pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,1676 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
from . import outputs
|
|
17
|
+
from ._inputs import *
|
|
18
|
+
|
|
19
|
+
__all__ = ['SecretBackendConnectionArgs', 'SecretBackendConnection']
|
|
20
|
+
|
|
21
|
+
@pulumi.input_type
|
|
22
|
+
class SecretBackendConnectionArgs:
|
|
23
|
+
def __init__(__self__, *,
|
|
24
|
+
backend: pulumi.Input[_builtins.str],
|
|
25
|
+
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
26
|
+
cassandra: Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']] = None,
|
|
27
|
+
couchbase: Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']] = None,
|
|
28
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
29
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
30
|
+
elasticsearch: Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']] = None,
|
|
31
|
+
hana: Optional[pulumi.Input['SecretBackendConnectionHanaArgs']] = None,
|
|
32
|
+
influxdb: Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']] = None,
|
|
33
|
+
mongodb: Optional[pulumi.Input['SecretBackendConnectionMongodbArgs']] = None,
|
|
34
|
+
mongodbatlas: Optional[pulumi.Input['SecretBackendConnectionMongodbatlasArgs']] = None,
|
|
35
|
+
mssql: Optional[pulumi.Input['SecretBackendConnectionMssqlArgs']] = None,
|
|
36
|
+
mysql: Optional[pulumi.Input['SecretBackendConnectionMysqlArgs']] = None,
|
|
37
|
+
mysql_aurora: Optional[pulumi.Input['SecretBackendConnectionMysqlAuroraArgs']] = None,
|
|
38
|
+
mysql_legacy: Optional[pulumi.Input['SecretBackendConnectionMysqlLegacyArgs']] = None,
|
|
39
|
+
mysql_rds: Optional[pulumi.Input['SecretBackendConnectionMysqlRdsArgs']] = None,
|
|
40
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
41
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
42
|
+
oracle: Optional[pulumi.Input['SecretBackendConnectionOracleArgs']] = None,
|
|
43
|
+
plugin_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
44
|
+
postgresql: Optional[pulumi.Input['SecretBackendConnectionPostgresqlArgs']] = None,
|
|
45
|
+
redis: Optional[pulumi.Input['SecretBackendConnectionRedisArgs']] = None,
|
|
46
|
+
redis_elasticache: Optional[pulumi.Input['SecretBackendConnectionRedisElasticacheArgs']] = None,
|
|
47
|
+
redshift: Optional[pulumi.Input['SecretBackendConnectionRedshiftArgs']] = None,
|
|
48
|
+
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
49
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
50
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
|
51
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
|
52
|
+
snowflake: Optional[pulumi.Input['SecretBackendConnectionSnowflakeArgs']] = None,
|
|
53
|
+
verify_connection: Optional[pulumi.Input[_builtins.bool]] = None):
|
|
54
|
+
"""
|
|
55
|
+
The set of arguments for constructing a SecretBackendConnection resource.
|
|
56
|
+
:param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
|
|
57
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_roles: A list of roles that are allowed to use this
|
|
58
|
+
connection.
|
|
59
|
+
:param pulumi.Input['SecretBackendConnectionCassandraArgs'] cassandra: A nested block containing configuration options for Cassandra connections.
|
|
60
|
+
:param pulumi.Input['SecretBackendConnectionCouchbaseArgs'] couchbase: A nested block containing configuration options for Couchbase connections.
|
|
61
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
|
62
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
|
63
|
+
:param pulumi.Input['SecretBackendConnectionElasticsearchArgs'] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
|
|
64
|
+
:param pulumi.Input['SecretBackendConnectionHanaArgs'] hana: A nested block containing configuration options for SAP HanaDB connections.
|
|
65
|
+
:param pulumi.Input['SecretBackendConnectionInfluxdbArgs'] influxdb: A nested block containing configuration options for InfluxDB connections.
|
|
66
|
+
:param pulumi.Input['SecretBackendConnectionMongodbArgs'] mongodb: A nested block containing configuration options for MongoDB connections.
|
|
67
|
+
:param pulumi.Input['SecretBackendConnectionMongodbatlasArgs'] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
|
|
68
|
+
:param pulumi.Input['SecretBackendConnectionMssqlArgs'] mssql: A nested block containing configuration options for MSSQL connections.
|
|
69
|
+
:param pulumi.Input['SecretBackendConnectionMysqlArgs'] mysql: A nested block containing configuration options for MySQL connections.
|
|
70
|
+
:param pulumi.Input['SecretBackendConnectionMysqlAuroraArgs'] mysql_aurora: A nested block containing configuration options for Aurora MySQL connections.
|
|
71
|
+
:param pulumi.Input['SecretBackendConnectionMysqlLegacyArgs'] mysql_legacy: A nested block containing configuration options for legacy MySQL connections.
|
|
72
|
+
:param pulumi.Input['SecretBackendConnectionMysqlRdsArgs'] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
|
|
73
|
+
:param pulumi.Input[_builtins.str] name: A unique name to give the database connection.
|
|
74
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
75
|
+
The value should not contain leading or trailing forward slashes.
|
|
76
|
+
The `namespace` is always relative to the provider's configured namespace.
|
|
77
|
+
*Available only for Vault Enterprise*.
|
|
78
|
+
:param pulumi.Input['SecretBackendConnectionOracleArgs'] oracle: A nested block containing configuration options for Oracle connections.
|
|
79
|
+
:param pulumi.Input[_builtins.str] plugin_name: Specifies the name of the plugin to use.
|
|
80
|
+
:param pulumi.Input['SecretBackendConnectionPostgresqlArgs'] postgresql: A nested block containing configuration options for PostgreSQL connections.
|
|
81
|
+
:param pulumi.Input['SecretBackendConnectionRedisArgs'] redis: A nested block containing configuration options for Redis connections.
|
|
82
|
+
:param pulumi.Input['SecretBackendConnectionRedisElasticacheArgs'] redis_elasticache: A nested block containing configuration options for Redis ElastiCache connections.
|
|
83
|
+
|
|
84
|
+
Exactly one of the nested blocks of configuration options must be supplied.
|
|
85
|
+
:param pulumi.Input['SecretBackendConnectionRedshiftArgs'] redshift: Connection parameters for the redshift-database-plugin plugin.
|
|
86
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
|
87
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
|
88
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
|
89
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
|
90
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
|
91
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
|
92
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
|
93
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
|
94
|
+
:param pulumi.Input['SecretBackendConnectionSnowflakeArgs'] snowflake: A nested block containing configuration options for Snowflake connections.
|
|
95
|
+
:param pulumi.Input[_builtins.bool] verify_connection: Whether the connection should be verified on
|
|
96
|
+
initial configuration or not.
|
|
97
|
+
"""
|
|
98
|
+
pulumi.set(__self__, "backend", backend)
|
|
99
|
+
if allowed_roles is not None:
|
|
100
|
+
pulumi.set(__self__, "allowed_roles", allowed_roles)
|
|
101
|
+
if cassandra is not None:
|
|
102
|
+
pulumi.set(__self__, "cassandra", cassandra)
|
|
103
|
+
if couchbase is not None:
|
|
104
|
+
pulumi.set(__self__, "couchbase", couchbase)
|
|
105
|
+
if data is not None:
|
|
106
|
+
pulumi.set(__self__, "data", data)
|
|
107
|
+
if disable_automated_rotation is not None:
|
|
108
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
|
109
|
+
if elasticsearch is not None:
|
|
110
|
+
pulumi.set(__self__, "elasticsearch", elasticsearch)
|
|
111
|
+
if hana is not None:
|
|
112
|
+
pulumi.set(__self__, "hana", hana)
|
|
113
|
+
if influxdb is not None:
|
|
114
|
+
pulumi.set(__self__, "influxdb", influxdb)
|
|
115
|
+
if mongodb is not None:
|
|
116
|
+
pulumi.set(__self__, "mongodb", mongodb)
|
|
117
|
+
if mongodbatlas is not None:
|
|
118
|
+
pulumi.set(__self__, "mongodbatlas", mongodbatlas)
|
|
119
|
+
if mssql is not None:
|
|
120
|
+
pulumi.set(__self__, "mssql", mssql)
|
|
121
|
+
if mysql is not None:
|
|
122
|
+
pulumi.set(__self__, "mysql", mysql)
|
|
123
|
+
if mysql_aurora is not None:
|
|
124
|
+
pulumi.set(__self__, "mysql_aurora", mysql_aurora)
|
|
125
|
+
if mysql_legacy is not None:
|
|
126
|
+
pulumi.set(__self__, "mysql_legacy", mysql_legacy)
|
|
127
|
+
if mysql_rds is not None:
|
|
128
|
+
pulumi.set(__self__, "mysql_rds", mysql_rds)
|
|
129
|
+
if name is not None:
|
|
130
|
+
pulumi.set(__self__, "name", name)
|
|
131
|
+
if namespace is not None:
|
|
132
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
133
|
+
if oracle is not None:
|
|
134
|
+
pulumi.set(__self__, "oracle", oracle)
|
|
135
|
+
if plugin_name is not None:
|
|
136
|
+
pulumi.set(__self__, "plugin_name", plugin_name)
|
|
137
|
+
if postgresql is not None:
|
|
138
|
+
pulumi.set(__self__, "postgresql", postgresql)
|
|
139
|
+
if redis is not None:
|
|
140
|
+
pulumi.set(__self__, "redis", redis)
|
|
141
|
+
if redis_elasticache is not None:
|
|
142
|
+
pulumi.set(__self__, "redis_elasticache", redis_elasticache)
|
|
143
|
+
if redshift is not None:
|
|
144
|
+
pulumi.set(__self__, "redshift", redshift)
|
|
145
|
+
if root_rotation_statements is not None:
|
|
146
|
+
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
|
147
|
+
if rotation_period is not None:
|
|
148
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
|
149
|
+
if rotation_schedule is not None:
|
|
150
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
|
151
|
+
if rotation_window is not None:
|
|
152
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
|
153
|
+
if snowflake is not None:
|
|
154
|
+
pulumi.set(__self__, "snowflake", snowflake)
|
|
155
|
+
if verify_connection is not None:
|
|
156
|
+
pulumi.set(__self__, "verify_connection", verify_connection)
|
|
157
|
+
|
|
158
|
+
@_builtins.property
|
|
159
|
+
@pulumi.getter
|
|
160
|
+
def backend(self) -> pulumi.Input[_builtins.str]:
|
|
161
|
+
"""
|
|
162
|
+
The unique name of the Vault mount to configure.
|
|
163
|
+
"""
|
|
164
|
+
return pulumi.get(self, "backend")
|
|
165
|
+
|
|
166
|
+
@backend.setter
|
|
167
|
+
def backend(self, value: pulumi.Input[_builtins.str]):
|
|
168
|
+
pulumi.set(self, "backend", value)
|
|
169
|
+
|
|
170
|
+
@_builtins.property
|
|
171
|
+
@pulumi.getter(name="allowedRoles")
|
|
172
|
+
def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
173
|
+
"""
|
|
174
|
+
A list of roles that are allowed to use this
|
|
175
|
+
connection.
|
|
176
|
+
"""
|
|
177
|
+
return pulumi.get(self, "allowed_roles")
|
|
178
|
+
|
|
179
|
+
@allowed_roles.setter
|
|
180
|
+
def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
181
|
+
pulumi.set(self, "allowed_roles", value)
|
|
182
|
+
|
|
183
|
+
@_builtins.property
|
|
184
|
+
@pulumi.getter
|
|
185
|
+
def cassandra(self) -> Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']]:
|
|
186
|
+
"""
|
|
187
|
+
A nested block containing configuration options for Cassandra connections.
|
|
188
|
+
"""
|
|
189
|
+
return pulumi.get(self, "cassandra")
|
|
190
|
+
|
|
191
|
+
@cassandra.setter
|
|
192
|
+
def cassandra(self, value: Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']]):
|
|
193
|
+
pulumi.set(self, "cassandra", value)
|
|
194
|
+
|
|
195
|
+
@_builtins.property
|
|
196
|
+
@pulumi.getter
|
|
197
|
+
def couchbase(self) -> Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']]:
|
|
198
|
+
"""
|
|
199
|
+
A nested block containing configuration options for Couchbase connections.
|
|
200
|
+
"""
|
|
201
|
+
return pulumi.get(self, "couchbase")
|
|
202
|
+
|
|
203
|
+
@couchbase.setter
|
|
204
|
+
def couchbase(self, value: Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']]):
|
|
205
|
+
pulumi.set(self, "couchbase", value)
|
|
206
|
+
|
|
207
|
+
@_builtins.property
|
|
208
|
+
@pulumi.getter
|
|
209
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
|
210
|
+
"""
|
|
211
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
|
212
|
+
"""
|
|
213
|
+
return pulumi.get(self, "data")
|
|
214
|
+
|
|
215
|
+
@data.setter
|
|
216
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
|
217
|
+
pulumi.set(self, "data", value)
|
|
218
|
+
|
|
219
|
+
@_builtins.property
|
|
220
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
|
221
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
222
|
+
"""
|
|
223
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
|
224
|
+
"""
|
|
225
|
+
return pulumi.get(self, "disable_automated_rotation")
|
|
226
|
+
|
|
227
|
+
@disable_automated_rotation.setter
|
|
228
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
229
|
+
pulumi.set(self, "disable_automated_rotation", value)
|
|
230
|
+
|
|
231
|
+
@_builtins.property
|
|
232
|
+
@pulumi.getter
|
|
233
|
+
def elasticsearch(self) -> Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']]:
|
|
234
|
+
"""
|
|
235
|
+
A nested block containing configuration options for Elasticsearch connections.
|
|
236
|
+
"""
|
|
237
|
+
return pulumi.get(self, "elasticsearch")
|
|
238
|
+
|
|
239
|
+
@elasticsearch.setter
|
|
240
|
+
def elasticsearch(self, value: Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']]):
|
|
241
|
+
pulumi.set(self, "elasticsearch", value)
|
|
242
|
+
|
|
243
|
+
@_builtins.property
|
|
244
|
+
@pulumi.getter
|
|
245
|
+
def hana(self) -> Optional[pulumi.Input['SecretBackendConnectionHanaArgs']]:
|
|
246
|
+
"""
|
|
247
|
+
A nested block containing configuration options for SAP HanaDB connections.
|
|
248
|
+
"""
|
|
249
|
+
return pulumi.get(self, "hana")
|
|
250
|
+
|
|
251
|
+
@hana.setter
|
|
252
|
+
def hana(self, value: Optional[pulumi.Input['SecretBackendConnectionHanaArgs']]):
|
|
253
|
+
pulumi.set(self, "hana", value)
|
|
254
|
+
|
|
255
|
+
@_builtins.property
|
|
256
|
+
@pulumi.getter
|
|
257
|
+
def influxdb(self) -> Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']]:
|
|
258
|
+
"""
|
|
259
|
+
A nested block containing configuration options for InfluxDB connections.
|
|
260
|
+
"""
|
|
261
|
+
return pulumi.get(self, "influxdb")
|
|
262
|
+
|
|
263
|
+
@influxdb.setter
|
|
264
|
+
def influxdb(self, value: Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']]):
|
|
265
|
+
pulumi.set(self, "influxdb", value)
|
|
266
|
+
|
|
267
|
+
@_builtins.property
|
|
268
|
+
@pulumi.getter
|
|
269
|
+
def mongodb(self) -> Optional[pulumi.Input['SecretBackendConnectionMongodbArgs']]:
|
|
270
|
+
"""
|
|
271
|
+
A nested block containing configuration options for MongoDB connections.
|
|
272
|
+
"""
|
|
273
|
+
return pulumi.get(self, "mongodb")
|
|
274
|
+
|
|
275
|
+
@mongodb.setter
|
|
276
|
+
def mongodb(self, value: Optional[pulumi.Input['SecretBackendConnectionMongodbArgs']]):
|
|
277
|
+
pulumi.set(self, "mongodb", value)
|
|
278
|
+
|
|
279
|
+
@_builtins.property
|
|
280
|
+
@pulumi.getter
|
|
281
|
+
def mongodbatlas(self) -> Optional[pulumi.Input['SecretBackendConnectionMongodbatlasArgs']]:
|
|
282
|
+
"""
|
|
283
|
+
A nested block containing configuration options for MongoDB Atlas connections.
|
|
284
|
+
"""
|
|
285
|
+
return pulumi.get(self, "mongodbatlas")
|
|
286
|
+
|
|
287
|
+
@mongodbatlas.setter
|
|
288
|
+
def mongodbatlas(self, value: Optional[pulumi.Input['SecretBackendConnectionMongodbatlasArgs']]):
|
|
289
|
+
pulumi.set(self, "mongodbatlas", value)
|
|
290
|
+
|
|
291
|
+
@_builtins.property
|
|
292
|
+
@pulumi.getter
|
|
293
|
+
def mssql(self) -> Optional[pulumi.Input['SecretBackendConnectionMssqlArgs']]:
|
|
294
|
+
"""
|
|
295
|
+
A nested block containing configuration options for MSSQL connections.
|
|
296
|
+
"""
|
|
297
|
+
return pulumi.get(self, "mssql")
|
|
298
|
+
|
|
299
|
+
@mssql.setter
|
|
300
|
+
def mssql(self, value: Optional[pulumi.Input['SecretBackendConnectionMssqlArgs']]):
|
|
301
|
+
pulumi.set(self, "mssql", value)
|
|
302
|
+
|
|
303
|
+
@_builtins.property
|
|
304
|
+
@pulumi.getter
|
|
305
|
+
def mysql(self) -> Optional[pulumi.Input['SecretBackendConnectionMysqlArgs']]:
|
|
306
|
+
"""
|
|
307
|
+
A nested block containing configuration options for MySQL connections.
|
|
308
|
+
"""
|
|
309
|
+
return pulumi.get(self, "mysql")
|
|
310
|
+
|
|
311
|
+
@mysql.setter
|
|
312
|
+
def mysql(self, value: Optional[pulumi.Input['SecretBackendConnectionMysqlArgs']]):
|
|
313
|
+
pulumi.set(self, "mysql", value)
|
|
314
|
+
|
|
315
|
+
@_builtins.property
|
|
316
|
+
@pulumi.getter(name="mysqlAurora")
|
|
317
|
+
def mysql_aurora(self) -> Optional[pulumi.Input['SecretBackendConnectionMysqlAuroraArgs']]:
|
|
318
|
+
"""
|
|
319
|
+
A nested block containing configuration options for Aurora MySQL connections.
|
|
320
|
+
"""
|
|
321
|
+
return pulumi.get(self, "mysql_aurora")
|
|
322
|
+
|
|
323
|
+
@mysql_aurora.setter
|
|
324
|
+
def mysql_aurora(self, value: Optional[pulumi.Input['SecretBackendConnectionMysqlAuroraArgs']]):
|
|
325
|
+
pulumi.set(self, "mysql_aurora", value)
|
|
326
|
+
|
|
327
|
+
@_builtins.property
|
|
328
|
+
@pulumi.getter(name="mysqlLegacy")
|
|
329
|
+
def mysql_legacy(self) -> Optional[pulumi.Input['SecretBackendConnectionMysqlLegacyArgs']]:
|
|
330
|
+
"""
|
|
331
|
+
A nested block containing configuration options for legacy MySQL connections.
|
|
332
|
+
"""
|
|
333
|
+
return pulumi.get(self, "mysql_legacy")
|
|
334
|
+
|
|
335
|
+
@mysql_legacy.setter
|
|
336
|
+
def mysql_legacy(self, value: Optional[pulumi.Input['SecretBackendConnectionMysqlLegacyArgs']]):
|
|
337
|
+
pulumi.set(self, "mysql_legacy", value)
|
|
338
|
+
|
|
339
|
+
@_builtins.property
|
|
340
|
+
@pulumi.getter(name="mysqlRds")
|
|
341
|
+
def mysql_rds(self) -> Optional[pulumi.Input['SecretBackendConnectionMysqlRdsArgs']]:
|
|
342
|
+
"""
|
|
343
|
+
A nested block containing configuration options for RDS MySQL connections.
|
|
344
|
+
"""
|
|
345
|
+
return pulumi.get(self, "mysql_rds")
|
|
346
|
+
|
|
347
|
+
@mysql_rds.setter
|
|
348
|
+
def mysql_rds(self, value: Optional[pulumi.Input['SecretBackendConnectionMysqlRdsArgs']]):
|
|
349
|
+
pulumi.set(self, "mysql_rds", value)
|
|
350
|
+
|
|
351
|
+
@_builtins.property
|
|
352
|
+
@pulumi.getter
|
|
353
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
354
|
+
"""
|
|
355
|
+
A unique name to give the database connection.
|
|
356
|
+
"""
|
|
357
|
+
return pulumi.get(self, "name")
|
|
358
|
+
|
|
359
|
+
@name.setter
|
|
360
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
361
|
+
pulumi.set(self, "name", value)
|
|
362
|
+
|
|
363
|
+
@_builtins.property
|
|
364
|
+
@pulumi.getter
|
|
365
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
366
|
+
"""
|
|
367
|
+
The namespace to provision the resource in.
|
|
368
|
+
The value should not contain leading or trailing forward slashes.
|
|
369
|
+
The `namespace` is always relative to the provider's configured namespace.
|
|
370
|
+
*Available only for Vault Enterprise*.
|
|
371
|
+
"""
|
|
372
|
+
return pulumi.get(self, "namespace")
|
|
373
|
+
|
|
374
|
+
@namespace.setter
|
|
375
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
376
|
+
pulumi.set(self, "namespace", value)
|
|
377
|
+
|
|
378
|
+
@_builtins.property
|
|
379
|
+
@pulumi.getter
|
|
380
|
+
def oracle(self) -> Optional[pulumi.Input['SecretBackendConnectionOracleArgs']]:
|
|
381
|
+
"""
|
|
382
|
+
A nested block containing configuration options for Oracle connections.
|
|
383
|
+
"""
|
|
384
|
+
return pulumi.get(self, "oracle")
|
|
385
|
+
|
|
386
|
+
@oracle.setter
|
|
387
|
+
def oracle(self, value: Optional[pulumi.Input['SecretBackendConnectionOracleArgs']]):
|
|
388
|
+
pulumi.set(self, "oracle", value)
|
|
389
|
+
|
|
390
|
+
@_builtins.property
|
|
391
|
+
@pulumi.getter(name="pluginName")
|
|
392
|
+
def plugin_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
393
|
+
"""
|
|
394
|
+
Specifies the name of the plugin to use.
|
|
395
|
+
"""
|
|
396
|
+
return pulumi.get(self, "plugin_name")
|
|
397
|
+
|
|
398
|
+
@plugin_name.setter
|
|
399
|
+
def plugin_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
400
|
+
pulumi.set(self, "plugin_name", value)
|
|
401
|
+
|
|
402
|
+
@_builtins.property
|
|
403
|
+
@pulumi.getter
|
|
404
|
+
def postgresql(self) -> Optional[pulumi.Input['SecretBackendConnectionPostgresqlArgs']]:
|
|
405
|
+
"""
|
|
406
|
+
A nested block containing configuration options for PostgreSQL connections.
|
|
407
|
+
"""
|
|
408
|
+
return pulumi.get(self, "postgresql")
|
|
409
|
+
|
|
410
|
+
@postgresql.setter
|
|
411
|
+
def postgresql(self, value: Optional[pulumi.Input['SecretBackendConnectionPostgresqlArgs']]):
|
|
412
|
+
pulumi.set(self, "postgresql", value)
|
|
413
|
+
|
|
414
|
+
@_builtins.property
|
|
415
|
+
@pulumi.getter
|
|
416
|
+
def redis(self) -> Optional[pulumi.Input['SecretBackendConnectionRedisArgs']]:
|
|
417
|
+
"""
|
|
418
|
+
A nested block containing configuration options for Redis connections.
|
|
419
|
+
"""
|
|
420
|
+
return pulumi.get(self, "redis")
|
|
421
|
+
|
|
422
|
+
@redis.setter
|
|
423
|
+
def redis(self, value: Optional[pulumi.Input['SecretBackendConnectionRedisArgs']]):
|
|
424
|
+
pulumi.set(self, "redis", value)
|
|
425
|
+
|
|
426
|
+
@_builtins.property
|
|
427
|
+
@pulumi.getter(name="redisElasticache")
|
|
428
|
+
def redis_elasticache(self) -> Optional[pulumi.Input['SecretBackendConnectionRedisElasticacheArgs']]:
|
|
429
|
+
"""
|
|
430
|
+
A nested block containing configuration options for Redis ElastiCache connections.
|
|
431
|
+
|
|
432
|
+
Exactly one of the nested blocks of configuration options must be supplied.
|
|
433
|
+
"""
|
|
434
|
+
return pulumi.get(self, "redis_elasticache")
|
|
435
|
+
|
|
436
|
+
@redis_elasticache.setter
|
|
437
|
+
def redis_elasticache(self, value: Optional[pulumi.Input['SecretBackendConnectionRedisElasticacheArgs']]):
|
|
438
|
+
pulumi.set(self, "redis_elasticache", value)
|
|
439
|
+
|
|
440
|
+
@_builtins.property
|
|
441
|
+
@pulumi.getter
|
|
442
|
+
def redshift(self) -> Optional[pulumi.Input['SecretBackendConnectionRedshiftArgs']]:
|
|
443
|
+
"""
|
|
444
|
+
Connection parameters for the redshift-database-plugin plugin.
|
|
445
|
+
"""
|
|
446
|
+
return pulumi.get(self, "redshift")
|
|
447
|
+
|
|
448
|
+
@redshift.setter
|
|
449
|
+
def redshift(self, value: Optional[pulumi.Input['SecretBackendConnectionRedshiftArgs']]):
|
|
450
|
+
pulumi.set(self, "redshift", value)
|
|
451
|
+
|
|
452
|
+
@_builtins.property
|
|
453
|
+
@pulumi.getter(name="rootRotationStatements")
|
|
454
|
+
def root_rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
455
|
+
"""
|
|
456
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
|
457
|
+
"""
|
|
458
|
+
return pulumi.get(self, "root_rotation_statements")
|
|
459
|
+
|
|
460
|
+
@root_rotation_statements.setter
|
|
461
|
+
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
462
|
+
pulumi.set(self, "root_rotation_statements", value)
|
|
463
|
+
|
|
464
|
+
@_builtins.property
|
|
465
|
+
@pulumi.getter(name="rotationPeriod")
|
|
466
|
+
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
467
|
+
"""
|
|
468
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
|
469
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
|
470
|
+
"""
|
|
471
|
+
return pulumi.get(self, "rotation_period")
|
|
472
|
+
|
|
473
|
+
@rotation_period.setter
|
|
474
|
+
def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
475
|
+
pulumi.set(self, "rotation_period", value)
|
|
476
|
+
|
|
477
|
+
@_builtins.property
|
|
478
|
+
@pulumi.getter(name="rotationSchedule")
|
|
479
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
480
|
+
"""
|
|
481
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
|
482
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
|
483
|
+
"""
|
|
484
|
+
return pulumi.get(self, "rotation_schedule")
|
|
485
|
+
|
|
486
|
+
@rotation_schedule.setter
|
|
487
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
488
|
+
pulumi.set(self, "rotation_schedule", value)
|
|
489
|
+
|
|
490
|
+
@_builtins.property
|
|
491
|
+
@pulumi.getter(name="rotationWindow")
|
|
492
|
+
def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
493
|
+
"""
|
|
494
|
+
The maximum amount of time in seconds allowed to complete
|
|
495
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
|
496
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
|
497
|
+
"""
|
|
498
|
+
return pulumi.get(self, "rotation_window")
|
|
499
|
+
|
|
500
|
+
@rotation_window.setter
|
|
501
|
+
def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
502
|
+
pulumi.set(self, "rotation_window", value)
|
|
503
|
+
|
|
504
|
+
@_builtins.property
|
|
505
|
+
@pulumi.getter
|
|
506
|
+
def snowflake(self) -> Optional[pulumi.Input['SecretBackendConnectionSnowflakeArgs']]:
|
|
507
|
+
"""
|
|
508
|
+
A nested block containing configuration options for Snowflake connections.
|
|
509
|
+
"""
|
|
510
|
+
return pulumi.get(self, "snowflake")
|
|
511
|
+
|
|
512
|
+
@snowflake.setter
|
|
513
|
+
def snowflake(self, value: Optional[pulumi.Input['SecretBackendConnectionSnowflakeArgs']]):
|
|
514
|
+
pulumi.set(self, "snowflake", value)
|
|
515
|
+
|
|
516
|
+
@_builtins.property
|
|
517
|
+
@pulumi.getter(name="verifyConnection")
|
|
518
|
+
def verify_connection(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
519
|
+
"""
|
|
520
|
+
Whether the connection should be verified on
|
|
521
|
+
initial configuration or not.
|
|
522
|
+
"""
|
|
523
|
+
return pulumi.get(self, "verify_connection")
|
|
524
|
+
|
|
525
|
+
@verify_connection.setter
|
|
526
|
+
def verify_connection(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
527
|
+
pulumi.set(self, "verify_connection", value)
|
|
528
|
+
|
|
529
|
+
|
|
530
|
+
@pulumi.input_type
|
|
531
|
+
class _SecretBackendConnectionState:
|
|
532
|
+
def __init__(__self__, *,
|
|
533
|
+
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
534
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
535
|
+
cassandra: Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']] = None,
|
|
536
|
+
couchbase: Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']] = None,
|
|
537
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
538
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
539
|
+
elasticsearch: Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']] = None,
|
|
540
|
+
hana: Optional[pulumi.Input['SecretBackendConnectionHanaArgs']] = None,
|
|
541
|
+
influxdb: Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']] = None,
|
|
542
|
+
mongodb: Optional[pulumi.Input['SecretBackendConnectionMongodbArgs']] = None,
|
|
543
|
+
mongodbatlas: Optional[pulumi.Input['SecretBackendConnectionMongodbatlasArgs']] = None,
|
|
544
|
+
mssql: Optional[pulumi.Input['SecretBackendConnectionMssqlArgs']] = None,
|
|
545
|
+
mysql: Optional[pulumi.Input['SecretBackendConnectionMysqlArgs']] = None,
|
|
546
|
+
mysql_aurora: Optional[pulumi.Input['SecretBackendConnectionMysqlAuroraArgs']] = None,
|
|
547
|
+
mysql_legacy: Optional[pulumi.Input['SecretBackendConnectionMysqlLegacyArgs']] = None,
|
|
548
|
+
mysql_rds: Optional[pulumi.Input['SecretBackendConnectionMysqlRdsArgs']] = None,
|
|
549
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
550
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
551
|
+
oracle: Optional[pulumi.Input['SecretBackendConnectionOracleArgs']] = None,
|
|
552
|
+
plugin_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
553
|
+
postgresql: Optional[pulumi.Input['SecretBackendConnectionPostgresqlArgs']] = None,
|
|
554
|
+
redis: Optional[pulumi.Input['SecretBackendConnectionRedisArgs']] = None,
|
|
555
|
+
redis_elasticache: Optional[pulumi.Input['SecretBackendConnectionRedisElasticacheArgs']] = None,
|
|
556
|
+
redshift: Optional[pulumi.Input['SecretBackendConnectionRedshiftArgs']] = None,
|
|
557
|
+
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
558
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
559
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
|
560
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
|
561
|
+
snowflake: Optional[pulumi.Input['SecretBackendConnectionSnowflakeArgs']] = None,
|
|
562
|
+
verify_connection: Optional[pulumi.Input[_builtins.bool]] = None):
|
|
563
|
+
"""
|
|
564
|
+
Input properties used for looking up and filtering SecretBackendConnection resources.
|
|
565
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_roles: A list of roles that are allowed to use this
|
|
566
|
+
connection.
|
|
567
|
+
:param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
|
|
568
|
+
:param pulumi.Input['SecretBackendConnectionCassandraArgs'] cassandra: A nested block containing configuration options for Cassandra connections.
|
|
569
|
+
:param pulumi.Input['SecretBackendConnectionCouchbaseArgs'] couchbase: A nested block containing configuration options for Couchbase connections.
|
|
570
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
|
571
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
|
572
|
+
:param pulumi.Input['SecretBackendConnectionElasticsearchArgs'] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
|
|
573
|
+
:param pulumi.Input['SecretBackendConnectionHanaArgs'] hana: A nested block containing configuration options for SAP HanaDB connections.
|
|
574
|
+
:param pulumi.Input['SecretBackendConnectionInfluxdbArgs'] influxdb: A nested block containing configuration options for InfluxDB connections.
|
|
575
|
+
:param pulumi.Input['SecretBackendConnectionMongodbArgs'] mongodb: A nested block containing configuration options for MongoDB connections.
|
|
576
|
+
:param pulumi.Input['SecretBackendConnectionMongodbatlasArgs'] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
|
|
577
|
+
:param pulumi.Input['SecretBackendConnectionMssqlArgs'] mssql: A nested block containing configuration options for MSSQL connections.
|
|
578
|
+
:param pulumi.Input['SecretBackendConnectionMysqlArgs'] mysql: A nested block containing configuration options for MySQL connections.
|
|
579
|
+
:param pulumi.Input['SecretBackendConnectionMysqlAuroraArgs'] mysql_aurora: A nested block containing configuration options for Aurora MySQL connections.
|
|
580
|
+
:param pulumi.Input['SecretBackendConnectionMysqlLegacyArgs'] mysql_legacy: A nested block containing configuration options for legacy MySQL connections.
|
|
581
|
+
:param pulumi.Input['SecretBackendConnectionMysqlRdsArgs'] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
|
|
582
|
+
:param pulumi.Input[_builtins.str] name: A unique name to give the database connection.
|
|
583
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
584
|
+
The value should not contain leading or trailing forward slashes.
|
|
585
|
+
The `namespace` is always relative to the provider's configured namespace.
|
|
586
|
+
*Available only for Vault Enterprise*.
|
|
587
|
+
:param pulumi.Input['SecretBackendConnectionOracleArgs'] oracle: A nested block containing configuration options for Oracle connections.
|
|
588
|
+
:param pulumi.Input[_builtins.str] plugin_name: Specifies the name of the plugin to use.
|
|
589
|
+
:param pulumi.Input['SecretBackendConnectionPostgresqlArgs'] postgresql: A nested block containing configuration options for PostgreSQL connections.
|
|
590
|
+
:param pulumi.Input['SecretBackendConnectionRedisArgs'] redis: A nested block containing configuration options for Redis connections.
|
|
591
|
+
:param pulumi.Input['SecretBackendConnectionRedisElasticacheArgs'] redis_elasticache: A nested block containing configuration options for Redis ElastiCache connections.
|
|
592
|
+
|
|
593
|
+
Exactly one of the nested blocks of configuration options must be supplied.
|
|
594
|
+
:param pulumi.Input['SecretBackendConnectionRedshiftArgs'] redshift: Connection parameters for the redshift-database-plugin plugin.
|
|
595
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
|
596
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
|
597
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
|
598
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
|
599
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
|
600
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
|
601
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
|
602
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
|
603
|
+
:param pulumi.Input['SecretBackendConnectionSnowflakeArgs'] snowflake: A nested block containing configuration options for Snowflake connections.
|
|
604
|
+
:param pulumi.Input[_builtins.bool] verify_connection: Whether the connection should be verified on
|
|
605
|
+
initial configuration or not.
|
|
606
|
+
"""
|
|
607
|
+
if allowed_roles is not None:
|
|
608
|
+
pulumi.set(__self__, "allowed_roles", allowed_roles)
|
|
609
|
+
if backend is not None:
|
|
610
|
+
pulumi.set(__self__, "backend", backend)
|
|
611
|
+
if cassandra is not None:
|
|
612
|
+
pulumi.set(__self__, "cassandra", cassandra)
|
|
613
|
+
if couchbase is not None:
|
|
614
|
+
pulumi.set(__self__, "couchbase", couchbase)
|
|
615
|
+
if data is not None:
|
|
616
|
+
pulumi.set(__self__, "data", data)
|
|
617
|
+
if disable_automated_rotation is not None:
|
|
618
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
|
619
|
+
if elasticsearch is not None:
|
|
620
|
+
pulumi.set(__self__, "elasticsearch", elasticsearch)
|
|
621
|
+
if hana is not None:
|
|
622
|
+
pulumi.set(__self__, "hana", hana)
|
|
623
|
+
if influxdb is not None:
|
|
624
|
+
pulumi.set(__self__, "influxdb", influxdb)
|
|
625
|
+
if mongodb is not None:
|
|
626
|
+
pulumi.set(__self__, "mongodb", mongodb)
|
|
627
|
+
if mongodbatlas is not None:
|
|
628
|
+
pulumi.set(__self__, "mongodbatlas", mongodbatlas)
|
|
629
|
+
if mssql is not None:
|
|
630
|
+
pulumi.set(__self__, "mssql", mssql)
|
|
631
|
+
if mysql is not None:
|
|
632
|
+
pulumi.set(__self__, "mysql", mysql)
|
|
633
|
+
if mysql_aurora is not None:
|
|
634
|
+
pulumi.set(__self__, "mysql_aurora", mysql_aurora)
|
|
635
|
+
if mysql_legacy is not None:
|
|
636
|
+
pulumi.set(__self__, "mysql_legacy", mysql_legacy)
|
|
637
|
+
if mysql_rds is not None:
|
|
638
|
+
pulumi.set(__self__, "mysql_rds", mysql_rds)
|
|
639
|
+
if name is not None:
|
|
640
|
+
pulumi.set(__self__, "name", name)
|
|
641
|
+
if namespace is not None:
|
|
642
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
643
|
+
if oracle is not None:
|
|
644
|
+
pulumi.set(__self__, "oracle", oracle)
|
|
645
|
+
if plugin_name is not None:
|
|
646
|
+
pulumi.set(__self__, "plugin_name", plugin_name)
|
|
647
|
+
if postgresql is not None:
|
|
648
|
+
pulumi.set(__self__, "postgresql", postgresql)
|
|
649
|
+
if redis is not None:
|
|
650
|
+
pulumi.set(__self__, "redis", redis)
|
|
651
|
+
if redis_elasticache is not None:
|
|
652
|
+
pulumi.set(__self__, "redis_elasticache", redis_elasticache)
|
|
653
|
+
if redshift is not None:
|
|
654
|
+
pulumi.set(__self__, "redshift", redshift)
|
|
655
|
+
if root_rotation_statements is not None:
|
|
656
|
+
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
|
657
|
+
if rotation_period is not None:
|
|
658
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
|
659
|
+
if rotation_schedule is not None:
|
|
660
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
|
661
|
+
if rotation_window is not None:
|
|
662
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
|
663
|
+
if snowflake is not None:
|
|
664
|
+
pulumi.set(__self__, "snowflake", snowflake)
|
|
665
|
+
if verify_connection is not None:
|
|
666
|
+
pulumi.set(__self__, "verify_connection", verify_connection)
|
|
667
|
+
|
|
668
|
+
@_builtins.property
|
|
669
|
+
@pulumi.getter(name="allowedRoles")
|
|
670
|
+
def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
671
|
+
"""
|
|
672
|
+
A list of roles that are allowed to use this
|
|
673
|
+
connection.
|
|
674
|
+
"""
|
|
675
|
+
return pulumi.get(self, "allowed_roles")
|
|
676
|
+
|
|
677
|
+
@allowed_roles.setter
|
|
678
|
+
def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
679
|
+
pulumi.set(self, "allowed_roles", value)
|
|
680
|
+
|
|
681
|
+
@_builtins.property
|
|
682
|
+
@pulumi.getter
|
|
683
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
684
|
+
"""
|
|
685
|
+
The unique name of the Vault mount to configure.
|
|
686
|
+
"""
|
|
687
|
+
return pulumi.get(self, "backend")
|
|
688
|
+
|
|
689
|
+
@backend.setter
|
|
690
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
691
|
+
pulumi.set(self, "backend", value)
|
|
692
|
+
|
|
693
|
+
@_builtins.property
|
|
694
|
+
@pulumi.getter
|
|
695
|
+
def cassandra(self) -> Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']]:
|
|
696
|
+
"""
|
|
697
|
+
A nested block containing configuration options for Cassandra connections.
|
|
698
|
+
"""
|
|
699
|
+
return pulumi.get(self, "cassandra")
|
|
700
|
+
|
|
701
|
+
@cassandra.setter
|
|
702
|
+
def cassandra(self, value: Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']]):
|
|
703
|
+
pulumi.set(self, "cassandra", value)
|
|
704
|
+
|
|
705
|
+
@_builtins.property
|
|
706
|
+
@pulumi.getter
|
|
707
|
+
def couchbase(self) -> Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']]:
|
|
708
|
+
"""
|
|
709
|
+
A nested block containing configuration options for Couchbase connections.
|
|
710
|
+
"""
|
|
711
|
+
return pulumi.get(self, "couchbase")
|
|
712
|
+
|
|
713
|
+
@couchbase.setter
|
|
714
|
+
def couchbase(self, value: Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']]):
|
|
715
|
+
pulumi.set(self, "couchbase", value)
|
|
716
|
+
|
|
717
|
+
@_builtins.property
|
|
718
|
+
@pulumi.getter
|
|
719
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
|
720
|
+
"""
|
|
721
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
|
722
|
+
"""
|
|
723
|
+
return pulumi.get(self, "data")
|
|
724
|
+
|
|
725
|
+
@data.setter
|
|
726
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
|
727
|
+
pulumi.set(self, "data", value)
|
|
728
|
+
|
|
729
|
+
@_builtins.property
|
|
730
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
|
731
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
732
|
+
"""
|
|
733
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
|
734
|
+
"""
|
|
735
|
+
return pulumi.get(self, "disable_automated_rotation")
|
|
736
|
+
|
|
737
|
+
@disable_automated_rotation.setter
|
|
738
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
739
|
+
pulumi.set(self, "disable_automated_rotation", value)
|
|
740
|
+
|
|
741
|
+
@_builtins.property
|
|
742
|
+
@pulumi.getter
|
|
743
|
+
def elasticsearch(self) -> Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']]:
|
|
744
|
+
"""
|
|
745
|
+
A nested block containing configuration options for Elasticsearch connections.
|
|
746
|
+
"""
|
|
747
|
+
return pulumi.get(self, "elasticsearch")
|
|
748
|
+
|
|
749
|
+
@elasticsearch.setter
|
|
750
|
+
def elasticsearch(self, value: Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']]):
|
|
751
|
+
pulumi.set(self, "elasticsearch", value)
|
|
752
|
+
|
|
753
|
+
@_builtins.property
|
|
754
|
+
@pulumi.getter
|
|
755
|
+
def hana(self) -> Optional[pulumi.Input['SecretBackendConnectionHanaArgs']]:
|
|
756
|
+
"""
|
|
757
|
+
A nested block containing configuration options for SAP HanaDB connections.
|
|
758
|
+
"""
|
|
759
|
+
return pulumi.get(self, "hana")
|
|
760
|
+
|
|
761
|
+
@hana.setter
|
|
762
|
+
def hana(self, value: Optional[pulumi.Input['SecretBackendConnectionHanaArgs']]):
|
|
763
|
+
pulumi.set(self, "hana", value)
|
|
764
|
+
|
|
765
|
+
@_builtins.property
|
|
766
|
+
@pulumi.getter
|
|
767
|
+
def influxdb(self) -> Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']]:
|
|
768
|
+
"""
|
|
769
|
+
A nested block containing configuration options for InfluxDB connections.
|
|
770
|
+
"""
|
|
771
|
+
return pulumi.get(self, "influxdb")
|
|
772
|
+
|
|
773
|
+
@influxdb.setter
|
|
774
|
+
def influxdb(self, value: Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']]):
|
|
775
|
+
pulumi.set(self, "influxdb", value)
|
|
776
|
+
|
|
777
|
+
@_builtins.property
|
|
778
|
+
@pulumi.getter
|
|
779
|
+
def mongodb(self) -> Optional[pulumi.Input['SecretBackendConnectionMongodbArgs']]:
|
|
780
|
+
"""
|
|
781
|
+
A nested block containing configuration options for MongoDB connections.
|
|
782
|
+
"""
|
|
783
|
+
return pulumi.get(self, "mongodb")
|
|
784
|
+
|
|
785
|
+
@mongodb.setter
|
|
786
|
+
def mongodb(self, value: Optional[pulumi.Input['SecretBackendConnectionMongodbArgs']]):
|
|
787
|
+
pulumi.set(self, "mongodb", value)
|
|
788
|
+
|
|
789
|
+
@_builtins.property
|
|
790
|
+
@pulumi.getter
|
|
791
|
+
def mongodbatlas(self) -> Optional[pulumi.Input['SecretBackendConnectionMongodbatlasArgs']]:
|
|
792
|
+
"""
|
|
793
|
+
A nested block containing configuration options for MongoDB Atlas connections.
|
|
794
|
+
"""
|
|
795
|
+
return pulumi.get(self, "mongodbatlas")
|
|
796
|
+
|
|
797
|
+
@mongodbatlas.setter
|
|
798
|
+
def mongodbatlas(self, value: Optional[pulumi.Input['SecretBackendConnectionMongodbatlasArgs']]):
|
|
799
|
+
pulumi.set(self, "mongodbatlas", value)
|
|
800
|
+
|
|
801
|
+
@_builtins.property
|
|
802
|
+
@pulumi.getter
|
|
803
|
+
def mssql(self) -> Optional[pulumi.Input['SecretBackendConnectionMssqlArgs']]:
|
|
804
|
+
"""
|
|
805
|
+
A nested block containing configuration options for MSSQL connections.
|
|
806
|
+
"""
|
|
807
|
+
return pulumi.get(self, "mssql")
|
|
808
|
+
|
|
809
|
+
@mssql.setter
|
|
810
|
+
def mssql(self, value: Optional[pulumi.Input['SecretBackendConnectionMssqlArgs']]):
|
|
811
|
+
pulumi.set(self, "mssql", value)
|
|
812
|
+
|
|
813
|
+
@_builtins.property
|
|
814
|
+
@pulumi.getter
|
|
815
|
+
def mysql(self) -> Optional[pulumi.Input['SecretBackendConnectionMysqlArgs']]:
|
|
816
|
+
"""
|
|
817
|
+
A nested block containing configuration options for MySQL connections.
|
|
818
|
+
"""
|
|
819
|
+
return pulumi.get(self, "mysql")
|
|
820
|
+
|
|
821
|
+
@mysql.setter
|
|
822
|
+
def mysql(self, value: Optional[pulumi.Input['SecretBackendConnectionMysqlArgs']]):
|
|
823
|
+
pulumi.set(self, "mysql", value)
|
|
824
|
+
|
|
825
|
+
@_builtins.property
|
|
826
|
+
@pulumi.getter(name="mysqlAurora")
|
|
827
|
+
def mysql_aurora(self) -> Optional[pulumi.Input['SecretBackendConnectionMysqlAuroraArgs']]:
|
|
828
|
+
"""
|
|
829
|
+
A nested block containing configuration options for Aurora MySQL connections.
|
|
830
|
+
"""
|
|
831
|
+
return pulumi.get(self, "mysql_aurora")
|
|
832
|
+
|
|
833
|
+
@mysql_aurora.setter
|
|
834
|
+
def mysql_aurora(self, value: Optional[pulumi.Input['SecretBackendConnectionMysqlAuroraArgs']]):
|
|
835
|
+
pulumi.set(self, "mysql_aurora", value)
|
|
836
|
+
|
|
837
|
+
@_builtins.property
|
|
838
|
+
@pulumi.getter(name="mysqlLegacy")
|
|
839
|
+
def mysql_legacy(self) -> Optional[pulumi.Input['SecretBackendConnectionMysqlLegacyArgs']]:
|
|
840
|
+
"""
|
|
841
|
+
A nested block containing configuration options for legacy MySQL connections.
|
|
842
|
+
"""
|
|
843
|
+
return pulumi.get(self, "mysql_legacy")
|
|
844
|
+
|
|
845
|
+
@mysql_legacy.setter
|
|
846
|
+
def mysql_legacy(self, value: Optional[pulumi.Input['SecretBackendConnectionMysqlLegacyArgs']]):
|
|
847
|
+
pulumi.set(self, "mysql_legacy", value)
|
|
848
|
+
|
|
849
|
+
@_builtins.property
|
|
850
|
+
@pulumi.getter(name="mysqlRds")
|
|
851
|
+
def mysql_rds(self) -> Optional[pulumi.Input['SecretBackendConnectionMysqlRdsArgs']]:
|
|
852
|
+
"""
|
|
853
|
+
A nested block containing configuration options for RDS MySQL connections.
|
|
854
|
+
"""
|
|
855
|
+
return pulumi.get(self, "mysql_rds")
|
|
856
|
+
|
|
857
|
+
@mysql_rds.setter
|
|
858
|
+
def mysql_rds(self, value: Optional[pulumi.Input['SecretBackendConnectionMysqlRdsArgs']]):
|
|
859
|
+
pulumi.set(self, "mysql_rds", value)
|
|
860
|
+
|
|
861
|
+
@_builtins.property
|
|
862
|
+
@pulumi.getter
|
|
863
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
864
|
+
"""
|
|
865
|
+
A unique name to give the database connection.
|
|
866
|
+
"""
|
|
867
|
+
return pulumi.get(self, "name")
|
|
868
|
+
|
|
869
|
+
@name.setter
|
|
870
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
871
|
+
pulumi.set(self, "name", value)
|
|
872
|
+
|
|
873
|
+
@_builtins.property
|
|
874
|
+
@pulumi.getter
|
|
875
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
876
|
+
"""
|
|
877
|
+
The namespace to provision the resource in.
|
|
878
|
+
The value should not contain leading or trailing forward slashes.
|
|
879
|
+
The `namespace` is always relative to the provider's configured namespace.
|
|
880
|
+
*Available only for Vault Enterprise*.
|
|
881
|
+
"""
|
|
882
|
+
return pulumi.get(self, "namespace")
|
|
883
|
+
|
|
884
|
+
@namespace.setter
|
|
885
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
886
|
+
pulumi.set(self, "namespace", value)
|
|
887
|
+
|
|
888
|
+
@_builtins.property
|
|
889
|
+
@pulumi.getter
|
|
890
|
+
def oracle(self) -> Optional[pulumi.Input['SecretBackendConnectionOracleArgs']]:
|
|
891
|
+
"""
|
|
892
|
+
A nested block containing configuration options for Oracle connections.
|
|
893
|
+
"""
|
|
894
|
+
return pulumi.get(self, "oracle")
|
|
895
|
+
|
|
896
|
+
@oracle.setter
|
|
897
|
+
def oracle(self, value: Optional[pulumi.Input['SecretBackendConnectionOracleArgs']]):
|
|
898
|
+
pulumi.set(self, "oracle", value)
|
|
899
|
+
|
|
900
|
+
@_builtins.property
|
|
901
|
+
@pulumi.getter(name="pluginName")
|
|
902
|
+
def plugin_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
903
|
+
"""
|
|
904
|
+
Specifies the name of the plugin to use.
|
|
905
|
+
"""
|
|
906
|
+
return pulumi.get(self, "plugin_name")
|
|
907
|
+
|
|
908
|
+
@plugin_name.setter
|
|
909
|
+
def plugin_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
910
|
+
pulumi.set(self, "plugin_name", value)
|
|
911
|
+
|
|
912
|
+
@_builtins.property
|
|
913
|
+
@pulumi.getter
|
|
914
|
+
def postgresql(self) -> Optional[pulumi.Input['SecretBackendConnectionPostgresqlArgs']]:
|
|
915
|
+
"""
|
|
916
|
+
A nested block containing configuration options for PostgreSQL connections.
|
|
917
|
+
"""
|
|
918
|
+
return pulumi.get(self, "postgresql")
|
|
919
|
+
|
|
920
|
+
@postgresql.setter
|
|
921
|
+
def postgresql(self, value: Optional[pulumi.Input['SecretBackendConnectionPostgresqlArgs']]):
|
|
922
|
+
pulumi.set(self, "postgresql", value)
|
|
923
|
+
|
|
924
|
+
@_builtins.property
|
|
925
|
+
@pulumi.getter
|
|
926
|
+
def redis(self) -> Optional[pulumi.Input['SecretBackendConnectionRedisArgs']]:
|
|
927
|
+
"""
|
|
928
|
+
A nested block containing configuration options for Redis connections.
|
|
929
|
+
"""
|
|
930
|
+
return pulumi.get(self, "redis")
|
|
931
|
+
|
|
932
|
+
@redis.setter
|
|
933
|
+
def redis(self, value: Optional[pulumi.Input['SecretBackendConnectionRedisArgs']]):
|
|
934
|
+
pulumi.set(self, "redis", value)
|
|
935
|
+
|
|
936
|
+
@_builtins.property
|
|
937
|
+
@pulumi.getter(name="redisElasticache")
|
|
938
|
+
def redis_elasticache(self) -> Optional[pulumi.Input['SecretBackendConnectionRedisElasticacheArgs']]:
|
|
939
|
+
"""
|
|
940
|
+
A nested block containing configuration options for Redis ElastiCache connections.
|
|
941
|
+
|
|
942
|
+
Exactly one of the nested blocks of configuration options must be supplied.
|
|
943
|
+
"""
|
|
944
|
+
return pulumi.get(self, "redis_elasticache")
|
|
945
|
+
|
|
946
|
+
@redis_elasticache.setter
|
|
947
|
+
def redis_elasticache(self, value: Optional[pulumi.Input['SecretBackendConnectionRedisElasticacheArgs']]):
|
|
948
|
+
pulumi.set(self, "redis_elasticache", value)
|
|
949
|
+
|
|
950
|
+
@_builtins.property
|
|
951
|
+
@pulumi.getter
|
|
952
|
+
def redshift(self) -> Optional[pulumi.Input['SecretBackendConnectionRedshiftArgs']]:
|
|
953
|
+
"""
|
|
954
|
+
Connection parameters for the redshift-database-plugin plugin.
|
|
955
|
+
"""
|
|
956
|
+
return pulumi.get(self, "redshift")
|
|
957
|
+
|
|
958
|
+
@redshift.setter
|
|
959
|
+
def redshift(self, value: Optional[pulumi.Input['SecretBackendConnectionRedshiftArgs']]):
|
|
960
|
+
pulumi.set(self, "redshift", value)
|
|
961
|
+
|
|
962
|
+
@_builtins.property
|
|
963
|
+
@pulumi.getter(name="rootRotationStatements")
|
|
964
|
+
def root_rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
965
|
+
"""
|
|
966
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
|
967
|
+
"""
|
|
968
|
+
return pulumi.get(self, "root_rotation_statements")
|
|
969
|
+
|
|
970
|
+
@root_rotation_statements.setter
|
|
971
|
+
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
972
|
+
pulumi.set(self, "root_rotation_statements", value)
|
|
973
|
+
|
|
974
|
+
@_builtins.property
|
|
975
|
+
@pulumi.getter(name="rotationPeriod")
|
|
976
|
+
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
977
|
+
"""
|
|
978
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
|
979
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
|
980
|
+
"""
|
|
981
|
+
return pulumi.get(self, "rotation_period")
|
|
982
|
+
|
|
983
|
+
@rotation_period.setter
|
|
984
|
+
def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
985
|
+
pulumi.set(self, "rotation_period", value)
|
|
986
|
+
|
|
987
|
+
@_builtins.property
|
|
988
|
+
@pulumi.getter(name="rotationSchedule")
|
|
989
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
990
|
+
"""
|
|
991
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
|
992
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
|
993
|
+
"""
|
|
994
|
+
return pulumi.get(self, "rotation_schedule")
|
|
995
|
+
|
|
996
|
+
@rotation_schedule.setter
|
|
997
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
998
|
+
pulumi.set(self, "rotation_schedule", value)
|
|
999
|
+
|
|
1000
|
+
@_builtins.property
|
|
1001
|
+
@pulumi.getter(name="rotationWindow")
|
|
1002
|
+
def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
1003
|
+
"""
|
|
1004
|
+
The maximum amount of time in seconds allowed to complete
|
|
1005
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
|
1006
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
|
1007
|
+
"""
|
|
1008
|
+
return pulumi.get(self, "rotation_window")
|
|
1009
|
+
|
|
1010
|
+
@rotation_window.setter
|
|
1011
|
+
def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
1012
|
+
pulumi.set(self, "rotation_window", value)
|
|
1013
|
+
|
|
1014
|
+
@_builtins.property
|
|
1015
|
+
@pulumi.getter
|
|
1016
|
+
def snowflake(self) -> Optional[pulumi.Input['SecretBackendConnectionSnowflakeArgs']]:
|
|
1017
|
+
"""
|
|
1018
|
+
A nested block containing configuration options for Snowflake connections.
|
|
1019
|
+
"""
|
|
1020
|
+
return pulumi.get(self, "snowflake")
|
|
1021
|
+
|
|
1022
|
+
@snowflake.setter
|
|
1023
|
+
def snowflake(self, value: Optional[pulumi.Input['SecretBackendConnectionSnowflakeArgs']]):
|
|
1024
|
+
pulumi.set(self, "snowflake", value)
|
|
1025
|
+
|
|
1026
|
+
@_builtins.property
|
|
1027
|
+
@pulumi.getter(name="verifyConnection")
|
|
1028
|
+
def verify_connection(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1029
|
+
"""
|
|
1030
|
+
Whether the connection should be verified on
|
|
1031
|
+
initial configuration or not.
|
|
1032
|
+
"""
|
|
1033
|
+
return pulumi.get(self, "verify_connection")
|
|
1034
|
+
|
|
1035
|
+
@verify_connection.setter
|
|
1036
|
+
def verify_connection(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1037
|
+
pulumi.set(self, "verify_connection", value)
|
|
1038
|
+
|
|
1039
|
+
|
|
1040
|
+
@pulumi.type_token("vault:database/secretBackendConnection:SecretBackendConnection")
|
|
1041
|
+
class SecretBackendConnection(pulumi.CustomResource):
|
|
1042
|
+
@overload
|
|
1043
|
+
def __init__(__self__,
|
|
1044
|
+
resource_name: str,
|
|
1045
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
1046
|
+
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1047
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1048
|
+
cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
|
|
1049
|
+
couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
|
|
1050
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
1051
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1052
|
+
elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
|
|
1053
|
+
hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
|
|
1054
|
+
influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
|
|
1055
|
+
mongodb: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbArgs', 'SecretBackendConnectionMongodbArgsDict']]] = None,
|
|
1056
|
+
mongodbatlas: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbatlasArgs', 'SecretBackendConnectionMongodbatlasArgsDict']]] = None,
|
|
1057
|
+
mssql: Optional[pulumi.Input[Union['SecretBackendConnectionMssqlArgs', 'SecretBackendConnectionMssqlArgsDict']]] = None,
|
|
1058
|
+
mysql: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlArgs', 'SecretBackendConnectionMysqlArgsDict']]] = None,
|
|
1059
|
+
mysql_aurora: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']]] = None,
|
|
1060
|
+
mysql_legacy: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']]] = None,
|
|
1061
|
+
mysql_rds: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']]] = None,
|
|
1062
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1063
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1064
|
+
oracle: Optional[pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']]] = None,
|
|
1065
|
+
plugin_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1066
|
+
postgresql: Optional[pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']]] = None,
|
|
1067
|
+
redis: Optional[pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']]] = None,
|
|
1068
|
+
redis_elasticache: Optional[pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']]] = None,
|
|
1069
|
+
redshift: Optional[pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']]] = None,
|
|
1070
|
+
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1071
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
1072
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1073
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
|
1074
|
+
snowflake: Optional[pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']]] = None,
|
|
1075
|
+
verify_connection: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1076
|
+
__props__=None):
|
|
1077
|
+
"""
|
|
1078
|
+
## Example Usage
|
|
1079
|
+
|
|
1080
|
+
```python
|
|
1081
|
+
import pulumi
|
|
1082
|
+
import pulumi_vault as vault
|
|
1083
|
+
|
|
1084
|
+
db = vault.Mount("db",
|
|
1085
|
+
path="postgres",
|
|
1086
|
+
type="database")
|
|
1087
|
+
postgres = vault.database.SecretBackendConnection("postgres",
|
|
1088
|
+
backend=db.path,
|
|
1089
|
+
name="postgres",
|
|
1090
|
+
allowed_roles=[
|
|
1091
|
+
"dev",
|
|
1092
|
+
"prod",
|
|
1093
|
+
],
|
|
1094
|
+
rotation_schedule="0 * * * SAT",
|
|
1095
|
+
rotation_window=3600,
|
|
1096
|
+
postgresql={
|
|
1097
|
+
"connection_url": "postgres://username:password@host:port/database",
|
|
1098
|
+
})
|
|
1099
|
+
```
|
|
1100
|
+
|
|
1101
|
+
## Ephemeral Attributes Reference
|
|
1102
|
+
|
|
1103
|
+
The following write-only attributes are supported for all DBs that support username/password:
|
|
1104
|
+
|
|
1105
|
+
* `password_wo` - (Optional) The password for the user. Can be updated.
|
|
1106
|
+
**Note**: This property is write-only and will not be read from the API.
|
|
1107
|
+
|
|
1108
|
+
The following write-only attribute is supported only for Snowflake DB:
|
|
1109
|
+
|
|
1110
|
+
* `private_key_wo` - (Optional) The private key associated with the Snowflake user.
|
|
1111
|
+
**Note**: This property is write-only and will not be read from the API.
|
|
1112
|
+
|
|
1113
|
+
## Import
|
|
1114
|
+
|
|
1115
|
+
Database secret backend connections can be imported using the `backend`, `/config/`, and the `name` e.g.
|
|
1116
|
+
|
|
1117
|
+
```sh
|
|
1118
|
+
$ pulumi import vault:database/secretBackendConnection:SecretBackendConnection example postgres/config/postgres
|
|
1119
|
+
```
|
|
1120
|
+
|
|
1121
|
+
:param str resource_name: The name of the resource.
|
|
1122
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
1123
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_roles: A list of roles that are allowed to use this
|
|
1124
|
+
connection.
|
|
1125
|
+
:param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
|
|
1126
|
+
:param pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']] cassandra: A nested block containing configuration options for Cassandra connections.
|
|
1127
|
+
:param pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']] couchbase: A nested block containing configuration options for Couchbase connections.
|
|
1128
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
|
1129
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
|
1130
|
+
:param pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
|
|
1131
|
+
:param pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']] hana: A nested block containing configuration options for SAP HanaDB connections.
|
|
1132
|
+
:param pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']] influxdb: A nested block containing configuration options for InfluxDB connections.
|
|
1133
|
+
:param pulumi.Input[Union['SecretBackendConnectionMongodbArgs', 'SecretBackendConnectionMongodbArgsDict']] mongodb: A nested block containing configuration options for MongoDB connections.
|
|
1134
|
+
:param pulumi.Input[Union['SecretBackendConnectionMongodbatlasArgs', 'SecretBackendConnectionMongodbatlasArgsDict']] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
|
|
1135
|
+
:param pulumi.Input[Union['SecretBackendConnectionMssqlArgs', 'SecretBackendConnectionMssqlArgsDict']] mssql: A nested block containing configuration options for MSSQL connections.
|
|
1136
|
+
:param pulumi.Input[Union['SecretBackendConnectionMysqlArgs', 'SecretBackendConnectionMysqlArgsDict']] mysql: A nested block containing configuration options for MySQL connections.
|
|
1137
|
+
:param pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']] mysql_aurora: A nested block containing configuration options for Aurora MySQL connections.
|
|
1138
|
+
:param pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']] mysql_legacy: A nested block containing configuration options for legacy MySQL connections.
|
|
1139
|
+
:param pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
|
|
1140
|
+
:param pulumi.Input[_builtins.str] name: A unique name to give the database connection.
|
|
1141
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
1142
|
+
The value should not contain leading or trailing forward slashes.
|
|
1143
|
+
The `namespace` is always relative to the provider's configured namespace.
|
|
1144
|
+
*Available only for Vault Enterprise*.
|
|
1145
|
+
:param pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']] oracle: A nested block containing configuration options for Oracle connections.
|
|
1146
|
+
:param pulumi.Input[_builtins.str] plugin_name: Specifies the name of the plugin to use.
|
|
1147
|
+
:param pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']] postgresql: A nested block containing configuration options for PostgreSQL connections.
|
|
1148
|
+
:param pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']] redis: A nested block containing configuration options for Redis connections.
|
|
1149
|
+
:param pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']] redis_elasticache: A nested block containing configuration options for Redis ElastiCache connections.
|
|
1150
|
+
|
|
1151
|
+
Exactly one of the nested blocks of configuration options must be supplied.
|
|
1152
|
+
:param pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']] redshift: Connection parameters for the redshift-database-plugin plugin.
|
|
1153
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
|
1154
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
|
1155
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
|
1156
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
|
1157
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
|
1158
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
|
1159
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
|
1160
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
|
1161
|
+
:param pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']] snowflake: A nested block containing configuration options for Snowflake connections.
|
|
1162
|
+
:param pulumi.Input[_builtins.bool] verify_connection: Whether the connection should be verified on
|
|
1163
|
+
initial configuration or not.
|
|
1164
|
+
"""
|
|
1165
|
+
...
|
|
1166
|
+
@overload
|
|
1167
|
+
def __init__(__self__,
|
|
1168
|
+
resource_name: str,
|
|
1169
|
+
args: SecretBackendConnectionArgs,
|
|
1170
|
+
opts: Optional[pulumi.ResourceOptions] = None):
|
|
1171
|
+
"""
|
|
1172
|
+
## Example Usage
|
|
1173
|
+
|
|
1174
|
+
```python
|
|
1175
|
+
import pulumi
|
|
1176
|
+
import pulumi_vault as vault
|
|
1177
|
+
|
|
1178
|
+
db = vault.Mount("db",
|
|
1179
|
+
path="postgres",
|
|
1180
|
+
type="database")
|
|
1181
|
+
postgres = vault.database.SecretBackendConnection("postgres",
|
|
1182
|
+
backend=db.path,
|
|
1183
|
+
name="postgres",
|
|
1184
|
+
allowed_roles=[
|
|
1185
|
+
"dev",
|
|
1186
|
+
"prod",
|
|
1187
|
+
],
|
|
1188
|
+
rotation_schedule="0 * * * SAT",
|
|
1189
|
+
rotation_window=3600,
|
|
1190
|
+
postgresql={
|
|
1191
|
+
"connection_url": "postgres://username:password@host:port/database",
|
|
1192
|
+
})
|
|
1193
|
+
```
|
|
1194
|
+
|
|
1195
|
+
## Ephemeral Attributes Reference
|
|
1196
|
+
|
|
1197
|
+
The following write-only attributes are supported for all DBs that support username/password:
|
|
1198
|
+
|
|
1199
|
+
* `password_wo` - (Optional) The password for the user. Can be updated.
|
|
1200
|
+
**Note**: This property is write-only and will not be read from the API.
|
|
1201
|
+
|
|
1202
|
+
The following write-only attribute is supported only for Snowflake DB:
|
|
1203
|
+
|
|
1204
|
+
* `private_key_wo` - (Optional) The private key associated with the Snowflake user.
|
|
1205
|
+
**Note**: This property is write-only and will not be read from the API.
|
|
1206
|
+
|
|
1207
|
+
## Import
|
|
1208
|
+
|
|
1209
|
+
Database secret backend connections can be imported using the `backend`, `/config/`, and the `name` e.g.
|
|
1210
|
+
|
|
1211
|
+
```sh
|
|
1212
|
+
$ pulumi import vault:database/secretBackendConnection:SecretBackendConnection example postgres/config/postgres
|
|
1213
|
+
```
|
|
1214
|
+
|
|
1215
|
+
:param str resource_name: The name of the resource.
|
|
1216
|
+
:param SecretBackendConnectionArgs args: The arguments to use to populate this resource's properties.
|
|
1217
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
1218
|
+
"""
|
|
1219
|
+
...
|
|
1220
|
+
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
1221
|
+
resource_args, opts = _utilities.get_resource_args_opts(SecretBackendConnectionArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
1222
|
+
if resource_args is not None:
|
|
1223
|
+
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
1224
|
+
else:
|
|
1225
|
+
__self__._internal_init(resource_name, *args, **kwargs)
|
|
1226
|
+
|
|
1227
|
+
def _internal_init(__self__,
|
|
1228
|
+
resource_name: str,
|
|
1229
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
1230
|
+
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1231
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1232
|
+
cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
|
|
1233
|
+
couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
|
|
1234
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
1235
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1236
|
+
elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
|
|
1237
|
+
hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
|
|
1238
|
+
influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
|
|
1239
|
+
mongodb: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbArgs', 'SecretBackendConnectionMongodbArgsDict']]] = None,
|
|
1240
|
+
mongodbatlas: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbatlasArgs', 'SecretBackendConnectionMongodbatlasArgsDict']]] = None,
|
|
1241
|
+
mssql: Optional[pulumi.Input[Union['SecretBackendConnectionMssqlArgs', 'SecretBackendConnectionMssqlArgsDict']]] = None,
|
|
1242
|
+
mysql: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlArgs', 'SecretBackendConnectionMysqlArgsDict']]] = None,
|
|
1243
|
+
mysql_aurora: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']]] = None,
|
|
1244
|
+
mysql_legacy: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']]] = None,
|
|
1245
|
+
mysql_rds: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']]] = None,
|
|
1246
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1247
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1248
|
+
oracle: Optional[pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']]] = None,
|
|
1249
|
+
plugin_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1250
|
+
postgresql: Optional[pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']]] = None,
|
|
1251
|
+
redis: Optional[pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']]] = None,
|
|
1252
|
+
redis_elasticache: Optional[pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']]] = None,
|
|
1253
|
+
redshift: Optional[pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']]] = None,
|
|
1254
|
+
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1255
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
1256
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1257
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
|
1258
|
+
snowflake: Optional[pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']]] = None,
|
|
1259
|
+
verify_connection: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1260
|
+
__props__=None):
|
|
1261
|
+
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
1262
|
+
if not isinstance(opts, pulumi.ResourceOptions):
|
|
1263
|
+
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
1264
|
+
if opts.id is None:
|
|
1265
|
+
if __props__ is not None:
|
|
1266
|
+
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
1267
|
+
__props__ = SecretBackendConnectionArgs.__new__(SecretBackendConnectionArgs)
|
|
1268
|
+
|
|
1269
|
+
__props__.__dict__["allowed_roles"] = allowed_roles
|
|
1270
|
+
if backend is None and not opts.urn:
|
|
1271
|
+
raise TypeError("Missing required property 'backend'")
|
|
1272
|
+
__props__.__dict__["backend"] = backend
|
|
1273
|
+
__props__.__dict__["cassandra"] = cassandra
|
|
1274
|
+
__props__.__dict__["couchbase"] = couchbase
|
|
1275
|
+
__props__.__dict__["data"] = data
|
|
1276
|
+
__props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
|
|
1277
|
+
__props__.__dict__["elasticsearch"] = elasticsearch
|
|
1278
|
+
__props__.__dict__["hana"] = hana
|
|
1279
|
+
__props__.__dict__["influxdb"] = influxdb
|
|
1280
|
+
__props__.__dict__["mongodb"] = mongodb
|
|
1281
|
+
__props__.__dict__["mongodbatlas"] = mongodbatlas
|
|
1282
|
+
__props__.__dict__["mssql"] = mssql
|
|
1283
|
+
__props__.__dict__["mysql"] = mysql
|
|
1284
|
+
__props__.__dict__["mysql_aurora"] = mysql_aurora
|
|
1285
|
+
__props__.__dict__["mysql_legacy"] = mysql_legacy
|
|
1286
|
+
__props__.__dict__["mysql_rds"] = mysql_rds
|
|
1287
|
+
__props__.__dict__["name"] = name
|
|
1288
|
+
__props__.__dict__["namespace"] = namespace
|
|
1289
|
+
__props__.__dict__["oracle"] = oracle
|
|
1290
|
+
__props__.__dict__["plugin_name"] = plugin_name
|
|
1291
|
+
__props__.__dict__["postgresql"] = postgresql
|
|
1292
|
+
__props__.__dict__["redis"] = redis
|
|
1293
|
+
__props__.__dict__["redis_elasticache"] = redis_elasticache
|
|
1294
|
+
__props__.__dict__["redshift"] = redshift
|
|
1295
|
+
__props__.__dict__["root_rotation_statements"] = root_rotation_statements
|
|
1296
|
+
__props__.__dict__["rotation_period"] = rotation_period
|
|
1297
|
+
__props__.__dict__["rotation_schedule"] = rotation_schedule
|
|
1298
|
+
__props__.__dict__["rotation_window"] = rotation_window
|
|
1299
|
+
__props__.__dict__["snowflake"] = snowflake
|
|
1300
|
+
__props__.__dict__["verify_connection"] = verify_connection
|
|
1301
|
+
super(SecretBackendConnection, __self__).__init__(
|
|
1302
|
+
'vault:database/secretBackendConnection:SecretBackendConnection',
|
|
1303
|
+
resource_name,
|
|
1304
|
+
__props__,
|
|
1305
|
+
opts)
|
|
1306
|
+
|
|
1307
|
+
@staticmethod
|
|
1308
|
+
def get(resource_name: str,
|
|
1309
|
+
id: pulumi.Input[str],
|
|
1310
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
1311
|
+
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1312
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1313
|
+
cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
|
|
1314
|
+
couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
|
|
1315
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
1316
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1317
|
+
elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
|
|
1318
|
+
hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
|
|
1319
|
+
influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
|
|
1320
|
+
mongodb: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbArgs', 'SecretBackendConnectionMongodbArgsDict']]] = None,
|
|
1321
|
+
mongodbatlas: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbatlasArgs', 'SecretBackendConnectionMongodbatlasArgsDict']]] = None,
|
|
1322
|
+
mssql: Optional[pulumi.Input[Union['SecretBackendConnectionMssqlArgs', 'SecretBackendConnectionMssqlArgsDict']]] = None,
|
|
1323
|
+
mysql: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlArgs', 'SecretBackendConnectionMysqlArgsDict']]] = None,
|
|
1324
|
+
mysql_aurora: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']]] = None,
|
|
1325
|
+
mysql_legacy: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']]] = None,
|
|
1326
|
+
mysql_rds: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']]] = None,
|
|
1327
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1328
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1329
|
+
oracle: Optional[pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']]] = None,
|
|
1330
|
+
plugin_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1331
|
+
postgresql: Optional[pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']]] = None,
|
|
1332
|
+
redis: Optional[pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']]] = None,
|
|
1333
|
+
redis_elasticache: Optional[pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']]] = None,
|
|
1334
|
+
redshift: Optional[pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']]] = None,
|
|
1335
|
+
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1336
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
1337
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1338
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
|
1339
|
+
snowflake: Optional[pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']]] = None,
|
|
1340
|
+
verify_connection: Optional[pulumi.Input[_builtins.bool]] = None) -> 'SecretBackendConnection':
|
|
1341
|
+
"""
|
|
1342
|
+
Get an existing SecretBackendConnection resource's state with the given name, id, and optional extra
|
|
1343
|
+
properties used to qualify the lookup.
|
|
1344
|
+
|
|
1345
|
+
:param str resource_name: The unique name of the resulting resource.
|
|
1346
|
+
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
1347
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
1348
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_roles: A list of roles that are allowed to use this
|
|
1349
|
+
connection.
|
|
1350
|
+
:param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
|
|
1351
|
+
:param pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']] cassandra: A nested block containing configuration options for Cassandra connections.
|
|
1352
|
+
:param pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']] couchbase: A nested block containing configuration options for Couchbase connections.
|
|
1353
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
|
1354
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
|
1355
|
+
:param pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
|
|
1356
|
+
:param pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']] hana: A nested block containing configuration options for SAP HanaDB connections.
|
|
1357
|
+
:param pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']] influxdb: A nested block containing configuration options for InfluxDB connections.
|
|
1358
|
+
:param pulumi.Input[Union['SecretBackendConnectionMongodbArgs', 'SecretBackendConnectionMongodbArgsDict']] mongodb: A nested block containing configuration options for MongoDB connections.
|
|
1359
|
+
:param pulumi.Input[Union['SecretBackendConnectionMongodbatlasArgs', 'SecretBackendConnectionMongodbatlasArgsDict']] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
|
|
1360
|
+
:param pulumi.Input[Union['SecretBackendConnectionMssqlArgs', 'SecretBackendConnectionMssqlArgsDict']] mssql: A nested block containing configuration options for MSSQL connections.
|
|
1361
|
+
:param pulumi.Input[Union['SecretBackendConnectionMysqlArgs', 'SecretBackendConnectionMysqlArgsDict']] mysql: A nested block containing configuration options for MySQL connections.
|
|
1362
|
+
:param pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']] mysql_aurora: A nested block containing configuration options for Aurora MySQL connections.
|
|
1363
|
+
:param pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']] mysql_legacy: A nested block containing configuration options for legacy MySQL connections.
|
|
1364
|
+
:param pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
|
|
1365
|
+
:param pulumi.Input[_builtins.str] name: A unique name to give the database connection.
|
|
1366
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
1367
|
+
The value should not contain leading or trailing forward slashes.
|
|
1368
|
+
The `namespace` is always relative to the provider's configured namespace.
|
|
1369
|
+
*Available only for Vault Enterprise*.
|
|
1370
|
+
:param pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']] oracle: A nested block containing configuration options for Oracle connections.
|
|
1371
|
+
:param pulumi.Input[_builtins.str] plugin_name: Specifies the name of the plugin to use.
|
|
1372
|
+
:param pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']] postgresql: A nested block containing configuration options for PostgreSQL connections.
|
|
1373
|
+
:param pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']] redis: A nested block containing configuration options for Redis connections.
|
|
1374
|
+
:param pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']] redis_elasticache: A nested block containing configuration options for Redis ElastiCache connections.
|
|
1375
|
+
|
|
1376
|
+
Exactly one of the nested blocks of configuration options must be supplied.
|
|
1377
|
+
:param pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']] redshift: Connection parameters for the redshift-database-plugin plugin.
|
|
1378
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
|
1379
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
|
1380
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
|
1381
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
|
1382
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
|
1383
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
|
1384
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
|
1385
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
|
1386
|
+
:param pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']] snowflake: A nested block containing configuration options for Snowflake connections.
|
|
1387
|
+
:param pulumi.Input[_builtins.bool] verify_connection: Whether the connection should be verified on
|
|
1388
|
+
initial configuration or not.
|
|
1389
|
+
"""
|
|
1390
|
+
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
1391
|
+
|
|
1392
|
+
__props__ = _SecretBackendConnectionState.__new__(_SecretBackendConnectionState)
|
|
1393
|
+
|
|
1394
|
+
__props__.__dict__["allowed_roles"] = allowed_roles
|
|
1395
|
+
__props__.__dict__["backend"] = backend
|
|
1396
|
+
__props__.__dict__["cassandra"] = cassandra
|
|
1397
|
+
__props__.__dict__["couchbase"] = couchbase
|
|
1398
|
+
__props__.__dict__["data"] = data
|
|
1399
|
+
__props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
|
|
1400
|
+
__props__.__dict__["elasticsearch"] = elasticsearch
|
|
1401
|
+
__props__.__dict__["hana"] = hana
|
|
1402
|
+
__props__.__dict__["influxdb"] = influxdb
|
|
1403
|
+
__props__.__dict__["mongodb"] = mongodb
|
|
1404
|
+
__props__.__dict__["mongodbatlas"] = mongodbatlas
|
|
1405
|
+
__props__.__dict__["mssql"] = mssql
|
|
1406
|
+
__props__.__dict__["mysql"] = mysql
|
|
1407
|
+
__props__.__dict__["mysql_aurora"] = mysql_aurora
|
|
1408
|
+
__props__.__dict__["mysql_legacy"] = mysql_legacy
|
|
1409
|
+
__props__.__dict__["mysql_rds"] = mysql_rds
|
|
1410
|
+
__props__.__dict__["name"] = name
|
|
1411
|
+
__props__.__dict__["namespace"] = namespace
|
|
1412
|
+
__props__.__dict__["oracle"] = oracle
|
|
1413
|
+
__props__.__dict__["plugin_name"] = plugin_name
|
|
1414
|
+
__props__.__dict__["postgresql"] = postgresql
|
|
1415
|
+
__props__.__dict__["redis"] = redis
|
|
1416
|
+
__props__.__dict__["redis_elasticache"] = redis_elasticache
|
|
1417
|
+
__props__.__dict__["redshift"] = redshift
|
|
1418
|
+
__props__.__dict__["root_rotation_statements"] = root_rotation_statements
|
|
1419
|
+
__props__.__dict__["rotation_period"] = rotation_period
|
|
1420
|
+
__props__.__dict__["rotation_schedule"] = rotation_schedule
|
|
1421
|
+
__props__.__dict__["rotation_window"] = rotation_window
|
|
1422
|
+
__props__.__dict__["snowflake"] = snowflake
|
|
1423
|
+
__props__.__dict__["verify_connection"] = verify_connection
|
|
1424
|
+
return SecretBackendConnection(resource_name, opts=opts, __props__=__props__)
|
|
1425
|
+
|
|
1426
|
+
@_builtins.property
|
|
1427
|
+
@pulumi.getter(name="allowedRoles")
|
|
1428
|
+
def allowed_roles(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
1429
|
+
"""
|
|
1430
|
+
A list of roles that are allowed to use this
|
|
1431
|
+
connection.
|
|
1432
|
+
"""
|
|
1433
|
+
return pulumi.get(self, "allowed_roles")
|
|
1434
|
+
|
|
1435
|
+
@_builtins.property
|
|
1436
|
+
@pulumi.getter
|
|
1437
|
+
def backend(self) -> pulumi.Output[_builtins.str]:
|
|
1438
|
+
"""
|
|
1439
|
+
The unique name of the Vault mount to configure.
|
|
1440
|
+
"""
|
|
1441
|
+
return pulumi.get(self, "backend")
|
|
1442
|
+
|
|
1443
|
+
@_builtins.property
|
|
1444
|
+
@pulumi.getter
|
|
1445
|
+
def cassandra(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionCassandra']]:
|
|
1446
|
+
"""
|
|
1447
|
+
A nested block containing configuration options for Cassandra connections.
|
|
1448
|
+
"""
|
|
1449
|
+
return pulumi.get(self, "cassandra")
|
|
1450
|
+
|
|
1451
|
+
@_builtins.property
|
|
1452
|
+
@pulumi.getter
|
|
1453
|
+
def couchbase(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionCouchbase']]:
|
|
1454
|
+
"""
|
|
1455
|
+
A nested block containing configuration options for Couchbase connections.
|
|
1456
|
+
"""
|
|
1457
|
+
return pulumi.get(self, "couchbase")
|
|
1458
|
+
|
|
1459
|
+
@_builtins.property
|
|
1460
|
+
@pulumi.getter
|
|
1461
|
+
def data(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
|
1462
|
+
"""
|
|
1463
|
+
A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
|
1464
|
+
"""
|
|
1465
|
+
return pulumi.get(self, "data")
|
|
1466
|
+
|
|
1467
|
+
@_builtins.property
|
|
1468
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
|
1469
|
+
def disable_automated_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
1470
|
+
"""
|
|
1471
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
|
1472
|
+
"""
|
|
1473
|
+
return pulumi.get(self, "disable_automated_rotation")
|
|
1474
|
+
|
|
1475
|
+
@_builtins.property
|
|
1476
|
+
@pulumi.getter
|
|
1477
|
+
def elasticsearch(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionElasticsearch']]:
|
|
1478
|
+
"""
|
|
1479
|
+
A nested block containing configuration options for Elasticsearch connections.
|
|
1480
|
+
"""
|
|
1481
|
+
return pulumi.get(self, "elasticsearch")
|
|
1482
|
+
|
|
1483
|
+
@_builtins.property
|
|
1484
|
+
@pulumi.getter
|
|
1485
|
+
def hana(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionHana']]:
|
|
1486
|
+
"""
|
|
1487
|
+
A nested block containing configuration options for SAP HanaDB connections.
|
|
1488
|
+
"""
|
|
1489
|
+
return pulumi.get(self, "hana")
|
|
1490
|
+
|
|
1491
|
+
@_builtins.property
|
|
1492
|
+
@pulumi.getter
|
|
1493
|
+
def influxdb(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionInfluxdb']]:
|
|
1494
|
+
"""
|
|
1495
|
+
A nested block containing configuration options for InfluxDB connections.
|
|
1496
|
+
"""
|
|
1497
|
+
return pulumi.get(self, "influxdb")
|
|
1498
|
+
|
|
1499
|
+
@_builtins.property
|
|
1500
|
+
@pulumi.getter
|
|
1501
|
+
def mongodb(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionMongodb']]:
|
|
1502
|
+
"""
|
|
1503
|
+
A nested block containing configuration options for MongoDB connections.
|
|
1504
|
+
"""
|
|
1505
|
+
return pulumi.get(self, "mongodb")
|
|
1506
|
+
|
|
1507
|
+
@_builtins.property
|
|
1508
|
+
@pulumi.getter
|
|
1509
|
+
def mongodbatlas(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionMongodbatlas']]:
|
|
1510
|
+
"""
|
|
1511
|
+
A nested block containing configuration options for MongoDB Atlas connections.
|
|
1512
|
+
"""
|
|
1513
|
+
return pulumi.get(self, "mongodbatlas")
|
|
1514
|
+
|
|
1515
|
+
@_builtins.property
|
|
1516
|
+
@pulumi.getter
|
|
1517
|
+
def mssql(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionMssql']]:
|
|
1518
|
+
"""
|
|
1519
|
+
A nested block containing configuration options for MSSQL connections.
|
|
1520
|
+
"""
|
|
1521
|
+
return pulumi.get(self, "mssql")
|
|
1522
|
+
|
|
1523
|
+
@_builtins.property
|
|
1524
|
+
@pulumi.getter
|
|
1525
|
+
def mysql(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionMysql']]:
|
|
1526
|
+
"""
|
|
1527
|
+
A nested block containing configuration options for MySQL connections.
|
|
1528
|
+
"""
|
|
1529
|
+
return pulumi.get(self, "mysql")
|
|
1530
|
+
|
|
1531
|
+
@_builtins.property
|
|
1532
|
+
@pulumi.getter(name="mysqlAurora")
|
|
1533
|
+
def mysql_aurora(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionMysqlAurora']]:
|
|
1534
|
+
"""
|
|
1535
|
+
A nested block containing configuration options for Aurora MySQL connections.
|
|
1536
|
+
"""
|
|
1537
|
+
return pulumi.get(self, "mysql_aurora")
|
|
1538
|
+
|
|
1539
|
+
@_builtins.property
|
|
1540
|
+
@pulumi.getter(name="mysqlLegacy")
|
|
1541
|
+
def mysql_legacy(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionMysqlLegacy']]:
|
|
1542
|
+
"""
|
|
1543
|
+
A nested block containing configuration options for legacy MySQL connections.
|
|
1544
|
+
"""
|
|
1545
|
+
return pulumi.get(self, "mysql_legacy")
|
|
1546
|
+
|
|
1547
|
+
@_builtins.property
|
|
1548
|
+
@pulumi.getter(name="mysqlRds")
|
|
1549
|
+
def mysql_rds(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionMysqlRds']]:
|
|
1550
|
+
"""
|
|
1551
|
+
A nested block containing configuration options for RDS MySQL connections.
|
|
1552
|
+
"""
|
|
1553
|
+
return pulumi.get(self, "mysql_rds")
|
|
1554
|
+
|
|
1555
|
+
@_builtins.property
|
|
1556
|
+
@pulumi.getter
|
|
1557
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
|
1558
|
+
"""
|
|
1559
|
+
A unique name to give the database connection.
|
|
1560
|
+
"""
|
|
1561
|
+
return pulumi.get(self, "name")
|
|
1562
|
+
|
|
1563
|
+
@_builtins.property
|
|
1564
|
+
@pulumi.getter
|
|
1565
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1566
|
+
"""
|
|
1567
|
+
The namespace to provision the resource in.
|
|
1568
|
+
The value should not contain leading or trailing forward slashes.
|
|
1569
|
+
The `namespace` is always relative to the provider's configured namespace.
|
|
1570
|
+
*Available only for Vault Enterprise*.
|
|
1571
|
+
"""
|
|
1572
|
+
return pulumi.get(self, "namespace")
|
|
1573
|
+
|
|
1574
|
+
@_builtins.property
|
|
1575
|
+
@pulumi.getter
|
|
1576
|
+
def oracle(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionOracle']]:
|
|
1577
|
+
"""
|
|
1578
|
+
A nested block containing configuration options for Oracle connections.
|
|
1579
|
+
"""
|
|
1580
|
+
return pulumi.get(self, "oracle")
|
|
1581
|
+
|
|
1582
|
+
@_builtins.property
|
|
1583
|
+
@pulumi.getter(name="pluginName")
|
|
1584
|
+
def plugin_name(self) -> pulumi.Output[_builtins.str]:
|
|
1585
|
+
"""
|
|
1586
|
+
Specifies the name of the plugin to use.
|
|
1587
|
+
"""
|
|
1588
|
+
return pulumi.get(self, "plugin_name")
|
|
1589
|
+
|
|
1590
|
+
@_builtins.property
|
|
1591
|
+
@pulumi.getter
|
|
1592
|
+
def postgresql(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionPostgresql']]:
|
|
1593
|
+
"""
|
|
1594
|
+
A nested block containing configuration options for PostgreSQL connections.
|
|
1595
|
+
"""
|
|
1596
|
+
return pulumi.get(self, "postgresql")
|
|
1597
|
+
|
|
1598
|
+
@_builtins.property
|
|
1599
|
+
@pulumi.getter
|
|
1600
|
+
def redis(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionRedis']]:
|
|
1601
|
+
"""
|
|
1602
|
+
A nested block containing configuration options for Redis connections.
|
|
1603
|
+
"""
|
|
1604
|
+
return pulumi.get(self, "redis")
|
|
1605
|
+
|
|
1606
|
+
@_builtins.property
|
|
1607
|
+
@pulumi.getter(name="redisElasticache")
|
|
1608
|
+
def redis_elasticache(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionRedisElasticache']]:
|
|
1609
|
+
"""
|
|
1610
|
+
A nested block containing configuration options for Redis ElastiCache connections.
|
|
1611
|
+
|
|
1612
|
+
Exactly one of the nested blocks of configuration options must be supplied.
|
|
1613
|
+
"""
|
|
1614
|
+
return pulumi.get(self, "redis_elasticache")
|
|
1615
|
+
|
|
1616
|
+
@_builtins.property
|
|
1617
|
+
@pulumi.getter
|
|
1618
|
+
def redshift(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionRedshift']]:
|
|
1619
|
+
"""
|
|
1620
|
+
Connection parameters for the redshift-database-plugin plugin.
|
|
1621
|
+
"""
|
|
1622
|
+
return pulumi.get(self, "redshift")
|
|
1623
|
+
|
|
1624
|
+
@_builtins.property
|
|
1625
|
+
@pulumi.getter(name="rootRotationStatements")
|
|
1626
|
+
def root_rotation_statements(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
1627
|
+
"""
|
|
1628
|
+
A list of database statements to be executed to rotate the root user's credentials.
|
|
1629
|
+
"""
|
|
1630
|
+
return pulumi.get(self, "root_rotation_statements")
|
|
1631
|
+
|
|
1632
|
+
@_builtins.property
|
|
1633
|
+
@pulumi.getter(name="rotationPeriod")
|
|
1634
|
+
def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
1635
|
+
"""
|
|
1636
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
|
1637
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
|
1638
|
+
"""
|
|
1639
|
+
return pulumi.get(self, "rotation_period")
|
|
1640
|
+
|
|
1641
|
+
@_builtins.property
|
|
1642
|
+
@pulumi.getter(name="rotationSchedule")
|
|
1643
|
+
def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1644
|
+
"""
|
|
1645
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
|
1646
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
|
1647
|
+
"""
|
|
1648
|
+
return pulumi.get(self, "rotation_schedule")
|
|
1649
|
+
|
|
1650
|
+
@_builtins.property
|
|
1651
|
+
@pulumi.getter(name="rotationWindow")
|
|
1652
|
+
def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
1653
|
+
"""
|
|
1654
|
+
The maximum amount of time in seconds allowed to complete
|
|
1655
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
|
1656
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
|
1657
|
+
"""
|
|
1658
|
+
return pulumi.get(self, "rotation_window")
|
|
1659
|
+
|
|
1660
|
+
@_builtins.property
|
|
1661
|
+
@pulumi.getter
|
|
1662
|
+
def snowflake(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionSnowflake']]:
|
|
1663
|
+
"""
|
|
1664
|
+
A nested block containing configuration options for Snowflake connections.
|
|
1665
|
+
"""
|
|
1666
|
+
return pulumi.get(self, "snowflake")
|
|
1667
|
+
|
|
1668
|
+
@_builtins.property
|
|
1669
|
+
@pulumi.getter(name="verifyConnection")
|
|
1670
|
+
def verify_connection(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
1671
|
+
"""
|
|
1672
|
+
Whether the connection should be verified on
|
|
1673
|
+
initial configuration or not.
|
|
1674
|
+
"""
|
|
1675
|
+
return pulumi.get(self, "verify_connection")
|
|
1676
|
+
|