pulumi-vault 6.4.0a1723454543__py3-none-any.whl → 6.4.0a1724220732__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (48) hide show
  1. pulumi_vault/aws/auth_backend_login.py +7 -7
  2. pulumi_vault/config/ui_custom_message.py +14 -14
  3. pulumi_vault/database/_inputs.py +72 -72
  4. pulumi_vault/database/outputs.py +54 -54
  5. pulumi_vault/database/secret_backend_connection.py +14 -14
  6. pulumi_vault/database/secret_backend_role.py +14 -14
  7. pulumi_vault/database/secrets_mount.py +14 -14
  8. pulumi_vault/generic/get_secret.py +1 -1
  9. pulumi_vault/generic/secret.py +7 -7
  10. pulumi_vault/get_namespace.py +1 -1
  11. pulumi_vault/get_nomad_access_token.py +10 -4
  12. pulumi_vault/get_raft_autopilot_state.py +3 -3
  13. pulumi_vault/identity/get_entity.py +1 -1
  14. pulumi_vault/identity/get_group.py +2 -2
  15. pulumi_vault/identity/get_oidc_public_keys.py +1 -1
  16. pulumi_vault/identity/outputs.py +3 -3
  17. pulumi_vault/jwt/auth_backend_role.py +28 -28
  18. pulumi_vault/kubernetes/secret_backend.py +14 -14
  19. pulumi_vault/kv/_inputs.py +4 -4
  20. pulumi_vault/kv/get_secret.py +1 -1
  21. pulumi_vault/kv/get_secret_subkeys_v2.py +1 -1
  22. pulumi_vault/kv/get_secret_v2.py +2 -2
  23. pulumi_vault/kv/outputs.py +3 -3
  24. pulumi_vault/kv/secret.py +7 -7
  25. pulumi_vault/kv/secret_v2.py +28 -28
  26. pulumi_vault/ldap/secret_backend.py +14 -14
  27. pulumi_vault/mount.py +16 -16
  28. pulumi_vault/namespace.py +14 -14
  29. pulumi_vault/pkisecret/_inputs.py +8 -8
  30. pulumi_vault/pkisecret/backend_config_est.py +14 -14
  31. pulumi_vault/pkisecret/get_backend_config_est.py +1 -1
  32. pulumi_vault/pkisecret/get_backend_issuers.py +1 -1
  33. pulumi_vault/pkisecret/get_backend_keys.py +1 -1
  34. pulumi_vault/pkisecret/outputs.py +12 -12
  35. pulumi_vault/pulumi-plugin.json +1 -1
  36. pulumi_vault/saml/auth_backend_role.py +14 -14
  37. pulumi_vault/secrets/sync_aws_destination.py +14 -14
  38. pulumi_vault/secrets/sync_azure_destination.py +14 -14
  39. pulumi_vault/secrets/sync_gcp_destination.py +14 -14
  40. pulumi_vault/ssh/secret_backend_role.py +28 -28
  41. pulumi_vault/transform/get_decode.py +10 -10
  42. pulumi_vault/transform/get_encode.py +10 -10
  43. pulumi_vault/transform/template.py +14 -14
  44. pulumi_vault/transit/secret_backend_key.py +7 -7
  45. {pulumi_vault-6.4.0a1723454543.dist-info → pulumi_vault-6.4.0a1724220732.dist-info}/METADATA +1 -1
  46. {pulumi_vault-6.4.0a1723454543.dist-info → pulumi_vault-6.4.0a1724220732.dist-info}/RECORD +48 -48
  47. {pulumi_vault-6.4.0a1723454543.dist-info → pulumi_vault-6.4.0a1724220732.dist-info}/WHEEL +1 -1
  48. {pulumi_vault-6.4.0a1723454543.dist-info → pulumi_vault-6.4.0a1724220732.dist-info}/top_level.txt +0 -0
@@ -17,11 +17,11 @@ __all__ = [
17
17
  @pulumi.input_type
18
18
  class BackendConfigEstAuthenticatorsArgs:
19
19
  def __init__(__self__, *,
20
- cert: Optional[pulumi.Input[Mapping[str, Any]]] = None,
21
- userpass: Optional[pulumi.Input[Mapping[str, Any]]] = None):
20
+ cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
21
+ userpass: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None):
22
22
  """
23
- :param pulumi.Input[Mapping[str, Any]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
24
- :param pulumi.Input[Mapping[str, Any]] userpass: "The accessor (required) property for user pass auth backends".
23
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
24
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] userpass: "The accessor (required) property for user pass auth backends".
25
25
  """
26
26
  if cert is not None:
27
27
  pulumi.set(__self__, "cert", cert)
@@ -30,26 +30,26 @@ class BackendConfigEstAuthenticatorsArgs:
30
30
 
31
31
  @property
32
32
  @pulumi.getter
33
- def cert(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
33
+ def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
34
34
  """
35
35
  "The accessor (required) and cert_role (optional) properties for cert auth backends".
36
36
  """
37
37
  return pulumi.get(self, "cert")
38
38
 
39
39
  @cert.setter
40
- def cert(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
40
+ def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
41
41
  pulumi.set(self, "cert", value)
42
42
 
43
43
  @property
44
44
  @pulumi.getter
45
- def userpass(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
45
+ def userpass(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
46
46
  """
47
47
  "The accessor (required) property for user pass auth backends".
48
48
  """
49
49
  return pulumi.get(self, "userpass")
50
50
 
51
51
  @userpass.setter
52
- def userpass(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
52
+ def userpass(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
53
53
  pulumi.set(self, "userpass", value)
54
54
 
55
55
 
@@ -23,7 +23,7 @@ class BackendConfigEstArgs:
23
23
  default_path_policy: Optional[pulumi.Input[str]] = None,
24
24
  enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
25
25
  enabled: Optional[pulumi.Input[bool]] = None,
26
- label_to_path_policy: Optional[pulumi.Input[Mapping[str, Any]]] = None,
26
+ label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
27
27
  namespace: Optional[pulumi.Input[str]] = None):
28
28
  """
29
29
  The set of arguments for constructing a BackendConfigEst resource.
@@ -37,7 +37,7 @@ class BackendConfigEstArgs:
37
37
  :param pulumi.Input[str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
38
38
  :param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
39
39
  :param pulumi.Input[bool] enabled: Specifies whether EST is enabled.
40
- :param pulumi.Input[Mapping[str, Any]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
40
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
41
41
  :param pulumi.Input[str] namespace: The namespace of the target resource.
42
42
  The value should not contain leading or trailing forward slashes.
43
43
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -150,14 +150,14 @@ class BackendConfigEstArgs:
150
150
 
151
151
  @property
152
152
  @pulumi.getter(name="labelToPathPolicy")
153
- def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
153
+ def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
154
154
  """
155
155
  Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
156
156
  """
157
157
  return pulumi.get(self, "label_to_path_policy")
158
158
 
159
159
  @label_to_path_policy.setter
160
- def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
160
+ def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
161
161
  pulumi.set(self, "label_to_path_policy", value)
162
162
 
163
163
  @property
@@ -186,7 +186,7 @@ class _BackendConfigEstState:
186
186
  default_path_policy: Optional[pulumi.Input[str]] = None,
187
187
  enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
188
188
  enabled: Optional[pulumi.Input[bool]] = None,
189
- label_to_path_policy: Optional[pulumi.Input[Mapping[str, Any]]] = None,
189
+ label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
190
190
  last_updated: Optional[pulumi.Input[str]] = None,
191
191
  namespace: Optional[pulumi.Input[str]] = None):
192
192
  """
@@ -201,7 +201,7 @@ class _BackendConfigEstState:
201
201
  :param pulumi.Input[str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
202
202
  :param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
203
203
  :param pulumi.Input[bool] enabled: Specifies whether EST is enabled.
204
- :param pulumi.Input[Mapping[str, Any]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
204
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
205
205
  :param pulumi.Input[str] last_updated: A read-only timestamp representing the last time the configuration was updated.
206
206
  :param pulumi.Input[str] namespace: The namespace of the target resource.
207
207
  The value should not contain leading or trailing forward slashes.
@@ -318,14 +318,14 @@ class _BackendConfigEstState:
318
318
 
319
319
  @property
320
320
  @pulumi.getter(name="labelToPathPolicy")
321
- def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
321
+ def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
322
322
  """
323
323
  Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
324
324
  """
325
325
  return pulumi.get(self, "label_to_path_policy")
326
326
 
327
327
  @label_to_path_policy.setter
328
- def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
328
+ def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
329
329
  pulumi.set(self, "label_to_path_policy", value)
330
330
 
331
331
  @property
@@ -368,7 +368,7 @@ class BackendConfigEst(pulumi.CustomResource):
368
368
  default_path_policy: Optional[pulumi.Input[str]] = None,
369
369
  enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
370
370
  enabled: Optional[pulumi.Input[bool]] = None,
371
- label_to_path_policy: Optional[pulumi.Input[Mapping[str, Any]]] = None,
371
+ label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
372
372
  namespace: Optional[pulumi.Input[str]] = None,
373
373
  __props__=None):
374
374
  """
@@ -396,7 +396,7 @@ class BackendConfigEst(pulumi.CustomResource):
396
396
  :param pulumi.Input[str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
397
397
  :param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
398
398
  :param pulumi.Input[bool] enabled: Specifies whether EST is enabled.
399
- :param pulumi.Input[Mapping[str, Any]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
399
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
400
400
  :param pulumi.Input[str] namespace: The namespace of the target resource.
401
401
  The value should not contain leading or trailing forward slashes.
402
402
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -443,7 +443,7 @@ class BackendConfigEst(pulumi.CustomResource):
443
443
  default_path_policy: Optional[pulumi.Input[str]] = None,
444
444
  enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
445
445
  enabled: Optional[pulumi.Input[bool]] = None,
446
- label_to_path_policy: Optional[pulumi.Input[Mapping[str, Any]]] = None,
446
+ label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
447
447
  namespace: Optional[pulumi.Input[str]] = None,
448
448
  __props__=None):
449
449
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
@@ -483,7 +483,7 @@ class BackendConfigEst(pulumi.CustomResource):
483
483
  default_path_policy: Optional[pulumi.Input[str]] = None,
484
484
  enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
485
485
  enabled: Optional[pulumi.Input[bool]] = None,
486
- label_to_path_policy: Optional[pulumi.Input[Mapping[str, Any]]] = None,
486
+ label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
487
487
  last_updated: Optional[pulumi.Input[str]] = None,
488
488
  namespace: Optional[pulumi.Input[str]] = None) -> 'BackendConfigEst':
489
489
  """
@@ -503,7 +503,7 @@ class BackendConfigEst(pulumi.CustomResource):
503
503
  :param pulumi.Input[str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
504
504
  :param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
505
505
  :param pulumi.Input[bool] enabled: Specifies whether EST is enabled.
506
- :param pulumi.Input[Mapping[str, Any]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
506
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
507
507
  :param pulumi.Input[str] last_updated: A read-only timestamp representing the last time the configuration was updated.
508
508
  :param pulumi.Input[str] namespace: The namespace of the target resource.
509
509
  The value should not contain leading or trailing forward slashes.
@@ -587,7 +587,7 @@ class BackendConfigEst(pulumi.CustomResource):
587
587
 
588
588
  @property
589
589
  @pulumi.getter(name="labelToPathPolicy")
590
- def label_to_path_policy(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
590
+ def label_to_path_policy(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
591
591
  """
592
592
  Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
593
593
  """
@@ -120,7 +120,7 @@ class GetBackendConfigEstResult:
120
120
 
121
121
  @property
122
122
  @pulumi.getter(name="labelToPathPolicy")
123
- def label_to_path_policy(self) -> Mapping[str, Any]:
123
+ def label_to_path_policy(self) -> Mapping[str, str]:
124
124
  """
125
125
  A pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
126
126
  """
@@ -56,7 +56,7 @@ class GetBackendIssuersResult:
56
56
 
57
57
  @property
58
58
  @pulumi.getter(name="keyInfo")
59
- def key_info(self) -> Mapping[str, Any]:
59
+ def key_info(self) -> Mapping[str, str]:
60
60
  """
61
61
  Map of issuer strings read from Vault.
62
62
  """
@@ -56,7 +56,7 @@ class GetBackendKeysResult:
56
56
 
57
57
  @property
58
58
  @pulumi.getter(name="keyInfo")
59
- def key_info(self) -> Mapping[str, Any]:
59
+ def key_info(self) -> Mapping[str, str]:
60
60
  """
61
61
  Map of key strings read from Vault.
62
62
  """
@@ -18,11 +18,11 @@ __all__ = [
18
18
  @pulumi.output_type
19
19
  class BackendConfigEstAuthenticators(dict):
20
20
  def __init__(__self__, *,
21
- cert: Optional[Mapping[str, Any]] = None,
22
- userpass: Optional[Mapping[str, Any]] = None):
21
+ cert: Optional[Mapping[str, str]] = None,
22
+ userpass: Optional[Mapping[str, str]] = None):
23
23
  """
24
- :param Mapping[str, Any] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
25
- :param Mapping[str, Any] userpass: "The accessor (required) property for user pass auth backends".
24
+ :param Mapping[str, str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
25
+ :param Mapping[str, str] userpass: "The accessor (required) property for user pass auth backends".
26
26
  """
27
27
  if cert is not None:
28
28
  pulumi.set(__self__, "cert", cert)
@@ -31,7 +31,7 @@ class BackendConfigEstAuthenticators(dict):
31
31
 
32
32
  @property
33
33
  @pulumi.getter
34
- def cert(self) -> Optional[Mapping[str, Any]]:
34
+ def cert(self) -> Optional[Mapping[str, str]]:
35
35
  """
36
36
  "The accessor (required) and cert_role (optional) properties for cert auth backends".
37
37
  """
@@ -39,7 +39,7 @@ class BackendConfigEstAuthenticators(dict):
39
39
 
40
40
  @property
41
41
  @pulumi.getter
42
- def userpass(self) -> Optional[Mapping[str, Any]]:
42
+ def userpass(self) -> Optional[Mapping[str, str]]:
43
43
  """
44
44
  "The accessor (required) property for user pass auth backends".
45
45
  """
@@ -95,11 +95,11 @@ class SecretBackendRolePolicyIdentifier(dict):
95
95
  @pulumi.output_type
96
96
  class GetBackendConfigEstAuthenticatorResult(dict):
97
97
  def __init__(__self__, *,
98
- cert: Optional[Mapping[str, Any]] = None,
99
- userpass: Optional[Mapping[str, Any]] = None):
98
+ cert: Optional[Mapping[str, str]] = None,
99
+ userpass: Optional[Mapping[str, str]] = None):
100
100
  """
101
- :param Mapping[str, Any] cert: "The accessor and cert_role properties for cert auth backends".
102
- :param Mapping[str, Any] userpass: "The accessor property for user pass auth backends".
101
+ :param Mapping[str, str] cert: "The accessor and cert_role properties for cert auth backends".
102
+ :param Mapping[str, str] userpass: "The accessor property for user pass auth backends".
103
103
  """
104
104
  if cert is not None:
105
105
  pulumi.set(__self__, "cert", cert)
@@ -108,7 +108,7 @@ class GetBackendConfigEstAuthenticatorResult(dict):
108
108
 
109
109
  @property
110
110
  @pulumi.getter
111
- def cert(self) -> Optional[Mapping[str, Any]]:
111
+ def cert(self) -> Optional[Mapping[str, str]]:
112
112
  """
113
113
  "The accessor and cert_role properties for cert auth backends".
114
114
  """
@@ -116,7 +116,7 @@ class GetBackendConfigEstAuthenticatorResult(dict):
116
116
 
117
117
  @property
118
118
  @pulumi.getter
119
- def userpass(self) -> Optional[Mapping[str, Any]]:
119
+ def userpass(self) -> Optional[Mapping[str, str]]:
120
120
  """
121
121
  "The accessor property for user pass auth backends".
122
122
  """
@@ -1,5 +1,5 @@
1
1
  {
2
2
  "resource": true,
3
3
  "name": "vault",
4
- "version": "6.4.0-alpha.1723454543"
4
+ "version": "6.4.0-alpha.1724220732"
5
5
  }
@@ -15,7 +15,7 @@ __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
15
15
  class AuthBackendRoleArgs:
16
16
  def __init__(__self__, *,
17
17
  path: pulumi.Input[str],
18
- bound_attributes: Optional[pulumi.Input[Mapping[str, Any]]] = None,
18
+ bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
19
19
  bound_attributes_type: Optional[pulumi.Input[str]] = None,
20
20
  bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
21
21
  bound_subjects_type: Optional[pulumi.Input[str]] = None,
@@ -34,7 +34,7 @@ class AuthBackendRoleArgs:
34
34
  """
35
35
  The set of arguments for constructing a AuthBackendRole resource.
36
36
  :param pulumi.Input[str] path: Path where the auth backend is mounted.
37
- :param pulumi.Input[Mapping[str, Any]] bound_attributes: Mapping of attribute names to values that are expected to
37
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_attributes: Mapping of attribute names to values that are expected to
38
38
  exist in the SAML assertion.
39
39
  :param pulumi.Input[str] bound_attributes_type: The type of matching assertion to perform on
40
40
  `bound_attributes_type`.
@@ -105,7 +105,7 @@ class AuthBackendRoleArgs:
105
105
 
106
106
  @property
107
107
  @pulumi.getter(name="boundAttributes")
108
- def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
108
+ def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
109
109
  """
110
110
  Mapping of attribute names to values that are expected to
111
111
  exist in the SAML assertion.
@@ -113,7 +113,7 @@ class AuthBackendRoleArgs:
113
113
  return pulumi.get(self, "bound_attributes")
114
114
 
115
115
  @bound_attributes.setter
116
- def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
116
+ def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
117
117
  pulumi.set(self, "bound_attributes", value)
118
118
 
119
119
  @property
@@ -305,7 +305,7 @@ class AuthBackendRoleArgs:
305
305
  @pulumi.input_type
306
306
  class _AuthBackendRoleState:
307
307
  def __init__(__self__, *,
308
- bound_attributes: Optional[pulumi.Input[Mapping[str, Any]]] = None,
308
+ bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
309
309
  bound_attributes_type: Optional[pulumi.Input[str]] = None,
310
310
  bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
311
311
  bound_subjects_type: Optional[pulumi.Input[str]] = None,
@@ -324,7 +324,7 @@ class _AuthBackendRoleState:
324
324
  token_type: Optional[pulumi.Input[str]] = None):
325
325
  """
326
326
  Input properties used for looking up and filtering AuthBackendRole resources.
327
- :param pulumi.Input[Mapping[str, Any]] bound_attributes: Mapping of attribute names to values that are expected to
327
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_attributes: Mapping of attribute names to values that are expected to
328
328
  exist in the SAML assertion.
329
329
  :param pulumi.Input[str] bound_attributes_type: The type of matching assertion to perform on
330
330
  `bound_attributes_type`.
@@ -385,7 +385,7 @@ class _AuthBackendRoleState:
385
385
 
386
386
  @property
387
387
  @pulumi.getter(name="boundAttributes")
388
- def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
388
+ def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
389
389
  """
390
390
  Mapping of attribute names to values that are expected to
391
391
  exist in the SAML assertion.
@@ -393,7 +393,7 @@ class _AuthBackendRoleState:
393
393
  return pulumi.get(self, "bound_attributes")
394
394
 
395
395
  @bound_attributes.setter
396
- def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
396
+ def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
397
397
  pulumi.set(self, "bound_attributes", value)
398
398
 
399
399
  @property
@@ -599,7 +599,7 @@ class AuthBackendRole(pulumi.CustomResource):
599
599
  def __init__(__self__,
600
600
  resource_name: str,
601
601
  opts: Optional[pulumi.ResourceOptions] = None,
602
- bound_attributes: Optional[pulumi.Input[Mapping[str, Any]]] = None,
602
+ bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
603
603
  bound_attributes_type: Optional[pulumi.Input[str]] = None,
604
604
  bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
605
605
  bound_subjects_type: Optional[pulumi.Input[str]] = None,
@@ -656,7 +656,7 @@ class AuthBackendRole(pulumi.CustomResource):
656
656
 
657
657
  :param str resource_name: The name of the resource.
658
658
  :param pulumi.ResourceOptions opts: Options for the resource.
659
- :param pulumi.Input[Mapping[str, Any]] bound_attributes: Mapping of attribute names to values that are expected to
659
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_attributes: Mapping of attribute names to values that are expected to
660
660
  exist in the SAML assertion.
661
661
  :param pulumi.Input[str] bound_attributes_type: The type of matching assertion to perform on
662
662
  `bound_attributes_type`.
@@ -738,7 +738,7 @@ class AuthBackendRole(pulumi.CustomResource):
738
738
  def _internal_init(__self__,
739
739
  resource_name: str,
740
740
  opts: Optional[pulumi.ResourceOptions] = None,
741
- bound_attributes: Optional[pulumi.Input[Mapping[str, Any]]] = None,
741
+ bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
742
742
  bound_attributes_type: Optional[pulumi.Input[str]] = None,
743
743
  bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
744
744
  bound_subjects_type: Optional[pulumi.Input[str]] = None,
@@ -793,7 +793,7 @@ class AuthBackendRole(pulumi.CustomResource):
793
793
  def get(resource_name: str,
794
794
  id: pulumi.Input[str],
795
795
  opts: Optional[pulumi.ResourceOptions] = None,
796
- bound_attributes: Optional[pulumi.Input[Mapping[str, Any]]] = None,
796
+ bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
797
797
  bound_attributes_type: Optional[pulumi.Input[str]] = None,
798
798
  bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
799
799
  bound_subjects_type: Optional[pulumi.Input[str]] = None,
@@ -817,7 +817,7 @@ class AuthBackendRole(pulumi.CustomResource):
817
817
  :param str resource_name: The unique name of the resulting resource.
818
818
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
819
819
  :param pulumi.ResourceOptions opts: Options for the resource.
820
- :param pulumi.Input[Mapping[str, Any]] bound_attributes: Mapping of attribute names to values that are expected to
820
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_attributes: Mapping of attribute names to values that are expected to
821
821
  exist in the SAML assertion.
822
822
  :param pulumi.Input[str] bound_attributes_type: The type of matching assertion to perform on
823
823
  `bound_attributes_type`.
@@ -866,7 +866,7 @@ class AuthBackendRole(pulumi.CustomResource):
866
866
 
867
867
  @property
868
868
  @pulumi.getter(name="boundAttributes")
869
- def bound_attributes(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
869
+ def bound_attributes(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
870
870
  """
871
871
  Mapping of attribute names to values that are expected to
872
872
  exist in the SAML assertion.
@@ -15,7 +15,7 @@ __all__ = ['SyncAwsDestinationArgs', 'SyncAwsDestination']
15
15
  class SyncAwsDestinationArgs:
16
16
  def __init__(__self__, *,
17
17
  access_key_id: Optional[pulumi.Input[str]] = None,
18
- custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
18
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
19
19
  external_id: Optional[pulumi.Input[str]] = None,
20
20
  granularity: Optional[pulumi.Input[str]] = None,
21
21
  name: Optional[pulumi.Input[str]] = None,
@@ -29,7 +29,7 @@ class SyncAwsDestinationArgs:
29
29
  :param pulumi.Input[str] access_key_id: Access key id to authenticate against the AWS secrets manager.
30
30
  Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
31
31
  variable.
32
- :param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
32
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
33
33
  :param pulumi.Input[str] external_id: Optional extra protection that must match the trust policy granting access to the
34
34
  AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
35
35
  The field is mutable with no special condition, but users must be careful that the new value fits with the trust
@@ -92,14 +92,14 @@ class SyncAwsDestinationArgs:
92
92
 
93
93
  @property
94
94
  @pulumi.getter(name="customTags")
95
- def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
95
+ def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
96
96
  """
97
97
  Custom tags to set on the secret managed at the destination.
98
98
  """
99
99
  return pulumi.get(self, "custom_tags")
100
100
 
101
101
  @custom_tags.setter
102
- def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
102
+ def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
103
103
  pulumi.set(self, "custom_tags", value)
104
104
 
105
105
  @property
@@ -219,7 +219,7 @@ class SyncAwsDestinationArgs:
219
219
  class _SyncAwsDestinationState:
220
220
  def __init__(__self__, *,
221
221
  access_key_id: Optional[pulumi.Input[str]] = None,
222
- custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
222
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
223
223
  external_id: Optional[pulumi.Input[str]] = None,
224
224
  granularity: Optional[pulumi.Input[str]] = None,
225
225
  name: Optional[pulumi.Input[str]] = None,
@@ -234,7 +234,7 @@ class _SyncAwsDestinationState:
234
234
  :param pulumi.Input[str] access_key_id: Access key id to authenticate against the AWS secrets manager.
235
235
  Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
236
236
  variable.
237
- :param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
237
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
238
238
  :param pulumi.Input[str] external_id: Optional extra protection that must match the trust policy granting access to the
239
239
  AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
240
240
  The field is mutable with no special condition, but users must be careful that the new value fits with the trust
@@ -300,14 +300,14 @@ class _SyncAwsDestinationState:
300
300
 
301
301
  @property
302
302
  @pulumi.getter(name="customTags")
303
- def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
303
+ def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
304
304
  """
305
305
  Custom tags to set on the secret managed at the destination.
306
306
  """
307
307
  return pulumi.get(self, "custom_tags")
308
308
 
309
309
  @custom_tags.setter
310
- def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
310
+ def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
311
311
  pulumi.set(self, "custom_tags", value)
312
312
 
313
313
  @property
@@ -441,7 +441,7 @@ class SyncAwsDestination(pulumi.CustomResource):
441
441
  resource_name: str,
442
442
  opts: Optional[pulumi.ResourceOptions] = None,
443
443
  access_key_id: Optional[pulumi.Input[str]] = None,
444
- custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
444
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
445
445
  external_id: Optional[pulumi.Input[str]] = None,
446
446
  granularity: Optional[pulumi.Input[str]] = None,
447
447
  name: Optional[pulumi.Input[str]] = None,
@@ -484,7 +484,7 @@ class SyncAwsDestination(pulumi.CustomResource):
484
484
  :param pulumi.Input[str] access_key_id: Access key id to authenticate against the AWS secrets manager.
485
485
  Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
486
486
  variable.
487
- :param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
487
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
488
488
  :param pulumi.Input[str] external_id: Optional extra protection that must match the trust policy granting access to the
489
489
  AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
490
490
  The field is mutable with no special condition, but users must be careful that the new value fits with the trust
@@ -560,7 +560,7 @@ class SyncAwsDestination(pulumi.CustomResource):
560
560
  resource_name: str,
561
561
  opts: Optional[pulumi.ResourceOptions] = None,
562
562
  access_key_id: Optional[pulumi.Input[str]] = None,
563
- custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
563
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
564
564
  external_id: Optional[pulumi.Input[str]] = None,
565
565
  granularity: Optional[pulumi.Input[str]] = None,
566
566
  name: Optional[pulumi.Input[str]] = None,
@@ -602,7 +602,7 @@ class SyncAwsDestination(pulumi.CustomResource):
602
602
  id: pulumi.Input[str],
603
603
  opts: Optional[pulumi.ResourceOptions] = None,
604
604
  access_key_id: Optional[pulumi.Input[str]] = None,
605
- custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
605
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
606
606
  external_id: Optional[pulumi.Input[str]] = None,
607
607
  granularity: Optional[pulumi.Input[str]] = None,
608
608
  name: Optional[pulumi.Input[str]] = None,
@@ -622,7 +622,7 @@ class SyncAwsDestination(pulumi.CustomResource):
622
622
  :param pulumi.Input[str] access_key_id: Access key id to authenticate against the AWS secrets manager.
623
623
  Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
624
624
  variable.
625
- :param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
625
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
626
626
  :param pulumi.Input[str] external_id: Optional extra protection that must match the trust policy granting access to the
627
627
  AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
628
628
  The field is mutable with no special condition, but users must be careful that the new value fits with the trust
@@ -678,7 +678,7 @@ class SyncAwsDestination(pulumi.CustomResource):
678
678
 
679
679
  @property
680
680
  @pulumi.getter(name="customTags")
681
- def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
681
+ def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
682
682
  """
683
683
  Custom tags to set on the secret managed at the destination.
684
684
  """