pulumi-vault 6.3.0a1723109142__py3-none-any.whl → 6.3.1a1728636480__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +560 -0
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +19 -4
  4. pulumi_vault/ad/secret_backend.py +5 -0
  5. pulumi_vault/ad/secret_library.py +5 -0
  6. pulumi_vault/ad/secret_role.py +5 -0
  7. pulumi_vault/alicloud/auth_backend_role.py +5 -0
  8. pulumi_vault/approle/auth_backend_login.py +5 -0
  9. pulumi_vault/approle/auth_backend_role.py +5 -0
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
  11. pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
  12. pulumi_vault/audit.py +5 -0
  13. pulumi_vault/audit_request_header.py +5 -0
  14. pulumi_vault/auth_backend.py +10 -5
  15. pulumi_vault/aws/auth_backend_cert.py +5 -0
  16. pulumi_vault/aws/auth_backend_client.py +5 -0
  17. pulumi_vault/aws/auth_backend_config_identity.py +5 -0
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
  19. pulumi_vault/aws/auth_backend_login.py +12 -7
  20. pulumi_vault/aws/auth_backend_role.py +5 -0
  21. pulumi_vault/aws/auth_backend_role_tag.py +5 -0
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
  23. pulumi_vault/aws/auth_backend_sts_role.py +5 -0
  24. pulumi_vault/aws/get_access_credentials.py +31 -4
  25. pulumi_vault/aws/get_static_access_credentials.py +18 -4
  26. pulumi_vault/aws/secret_backend.py +5 -0
  27. pulumi_vault/aws/secret_backend_role.py +5 -0
  28. pulumi_vault/aws/secret_backend_static_role.py +5 -0
  29. pulumi_vault/azure/_inputs.py +24 -0
  30. pulumi_vault/azure/auth_backend_config.py +5 -0
  31. pulumi_vault/azure/auth_backend_role.py +5 -0
  32. pulumi_vault/azure/backend.py +5 -0
  33. pulumi_vault/azure/backend_role.py +23 -18
  34. pulumi_vault/azure/get_access_credentials.py +36 -4
  35. pulumi_vault/azure/outputs.py +5 -0
  36. pulumi_vault/cert_auth_backend_role.py +5 -0
  37. pulumi_vault/config/__init__.pyi +5 -0
  38. pulumi_vault/config/_inputs.py +21 -0
  39. pulumi_vault/config/outputs.py +5 -0
  40. pulumi_vault/config/ui_custom_message.py +24 -19
  41. pulumi_vault/config/vars.py +5 -0
  42. pulumi_vault/consul/secret_backend.py +5 -0
  43. pulumi_vault/consul/secret_backend_role.py +5 -0
  44. pulumi_vault/database/_inputs.py +2091 -140
  45. pulumi_vault/database/outputs.py +59 -54
  46. pulumi_vault/database/secret_backend_connection.py +115 -110
  47. pulumi_vault/database/secret_backend_role.py +25 -20
  48. pulumi_vault/database/secret_backend_static_role.py +11 -6
  49. pulumi_vault/database/secrets_mount.py +139 -134
  50. pulumi_vault/egp_policy.py +5 -0
  51. pulumi_vault/gcp/_inputs.py +111 -0
  52. pulumi_vault/gcp/auth_backend.py +15 -10
  53. pulumi_vault/gcp/auth_backend_role.py +5 -0
  54. pulumi_vault/gcp/get_auth_backend_role.py +42 -4
  55. pulumi_vault/gcp/outputs.py +5 -0
  56. pulumi_vault/gcp/secret_backend.py +5 -0
  57. pulumi_vault/gcp/secret_impersonated_account.py +5 -0
  58. pulumi_vault/gcp/secret_roleset.py +18 -13
  59. pulumi_vault/gcp/secret_static_account.py +18 -13
  60. pulumi_vault/generic/endpoint.py +5 -0
  61. pulumi_vault/generic/get_secret.py +25 -5
  62. pulumi_vault/generic/secret.py +12 -7
  63. pulumi_vault/get_auth_backend.py +21 -4
  64. pulumi_vault/get_auth_backends.py +16 -4
  65. pulumi_vault/get_namespace.py +18 -5
  66. pulumi_vault/get_namespaces.py +13 -4
  67. pulumi_vault/get_nomad_access_token.py +28 -8
  68. pulumi_vault/get_policy_document.py +27 -16
  69. pulumi_vault/get_raft_autopilot_state.py +26 -7
  70. pulumi_vault/github/_inputs.py +55 -0
  71. pulumi_vault/github/auth_backend.py +10 -5
  72. pulumi_vault/github/outputs.py +5 -0
  73. pulumi_vault/github/team.py +5 -0
  74. pulumi_vault/github/user.py +5 -0
  75. pulumi_vault/identity/entity.py +5 -0
  76. pulumi_vault/identity/entity_alias.py +5 -0
  77. pulumi_vault/identity/entity_policies.py +5 -0
  78. pulumi_vault/identity/get_entity.py +35 -5
  79. pulumi_vault/identity/get_group.py +42 -6
  80. pulumi_vault/identity/get_oidc_client_creds.py +16 -4
  81. pulumi_vault/identity/get_oidc_openid_config.py +26 -4
  82. pulumi_vault/identity/get_oidc_public_keys.py +16 -5
  83. pulumi_vault/identity/group.py +5 -0
  84. pulumi_vault/identity/group_alias.py +5 -0
  85. pulumi_vault/identity/group_member_entity_ids.py +5 -0
  86. pulumi_vault/identity/group_member_group_ids.py +5 -0
  87. pulumi_vault/identity/group_policies.py +5 -0
  88. pulumi_vault/identity/mfa_duo.py +5 -0
  89. pulumi_vault/identity/mfa_login_enforcement.py +5 -0
  90. pulumi_vault/identity/mfa_okta.py +5 -0
  91. pulumi_vault/identity/mfa_pingid.py +5 -0
  92. pulumi_vault/identity/mfa_totp.py +5 -0
  93. pulumi_vault/identity/oidc.py +5 -0
  94. pulumi_vault/identity/oidc_assignment.py +5 -0
  95. pulumi_vault/identity/oidc_client.py +5 -0
  96. pulumi_vault/identity/oidc_key.py +5 -0
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
  98. pulumi_vault/identity/oidc_provider.py +5 -0
  99. pulumi_vault/identity/oidc_role.py +5 -0
  100. pulumi_vault/identity/oidc_scope.py +5 -0
  101. pulumi_vault/identity/outputs.py +8 -3
  102. pulumi_vault/jwt/_inputs.py +55 -0
  103. pulumi_vault/jwt/auth_backend.py +14 -9
  104. pulumi_vault/jwt/auth_backend_role.py +33 -28
  105. pulumi_vault/jwt/outputs.py +5 -0
  106. pulumi_vault/kmip/secret_backend.py +5 -0
  107. pulumi_vault/kmip/secret_role.py +5 -0
  108. pulumi_vault/kmip/secret_scope.py +5 -0
  109. pulumi_vault/kubernetes/auth_backend_config.py +5 -0
  110. pulumi_vault/kubernetes/auth_backend_role.py +5 -0
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
  113. pulumi_vault/kubernetes/get_service_account_token.py +28 -4
  114. pulumi_vault/kubernetes/secret_backend.py +19 -14
  115. pulumi_vault/kubernetes/secret_backend_role.py +5 -0
  116. pulumi_vault/kv/_inputs.py +36 -4
  117. pulumi_vault/kv/get_secret.py +20 -5
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
  119. pulumi_vault/kv/get_secret_v2.py +27 -6
  120. pulumi_vault/kv/get_secrets_list.py +15 -4
  121. pulumi_vault/kv/get_secrets_list_v2.py +18 -4
  122. pulumi_vault/kv/outputs.py +8 -3
  123. pulumi_vault/kv/secret.py +12 -7
  124. pulumi_vault/kv/secret_backend_v2.py +5 -0
  125. pulumi_vault/kv/secret_v2.py +46 -41
  126. pulumi_vault/ldap/auth_backend.py +5 -0
  127. pulumi_vault/ldap/auth_backend_group.py +5 -0
  128. pulumi_vault/ldap/auth_backend_user.py +5 -0
  129. pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
  130. pulumi_vault/ldap/get_static_credentials.py +23 -4
  131. pulumi_vault/ldap/secret_backend.py +19 -14
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
  133. pulumi_vault/ldap/secret_backend_library_set.py +5 -0
  134. pulumi_vault/ldap/secret_backend_static_role.py +5 -0
  135. pulumi_vault/managed/_inputs.py +205 -0
  136. pulumi_vault/managed/keys.py +20 -15
  137. pulumi_vault/managed/outputs.py +5 -0
  138. pulumi_vault/mfa_duo.py +5 -0
  139. pulumi_vault/mfa_okta.py +5 -0
  140. pulumi_vault/mfa_pingid.py +5 -0
  141. pulumi_vault/mfa_totp.py +5 -0
  142. pulumi_vault/mongodbatlas/secret_backend.py +5 -0
  143. pulumi_vault/mongodbatlas/secret_role.py +5 -0
  144. pulumi_vault/mount.py +21 -16
  145. pulumi_vault/namespace.py +19 -14
  146. pulumi_vault/nomad_secret_backend.py +5 -0
  147. pulumi_vault/nomad_secret_role.py +5 -0
  148. pulumi_vault/okta/_inputs.py +39 -0
  149. pulumi_vault/okta/auth_backend.py +31 -26
  150. pulumi_vault/okta/auth_backend_group.py +5 -0
  151. pulumi_vault/okta/auth_backend_user.py +5 -0
  152. pulumi_vault/okta/outputs.py +5 -0
  153. pulumi_vault/outputs.py +5 -0
  154. pulumi_vault/password_policy.py +5 -0
  155. pulumi_vault/pkisecret/_inputs.py +49 -8
  156. pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
  157. pulumi_vault/pkisecret/backend_config_est.py +24 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
  159. pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
  160. pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
  161. pulumi_vault/pkisecret/get_backend_key.py +19 -4
  162. pulumi_vault/pkisecret/get_backend_keys.py +18 -5
  163. pulumi_vault/pkisecret/outputs.py +17 -12
  164. pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
  172. pulumi_vault/pkisecret/secret_backend_key.py +5 -0
  173. pulumi_vault/pkisecret/secret_backend_role.py +10 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
  176. pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
  177. pulumi_vault/plugin.py +5 -0
  178. pulumi_vault/plugin_pinned_version.py +5 -0
  179. pulumi_vault/policy.py +5 -0
  180. pulumi_vault/provider.py +47 -42
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +5 -0
  183. pulumi_vault/quota_rate_limit.py +5 -0
  184. pulumi_vault/rabbitmq/_inputs.py +61 -0
  185. pulumi_vault/rabbitmq/outputs.py +5 -0
  186. pulumi_vault/rabbitmq/secret_backend.py +5 -0
  187. pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
  188. pulumi_vault/raft_autopilot.py +5 -0
  189. pulumi_vault/raft_snapshot_agent_config.py +5 -0
  190. pulumi_vault/rgp_policy.py +5 -0
  191. pulumi_vault/saml/auth_backend.py +5 -0
  192. pulumi_vault/saml/auth_backend_role.py +19 -14
  193. pulumi_vault/secrets/_inputs.py +30 -0
  194. pulumi_vault/secrets/outputs.py +5 -0
  195. pulumi_vault/secrets/sync_association.py +7 -2
  196. pulumi_vault/secrets/sync_aws_destination.py +19 -14
  197. pulumi_vault/secrets/sync_azure_destination.py +19 -14
  198. pulumi_vault/secrets/sync_config.py +5 -0
  199. pulumi_vault/secrets/sync_gcp_destination.py +19 -14
  200. pulumi_vault/secrets/sync_gh_destination.py +5 -0
  201. pulumi_vault/secrets/sync_github_apps.py +5 -0
  202. pulumi_vault/secrets/sync_vercel_destination.py +5 -0
  203. pulumi_vault/ssh/_inputs.py +22 -0
  204. pulumi_vault/ssh/outputs.py +5 -0
  205. pulumi_vault/ssh/secret_backend_ca.py +5 -0
  206. pulumi_vault/ssh/secret_backend_role.py +38 -33
  207. pulumi_vault/terraformcloud/secret_backend.py +5 -0
  208. pulumi_vault/terraformcloud/secret_creds.py +5 -0
  209. pulumi_vault/terraformcloud/secret_role.py +5 -0
  210. pulumi_vault/token.py +5 -0
  211. pulumi_vault/tokenauth/auth_backend_role.py +5 -14
  212. pulumi_vault/transform/alphabet.py +5 -0
  213. pulumi_vault/transform/get_decode.py +38 -14
  214. pulumi_vault/transform/get_encode.py +38 -14
  215. pulumi_vault/transform/role.py +5 -0
  216. pulumi_vault/transform/template.py +19 -14
  217. pulumi_vault/transform/transformation.py +5 -0
  218. pulumi_vault/transit/get_decrypt.py +21 -4
  219. pulumi_vault/transit/get_encrypt.py +23 -4
  220. pulumi_vault/transit/secret_backend_key.py +12 -7
  221. pulumi_vault/transit/secret_cache_config.py +5 -0
  222. {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1a1728636480.dist-info}/METADATA +3 -2
  223. pulumi_vault-6.3.1a1728636480.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1a1728636480.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.3.0a1723109142.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1a1728636480.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -31,7 +36,7 @@ class SecretBackendArgs:
31
36
  local: Optional[pulumi.Input[bool]] = None,
32
37
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
33
38
  namespace: Optional[pulumi.Input[str]] = None,
34
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
39
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
35
40
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
36
41
  plugin_version: Optional[pulumi.Input[str]] = None,
37
42
  seal_wrap: Optional[pulumi.Input[bool]] = None,
@@ -64,7 +69,7 @@ class SecretBackendArgs:
64
69
  The value should not contain leading or trailing forward slashes.
65
70
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
66
71
  *Available only for Vault Enterprise*.
67
- :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
72
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
68
73
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
69
74
  :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
70
75
  :param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
@@ -331,14 +336,14 @@ class SecretBackendArgs:
331
336
 
332
337
  @property
333
338
  @pulumi.getter
334
- def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
339
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
335
340
  """
336
341
  Specifies mount type specific options that are passed to the backend
337
342
  """
338
343
  return pulumi.get(self, "options")
339
344
 
340
345
  @options.setter
341
- def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
346
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
342
347
  pulumi.set(self, "options", value)
343
348
 
344
349
  @property
@@ -412,7 +417,7 @@ class _SecretBackendState:
412
417
  local: Optional[pulumi.Input[bool]] = None,
413
418
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
414
419
  namespace: Optional[pulumi.Input[str]] = None,
415
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
420
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
416
421
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
417
422
  path: Optional[pulumi.Input[str]] = None,
418
423
  plugin_version: Optional[pulumi.Input[str]] = None,
@@ -446,7 +451,7 @@ class _SecretBackendState:
446
451
  The value should not contain leading or trailing forward slashes.
447
452
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
448
453
  *Available only for Vault Enterprise*.
449
- :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
454
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
450
455
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
451
456
  :param pulumi.Input[str] path: Where the secret backend will be mounted
452
457
  :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
@@ -717,14 +722,14 @@ class _SecretBackendState:
717
722
 
718
723
  @property
719
724
  @pulumi.getter
720
- def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
725
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
721
726
  """
722
727
  Specifies mount type specific options that are passed to the backend
723
728
  """
724
729
  return pulumi.get(self, "options")
725
730
 
726
731
  @options.setter
727
- def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
732
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
728
733
  pulumi.set(self, "options", value)
729
734
 
730
735
  @property
@@ -811,7 +816,7 @@ class SecretBackend(pulumi.CustomResource):
811
816
  local: Optional[pulumi.Input[bool]] = None,
812
817
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
813
818
  namespace: Optional[pulumi.Input[str]] = None,
814
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
819
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
815
820
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
816
821
  path: Optional[pulumi.Input[str]] = None,
817
822
  plugin_version: Optional[pulumi.Input[str]] = None,
@@ -872,7 +877,7 @@ class SecretBackend(pulumi.CustomResource):
872
877
  The value should not contain leading or trailing forward slashes.
873
878
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
874
879
  *Available only for Vault Enterprise*.
875
- :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
880
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
876
881
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
877
882
  :param pulumi.Input[str] path: Where the secret backend will be mounted
878
883
  :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
@@ -945,7 +950,7 @@ class SecretBackend(pulumi.CustomResource):
945
950
  local: Optional[pulumi.Input[bool]] = None,
946
951
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
947
952
  namespace: Optional[pulumi.Input[str]] = None,
948
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
953
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
949
954
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
950
955
  path: Optional[pulumi.Input[str]] = None,
951
956
  plugin_version: Optional[pulumi.Input[str]] = None,
@@ -1014,7 +1019,7 @@ class SecretBackend(pulumi.CustomResource):
1014
1019
  local: Optional[pulumi.Input[bool]] = None,
1015
1020
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1016
1021
  namespace: Optional[pulumi.Input[str]] = None,
1017
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1022
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1018
1023
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1019
1024
  path: Optional[pulumi.Input[str]] = None,
1020
1025
  plugin_version: Optional[pulumi.Input[str]] = None,
@@ -1053,7 +1058,7 @@ class SecretBackend(pulumi.CustomResource):
1053
1058
  The value should not contain leading or trailing forward slashes.
1054
1059
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1055
1060
  *Available only for Vault Enterprise*.
1056
- :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
1061
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
1057
1062
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1058
1063
  :param pulumi.Input[str] path: Where the secret backend will be mounted
1059
1064
  :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
@@ -1238,7 +1243,7 @@ class SecretBackend(pulumi.CustomResource):
1238
1243
 
1239
1244
  @property
1240
1245
  @pulumi.getter
1241
- def options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
1246
+ def options(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1242
1247
  """
1243
1248
  Specifies mount type specific options that are passed to the backend
1244
1249
  """
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
@@ -4,25 +4,57 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
13
18
  'SecretV2CustomMetadataArgs',
19
+ 'SecretV2CustomMetadataArgsDict',
14
20
  ]
15
21
 
22
+ MYPY = False
23
+
24
+ if not MYPY:
25
+ class SecretV2CustomMetadataArgsDict(TypedDict):
26
+ cas_required: NotRequired[pulumi.Input[bool]]
27
+ """
28
+ If true, all keys will require the cas parameter to be set on all write requests.
29
+ """
30
+ data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
31
+ """
32
+ A mapping whose keys are the top-level data keys returned from
33
+ Vault and whose values are the corresponding values. This map can only
34
+ represent string data, so any non-string values returned from Vault are
35
+ serialized as JSON.
36
+ """
37
+ delete_version_after: NotRequired[pulumi.Input[int]]
38
+ """
39
+ If set, specifies the length of time before a version is deleted.
40
+ """
41
+ max_versions: NotRequired[pulumi.Input[int]]
42
+ """
43
+ The number of versions to keep per key.
44
+ """
45
+ elif False:
46
+ SecretV2CustomMetadataArgsDict: TypeAlias = Mapping[str, Any]
47
+
16
48
  @pulumi.input_type
17
49
  class SecretV2CustomMetadataArgs:
18
50
  def __init__(__self__, *,
19
51
  cas_required: Optional[pulumi.Input[bool]] = None,
20
- data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
52
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
21
53
  delete_version_after: Optional[pulumi.Input[int]] = None,
22
54
  max_versions: Optional[pulumi.Input[int]] = None):
23
55
  """
24
56
  :param pulumi.Input[bool] cas_required: If true, all keys will require the cas parameter to be set on all write requests.
25
- :param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
57
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
26
58
  Vault and whose values are the corresponding values. This map can only
27
59
  represent string data, so any non-string values returned from Vault are
28
60
  serialized as JSON.
@@ -52,7 +84,7 @@ class SecretV2CustomMetadataArgs:
52
84
 
53
85
  @property
54
86
  @pulumi.getter
55
- def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
87
+ def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
56
88
  """
57
89
  A mapping whose keys are the top-level data keys returned from
58
90
  Vault and whose values are the corresponding values. This map can only
@@ -62,7 +94,7 @@ class SecretV2CustomMetadataArgs:
62
94
  return pulumi.get(self, "data")
63
95
 
64
96
  @data.setter
65
- def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
97
+ def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
66
98
  pulumi.set(self, "data", value)
67
99
 
68
100
  @property
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -49,7 +54,7 @@ class GetSecretResult:
49
54
 
50
55
  @property
51
56
  @pulumi.getter
52
- def data(self) -> Mapping[str, Any]:
57
+ def data(self) -> Mapping[str, str]:
53
58
  """
54
59
  A mapping whose keys are the top-level data keys returned from
55
60
  Vault and whose values are the corresponding values. This map can only
@@ -181,9 +186,6 @@ def get_secret(namespace: Optional[str] = None,
181
186
  lease_renewable=pulumi.get(__ret__, 'lease_renewable'),
182
187
  namespace=pulumi.get(__ret__, 'namespace'),
183
188
  path=pulumi.get(__ret__, 'path'))
184
-
185
-
186
- @_utilities.lift_output_func(get_secret)
187
189
  def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
188
190
  path: Optional[pulumi.Input[str]] = None,
189
191
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretResult]:
@@ -222,4 +224,17 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
222
224
  *Available only for Vault Enterprise*.
223
225
  :param str path: Full path of the KV-V1 secret.
224
226
  """
225
- ...
227
+ __args__ = dict()
228
+ __args__['namespace'] = namespace
229
+ __args__['path'] = path
230
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
231
+ __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult)
232
+ return __ret__.apply(lambda __response__: GetSecretResult(
233
+ data=pulumi.get(__response__, 'data'),
234
+ data_json=pulumi.get(__response__, 'data_json'),
235
+ id=pulumi.get(__response__, 'id'),
236
+ lease_duration=pulumi.get(__response__, 'lease_duration'),
237
+ lease_id=pulumi.get(__response__, 'lease_id'),
238
+ lease_renewable=pulumi.get(__response__, 'lease_renewable'),
239
+ namespace=pulumi.get(__response__, 'namespace'),
240
+ path=pulumi.get(__response__, 'path')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -52,7 +57,7 @@ class GetSecretSubkeysV2Result:
52
57
 
53
58
  @property
54
59
  @pulumi.getter
55
- def data(self) -> Mapping[str, Any]:
60
+ def data(self) -> Mapping[str, str]:
56
61
  """
57
62
  Subkeys for the KV-V2 secret stored as a serialized map of strings.
58
63
  """
@@ -197,9 +202,6 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
197
202
  namespace=pulumi.get(__ret__, 'namespace'),
198
203
  path=pulumi.get(__ret__, 'path'),
199
204
  version=pulumi.get(__ret__, 'version'))
200
-
201
-
202
- @_utilities.lift_output_func(get_secret_subkeys_v2)
203
205
  def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] = None,
204
206
  mount: Optional[pulumi.Input[str]] = None,
205
207
  name: Optional[pulumi.Input[str]] = None,
@@ -253,4 +255,21 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
253
255
  :param int version: Specifies the version to return. If not
254
256
  set the latest version is returned.
255
257
  """
256
- ...
258
+ __args__ = dict()
259
+ __args__['depth'] = depth
260
+ __args__['mount'] = mount
261
+ __args__['name'] = name
262
+ __args__['namespace'] = namespace
263
+ __args__['version'] = version
264
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
265
+ __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretSubkeysV2:getSecretSubkeysV2', __args__, opts=opts, typ=GetSecretSubkeysV2Result)
266
+ return __ret__.apply(lambda __response__: GetSecretSubkeysV2Result(
267
+ data=pulumi.get(__response__, 'data'),
268
+ data_json=pulumi.get(__response__, 'data_json'),
269
+ depth=pulumi.get(__response__, 'depth'),
270
+ id=pulumi.get(__response__, 'id'),
271
+ mount=pulumi.get(__response__, 'mount'),
272
+ name=pulumi.get(__response__, 'name'),
273
+ namespace=pulumi.get(__response__, 'namespace'),
274
+ path=pulumi.get(__response__, 'path'),
275
+ version=pulumi.get(__response__, 'version')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -69,7 +74,7 @@ class GetSecretV2Result:
69
74
 
70
75
  @property
71
76
  @pulumi.getter(name="customMetadata")
72
- def custom_metadata(self) -> Mapping[str, Any]:
77
+ def custom_metadata(self) -> Mapping[str, str]:
73
78
  """
74
79
  Custom metadata for the secret.
75
80
  """
@@ -77,7 +82,7 @@ class GetSecretV2Result:
77
82
 
78
83
  @property
79
84
  @pulumi.getter
80
- def data(self) -> Mapping[str, Any]:
85
+ def data(self) -> Mapping[str, str]:
81
86
  """
82
87
  A mapping whose keys are the top-level data keys returned from
83
88
  Vault and whose values are the corresponding values. This map can only
@@ -241,9 +246,6 @@ def get_secret_v2(mount: Optional[str] = None,
241
246
  namespace=pulumi.get(__ret__, 'namespace'),
242
247
  path=pulumi.get(__ret__, 'path'),
243
248
  version=pulumi.get(__ret__, 'version'))
244
-
245
-
246
- @_utilities.lift_output_func(get_secret_v2)
247
249
  def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
248
250
  name: Optional[pulumi.Input[str]] = None,
249
251
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
@@ -293,4 +295,23 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
293
295
  *Available only for Vault Enterprise*.
294
296
  :param int version: Version of the secret to retrieve.
295
297
  """
296
- ...
298
+ __args__ = dict()
299
+ __args__['mount'] = mount
300
+ __args__['name'] = name
301
+ __args__['namespace'] = namespace
302
+ __args__['version'] = version
303
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
304
+ __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretV2:getSecretV2', __args__, opts=opts, typ=GetSecretV2Result)
305
+ return __ret__.apply(lambda __response__: GetSecretV2Result(
306
+ created_time=pulumi.get(__response__, 'created_time'),
307
+ custom_metadata=pulumi.get(__response__, 'custom_metadata'),
308
+ data=pulumi.get(__response__, 'data'),
309
+ data_json=pulumi.get(__response__, 'data_json'),
310
+ deletion_time=pulumi.get(__response__, 'deletion_time'),
311
+ destroyed=pulumi.get(__response__, 'destroyed'),
312
+ id=pulumi.get(__response__, 'id'),
313
+ mount=pulumi.get(__response__, 'mount'),
314
+ name=pulumi.get(__response__, 'name'),
315
+ namespace=pulumi.get(__response__, 'namespace'),
316
+ path=pulumi.get(__response__, 'path'),
317
+ version=pulumi.get(__response__, 'version')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -127,9 +132,6 @@ def get_secrets_list(namespace: Optional[str] = None,
127
132
  names=pulumi.get(__ret__, 'names'),
128
133
  namespace=pulumi.get(__ret__, 'namespace'),
129
134
  path=pulumi.get(__ret__, 'path'))
130
-
131
-
132
- @_utilities.lift_output_func(get_secrets_list)
133
135
  def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
134
136
  path: Optional[pulumi.Input[str]] = None,
135
137
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretsListResult]:
@@ -172,4 +174,13 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
172
174
  *Available only for Vault Enterprise*.
173
175
  :param str path: Full KV-V1 path where secrets will be listed.
174
176
  """
175
- ...
177
+ __args__ = dict()
178
+ __args__['namespace'] = namespace
179
+ __args__['path'] = path
180
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
181
+ __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretsList:getSecretsList', __args__, opts=opts, typ=GetSecretsListResult)
182
+ return __ret__.apply(lambda __response__: GetSecretsListResult(
183
+ id=pulumi.get(__response__, 'id'),
184
+ names=pulumi.get(__response__, 'names'),
185
+ namespace=pulumi.get(__response__, 'namespace'),
186
+ path=pulumi.get(__response__, 'path')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -166,9 +171,6 @@ def get_secrets_list_v2(mount: Optional[str] = None,
166
171
  names=pulumi.get(__ret__, 'names'),
167
172
  namespace=pulumi.get(__ret__, 'namespace'),
168
173
  path=pulumi.get(__ret__, 'path'))
169
-
170
-
171
- @_utilities.lift_output_func(get_secrets_list_v2)
172
174
  def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
173
175
  name: Optional[pulumi.Input[Optional[str]]] = None,
174
176
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
@@ -226,4 +228,16 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
226
228
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
227
229
  *Available only for Vault Enterprise*.
228
230
  """
229
- ...
231
+ __args__ = dict()
232
+ __args__['mount'] = mount
233
+ __args__['name'] = name
234
+ __args__['namespace'] = namespace
235
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
236
+ __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretsListV2:getSecretsListV2', __args__, opts=opts, typ=GetSecretsListV2Result)
237
+ return __ret__.apply(lambda __response__: GetSecretsListV2Result(
238
+ id=pulumi.get(__response__, 'id'),
239
+ mount=pulumi.get(__response__, 'mount'),
240
+ name=pulumi.get(__response__, 'name'),
241
+ names=pulumi.get(__response__, 'names'),
242
+ namespace=pulumi.get(__response__, 'namespace'),
243
+ path=pulumi.get(__response__, 'path')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -38,12 +43,12 @@ class SecretV2CustomMetadata(dict):
38
43
 
39
44
  def __init__(__self__, *,
40
45
  cas_required: Optional[bool] = None,
41
- data: Optional[Mapping[str, Any]] = None,
46
+ data: Optional[Mapping[str, str]] = None,
42
47
  delete_version_after: Optional[int] = None,
43
48
  max_versions: Optional[int] = None):
44
49
  """
45
50
  :param bool cas_required: If true, all keys will require the cas parameter to be set on all write requests.
46
- :param Mapping[str, Any] data: A mapping whose keys are the top-level data keys returned from
51
+ :param Mapping[str, str] data: A mapping whose keys are the top-level data keys returned from
47
52
  Vault and whose values are the corresponding values. This map can only
48
53
  represent string data, so any non-string values returned from Vault are
49
54
  serialized as JSON.
@@ -69,7 +74,7 @@ class SecretV2CustomMetadata(dict):
69
74
 
70
75
  @property
71
76
  @pulumi.getter
72
- def data(self) -> Optional[Mapping[str, Any]]:
77
+ def data(self) -> Optional[Mapping[str, str]]:
73
78
  """
74
79
  A mapping whose keys are the top-level data keys returned from
75
80
  Vault and whose values are the corresponding values. This map can only
pulumi_vault/kv/secret.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretArgs', 'Secret']
@@ -76,13 +81,13 @@ class SecretArgs:
76
81
  @pulumi.input_type
77
82
  class _SecretState:
78
83
  def __init__(__self__, *,
79
- data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
84
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
80
85
  data_json: Optional[pulumi.Input[str]] = None,
81
86
  namespace: Optional[pulumi.Input[str]] = None,
82
87
  path: Optional[pulumi.Input[str]] = None):
83
88
  """
84
89
  Input properties used for looking up and filtering Secret resources.
85
- :param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
90
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
86
91
  Vault and whose values are the corresponding values. This map can only
87
92
  represent string data, so any non-string values returned from Vault are
88
93
  serialized as JSON.
@@ -105,7 +110,7 @@ class _SecretState:
105
110
 
106
111
  @property
107
112
  @pulumi.getter
108
- def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
113
+ def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
109
114
  """
110
115
  A mapping whose keys are the top-level data keys returned from
111
116
  Vault and whose values are the corresponding values. This map can only
@@ -115,7 +120,7 @@ class _SecretState:
115
120
  return pulumi.get(self, "data")
116
121
 
117
122
  @data.setter
118
- def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
123
+ def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
119
124
  pulumi.set(self, "data", value)
120
125
 
121
126
  @property
@@ -317,7 +322,7 @@ class Secret(pulumi.CustomResource):
317
322
  def get(resource_name: str,
318
323
  id: pulumi.Input[str],
319
324
  opts: Optional[pulumi.ResourceOptions] = None,
320
- data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
325
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
321
326
  data_json: Optional[pulumi.Input[str]] = None,
322
327
  namespace: Optional[pulumi.Input[str]] = None,
323
328
  path: Optional[pulumi.Input[str]] = None) -> 'Secret':
@@ -328,7 +333,7 @@ class Secret(pulumi.CustomResource):
328
333
  :param str resource_name: The unique name of the resulting resource.
329
334
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
330
335
  :param pulumi.ResourceOptions opts: Options for the resource.
331
- :param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
336
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
332
337
  Vault and whose values are the corresponding values. This map can only
333
338
  represent string data, so any non-string values returned from Vault are
334
339
  serialized as JSON.
@@ -352,7 +357,7 @@ class Secret(pulumi.CustomResource):
352
357
 
353
358
  @property
354
359
  @pulumi.getter
355
- def data(self) -> pulumi.Output[Mapping[str, Any]]:
360
+ def data(self) -> pulumi.Output[Mapping[str, str]]:
356
361
  """
357
362
  A mapping whose keys are the top-level data keys returned from
358
363
  Vault and whose values are the corresponding values. This map can only
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendV2Args', 'SecretBackendV2']