pulumi-vault 6.3.0a1723109142__py3-none-any.whl → 6.3.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +560 -0
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +19 -4
  4. pulumi_vault/ad/secret_backend.py +5 -0
  5. pulumi_vault/ad/secret_library.py +5 -0
  6. pulumi_vault/ad/secret_role.py +5 -0
  7. pulumi_vault/alicloud/auth_backend_role.py +5 -0
  8. pulumi_vault/approle/auth_backend_login.py +5 -0
  9. pulumi_vault/approle/auth_backend_role.py +5 -0
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
  11. pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
  12. pulumi_vault/audit.py +5 -0
  13. pulumi_vault/audit_request_header.py +5 -0
  14. pulumi_vault/auth_backend.py +10 -5
  15. pulumi_vault/aws/auth_backend_cert.py +5 -0
  16. pulumi_vault/aws/auth_backend_client.py +5 -0
  17. pulumi_vault/aws/auth_backend_config_identity.py +5 -0
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
  19. pulumi_vault/aws/auth_backend_login.py +12 -7
  20. pulumi_vault/aws/auth_backend_role.py +5 -0
  21. pulumi_vault/aws/auth_backend_role_tag.py +5 -0
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
  23. pulumi_vault/aws/auth_backend_sts_role.py +5 -0
  24. pulumi_vault/aws/get_access_credentials.py +31 -4
  25. pulumi_vault/aws/get_static_access_credentials.py +18 -4
  26. pulumi_vault/aws/secret_backend.py +5 -0
  27. pulumi_vault/aws/secret_backend_role.py +5 -0
  28. pulumi_vault/aws/secret_backend_static_role.py +5 -0
  29. pulumi_vault/azure/_inputs.py +24 -0
  30. pulumi_vault/azure/auth_backend_config.py +5 -0
  31. pulumi_vault/azure/auth_backend_role.py +5 -0
  32. pulumi_vault/azure/backend.py +5 -0
  33. pulumi_vault/azure/backend_role.py +23 -18
  34. pulumi_vault/azure/get_access_credentials.py +36 -4
  35. pulumi_vault/azure/outputs.py +5 -0
  36. pulumi_vault/cert_auth_backend_role.py +5 -0
  37. pulumi_vault/config/__init__.pyi +5 -0
  38. pulumi_vault/config/_inputs.py +21 -0
  39. pulumi_vault/config/outputs.py +5 -0
  40. pulumi_vault/config/ui_custom_message.py +24 -19
  41. pulumi_vault/config/vars.py +5 -0
  42. pulumi_vault/consul/secret_backend.py +5 -0
  43. pulumi_vault/consul/secret_backend_role.py +5 -0
  44. pulumi_vault/database/_inputs.py +2091 -140
  45. pulumi_vault/database/outputs.py +59 -54
  46. pulumi_vault/database/secret_backend_connection.py +115 -110
  47. pulumi_vault/database/secret_backend_role.py +25 -20
  48. pulumi_vault/database/secret_backend_static_role.py +11 -6
  49. pulumi_vault/database/secrets_mount.py +139 -134
  50. pulumi_vault/egp_policy.py +5 -0
  51. pulumi_vault/gcp/_inputs.py +111 -0
  52. pulumi_vault/gcp/auth_backend.py +15 -10
  53. pulumi_vault/gcp/auth_backend_role.py +5 -0
  54. pulumi_vault/gcp/get_auth_backend_role.py +42 -4
  55. pulumi_vault/gcp/outputs.py +5 -0
  56. pulumi_vault/gcp/secret_backend.py +5 -0
  57. pulumi_vault/gcp/secret_impersonated_account.py +5 -0
  58. pulumi_vault/gcp/secret_roleset.py +18 -13
  59. pulumi_vault/gcp/secret_static_account.py +18 -13
  60. pulumi_vault/generic/endpoint.py +5 -0
  61. pulumi_vault/generic/get_secret.py +25 -5
  62. pulumi_vault/generic/secret.py +12 -7
  63. pulumi_vault/get_auth_backend.py +21 -4
  64. pulumi_vault/get_auth_backends.py +16 -4
  65. pulumi_vault/get_namespace.py +18 -5
  66. pulumi_vault/get_namespaces.py +13 -4
  67. pulumi_vault/get_nomad_access_token.py +28 -8
  68. pulumi_vault/get_policy_document.py +27 -16
  69. pulumi_vault/get_raft_autopilot_state.py +26 -7
  70. pulumi_vault/github/_inputs.py +55 -0
  71. pulumi_vault/github/auth_backend.py +10 -5
  72. pulumi_vault/github/outputs.py +5 -0
  73. pulumi_vault/github/team.py +5 -0
  74. pulumi_vault/github/user.py +5 -0
  75. pulumi_vault/identity/entity.py +5 -0
  76. pulumi_vault/identity/entity_alias.py +5 -0
  77. pulumi_vault/identity/entity_policies.py +5 -0
  78. pulumi_vault/identity/get_entity.py +35 -5
  79. pulumi_vault/identity/get_group.py +42 -6
  80. pulumi_vault/identity/get_oidc_client_creds.py +16 -4
  81. pulumi_vault/identity/get_oidc_openid_config.py +26 -4
  82. pulumi_vault/identity/get_oidc_public_keys.py +16 -5
  83. pulumi_vault/identity/group.py +5 -0
  84. pulumi_vault/identity/group_alias.py +5 -0
  85. pulumi_vault/identity/group_member_entity_ids.py +5 -0
  86. pulumi_vault/identity/group_member_group_ids.py +5 -0
  87. pulumi_vault/identity/group_policies.py +5 -0
  88. pulumi_vault/identity/mfa_duo.py +5 -0
  89. pulumi_vault/identity/mfa_login_enforcement.py +5 -0
  90. pulumi_vault/identity/mfa_okta.py +5 -0
  91. pulumi_vault/identity/mfa_pingid.py +5 -0
  92. pulumi_vault/identity/mfa_totp.py +5 -0
  93. pulumi_vault/identity/oidc.py +5 -0
  94. pulumi_vault/identity/oidc_assignment.py +5 -0
  95. pulumi_vault/identity/oidc_client.py +5 -0
  96. pulumi_vault/identity/oidc_key.py +5 -0
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
  98. pulumi_vault/identity/oidc_provider.py +5 -0
  99. pulumi_vault/identity/oidc_role.py +5 -0
  100. pulumi_vault/identity/oidc_scope.py +5 -0
  101. pulumi_vault/identity/outputs.py +8 -3
  102. pulumi_vault/jwt/_inputs.py +55 -0
  103. pulumi_vault/jwt/auth_backend.py +14 -9
  104. pulumi_vault/jwt/auth_backend_role.py +33 -28
  105. pulumi_vault/jwt/outputs.py +5 -0
  106. pulumi_vault/kmip/secret_backend.py +5 -0
  107. pulumi_vault/kmip/secret_role.py +5 -0
  108. pulumi_vault/kmip/secret_scope.py +5 -0
  109. pulumi_vault/kubernetes/auth_backend_config.py +5 -0
  110. pulumi_vault/kubernetes/auth_backend_role.py +5 -0
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
  113. pulumi_vault/kubernetes/get_service_account_token.py +28 -4
  114. pulumi_vault/kubernetes/secret_backend.py +19 -14
  115. pulumi_vault/kubernetes/secret_backend_role.py +5 -0
  116. pulumi_vault/kv/_inputs.py +36 -4
  117. pulumi_vault/kv/get_secret.py +20 -5
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
  119. pulumi_vault/kv/get_secret_v2.py +27 -6
  120. pulumi_vault/kv/get_secrets_list.py +15 -4
  121. pulumi_vault/kv/get_secrets_list_v2.py +18 -4
  122. pulumi_vault/kv/outputs.py +8 -3
  123. pulumi_vault/kv/secret.py +12 -7
  124. pulumi_vault/kv/secret_backend_v2.py +5 -0
  125. pulumi_vault/kv/secret_v2.py +46 -41
  126. pulumi_vault/ldap/auth_backend.py +5 -0
  127. pulumi_vault/ldap/auth_backend_group.py +5 -0
  128. pulumi_vault/ldap/auth_backend_user.py +5 -0
  129. pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
  130. pulumi_vault/ldap/get_static_credentials.py +23 -4
  131. pulumi_vault/ldap/secret_backend.py +19 -14
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
  133. pulumi_vault/ldap/secret_backend_library_set.py +5 -0
  134. pulumi_vault/ldap/secret_backend_static_role.py +5 -0
  135. pulumi_vault/managed/_inputs.py +205 -0
  136. pulumi_vault/managed/keys.py +20 -15
  137. pulumi_vault/managed/outputs.py +5 -0
  138. pulumi_vault/mfa_duo.py +5 -0
  139. pulumi_vault/mfa_okta.py +5 -0
  140. pulumi_vault/mfa_pingid.py +5 -0
  141. pulumi_vault/mfa_totp.py +5 -0
  142. pulumi_vault/mongodbatlas/secret_backend.py +5 -0
  143. pulumi_vault/mongodbatlas/secret_role.py +5 -0
  144. pulumi_vault/mount.py +21 -16
  145. pulumi_vault/namespace.py +19 -14
  146. pulumi_vault/nomad_secret_backend.py +5 -0
  147. pulumi_vault/nomad_secret_role.py +5 -0
  148. pulumi_vault/okta/_inputs.py +39 -0
  149. pulumi_vault/okta/auth_backend.py +31 -26
  150. pulumi_vault/okta/auth_backend_group.py +5 -0
  151. pulumi_vault/okta/auth_backend_user.py +5 -0
  152. pulumi_vault/okta/outputs.py +5 -0
  153. pulumi_vault/outputs.py +5 -0
  154. pulumi_vault/password_policy.py +5 -0
  155. pulumi_vault/pkisecret/_inputs.py +49 -8
  156. pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
  157. pulumi_vault/pkisecret/backend_config_est.py +24 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
  159. pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
  160. pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
  161. pulumi_vault/pkisecret/get_backend_key.py +19 -4
  162. pulumi_vault/pkisecret/get_backend_keys.py +18 -5
  163. pulumi_vault/pkisecret/outputs.py +17 -12
  164. pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
  172. pulumi_vault/pkisecret/secret_backend_key.py +5 -0
  173. pulumi_vault/pkisecret/secret_backend_role.py +10 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
  176. pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
  177. pulumi_vault/plugin.py +5 -0
  178. pulumi_vault/plugin_pinned_version.py +5 -0
  179. pulumi_vault/policy.py +5 -0
  180. pulumi_vault/provider.py +47 -42
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +5 -0
  183. pulumi_vault/quota_rate_limit.py +5 -0
  184. pulumi_vault/rabbitmq/_inputs.py +61 -0
  185. pulumi_vault/rabbitmq/outputs.py +5 -0
  186. pulumi_vault/rabbitmq/secret_backend.py +5 -0
  187. pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
  188. pulumi_vault/raft_autopilot.py +5 -0
  189. pulumi_vault/raft_snapshot_agent_config.py +5 -0
  190. pulumi_vault/rgp_policy.py +5 -0
  191. pulumi_vault/saml/auth_backend.py +5 -0
  192. pulumi_vault/saml/auth_backend_role.py +19 -14
  193. pulumi_vault/secrets/_inputs.py +30 -0
  194. pulumi_vault/secrets/outputs.py +5 -0
  195. pulumi_vault/secrets/sync_association.py +7 -2
  196. pulumi_vault/secrets/sync_aws_destination.py +19 -14
  197. pulumi_vault/secrets/sync_azure_destination.py +19 -14
  198. pulumi_vault/secrets/sync_config.py +5 -0
  199. pulumi_vault/secrets/sync_gcp_destination.py +19 -14
  200. pulumi_vault/secrets/sync_gh_destination.py +5 -0
  201. pulumi_vault/secrets/sync_github_apps.py +5 -0
  202. pulumi_vault/secrets/sync_vercel_destination.py +5 -0
  203. pulumi_vault/ssh/_inputs.py +22 -0
  204. pulumi_vault/ssh/outputs.py +5 -0
  205. pulumi_vault/ssh/secret_backend_ca.py +5 -0
  206. pulumi_vault/ssh/secret_backend_role.py +38 -33
  207. pulumi_vault/terraformcloud/secret_backend.py +5 -0
  208. pulumi_vault/terraformcloud/secret_creds.py +5 -0
  209. pulumi_vault/terraformcloud/secret_role.py +5 -0
  210. pulumi_vault/token.py +5 -0
  211. pulumi_vault/tokenauth/auth_backend_role.py +5 -14
  212. pulumi_vault/transform/alphabet.py +5 -0
  213. pulumi_vault/transform/get_decode.py +38 -14
  214. pulumi_vault/transform/get_encode.py +38 -14
  215. pulumi_vault/transform/role.py +5 -0
  216. pulumi_vault/transform/template.py +19 -14
  217. pulumi_vault/transform/transformation.py +5 -0
  218. pulumi_vault/transit/get_decrypt.py +21 -4
  219. pulumi_vault/transit/get_encrypt.py +23 -4
  220. pulumi_vault/transit/secret_backend_key.py +12 -7
  221. pulumi_vault/transit/secret_cache_config.py +5 -0
  222. {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1.dist-info}/METADATA +3 -2
  223. pulumi_vault-6.3.1.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.3.0a1723109142.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -24,7 +29,7 @@ class SecretV2Args:
24
29
  disable_read: Optional[pulumi.Input[bool]] = None,
25
30
  name: Optional[pulumi.Input[str]] = None,
26
31
  namespace: Optional[pulumi.Input[str]] = None,
27
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None):
32
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None):
28
33
  """
29
34
  The set of arguments for constructing a SecretV2 resource.
30
35
  :param pulumi.Input[str] data_json: JSON-encoded string that will be
@@ -49,7 +54,7 @@ class SecretV2Args:
49
54
  The value should not contain leading or trailing forward slashes.
50
55
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
51
56
  *Available only for Vault Enterprise*.
52
- :param pulumi.Input[Mapping[str, Any]] options: An object that holds option settings.
57
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: An object that holds option settings.
53
58
  """
54
59
  pulumi.set(__self__, "data_json", data_json)
55
60
  pulumi.set(__self__, "mount", mount)
@@ -180,14 +185,14 @@ class SecretV2Args:
180
185
 
181
186
  @property
182
187
  @pulumi.getter
183
- def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
188
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
184
189
  """
185
190
  An object that holds option settings.
186
191
  """
187
192
  return pulumi.get(self, "options")
188
193
 
189
194
  @options.setter
190
- def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
195
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
191
196
  pulumi.set(self, "options", value)
192
197
 
193
198
 
@@ -196,15 +201,15 @@ class _SecretV2State:
196
201
  def __init__(__self__, *,
197
202
  cas: Optional[pulumi.Input[int]] = None,
198
203
  custom_metadata: Optional[pulumi.Input['SecretV2CustomMetadataArgs']] = None,
199
- data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
204
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
200
205
  data_json: Optional[pulumi.Input[str]] = None,
201
206
  delete_all_versions: Optional[pulumi.Input[bool]] = None,
202
207
  disable_read: Optional[pulumi.Input[bool]] = None,
203
- metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
208
+ metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
204
209
  mount: Optional[pulumi.Input[str]] = None,
205
210
  name: Optional[pulumi.Input[str]] = None,
206
211
  namespace: Optional[pulumi.Input[str]] = None,
207
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
212
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
208
213
  path: Optional[pulumi.Input[str]] = None):
209
214
  """
210
215
  Input properties used for looking up and filtering SecretV2 resources.
@@ -215,7 +220,7 @@ class _SecretV2State:
215
220
  :param pulumi.Input['SecretV2CustomMetadataArgs'] custom_metadata: A nested block that allows configuring metadata for the
216
221
  KV secret. Refer to the
217
222
  Configuration Options for more info.
218
- :param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
223
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
219
224
  Vault and whose values are the corresponding values. This map can only
220
225
  represent string data, so any non-string values returned from Vault are
221
226
  serialized as JSON.
@@ -225,7 +230,7 @@ class _SecretV2State:
225
230
  versions for the specified key.
226
231
  :param pulumi.Input[bool] disable_read: If set to true, disables reading secret from Vault;
227
232
  note: drift won't be detected.
228
- :param pulumi.Input[Mapping[str, Any]] metadata: Metadata associated with this secret read from Vault.
233
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: Metadata associated with this secret read from Vault.
229
234
  :param pulumi.Input[str] mount: Path where KV-V2 engine is mounted.
230
235
  :param pulumi.Input[str] name: Full name of the secret. For a nested secret
231
236
  the name is the nested path excluding the mount and data
@@ -235,7 +240,7 @@ class _SecretV2State:
235
240
  The value should not contain leading or trailing forward slashes.
236
241
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
237
242
  *Available only for Vault Enterprise*.
238
- :param pulumi.Input[Mapping[str, Any]] options: An object that holds option settings.
243
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: An object that holds option settings.
239
244
  :param pulumi.Input[str] path: Full path where the KV-V2 secret will be written.
240
245
  """
241
246
  if cas is not None:
@@ -294,7 +299,7 @@ class _SecretV2State:
294
299
 
295
300
  @property
296
301
  @pulumi.getter
297
- def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
302
+ def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
298
303
  """
299
304
  A mapping whose keys are the top-level data keys returned from
300
305
  Vault and whose values are the corresponding values. This map can only
@@ -304,7 +309,7 @@ class _SecretV2State:
304
309
  return pulumi.get(self, "data")
305
310
 
306
311
  @data.setter
307
- def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
312
+ def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
308
313
  pulumi.set(self, "data", value)
309
314
 
310
315
  @property
@@ -348,14 +353,14 @@ class _SecretV2State:
348
353
 
349
354
  @property
350
355
  @pulumi.getter
351
- def metadata(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
356
+ def metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
352
357
  """
353
358
  Metadata associated with this secret read from Vault.
354
359
  """
355
360
  return pulumi.get(self, "metadata")
356
361
 
357
362
  @metadata.setter
358
- def metadata(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
363
+ def metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
359
364
  pulumi.set(self, "metadata", value)
360
365
 
361
366
  @property
@@ -402,14 +407,14 @@ class _SecretV2State:
402
407
 
403
408
  @property
404
409
  @pulumi.getter
405
- def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
410
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
406
411
  """
407
412
  An object that holds option settings.
408
413
  """
409
414
  return pulumi.get(self, "options")
410
415
 
411
416
  @options.setter
412
- def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
417
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
413
418
  pulumi.set(self, "options", value)
414
419
 
415
420
  @property
@@ -431,14 +436,14 @@ class SecretV2(pulumi.CustomResource):
431
436
  resource_name: str,
432
437
  opts: Optional[pulumi.ResourceOptions] = None,
433
438
  cas: Optional[pulumi.Input[int]] = None,
434
- custom_metadata: Optional[pulumi.Input[pulumi.InputType['SecretV2CustomMetadataArgs']]] = None,
439
+ custom_metadata: Optional[pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']]] = None,
435
440
  data_json: Optional[pulumi.Input[str]] = None,
436
441
  delete_all_versions: Optional[pulumi.Input[bool]] = None,
437
442
  disable_read: Optional[pulumi.Input[bool]] = None,
438
443
  mount: Optional[pulumi.Input[str]] = None,
439
444
  name: Optional[pulumi.Input[str]] = None,
440
445
  namespace: Optional[pulumi.Input[str]] = None,
441
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
446
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
442
447
  __props__=None):
443
448
  """
444
449
  Writes a KV-V2 secret to a given path in Vault.
@@ -469,13 +474,13 @@ class SecretV2(pulumi.CustomResource):
469
474
  "zip": "zap",
470
475
  "foo": "bar",
471
476
  }),
472
- custom_metadata=vault.kv.SecretV2CustomMetadataArgs(
473
- max_versions=5,
474
- data={
477
+ custom_metadata={
478
+ "max_versions": 5,
479
+ "data": {
475
480
  "foo": "vault@example.com",
476
481
  "bar": "12345",
477
482
  },
478
- ))
483
+ })
479
484
  ```
480
485
 
481
486
  ## Required Vault Capabilities
@@ -511,7 +516,7 @@ class SecretV2(pulumi.CustomResource):
511
516
  on either the secret or the engine's config. In order for a
512
517
  write operation to be successful, cas must be set to the current version
513
518
  of the secret.
514
- :param pulumi.Input[pulumi.InputType['SecretV2CustomMetadataArgs']] custom_metadata: A nested block that allows configuring metadata for the
519
+ :param pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']] custom_metadata: A nested block that allows configuring metadata for the
515
520
  KV secret. Refer to the
516
521
  Configuration Options for more info.
517
522
  :param pulumi.Input[str] data_json: JSON-encoded string that will be
@@ -529,7 +534,7 @@ class SecretV2(pulumi.CustomResource):
529
534
  The value should not contain leading or trailing forward slashes.
530
535
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
531
536
  *Available only for Vault Enterprise*.
532
- :param pulumi.Input[Mapping[str, Any]] options: An object that holds option settings.
537
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: An object that holds option settings.
533
538
  """
534
539
  ...
535
540
  @overload
@@ -566,13 +571,13 @@ class SecretV2(pulumi.CustomResource):
566
571
  "zip": "zap",
567
572
  "foo": "bar",
568
573
  }),
569
- custom_metadata=vault.kv.SecretV2CustomMetadataArgs(
570
- max_versions=5,
571
- data={
574
+ custom_metadata={
575
+ "max_versions": 5,
576
+ "data": {
572
577
  "foo": "vault@example.com",
573
578
  "bar": "12345",
574
579
  },
575
- ))
580
+ })
576
581
  ```
577
582
 
578
583
  ## Required Vault Capabilities
@@ -618,14 +623,14 @@ class SecretV2(pulumi.CustomResource):
618
623
  resource_name: str,
619
624
  opts: Optional[pulumi.ResourceOptions] = None,
620
625
  cas: Optional[pulumi.Input[int]] = None,
621
- custom_metadata: Optional[pulumi.Input[pulumi.InputType['SecretV2CustomMetadataArgs']]] = None,
626
+ custom_metadata: Optional[pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']]] = None,
622
627
  data_json: Optional[pulumi.Input[str]] = None,
623
628
  delete_all_versions: Optional[pulumi.Input[bool]] = None,
624
629
  disable_read: Optional[pulumi.Input[bool]] = None,
625
630
  mount: Optional[pulumi.Input[str]] = None,
626
631
  name: Optional[pulumi.Input[str]] = None,
627
632
  namespace: Optional[pulumi.Input[str]] = None,
628
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
633
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
629
634
  __props__=None):
630
635
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
631
636
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -664,16 +669,16 @@ class SecretV2(pulumi.CustomResource):
664
669
  id: pulumi.Input[str],
665
670
  opts: Optional[pulumi.ResourceOptions] = None,
666
671
  cas: Optional[pulumi.Input[int]] = None,
667
- custom_metadata: Optional[pulumi.Input[pulumi.InputType['SecretV2CustomMetadataArgs']]] = None,
668
- data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
672
+ custom_metadata: Optional[pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']]] = None,
673
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
669
674
  data_json: Optional[pulumi.Input[str]] = None,
670
675
  delete_all_versions: Optional[pulumi.Input[bool]] = None,
671
676
  disable_read: Optional[pulumi.Input[bool]] = None,
672
- metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
677
+ metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
673
678
  mount: Optional[pulumi.Input[str]] = None,
674
679
  name: Optional[pulumi.Input[str]] = None,
675
680
  namespace: Optional[pulumi.Input[str]] = None,
676
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
681
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
677
682
  path: Optional[pulumi.Input[str]] = None) -> 'SecretV2':
678
683
  """
679
684
  Get an existing SecretV2 resource's state with the given name, id, and optional extra
@@ -686,10 +691,10 @@ class SecretV2(pulumi.CustomResource):
686
691
  on either the secret or the engine's config. In order for a
687
692
  write operation to be successful, cas must be set to the current version
688
693
  of the secret.
689
- :param pulumi.Input[pulumi.InputType['SecretV2CustomMetadataArgs']] custom_metadata: A nested block that allows configuring metadata for the
694
+ :param pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']] custom_metadata: A nested block that allows configuring metadata for the
690
695
  KV secret. Refer to the
691
696
  Configuration Options for more info.
692
- :param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
697
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
693
698
  Vault and whose values are the corresponding values. This map can only
694
699
  represent string data, so any non-string values returned from Vault are
695
700
  serialized as JSON.
@@ -699,7 +704,7 @@ class SecretV2(pulumi.CustomResource):
699
704
  versions for the specified key.
700
705
  :param pulumi.Input[bool] disable_read: If set to true, disables reading secret from Vault;
701
706
  note: drift won't be detected.
702
- :param pulumi.Input[Mapping[str, Any]] metadata: Metadata associated with this secret read from Vault.
707
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: Metadata associated with this secret read from Vault.
703
708
  :param pulumi.Input[str] mount: Path where KV-V2 engine is mounted.
704
709
  :param pulumi.Input[str] name: Full name of the secret. For a nested secret
705
710
  the name is the nested path excluding the mount and data
@@ -709,7 +714,7 @@ class SecretV2(pulumi.CustomResource):
709
714
  The value should not contain leading or trailing forward slashes.
710
715
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
711
716
  *Available only for Vault Enterprise*.
712
- :param pulumi.Input[Mapping[str, Any]] options: An object that holds option settings.
717
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: An object that holds option settings.
713
718
  :param pulumi.Input[str] path: Full path where the KV-V2 secret will be written.
714
719
  """
715
720
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -753,7 +758,7 @@ class SecretV2(pulumi.CustomResource):
753
758
 
754
759
  @property
755
760
  @pulumi.getter
756
- def data(self) -> pulumi.Output[Mapping[str, Any]]:
761
+ def data(self) -> pulumi.Output[Mapping[str, str]]:
757
762
  """
758
763
  A mapping whose keys are the top-level data keys returned from
759
764
  Vault and whose values are the corresponding values. This map can only
@@ -791,7 +796,7 @@ class SecretV2(pulumi.CustomResource):
791
796
 
792
797
  @property
793
798
  @pulumi.getter
794
- def metadata(self) -> pulumi.Output[Mapping[str, Any]]:
799
+ def metadata(self) -> pulumi.Output[Mapping[str, str]]:
795
800
  """
796
801
  Metadata associated with this secret read from Vault.
797
802
  """
@@ -829,7 +834,7 @@ class SecretV2(pulumi.CustomResource):
829
834
 
830
835
  @property
831
836
  @pulumi.getter
832
- def options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
837
+ def options(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
833
838
  """
834
839
  An object that holds option settings.
835
840
  """
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendArgs', 'AuthBackend']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendGroupArgs', 'AuthBackendGroup']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendUserArgs', 'AuthBackendUser']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -150,9 +155,6 @@ def get_dynamic_credentials(mount: Optional[str] = None,
150
155
  password=pulumi.get(__ret__, 'password'),
151
156
  role_name=pulumi.get(__ret__, 'role_name'),
152
157
  username=pulumi.get(__ret__, 'username'))
153
-
154
-
155
- @_utilities.lift_output_func(get_dynamic_credentials)
156
158
  def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None,
157
159
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
158
160
  role_name: Optional[pulumi.Input[str]] = None,
@@ -160,4 +162,20 @@ def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None,
160
162
  """
161
163
  Use this data source to access information about an existing resource.
162
164
  """
163
- ...
165
+ __args__ = dict()
166
+ __args__['mount'] = mount
167
+ __args__['namespace'] = namespace
168
+ __args__['roleName'] = role_name
169
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
170
+ __ret__ = pulumi.runtime.invoke_output('vault:ldap/getDynamicCredentials:getDynamicCredentials', __args__, opts=opts, typ=GetDynamicCredentialsResult)
171
+ return __ret__.apply(lambda __response__: GetDynamicCredentialsResult(
172
+ distinguished_names=pulumi.get(__response__, 'distinguished_names'),
173
+ id=pulumi.get(__response__, 'id'),
174
+ lease_duration=pulumi.get(__response__, 'lease_duration'),
175
+ lease_id=pulumi.get(__response__, 'lease_id'),
176
+ lease_renewable=pulumi.get(__response__, 'lease_renewable'),
177
+ mount=pulumi.get(__response__, 'mount'),
178
+ namespace=pulumi.get(__response__, 'namespace'),
179
+ password=pulumi.get(__response__, 'password'),
180
+ role_name=pulumi.get(__response__, 'role_name'),
181
+ username=pulumi.get(__response__, 'username')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -160,9 +165,6 @@ def get_static_credentials(mount: Optional[str] = None,
160
165
  rotation_period=pulumi.get(__ret__, 'rotation_period'),
161
166
  ttl=pulumi.get(__ret__, 'ttl'),
162
167
  username=pulumi.get(__ret__, 'username'))
163
-
164
-
165
- @_utilities.lift_output_func(get_static_credentials)
166
168
  def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None,
167
169
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
168
170
  role_name: Optional[pulumi.Input[str]] = None,
@@ -170,4 +172,21 @@ def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None,
170
172
  """
171
173
  Use this data source to access information about an existing resource.
172
174
  """
173
- ...
175
+ __args__ = dict()
176
+ __args__['mount'] = mount
177
+ __args__['namespace'] = namespace
178
+ __args__['roleName'] = role_name
179
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
180
+ __ret__ = pulumi.runtime.invoke_output('vault:ldap/getStaticCredentials:getStaticCredentials', __args__, opts=opts, typ=GetStaticCredentialsResult)
181
+ return __ret__.apply(lambda __response__: GetStaticCredentialsResult(
182
+ dn=pulumi.get(__response__, 'dn'),
183
+ id=pulumi.get(__response__, 'id'),
184
+ last_password=pulumi.get(__response__, 'last_password'),
185
+ last_vault_rotation=pulumi.get(__response__, 'last_vault_rotation'),
186
+ mount=pulumi.get(__response__, 'mount'),
187
+ namespace=pulumi.get(__response__, 'namespace'),
188
+ password=pulumi.get(__response__, 'password'),
189
+ role_name=pulumi.get(__response__, 'role_name'),
190
+ rotation_period=pulumi.get(__response__, 'rotation_period'),
191
+ ttl=pulumi.get(__response__, 'ttl'),
192
+ username=pulumi.get(__response__, 'username')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -35,7 +40,7 @@ class SecretBackendArgs:
35
40
  local: Optional[pulumi.Input[bool]] = None,
36
41
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
37
42
  namespace: Optional[pulumi.Input[str]] = None,
38
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
43
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
39
44
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
40
45
  password_policy: Optional[pulumi.Input[str]] = None,
41
46
  path: Optional[pulumi.Input[str]] = None,
@@ -79,7 +84,7 @@ class SecretBackendArgs:
79
84
  The value should not contain leading or trailing forward slashes.
80
85
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
81
86
  *Available only for Vault Enterprise*.
82
- :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
87
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
83
88
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
84
89
  :param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
85
90
  :param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
@@ -428,14 +433,14 @@ class SecretBackendArgs:
428
433
 
429
434
  @property
430
435
  @pulumi.getter
431
- def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
436
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
432
437
  """
433
438
  Specifies mount type specific options that are passed to the backend
434
439
  """
435
440
  return pulumi.get(self, "options")
436
441
 
437
442
  @options.setter
438
- def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
443
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
439
444
  pulumi.set(self, "options", value)
440
445
 
441
446
  @property
@@ -624,7 +629,7 @@ class _SecretBackendState:
624
629
  local: Optional[pulumi.Input[bool]] = None,
625
630
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
626
631
  namespace: Optional[pulumi.Input[str]] = None,
627
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
632
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
628
633
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
629
634
  password_policy: Optional[pulumi.Input[str]] = None,
630
635
  path: Optional[pulumi.Input[str]] = None,
@@ -669,7 +674,7 @@ class _SecretBackendState:
669
674
  The value should not contain leading or trailing forward slashes.
670
675
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
671
676
  *Available only for Vault Enterprise*.
672
- :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
677
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
673
678
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
674
679
  :param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
675
680
  :param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
@@ -1034,14 +1039,14 @@ class _SecretBackendState:
1034
1039
 
1035
1040
  @property
1036
1041
  @pulumi.getter
1037
- def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
1042
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
1038
1043
  """
1039
1044
  Specifies mount type specific options that are passed to the backend
1040
1045
  """
1041
1046
  return pulumi.get(self, "options")
1042
1047
 
1043
1048
  @options.setter
1044
- def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
1049
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
1045
1050
  pulumi.set(self, "options", value)
1046
1051
 
1047
1052
  @property
@@ -1231,7 +1236,7 @@ class SecretBackend(pulumi.CustomResource):
1231
1236
  local: Optional[pulumi.Input[bool]] = None,
1232
1237
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1233
1238
  namespace: Optional[pulumi.Input[str]] = None,
1234
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1239
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1235
1240
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1236
1241
  password_policy: Optional[pulumi.Input[str]] = None,
1237
1242
  path: Optional[pulumi.Input[str]] = None,
@@ -1300,7 +1305,7 @@ class SecretBackend(pulumi.CustomResource):
1300
1305
  The value should not contain leading or trailing forward slashes.
1301
1306
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1302
1307
  *Available only for Vault Enterprise*.
1303
- :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
1308
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
1304
1309
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1305
1310
  :param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
1306
1311
  :param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
@@ -1385,7 +1390,7 @@ class SecretBackend(pulumi.CustomResource):
1385
1390
  local: Optional[pulumi.Input[bool]] = None,
1386
1391
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1387
1392
  namespace: Optional[pulumi.Input[str]] = None,
1388
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1393
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1389
1394
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1390
1395
  password_policy: Optional[pulumi.Input[str]] = None,
1391
1396
  path: Optional[pulumi.Input[str]] = None,
@@ -1482,7 +1487,7 @@ class SecretBackend(pulumi.CustomResource):
1482
1487
  local: Optional[pulumi.Input[bool]] = None,
1483
1488
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1484
1489
  namespace: Optional[pulumi.Input[str]] = None,
1485
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1490
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1486
1491
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1487
1492
  password_policy: Optional[pulumi.Input[str]] = None,
1488
1493
  path: Optional[pulumi.Input[str]] = None,
@@ -1532,7 +1537,7 @@ class SecretBackend(pulumi.CustomResource):
1532
1537
  The value should not contain leading or trailing forward slashes.
1533
1538
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1534
1539
  *Available only for Vault Enterprise*.
1535
- :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
1540
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
1536
1541
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1537
1542
  :param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
1538
1543
  :param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
@@ -1778,7 +1783,7 @@ class SecretBackend(pulumi.CustomResource):
1778
1783
 
1779
1784
  @property
1780
1785
  @pulumi.getter
1781
- def options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
1786
+ def options(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1782
1787
  """
1783
1788
  Specifies mount type specific options that are passed to the backend
1784
1789
  """
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendDynamicRoleArgs', 'SecretBackendDynamicRole']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendLibrarySetArgs', 'SecretBackendLibrarySet']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']