pulumi-vault 6.3.0a1723010642__py3-none-any.whl → 6.3.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +560 -0
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +19 -4
  4. pulumi_vault/ad/secret_backend.py +5 -0
  5. pulumi_vault/ad/secret_library.py +5 -0
  6. pulumi_vault/ad/secret_role.py +5 -0
  7. pulumi_vault/alicloud/auth_backend_role.py +5 -0
  8. pulumi_vault/approle/auth_backend_login.py +5 -0
  9. pulumi_vault/approle/auth_backend_role.py +5 -0
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
  11. pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
  12. pulumi_vault/audit.py +5 -0
  13. pulumi_vault/audit_request_header.py +5 -0
  14. pulumi_vault/auth_backend.py +10 -5
  15. pulumi_vault/aws/auth_backend_cert.py +5 -0
  16. pulumi_vault/aws/auth_backend_client.py +5 -0
  17. pulumi_vault/aws/auth_backend_config_identity.py +5 -0
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
  19. pulumi_vault/aws/auth_backend_login.py +12 -7
  20. pulumi_vault/aws/auth_backend_role.py +5 -0
  21. pulumi_vault/aws/auth_backend_role_tag.py +5 -0
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
  23. pulumi_vault/aws/auth_backend_sts_role.py +5 -0
  24. pulumi_vault/aws/get_access_credentials.py +31 -4
  25. pulumi_vault/aws/get_static_access_credentials.py +18 -4
  26. pulumi_vault/aws/secret_backend.py +5 -0
  27. pulumi_vault/aws/secret_backend_role.py +120 -0
  28. pulumi_vault/aws/secret_backend_static_role.py +5 -0
  29. pulumi_vault/azure/_inputs.py +24 -0
  30. pulumi_vault/azure/auth_backend_config.py +5 -0
  31. pulumi_vault/azure/auth_backend_role.py +5 -0
  32. pulumi_vault/azure/backend.py +5 -0
  33. pulumi_vault/azure/backend_role.py +23 -18
  34. pulumi_vault/azure/get_access_credentials.py +36 -4
  35. pulumi_vault/azure/outputs.py +5 -0
  36. pulumi_vault/cert_auth_backend_role.py +5 -0
  37. pulumi_vault/config/__init__.pyi +5 -0
  38. pulumi_vault/config/_inputs.py +21 -0
  39. pulumi_vault/config/outputs.py +5 -0
  40. pulumi_vault/config/ui_custom_message.py +24 -19
  41. pulumi_vault/config/vars.py +5 -0
  42. pulumi_vault/consul/secret_backend.py +5 -0
  43. pulumi_vault/consul/secret_backend_role.py +5 -0
  44. pulumi_vault/database/_inputs.py +2091 -140
  45. pulumi_vault/database/outputs.py +59 -54
  46. pulumi_vault/database/secret_backend_connection.py +115 -110
  47. pulumi_vault/database/secret_backend_role.py +25 -20
  48. pulumi_vault/database/secret_backend_static_role.py +11 -6
  49. pulumi_vault/database/secrets_mount.py +139 -134
  50. pulumi_vault/egp_policy.py +5 -0
  51. pulumi_vault/gcp/_inputs.py +111 -0
  52. pulumi_vault/gcp/auth_backend.py +15 -10
  53. pulumi_vault/gcp/auth_backend_role.py +5 -0
  54. pulumi_vault/gcp/get_auth_backend_role.py +42 -4
  55. pulumi_vault/gcp/outputs.py +5 -0
  56. pulumi_vault/gcp/secret_backend.py +5 -0
  57. pulumi_vault/gcp/secret_impersonated_account.py +5 -0
  58. pulumi_vault/gcp/secret_roleset.py +18 -13
  59. pulumi_vault/gcp/secret_static_account.py +18 -13
  60. pulumi_vault/generic/endpoint.py +5 -0
  61. pulumi_vault/generic/get_secret.py +25 -5
  62. pulumi_vault/generic/secret.py +12 -7
  63. pulumi_vault/get_auth_backend.py +21 -4
  64. pulumi_vault/get_auth_backends.py +16 -4
  65. pulumi_vault/get_namespace.py +18 -5
  66. pulumi_vault/get_namespaces.py +13 -4
  67. pulumi_vault/get_nomad_access_token.py +28 -8
  68. pulumi_vault/get_policy_document.py +27 -16
  69. pulumi_vault/get_raft_autopilot_state.py +26 -7
  70. pulumi_vault/github/_inputs.py +55 -0
  71. pulumi_vault/github/auth_backend.py +10 -5
  72. pulumi_vault/github/outputs.py +5 -0
  73. pulumi_vault/github/team.py +5 -0
  74. pulumi_vault/github/user.py +5 -0
  75. pulumi_vault/identity/entity.py +5 -0
  76. pulumi_vault/identity/entity_alias.py +5 -0
  77. pulumi_vault/identity/entity_policies.py +5 -0
  78. pulumi_vault/identity/get_entity.py +37 -7
  79. pulumi_vault/identity/get_group.py +42 -6
  80. pulumi_vault/identity/get_oidc_client_creds.py +16 -4
  81. pulumi_vault/identity/get_oidc_openid_config.py +26 -4
  82. pulumi_vault/identity/get_oidc_public_keys.py +16 -5
  83. pulumi_vault/identity/group.py +5 -0
  84. pulumi_vault/identity/group_alias.py +5 -0
  85. pulumi_vault/identity/group_member_entity_ids.py +5 -0
  86. pulumi_vault/identity/group_member_group_ids.py +5 -0
  87. pulumi_vault/identity/group_policies.py +5 -0
  88. pulumi_vault/identity/mfa_duo.py +5 -0
  89. pulumi_vault/identity/mfa_login_enforcement.py +5 -0
  90. pulumi_vault/identity/mfa_okta.py +5 -0
  91. pulumi_vault/identity/mfa_pingid.py +5 -0
  92. pulumi_vault/identity/mfa_totp.py +5 -0
  93. pulumi_vault/identity/oidc.py +5 -0
  94. pulumi_vault/identity/oidc_assignment.py +5 -0
  95. pulumi_vault/identity/oidc_client.py +5 -0
  96. pulumi_vault/identity/oidc_key.py +5 -0
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
  98. pulumi_vault/identity/oidc_provider.py +5 -0
  99. pulumi_vault/identity/oidc_role.py +5 -0
  100. pulumi_vault/identity/oidc_scope.py +5 -0
  101. pulumi_vault/identity/outputs.py +8 -3
  102. pulumi_vault/jwt/_inputs.py +55 -0
  103. pulumi_vault/jwt/auth_backend.py +14 -9
  104. pulumi_vault/jwt/auth_backend_role.py +33 -28
  105. pulumi_vault/jwt/outputs.py +5 -0
  106. pulumi_vault/kmip/secret_backend.py +5 -0
  107. pulumi_vault/kmip/secret_role.py +5 -0
  108. pulumi_vault/kmip/secret_scope.py +5 -0
  109. pulumi_vault/kubernetes/auth_backend_config.py +5 -0
  110. pulumi_vault/kubernetes/auth_backend_role.py +5 -0
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
  113. pulumi_vault/kubernetes/get_service_account_token.py +28 -4
  114. pulumi_vault/kubernetes/secret_backend.py +19 -14
  115. pulumi_vault/kubernetes/secret_backend_role.py +5 -0
  116. pulumi_vault/kv/_inputs.py +36 -4
  117. pulumi_vault/kv/get_secret.py +20 -5
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
  119. pulumi_vault/kv/get_secret_v2.py +27 -6
  120. pulumi_vault/kv/get_secrets_list.py +15 -4
  121. pulumi_vault/kv/get_secrets_list_v2.py +18 -4
  122. pulumi_vault/kv/outputs.py +8 -3
  123. pulumi_vault/kv/secret.py +12 -7
  124. pulumi_vault/kv/secret_backend_v2.py +5 -0
  125. pulumi_vault/kv/secret_v2.py +46 -41
  126. pulumi_vault/ldap/auth_backend.py +5 -0
  127. pulumi_vault/ldap/auth_backend_group.py +5 -0
  128. pulumi_vault/ldap/auth_backend_user.py +5 -0
  129. pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
  130. pulumi_vault/ldap/get_static_credentials.py +23 -4
  131. pulumi_vault/ldap/secret_backend.py +19 -14
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
  133. pulumi_vault/ldap/secret_backend_library_set.py +5 -0
  134. pulumi_vault/ldap/secret_backend_static_role.py +5 -0
  135. pulumi_vault/managed/_inputs.py +205 -0
  136. pulumi_vault/managed/keys.py +20 -15
  137. pulumi_vault/managed/outputs.py +5 -0
  138. pulumi_vault/mfa_duo.py +5 -0
  139. pulumi_vault/mfa_okta.py +5 -0
  140. pulumi_vault/mfa_pingid.py +5 -0
  141. pulumi_vault/mfa_totp.py +5 -0
  142. pulumi_vault/mongodbatlas/secret_backend.py +5 -0
  143. pulumi_vault/mongodbatlas/secret_role.py +5 -0
  144. pulumi_vault/mount.py +35 -23
  145. pulumi_vault/namespace.py +19 -14
  146. pulumi_vault/nomad_secret_backend.py +5 -0
  147. pulumi_vault/nomad_secret_role.py +5 -0
  148. pulumi_vault/okta/_inputs.py +39 -0
  149. pulumi_vault/okta/auth_backend.py +31 -26
  150. pulumi_vault/okta/auth_backend_group.py +5 -0
  151. pulumi_vault/okta/auth_backend_user.py +5 -0
  152. pulumi_vault/okta/outputs.py +5 -0
  153. pulumi_vault/outputs.py +5 -0
  154. pulumi_vault/password_policy.py +5 -0
  155. pulumi_vault/pkisecret/_inputs.py +49 -8
  156. pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
  157. pulumi_vault/pkisecret/backend_config_est.py +24 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
  159. pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
  160. pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
  161. pulumi_vault/pkisecret/get_backend_key.py +19 -4
  162. pulumi_vault/pkisecret/get_backend_keys.py +18 -5
  163. pulumi_vault/pkisecret/outputs.py +17 -12
  164. pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
  172. pulumi_vault/pkisecret/secret_backend_key.py +5 -0
  173. pulumi_vault/pkisecret/secret_backend_role.py +10 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
  176. pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
  177. pulumi_vault/plugin.py +5 -0
  178. pulumi_vault/plugin_pinned_version.py +5 -0
  179. pulumi_vault/policy.py +5 -0
  180. pulumi_vault/provider.py +47 -42
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +5 -0
  183. pulumi_vault/quota_rate_limit.py +5 -0
  184. pulumi_vault/rabbitmq/_inputs.py +61 -0
  185. pulumi_vault/rabbitmq/outputs.py +5 -0
  186. pulumi_vault/rabbitmq/secret_backend.py +5 -0
  187. pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
  188. pulumi_vault/raft_autopilot.py +5 -0
  189. pulumi_vault/raft_snapshot_agent_config.py +5 -0
  190. pulumi_vault/rgp_policy.py +5 -0
  191. pulumi_vault/saml/auth_backend.py +5 -0
  192. pulumi_vault/saml/auth_backend_role.py +19 -14
  193. pulumi_vault/secrets/_inputs.py +30 -0
  194. pulumi_vault/secrets/outputs.py +5 -0
  195. pulumi_vault/secrets/sync_association.py +7 -2
  196. pulumi_vault/secrets/sync_aws_destination.py +19 -14
  197. pulumi_vault/secrets/sync_azure_destination.py +19 -14
  198. pulumi_vault/secrets/sync_config.py +5 -0
  199. pulumi_vault/secrets/sync_gcp_destination.py +19 -14
  200. pulumi_vault/secrets/sync_gh_destination.py +5 -0
  201. pulumi_vault/secrets/sync_github_apps.py +5 -0
  202. pulumi_vault/secrets/sync_vercel_destination.py +5 -0
  203. pulumi_vault/ssh/_inputs.py +22 -0
  204. pulumi_vault/ssh/outputs.py +5 -0
  205. pulumi_vault/ssh/secret_backend_ca.py +5 -0
  206. pulumi_vault/ssh/secret_backend_role.py +38 -33
  207. pulumi_vault/terraformcloud/secret_backend.py +5 -0
  208. pulumi_vault/terraformcloud/secret_creds.py +5 -0
  209. pulumi_vault/terraformcloud/secret_role.py +5 -0
  210. pulumi_vault/token.py +5 -0
  211. pulumi_vault/tokenauth/auth_backend_role.py +5 -14
  212. pulumi_vault/transform/alphabet.py +5 -0
  213. pulumi_vault/transform/get_decode.py +38 -14
  214. pulumi_vault/transform/get_encode.py +38 -14
  215. pulumi_vault/transform/role.py +5 -0
  216. pulumi_vault/transform/template.py +19 -14
  217. pulumi_vault/transform/transformation.py +5 -0
  218. pulumi_vault/transit/get_decrypt.py +21 -4
  219. pulumi_vault/transit/get_encrypt.py +23 -4
  220. pulumi_vault/transit/secret_backend_key.py +12 -7
  221. pulumi_vault/transit/secret_cache_config.py +5 -0
  222. {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/METADATA +3 -2
  223. pulumi_vault-6.3.1.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.3.0a1723010642.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -2496,7 +2501,7 @@ class SecretsMountCassandra(dict):
2496
2501
  name: str,
2497
2502
  allowed_roles: Optional[Sequence[str]] = None,
2498
2503
  connect_timeout: Optional[int] = None,
2499
- data: Optional[Mapping[str, Any]] = None,
2504
+ data: Optional[Mapping[str, str]] = None,
2500
2505
  hosts: Optional[Sequence[str]] = None,
2501
2506
  insecure_tls: Optional[bool] = None,
2502
2507
  password: Optional[str] = None,
@@ -2514,7 +2519,7 @@ class SecretsMountCassandra(dict):
2514
2519
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
2515
2520
  connection.
2516
2521
  :param int connect_timeout: The number of seconds to use as a connection timeout.
2517
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2522
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2518
2523
 
2519
2524
  Supported list of database secrets engines that can be configured:
2520
2525
  :param Sequence[str] hosts: Cassandra hosts to connect to.
@@ -2590,7 +2595,7 @@ class SecretsMountCassandra(dict):
2590
2595
 
2591
2596
  @property
2592
2597
  @pulumi.getter
2593
- def data(self) -> Optional[Mapping[str, Any]]:
2598
+ def data(self) -> Optional[Mapping[str, str]]:
2594
2599
  """
2595
2600
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2596
2601
 
@@ -2737,7 +2742,7 @@ class SecretsMountCouchbase(dict):
2737
2742
  allowed_roles: Optional[Sequence[str]] = None,
2738
2743
  base64_pem: Optional[str] = None,
2739
2744
  bucket_name: Optional[str] = None,
2740
- data: Optional[Mapping[str, Any]] = None,
2745
+ data: Optional[Mapping[str, str]] = None,
2741
2746
  insecure_tls: Optional[bool] = None,
2742
2747
  plugin_name: Optional[str] = None,
2743
2748
  root_rotation_statements: Optional[Sequence[str]] = None,
@@ -2753,7 +2758,7 @@ class SecretsMountCouchbase(dict):
2753
2758
  connection.
2754
2759
  :param str base64_pem: Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
2755
2760
  :param str bucket_name: Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
2756
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2761
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2757
2762
 
2758
2763
  Supported list of database secrets engines that can be configured:
2759
2764
  :param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
@@ -2848,7 +2853,7 @@ class SecretsMountCouchbase(dict):
2848
2853
 
2849
2854
  @property
2850
2855
  @pulumi.getter
2851
- def data(self) -> Optional[Mapping[str, Any]]:
2856
+ def data(self) -> Optional[Mapping[str, str]]:
2852
2857
  """
2853
2858
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2854
2859
 
@@ -2953,7 +2958,7 @@ class SecretsMountElasticsearch(dict):
2953
2958
  ca_path: Optional[str] = None,
2954
2959
  client_cert: Optional[str] = None,
2955
2960
  client_key: Optional[str] = None,
2956
- data: Optional[Mapping[str, Any]] = None,
2961
+ data: Optional[Mapping[str, str]] = None,
2957
2962
  insecure: Optional[bool] = None,
2958
2963
  plugin_name: Optional[str] = None,
2959
2964
  root_rotation_statements: Optional[Sequence[str]] = None,
@@ -2971,7 +2976,7 @@ class SecretsMountElasticsearch(dict):
2971
2976
  :param str ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
2972
2977
  :param str client_cert: The path to the certificate for the Elasticsearch client to present for communication
2973
2978
  :param str client_key: The path to the key for the Elasticsearch client to use for communication
2974
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2979
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2975
2980
 
2976
2981
  Supported list of database secrets engines that can be configured:
2977
2982
  :param bool insecure: Whether to disable certificate verification
@@ -3086,7 +3091,7 @@ class SecretsMountElasticsearch(dict):
3086
3091
 
3087
3092
  @property
3088
3093
  @pulumi.getter
3089
- def data(self) -> Optional[Mapping[str, Any]]:
3094
+ def data(self) -> Optional[Mapping[str, str]]:
3090
3095
  """
3091
3096
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3092
3097
 
@@ -3183,7 +3188,7 @@ class SecretsMountHana(dict):
3183
3188
  name: str,
3184
3189
  allowed_roles: Optional[Sequence[str]] = None,
3185
3190
  connection_url: Optional[str] = None,
3186
- data: Optional[Mapping[str, Any]] = None,
3191
+ data: Optional[Mapping[str, str]] = None,
3187
3192
  disable_escaping: Optional[bool] = None,
3188
3193
  max_connection_lifetime: Optional[int] = None,
3189
3194
  max_idle_connections: Optional[int] = None,
@@ -3198,7 +3203,7 @@ class SecretsMountHana(dict):
3198
3203
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
3199
3204
  connection.
3200
3205
  :param str connection_url: Connection string to use to connect to the database.
3201
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3206
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3202
3207
 
3203
3208
  Supported list of database secrets engines that can be configured:
3204
3209
  :param bool disable_escaping: Disable special character escaping in username and password
@@ -3265,7 +3270,7 @@ class SecretsMountHana(dict):
3265
3270
 
3266
3271
  @property
3267
3272
  @pulumi.getter
3268
- def data(self) -> Optional[Mapping[str, Any]]:
3273
+ def data(self) -> Optional[Mapping[str, str]]:
3269
3274
  """
3270
3275
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3271
3276
 
@@ -3389,7 +3394,7 @@ class SecretsMountInfluxdb(dict):
3389
3394
  username: str,
3390
3395
  allowed_roles: Optional[Sequence[str]] = None,
3391
3396
  connect_timeout: Optional[int] = None,
3392
- data: Optional[Mapping[str, Any]] = None,
3397
+ data: Optional[Mapping[str, str]] = None,
3393
3398
  insecure_tls: Optional[bool] = None,
3394
3399
  pem_bundle: Optional[str] = None,
3395
3400
  pem_json: Optional[str] = None,
@@ -3407,7 +3412,7 @@ class SecretsMountInfluxdb(dict):
3407
3412
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
3408
3413
  connection.
3409
3414
  :param int connect_timeout: The number of seconds to use as a connection timeout.
3410
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3415
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3411
3416
 
3412
3417
  Supported list of database secrets engines that can be configured:
3413
3418
  :param bool insecure_tls: Whether to skip verification of the server certificate when using TLS.
@@ -3501,7 +3506,7 @@ class SecretsMountInfluxdb(dict):
3501
3506
 
3502
3507
  @property
3503
3508
  @pulumi.getter
3504
- def data(self) -> Optional[Mapping[str, Any]]:
3509
+ def data(self) -> Optional[Mapping[str, str]]:
3505
3510
  """
3506
3511
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3507
3512
 
@@ -3622,7 +3627,7 @@ class SecretsMountMongodb(dict):
3622
3627
  name: str,
3623
3628
  allowed_roles: Optional[Sequence[str]] = None,
3624
3629
  connection_url: Optional[str] = None,
3625
- data: Optional[Mapping[str, Any]] = None,
3630
+ data: Optional[Mapping[str, str]] = None,
3626
3631
  max_connection_lifetime: Optional[int] = None,
3627
3632
  max_idle_connections: Optional[int] = None,
3628
3633
  max_open_connections: Optional[int] = None,
@@ -3637,7 +3642,7 @@ class SecretsMountMongodb(dict):
3637
3642
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
3638
3643
  connection.
3639
3644
  :param str connection_url: Connection string to use to connect to the database.
3640
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3645
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3641
3646
 
3642
3647
  Supported list of database secrets engines that can be configured:
3643
3648
  :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
@@ -3704,7 +3709,7 @@ class SecretsMountMongodb(dict):
3704
3709
 
3705
3710
  @property
3706
3711
  @pulumi.getter
3707
- def data(self) -> Optional[Mapping[str, Any]]:
3712
+ def data(self) -> Optional[Mapping[str, str]]:
3708
3713
  """
3709
3714
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3710
3715
 
@@ -3823,7 +3828,7 @@ class SecretsMountMongodbatla(dict):
3823
3828
  project_id: str,
3824
3829
  public_key: str,
3825
3830
  allowed_roles: Optional[Sequence[str]] = None,
3826
- data: Optional[Mapping[str, Any]] = None,
3831
+ data: Optional[Mapping[str, str]] = None,
3827
3832
  plugin_name: Optional[str] = None,
3828
3833
  root_rotation_statements: Optional[Sequence[str]] = None,
3829
3834
  verify_connection: Optional[bool] = None):
@@ -3834,7 +3839,7 @@ class SecretsMountMongodbatla(dict):
3834
3839
  :param str public_key: The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
3835
3840
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
3836
3841
  connection.
3837
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3842
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3838
3843
 
3839
3844
  Supported list of database secrets engines that can be configured:
3840
3845
  :param str plugin_name: Specifies the name of the plugin to use.
@@ -3900,7 +3905,7 @@ class SecretsMountMongodbatla(dict):
3900
3905
 
3901
3906
  @property
3902
3907
  @pulumi.getter
3903
- def data(self) -> Optional[Mapping[str, Any]]:
3908
+ def data(self) -> Optional[Mapping[str, str]]:
3904
3909
  """
3905
3910
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3906
3911
 
@@ -3978,7 +3983,7 @@ class SecretsMountMssql(dict):
3978
3983
  allowed_roles: Optional[Sequence[str]] = None,
3979
3984
  connection_url: Optional[str] = None,
3980
3985
  contained_db: Optional[bool] = None,
3981
- data: Optional[Mapping[str, Any]] = None,
3986
+ data: Optional[Mapping[str, str]] = None,
3982
3987
  disable_escaping: Optional[bool] = None,
3983
3988
  max_connection_lifetime: Optional[int] = None,
3984
3989
  max_idle_connections: Optional[int] = None,
@@ -3995,7 +4000,7 @@ class SecretsMountMssql(dict):
3995
4000
  connection.
3996
4001
  :param str connection_url: Connection string to use to connect to the database.
3997
4002
  :param bool contained_db: Set to true when the target is a Contained Database, e.g. AzureSQL.
3998
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4003
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3999
4004
 
4000
4005
  Supported list of database secrets engines that can be configured:
4001
4006
  :param bool disable_escaping: Disable special character escaping in username and password
@@ -4075,7 +4080,7 @@ class SecretsMountMssql(dict):
4075
4080
 
4076
4081
  @property
4077
4082
  @pulumi.getter
4078
- def data(self) -> Optional[Mapping[str, Any]]:
4083
+ def data(self) -> Optional[Mapping[str, str]]:
4079
4084
  """
4080
4085
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4081
4086
 
@@ -4213,7 +4218,7 @@ class SecretsMountMysql(dict):
4213
4218
  allowed_roles: Optional[Sequence[str]] = None,
4214
4219
  auth_type: Optional[str] = None,
4215
4220
  connection_url: Optional[str] = None,
4216
- data: Optional[Mapping[str, Any]] = None,
4221
+ data: Optional[Mapping[str, str]] = None,
4217
4222
  max_connection_lifetime: Optional[int] = None,
4218
4223
  max_idle_connections: Optional[int] = None,
4219
4224
  max_open_connections: Optional[int] = None,
@@ -4232,7 +4237,7 @@ class SecretsMountMysql(dict):
4232
4237
  connection.
4233
4238
  :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
4234
4239
  :param str connection_url: Connection string to use to connect to the database.
4235
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4240
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4236
4241
 
4237
4242
  Supported list of database secrets engines that can be configured:
4238
4243
  :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
@@ -4318,7 +4323,7 @@ class SecretsMountMysql(dict):
4318
4323
 
4319
4324
  @property
4320
4325
  @pulumi.getter
4321
- def data(self) -> Optional[Mapping[str, Any]]:
4326
+ def data(self) -> Optional[Mapping[str, str]]:
4322
4327
  """
4323
4328
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4324
4329
 
@@ -4472,7 +4477,7 @@ class SecretsMountMysqlAurora(dict):
4472
4477
  allowed_roles: Optional[Sequence[str]] = None,
4473
4478
  auth_type: Optional[str] = None,
4474
4479
  connection_url: Optional[str] = None,
4475
- data: Optional[Mapping[str, Any]] = None,
4480
+ data: Optional[Mapping[str, str]] = None,
4476
4481
  max_connection_lifetime: Optional[int] = None,
4477
4482
  max_idle_connections: Optional[int] = None,
4478
4483
  max_open_connections: Optional[int] = None,
@@ -4491,7 +4496,7 @@ class SecretsMountMysqlAurora(dict):
4491
4496
  connection.
4492
4497
  :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
4493
4498
  :param str connection_url: Connection string to use to connect to the database.
4494
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4499
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4495
4500
 
4496
4501
  Supported list of database secrets engines that can be configured:
4497
4502
  :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
@@ -4577,7 +4582,7 @@ class SecretsMountMysqlAurora(dict):
4577
4582
 
4578
4583
  @property
4579
4584
  @pulumi.getter
4580
- def data(self) -> Optional[Mapping[str, Any]]:
4585
+ def data(self) -> Optional[Mapping[str, str]]:
4581
4586
  """
4582
4587
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4583
4588
 
@@ -4731,7 +4736,7 @@ class SecretsMountMysqlLegacy(dict):
4731
4736
  allowed_roles: Optional[Sequence[str]] = None,
4732
4737
  auth_type: Optional[str] = None,
4733
4738
  connection_url: Optional[str] = None,
4734
- data: Optional[Mapping[str, Any]] = None,
4739
+ data: Optional[Mapping[str, str]] = None,
4735
4740
  max_connection_lifetime: Optional[int] = None,
4736
4741
  max_idle_connections: Optional[int] = None,
4737
4742
  max_open_connections: Optional[int] = None,
@@ -4750,7 +4755,7 @@ class SecretsMountMysqlLegacy(dict):
4750
4755
  connection.
4751
4756
  :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
4752
4757
  :param str connection_url: Connection string to use to connect to the database.
4753
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4758
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4754
4759
 
4755
4760
  Supported list of database secrets engines that can be configured:
4756
4761
  :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
@@ -4836,7 +4841,7 @@ class SecretsMountMysqlLegacy(dict):
4836
4841
 
4837
4842
  @property
4838
4843
  @pulumi.getter
4839
- def data(self) -> Optional[Mapping[str, Any]]:
4844
+ def data(self) -> Optional[Mapping[str, str]]:
4840
4845
  """
4841
4846
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4842
4847
 
@@ -4990,7 +4995,7 @@ class SecretsMountMysqlRd(dict):
4990
4995
  allowed_roles: Optional[Sequence[str]] = None,
4991
4996
  auth_type: Optional[str] = None,
4992
4997
  connection_url: Optional[str] = None,
4993
- data: Optional[Mapping[str, Any]] = None,
4998
+ data: Optional[Mapping[str, str]] = None,
4994
4999
  max_connection_lifetime: Optional[int] = None,
4995
5000
  max_idle_connections: Optional[int] = None,
4996
5001
  max_open_connections: Optional[int] = None,
@@ -5009,7 +5014,7 @@ class SecretsMountMysqlRd(dict):
5009
5014
  connection.
5010
5015
  :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
5011
5016
  :param str connection_url: Connection string to use to connect to the database.
5012
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5017
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5013
5018
 
5014
5019
  Supported list of database secrets engines that can be configured:
5015
5020
  :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
@@ -5095,7 +5100,7 @@ class SecretsMountMysqlRd(dict):
5095
5100
 
5096
5101
  @property
5097
5102
  @pulumi.getter
5098
- def data(self) -> Optional[Mapping[str, Any]]:
5103
+ def data(self) -> Optional[Mapping[str, str]]:
5099
5104
  """
5100
5105
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5101
5106
 
@@ -5244,7 +5249,7 @@ class SecretsMountOracle(dict):
5244
5249
  name: str,
5245
5250
  allowed_roles: Optional[Sequence[str]] = None,
5246
5251
  connection_url: Optional[str] = None,
5247
- data: Optional[Mapping[str, Any]] = None,
5252
+ data: Optional[Mapping[str, str]] = None,
5248
5253
  disconnect_sessions: Optional[bool] = None,
5249
5254
  max_connection_lifetime: Optional[int] = None,
5250
5255
  max_idle_connections: Optional[int] = None,
@@ -5261,7 +5266,7 @@ class SecretsMountOracle(dict):
5261
5266
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
5262
5267
  connection.
5263
5268
  :param str connection_url: Connection string to use to connect to the database.
5264
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5269
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5265
5270
 
5266
5271
  Supported list of database secrets engines that can be configured:
5267
5272
  :param bool disconnect_sessions: Set to true to disconnect any open sessions prior to running the revocation statements.
@@ -5334,7 +5339,7 @@ class SecretsMountOracle(dict):
5334
5339
 
5335
5340
  @property
5336
5341
  @pulumi.getter
5337
- def data(self) -> Optional[Mapping[str, Any]]:
5342
+ def data(self) -> Optional[Mapping[str, str]]:
5338
5343
  """
5339
5344
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5340
5345
 
@@ -5478,7 +5483,7 @@ class SecretsMountPostgresql(dict):
5478
5483
  allowed_roles: Optional[Sequence[str]] = None,
5479
5484
  auth_type: Optional[str] = None,
5480
5485
  connection_url: Optional[str] = None,
5481
- data: Optional[Mapping[str, Any]] = None,
5486
+ data: Optional[Mapping[str, str]] = None,
5482
5487
  disable_escaping: Optional[bool] = None,
5483
5488
  max_connection_lifetime: Optional[int] = None,
5484
5489
  max_idle_connections: Optional[int] = None,
@@ -5496,7 +5501,7 @@ class SecretsMountPostgresql(dict):
5496
5501
  connection.
5497
5502
  :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
5498
5503
  :param str connection_url: Connection string to use to connect to the database.
5499
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5504
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5500
5505
 
5501
5506
  Supported list of database secrets engines that can be configured:
5502
5507
  :param bool disable_escaping: Disable special character escaping in username and password
@@ -5579,7 +5584,7 @@ class SecretsMountPostgresql(dict):
5579
5584
 
5580
5585
  @property
5581
5586
  @pulumi.getter
5582
- def data(self) -> Optional[Mapping[str, Any]]:
5587
+ def data(self) -> Optional[Mapping[str, str]]:
5583
5588
  """
5584
5589
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5585
5590
 
@@ -5713,7 +5718,7 @@ class SecretsMountRedi(dict):
5713
5718
  username: str,
5714
5719
  allowed_roles: Optional[Sequence[str]] = None,
5715
5720
  ca_cert: Optional[str] = None,
5716
- data: Optional[Mapping[str, Any]] = None,
5721
+ data: Optional[Mapping[str, str]] = None,
5717
5722
  insecure_tls: Optional[bool] = None,
5718
5723
  plugin_name: Optional[str] = None,
5719
5724
  port: Optional[int] = None,
@@ -5728,7 +5733,7 @@ class SecretsMountRedi(dict):
5728
5733
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
5729
5734
  connection.
5730
5735
  :param str ca_cert: The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
5731
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5736
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5732
5737
 
5733
5738
  Supported list of database secrets engines that can be configured:
5734
5739
  :param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
@@ -5813,7 +5818,7 @@ class SecretsMountRedi(dict):
5813
5818
 
5814
5819
  @property
5815
5820
  @pulumi.getter
5816
- def data(self) -> Optional[Mapping[str, Any]]:
5821
+ def data(self) -> Optional[Mapping[str, str]]:
5817
5822
  """
5818
5823
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5819
5824
 
@@ -5900,7 +5905,7 @@ class SecretsMountRedisElasticach(dict):
5900
5905
  name: str,
5901
5906
  url: str,
5902
5907
  allowed_roles: Optional[Sequence[str]] = None,
5903
- data: Optional[Mapping[str, Any]] = None,
5908
+ data: Optional[Mapping[str, str]] = None,
5904
5909
  password: Optional[str] = None,
5905
5910
  plugin_name: Optional[str] = None,
5906
5911
  region: Optional[str] = None,
@@ -5912,7 +5917,7 @@ class SecretsMountRedisElasticach(dict):
5912
5917
  :param str url: The configuration endpoint for the ElastiCache cluster to connect to.
5913
5918
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
5914
5919
  connection.
5915
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5920
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5916
5921
 
5917
5922
  Supported list of database secrets engines that can be configured:
5918
5923
  :param str password: The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
@@ -5969,7 +5974,7 @@ class SecretsMountRedisElasticach(dict):
5969
5974
 
5970
5975
  @property
5971
5976
  @pulumi.getter
5972
- def data(self) -> Optional[Mapping[str, Any]]:
5977
+ def data(self) -> Optional[Mapping[str, str]]:
5973
5978
  """
5974
5979
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5975
5980
 
@@ -6068,7 +6073,7 @@ class SecretsMountRedshift(dict):
6068
6073
  name: str,
6069
6074
  allowed_roles: Optional[Sequence[str]] = None,
6070
6075
  connection_url: Optional[str] = None,
6071
- data: Optional[Mapping[str, Any]] = None,
6076
+ data: Optional[Mapping[str, str]] = None,
6072
6077
  disable_escaping: Optional[bool] = None,
6073
6078
  max_connection_lifetime: Optional[int] = None,
6074
6079
  max_idle_connections: Optional[int] = None,
@@ -6084,7 +6089,7 @@ class SecretsMountRedshift(dict):
6084
6089
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
6085
6090
  connection.
6086
6091
  :param str connection_url: Connection string to use to connect to the database.
6087
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6092
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6088
6093
 
6089
6094
  Supported list of database secrets engines that can be configured:
6090
6095
  :param bool disable_escaping: Disable special character escaping in username and password
@@ -6154,7 +6159,7 @@ class SecretsMountRedshift(dict):
6154
6159
 
6155
6160
  @property
6156
6161
  @pulumi.getter
6157
- def data(self) -> Optional[Mapping[str, Any]]:
6162
+ def data(self) -> Optional[Mapping[str, str]]:
6158
6163
  """
6159
6164
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6160
6165
 
@@ -6283,7 +6288,7 @@ class SecretsMountSnowflake(dict):
6283
6288
  name: str,
6284
6289
  allowed_roles: Optional[Sequence[str]] = None,
6285
6290
  connection_url: Optional[str] = None,
6286
- data: Optional[Mapping[str, Any]] = None,
6291
+ data: Optional[Mapping[str, str]] = None,
6287
6292
  max_connection_lifetime: Optional[int] = None,
6288
6293
  max_idle_connections: Optional[int] = None,
6289
6294
  max_open_connections: Optional[int] = None,
@@ -6298,7 +6303,7 @@ class SecretsMountSnowflake(dict):
6298
6303
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
6299
6304
  connection.
6300
6305
  :param str connection_url: Connection string to use to connect to the database.
6301
- :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6306
+ :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6302
6307
 
6303
6308
  Supported list of database secrets engines that can be configured:
6304
6309
  :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
@@ -6365,7 +6370,7 @@ class SecretsMountSnowflake(dict):
6365
6370
 
6366
6371
  @property
6367
6372
  @pulumi.getter
6368
- def data(self) -> Optional[Mapping[str, Any]]:
6373
+ def data(self) -> Optional[Mapping[str, str]]:
6369
6374
  """
6370
6375
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6371
6376