database

package
v6.1.0 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Apr 4, 2024 License: Apache-2.0 Imports: 7 Imported by: 0

Documentation

Index

Constants

This section is empty.

Variables

This section is empty.

Functions

This section is empty.

Types

type SecretBackendConnection

type SecretBackendConnection struct {
	pulumi.CustomResourceState

	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayOutput `pulumi:"allowedRoles"`
	// The unique name of the Vault mount to configure.
	Backend pulumi.StringOutput `pulumi:"backend"`
	// A nested block containing configuration options for Cassandra connections.
	Cassandra SecretBackendConnectionCassandraPtrOutput `pulumi:"cassandra"`
	// A nested block containing configuration options for Couchbase connections.
	Couchbase SecretBackendConnectionCouchbasePtrOutput `pulumi:"couchbase"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	Data pulumi.MapOutput `pulumi:"data"`
	// A nested block containing configuration options for Elasticsearch connections.
	Elasticsearch SecretBackendConnectionElasticsearchPtrOutput `pulumi:"elasticsearch"`
	// A nested block containing configuration options for SAP HanaDB connections.
	Hana SecretBackendConnectionHanaPtrOutput `pulumi:"hana"`
	// A nested block containing configuration options for InfluxDB connections.
	Influxdb SecretBackendConnectionInfluxdbPtrOutput `pulumi:"influxdb"`
	// A nested block containing configuration options for MongoDB connections.
	Mongodb SecretBackendConnectionMongodbPtrOutput `pulumi:"mongodb"`
	// A nested block containing configuration options for MongoDB Atlas connections.
	Mongodbatlas SecretBackendConnectionMongodbatlasPtrOutput `pulumi:"mongodbatlas"`
	// A nested block containing configuration options for MSSQL connections.
	Mssql SecretBackendConnectionMssqlPtrOutput `pulumi:"mssql"`
	// A nested block containing configuration options for MySQL connections.
	Mysql SecretBackendConnectionMysqlPtrOutput `pulumi:"mysql"`
	// A nested block containing configuration options for Aurora MySQL connections.
	MysqlAurora SecretBackendConnectionMysqlAuroraPtrOutput `pulumi:"mysqlAurora"`
	// A nested block containing configuration options for legacy MySQL connections.
	MysqlLegacy SecretBackendConnectionMysqlLegacyPtrOutput `pulumi:"mysqlLegacy"`
	// A nested block containing configuration options for RDS MySQL connections.
	MysqlRds SecretBackendConnectionMysqlRdsPtrOutput `pulumi:"mysqlRds"`
	// A unique name to give the database connection.
	Name pulumi.StringOutput `pulumi:"name"`
	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The `namespace` is always relative to the provider's configured namespace.
	// *Available only for Vault Enterprise*.
	Namespace pulumi.StringPtrOutput `pulumi:"namespace"`
	// A nested block containing configuration options for Oracle connections.
	Oracle SecretBackendConnectionOraclePtrOutput `pulumi:"oracle"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringOutput `pulumi:"pluginName"`
	// A nested block containing configuration options for PostgreSQL connections.
	Postgresql SecretBackendConnectionPostgresqlPtrOutput `pulumi:"postgresql"`
	// A nested block containing configuration options for Redis connections.
	Redis SecretBackendConnectionRedisPtrOutput `pulumi:"redis"`
	// A nested block containing configuration options for Redis ElastiCache connections.
	//
	// Exactly one of the nested blocks of configuration options must be supplied.
	RedisElasticache SecretBackendConnectionRedisElasticachePtrOutput `pulumi:"redisElasticache"`
	// Connection parameters for the redshift-database-plugin plugin.
	Redshift SecretBackendConnectionRedshiftPtrOutput `pulumi:"redshift"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayOutput `pulumi:"rootRotationStatements"`
	// A nested block containing configuration options for Snowflake connections.
	Snowflake SecretBackendConnectionSnowflakePtrOutput `pulumi:"snowflake"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrOutput `pulumi:"verifyConnection"`
}

## Example Usage

<!--Start PulumiCodeChooser --> ```go package main

import (

"github.com/pulumi/pulumi-vault/sdk/v6/go/vault"
"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/database"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"

)

func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		db, err := vault.NewMount(ctx, "db", &vault.MountArgs{
			Path: pulumi.String("postgres"),
			Type: pulumi.String("database"),
		})
		if err != nil {
			return err
		}
		_, err = database.NewSecretBackendConnection(ctx, "postgres", &database.SecretBackendConnectionArgs{
			Backend: db.Path,
			AllowedRoles: pulumi.StringArray{
				pulumi.String("dev"),
				pulumi.String("prod"),
			},
			Postgresql: &database.SecretBackendConnectionPostgresqlArgs{
				ConnectionUrl: pulumi.String("postgres://username:password@host:port/database"),
			},
		})
		if err != nil {
			return err
		}
		return nil
	})
}

``` <!--End PulumiCodeChooser -->

## Import

Database secret backend connections can be imported using the `backend`, `/config/`, and the `name` e.g.

```sh $ pulumi import vault:database/secretBackendConnection:SecretBackendConnection example postgres/config/postgres ```

func GetSecretBackendConnection

func GetSecretBackendConnection(ctx *pulumi.Context,
	name string, id pulumi.IDInput, state *SecretBackendConnectionState, opts ...pulumi.ResourceOption) (*SecretBackendConnection, error)

GetSecretBackendConnection gets an existing SecretBackendConnection resource's state with the given name, ID, and optional state properties that are used to uniquely qualify the lookup (nil if not required).

func NewSecretBackendConnection

func NewSecretBackendConnection(ctx *pulumi.Context,
	name string, args *SecretBackendConnectionArgs, opts ...pulumi.ResourceOption) (*SecretBackendConnection, error)

NewSecretBackendConnection registers a new resource with the given unique name, arguments, and options.

func (*SecretBackendConnection) ElementType

func (*SecretBackendConnection) ElementType() reflect.Type

func (*SecretBackendConnection) ToSecretBackendConnectionOutput

func (i *SecretBackendConnection) ToSecretBackendConnectionOutput() SecretBackendConnectionOutput

func (*SecretBackendConnection) ToSecretBackendConnectionOutputWithContext

func (i *SecretBackendConnection) ToSecretBackendConnectionOutputWithContext(ctx context.Context) SecretBackendConnectionOutput

type SecretBackendConnectionArgs

type SecretBackendConnectionArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput
	// The unique name of the Vault mount to configure.
	Backend pulumi.StringInput
	// A nested block containing configuration options for Cassandra connections.
	Cassandra SecretBackendConnectionCassandraPtrInput
	// A nested block containing configuration options for Couchbase connections.
	Couchbase SecretBackendConnectionCouchbasePtrInput
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	Data pulumi.MapInput
	// A nested block containing configuration options for Elasticsearch connections.
	Elasticsearch SecretBackendConnectionElasticsearchPtrInput
	// A nested block containing configuration options for SAP HanaDB connections.
	Hana SecretBackendConnectionHanaPtrInput
	// A nested block containing configuration options for InfluxDB connections.
	Influxdb SecretBackendConnectionInfluxdbPtrInput
	// A nested block containing configuration options for MongoDB connections.
	Mongodb SecretBackendConnectionMongodbPtrInput
	// A nested block containing configuration options for MongoDB Atlas connections.
	Mongodbatlas SecretBackendConnectionMongodbatlasPtrInput
	// A nested block containing configuration options for MSSQL connections.
	Mssql SecretBackendConnectionMssqlPtrInput
	// A nested block containing configuration options for MySQL connections.
	Mysql SecretBackendConnectionMysqlPtrInput
	// A nested block containing configuration options for Aurora MySQL connections.
	MysqlAurora SecretBackendConnectionMysqlAuroraPtrInput
	// A nested block containing configuration options for legacy MySQL connections.
	MysqlLegacy SecretBackendConnectionMysqlLegacyPtrInput
	// A nested block containing configuration options for RDS MySQL connections.
	MysqlRds SecretBackendConnectionMysqlRdsPtrInput
	// A unique name to give the database connection.
	Name pulumi.StringPtrInput
	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The `namespace` is always relative to the provider's configured namespace.
	// *Available only for Vault Enterprise*.
	Namespace pulumi.StringPtrInput
	// A nested block containing configuration options for Oracle connections.
	Oracle SecretBackendConnectionOraclePtrInput
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput
	// A nested block containing configuration options for PostgreSQL connections.
	Postgresql SecretBackendConnectionPostgresqlPtrInput
	// A nested block containing configuration options for Redis connections.
	Redis SecretBackendConnectionRedisPtrInput
	// A nested block containing configuration options for Redis ElastiCache connections.
	//
	// Exactly one of the nested blocks of configuration options must be supplied.
	RedisElasticache SecretBackendConnectionRedisElasticachePtrInput
	// Connection parameters for the redshift-database-plugin plugin.
	Redshift SecretBackendConnectionRedshiftPtrInput
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput
	// A nested block containing configuration options for Snowflake connections.
	Snowflake SecretBackendConnectionSnowflakePtrInput
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput
}

The set of arguments for constructing a SecretBackendConnection resource.

func (SecretBackendConnectionArgs) ElementType

type SecretBackendConnectionArray

type SecretBackendConnectionArray []SecretBackendConnectionInput

func (SecretBackendConnectionArray) ElementType

func (SecretBackendConnectionArray) ToSecretBackendConnectionArrayOutput

func (i SecretBackendConnectionArray) ToSecretBackendConnectionArrayOutput() SecretBackendConnectionArrayOutput

func (SecretBackendConnectionArray) ToSecretBackendConnectionArrayOutputWithContext

func (i SecretBackendConnectionArray) ToSecretBackendConnectionArrayOutputWithContext(ctx context.Context) SecretBackendConnectionArrayOutput

type SecretBackendConnectionArrayInput

type SecretBackendConnectionArrayInput interface {
	pulumi.Input

	ToSecretBackendConnectionArrayOutput() SecretBackendConnectionArrayOutput
	ToSecretBackendConnectionArrayOutputWithContext(context.Context) SecretBackendConnectionArrayOutput
}

SecretBackendConnectionArrayInput is an input type that accepts SecretBackendConnectionArray and SecretBackendConnectionArrayOutput values. You can construct a concrete instance of `SecretBackendConnectionArrayInput` via:

SecretBackendConnectionArray{ SecretBackendConnectionArgs{...} }

type SecretBackendConnectionArrayOutput

type SecretBackendConnectionArrayOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionArrayOutput) ElementType

func (SecretBackendConnectionArrayOutput) Index

func (SecretBackendConnectionArrayOutput) ToSecretBackendConnectionArrayOutput

func (o SecretBackendConnectionArrayOutput) ToSecretBackendConnectionArrayOutput() SecretBackendConnectionArrayOutput

func (SecretBackendConnectionArrayOutput) ToSecretBackendConnectionArrayOutputWithContext

func (o SecretBackendConnectionArrayOutput) ToSecretBackendConnectionArrayOutputWithContext(ctx context.Context) SecretBackendConnectionArrayOutput

type SecretBackendConnectionCassandra

type SecretBackendConnectionCassandra struct {
	// The number of seconds to use as a connection
	// timeout.
	ConnectTimeout *int `pulumi:"connectTimeout"`
	// The hosts to connect to.
	Hosts []string `pulumi:"hosts"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls *bool `pulumi:"insecureTls"`
	// The password to authenticate with.
	Password *string `pulumi:"password"`
	// Concatenated PEM blocks configuring the certificate
	// chain.
	PemBundle *string `pulumi:"pemBundle"`
	// A JSON structure configuring the certificate chain.
	PemJson *string `pulumi:"pemJson"`
	// The default port to connect to if no port is specified as
	// part of the host.
	Port *int `pulumi:"port"`
	// The CQL protocol version to use.
	ProtocolVersion *int `pulumi:"protocolVersion"`
	// Whether to use TLS when connecting to Cassandra.
	Tls *bool `pulumi:"tls"`
	// The username to authenticate with.
	Username *string `pulumi:"username"`
}

type SecretBackendConnectionCassandraArgs

type SecretBackendConnectionCassandraArgs struct {
	// The number of seconds to use as a connection
	// timeout.
	ConnectTimeout pulumi.IntPtrInput `pulumi:"connectTimeout"`
	// The hosts to connect to.
	Hosts pulumi.StringArrayInput `pulumi:"hosts"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls pulumi.BoolPtrInput `pulumi:"insecureTls"`
	// The password to authenticate with.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Concatenated PEM blocks configuring the certificate
	// chain.
	PemBundle pulumi.StringPtrInput `pulumi:"pemBundle"`
	// A JSON structure configuring the certificate chain.
	PemJson pulumi.StringPtrInput `pulumi:"pemJson"`
	// The default port to connect to if no port is specified as
	// part of the host.
	Port pulumi.IntPtrInput `pulumi:"port"`
	// The CQL protocol version to use.
	ProtocolVersion pulumi.IntPtrInput `pulumi:"protocolVersion"`
	// Whether to use TLS when connecting to Cassandra.
	Tls pulumi.BoolPtrInput `pulumi:"tls"`
	// The username to authenticate with.
	Username pulumi.StringPtrInput `pulumi:"username"`
}

func (SecretBackendConnectionCassandraArgs) ElementType

func (SecretBackendConnectionCassandraArgs) ToSecretBackendConnectionCassandraOutput

func (i SecretBackendConnectionCassandraArgs) ToSecretBackendConnectionCassandraOutput() SecretBackendConnectionCassandraOutput

func (SecretBackendConnectionCassandraArgs) ToSecretBackendConnectionCassandraOutputWithContext

func (i SecretBackendConnectionCassandraArgs) ToSecretBackendConnectionCassandraOutputWithContext(ctx context.Context) SecretBackendConnectionCassandraOutput

func (SecretBackendConnectionCassandraArgs) ToSecretBackendConnectionCassandraPtrOutput

func (i SecretBackendConnectionCassandraArgs) ToSecretBackendConnectionCassandraPtrOutput() SecretBackendConnectionCassandraPtrOutput

func (SecretBackendConnectionCassandraArgs) ToSecretBackendConnectionCassandraPtrOutputWithContext

func (i SecretBackendConnectionCassandraArgs) ToSecretBackendConnectionCassandraPtrOutputWithContext(ctx context.Context) SecretBackendConnectionCassandraPtrOutput

type SecretBackendConnectionCassandraInput

type SecretBackendConnectionCassandraInput interface {
	pulumi.Input

	ToSecretBackendConnectionCassandraOutput() SecretBackendConnectionCassandraOutput
	ToSecretBackendConnectionCassandraOutputWithContext(context.Context) SecretBackendConnectionCassandraOutput
}

SecretBackendConnectionCassandraInput is an input type that accepts SecretBackendConnectionCassandraArgs and SecretBackendConnectionCassandraOutput values. You can construct a concrete instance of `SecretBackendConnectionCassandraInput` via:

SecretBackendConnectionCassandraArgs{...}

type SecretBackendConnectionCassandraOutput

type SecretBackendConnectionCassandraOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionCassandraOutput) ConnectTimeout

The number of seconds to use as a connection timeout.

func (SecretBackendConnectionCassandraOutput) ElementType

func (SecretBackendConnectionCassandraOutput) Hosts

The hosts to connect to.

func (SecretBackendConnectionCassandraOutput) InsecureTls

Whether to skip verification of the server certificate when using TLS.

func (SecretBackendConnectionCassandraOutput) Password

The password to authenticate with.

func (SecretBackendConnectionCassandraOutput) PemBundle

Concatenated PEM blocks configuring the certificate chain.

func (SecretBackendConnectionCassandraOutput) PemJson

A JSON structure configuring the certificate chain.

func (SecretBackendConnectionCassandraOutput) Port

The default port to connect to if no port is specified as part of the host.

func (SecretBackendConnectionCassandraOutput) ProtocolVersion

The CQL protocol version to use.

func (SecretBackendConnectionCassandraOutput) Tls

Whether to use TLS when connecting to Cassandra.

func (SecretBackendConnectionCassandraOutput) ToSecretBackendConnectionCassandraOutput

func (o SecretBackendConnectionCassandraOutput) ToSecretBackendConnectionCassandraOutput() SecretBackendConnectionCassandraOutput

func (SecretBackendConnectionCassandraOutput) ToSecretBackendConnectionCassandraOutputWithContext

func (o SecretBackendConnectionCassandraOutput) ToSecretBackendConnectionCassandraOutputWithContext(ctx context.Context) SecretBackendConnectionCassandraOutput

func (SecretBackendConnectionCassandraOutput) ToSecretBackendConnectionCassandraPtrOutput

func (o SecretBackendConnectionCassandraOutput) ToSecretBackendConnectionCassandraPtrOutput() SecretBackendConnectionCassandraPtrOutput

func (SecretBackendConnectionCassandraOutput) ToSecretBackendConnectionCassandraPtrOutputWithContext

func (o SecretBackendConnectionCassandraOutput) ToSecretBackendConnectionCassandraPtrOutputWithContext(ctx context.Context) SecretBackendConnectionCassandraPtrOutput

func (SecretBackendConnectionCassandraOutput) Username

The username to authenticate with.

type SecretBackendConnectionCassandraPtrInput

type SecretBackendConnectionCassandraPtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionCassandraPtrOutput() SecretBackendConnectionCassandraPtrOutput
	ToSecretBackendConnectionCassandraPtrOutputWithContext(context.Context) SecretBackendConnectionCassandraPtrOutput
}

SecretBackendConnectionCassandraPtrInput is an input type that accepts SecretBackendConnectionCassandraArgs, SecretBackendConnectionCassandraPtr and SecretBackendConnectionCassandraPtrOutput values. You can construct a concrete instance of `SecretBackendConnectionCassandraPtrInput` via:

        SecretBackendConnectionCassandraArgs{...}

or:

        nil

type SecretBackendConnectionCassandraPtrOutput

type SecretBackendConnectionCassandraPtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionCassandraPtrOutput) ConnectTimeout

The number of seconds to use as a connection timeout.

func (SecretBackendConnectionCassandraPtrOutput) Elem

func (SecretBackendConnectionCassandraPtrOutput) ElementType

func (SecretBackendConnectionCassandraPtrOutput) Hosts

The hosts to connect to.

func (SecretBackendConnectionCassandraPtrOutput) InsecureTls

Whether to skip verification of the server certificate when using TLS.

func (SecretBackendConnectionCassandraPtrOutput) Password

The password to authenticate with.

func (SecretBackendConnectionCassandraPtrOutput) PemBundle

Concatenated PEM blocks configuring the certificate chain.

func (SecretBackendConnectionCassandraPtrOutput) PemJson

A JSON structure configuring the certificate chain.

func (SecretBackendConnectionCassandraPtrOutput) Port

The default port to connect to if no port is specified as part of the host.

func (SecretBackendConnectionCassandraPtrOutput) ProtocolVersion

The CQL protocol version to use.

func (SecretBackendConnectionCassandraPtrOutput) Tls

Whether to use TLS when connecting to Cassandra.

func (SecretBackendConnectionCassandraPtrOutput) ToSecretBackendConnectionCassandraPtrOutput

func (o SecretBackendConnectionCassandraPtrOutput) ToSecretBackendConnectionCassandraPtrOutput() SecretBackendConnectionCassandraPtrOutput

func (SecretBackendConnectionCassandraPtrOutput) ToSecretBackendConnectionCassandraPtrOutputWithContext

func (o SecretBackendConnectionCassandraPtrOutput) ToSecretBackendConnectionCassandraPtrOutputWithContext(ctx context.Context) SecretBackendConnectionCassandraPtrOutput

func (SecretBackendConnectionCassandraPtrOutput) Username

The username to authenticate with.

type SecretBackendConnectionCouchbase

type SecretBackendConnectionCouchbase struct {
	// Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
	Base64Pem *string `pulumi:"base64Pem"`
	// Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
	BucketName *string `pulumi:"bucketName"`
	// The hosts to connect to.
	Hosts []string `pulumi:"hosts"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls *bool `pulumi:"insecureTls"`
	// The password to authenticate with.
	Password string `pulumi:"password"`
	// Whether to use TLS when connecting to Cassandra.
	Tls *bool `pulumi:"tls"`
	// The username to authenticate with.
	Username string `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
}

type SecretBackendConnectionCouchbaseArgs

type SecretBackendConnectionCouchbaseArgs struct {
	// Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
	Base64Pem pulumi.StringPtrInput `pulumi:"base64Pem"`
	// Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
	BucketName pulumi.StringPtrInput `pulumi:"bucketName"`
	// The hosts to connect to.
	Hosts pulumi.StringArrayInput `pulumi:"hosts"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls pulumi.BoolPtrInput `pulumi:"insecureTls"`
	// The password to authenticate with.
	Password pulumi.StringInput `pulumi:"password"`
	// Whether to use TLS when connecting to Cassandra.
	Tls pulumi.BoolPtrInput `pulumi:"tls"`
	// The username to authenticate with.
	Username pulumi.StringInput `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
}

func (SecretBackendConnectionCouchbaseArgs) ElementType

func (SecretBackendConnectionCouchbaseArgs) ToSecretBackendConnectionCouchbaseOutput

func (i SecretBackendConnectionCouchbaseArgs) ToSecretBackendConnectionCouchbaseOutput() SecretBackendConnectionCouchbaseOutput

func (SecretBackendConnectionCouchbaseArgs) ToSecretBackendConnectionCouchbaseOutputWithContext

func (i SecretBackendConnectionCouchbaseArgs) ToSecretBackendConnectionCouchbaseOutputWithContext(ctx context.Context) SecretBackendConnectionCouchbaseOutput

func (SecretBackendConnectionCouchbaseArgs) ToSecretBackendConnectionCouchbasePtrOutput

func (i SecretBackendConnectionCouchbaseArgs) ToSecretBackendConnectionCouchbasePtrOutput() SecretBackendConnectionCouchbasePtrOutput

func (SecretBackendConnectionCouchbaseArgs) ToSecretBackendConnectionCouchbasePtrOutputWithContext

func (i SecretBackendConnectionCouchbaseArgs) ToSecretBackendConnectionCouchbasePtrOutputWithContext(ctx context.Context) SecretBackendConnectionCouchbasePtrOutput

type SecretBackendConnectionCouchbaseInput

type SecretBackendConnectionCouchbaseInput interface {
	pulumi.Input

	ToSecretBackendConnectionCouchbaseOutput() SecretBackendConnectionCouchbaseOutput
	ToSecretBackendConnectionCouchbaseOutputWithContext(context.Context) SecretBackendConnectionCouchbaseOutput
}

SecretBackendConnectionCouchbaseInput is an input type that accepts SecretBackendConnectionCouchbaseArgs and SecretBackendConnectionCouchbaseOutput values. You can construct a concrete instance of `SecretBackendConnectionCouchbaseInput` via:

SecretBackendConnectionCouchbaseArgs{...}

type SecretBackendConnectionCouchbaseOutput

type SecretBackendConnectionCouchbaseOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionCouchbaseOutput) Base64Pem

Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.

func (SecretBackendConnectionCouchbaseOutput) BucketName

Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.

func (SecretBackendConnectionCouchbaseOutput) ElementType

func (SecretBackendConnectionCouchbaseOutput) Hosts

The hosts to connect to.

func (SecretBackendConnectionCouchbaseOutput) InsecureTls

Whether to skip verification of the server certificate when using TLS.

func (SecretBackendConnectionCouchbaseOutput) Password

The password to authenticate with.

func (SecretBackendConnectionCouchbaseOutput) Tls

Whether to use TLS when connecting to Cassandra.

func (SecretBackendConnectionCouchbaseOutput) ToSecretBackendConnectionCouchbaseOutput

func (o SecretBackendConnectionCouchbaseOutput) ToSecretBackendConnectionCouchbaseOutput() SecretBackendConnectionCouchbaseOutput

func (SecretBackendConnectionCouchbaseOutput) ToSecretBackendConnectionCouchbaseOutputWithContext

func (o SecretBackendConnectionCouchbaseOutput) ToSecretBackendConnectionCouchbaseOutputWithContext(ctx context.Context) SecretBackendConnectionCouchbaseOutput

func (SecretBackendConnectionCouchbaseOutput) ToSecretBackendConnectionCouchbasePtrOutput

func (o SecretBackendConnectionCouchbaseOutput) ToSecretBackendConnectionCouchbasePtrOutput() SecretBackendConnectionCouchbasePtrOutput

func (SecretBackendConnectionCouchbaseOutput) ToSecretBackendConnectionCouchbasePtrOutputWithContext

func (o SecretBackendConnectionCouchbaseOutput) ToSecretBackendConnectionCouchbasePtrOutputWithContext(ctx context.Context) SecretBackendConnectionCouchbasePtrOutput

func (SecretBackendConnectionCouchbaseOutput) Username

The username to authenticate with.

func (SecretBackendConnectionCouchbaseOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionCouchbasePtrInput

type SecretBackendConnectionCouchbasePtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionCouchbasePtrOutput() SecretBackendConnectionCouchbasePtrOutput
	ToSecretBackendConnectionCouchbasePtrOutputWithContext(context.Context) SecretBackendConnectionCouchbasePtrOutput
}

SecretBackendConnectionCouchbasePtrInput is an input type that accepts SecretBackendConnectionCouchbaseArgs, SecretBackendConnectionCouchbasePtr and SecretBackendConnectionCouchbasePtrOutput values. You can construct a concrete instance of `SecretBackendConnectionCouchbasePtrInput` via:

        SecretBackendConnectionCouchbaseArgs{...}

or:

        nil

type SecretBackendConnectionCouchbasePtrOutput

type SecretBackendConnectionCouchbasePtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionCouchbasePtrOutput) Base64Pem

Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.

func (SecretBackendConnectionCouchbasePtrOutput) BucketName

Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.

func (SecretBackendConnectionCouchbasePtrOutput) Elem

func (SecretBackendConnectionCouchbasePtrOutput) ElementType

func (SecretBackendConnectionCouchbasePtrOutput) Hosts

The hosts to connect to.

func (SecretBackendConnectionCouchbasePtrOutput) InsecureTls

Whether to skip verification of the server certificate when using TLS.

func (SecretBackendConnectionCouchbasePtrOutput) Password

The password to authenticate with.

func (SecretBackendConnectionCouchbasePtrOutput) Tls

Whether to use TLS when connecting to Cassandra.

func (SecretBackendConnectionCouchbasePtrOutput) ToSecretBackendConnectionCouchbasePtrOutput

func (o SecretBackendConnectionCouchbasePtrOutput) ToSecretBackendConnectionCouchbasePtrOutput() SecretBackendConnectionCouchbasePtrOutput

func (SecretBackendConnectionCouchbasePtrOutput) ToSecretBackendConnectionCouchbasePtrOutputWithContext

func (o SecretBackendConnectionCouchbasePtrOutput) ToSecretBackendConnectionCouchbasePtrOutputWithContext(ctx context.Context) SecretBackendConnectionCouchbasePtrOutput

func (SecretBackendConnectionCouchbasePtrOutput) Username

The username to authenticate with.

func (SecretBackendConnectionCouchbasePtrOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionElasticsearch

type SecretBackendConnectionElasticsearch struct {
	// The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
	CaCert *string `pulumi:"caCert"`
	// The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
	CaPath *string `pulumi:"caPath"`
	// The path to the certificate for the Elasticsearch client to present for communication.
	ClientCert *string `pulumi:"clientCert"`
	// The path to the key for the Elasticsearch client to use for communication.
	ClientKey *string `pulumi:"clientKey"`
	// Whether to disable certificate verification.
	Insecure *bool `pulumi:"insecure"`
	// The password to authenticate with.
	Password string `pulumi:"password"`
	// This, if set, is used to set the SNI host when connecting via TLS.
	TlsServerName *string `pulumi:"tlsServerName"`
	// The URL for Elasticsearch's API. https requires certificate
	// by trusted CA if used.
	Url string `pulumi:"url"`
	// The username to authenticate with.
	Username string `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
}

type SecretBackendConnectionElasticsearchArgs

type SecretBackendConnectionElasticsearchArgs struct {
	// The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
	CaCert pulumi.StringPtrInput `pulumi:"caCert"`
	// The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
	CaPath pulumi.StringPtrInput `pulumi:"caPath"`
	// The path to the certificate for the Elasticsearch client to present for communication.
	ClientCert pulumi.StringPtrInput `pulumi:"clientCert"`
	// The path to the key for the Elasticsearch client to use for communication.
	ClientKey pulumi.StringPtrInput `pulumi:"clientKey"`
	// Whether to disable certificate verification.
	Insecure pulumi.BoolPtrInput `pulumi:"insecure"`
	// The password to authenticate with.
	Password pulumi.StringInput `pulumi:"password"`
	// This, if set, is used to set the SNI host when connecting via TLS.
	TlsServerName pulumi.StringPtrInput `pulumi:"tlsServerName"`
	// The URL for Elasticsearch's API. https requires certificate
	// by trusted CA if used.
	Url pulumi.StringInput `pulumi:"url"`
	// The username to authenticate with.
	Username pulumi.StringInput `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
}

func (SecretBackendConnectionElasticsearchArgs) ElementType

func (SecretBackendConnectionElasticsearchArgs) ToSecretBackendConnectionElasticsearchOutput

func (i SecretBackendConnectionElasticsearchArgs) ToSecretBackendConnectionElasticsearchOutput() SecretBackendConnectionElasticsearchOutput

func (SecretBackendConnectionElasticsearchArgs) ToSecretBackendConnectionElasticsearchOutputWithContext

func (i SecretBackendConnectionElasticsearchArgs) ToSecretBackendConnectionElasticsearchOutputWithContext(ctx context.Context) SecretBackendConnectionElasticsearchOutput

func (SecretBackendConnectionElasticsearchArgs) ToSecretBackendConnectionElasticsearchPtrOutput

func (i SecretBackendConnectionElasticsearchArgs) ToSecretBackendConnectionElasticsearchPtrOutput() SecretBackendConnectionElasticsearchPtrOutput

func (SecretBackendConnectionElasticsearchArgs) ToSecretBackendConnectionElasticsearchPtrOutputWithContext

func (i SecretBackendConnectionElasticsearchArgs) ToSecretBackendConnectionElasticsearchPtrOutputWithContext(ctx context.Context) SecretBackendConnectionElasticsearchPtrOutput

type SecretBackendConnectionElasticsearchInput

type SecretBackendConnectionElasticsearchInput interface {
	pulumi.Input

	ToSecretBackendConnectionElasticsearchOutput() SecretBackendConnectionElasticsearchOutput
	ToSecretBackendConnectionElasticsearchOutputWithContext(context.Context) SecretBackendConnectionElasticsearchOutput
}

SecretBackendConnectionElasticsearchInput is an input type that accepts SecretBackendConnectionElasticsearchArgs and SecretBackendConnectionElasticsearchOutput values. You can construct a concrete instance of `SecretBackendConnectionElasticsearchInput` via:

SecretBackendConnectionElasticsearchArgs{...}

type SecretBackendConnectionElasticsearchOutput

type SecretBackendConnectionElasticsearchOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionElasticsearchOutput) CaCert

The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.

func (SecretBackendConnectionElasticsearchOutput) CaPath

The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.

func (SecretBackendConnectionElasticsearchOutput) ClientCert

The path to the certificate for the Elasticsearch client to present for communication.

func (SecretBackendConnectionElasticsearchOutput) ClientKey

The path to the key for the Elasticsearch client to use for communication.

func (SecretBackendConnectionElasticsearchOutput) ElementType

func (SecretBackendConnectionElasticsearchOutput) Insecure

Whether to disable certificate verification.

func (SecretBackendConnectionElasticsearchOutput) Password

The password to authenticate with.

func (SecretBackendConnectionElasticsearchOutput) TlsServerName

This, if set, is used to set the SNI host when connecting via TLS.

func (SecretBackendConnectionElasticsearchOutput) ToSecretBackendConnectionElasticsearchOutput

func (o SecretBackendConnectionElasticsearchOutput) ToSecretBackendConnectionElasticsearchOutput() SecretBackendConnectionElasticsearchOutput

func (SecretBackendConnectionElasticsearchOutput) ToSecretBackendConnectionElasticsearchOutputWithContext

func (o SecretBackendConnectionElasticsearchOutput) ToSecretBackendConnectionElasticsearchOutputWithContext(ctx context.Context) SecretBackendConnectionElasticsearchOutput

func (SecretBackendConnectionElasticsearchOutput) ToSecretBackendConnectionElasticsearchPtrOutput

func (o SecretBackendConnectionElasticsearchOutput) ToSecretBackendConnectionElasticsearchPtrOutput() SecretBackendConnectionElasticsearchPtrOutput

func (SecretBackendConnectionElasticsearchOutput) ToSecretBackendConnectionElasticsearchPtrOutputWithContext

func (o SecretBackendConnectionElasticsearchOutput) ToSecretBackendConnectionElasticsearchPtrOutputWithContext(ctx context.Context) SecretBackendConnectionElasticsearchPtrOutput

func (SecretBackendConnectionElasticsearchOutput) Url

The URL for Elasticsearch's API. https requires certificate by trusted CA if used.

func (SecretBackendConnectionElasticsearchOutput) Username

The username to authenticate with.

func (SecretBackendConnectionElasticsearchOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionElasticsearchPtrInput

type SecretBackendConnectionElasticsearchPtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionElasticsearchPtrOutput() SecretBackendConnectionElasticsearchPtrOutput
	ToSecretBackendConnectionElasticsearchPtrOutputWithContext(context.Context) SecretBackendConnectionElasticsearchPtrOutput
}

SecretBackendConnectionElasticsearchPtrInput is an input type that accepts SecretBackendConnectionElasticsearchArgs, SecretBackendConnectionElasticsearchPtr and SecretBackendConnectionElasticsearchPtrOutput values. You can construct a concrete instance of `SecretBackendConnectionElasticsearchPtrInput` via:

        SecretBackendConnectionElasticsearchArgs{...}

or:

        nil

type SecretBackendConnectionElasticsearchPtrOutput

type SecretBackendConnectionElasticsearchPtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionElasticsearchPtrOutput) CaCert

The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.

func (SecretBackendConnectionElasticsearchPtrOutput) CaPath

The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.

func (SecretBackendConnectionElasticsearchPtrOutput) ClientCert

The path to the certificate for the Elasticsearch client to present for communication.

func (SecretBackendConnectionElasticsearchPtrOutput) ClientKey

The path to the key for the Elasticsearch client to use for communication.

func (SecretBackendConnectionElasticsearchPtrOutput) Elem

func (SecretBackendConnectionElasticsearchPtrOutput) ElementType

func (SecretBackendConnectionElasticsearchPtrOutput) Insecure

Whether to disable certificate verification.

func (SecretBackendConnectionElasticsearchPtrOutput) Password

The password to authenticate with.

func (SecretBackendConnectionElasticsearchPtrOutput) TlsServerName

This, if set, is used to set the SNI host when connecting via TLS.

func (SecretBackendConnectionElasticsearchPtrOutput) ToSecretBackendConnectionElasticsearchPtrOutput

func (o SecretBackendConnectionElasticsearchPtrOutput) ToSecretBackendConnectionElasticsearchPtrOutput() SecretBackendConnectionElasticsearchPtrOutput

func (SecretBackendConnectionElasticsearchPtrOutput) ToSecretBackendConnectionElasticsearchPtrOutputWithContext

func (o SecretBackendConnectionElasticsearchPtrOutput) ToSecretBackendConnectionElasticsearchPtrOutputWithContext(ctx context.Context) SecretBackendConnectionElasticsearchPtrOutput

func (SecretBackendConnectionElasticsearchPtrOutput) Url

The URL for Elasticsearch's API. https requires certificate by trusted CA if used.

func (SecretBackendConnectionElasticsearchPtrOutput) Username

The username to authenticate with.

func (SecretBackendConnectionElasticsearchPtrOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionHana

type SecretBackendConnectionHana struct {
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// Disable special character escaping in username and password.
	DisableEscaping *bool `pulumi:"disableEscaping"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password *string `pulumi:"password"`
	// The username to authenticate with.
	Username *string `pulumi:"username"`
}

type SecretBackendConnectionHanaArgs

type SecretBackendConnectionHanaArgs struct {
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// Disable special character escaping in username and password.
	DisableEscaping pulumi.BoolPtrInput `pulumi:"disableEscaping"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// The username to authenticate with.
	Username pulumi.StringPtrInput `pulumi:"username"`
}

func (SecretBackendConnectionHanaArgs) ElementType

func (SecretBackendConnectionHanaArgs) ToSecretBackendConnectionHanaOutput

func (i SecretBackendConnectionHanaArgs) ToSecretBackendConnectionHanaOutput() SecretBackendConnectionHanaOutput

func (SecretBackendConnectionHanaArgs) ToSecretBackendConnectionHanaOutputWithContext

func (i SecretBackendConnectionHanaArgs) ToSecretBackendConnectionHanaOutputWithContext(ctx context.Context) SecretBackendConnectionHanaOutput

func (SecretBackendConnectionHanaArgs) ToSecretBackendConnectionHanaPtrOutput

func (i SecretBackendConnectionHanaArgs) ToSecretBackendConnectionHanaPtrOutput() SecretBackendConnectionHanaPtrOutput

func (SecretBackendConnectionHanaArgs) ToSecretBackendConnectionHanaPtrOutputWithContext

func (i SecretBackendConnectionHanaArgs) ToSecretBackendConnectionHanaPtrOutputWithContext(ctx context.Context) SecretBackendConnectionHanaPtrOutput

type SecretBackendConnectionHanaInput

type SecretBackendConnectionHanaInput interface {
	pulumi.Input

	ToSecretBackendConnectionHanaOutput() SecretBackendConnectionHanaOutput
	ToSecretBackendConnectionHanaOutputWithContext(context.Context) SecretBackendConnectionHanaOutput
}

SecretBackendConnectionHanaInput is an input type that accepts SecretBackendConnectionHanaArgs and SecretBackendConnectionHanaOutput values. You can construct a concrete instance of `SecretBackendConnectionHanaInput` via:

SecretBackendConnectionHanaArgs{...}

type SecretBackendConnectionHanaOutput

type SecretBackendConnectionHanaOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionHanaOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionHanaOutput) DisableEscaping

Disable special character escaping in username and password.

func (SecretBackendConnectionHanaOutput) ElementType

func (SecretBackendConnectionHanaOutput) MaxConnectionLifetime

func (o SecretBackendConnectionHanaOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionHanaOutput) MaxIdleConnections

func (o SecretBackendConnectionHanaOutput) MaxIdleConnections() pulumi.IntPtrOutput

The maximum number of idle connections to maintain.

func (SecretBackendConnectionHanaOutput) MaxOpenConnections

func (o SecretBackendConnectionHanaOutput) MaxOpenConnections() pulumi.IntPtrOutput

The maximum number of open connections to use.

func (SecretBackendConnectionHanaOutput) Password

The password to authenticate with.

func (SecretBackendConnectionHanaOutput) ToSecretBackendConnectionHanaOutput

func (o SecretBackendConnectionHanaOutput) ToSecretBackendConnectionHanaOutput() SecretBackendConnectionHanaOutput

func (SecretBackendConnectionHanaOutput) ToSecretBackendConnectionHanaOutputWithContext

func (o SecretBackendConnectionHanaOutput) ToSecretBackendConnectionHanaOutputWithContext(ctx context.Context) SecretBackendConnectionHanaOutput

func (SecretBackendConnectionHanaOutput) ToSecretBackendConnectionHanaPtrOutput

func (o SecretBackendConnectionHanaOutput) ToSecretBackendConnectionHanaPtrOutput() SecretBackendConnectionHanaPtrOutput

func (SecretBackendConnectionHanaOutput) ToSecretBackendConnectionHanaPtrOutputWithContext

func (o SecretBackendConnectionHanaOutput) ToSecretBackendConnectionHanaPtrOutputWithContext(ctx context.Context) SecretBackendConnectionHanaPtrOutput

func (SecretBackendConnectionHanaOutput) Username

The username to authenticate with.

type SecretBackendConnectionHanaPtrInput

type SecretBackendConnectionHanaPtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionHanaPtrOutput() SecretBackendConnectionHanaPtrOutput
	ToSecretBackendConnectionHanaPtrOutputWithContext(context.Context) SecretBackendConnectionHanaPtrOutput
}

SecretBackendConnectionHanaPtrInput is an input type that accepts SecretBackendConnectionHanaArgs, SecretBackendConnectionHanaPtr and SecretBackendConnectionHanaPtrOutput values. You can construct a concrete instance of `SecretBackendConnectionHanaPtrInput` via:

        SecretBackendConnectionHanaArgs{...}

or:

        nil

type SecretBackendConnectionHanaPtrOutput

type SecretBackendConnectionHanaPtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionHanaPtrOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionHanaPtrOutput) DisableEscaping

Disable special character escaping in username and password.

func (SecretBackendConnectionHanaPtrOutput) Elem

func (SecretBackendConnectionHanaPtrOutput) ElementType

func (SecretBackendConnectionHanaPtrOutput) MaxConnectionLifetime

func (o SecretBackendConnectionHanaPtrOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionHanaPtrOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionHanaPtrOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionHanaPtrOutput) Password

The password to authenticate with.

func (SecretBackendConnectionHanaPtrOutput) ToSecretBackendConnectionHanaPtrOutput

func (o SecretBackendConnectionHanaPtrOutput) ToSecretBackendConnectionHanaPtrOutput() SecretBackendConnectionHanaPtrOutput

func (SecretBackendConnectionHanaPtrOutput) ToSecretBackendConnectionHanaPtrOutputWithContext

func (o SecretBackendConnectionHanaPtrOutput) ToSecretBackendConnectionHanaPtrOutputWithContext(ctx context.Context) SecretBackendConnectionHanaPtrOutput

func (SecretBackendConnectionHanaPtrOutput) Username

The username to authenticate with.

type SecretBackendConnectionInfluxdb

type SecretBackendConnectionInfluxdb struct {
	// The number of seconds to use as a connection
	// timeout.
	ConnectTimeout *int `pulumi:"connectTimeout"`
	// The host to connect to.
	Host string `pulumi:"host"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls *bool `pulumi:"insecureTls"`
	// The password to authenticate with.
	Password string `pulumi:"password"`
	// Concatenated PEM blocks configuring the certificate
	// chain.
	PemBundle *string `pulumi:"pemBundle"`
	// A JSON structure configuring the certificate chain.
	PemJson *string `pulumi:"pemJson"`
	// The default port to connect to if no port is specified as
	// part of the host.
	Port *int `pulumi:"port"`
	// Whether to use TLS when connecting to Cassandra.
	Tls *bool `pulumi:"tls"`
	// The username to authenticate with.
	Username string `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
}

type SecretBackendConnectionInfluxdbArgs

type SecretBackendConnectionInfluxdbArgs struct {
	// The number of seconds to use as a connection
	// timeout.
	ConnectTimeout pulumi.IntPtrInput `pulumi:"connectTimeout"`
	// The host to connect to.
	Host pulumi.StringInput `pulumi:"host"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls pulumi.BoolPtrInput `pulumi:"insecureTls"`
	// The password to authenticate with.
	Password pulumi.StringInput `pulumi:"password"`
	// Concatenated PEM blocks configuring the certificate
	// chain.
	PemBundle pulumi.StringPtrInput `pulumi:"pemBundle"`
	// A JSON structure configuring the certificate chain.
	PemJson pulumi.StringPtrInput `pulumi:"pemJson"`
	// The default port to connect to if no port is specified as
	// part of the host.
	Port pulumi.IntPtrInput `pulumi:"port"`
	// Whether to use TLS when connecting to Cassandra.
	Tls pulumi.BoolPtrInput `pulumi:"tls"`
	// The username to authenticate with.
	Username pulumi.StringInput `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
}

func (SecretBackendConnectionInfluxdbArgs) ElementType

func (SecretBackendConnectionInfluxdbArgs) ToSecretBackendConnectionInfluxdbOutput

func (i SecretBackendConnectionInfluxdbArgs) ToSecretBackendConnectionInfluxdbOutput() SecretBackendConnectionInfluxdbOutput

func (SecretBackendConnectionInfluxdbArgs) ToSecretBackendConnectionInfluxdbOutputWithContext

func (i SecretBackendConnectionInfluxdbArgs) ToSecretBackendConnectionInfluxdbOutputWithContext(ctx context.Context) SecretBackendConnectionInfluxdbOutput

func (SecretBackendConnectionInfluxdbArgs) ToSecretBackendConnectionInfluxdbPtrOutput

func (i SecretBackendConnectionInfluxdbArgs) ToSecretBackendConnectionInfluxdbPtrOutput() SecretBackendConnectionInfluxdbPtrOutput

func (SecretBackendConnectionInfluxdbArgs) ToSecretBackendConnectionInfluxdbPtrOutputWithContext

func (i SecretBackendConnectionInfluxdbArgs) ToSecretBackendConnectionInfluxdbPtrOutputWithContext(ctx context.Context) SecretBackendConnectionInfluxdbPtrOutput

type SecretBackendConnectionInfluxdbInput

type SecretBackendConnectionInfluxdbInput interface {
	pulumi.Input

	ToSecretBackendConnectionInfluxdbOutput() SecretBackendConnectionInfluxdbOutput
	ToSecretBackendConnectionInfluxdbOutputWithContext(context.Context) SecretBackendConnectionInfluxdbOutput
}

SecretBackendConnectionInfluxdbInput is an input type that accepts SecretBackendConnectionInfluxdbArgs and SecretBackendConnectionInfluxdbOutput values. You can construct a concrete instance of `SecretBackendConnectionInfluxdbInput` via:

SecretBackendConnectionInfluxdbArgs{...}

type SecretBackendConnectionInfluxdbOutput

type SecretBackendConnectionInfluxdbOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionInfluxdbOutput) ConnectTimeout

The number of seconds to use as a connection timeout.

func (SecretBackendConnectionInfluxdbOutput) ElementType

func (SecretBackendConnectionInfluxdbOutput) Host

The host to connect to.

func (SecretBackendConnectionInfluxdbOutput) InsecureTls

Whether to skip verification of the server certificate when using TLS.

func (SecretBackendConnectionInfluxdbOutput) Password

The password to authenticate with.

func (SecretBackendConnectionInfluxdbOutput) PemBundle

Concatenated PEM blocks configuring the certificate chain.

func (SecretBackendConnectionInfluxdbOutput) PemJson

A JSON structure configuring the certificate chain.

func (SecretBackendConnectionInfluxdbOutput) Port

The default port to connect to if no port is specified as part of the host.

func (SecretBackendConnectionInfluxdbOutput) Tls

Whether to use TLS when connecting to Cassandra.

func (SecretBackendConnectionInfluxdbOutput) ToSecretBackendConnectionInfluxdbOutput

func (o SecretBackendConnectionInfluxdbOutput) ToSecretBackendConnectionInfluxdbOutput() SecretBackendConnectionInfluxdbOutput

func (SecretBackendConnectionInfluxdbOutput) ToSecretBackendConnectionInfluxdbOutputWithContext

func (o SecretBackendConnectionInfluxdbOutput) ToSecretBackendConnectionInfluxdbOutputWithContext(ctx context.Context) SecretBackendConnectionInfluxdbOutput

func (SecretBackendConnectionInfluxdbOutput) ToSecretBackendConnectionInfluxdbPtrOutput

func (o SecretBackendConnectionInfluxdbOutput) ToSecretBackendConnectionInfluxdbPtrOutput() SecretBackendConnectionInfluxdbPtrOutput

func (SecretBackendConnectionInfluxdbOutput) ToSecretBackendConnectionInfluxdbPtrOutputWithContext

func (o SecretBackendConnectionInfluxdbOutput) ToSecretBackendConnectionInfluxdbPtrOutputWithContext(ctx context.Context) SecretBackendConnectionInfluxdbPtrOutput

func (SecretBackendConnectionInfluxdbOutput) Username

The username to authenticate with.

func (SecretBackendConnectionInfluxdbOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionInfluxdbPtrInput

type SecretBackendConnectionInfluxdbPtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionInfluxdbPtrOutput() SecretBackendConnectionInfluxdbPtrOutput
	ToSecretBackendConnectionInfluxdbPtrOutputWithContext(context.Context) SecretBackendConnectionInfluxdbPtrOutput
}

SecretBackendConnectionInfluxdbPtrInput is an input type that accepts SecretBackendConnectionInfluxdbArgs, SecretBackendConnectionInfluxdbPtr and SecretBackendConnectionInfluxdbPtrOutput values. You can construct a concrete instance of `SecretBackendConnectionInfluxdbPtrInput` via:

        SecretBackendConnectionInfluxdbArgs{...}

or:

        nil

type SecretBackendConnectionInfluxdbPtrOutput

type SecretBackendConnectionInfluxdbPtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionInfluxdbPtrOutput) ConnectTimeout

The number of seconds to use as a connection timeout.

func (SecretBackendConnectionInfluxdbPtrOutput) Elem

func (SecretBackendConnectionInfluxdbPtrOutput) ElementType

func (SecretBackendConnectionInfluxdbPtrOutput) Host

The host to connect to.

func (SecretBackendConnectionInfluxdbPtrOutput) InsecureTls

Whether to skip verification of the server certificate when using TLS.

func (SecretBackendConnectionInfluxdbPtrOutput) Password

The password to authenticate with.

func (SecretBackendConnectionInfluxdbPtrOutput) PemBundle

Concatenated PEM blocks configuring the certificate chain.

func (SecretBackendConnectionInfluxdbPtrOutput) PemJson

A JSON structure configuring the certificate chain.

func (SecretBackendConnectionInfluxdbPtrOutput) Port

The default port to connect to if no port is specified as part of the host.

func (SecretBackendConnectionInfluxdbPtrOutput) Tls

Whether to use TLS when connecting to Cassandra.

func (SecretBackendConnectionInfluxdbPtrOutput) ToSecretBackendConnectionInfluxdbPtrOutput

func (o SecretBackendConnectionInfluxdbPtrOutput) ToSecretBackendConnectionInfluxdbPtrOutput() SecretBackendConnectionInfluxdbPtrOutput

func (SecretBackendConnectionInfluxdbPtrOutput) ToSecretBackendConnectionInfluxdbPtrOutputWithContext

func (o SecretBackendConnectionInfluxdbPtrOutput) ToSecretBackendConnectionInfluxdbPtrOutputWithContext(ctx context.Context) SecretBackendConnectionInfluxdbPtrOutput

func (SecretBackendConnectionInfluxdbPtrOutput) Username

The username to authenticate with.

func (SecretBackendConnectionInfluxdbPtrOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionInput

type SecretBackendConnectionInput interface {
	pulumi.Input

	ToSecretBackendConnectionOutput() SecretBackendConnectionOutput
	ToSecretBackendConnectionOutputWithContext(ctx context.Context) SecretBackendConnectionOutput
}

type SecretBackendConnectionMap

type SecretBackendConnectionMap map[string]SecretBackendConnectionInput

func (SecretBackendConnectionMap) ElementType

func (SecretBackendConnectionMap) ElementType() reflect.Type

func (SecretBackendConnectionMap) ToSecretBackendConnectionMapOutput

func (i SecretBackendConnectionMap) ToSecretBackendConnectionMapOutput() SecretBackendConnectionMapOutput

func (SecretBackendConnectionMap) ToSecretBackendConnectionMapOutputWithContext

func (i SecretBackendConnectionMap) ToSecretBackendConnectionMapOutputWithContext(ctx context.Context) SecretBackendConnectionMapOutput

type SecretBackendConnectionMapInput

type SecretBackendConnectionMapInput interface {
	pulumi.Input

	ToSecretBackendConnectionMapOutput() SecretBackendConnectionMapOutput
	ToSecretBackendConnectionMapOutputWithContext(context.Context) SecretBackendConnectionMapOutput
}

SecretBackendConnectionMapInput is an input type that accepts SecretBackendConnectionMap and SecretBackendConnectionMapOutput values. You can construct a concrete instance of `SecretBackendConnectionMapInput` via:

SecretBackendConnectionMap{ "key": SecretBackendConnectionArgs{...} }

type SecretBackendConnectionMapOutput

type SecretBackendConnectionMapOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMapOutput) ElementType

func (SecretBackendConnectionMapOutput) MapIndex

func (SecretBackendConnectionMapOutput) ToSecretBackendConnectionMapOutput

func (o SecretBackendConnectionMapOutput) ToSecretBackendConnectionMapOutput() SecretBackendConnectionMapOutput

func (SecretBackendConnectionMapOutput) ToSecretBackendConnectionMapOutputWithContext

func (o SecretBackendConnectionMapOutput) ToSecretBackendConnectionMapOutputWithContext(ctx context.Context) SecretBackendConnectionMapOutput

type SecretBackendConnectionMongodb

type SecretBackendConnectionMongodb struct {
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password *string `pulumi:"password"`
	// The username to authenticate with.
	Username *string `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
}

type SecretBackendConnectionMongodbArgs

type SecretBackendConnectionMongodbArgs struct {
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// The username to authenticate with.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
}

func (SecretBackendConnectionMongodbArgs) ElementType

func (SecretBackendConnectionMongodbArgs) ToSecretBackendConnectionMongodbOutput

func (i SecretBackendConnectionMongodbArgs) ToSecretBackendConnectionMongodbOutput() SecretBackendConnectionMongodbOutput

func (SecretBackendConnectionMongodbArgs) ToSecretBackendConnectionMongodbOutputWithContext

func (i SecretBackendConnectionMongodbArgs) ToSecretBackendConnectionMongodbOutputWithContext(ctx context.Context) SecretBackendConnectionMongodbOutput

func (SecretBackendConnectionMongodbArgs) ToSecretBackendConnectionMongodbPtrOutput

func (i SecretBackendConnectionMongodbArgs) ToSecretBackendConnectionMongodbPtrOutput() SecretBackendConnectionMongodbPtrOutput

func (SecretBackendConnectionMongodbArgs) ToSecretBackendConnectionMongodbPtrOutputWithContext

func (i SecretBackendConnectionMongodbArgs) ToSecretBackendConnectionMongodbPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMongodbPtrOutput

type SecretBackendConnectionMongodbInput

type SecretBackendConnectionMongodbInput interface {
	pulumi.Input

	ToSecretBackendConnectionMongodbOutput() SecretBackendConnectionMongodbOutput
	ToSecretBackendConnectionMongodbOutputWithContext(context.Context) SecretBackendConnectionMongodbOutput
}

SecretBackendConnectionMongodbInput is an input type that accepts SecretBackendConnectionMongodbArgs and SecretBackendConnectionMongodbOutput values. You can construct a concrete instance of `SecretBackendConnectionMongodbInput` via:

SecretBackendConnectionMongodbArgs{...}

type SecretBackendConnectionMongodbOutput

type SecretBackendConnectionMongodbOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMongodbOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionMongodbOutput) ElementType

func (SecretBackendConnectionMongodbOutput) MaxConnectionLifetime

func (o SecretBackendConnectionMongodbOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionMongodbOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionMongodbOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionMongodbOutput) Password

The password to authenticate with.

func (SecretBackendConnectionMongodbOutput) ToSecretBackendConnectionMongodbOutput

func (o SecretBackendConnectionMongodbOutput) ToSecretBackendConnectionMongodbOutput() SecretBackendConnectionMongodbOutput

func (SecretBackendConnectionMongodbOutput) ToSecretBackendConnectionMongodbOutputWithContext

func (o SecretBackendConnectionMongodbOutput) ToSecretBackendConnectionMongodbOutputWithContext(ctx context.Context) SecretBackendConnectionMongodbOutput

func (SecretBackendConnectionMongodbOutput) ToSecretBackendConnectionMongodbPtrOutput

func (o SecretBackendConnectionMongodbOutput) ToSecretBackendConnectionMongodbPtrOutput() SecretBackendConnectionMongodbPtrOutput

func (SecretBackendConnectionMongodbOutput) ToSecretBackendConnectionMongodbPtrOutputWithContext

func (o SecretBackendConnectionMongodbOutput) ToSecretBackendConnectionMongodbPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMongodbPtrOutput

func (SecretBackendConnectionMongodbOutput) Username

The username to authenticate with.

func (SecretBackendConnectionMongodbOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionMongodbPtrInput

type SecretBackendConnectionMongodbPtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionMongodbPtrOutput() SecretBackendConnectionMongodbPtrOutput
	ToSecretBackendConnectionMongodbPtrOutputWithContext(context.Context) SecretBackendConnectionMongodbPtrOutput
}

SecretBackendConnectionMongodbPtrInput is an input type that accepts SecretBackendConnectionMongodbArgs, SecretBackendConnectionMongodbPtr and SecretBackendConnectionMongodbPtrOutput values. You can construct a concrete instance of `SecretBackendConnectionMongodbPtrInput` via:

        SecretBackendConnectionMongodbArgs{...}

or:

        nil

type SecretBackendConnectionMongodbPtrOutput

type SecretBackendConnectionMongodbPtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMongodbPtrOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionMongodbPtrOutput) Elem

func (SecretBackendConnectionMongodbPtrOutput) ElementType

func (SecretBackendConnectionMongodbPtrOutput) MaxConnectionLifetime

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionMongodbPtrOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionMongodbPtrOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionMongodbPtrOutput) Password

The password to authenticate with.

func (SecretBackendConnectionMongodbPtrOutput) ToSecretBackendConnectionMongodbPtrOutput

func (o SecretBackendConnectionMongodbPtrOutput) ToSecretBackendConnectionMongodbPtrOutput() SecretBackendConnectionMongodbPtrOutput

func (SecretBackendConnectionMongodbPtrOutput) ToSecretBackendConnectionMongodbPtrOutputWithContext

func (o SecretBackendConnectionMongodbPtrOutput) ToSecretBackendConnectionMongodbPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMongodbPtrOutput

func (SecretBackendConnectionMongodbPtrOutput) Username

The username to authenticate with.

func (SecretBackendConnectionMongodbPtrOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionMongodbatlas

type SecretBackendConnectionMongodbatlas struct {
	// The Private Programmatic API Key used to connect with MongoDB Atlas API.
	PrivateKey string `pulumi:"privateKey"`
	// The Project ID the Database User should be created within.
	ProjectId string `pulumi:"projectId"`
	// The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
	PublicKey string `pulumi:"publicKey"`
}

type SecretBackendConnectionMongodbatlasArgs

type SecretBackendConnectionMongodbatlasArgs struct {
	// The Private Programmatic API Key used to connect with MongoDB Atlas API.
	PrivateKey pulumi.StringInput `pulumi:"privateKey"`
	// The Project ID the Database User should be created within.
	ProjectId pulumi.StringInput `pulumi:"projectId"`
	// The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
	PublicKey pulumi.StringInput `pulumi:"publicKey"`
}

func (SecretBackendConnectionMongodbatlasArgs) ElementType

func (SecretBackendConnectionMongodbatlasArgs) ToSecretBackendConnectionMongodbatlasOutput

func (i SecretBackendConnectionMongodbatlasArgs) ToSecretBackendConnectionMongodbatlasOutput() SecretBackendConnectionMongodbatlasOutput

func (SecretBackendConnectionMongodbatlasArgs) ToSecretBackendConnectionMongodbatlasOutputWithContext

func (i SecretBackendConnectionMongodbatlasArgs) ToSecretBackendConnectionMongodbatlasOutputWithContext(ctx context.Context) SecretBackendConnectionMongodbatlasOutput

func (SecretBackendConnectionMongodbatlasArgs) ToSecretBackendConnectionMongodbatlasPtrOutput

func (i SecretBackendConnectionMongodbatlasArgs) ToSecretBackendConnectionMongodbatlasPtrOutput() SecretBackendConnectionMongodbatlasPtrOutput

func (SecretBackendConnectionMongodbatlasArgs) ToSecretBackendConnectionMongodbatlasPtrOutputWithContext

func (i SecretBackendConnectionMongodbatlasArgs) ToSecretBackendConnectionMongodbatlasPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMongodbatlasPtrOutput

type SecretBackendConnectionMongodbatlasInput

type SecretBackendConnectionMongodbatlasInput interface {
	pulumi.Input

	ToSecretBackendConnectionMongodbatlasOutput() SecretBackendConnectionMongodbatlasOutput
	ToSecretBackendConnectionMongodbatlasOutputWithContext(context.Context) SecretBackendConnectionMongodbatlasOutput
}

SecretBackendConnectionMongodbatlasInput is an input type that accepts SecretBackendConnectionMongodbatlasArgs and SecretBackendConnectionMongodbatlasOutput values. You can construct a concrete instance of `SecretBackendConnectionMongodbatlasInput` via:

SecretBackendConnectionMongodbatlasArgs{...}

type SecretBackendConnectionMongodbatlasOutput

type SecretBackendConnectionMongodbatlasOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMongodbatlasOutput) ElementType

func (SecretBackendConnectionMongodbatlasOutput) PrivateKey

The Private Programmatic API Key used to connect with MongoDB Atlas API.

func (SecretBackendConnectionMongodbatlasOutput) ProjectId

The Project ID the Database User should be created within.

func (SecretBackendConnectionMongodbatlasOutput) PublicKey

The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.

func (SecretBackendConnectionMongodbatlasOutput) ToSecretBackendConnectionMongodbatlasOutput

func (o SecretBackendConnectionMongodbatlasOutput) ToSecretBackendConnectionMongodbatlasOutput() SecretBackendConnectionMongodbatlasOutput

func (SecretBackendConnectionMongodbatlasOutput) ToSecretBackendConnectionMongodbatlasOutputWithContext

func (o SecretBackendConnectionMongodbatlasOutput) ToSecretBackendConnectionMongodbatlasOutputWithContext(ctx context.Context) SecretBackendConnectionMongodbatlasOutput

func (SecretBackendConnectionMongodbatlasOutput) ToSecretBackendConnectionMongodbatlasPtrOutput

func (o SecretBackendConnectionMongodbatlasOutput) ToSecretBackendConnectionMongodbatlasPtrOutput() SecretBackendConnectionMongodbatlasPtrOutput

func (SecretBackendConnectionMongodbatlasOutput) ToSecretBackendConnectionMongodbatlasPtrOutputWithContext

func (o SecretBackendConnectionMongodbatlasOutput) ToSecretBackendConnectionMongodbatlasPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMongodbatlasPtrOutput

type SecretBackendConnectionMongodbatlasPtrInput

type SecretBackendConnectionMongodbatlasPtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionMongodbatlasPtrOutput() SecretBackendConnectionMongodbatlasPtrOutput
	ToSecretBackendConnectionMongodbatlasPtrOutputWithContext(context.Context) SecretBackendConnectionMongodbatlasPtrOutput
}

SecretBackendConnectionMongodbatlasPtrInput is an input type that accepts SecretBackendConnectionMongodbatlasArgs, SecretBackendConnectionMongodbatlasPtr and SecretBackendConnectionMongodbatlasPtrOutput values. You can construct a concrete instance of `SecretBackendConnectionMongodbatlasPtrInput` via:

        SecretBackendConnectionMongodbatlasArgs{...}

or:

        nil

type SecretBackendConnectionMongodbatlasPtrOutput

type SecretBackendConnectionMongodbatlasPtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMongodbatlasPtrOutput) Elem

func (SecretBackendConnectionMongodbatlasPtrOutput) ElementType

func (SecretBackendConnectionMongodbatlasPtrOutput) PrivateKey

The Private Programmatic API Key used to connect with MongoDB Atlas API.

func (SecretBackendConnectionMongodbatlasPtrOutput) ProjectId

The Project ID the Database User should be created within.

func (SecretBackendConnectionMongodbatlasPtrOutput) PublicKey

The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.

func (SecretBackendConnectionMongodbatlasPtrOutput) ToSecretBackendConnectionMongodbatlasPtrOutput

func (o SecretBackendConnectionMongodbatlasPtrOutput) ToSecretBackendConnectionMongodbatlasPtrOutput() SecretBackendConnectionMongodbatlasPtrOutput

func (SecretBackendConnectionMongodbatlasPtrOutput) ToSecretBackendConnectionMongodbatlasPtrOutputWithContext

func (o SecretBackendConnectionMongodbatlasPtrOutput) ToSecretBackendConnectionMongodbatlasPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMongodbatlasPtrOutput

type SecretBackendConnectionMssql

type SecretBackendConnectionMssql struct {
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// For Vault v1.9+. Set to true when the target is a
	// Contained Database, e.g. AzureSQL.
	// See the [Vault
	// docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
	ContainedDb *bool `pulumi:"containedDb"`
	// Disable special character escaping in username and password.
	DisableEscaping *bool `pulumi:"disableEscaping"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password *string `pulumi:"password"`
	// The username to authenticate with.
	Username *string `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
}

type SecretBackendConnectionMssqlArgs

type SecretBackendConnectionMssqlArgs struct {
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// For Vault v1.9+. Set to true when the target is a
	// Contained Database, e.g. AzureSQL.
	// See the [Vault
	// docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
	ContainedDb pulumi.BoolPtrInput `pulumi:"containedDb"`
	// Disable special character escaping in username and password.
	DisableEscaping pulumi.BoolPtrInput `pulumi:"disableEscaping"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// The username to authenticate with.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
}

func (SecretBackendConnectionMssqlArgs) ElementType

func (SecretBackendConnectionMssqlArgs) ToSecretBackendConnectionMssqlOutput

func (i SecretBackendConnectionMssqlArgs) ToSecretBackendConnectionMssqlOutput() SecretBackendConnectionMssqlOutput

func (SecretBackendConnectionMssqlArgs) ToSecretBackendConnectionMssqlOutputWithContext

func (i SecretBackendConnectionMssqlArgs) ToSecretBackendConnectionMssqlOutputWithContext(ctx context.Context) SecretBackendConnectionMssqlOutput

func (SecretBackendConnectionMssqlArgs) ToSecretBackendConnectionMssqlPtrOutput

func (i SecretBackendConnectionMssqlArgs) ToSecretBackendConnectionMssqlPtrOutput() SecretBackendConnectionMssqlPtrOutput

func (SecretBackendConnectionMssqlArgs) ToSecretBackendConnectionMssqlPtrOutputWithContext

func (i SecretBackendConnectionMssqlArgs) ToSecretBackendConnectionMssqlPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMssqlPtrOutput

type SecretBackendConnectionMssqlInput

type SecretBackendConnectionMssqlInput interface {
	pulumi.Input

	ToSecretBackendConnectionMssqlOutput() SecretBackendConnectionMssqlOutput
	ToSecretBackendConnectionMssqlOutputWithContext(context.Context) SecretBackendConnectionMssqlOutput
}

SecretBackendConnectionMssqlInput is an input type that accepts SecretBackendConnectionMssqlArgs and SecretBackendConnectionMssqlOutput values. You can construct a concrete instance of `SecretBackendConnectionMssqlInput` via:

SecretBackendConnectionMssqlArgs{...}

type SecretBackendConnectionMssqlOutput

type SecretBackendConnectionMssqlOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMssqlOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionMssqlOutput) ContainedDb

For Vault v1.9+. Set to true when the target is a Contained Database, e.g. AzureSQL. See the [Vault docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)

func (SecretBackendConnectionMssqlOutput) DisableEscaping

Disable special character escaping in username and password.

func (SecretBackendConnectionMssqlOutput) ElementType

func (SecretBackendConnectionMssqlOutput) MaxConnectionLifetime

func (o SecretBackendConnectionMssqlOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionMssqlOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionMssqlOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionMssqlOutput) Password

The password to authenticate with.

func (SecretBackendConnectionMssqlOutput) ToSecretBackendConnectionMssqlOutput

func (o SecretBackendConnectionMssqlOutput) ToSecretBackendConnectionMssqlOutput() SecretBackendConnectionMssqlOutput

func (SecretBackendConnectionMssqlOutput) ToSecretBackendConnectionMssqlOutputWithContext

func (o SecretBackendConnectionMssqlOutput) ToSecretBackendConnectionMssqlOutputWithContext(ctx context.Context) SecretBackendConnectionMssqlOutput

func (SecretBackendConnectionMssqlOutput) ToSecretBackendConnectionMssqlPtrOutput

func (o SecretBackendConnectionMssqlOutput) ToSecretBackendConnectionMssqlPtrOutput() SecretBackendConnectionMssqlPtrOutput

func (SecretBackendConnectionMssqlOutput) ToSecretBackendConnectionMssqlPtrOutputWithContext

func (o SecretBackendConnectionMssqlOutput) ToSecretBackendConnectionMssqlPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMssqlPtrOutput

func (SecretBackendConnectionMssqlOutput) Username

The username to authenticate with.

func (SecretBackendConnectionMssqlOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionMssqlPtrInput

type SecretBackendConnectionMssqlPtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionMssqlPtrOutput() SecretBackendConnectionMssqlPtrOutput
	ToSecretBackendConnectionMssqlPtrOutputWithContext(context.Context) SecretBackendConnectionMssqlPtrOutput
}

SecretBackendConnectionMssqlPtrInput is an input type that accepts SecretBackendConnectionMssqlArgs, SecretBackendConnectionMssqlPtr and SecretBackendConnectionMssqlPtrOutput values. You can construct a concrete instance of `SecretBackendConnectionMssqlPtrInput` via:

        SecretBackendConnectionMssqlArgs{...}

or:

        nil

type SecretBackendConnectionMssqlPtrOutput

type SecretBackendConnectionMssqlPtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMssqlPtrOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionMssqlPtrOutput) ContainedDb

For Vault v1.9+. Set to true when the target is a Contained Database, e.g. AzureSQL. See the [Vault docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)

func (SecretBackendConnectionMssqlPtrOutput) DisableEscaping

Disable special character escaping in username and password.

func (SecretBackendConnectionMssqlPtrOutput) Elem

func (SecretBackendConnectionMssqlPtrOutput) ElementType

func (SecretBackendConnectionMssqlPtrOutput) MaxConnectionLifetime

func (o SecretBackendConnectionMssqlPtrOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionMssqlPtrOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionMssqlPtrOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionMssqlPtrOutput) Password

The password to authenticate with.

func (SecretBackendConnectionMssqlPtrOutput) ToSecretBackendConnectionMssqlPtrOutput

func (o SecretBackendConnectionMssqlPtrOutput) ToSecretBackendConnectionMssqlPtrOutput() SecretBackendConnectionMssqlPtrOutput

func (SecretBackendConnectionMssqlPtrOutput) ToSecretBackendConnectionMssqlPtrOutputWithContext

func (o SecretBackendConnectionMssqlPtrOutput) ToSecretBackendConnectionMssqlPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMssqlPtrOutput

func (SecretBackendConnectionMssqlPtrOutput) Username

The username to authenticate with.

func (SecretBackendConnectionMssqlPtrOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionMysql

type SecretBackendConnectionMysql struct {
	// Enable IAM authentication to a Google Cloud instance when set to `gcpIam`
	AuthType *string `pulumi:"authType"`
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password *string `pulumi:"password"`
	// JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.
	ServiceAccountJson *string `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa *string `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey *string `pulumi:"tlsCertificateKey"`
	// The username to authenticate with.
	Username *string `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
}

type SecretBackendConnectionMysqlArgs

type SecretBackendConnectionMysqlArgs struct {
	// Enable IAM authentication to a Google Cloud instance when set to `gcpIam`
	AuthType pulumi.StringPtrInput `pulumi:"authType"`
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.
	ServiceAccountJson pulumi.StringPtrInput `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa pulumi.StringPtrInput `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey pulumi.StringPtrInput `pulumi:"tlsCertificateKey"`
	// The username to authenticate with.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
}

func (SecretBackendConnectionMysqlArgs) ElementType

func (SecretBackendConnectionMysqlArgs) ToSecretBackendConnectionMysqlOutput

func (i SecretBackendConnectionMysqlArgs) ToSecretBackendConnectionMysqlOutput() SecretBackendConnectionMysqlOutput

func (SecretBackendConnectionMysqlArgs) ToSecretBackendConnectionMysqlOutputWithContext

func (i SecretBackendConnectionMysqlArgs) ToSecretBackendConnectionMysqlOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlOutput

func (SecretBackendConnectionMysqlArgs) ToSecretBackendConnectionMysqlPtrOutput

func (i SecretBackendConnectionMysqlArgs) ToSecretBackendConnectionMysqlPtrOutput() SecretBackendConnectionMysqlPtrOutput

func (SecretBackendConnectionMysqlArgs) ToSecretBackendConnectionMysqlPtrOutputWithContext

func (i SecretBackendConnectionMysqlArgs) ToSecretBackendConnectionMysqlPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlPtrOutput

type SecretBackendConnectionMysqlAurora

type SecretBackendConnectionMysqlAurora struct {
	// Enable IAM authentication to a Google Cloud instance when set to `gcpIam`
	AuthType *string `pulumi:"authType"`
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password *string `pulumi:"password"`
	// JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.
	ServiceAccountJson *string `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa *string `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey *string `pulumi:"tlsCertificateKey"`
	// The username to authenticate with.
	Username *string `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
}

type SecretBackendConnectionMysqlAuroraArgs

type SecretBackendConnectionMysqlAuroraArgs struct {
	// Enable IAM authentication to a Google Cloud instance when set to `gcpIam`
	AuthType pulumi.StringPtrInput `pulumi:"authType"`
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.
	ServiceAccountJson pulumi.StringPtrInput `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa pulumi.StringPtrInput `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey pulumi.StringPtrInput `pulumi:"tlsCertificateKey"`
	// The username to authenticate with.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
}

func (SecretBackendConnectionMysqlAuroraArgs) ElementType

func (SecretBackendConnectionMysqlAuroraArgs) ToSecretBackendConnectionMysqlAuroraOutput

func (i SecretBackendConnectionMysqlAuroraArgs) ToSecretBackendConnectionMysqlAuroraOutput() SecretBackendConnectionMysqlAuroraOutput

func (SecretBackendConnectionMysqlAuroraArgs) ToSecretBackendConnectionMysqlAuroraOutputWithContext

func (i SecretBackendConnectionMysqlAuroraArgs) ToSecretBackendConnectionMysqlAuroraOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlAuroraOutput

func (SecretBackendConnectionMysqlAuroraArgs) ToSecretBackendConnectionMysqlAuroraPtrOutput

func (i SecretBackendConnectionMysqlAuroraArgs) ToSecretBackendConnectionMysqlAuroraPtrOutput() SecretBackendConnectionMysqlAuroraPtrOutput

func (SecretBackendConnectionMysqlAuroraArgs) ToSecretBackendConnectionMysqlAuroraPtrOutputWithContext

func (i SecretBackendConnectionMysqlAuroraArgs) ToSecretBackendConnectionMysqlAuroraPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlAuroraPtrOutput

type SecretBackendConnectionMysqlAuroraInput

type SecretBackendConnectionMysqlAuroraInput interface {
	pulumi.Input

	ToSecretBackendConnectionMysqlAuroraOutput() SecretBackendConnectionMysqlAuroraOutput
	ToSecretBackendConnectionMysqlAuroraOutputWithContext(context.Context) SecretBackendConnectionMysqlAuroraOutput
}

SecretBackendConnectionMysqlAuroraInput is an input type that accepts SecretBackendConnectionMysqlAuroraArgs and SecretBackendConnectionMysqlAuroraOutput values. You can construct a concrete instance of `SecretBackendConnectionMysqlAuroraInput` via:

SecretBackendConnectionMysqlAuroraArgs{...}

type SecretBackendConnectionMysqlAuroraOutput

type SecretBackendConnectionMysqlAuroraOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMysqlAuroraOutput) AuthType

Enable IAM authentication to a Google Cloud instance when set to `gcpIam`

func (SecretBackendConnectionMysqlAuroraOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionMysqlAuroraOutput) ElementType

func (SecretBackendConnectionMysqlAuroraOutput) MaxConnectionLifetime

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionMysqlAuroraOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionMysqlAuroraOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionMysqlAuroraOutput) Password

The password to authenticate with.

func (SecretBackendConnectionMysqlAuroraOutput) ServiceAccountJson

JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.

func (SecretBackendConnectionMysqlAuroraOutput) TlsCa

x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.

func (SecretBackendConnectionMysqlAuroraOutput) TlsCertificateKey

x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.

func (SecretBackendConnectionMysqlAuroraOutput) ToSecretBackendConnectionMysqlAuroraOutput

func (o SecretBackendConnectionMysqlAuroraOutput) ToSecretBackendConnectionMysqlAuroraOutput() SecretBackendConnectionMysqlAuroraOutput

func (SecretBackendConnectionMysqlAuroraOutput) ToSecretBackendConnectionMysqlAuroraOutputWithContext

func (o SecretBackendConnectionMysqlAuroraOutput) ToSecretBackendConnectionMysqlAuroraOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlAuroraOutput

func (SecretBackendConnectionMysqlAuroraOutput) ToSecretBackendConnectionMysqlAuroraPtrOutput

func (o SecretBackendConnectionMysqlAuroraOutput) ToSecretBackendConnectionMysqlAuroraPtrOutput() SecretBackendConnectionMysqlAuroraPtrOutput

func (SecretBackendConnectionMysqlAuroraOutput) ToSecretBackendConnectionMysqlAuroraPtrOutputWithContext

func (o SecretBackendConnectionMysqlAuroraOutput) ToSecretBackendConnectionMysqlAuroraPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlAuroraPtrOutput

func (SecretBackendConnectionMysqlAuroraOutput) Username

The username to authenticate with.

func (SecretBackendConnectionMysqlAuroraOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionMysqlAuroraPtrInput

type SecretBackendConnectionMysqlAuroraPtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionMysqlAuroraPtrOutput() SecretBackendConnectionMysqlAuroraPtrOutput
	ToSecretBackendConnectionMysqlAuroraPtrOutputWithContext(context.Context) SecretBackendConnectionMysqlAuroraPtrOutput
}

SecretBackendConnectionMysqlAuroraPtrInput is an input type that accepts SecretBackendConnectionMysqlAuroraArgs, SecretBackendConnectionMysqlAuroraPtr and SecretBackendConnectionMysqlAuroraPtrOutput values. You can construct a concrete instance of `SecretBackendConnectionMysqlAuroraPtrInput` via:

        SecretBackendConnectionMysqlAuroraArgs{...}

or:

        nil

type SecretBackendConnectionMysqlAuroraPtrOutput

type SecretBackendConnectionMysqlAuroraPtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMysqlAuroraPtrOutput) AuthType

Enable IAM authentication to a Google Cloud instance when set to `gcpIam`

func (SecretBackendConnectionMysqlAuroraPtrOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionMysqlAuroraPtrOutput) Elem

func (SecretBackendConnectionMysqlAuroraPtrOutput) ElementType

func (SecretBackendConnectionMysqlAuroraPtrOutput) MaxConnectionLifetime

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionMysqlAuroraPtrOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionMysqlAuroraPtrOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionMysqlAuroraPtrOutput) Password

The password to authenticate with.

func (SecretBackendConnectionMysqlAuroraPtrOutput) ServiceAccountJson

JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.

func (SecretBackendConnectionMysqlAuroraPtrOutput) TlsCa

x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.

func (SecretBackendConnectionMysqlAuroraPtrOutput) TlsCertificateKey

x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.

func (SecretBackendConnectionMysqlAuroraPtrOutput) ToSecretBackendConnectionMysqlAuroraPtrOutput

func (o SecretBackendConnectionMysqlAuroraPtrOutput) ToSecretBackendConnectionMysqlAuroraPtrOutput() SecretBackendConnectionMysqlAuroraPtrOutput

func (SecretBackendConnectionMysqlAuroraPtrOutput) ToSecretBackendConnectionMysqlAuroraPtrOutputWithContext

func (o SecretBackendConnectionMysqlAuroraPtrOutput) ToSecretBackendConnectionMysqlAuroraPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlAuroraPtrOutput

func (SecretBackendConnectionMysqlAuroraPtrOutput) Username

The username to authenticate with.

func (SecretBackendConnectionMysqlAuroraPtrOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionMysqlInput

type SecretBackendConnectionMysqlInput interface {
	pulumi.Input

	ToSecretBackendConnectionMysqlOutput() SecretBackendConnectionMysqlOutput
	ToSecretBackendConnectionMysqlOutputWithContext(context.Context) SecretBackendConnectionMysqlOutput
}

SecretBackendConnectionMysqlInput is an input type that accepts SecretBackendConnectionMysqlArgs and SecretBackendConnectionMysqlOutput values. You can construct a concrete instance of `SecretBackendConnectionMysqlInput` via:

SecretBackendConnectionMysqlArgs{...}

type SecretBackendConnectionMysqlLegacy

type SecretBackendConnectionMysqlLegacy struct {
	// Enable IAM authentication to a Google Cloud instance when set to `gcpIam`
	AuthType *string `pulumi:"authType"`
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password *string `pulumi:"password"`
	// JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.
	ServiceAccountJson *string `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa *string `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey *string `pulumi:"tlsCertificateKey"`
	// The username to authenticate with.
	Username *string `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
}

type SecretBackendConnectionMysqlLegacyArgs

type SecretBackendConnectionMysqlLegacyArgs struct {
	// Enable IAM authentication to a Google Cloud instance when set to `gcpIam`
	AuthType pulumi.StringPtrInput `pulumi:"authType"`
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.
	ServiceAccountJson pulumi.StringPtrInput `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa pulumi.StringPtrInput `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey pulumi.StringPtrInput `pulumi:"tlsCertificateKey"`
	// The username to authenticate with.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
}

func (SecretBackendConnectionMysqlLegacyArgs) ElementType

func (SecretBackendConnectionMysqlLegacyArgs) ToSecretBackendConnectionMysqlLegacyOutput

func (i SecretBackendConnectionMysqlLegacyArgs) ToSecretBackendConnectionMysqlLegacyOutput() SecretBackendConnectionMysqlLegacyOutput

func (SecretBackendConnectionMysqlLegacyArgs) ToSecretBackendConnectionMysqlLegacyOutputWithContext

func (i SecretBackendConnectionMysqlLegacyArgs) ToSecretBackendConnectionMysqlLegacyOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlLegacyOutput

func (SecretBackendConnectionMysqlLegacyArgs) ToSecretBackendConnectionMysqlLegacyPtrOutput

func (i SecretBackendConnectionMysqlLegacyArgs) ToSecretBackendConnectionMysqlLegacyPtrOutput() SecretBackendConnectionMysqlLegacyPtrOutput

func (SecretBackendConnectionMysqlLegacyArgs) ToSecretBackendConnectionMysqlLegacyPtrOutputWithContext

func (i SecretBackendConnectionMysqlLegacyArgs) ToSecretBackendConnectionMysqlLegacyPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlLegacyPtrOutput

type SecretBackendConnectionMysqlLegacyInput

type SecretBackendConnectionMysqlLegacyInput interface {
	pulumi.Input

	ToSecretBackendConnectionMysqlLegacyOutput() SecretBackendConnectionMysqlLegacyOutput
	ToSecretBackendConnectionMysqlLegacyOutputWithContext(context.Context) SecretBackendConnectionMysqlLegacyOutput
}

SecretBackendConnectionMysqlLegacyInput is an input type that accepts SecretBackendConnectionMysqlLegacyArgs and SecretBackendConnectionMysqlLegacyOutput values. You can construct a concrete instance of `SecretBackendConnectionMysqlLegacyInput` via:

SecretBackendConnectionMysqlLegacyArgs{...}

type SecretBackendConnectionMysqlLegacyOutput

type SecretBackendConnectionMysqlLegacyOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMysqlLegacyOutput) AuthType

Enable IAM authentication to a Google Cloud instance when set to `gcpIam`

func (SecretBackendConnectionMysqlLegacyOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionMysqlLegacyOutput) ElementType

func (SecretBackendConnectionMysqlLegacyOutput) MaxConnectionLifetime

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionMysqlLegacyOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionMysqlLegacyOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionMysqlLegacyOutput) Password

The password to authenticate with.

func (SecretBackendConnectionMysqlLegacyOutput) ServiceAccountJson

JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.

func (SecretBackendConnectionMysqlLegacyOutput) TlsCa

x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.

func (SecretBackendConnectionMysqlLegacyOutput) TlsCertificateKey

x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.

func (SecretBackendConnectionMysqlLegacyOutput) ToSecretBackendConnectionMysqlLegacyOutput

func (o SecretBackendConnectionMysqlLegacyOutput) ToSecretBackendConnectionMysqlLegacyOutput() SecretBackendConnectionMysqlLegacyOutput

func (SecretBackendConnectionMysqlLegacyOutput) ToSecretBackendConnectionMysqlLegacyOutputWithContext

func (o SecretBackendConnectionMysqlLegacyOutput) ToSecretBackendConnectionMysqlLegacyOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlLegacyOutput

func (SecretBackendConnectionMysqlLegacyOutput) ToSecretBackendConnectionMysqlLegacyPtrOutput

func (o SecretBackendConnectionMysqlLegacyOutput) ToSecretBackendConnectionMysqlLegacyPtrOutput() SecretBackendConnectionMysqlLegacyPtrOutput

func (SecretBackendConnectionMysqlLegacyOutput) ToSecretBackendConnectionMysqlLegacyPtrOutputWithContext

func (o SecretBackendConnectionMysqlLegacyOutput) ToSecretBackendConnectionMysqlLegacyPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlLegacyPtrOutput

func (SecretBackendConnectionMysqlLegacyOutput) Username

The username to authenticate with.

func (SecretBackendConnectionMysqlLegacyOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionMysqlLegacyPtrInput

type SecretBackendConnectionMysqlLegacyPtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionMysqlLegacyPtrOutput() SecretBackendConnectionMysqlLegacyPtrOutput
	ToSecretBackendConnectionMysqlLegacyPtrOutputWithContext(context.Context) SecretBackendConnectionMysqlLegacyPtrOutput
}

SecretBackendConnectionMysqlLegacyPtrInput is an input type that accepts SecretBackendConnectionMysqlLegacyArgs, SecretBackendConnectionMysqlLegacyPtr and SecretBackendConnectionMysqlLegacyPtrOutput values. You can construct a concrete instance of `SecretBackendConnectionMysqlLegacyPtrInput` via:

        SecretBackendConnectionMysqlLegacyArgs{...}

or:

        nil

type SecretBackendConnectionMysqlLegacyPtrOutput

type SecretBackendConnectionMysqlLegacyPtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMysqlLegacyPtrOutput) AuthType

Enable IAM authentication to a Google Cloud instance when set to `gcpIam`

func (SecretBackendConnectionMysqlLegacyPtrOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionMysqlLegacyPtrOutput) Elem

func (SecretBackendConnectionMysqlLegacyPtrOutput) ElementType

func (SecretBackendConnectionMysqlLegacyPtrOutput) MaxConnectionLifetime

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionMysqlLegacyPtrOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionMysqlLegacyPtrOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionMysqlLegacyPtrOutput) Password

The password to authenticate with.

func (SecretBackendConnectionMysqlLegacyPtrOutput) ServiceAccountJson

JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.

func (SecretBackendConnectionMysqlLegacyPtrOutput) TlsCa

x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.

func (SecretBackendConnectionMysqlLegacyPtrOutput) TlsCertificateKey

x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.

func (SecretBackendConnectionMysqlLegacyPtrOutput) ToSecretBackendConnectionMysqlLegacyPtrOutput

func (o SecretBackendConnectionMysqlLegacyPtrOutput) ToSecretBackendConnectionMysqlLegacyPtrOutput() SecretBackendConnectionMysqlLegacyPtrOutput

func (SecretBackendConnectionMysqlLegacyPtrOutput) ToSecretBackendConnectionMysqlLegacyPtrOutputWithContext

func (o SecretBackendConnectionMysqlLegacyPtrOutput) ToSecretBackendConnectionMysqlLegacyPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlLegacyPtrOutput

func (SecretBackendConnectionMysqlLegacyPtrOutput) Username

The username to authenticate with.

func (SecretBackendConnectionMysqlLegacyPtrOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionMysqlOutput

type SecretBackendConnectionMysqlOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMysqlOutput) AuthType

Enable IAM authentication to a Google Cloud instance when set to `gcpIam`

func (SecretBackendConnectionMysqlOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionMysqlOutput) ElementType

func (SecretBackendConnectionMysqlOutput) MaxConnectionLifetime

func (o SecretBackendConnectionMysqlOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionMysqlOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionMysqlOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionMysqlOutput) Password

The password to authenticate with.

func (SecretBackendConnectionMysqlOutput) ServiceAccountJson

JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.

func (SecretBackendConnectionMysqlOutput) TlsCa

x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.

func (SecretBackendConnectionMysqlOutput) TlsCertificateKey

x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.

func (SecretBackendConnectionMysqlOutput) ToSecretBackendConnectionMysqlOutput

func (o SecretBackendConnectionMysqlOutput) ToSecretBackendConnectionMysqlOutput() SecretBackendConnectionMysqlOutput

func (SecretBackendConnectionMysqlOutput) ToSecretBackendConnectionMysqlOutputWithContext

func (o SecretBackendConnectionMysqlOutput) ToSecretBackendConnectionMysqlOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlOutput

func (SecretBackendConnectionMysqlOutput) ToSecretBackendConnectionMysqlPtrOutput

func (o SecretBackendConnectionMysqlOutput) ToSecretBackendConnectionMysqlPtrOutput() SecretBackendConnectionMysqlPtrOutput

func (SecretBackendConnectionMysqlOutput) ToSecretBackendConnectionMysqlPtrOutputWithContext

func (o SecretBackendConnectionMysqlOutput) ToSecretBackendConnectionMysqlPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlPtrOutput

func (SecretBackendConnectionMysqlOutput) Username

The username to authenticate with.

func (SecretBackendConnectionMysqlOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionMysqlPtrInput

type SecretBackendConnectionMysqlPtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionMysqlPtrOutput() SecretBackendConnectionMysqlPtrOutput
	ToSecretBackendConnectionMysqlPtrOutputWithContext(context.Context) SecretBackendConnectionMysqlPtrOutput
}

SecretBackendConnectionMysqlPtrInput is an input type that accepts SecretBackendConnectionMysqlArgs, SecretBackendConnectionMysqlPtr and SecretBackendConnectionMysqlPtrOutput values. You can construct a concrete instance of `SecretBackendConnectionMysqlPtrInput` via:

        SecretBackendConnectionMysqlArgs{...}

or:

        nil

type SecretBackendConnectionMysqlPtrOutput

type SecretBackendConnectionMysqlPtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMysqlPtrOutput) AuthType

Enable IAM authentication to a Google Cloud instance when set to `gcpIam`

func (SecretBackendConnectionMysqlPtrOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionMysqlPtrOutput) Elem

func (SecretBackendConnectionMysqlPtrOutput) ElementType

func (SecretBackendConnectionMysqlPtrOutput) MaxConnectionLifetime

func (o SecretBackendConnectionMysqlPtrOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionMysqlPtrOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionMysqlPtrOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionMysqlPtrOutput) Password

The password to authenticate with.

func (SecretBackendConnectionMysqlPtrOutput) ServiceAccountJson

JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.

func (SecretBackendConnectionMysqlPtrOutput) TlsCa

x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.

func (SecretBackendConnectionMysqlPtrOutput) TlsCertificateKey

x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.

func (SecretBackendConnectionMysqlPtrOutput) ToSecretBackendConnectionMysqlPtrOutput

func (o SecretBackendConnectionMysqlPtrOutput) ToSecretBackendConnectionMysqlPtrOutput() SecretBackendConnectionMysqlPtrOutput

func (SecretBackendConnectionMysqlPtrOutput) ToSecretBackendConnectionMysqlPtrOutputWithContext

func (o SecretBackendConnectionMysqlPtrOutput) ToSecretBackendConnectionMysqlPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlPtrOutput

func (SecretBackendConnectionMysqlPtrOutput) Username

The username to authenticate with.

func (SecretBackendConnectionMysqlPtrOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionMysqlRds

type SecretBackendConnectionMysqlRds struct {
	// Enable IAM authentication to a Google Cloud instance when set to `gcpIam`
	AuthType *string `pulumi:"authType"`
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password *string `pulumi:"password"`
	// JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.
	ServiceAccountJson *string `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa *string `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey *string `pulumi:"tlsCertificateKey"`
	// The username to authenticate with.
	Username *string `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
}

type SecretBackendConnectionMysqlRdsArgs

type SecretBackendConnectionMysqlRdsArgs struct {
	// Enable IAM authentication to a Google Cloud instance when set to `gcpIam`
	AuthType pulumi.StringPtrInput `pulumi:"authType"`
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.
	ServiceAccountJson pulumi.StringPtrInput `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa pulumi.StringPtrInput `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey pulumi.StringPtrInput `pulumi:"tlsCertificateKey"`
	// The username to authenticate with.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
}

func (SecretBackendConnectionMysqlRdsArgs) ElementType

func (SecretBackendConnectionMysqlRdsArgs) ToSecretBackendConnectionMysqlRdsOutput

func (i SecretBackendConnectionMysqlRdsArgs) ToSecretBackendConnectionMysqlRdsOutput() SecretBackendConnectionMysqlRdsOutput

func (SecretBackendConnectionMysqlRdsArgs) ToSecretBackendConnectionMysqlRdsOutputWithContext

func (i SecretBackendConnectionMysqlRdsArgs) ToSecretBackendConnectionMysqlRdsOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlRdsOutput

func (SecretBackendConnectionMysqlRdsArgs) ToSecretBackendConnectionMysqlRdsPtrOutput

func (i SecretBackendConnectionMysqlRdsArgs) ToSecretBackendConnectionMysqlRdsPtrOutput() SecretBackendConnectionMysqlRdsPtrOutput

func (SecretBackendConnectionMysqlRdsArgs) ToSecretBackendConnectionMysqlRdsPtrOutputWithContext

func (i SecretBackendConnectionMysqlRdsArgs) ToSecretBackendConnectionMysqlRdsPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlRdsPtrOutput

type SecretBackendConnectionMysqlRdsInput

type SecretBackendConnectionMysqlRdsInput interface {
	pulumi.Input

	ToSecretBackendConnectionMysqlRdsOutput() SecretBackendConnectionMysqlRdsOutput
	ToSecretBackendConnectionMysqlRdsOutputWithContext(context.Context) SecretBackendConnectionMysqlRdsOutput
}

SecretBackendConnectionMysqlRdsInput is an input type that accepts SecretBackendConnectionMysqlRdsArgs and SecretBackendConnectionMysqlRdsOutput values. You can construct a concrete instance of `SecretBackendConnectionMysqlRdsInput` via:

SecretBackendConnectionMysqlRdsArgs{...}

type SecretBackendConnectionMysqlRdsOutput

type SecretBackendConnectionMysqlRdsOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMysqlRdsOutput) AuthType

Enable IAM authentication to a Google Cloud instance when set to `gcpIam`

func (SecretBackendConnectionMysqlRdsOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionMysqlRdsOutput) ElementType

func (SecretBackendConnectionMysqlRdsOutput) MaxConnectionLifetime

func (o SecretBackendConnectionMysqlRdsOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionMysqlRdsOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionMysqlRdsOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionMysqlRdsOutput) Password

The password to authenticate with.

func (SecretBackendConnectionMysqlRdsOutput) ServiceAccountJson

JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.

func (SecretBackendConnectionMysqlRdsOutput) TlsCa

x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.

func (SecretBackendConnectionMysqlRdsOutput) TlsCertificateKey

x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.

func (SecretBackendConnectionMysqlRdsOutput) ToSecretBackendConnectionMysqlRdsOutput

func (o SecretBackendConnectionMysqlRdsOutput) ToSecretBackendConnectionMysqlRdsOutput() SecretBackendConnectionMysqlRdsOutput

func (SecretBackendConnectionMysqlRdsOutput) ToSecretBackendConnectionMysqlRdsOutputWithContext

func (o SecretBackendConnectionMysqlRdsOutput) ToSecretBackendConnectionMysqlRdsOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlRdsOutput

func (SecretBackendConnectionMysqlRdsOutput) ToSecretBackendConnectionMysqlRdsPtrOutput

func (o SecretBackendConnectionMysqlRdsOutput) ToSecretBackendConnectionMysqlRdsPtrOutput() SecretBackendConnectionMysqlRdsPtrOutput

func (SecretBackendConnectionMysqlRdsOutput) ToSecretBackendConnectionMysqlRdsPtrOutputWithContext

func (o SecretBackendConnectionMysqlRdsOutput) ToSecretBackendConnectionMysqlRdsPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlRdsPtrOutput

func (SecretBackendConnectionMysqlRdsOutput) Username

The username to authenticate with.

func (SecretBackendConnectionMysqlRdsOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionMysqlRdsPtrInput

type SecretBackendConnectionMysqlRdsPtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionMysqlRdsPtrOutput() SecretBackendConnectionMysqlRdsPtrOutput
	ToSecretBackendConnectionMysqlRdsPtrOutputWithContext(context.Context) SecretBackendConnectionMysqlRdsPtrOutput
}

SecretBackendConnectionMysqlRdsPtrInput is an input type that accepts SecretBackendConnectionMysqlRdsArgs, SecretBackendConnectionMysqlRdsPtr and SecretBackendConnectionMysqlRdsPtrOutput values. You can construct a concrete instance of `SecretBackendConnectionMysqlRdsPtrInput` via:

        SecretBackendConnectionMysqlRdsArgs{...}

or:

        nil

type SecretBackendConnectionMysqlRdsPtrOutput

type SecretBackendConnectionMysqlRdsPtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionMysqlRdsPtrOutput) AuthType

Enable IAM authentication to a Google Cloud instance when set to `gcpIam`

func (SecretBackendConnectionMysqlRdsPtrOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionMysqlRdsPtrOutput) Elem

func (SecretBackendConnectionMysqlRdsPtrOutput) ElementType

func (SecretBackendConnectionMysqlRdsPtrOutput) MaxConnectionLifetime

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionMysqlRdsPtrOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionMysqlRdsPtrOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionMysqlRdsPtrOutput) Password

The password to authenticate with.

func (SecretBackendConnectionMysqlRdsPtrOutput) ServiceAccountJson

JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.

func (SecretBackendConnectionMysqlRdsPtrOutput) TlsCa

x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.

func (SecretBackendConnectionMysqlRdsPtrOutput) TlsCertificateKey

x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.

func (SecretBackendConnectionMysqlRdsPtrOutput) ToSecretBackendConnectionMysqlRdsPtrOutput

func (o SecretBackendConnectionMysqlRdsPtrOutput) ToSecretBackendConnectionMysqlRdsPtrOutput() SecretBackendConnectionMysqlRdsPtrOutput

func (SecretBackendConnectionMysqlRdsPtrOutput) ToSecretBackendConnectionMysqlRdsPtrOutputWithContext

func (o SecretBackendConnectionMysqlRdsPtrOutput) ToSecretBackendConnectionMysqlRdsPtrOutputWithContext(ctx context.Context) SecretBackendConnectionMysqlRdsPtrOutput

func (SecretBackendConnectionMysqlRdsPtrOutput) Username

The username to authenticate with.

func (SecretBackendConnectionMysqlRdsPtrOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionOracle

type SecretBackendConnectionOracle struct {
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// Enable the built-in session disconnect mechanism.
	DisconnectSessions *bool `pulumi:"disconnectSessions"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password *string `pulumi:"password"`
	// Enable spliting statements after semi-colons.
	SplitStatements *bool `pulumi:"splitStatements"`
	// The username to authenticate with.
	Username *string `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
}

type SecretBackendConnectionOracleArgs

type SecretBackendConnectionOracleArgs struct {
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// Enable the built-in session disconnect mechanism.
	DisconnectSessions pulumi.BoolPtrInput `pulumi:"disconnectSessions"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Enable spliting statements after semi-colons.
	SplitStatements pulumi.BoolPtrInput `pulumi:"splitStatements"`
	// The username to authenticate with.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
}

func (SecretBackendConnectionOracleArgs) ElementType

func (SecretBackendConnectionOracleArgs) ToSecretBackendConnectionOracleOutput

func (i SecretBackendConnectionOracleArgs) ToSecretBackendConnectionOracleOutput() SecretBackendConnectionOracleOutput

func (SecretBackendConnectionOracleArgs) ToSecretBackendConnectionOracleOutputWithContext

func (i SecretBackendConnectionOracleArgs) ToSecretBackendConnectionOracleOutputWithContext(ctx context.Context) SecretBackendConnectionOracleOutput

func (SecretBackendConnectionOracleArgs) ToSecretBackendConnectionOraclePtrOutput

func (i SecretBackendConnectionOracleArgs) ToSecretBackendConnectionOraclePtrOutput() SecretBackendConnectionOraclePtrOutput

func (SecretBackendConnectionOracleArgs) ToSecretBackendConnectionOraclePtrOutputWithContext

func (i SecretBackendConnectionOracleArgs) ToSecretBackendConnectionOraclePtrOutputWithContext(ctx context.Context) SecretBackendConnectionOraclePtrOutput

type SecretBackendConnectionOracleInput

type SecretBackendConnectionOracleInput interface {
	pulumi.Input

	ToSecretBackendConnectionOracleOutput() SecretBackendConnectionOracleOutput
	ToSecretBackendConnectionOracleOutputWithContext(context.Context) SecretBackendConnectionOracleOutput
}

SecretBackendConnectionOracleInput is an input type that accepts SecretBackendConnectionOracleArgs and SecretBackendConnectionOracleOutput values. You can construct a concrete instance of `SecretBackendConnectionOracleInput` via:

SecretBackendConnectionOracleArgs{...}

type SecretBackendConnectionOracleOutput

type SecretBackendConnectionOracleOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionOracleOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionOracleOutput) DisconnectSessions

Enable the built-in session disconnect mechanism.

func (SecretBackendConnectionOracleOutput) ElementType

func (SecretBackendConnectionOracleOutput) MaxConnectionLifetime

func (o SecretBackendConnectionOracleOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionOracleOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionOracleOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionOracleOutput) Password

The password to authenticate with.

func (SecretBackendConnectionOracleOutput) SplitStatements

Enable spliting statements after semi-colons.

func (SecretBackendConnectionOracleOutput) ToSecretBackendConnectionOracleOutput

func (o SecretBackendConnectionOracleOutput) ToSecretBackendConnectionOracleOutput() SecretBackendConnectionOracleOutput

func (SecretBackendConnectionOracleOutput) ToSecretBackendConnectionOracleOutputWithContext

func (o SecretBackendConnectionOracleOutput) ToSecretBackendConnectionOracleOutputWithContext(ctx context.Context) SecretBackendConnectionOracleOutput

func (SecretBackendConnectionOracleOutput) ToSecretBackendConnectionOraclePtrOutput

func (o SecretBackendConnectionOracleOutput) ToSecretBackendConnectionOraclePtrOutput() SecretBackendConnectionOraclePtrOutput

func (SecretBackendConnectionOracleOutput) ToSecretBackendConnectionOraclePtrOutputWithContext

func (o SecretBackendConnectionOracleOutput) ToSecretBackendConnectionOraclePtrOutputWithContext(ctx context.Context) SecretBackendConnectionOraclePtrOutput

func (SecretBackendConnectionOracleOutput) Username

The username to authenticate with.

func (SecretBackendConnectionOracleOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionOraclePtrInput

type SecretBackendConnectionOraclePtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionOraclePtrOutput() SecretBackendConnectionOraclePtrOutput
	ToSecretBackendConnectionOraclePtrOutputWithContext(context.Context) SecretBackendConnectionOraclePtrOutput
}

SecretBackendConnectionOraclePtrInput is an input type that accepts SecretBackendConnectionOracleArgs, SecretBackendConnectionOraclePtr and SecretBackendConnectionOraclePtrOutput values. You can construct a concrete instance of `SecretBackendConnectionOraclePtrInput` via:

        SecretBackendConnectionOracleArgs{...}

or:

        nil

type SecretBackendConnectionOraclePtrOutput

type SecretBackendConnectionOraclePtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionOraclePtrOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionOraclePtrOutput) DisconnectSessions

Enable the built-in session disconnect mechanism.

func (SecretBackendConnectionOraclePtrOutput) Elem

func (SecretBackendConnectionOraclePtrOutput) ElementType

func (SecretBackendConnectionOraclePtrOutput) MaxConnectionLifetime

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionOraclePtrOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionOraclePtrOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionOraclePtrOutput) Password

The password to authenticate with.

func (SecretBackendConnectionOraclePtrOutput) SplitStatements

Enable spliting statements after semi-colons.

func (SecretBackendConnectionOraclePtrOutput) ToSecretBackendConnectionOraclePtrOutput

func (o SecretBackendConnectionOraclePtrOutput) ToSecretBackendConnectionOraclePtrOutput() SecretBackendConnectionOraclePtrOutput

func (SecretBackendConnectionOraclePtrOutput) ToSecretBackendConnectionOraclePtrOutputWithContext

func (o SecretBackendConnectionOraclePtrOutput) ToSecretBackendConnectionOraclePtrOutputWithContext(ctx context.Context) SecretBackendConnectionOraclePtrOutput

func (SecretBackendConnectionOraclePtrOutput) Username

The username to authenticate with.

func (SecretBackendConnectionOraclePtrOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionOutput

type SecretBackendConnectionOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionOutput) AllowedRoles

A list of roles that are allowed to use this connection.

func (SecretBackendConnectionOutput) Backend

The unique name of the Vault mount to configure.

func (SecretBackendConnectionOutput) Cassandra

A nested block containing configuration options for Cassandra connections.

func (SecretBackendConnectionOutput) Couchbase

A nested block containing configuration options for Couchbase connections.

func (SecretBackendConnectionOutput) Data

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

func (SecretBackendConnectionOutput) Elasticsearch

A nested block containing configuration options for Elasticsearch connections.

func (SecretBackendConnectionOutput) ElementType

func (SecretBackendConnectionOutput) Hana

A nested block containing configuration options for SAP HanaDB connections.

func (SecretBackendConnectionOutput) Influxdb

A nested block containing configuration options for InfluxDB connections.

func (SecretBackendConnectionOutput) Mongodb

A nested block containing configuration options for MongoDB connections.

func (SecretBackendConnectionOutput) Mongodbatlas

A nested block containing configuration options for MongoDB Atlas connections.

func (SecretBackendConnectionOutput) Mssql

A nested block containing configuration options for MSSQL connections.

func (SecretBackendConnectionOutput) Mysql

A nested block containing configuration options for MySQL connections.

func (SecretBackendConnectionOutput) MysqlAurora

A nested block containing configuration options for Aurora MySQL connections.

func (SecretBackendConnectionOutput) MysqlLegacy

A nested block containing configuration options for legacy MySQL connections.

func (SecretBackendConnectionOutput) MysqlRds

A nested block containing configuration options for RDS MySQL connections.

func (SecretBackendConnectionOutput) Name

A unique name to give the database connection.

func (SecretBackendConnectionOutput) Namespace

The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The `namespace` is always relative to the provider's configured namespace. *Available only for Vault Enterprise*.

func (SecretBackendConnectionOutput) Oracle

A nested block containing configuration options for Oracle connections.

func (SecretBackendConnectionOutput) PluginName

Specifies the name of the plugin to use.

func (SecretBackendConnectionOutput) Postgresql

A nested block containing configuration options for PostgreSQL connections.

func (SecretBackendConnectionOutput) Redis

A nested block containing configuration options for Redis connections.

func (SecretBackendConnectionOutput) RedisElasticache

A nested block containing configuration options for Redis ElastiCache connections.

Exactly one of the nested blocks of configuration options must be supplied.

func (SecretBackendConnectionOutput) Redshift

Connection parameters for the redshift-database-plugin plugin.

func (SecretBackendConnectionOutput) RootRotationStatements

func (o SecretBackendConnectionOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretBackendConnectionOutput) Snowflake

A nested block containing configuration options for Snowflake connections.

func (SecretBackendConnectionOutput) ToSecretBackendConnectionOutput

func (o SecretBackendConnectionOutput) ToSecretBackendConnectionOutput() SecretBackendConnectionOutput

func (SecretBackendConnectionOutput) ToSecretBackendConnectionOutputWithContext

func (o SecretBackendConnectionOutput) ToSecretBackendConnectionOutputWithContext(ctx context.Context) SecretBackendConnectionOutput

func (SecretBackendConnectionOutput) VerifyConnection

func (o SecretBackendConnectionOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretBackendConnectionPostgresql

type SecretBackendConnectionPostgresql struct {
	// Enable IAM authentication to a Google Cloud instance when set to `gcpIam`
	AuthType *string `pulumi:"authType"`
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// Disable special character escaping in username and password.
	DisableEscaping *bool `pulumi:"disableEscaping"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password *string `pulumi:"password"`
	// JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.
	ServiceAccountJson *string `pulumi:"serviceAccountJson"`
	// The username to authenticate with.
	Username *string `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
}

type SecretBackendConnectionPostgresqlArgs

type SecretBackendConnectionPostgresqlArgs struct {
	// Enable IAM authentication to a Google Cloud instance when set to `gcpIam`
	AuthType pulumi.StringPtrInput `pulumi:"authType"`
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// Disable special character escaping in username and password.
	DisableEscaping pulumi.BoolPtrInput `pulumi:"disableEscaping"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.
	ServiceAccountJson pulumi.StringPtrInput `pulumi:"serviceAccountJson"`
	// The username to authenticate with.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
}

func (SecretBackendConnectionPostgresqlArgs) ElementType

func (SecretBackendConnectionPostgresqlArgs) ToSecretBackendConnectionPostgresqlOutput

func (i SecretBackendConnectionPostgresqlArgs) ToSecretBackendConnectionPostgresqlOutput() SecretBackendConnectionPostgresqlOutput

func (SecretBackendConnectionPostgresqlArgs) ToSecretBackendConnectionPostgresqlOutputWithContext

func (i SecretBackendConnectionPostgresqlArgs) ToSecretBackendConnectionPostgresqlOutputWithContext(ctx context.Context) SecretBackendConnectionPostgresqlOutput

func (SecretBackendConnectionPostgresqlArgs) ToSecretBackendConnectionPostgresqlPtrOutput

func (i SecretBackendConnectionPostgresqlArgs) ToSecretBackendConnectionPostgresqlPtrOutput() SecretBackendConnectionPostgresqlPtrOutput

func (SecretBackendConnectionPostgresqlArgs) ToSecretBackendConnectionPostgresqlPtrOutputWithContext

func (i SecretBackendConnectionPostgresqlArgs) ToSecretBackendConnectionPostgresqlPtrOutputWithContext(ctx context.Context) SecretBackendConnectionPostgresqlPtrOutput

type SecretBackendConnectionPostgresqlInput

type SecretBackendConnectionPostgresqlInput interface {
	pulumi.Input

	ToSecretBackendConnectionPostgresqlOutput() SecretBackendConnectionPostgresqlOutput
	ToSecretBackendConnectionPostgresqlOutputWithContext(context.Context) SecretBackendConnectionPostgresqlOutput
}

SecretBackendConnectionPostgresqlInput is an input type that accepts SecretBackendConnectionPostgresqlArgs and SecretBackendConnectionPostgresqlOutput values. You can construct a concrete instance of `SecretBackendConnectionPostgresqlInput` via:

SecretBackendConnectionPostgresqlArgs{...}

type SecretBackendConnectionPostgresqlOutput

type SecretBackendConnectionPostgresqlOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionPostgresqlOutput) AuthType

Enable IAM authentication to a Google Cloud instance when set to `gcpIam`

func (SecretBackendConnectionPostgresqlOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionPostgresqlOutput) DisableEscaping

Disable special character escaping in username and password.

func (SecretBackendConnectionPostgresqlOutput) ElementType

func (SecretBackendConnectionPostgresqlOutput) MaxConnectionLifetime

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionPostgresqlOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionPostgresqlOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionPostgresqlOutput) Password

The password to authenticate with.

func (SecretBackendConnectionPostgresqlOutput) ServiceAccountJson

JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.

func (SecretBackendConnectionPostgresqlOutput) ToSecretBackendConnectionPostgresqlOutput

func (o SecretBackendConnectionPostgresqlOutput) ToSecretBackendConnectionPostgresqlOutput() SecretBackendConnectionPostgresqlOutput

func (SecretBackendConnectionPostgresqlOutput) ToSecretBackendConnectionPostgresqlOutputWithContext

func (o SecretBackendConnectionPostgresqlOutput) ToSecretBackendConnectionPostgresqlOutputWithContext(ctx context.Context) SecretBackendConnectionPostgresqlOutput

func (SecretBackendConnectionPostgresqlOutput) ToSecretBackendConnectionPostgresqlPtrOutput

func (o SecretBackendConnectionPostgresqlOutput) ToSecretBackendConnectionPostgresqlPtrOutput() SecretBackendConnectionPostgresqlPtrOutput

func (SecretBackendConnectionPostgresqlOutput) ToSecretBackendConnectionPostgresqlPtrOutputWithContext

func (o SecretBackendConnectionPostgresqlOutput) ToSecretBackendConnectionPostgresqlPtrOutputWithContext(ctx context.Context) SecretBackendConnectionPostgresqlPtrOutput

func (SecretBackendConnectionPostgresqlOutput) Username

The username to authenticate with.

func (SecretBackendConnectionPostgresqlOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionPostgresqlPtrInput

type SecretBackendConnectionPostgresqlPtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionPostgresqlPtrOutput() SecretBackendConnectionPostgresqlPtrOutput
	ToSecretBackendConnectionPostgresqlPtrOutputWithContext(context.Context) SecretBackendConnectionPostgresqlPtrOutput
}

SecretBackendConnectionPostgresqlPtrInput is an input type that accepts SecretBackendConnectionPostgresqlArgs, SecretBackendConnectionPostgresqlPtr and SecretBackendConnectionPostgresqlPtrOutput values. You can construct a concrete instance of `SecretBackendConnectionPostgresqlPtrInput` via:

        SecretBackendConnectionPostgresqlArgs{...}

or:

        nil

type SecretBackendConnectionPostgresqlPtrOutput

type SecretBackendConnectionPostgresqlPtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionPostgresqlPtrOutput) AuthType

Enable IAM authentication to a Google Cloud instance when set to `gcpIam`

func (SecretBackendConnectionPostgresqlPtrOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionPostgresqlPtrOutput) DisableEscaping

Disable special character escaping in username and password.

func (SecretBackendConnectionPostgresqlPtrOutput) Elem

func (SecretBackendConnectionPostgresqlPtrOutput) ElementType

func (SecretBackendConnectionPostgresqlPtrOutput) MaxConnectionLifetime

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionPostgresqlPtrOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionPostgresqlPtrOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionPostgresqlPtrOutput) Password

The password to authenticate with.

func (SecretBackendConnectionPostgresqlPtrOutput) ServiceAccountJson

JSON encoding of an IAM access key. Requires `authType` to be `gcpIam`.

func (SecretBackendConnectionPostgresqlPtrOutput) ToSecretBackendConnectionPostgresqlPtrOutput

func (o SecretBackendConnectionPostgresqlPtrOutput) ToSecretBackendConnectionPostgresqlPtrOutput() SecretBackendConnectionPostgresqlPtrOutput

func (SecretBackendConnectionPostgresqlPtrOutput) ToSecretBackendConnectionPostgresqlPtrOutputWithContext

func (o SecretBackendConnectionPostgresqlPtrOutput) ToSecretBackendConnectionPostgresqlPtrOutputWithContext(ctx context.Context) SecretBackendConnectionPostgresqlPtrOutput

func (SecretBackendConnectionPostgresqlPtrOutput) Username

The username to authenticate with.

func (SecretBackendConnectionPostgresqlPtrOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionRedis

type SecretBackendConnectionRedis struct {
	// The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
	CaCert *string `pulumi:"caCert"`
	// The host to connect to.
	Host string `pulumi:"host"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls *bool `pulumi:"insecureTls"`
	// The password to authenticate with.
	Password string `pulumi:"password"`
	// The default port to connect to if no port is specified as
	// part of the host.
	Port *int `pulumi:"port"`
	// Whether to use TLS when connecting to Cassandra.
	Tls *bool `pulumi:"tls"`
	// The username to authenticate with.
	Username string `pulumi:"username"`
}

type SecretBackendConnectionRedisArgs

type SecretBackendConnectionRedisArgs struct {
	// The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
	CaCert pulumi.StringPtrInput `pulumi:"caCert"`
	// The host to connect to.
	Host pulumi.StringInput `pulumi:"host"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls pulumi.BoolPtrInput `pulumi:"insecureTls"`
	// The password to authenticate with.
	Password pulumi.StringInput `pulumi:"password"`
	// The default port to connect to if no port is specified as
	// part of the host.
	Port pulumi.IntPtrInput `pulumi:"port"`
	// Whether to use TLS when connecting to Cassandra.
	Tls pulumi.BoolPtrInput `pulumi:"tls"`
	// The username to authenticate with.
	Username pulumi.StringInput `pulumi:"username"`
}

func (SecretBackendConnectionRedisArgs) ElementType

func (SecretBackendConnectionRedisArgs) ToSecretBackendConnectionRedisOutput

func (i SecretBackendConnectionRedisArgs) ToSecretBackendConnectionRedisOutput() SecretBackendConnectionRedisOutput

func (SecretBackendConnectionRedisArgs) ToSecretBackendConnectionRedisOutputWithContext

func (i SecretBackendConnectionRedisArgs) ToSecretBackendConnectionRedisOutputWithContext(ctx context.Context) SecretBackendConnectionRedisOutput

func (SecretBackendConnectionRedisArgs) ToSecretBackendConnectionRedisPtrOutput

func (i SecretBackendConnectionRedisArgs) ToSecretBackendConnectionRedisPtrOutput() SecretBackendConnectionRedisPtrOutput

func (SecretBackendConnectionRedisArgs) ToSecretBackendConnectionRedisPtrOutputWithContext

func (i SecretBackendConnectionRedisArgs) ToSecretBackendConnectionRedisPtrOutputWithContext(ctx context.Context) SecretBackendConnectionRedisPtrOutput

type SecretBackendConnectionRedisElasticache

type SecretBackendConnectionRedisElasticache struct {
	// The password to authenticate with.
	Password *string `pulumi:"password"`
	// The region where the ElastiCache cluster is hosted. If omitted Vault tries to infer from the environment instead.
	Region *string `pulumi:"region"`
	// The URL for Elasticsearch's API. https requires certificate
	// by trusted CA if used.
	Url string `pulumi:"url"`
	// The username to authenticate with.
	Username *string `pulumi:"username"`
}

type SecretBackendConnectionRedisElasticacheArgs

type SecretBackendConnectionRedisElasticacheArgs struct {
	// The password to authenticate with.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// The region where the ElastiCache cluster is hosted. If omitted Vault tries to infer from the environment instead.
	Region pulumi.StringPtrInput `pulumi:"region"`
	// The URL for Elasticsearch's API. https requires certificate
	// by trusted CA if used.
	Url pulumi.StringInput `pulumi:"url"`
	// The username to authenticate with.
	Username pulumi.StringPtrInput `pulumi:"username"`
}

func (SecretBackendConnectionRedisElasticacheArgs) ElementType

func (SecretBackendConnectionRedisElasticacheArgs) ToSecretBackendConnectionRedisElasticacheOutput

func (i SecretBackendConnectionRedisElasticacheArgs) ToSecretBackendConnectionRedisElasticacheOutput() SecretBackendConnectionRedisElasticacheOutput

func (SecretBackendConnectionRedisElasticacheArgs) ToSecretBackendConnectionRedisElasticacheOutputWithContext

func (i SecretBackendConnectionRedisElasticacheArgs) ToSecretBackendConnectionRedisElasticacheOutputWithContext(ctx context.Context) SecretBackendConnectionRedisElasticacheOutput

func (SecretBackendConnectionRedisElasticacheArgs) ToSecretBackendConnectionRedisElasticachePtrOutput

func (i SecretBackendConnectionRedisElasticacheArgs) ToSecretBackendConnectionRedisElasticachePtrOutput() SecretBackendConnectionRedisElasticachePtrOutput

func (SecretBackendConnectionRedisElasticacheArgs) ToSecretBackendConnectionRedisElasticachePtrOutputWithContext

func (i SecretBackendConnectionRedisElasticacheArgs) ToSecretBackendConnectionRedisElasticachePtrOutputWithContext(ctx context.Context) SecretBackendConnectionRedisElasticachePtrOutput

type SecretBackendConnectionRedisElasticacheInput

type SecretBackendConnectionRedisElasticacheInput interface {
	pulumi.Input

	ToSecretBackendConnectionRedisElasticacheOutput() SecretBackendConnectionRedisElasticacheOutput
	ToSecretBackendConnectionRedisElasticacheOutputWithContext(context.Context) SecretBackendConnectionRedisElasticacheOutput
}

SecretBackendConnectionRedisElasticacheInput is an input type that accepts SecretBackendConnectionRedisElasticacheArgs and SecretBackendConnectionRedisElasticacheOutput values. You can construct a concrete instance of `SecretBackendConnectionRedisElasticacheInput` via:

SecretBackendConnectionRedisElasticacheArgs{...}

type SecretBackendConnectionRedisElasticacheOutput

type SecretBackendConnectionRedisElasticacheOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionRedisElasticacheOutput) ElementType

func (SecretBackendConnectionRedisElasticacheOutput) Password

The password to authenticate with.

func (SecretBackendConnectionRedisElasticacheOutput) Region

The region where the ElastiCache cluster is hosted. If omitted Vault tries to infer from the environment instead.

func (SecretBackendConnectionRedisElasticacheOutput) ToSecretBackendConnectionRedisElasticacheOutput

func (o SecretBackendConnectionRedisElasticacheOutput) ToSecretBackendConnectionRedisElasticacheOutput() SecretBackendConnectionRedisElasticacheOutput

func (SecretBackendConnectionRedisElasticacheOutput) ToSecretBackendConnectionRedisElasticacheOutputWithContext

func (o SecretBackendConnectionRedisElasticacheOutput) ToSecretBackendConnectionRedisElasticacheOutputWithContext(ctx context.Context) SecretBackendConnectionRedisElasticacheOutput

func (SecretBackendConnectionRedisElasticacheOutput) ToSecretBackendConnectionRedisElasticachePtrOutput

func (o SecretBackendConnectionRedisElasticacheOutput) ToSecretBackendConnectionRedisElasticachePtrOutput() SecretBackendConnectionRedisElasticachePtrOutput

func (SecretBackendConnectionRedisElasticacheOutput) ToSecretBackendConnectionRedisElasticachePtrOutputWithContext

func (o SecretBackendConnectionRedisElasticacheOutput) ToSecretBackendConnectionRedisElasticachePtrOutputWithContext(ctx context.Context) SecretBackendConnectionRedisElasticachePtrOutput

func (SecretBackendConnectionRedisElasticacheOutput) Url

The URL for Elasticsearch's API. https requires certificate by trusted CA if used.

func (SecretBackendConnectionRedisElasticacheOutput) Username

The username to authenticate with.

type SecretBackendConnectionRedisElasticachePtrInput

type SecretBackendConnectionRedisElasticachePtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionRedisElasticachePtrOutput() SecretBackendConnectionRedisElasticachePtrOutput
	ToSecretBackendConnectionRedisElasticachePtrOutputWithContext(context.Context) SecretBackendConnectionRedisElasticachePtrOutput
}

SecretBackendConnectionRedisElasticachePtrInput is an input type that accepts SecretBackendConnectionRedisElasticacheArgs, SecretBackendConnectionRedisElasticachePtr and SecretBackendConnectionRedisElasticachePtrOutput values. You can construct a concrete instance of `SecretBackendConnectionRedisElasticachePtrInput` via:

        SecretBackendConnectionRedisElasticacheArgs{...}

or:

        nil

type SecretBackendConnectionRedisElasticachePtrOutput

type SecretBackendConnectionRedisElasticachePtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionRedisElasticachePtrOutput) Elem

func (SecretBackendConnectionRedisElasticachePtrOutput) ElementType

func (SecretBackendConnectionRedisElasticachePtrOutput) Password

The password to authenticate with.

func (SecretBackendConnectionRedisElasticachePtrOutput) Region

The region where the ElastiCache cluster is hosted. If omitted Vault tries to infer from the environment instead.

func (SecretBackendConnectionRedisElasticachePtrOutput) ToSecretBackendConnectionRedisElasticachePtrOutput

func (o SecretBackendConnectionRedisElasticachePtrOutput) ToSecretBackendConnectionRedisElasticachePtrOutput() SecretBackendConnectionRedisElasticachePtrOutput

func (SecretBackendConnectionRedisElasticachePtrOutput) ToSecretBackendConnectionRedisElasticachePtrOutputWithContext

func (o SecretBackendConnectionRedisElasticachePtrOutput) ToSecretBackendConnectionRedisElasticachePtrOutputWithContext(ctx context.Context) SecretBackendConnectionRedisElasticachePtrOutput

func (SecretBackendConnectionRedisElasticachePtrOutput) Url

The URL for Elasticsearch's API. https requires certificate by trusted CA if used.

func (SecretBackendConnectionRedisElasticachePtrOutput) Username

The username to authenticate with.

type SecretBackendConnectionRedisInput

type SecretBackendConnectionRedisInput interface {
	pulumi.Input

	ToSecretBackendConnectionRedisOutput() SecretBackendConnectionRedisOutput
	ToSecretBackendConnectionRedisOutputWithContext(context.Context) SecretBackendConnectionRedisOutput
}

SecretBackendConnectionRedisInput is an input type that accepts SecretBackendConnectionRedisArgs and SecretBackendConnectionRedisOutput values. You can construct a concrete instance of `SecretBackendConnectionRedisInput` via:

SecretBackendConnectionRedisArgs{...}

type SecretBackendConnectionRedisOutput

type SecretBackendConnectionRedisOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionRedisOutput) CaCert

The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.

func (SecretBackendConnectionRedisOutput) ElementType

func (SecretBackendConnectionRedisOutput) Host

The host to connect to.

func (SecretBackendConnectionRedisOutput) InsecureTls

Whether to skip verification of the server certificate when using TLS.

func (SecretBackendConnectionRedisOutput) Password

The password to authenticate with.

func (SecretBackendConnectionRedisOutput) Port

The default port to connect to if no port is specified as part of the host.

func (SecretBackendConnectionRedisOutput) Tls

Whether to use TLS when connecting to Cassandra.

func (SecretBackendConnectionRedisOutput) ToSecretBackendConnectionRedisOutput

func (o SecretBackendConnectionRedisOutput) ToSecretBackendConnectionRedisOutput() SecretBackendConnectionRedisOutput

func (SecretBackendConnectionRedisOutput) ToSecretBackendConnectionRedisOutputWithContext

func (o SecretBackendConnectionRedisOutput) ToSecretBackendConnectionRedisOutputWithContext(ctx context.Context) SecretBackendConnectionRedisOutput

func (SecretBackendConnectionRedisOutput) ToSecretBackendConnectionRedisPtrOutput

func (o SecretBackendConnectionRedisOutput) ToSecretBackendConnectionRedisPtrOutput() SecretBackendConnectionRedisPtrOutput

func (SecretBackendConnectionRedisOutput) ToSecretBackendConnectionRedisPtrOutputWithContext

func (o SecretBackendConnectionRedisOutput) ToSecretBackendConnectionRedisPtrOutputWithContext(ctx context.Context) SecretBackendConnectionRedisPtrOutput

func (SecretBackendConnectionRedisOutput) Username

The username to authenticate with.

type SecretBackendConnectionRedisPtrInput

type SecretBackendConnectionRedisPtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionRedisPtrOutput() SecretBackendConnectionRedisPtrOutput
	ToSecretBackendConnectionRedisPtrOutputWithContext(context.Context) SecretBackendConnectionRedisPtrOutput
}

SecretBackendConnectionRedisPtrInput is an input type that accepts SecretBackendConnectionRedisArgs, SecretBackendConnectionRedisPtr and SecretBackendConnectionRedisPtrOutput values. You can construct a concrete instance of `SecretBackendConnectionRedisPtrInput` via:

        SecretBackendConnectionRedisArgs{...}

or:

        nil

type SecretBackendConnectionRedisPtrOutput

type SecretBackendConnectionRedisPtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionRedisPtrOutput) CaCert

The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.

func (SecretBackendConnectionRedisPtrOutput) Elem

func (SecretBackendConnectionRedisPtrOutput) ElementType

func (SecretBackendConnectionRedisPtrOutput) Host

The host to connect to.

func (SecretBackendConnectionRedisPtrOutput) InsecureTls

Whether to skip verification of the server certificate when using TLS.

func (SecretBackendConnectionRedisPtrOutput) Password

The password to authenticate with.

func (SecretBackendConnectionRedisPtrOutput) Port

The default port to connect to if no port is specified as part of the host.

func (SecretBackendConnectionRedisPtrOutput) Tls

Whether to use TLS when connecting to Cassandra.

func (SecretBackendConnectionRedisPtrOutput) ToSecretBackendConnectionRedisPtrOutput

func (o SecretBackendConnectionRedisPtrOutput) ToSecretBackendConnectionRedisPtrOutput() SecretBackendConnectionRedisPtrOutput

func (SecretBackendConnectionRedisPtrOutput) ToSecretBackendConnectionRedisPtrOutputWithContext

func (o SecretBackendConnectionRedisPtrOutput) ToSecretBackendConnectionRedisPtrOutputWithContext(ctx context.Context) SecretBackendConnectionRedisPtrOutput

func (SecretBackendConnectionRedisPtrOutput) Username

The username to authenticate with.

type SecretBackendConnectionRedshift

type SecretBackendConnectionRedshift struct {
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// Disable special character escaping in username and password.
	DisableEscaping *bool `pulumi:"disableEscaping"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password *string `pulumi:"password"`
	// The username to authenticate with.
	Username *string `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
}

type SecretBackendConnectionRedshiftArgs

type SecretBackendConnectionRedshiftArgs struct {
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// Disable special character escaping in username and password.
	DisableEscaping pulumi.BoolPtrInput `pulumi:"disableEscaping"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// The username to authenticate with.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
}

func (SecretBackendConnectionRedshiftArgs) ElementType

func (SecretBackendConnectionRedshiftArgs) ToSecretBackendConnectionRedshiftOutput

func (i SecretBackendConnectionRedshiftArgs) ToSecretBackendConnectionRedshiftOutput() SecretBackendConnectionRedshiftOutput

func (SecretBackendConnectionRedshiftArgs) ToSecretBackendConnectionRedshiftOutputWithContext

func (i SecretBackendConnectionRedshiftArgs) ToSecretBackendConnectionRedshiftOutputWithContext(ctx context.Context) SecretBackendConnectionRedshiftOutput

func (SecretBackendConnectionRedshiftArgs) ToSecretBackendConnectionRedshiftPtrOutput

func (i SecretBackendConnectionRedshiftArgs) ToSecretBackendConnectionRedshiftPtrOutput() SecretBackendConnectionRedshiftPtrOutput

func (SecretBackendConnectionRedshiftArgs) ToSecretBackendConnectionRedshiftPtrOutputWithContext

func (i SecretBackendConnectionRedshiftArgs) ToSecretBackendConnectionRedshiftPtrOutputWithContext(ctx context.Context) SecretBackendConnectionRedshiftPtrOutput

type SecretBackendConnectionRedshiftInput

type SecretBackendConnectionRedshiftInput interface {
	pulumi.Input

	ToSecretBackendConnectionRedshiftOutput() SecretBackendConnectionRedshiftOutput
	ToSecretBackendConnectionRedshiftOutputWithContext(context.Context) SecretBackendConnectionRedshiftOutput
}

SecretBackendConnectionRedshiftInput is an input type that accepts SecretBackendConnectionRedshiftArgs and SecretBackendConnectionRedshiftOutput values. You can construct a concrete instance of `SecretBackendConnectionRedshiftInput` via:

SecretBackendConnectionRedshiftArgs{...}

type SecretBackendConnectionRedshiftOutput

type SecretBackendConnectionRedshiftOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionRedshiftOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionRedshiftOutput) DisableEscaping

Disable special character escaping in username and password.

func (SecretBackendConnectionRedshiftOutput) ElementType

func (SecretBackendConnectionRedshiftOutput) MaxConnectionLifetime

func (o SecretBackendConnectionRedshiftOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionRedshiftOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionRedshiftOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionRedshiftOutput) Password

The password to authenticate with.

func (SecretBackendConnectionRedshiftOutput) ToSecretBackendConnectionRedshiftOutput

func (o SecretBackendConnectionRedshiftOutput) ToSecretBackendConnectionRedshiftOutput() SecretBackendConnectionRedshiftOutput

func (SecretBackendConnectionRedshiftOutput) ToSecretBackendConnectionRedshiftOutputWithContext

func (o SecretBackendConnectionRedshiftOutput) ToSecretBackendConnectionRedshiftOutputWithContext(ctx context.Context) SecretBackendConnectionRedshiftOutput

func (SecretBackendConnectionRedshiftOutput) ToSecretBackendConnectionRedshiftPtrOutput

func (o SecretBackendConnectionRedshiftOutput) ToSecretBackendConnectionRedshiftPtrOutput() SecretBackendConnectionRedshiftPtrOutput

func (SecretBackendConnectionRedshiftOutput) ToSecretBackendConnectionRedshiftPtrOutputWithContext

func (o SecretBackendConnectionRedshiftOutput) ToSecretBackendConnectionRedshiftPtrOutputWithContext(ctx context.Context) SecretBackendConnectionRedshiftPtrOutput

func (SecretBackendConnectionRedshiftOutput) Username

The username to authenticate with.

func (SecretBackendConnectionRedshiftOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionRedshiftPtrInput

type SecretBackendConnectionRedshiftPtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionRedshiftPtrOutput() SecretBackendConnectionRedshiftPtrOutput
	ToSecretBackendConnectionRedshiftPtrOutputWithContext(context.Context) SecretBackendConnectionRedshiftPtrOutput
}

SecretBackendConnectionRedshiftPtrInput is an input type that accepts SecretBackendConnectionRedshiftArgs, SecretBackendConnectionRedshiftPtr and SecretBackendConnectionRedshiftPtrOutput values. You can construct a concrete instance of `SecretBackendConnectionRedshiftPtrInput` via:

        SecretBackendConnectionRedshiftArgs{...}

or:

        nil

type SecretBackendConnectionRedshiftPtrOutput

type SecretBackendConnectionRedshiftPtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionRedshiftPtrOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionRedshiftPtrOutput) DisableEscaping

Disable special character escaping in username and password.

func (SecretBackendConnectionRedshiftPtrOutput) Elem

func (SecretBackendConnectionRedshiftPtrOutput) ElementType

func (SecretBackendConnectionRedshiftPtrOutput) MaxConnectionLifetime

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionRedshiftPtrOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionRedshiftPtrOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionRedshiftPtrOutput) Password

The password to authenticate with.

func (SecretBackendConnectionRedshiftPtrOutput) ToSecretBackendConnectionRedshiftPtrOutput

func (o SecretBackendConnectionRedshiftPtrOutput) ToSecretBackendConnectionRedshiftPtrOutput() SecretBackendConnectionRedshiftPtrOutput

func (SecretBackendConnectionRedshiftPtrOutput) ToSecretBackendConnectionRedshiftPtrOutputWithContext

func (o SecretBackendConnectionRedshiftPtrOutput) ToSecretBackendConnectionRedshiftPtrOutputWithContext(ctx context.Context) SecretBackendConnectionRedshiftPtrOutput

func (SecretBackendConnectionRedshiftPtrOutput) Username

The username to authenticate with.

func (SecretBackendConnectionRedshiftPtrOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionSnowflake

type SecretBackendConnectionSnowflake struct {
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password *string `pulumi:"password"`
	// The username to authenticate with.
	Username *string `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
}

type SecretBackendConnectionSnowflakeArgs

type SecretBackendConnectionSnowflakeArgs struct {
	// A URL containing connection information. See
	// the [Vault
	// docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload)
	// for an example.
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// The maximum number of seconds to keep
	// a connection alive for.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// maintain.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// use.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// The password to authenticate with.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// The username to authenticate with.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// Template describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
}

func (SecretBackendConnectionSnowflakeArgs) ElementType

func (SecretBackendConnectionSnowflakeArgs) ToSecretBackendConnectionSnowflakeOutput

func (i SecretBackendConnectionSnowflakeArgs) ToSecretBackendConnectionSnowflakeOutput() SecretBackendConnectionSnowflakeOutput

func (SecretBackendConnectionSnowflakeArgs) ToSecretBackendConnectionSnowflakeOutputWithContext

func (i SecretBackendConnectionSnowflakeArgs) ToSecretBackendConnectionSnowflakeOutputWithContext(ctx context.Context) SecretBackendConnectionSnowflakeOutput

func (SecretBackendConnectionSnowflakeArgs) ToSecretBackendConnectionSnowflakePtrOutput

func (i SecretBackendConnectionSnowflakeArgs) ToSecretBackendConnectionSnowflakePtrOutput() SecretBackendConnectionSnowflakePtrOutput

func (SecretBackendConnectionSnowflakeArgs) ToSecretBackendConnectionSnowflakePtrOutputWithContext

func (i SecretBackendConnectionSnowflakeArgs) ToSecretBackendConnectionSnowflakePtrOutputWithContext(ctx context.Context) SecretBackendConnectionSnowflakePtrOutput

type SecretBackendConnectionSnowflakeInput

type SecretBackendConnectionSnowflakeInput interface {
	pulumi.Input

	ToSecretBackendConnectionSnowflakeOutput() SecretBackendConnectionSnowflakeOutput
	ToSecretBackendConnectionSnowflakeOutputWithContext(context.Context) SecretBackendConnectionSnowflakeOutput
}

SecretBackendConnectionSnowflakeInput is an input type that accepts SecretBackendConnectionSnowflakeArgs and SecretBackendConnectionSnowflakeOutput values. You can construct a concrete instance of `SecretBackendConnectionSnowflakeInput` via:

SecretBackendConnectionSnowflakeArgs{...}

type SecretBackendConnectionSnowflakeOutput

type SecretBackendConnectionSnowflakeOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionSnowflakeOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionSnowflakeOutput) ElementType

func (SecretBackendConnectionSnowflakeOutput) MaxConnectionLifetime

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionSnowflakeOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionSnowflakeOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionSnowflakeOutput) Password

The password to authenticate with.

func (SecretBackendConnectionSnowflakeOutput) ToSecretBackendConnectionSnowflakeOutput

func (o SecretBackendConnectionSnowflakeOutput) ToSecretBackendConnectionSnowflakeOutput() SecretBackendConnectionSnowflakeOutput

func (SecretBackendConnectionSnowflakeOutput) ToSecretBackendConnectionSnowflakeOutputWithContext

func (o SecretBackendConnectionSnowflakeOutput) ToSecretBackendConnectionSnowflakeOutputWithContext(ctx context.Context) SecretBackendConnectionSnowflakeOutput

func (SecretBackendConnectionSnowflakeOutput) ToSecretBackendConnectionSnowflakePtrOutput

func (o SecretBackendConnectionSnowflakeOutput) ToSecretBackendConnectionSnowflakePtrOutput() SecretBackendConnectionSnowflakePtrOutput

func (SecretBackendConnectionSnowflakeOutput) ToSecretBackendConnectionSnowflakePtrOutputWithContext

func (o SecretBackendConnectionSnowflakeOutput) ToSecretBackendConnectionSnowflakePtrOutputWithContext(ctx context.Context) SecretBackendConnectionSnowflakePtrOutput

func (SecretBackendConnectionSnowflakeOutput) Username

The username to authenticate with.

func (SecretBackendConnectionSnowflakeOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionSnowflakePtrInput

type SecretBackendConnectionSnowflakePtrInput interface {
	pulumi.Input

	ToSecretBackendConnectionSnowflakePtrOutput() SecretBackendConnectionSnowflakePtrOutput
	ToSecretBackendConnectionSnowflakePtrOutputWithContext(context.Context) SecretBackendConnectionSnowflakePtrOutput
}

SecretBackendConnectionSnowflakePtrInput is an input type that accepts SecretBackendConnectionSnowflakeArgs, SecretBackendConnectionSnowflakePtr and SecretBackendConnectionSnowflakePtrOutput values. You can construct a concrete instance of `SecretBackendConnectionSnowflakePtrInput` via:

        SecretBackendConnectionSnowflakeArgs{...}

or:

        nil

type SecretBackendConnectionSnowflakePtrOutput

type SecretBackendConnectionSnowflakePtrOutput struct{ *pulumi.OutputState }

func (SecretBackendConnectionSnowflakePtrOutput) ConnectionUrl

A URL containing connection information. See the [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/mongodb.html#sample-payload) for an example.

func (SecretBackendConnectionSnowflakePtrOutput) Elem

func (SecretBackendConnectionSnowflakePtrOutput) ElementType

func (SecretBackendConnectionSnowflakePtrOutput) MaxConnectionLifetime

The maximum number of seconds to keep a connection alive for.

func (SecretBackendConnectionSnowflakePtrOutput) MaxIdleConnections

The maximum number of idle connections to maintain.

func (SecretBackendConnectionSnowflakePtrOutput) MaxOpenConnections

The maximum number of open connections to use.

func (SecretBackendConnectionSnowflakePtrOutput) Password

The password to authenticate with.

func (SecretBackendConnectionSnowflakePtrOutput) ToSecretBackendConnectionSnowflakePtrOutput

func (o SecretBackendConnectionSnowflakePtrOutput) ToSecretBackendConnectionSnowflakePtrOutput() SecretBackendConnectionSnowflakePtrOutput

func (SecretBackendConnectionSnowflakePtrOutput) ToSecretBackendConnectionSnowflakePtrOutputWithContext

func (o SecretBackendConnectionSnowflakePtrOutput) ToSecretBackendConnectionSnowflakePtrOutputWithContext(ctx context.Context) SecretBackendConnectionSnowflakePtrOutput

func (SecretBackendConnectionSnowflakePtrOutput) Username

The username to authenticate with.

func (SecretBackendConnectionSnowflakePtrOutput) UsernameTemplate

Template describing how dynamic usernames are generated.

type SecretBackendConnectionState

type SecretBackendConnectionState struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput
	// The unique name of the Vault mount to configure.
	Backend pulumi.StringPtrInput
	// A nested block containing configuration options for Cassandra connections.
	Cassandra SecretBackendConnectionCassandraPtrInput
	// A nested block containing configuration options for Couchbase connections.
	Couchbase SecretBackendConnectionCouchbasePtrInput
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	Data pulumi.MapInput
	// A nested block containing configuration options for Elasticsearch connections.
	Elasticsearch SecretBackendConnectionElasticsearchPtrInput
	// A nested block containing configuration options for SAP HanaDB connections.
	Hana SecretBackendConnectionHanaPtrInput
	// A nested block containing configuration options for InfluxDB connections.
	Influxdb SecretBackendConnectionInfluxdbPtrInput
	// A nested block containing configuration options for MongoDB connections.
	Mongodb SecretBackendConnectionMongodbPtrInput
	// A nested block containing configuration options for MongoDB Atlas connections.
	Mongodbatlas SecretBackendConnectionMongodbatlasPtrInput
	// A nested block containing configuration options for MSSQL connections.
	Mssql SecretBackendConnectionMssqlPtrInput
	// A nested block containing configuration options for MySQL connections.
	Mysql SecretBackendConnectionMysqlPtrInput
	// A nested block containing configuration options for Aurora MySQL connections.
	MysqlAurora SecretBackendConnectionMysqlAuroraPtrInput
	// A nested block containing configuration options for legacy MySQL connections.
	MysqlLegacy SecretBackendConnectionMysqlLegacyPtrInput
	// A nested block containing configuration options for RDS MySQL connections.
	MysqlRds SecretBackendConnectionMysqlRdsPtrInput
	// A unique name to give the database connection.
	Name pulumi.StringPtrInput
	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The `namespace` is always relative to the provider's configured namespace.
	// *Available only for Vault Enterprise*.
	Namespace pulumi.StringPtrInput
	// A nested block containing configuration options for Oracle connections.
	Oracle SecretBackendConnectionOraclePtrInput
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput
	// A nested block containing configuration options for PostgreSQL connections.
	Postgresql SecretBackendConnectionPostgresqlPtrInput
	// A nested block containing configuration options for Redis connections.
	Redis SecretBackendConnectionRedisPtrInput
	// A nested block containing configuration options for Redis ElastiCache connections.
	//
	// Exactly one of the nested blocks of configuration options must be supplied.
	RedisElasticache SecretBackendConnectionRedisElasticachePtrInput
	// Connection parameters for the redshift-database-plugin plugin.
	Redshift SecretBackendConnectionRedshiftPtrInput
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput
	// A nested block containing configuration options for Snowflake connections.
	Snowflake SecretBackendConnectionSnowflakePtrInput
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput
}

func (SecretBackendConnectionState) ElementType

type SecretBackendRole

type SecretBackendRole struct {
	pulumi.CustomResourceState

	// The unique name of the Vault mount to configure.
	Backend pulumi.StringOutput `pulumi:"backend"`
	// The database statements to execute when
	// creating a user.
	CreationStatements pulumi.StringArrayOutput `pulumi:"creationStatements"`
	// Specifies the configuration
	// for the given `credentialType`.
	//
	// The following options are available for each `credentialType` value:
	CredentialConfig pulumi.MapOutput `pulumi:"credentialConfig"`
	// Specifies the type of credential that
	// will be generated for the role. Options include: `password`, `rsaPrivateKey`, `clientCertificate`.
	// See the plugin's API page for credential types supported by individual databases.
	CredentialType pulumi.StringOutput `pulumi:"credentialType"`
	// The unique name of the database connection to use for
	// the role.
	DbName pulumi.StringOutput `pulumi:"dbName"`
	// The default number of seconds for leases for this
	// role.
	DefaultTtl pulumi.IntPtrOutput `pulumi:"defaultTtl"`
	// The maximum number of seconds for leases for this
	// role.
	MaxTtl pulumi.IntPtrOutput `pulumi:"maxTtl"`
	// A unique name to give the role.
	Name pulumi.StringOutput `pulumi:"name"`
	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The `namespace` is always relative to the provider's configured namespace.
	// *Available only for Vault Enterprise*.
	Namespace pulumi.StringPtrOutput `pulumi:"namespace"`
	// The database statements to execute when
	// renewing a user.
	RenewStatements pulumi.StringArrayOutput `pulumi:"renewStatements"`
	// The database statements to execute when
	// revoking a user.
	RevocationStatements pulumi.StringArrayOutput `pulumi:"revocationStatements"`
	// The database statements to execute when
	// rolling back creation due to an error.
	RollbackStatements pulumi.StringArrayOutput `pulumi:"rollbackStatements"`
}

## Example Usage

<!--Start PulumiCodeChooser --> ```go package main

import (

"github.com/pulumi/pulumi-vault/sdk/v6/go/vault"
"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/database"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"

)

func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		db, err := vault.NewMount(ctx, "db", &vault.MountArgs{
			Path: pulumi.String("postgres"),
			Type: pulumi.String("database"),
		})
		if err != nil {
			return err
		}
		postgres, err := database.NewSecretBackendConnection(ctx, "postgres", &database.SecretBackendConnectionArgs{
			Backend: db.Path,
			AllowedRoles: pulumi.StringArray{
				pulumi.String("dev"),
				pulumi.String("prod"),
			},
			Postgresql: &database.SecretBackendConnectionPostgresqlArgs{
				ConnectionUrl: pulumi.String("postgres://username:password@host:port/database"),
			},
		})
		if err != nil {
			return err
		}
		_, err = database.NewSecretBackendRole(ctx, "role", &database.SecretBackendRoleArgs{
			Backend: db.Path,
			DbName:  postgres.Name,
			CreationStatements: pulumi.StringArray{
				pulumi.String("CREATE ROLE \"{{name}}\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}';"),
			},
		})
		if err != nil {
			return err
		}
		return nil
	})
}

``` <!--End PulumiCodeChooser -->

## Import

Database secret backend roles can be imported using the `backend`, `/roles/`, and the `name` e.g.

```sh $ pulumi import vault:database/secretBackendRole:SecretBackendRole example postgres/roles/my-role ```

func GetSecretBackendRole

func GetSecretBackendRole(ctx *pulumi.Context,
	name string, id pulumi.IDInput, state *SecretBackendRoleState, opts ...pulumi.ResourceOption) (*SecretBackendRole, error)

GetSecretBackendRole gets an existing SecretBackendRole resource's state with the given name, ID, and optional state properties that are used to uniquely qualify the lookup (nil if not required).

func NewSecretBackendRole

func NewSecretBackendRole(ctx *pulumi.Context,
	name string, args *SecretBackendRoleArgs, opts ...pulumi.ResourceOption) (*SecretBackendRole, error)

NewSecretBackendRole registers a new resource with the given unique name, arguments, and options.

func (*SecretBackendRole) ElementType

func (*SecretBackendRole) ElementType() reflect.Type

func (*SecretBackendRole) ToSecretBackendRoleOutput

func (i *SecretBackendRole) ToSecretBackendRoleOutput() SecretBackendRoleOutput

func (*SecretBackendRole) ToSecretBackendRoleOutputWithContext

func (i *SecretBackendRole) ToSecretBackendRoleOutputWithContext(ctx context.Context) SecretBackendRoleOutput

type SecretBackendRoleArgs

type SecretBackendRoleArgs struct {
	// The unique name of the Vault mount to configure.
	Backend pulumi.StringInput
	// The database statements to execute when
	// creating a user.
	CreationStatements pulumi.StringArrayInput
	// Specifies the configuration
	// for the given `credentialType`.
	//
	// The following options are available for each `credentialType` value:
	CredentialConfig pulumi.MapInput
	// Specifies the type of credential that
	// will be generated for the role. Options include: `password`, `rsaPrivateKey`, `clientCertificate`.
	// See the plugin's API page for credential types supported by individual databases.
	CredentialType pulumi.StringPtrInput
	// The unique name of the database connection to use for
	// the role.
	DbName pulumi.StringInput
	// The default number of seconds for leases for this
	// role.
	DefaultTtl pulumi.IntPtrInput
	// The maximum number of seconds for leases for this
	// role.
	MaxTtl pulumi.IntPtrInput
	// A unique name to give the role.
	Name pulumi.StringPtrInput
	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The `namespace` is always relative to the provider's configured namespace.
	// *Available only for Vault Enterprise*.
	Namespace pulumi.StringPtrInput
	// The database statements to execute when
	// renewing a user.
	RenewStatements pulumi.StringArrayInput
	// The database statements to execute when
	// revoking a user.
	RevocationStatements pulumi.StringArrayInput
	// The database statements to execute when
	// rolling back creation due to an error.
	RollbackStatements pulumi.StringArrayInput
}

The set of arguments for constructing a SecretBackendRole resource.

func (SecretBackendRoleArgs) ElementType

func (SecretBackendRoleArgs) ElementType() reflect.Type

type SecretBackendRoleArray

type SecretBackendRoleArray []SecretBackendRoleInput

func (SecretBackendRoleArray) ElementType

func (SecretBackendRoleArray) ElementType() reflect.Type

func (SecretBackendRoleArray) ToSecretBackendRoleArrayOutput

func (i SecretBackendRoleArray) ToSecretBackendRoleArrayOutput() SecretBackendRoleArrayOutput

func (SecretBackendRoleArray) ToSecretBackendRoleArrayOutputWithContext

func (i SecretBackendRoleArray) ToSecretBackendRoleArrayOutputWithContext(ctx context.Context) SecretBackendRoleArrayOutput

type SecretBackendRoleArrayInput

type SecretBackendRoleArrayInput interface {
	pulumi.Input

	ToSecretBackendRoleArrayOutput() SecretBackendRoleArrayOutput
	ToSecretBackendRoleArrayOutputWithContext(context.Context) SecretBackendRoleArrayOutput
}

SecretBackendRoleArrayInput is an input type that accepts SecretBackendRoleArray and SecretBackendRoleArrayOutput values. You can construct a concrete instance of `SecretBackendRoleArrayInput` via:

SecretBackendRoleArray{ SecretBackendRoleArgs{...} }

type SecretBackendRoleArrayOutput

type SecretBackendRoleArrayOutput struct{ *pulumi.OutputState }

func (SecretBackendRoleArrayOutput) ElementType

func (SecretBackendRoleArrayOutput) Index

func (SecretBackendRoleArrayOutput) ToSecretBackendRoleArrayOutput

func (o SecretBackendRoleArrayOutput) ToSecretBackendRoleArrayOutput() SecretBackendRoleArrayOutput

func (SecretBackendRoleArrayOutput) ToSecretBackendRoleArrayOutputWithContext

func (o SecretBackendRoleArrayOutput) ToSecretBackendRoleArrayOutputWithContext(ctx context.Context) SecretBackendRoleArrayOutput

type SecretBackendRoleInput

type SecretBackendRoleInput interface {
	pulumi.Input

	ToSecretBackendRoleOutput() SecretBackendRoleOutput
	ToSecretBackendRoleOutputWithContext(ctx context.Context) SecretBackendRoleOutput
}

type SecretBackendRoleMap

type SecretBackendRoleMap map[string]SecretBackendRoleInput

func (SecretBackendRoleMap) ElementType

func (SecretBackendRoleMap) ElementType() reflect.Type

func (SecretBackendRoleMap) ToSecretBackendRoleMapOutput

func (i SecretBackendRoleMap) ToSecretBackendRoleMapOutput() SecretBackendRoleMapOutput

func (SecretBackendRoleMap) ToSecretBackendRoleMapOutputWithContext

func (i SecretBackendRoleMap) ToSecretBackendRoleMapOutputWithContext(ctx context.Context) SecretBackendRoleMapOutput

type SecretBackendRoleMapInput

type SecretBackendRoleMapInput interface {
	pulumi.Input

	ToSecretBackendRoleMapOutput() SecretBackendRoleMapOutput
	ToSecretBackendRoleMapOutputWithContext(context.Context) SecretBackendRoleMapOutput
}

SecretBackendRoleMapInput is an input type that accepts SecretBackendRoleMap and SecretBackendRoleMapOutput values. You can construct a concrete instance of `SecretBackendRoleMapInput` via:

SecretBackendRoleMap{ "key": SecretBackendRoleArgs{...} }

type SecretBackendRoleMapOutput

type SecretBackendRoleMapOutput struct{ *pulumi.OutputState }

func (SecretBackendRoleMapOutput) ElementType

func (SecretBackendRoleMapOutput) ElementType() reflect.Type

func (SecretBackendRoleMapOutput) MapIndex

func (SecretBackendRoleMapOutput) ToSecretBackendRoleMapOutput

func (o SecretBackendRoleMapOutput) ToSecretBackendRoleMapOutput() SecretBackendRoleMapOutput

func (SecretBackendRoleMapOutput) ToSecretBackendRoleMapOutputWithContext

func (o SecretBackendRoleMapOutput) ToSecretBackendRoleMapOutputWithContext(ctx context.Context) SecretBackendRoleMapOutput

type SecretBackendRoleOutput

type SecretBackendRoleOutput struct{ *pulumi.OutputState }

func (SecretBackendRoleOutput) Backend

The unique name of the Vault mount to configure.

func (SecretBackendRoleOutput) CreationStatements

func (o SecretBackendRoleOutput) CreationStatements() pulumi.StringArrayOutput

The database statements to execute when creating a user.

func (SecretBackendRoleOutput) CredentialConfig

func (o SecretBackendRoleOutput) CredentialConfig() pulumi.MapOutput

Specifies the configuration for the given `credentialType`.

The following options are available for each `credentialType` value:

func (SecretBackendRoleOutput) CredentialType

func (o SecretBackendRoleOutput) CredentialType() pulumi.StringOutput

Specifies the type of credential that will be generated for the role. Options include: `password`, `rsaPrivateKey`, `clientCertificate`. See the plugin's API page for credential types supported by individual databases.

func (SecretBackendRoleOutput) DbName

The unique name of the database connection to use for the role.

func (SecretBackendRoleOutput) DefaultTtl

The default number of seconds for leases for this role.

func (SecretBackendRoleOutput) ElementType

func (SecretBackendRoleOutput) ElementType() reflect.Type

func (SecretBackendRoleOutput) MaxTtl

The maximum number of seconds for leases for this role.

func (SecretBackendRoleOutput) Name

A unique name to give the role.

func (SecretBackendRoleOutput) Namespace

The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The `namespace` is always relative to the provider's configured namespace. *Available only for Vault Enterprise*.

func (SecretBackendRoleOutput) RenewStatements

func (o SecretBackendRoleOutput) RenewStatements() pulumi.StringArrayOutput

The database statements to execute when renewing a user.

func (SecretBackendRoleOutput) RevocationStatements

func (o SecretBackendRoleOutput) RevocationStatements() pulumi.StringArrayOutput

The database statements to execute when revoking a user.

func (SecretBackendRoleOutput) RollbackStatements

func (o SecretBackendRoleOutput) RollbackStatements() pulumi.StringArrayOutput

The database statements to execute when rolling back creation due to an error.

func (SecretBackendRoleOutput) ToSecretBackendRoleOutput

func (o SecretBackendRoleOutput) ToSecretBackendRoleOutput() SecretBackendRoleOutput

func (SecretBackendRoleOutput) ToSecretBackendRoleOutputWithContext

func (o SecretBackendRoleOutput) ToSecretBackendRoleOutputWithContext(ctx context.Context) SecretBackendRoleOutput

type SecretBackendRoleState

type SecretBackendRoleState struct {
	// The unique name of the Vault mount to configure.
	Backend pulumi.StringPtrInput
	// The database statements to execute when
	// creating a user.
	CreationStatements pulumi.StringArrayInput
	// Specifies the configuration
	// for the given `credentialType`.
	//
	// The following options are available for each `credentialType` value:
	CredentialConfig pulumi.MapInput
	// Specifies the type of credential that
	// will be generated for the role. Options include: `password`, `rsaPrivateKey`, `clientCertificate`.
	// See the plugin's API page for credential types supported by individual databases.
	CredentialType pulumi.StringPtrInput
	// The unique name of the database connection to use for
	// the role.
	DbName pulumi.StringPtrInput
	// The default number of seconds for leases for this
	// role.
	DefaultTtl pulumi.IntPtrInput
	// The maximum number of seconds for leases for this
	// role.
	MaxTtl pulumi.IntPtrInput
	// A unique name to give the role.
	Name pulumi.StringPtrInput
	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The `namespace` is always relative to the provider's configured namespace.
	// *Available only for Vault Enterprise*.
	Namespace pulumi.StringPtrInput
	// The database statements to execute when
	// renewing a user.
	RenewStatements pulumi.StringArrayInput
	// The database statements to execute when
	// revoking a user.
	RevocationStatements pulumi.StringArrayInput
	// The database statements to execute when
	// rolling back creation due to an error.
	RollbackStatements pulumi.StringArrayInput
}

func (SecretBackendRoleState) ElementType

func (SecretBackendRoleState) ElementType() reflect.Type

type SecretBackendStaticRole

type SecretBackendStaticRole struct {
	pulumi.CustomResourceState

	// The unique name of the Vault mount to configure.
	Backend pulumi.StringOutput `pulumi:"backend"`
	// The unique name of the database connection to use for the static role.
	DbName pulumi.StringOutput `pulumi:"dbName"`
	// A unique name to give the static role.
	Name pulumi.StringOutput `pulumi:"name"`
	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The `namespace` is always relative to the provider's configured namespace.
	// *Available only for Vault Enterprise*.
	Namespace pulumi.StringPtrOutput `pulumi:"namespace"`
	// The amount of time Vault should wait before rotating the password, in seconds.
	// Mutually exclusive with `rotationSchedule`.
	RotationPeriod pulumi.IntPtrOutput `pulumi:"rotationPeriod"`
	// A cron-style string that will define the schedule on which rotations should occur.
	// Mutually exclusive with `rotationPeriod`.
	//
	// **Warning**: The `rotationPeriod` and `rotationSchedule` fields are
	// mutually exclusive. One of them must be set but not both.
	RotationSchedule pulumi.StringPtrOutput `pulumi:"rotationSchedule"`
	// Database statements to execute to rotate the password for the configured database user.
	RotationStatements pulumi.StringArrayOutput `pulumi:"rotationStatements"`
	// The amount of time, in seconds, in which rotations are allowed to occur starting
	// from a given `rotationSchedule`.
	RotationWindow pulumi.IntPtrOutput `pulumi:"rotationWindow"`
	// The database username that this static role corresponds to.
	Username pulumi.StringOutput `pulumi:"username"`
}

Creates a Database Secret Backend static role in Vault. Database secret backend static roles can be used to manage 1-to-1 mapping of a Vault Role to a user in a database for the database.

## Example Usage

<!--Start PulumiCodeChooser --> ```go package main

import (

"github.com/pulumi/pulumi-vault/sdk/v6/go/vault"
"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/database"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"

)

func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		db, err := vault.NewMount(ctx, "db", &vault.MountArgs{
			Path: pulumi.String("postgres"),
			Type: pulumi.String("database"),
		})
		if err != nil {
			return err
		}
		postgres, err := database.NewSecretBackendConnection(ctx, "postgres", &database.SecretBackendConnectionArgs{
			Backend: db.Path,
			AllowedRoles: pulumi.StringArray{
				pulumi.String("*"),
			},
			Postgresql: &database.SecretBackendConnectionPostgresqlArgs{
				ConnectionUrl: pulumi.String("postgres://username:password@host:port/database"),
			},
		})
		if err != nil {
			return err
		}
		// configure a static role with period-based rotations
		_, err = database.NewSecretBackendStaticRole(ctx, "periodRole", &database.SecretBackendStaticRoleArgs{
			Backend:        db.Path,
			DbName:         postgres.Name,
			Username:       pulumi.String("example"),
			RotationPeriod: pulumi.Int(3600),
			RotationStatements: pulumi.StringArray{
				pulumi.String("ALTER USER \"{{name}}\" WITH PASSWORD '{{password}}';"),
			},
		})
		if err != nil {
			return err
		}
		// configure a static role with schedule-based rotations
		_, err = database.NewSecretBackendStaticRole(ctx, "scheduleRole", &database.SecretBackendStaticRoleArgs{
			Backend:          db.Path,
			DbName:           postgres.Name,
			Username:         pulumi.String("example"),
			RotationSchedule: pulumi.String("0 0 * * SAT"),
			RotationWindow:   pulumi.Int(172800),
			RotationStatements: pulumi.StringArray{
				pulumi.String("ALTER USER \"{{name}}\" WITH PASSWORD '{{password}}';"),
			},
		})
		if err != nil {
			return err
		}
		return nil
	})
}

``` <!--End PulumiCodeChooser -->

## Import

Database secret backend static roles can be imported using the `backend`, `/static-roles/`, and the `name` e.g.

```sh $ pulumi import vault:database/secretBackendStaticRole:SecretBackendStaticRole example postgres/static-roles/my-role ```

func GetSecretBackendStaticRole

func GetSecretBackendStaticRole(ctx *pulumi.Context,
	name string, id pulumi.IDInput, state *SecretBackendStaticRoleState, opts ...pulumi.ResourceOption) (*SecretBackendStaticRole, error)

GetSecretBackendStaticRole gets an existing SecretBackendStaticRole resource's state with the given name, ID, and optional state properties that are used to uniquely qualify the lookup (nil if not required).

func NewSecretBackendStaticRole

func NewSecretBackendStaticRole(ctx *pulumi.Context,
	name string, args *SecretBackendStaticRoleArgs, opts ...pulumi.ResourceOption) (*SecretBackendStaticRole, error)

NewSecretBackendStaticRole registers a new resource with the given unique name, arguments, and options.

func (*SecretBackendStaticRole) ElementType

func (*SecretBackendStaticRole) ElementType() reflect.Type

func (*SecretBackendStaticRole) ToSecretBackendStaticRoleOutput

func (i *SecretBackendStaticRole) ToSecretBackendStaticRoleOutput() SecretBackendStaticRoleOutput

func (*SecretBackendStaticRole) ToSecretBackendStaticRoleOutputWithContext

func (i *SecretBackendStaticRole) ToSecretBackendStaticRoleOutputWithContext(ctx context.Context) SecretBackendStaticRoleOutput

type SecretBackendStaticRoleArgs

type SecretBackendStaticRoleArgs struct {
	// The unique name of the Vault mount to configure.
	Backend pulumi.StringInput
	// The unique name of the database connection to use for the static role.
	DbName pulumi.StringInput
	// A unique name to give the static role.
	Name pulumi.StringPtrInput
	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The `namespace` is always relative to the provider's configured namespace.
	// *Available only for Vault Enterprise*.
	Namespace pulumi.StringPtrInput
	// The amount of time Vault should wait before rotating the password, in seconds.
	// Mutually exclusive with `rotationSchedule`.
	RotationPeriod pulumi.IntPtrInput
	// A cron-style string that will define the schedule on which rotations should occur.
	// Mutually exclusive with `rotationPeriod`.
	//
	// **Warning**: The `rotationPeriod` and `rotationSchedule` fields are
	// mutually exclusive. One of them must be set but not both.
	RotationSchedule pulumi.StringPtrInput
	// Database statements to execute to rotate the password for the configured database user.
	RotationStatements pulumi.StringArrayInput
	// The amount of time, in seconds, in which rotations are allowed to occur starting
	// from a given `rotationSchedule`.
	RotationWindow pulumi.IntPtrInput
	// The database username that this static role corresponds to.
	Username pulumi.StringInput
}

The set of arguments for constructing a SecretBackendStaticRole resource.

func (SecretBackendStaticRoleArgs) ElementType

type SecretBackendStaticRoleArray

type SecretBackendStaticRoleArray []SecretBackendStaticRoleInput

func (SecretBackendStaticRoleArray) ElementType

func (SecretBackendStaticRoleArray) ToSecretBackendStaticRoleArrayOutput

func (i SecretBackendStaticRoleArray) ToSecretBackendStaticRoleArrayOutput() SecretBackendStaticRoleArrayOutput

func (SecretBackendStaticRoleArray) ToSecretBackendStaticRoleArrayOutputWithContext

func (i SecretBackendStaticRoleArray) ToSecretBackendStaticRoleArrayOutputWithContext(ctx context.Context) SecretBackendStaticRoleArrayOutput

type SecretBackendStaticRoleArrayInput

type SecretBackendStaticRoleArrayInput interface {
	pulumi.Input

	ToSecretBackendStaticRoleArrayOutput() SecretBackendStaticRoleArrayOutput
	ToSecretBackendStaticRoleArrayOutputWithContext(context.Context) SecretBackendStaticRoleArrayOutput
}

SecretBackendStaticRoleArrayInput is an input type that accepts SecretBackendStaticRoleArray and SecretBackendStaticRoleArrayOutput values. You can construct a concrete instance of `SecretBackendStaticRoleArrayInput` via:

SecretBackendStaticRoleArray{ SecretBackendStaticRoleArgs{...} }

type SecretBackendStaticRoleArrayOutput

type SecretBackendStaticRoleArrayOutput struct{ *pulumi.OutputState }

func (SecretBackendStaticRoleArrayOutput) ElementType

func (SecretBackendStaticRoleArrayOutput) Index

func (SecretBackendStaticRoleArrayOutput) ToSecretBackendStaticRoleArrayOutput

func (o SecretBackendStaticRoleArrayOutput) ToSecretBackendStaticRoleArrayOutput() SecretBackendStaticRoleArrayOutput

func (SecretBackendStaticRoleArrayOutput) ToSecretBackendStaticRoleArrayOutputWithContext

func (o SecretBackendStaticRoleArrayOutput) ToSecretBackendStaticRoleArrayOutputWithContext(ctx context.Context) SecretBackendStaticRoleArrayOutput

type SecretBackendStaticRoleInput

type SecretBackendStaticRoleInput interface {
	pulumi.Input

	ToSecretBackendStaticRoleOutput() SecretBackendStaticRoleOutput
	ToSecretBackendStaticRoleOutputWithContext(ctx context.Context) SecretBackendStaticRoleOutput
}

type SecretBackendStaticRoleMap

type SecretBackendStaticRoleMap map[string]SecretBackendStaticRoleInput

func (SecretBackendStaticRoleMap) ElementType

func (SecretBackendStaticRoleMap) ElementType() reflect.Type

func (SecretBackendStaticRoleMap) ToSecretBackendStaticRoleMapOutput

func (i SecretBackendStaticRoleMap) ToSecretBackendStaticRoleMapOutput() SecretBackendStaticRoleMapOutput

func (SecretBackendStaticRoleMap) ToSecretBackendStaticRoleMapOutputWithContext

func (i SecretBackendStaticRoleMap) ToSecretBackendStaticRoleMapOutputWithContext(ctx context.Context) SecretBackendStaticRoleMapOutput

type SecretBackendStaticRoleMapInput

type SecretBackendStaticRoleMapInput interface {
	pulumi.Input

	ToSecretBackendStaticRoleMapOutput() SecretBackendStaticRoleMapOutput
	ToSecretBackendStaticRoleMapOutputWithContext(context.Context) SecretBackendStaticRoleMapOutput
}

SecretBackendStaticRoleMapInput is an input type that accepts SecretBackendStaticRoleMap and SecretBackendStaticRoleMapOutput values. You can construct a concrete instance of `SecretBackendStaticRoleMapInput` via:

SecretBackendStaticRoleMap{ "key": SecretBackendStaticRoleArgs{...} }

type SecretBackendStaticRoleMapOutput

type SecretBackendStaticRoleMapOutput struct{ *pulumi.OutputState }

func (SecretBackendStaticRoleMapOutput) ElementType

func (SecretBackendStaticRoleMapOutput) MapIndex

func (SecretBackendStaticRoleMapOutput) ToSecretBackendStaticRoleMapOutput

func (o SecretBackendStaticRoleMapOutput) ToSecretBackendStaticRoleMapOutput() SecretBackendStaticRoleMapOutput

func (SecretBackendStaticRoleMapOutput) ToSecretBackendStaticRoleMapOutputWithContext

func (o SecretBackendStaticRoleMapOutput) ToSecretBackendStaticRoleMapOutputWithContext(ctx context.Context) SecretBackendStaticRoleMapOutput

type SecretBackendStaticRoleOutput

type SecretBackendStaticRoleOutput struct{ *pulumi.OutputState }

func (SecretBackendStaticRoleOutput) Backend

The unique name of the Vault mount to configure.

func (SecretBackendStaticRoleOutput) DbName

The unique name of the database connection to use for the static role.

func (SecretBackendStaticRoleOutput) ElementType

func (SecretBackendStaticRoleOutput) Name

A unique name to give the static role.

func (SecretBackendStaticRoleOutput) Namespace

The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The `namespace` is always relative to the provider's configured namespace. *Available only for Vault Enterprise*.

func (SecretBackendStaticRoleOutput) RotationPeriod

The amount of time Vault should wait before rotating the password, in seconds. Mutually exclusive with `rotationSchedule`.

func (SecretBackendStaticRoleOutput) RotationSchedule

A cron-style string that will define the schedule on which rotations should occur. Mutually exclusive with `rotationPeriod`.

**Warning**: The `rotationPeriod` and `rotationSchedule` fields are mutually exclusive. One of them must be set but not both.

func (SecretBackendStaticRoleOutput) RotationStatements

Database statements to execute to rotate the password for the configured database user.

func (SecretBackendStaticRoleOutput) RotationWindow

The amount of time, in seconds, in which rotations are allowed to occur starting from a given `rotationSchedule`.

func (SecretBackendStaticRoleOutput) ToSecretBackendStaticRoleOutput

func (o SecretBackendStaticRoleOutput) ToSecretBackendStaticRoleOutput() SecretBackendStaticRoleOutput

func (SecretBackendStaticRoleOutput) ToSecretBackendStaticRoleOutputWithContext

func (o SecretBackendStaticRoleOutput) ToSecretBackendStaticRoleOutputWithContext(ctx context.Context) SecretBackendStaticRoleOutput

func (SecretBackendStaticRoleOutput) Username

The database username that this static role corresponds to.

type SecretBackendStaticRoleState

type SecretBackendStaticRoleState struct {
	// The unique name of the Vault mount to configure.
	Backend pulumi.StringPtrInput
	// The unique name of the database connection to use for the static role.
	DbName pulumi.StringPtrInput
	// A unique name to give the static role.
	Name pulumi.StringPtrInput
	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The `namespace` is always relative to the provider's configured namespace.
	// *Available only for Vault Enterprise*.
	Namespace pulumi.StringPtrInput
	// The amount of time Vault should wait before rotating the password, in seconds.
	// Mutually exclusive with `rotationSchedule`.
	RotationPeriod pulumi.IntPtrInput
	// A cron-style string that will define the schedule on which rotations should occur.
	// Mutually exclusive with `rotationPeriod`.
	//
	// **Warning**: The `rotationPeriod` and `rotationSchedule` fields are
	// mutually exclusive. One of them must be set but not both.
	RotationSchedule pulumi.StringPtrInput
	// Database statements to execute to rotate the password for the configured database user.
	RotationStatements pulumi.StringArrayInput
	// The amount of time, in seconds, in which rotations are allowed to occur starting
	// from a given `rotationSchedule`.
	RotationWindow pulumi.IntPtrInput
	// The database username that this static role corresponds to.
	Username pulumi.StringPtrInput
}

func (SecretBackendStaticRoleState) ElementType

type SecretsMount

type SecretsMount struct {
	pulumi.CustomResourceState

	// Accessor of the mount
	Accessor pulumi.StringOutput `pulumi:"accessor"`
	// Set of managed key registry entry names that the mount in question is allowed to access
	//
	// The following arguments are common to all database engines:
	AllowedManagedKeys pulumi.StringArrayOutput `pulumi:"allowedManagedKeys"`
	// Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
	AuditNonHmacRequestKeys pulumi.StringArrayOutput `pulumi:"auditNonHmacRequestKeys"`
	// Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
	AuditNonHmacResponseKeys pulumi.StringArrayOutput `pulumi:"auditNonHmacResponseKeys"`
	// A nested block containing configuration options for Cassandra connections.\
	// *See Configuration Options for more info*
	Cassandras SecretsMountCassandraArrayOutput `pulumi:"cassandras"`
	// A nested block containing configuration options for Couchbase connections.\
	// *See Configuration Options for more info*
	Couchbases SecretsMountCouchbaseArrayOutput `pulumi:"couchbases"`
	// Default lease duration for tokens and secrets in seconds
	DefaultLeaseTtlSeconds pulumi.IntOutput `pulumi:"defaultLeaseTtlSeconds"`
	// Human-friendly description of the mount
	Description pulumi.StringPtrOutput `pulumi:"description"`
	// A nested block containing configuration options for Elasticsearch connections.\
	// *See Configuration Options for more info*
	Elasticsearches SecretsMountElasticsearchArrayOutput `pulumi:"elasticsearches"`
	// The total number of database secrets engines configured.
	EngineCount pulumi.IntOutput `pulumi:"engineCount"`
	// Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
	ExternalEntropyAccess pulumi.BoolPtrOutput `pulumi:"externalEntropyAccess"`
	// A nested block containing configuration options for SAP HanaDB connections.\
	// *See Configuration Options for more info*
	Hanas SecretsMountHanaArrayOutput `pulumi:"hanas"`
	// A nested block containing configuration options for InfluxDB connections.\
	// *See Configuration Options for more info*
	Influxdbs SecretsMountInfluxdbArrayOutput `pulumi:"influxdbs"`
	// Boolean flag that can be explicitly set to true to enforce local mount in HA environment
	Local pulumi.BoolPtrOutput `pulumi:"local"`
	// Maximum possible lease duration for tokens and secrets in seconds
	MaxLeaseTtlSeconds pulumi.IntOutput `pulumi:"maxLeaseTtlSeconds"`
	// A nested block containing configuration options for MongoDB Atlas connections.\
	// *See Configuration Options for more info*
	Mongodbatlas SecretsMountMongodbatlaArrayOutput `pulumi:"mongodbatlas"`
	// A nested block containing configuration options for MongoDB connections.\
	// *See Configuration Options for more info*
	Mongodbs SecretsMountMongodbArrayOutput `pulumi:"mongodbs"`
	// A nested block containing configuration options for MSSQL connections.\
	// *See Configuration Options for more info*
	Mssqls SecretsMountMssqlArrayOutput `pulumi:"mssqls"`
	// A nested block containing configuration options for Aurora MySQL connections.\
	// *See Configuration Options for more info*
	MysqlAuroras SecretsMountMysqlAuroraArrayOutput `pulumi:"mysqlAuroras"`
	// A nested block containing configuration options for legacy MySQL connections.\
	// *See Configuration Options for more info*
	MysqlLegacies SecretsMountMysqlLegacyArrayOutput `pulumi:"mysqlLegacies"`
	// A nested block containing configuration options for RDS MySQL connections.\
	// *See Configuration Options for more info*
	MysqlRds SecretsMountMysqlRdArrayOutput `pulumi:"mysqlRds"`
	// A nested block containing configuration options for MySQL connections.\
	// *See Configuration Options for more info*
	Mysqls SecretsMountMysqlArrayOutput `pulumi:"mysqls"`
	// Target namespace. (requires Enterprise)
	Namespace pulumi.StringPtrOutput `pulumi:"namespace"`
	// Specifies mount type specific options that are passed to the backend
	Options pulumi.MapOutput `pulumi:"options"`
	// A nested block containing configuration options for Oracle connections.\
	// *See Configuration Options for more info*
	Oracles SecretsMountOracleArrayOutput `pulumi:"oracles"`
	// Where the secret backend will be mounted
	Path pulumi.StringOutput `pulumi:"path"`
	// A nested block containing configuration options for PostgreSQL connections.\
	// *See Configuration Options for more info*
	Postgresqls SecretsMountPostgresqlArrayOutput `pulumi:"postgresqls"`
	// A nested block containing configuration options for Redis connections.\
	// *See Configuration Options for more info*
	Redis SecretsMountRediArrayOutput `pulumi:"redis"`
	// A nested block containing configuration options for Redis ElastiCache connections.\
	// *See Configuration Options for more info*
	RedisElasticaches SecretsMountRedisElasticachArrayOutput `pulumi:"redisElasticaches"`
	// A nested block containing configuration options for AWS Redshift connections.\
	// *See Configuration Options for more info*
	Redshifts SecretsMountRedshiftArrayOutput `pulumi:"redshifts"`
	// Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
	SealWrap pulumi.BoolOutput `pulumi:"sealWrap"`
	// A nested block containing configuration options for Snowflake connections.\
	// *See Configuration Options for more info*
	Snowflakes SecretsMountSnowflakeArrayOutput `pulumi:"snowflakes"`
}

## Example Usage

<!--Start PulumiCodeChooser --> ```go package main

import (

"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/database"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"

)

func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		db, err := database.NewSecretsMount(ctx, "db", &database.SecretsMountArgs{
			Path: pulumi.String("db"),
			Mssqls: database.SecretsMountMssqlArray{
				&database.SecretsMountMssqlArgs{
					Name:          pulumi.String("db1"),
					Username:      pulumi.String("sa"),
					Password:      pulumi.String("super_secret_1"),
					ConnectionUrl: pulumi.String("sqlserver://{{username}}:{{password}}@127.0.0.1:1433"),
					AllowedRoles: pulumi.StringArray{
						pulumi.String("dev1"),
					},
				},
			},
			Postgresqls: database.SecretsMountPostgresqlArray{
				&database.SecretsMountPostgresqlArgs{
					Name:             pulumi.String("db2"),
					Username:         pulumi.String("postgres"),
					Password:         pulumi.String("super_secret_2"),
					ConnectionUrl:    pulumi.String("postgresql://{{username}}:{{password}}@127.0.0.1:5432/postgres"),
					VerifyConnection: pulumi.Bool(true),
					AllowedRoles: pulumi.StringArray{
						pulumi.String("dev2"),
					},
				},
			},
		})
		if err != nil {
			return err
		}
		_, err = database.NewSecretBackendRole(ctx, "dev1", &database.SecretBackendRoleArgs{
			Backend: db.Path,
			DbName: db.Mssqls.ApplyT(func(mssqls []database.SecretsMountMssql) (*string, error) {
				return &mssqls[0].Name, nil
			}).(pulumi.StringPtrOutput),
			CreationStatements: pulumi.StringArray{
				pulumi.String("CREATE LOGIN [{{name}}] WITH PASSWORD = '{{password}}';"),
				pulumi.String("CREATE USER [{{name}}] FOR LOGIN [{{name}}];"),
				pulumi.String("GRANT SELECT ON SCHEMA::dbo TO [{{name}}];"),
			},
		})
		if err != nil {
			return err
		}
		_, err = database.NewSecretBackendRole(ctx, "dev2", &database.SecretBackendRoleArgs{
			Backend: db.Path,
			DbName: db.Postgresqls.ApplyT(func(postgresqls []database.SecretsMountPostgresql) (*string, error) {
				return &postgresqls[0].Name, nil
			}).(pulumi.StringPtrOutput),
			CreationStatements: pulumi.StringArray{
				pulumi.String("CREATE ROLE \"{{name}}\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}';"),
				pulumi.String("GRANT SELECT ON ALL TABLES IN SCHEMA public TO \"{{name}}\";"),
			},
		})
		if err != nil {
			return err
		}
		return nil
	})
}

``` <!--End PulumiCodeChooser -->

## Import

Database secret backend connections can be imported using the `path` e.g.

```sh $ pulumi import vault:database/secretsMount:SecretsMount db db ```

func GetSecretsMount

func GetSecretsMount(ctx *pulumi.Context,
	name string, id pulumi.IDInput, state *SecretsMountState, opts ...pulumi.ResourceOption) (*SecretsMount, error)

GetSecretsMount gets an existing SecretsMount resource's state with the given name, ID, and optional state properties that are used to uniquely qualify the lookup (nil if not required).

func NewSecretsMount

func NewSecretsMount(ctx *pulumi.Context,
	name string, args *SecretsMountArgs, opts ...pulumi.ResourceOption) (*SecretsMount, error)

NewSecretsMount registers a new resource with the given unique name, arguments, and options.

func (*SecretsMount) ElementType

func (*SecretsMount) ElementType() reflect.Type

func (*SecretsMount) ToSecretsMountOutput

func (i *SecretsMount) ToSecretsMountOutput() SecretsMountOutput

func (*SecretsMount) ToSecretsMountOutputWithContext

func (i *SecretsMount) ToSecretsMountOutputWithContext(ctx context.Context) SecretsMountOutput

type SecretsMountArgs

type SecretsMountArgs struct {
	// Set of managed key registry entry names that the mount in question is allowed to access
	//
	// The following arguments are common to all database engines:
	AllowedManagedKeys pulumi.StringArrayInput
	// Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
	AuditNonHmacRequestKeys pulumi.StringArrayInput
	// Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
	AuditNonHmacResponseKeys pulumi.StringArrayInput
	// A nested block containing configuration options for Cassandra connections.\
	// *See Configuration Options for more info*
	Cassandras SecretsMountCassandraArrayInput
	// A nested block containing configuration options for Couchbase connections.\
	// *See Configuration Options for more info*
	Couchbases SecretsMountCouchbaseArrayInput
	// Default lease duration for tokens and secrets in seconds
	DefaultLeaseTtlSeconds pulumi.IntPtrInput
	// Human-friendly description of the mount
	Description pulumi.StringPtrInput
	// A nested block containing configuration options for Elasticsearch connections.\
	// *See Configuration Options for more info*
	Elasticsearches SecretsMountElasticsearchArrayInput
	// Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
	ExternalEntropyAccess pulumi.BoolPtrInput
	// A nested block containing configuration options for SAP HanaDB connections.\
	// *See Configuration Options for more info*
	Hanas SecretsMountHanaArrayInput
	// A nested block containing configuration options for InfluxDB connections.\
	// *See Configuration Options for more info*
	Influxdbs SecretsMountInfluxdbArrayInput
	// Boolean flag that can be explicitly set to true to enforce local mount in HA environment
	Local pulumi.BoolPtrInput
	// Maximum possible lease duration for tokens and secrets in seconds
	MaxLeaseTtlSeconds pulumi.IntPtrInput
	// A nested block containing configuration options for MongoDB Atlas connections.\
	// *See Configuration Options for more info*
	Mongodbatlas SecretsMountMongodbatlaArrayInput
	// A nested block containing configuration options for MongoDB connections.\
	// *See Configuration Options for more info*
	Mongodbs SecretsMountMongodbArrayInput
	// A nested block containing configuration options for MSSQL connections.\
	// *See Configuration Options for more info*
	Mssqls SecretsMountMssqlArrayInput
	// A nested block containing configuration options for Aurora MySQL connections.\
	// *See Configuration Options for more info*
	MysqlAuroras SecretsMountMysqlAuroraArrayInput
	// A nested block containing configuration options for legacy MySQL connections.\
	// *See Configuration Options for more info*
	MysqlLegacies SecretsMountMysqlLegacyArrayInput
	// A nested block containing configuration options for RDS MySQL connections.\
	// *See Configuration Options for more info*
	MysqlRds SecretsMountMysqlRdArrayInput
	// A nested block containing configuration options for MySQL connections.\
	// *See Configuration Options for more info*
	Mysqls SecretsMountMysqlArrayInput
	// Target namespace. (requires Enterprise)
	Namespace pulumi.StringPtrInput
	// Specifies mount type specific options that are passed to the backend
	Options pulumi.MapInput
	// A nested block containing configuration options for Oracle connections.\
	// *See Configuration Options for more info*
	Oracles SecretsMountOracleArrayInput
	// Where the secret backend will be mounted
	Path pulumi.StringInput
	// A nested block containing configuration options for PostgreSQL connections.\
	// *See Configuration Options for more info*
	Postgresqls SecretsMountPostgresqlArrayInput
	// A nested block containing configuration options for Redis connections.\
	// *See Configuration Options for more info*
	Redis SecretsMountRediArrayInput
	// A nested block containing configuration options for Redis ElastiCache connections.\
	// *See Configuration Options for more info*
	RedisElasticaches SecretsMountRedisElasticachArrayInput
	// A nested block containing configuration options for AWS Redshift connections.\
	// *See Configuration Options for more info*
	Redshifts SecretsMountRedshiftArrayInput
	// Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
	SealWrap pulumi.BoolPtrInput
	// A nested block containing configuration options for Snowflake connections.\
	// *See Configuration Options for more info*
	Snowflakes SecretsMountSnowflakeArrayInput
}

The set of arguments for constructing a SecretsMount resource.

func (SecretsMountArgs) ElementType

func (SecretsMountArgs) ElementType() reflect.Type

type SecretsMountArray

type SecretsMountArray []SecretsMountInput

func (SecretsMountArray) ElementType

func (SecretsMountArray) ElementType() reflect.Type

func (SecretsMountArray) ToSecretsMountArrayOutput

func (i SecretsMountArray) ToSecretsMountArrayOutput() SecretsMountArrayOutput

func (SecretsMountArray) ToSecretsMountArrayOutputWithContext

func (i SecretsMountArray) ToSecretsMountArrayOutputWithContext(ctx context.Context) SecretsMountArrayOutput

type SecretsMountArrayInput

type SecretsMountArrayInput interface {
	pulumi.Input

	ToSecretsMountArrayOutput() SecretsMountArrayOutput
	ToSecretsMountArrayOutputWithContext(context.Context) SecretsMountArrayOutput
}

SecretsMountArrayInput is an input type that accepts SecretsMountArray and SecretsMountArrayOutput values. You can construct a concrete instance of `SecretsMountArrayInput` via:

SecretsMountArray{ SecretsMountArgs{...} }

type SecretsMountArrayOutput

type SecretsMountArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountArrayOutput) ElementType

func (SecretsMountArrayOutput) ElementType() reflect.Type

func (SecretsMountArrayOutput) Index

func (SecretsMountArrayOutput) ToSecretsMountArrayOutput

func (o SecretsMountArrayOutput) ToSecretsMountArrayOutput() SecretsMountArrayOutput

func (SecretsMountArrayOutput) ToSecretsMountArrayOutputWithContext

func (o SecretsMountArrayOutput) ToSecretsMountArrayOutputWithContext(ctx context.Context) SecretsMountArrayOutput

type SecretsMountCassandra

type SecretsMountCassandra struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// The number of seconds to use as a connection
	// timeout.
	ConnectTimeout *int `pulumi:"connectTimeout"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// The hosts to connect to.
	Hosts []string `pulumi:"hosts"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls *bool `pulumi:"insecureTls"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password *string `pulumi:"password"`
	// Concatenated PEM blocks configuring the certificate
	// chain.
	PemBundle *string `pulumi:"pemBundle"`
	// A JSON structure configuring the certificate chain.
	PemJson *string `pulumi:"pemJson"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// The default port to connect to if no port is specified as
	// part of the host.
	Port *int `pulumi:"port"`
	// The CQL protocol version to use.
	ProtocolVersion *int `pulumi:"protocolVersion"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// Whether to use TLS when connecting to Cassandra.
	Tls *bool `pulumi:"tls"`
	// The root credential username used in the connection URL.
	Username *string `pulumi:"username"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountCassandraArgs

type SecretsMountCassandraArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// The number of seconds to use as a connection
	// timeout.
	ConnectTimeout pulumi.IntPtrInput `pulumi:"connectTimeout"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// The hosts to connect to.
	Hosts pulumi.StringArrayInput `pulumi:"hosts"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls pulumi.BoolPtrInput `pulumi:"insecureTls"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Concatenated PEM blocks configuring the certificate
	// chain.
	PemBundle pulumi.StringPtrInput `pulumi:"pemBundle"`
	// A JSON structure configuring the certificate chain.
	PemJson pulumi.StringPtrInput `pulumi:"pemJson"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// The default port to connect to if no port is specified as
	// part of the host.
	Port pulumi.IntPtrInput `pulumi:"port"`
	// The CQL protocol version to use.
	ProtocolVersion pulumi.IntPtrInput `pulumi:"protocolVersion"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// Whether to use TLS when connecting to Cassandra.
	Tls pulumi.BoolPtrInput `pulumi:"tls"`
	// The root credential username used in the connection URL.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountCassandraArgs) ElementType

func (SecretsMountCassandraArgs) ElementType() reflect.Type

func (SecretsMountCassandraArgs) ToSecretsMountCassandraOutput

func (i SecretsMountCassandraArgs) ToSecretsMountCassandraOutput() SecretsMountCassandraOutput

func (SecretsMountCassandraArgs) ToSecretsMountCassandraOutputWithContext

func (i SecretsMountCassandraArgs) ToSecretsMountCassandraOutputWithContext(ctx context.Context) SecretsMountCassandraOutput

type SecretsMountCassandraArray

type SecretsMountCassandraArray []SecretsMountCassandraInput

func (SecretsMountCassandraArray) ElementType

func (SecretsMountCassandraArray) ElementType() reflect.Type

func (SecretsMountCassandraArray) ToSecretsMountCassandraArrayOutput

func (i SecretsMountCassandraArray) ToSecretsMountCassandraArrayOutput() SecretsMountCassandraArrayOutput

func (SecretsMountCassandraArray) ToSecretsMountCassandraArrayOutputWithContext

func (i SecretsMountCassandraArray) ToSecretsMountCassandraArrayOutputWithContext(ctx context.Context) SecretsMountCassandraArrayOutput

type SecretsMountCassandraArrayInput

type SecretsMountCassandraArrayInput interface {
	pulumi.Input

	ToSecretsMountCassandraArrayOutput() SecretsMountCassandraArrayOutput
	ToSecretsMountCassandraArrayOutputWithContext(context.Context) SecretsMountCassandraArrayOutput
}

SecretsMountCassandraArrayInput is an input type that accepts SecretsMountCassandraArray and SecretsMountCassandraArrayOutput values. You can construct a concrete instance of `SecretsMountCassandraArrayInput` via:

SecretsMountCassandraArray{ SecretsMountCassandraArgs{...} }

type SecretsMountCassandraArrayOutput

type SecretsMountCassandraArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountCassandraArrayOutput) ElementType

func (SecretsMountCassandraArrayOutput) Index

func (SecretsMountCassandraArrayOutput) ToSecretsMountCassandraArrayOutput

func (o SecretsMountCassandraArrayOutput) ToSecretsMountCassandraArrayOutput() SecretsMountCassandraArrayOutput

func (SecretsMountCassandraArrayOutput) ToSecretsMountCassandraArrayOutputWithContext

func (o SecretsMountCassandraArrayOutput) ToSecretsMountCassandraArrayOutputWithContext(ctx context.Context) SecretsMountCassandraArrayOutput

type SecretsMountCassandraInput

type SecretsMountCassandraInput interface {
	pulumi.Input

	ToSecretsMountCassandraOutput() SecretsMountCassandraOutput
	ToSecretsMountCassandraOutputWithContext(context.Context) SecretsMountCassandraOutput
}

SecretsMountCassandraInput is an input type that accepts SecretsMountCassandraArgs and SecretsMountCassandraOutput values. You can construct a concrete instance of `SecretsMountCassandraInput` via:

SecretsMountCassandraArgs{...}

type SecretsMountCassandraOutput

type SecretsMountCassandraOutput struct{ *pulumi.OutputState }

func (SecretsMountCassandraOutput) AllowedRoles

A list of roles that are allowed to use this connection.

func (SecretsMountCassandraOutput) ConnectTimeout

func (o SecretsMountCassandraOutput) ConnectTimeout() pulumi.IntPtrOutput

The number of seconds to use as a connection timeout.

func (SecretsMountCassandraOutput) Data

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountCassandraOutput) ElementType

func (SecretsMountCassandraOutput) Hosts

The hosts to connect to.

func (SecretsMountCassandraOutput) InsecureTls

Whether to skip verification of the server certificate when using TLS.

func (SecretsMountCassandraOutput) Name

Name of the database connection.

func (SecretsMountCassandraOutput) Password

The root credential password used in the connection URL.

func (SecretsMountCassandraOutput) PemBundle

Concatenated PEM blocks configuring the certificate chain.

func (SecretsMountCassandraOutput) PemJson

A JSON structure configuring the certificate chain.

func (SecretsMountCassandraOutput) PluginName

Specifies the name of the plugin to use.

func (SecretsMountCassandraOutput) Port

The default port to connect to if no port is specified as part of the host.

func (SecretsMountCassandraOutput) ProtocolVersion

func (o SecretsMountCassandraOutput) ProtocolVersion() pulumi.IntPtrOutput

The CQL protocol version to use.

func (SecretsMountCassandraOutput) RootRotationStatements

func (o SecretsMountCassandraOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountCassandraOutput) Tls

Whether to use TLS when connecting to Cassandra.

func (SecretsMountCassandraOutput) ToSecretsMountCassandraOutput

func (o SecretsMountCassandraOutput) ToSecretsMountCassandraOutput() SecretsMountCassandraOutput

func (SecretsMountCassandraOutput) ToSecretsMountCassandraOutputWithContext

func (o SecretsMountCassandraOutput) ToSecretsMountCassandraOutputWithContext(ctx context.Context) SecretsMountCassandraOutput

func (SecretsMountCassandraOutput) Username

The root credential username used in the connection URL.

func (SecretsMountCassandraOutput) VerifyConnection

func (o SecretsMountCassandraOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountCouchbase

type SecretsMountCouchbase struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
	Base64Pem *string `pulumi:"base64Pem"`
	// Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
	BucketName *string `pulumi:"bucketName"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// The hosts to connect to.
	Hosts []string `pulumi:"hosts"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls *bool `pulumi:"insecureTls"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// Whether to use TLS when connecting to Cassandra.
	Tls *bool `pulumi:"tls"`
	// The root credential username used in the connection URL.
	Username string `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountCouchbaseArgs

type SecretsMountCouchbaseArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
	Base64Pem pulumi.StringPtrInput `pulumi:"base64Pem"`
	// Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
	BucketName pulumi.StringPtrInput `pulumi:"bucketName"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// The hosts to connect to.
	Hosts pulumi.StringArrayInput `pulumi:"hosts"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls pulumi.BoolPtrInput `pulumi:"insecureTls"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// Whether to use TLS when connecting to Cassandra.
	Tls pulumi.BoolPtrInput `pulumi:"tls"`
	// The root credential username used in the connection URL.
	Username pulumi.StringInput `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountCouchbaseArgs) ElementType

func (SecretsMountCouchbaseArgs) ElementType() reflect.Type

func (SecretsMountCouchbaseArgs) ToSecretsMountCouchbaseOutput

func (i SecretsMountCouchbaseArgs) ToSecretsMountCouchbaseOutput() SecretsMountCouchbaseOutput

func (SecretsMountCouchbaseArgs) ToSecretsMountCouchbaseOutputWithContext

func (i SecretsMountCouchbaseArgs) ToSecretsMountCouchbaseOutputWithContext(ctx context.Context) SecretsMountCouchbaseOutput

type SecretsMountCouchbaseArray

type SecretsMountCouchbaseArray []SecretsMountCouchbaseInput

func (SecretsMountCouchbaseArray) ElementType

func (SecretsMountCouchbaseArray) ElementType() reflect.Type

func (SecretsMountCouchbaseArray) ToSecretsMountCouchbaseArrayOutput

func (i SecretsMountCouchbaseArray) ToSecretsMountCouchbaseArrayOutput() SecretsMountCouchbaseArrayOutput

func (SecretsMountCouchbaseArray) ToSecretsMountCouchbaseArrayOutputWithContext

func (i SecretsMountCouchbaseArray) ToSecretsMountCouchbaseArrayOutputWithContext(ctx context.Context) SecretsMountCouchbaseArrayOutput

type SecretsMountCouchbaseArrayInput

type SecretsMountCouchbaseArrayInput interface {
	pulumi.Input

	ToSecretsMountCouchbaseArrayOutput() SecretsMountCouchbaseArrayOutput
	ToSecretsMountCouchbaseArrayOutputWithContext(context.Context) SecretsMountCouchbaseArrayOutput
}

SecretsMountCouchbaseArrayInput is an input type that accepts SecretsMountCouchbaseArray and SecretsMountCouchbaseArrayOutput values. You can construct a concrete instance of `SecretsMountCouchbaseArrayInput` via:

SecretsMountCouchbaseArray{ SecretsMountCouchbaseArgs{...} }

type SecretsMountCouchbaseArrayOutput

type SecretsMountCouchbaseArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountCouchbaseArrayOutput) ElementType

func (SecretsMountCouchbaseArrayOutput) Index

func (SecretsMountCouchbaseArrayOutput) ToSecretsMountCouchbaseArrayOutput

func (o SecretsMountCouchbaseArrayOutput) ToSecretsMountCouchbaseArrayOutput() SecretsMountCouchbaseArrayOutput

func (SecretsMountCouchbaseArrayOutput) ToSecretsMountCouchbaseArrayOutputWithContext

func (o SecretsMountCouchbaseArrayOutput) ToSecretsMountCouchbaseArrayOutputWithContext(ctx context.Context) SecretsMountCouchbaseArrayOutput

type SecretsMountCouchbaseInput

type SecretsMountCouchbaseInput interface {
	pulumi.Input

	ToSecretsMountCouchbaseOutput() SecretsMountCouchbaseOutput
	ToSecretsMountCouchbaseOutputWithContext(context.Context) SecretsMountCouchbaseOutput
}

SecretsMountCouchbaseInput is an input type that accepts SecretsMountCouchbaseArgs and SecretsMountCouchbaseOutput values. You can construct a concrete instance of `SecretsMountCouchbaseInput` via:

SecretsMountCouchbaseArgs{...}

type SecretsMountCouchbaseOutput

type SecretsMountCouchbaseOutput struct{ *pulumi.OutputState }

func (SecretsMountCouchbaseOutput) AllowedRoles

A list of roles that are allowed to use this connection.

func (SecretsMountCouchbaseOutput) Base64Pem

Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.

func (SecretsMountCouchbaseOutput) BucketName

Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.

func (SecretsMountCouchbaseOutput) Data

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountCouchbaseOutput) ElementType

func (SecretsMountCouchbaseOutput) Hosts

The hosts to connect to.

func (SecretsMountCouchbaseOutput) InsecureTls

Whether to skip verification of the server certificate when using TLS.

func (SecretsMountCouchbaseOutput) Name

Name of the database connection.

func (SecretsMountCouchbaseOutput) Password

The root credential password used in the connection URL.

func (SecretsMountCouchbaseOutput) PluginName

Specifies the name of the plugin to use.

func (SecretsMountCouchbaseOutput) RootRotationStatements

func (o SecretsMountCouchbaseOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountCouchbaseOutput) Tls

Whether to use TLS when connecting to Cassandra.

func (SecretsMountCouchbaseOutput) ToSecretsMountCouchbaseOutput

func (o SecretsMountCouchbaseOutput) ToSecretsMountCouchbaseOutput() SecretsMountCouchbaseOutput

func (SecretsMountCouchbaseOutput) ToSecretsMountCouchbaseOutputWithContext

func (o SecretsMountCouchbaseOutput) ToSecretsMountCouchbaseOutputWithContext(ctx context.Context) SecretsMountCouchbaseOutput

func (SecretsMountCouchbaseOutput) Username

The root credential username used in the connection URL.

func (SecretsMountCouchbaseOutput) UsernameTemplate

func (o SecretsMountCouchbaseOutput) UsernameTemplate() pulumi.StringPtrOutput

[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.

func (SecretsMountCouchbaseOutput) VerifyConnection

func (o SecretsMountCouchbaseOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountElasticsearch

type SecretsMountElasticsearch struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
	CaCert *string `pulumi:"caCert"`
	// The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
	CaPath *string `pulumi:"caPath"`
	// The path to the certificate for the Elasticsearch client to present for communication.
	ClientCert *string `pulumi:"clientCert"`
	// The path to the key for the Elasticsearch client to use for communication.
	ClientKey *string `pulumi:"clientKey"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// Whether to disable certificate verification.
	Insecure *bool `pulumi:"insecure"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// This, if set, is used to set the SNI host when connecting via TLS.
	TlsServerName *string `pulumi:"tlsServerName"`
	// The URL for Elasticsearch's API. https requires certificate
	// by trusted CA if used.
	Url string `pulumi:"url"`
	// The root credential username used in the connection URL.
	Username string `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountElasticsearchArgs

type SecretsMountElasticsearchArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
	CaCert pulumi.StringPtrInput `pulumi:"caCert"`
	// The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.
	CaPath pulumi.StringPtrInput `pulumi:"caPath"`
	// The path to the certificate for the Elasticsearch client to present for communication.
	ClientCert pulumi.StringPtrInput `pulumi:"clientCert"`
	// The path to the key for the Elasticsearch client to use for communication.
	ClientKey pulumi.StringPtrInput `pulumi:"clientKey"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// Whether to disable certificate verification.
	Insecure pulumi.BoolPtrInput `pulumi:"insecure"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// This, if set, is used to set the SNI host when connecting via TLS.
	TlsServerName pulumi.StringPtrInput `pulumi:"tlsServerName"`
	// The URL for Elasticsearch's API. https requires certificate
	// by trusted CA if used.
	Url pulumi.StringInput `pulumi:"url"`
	// The root credential username used in the connection URL.
	Username pulumi.StringInput `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountElasticsearchArgs) ElementType

func (SecretsMountElasticsearchArgs) ToSecretsMountElasticsearchOutput

func (i SecretsMountElasticsearchArgs) ToSecretsMountElasticsearchOutput() SecretsMountElasticsearchOutput

func (SecretsMountElasticsearchArgs) ToSecretsMountElasticsearchOutputWithContext

func (i SecretsMountElasticsearchArgs) ToSecretsMountElasticsearchOutputWithContext(ctx context.Context) SecretsMountElasticsearchOutput

type SecretsMountElasticsearchArray

type SecretsMountElasticsearchArray []SecretsMountElasticsearchInput

func (SecretsMountElasticsearchArray) ElementType

func (SecretsMountElasticsearchArray) ToSecretsMountElasticsearchArrayOutput

func (i SecretsMountElasticsearchArray) ToSecretsMountElasticsearchArrayOutput() SecretsMountElasticsearchArrayOutput

func (SecretsMountElasticsearchArray) ToSecretsMountElasticsearchArrayOutputWithContext

func (i SecretsMountElasticsearchArray) ToSecretsMountElasticsearchArrayOutputWithContext(ctx context.Context) SecretsMountElasticsearchArrayOutput

type SecretsMountElasticsearchArrayInput

type SecretsMountElasticsearchArrayInput interface {
	pulumi.Input

	ToSecretsMountElasticsearchArrayOutput() SecretsMountElasticsearchArrayOutput
	ToSecretsMountElasticsearchArrayOutputWithContext(context.Context) SecretsMountElasticsearchArrayOutput
}

SecretsMountElasticsearchArrayInput is an input type that accepts SecretsMountElasticsearchArray and SecretsMountElasticsearchArrayOutput values. You can construct a concrete instance of `SecretsMountElasticsearchArrayInput` via:

SecretsMountElasticsearchArray{ SecretsMountElasticsearchArgs{...} }

type SecretsMountElasticsearchArrayOutput

type SecretsMountElasticsearchArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountElasticsearchArrayOutput) ElementType

func (SecretsMountElasticsearchArrayOutput) Index

func (SecretsMountElasticsearchArrayOutput) ToSecretsMountElasticsearchArrayOutput

func (o SecretsMountElasticsearchArrayOutput) ToSecretsMountElasticsearchArrayOutput() SecretsMountElasticsearchArrayOutput

func (SecretsMountElasticsearchArrayOutput) ToSecretsMountElasticsearchArrayOutputWithContext

func (o SecretsMountElasticsearchArrayOutput) ToSecretsMountElasticsearchArrayOutputWithContext(ctx context.Context) SecretsMountElasticsearchArrayOutput

type SecretsMountElasticsearchInput

type SecretsMountElasticsearchInput interface {
	pulumi.Input

	ToSecretsMountElasticsearchOutput() SecretsMountElasticsearchOutput
	ToSecretsMountElasticsearchOutputWithContext(context.Context) SecretsMountElasticsearchOutput
}

SecretsMountElasticsearchInput is an input type that accepts SecretsMountElasticsearchArgs and SecretsMountElasticsearchOutput values. You can construct a concrete instance of `SecretsMountElasticsearchInput` via:

SecretsMountElasticsearchArgs{...}

type SecretsMountElasticsearchOutput

type SecretsMountElasticsearchOutput struct{ *pulumi.OutputState }

func (SecretsMountElasticsearchOutput) AllowedRoles

A list of roles that are allowed to use this connection.

func (SecretsMountElasticsearchOutput) CaCert

The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.

func (SecretsMountElasticsearchOutput) CaPath

The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity.

func (SecretsMountElasticsearchOutput) ClientCert

The path to the certificate for the Elasticsearch client to present for communication.

func (SecretsMountElasticsearchOutput) ClientKey

The path to the key for the Elasticsearch client to use for communication.

func (SecretsMountElasticsearchOutput) Data

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountElasticsearchOutput) ElementType

func (SecretsMountElasticsearchOutput) Insecure

Whether to disable certificate verification.

func (SecretsMountElasticsearchOutput) Name

Name of the database connection.

func (SecretsMountElasticsearchOutput) Password

The root credential password used in the connection URL.

func (SecretsMountElasticsearchOutput) PluginName

Specifies the name of the plugin to use.

func (SecretsMountElasticsearchOutput) RootRotationStatements

func (o SecretsMountElasticsearchOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountElasticsearchOutput) TlsServerName

This, if set, is used to set the SNI host when connecting via TLS.

func (SecretsMountElasticsearchOutput) ToSecretsMountElasticsearchOutput

func (o SecretsMountElasticsearchOutput) ToSecretsMountElasticsearchOutput() SecretsMountElasticsearchOutput

func (SecretsMountElasticsearchOutput) ToSecretsMountElasticsearchOutputWithContext

func (o SecretsMountElasticsearchOutput) ToSecretsMountElasticsearchOutputWithContext(ctx context.Context) SecretsMountElasticsearchOutput

func (SecretsMountElasticsearchOutput) Url

The URL for Elasticsearch's API. https requires certificate by trusted CA if used.

func (SecretsMountElasticsearchOutput) Username

The root credential username used in the connection URL.

func (SecretsMountElasticsearchOutput) UsernameTemplate

[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.

func (SecretsMountElasticsearchOutput) VerifyConnection

Whether the connection should be verified on initial configuration or not.

type SecretsMountHana

type SecretsMountHana struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// Disable special character escaping in username and password.
	DisableEscaping *bool `pulumi:"disableEscaping"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password *string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// The root credential username used in the connection URL.
	Username *string `pulumi:"username"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountHanaArgs

type SecretsMountHanaArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// Disable special character escaping in username and password.
	DisableEscaping pulumi.BoolPtrInput `pulumi:"disableEscaping"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// The root credential username used in the connection URL.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountHanaArgs) ElementType

func (SecretsMountHanaArgs) ElementType() reflect.Type

func (SecretsMountHanaArgs) ToSecretsMountHanaOutput

func (i SecretsMountHanaArgs) ToSecretsMountHanaOutput() SecretsMountHanaOutput

func (SecretsMountHanaArgs) ToSecretsMountHanaOutputWithContext

func (i SecretsMountHanaArgs) ToSecretsMountHanaOutputWithContext(ctx context.Context) SecretsMountHanaOutput

type SecretsMountHanaArray

type SecretsMountHanaArray []SecretsMountHanaInput

func (SecretsMountHanaArray) ElementType

func (SecretsMountHanaArray) ElementType() reflect.Type

func (SecretsMountHanaArray) ToSecretsMountHanaArrayOutput

func (i SecretsMountHanaArray) ToSecretsMountHanaArrayOutput() SecretsMountHanaArrayOutput

func (SecretsMountHanaArray) ToSecretsMountHanaArrayOutputWithContext

func (i SecretsMountHanaArray) ToSecretsMountHanaArrayOutputWithContext(ctx context.Context) SecretsMountHanaArrayOutput

type SecretsMountHanaArrayInput

type SecretsMountHanaArrayInput interface {
	pulumi.Input

	ToSecretsMountHanaArrayOutput() SecretsMountHanaArrayOutput
	ToSecretsMountHanaArrayOutputWithContext(context.Context) SecretsMountHanaArrayOutput
}

SecretsMountHanaArrayInput is an input type that accepts SecretsMountHanaArray and SecretsMountHanaArrayOutput values. You can construct a concrete instance of `SecretsMountHanaArrayInput` via:

SecretsMountHanaArray{ SecretsMountHanaArgs{...} }

type SecretsMountHanaArrayOutput

type SecretsMountHanaArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountHanaArrayOutput) ElementType

func (SecretsMountHanaArrayOutput) Index

func (SecretsMountHanaArrayOutput) ToSecretsMountHanaArrayOutput

func (o SecretsMountHanaArrayOutput) ToSecretsMountHanaArrayOutput() SecretsMountHanaArrayOutput

func (SecretsMountHanaArrayOutput) ToSecretsMountHanaArrayOutputWithContext

func (o SecretsMountHanaArrayOutput) ToSecretsMountHanaArrayOutputWithContext(ctx context.Context) SecretsMountHanaArrayOutput

type SecretsMountHanaInput

type SecretsMountHanaInput interface {
	pulumi.Input

	ToSecretsMountHanaOutput() SecretsMountHanaOutput
	ToSecretsMountHanaOutputWithContext(context.Context) SecretsMountHanaOutput
}

SecretsMountHanaInput is an input type that accepts SecretsMountHanaArgs and SecretsMountHanaOutput values. You can construct a concrete instance of `SecretsMountHanaInput` via:

SecretsMountHanaArgs{...}

type SecretsMountHanaOutput

type SecretsMountHanaOutput struct{ *pulumi.OutputState }

func (SecretsMountHanaOutput) AllowedRoles

A list of roles that are allowed to use this connection.

func (SecretsMountHanaOutput) ConnectionUrl

func (o SecretsMountHanaOutput) ConnectionUrl() pulumi.StringPtrOutput

Specifies the Redshift DSN. See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)

func (SecretsMountHanaOutput) Data

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountHanaOutput) DisableEscaping

func (o SecretsMountHanaOutput) DisableEscaping() pulumi.BoolPtrOutput

Disable special character escaping in username and password.

func (SecretsMountHanaOutput) ElementType

func (SecretsMountHanaOutput) ElementType() reflect.Type

func (SecretsMountHanaOutput) MaxConnectionLifetime

func (o SecretsMountHanaOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum amount of time a connection may be reused.

func (SecretsMountHanaOutput) MaxIdleConnections

func (o SecretsMountHanaOutput) MaxIdleConnections() pulumi.IntPtrOutput

The maximum number of idle connections to the database.

func (SecretsMountHanaOutput) MaxOpenConnections

func (o SecretsMountHanaOutput) MaxOpenConnections() pulumi.IntPtrOutput

The maximum number of open connections to the database.

func (SecretsMountHanaOutput) Name

Name of the database connection.

func (SecretsMountHanaOutput) Password

The root credential password used in the connection URL.

func (SecretsMountHanaOutput) PluginName

Specifies the name of the plugin to use.

func (SecretsMountHanaOutput) RootRotationStatements

func (o SecretsMountHanaOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountHanaOutput) ToSecretsMountHanaOutput

func (o SecretsMountHanaOutput) ToSecretsMountHanaOutput() SecretsMountHanaOutput

func (SecretsMountHanaOutput) ToSecretsMountHanaOutputWithContext

func (o SecretsMountHanaOutput) ToSecretsMountHanaOutputWithContext(ctx context.Context) SecretsMountHanaOutput

func (SecretsMountHanaOutput) Username

The root credential username used in the connection URL.

func (SecretsMountHanaOutput) VerifyConnection

func (o SecretsMountHanaOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountInfluxdb

type SecretsMountInfluxdb struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// The number of seconds to use as a connection
	// timeout.
	ConnectTimeout *int `pulumi:"connectTimeout"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// The host to connect to.
	Host string `pulumi:"host"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls *bool `pulumi:"insecureTls"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password string `pulumi:"password"`
	// Concatenated PEM blocks configuring the certificate
	// chain.
	PemBundle *string `pulumi:"pemBundle"`
	// A JSON structure configuring the certificate chain.
	PemJson *string `pulumi:"pemJson"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// The default port to connect to if no port is specified as
	// part of the host.
	Port *int `pulumi:"port"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// Whether to use TLS when connecting to Cassandra.
	Tls *bool `pulumi:"tls"`
	// The root credential username used in the connection URL.
	Username string `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountInfluxdbArgs

type SecretsMountInfluxdbArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// The number of seconds to use as a connection
	// timeout.
	ConnectTimeout pulumi.IntPtrInput `pulumi:"connectTimeout"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// The host to connect to.
	Host pulumi.StringInput `pulumi:"host"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls pulumi.BoolPtrInput `pulumi:"insecureTls"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringInput `pulumi:"password"`
	// Concatenated PEM blocks configuring the certificate
	// chain.
	PemBundle pulumi.StringPtrInput `pulumi:"pemBundle"`
	// A JSON structure configuring the certificate chain.
	PemJson pulumi.StringPtrInput `pulumi:"pemJson"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// The default port to connect to if no port is specified as
	// part of the host.
	Port pulumi.IntPtrInput `pulumi:"port"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// Whether to use TLS when connecting to Cassandra.
	Tls pulumi.BoolPtrInput `pulumi:"tls"`
	// The root credential username used in the connection URL.
	Username pulumi.StringInput `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountInfluxdbArgs) ElementType

func (SecretsMountInfluxdbArgs) ElementType() reflect.Type

func (SecretsMountInfluxdbArgs) ToSecretsMountInfluxdbOutput

func (i SecretsMountInfluxdbArgs) ToSecretsMountInfluxdbOutput() SecretsMountInfluxdbOutput

func (SecretsMountInfluxdbArgs) ToSecretsMountInfluxdbOutputWithContext

func (i SecretsMountInfluxdbArgs) ToSecretsMountInfluxdbOutputWithContext(ctx context.Context) SecretsMountInfluxdbOutput

type SecretsMountInfluxdbArray

type SecretsMountInfluxdbArray []SecretsMountInfluxdbInput

func (SecretsMountInfluxdbArray) ElementType

func (SecretsMountInfluxdbArray) ElementType() reflect.Type

func (SecretsMountInfluxdbArray) ToSecretsMountInfluxdbArrayOutput

func (i SecretsMountInfluxdbArray) ToSecretsMountInfluxdbArrayOutput() SecretsMountInfluxdbArrayOutput

func (SecretsMountInfluxdbArray) ToSecretsMountInfluxdbArrayOutputWithContext

func (i SecretsMountInfluxdbArray) ToSecretsMountInfluxdbArrayOutputWithContext(ctx context.Context) SecretsMountInfluxdbArrayOutput

type SecretsMountInfluxdbArrayInput

type SecretsMountInfluxdbArrayInput interface {
	pulumi.Input

	ToSecretsMountInfluxdbArrayOutput() SecretsMountInfluxdbArrayOutput
	ToSecretsMountInfluxdbArrayOutputWithContext(context.Context) SecretsMountInfluxdbArrayOutput
}

SecretsMountInfluxdbArrayInput is an input type that accepts SecretsMountInfluxdbArray and SecretsMountInfluxdbArrayOutput values. You can construct a concrete instance of `SecretsMountInfluxdbArrayInput` via:

SecretsMountInfluxdbArray{ SecretsMountInfluxdbArgs{...} }

type SecretsMountInfluxdbArrayOutput

type SecretsMountInfluxdbArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountInfluxdbArrayOutput) ElementType

func (SecretsMountInfluxdbArrayOutput) Index

func (SecretsMountInfluxdbArrayOutput) ToSecretsMountInfluxdbArrayOutput

func (o SecretsMountInfluxdbArrayOutput) ToSecretsMountInfluxdbArrayOutput() SecretsMountInfluxdbArrayOutput

func (SecretsMountInfluxdbArrayOutput) ToSecretsMountInfluxdbArrayOutputWithContext

func (o SecretsMountInfluxdbArrayOutput) ToSecretsMountInfluxdbArrayOutputWithContext(ctx context.Context) SecretsMountInfluxdbArrayOutput

type SecretsMountInfluxdbInput

type SecretsMountInfluxdbInput interface {
	pulumi.Input

	ToSecretsMountInfluxdbOutput() SecretsMountInfluxdbOutput
	ToSecretsMountInfluxdbOutputWithContext(context.Context) SecretsMountInfluxdbOutput
}

SecretsMountInfluxdbInput is an input type that accepts SecretsMountInfluxdbArgs and SecretsMountInfluxdbOutput values. You can construct a concrete instance of `SecretsMountInfluxdbInput` via:

SecretsMountInfluxdbArgs{...}

type SecretsMountInfluxdbOutput

type SecretsMountInfluxdbOutput struct{ *pulumi.OutputState }

func (SecretsMountInfluxdbOutput) AllowedRoles

A list of roles that are allowed to use this connection.

func (SecretsMountInfluxdbOutput) ConnectTimeout

func (o SecretsMountInfluxdbOutput) ConnectTimeout() pulumi.IntPtrOutput

The number of seconds to use as a connection timeout.

func (SecretsMountInfluxdbOutput) Data

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountInfluxdbOutput) ElementType

func (SecretsMountInfluxdbOutput) ElementType() reflect.Type

func (SecretsMountInfluxdbOutput) Host

The host to connect to.

func (SecretsMountInfluxdbOutput) InsecureTls

Whether to skip verification of the server certificate when using TLS.

func (SecretsMountInfluxdbOutput) Name

Name of the database connection.

func (SecretsMountInfluxdbOutput) Password

The root credential password used in the connection URL.

func (SecretsMountInfluxdbOutput) PemBundle

Concatenated PEM blocks configuring the certificate chain.

func (SecretsMountInfluxdbOutput) PemJson

A JSON structure configuring the certificate chain.

func (SecretsMountInfluxdbOutput) PluginName

Specifies the name of the plugin to use.

func (SecretsMountInfluxdbOutput) Port

The default port to connect to if no port is specified as part of the host.

func (SecretsMountInfluxdbOutput) RootRotationStatements

func (o SecretsMountInfluxdbOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountInfluxdbOutput) Tls

Whether to use TLS when connecting to Cassandra.

func (SecretsMountInfluxdbOutput) ToSecretsMountInfluxdbOutput

func (o SecretsMountInfluxdbOutput) ToSecretsMountInfluxdbOutput() SecretsMountInfluxdbOutput

func (SecretsMountInfluxdbOutput) ToSecretsMountInfluxdbOutputWithContext

func (o SecretsMountInfluxdbOutput) ToSecretsMountInfluxdbOutputWithContext(ctx context.Context) SecretsMountInfluxdbOutput

func (SecretsMountInfluxdbOutput) Username

The root credential username used in the connection URL.

func (SecretsMountInfluxdbOutput) UsernameTemplate

func (o SecretsMountInfluxdbOutput) UsernameTemplate() pulumi.StringPtrOutput

[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.

func (SecretsMountInfluxdbOutput) VerifyConnection

func (o SecretsMountInfluxdbOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountInput

type SecretsMountInput interface {
	pulumi.Input

	ToSecretsMountOutput() SecretsMountOutput
	ToSecretsMountOutputWithContext(ctx context.Context) SecretsMountOutput
}

type SecretsMountMap

type SecretsMountMap map[string]SecretsMountInput

func (SecretsMountMap) ElementType

func (SecretsMountMap) ElementType() reflect.Type

func (SecretsMountMap) ToSecretsMountMapOutput

func (i SecretsMountMap) ToSecretsMountMapOutput() SecretsMountMapOutput

func (SecretsMountMap) ToSecretsMountMapOutputWithContext

func (i SecretsMountMap) ToSecretsMountMapOutputWithContext(ctx context.Context) SecretsMountMapOutput

type SecretsMountMapInput

type SecretsMountMapInput interface {
	pulumi.Input

	ToSecretsMountMapOutput() SecretsMountMapOutput
	ToSecretsMountMapOutputWithContext(context.Context) SecretsMountMapOutput
}

SecretsMountMapInput is an input type that accepts SecretsMountMap and SecretsMountMapOutput values. You can construct a concrete instance of `SecretsMountMapInput` via:

SecretsMountMap{ "key": SecretsMountArgs{...} }

type SecretsMountMapOutput

type SecretsMountMapOutput struct{ *pulumi.OutputState }

func (SecretsMountMapOutput) ElementType

func (SecretsMountMapOutput) ElementType() reflect.Type

func (SecretsMountMapOutput) MapIndex

func (SecretsMountMapOutput) ToSecretsMountMapOutput

func (o SecretsMountMapOutput) ToSecretsMountMapOutput() SecretsMountMapOutput

func (SecretsMountMapOutput) ToSecretsMountMapOutputWithContext

func (o SecretsMountMapOutput) ToSecretsMountMapOutputWithContext(ctx context.Context) SecretsMountMapOutput

type SecretsMountMongodb

type SecretsMountMongodb struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password *string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// The root credential username used in the connection URL.
	Username *string `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountMongodbArgs

type SecretsMountMongodbArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// The root credential username used in the connection URL.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountMongodbArgs) ElementType

func (SecretsMountMongodbArgs) ElementType() reflect.Type

func (SecretsMountMongodbArgs) ToSecretsMountMongodbOutput

func (i SecretsMountMongodbArgs) ToSecretsMountMongodbOutput() SecretsMountMongodbOutput

func (SecretsMountMongodbArgs) ToSecretsMountMongodbOutputWithContext

func (i SecretsMountMongodbArgs) ToSecretsMountMongodbOutputWithContext(ctx context.Context) SecretsMountMongodbOutput

type SecretsMountMongodbArray

type SecretsMountMongodbArray []SecretsMountMongodbInput

func (SecretsMountMongodbArray) ElementType

func (SecretsMountMongodbArray) ElementType() reflect.Type

func (SecretsMountMongodbArray) ToSecretsMountMongodbArrayOutput

func (i SecretsMountMongodbArray) ToSecretsMountMongodbArrayOutput() SecretsMountMongodbArrayOutput

func (SecretsMountMongodbArray) ToSecretsMountMongodbArrayOutputWithContext

func (i SecretsMountMongodbArray) ToSecretsMountMongodbArrayOutputWithContext(ctx context.Context) SecretsMountMongodbArrayOutput

type SecretsMountMongodbArrayInput

type SecretsMountMongodbArrayInput interface {
	pulumi.Input

	ToSecretsMountMongodbArrayOutput() SecretsMountMongodbArrayOutput
	ToSecretsMountMongodbArrayOutputWithContext(context.Context) SecretsMountMongodbArrayOutput
}

SecretsMountMongodbArrayInput is an input type that accepts SecretsMountMongodbArray and SecretsMountMongodbArrayOutput values. You can construct a concrete instance of `SecretsMountMongodbArrayInput` via:

SecretsMountMongodbArray{ SecretsMountMongodbArgs{...} }

type SecretsMountMongodbArrayOutput

type SecretsMountMongodbArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountMongodbArrayOutput) ElementType

func (SecretsMountMongodbArrayOutput) Index

func (SecretsMountMongodbArrayOutput) ToSecretsMountMongodbArrayOutput

func (o SecretsMountMongodbArrayOutput) ToSecretsMountMongodbArrayOutput() SecretsMountMongodbArrayOutput

func (SecretsMountMongodbArrayOutput) ToSecretsMountMongodbArrayOutputWithContext

func (o SecretsMountMongodbArrayOutput) ToSecretsMountMongodbArrayOutputWithContext(ctx context.Context) SecretsMountMongodbArrayOutput

type SecretsMountMongodbInput

type SecretsMountMongodbInput interface {
	pulumi.Input

	ToSecretsMountMongodbOutput() SecretsMountMongodbOutput
	ToSecretsMountMongodbOutputWithContext(context.Context) SecretsMountMongodbOutput
}

SecretsMountMongodbInput is an input type that accepts SecretsMountMongodbArgs and SecretsMountMongodbOutput values. You can construct a concrete instance of `SecretsMountMongodbInput` via:

SecretsMountMongodbArgs{...}

type SecretsMountMongodbOutput

type SecretsMountMongodbOutput struct{ *pulumi.OutputState }

func (SecretsMountMongodbOutput) AllowedRoles

A list of roles that are allowed to use this connection.

func (SecretsMountMongodbOutput) ConnectionUrl

Specifies the Redshift DSN. See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)

func (SecretsMountMongodbOutput) Data

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountMongodbOutput) ElementType

func (SecretsMountMongodbOutput) ElementType() reflect.Type

func (SecretsMountMongodbOutput) MaxConnectionLifetime

func (o SecretsMountMongodbOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum amount of time a connection may be reused.

func (SecretsMountMongodbOutput) MaxIdleConnections

func (o SecretsMountMongodbOutput) MaxIdleConnections() pulumi.IntPtrOutput

The maximum number of idle connections to the database.

func (SecretsMountMongodbOutput) MaxOpenConnections

func (o SecretsMountMongodbOutput) MaxOpenConnections() pulumi.IntPtrOutput

The maximum number of open connections to the database.

func (SecretsMountMongodbOutput) Name

Name of the database connection.

func (SecretsMountMongodbOutput) Password

The root credential password used in the connection URL.

func (SecretsMountMongodbOutput) PluginName

Specifies the name of the plugin to use.

func (SecretsMountMongodbOutput) RootRotationStatements

func (o SecretsMountMongodbOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountMongodbOutput) ToSecretsMountMongodbOutput

func (o SecretsMountMongodbOutput) ToSecretsMountMongodbOutput() SecretsMountMongodbOutput

func (SecretsMountMongodbOutput) ToSecretsMountMongodbOutputWithContext

func (o SecretsMountMongodbOutput) ToSecretsMountMongodbOutputWithContext(ctx context.Context) SecretsMountMongodbOutput

func (SecretsMountMongodbOutput) Username

The root credential username used in the connection URL.

func (SecretsMountMongodbOutput) UsernameTemplate

func (o SecretsMountMongodbOutput) UsernameTemplate() pulumi.StringPtrOutput

[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.

func (SecretsMountMongodbOutput) VerifyConnection

func (o SecretsMountMongodbOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountMongodbatla

type SecretsMountMongodbatla struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// The Private Programmatic API Key used to connect with MongoDB Atlas API.
	PrivateKey string `pulumi:"privateKey"`
	// The Project ID the Database User should be created within.
	ProjectId string `pulumi:"projectId"`
	// The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
	PublicKey string `pulumi:"publicKey"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountMongodbatlaArgs

type SecretsMountMongodbatlaArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// The Private Programmatic API Key used to connect with MongoDB Atlas API.
	PrivateKey pulumi.StringInput `pulumi:"privateKey"`
	// The Project ID the Database User should be created within.
	ProjectId pulumi.StringInput `pulumi:"projectId"`
	// The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
	PublicKey pulumi.StringInput `pulumi:"publicKey"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountMongodbatlaArgs) ElementType

func (SecretsMountMongodbatlaArgs) ToSecretsMountMongodbatlaOutput

func (i SecretsMountMongodbatlaArgs) ToSecretsMountMongodbatlaOutput() SecretsMountMongodbatlaOutput

func (SecretsMountMongodbatlaArgs) ToSecretsMountMongodbatlaOutputWithContext

func (i SecretsMountMongodbatlaArgs) ToSecretsMountMongodbatlaOutputWithContext(ctx context.Context) SecretsMountMongodbatlaOutput

type SecretsMountMongodbatlaArray

type SecretsMountMongodbatlaArray []SecretsMountMongodbatlaInput

func (SecretsMountMongodbatlaArray) ElementType

func (SecretsMountMongodbatlaArray) ToSecretsMountMongodbatlaArrayOutput

func (i SecretsMountMongodbatlaArray) ToSecretsMountMongodbatlaArrayOutput() SecretsMountMongodbatlaArrayOutput

func (SecretsMountMongodbatlaArray) ToSecretsMountMongodbatlaArrayOutputWithContext

func (i SecretsMountMongodbatlaArray) ToSecretsMountMongodbatlaArrayOutputWithContext(ctx context.Context) SecretsMountMongodbatlaArrayOutput

type SecretsMountMongodbatlaArrayInput

type SecretsMountMongodbatlaArrayInput interface {
	pulumi.Input

	ToSecretsMountMongodbatlaArrayOutput() SecretsMountMongodbatlaArrayOutput
	ToSecretsMountMongodbatlaArrayOutputWithContext(context.Context) SecretsMountMongodbatlaArrayOutput
}

SecretsMountMongodbatlaArrayInput is an input type that accepts SecretsMountMongodbatlaArray and SecretsMountMongodbatlaArrayOutput values. You can construct a concrete instance of `SecretsMountMongodbatlaArrayInput` via:

SecretsMountMongodbatlaArray{ SecretsMountMongodbatlaArgs{...} }

type SecretsMountMongodbatlaArrayOutput

type SecretsMountMongodbatlaArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountMongodbatlaArrayOutput) ElementType

func (SecretsMountMongodbatlaArrayOutput) Index

func (SecretsMountMongodbatlaArrayOutput) ToSecretsMountMongodbatlaArrayOutput

func (o SecretsMountMongodbatlaArrayOutput) ToSecretsMountMongodbatlaArrayOutput() SecretsMountMongodbatlaArrayOutput

func (SecretsMountMongodbatlaArrayOutput) ToSecretsMountMongodbatlaArrayOutputWithContext

func (o SecretsMountMongodbatlaArrayOutput) ToSecretsMountMongodbatlaArrayOutputWithContext(ctx context.Context) SecretsMountMongodbatlaArrayOutput

type SecretsMountMongodbatlaInput

type SecretsMountMongodbatlaInput interface {
	pulumi.Input

	ToSecretsMountMongodbatlaOutput() SecretsMountMongodbatlaOutput
	ToSecretsMountMongodbatlaOutputWithContext(context.Context) SecretsMountMongodbatlaOutput
}

SecretsMountMongodbatlaInput is an input type that accepts SecretsMountMongodbatlaArgs and SecretsMountMongodbatlaOutput values. You can construct a concrete instance of `SecretsMountMongodbatlaInput` via:

SecretsMountMongodbatlaArgs{...}

type SecretsMountMongodbatlaOutput

type SecretsMountMongodbatlaOutput struct{ *pulumi.OutputState }

func (SecretsMountMongodbatlaOutput) AllowedRoles

A list of roles that are allowed to use this connection.

func (SecretsMountMongodbatlaOutput) Data

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountMongodbatlaOutput) ElementType

func (SecretsMountMongodbatlaOutput) Name

Name of the database connection.

func (SecretsMountMongodbatlaOutput) PluginName

Specifies the name of the plugin to use.

func (SecretsMountMongodbatlaOutput) PrivateKey

The Private Programmatic API Key used to connect with MongoDB Atlas API.

func (SecretsMountMongodbatlaOutput) ProjectId

The Project ID the Database User should be created within.

func (SecretsMountMongodbatlaOutput) PublicKey

The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.

func (SecretsMountMongodbatlaOutput) RootRotationStatements

func (o SecretsMountMongodbatlaOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountMongodbatlaOutput) ToSecretsMountMongodbatlaOutput

func (o SecretsMountMongodbatlaOutput) ToSecretsMountMongodbatlaOutput() SecretsMountMongodbatlaOutput

func (SecretsMountMongodbatlaOutput) ToSecretsMountMongodbatlaOutputWithContext

func (o SecretsMountMongodbatlaOutput) ToSecretsMountMongodbatlaOutputWithContext(ctx context.Context) SecretsMountMongodbatlaOutput

func (SecretsMountMongodbatlaOutput) VerifyConnection

func (o SecretsMountMongodbatlaOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountMssql

type SecretsMountMssql struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// For Vault v1.9+. Set to true when the target is a
	// Contained Database, e.g. AzureSQL.
	// See [Vault docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
	ContainedDb *bool `pulumi:"containedDb"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// Disable special character escaping in username and password.
	DisableEscaping *bool `pulumi:"disableEscaping"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password *string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// The root credential username used in the connection URL.
	Username *string `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountMssqlArgs

type SecretsMountMssqlArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// For Vault v1.9+. Set to true when the target is a
	// Contained Database, e.g. AzureSQL.
	// See [Vault docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
	ContainedDb pulumi.BoolPtrInput `pulumi:"containedDb"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// Disable special character escaping in username and password.
	DisableEscaping pulumi.BoolPtrInput `pulumi:"disableEscaping"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// The root credential username used in the connection URL.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountMssqlArgs) ElementType

func (SecretsMountMssqlArgs) ElementType() reflect.Type

func (SecretsMountMssqlArgs) ToSecretsMountMssqlOutput

func (i SecretsMountMssqlArgs) ToSecretsMountMssqlOutput() SecretsMountMssqlOutput

func (SecretsMountMssqlArgs) ToSecretsMountMssqlOutputWithContext

func (i SecretsMountMssqlArgs) ToSecretsMountMssqlOutputWithContext(ctx context.Context) SecretsMountMssqlOutput

type SecretsMountMssqlArray

type SecretsMountMssqlArray []SecretsMountMssqlInput

func (SecretsMountMssqlArray) ElementType

func (SecretsMountMssqlArray) ElementType() reflect.Type

func (SecretsMountMssqlArray) ToSecretsMountMssqlArrayOutput

func (i SecretsMountMssqlArray) ToSecretsMountMssqlArrayOutput() SecretsMountMssqlArrayOutput

func (SecretsMountMssqlArray) ToSecretsMountMssqlArrayOutputWithContext

func (i SecretsMountMssqlArray) ToSecretsMountMssqlArrayOutputWithContext(ctx context.Context) SecretsMountMssqlArrayOutput

type SecretsMountMssqlArrayInput

type SecretsMountMssqlArrayInput interface {
	pulumi.Input

	ToSecretsMountMssqlArrayOutput() SecretsMountMssqlArrayOutput
	ToSecretsMountMssqlArrayOutputWithContext(context.Context) SecretsMountMssqlArrayOutput
}

SecretsMountMssqlArrayInput is an input type that accepts SecretsMountMssqlArray and SecretsMountMssqlArrayOutput values. You can construct a concrete instance of `SecretsMountMssqlArrayInput` via:

SecretsMountMssqlArray{ SecretsMountMssqlArgs{...} }

type SecretsMountMssqlArrayOutput

type SecretsMountMssqlArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountMssqlArrayOutput) ElementType

func (SecretsMountMssqlArrayOutput) Index

func (SecretsMountMssqlArrayOutput) ToSecretsMountMssqlArrayOutput

func (o SecretsMountMssqlArrayOutput) ToSecretsMountMssqlArrayOutput() SecretsMountMssqlArrayOutput

func (SecretsMountMssqlArrayOutput) ToSecretsMountMssqlArrayOutputWithContext

func (o SecretsMountMssqlArrayOutput) ToSecretsMountMssqlArrayOutputWithContext(ctx context.Context) SecretsMountMssqlArrayOutput

type SecretsMountMssqlInput

type SecretsMountMssqlInput interface {
	pulumi.Input

	ToSecretsMountMssqlOutput() SecretsMountMssqlOutput
	ToSecretsMountMssqlOutputWithContext(context.Context) SecretsMountMssqlOutput
}

SecretsMountMssqlInput is an input type that accepts SecretsMountMssqlArgs and SecretsMountMssqlOutput values. You can construct a concrete instance of `SecretsMountMssqlInput` via:

SecretsMountMssqlArgs{...}

type SecretsMountMssqlOutput

type SecretsMountMssqlOutput struct{ *pulumi.OutputState }

func (SecretsMountMssqlOutput) AllowedRoles

A list of roles that are allowed to use this connection.

func (SecretsMountMssqlOutput) ConnectionUrl

Specifies the Redshift DSN. See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)

func (SecretsMountMssqlOutput) ContainedDb

For Vault v1.9+. Set to true when the target is a Contained Database, e.g. AzureSQL. See [Vault docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)

func (SecretsMountMssqlOutput) Data

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountMssqlOutput) DisableEscaping

func (o SecretsMountMssqlOutput) DisableEscaping() pulumi.BoolPtrOutput

Disable special character escaping in username and password.

func (SecretsMountMssqlOutput) ElementType

func (SecretsMountMssqlOutput) ElementType() reflect.Type

func (SecretsMountMssqlOutput) MaxConnectionLifetime

func (o SecretsMountMssqlOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum amount of time a connection may be reused.

func (SecretsMountMssqlOutput) MaxIdleConnections

func (o SecretsMountMssqlOutput) MaxIdleConnections() pulumi.IntPtrOutput

The maximum number of idle connections to the database.

func (SecretsMountMssqlOutput) MaxOpenConnections

func (o SecretsMountMssqlOutput) MaxOpenConnections() pulumi.IntPtrOutput

The maximum number of open connections to the database.

func (SecretsMountMssqlOutput) Name

Name of the database connection.

func (SecretsMountMssqlOutput) Password

The root credential password used in the connection URL.

func (SecretsMountMssqlOutput) PluginName

Specifies the name of the plugin to use.

func (SecretsMountMssqlOutput) RootRotationStatements

func (o SecretsMountMssqlOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountMssqlOutput) ToSecretsMountMssqlOutput

func (o SecretsMountMssqlOutput) ToSecretsMountMssqlOutput() SecretsMountMssqlOutput

func (SecretsMountMssqlOutput) ToSecretsMountMssqlOutputWithContext

func (o SecretsMountMssqlOutput) ToSecretsMountMssqlOutputWithContext(ctx context.Context) SecretsMountMssqlOutput

func (SecretsMountMssqlOutput) Username

The root credential username used in the connection URL.

func (SecretsMountMssqlOutput) UsernameTemplate

func (o SecretsMountMssqlOutput) UsernameTemplate() pulumi.StringPtrOutput

[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.

func (SecretsMountMssqlOutput) VerifyConnection

func (o SecretsMountMssqlOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountMysql

type SecretsMountMysql struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
	AuthType *string `pulumi:"authType"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password *string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// A JSON encoded credential for use with IAM authorization
	ServiceAccountJson *string `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa *string `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey *string `pulumi:"tlsCertificateKey"`
	// The root credential username used in the connection URL.
	Username *string `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountMysqlArgs

type SecretsMountMysqlArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
	AuthType pulumi.StringPtrInput `pulumi:"authType"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// A JSON encoded credential for use with IAM authorization
	ServiceAccountJson pulumi.StringPtrInput `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa pulumi.StringPtrInput `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey pulumi.StringPtrInput `pulumi:"tlsCertificateKey"`
	// The root credential username used in the connection URL.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountMysqlArgs) ElementType

func (SecretsMountMysqlArgs) ElementType() reflect.Type

func (SecretsMountMysqlArgs) ToSecretsMountMysqlOutput

func (i SecretsMountMysqlArgs) ToSecretsMountMysqlOutput() SecretsMountMysqlOutput

func (SecretsMountMysqlArgs) ToSecretsMountMysqlOutputWithContext

func (i SecretsMountMysqlArgs) ToSecretsMountMysqlOutputWithContext(ctx context.Context) SecretsMountMysqlOutput

type SecretsMountMysqlArray

type SecretsMountMysqlArray []SecretsMountMysqlInput

func (SecretsMountMysqlArray) ElementType

func (SecretsMountMysqlArray) ElementType() reflect.Type

func (SecretsMountMysqlArray) ToSecretsMountMysqlArrayOutput

func (i SecretsMountMysqlArray) ToSecretsMountMysqlArrayOutput() SecretsMountMysqlArrayOutput

func (SecretsMountMysqlArray) ToSecretsMountMysqlArrayOutputWithContext

func (i SecretsMountMysqlArray) ToSecretsMountMysqlArrayOutputWithContext(ctx context.Context) SecretsMountMysqlArrayOutput

type SecretsMountMysqlArrayInput

type SecretsMountMysqlArrayInput interface {
	pulumi.Input

	ToSecretsMountMysqlArrayOutput() SecretsMountMysqlArrayOutput
	ToSecretsMountMysqlArrayOutputWithContext(context.Context) SecretsMountMysqlArrayOutput
}

SecretsMountMysqlArrayInput is an input type that accepts SecretsMountMysqlArray and SecretsMountMysqlArrayOutput values. You can construct a concrete instance of `SecretsMountMysqlArrayInput` via:

SecretsMountMysqlArray{ SecretsMountMysqlArgs{...} }

type SecretsMountMysqlArrayOutput

type SecretsMountMysqlArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountMysqlArrayOutput) ElementType

func (SecretsMountMysqlArrayOutput) Index

func (SecretsMountMysqlArrayOutput) ToSecretsMountMysqlArrayOutput

func (o SecretsMountMysqlArrayOutput) ToSecretsMountMysqlArrayOutput() SecretsMountMysqlArrayOutput

func (SecretsMountMysqlArrayOutput) ToSecretsMountMysqlArrayOutputWithContext

func (o SecretsMountMysqlArrayOutput) ToSecretsMountMysqlArrayOutputWithContext(ctx context.Context) SecretsMountMysqlArrayOutput

type SecretsMountMysqlAurora

type SecretsMountMysqlAurora struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
	AuthType *string `pulumi:"authType"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password *string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// A JSON encoded credential for use with IAM authorization
	ServiceAccountJson *string `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa *string `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey *string `pulumi:"tlsCertificateKey"`
	// The root credential username used in the connection URL.
	Username *string `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountMysqlAuroraArgs

type SecretsMountMysqlAuroraArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
	AuthType pulumi.StringPtrInput `pulumi:"authType"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// A JSON encoded credential for use with IAM authorization
	ServiceAccountJson pulumi.StringPtrInput `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa pulumi.StringPtrInput `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey pulumi.StringPtrInput `pulumi:"tlsCertificateKey"`
	// The root credential username used in the connection URL.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountMysqlAuroraArgs) ElementType

func (SecretsMountMysqlAuroraArgs) ToSecretsMountMysqlAuroraOutput

func (i SecretsMountMysqlAuroraArgs) ToSecretsMountMysqlAuroraOutput() SecretsMountMysqlAuroraOutput

func (SecretsMountMysqlAuroraArgs) ToSecretsMountMysqlAuroraOutputWithContext

func (i SecretsMountMysqlAuroraArgs) ToSecretsMountMysqlAuroraOutputWithContext(ctx context.Context) SecretsMountMysqlAuroraOutput

type SecretsMountMysqlAuroraArray

type SecretsMountMysqlAuroraArray []SecretsMountMysqlAuroraInput

func (SecretsMountMysqlAuroraArray) ElementType

func (SecretsMountMysqlAuroraArray) ToSecretsMountMysqlAuroraArrayOutput

func (i SecretsMountMysqlAuroraArray) ToSecretsMountMysqlAuroraArrayOutput() SecretsMountMysqlAuroraArrayOutput

func (SecretsMountMysqlAuroraArray) ToSecretsMountMysqlAuroraArrayOutputWithContext

func (i SecretsMountMysqlAuroraArray) ToSecretsMountMysqlAuroraArrayOutputWithContext(ctx context.Context) SecretsMountMysqlAuroraArrayOutput

type SecretsMountMysqlAuroraArrayInput

type SecretsMountMysqlAuroraArrayInput interface {
	pulumi.Input

	ToSecretsMountMysqlAuroraArrayOutput() SecretsMountMysqlAuroraArrayOutput
	ToSecretsMountMysqlAuroraArrayOutputWithContext(context.Context) SecretsMountMysqlAuroraArrayOutput
}

SecretsMountMysqlAuroraArrayInput is an input type that accepts SecretsMountMysqlAuroraArray and SecretsMountMysqlAuroraArrayOutput values. You can construct a concrete instance of `SecretsMountMysqlAuroraArrayInput` via:

SecretsMountMysqlAuroraArray{ SecretsMountMysqlAuroraArgs{...} }

type SecretsMountMysqlAuroraArrayOutput

type SecretsMountMysqlAuroraArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountMysqlAuroraArrayOutput) ElementType

func (SecretsMountMysqlAuroraArrayOutput) Index

func (SecretsMountMysqlAuroraArrayOutput) ToSecretsMountMysqlAuroraArrayOutput

func (o SecretsMountMysqlAuroraArrayOutput) ToSecretsMountMysqlAuroraArrayOutput() SecretsMountMysqlAuroraArrayOutput

func (SecretsMountMysqlAuroraArrayOutput) ToSecretsMountMysqlAuroraArrayOutputWithContext

func (o SecretsMountMysqlAuroraArrayOutput) ToSecretsMountMysqlAuroraArrayOutputWithContext(ctx context.Context) SecretsMountMysqlAuroraArrayOutput

type SecretsMountMysqlAuroraInput

type SecretsMountMysqlAuroraInput interface {
	pulumi.Input

	ToSecretsMountMysqlAuroraOutput() SecretsMountMysqlAuroraOutput
	ToSecretsMountMysqlAuroraOutputWithContext(context.Context) SecretsMountMysqlAuroraOutput
}

SecretsMountMysqlAuroraInput is an input type that accepts SecretsMountMysqlAuroraArgs and SecretsMountMysqlAuroraOutput values. You can construct a concrete instance of `SecretsMountMysqlAuroraInput` via:

SecretsMountMysqlAuroraArgs{...}

type SecretsMountMysqlAuroraOutput

type SecretsMountMysqlAuroraOutput struct{ *pulumi.OutputState }

func (SecretsMountMysqlAuroraOutput) AllowedRoles

A list of roles that are allowed to use this connection.

func (SecretsMountMysqlAuroraOutput) AuthType

Specify alternative authorization type. (Only 'gcp_iam' is valid currently)

func (SecretsMountMysqlAuroraOutput) ConnectionUrl

Specifies the Redshift DSN. See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)

func (SecretsMountMysqlAuroraOutput) Data

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountMysqlAuroraOutput) ElementType

func (SecretsMountMysqlAuroraOutput) MaxConnectionLifetime

func (o SecretsMountMysqlAuroraOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum amount of time a connection may be reused.

func (SecretsMountMysqlAuroraOutput) MaxIdleConnections

func (o SecretsMountMysqlAuroraOutput) MaxIdleConnections() pulumi.IntPtrOutput

The maximum number of idle connections to the database.

func (SecretsMountMysqlAuroraOutput) MaxOpenConnections

func (o SecretsMountMysqlAuroraOutput) MaxOpenConnections() pulumi.IntPtrOutput

The maximum number of open connections to the database.

func (SecretsMountMysqlAuroraOutput) Name

Name of the database connection.

func (SecretsMountMysqlAuroraOutput) Password

The root credential password used in the connection URL.

func (SecretsMountMysqlAuroraOutput) PluginName

Specifies the name of the plugin to use.

func (SecretsMountMysqlAuroraOutput) RootRotationStatements

func (o SecretsMountMysqlAuroraOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountMysqlAuroraOutput) ServiceAccountJson

func (o SecretsMountMysqlAuroraOutput) ServiceAccountJson() pulumi.StringPtrOutput

A JSON encoded credential for use with IAM authorization

func (SecretsMountMysqlAuroraOutput) TlsCa

x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.

func (SecretsMountMysqlAuroraOutput) TlsCertificateKey

x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.

func (SecretsMountMysqlAuroraOutput) ToSecretsMountMysqlAuroraOutput

func (o SecretsMountMysqlAuroraOutput) ToSecretsMountMysqlAuroraOutput() SecretsMountMysqlAuroraOutput

func (SecretsMountMysqlAuroraOutput) ToSecretsMountMysqlAuroraOutputWithContext

func (o SecretsMountMysqlAuroraOutput) ToSecretsMountMysqlAuroraOutputWithContext(ctx context.Context) SecretsMountMysqlAuroraOutput

func (SecretsMountMysqlAuroraOutput) Username

The root credential username used in the connection URL.

func (SecretsMountMysqlAuroraOutput) UsernameTemplate

[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.

func (SecretsMountMysqlAuroraOutput) VerifyConnection

func (o SecretsMountMysqlAuroraOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountMysqlInput

type SecretsMountMysqlInput interface {
	pulumi.Input

	ToSecretsMountMysqlOutput() SecretsMountMysqlOutput
	ToSecretsMountMysqlOutputWithContext(context.Context) SecretsMountMysqlOutput
}

SecretsMountMysqlInput is an input type that accepts SecretsMountMysqlArgs and SecretsMountMysqlOutput values. You can construct a concrete instance of `SecretsMountMysqlInput` via:

SecretsMountMysqlArgs{...}

type SecretsMountMysqlLegacy

type SecretsMountMysqlLegacy struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
	AuthType *string `pulumi:"authType"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password *string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// A JSON encoded credential for use with IAM authorization
	ServiceAccountJson *string `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa *string `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey *string `pulumi:"tlsCertificateKey"`
	// The root credential username used in the connection URL.
	Username *string `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountMysqlLegacyArgs

type SecretsMountMysqlLegacyArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
	AuthType pulumi.StringPtrInput `pulumi:"authType"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// A JSON encoded credential for use with IAM authorization
	ServiceAccountJson pulumi.StringPtrInput `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa pulumi.StringPtrInput `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey pulumi.StringPtrInput `pulumi:"tlsCertificateKey"`
	// The root credential username used in the connection URL.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountMysqlLegacyArgs) ElementType

func (SecretsMountMysqlLegacyArgs) ToSecretsMountMysqlLegacyOutput

func (i SecretsMountMysqlLegacyArgs) ToSecretsMountMysqlLegacyOutput() SecretsMountMysqlLegacyOutput

func (SecretsMountMysqlLegacyArgs) ToSecretsMountMysqlLegacyOutputWithContext

func (i SecretsMountMysqlLegacyArgs) ToSecretsMountMysqlLegacyOutputWithContext(ctx context.Context) SecretsMountMysqlLegacyOutput

type SecretsMountMysqlLegacyArray

type SecretsMountMysqlLegacyArray []SecretsMountMysqlLegacyInput

func (SecretsMountMysqlLegacyArray) ElementType

func (SecretsMountMysqlLegacyArray) ToSecretsMountMysqlLegacyArrayOutput

func (i SecretsMountMysqlLegacyArray) ToSecretsMountMysqlLegacyArrayOutput() SecretsMountMysqlLegacyArrayOutput

func (SecretsMountMysqlLegacyArray) ToSecretsMountMysqlLegacyArrayOutputWithContext

func (i SecretsMountMysqlLegacyArray) ToSecretsMountMysqlLegacyArrayOutputWithContext(ctx context.Context) SecretsMountMysqlLegacyArrayOutput

type SecretsMountMysqlLegacyArrayInput

type SecretsMountMysqlLegacyArrayInput interface {
	pulumi.Input

	ToSecretsMountMysqlLegacyArrayOutput() SecretsMountMysqlLegacyArrayOutput
	ToSecretsMountMysqlLegacyArrayOutputWithContext(context.Context) SecretsMountMysqlLegacyArrayOutput
}

SecretsMountMysqlLegacyArrayInput is an input type that accepts SecretsMountMysqlLegacyArray and SecretsMountMysqlLegacyArrayOutput values. You can construct a concrete instance of `SecretsMountMysqlLegacyArrayInput` via:

SecretsMountMysqlLegacyArray{ SecretsMountMysqlLegacyArgs{...} }

type SecretsMountMysqlLegacyArrayOutput

type SecretsMountMysqlLegacyArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountMysqlLegacyArrayOutput) ElementType

func (SecretsMountMysqlLegacyArrayOutput) Index

func (SecretsMountMysqlLegacyArrayOutput) ToSecretsMountMysqlLegacyArrayOutput

func (o SecretsMountMysqlLegacyArrayOutput) ToSecretsMountMysqlLegacyArrayOutput() SecretsMountMysqlLegacyArrayOutput

func (SecretsMountMysqlLegacyArrayOutput) ToSecretsMountMysqlLegacyArrayOutputWithContext

func (o SecretsMountMysqlLegacyArrayOutput) ToSecretsMountMysqlLegacyArrayOutputWithContext(ctx context.Context) SecretsMountMysqlLegacyArrayOutput

type SecretsMountMysqlLegacyInput

type SecretsMountMysqlLegacyInput interface {
	pulumi.Input

	ToSecretsMountMysqlLegacyOutput() SecretsMountMysqlLegacyOutput
	ToSecretsMountMysqlLegacyOutputWithContext(context.Context) SecretsMountMysqlLegacyOutput
}

SecretsMountMysqlLegacyInput is an input type that accepts SecretsMountMysqlLegacyArgs and SecretsMountMysqlLegacyOutput values. You can construct a concrete instance of `SecretsMountMysqlLegacyInput` via:

SecretsMountMysqlLegacyArgs{...}

type SecretsMountMysqlLegacyOutput

type SecretsMountMysqlLegacyOutput struct{ *pulumi.OutputState }

func (SecretsMountMysqlLegacyOutput) AllowedRoles

A list of roles that are allowed to use this connection.

func (SecretsMountMysqlLegacyOutput) AuthType

Specify alternative authorization type. (Only 'gcp_iam' is valid currently)

func (SecretsMountMysqlLegacyOutput) ConnectionUrl

Specifies the Redshift DSN. See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)

func (SecretsMountMysqlLegacyOutput) Data

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountMysqlLegacyOutput) ElementType

func (SecretsMountMysqlLegacyOutput) MaxConnectionLifetime

func (o SecretsMountMysqlLegacyOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum amount of time a connection may be reused.

func (SecretsMountMysqlLegacyOutput) MaxIdleConnections

func (o SecretsMountMysqlLegacyOutput) MaxIdleConnections() pulumi.IntPtrOutput

The maximum number of idle connections to the database.

func (SecretsMountMysqlLegacyOutput) MaxOpenConnections

func (o SecretsMountMysqlLegacyOutput) MaxOpenConnections() pulumi.IntPtrOutput

The maximum number of open connections to the database.

func (SecretsMountMysqlLegacyOutput) Name

Name of the database connection.

func (SecretsMountMysqlLegacyOutput) Password

The root credential password used in the connection URL.

func (SecretsMountMysqlLegacyOutput) PluginName

Specifies the name of the plugin to use.

func (SecretsMountMysqlLegacyOutput) RootRotationStatements

func (o SecretsMountMysqlLegacyOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountMysqlLegacyOutput) ServiceAccountJson

func (o SecretsMountMysqlLegacyOutput) ServiceAccountJson() pulumi.StringPtrOutput

A JSON encoded credential for use with IAM authorization

func (SecretsMountMysqlLegacyOutput) TlsCa

x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.

func (SecretsMountMysqlLegacyOutput) TlsCertificateKey

x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.

func (SecretsMountMysqlLegacyOutput) ToSecretsMountMysqlLegacyOutput

func (o SecretsMountMysqlLegacyOutput) ToSecretsMountMysqlLegacyOutput() SecretsMountMysqlLegacyOutput

func (SecretsMountMysqlLegacyOutput) ToSecretsMountMysqlLegacyOutputWithContext

func (o SecretsMountMysqlLegacyOutput) ToSecretsMountMysqlLegacyOutputWithContext(ctx context.Context) SecretsMountMysqlLegacyOutput

func (SecretsMountMysqlLegacyOutput) Username

The root credential username used in the connection URL.

func (SecretsMountMysqlLegacyOutput) UsernameTemplate

[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.

func (SecretsMountMysqlLegacyOutput) VerifyConnection

func (o SecretsMountMysqlLegacyOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountMysqlOutput

type SecretsMountMysqlOutput struct{ *pulumi.OutputState }

func (SecretsMountMysqlOutput) AllowedRoles

A list of roles that are allowed to use this connection.

func (SecretsMountMysqlOutput) AuthType

Specify alternative authorization type. (Only 'gcp_iam' is valid currently)

func (SecretsMountMysqlOutput) ConnectionUrl

Specifies the Redshift DSN. See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)

func (SecretsMountMysqlOutput) Data

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountMysqlOutput) ElementType

func (SecretsMountMysqlOutput) ElementType() reflect.Type

func (SecretsMountMysqlOutput) MaxConnectionLifetime

func (o SecretsMountMysqlOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum amount of time a connection may be reused.

func (SecretsMountMysqlOutput) MaxIdleConnections

func (o SecretsMountMysqlOutput) MaxIdleConnections() pulumi.IntPtrOutput

The maximum number of idle connections to the database.

func (SecretsMountMysqlOutput) MaxOpenConnections

func (o SecretsMountMysqlOutput) MaxOpenConnections() pulumi.IntPtrOutput

The maximum number of open connections to the database.

func (SecretsMountMysqlOutput) Name

Name of the database connection.

func (SecretsMountMysqlOutput) Password

The root credential password used in the connection URL.

func (SecretsMountMysqlOutput) PluginName

Specifies the name of the plugin to use.

func (SecretsMountMysqlOutput) RootRotationStatements

func (o SecretsMountMysqlOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountMysqlOutput) ServiceAccountJson

func (o SecretsMountMysqlOutput) ServiceAccountJson() pulumi.StringPtrOutput

A JSON encoded credential for use with IAM authorization

func (SecretsMountMysqlOutput) TlsCa

x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.

func (SecretsMountMysqlOutput) TlsCertificateKey

func (o SecretsMountMysqlOutput) TlsCertificateKey() pulumi.StringPtrOutput

x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.

func (SecretsMountMysqlOutput) ToSecretsMountMysqlOutput

func (o SecretsMountMysqlOutput) ToSecretsMountMysqlOutput() SecretsMountMysqlOutput

func (SecretsMountMysqlOutput) ToSecretsMountMysqlOutputWithContext

func (o SecretsMountMysqlOutput) ToSecretsMountMysqlOutputWithContext(ctx context.Context) SecretsMountMysqlOutput

func (SecretsMountMysqlOutput) Username

The root credential username used in the connection URL.

func (SecretsMountMysqlOutput) UsernameTemplate

func (o SecretsMountMysqlOutput) UsernameTemplate() pulumi.StringPtrOutput

[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.

func (SecretsMountMysqlOutput) VerifyConnection

func (o SecretsMountMysqlOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountMysqlRd

type SecretsMountMysqlRd struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
	AuthType *string `pulumi:"authType"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password *string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// A JSON encoded credential for use with IAM authorization
	ServiceAccountJson *string `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa *string `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey *string `pulumi:"tlsCertificateKey"`
	// The root credential username used in the connection URL.
	Username *string `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountMysqlRdArgs

type SecretsMountMysqlRdArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
	AuthType pulumi.StringPtrInput `pulumi:"authType"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// A JSON encoded credential for use with IAM authorization
	ServiceAccountJson pulumi.StringPtrInput `pulumi:"serviceAccountJson"`
	// x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
	TlsCa pulumi.StringPtrInput `pulumi:"tlsCa"`
	// x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
	TlsCertificateKey pulumi.StringPtrInput `pulumi:"tlsCertificateKey"`
	// The root credential username used in the connection URL.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountMysqlRdArgs) ElementType

func (SecretsMountMysqlRdArgs) ElementType() reflect.Type

func (SecretsMountMysqlRdArgs) ToSecretsMountMysqlRdOutput

func (i SecretsMountMysqlRdArgs) ToSecretsMountMysqlRdOutput() SecretsMountMysqlRdOutput

func (SecretsMountMysqlRdArgs) ToSecretsMountMysqlRdOutputWithContext

func (i SecretsMountMysqlRdArgs) ToSecretsMountMysqlRdOutputWithContext(ctx context.Context) SecretsMountMysqlRdOutput

type SecretsMountMysqlRdArray

type SecretsMountMysqlRdArray []SecretsMountMysqlRdInput

func (SecretsMountMysqlRdArray) ElementType

func (SecretsMountMysqlRdArray) ElementType() reflect.Type

func (SecretsMountMysqlRdArray) ToSecretsMountMysqlRdArrayOutput

func (i SecretsMountMysqlRdArray) ToSecretsMountMysqlRdArrayOutput() SecretsMountMysqlRdArrayOutput

func (SecretsMountMysqlRdArray) ToSecretsMountMysqlRdArrayOutputWithContext

func (i SecretsMountMysqlRdArray) ToSecretsMountMysqlRdArrayOutputWithContext(ctx context.Context) SecretsMountMysqlRdArrayOutput

type SecretsMountMysqlRdArrayInput

type SecretsMountMysqlRdArrayInput interface {
	pulumi.Input

	ToSecretsMountMysqlRdArrayOutput() SecretsMountMysqlRdArrayOutput
	ToSecretsMountMysqlRdArrayOutputWithContext(context.Context) SecretsMountMysqlRdArrayOutput
}

SecretsMountMysqlRdArrayInput is an input type that accepts SecretsMountMysqlRdArray and SecretsMountMysqlRdArrayOutput values. You can construct a concrete instance of `SecretsMountMysqlRdArrayInput` via:

SecretsMountMysqlRdArray{ SecretsMountMysqlRdArgs{...} }

type SecretsMountMysqlRdArrayOutput

type SecretsMountMysqlRdArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountMysqlRdArrayOutput) ElementType

func (SecretsMountMysqlRdArrayOutput) Index

func (SecretsMountMysqlRdArrayOutput) ToSecretsMountMysqlRdArrayOutput

func (o SecretsMountMysqlRdArrayOutput) ToSecretsMountMysqlRdArrayOutput() SecretsMountMysqlRdArrayOutput

func (SecretsMountMysqlRdArrayOutput) ToSecretsMountMysqlRdArrayOutputWithContext

func (o SecretsMountMysqlRdArrayOutput) ToSecretsMountMysqlRdArrayOutputWithContext(ctx context.Context) SecretsMountMysqlRdArrayOutput

type SecretsMountMysqlRdInput

type SecretsMountMysqlRdInput interface {
	pulumi.Input

	ToSecretsMountMysqlRdOutput() SecretsMountMysqlRdOutput
	ToSecretsMountMysqlRdOutputWithContext(context.Context) SecretsMountMysqlRdOutput
}

SecretsMountMysqlRdInput is an input type that accepts SecretsMountMysqlRdArgs and SecretsMountMysqlRdOutput values. You can construct a concrete instance of `SecretsMountMysqlRdInput` via:

SecretsMountMysqlRdArgs{...}

type SecretsMountMysqlRdOutput

type SecretsMountMysqlRdOutput struct{ *pulumi.OutputState }

func (SecretsMountMysqlRdOutput) AllowedRoles

A list of roles that are allowed to use this connection.

func (SecretsMountMysqlRdOutput) AuthType

Specify alternative authorization type. (Only 'gcp_iam' is valid currently)

func (SecretsMountMysqlRdOutput) ConnectionUrl

Specifies the Redshift DSN. See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)

func (SecretsMountMysqlRdOutput) Data

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountMysqlRdOutput) ElementType

func (SecretsMountMysqlRdOutput) ElementType() reflect.Type

func (SecretsMountMysqlRdOutput) MaxConnectionLifetime

func (o SecretsMountMysqlRdOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum amount of time a connection may be reused.

func (SecretsMountMysqlRdOutput) MaxIdleConnections

func (o SecretsMountMysqlRdOutput) MaxIdleConnections() pulumi.IntPtrOutput

The maximum number of idle connections to the database.

func (SecretsMountMysqlRdOutput) MaxOpenConnections

func (o SecretsMountMysqlRdOutput) MaxOpenConnections() pulumi.IntPtrOutput

The maximum number of open connections to the database.

func (SecretsMountMysqlRdOutput) Name

Name of the database connection.

func (SecretsMountMysqlRdOutput) Password

The root credential password used in the connection URL.

func (SecretsMountMysqlRdOutput) PluginName

Specifies the name of the plugin to use.

func (SecretsMountMysqlRdOutput) RootRotationStatements

func (o SecretsMountMysqlRdOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountMysqlRdOutput) ServiceAccountJson

func (o SecretsMountMysqlRdOutput) ServiceAccountJson() pulumi.StringPtrOutput

A JSON encoded credential for use with IAM authorization

func (SecretsMountMysqlRdOutput) TlsCa

x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.

func (SecretsMountMysqlRdOutput) TlsCertificateKey

func (o SecretsMountMysqlRdOutput) TlsCertificateKey() pulumi.StringPtrOutput

x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.

func (SecretsMountMysqlRdOutput) ToSecretsMountMysqlRdOutput

func (o SecretsMountMysqlRdOutput) ToSecretsMountMysqlRdOutput() SecretsMountMysqlRdOutput

func (SecretsMountMysqlRdOutput) ToSecretsMountMysqlRdOutputWithContext

func (o SecretsMountMysqlRdOutput) ToSecretsMountMysqlRdOutputWithContext(ctx context.Context) SecretsMountMysqlRdOutput

func (SecretsMountMysqlRdOutput) Username

The root credential username used in the connection URL.

func (SecretsMountMysqlRdOutput) UsernameTemplate

func (o SecretsMountMysqlRdOutput) UsernameTemplate() pulumi.StringPtrOutput

[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.

func (SecretsMountMysqlRdOutput) VerifyConnection

func (o SecretsMountMysqlRdOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountOracle

type SecretsMountOracle struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// Set to true to disconnect any open sessions prior to running the revocation statements.
	DisconnectSessions *bool `pulumi:"disconnectSessions"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password *string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// Set to true in order to split statements after semi-colons.
	SplitStatements *bool `pulumi:"splitStatements"`
	// The root credential username used in the connection URL.
	Username *string `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountOracleArgs

type SecretsMountOracleArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// Set to true to disconnect any open sessions prior to running the revocation statements.
	DisconnectSessions pulumi.BoolPtrInput `pulumi:"disconnectSessions"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// Set to true in order to split statements after semi-colons.
	SplitStatements pulumi.BoolPtrInput `pulumi:"splitStatements"`
	// The root credential username used in the connection URL.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountOracleArgs) ElementType

func (SecretsMountOracleArgs) ElementType() reflect.Type

func (SecretsMountOracleArgs) ToSecretsMountOracleOutput

func (i SecretsMountOracleArgs) ToSecretsMountOracleOutput() SecretsMountOracleOutput

func (SecretsMountOracleArgs) ToSecretsMountOracleOutputWithContext

func (i SecretsMountOracleArgs) ToSecretsMountOracleOutputWithContext(ctx context.Context) SecretsMountOracleOutput

type SecretsMountOracleArray

type SecretsMountOracleArray []SecretsMountOracleInput

func (SecretsMountOracleArray) ElementType

func (SecretsMountOracleArray) ElementType() reflect.Type

func (SecretsMountOracleArray) ToSecretsMountOracleArrayOutput

func (i SecretsMountOracleArray) ToSecretsMountOracleArrayOutput() SecretsMountOracleArrayOutput

func (SecretsMountOracleArray) ToSecretsMountOracleArrayOutputWithContext

func (i SecretsMountOracleArray) ToSecretsMountOracleArrayOutputWithContext(ctx context.Context) SecretsMountOracleArrayOutput

type SecretsMountOracleArrayInput

type SecretsMountOracleArrayInput interface {
	pulumi.Input

	ToSecretsMountOracleArrayOutput() SecretsMountOracleArrayOutput
	ToSecretsMountOracleArrayOutputWithContext(context.Context) SecretsMountOracleArrayOutput
}

SecretsMountOracleArrayInput is an input type that accepts SecretsMountOracleArray and SecretsMountOracleArrayOutput values. You can construct a concrete instance of `SecretsMountOracleArrayInput` via:

SecretsMountOracleArray{ SecretsMountOracleArgs{...} }

type SecretsMountOracleArrayOutput

type SecretsMountOracleArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountOracleArrayOutput) ElementType

func (SecretsMountOracleArrayOutput) Index

func (SecretsMountOracleArrayOutput) ToSecretsMountOracleArrayOutput

func (o SecretsMountOracleArrayOutput) ToSecretsMountOracleArrayOutput() SecretsMountOracleArrayOutput

func (SecretsMountOracleArrayOutput) ToSecretsMountOracleArrayOutputWithContext

func (o SecretsMountOracleArrayOutput) ToSecretsMountOracleArrayOutputWithContext(ctx context.Context) SecretsMountOracleArrayOutput

type SecretsMountOracleInput

type SecretsMountOracleInput interface {
	pulumi.Input

	ToSecretsMountOracleOutput() SecretsMountOracleOutput
	ToSecretsMountOracleOutputWithContext(context.Context) SecretsMountOracleOutput
}

SecretsMountOracleInput is an input type that accepts SecretsMountOracleArgs and SecretsMountOracleOutput values. You can construct a concrete instance of `SecretsMountOracleInput` via:

SecretsMountOracleArgs{...}

type SecretsMountOracleOutput

type SecretsMountOracleOutput struct{ *pulumi.OutputState }

func (SecretsMountOracleOutput) AllowedRoles

A list of roles that are allowed to use this connection.

func (SecretsMountOracleOutput) ConnectionUrl

Specifies the Redshift DSN. See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)

func (SecretsMountOracleOutput) Data

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountOracleOutput) DisconnectSessions

func (o SecretsMountOracleOutput) DisconnectSessions() pulumi.BoolPtrOutput

Set to true to disconnect any open sessions prior to running the revocation statements.

func (SecretsMountOracleOutput) ElementType

func (SecretsMountOracleOutput) ElementType() reflect.Type

func (SecretsMountOracleOutput) MaxConnectionLifetime

func (o SecretsMountOracleOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum amount of time a connection may be reused.

func (SecretsMountOracleOutput) MaxIdleConnections

func (o SecretsMountOracleOutput) MaxIdleConnections() pulumi.IntPtrOutput

The maximum number of idle connections to the database.

func (SecretsMountOracleOutput) MaxOpenConnections

func (o SecretsMountOracleOutput) MaxOpenConnections() pulumi.IntPtrOutput

The maximum number of open connections to the database.

func (SecretsMountOracleOutput) Name

Name of the database connection.

func (SecretsMountOracleOutput) Password

The root credential password used in the connection URL.

func (SecretsMountOracleOutput) PluginName

Specifies the name of the plugin to use.

func (SecretsMountOracleOutput) RootRotationStatements

func (o SecretsMountOracleOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountOracleOutput) SplitStatements

func (o SecretsMountOracleOutput) SplitStatements() pulumi.BoolPtrOutput

Set to true in order to split statements after semi-colons.

func (SecretsMountOracleOutput) ToSecretsMountOracleOutput

func (o SecretsMountOracleOutput) ToSecretsMountOracleOutput() SecretsMountOracleOutput

func (SecretsMountOracleOutput) ToSecretsMountOracleOutputWithContext

func (o SecretsMountOracleOutput) ToSecretsMountOracleOutputWithContext(ctx context.Context) SecretsMountOracleOutput

func (SecretsMountOracleOutput) Username

The root credential username used in the connection URL.

func (SecretsMountOracleOutput) UsernameTemplate

func (o SecretsMountOracleOutput) UsernameTemplate() pulumi.StringPtrOutput

[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.

func (SecretsMountOracleOutput) VerifyConnection

func (o SecretsMountOracleOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountOutput

type SecretsMountOutput struct{ *pulumi.OutputState }

func (SecretsMountOutput) Accessor

func (o SecretsMountOutput) Accessor() pulumi.StringOutput

Accessor of the mount

func (SecretsMountOutput) AllowedManagedKeys

func (o SecretsMountOutput) AllowedManagedKeys() pulumi.StringArrayOutput

Set of managed key registry entry names that the mount in question is allowed to access

The following arguments are common to all database engines:

func (SecretsMountOutput) AuditNonHmacRequestKeys

func (o SecretsMountOutput) AuditNonHmacRequestKeys() pulumi.StringArrayOutput

Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.

func (SecretsMountOutput) AuditNonHmacResponseKeys

func (o SecretsMountOutput) AuditNonHmacResponseKeys() pulumi.StringArrayOutput

Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.

func (SecretsMountOutput) Cassandras

A nested block containing configuration options for Cassandra connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) Couchbases

A nested block containing configuration options for Couchbase connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) DefaultLeaseTtlSeconds

func (o SecretsMountOutput) DefaultLeaseTtlSeconds() pulumi.IntOutput

Default lease duration for tokens and secrets in seconds

func (SecretsMountOutput) Description

func (o SecretsMountOutput) Description() pulumi.StringPtrOutput

Human-friendly description of the mount

func (SecretsMountOutput) Elasticsearches

A nested block containing configuration options for Elasticsearch connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) ElementType

func (SecretsMountOutput) ElementType() reflect.Type

func (SecretsMountOutput) EngineCount

func (o SecretsMountOutput) EngineCount() pulumi.IntOutput

The total number of database secrets engines configured.

func (SecretsMountOutput) ExternalEntropyAccess

func (o SecretsMountOutput) ExternalEntropyAccess() pulumi.BoolPtrOutput

Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source

func (SecretsMountOutput) Hanas

A nested block containing configuration options for SAP HanaDB connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) Influxdbs

A nested block containing configuration options for InfluxDB connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) Local

Boolean flag that can be explicitly set to true to enforce local mount in HA environment

func (SecretsMountOutput) MaxLeaseTtlSeconds

func (o SecretsMountOutput) MaxLeaseTtlSeconds() pulumi.IntOutput

Maximum possible lease duration for tokens and secrets in seconds

func (SecretsMountOutput) Mongodbatlas

A nested block containing configuration options for MongoDB Atlas connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) Mongodbs

A nested block containing configuration options for MongoDB connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) Mssqls

A nested block containing configuration options for MSSQL connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) MysqlAuroras

A nested block containing configuration options for Aurora MySQL connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) MysqlLegacies

A nested block containing configuration options for legacy MySQL connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) MysqlRds

A nested block containing configuration options for RDS MySQL connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) Mysqls

A nested block containing configuration options for MySQL connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) Namespace

Target namespace. (requires Enterprise)

func (SecretsMountOutput) Options

func (o SecretsMountOutput) Options() pulumi.MapOutput

Specifies mount type specific options that are passed to the backend

func (SecretsMountOutput) Oracles

A nested block containing configuration options for Oracle connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) Path

Where the secret backend will be mounted

func (SecretsMountOutput) Postgresqls

A nested block containing configuration options for PostgreSQL connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) Redis

A nested block containing configuration options for Redis connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) RedisElasticaches

A nested block containing configuration options for Redis ElastiCache connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) Redshifts

A nested block containing configuration options for AWS Redshift connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) SealWrap

func (o SecretsMountOutput) SealWrap() pulumi.BoolOutput

Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability

func (SecretsMountOutput) Snowflakes

A nested block containing configuration options for Snowflake connections.\ *See Configuration Options for more info*

func (SecretsMountOutput) ToSecretsMountOutput

func (o SecretsMountOutput) ToSecretsMountOutput() SecretsMountOutput

func (SecretsMountOutput) ToSecretsMountOutputWithContext

func (o SecretsMountOutput) ToSecretsMountOutputWithContext(ctx context.Context) SecretsMountOutput

type SecretsMountPostgresql

type SecretsMountPostgresql struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
	AuthType *string `pulumi:"authType"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// Disable special character escaping in username and password.
	DisableEscaping *bool `pulumi:"disableEscaping"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password *string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// A JSON encoded credential for use with IAM authorization
	ServiceAccountJson *string `pulumi:"serviceAccountJson"`
	// The root credential username used in the connection URL.
	Username *string `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountPostgresqlArgs

type SecretsMountPostgresqlArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
	AuthType pulumi.StringPtrInput `pulumi:"authType"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// Disable special character escaping in username and password.
	DisableEscaping pulumi.BoolPtrInput `pulumi:"disableEscaping"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// A JSON encoded credential for use with IAM authorization
	ServiceAccountJson pulumi.StringPtrInput `pulumi:"serviceAccountJson"`
	// The root credential username used in the connection URL.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountPostgresqlArgs) ElementType

func (SecretsMountPostgresqlArgs) ElementType() reflect.Type

func (SecretsMountPostgresqlArgs) ToSecretsMountPostgresqlOutput

func (i SecretsMountPostgresqlArgs) ToSecretsMountPostgresqlOutput() SecretsMountPostgresqlOutput

func (SecretsMountPostgresqlArgs) ToSecretsMountPostgresqlOutputWithContext

func (i SecretsMountPostgresqlArgs) ToSecretsMountPostgresqlOutputWithContext(ctx context.Context) SecretsMountPostgresqlOutput

type SecretsMountPostgresqlArray

type SecretsMountPostgresqlArray []SecretsMountPostgresqlInput

func (SecretsMountPostgresqlArray) ElementType

func (SecretsMountPostgresqlArray) ToSecretsMountPostgresqlArrayOutput

func (i SecretsMountPostgresqlArray) ToSecretsMountPostgresqlArrayOutput() SecretsMountPostgresqlArrayOutput

func (SecretsMountPostgresqlArray) ToSecretsMountPostgresqlArrayOutputWithContext

func (i SecretsMountPostgresqlArray) ToSecretsMountPostgresqlArrayOutputWithContext(ctx context.Context) SecretsMountPostgresqlArrayOutput

type SecretsMountPostgresqlArrayInput

type SecretsMountPostgresqlArrayInput interface {
	pulumi.Input

	ToSecretsMountPostgresqlArrayOutput() SecretsMountPostgresqlArrayOutput
	ToSecretsMountPostgresqlArrayOutputWithContext(context.Context) SecretsMountPostgresqlArrayOutput
}

SecretsMountPostgresqlArrayInput is an input type that accepts SecretsMountPostgresqlArray and SecretsMountPostgresqlArrayOutput values. You can construct a concrete instance of `SecretsMountPostgresqlArrayInput` via:

SecretsMountPostgresqlArray{ SecretsMountPostgresqlArgs{...} }

type SecretsMountPostgresqlArrayOutput

type SecretsMountPostgresqlArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountPostgresqlArrayOutput) ElementType

func (SecretsMountPostgresqlArrayOutput) Index

func (SecretsMountPostgresqlArrayOutput) ToSecretsMountPostgresqlArrayOutput

func (o SecretsMountPostgresqlArrayOutput) ToSecretsMountPostgresqlArrayOutput() SecretsMountPostgresqlArrayOutput

func (SecretsMountPostgresqlArrayOutput) ToSecretsMountPostgresqlArrayOutputWithContext

func (o SecretsMountPostgresqlArrayOutput) ToSecretsMountPostgresqlArrayOutputWithContext(ctx context.Context) SecretsMountPostgresqlArrayOutput

type SecretsMountPostgresqlInput

type SecretsMountPostgresqlInput interface {
	pulumi.Input

	ToSecretsMountPostgresqlOutput() SecretsMountPostgresqlOutput
	ToSecretsMountPostgresqlOutputWithContext(context.Context) SecretsMountPostgresqlOutput
}

SecretsMountPostgresqlInput is an input type that accepts SecretsMountPostgresqlArgs and SecretsMountPostgresqlOutput values. You can construct a concrete instance of `SecretsMountPostgresqlInput` via:

SecretsMountPostgresqlArgs{...}

type SecretsMountPostgresqlOutput

type SecretsMountPostgresqlOutput struct{ *pulumi.OutputState }

func (SecretsMountPostgresqlOutput) AllowedRoles

A list of roles that are allowed to use this connection.

func (SecretsMountPostgresqlOutput) AuthType

Specify alternative authorization type. (Only 'gcp_iam' is valid currently)

func (SecretsMountPostgresqlOutput) ConnectionUrl

Specifies the Redshift DSN. See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)

func (SecretsMountPostgresqlOutput) Data

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountPostgresqlOutput) DisableEscaping

Disable special character escaping in username and password.

func (SecretsMountPostgresqlOutput) ElementType

func (SecretsMountPostgresqlOutput) MaxConnectionLifetime

func (o SecretsMountPostgresqlOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum amount of time a connection may be reused.

func (SecretsMountPostgresqlOutput) MaxIdleConnections

func (o SecretsMountPostgresqlOutput) MaxIdleConnections() pulumi.IntPtrOutput

The maximum number of idle connections to the database.

func (SecretsMountPostgresqlOutput) MaxOpenConnections

func (o SecretsMountPostgresqlOutput) MaxOpenConnections() pulumi.IntPtrOutput

The maximum number of open connections to the database.

func (SecretsMountPostgresqlOutput) Name

Name of the database connection.

func (SecretsMountPostgresqlOutput) Password

The root credential password used in the connection URL.

func (SecretsMountPostgresqlOutput) PluginName

Specifies the name of the plugin to use.

func (SecretsMountPostgresqlOutput) RootRotationStatements

func (o SecretsMountPostgresqlOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountPostgresqlOutput) ServiceAccountJson

func (o SecretsMountPostgresqlOutput) ServiceAccountJson() pulumi.StringPtrOutput

A JSON encoded credential for use with IAM authorization

func (SecretsMountPostgresqlOutput) ToSecretsMountPostgresqlOutput

func (o SecretsMountPostgresqlOutput) ToSecretsMountPostgresqlOutput() SecretsMountPostgresqlOutput

func (SecretsMountPostgresqlOutput) ToSecretsMountPostgresqlOutputWithContext

func (o SecretsMountPostgresqlOutput) ToSecretsMountPostgresqlOutputWithContext(ctx context.Context) SecretsMountPostgresqlOutput

func (SecretsMountPostgresqlOutput) Username

The root credential username used in the connection URL.

func (SecretsMountPostgresqlOutput) UsernameTemplate

[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.

func (SecretsMountPostgresqlOutput) VerifyConnection

func (o SecretsMountPostgresqlOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountRedi

type SecretsMountRedi struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
	CaCert *string `pulumi:"caCert"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// The host to connect to.
	Host string `pulumi:"host"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls *bool `pulumi:"insecureTls"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// The default port to connect to if no port is specified as
	// part of the host.
	Port *int `pulumi:"port"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// Whether to use TLS when connecting to Cassandra.
	Tls *bool `pulumi:"tls"`
	// The root credential username used in the connection URL.
	Username string `pulumi:"username"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountRediArgs

type SecretsMountRediArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.
	CaCert pulumi.StringPtrInput `pulumi:"caCert"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// The host to connect to.
	Host pulumi.StringInput `pulumi:"host"`
	// Whether to skip verification of the server
	// certificate when using TLS.
	InsecureTls pulumi.BoolPtrInput `pulumi:"insecureTls"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// The default port to connect to if no port is specified as
	// part of the host.
	Port pulumi.IntPtrInput `pulumi:"port"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// Whether to use TLS when connecting to Cassandra.
	Tls pulumi.BoolPtrInput `pulumi:"tls"`
	// The root credential username used in the connection URL.
	Username pulumi.StringInput `pulumi:"username"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountRediArgs) ElementType

func (SecretsMountRediArgs) ElementType() reflect.Type

func (SecretsMountRediArgs) ToSecretsMountRediOutput

func (i SecretsMountRediArgs) ToSecretsMountRediOutput() SecretsMountRediOutput

func (SecretsMountRediArgs) ToSecretsMountRediOutputWithContext

func (i SecretsMountRediArgs) ToSecretsMountRediOutputWithContext(ctx context.Context) SecretsMountRediOutput

type SecretsMountRediArray

type SecretsMountRediArray []SecretsMountRediInput

func (SecretsMountRediArray) ElementType

func (SecretsMountRediArray) ElementType() reflect.Type

func (SecretsMountRediArray) ToSecretsMountRediArrayOutput

func (i SecretsMountRediArray) ToSecretsMountRediArrayOutput() SecretsMountRediArrayOutput

func (SecretsMountRediArray) ToSecretsMountRediArrayOutputWithContext

func (i SecretsMountRediArray) ToSecretsMountRediArrayOutputWithContext(ctx context.Context) SecretsMountRediArrayOutput

type SecretsMountRediArrayInput

type SecretsMountRediArrayInput interface {
	pulumi.Input

	ToSecretsMountRediArrayOutput() SecretsMountRediArrayOutput
	ToSecretsMountRediArrayOutputWithContext(context.Context) SecretsMountRediArrayOutput
}

SecretsMountRediArrayInput is an input type that accepts SecretsMountRediArray and SecretsMountRediArrayOutput values. You can construct a concrete instance of `SecretsMountRediArrayInput` via:

SecretsMountRediArray{ SecretsMountRediArgs{...} }

type SecretsMountRediArrayOutput

type SecretsMountRediArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountRediArrayOutput) ElementType

func (SecretsMountRediArrayOutput) Index

func (SecretsMountRediArrayOutput) ToSecretsMountRediArrayOutput

func (o SecretsMountRediArrayOutput) ToSecretsMountRediArrayOutput() SecretsMountRediArrayOutput

func (SecretsMountRediArrayOutput) ToSecretsMountRediArrayOutputWithContext

func (o SecretsMountRediArrayOutput) ToSecretsMountRediArrayOutputWithContext(ctx context.Context) SecretsMountRediArrayOutput

type SecretsMountRediInput

type SecretsMountRediInput interface {
	pulumi.Input

	ToSecretsMountRediOutput() SecretsMountRediOutput
	ToSecretsMountRediOutputWithContext(context.Context) SecretsMountRediOutput
}

SecretsMountRediInput is an input type that accepts SecretsMountRediArgs and SecretsMountRediOutput values. You can construct a concrete instance of `SecretsMountRediInput` via:

SecretsMountRediArgs{...}

type SecretsMountRediOutput

type SecretsMountRediOutput struct{ *pulumi.OutputState }

func (SecretsMountRediOutput) AllowedRoles

A list of roles that are allowed to use this connection.

func (SecretsMountRediOutput) CaCert

The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity.

func (SecretsMountRediOutput) Data

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountRediOutput) ElementType

func (SecretsMountRediOutput) ElementType() reflect.Type

func (SecretsMountRediOutput) Host

The host to connect to.

func (SecretsMountRediOutput) InsecureTls

Whether to skip verification of the server certificate when using TLS.

func (SecretsMountRediOutput) Name

Name of the database connection.

func (SecretsMountRediOutput) Password

The root credential password used in the connection URL.

func (SecretsMountRediOutput) PluginName

Specifies the name of the plugin to use.

func (SecretsMountRediOutput) Port

The default port to connect to if no port is specified as part of the host.

func (SecretsMountRediOutput) RootRotationStatements

func (o SecretsMountRediOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountRediOutput) Tls

Whether to use TLS when connecting to Cassandra.

func (SecretsMountRediOutput) ToSecretsMountRediOutput

func (o SecretsMountRediOutput) ToSecretsMountRediOutput() SecretsMountRediOutput

func (SecretsMountRediOutput) ToSecretsMountRediOutputWithContext

func (o SecretsMountRediOutput) ToSecretsMountRediOutputWithContext(ctx context.Context) SecretsMountRediOutput

func (SecretsMountRediOutput) Username

The root credential username used in the connection URL.

func (SecretsMountRediOutput) VerifyConnection

func (o SecretsMountRediOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountRedisElasticach

type SecretsMountRedisElasticach struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password *string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// The AWS region where the ElastiCache cluster is hosted.
	// If omitted the plugin tries to infer the region from the environment.
	Region *string `pulumi:"region"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// The URL for Elasticsearch's API. https requires certificate
	// by trusted CA if used.
	Url string `pulumi:"url"`
	// The root credential username used in the connection URL.
	Username *string `pulumi:"username"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountRedisElasticachArgs

type SecretsMountRedisElasticachArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// The AWS region where the ElastiCache cluster is hosted.
	// If omitted the plugin tries to infer the region from the environment.
	Region pulumi.StringPtrInput `pulumi:"region"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// The URL for Elasticsearch's API. https requires certificate
	// by trusted CA if used.
	Url pulumi.StringInput `pulumi:"url"`
	// The root credential username used in the connection URL.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountRedisElasticachArgs) ElementType

func (SecretsMountRedisElasticachArgs) ToSecretsMountRedisElasticachOutput

func (i SecretsMountRedisElasticachArgs) ToSecretsMountRedisElasticachOutput() SecretsMountRedisElasticachOutput

func (SecretsMountRedisElasticachArgs) ToSecretsMountRedisElasticachOutputWithContext

func (i SecretsMountRedisElasticachArgs) ToSecretsMountRedisElasticachOutputWithContext(ctx context.Context) SecretsMountRedisElasticachOutput

type SecretsMountRedisElasticachArray

type SecretsMountRedisElasticachArray []SecretsMountRedisElasticachInput

func (SecretsMountRedisElasticachArray) ElementType

func (SecretsMountRedisElasticachArray) ToSecretsMountRedisElasticachArrayOutput

func (i SecretsMountRedisElasticachArray) ToSecretsMountRedisElasticachArrayOutput() SecretsMountRedisElasticachArrayOutput

func (SecretsMountRedisElasticachArray) ToSecretsMountRedisElasticachArrayOutputWithContext

func (i SecretsMountRedisElasticachArray) ToSecretsMountRedisElasticachArrayOutputWithContext(ctx context.Context) SecretsMountRedisElasticachArrayOutput

type SecretsMountRedisElasticachArrayInput

type SecretsMountRedisElasticachArrayInput interface {
	pulumi.Input

	ToSecretsMountRedisElasticachArrayOutput() SecretsMountRedisElasticachArrayOutput
	ToSecretsMountRedisElasticachArrayOutputWithContext(context.Context) SecretsMountRedisElasticachArrayOutput
}

SecretsMountRedisElasticachArrayInput is an input type that accepts SecretsMountRedisElasticachArray and SecretsMountRedisElasticachArrayOutput values. You can construct a concrete instance of `SecretsMountRedisElasticachArrayInput` via:

SecretsMountRedisElasticachArray{ SecretsMountRedisElasticachArgs{...} }

type SecretsMountRedisElasticachArrayOutput

type SecretsMountRedisElasticachArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountRedisElasticachArrayOutput) ElementType

func (SecretsMountRedisElasticachArrayOutput) Index

func (SecretsMountRedisElasticachArrayOutput) ToSecretsMountRedisElasticachArrayOutput

func (o SecretsMountRedisElasticachArrayOutput) ToSecretsMountRedisElasticachArrayOutput() SecretsMountRedisElasticachArrayOutput

func (SecretsMountRedisElasticachArrayOutput) ToSecretsMountRedisElasticachArrayOutputWithContext

func (o SecretsMountRedisElasticachArrayOutput) ToSecretsMountRedisElasticachArrayOutputWithContext(ctx context.Context) SecretsMountRedisElasticachArrayOutput

type SecretsMountRedisElasticachInput

type SecretsMountRedisElasticachInput interface {
	pulumi.Input

	ToSecretsMountRedisElasticachOutput() SecretsMountRedisElasticachOutput
	ToSecretsMountRedisElasticachOutputWithContext(context.Context) SecretsMountRedisElasticachOutput
}

SecretsMountRedisElasticachInput is an input type that accepts SecretsMountRedisElasticachArgs and SecretsMountRedisElasticachOutput values. You can construct a concrete instance of `SecretsMountRedisElasticachInput` via:

SecretsMountRedisElasticachArgs{...}

type SecretsMountRedisElasticachOutput

type SecretsMountRedisElasticachOutput struct{ *pulumi.OutputState }

func (SecretsMountRedisElasticachOutput) AllowedRoles

A list of roles that are allowed to use this connection.

func (SecretsMountRedisElasticachOutput) Data

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountRedisElasticachOutput) ElementType

func (SecretsMountRedisElasticachOutput) Name

Name of the database connection.

func (SecretsMountRedisElasticachOutput) Password

The root credential password used in the connection URL.

func (SecretsMountRedisElasticachOutput) PluginName

Specifies the name of the plugin to use.

func (SecretsMountRedisElasticachOutput) Region

The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment.

func (SecretsMountRedisElasticachOutput) RootRotationStatements

func (o SecretsMountRedisElasticachOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountRedisElasticachOutput) ToSecretsMountRedisElasticachOutput

func (o SecretsMountRedisElasticachOutput) ToSecretsMountRedisElasticachOutput() SecretsMountRedisElasticachOutput

func (SecretsMountRedisElasticachOutput) ToSecretsMountRedisElasticachOutputWithContext

func (o SecretsMountRedisElasticachOutput) ToSecretsMountRedisElasticachOutputWithContext(ctx context.Context) SecretsMountRedisElasticachOutput

func (SecretsMountRedisElasticachOutput) Url

The URL for Elasticsearch's API. https requires certificate by trusted CA if used.

func (SecretsMountRedisElasticachOutput) Username

The root credential username used in the connection URL.

func (SecretsMountRedisElasticachOutput) VerifyConnection

Whether the connection should be verified on initial configuration or not.

type SecretsMountRedshift

type SecretsMountRedshift struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// Disable special character escaping in username and password.
	DisableEscaping *bool `pulumi:"disableEscaping"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password *string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// The root credential username used in the connection URL.
	Username *string `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountRedshiftArgs

type SecretsMountRedshiftArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// Disable special character escaping in username and password.
	DisableEscaping pulumi.BoolPtrInput `pulumi:"disableEscaping"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// The root credential username used in the connection URL.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountRedshiftArgs) ElementType

func (SecretsMountRedshiftArgs) ElementType() reflect.Type

func (SecretsMountRedshiftArgs) ToSecretsMountRedshiftOutput

func (i SecretsMountRedshiftArgs) ToSecretsMountRedshiftOutput() SecretsMountRedshiftOutput

func (SecretsMountRedshiftArgs) ToSecretsMountRedshiftOutputWithContext

func (i SecretsMountRedshiftArgs) ToSecretsMountRedshiftOutputWithContext(ctx context.Context) SecretsMountRedshiftOutput

type SecretsMountRedshiftArray

type SecretsMountRedshiftArray []SecretsMountRedshiftInput

func (SecretsMountRedshiftArray) ElementType

func (SecretsMountRedshiftArray) ElementType() reflect.Type

func (SecretsMountRedshiftArray) ToSecretsMountRedshiftArrayOutput

func (i SecretsMountRedshiftArray) ToSecretsMountRedshiftArrayOutput() SecretsMountRedshiftArrayOutput

func (SecretsMountRedshiftArray) ToSecretsMountRedshiftArrayOutputWithContext

func (i SecretsMountRedshiftArray) ToSecretsMountRedshiftArrayOutputWithContext(ctx context.Context) SecretsMountRedshiftArrayOutput

type SecretsMountRedshiftArrayInput

type SecretsMountRedshiftArrayInput interface {
	pulumi.Input

	ToSecretsMountRedshiftArrayOutput() SecretsMountRedshiftArrayOutput
	ToSecretsMountRedshiftArrayOutputWithContext(context.Context) SecretsMountRedshiftArrayOutput
}

SecretsMountRedshiftArrayInput is an input type that accepts SecretsMountRedshiftArray and SecretsMountRedshiftArrayOutput values. You can construct a concrete instance of `SecretsMountRedshiftArrayInput` via:

SecretsMountRedshiftArray{ SecretsMountRedshiftArgs{...} }

type SecretsMountRedshiftArrayOutput

type SecretsMountRedshiftArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountRedshiftArrayOutput) ElementType

func (SecretsMountRedshiftArrayOutput) Index

func (SecretsMountRedshiftArrayOutput) ToSecretsMountRedshiftArrayOutput

func (o SecretsMountRedshiftArrayOutput) ToSecretsMountRedshiftArrayOutput() SecretsMountRedshiftArrayOutput

func (SecretsMountRedshiftArrayOutput) ToSecretsMountRedshiftArrayOutputWithContext

func (o SecretsMountRedshiftArrayOutput) ToSecretsMountRedshiftArrayOutputWithContext(ctx context.Context) SecretsMountRedshiftArrayOutput

type SecretsMountRedshiftInput

type SecretsMountRedshiftInput interface {
	pulumi.Input

	ToSecretsMountRedshiftOutput() SecretsMountRedshiftOutput
	ToSecretsMountRedshiftOutputWithContext(context.Context) SecretsMountRedshiftOutput
}

SecretsMountRedshiftInput is an input type that accepts SecretsMountRedshiftArgs and SecretsMountRedshiftOutput values. You can construct a concrete instance of `SecretsMountRedshiftInput` via:

SecretsMountRedshiftArgs{...}

type SecretsMountRedshiftOutput

type SecretsMountRedshiftOutput struct{ *pulumi.OutputState }

func (SecretsMountRedshiftOutput) AllowedRoles

A list of roles that are allowed to use this connection.

func (SecretsMountRedshiftOutput) ConnectionUrl

Specifies the Redshift DSN. See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)

func (SecretsMountRedshiftOutput) Data

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountRedshiftOutput) DisableEscaping

func (o SecretsMountRedshiftOutput) DisableEscaping() pulumi.BoolPtrOutput

Disable special character escaping in username and password.

func (SecretsMountRedshiftOutput) ElementType

func (SecretsMountRedshiftOutput) ElementType() reflect.Type

func (SecretsMountRedshiftOutput) MaxConnectionLifetime

func (o SecretsMountRedshiftOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum amount of time a connection may be reused.

func (SecretsMountRedshiftOutput) MaxIdleConnections

func (o SecretsMountRedshiftOutput) MaxIdleConnections() pulumi.IntPtrOutput

The maximum number of idle connections to the database.

func (SecretsMountRedshiftOutput) MaxOpenConnections

func (o SecretsMountRedshiftOutput) MaxOpenConnections() pulumi.IntPtrOutput

The maximum number of open connections to the database.

func (SecretsMountRedshiftOutput) Name

Name of the database connection.

func (SecretsMountRedshiftOutput) Password

The root credential password used in the connection URL.

func (SecretsMountRedshiftOutput) PluginName

Specifies the name of the plugin to use.

func (SecretsMountRedshiftOutput) RootRotationStatements

func (o SecretsMountRedshiftOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountRedshiftOutput) ToSecretsMountRedshiftOutput

func (o SecretsMountRedshiftOutput) ToSecretsMountRedshiftOutput() SecretsMountRedshiftOutput

func (SecretsMountRedshiftOutput) ToSecretsMountRedshiftOutputWithContext

func (o SecretsMountRedshiftOutput) ToSecretsMountRedshiftOutputWithContext(ctx context.Context) SecretsMountRedshiftOutput

func (SecretsMountRedshiftOutput) Username

The root credential username used in the connection URL.

func (SecretsMountRedshiftOutput) UsernameTemplate

func (o SecretsMountRedshiftOutput) UsernameTemplate() pulumi.StringPtrOutput

[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.

func (SecretsMountRedshiftOutput) VerifyConnection

func (o SecretsMountRedshiftOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountSnowflake

type SecretsMountSnowflake struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles []string `pulumi:"allowedRoles"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl *string `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data map[string]interface{} `pulumi:"data"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections *int `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections *int `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name string `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password *string `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName *string `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements []string `pulumi:"rootRotationStatements"`
	// The root credential username used in the connection URL.
	Username *string `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate *string `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection *bool `pulumi:"verifyConnection"`
}

type SecretsMountSnowflakeArgs

type SecretsMountSnowflakeArgs struct {
	// A list of roles that are allowed to use this
	// connection.
	AllowedRoles pulumi.StringArrayInput `pulumi:"allowedRoles"`
	// Specifies the Redshift DSN.
	// See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
	ConnectionUrl pulumi.StringPtrInput `pulumi:"connectionUrl"`
	// A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
	//
	// Supported list of database secrets engines that can be configured:
	Data pulumi.MapInput `pulumi:"data"`
	// The maximum amount of time a connection may be reused.
	MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"`
	// The maximum number of idle connections to
	// the database.
	MaxIdleConnections pulumi.IntPtrInput `pulumi:"maxIdleConnections"`
	// The maximum number of open connections to
	// the database.
	MaxOpenConnections pulumi.IntPtrInput `pulumi:"maxOpenConnections"`
	// Name of the database connection.
	Name pulumi.StringInput `pulumi:"name"`
	// The root credential password used in the connection URL.
	Password pulumi.StringPtrInput `pulumi:"password"`
	// Specifies the name of the plugin to use.
	PluginName pulumi.StringPtrInput `pulumi:"pluginName"`
	// A list of database statements to be executed to rotate the root user's credentials.
	RootRotationStatements pulumi.StringArrayInput `pulumi:"rootRotationStatements"`
	// The root credential username used in the connection URL.
	Username pulumi.StringPtrInput `pulumi:"username"`
	// [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
	UsernameTemplate pulumi.StringPtrInput `pulumi:"usernameTemplate"`
	// Whether the connection should be verified on
	// initial configuration or not.
	VerifyConnection pulumi.BoolPtrInput `pulumi:"verifyConnection"`
}

func (SecretsMountSnowflakeArgs) ElementType

func (SecretsMountSnowflakeArgs) ElementType() reflect.Type

func (SecretsMountSnowflakeArgs) ToSecretsMountSnowflakeOutput

func (i SecretsMountSnowflakeArgs) ToSecretsMountSnowflakeOutput() SecretsMountSnowflakeOutput

func (SecretsMountSnowflakeArgs) ToSecretsMountSnowflakeOutputWithContext

func (i SecretsMountSnowflakeArgs) ToSecretsMountSnowflakeOutputWithContext(ctx context.Context) SecretsMountSnowflakeOutput

type SecretsMountSnowflakeArray

type SecretsMountSnowflakeArray []SecretsMountSnowflakeInput

func (SecretsMountSnowflakeArray) ElementType

func (SecretsMountSnowflakeArray) ElementType() reflect.Type

func (SecretsMountSnowflakeArray) ToSecretsMountSnowflakeArrayOutput

func (i SecretsMountSnowflakeArray) ToSecretsMountSnowflakeArrayOutput() SecretsMountSnowflakeArrayOutput

func (SecretsMountSnowflakeArray) ToSecretsMountSnowflakeArrayOutputWithContext

func (i SecretsMountSnowflakeArray) ToSecretsMountSnowflakeArrayOutputWithContext(ctx context.Context) SecretsMountSnowflakeArrayOutput

type SecretsMountSnowflakeArrayInput

type SecretsMountSnowflakeArrayInput interface {
	pulumi.Input

	ToSecretsMountSnowflakeArrayOutput() SecretsMountSnowflakeArrayOutput
	ToSecretsMountSnowflakeArrayOutputWithContext(context.Context) SecretsMountSnowflakeArrayOutput
}

SecretsMountSnowflakeArrayInput is an input type that accepts SecretsMountSnowflakeArray and SecretsMountSnowflakeArrayOutput values. You can construct a concrete instance of `SecretsMountSnowflakeArrayInput` via:

SecretsMountSnowflakeArray{ SecretsMountSnowflakeArgs{...} }

type SecretsMountSnowflakeArrayOutput

type SecretsMountSnowflakeArrayOutput struct{ *pulumi.OutputState }

func (SecretsMountSnowflakeArrayOutput) ElementType

func (SecretsMountSnowflakeArrayOutput) Index

func (SecretsMountSnowflakeArrayOutput) ToSecretsMountSnowflakeArrayOutput

func (o SecretsMountSnowflakeArrayOutput) ToSecretsMountSnowflakeArrayOutput() SecretsMountSnowflakeArrayOutput

func (SecretsMountSnowflakeArrayOutput) ToSecretsMountSnowflakeArrayOutputWithContext

func (o SecretsMountSnowflakeArrayOutput) ToSecretsMountSnowflakeArrayOutputWithContext(ctx context.Context) SecretsMountSnowflakeArrayOutput

type SecretsMountSnowflakeInput

type SecretsMountSnowflakeInput interface {
	pulumi.Input

	ToSecretsMountSnowflakeOutput() SecretsMountSnowflakeOutput
	ToSecretsMountSnowflakeOutputWithContext(context.Context) SecretsMountSnowflakeOutput
}

SecretsMountSnowflakeInput is an input type that accepts SecretsMountSnowflakeArgs and SecretsMountSnowflakeOutput values. You can construct a concrete instance of `SecretsMountSnowflakeInput` via:

SecretsMountSnowflakeArgs{...}

type SecretsMountSnowflakeOutput

type SecretsMountSnowflakeOutput struct{ *pulumi.OutputState }

func (SecretsMountSnowflakeOutput) AllowedRoles

A list of roles that are allowed to use this connection.

func (SecretsMountSnowflakeOutput) ConnectionUrl

Specifies the Redshift DSN. See [Vault docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)

func (SecretsMountSnowflakeOutput) Data

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Supported list of database secrets engines that can be configured:

func (SecretsMountSnowflakeOutput) ElementType

func (SecretsMountSnowflakeOutput) MaxConnectionLifetime

func (o SecretsMountSnowflakeOutput) MaxConnectionLifetime() pulumi.IntPtrOutput

The maximum amount of time a connection may be reused.

func (SecretsMountSnowflakeOutput) MaxIdleConnections

func (o SecretsMountSnowflakeOutput) MaxIdleConnections() pulumi.IntPtrOutput

The maximum number of idle connections to the database.

func (SecretsMountSnowflakeOutput) MaxOpenConnections

func (o SecretsMountSnowflakeOutput) MaxOpenConnections() pulumi.IntPtrOutput

The maximum number of open connections to the database.

func (SecretsMountSnowflakeOutput) Name

Name of the database connection.

func (SecretsMountSnowflakeOutput) Password

The root credential password used in the connection URL.

func (SecretsMountSnowflakeOutput) PluginName

Specifies the name of the plugin to use.

func (SecretsMountSnowflakeOutput) RootRotationStatements

func (o SecretsMountSnowflakeOutput) RootRotationStatements() pulumi.StringArrayOutput

A list of database statements to be executed to rotate the root user's credentials.

func (SecretsMountSnowflakeOutput) ToSecretsMountSnowflakeOutput

func (o SecretsMountSnowflakeOutput) ToSecretsMountSnowflakeOutput() SecretsMountSnowflakeOutput

func (SecretsMountSnowflakeOutput) ToSecretsMountSnowflakeOutputWithContext

func (o SecretsMountSnowflakeOutput) ToSecretsMountSnowflakeOutputWithContext(ctx context.Context) SecretsMountSnowflakeOutput

func (SecretsMountSnowflakeOutput) Username

The root credential username used in the connection URL.

func (SecretsMountSnowflakeOutput) UsernameTemplate

func (o SecretsMountSnowflakeOutput) UsernameTemplate() pulumi.StringPtrOutput

[Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.

func (SecretsMountSnowflakeOutput) VerifyConnection

func (o SecretsMountSnowflakeOutput) VerifyConnection() pulumi.BoolPtrOutput

Whether the connection should be verified on initial configuration or not.

type SecretsMountState

type SecretsMountState struct {
	// Accessor of the mount
	Accessor pulumi.StringPtrInput
	// Set of managed key registry entry names that the mount in question is allowed to access
	//
	// The following arguments are common to all database engines:
	AllowedManagedKeys pulumi.StringArrayInput
	// Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
	AuditNonHmacRequestKeys pulumi.StringArrayInput
	// Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
	AuditNonHmacResponseKeys pulumi.StringArrayInput
	// A nested block containing configuration options for Cassandra connections.\
	// *See Configuration Options for more info*
	Cassandras SecretsMountCassandraArrayInput
	// A nested block containing configuration options for Couchbase connections.\
	// *See Configuration Options for more info*
	Couchbases SecretsMountCouchbaseArrayInput
	// Default lease duration for tokens and secrets in seconds
	DefaultLeaseTtlSeconds pulumi.IntPtrInput
	// Human-friendly description of the mount
	Description pulumi.StringPtrInput
	// A nested block containing configuration options for Elasticsearch connections.\
	// *See Configuration Options for more info*
	Elasticsearches SecretsMountElasticsearchArrayInput
	// The total number of database secrets engines configured.
	EngineCount pulumi.IntPtrInput
	// Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
	ExternalEntropyAccess pulumi.BoolPtrInput
	// A nested block containing configuration options for SAP HanaDB connections.\
	// *See Configuration Options for more info*
	Hanas SecretsMountHanaArrayInput
	// A nested block containing configuration options for InfluxDB connections.\
	// *See Configuration Options for more info*
	Influxdbs SecretsMountInfluxdbArrayInput
	// Boolean flag that can be explicitly set to true to enforce local mount in HA environment
	Local pulumi.BoolPtrInput
	// Maximum possible lease duration for tokens and secrets in seconds
	MaxLeaseTtlSeconds pulumi.IntPtrInput
	// A nested block containing configuration options for MongoDB Atlas connections.\
	// *See Configuration Options for more info*
	Mongodbatlas SecretsMountMongodbatlaArrayInput
	// A nested block containing configuration options for MongoDB connections.\
	// *See Configuration Options for more info*
	Mongodbs SecretsMountMongodbArrayInput
	// A nested block containing configuration options for MSSQL connections.\
	// *See Configuration Options for more info*
	Mssqls SecretsMountMssqlArrayInput
	// A nested block containing configuration options for Aurora MySQL connections.\
	// *See Configuration Options for more info*
	MysqlAuroras SecretsMountMysqlAuroraArrayInput
	// A nested block containing configuration options for legacy MySQL connections.\
	// *See Configuration Options for more info*
	MysqlLegacies SecretsMountMysqlLegacyArrayInput
	// A nested block containing configuration options for RDS MySQL connections.\
	// *See Configuration Options for more info*
	MysqlRds SecretsMountMysqlRdArrayInput
	// A nested block containing configuration options for MySQL connections.\
	// *See Configuration Options for more info*
	Mysqls SecretsMountMysqlArrayInput
	// Target namespace. (requires Enterprise)
	Namespace pulumi.StringPtrInput
	// Specifies mount type specific options that are passed to the backend
	Options pulumi.MapInput
	// A nested block containing configuration options for Oracle connections.\
	// *See Configuration Options for more info*
	Oracles SecretsMountOracleArrayInput
	// Where the secret backend will be mounted
	Path pulumi.StringPtrInput
	// A nested block containing configuration options for PostgreSQL connections.\
	// *See Configuration Options for more info*
	Postgresqls SecretsMountPostgresqlArrayInput
	// A nested block containing configuration options for Redis connections.\
	// *See Configuration Options for more info*
	Redis SecretsMountRediArrayInput
	// A nested block containing configuration options for Redis ElastiCache connections.\
	// *See Configuration Options for more info*
	RedisElasticaches SecretsMountRedisElasticachArrayInput
	// A nested block containing configuration options for AWS Redshift connections.\
	// *See Configuration Options for more info*
	Redshifts SecretsMountRedshiftArrayInput
	// Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
	SealWrap pulumi.BoolPtrInput
	// A nested block containing configuration options for Snowflake connections.\
	// *See Configuration Options for more info*
	Snowflakes SecretsMountSnowflakeArrayInput
}

func (SecretsMountState) ElementType

func (SecretsMountState) ElementType() reflect.Type

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL