pulumi-vault 6.3.0a1723109142__py3-none-any.whl → 6.3.1a1728636480__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +560 -0
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +19 -4
  4. pulumi_vault/ad/secret_backend.py +5 -0
  5. pulumi_vault/ad/secret_library.py +5 -0
  6. pulumi_vault/ad/secret_role.py +5 -0
  7. pulumi_vault/alicloud/auth_backend_role.py +5 -0
  8. pulumi_vault/approle/auth_backend_login.py +5 -0
  9. pulumi_vault/approle/auth_backend_role.py +5 -0
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
  11. pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
  12. pulumi_vault/audit.py +5 -0
  13. pulumi_vault/audit_request_header.py +5 -0
  14. pulumi_vault/auth_backend.py +10 -5
  15. pulumi_vault/aws/auth_backend_cert.py +5 -0
  16. pulumi_vault/aws/auth_backend_client.py +5 -0
  17. pulumi_vault/aws/auth_backend_config_identity.py +5 -0
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
  19. pulumi_vault/aws/auth_backend_login.py +12 -7
  20. pulumi_vault/aws/auth_backend_role.py +5 -0
  21. pulumi_vault/aws/auth_backend_role_tag.py +5 -0
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
  23. pulumi_vault/aws/auth_backend_sts_role.py +5 -0
  24. pulumi_vault/aws/get_access_credentials.py +31 -4
  25. pulumi_vault/aws/get_static_access_credentials.py +18 -4
  26. pulumi_vault/aws/secret_backend.py +5 -0
  27. pulumi_vault/aws/secret_backend_role.py +5 -0
  28. pulumi_vault/aws/secret_backend_static_role.py +5 -0
  29. pulumi_vault/azure/_inputs.py +24 -0
  30. pulumi_vault/azure/auth_backend_config.py +5 -0
  31. pulumi_vault/azure/auth_backend_role.py +5 -0
  32. pulumi_vault/azure/backend.py +5 -0
  33. pulumi_vault/azure/backend_role.py +23 -18
  34. pulumi_vault/azure/get_access_credentials.py +36 -4
  35. pulumi_vault/azure/outputs.py +5 -0
  36. pulumi_vault/cert_auth_backend_role.py +5 -0
  37. pulumi_vault/config/__init__.pyi +5 -0
  38. pulumi_vault/config/_inputs.py +21 -0
  39. pulumi_vault/config/outputs.py +5 -0
  40. pulumi_vault/config/ui_custom_message.py +24 -19
  41. pulumi_vault/config/vars.py +5 -0
  42. pulumi_vault/consul/secret_backend.py +5 -0
  43. pulumi_vault/consul/secret_backend_role.py +5 -0
  44. pulumi_vault/database/_inputs.py +2091 -140
  45. pulumi_vault/database/outputs.py +59 -54
  46. pulumi_vault/database/secret_backend_connection.py +115 -110
  47. pulumi_vault/database/secret_backend_role.py +25 -20
  48. pulumi_vault/database/secret_backend_static_role.py +11 -6
  49. pulumi_vault/database/secrets_mount.py +139 -134
  50. pulumi_vault/egp_policy.py +5 -0
  51. pulumi_vault/gcp/_inputs.py +111 -0
  52. pulumi_vault/gcp/auth_backend.py +15 -10
  53. pulumi_vault/gcp/auth_backend_role.py +5 -0
  54. pulumi_vault/gcp/get_auth_backend_role.py +42 -4
  55. pulumi_vault/gcp/outputs.py +5 -0
  56. pulumi_vault/gcp/secret_backend.py +5 -0
  57. pulumi_vault/gcp/secret_impersonated_account.py +5 -0
  58. pulumi_vault/gcp/secret_roleset.py +18 -13
  59. pulumi_vault/gcp/secret_static_account.py +18 -13
  60. pulumi_vault/generic/endpoint.py +5 -0
  61. pulumi_vault/generic/get_secret.py +25 -5
  62. pulumi_vault/generic/secret.py +12 -7
  63. pulumi_vault/get_auth_backend.py +21 -4
  64. pulumi_vault/get_auth_backends.py +16 -4
  65. pulumi_vault/get_namespace.py +18 -5
  66. pulumi_vault/get_namespaces.py +13 -4
  67. pulumi_vault/get_nomad_access_token.py +28 -8
  68. pulumi_vault/get_policy_document.py +27 -16
  69. pulumi_vault/get_raft_autopilot_state.py +26 -7
  70. pulumi_vault/github/_inputs.py +55 -0
  71. pulumi_vault/github/auth_backend.py +10 -5
  72. pulumi_vault/github/outputs.py +5 -0
  73. pulumi_vault/github/team.py +5 -0
  74. pulumi_vault/github/user.py +5 -0
  75. pulumi_vault/identity/entity.py +5 -0
  76. pulumi_vault/identity/entity_alias.py +5 -0
  77. pulumi_vault/identity/entity_policies.py +5 -0
  78. pulumi_vault/identity/get_entity.py +35 -5
  79. pulumi_vault/identity/get_group.py +42 -6
  80. pulumi_vault/identity/get_oidc_client_creds.py +16 -4
  81. pulumi_vault/identity/get_oidc_openid_config.py +26 -4
  82. pulumi_vault/identity/get_oidc_public_keys.py +16 -5
  83. pulumi_vault/identity/group.py +5 -0
  84. pulumi_vault/identity/group_alias.py +5 -0
  85. pulumi_vault/identity/group_member_entity_ids.py +5 -0
  86. pulumi_vault/identity/group_member_group_ids.py +5 -0
  87. pulumi_vault/identity/group_policies.py +5 -0
  88. pulumi_vault/identity/mfa_duo.py +5 -0
  89. pulumi_vault/identity/mfa_login_enforcement.py +5 -0
  90. pulumi_vault/identity/mfa_okta.py +5 -0
  91. pulumi_vault/identity/mfa_pingid.py +5 -0
  92. pulumi_vault/identity/mfa_totp.py +5 -0
  93. pulumi_vault/identity/oidc.py +5 -0
  94. pulumi_vault/identity/oidc_assignment.py +5 -0
  95. pulumi_vault/identity/oidc_client.py +5 -0
  96. pulumi_vault/identity/oidc_key.py +5 -0
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
  98. pulumi_vault/identity/oidc_provider.py +5 -0
  99. pulumi_vault/identity/oidc_role.py +5 -0
  100. pulumi_vault/identity/oidc_scope.py +5 -0
  101. pulumi_vault/identity/outputs.py +8 -3
  102. pulumi_vault/jwt/_inputs.py +55 -0
  103. pulumi_vault/jwt/auth_backend.py +14 -9
  104. pulumi_vault/jwt/auth_backend_role.py +33 -28
  105. pulumi_vault/jwt/outputs.py +5 -0
  106. pulumi_vault/kmip/secret_backend.py +5 -0
  107. pulumi_vault/kmip/secret_role.py +5 -0
  108. pulumi_vault/kmip/secret_scope.py +5 -0
  109. pulumi_vault/kubernetes/auth_backend_config.py +5 -0
  110. pulumi_vault/kubernetes/auth_backend_role.py +5 -0
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
  113. pulumi_vault/kubernetes/get_service_account_token.py +28 -4
  114. pulumi_vault/kubernetes/secret_backend.py +19 -14
  115. pulumi_vault/kubernetes/secret_backend_role.py +5 -0
  116. pulumi_vault/kv/_inputs.py +36 -4
  117. pulumi_vault/kv/get_secret.py +20 -5
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
  119. pulumi_vault/kv/get_secret_v2.py +27 -6
  120. pulumi_vault/kv/get_secrets_list.py +15 -4
  121. pulumi_vault/kv/get_secrets_list_v2.py +18 -4
  122. pulumi_vault/kv/outputs.py +8 -3
  123. pulumi_vault/kv/secret.py +12 -7
  124. pulumi_vault/kv/secret_backend_v2.py +5 -0
  125. pulumi_vault/kv/secret_v2.py +46 -41
  126. pulumi_vault/ldap/auth_backend.py +5 -0
  127. pulumi_vault/ldap/auth_backend_group.py +5 -0
  128. pulumi_vault/ldap/auth_backend_user.py +5 -0
  129. pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
  130. pulumi_vault/ldap/get_static_credentials.py +23 -4
  131. pulumi_vault/ldap/secret_backend.py +19 -14
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
  133. pulumi_vault/ldap/secret_backend_library_set.py +5 -0
  134. pulumi_vault/ldap/secret_backend_static_role.py +5 -0
  135. pulumi_vault/managed/_inputs.py +205 -0
  136. pulumi_vault/managed/keys.py +20 -15
  137. pulumi_vault/managed/outputs.py +5 -0
  138. pulumi_vault/mfa_duo.py +5 -0
  139. pulumi_vault/mfa_okta.py +5 -0
  140. pulumi_vault/mfa_pingid.py +5 -0
  141. pulumi_vault/mfa_totp.py +5 -0
  142. pulumi_vault/mongodbatlas/secret_backend.py +5 -0
  143. pulumi_vault/mongodbatlas/secret_role.py +5 -0
  144. pulumi_vault/mount.py +21 -16
  145. pulumi_vault/namespace.py +19 -14
  146. pulumi_vault/nomad_secret_backend.py +5 -0
  147. pulumi_vault/nomad_secret_role.py +5 -0
  148. pulumi_vault/okta/_inputs.py +39 -0
  149. pulumi_vault/okta/auth_backend.py +31 -26
  150. pulumi_vault/okta/auth_backend_group.py +5 -0
  151. pulumi_vault/okta/auth_backend_user.py +5 -0
  152. pulumi_vault/okta/outputs.py +5 -0
  153. pulumi_vault/outputs.py +5 -0
  154. pulumi_vault/password_policy.py +5 -0
  155. pulumi_vault/pkisecret/_inputs.py +49 -8
  156. pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
  157. pulumi_vault/pkisecret/backend_config_est.py +24 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
  159. pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
  160. pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
  161. pulumi_vault/pkisecret/get_backend_key.py +19 -4
  162. pulumi_vault/pkisecret/get_backend_keys.py +18 -5
  163. pulumi_vault/pkisecret/outputs.py +17 -12
  164. pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
  172. pulumi_vault/pkisecret/secret_backend_key.py +5 -0
  173. pulumi_vault/pkisecret/secret_backend_role.py +10 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
  176. pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
  177. pulumi_vault/plugin.py +5 -0
  178. pulumi_vault/plugin_pinned_version.py +5 -0
  179. pulumi_vault/policy.py +5 -0
  180. pulumi_vault/provider.py +47 -42
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +5 -0
  183. pulumi_vault/quota_rate_limit.py +5 -0
  184. pulumi_vault/rabbitmq/_inputs.py +61 -0
  185. pulumi_vault/rabbitmq/outputs.py +5 -0
  186. pulumi_vault/rabbitmq/secret_backend.py +5 -0
  187. pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
  188. pulumi_vault/raft_autopilot.py +5 -0
  189. pulumi_vault/raft_snapshot_agent_config.py +5 -0
  190. pulumi_vault/rgp_policy.py +5 -0
  191. pulumi_vault/saml/auth_backend.py +5 -0
  192. pulumi_vault/saml/auth_backend_role.py +19 -14
  193. pulumi_vault/secrets/_inputs.py +30 -0
  194. pulumi_vault/secrets/outputs.py +5 -0
  195. pulumi_vault/secrets/sync_association.py +7 -2
  196. pulumi_vault/secrets/sync_aws_destination.py +19 -14
  197. pulumi_vault/secrets/sync_azure_destination.py +19 -14
  198. pulumi_vault/secrets/sync_config.py +5 -0
  199. pulumi_vault/secrets/sync_gcp_destination.py +19 -14
  200. pulumi_vault/secrets/sync_gh_destination.py +5 -0
  201. pulumi_vault/secrets/sync_github_apps.py +5 -0
  202. pulumi_vault/secrets/sync_vercel_destination.py +5 -0
  203. pulumi_vault/ssh/_inputs.py +22 -0
  204. pulumi_vault/ssh/outputs.py +5 -0
  205. pulumi_vault/ssh/secret_backend_ca.py +5 -0
  206. pulumi_vault/ssh/secret_backend_role.py +38 -33
  207. pulumi_vault/terraformcloud/secret_backend.py +5 -0
  208. pulumi_vault/terraformcloud/secret_creds.py +5 -0
  209. pulumi_vault/terraformcloud/secret_role.py +5 -0
  210. pulumi_vault/token.py +5 -0
  211. pulumi_vault/tokenauth/auth_backend_role.py +5 -14
  212. pulumi_vault/transform/alphabet.py +5 -0
  213. pulumi_vault/transform/get_decode.py +38 -14
  214. pulumi_vault/transform/get_encode.py +38 -14
  215. pulumi_vault/transform/role.py +5 -0
  216. pulumi_vault/transform/template.py +19 -14
  217. pulumi_vault/transform/transformation.py +5 -0
  218. pulumi_vault/transit/get_decrypt.py +21 -4
  219. pulumi_vault/transit/get_encrypt.py +23 -4
  220. pulumi_vault/transit/secret_backend_key.py +12 -7
  221. pulumi_vault/transit/secret_cache_config.py +5 -0
  222. {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1a1728636480.dist-info}/METADATA +3 -2
  223. pulumi_vault-6.3.1a1728636480.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1a1728636480.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.3.0a1723109142.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1a1728636480.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['RgpPolicyArgs', 'RgpPolicy']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendArgs', 'AuthBackend']
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
@@ -15,7 +20,7 @@ __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
15
20
  class AuthBackendRoleArgs:
16
21
  def __init__(__self__, *,
17
22
  path: pulumi.Input[str],
18
- bound_attributes: Optional[pulumi.Input[Mapping[str, Any]]] = None,
23
+ bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
19
24
  bound_attributes_type: Optional[pulumi.Input[str]] = None,
20
25
  bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
21
26
  bound_subjects_type: Optional[pulumi.Input[str]] = None,
@@ -34,7 +39,7 @@ class AuthBackendRoleArgs:
34
39
  """
35
40
  The set of arguments for constructing a AuthBackendRole resource.
36
41
  :param pulumi.Input[str] path: Path where the auth backend is mounted.
37
- :param pulumi.Input[Mapping[str, Any]] bound_attributes: Mapping of attribute names to values that are expected to
42
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_attributes: Mapping of attribute names to values that are expected to
38
43
  exist in the SAML assertion.
39
44
  :param pulumi.Input[str] bound_attributes_type: The type of matching assertion to perform on
40
45
  `bound_attributes_type`.
@@ -105,7 +110,7 @@ class AuthBackendRoleArgs:
105
110
 
106
111
  @property
107
112
  @pulumi.getter(name="boundAttributes")
108
- def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
113
+ def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
109
114
  """
110
115
  Mapping of attribute names to values that are expected to
111
116
  exist in the SAML assertion.
@@ -113,7 +118,7 @@ class AuthBackendRoleArgs:
113
118
  return pulumi.get(self, "bound_attributes")
114
119
 
115
120
  @bound_attributes.setter
116
- def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
121
+ def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
117
122
  pulumi.set(self, "bound_attributes", value)
118
123
 
119
124
  @property
@@ -305,7 +310,7 @@ class AuthBackendRoleArgs:
305
310
  @pulumi.input_type
306
311
  class _AuthBackendRoleState:
307
312
  def __init__(__self__, *,
308
- bound_attributes: Optional[pulumi.Input[Mapping[str, Any]]] = None,
313
+ bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
309
314
  bound_attributes_type: Optional[pulumi.Input[str]] = None,
310
315
  bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
311
316
  bound_subjects_type: Optional[pulumi.Input[str]] = None,
@@ -324,7 +329,7 @@ class _AuthBackendRoleState:
324
329
  token_type: Optional[pulumi.Input[str]] = None):
325
330
  """
326
331
  Input properties used for looking up and filtering AuthBackendRole resources.
327
- :param pulumi.Input[Mapping[str, Any]] bound_attributes: Mapping of attribute names to values that are expected to
332
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_attributes: Mapping of attribute names to values that are expected to
328
333
  exist in the SAML assertion.
329
334
  :param pulumi.Input[str] bound_attributes_type: The type of matching assertion to perform on
330
335
  `bound_attributes_type`.
@@ -385,7 +390,7 @@ class _AuthBackendRoleState:
385
390
 
386
391
  @property
387
392
  @pulumi.getter(name="boundAttributes")
388
- def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
393
+ def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
389
394
  """
390
395
  Mapping of attribute names to values that are expected to
391
396
  exist in the SAML assertion.
@@ -393,7 +398,7 @@ class _AuthBackendRoleState:
393
398
  return pulumi.get(self, "bound_attributes")
394
399
 
395
400
  @bound_attributes.setter
396
- def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
401
+ def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
397
402
  pulumi.set(self, "bound_attributes", value)
398
403
 
399
404
  @property
@@ -599,7 +604,7 @@ class AuthBackendRole(pulumi.CustomResource):
599
604
  def __init__(__self__,
600
605
  resource_name: str,
601
606
  opts: Optional[pulumi.ResourceOptions] = None,
602
- bound_attributes: Optional[pulumi.Input[Mapping[str, Any]]] = None,
607
+ bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
603
608
  bound_attributes_type: Optional[pulumi.Input[str]] = None,
604
609
  bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
605
610
  bound_subjects_type: Optional[pulumi.Input[str]] = None,
@@ -656,7 +661,7 @@ class AuthBackendRole(pulumi.CustomResource):
656
661
 
657
662
  :param str resource_name: The name of the resource.
658
663
  :param pulumi.ResourceOptions opts: Options for the resource.
659
- :param pulumi.Input[Mapping[str, Any]] bound_attributes: Mapping of attribute names to values that are expected to
664
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_attributes: Mapping of attribute names to values that are expected to
660
665
  exist in the SAML assertion.
661
666
  :param pulumi.Input[str] bound_attributes_type: The type of matching assertion to perform on
662
667
  `bound_attributes_type`.
@@ -738,7 +743,7 @@ class AuthBackendRole(pulumi.CustomResource):
738
743
  def _internal_init(__self__,
739
744
  resource_name: str,
740
745
  opts: Optional[pulumi.ResourceOptions] = None,
741
- bound_attributes: Optional[pulumi.Input[Mapping[str, Any]]] = None,
746
+ bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
742
747
  bound_attributes_type: Optional[pulumi.Input[str]] = None,
743
748
  bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
744
749
  bound_subjects_type: Optional[pulumi.Input[str]] = None,
@@ -793,7 +798,7 @@ class AuthBackendRole(pulumi.CustomResource):
793
798
  def get(resource_name: str,
794
799
  id: pulumi.Input[str],
795
800
  opts: Optional[pulumi.ResourceOptions] = None,
796
- bound_attributes: Optional[pulumi.Input[Mapping[str, Any]]] = None,
801
+ bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
797
802
  bound_attributes_type: Optional[pulumi.Input[str]] = None,
798
803
  bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
799
804
  bound_subjects_type: Optional[pulumi.Input[str]] = None,
@@ -817,7 +822,7 @@ class AuthBackendRole(pulumi.CustomResource):
817
822
  :param str resource_name: The unique name of the resulting resource.
818
823
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
819
824
  :param pulumi.ResourceOptions opts: Options for the resource.
820
- :param pulumi.Input[Mapping[str, Any]] bound_attributes: Mapping of attribute names to values that are expected to
825
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_attributes: Mapping of attribute names to values that are expected to
821
826
  exist in the SAML assertion.
822
827
  :param pulumi.Input[str] bound_attributes_type: The type of matching assertion to perform on
823
828
  `bound_attributes_type`.
@@ -866,7 +871,7 @@ class AuthBackendRole(pulumi.CustomResource):
866
871
 
867
872
  @property
868
873
  @pulumi.getter(name="boundAttributes")
869
- def bound_attributes(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
874
+ def bound_attributes(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
870
875
  """
871
876
  Mapping of attribute names to values that are expected to
872
877
  exist in the SAML assertion.
@@ -4,15 +4,45 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
13
18
  'SyncAssociationMetadataArgs',
19
+ 'SyncAssociationMetadataArgsDict',
14
20
  ]
15
21
 
22
+ MYPY = False
23
+
24
+ if not MYPY:
25
+ class SyncAssociationMetadataArgsDict(TypedDict):
26
+ sub_key: NotRequired[pulumi.Input[str]]
27
+ """
28
+ Subkey of the associated secret.
29
+ """
30
+ sync_status: NotRequired[pulumi.Input[str]]
31
+ """
32
+ A map of sync statuses for each subkey of the associated secret
33
+ (for ex. `{kv_624bea/aws-token/dev: "SYNCED", kv_624bea/aws-token/prod: "SYNCED"}`).
34
+ """
35
+ updated_at: NotRequired[pulumi.Input[str]]
36
+ """
37
+ A map of duration strings specifying when each subkey of the associated
38
+ secret was last updated.
39
+ (for ex.
40
+ `{kv_624bea/aws-token/dev: "2024-03-21T12:42:02.558533-07:00",
41
+ kv_624bea/aws-token/prod: "2024-03-21T12:42:02.558533-07:00"}`).
42
+ """
43
+ elif False:
44
+ SyncAssociationMetadataArgsDict: TypeAlias = Mapping[str, Any]
45
+
16
46
  @pulumi.input_type
17
47
  class SyncAssociationMetadataArgs:
18
48
  def __init__(__self__, *,
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -358,7 +363,7 @@ class SyncAssociation(pulumi.CustomResource):
358
363
  def get(resource_name: str,
359
364
  id: pulumi.Input[str],
360
365
  opts: Optional[pulumi.ResourceOptions] = None,
361
- metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SyncAssociationMetadataArgs']]]]] = None,
366
+ metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SyncAssociationMetadataArgs', 'SyncAssociationMetadataArgsDict']]]]] = None,
362
367
  mount: Optional[pulumi.Input[str]] = None,
363
368
  name: Optional[pulumi.Input[str]] = None,
364
369
  namespace: Optional[pulumi.Input[str]] = None,
@@ -371,7 +376,7 @@ class SyncAssociation(pulumi.CustomResource):
371
376
  :param str resource_name: The unique name of the resulting resource.
372
377
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
373
378
  :param pulumi.ResourceOptions opts: Options for the resource.
374
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SyncAssociationMetadataArgs']]]] metadatas: Metadata for each subkey of the associated secret.
379
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SyncAssociationMetadataArgs', 'SyncAssociationMetadataArgsDict']]]] metadatas: Metadata for each subkey of the associated secret.
375
380
  :param pulumi.Input[str] mount: Specifies the mount where the secret is located.
376
381
  :param pulumi.Input[str] name: Specifies the name of the destination.
377
382
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SyncAwsDestinationArgs', 'SyncAwsDestination']
@@ -15,7 +20,7 @@ __all__ = ['SyncAwsDestinationArgs', 'SyncAwsDestination']
15
20
  class SyncAwsDestinationArgs:
16
21
  def __init__(__self__, *,
17
22
  access_key_id: Optional[pulumi.Input[str]] = None,
18
- custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
23
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
19
24
  external_id: Optional[pulumi.Input[str]] = None,
20
25
  granularity: Optional[pulumi.Input[str]] = None,
21
26
  name: Optional[pulumi.Input[str]] = None,
@@ -29,7 +34,7 @@ class SyncAwsDestinationArgs:
29
34
  :param pulumi.Input[str] access_key_id: Access key id to authenticate against the AWS secrets manager.
30
35
  Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
31
36
  variable.
32
- :param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
37
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
33
38
  :param pulumi.Input[str] external_id: Optional extra protection that must match the trust policy granting access to the
34
39
  AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
35
40
  The field is mutable with no special condition, but users must be careful that the new value fits with the trust
@@ -92,14 +97,14 @@ class SyncAwsDestinationArgs:
92
97
 
93
98
  @property
94
99
  @pulumi.getter(name="customTags")
95
- def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
100
+ def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
96
101
  """
97
102
  Custom tags to set on the secret managed at the destination.
98
103
  """
99
104
  return pulumi.get(self, "custom_tags")
100
105
 
101
106
  @custom_tags.setter
102
- def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
107
+ def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
103
108
  pulumi.set(self, "custom_tags", value)
104
109
 
105
110
  @property
@@ -219,7 +224,7 @@ class SyncAwsDestinationArgs:
219
224
  class _SyncAwsDestinationState:
220
225
  def __init__(__self__, *,
221
226
  access_key_id: Optional[pulumi.Input[str]] = None,
222
- custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
227
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
223
228
  external_id: Optional[pulumi.Input[str]] = None,
224
229
  granularity: Optional[pulumi.Input[str]] = None,
225
230
  name: Optional[pulumi.Input[str]] = None,
@@ -234,7 +239,7 @@ class _SyncAwsDestinationState:
234
239
  :param pulumi.Input[str] access_key_id: Access key id to authenticate against the AWS secrets manager.
235
240
  Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
236
241
  variable.
237
- :param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
242
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
238
243
  :param pulumi.Input[str] external_id: Optional extra protection that must match the trust policy granting access to the
239
244
  AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
240
245
  The field is mutable with no special condition, but users must be careful that the new value fits with the trust
@@ -300,14 +305,14 @@ class _SyncAwsDestinationState:
300
305
 
301
306
  @property
302
307
  @pulumi.getter(name="customTags")
303
- def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
308
+ def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
304
309
  """
305
310
  Custom tags to set on the secret managed at the destination.
306
311
  """
307
312
  return pulumi.get(self, "custom_tags")
308
313
 
309
314
  @custom_tags.setter
310
- def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
315
+ def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
311
316
  pulumi.set(self, "custom_tags", value)
312
317
 
313
318
  @property
@@ -441,7 +446,7 @@ class SyncAwsDestination(pulumi.CustomResource):
441
446
  resource_name: str,
442
447
  opts: Optional[pulumi.ResourceOptions] = None,
443
448
  access_key_id: Optional[pulumi.Input[str]] = None,
444
- custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
449
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
445
450
  external_id: Optional[pulumi.Input[str]] = None,
446
451
  granularity: Optional[pulumi.Input[str]] = None,
447
452
  name: Optional[pulumi.Input[str]] = None,
@@ -484,7 +489,7 @@ class SyncAwsDestination(pulumi.CustomResource):
484
489
  :param pulumi.Input[str] access_key_id: Access key id to authenticate against the AWS secrets manager.
485
490
  Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
486
491
  variable.
487
- :param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
492
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
488
493
  :param pulumi.Input[str] external_id: Optional extra protection that must match the trust policy granting access to the
489
494
  AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
490
495
  The field is mutable with no special condition, but users must be careful that the new value fits with the trust
@@ -560,7 +565,7 @@ class SyncAwsDestination(pulumi.CustomResource):
560
565
  resource_name: str,
561
566
  opts: Optional[pulumi.ResourceOptions] = None,
562
567
  access_key_id: Optional[pulumi.Input[str]] = None,
563
- custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
568
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
564
569
  external_id: Optional[pulumi.Input[str]] = None,
565
570
  granularity: Optional[pulumi.Input[str]] = None,
566
571
  name: Optional[pulumi.Input[str]] = None,
@@ -602,7 +607,7 @@ class SyncAwsDestination(pulumi.CustomResource):
602
607
  id: pulumi.Input[str],
603
608
  opts: Optional[pulumi.ResourceOptions] = None,
604
609
  access_key_id: Optional[pulumi.Input[str]] = None,
605
- custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
610
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
606
611
  external_id: Optional[pulumi.Input[str]] = None,
607
612
  granularity: Optional[pulumi.Input[str]] = None,
608
613
  name: Optional[pulumi.Input[str]] = None,
@@ -622,7 +627,7 @@ class SyncAwsDestination(pulumi.CustomResource):
622
627
  :param pulumi.Input[str] access_key_id: Access key id to authenticate against the AWS secrets manager.
623
628
  Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
624
629
  variable.
625
- :param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
630
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
626
631
  :param pulumi.Input[str] external_id: Optional extra protection that must match the trust policy granting access to the
627
632
  AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
628
633
  The field is mutable with no special condition, but users must be careful that the new value fits with the trust
@@ -678,7 +683,7 @@ class SyncAwsDestination(pulumi.CustomResource):
678
683
 
679
684
  @property
680
685
  @pulumi.getter(name="customTags")
681
- def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
686
+ def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
682
687
  """
683
688
  Custom tags to set on the secret managed at the destination.
684
689
  """
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SyncAzureDestinationArgs', 'SyncAzureDestination']
@@ -17,7 +22,7 @@ class SyncAzureDestinationArgs:
17
22
  client_id: Optional[pulumi.Input[str]] = None,
18
23
  client_secret: Optional[pulumi.Input[str]] = None,
19
24
  cloud: Optional[pulumi.Input[str]] = None,
20
- custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
25
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
21
26
  granularity: Optional[pulumi.Input[str]] = None,
22
27
  key_vault_uri: Optional[pulumi.Input[str]] = None,
23
28
  name: Optional[pulumi.Input[str]] = None,
@@ -33,7 +38,7 @@ class SyncAzureDestinationArgs:
33
38
  Can be omitted and directly provided to Vault using the `AZURE_CLIENT_SECRET` environment
34
39
  variable.
35
40
  :param pulumi.Input[str] cloud: Specifies a cloud for the client. The default is Azure Public Cloud.
36
- :param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
41
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
37
42
  :param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
38
43
  at the destination. Supports `secret-path` and `secret-key`.
39
44
  :param pulumi.Input[str] key_vault_uri: URI of an existing Azure Key Vault instance.
@@ -112,14 +117,14 @@ class SyncAzureDestinationArgs:
112
117
 
113
118
  @property
114
119
  @pulumi.getter(name="customTags")
115
- def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
120
+ def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
116
121
  """
117
122
  Custom tags to set on the secret managed at the destination.
118
123
  """
119
124
  return pulumi.get(self, "custom_tags")
120
125
 
121
126
  @custom_tags.setter
122
- def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
127
+ def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
123
128
  pulumi.set(self, "custom_tags", value)
124
129
 
125
130
  @property
@@ -209,7 +214,7 @@ class _SyncAzureDestinationState:
209
214
  client_id: Optional[pulumi.Input[str]] = None,
210
215
  client_secret: Optional[pulumi.Input[str]] = None,
211
216
  cloud: Optional[pulumi.Input[str]] = None,
212
- custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
217
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
213
218
  granularity: Optional[pulumi.Input[str]] = None,
214
219
  key_vault_uri: Optional[pulumi.Input[str]] = None,
215
220
  name: Optional[pulumi.Input[str]] = None,
@@ -226,7 +231,7 @@ class _SyncAzureDestinationState:
226
231
  Can be omitted and directly provided to Vault using the `AZURE_CLIENT_SECRET` environment
227
232
  variable.
228
233
  :param pulumi.Input[str] cloud: Specifies a cloud for the client. The default is Azure Public Cloud.
229
- :param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
234
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
230
235
  :param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
231
236
  at the destination. Supports `secret-path` and `secret-key`.
232
237
  :param pulumi.Input[str] key_vault_uri: URI of an existing Azure Key Vault instance.
@@ -308,14 +313,14 @@ class _SyncAzureDestinationState:
308
313
 
309
314
  @property
310
315
  @pulumi.getter(name="customTags")
311
- def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
316
+ def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
312
317
  """
313
318
  Custom tags to set on the secret managed at the destination.
314
319
  """
315
320
  return pulumi.get(self, "custom_tags")
316
321
 
317
322
  @custom_tags.setter
318
- def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
323
+ def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
319
324
  pulumi.set(self, "custom_tags", value)
320
325
 
321
326
  @property
@@ -419,7 +424,7 @@ class SyncAzureDestination(pulumi.CustomResource):
419
424
  client_id: Optional[pulumi.Input[str]] = None,
420
425
  client_secret: Optional[pulumi.Input[str]] = None,
421
426
  cloud: Optional[pulumi.Input[str]] = None,
422
- custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
427
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
423
428
  granularity: Optional[pulumi.Input[str]] = None,
424
429
  key_vault_uri: Optional[pulumi.Input[str]] = None,
425
430
  name: Optional[pulumi.Input[str]] = None,
@@ -463,7 +468,7 @@ class SyncAzureDestination(pulumi.CustomResource):
463
468
  Can be omitted and directly provided to Vault using the `AZURE_CLIENT_SECRET` environment
464
469
  variable.
465
470
  :param pulumi.Input[str] cloud: Specifies a cloud for the client. The default is Azure Public Cloud.
466
- :param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
471
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
467
472
  :param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
468
473
  at the destination. Supports `secret-path` and `secret-key`.
469
474
  :param pulumi.Input[str] key_vault_uri: URI of an existing Azure Key Vault instance.
@@ -530,7 +535,7 @@ class SyncAzureDestination(pulumi.CustomResource):
530
535
  client_id: Optional[pulumi.Input[str]] = None,
531
536
  client_secret: Optional[pulumi.Input[str]] = None,
532
537
  cloud: Optional[pulumi.Input[str]] = None,
533
- custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
538
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
534
539
  granularity: Optional[pulumi.Input[str]] = None,
535
540
  key_vault_uri: Optional[pulumi.Input[str]] = None,
536
541
  name: Optional[pulumi.Input[str]] = None,
@@ -572,7 +577,7 @@ class SyncAzureDestination(pulumi.CustomResource):
572
577
  client_id: Optional[pulumi.Input[str]] = None,
573
578
  client_secret: Optional[pulumi.Input[str]] = None,
574
579
  cloud: Optional[pulumi.Input[str]] = None,
575
- custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
580
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
576
581
  granularity: Optional[pulumi.Input[str]] = None,
577
582
  key_vault_uri: Optional[pulumi.Input[str]] = None,
578
583
  name: Optional[pulumi.Input[str]] = None,
@@ -594,7 +599,7 @@ class SyncAzureDestination(pulumi.CustomResource):
594
599
  Can be omitted and directly provided to Vault using the `AZURE_CLIENT_SECRET` environment
595
600
  variable.
596
601
  :param pulumi.Input[str] cloud: Specifies a cloud for the client. The default is Azure Public Cloud.
597
- :param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
602
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
598
603
  :param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
599
604
  at the destination. Supports `secret-path` and `secret-key`.
600
605
  :param pulumi.Input[str] key_vault_uri: URI of an existing Azure Key Vault instance.
@@ -658,7 +663,7 @@ class SyncAzureDestination(pulumi.CustomResource):
658
663
 
659
664
  @property
660
665
  @pulumi.getter(name="customTags")
661
- def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
666
+ def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
662
667
  """
663
668
  Custom tags to set on the secret managed at the destination.
664
669
  """
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SyncConfigArgs', 'SyncConfig']