@pulumi/vault 6.3.0 → 6.4.0-alpha.1723820369

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (39) hide show
  1. package/aws/authBackendLogin.d.ts +2 -2
  2. package/config/uiCustomMessage.d.ts +3 -3
  3. package/database/secretBackendConnection.d.ts +3 -3
  4. package/database/secretBackendRole.d.ts +3 -3
  5. package/database/secretsMount.d.ts +3 -3
  6. package/generic/getSecret.d.ts +1 -1
  7. package/generic/secret.d.ts +2 -2
  8. package/getNamespace.d.ts +1 -1
  9. package/getRaftAutopilotState.d.ts +3 -3
  10. package/identity/getEntity.d.ts +1 -1
  11. package/identity/getGroup.d.ts +2 -2
  12. package/identity/getOidcPublicKeys.d.ts +1 -1
  13. package/jwt/authBackendRole.d.ts +6 -6
  14. package/kubernetes/secretBackend.d.ts +3 -3
  15. package/kv/getSecret.d.ts +1 -1
  16. package/kv/getSecretSubkeysV2.d.ts +1 -1
  17. package/kv/getSecretV2.d.ts +2 -2
  18. package/kv/secret.d.ts +2 -2
  19. package/kv/secretV2.d.ts +7 -7
  20. package/ldap/secretBackend.d.ts +3 -3
  21. package/mount.d.ts +4 -4
  22. package/mount.js +1 -1
  23. package/namespace.d.ts +3 -3
  24. package/package.json +2 -2
  25. package/pkisecret/backendConfigEst.d.ts +3 -3
  26. package/pkisecret/getBackendConfigEst.d.ts +1 -1
  27. package/pkisecret/getBackendIssuers.d.ts +1 -1
  28. package/pkisecret/getBackendKeys.d.ts +1 -1
  29. package/saml/authBackendRole.d.ts +3 -3
  30. package/secrets/syncAwsDestination.d.ts +3 -3
  31. package/secrets/syncAzureDestination.d.ts +3 -3
  32. package/secrets/syncGcpDestination.d.ts +3 -3
  33. package/ssh/secretBackendRole.d.ts +6 -6
  34. package/transform/getDecode.d.ts +6 -6
  35. package/transform/getEncode.d.ts +6 -6
  36. package/transform/template.d.ts +3 -3
  37. package/transit/secretBackendKey.d.ts +2 -2
  38. package/types/input.d.ts +21 -21
  39. package/types/output.d.ts +24 -24
@@ -74,7 +74,7 @@ export declare class AuthBackendLogin extends pulumi.CustomResource {
74
74
  * authentication used to generate this token.
75
75
  */
76
76
  readonly metadata: pulumi.Output<{
77
- [key: string]: any;
77
+ [key: string]: string;
78
78
  }>;
79
79
  /**
80
80
  * The namespace to provision the resource in.
@@ -181,7 +181,7 @@ export interface AuthBackendLoginState {
181
181
  * authentication used to generate this token.
182
182
  */
183
183
  metadata?: pulumi.Input<{
184
- [key: string]: any;
184
+ [key: string]: pulumi.Input<string>;
185
185
  }>;
186
186
  /**
187
187
  * The namespace to provision the resource in.
@@ -41,7 +41,7 @@ export declare class UiCustomMessage extends pulumi.CustomResource {
41
41
  * A map containing additional options for the custom message
42
42
  */
43
43
  readonly options: pulumi.Output<{
44
- [key: string]: any;
44
+ [key: string]: string;
45
45
  } | undefined>;
46
46
  /**
47
47
  * The starting time of the active period of the custom message
@@ -92,7 +92,7 @@ export interface UiCustomMessageState {
92
92
  * A map containing additional options for the custom message
93
93
  */
94
94
  options?: pulumi.Input<{
95
- [key: string]: any;
95
+ [key: string]: pulumi.Input<string>;
96
96
  }>;
97
97
  /**
98
98
  * The starting time of the active period of the custom message
@@ -135,7 +135,7 @@ export interface UiCustomMessageArgs {
135
135
  * A map containing additional options for the custom message
136
136
  */
137
137
  options?: pulumi.Input<{
138
- [key: string]: any;
138
+ [key: string]: pulumi.Input<string>;
139
139
  }>;
140
140
  /**
141
141
  * The starting time of the active period of the custom message
@@ -70,7 +70,7 @@ export declare class SecretBackendConnection extends pulumi.CustomResource {
70
70
  * A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
71
71
  */
72
72
  readonly data: pulumi.Output<{
73
- [key: string]: any;
73
+ [key: string]: string;
74
74
  } | undefined>;
75
75
  /**
76
76
  * A nested block containing configuration options for Elasticsearch connections.
@@ -196,7 +196,7 @@ export interface SecretBackendConnectionState {
196
196
  * A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
197
197
  */
198
198
  data?: pulumi.Input<{
199
- [key: string]: any;
199
+ [key: string]: pulumi.Input<string>;
200
200
  }>;
201
201
  /**
202
202
  * A nested block containing configuration options for Elasticsearch connections.
@@ -314,7 +314,7 @@ export interface SecretBackendConnectionArgs {
314
314
  * A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
315
315
  */
316
316
  data?: pulumi.Input<{
317
- [key: string]: any;
317
+ [key: string]: pulumi.Input<string>;
318
318
  }>;
319
319
  /**
320
320
  * A nested block containing configuration options for Elasticsearch connections.
@@ -69,7 +69,7 @@ export declare class SecretBackendRole extends pulumi.CustomResource {
69
69
  * The following options are available for each `credentialType` value:
70
70
  */
71
71
  readonly credentialConfig: pulumi.Output<{
72
- [key: string]: any;
72
+ [key: string]: string;
73
73
  } | undefined>;
74
74
  /**
75
75
  * Specifies the type of credential that
@@ -147,7 +147,7 @@ export interface SecretBackendRoleState {
147
147
  * The following options are available for each `credentialType` value:
148
148
  */
149
149
  credentialConfig?: pulumi.Input<{
150
- [key: string]: any;
150
+ [key: string]: pulumi.Input<string>;
151
151
  }>;
152
152
  /**
153
153
  * Specifies the type of credential that
@@ -217,7 +217,7 @@ export interface SecretBackendRoleArgs {
217
217
  * The following options are available for each `credentialType` value:
218
218
  */
219
219
  credentialConfig?: pulumi.Input<{
220
- [key: string]: any;
220
+ [key: string]: pulumi.Input<string>;
221
221
  }>;
222
222
  /**
223
223
  * Specifies the type of credential that
@@ -197,7 +197,7 @@ export declare class SecretsMount extends pulumi.CustomResource {
197
197
  * Specifies mount type specific options that are passed to the backend
198
198
  */
199
199
  readonly options: pulumi.Output<{
200
- [key: string]: any;
200
+ [key: string]: string;
201
201
  } | undefined>;
202
202
  /**
203
203
  * A nested block containing configuration options for Oracle connections.
@@ -384,7 +384,7 @@ export interface SecretsMountState {
384
384
  * Specifies mount type specific options that are passed to the backend
385
385
  */
386
386
  options?: pulumi.Input<{
387
- [key: string]: any;
387
+ [key: string]: pulumi.Input<string>;
388
388
  }>;
389
389
  /**
390
390
  * A nested block containing configuration options for Oracle connections.
@@ -555,7 +555,7 @@ export interface SecretsMountArgs {
555
555
  * Specifies mount type specific options that are passed to the backend
556
556
  */
557
557
  options?: pulumi.Input<{
558
- [key: string]: any;
558
+ [key: string]: pulumi.Input<string>;
559
559
  }>;
560
560
  /**
561
561
  * A nested block containing configuration options for Oracle connections.
@@ -79,7 +79,7 @@ export interface GetSecretResult {
79
79
  * serialized as JSON.
80
80
  */
81
81
  readonly data: {
82
- [key: string]: any;
82
+ [key: string]: string;
83
83
  };
84
84
  /**
85
85
  * A string containing the full data payload retrieved from
@@ -31,7 +31,7 @@ export declare class Secret extends pulumi.CustomResource {
31
31
  * serialized as JSON.
32
32
  */
33
33
  readonly data: pulumi.Output<{
34
- [key: string]: any;
34
+ [key: string]: string;
35
35
  }>;
36
36
  /**
37
37
  * String containing a JSON-encoded object that will be
@@ -86,7 +86,7 @@ export interface SecretState {
86
86
  * serialized as JSON.
87
87
  */
88
88
  data?: pulumi.Input<{
89
- [key: string]: any;
89
+ [key: string]: pulumi.Input<string>;
90
90
  }>;
91
91
  /**
92
92
  * String containing a JSON-encoded object that will be
package/getNamespace.d.ts CHANGED
@@ -66,7 +66,7 @@ export interface GetNamespaceResult {
66
66
  * *Requires Vault 1.12+.*
67
67
  */
68
68
  readonly customMetadata: {
69
- [key: string]: any;
69
+ [key: string]: string;
70
70
  };
71
71
  /**
72
72
  * The provider-assigned unique ID for this managed resource.
@@ -56,7 +56,7 @@ export interface GetRaftAutopilotStateResult {
56
56
  * Additional output related to redundancy zones stored as a serialized map of strings.
57
57
  */
58
58
  readonly redundancyZones: {
59
- [key: string]: any;
59
+ [key: string]: string;
60
60
  };
61
61
  /**
62
62
  * Additional output related to redundancy zones.
@@ -66,7 +66,7 @@ export interface GetRaftAutopilotStateResult {
66
66
  * Additionaly output related to servers in the cluster stored as a serialized map of strings.
67
67
  */
68
68
  readonly servers: {
69
- [key: string]: any;
69
+ [key: string]: string;
70
70
  };
71
71
  /**
72
72
  * Additionaly output related to servers in the cluster.
@@ -76,7 +76,7 @@ export interface GetRaftAutopilotStateResult {
76
76
  * Additional output related to upgrade information stored as a serialized map of strings.
77
77
  */
78
78
  readonly upgradeInfo: {
79
- [key: string]: any;
79
+ [key: string]: string;
80
80
  };
81
81
  /**
82
82
  * Additional output related to upgrade information.
@@ -108,7 +108,7 @@ export interface GetEntityResult {
108
108
  * Arbitrary metadata
109
109
  */
110
110
  readonly metadata: {
111
- [key: string]: any;
111
+ [key: string]: string;
112
112
  };
113
113
  readonly namespace?: string;
114
114
  /**
@@ -78,7 +78,7 @@ export interface GetGroupResult {
78
78
  * Arbitrary metadata
79
79
  */
80
80
  readonly aliasMetadata: {
81
- [key: string]: any;
81
+ [key: string]: string;
82
82
  };
83
83
  readonly aliasMountAccessor: string;
84
84
  /**
@@ -121,7 +121,7 @@ export interface GetGroupResult {
121
121
  * Arbitrary metadata
122
122
  */
123
123
  readonly metadata: {
124
- [key: string]: any;
124
+ [key: string]: string;
125
125
  };
126
126
  /**
127
127
  * Modify index of the group
@@ -62,7 +62,7 @@ export interface GetOidcPublicKeysResult {
62
62
  * Clients can use them to validate the authenticity of an identity token.
63
63
  */
64
64
  readonly keys: {
65
- [key: string]: any;
65
+ [key: string]: string;
66
66
  }[];
67
67
  readonly name: string;
68
68
  readonly namespace?: string;
@@ -99,7 +99,7 @@ export declare class AuthBackendRole extends pulumi.CustomResource {
99
99
  * comma-separated values, e.g. `"red"` or `"red,green,blue"`.
100
100
  */
101
101
  readonly boundClaims: pulumi.Output<{
102
- [key: string]: any;
102
+ [key: string]: string;
103
103
  } | undefined>;
104
104
  /**
105
105
  * How to interpret values in the claims/values
@@ -117,7 +117,7 @@ export declare class AuthBackendRole extends pulumi.CustomResource {
117
117
  * to specified metadata fields (values).
118
118
  */
119
119
  readonly claimMappings: pulumi.Output<{
120
- [key: string]: any;
120
+ [key: string]: string;
121
121
  } | undefined>;
122
122
  /**
123
123
  * The amount of leeway to add to all claims to account for clock skew, in
@@ -262,7 +262,7 @@ export interface AuthBackendRoleState {
262
262
  * comma-separated values, e.g. `"red"` or `"red,green,blue"`.
263
263
  */
264
264
  boundClaims?: pulumi.Input<{
265
- [key: string]: any;
265
+ [key: string]: pulumi.Input<string>;
266
266
  }>;
267
267
  /**
268
268
  * How to interpret values in the claims/values
@@ -280,7 +280,7 @@ export interface AuthBackendRoleState {
280
280
  * to specified metadata fields (values).
281
281
  */
282
282
  claimMappings?: pulumi.Input<{
283
- [key: string]: any;
283
+ [key: string]: pulumi.Input<string>;
284
284
  }>;
285
285
  /**
286
286
  * The amount of leeway to add to all claims to account for clock skew, in
@@ -417,7 +417,7 @@ export interface AuthBackendRoleArgs {
417
417
  * comma-separated values, e.g. `"red"` or `"red,green,blue"`.
418
418
  */
419
419
  boundClaims?: pulumi.Input<{
420
- [key: string]: any;
420
+ [key: string]: pulumi.Input<string>;
421
421
  }>;
422
422
  /**
423
423
  * How to interpret values in the claims/values
@@ -435,7 +435,7 @@ export interface AuthBackendRoleArgs {
435
435
  * to specified metadata fields (values).
436
436
  */
437
437
  claimMappings?: pulumi.Input<{
438
- [key: string]: any;
438
+ [key: string]: pulumi.Input<string>;
439
439
  }>;
440
440
  /**
441
441
  * The amount of leeway to add to all claims to account for clock skew, in
@@ -128,7 +128,7 @@ export declare class SecretBackend extends pulumi.CustomResource {
128
128
  * Specifies mount type specific options that are passed to the backend
129
129
  */
130
130
  readonly options: pulumi.Output<{
131
- [key: string]: any;
131
+ [key: string]: string;
132
132
  } | undefined>;
133
133
  /**
134
134
  * List of headers to allow and pass from the request to the plugin
@@ -246,7 +246,7 @@ export interface SecretBackendState {
246
246
  * Specifies mount type specific options that are passed to the backend
247
247
  */
248
248
  options?: pulumi.Input<{
249
- [key: string]: any;
249
+ [key: string]: pulumi.Input<string>;
250
250
  }>;
251
251
  /**
252
252
  * List of headers to allow and pass from the request to the plugin
@@ -352,7 +352,7 @@ export interface SecretBackendArgs {
352
352
  * Specifies mount type specific options that are passed to the backend
353
353
  */
354
354
  options?: pulumi.Input<{
355
- [key: string]: any;
355
+ [key: string]: pulumi.Input<string>;
356
356
  }>;
357
357
  /**
358
358
  * List of headers to allow and pass from the request to the plugin
package/kv/getSecret.d.ts CHANGED
@@ -58,7 +58,7 @@ export interface GetSecretResult {
58
58
  * serialized as JSON.
59
59
  */
60
60
  readonly data: {
61
- [key: string]: any;
61
+ [key: string]: string;
62
62
  };
63
63
  /**
64
64
  * JSON-encoded string that that is
@@ -76,7 +76,7 @@ export interface GetSecretSubkeysV2Result {
76
76
  * Subkeys for the KV-V2 secret stored as a serialized map of strings.
77
77
  */
78
78
  readonly data: {
79
- [key: string]: any;
79
+ [key: string]: string;
80
80
  };
81
81
  /**
82
82
  * Subkeys for the KV-V2 secret read from Vault.
@@ -74,7 +74,7 @@ export interface GetSecretV2Result {
74
74
  * Custom metadata for the secret.
75
75
  */
76
76
  readonly customMetadata: {
77
- [key: string]: any;
77
+ [key: string]: string;
78
78
  };
79
79
  /**
80
80
  * A mapping whose keys are the top-level data keys returned from
@@ -83,7 +83,7 @@ export interface GetSecretV2Result {
83
83
  * serialized as JSON.
84
84
  */
85
85
  readonly data: {
86
- [key: string]: any;
86
+ [key: string]: string;
87
87
  };
88
88
  /**
89
89
  * JSON-encoded string that that is
package/kv/secret.d.ts CHANGED
@@ -66,7 +66,7 @@ export declare class Secret extends pulumi.CustomResource {
66
66
  * serialized as JSON.
67
67
  */
68
68
  readonly data: pulumi.Output<{
69
- [key: string]: any;
69
+ [key: string]: string;
70
70
  }>;
71
71
  /**
72
72
  * JSON-encoded string that will be
@@ -104,7 +104,7 @@ export interface SecretState {
104
104
  * serialized as JSON.
105
105
  */
106
106
  data?: pulumi.Input<{
107
- [key: string]: any;
107
+ [key: string]: pulumi.Input<string>;
108
108
  }>;
109
109
  /**
110
110
  * JSON-encoded string that will be
package/kv/secretV2.d.ts CHANGED
@@ -103,7 +103,7 @@ export declare class SecretV2 extends pulumi.CustomResource {
103
103
  * serialized as JSON.
104
104
  */
105
105
  readonly data: pulumi.Output<{
106
- [key: string]: any;
106
+ [key: string]: string;
107
107
  }>;
108
108
  /**
109
109
  * JSON-encoded string that will be
@@ -124,7 +124,7 @@ export declare class SecretV2 extends pulumi.CustomResource {
124
124
  * Metadata associated with this secret read from Vault.
125
125
  */
126
126
  readonly metadata: pulumi.Output<{
127
- [key: string]: any;
127
+ [key: string]: string;
128
128
  }>;
129
129
  /**
130
130
  * Path where KV-V2 engine is mounted.
@@ -148,7 +148,7 @@ export declare class SecretV2 extends pulumi.CustomResource {
148
148
  * An object that holds option settings.
149
149
  */
150
150
  readonly options: pulumi.Output<{
151
- [key: string]: any;
151
+ [key: string]: string;
152
152
  } | undefined>;
153
153
  /**
154
154
  * Full path where the KV-V2 secret will be written.
@@ -187,7 +187,7 @@ export interface SecretV2State {
187
187
  * serialized as JSON.
188
188
  */
189
189
  data?: pulumi.Input<{
190
- [key: string]: any;
190
+ [key: string]: pulumi.Input<string>;
191
191
  }>;
192
192
  /**
193
193
  * JSON-encoded string that will be
@@ -208,7 +208,7 @@ export interface SecretV2State {
208
208
  * Metadata associated with this secret read from Vault.
209
209
  */
210
210
  metadata?: pulumi.Input<{
211
- [key: string]: any;
211
+ [key: string]: pulumi.Input<string>;
212
212
  }>;
213
213
  /**
214
214
  * Path where KV-V2 engine is mounted.
@@ -232,7 +232,7 @@ export interface SecretV2State {
232
232
  * An object that holds option settings.
233
233
  */
234
234
  options?: pulumi.Input<{
235
- [key: string]: any;
235
+ [key: string]: pulumi.Input<string>;
236
236
  }>;
237
237
  /**
238
238
  * Full path where the KV-V2 secret will be written.
@@ -293,6 +293,6 @@ export interface SecretV2Args {
293
293
  * An object that holds option settings.
294
294
  */
295
295
  options?: pulumi.Input<{
296
- [key: string]: any;
296
+ [key: string]: pulumi.Input<string>;
297
297
  }>;
298
298
  }
@@ -139,7 +139,7 @@ export declare class SecretBackend extends pulumi.CustomResource {
139
139
  * Specifies mount type specific options that are passed to the backend
140
140
  */
141
141
  readonly options: pulumi.Output<{
142
- [key: string]: any;
142
+ [key: string]: string;
143
143
  } | undefined>;
144
144
  /**
145
145
  * List of headers to allow and pass from the request to the plugin
@@ -309,7 +309,7 @@ export interface SecretBackendState {
309
309
  * Specifies mount type specific options that are passed to the backend
310
310
  */
311
311
  options?: pulumi.Input<{
312
- [key: string]: any;
312
+ [key: string]: pulumi.Input<string>;
313
313
  }>;
314
314
  /**
315
315
  * List of headers to allow and pass from the request to the plugin
@@ -467,7 +467,7 @@ export interface SecretBackendArgs {
467
467
  * Specifies mount type specific options that are passed to the backend
468
468
  */
469
469
  options?: pulumi.Input<{
470
- [key: string]: any;
470
+ [key: string]: pulumi.Input<string>;
471
471
  }>;
472
472
  /**
473
473
  * List of headers to allow and pass from the request to the plugin
package/mount.d.ts CHANGED
@@ -39,7 +39,7 @@ import * as pulumi from "@pulumi/pulumi";
39
39
  * type: "transit",
40
40
  * description: "This is an example transit secret engine mount",
41
41
  * options: {
42
- * convergent_encryption: false,
42
+ * convergent_encryption: "false",
43
43
  * },
44
44
  * });
45
45
  * ```
@@ -148,7 +148,7 @@ export declare class Mount extends pulumi.CustomResource {
148
148
  * Specifies mount type specific options that are passed to the backend
149
149
  */
150
150
  readonly options: pulumi.Output<{
151
- [key: string]: any;
151
+ [key: string]: string;
152
152
  } | undefined>;
153
153
  /**
154
154
  * List of headers to allow and pass from the request to
@@ -253,7 +253,7 @@ export interface MountState {
253
253
  * Specifies mount type specific options that are passed to the backend
254
254
  */
255
255
  options?: pulumi.Input<{
256
- [key: string]: any;
256
+ [key: string]: pulumi.Input<string>;
257
257
  }>;
258
258
  /**
259
259
  * List of headers to allow and pass from the request to
@@ -346,7 +346,7 @@ export interface MountArgs {
346
346
  * Specifies mount type specific options that are passed to the backend
347
347
  */
348
348
  options?: pulumi.Input<{
349
- [key: string]: any;
349
+ [key: string]: pulumi.Input<string>;
350
350
  }>;
351
351
  /**
352
352
  * List of headers to allow and pass from the request to
package/mount.js CHANGED
@@ -45,7 +45,7 @@ const utilities = require("./utilities");
45
45
  * type: "transit",
46
46
  * description: "This is an example transit secret engine mount",
47
47
  * options: {
48
- * convergent_encryption: false,
48
+ * convergent_encryption: "false",
49
49
  * },
50
50
  * });
51
51
  * ```
package/namespace.d.ts CHANGED
@@ -71,7 +71,7 @@ export declare class Namespace extends pulumi.CustomResource {
71
71
  * is `map[string]string`. Requires Vault version 1.12+.
72
72
  */
73
73
  readonly customMetadata: pulumi.Output<{
74
- [key: string]: any;
74
+ [key: string]: string;
75
75
  }>;
76
76
  /**
77
77
  * The namespace to provision the resource in.
@@ -111,7 +111,7 @@ export interface NamespaceState {
111
111
  * is `map[string]string`. Requires Vault version 1.12+.
112
112
  */
113
113
  customMetadata?: pulumi.Input<{
114
- [key: string]: any;
114
+ [key: string]: pulumi.Input<string>;
115
115
  }>;
116
116
  /**
117
117
  * The namespace to provision the resource in.
@@ -143,7 +143,7 @@ export interface NamespaceArgs {
143
143
  * is `map[string]string`. Requires Vault version 1.12+.
144
144
  */
145
145
  customMetadata?: pulumi.Input<{
146
- [key: string]: any;
146
+ [key: string]: pulumi.Input<string>;
147
147
  }>;
148
148
  /**
149
149
  * The namespace to provision the resource in.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@pulumi/vault",
3
- "version": "6.3.0",
3
+ "version": "6.4.0-alpha.1723820369",
4
4
  "description": "A Pulumi package for creating and managing HashiCorp Vault cloud resources.",
5
5
  "keywords": [
6
6
  "pulumi",
@@ -23,6 +23,6 @@
23
23
  "pulumi": {
24
24
  "resource": true,
25
25
  "name": "vault",
26
- "version": "6.3.0"
26
+ "version": "6.4.0-alpha.1723820369"
27
27
  }
28
28
  }
@@ -65,7 +65,7 @@ export declare class BackendConfigEst extends pulumi.CustomResource {
65
65
  * Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
66
66
  */
67
67
  readonly labelToPathPolicy: pulumi.Output<{
68
- [key: string]: any;
68
+ [key: string]: string;
69
69
  } | undefined>;
70
70
  /**
71
71
  * A read-only timestamp representing the last time the configuration was updated.
@@ -126,7 +126,7 @@ export interface BackendConfigEstState {
126
126
  * Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
127
127
  */
128
128
  labelToPathPolicy?: pulumi.Input<{
129
- [key: string]: any;
129
+ [key: string]: pulumi.Input<string>;
130
130
  }>;
131
131
  /**
132
132
  * A read-only timestamp representing the last time the configuration was updated.
@@ -179,7 +179,7 @@ export interface BackendConfigEstArgs {
179
179
  * Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
180
180
  */
181
181
  labelToPathPolicy?: pulumi.Input<{
182
- [key: string]: any;
182
+ [key: string]: pulumi.Input<string>;
183
183
  }>;
184
184
  /**
185
185
  * The namespace of the target resource.
@@ -72,7 +72,7 @@ export interface GetBackendConfigEstResult {
72
72
  * A pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
73
73
  */
74
74
  readonly labelToPathPolicy: {
75
- [key: string]: any;
75
+ [key: string]: string;
76
76
  };
77
77
  /**
78
78
  * A read-only timestamp representing the last time the configuration was updated.
@@ -54,7 +54,7 @@ export interface GetBackendIssuersResult {
54
54
  * Map of issuer strings read from Vault.
55
55
  */
56
56
  readonly keyInfo: {
57
- [key: string]: any;
57
+ [key: string]: string;
58
58
  };
59
59
  /**
60
60
  * JSON-encoded issuer data read from Vault.
@@ -54,7 +54,7 @@ export interface GetBackendKeysResult {
54
54
  * Map of key strings read from Vault.
55
55
  */
56
56
  readonly keyInfo: {
57
- [key: string]: any;
57
+ [key: string]: string;
58
58
  };
59
59
  /**
60
60
  * JSON-encoded key data read from Vault.
@@ -59,7 +59,7 @@ export declare class AuthBackendRole extends pulumi.CustomResource {
59
59
  * exist in the SAML assertion.
60
60
  */
61
61
  readonly boundAttributes: pulumi.Output<{
62
- [key: string]: any;
62
+ [key: string]: string;
63
63
  } | undefined>;
64
64
  /**
65
65
  * The type of matching assertion to perform on
@@ -148,7 +148,7 @@ export interface AuthBackendRoleState {
148
148
  * exist in the SAML assertion.
149
149
  */
150
150
  boundAttributes?: pulumi.Input<{
151
- [key: string]: any;
151
+ [key: string]: pulumi.Input<string>;
152
152
  }>;
153
153
  /**
154
154
  * The type of matching assertion to perform on
@@ -229,7 +229,7 @@ export interface AuthBackendRoleArgs {
229
229
  * exist in the SAML assertion.
230
230
  */
231
231
  boundAttributes?: pulumi.Input<{
232
- [key: string]: any;
232
+ [key: string]: pulumi.Input<string>;
233
233
  }>;
234
234
  /**
235
235
  * The type of matching assertion to perform on
@@ -54,7 +54,7 @@ export declare class SyncAwsDestination extends pulumi.CustomResource {
54
54
  * Custom tags to set on the secret managed at the destination.
55
55
  */
56
56
  readonly customTags: pulumi.Output<{
57
- [key: string]: any;
57
+ [key: string]: string;
58
58
  } | undefined>;
59
59
  /**
60
60
  * Optional extra protection that must match the trust policy granting access to the
@@ -131,7 +131,7 @@ export interface SyncAwsDestinationState {
131
131
  * Custom tags to set on the secret managed at the destination.
132
132
  */
133
133
  customTags?: pulumi.Input<{
134
- [key: string]: any;
134
+ [key: string]: pulumi.Input<string>;
135
135
  }>;
136
136
  /**
137
137
  * Optional extra protection that must match the trust policy granting access to the
@@ -200,7 +200,7 @@ export interface SyncAwsDestinationArgs {
200
200
  * Custom tags to set on the secret managed at the destination.
201
201
  */
202
202
  customTags?: pulumi.Input<{
203
- [key: string]: any;
203
+ [key: string]: pulumi.Input<string>;
204
204
  }>;
205
205
  /**
206
206
  * Optional extra protection that must match the trust policy granting access to the