pulumi-vault 6.3.2a1729803197__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +0 -560
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +4 -19
  4. pulumi_vault/ad/secret_backend.py +0 -5
  5. pulumi_vault/ad/secret_library.py +0 -5
  6. pulumi_vault/ad/secret_role.py +0 -5
  7. pulumi_vault/alicloud/auth_backend_role.py +0 -5
  8. pulumi_vault/approle/auth_backend_login.py +0 -5
  9. pulumi_vault/approle/auth_backend_role.py +0 -5
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -5
  11. pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
  12. pulumi_vault/audit.py +0 -5
  13. pulumi_vault/audit_request_header.py +0 -5
  14. pulumi_vault/auth_backend.py +0 -5
  15. pulumi_vault/aws/auth_backend_cert.py +0 -5
  16. pulumi_vault/aws/auth_backend_client.py +0 -5
  17. pulumi_vault/aws/auth_backend_config_identity.py +0 -5
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
  19. pulumi_vault/aws/auth_backend_login.py +7 -12
  20. pulumi_vault/aws/auth_backend_role.py +0 -5
  21. pulumi_vault/aws/auth_backend_role_tag.py +0 -5
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
  23. pulumi_vault/aws/auth_backend_sts_role.py +0 -5
  24. pulumi_vault/aws/get_access_credentials.py +4 -31
  25. pulumi_vault/aws/get_static_access_credentials.py +4 -18
  26. pulumi_vault/aws/secret_backend.py +0 -5
  27. pulumi_vault/aws/secret_backend_role.py +0 -5
  28. pulumi_vault/aws/secret_backend_static_role.py +0 -5
  29. pulumi_vault/azure/_inputs.py +0 -24
  30. pulumi_vault/azure/auth_backend_config.py +0 -5
  31. pulumi_vault/azure/auth_backend_role.py +0 -5
  32. pulumi_vault/azure/backend.py +0 -5
  33. pulumi_vault/azure/backend_role.py +0 -5
  34. pulumi_vault/azure/get_access_credentials.py +4 -36
  35. pulumi_vault/azure/outputs.py +0 -5
  36. pulumi_vault/cert_auth_backend_role.py +0 -5
  37. pulumi_vault/config/__init__.pyi +0 -5
  38. pulumi_vault/config/_inputs.py +0 -21
  39. pulumi_vault/config/outputs.py +0 -5
  40. pulumi_vault/config/ui_custom_message.py +14 -19
  41. pulumi_vault/config/vars.py +0 -5
  42. pulumi_vault/consul/secret_backend.py +0 -5
  43. pulumi_vault/consul/secret_backend_role.py +0 -5
  44. pulumi_vault/database/_inputs.py +105 -2056
  45. pulumi_vault/database/outputs.py +54 -59
  46. pulumi_vault/database/secret_backend_connection.py +14 -19
  47. pulumi_vault/database/secret_backend_role.py +14 -19
  48. pulumi_vault/database/secret_backend_static_role.py +0 -5
  49. pulumi_vault/database/secrets_mount.py +14 -19
  50. pulumi_vault/egp_policy.py +0 -5
  51. pulumi_vault/gcp/_inputs.py +0 -111
  52. pulumi_vault/gcp/auth_backend.py +0 -5
  53. pulumi_vault/gcp/auth_backend_role.py +0 -5
  54. pulumi_vault/gcp/get_auth_backend_role.py +4 -42
  55. pulumi_vault/gcp/outputs.py +0 -5
  56. pulumi_vault/gcp/secret_backend.py +0 -5
  57. pulumi_vault/gcp/secret_impersonated_account.py +0 -5
  58. pulumi_vault/gcp/secret_roleset.py +0 -5
  59. pulumi_vault/gcp/secret_static_account.py +0 -5
  60. pulumi_vault/generic/endpoint.py +0 -5
  61. pulumi_vault/generic/get_secret.py +5 -25
  62. pulumi_vault/generic/secret.py +7 -12
  63. pulumi_vault/get_auth_backend.py +4 -21
  64. pulumi_vault/get_auth_backends.py +4 -16
  65. pulumi_vault/get_namespace.py +5 -18
  66. pulumi_vault/get_namespaces.py +4 -13
  67. pulumi_vault/get_nomad_access_token.py +8 -28
  68. pulumi_vault/get_policy_document.py +4 -15
  69. pulumi_vault/get_raft_autopilot_state.py +7 -26
  70. pulumi_vault/github/_inputs.py +0 -55
  71. pulumi_vault/github/auth_backend.py +0 -5
  72. pulumi_vault/github/outputs.py +0 -5
  73. pulumi_vault/github/team.py +0 -5
  74. pulumi_vault/github/user.py +0 -5
  75. pulumi_vault/identity/entity.py +0 -5
  76. pulumi_vault/identity/entity_alias.py +0 -5
  77. pulumi_vault/identity/entity_policies.py +0 -5
  78. pulumi_vault/identity/get_entity.py +5 -35
  79. pulumi_vault/identity/get_group.py +6 -42
  80. pulumi_vault/identity/get_oidc_client_creds.py +4 -16
  81. pulumi_vault/identity/get_oidc_openid_config.py +4 -26
  82. pulumi_vault/identity/get_oidc_public_keys.py +5 -16
  83. pulumi_vault/identity/group.py +0 -5
  84. pulumi_vault/identity/group_alias.py +0 -5
  85. pulumi_vault/identity/group_member_entity_ids.py +0 -5
  86. pulumi_vault/identity/group_member_group_ids.py +0 -5
  87. pulumi_vault/identity/group_policies.py +0 -5
  88. pulumi_vault/identity/mfa_duo.py +0 -5
  89. pulumi_vault/identity/mfa_login_enforcement.py +0 -5
  90. pulumi_vault/identity/mfa_okta.py +0 -5
  91. pulumi_vault/identity/mfa_pingid.py +0 -5
  92. pulumi_vault/identity/mfa_totp.py +0 -5
  93. pulumi_vault/identity/oidc.py +0 -5
  94. pulumi_vault/identity/oidc_assignment.py +0 -5
  95. pulumi_vault/identity/oidc_client.py +0 -5
  96. pulumi_vault/identity/oidc_key.py +0 -5
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
  98. pulumi_vault/identity/oidc_provider.py +0 -5
  99. pulumi_vault/identity/oidc_role.py +0 -5
  100. pulumi_vault/identity/oidc_scope.py +0 -5
  101. pulumi_vault/identity/outputs.py +3 -8
  102. pulumi_vault/jwt/_inputs.py +0 -55
  103. pulumi_vault/jwt/auth_backend.py +0 -5
  104. pulumi_vault/jwt/auth_backend_role.py +28 -33
  105. pulumi_vault/jwt/outputs.py +0 -5
  106. pulumi_vault/kmip/secret_backend.py +0 -5
  107. pulumi_vault/kmip/secret_role.py +0 -5
  108. pulumi_vault/kmip/secret_scope.py +0 -5
  109. pulumi_vault/kubernetes/auth_backend_config.py +0 -5
  110. pulumi_vault/kubernetes/auth_backend_role.py +0 -5
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +4 -26
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
  113. pulumi_vault/kubernetes/get_service_account_token.py +4 -28
  114. pulumi_vault/kubernetes/secret_backend.py +14 -19
  115. pulumi_vault/kubernetes/secret_backend_role.py +0 -5
  116. pulumi_vault/kv/_inputs.py +4 -36
  117. pulumi_vault/kv/get_secret.py +5 -20
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
  119. pulumi_vault/kv/get_secret_v2.py +6 -27
  120. pulumi_vault/kv/get_secrets_list.py +4 -15
  121. pulumi_vault/kv/get_secrets_list_v2.py +4 -18
  122. pulumi_vault/kv/outputs.py +3 -8
  123. pulumi_vault/kv/secret.py +7 -12
  124. pulumi_vault/kv/secret_backend_v2.py +0 -5
  125. pulumi_vault/kv/secret_v2.py +28 -33
  126. pulumi_vault/ldap/auth_backend.py +0 -5
  127. pulumi_vault/ldap/auth_backend_group.py +0 -5
  128. pulumi_vault/ldap/auth_backend_user.py +0 -5
  129. pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
  130. pulumi_vault/ldap/get_static_credentials.py +4 -23
  131. pulumi_vault/ldap/secret_backend.py +14 -19
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
  133. pulumi_vault/ldap/secret_backend_library_set.py +0 -5
  134. pulumi_vault/ldap/secret_backend_static_role.py +0 -5
  135. pulumi_vault/managed/_inputs.py +0 -205
  136. pulumi_vault/managed/keys.py +0 -5
  137. pulumi_vault/managed/outputs.py +0 -5
  138. pulumi_vault/mfa_duo.py +0 -5
  139. pulumi_vault/mfa_okta.py +0 -5
  140. pulumi_vault/mfa_pingid.py +0 -5
  141. pulumi_vault/mfa_totp.py +0 -5
  142. pulumi_vault/mongodbatlas/secret_backend.py +0 -5
  143. pulumi_vault/mongodbatlas/secret_role.py +0 -5
  144. pulumi_vault/mount.py +16 -21
  145. pulumi_vault/namespace.py +14 -19
  146. pulumi_vault/nomad_secret_backend.py +0 -5
  147. pulumi_vault/nomad_secret_role.py +0 -5
  148. pulumi_vault/okta/_inputs.py +0 -39
  149. pulumi_vault/okta/auth_backend.py +0 -5
  150. pulumi_vault/okta/auth_backend_group.py +0 -5
  151. pulumi_vault/okta/auth_backend_user.py +0 -5
  152. pulumi_vault/okta/outputs.py +0 -5
  153. pulumi_vault/outputs.py +0 -5
  154. pulumi_vault/password_policy.py +0 -5
  155. pulumi_vault/pkisecret/_inputs.py +8 -49
  156. pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
  157. pulumi_vault/pkisecret/backend_config_est.py +14 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
  159. pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
  160. pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
  161. pulumi_vault/pkisecret/get_backend_key.py +4 -19
  162. pulumi_vault/pkisecret/get_backend_keys.py +5 -18
  163. pulumi_vault/pkisecret/outputs.py +12 -17
  164. pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
  172. pulumi_vault/pkisecret/secret_backend_key.py +0 -5
  173. pulumi_vault/pkisecret/secret_backend_role.py +0 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
  176. pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
  177. pulumi_vault/plugin.py +0 -5
  178. pulumi_vault/plugin_pinned_version.py +0 -5
  179. pulumi_vault/policy.py +0 -5
  180. pulumi_vault/provider.py +0 -5
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +0 -5
  183. pulumi_vault/quota_rate_limit.py +0 -5
  184. pulumi_vault/rabbitmq/_inputs.py +0 -61
  185. pulumi_vault/rabbitmq/outputs.py +0 -5
  186. pulumi_vault/rabbitmq/secret_backend.py +0 -5
  187. pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
  188. pulumi_vault/raft_autopilot.py +0 -5
  189. pulumi_vault/raft_snapshot_agent_config.py +0 -5
  190. pulumi_vault/rgp_policy.py +0 -5
  191. pulumi_vault/saml/auth_backend.py +0 -5
  192. pulumi_vault/saml/auth_backend_role.py +14 -19
  193. pulumi_vault/secrets/_inputs.py +0 -30
  194. pulumi_vault/secrets/outputs.py +0 -5
  195. pulumi_vault/secrets/sync_association.py +0 -5
  196. pulumi_vault/secrets/sync_aws_destination.py +14 -19
  197. pulumi_vault/secrets/sync_azure_destination.py +14 -19
  198. pulumi_vault/secrets/sync_config.py +0 -5
  199. pulumi_vault/secrets/sync_gcp_destination.py +14 -19
  200. pulumi_vault/secrets/sync_gh_destination.py +0 -5
  201. pulumi_vault/secrets/sync_github_apps.py +0 -5
  202. pulumi_vault/secrets/sync_vercel_destination.py +0 -5
  203. pulumi_vault/ssh/_inputs.py +0 -22
  204. pulumi_vault/ssh/outputs.py +0 -5
  205. pulumi_vault/ssh/secret_backend_ca.py +0 -5
  206. pulumi_vault/ssh/secret_backend_role.py +28 -33
  207. pulumi_vault/terraformcloud/secret_backend.py +0 -5
  208. pulumi_vault/terraformcloud/secret_creds.py +0 -5
  209. pulumi_vault/terraformcloud/secret_role.py +0 -5
  210. pulumi_vault/token.py +0 -5
  211. pulumi_vault/tokenauth/auth_backend_role.py +14 -5
  212. pulumi_vault/transform/alphabet.py +0 -5
  213. pulumi_vault/transform/get_decode.py +14 -38
  214. pulumi_vault/transform/get_encode.py +14 -38
  215. pulumi_vault/transform/role.py +0 -5
  216. pulumi_vault/transform/template.py +14 -19
  217. pulumi_vault/transform/transformation.py +0 -5
  218. pulumi_vault/transit/get_decrypt.py +4 -21
  219. pulumi_vault/transit/get_encrypt.py +4 -23
  220. pulumi_vault/transit/secret_backend_key.py +7 -12
  221. pulumi_vault/transit/secret_cache_config.py +0 -5
  222. {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
  223. pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.3.2a1729803197.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -2501,7 +2496,7 @@ class SecretsMountCassandra(dict):
2501
2496
  name: str,
2502
2497
  allowed_roles: Optional[Sequence[str]] = None,
2503
2498
  connect_timeout: Optional[int] = None,
2504
- data: Optional[Mapping[str, str]] = None,
2499
+ data: Optional[Mapping[str, Any]] = None,
2505
2500
  hosts: Optional[Sequence[str]] = None,
2506
2501
  insecure_tls: Optional[bool] = None,
2507
2502
  password: Optional[str] = None,
@@ -2519,7 +2514,7 @@ class SecretsMountCassandra(dict):
2519
2514
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
2520
2515
  connection.
2521
2516
  :param int connect_timeout: The number of seconds to use as a connection timeout.
2522
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2517
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2523
2518
 
2524
2519
  Supported list of database secrets engines that can be configured:
2525
2520
  :param Sequence[str] hosts: Cassandra hosts to connect to.
@@ -2595,7 +2590,7 @@ class SecretsMountCassandra(dict):
2595
2590
 
2596
2591
  @property
2597
2592
  @pulumi.getter
2598
- def data(self) -> Optional[Mapping[str, str]]:
2593
+ def data(self) -> Optional[Mapping[str, Any]]:
2599
2594
  """
2600
2595
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2601
2596
 
@@ -2742,7 +2737,7 @@ class SecretsMountCouchbase(dict):
2742
2737
  allowed_roles: Optional[Sequence[str]] = None,
2743
2738
  base64_pem: Optional[str] = None,
2744
2739
  bucket_name: Optional[str] = None,
2745
- data: Optional[Mapping[str, str]] = None,
2740
+ data: Optional[Mapping[str, Any]] = None,
2746
2741
  insecure_tls: Optional[bool] = None,
2747
2742
  plugin_name: Optional[str] = None,
2748
2743
  root_rotation_statements: Optional[Sequence[str]] = None,
@@ -2758,7 +2753,7 @@ class SecretsMountCouchbase(dict):
2758
2753
  connection.
2759
2754
  :param str base64_pem: Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded.
2760
2755
  :param str bucket_name: Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server.
2761
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2756
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2762
2757
 
2763
2758
  Supported list of database secrets engines that can be configured:
2764
2759
  :param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
@@ -2853,7 +2848,7 @@ class SecretsMountCouchbase(dict):
2853
2848
 
2854
2849
  @property
2855
2850
  @pulumi.getter
2856
- def data(self) -> Optional[Mapping[str, str]]:
2851
+ def data(self) -> Optional[Mapping[str, Any]]:
2857
2852
  """
2858
2853
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2859
2854
 
@@ -2958,7 +2953,7 @@ class SecretsMountElasticsearch(dict):
2958
2953
  ca_path: Optional[str] = None,
2959
2954
  client_cert: Optional[str] = None,
2960
2955
  client_key: Optional[str] = None,
2961
- data: Optional[Mapping[str, str]] = None,
2956
+ data: Optional[Mapping[str, Any]] = None,
2962
2957
  insecure: Optional[bool] = None,
2963
2958
  plugin_name: Optional[str] = None,
2964
2959
  root_rotation_statements: Optional[Sequence[str]] = None,
@@ -2976,7 +2971,7 @@ class SecretsMountElasticsearch(dict):
2976
2971
  :param str ca_path: The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity
2977
2972
  :param str client_cert: The path to the certificate for the Elasticsearch client to present for communication
2978
2973
  :param str client_key: The path to the key for the Elasticsearch client to use for communication
2979
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2974
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
2980
2975
 
2981
2976
  Supported list of database secrets engines that can be configured:
2982
2977
  :param bool insecure: Whether to disable certificate verification
@@ -3091,7 +3086,7 @@ class SecretsMountElasticsearch(dict):
3091
3086
 
3092
3087
  @property
3093
3088
  @pulumi.getter
3094
- def data(self) -> Optional[Mapping[str, str]]:
3089
+ def data(self) -> Optional[Mapping[str, Any]]:
3095
3090
  """
3096
3091
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3097
3092
 
@@ -3188,7 +3183,7 @@ class SecretsMountHana(dict):
3188
3183
  name: str,
3189
3184
  allowed_roles: Optional[Sequence[str]] = None,
3190
3185
  connection_url: Optional[str] = None,
3191
- data: Optional[Mapping[str, str]] = None,
3186
+ data: Optional[Mapping[str, Any]] = None,
3192
3187
  disable_escaping: Optional[bool] = None,
3193
3188
  max_connection_lifetime: Optional[int] = None,
3194
3189
  max_idle_connections: Optional[int] = None,
@@ -3203,7 +3198,7 @@ class SecretsMountHana(dict):
3203
3198
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
3204
3199
  connection.
3205
3200
  :param str connection_url: Connection string to use to connect to the database.
3206
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3201
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3207
3202
 
3208
3203
  Supported list of database secrets engines that can be configured:
3209
3204
  :param bool disable_escaping: Disable special character escaping in username and password
@@ -3270,7 +3265,7 @@ class SecretsMountHana(dict):
3270
3265
 
3271
3266
  @property
3272
3267
  @pulumi.getter
3273
- def data(self) -> Optional[Mapping[str, str]]:
3268
+ def data(self) -> Optional[Mapping[str, Any]]:
3274
3269
  """
3275
3270
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3276
3271
 
@@ -3394,7 +3389,7 @@ class SecretsMountInfluxdb(dict):
3394
3389
  username: str,
3395
3390
  allowed_roles: Optional[Sequence[str]] = None,
3396
3391
  connect_timeout: Optional[int] = None,
3397
- data: Optional[Mapping[str, str]] = None,
3392
+ data: Optional[Mapping[str, Any]] = None,
3398
3393
  insecure_tls: Optional[bool] = None,
3399
3394
  pem_bundle: Optional[str] = None,
3400
3395
  pem_json: Optional[str] = None,
@@ -3412,7 +3407,7 @@ class SecretsMountInfluxdb(dict):
3412
3407
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
3413
3408
  connection.
3414
3409
  :param int connect_timeout: The number of seconds to use as a connection timeout.
3415
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3410
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3416
3411
 
3417
3412
  Supported list of database secrets engines that can be configured:
3418
3413
  :param bool insecure_tls: Whether to skip verification of the server certificate when using TLS.
@@ -3506,7 +3501,7 @@ class SecretsMountInfluxdb(dict):
3506
3501
 
3507
3502
  @property
3508
3503
  @pulumi.getter
3509
- def data(self) -> Optional[Mapping[str, str]]:
3504
+ def data(self) -> Optional[Mapping[str, Any]]:
3510
3505
  """
3511
3506
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3512
3507
 
@@ -3627,7 +3622,7 @@ class SecretsMountMongodb(dict):
3627
3622
  name: str,
3628
3623
  allowed_roles: Optional[Sequence[str]] = None,
3629
3624
  connection_url: Optional[str] = None,
3630
- data: Optional[Mapping[str, str]] = None,
3625
+ data: Optional[Mapping[str, Any]] = None,
3631
3626
  max_connection_lifetime: Optional[int] = None,
3632
3627
  max_idle_connections: Optional[int] = None,
3633
3628
  max_open_connections: Optional[int] = None,
@@ -3642,7 +3637,7 @@ class SecretsMountMongodb(dict):
3642
3637
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
3643
3638
  connection.
3644
3639
  :param str connection_url: Connection string to use to connect to the database.
3645
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3640
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3646
3641
 
3647
3642
  Supported list of database secrets engines that can be configured:
3648
3643
  :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
@@ -3709,7 +3704,7 @@ class SecretsMountMongodb(dict):
3709
3704
 
3710
3705
  @property
3711
3706
  @pulumi.getter
3712
- def data(self) -> Optional[Mapping[str, str]]:
3707
+ def data(self) -> Optional[Mapping[str, Any]]:
3713
3708
  """
3714
3709
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3715
3710
 
@@ -3828,7 +3823,7 @@ class SecretsMountMongodbatla(dict):
3828
3823
  project_id: str,
3829
3824
  public_key: str,
3830
3825
  allowed_roles: Optional[Sequence[str]] = None,
3831
- data: Optional[Mapping[str, str]] = None,
3826
+ data: Optional[Mapping[str, Any]] = None,
3832
3827
  plugin_name: Optional[str] = None,
3833
3828
  root_rotation_statements: Optional[Sequence[str]] = None,
3834
3829
  verify_connection: Optional[bool] = None):
@@ -3839,7 +3834,7 @@ class SecretsMountMongodbatla(dict):
3839
3834
  :param str public_key: The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
3840
3835
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
3841
3836
  connection.
3842
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3837
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3843
3838
 
3844
3839
  Supported list of database secrets engines that can be configured:
3845
3840
  :param str plugin_name: Specifies the name of the plugin to use.
@@ -3905,7 +3900,7 @@ class SecretsMountMongodbatla(dict):
3905
3900
 
3906
3901
  @property
3907
3902
  @pulumi.getter
3908
- def data(self) -> Optional[Mapping[str, str]]:
3903
+ def data(self) -> Optional[Mapping[str, Any]]:
3909
3904
  """
3910
3905
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3911
3906
 
@@ -3983,7 +3978,7 @@ class SecretsMountMssql(dict):
3983
3978
  allowed_roles: Optional[Sequence[str]] = None,
3984
3979
  connection_url: Optional[str] = None,
3985
3980
  contained_db: Optional[bool] = None,
3986
- data: Optional[Mapping[str, str]] = None,
3981
+ data: Optional[Mapping[str, Any]] = None,
3987
3982
  disable_escaping: Optional[bool] = None,
3988
3983
  max_connection_lifetime: Optional[int] = None,
3989
3984
  max_idle_connections: Optional[int] = None,
@@ -4000,7 +3995,7 @@ class SecretsMountMssql(dict):
4000
3995
  connection.
4001
3996
  :param str connection_url: Connection string to use to connect to the database.
4002
3997
  :param bool contained_db: Set to true when the target is a Contained Database, e.g. AzureSQL.
4003
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
3998
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4004
3999
 
4005
4000
  Supported list of database secrets engines that can be configured:
4006
4001
  :param bool disable_escaping: Disable special character escaping in username and password
@@ -4080,7 +4075,7 @@ class SecretsMountMssql(dict):
4080
4075
 
4081
4076
  @property
4082
4077
  @pulumi.getter
4083
- def data(self) -> Optional[Mapping[str, str]]:
4078
+ def data(self) -> Optional[Mapping[str, Any]]:
4084
4079
  """
4085
4080
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4086
4081
 
@@ -4218,7 +4213,7 @@ class SecretsMountMysql(dict):
4218
4213
  allowed_roles: Optional[Sequence[str]] = None,
4219
4214
  auth_type: Optional[str] = None,
4220
4215
  connection_url: Optional[str] = None,
4221
- data: Optional[Mapping[str, str]] = None,
4216
+ data: Optional[Mapping[str, Any]] = None,
4222
4217
  max_connection_lifetime: Optional[int] = None,
4223
4218
  max_idle_connections: Optional[int] = None,
4224
4219
  max_open_connections: Optional[int] = None,
@@ -4237,7 +4232,7 @@ class SecretsMountMysql(dict):
4237
4232
  connection.
4238
4233
  :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
4239
4234
  :param str connection_url: Connection string to use to connect to the database.
4240
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4235
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4241
4236
 
4242
4237
  Supported list of database secrets engines that can be configured:
4243
4238
  :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
@@ -4323,7 +4318,7 @@ class SecretsMountMysql(dict):
4323
4318
 
4324
4319
  @property
4325
4320
  @pulumi.getter
4326
- def data(self) -> Optional[Mapping[str, str]]:
4321
+ def data(self) -> Optional[Mapping[str, Any]]:
4327
4322
  """
4328
4323
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4329
4324
 
@@ -4477,7 +4472,7 @@ class SecretsMountMysqlAurora(dict):
4477
4472
  allowed_roles: Optional[Sequence[str]] = None,
4478
4473
  auth_type: Optional[str] = None,
4479
4474
  connection_url: Optional[str] = None,
4480
- data: Optional[Mapping[str, str]] = None,
4475
+ data: Optional[Mapping[str, Any]] = None,
4481
4476
  max_connection_lifetime: Optional[int] = None,
4482
4477
  max_idle_connections: Optional[int] = None,
4483
4478
  max_open_connections: Optional[int] = None,
@@ -4496,7 +4491,7 @@ class SecretsMountMysqlAurora(dict):
4496
4491
  connection.
4497
4492
  :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
4498
4493
  :param str connection_url: Connection string to use to connect to the database.
4499
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4494
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4500
4495
 
4501
4496
  Supported list of database secrets engines that can be configured:
4502
4497
  :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
@@ -4582,7 +4577,7 @@ class SecretsMountMysqlAurora(dict):
4582
4577
 
4583
4578
  @property
4584
4579
  @pulumi.getter
4585
- def data(self) -> Optional[Mapping[str, str]]:
4580
+ def data(self) -> Optional[Mapping[str, Any]]:
4586
4581
  """
4587
4582
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4588
4583
 
@@ -4736,7 +4731,7 @@ class SecretsMountMysqlLegacy(dict):
4736
4731
  allowed_roles: Optional[Sequence[str]] = None,
4737
4732
  auth_type: Optional[str] = None,
4738
4733
  connection_url: Optional[str] = None,
4739
- data: Optional[Mapping[str, str]] = None,
4734
+ data: Optional[Mapping[str, Any]] = None,
4740
4735
  max_connection_lifetime: Optional[int] = None,
4741
4736
  max_idle_connections: Optional[int] = None,
4742
4737
  max_open_connections: Optional[int] = None,
@@ -4755,7 +4750,7 @@ class SecretsMountMysqlLegacy(dict):
4755
4750
  connection.
4756
4751
  :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
4757
4752
  :param str connection_url: Connection string to use to connect to the database.
4758
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4753
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4759
4754
 
4760
4755
  Supported list of database secrets engines that can be configured:
4761
4756
  :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
@@ -4841,7 +4836,7 @@ class SecretsMountMysqlLegacy(dict):
4841
4836
 
4842
4837
  @property
4843
4838
  @pulumi.getter
4844
- def data(self) -> Optional[Mapping[str, str]]:
4839
+ def data(self) -> Optional[Mapping[str, Any]]:
4845
4840
  """
4846
4841
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
4847
4842
 
@@ -4995,7 +4990,7 @@ class SecretsMountMysqlRd(dict):
4995
4990
  allowed_roles: Optional[Sequence[str]] = None,
4996
4991
  auth_type: Optional[str] = None,
4997
4992
  connection_url: Optional[str] = None,
4998
- data: Optional[Mapping[str, str]] = None,
4993
+ data: Optional[Mapping[str, Any]] = None,
4999
4994
  max_connection_lifetime: Optional[int] = None,
5000
4995
  max_idle_connections: Optional[int] = None,
5001
4996
  max_open_connections: Optional[int] = None,
@@ -5014,7 +5009,7 @@ class SecretsMountMysqlRd(dict):
5014
5009
  connection.
5015
5010
  :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
5016
5011
  :param str connection_url: Connection string to use to connect to the database.
5017
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5012
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5018
5013
 
5019
5014
  Supported list of database secrets engines that can be configured:
5020
5015
  :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
@@ -5100,7 +5095,7 @@ class SecretsMountMysqlRd(dict):
5100
5095
 
5101
5096
  @property
5102
5097
  @pulumi.getter
5103
- def data(self) -> Optional[Mapping[str, str]]:
5098
+ def data(self) -> Optional[Mapping[str, Any]]:
5104
5099
  """
5105
5100
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5106
5101
 
@@ -5249,7 +5244,7 @@ class SecretsMountOracle(dict):
5249
5244
  name: str,
5250
5245
  allowed_roles: Optional[Sequence[str]] = None,
5251
5246
  connection_url: Optional[str] = None,
5252
- data: Optional[Mapping[str, str]] = None,
5247
+ data: Optional[Mapping[str, Any]] = None,
5253
5248
  disconnect_sessions: Optional[bool] = None,
5254
5249
  max_connection_lifetime: Optional[int] = None,
5255
5250
  max_idle_connections: Optional[int] = None,
@@ -5266,7 +5261,7 @@ class SecretsMountOracle(dict):
5266
5261
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
5267
5262
  connection.
5268
5263
  :param str connection_url: Connection string to use to connect to the database.
5269
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5264
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5270
5265
 
5271
5266
  Supported list of database secrets engines that can be configured:
5272
5267
  :param bool disconnect_sessions: Set to true to disconnect any open sessions prior to running the revocation statements.
@@ -5339,7 +5334,7 @@ class SecretsMountOracle(dict):
5339
5334
 
5340
5335
  @property
5341
5336
  @pulumi.getter
5342
- def data(self) -> Optional[Mapping[str, str]]:
5337
+ def data(self) -> Optional[Mapping[str, Any]]:
5343
5338
  """
5344
5339
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5345
5340
 
@@ -5483,7 +5478,7 @@ class SecretsMountPostgresql(dict):
5483
5478
  allowed_roles: Optional[Sequence[str]] = None,
5484
5479
  auth_type: Optional[str] = None,
5485
5480
  connection_url: Optional[str] = None,
5486
- data: Optional[Mapping[str, str]] = None,
5481
+ data: Optional[Mapping[str, Any]] = None,
5487
5482
  disable_escaping: Optional[bool] = None,
5488
5483
  max_connection_lifetime: Optional[int] = None,
5489
5484
  max_idle_connections: Optional[int] = None,
@@ -5501,7 +5496,7 @@ class SecretsMountPostgresql(dict):
5501
5496
  connection.
5502
5497
  :param str auth_type: Specify alternative authorization type. (Only 'gcp_iam' is valid currently)
5503
5498
  :param str connection_url: Connection string to use to connect to the database.
5504
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5499
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5505
5500
 
5506
5501
  Supported list of database secrets engines that can be configured:
5507
5502
  :param bool disable_escaping: Disable special character escaping in username and password
@@ -5584,7 +5579,7 @@ class SecretsMountPostgresql(dict):
5584
5579
 
5585
5580
  @property
5586
5581
  @pulumi.getter
5587
- def data(self) -> Optional[Mapping[str, str]]:
5582
+ def data(self) -> Optional[Mapping[str, Any]]:
5588
5583
  """
5589
5584
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5590
5585
 
@@ -5718,7 +5713,7 @@ class SecretsMountRedi(dict):
5718
5713
  username: str,
5719
5714
  allowed_roles: Optional[Sequence[str]] = None,
5720
5715
  ca_cert: Optional[str] = None,
5721
- data: Optional[Mapping[str, str]] = None,
5716
+ data: Optional[Mapping[str, Any]] = None,
5722
5717
  insecure_tls: Optional[bool] = None,
5723
5718
  plugin_name: Optional[str] = None,
5724
5719
  port: Optional[int] = None,
@@ -5733,7 +5728,7 @@ class SecretsMountRedi(dict):
5733
5728
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
5734
5729
  connection.
5735
5730
  :param str ca_cert: The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity.
5736
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5731
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5737
5732
 
5738
5733
  Supported list of database secrets engines that can be configured:
5739
5734
  :param bool insecure_tls: Specifies whether to skip verification of the server certificate when using TLS.
@@ -5818,7 +5813,7 @@ class SecretsMountRedi(dict):
5818
5813
 
5819
5814
  @property
5820
5815
  @pulumi.getter
5821
- def data(self) -> Optional[Mapping[str, str]]:
5816
+ def data(self) -> Optional[Mapping[str, Any]]:
5822
5817
  """
5823
5818
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5824
5819
 
@@ -5905,7 +5900,7 @@ class SecretsMountRedisElasticach(dict):
5905
5900
  name: str,
5906
5901
  url: str,
5907
5902
  allowed_roles: Optional[Sequence[str]] = None,
5908
- data: Optional[Mapping[str, str]] = None,
5903
+ data: Optional[Mapping[str, Any]] = None,
5909
5904
  password: Optional[str] = None,
5910
5905
  plugin_name: Optional[str] = None,
5911
5906
  region: Optional[str] = None,
@@ -5917,7 +5912,7 @@ class SecretsMountRedisElasticach(dict):
5917
5912
  :param str url: The configuration endpoint for the ElastiCache cluster to connect to.
5918
5913
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
5919
5914
  connection.
5920
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5915
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5921
5916
 
5922
5917
  Supported list of database secrets engines that can be configured:
5923
5918
  :param str password: The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead.
@@ -5974,7 +5969,7 @@ class SecretsMountRedisElasticach(dict):
5974
5969
 
5975
5970
  @property
5976
5971
  @pulumi.getter
5977
- def data(self) -> Optional[Mapping[str, str]]:
5972
+ def data(self) -> Optional[Mapping[str, Any]]:
5978
5973
  """
5979
5974
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
5980
5975
 
@@ -6073,7 +6068,7 @@ class SecretsMountRedshift(dict):
6073
6068
  name: str,
6074
6069
  allowed_roles: Optional[Sequence[str]] = None,
6075
6070
  connection_url: Optional[str] = None,
6076
- data: Optional[Mapping[str, str]] = None,
6071
+ data: Optional[Mapping[str, Any]] = None,
6077
6072
  disable_escaping: Optional[bool] = None,
6078
6073
  max_connection_lifetime: Optional[int] = None,
6079
6074
  max_idle_connections: Optional[int] = None,
@@ -6089,7 +6084,7 @@ class SecretsMountRedshift(dict):
6089
6084
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
6090
6085
  connection.
6091
6086
  :param str connection_url: Connection string to use to connect to the database.
6092
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6087
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6093
6088
 
6094
6089
  Supported list of database secrets engines that can be configured:
6095
6090
  :param bool disable_escaping: Disable special character escaping in username and password
@@ -6159,7 +6154,7 @@ class SecretsMountRedshift(dict):
6159
6154
 
6160
6155
  @property
6161
6156
  @pulumi.getter
6162
- def data(self) -> Optional[Mapping[str, str]]:
6157
+ def data(self) -> Optional[Mapping[str, Any]]:
6163
6158
  """
6164
6159
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6165
6160
 
@@ -6288,7 +6283,7 @@ class SecretsMountSnowflake(dict):
6288
6283
  name: str,
6289
6284
  allowed_roles: Optional[Sequence[str]] = None,
6290
6285
  connection_url: Optional[str] = None,
6291
- data: Optional[Mapping[str, str]] = None,
6286
+ data: Optional[Mapping[str, Any]] = None,
6292
6287
  max_connection_lifetime: Optional[int] = None,
6293
6288
  max_idle_connections: Optional[int] = None,
6294
6289
  max_open_connections: Optional[int] = None,
@@ -6303,7 +6298,7 @@ class SecretsMountSnowflake(dict):
6303
6298
  :param Sequence[str] allowed_roles: A list of roles that are allowed to use this
6304
6299
  connection.
6305
6300
  :param str connection_url: Connection string to use to connect to the database.
6306
- :param Mapping[str, str] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6301
+ :param Mapping[str, Any] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6307
6302
 
6308
6303
  Supported list of database secrets engines that can be configured:
6309
6304
  :param int max_connection_lifetime: Maximum number of seconds a connection may be reused.
@@ -6370,7 +6365,7 @@ class SecretsMountSnowflake(dict):
6370
6365
 
6371
6366
  @property
6372
6367
  @pulumi.getter
6373
- def data(self) -> Optional[Mapping[str, str]]:
6368
+ def data(self) -> Optional[Mapping[str, Any]]:
6374
6369
  """
6375
6370
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
6376
6371
 
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -25,7 +20,7 @@ class SecretBackendConnectionArgs:
25
20
  allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
26
21
  cassandra: Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']] = None,
27
22
  couchbase: Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']] = None,
28
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
23
+ data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
29
24
  elasticsearch: Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']] = None,
30
25
  hana: Optional[pulumi.Input['SecretBackendConnectionHanaArgs']] = None,
31
26
  influxdb: Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']] = None,
@@ -54,7 +49,7 @@ class SecretBackendConnectionArgs:
54
49
  connection.
55
50
  :param pulumi.Input['SecretBackendConnectionCassandraArgs'] cassandra: A nested block containing configuration options for Cassandra connections.
56
51
  :param pulumi.Input['SecretBackendConnectionCouchbaseArgs'] couchbase: A nested block containing configuration options for Couchbase connections.
57
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
52
+ :param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
58
53
  :param pulumi.Input['SecretBackendConnectionElasticsearchArgs'] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
59
54
  :param pulumi.Input['SecretBackendConnectionHanaArgs'] hana: A nested block containing configuration options for SAP HanaDB connections.
60
55
  :param pulumi.Input['SecretBackendConnectionInfluxdbArgs'] influxdb: A nested block containing configuration options for InfluxDB connections.
@@ -186,14 +181,14 @@ class SecretBackendConnectionArgs:
186
181
 
187
182
  @property
188
183
  @pulumi.getter
189
- def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
184
+ def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
190
185
  """
191
186
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
192
187
  """
193
188
  return pulumi.get(self, "data")
194
189
 
195
190
  @data.setter
196
- def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
191
+ def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
197
192
  pulumi.set(self, "data", value)
198
193
 
199
194
  @property
@@ -462,7 +457,7 @@ class _SecretBackendConnectionState:
462
457
  backend: Optional[pulumi.Input[str]] = None,
463
458
  cassandra: Optional[pulumi.Input['SecretBackendConnectionCassandraArgs']] = None,
464
459
  couchbase: Optional[pulumi.Input['SecretBackendConnectionCouchbaseArgs']] = None,
465
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
460
+ data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
466
461
  elasticsearch: Optional[pulumi.Input['SecretBackendConnectionElasticsearchArgs']] = None,
467
462
  hana: Optional[pulumi.Input['SecretBackendConnectionHanaArgs']] = None,
468
463
  influxdb: Optional[pulumi.Input['SecretBackendConnectionInfluxdbArgs']] = None,
@@ -491,7 +486,7 @@ class _SecretBackendConnectionState:
491
486
  :param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
492
487
  :param pulumi.Input['SecretBackendConnectionCassandraArgs'] cassandra: A nested block containing configuration options for Cassandra connections.
493
488
  :param pulumi.Input['SecretBackendConnectionCouchbaseArgs'] couchbase: A nested block containing configuration options for Couchbase connections.
494
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
489
+ :param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
495
490
  :param pulumi.Input['SecretBackendConnectionElasticsearchArgs'] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
496
491
  :param pulumi.Input['SecretBackendConnectionHanaArgs'] hana: A nested block containing configuration options for SAP HanaDB connections.
497
492
  :param pulumi.Input['SecretBackendConnectionInfluxdbArgs'] influxdb: A nested block containing configuration options for InfluxDB connections.
@@ -624,14 +619,14 @@ class _SecretBackendConnectionState:
624
619
 
625
620
  @property
626
621
  @pulumi.getter
627
- def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
622
+ def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
628
623
  """
629
624
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
630
625
  """
631
626
  return pulumi.get(self, "data")
632
627
 
633
628
  @data.setter
634
- def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
629
+ def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
635
630
  pulumi.set(self, "data", value)
636
631
 
637
632
  @property
@@ -902,7 +897,7 @@ class SecretBackendConnection(pulumi.CustomResource):
902
897
  backend: Optional[pulumi.Input[str]] = None,
903
898
  cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
904
899
  couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
905
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
900
+ data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
906
901
  elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
907
902
  hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
908
903
  influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
@@ -962,7 +957,7 @@ class SecretBackendConnection(pulumi.CustomResource):
962
957
  :param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
963
958
  :param pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']] cassandra: A nested block containing configuration options for Cassandra connections.
964
959
  :param pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']] couchbase: A nested block containing configuration options for Couchbase connections.
965
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
960
+ :param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
966
961
  :param pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
967
962
  :param pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']] hana: A nested block containing configuration options for SAP HanaDB connections.
968
963
  :param pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']] influxdb: A nested block containing configuration options for InfluxDB connections.
@@ -1046,7 +1041,7 @@ class SecretBackendConnection(pulumi.CustomResource):
1046
1041
  backend: Optional[pulumi.Input[str]] = None,
1047
1042
  cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
1048
1043
  couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
1049
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1044
+ data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1050
1045
  elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
1051
1046
  hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
1052
1047
  influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
@@ -1119,7 +1114,7 @@ class SecretBackendConnection(pulumi.CustomResource):
1119
1114
  backend: Optional[pulumi.Input[str]] = None,
1120
1115
  cassandra: Optional[pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']]] = None,
1121
1116
  couchbase: Optional[pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']]] = None,
1122
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1117
+ data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1123
1118
  elasticsearch: Optional[pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']]] = None,
1124
1119
  hana: Optional[pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']]] = None,
1125
1120
  influxdb: Optional[pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']]] = None,
@@ -1153,7 +1148,7 @@ class SecretBackendConnection(pulumi.CustomResource):
1153
1148
  :param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
1154
1149
  :param pulumi.Input[Union['SecretBackendConnectionCassandraArgs', 'SecretBackendConnectionCassandraArgsDict']] cassandra: A nested block containing configuration options for Cassandra connections.
1155
1150
  :param pulumi.Input[Union['SecretBackendConnectionCouchbaseArgs', 'SecretBackendConnectionCouchbaseArgsDict']] couchbase: A nested block containing configuration options for Couchbase connections.
1156
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
1151
+ :param pulumi.Input[Mapping[str, Any]] data: A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
1157
1152
  :param pulumi.Input[Union['SecretBackendConnectionElasticsearchArgs', 'SecretBackendConnectionElasticsearchArgsDict']] elasticsearch: A nested block containing configuration options for Elasticsearch connections.
1158
1153
  :param pulumi.Input[Union['SecretBackendConnectionHanaArgs', 'SecretBackendConnectionHanaArgsDict']] hana: A nested block containing configuration options for SAP HanaDB connections.
1159
1154
  :param pulumi.Input[Union['SecretBackendConnectionInfluxdbArgs', 'SecretBackendConnectionInfluxdbArgsDict']] influxdb: A nested block containing configuration options for InfluxDB connections.
@@ -1249,7 +1244,7 @@ class SecretBackendConnection(pulumi.CustomResource):
1249
1244
 
1250
1245
  @property
1251
1246
  @pulumi.getter
1252
- def data(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1247
+ def data(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
1253
1248
  """
1254
1249
  A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
1255
1250
  """