database

package
v5.20.0 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Feb 20, 2024 License: Apache-2.0 Imports: 7 Imported by: 0

Documentation

Index

Constants

This section is empty.

Variables

This section is empty.

Functions

This section is empty.

Types

type SecretBackendConnection

type SecretBackendConnection struct {
	pulumi.CustomResourceState

	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayOutput `pulumi:"allowedRoles"`
	// The unique name of the Vault mount to configure.
	Backend pulumi.StringOutput `pulumi:"backend"`
	// A nested block containing configuration options for Cassandra connections.
	Cassandra SecretBackendConnectionCassandraPtrOutput `pulumi:"cassandra"`
	// A nested block containing configuration options for Couchbase connections.
	Couchbase SecretBackendConnectionCouchbasePtrOutput `pulumi:"couchbase"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	Data pulumi.MapOutput `pulumi:"data"`
	// A nested block containing configuration options for Elasticsearch connections.
	Elasticsearch SecretBackendConnectionElasticsearchPtrOutput `pulumi:"elasticsearch"`
	// A nested block containing configuration options for SAP HanaDB connections.
	Hana SecretBackendConnectionHanaPtrOutput `pulumi:"hana"`
	// A nested block containing configuration options for InfluxDB connections.
	Influxdb SecretBackendConnectionInfluxdbPtrOutput `pulumi:"influxdb"`
	// A nested block containing configuration options for MongoDB connections.
	Mongodb SecretBackendConnectionMongodbPtrOutput `pulumi:"mongodb"`
	// A nested block containing configuration options for MongoDB Atlas connections.
	Mongodbatlas SecretBackendConnectionMongodbatlasPtrOutput `pulumi:"mongodbatlas"`
	// A nested block containing configuration options for MSSQL connections.
	Mssql SecretBackendConnectionMssqlPtrOutput `pulumi:"mssql"`
	// A nested block containing configuration options for MySQL connections.
	Mysql SecretBackendConnectionMysqlPtrOutput `pulumi:"mysql"`
	// A nested block containing configuration options for Aurora MySQL connections.
	MysqlAurora SecretBackendConnectionMysqlAuroraPtrOutput `pulumi:"mysqlAurora"`
	// A nested block containing configuration options for legacy MySQL connections.
	MysqlLegacy SecretBackendConnectionMysqlLegacyPtrOutput `pulumi:"mysqlLegacy"`
	// A nested block containing configuration options for RDS MySQL connections.
	MysqlRds SecretBackendConnectionMysqlRdsPtrOutput `pulumi:"mysqlRds"`
	// A unique name to give the database connection.
	Name pulumi.StringOutput `pulumi:"name"`
	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The `namespace` is always relative to the provider's configured namespace.
	// *Available only for Vault Enterprise*.
	Namespace pulumi.StringPtrOutput `pulumi:"namespace"`
	// A nested block containing configuration options for Oracle connections.
	Oracle SecretBackendConnectionOraclePtrOutput `pulumi:"oracle"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringOutput `pulumi:"pluginName"`
	// A nested block containing configuration options for PostgreSQL connections.
	Postgresql SecretBackendConnectionPostgresqlPtrOutput `pulumi:"postgresql"`
	// A nested block containing configuration options for Redis connections.
	Redis SecretBackendConnectionRedisPtrOutput `pulumi:"redis"`
	// A nested block containing configuration options for Redis ElastiCache connections.
	//
	// Exactly one of the nested blocks of configuration options must be supplied.
	RedisElasticache SecretBackendConnectionRedisElasticachePtrOutput `pulumi:"redisElasticache"`
	// Connection parameters for the redshift-database-plugin plugin.
	Redshift SecretBackendConnectionRedshiftPtrOutput `pulumi:"redshift"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayOutput `pulumi:"rootRotationStatements"`
	// A nested block containing configuration options for Snowflake connections.
	Snowflake SecretBackendConnectionSnowflakePtrOutput `pulumi:"snowflake"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrOutput `pulumi:"verifyConnection"`
}

## Example Usage

```go package main

import (

"github.com/pulumi/pulumi-vault/sdk/v5/go/vault"
"github.com/pulumi/pulumi-vault/sdk/v5/go/vault/database"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"

)

func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		db, err := vault.NewMount(ctx, "db", &vault.MountArgs{
			Path: pulumi.String("postgres"),
			Type: pulumi.String("database"),
		})
		if err != nil {
			return err
		}
		_, err = database.NewSecretBackendConnection(ctx, "postgres", &database.SecretBackendConnectionArgs{
			Backend: db.Path,
			AllowedRoles: pulumi.StringArray{
				pulumi.String("dev"),
				pulumi.String("prod"),
			},
			Postgresql: &database.SecretBackendConnectionPostgresqlArgs{
				ConnectionUrl: pulumi.String("postgres://username:password@host:port/database"),
			},
		})
		if err != nil {
			return err
		}
		return nil
	})
}

```

## Import

Database secret backend connections can be imported using the `backend`, `/config/`, and the `name` e.g.

```sh

$ pulumi import vault:database/secretBackendConnection:SecretBackendConnection example postgres/config/postgres

```

func GetSecretBackendConnection

func GetSecretBackendConnection(ctx *pulumi.Context,
	name string, id pulumi.IDInput, state *SecretBackendConnectionState, opts ...pulumi.ResourceOption) (*SecretBackendConnection, error)

GetSecretBackendConnection gets an existing SecretBackendConnection resource's state with the given name, ID, and optional state properties that are used to uniquely qualify the lookup (nil if not required).

func NewSecretBackendConnection

func NewSecretBackendConnection(ctx *pulumi.Context,
	name string, args *SecretBackendConnectionArgs, opts ...pulumi.ResourceOption) (*SecretBackendConnection, error)

NewSecretBackendConnection registers a new resource with the given unique name, arguments, and options.

func (*SecretBackendConnection) ElementType

func (*SecretBackendConnection) ElementType() reflect.Type

func (*SecretBackendConnection) ToSecretBackendConnectionOutput

func (i *SecretBackendConnection) ToSecretBackendConnectionOutput() SecretBackendConnectionOutput

func (*SecretBackendConnection) ToSecretBackendConnectionOutputWithContext

func (i *SecretBackendConnection) ToSecretBackendConnectionOutputWithContext(ctx context.Context) SecretBackendConnectionOutput

type SecretBackendConnectionArgs

type SecretBackendConnectionArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput
	// The unique name of the Vault mount to configure.
	Backend pulumi.StringInput
	// A nested block containing configuration options for Cassandra connections.
	Cassandra SecretBackendConnectionCassandraPtrInput
	// A nested block containing configuration options for Couchbase connections.
	Couchbase SecretBackendConnectionCouchbasePtrInput
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	Data pulumi.MapInput
	// A nested block containing configuration options for Elasticsearch connections.
	Elasticsearch SecretBackendConnectionElasticsearchPtrInput
	// A nested block containing configuration options for SAP HanaDB connections.
	Hana SecretBackendConnectionHanaPtrInput
	// A nested block containing configuration options for InfluxDB connections.
	Influxdb SecretBackendConnectionInfluxdbPtrInput
	// A nested block containing configuration options for MongoDB connections.
	Mongodb SecretBackendConnectionMongodbPtrInput
	// A nested block containing configuration options for MongoDB Atlas connections.
	Mongodbatlas SecretBackendConnectionMongodbatlasPtrInput
	// A nested block containing configuration options for MSSQL connections.
	Mssql SecretBackendConnectionMssqlPtrInput
	// A nested block containing configuration options for MySQL connections.
	Mysql SecretBackendConnectionMysqlPtrInput
	// A nested block containing configuration options for Aurora MySQL connections.
	MysqlAurora SecretBackendConnectionMysqlAuroraPtrInput
	// A nested block containing configuration options for legacy MySQL connections.
	MysqlLegacy SecretBackendConnectionMysqlLegacyPtrInput
	// A nested block containing configuration options for RDS MySQL connections.
	MysqlRds SecretBackendConnectionMysqlRdsPtrInput
	// A unique name to give the database connection.
	Name pulumi.StringPtrInput
	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The `namespace` is always relative to the provider's configured namespace.
	// *Available only for Vault Enterprise*.
	Namespace pulumi.StringPtrInput
	// A nested block containing configuration options for Oracle connections.
	Oracle SecretBackendConnectionOraclePtrInput
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput
	// A nested block containing configuration options for PostgreSQL connections.
	Postgresql SecretBackendConnectionPostgresqlPtrInput
	// A nested block containing configuration options for Redis connections.
	Redis SecretBackendConnectionRedisPtrInput
	// A nested block containing configuration options for Redis ElastiCache connections.
	//
	// Exactly one of the nested blocks of configuration options must be supplied.
	RedisElasticache SecretBackendConnectionRedisElasticachePtrInput
	// Connection parameters for the redshift-database-plugin plugin.
	Redshift SecretBackendConnectionRedshiftPtrInput
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput
	// A nested block containing configuration options for Snowflake connections.
	Snowflake SecretBackendConnectionSnowflakePtrInput
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput
}

The set of arguments for constructing a SecretBackendConnection resource.

func (SecretBackendConnectionArgs) ElementType

type SecretBackendConnectionArray

type SecretBackendConnectionArray []SecretBackendConnectionInput

func (SecretBackendConnectionArray) ElementType

func (SecretBackendConnectionArray) ToSecretBackendConnectionArrayOutput

func (i SecretBackendConnectionArray) ToSecretBackendConnectionArrayOutput() SecretBackendConnectionArrayOutput

func (SecretBackendConnectionArray) ToSecretBackendConnectionArrayOutputWithContext

func (i SecretBackendConnectionArray) ToSecretBackendConnectionArrayOutputWithContext(ctx context.Context) SecretBackendConnectionArrayOutput

type SecretBackendConnectionArrayInput

type SecretBackendConnectionArrayInput interface {
	pulumi.Input

	ToSecretBackendConnectionArrayOutput() SecretBackendConnectionArrayOutput
	ToSecretBackendConnectionArrayOutputWithContext(context.Context) SecretBackendConnectionArrayOutput
}

SecretBackendConnectionArrayInput is an input type that accepts SecretBackendConnectionArray and SecretBackendConnectionArrayOutput values. You can construct a concrete instance of `SecretBackendConnectionArrayInput` via:

SecretBackendConnectionArray{ SecretBackendConnectionArgs{...} }

type SecretBackendConnectionArrayOutput

type SecretBackendConnectionArrayOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionArrayOutput) ElementType

func (SecretBackendConnectionArrayOutput) Index

func (SecretBackendConnectionArrayOutput) ToSecretBackendConnectionArrayOutput

func (o SecretBackendConnectionArrayOutput) ToSecretBackendConnectionArrayOutput() SecretBackendConnectionArrayOutput

func (SecretBackendConnectionArrayOutput) ToSecretBackendConnectionArrayOutputWithContext

func (o SecretBackendConnectionArrayOutput) ToSecretBackendConnectionArrayOutputWithContext(ctx context.Context) SecretBackendConnectionArrayOutput

type SecretBackendConnectionCassandra

type SecretBackendConnectionCassandra struct {
	// The number of seconds to use as a connection
	// timeout.
	ConnectTimeout *int `pulumi:"connectTimeout"`
	// The hosts to connect to.
	Hosts []string `pulumi:"hosts"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls *bool `pulumi:"insecureTls"`
	// The password to authenticate with.
	Password *string `pulumi:"password"`
	// Concatenated PEM blocks configuring the certificate
	// chain.
	PemBundle *string `pulumi:"pemBundle"`
	// A JSON structure configuring the certificate chain.
	PemJson *string `pulumi:"pemJson"`
	// The default port to connect to if no port is specified as
	// part of the host.
	Port *int `pulumi:"port"`
	// The CQL protocol version to use.
	ProtocolVersion *int `pulumi:"protocolVersion"`
	// Whether to use TLS when connecting to Cassandra.
	Tls *bool `pulumi:"tls"`
	// The username to authenticate with.
	Username *string `pulumi:"username"`
}

type SecretBackendConnectionCassandraArgs

type SecretBackendConnectionCassandraArgs struct {
	// The number of seconds to use as a connection
	// timeout.
	ConnectTimeout pulumi.IntPtrInput `pulumi:"connectTimeout"`
	// The hosts to connect to.
	Hosts pulumi.StringArrayInput `pulumi:"hosts"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls pulumi.BoolPtrInput `pulumi:"insecureTls"`
	// The password to authenticate with.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Concatenated PEM blocks configuring the certificate
	// chain.
	PemBundle pulumi.StringPtrInput `pulumi:"pemBundle"`
	// A JSON structure configuring the certificate chain.
	PemJson pulumi.StringPtrInput `pulumi:"pemJson"`
	// The default port to connect to if no port is specified as
	// part of the host.
	Port pulumi.IntPtrInput `pulumi:"port"`
	// The CQL protocol version to use.
	ProtocolVersion pulumi.IntPtrInput `pulumi:"protocolVersion"`
	// Whether to use TLS when connecting to Cassandra.
	Tls pulumi.BoolPtrInput `pulumi:"tls"`
	// The username to authenticate with.
	Username pulumi.StringPtrInput `pulumi:"username"`
}

func (SecretBackendConnectionCassandraArgs) ElementType

func (SecretBackendConnectionCassandraArgs) ToSecretBackendConnectionCassandraOutput

func (i SecretBackendConnectionCassandraArgs) ToSecretBackendConnectionCassandraOutput() SecretBackendConnectionCassandraOutput

func (SecretBackendConnectionCassandraArgs) ToSecretBackendConnectionCassandraOutputWithContext

func (i SecretBackendConnectionCassandraArgs) ToSecretBackendConnectionCassandraOutputWithContext(ctx context.Context) SecretBackendConnectionCassandraOutput

func (SecretBackendConnectionCassandraArgs) ToSecretBackendConnectionCassandraPtrOutput

func (i SecretBackendConnectionCassandraArgs) ToSecretBackendConnectionCassandraPtrOutput() SecretBackendConnectionCassandraPtrOutput

func (SecretBackendConnectionCassandraArgs) ToSecretBackendConnectionCassandraPtrOutputWithContext

func (i SecretBackendConnectionCassandraArgs) ToSecretBackendConnectionCassandraPtrOutputWithContext(ctx context.Context) SecretBackendConnectionCassandraPtrOutput

type SecretBackendConnectionCassandraInput

type SecretBackendConnectionCassandraInput interface {
	pulumi.Input

	ToSecretBackendConnectionCassandraOutput() SecretBackendConnectionCassandraOutput
	ToSecretBackendConnectionCassandraOutputWithContext(context.Context) SecretBackendConnectionCassandraOutput
}

SecretBackendConnectionCassandraInput is an input type that accepts SecretBackendConnectionCassandraArgs and SecretBackendConnectionCassandraOutput values. You can construct a concrete instance of `SecretBackendConnectionCassandraInput` via:

SecretBackendConnectionCassandraArgs{...}

type SecretBackendConnectionCassandraOutput

type SecretBackendConnectionCassandraOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionCassandraOutput) ConnectTimeout

The number of seconds to use as a connection timeout.

func (SecretBackendConnectionCassandraOutput) ElementType

func (SecretBackendConnectionCassandraOutput) Hosts

The hosts to connect to.

func (SecretBackendConnectionCassandraOutput) InsecureTls

Whether to skip verification of the server certificate when using TLS.

func (SecretBackendConnectionCassandraOutput) Password

The password to authenticate with.

func (SecretBackendConnectionCassandraOutput) PemBundle

Concatenated PEM blocks configuring the certificate chain.

func (SecretBackendConnectionCassandraOutput) PemJson

A JSON structure configuring the certificate chain.

func (SecretBackendConnectionCassandraOutput) Port

The default port to connect to if no port is specified as part of the host.

func (SecretBackendConnectionCassandraOutput) ProtocolVersion

The CQL protocol version to use.

func (SecretBackendConnectionCassandraOutput) Tls

Whether to use TLS when connecting to Cassandra.

func (SecretBackendConnectionCassandraOutput) ToSecretBackendConnectionCassandraOutput

func (o SecretBackendConnectionCassandraOutput) ToSecretBackendConnectionCassandraOutput() SecretBackendConnectionCassandraOutput

func (SecretBackendConnectionCassandraOutput) ToSecretBackendConnectionCassandraOutputWithContext

func (o SecretBackendConnectionCassandraOutput) ToSecretBackendConnectionCassandraOutputWithContext(ctx context.Context) SecretBackendConnectionCassandraOutput

func (SecretBackendConnectionCassandraOutput) ToSecretBackendConnectionCassandraPtrOutput

func (o SecretBackendConnectionCassandraOutput) ToSecretBackendConnectionCassandraPtrOutput() SecretBackendConnectionCassandraPtrOutput

func (SecretBackendConnectionCassandraOutput) ToSecretBackendConnectionCassandraPtrOutputWithContext

func (o SecretBackendConnectionCassandraOutput) ToSecretBackendConnectionCassandraPtrOutputWithContext(ctx context.Context) SecretBackendConnectionCassandraPtrOutput

func (SecretBackendConnectionCassandraOutput) Username

The username to authenticate with.

type SecretBackendConnectionCassandraPtrInput

type SecretBackendConnectionCassandraPtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionCassandraPtrOutput() SecretBackendConnectionCassandraPtrOutput
	ToSecretBackendConnectionCassandraPtrOutputWithContext(context.Context) SecretBackendConnectionCassandraPtrOutput
}

SecretBackendConnectionCassandraPtrInput is an input type that accepts SecretBackendConnectionCassandraArgs, SecretBackendConnectionCassandraPtr and SecretBackendConnectionCassandraPtrOutput values. You can construct a concrete instance of `SecretBackendConnectionCassandraPtrInput` via:

        SecretBackendConnectionCassandraArgs{...}

or:

        nil

type SecretBackendConnectionCassandraPtrOutput

type SecretBackendConnectionCassandraPtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionCassandraPtrOutput) ConnectTimeout

The number of seconds to use as a connection timeout.

func (SecretBackendConnectionCassandraPtrOutput) Elem

func (SecretBackendConnectionCassandraPtrOutput) ElementType

func (SecretBackendConnectionCassandraPtrOutput) Hosts

The hosts to connect to.

func (SecretBackendConnectionCassandraPtrOutput) InsecureTls

Whether to skip verification of the server certificate when using TLS.

func (SecretBackendConnectionCassandraPtrOutput) Password

The password to authenticate with.

func (SecretBackendConnectionCassandraPtrOutput) PemBundle

Concatenated PEM blocks configuring the certificate chain.

func (SecretBackendConnectionCassandraPtrOutput) PemJson

A JSON structure configuring the certificate chain.

func (SecretBackendConnectionCassandraPtrOutput) Port

The default port to connect to if no port is specified as part of the host.

func (SecretBackendConnectionCassandraPtrOutput) ProtocolVersion

The CQL protocol version to use.

func (SecretBackendConnectionCassandraPtrOutput) Tls

Whether to use TLS when connecting to Cassandra.

func (SecretBackendConnectionCassandraPtrOutput) ToSecretBackendConnectionCassandraPtrOutput

func (o SecretBackendConnectionCassandraPtrOutput) ToSecretBackendConnectionCassandraPtrOutput() SecretBackendConnectionCassandraPtrOutput

func (SecretBackendConnectionCassandraPtrOutput) ToSecretBackendConnectionCassandraPtrOutputWithContext

func (o SecretBackendConnectionCassandraPtrOutput) ToSecretBackendConnectionCassandraPtrOutputWithContext(ctx context.Context) SecretBackendConnectionCassandraPtrOutput

func (SecretBackendConnectionCassandraPtrOutput) Username

The username to authenticate with.

type SecretBackendConnectionCouchbase added in v5.2.0

type SecretBackendConnectionCouchbase struct {
	// Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
	Base64Pem *string `pulumi:"base64Pem"`
	// Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
	BucketName *string `pulumi:"bucketName"`
	// The hosts to connect to.
	Hosts []string `pulumi:"hosts"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls *bool `pulumi:"insecureTls"`
	// The password to authenticate with.
	Password string `pulumi:"password"`
	// Whether to use TLS when connecting to Cassandra.
	Tls *bool `pulumi:"tls"`
	// The username to authenticate with.
	Username string `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
}

type SecretBackendConnectionCouchbaseArgs added in v5.2.0

type SecretBackendConnectionCouchbaseArgs struct {
	// Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
	Base64Pem pulumi.StringPtrInput `pulumi:"base64Pem"`
	// Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
	BucketName pulumi.StringPtrInput `pulumi:"bucketName"`
	// The hosts to connect to.
	Hosts pulumi.StringArrayInput `pulumi:"hosts"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls pulumi.BoolPtrInput `pulumi:"insecureTls"`
	// The password to authenticate with.
	Password pulumi.StringInput `pulumi:"password"`
	// Whether to use TLS when connecting to Cassandra.
	Tls pulumi.BoolPtrInput `pulumi:"tls"`
	// The username to authenticate with.
	Username pulumi.StringInput `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
}

func (SecretBackendConnectionCouchbaseArgs) ElementType added in v5.2.0

func (SecretBackendConnectionCouchbaseArgs) ToSecretBackendConnectionCouchbaseOutput added in v5.2.0

func (i SecretBackendConnectionCouchbaseArgs) ToSecretBackendConnectionCouchbaseOutput() SecretBackendConnectionCouchbaseOutput

func (SecretBackendConnectionCouchbaseArgs) ToSecretBackendConnectionCouchbaseOutputWithContext added in v5.2.0

func (i SecretBackendConnectionCouchbaseArgs) ToSecretBackendConnectionCouchbaseOutputWithContext(ctx context.Context) SecretBackendConnectionCouchbaseOutput

func (SecretBackendConnectionCouchbaseArgs) ToSecretBackendConnectionCouchbasePtrOutput added in v5.2.0

func (i SecretBackendConnectionCouchbaseArgs) ToSecretBackendConnectionCouchbasePtrOutput() SecretBackendConnectionCouchbasePtrOutput

func (SecretBackendConnectionCouchbaseArgs) ToSecretBackendConnectionCouchbasePtrOutputWithContext added in v5.2.0

func (i SecretBackendConnectionCouchbaseArgs) ToSecretBackendConnectionCouchbasePtrOutputWithContext(ctx context.Context) SecretBackendConnectionCouchbasePtrOutput

type SecretBackendConnectionCouchbaseInput added in v5.2.0

type SecretBackendConnectionCouchbaseInput interface {
	pulumi.Input

	ToSecretBackendConnectionCouchbaseOutput() SecretBackendConnectionCouchbaseOutput
	ToSecretBackendConnectionCouchbaseOutputWithContext(context.Context) SecretBackendConnectionCouchbaseOutput
}

SecretBackendConnectionCouchbaseInput is an input type that accepts SecretBackendConnectionCouchbaseArgs and SecretBackendConnectionCouchbaseOutput values. You can construct a concrete instance of `SecretBackendConnectionCouchbaseInput` via:

SecretBackendConnectionCouchbaseArgs{...}

type SecretBackendConnectionCouchbaseOutput added in v5.2.0

type SecretBackendConnectionCouchbaseOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionCouchbaseOutput) Base64Pem added in v5.2.0

Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.

func (SecretBackendConnectionCouchbaseOutput) BucketName added in v5.2.0

Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.

func (SecretBackendConnectionCouchbaseOutput) ElementType added in v5.2.0

func (SecretBackendConnectionCouchbaseOutput) Hosts added in v5.2.0

The hosts to connect to.

func (SecretBackendConnectionCouchbaseOutput) InsecureTls added in v5.2.0

Whether to skip verification of the server certificate when using TLS.

func (SecretBackendConnectionCouchbaseOutput) Password added in v5.2.0

The password to authenticate with.

func (SecretBackendConnectionCouchbaseOutput) Tls added in v5.2.0

Whether to use TLS when connecting to Cassandra.

func (SecretBackendConnectionCouchbaseOutput) ToSecretBackendConnectionCouchbaseOutput added in v5.2.0

func (o SecretBackendConnectionCouchbaseOutput) ToSecretBackendConnectionCouchbaseOutput() SecretBackendConnectionCouchbaseOutput

func (SecretBackendConnectionCouchbaseOutput) ToSecretBackendConnectionCouchbaseOutputWithContext added in v5.2.0

func (o SecretBackendConnectionCouchbaseOutput) ToSecretBackendConnectionCouchbaseOutputWithContext(ctx context.Context) SecretBackendConnectionCouchbaseOutput

func (SecretBackendConnectionCouchbaseOutput) ToSecretBackendConnectionCouchbasePtrOutput added in v5.2.0

func (o SecretBackendConnectionCouchbaseOutput) ToSecretBackendConnectionCouchbasePtrOutput() SecretBackendConnectionCouchbasePtrOutput

func (SecretBackendConnectionCouchbaseOutput) ToSecretBackendConnectionCouchbasePtrOutputWithContext added in v5.2.0

func (o SecretBackendConnectionCouchbaseOutput) ToSecretBackendConnectionCouchbasePtrOutputWithContext(ctx context.Context) SecretBackendConnectionCouchbasePtrOutput

func (SecretBackendConnectionCouchbaseOutput) Username added in v5.2.0

The username to authenticate with.

func (SecretBackendConnectionCouchbaseOutput) UsernameTemplate added in v5.2.0

Template describing how dynamic usernames are generated.

type SecretBackendConnectionCouchbasePtrInput added in v5.2.0

type SecretBackendConnectionCouchbasePtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionCouchbasePtrOutput() SecretBackendConnectionCouchbasePtrOutput
	ToSecretBackendConnectionCouchbasePtrOutputWithContext(context.Context) SecretBackendConnectionCouchbasePtrOutput
}

SecretBackendConnectionCouchbasePtrInput is an input type that accepts SecretBackendConnectionCouchbaseArgs, SecretBackendConnectionCouchbasePtr and SecretBackendConnectionCouchbasePtrOutput values. You can construct a concrete instance of `SecretBackendConnectionCouchbasePtrInput` via:

        SecretBackendConnectionCouchbaseArgs{...}

or:

        nil

type SecretBackendConnectionCouchbasePtrOutput added in v5.2.0

type SecretBackendConnectionCouchbasePtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionCouchbasePtrOutput) Base64Pem added in v5.2.0

Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.

func (SecretBackendConnectionCouchbasePtrOutput) BucketName added in v5.2.0

Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.

func (SecretBackendConnectionCouchbasePtrOutput) Elem added in v5.2.0

func (SecretBackendConnectionCouchbasePtrOutput) ElementType added in v5.2.0

func (SecretBackendConnectionCouchbasePtrOutput) Hosts added in v5.2.0

The hosts to connect to.

func (SecretBackendConnectionCouchbasePtrOutput) InsecureTls added in v5.2.0

Whether to skip verification of the server certificate when using TLS.

func (SecretBackendConnectionCouchbasePtrOutput) Password added in v5.2.0

The password to authenticate with.

func (SecretBackendConnectionCouchbasePtrOutput) Tls added in v5.2.0

Whether to use TLS when connecting to Cassandra.

func (SecretBackendConnectionCouchbasePtrOutput) ToSecretBackendConnectionCouchbasePtrOutput added in v5.2.0

func (o SecretBackendConnectionCouchbasePtrOutput) ToSecretBackendConnectionCouchbasePtrOutput() SecretBackendConnectionCouchbasePtrOutput

func (SecretBackendConnectionCouchbasePtrOutput) ToSecretBackendConnectionCouchbasePtrOutputWithContext added in v5.2.0

func (o SecretBackendConnectionCouchbasePtrOutput) ToSecretBackendConnectionCouchbasePtrOutputWithContext(ctx context.Context) SecretBackendConnectionCouchbasePtrOutput

func (SecretBackendConnectionCouchbasePtrOutput) Username added in v5.2.0

The username to authenticate with.

func (SecretBackendConnectionCouchbasePtrOutput) UsernameTemplate added in v5.2.0

Template describing how dynamic usernames are generated.

type SecretBackendConnectionElasticsearch

type SecretBackendConnectionElasticsearch struct {
	// The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
	CaCert *string `pulumi:"caCert"`
	// The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
	CaPath *string `pulumi:"caPath"`
	// The path to the certificate for the Elasticsearch client to present for communication.
	ClientCert *string `pulumi:"clientCert"`
	// The path to the key for the Elasticsearch client to use for communication.
	ClientKey *string `pulumi:"clientKey"`
	// Whether to disable certificate verification.
	Insecure *bool `pulumi:"insecure"`
	// The password to authenticate with.
	Password string `pulumi:"password"`
	// This, if set, is used to set the SNI host when connecting via TLS.
	TlsServerName *string `pulumi:"tlsServerName"`
	// The URL for Elasticsearch's API. https requires certificate
	// by trusted CA if used.
	Url string `pulumi:"url"`
	// The username to authenticate with.
	Username string `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
}

type SecretBackendConnectionElasticsearchArgs

type SecretBackendConnectionElasticsearchArgs struct {
	// The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
	CaCert pulumi.StringPtrInput `pulumi:"caCert"`
	// The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
	CaPath pulumi.StringPtrInput `pulumi:"caPath"`
	// The path to the certificate for the Elasticsearch client to present for communication.
	ClientCert pulumi.StringPtrInput `pulumi:"clientCert"`
	// The path to the key for the Elasticsearch client to use for communication.
	ClientKey pulumi.StringPtrInput `pulumi:"clientKey"`
	// Whether to disable certificate verification.
	Insecure pulumi.BoolPtrInput `pulumi:"insecure"`
	// The password to authenticate with.
	Password pulumi.StringInput `pulumi:"password"`
	// This, if set, is used to set the SNI host when connecting via TLS.
	TlsServerName pulumi.StringPtrInput `pulumi:"tlsServerName"`
	// The URL for Elasticsearch's API. https requires certificate
	// by trusted CA if used.
	Url pulumi.StringInput `pulumi:"url"`
	// The username to authenticate with.
	Username pulumi.StringInput `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
}

func (SecretBackendConnectionElasticsearchArgs) ElementType

func (SecretBackendConnectionElasticsearchArgs) ToSecretBackendConnectionElasticsearchOutput

func (i SecretBackendConnectionElasticsearchArgs) ToSecretBackendConnectionElasticsearchOutput() SecretBackendConnectionElasticsearchOutput

func (SecretBackendConnectionElasticsearchArgs) ToSecretBackendConnectionElasticsearchOutputWithContext

func (i SecretBackendConnectionElasticsearchArgs) ToSecretBackendConnectionElasticsearchOutputWithContext(ctx context.Context) SecretBackendConnectionElasticsearchOutput

func (SecretBackendConnectionElasticsearchArgs) ToSecretBackendConnectionElasticsearchPtrOutput

func (i SecretBackendConnectionElasticsearchArgs) ToSecretBackendConnectionElasticsearchPtrOutput() SecretBackendConnectionElasticsearchPtrOutput

func (SecretBackendConnectionElasticsearchArgs) ToSecretBackendConnectionElasticsearchPtrOutputWithContext

func (i SecretBackendConnectionElasticsearchArgs) ToSecretBackendConnectionElasticsearchPtrOutputWithContext(ctx context.Context) SecretBackendConnectionElasticsearchPtrOutput

type SecretBackendConnectionElasticsearchInput

type SecretBackendConnectionElasticsearchInput interface {
	pulumi.Input

	ToSecretBackendConnectionElasticsearchOutput() SecretBackendConnectionElasticsearchOutput
	ToSecretBackendConnectionElasticsearchOutputWithContext(context.Context) SecretBackendConnectionElasticsearchOutput
}

SecretBackendConnectionElasticsearchInput is an input type that accepts SecretBackendConnectionElasticsearchArgs and SecretBackendConnectionElasticsearchOutput values. You can construct a concrete instance of `SecretBackendConnectionElasticsearchInput` via:

SecretBackendConnectionElasticsearchArgs{...}

type SecretBackendConnectionElasticsearchOutput

type SecretBackendConnectionElasticsearchOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionElasticsearchOutput) CaCert added in v5.5.0

The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.

func (SecretBackendConnectionElasticsearchOutput) CaPath added in v5.5.0

The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.

func (SecretBackendConnectionElasticsearchOutput) ClientCert added in v5.5.0

The path to the certificate for the Elasticsearch client to present for communication.

func (SecretBackendConnectionElasticsearchOutput) ClientKey added in v5.5.0

The path to the key for the Elasticsearch client to use for communication.

func (SecretBackendConnectionElasticsearchOutput) ElementType

func (SecretBackendConnectionElasticsearchOutput) Insecure added in v5.5.0

Whether to disable certificate verification.

func (SecretBackendConnectionElasticsearchOutput) Password

The password to authenticate with.

func (SecretBackendConnectionElasticsearchOutput) TlsServerName added in v5.5.0

This, if set, is used to set the SNI host when connecting via TLS.

func (SecretBackendConnectionElasticsearchOutput) ToSecretBackendConnectionElasticsearchOutput

func (o SecretBackendConnectionElasticsearchOutput) ToSecretBackendConnectionElasticsearchOutput() SecretBackendConnectionElasticsearchOutput

func (SecretBackendConnectionElasticsearchOutput) ToSecretBackendConnectionElasticsearchOutputWithContext

func (o SecretBackendConnectionElasticsearchOutput) ToSecretBackendConnectionElasticsearchOutputWithContext(ctx context.Context) SecretBackendConnectionElasticsearchOutput

func (SecretBackendConnectionElasticsearchOutput) ToSecretBackendConnectionElasticsearchPtrOutput

func (o SecretBackendConnectionElasticsearchOutput) ToSecretBackendConnectionElasticsearchPtrOutput() SecretBackendConnectionElasticsearchPtrOutput

func (SecretBackendConnectionElasticsearchOutput) ToSecretBackendConnectionElasticsearchPtrOutputWithContext

func (o SecretBackendConnectionElasticsearchOutput) ToSecretBackendConnectionElasticsearchPtrOutputWithContext(ctx context.Context) SecretBackendConnectionElasticsearchPtrOutput

func (SecretBackendConnectionElasticsearchOutput) Url

The URL for Elasticsearch's API. https requires certificate by trusted CA if used.

func (SecretBackendConnectionElasticsearchOutput) Username

The username to authenticate with.

func (SecretBackendConnectionElasticsearchOutput) UsernameTemplate added in v5.5.0

Template describing how dynamic usernames are generated.

type SecretBackendConnectionElasticsearchPtrInput

type SecretBackendConnectionElasticsearchPtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionElasticsearchPtrOutput() SecretBackendConnectionElasticsearchPtrOutput
	ToSecretBackendConnectionElasticsearchPtrOutputWithContext(context.Context) SecretBackendConnectionElasticsearchPtrOutput
}

SecretBackendConnectionElasticsearchPtrInput is an input type that accepts SecretBackendConnectionElasticsearchArgs, SecretBackendConnectionElasticsearchPtr and SecretBackendConnectionElasticsearchPtrOutput values. You can construct a concrete instance of `SecretBackendConnectionElasticsearchPtrInput` via:

        SecretBackendConnectionElasticsearchArgs{...}

or:

        nil

type SecretBackendConnectionElasticsearchPtrOutput

type SecretBackendConnectionElasticsearchPtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionElasticsearchPtrOutput) CaCert added in v5.5.0

The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.

func (SecretBackendConnectionElasticsearchPtrOutput) CaPath added in v5.5.0

The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.

func (SecretBackendConnectionElasticsearchPtrOutput) ClientCert added in v5.5.0

The path to the certificate for the Elasticsearch client to present for communication.

func (SecretBackendConnectionElasticsearchPtrOutput) ClientKey added in v5.5.0

The path to the key for the Elasticsearch client to use for communication.

func (SecretBackendConnectionElasticsearchPtrOutput) Elem

func (SecretBackendConnectionElasticsearchPtrOutput) ElementType

func (SecretBackendConnectionElasticsearchPtrOutput) Insecure added in v5.5.0

Whether to disable certificate verification.

func (SecretBackendConnectionElasticsearchPtrOutput) Password

The password to authenticate with.

func (SecretBackendConnectionElasticsearchPtrOutput) TlsServerName added in v5.5.0

This, if set, is used to set the SNI host when connecting via TLS.

func (SecretBackendConnectionElasticsearchPtrOutput) ToSecretBackendConnectionElasticsearchPtrOutput

func (o SecretBackendConnectionElasticsearchPtrOutput) ToSecretBackendConnectionElasticsearchPtrOutput() SecretBackendConnectionElasticsearchPtrOutput

func (SecretBackendConnectionElasticsearchPtrOutput) ToSecretBackendConnectionElasticsearchPtrOutputWithContext

func (o SecretBackendConnectionElasticsearchPtrOutput) ToSecretBackendConnectionElasticsearchPtrOutputWithContext(ctx context.Context) SecretBackendConnectionElasticsearchPtrOutput

func (SecretBackendConnectionElasticsearchPtrOutput) Url

The URL for Elasticsearch's API. https requires certificate by trusted CA if used.

func (SecretBackendConnectionElasticsearchPtrOutput) Username

The username to authenticate with.

func (SecretBackendConnectionElasticsearchPtrOutput) UsernameTemplate added in v5.5.0

Template describing how dynamic usernames are generated.

type SecretBackendConnectionHana

type SecretBackendConnectionHana struct {
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// Disable special character escaping in username and password.
	DisableEscaping *bool `pulumi:"disableEscaping"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password *string `pulumi:"password"`
	// The username to authenticate with.
	Username *string `pulumi:"username"`
}

type SecretBackendConnectionHanaArgs

type SecretBackendConnectionHanaArgs struct {
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// Disable special character escaping in username and password.
	DisableEscaping pulumi.BoolPtrInput `pulumi:"disableEscaping"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// The username to authenticate with.
	Username pulumi.StringPtrInput `pulumi:"username"`
}

func (SecretBackendConnectionHanaArgs) ElementType

func (SecretBackendConnectionHanaArgs) ToSecretBackendConnectionHanaOutput

func (i SecretBackendConnectionHanaArgs) ToSecretBackendConnectionHanaOutput() SecretBackendConnectionHanaOutput

func (SecretBackendConnectionHanaArgs) ToSecretBackendConnectionHanaOutputWithContext

func (i SecretBackendConnectionHanaArgs) ToSecretBackendConnectionHanaOutputWithContext(ctx context.Context) SecretBackendConnectionHanaOutput

func (SecretBackendConnectionHanaArgs) ToSecretBackendConnectionHanaPtrOutput

func (i SecretBackendConnectionHanaArgs) ToSecretBackendConnectionHanaPtrOutput() SecretBackendConnectionHanaPtrOutput

func (SecretBackendConnectionHanaArgs) ToSecretBackendConnectionHanaPtrOutputWithContext

func (i SecretBackendConnectionHanaArgs) ToSecretBackendConnectionHanaPtrOutputWithContext(ctx context.Context) SecretBackendConnectionHanaPtrOutput

type SecretBackendConnectionHanaInput

type SecretBackendConnectionHanaInput interface {
	pulumi.Input

	ToSecretBackendConnectionHanaOutput() SecretBackendConnectionHanaOutput
	ToSecretBackendConnectionHanaOutputWithContext(context.Context) SecretBackendConnectionHanaOutput
}

SecretBackendConnectionHanaInput is an input type that accepts SecretBackendConnectionHanaArgs and SecretBackendConnectionHanaOutput values. You can construct a concrete instance of `SecretBackendConnectionHanaInput` via:

SecretBackendConnectionHanaArgs{...}

type SecretBackendConnectionHanaOutput

type SecretBackendConnectionHanaOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionHanaOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionHanaOutput) DisableEscaping added in v5.4.0

Disable special character escaping in username and password.

func (SecretBackendConnectionHanaOutput) ElementType

func (SecretBackendConnectionHanaOutput) MaxConnectionLifetime

func (o SecretBackendConnectionHanaOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionHanaOutput) MaxIdleConnections

func (o SecretBackendConnectionHanaOutput) MaxIdleConnections() pulumi.IntPtrOutput

The maximum number of idle connections to maintain.

func (SecretBackendConnectionHanaOutput) MaxOpenConnections

func (o SecretBackendConnectionHanaOutput) MaxOpenConnections() pulumi.IntPtrOutput

The maximum number of open connections to use.

func (SecretBackendConnectionHanaOutput) Password added in v5.3.0

The password to authenticate with.

func (SecretBackendConnectionHanaOutput) ToSecretBackendConnectionHanaOutput

func (o SecretBackendConnectionHanaOutput) ToSecretBackendConnectionHanaOutput() SecretBackendConnectionHanaOutput

func (SecretBackendConnectionHanaOutput) ToSecretBackendConnectionHanaOutputWithContext

func (o SecretBackendConnectionHanaOutput) ToSecretBackendConnectionHanaOutputWithContext(ctx context.Context) SecretBackendConnectionHanaOutput

func (SecretBackendConnectionHanaOutput) ToSecretBackendConnectionHanaPtrOutput

func (o SecretBackendConnectionHanaOutput) ToSecretBackendConnectionHanaPtrOutput() SecretBackendConnectionHanaPtrOutput

func (SecretBackendConnectionHanaOutput) ToSecretBackendConnectionHanaPtrOutputWithContext

func (o SecretBackendConnectionHanaOutput) ToSecretBackendConnectionHanaPtrOutputWithContext(ctx context.Context) SecretBackendConnectionHanaPtrOutput

func (SecretBackendConnectionHanaOutput) Username added in v5.3.0

The username to authenticate with.

type SecretBackendConnectionHanaPtrInput

type SecretBackendConnectionHanaPtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionHanaPtrOutput() SecretBackendConnectionHanaPtrOutput
	ToSecretBackendConnectionHanaPtrOutputWithContext(context.Context) SecretBackendConnectionHanaPtrOutput
}

SecretBackendConnectionHanaPtrInput is an input type that accepts SecretBackendConnectionHanaArgs, SecretBackendConnectionHanaPtr and SecretBackendConnectionHanaPtrOutput values. You can construct a concrete instance of `SecretBackendConnectionHanaPtrInput` via:

        SecretBackendConnectionHanaArgs{...}

or:

        nil

type SecretBackendConnectionHanaPtrOutput

type SecretBackendConnectionHanaPtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionHanaPtrOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionHanaPtrOutput) DisableEscaping added in v5.4.0

Disable special character escaping in username and password.

func (SecretBackendConnectionHanaPtrOutput) Elem

func (SecretBackendConnectionHanaPtrOutput) ElementType

func (SecretBackendConnectionHanaPtrOutput) MaxConnectionLifetime

func (o SecretBackendConnectionHanaPtrOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionHanaPtrOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionHanaPtrOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionHanaPtrOutput) Password added in v5.3.0

The password to authenticate with.

func (SecretBackendConnectionHanaPtrOutput) ToSecretBackendConnectionHanaPtrOutput

func (o SecretBackendConnectionHanaPtrOutput) ToSecretBackendConnectionHanaPtrOutput() SecretBackendConnectionHanaPtrOutput

func (SecretBackendConnectionHanaPtrOutput) ToSecretBackendConnectionHanaPtrOutputWithContext

func (o SecretBackendConnectionHanaPtrOutput) ToSecretBackendConnectionHanaPtrOutputWithContext(ctx context.Context) SecretBackendConnectionHanaPtrOutput

func (SecretBackendConnectionHanaPtrOutput) Username added in v5.3.0

The username to authenticate with.

type SecretBackendConnectionInfluxdb added in v5.1.0

type SecretBackendConnectionInfluxdb struct {
	// The number of seconds to use as a connection
	// timeout.
	ConnectTimeout *int `pulumi:"connectTimeout"`
	// The host to connect to.
	Host string `pulumi:"host"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls *bool `pulumi:"insecureTls"`
	// The password to authenticate with.
	Password string `pulumi:"password"`
	// Concatenated PEM blocks configuring the certificate
	// chain.
	PemBundle *string `pulumi:"pemBundle"`
	// A JSON structure configuring the certificate chain.
	PemJson *string `pulumi:"pemJson"`
	// The default port to connect to if no port is specified as
	// part of the host.
	Port *int `pulumi:"port"`
	// Whether to use TLS when connecting to Cassandra.
	Tls *bool `pulumi:"tls"`
	// The username to authenticate with.
	Username string `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
}

type SecretBackendConnectionInfluxdbArgs added in v5.1.0

type SecretBackendConnectionInfluxdbArgs struct {
	// The number of seconds to use as a connection
	// timeout.
	ConnectTimeout pulumi.IntPtrInput `pulumi:"connectTimeout"`
	// The host to connect to.
	Host pulumi.StringInput `pulumi:"host"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls pulumi.BoolPtrInput `pulumi:"insecureTls"`
	// The password to authenticate with.
	Password pulumi.StringInput `pulumi:"password"`
	// Concatenated PEM blocks configuring the certificate
	// chain.
	PemBundle pulumi.StringPtrInput `pulumi:"pemBundle"`
	// A JSON structure configuring the certificate chain.
	PemJson pulumi.StringPtrInput `pulumi:"pemJson"`
	// The default port to connect to if no port is specified as
	// part of the host.
	Port pulumi.IntPtrInput `pulumi:"port"`
	// Whether to use TLS when connecting to Cassandra.
	Tls pulumi.BoolPtrInput `pulumi:"tls"`
	// The username to authenticate with.
	Username pulumi.StringInput `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
}

func (SecretBackendConnectionInfluxdbArgs) ElementType added in v5.1.0

func (SecretBackendConnectionInfluxdbArgs) ToSecretBackendConnectionInfluxdbOutput added in v5.1.0

func (i SecretBackendConnectionInfluxdbArgs) ToSecretBackendConnectionInfluxdbOutput() SecretBackendConnectionInfluxdbOutput

func (SecretBackendConnectionInfluxdbArgs) ToSecretBackendConnectionInfluxdbOutputWithContext added in v5.1.0

func (i SecretBackendConnectionInfluxdbArgs) ToSecretBackendConnectionInfluxdbOutputWithContext(ctx context.Context) SecretBackendConnectionInfluxdbOutput

func (SecretBackendConnectionInfluxdbArgs) ToSecretBackendConnectionInfluxdbPtrOutput added in v5.1.0

func (i SecretBackendConnectionInfluxdbArgs) ToSecretBackendConnectionInfluxdbPtrOutput() SecretBackendConnectionInfluxdbPtrOutput

func (SecretBackendConnectionInfluxdbArgs) ToSecretBackendConnectionInfluxdbPtrOutputWithContext added in v5.1.0

func (i SecretBackendConnectionInfluxdbArgs) ToSecretBackendConnectionInfluxdbPtrOutputWithContext(ctx context.Context) SecretBackendConnectionInfluxdbPtrOutput

type SecretBackendConnectionInfluxdbInput added in v5.1.0

type SecretBackendConnectionInfluxdbInput interface {
	pulumi.Input

	ToSecretBackendConnectionInfluxdbOutput() SecretBackendConnectionInfluxdbOutput
	ToSecretBackendConnectionInfluxdbOutputWithContext(context.Context) SecretBackendConnectionInfluxdbOutput
}

SecretBackendConnectionInfluxdbInput is an input type that accepts SecretBackendConnectionInfluxdbArgs and SecretBackendConnectionInfluxdbOutput values. You can construct a concrete instance of `SecretBackendConnectionInfluxdbInput` via:

SecretBackendConnectionInfluxdbArgs{...}

type SecretBackendConnectionInfluxdbOutput added in v5.1.0

type SecretBackendConnectionInfluxdbOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionInfluxdbOutput) ConnectTimeout added in v5.1.0

The number of seconds to use as a connection timeout.

func (SecretBackendConnectionInfluxdbOutput) ElementType added in v5.1.0

func (SecretBackendConnectionInfluxdbOutput) Host added in v5.1.0

The host to connect to.

func (SecretBackendConnectionInfluxdbOutput) InsecureTls added in v5.1.0

Whether to skip verification of the server certificate when using TLS.

func (SecretBackendConnectionInfluxdbOutput) Password added in v5.1.0

The password to authenticate with.

func (SecretBackendConnectionInfluxdbOutput) PemBundle added in v5.1.0

Concatenated PEM blocks configuring the certificate chain.

func (SecretBackendConnectionInfluxdbOutput) PemJson added in v5.1.0

A JSON structure configuring the certificate chain.

func (SecretBackendConnectionInfluxdbOutput) Port added in v5.1.0

The default port to connect to if no port is specified as part of the host.

func (SecretBackendConnectionInfluxdbOutput) Tls added in v5.1.0

Whether to use TLS when connecting to Cassandra.

func (SecretBackendConnectionInfluxdbOutput) ToSecretBackendConnectionInfluxdbOutput added in v5.1.0

func (o SecretBackendConnectionInfluxdbOutput) ToSecretBackendConnectionInfluxdbOutput() SecretBackendConnectionInfluxdbOutput

func (SecretBackendConnectionInfluxdbOutput) ToSecretBackendConnectionInfluxdbOutputWithContext added in v5.1.0

func (o SecretBackendConnectionInfluxdbOutput) ToSecretBackendConnectionInfluxdbOutputWithContext(ctx context.Context) SecretBackendConnectionInfluxdbOutput

func (SecretBackendConnectionInfluxdbOutput) ToSecretBackendConnectionInfluxdbPtrOutput added in v5.1.0

func (o SecretBackendConnectionInfluxdbOutput) ToSecretBackendConnectionInfluxdbPtrOutput() SecretBackendConnectionInfluxdbPtrOutput

func (SecretBackendConnectionInfluxdbOutput) ToSecretBackendConnectionInfluxdbPtrOutputWithContext added in v5.1.0

func (o SecretBackendConnectionInfluxdbOutput) ToSecretBackendConnectionInfluxdbPtrOutputWithContext(ctx context.Context) SecretBackendConnectionInfluxdbPtrOutput

func (SecretBackendConnectionInfluxdbOutput) Username added in v5.1.0

The username to authenticate with.

func (SecretBackendConnectionInfluxdbOutput) UsernameTemplate added in v5.1.0

Template describing how dynamic usernames are generated.

type SecretBackendConnectionInfluxdbPtrInput added in v5.1.0

type SecretBackendConnectionInfluxdbPtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionInfluxdbPtrOutput() SecretBackendConnectionInfluxdbPtrOutput
	ToSecretBackendConnectionInfluxdbPtrOutputWithContext(context.Context) SecretBackendConnectionInfluxdbPtrOutput
}

SecretBackendConnectionInfluxdbPtrInput is an input type that accepts SecretBackendConnectionInfluxdbArgs, SecretBackendConnectionInfluxdbPtr and SecretBackendConnectionInfluxdbPtrOutput values. You can construct a concrete instance of `SecretBackendConnectionInfluxdbPtrInput` via:

        SecretBackendConnectionInfluxdbArgs{...}

or:

        nil

type SecretBackendConnectionInfluxdbPtrOutput added in v5.1.0

type SecretBackendConnectionInfluxdbPtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionInfluxdbPtrOutput) ConnectTimeout added in v5.1.0

The number of seconds to use as a connection timeout.

func (SecretBackendConnectionInfluxdbPtrOutput) Elem added in v5.1.0

func (SecretBackendConnectionInfluxdbPtrOutput) ElementType added in v5.1.0

func (SecretBackendConnectionInfluxdbPtrOutput) Host added in v5.1.0

The host to connect to.

func (SecretBackendConnectionInfluxdbPtrOutput) InsecureTls added in v5.1.0

Whether to skip verification of the server certificate when using TLS.

func (SecretBackendConnectionInfluxdbPtrOutput) Password added in v5.1.0

The password to authenticate with.

func (SecretBackendConnectionInfluxdbPtrOutput) PemBundle added in v5.1.0

Concatenated PEM blocks configuring the certificate chain.

func (SecretBackendConnectionInfluxdbPtrOutput) PemJson added in v5.1.0

A JSON structure configuring the certificate chain.

func (SecretBackendConnectionInfluxdbPtrOutput) Port added in v5.1.0

The default port to connect to if no port is specified as part of the host.

func (SecretBackendConnectionInfluxdbPtrOutput) Tls added in v5.1.0

Whether to use TLS when connecting to Cassandra.

func (SecretBackendConnectionInfluxdbPtrOutput) ToSecretBackendConnectionInfluxdbPtrOutput added in v5.1.0

func (o SecretBackendConnectionInfluxdbPtrOutput) ToSecretBackendConnectionInfluxdbPtrOutput() SecretBackendConnectionInfluxdbPtrOutput

func (SecretBackendConnectionInfluxdbPtrOutput) ToSecretBackendConnectionInfluxdbPtrOutputWithContext added in v5.1.0

func (o SecretBackendConnectionInfluxdbPtrOutput) ToSecretBackendConnectionInfluxdbPtrOutputWithContext(ctx context.Context) SecretBackendConnectionInfluxdbPtrOutput

func (SecretBackendConnectionInfluxdbPtrOutput) Username added in v5.1.0

The username to authenticate with.

func (SecretBackendConnectionInfluxdbPtrOutput) UsernameTemplate added in v5.1.0

Template describing how dynamic usernames are generated.

type SecretBackendConnectionInput

type SecretBackendConnectionInput interface {
	pulumi.Input

	ToSecretBackendConnectionOutput() SecretBackendConnectionOutput
	ToSecretBackendConnectionOutputWithContext(ctx context.Context) SecretBackendConnectionOutput
}

type SecretBackendConnectionMap

type SecretBackendConnectionMap map[string]SecretBackendConnectionInput

func (SecretBackendConnectionMap) ElementType

func (SecretBackendConnectionMap) ElementType() reflect.Type

func (SecretBackendConnectionMap) ToSecretBackendConnectionMapOutput

func (i SecretBackendConnectionMap) ToSecretBackendConnectionMapOutput() SecretBackendConnectionMapOutput

func (SecretBackendConnectionMap) ToSecretBackendConnectionMapOutputWithContext

func (i SecretBackendConnectionMap) ToSecretBackendConnectionMapOutputWithContext(ctx context.Context) SecretBackendConnectionMapOutput

type SecretBackendConnectionMapInput

type SecretBackendConnectionMapInput interface {
	pulumi.Input

	ToSecretBackendConnectionMapOutput() SecretBackendConnectionMapOutput
	ToSecretBackendConnectionMapOutputWithContext(context.Context) SecretBackendConnectionMapOutput
}

SecretBackendConnectionMapInput is an input type that accepts SecretBackendConnectionMap and SecretBackendConnectionMapOutput values. You can construct a concrete instance of `SecretBackendConnectionMapInput` via:

SecretBackendConnectionMap{ "key": SecretBackendConnectionArgs{...} }

type SecretBackendConnectionMapOutput

type SecretBackendConnectionMapOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMapOutput) ElementType

func (SecretBackendConnectionMapOutput) MapIndex

func (SecretBackendConnectionMapOutput) ToSecretBackendConnectionMapOutput

func (o SecretBackendConnectionMapOutput) ToSecretBackendConnectionMapOutput() SecretBackendConnectionMapOutput

func (SecretBackendConnectionMapOutput) ToSecretBackendConnectionMapOutputWithContext

func (o SecretBackendConnectionMapOutput) ToSecretBackendConnectionMapOutputWithContext(ctx context.Context) SecretBackendConnectionMapOutput

type SecretBackendConnectionMongodb

type SecretBackendConnectionMongodb struct {
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password *string `pulumi:"password"`
	// The username to authenticate with.
	Username *string `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
}

type SecretBackendConnectionMongodbArgs

type SecretBackendConnectionMongodbArgs struct {
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// The username to authenticate with.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
}

func (SecretBackendConnectionMongodbArgs) ElementType

func (SecretBackendConnectionMongodbArgs) ToSecretBackendConnectionMongodbOutput

func (i SecretBackendConnectionMongodbArgs) ToSecretBackendConnectionMongodbOutput() SecretBackendConnectionMongodbOutput

func (SecretBackendConnectionMongodbArgs) ToSecretBackendConnectionMongodbOutputWithContext

func (i SecretBackendConnectionMongodbArgs) ToSecretBackendConnectionMongodbOutputWithContext(ctx context.Context) SecretBackendConnectionMongodbOutput

func (SecretBackendConnectionMongodbArgs) ToSecretBackendConnectionMongodbPtrOutput

func (i SecretBackendConnectionMongodbArgs) ToSecretBackendConnectionMongodbPtrOutput() SecretBackendConnectionMongodbPtrOutput

func (SecretBackendConnectionMongodbArgs) ToSecretBackendConnectionMongodbPtrOutputWithContext

func (i SecretBackendConnectionMongodbArgs) ToSecretBackendConnectionMongodbPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMongodbPtrOutput

type SecretBackendConnectionMongodbInput

type SecretBackendConnectionMongodbInput interface {
	pulumi.Input

	ToSecretBackendConnectionMongodbOutput() SecretBackendConnectionMongodbOutput
	ToSecretBackendConnectionMongodbOutputWithContext(context.Context) SecretBackendConnectionMongodbOutput
}

SecretBackendConnectionMongodbInput is an input type that accepts SecretBackendConnectionMongodbArgs and SecretBackendConnectionMongodbOutput values. You can construct a concrete instance of `SecretBackendConnectionMongodbInput` via:

SecretBackendConnectionMongodbArgs{...}

type SecretBackendConnectionMongodbOutput

type SecretBackendConnectionMongodbOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMongodbOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionMongodbOutput) ElementType

func (SecretBackendConnectionMongodbOutput) MaxConnectionLifetime

func (o SecretBackendConnectionMongodbOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionMongodbOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionMongodbOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionMongodbOutput) Password added in v5.3.0

The password to authenticate with.

func (SecretBackendConnectionMongodbOutput) ToSecretBackendConnectionMongodbOutput

func (o SecretBackendConnectionMongodbOutput) ToSecretBackendConnectionMongodbOutput() SecretBackendConnectionMongodbOutput

func (SecretBackendConnectionMongodbOutput) ToSecretBackendConnectionMongodbOutputWithContext

func (o SecretBackendConnectionMongodbOutput) ToSecretBackendConnectionMongodbOutputWithContext(ctx context.Context) SecretBackendConnectionMongodbOutput

func (SecretBackendConnectionMongodbOutput) ToSecretBackendConnectionMongodbPtrOutput

func (o SecretBackendConnectionMongodbOutput) ToSecretBackendConnectionMongodbPtrOutput() SecretBackendConnectionMongodbPtrOutput

func (SecretBackendConnectionMongodbOutput) ToSecretBackendConnectionMongodbPtrOutputWithContext

func (o SecretBackendConnectionMongodbOutput) ToSecretBackendConnectionMongodbPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMongodbPtrOutput

func (SecretBackendConnectionMongodbOutput) Username added in v5.3.0

The username to authenticate with.

func (SecretBackendConnectionMongodbOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionMongodbPtrInput

type SecretBackendConnectionMongodbPtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionMongodbPtrOutput() SecretBackendConnectionMongodbPtrOutput
	ToSecretBackendConnectionMongodbPtrOutputWithContext(context.Context) SecretBackendConnectionMongodbPtrOutput
}

SecretBackendConnectionMongodbPtrInput is an input type that accepts SecretBackendConnectionMongodbArgs, SecretBackendConnectionMongodbPtr and SecretBackendConnectionMongodbPtrOutput values. You can construct a concrete instance of `SecretBackendConnectionMongodbPtrInput` via:

        SecretBackendConnectionMongodbArgs{...}

or:

        nil

type SecretBackendConnectionMongodbPtrOutput

type SecretBackendConnectionMongodbPtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMongodbPtrOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionMongodbPtrOutput) Elem

func (SecretBackendConnectionMongodbPtrOutput) ElementType

func (SecretBackendConnectionMongodbPtrOutput) MaxConnectionLifetime

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionMongodbPtrOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionMongodbPtrOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionMongodbPtrOutput) Password added in v5.3.0

The password to authenticate with.

func (SecretBackendConnectionMongodbPtrOutput) ToSecretBackendConnectionMongodbPtrOutput

func (o SecretBackendConnectionMongodbPtrOutput) ToSecretBackendConnectionMongodbPtrOutput() SecretBackendConnectionMongodbPtrOutput

func (SecretBackendConnectionMongodbPtrOutput) ToSecretBackendConnectionMongodbPtrOutputWithContext

func (o SecretBackendConnectionMongodbPtrOutput) ToSecretBackendConnectionMongodbPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMongodbPtrOutput

func (SecretBackendConnectionMongodbPtrOutput) Username added in v5.3.0

The username to authenticate with.

func (SecretBackendConnectionMongodbPtrOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionMongodbatlas

type SecretBackendConnectionMongodbatlas struct {
	// The Private Programmatic API Key used to connect with MongoDB Atlas API.
	PrivateKey string `pulumi:"privateKey"`
	// The Project ID the Database User should be created within.
	ProjectId string `pulumi:"projectId"`
	// The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
	PublicKey string `pulumi:"publicKey"`
}

type SecretBackendConnectionMongodbatlasArgs

type SecretBackendConnectionMongodbatlasArgs struct {
	// The Private Programmatic API Key used to connect with MongoDB Atlas API.
	PrivateKey pulumi.StringInput `pulumi:"privateKey"`
	// The Project ID the Database User should be created within.
	ProjectId pulumi.StringInput `pulumi:"projectId"`
	// The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
	PublicKey pulumi.StringInput `pulumi:"publicKey"`
}

func (SecretBackendConnectionMongodbatlasArgs) ElementType

func (SecretBackendConnectionMongodbatlasArgs) ToSecretBackendConnectionMongodbatlasOutput

func (i SecretBackendConnectionMongodbatlasArgs) ToSecretBackendConnectionMongodbatlasOutput() SecretBackendConnectionMongodbatlasOutput

func (SecretBackendConnectionMongodbatlasArgs) ToSecretBackendConnectionMongodbatlasOutputWithContext

func (i SecretBackendConnectionMongodbatlasArgs) ToSecretBackendConnectionMongodbatlasOutputWithContext(ctx context.Context) SecretBackendConnectionMongodbatlasOutput

func (SecretBackendConnectionMongodbatlasArgs) ToSecretBackendConnectionMongodbatlasPtrOutput

func (i SecretBackendConnectionMongodbatlasArgs) ToSecretBackendConnectionMongodbatlasPtrOutput() SecretBackendConnectionMongodbatlasPtrOutput

func (SecretBackendConnectionMongodbatlasArgs) ToSecretBackendConnectionMongodbatlasPtrOutputWithContext

func (i SecretBackendConnectionMongodbatlasArgs) ToSecretBackendConnectionMongodbatlasPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMongodbatlasPtrOutput

type SecretBackendConnectionMongodbatlasInput

type SecretBackendConnectionMongodbatlasInput interface {
	pulumi.Input

	ToSecretBackendConnectionMongodbatlasOutput() SecretBackendConnectionMongodbatlasOutput
	ToSecretBackendConnectionMongodbatlasOutputWithContext(context.Context) SecretBackendConnectionMongodbatlasOutput
}

SecretBackendConnectionMongodbatlasInput is an input type that accepts SecretBackendConnectionMongodbatlasArgs and SecretBackendConnectionMongodbatlasOutput values. You can construct a concrete instance of `SecretBackendConnectionMongodbatlasInput` via:

SecretBackendConnectionMongodbatlasArgs{...}

type SecretBackendConnectionMongodbatlasOutput

type SecretBackendConnectionMongodbatlasOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMongodbatlasOutput) ElementType

func (SecretBackendConnectionMongodbatlasOutput) PrivateKey

The Private Programmatic API Key used to connect with MongoDB Atlas API.

func (SecretBackendConnectionMongodbatlasOutput) ProjectId

The Project ID the Database User should be created within.

func (SecretBackendConnectionMongodbatlasOutput) PublicKey

The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.

func (SecretBackendConnectionMongodbatlasOutput) ToSecretBackendConnectionMongodbatlasOutput

func (o SecretBackendConnectionMongodbatlasOutput) ToSecretBackendConnectionMongodbatlasOutput() SecretBackendConnectionMongodbatlasOutput

func (SecretBackendConnectionMongodbatlasOutput) ToSecretBackendConnectionMongodbatlasOutputWithContext

func (o SecretBackendConnectionMongodbatlasOutput) ToSecretBackendConnectionMongodbatlasOutputWithContext(ctx context.Context) SecretBackendConnectionMongodbatlasOutput

func (SecretBackendConnectionMongodbatlasOutput) ToSecretBackendConnectionMongodbatlasPtrOutput

func (o SecretBackendConnectionMongodbatlasOutput) ToSecretBackendConnectionMongodbatlasPtrOutput() SecretBackendConnectionMongodbatlasPtrOutput

func (SecretBackendConnectionMongodbatlasOutput) ToSecretBackendConnectionMongodbatlasPtrOutputWithContext

func (o SecretBackendConnectionMongodbatlasOutput) ToSecretBackendConnectionMongodbatlasPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMongodbatlasPtrOutput

type SecretBackendConnectionMongodbatlasPtrInput

type SecretBackendConnectionMongodbatlasPtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionMongodbatlasPtrOutput() SecretBackendConnectionMongodbatlasPtrOutput
	ToSecretBackendConnectionMongodbatlasPtrOutputWithContext(context.Context) SecretBackendConnectionMongodbatlasPtrOutput
}

SecretBackendConnectionMongodbatlasPtrInput is an input type that accepts SecretBackendConnectionMongodbatlasArgs, SecretBackendConnectionMongodbatlasPtr and SecretBackendConnectionMongodbatlasPtrOutput values. You can construct a concrete instance of `SecretBackendConnectionMongodbatlasPtrInput` via:

        SecretBackendConnectionMongodbatlasArgs{...}

or:

        nil

type SecretBackendConnectionMongodbatlasPtrOutput

type SecretBackendConnectionMongodbatlasPtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMongodbatlasPtrOutput) Elem

func (SecretBackendConnectionMongodbatlasPtrOutput) ElementType

func (SecretBackendConnectionMongodbatlasPtrOutput) PrivateKey

The Private Programmatic API Key used to connect with MongoDB Atlas API.

func (SecretBackendConnectionMongodbatlasPtrOutput) ProjectId

The Project ID the Database User should be created within.

func (SecretBackendConnectionMongodbatlasPtrOutput) PublicKey

The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.

func (SecretBackendConnectionMongodbatlasPtrOutput) ToSecretBackendConnectionMongodbatlasPtrOutput

func (o SecretBackendConnectionMongodbatlasPtrOutput) ToSecretBackendConnectionMongodbatlasPtrOutput() SecretBackendConnectionMongodbatlasPtrOutput

func (SecretBackendConnectionMongodbatlasPtrOutput) ToSecretBackendConnectionMongodbatlasPtrOutputWithContext

func (o SecretBackendConnectionMongodbatlasPtrOutput) ToSecretBackendConnectionMongodbatlasPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMongodbatlasPtrOutput

type SecretBackendConnectionMssql

type SecretBackendConnectionMssql struct {
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// For Vault v1.9+. Set to true when the target is a
	// Contained Database, e.g. AzureSQL.
	// See the [Vault
	// docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
	ContainedDb *bool `pulumi:"containedDb"`
	// Disable special character escaping in username and password.
	DisableEscaping *bool `pulumi:"disableEscaping"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password *string `pulumi:"password"`
	// The username to authenticate with.
	Username *string `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
}

type SecretBackendConnectionMssqlArgs

type SecretBackendConnectionMssqlArgs struct {
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// For Vault v1.9+. Set to true when the target is a
	// Contained Database, e.g. AzureSQL.
	// See the [Vault
	// docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
	ContainedDb pulumi.BoolPtrInput `pulumi:"containedDb"`
	// Disable special character escaping in username and password.
	DisableEscaping pulumi.BoolPtrInput `pulumi:"disableEscaping"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// The username to authenticate with.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
}

func (SecretBackendConnectionMssqlArgs) ElementType

func (SecretBackendConnectionMssqlArgs) ToSecretBackendConnectionMssqlOutput

func (i SecretBackendConnectionMssqlArgs) ToSecretBackendConnectionMssqlOutput() SecretBackendConnectionMssqlOutput

func (SecretBackendConnectionMssqlArgs) ToSecretBackendConnectionMssqlOutputWithContext

func (i SecretBackendConnectionMssqlArgs) ToSecretBackendConnectionMssqlOutputWithContext(ctx context.Context) SecretBackendConnectionMssqlOutput

func (SecretBackendConnectionMssqlArgs) ToSecretBackendConnectionMssqlPtrOutput

func (i SecretBackendConnectionMssqlArgs) ToSecretBackendConnectionMssqlPtrOutput() SecretBackendConnectionMssqlPtrOutput

func (SecretBackendConnectionMssqlArgs) ToSecretBackendConnectionMssqlPtrOutputWithContext

func (i SecretBackendConnectionMssqlArgs) ToSecretBackendConnectionMssqlPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMssqlPtrOutput

type SecretBackendConnectionMssqlInput

type SecretBackendConnectionMssqlInput interface {
	pulumi.Input

	ToSecretBackendConnectionMssqlOutput() SecretBackendConnectionMssqlOutput
	ToSecretBackendConnectionMssqlOutputWithContext(context.Context) SecretBackendConnectionMssqlOutput
}

SecretBackendConnectionMssqlInput is an input type that accepts SecretBackendConnectionMssqlArgs and SecretBackendConnectionMssqlOutput values. You can construct a concrete instance of `SecretBackendConnectionMssqlInput` via:

SecretBackendConnectionMssqlArgs{...}

type SecretBackendConnectionMssqlOutput

type SecretBackendConnectionMssqlOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMssqlOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionMssqlOutput) ContainedDb added in v5.1.0

For Vault v1.9+. Set to true when the target is a Contained Database, e.g. AzureSQL. See the [Vault docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)

func (SecretBackendConnectionMssqlOutput) DisableEscaping added in v5.4.0

Disable special character escaping in username and password.

func (SecretBackendConnectionMssqlOutput) ElementType

func (SecretBackendConnectionMssqlOutput) MaxConnectionLifetime

func (o SecretBackendConnectionMssqlOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionMssqlOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionMssqlOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionMssqlOutput) Password added in v5.3.0

The password to authenticate with.

func (SecretBackendConnectionMssqlOutput) ToSecretBackendConnectionMssqlOutput

func (o SecretBackendConnectionMssqlOutput) ToSecretBackendConnectionMssqlOutput() SecretBackendConnectionMssqlOutput

func (SecretBackendConnectionMssqlOutput) ToSecretBackendConnectionMssqlOutputWithContext

func (o SecretBackendConnectionMssqlOutput) ToSecretBackendConnectionMssqlOutputWithContext(ctx context.Context) SecretBackendConnectionMssqlOutput

func (SecretBackendConnectionMssqlOutput) ToSecretBackendConnectionMssqlPtrOutput

func (o SecretBackendConnectionMssqlOutput) ToSecretBackendConnectionMssqlPtrOutput() SecretBackendConnectionMssqlPtrOutput

func (SecretBackendConnectionMssqlOutput) ToSecretBackendConnectionMssqlPtrOutputWithContext

func (o SecretBackendConnectionMssqlOutput) ToSecretBackendConnectionMssqlPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMssqlPtrOutput

func (SecretBackendConnectionMssqlOutput) Username added in v5.3.0

The username to authenticate with.

func (SecretBackendConnectionMssqlOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionMssqlPtrInput

type SecretBackendConnectionMssqlPtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionMssqlPtrOutput() SecretBackendConnectionMssqlPtrOutput
	ToSecretBackendConnectionMssqlPtrOutputWithContext(context.Context) SecretBackendConnectionMssqlPtrOutput
}

SecretBackendConnectionMssqlPtrInput is an input type that accepts SecretBackendConnectionMssqlArgs, SecretBackendConnectionMssqlPtr and SecretBackendConnectionMssqlPtrOutput values. You can construct a concrete instance of `SecretBackendConnectionMssqlPtrInput` via:

        SecretBackendConnectionMssqlArgs{...}

or:

        nil

type SecretBackendConnectionMssqlPtrOutput

type SecretBackendConnectionMssqlPtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMssqlPtrOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionMssqlPtrOutput) ContainedDb added in v5.1.0

For Vault v1.9+. Set to true when the target is a Contained Database, e.g. AzureSQL. See the [Vault docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)

func (SecretBackendConnectionMssqlPtrOutput) DisableEscaping added in v5.4.0

Disable special character escaping in username and password.

func (SecretBackendConnectionMssqlPtrOutput) Elem

func (SecretBackendConnectionMssqlPtrOutput) ElementType

func (SecretBackendConnectionMssqlPtrOutput) MaxConnectionLifetime

func (o SecretBackendConnectionMssqlPtrOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionMssqlPtrOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionMssqlPtrOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionMssqlPtrOutput) Password added in v5.3.0

The password to authenticate with.

func (SecretBackendConnectionMssqlPtrOutput) ToSecretBackendConnectionMssqlPtrOutput

func (o SecretBackendConnectionMssqlPtrOutput) ToSecretBackendConnectionMssqlPtrOutput() SecretBackendConnectionMssqlPtrOutput

func (SecretBackendConnectionMssqlPtrOutput) ToSecretBackendConnectionMssqlPtrOutputWithContext

func (o SecretBackendConnectionMssqlPtrOutput) ToSecretBackendConnectionMssqlPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMssqlPtrOutput

func (SecretBackendConnectionMssqlPtrOutput) Username added in v5.3.0

The username to authenticate with.

func (SecretBackendConnectionMssqlPtrOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionMysql

type SecretBackendConnectionMysql struct {
	// Enable IAM authentication to a Google Cloud instance when set to `gcpIam`
	AuthType *string `pulumi:"authType"`
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password *string `pulumi:"password"`
	// JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.
	ServiceAccountJson *string `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa *string `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey *string `pulumi:"tlsCertificateKey"`
	// The username to authenticate with.
	Username *string `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
}

type SecretBackendConnectionMysqlArgs

type SecretBackendConnectionMysqlArgs struct {
	// Enable IAM authentication to a Google Cloud instance when set to `gcpIam`
	AuthType pulumi.StringPtrInput `pulumi:"authType"`
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.
	ServiceAccountJson pulumi.StringPtrInput `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa pulumi.StringPtrInput `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey pulumi.StringPtrInput `pulumi:"tlsCertificateKey"`
	// The username to authenticate with.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
}

func (SecretBackendConnectionMysqlArgs) ElementType

func (SecretBackendConnectionMysqlArgs) ToSecretBackendConnectionMysqlOutput

func (i SecretBackendConnectionMysqlArgs) ToSecretBackendConnectionMysqlOutput() SecretBackendConnectionMysqlOutput

func (SecretBackendConnectionMysqlArgs) ToSecretBackendConnectionMysqlOutputWithContext

func (i SecretBackendConnectionMysqlArgs) ToSecretBackendConnectionMysqlOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlOutput

func (SecretBackendConnectionMysqlArgs) ToSecretBackendConnectionMysqlPtrOutput

func (i SecretBackendConnectionMysqlArgs) ToSecretBackendConnectionMysqlPtrOutput() SecretBackendConnectionMysqlPtrOutput

func (SecretBackendConnectionMysqlArgs) ToSecretBackendConnectionMysqlPtrOutputWithContext

func (i SecretBackendConnectionMysqlArgs) ToSecretBackendConnectionMysqlPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlPtrOutput

type SecretBackendConnectionMysqlAurora

type SecretBackendConnectionMysqlAurora struct {
	// Enable IAM authentication to a Google Cloud instance when set to `gcpIam`
	AuthType *string `pulumi:"authType"`
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password *string `pulumi:"password"`
	// JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.
	ServiceAccountJson *string `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa *string `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey *string `pulumi:"tlsCertificateKey"`
	// The username to authenticate with.
	Username *string `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
}

type SecretBackendConnectionMysqlAuroraArgs

type SecretBackendConnectionMysqlAuroraArgs struct {
	// Enable IAM authentication to a Google Cloud instance when set to `gcpIam`
	AuthType pulumi.StringPtrInput `pulumi:"authType"`
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.
	ServiceAccountJson pulumi.StringPtrInput `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa pulumi.StringPtrInput `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey pulumi.StringPtrInput `pulumi:"tlsCertificateKey"`
	// The username to authenticate with.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
}

func (SecretBackendConnectionMysqlAuroraArgs) ElementType

func (SecretBackendConnectionMysqlAuroraArgs) ToSecretBackendConnectionMysqlAuroraOutput

func (i SecretBackendConnectionMysqlAuroraArgs) ToSecretBackendConnectionMysqlAuroraOutput() SecretBackendConnectionMysqlAuroraOutput

func (SecretBackendConnectionMysqlAuroraArgs) ToSecretBackendConnectionMysqlAuroraOutputWithContext

func (i SecretBackendConnectionMysqlAuroraArgs) ToSecretBackendConnectionMysqlAuroraOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlAuroraOutput

func (SecretBackendConnectionMysqlAuroraArgs) ToSecretBackendConnectionMysqlAuroraPtrOutput

func (i SecretBackendConnectionMysqlAuroraArgs) ToSecretBackendConnectionMysqlAuroraPtrOutput() SecretBackendConnectionMysqlAuroraPtrOutput

func (SecretBackendConnectionMysqlAuroraArgs) ToSecretBackendConnectionMysqlAuroraPtrOutputWithContext

func (i SecretBackendConnectionMysqlAuroraArgs) ToSecretBackendConnectionMysqlAuroraPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlAuroraPtrOutput

type SecretBackendConnectionMysqlAuroraInput

type SecretBackendConnectionMysqlAuroraInput interface {
	pulumi.Input

	ToSecretBackendConnectionMysqlAuroraOutput() SecretBackendConnectionMysqlAuroraOutput
	ToSecretBackendConnectionMysqlAuroraOutputWithContext(context.Context) SecretBackendConnectionMysqlAuroraOutput
}

SecretBackendConnectionMysqlAuroraInput is an input type that accepts SecretBackendConnectionMysqlAuroraArgs and SecretBackendConnectionMysqlAuroraOutput values. You can construct a concrete instance of `SecretBackendConnectionMysqlAuroraInput` via:

SecretBackendConnectionMysqlAuroraArgs{...}

type SecretBackendConnectionMysqlAuroraOutput

type SecretBackendConnectionMysqlAuroraOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMysqlAuroraOutput) AuthType added in v5.19.0

Enable IAM authentication to a Google Cloud instance when set to `gcpIam`

func (SecretBackendConnectionMysqlAuroraOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionMysqlAuroraOutput) ElementType

func (SecretBackendConnectionMysqlAuroraOutput) MaxConnectionLifetime

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionMysqlAuroraOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionMysqlAuroraOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionMysqlAuroraOutput) Password added in v5.3.0

The password to authenticate with.

func (SecretBackendConnectionMysqlAuroraOutput) ServiceAccountJson added in v5.19.0

JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.

func (SecretBackendConnectionMysqlAuroraOutput) TlsCa added in v5.19.0

x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.

func (SecretBackendConnectionMysqlAuroraOutput) TlsCertificateKey added in v5.19.0

x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.

func (SecretBackendConnectionMysqlAuroraOutput) ToSecretBackendConnectionMysqlAuroraOutput

func (o SecretBackendConnectionMysqlAuroraOutput) ToSecretBackendConnectionMysqlAuroraOutput() SecretBackendConnectionMysqlAuroraOutput

func (SecretBackendConnectionMysqlAuroraOutput) ToSecretBackendConnectionMysqlAuroraOutputWithContext

func (o SecretBackendConnectionMysqlAuroraOutput) ToSecretBackendConnectionMysqlAuroraOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlAuroraOutput

func (SecretBackendConnectionMysqlAuroraOutput) ToSecretBackendConnectionMysqlAuroraPtrOutput

func (o SecretBackendConnectionMysqlAuroraOutput) ToSecretBackendConnectionMysqlAuroraPtrOutput() SecretBackendConnectionMysqlAuroraPtrOutput

func (SecretBackendConnectionMysqlAuroraOutput) ToSecretBackendConnectionMysqlAuroraPtrOutputWithContext

func (o SecretBackendConnectionMysqlAuroraOutput) ToSecretBackendConnectionMysqlAuroraPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlAuroraPtrOutput

func (SecretBackendConnectionMysqlAuroraOutput) Username added in v5.3.0

The username to authenticate with.

func (SecretBackendConnectionMysqlAuroraOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionMysqlAuroraPtrInput

type SecretBackendConnectionMysqlAuroraPtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionMysqlAuroraPtrOutput() SecretBackendConnectionMysqlAuroraPtrOutput
	ToSecretBackendConnectionMysqlAuroraPtrOutputWithContext(context.Context) SecretBackendConnectionMysqlAuroraPtrOutput
}

SecretBackendConnectionMysqlAuroraPtrInput is an input type that accepts SecretBackendConnectionMysqlAuroraArgs, SecretBackendConnectionMysqlAuroraPtr and SecretBackendConnectionMysqlAuroraPtrOutput values. You can construct a concrete instance of `SecretBackendConnectionMysqlAuroraPtrInput` via:

        SecretBackendConnectionMysqlAuroraArgs{...}

or:

        nil

type SecretBackendConnectionMysqlAuroraPtrOutput

type SecretBackendConnectionMysqlAuroraPtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMysqlAuroraPtrOutput) AuthType added in v5.19.0

Enable IAM authentication to a Google Cloud instance when set to `gcpIam`

func (SecretBackendConnectionMysqlAuroraPtrOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionMysqlAuroraPtrOutput) Elem

func (SecretBackendConnectionMysqlAuroraPtrOutput) ElementType

func (SecretBackendConnectionMysqlAuroraPtrOutput) MaxConnectionLifetime

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionMysqlAuroraPtrOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionMysqlAuroraPtrOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionMysqlAuroraPtrOutput) Password added in v5.3.0

The password to authenticate with.

func (SecretBackendConnectionMysqlAuroraPtrOutput) ServiceAccountJson added in v5.19.0

JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.

func (SecretBackendConnectionMysqlAuroraPtrOutput) TlsCa added in v5.19.0

x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.

func (SecretBackendConnectionMysqlAuroraPtrOutput) TlsCertificateKey added in v5.19.0

x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.

func (SecretBackendConnectionMysqlAuroraPtrOutput) ToSecretBackendConnectionMysqlAuroraPtrOutput

func (o SecretBackendConnectionMysqlAuroraPtrOutput) ToSecretBackendConnectionMysqlAuroraPtrOutput() SecretBackendConnectionMysqlAuroraPtrOutput

func (SecretBackendConnectionMysqlAuroraPtrOutput) ToSecretBackendConnectionMysqlAuroraPtrOutputWithContext

func (o SecretBackendConnectionMysqlAuroraPtrOutput) ToSecretBackendConnectionMysqlAuroraPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlAuroraPtrOutput

func (SecretBackendConnectionMysqlAuroraPtrOutput) Username added in v5.3.0

The username to authenticate with.

func (SecretBackendConnectionMysqlAuroraPtrOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionMysqlInput

type SecretBackendConnectionMysqlInput interface {
	pulumi.Input

	ToSecretBackendConnectionMysqlOutput() SecretBackendConnectionMysqlOutput
	ToSecretBackendConnectionMysqlOutputWithContext(context.Context) SecretBackendConnectionMysqlOutput
}

SecretBackendConnectionMysqlInput is an input type that accepts SecretBackendConnectionMysqlArgs and SecretBackendConnectionMysqlOutput values. You can construct a concrete instance of `SecretBackendConnectionMysqlInput` via:

SecretBackendConnectionMysqlArgs{...}

type SecretBackendConnectionMysqlLegacy

type SecretBackendConnectionMysqlLegacy struct {
	// Enable IAM authentication to a Google Cloud instance when set to `gcpIam`
	AuthType *string `pulumi:"authType"`
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password *string `pulumi:"password"`
	// JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.
	ServiceAccountJson *string `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa *string `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey *string `pulumi:"tlsCertificateKey"`
	// The username to authenticate with.
	Username *string `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
}

type SecretBackendConnectionMysqlLegacyArgs

type SecretBackendConnectionMysqlLegacyArgs struct {
	// Enable IAM authentication to a Google Cloud instance when set to `gcpIam`
	AuthType pulumi.StringPtrInput `pulumi:"authType"`
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.
	ServiceAccountJson pulumi.StringPtrInput `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa pulumi.StringPtrInput `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey pulumi.StringPtrInput `pulumi:"tlsCertificateKey"`
	// The username to authenticate with.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
}

func (SecretBackendConnectionMysqlLegacyArgs) ElementType

func (SecretBackendConnectionMysqlLegacyArgs) ToSecretBackendConnectionMysqlLegacyOutput

func (i SecretBackendConnectionMysqlLegacyArgs) ToSecretBackendConnectionMysqlLegacyOutput() SecretBackendConnectionMysqlLegacyOutput

func (SecretBackendConnectionMysqlLegacyArgs) ToSecretBackendConnectionMysqlLegacyOutputWithContext

func (i SecretBackendConnectionMysqlLegacyArgs) ToSecretBackendConnectionMysqlLegacyOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlLegacyOutput

func (SecretBackendConnectionMysqlLegacyArgs) ToSecretBackendConnectionMysqlLegacyPtrOutput

func (i SecretBackendConnectionMysqlLegacyArgs) ToSecretBackendConnectionMysqlLegacyPtrOutput() SecretBackendConnectionMysqlLegacyPtrOutput

func (SecretBackendConnectionMysqlLegacyArgs) ToSecretBackendConnectionMysqlLegacyPtrOutputWithContext

func (i SecretBackendConnectionMysqlLegacyArgs) ToSecretBackendConnectionMysqlLegacyPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlLegacyPtrOutput

type SecretBackendConnectionMysqlLegacyInput

type SecretBackendConnectionMysqlLegacyInput interface {
	pulumi.Input

	ToSecretBackendConnectionMysqlLegacyOutput() SecretBackendConnectionMysqlLegacyOutput
	ToSecretBackendConnectionMysqlLegacyOutputWithContext(context.Context) SecretBackendConnectionMysqlLegacyOutput
}

SecretBackendConnectionMysqlLegacyInput is an input type that accepts SecretBackendConnectionMysqlLegacyArgs and SecretBackendConnectionMysqlLegacyOutput values. You can construct a concrete instance of `SecretBackendConnectionMysqlLegacyInput` via:

SecretBackendConnectionMysqlLegacyArgs{...}

type SecretBackendConnectionMysqlLegacyOutput

type SecretBackendConnectionMysqlLegacyOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMysqlLegacyOutput) AuthType added in v5.19.0

Enable IAM authentication to a Google Cloud instance when set to `gcpIam`

func (SecretBackendConnectionMysqlLegacyOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionMysqlLegacyOutput) ElementType

func (SecretBackendConnectionMysqlLegacyOutput) MaxConnectionLifetime

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionMysqlLegacyOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionMysqlLegacyOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionMysqlLegacyOutput) Password added in v5.3.0

The password to authenticate with.

func (SecretBackendConnectionMysqlLegacyOutput) ServiceAccountJson added in v5.19.0

JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.

func (SecretBackendConnectionMysqlLegacyOutput) TlsCa added in v5.19.0

x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.

func (SecretBackendConnectionMysqlLegacyOutput) TlsCertificateKey added in v5.19.0

x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.

func (SecretBackendConnectionMysqlLegacyOutput) ToSecretBackendConnectionMysqlLegacyOutput

func (o SecretBackendConnectionMysqlLegacyOutput) ToSecretBackendConnectionMysqlLegacyOutput() SecretBackendConnectionMysqlLegacyOutput

func (SecretBackendConnectionMysqlLegacyOutput) ToSecretBackendConnectionMysqlLegacyOutputWithContext

func (o SecretBackendConnectionMysqlLegacyOutput) ToSecretBackendConnectionMysqlLegacyOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlLegacyOutput

func (SecretBackendConnectionMysqlLegacyOutput) ToSecretBackendConnectionMysqlLegacyPtrOutput

func (o SecretBackendConnectionMysqlLegacyOutput) ToSecretBackendConnectionMysqlLegacyPtrOutput() SecretBackendConnectionMysqlLegacyPtrOutput

func (SecretBackendConnectionMysqlLegacyOutput) ToSecretBackendConnectionMysqlLegacyPtrOutputWithContext

func (o SecretBackendConnectionMysqlLegacyOutput) ToSecretBackendConnectionMysqlLegacyPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlLegacyPtrOutput

func (SecretBackendConnectionMysqlLegacyOutput) Username added in v5.3.0

The username to authenticate with.

func (SecretBackendConnectionMysqlLegacyOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionMysqlLegacyPtrInput

type SecretBackendConnectionMysqlLegacyPtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionMysqlLegacyPtrOutput() SecretBackendConnectionMysqlLegacyPtrOutput
	ToSecretBackendConnectionMysqlLegacyPtrOutputWithContext(context.Context) SecretBackendConnectionMysqlLegacyPtrOutput
}

SecretBackendConnectionMysqlLegacyPtrInput is an input type that accepts SecretBackendConnectionMysqlLegacyArgs, SecretBackendConnectionMysqlLegacyPtr and SecretBackendConnectionMysqlLegacyPtrOutput values. You can construct a concrete instance of `SecretBackendConnectionMysqlLegacyPtrInput` via:

        SecretBackendConnectionMysqlLegacyArgs{...}

or:

        nil

type SecretBackendConnectionMysqlLegacyPtrOutput

type SecretBackendConnectionMysqlLegacyPtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMysqlLegacyPtrOutput) AuthType added in v5.19.0

Enable IAM authentication to a Google Cloud instance when set to `gcpIam`

func (SecretBackendConnectionMysqlLegacyPtrOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionMysqlLegacyPtrOutput) Elem

func (SecretBackendConnectionMysqlLegacyPtrOutput) ElementType

func (SecretBackendConnectionMysqlLegacyPtrOutput) MaxConnectionLifetime

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionMysqlLegacyPtrOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionMysqlLegacyPtrOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionMysqlLegacyPtrOutput) Password added in v5.3.0

The password to authenticate with.

func (SecretBackendConnectionMysqlLegacyPtrOutput) ServiceAccountJson added in v5.19.0

JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.

func (SecretBackendConnectionMysqlLegacyPtrOutput) TlsCa added in v5.19.0

x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.

func (SecretBackendConnectionMysqlLegacyPtrOutput) TlsCertificateKey added in v5.19.0

x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.

func (SecretBackendConnectionMysqlLegacyPtrOutput) ToSecretBackendConnectionMysqlLegacyPtrOutput

func (o SecretBackendConnectionMysqlLegacyPtrOutput) ToSecretBackendConnectionMysqlLegacyPtrOutput() SecretBackendConnectionMysqlLegacyPtrOutput

func (SecretBackendConnectionMysqlLegacyPtrOutput) ToSecretBackendConnectionMysqlLegacyPtrOutputWithContext

func (o SecretBackendConnectionMysqlLegacyPtrOutput) ToSecretBackendConnectionMysqlLegacyPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlLegacyPtrOutput

func (SecretBackendConnectionMysqlLegacyPtrOutput) Username added in v5.3.0

The username to authenticate with.

func (SecretBackendConnectionMysqlLegacyPtrOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionMysqlOutput

type SecretBackendConnectionMysqlOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMysqlOutput) AuthType added in v5.16.0

Enable IAM authentication to a Google Cloud instance when set to `gcpIam`

func (SecretBackendConnectionMysqlOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionMysqlOutput) ElementType

func (SecretBackendConnectionMysqlOutput) MaxConnectionLifetime

func (o SecretBackendConnectionMysqlOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionMysqlOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionMysqlOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionMysqlOutput) Password added in v5.3.0

The password to authenticate with.

func (SecretBackendConnectionMysqlOutput) ServiceAccountJson added in v5.16.0

JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.

func (SecretBackendConnectionMysqlOutput) TlsCa

x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.

func (SecretBackendConnectionMysqlOutput) TlsCertificateKey

x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.

func (SecretBackendConnectionMysqlOutput) ToSecretBackendConnectionMysqlOutput

func (o SecretBackendConnectionMysqlOutput) ToSecretBackendConnectionMysqlOutput() SecretBackendConnectionMysqlOutput

func (SecretBackendConnectionMysqlOutput) ToSecretBackendConnectionMysqlOutputWithContext

func (o SecretBackendConnectionMysqlOutput) ToSecretBackendConnectionMysqlOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlOutput

func (SecretBackendConnectionMysqlOutput) ToSecretBackendConnectionMysqlPtrOutput

func (o SecretBackendConnectionMysqlOutput) ToSecretBackendConnectionMysqlPtrOutput() SecretBackendConnectionMysqlPtrOutput

func (SecretBackendConnectionMysqlOutput) ToSecretBackendConnectionMysqlPtrOutputWithContext

func (o SecretBackendConnectionMysqlOutput) ToSecretBackendConnectionMysqlPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlPtrOutput

func (SecretBackendConnectionMysqlOutput) Username added in v5.3.0

The username to authenticate with.

func (SecretBackendConnectionMysqlOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionMysqlPtrInput

type SecretBackendConnectionMysqlPtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionMysqlPtrOutput() SecretBackendConnectionMysqlPtrOutput
	ToSecretBackendConnectionMysqlPtrOutputWithContext(context.Context) SecretBackendConnectionMysqlPtrOutput
}

SecretBackendConnectionMysqlPtrInput is an input type that accepts SecretBackendConnectionMysqlArgs, SecretBackendConnectionMysqlPtr and SecretBackendConnectionMysqlPtrOutput values. You can construct a concrete instance of `SecretBackendConnectionMysqlPtrInput` via:

        SecretBackendConnectionMysqlArgs{...}

or:

        nil

type SecretBackendConnectionMysqlPtrOutput

type SecretBackendConnectionMysqlPtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMysqlPtrOutput) AuthType added in v5.16.0

Enable IAM authentication to a Google Cloud instance when set to `gcpIam`

func (SecretBackendConnectionMysqlPtrOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionMysqlPtrOutput) Elem

func (SecretBackendConnectionMysqlPtrOutput) ElementType

func (SecretBackendConnectionMysqlPtrOutput) MaxConnectionLifetime

func (o SecretBackendConnectionMysqlPtrOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionMysqlPtrOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionMysqlPtrOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionMysqlPtrOutput) Password added in v5.3.0

The password to authenticate with.

func (SecretBackendConnectionMysqlPtrOutput) ServiceAccountJson added in v5.16.0

JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.

func (SecretBackendConnectionMysqlPtrOutput) TlsCa

x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.

func (SecretBackendConnectionMysqlPtrOutput) TlsCertificateKey

x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.

func (SecretBackendConnectionMysqlPtrOutput) ToSecretBackendConnectionMysqlPtrOutput

func (o SecretBackendConnectionMysqlPtrOutput) ToSecretBackendConnectionMysqlPtrOutput() SecretBackendConnectionMysqlPtrOutput

func (SecretBackendConnectionMysqlPtrOutput) ToSecretBackendConnectionMysqlPtrOutputWithContext

func (o SecretBackendConnectionMysqlPtrOutput) ToSecretBackendConnectionMysqlPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlPtrOutput

func (SecretBackendConnectionMysqlPtrOutput) Username added in v5.3.0

The username to authenticate with.

func (SecretBackendConnectionMysqlPtrOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionMysqlRds

type SecretBackendConnectionMysqlRds struct {
	// Enable IAM authentication to a Google Cloud instance when set to `gcpIam`
	AuthType *string `pulumi:"authType"`
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password *string `pulumi:"password"`
	// JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.
	ServiceAccountJson *string `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa *string `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey *string `pulumi:"tlsCertificateKey"`
	// The username to authenticate with.
	Username *string `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
}

type SecretBackendConnectionMysqlRdsArgs

type SecretBackendConnectionMysqlRdsArgs struct {
	// Enable IAM authentication to a Google Cloud instance when set to `gcpIam`
	AuthType pulumi.StringPtrInput `pulumi:"authType"`
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.
	ServiceAccountJson pulumi.StringPtrInput `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa pulumi.StringPtrInput `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey pulumi.StringPtrInput `pulumi:"tlsCertificateKey"`
	// The username to authenticate with.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
}

func (SecretBackendConnectionMysqlRdsArgs) ElementType

func (SecretBackendConnectionMysqlRdsArgs) ToSecretBackendConnectionMysqlRdsOutput

func (i SecretBackendConnectionMysqlRdsArgs) ToSecretBackendConnectionMysqlRdsOutput() SecretBackendConnectionMysqlRdsOutput

func (SecretBackendConnectionMysqlRdsArgs) ToSecretBackendConnectionMysqlRdsOutputWithContext

func (i SecretBackendConnectionMysqlRdsArgs) ToSecretBackendConnectionMysqlRdsOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlRdsOutput

func (SecretBackendConnectionMysqlRdsArgs) ToSecretBackendConnectionMysqlRdsPtrOutput

func (i SecretBackendConnectionMysqlRdsArgs) ToSecretBackendConnectionMysqlRdsPtrOutput() SecretBackendConnectionMysqlRdsPtrOutput

func (SecretBackendConnectionMysqlRdsArgs) ToSecretBackendConnectionMysqlRdsPtrOutputWithContext

func (i SecretBackendConnectionMysqlRdsArgs) ToSecretBackendConnectionMysqlRdsPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlRdsPtrOutput

type SecretBackendConnectionMysqlRdsInput

type SecretBackendConnectionMysqlRdsInput interface {
	pulumi.Input

	ToSecretBackendConnectionMysqlRdsOutput() SecretBackendConnectionMysqlRdsOutput
	ToSecretBackendConnectionMysqlRdsOutputWithContext(context.Context) SecretBackendConnectionMysqlRdsOutput
}

SecretBackendConnectionMysqlRdsInput is an input type that accepts SecretBackendConnectionMysqlRdsArgs and SecretBackendConnectionMysqlRdsOutput values. You can construct a concrete instance of `SecretBackendConnectionMysqlRdsInput` via:

SecretBackendConnectionMysqlRdsArgs{...}

type SecretBackendConnectionMysqlRdsOutput

type SecretBackendConnectionMysqlRdsOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMysqlRdsOutput) AuthType added in v5.19.0

Enable IAM authentication to a Google Cloud instance when set to `gcpIam`

func (SecretBackendConnectionMysqlRdsOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionMysqlRdsOutput) ElementType

func (SecretBackendConnectionMysqlRdsOutput) MaxConnectionLifetime

func (o SecretBackendConnectionMysqlRdsOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionMysqlRdsOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionMysqlRdsOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionMysqlRdsOutput) Password added in v5.3.0

The password to authenticate with.

func (SecretBackendConnectionMysqlRdsOutput) ServiceAccountJson added in v5.19.0

JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.

func (SecretBackendConnectionMysqlRdsOutput) TlsCa added in v5.19.0

x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.

func (SecretBackendConnectionMysqlRdsOutput) TlsCertificateKey added in v5.19.0

x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.

func (SecretBackendConnectionMysqlRdsOutput) ToSecretBackendConnectionMysqlRdsOutput

func (o SecretBackendConnectionMysqlRdsOutput) ToSecretBackendConnectionMysqlRdsOutput() SecretBackendConnectionMysqlRdsOutput

func (SecretBackendConnectionMysqlRdsOutput) ToSecretBackendConnectionMysqlRdsOutputWithContext

func (o SecretBackendConnectionMysqlRdsOutput) ToSecretBackendConnectionMysqlRdsOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlRdsOutput

func (SecretBackendConnectionMysqlRdsOutput) ToSecretBackendConnectionMysqlRdsPtrOutput

func (o SecretBackendConnectionMysqlRdsOutput) ToSecretBackendConnectionMysqlRdsPtrOutput() SecretBackendConnectionMysqlRdsPtrOutput

func (SecretBackendConnectionMysqlRdsOutput) ToSecretBackendConnectionMysqlRdsPtrOutputWithContext

func (o SecretBackendConnectionMysqlRdsOutput) ToSecretBackendConnectionMysqlRdsPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlRdsPtrOutput

func (SecretBackendConnectionMysqlRdsOutput) Username added in v5.3.0

The username to authenticate with.

func (SecretBackendConnectionMysqlRdsOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionMysqlRdsPtrInput

type SecretBackendConnectionMysqlRdsPtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionMysqlRdsPtrOutput() SecretBackendConnectionMysqlRdsPtrOutput
	ToSecretBackendConnectionMysqlRdsPtrOutputWithContext(context.Context) SecretBackendConnectionMysqlRdsPtrOutput
}

SecretBackendConnectionMysqlRdsPtrInput is an input type that accepts SecretBackendConnectionMysqlRdsArgs, SecretBackendConnectionMysqlRdsPtr and SecretBackendConnectionMysqlRdsPtrOutput values. You can construct a concrete instance of `SecretBackendConnectionMysqlRdsPtrInput` via:

        SecretBackendConnectionMysqlRdsArgs{...}

or:

        nil

type SecretBackendConnectionMysqlRdsPtrOutput

type SecretBackendConnectionMysqlRdsPtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMysqlRdsPtrOutput) AuthType added in v5.19.0

Enable IAM authentication to a Google Cloud instance when set to `gcpIam`

func (SecretBackendConnectionMysqlRdsPtrOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionMysqlRdsPtrOutput) Elem

func (SecretBackendConnectionMysqlRdsPtrOutput) ElementType

func (SecretBackendConnectionMysqlRdsPtrOutput) MaxConnectionLifetime

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionMysqlRdsPtrOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionMysqlRdsPtrOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionMysqlRdsPtrOutput) Password added in v5.3.0

The password to authenticate with.

func (SecretBackendConnectionMysqlRdsPtrOutput) ServiceAccountJson added in v5.19.0

JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.

func (SecretBackendConnectionMysqlRdsPtrOutput) TlsCa added in v5.19.0

x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.

func (SecretBackendConnectionMysqlRdsPtrOutput) TlsCertificateKey added in v5.19.0

x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.

func (SecretBackendConnectionMysqlRdsPtrOutput) ToSecretBackendConnectionMysqlRdsPtrOutput

func (o SecretBackendConnectionMysqlRdsPtrOutput) ToSecretBackendConnectionMysqlRdsPtrOutput() SecretBackendConnectionMysqlRdsPtrOutput

func (SecretBackendConnectionMysqlRdsPtrOutput) ToSecretBackendConnectionMysqlRdsPtrOutputWithContext

func (o SecretBackendConnectionMysqlRdsPtrOutput) ToSecretBackendConnectionMysqlRdsPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlRdsPtrOutput

func (SecretBackendConnectionMysqlRdsPtrOutput) Username added in v5.3.0

The username to authenticate with.

func (SecretBackendConnectionMysqlRdsPtrOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionOracle

type SecretBackendConnectionOracle struct {
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// Enable the built-in session disconnect mechanism.
	DisconnectSessions *bool `pulumi:"disconnectSessions"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password *string `pulumi:"password"`
	// Enable spliting statements after semi-colons.
	SplitStatements *bool `pulumi:"splitStatements"`
	// The username to authenticate with.
	Username *string `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
}

type SecretBackendConnectionOracleArgs

type SecretBackendConnectionOracleArgs struct {
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// Enable the built-in session disconnect mechanism.
	DisconnectSessions pulumi.BoolPtrInput `pulumi:"disconnectSessions"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Enable spliting statements after semi-colons.
	SplitStatements pulumi.BoolPtrInput `pulumi:"splitStatements"`
	// The username to authenticate with.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
}

func (SecretBackendConnectionOracleArgs) ElementType

func (SecretBackendConnectionOracleArgs) ToSecretBackendConnectionOracleOutput

func (i SecretBackendConnectionOracleArgs) ToSecretBackendConnectionOracleOutput() SecretBackendConnectionOracleOutput

func (SecretBackendConnectionOracleArgs) ToSecretBackendConnectionOracleOutputWithContext

func (i SecretBackendConnectionOracleArgs) ToSecretBackendConnectionOracleOutputWithContext(ctx context.Context) SecretBackendConnectionOracleOutput

func (SecretBackendConnectionOracleArgs) ToSecretBackendConnectionOraclePtrOutput

func (i SecretBackendConnectionOracleArgs) ToSecretBackendConnectionOraclePtrOutput() SecretBackendConnectionOraclePtrOutput

func (SecretBackendConnectionOracleArgs) ToSecretBackendConnectionOraclePtrOutputWithContext

func (i SecretBackendConnectionOracleArgs) ToSecretBackendConnectionOraclePtrOutputWithContext(ctx context.Context) SecretBackendConnectionOraclePtrOutput

type SecretBackendConnectionOracleInput

type SecretBackendConnectionOracleInput interface {
	pulumi.Input

	ToSecretBackendConnectionOracleOutput() SecretBackendConnectionOracleOutput
	ToSecretBackendConnectionOracleOutputWithContext(context.Context) SecretBackendConnectionOracleOutput
}

SecretBackendConnectionOracleInput is an input type that accepts SecretBackendConnectionOracleArgs and SecretBackendConnectionOracleOutput values. You can construct a concrete instance of `SecretBackendConnectionOracleInput` via:

SecretBackendConnectionOracleArgs{...}

type SecretBackendConnectionOracleOutput

type SecretBackendConnectionOracleOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionOracleOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionOracleOutput) DisconnectSessions added in v5.20.0

Enable the built-in session disconnect mechanism.

func (SecretBackendConnectionOracleOutput) ElementType

func (SecretBackendConnectionOracleOutput) MaxConnectionLifetime

func (o SecretBackendConnectionOracleOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionOracleOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionOracleOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionOracleOutput) Password added in v5.3.0

The password to authenticate with.

func (SecretBackendConnectionOracleOutput) SplitStatements added in v5.20.0

Enable spliting statements after semi-colons.

func (SecretBackendConnectionOracleOutput) ToSecretBackendConnectionOracleOutput

func (o SecretBackendConnectionOracleOutput) ToSecretBackendConnectionOracleOutput() SecretBackendConnectionOracleOutput

func (SecretBackendConnectionOracleOutput) ToSecretBackendConnectionOracleOutputWithContext

func (o SecretBackendConnectionOracleOutput) ToSecretBackendConnectionOracleOutputWithContext(ctx context.Context) SecretBackendConnectionOracleOutput

func (SecretBackendConnectionOracleOutput) ToSecretBackendConnectionOraclePtrOutput

func (o SecretBackendConnectionOracleOutput) ToSecretBackendConnectionOraclePtrOutput() SecretBackendConnectionOraclePtrOutput

func (SecretBackendConnectionOracleOutput) ToSecretBackendConnectionOraclePtrOutputWithContext

func (o SecretBackendConnectionOracleOutput) ToSecretBackendConnectionOraclePtrOutputWithContext(ctx context.Context) SecretBackendConnectionOraclePtrOutput

func (SecretBackendConnectionOracleOutput) Username added in v5.3.0

The username to authenticate with.

func (SecretBackendConnectionOracleOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionOraclePtrInput

type SecretBackendConnectionOraclePtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionOraclePtrOutput() SecretBackendConnectionOraclePtrOutput
	ToSecretBackendConnectionOraclePtrOutputWithContext(context.Context) SecretBackendConnectionOraclePtrOutput
}

SecretBackendConnectionOraclePtrInput is an input type that accepts SecretBackendConnectionOracleArgs, SecretBackendConnectionOraclePtr and SecretBackendConnectionOraclePtrOutput values. You can construct a concrete instance of `SecretBackendConnectionOraclePtrInput` via:

        SecretBackendConnectionOracleArgs{...}

or:

        nil

type SecretBackendConnectionOraclePtrOutput

type SecretBackendConnectionOraclePtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionOraclePtrOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionOraclePtrOutput) DisconnectSessions added in v5.20.0

Enable the built-in session disconnect mechanism.

func (SecretBackendConnectionOraclePtrOutput) Elem

func (SecretBackendConnectionOraclePtrOutput) ElementType

func (SecretBackendConnectionOraclePtrOutput) MaxConnectionLifetime

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionOraclePtrOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionOraclePtrOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionOraclePtrOutput) Password added in v5.3.0

The password to authenticate with.

func (SecretBackendConnectionOraclePtrOutput) SplitStatements added in v5.20.0

Enable spliting statements after semi-colons.

func (SecretBackendConnectionOraclePtrOutput) ToSecretBackendConnectionOraclePtrOutput

func (o SecretBackendConnectionOraclePtrOutput) ToSecretBackendConnectionOraclePtrOutput() SecretBackendConnectionOraclePtrOutput

func (SecretBackendConnectionOraclePtrOutput) ToSecretBackendConnectionOraclePtrOutputWithContext

func (o SecretBackendConnectionOraclePtrOutput) ToSecretBackendConnectionOraclePtrOutputWithContext(ctx context.Context) SecretBackendConnectionOraclePtrOutput

func (SecretBackendConnectionOraclePtrOutput) Username added in v5.3.0

The username to authenticate with.

func (SecretBackendConnectionOraclePtrOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionOutput

type SecretBackendConnectionOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionOutput) AllowedRoles added in v5.6.0

A list of roles that are allowed to use this connection.

func (SecretBackendConnectionOutput) Backend added in v5.6.0

The unique name of the Vault mount to configure.

func (SecretBackendConnectionOutput) Cassandra added in v5.6.0

A nested block containing configuration options for Cassandra connections.

func (SecretBackendConnectionOutput) Couchbase added in v5.6.0

A nested block containing configuration options for Couchbase connections.

func (SecretBackendConnectionOutput) Data added in v5.6.0

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

func (SecretBackendConnectionOutput) Elasticsearch added in v5.6.0

A nested block containing configuration options for Elasticsearch connections.

func (SecretBackendConnectionOutput) ElementType

func (SecretBackendConnectionOutput) Hana added in v5.6.0

A nested block containing configuration options for SAP HanaDB connections.

func (SecretBackendConnectionOutput) Influxdb added in v5.6.0

A nested block containing configuration options for InfluxDB connections.

func (SecretBackendConnectionOutput) Mongodb added in v5.6.0

A nested block containing configuration options for MongoDB connections.

func (SecretBackendConnectionOutput) Mongodbatlas added in v5.6.0

A nested block containing configuration options for MongoDB Atlas connections.

func (SecretBackendConnectionOutput) Mssql added in v5.6.0

A nested block containing configuration options for MSSQL connections.

func (SecretBackendConnectionOutput) Mysql added in v5.6.0

A nested block containing configuration options for MySQL connections.

func (SecretBackendConnectionOutput) MysqlAurora added in v5.6.0

A nested block containing configuration options for Aurora MySQL connections.

func (SecretBackendConnectionOutput) MysqlLegacy added in v5.6.0

A nested block containing configuration options for legacy MySQL connections.

func (SecretBackendConnectionOutput) MysqlRds added in v5.6.0

A nested block containing configuration options for RDS MySQL connections.

func (SecretBackendConnectionOutput) Name added in v5.6.0

A unique name to give the database connection.

func (SecretBackendConnectionOutput) Namespace added in v5.7.0

The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The `namespace` is always relative to the provider's configured namespace. *Available only for Vault Enterprise*.

func (SecretBackendConnectionOutput) Oracle added in v5.6.0

A nested block containing configuration options for Oracle connections.

func (SecretBackendConnectionOutput) PluginName added in v5.6.0

Specifies the name of the plugin to use.

func (SecretBackendConnectionOutput) Postgresql added in v5.6.0

A nested block containing configuration options for PostgreSQL connections.

func (SecretBackendConnectionOutput) Redis added in v5.8.0

A nested block containing configuration options for Redis connections.

func (SecretBackendConnectionOutput) RedisElasticache added in v5.7.0

A nested block containing configuration options for Redis ElastiCache connections.

Exactly one of the nested blocks of configuration options must be supplied.

func (SecretBackendConnectionOutput) Redshift added in v5.6.0

Connection parameters for the redshift-database-plugin plugin.

func (SecretBackendConnectionOutput) RootRotationStatements added in v5.6.0

func (o SecretBackendConnectionOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretBackendConnectionOutput) Snowflake added in v5.6.0

A nested block containing configuration options for Snowflake connections.

func (SecretBackendConnectionOutput) ToSecretBackendConnectionOutput

func (o SecretBackendConnectionOutput) ToSecretBackendConnectionOutput() SecretBackendConnectionOutput

func (SecretBackendConnectionOutput) ToSecretBackendConnectionOutputWithContext

func (o SecretBackendConnectionOutput) ToSecretBackendConnectionOutputWithContext(ctx context.Context) SecretBackendConnectionOutput

func (SecretBackendConnectionOutput) VerifyConnection added in v5.6.0

func (o SecretBackendConnectionOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretBackendConnectionPostgresql

type SecretBackendConnectionPostgresql struct {
	// Enable IAM authentication to a Google Cloud instance when set to `gcpIam`
	AuthType *string `pulumi:"authType"`
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// Disable special character escaping in username and password.
	DisableEscaping *bool `pulumi:"disableEscaping"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password *string `pulumi:"password"`
	// JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.
	ServiceAccountJson *string `pulumi:"serviceAccountJson"`
	// The username to authenticate with.
	Username *string `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
}

type SecretBackendConnectionPostgresqlArgs

type SecretBackendConnectionPostgresqlArgs struct {
	// Enable IAM authentication to a Google Cloud instance when set to `gcpIam`
	AuthType pulumi.StringPtrInput `pulumi:"authType"`
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// Disable special character escaping in username and password.
	DisableEscaping pulumi.BoolPtrInput `pulumi:"disableEscaping"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.
	ServiceAccountJson pulumi.StringPtrInput `pulumi:"serviceAccountJson"`
	// The username to authenticate with.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
}

func (SecretBackendConnectionPostgresqlArgs) ElementType

func (SecretBackendConnectionPostgresqlArgs) ToSecretBackendConnectionPostgresqlOutput

func (i SecretBackendConnectionPostgresqlArgs) ToSecretBackendConnectionPostgresqlOutput() SecretBackendConnectionPostgresqlOutput

func (SecretBackendConnectionPostgresqlArgs) ToSecretBackendConnectionPostgresqlOutputWithContext

func (i SecretBackendConnectionPostgresqlArgs) ToSecretBackendConnectionPostgresqlOutputWithContext(ctx context.Context) SecretBackendConnectionPostgresqlOutput

func (SecretBackendConnectionPostgresqlArgs) ToSecretBackendConnectionPostgresqlPtrOutput

func (i SecretBackendConnectionPostgresqlArgs) ToSecretBackendConnectionPostgresqlPtrOutput() SecretBackendConnectionPostgresqlPtrOutput

func (SecretBackendConnectionPostgresqlArgs) ToSecretBackendConnectionPostgresqlPtrOutputWithContext

func (i SecretBackendConnectionPostgresqlArgs) ToSecretBackendConnectionPostgresqlPtrOutputWithContext(ctx context.Context) SecretBackendConnectionPostgresqlPtrOutput

type SecretBackendConnectionPostgresqlInput

type SecretBackendConnectionPostgresqlInput interface {
	pulumi.Input

	ToSecretBackendConnectionPostgresqlOutput() SecretBackendConnectionPostgresqlOutput
	ToSecretBackendConnectionPostgresqlOutputWithContext(context.Context) SecretBackendConnectionPostgresqlOutput
}

SecretBackendConnectionPostgresqlInput is an input type that accepts SecretBackendConnectionPostgresqlArgs and SecretBackendConnectionPostgresqlOutput values. You can construct a concrete instance of `SecretBackendConnectionPostgresqlInput` via:

SecretBackendConnectionPostgresqlArgs{...}

type SecretBackendConnectionPostgresqlOutput

type SecretBackendConnectionPostgresqlOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionPostgresqlOutput) AuthType added in v5.16.0

Enable IAM authentication to a Google Cloud instance when set to `gcpIam`

func (SecretBackendConnectionPostgresqlOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionPostgresqlOutput) DisableEscaping added in v5.4.0

Disable special character escaping in username and password.

func (SecretBackendConnectionPostgresqlOutput) ElementType

func (SecretBackendConnectionPostgresqlOutput) MaxConnectionLifetime

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionPostgresqlOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionPostgresqlOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionPostgresqlOutput) Password added in v5.3.0

The password to authenticate with.

func (SecretBackendConnectionPostgresqlOutput) ServiceAccountJson added in v5.16.0

JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.

func (SecretBackendConnectionPostgresqlOutput) ToSecretBackendConnectionPostgresqlOutput

func (o SecretBackendConnectionPostgresqlOutput) ToSecretBackendConnectionPostgresqlOutput() SecretBackendConnectionPostgresqlOutput

func (SecretBackendConnectionPostgresqlOutput) ToSecretBackendConnectionPostgresqlOutputWithContext

func (o SecretBackendConnectionPostgresqlOutput) ToSecretBackendConnectionPostgresqlOutputWithContext(ctx context.Context) SecretBackendConnectionPostgresqlOutput

func (SecretBackendConnectionPostgresqlOutput) ToSecretBackendConnectionPostgresqlPtrOutput

func (o SecretBackendConnectionPostgresqlOutput) ToSecretBackendConnectionPostgresqlPtrOutput() SecretBackendConnectionPostgresqlPtrOutput

func (SecretBackendConnectionPostgresqlOutput) ToSecretBackendConnectionPostgresqlPtrOutputWithContext

func (o SecretBackendConnectionPostgresqlOutput) ToSecretBackendConnectionPostgresqlPtrOutputWithContext(ctx context.Context) SecretBackendConnectionPostgresqlPtrOutput

func (SecretBackendConnectionPostgresqlOutput) Username added in v5.3.0

The username to authenticate with.

func (SecretBackendConnectionPostgresqlOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionPostgresqlPtrInput

type SecretBackendConnectionPostgresqlPtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionPostgresqlPtrOutput() SecretBackendConnectionPostgresqlPtrOutput
	ToSecretBackendConnectionPostgresqlPtrOutputWithContext(context.Context) SecretBackendConnectionPostgresqlPtrOutput
}

SecretBackendConnectionPostgresqlPtrInput is an input type that accepts SecretBackendConnectionPostgresqlArgs, SecretBackendConnectionPostgresqlPtr and SecretBackendConnectionPostgresqlPtrOutput values. You can construct a concrete instance of `SecretBackendConnectionPostgresqlPtrInput` via:

        SecretBackendConnectionPostgresqlArgs{...}

or:

        nil

type SecretBackendConnectionPostgresqlPtrOutput

type SecretBackendConnectionPostgresqlPtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionPostgresqlPtrOutput) AuthType added in v5.16.0

Enable IAM authentication to a Google Cloud instance when set to `gcpIam`

func (SecretBackendConnectionPostgresqlPtrOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionPostgresqlPtrOutput) DisableEscaping added in v5.4.0

Disable special character escaping in username and password.

func (SecretBackendConnectionPostgresqlPtrOutput) Elem

func (SecretBackendConnectionPostgresqlPtrOutput) ElementType

func (SecretBackendConnectionPostgresqlPtrOutput) MaxConnectionLifetime

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionPostgresqlPtrOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionPostgresqlPtrOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionPostgresqlPtrOutput) Password added in v5.3.0

The password to authenticate with.

func (SecretBackendConnectionPostgresqlPtrOutput) ServiceAccountJson added in v5.16.0

JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.

func (SecretBackendConnectionPostgresqlPtrOutput) ToSecretBackendConnectionPostgresqlPtrOutput

func (o SecretBackendConnectionPostgresqlPtrOutput) ToSecretBackendConnectionPostgresqlPtrOutput() SecretBackendConnectionPostgresqlPtrOutput

func (SecretBackendConnectionPostgresqlPtrOutput) ToSecretBackendConnectionPostgresqlPtrOutputWithContext

func (o SecretBackendConnectionPostgresqlPtrOutput) ToSecretBackendConnectionPostgresqlPtrOutputWithContext(ctx context.Context) SecretBackendConnectionPostgresqlPtrOutput

func (SecretBackendConnectionPostgresqlPtrOutput) Username added in v5.3.0

The username to authenticate with.

func (SecretBackendConnectionPostgresqlPtrOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionRedis added in v5.8.0

type SecretBackendConnectionRedis struct {
	// The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
	CaCert *string `pulumi:"caCert"`
	// The host to connect to.
	Host string `pulumi:"host"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls *bool `pulumi:"insecureTls"`
	// The password to authenticate with.
	Password string `pulumi:"password"`
	// The default port to connect to if no port is specified as
	// part of the host.
	Port *int `pulumi:"port"`
	// Whether to use TLS when connecting to Cassandra.
	Tls *bool `pulumi:"tls"`
	// The username to authenticate with.
	Username string `pulumi:"username"`
}

type SecretBackendConnectionRedisArgs added in v5.8.0

type SecretBackendConnectionRedisArgs struct {
	// The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
	CaCert pulumi.StringPtrInput `pulumi:"caCert"`
	// The host to connect to.
	Host pulumi.StringInput `pulumi:"host"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls pulumi.BoolPtrInput `pulumi:"insecureTls"`
	// The password to authenticate with.
	Password pulumi.StringInput `pulumi:"password"`
	// The default port to connect to if no port is specified as
	// part of the host.
	Port pulumi.IntPtrInput `pulumi:"port"`
	// Whether to use TLS when connecting to Cassandra.
	Tls pulumi.BoolPtrInput `pulumi:"tls"`
	// The username to authenticate with.
	Username pulumi.StringInput `pulumi:"username"`
}

func (SecretBackendConnectionRedisArgs) ElementType added in v5.8.0

func (SecretBackendConnectionRedisArgs) ToSecretBackendConnectionRedisOutput added in v5.8.0

func (i SecretBackendConnectionRedisArgs) ToSecretBackendConnectionRedisOutput() SecretBackendConnectionRedisOutput

func (SecretBackendConnectionRedisArgs) ToSecretBackendConnectionRedisOutputWithContext added in v5.8.0

func (i SecretBackendConnectionRedisArgs) ToSecretBackendConnectionRedisOutputWithContext(ctx context.Context) SecretBackendConnectionRedisOutput

func (SecretBackendConnectionRedisArgs) ToSecretBackendConnectionRedisPtrOutput added in v5.8.0

func (i SecretBackendConnectionRedisArgs) ToSecretBackendConnectionRedisPtrOutput() SecretBackendConnectionRedisPtrOutput

func (SecretBackendConnectionRedisArgs) ToSecretBackendConnectionRedisPtrOutputWithContext added in v5.8.0

func (i SecretBackendConnectionRedisArgs) ToSecretBackendConnectionRedisPtrOutputWithContext(ctx context.Context) SecretBackendConnectionRedisPtrOutput

type SecretBackendConnectionRedisElasticache added in v5.7.0

type SecretBackendConnectionRedisElasticache struct {
	// The password to authenticate with.
	Password *string `pulumi:"password"`
	// The region where the ElastiCache cluster is hosted. If omitted Vault tries to infer from the environment instead.
	Region *string `pulumi:"region"`
	// The URL for Elasticsearch's API. https requires certificate
	// by trusted CA if used.
	Url string `pulumi:"url"`
	// The username to authenticate with.
	Username *string `pulumi:"username"`
}

type SecretBackendConnectionRedisElasticacheArgs added in v5.7.0

type SecretBackendConnectionRedisElasticacheArgs struct {
	// The password to authenticate with.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// The region where the ElastiCache cluster is hosted. If omitted Vault tries to infer from the environment instead.
	Region pulumi.StringPtrInput `pulumi:"region"`
	// The URL for Elasticsearch's API. https requires certificate
	// by trusted CA if used.
	Url pulumi.StringInput `pulumi:"url"`
	// The username to authenticate with.
	Username pulumi.StringPtrInput `pulumi:"username"`
}

func (SecretBackendConnectionRedisElasticacheArgs) ElementType added in v5.7.0

func (SecretBackendConnectionRedisElasticacheArgs) ToSecretBackendConnectionRedisElasticacheOutput added in v5.7.0

func (i SecretBackendConnectionRedisElasticacheArgs) ToSecretBackendConnectionRedisElasticacheOutput() SecretBackendConnectionRedisElasticacheOutput

func (SecretBackendConnectionRedisElasticacheArgs) ToSecretBackendConnectionRedisElasticacheOutputWithContext added in v5.7.0

func (i SecretBackendConnectionRedisElasticacheArgs) ToSecretBackendConnectionRedisElasticacheOutputWithContext(ctx context.Context) SecretBackendConnectionRedisElasticacheOutput

func (SecretBackendConnectionRedisElasticacheArgs) ToSecretBackendConnectionRedisElasticachePtrOutput added in v5.7.0

func (i SecretBackendConnectionRedisElasticacheArgs) ToSecretBackendConnectionRedisElasticachePtrOutput() SecretBackendConnectionRedisElasticachePtrOutput

func (SecretBackendConnectionRedisElasticacheArgs) ToSecretBackendConnectionRedisElasticachePtrOutputWithContext added in v5.7.0

func (i SecretBackendConnectionRedisElasticacheArgs) ToSecretBackendConnectionRedisElasticachePtrOutputWithContext(ctx context.Context) SecretBackendConnectionRedisElasticachePtrOutput

type SecretBackendConnectionRedisElasticacheInput added in v5.7.0

type SecretBackendConnectionRedisElasticacheInput interface {
	pulumi.Input

	ToSecretBackendConnectionRedisElasticacheOutput() SecretBackendConnectionRedisElasticacheOutput
	ToSecretBackendConnectionRedisElasticacheOutputWithContext(context.Context) SecretBackendConnectionRedisElasticacheOutput
}

SecretBackendConnectionRedisElasticacheInput is an input type that accepts SecretBackendConnectionRedisElasticacheArgs and SecretBackendConnectionRedisElasticacheOutput values. You can construct a concrete instance of `SecretBackendConnectionRedisElasticacheInput` via:

SecretBackendConnectionRedisElasticacheArgs{...}

type SecretBackendConnectionRedisElasticacheOutput added in v5.7.0

type SecretBackendConnectionRedisElasticacheOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionRedisElasticacheOutput) ElementType added in v5.7.0

func (SecretBackendConnectionRedisElasticacheOutput) Password added in v5.7.0

The password to authenticate with.

func (SecretBackendConnectionRedisElasticacheOutput) Region added in v5.7.0

The region where the ElastiCache cluster is hosted. If omitted Vault tries to infer from the environment instead.

func (SecretBackendConnectionRedisElasticacheOutput) ToSecretBackendConnectionRedisElasticacheOutput added in v5.7.0

func (o SecretBackendConnectionRedisElasticacheOutput) ToSecretBackendConnectionRedisElasticacheOutput() SecretBackendConnectionRedisElasticacheOutput

func (SecretBackendConnectionRedisElasticacheOutput) ToSecretBackendConnectionRedisElasticacheOutputWithContext added in v5.7.0

func (o SecretBackendConnectionRedisElasticacheOutput) ToSecretBackendConnectionRedisElasticacheOutputWithContext(ctx context.Context) SecretBackendConnectionRedisElasticacheOutput

func (SecretBackendConnectionRedisElasticacheOutput) ToSecretBackendConnectionRedisElasticachePtrOutput added in v5.7.0

func (o SecretBackendConnectionRedisElasticacheOutput) ToSecretBackendConnectionRedisElasticachePtrOutput() SecretBackendConnectionRedisElasticachePtrOutput

func (SecretBackendConnectionRedisElasticacheOutput) ToSecretBackendConnectionRedisElasticachePtrOutputWithContext added in v5.7.0

func (o SecretBackendConnectionRedisElasticacheOutput) ToSecretBackendConnectionRedisElasticachePtrOutputWithContext(ctx context.Context) SecretBackendConnectionRedisElasticachePtrOutput

func (SecretBackendConnectionRedisElasticacheOutput) Url added in v5.7.0

The URL for Elasticsearch's API. https requires certificate by trusted CA if used.

func (SecretBackendConnectionRedisElasticacheOutput) Username added in v5.7.0

The username to authenticate with.

type SecretBackendConnectionRedisElasticachePtrInput added in v5.7.0

type SecretBackendConnectionRedisElasticachePtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionRedisElasticachePtrOutput() SecretBackendConnectionRedisElasticachePtrOutput
	ToSecretBackendConnectionRedisElasticachePtrOutputWithContext(context.Context) SecretBackendConnectionRedisElasticachePtrOutput
}

SecretBackendConnectionRedisElasticachePtrInput is an input type that accepts SecretBackendConnectionRedisElasticacheArgs, SecretBackendConnectionRedisElasticachePtr and SecretBackendConnectionRedisElasticachePtrOutput values. You can construct a concrete instance of `SecretBackendConnectionRedisElasticachePtrInput` via:

        SecretBackendConnectionRedisElasticacheArgs{...}

or:

        nil

type SecretBackendConnectionRedisElasticachePtrOutput added in v5.7.0

type SecretBackendConnectionRedisElasticachePtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionRedisElasticachePtrOutput) Elem added in v5.7.0

func (SecretBackendConnectionRedisElasticachePtrOutput) ElementType added in v5.7.0

func (SecretBackendConnectionRedisElasticachePtrOutput) Password added in v5.7.0

The password to authenticate with.

func (SecretBackendConnectionRedisElasticachePtrOutput) Region added in v5.7.0

The region where the ElastiCache cluster is hosted. If omitted Vault tries to infer from the environment instead.

func (SecretBackendConnectionRedisElasticachePtrOutput) ToSecretBackendConnectionRedisElasticachePtrOutput added in v5.7.0

func (o SecretBackendConnectionRedisElasticachePtrOutput) ToSecretBackendConnectionRedisElasticachePtrOutput() SecretBackendConnectionRedisElasticachePtrOutput

func (SecretBackendConnectionRedisElasticachePtrOutput) ToSecretBackendConnectionRedisElasticachePtrOutputWithContext added in v5.7.0

func (o SecretBackendConnectionRedisElasticachePtrOutput) ToSecretBackendConnectionRedisElasticachePtrOutputWithContext(ctx context.Context) SecretBackendConnectionRedisElasticachePtrOutput

func (SecretBackendConnectionRedisElasticachePtrOutput) Url added in v5.7.0

The URL for Elasticsearch's API. https requires certificate by trusted CA if used.

func (SecretBackendConnectionRedisElasticachePtrOutput) Username added in v5.7.0

The username to authenticate with.

type SecretBackendConnectionRedisInput added in v5.8.0

type SecretBackendConnectionRedisInput interface {
	pulumi.Input

	ToSecretBackendConnectionRedisOutput() SecretBackendConnectionRedisOutput
	ToSecretBackendConnectionRedisOutputWithContext(context.Context) SecretBackendConnectionRedisOutput
}

SecretBackendConnectionRedisInput is an input type that accepts SecretBackendConnectionRedisArgs and SecretBackendConnectionRedisOutput values. You can construct a concrete instance of `SecretBackendConnectionRedisInput` via:

SecretBackendConnectionRedisArgs{...}

type SecretBackendConnectionRedisOutput added in v5.8.0

type SecretBackendConnectionRedisOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionRedisOutput) CaCert added in v5.8.0

The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.

func (SecretBackendConnectionRedisOutput) ElementType added in v5.8.0

func (SecretBackendConnectionRedisOutput) Host added in v5.8.0

The host to connect to.

func (SecretBackendConnectionRedisOutput) InsecureTls added in v5.8.0

Whether to skip verification of the server certificate when using TLS.

func (SecretBackendConnectionRedisOutput) Password added in v5.8.0

The password to authenticate with.

func (SecretBackendConnectionRedisOutput) Port added in v5.8.0

The default port to connect to if no port is specified as part of the host.

func (SecretBackendConnectionRedisOutput) Tls added in v5.8.0

Whether to use TLS when connecting to Cassandra.

func (SecretBackendConnectionRedisOutput) ToSecretBackendConnectionRedisOutput added in v5.8.0

func (o SecretBackendConnectionRedisOutput) ToSecretBackendConnectionRedisOutput() SecretBackendConnectionRedisOutput

func (SecretBackendConnectionRedisOutput) ToSecretBackendConnectionRedisOutputWithContext added in v5.8.0

func (o SecretBackendConnectionRedisOutput) ToSecretBackendConnectionRedisOutputWithContext(ctx context.Context) SecretBackendConnectionRedisOutput

func (SecretBackendConnectionRedisOutput) ToSecretBackendConnectionRedisPtrOutput added in v5.8.0

func (o SecretBackendConnectionRedisOutput) ToSecretBackendConnectionRedisPtrOutput() SecretBackendConnectionRedisPtrOutput

func (SecretBackendConnectionRedisOutput) ToSecretBackendConnectionRedisPtrOutputWithContext added in v5.8.0

func (o SecretBackendConnectionRedisOutput) ToSecretBackendConnectionRedisPtrOutputWithContext(ctx context.Context) SecretBackendConnectionRedisPtrOutput

func (SecretBackendConnectionRedisOutput) Username added in v5.8.0

The username to authenticate with.

type SecretBackendConnectionRedisPtrInput added in v5.8.0

type SecretBackendConnectionRedisPtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionRedisPtrOutput() SecretBackendConnectionRedisPtrOutput
	ToSecretBackendConnectionRedisPtrOutputWithContext(context.Context) SecretBackendConnectionRedisPtrOutput
}

SecretBackendConnectionRedisPtrInput is an input type that accepts SecretBackendConnectionRedisArgs, SecretBackendConnectionRedisPtr and SecretBackendConnectionRedisPtrOutput values. You can construct a concrete instance of `SecretBackendConnectionRedisPtrInput` via:

        SecretBackendConnectionRedisArgs{...}

or:

        nil

type SecretBackendConnectionRedisPtrOutput added in v5.8.0

type SecretBackendConnectionRedisPtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionRedisPtrOutput) CaCert added in v5.8.0

The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.

func (SecretBackendConnectionRedisPtrOutput) Elem added in v5.8.0

func (SecretBackendConnectionRedisPtrOutput) ElementType added in v5.8.0

func (SecretBackendConnectionRedisPtrOutput) Host added in v5.8.0

The host to connect to.

func (SecretBackendConnectionRedisPtrOutput) InsecureTls added in v5.8.0

Whether to skip verification of the server certificate when using TLS.

func (SecretBackendConnectionRedisPtrOutput) Password added in v5.8.0

The password to authenticate with.

func (SecretBackendConnectionRedisPtrOutput) Port added in v5.8.0

The default port to connect to if no port is specified as part of the host.

func (SecretBackendConnectionRedisPtrOutput) Tls added in v5.8.0

Whether to use TLS when connecting to Cassandra.

func (SecretBackendConnectionRedisPtrOutput) ToSecretBackendConnectionRedisPtrOutput added in v5.8.0

func (o SecretBackendConnectionRedisPtrOutput) ToSecretBackendConnectionRedisPtrOutput() SecretBackendConnectionRedisPtrOutput

func (SecretBackendConnectionRedisPtrOutput) ToSecretBackendConnectionRedisPtrOutputWithContext added in v5.8.0

func (o SecretBackendConnectionRedisPtrOutput) ToSecretBackendConnectionRedisPtrOutputWithContext(ctx context.Context) SecretBackendConnectionRedisPtrOutput

func (SecretBackendConnectionRedisPtrOutput) Username added in v5.8.0

The username to authenticate with.

type SecretBackendConnectionRedshift added in v5.2.0

type SecretBackendConnectionRedshift struct {
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// Disable special character escaping in username and password.
	DisableEscaping *bool `pulumi:"disableEscaping"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password *string `pulumi:"password"`
	// The username to authenticate with.
	Username *string `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
}

type SecretBackendConnectionRedshiftArgs added in v5.2.0

type SecretBackendConnectionRedshiftArgs struct {
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// Disable special character escaping in username and password.
	DisableEscaping pulumi.BoolPtrInput `pulumi:"disableEscaping"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// The username to authenticate with.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
}

func (SecretBackendConnectionRedshiftArgs) ElementType added in v5.2.0

func (SecretBackendConnectionRedshiftArgs) ToSecretBackendConnectionRedshiftOutput added in v5.2.0

func (i SecretBackendConnectionRedshiftArgs) ToSecretBackendConnectionRedshiftOutput() SecretBackendConnectionRedshiftOutput

func (SecretBackendConnectionRedshiftArgs) ToSecretBackendConnectionRedshiftOutputWithContext added in v5.2.0

func (i SecretBackendConnectionRedshiftArgs) ToSecretBackendConnectionRedshiftOutputWithContext(ctx context.Context) SecretBackendConnectionRedshiftOutput

func (SecretBackendConnectionRedshiftArgs) ToSecretBackendConnectionRedshiftPtrOutput added in v5.2.0

func (i SecretBackendConnectionRedshiftArgs) ToSecretBackendConnectionRedshiftPtrOutput() SecretBackendConnectionRedshiftPtrOutput

func (SecretBackendConnectionRedshiftArgs) ToSecretBackendConnectionRedshiftPtrOutputWithContext added in v5.2.0

func (i SecretBackendConnectionRedshiftArgs) ToSecretBackendConnectionRedshiftPtrOutputWithContext(ctx context.Context) SecretBackendConnectionRedshiftPtrOutput

type SecretBackendConnectionRedshiftInput added in v5.2.0

type SecretBackendConnectionRedshiftInput interface {
	pulumi.Input

	ToSecretBackendConnectionRedshiftOutput() SecretBackendConnectionRedshiftOutput
	ToSecretBackendConnectionRedshiftOutputWithContext(context.Context) SecretBackendConnectionRedshiftOutput
}

SecretBackendConnectionRedshiftInput is an input type that accepts SecretBackendConnectionRedshiftArgs and SecretBackendConnectionRedshiftOutput values. You can construct a concrete instance of `SecretBackendConnectionRedshiftInput` via:

SecretBackendConnectionRedshiftArgs{...}

type SecretBackendConnectionRedshiftOutput added in v5.2.0

type SecretBackendConnectionRedshiftOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionRedshiftOutput) ConnectionUrl added in v5.2.0

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionRedshiftOutput) DisableEscaping added in v5.4.0

Disable special character escaping in username and password.

func (SecretBackendConnectionRedshiftOutput) ElementType added in v5.2.0

func (SecretBackendConnectionRedshiftOutput) MaxConnectionLifetime added in v5.2.0

func (o SecretBackendConnectionRedshiftOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionRedshiftOutput) MaxIdleConnections added in v5.2.0

The maximum number of idle connections to maintain.

func (SecretBackendConnectionRedshiftOutput) MaxOpenConnections added in v5.2.0

The maximum number of open connections to use.

func (SecretBackendConnectionRedshiftOutput) Password added in v5.2.0

The password to authenticate with.

func (SecretBackendConnectionRedshiftOutput) ToSecretBackendConnectionRedshiftOutput added in v5.2.0

func (o SecretBackendConnectionRedshiftOutput) ToSecretBackendConnectionRedshiftOutput() SecretBackendConnectionRedshiftOutput

func (SecretBackendConnectionRedshiftOutput) ToSecretBackendConnectionRedshiftOutputWithContext added in v5.2.0

func (o SecretBackendConnectionRedshiftOutput) ToSecretBackendConnectionRedshiftOutputWithContext(ctx context.Context) SecretBackendConnectionRedshiftOutput

func (SecretBackendConnectionRedshiftOutput) ToSecretBackendConnectionRedshiftPtrOutput added in v5.2.0

func (o SecretBackendConnectionRedshiftOutput) ToSecretBackendConnectionRedshiftPtrOutput() SecretBackendConnectionRedshiftPtrOutput

func (SecretBackendConnectionRedshiftOutput) ToSecretBackendConnectionRedshiftPtrOutputWithContext added in v5.2.0

func (o SecretBackendConnectionRedshiftOutput) ToSecretBackendConnectionRedshiftPtrOutputWithContext(ctx context.Context) SecretBackendConnectionRedshiftPtrOutput

func (SecretBackendConnectionRedshiftOutput) Username added in v5.2.0

The username to authenticate with.

func (SecretBackendConnectionRedshiftOutput) UsernameTemplate added in v5.2.0

Template describing how dynamic usernames are generated.

type SecretBackendConnectionRedshiftPtrInput added in v5.2.0

type SecretBackendConnectionRedshiftPtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionRedshiftPtrOutput() SecretBackendConnectionRedshiftPtrOutput
	ToSecretBackendConnectionRedshiftPtrOutputWithContext(context.Context) SecretBackendConnectionRedshiftPtrOutput
}

SecretBackendConnectionRedshiftPtrInput is an input type that accepts SecretBackendConnectionRedshiftArgs, SecretBackendConnectionRedshiftPtr and SecretBackendConnectionRedshiftPtrOutput values. You can construct a concrete instance of `SecretBackendConnectionRedshiftPtrInput` via:

        SecretBackendConnectionRedshiftArgs{...}

or:

        nil

type SecretBackendConnectionRedshiftPtrOutput added in v5.2.0

type SecretBackendConnectionRedshiftPtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionRedshiftPtrOutput) ConnectionUrl added in v5.2.0

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionRedshiftPtrOutput) DisableEscaping added in v5.4.0

Disable special character escaping in username and password.

func (SecretBackendConnectionRedshiftPtrOutput) Elem added in v5.2.0

func (SecretBackendConnectionRedshiftPtrOutput) ElementType added in v5.2.0

func (SecretBackendConnectionRedshiftPtrOutput) MaxConnectionLifetime added in v5.2.0

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionRedshiftPtrOutput) MaxIdleConnections added in v5.2.0

The maximum number of idle connections to maintain.

func (SecretBackendConnectionRedshiftPtrOutput) MaxOpenConnections added in v5.2.0

The maximum number of open connections to use.

func (SecretBackendConnectionRedshiftPtrOutput) Password added in v5.2.0

The password to authenticate with.

func (SecretBackendConnectionRedshiftPtrOutput) ToSecretBackendConnectionRedshiftPtrOutput added in v5.2.0

func (o SecretBackendConnectionRedshiftPtrOutput) ToSecretBackendConnectionRedshiftPtrOutput() SecretBackendConnectionRedshiftPtrOutput

func (SecretBackendConnectionRedshiftPtrOutput) ToSecretBackendConnectionRedshiftPtrOutputWithContext added in v5.2.0

func (o SecretBackendConnectionRedshiftPtrOutput) ToSecretBackendConnectionRedshiftPtrOutputWithContext(ctx context.Context) SecretBackendConnectionRedshiftPtrOutput

func (SecretBackendConnectionRedshiftPtrOutput) Username added in v5.2.0

The username to authenticate with.

func (SecretBackendConnectionRedshiftPtrOutput) UsernameTemplate added in v5.2.0

Template describing how dynamic usernames are generated.

type SecretBackendConnectionSnowflake

type SecretBackendConnectionSnowflake struct {
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password *string `pulumi:"password"`
	// The username to authenticate with.
	Username *string `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
}

type SecretBackendConnectionSnowflakeArgs

type SecretBackendConnectionSnowflakeArgs struct {
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// The username to authenticate with.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
}

func (SecretBackendConnectionSnowflakeArgs) ElementType

func (SecretBackendConnectionSnowflakeArgs) ToSecretBackendConnectionSnowflakeOutput

func (i SecretBackendConnectionSnowflakeArgs) ToSecretBackendConnectionSnowflakeOutput() SecretBackendConnectionSnowflakeOutput

func (SecretBackendConnectionSnowflakeArgs) ToSecretBackendConnectionSnowflakeOutputWithContext

func (i SecretBackendConnectionSnowflakeArgs) ToSecretBackendConnectionSnowflakeOutputWithContext(ctx context.Context) SecretBackendConnectionSnowflakeOutput

func (SecretBackendConnectionSnowflakeArgs) ToSecretBackendConnectionSnowflakePtrOutput

func (i SecretBackendConnectionSnowflakeArgs) ToSecretBackendConnectionSnowflakePtrOutput() SecretBackendConnectionSnowflakePtrOutput

func (SecretBackendConnectionSnowflakeArgs) ToSecretBackendConnectionSnowflakePtrOutputWithContext

func (i SecretBackendConnectionSnowflakeArgs) ToSecretBackendConnectionSnowflakePtrOutputWithContext(ctx context.Context) SecretBackendConnectionSnowflakePtrOutput

type SecretBackendConnectionSnowflakeInput

type SecretBackendConnectionSnowflakeInput interface {
	pulumi.Input

	ToSecretBackendConnectionSnowflakeOutput() SecretBackendConnectionSnowflakeOutput
	ToSecretBackendConnectionSnowflakeOutputWithContext(context.Context) SecretBackendConnectionSnowflakeOutput
}

SecretBackendConnectionSnowflakeInput is an input type that accepts SecretBackendConnectionSnowflakeArgs and SecretBackendConnectionSnowflakeOutput values. You can construct a concrete instance of `SecretBackendConnectionSnowflakeInput` via:

SecretBackendConnectionSnowflakeArgs{...}

type SecretBackendConnectionSnowflakeOutput

type SecretBackendConnectionSnowflakeOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionSnowflakeOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionSnowflakeOutput) ElementType

func (SecretBackendConnectionSnowflakeOutput) MaxConnectionLifetime

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionSnowflakeOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionSnowflakeOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionSnowflakeOutput) Password

The password to authenticate with.

func (SecretBackendConnectionSnowflakeOutput) ToSecretBackendConnectionSnowflakeOutput

func (o SecretBackendConnectionSnowflakeOutput) ToSecretBackendConnectionSnowflakeOutput() SecretBackendConnectionSnowflakeOutput

func (SecretBackendConnectionSnowflakeOutput) ToSecretBackendConnectionSnowflakeOutputWithContext

func (o SecretBackendConnectionSnowflakeOutput) ToSecretBackendConnectionSnowflakeOutputWithContext(ctx context.Context) SecretBackendConnectionSnowflakeOutput

func (SecretBackendConnectionSnowflakeOutput) ToSecretBackendConnectionSnowflakePtrOutput

func (o SecretBackendConnectionSnowflakeOutput) ToSecretBackendConnectionSnowflakePtrOutput() SecretBackendConnectionSnowflakePtrOutput

func (SecretBackendConnectionSnowflakeOutput) ToSecretBackendConnectionSnowflakePtrOutputWithContext

func (o SecretBackendConnectionSnowflakeOutput) ToSecretBackendConnectionSnowflakePtrOutputWithContext(ctx context.Context) SecretBackendConnectionSnowflakePtrOutput

func (SecretBackendConnectionSnowflakeOutput) Username

The username to authenticate with.

func (SecretBackendConnectionSnowflakeOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionSnowflakePtrInput

type SecretBackendConnectionSnowflakePtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionSnowflakePtrOutput() SecretBackendConnectionSnowflakePtrOutput
	ToSecretBackendConnectionSnowflakePtrOutputWithContext(context.Context) SecretBackendConnectionSnowflakePtrOutput
}

SecretBackendConnectionSnowflakePtrInput is an input type that accepts SecretBackendConnectionSnowflakeArgs, SecretBackendConnectionSnowflakePtr and SecretBackendConnectionSnowflakePtrOutput values. You can construct a concrete instance of `SecretBackendConnectionSnowflakePtrInput` via:

        SecretBackendConnectionSnowflakeArgs{...}

or:

        nil

type SecretBackendConnectionSnowflakePtrOutput

type SecretBackendConnectionSnowflakePtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionSnowflakePtrOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionSnowflakePtrOutput) Elem

func (SecretBackendConnectionSnowflakePtrOutput) ElementType

func (SecretBackendConnectionSnowflakePtrOutput) MaxConnectionLifetime

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionSnowflakePtrOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionSnowflakePtrOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionSnowflakePtrOutput) Password

The password to authenticate with.

func (SecretBackendConnectionSnowflakePtrOutput) ToSecretBackendConnectionSnowflakePtrOutput

func (o SecretBackendConnectionSnowflakePtrOutput) ToSecretBackendConnectionSnowflakePtrOutput() SecretBackendConnectionSnowflakePtrOutput

func (SecretBackendConnectionSnowflakePtrOutput) ToSecretBackendConnectionSnowflakePtrOutputWithContext

func (o SecretBackendConnectionSnowflakePtrOutput) ToSecretBackendConnectionSnowflakePtrOutputWithContext(ctx context.Context) SecretBackendConnectionSnowflakePtrOutput

func (SecretBackendConnectionSnowflakePtrOutput) Username

The username to authenticate with.

func (SecretBackendConnectionSnowflakePtrOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionState

type SecretBackendConnectionState struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput
	// The unique name of the Vault mount to configure.
	Backend pulumi.StringPtrInput
	// A nested block containing configuration options for Cassandra connections.
	Cassandra SecretBackendConnectionCassandraPtrInput
	// A nested block containing configuration options for Couchbase connections.
	Couchbase SecretBackendConnectionCouchbasePtrInput
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	Data pulumi.MapInput
	// A nested block containing configuration options for Elasticsearch connections.
	Elasticsearch SecretBackendConnectionElasticsearchPtrInput
	// A nested block containing configuration options for SAP HanaDB connections.
	Hana SecretBackendConnectionHanaPtrInput
	// A nested block containing configuration options for InfluxDB connections.
	Influxdb SecretBackendConnectionInfluxdbPtrInput
	// A nested block containing configuration options for MongoDB connections.
	Mongodb SecretBackendConnectionMongodbPtrInput
	// A nested block containing configuration options for MongoDB Atlas connections.
	Mongodbatlas SecretBackendConnectionMongodbatlasPtrInput
	// A nested block containing configuration options for MSSQL connections.
	Mssql SecretBackendConnectionMssqlPtrInput
	// A nested block containing configuration options for MySQL connections.
	Mysql SecretBackendConnectionMysqlPtrInput
	// A nested block containing configuration options for Aurora MySQL connections.
	MysqlAurora SecretBackendConnectionMysqlAuroraPtrInput
	// A nested block containing configuration options for legacy MySQL connections.
	MysqlLegacy SecretBackendConnectionMysqlLegacyPtrInput
	// A nested block containing configuration options for RDS MySQL connections.
	MysqlRds SecretBackendConnectionMysqlRdsPtrInput
	// A unique name to give the database connection.
	Name pulumi.StringPtrInput
	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The `namespace` is always relative to the provider's configured namespace.
	// *Available only for Vault Enterprise*.
	Namespace pulumi.StringPtrInput
	// A nested block containing configuration options for Oracle connections.
	Oracle SecretBackendConnectionOraclePtrInput
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput
	// A nested block containing configuration options for PostgreSQL connections.
	Postgresql SecretBackendConnectionPostgresqlPtrInput
	// A nested block containing configuration options for Redis connections.
	Redis SecretBackendConnectionRedisPtrInput
	// A nested block containing configuration options for Redis ElastiCache connections.
	//
	// Exactly one of the nested blocks of configuration options must be supplied.
	RedisElasticache SecretBackendConnectionRedisElasticachePtrInput
	// Connection parameters for the redshift-database-plugin plugin.
	Redshift SecretBackendConnectionRedshiftPtrInput
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput
	// A nested block containing configuration options for Snowflake connections.
	Snowflake SecretBackendConnectionSnowflakePtrInput
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput
}

func (SecretBackendConnectionState) ElementType

type SecretBackendRole

type SecretBackendRole struct {
	pulumi.CustomResourceState

	// The unique name of the Vault mount to configure.
	Backend pulumi.StringOutput `pulumi:"backend"`
	// The database statements to execute when
	// creating a user.
	CreationStatements pulumi.StringArrayOutput `pulumi:"creationStatements"`
	// Specifies the configuration
	// for the given `credentialType`.
	//
	// The following options are available for each `credentialType` value:
	CredentialConfig pulumi.MapOutput `pulumi:"credentialConfig"`
	// Specifies the type of credential that
	// will be generated for the role. Options include: `password`, `rsaPrivateKey`, `clientCertificate`.
	// See the plugin's API page for credential types supported by individual databases.
	CredentialType pulumi.StringOutput `pulumi:"credentialType"`
	// The unique name of the database connection to use for
	// the role.
	DbName pulumi.StringOutput `pulumi:"dbName"`
	// The default number of seconds for leases for this
	// role.
	DefaultTtl pulumi.IntPtrOutput `pulumi:"defaultTtl"`
	// The maximum number of seconds for leases for this
	// role.
	MaxTtl pulumi.IntPtrOutput `pulumi:"maxTtl"`
	// A unique name to give the role.
	Name pulumi.StringOutput `pulumi:"name"`
	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The `namespace` is always relative to the provider's configured namespace.
	// *Available only for Vault Enterprise*.
	Namespace pulumi.StringPtrOutput `pulumi:"namespace"`
	// The database statements to execute when
	// renewing a user.
	RenewStatements pulumi.StringArrayOutput `pulumi:"renewStatements"`
	// The database statements to execute when
	// revoking a user.
	RevocationStatements pulumi.StringArrayOutput `pulumi:"revocationStatements"`
	// The database statements to execute when
	// rolling back creation due to an error.
	RollbackStatements pulumi.StringArrayOutput `pulumi:"rollbackStatements"`
}

## Example Usage

```go package main

import (

"github.com/pulumi/pulumi-vault/sdk/v5/go/vault"
"github.com/pulumi/pulumi-vault/sdk/v5/go/vault/database"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"

)

func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		db, err := vault.NewMount(ctx, "db", &vault.MountArgs{
			Path: pulumi.String("postgres"),
			Type: pulumi.String("database"),
		})
		if err != nil {
			return err
		}
		postgres, err := database.NewSecretBackendConnection(ctx, "postgres", &database.SecretBackendConnectionArgs{
			Backend: db.Path,
			AllowedRoles: pulumi.StringArray{
				pulumi.String("dev"),
				pulumi.String("prod"),
			},
			Postgresql: &database.SecretBackendConnectionPostgresqlArgs{
				ConnectionUrl: pulumi.String("postgres://username:password@host:port/database"),
			},
		})
		if err != nil {
			return err
		}
		_, err = database.NewSecretBackendRole(ctx, "role", &database.SecretBackendRoleArgs{
			Backend: db.Path,
			DbName:  postgres.Name,
			CreationStatements: pulumi.StringArray{
				pulumi.String("CREATE ROLE \"{{name}}\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}';"),
			},
		})
		if err != nil {
			return err
		}
		return nil
	})
}

```

## Import

Database secret backend roles can be imported using the `backend`, `/roles/`, and the `name` e.g.

```sh

$ pulumi import vault:database/secretBackendRole:SecretBackendRole example postgres/roles/my-role

```

func GetSecretBackendRole

func GetSecretBackendRole(ctx *pulumi.Context,
	name string, id pulumi.IDInput, state *SecretBackendRoleState, opts ...pulumi.ResourceOption) (*SecretBackendRole, error)

GetSecretBackendRole gets an existing SecretBackendRole resource's state with the given name, ID, and optional state properties that are used to uniquely qualify the lookup (nil if not required).

func NewSecretBackendRole

func NewSecretBackendRole(ctx *pulumi.Context,
	name string, args *SecretBackendRoleArgs, opts ...pulumi.ResourceOption) (*SecretBackendRole, error)

NewSecretBackendRole registers a new resource with the given unique name, arguments, and options.

func (*SecretBackendRole) ElementType

func (*SecretBackendRole) ElementType() reflect.Type

func (*SecretBackendRole) ToSecretBackendRoleOutput

func (i *SecretBackendRole) ToSecretBackendRoleOutput() SecretBackendRoleOutput

func (*SecretBackendRole) ToSecretBackendRoleOutputWithContext

func (i *SecretBackendRole) ToSecretBackendRoleOutputWithContext(ctx context.Context) SecretBackendRoleOutput

type SecretBackendRoleArgs

type SecretBackendRoleArgs struct {
	// The unique name of the Vault mount to configure.
	Backend pulumi.StringInput
	// The database statements to execute when
	// creating a user.
	CreationStatements pulumi.StringArrayInput
	// Specifies the configuration
	// for the given `credentialType`.
	//
	// The following options are available for each `credentialType` value:
	CredentialConfig pulumi.MapInput
	// Specifies the type of credential that
	// will be generated for the role. Options include: `password`, `rsaPrivateKey`, `clientCertificate`.
	// See the plugin's API page for credential types supported by individual databases.
	CredentialType pulumi.StringPtrInput
	// The unique name of the database connection to use for
	// the role.
	DbName pulumi.StringInput
	// The default number of seconds for leases for this
	// role.
	DefaultTtl pulumi.IntPtrInput
	// The maximum number of seconds for leases for this
	// role.
	MaxTtl pulumi.IntPtrInput
	// A unique name to give the role.
	Name pulumi.StringPtrInput
	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The `namespace` is always relative to the provider's configured namespace.
	// *Available only for Vault Enterprise*.
	Namespace pulumi.StringPtrInput
	// The database statements to execute when
	// renewing a user.
	RenewStatements pulumi.StringArrayInput
	// The database statements to execute when
	// revoking a user.
	RevocationStatements pulumi.StringArrayInput
	// The database statements to execute when
	// rolling back creation due to an error.
	RollbackStatements pulumi.StringArrayInput
}

The set of arguments for constructing a SecretBackendRole resource.

func (SecretBackendRoleArgs) ElementType

func (SecretBackendRoleArgs) ElementType() reflect.Type

type SecretBackendRoleArray

type SecretBackendRoleArray []SecretBackendRoleInput

func (SecretBackendRoleArray) ElementType

func (SecretBackendRoleArray) ElementType() reflect.Type

func (SecretBackendRoleArray) ToSecretBackendRoleArrayOutput

func (i SecretBackendRoleArray) ToSecretBackendRoleArrayOutput() SecretBackendRoleArrayOutput

func (SecretBackendRoleArray) ToSecretBackendRoleArrayOutputWithContext

func (i SecretBackendRoleArray) ToSecretBackendRoleArrayOutputWithContext(ctx context.Context) SecretBackendRoleArrayOutput

type SecretBackendRoleArrayInput

type SecretBackendRoleArrayInput interface {
	pulumi.Input

	ToSecretBackendRoleArrayOutput() SecretBackendRoleArrayOutput
	ToSecretBackendRoleArrayOutputWithContext(context.Context) SecretBackendRoleArrayOutput
}

SecretBackendRoleArrayInput is an input type that accepts SecretBackendRoleArray and SecretBackendRoleArrayOutput values. You can construct a concrete instance of `SecretBackendRoleArrayInput` via:

SecretBackendRoleArray{ SecretBackendRoleArgs{...} }

type SecretBackendRoleArrayOutput

type SecretBackendRoleArrayOutput struct{ *pulumi.OutputState }

func (SecretBackendRoleArrayOutput) ElementType

func (SecretBackendRoleArrayOutput) Index

func (SecretBackendRoleArrayOutput) ToSecretBackendRoleArrayOutput

func (o SecretBackendRoleArrayOutput) ToSecretBackendRoleArrayOutput() SecretBackendRoleArrayOutput

func (SecretBackendRoleArrayOutput) ToSecretBackendRoleArrayOutputWithContext

func (o SecretBackendRoleArrayOutput) ToSecretBackendRoleArrayOutputWithContext(ctx context.Context) SecretBackendRoleArrayOutput

type SecretBackendRoleInput

type SecretBackendRoleInput interface {
	pulumi.Input

	ToSecretBackendRoleOutput() SecretBackendRoleOutput
	ToSecretBackendRoleOutputWithContext(ctx context.Context) SecretBackendRoleOutput
}

type SecretBackendRoleMap

type SecretBackendRoleMap map[string]SecretBackendRoleInput

func (SecretBackendRoleMap) ElementType

func (SecretBackendRoleMap) ElementType() reflect.Type

func (SecretBackendRoleMap) ToSecretBackendRoleMapOutput

func (i SecretBackendRoleMap) ToSecretBackendRoleMapOutput() SecretBackendRoleMapOutput

func (SecretBackendRoleMap) ToSecretBackendRoleMapOutputWithContext

func (i SecretBackendRoleMap) ToSecretBackendRoleMapOutputWithContext(ctx context.Context) SecretBackendRoleMapOutput

type SecretBackendRoleMapInput

type SecretBackendRoleMapInput interface {
	pulumi.Input

	ToSecretBackendRoleMapOutput() SecretBackendRoleMapOutput
	ToSecretBackendRoleMapOutputWithContext(context.Context) SecretBackendRoleMapOutput
}

SecretBackendRoleMapInput is an input type that accepts SecretBackendRoleMap and SecretBackendRoleMapOutput values. You can construct a concrete instance of `SecretBackendRoleMapInput` via:

SecretBackendRoleMap{ "key": SecretBackendRoleArgs{...} }

type SecretBackendRoleMapOutput

type SecretBackendRoleMapOutput struct{ *pulumi.OutputState }

func (SecretBackendRoleMapOutput) ElementType

func (SecretBackendRoleMapOutput) ElementType() reflect.Type

func (SecretBackendRoleMapOutput) MapIndex

func (SecretBackendRoleMapOutput) ToSecretBackendRoleMapOutput

func (o SecretBackendRoleMapOutput) ToSecretBackendRoleMapOutput() SecretBackendRoleMapOutput

func (SecretBackendRoleMapOutput) ToSecretBackendRoleMapOutputWithContext

func (o SecretBackendRoleMapOutput) ToSecretBackendRoleMapOutputWithContext(ctx context.Context) SecretBackendRoleMapOutput

type SecretBackendRoleOutput

type SecretBackendRoleOutput struct{ *pulumi.OutputState }

func (SecretBackendRoleOutput) Backend added in v5.6.0

The unique name of the Vault mount to configure.

func (SecretBackendRoleOutput) CreationStatements added in v5.6.0

func (o SecretBackendRoleOutput) CreationStatements() pulumi.StringArrayOutput

The database statements to execute when creating a user.

func (SecretBackendRoleOutput) CredentialConfig added in v5.13.0

func (o SecretBackendRoleOutput) CredentialConfig() pulumi.MapOutput

Specifies the configuration for the given `credentialType`.

The following options are available for each `credentialType` value:

func (SecretBackendRoleOutput) CredentialType added in v5.13.0

func (o SecretBackendRoleOutput) CredentialType() pulumi.StringOutput

Specifies the type of credential that will be generated for the role. Options include: `password`, `rsaPrivateKey`, `clientCertificate`. See the plugin's API page for credential types supported by individual databases.

func (SecretBackendRoleOutput) DbName added in v5.6.0

The unique name of the database connection to use for the role.

func (SecretBackendRoleOutput) DefaultTtl added in v5.6.0

The default number of seconds for leases for this role.

func (SecretBackendRoleOutput) ElementType

func (SecretBackendRoleOutput) ElementType() reflect.Type

func (SecretBackendRoleOutput) MaxTtl added in v5.6.0

The maximum number of seconds for leases for this role.

func (SecretBackendRoleOutput) Name added in v5.6.0

A unique name to give the role.

func (SecretBackendRoleOutput) Namespace added in v5.7.0

The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The `namespace` is always relative to the provider's configured namespace. *Available only for Vault Enterprise*.

func (SecretBackendRoleOutput) RenewStatements added in v5.6.0

func (o SecretBackendRoleOutput) RenewStatements() pulumi.StringArrayOutput

The database statements to execute when renewing a user.

func (SecretBackendRoleOutput) RevocationStatements added in v5.6.0

func (o SecretBackendRoleOutput) RevocationStatements() pulumi.StringArrayOutput

The database statements to execute when revoking a user.

func (SecretBackendRoleOutput) RollbackStatements added in v5.6.0

func (o SecretBackendRoleOutput) RollbackStatements() pulumi.StringArrayOutput

The database statements to execute when rolling back creation due to an error.

func (SecretBackendRoleOutput) ToSecretBackendRoleOutput

func (o SecretBackendRoleOutput) ToSecretBackendRoleOutput() SecretBackendRoleOutput

func (SecretBackendRoleOutput) ToSecretBackendRoleOutputWithContext

func (o SecretBackendRoleOutput) ToSecretBackendRoleOutputWithContext(ctx context.Context) SecretBackendRoleOutput

type SecretBackendRoleState

type SecretBackendRoleState struct {
	// The unique name of the Vault mount to configure.
	Backend pulumi.StringPtrInput
	// The database statements to execute when
	// creating a user.
	CreationStatements pulumi.StringArrayInput
	// Specifies the configuration
	// for the given `credentialType`.
	//
	// The following options are available for each `credentialType` value:
	CredentialConfig pulumi.MapInput
	// Specifies the type of credential that
	// will be generated for the role. Options include: `password`, `rsaPrivateKey`, `clientCertificate`.
	// See the plugin's API page for credential types supported by individual databases.
	CredentialType pulumi.StringPtrInput
	// The unique name of the database connection to use for
	// the role.
	DbName pulumi.StringPtrInput
	// The default number of seconds for leases for this
	// role.
	DefaultTtl pulumi.IntPtrInput
	// The maximum number of seconds for leases for this
	// role.
	MaxTtl pulumi.IntPtrInput
	// A unique name to give the role.
	Name pulumi.StringPtrInput
	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The `namespace` is always relative to the provider's configured namespace.
	// *Available only for Vault Enterprise*.
	Namespace pulumi.StringPtrInput
	// The database statements to execute when
	// renewing a user.
	RenewStatements pulumi.StringArrayInput
	// The database statements to execute when
	// revoking a user.
	RevocationStatements pulumi.StringArrayInput
	// The database statements to execute when
	// rolling back creation due to an error.
	RollbackStatements pulumi.StringArrayInput
}

func (SecretBackendRoleState) ElementType

func (SecretBackendRoleState) ElementType() reflect.Type

type SecretBackendStaticRole

type SecretBackendStaticRole struct {
	pulumi.CustomResourceState

	// The unique name of the Vault mount to configure.
	Backend pulumi.StringOutput `pulumi:"backend"`
	// The unique name of the database connection to use for the static role.
	DbName pulumi.StringOutput `pulumi:"dbName"`
	// A unique name to give the static role.
	Name pulumi.StringOutput `pulumi:"name"`
	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The `namespace` is always relative to the provider's configured namespace.
	// *Available only for Vault Enterprise*.
	Namespace pulumi.StringPtrOutput `pulumi:"namespace"`
	// The amount of time Vault should wait before rotating the password, in seconds.
	// Mutually exclusive with `rotationSchedule`.
	RotationPeriod pulumi.IntPtrOutput `pulumi:"rotationPeriod"`
	// A cron-style string that will define the schedule on which rotations should occur.
	// Mutually exclusive with `rotationPeriod`.
	//
	// **Warning**: The `rotationPeriod` and `rotationSchedule` fields are
	// mutually exclusive. One of them must be set but not both.
	RotationSchedule pulumi.StringPtrOutput `pulumi:"rotationSchedule"`
	// Database statements to execute to rotate the password for the configured database user.
	RotationStatements pulumi.StringArrayOutput `pulumi:"rotationStatements"`
	// The amount of time, in seconds, in which rotations are allowed to occur starting
	// from a given `rotationSchedule`.
	RotationWindow pulumi.IntPtrOutput `pulumi:"rotationWindow"`
	// The database username that this static role corresponds to.
	Username pulumi.StringOutput `pulumi:"username"`
}

Creates a Database Secret Backend static role in Vault. Database secret backend static roles can be used to manage 1-to-1 mapping of a Vault Role to a user in a database for the database.

## Example Usage

```go package main

import (

"github.com/pulumi/pulumi-vault/sdk/v5/go/vault"
"github.com/pulumi/pulumi-vault/sdk/v5/go/vault/database"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"

)

func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		db, err := vault.NewMount(ctx, "db", &vault.MountArgs{
			Path: pulumi.String("postgres"),
			Type: pulumi.String("database"),
		})
		if err != nil {
			return err
		}
		postgres, err := database.NewSecretBackendConnection(ctx, "postgres", &database.SecretBackendConnectionArgs{
			Backend: db.Path,
			AllowedRoles: pulumi.StringArray{
				pulumi.String("*"),
			},
			Postgresql: &database.SecretBackendConnectionPostgresqlArgs{
				ConnectionUrl: pulumi.String("postgres://username:password@host:port/database"),
			},
		})
		if err != nil {
			return err
		}
		_, err = database.NewSecretBackendStaticRole(ctx, "periodRole", &database.SecretBackendStaticRoleArgs{
			Backend:        db.Path,
			DbName:         postgres.Name,
			Username:       pulumi.String("example"),
			RotationPeriod: pulumi.Int(3600),
			RotationStatements: pulumi.StringArray{
				pulumi.String("ALTER USER \"{{name}}\" WITH PASSWORD '{{password}}';"),
			},
		})
		if err != nil {
			return err
		}
		_, err = database.NewSecretBackendStaticRole(ctx, "scheduleRole", &database.SecretBackendStaticRoleArgs{
			Backend:          db.Path,
			DbName:           postgres.Name,
			Username:         pulumi.String("example"),
			RotationSchedule: pulumi.String("0 0 * * SAT"),
			RotationWindow:   pulumi.Int(172800),
			RotationStatements: pulumi.StringArray{
				pulumi.String("ALTER USER \"{{name}}\" WITH PASSWORD '{{password}}';"),
			},
		})
		if err != nil {
			return err
		}
		return nil
	})
}

```

## Import

Database secret backend static roles can be imported using the `backend`, `/static-roles/`, and the `name` e.g.

```sh

$ pulumi import vault:database/secretBackendStaticRole:SecretBackendStaticRole example postgres/static-roles/my-role

```

func GetSecretBackendStaticRole

func GetSecretBackendStaticRole(ctx *pulumi.Context,
	name string, id pulumi.IDInput, state *SecretBackendStaticRoleState, opts ...pulumi.ResourceOption) (*SecretBackendStaticRole, error)

GetSecretBackendStaticRole gets an existing SecretBackendStaticRole resource's state with the given name, ID, and optional state properties that are used to uniquely qualify the lookup (nil if not required).

func NewSecretBackendStaticRole

func NewSecretBackendStaticRole(ctx *pulumi.Context,
	name string, args *SecretBackendStaticRoleArgs, opts ...pulumi.ResourceOption) (*SecretBackendStaticRole, error)

NewSecretBackendStaticRole registers a new resource with the given unique name, arguments, and options.

func (*SecretBackendStaticRole) ElementType

func (*SecretBackendStaticRole) ElementType() reflect.Type

func (*SecretBackendStaticRole) ToSecretBackendStaticRoleOutput

func (i *SecretBackendStaticRole) ToSecretBackendStaticRoleOutput() SecretBackendStaticRoleOutput

func (*SecretBackendStaticRole) ToSecretBackendStaticRoleOutputWithContext

func (i *SecretBackendStaticRole) ToSecretBackendStaticRoleOutputWithContext(ctx context.Context) SecretBackendStaticRoleOutput

type SecretBackendStaticRoleArgs

type SecretBackendStaticRoleArgs struct {
	// The unique name of the Vault mount to configure.
	Backend pulumi.StringInput
	// The unique name of the database connection to use for the static role.
	DbName pulumi.StringInput
	// A unique name to give the static role.
	Name pulumi.StringPtrInput
	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The `namespace` is always relative to the provider's configured namespace.
	// *Available only for Vault Enterprise*.
	Namespace pulumi.StringPtrInput
	// The amount of time Vault should wait before rotating the password, in seconds.
	// Mutually exclusive with `rotationSchedule`.
	RotationPeriod pulumi.IntPtrInput
	// A cron-style string that will define the schedule on which rotations should occur.
	// Mutually exclusive with `rotationPeriod`.
	//
	// **Warning**: The `rotationPeriod` and `rotationSchedule` fields are
	// mutually exclusive. One of them must be set but not both.
	RotationSchedule pulumi.StringPtrInput
	// Database statements to execute to rotate the password for the configured database user.
	RotationStatements pulumi.StringArrayInput
	// The amount of time, in seconds, in which rotations are allowed to occur starting
	// from a given `rotationSchedule`.
	RotationWindow pulumi.IntPtrInput
	// The database username that this static role corresponds to.
	Username pulumi.StringInput
}

The set of arguments for constructing a SecretBackendStaticRole resource.

func (SecretBackendStaticRoleArgs) ElementType

type SecretBackendStaticRoleArray

type SecretBackendStaticRoleArray []SecretBackendStaticRoleInput

func (SecretBackendStaticRoleArray) ElementType

func (SecretBackendStaticRoleArray) ToSecretBackendStaticRoleArrayOutput

func (i SecretBackendStaticRoleArray) ToSecretBackendStaticRoleArrayOutput() SecretBackendStaticRoleArrayOutput

func (SecretBackendStaticRoleArray) ToSecretBackendStaticRoleArrayOutputWithContext

func (i SecretBackendStaticRoleArray) ToSecretBackendStaticRoleArrayOutputWithContext(ctx context.Context) SecretBackendStaticRoleArrayOutput

type SecretBackendStaticRoleArrayInput

type SecretBackendStaticRoleArrayInput interface {
	pulumi.Input

	ToSecretBackendStaticRoleArrayOutput() SecretBackendStaticRoleArrayOutput
	ToSecretBackendStaticRoleArrayOutputWithContext(context.Context) SecretBackendStaticRoleArrayOutput
}

SecretBackendStaticRoleArrayInput is an input type that accepts SecretBackendStaticRoleArray and SecretBackendStaticRoleArrayOutput values. You can construct a concrete instance of `SecretBackendStaticRoleArrayInput` via:

SecretBackendStaticRoleArray{ SecretBackendStaticRoleArgs{...} }

type SecretBackendStaticRoleArrayOutput

type SecretBackendStaticRoleArrayOutput struct{ *pulumi.OutputState }

func (SecretBackendStaticRoleArrayOutput) ElementType

func (SecretBackendStaticRoleArrayOutput) Index

func (SecretBackendStaticRoleArrayOutput) ToSecretBackendStaticRoleArrayOutput

func (o SecretBackendStaticRoleArrayOutput) ToSecretBackendStaticRoleArrayOutput() SecretBackendStaticRoleArrayOutput

func (SecretBackendStaticRoleArrayOutput) ToSecretBackendStaticRoleArrayOutputWithContext

func (o SecretBackendStaticRoleArrayOutput) ToSecretBackendStaticRoleArrayOutputWithContext(ctx context.Context) SecretBackendStaticRoleArrayOutput

type SecretBackendStaticRoleInput

type SecretBackendStaticRoleInput interface {
	pulumi.Input

	ToSecretBackendStaticRoleOutput() SecretBackendStaticRoleOutput
	ToSecretBackendStaticRoleOutputWithContext(ctx context.Context) SecretBackendStaticRoleOutput
}

type SecretBackendStaticRoleMap

type SecretBackendStaticRoleMap map[string]SecretBackendStaticRoleInput

func (SecretBackendStaticRoleMap) ElementType

func (SecretBackendStaticRoleMap) ElementType() reflect.Type

func (SecretBackendStaticRoleMap) ToSecretBackendStaticRoleMapOutput

func (i SecretBackendStaticRoleMap) ToSecretBackendStaticRoleMapOutput() SecretBackendStaticRoleMapOutput

func (SecretBackendStaticRoleMap) ToSecretBackendStaticRoleMapOutputWithContext

func (i SecretBackendStaticRoleMap) ToSecretBackendStaticRoleMapOutputWithContext(ctx context.Context) SecretBackendStaticRoleMapOutput

type SecretBackendStaticRoleMapInput

type SecretBackendStaticRoleMapInput interface {
	pulumi.Input

	ToSecretBackendStaticRoleMapOutput() SecretBackendStaticRoleMapOutput
	ToSecretBackendStaticRoleMapOutputWithContext(context.Context) SecretBackendStaticRoleMapOutput
}

SecretBackendStaticRoleMapInput is an input type that accepts SecretBackendStaticRoleMap and SecretBackendStaticRoleMapOutput values. You can construct a concrete instance of `SecretBackendStaticRoleMapInput` via:

SecretBackendStaticRoleMap{ "key": SecretBackendStaticRoleArgs{...} }

type SecretBackendStaticRoleMapOutput

type SecretBackendStaticRoleMapOutput struct{ *pulumi.OutputState }

func (SecretBackendStaticRoleMapOutput) ElementType

func (SecretBackendStaticRoleMapOutput) MapIndex

func (SecretBackendStaticRoleMapOutput) ToSecretBackendStaticRoleMapOutput

func (o SecretBackendStaticRoleMapOutput) ToSecretBackendStaticRoleMapOutput() SecretBackendStaticRoleMapOutput

func (SecretBackendStaticRoleMapOutput) ToSecretBackendStaticRoleMapOutputWithContext

func (o SecretBackendStaticRoleMapOutput) ToSecretBackendStaticRoleMapOutputWithContext(ctx context.Context) SecretBackendStaticRoleMapOutput

type SecretBackendStaticRoleOutput

type SecretBackendStaticRoleOutput struct{ *pulumi.OutputState }

func (SecretBackendStaticRoleOutput) Backend added in v5.6.0

The unique name of the Vault mount to configure.

func (SecretBackendStaticRoleOutput) DbName added in v5.6.0

The unique name of the database connection to use for the static role.

func (SecretBackendStaticRoleOutput) ElementType

func (SecretBackendStaticRoleOutput) Name added in v5.6.0

A unique name to give the static role.

func (SecretBackendStaticRoleOutput) Namespace added in v5.7.0

The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The `namespace` is always relative to the provider's configured namespace. *Available only for Vault Enterprise*.

func (SecretBackendStaticRoleOutput) RotationPeriod added in v5.6.0

The amount of time Vault should wait before rotating the password, in seconds. Mutually exclusive with `rotationSchedule`.

func (SecretBackendStaticRoleOutput) RotationSchedule added in v5.16.0

A cron-style string that will define the schedule on which rotations should occur. Mutually exclusive with `rotationPeriod`.

**Warning**: The `rotationPeriod` and `rotationSchedule` fields are mutually exclusive. One of them must be set but not both.

func (SecretBackendStaticRoleOutput) RotationStatements added in v5.6.0

Database statements to execute to rotate the password for the configured database user.

func (SecretBackendStaticRoleOutput) RotationWindow added in v5.16.0

The amount of time, in seconds, in which rotations are allowed to occur starting from a given `rotationSchedule`.

func (SecretBackendStaticRoleOutput) ToSecretBackendStaticRoleOutput

func (o SecretBackendStaticRoleOutput) ToSecretBackendStaticRoleOutput() SecretBackendStaticRoleOutput

func (SecretBackendStaticRoleOutput) ToSecretBackendStaticRoleOutputWithContext

func (o SecretBackendStaticRoleOutput) ToSecretBackendStaticRoleOutputWithContext(ctx context.Context) SecretBackendStaticRoleOutput

func (SecretBackendStaticRoleOutput) Username added in v5.6.0

The database username that this static role corresponds to.

type SecretBackendStaticRoleState

type SecretBackendStaticRoleState struct {
	// The unique name of the Vault mount to configure.
	Backend pulumi.StringPtrInput
	// The unique name of the database connection to use for the static role.
	DbName pulumi.StringPtrInput
	// A unique name to give the static role.
	Name pulumi.StringPtrInput
	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The `namespace` is always relative to the provider's configured namespace.
	// *Available only for Vault Enterprise*.
	Namespace pulumi.StringPtrInput
	// The amount of time Vault should wait before rotating the password, in seconds.
	// Mutually exclusive with `rotationSchedule`.
	RotationPeriod pulumi.IntPtrInput
	// A cron-style string that will define the schedule on which rotations should occur.
	// Mutually exclusive with `rotationPeriod`.
	//
	// **Warning**: The `rotationPeriod` and `rotationSchedule` fields are
	// mutually exclusive. One of them must be set but not both.
	RotationSchedule pulumi.StringPtrInput
	// Database statements to execute to rotate the password for the configured database user.
	RotationStatements pulumi.StringArrayInput
	// The amount of time, in seconds, in which rotations are allowed to occur starting
	// from a given `rotationSchedule`.
	RotationWindow pulumi.IntPtrInput
	// The database username that this static role corresponds to.
	Username pulumi.StringPtrInput
}

func (SecretBackendStaticRoleState) ElementType

type SecretsMount added in v5.5.0

type SecretsMount struct {
	pulumi.CustomResourceState

	// Accessor of the mount
	Accessor pulumi.StringOutput `pulumi:"accessor"`
	// Set of managed key registry entry names that the mount in question is allowed to access
	//
	// The following arguments are common to all database engines:
	AllowedManagedKeys pulumi.StringArrayOutput `pulumi:"allowedManagedKeys"`
	// Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
	AuditNonHmacRequestKeys pulumi.StringArrayOutput `pulumi:"auditNonHmacRequestKeys"`
	// Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
	AuditNonHmacResponseKeys pulumi.StringArrayOutput `pulumi:"auditNonHmacResponseKeys"`
	// A nested block containing configuration options for Cassandra connections.\
	// *See Configuration Options for more info*
	Cassandras SecretsMountCassandraArrayOutput `pulumi:"cassandras"`
	// A nested block containing configuration options for Couchbase connections.\
	// *See Configuration Options for more info*
	Couchbases SecretsMountCouchbaseArrayOutput `pulumi:"couchbases"`
	// Default lease duration for tokens and secrets in seconds
	DefaultLeaseTtlSeconds pulumi.IntOutput `pulumi:"defaultLeaseTtlSeconds"`
	// Human-friendly description of the mount
	Description pulumi.StringPtrOutput `pulumi:"description"`
	// A nested block containing configuration options for Elasticsearch connections.\
	// *See Configuration Options for more info*
	Elasticsearches SecretsMountElasticsearchArrayOutput `pulumi:"elasticsearches"`
	// The total number of database secrets engines configured.
	EngineCount pulumi.IntOutput `pulumi:"engineCount"`
	// Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
	ExternalEntropyAccess pulumi.BoolPtrOutput `pulumi:"externalEntropyAccess"`
	// A nested block containing configuration options for SAP HanaDB connections.\
	// *See Configuration Options for more info*
	Hanas SecretsMountHanaArrayOutput `pulumi:"hanas"`
	// A nested block containing configuration options for InfluxDB connections.\
	// *See Configuration Options for more info*
	Influxdbs SecretsMountInfluxdbArrayOutput `pulumi:"influxdbs"`
	// Boolean flag that can be explicitly set to true to enforce local mount in HA environment
	Local pulumi.BoolPtrOutput `pulumi:"local"`
	// Maximum possible lease duration for tokens and secrets in seconds
	MaxLeaseTtlSeconds pulumi.IntOutput `pulumi:"maxLeaseTtlSeconds"`
	// A nested block containing configuration options for MongoDB Atlas connections.\
	// *See Configuration Options for more info*
	Mongodbatlas SecretsMountMongodbatlaArrayOutput `pulumi:"mongodbatlas"`
	// A nested block containing configuration options for MongoDB connections.\
	// *See Configuration Options for more info*
	Mongodbs SecretsMountMongodbArrayOutput `pulumi:"mongodbs"`
	// A nested block containing configuration options for MSSQL connections.\
	// *See Configuration Options for more info*
	Mssqls SecretsMountMssqlArrayOutput `pulumi:"mssqls"`
	// A nested block containing configuration options for Aurora MySQL connections.\
	// *See Configuration Options for more info*
	MysqlAuroras SecretsMountMysqlAuroraArrayOutput `pulumi:"mysqlAuroras"`
	// A nested block containing configuration options for legacy MySQL connections.\
	// *See Configuration Options for more info*
	MysqlLegacies SecretsMountMysqlLegacyArrayOutput `pulumi:"mysqlLegacies"`
	// A nested block containing configuration options for RDS MySQL connections.\
	// *See Configuration Options for more info*
	MysqlRds SecretsMountMysqlRdArrayOutput `pulumi:"mysqlRds"`
	// A nested block containing configuration options for MySQL connections.\
	// *See Configuration Options for more info*
	Mysqls SecretsMountMysqlArrayOutput `pulumi:"mysqls"`
	// Target namespace. (requires Enterprise)
	Namespace pulumi.StringPtrOutput `pulumi:"namespace"`
	// Specifies mount type specific options that are passed to the backend
	Options pulumi.MapOutput `pulumi:"options"`
	// A nested block containing configuration options for Oracle connections.\
	// *See Configuration Options for more info*
	Oracles SecretsMountOracleArrayOutput `pulumi:"oracles"`
	// Where the secret backend will be mounted
	Path pulumi.StringOutput `pulumi:"path"`
	// A nested block containing configuration options for PostgreSQL connections.\
	// *See Configuration Options for more info*
	Postgresqls SecretsMountPostgresqlArrayOutput `pulumi:"postgresqls"`
	// A nested block containing configuration options for Redis connections.\
	// *See Configuration Options for more info*
	Redis SecretsMountRediArrayOutput `pulumi:"redis"`
	// A nested block containing configuration options for Redis ElastiCache connections.\
	// *See Configuration Options for more info*
	RedisElasticaches SecretsMountRedisElasticachArrayOutput `pulumi:"redisElasticaches"`
	// A nested block containing configuration options for AWS Redshift connections.\
	// *See Configuration Options for more info*
	Redshifts SecretsMountRedshiftArrayOutput `pulumi:"redshifts"`
	// Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
	SealWrap pulumi.BoolOutput `pulumi:"sealWrap"`
	// A nested block containing configuration options for Snowflake connections.\
	// *See Configuration Options for more info*
	Snowflakes SecretsMountSnowflakeArrayOutput `pulumi:"snowflakes"`
}

## Example Usage

```go package main

import (

"github.com/pulumi/pulumi-vault/sdk/v5/go/vault/database"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"

)

func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		db, err := database.NewSecretsMount(ctx, "db", &database.SecretsMountArgs{
			Path: pulumi.String("db"),
			Mssqls: database.SecretsMountMssqlArray{
				&database.SecretsMountMssqlArgs{
					Name:          pulumi.String("db1"),
					Username:      pulumi.String("sa"),
					Password:      pulumi.String("super_secret_1"),
					ConnectionUrl: pulumi.String("sqlserver://{{username}}:{{password}}@127.0.0.1:1433"),
					AllowedRoles: pulumi.StringArray{
						pulumi.String("dev1"),
					},
				},
			},
			Postgresqls: database.SecretsMountPostgresqlArray{
				&database.SecretsMountPostgresqlArgs{
					Name:             pulumi.String("db2"),
					Username:         pulumi.String("postgres"),
					Password:         pulumi.String("super_secret_2"),
					ConnectionUrl:    pulumi.String("postgresql://{{username}}:{{password}}@127.0.0.1:5432/postgres"),
					VerifyConnection: pulumi.Bool(true),
					AllowedRoles: pulumi.StringArray{
						pulumi.String("dev2"),
					},
				},
			},
		})
		if err != nil {
			return err
		}
		_, err = database.NewSecretBackendRole(ctx, "dev1", &database.SecretBackendRoleArgs{
			Backend: db.Path,
			DbName: db.Mssqls.ApplyT(func(mssqls []database.SecretsMountMssql) (*string, error) {
				return &mssqls[0].Name, nil
			}).(pulumi.StringPtrOutput),
			CreationStatements: pulumi.StringArray{
				pulumi.String("CREATE LOGIN [{{name}}] WITH PASSWORD = '{{password}}';"),
				pulumi.String("CREATE USER [{{name}}] FOR LOGIN [{{name}}];"),
				pulumi.String("GRANT SELECT ON SCHEMA::dbo TO [{{name}}];"),
			},
		})
		if err != nil {
			return err
		}
		_, err = database.NewSecretBackendRole(ctx, "dev2", &database.SecretBackendRoleArgs{
			Backend: db.Path,
			DbName: db.Postgresqls.ApplyT(func(postgresqls []database.SecretsMountPostgresql) (*string, error) {
				return &postgresqls[0].Name, nil
			}).(pulumi.StringPtrOutput),
			CreationStatements: pulumi.StringArray{
				pulumi.String("CREATE ROLE \"{{name}}\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}';"),
				pulumi.String("GRANT SELECT ON ALL TABLES IN SCHEMA public TO \"{{name}}\";"),
			},
		})
		if err != nil {
			return err
		}
		return nil
	})
}

```

## Import

Database secret backend connections can be imported using the `path` e.g.

```sh

$ pulumi import vault:database/secretsMount:SecretsMount db db

```

func GetSecretsMount added in v5.5.0

func GetSecretsMount(ctx *pulumi.Context,
	name string, id pulumi.IDInput, state *SecretsMountState, opts ...pulumi.ResourceOption) (*SecretsMount, error)

GetSecretsMount gets an existing SecretsMount resource's state with the given name, ID, and optional state properties that are used to uniquely qualify the lookup (nil if not required).

func NewSecretsMount added in v5.5.0

func NewSecretsMount(ctx *pulumi.Context,
	name string, args *SecretsMountArgs, opts ...pulumi.ResourceOption) (*SecretsMount, error)

NewSecretsMount registers a new resource with the given unique name, arguments, and options.

func (*SecretsMount) ElementType added in v5.5.0

func (*SecretsMount) ElementType() reflect.Type

func (*SecretsMount) ToSecretsMountOutput added in v5.5.0

func (i *SecretsMount) ToSecretsMountOutput() SecretsMountOutput

func (*SecretsMount) ToSecretsMountOutputWithContext added in v5.5.0

func (i *SecretsMount) ToSecretsMountOutputWithContext(ctx context.Context) SecretsMountOutput

type SecretsMountArgs added in v5.5.0

type SecretsMountArgs struct {
	// Set of managed key registry entry names that the mount in question is allowed to access
	//
	// The following arguments are common to all database engines:
	AllowedManagedKeys pulumi.StringArrayInput
	// Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
	AuditNonHmacRequestKeys pulumi.StringArrayInput
	// Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
	AuditNonHmacResponseKeys pulumi.StringArrayInput
	// A nested block containing configuration options for Cassandra connections.\
	// *See Configuration Options for more info*
	Cassandras SecretsMountCassandraArrayInput
	// A nested block containing configuration options for Couchbase connections.\
	// *See Configuration Options for more info*
	Couchbases SecretsMountCouchbaseArrayInput
	// Default lease duration for tokens and secrets in seconds
	DefaultLeaseTtlSeconds pulumi.IntPtrInput
	// Human-friendly description of the mount
	Description pulumi.StringPtrInput
	// A nested block containing configuration options for Elasticsearch connections.\
	// *See Configuration Options for more info*
	Elasticsearches SecretsMountElasticsearchArrayInput
	// Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
	ExternalEntropyAccess pulumi.BoolPtrInput
	// A nested block containing configuration options for SAP HanaDB connections.\
	// *See Configuration Options for more info*
	Hanas SecretsMountHanaArrayInput
	// A nested block containing configuration options for InfluxDB connections.\
	// *See Configuration Options for more info*
	Influxdbs SecretsMountInfluxdbArrayInput
	// Boolean flag that can be explicitly set to true to enforce local mount in HA environment
	Local pulumi.BoolPtrInput
	// Maximum possible lease duration for tokens and secrets in seconds
	MaxLeaseTtlSeconds pulumi.IntPtrInput
	// A nested block containing configuration options for MongoDB Atlas connections.\
	// *See Configuration Options for more info*
	Mongodbatlas SecretsMountMongodbatlaArrayInput
	// A nested block containing configuration options for MongoDB connections.\
	// *See Configuration Options for more info*
	Mongodbs SecretsMountMongodbArrayInput
	// A nested block containing configuration options for MSSQL connections.\
	// *See Configuration Options for more info*
	Mssqls SecretsMountMssqlArrayInput
	// A nested block containing configuration options for Aurora MySQL connections.\
	// *See Configuration Options for more info*
	MysqlAuroras SecretsMountMysqlAuroraArrayInput
	// A nested block containing configuration options for legacy MySQL connections.\
	// *See Configuration Options for more info*
	MysqlLegacies SecretsMountMysqlLegacyArrayInput
	// A nested block containing configuration options for RDS MySQL connections.\
	// *See Configuration Options for more info*
	MysqlRds SecretsMountMysqlRdArrayInput
	// A nested block containing configuration options for MySQL connections.\
	// *See Configuration Options for more info*
	Mysqls SecretsMountMysqlArrayInput
	// Target namespace. (requires Enterprise)
	Namespace pulumi.StringPtrInput
	// Specifies mount type specific options that are passed to the backend
	Options pulumi.MapInput
	// A nested block containing configuration options for Oracle connections.\
	// *See Configuration Options for more info*
	Oracles SecretsMountOracleArrayInput
	// Where the secret backend will be mounted
	Path pulumi.StringInput
	// A nested block containing configuration options for PostgreSQL connections.\
	// *See Configuration Options for more info*
	Postgresqls SecretsMountPostgresqlArrayInput
	// A nested block containing configuration options for Redis connections.\
	// *See Configuration Options for more info*
	Redis SecretsMountRediArrayInput
	// A nested block containing configuration options for Redis ElastiCache connections.\
	// *See Configuration Options for more info*
	RedisElasticaches SecretsMountRedisElasticachArrayInput
	// A nested block containing configuration options for AWS Redshift connections.\
	// *See Configuration Options for more info*
	Redshifts SecretsMountRedshiftArrayInput
	// Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
	SealWrap pulumi.BoolPtrInput
	// A nested block containing configuration options for Snowflake connections.\
	// *See Configuration Options for more info*
	Snowflakes SecretsMountSnowflakeArrayInput
}

The set of arguments for constructing a SecretsMount resource.

func (SecretsMountArgs) ElementType added in v5.5.0

func (SecretsMountArgs) ElementType() reflect.Type

type SecretsMountArray added in v5.5.0

type SecretsMountArray []SecretsMountInput

func (SecretsMountArray) ElementType added in v5.5.0

func (SecretsMountArray) ElementType() reflect.Type

func (SecretsMountArray) ToSecretsMountArrayOutput added in v5.5.0

func (i SecretsMountArray) ToSecretsMountArrayOutput() SecretsMountArrayOutput

func (SecretsMountArray) ToSecretsMountArrayOutputWithContext added in v5.5.0

func (i SecretsMountArray) ToSecretsMountArrayOutputWithContext(ctx context.Context) SecretsMountArrayOutput

type SecretsMountArrayInput added in v5.5.0

type SecretsMountArrayInput interface {
	pulumi.Input

	ToSecretsMountArrayOutput() SecretsMountArrayOutput
	ToSecretsMountArrayOutputWithContext(context.Context) SecretsMountArrayOutput
}

SecretsMountArrayInput is an input type that accepts SecretsMountArray and SecretsMountArrayOutput values. You can construct a concrete instance of `SecretsMountArrayInput` via:

SecretsMountArray{ SecretsMountArgs{...} }

type SecretsMountArrayOutput added in v5.5.0

type SecretsMountArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountArrayOutput) ElementType added in v5.5.0

func (SecretsMountArrayOutput) ElementType() reflect.Type

func (SecretsMountArrayOutput) Index added in v5.5.0

func (SecretsMountArrayOutput) ToSecretsMountArrayOutput added in v5.5.0

func (o SecretsMountArrayOutput) ToSecretsMountArrayOutput() SecretsMountArrayOutput

func (SecretsMountArrayOutput) ToSecretsMountArrayOutputWithContext added in v5.5.0

func (o SecretsMountArrayOutput) ToSecretsMountArrayOutputWithContext(ctx context.Context) SecretsMountArrayOutput

type SecretsMountCassandra added in v5.5.0

type SecretsMountCassandra struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// The number of seconds to use as a connection
	// timeout.
	ConnectTimeout *int `pulumi:"connectTimeout"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// The hosts to connect to.
	Hosts []string `pulumi:"hosts"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls *bool `pulumi:"insecureTls"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password *string `pulumi:"password"`
	// Concatenated PEM blocks configuring the certificate
	// chain.
	PemBundle *string `pulumi:"pemBundle"`
	// A JSON structure configuring the certificate chain.
	PemJson *string `pulumi:"pemJson"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// The default port to connect to if no port is specified as
	// part of the host.
	Port *int `pulumi:"port"`
	// The CQL protocol version to use.
	ProtocolVersion *int `pulumi:"protocolVersion"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// Whether to use TLS when connecting to Cassandra.
	Tls *bool `pulumi:"tls"`
	// The root credential username used in the connection URL.
	Username *string `pulumi:"username"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountCassandraArgs added in v5.5.0

type SecretsMountCassandraArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// The number of seconds to use as a connection
	// timeout.
	ConnectTimeout pulumi.IntPtrInput `pulumi:"connectTimeout"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// The hosts to connect to.
	Hosts pulumi.StringArrayInput `pulumi:"hosts"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls pulumi.BoolPtrInput `pulumi:"insecureTls"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Concatenated PEM blocks configuring the certificate
	// chain.
	PemBundle pulumi.StringPtrInput `pulumi:"pemBundle"`
	// A JSON structure configuring the certificate chain.
	PemJson pulumi.StringPtrInput `pulumi:"pemJson"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// The default port to connect to if no port is specified as
	// part of the host.
	Port pulumi.IntPtrInput `pulumi:"port"`
	// The CQL protocol version to use.
	ProtocolVersion pulumi.IntPtrInput `pulumi:"protocolVersion"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// Whether to use TLS when connecting to Cassandra.
	Tls pulumi.BoolPtrInput `pulumi:"tls"`
	// The root credential username used in the connection URL.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountCassandraArgs) ElementType added in v5.5.0

func (SecretsMountCassandraArgs) ElementType() reflect.Type

func (SecretsMountCassandraArgs) ToSecretsMountCassandraOutput added in v5.5.0

func (i SecretsMountCassandraArgs) ToSecretsMountCassandraOutput() SecretsMountCassandraOutput

func (SecretsMountCassandraArgs) ToSecretsMountCassandraOutputWithContext added in v5.5.0

func (i SecretsMountCassandraArgs) ToSecretsMountCassandraOutputWithContext(ctx context.Context) SecretsMountCassandraOutput

type SecretsMountCassandraArray added in v5.5.0

type SecretsMountCassandraArray []SecretsMountCassandraInput

func (SecretsMountCassandraArray) ElementType added in v5.5.0

func (SecretsMountCassandraArray) ElementType() reflect.Type

func (SecretsMountCassandraArray) ToSecretsMountCassandraArrayOutput added in v5.5.0

func (i SecretsMountCassandraArray) ToSecretsMountCassandraArrayOutput() SecretsMountCassandraArrayOutput

func (SecretsMountCassandraArray) ToSecretsMountCassandraArrayOutputWithContext added in v5.5.0

func (i SecretsMountCassandraArray) ToSecretsMountCassandraArrayOutputWithContext(ctx context.Context) SecretsMountCassandraArrayOutput

type SecretsMountCassandraArrayInput added in v5.5.0

type SecretsMountCassandraArrayInput interface {
	pulumi.Input

	ToSecretsMountCassandraArrayOutput() SecretsMountCassandraArrayOutput
	ToSecretsMountCassandraArrayOutputWithContext(context.Context) SecretsMountCassandraArrayOutput
}

SecretsMountCassandraArrayInput is an input type that accepts SecretsMountCassandraArray and SecretsMountCassandraArrayOutput values. You can construct a concrete instance of `SecretsMountCassandraArrayInput` via:

SecretsMountCassandraArray{ SecretsMountCassandraArgs{...} }

type SecretsMountCassandraArrayOutput added in v5.5.0

type SecretsMountCassandraArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountCassandraArrayOutput) ElementType added in v5.5.0

func (SecretsMountCassandraArrayOutput) Index added in v5.5.0

func (SecretsMountCassandraArrayOutput) ToSecretsMountCassandraArrayOutput added in v5.5.0

func (o SecretsMountCassandraArrayOutput) ToSecretsMountCassandraArrayOutput() SecretsMountCassandraArrayOutput

func (SecretsMountCassandraArrayOutput) ToSecretsMountCassandraArrayOutputWithContext added in v5.5.0

func (o SecretsMountCassandraArrayOutput) ToSecretsMountCassandraArrayOutputWithContext(ctx context.Context) SecretsMountCassandraArrayOutput

type SecretsMountCassandraInput added in v5.5.0

type SecretsMountCassandraInput interface {
	pulumi.Input

	ToSecretsMountCassandraOutput() SecretsMountCassandraOutput
	ToSecretsMountCassandraOutputWithContext(context.Context) SecretsMountCassandraOutput
}

SecretsMountCassandraInput is an input type that accepts SecretsMountCassandraArgs and SecretsMountCassandraOutput values. You can construct a concrete instance of `SecretsMountCassandraInput` via:

SecretsMountCassandraArgs{...}

type SecretsMountCassandraOutput added in v5.5.0

type SecretsMountCassandraOutput struct{ *pulumi.OutputState }

func (SecretsMountCassandraOutput) AllowedRoles added in v5.5.0

A list of roles that are allowed to use this connection.

func (SecretsMountCassandraOutput) ConnectTimeout added in v5.5.0

func (o SecretsMountCassandraOutput) ConnectTimeout() pulumi.IntPtrOutput

The number of seconds to use as a connection timeout.

func (SecretsMountCassandraOutput) Data added in v5.5.0

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountCassandraOutput) ElementType added in v5.5.0

func (SecretsMountCassandraOutput) Hosts added in v5.5.0

The hosts to connect to.

func (SecretsMountCassandraOutput) InsecureTls added in v5.5.0

Whether to skip verification of the server certificate when using TLS.

func (SecretsMountCassandraOutput) Name added in v5.5.0

Name of the database connection.

func (SecretsMountCassandraOutput) Password added in v5.5.0

The root credential password used in the connection URL.

func (SecretsMountCassandraOutput) PemBundle added in v5.5.0

Concatenated PEM blocks configuring the certificate chain.

func (SecretsMountCassandraOutput) PemJson added in v5.5.0

A JSON structure configuring the certificate chain.

func (SecretsMountCassandraOutput) PluginName added in v5.5.0

Specifies the name of the plugin to use.

func (SecretsMountCassandraOutput) Port added in v5.5.0

The default port to connect to if no port is specified as part of the host.

func (SecretsMountCassandraOutput) ProtocolVersion added in v5.5.0

func (o SecretsMountCassandraOutput) ProtocolVersion() pulumi.IntPtrOutput

The CQL protocol version to use.

func (SecretsMountCassandraOutput) RootRotationStatements added in v5.5.0

func (o SecretsMountCassandraOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountCassandraOutput) Tls added in v5.5.0

Whether to use TLS when connecting to Cassandra.

func (SecretsMountCassandraOutput) ToSecretsMountCassandraOutput added in v5.5.0

func (o SecretsMountCassandraOutput) ToSecretsMountCassandraOutput() SecretsMountCassandraOutput

func (SecretsMountCassandraOutput) ToSecretsMountCassandraOutputWithContext added in v5.5.0

func (o SecretsMountCassandraOutput) ToSecretsMountCassandraOutputWithContext(ctx context.Context) SecretsMountCassandraOutput

func (SecretsMountCassandraOutput) Username added in v5.5.0

The root credential username used in the connection URL.

func (SecretsMountCassandraOutput) VerifyConnection added in v5.5.0

func (o SecretsMountCassandraOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountCouchbase added in v5.5.0

type SecretsMountCouchbase struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
	Base64Pem *string `pulumi:"base64Pem"`
	// Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
	BucketName *string `pulumi:"bucketName"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// The hosts to connect to.
	Hosts []string `pulumi:"hosts"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls *bool `pulumi:"insecureTls"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// Whether to use TLS when connecting to Cassandra.
	Tls *bool `pulumi:"tls"`
	// The root credential username used in the connection URL.
	Username string `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountCouchbaseArgs added in v5.5.0

type SecretsMountCouchbaseArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
	Base64Pem pulumi.StringPtrInput `pulumi:"base64Pem"`
	// Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
	BucketName pulumi.StringPtrInput `pulumi:"bucketName"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// The hosts to connect to.
	Hosts pulumi.StringArrayInput `pulumi:"hosts"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls pulumi.BoolPtrInput `pulumi:"insecureTls"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// Whether to use TLS when connecting to Cassandra.
	Tls pulumi.BoolPtrInput `pulumi:"tls"`
	// The root credential username used in the connection URL.
	Username pulumi.StringInput `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountCouchbaseArgs) ElementType added in v5.5.0

func (SecretsMountCouchbaseArgs) ElementType() reflect.Type

func (SecretsMountCouchbaseArgs) ToSecretsMountCouchbaseOutput added in v5.5.0

func (i SecretsMountCouchbaseArgs) ToSecretsMountCouchbaseOutput() SecretsMountCouchbaseOutput

func (SecretsMountCouchbaseArgs) ToSecretsMountCouchbaseOutputWithContext added in v5.5.0

func (i SecretsMountCouchbaseArgs) ToSecretsMountCouchbaseOutputWithContext(ctx context.Context) SecretsMountCouchbaseOutput

type SecretsMountCouchbaseArray added in v5.5.0

type SecretsMountCouchbaseArray []SecretsMountCouchbaseInput

func (SecretsMountCouchbaseArray) ElementType added in v5.5.0

func (SecretsMountCouchbaseArray) ElementType() reflect.Type

func (SecretsMountCouchbaseArray) ToSecretsMountCouchbaseArrayOutput added in v5.5.0

func (i SecretsMountCouchbaseArray) ToSecretsMountCouchbaseArrayOutput() SecretsMountCouchbaseArrayOutput

func (SecretsMountCouchbaseArray) ToSecretsMountCouchbaseArrayOutputWithContext added in v5.5.0

func (i SecretsMountCouchbaseArray) ToSecretsMountCouchbaseArrayOutputWithContext(ctx context.Context) SecretsMountCouchbaseArrayOutput

type SecretsMountCouchbaseArrayInput added in v5.5.0

type SecretsMountCouchbaseArrayInput interface {
	pulumi.Input

	ToSecretsMountCouchbaseArrayOutput() SecretsMountCouchbaseArrayOutput
	ToSecretsMountCouchbaseArrayOutputWithContext(context.Context) SecretsMountCouchbaseArrayOutput
}

SecretsMountCouchbaseArrayInput is an input type that accepts SecretsMountCouchbaseArray and SecretsMountCouchbaseArrayOutput values. You can construct a concrete instance of `SecretsMountCouchbaseArrayInput` via:

SecretsMountCouchbaseArray{ SecretsMountCouchbaseArgs{...} }

type SecretsMountCouchbaseArrayOutput added in v5.5.0

type SecretsMountCouchbaseArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountCouchbaseArrayOutput) ElementType added in v5.5.0

func (SecretsMountCouchbaseArrayOutput) Index added in v5.5.0

func (SecretsMountCouchbaseArrayOutput) ToSecretsMountCouchbaseArrayOutput added in v5.5.0

func (o SecretsMountCouchbaseArrayOutput) ToSecretsMountCouchbaseArrayOutput() SecretsMountCouchbaseArrayOutput

func (SecretsMountCouchbaseArrayOutput) ToSecretsMountCouchbaseArrayOutputWithContext added in v5.5.0

func (o SecretsMountCouchbaseArrayOutput) ToSecretsMountCouchbaseArrayOutputWithContext(ctx context.Context) SecretsMountCouchbaseArrayOutput

type SecretsMountCouchbaseInput added in v5.5.0

type SecretsMountCouchbaseInput interface {
	pulumi.Input

	ToSecretsMountCouchbaseOutput() SecretsMountCouchbaseOutput
	ToSecretsMountCouchbaseOutputWithContext(context.Context) SecretsMountCouchbaseOutput
}

SecretsMountCouchbaseInput is an input type that accepts SecretsMountCouchbaseArgs and SecretsMountCouchbaseOutput values. You can construct a concrete instance of `SecretsMountCouchbaseInput` via:

SecretsMountCouchbaseArgs{...}

type SecretsMountCouchbaseOutput added in v5.5.0

type SecretsMountCouchbaseOutput struct{ *pulumi.OutputState }

func (SecretsMountCouchbaseOutput) AllowedRoles added in v5.5.0

A list of roles that are allowed to use this connection.

func (SecretsMountCouchbaseOutput) Base64Pem added in v5.5.0

Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.

func (SecretsMountCouchbaseOutput) BucketName added in v5.5.0

Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.

func (SecretsMountCouchbaseOutput) Data added in v5.5.0

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountCouchbaseOutput) ElementType added in v5.5.0

func (SecretsMountCouchbaseOutput) Hosts added in v5.5.0

The hosts to connect to.

func (SecretsMountCouchbaseOutput) InsecureTls added in v5.5.0

Whether to skip verification of the server certificate when using TLS.

func (SecretsMountCouchbaseOutput) Name added in v5.5.0

Name of the database connection.

func (SecretsMountCouchbaseOutput) Password added in v5.5.0

The root credential password used in the connection URL.

func (SecretsMountCouchbaseOutput) PluginName added in v5.5.0

Specifies the name of the plugin to use.

func (SecretsMountCouchbaseOutput) RootRotationStatements added in v5.5.0

func (o SecretsMountCouchbaseOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountCouchbaseOutput) Tls added in v5.5.0

Whether to use TLS when connecting to Cassandra.

func (SecretsMountCouchbaseOutput) ToSecretsMountCouchbaseOutput added in v5.5.0

func (o SecretsMountCouchbaseOutput) ToSecretsMountCouchbaseOutput() SecretsMountCouchbaseOutput

func (SecretsMountCouchbaseOutput) ToSecretsMountCouchbaseOutputWithContext added in v5.5.0

func (o SecretsMountCouchbaseOutput) ToSecretsMountCouchbaseOutputWithContext(ctx context.Context) SecretsMountCouchbaseOutput

func (SecretsMountCouchbaseOutput) Username added in v5.5.0

The root credential username used in the connection URL.

func (SecretsMountCouchbaseOutput) UsernameTemplate added in v5.5.0

func (o SecretsMountCouchbaseOutput) UsernameTemplate() pulumi.StringPtrOutput

[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.

func (SecretsMountCouchbaseOutput) VerifyConnection added in v5.5.0

func (o SecretsMountCouchbaseOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountElasticsearch added in v5.5.0

type SecretsMountElasticsearch struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
	CaCert *string `pulumi:"caCert"`
	// The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
	CaPath *string `pulumi:"caPath"`
	// The path to the certificate for the Elasticsearch client to present for communication.
	ClientCert *string `pulumi:"clientCert"`
	// The path to the key for the Elasticsearch client to use for communication.
	ClientKey *string `pulumi:"clientKey"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// Whether to disable certificate verification.
	Insecure *bool `pulumi:"insecure"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// This, if set, is used to set the SNI host when connecting via TLS.
	TlsServerName *string `pulumi:"tlsServerName"`
	// The URL for Elasticsearch's API. https requires certificate
	// by trusted CA if used.
	Url string `pulumi:"url"`
	// The root credential username used in the connection URL.
	Username string `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountElasticsearchArgs added in v5.5.0

type SecretsMountElasticsearchArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
	CaCert pulumi.StringPtrInput `pulumi:"caCert"`
	// The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
	CaPath pulumi.StringPtrInput `pulumi:"caPath"`
	// The path to the certificate for the Elasticsearch client to present for communication.
	ClientCert pulumi.StringPtrInput `pulumi:"clientCert"`
	// The path to the key for the Elasticsearch client to use for communication.
	ClientKey pulumi.StringPtrInput `pulumi:"clientKey"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// Whether to disable certificate verification.
	Insecure pulumi.BoolPtrInput `pulumi:"insecure"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// This, if set, is used to set the SNI host when connecting via TLS.
	TlsServerName pulumi.StringPtrInput `pulumi:"tlsServerName"`
	// The URL for Elasticsearch's API. https requires certificate
	// by trusted CA if used.
	Url pulumi.StringInput `pulumi:"url"`
	// The root credential username used in the connection URL.
	Username pulumi.StringInput `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountElasticsearchArgs) ElementType added in v5.5.0

func (SecretsMountElasticsearchArgs) ToSecretsMountElasticsearchOutput added in v5.5.0

func (i SecretsMountElasticsearchArgs) ToSecretsMountElasticsearchOutput() SecretsMountElasticsearchOutput

func (SecretsMountElasticsearchArgs) ToSecretsMountElasticsearchOutputWithContext added in v5.5.0

func (i SecretsMountElasticsearchArgs) ToSecretsMountElasticsearchOutputWithContext(ctx context.Context) SecretsMountElasticsearchOutput

type SecretsMountElasticsearchArray added in v5.5.0

type SecretsMountElasticsearchArray []SecretsMountElasticsearchInput

func (SecretsMountElasticsearchArray) ElementType added in v5.5.0

func (SecretsMountElasticsearchArray) ToSecretsMountElasticsearchArrayOutput added in v5.5.0

func (i SecretsMountElasticsearchArray) ToSecretsMountElasticsearchArrayOutput() SecretsMountElasticsearchArrayOutput

func (SecretsMountElasticsearchArray) ToSecretsMountElasticsearchArrayOutputWithContext added in v5.5.0

func (i SecretsMountElasticsearchArray) ToSecretsMountElasticsearchArrayOutputWithContext(ctx context.Context) SecretsMountElasticsearchArrayOutput

type SecretsMountElasticsearchArrayInput added in v5.5.0

type SecretsMountElasticsearchArrayInput interface {
	pulumi.Input

	ToSecretsMountElasticsearchArrayOutput() SecretsMountElasticsearchArrayOutput
	ToSecretsMountElasticsearchArrayOutputWithContext(context.Context) SecretsMountElasticsearchArrayOutput
}

SecretsMountElasticsearchArrayInput is an input type that accepts SecretsMountElasticsearchArray and SecretsMountElasticsearchArrayOutput values. You can construct a concrete instance of `SecretsMountElasticsearchArrayInput` via:

SecretsMountElasticsearchArray{ SecretsMountElasticsearchArgs{...} }

type SecretsMountElasticsearchArrayOutput added in v5.5.0

type SecretsMountElasticsearchArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountElasticsearchArrayOutput) ElementType added in v5.5.0

func (SecretsMountElasticsearchArrayOutput) Index added in v5.5.0

func (SecretsMountElasticsearchArrayOutput) ToSecretsMountElasticsearchArrayOutput added in v5.5.0

func (o SecretsMountElasticsearchArrayOutput) ToSecretsMountElasticsearchArrayOutput() SecretsMountElasticsearchArrayOutput

func (SecretsMountElasticsearchArrayOutput) ToSecretsMountElasticsearchArrayOutputWithContext added in v5.5.0

func (o SecretsMountElasticsearchArrayOutput) ToSecretsMountElasticsearchArrayOutputWithContext(ctx context.Context) SecretsMountElasticsearchArrayOutput

type SecretsMountElasticsearchInput added in v5.5.0

type SecretsMountElasticsearchInput interface {
	pulumi.Input

	ToSecretsMountElasticsearchOutput() SecretsMountElasticsearchOutput
	ToSecretsMountElasticsearchOutputWithContext(context.Context) SecretsMountElasticsearchOutput
}

SecretsMountElasticsearchInput is an input type that accepts SecretsMountElasticsearchArgs and SecretsMountElasticsearchOutput values. You can construct a concrete instance of `SecretsMountElasticsearchInput` via:

SecretsMountElasticsearchArgs{...}

type SecretsMountElasticsearchOutput added in v5.5.0

type SecretsMountElasticsearchOutput struct{ *pulumi.OutputState }

func (SecretsMountElasticsearchOutput) AllowedRoles added in v5.5.0

A list of roles that are allowed to use this connection.

func (SecretsMountElasticsearchOutput) CaCert added in v5.5.0

The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.

func (SecretsMountElasticsearchOutput) CaPath added in v5.5.0

The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.

func (SecretsMountElasticsearchOutput) ClientCert added in v5.5.0

The path to the certificate for the Elasticsearch client to present for communication.

func (SecretsMountElasticsearchOutput) ClientKey added in v5.5.0

The path to the key for the Elasticsearch client to use for communication.

func (SecretsMountElasticsearchOutput) Data added in v5.5.0

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountElasticsearchOutput) ElementType added in v5.5.0

func (SecretsMountElasticsearchOutput) Insecure added in v5.5.0

Whether to disable certificate verification.

func (SecretsMountElasticsearchOutput) Name added in v5.5.0

Name of the database connection.

func (SecretsMountElasticsearchOutput) Password added in v5.5.0

The root credential password used in the connection URL.

func (SecretsMountElasticsearchOutput) PluginName added in v5.5.0

Specifies the name of the plugin to use.

func (SecretsMountElasticsearchOutput) RootRotationStatements added in v5.5.0

func (o SecretsMountElasticsearchOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountElasticsearchOutput) TlsServerName added in v5.5.0

This, if set, is used to set the SNI host when connecting via TLS.

func (SecretsMountElasticsearchOutput) ToSecretsMountElasticsearchOutput added in v5.5.0

func (o SecretsMountElasticsearchOutput) ToSecretsMountElasticsearchOutput() SecretsMountElasticsearchOutput

func (SecretsMountElasticsearchOutput) ToSecretsMountElasticsearchOutputWithContext added in v5.5.0

func (o SecretsMountElasticsearchOutput) ToSecretsMountElasticsearchOutputWithContext(ctx context.Context) SecretsMountElasticsearchOutput

func (SecretsMountElasticsearchOutput) Url added in v5.5.0

The URL for Elasticsearch's API. https requires certificate by trusted CA if used.

func (SecretsMountElasticsearchOutput) Username added in v5.5.0

The root credential username used in the connection URL.

func (SecretsMountElasticsearchOutput) UsernameTemplate added in v5.5.0

[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.

func (SecretsMountElasticsearchOutput) VerifyConnection added in v5.5.0

Whether the connection should be verified on initial configuration or not.

type SecretsMountHana added in v5.5.0

type SecretsMountHana struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// Disable special character escaping in username and password.
	DisableEscaping *bool `pulumi:"disableEscaping"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password *string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// The root credential username used in the connection URL.
	Username *string `pulumi:"username"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountHanaArgs added in v5.5.0

type SecretsMountHanaArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// Disable special character escaping in username and password.
	DisableEscaping pulumi.BoolPtrInput `pulumi:"disableEscaping"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// The root credential username used in the connection URL.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountHanaArgs) ElementType added in v5.5.0

func (SecretsMountHanaArgs) ElementType() reflect.Type

func (SecretsMountHanaArgs) ToSecretsMountHanaOutput added in v5.5.0

func (i SecretsMountHanaArgs) ToSecretsMountHanaOutput() SecretsMountHanaOutput

func (SecretsMountHanaArgs) ToSecretsMountHanaOutputWithContext added in v5.5.0

func (i SecretsMountHanaArgs) ToSecretsMountHanaOutputWithContext(ctx context.Context) SecretsMountHanaOutput

type SecretsMountHanaArray added in v5.5.0

type SecretsMountHanaArray []SecretsMountHanaInput

func (SecretsMountHanaArray) ElementType added in v5.5.0

func (SecretsMountHanaArray) ElementType() reflect.Type

func (SecretsMountHanaArray) ToSecretsMountHanaArrayOutput added in v5.5.0

func (i SecretsMountHanaArray) ToSecretsMountHanaArrayOutput() SecretsMountHanaArrayOutput

func (SecretsMountHanaArray) ToSecretsMountHanaArrayOutputWithContext added in v5.5.0

func (i SecretsMountHanaArray) ToSecretsMountHanaArrayOutputWithContext(ctx context.Context) SecretsMountHanaArrayOutput

type SecretsMountHanaArrayInput added in v5.5.0

type SecretsMountHanaArrayInput interface {
	pulumi.Input

	ToSecretsMountHanaArrayOutput() SecretsMountHanaArrayOutput
	ToSecretsMountHanaArrayOutputWithContext(context.Context) SecretsMountHanaArrayOutput
}

SecretsMountHanaArrayInput is an input type that accepts SecretsMountHanaArray and SecretsMountHanaArrayOutput values. You can construct a concrete instance of `SecretsMountHanaArrayInput` via:

SecretsMountHanaArray{ SecretsMountHanaArgs{...} }

type SecretsMountHanaArrayOutput added in v5.5.0

type SecretsMountHanaArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountHanaArrayOutput) ElementType added in v5.5.0

func (SecretsMountHanaArrayOutput) Index added in v5.5.0

func (SecretsMountHanaArrayOutput) ToSecretsMountHanaArrayOutput added in v5.5.0

func (o SecretsMountHanaArrayOutput) ToSecretsMountHanaArrayOutput() SecretsMountHanaArrayOutput

func (SecretsMountHanaArrayOutput) ToSecretsMountHanaArrayOutputWithContext added in v5.5.0

func (o SecretsMountHanaArrayOutput) ToSecretsMountHanaArrayOutputWithContext(ctx context.Context) SecretsMountHanaArrayOutput

type SecretsMountHanaInput added in v5.5.0

type SecretsMountHanaInput interface {
	pulumi.Input

	ToSecretsMountHanaOutput() SecretsMountHanaOutput
	ToSecretsMountHanaOutputWithContext(context.Context) SecretsMountHanaOutput
}

SecretsMountHanaInput is an input type that accepts SecretsMountHanaArgs and SecretsMountHanaOutput values. You can construct a concrete instance of `SecretsMountHanaInput` via:

SecretsMountHanaArgs{...}

type SecretsMountHanaOutput added in v5.5.0

type SecretsMountHanaOutput struct{ *pulumi.OutputState }

func (SecretsMountHanaOutput) AllowedRoles added in v5.5.0

A list of roles that are allowed to use this connection.

func (SecretsMountHanaOutput) ConnectionUrl added in v5.5.0

func (o SecretsMountHanaOutput) ConnectionUrl() pulumi.StringPtrOutput

Specifies the Redshift DSN. See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)

func (SecretsMountHanaOutput) Data added in v5.5.0

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountHanaOutput) DisableEscaping added in v5.7.0

func (o SecretsMountHanaOutput) DisableEscaping() pulumi.BoolPtrOutput

Disable special character escaping in username and password.

func (SecretsMountHanaOutput) ElementType added in v5.5.0

func (SecretsMountHanaOutput) ElementType() reflect.Type

func (SecretsMountHanaOutput) MaxConnectionLifetime added in v5.5.0

func (o SecretsMountHanaOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum amount of time a connection may be reused.

func (SecretsMountHanaOutput) MaxIdleConnections added in v5.5.0

func (o SecretsMountHanaOutput) MaxIdleConnections() pulumi.IntPtrOutput

The maximum number of idle connections to the database.

func (SecretsMountHanaOutput) MaxOpenConnections added in v5.5.0

func (o SecretsMountHanaOutput) MaxOpenConnections() pulumi.IntPtrOutput

The maximum number of open connections to the database.

func (SecretsMountHanaOutput) Name added in v5.5.0

Name of the database connection.

func (SecretsMountHanaOutput) Password added in v5.5.0

The root credential password used in the connection URL.

func (SecretsMountHanaOutput) PluginName added in v5.5.0

Specifies the name of the plugin to use.

func (SecretsMountHanaOutput) RootRotationStatements added in v5.5.0

func (o SecretsMountHanaOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountHanaOutput) ToSecretsMountHanaOutput added in v5.5.0

func (o SecretsMountHanaOutput) ToSecretsMountHanaOutput() SecretsMountHanaOutput

func (SecretsMountHanaOutput) ToSecretsMountHanaOutputWithContext added in v5.5.0

func (o SecretsMountHanaOutput) ToSecretsMountHanaOutputWithContext(ctx context.Context) SecretsMountHanaOutput

func (SecretsMountHanaOutput) Username added in v5.5.0

The root credential username used in the connection URL.

func (SecretsMountHanaOutput) VerifyConnection added in v5.5.0

func (o SecretsMountHanaOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountInfluxdb added in v5.5.0

type SecretsMountInfluxdb struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// The number of seconds to use as a connection
	// timeout.
	ConnectTimeout *int `pulumi:"connectTimeout"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// The host to connect to.
	Host string `pulumi:"host"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls *bool `pulumi:"insecureTls"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password string `pulumi:"password"`
	// Concatenated PEM blocks configuring the certificate
	// chain.
	PemBundle *string `pulumi:"pemBundle"`
	// A JSON structure configuring the certificate chain.
	PemJson *string `pulumi:"pemJson"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// The default port to connect to if no port is specified as
	// part of the host.
	Port *int `pulumi:"port"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// Whether to use TLS when connecting to Cassandra.
	Tls *bool `pulumi:"tls"`
	// The root credential username used in the connection URL.
	Username string `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountInfluxdbArgs added in v5.5.0

type SecretsMountInfluxdbArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// The number of seconds to use as a connection
	// timeout.
	ConnectTimeout pulumi.IntPtrInput `pulumi:"connectTimeout"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// The host to connect to.
	Host pulumi.StringInput `pulumi:"host"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls pulumi.BoolPtrInput `pulumi:"insecureTls"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringInput `pulumi:"password"`
	// Concatenated PEM blocks configuring the certificate
	// chain.
	PemBundle pulumi.StringPtrInput `pulumi:"pemBundle"`
	// A JSON structure configuring the certificate chain.
	PemJson pulumi.StringPtrInput `pulumi:"pemJson"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// The default port to connect to if no port is specified as
	// part of the host.
	Port pulumi.IntPtrInput `pulumi:"port"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// Whether to use TLS when connecting to Cassandra.
	Tls pulumi.BoolPtrInput `pulumi:"tls"`
	// The root credential username used in the connection URL.
	Username pulumi.StringInput `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountInfluxdbArgs) ElementType added in v5.5.0

func (SecretsMountInfluxdbArgs) ElementType() reflect.Type

func (SecretsMountInfluxdbArgs) ToSecretsMountInfluxdbOutput added in v5.5.0

func (i SecretsMountInfluxdbArgs) ToSecretsMountInfluxdbOutput() SecretsMountInfluxdbOutput

func (SecretsMountInfluxdbArgs) ToSecretsMountInfluxdbOutputWithContext added in v5.5.0

func (i SecretsMountInfluxdbArgs) ToSecretsMountInfluxdbOutputWithContext(ctx context.Context) SecretsMountInfluxdbOutput

type SecretsMountInfluxdbArray added in v5.5.0

type SecretsMountInfluxdbArray []SecretsMountInfluxdbInput

func (SecretsMountInfluxdbArray) ElementType added in v5.5.0

func (SecretsMountInfluxdbArray) ElementType() reflect.Type

func (SecretsMountInfluxdbArray) ToSecretsMountInfluxdbArrayOutput added in v5.5.0

func (i SecretsMountInfluxdbArray) ToSecretsMountInfluxdbArrayOutput() SecretsMountInfluxdbArrayOutput

func (SecretsMountInfluxdbArray) ToSecretsMountInfluxdbArrayOutputWithContext added in v5.5.0

func (i SecretsMountInfluxdbArray) ToSecretsMountInfluxdbArrayOutputWithContext(ctx context.Context) SecretsMountInfluxdbArrayOutput

type SecretsMountInfluxdbArrayInput added in v5.5.0

type SecretsMountInfluxdbArrayInput interface {
	pulumi.Input

	ToSecretsMountInfluxdbArrayOutput() SecretsMountInfluxdbArrayOutput
	ToSecretsMountInfluxdbArrayOutputWithContext(context.Context) SecretsMountInfluxdbArrayOutput
}

SecretsMountInfluxdbArrayInput is an input type that accepts SecretsMountInfluxdbArray and SecretsMountInfluxdbArrayOutput values. You can construct a concrete instance of `SecretsMountInfluxdbArrayInput` via:

SecretsMountInfluxdbArray{ SecretsMountInfluxdbArgs{...} }

type SecretsMountInfluxdbArrayOutput added in v5.5.0

type SecretsMountInfluxdbArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountInfluxdbArrayOutput) ElementType added in v5.5.0

func (SecretsMountInfluxdbArrayOutput) Index added in v5.5.0

func (SecretsMountInfluxdbArrayOutput) ToSecretsMountInfluxdbArrayOutput added in v5.5.0

func (o SecretsMountInfluxdbArrayOutput) ToSecretsMountInfluxdbArrayOutput() SecretsMountInfluxdbArrayOutput

func (SecretsMountInfluxdbArrayOutput) ToSecretsMountInfluxdbArrayOutputWithContext added in v5.5.0

func (o SecretsMountInfluxdbArrayOutput) ToSecretsMountInfluxdbArrayOutputWithContext(ctx context.Context) SecretsMountInfluxdbArrayOutput

type SecretsMountInfluxdbInput added in v5.5.0

type SecretsMountInfluxdbInput interface {
	pulumi.Input

	ToSecretsMountInfluxdbOutput() SecretsMountInfluxdbOutput
	ToSecretsMountInfluxdbOutputWithContext(context.Context) SecretsMountInfluxdbOutput
}

SecretsMountInfluxdbInput is an input type that accepts SecretsMountInfluxdbArgs and SecretsMountInfluxdbOutput values. You can construct a concrete instance of `SecretsMountInfluxdbInput` via:

SecretsMountInfluxdbArgs{...}

type SecretsMountInfluxdbOutput added in v5.5.0

type SecretsMountInfluxdbOutput struct{ *pulumi.OutputState }

func (SecretsMountInfluxdbOutput) AllowedRoles added in v5.5.0

A list of roles that are allowed to use this connection.

func (SecretsMountInfluxdbOutput) ConnectTimeout added in v5.5.0

func (o SecretsMountInfluxdbOutput) ConnectTimeout() pulumi.IntPtrOutput

The number of seconds to use as a connection timeout.

func (SecretsMountInfluxdbOutput) Data added in v5.5.0

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountInfluxdbOutput) ElementType added in v5.5.0

func (SecretsMountInfluxdbOutput) ElementType() reflect.Type

func (SecretsMountInfluxdbOutput) Host added in v5.5.0

The host to connect to.

func (SecretsMountInfluxdbOutput) InsecureTls added in v5.5.0

Whether to skip verification of the server certificate when using TLS.

func (SecretsMountInfluxdbOutput) Name added in v5.5.0

Name of the database connection.

func (SecretsMountInfluxdbOutput) Password added in v5.5.0

The root credential password used in the connection URL.

func (SecretsMountInfluxdbOutput) PemBundle added in v5.5.0

Concatenated PEM blocks configuring the certificate chain.

func (SecretsMountInfluxdbOutput) PemJson added in v5.5.0

A JSON structure configuring the certificate chain.

func (SecretsMountInfluxdbOutput) PluginName added in v5.5.0

Specifies the name of the plugin to use.

func (SecretsMountInfluxdbOutput) Port added in v5.5.0

The default port to connect to if no port is specified as part of the host.

func (SecretsMountInfluxdbOutput) RootRotationStatements added in v5.5.0

func (o SecretsMountInfluxdbOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountInfluxdbOutput) Tls added in v5.5.0

Whether to use TLS when connecting to Cassandra.

func (SecretsMountInfluxdbOutput) ToSecretsMountInfluxdbOutput added in v5.5.0

func (o SecretsMountInfluxdbOutput) ToSecretsMountInfluxdbOutput() SecretsMountInfluxdbOutput

func (SecretsMountInfluxdbOutput) ToSecretsMountInfluxdbOutputWithContext added in v5.5.0

func (o SecretsMountInfluxdbOutput) ToSecretsMountInfluxdbOutputWithContext(ctx context.Context) SecretsMountInfluxdbOutput

func (SecretsMountInfluxdbOutput) Username added in v5.5.0

The root credential username used in the connection URL.

func (SecretsMountInfluxdbOutput) UsernameTemplate added in v5.5.0

func (o SecretsMountInfluxdbOutput) UsernameTemplate() pulumi.StringPtrOutput

[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.

func (SecretsMountInfluxdbOutput) VerifyConnection added in v5.5.0

func (o SecretsMountInfluxdbOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountInput added in v5.5.0

type SecretsMountInput interface {
	pulumi.Input

	ToSecretsMountOutput() SecretsMountOutput
	ToSecretsMountOutputWithContext(ctx context.Context) SecretsMountOutput
}

type SecretsMountMap added in v5.5.0

type SecretsMountMap map[string]SecretsMountInput

func (SecretsMountMap) ElementType added in v5.5.0

func (SecretsMountMap) ElementType() reflect.Type

func (SecretsMountMap) ToSecretsMountMapOutput added in v5.5.0

func (i SecretsMountMap) ToSecretsMountMapOutput() SecretsMountMapOutput

func (SecretsMountMap) ToSecretsMountMapOutputWithContext added in v5.5.0

func (i SecretsMountMap) ToSecretsMountMapOutputWithContext(ctx context.Context) SecretsMountMapOutput

type SecretsMountMapInput added in v5.5.0

type SecretsMountMapInput interface {
	pulumi.Input

	ToSecretsMountMapOutput() SecretsMountMapOutput
	ToSecretsMountMapOutputWithContext(context.Context) SecretsMountMapOutput
}

SecretsMountMapInput is an input type that accepts SecretsMountMap and SecretsMountMapOutput values. You can construct a concrete instance of `SecretsMountMapInput` via:

SecretsMountMap{ "key": SecretsMountArgs{...} }

type SecretsMountMapOutput added in v5.5.0

type SecretsMountMapOutput struct{ *pulumi.OutputState }

func (SecretsMountMapOutput) ElementType added in v5.5.0

func (SecretsMountMapOutput) ElementType() reflect.Type

func (SecretsMountMapOutput) MapIndex added in v5.5.0

func (SecretsMountMapOutput) ToSecretsMountMapOutput added in v5.5.0

func (o SecretsMountMapOutput) ToSecretsMountMapOutput() SecretsMountMapOutput

func (SecretsMountMapOutput) ToSecretsMountMapOutputWithContext added in v5.5.0

func (o SecretsMountMapOutput) ToSecretsMountMapOutputWithContext(ctx context.Context) SecretsMountMapOutput

type SecretsMountMongodb added in v5.5.0

type SecretsMountMongodb struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password *string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// The root credential username used in the connection URL.
	Username *string `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountMongodbArgs added in v5.5.0

type SecretsMountMongodbArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// The root credential username used in the connection URL.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountMongodbArgs) ElementType added in v5.5.0

func (SecretsMountMongodbArgs) ElementType() reflect.Type

func (SecretsMountMongodbArgs) ToSecretsMountMongodbOutput added in v5.5.0

func (i SecretsMountMongodbArgs) ToSecretsMountMongodbOutput() SecretsMountMongodbOutput

func (SecretsMountMongodbArgs) ToSecretsMountMongodbOutputWithContext added in v5.5.0

func (i SecretsMountMongodbArgs) ToSecretsMountMongodbOutputWithContext(ctx context.Context) SecretsMountMongodbOutput

type SecretsMountMongodbArray added in v5.5.0

type SecretsMountMongodbArray []SecretsMountMongodbInput

func (SecretsMountMongodbArray) ElementType added in v5.5.0

func (SecretsMountMongodbArray) ElementType() reflect.Type

func (SecretsMountMongodbArray) ToSecretsMountMongodbArrayOutput added in v5.5.0

func (i SecretsMountMongodbArray) ToSecretsMountMongodbArrayOutput() SecretsMountMongodbArrayOutput

func (SecretsMountMongodbArray) ToSecretsMountMongodbArrayOutputWithContext added in v5.5.0

func (i SecretsMountMongodbArray) ToSecretsMountMongodbArrayOutputWithContext(ctx context.Context) SecretsMountMongodbArrayOutput

type SecretsMountMongodbArrayInput added in v5.5.0

type SecretsMountMongodbArrayInput interface {
	pulumi.Input

	ToSecretsMountMongodbArrayOutput() SecretsMountMongodbArrayOutput
	ToSecretsMountMongodbArrayOutputWithContext(context.Context) SecretsMountMongodbArrayOutput
}

SecretsMountMongodbArrayInput is an input type that accepts SecretsMountMongodbArray and SecretsMountMongodbArrayOutput values. You can construct a concrete instance of `SecretsMountMongodbArrayInput` via:

SecretsMountMongodbArray{ SecretsMountMongodbArgs{...} }

type SecretsMountMongodbArrayOutput added in v5.5.0

type SecretsMountMongodbArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountMongodbArrayOutput) ElementType added in v5.5.0

func (SecretsMountMongodbArrayOutput) Index added in v5.5.0

func (SecretsMountMongodbArrayOutput) ToSecretsMountMongodbArrayOutput added in v5.5.0

func (o SecretsMountMongodbArrayOutput) ToSecretsMountMongodbArrayOutput() SecretsMountMongodbArrayOutput

func (SecretsMountMongodbArrayOutput) ToSecretsMountMongodbArrayOutputWithContext added in v5.5.0

func (o SecretsMountMongodbArrayOutput) ToSecretsMountMongodbArrayOutputWithContext(ctx context.Context) SecretsMountMongodbArrayOutput

type SecretsMountMongodbInput added in v5.5.0

type SecretsMountMongodbInput interface {
	pulumi.Input

	ToSecretsMountMongodbOutput() SecretsMountMongodbOutput
	ToSecretsMountMongodbOutputWithContext(context.Context) SecretsMountMongodbOutput
}

SecretsMountMongodbInput is an input type that accepts SecretsMountMongodbArgs and SecretsMountMongodbOutput values. You can construct a concrete instance of `SecretsMountMongodbInput` via:

SecretsMountMongodbArgs{...}

type SecretsMountMongodbOutput added in v5.5.0

type SecretsMountMongodbOutput struct{ *pulumi.OutputState }

func (SecretsMountMongodbOutput) AllowedRoles added in v5.5.0

A list of roles that are allowed to use this connection.

func (SecretsMountMongodbOutput) ConnectionUrl added in v5.5.0

Specifies the Redshift DSN. See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)

func (SecretsMountMongodbOutput) Data added in v5.5.0

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountMongodbOutput) ElementType added in v5.5.0

func (SecretsMountMongodbOutput) ElementType() reflect.Type

func (SecretsMountMongodbOutput) MaxConnectionLifetime added in v5.5.0

func (o SecretsMountMongodbOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum amount of time a connection may be reused.

func (SecretsMountMongodbOutput) MaxIdleConnections added in v5.5.0

func (o SecretsMountMongodbOutput) MaxIdleConnections() pulumi.IntPtrOutput

The maximum number of idle connections to the database.

func (SecretsMountMongodbOutput) MaxOpenConnections added in v5.5.0

func (o SecretsMountMongodbOutput) MaxOpenConnections() pulumi.IntPtrOutput

The maximum number of open connections to the database.

func (SecretsMountMongodbOutput) Name added in v5.5.0

Name of the database connection.

func (SecretsMountMongodbOutput) Password added in v5.5.0

The root credential password used in the connection URL.

func (SecretsMountMongodbOutput) PluginName added in v5.5.0

Specifies the name of the plugin to use.

func (SecretsMountMongodbOutput) RootRotationStatements added in v5.5.0

func (o SecretsMountMongodbOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountMongodbOutput) ToSecretsMountMongodbOutput added in v5.5.0

func (o SecretsMountMongodbOutput) ToSecretsMountMongodbOutput() SecretsMountMongodbOutput

func (SecretsMountMongodbOutput) ToSecretsMountMongodbOutputWithContext added in v5.5.0

func (o SecretsMountMongodbOutput) ToSecretsMountMongodbOutputWithContext(ctx context.Context) SecretsMountMongodbOutput

func (SecretsMountMongodbOutput) Username added in v5.5.0

The root credential username used in the connection URL.

func (SecretsMountMongodbOutput) UsernameTemplate added in v5.5.0

func (o SecretsMountMongodbOutput) UsernameTemplate() pulumi.StringPtrOutput

[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.

func (SecretsMountMongodbOutput) VerifyConnection added in v5.5.0

func (o SecretsMountMongodbOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountMongodbatla added in v5.5.0

type SecretsMountMongodbatla struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// The Private Programmatic API Key used to connect with MongoDB Atlas API.
	PrivateKey string `pulumi:"privateKey"`
	// The Project ID the Database User should be created within.
	ProjectId string `pulumi:"projectId"`
	// The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
	PublicKey string `pulumi:"publicKey"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountMongodbatlaArgs added in v5.5.0

type SecretsMountMongodbatlaArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// The Private Programmatic API Key used to connect with MongoDB Atlas API.
	PrivateKey pulumi.StringInput `pulumi:"privateKey"`
	// The Project ID the Database User should be created within.
	ProjectId pulumi.StringInput `pulumi:"projectId"`
	// The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
	PublicKey pulumi.StringInput `pulumi:"publicKey"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountMongodbatlaArgs) ElementType added in v5.5.0

func (SecretsMountMongodbatlaArgs) ToSecretsMountMongodbatlaOutput added in v5.5.0

func (i SecretsMountMongodbatlaArgs) ToSecretsMountMongodbatlaOutput() SecretsMountMongodbatlaOutput

func (SecretsMountMongodbatlaArgs) ToSecretsMountMongodbatlaOutputWithContext added in v5.5.0

func (i SecretsMountMongodbatlaArgs) ToSecretsMountMongodbatlaOutputWithContext(ctx context.Context) SecretsMountMongodbatlaOutput

type SecretsMountMongodbatlaArray added in v5.5.0

type SecretsMountMongodbatlaArray []SecretsMountMongodbatlaInput

func (SecretsMountMongodbatlaArray) ElementType added in v5.5.0

func (SecretsMountMongodbatlaArray) ToSecretsMountMongodbatlaArrayOutput added in v5.5.0

func (i SecretsMountMongodbatlaArray) ToSecretsMountMongodbatlaArrayOutput() SecretsMountMongodbatlaArrayOutput

func (SecretsMountMongodbatlaArray) ToSecretsMountMongodbatlaArrayOutputWithContext added in v5.5.0

func (i SecretsMountMongodbatlaArray) ToSecretsMountMongodbatlaArrayOutputWithContext(ctx context.Context) SecretsMountMongodbatlaArrayOutput

type SecretsMountMongodbatlaArrayInput added in v5.5.0

type SecretsMountMongodbatlaArrayInput interface {
	pulumi.Input

	ToSecretsMountMongodbatlaArrayOutput() SecretsMountMongodbatlaArrayOutput
	ToSecretsMountMongodbatlaArrayOutputWithContext(context.Context) SecretsMountMongodbatlaArrayOutput
}

SecretsMountMongodbatlaArrayInput is an input type that accepts SecretsMountMongodbatlaArray and SecretsMountMongodbatlaArrayOutput values. You can construct a concrete instance of `SecretsMountMongodbatlaArrayInput` via:

SecretsMountMongodbatlaArray{ SecretsMountMongodbatlaArgs{...} }

type SecretsMountMongodbatlaArrayOutput added in v5.5.0

type SecretsMountMongodbatlaArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountMongodbatlaArrayOutput) ElementType added in v5.5.0

func (SecretsMountMongodbatlaArrayOutput) Index added in v5.5.0

func (SecretsMountMongodbatlaArrayOutput) ToSecretsMountMongodbatlaArrayOutput added in v5.5.0

func (o SecretsMountMongodbatlaArrayOutput) ToSecretsMountMongodbatlaArrayOutput() SecretsMountMongodbatlaArrayOutput

func (SecretsMountMongodbatlaArrayOutput) ToSecretsMountMongodbatlaArrayOutputWithContext added in v5.5.0

func (o SecretsMountMongodbatlaArrayOutput) ToSecretsMountMongodbatlaArrayOutputWithContext(ctx context.Context) SecretsMountMongodbatlaArrayOutput

type SecretsMountMongodbatlaInput added in v5.5.0

type SecretsMountMongodbatlaInput interface {
	pulumi.Input

	ToSecretsMountMongodbatlaOutput() SecretsMountMongodbatlaOutput
	ToSecretsMountMongodbatlaOutputWithContext(context.Context) SecretsMountMongodbatlaOutput
}

SecretsMountMongodbatlaInput is an input type that accepts SecretsMountMongodbatlaArgs and SecretsMountMongodbatlaOutput values. You can construct a concrete instance of `SecretsMountMongodbatlaInput` via:

SecretsMountMongodbatlaArgs{...}

type SecretsMountMongodbatlaOutput added in v5.5.0

type SecretsMountMongodbatlaOutput struct{ *pulumi.OutputState }

func (SecretsMountMongodbatlaOutput) AllowedRoles added in v5.5.0

A list of roles that are allowed to use this connection.

func (SecretsMountMongodbatlaOutput) Data added in v5.5.0

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountMongodbatlaOutput) ElementType added in v5.5.0

func (SecretsMountMongodbatlaOutput) Name added in v5.5.0

Name of the database connection.

func (SecretsMountMongodbatlaOutput) PluginName added in v5.5.0

Specifies the name of the plugin to use.

func (SecretsMountMongodbatlaOutput) PrivateKey added in v5.5.0

The Private Programmatic API Key used to connect with MongoDB Atlas API.

func (SecretsMountMongodbatlaOutput) ProjectId added in v5.5.0

The Project ID the Database User should be created within.

func (SecretsMountMongodbatlaOutput) PublicKey added in v5.5.0

The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.

func (SecretsMountMongodbatlaOutput) RootRotationStatements added in v5.5.0

func (o SecretsMountMongodbatlaOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountMongodbatlaOutput) ToSecretsMountMongodbatlaOutput added in v5.5.0

func (o SecretsMountMongodbatlaOutput) ToSecretsMountMongodbatlaOutput() SecretsMountMongodbatlaOutput

func (SecretsMountMongodbatlaOutput) ToSecretsMountMongodbatlaOutputWithContext added in v5.5.0

func (o SecretsMountMongodbatlaOutput) ToSecretsMountMongodbatlaOutputWithContext(ctx context.Context) SecretsMountMongodbatlaOutput

func (SecretsMountMongodbatlaOutput) VerifyConnection added in v5.5.0

func (o SecretsMountMongodbatlaOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountMssql added in v5.5.0

type SecretsMountMssql struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// For Vault v1.9+. Set to true when the target is a
	// Contained Database, e.g. AzureSQL.
	// See [Vault docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
	ContainedDb *bool `pulumi:"containedDb"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// Disable special character escaping in username and password.
	DisableEscaping *bool `pulumi:"disableEscaping"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password *string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// The root credential username used in the connection URL.
	Username *string `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountMssqlArgs added in v5.5.0

type SecretsMountMssqlArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// For Vault v1.9+. Set to true when the target is a
	// Contained Database, e.g. AzureSQL.
	// See [Vault docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
	ContainedDb pulumi.BoolPtrInput `pulumi:"containedDb"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// Disable special character escaping in username and password.
	DisableEscaping pulumi.BoolPtrInput `pulumi:"disableEscaping"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// The root credential username used in the connection URL.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountMssqlArgs) ElementType added in v5.5.0

func (SecretsMountMssqlArgs) ElementType() reflect.Type

func (SecretsMountMssqlArgs) ToSecretsMountMssqlOutput added in v5.5.0

func (i SecretsMountMssqlArgs) ToSecretsMountMssqlOutput() SecretsMountMssqlOutput

func (SecretsMountMssqlArgs) ToSecretsMountMssqlOutputWithContext added in v5.5.0

func (i SecretsMountMssqlArgs) ToSecretsMountMssqlOutputWithContext(ctx context.Context) SecretsMountMssqlOutput

type SecretsMountMssqlArray added in v5.5.0

type SecretsMountMssqlArray []SecretsMountMssqlInput

func (SecretsMountMssqlArray) ElementType added in v5.5.0

func (SecretsMountMssqlArray) ElementType() reflect.Type

func (SecretsMountMssqlArray) ToSecretsMountMssqlArrayOutput added in v5.5.0

func (i SecretsMountMssqlArray) ToSecretsMountMssqlArrayOutput() SecretsMountMssqlArrayOutput

func (SecretsMountMssqlArray) ToSecretsMountMssqlArrayOutputWithContext added in v5.5.0

func (i SecretsMountMssqlArray) ToSecretsMountMssqlArrayOutputWithContext(ctx context.Context) SecretsMountMssqlArrayOutput

type SecretsMountMssqlArrayInput added in v5.5.0

type SecretsMountMssqlArrayInput interface {
	pulumi.Input

	ToSecretsMountMssqlArrayOutput() SecretsMountMssqlArrayOutput
	ToSecretsMountMssqlArrayOutputWithContext(context.Context) SecretsMountMssqlArrayOutput
}

SecretsMountMssqlArrayInput is an input type that accepts SecretsMountMssqlArray and SecretsMountMssqlArrayOutput values. You can construct a concrete instance of `SecretsMountMssqlArrayInput` via:

SecretsMountMssqlArray{ SecretsMountMssqlArgs{...} }

type SecretsMountMssqlArrayOutput added in v5.5.0

type SecretsMountMssqlArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountMssqlArrayOutput) ElementType added in v5.5.0

func (SecretsMountMssqlArrayOutput) Index added in v5.5.0

func (SecretsMountMssqlArrayOutput) ToSecretsMountMssqlArrayOutput added in v5.5.0

func (o SecretsMountMssqlArrayOutput) ToSecretsMountMssqlArrayOutput() SecretsMountMssqlArrayOutput

func (SecretsMountMssqlArrayOutput) ToSecretsMountMssqlArrayOutputWithContext added in v5.5.0

func (o SecretsMountMssqlArrayOutput) ToSecretsMountMssqlArrayOutputWithContext(ctx context.Context) SecretsMountMssqlArrayOutput

type SecretsMountMssqlInput added in v5.5.0

type SecretsMountMssqlInput interface {
	pulumi.Input

	ToSecretsMountMssqlOutput() SecretsMountMssqlOutput
	ToSecretsMountMssqlOutputWithContext(context.Context) SecretsMountMssqlOutput
}

SecretsMountMssqlInput is an input type that accepts SecretsMountMssqlArgs and SecretsMountMssqlOutput values. You can construct a concrete instance of `SecretsMountMssqlInput` via:

SecretsMountMssqlArgs{...}

type SecretsMountMssqlOutput added in v5.5.0

type SecretsMountMssqlOutput struct{ *pulumi.OutputState }

func (SecretsMountMssqlOutput) AllowedRoles added in v5.5.0

A list of roles that are allowed to use this connection.

func (SecretsMountMssqlOutput) ConnectionUrl added in v5.5.0

Specifies the Redshift DSN. See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)

func (SecretsMountMssqlOutput) ContainedDb added in v5.5.0

For Vault v1.9+. Set to true when the target is a Contained Database, e.g. AzureSQL. See [Vault docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)

func (SecretsMountMssqlOutput) Data added in v5.5.0

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountMssqlOutput) DisableEscaping added in v5.5.0

func (o SecretsMountMssqlOutput) DisableEscaping() pulumi.BoolPtrOutput

Disable special character escaping in username and password.

func (SecretsMountMssqlOutput) ElementType added in v5.5.0

func (SecretsMountMssqlOutput) ElementType() reflect.Type

func (SecretsMountMssqlOutput) MaxConnectionLifetime added in v5.5.0

func (o SecretsMountMssqlOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum amount of time a connection may be reused.

func (SecretsMountMssqlOutput) MaxIdleConnections added in v5.5.0

func (o SecretsMountMssqlOutput) MaxIdleConnections() pulumi.IntPtrOutput

The maximum number of idle connections to the database.

func (SecretsMountMssqlOutput) MaxOpenConnections added in v5.5.0

func (o SecretsMountMssqlOutput) MaxOpenConnections() pulumi.IntPtrOutput

The maximum number of open connections to the database.

func (SecretsMountMssqlOutput) Name added in v5.5.0

Name of the database connection.

func (SecretsMountMssqlOutput) Password added in v5.5.0

The root credential password used in the connection URL.

func (SecretsMountMssqlOutput) PluginName added in v5.5.0

Specifies the name of the plugin to use.

func (SecretsMountMssqlOutput) RootRotationStatements added in v5.5.0

func (o SecretsMountMssqlOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountMssqlOutput) ToSecretsMountMssqlOutput added in v5.5.0

func (o SecretsMountMssqlOutput) ToSecretsMountMssqlOutput() SecretsMountMssqlOutput

func (SecretsMountMssqlOutput) ToSecretsMountMssqlOutputWithContext added in v5.5.0

func (o SecretsMountMssqlOutput) ToSecretsMountMssqlOutputWithContext(ctx context.Context) SecretsMountMssqlOutput

func (SecretsMountMssqlOutput) Username added in v5.5.0

The root credential username used in the connection URL.

func (SecretsMountMssqlOutput) UsernameTemplate added in v5.5.0

func (o SecretsMountMssqlOutput) UsernameTemplate() pulumi.StringPtrOutput

[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.

func (SecretsMountMssqlOutput) VerifyConnection added in v5.5.0

func (o SecretsMountMssqlOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountMysql added in v5.5.0

type SecretsMountMysql struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
	AuthType *string `pulumi:"authType"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password *string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// A JSON encoded credential for use with IAM authorization
	ServiceAccountJson *string `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa *string `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey *string `pulumi:"tlsCertificateKey"`
	// The root credential username used in the connection URL.
	Username *string `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountMysqlArgs added in v5.5.0

type SecretsMountMysqlArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
	AuthType pulumi.StringPtrInput `pulumi:"authType"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// A JSON encoded credential for use with IAM authorization
	ServiceAccountJson pulumi.StringPtrInput `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa pulumi.StringPtrInput `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey pulumi.StringPtrInput `pulumi:"tlsCertificateKey"`
	// The root credential username used in the connection URL.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountMysqlArgs) ElementType added in v5.5.0

func (SecretsMountMysqlArgs) ElementType() reflect.Type

func (SecretsMountMysqlArgs) ToSecretsMountMysqlOutput added in v5.5.0

func (i SecretsMountMysqlArgs) ToSecretsMountMysqlOutput() SecretsMountMysqlOutput

func (SecretsMountMysqlArgs) ToSecretsMountMysqlOutputWithContext added in v5.5.0

func (i SecretsMountMysqlArgs) ToSecretsMountMysqlOutputWithContext(ctx context.Context) SecretsMountMysqlOutput

type SecretsMountMysqlArray added in v5.5.0

type SecretsMountMysqlArray []SecretsMountMysqlInput

func (SecretsMountMysqlArray) ElementType added in v5.5.0

func (SecretsMountMysqlArray) ElementType() reflect.Type

func (SecretsMountMysqlArray) ToSecretsMountMysqlArrayOutput added in v5.5.0

func (i SecretsMountMysqlArray) ToSecretsMountMysqlArrayOutput() SecretsMountMysqlArrayOutput

func (SecretsMountMysqlArray) ToSecretsMountMysqlArrayOutputWithContext added in v5.5.0

func (i SecretsMountMysqlArray) ToSecretsMountMysqlArrayOutputWithContext(ctx context.Context) SecretsMountMysqlArrayOutput

type SecretsMountMysqlArrayInput added in v5.5.0

type SecretsMountMysqlArrayInput interface {
	pulumi.Input

	ToSecretsMountMysqlArrayOutput() SecretsMountMysqlArrayOutput
	ToSecretsMountMysqlArrayOutputWithContext(context.Context) SecretsMountMysqlArrayOutput
}

SecretsMountMysqlArrayInput is an input type that accepts SecretsMountMysqlArray and SecretsMountMysqlArrayOutput values. You can construct a concrete instance of `SecretsMountMysqlArrayInput` via:

SecretsMountMysqlArray{ SecretsMountMysqlArgs{...} }

type SecretsMountMysqlArrayOutput added in v5.5.0

type SecretsMountMysqlArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountMysqlArrayOutput) ElementType added in v5.5.0

func (SecretsMountMysqlArrayOutput) Index added in v5.5.0

func (SecretsMountMysqlArrayOutput) ToSecretsMountMysqlArrayOutput added in v5.5.0

func (o SecretsMountMysqlArrayOutput) ToSecretsMountMysqlArrayOutput() SecretsMountMysqlArrayOutput

func (SecretsMountMysqlArrayOutput) ToSecretsMountMysqlArrayOutputWithContext added in v5.5.0

func (o SecretsMountMysqlArrayOutput) ToSecretsMountMysqlArrayOutputWithContext(ctx context.Context) SecretsMountMysqlArrayOutput

type SecretsMountMysqlAurora added in v5.5.0

type SecretsMountMysqlAurora struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
	AuthType *string `pulumi:"authType"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password *string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// A JSON encoded credential for use with IAM authorization
	ServiceAccountJson *string `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa *string `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey *string `pulumi:"tlsCertificateKey"`
	// The root credential username used in the connection URL.
	Username *string `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountMysqlAuroraArgs added in v5.5.0

type SecretsMountMysqlAuroraArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
	AuthType pulumi.StringPtrInput `pulumi:"authType"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// A JSON encoded credential for use with IAM authorization
	ServiceAccountJson pulumi.StringPtrInput `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa pulumi.StringPtrInput `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey pulumi.StringPtrInput `pulumi:"tlsCertificateKey"`
	// The root credential username used in the connection URL.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountMysqlAuroraArgs) ElementType added in v5.5.0

func (SecretsMountMysqlAuroraArgs) ToSecretsMountMysqlAuroraOutput added in v5.5.0

func (i SecretsMountMysqlAuroraArgs) ToSecretsMountMysqlAuroraOutput() SecretsMountMysqlAuroraOutput

func (SecretsMountMysqlAuroraArgs) ToSecretsMountMysqlAuroraOutputWithContext added in v5.5.0

func (i SecretsMountMysqlAuroraArgs) ToSecretsMountMysqlAuroraOutputWithContext(ctx context.Context) SecretsMountMysqlAuroraOutput

type SecretsMountMysqlAuroraArray added in v5.5.0

type SecretsMountMysqlAuroraArray []SecretsMountMysqlAuroraInput

func (SecretsMountMysqlAuroraArray) ElementType added in v5.5.0

func (SecretsMountMysqlAuroraArray) ToSecretsMountMysqlAuroraArrayOutput added in v5.5.0

func (i SecretsMountMysqlAuroraArray) ToSecretsMountMysqlAuroraArrayOutput() SecretsMountMysqlAuroraArrayOutput

func (SecretsMountMysqlAuroraArray) ToSecretsMountMysqlAuroraArrayOutputWithContext added in v5.5.0

func (i SecretsMountMysqlAuroraArray) ToSecretsMountMysqlAuroraArrayOutputWithContext(ctx context.Context) SecretsMountMysqlAuroraArrayOutput

type SecretsMountMysqlAuroraArrayInput added in v5.5.0

type SecretsMountMysqlAuroraArrayInput interface {
	pulumi.Input

	ToSecretsMountMysqlAuroraArrayOutput() SecretsMountMysqlAuroraArrayOutput
	ToSecretsMountMysqlAuroraArrayOutputWithContext(context.Context) SecretsMountMysqlAuroraArrayOutput
}

SecretsMountMysqlAuroraArrayInput is an input type that accepts SecretsMountMysqlAuroraArray and SecretsMountMysqlAuroraArrayOutput values. You can construct a concrete instance of `SecretsMountMysqlAuroraArrayInput` via:

SecretsMountMysqlAuroraArray{ SecretsMountMysqlAuroraArgs{...} }

type SecretsMountMysqlAuroraArrayOutput added in v5.5.0

type SecretsMountMysqlAuroraArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountMysqlAuroraArrayOutput) ElementType added in v5.5.0

func (SecretsMountMysqlAuroraArrayOutput) Index added in v5.5.0

func (SecretsMountMysqlAuroraArrayOutput) ToSecretsMountMysqlAuroraArrayOutput added in v5.5.0

func (o SecretsMountMysqlAuroraArrayOutput) ToSecretsMountMysqlAuroraArrayOutput() SecretsMountMysqlAuroraArrayOutput

func (SecretsMountMysqlAuroraArrayOutput) ToSecretsMountMysqlAuroraArrayOutputWithContext added in v5.5.0

func (o SecretsMountMysqlAuroraArrayOutput) ToSecretsMountMysqlAuroraArrayOutputWithContext(ctx context.Context) SecretsMountMysqlAuroraArrayOutput

type SecretsMountMysqlAuroraInput added in v5.5.0

type SecretsMountMysqlAuroraInput interface {
	pulumi.Input

	ToSecretsMountMysqlAuroraOutput() SecretsMountMysqlAuroraOutput
	ToSecretsMountMysqlAuroraOutputWithContext(context.Context) SecretsMountMysqlAuroraOutput
}

SecretsMountMysqlAuroraInput is an input type that accepts SecretsMountMysqlAuroraArgs and SecretsMountMysqlAuroraOutput values. You can construct a concrete instance of `SecretsMountMysqlAuroraInput` via:

SecretsMountMysqlAuroraArgs{...}

type SecretsMountMysqlAuroraOutput added in v5.5.0

type SecretsMountMysqlAuroraOutput struct{ *pulumi.OutputState }

func (SecretsMountMysqlAuroraOutput) AllowedRoles added in v5.5.0

A list of roles that are allowed to use this connection.

func (SecretsMountMysqlAuroraOutput) AuthType added in v5.19.0

Specify alternative authorization type. (Only 'gcp_iam' is valid currently)

func (SecretsMountMysqlAuroraOutput) ConnectionUrl added in v5.5.0

Specifies the Redshift DSN. See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)

func (SecretsMountMysqlAuroraOutput) Data added in v5.5.0

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountMysqlAuroraOutput) ElementType added in v5.5.0

func (SecretsMountMysqlAuroraOutput) MaxConnectionLifetime added in v5.5.0

func (o SecretsMountMysqlAuroraOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum amount of time a connection may be reused.

func (SecretsMountMysqlAuroraOutput) MaxIdleConnections added in v5.5.0

func (o SecretsMountMysqlAuroraOutput) MaxIdleConnections() pulumi.IntPtrOutput

The maximum number of idle connections to the database.

func (SecretsMountMysqlAuroraOutput) MaxOpenConnections added in v5.5.0

func (o SecretsMountMysqlAuroraOutput) MaxOpenConnections() pulumi.IntPtrOutput

The maximum number of open connections to the database.

func (SecretsMountMysqlAuroraOutput) Name added in v5.5.0

Name of the database connection.

func (SecretsMountMysqlAuroraOutput) Password added in v5.5.0

The root credential password used in the connection URL.

func (SecretsMountMysqlAuroraOutput) PluginName added in v5.5.0

Specifies the name of the plugin to use.

func (SecretsMountMysqlAuroraOutput) RootRotationStatements added in v5.5.0

func (o SecretsMountMysqlAuroraOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountMysqlAuroraOutput) ServiceAccountJson added in v5.19.0

func (o SecretsMountMysqlAuroraOutput) ServiceAccountJson() pulumi.StringPtrOutput

A JSON encoded credential for use with IAM authorization

func (SecretsMountMysqlAuroraOutput) TlsCa added in v5.19.0

x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.

func (SecretsMountMysqlAuroraOutput) TlsCertificateKey added in v5.19.0

x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.

func (SecretsMountMysqlAuroraOutput) ToSecretsMountMysqlAuroraOutput added in v5.5.0

func (o SecretsMountMysqlAuroraOutput) ToSecretsMountMysqlAuroraOutput() SecretsMountMysqlAuroraOutput

func (SecretsMountMysqlAuroraOutput) ToSecretsMountMysqlAuroraOutputWithContext added in v5.5.0

func (o SecretsMountMysqlAuroraOutput) ToSecretsMountMysqlAuroraOutputWithContext(ctx context.Context) SecretsMountMysqlAuroraOutput

func (SecretsMountMysqlAuroraOutput) Username added in v5.5.0

The root credential username used in the connection URL.

func (SecretsMountMysqlAuroraOutput) UsernameTemplate added in v5.5.0

[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.

func (SecretsMountMysqlAuroraOutput) VerifyConnection added in v5.5.0

func (o SecretsMountMysqlAuroraOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountMysqlInput added in v5.5.0

type SecretsMountMysqlInput interface {
	pulumi.Input

	ToSecretsMountMysqlOutput() SecretsMountMysqlOutput
	ToSecretsMountMysqlOutputWithContext(context.Context) SecretsMountMysqlOutput
}

SecretsMountMysqlInput is an input type that accepts SecretsMountMysqlArgs and SecretsMountMysqlOutput values. You can construct a concrete instance of `SecretsMountMysqlInput` via:

SecretsMountMysqlArgs{...}

type SecretsMountMysqlLegacy added in v5.5.0

type SecretsMountMysqlLegacy struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
	AuthType *string `pulumi:"authType"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password *string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// A JSON encoded credential for use with IAM authorization
	ServiceAccountJson *string `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa *string `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey *string `pulumi:"tlsCertificateKey"`
	// The root credential username used in the connection URL.
	Username *string `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountMysqlLegacyArgs added in v5.5.0

type SecretsMountMysqlLegacyArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
	AuthType pulumi.StringPtrInput `pulumi:"authType"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// A JSON encoded credential for use with IAM authorization
	ServiceAccountJson pulumi.StringPtrInput `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa pulumi.StringPtrInput `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey pulumi.StringPtrInput `pulumi:"tlsCertificateKey"`
	// The root credential username used in the connection URL.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountMysqlLegacyArgs) ElementType added in v5.5.0

func (SecretsMountMysqlLegacyArgs) ToSecretsMountMysqlLegacyOutput added in v5.5.0

func (i SecretsMountMysqlLegacyArgs) ToSecretsMountMysqlLegacyOutput() SecretsMountMysqlLegacyOutput

func (SecretsMountMysqlLegacyArgs) ToSecretsMountMysqlLegacyOutputWithContext added in v5.5.0

func (i SecretsMountMysqlLegacyArgs) ToSecretsMountMysqlLegacyOutputWithContext(ctx context.Context) SecretsMountMysqlLegacyOutput

type SecretsMountMysqlLegacyArray added in v5.5.0

type SecretsMountMysqlLegacyArray []SecretsMountMysqlLegacyInput

func (SecretsMountMysqlLegacyArray) ElementType added in v5.5.0

func (SecretsMountMysqlLegacyArray) ToSecretsMountMysqlLegacyArrayOutput added in v5.5.0

func (i SecretsMountMysqlLegacyArray) ToSecretsMountMysqlLegacyArrayOutput() SecretsMountMysqlLegacyArrayOutput

func (SecretsMountMysqlLegacyArray) ToSecretsMountMysqlLegacyArrayOutputWithContext added in v5.5.0

func (i SecretsMountMysqlLegacyArray) ToSecretsMountMysqlLegacyArrayOutputWithContext(ctx context.Context) SecretsMountMysqlLegacyArrayOutput

type SecretsMountMysqlLegacyArrayInput added in v5.5.0

type SecretsMountMysqlLegacyArrayInput interface {
	pulumi.Input

	ToSecretsMountMysqlLegacyArrayOutput() SecretsMountMysqlLegacyArrayOutput
	ToSecretsMountMysqlLegacyArrayOutputWithContext(context.Context) SecretsMountMysqlLegacyArrayOutput
}

SecretsMountMysqlLegacyArrayInput is an input type that accepts SecretsMountMysqlLegacyArray and SecretsMountMysqlLegacyArrayOutput values. You can construct a concrete instance of `SecretsMountMysqlLegacyArrayInput` via:

SecretsMountMysqlLegacyArray{ SecretsMountMysqlLegacyArgs{...} }

type SecretsMountMysqlLegacyArrayOutput added in v5.5.0

type SecretsMountMysqlLegacyArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountMysqlLegacyArrayOutput) ElementType added in v5.5.0

func (SecretsMountMysqlLegacyArrayOutput) Index added in v5.5.0

func (SecretsMountMysqlLegacyArrayOutput) ToSecretsMountMysqlLegacyArrayOutput added in v5.5.0

func (o SecretsMountMysqlLegacyArrayOutput) ToSecretsMountMysqlLegacyArrayOutput() SecretsMountMysqlLegacyArrayOutput

func (SecretsMountMysqlLegacyArrayOutput) ToSecretsMountMysqlLegacyArrayOutputWithContext added in v5.5.0

func (o SecretsMountMysqlLegacyArrayOutput) ToSecretsMountMysqlLegacyArrayOutputWithContext(ctx context.Context) SecretsMountMysqlLegacyArrayOutput

type SecretsMountMysqlLegacyInput added in v5.5.0

type SecretsMountMysqlLegacyInput interface {
	pulumi.Input

	ToSecretsMountMysqlLegacyOutput() SecretsMountMysqlLegacyOutput
	ToSecretsMountMysqlLegacyOutputWithContext(context.Context) SecretsMountMysqlLegacyOutput
}

SecretsMountMysqlLegacyInput is an input type that accepts SecretsMountMysqlLegacyArgs and SecretsMountMysqlLegacyOutput values. You can construct a concrete instance of `SecretsMountMysqlLegacyInput` via:

SecretsMountMysqlLegacyArgs{...}

type SecretsMountMysqlLegacyOutput added in v5.5.0

type SecretsMountMysqlLegacyOutput struct{ *pulumi.OutputState }

func (SecretsMountMysqlLegacyOutput) AllowedRoles added in v5.5.0

A list of roles that are allowed to use this connection.

func (SecretsMountMysqlLegacyOutput) AuthType added in v5.19.0

Specify alternative authorization type. (Only 'gcp_iam' is valid currently)

func (SecretsMountMysqlLegacyOutput) ConnectionUrl added in v5.5.0

Specifies the Redshift DSN. See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)

func (SecretsMountMysqlLegacyOutput) Data added in v5.5.0

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountMysqlLegacyOutput) ElementType added in v5.5.0

func (SecretsMountMysqlLegacyOutput) MaxConnectionLifetime added in v5.5.0

func (o SecretsMountMysqlLegacyOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum amount of time a connection may be reused.

func (SecretsMountMysqlLegacyOutput) MaxIdleConnections added in v5.5.0

func (o SecretsMountMysqlLegacyOutput) MaxIdleConnections() pulumi.IntPtrOutput

The maximum number of idle connections to the database.

func (SecretsMountMysqlLegacyOutput) MaxOpenConnections added in v5.5.0

func (o SecretsMountMysqlLegacyOutput) MaxOpenConnections() pulumi.IntPtrOutput

The maximum number of open connections to the database.

func (SecretsMountMysqlLegacyOutput) Name added in v5.5.0

Name of the database connection.

func (SecretsMountMysqlLegacyOutput) Password added in v5.5.0

The root credential password used in the connection URL.

func (SecretsMountMysqlLegacyOutput) PluginName added in v5.5.0

Specifies the name of the plugin to use.

func (SecretsMountMysqlLegacyOutput) RootRotationStatements added in v5.5.0

func (o SecretsMountMysqlLegacyOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountMysqlLegacyOutput) ServiceAccountJson added in v5.19.0

func (o SecretsMountMysqlLegacyOutput) ServiceAccountJson() pulumi.StringPtrOutput

A JSON encoded credential for use with IAM authorization

func (SecretsMountMysqlLegacyOutput) TlsCa added in v5.19.0

x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.

func (SecretsMountMysqlLegacyOutput) TlsCertificateKey added in v5.19.0

x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.

func (SecretsMountMysqlLegacyOutput) ToSecretsMountMysqlLegacyOutput added in v5.5.0

func (o SecretsMountMysqlLegacyOutput) ToSecretsMountMysqlLegacyOutput() SecretsMountMysqlLegacyOutput

func (SecretsMountMysqlLegacyOutput) ToSecretsMountMysqlLegacyOutputWithContext added in v5.5.0

func (o SecretsMountMysqlLegacyOutput) ToSecretsMountMysqlLegacyOutputWithContext(ctx context.Context) SecretsMountMysqlLegacyOutput

func (SecretsMountMysqlLegacyOutput) Username added in v5.5.0

The root credential username used in the connection URL.

func (SecretsMountMysqlLegacyOutput) UsernameTemplate added in v5.5.0

[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.

func (SecretsMountMysqlLegacyOutput) VerifyConnection added in v5.5.0

func (o SecretsMountMysqlLegacyOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountMysqlOutput added in v5.5.0

type SecretsMountMysqlOutput struct{ *pulumi.OutputState }

func (SecretsMountMysqlOutput) AllowedRoles added in v5.5.0

A list of roles that are allowed to use this connection.

func (SecretsMountMysqlOutput) AuthType added in v5.16.0

Specify alternative authorization type. (Only 'gcp_iam' is valid currently)

func (SecretsMountMysqlOutput) ConnectionUrl added in v5.5.0

Specifies the Redshift DSN. See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)

func (SecretsMountMysqlOutput) Data added in v5.5.0

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountMysqlOutput) ElementType added in v5.5.0

func (SecretsMountMysqlOutput) ElementType() reflect.Type

func (SecretsMountMysqlOutput) MaxConnectionLifetime added in v5.5.0

func (o SecretsMountMysqlOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum amount of time a connection may be reused.

func (SecretsMountMysqlOutput) MaxIdleConnections added in v5.5.0

func (o SecretsMountMysqlOutput) MaxIdleConnections() pulumi.IntPtrOutput

The maximum number of idle connections to the database.

func (SecretsMountMysqlOutput) MaxOpenConnections added in v5.5.0

func (o SecretsMountMysqlOutput) MaxOpenConnections() pulumi.IntPtrOutput

The maximum number of open connections to the database.

func (SecretsMountMysqlOutput) Name added in v5.5.0

Name of the database connection.

func (SecretsMountMysqlOutput) Password added in v5.5.0

The root credential password used in the connection URL.

func (SecretsMountMysqlOutput) PluginName added in v5.5.0

Specifies the name of the plugin to use.

func (SecretsMountMysqlOutput) RootRotationStatements added in v5.5.0

func (o SecretsMountMysqlOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountMysqlOutput) ServiceAccountJson added in v5.16.0

func (o SecretsMountMysqlOutput) ServiceAccountJson() pulumi.StringPtrOutput

A JSON encoded credential for use with IAM authorization

func (SecretsMountMysqlOutput) TlsCa added in v5.5.0

x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.

func (SecretsMountMysqlOutput) TlsCertificateKey added in v5.5.0

func (o SecretsMountMysqlOutput) TlsCertificateKey() pulumi.StringPtrOutput

x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.

func (SecretsMountMysqlOutput) ToSecretsMountMysqlOutput added in v5.5.0

func (o SecretsMountMysqlOutput) ToSecretsMountMysqlOutput() SecretsMountMysqlOutput

func (SecretsMountMysqlOutput) ToSecretsMountMysqlOutputWithContext added in v5.5.0

func (o SecretsMountMysqlOutput) ToSecretsMountMysqlOutputWithContext(ctx context.Context) SecretsMountMysqlOutput

func (SecretsMountMysqlOutput) Username added in v5.5.0

The root credential username used in the connection URL.

func (SecretsMountMysqlOutput) UsernameTemplate added in v5.5.0

func (o SecretsMountMysqlOutput) UsernameTemplate() pulumi.StringPtrOutput

[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.

func (SecretsMountMysqlOutput) VerifyConnection added in v5.5.0

func (o SecretsMountMysqlOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountMysqlRd added in v5.5.0

type SecretsMountMysqlRd struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
	AuthType *string `pulumi:"authType"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password *string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// A JSON encoded credential for use with IAM authorization
	ServiceAccountJson *string `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa *string `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey *string `pulumi:"tlsCertificateKey"`
	// The root credential username used in the connection URL.
	Username *string `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountMysqlRdArgs added in v5.5.0

type SecretsMountMysqlRdArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
	AuthType pulumi.StringPtrInput `pulumi:"authType"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// A JSON encoded credential for use with IAM authorization
	ServiceAccountJson pulumi.StringPtrInput `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa pulumi.StringPtrInput `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey pulumi.StringPtrInput `pulumi:"tlsCertificateKey"`
	// The root credential username used in the connection URL.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountMysqlRdArgs) ElementType added in v5.5.0

func (SecretsMountMysqlRdArgs) ElementType() reflect.Type

func (SecretsMountMysqlRdArgs) ToSecretsMountMysqlRdOutput added in v5.5.0

func (i SecretsMountMysqlRdArgs) ToSecretsMountMysqlRdOutput() SecretsMountMysqlRdOutput

func (SecretsMountMysqlRdArgs) ToSecretsMountMysqlRdOutputWithContext added in v5.5.0

func (i SecretsMountMysqlRdArgs) ToSecretsMountMysqlRdOutputWithContext(ctx context.Context) SecretsMountMysqlRdOutput

type SecretsMountMysqlRdArray added in v5.5.0

type SecretsMountMysqlRdArray []SecretsMountMysqlRdInput

func (SecretsMountMysqlRdArray) ElementType added in v5.5.0

func (SecretsMountMysqlRdArray) ElementType() reflect.Type

func (SecretsMountMysqlRdArray) ToSecretsMountMysqlRdArrayOutput added in v5.5.0

func (i SecretsMountMysqlRdArray) ToSecretsMountMysqlRdArrayOutput() SecretsMountMysqlRdArrayOutput

func (SecretsMountMysqlRdArray) ToSecretsMountMysqlRdArrayOutputWithContext added in v5.5.0

func (i SecretsMountMysqlRdArray) ToSecretsMountMysqlRdArrayOutputWithContext(ctx context.Context) SecretsMountMysqlRdArrayOutput

type SecretsMountMysqlRdArrayInput added in v5.5.0

type SecretsMountMysqlRdArrayInput interface {
	pulumi.Input

	ToSecretsMountMysqlRdArrayOutput() SecretsMountMysqlRdArrayOutput
	ToSecretsMountMysqlRdArrayOutputWithContext(context.Context) SecretsMountMysqlRdArrayOutput
}

SecretsMountMysqlRdArrayInput is an input type that accepts SecretsMountMysqlRdArray and SecretsMountMysqlRdArrayOutput values. You can construct a concrete instance of `SecretsMountMysqlRdArrayInput` via:

SecretsMountMysqlRdArray{ SecretsMountMysqlRdArgs{...} }

type SecretsMountMysqlRdArrayOutput added in v5.5.0

type SecretsMountMysqlRdArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountMysqlRdArrayOutput) ElementType added in v5.5.0

func (SecretsMountMysqlRdArrayOutput) Index added in v5.5.0

func (SecretsMountMysqlRdArrayOutput) ToSecretsMountMysqlRdArrayOutput added in v5.5.0

func (o SecretsMountMysqlRdArrayOutput) ToSecretsMountMysqlRdArrayOutput() SecretsMountMysqlRdArrayOutput

func (SecretsMountMysqlRdArrayOutput) ToSecretsMountMysqlRdArrayOutputWithContext added in v5.5.0

func (o SecretsMountMysqlRdArrayOutput) ToSecretsMountMysqlRdArrayOutputWithContext(ctx context.Context) SecretsMountMysqlRdArrayOutput

type SecretsMountMysqlRdInput added in v5.5.0

type SecretsMountMysqlRdInput interface {
	pulumi.Input

	ToSecretsMountMysqlRdOutput() SecretsMountMysqlRdOutput
	ToSecretsMountMysqlRdOutputWithContext(context.Context) SecretsMountMysqlRdOutput
}

SecretsMountMysqlRdInput is an input type that accepts SecretsMountMysqlRdArgs and SecretsMountMysqlRdOutput values. You can construct a concrete instance of `SecretsMountMysqlRdInput` via:

SecretsMountMysqlRdArgs{...}

type SecretsMountMysqlRdOutput added in v5.5.0

type SecretsMountMysqlRdOutput struct{ *pulumi.OutputState }

func (SecretsMountMysqlRdOutput) AllowedRoles added in v5.5.0

A list of roles that are allowed to use this connection.

func (SecretsMountMysqlRdOutput) AuthType added in v5.19.0

Specify alternative authorization type. (Only 'gcp_iam' is valid currently)

func (SecretsMountMysqlRdOutput) ConnectionUrl added in v5.5.0

Specifies the Redshift DSN. See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)

func (SecretsMountMysqlRdOutput) Data added in v5.5.0

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountMysqlRdOutput) ElementType added in v5.5.0

func (SecretsMountMysqlRdOutput) ElementType() reflect.Type

func (SecretsMountMysqlRdOutput) MaxConnectionLifetime added in v5.5.0

func (o SecretsMountMysqlRdOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum amount of time a connection may be reused.

func (SecretsMountMysqlRdOutput) MaxIdleConnections added in v5.5.0

func (o SecretsMountMysqlRdOutput) MaxIdleConnections() pulumi.IntPtrOutput

The maximum number of idle connections to the database.

func (SecretsMountMysqlRdOutput) MaxOpenConnections added in v5.5.0

func (o SecretsMountMysqlRdOutput) MaxOpenConnections() pulumi.IntPtrOutput

The maximum number of open connections to the database.

func (SecretsMountMysqlRdOutput) Name added in v5.5.0

Name of the database connection.

func (SecretsMountMysqlRdOutput) Password added in v5.5.0

The root credential password used in the connection URL.

func (SecretsMountMysqlRdOutput) PluginName added in v5.5.0

Specifies the name of the plugin to use.

func (SecretsMountMysqlRdOutput) RootRotationStatements added in v5.5.0

func (o SecretsMountMysqlRdOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountMysqlRdOutput) ServiceAccountJson added in v5.19.0

func (o SecretsMountMysqlRdOutput) ServiceAccountJson() pulumi.StringPtrOutput

A JSON encoded credential for use with IAM authorization

func (SecretsMountMysqlRdOutput) TlsCa added in v5.19.0

x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.

func (SecretsMountMysqlRdOutput) TlsCertificateKey added in v5.19.0

func (o SecretsMountMysqlRdOutput) TlsCertificateKey() pulumi.StringPtrOutput

x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.

func (SecretsMountMysqlRdOutput) ToSecretsMountMysqlRdOutput added in v5.5.0

func (o SecretsMountMysqlRdOutput) ToSecretsMountMysqlRdOutput() SecretsMountMysqlRdOutput

func (SecretsMountMysqlRdOutput) ToSecretsMountMysqlRdOutputWithContext added in v5.5.0

func (o SecretsMountMysqlRdOutput) ToSecretsMountMysqlRdOutputWithContext(ctx context.Context) SecretsMountMysqlRdOutput

func (SecretsMountMysqlRdOutput) Username added in v5.5.0

The root credential username used in the connection URL.

func (SecretsMountMysqlRdOutput) UsernameTemplate added in v5.5.0

func (o SecretsMountMysqlRdOutput) UsernameTemplate() pulumi.StringPtrOutput

[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.

func (SecretsMountMysqlRdOutput) VerifyConnection added in v5.5.0

func (o SecretsMountMysqlRdOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountOracle added in v5.5.0

type SecretsMountOracle struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// Set to true to disconnect any open sessions prior to running the revocation statements.
	DisconnectSessions *bool `pulumi:"disconnectSessions"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password *string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// Set to true in order to split statements after semi-colons.
	SplitStatements *bool `pulumi:"splitStatements"`
	// The root credential username used in the connection URL.
	Username *string `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountOracleArgs added in v5.5.0

type SecretsMountOracleArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// Set to true to disconnect any open sessions prior to running the revocation statements.
	DisconnectSessions pulumi.BoolPtrInput `pulumi:"disconnectSessions"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// Set to true in order to split statements after semi-colons.
	SplitStatements pulumi.BoolPtrInput `pulumi:"splitStatements"`
	// The root credential username used in the connection URL.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountOracleArgs) ElementType added in v5.5.0

func (SecretsMountOracleArgs) ElementType() reflect.Type

func (SecretsMountOracleArgs) ToSecretsMountOracleOutput added in v5.5.0

func (i SecretsMountOracleArgs) ToSecretsMountOracleOutput() SecretsMountOracleOutput

func (SecretsMountOracleArgs) ToSecretsMountOracleOutputWithContext added in v5.5.0

func (i SecretsMountOracleArgs) ToSecretsMountOracleOutputWithContext(ctx context.Context) SecretsMountOracleOutput

type SecretsMountOracleArray added in v5.5.0

type SecretsMountOracleArray []SecretsMountOracleInput

func (SecretsMountOracleArray) ElementType added in v5.5.0

func (SecretsMountOracleArray) ElementType() reflect.Type

func (SecretsMountOracleArray) ToSecretsMountOracleArrayOutput added in v5.5.0

func (i SecretsMountOracleArray) ToSecretsMountOracleArrayOutput() SecretsMountOracleArrayOutput

func (SecretsMountOracleArray) ToSecretsMountOracleArrayOutputWithContext added in v5.5.0

func (i SecretsMountOracleArray) ToSecretsMountOracleArrayOutputWithContext(ctx context.Context) SecretsMountOracleArrayOutput

type SecretsMountOracleArrayInput added in v5.5.0

type SecretsMountOracleArrayInput interface {
	pulumi.Input

	ToSecretsMountOracleArrayOutput() SecretsMountOracleArrayOutput
	ToSecretsMountOracleArrayOutputWithContext(context.Context) SecretsMountOracleArrayOutput
}

SecretsMountOracleArrayInput is an input type that accepts SecretsMountOracleArray and SecretsMountOracleArrayOutput values. You can construct a concrete instance of `SecretsMountOracleArrayInput` via:

SecretsMountOracleArray{ SecretsMountOracleArgs{...} }

type SecretsMountOracleArrayOutput added in v5.5.0

type SecretsMountOracleArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountOracleArrayOutput) ElementType added in v5.5.0

func (SecretsMountOracleArrayOutput) Index added in v5.5.0

func (SecretsMountOracleArrayOutput) ToSecretsMountOracleArrayOutput added in v5.5.0

func (o SecretsMountOracleArrayOutput) ToSecretsMountOracleArrayOutput() SecretsMountOracleArrayOutput

func (SecretsMountOracleArrayOutput) ToSecretsMountOracleArrayOutputWithContext added in v5.5.0

func (o SecretsMountOracleArrayOutput) ToSecretsMountOracleArrayOutputWithContext(ctx context.Context) SecretsMountOracleArrayOutput

type SecretsMountOracleInput added in v5.5.0

type SecretsMountOracleInput interface {
	pulumi.Input

	ToSecretsMountOracleOutput() SecretsMountOracleOutput
	ToSecretsMountOracleOutputWithContext(context.Context) SecretsMountOracleOutput
}

SecretsMountOracleInput is an input type that accepts SecretsMountOracleArgs and SecretsMountOracleOutput values. You can construct a concrete instance of `SecretsMountOracleInput` via:

SecretsMountOracleArgs{...}

type SecretsMountOracleOutput added in v5.5.0

type SecretsMountOracleOutput struct{ *pulumi.OutputState }

func (SecretsMountOracleOutput) AllowedRoles added in v5.5.0

A list of roles that are allowed to use this connection.

func (SecretsMountOracleOutput) ConnectionUrl added in v5.5.0

Specifies the Redshift DSN. See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)

func (SecretsMountOracleOutput) Data added in v5.5.0

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountOracleOutput) DisconnectSessions added in v5.20.0

func (o SecretsMountOracleOutput) DisconnectSessions() pulumi.BoolPtrOutput

Set to true to disconnect any open sessions prior to running the revocation statements.

func (SecretsMountOracleOutput) ElementType added in v5.5.0

func (SecretsMountOracleOutput) ElementType() reflect.Type

func (SecretsMountOracleOutput) MaxConnectionLifetime added in v5.5.0

func (o SecretsMountOracleOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum amount of time a connection may be reused.

func (SecretsMountOracleOutput) MaxIdleConnections added in v5.5.0

func (o SecretsMountOracleOutput) MaxIdleConnections() pulumi.IntPtrOutput

The maximum number of idle connections to the database.

func (SecretsMountOracleOutput) MaxOpenConnections added in v5.5.0

func (o SecretsMountOracleOutput) MaxOpenConnections() pulumi.IntPtrOutput

The maximum number of open connections to the database.

func (SecretsMountOracleOutput) Name added in v5.5.0

Name of the database connection.

func (SecretsMountOracleOutput) Password added in v5.5.0

The root credential password used in the connection URL.

func (SecretsMountOracleOutput) PluginName added in v5.5.0

Specifies the name of the plugin to use.

func (SecretsMountOracleOutput) RootRotationStatements added in v5.5.0

func (o SecretsMountOracleOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountOracleOutput) SplitStatements added in v5.20.0

func (o SecretsMountOracleOutput) SplitStatements() pulumi.BoolPtrOutput

Set to true in order to split statements after semi-colons.

func (SecretsMountOracleOutput) ToSecretsMountOracleOutput added in v5.5.0

func (o SecretsMountOracleOutput) ToSecretsMountOracleOutput() SecretsMountOracleOutput

func (SecretsMountOracleOutput) ToSecretsMountOracleOutputWithContext added in v5.5.0

func (o SecretsMountOracleOutput) ToSecretsMountOracleOutputWithContext(ctx context.Context) SecretsMountOracleOutput

func (SecretsMountOracleOutput) Username added in v5.5.0

The root credential username used in the connection URL.

func (SecretsMountOracleOutput) UsernameTemplate added in v5.5.0

func (o SecretsMountOracleOutput) UsernameTemplate() pulumi.StringPtrOutput

[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.

func (SecretsMountOracleOutput) VerifyConnection added in v5.5.0

func (o SecretsMountOracleOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountOutput added in v5.5.0

type SecretsMountOutput struct{ *pulumi.OutputState }

func (SecretsMountOutput) Accessor added in v5.6.0

func (o SecretsMountOutput) Accessor() pulumi.StringOutput

Accessor of the mount

func (SecretsMountOutput) AllowedManagedKeys added in v5.7.0

func (o SecretsMountOutput) AllowedManagedKeys() pulumi.StringArrayOutput

Set of managed key registry entry names that the mount in question is allowed to access

The following arguments are common to all database engines:

func (SecretsMountOutput) AuditNonHmacRequestKeys added in v5.6.0

func (o SecretsMountOutput) AuditNonHmacRequestKeys() pulumi.StringArrayOutput

Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.

func (SecretsMountOutput) AuditNonHmacResponseKeys added in v5.6.0

func (o SecretsMountOutput) AuditNonHmacResponseKeys() pulumi.StringArrayOutput

Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.

func (SecretsMountOutput) Cassandras added in v5.6.0

A nested block containing configuration options for Cassandra connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) Couchbases added in v5.6.0

A nested block containing configuration options for Couchbase connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) DefaultLeaseTtlSeconds added in v5.6.0

func (o SecretsMountOutput) DefaultLeaseTtlSeconds() pulumi.IntOutput

Default lease duration for tokens and secrets in seconds

func (SecretsMountOutput) Description added in v5.6.0

func (o SecretsMountOutput) Description() pulumi.StringPtrOutput

Human-friendly description of the mount

func (SecretsMountOutput) Elasticsearches added in v5.6.0

A nested block containing configuration options for Elasticsearch connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) ElementType added in v5.5.0

func (SecretsMountOutput) ElementType() reflect.Type

func (SecretsMountOutput) EngineCount added in v5.6.0

func (o SecretsMountOutput) EngineCount() pulumi.IntOutput

The total number of database secrets engines configured.

func (SecretsMountOutput) ExternalEntropyAccess added in v5.6.0

func (o SecretsMountOutput) ExternalEntropyAccess() pulumi.BoolPtrOutput

Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source

func (SecretsMountOutput) Hanas added in v5.6.0

A nested block containing configuration options for SAP HanaDB connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) Influxdbs added in v5.6.0

A nested block containing configuration options for InfluxDB connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) Local added in v5.6.0

Boolean flag that can be explicitly set to true to enforce local mount in HA environment

func (SecretsMountOutput) MaxLeaseTtlSeconds added in v5.6.0

func (o SecretsMountOutput) MaxLeaseTtlSeconds() pulumi.IntOutput

Maximum possible lease duration for tokens and secrets in seconds

func (SecretsMountOutput) Mongodbatlas added in v5.6.0

A nested block containing configuration options for MongoDB Atlas connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) Mongodbs added in v5.6.0

A nested block containing configuration options for MongoDB connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) Mssqls added in v5.6.0

A nested block containing configuration options for MSSQL connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) MysqlAuroras added in v5.6.0

A nested block containing configuration options for Aurora MySQL connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) MysqlLegacies added in v5.6.0

A nested block containing configuration options for legacy MySQL connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) MysqlRds added in v5.6.0

A nested block containing configuration options for RDS MySQL connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) Mysqls added in v5.6.0

A nested block containing configuration options for MySQL connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) Namespace added in v5.7.0

Target namespace. (requires Enterprise)

func (SecretsMountOutput) Options added in v5.6.0

func (o SecretsMountOutput) Options() pulumi.MapOutput

Specifies mount type specific options that are passed to the backend

func (SecretsMountOutput) Oracles added in v5.6.0

A nested block containing configuration options for Oracle connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) Path added in v5.6.0

Where the secret backend will be mounted

func (SecretsMountOutput) Postgresqls added in v5.6.0

A nested block containing configuration options for PostgreSQL connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) Redis added in v5.8.0

A nested block containing configuration options for Redis connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) RedisElasticaches added in v5.7.0

A nested block containing configuration options for Redis ElastiCache connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) Redshifts added in v5.6.0

A nested block containing configuration options for AWS Redshift connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) SealWrap added in v5.6.0

func (o SecretsMountOutput) SealWrap() pulumi.BoolOutput

Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability

func (SecretsMountOutput) Snowflakes added in v5.6.0

A nested block containing configuration options for Snowflake connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) ToSecretsMountOutput added in v5.5.0

func (o SecretsMountOutput) ToSecretsMountOutput() SecretsMountOutput

func (SecretsMountOutput) ToSecretsMountOutputWithContext added in v5.5.0

func (o SecretsMountOutput) ToSecretsMountOutputWithContext(ctx context.Context) SecretsMountOutput

type SecretsMountPostgresql added in v5.5.0

type SecretsMountPostgresql struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
	AuthType *string `pulumi:"authType"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// Disable special character escaping in username and password.
	DisableEscaping *bool `pulumi:"disableEscaping"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password *string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// A JSON encoded credential for use with IAM authorization
	ServiceAccountJson *string `pulumi:"serviceAccountJson"`
	// The root credential username used in the connection URL.
	Username *string `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountPostgresqlArgs added in v5.5.0

type SecretsMountPostgresqlArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
	AuthType pulumi.StringPtrInput `pulumi:"authType"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// Disable special character escaping in username and password.
	DisableEscaping pulumi.BoolPtrInput `pulumi:"disableEscaping"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// A JSON encoded credential for use with IAM authorization
	ServiceAccountJson pulumi.StringPtrInput `pulumi:"serviceAccountJson"`
	// The root credential username used in the connection URL.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountPostgresqlArgs) ElementType added in v5.5.0

func (SecretsMountPostgresqlArgs) ElementType() reflect.Type

func (SecretsMountPostgresqlArgs) ToSecretsMountPostgresqlOutput added in v5.5.0

func (i SecretsMountPostgresqlArgs) ToSecretsMountPostgresqlOutput() SecretsMountPostgresqlOutput

func (SecretsMountPostgresqlArgs) ToSecretsMountPostgresqlOutputWithContext added in v5.5.0

func (i SecretsMountPostgresqlArgs) ToSecretsMountPostgresqlOutputWithContext(ctx context.Context) SecretsMountPostgresqlOutput

type SecretsMountPostgresqlArray added in v5.5.0

type SecretsMountPostgresqlArray []SecretsMountPostgresqlInput

func (SecretsMountPostgresqlArray) ElementType added in v5.5.0

func (SecretsMountPostgresqlArray) ToSecretsMountPostgresqlArrayOutput added in v5.5.0

func (i SecretsMountPostgresqlArray) ToSecretsMountPostgresqlArrayOutput() SecretsMountPostgresqlArrayOutput

func (SecretsMountPostgresqlArray) ToSecretsMountPostgresqlArrayOutputWithContext added in v5.5.0

func (i SecretsMountPostgresqlArray) ToSecretsMountPostgresqlArrayOutputWithContext(ctx context.Context) SecretsMountPostgresqlArrayOutput

type SecretsMountPostgresqlArrayInput added in v5.5.0

type SecretsMountPostgresqlArrayInput interface {
	pulumi.Input

	ToSecretsMountPostgresqlArrayOutput() SecretsMountPostgresqlArrayOutput
	ToSecretsMountPostgresqlArrayOutputWithContext(context.Context) SecretsMountPostgresqlArrayOutput
}

SecretsMountPostgresqlArrayInput is an input type that accepts SecretsMountPostgresqlArray and SecretsMountPostgresqlArrayOutput values. You can construct a concrete instance of `SecretsMountPostgresqlArrayInput` via:

SecretsMountPostgresqlArray{ SecretsMountPostgresqlArgs{...} }

type SecretsMountPostgresqlArrayOutput added in v5.5.0

type SecretsMountPostgresqlArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountPostgresqlArrayOutput) ElementType added in v5.5.0

func (SecretsMountPostgresqlArrayOutput) Index added in v5.5.0

func (SecretsMountPostgresqlArrayOutput) ToSecretsMountPostgresqlArrayOutput added in v5.5.0

func (o SecretsMountPostgresqlArrayOutput) ToSecretsMountPostgresqlArrayOutput() SecretsMountPostgresqlArrayOutput

func (SecretsMountPostgresqlArrayOutput) ToSecretsMountPostgresqlArrayOutputWithContext added in v5.5.0

func (o SecretsMountPostgresqlArrayOutput) ToSecretsMountPostgresqlArrayOutputWithContext(ctx context.Context) SecretsMountPostgresqlArrayOutput

type SecretsMountPostgresqlInput added in v5.5.0

type SecretsMountPostgresqlInput interface {
	pulumi.Input

	ToSecretsMountPostgresqlOutput() SecretsMountPostgresqlOutput
	ToSecretsMountPostgresqlOutputWithContext(context.Context) SecretsMountPostgresqlOutput
}

SecretsMountPostgresqlInput is an input type that accepts SecretsMountPostgresqlArgs and SecretsMountPostgresqlOutput values. You can construct a concrete instance of `SecretsMountPostgresqlInput` via:

SecretsMountPostgresqlArgs{...}

type SecretsMountPostgresqlOutput added in v5.5.0

type SecretsMountPostgresqlOutput struct{ *pulumi.OutputState }

func (SecretsMountPostgresqlOutput) AllowedRoles added in v5.5.0

A list of roles that are allowed to use this connection.

func (SecretsMountPostgresqlOutput) AuthType added in v5.16.0

Specify alternative authorization type. (Only 'gcp_iam' is valid currently)

func (SecretsMountPostgresqlOutput) ConnectionUrl added in v5.5.0

Specifies the Redshift DSN. See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)

func (SecretsMountPostgresqlOutput) Data added in v5.5.0

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountPostgresqlOutput) DisableEscaping added in v5.7.0

Disable special character escaping in username and password.

func (SecretsMountPostgresqlOutput) ElementType added in v5.5.0

func (SecretsMountPostgresqlOutput) MaxConnectionLifetime added in v5.5.0

func (o SecretsMountPostgresqlOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum amount of time a connection may be reused.

func (SecretsMountPostgresqlOutput) MaxIdleConnections added in v5.5.0

func (o SecretsMountPostgresqlOutput) MaxIdleConnections() pulumi.IntPtrOutput

The maximum number of idle connections to the database.

func (SecretsMountPostgresqlOutput) MaxOpenConnections added in v5.5.0

func (o SecretsMountPostgresqlOutput) MaxOpenConnections() pulumi.IntPtrOutput

The maximum number of open connections to the database.

func (SecretsMountPostgresqlOutput) Name added in v5.5.0

Name of the database connection.

func (SecretsMountPostgresqlOutput) Password added in v5.5.0

The root credential password used in the connection URL.

func (SecretsMountPostgresqlOutput) PluginName added in v5.5.0

Specifies the name of the plugin to use.

func (SecretsMountPostgresqlOutput) RootRotationStatements added in v5.5.0

func (o SecretsMountPostgresqlOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountPostgresqlOutput) ServiceAccountJson added in v5.16.0

func (o SecretsMountPostgresqlOutput) ServiceAccountJson() pulumi.StringPtrOutput

A JSON encoded credential for use with IAM authorization

func (SecretsMountPostgresqlOutput) ToSecretsMountPostgresqlOutput added in v5.5.0

func (o SecretsMountPostgresqlOutput) ToSecretsMountPostgresqlOutput() SecretsMountPostgresqlOutput

func (SecretsMountPostgresqlOutput) ToSecretsMountPostgresqlOutputWithContext added in v5.5.0

func (o SecretsMountPostgresqlOutput) ToSecretsMountPostgresqlOutputWithContext(ctx context.Context) SecretsMountPostgresqlOutput

func (SecretsMountPostgresqlOutput) Username added in v5.5.0

The root credential username used in the connection URL.

func (SecretsMountPostgresqlOutput) UsernameTemplate added in v5.5.0

[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.

func (SecretsMountPostgresqlOutput) VerifyConnection added in v5.5.0

func (o SecretsMountPostgresqlOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountRedi added in v5.8.0

type SecretsMountRedi struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
	CaCert *string `pulumi:"caCert"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// The host to connect to.
	Host string `pulumi:"host"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls *bool `pulumi:"insecureTls"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// The default port to connect to if no port is specified as
	// part of the host.
	Port *int `pulumi:"port"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// Whether to use TLS when connecting to Cassandra.
	Tls *bool `pulumi:"tls"`
	// The root credential username used in the connection URL.
	Username string `pulumi:"username"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountRediArgs added in v5.8.0

type SecretsMountRediArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
	CaCert pulumi.StringPtrInput `pulumi:"caCert"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// The host to connect to.
	Host pulumi.StringInput `pulumi:"host"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls pulumi.BoolPtrInput `pulumi:"insecureTls"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// The default port to connect to if no port is specified as
	// part of the host.
	Port pulumi.IntPtrInput `pulumi:"port"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// Whether to use TLS when connecting to Cassandra.
	Tls pulumi.BoolPtrInput `pulumi:"tls"`
	// The root credential username used in the connection URL.
	Username pulumi.StringInput `pulumi:"username"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountRediArgs) ElementType added in v5.8.0

func (SecretsMountRediArgs) ElementType() reflect.Type

func (SecretsMountRediArgs) ToSecretsMountRediOutput added in v5.8.0

func (i SecretsMountRediArgs) ToSecretsMountRediOutput() SecretsMountRediOutput

func (SecretsMountRediArgs) ToSecretsMountRediOutputWithContext added in v5.8.0

func (i SecretsMountRediArgs) ToSecretsMountRediOutputWithContext(ctx context.Context) SecretsMountRediOutput

type SecretsMountRediArray added in v5.8.0

type SecretsMountRediArray []SecretsMountRediInput

func (SecretsMountRediArray) ElementType added in v5.8.0

func (SecretsMountRediArray) ElementType() reflect.Type

func (SecretsMountRediArray) ToSecretsMountRediArrayOutput added in v5.8.0

func (i SecretsMountRediArray) ToSecretsMountRediArrayOutput() SecretsMountRediArrayOutput

func (SecretsMountRediArray) ToSecretsMountRediArrayOutputWithContext added in v5.8.0

func (i SecretsMountRediArray) ToSecretsMountRediArrayOutputWithContext(ctx context.Context) SecretsMountRediArrayOutput

type SecretsMountRediArrayInput added in v5.8.0

type SecretsMountRediArrayInput interface {
	pulumi.Input

	ToSecretsMountRediArrayOutput() SecretsMountRediArrayOutput
	ToSecretsMountRediArrayOutputWithContext(context.Context) SecretsMountRediArrayOutput
}

SecretsMountRediArrayInput is an input type that accepts SecretsMountRediArray and SecretsMountRediArrayOutput values. You can construct a concrete instance of `SecretsMountRediArrayInput` via:

SecretsMountRediArray{ SecretsMountRediArgs{...} }

type SecretsMountRediArrayOutput added in v5.8.0

type SecretsMountRediArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountRediArrayOutput) ElementType added in v5.8.0

func (SecretsMountRediArrayOutput) Index added in v5.8.0

func (SecretsMountRediArrayOutput) ToSecretsMountRediArrayOutput added in v5.8.0

func (o SecretsMountRediArrayOutput) ToSecretsMountRediArrayOutput() SecretsMountRediArrayOutput

func (SecretsMountRediArrayOutput) ToSecretsMountRediArrayOutputWithContext added in v5.8.0

func (o SecretsMountRediArrayOutput) ToSecretsMountRediArrayOutputWithContext(ctx context.Context) SecretsMountRediArrayOutput

type SecretsMountRediInput added in v5.8.0

type SecretsMountRediInput interface {
	pulumi.Input

	ToSecretsMountRediOutput() SecretsMountRediOutput
	ToSecretsMountRediOutputWithContext(context.Context) SecretsMountRediOutput
}

SecretsMountRediInput is an input type that accepts SecretsMountRediArgs and SecretsMountRediOutput values. You can construct a concrete instance of `SecretsMountRediInput` via:

SecretsMountRediArgs{...}

type SecretsMountRediOutput added in v5.8.0

type SecretsMountRediOutput struct{ *pulumi.OutputState }

func (SecretsMountRediOutput) AllowedRoles added in v5.8.0

A list of roles that are allowed to use this connection.

func (SecretsMountRediOutput) CaCert added in v5.8.0

The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.

func (SecretsMountRediOutput) Data added in v5.8.0

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountRediOutput) ElementType added in v5.8.0

func (SecretsMountRediOutput) ElementType() reflect.Type

func (SecretsMountRediOutput) Host added in v5.8.0

The host to connect to.

func (SecretsMountRediOutput) InsecureTls added in v5.8.0

Whether to skip verification of the server certificate when using TLS.

func (SecretsMountRediOutput) Name added in v5.8.0

Name of the database connection.

func (SecretsMountRediOutput) Password added in v5.8.0

The root credential password used in the connection URL.

func (SecretsMountRediOutput) PluginName added in v5.8.0

Specifies the name of the plugin to use.

func (SecretsMountRediOutput) Port added in v5.8.0

The default port to connect to if no port is specified as part of the host.

func (SecretsMountRediOutput) RootRotationStatements added in v5.8.0

func (o SecretsMountRediOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountRediOutput) Tls added in v5.8.0

Whether to use TLS when connecting to Cassandra.

func (SecretsMountRediOutput) ToSecretsMountRediOutput added in v5.8.0

func (o SecretsMountRediOutput) ToSecretsMountRediOutput() SecretsMountRediOutput

func (SecretsMountRediOutput) ToSecretsMountRediOutputWithContext added in v5.8.0

func (o SecretsMountRediOutput) ToSecretsMountRediOutputWithContext(ctx context.Context) SecretsMountRediOutput

func (SecretsMountRediOutput) Username added in v5.8.0

The root credential username used in the connection URL.

func (SecretsMountRediOutput) VerifyConnection added in v5.8.0

func (o SecretsMountRediOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountRedisElasticach added in v5.7.0

type SecretsMountRedisElasticach struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password *string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// The AWS region where the ElastiCache cluster is hosted.
	// If omitted the plugin tries to infer the region from the environment.
	Region *string `pulumi:"region"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// The URL for Elasticsearch's API. https requires certificate
	// by trusted CA if used.
	Url string `pulumi:"url"`
	// The root credential username used in the connection URL.
	Username *string `pulumi:"username"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountRedisElasticachArgs added in v5.7.0

type SecretsMountRedisElasticachArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// The AWS region where the ElastiCache cluster is hosted.
	// If omitted the plugin tries to infer the region from the environment.
	Region pulumi.StringPtrInput `pulumi:"region"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// The URL for Elasticsearch's API. https requires certificate
	// by trusted CA if used.
	Url pulumi.StringInput `pulumi:"url"`
	// The root credential username used in the connection URL.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountRedisElasticachArgs) ElementType added in v5.7.0

func (SecretsMountRedisElasticachArgs) ToSecretsMountRedisElasticachOutput added in v5.7.0

func (i SecretsMountRedisElasticachArgs) ToSecretsMountRedisElasticachOutput() SecretsMountRedisElasticachOutput

func (SecretsMountRedisElasticachArgs) ToSecretsMountRedisElasticachOutputWithContext added in v5.7.0

func (i SecretsMountRedisElasticachArgs) ToSecretsMountRedisElasticachOutputWithContext(ctx context.Context) SecretsMountRedisElasticachOutput

type SecretsMountRedisElasticachArray added in v5.7.0

type SecretsMountRedisElasticachArray []SecretsMountRedisElasticachInput

func (SecretsMountRedisElasticachArray) ElementType added in v5.7.0

func (SecretsMountRedisElasticachArray) ToSecretsMountRedisElasticachArrayOutput added in v5.7.0

func (i SecretsMountRedisElasticachArray) ToSecretsMountRedisElasticachArrayOutput() SecretsMountRedisElasticachArrayOutput

func (SecretsMountRedisElasticachArray) ToSecretsMountRedisElasticachArrayOutputWithContext added in v5.7.0

func (i SecretsMountRedisElasticachArray) ToSecretsMountRedisElasticachArrayOutputWithContext(ctx context.Context) SecretsMountRedisElasticachArrayOutput

type SecretsMountRedisElasticachArrayInput added in v5.7.0

type SecretsMountRedisElasticachArrayInput interface {
	pulumi.Input

	ToSecretsMountRedisElasticachArrayOutput() SecretsMountRedisElasticachArrayOutput
	ToSecretsMountRedisElasticachArrayOutputWithContext(context.Context) SecretsMountRedisElasticachArrayOutput
}

SecretsMountRedisElasticachArrayInput is an input type that accepts SecretsMountRedisElasticachArray and SecretsMountRedisElasticachArrayOutput values. You can construct a concrete instance of `SecretsMountRedisElasticachArrayInput` via:

SecretsMountRedisElasticachArray{ SecretsMountRedisElasticachArgs{...} }

type SecretsMountRedisElasticachArrayOutput added in v5.7.0

type SecretsMountRedisElasticachArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountRedisElasticachArrayOutput) ElementType added in v5.7.0

func (SecretsMountRedisElasticachArrayOutput) Index added in v5.7.0

func (SecretsMountRedisElasticachArrayOutput) ToSecretsMountRedisElasticachArrayOutput added in v5.7.0

func (o SecretsMountRedisElasticachArrayOutput) ToSecretsMountRedisElasticachArrayOutput() SecretsMountRedisElasticachArrayOutput

func (SecretsMountRedisElasticachArrayOutput) ToSecretsMountRedisElasticachArrayOutputWithContext added in v5.7.0

func (o SecretsMountRedisElasticachArrayOutput) ToSecretsMountRedisElasticachArrayOutputWithContext(ctx context.Context) SecretsMountRedisElasticachArrayOutput

type SecretsMountRedisElasticachInput added in v5.7.0

type SecretsMountRedisElasticachInput interface {
	pulumi.Input

	ToSecretsMountRedisElasticachOutput() SecretsMountRedisElasticachOutput
	ToSecretsMountRedisElasticachOutputWithContext(context.Context) SecretsMountRedisElasticachOutput
}

SecretsMountRedisElasticachInput is an input type that accepts SecretsMountRedisElasticachArgs and SecretsMountRedisElasticachOutput values. You can construct a concrete instance of `SecretsMountRedisElasticachInput` via:

SecretsMountRedisElasticachArgs{...}

type SecretsMountRedisElasticachOutput added in v5.7.0

type SecretsMountRedisElasticachOutput struct{ *pulumi.OutputState }

func (SecretsMountRedisElasticachOutput) AllowedRoles added in v5.7.0

A list of roles that are allowed to use this connection.

func (SecretsMountRedisElasticachOutput) Data added in v5.7.0

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountRedisElasticachOutput) ElementType added in v5.7.0

func (SecretsMountRedisElasticachOutput) Name added in v5.7.0

Name of the database connection.

func (SecretsMountRedisElasticachOutput) Password added in v5.7.0

The root credential password used in the connection URL.

func (SecretsMountRedisElasticachOutput) PluginName added in v5.7.0

Specifies the name of the plugin to use.

func (SecretsMountRedisElasticachOutput) Region added in v5.7.0

The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.

func (SecretsMountRedisElasticachOutput) RootRotationStatements added in v5.7.0

func (o SecretsMountRedisElasticachOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountRedisElasticachOutput) ToSecretsMountRedisElasticachOutput added in v5.7.0

func (o SecretsMountRedisElasticachOutput) ToSecretsMountRedisElasticachOutput() SecretsMountRedisElasticachOutput

func (SecretsMountRedisElasticachOutput) ToSecretsMountRedisElasticachOutputWithContext added in v5.7.0

func (o SecretsMountRedisElasticachOutput) ToSecretsMountRedisElasticachOutputWithContext(ctx context.Context) SecretsMountRedisElasticachOutput

func (SecretsMountRedisElasticachOutput) Url added in v5.7.0

The URL for Elasticsearch's API. https requires certificate by trusted CA if used.

func (SecretsMountRedisElasticachOutput) Username added in v5.7.0

The root credential username used in the connection URL.

func (SecretsMountRedisElasticachOutput) VerifyConnection added in v5.7.0

Whether the connection should be verified on initial configuration or not.

type SecretsMountRedshift added in v5.5.0

type SecretsMountRedshift struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// Disable special character escaping in username and password.
	DisableEscaping *bool `pulumi:"disableEscaping"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password *string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// The root credential username used in the connection URL.
	Username *string `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountRedshiftArgs added in v5.5.0

type SecretsMountRedshiftArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// Disable special character escaping in username and password.
	DisableEscaping pulumi.BoolPtrInput `pulumi:"disableEscaping"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// The root credential username used in the connection URL.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountRedshiftArgs) ElementType added in v5.5.0

func (SecretsMountRedshiftArgs) ElementType() reflect.Type

func (SecretsMountRedshiftArgs) ToSecretsMountRedshiftOutput added in v5.5.0

func (i SecretsMountRedshiftArgs) ToSecretsMountRedshiftOutput() SecretsMountRedshiftOutput

func (SecretsMountRedshiftArgs) ToSecretsMountRedshiftOutputWithContext added in v5.5.0

func (i SecretsMountRedshiftArgs) ToSecretsMountRedshiftOutputWithContext(ctx context.Context) SecretsMountRedshiftOutput

type SecretsMountRedshiftArray added in v5.5.0

type SecretsMountRedshiftArray []SecretsMountRedshiftInput

func (SecretsMountRedshiftArray) ElementType added in v5.5.0

func (SecretsMountRedshiftArray) ElementType() reflect.Type

func (SecretsMountRedshiftArray) ToSecretsMountRedshiftArrayOutput added in v5.5.0

func (i SecretsMountRedshiftArray) ToSecretsMountRedshiftArrayOutput() SecretsMountRedshiftArrayOutput

func (SecretsMountRedshiftArray) ToSecretsMountRedshiftArrayOutputWithContext added in v5.5.0

func (i SecretsMountRedshiftArray) ToSecretsMountRedshiftArrayOutputWithContext(ctx context.Context) SecretsMountRedshiftArrayOutput

type SecretsMountRedshiftArrayInput added in v5.5.0

type SecretsMountRedshiftArrayInput interface {
	pulumi.Input

	ToSecretsMountRedshiftArrayOutput() SecretsMountRedshiftArrayOutput
	ToSecretsMountRedshiftArrayOutputWithContext(context.Context) SecretsMountRedshiftArrayOutput
}

SecretsMountRedshiftArrayInput is an input type that accepts SecretsMountRedshiftArray and SecretsMountRedshiftArrayOutput values. You can construct a concrete instance of `SecretsMountRedshiftArrayInput` via:

SecretsMountRedshiftArray{ SecretsMountRedshiftArgs{...} }

type SecretsMountRedshiftArrayOutput added in v5.5.0

type SecretsMountRedshiftArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountRedshiftArrayOutput) ElementType added in v5.5.0

func (SecretsMountRedshiftArrayOutput) Index added in v5.5.0

func (SecretsMountRedshiftArrayOutput) ToSecretsMountRedshiftArrayOutput added in v5.5.0

func (o SecretsMountRedshiftArrayOutput) ToSecretsMountRedshiftArrayOutput() SecretsMountRedshiftArrayOutput

func (SecretsMountRedshiftArrayOutput) ToSecretsMountRedshiftArrayOutputWithContext added in v5.5.0

func (o SecretsMountRedshiftArrayOutput) ToSecretsMountRedshiftArrayOutputWithContext(ctx context.Context) SecretsMountRedshiftArrayOutput

type SecretsMountRedshiftInput added in v5.5.0

type SecretsMountRedshiftInput interface {
	pulumi.Input

	ToSecretsMountRedshiftOutput() SecretsMountRedshiftOutput
	ToSecretsMountRedshiftOutputWithContext(context.Context) SecretsMountRedshiftOutput
}

SecretsMountRedshiftInput is an input type that accepts SecretsMountRedshiftArgs and SecretsMountRedshiftOutput values. You can construct a concrete instance of `SecretsMountRedshiftInput` via:

SecretsMountRedshiftArgs{...}

type SecretsMountRedshiftOutput added in v5.5.0

type SecretsMountRedshiftOutput struct{ *pulumi.OutputState }

func (SecretsMountRedshiftOutput) AllowedRoles added in v5.5.0

A list of roles that are allowed to use this connection.

func (SecretsMountRedshiftOutput) ConnectionUrl added in v5.5.0

Specifies the Redshift DSN. See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)

func (SecretsMountRedshiftOutput) Data added in v5.5.0

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountRedshiftOutput) DisableEscaping added in v5.7.0

func (o SecretsMountRedshiftOutput) DisableEscaping() pulumi.BoolPtrOutput

Disable special character escaping in username and password.

func (SecretsMountRedshiftOutput) ElementType added in v5.5.0

func (SecretsMountRedshiftOutput) ElementType() reflect.Type

func (SecretsMountRedshiftOutput) MaxConnectionLifetime added in v5.5.0

func (o SecretsMountRedshiftOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum amount of time a connection may be reused.

func (SecretsMountRedshiftOutput) MaxIdleConnections added in v5.5.0

func (o SecretsMountRedshiftOutput) MaxIdleConnections() pulumi.IntPtrOutput

The maximum number of idle connections to the database.

func (SecretsMountRedshiftOutput) MaxOpenConnections added in v5.5.0

func (o SecretsMountRedshiftOutput) MaxOpenConnections() pulumi.IntPtrOutput

The maximum number of open connections to the database.

func (SecretsMountRedshiftOutput) Name added in v5.5.0

Name of the database connection.

func (SecretsMountRedshiftOutput) Password added in v5.5.0

The root credential password used in the connection URL.

func (SecretsMountRedshiftOutput) PluginName added in v5.5.0

Specifies the name of the plugin to use.

func (SecretsMountRedshiftOutput) RootRotationStatements added in v5.5.0

func (o SecretsMountRedshiftOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountRedshiftOutput) ToSecretsMountRedshiftOutput added in v5.5.0

func (o SecretsMountRedshiftOutput) ToSecretsMountRedshiftOutput() SecretsMountRedshiftOutput

func (SecretsMountRedshiftOutput) ToSecretsMountRedshiftOutputWithContext added in v5.5.0

func (o SecretsMountRedshiftOutput) ToSecretsMountRedshiftOutputWithContext(ctx context.Context) SecretsMountRedshiftOutput

func (SecretsMountRedshiftOutput) Username added in v5.5.0

The root credential username used in the connection URL.

func (SecretsMountRedshiftOutput) UsernameTemplate added in v5.5.0

func (o SecretsMountRedshiftOutput) UsernameTemplate() pulumi.StringPtrOutput

[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.

func (SecretsMountRedshiftOutput) VerifyConnection added in v5.5.0

func (o SecretsMountRedshiftOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountSnowflake added in v5.5.0

type SecretsMountSnowflake struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password *string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// The root credential username used in the connection URL.
	Username *string `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountSnowflakeArgs added in v5.5.0

type SecretsMountSnowflakeArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// The root credential username used in the connection URL.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountSnowflakeArgs) ElementType added in v5.5.0

func (SecretsMountSnowflakeArgs) ElementType() reflect.Type

func (SecretsMountSnowflakeArgs) ToSecretsMountSnowflakeOutput added in v5.5.0

func (i SecretsMountSnowflakeArgs) ToSecretsMountSnowflakeOutput() SecretsMountSnowflakeOutput

func (SecretsMountSnowflakeArgs) ToSecretsMountSnowflakeOutputWithContext added in v5.5.0

func (i SecretsMountSnowflakeArgs) ToSecretsMountSnowflakeOutputWithContext(ctx context.Context) SecretsMountSnowflakeOutput

type SecretsMountSnowflakeArray added in v5.5.0

type SecretsMountSnowflakeArray []SecretsMountSnowflakeInput

func (SecretsMountSnowflakeArray) ElementType added in v5.5.0

func (SecretsMountSnowflakeArray) ElementType() reflect.Type

func (SecretsMountSnowflakeArray) ToSecretsMountSnowflakeArrayOutput added in v5.5.0

func (i SecretsMountSnowflakeArray) ToSecretsMountSnowflakeArrayOutput() SecretsMountSnowflakeArrayOutput

func (SecretsMountSnowflakeArray) ToSecretsMountSnowflakeArrayOutputWithContext added in v5.5.0

func (i SecretsMountSnowflakeArray) ToSecretsMountSnowflakeArrayOutputWithContext(ctx context.Context) SecretsMountSnowflakeArrayOutput

type SecretsMountSnowflakeArrayInput added in v5.5.0

type SecretsMountSnowflakeArrayInput interface {
	pulumi.Input

	ToSecretsMountSnowflakeArrayOutput() SecretsMountSnowflakeArrayOutput
	ToSecretsMountSnowflakeArrayOutputWithContext(context.Context) SecretsMountSnowflakeArrayOutput
}

SecretsMountSnowflakeArrayInput is an input type that accepts SecretsMountSnowflakeArray and SecretsMountSnowflakeArrayOutput values. You can construct a concrete instance of `SecretsMountSnowflakeArrayInput` via:

SecretsMountSnowflakeArray{ SecretsMountSnowflakeArgs{...} }

type SecretsMountSnowflakeArrayOutput added in v5.5.0

type SecretsMountSnowflakeArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountSnowflakeArrayOutput) ElementType added in v5.5.0

func (SecretsMountSnowflakeArrayOutput) Index added in v5.5.0

func (SecretsMountSnowflakeArrayOutput) ToSecretsMountSnowflakeArrayOutput added in v5.5.0

func (o SecretsMountSnowflakeArrayOutput) ToSecretsMountSnowflakeArrayOutput() SecretsMountSnowflakeArrayOutput

func (SecretsMountSnowflakeArrayOutput) ToSecretsMountSnowflakeArrayOutputWithContext added in v5.5.0

func (o SecretsMountSnowflakeArrayOutput) ToSecretsMountSnowflakeArrayOutputWithContext(ctx context.Context) SecretsMountSnowflakeArrayOutput

type SecretsMountSnowflakeInput added in v5.5.0

type SecretsMountSnowflakeInput interface {
	pulumi.Input

	ToSecretsMountSnowflakeOutput() SecretsMountSnowflakeOutput
	ToSecretsMountSnowflakeOutputWithContext(context.Context) SecretsMountSnowflakeOutput
}

SecretsMountSnowflakeInput is an input type that accepts SecretsMountSnowflakeArgs and SecretsMountSnowflakeOutput values. You can construct a concrete instance of `SecretsMountSnowflakeInput` via:

SecretsMountSnowflakeArgs{...}

type SecretsMountSnowflakeOutput added in v5.5.0

type SecretsMountSnowflakeOutput struct{ *pulumi.OutputState }

func (SecretsMountSnowflakeOutput) AllowedRoles added in v5.5.0

A list of roles that are allowed to use this connection.

func (SecretsMountSnowflakeOutput) ConnectionUrl added in v5.5.0

Specifies the Redshift DSN. See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)

func (SecretsMountSnowflakeOutput) Data added in v5.5.0

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountSnowflakeOutput) ElementType added in v5.5.0

func (SecretsMountSnowflakeOutput) MaxConnectionLifetime added in v5.5.0

func (o SecretsMountSnowflakeOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum amount of time a connection may be reused.

func (SecretsMountSnowflakeOutput) MaxIdleConnections added in v5.5.0

func (o SecretsMountSnowflakeOutput) MaxIdleConnections() pulumi.IntPtrOutput

The maximum number of idle connections to the database.

func (SecretsMountSnowflakeOutput) MaxOpenConnections added in v5.5.0

func (o SecretsMountSnowflakeOutput) MaxOpenConnections() pulumi.IntPtrOutput

The maximum number of open connections to the database.

func (SecretsMountSnowflakeOutput) Name added in v5.5.0

Name of the database connection.

func (SecretsMountSnowflakeOutput) Password added in v5.5.0

The root credential password used in the connection URL.

func (SecretsMountSnowflakeOutput) PluginName added in v5.5.0

Specifies the name of the plugin to use.

func (SecretsMountSnowflakeOutput) RootRotationStatements added in v5.5.0

func (o SecretsMountSnowflakeOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountSnowflakeOutput) ToSecretsMountSnowflakeOutput added in v5.5.0

func (o SecretsMountSnowflakeOutput) ToSecretsMountSnowflakeOutput() SecretsMountSnowflakeOutput

func (SecretsMountSnowflakeOutput) ToSecretsMountSnowflakeOutputWithContext added in v5.5.0

func (o SecretsMountSnowflakeOutput) ToSecretsMountSnowflakeOutputWithContext(ctx context.Context) SecretsMountSnowflakeOutput

func (SecretsMountSnowflakeOutput) Username added in v5.5.0

The root credential username used in the connection URL.

func (SecretsMountSnowflakeOutput) UsernameTemplate added in v5.5.0

func (o SecretsMountSnowflakeOutput) UsernameTemplate() pulumi.StringPtrOutput

[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.

func (SecretsMountSnowflakeOutput) VerifyConnection added in v5.5.0

func (o SecretsMountSnowflakeOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountState added in v5.5.0

type SecretsMountState struct {
	// Accessor of the mount
	Accessor pulumi.StringPtrInput
	// Set of managed key registry entry names that the mount in question is allowed to access
	//
	// The following arguments are common to all database engines:
	AllowedManagedKeys pulumi.StringArrayInput
	// Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
	AuditNonHmacRequestKeys pulumi.StringArrayInput
	// Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
	AuditNonHmacResponseKeys pulumi.StringArrayInput
	// A nested block containing configuration options for Cassandra connections.\
	// *See Configuration Options for more info*
	Cassandras SecretsMountCassandraArrayInput
	// A nested block containing configuration options for Couchbase connections.\
	// *See Configuration Options for more info*
	Couchbases SecretsMountCouchbaseArrayInput
	// Default lease duration for tokens and secrets in seconds
	DefaultLeaseTtlSeconds pulumi.IntPtrInput
	// Human-friendly description of the mount
	Description pulumi.StringPtrInput
	// A nested block containing configuration options for Elasticsearch connections.\
	// *See Configuration Options for more info*
	Elasticsearches SecretsMountElasticsearchArrayInput
	// The total number of database secrets engines configured.
	EngineCount pulumi.IntPtrInput
	// Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
	ExternalEntropyAccess pulumi.BoolPtrInput
	// A nested block containing configuration options for SAP HanaDB connections.\
	// *See Configuration Options for more info*
	Hanas SecretsMountHanaArrayInput
	// A nested block containing configuration options for InfluxDB connections.\
	// *See Configuration Options for more info*
	Influxdbs SecretsMountInfluxdbArrayInput
	// Boolean flag that can be explicitly set to true to enforce local mount in HA environment
	Local pulumi.BoolPtrInput
	// Maximum possible lease duration for tokens and secrets in seconds
	MaxLeaseTtlSeconds pulumi.IntPtrInput
	// A nested block containing configuration options for MongoDB Atlas connections.\
	// *See Configuration Options for more info*
	Mongodbatlas SecretsMountMongodbatlaArrayInput
	// A nested block containing configuration options for MongoDB connections.\
	// *See Configuration Options for more info*
	Mongodbs SecretsMountMongodbArrayInput
	// A nested block containing configuration options for MSSQL connections.\
	// *See Configuration Options for more info*
	Mssqls SecretsMountMssqlArrayInput
	// A nested block containing configuration options for Aurora MySQL connections.\
	// *See Configuration Options for more info*
	MysqlAuroras SecretsMountMysqlAuroraArrayInput
	// A nested block containing configuration options for legacy MySQL connections.\
	// *See Configuration Options for more info*
	MysqlLegacies SecretsMountMysqlLegacyArrayInput
	// A nested block containing configuration options for RDS MySQL connections.\
	// *See Configuration Options for more info*
	MysqlRds SecretsMountMysqlRdArrayInput
	// A nested block containing configuration options for MySQL connections.\
	// *See Configuration Options for more info*
	Mysqls SecretsMountMysqlArrayInput
	// Target namespace. (requires Enterprise)
	Namespace pulumi.StringPtrInput
	// Specifies mount type specific options that are passed to the backend
	Options pulumi.MapInput
	// A nested block containing configuration options for Oracle connections.\
	// *See Configuration Options for more info*
	Oracles SecretsMountOracleArrayInput
	// Where the secret backend will be mounted
	Path pulumi.StringPtrInput
	// A nested block containing configuration options for PostgreSQL connections.\
	// *See Configuration Options for more info*
	Postgresqls SecretsMountPostgresqlArrayInput
	// A nested block containing configuration options for Redis connections.\
	// *See Configuration Options for more info*
	Redis SecretsMountRediArrayInput
	// A nested block containing configuration options for Redis ElastiCache connections.\
	// *See Configuration Options for more info*
	RedisElasticaches SecretsMountRedisElasticachArrayInput
	// A nested block containing configuration options for AWS Redshift connections.\
	// *See Configuration Options for more info*
	Redshifts SecretsMountRedshiftArrayInput
	// Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
	SealWrap pulumi.BoolPtrInput
	// A nested block containing configuration options for Snowflake connections.\
	// *See Configuration Options for more info*
	Snowflakes SecretsMountSnowflakeArrayInput
}

func (SecretsMountState) ElementType added in v5.5.0

func (SecretsMountState) ElementType() reflect.Type

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL