pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -21,12 +22,12 @@ __all__ = ['SecretBackendConnectionArgs', 'SecretBackendConnection']
|
|
21
22
|
@pulumi.input_type
|
22
23
|
class SecretBackendConnectionArgs:
|
23
24
|
def __init__(__self__, *,
|
24
|
-
backend: pulumi.Input[str],
|
25
|
-
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
25
|
+
backend: pulumi.Input[builtins.str],
|
26
|
+
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
26
27
|
cassandra: Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']] = None,
|
27
28
|
couchbase: Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']] = None,
|
28
|
-
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
29
|
-
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
29
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
30
|
+
disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
|
30
31
|
elasticsearch: Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']] = None,
|
31
32
|
hana: Optional[pulumi.Input['SecretBackendConnectionHanaArgs']] = None,
|
32
33
|
influxdb: Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']] = None,
|
@@ -37,29 +38,29 @@ class SecretBackendConnectionArgs:
|
|
37
38
|
mysql_aurora: Optional[pulumi.Input['SecretBackendConnectionMysqlAuroraArgs']] = None,
|
38
39
|
mysql_legacy: Optional[pulumi.Input['SecretBackendConnectionMysqlLegacyArgs']] = None,
|
39
40
|
mysql_rds: Optional[pulumi.Input['SecretBackendConnectionMysqlRdsArgs']] = None,
|
40
|
-
name: Optional[pulumi.Input[str]] = None,
|
41
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
41
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
42
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
42
43
|
oracle: Optional[pulumi.Input['SecretBackendConnectionOracleArgs']] = None,
|
43
|
-
plugin_name: Optional[pulumi.Input[str]] = None,
|
44
|
+
plugin_name: Optional[pulumi.Input[builtins.str]] = None,
|
44
45
|
postgresql: Optional[pulumi.Input['SecretBackendConnectionPostgresqlArgs']] = None,
|
45
46
|
redis: Optional[pulumi.Input['SecretBackendConnectionRedisArgs']] = None,
|
46
47
|
redis_elasticache: Optional[pulumi.Input['SecretBackendConnectionRedisElasticacheArgs']] = None,
|
47
48
|
redshift: Optional[pulumi.Input['SecretBackendConnectionRedshiftArgs']] = None,
|
48
|
-
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
49
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
50
|
-
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
51
|
-
rotation_window: Optional[pulumi.Input[int]] = None,
|
49
|
+
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
50
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
51
|
+
rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
|
52
|
+
rotation_window: Optional[pulumi.Input[builtins.int]] = None,
|
52
53
|
snowflake: Optional[pulumi.Input['SecretBackendConnectionSnowflakeArgs']] = None,
|
53
|
-
verify_connection: Optional[pulumi.Input[bool]] = None):
|
54
|
+
verify_connection: Optional[pulumi.Input[builtins.bool]] = None):
|
54
55
|
"""
|
55
56
|
The set of arguments for constructing a SecretBackendConnection resource.
|
56
|
-
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
57
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
57
|
+
:param pulumi.Input[builtins.str] backend: The unique name of the Vault mount to configure.
|
58
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_roles: A list of roles that are allowed to use this
|
58
59
|
connection.
|
59
60
|
:param pulumi.Input['SecretBackendConnectionCassandraArgs'] cassandra: A nested block containing configuration options for Cassandra connections.
|
60
61
|
:param pulumi.Input['SecretBackendConnectionCouchbaseArgs'] couchbase: A nested block containing configuration options for Couchbase connections.
|
61
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
62
|
-
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
62
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
63
|
+
:param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
63
64
|
:param pulumi.Input['SecretBackendConnectionElasticsearchArgs'] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
|
64
65
|
:param pulumi.Input['SecretBackendConnectionHanaArgs'] hana: A nested block containing configuration options for SAP HanaDB connections.
|
65
66
|
:param pulumi.Input['SecretBackendConnectionInfluxdbArgs'] influxdb: A nested block containing configuration options for InfluxDB connections.
|
@@ -70,29 +71,29 @@ class SecretBackendConnectionArgs:
|
|
70
71
|
:param pulumi.Input['SecretBackendConnectionMysqlAuroraArgs'] mysql_aurora: A nested block containing configuration options for Aurora MySQL connections.
|
71
72
|
:param pulumi.Input['SecretBackendConnectionMysqlLegacyArgs'] mysql_legacy: A nested block containing configuration options for legacy MySQL connections.
|
72
73
|
:param pulumi.Input['SecretBackendConnectionMysqlRdsArgs'] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
|
73
|
-
:param pulumi.Input[str] name: A unique name to give the database connection.
|
74
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
74
|
+
:param pulumi.Input[builtins.str] name: A unique name to give the database connection.
|
75
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
75
76
|
The value should not contain leading or trailing forward slashes.
|
76
77
|
The `namespace` is always relative to the provider's configured namespace.
|
77
78
|
*Available only for Vault Enterprise*.
|
78
79
|
:param pulumi.Input['SecretBackendConnectionOracleArgs'] oracle: A nested block containing configuration options for Oracle connections.
|
79
|
-
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
80
|
+
:param pulumi.Input[builtins.str] plugin_name: Specifies the name of the plugin to use.
|
80
81
|
:param pulumi.Input['SecretBackendConnectionPostgresqlArgs'] postgresql: A nested block containing configuration options for PostgreSQL connections.
|
81
82
|
:param pulumi.Input['SecretBackendConnectionRedisArgs'] redis: A nested block containing configuration options for Redis connections.
|
82
83
|
:param pulumi.Input['SecretBackendConnectionRedisElasticacheArgs'] redis_elasticache: A nested block containing configuration options for Redis ElastiCache connections.
|
83
84
|
|
84
85
|
Exactly one of the nested blocks of configuration options must be supplied.
|
85
86
|
:param pulumi.Input['SecretBackendConnectionRedshiftArgs'] redshift: Connection parameters for the redshift-database-plugin plugin.
|
86
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
87
|
-
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
87
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
88
|
+
:param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
88
89
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
89
|
-
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
90
|
+
:param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
90
91
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
91
|
-
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
92
|
+
:param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
92
93
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
93
94
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
94
95
|
:param pulumi.Input['SecretBackendConnectionSnowflakeArgs'] snowflake: A nested block containing configuration options for Snowflake connections.
|
95
|
-
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
96
|
+
:param pulumi.Input[builtins.bool] verify_connection: Whether the connection should be verified on
|
96
97
|
initial configuration or not.
|
97
98
|
"""
|
98
99
|
pulumi.set(__self__, "backend", backend)
|
@@ -157,19 +158,19 @@ class SecretBackendConnectionArgs:
|
|
157
158
|
|
158
159
|
@property
|
159
160
|
@pulumi.getter
|
160
|
-
def backend(self) -> pulumi.Input[str]:
|
161
|
+
def backend(self) -> pulumi.Input[builtins.str]:
|
161
162
|
"""
|
162
163
|
The unique name of the Vault mount to configure.
|
163
164
|
"""
|
164
165
|
return pulumi.get(self, "backend")
|
165
166
|
|
166
167
|
@backend.setter
|
167
|
-
def backend(self, value: pulumi.Input[str]):
|
168
|
+
def backend(self, value: pulumi.Input[builtins.str]):
|
168
169
|
pulumi.set(self, "backend", value)
|
169
170
|
|
170
171
|
@property
|
171
172
|
@pulumi.getter(name="allowedRoles")
|
172
|
-
def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
173
|
+
def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
173
174
|
"""
|
174
175
|
A list of roles that are allowed to use this
|
175
176
|
connection.
|
@@ -177,7 +178,7 @@ class SecretBackendConnectionArgs:
|
|
177
178
|
return pulumi.get(self, "allowed_roles")
|
178
179
|
|
179
180
|
@allowed_roles.setter
|
180
|
-
def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
181
|
+
def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
181
182
|
pulumi.set(self, "allowed_roles", value)
|
182
183
|
|
183
184
|
@property
|
@@ -206,26 +207,26 @@ class SecretBackendConnectionArgs:
|
|
206
207
|
|
207
208
|
@property
|
208
209
|
@pulumi.getter
|
209
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
210
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
|
210
211
|
"""
|
211
212
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
212
213
|
"""
|
213
214
|
return pulumi.get(self, "data")
|
214
215
|
|
215
216
|
@data.setter
|
216
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
217
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
|
217
218
|
pulumi.set(self, "data", value)
|
218
219
|
|
219
220
|
@property
|
220
221
|
@pulumi.getter(name="disableAutomatedRotation")
|
221
|
-
def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
|
222
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
|
222
223
|
"""
|
223
224
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
224
225
|
"""
|
225
226
|
return pulumi.get(self, "disable_automated_rotation")
|
226
227
|
|
227
228
|
@disable_automated_rotation.setter
|
228
|
-
def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
|
229
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
|
229
230
|
pulumi.set(self, "disable_automated_rotation", value)
|
230
231
|
|
231
232
|
@property
|
@@ -350,19 +351,19 @@ class SecretBackendConnectionArgs:
|
|
350
351
|
|
351
352
|
@property
|
352
353
|
@pulumi.getter
|
353
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
354
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
354
355
|
"""
|
355
356
|
A unique name to give the database connection.
|
356
357
|
"""
|
357
358
|
return pulumi.get(self, "name")
|
358
359
|
|
359
360
|
@name.setter
|
360
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
361
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
361
362
|
pulumi.set(self, "name", value)
|
362
363
|
|
363
364
|
@property
|
364
365
|
@pulumi.getter
|
365
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
366
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
366
367
|
"""
|
367
368
|
The namespace to provision the resource in.
|
368
369
|
The value should not contain leading or trailing forward slashes.
|
@@ -372,7 +373,7 @@ class SecretBackendConnectionArgs:
|
|
372
373
|
return pulumi.get(self, "namespace")
|
373
374
|
|
374
375
|
@namespace.setter
|
375
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
376
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
376
377
|
pulumi.set(self, "namespace", value)
|
377
378
|
|
378
379
|
@property
|
@@ -389,14 +390,14 @@ class SecretBackendConnectionArgs:
|
|
389
390
|
|
390
391
|
@property
|
391
392
|
@pulumi.getter(name="pluginName")
|
392
|
-
def plugin_name(self) -> Optional[pulumi.Input[str]]:
|
393
|
+
def plugin_name(self) -> Optional[pulumi.Input[builtins.str]]:
|
393
394
|
"""
|
394
395
|
Specifies the name of the plugin to use.
|
395
396
|
"""
|
396
397
|
return pulumi.get(self, "plugin_name")
|
397
398
|
|
398
399
|
@plugin_name.setter
|
399
|
-
def plugin_name(self, value: Optional[pulumi.Input[str]]):
|
400
|
+
def plugin_name(self, value: Optional[pulumi.Input[builtins.str]]):
|
400
401
|
pulumi.set(self, "plugin_name", value)
|
401
402
|
|
402
403
|
@property
|
@@ -451,19 +452,19 @@ class SecretBackendConnectionArgs:
|
|
451
452
|
|
452
453
|
@property
|
453
454
|
@pulumi.getter(name="rootRotationStatements")
|
454
|
-
def root_rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
455
|
+
def root_rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
455
456
|
"""
|
456
457
|
A list of database statements to be executed to rotate the root user's credentials.
|
457
458
|
"""
|
458
459
|
return pulumi.get(self, "root_rotation_statements")
|
459
460
|
|
460
461
|
@root_rotation_statements.setter
|
461
|
-
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
462
|
+
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
462
463
|
pulumi.set(self, "root_rotation_statements", value)
|
463
464
|
|
464
465
|
@property
|
465
466
|
@pulumi.getter(name="rotationPeriod")
|
466
|
-
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
467
|
+
def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
|
467
468
|
"""
|
468
469
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
469
470
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -471,12 +472,12 @@ class SecretBackendConnectionArgs:
|
|
471
472
|
return pulumi.get(self, "rotation_period")
|
472
473
|
|
473
474
|
@rotation_period.setter
|
474
|
-
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
475
|
+
def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
|
475
476
|
pulumi.set(self, "rotation_period", value)
|
476
477
|
|
477
478
|
@property
|
478
479
|
@pulumi.getter(name="rotationSchedule")
|
479
|
-
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
480
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
|
480
481
|
"""
|
481
482
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
482
483
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
@@ -484,12 +485,12 @@ class SecretBackendConnectionArgs:
|
|
484
485
|
return pulumi.get(self, "rotation_schedule")
|
485
486
|
|
486
487
|
@rotation_schedule.setter
|
487
|
-
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
488
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
|
488
489
|
pulumi.set(self, "rotation_schedule", value)
|
489
490
|
|
490
491
|
@property
|
491
492
|
@pulumi.getter(name="rotationWindow")
|
492
|
-
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
493
|
+
def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
|
493
494
|
"""
|
494
495
|
The maximum amount of time in seconds allowed to complete
|
495
496
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -498,7 +499,7 @@ class SecretBackendConnectionArgs:
|
|
498
499
|
return pulumi.get(self, "rotation_window")
|
499
500
|
|
500
501
|
@rotation_window.setter
|
501
|
-
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
502
|
+
def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
|
502
503
|
pulumi.set(self, "rotation_window", value)
|
503
504
|
|
504
505
|
@property
|
@@ -515,7 +516,7 @@ class SecretBackendConnectionArgs:
|
|
515
516
|
|
516
517
|
@property
|
517
518
|
@pulumi.getter(name="verifyConnection")
|
518
|
-
def verify_connection(self) -> Optional[pulumi.Input[bool]]:
|
519
|
+
def verify_connection(self) -> Optional[pulumi.Input[builtins.bool]]:
|
519
520
|
"""
|
520
521
|
Whether the connection should be verified on
|
521
522
|
initial configuration or not.
|
@@ -523,19 +524,19 @@ class SecretBackendConnectionArgs:
|
|
523
524
|
return pulumi.get(self, "verify_connection")
|
524
525
|
|
525
526
|
@verify_connection.setter
|
526
|
-
def verify_connection(self, value: Optional[pulumi.Input[bool]]):
|
527
|
+
def verify_connection(self, value: Optional[pulumi.Input[builtins.bool]]):
|
527
528
|
pulumi.set(self, "verify_connection", value)
|
528
529
|
|
529
530
|
|
530
531
|
@pulumi.input_type
|
531
532
|
class _SecretBackendConnectionState:
|
532
533
|
def __init__(__self__, *,
|
533
|
-
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
534
|
-
backend: Optional[pulumi.Input[str]] = None,
|
534
|
+
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
535
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
535
536
|
cassandra: Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']] = None,
|
536
537
|
couchbase: Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']] = None,
|
537
|
-
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
538
|
-
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
538
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
539
|
+
disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
|
539
540
|
elasticsearch: Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']] = None,
|
540
541
|
hana: Optional[pulumi.Input['SecretBackendConnectionHanaArgs']] = None,
|
541
542
|
influxdb: Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']] = None,
|
@@ -546,29 +547,29 @@ class _SecretBackendConnectionState:
|
|
546
547
|
mysql_aurora: Optional[pulumi.Input['SecretBackendConnectionMysqlAuroraArgs']] = None,
|
547
548
|
mysql_legacy: Optional[pulumi.Input['SecretBackendConnectionMysqlLegacyArgs']] = None,
|
548
549
|
mysql_rds: Optional[pulumi.Input['SecretBackendConnectionMysqlRdsArgs']] = None,
|
549
|
-
name: Optional[pulumi.Input[str]] = None,
|
550
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
550
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
551
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
551
552
|
oracle: Optional[pulumi.Input['SecretBackendConnectionOracleArgs']] = None,
|
552
|
-
plugin_name: Optional[pulumi.Input[str]] = None,
|
553
|
+
plugin_name: Optional[pulumi.Input[builtins.str]] = None,
|
553
554
|
postgresql: Optional[pulumi.Input['SecretBackendConnectionPostgresqlArgs']] = None,
|
554
555
|
redis: Optional[pulumi.Input['SecretBackendConnectionRedisArgs']] = None,
|
555
556
|
redis_elasticache: Optional[pulumi.Input['SecretBackendConnectionRedisElasticacheArgs']] = None,
|
556
557
|
redshift: Optional[pulumi.Input['SecretBackendConnectionRedshiftArgs']] = None,
|
557
|
-
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
558
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
559
|
-
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
560
|
-
rotation_window: Optional[pulumi.Input[int]] = None,
|
558
|
+
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
559
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
560
|
+
rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
|
561
|
+
rotation_window: Optional[pulumi.Input[builtins.int]] = None,
|
561
562
|
snowflake: Optional[pulumi.Input['SecretBackendConnectionSnowflakeArgs']] = None,
|
562
|
-
verify_connection: Optional[pulumi.Input[bool]] = None):
|
563
|
+
verify_connection: Optional[pulumi.Input[builtins.bool]] = None):
|
563
564
|
"""
|
564
565
|
Input properties used for looking up and filtering SecretBackendConnection resources.
|
565
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
566
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_roles: A list of roles that are allowed to use this
|
566
567
|
connection.
|
567
|
-
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
568
|
+
:param pulumi.Input[builtins.str] backend: The unique name of the Vault mount to configure.
|
568
569
|
:param pulumi.Input['SecretBackendConnectionCassandraArgs'] cassandra: A nested block containing configuration options for Cassandra connections.
|
569
570
|
:param pulumi.Input['SecretBackendConnectionCouchbaseArgs'] couchbase: A nested block containing configuration options for Couchbase connections.
|
570
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
571
|
-
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
571
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
572
|
+
:param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
572
573
|
:param pulumi.Input['SecretBackendConnectionElasticsearchArgs'] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
|
573
574
|
:param pulumi.Input['SecretBackendConnectionHanaArgs'] hana: A nested block containing configuration options for SAP HanaDB connections.
|
574
575
|
:param pulumi.Input['SecretBackendConnectionInfluxdbArgs'] influxdb: A nested block containing configuration options for InfluxDB connections.
|
@@ -579,29 +580,29 @@ class _SecretBackendConnectionState:
|
|
579
580
|
:param pulumi.Input['SecretBackendConnectionMysqlAuroraArgs'] mysql_aurora: A nested block containing configuration options for Aurora MySQL connections.
|
580
581
|
:param pulumi.Input['SecretBackendConnectionMysqlLegacyArgs'] mysql_legacy: A nested block containing configuration options for legacy MySQL connections.
|
581
582
|
:param pulumi.Input['SecretBackendConnectionMysqlRdsArgs'] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
|
582
|
-
:param pulumi.Input[str] name: A unique name to give the database connection.
|
583
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
583
|
+
:param pulumi.Input[builtins.str] name: A unique name to give the database connection.
|
584
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
584
585
|
The value should not contain leading or trailing forward slashes.
|
585
586
|
The `namespace` is always relative to the provider's configured namespace.
|
586
587
|
*Available only for Vault Enterprise*.
|
587
588
|
:param pulumi.Input['SecretBackendConnectionOracleArgs'] oracle: A nested block containing configuration options for Oracle connections.
|
588
|
-
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
589
|
+
:param pulumi.Input[builtins.str] plugin_name: Specifies the name of the plugin to use.
|
589
590
|
:param pulumi.Input['SecretBackendConnectionPostgresqlArgs'] postgresql: A nested block containing configuration options for PostgreSQL connections.
|
590
591
|
:param pulumi.Input['SecretBackendConnectionRedisArgs'] redis: A nested block containing configuration options for Redis connections.
|
591
592
|
:param pulumi.Input['SecretBackendConnectionRedisElasticacheArgs'] redis_elasticache: A nested block containing configuration options for Redis ElastiCache connections.
|
592
593
|
|
593
594
|
Exactly one of the nested blocks of configuration options must be supplied.
|
594
595
|
:param pulumi.Input['SecretBackendConnectionRedshiftArgs'] redshift: Connection parameters for the redshift-database-plugin plugin.
|
595
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
596
|
-
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
596
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
597
|
+
:param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
597
598
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
598
|
-
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
599
|
+
:param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
599
600
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
600
|
-
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
601
|
+
:param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
601
602
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
602
603
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
603
604
|
:param pulumi.Input['SecretBackendConnectionSnowflakeArgs'] snowflake: A nested block containing configuration options for Snowflake connections.
|
604
|
-
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
605
|
+
:param pulumi.Input[builtins.bool] verify_connection: Whether the connection should be verified on
|
605
606
|
initial configuration or not.
|
606
607
|
"""
|
607
608
|
if allowed_roles is not None:
|
@@ -667,7 +668,7 @@ class _SecretBackendConnectionState:
|
|
667
668
|
|
668
669
|
@property
|
669
670
|
@pulumi.getter(name="allowedRoles")
|
670
|
-
def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
671
|
+
def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
671
672
|
"""
|
672
673
|
A list of roles that are allowed to use this
|
673
674
|
connection.
|
@@ -675,19 +676,19 @@ class _SecretBackendConnectionState:
|
|
675
676
|
return pulumi.get(self, "allowed_roles")
|
676
677
|
|
677
678
|
@allowed_roles.setter
|
678
|
-
def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
679
|
+
def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
679
680
|
pulumi.set(self, "allowed_roles", value)
|
680
681
|
|
681
682
|
@property
|
682
683
|
@pulumi.getter
|
683
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
684
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
684
685
|
"""
|
685
686
|
The unique name of the Vault mount to configure.
|
686
687
|
"""
|
687
688
|
return pulumi.get(self, "backend")
|
688
689
|
|
689
690
|
@backend.setter
|
690
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
691
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
691
692
|
pulumi.set(self, "backend", value)
|
692
693
|
|
693
694
|
@property
|
@@ -716,26 +717,26 @@ class _SecretBackendConnectionState:
|
|
716
717
|
|
717
718
|
@property
|
718
719
|
@pulumi.getter
|
719
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
720
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
|
720
721
|
"""
|
721
722
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
722
723
|
"""
|
723
724
|
return pulumi.get(self, "data")
|
724
725
|
|
725
726
|
@data.setter
|
726
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
727
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
|
727
728
|
pulumi.set(self, "data", value)
|
728
729
|
|
729
730
|
@property
|
730
731
|
@pulumi.getter(name="disableAutomatedRotation")
|
731
|
-
def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
|
732
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
|
732
733
|
"""
|
733
734
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
734
735
|
"""
|
735
736
|
return pulumi.get(self, "disable_automated_rotation")
|
736
737
|
|
737
738
|
@disable_automated_rotation.setter
|
738
|
-
def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
|
739
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
|
739
740
|
pulumi.set(self, "disable_automated_rotation", value)
|
740
741
|
|
741
742
|
@property
|
@@ -860,19 +861,19 @@ class _SecretBackendConnectionState:
|
|
860
861
|
|
861
862
|
@property
|
862
863
|
@pulumi.getter
|
863
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
864
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
864
865
|
"""
|
865
866
|
A unique name to give the database connection.
|
866
867
|
"""
|
867
868
|
return pulumi.get(self, "name")
|
868
869
|
|
869
870
|
@name.setter
|
870
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
871
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
871
872
|
pulumi.set(self, "name", value)
|
872
873
|
|
873
874
|
@property
|
874
875
|
@pulumi.getter
|
875
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
876
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
876
877
|
"""
|
877
878
|
The namespace to provision the resource in.
|
878
879
|
The value should not contain leading or trailing forward slashes.
|
@@ -882,7 +883,7 @@ class _SecretBackendConnectionState:
|
|
882
883
|
return pulumi.get(self, "namespace")
|
883
884
|
|
884
885
|
@namespace.setter
|
885
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
886
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
886
887
|
pulumi.set(self, "namespace", value)
|
887
888
|
|
888
889
|
@property
|
@@ -899,14 +900,14 @@ class _SecretBackendConnectionState:
|
|
899
900
|
|
900
901
|
@property
|
901
902
|
@pulumi.getter(name="pluginName")
|
902
|
-
def plugin_name(self) -> Optional[pulumi.Input[str]]:
|
903
|
+
def plugin_name(self) -> Optional[pulumi.Input[builtins.str]]:
|
903
904
|
"""
|
904
905
|
Specifies the name of the plugin to use.
|
905
906
|
"""
|
906
907
|
return pulumi.get(self, "plugin_name")
|
907
908
|
|
908
909
|
@plugin_name.setter
|
909
|
-
def plugin_name(self, value: Optional[pulumi.Input[str]]):
|
910
|
+
def plugin_name(self, value: Optional[pulumi.Input[builtins.str]]):
|
910
911
|
pulumi.set(self, "plugin_name", value)
|
911
912
|
|
912
913
|
@property
|
@@ -961,19 +962,19 @@ class _SecretBackendConnectionState:
|
|
961
962
|
|
962
963
|
@property
|
963
964
|
@pulumi.getter(name="rootRotationStatements")
|
964
|
-
def root_rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
965
|
+
def root_rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
965
966
|
"""
|
966
967
|
A list of database statements to be executed to rotate the root user's credentials.
|
967
968
|
"""
|
968
969
|
return pulumi.get(self, "root_rotation_statements")
|
969
970
|
|
970
971
|
@root_rotation_statements.setter
|
971
|
-
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
972
|
+
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
972
973
|
pulumi.set(self, "root_rotation_statements", value)
|
973
974
|
|
974
975
|
@property
|
975
976
|
@pulumi.getter(name="rotationPeriod")
|
976
|
-
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
977
|
+
def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
|
977
978
|
"""
|
978
979
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
979
980
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -981,12 +982,12 @@ class _SecretBackendConnectionState:
|
|
981
982
|
return pulumi.get(self, "rotation_period")
|
982
983
|
|
983
984
|
@rotation_period.setter
|
984
|
-
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
985
|
+
def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
|
985
986
|
pulumi.set(self, "rotation_period", value)
|
986
987
|
|
987
988
|
@property
|
988
989
|
@pulumi.getter(name="rotationSchedule")
|
989
|
-
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
990
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
|
990
991
|
"""
|
991
992
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
992
993
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
@@ -994,12 +995,12 @@ class _SecretBackendConnectionState:
|
|
994
995
|
return pulumi.get(self, "rotation_schedule")
|
995
996
|
|
996
997
|
@rotation_schedule.setter
|
997
|
-
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
998
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
|
998
999
|
pulumi.set(self, "rotation_schedule", value)
|
999
1000
|
|
1000
1001
|
@property
|
1001
1002
|
@pulumi.getter(name="rotationWindow")
|
1002
|
-
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
1003
|
+
def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
|
1003
1004
|
"""
|
1004
1005
|
The maximum amount of time in seconds allowed to complete
|
1005
1006
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -1008,7 +1009,7 @@ class _SecretBackendConnectionState:
|
|
1008
1009
|
return pulumi.get(self, "rotation_window")
|
1009
1010
|
|
1010
1011
|
@rotation_window.setter
|
1011
|
-
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
1012
|
+
def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
|
1012
1013
|
pulumi.set(self, "rotation_window", value)
|
1013
1014
|
|
1014
1015
|
@property
|
@@ -1025,7 +1026,7 @@ class _SecretBackendConnectionState:
|
|
1025
1026
|
|
1026
1027
|
@property
|
1027
1028
|
@pulumi.getter(name="verifyConnection")
|
1028
|
-
def verify_connection(self) -> Optional[pulumi.Input[bool]]:
|
1029
|
+
def verify_connection(self) -> Optional[pulumi.Input[builtins.bool]]:
|
1029
1030
|
"""
|
1030
1031
|
Whether the connection should be verified on
|
1031
1032
|
initial configuration or not.
|
@@ -1033,7 +1034,7 @@ class _SecretBackendConnectionState:
|
|
1033
1034
|
return pulumi.get(self, "verify_connection")
|
1034
1035
|
|
1035
1036
|
@verify_connection.setter
|
1036
|
-
def verify_connection(self, value: Optional[pulumi.Input[bool]]):
|
1037
|
+
def verify_connection(self, value: Optional[pulumi.Input[builtins.bool]]):
|
1037
1038
|
pulumi.set(self, "verify_connection", value)
|
1038
1039
|
|
1039
1040
|
|
@@ -1042,12 +1043,12 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1042
1043
|
def __init__(__self__,
|
1043
1044
|
resource_name: str,
|
1044
1045
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1045
|
-
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1046
|
-
backend: Optional[pulumi.Input[str]] = None,
|
1046
|
+
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
1047
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
1047
1048
|
cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
|
1048
1049
|
couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
|
1049
|
-
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
1050
|
-
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
1050
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
1051
|
+
disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
|
1051
1052
|
elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
|
1052
1053
|
hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
|
1053
1054
|
influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
|
@@ -1058,20 +1059,20 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1058
1059
|
mysql_aurora: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']]] = None,
|
1059
1060
|
mysql_legacy: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']]] = None,
|
1060
1061
|
mysql_rds: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']]] = None,
|
1061
|
-
name: Optional[pulumi.Input[str]] = None,
|
1062
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
1062
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
1063
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
1063
1064
|
oracle: Optional[pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']]] = None,
|
1064
|
-
plugin_name: Optional[pulumi.Input[str]] = None,
|
1065
|
+
plugin_name: Optional[pulumi.Input[builtins.str]] = None,
|
1065
1066
|
postgresql: Optional[pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']]] = None,
|
1066
1067
|
redis: Optional[pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']]] = None,
|
1067
1068
|
redis_elasticache: Optional[pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']]] = None,
|
1068
1069
|
redshift: Optional[pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']]] = None,
|
1069
|
-
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1070
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
1071
|
-
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
1072
|
-
rotation_window: Optional[pulumi.Input[int]] = None,
|
1070
|
+
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
1071
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
1072
|
+
rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
|
1073
|
+
rotation_window: Optional[pulumi.Input[builtins.int]] = None,
|
1073
1074
|
snowflake: Optional[pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']]] = None,
|
1074
|
-
verify_connection: Optional[pulumi.Input[bool]] = None,
|
1075
|
+
verify_connection: Optional[pulumi.Input[builtins.bool]] = None,
|
1075
1076
|
__props__=None):
|
1076
1077
|
"""
|
1077
1078
|
## Example Usage
|
@@ -1107,13 +1108,13 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1107
1108
|
|
1108
1109
|
:param str resource_name: The name of the resource.
|
1109
1110
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1110
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
1111
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_roles: A list of roles that are allowed to use this
|
1111
1112
|
connection.
|
1112
|
-
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
1113
|
+
:param pulumi.Input[builtins.str] backend: The unique name of the Vault mount to configure.
|
1113
1114
|
:param pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']] cassandra: A nested block containing configuration options for Cassandra connections.
|
1114
1115
|
:param pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']] couchbase: A nested block containing configuration options for Couchbase connections.
|
1115
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
1116
|
-
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1116
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
1117
|
+
:param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1117
1118
|
:param pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
|
1118
1119
|
:param pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']] hana: A nested block containing configuration options for SAP HanaDB connections.
|
1119
1120
|
:param pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']] influxdb: A nested block containing configuration options for InfluxDB connections.
|
@@ -1124,29 +1125,29 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1124
1125
|
:param pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']] mysql_aurora: A nested block containing configuration options for Aurora MySQL connections.
|
1125
1126
|
:param pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']] mysql_legacy: A nested block containing configuration options for legacy MySQL connections.
|
1126
1127
|
:param pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
|
1127
|
-
:param pulumi.Input[str] name: A unique name to give the database connection.
|
1128
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1128
|
+
:param pulumi.Input[builtins.str] name: A unique name to give the database connection.
|
1129
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
1129
1130
|
The value should not contain leading or trailing forward slashes.
|
1130
1131
|
The `namespace` is always relative to the provider's configured namespace.
|
1131
1132
|
*Available only for Vault Enterprise*.
|
1132
1133
|
:param pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']] oracle: A nested block containing configuration options for Oracle connections.
|
1133
|
-
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
1134
|
+
:param pulumi.Input[builtins.str] plugin_name: Specifies the name of the plugin to use.
|
1134
1135
|
:param pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']] postgresql: A nested block containing configuration options for PostgreSQL connections.
|
1135
1136
|
:param pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']] redis: A nested block containing configuration options for Redis connections.
|
1136
1137
|
:param pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']] redis_elasticache: A nested block containing configuration options for Redis ElastiCache connections.
|
1137
1138
|
|
1138
1139
|
Exactly one of the nested blocks of configuration options must be supplied.
|
1139
1140
|
:param pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']] redshift: Connection parameters for the redshift-database-plugin plugin.
|
1140
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
1141
|
-
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
1141
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
1142
|
+
:param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
1142
1143
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
1143
|
-
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
1144
|
+
:param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
1144
1145
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
1145
|
-
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
1146
|
+
:param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
1146
1147
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
1147
1148
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
1148
1149
|
:param pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']] snowflake: A nested block containing configuration options for Snowflake connections.
|
1149
|
-
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
1150
|
+
:param pulumi.Input[builtins.bool] verify_connection: Whether the connection should be verified on
|
1150
1151
|
initial configuration or not.
|
1151
1152
|
"""
|
1152
1153
|
...
|
@@ -1202,12 +1203,12 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1202
1203
|
def _internal_init(__self__,
|
1203
1204
|
resource_name: str,
|
1204
1205
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1205
|
-
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1206
|
-
backend: Optional[pulumi.Input[str]] = None,
|
1206
|
+
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
1207
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
1207
1208
|
cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
|
1208
1209
|
couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
|
1209
|
-
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
1210
|
-
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
1210
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
1211
|
+
disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
|
1211
1212
|
elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
|
1212
1213
|
hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
|
1213
1214
|
influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
|
@@ -1218,20 +1219,20 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1218
1219
|
mysql_aurora: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']]] = None,
|
1219
1220
|
mysql_legacy: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']]] = None,
|
1220
1221
|
mysql_rds: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']]] = None,
|
1221
|
-
name: Optional[pulumi.Input[str]] = None,
|
1222
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
1222
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
1223
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
1223
1224
|
oracle: Optional[pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']]] = None,
|
1224
|
-
plugin_name: Optional[pulumi.Input[str]] = None,
|
1225
|
+
plugin_name: Optional[pulumi.Input[builtins.str]] = None,
|
1225
1226
|
postgresql: Optional[pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']]] = None,
|
1226
1227
|
redis: Optional[pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']]] = None,
|
1227
1228
|
redis_elasticache: Optional[pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']]] = None,
|
1228
1229
|
redshift: Optional[pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']]] = None,
|
1229
|
-
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1230
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
1231
|
-
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
1232
|
-
rotation_window: Optional[pulumi.Input[int]] = None,
|
1230
|
+
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
1231
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
1232
|
+
rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
|
1233
|
+
rotation_window: Optional[pulumi.Input[builtins.int]] = None,
|
1233
1234
|
snowflake: Optional[pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']]] = None,
|
1234
|
-
verify_connection: Optional[pulumi.Input[bool]] = None,
|
1235
|
+
verify_connection: Optional[pulumi.Input[builtins.bool]] = None,
|
1235
1236
|
__props__=None):
|
1236
1237
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
1237
1238
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -1283,12 +1284,12 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1283
1284
|
def get(resource_name: str,
|
1284
1285
|
id: pulumi.Input[str],
|
1285
1286
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1286
|
-
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1287
|
-
backend: Optional[pulumi.Input[str]] = None,
|
1287
|
+
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
1288
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
1288
1289
|
cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
|
1289
1290
|
couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
|
1290
|
-
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
1291
|
-
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
1291
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
1292
|
+
disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
|
1292
1293
|
elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
|
1293
1294
|
hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
|
1294
1295
|
influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
|
@@ -1299,20 +1300,20 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1299
1300
|
mysql_aurora: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']]] = None,
|
1300
1301
|
mysql_legacy: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']]] = None,
|
1301
1302
|
mysql_rds: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']]] = None,
|
1302
|
-
name: Optional[pulumi.Input[str]] = None,
|
1303
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
1303
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
1304
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
1304
1305
|
oracle: Optional[pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']]] = None,
|
1305
|
-
plugin_name: Optional[pulumi.Input[str]] = None,
|
1306
|
+
plugin_name: Optional[pulumi.Input[builtins.str]] = None,
|
1306
1307
|
postgresql: Optional[pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']]] = None,
|
1307
1308
|
redis: Optional[pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']]] = None,
|
1308
1309
|
redis_elasticache: Optional[pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']]] = None,
|
1309
1310
|
redshift: Optional[pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']]] = None,
|
1310
|
-
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1311
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
1312
|
-
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
1313
|
-
rotation_window: Optional[pulumi.Input[int]] = None,
|
1311
|
+
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
1312
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
1313
|
+
rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
|
1314
|
+
rotation_window: Optional[pulumi.Input[builtins.int]] = None,
|
1314
1315
|
snowflake: Optional[pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']]] = None,
|
1315
|
-
verify_connection: Optional[pulumi.Input[bool]] = None) -> 'SecretBackendConnection':
|
1316
|
+
verify_connection: Optional[pulumi.Input[builtins.bool]] = None) -> 'SecretBackendConnection':
|
1316
1317
|
"""
|
1317
1318
|
Get an existing SecretBackendConnection resource's state with the given name, id, and optional extra
|
1318
1319
|
properties used to qualify the lookup.
|
@@ -1320,13 +1321,13 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1320
1321
|
:param str resource_name: The unique name of the resulting resource.
|
1321
1322
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
1322
1323
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1323
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
|
1324
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_roles: A list of roles that are allowed to use this
|
1324
1325
|
connection.
|
1325
|
-
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
1326
|
+
:param pulumi.Input[builtins.str] backend: The unique name of the Vault mount to configure.
|
1326
1327
|
:param pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']] cassandra: A nested block containing configuration options for Cassandra connections.
|
1327
1328
|
:param pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']] couchbase: A nested block containing configuration options for Couchbase connections.
|
1328
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
1329
|
-
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1329
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
1330
|
+
:param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1330
1331
|
:param pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
|
1331
1332
|
:param pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']] hana: A nested block containing configuration options for SAP HanaDB connections.
|
1332
1333
|
:param pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']] influxdb: A nested block containing configuration options for InfluxDB connections.
|
@@ -1337,29 +1338,29 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1337
1338
|
:param pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']] mysql_aurora: A nested block containing configuration options for Aurora MySQL connections.
|
1338
1339
|
:param pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']] mysql_legacy: A nested block containing configuration options for legacy MySQL connections.
|
1339
1340
|
:param pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
|
1340
|
-
:param pulumi.Input[str] name: A unique name to give the database connection.
|
1341
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1341
|
+
:param pulumi.Input[builtins.str] name: A unique name to give the database connection.
|
1342
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
1342
1343
|
The value should not contain leading or trailing forward slashes.
|
1343
1344
|
The `namespace` is always relative to the provider's configured namespace.
|
1344
1345
|
*Available only for Vault Enterprise*.
|
1345
1346
|
:param pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']] oracle: A nested block containing configuration options for Oracle connections.
|
1346
|
-
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
1347
|
+
:param pulumi.Input[builtins.str] plugin_name: Specifies the name of the plugin to use.
|
1347
1348
|
:param pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']] postgresql: A nested block containing configuration options for PostgreSQL connections.
|
1348
1349
|
:param pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']] redis: A nested block containing configuration options for Redis connections.
|
1349
1350
|
:param pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']] redis_elasticache: A nested block containing configuration options for Redis ElastiCache connections.
|
1350
1351
|
|
1351
1352
|
Exactly one of the nested blocks of configuration options must be supplied.
|
1352
1353
|
:param pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']] redshift: Connection parameters for the redshift-database-plugin plugin.
|
1353
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
1354
|
-
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
1354
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
1355
|
+
:param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
1355
1356
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
1356
|
-
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
1357
|
+
:param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
1357
1358
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
1358
|
-
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
1359
|
+
:param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
1359
1360
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
1360
1361
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
1361
1362
|
:param pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']] snowflake: A nested block containing configuration options for Snowflake connections.
|
1362
|
-
:param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
|
1363
|
+
:param pulumi.Input[builtins.bool] verify_connection: Whether the connection should be verified on
|
1363
1364
|
initial configuration or not.
|
1364
1365
|
"""
|
1365
1366
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -1400,7 +1401,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1400
1401
|
|
1401
1402
|
@property
|
1402
1403
|
@pulumi.getter(name="allowedRoles")
|
1403
|
-
def allowed_roles(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1404
|
+
def allowed_roles(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
1404
1405
|
"""
|
1405
1406
|
A list of roles that are allowed to use this
|
1406
1407
|
connection.
|
@@ -1409,7 +1410,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1409
1410
|
|
1410
1411
|
@property
|
1411
1412
|
@pulumi.getter
|
1412
|
-
def backend(self) -> pulumi.Output[str]:
|
1413
|
+
def backend(self) -> pulumi.Output[builtins.str]:
|
1413
1414
|
"""
|
1414
1415
|
The unique name of the Vault mount to configure.
|
1415
1416
|
"""
|
@@ -1433,7 +1434,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1433
1434
|
|
1434
1435
|
@property
|
1435
1436
|
@pulumi.getter
|
1436
|
-
def data(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
1437
|
+
def data(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
|
1437
1438
|
"""
|
1438
1439
|
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
1439
1440
|
"""
|
@@ -1441,7 +1442,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1441
1442
|
|
1442
1443
|
@property
|
1443
1444
|
@pulumi.getter(name="disableAutomatedRotation")
|
1444
|
-
def disable_automated_rotation(self) -> pulumi.Output[Optional[bool]]:
|
1445
|
+
def disable_automated_rotation(self) -> pulumi.Output[Optional[builtins.bool]]:
|
1445
1446
|
"""
|
1446
1447
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1447
1448
|
"""
|
@@ -1529,7 +1530,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1529
1530
|
|
1530
1531
|
@property
|
1531
1532
|
@pulumi.getter
|
1532
|
-
def name(self) -> pulumi.Output[str]:
|
1533
|
+
def name(self) -> pulumi.Output[builtins.str]:
|
1533
1534
|
"""
|
1534
1535
|
A unique name to give the database connection.
|
1535
1536
|
"""
|
@@ -1537,7 +1538,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1537
1538
|
|
1538
1539
|
@property
|
1539
1540
|
@pulumi.getter
|
1540
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
1541
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
1541
1542
|
"""
|
1542
1543
|
The namespace to provision the resource in.
|
1543
1544
|
The value should not contain leading or trailing forward slashes.
|
@@ -1556,7 +1557,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1556
1557
|
|
1557
1558
|
@property
|
1558
1559
|
@pulumi.getter(name="pluginName")
|
1559
|
-
def plugin_name(self) -> pulumi.Output[str]:
|
1560
|
+
def plugin_name(self) -> pulumi.Output[builtins.str]:
|
1560
1561
|
"""
|
1561
1562
|
Specifies the name of the plugin to use.
|
1562
1563
|
"""
|
@@ -1598,7 +1599,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1598
1599
|
|
1599
1600
|
@property
|
1600
1601
|
@pulumi.getter(name="rootRotationStatements")
|
1601
|
-
def root_rotation_statements(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1602
|
+
def root_rotation_statements(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
1602
1603
|
"""
|
1603
1604
|
A list of database statements to be executed to rotate the root user's credentials.
|
1604
1605
|
"""
|
@@ -1606,7 +1607,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1606
1607
|
|
1607
1608
|
@property
|
1608
1609
|
@pulumi.getter(name="rotationPeriod")
|
1609
|
-
def rotation_period(self) -> pulumi.Output[Optional[int]]:
|
1610
|
+
def rotation_period(self) -> pulumi.Output[Optional[builtins.int]]:
|
1610
1611
|
"""
|
1611
1612
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
1612
1613
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -1615,7 +1616,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1615
1616
|
|
1616
1617
|
@property
|
1617
1618
|
@pulumi.getter(name="rotationSchedule")
|
1618
|
-
def rotation_schedule(self) -> pulumi.Output[Optional[str]]:
|
1619
|
+
def rotation_schedule(self) -> pulumi.Output[Optional[builtins.str]]:
|
1619
1620
|
"""
|
1620
1621
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
1621
1622
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
@@ -1624,7 +1625,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1624
1625
|
|
1625
1626
|
@property
|
1626
1627
|
@pulumi.getter(name="rotationWindow")
|
1627
|
-
def rotation_window(self) -> pulumi.Output[Optional[int]]:
|
1628
|
+
def rotation_window(self) -> pulumi.Output[Optional[builtins.int]]:
|
1628
1629
|
"""
|
1629
1630
|
The maximum amount of time in seconds allowed to complete
|
1630
1631
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -1642,7 +1643,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1642
1643
|
|
1643
1644
|
@property
|
1644
1645
|
@pulumi.getter(name="verifyConnection")
|
1645
|
-
def verify_connection(self) -> pulumi.Output[Optional[bool]]:
|
1646
|
+
def verify_connection(self) -> pulumi.Output[Optional[builtins.bool]]:
|
1646
1647
|
"""
|
1647
1648
|
Whether the connection should be verified on
|
1648
1649
|
initial configuration or not.
|