pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,1676 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+ from . import outputs
17
+ from ._inputs import *
18
+
19
+ __all__ = ['SecretBackendConnectionArgs', 'SecretBackendConnection']
20
+
21
+ @pulumi.input_type
22
+ class SecretBackendConnectionArgs:
23
+ def __init__(__self__, *,
24
+ backend: pulumi.Input[_builtins.str],
25
+ allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ cassandra: Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']] = None,
27
+ couchbase: Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']] = None,
28
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
29
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
30
+ elasticsearch: Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']] = None,
31
+ hana: Optional[pulumi.Input['SecretBackendConnectionHanaArgs']] = None,
32
+ influxdb: Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']] = None,
33
+ mongodb: Optional[pulumi.Input['SecretBackendConnectionMongodbArgs']] = None,
34
+ mongodbatlas: Optional[pulumi.Input['SecretBackendConnectionMongodbatlasArgs']] = None,
35
+ mssql: Optional[pulumi.Input['SecretBackendConnectionMssqlArgs']] = None,
36
+ mysql: Optional[pulumi.Input['SecretBackendConnectionMysqlArgs']] = None,
37
+ mysql_aurora: Optional[pulumi.Input['SecretBackendConnectionMysqlAuroraArgs']] = None,
38
+ mysql_legacy: Optional[pulumi.Input['SecretBackendConnectionMysqlLegacyArgs']] = None,
39
+ mysql_rds: Optional[pulumi.Input['SecretBackendConnectionMysqlRdsArgs']] = None,
40
+ name: Optional[pulumi.Input[_builtins.str]] = None,
41
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
42
+ oracle: Optional[pulumi.Input['SecretBackendConnectionOracleArgs']] = None,
43
+ plugin_name: Optional[pulumi.Input[_builtins.str]] = None,
44
+ postgresql: Optional[pulumi.Input['SecretBackendConnectionPostgresqlArgs']] = None,
45
+ redis: Optional[pulumi.Input['SecretBackendConnectionRedisArgs']] = None,
46
+ redis_elasticache: Optional[pulumi.Input['SecretBackendConnectionRedisElasticacheArgs']] = None,
47
+ redshift: Optional[pulumi.Input['SecretBackendConnectionRedshiftArgs']] = None,
48
+ root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
49
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
50
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
51
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
52
+ snowflake: Optional[pulumi.Input['SecretBackendConnectionSnowflakeArgs']] = None,
53
+ verify_connection: Optional[pulumi.Input[_builtins.bool]] = None):
54
+ """
55
+ The set of arguments for constructing a SecretBackendConnection resource.
56
+ :param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
57
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_roles: A list of roles that are allowed to use this
58
+ connection.
59
+ :param pulumi.Input['SecretBackendConnectionCassandraArgs'] cassandra: A nested block containing configuration options for Cassandra connections.
60
+ :param pulumi.Input['SecretBackendConnectionCouchbaseArgs'] couchbase: A nested block containing configuration options for Couchbase connections.
61
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
62
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
63
+ :param pulumi.Input['SecretBackendConnectionElasticsearchArgs'] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
64
+ :param pulumi.Input['SecretBackendConnectionHanaArgs'] hana: A nested block containing configuration options for SAP HanaDB connections.
65
+ :param pulumi.Input['SecretBackendConnectionInfluxdbArgs'] influxdb: A nested block containing configuration options for InfluxDB connections.
66
+ :param pulumi.Input['SecretBackendConnectionMongodbArgs'] mongodb: A nested block containing configuration options for MongoDB connections.
67
+ :param pulumi.Input['SecretBackendConnectionMongodbatlasArgs'] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
68
+ :param pulumi.Input['SecretBackendConnectionMssqlArgs'] mssql: A nested block containing configuration options for MSSQL connections.
69
+ :param pulumi.Input['SecretBackendConnectionMysqlArgs'] mysql: A nested block containing configuration options for MySQL connections.
70
+ :param pulumi.Input['SecretBackendConnectionMysqlAuroraArgs'] mysql_aurora: A nested block containing configuration options for Aurora MySQL connections.
71
+ :param pulumi.Input['SecretBackendConnectionMysqlLegacyArgs'] mysql_legacy: A nested block containing configuration options for legacy MySQL connections.
72
+ :param pulumi.Input['SecretBackendConnectionMysqlRdsArgs'] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
73
+ :param pulumi.Input[_builtins.str] name: A unique name to give the database connection.
74
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
75
+ The value should not contain leading or trailing forward slashes.
76
+ The `namespace` is always relative to the provider's configured namespace.
77
+ *Available only for Vault Enterprise*.
78
+ :param pulumi.Input['SecretBackendConnectionOracleArgs'] oracle: A nested block containing configuration options for Oracle connections.
79
+ :param pulumi.Input[_builtins.str] plugin_name: Specifies the name of the plugin to use.
80
+ :param pulumi.Input['SecretBackendConnectionPostgresqlArgs'] postgresql: A nested block containing configuration options for PostgreSQL connections.
81
+ :param pulumi.Input['SecretBackendConnectionRedisArgs'] redis: A nested block containing configuration options for Redis connections.
82
+ :param pulumi.Input['SecretBackendConnectionRedisElasticacheArgs'] redis_elasticache: A nested block containing configuration options for Redis ElastiCache connections.
83
+
84
+ Exactly one of the nested blocks of configuration options must be supplied.
85
+ :param pulumi.Input['SecretBackendConnectionRedshiftArgs'] redshift: Connection parameters for the redshift-database-plugin plugin.
86
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
87
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
88
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
89
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
90
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
91
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
92
+ a rotation when a scheduled token rotation occurs. The default rotation window is
93
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
94
+ :param pulumi.Input['SecretBackendConnectionSnowflakeArgs'] snowflake: A nested block containing configuration options for Snowflake connections.
95
+ :param pulumi.Input[_builtins.bool] verify_connection: Whether the connection should be verified on
96
+ initial configuration or not.
97
+ """
98
+ pulumi.set(__self__, "backend", backend)
99
+ if allowed_roles is not None:
100
+ pulumi.set(__self__, "allowed_roles", allowed_roles)
101
+ if cassandra is not None:
102
+ pulumi.set(__self__, "cassandra", cassandra)
103
+ if couchbase is not None:
104
+ pulumi.set(__self__, "couchbase", couchbase)
105
+ if data is not None:
106
+ pulumi.set(__self__, "data", data)
107
+ if disable_automated_rotation is not None:
108
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
109
+ if elasticsearch is not None:
110
+ pulumi.set(__self__, "elasticsearch", elasticsearch)
111
+ if hana is not None:
112
+ pulumi.set(__self__, "hana", hana)
113
+ if influxdb is not None:
114
+ pulumi.set(__self__, "influxdb", influxdb)
115
+ if mongodb is not None:
116
+ pulumi.set(__self__, "mongodb", mongodb)
117
+ if mongodbatlas is not None:
118
+ pulumi.set(__self__, "mongodbatlas", mongodbatlas)
119
+ if mssql is not None:
120
+ pulumi.set(__self__, "mssql", mssql)
121
+ if mysql is not None:
122
+ pulumi.set(__self__, "mysql", mysql)
123
+ if mysql_aurora is not None:
124
+ pulumi.set(__self__, "mysql_aurora", mysql_aurora)
125
+ if mysql_legacy is not None:
126
+ pulumi.set(__self__, "mysql_legacy", mysql_legacy)
127
+ if mysql_rds is not None:
128
+ pulumi.set(__self__, "mysql_rds", mysql_rds)
129
+ if name is not None:
130
+ pulumi.set(__self__, "name", name)
131
+ if namespace is not None:
132
+ pulumi.set(__self__, "namespace", namespace)
133
+ if oracle is not None:
134
+ pulumi.set(__self__, "oracle", oracle)
135
+ if plugin_name is not None:
136
+ pulumi.set(__self__, "plugin_name", plugin_name)
137
+ if postgresql is not None:
138
+ pulumi.set(__self__, "postgresql", postgresql)
139
+ if redis is not None:
140
+ pulumi.set(__self__, "redis", redis)
141
+ if redis_elasticache is not None:
142
+ pulumi.set(__self__, "redis_elasticache", redis_elasticache)
143
+ if redshift is not None:
144
+ pulumi.set(__self__, "redshift", redshift)
145
+ if root_rotation_statements is not None:
146
+ pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
147
+ if rotation_period is not None:
148
+ pulumi.set(__self__, "rotation_period", rotation_period)
149
+ if rotation_schedule is not None:
150
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
151
+ if rotation_window is not None:
152
+ pulumi.set(__self__, "rotation_window", rotation_window)
153
+ if snowflake is not None:
154
+ pulumi.set(__self__, "snowflake", snowflake)
155
+ if verify_connection is not None:
156
+ pulumi.set(__self__, "verify_connection", verify_connection)
157
+
158
+ @_builtins.property
159
+ @pulumi.getter
160
+ def backend(self) -> pulumi.Input[_builtins.str]:
161
+ """
162
+ The unique name of the Vault mount to configure.
163
+ """
164
+ return pulumi.get(self, "backend")
165
+
166
+ @backend.setter
167
+ def backend(self, value: pulumi.Input[_builtins.str]):
168
+ pulumi.set(self, "backend", value)
169
+
170
+ @_builtins.property
171
+ @pulumi.getter(name="allowedRoles")
172
+ def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
173
+ """
174
+ A list of roles that are allowed to use this
175
+ connection.
176
+ """
177
+ return pulumi.get(self, "allowed_roles")
178
+
179
+ @allowed_roles.setter
180
+ def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
181
+ pulumi.set(self, "allowed_roles", value)
182
+
183
+ @_builtins.property
184
+ @pulumi.getter
185
+ def cassandra(self) -> Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']]:
186
+ """
187
+ A nested block containing configuration options for Cassandra connections.
188
+ """
189
+ return pulumi.get(self, "cassandra")
190
+
191
+ @cassandra.setter
192
+ def cassandra(self, value: Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']]):
193
+ pulumi.set(self, "cassandra", value)
194
+
195
+ @_builtins.property
196
+ @pulumi.getter
197
+ def couchbase(self) -> Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']]:
198
+ """
199
+ A nested block containing configuration options for Couchbase connections.
200
+ """
201
+ return pulumi.get(self, "couchbase")
202
+
203
+ @couchbase.setter
204
+ def couchbase(self, value: Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']]):
205
+ pulumi.set(self, "couchbase", value)
206
+
207
+ @_builtins.property
208
+ @pulumi.getter
209
+ def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
210
+ """
211
+ A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
212
+ """
213
+ return pulumi.get(self, "data")
214
+
215
+ @data.setter
216
+ def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
217
+ pulumi.set(self, "data", value)
218
+
219
+ @_builtins.property
220
+ @pulumi.getter(name="disableAutomatedRotation")
221
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
222
+ """
223
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
224
+ """
225
+ return pulumi.get(self, "disable_automated_rotation")
226
+
227
+ @disable_automated_rotation.setter
228
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
229
+ pulumi.set(self, "disable_automated_rotation", value)
230
+
231
+ @_builtins.property
232
+ @pulumi.getter
233
+ def elasticsearch(self) -> Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']]:
234
+ """
235
+ A nested block containing configuration options for Elasticsearch connections.
236
+ """
237
+ return pulumi.get(self, "elasticsearch")
238
+
239
+ @elasticsearch.setter
240
+ def elasticsearch(self, value: Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']]):
241
+ pulumi.set(self, "elasticsearch", value)
242
+
243
+ @_builtins.property
244
+ @pulumi.getter
245
+ def hana(self) -> Optional[pulumi.Input['SecretBackendConnectionHanaArgs']]:
246
+ """
247
+ A nested block containing configuration options for SAP HanaDB connections.
248
+ """
249
+ return pulumi.get(self, "hana")
250
+
251
+ @hana.setter
252
+ def hana(self, value: Optional[pulumi.Input['SecretBackendConnectionHanaArgs']]):
253
+ pulumi.set(self, "hana", value)
254
+
255
+ @_builtins.property
256
+ @pulumi.getter
257
+ def influxdb(self) -> Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']]:
258
+ """
259
+ A nested block containing configuration options for InfluxDB connections.
260
+ """
261
+ return pulumi.get(self, "influxdb")
262
+
263
+ @influxdb.setter
264
+ def influxdb(self, value: Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']]):
265
+ pulumi.set(self, "influxdb", value)
266
+
267
+ @_builtins.property
268
+ @pulumi.getter
269
+ def mongodb(self) -> Optional[pulumi.Input['SecretBackendConnectionMongodbArgs']]:
270
+ """
271
+ A nested block containing configuration options for MongoDB connections.
272
+ """
273
+ return pulumi.get(self, "mongodb")
274
+
275
+ @mongodb.setter
276
+ def mongodb(self, value: Optional[pulumi.Input['SecretBackendConnectionMongodbArgs']]):
277
+ pulumi.set(self, "mongodb", value)
278
+
279
+ @_builtins.property
280
+ @pulumi.getter
281
+ def mongodbatlas(self) -> Optional[pulumi.Input['SecretBackendConnectionMongodbatlasArgs']]:
282
+ """
283
+ A nested block containing configuration options for MongoDB Atlas connections.
284
+ """
285
+ return pulumi.get(self, "mongodbatlas")
286
+
287
+ @mongodbatlas.setter
288
+ def mongodbatlas(self, value: Optional[pulumi.Input['SecretBackendConnectionMongodbatlasArgs']]):
289
+ pulumi.set(self, "mongodbatlas", value)
290
+
291
+ @_builtins.property
292
+ @pulumi.getter
293
+ def mssql(self) -> Optional[pulumi.Input['SecretBackendConnectionMssqlArgs']]:
294
+ """
295
+ A nested block containing configuration options for MSSQL connections.
296
+ """
297
+ return pulumi.get(self, "mssql")
298
+
299
+ @mssql.setter
300
+ def mssql(self, value: Optional[pulumi.Input['SecretBackendConnectionMssqlArgs']]):
301
+ pulumi.set(self, "mssql", value)
302
+
303
+ @_builtins.property
304
+ @pulumi.getter
305
+ def mysql(self) -> Optional[pulumi.Input['SecretBackendConnectionMysqlArgs']]:
306
+ """
307
+ A nested block containing configuration options for MySQL connections.
308
+ """
309
+ return pulumi.get(self, "mysql")
310
+
311
+ @mysql.setter
312
+ def mysql(self, value: Optional[pulumi.Input['SecretBackendConnectionMysqlArgs']]):
313
+ pulumi.set(self, "mysql", value)
314
+
315
+ @_builtins.property
316
+ @pulumi.getter(name="mysqlAurora")
317
+ def mysql_aurora(self) -> Optional[pulumi.Input['SecretBackendConnectionMysqlAuroraArgs']]:
318
+ """
319
+ A nested block containing configuration options for Aurora MySQL connections.
320
+ """
321
+ return pulumi.get(self, "mysql_aurora")
322
+
323
+ @mysql_aurora.setter
324
+ def mysql_aurora(self, value: Optional[pulumi.Input['SecretBackendConnectionMysqlAuroraArgs']]):
325
+ pulumi.set(self, "mysql_aurora", value)
326
+
327
+ @_builtins.property
328
+ @pulumi.getter(name="mysqlLegacy")
329
+ def mysql_legacy(self) -> Optional[pulumi.Input['SecretBackendConnectionMysqlLegacyArgs']]:
330
+ """
331
+ A nested block containing configuration options for legacy MySQL connections.
332
+ """
333
+ return pulumi.get(self, "mysql_legacy")
334
+
335
+ @mysql_legacy.setter
336
+ def mysql_legacy(self, value: Optional[pulumi.Input['SecretBackendConnectionMysqlLegacyArgs']]):
337
+ pulumi.set(self, "mysql_legacy", value)
338
+
339
+ @_builtins.property
340
+ @pulumi.getter(name="mysqlRds")
341
+ def mysql_rds(self) -> Optional[pulumi.Input['SecretBackendConnectionMysqlRdsArgs']]:
342
+ """
343
+ A nested block containing configuration options for RDS MySQL connections.
344
+ """
345
+ return pulumi.get(self, "mysql_rds")
346
+
347
+ @mysql_rds.setter
348
+ def mysql_rds(self, value: Optional[pulumi.Input['SecretBackendConnectionMysqlRdsArgs']]):
349
+ pulumi.set(self, "mysql_rds", value)
350
+
351
+ @_builtins.property
352
+ @pulumi.getter
353
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
354
+ """
355
+ A unique name to give the database connection.
356
+ """
357
+ return pulumi.get(self, "name")
358
+
359
+ @name.setter
360
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
361
+ pulumi.set(self, "name", value)
362
+
363
+ @_builtins.property
364
+ @pulumi.getter
365
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
366
+ """
367
+ The namespace to provision the resource in.
368
+ The value should not contain leading or trailing forward slashes.
369
+ The `namespace` is always relative to the provider's configured namespace.
370
+ *Available only for Vault Enterprise*.
371
+ """
372
+ return pulumi.get(self, "namespace")
373
+
374
+ @namespace.setter
375
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
376
+ pulumi.set(self, "namespace", value)
377
+
378
+ @_builtins.property
379
+ @pulumi.getter
380
+ def oracle(self) -> Optional[pulumi.Input['SecretBackendConnectionOracleArgs']]:
381
+ """
382
+ A nested block containing configuration options for Oracle connections.
383
+ """
384
+ return pulumi.get(self, "oracle")
385
+
386
+ @oracle.setter
387
+ def oracle(self, value: Optional[pulumi.Input['SecretBackendConnectionOracleArgs']]):
388
+ pulumi.set(self, "oracle", value)
389
+
390
+ @_builtins.property
391
+ @pulumi.getter(name="pluginName")
392
+ def plugin_name(self) -> Optional[pulumi.Input[_builtins.str]]:
393
+ """
394
+ Specifies the name of the plugin to use.
395
+ """
396
+ return pulumi.get(self, "plugin_name")
397
+
398
+ @plugin_name.setter
399
+ def plugin_name(self, value: Optional[pulumi.Input[_builtins.str]]):
400
+ pulumi.set(self, "plugin_name", value)
401
+
402
+ @_builtins.property
403
+ @pulumi.getter
404
+ def postgresql(self) -> Optional[pulumi.Input['SecretBackendConnectionPostgresqlArgs']]:
405
+ """
406
+ A nested block containing configuration options for PostgreSQL connections.
407
+ """
408
+ return pulumi.get(self, "postgresql")
409
+
410
+ @postgresql.setter
411
+ def postgresql(self, value: Optional[pulumi.Input['SecretBackendConnectionPostgresqlArgs']]):
412
+ pulumi.set(self, "postgresql", value)
413
+
414
+ @_builtins.property
415
+ @pulumi.getter
416
+ def redis(self) -> Optional[pulumi.Input['SecretBackendConnectionRedisArgs']]:
417
+ """
418
+ A nested block containing configuration options for Redis connections.
419
+ """
420
+ return pulumi.get(self, "redis")
421
+
422
+ @redis.setter
423
+ def redis(self, value: Optional[pulumi.Input['SecretBackendConnectionRedisArgs']]):
424
+ pulumi.set(self, "redis", value)
425
+
426
+ @_builtins.property
427
+ @pulumi.getter(name="redisElasticache")
428
+ def redis_elasticache(self) -> Optional[pulumi.Input['SecretBackendConnectionRedisElasticacheArgs']]:
429
+ """
430
+ A nested block containing configuration options for Redis ElastiCache connections.
431
+
432
+ Exactly one of the nested blocks of configuration options must be supplied.
433
+ """
434
+ return pulumi.get(self, "redis_elasticache")
435
+
436
+ @redis_elasticache.setter
437
+ def redis_elasticache(self, value: Optional[pulumi.Input['SecretBackendConnectionRedisElasticacheArgs']]):
438
+ pulumi.set(self, "redis_elasticache", value)
439
+
440
+ @_builtins.property
441
+ @pulumi.getter
442
+ def redshift(self) -> Optional[pulumi.Input['SecretBackendConnectionRedshiftArgs']]:
443
+ """
444
+ Connection parameters for the redshift-database-plugin plugin.
445
+ """
446
+ return pulumi.get(self, "redshift")
447
+
448
+ @redshift.setter
449
+ def redshift(self, value: Optional[pulumi.Input['SecretBackendConnectionRedshiftArgs']]):
450
+ pulumi.set(self, "redshift", value)
451
+
452
+ @_builtins.property
453
+ @pulumi.getter(name="rootRotationStatements")
454
+ def root_rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
455
+ """
456
+ A list of database statements to be executed to rotate the root user's credentials.
457
+ """
458
+ return pulumi.get(self, "root_rotation_statements")
459
+
460
+ @root_rotation_statements.setter
461
+ def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
462
+ pulumi.set(self, "root_rotation_statements", value)
463
+
464
+ @_builtins.property
465
+ @pulumi.getter(name="rotationPeriod")
466
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
467
+ """
468
+ The amount of time in seconds Vault should wait before rotating the root credential.
469
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
470
+ """
471
+ return pulumi.get(self, "rotation_period")
472
+
473
+ @rotation_period.setter
474
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
475
+ pulumi.set(self, "rotation_period", value)
476
+
477
+ @_builtins.property
478
+ @pulumi.getter(name="rotationSchedule")
479
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
480
+ """
481
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
482
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
483
+ """
484
+ return pulumi.get(self, "rotation_schedule")
485
+
486
+ @rotation_schedule.setter
487
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
488
+ pulumi.set(self, "rotation_schedule", value)
489
+
490
+ @_builtins.property
491
+ @pulumi.getter(name="rotationWindow")
492
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
493
+ """
494
+ The maximum amount of time in seconds allowed to complete
495
+ a rotation when a scheduled token rotation occurs. The default rotation window is
496
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
497
+ """
498
+ return pulumi.get(self, "rotation_window")
499
+
500
+ @rotation_window.setter
501
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
502
+ pulumi.set(self, "rotation_window", value)
503
+
504
+ @_builtins.property
505
+ @pulumi.getter
506
+ def snowflake(self) -> Optional[pulumi.Input['SecretBackendConnectionSnowflakeArgs']]:
507
+ """
508
+ A nested block containing configuration options for Snowflake connections.
509
+ """
510
+ return pulumi.get(self, "snowflake")
511
+
512
+ @snowflake.setter
513
+ def snowflake(self, value: Optional[pulumi.Input['SecretBackendConnectionSnowflakeArgs']]):
514
+ pulumi.set(self, "snowflake", value)
515
+
516
+ @_builtins.property
517
+ @pulumi.getter(name="verifyConnection")
518
+ def verify_connection(self) -> Optional[pulumi.Input[_builtins.bool]]:
519
+ """
520
+ Whether the connection should be verified on
521
+ initial configuration or not.
522
+ """
523
+ return pulumi.get(self, "verify_connection")
524
+
525
+ @verify_connection.setter
526
+ def verify_connection(self, value: Optional[pulumi.Input[_builtins.bool]]):
527
+ pulumi.set(self, "verify_connection", value)
528
+
529
+
530
+ @pulumi.input_type
531
+ class _SecretBackendConnectionState:
532
+ def __init__(__self__, *,
533
+ allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
534
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
535
+ cassandra: Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']] = None,
536
+ couchbase: Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']] = None,
537
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
538
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
539
+ elasticsearch: Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']] = None,
540
+ hana: Optional[pulumi.Input['SecretBackendConnectionHanaArgs']] = None,
541
+ influxdb: Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']] = None,
542
+ mongodb: Optional[pulumi.Input['SecretBackendConnectionMongodbArgs']] = None,
543
+ mongodbatlas: Optional[pulumi.Input['SecretBackendConnectionMongodbatlasArgs']] = None,
544
+ mssql: Optional[pulumi.Input['SecretBackendConnectionMssqlArgs']] = None,
545
+ mysql: Optional[pulumi.Input['SecretBackendConnectionMysqlArgs']] = None,
546
+ mysql_aurora: Optional[pulumi.Input['SecretBackendConnectionMysqlAuroraArgs']] = None,
547
+ mysql_legacy: Optional[pulumi.Input['SecretBackendConnectionMysqlLegacyArgs']] = None,
548
+ mysql_rds: Optional[pulumi.Input['SecretBackendConnectionMysqlRdsArgs']] = None,
549
+ name: Optional[pulumi.Input[_builtins.str]] = None,
550
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
551
+ oracle: Optional[pulumi.Input['SecretBackendConnectionOracleArgs']] = None,
552
+ plugin_name: Optional[pulumi.Input[_builtins.str]] = None,
553
+ postgresql: Optional[pulumi.Input['SecretBackendConnectionPostgresqlArgs']] = None,
554
+ redis: Optional[pulumi.Input['SecretBackendConnectionRedisArgs']] = None,
555
+ redis_elasticache: Optional[pulumi.Input['SecretBackendConnectionRedisElasticacheArgs']] = None,
556
+ redshift: Optional[pulumi.Input['SecretBackendConnectionRedshiftArgs']] = None,
557
+ root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
558
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
559
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
560
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
561
+ snowflake: Optional[pulumi.Input['SecretBackendConnectionSnowflakeArgs']] = None,
562
+ verify_connection: Optional[pulumi.Input[_builtins.bool]] = None):
563
+ """
564
+ Input properties used for looking up and filtering SecretBackendConnection resources.
565
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_roles: A list of roles that are allowed to use this
566
+ connection.
567
+ :param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
568
+ :param pulumi.Input['SecretBackendConnectionCassandraArgs'] cassandra: A nested block containing configuration options for Cassandra connections.
569
+ :param pulumi.Input['SecretBackendConnectionCouchbaseArgs'] couchbase: A nested block containing configuration options for Couchbase connections.
570
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
571
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
572
+ :param pulumi.Input['SecretBackendConnectionElasticsearchArgs'] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
573
+ :param pulumi.Input['SecretBackendConnectionHanaArgs'] hana: A nested block containing configuration options for SAP HanaDB connections.
574
+ :param pulumi.Input['SecretBackendConnectionInfluxdbArgs'] influxdb: A nested block containing configuration options for InfluxDB connections.
575
+ :param pulumi.Input['SecretBackendConnectionMongodbArgs'] mongodb: A nested block containing configuration options for MongoDB connections.
576
+ :param pulumi.Input['SecretBackendConnectionMongodbatlasArgs'] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
577
+ :param pulumi.Input['SecretBackendConnectionMssqlArgs'] mssql: A nested block containing configuration options for MSSQL connections.
578
+ :param pulumi.Input['SecretBackendConnectionMysqlArgs'] mysql: A nested block containing configuration options for MySQL connections.
579
+ :param pulumi.Input['SecretBackendConnectionMysqlAuroraArgs'] mysql_aurora: A nested block containing configuration options for Aurora MySQL connections.
580
+ :param pulumi.Input['SecretBackendConnectionMysqlLegacyArgs'] mysql_legacy: A nested block containing configuration options for legacy MySQL connections.
581
+ :param pulumi.Input['SecretBackendConnectionMysqlRdsArgs'] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
582
+ :param pulumi.Input[_builtins.str] name: A unique name to give the database connection.
583
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
584
+ The value should not contain leading or trailing forward slashes.
585
+ The `namespace` is always relative to the provider's configured namespace.
586
+ *Available only for Vault Enterprise*.
587
+ :param pulumi.Input['SecretBackendConnectionOracleArgs'] oracle: A nested block containing configuration options for Oracle connections.
588
+ :param pulumi.Input[_builtins.str] plugin_name: Specifies the name of the plugin to use.
589
+ :param pulumi.Input['SecretBackendConnectionPostgresqlArgs'] postgresql: A nested block containing configuration options for PostgreSQL connections.
590
+ :param pulumi.Input['SecretBackendConnectionRedisArgs'] redis: A nested block containing configuration options for Redis connections.
591
+ :param pulumi.Input['SecretBackendConnectionRedisElasticacheArgs'] redis_elasticache: A nested block containing configuration options for Redis ElastiCache connections.
592
+
593
+ Exactly one of the nested blocks of configuration options must be supplied.
594
+ :param pulumi.Input['SecretBackendConnectionRedshiftArgs'] redshift: Connection parameters for the redshift-database-plugin plugin.
595
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
596
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
597
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
598
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
599
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
600
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
601
+ a rotation when a scheduled token rotation occurs. The default rotation window is
602
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
603
+ :param pulumi.Input['SecretBackendConnectionSnowflakeArgs'] snowflake: A nested block containing configuration options for Snowflake connections.
604
+ :param pulumi.Input[_builtins.bool] verify_connection: Whether the connection should be verified on
605
+ initial configuration or not.
606
+ """
607
+ if allowed_roles is not None:
608
+ pulumi.set(__self__, "allowed_roles", allowed_roles)
609
+ if backend is not None:
610
+ pulumi.set(__self__, "backend", backend)
611
+ if cassandra is not None:
612
+ pulumi.set(__self__, "cassandra", cassandra)
613
+ if couchbase is not None:
614
+ pulumi.set(__self__, "couchbase", couchbase)
615
+ if data is not None:
616
+ pulumi.set(__self__, "data", data)
617
+ if disable_automated_rotation is not None:
618
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
619
+ if elasticsearch is not None:
620
+ pulumi.set(__self__, "elasticsearch", elasticsearch)
621
+ if hana is not None:
622
+ pulumi.set(__self__, "hana", hana)
623
+ if influxdb is not None:
624
+ pulumi.set(__self__, "influxdb", influxdb)
625
+ if mongodb is not None:
626
+ pulumi.set(__self__, "mongodb", mongodb)
627
+ if mongodbatlas is not None:
628
+ pulumi.set(__self__, "mongodbatlas", mongodbatlas)
629
+ if mssql is not None:
630
+ pulumi.set(__self__, "mssql", mssql)
631
+ if mysql is not None:
632
+ pulumi.set(__self__, "mysql", mysql)
633
+ if mysql_aurora is not None:
634
+ pulumi.set(__self__, "mysql_aurora", mysql_aurora)
635
+ if mysql_legacy is not None:
636
+ pulumi.set(__self__, "mysql_legacy", mysql_legacy)
637
+ if mysql_rds is not None:
638
+ pulumi.set(__self__, "mysql_rds", mysql_rds)
639
+ if name is not None:
640
+ pulumi.set(__self__, "name", name)
641
+ if namespace is not None:
642
+ pulumi.set(__self__, "namespace", namespace)
643
+ if oracle is not None:
644
+ pulumi.set(__self__, "oracle", oracle)
645
+ if plugin_name is not None:
646
+ pulumi.set(__self__, "plugin_name", plugin_name)
647
+ if postgresql is not None:
648
+ pulumi.set(__self__, "postgresql", postgresql)
649
+ if redis is not None:
650
+ pulumi.set(__self__, "redis", redis)
651
+ if redis_elasticache is not None:
652
+ pulumi.set(__self__, "redis_elasticache", redis_elasticache)
653
+ if redshift is not None:
654
+ pulumi.set(__self__, "redshift", redshift)
655
+ if root_rotation_statements is not None:
656
+ pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
657
+ if rotation_period is not None:
658
+ pulumi.set(__self__, "rotation_period", rotation_period)
659
+ if rotation_schedule is not None:
660
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
661
+ if rotation_window is not None:
662
+ pulumi.set(__self__, "rotation_window", rotation_window)
663
+ if snowflake is not None:
664
+ pulumi.set(__self__, "snowflake", snowflake)
665
+ if verify_connection is not None:
666
+ pulumi.set(__self__, "verify_connection", verify_connection)
667
+
668
+ @_builtins.property
669
+ @pulumi.getter(name="allowedRoles")
670
+ def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
671
+ """
672
+ A list of roles that are allowed to use this
673
+ connection.
674
+ """
675
+ return pulumi.get(self, "allowed_roles")
676
+
677
+ @allowed_roles.setter
678
+ def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
679
+ pulumi.set(self, "allowed_roles", value)
680
+
681
+ @_builtins.property
682
+ @pulumi.getter
683
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
684
+ """
685
+ The unique name of the Vault mount to configure.
686
+ """
687
+ return pulumi.get(self, "backend")
688
+
689
+ @backend.setter
690
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
691
+ pulumi.set(self, "backend", value)
692
+
693
+ @_builtins.property
694
+ @pulumi.getter
695
+ def cassandra(self) -> Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']]:
696
+ """
697
+ A nested block containing configuration options for Cassandra connections.
698
+ """
699
+ return pulumi.get(self, "cassandra")
700
+
701
+ @cassandra.setter
702
+ def cassandra(self, value: Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']]):
703
+ pulumi.set(self, "cassandra", value)
704
+
705
+ @_builtins.property
706
+ @pulumi.getter
707
+ def couchbase(self) -> Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']]:
708
+ """
709
+ A nested block containing configuration options for Couchbase connections.
710
+ """
711
+ return pulumi.get(self, "couchbase")
712
+
713
+ @couchbase.setter
714
+ def couchbase(self, value: Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']]):
715
+ pulumi.set(self, "couchbase", value)
716
+
717
+ @_builtins.property
718
+ @pulumi.getter
719
+ def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
720
+ """
721
+ A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
722
+ """
723
+ return pulumi.get(self, "data")
724
+
725
+ @data.setter
726
+ def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
727
+ pulumi.set(self, "data", value)
728
+
729
+ @_builtins.property
730
+ @pulumi.getter(name="disableAutomatedRotation")
731
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
732
+ """
733
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
734
+ """
735
+ return pulumi.get(self, "disable_automated_rotation")
736
+
737
+ @disable_automated_rotation.setter
738
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
739
+ pulumi.set(self, "disable_automated_rotation", value)
740
+
741
+ @_builtins.property
742
+ @pulumi.getter
743
+ def elasticsearch(self) -> Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']]:
744
+ """
745
+ A nested block containing configuration options for Elasticsearch connections.
746
+ """
747
+ return pulumi.get(self, "elasticsearch")
748
+
749
+ @elasticsearch.setter
750
+ def elasticsearch(self, value: Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']]):
751
+ pulumi.set(self, "elasticsearch", value)
752
+
753
+ @_builtins.property
754
+ @pulumi.getter
755
+ def hana(self) -> Optional[pulumi.Input['SecretBackendConnectionHanaArgs']]:
756
+ """
757
+ A nested block containing configuration options for SAP HanaDB connections.
758
+ """
759
+ return pulumi.get(self, "hana")
760
+
761
+ @hana.setter
762
+ def hana(self, value: Optional[pulumi.Input['SecretBackendConnectionHanaArgs']]):
763
+ pulumi.set(self, "hana", value)
764
+
765
+ @_builtins.property
766
+ @pulumi.getter
767
+ def influxdb(self) -> Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']]:
768
+ """
769
+ A nested block containing configuration options for InfluxDB connections.
770
+ """
771
+ return pulumi.get(self, "influxdb")
772
+
773
+ @influxdb.setter
774
+ def influxdb(self, value: Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']]):
775
+ pulumi.set(self, "influxdb", value)
776
+
777
+ @_builtins.property
778
+ @pulumi.getter
779
+ def mongodb(self) -> Optional[pulumi.Input['SecretBackendConnectionMongodbArgs']]:
780
+ """
781
+ A nested block containing configuration options for MongoDB connections.
782
+ """
783
+ return pulumi.get(self, "mongodb")
784
+
785
+ @mongodb.setter
786
+ def mongodb(self, value: Optional[pulumi.Input['SecretBackendConnectionMongodbArgs']]):
787
+ pulumi.set(self, "mongodb", value)
788
+
789
+ @_builtins.property
790
+ @pulumi.getter
791
+ def mongodbatlas(self) -> Optional[pulumi.Input['SecretBackendConnectionMongodbatlasArgs']]:
792
+ """
793
+ A nested block containing configuration options for MongoDB Atlas connections.
794
+ """
795
+ return pulumi.get(self, "mongodbatlas")
796
+
797
+ @mongodbatlas.setter
798
+ def mongodbatlas(self, value: Optional[pulumi.Input['SecretBackendConnectionMongodbatlasArgs']]):
799
+ pulumi.set(self, "mongodbatlas", value)
800
+
801
+ @_builtins.property
802
+ @pulumi.getter
803
+ def mssql(self) -> Optional[pulumi.Input['SecretBackendConnectionMssqlArgs']]:
804
+ """
805
+ A nested block containing configuration options for MSSQL connections.
806
+ """
807
+ return pulumi.get(self, "mssql")
808
+
809
+ @mssql.setter
810
+ def mssql(self, value: Optional[pulumi.Input['SecretBackendConnectionMssqlArgs']]):
811
+ pulumi.set(self, "mssql", value)
812
+
813
+ @_builtins.property
814
+ @pulumi.getter
815
+ def mysql(self) -> Optional[pulumi.Input['SecretBackendConnectionMysqlArgs']]:
816
+ """
817
+ A nested block containing configuration options for MySQL connections.
818
+ """
819
+ return pulumi.get(self, "mysql")
820
+
821
+ @mysql.setter
822
+ def mysql(self, value: Optional[pulumi.Input['SecretBackendConnectionMysqlArgs']]):
823
+ pulumi.set(self, "mysql", value)
824
+
825
+ @_builtins.property
826
+ @pulumi.getter(name="mysqlAurora")
827
+ def mysql_aurora(self) -> Optional[pulumi.Input['SecretBackendConnectionMysqlAuroraArgs']]:
828
+ """
829
+ A nested block containing configuration options for Aurora MySQL connections.
830
+ """
831
+ return pulumi.get(self, "mysql_aurora")
832
+
833
+ @mysql_aurora.setter
834
+ def mysql_aurora(self, value: Optional[pulumi.Input['SecretBackendConnectionMysqlAuroraArgs']]):
835
+ pulumi.set(self, "mysql_aurora", value)
836
+
837
+ @_builtins.property
838
+ @pulumi.getter(name="mysqlLegacy")
839
+ def mysql_legacy(self) -> Optional[pulumi.Input['SecretBackendConnectionMysqlLegacyArgs']]:
840
+ """
841
+ A nested block containing configuration options for legacy MySQL connections.
842
+ """
843
+ return pulumi.get(self, "mysql_legacy")
844
+
845
+ @mysql_legacy.setter
846
+ def mysql_legacy(self, value: Optional[pulumi.Input['SecretBackendConnectionMysqlLegacyArgs']]):
847
+ pulumi.set(self, "mysql_legacy", value)
848
+
849
+ @_builtins.property
850
+ @pulumi.getter(name="mysqlRds")
851
+ def mysql_rds(self) -> Optional[pulumi.Input['SecretBackendConnectionMysqlRdsArgs']]:
852
+ """
853
+ A nested block containing configuration options for RDS MySQL connections.
854
+ """
855
+ return pulumi.get(self, "mysql_rds")
856
+
857
+ @mysql_rds.setter
858
+ def mysql_rds(self, value: Optional[pulumi.Input['SecretBackendConnectionMysqlRdsArgs']]):
859
+ pulumi.set(self, "mysql_rds", value)
860
+
861
+ @_builtins.property
862
+ @pulumi.getter
863
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
864
+ """
865
+ A unique name to give the database connection.
866
+ """
867
+ return pulumi.get(self, "name")
868
+
869
+ @name.setter
870
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
871
+ pulumi.set(self, "name", value)
872
+
873
+ @_builtins.property
874
+ @pulumi.getter
875
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
876
+ """
877
+ The namespace to provision the resource in.
878
+ The value should not contain leading or trailing forward slashes.
879
+ The `namespace` is always relative to the provider's configured namespace.
880
+ *Available only for Vault Enterprise*.
881
+ """
882
+ return pulumi.get(self, "namespace")
883
+
884
+ @namespace.setter
885
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
886
+ pulumi.set(self, "namespace", value)
887
+
888
+ @_builtins.property
889
+ @pulumi.getter
890
+ def oracle(self) -> Optional[pulumi.Input['SecretBackendConnectionOracleArgs']]:
891
+ """
892
+ A nested block containing configuration options for Oracle connections.
893
+ """
894
+ return pulumi.get(self, "oracle")
895
+
896
+ @oracle.setter
897
+ def oracle(self, value: Optional[pulumi.Input['SecretBackendConnectionOracleArgs']]):
898
+ pulumi.set(self, "oracle", value)
899
+
900
+ @_builtins.property
901
+ @pulumi.getter(name="pluginName")
902
+ def plugin_name(self) -> Optional[pulumi.Input[_builtins.str]]:
903
+ """
904
+ Specifies the name of the plugin to use.
905
+ """
906
+ return pulumi.get(self, "plugin_name")
907
+
908
+ @plugin_name.setter
909
+ def plugin_name(self, value: Optional[pulumi.Input[_builtins.str]]):
910
+ pulumi.set(self, "plugin_name", value)
911
+
912
+ @_builtins.property
913
+ @pulumi.getter
914
+ def postgresql(self) -> Optional[pulumi.Input['SecretBackendConnectionPostgresqlArgs']]:
915
+ """
916
+ A nested block containing configuration options for PostgreSQL connections.
917
+ """
918
+ return pulumi.get(self, "postgresql")
919
+
920
+ @postgresql.setter
921
+ def postgresql(self, value: Optional[pulumi.Input['SecretBackendConnectionPostgresqlArgs']]):
922
+ pulumi.set(self, "postgresql", value)
923
+
924
+ @_builtins.property
925
+ @pulumi.getter
926
+ def redis(self) -> Optional[pulumi.Input['SecretBackendConnectionRedisArgs']]:
927
+ """
928
+ A nested block containing configuration options for Redis connections.
929
+ """
930
+ return pulumi.get(self, "redis")
931
+
932
+ @redis.setter
933
+ def redis(self, value: Optional[pulumi.Input['SecretBackendConnectionRedisArgs']]):
934
+ pulumi.set(self, "redis", value)
935
+
936
+ @_builtins.property
937
+ @pulumi.getter(name="redisElasticache")
938
+ def redis_elasticache(self) -> Optional[pulumi.Input['SecretBackendConnectionRedisElasticacheArgs']]:
939
+ """
940
+ A nested block containing configuration options for Redis ElastiCache connections.
941
+
942
+ Exactly one of the nested blocks of configuration options must be supplied.
943
+ """
944
+ return pulumi.get(self, "redis_elasticache")
945
+
946
+ @redis_elasticache.setter
947
+ def redis_elasticache(self, value: Optional[pulumi.Input['SecretBackendConnectionRedisElasticacheArgs']]):
948
+ pulumi.set(self, "redis_elasticache", value)
949
+
950
+ @_builtins.property
951
+ @pulumi.getter
952
+ def redshift(self) -> Optional[pulumi.Input['SecretBackendConnectionRedshiftArgs']]:
953
+ """
954
+ Connection parameters for the redshift-database-plugin plugin.
955
+ """
956
+ return pulumi.get(self, "redshift")
957
+
958
+ @redshift.setter
959
+ def redshift(self, value: Optional[pulumi.Input['SecretBackendConnectionRedshiftArgs']]):
960
+ pulumi.set(self, "redshift", value)
961
+
962
+ @_builtins.property
963
+ @pulumi.getter(name="rootRotationStatements")
964
+ def root_rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
965
+ """
966
+ A list of database statements to be executed to rotate the root user's credentials.
967
+ """
968
+ return pulumi.get(self, "root_rotation_statements")
969
+
970
+ @root_rotation_statements.setter
971
+ def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
972
+ pulumi.set(self, "root_rotation_statements", value)
973
+
974
+ @_builtins.property
975
+ @pulumi.getter(name="rotationPeriod")
976
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
977
+ """
978
+ The amount of time in seconds Vault should wait before rotating the root credential.
979
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
980
+ """
981
+ return pulumi.get(self, "rotation_period")
982
+
983
+ @rotation_period.setter
984
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
985
+ pulumi.set(self, "rotation_period", value)
986
+
987
+ @_builtins.property
988
+ @pulumi.getter(name="rotationSchedule")
989
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
990
+ """
991
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
992
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
993
+ """
994
+ return pulumi.get(self, "rotation_schedule")
995
+
996
+ @rotation_schedule.setter
997
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
998
+ pulumi.set(self, "rotation_schedule", value)
999
+
1000
+ @_builtins.property
1001
+ @pulumi.getter(name="rotationWindow")
1002
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
1003
+ """
1004
+ The maximum amount of time in seconds allowed to complete
1005
+ a rotation when a scheduled token rotation occurs. The default rotation window is
1006
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
1007
+ """
1008
+ return pulumi.get(self, "rotation_window")
1009
+
1010
+ @rotation_window.setter
1011
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
1012
+ pulumi.set(self, "rotation_window", value)
1013
+
1014
+ @_builtins.property
1015
+ @pulumi.getter
1016
+ def snowflake(self) -> Optional[pulumi.Input['SecretBackendConnectionSnowflakeArgs']]:
1017
+ """
1018
+ A nested block containing configuration options for Snowflake connections.
1019
+ """
1020
+ return pulumi.get(self, "snowflake")
1021
+
1022
+ @snowflake.setter
1023
+ def snowflake(self, value: Optional[pulumi.Input['SecretBackendConnectionSnowflakeArgs']]):
1024
+ pulumi.set(self, "snowflake", value)
1025
+
1026
+ @_builtins.property
1027
+ @pulumi.getter(name="verifyConnection")
1028
+ def verify_connection(self) -> Optional[pulumi.Input[_builtins.bool]]:
1029
+ """
1030
+ Whether the connection should be verified on
1031
+ initial configuration or not.
1032
+ """
1033
+ return pulumi.get(self, "verify_connection")
1034
+
1035
+ @verify_connection.setter
1036
+ def verify_connection(self, value: Optional[pulumi.Input[_builtins.bool]]):
1037
+ pulumi.set(self, "verify_connection", value)
1038
+
1039
+
1040
+ @pulumi.type_token("vault:database/secretBackendConnection:SecretBackendConnection")
1041
+ class SecretBackendConnection(pulumi.CustomResource):
1042
+ @overload
1043
+ def __init__(__self__,
1044
+ resource_name: str,
1045
+ opts: Optional[pulumi.ResourceOptions] = None,
1046
+ allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1047
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
1048
+ cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
1049
+ couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
1050
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1051
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1052
+ elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
1053
+ hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
1054
+ influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
1055
+ mongodb: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbArgs', 'SecretBackendConnectionMongodbArgsDict']]] = None,
1056
+ mongodbatlas: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbatlasArgs', 'SecretBackendConnectionMongodbatlasArgsDict']]] = None,
1057
+ mssql: Optional[pulumi.Input[Union['SecretBackendConnectionMssqlArgs', 'SecretBackendConnectionMssqlArgsDict']]] = None,
1058
+ mysql: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlArgs', 'SecretBackendConnectionMysqlArgsDict']]] = None,
1059
+ mysql_aurora: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']]] = None,
1060
+ mysql_legacy: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']]] = None,
1061
+ mysql_rds: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']]] = None,
1062
+ name: Optional[pulumi.Input[_builtins.str]] = None,
1063
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1064
+ oracle: Optional[pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']]] = None,
1065
+ plugin_name: Optional[pulumi.Input[_builtins.str]] = None,
1066
+ postgresql: Optional[pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']]] = None,
1067
+ redis: Optional[pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']]] = None,
1068
+ redis_elasticache: Optional[pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']]] = None,
1069
+ redshift: Optional[pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']]] = None,
1070
+ root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1071
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
1072
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
1073
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1074
+ snowflake: Optional[pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']]] = None,
1075
+ verify_connection: Optional[pulumi.Input[_builtins.bool]] = None,
1076
+ __props__=None):
1077
+ """
1078
+ ## Example Usage
1079
+
1080
+ ```python
1081
+ import pulumi
1082
+ import pulumi_vault as vault
1083
+
1084
+ db = vault.Mount("db",
1085
+ path="postgres",
1086
+ type="database")
1087
+ postgres = vault.database.SecretBackendConnection("postgres",
1088
+ backend=db.path,
1089
+ name="postgres",
1090
+ allowed_roles=[
1091
+ "dev",
1092
+ "prod",
1093
+ ],
1094
+ rotation_schedule="0 * * * SAT",
1095
+ rotation_window=3600,
1096
+ postgresql={
1097
+ "connection_url": "postgres://username:password@host:port/database",
1098
+ })
1099
+ ```
1100
+
1101
+ ## Ephemeral Attributes Reference
1102
+
1103
+ The following write-only attributes are supported for all DBs that support username/password:
1104
+
1105
+ * `password_wo` - (Optional) The password for the user. Can be updated.
1106
+ **Note**: This property is write-only and will not be read from the API.
1107
+
1108
+ The following write-only attribute is supported only for Snowflake DB:
1109
+
1110
+ * `private_key_wo` - (Optional) The private key associated with the Snowflake user.
1111
+ **Note**: This property is write-only and will not be read from the API.
1112
+
1113
+ ## Import
1114
+
1115
+ Database secret backend connections can be imported using the `backend`, `/config/`, and the `name` e.g.
1116
+
1117
+ ```sh
1118
+ $ pulumi import vault:database/secretBackendConnection:SecretBackendConnection example postgres/config/postgres
1119
+ ```
1120
+
1121
+ :param str resource_name: The name of the resource.
1122
+ :param pulumi.ResourceOptions opts: Options for the resource.
1123
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_roles: A list of roles that are allowed to use this
1124
+ connection.
1125
+ :param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
1126
+ :param pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']] cassandra: A nested block containing configuration options for Cassandra connections.
1127
+ :param pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']] couchbase: A nested block containing configuration options for Couchbase connections.
1128
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
1129
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1130
+ :param pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
1131
+ :param pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']] hana: A nested block containing configuration options for SAP HanaDB connections.
1132
+ :param pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']] influxdb: A nested block containing configuration options for InfluxDB connections.
1133
+ :param pulumi.Input[Union['SecretBackendConnectionMongodbArgs', 'SecretBackendConnectionMongodbArgsDict']] mongodb: A nested block containing configuration options for MongoDB connections.
1134
+ :param pulumi.Input[Union['SecretBackendConnectionMongodbatlasArgs', 'SecretBackendConnectionMongodbatlasArgsDict']] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
1135
+ :param pulumi.Input[Union['SecretBackendConnectionMssqlArgs', 'SecretBackendConnectionMssqlArgsDict']] mssql: A nested block containing configuration options for MSSQL connections.
1136
+ :param pulumi.Input[Union['SecretBackendConnectionMysqlArgs', 'SecretBackendConnectionMysqlArgsDict']] mysql: A nested block containing configuration options for MySQL connections.
1137
+ :param pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']] mysql_aurora: A nested block containing configuration options for Aurora MySQL connections.
1138
+ :param pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']] mysql_legacy: A nested block containing configuration options for legacy MySQL connections.
1139
+ :param pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
1140
+ :param pulumi.Input[_builtins.str] name: A unique name to give the database connection.
1141
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1142
+ The value should not contain leading or trailing forward slashes.
1143
+ The `namespace` is always relative to the provider's configured namespace.
1144
+ *Available only for Vault Enterprise*.
1145
+ :param pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']] oracle: A nested block containing configuration options for Oracle connections.
1146
+ :param pulumi.Input[_builtins.str] plugin_name: Specifies the name of the plugin to use.
1147
+ :param pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']] postgresql: A nested block containing configuration options for PostgreSQL connections.
1148
+ :param pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']] redis: A nested block containing configuration options for Redis connections.
1149
+ :param pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']] redis_elasticache: A nested block containing configuration options for Redis ElastiCache connections.
1150
+
1151
+ Exactly one of the nested blocks of configuration options must be supplied.
1152
+ :param pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']] redshift: Connection parameters for the redshift-database-plugin plugin.
1153
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
1154
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1155
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
1156
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1157
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
1158
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1159
+ a rotation when a scheduled token rotation occurs. The default rotation window is
1160
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
1161
+ :param pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']] snowflake: A nested block containing configuration options for Snowflake connections.
1162
+ :param pulumi.Input[_builtins.bool] verify_connection: Whether the connection should be verified on
1163
+ initial configuration or not.
1164
+ """
1165
+ ...
1166
+ @overload
1167
+ def __init__(__self__,
1168
+ resource_name: str,
1169
+ args: SecretBackendConnectionArgs,
1170
+ opts: Optional[pulumi.ResourceOptions] = None):
1171
+ """
1172
+ ## Example Usage
1173
+
1174
+ ```python
1175
+ import pulumi
1176
+ import pulumi_vault as vault
1177
+
1178
+ db = vault.Mount("db",
1179
+ path="postgres",
1180
+ type="database")
1181
+ postgres = vault.database.SecretBackendConnection("postgres",
1182
+ backend=db.path,
1183
+ name="postgres",
1184
+ allowed_roles=[
1185
+ "dev",
1186
+ "prod",
1187
+ ],
1188
+ rotation_schedule="0 * * * SAT",
1189
+ rotation_window=3600,
1190
+ postgresql={
1191
+ "connection_url": "postgres://username:password@host:port/database",
1192
+ })
1193
+ ```
1194
+
1195
+ ## Ephemeral Attributes Reference
1196
+
1197
+ The following write-only attributes are supported for all DBs that support username/password:
1198
+
1199
+ * `password_wo` - (Optional) The password for the user. Can be updated.
1200
+ **Note**: This property is write-only and will not be read from the API.
1201
+
1202
+ The following write-only attribute is supported only for Snowflake DB:
1203
+
1204
+ * `private_key_wo` - (Optional) The private key associated with the Snowflake user.
1205
+ **Note**: This property is write-only and will not be read from the API.
1206
+
1207
+ ## Import
1208
+
1209
+ Database secret backend connections can be imported using the `backend`, `/config/`, and the `name` e.g.
1210
+
1211
+ ```sh
1212
+ $ pulumi import vault:database/secretBackendConnection:SecretBackendConnection example postgres/config/postgres
1213
+ ```
1214
+
1215
+ :param str resource_name: The name of the resource.
1216
+ :param SecretBackendConnectionArgs args: The arguments to use to populate this resource's properties.
1217
+ :param pulumi.ResourceOptions opts: Options for the resource.
1218
+ """
1219
+ ...
1220
+ def __init__(__self__, resource_name: str, *args, **kwargs):
1221
+ resource_args, opts = _utilities.get_resource_args_opts(SecretBackendConnectionArgs, pulumi.ResourceOptions, *args, **kwargs)
1222
+ if resource_args is not None:
1223
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
1224
+ else:
1225
+ __self__._internal_init(resource_name, *args, **kwargs)
1226
+
1227
+ def _internal_init(__self__,
1228
+ resource_name: str,
1229
+ opts: Optional[pulumi.ResourceOptions] = None,
1230
+ allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1231
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
1232
+ cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
1233
+ couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
1234
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1235
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1236
+ elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
1237
+ hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
1238
+ influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
1239
+ mongodb: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbArgs', 'SecretBackendConnectionMongodbArgsDict']]] = None,
1240
+ mongodbatlas: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbatlasArgs', 'SecretBackendConnectionMongodbatlasArgsDict']]] = None,
1241
+ mssql: Optional[pulumi.Input[Union['SecretBackendConnectionMssqlArgs', 'SecretBackendConnectionMssqlArgsDict']]] = None,
1242
+ mysql: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlArgs', 'SecretBackendConnectionMysqlArgsDict']]] = None,
1243
+ mysql_aurora: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']]] = None,
1244
+ mysql_legacy: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']]] = None,
1245
+ mysql_rds: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']]] = None,
1246
+ name: Optional[pulumi.Input[_builtins.str]] = None,
1247
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1248
+ oracle: Optional[pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']]] = None,
1249
+ plugin_name: Optional[pulumi.Input[_builtins.str]] = None,
1250
+ postgresql: Optional[pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']]] = None,
1251
+ redis: Optional[pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']]] = None,
1252
+ redis_elasticache: Optional[pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']]] = None,
1253
+ redshift: Optional[pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']]] = None,
1254
+ root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1255
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
1256
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
1257
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1258
+ snowflake: Optional[pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']]] = None,
1259
+ verify_connection: Optional[pulumi.Input[_builtins.bool]] = None,
1260
+ __props__=None):
1261
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
1262
+ if not isinstance(opts, pulumi.ResourceOptions):
1263
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
1264
+ if opts.id is None:
1265
+ if __props__ is not None:
1266
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
1267
+ __props__ = SecretBackendConnectionArgs.__new__(SecretBackendConnectionArgs)
1268
+
1269
+ __props__.__dict__["allowed_roles"] = allowed_roles
1270
+ if backend is None and not opts.urn:
1271
+ raise TypeError("Missing required property 'backend'")
1272
+ __props__.__dict__["backend"] = backend
1273
+ __props__.__dict__["cassandra"] = cassandra
1274
+ __props__.__dict__["couchbase"] = couchbase
1275
+ __props__.__dict__["data"] = data
1276
+ __props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
1277
+ __props__.__dict__["elasticsearch"] = elasticsearch
1278
+ __props__.__dict__["hana"] = hana
1279
+ __props__.__dict__["influxdb"] = influxdb
1280
+ __props__.__dict__["mongodb"] = mongodb
1281
+ __props__.__dict__["mongodbatlas"] = mongodbatlas
1282
+ __props__.__dict__["mssql"] = mssql
1283
+ __props__.__dict__["mysql"] = mysql
1284
+ __props__.__dict__["mysql_aurora"] = mysql_aurora
1285
+ __props__.__dict__["mysql_legacy"] = mysql_legacy
1286
+ __props__.__dict__["mysql_rds"] = mysql_rds
1287
+ __props__.__dict__["name"] = name
1288
+ __props__.__dict__["namespace"] = namespace
1289
+ __props__.__dict__["oracle"] = oracle
1290
+ __props__.__dict__["plugin_name"] = plugin_name
1291
+ __props__.__dict__["postgresql"] = postgresql
1292
+ __props__.__dict__["redis"] = redis
1293
+ __props__.__dict__["redis_elasticache"] = redis_elasticache
1294
+ __props__.__dict__["redshift"] = redshift
1295
+ __props__.__dict__["root_rotation_statements"] = root_rotation_statements
1296
+ __props__.__dict__["rotation_period"] = rotation_period
1297
+ __props__.__dict__["rotation_schedule"] = rotation_schedule
1298
+ __props__.__dict__["rotation_window"] = rotation_window
1299
+ __props__.__dict__["snowflake"] = snowflake
1300
+ __props__.__dict__["verify_connection"] = verify_connection
1301
+ super(SecretBackendConnection, __self__).__init__(
1302
+ 'vault:database/secretBackendConnection:SecretBackendConnection',
1303
+ resource_name,
1304
+ __props__,
1305
+ opts)
1306
+
1307
+ @staticmethod
1308
+ def get(resource_name: str,
1309
+ id: pulumi.Input[str],
1310
+ opts: Optional[pulumi.ResourceOptions] = None,
1311
+ allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1312
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
1313
+ cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
1314
+ couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
1315
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1316
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1317
+ elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
1318
+ hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
1319
+ influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
1320
+ mongodb: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbArgs', 'SecretBackendConnectionMongodbArgsDict']]] = None,
1321
+ mongodbatlas: Optional[pulumi.Input[Union['SecretBackendConnectionMongodbatlasArgs', 'SecretBackendConnectionMongodbatlasArgsDict']]] = None,
1322
+ mssql: Optional[pulumi.Input[Union['SecretBackendConnectionMssqlArgs', 'SecretBackendConnectionMssqlArgsDict']]] = None,
1323
+ mysql: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlArgs', 'SecretBackendConnectionMysqlArgsDict']]] = None,
1324
+ mysql_aurora: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']]] = None,
1325
+ mysql_legacy: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']]] = None,
1326
+ mysql_rds: Optional[pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']]] = None,
1327
+ name: Optional[pulumi.Input[_builtins.str]] = None,
1328
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1329
+ oracle: Optional[pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']]] = None,
1330
+ plugin_name: Optional[pulumi.Input[_builtins.str]] = None,
1331
+ postgresql: Optional[pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']]] = None,
1332
+ redis: Optional[pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']]] = None,
1333
+ redis_elasticache: Optional[pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']]] = None,
1334
+ redshift: Optional[pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']]] = None,
1335
+ root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1336
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
1337
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
1338
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1339
+ snowflake: Optional[pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']]] = None,
1340
+ verify_connection: Optional[pulumi.Input[_builtins.bool]] = None) -> 'SecretBackendConnection':
1341
+ """
1342
+ Get an existing SecretBackendConnection resource's state with the given name, id, and optional extra
1343
+ properties used to qualify the lookup.
1344
+
1345
+ :param str resource_name: The unique name of the resulting resource.
1346
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1347
+ :param pulumi.ResourceOptions opts: Options for the resource.
1348
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_roles: A list of roles that are allowed to use this
1349
+ connection.
1350
+ :param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
1351
+ :param pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']] cassandra: A nested block containing configuration options for Cassandra connections.
1352
+ :param pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']] couchbase: A nested block containing configuration options for Couchbase connections.
1353
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
1354
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1355
+ :param pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
1356
+ :param pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']] hana: A nested block containing configuration options for SAP HanaDB connections.
1357
+ :param pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']] influxdb: A nested block containing configuration options for InfluxDB connections.
1358
+ :param pulumi.Input[Union['SecretBackendConnectionMongodbArgs', 'SecretBackendConnectionMongodbArgsDict']] mongodb: A nested block containing configuration options for MongoDB connections.
1359
+ :param pulumi.Input[Union['SecretBackendConnectionMongodbatlasArgs', 'SecretBackendConnectionMongodbatlasArgsDict']] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
1360
+ :param pulumi.Input[Union['SecretBackendConnectionMssqlArgs', 'SecretBackendConnectionMssqlArgsDict']] mssql: A nested block containing configuration options for MSSQL connections.
1361
+ :param pulumi.Input[Union['SecretBackendConnectionMysqlArgs', 'SecretBackendConnectionMysqlArgsDict']] mysql: A nested block containing configuration options for MySQL connections.
1362
+ :param pulumi.Input[Union['SecretBackendConnectionMysqlAuroraArgs', 'SecretBackendConnectionMysqlAuroraArgsDict']] mysql_aurora: A nested block containing configuration options for Aurora MySQL connections.
1363
+ :param pulumi.Input[Union['SecretBackendConnectionMysqlLegacyArgs', 'SecretBackendConnectionMysqlLegacyArgsDict']] mysql_legacy: A nested block containing configuration options for legacy MySQL connections.
1364
+ :param pulumi.Input[Union['SecretBackendConnectionMysqlRdsArgs', 'SecretBackendConnectionMysqlRdsArgsDict']] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
1365
+ :param pulumi.Input[_builtins.str] name: A unique name to give the database connection.
1366
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1367
+ The value should not contain leading or trailing forward slashes.
1368
+ The `namespace` is always relative to the provider's configured namespace.
1369
+ *Available only for Vault Enterprise*.
1370
+ :param pulumi.Input[Union['SecretBackendConnectionOracleArgs', 'SecretBackendConnectionOracleArgsDict']] oracle: A nested block containing configuration options for Oracle connections.
1371
+ :param pulumi.Input[_builtins.str] plugin_name: Specifies the name of the plugin to use.
1372
+ :param pulumi.Input[Union['SecretBackendConnectionPostgresqlArgs', 'SecretBackendConnectionPostgresqlArgsDict']] postgresql: A nested block containing configuration options for PostgreSQL connections.
1373
+ :param pulumi.Input[Union['SecretBackendConnectionRedisArgs', 'SecretBackendConnectionRedisArgsDict']] redis: A nested block containing configuration options for Redis connections.
1374
+ :param pulumi.Input[Union['SecretBackendConnectionRedisElasticacheArgs', 'SecretBackendConnectionRedisElasticacheArgsDict']] redis_elasticache: A nested block containing configuration options for Redis ElastiCache connections.
1375
+
1376
+ Exactly one of the nested blocks of configuration options must be supplied.
1377
+ :param pulumi.Input[Union['SecretBackendConnectionRedshiftArgs', 'SecretBackendConnectionRedshiftArgsDict']] redshift: Connection parameters for the redshift-database-plugin plugin.
1378
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
1379
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1380
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
1381
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1382
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
1383
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1384
+ a rotation when a scheduled token rotation occurs. The default rotation window is
1385
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
1386
+ :param pulumi.Input[Union['SecretBackendConnectionSnowflakeArgs', 'SecretBackendConnectionSnowflakeArgsDict']] snowflake: A nested block containing configuration options for Snowflake connections.
1387
+ :param pulumi.Input[_builtins.bool] verify_connection: Whether the connection should be verified on
1388
+ initial configuration or not.
1389
+ """
1390
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1391
+
1392
+ __props__ = _SecretBackendConnectionState.__new__(_SecretBackendConnectionState)
1393
+
1394
+ __props__.__dict__["allowed_roles"] = allowed_roles
1395
+ __props__.__dict__["backend"] = backend
1396
+ __props__.__dict__["cassandra"] = cassandra
1397
+ __props__.__dict__["couchbase"] = couchbase
1398
+ __props__.__dict__["data"] = data
1399
+ __props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
1400
+ __props__.__dict__["elasticsearch"] = elasticsearch
1401
+ __props__.__dict__["hana"] = hana
1402
+ __props__.__dict__["influxdb"] = influxdb
1403
+ __props__.__dict__["mongodb"] = mongodb
1404
+ __props__.__dict__["mongodbatlas"] = mongodbatlas
1405
+ __props__.__dict__["mssql"] = mssql
1406
+ __props__.__dict__["mysql"] = mysql
1407
+ __props__.__dict__["mysql_aurora"] = mysql_aurora
1408
+ __props__.__dict__["mysql_legacy"] = mysql_legacy
1409
+ __props__.__dict__["mysql_rds"] = mysql_rds
1410
+ __props__.__dict__["name"] = name
1411
+ __props__.__dict__["namespace"] = namespace
1412
+ __props__.__dict__["oracle"] = oracle
1413
+ __props__.__dict__["plugin_name"] = plugin_name
1414
+ __props__.__dict__["postgresql"] = postgresql
1415
+ __props__.__dict__["redis"] = redis
1416
+ __props__.__dict__["redis_elasticache"] = redis_elasticache
1417
+ __props__.__dict__["redshift"] = redshift
1418
+ __props__.__dict__["root_rotation_statements"] = root_rotation_statements
1419
+ __props__.__dict__["rotation_period"] = rotation_period
1420
+ __props__.__dict__["rotation_schedule"] = rotation_schedule
1421
+ __props__.__dict__["rotation_window"] = rotation_window
1422
+ __props__.__dict__["snowflake"] = snowflake
1423
+ __props__.__dict__["verify_connection"] = verify_connection
1424
+ return SecretBackendConnection(resource_name, opts=opts, __props__=__props__)
1425
+
1426
+ @_builtins.property
1427
+ @pulumi.getter(name="allowedRoles")
1428
+ def allowed_roles(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1429
+ """
1430
+ A list of roles that are allowed to use this
1431
+ connection.
1432
+ """
1433
+ return pulumi.get(self, "allowed_roles")
1434
+
1435
+ @_builtins.property
1436
+ @pulumi.getter
1437
+ def backend(self) -> pulumi.Output[_builtins.str]:
1438
+ """
1439
+ The unique name of the Vault mount to configure.
1440
+ """
1441
+ return pulumi.get(self, "backend")
1442
+
1443
+ @_builtins.property
1444
+ @pulumi.getter
1445
+ def cassandra(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionCassandra']]:
1446
+ """
1447
+ A nested block containing configuration options for Cassandra connections.
1448
+ """
1449
+ return pulumi.get(self, "cassandra")
1450
+
1451
+ @_builtins.property
1452
+ @pulumi.getter
1453
+ def couchbase(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionCouchbase']]:
1454
+ """
1455
+ A nested block containing configuration options for Couchbase connections.
1456
+ """
1457
+ return pulumi.get(self, "couchbase")
1458
+
1459
+ @_builtins.property
1460
+ @pulumi.getter
1461
+ def data(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1462
+ """
1463
+ A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
1464
+ """
1465
+ return pulumi.get(self, "data")
1466
+
1467
+ @_builtins.property
1468
+ @pulumi.getter(name="disableAutomatedRotation")
1469
+ def disable_automated_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
1470
+ """
1471
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1472
+ """
1473
+ return pulumi.get(self, "disable_automated_rotation")
1474
+
1475
+ @_builtins.property
1476
+ @pulumi.getter
1477
+ def elasticsearch(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionElasticsearch']]:
1478
+ """
1479
+ A nested block containing configuration options for Elasticsearch connections.
1480
+ """
1481
+ return pulumi.get(self, "elasticsearch")
1482
+
1483
+ @_builtins.property
1484
+ @pulumi.getter
1485
+ def hana(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionHana']]:
1486
+ """
1487
+ A nested block containing configuration options for SAP HanaDB connections.
1488
+ """
1489
+ return pulumi.get(self, "hana")
1490
+
1491
+ @_builtins.property
1492
+ @pulumi.getter
1493
+ def influxdb(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionInfluxdb']]:
1494
+ """
1495
+ A nested block containing configuration options for InfluxDB connections.
1496
+ """
1497
+ return pulumi.get(self, "influxdb")
1498
+
1499
+ @_builtins.property
1500
+ @pulumi.getter
1501
+ def mongodb(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionMongodb']]:
1502
+ """
1503
+ A nested block containing configuration options for MongoDB connections.
1504
+ """
1505
+ return pulumi.get(self, "mongodb")
1506
+
1507
+ @_builtins.property
1508
+ @pulumi.getter
1509
+ def mongodbatlas(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionMongodbatlas']]:
1510
+ """
1511
+ A nested block containing configuration options for MongoDB Atlas connections.
1512
+ """
1513
+ return pulumi.get(self, "mongodbatlas")
1514
+
1515
+ @_builtins.property
1516
+ @pulumi.getter
1517
+ def mssql(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionMssql']]:
1518
+ """
1519
+ A nested block containing configuration options for MSSQL connections.
1520
+ """
1521
+ return pulumi.get(self, "mssql")
1522
+
1523
+ @_builtins.property
1524
+ @pulumi.getter
1525
+ def mysql(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionMysql']]:
1526
+ """
1527
+ A nested block containing configuration options for MySQL connections.
1528
+ """
1529
+ return pulumi.get(self, "mysql")
1530
+
1531
+ @_builtins.property
1532
+ @pulumi.getter(name="mysqlAurora")
1533
+ def mysql_aurora(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionMysqlAurora']]:
1534
+ """
1535
+ A nested block containing configuration options for Aurora MySQL connections.
1536
+ """
1537
+ return pulumi.get(self, "mysql_aurora")
1538
+
1539
+ @_builtins.property
1540
+ @pulumi.getter(name="mysqlLegacy")
1541
+ def mysql_legacy(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionMysqlLegacy']]:
1542
+ """
1543
+ A nested block containing configuration options for legacy MySQL connections.
1544
+ """
1545
+ return pulumi.get(self, "mysql_legacy")
1546
+
1547
+ @_builtins.property
1548
+ @pulumi.getter(name="mysqlRds")
1549
+ def mysql_rds(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionMysqlRds']]:
1550
+ """
1551
+ A nested block containing configuration options for RDS MySQL connections.
1552
+ """
1553
+ return pulumi.get(self, "mysql_rds")
1554
+
1555
+ @_builtins.property
1556
+ @pulumi.getter
1557
+ def name(self) -> pulumi.Output[_builtins.str]:
1558
+ """
1559
+ A unique name to give the database connection.
1560
+ """
1561
+ return pulumi.get(self, "name")
1562
+
1563
+ @_builtins.property
1564
+ @pulumi.getter
1565
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1566
+ """
1567
+ The namespace to provision the resource in.
1568
+ The value should not contain leading or trailing forward slashes.
1569
+ The `namespace` is always relative to the provider's configured namespace.
1570
+ *Available only for Vault Enterprise*.
1571
+ """
1572
+ return pulumi.get(self, "namespace")
1573
+
1574
+ @_builtins.property
1575
+ @pulumi.getter
1576
+ def oracle(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionOracle']]:
1577
+ """
1578
+ A nested block containing configuration options for Oracle connections.
1579
+ """
1580
+ return pulumi.get(self, "oracle")
1581
+
1582
+ @_builtins.property
1583
+ @pulumi.getter(name="pluginName")
1584
+ def plugin_name(self) -> pulumi.Output[_builtins.str]:
1585
+ """
1586
+ Specifies the name of the plugin to use.
1587
+ """
1588
+ return pulumi.get(self, "plugin_name")
1589
+
1590
+ @_builtins.property
1591
+ @pulumi.getter
1592
+ def postgresql(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionPostgresql']]:
1593
+ """
1594
+ A nested block containing configuration options for PostgreSQL connections.
1595
+ """
1596
+ return pulumi.get(self, "postgresql")
1597
+
1598
+ @_builtins.property
1599
+ @pulumi.getter
1600
+ def redis(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionRedis']]:
1601
+ """
1602
+ A nested block containing configuration options for Redis connections.
1603
+ """
1604
+ return pulumi.get(self, "redis")
1605
+
1606
+ @_builtins.property
1607
+ @pulumi.getter(name="redisElasticache")
1608
+ def redis_elasticache(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionRedisElasticache']]:
1609
+ """
1610
+ A nested block containing configuration options for Redis ElastiCache connections.
1611
+
1612
+ Exactly one of the nested blocks of configuration options must be supplied.
1613
+ """
1614
+ return pulumi.get(self, "redis_elasticache")
1615
+
1616
+ @_builtins.property
1617
+ @pulumi.getter
1618
+ def redshift(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionRedshift']]:
1619
+ """
1620
+ Connection parameters for the redshift-database-plugin plugin.
1621
+ """
1622
+ return pulumi.get(self, "redshift")
1623
+
1624
+ @_builtins.property
1625
+ @pulumi.getter(name="rootRotationStatements")
1626
+ def root_rotation_statements(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1627
+ """
1628
+ A list of database statements to be executed to rotate the root user's credentials.
1629
+ """
1630
+ return pulumi.get(self, "root_rotation_statements")
1631
+
1632
+ @_builtins.property
1633
+ @pulumi.getter(name="rotationPeriod")
1634
+ def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
1635
+ """
1636
+ The amount of time in seconds Vault should wait before rotating the root credential.
1637
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
1638
+ """
1639
+ return pulumi.get(self, "rotation_period")
1640
+
1641
+ @_builtins.property
1642
+ @pulumi.getter(name="rotationSchedule")
1643
+ def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
1644
+ """
1645
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1646
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
1647
+ """
1648
+ return pulumi.get(self, "rotation_schedule")
1649
+
1650
+ @_builtins.property
1651
+ @pulumi.getter(name="rotationWindow")
1652
+ def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
1653
+ """
1654
+ The maximum amount of time in seconds allowed to complete
1655
+ a rotation when a scheduled token rotation occurs. The default rotation window is
1656
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
1657
+ """
1658
+ return pulumi.get(self, "rotation_window")
1659
+
1660
+ @_builtins.property
1661
+ @pulumi.getter
1662
+ def snowflake(self) -> pulumi.Output[Optional['outputs.SecretBackendConnectionSnowflake']]:
1663
+ """
1664
+ A nested block containing configuration options for Snowflake connections.
1665
+ """
1666
+ return pulumi.get(self, "snowflake")
1667
+
1668
+ @_builtins.property
1669
+ @pulumi.getter(name="verifyConnection")
1670
+ def verify_connection(self) -> pulumi.Output[Optional[_builtins.bool]]:
1671
+ """
1672
+ Whether the connection should be verified on
1673
+ initial configuration or not.
1674
+ """
1675
+ return pulumi.get(self, "verify_connection")
1676
+