pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -21,12 +22,12 @@ __all__ = ['SecretBackendConnectionArgs', 'SecretBackendConnection']
21
22
  @pulumi.input_type
22
23
  class SecretBackendConnectionArgs:
23
24
  def __init__(__self__, *,
24
- backend: pulumi.Input[str],
25
- allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
25
+ backend: pulumi.Input[builtins.str],
26
+ allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
26
27
  cassandra: Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']] = None,
27
28
  couchbase: Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']] = None,
28
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
29
- disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
29
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
30
+ disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
30
31
  elasticsearch: Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']] = None,
31
32
  hana: Optional[pulumi.Input['SecretBackendConnectionHanaArgs']] = None,
32
33
  influxdb: Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']] = None,
@@ -37,29 +38,29 @@ class SecretBackendConnectionArgs:
37
38
  mysql_aurora: Optional[pulumi.Input['SecretBackendConnectionMysqlAuroraArgs']] = None,
38
39
  mysql_legacy: Optional[pulumi.Input['SecretBackendConnectionMysqlLegacyArgs']] = None,
39
40
  mysql_rds: Optional[pulumi.Input['SecretBackendConnectionMysqlRdsArgs']] = None,
40
- name: Optional[pulumi.Input[str]] = None,
41
- namespace: Optional[pulumi.Input[str]] = None,
41
+ name: Optional[pulumi.Input[builtins.str]] = None,
42
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
42
43
  oracle: Optional[pulumi.Input['SecretBackendConnectionOracleArgs']] = None,
43
- plugin_name: Optional[pulumi.Input[str]] = None,
44
+ plugin_name: Optional[pulumi.Input[builtins.str]] = None,
44
45
  postgresql: Optional[pulumi.Input['SecretBackendConnectionPostgresqlArgs']] = None,
45
46
  redis: Optional[pulumi.Input['SecretBackendConnectionRedisArgs']] = None,
46
47
  redis_elasticache: Optional[pulumi.Input['SecretBackendConnectionRedisElasticacheArgs']] = None,
47
48
  redshift: Optional[pulumi.Input['SecretBackendConnectionRedshiftArgs']] = None,
48
- root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
49
- rotation_period: Optional[pulumi.Input[int]] = None,
50
- rotation_schedule: Optional[pulumi.Input[str]] = None,
51
- rotation_window: Optional[pulumi.Input[int]] = None,
49
+ root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
50
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
51
+ rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
52
+ rotation_window: Optional[pulumi.Input[builtins.int]] = None,
52
53
  snowflake: Optional[pulumi.Input['SecretBackendConnectionSnowflakeArgs']] = None,
53
- verify_connection: Optional[pulumi.Input[bool]] = None):
54
+ verify_connection: Optional[pulumi.Input[builtins.bool]] = None):
54
55
  """
55
56
  The set of arguments for constructing a SecretBackendConnection resource.
56
- :param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
57
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
57
+ :param pulumi.Input[builtins.str] backend: The unique name of the Vault mount to configure.
58
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_roles: A list of roles that are allowed to use this
58
59
  connection.
59
60
  :param pulumi.Input['SecretBackendConnectionCassandraArgs'] cassandra: A nested block containing configuration options for Cassandra connections.
60
61
  :param pulumi.Input['SecretBackendConnectionCouchbaseArgs'] couchbase: A nested block containing configuration options for Couchbase connections.
61
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
62
- :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
62
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
63
+ :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
63
64
  :param pulumi.Input['SecretBackendConnectionElasticsearchArgs'] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
64
65
  :param pulumi.Input['SecretBackendConnectionHanaArgs'] hana: A nested block containing configuration options for SAP HanaDB connections.
65
66
  :param pulumi.Input['SecretBackendConnectionInfluxdbArgs'] influxdb: A nested block containing configuration options for InfluxDB connections.
@@ -70,29 +71,29 @@ class SecretBackendConnectionArgs:
70
71
  :param pulumi.Input['SecretBackendConnectionMysqlAuroraArgs'] mysql_aurora: A nested block containing configuration options for Aurora MySQL connections.
71
72
  :param pulumi.Input['SecretBackendConnectionMysqlLegacyArgs'] mysql_legacy: A nested block containing configuration options for legacy MySQL connections.
72
73
  :param pulumi.Input['SecretBackendConnectionMysqlRdsArgs'] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
73
- :param pulumi.Input[str] name: A unique name to give the database connection.
74
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
74
+ :param pulumi.Input[builtins.str] name: A unique name to give the database connection.
75
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
75
76
  The value should not contain leading or trailing forward slashes.
76
77
  The `namespace` is always relative to the provider's configured namespace.
77
78
  *Available only for Vault Enterprise*.
78
79
  :param pulumi.Input['SecretBackendConnectionOracleArgs'] oracle: A nested block containing configuration options for Oracle connections.
79
- :param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
80
+ :param pulumi.Input[builtins.str] plugin_name: Specifies the name of the plugin to use.
80
81
  :param pulumi.Input['SecretBackendConnectionPostgresqlArgs'] postgresql: A nested block containing configuration options for PostgreSQL connections.
81
82
  :param pulumi.Input['SecretBackendConnectionRedisArgs'] redis: A nested block containing configuration options for Redis connections.
82
83
  :param pulumi.Input['SecretBackendConnectionRedisElasticacheArgs'] redis_elasticache: A nested block containing configuration options for Redis ElastiCache connections.
83
84
 
84
85
  Exactly one of the nested blocks of configuration options must be supplied.
85
86
  :param pulumi.Input['SecretBackendConnectionRedshiftArgs'] redshift: Connection parameters for the redshift-database-plugin plugin.
86
- :param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
87
- :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
87
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
88
+ :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
88
89
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
89
- :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
90
+ :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
90
91
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
91
- :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
92
+ :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
92
93
  a rotation when a scheduled token rotation occurs. The default rotation window is
93
94
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
94
95
  :param pulumi.Input['SecretBackendConnectionSnowflakeArgs'] snowflake: A nested block containing configuration options for Snowflake connections.
95
- :param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
96
+ :param pulumi.Input[builtins.bool] verify_connection: Whether the connection should be verified on
96
97
  initial configuration or not.
97
98
  """
98
99
  pulumi.set(__self__, "backend", backend)
@@ -157,19 +158,19 @@ class SecretBackendConnectionArgs:
157
158
 
158
159
  @property
159
160
  @pulumi.getter
160
- def backend(self) -> pulumi.Input[str]:
161
+ def backend(self) -> pulumi.Input[builtins.str]:
161
162
  """
162
163
  The unique name of the Vault mount to configure.
163
164
  """
164
165
  return pulumi.get(self, "backend")
165
166
 
166
167
  @backend.setter
167
- def backend(self, value: pulumi.Input[str]):
168
+ def backend(self, value: pulumi.Input[builtins.str]):
168
169
  pulumi.set(self, "backend", value)
169
170
 
170
171
  @property
171
172
  @pulumi.getter(name="allowedRoles")
172
- def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
173
+ def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
173
174
  """
174
175
  A list of roles that are allowed to use this
175
176
  connection.
@@ -177,7 +178,7 @@ class SecretBackendConnectionArgs:
177
178
  return pulumi.get(self, "allowed_roles")
178
179
 
179
180
  @allowed_roles.setter
180
- def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
181
+ def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
181
182
  pulumi.set(self, "allowed_roles", value)
182
183
 
183
184
  @property
@@ -206,26 +207,26 @@ class SecretBackendConnectionArgs:
206
207
 
207
208
  @property
208
209
  @pulumi.getter
209
- def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
210
+ def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
210
211
  """
211
212
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
212
213
  """
213
214
  return pulumi.get(self, "data")
214
215
 
215
216
  @data.setter
216
- def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
217
+ def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
217
218
  pulumi.set(self, "data", value)
218
219
 
219
220
  @property
220
221
  @pulumi.getter(name="disableAutomatedRotation")
221
- def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
222
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
222
223
  """
223
224
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
224
225
  """
225
226
  return pulumi.get(self, "disable_automated_rotation")
226
227
 
227
228
  @disable_automated_rotation.setter
228
- def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
229
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
229
230
  pulumi.set(self, "disable_automated_rotation", value)
230
231
 
231
232
  @property
@@ -350,19 +351,19 @@ class SecretBackendConnectionArgs:
350
351
 
351
352
  @property
352
353
  @pulumi.getter
353
- def name(self) -> Optional[pulumi.Input[str]]:
354
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
354
355
  """
355
356
  A unique name to give the database connection.
356
357
  """
357
358
  return pulumi.get(self, "name")
358
359
 
359
360
  @name.setter
360
- def name(self, value: Optional[pulumi.Input[str]]):
361
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
361
362
  pulumi.set(self, "name", value)
362
363
 
363
364
  @property
364
365
  @pulumi.getter
365
- def namespace(self) -> Optional[pulumi.Input[str]]:
366
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
366
367
  """
367
368
  The namespace to provision the resource in.
368
369
  The value should not contain leading or trailing forward slashes.
@@ -372,7 +373,7 @@ class SecretBackendConnectionArgs:
372
373
  return pulumi.get(self, "namespace")
373
374
 
374
375
  @namespace.setter
375
- def namespace(self, value: Optional[pulumi.Input[str]]):
376
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
376
377
  pulumi.set(self, "namespace", value)
377
378
 
378
379
  @property
@@ -389,14 +390,14 @@ class SecretBackendConnectionArgs:
389
390
 
390
391
  @property
391
392
  @pulumi.getter(name="pluginName")
392
- def plugin_name(self) -> Optional[pulumi.Input[str]]:
393
+ def plugin_name(self) -> Optional[pulumi.Input[builtins.str]]:
393
394
  """
394
395
  Specifies the name of the plugin to use.
395
396
  """
396
397
  return pulumi.get(self, "plugin_name")
397
398
 
398
399
  @plugin_name.setter
399
- def plugin_name(self, value: Optional[pulumi.Input[str]]):
400
+ def plugin_name(self, value: Optional[pulumi.Input[builtins.str]]):
400
401
  pulumi.set(self, "plugin_name", value)
401
402
 
402
403
  @property
@@ -451,19 +452,19 @@ class SecretBackendConnectionArgs:
451
452
 
452
453
  @property
453
454
  @pulumi.getter(name="rootRotationStatements")
454
- def root_rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
455
+ def root_rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
455
456
  """
456
457
  A list of database statements to be executed to rotate the root user's credentials.
457
458
  """
458
459
  return pulumi.get(self, "root_rotation_statements")
459
460
 
460
461
  @root_rotation_statements.setter
461
- def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
462
+ def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
462
463
  pulumi.set(self, "root_rotation_statements", value)
463
464
 
464
465
  @property
465
466
  @pulumi.getter(name="rotationPeriod")
466
- def rotation_period(self) -> Optional[pulumi.Input[int]]:
467
+ def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
467
468
  """
468
469
  The amount of time in seconds Vault should wait before rotating the root credential.
469
470
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -471,12 +472,12 @@ class SecretBackendConnectionArgs:
471
472
  return pulumi.get(self, "rotation_period")
472
473
 
473
474
  @rotation_period.setter
474
- def rotation_period(self, value: Optional[pulumi.Input[int]]):
475
+ def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
475
476
  pulumi.set(self, "rotation_period", value)
476
477
 
477
478
  @property
478
479
  @pulumi.getter(name="rotationSchedule")
479
- def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
480
+ def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
480
481
  """
481
482
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
482
483
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -484,12 +485,12 @@ class SecretBackendConnectionArgs:
484
485
  return pulumi.get(self, "rotation_schedule")
485
486
 
486
487
  @rotation_schedule.setter
487
- def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
488
+ def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
488
489
  pulumi.set(self, "rotation_schedule", value)
489
490
 
490
491
  @property
491
492
  @pulumi.getter(name="rotationWindow")
492
- def rotation_window(self) -> Optional[pulumi.Input[int]]:
493
+ def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
493
494
  """
494
495
  The maximum amount of time in seconds allowed to complete
495
496
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -498,7 +499,7 @@ class SecretBackendConnectionArgs:
498
499
  return pulumi.get(self, "rotation_window")
499
500
 
500
501
  @rotation_window.setter
501
- def rotation_window(self, value: Optional[pulumi.Input[int]]):
502
+ def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
502
503
  pulumi.set(self, "rotation_window", value)
503
504
 
504
505
  @property
@@ -515,7 +516,7 @@ class SecretBackendConnectionArgs:
515
516
 
516
517
  @property
517
518
  @pulumi.getter(name="verifyConnection")
518
- def verify_connection(self) -> Optional[pulumi.Input[bool]]:
519
+ def verify_connection(self) -> Optional[pulumi.Input[builtins.bool]]:
519
520
  """
520
521
  Whether the connection should be verified on
521
522
  initial configuration or not.
@@ -523,19 +524,19 @@ class SecretBackendConnectionArgs:
523
524
  return pulumi.get(self, "verify_connection")
524
525
 
525
526
  @verify_connection.setter
526
- def verify_connection(self, value: Optional[pulumi.Input[bool]]):
527
+ def verify_connection(self, value: Optional[pulumi.Input[builtins.bool]]):
527
528
  pulumi.set(self, "verify_connection", value)
528
529
 
529
530
 
530
531
  @pulumi.input_type
531
532
  class _SecretBackendConnectionState:
532
533
  def __init__(__self__, *,
533
- allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
534
- backend: Optional[pulumi.Input[str]] = None,
534
+ allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
535
+ backend: Optional[pulumi.Input[builtins.str]] = None,
535
536
  cassandra: Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']] = None,
536
537
  couchbase: Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']] = None,
537
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
538
- disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
538
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
539
+ disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
539
540
  elasticsearch: Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']] = None,
540
541
  hana: Optional[pulumi.Input['SecretBackendConnectionHanaArgs']] = None,
541
542
  influxdb: Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']] = None,
@@ -546,29 +547,29 @@ class _SecretBackendConnectionState:
546
547
  mysql_aurora: Optional[pulumi.Input['SecretBackendConnectionMysqlAuroraArgs']] = None,
547
548
  mysql_legacy: Optional[pulumi.Input['SecretBackendConnectionMysqlLegacyArgs']] = None,
548
549
  mysql_rds: Optional[pulumi.Input['SecretBackendConnectionMysqlRdsArgs']] = None,
549
- name: Optional[pulumi.Input[str]] = None,
550
- namespace: Optional[pulumi.Input[str]] = None,
550
+ name: Optional[pulumi.Input[builtins.str]] = None,
551
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
551
552
  oracle: Optional[pulumi.Input['SecretBackendConnectionOracleArgs']] = None,
552
- plugin_name: Optional[pulumi.Input[str]] = None,
553
+ plugin_name: Optional[pulumi.Input[builtins.str]] = None,
553
554
  postgresql: Optional[pulumi.Input['SecretBackendConnectionPostgresqlArgs']] = None,
554
555
  redis: Optional[pulumi.Input['SecretBackendConnectionRedisArgs']] = None,
555
556
  redis_elasticache: Optional[pulumi.Input['SecretBackendConnectionRedisElasticacheArgs']] = None,
556
557
  redshift: Optional[pulumi.Input['SecretBackendConnectionRedshiftArgs']] = None,
557
- root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
558
- rotation_period: Optional[pulumi.Input[int]] = None,
559
- rotation_schedule: Optional[pulumi.Input[str]] = None,
560
- rotation_window: Optional[pulumi.Input[int]] = None,
558
+ root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
559
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
560
+ rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
561
+ rotation_window: Optional[pulumi.Input[builtins.int]] = None,
561
562
  snowflake: Optional[pulumi.Input['SecretBackendConnectionSnowflakeArgs']] = None,
562
- verify_connection: Optional[pulumi.Input[bool]] = None):
563
+ verify_connection: Optional[pulumi.Input[builtins.bool]] = None):
563
564
  """
564
565
  Input properties used for looking up and filtering SecretBackendConnection resources.
565
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
566
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_roles: A list of roles that are allowed to use this
566
567
  connection.
567
- :param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
568
+ :param pulumi.Input[builtins.str] backend: The unique name of the Vault mount to configure.
568
569
  :param pulumi.Input['SecretBackendConnectionCassandraArgs'] cassandra: A nested block containing configuration options for Cassandra connections.
569
570
  :param pulumi.Input['SecretBackendConnectionCouchbaseArgs'] couchbase: A nested block containing configuration options for Couchbase connections.
570
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
571
- :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
571
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
572
+ :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
572
573
  :param pulumi.Input['SecretBackendConnectionElasticsearchArgs'] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
573
574
  :param pulumi.Input['SecretBackendConnectionHanaArgs'] hana: A nested block containing configuration options for SAP HanaDB connections.
574
575
  :param pulumi.Input['SecretBackendConnectionInfluxdbArgs'] influxdb: A nested block containing configuration options for InfluxDB connections.
@@ -579,29 +580,29 @@ class _SecretBackendConnectionState:
579
580
  :param pulumi.Input['SecretBackendConnectionMysqlAuroraArgs'] mysql_aurora: A nested block containing configuration options for Aurora MySQL connections.
580
581
  :param pulumi.Input['SecretBackendConnectionMysqlLegacyArgs'] mysql_legacy: A nested block containing configuration options for legacy MySQL connections.
581
582
  :param pulumi.Input['SecretBackendConnectionMysqlRdsArgs'] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
582
- :param pulumi.Input[str] name: A unique name to give the database connection.
583
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
583
+ :param pulumi.Input[builtins.str] name: A unique name to give the database connection.
584
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
584
585
  The value should not contain leading or trailing forward slashes.
585
586
  The `namespace` is always relative to the provider's configured namespace.
586
587
  *Available only for Vault Enterprise*.
587
588
  :param pulumi.Input['SecretBackendConnectionOracleArgs'] oracle: A nested block containing configuration options for Oracle connections.
588
- :param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
589
+ :param pulumi.Input[builtins.str] plugin_name: Specifies the name of the plugin to use.
589
590
  :param pulumi.Input['SecretBackendConnectionPostgresqlArgs'] postgresql: A nested block containing configuration options for PostgreSQL connections.
590
591
  :param pulumi.Input['SecretBackendConnectionRedisArgs'] redis: A nested block containing configuration options for Redis connections.
591
592
  :param pulumi.Input['SecretBackendConnectionRedisElasticacheArgs'] redis_elasticache: A nested block containing configuration options for Redis ElastiCache connections.
592
593
 
593
594
  Exactly one of the nested blocks of configuration options must be supplied.
594
595
  :param pulumi.Input['SecretBackendConnectionRedshiftArgs'] redshift: Connection parameters for the redshift-database-plugin plugin.
595
- :param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
596
- :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
596
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
597
+ :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
597
598
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
598
- :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
599
+ :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
599
600
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
600
- :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
601
+ :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
601
602
  a rotation when a scheduled token rotation occurs. The default rotation window is
602
603
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
603
604
  :param pulumi.Input['SecretBackendConnectionSnowflakeArgs'] snowflake: A nested block containing configuration options for Snowflake connections.
604
- :param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
605
+ :param pulumi.Input[builtins.bool] verify_connection: Whether the connection should be verified on
605
606
  initial configuration or not.
606
607
  """
607
608
  if allowed_roles is not None:
@@ -667,7 +668,7 @@ class _SecretBackendConnectionState:
667
668
 
668
669
  @property
669
670
  @pulumi.getter(name="allowedRoles")
670
- def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
671
+ def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
671
672
  """
672
673
  A list of roles that are allowed to use this
673
674
  connection.
@@ -675,19 +676,19 @@ class _SecretBackendConnectionState:
675
676
  return pulumi.get(self, "allowed_roles")
676
677
 
677
678
  @allowed_roles.setter
678
- def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
679
+ def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
679
680
  pulumi.set(self, "allowed_roles", value)
680
681
 
681
682
  @property
682
683
  @pulumi.getter
683
- def backend(self) -> Optional[pulumi.Input[str]]:
684
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
684
685
  """
685
686
  The unique name of the Vault mount to configure.
686
687
  """
687
688
  return pulumi.get(self, "backend")
688
689
 
689
690
  @backend.setter
690
- def backend(self, value: Optional[pulumi.Input[str]]):
691
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
691
692
  pulumi.set(self, "backend", value)
692
693
 
693
694
  @property
@@ -716,26 +717,26 @@ class _SecretBackendConnectionState:
716
717
 
717
718
  @property
718
719
  @pulumi.getter
719
- def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
720
+ def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
720
721
  """
721
722
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
722
723
  """
723
724
  return pulumi.get(self, "data")
724
725
 
725
726
  @data.setter
726
- def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
727
+ def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
727
728
  pulumi.set(self, "data", value)
728
729
 
729
730
  @property
730
731
  @pulumi.getter(name="disableAutomatedRotation")
731
- def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
732
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
732
733
  """
733
734
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
734
735
  """
735
736
  return pulumi.get(self, "disable_automated_rotation")
736
737
 
737
738
  @disable_automated_rotation.setter
738
- def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
739
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
739
740
  pulumi.set(self, "disable_automated_rotation", value)
740
741
 
741
742
  @property
@@ -860,19 +861,19 @@ class _SecretBackendConnectionState:
860
861
 
861
862
  @property
862
863
  @pulumi.getter
863
- def name(self) -> Optional[pulumi.Input[str]]:
864
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
864
865
  """
865
866
  A unique name to give the database connection.
866
867
  """
867
868
  return pulumi.get(self, "name")
868
869
 
869
870
  @name.setter
870
- def name(self, value: Optional[pulumi.Input[str]]):
871
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
871
872
  pulumi.set(self, "name", value)
872
873
 
873
874
  @property
874
875
  @pulumi.getter
875
- def namespace(self) -> Optional[pulumi.Input[str]]:
876
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
876
877
  """
877
878
  The namespace to provision the resource in.
878
879
  The value should not contain leading or trailing forward slashes.
@@ -882,7 +883,7 @@ class _SecretBackendConnectionState:
882
883
  return pulumi.get(self, "namespace")
883
884
 
884
885
  @namespace.setter
885
- def namespace(self, value: Optional[pulumi.Input[str]]):
886
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
886
887
  pulumi.set(self, "namespace", value)
887
888
 
888
889
  @property
@@ -899,14 +900,14 @@ class _SecretBackendConnectionState:
899
900
 
900
901
  @property
901
902
  @pulumi.getter(name="pluginName")
902
- def plugin_name(self) -> Optional[pulumi.Input[str]]:
903
+ def plugin_name(self) -> Optional[pulumi.Input[builtins.str]]:
903
904
  """
904
905
  Specifies the name of the plugin to use.
905
906
  """
906
907
  return pulumi.get(self, "plugin_name")
907
908
 
908
909
  @plugin_name.setter
909
- def plugin_name(self, value: Optional[pulumi.Input[str]]):
910
+ def plugin_name(self, value: Optional[pulumi.Input[builtins.str]]):
910
911
  pulumi.set(self, "plugin_name", value)
911
912
 
912
913
  @property
@@ -961,19 +962,19 @@ class _SecretBackendConnectionState:
961
962
 
962
963
  @property
963
964
  @pulumi.getter(name="rootRotationStatements")
964
- def root_rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
965
+ def root_rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
965
966
  """
966
967
  A list of database statements to be executed to rotate the root user's credentials.
967
968
  """
968
969
  return pulumi.get(self, "root_rotation_statements")
969
970
 
970
971
  @root_rotation_statements.setter
971
- def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
972
+ def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
972
973
  pulumi.set(self, "root_rotation_statements", value)
973
974
 
974
975
  @property
975
976
  @pulumi.getter(name="rotationPeriod")
976
- def rotation_period(self) -> Optional[pulumi.Input[int]]:
977
+ def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
977
978
  """
978
979
  The amount of time in seconds Vault should wait before rotating the root credential.
979
980
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -981,12 +982,12 @@ class _SecretBackendConnectionState:
981
982
  return pulumi.get(self, "rotation_period")
982
983
 
983
984
  @rotation_period.setter
984
- def rotation_period(self, value: Optional[pulumi.Input[int]]):
985
+ def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
985
986
  pulumi.set(self, "rotation_period", value)
986
987
 
987
988
  @property
988
989
  @pulumi.getter(name="rotationSchedule")
989
- def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
990
+ def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
990
991
  """
991
992
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
992
993
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -994,12 +995,12 @@ class _SecretBackendConnectionState:
994
995
  return pulumi.get(self, "rotation_schedule")
995
996
 
996
997
  @rotation_schedule.setter
997
- def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
998
+ def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
998
999
  pulumi.set(self, "rotation_schedule", value)
999
1000
 
1000
1001
  @property
1001
1002
  @pulumi.getter(name="rotationWindow")
1002
- def rotation_window(self) -> Optional[pulumi.Input[int]]:
1003
+ def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
1003
1004
  """
1004
1005
  The maximum amount of time in seconds allowed to complete
1005
1006
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -1008,7 +1009,7 @@ class _SecretBackendConnectionState:
1008
1009
  return pulumi.get(self, "rotation_window")
1009
1010
 
1010
1011
  @rotation_window.setter
1011
- def rotation_window(self, value: Optional[pulumi.Input[int]]):
1012
+ def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
1012
1013
  pulumi.set(self, "rotation_window", value)
1013
1014
 
1014
1015
  @property
@@ -1025,7 +1026,7 @@ class _SecretBackendConnectionState:
1025
1026
 
1026
1027
  @property
1027
1028
  @pulumi.getter(name="verifyConnection")
1028
- def verify_connection(self) -> Optional[pulumi.Input[bool]]:
1029
+ def verify_connection(self) -> Optional[pulumi.Input[builtins.bool]]:
1029
1030
  """
1030
1031
  Whether the connection should be verified on
1031
1032
  initial configuration or not.
@@ -1033,7 +1034,7 @@ class _SecretBackendConnectionState:
1033
1034
  return pulumi.get(self, "verify_connection")
1034
1035
 
1035
1036
  @verify_connection.setter
1036
- def verify_connection(self, value: Optional[pulumi.Input[bool]]):
1037
+ def verify_connection(self, value: Optional[pulumi.Input[builtins.bool]]):
1037
1038
  pulumi.set(self, "verify_connection", value)
1038
1039
 
1039
1040
 
@@ -1042,12 +1043,12 @@ class SecretBackendConnection(pulumi.CustomResource):
1042
1043
  def __init__(__self__,
1043
1044
  resource_name: str,
1044
1045
  opts: Optional[pulumi.ResourceOptions] = None,
1045
- allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1046
- backend: Optional[pulumi.Input[str]] = None,
1046
+ allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1047
+ backend: Optional[pulumi.Input[builtins.str]] = None,
1047
1048
  cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
1048
1049
  couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
1049
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1050
- disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
1050
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1051
+ disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
1051
1052
  elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
1052
1053
  hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
1053
1054
  influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
@@ -1058,20 +1059,20 @@ class SecretBackendConnection(pulumi.CustomResource):
1058
1059
  mysql_aurora: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']]] = None,
1059
1060
  mysql_legacy: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']]] = None,
1060
1061
  mysql_rds: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']]] = None,
1061
- name: Optional[pulumi.Input[str]] = None,
1062
- namespace: Optional[pulumi.Input[str]] = None,
1062
+ name: Optional[pulumi.Input[builtins.str]] = None,
1063
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
1063
1064
  oracle: Optional[pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']]] = None,
1064
- plugin_name: Optional[pulumi.Input[str]] = None,
1065
+ plugin_name: Optional[pulumi.Input[builtins.str]] = None,
1065
1066
  postgresql: Optional[pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']]] = None,
1066
1067
  redis: Optional[pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']]] = None,
1067
1068
  redis_elasticache: Optional[pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']]] = None,
1068
1069
  redshift: Optional[pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']]] = None,
1069
- root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1070
- rotation_period: Optional[pulumi.Input[int]] = None,
1071
- rotation_schedule: Optional[pulumi.Input[str]] = None,
1072
- rotation_window: Optional[pulumi.Input[int]] = None,
1070
+ root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1071
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
1072
+ rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
1073
+ rotation_window: Optional[pulumi.Input[builtins.int]] = None,
1073
1074
  snowflake: Optional[pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']]] = None,
1074
- verify_connection: Optional[pulumi.Input[bool]] = None,
1075
+ verify_connection: Optional[pulumi.Input[builtins.bool]] = None,
1075
1076
  __props__=None):
1076
1077
  """
1077
1078
  ## Example Usage
@@ -1107,13 +1108,13 @@ class SecretBackendConnection(pulumi.CustomResource):
1107
1108
 
1108
1109
  :param str resource_name: The name of the resource.
1109
1110
  :param pulumi.ResourceOptions opts: Options for the resource.
1110
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
1111
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_roles: A list of roles that are allowed to use this
1111
1112
  connection.
1112
- :param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
1113
+ :param pulumi.Input[builtins.str] backend: The unique name of the Vault mount to configure.
1113
1114
  :param pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']] cassandra: A nested block containing configuration options for Cassandra connections.
1114
1115
  :param pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']] couchbase: A nested block containing configuration options for Couchbase connections.
1115
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
1116
- :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1116
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
1117
+ :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1117
1118
  :param pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
1118
1119
  :param pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']] hana: A nested block containing configuration options for SAP HanaDB connections.
1119
1120
  :param pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']] influxdb: A nested block containing configuration options for InfluxDB connections.
@@ -1124,29 +1125,29 @@ class SecretBackendConnection(pulumi.CustomResource):
1124
1125
  :param pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']] mysql_aurora: A nested block containing configuration options for Aurora MySQL connections.
1125
1126
  :param pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']] mysql_legacy: A nested block containing configuration options for legacy MySQL connections.
1126
1127
  :param pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
1127
- :param pulumi.Input[str] name: A unique name to give the database connection.
1128
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1128
+ :param pulumi.Input[builtins.str] name: A unique name to give the database connection.
1129
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1129
1130
  The value should not contain leading or trailing forward slashes.
1130
1131
  The `namespace` is always relative to the provider's configured namespace.
1131
1132
  *Available only for Vault Enterprise*.
1132
1133
  :param pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']] oracle: A nested block containing configuration options for Oracle connections.
1133
- :param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
1134
+ :param pulumi.Input[builtins.str] plugin_name: Specifies the name of the plugin to use.
1134
1135
  :param pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']] postgresql: A nested block containing configuration options for PostgreSQL connections.
1135
1136
  :param pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']] redis: A nested block containing configuration options for Redis connections.
1136
1137
  :param pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']] redis_elasticache: A nested block containing configuration options for Redis ElastiCache connections.
1137
1138
 
1138
1139
  Exactly one of the nested blocks of configuration options must be supplied.
1139
1140
  :param pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']] redshift: Connection parameters for the redshift-database-plugin plugin.
1140
- :param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
1141
- :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1141
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
1142
+ :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1142
1143
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
1143
- :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1144
+ :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1144
1145
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
1145
- :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
1146
+ :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1146
1147
  a rotation when a scheduled token rotation occurs. The default rotation window is
1147
1148
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
1148
1149
  :param pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']] snowflake: A nested block containing configuration options for Snowflake connections.
1149
- :param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
1150
+ :param pulumi.Input[builtins.bool] verify_connection: Whether the connection should be verified on
1150
1151
  initial configuration or not.
1151
1152
  """
1152
1153
  ...
@@ -1202,12 +1203,12 @@ class SecretBackendConnection(pulumi.CustomResource):
1202
1203
  def _internal_init(__self__,
1203
1204
  resource_name: str,
1204
1205
  opts: Optional[pulumi.ResourceOptions] = None,
1205
- allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1206
- backend: Optional[pulumi.Input[str]] = None,
1206
+ allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1207
+ backend: Optional[pulumi.Input[builtins.str]] = None,
1207
1208
  cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
1208
1209
  couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
1209
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1210
- disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
1210
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1211
+ disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
1211
1212
  elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
1212
1213
  hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
1213
1214
  influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
@@ -1218,20 +1219,20 @@ class SecretBackendConnection(pulumi.CustomResource):
1218
1219
  mysql_aurora: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']]] = None,
1219
1220
  mysql_legacy: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']]] = None,
1220
1221
  mysql_rds: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']]] = None,
1221
- name: Optional[pulumi.Input[str]] = None,
1222
- namespace: Optional[pulumi.Input[str]] = None,
1222
+ name: Optional[pulumi.Input[builtins.str]] = None,
1223
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
1223
1224
  oracle: Optional[pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']]] = None,
1224
- plugin_name: Optional[pulumi.Input[str]] = None,
1225
+ plugin_name: Optional[pulumi.Input[builtins.str]] = None,
1225
1226
  postgresql: Optional[pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']]] = None,
1226
1227
  redis: Optional[pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']]] = None,
1227
1228
  redis_elasticache: Optional[pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']]] = None,
1228
1229
  redshift: Optional[pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']]] = None,
1229
- root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1230
- rotation_period: Optional[pulumi.Input[int]] = None,
1231
- rotation_schedule: Optional[pulumi.Input[str]] = None,
1232
- rotation_window: Optional[pulumi.Input[int]] = None,
1230
+ root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1231
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
1232
+ rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
1233
+ rotation_window: Optional[pulumi.Input[builtins.int]] = None,
1233
1234
  snowflake: Optional[pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']]] = None,
1234
- verify_connection: Optional[pulumi.Input[bool]] = None,
1235
+ verify_connection: Optional[pulumi.Input[builtins.bool]] = None,
1235
1236
  __props__=None):
1236
1237
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
1237
1238
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -1283,12 +1284,12 @@ class SecretBackendConnection(pulumi.CustomResource):
1283
1284
  def get(resource_name: str,
1284
1285
  id: pulumi.Input[str],
1285
1286
  opts: Optional[pulumi.ResourceOptions] = None,
1286
- allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1287
- backend: Optional[pulumi.Input[str]] = None,
1287
+ allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1288
+ backend: Optional[pulumi.Input[builtins.str]] = None,
1288
1289
  cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
1289
1290
  couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
1290
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1291
- disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
1291
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1292
+ disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
1292
1293
  elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
1293
1294
  hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
1294
1295
  influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
@@ -1299,20 +1300,20 @@ class SecretBackendConnection(pulumi.CustomResource):
1299
1300
  mysql_aurora: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']]] = None,
1300
1301
  mysql_legacy: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']]] = None,
1301
1302
  mysql_rds: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']]] = None,
1302
- name: Optional[pulumi.Input[str]] = None,
1303
- namespace: Optional[pulumi.Input[str]] = None,
1303
+ name: Optional[pulumi.Input[builtins.str]] = None,
1304
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
1304
1305
  oracle: Optional[pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']]] = None,
1305
- plugin_name: Optional[pulumi.Input[str]] = None,
1306
+ plugin_name: Optional[pulumi.Input[builtins.str]] = None,
1306
1307
  postgresql: Optional[pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']]] = None,
1307
1308
  redis: Optional[pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']]] = None,
1308
1309
  redis_elasticache: Optional[pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']]] = None,
1309
1310
  redshift: Optional[pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']]] = None,
1310
- root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1311
- rotation_period: Optional[pulumi.Input[int]] = None,
1312
- rotation_schedule: Optional[pulumi.Input[str]] = None,
1313
- rotation_window: Optional[pulumi.Input[int]] = None,
1311
+ root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1312
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
1313
+ rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
1314
+ rotation_window: Optional[pulumi.Input[builtins.int]] = None,
1314
1315
  snowflake: Optional[pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']]] = None,
1315
- verify_connection: Optional[pulumi.Input[bool]] = None) -> 'SecretBackendConnection':
1316
+ verify_connection: Optional[pulumi.Input[builtins.bool]] = None) -> 'SecretBackendConnection':
1316
1317
  """
1317
1318
  Get an existing SecretBackendConnection resource's state with the given name, id, and optional extra
1318
1319
  properties used to qualify the lookup.
@@ -1320,13 +1321,13 @@ class SecretBackendConnection(pulumi.CustomResource):
1320
1321
  :param str resource_name: The unique name of the resulting resource.
1321
1322
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1322
1323
  :param pulumi.ResourceOptions opts: Options for the resource.
1323
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: A list of roles that are allowed to use this
1324
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_roles: A list of roles that are allowed to use this
1324
1325
  connection.
1325
- :param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
1326
+ :param pulumi.Input[builtins.str] backend: The unique name of the Vault mount to configure.
1326
1327
  :param pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']] cassandra: A nested block containing configuration options for Cassandra connections.
1327
1328
  :param pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']] couchbase: A nested block containing configuration options for Couchbase connections.
1328
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
1329
- :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1329
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
1330
+ :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1330
1331
  :param pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
1331
1332
  :param pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']] hana: A nested block containing configuration options for SAP HanaDB connections.
1332
1333
  :param pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']] influxdb: A nested block containing configuration options for InfluxDB connections.
@@ -1337,29 +1338,29 @@ class SecretBackendConnection(pulumi.CustomResource):
1337
1338
  :param pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']] mysql_aurora: A nested block containing configuration options for Aurora MySQL connections.
1338
1339
  :param pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']] mysql_legacy: A nested block containing configuration options for legacy MySQL connections.
1339
1340
  :param pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
1340
- :param pulumi.Input[str] name: A unique name to give the database connection.
1341
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1341
+ :param pulumi.Input[builtins.str] name: A unique name to give the database connection.
1342
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1342
1343
  The value should not contain leading or trailing forward slashes.
1343
1344
  The `namespace` is always relative to the provider's configured namespace.
1344
1345
  *Available only for Vault Enterprise*.
1345
1346
  :param pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']] oracle: A nested block containing configuration options for Oracle connections.
1346
- :param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
1347
+ :param pulumi.Input[builtins.str] plugin_name: Specifies the name of the plugin to use.
1347
1348
  :param pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']] postgresql: A nested block containing configuration options for PostgreSQL connections.
1348
1349
  :param pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']] redis: A nested block containing configuration options for Redis connections.
1349
1350
  :param pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']] redis_elasticache: A nested block containing configuration options for Redis ElastiCache connections.
1350
1351
 
1351
1352
  Exactly one of the nested blocks of configuration options must be supplied.
1352
1353
  :param pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']] redshift: Connection parameters for the redshift-database-plugin plugin.
1353
- :param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
1354
- :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1354
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
1355
+ :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1355
1356
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
1356
- :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1357
+ :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1357
1358
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
1358
- :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
1359
+ :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1359
1360
  a rotation when a scheduled token rotation occurs. The default rotation window is
1360
1361
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
1361
1362
  :param pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']] snowflake: A nested block containing configuration options for Snowflake connections.
1362
- :param pulumi.Input[bool] verify_connection: Whether the connection should be verified on
1363
+ :param pulumi.Input[builtins.bool] verify_connection: Whether the connection should be verified on
1363
1364
  initial configuration or not.
1364
1365
  """
1365
1366
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -1400,7 +1401,7 @@ class SecretBackendConnection(pulumi.CustomResource):
1400
1401
 
1401
1402
  @property
1402
1403
  @pulumi.getter(name="allowedRoles")
1403
- def allowed_roles(self) -> pulumi.Output[Optional[Sequence[str]]]:
1404
+ def allowed_roles(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1404
1405
  """
1405
1406
  A list of roles that are allowed to use this
1406
1407
  connection.
@@ -1409,7 +1410,7 @@ class SecretBackendConnection(pulumi.CustomResource):
1409
1410
 
1410
1411
  @property
1411
1412
  @pulumi.getter
1412
- def backend(self) -> pulumi.Output[str]:
1413
+ def backend(self) -> pulumi.Output[builtins.str]:
1413
1414
  """
1414
1415
  The unique name of the Vault mount to configure.
1415
1416
  """
@@ -1433,7 +1434,7 @@ class SecretBackendConnection(pulumi.CustomResource):
1433
1434
 
1434
1435
  @property
1435
1436
  @pulumi.getter
1436
- def data(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1437
+ def data(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
1437
1438
  """
1438
1439
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
1439
1440
  """
@@ -1441,7 +1442,7 @@ class SecretBackendConnection(pulumi.CustomResource):
1441
1442
 
1442
1443
  @property
1443
1444
  @pulumi.getter(name="disableAutomatedRotation")
1444
- def disable_automated_rotation(self) -> pulumi.Output[Optional[bool]]:
1445
+ def disable_automated_rotation(self) -> pulumi.Output[Optional[builtins.bool]]:
1445
1446
  """
1446
1447
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1447
1448
  """
@@ -1529,7 +1530,7 @@ class SecretBackendConnection(pulumi.CustomResource):
1529
1530
 
1530
1531
  @property
1531
1532
  @pulumi.getter
1532
- def name(self) -> pulumi.Output[str]:
1533
+ def name(self) -> pulumi.Output[builtins.str]:
1533
1534
  """
1534
1535
  A unique name to give the database connection.
1535
1536
  """
@@ -1537,7 +1538,7 @@ class SecretBackendConnection(pulumi.CustomResource):
1537
1538
 
1538
1539
  @property
1539
1540
  @pulumi.getter
1540
- def namespace(self) -> pulumi.Output[Optional[str]]:
1541
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
1541
1542
  """
1542
1543
  The namespace to provision the resource in.
1543
1544
  The value should not contain leading or trailing forward slashes.
@@ -1556,7 +1557,7 @@ class SecretBackendConnection(pulumi.CustomResource):
1556
1557
 
1557
1558
  @property
1558
1559
  @pulumi.getter(name="pluginName")
1559
- def plugin_name(self) -> pulumi.Output[str]:
1560
+ def plugin_name(self) -> pulumi.Output[builtins.str]:
1560
1561
  """
1561
1562
  Specifies the name of the plugin to use.
1562
1563
  """
@@ -1598,7 +1599,7 @@ class SecretBackendConnection(pulumi.CustomResource):
1598
1599
 
1599
1600
  @property
1600
1601
  @pulumi.getter(name="rootRotationStatements")
1601
- def root_rotation_statements(self) -> pulumi.Output[Optional[Sequence[str]]]:
1602
+ def root_rotation_statements(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1602
1603
  """
1603
1604
  A list of database statements to be executed to rotate the root user's credentials.
1604
1605
  """
@@ -1606,7 +1607,7 @@ class SecretBackendConnection(pulumi.CustomResource):
1606
1607
 
1607
1608
  @property
1608
1609
  @pulumi.getter(name="rotationPeriod")
1609
- def rotation_period(self) -> pulumi.Output[Optional[int]]:
1610
+ def rotation_period(self) -> pulumi.Output[Optional[builtins.int]]:
1610
1611
  """
1611
1612
  The amount of time in seconds Vault should wait before rotating the root credential.
1612
1613
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -1615,7 +1616,7 @@ class SecretBackendConnection(pulumi.CustomResource):
1615
1616
 
1616
1617
  @property
1617
1618
  @pulumi.getter(name="rotationSchedule")
1618
- def rotation_schedule(self) -> pulumi.Output[Optional[str]]:
1619
+ def rotation_schedule(self) -> pulumi.Output[Optional[builtins.str]]:
1619
1620
  """
1620
1621
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1621
1622
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -1624,7 +1625,7 @@ class SecretBackendConnection(pulumi.CustomResource):
1624
1625
 
1625
1626
  @property
1626
1627
  @pulumi.getter(name="rotationWindow")
1627
- def rotation_window(self) -> pulumi.Output[Optional[int]]:
1628
+ def rotation_window(self) -> pulumi.Output[Optional[builtins.int]]:
1628
1629
  """
1629
1630
  The maximum amount of time in seconds allowed to complete
1630
1631
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -1642,7 +1643,7 @@ class SecretBackendConnection(pulumi.CustomResource):
1642
1643
 
1643
1644
  @property
1644
1645
  @pulumi.getter(name="verifyConnection")
1645
- def verify_connection(self) -> pulumi.Output[Optional[bool]]:
1646
+ def verify_connection(self) -> pulumi.Output[Optional[builtins.bool]]:
1646
1647
  """
1647
1648
  Whether the connection should be verified on
1648
1649
  initial configuration or not.