pulumi-vault 6.3.2a1729803197__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +0 -560
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +4 -19
  4. pulumi_vault/ad/secret_backend.py +0 -5
  5. pulumi_vault/ad/secret_library.py +0 -5
  6. pulumi_vault/ad/secret_role.py +0 -5
  7. pulumi_vault/alicloud/auth_backend_role.py +0 -5
  8. pulumi_vault/approle/auth_backend_login.py +0 -5
  9. pulumi_vault/approle/auth_backend_role.py +0 -5
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -5
  11. pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
  12. pulumi_vault/audit.py +0 -5
  13. pulumi_vault/audit_request_header.py +0 -5
  14. pulumi_vault/auth_backend.py +0 -5
  15. pulumi_vault/aws/auth_backend_cert.py +0 -5
  16. pulumi_vault/aws/auth_backend_client.py +0 -5
  17. pulumi_vault/aws/auth_backend_config_identity.py +0 -5
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
  19. pulumi_vault/aws/auth_backend_login.py +7 -12
  20. pulumi_vault/aws/auth_backend_role.py +0 -5
  21. pulumi_vault/aws/auth_backend_role_tag.py +0 -5
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
  23. pulumi_vault/aws/auth_backend_sts_role.py +0 -5
  24. pulumi_vault/aws/get_access_credentials.py +4 -31
  25. pulumi_vault/aws/get_static_access_credentials.py +4 -18
  26. pulumi_vault/aws/secret_backend.py +0 -5
  27. pulumi_vault/aws/secret_backend_role.py +0 -5
  28. pulumi_vault/aws/secret_backend_static_role.py +0 -5
  29. pulumi_vault/azure/_inputs.py +0 -24
  30. pulumi_vault/azure/auth_backend_config.py +0 -5
  31. pulumi_vault/azure/auth_backend_role.py +0 -5
  32. pulumi_vault/azure/backend.py +0 -5
  33. pulumi_vault/azure/backend_role.py +0 -5
  34. pulumi_vault/azure/get_access_credentials.py +4 -36
  35. pulumi_vault/azure/outputs.py +0 -5
  36. pulumi_vault/cert_auth_backend_role.py +0 -5
  37. pulumi_vault/config/__init__.pyi +0 -5
  38. pulumi_vault/config/_inputs.py +0 -21
  39. pulumi_vault/config/outputs.py +0 -5
  40. pulumi_vault/config/ui_custom_message.py +14 -19
  41. pulumi_vault/config/vars.py +0 -5
  42. pulumi_vault/consul/secret_backend.py +0 -5
  43. pulumi_vault/consul/secret_backend_role.py +0 -5
  44. pulumi_vault/database/_inputs.py +105 -2056
  45. pulumi_vault/database/outputs.py +54 -59
  46. pulumi_vault/database/secret_backend_connection.py +14 -19
  47. pulumi_vault/database/secret_backend_role.py +14 -19
  48. pulumi_vault/database/secret_backend_static_role.py +0 -5
  49. pulumi_vault/database/secrets_mount.py +14 -19
  50. pulumi_vault/egp_policy.py +0 -5
  51. pulumi_vault/gcp/_inputs.py +0 -111
  52. pulumi_vault/gcp/auth_backend.py +0 -5
  53. pulumi_vault/gcp/auth_backend_role.py +0 -5
  54. pulumi_vault/gcp/get_auth_backend_role.py +4 -42
  55. pulumi_vault/gcp/outputs.py +0 -5
  56. pulumi_vault/gcp/secret_backend.py +0 -5
  57. pulumi_vault/gcp/secret_impersonated_account.py +0 -5
  58. pulumi_vault/gcp/secret_roleset.py +0 -5
  59. pulumi_vault/gcp/secret_static_account.py +0 -5
  60. pulumi_vault/generic/endpoint.py +0 -5
  61. pulumi_vault/generic/get_secret.py +5 -25
  62. pulumi_vault/generic/secret.py +7 -12
  63. pulumi_vault/get_auth_backend.py +4 -21
  64. pulumi_vault/get_auth_backends.py +4 -16
  65. pulumi_vault/get_namespace.py +5 -18
  66. pulumi_vault/get_namespaces.py +4 -13
  67. pulumi_vault/get_nomad_access_token.py +8 -28
  68. pulumi_vault/get_policy_document.py +4 -15
  69. pulumi_vault/get_raft_autopilot_state.py +7 -26
  70. pulumi_vault/github/_inputs.py +0 -55
  71. pulumi_vault/github/auth_backend.py +0 -5
  72. pulumi_vault/github/outputs.py +0 -5
  73. pulumi_vault/github/team.py +0 -5
  74. pulumi_vault/github/user.py +0 -5
  75. pulumi_vault/identity/entity.py +0 -5
  76. pulumi_vault/identity/entity_alias.py +0 -5
  77. pulumi_vault/identity/entity_policies.py +0 -5
  78. pulumi_vault/identity/get_entity.py +5 -35
  79. pulumi_vault/identity/get_group.py +6 -42
  80. pulumi_vault/identity/get_oidc_client_creds.py +4 -16
  81. pulumi_vault/identity/get_oidc_openid_config.py +4 -26
  82. pulumi_vault/identity/get_oidc_public_keys.py +5 -16
  83. pulumi_vault/identity/group.py +0 -5
  84. pulumi_vault/identity/group_alias.py +0 -5
  85. pulumi_vault/identity/group_member_entity_ids.py +0 -5
  86. pulumi_vault/identity/group_member_group_ids.py +0 -5
  87. pulumi_vault/identity/group_policies.py +0 -5
  88. pulumi_vault/identity/mfa_duo.py +0 -5
  89. pulumi_vault/identity/mfa_login_enforcement.py +0 -5
  90. pulumi_vault/identity/mfa_okta.py +0 -5
  91. pulumi_vault/identity/mfa_pingid.py +0 -5
  92. pulumi_vault/identity/mfa_totp.py +0 -5
  93. pulumi_vault/identity/oidc.py +0 -5
  94. pulumi_vault/identity/oidc_assignment.py +0 -5
  95. pulumi_vault/identity/oidc_client.py +0 -5
  96. pulumi_vault/identity/oidc_key.py +0 -5
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
  98. pulumi_vault/identity/oidc_provider.py +0 -5
  99. pulumi_vault/identity/oidc_role.py +0 -5
  100. pulumi_vault/identity/oidc_scope.py +0 -5
  101. pulumi_vault/identity/outputs.py +3 -8
  102. pulumi_vault/jwt/_inputs.py +0 -55
  103. pulumi_vault/jwt/auth_backend.py +0 -5
  104. pulumi_vault/jwt/auth_backend_role.py +28 -33
  105. pulumi_vault/jwt/outputs.py +0 -5
  106. pulumi_vault/kmip/secret_backend.py +0 -5
  107. pulumi_vault/kmip/secret_role.py +0 -5
  108. pulumi_vault/kmip/secret_scope.py +0 -5
  109. pulumi_vault/kubernetes/auth_backend_config.py +0 -5
  110. pulumi_vault/kubernetes/auth_backend_role.py +0 -5
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +4 -26
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
  113. pulumi_vault/kubernetes/get_service_account_token.py +4 -28
  114. pulumi_vault/kubernetes/secret_backend.py +14 -19
  115. pulumi_vault/kubernetes/secret_backend_role.py +0 -5
  116. pulumi_vault/kv/_inputs.py +4 -36
  117. pulumi_vault/kv/get_secret.py +5 -20
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
  119. pulumi_vault/kv/get_secret_v2.py +6 -27
  120. pulumi_vault/kv/get_secrets_list.py +4 -15
  121. pulumi_vault/kv/get_secrets_list_v2.py +4 -18
  122. pulumi_vault/kv/outputs.py +3 -8
  123. pulumi_vault/kv/secret.py +7 -12
  124. pulumi_vault/kv/secret_backend_v2.py +0 -5
  125. pulumi_vault/kv/secret_v2.py +28 -33
  126. pulumi_vault/ldap/auth_backend.py +0 -5
  127. pulumi_vault/ldap/auth_backend_group.py +0 -5
  128. pulumi_vault/ldap/auth_backend_user.py +0 -5
  129. pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
  130. pulumi_vault/ldap/get_static_credentials.py +4 -23
  131. pulumi_vault/ldap/secret_backend.py +14 -19
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
  133. pulumi_vault/ldap/secret_backend_library_set.py +0 -5
  134. pulumi_vault/ldap/secret_backend_static_role.py +0 -5
  135. pulumi_vault/managed/_inputs.py +0 -205
  136. pulumi_vault/managed/keys.py +0 -5
  137. pulumi_vault/managed/outputs.py +0 -5
  138. pulumi_vault/mfa_duo.py +0 -5
  139. pulumi_vault/mfa_okta.py +0 -5
  140. pulumi_vault/mfa_pingid.py +0 -5
  141. pulumi_vault/mfa_totp.py +0 -5
  142. pulumi_vault/mongodbatlas/secret_backend.py +0 -5
  143. pulumi_vault/mongodbatlas/secret_role.py +0 -5
  144. pulumi_vault/mount.py +16 -21
  145. pulumi_vault/namespace.py +14 -19
  146. pulumi_vault/nomad_secret_backend.py +0 -5
  147. pulumi_vault/nomad_secret_role.py +0 -5
  148. pulumi_vault/okta/_inputs.py +0 -39
  149. pulumi_vault/okta/auth_backend.py +0 -5
  150. pulumi_vault/okta/auth_backend_group.py +0 -5
  151. pulumi_vault/okta/auth_backend_user.py +0 -5
  152. pulumi_vault/okta/outputs.py +0 -5
  153. pulumi_vault/outputs.py +0 -5
  154. pulumi_vault/password_policy.py +0 -5
  155. pulumi_vault/pkisecret/_inputs.py +8 -49
  156. pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
  157. pulumi_vault/pkisecret/backend_config_est.py +14 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
  159. pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
  160. pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
  161. pulumi_vault/pkisecret/get_backend_key.py +4 -19
  162. pulumi_vault/pkisecret/get_backend_keys.py +5 -18
  163. pulumi_vault/pkisecret/outputs.py +12 -17
  164. pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
  172. pulumi_vault/pkisecret/secret_backend_key.py +0 -5
  173. pulumi_vault/pkisecret/secret_backend_role.py +0 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
  176. pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
  177. pulumi_vault/plugin.py +0 -5
  178. pulumi_vault/plugin_pinned_version.py +0 -5
  179. pulumi_vault/policy.py +0 -5
  180. pulumi_vault/provider.py +0 -5
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +0 -5
  183. pulumi_vault/quota_rate_limit.py +0 -5
  184. pulumi_vault/rabbitmq/_inputs.py +0 -61
  185. pulumi_vault/rabbitmq/outputs.py +0 -5
  186. pulumi_vault/rabbitmq/secret_backend.py +0 -5
  187. pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
  188. pulumi_vault/raft_autopilot.py +0 -5
  189. pulumi_vault/raft_snapshot_agent_config.py +0 -5
  190. pulumi_vault/rgp_policy.py +0 -5
  191. pulumi_vault/saml/auth_backend.py +0 -5
  192. pulumi_vault/saml/auth_backend_role.py +14 -19
  193. pulumi_vault/secrets/_inputs.py +0 -30
  194. pulumi_vault/secrets/outputs.py +0 -5
  195. pulumi_vault/secrets/sync_association.py +0 -5
  196. pulumi_vault/secrets/sync_aws_destination.py +14 -19
  197. pulumi_vault/secrets/sync_azure_destination.py +14 -19
  198. pulumi_vault/secrets/sync_config.py +0 -5
  199. pulumi_vault/secrets/sync_gcp_destination.py +14 -19
  200. pulumi_vault/secrets/sync_gh_destination.py +0 -5
  201. pulumi_vault/secrets/sync_github_apps.py +0 -5
  202. pulumi_vault/secrets/sync_vercel_destination.py +0 -5
  203. pulumi_vault/ssh/_inputs.py +0 -22
  204. pulumi_vault/ssh/outputs.py +0 -5
  205. pulumi_vault/ssh/secret_backend_ca.py +0 -5
  206. pulumi_vault/ssh/secret_backend_role.py +28 -33
  207. pulumi_vault/terraformcloud/secret_backend.py +0 -5
  208. pulumi_vault/terraformcloud/secret_creds.py +0 -5
  209. pulumi_vault/terraformcloud/secret_role.py +0 -5
  210. pulumi_vault/token.py +0 -5
  211. pulumi_vault/tokenauth/auth_backend_role.py +14 -5
  212. pulumi_vault/transform/alphabet.py +0 -5
  213. pulumi_vault/transform/get_decode.py +14 -38
  214. pulumi_vault/transform/get_encode.py +14 -38
  215. pulumi_vault/transform/role.py +0 -5
  216. pulumi_vault/transform/template.py +14 -19
  217. pulumi_vault/transform/transformation.py +0 -5
  218. pulumi_vault/transit/get_decrypt.py +4 -21
  219. pulumi_vault/transit/get_encrypt.py +4 -23
  220. pulumi_vault/transit/secret_backend_key.py +7 -12
  221. pulumi_vault/transit/secret_cache_config.py +0 -5
  222. {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
  223. pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.3.2a1729803197.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -36,7 +31,7 @@ class SecretBackendArgs:
36
31
  local: Optional[pulumi.Input[bool]] = None,
37
32
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
38
33
  namespace: Optional[pulumi.Input[str]] = None,
39
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
34
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
40
35
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
41
36
  plugin_version: Optional[pulumi.Input[str]] = None,
42
37
  seal_wrap: Optional[pulumi.Input[bool]] = None,
@@ -69,7 +64,7 @@ class SecretBackendArgs:
69
64
  The value should not contain leading or trailing forward slashes.
70
65
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
71
66
  *Available only for Vault Enterprise*.
72
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
67
+ :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
73
68
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
74
69
  :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
75
70
  :param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
@@ -336,14 +331,14 @@ class SecretBackendArgs:
336
331
 
337
332
  @property
338
333
  @pulumi.getter
339
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
334
+ def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
340
335
  """
341
336
  Specifies mount type specific options that are passed to the backend
342
337
  """
343
338
  return pulumi.get(self, "options")
344
339
 
345
340
  @options.setter
346
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
341
+ def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
347
342
  pulumi.set(self, "options", value)
348
343
 
349
344
  @property
@@ -417,7 +412,7 @@ class _SecretBackendState:
417
412
  local: Optional[pulumi.Input[bool]] = None,
418
413
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
419
414
  namespace: Optional[pulumi.Input[str]] = None,
420
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
415
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
421
416
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
422
417
  path: Optional[pulumi.Input[str]] = None,
423
418
  plugin_version: Optional[pulumi.Input[str]] = None,
@@ -451,7 +446,7 @@ class _SecretBackendState:
451
446
  The value should not contain leading or trailing forward slashes.
452
447
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
453
448
  *Available only for Vault Enterprise*.
454
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
449
+ :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
455
450
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
456
451
  :param pulumi.Input[str] path: Where the secret backend will be mounted
457
452
  :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
@@ -722,14 +717,14 @@ class _SecretBackendState:
722
717
 
723
718
  @property
724
719
  @pulumi.getter
725
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
720
+ def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
726
721
  """
727
722
  Specifies mount type specific options that are passed to the backend
728
723
  """
729
724
  return pulumi.get(self, "options")
730
725
 
731
726
  @options.setter
732
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
727
+ def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
733
728
  pulumi.set(self, "options", value)
734
729
 
735
730
  @property
@@ -816,7 +811,7 @@ class SecretBackend(pulumi.CustomResource):
816
811
  local: Optional[pulumi.Input[bool]] = None,
817
812
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
818
813
  namespace: Optional[pulumi.Input[str]] = None,
819
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
814
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
820
815
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
821
816
  path: Optional[pulumi.Input[str]] = None,
822
817
  plugin_version: Optional[pulumi.Input[str]] = None,
@@ -877,7 +872,7 @@ class SecretBackend(pulumi.CustomResource):
877
872
  The value should not contain leading or trailing forward slashes.
878
873
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
879
874
  *Available only for Vault Enterprise*.
880
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
875
+ :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
881
876
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
882
877
  :param pulumi.Input[str] path: Where the secret backend will be mounted
883
878
  :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
@@ -950,7 +945,7 @@ class SecretBackend(pulumi.CustomResource):
950
945
  local: Optional[pulumi.Input[bool]] = None,
951
946
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
952
947
  namespace: Optional[pulumi.Input[str]] = None,
953
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
948
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
954
949
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
955
950
  path: Optional[pulumi.Input[str]] = None,
956
951
  plugin_version: Optional[pulumi.Input[str]] = None,
@@ -1019,7 +1014,7 @@ class SecretBackend(pulumi.CustomResource):
1019
1014
  local: Optional[pulumi.Input[bool]] = None,
1020
1015
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1021
1016
  namespace: Optional[pulumi.Input[str]] = None,
1022
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1017
+ options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1023
1018
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1024
1019
  path: Optional[pulumi.Input[str]] = None,
1025
1020
  plugin_version: Optional[pulumi.Input[str]] = None,
@@ -1058,7 +1053,7 @@ class SecretBackend(pulumi.CustomResource):
1058
1053
  The value should not contain leading or trailing forward slashes.
1059
1054
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1060
1055
  *Available only for Vault Enterprise*.
1061
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
1056
+ :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
1062
1057
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1063
1058
  :param pulumi.Input[str] path: Where the secret backend will be mounted
1064
1059
  :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
@@ -1243,7 +1238,7 @@ class SecretBackend(pulumi.CustomResource):
1243
1238
 
1244
1239
  @property
1245
1240
  @pulumi.getter
1246
- def options(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1241
+ def options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
1247
1242
  """
1248
1243
  Specifies mount type specific options that are passed to the backend
1249
1244
  """
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
@@ -4,57 +4,25 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
18
13
  'SecretV2CustomMetadataArgs',
19
- 'SecretV2CustomMetadataArgsDict',
20
14
  ]
21
15
 
22
- MYPY = False
23
-
24
- if not MYPY:
25
- class SecretV2CustomMetadataArgsDict(TypedDict):
26
- cas_required: NotRequired[pulumi.Input[bool]]
27
- """
28
- If true, all keys will require the cas parameter to be set on all write requests.
29
- """
30
- data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
31
- """
32
- A mapping whose keys are the top-level data keys returned from
33
- Vault and whose values are the corresponding values. This map can only
34
- represent string data, so any non-string values returned from Vault are
35
- serialized as JSON.
36
- """
37
- delete_version_after: NotRequired[pulumi.Input[int]]
38
- """
39
- If set, specifies the length of time before a version is deleted.
40
- """
41
- max_versions: NotRequired[pulumi.Input[int]]
42
- """
43
- The number of versions to keep per key.
44
- """
45
- elif False:
46
- SecretV2CustomMetadataArgsDict: TypeAlias = Mapping[str, Any]
47
-
48
16
  @pulumi.input_type
49
17
  class SecretV2CustomMetadataArgs:
50
18
  def __init__(__self__, *,
51
19
  cas_required: Optional[pulumi.Input[bool]] = None,
52
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
20
+ data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
53
21
  delete_version_after: Optional[pulumi.Input[int]] = None,
54
22
  max_versions: Optional[pulumi.Input[int]] = None):
55
23
  """
56
24
  :param pulumi.Input[bool] cas_required: If true, all keys will require the cas parameter to be set on all write requests.
57
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
25
+ :param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
58
26
  Vault and whose values are the corresponding values. This map can only
59
27
  represent string data, so any non-string values returned from Vault are
60
28
  serialized as JSON.
@@ -84,7 +52,7 @@ class SecretV2CustomMetadataArgs:
84
52
 
85
53
  @property
86
54
  @pulumi.getter
87
- def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
55
+ def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
88
56
  """
89
57
  A mapping whose keys are the top-level data keys returned from
90
58
  Vault and whose values are the corresponding values. This map can only
@@ -94,7 +62,7 @@ class SecretV2CustomMetadataArgs:
94
62
  return pulumi.get(self, "data")
95
63
 
96
64
  @data.setter
97
- def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
65
+ def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
98
66
  pulumi.set(self, "data", value)
99
67
 
100
68
  @property
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -54,7 +49,7 @@ class GetSecretResult:
54
49
 
55
50
  @property
56
51
  @pulumi.getter
57
- def data(self) -> Mapping[str, str]:
52
+ def data(self) -> Mapping[str, Any]:
58
53
  """
59
54
  A mapping whose keys are the top-level data keys returned from
60
55
  Vault and whose values are the corresponding values. This map can only
@@ -186,6 +181,9 @@ def get_secret(namespace: Optional[str] = None,
186
181
  lease_renewable=pulumi.get(__ret__, 'lease_renewable'),
187
182
  namespace=pulumi.get(__ret__, 'namespace'),
188
183
  path=pulumi.get(__ret__, 'path'))
184
+
185
+
186
+ @_utilities.lift_output_func(get_secret)
189
187
  def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
190
188
  path: Optional[pulumi.Input[str]] = None,
191
189
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretResult]:
@@ -224,17 +222,4 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
224
222
  *Available only for Vault Enterprise*.
225
223
  :param str path: Full path of the KV-V1 secret.
226
224
  """
227
- __args__ = dict()
228
- __args__['namespace'] = namespace
229
- __args__['path'] = path
230
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
231
- __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult)
232
- return __ret__.apply(lambda __response__: GetSecretResult(
233
- data=pulumi.get(__response__, 'data'),
234
- data_json=pulumi.get(__response__, 'data_json'),
235
- id=pulumi.get(__response__, 'id'),
236
- lease_duration=pulumi.get(__response__, 'lease_duration'),
237
- lease_id=pulumi.get(__response__, 'lease_id'),
238
- lease_renewable=pulumi.get(__response__, 'lease_renewable'),
239
- namespace=pulumi.get(__response__, 'namespace'),
240
- path=pulumi.get(__response__, 'path')))
225
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -57,7 +52,7 @@ class GetSecretSubkeysV2Result:
57
52
 
58
53
  @property
59
54
  @pulumi.getter
60
- def data(self) -> Mapping[str, str]:
55
+ def data(self) -> Mapping[str, Any]:
61
56
  """
62
57
  Subkeys for the KV-V2 secret stored as a serialized map of strings.
63
58
  """
@@ -202,6 +197,9 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
202
197
  namespace=pulumi.get(__ret__, 'namespace'),
203
198
  path=pulumi.get(__ret__, 'path'),
204
199
  version=pulumi.get(__ret__, 'version'))
200
+
201
+
202
+ @_utilities.lift_output_func(get_secret_subkeys_v2)
205
203
  def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] = None,
206
204
  mount: Optional[pulumi.Input[str]] = None,
207
205
  name: Optional[pulumi.Input[str]] = None,
@@ -255,21 +253,4 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
255
253
  :param int version: Specifies the version to return. If not
256
254
  set the latest version is returned.
257
255
  """
258
- __args__ = dict()
259
- __args__['depth'] = depth
260
- __args__['mount'] = mount
261
- __args__['name'] = name
262
- __args__['namespace'] = namespace
263
- __args__['version'] = version
264
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
265
- __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretSubkeysV2:getSecretSubkeysV2', __args__, opts=opts, typ=GetSecretSubkeysV2Result)
266
- return __ret__.apply(lambda __response__: GetSecretSubkeysV2Result(
267
- data=pulumi.get(__response__, 'data'),
268
- data_json=pulumi.get(__response__, 'data_json'),
269
- depth=pulumi.get(__response__, 'depth'),
270
- id=pulumi.get(__response__, 'id'),
271
- mount=pulumi.get(__response__, 'mount'),
272
- name=pulumi.get(__response__, 'name'),
273
- namespace=pulumi.get(__response__, 'namespace'),
274
- path=pulumi.get(__response__, 'path'),
275
- version=pulumi.get(__response__, 'version')))
256
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -74,7 +69,7 @@ class GetSecretV2Result:
74
69
 
75
70
  @property
76
71
  @pulumi.getter(name="customMetadata")
77
- def custom_metadata(self) -> Mapping[str, str]:
72
+ def custom_metadata(self) -> Mapping[str, Any]:
78
73
  """
79
74
  Custom metadata for the secret.
80
75
  """
@@ -82,7 +77,7 @@ class GetSecretV2Result:
82
77
 
83
78
  @property
84
79
  @pulumi.getter
85
- def data(self) -> Mapping[str, str]:
80
+ def data(self) -> Mapping[str, Any]:
86
81
  """
87
82
  A mapping whose keys are the top-level data keys returned from
88
83
  Vault and whose values are the corresponding values. This map can only
@@ -246,6 +241,9 @@ def get_secret_v2(mount: Optional[str] = None,
246
241
  namespace=pulumi.get(__ret__, 'namespace'),
247
242
  path=pulumi.get(__ret__, 'path'),
248
243
  version=pulumi.get(__ret__, 'version'))
244
+
245
+
246
+ @_utilities.lift_output_func(get_secret_v2)
249
247
  def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
250
248
  name: Optional[pulumi.Input[str]] = None,
251
249
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
@@ -295,23 +293,4 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
295
293
  *Available only for Vault Enterprise*.
296
294
  :param int version: Version of the secret to retrieve.
297
295
  """
298
- __args__ = dict()
299
- __args__['mount'] = mount
300
- __args__['name'] = name
301
- __args__['namespace'] = namespace
302
- __args__['version'] = version
303
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
304
- __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretV2:getSecretV2', __args__, opts=opts, typ=GetSecretV2Result)
305
- return __ret__.apply(lambda __response__: GetSecretV2Result(
306
- created_time=pulumi.get(__response__, 'created_time'),
307
- custom_metadata=pulumi.get(__response__, 'custom_metadata'),
308
- data=pulumi.get(__response__, 'data'),
309
- data_json=pulumi.get(__response__, 'data_json'),
310
- deletion_time=pulumi.get(__response__, 'deletion_time'),
311
- destroyed=pulumi.get(__response__, 'destroyed'),
312
- id=pulumi.get(__response__, 'id'),
313
- mount=pulumi.get(__response__, 'mount'),
314
- name=pulumi.get(__response__, 'name'),
315
- namespace=pulumi.get(__response__, 'namespace'),
316
- path=pulumi.get(__response__, 'path'),
317
- version=pulumi.get(__response__, 'version')))
296
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -132,6 +127,9 @@ def get_secrets_list(namespace: Optional[str] = None,
132
127
  names=pulumi.get(__ret__, 'names'),
133
128
  namespace=pulumi.get(__ret__, 'namespace'),
134
129
  path=pulumi.get(__ret__, 'path'))
130
+
131
+
132
+ @_utilities.lift_output_func(get_secrets_list)
135
133
  def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
136
134
  path: Optional[pulumi.Input[str]] = None,
137
135
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretsListResult]:
@@ -174,13 +172,4 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
174
172
  *Available only for Vault Enterprise*.
175
173
  :param str path: Full KV-V1 path where secrets will be listed.
176
174
  """
177
- __args__ = dict()
178
- __args__['namespace'] = namespace
179
- __args__['path'] = path
180
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
181
- __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretsList:getSecretsList', __args__, opts=opts, typ=GetSecretsListResult)
182
- return __ret__.apply(lambda __response__: GetSecretsListResult(
183
- id=pulumi.get(__response__, 'id'),
184
- names=pulumi.get(__response__, 'names'),
185
- namespace=pulumi.get(__response__, 'namespace'),
186
- path=pulumi.get(__response__, 'path')))
175
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -171,6 +166,9 @@ def get_secrets_list_v2(mount: Optional[str] = None,
171
166
  names=pulumi.get(__ret__, 'names'),
172
167
  namespace=pulumi.get(__ret__, 'namespace'),
173
168
  path=pulumi.get(__ret__, 'path'))
169
+
170
+
171
+ @_utilities.lift_output_func(get_secrets_list_v2)
174
172
  def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
175
173
  name: Optional[pulumi.Input[Optional[str]]] = None,
176
174
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
@@ -228,16 +226,4 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
228
226
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
229
227
  *Available only for Vault Enterprise*.
230
228
  """
231
- __args__ = dict()
232
- __args__['mount'] = mount
233
- __args__['name'] = name
234
- __args__['namespace'] = namespace
235
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
236
- __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretsListV2:getSecretsListV2', __args__, opts=opts, typ=GetSecretsListV2Result)
237
- return __ret__.apply(lambda __response__: GetSecretsListV2Result(
238
- id=pulumi.get(__response__, 'id'),
239
- mount=pulumi.get(__response__, 'mount'),
240
- name=pulumi.get(__response__, 'name'),
241
- names=pulumi.get(__response__, 'names'),
242
- namespace=pulumi.get(__response__, 'namespace'),
243
- path=pulumi.get(__response__, 'path')))
229
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -43,12 +38,12 @@ class SecretV2CustomMetadata(dict):
43
38
 
44
39
  def __init__(__self__, *,
45
40
  cas_required: Optional[bool] = None,
46
- data: Optional[Mapping[str, str]] = None,
41
+ data: Optional[Mapping[str, Any]] = None,
47
42
  delete_version_after: Optional[int] = None,
48
43
  max_versions: Optional[int] = None):
49
44
  """
50
45
  :param bool cas_required: If true, all keys will require the cas parameter to be set on all write requests.
51
- :param Mapping[str, str] data: A mapping whose keys are the top-level data keys returned from
46
+ :param Mapping[str, Any] data: A mapping whose keys are the top-level data keys returned from
52
47
  Vault and whose values are the corresponding values. This map can only
53
48
  represent string data, so any non-string values returned from Vault are
54
49
  serialized as JSON.
@@ -74,7 +69,7 @@ class SecretV2CustomMetadata(dict):
74
69
 
75
70
  @property
76
71
  @pulumi.getter
77
- def data(self) -> Optional[Mapping[str, str]]:
72
+ def data(self) -> Optional[Mapping[str, Any]]:
78
73
  """
79
74
  A mapping whose keys are the top-level data keys returned from
80
75
  Vault and whose values are the corresponding values. This map can only
pulumi_vault/kv/secret.py CHANGED
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretArgs', 'Secret']
@@ -81,13 +76,13 @@ class SecretArgs:
81
76
  @pulumi.input_type
82
77
  class _SecretState:
83
78
  def __init__(__self__, *,
84
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
79
+ data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
85
80
  data_json: Optional[pulumi.Input[str]] = None,
86
81
  namespace: Optional[pulumi.Input[str]] = None,
87
82
  path: Optional[pulumi.Input[str]] = None):
88
83
  """
89
84
  Input properties used for looking up and filtering Secret resources.
90
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
85
+ :param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
91
86
  Vault and whose values are the corresponding values. This map can only
92
87
  represent string data, so any non-string values returned from Vault are
93
88
  serialized as JSON.
@@ -110,7 +105,7 @@ class _SecretState:
110
105
 
111
106
  @property
112
107
  @pulumi.getter
113
- def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
108
+ def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
114
109
  """
115
110
  A mapping whose keys are the top-level data keys returned from
116
111
  Vault and whose values are the corresponding values. This map can only
@@ -120,7 +115,7 @@ class _SecretState:
120
115
  return pulumi.get(self, "data")
121
116
 
122
117
  @data.setter
123
- def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
118
+ def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
124
119
  pulumi.set(self, "data", value)
125
120
 
126
121
  @property
@@ -322,7 +317,7 @@ class Secret(pulumi.CustomResource):
322
317
  def get(resource_name: str,
323
318
  id: pulumi.Input[str],
324
319
  opts: Optional[pulumi.ResourceOptions] = None,
325
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
320
+ data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
326
321
  data_json: Optional[pulumi.Input[str]] = None,
327
322
  namespace: Optional[pulumi.Input[str]] = None,
328
323
  path: Optional[pulumi.Input[str]] = None) -> 'Secret':
@@ -333,7 +328,7 @@ class Secret(pulumi.CustomResource):
333
328
  :param str resource_name: The unique name of the resulting resource.
334
329
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
335
330
  :param pulumi.ResourceOptions opts: Options for the resource.
336
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
331
+ :param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
337
332
  Vault and whose values are the corresponding values. This map can only
338
333
  represent string data, so any non-string values returned from Vault are
339
334
  serialized as JSON.
@@ -357,7 +352,7 @@ class Secret(pulumi.CustomResource):
357
352
 
358
353
  @property
359
354
  @pulumi.getter
360
- def data(self) -> pulumi.Output[Mapping[str, str]]:
355
+ def data(self) -> pulumi.Output[Mapping[str, Any]]:
361
356
  """
362
357
  A mapping whose keys are the top-level data keys returned from
363
358
  Vault and whose values are the corresponding values. This map can only
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendV2Args', 'SecretBackendV2']