pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +0 -560
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +4 -19
  4. pulumi_vault/ad/secret_backend.py +0 -5
  5. pulumi_vault/ad/secret_library.py +0 -5
  6. pulumi_vault/ad/secret_role.py +0 -5
  7. pulumi_vault/alicloud/auth_backend_role.py +0 -5
  8. pulumi_vault/approle/auth_backend_login.py +0 -5
  9. pulumi_vault/approle/auth_backend_role.py +0 -5
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
  11. pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
  12. pulumi_vault/audit.py +0 -5
  13. pulumi_vault/audit_request_header.py +0 -5
  14. pulumi_vault/auth_backend.py +0 -5
  15. pulumi_vault/aws/auth_backend_cert.py +0 -5
  16. pulumi_vault/aws/auth_backend_client.py +0 -5
  17. pulumi_vault/aws/auth_backend_config_identity.py +0 -5
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
  19. pulumi_vault/aws/auth_backend_login.py +7 -12
  20. pulumi_vault/aws/auth_backend_role.py +0 -5
  21. pulumi_vault/aws/auth_backend_role_tag.py +0 -5
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
  23. pulumi_vault/aws/auth_backend_sts_role.py +0 -5
  24. pulumi_vault/aws/get_access_credentials.py +4 -31
  25. pulumi_vault/aws/get_static_access_credentials.py +4 -18
  26. pulumi_vault/aws/secret_backend.py +0 -5
  27. pulumi_vault/aws/secret_backend_role.py +0 -5
  28. pulumi_vault/aws/secret_backend_static_role.py +0 -5
  29. pulumi_vault/azure/_inputs.py +0 -24
  30. pulumi_vault/azure/auth_backend_config.py +0 -5
  31. pulumi_vault/azure/auth_backend_role.py +0 -5
  32. pulumi_vault/azure/backend.py +0 -5
  33. pulumi_vault/azure/backend_role.py +0 -5
  34. pulumi_vault/azure/get_access_credentials.py +4 -36
  35. pulumi_vault/azure/outputs.py +0 -5
  36. pulumi_vault/cert_auth_backend_role.py +0 -5
  37. pulumi_vault/config/__init__.pyi +0 -5
  38. pulumi_vault/config/_inputs.py +0 -21
  39. pulumi_vault/config/outputs.py +0 -5
  40. pulumi_vault/config/ui_custom_message.py +14 -19
  41. pulumi_vault/config/vars.py +0 -5
  42. pulumi_vault/consul/secret_backend.py +0 -5
  43. pulumi_vault/consul/secret_backend_role.py +0 -5
  44. pulumi_vault/database/_inputs.py +105 -2256
  45. pulumi_vault/database/outputs.py +54 -199
  46. pulumi_vault/database/secret_backend_connection.py +14 -19
  47. pulumi_vault/database/secret_backend_role.py +14 -19
  48. pulumi_vault/database/secret_backend_static_role.py +1 -69
  49. pulumi_vault/database/secrets_mount.py +14 -19
  50. pulumi_vault/egp_policy.py +0 -5
  51. pulumi_vault/gcp/_inputs.py +0 -111
  52. pulumi_vault/gcp/auth_backend.py +0 -5
  53. pulumi_vault/gcp/auth_backend_role.py +0 -5
  54. pulumi_vault/gcp/get_auth_backend_role.py +4 -42
  55. pulumi_vault/gcp/outputs.py +0 -5
  56. pulumi_vault/gcp/secret_backend.py +0 -5
  57. pulumi_vault/gcp/secret_impersonated_account.py +3 -62
  58. pulumi_vault/gcp/secret_roleset.py +0 -5
  59. pulumi_vault/gcp/secret_static_account.py +0 -5
  60. pulumi_vault/generic/endpoint.py +0 -5
  61. pulumi_vault/generic/get_secret.py +5 -25
  62. pulumi_vault/generic/secret.py +7 -12
  63. pulumi_vault/get_auth_backend.py +4 -21
  64. pulumi_vault/get_auth_backends.py +4 -16
  65. pulumi_vault/get_namespace.py +5 -18
  66. pulumi_vault/get_namespaces.py +4 -13
  67. pulumi_vault/get_nomad_access_token.py +8 -28
  68. pulumi_vault/get_policy_document.py +4 -15
  69. pulumi_vault/get_raft_autopilot_state.py +7 -26
  70. pulumi_vault/github/_inputs.py +0 -55
  71. pulumi_vault/github/auth_backend.py +0 -5
  72. pulumi_vault/github/outputs.py +0 -5
  73. pulumi_vault/github/team.py +0 -5
  74. pulumi_vault/github/user.py +0 -5
  75. pulumi_vault/identity/entity.py +0 -5
  76. pulumi_vault/identity/entity_alias.py +0 -5
  77. pulumi_vault/identity/entity_policies.py +0 -5
  78. pulumi_vault/identity/get_entity.py +5 -35
  79. pulumi_vault/identity/get_group.py +6 -42
  80. pulumi_vault/identity/get_oidc_client_creds.py +4 -16
  81. pulumi_vault/identity/get_oidc_openid_config.py +4 -26
  82. pulumi_vault/identity/get_oidc_public_keys.py +5 -16
  83. pulumi_vault/identity/group.py +0 -5
  84. pulumi_vault/identity/group_alias.py +0 -5
  85. pulumi_vault/identity/group_member_entity_ids.py +0 -5
  86. pulumi_vault/identity/group_member_group_ids.py +0 -5
  87. pulumi_vault/identity/group_policies.py +0 -5
  88. pulumi_vault/identity/mfa_duo.py +0 -5
  89. pulumi_vault/identity/mfa_login_enforcement.py +0 -5
  90. pulumi_vault/identity/mfa_okta.py +0 -5
  91. pulumi_vault/identity/mfa_pingid.py +0 -5
  92. pulumi_vault/identity/mfa_totp.py +0 -5
  93. pulumi_vault/identity/oidc.py +0 -5
  94. pulumi_vault/identity/oidc_assignment.py +0 -5
  95. pulumi_vault/identity/oidc_client.py +0 -5
  96. pulumi_vault/identity/oidc_key.py +0 -5
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
  98. pulumi_vault/identity/oidc_provider.py +0 -5
  99. pulumi_vault/identity/oidc_role.py +0 -5
  100. pulumi_vault/identity/oidc_scope.py +0 -5
  101. pulumi_vault/identity/outputs.py +3 -8
  102. pulumi_vault/jwt/_inputs.py +0 -55
  103. pulumi_vault/jwt/auth_backend.py +0 -5
  104. pulumi_vault/jwt/auth_backend_role.py +28 -33
  105. pulumi_vault/jwt/outputs.py +0 -5
  106. pulumi_vault/kmip/secret_backend.py +0 -5
  107. pulumi_vault/kmip/secret_role.py +0 -5
  108. pulumi_vault/kmip/secret_scope.py +0 -5
  109. pulumi_vault/kubernetes/auth_backend_config.py +3 -55
  110. pulumi_vault/kubernetes/auth_backend_role.py +0 -5
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
  113. pulumi_vault/kubernetes/get_service_account_token.py +4 -28
  114. pulumi_vault/kubernetes/secret_backend.py +14 -19
  115. pulumi_vault/kubernetes/secret_backend_role.py +0 -5
  116. pulumi_vault/kv/_inputs.py +4 -36
  117. pulumi_vault/kv/get_secret.py +5 -20
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
  119. pulumi_vault/kv/get_secret_v2.py +8 -27
  120. pulumi_vault/kv/get_secrets_list.py +4 -15
  121. pulumi_vault/kv/get_secrets_list_v2.py +4 -18
  122. pulumi_vault/kv/outputs.py +3 -8
  123. pulumi_vault/kv/secret.py +7 -12
  124. pulumi_vault/kv/secret_backend_v2.py +0 -5
  125. pulumi_vault/kv/secret_v2.py +28 -33
  126. pulumi_vault/ldap/auth_backend.py +0 -52
  127. pulumi_vault/ldap/auth_backend_group.py +0 -5
  128. pulumi_vault/ldap/auth_backend_user.py +0 -5
  129. pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
  130. pulumi_vault/ldap/get_static_credentials.py +4 -23
  131. pulumi_vault/ldap/secret_backend.py +14 -19
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
  133. pulumi_vault/ldap/secret_backend_library_set.py +0 -5
  134. pulumi_vault/ldap/secret_backend_static_role.py +0 -5
  135. pulumi_vault/managed/_inputs.py +0 -205
  136. pulumi_vault/managed/keys.py +0 -5
  137. pulumi_vault/managed/outputs.py +0 -5
  138. pulumi_vault/mfa_duo.py +0 -5
  139. pulumi_vault/mfa_okta.py +0 -5
  140. pulumi_vault/mfa_pingid.py +0 -5
  141. pulumi_vault/mfa_totp.py +0 -5
  142. pulumi_vault/mongodbatlas/secret_backend.py +0 -5
  143. pulumi_vault/mongodbatlas/secret_role.py +0 -5
  144. pulumi_vault/mount.py +16 -21
  145. pulumi_vault/namespace.py +14 -19
  146. pulumi_vault/nomad_secret_backend.py +0 -5
  147. pulumi_vault/nomad_secret_role.py +0 -5
  148. pulumi_vault/okta/_inputs.py +0 -39
  149. pulumi_vault/okta/auth_backend.py +0 -5
  150. pulumi_vault/okta/auth_backend_group.py +0 -5
  151. pulumi_vault/okta/auth_backend_user.py +0 -5
  152. pulumi_vault/okta/outputs.py +0 -5
  153. pulumi_vault/outputs.py +0 -5
  154. pulumi_vault/password_policy.py +0 -5
  155. pulumi_vault/pkisecret/_inputs.py +8 -49
  156. pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
  157. pulumi_vault/pkisecret/backend_config_est.py +14 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
  159. pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
  160. pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
  161. pulumi_vault/pkisecret/get_backend_key.py +4 -19
  162. pulumi_vault/pkisecret/get_backend_keys.py +5 -18
  163. pulumi_vault/pkisecret/outputs.py +12 -17
  164. pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
  172. pulumi_vault/pkisecret/secret_backend_key.py +0 -5
  173. pulumi_vault/pkisecret/secret_backend_role.py +0 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
  176. pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
  177. pulumi_vault/plugin.py +0 -5
  178. pulumi_vault/plugin_pinned_version.py +0 -5
  179. pulumi_vault/policy.py +0 -5
  180. pulumi_vault/provider.py +0 -5
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +0 -5
  183. pulumi_vault/quota_rate_limit.py +0 -5
  184. pulumi_vault/rabbitmq/_inputs.py +0 -61
  185. pulumi_vault/rabbitmq/outputs.py +0 -5
  186. pulumi_vault/rabbitmq/secret_backend.py +0 -5
  187. pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
  188. pulumi_vault/raft_autopilot.py +0 -5
  189. pulumi_vault/raft_snapshot_agent_config.py +0 -5
  190. pulumi_vault/rgp_policy.py +0 -5
  191. pulumi_vault/saml/auth_backend.py +0 -5
  192. pulumi_vault/saml/auth_backend_role.py +14 -19
  193. pulumi_vault/secrets/_inputs.py +0 -30
  194. pulumi_vault/secrets/outputs.py +0 -5
  195. pulumi_vault/secrets/sync_association.py +0 -5
  196. pulumi_vault/secrets/sync_aws_destination.py +14 -19
  197. pulumi_vault/secrets/sync_azure_destination.py +14 -19
  198. pulumi_vault/secrets/sync_config.py +0 -5
  199. pulumi_vault/secrets/sync_gcp_destination.py +14 -19
  200. pulumi_vault/secrets/sync_gh_destination.py +0 -5
  201. pulumi_vault/secrets/sync_github_apps.py +0 -5
  202. pulumi_vault/secrets/sync_vercel_destination.py +0 -5
  203. pulumi_vault/ssh/_inputs.py +0 -22
  204. pulumi_vault/ssh/outputs.py +0 -5
  205. pulumi_vault/ssh/secret_backend_ca.py +0 -5
  206. pulumi_vault/ssh/secret_backend_role.py +28 -67
  207. pulumi_vault/terraformcloud/secret_backend.py +0 -5
  208. pulumi_vault/terraformcloud/secret_creds.py +0 -5
  209. pulumi_vault/terraformcloud/secret_role.py +0 -5
  210. pulumi_vault/token.py +0 -5
  211. pulumi_vault/tokenauth/auth_backend_role.py +14 -5
  212. pulumi_vault/transform/alphabet.py +0 -5
  213. pulumi_vault/transform/get_decode.py +14 -38
  214. pulumi_vault/transform/get_encode.py +14 -38
  215. pulumi_vault/transform/role.py +0 -5
  216. pulumi_vault/transform/template.py +14 -19
  217. pulumi_vault/transform/transformation.py +0 -5
  218. pulumi_vault/transit/get_decrypt.py +4 -21
  219. pulumi_vault/transit/get_encrypt.py +4 -23
  220. pulumi_vault/transit/secret_backend_key.py +7 -12
  221. pulumi_vault/transit/secret_cache_config.py +0 -5
  222. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
  223. pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.4.0.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
@@ -20,7 +15,7 @@ __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
20
15
  class AuthBackendRoleArgs:
21
16
  def __init__(__self__, *,
22
17
  path: pulumi.Input[str],
23
- bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
18
+ bound_attributes: Optional[pulumi.Input[Mapping[str, Any]]] = None,
24
19
  bound_attributes_type: Optional[pulumi.Input[str]] = None,
25
20
  bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
26
21
  bound_subjects_type: Optional[pulumi.Input[str]] = None,
@@ -39,7 +34,7 @@ class AuthBackendRoleArgs:
39
34
  """
40
35
  The set of arguments for constructing a AuthBackendRole resource.
41
36
  :param pulumi.Input[str] path: Path where the auth backend is mounted.
42
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_attributes: Mapping of attribute names to values that are expected to
37
+ :param pulumi.Input[Mapping[str, Any]] bound_attributes: Mapping of attribute names to values that are expected to
43
38
  exist in the SAML assertion.
44
39
  :param pulumi.Input[str] bound_attributes_type: The type of matching assertion to perform on
45
40
  `bound_attributes_type`.
@@ -110,7 +105,7 @@ class AuthBackendRoleArgs:
110
105
 
111
106
  @property
112
107
  @pulumi.getter(name="boundAttributes")
113
- def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
108
+ def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
114
109
  """
115
110
  Mapping of attribute names to values that are expected to
116
111
  exist in the SAML assertion.
@@ -118,7 +113,7 @@ class AuthBackendRoleArgs:
118
113
  return pulumi.get(self, "bound_attributes")
119
114
 
120
115
  @bound_attributes.setter
121
- def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
116
+ def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
122
117
  pulumi.set(self, "bound_attributes", value)
123
118
 
124
119
  @property
@@ -310,7 +305,7 @@ class AuthBackendRoleArgs:
310
305
  @pulumi.input_type
311
306
  class _AuthBackendRoleState:
312
307
  def __init__(__self__, *,
313
- bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
308
+ bound_attributes: Optional[pulumi.Input[Mapping[str, Any]]] = None,
314
309
  bound_attributes_type: Optional[pulumi.Input[str]] = None,
315
310
  bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
316
311
  bound_subjects_type: Optional[pulumi.Input[str]] = None,
@@ -329,7 +324,7 @@ class _AuthBackendRoleState:
329
324
  token_type: Optional[pulumi.Input[str]] = None):
330
325
  """
331
326
  Input properties used for looking up and filtering AuthBackendRole resources.
332
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_attributes: Mapping of attribute names to values that are expected to
327
+ :param pulumi.Input[Mapping[str, Any]] bound_attributes: Mapping of attribute names to values that are expected to
333
328
  exist in the SAML assertion.
334
329
  :param pulumi.Input[str] bound_attributes_type: The type of matching assertion to perform on
335
330
  `bound_attributes_type`.
@@ -390,7 +385,7 @@ class _AuthBackendRoleState:
390
385
 
391
386
  @property
392
387
  @pulumi.getter(name="boundAttributes")
393
- def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
388
+ def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
394
389
  """
395
390
  Mapping of attribute names to values that are expected to
396
391
  exist in the SAML assertion.
@@ -398,7 +393,7 @@ class _AuthBackendRoleState:
398
393
  return pulumi.get(self, "bound_attributes")
399
394
 
400
395
  @bound_attributes.setter
401
- def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
396
+ def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
402
397
  pulumi.set(self, "bound_attributes", value)
403
398
 
404
399
  @property
@@ -604,7 +599,7 @@ class AuthBackendRole(pulumi.CustomResource):
604
599
  def __init__(__self__,
605
600
  resource_name: str,
606
601
  opts: Optional[pulumi.ResourceOptions] = None,
607
- bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
602
+ bound_attributes: Optional[pulumi.Input[Mapping[str, Any]]] = None,
608
603
  bound_attributes_type: Optional[pulumi.Input[str]] = None,
609
604
  bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
610
605
  bound_subjects_type: Optional[pulumi.Input[str]] = None,
@@ -661,7 +656,7 @@ class AuthBackendRole(pulumi.CustomResource):
661
656
 
662
657
  :param str resource_name: The name of the resource.
663
658
  :param pulumi.ResourceOptions opts: Options for the resource.
664
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_attributes: Mapping of attribute names to values that are expected to
659
+ :param pulumi.Input[Mapping[str, Any]] bound_attributes: Mapping of attribute names to values that are expected to
665
660
  exist in the SAML assertion.
666
661
  :param pulumi.Input[str] bound_attributes_type: The type of matching assertion to perform on
667
662
  `bound_attributes_type`.
@@ -743,7 +738,7 @@ class AuthBackendRole(pulumi.CustomResource):
743
738
  def _internal_init(__self__,
744
739
  resource_name: str,
745
740
  opts: Optional[pulumi.ResourceOptions] = None,
746
- bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
741
+ bound_attributes: Optional[pulumi.Input[Mapping[str, Any]]] = None,
747
742
  bound_attributes_type: Optional[pulumi.Input[str]] = None,
748
743
  bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
749
744
  bound_subjects_type: Optional[pulumi.Input[str]] = None,
@@ -798,7 +793,7 @@ class AuthBackendRole(pulumi.CustomResource):
798
793
  def get(resource_name: str,
799
794
  id: pulumi.Input[str],
800
795
  opts: Optional[pulumi.ResourceOptions] = None,
801
- bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
796
+ bound_attributes: Optional[pulumi.Input[Mapping[str, Any]]] = None,
802
797
  bound_attributes_type: Optional[pulumi.Input[str]] = None,
803
798
  bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
804
799
  bound_subjects_type: Optional[pulumi.Input[str]] = None,
@@ -822,7 +817,7 @@ class AuthBackendRole(pulumi.CustomResource):
822
817
  :param str resource_name: The unique name of the resulting resource.
823
818
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
824
819
  :param pulumi.ResourceOptions opts: Options for the resource.
825
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_attributes: Mapping of attribute names to values that are expected to
820
+ :param pulumi.Input[Mapping[str, Any]] bound_attributes: Mapping of attribute names to values that are expected to
826
821
  exist in the SAML assertion.
827
822
  :param pulumi.Input[str] bound_attributes_type: The type of matching assertion to perform on
828
823
  `bound_attributes_type`.
@@ -871,7 +866,7 @@ class AuthBackendRole(pulumi.CustomResource):
871
866
 
872
867
  @property
873
868
  @pulumi.getter(name="boundAttributes")
874
- def bound_attributes(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
869
+ def bound_attributes(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
875
870
  """
876
871
  Mapping of attribute names to values that are expected to
877
872
  exist in the SAML assertion.
@@ -4,45 +4,15 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
18
13
  'SyncAssociationMetadataArgs',
19
- 'SyncAssociationMetadataArgsDict',
20
14
  ]
21
15
 
22
- MYPY = False
23
-
24
- if not MYPY:
25
- class SyncAssociationMetadataArgsDict(TypedDict):
26
- sub_key: NotRequired[pulumi.Input[str]]
27
- """
28
- Subkey of the associated secret.
29
- """
30
- sync_status: NotRequired[pulumi.Input[str]]
31
- """
32
- A map of sync statuses for each subkey of the associated secret
33
- (for ex. `{kv_624bea/aws-token/dev: "SYNCED", kv_624bea/aws-token/prod: "SYNCED"}`).
34
- """
35
- updated_at: NotRequired[pulumi.Input[str]]
36
- """
37
- A map of duration strings specifying when each subkey of the associated
38
- secret was last updated.
39
- (for ex.
40
- `{kv_624bea/aws-token/dev: "2024-03-21T12:42:02.558533-07:00",
41
- kv_624bea/aws-token/prod: "2024-03-21T12:42:02.558533-07:00"}`).
42
- """
43
- elif False:
44
- SyncAssociationMetadataArgsDict: TypeAlias = Mapping[str, Any]
45
-
46
16
  @pulumi.input_type
47
17
  class SyncAssociationMetadataArgs:
48
18
  def __init__(__self__, *,
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SyncAwsDestinationArgs', 'SyncAwsDestination']
@@ -20,7 +15,7 @@ __all__ = ['SyncAwsDestinationArgs', 'SyncAwsDestination']
20
15
  class SyncAwsDestinationArgs:
21
16
  def __init__(__self__, *,
22
17
  access_key_id: Optional[pulumi.Input[str]] = None,
23
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
18
+ custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
24
19
  external_id: Optional[pulumi.Input[str]] = None,
25
20
  granularity: Optional[pulumi.Input[str]] = None,
26
21
  name: Optional[pulumi.Input[str]] = None,
@@ -34,7 +29,7 @@ class SyncAwsDestinationArgs:
34
29
  :param pulumi.Input[str] access_key_id: Access key id to authenticate against the AWS secrets manager.
35
30
  Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
36
31
  variable.
37
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
32
+ :param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
38
33
  :param pulumi.Input[str] external_id: Optional extra protection that must match the trust policy granting access to the
39
34
  AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
40
35
  The field is mutable with no special condition, but users must be careful that the new value fits with the trust
@@ -97,14 +92,14 @@ class SyncAwsDestinationArgs:
97
92
 
98
93
  @property
99
94
  @pulumi.getter(name="customTags")
100
- def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
95
+ def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
101
96
  """
102
97
  Custom tags to set on the secret managed at the destination.
103
98
  """
104
99
  return pulumi.get(self, "custom_tags")
105
100
 
106
101
  @custom_tags.setter
107
- def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
102
+ def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
108
103
  pulumi.set(self, "custom_tags", value)
109
104
 
110
105
  @property
@@ -224,7 +219,7 @@ class SyncAwsDestinationArgs:
224
219
  class _SyncAwsDestinationState:
225
220
  def __init__(__self__, *,
226
221
  access_key_id: Optional[pulumi.Input[str]] = None,
227
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
222
+ custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
228
223
  external_id: Optional[pulumi.Input[str]] = None,
229
224
  granularity: Optional[pulumi.Input[str]] = None,
230
225
  name: Optional[pulumi.Input[str]] = None,
@@ -239,7 +234,7 @@ class _SyncAwsDestinationState:
239
234
  :param pulumi.Input[str] access_key_id: Access key id to authenticate against the AWS secrets manager.
240
235
  Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
241
236
  variable.
242
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
237
+ :param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
243
238
  :param pulumi.Input[str] external_id: Optional extra protection that must match the trust policy granting access to the
244
239
  AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
245
240
  The field is mutable with no special condition, but users must be careful that the new value fits with the trust
@@ -305,14 +300,14 @@ class _SyncAwsDestinationState:
305
300
 
306
301
  @property
307
302
  @pulumi.getter(name="customTags")
308
- def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
303
+ def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
309
304
  """
310
305
  Custom tags to set on the secret managed at the destination.
311
306
  """
312
307
  return pulumi.get(self, "custom_tags")
313
308
 
314
309
  @custom_tags.setter
315
- def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
310
+ def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
316
311
  pulumi.set(self, "custom_tags", value)
317
312
 
318
313
  @property
@@ -446,7 +441,7 @@ class SyncAwsDestination(pulumi.CustomResource):
446
441
  resource_name: str,
447
442
  opts: Optional[pulumi.ResourceOptions] = None,
448
443
  access_key_id: Optional[pulumi.Input[str]] = None,
449
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
444
+ custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
450
445
  external_id: Optional[pulumi.Input[str]] = None,
451
446
  granularity: Optional[pulumi.Input[str]] = None,
452
447
  name: Optional[pulumi.Input[str]] = None,
@@ -489,7 +484,7 @@ class SyncAwsDestination(pulumi.CustomResource):
489
484
  :param pulumi.Input[str] access_key_id: Access key id to authenticate against the AWS secrets manager.
490
485
  Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
491
486
  variable.
492
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
487
+ :param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
493
488
  :param pulumi.Input[str] external_id: Optional extra protection that must match the trust policy granting access to the
494
489
  AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
495
490
  The field is mutable with no special condition, but users must be careful that the new value fits with the trust
@@ -565,7 +560,7 @@ class SyncAwsDestination(pulumi.CustomResource):
565
560
  resource_name: str,
566
561
  opts: Optional[pulumi.ResourceOptions] = None,
567
562
  access_key_id: Optional[pulumi.Input[str]] = None,
568
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
563
+ custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
569
564
  external_id: Optional[pulumi.Input[str]] = None,
570
565
  granularity: Optional[pulumi.Input[str]] = None,
571
566
  name: Optional[pulumi.Input[str]] = None,
@@ -607,7 +602,7 @@ class SyncAwsDestination(pulumi.CustomResource):
607
602
  id: pulumi.Input[str],
608
603
  opts: Optional[pulumi.ResourceOptions] = None,
609
604
  access_key_id: Optional[pulumi.Input[str]] = None,
610
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
605
+ custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
611
606
  external_id: Optional[pulumi.Input[str]] = None,
612
607
  granularity: Optional[pulumi.Input[str]] = None,
613
608
  name: Optional[pulumi.Input[str]] = None,
@@ -627,7 +622,7 @@ class SyncAwsDestination(pulumi.CustomResource):
627
622
  :param pulumi.Input[str] access_key_id: Access key id to authenticate against the AWS secrets manager.
628
623
  Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
629
624
  variable.
630
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
625
+ :param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
631
626
  :param pulumi.Input[str] external_id: Optional extra protection that must match the trust policy granting access to the
632
627
  AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
633
628
  The field is mutable with no special condition, but users must be careful that the new value fits with the trust
@@ -683,7 +678,7 @@ class SyncAwsDestination(pulumi.CustomResource):
683
678
 
684
679
  @property
685
680
  @pulumi.getter(name="customTags")
686
- def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
681
+ def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
687
682
  """
688
683
  Custom tags to set on the secret managed at the destination.
689
684
  """
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SyncAzureDestinationArgs', 'SyncAzureDestination']
@@ -22,7 +17,7 @@ class SyncAzureDestinationArgs:
22
17
  client_id: Optional[pulumi.Input[str]] = None,
23
18
  client_secret: Optional[pulumi.Input[str]] = None,
24
19
  cloud: Optional[pulumi.Input[str]] = None,
25
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
20
+ custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
26
21
  granularity: Optional[pulumi.Input[str]] = None,
27
22
  key_vault_uri: Optional[pulumi.Input[str]] = None,
28
23
  name: Optional[pulumi.Input[str]] = None,
@@ -38,7 +33,7 @@ class SyncAzureDestinationArgs:
38
33
  Can be omitted and directly provided to Vault using the `AZURE_CLIENT_SECRET` environment
39
34
  variable.
40
35
  :param pulumi.Input[str] cloud: Specifies a cloud for the client. The default is Azure Public Cloud.
41
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
36
+ :param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
42
37
  :param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
43
38
  at the destination. Supports `secret-path` and `secret-key`.
44
39
  :param pulumi.Input[str] key_vault_uri: URI of an existing Azure Key Vault instance.
@@ -117,14 +112,14 @@ class SyncAzureDestinationArgs:
117
112
 
118
113
  @property
119
114
  @pulumi.getter(name="customTags")
120
- def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
115
+ def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
121
116
  """
122
117
  Custom tags to set on the secret managed at the destination.
123
118
  """
124
119
  return pulumi.get(self, "custom_tags")
125
120
 
126
121
  @custom_tags.setter
127
- def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
122
+ def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
128
123
  pulumi.set(self, "custom_tags", value)
129
124
 
130
125
  @property
@@ -214,7 +209,7 @@ class _SyncAzureDestinationState:
214
209
  client_id: Optional[pulumi.Input[str]] = None,
215
210
  client_secret: Optional[pulumi.Input[str]] = None,
216
211
  cloud: Optional[pulumi.Input[str]] = None,
217
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
212
+ custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
218
213
  granularity: Optional[pulumi.Input[str]] = None,
219
214
  key_vault_uri: Optional[pulumi.Input[str]] = None,
220
215
  name: Optional[pulumi.Input[str]] = None,
@@ -231,7 +226,7 @@ class _SyncAzureDestinationState:
231
226
  Can be omitted and directly provided to Vault using the `AZURE_CLIENT_SECRET` environment
232
227
  variable.
233
228
  :param pulumi.Input[str] cloud: Specifies a cloud for the client. The default is Azure Public Cloud.
234
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
229
+ :param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
235
230
  :param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
236
231
  at the destination. Supports `secret-path` and `secret-key`.
237
232
  :param pulumi.Input[str] key_vault_uri: URI of an existing Azure Key Vault instance.
@@ -313,14 +308,14 @@ class _SyncAzureDestinationState:
313
308
 
314
309
  @property
315
310
  @pulumi.getter(name="customTags")
316
- def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
311
+ def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
317
312
  """
318
313
  Custom tags to set on the secret managed at the destination.
319
314
  """
320
315
  return pulumi.get(self, "custom_tags")
321
316
 
322
317
  @custom_tags.setter
323
- def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
318
+ def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
324
319
  pulumi.set(self, "custom_tags", value)
325
320
 
326
321
  @property
@@ -424,7 +419,7 @@ class SyncAzureDestination(pulumi.CustomResource):
424
419
  client_id: Optional[pulumi.Input[str]] = None,
425
420
  client_secret: Optional[pulumi.Input[str]] = None,
426
421
  cloud: Optional[pulumi.Input[str]] = None,
427
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
422
+ custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
428
423
  granularity: Optional[pulumi.Input[str]] = None,
429
424
  key_vault_uri: Optional[pulumi.Input[str]] = None,
430
425
  name: Optional[pulumi.Input[str]] = None,
@@ -468,7 +463,7 @@ class SyncAzureDestination(pulumi.CustomResource):
468
463
  Can be omitted and directly provided to Vault using the `AZURE_CLIENT_SECRET` environment
469
464
  variable.
470
465
  :param pulumi.Input[str] cloud: Specifies a cloud for the client. The default is Azure Public Cloud.
471
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
466
+ :param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
472
467
  :param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
473
468
  at the destination. Supports `secret-path` and `secret-key`.
474
469
  :param pulumi.Input[str] key_vault_uri: URI of an existing Azure Key Vault instance.
@@ -535,7 +530,7 @@ class SyncAzureDestination(pulumi.CustomResource):
535
530
  client_id: Optional[pulumi.Input[str]] = None,
536
531
  client_secret: Optional[pulumi.Input[str]] = None,
537
532
  cloud: Optional[pulumi.Input[str]] = None,
538
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
533
+ custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
539
534
  granularity: Optional[pulumi.Input[str]] = None,
540
535
  key_vault_uri: Optional[pulumi.Input[str]] = None,
541
536
  name: Optional[pulumi.Input[str]] = None,
@@ -577,7 +572,7 @@ class SyncAzureDestination(pulumi.CustomResource):
577
572
  client_id: Optional[pulumi.Input[str]] = None,
578
573
  client_secret: Optional[pulumi.Input[str]] = None,
579
574
  cloud: Optional[pulumi.Input[str]] = None,
580
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
575
+ custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
581
576
  granularity: Optional[pulumi.Input[str]] = None,
582
577
  key_vault_uri: Optional[pulumi.Input[str]] = None,
583
578
  name: Optional[pulumi.Input[str]] = None,
@@ -599,7 +594,7 @@ class SyncAzureDestination(pulumi.CustomResource):
599
594
  Can be omitted and directly provided to Vault using the `AZURE_CLIENT_SECRET` environment
600
595
  variable.
601
596
  :param pulumi.Input[str] cloud: Specifies a cloud for the client. The default is Azure Public Cloud.
602
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
597
+ :param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
603
598
  :param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
604
599
  at the destination. Supports `secret-path` and `secret-key`.
605
600
  :param pulumi.Input[str] key_vault_uri: URI of an existing Azure Key Vault instance.
@@ -663,7 +658,7 @@ class SyncAzureDestination(pulumi.CustomResource):
663
658
 
664
659
  @property
665
660
  @pulumi.getter(name="customTags")
666
- def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
661
+ def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
667
662
  """
668
663
  Custom tags to set on the secret managed at the destination.
669
664
  """
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SyncConfigArgs', 'SyncConfig']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SyncGcpDestinationArgs', 'SyncGcpDestination']
@@ -20,7 +15,7 @@ __all__ = ['SyncGcpDestinationArgs', 'SyncGcpDestination']
20
15
  class SyncGcpDestinationArgs:
21
16
  def __init__(__self__, *,
22
17
  credentials: Optional[pulumi.Input[str]] = None,
23
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
18
+ custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
24
19
  granularity: Optional[pulumi.Input[str]] = None,
25
20
  name: Optional[pulumi.Input[str]] = None,
26
21
  namespace: Optional[pulumi.Input[str]] = None,
@@ -31,7 +26,7 @@ class SyncGcpDestinationArgs:
31
26
  :param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP.
32
27
  Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
33
28
  variable.
34
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
29
+ :param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
35
30
  :param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
36
31
  at the destination. Supports `secret-path` and `secret-key`.
37
32
  :param pulumi.Input[str] name: Unique name of the GCP destination.
@@ -76,14 +71,14 @@ class SyncGcpDestinationArgs:
76
71
 
77
72
  @property
78
73
  @pulumi.getter(name="customTags")
79
- def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
74
+ def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
80
75
  """
81
76
  Custom tags to set on the secret managed at the destination.
82
77
  """
83
78
  return pulumi.get(self, "custom_tags")
84
79
 
85
80
  @custom_tags.setter
86
- def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
81
+ def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
87
82
  pulumi.set(self, "custom_tags", value)
88
83
 
89
84
  @property
@@ -158,7 +153,7 @@ class SyncGcpDestinationArgs:
158
153
  class _SyncGcpDestinationState:
159
154
  def __init__(__self__, *,
160
155
  credentials: Optional[pulumi.Input[str]] = None,
161
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
156
+ custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
162
157
  granularity: Optional[pulumi.Input[str]] = None,
163
158
  name: Optional[pulumi.Input[str]] = None,
164
159
  namespace: Optional[pulumi.Input[str]] = None,
@@ -170,7 +165,7 @@ class _SyncGcpDestinationState:
170
165
  :param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP.
171
166
  Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
172
167
  variable.
173
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
168
+ :param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
174
169
  :param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
175
170
  at the destination. Supports `secret-path` and `secret-key`.
176
171
  :param pulumi.Input[str] name: Unique name of the GCP destination.
@@ -218,14 +213,14 @@ class _SyncGcpDestinationState:
218
213
 
219
214
  @property
220
215
  @pulumi.getter(name="customTags")
221
- def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
216
+ def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
222
217
  """
223
218
  Custom tags to set on the secret managed at the destination.
224
219
  """
225
220
  return pulumi.get(self, "custom_tags")
226
221
 
227
222
  @custom_tags.setter
228
- def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
223
+ def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
229
224
  pulumi.set(self, "custom_tags", value)
230
225
 
231
226
  @property
@@ -314,7 +309,7 @@ class SyncGcpDestination(pulumi.CustomResource):
314
309
  resource_name: str,
315
310
  opts: Optional[pulumi.ResourceOptions] = None,
316
311
  credentials: Optional[pulumi.Input[str]] = None,
317
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
312
+ custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
318
313
  granularity: Optional[pulumi.Input[str]] = None,
319
314
  name: Optional[pulumi.Input[str]] = None,
320
315
  namespace: Optional[pulumi.Input[str]] = None,
@@ -352,7 +347,7 @@ class SyncGcpDestination(pulumi.CustomResource):
352
347
  :param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP.
353
348
  Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
354
349
  variable.
355
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
350
+ :param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
356
351
  :param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
357
352
  at the destination. Supports `secret-path` and `secret-key`.
358
353
  :param pulumi.Input[str] name: Unique name of the GCP destination.
@@ -414,7 +409,7 @@ class SyncGcpDestination(pulumi.CustomResource):
414
409
  resource_name: str,
415
410
  opts: Optional[pulumi.ResourceOptions] = None,
416
411
  credentials: Optional[pulumi.Input[str]] = None,
417
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
412
+ custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
418
413
  granularity: Optional[pulumi.Input[str]] = None,
419
414
  name: Optional[pulumi.Input[str]] = None,
420
415
  namespace: Optional[pulumi.Input[str]] = None,
@@ -450,7 +445,7 @@ class SyncGcpDestination(pulumi.CustomResource):
450
445
  id: pulumi.Input[str],
451
446
  opts: Optional[pulumi.ResourceOptions] = None,
452
447
  credentials: Optional[pulumi.Input[str]] = None,
453
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
448
+ custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
454
449
  granularity: Optional[pulumi.Input[str]] = None,
455
450
  name: Optional[pulumi.Input[str]] = None,
456
451
  namespace: Optional[pulumi.Input[str]] = None,
@@ -467,7 +462,7 @@ class SyncGcpDestination(pulumi.CustomResource):
467
462
  :param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP.
468
463
  Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
469
464
  variable.
470
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
465
+ :param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
471
466
  :param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
472
467
  at the destination. Supports `secret-path` and `secret-key`.
473
468
  :param pulumi.Input[str] name: Unique name of the GCP destination.
@@ -508,7 +503,7 @@ class SyncGcpDestination(pulumi.CustomResource):
508
503
 
509
504
  @property
510
505
  @pulumi.getter(name="customTags")
511
- def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
506
+ def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
512
507
  """
513
508
  Custom tags to set on the secret managed at the destination.
514
509
  """
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SyncGhDestinationArgs', 'SyncGhDestination']