] = None,
|
3723
4069
|
verify_connection: Optional[bool] = None):
|
@@ -3727,6 +4073,7 @@ class SecretsMountMongodb(dict):
|
|
3727
4073
|
connection.
|
3728
4074
|
:param str connection_url: Connection string to use to connect to the database.
|
3729
4075
|
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4076
|
+
:param bool disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
3730
4077
|
|
3731
4078
|
Supported list of database secrets engines that can be configured:
|
3732
4079
|
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -3735,6 +4082,13 @@ class SecretsMountMongodb(dict):
|
|
3735
4082
|
:param str password: The root credential password used in the connection URL
|
3736
4083
|
:param str plugin_name: Specifies the name of the plugin to use.
|
3737
4084
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
4085
|
+
:param int rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
4086
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
4087
|
+
:param str rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
4088
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
4089
|
+
:param int rotation_window: The maximum amount of time in seconds allowed to complete
|
4090
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
4091
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
3738
4092
|
:param str username: The root credential username used in the connection URL
|
3739
4093
|
:param str username_template: Username generation template.
|
3740
4094
|
:param bool verify_connection: Whether the connection should be verified on
|
@@ -3747,6 +4101,8 @@ class SecretsMountMongodb(dict):
|
|
3747
4101
|
pulumi.set(__self__, "connection_url", connection_url)
|
3748
4102
|
if data is not None:
|
3749
4103
|
pulumi.set(__self__, "data", data)
|
4104
|
+
if disable_automated_rotation is not None:
|
4105
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
3750
4106
|
if max_connection_lifetime is not None:
|
3751
4107
|
pulumi.set(__self__, "max_connection_lifetime", max_connection_lifetime)
|
3752
4108
|
if max_idle_connections is not None:
|
@@ -3759,6 +4115,12 @@ class SecretsMountMongodb(dict):
|
|
3759
4115
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
3760
4116
|
if root_rotation_statements is not None:
|
3761
4117
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
4118
|
+
if rotation_period is not None:
|
4119
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
4120
|
+
if rotation_schedule is not None:
|
4121
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
4122
|
+
if rotation_window is not None:
|
4123
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
3762
4124
|
if username is not None:
|
3763
4125
|
pulumi.set(__self__, "username", username)
|
3764
4126
|
if username_template is not None:
|
@@ -3796,10 +4158,18 @@ class SecretsMountMongodb(dict):
|
|
3796
4158
|
def data(self) -> Optional[Mapping[str, str]]:
|
3797
4159
|
"""
|
3798
4160
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4161
|
+
"""
|
4162
|
+
return pulumi.get(self, "data")
|
4163
|
+
|
4164
|
+
@property
|
4165
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
4166
|
+
def disable_automated_rotation(self) -> Optional[bool]:
|
4167
|
+
"""
|
4168
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
3799
4169
|
|
3800
4170
|
Supported list of database secrets engines that can be configured:
|
3801
4171
|
"""
|
3802
|
-
return pulumi.get(self, "
|
4172
|
+
return pulumi.get(self, "disable_automated_rotation")
|
3803
4173
|
|
3804
4174
|
@property
|
3805
4175
|
@pulumi.getter(name="maxConnectionLifetime")
|
@@ -3849,6 +4219,34 @@ class SecretsMountMongodb(dict):
|
|
3849
4219
|
"""
|
3850
4220
|
return pulumi.get(self, "root_rotation_statements")
|
3851
4221
|
|
4222
|
+
@property
|
4223
|
+
@pulumi.getter(name="rotationPeriod")
|
4224
|
+
def rotation_period(self) -> Optional[int]:
|
4225
|
+
"""
|
4226
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
4227
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
4228
|
+
"""
|
4229
|
+
return pulumi.get(self, "rotation_period")
|
4230
|
+
|
4231
|
+
@property
|
4232
|
+
@pulumi.getter(name="rotationSchedule")
|
4233
|
+
def rotation_schedule(self) -> Optional[str]:
|
4234
|
+
"""
|
4235
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
4236
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
4237
|
+
"""
|
4238
|
+
return pulumi.get(self, "rotation_schedule")
|
4239
|
+
|
4240
|
+
@property
|
4241
|
+
@pulumi.getter(name="rotationWindow")
|
4242
|
+
def rotation_window(self) -> Optional[int]:
|
4243
|
+
"""
|
4244
|
+
The maximum amount of time in seconds allowed to complete
|
4245
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
4246
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
4247
|
+
"""
|
4248
|
+
return pulumi.get(self, "rotation_window")
|
4249
|
+
|
3852
4250
|
@property
|
3853
4251
|
@pulumi.getter
|
3854
4252
|
def username(self) -> Optional[str]:
|
@@ -3888,10 +4286,18 @@ class SecretsMountMongodbatla(dict):
|
|
3888
4286
|
suggest = "public_key"
|
3889
4287
|
elif key == "allowedRoles":
|
3890
4288
|
suggest = "allowed_roles"
|
4289
|
+
elif key == "disableAutomatedRotation":
|
4290
|
+
suggest = "disable_automated_rotation"
|
3891
4291
|
elif key == "pluginName":
|
3892
4292
|
suggest = "plugin_name"
|
3893
4293
|
elif key == "rootRotationStatements":
|
3894
4294
|
suggest = "root_rotation_statements"
|
4295
|
+
elif key == "rotationPeriod":
|
4296
|
+
suggest = "rotation_period"
|
4297
|
+
elif key == "rotationSchedule":
|
4298
|
+
suggest = "rotation_schedule"
|
4299
|
+
elif key == "rotationWindow":
|
4300
|
+
suggest = "rotation_window"
|
3895
4301
|
elif key == "verifyConnection":
|
3896
4302
|
suggest = "verify_connection"
|
3897
4303
|
|
@@ -3913,8 +4319,12 @@ class SecretsMountMongodbatla(dict):
|
|
3913
4319
|
public_key: str,
|
3914
4320
|
allowed_roles: Optional[Sequence[str]] = None,
|
3915
4321
|
data: Optional[Mapping[str, str]] = None,
|
4322
|
+
disable_automated_rotation: Optional[bool] = None,
|
3916
4323
|
plugin_name: Optional[str] = None,
|
3917
4324
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
4325
|
+
rotation_period: Optional[int] = None,
|
4326
|
+
rotation_schedule: Optional[str] = None,
|
4327
|
+
rotation_window: Optional[int] = None,
|
3918
4328
|
verify_connection: Optional[bool] = None):
|
3919
4329
|
"""
|
3920
4330
|
:param str name: Name of the database connection.
|
@@ -3924,10 +4334,18 @@ class SecretsMountMongodbatla(dict):
|
|
3924
4334
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
3925
4335
|
connection.
|
3926
4336
|
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4337
|
+
:param bool disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
3927
4338
|
|
3928
4339
|
Supported list of database secrets engines that can be configured:
|
3929
4340
|
:param str plugin_name: Specifies the name of the plugin to use.
|
3930
4341
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
4342
|
+
:param int rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
4343
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
4344
|
+
:param str rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
4345
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
4346
|
+
:param int rotation_window: The maximum amount of time in seconds allowed to complete
|
4347
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
4348
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
3931
4349
|
:param bool verify_connection: Whether the connection should be verified on
|
3932
4350
|
initial configuration or not.
|
3933
4351
|
"""
|
@@ -3939,10 +4357,18 @@ class SecretsMountMongodbatla(dict):
|
|
3939
4357
|
pulumi.set(__self__, "allowed_roles", allowed_roles)
|
3940
4358
|
if data is not None:
|
3941
4359
|
pulumi.set(__self__, "data", data)
|
4360
|
+
if disable_automated_rotation is not None:
|
4361
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
3942
4362
|
if plugin_name is not None:
|
3943
4363
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
3944
4364
|
if root_rotation_statements is not None:
|
3945
4365
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
4366
|
+
if rotation_period is not None:
|
4367
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
4368
|
+
if rotation_schedule is not None:
|
4369
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
4370
|
+
if rotation_window is not None:
|
4371
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
3946
4372
|
if verify_connection is not None:
|
3947
4373
|
pulumi.set(__self__, "verify_connection", verify_connection)
|
3948
4374
|
|
@@ -3992,10 +4418,18 @@ class SecretsMountMongodbatla(dict):
|
|
3992
4418
|
def data(self) -> Optional[Mapping[str, str]]:
|
3993
4419
|
"""
|
3994
4420
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4421
|
+
"""
|
4422
|
+
return pulumi.get(self, "data")
|
4423
|
+
|
4424
|
+
@property
|
4425
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
4426
|
+
def disable_automated_rotation(self) -> Optional[bool]:
|
4427
|
+
"""
|
4428
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
3995
4429
|
|
3996
4430
|
Supported list of database secrets engines that can be configured:
|
3997
4431
|
"""
|
3998
|
-
return pulumi.get(self, "
|
4432
|
+
return pulumi.get(self, "disable_automated_rotation")
|
3999
4433
|
|
4000
4434
|
@property
|
4001
4435
|
@pulumi.getter(name="pluginName")
|
@@ -4013,6 +4447,34 @@ class SecretsMountMongodbatla(dict):
|
|
4013
4447
|
"""
|
4014
4448
|
return pulumi.get(self, "root_rotation_statements")
|
4015
4449
|
|
4450
|
+
@property
|
4451
|
+
@pulumi.getter(name="rotationPeriod")
|
4452
|
+
def rotation_period(self) -> Optional[int]:
|
4453
|
+
"""
|
4454
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
4455
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
4456
|
+
"""
|
4457
|
+
return pulumi.get(self, "rotation_period")
|
4458
|
+
|
4459
|
+
@property
|
4460
|
+
@pulumi.getter(name="rotationSchedule")
|
4461
|
+
def rotation_schedule(self) -> Optional[str]:
|
4462
|
+
"""
|
4463
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
4464
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
4465
|
+
"""
|
4466
|
+
return pulumi.get(self, "rotation_schedule")
|
4467
|
+
|
4468
|
+
@property
|
4469
|
+
@pulumi.getter(name="rotationWindow")
|
4470
|
+
def rotation_window(self) -> Optional[int]:
|
4471
|
+
"""
|
4472
|
+
The maximum amount of time in seconds allowed to complete
|
4473
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
4474
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
4475
|
+
"""
|
4476
|
+
return pulumi.get(self, "rotation_window")
|
4477
|
+
|
4016
4478
|
@property
|
4017
4479
|
@pulumi.getter(name="verifyConnection")
|
4018
4480
|
def verify_connection(self) -> Optional[bool]:
|
@@ -4034,6 +4496,8 @@ class SecretsMountMssql(dict):
|
|
4034
4496
|
suggest = "connection_url"
|
4035
4497
|
elif key == "containedDb":
|
4036
4498
|
suggest = "contained_db"
|
4499
|
+
elif key == "disableAutomatedRotation":
|
4500
|
+
suggest = "disable_automated_rotation"
|
4037
4501
|
elif key == "disableEscaping":
|
4038
4502
|
suggest = "disable_escaping"
|
4039
4503
|
elif key == "maxConnectionLifetime":
|
@@ -4046,6 +4510,12 @@ class SecretsMountMssql(dict):
|
|
4046
4510
|
suggest = "plugin_name"
|
4047
4511
|
elif key == "rootRotationStatements":
|
4048
4512
|
suggest = "root_rotation_statements"
|
4513
|
+
elif key == "rotationPeriod":
|
4514
|
+
suggest = "rotation_period"
|
4515
|
+
elif key == "rotationSchedule":
|
4516
|
+
suggest = "rotation_schedule"
|
4517
|
+
elif key == "rotationWindow":
|
4518
|
+
suggest = "rotation_window"
|
4049
4519
|
elif key == "usernameTemplate":
|
4050
4520
|
suggest = "username_template"
|
4051
4521
|
elif key == "verifyConnection":
|
@@ -4068,6 +4538,7 @@ class SecretsMountMssql(dict):
|
|
4068
4538
|
connection_url: Optional[str] = None,
|
4069
4539
|
contained_db: Optional[bool] = None,
|
4070
4540
|
data: Optional[Mapping[str, str]] = None,
|
4541
|
+
disable_automated_rotation: Optional[bool] = None,
|
4071
4542
|
disable_escaping: Optional[bool] = None,
|
4072
4543
|
max_connection_lifetime: Optional[int] = None,
|
4073
4544
|
max_idle_connections: Optional[int] = None,
|
@@ -4075,6 +4546,9 @@ class SecretsMountMssql(dict):
|
|
4075
4546
|
password: Optional[str] = None,
|
4076
4547
|
plugin_name: Optional[str] = None,
|
4077
4548
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
4549
|
+
rotation_period: Optional[int] = None,
|
4550
|
+
rotation_schedule: Optional[str] = None,
|
4551
|
+
rotation_window: Optional[int] = None,
|
4078
4552
|
username: Optional[str] = None,
|
4079
4553
|
username_template: Optional[str] = None,
|
4080
4554
|
verify_connection: Optional[bool] = None):
|
@@ -4085,6 +4559,7 @@ class SecretsMountMssql(dict):
|
|
4085
4559
|
:param str connection_url: Connection string to use to connect to the database.
|
4086
4560
|
:param bool contained_db: Set to true when the target is a Contained Database, e.g. AzureSQL.
|
4087
4561
|
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4562
|
+
:param bool disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
4088
4563
|
|
4089
4564
|
Supported list of database secrets engines that can be configured:
|
4090
4565
|
:param bool disable_escaping: Disable special character escaping in username and password
|
@@ -4094,6 +4569,13 @@ class SecretsMountMssql(dict):
|
|
4094
4569
|
:param str password: The root credential password used in the connection URL
|
4095
4570
|
:param str plugin_name: Specifies the name of the plugin to use.
|
4096
4571
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
4572
|
+
:param int rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
4573
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
4574
|
+
:param str rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
4575
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
4576
|
+
:param int rotation_window: The maximum amount of time in seconds allowed to complete
|
4577
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
4578
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
4097
4579
|
:param str username: The root credential username used in the connection URL
|
4098
4580
|
:param str username_template: Username generation template.
|
4099
4581
|
:param bool verify_connection: Whether the connection should be verified on
|
@@ -4108,6 +4590,8 @@ class SecretsMountMssql(dict):
|
|
4108
4590
|
pulumi.set(__self__, "contained_db", contained_db)
|
4109
4591
|
if data is not None:
|
4110
4592
|
pulumi.set(__self__, "data", data)
|
4593
|
+
if disable_automated_rotation is not None:
|
4594
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
4111
4595
|
if disable_escaping is not None:
|
4112
4596
|
pulumi.set(__self__, "disable_escaping", disable_escaping)
|
4113
4597
|
if max_connection_lifetime is not None:
|
@@ -4122,6 +4606,12 @@ class SecretsMountMssql(dict):
|
|
4122
4606
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
4123
4607
|
if root_rotation_statements is not None:
|
4124
4608
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
4609
|
+
if rotation_period is not None:
|
4610
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
4611
|
+
if rotation_schedule is not None:
|
4612
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
4613
|
+
if rotation_window is not None:
|
4614
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
4125
4615
|
if username is not None:
|
4126
4616
|
pulumi.set(__self__, "username", username)
|
4127
4617
|
if username_template is not None:
|
@@ -4167,10 +4657,18 @@ class SecretsMountMssql(dict):
|
|
4167
4657
|
def data(self) -> Optional[Mapping[str, str]]:
|
4168
4658
|
"""
|
4169
4659
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4660
|
+
"""
|
4661
|
+
return pulumi.get(self, "data")
|
4662
|
+
|
4663
|
+
@property
|
4664
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
4665
|
+
def disable_automated_rotation(self) -> Optional[bool]:
|
4666
|
+
"""
|
4667
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
4170
4668
|
|
4171
4669
|
Supported list of database secrets engines that can be configured:
|
4172
4670
|
"""
|
4173
|
-
return pulumi.get(self, "
|
4671
|
+
return pulumi.get(self, "disable_automated_rotation")
|
4174
4672
|
|
4175
4673
|
@property
|
4176
4674
|
@pulumi.getter(name="disableEscaping")
|
@@ -4228,6 +4726,34 @@ class SecretsMountMssql(dict):
|
|
4228
4726
|
"""
|
4229
4727
|
return pulumi.get(self, "root_rotation_statements")
|
4230
4728
|
|
4729
|
+
@property
|
4730
|
+
@pulumi.getter(name="rotationPeriod")
|
4731
|
+
def rotation_period(self) -> Optional[int]:
|
4732
|
+
"""
|
4733
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
4734
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
4735
|
+
"""
|
4736
|
+
return pulumi.get(self, "rotation_period")
|
4737
|
+
|
4738
|
+
@property
|
4739
|
+
@pulumi.getter(name="rotationSchedule")
|
4740
|
+
def rotation_schedule(self) -> Optional[str]:
|
4741
|
+
"""
|
4742
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
4743
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
4744
|
+
"""
|
4745
|
+
return pulumi.get(self, "rotation_schedule")
|
4746
|
+
|
4747
|
+
@property
|
4748
|
+
@pulumi.getter(name="rotationWindow")
|
4749
|
+
def rotation_window(self) -> Optional[int]:
|
4750
|
+
"""
|
4751
|
+
The maximum amount of time in seconds allowed to complete
|
4752
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
4753
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
4754
|
+
"""
|
4755
|
+
return pulumi.get(self, "rotation_window")
|
4756
|
+
|
4231
4757
|
@property
|
4232
4758
|
@pulumi.getter
|
4233
4759
|
def username(self) -> Optional[str]:
|
@@ -4265,6 +4791,8 @@ class SecretsMountMysql(dict):
|
|
4265
4791
|
suggest = "auth_type"
|
4266
4792
|
elif key == "connectionUrl":
|
4267
4793
|
suggest = "connection_url"
|
4794
|
+
elif key == "disableAutomatedRotation":
|
4795
|
+
suggest = "disable_automated_rotation"
|
4268
4796
|
elif key == "maxConnectionLifetime":
|
4269
4797
|
suggest = "max_connection_lifetime"
|
4270
4798
|
elif key == "maxIdleConnections":
|
@@ -4275,6 +4803,12 @@ class SecretsMountMysql(dict):
|
|
4275
4803
|
suggest = "plugin_name"
|
4276
4804
|
elif key == "rootRotationStatements":
|
4277
4805
|
suggest = "root_rotation_statements"
|
4806
|
+
elif key == "rotationPeriod":
|
4807
|
+
suggest = "rotation_period"
|
4808
|
+
elif key == "rotationSchedule":
|
4809
|
+
suggest = "rotation_schedule"
|
4810
|
+
elif key == "rotationWindow":
|
4811
|
+
suggest = "rotation_window"
|
4278
4812
|
elif key == "serviceAccountJson":
|
4279
4813
|
suggest = "service_account_json"
|
4280
4814
|
elif key == "tlsCa":
|
@@ -4303,12 +4837,16 @@ class SecretsMountMysql(dict):
|
|
4303
4837
|
auth_type: Optional[str] = None,
|
4304
4838
|
connection_url: Optional[str] = None,
|
4305
4839
|
data: Optional[Mapping[str, str]] = None,
|
4840
|
+
disable_automated_rotation: Optional[bool] = None,
|
4306
4841
|
max_connection_lifetime: Optional[int] = None,
|
4307
4842
|
max_idle_connections: Optional[int] = None,
|
4308
4843
|
max_open_connections: Optional[int] = None,
|
4309
4844
|
password: Optional[str] = None,
|
4310
4845
|
plugin_name: Optional[str] = None,
|
4311
4846
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
4847
|
+
rotation_period: Optional[int] = None,
|
4848
|
+
rotation_schedule: Optional[str] = None,
|
4849
|
+
rotation_window: Optional[int] = None,
|
4312
4850
|
service_account_json: Optional[str] = None,
|
4313
4851
|
tls_ca: Optional[str] = None,
|
4314
4852
|
tls_certificate_key: Optional[str] = None,
|
@@ -4322,6 +4860,7 @@ class SecretsMountMysql(dict):
|
|
4322
4860
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4323
4861
|
:param str connection_url: Connection string to use to connect to the database.
|
4324
4862
|
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4863
|
+
:param bool disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
4325
4864
|
|
4326
4865
|
Supported list of database secrets engines that can be configured:
|
4327
4866
|
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -4330,6 +4869,13 @@ class SecretsMountMysql(dict):
|
|
4330
4869
|
:param str password: The root credential password used in the connection URL
|
4331
4870
|
:param str plugin_name: Specifies the name of the plugin to use.
|
4332
4871
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
4872
|
+
:param int rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
4873
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
4874
|
+
:param str rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
4875
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
4876
|
+
:param int rotation_window: The maximum amount of time in seconds allowed to complete
|
4877
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
4878
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
4333
4879
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
4334
4880
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
4335
4881
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
@@ -4347,6 +4893,8 @@ class SecretsMountMysql(dict):
|
|
4347
4893
|
pulumi.set(__self__, "connection_url", connection_url)
|
4348
4894
|
if data is not None:
|
4349
4895
|
pulumi.set(__self__, "data", data)
|
4896
|
+
if disable_automated_rotation is not None:
|
4897
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
4350
4898
|
if max_connection_lifetime is not None:
|
4351
4899
|
pulumi.set(__self__, "max_connection_lifetime", max_connection_lifetime)
|
4352
4900
|
if max_idle_connections is not None:
|
@@ -4359,6 +4907,12 @@ class SecretsMountMysql(dict):
|
|
4359
4907
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
4360
4908
|
if root_rotation_statements is not None:
|
4361
4909
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
4910
|
+
if rotation_period is not None:
|
4911
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
4912
|
+
if rotation_schedule is not None:
|
4913
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
4914
|
+
if rotation_window is not None:
|
4915
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
4362
4916
|
if service_account_json is not None:
|
4363
4917
|
pulumi.set(__self__, "service_account_json", service_account_json)
|
4364
4918
|
if tls_ca is not None:
|
@@ -4410,10 +4964,18 @@ class SecretsMountMysql(dict):
|
|
4410
4964
|
def data(self) -> Optional[Mapping[str, str]]:
|
4411
4965
|
"""
|
4412
4966
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
4967
|
+
"""
|
4968
|
+
return pulumi.get(self, "data")
|
4969
|
+
|
4970
|
+
@property
|
4971
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
4972
|
+
def disable_automated_rotation(self) -> Optional[bool]:
|
4973
|
+
"""
|
4974
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
4413
4975
|
|
4414
4976
|
Supported list of database secrets engines that can be configured:
|
4415
4977
|
"""
|
4416
|
-
return pulumi.get(self, "
|
4978
|
+
return pulumi.get(self, "disable_automated_rotation")
|
4417
4979
|
|
4418
4980
|
@property
|
4419
4981
|
@pulumi.getter(name="maxConnectionLifetime")
|
@@ -4463,6 +5025,34 @@ class SecretsMountMysql(dict):
|
|
4463
5025
|
"""
|
4464
5026
|
return pulumi.get(self, "root_rotation_statements")
|
4465
5027
|
|
5028
|
+
@property
|
5029
|
+
@pulumi.getter(name="rotationPeriod")
|
5030
|
+
def rotation_period(self) -> Optional[int]:
|
5031
|
+
"""
|
5032
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
5033
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
5034
|
+
"""
|
5035
|
+
return pulumi.get(self, "rotation_period")
|
5036
|
+
|
5037
|
+
@property
|
5038
|
+
@pulumi.getter(name="rotationSchedule")
|
5039
|
+
def rotation_schedule(self) -> Optional[str]:
|
5040
|
+
"""
|
5041
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
5042
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
5043
|
+
"""
|
5044
|
+
return pulumi.get(self, "rotation_schedule")
|
5045
|
+
|
5046
|
+
@property
|
5047
|
+
@pulumi.getter(name="rotationWindow")
|
5048
|
+
def rotation_window(self) -> Optional[int]:
|
5049
|
+
"""
|
5050
|
+
The maximum amount of time in seconds allowed to complete
|
5051
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
5052
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
5053
|
+
"""
|
5054
|
+
return pulumi.get(self, "rotation_window")
|
5055
|
+
|
4466
5056
|
@property
|
4467
5057
|
@pulumi.getter(name="serviceAccountJson")
|
4468
5058
|
def service_account_json(self) -> Optional[str]:
|
@@ -4524,6 +5114,8 @@ class SecretsMountMysqlAurora(dict):
|
|
4524
5114
|
suggest = "auth_type"
|
4525
5115
|
elif key == "connectionUrl":
|
4526
5116
|
suggest = "connection_url"
|
5117
|
+
elif key == "disableAutomatedRotation":
|
5118
|
+
suggest = "disable_automated_rotation"
|
4527
5119
|
elif key == "maxConnectionLifetime":
|
4528
5120
|
suggest = "max_connection_lifetime"
|
4529
5121
|
elif key == "maxIdleConnections":
|
@@ -4534,6 +5126,12 @@ class SecretsMountMysqlAurora(dict):
|
|
4534
5126
|
suggest = "plugin_name"
|
4535
5127
|
elif key == "rootRotationStatements":
|
4536
5128
|
suggest = "root_rotation_statements"
|
5129
|
+
elif key == "rotationPeriod":
|
5130
|
+
suggest = "rotation_period"
|
5131
|
+
elif key == "rotationSchedule":
|
5132
|
+
suggest = "rotation_schedule"
|
5133
|
+
elif key == "rotationWindow":
|
5134
|
+
suggest = "rotation_window"
|
4537
5135
|
elif key == "serviceAccountJson":
|
4538
5136
|
suggest = "service_account_json"
|
4539
5137
|
elif key == "tlsCa":
|
@@ -4562,12 +5160,16 @@ class SecretsMountMysqlAurora(dict):
|
|
4562
5160
|
auth_type: Optional[str] = None,
|
4563
5161
|
connection_url: Optional[str] = None,
|
4564
5162
|
data: Optional[Mapping[str, str]] = None,
|
5163
|
+
disable_automated_rotation: Optional[bool] = None,
|
4565
5164
|
max_connection_lifetime: Optional[int] = None,
|
4566
5165
|
max_idle_connections: Optional[int] = None,
|
4567
5166
|
max_open_connections: Optional[int] = None,
|
4568
5167
|
password: Optional[str] = None,
|
4569
5168
|
plugin_name: Optional[str] = None,
|
4570
5169
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
5170
|
+
rotation_period: Optional[int] = None,
|
5171
|
+
rotation_schedule: Optional[str] = None,
|
5172
|
+
rotation_window: Optional[int] = None,
|
4571
5173
|
service_account_json: Optional[str] = None,
|
4572
5174
|
tls_ca: Optional[str] = None,
|
4573
5175
|
tls_certificate_key: Optional[str] = None,
|
@@ -4581,6 +5183,7 @@ class SecretsMountMysqlAurora(dict):
|
|
4581
5183
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4582
5184
|
:param str connection_url: Connection string to use to connect to the database.
|
4583
5185
|
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5186
|
+
:param bool disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
4584
5187
|
|
4585
5188
|
Supported list of database secrets engines that can be configured:
|
4586
5189
|
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -4589,6 +5192,13 @@ class SecretsMountMysqlAurora(dict):
|
|
4589
5192
|
:param str password: The root credential password used in the connection URL
|
4590
5193
|
:param str plugin_name: Specifies the name of the plugin to use.
|
4591
5194
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5195
|
+
:param int rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
5196
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
5197
|
+
:param str rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
5198
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
5199
|
+
:param int rotation_window: The maximum amount of time in seconds allowed to complete
|
5200
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
5201
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
4592
5202
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
4593
5203
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
4594
5204
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
@@ -4606,6 +5216,8 @@ class SecretsMountMysqlAurora(dict):
|
|
4606
5216
|
pulumi.set(__self__, "connection_url", connection_url)
|
4607
5217
|
if data is not None:
|
4608
5218
|
pulumi.set(__self__, "data", data)
|
5219
|
+
if disable_automated_rotation is not None:
|
5220
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
4609
5221
|
if max_connection_lifetime is not None:
|
4610
5222
|
pulumi.set(__self__, "max_connection_lifetime", max_connection_lifetime)
|
4611
5223
|
if max_idle_connections is not None:
|
@@ -4618,6 +5230,12 @@ class SecretsMountMysqlAurora(dict):
|
|
4618
5230
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
4619
5231
|
if root_rotation_statements is not None:
|
4620
5232
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
5233
|
+
if rotation_period is not None:
|
5234
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
5235
|
+
if rotation_schedule is not None:
|
5236
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
5237
|
+
if rotation_window is not None:
|
5238
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
4621
5239
|
if service_account_json is not None:
|
4622
5240
|
pulumi.set(__self__, "service_account_json", service_account_json)
|
4623
5241
|
if tls_ca is not None:
|
@@ -4669,10 +5287,18 @@ class SecretsMountMysqlAurora(dict):
|
|
4669
5287
|
def data(self) -> Optional[Mapping[str, str]]:
|
4670
5288
|
"""
|
4671
5289
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5290
|
+
"""
|
5291
|
+
return pulumi.get(self, "data")
|
5292
|
+
|
5293
|
+
@property
|
5294
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
5295
|
+
def disable_automated_rotation(self) -> Optional[bool]:
|
5296
|
+
"""
|
5297
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
4672
5298
|
|
4673
5299
|
Supported list of database secrets engines that can be configured:
|
4674
5300
|
"""
|
4675
|
-
return pulumi.get(self, "
|
5301
|
+
return pulumi.get(self, "disable_automated_rotation")
|
4676
5302
|
|
4677
5303
|
@property
|
4678
5304
|
@pulumi.getter(name="maxConnectionLifetime")
|
@@ -4722,6 +5348,34 @@ class SecretsMountMysqlAurora(dict):
|
|
4722
5348
|
"""
|
4723
5349
|
return pulumi.get(self, "root_rotation_statements")
|
4724
5350
|
|
5351
|
+
@property
|
5352
|
+
@pulumi.getter(name="rotationPeriod")
|
5353
|
+
def rotation_period(self) -> Optional[int]:
|
5354
|
+
"""
|
5355
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
5356
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
5357
|
+
"""
|
5358
|
+
return pulumi.get(self, "rotation_period")
|
5359
|
+
|
5360
|
+
@property
|
5361
|
+
@pulumi.getter(name="rotationSchedule")
|
5362
|
+
def rotation_schedule(self) -> Optional[str]:
|
5363
|
+
"""
|
5364
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
5365
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
5366
|
+
"""
|
5367
|
+
return pulumi.get(self, "rotation_schedule")
|
5368
|
+
|
5369
|
+
@property
|
5370
|
+
@pulumi.getter(name="rotationWindow")
|
5371
|
+
def rotation_window(self) -> Optional[int]:
|
5372
|
+
"""
|
5373
|
+
The maximum amount of time in seconds allowed to complete
|
5374
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
5375
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
5376
|
+
"""
|
5377
|
+
return pulumi.get(self, "rotation_window")
|
5378
|
+
|
4725
5379
|
@property
|
4726
5380
|
@pulumi.getter(name="serviceAccountJson")
|
4727
5381
|
def service_account_json(self) -> Optional[str]:
|
@@ -4783,6 +5437,8 @@ class SecretsMountMysqlLegacy(dict):
|
|
4783
5437
|
suggest = "auth_type"
|
4784
5438
|
elif key == "connectionUrl":
|
4785
5439
|
suggest = "connection_url"
|
5440
|
+
elif key == "disableAutomatedRotation":
|
5441
|
+
suggest = "disable_automated_rotation"
|
4786
5442
|
elif key == "maxConnectionLifetime":
|
4787
5443
|
suggest = "max_connection_lifetime"
|
4788
5444
|
elif key == "maxIdleConnections":
|
@@ -4793,6 +5449,12 @@ class SecretsMountMysqlLegacy(dict):
|
|
4793
5449
|
suggest = "plugin_name"
|
4794
5450
|
elif key == "rootRotationStatements":
|
4795
5451
|
suggest = "root_rotation_statements"
|
5452
|
+
elif key == "rotationPeriod":
|
5453
|
+
suggest = "rotation_period"
|
5454
|
+
elif key == "rotationSchedule":
|
5455
|
+
suggest = "rotation_schedule"
|
5456
|
+
elif key == "rotationWindow":
|
5457
|
+
suggest = "rotation_window"
|
4796
5458
|
elif key == "serviceAccountJson":
|
4797
5459
|
suggest = "service_account_json"
|
4798
5460
|
elif key == "tlsCa":
|
@@ -4821,12 +5483,16 @@ class SecretsMountMysqlLegacy(dict):
|
|
4821
5483
|
auth_type: Optional[str] = None,
|
4822
5484
|
connection_url: Optional[str] = None,
|
4823
5485
|
data: Optional[Mapping[str, str]] = None,
|
5486
|
+
disable_automated_rotation: Optional[bool] = None,
|
4824
5487
|
max_connection_lifetime: Optional[int] = None,
|
4825
5488
|
max_idle_connections: Optional[int] = None,
|
4826
5489
|
max_open_connections: Optional[int] = None,
|
4827
5490
|
password: Optional[str] = None,
|
4828
5491
|
plugin_name: Optional[str] = None,
|
4829
5492
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
5493
|
+
rotation_period: Optional[int] = None,
|
5494
|
+
rotation_schedule: Optional[str] = None,
|
5495
|
+
rotation_window: Optional[int] = None,
|
4830
5496
|
service_account_json: Optional[str] = None,
|
4831
5497
|
tls_ca: Optional[str] = None,
|
4832
5498
|
tls_certificate_key: Optional[str] = None,
|
@@ -4840,6 +5506,7 @@ class SecretsMountMysqlLegacy(dict):
|
|
4840
5506
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
4841
5507
|
:param str connection_url: Connection string to use to connect to the database.
|
4842
5508
|
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5509
|
+
:param bool disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
4843
5510
|
|
4844
5511
|
Supported list of database secrets engines that can be configured:
|
4845
5512
|
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -4848,6 +5515,13 @@ class SecretsMountMysqlLegacy(dict):
|
|
4848
5515
|
:param str password: The root credential password used in the connection URL
|
4849
5516
|
:param str plugin_name: Specifies the name of the plugin to use.
|
4850
5517
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5518
|
+
:param int rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
5519
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
5520
|
+
:param str rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
5521
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
5522
|
+
:param int rotation_window: The maximum amount of time in seconds allowed to complete
|
5523
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
5524
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
4851
5525
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
4852
5526
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
4853
5527
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
@@ -4865,6 +5539,8 @@ class SecretsMountMysqlLegacy(dict):
|
|
4865
5539
|
pulumi.set(__self__, "connection_url", connection_url)
|
4866
5540
|
if data is not None:
|
4867
5541
|
pulumi.set(__self__, "data", data)
|
5542
|
+
if disable_automated_rotation is not None:
|
5543
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
4868
5544
|
if max_connection_lifetime is not None:
|
4869
5545
|
pulumi.set(__self__, "max_connection_lifetime", max_connection_lifetime)
|
4870
5546
|
if max_idle_connections is not None:
|
@@ -4877,6 +5553,12 @@ class SecretsMountMysqlLegacy(dict):
|
|
4877
5553
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
4878
5554
|
if root_rotation_statements is not None:
|
4879
5555
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
5556
|
+
if rotation_period is not None:
|
5557
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
5558
|
+
if rotation_schedule is not None:
|
5559
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
5560
|
+
if rotation_window is not None:
|
5561
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
4880
5562
|
if service_account_json is not None:
|
4881
5563
|
pulumi.set(__self__, "service_account_json", service_account_json)
|
4882
5564
|
if tls_ca is not None:
|
@@ -4928,10 +5610,18 @@ class SecretsMountMysqlLegacy(dict):
|
|
4928
5610
|
def data(self) -> Optional[Mapping[str, str]]:
|
4929
5611
|
"""
|
4930
5612
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5613
|
+
"""
|
5614
|
+
return pulumi.get(self, "data")
|
5615
|
+
|
5616
|
+
@property
|
5617
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
5618
|
+
def disable_automated_rotation(self) -> Optional[bool]:
|
5619
|
+
"""
|
5620
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
4931
5621
|
|
4932
5622
|
Supported list of database secrets engines that can be configured:
|
4933
5623
|
"""
|
4934
|
-
return pulumi.get(self, "
|
5624
|
+
return pulumi.get(self, "disable_automated_rotation")
|
4935
5625
|
|
4936
5626
|
@property
|
4937
5627
|
@pulumi.getter(name="maxConnectionLifetime")
|
@@ -4981,6 +5671,34 @@ class SecretsMountMysqlLegacy(dict):
|
|
4981
5671
|
"""
|
4982
5672
|
return pulumi.get(self, "root_rotation_statements")
|
4983
5673
|
|
5674
|
+
@property
|
5675
|
+
@pulumi.getter(name="rotationPeriod")
|
5676
|
+
def rotation_period(self) -> Optional[int]:
|
5677
|
+
"""
|
5678
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
5679
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
5680
|
+
"""
|
5681
|
+
return pulumi.get(self, "rotation_period")
|
5682
|
+
|
5683
|
+
@property
|
5684
|
+
@pulumi.getter(name="rotationSchedule")
|
5685
|
+
def rotation_schedule(self) -> Optional[str]:
|
5686
|
+
"""
|
5687
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
5688
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
5689
|
+
"""
|
5690
|
+
return pulumi.get(self, "rotation_schedule")
|
5691
|
+
|
5692
|
+
@property
|
5693
|
+
@pulumi.getter(name="rotationWindow")
|
5694
|
+
def rotation_window(self) -> Optional[int]:
|
5695
|
+
"""
|
5696
|
+
The maximum amount of time in seconds allowed to complete
|
5697
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
5698
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
5699
|
+
"""
|
5700
|
+
return pulumi.get(self, "rotation_window")
|
5701
|
+
|
4984
5702
|
@property
|
4985
5703
|
@pulumi.getter(name="serviceAccountJson")
|
4986
5704
|
def service_account_json(self) -> Optional[str]:
|
@@ -5042,6 +5760,8 @@ class SecretsMountMysqlRd(dict):
|
|
5042
5760
|
suggest = "auth_type"
|
5043
5761
|
elif key == "connectionUrl":
|
5044
5762
|
suggest = "connection_url"
|
5763
|
+
elif key == "disableAutomatedRotation":
|
5764
|
+
suggest = "disable_automated_rotation"
|
5045
5765
|
elif key == "maxConnectionLifetime":
|
5046
5766
|
suggest = "max_connection_lifetime"
|
5047
5767
|
elif key == "maxIdleConnections":
|
@@ -5052,6 +5772,12 @@ class SecretsMountMysqlRd(dict):
|
|
5052
5772
|
suggest = "plugin_name"
|
5053
5773
|
elif key == "rootRotationStatements":
|
5054
5774
|
suggest = "root_rotation_statements"
|
5775
|
+
elif key == "rotationPeriod":
|
5776
|
+
suggest = "rotation_period"
|
5777
|
+
elif key == "rotationSchedule":
|
5778
|
+
suggest = "rotation_schedule"
|
5779
|
+
elif key == "rotationWindow":
|
5780
|
+
suggest = "rotation_window"
|
5055
5781
|
elif key == "serviceAccountJson":
|
5056
5782
|
suggest = "service_account_json"
|
5057
5783
|
elif key == "tlsCa":
|
@@ -5080,12 +5806,16 @@ class SecretsMountMysqlRd(dict):
|
|
5080
5806
|
auth_type: Optional[str] = None,
|
5081
5807
|
connection_url: Optional[str] = None,
|
5082
5808
|
data: Optional[Mapping[str, str]] = None,
|
5809
|
+
disable_automated_rotation: Optional[bool] = None,
|
5083
5810
|
max_connection_lifetime: Optional[int] = None,
|
5084
5811
|
max_idle_connections: Optional[int] = None,
|
5085
5812
|
max_open_connections: Optional[int] = None,
|
5086
5813
|
password: Optional[str] = None,
|
5087
5814
|
plugin_name: Optional[str] = None,
|
5088
5815
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
5816
|
+
rotation_period: Optional[int] = None,
|
5817
|
+
rotation_schedule: Optional[str] = None,
|
5818
|
+
rotation_window: Optional[int] = None,
|
5089
5819
|
service_account_json: Optional[str] = None,
|
5090
5820
|
tls_ca: Optional[str] = None,
|
5091
5821
|
tls_certificate_key: Optional[str] = None,
|
@@ -5099,6 +5829,7 @@ class SecretsMountMysqlRd(dict):
|
|
5099
5829
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5100
5830
|
:param str connection_url: Connection string to use to connect to the database.
|
5101
5831
|
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5832
|
+
:param bool disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
5102
5833
|
|
5103
5834
|
Supported list of database secrets engines that can be configured:
|
5104
5835
|
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -5107,6 +5838,13 @@ class SecretsMountMysqlRd(dict):
|
|
5107
5838
|
:param str password: The root credential password used in the connection URL
|
5108
5839
|
:param str plugin_name: Specifies the name of the plugin to use.
|
5109
5840
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
5841
|
+
:param int rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
5842
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
5843
|
+
:param str rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
5844
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
5845
|
+
:param int rotation_window: The maximum amount of time in seconds allowed to complete
|
5846
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
5847
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
5110
5848
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
5111
5849
|
:param str tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
5112
5850
|
:param str tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
@@ -5124,6 +5862,8 @@ class SecretsMountMysqlRd(dict):
|
|
5124
5862
|
pulumi.set(__self__, "connection_url", connection_url)
|
5125
5863
|
if data is not None:
|
5126
5864
|
pulumi.set(__self__, "data", data)
|
5865
|
+
if disable_automated_rotation is not None:
|
5866
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
5127
5867
|
if max_connection_lifetime is not None:
|
5128
5868
|
pulumi.set(__self__, "max_connection_lifetime", max_connection_lifetime)
|
5129
5869
|
if max_idle_connections is not None:
|
@@ -5136,6 +5876,12 @@ class SecretsMountMysqlRd(dict):
|
|
5136
5876
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
5137
5877
|
if root_rotation_statements is not None:
|
5138
5878
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
5879
|
+
if rotation_period is not None:
|
5880
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
5881
|
+
if rotation_schedule is not None:
|
5882
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
5883
|
+
if rotation_window is not None:
|
5884
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
5139
5885
|
if service_account_json is not None:
|
5140
5886
|
pulumi.set(__self__, "service_account_json", service_account_json)
|
5141
5887
|
if tls_ca is not None:
|
@@ -5187,10 +5933,18 @@ class SecretsMountMysqlRd(dict):
|
|
5187
5933
|
def data(self) -> Optional[Mapping[str, str]]:
|
5188
5934
|
"""
|
5189
5935
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
5936
|
+
"""
|
5937
|
+
return pulumi.get(self, "data")
|
5938
|
+
|
5939
|
+
@property
|
5940
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
5941
|
+
def disable_automated_rotation(self) -> Optional[bool]:
|
5942
|
+
"""
|
5943
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
5190
5944
|
|
5191
5945
|
Supported list of database secrets engines that can be configured:
|
5192
5946
|
"""
|
5193
|
-
return pulumi.get(self, "
|
5947
|
+
return pulumi.get(self, "disable_automated_rotation")
|
5194
5948
|
|
5195
5949
|
@property
|
5196
5950
|
@pulumi.getter(name="maxConnectionLifetime")
|
@@ -5240,6 +5994,34 @@ class SecretsMountMysqlRd(dict):
|
|
5240
5994
|
"""
|
5241
5995
|
return pulumi.get(self, "root_rotation_statements")
|
5242
5996
|
|
5997
|
+
@property
|
5998
|
+
@pulumi.getter(name="rotationPeriod")
|
5999
|
+
def rotation_period(self) -> Optional[int]:
|
6000
|
+
"""
|
6001
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
6002
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
6003
|
+
"""
|
6004
|
+
return pulumi.get(self, "rotation_period")
|
6005
|
+
|
6006
|
+
@property
|
6007
|
+
@pulumi.getter(name="rotationSchedule")
|
6008
|
+
def rotation_schedule(self) -> Optional[str]:
|
6009
|
+
"""
|
6010
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
6011
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
6012
|
+
"""
|
6013
|
+
return pulumi.get(self, "rotation_schedule")
|
6014
|
+
|
6015
|
+
@property
|
6016
|
+
@pulumi.getter(name="rotationWindow")
|
6017
|
+
def rotation_window(self) -> Optional[int]:
|
6018
|
+
"""
|
6019
|
+
The maximum amount of time in seconds allowed to complete
|
6020
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
6021
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
6022
|
+
"""
|
6023
|
+
return pulumi.get(self, "rotation_window")
|
6024
|
+
|
5243
6025
|
@property
|
5244
6026
|
@pulumi.getter(name="serviceAccountJson")
|
5245
6027
|
def service_account_json(self) -> Optional[str]:
|
@@ -5299,6 +6081,8 @@ class SecretsMountOracle(dict):
|
|
5299
6081
|
suggest = "allowed_roles"
|
5300
6082
|
elif key == "connectionUrl":
|
5301
6083
|
suggest = "connection_url"
|
6084
|
+
elif key == "disableAutomatedRotation":
|
6085
|
+
suggest = "disable_automated_rotation"
|
5302
6086
|
elif key == "disconnectSessions":
|
5303
6087
|
suggest = "disconnect_sessions"
|
5304
6088
|
elif key == "maxConnectionLifetime":
|
@@ -5311,6 +6095,12 @@ class SecretsMountOracle(dict):
|
|
5311
6095
|
suggest = "plugin_name"
|
5312
6096
|
elif key == "rootRotationStatements":
|
5313
6097
|
suggest = "root_rotation_statements"
|
6098
|
+
elif key == "rotationPeriod":
|
6099
|
+
suggest = "rotation_period"
|
6100
|
+
elif key == "rotationSchedule":
|
6101
|
+
suggest = "rotation_schedule"
|
6102
|
+
elif key == "rotationWindow":
|
6103
|
+
suggest = "rotation_window"
|
5314
6104
|
elif key == "splitStatements":
|
5315
6105
|
suggest = "split_statements"
|
5316
6106
|
elif key == "usernameTemplate":
|
@@ -5334,6 +6124,7 @@ class SecretsMountOracle(dict):
|
|
5334
6124
|
allowed_roles: Optional[Sequence[str]] = None,
|
5335
6125
|
connection_url: Optional[str] = None,
|
5336
6126
|
data: Optional[Mapping[str, str]] = None,
|
6127
|
+
disable_automated_rotation: Optional[bool] = None,
|
5337
6128
|
disconnect_sessions: Optional[bool] = None,
|
5338
6129
|
max_connection_lifetime: Optional[int] = None,
|
5339
6130
|
max_idle_connections: Optional[int] = None,
|
@@ -5341,6 +6132,9 @@ class SecretsMountOracle(dict):
|
|
5341
6132
|
password: Optional[str] = None,
|
5342
6133
|
plugin_name: Optional[str] = None,
|
5343
6134
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
6135
|
+
rotation_period: Optional[int] = None,
|
6136
|
+
rotation_schedule: Optional[str] = None,
|
6137
|
+
rotation_window: Optional[int] = None,
|
5344
6138
|
split_statements: Optional[bool] = None,
|
5345
6139
|
username: Optional[str] = None,
|
5346
6140
|
username_template: Optional[str] = None,
|
@@ -5351,6 +6145,7 @@ class SecretsMountOracle(dict):
|
|
5351
6145
|
connection.
|
5352
6146
|
:param str connection_url: Connection string to use to connect to the database.
|
5353
6147
|
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6148
|
+
:param bool disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
5354
6149
|
|
5355
6150
|
Supported list of database secrets engines that can be configured:
|
5356
6151
|
:param bool disconnect_sessions: Set to true to disconnect any open sessions prior to running the revocation statements.
|
@@ -5360,6 +6155,13 @@ class SecretsMountOracle(dict):
|
|
5360
6155
|
:param str password: The root credential password used in the connection URL
|
5361
6156
|
:param str plugin_name: Specifies the name of the plugin to use.
|
5362
6157
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
6158
|
+
:param int rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
6159
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
6160
|
+
:param str rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
6161
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
6162
|
+
:param int rotation_window: The maximum amount of time in seconds allowed to complete
|
6163
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
6164
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
5363
6165
|
:param bool split_statements: Set to true in order to split statements after semi-colons.
|
5364
6166
|
:param str username: The root credential username used in the connection URL
|
5365
6167
|
:param str username_template: Username generation template.
|
@@ -5373,6 +6175,8 @@ class SecretsMountOracle(dict):
|
|
5373
6175
|
pulumi.set(__self__, "connection_url", connection_url)
|
5374
6176
|
if data is not None:
|
5375
6177
|
pulumi.set(__self__, "data", data)
|
6178
|
+
if disable_automated_rotation is not None:
|
6179
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
5376
6180
|
if disconnect_sessions is not None:
|
5377
6181
|
pulumi.set(__self__, "disconnect_sessions", disconnect_sessions)
|
5378
6182
|
if max_connection_lifetime is not None:
|
@@ -5387,6 +6191,12 @@ class SecretsMountOracle(dict):
|
|
5387
6191
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
5388
6192
|
if root_rotation_statements is not None:
|
5389
6193
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
6194
|
+
if rotation_period is not None:
|
6195
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
6196
|
+
if rotation_schedule is not None:
|
6197
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
6198
|
+
if rotation_window is not None:
|
6199
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
5390
6200
|
if split_statements is not None:
|
5391
6201
|
pulumi.set(__self__, "split_statements", split_statements)
|
5392
6202
|
if username is not None:
|
@@ -5426,10 +6236,18 @@ class SecretsMountOracle(dict):
|
|
5426
6236
|
def data(self) -> Optional[Mapping[str, str]]:
|
5427
6237
|
"""
|
5428
6238
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6239
|
+
"""
|
6240
|
+
return pulumi.get(self, "data")
|
6241
|
+
|
6242
|
+
@property
|
6243
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
6244
|
+
def disable_automated_rotation(self) -> Optional[bool]:
|
6245
|
+
"""
|
6246
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
5429
6247
|
|
5430
6248
|
Supported list of database secrets engines that can be configured:
|
5431
6249
|
"""
|
5432
|
-
return pulumi.get(self, "
|
6250
|
+
return pulumi.get(self, "disable_automated_rotation")
|
5433
6251
|
|
5434
6252
|
@property
|
5435
6253
|
@pulumi.getter(name="disconnectSessions")
|
@@ -5487,6 +6305,34 @@ class SecretsMountOracle(dict):
|
|
5487
6305
|
"""
|
5488
6306
|
return pulumi.get(self, "root_rotation_statements")
|
5489
6307
|
|
6308
|
+
@property
|
6309
|
+
@pulumi.getter(name="rotationPeriod")
|
6310
|
+
def rotation_period(self) -> Optional[int]:
|
6311
|
+
"""
|
6312
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
6313
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
6314
|
+
"""
|
6315
|
+
return pulumi.get(self, "rotation_period")
|
6316
|
+
|
6317
|
+
@property
|
6318
|
+
@pulumi.getter(name="rotationSchedule")
|
6319
|
+
def rotation_schedule(self) -> Optional[str]:
|
6320
|
+
"""
|
6321
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
6322
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
6323
|
+
"""
|
6324
|
+
return pulumi.get(self, "rotation_schedule")
|
6325
|
+
|
6326
|
+
@property
|
6327
|
+
@pulumi.getter(name="rotationWindow")
|
6328
|
+
def rotation_window(self) -> Optional[int]:
|
6329
|
+
"""
|
6330
|
+
The maximum amount of time in seconds allowed to complete
|
6331
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
6332
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
6333
|
+
"""
|
6334
|
+
return pulumi.get(self, "rotation_window")
|
6335
|
+
|
5490
6336
|
@property
|
5491
6337
|
@pulumi.getter(name="splitStatements")
|
5492
6338
|
def split_statements(self) -> Optional[bool]:
|
@@ -5532,6 +6378,8 @@ class SecretsMountPostgresql(dict):
|
|
5532
6378
|
suggest = "auth_type"
|
5533
6379
|
elif key == "connectionUrl":
|
5534
6380
|
suggest = "connection_url"
|
6381
|
+
elif key == "disableAutomatedRotation":
|
6382
|
+
suggest = "disable_automated_rotation"
|
5535
6383
|
elif key == "disableEscaping":
|
5536
6384
|
suggest = "disable_escaping"
|
5537
6385
|
elif key == "maxConnectionLifetime":
|
@@ -5540,12 +6388,20 @@ class SecretsMountPostgresql(dict):
|
|
5540
6388
|
suggest = "max_idle_connections"
|
5541
6389
|
elif key == "maxOpenConnections":
|
5542
6390
|
suggest = "max_open_connections"
|
6391
|
+
elif key == "passwordAuthentication":
|
6392
|
+
suggest = "password_authentication"
|
5543
6393
|
elif key == "pluginName":
|
5544
6394
|
suggest = "plugin_name"
|
5545
6395
|
elif key == "privateKey":
|
5546
6396
|
suggest = "private_key"
|
5547
6397
|
elif key == "rootRotationStatements":
|
5548
6398
|
suggest = "root_rotation_statements"
|
6399
|
+
elif key == "rotationPeriod":
|
6400
|
+
suggest = "rotation_period"
|
6401
|
+
elif key == "rotationSchedule":
|
6402
|
+
suggest = "rotation_schedule"
|
6403
|
+
elif key == "rotationWindow":
|
6404
|
+
suggest = "rotation_window"
|
5549
6405
|
elif key == "selfManaged":
|
5550
6406
|
suggest = "self_managed"
|
5551
6407
|
elif key == "serviceAccountJson":
|
@@ -5576,14 +6432,19 @@ class SecretsMountPostgresql(dict):
|
|
5576
6432
|
auth_type: Optional[str] = None,
|
5577
6433
|
connection_url: Optional[str] = None,
|
5578
6434
|
data: Optional[Mapping[str, str]] = None,
|
6435
|
+
disable_automated_rotation: Optional[bool] = None,
|
5579
6436
|
disable_escaping: Optional[bool] = None,
|
5580
6437
|
max_connection_lifetime: Optional[int] = None,
|
5581
6438
|
max_idle_connections: Optional[int] = None,
|
5582
6439
|
max_open_connections: Optional[int] = None,
|
5583
6440
|
password: Optional[str] = None,
|
6441
|
+
password_authentication: Optional[str] = None,
|
5584
6442
|
plugin_name: Optional[str] = None,
|
5585
6443
|
private_key: Optional[str] = None,
|
5586
6444
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
6445
|
+
rotation_period: Optional[int] = None,
|
6446
|
+
rotation_schedule: Optional[str] = None,
|
6447
|
+
rotation_window: Optional[int] = None,
|
5587
6448
|
self_managed: Optional[bool] = None,
|
5588
6449
|
service_account_json: Optional[str] = None,
|
5589
6450
|
tls_ca: Optional[str] = None,
|
@@ -5598,6 +6459,7 @@ class SecretsMountPostgresql(dict):
|
|
5598
6459
|
:param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
|
5599
6460
|
:param str connection_url: Connection string to use to connect to the database.
|
5600
6461
|
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6462
|
+
:param bool disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
5601
6463
|
|
5602
6464
|
Supported list of database secrets engines that can be configured:
|
5603
6465
|
:param bool disable_escaping: Disable special character escaping in username and password
|
@@ -5605,9 +6467,17 @@ class SecretsMountPostgresql(dict):
|
|
5605
6467
|
:param int max_idle_connections: Maximum number of idle connections to the database.
|
5606
6468
|
:param int max_open_connections: Maximum number of open connections to the database.
|
5607
6469
|
:param str password: The root credential password used in the connection URL
|
6470
|
+
:param str password_authentication: When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
5608
6471
|
:param str plugin_name: Specifies the name of the plugin to use.
|
5609
6472
|
:param str private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
|
5610
6473
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
6474
|
+
:param int rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
6475
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
6476
|
+
:param str rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
6477
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
6478
|
+
:param int rotation_window: The maximum amount of time in seconds allowed to complete
|
6479
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
6480
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
5611
6481
|
:param bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
|
5612
6482
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
5613
6483
|
:param str tls_ca: The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded.
|
@@ -5626,6 +6496,8 @@ class SecretsMountPostgresql(dict):
|
|
5626
6496
|
pulumi.set(__self__, "connection_url", connection_url)
|
5627
6497
|
if data is not None:
|
5628
6498
|
pulumi.set(__self__, "data", data)
|
6499
|
+
if disable_automated_rotation is not None:
|
6500
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
5629
6501
|
if disable_escaping is not None:
|
5630
6502
|
pulumi.set(__self__, "disable_escaping", disable_escaping)
|
5631
6503
|
if max_connection_lifetime is not None:
|
@@ -5636,12 +6508,20 @@ class SecretsMountPostgresql(dict):
|
|
5636
6508
|
pulumi.set(__self__, "max_open_connections", max_open_connections)
|
5637
6509
|
if password is not None:
|
5638
6510
|
pulumi.set(__self__, "password", password)
|
6511
|
+
if password_authentication is not None:
|
6512
|
+
pulumi.set(__self__, "password_authentication", password_authentication)
|
5639
6513
|
if plugin_name is not None:
|
5640
6514
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
5641
6515
|
if private_key is not None:
|
5642
6516
|
pulumi.set(__self__, "private_key", private_key)
|
5643
6517
|
if root_rotation_statements is not None:
|
5644
6518
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
6519
|
+
if rotation_period is not None:
|
6520
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
6521
|
+
if rotation_schedule is not None:
|
6522
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
6523
|
+
if rotation_window is not None:
|
6524
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
5645
6525
|
if self_managed is not None:
|
5646
6526
|
pulumi.set(__self__, "self_managed", self_managed)
|
5647
6527
|
if service_account_json is not None:
|
@@ -5695,10 +6575,18 @@ class SecretsMountPostgresql(dict):
|
|
5695
6575
|
def data(self) -> Optional[Mapping[str, str]]:
|
5696
6576
|
"""
|
5697
6577
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6578
|
+
"""
|
6579
|
+
return pulumi.get(self, "data")
|
6580
|
+
|
6581
|
+
@property
|
6582
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
6583
|
+
def disable_automated_rotation(self) -> Optional[bool]:
|
6584
|
+
"""
|
6585
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
5698
6586
|
|
5699
6587
|
Supported list of database secrets engines that can be configured:
|
5700
6588
|
"""
|
5701
|
-
return pulumi.get(self, "
|
6589
|
+
return pulumi.get(self, "disable_automated_rotation")
|
5702
6590
|
|
5703
6591
|
@property
|
5704
6592
|
@pulumi.getter(name="disableEscaping")
|
@@ -5740,6 +6628,14 @@ class SecretsMountPostgresql(dict):
|
|
5740
6628
|
"""
|
5741
6629
|
return pulumi.get(self, "password")
|
5742
6630
|
|
6631
|
+
@property
|
6632
|
+
@pulumi.getter(name="passwordAuthentication")
|
6633
|
+
def password_authentication(self) -> Optional[str]:
|
6634
|
+
"""
|
6635
|
+
When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
6636
|
+
"""
|
6637
|
+
return pulumi.get(self, "password_authentication")
|
6638
|
+
|
5743
6639
|
@property
|
5744
6640
|
@pulumi.getter(name="pluginName")
|
5745
6641
|
def plugin_name(self) -> Optional[str]:
|
@@ -5764,6 +6660,34 @@ class SecretsMountPostgresql(dict):
|
|
5764
6660
|
"""
|
5765
6661
|
return pulumi.get(self, "root_rotation_statements")
|
5766
6662
|
|
6663
|
+
@property
|
6664
|
+
@pulumi.getter(name="rotationPeriod")
|
6665
|
+
def rotation_period(self) -> Optional[int]:
|
6666
|
+
"""
|
6667
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
6668
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
6669
|
+
"""
|
6670
|
+
return pulumi.get(self, "rotation_period")
|
6671
|
+
|
6672
|
+
@property
|
6673
|
+
@pulumi.getter(name="rotationSchedule")
|
6674
|
+
def rotation_schedule(self) -> Optional[str]:
|
6675
|
+
"""
|
6676
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
6677
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
6678
|
+
"""
|
6679
|
+
return pulumi.get(self, "rotation_schedule")
|
6680
|
+
|
6681
|
+
@property
|
6682
|
+
@pulumi.getter(name="rotationWindow")
|
6683
|
+
def rotation_window(self) -> Optional[int]:
|
6684
|
+
"""
|
6685
|
+
The maximum amount of time in seconds allowed to complete
|
6686
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
6687
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
6688
|
+
"""
|
6689
|
+
return pulumi.get(self, "rotation_window")
|
6690
|
+
|
5767
6691
|
@property
|
5768
6692
|
@pulumi.getter(name="selfManaged")
|
5769
6693
|
def self_managed(self) -> Optional[bool]:
|
@@ -5831,12 +6755,20 @@ class SecretsMountRedi(dict):
|
|
5831
6755
|
suggest = "allowed_roles"
|
5832
6756
|
elif key == "caCert":
|
5833
6757
|
suggest = "ca_cert"
|
6758
|
+
elif key == "disableAutomatedRotation":
|
6759
|
+
suggest = "disable_automated_rotation"
|
5834
6760
|
elif key == "insecureTls":
|
5835
6761
|
suggest = "insecure_tls"
|
5836
6762
|
elif key == "pluginName":
|
5837
6763
|
suggest = "plugin_name"
|
5838
6764
|
elif key == "rootRotationStatements":
|
5839
6765
|
suggest = "root_rotation_statements"
|
6766
|
+
elif key == "rotationPeriod":
|
6767
|
+
suggest = "rotation_period"
|
6768
|
+
elif key == "rotationSchedule":
|
6769
|
+
suggest = "rotation_schedule"
|
6770
|
+
elif key == "rotationWindow":
|
6771
|
+
suggest = "rotation_window"
|
5840
6772
|
elif key == "verifyConnection":
|
5841
6773
|
suggest = "verify_connection"
|
5842
6774
|
|
@@ -5859,10 +6791,14 @@ class SecretsMountRedi(dict):
|
|
5859
6791
|
allowed_roles: Optional[Sequence[str]] = None,
|
5860
6792
|
ca_cert: Optional[str] = None,
|
5861
6793
|
data: Optional[Mapping[str, str]] = None,
|
6794
|
+
disable_automated_rotation: Optional[bool] = None,
|
5862
6795
|
insecure_tls: Optional[bool] = None,
|
5863
6796
|
plugin_name: Optional[str] = None,
|
5864
6797
|
port: Optional[int] = None,
|
5865
6798
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
6799
|
+
rotation_period: Optional[int] = None,
|
6800
|
+
rotation_schedule: Optional[str] = None,
|
6801
|
+
rotation_window: Optional[int] = None,
|
5866
6802
|
tls: Optional[bool] = None,
|
5867
6803
|
verify_connection: Optional[bool] = None):
|
5868
6804
|
"""
|
@@ -5874,12 +6810,20 @@ class SecretsMountRedi(dict):
|
|
5874
6810
|
connection.
|
5875
6811
|
:param str ca_cert: The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
|
5876
6812
|
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6813
|
+
:param bool disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
5877
6814
|
|
5878
6815
|
Supported list of database secrets engines that can be configured:
|
5879
6816
|
:param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
|
5880
6817
|
:param str plugin_name: Specifies the name of the plugin to use.
|
5881
6818
|
:param int port: The transport port to use to connect to Redis.
|
5882
6819
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
6820
|
+
:param int rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
6821
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
6822
|
+
:param str rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
6823
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
6824
|
+
:param int rotation_window: The maximum amount of time in seconds allowed to complete
|
6825
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
6826
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
5883
6827
|
:param bool tls: Specifies whether to use TLS when connecting to Redis.
|
5884
6828
|
:param bool verify_connection: Whether the connection should be verified on
|
5885
6829
|
initial configuration or not.
|
@@ -5894,6 +6838,8 @@ class SecretsMountRedi(dict):
|
|
5894
6838
|
pulumi.set(__self__, "ca_cert", ca_cert)
|
5895
6839
|
if data is not None:
|
5896
6840
|
pulumi.set(__self__, "data", data)
|
6841
|
+
if disable_automated_rotation is not None:
|
6842
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
5897
6843
|
if insecure_tls is not None:
|
5898
6844
|
pulumi.set(__self__, "insecure_tls", insecure_tls)
|
5899
6845
|
if plugin_name is not None:
|
@@ -5902,6 +6848,12 @@ class SecretsMountRedi(dict):
|
|
5902
6848
|
pulumi.set(__self__, "port", port)
|
5903
6849
|
if root_rotation_statements is not None:
|
5904
6850
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
6851
|
+
if rotation_period is not None:
|
6852
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
6853
|
+
if rotation_schedule is not None:
|
6854
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
6855
|
+
if rotation_window is not None:
|
6856
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
5905
6857
|
if tls is not None:
|
5906
6858
|
pulumi.set(__self__, "tls", tls)
|
5907
6859
|
if verify_connection is not None:
|
@@ -5961,10 +6913,18 @@ class SecretsMountRedi(dict):
|
|
5961
6913
|
def data(self) -> Optional[Mapping[str, str]]:
|
5962
6914
|
"""
|
5963
6915
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
6916
|
+
"""
|
6917
|
+
return pulumi.get(self, "data")
|
6918
|
+
|
6919
|
+
@property
|
6920
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
6921
|
+
def disable_automated_rotation(self) -> Optional[bool]:
|
6922
|
+
"""
|
6923
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
5964
6924
|
|
5965
6925
|
Supported list of database secrets engines that can be configured:
|
5966
6926
|
"""
|
5967
|
-
return pulumi.get(self, "
|
6927
|
+
return pulumi.get(self, "disable_automated_rotation")
|
5968
6928
|
|
5969
6929
|
@property
|
5970
6930
|
@pulumi.getter(name="insecureTls")
|
@@ -5998,6 +6958,34 @@ class SecretsMountRedi(dict):
|
|
5998
6958
|
"""
|
5999
6959
|
return pulumi.get(self, "root_rotation_statements")
|
6000
6960
|
|
6961
|
+
@property
|
6962
|
+
@pulumi.getter(name="rotationPeriod")
|
6963
|
+
def rotation_period(self) -> Optional[int]:
|
6964
|
+
"""
|
6965
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
6966
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
6967
|
+
"""
|
6968
|
+
return pulumi.get(self, "rotation_period")
|
6969
|
+
|
6970
|
+
@property
|
6971
|
+
@pulumi.getter(name="rotationSchedule")
|
6972
|
+
def rotation_schedule(self) -> Optional[str]:
|
6973
|
+
"""
|
6974
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
6975
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
6976
|
+
"""
|
6977
|
+
return pulumi.get(self, "rotation_schedule")
|
6978
|
+
|
6979
|
+
@property
|
6980
|
+
@pulumi.getter(name="rotationWindow")
|
6981
|
+
def rotation_window(self) -> Optional[int]:
|
6982
|
+
"""
|
6983
|
+
The maximum amount of time in seconds allowed to complete
|
6984
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
6985
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
6986
|
+
"""
|
6987
|
+
return pulumi.get(self, "rotation_window")
|
6988
|
+
|
6001
6989
|
@property
|
6002
6990
|
@pulumi.getter
|
6003
6991
|
def tls(self) -> Optional[bool]:
|
@@ -6023,10 +7011,18 @@ class SecretsMountRedisElasticach(dict):
|
|
6023
7011
|
suggest = None
|
6024
7012
|
if key == "allowedRoles":
|
6025
7013
|
suggest = "allowed_roles"
|
7014
|
+
elif key == "disableAutomatedRotation":
|
7015
|
+
suggest = "disable_automated_rotation"
|
6026
7016
|
elif key == "pluginName":
|
6027
7017
|
suggest = "plugin_name"
|
6028
7018
|
elif key == "rootRotationStatements":
|
6029
7019
|
suggest = "root_rotation_statements"
|
7020
|
+
elif key == "rotationPeriod":
|
7021
|
+
suggest = "rotation_period"
|
7022
|
+
elif key == "rotationSchedule":
|
7023
|
+
suggest = "rotation_schedule"
|
7024
|
+
elif key == "rotationWindow":
|
7025
|
+
suggest = "rotation_window"
|
6030
7026
|
elif key == "verifyConnection":
|
6031
7027
|
suggest = "verify_connection"
|
6032
7028
|
|
@@ -6046,10 +7042,14 @@ class SecretsMountRedisElasticach(dict):
|
|
6046
7042
|
url: str,
|
6047
7043
|
allowed_roles: Optional[Sequence[str]] = None,
|
6048
7044
|
data: Optional[Mapping[str, str]] = None,
|
7045
|
+
disable_automated_rotation: Optional[bool] = None,
|
6049
7046
|
password: Optional[str] = None,
|
6050
7047
|
plugin_name: Optional[str] = None,
|
6051
7048
|
region: Optional[str] = None,
|
6052
7049
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
7050
|
+
rotation_period: Optional[int] = None,
|
7051
|
+
rotation_schedule: Optional[str] = None,
|
7052
|
+
rotation_window: Optional[int] = None,
|
6053
7053
|
username: Optional[str] = None,
|
6054
7054
|
verify_connection: Optional[bool] = None):
|
6055
7055
|
"""
|
@@ -6058,12 +7058,20 @@ class SecretsMountRedisElasticach(dict):
|
|
6058
7058
|
:param Sequence[str] allowed_roles: A list of roles that are allowed to use this
|
6059
7059
|
connection.
|
6060
7060
|
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7061
|
+
:param bool disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
6061
7062
|
|
6062
7063
|
Supported list of database secrets engines that can be configured:
|
6063
7064
|
:param str password: The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
6064
7065
|
:param str plugin_name: Specifies the name of the plugin to use.
|
6065
7066
|
:param str region: The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.
|
6066
7067
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
7068
|
+
:param int rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
7069
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
7070
|
+
:param str rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
7071
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
7072
|
+
:param int rotation_window: The maximum amount of time in seconds allowed to complete
|
7073
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
7074
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
6067
7075
|
:param str username: The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
|
6068
7076
|
:param bool verify_connection: Whether the connection should be verified on
|
6069
7077
|
initial configuration or not.
|
@@ -6074,6 +7082,8 @@ class SecretsMountRedisElasticach(dict):
|
|
6074
7082
|
pulumi.set(__self__, "allowed_roles", allowed_roles)
|
6075
7083
|
if data is not None:
|
6076
7084
|
pulumi.set(__self__, "data", data)
|
7085
|
+
if disable_automated_rotation is not None:
|
7086
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
6077
7087
|
if password is not None:
|
6078
7088
|
pulumi.set(__self__, "password", password)
|
6079
7089
|
if plugin_name is not None:
|
@@ -6082,6 +7092,12 @@ class SecretsMountRedisElasticach(dict):
|
|
6082
7092
|
pulumi.set(__self__, "region", region)
|
6083
7093
|
if root_rotation_statements is not None:
|
6084
7094
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
7095
|
+
if rotation_period is not None:
|
7096
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
7097
|
+
if rotation_schedule is not None:
|
7098
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
7099
|
+
if rotation_window is not None:
|
7100
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
6085
7101
|
if username is not None:
|
6086
7102
|
pulumi.set(__self__, "username", username)
|
6087
7103
|
if verify_connection is not None:
|
@@ -6117,10 +7133,18 @@ class SecretsMountRedisElasticach(dict):
|
|
6117
7133
|
def data(self) -> Optional[Mapping[str, str]]:
|
6118
7134
|
"""
|
6119
7135
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7136
|
+
"""
|
7137
|
+
return pulumi.get(self, "data")
|
7138
|
+
|
7139
|
+
@property
|
7140
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
7141
|
+
def disable_automated_rotation(self) -> Optional[bool]:
|
7142
|
+
"""
|
7143
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
6120
7144
|
|
6121
7145
|
Supported list of database secrets engines that can be configured:
|
6122
7146
|
"""
|
6123
|
-
return pulumi.get(self, "
|
7147
|
+
return pulumi.get(self, "disable_automated_rotation")
|
6124
7148
|
|
6125
7149
|
@property
|
6126
7150
|
@pulumi.getter
|
@@ -6154,6 +7178,34 @@ class SecretsMountRedisElasticach(dict):
|
|
6154
7178
|
"""
|
6155
7179
|
return pulumi.get(self, "root_rotation_statements")
|
6156
7180
|
|
7181
|
+
@property
|
7182
|
+
@pulumi.getter(name="rotationPeriod")
|
7183
|
+
def rotation_period(self) -> Optional[int]:
|
7184
|
+
"""
|
7185
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
7186
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
7187
|
+
"""
|
7188
|
+
return pulumi.get(self, "rotation_period")
|
7189
|
+
|
7190
|
+
@property
|
7191
|
+
@pulumi.getter(name="rotationSchedule")
|
7192
|
+
def rotation_schedule(self) -> Optional[str]:
|
7193
|
+
"""
|
7194
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
7195
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
7196
|
+
"""
|
7197
|
+
return pulumi.get(self, "rotation_schedule")
|
7198
|
+
|
7199
|
+
@property
|
7200
|
+
@pulumi.getter(name="rotationWindow")
|
7201
|
+
def rotation_window(self) -> Optional[int]:
|
7202
|
+
"""
|
7203
|
+
The maximum amount of time in seconds allowed to complete
|
7204
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
7205
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
7206
|
+
"""
|
7207
|
+
return pulumi.get(self, "rotation_window")
|
7208
|
+
|
6157
7209
|
@property
|
6158
7210
|
@pulumi.getter
|
6159
7211
|
def username(self) -> Optional[str]:
|
@@ -6181,6 +7233,8 @@ class SecretsMountRedshift(dict):
|
|
6181
7233
|
suggest = "allowed_roles"
|
6182
7234
|
elif key == "connectionUrl":
|
6183
7235
|
suggest = "connection_url"
|
7236
|
+
elif key == "disableAutomatedRotation":
|
7237
|
+
suggest = "disable_automated_rotation"
|
6184
7238
|
elif key == "disableEscaping":
|
6185
7239
|
suggest = "disable_escaping"
|
6186
7240
|
elif key == "maxConnectionLifetime":
|
@@ -6193,6 +7247,12 @@ class SecretsMountRedshift(dict):
|
|
6193
7247
|
suggest = "plugin_name"
|
6194
7248
|
elif key == "rootRotationStatements":
|
6195
7249
|
suggest = "root_rotation_statements"
|
7250
|
+
elif key == "rotationPeriod":
|
7251
|
+
suggest = "rotation_period"
|
7252
|
+
elif key == "rotationSchedule":
|
7253
|
+
suggest = "rotation_schedule"
|
7254
|
+
elif key == "rotationWindow":
|
7255
|
+
suggest = "rotation_window"
|
6196
7256
|
elif key == "usernameTemplate":
|
6197
7257
|
suggest = "username_template"
|
6198
7258
|
elif key == "verifyConnection":
|
@@ -6214,6 +7274,7 @@ class SecretsMountRedshift(dict):
|
|
6214
7274
|
allowed_roles: Optional[Sequence[str]] = None,
|
6215
7275
|
connection_url: Optional[str] = None,
|
6216
7276
|
data: Optional[Mapping[str, str]] = None,
|
7277
|
+
disable_automated_rotation: Optional[bool] = None,
|
6217
7278
|
disable_escaping: Optional[bool] = None,
|
6218
7279
|
max_connection_lifetime: Optional[int] = None,
|
6219
7280
|
max_idle_connections: Optional[int] = None,
|
@@ -6221,6 +7282,9 @@ class SecretsMountRedshift(dict):
|
|
6221
7282
|
password: Optional[str] = None,
|
6222
7283
|
plugin_name: Optional[str] = None,
|
6223
7284
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
7285
|
+
rotation_period: Optional[int] = None,
|
7286
|
+
rotation_schedule: Optional[str] = None,
|
7287
|
+
rotation_window: Optional[int] = None,
|
6224
7288
|
username: Optional[str] = None,
|
6225
7289
|
username_template: Optional[str] = None,
|
6226
7290
|
verify_connection: Optional[bool] = None):
|
@@ -6230,6 +7294,7 @@ class SecretsMountRedshift(dict):
|
|
6230
7294
|
connection.
|
6231
7295
|
:param str connection_url: Connection string to use to connect to the database.
|
6232
7296
|
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7297
|
+
:param bool disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
6233
7298
|
|
6234
7299
|
Supported list of database secrets engines that can be configured:
|
6235
7300
|
:param bool disable_escaping: Disable special character escaping in username and password
|
@@ -6239,6 +7304,13 @@ class SecretsMountRedshift(dict):
|
|
6239
7304
|
:param str password: The root credential password used in the connection URL
|
6240
7305
|
:param str plugin_name: Specifies the name of the plugin to use.
|
6241
7306
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
7307
|
+
:param int rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
7308
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
7309
|
+
:param str rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
7310
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
7311
|
+
:param int rotation_window: The maximum amount of time in seconds allowed to complete
|
7312
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
7313
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
6242
7314
|
:param str username: The root credential username used in the connection URL
|
6243
7315
|
:param str username_template: Username generation template.
|
6244
7316
|
:param bool verify_connection: Whether the connection should be verified on
|
@@ -6251,6 +7323,8 @@ class SecretsMountRedshift(dict):
|
|
6251
7323
|
pulumi.set(__self__, "connection_url", connection_url)
|
6252
7324
|
if data is not None:
|
6253
7325
|
pulumi.set(__self__, "data", data)
|
7326
|
+
if disable_automated_rotation is not None:
|
7327
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
6254
7328
|
if disable_escaping is not None:
|
6255
7329
|
pulumi.set(__self__, "disable_escaping", disable_escaping)
|
6256
7330
|
if max_connection_lifetime is not None:
|
@@ -6265,6 +7339,12 @@ class SecretsMountRedshift(dict):
|
|
6265
7339
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
6266
7340
|
if root_rotation_statements is not None:
|
6267
7341
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
7342
|
+
if rotation_period is not None:
|
7343
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
7344
|
+
if rotation_schedule is not None:
|
7345
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
7346
|
+
if rotation_window is not None:
|
7347
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
6268
7348
|
if username is not None:
|
6269
7349
|
pulumi.set(__self__, "username", username)
|
6270
7350
|
if username_template is not None:
|
@@ -6302,10 +7382,18 @@ class SecretsMountRedshift(dict):
|
|
6302
7382
|
def data(self) -> Optional[Mapping[str, str]]:
|
6303
7383
|
"""
|
6304
7384
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7385
|
+
"""
|
7386
|
+
return pulumi.get(self, "data")
|
7387
|
+
|
7388
|
+
@property
|
7389
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
7390
|
+
def disable_automated_rotation(self) -> Optional[bool]:
|
7391
|
+
"""
|
7392
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
6305
7393
|
|
6306
7394
|
Supported list of database secrets engines that can be configured:
|
6307
7395
|
"""
|
6308
|
-
return pulumi.get(self, "
|
7396
|
+
return pulumi.get(self, "disable_automated_rotation")
|
6309
7397
|
|
6310
7398
|
@property
|
6311
7399
|
@pulumi.getter(name="disableEscaping")
|
@@ -6363,6 +7451,34 @@ class SecretsMountRedshift(dict):
|
|
6363
7451
|
"""
|
6364
7452
|
return pulumi.get(self, "root_rotation_statements")
|
6365
7453
|
|
7454
|
+
@property
|
7455
|
+
@pulumi.getter(name="rotationPeriod")
|
7456
|
+
def rotation_period(self) -> Optional[int]:
|
7457
|
+
"""
|
7458
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
7459
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
7460
|
+
"""
|
7461
|
+
return pulumi.get(self, "rotation_period")
|
7462
|
+
|
7463
|
+
@property
|
7464
|
+
@pulumi.getter(name="rotationSchedule")
|
7465
|
+
def rotation_schedule(self) -> Optional[str]:
|
7466
|
+
"""
|
7467
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
7468
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
7469
|
+
"""
|
7470
|
+
return pulumi.get(self, "rotation_schedule")
|
7471
|
+
|
7472
|
+
@property
|
7473
|
+
@pulumi.getter(name="rotationWindow")
|
7474
|
+
def rotation_window(self) -> Optional[int]:
|
7475
|
+
"""
|
7476
|
+
The maximum amount of time in seconds allowed to complete
|
7477
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
7478
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
7479
|
+
"""
|
7480
|
+
return pulumi.get(self, "rotation_window")
|
7481
|
+
|
6366
7482
|
@property
|
6367
7483
|
@pulumi.getter
|
6368
7484
|
def username(self) -> Optional[str]:
|
@@ -6398,6 +7514,8 @@ class SecretsMountSnowflake(dict):
|
|
6398
7514
|
suggest = "allowed_roles"
|
6399
7515
|
elif key == "connectionUrl":
|
6400
7516
|
suggest = "connection_url"
|
7517
|
+
elif key == "disableAutomatedRotation":
|
7518
|
+
suggest = "disable_automated_rotation"
|
6401
7519
|
elif key == "maxConnectionLifetime":
|
6402
7520
|
suggest = "max_connection_lifetime"
|
6403
7521
|
elif key == "maxIdleConnections":
|
@@ -6408,6 +7526,12 @@ class SecretsMountSnowflake(dict):
|
|
6408
7526
|
suggest = "plugin_name"
|
6409
7527
|
elif key == "rootRotationStatements":
|
6410
7528
|
suggest = "root_rotation_statements"
|
7529
|
+
elif key == "rotationPeriod":
|
7530
|
+
suggest = "rotation_period"
|
7531
|
+
elif key == "rotationSchedule":
|
7532
|
+
suggest = "rotation_schedule"
|
7533
|
+
elif key == "rotationWindow":
|
7534
|
+
suggest = "rotation_window"
|
6411
7535
|
elif key == "usernameTemplate":
|
6412
7536
|
suggest = "username_template"
|
6413
7537
|
elif key == "verifyConnection":
|
@@ -6429,12 +7553,16 @@ class SecretsMountSnowflake(dict):
|
|
6429
7553
|
allowed_roles: Optional[Sequence[str]] = None,
|
6430
7554
|
connection_url: Optional[str] = None,
|
6431
7555
|
data: Optional[Mapping[str, str]] = None,
|
7556
|
+
disable_automated_rotation: Optional[bool] = None,
|
6432
7557
|
max_connection_lifetime: Optional[int] = None,
|
6433
7558
|
max_idle_connections: Optional[int] = None,
|
6434
7559
|
max_open_connections: Optional[int] = None,
|
6435
7560
|
password: Optional[str] = None,
|
6436
7561
|
plugin_name: Optional[str] = None,
|
6437
7562
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
7563
|
+
rotation_period: Optional[int] = None,
|
7564
|
+
rotation_schedule: Optional[str] = None,
|
7565
|
+
rotation_window: Optional[int] = None,
|
6438
7566
|
username: Optional[str] = None,
|
6439
7567
|
username_template: Optional[str] = None,
|
6440
7568
|
verify_connection: Optional[bool] = None):
|
@@ -6444,6 +7572,7 @@ class SecretsMountSnowflake(dict):
|
|
6444
7572
|
connection.
|
6445
7573
|
:param str connection_url: Connection string to use to connect to the database.
|
6446
7574
|
:param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7575
|
+
:param bool disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
6447
7576
|
|
6448
7577
|
Supported list of database secrets engines that can be configured:
|
6449
7578
|
:param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
|
@@ -6452,6 +7581,13 @@ class SecretsMountSnowflake(dict):
|
|
6452
7581
|
:param str password: The root credential password used in the connection URL
|
6453
7582
|
:param str plugin_name: Specifies the name of the plugin to use.
|
6454
7583
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
7584
|
+
:param int rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
7585
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
7586
|
+
:param str rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
7587
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
7588
|
+
:param int rotation_window: The maximum amount of time in seconds allowed to complete
|
7589
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
7590
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
6455
7591
|
:param str username: The root credential username used in the connection URL
|
6456
7592
|
:param str username_template: Username generation template.
|
6457
7593
|
:param bool verify_connection: Whether the connection should be verified on
|
@@ -6464,6 +7600,8 @@ class SecretsMountSnowflake(dict):
|
|
6464
7600
|
pulumi.set(__self__, "connection_url", connection_url)
|
6465
7601
|
if data is not None:
|
6466
7602
|
pulumi.set(__self__, "data", data)
|
7603
|
+
if disable_automated_rotation is not None:
|
7604
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
6467
7605
|
if max_connection_lifetime is not None:
|
6468
7606
|
pulumi.set(__self__, "max_connection_lifetime", max_connection_lifetime)
|
6469
7607
|
if max_idle_connections is not None:
|
@@ -6476,6 +7614,12 @@ class SecretsMountSnowflake(dict):
|
|
6476
7614
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
6477
7615
|
if root_rotation_statements is not None:
|
6478
7616
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
7617
|
+
if rotation_period is not None:
|
7618
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
7619
|
+
if rotation_schedule is not None:
|
7620
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
7621
|
+
if rotation_window is not None:
|
7622
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
6479
7623
|
if username is not None:
|
6480
7624
|
pulumi.set(__self__, "username", username)
|
6481
7625
|
if username_template is not None:
|
@@ -6513,10 +7657,18 @@ class SecretsMountSnowflake(dict):
|
|
6513
7657
|
def data(self) -> Optional[Mapping[str, str]]:
|
6514
7658
|
"""
|
6515
7659
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
7660
|
+
"""
|
7661
|
+
return pulumi.get(self, "data")
|
7662
|
+
|
7663
|
+
@property
|
7664
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
7665
|
+
def disable_automated_rotation(self) -> Optional[bool]:
|
7666
|
+
"""
|
7667
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
6516
7668
|
|
6517
7669
|
Supported list of database secrets engines that can be configured:
|
6518
7670
|
"""
|
6519
|
-
return pulumi.get(self, "
|
7671
|
+
return pulumi.get(self, "disable_automated_rotation")
|
6520
7672
|
|
6521
7673
|
@property
|
6522
7674
|
@pulumi.getter(name="maxConnectionLifetime")
|
@@ -6566,6 +7718,34 @@ class SecretsMountSnowflake(dict):
|
|
6566
7718
|
"""
|
6567
7719
|
return pulumi.get(self, "root_rotation_statements")
|
6568
7720
|
|
7721
|
+
@property
|
7722
|
+
@pulumi.getter(name="rotationPeriod")
|
7723
|
+
def rotation_period(self) -> Optional[int]:
|
7724
|
+
"""
|
7725
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
7726
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
7727
|
+
"""
|
7728
|
+
return pulumi.get(self, "rotation_period")
|
7729
|
+
|
7730
|
+
@property
|
7731
|
+
@pulumi.getter(name="rotationSchedule")
|
7732
|
+
def rotation_schedule(self) -> Optional[str]:
|
7733
|
+
"""
|
7734
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
7735
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
7736
|
+
"""
|
7737
|
+
return pulumi.get(self, "rotation_schedule")
|
7738
|
+
|
7739
|
+
@property
|
7740
|
+
@pulumi.getter(name="rotationWindow")
|
7741
|
+
def rotation_window(self) -> Optional[int]:
|
7742
|
+
"""
|
7743
|
+
The maximum amount of time in seconds allowed to complete
|
7744
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
7745
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
7746
|
+
"""
|
7747
|
+
return pulumi.get(self, "rotation_window")
|
7748
|
+
|
6569
7749
|
@property
|
6570
7750
|
@pulumi.getter
|
6571
7751
|
def username(self) -> Optional[str]:
|