diff --git a/sdk/dotnet/Aws/AuthBackendLogin.cs b/sdk/dotnet/Aws/AuthBackendLogin.cs index 13f5cac50..a561df8f1 100644 --- a/sdk/dotnet/Aws/AuthBackendLogin.cs +++ b/sdk/dotnet/Aws/AuthBackendLogin.cs @@ -93,7 +93,7 @@ public partial class AuthBackendLogin : global::Pulumi.CustomResource /// authentication used to generate this token. /// [Output("metadata")] - public Output> Metadata { get; private set; } = null!; + public Output> Metadata { get; private set; } = null!; /// /// The namespace to provision the resource in. @@ -370,15 +370,15 @@ public Input? ClientToken public Input? LeaseStartTime { get; set; } [Input("metadata")] - private InputMap? _metadata; + private InputMap? _metadata; /// /// A map of information returned by the Vault server about the /// authentication used to generate this token. /// - public InputMap Metadata + public InputMap Metadata { - get => _metadata ?? (_metadata = new InputMap()); + get => _metadata ?? (_metadata = new InputMap()); set => _metadata = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountCassandraArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountCassandraArgs.cs index d7c6865ed..54da3d47a 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountCassandraArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountCassandraArgs.cs @@ -32,16 +32,16 @@ public InputList AllowedRoles public Input? ConnectTimeout { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountCassandraGetArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountCassandraGetArgs.cs index 83b574db9..d678804d1 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountCassandraGetArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountCassandraGetArgs.cs @@ -32,16 +32,16 @@ public InputList AllowedRoles public Input? ConnectTimeout { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountCouchbaseArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountCouchbaseArgs.cs index 9f4c9da9b..8ee2add1d 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountCouchbaseArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountCouchbaseArgs.cs @@ -48,16 +48,16 @@ public Input? Base64Pem public Input? BucketName { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountCouchbaseGetArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountCouchbaseGetArgs.cs index 5368a33b0..9f698b13f 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountCouchbaseGetArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountCouchbaseGetArgs.cs @@ -48,16 +48,16 @@ public Input? Base64Pem public Input? BucketName { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountElasticsearchArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountElasticsearchArgs.cs index 22382fb4e..4949700cd 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountElasticsearchArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountElasticsearchArgs.cs @@ -50,16 +50,16 @@ public InputList AllowedRoles public Input? ClientKey { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountElasticsearchGetArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountElasticsearchGetArgs.cs index 74c7729cd..c0d67d701 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountElasticsearchGetArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountElasticsearchGetArgs.cs @@ -50,16 +50,16 @@ public InputList AllowedRoles public Input? ClientKey { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountHanaArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountHanaArgs.cs index 3b125522e..4b80ce915 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountHanaArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountHanaArgs.cs @@ -32,16 +32,16 @@ public InputList AllowedRoles public Input? ConnectionUrl { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountHanaGetArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountHanaGetArgs.cs index c3c9dfda8..b48c19200 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountHanaGetArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountHanaGetArgs.cs @@ -32,16 +32,16 @@ public InputList AllowedRoles public Input? ConnectionUrl { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountInfluxdbArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountInfluxdbArgs.cs index 56fdc632f..56065d7e2 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountInfluxdbArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountInfluxdbArgs.cs @@ -32,16 +32,16 @@ public InputList AllowedRoles public Input? ConnectTimeout { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountInfluxdbGetArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountInfluxdbGetArgs.cs index e74bc7f36..28036fe2e 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountInfluxdbGetArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountInfluxdbGetArgs.cs @@ -32,16 +32,16 @@ public InputList AllowedRoles public Input? ConnectTimeout { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountMongodbArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountMongodbArgs.cs index 1524e32a9..679f43e0b 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountMongodbArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountMongodbArgs.cs @@ -32,16 +32,16 @@ public InputList AllowedRoles public Input? ConnectionUrl { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountMongodbGetArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountMongodbGetArgs.cs index 13a214eb0..b5c54eec0 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountMongodbGetArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountMongodbGetArgs.cs @@ -32,16 +32,16 @@ public InputList AllowedRoles public Input? ConnectionUrl { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountMongodbatlaArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountMongodbatlaArgs.cs index b832d0044..abd82fed2 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountMongodbatlaArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountMongodbatlaArgs.cs @@ -26,16 +26,16 @@ public InputList AllowedRoles } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountMongodbatlaGetArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountMongodbatlaGetArgs.cs index 2b8a36658..26890bac1 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountMongodbatlaGetArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountMongodbatlaGetArgs.cs @@ -26,16 +26,16 @@ public InputList AllowedRoles } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountMssqlArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountMssqlArgs.cs index 76d2d23b2..b25631161 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountMssqlArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountMssqlArgs.cs @@ -38,16 +38,16 @@ public InputList AllowedRoles public Input? ContainedDb { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountMssqlGetArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountMssqlGetArgs.cs index b939e0b34..c8a7c9b9c 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountMssqlGetArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountMssqlGetArgs.cs @@ -38,16 +38,16 @@ public InputList AllowedRoles public Input? ContainedDb { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountMysqlArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountMysqlArgs.cs index bed8f76c2..db2164885 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountMysqlArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountMysqlArgs.cs @@ -38,16 +38,16 @@ public InputList AllowedRoles public Input? ConnectionUrl { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountMysqlAuroraArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountMysqlAuroraArgs.cs index a57393875..87d183b70 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountMysqlAuroraArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountMysqlAuroraArgs.cs @@ -38,16 +38,16 @@ public InputList AllowedRoles public Input? ConnectionUrl { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountMysqlAuroraGetArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountMysqlAuroraGetArgs.cs index 12320dc08..6d7a47cdf 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountMysqlAuroraGetArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountMysqlAuroraGetArgs.cs @@ -38,16 +38,16 @@ public InputList AllowedRoles public Input? ConnectionUrl { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountMysqlGetArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountMysqlGetArgs.cs index 79efc56c3..98fc8c43c 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountMysqlGetArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountMysqlGetArgs.cs @@ -38,16 +38,16 @@ public InputList AllowedRoles public Input? ConnectionUrl { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountMysqlLegacyArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountMysqlLegacyArgs.cs index e1507b287..221c5ec71 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountMysqlLegacyArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountMysqlLegacyArgs.cs @@ -38,16 +38,16 @@ public InputList AllowedRoles public Input? ConnectionUrl { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountMysqlLegacyGetArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountMysqlLegacyGetArgs.cs index 678559017..40423c919 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountMysqlLegacyGetArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountMysqlLegacyGetArgs.cs @@ -38,16 +38,16 @@ public InputList AllowedRoles public Input? ConnectionUrl { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountMysqlRdArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountMysqlRdArgs.cs index 5ea77c9ac..0d171202c 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountMysqlRdArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountMysqlRdArgs.cs @@ -38,16 +38,16 @@ public InputList AllowedRoles public Input? ConnectionUrl { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountMysqlRdGetArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountMysqlRdGetArgs.cs index afa0946c1..89af84026 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountMysqlRdGetArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountMysqlRdGetArgs.cs @@ -38,16 +38,16 @@ public InputList AllowedRoles public Input? ConnectionUrl { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountOracleArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountOracleArgs.cs index c87e0d187..f177fb5ed 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountOracleArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountOracleArgs.cs @@ -32,16 +32,16 @@ public InputList AllowedRoles public Input? ConnectionUrl { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountOracleGetArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountOracleGetArgs.cs index a37233b23..a9f81fc08 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountOracleGetArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountOracleGetArgs.cs @@ -32,16 +32,16 @@ public InputList AllowedRoles public Input? ConnectionUrl { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountPostgresqlArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountPostgresqlArgs.cs index 9e86a27ba..fd2ac32e4 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountPostgresqlArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountPostgresqlArgs.cs @@ -38,16 +38,16 @@ public InputList AllowedRoles public Input? ConnectionUrl { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountPostgresqlGetArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountPostgresqlGetArgs.cs index 158d91d79..22661a946 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountPostgresqlGetArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountPostgresqlGetArgs.cs @@ -38,16 +38,16 @@ public InputList AllowedRoles public Input? ConnectionUrl { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountRediArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountRediArgs.cs index a04cb7c51..94ef8e45b 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountRediArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountRediArgs.cs @@ -32,16 +32,16 @@ public InputList AllowedRoles public Input? CaCert { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountRediGetArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountRediGetArgs.cs index 8feff70de..91502660f 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountRediGetArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountRediGetArgs.cs @@ -32,16 +32,16 @@ public InputList AllowedRoles public Input? CaCert { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountRedisElasticachArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountRedisElasticachArgs.cs index 756bf602d..9ec96acdd 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountRedisElasticachArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountRedisElasticachArgs.cs @@ -26,16 +26,16 @@ public InputList AllowedRoles } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountRedisElasticachGetArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountRedisElasticachGetArgs.cs index e56f419d0..10b071aa1 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountRedisElasticachGetArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountRedisElasticachGetArgs.cs @@ -26,16 +26,16 @@ public InputList AllowedRoles } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountRedshiftArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountRedshiftArgs.cs index 3af6ebc7f..ee3cc4b9d 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountRedshiftArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountRedshiftArgs.cs @@ -32,16 +32,16 @@ public InputList AllowedRoles public Input? ConnectionUrl { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountRedshiftGetArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountRedshiftGetArgs.cs index 472aeeac9..37504d805 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountRedshiftGetArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountRedshiftGetArgs.cs @@ -32,16 +32,16 @@ public InputList AllowedRoles public Input? ConnectionUrl { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountSnowflakeArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountSnowflakeArgs.cs index b0d54d155..6c2931ec8 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountSnowflakeArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountSnowflakeArgs.cs @@ -32,16 +32,16 @@ public InputList AllowedRoles public Input? ConnectionUrl { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Inputs/SecretsMountSnowflakeGetArgs.cs b/sdk/dotnet/Database/Inputs/SecretsMountSnowflakeGetArgs.cs index 691ad9e78..f1b297582 100644 --- a/sdk/dotnet/Database/Inputs/SecretsMountSnowflakeGetArgs.cs +++ b/sdk/dotnet/Database/Inputs/SecretsMountSnowflakeGetArgs.cs @@ -32,16 +32,16 @@ public InputList AllowedRoles public Input? ConnectionUrl { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// /// Supported list of database secrets engines that can be configured: /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/Outputs/SecretsMountCassandra.cs b/sdk/dotnet/Database/Outputs/SecretsMountCassandra.cs index 2b8aa6b5b..b71161e6a 100644 --- a/sdk/dotnet/Database/Outputs/SecretsMountCassandra.cs +++ b/sdk/dotnet/Database/Outputs/SecretsMountCassandra.cs @@ -27,7 +27,7 @@ public sealed class SecretsMountCassandra /// /// Supported list of database secrets engines that can be configured: /// - public readonly ImmutableDictionary? Data; + public readonly ImmutableDictionary? Data; /// /// Cassandra hosts to connect to. /// @@ -88,7 +88,7 @@ private SecretsMountCassandra( int? connectTimeout, - ImmutableDictionary? data, + ImmutableDictionary? data, ImmutableArray hosts, diff --git a/sdk/dotnet/Database/Outputs/SecretsMountCouchbase.cs b/sdk/dotnet/Database/Outputs/SecretsMountCouchbase.cs index 228af9b5d..b29daf46c 100644 --- a/sdk/dotnet/Database/Outputs/SecretsMountCouchbase.cs +++ b/sdk/dotnet/Database/Outputs/SecretsMountCouchbase.cs @@ -31,7 +31,7 @@ public sealed class SecretsMountCouchbase /// /// Supported list of database secrets engines that can be configured: /// - public readonly ImmutableDictionary? Data; + public readonly ImmutableDictionary? Data; /// /// A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. /// @@ -82,7 +82,7 @@ private SecretsMountCouchbase( string? bucketName, - ImmutableDictionary? data, + ImmutableDictionary? data, ImmutableArray hosts, diff --git a/sdk/dotnet/Database/Outputs/SecretsMountElasticsearch.cs b/sdk/dotnet/Database/Outputs/SecretsMountElasticsearch.cs index 2742a0a8d..beca7954b 100644 --- a/sdk/dotnet/Database/Outputs/SecretsMountElasticsearch.cs +++ b/sdk/dotnet/Database/Outputs/SecretsMountElasticsearch.cs @@ -39,7 +39,7 @@ public sealed class SecretsMountElasticsearch /// /// Supported list of database secrets engines that can be configured: /// - public readonly ImmutableDictionary? Data; + public readonly ImmutableDictionary? Data; /// /// Whether to disable certificate verification /// @@ -94,7 +94,7 @@ private SecretsMountElasticsearch( string? clientKey, - ImmutableDictionary? data, + ImmutableDictionary? data, bool? insecure, diff --git a/sdk/dotnet/Database/Outputs/SecretsMountHana.cs b/sdk/dotnet/Database/Outputs/SecretsMountHana.cs index 57da96594..58a3f8df2 100644 --- a/sdk/dotnet/Database/Outputs/SecretsMountHana.cs +++ b/sdk/dotnet/Database/Outputs/SecretsMountHana.cs @@ -27,7 +27,7 @@ public sealed class SecretsMountHana /// /// Supported list of database secrets engines that can be configured: /// - public readonly ImmutableDictionary? Data; + public readonly ImmutableDictionary? Data; /// /// Disable special character escaping in username and password /// @@ -76,7 +76,7 @@ private SecretsMountHana( string? connectionUrl, - ImmutableDictionary? data, + ImmutableDictionary? data, bool? disableEscaping, diff --git a/sdk/dotnet/Database/Outputs/SecretsMountInfluxdb.cs b/sdk/dotnet/Database/Outputs/SecretsMountInfluxdb.cs index 22eda74a6..b56503099 100644 --- a/sdk/dotnet/Database/Outputs/SecretsMountInfluxdb.cs +++ b/sdk/dotnet/Database/Outputs/SecretsMountInfluxdb.cs @@ -27,7 +27,7 @@ public sealed class SecretsMountInfluxdb /// /// Supported list of database secrets engines that can be configured: /// - public readonly ImmutableDictionary? Data; + public readonly ImmutableDictionary? Data; /// /// Influxdb host to connect to. /// @@ -88,7 +88,7 @@ private SecretsMountInfluxdb( int? connectTimeout, - ImmutableDictionary? data, + ImmutableDictionary? data, string host, diff --git a/sdk/dotnet/Database/Outputs/SecretsMountMongodb.cs b/sdk/dotnet/Database/Outputs/SecretsMountMongodb.cs index f7440f5fb..39faaa375 100644 --- a/sdk/dotnet/Database/Outputs/SecretsMountMongodb.cs +++ b/sdk/dotnet/Database/Outputs/SecretsMountMongodb.cs @@ -27,7 +27,7 @@ public sealed class SecretsMountMongodb /// /// Supported list of database secrets engines that can be configured: /// - public readonly ImmutableDictionary? Data; + public readonly ImmutableDictionary? Data; /// /// Maximum number of seconds a connection may be reused. /// @@ -76,7 +76,7 @@ private SecretsMountMongodb( string? connectionUrl, - ImmutableDictionary? data, + ImmutableDictionary? data, int? maxConnectionLifetime, diff --git a/sdk/dotnet/Database/Outputs/SecretsMountMongodbatla.cs b/sdk/dotnet/Database/Outputs/SecretsMountMongodbatla.cs index a49210ea8..3f5edf597 100644 --- a/sdk/dotnet/Database/Outputs/SecretsMountMongodbatla.cs +++ b/sdk/dotnet/Database/Outputs/SecretsMountMongodbatla.cs @@ -23,7 +23,7 @@ public sealed class SecretsMountMongodbatla /// /// Supported list of database secrets engines that can be configured: /// - public readonly ImmutableDictionary? Data; + public readonly ImmutableDictionary? Data; /// /// Name of the database connection. /// @@ -58,7 +58,7 @@ public sealed class SecretsMountMongodbatla private SecretsMountMongodbatla( ImmutableArray allowedRoles, - ImmutableDictionary? data, + ImmutableDictionary? data, string name, diff --git a/sdk/dotnet/Database/Outputs/SecretsMountMssql.cs b/sdk/dotnet/Database/Outputs/SecretsMountMssql.cs index c9e741628..f5eb3c326 100644 --- a/sdk/dotnet/Database/Outputs/SecretsMountMssql.cs +++ b/sdk/dotnet/Database/Outputs/SecretsMountMssql.cs @@ -31,7 +31,7 @@ public sealed class SecretsMountMssql /// /// Supported list of database secrets engines that can be configured: /// - public readonly ImmutableDictionary? Data; + public readonly ImmutableDictionary? Data; /// /// Disable special character escaping in username and password /// @@ -86,7 +86,7 @@ private SecretsMountMssql( bool? containedDb, - ImmutableDictionary? data, + ImmutableDictionary? data, bool? disableEscaping, diff --git a/sdk/dotnet/Database/Outputs/SecretsMountMysql.cs b/sdk/dotnet/Database/Outputs/SecretsMountMysql.cs index 1431125fe..4f1cbc937 100644 --- a/sdk/dotnet/Database/Outputs/SecretsMountMysql.cs +++ b/sdk/dotnet/Database/Outputs/SecretsMountMysql.cs @@ -31,7 +31,7 @@ public sealed class SecretsMountMysql /// /// Supported list of database secrets engines that can be configured: /// - public readonly ImmutableDictionary? Data; + public readonly ImmutableDictionary? Data; /// /// Maximum number of seconds a connection may be reused. /// @@ -94,7 +94,7 @@ private SecretsMountMysql( string? connectionUrl, - ImmutableDictionary? data, + ImmutableDictionary? data, int? maxConnectionLifetime, diff --git a/sdk/dotnet/Database/Outputs/SecretsMountMysqlAurora.cs b/sdk/dotnet/Database/Outputs/SecretsMountMysqlAurora.cs index 1006cc975..006c63d05 100644 --- a/sdk/dotnet/Database/Outputs/SecretsMountMysqlAurora.cs +++ b/sdk/dotnet/Database/Outputs/SecretsMountMysqlAurora.cs @@ -31,7 +31,7 @@ public sealed class SecretsMountMysqlAurora /// /// Supported list of database secrets engines that can be configured: /// - public readonly ImmutableDictionary? Data; + public readonly ImmutableDictionary? Data; /// /// Maximum number of seconds a connection may be reused. /// @@ -94,7 +94,7 @@ private SecretsMountMysqlAurora( string? connectionUrl, - ImmutableDictionary? data, + ImmutableDictionary? data, int? maxConnectionLifetime, diff --git a/sdk/dotnet/Database/Outputs/SecretsMountMysqlLegacy.cs b/sdk/dotnet/Database/Outputs/SecretsMountMysqlLegacy.cs index c45b44270..0cfb13b8d 100644 --- a/sdk/dotnet/Database/Outputs/SecretsMountMysqlLegacy.cs +++ b/sdk/dotnet/Database/Outputs/SecretsMountMysqlLegacy.cs @@ -31,7 +31,7 @@ public sealed class SecretsMountMysqlLegacy /// /// Supported list of database secrets engines that can be configured: /// - public readonly ImmutableDictionary? Data; + public readonly ImmutableDictionary? Data; /// /// Maximum number of seconds a connection may be reused. /// @@ -94,7 +94,7 @@ private SecretsMountMysqlLegacy( string? connectionUrl, - ImmutableDictionary? data, + ImmutableDictionary? data, int? maxConnectionLifetime, diff --git a/sdk/dotnet/Database/Outputs/SecretsMountMysqlRd.cs b/sdk/dotnet/Database/Outputs/SecretsMountMysqlRd.cs index 565a5d1a2..2e13037c1 100644 --- a/sdk/dotnet/Database/Outputs/SecretsMountMysqlRd.cs +++ b/sdk/dotnet/Database/Outputs/SecretsMountMysqlRd.cs @@ -31,7 +31,7 @@ public sealed class SecretsMountMysqlRd /// /// Supported list of database secrets engines that can be configured: /// - public readonly ImmutableDictionary? Data; + public readonly ImmutableDictionary? Data; /// /// Maximum number of seconds a connection may be reused. /// @@ -94,7 +94,7 @@ private SecretsMountMysqlRd( string? connectionUrl, - ImmutableDictionary? data, + ImmutableDictionary? data, int? maxConnectionLifetime, diff --git a/sdk/dotnet/Database/Outputs/SecretsMountOracle.cs b/sdk/dotnet/Database/Outputs/SecretsMountOracle.cs index c283a1ab3..164be60c0 100644 --- a/sdk/dotnet/Database/Outputs/SecretsMountOracle.cs +++ b/sdk/dotnet/Database/Outputs/SecretsMountOracle.cs @@ -27,7 +27,7 @@ public sealed class SecretsMountOracle /// /// Supported list of database secrets engines that can be configured: /// - public readonly ImmutableDictionary? Data; + public readonly ImmutableDictionary? Data; /// /// Set to true to disconnect any open sessions prior to running the revocation statements. /// @@ -84,7 +84,7 @@ private SecretsMountOracle( string? connectionUrl, - ImmutableDictionary? data, + ImmutableDictionary? data, bool? disconnectSessions, diff --git a/sdk/dotnet/Database/Outputs/SecretsMountPostgresql.cs b/sdk/dotnet/Database/Outputs/SecretsMountPostgresql.cs index caea71a7e..f8f848d19 100644 --- a/sdk/dotnet/Database/Outputs/SecretsMountPostgresql.cs +++ b/sdk/dotnet/Database/Outputs/SecretsMountPostgresql.cs @@ -31,7 +31,7 @@ public sealed class SecretsMountPostgresql /// /// Supported list of database secrets engines that can be configured: /// - public readonly ImmutableDictionary? Data; + public readonly ImmutableDictionary? Data; /// /// Disable special character escaping in username and password /// @@ -90,7 +90,7 @@ private SecretsMountPostgresql( string? connectionUrl, - ImmutableDictionary? data, + ImmutableDictionary? data, bool? disableEscaping, diff --git a/sdk/dotnet/Database/Outputs/SecretsMountRedi.cs b/sdk/dotnet/Database/Outputs/SecretsMountRedi.cs index 0adf2fda0..95e77873f 100644 --- a/sdk/dotnet/Database/Outputs/SecretsMountRedi.cs +++ b/sdk/dotnet/Database/Outputs/SecretsMountRedi.cs @@ -27,7 +27,7 @@ public sealed class SecretsMountRedi /// /// Supported list of database secrets engines that can be configured: /// - public readonly ImmutableDictionary? Data; + public readonly ImmutableDictionary? Data; /// /// Specifies the host to connect to /// @@ -76,7 +76,7 @@ private SecretsMountRedi( string? caCert, - ImmutableDictionary? data, + ImmutableDictionary? data, string host, diff --git a/sdk/dotnet/Database/Outputs/SecretsMountRedisElasticach.cs b/sdk/dotnet/Database/Outputs/SecretsMountRedisElasticach.cs index 9d7dfa9b6..45e1664fe 100644 --- a/sdk/dotnet/Database/Outputs/SecretsMountRedisElasticach.cs +++ b/sdk/dotnet/Database/Outputs/SecretsMountRedisElasticach.cs @@ -23,7 +23,7 @@ public sealed class SecretsMountRedisElasticach /// /// Supported list of database secrets engines that can be configured: /// - public readonly ImmutableDictionary? Data; + public readonly ImmutableDictionary? Data; /// /// Name of the database connection. /// @@ -62,7 +62,7 @@ public sealed class SecretsMountRedisElasticach private SecretsMountRedisElasticach( ImmutableArray allowedRoles, - ImmutableDictionary? data, + ImmutableDictionary? data, string name, diff --git a/sdk/dotnet/Database/Outputs/SecretsMountRedshift.cs b/sdk/dotnet/Database/Outputs/SecretsMountRedshift.cs index 055610b7f..5d6719026 100644 --- a/sdk/dotnet/Database/Outputs/SecretsMountRedshift.cs +++ b/sdk/dotnet/Database/Outputs/SecretsMountRedshift.cs @@ -27,7 +27,7 @@ public sealed class SecretsMountRedshift /// /// Supported list of database secrets engines that can be configured: /// - public readonly ImmutableDictionary? Data; + public readonly ImmutableDictionary? Data; /// /// Disable special character escaping in username and password /// @@ -80,7 +80,7 @@ private SecretsMountRedshift( string? connectionUrl, - ImmutableDictionary? data, + ImmutableDictionary? data, bool? disableEscaping, diff --git a/sdk/dotnet/Database/Outputs/SecretsMountSnowflake.cs b/sdk/dotnet/Database/Outputs/SecretsMountSnowflake.cs index 1533d6157..b42e1f1a6 100644 --- a/sdk/dotnet/Database/Outputs/SecretsMountSnowflake.cs +++ b/sdk/dotnet/Database/Outputs/SecretsMountSnowflake.cs @@ -27,7 +27,7 @@ public sealed class SecretsMountSnowflake /// /// Supported list of database secrets engines that can be configured: /// - public readonly ImmutableDictionary? Data; + public readonly ImmutableDictionary? Data; /// /// Maximum number of seconds a connection may be reused. /// @@ -76,7 +76,7 @@ private SecretsMountSnowflake( string? connectionUrl, - ImmutableDictionary? data, + ImmutableDictionary? data, int? maxConnectionLifetime, diff --git a/sdk/dotnet/Database/SecretBackendConnection.cs b/sdk/dotnet/Database/SecretBackendConnection.cs index 266c5ac2f..d4be4bdb2 100644 --- a/sdk/dotnet/Database/SecretBackendConnection.cs +++ b/sdk/dotnet/Database/SecretBackendConnection.cs @@ -84,7 +84,7 @@ public partial class SecretBackendConnection : global::Pulumi.CustomResource /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// [Output("data")] - public Output?> Data { get; private set; } = null!; + public Output?> Data { get; private set; } = null!; /// /// A nested block containing configuration options for Elasticsearch connections. @@ -296,14 +296,14 @@ public InputList AllowedRoles public Input? Couchbase { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } @@ -485,14 +485,14 @@ public InputList AllowedRoles public Input? Couchbase { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A map of sensitive data to pass to the endpoint. Useful for templated connection strings. /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/Database/SecretBackendRole.cs b/sdk/dotnet/Database/SecretBackendRole.cs index c310293f8..4033f1c98 100644 --- a/sdk/dotnet/Database/SecretBackendRole.cs +++ b/sdk/dotnet/Database/SecretBackendRole.cs @@ -86,7 +86,7 @@ public partial class SecretBackendRole : global::Pulumi.CustomResource /// The following options are available for each `credential_type` value: /// [Output("credentialConfig")] - public Output?> CredentialConfig { get; private set; } = null!; + public Output?> CredentialConfig { get; private set; } = null!; /// /// Specifies the type of credential that @@ -219,7 +219,7 @@ public InputList CreationStatements } [Input("credentialConfig")] - private InputMap? _credentialConfig; + private InputMap? _credentialConfig; /// /// Specifies the configuration @@ -227,9 +227,9 @@ public InputList CreationStatements /// /// The following options are available for each `credential_type` value: /// - public InputMap CredentialConfig + public InputMap CredentialConfig { - get => _credentialConfig ?? (_credentialConfig = new InputMap()); + get => _credentialConfig ?? (_credentialConfig = new InputMap()); set => _credentialConfig = value; } @@ -344,7 +344,7 @@ public InputList CreationStatements } [Input("credentialConfig")] - private InputMap? _credentialConfig; + private InputMap? _credentialConfig; /// /// Specifies the configuration @@ -352,9 +352,9 @@ public InputList CreationStatements /// /// The following options are available for each `credential_type` value: /// - public InputMap CredentialConfig + public InputMap CredentialConfig { - get => _credentialConfig ?? (_credentialConfig = new InputMap()); + get => _credentialConfig ?? (_credentialConfig = new InputMap()); set => _credentialConfig = value; } diff --git a/sdk/dotnet/Database/SecretsMount.cs b/sdk/dotnet/Database/SecretsMount.cs index 5f922b522..bc0ac85a9 100644 --- a/sdk/dotnet/Database/SecretsMount.cs +++ b/sdk/dotnet/Database/SecretsMount.cs @@ -273,7 +273,7 @@ public partial class SecretsMount : global::Pulumi.CustomResource /// Specifies mount type specific options that are passed to the backend /// [Output("options")] - public Output?> Options { get; private set; } = null!; + public Output?> Options { get; private set; } = null!; /// /// A nested block containing configuration options for Oracle connections. @@ -654,14 +654,14 @@ public InputList Mysqls public Input? Namespace { get; set; } [Input("options")] - private InputMap? _options; + private InputMap? _options; /// /// Specifies mount type specific options that are passed to the backend /// - public InputMap Options + public InputMap Options { - get => _options ?? (_options = new InputMap()); + get => _options ?? (_options = new InputMap()); set => _options = value; } @@ -1060,14 +1060,14 @@ public InputList Mysqls public Input? Namespace { get; set; } [Input("options")] - private InputMap? _options; + private InputMap? _options; /// /// Specifies mount type specific options that are passed to the backend /// - public InputMap Options + public InputMap Options { - get => _options ?? (_options = new InputMap()); + get => _options ?? (_options = new InputMap()); set => _options = value; } diff --git a/sdk/dotnet/Generic/GetSecret.cs b/sdk/dotnet/Generic/GetSecret.cs index 3ce149adb..a6ee9b94c 100644 --- a/sdk/dotnet/Generic/GetSecret.cs +++ b/sdk/dotnet/Generic/GetSecret.cs @@ -221,7 +221,7 @@ public sealed class GetSecretResult /// represent string data, so any non-string values returned from Vault are /// serialized as JSON. /// - public readonly ImmutableDictionary Data; + public readonly ImmutableDictionary Data; /// /// A string containing the full data payload retrieved from /// Vault, serialized in JSON format. @@ -250,7 +250,7 @@ public sealed class GetSecretResult [OutputConstructor] private GetSecretResult( - ImmutableDictionary data, + ImmutableDictionary data, string dataJson, diff --git a/sdk/dotnet/Generic/Secret.cs b/sdk/dotnet/Generic/Secret.cs index b5a80efa2..aeab6786e 100644 --- a/sdk/dotnet/Generic/Secret.cs +++ b/sdk/dotnet/Generic/Secret.cs @@ -28,7 +28,7 @@ public partial class Secret : global::Pulumi.CustomResource /// serialized as JSON. /// [Output("data")] - public Output> Data { get; private set; } = null!; + public Output> Data { get; private set; } = null!; /// /// String containing a JSON-encoded object that will be @@ -186,7 +186,7 @@ public SecretArgs() public sealed class SecretState : global::Pulumi.ResourceArgs { [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A mapping whose keys are the top-level data keys returned from @@ -194,12 +194,12 @@ public sealed class SecretState : global::Pulumi.ResourceArgs /// represent string data, so any non-string values returned from Vault are /// serialized as JSON. /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set { - var emptySecret = Output.CreateSecret(ImmutableDictionary.Create()); + var emptySecret = Output.CreateSecret(ImmutableDictionary.Create()); _data = Output.All(value, emptySecret).Apply(v => v[0]); } } diff --git a/sdk/dotnet/GetNamespace.cs b/sdk/dotnet/GetNamespace.cs index 47dc7710e..60f1ddce0 100644 --- a/sdk/dotnet/GetNamespace.cs +++ b/sdk/dotnet/GetNamespace.cs @@ -198,7 +198,7 @@ public sealed class GetNamespaceResult /// Only fetched if `path` is specified. /// *Requires Vault 1.12+.* /// - public readonly ImmutableDictionary CustomMetadata; + public readonly ImmutableDictionary CustomMetadata; /// /// The provider-assigned unique ID for this managed resource. /// @@ -218,7 +218,7 @@ public sealed class GetNamespaceResult [OutputConstructor] private GetNamespaceResult( - ImmutableDictionary customMetadata, + ImmutableDictionary customMetadata, string id, diff --git a/sdk/dotnet/GetRaftAutopilotState.cs b/sdk/dotnet/GetRaftAutopilotState.cs index 0637cd1fc..b8f184db0 100644 --- a/sdk/dotnet/GetRaftAutopilotState.cs +++ b/sdk/dotnet/GetRaftAutopilotState.cs @@ -121,7 +121,7 @@ public sealed class GetRaftAutopilotStateResult /// /// Additional output related to redundancy zones stored as a serialized map of strings. /// - public readonly ImmutableDictionary RedundancyZones; + public readonly ImmutableDictionary RedundancyZones; /// /// Additional output related to redundancy zones. /// @@ -129,7 +129,7 @@ public sealed class GetRaftAutopilotStateResult /// /// Additionaly output related to servers in the cluster stored as a serialized map of strings. /// - public readonly ImmutableDictionary Servers; + public readonly ImmutableDictionary Servers; /// /// Additionaly output related to servers in the cluster. /// @@ -137,7 +137,7 @@ public sealed class GetRaftAutopilotStateResult /// /// Additional output related to upgrade information stored as a serialized map of strings. /// - public readonly ImmutableDictionary UpgradeInfo; + public readonly ImmutableDictionary UpgradeInfo; /// /// Additional output related to upgrade information. /// @@ -161,15 +161,15 @@ private GetRaftAutopilotStateResult( int optimisticFailureTolerance, - ImmutableDictionary redundancyZones, + ImmutableDictionary redundancyZones, string redundancyZonesJson, - ImmutableDictionary servers, + ImmutableDictionary servers, string serversJson, - ImmutableDictionary upgradeInfo, + ImmutableDictionary upgradeInfo, string upgradeInfoJson, diff --git a/sdk/dotnet/Identity/GetEntity.cs b/sdk/dotnet/Identity/GetEntity.cs index c615f2c69..556415dd3 100644 --- a/sdk/dotnet/Identity/GetEntity.cs +++ b/sdk/dotnet/Identity/GetEntity.cs @@ -222,7 +222,7 @@ public sealed class GetEntityResult /// /// Arbitrary metadata /// - public readonly ImmutableDictionary Metadata; + public readonly ImmutableDictionary Metadata; public readonly string? Namespace; /// /// Namespace of which the entity is part of @@ -265,7 +265,7 @@ private GetEntityResult( ImmutableArray mergedEntityIds, - ImmutableDictionary metadata, + ImmutableDictionary metadata, string? @namespace, diff --git a/sdk/dotnet/Identity/GetGroup.cs b/sdk/dotnet/Identity/GetGroup.cs index d32e87cc6..1f3fb9e4c 100644 --- a/sdk/dotnet/Identity/GetGroup.cs +++ b/sdk/dotnet/Identity/GetGroup.cs @@ -193,7 +193,7 @@ public sealed class GetGroupResult /// /// Arbitrary metadata /// - public readonly ImmutableDictionary AliasMetadata; + public readonly ImmutableDictionary AliasMetadata; public readonly string AliasMountAccessor; /// /// Authentication mount path which this alias belongs to @@ -234,7 +234,7 @@ public sealed class GetGroupResult /// /// Arbitrary metadata /// - public readonly ImmutableDictionary Metadata; + public readonly ImmutableDictionary Metadata; /// /// Modify index of the group /// @@ -269,7 +269,7 @@ private GetGroupResult( ImmutableArray aliasMergedFromCanonicalIds, - ImmutableDictionary aliasMetadata, + ImmutableDictionary aliasMetadata, string aliasMountAccessor, @@ -295,7 +295,7 @@ private GetGroupResult( ImmutableArray memberGroupIds, - ImmutableDictionary metadata, + ImmutableDictionary metadata, int modifyIndex, diff --git a/sdk/dotnet/Identity/GetOidcPublicKeys.cs b/sdk/dotnet/Identity/GetOidcPublicKeys.cs index 07d78db55..7d27b4df9 100644 --- a/sdk/dotnet/Identity/GetOidcPublicKeys.cs +++ b/sdk/dotnet/Identity/GetOidcPublicKeys.cs @@ -183,7 +183,7 @@ public sealed class GetOidcPublicKeysResult /// The public portion of keys for an OIDC provider. /// Clients can use them to validate the authenticity of an identity token. /// - public readonly ImmutableArray> Keys; + public readonly ImmutableArray> Keys; public readonly string Name; public readonly string? Namespace; @@ -191,7 +191,7 @@ public sealed class GetOidcPublicKeysResult private GetOidcPublicKeysResult( string id, - ImmutableArray> keys, + ImmutableArray> keys, string name, diff --git a/sdk/dotnet/Identity/Outputs/GetEntityAliasResult.cs b/sdk/dotnet/Identity/Outputs/GetEntityAliasResult.cs index ddf3b644c..2689fb50a 100644 --- a/sdk/dotnet/Identity/Outputs/GetEntityAliasResult.cs +++ b/sdk/dotnet/Identity/Outputs/GetEntityAliasResult.cs @@ -36,7 +36,7 @@ public sealed class GetEntityAliasResult /// /// Arbitrary metadata /// - public readonly ImmutableDictionary Metadata; + public readonly ImmutableDictionary Metadata; /// /// Authentication mount acccessor which this alias belongs to /// @@ -66,7 +66,7 @@ private GetEntityAliasResult( ImmutableArray mergedFromCanonicalIds, - ImmutableDictionary metadata, + ImmutableDictionary metadata, string mountAccessor, diff --git a/sdk/dotnet/Jwt/AuthBackendRole.cs b/sdk/dotnet/Jwt/AuthBackendRole.cs index c49839ec5..68ab988b6 100644 --- a/sdk/dotnet/Jwt/AuthBackendRole.cs +++ b/sdk/dotnet/Jwt/AuthBackendRole.cs @@ -131,7 +131,7 @@ public partial class AuthBackendRole : global::Pulumi.CustomResource /// comma-separated values, e.g. `"red"` or `"red,green,blue"`. /// [Output("boundClaims")] - public Output?> BoundClaims { get; private set; } = null!; + public Output?> BoundClaims { get; private set; } = null!; /// /// How to interpret values in the claims/values @@ -153,7 +153,7 @@ public partial class AuthBackendRole : global::Pulumi.CustomResource /// to specified metadata fields (values). /// [Output("claimMappings")] - public Output?> ClaimMappings { get; private set; } = null!; + public Output?> ClaimMappings { get; private set; } = null!; /// /// The amount of leeway to add to all claims to account for clock skew, in @@ -388,16 +388,16 @@ public InputList BoundAudiences } [Input("boundClaims")] - private InputMap? _boundClaims; + private InputMap? _boundClaims; /// /// If set, a map of claims to values to match against. /// A claim's value must be a string, which may contain one value or multiple /// comma-separated values, e.g. `"red"` or `"red,green,blue"`. /// - public InputMap BoundClaims + public InputMap BoundClaims { - get => _boundClaims ?? (_boundClaims = new InputMap()); + get => _boundClaims ?? (_boundClaims = new InputMap()); set => _boundClaims = value; } @@ -417,15 +417,15 @@ public InputMap BoundClaims public Input? BoundSubject { get; set; } [Input("claimMappings")] - private InputMap? _claimMappings; + private InputMap? _claimMappings; /// /// If set, a map of claims (keys) to be copied /// to specified metadata fields (values). /// - public InputMap ClaimMappings + public InputMap ClaimMappings { - get => _claimMappings ?? (_claimMappings = new InputMap()); + get => _claimMappings ?? (_claimMappings = new InputMap()); set => _claimMappings = value; } @@ -642,16 +642,16 @@ public InputList BoundAudiences } [Input("boundClaims")] - private InputMap? _boundClaims; + private InputMap? _boundClaims; /// /// If set, a map of claims to values to match against. /// A claim's value must be a string, which may contain one value or multiple /// comma-separated values, e.g. `"red"` or `"red,green,blue"`. /// - public InputMap BoundClaims + public InputMap BoundClaims { - get => _boundClaims ?? (_boundClaims = new InputMap()); + get => _boundClaims ?? (_boundClaims = new InputMap()); set => _boundClaims = value; } @@ -671,15 +671,15 @@ public InputMap BoundClaims public Input? BoundSubject { get; set; } [Input("claimMappings")] - private InputMap? _claimMappings; + private InputMap? _claimMappings; /// /// If set, a map of claims (keys) to be copied /// to specified metadata fields (values). /// - public InputMap ClaimMappings + public InputMap ClaimMappings { - get => _claimMappings ?? (_claimMappings = new InputMap()); + get => _claimMappings ?? (_claimMappings = new InputMap()); set => _claimMappings = value; } diff --git a/sdk/dotnet/Kubernetes/SecretBackend.cs b/sdk/dotnet/Kubernetes/SecretBackend.cs index bd79241d5..998389697 100644 --- a/sdk/dotnet/Kubernetes/SecretBackend.cs +++ b/sdk/dotnet/Kubernetes/SecretBackend.cs @@ -168,7 +168,7 @@ public partial class SecretBackend : global::Pulumi.CustomResource /// Specifies mount type specific options that are passed to the backend /// [Output("options")] - public Output?> Options { get; private set; } = null!; + public Output?> Options { get; private set; } = null!; /// /// List of headers to allow and pass from the request to the plugin @@ -388,14 +388,14 @@ public InputList DelegatedAuthAccessors public Input? Namespace { get; set; } [Input("options")] - private InputMap? _options; + private InputMap? _options; /// /// Specifies mount type specific options that are passed to the backend /// - public InputMap Options + public InputMap Options { - get => _options ?? (_options = new InputMap()); + get => _options ?? (_options = new InputMap()); set => _options = value; } @@ -597,14 +597,14 @@ public InputList DelegatedAuthAccessors public Input? Namespace { get; set; } [Input("options")] - private InputMap? _options; + private InputMap? _options; /// /// Specifies mount type specific options that are passed to the backend /// - public InputMap Options + public InputMap Options { - get => _options ?? (_options = new InputMap()); + get => _options ?? (_options = new InputMap()); set => _options = value; } diff --git a/sdk/dotnet/Ldap/SecretBackend.cs b/sdk/dotnet/Ldap/SecretBackend.cs index 23ed398f0..7664764c1 100644 --- a/sdk/dotnet/Ldap/SecretBackend.cs +++ b/sdk/dotnet/Ldap/SecretBackend.cs @@ -187,7 +187,7 @@ public partial class SecretBackend : global::Pulumi.CustomResource /// Specifies mount type specific options that are passed to the backend /// [Output("options")] - public Output?> Options { get; private set; } = null!; + public Output?> Options { get; private set; } = null!; /// /// List of headers to allow and pass from the request to the plugin @@ -517,14 +517,14 @@ public InputList DelegatedAuthAccessors public Input? Namespace { get; set; } [Input("options")] - private InputMap? _options; + private InputMap? _options; /// /// Specifies mount type specific options that are passed to the backend /// - public InputMap Options + public InputMap Options { - get => _options ?? (_options = new InputMap()); + get => _options ?? (_options = new InputMap()); set => _options = value; } @@ -824,14 +824,14 @@ public InputList DelegatedAuthAccessors public Input? Namespace { get; set; } [Input("options")] - private InputMap? _options; + private InputMap? _options; /// /// Specifies mount type specific options that are passed to the backend /// - public InputMap Options + public InputMap Options { - get => _options ?? (_options = new InputMap()); + get => _options ?? (_options = new InputMap()); set => _options = value; } diff --git a/sdk/dotnet/Mount.cs b/sdk/dotnet/Mount.cs index 6896df8ee..cb6426d98 100644 --- a/sdk/dotnet/Mount.cs +++ b/sdk/dotnet/Mount.cs @@ -70,7 +70,7 @@ namespace Pulumi.Vault /// Description = "This is an example transit secret engine mount", /// Options = /// { - /// { "convergent_encryption", false }, + /// { "convergent_encryption", "false" }, /// }, /// }); /// @@ -203,7 +203,7 @@ public partial class Mount : global::Pulumi.CustomResource /// Specifies mount type specific options that are passed to the backend /// [Output("options")] - public Output?> Options { get; private set; } = null!; + public Output?> Options { get; private set; } = null!; /// /// List of headers to allow and pass from the request to @@ -400,14 +400,14 @@ public InputList DelegatedAuthAccessors public Input? Namespace { get; set; } [Input("options")] - private InputMap? _options; + private InputMap? _options; /// /// Specifies mount type specific options that are passed to the backend /// - public InputMap Options + public InputMap Options { - get => _options ?? (_options = new InputMap()); + get => _options ?? (_options = new InputMap()); set => _options = value; } @@ -580,14 +580,14 @@ public InputList DelegatedAuthAccessors public Input? Namespace { get; set; } [Input("options")] - private InputMap? _options; + private InputMap? _options; /// /// Specifies mount type specific options that are passed to the backend /// - public InputMap Options + public InputMap Options { - get => _options ?? (_options = new InputMap()); + get => _options ?? (_options = new InputMap()); set => _options = value; } diff --git a/sdk/dotnet/Namespace.cs b/sdk/dotnet/Namespace.cs index a2ae6f17f..2f1ebac08 100644 --- a/sdk/dotnet/Namespace.cs +++ b/sdk/dotnet/Namespace.cs @@ -68,7 +68,7 @@ public partial class Namespace : global::Pulumi.CustomResource /// is `map[string]string`. Requires Vault version 1.12+. /// [Output("customMetadata")] - public Output> CustomMetadata { get; private set; } = null!; + public Output> CustomMetadata { get; private set; } = null!; /// /// The namespace to provision the resource in. @@ -145,15 +145,15 @@ public static Namespace Get(string name, Input id, NamespaceState? state public sealed class NamespaceArgs : global::Pulumi.ResourceArgs { [Input("customMetadata")] - private InputMap? _customMetadata; + private InputMap? _customMetadata; /// /// Custom metadata describing this namespace. Value type /// is `map[string]string`. Requires Vault version 1.12+. /// - public InputMap CustomMetadata + public InputMap CustomMetadata { - get => _customMetadata ?? (_customMetadata = new InputMap()); + get => _customMetadata ?? (_customMetadata = new InputMap()); set => _customMetadata = value; } @@ -188,15 +188,15 @@ public NamespaceArgs() public sealed class NamespaceState : global::Pulumi.ResourceArgs { [Input("customMetadata")] - private InputMap? _customMetadata; + private InputMap? _customMetadata; /// /// Custom metadata describing this namespace. Value type /// is `map[string]string`. Requires Vault version 1.12+. /// - public InputMap CustomMetadata + public InputMap CustomMetadata { - get => _customMetadata ?? (_customMetadata = new InputMap()); + get => _customMetadata ?? (_customMetadata = new InputMap()); set => _customMetadata = value; } diff --git a/sdk/dotnet/PkiSecret/BackendConfigEst.cs b/sdk/dotnet/PkiSecret/BackendConfigEst.cs index 393194f5b..335906689 100644 --- a/sdk/dotnet/PkiSecret/BackendConfigEst.cs +++ b/sdk/dotnet/PkiSecret/BackendConfigEst.cs @@ -74,7 +74,7 @@ public partial class BackendConfigEst : global::Pulumi.CustomResource /// Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths. /// [Output("labelToPathPolicy")] - public Output?> LabelToPathPolicy { get; private set; } = null!; + public Output?> LabelToPathPolicy { get; private set; } = null!; /// /// A read-only timestamp representing the last time the configuration was updated. @@ -189,14 +189,14 @@ public InputList AuditFields public Input? Enabled { get; set; } [Input("labelToPathPolicy")] - private InputMap? _labelToPathPolicy; + private InputMap? _labelToPathPolicy; /// /// Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths. /// - public InputMap LabelToPathPolicy + public InputMap LabelToPathPolicy { - get => _labelToPathPolicy ?? (_labelToPathPolicy = new InputMap()); + get => _labelToPathPolicy ?? (_labelToPathPolicy = new InputMap()); set => _labelToPathPolicy = value; } @@ -269,14 +269,14 @@ public InputList AuditFields public Input? Enabled { get; set; } [Input("labelToPathPolicy")] - private InputMap? _labelToPathPolicy; + private InputMap? _labelToPathPolicy; /// /// Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths. /// - public InputMap LabelToPathPolicy + public InputMap LabelToPathPolicy { - get => _labelToPathPolicy ?? (_labelToPathPolicy = new InputMap()); + get => _labelToPathPolicy ?? (_labelToPathPolicy = new InputMap()); set => _labelToPathPolicy = value; } diff --git a/sdk/dotnet/PkiSecret/GetBackendConfigEst.cs b/sdk/dotnet/PkiSecret/GetBackendConfigEst.cs index a8716e2eb..3a5200a44 100644 --- a/sdk/dotnet/PkiSecret/GetBackendConfigEst.cs +++ b/sdk/dotnet/PkiSecret/GetBackendConfigEst.cs @@ -155,7 +155,7 @@ public sealed class GetBackendConfigEstResult /// /// A pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths. /// - public readonly ImmutableDictionary LabelToPathPolicy; + public readonly ImmutableDictionary LabelToPathPolicy; /// /// A read-only timestamp representing the last time the configuration was updated. /// @@ -180,7 +180,7 @@ private GetBackendConfigEstResult( string id, - ImmutableDictionary labelToPathPolicy, + ImmutableDictionary labelToPathPolicy, string lastUpdated, diff --git a/sdk/dotnet/PkiSecret/GetBackendIssuers.cs b/sdk/dotnet/PkiSecret/GetBackendIssuers.cs index 5f9c8e7bf..0e88e429b 100644 --- a/sdk/dotnet/PkiSecret/GetBackendIssuers.cs +++ b/sdk/dotnet/PkiSecret/GetBackendIssuers.cs @@ -149,7 +149,7 @@ public sealed class GetBackendIssuersResult /// /// Map of issuer strings read from Vault. /// - public readonly ImmutableDictionary KeyInfo; + public readonly ImmutableDictionary KeyInfo; /// /// JSON-encoded issuer data read from Vault. /// @@ -166,7 +166,7 @@ private GetBackendIssuersResult( string id, - ImmutableDictionary keyInfo, + ImmutableDictionary keyInfo, string keyInfoJson, diff --git a/sdk/dotnet/PkiSecret/GetBackendKeys.cs b/sdk/dotnet/PkiSecret/GetBackendKeys.cs index 4c0c20607..1d7edcb41 100644 --- a/sdk/dotnet/PkiSecret/GetBackendKeys.cs +++ b/sdk/dotnet/PkiSecret/GetBackendKeys.cs @@ -149,7 +149,7 @@ public sealed class GetBackendKeysResult /// /// Map of key strings read from Vault. /// - public readonly ImmutableDictionary KeyInfo; + public readonly ImmutableDictionary KeyInfo; /// /// JSON-encoded key data read from Vault. /// @@ -166,7 +166,7 @@ private GetBackendKeysResult( string id, - ImmutableDictionary keyInfo, + ImmutableDictionary keyInfo, string keyInfoJson, diff --git a/sdk/dotnet/PkiSecret/Inputs/BackendConfigEstAuthenticatorsArgs.cs b/sdk/dotnet/PkiSecret/Inputs/BackendConfigEstAuthenticatorsArgs.cs index 611c56bb0..e0a60398d 100644 --- a/sdk/dotnet/PkiSecret/Inputs/BackendConfigEstAuthenticatorsArgs.cs +++ b/sdk/dotnet/PkiSecret/Inputs/BackendConfigEstAuthenticatorsArgs.cs @@ -13,26 +13,26 @@ namespace Pulumi.Vault.PkiSecret.Inputs public sealed class BackendConfigEstAuthenticatorsArgs : global::Pulumi.ResourceArgs { [Input("cert")] - private InputMap? _cert; + private InputMap? _cert; /// /// "The accessor (required) and cert_role (optional) properties for cert auth backends". /// - public InputMap Cert + public InputMap Cert { - get => _cert ?? (_cert = new InputMap()); + get => _cert ?? (_cert = new InputMap()); set => _cert = value; } [Input("userpass")] - private InputMap? _userpass; + private InputMap? _userpass; /// /// "The accessor (required) property for user pass auth backends". /// - public InputMap Userpass + public InputMap Userpass { - get => _userpass ?? (_userpass = new InputMap()); + get => _userpass ?? (_userpass = new InputMap()); set => _userpass = value; } diff --git a/sdk/dotnet/PkiSecret/Inputs/BackendConfigEstAuthenticatorsGetArgs.cs b/sdk/dotnet/PkiSecret/Inputs/BackendConfigEstAuthenticatorsGetArgs.cs index 43edacf4d..5399dc0cb 100644 --- a/sdk/dotnet/PkiSecret/Inputs/BackendConfigEstAuthenticatorsGetArgs.cs +++ b/sdk/dotnet/PkiSecret/Inputs/BackendConfigEstAuthenticatorsGetArgs.cs @@ -13,26 +13,26 @@ namespace Pulumi.Vault.PkiSecret.Inputs public sealed class BackendConfigEstAuthenticatorsGetArgs : global::Pulumi.ResourceArgs { [Input("cert")] - private InputMap? _cert; + private InputMap? _cert; /// /// "The accessor (required) and cert_role (optional) properties for cert auth backends". /// - public InputMap Cert + public InputMap Cert { - get => _cert ?? (_cert = new InputMap()); + get => _cert ?? (_cert = new InputMap()); set => _cert = value; } [Input("userpass")] - private InputMap? _userpass; + private InputMap? _userpass; /// /// "The accessor (required) property for user pass auth backends". /// - public InputMap Userpass + public InputMap Userpass { - get => _userpass ?? (_userpass = new InputMap()); + get => _userpass ?? (_userpass = new InputMap()); set => _userpass = value; } diff --git a/sdk/dotnet/PkiSecret/Outputs/BackendConfigEstAuthenticators.cs b/sdk/dotnet/PkiSecret/Outputs/BackendConfigEstAuthenticators.cs index 70511682c..4bed3fca7 100644 --- a/sdk/dotnet/PkiSecret/Outputs/BackendConfigEstAuthenticators.cs +++ b/sdk/dotnet/PkiSecret/Outputs/BackendConfigEstAuthenticators.cs @@ -16,17 +16,17 @@ public sealed class BackendConfigEstAuthenticators /// /// "The accessor (required) and cert_role (optional) properties for cert auth backends". /// - public readonly ImmutableDictionary? Cert; + public readonly ImmutableDictionary? Cert; /// /// "The accessor (required) property for user pass auth backends". /// - public readonly ImmutableDictionary? Userpass; + public readonly ImmutableDictionary? Userpass; [OutputConstructor] private BackendConfigEstAuthenticators( - ImmutableDictionary? cert, + ImmutableDictionary? cert, - ImmutableDictionary? userpass) + ImmutableDictionary? userpass) { Cert = cert; Userpass = userpass; diff --git a/sdk/dotnet/PkiSecret/Outputs/GetBackendConfigEstAuthenticatorResult.cs b/sdk/dotnet/PkiSecret/Outputs/GetBackendConfigEstAuthenticatorResult.cs index 23e030c7c..570314f42 100644 --- a/sdk/dotnet/PkiSecret/Outputs/GetBackendConfigEstAuthenticatorResult.cs +++ b/sdk/dotnet/PkiSecret/Outputs/GetBackendConfigEstAuthenticatorResult.cs @@ -16,17 +16,17 @@ public sealed class GetBackendConfigEstAuthenticatorResult /// /// "The accessor and cert_role properties for cert auth backends". /// - public readonly ImmutableDictionary? Cert; + public readonly ImmutableDictionary? Cert; /// /// "The accessor property for user pass auth backends". /// - public readonly ImmutableDictionary? Userpass; + public readonly ImmutableDictionary? Userpass; [OutputConstructor] private GetBackendConfigEstAuthenticatorResult( - ImmutableDictionary? cert, + ImmutableDictionary? cert, - ImmutableDictionary? userpass) + ImmutableDictionary? userpass) { Cert = cert; Userpass = userpass; diff --git a/sdk/dotnet/Saml/AuthBackendRole.cs b/sdk/dotnet/Saml/AuthBackendRole.cs index 58467edae..a8f4dd2a2 100644 --- a/sdk/dotnet/Saml/AuthBackendRole.cs +++ b/sdk/dotnet/Saml/AuthBackendRole.cs @@ -75,7 +75,7 @@ public partial class AuthBackendRole : global::Pulumi.CustomResource /// exist in the SAML assertion. /// [Output("boundAttributes")] - public Output?> BoundAttributes { get; private set; } = null!; + public Output?> BoundAttributes { get; private set; } = null!; /// /// The type of matching assertion to perform on @@ -225,15 +225,15 @@ public static AuthBackendRole Get(string name, Input id, AuthBackendRole public sealed class AuthBackendRoleArgs : global::Pulumi.ResourceArgs { [Input("boundAttributes")] - private InputMap? _boundAttributes; + private InputMap? _boundAttributes; /// /// Mapping of attribute names to values that are expected to /// exist in the SAML assertion. /// - public InputMap BoundAttributes + public InputMap BoundAttributes { - get => _boundAttributes ?? (_boundAttributes = new InputMap()); + get => _boundAttributes ?? (_boundAttributes = new InputMap()); set => _boundAttributes = value; } @@ -365,15 +365,15 @@ public AuthBackendRoleArgs() public sealed class AuthBackendRoleState : global::Pulumi.ResourceArgs { [Input("boundAttributes")] - private InputMap? _boundAttributes; + private InputMap? _boundAttributes; /// /// Mapping of attribute names to values that are expected to /// exist in the SAML assertion. /// - public InputMap BoundAttributes + public InputMap BoundAttributes { - get => _boundAttributes ?? (_boundAttributes = new InputMap()); + get => _boundAttributes ?? (_boundAttributes = new InputMap()); set => _boundAttributes = value; } diff --git a/sdk/dotnet/Secrets/SyncAwsDestination.cs b/sdk/dotnet/Secrets/SyncAwsDestination.cs index a00271c29..7ecdf5479 100644 --- a/sdk/dotnet/Secrets/SyncAwsDestination.cs +++ b/sdk/dotnet/Secrets/SyncAwsDestination.cs @@ -61,7 +61,7 @@ public partial class SyncAwsDestination : global::Pulumi.CustomResource /// Custom tags to set on the secret managed at the destination. /// [Output("customTags")] - public Output?> CustomTags { get; private set; } = null!; + public Output?> CustomTags { get; private set; } = null!; /// /// Optional extra protection that must match the trust policy granting access to the @@ -192,14 +192,14 @@ public sealed class SyncAwsDestinationArgs : global::Pulumi.ResourceArgs public Input? AccessKeyId { get; set; } [Input("customTags")] - private InputMap? _customTags; + private InputMap? _customTags; /// /// Custom tags to set on the secret managed at the destination. /// - public InputMap CustomTags + public InputMap CustomTags { - get => _customTags ?? (_customTags = new InputMap()); + get => _customTags ?? (_customTags = new InputMap()); set => _customTags = value; } @@ -294,14 +294,14 @@ public sealed class SyncAwsDestinationState : global::Pulumi.ResourceArgs public Input? AccessKeyId { get; set; } [Input("customTags")] - private InputMap? _customTags; + private InputMap? _customTags; /// /// Custom tags to set on the secret managed at the destination. /// - public InputMap CustomTags + public InputMap CustomTags { - get => _customTags ?? (_customTags = new InputMap()); + get => _customTags ?? (_customTags = new InputMap()); set => _customTags = value; } diff --git a/sdk/dotnet/Secrets/SyncAzureDestination.cs b/sdk/dotnet/Secrets/SyncAzureDestination.cs index 1a5ebb27d..1e54e4b06 100644 --- a/sdk/dotnet/Secrets/SyncAzureDestination.cs +++ b/sdk/dotnet/Secrets/SyncAzureDestination.cs @@ -74,7 +74,7 @@ public partial class SyncAzureDestination : global::Pulumi.CustomResource /// Custom tags to set on the secret managed at the destination. /// [Output("customTags")] - public Output?> CustomTags { get; private set; } = null!; + public Output?> CustomTags { get; private set; } = null!; /// /// Determines what level of information is synced as a distinct resource @@ -209,14 +209,14 @@ public Input? ClientSecret public Input? Cloud { get; set; } [Input("customTags")] - private InputMap? _customTags; + private InputMap? _customTags; /// /// Custom tags to set on the secret managed at the destination. /// - public InputMap CustomTags + public InputMap CustomTags { - get => _customTags ?? (_customTags = new InputMap()); + get => _customTags ?? (_customTags = new InputMap()); set => _customTags = value; } @@ -305,14 +305,14 @@ public Input? ClientSecret public Input? Cloud { get; set; } [Input("customTags")] - private InputMap? _customTags; + private InputMap? _customTags; /// /// Custom tags to set on the secret managed at the destination. /// - public InputMap CustomTags + public InputMap CustomTags { - get => _customTags ?? (_customTags = new InputMap()); + get => _customTags ?? (_customTags = new InputMap()); set => _customTags = value; } diff --git a/sdk/dotnet/Secrets/SyncGcpDestination.cs b/sdk/dotnet/Secrets/SyncGcpDestination.cs index 832e03210..b470972ce 100644 --- a/sdk/dotnet/Secrets/SyncGcpDestination.cs +++ b/sdk/dotnet/Secrets/SyncGcpDestination.cs @@ -62,7 +62,7 @@ public partial class SyncGcpDestination : global::Pulumi.CustomResource /// Custom tags to set on the secret managed at the destination. /// [Output("customTags")] - public Output?> CustomTags { get; private set; } = null!; + public Output?> CustomTags { get; private set; } = null!; /// /// Determines what level of information is synced as a distinct resource @@ -176,14 +176,14 @@ public Input? Credentials } [Input("customTags")] - private InputMap? _customTags; + private InputMap? _customTags; /// /// Custom tags to set on the secret managed at the destination. /// - public InputMap CustomTags + public InputMap CustomTags { - get => _customTags ?? (_customTags = new InputMap()); + get => _customTags ?? (_customTags = new InputMap()); set => _customTags = value; } @@ -251,14 +251,14 @@ public Input? Credentials } [Input("customTags")] - private InputMap? _customTags; + private InputMap? _customTags; /// /// Custom tags to set on the secret managed at the destination. /// - public InputMap CustomTags + public InputMap CustomTags { - get => _customTags ?? (_customTags = new InputMap()); + get => _customTags ?? (_customTags = new InputMap()); set => _customTags = value; } diff --git a/sdk/dotnet/Ssh/SecretBackendRole.cs b/sdk/dotnet/Ssh/SecretBackendRole.cs index b95464770..cf5d006f0 100644 --- a/sdk/dotnet/Ssh/SecretBackendRole.cs +++ b/sdk/dotnet/Ssh/SecretBackendRole.cs @@ -157,13 +157,13 @@ public partial class SecretBackendRole : global::Pulumi.CustomResource /// Specifies a map of critical options that certificates have when signed. /// [Output("defaultCriticalOptions")] - public Output?> DefaultCriticalOptions { get; private set; } = null!; + public Output?> DefaultCriticalOptions { get; private set; } = null!; /// /// Specifies a map of extensions that certificates have when signed. /// [Output("defaultExtensions")] - public Output?> DefaultExtensions { get; private set; } = null!; + public Output?> DefaultExtensions { get; private set; } = null!; /// /// Specifies the default username for which a credential will be generated. @@ -368,26 +368,26 @@ public InputList AllowedUserKe public Input? CidrList { get; set; } [Input("defaultCriticalOptions")] - private InputMap? _defaultCriticalOptions; + private InputMap? _defaultCriticalOptions; /// /// Specifies a map of critical options that certificates have when signed. /// - public InputMap DefaultCriticalOptions + public InputMap DefaultCriticalOptions { - get => _defaultCriticalOptions ?? (_defaultCriticalOptions = new InputMap()); + get => _defaultCriticalOptions ?? (_defaultCriticalOptions = new InputMap()); set => _defaultCriticalOptions = value; } [Input("defaultExtensions")] - private InputMap? _defaultExtensions; + private InputMap? _defaultExtensions; /// /// Specifies a map of extensions that certificates have when signed. /// - public InputMap DefaultExtensions + public InputMap DefaultExtensions { - get => _defaultExtensions ?? (_defaultExtensions = new InputMap()); + get => _defaultExtensions ?? (_defaultExtensions = new InputMap()); set => _defaultExtensions = value; } @@ -556,26 +556,26 @@ public InputList AllowedUse public Input? CidrList { get; set; } [Input("defaultCriticalOptions")] - private InputMap? _defaultCriticalOptions; + private InputMap? _defaultCriticalOptions; /// /// Specifies a map of critical options that certificates have when signed. /// - public InputMap DefaultCriticalOptions + public InputMap DefaultCriticalOptions { - get => _defaultCriticalOptions ?? (_defaultCriticalOptions = new InputMap()); + get => _defaultCriticalOptions ?? (_defaultCriticalOptions = new InputMap()); set => _defaultCriticalOptions = value; } [Input("defaultExtensions")] - private InputMap? _defaultExtensions; + private InputMap? _defaultExtensions; /// /// Specifies a map of extensions that certificates have when signed. /// - public InputMap DefaultExtensions + public InputMap DefaultExtensions { - get => _defaultExtensions ?? (_defaultExtensions = new InputMap()); + get => _defaultExtensions ?? (_defaultExtensions = new InputMap()); set => _defaultExtensions = value; } diff --git a/sdk/dotnet/Transform/GetDecode.cs b/sdk/dotnet/Transform/GetDecode.cs index 9936f52ee..878b7311a 100644 --- a/sdk/dotnet/Transform/GetDecode.cs +++ b/sdk/dotnet/Transform/GetDecode.cs @@ -130,26 +130,26 @@ public static Output Invoke(GetDecodeInvokeArgs args, InvokeOpt public sealed class GetDecodeArgs : global::Pulumi.InvokeArgs { [Input("batchInputs")] - private List>? _batchInputs; + private List>? _batchInputs; /// /// Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. /// - public List> BatchInputs + public List> BatchInputs { - get => _batchInputs ?? (_batchInputs = new List>()); + get => _batchInputs ?? (_batchInputs = new List>()); set => _batchInputs = value; } [Input("batchResults")] - private List>? _batchResults; + private List>? _batchResults; /// /// The result of decoding a batch. /// - public List> BatchResults + public List> BatchResults { - get => _batchResults ?? (_batchResults = new List>()); + get => _batchResults ?? (_batchResults = new List>()); set => _batchResults = value; } @@ -207,26 +207,26 @@ public GetDecodeArgs() public sealed class GetDecodeInvokeArgs : global::Pulumi.InvokeArgs { [Input("batchInputs")] - private InputList>? _batchInputs; + private InputList>? _batchInputs; /// /// Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. /// - public InputList> BatchInputs + public InputList> BatchInputs { - get => _batchInputs ?? (_batchInputs = new InputList>()); + get => _batchInputs ?? (_batchInputs = new InputList>()); set => _batchInputs = value; } [Input("batchResults")] - private InputList>? _batchResults; + private InputList>? _batchResults; /// /// The result of decoding a batch. /// - public InputList> BatchResults + public InputList> BatchResults { - get => _batchResults ?? (_batchResults = new InputList>()); + get => _batchResults ?? (_batchResults = new InputList>()); set => _batchResults = value; } @@ -285,8 +285,8 @@ public GetDecodeInvokeArgs() [OutputType] public sealed class GetDecodeResult { - public readonly ImmutableArray> BatchInputs; - public readonly ImmutableArray> BatchResults; + public readonly ImmutableArray> BatchInputs; + public readonly ImmutableArray> BatchResults; public readonly string DecodedValue; /// /// The provider-assigned unique ID for this managed resource. @@ -301,9 +301,9 @@ public sealed class GetDecodeResult [OutputConstructor] private GetDecodeResult( - ImmutableArray> batchInputs, + ImmutableArray> batchInputs, - ImmutableArray> batchResults, + ImmutableArray> batchResults, string decodedValue, diff --git a/sdk/dotnet/Transform/GetEncode.cs b/sdk/dotnet/Transform/GetEncode.cs index 23bf6062a..26875e8fe 100644 --- a/sdk/dotnet/Transform/GetEncode.cs +++ b/sdk/dotnet/Transform/GetEncode.cs @@ -142,26 +142,26 @@ public static Output Invoke(GetEncodeInvokeArgs args, InvokeOpt public sealed class GetEncodeArgs : global::Pulumi.InvokeArgs { [Input("batchInputs")] - private List>? _batchInputs; + private List>? _batchInputs; /// /// Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. /// - public List> BatchInputs + public List> BatchInputs { - get => _batchInputs ?? (_batchInputs = new List>()); + get => _batchInputs ?? (_batchInputs = new List>()); set => _batchInputs = value; } [Input("batchResults")] - private List>? _batchResults; + private List>? _batchResults; /// /// The result of encoding a batch. /// - public List> BatchResults + public List> BatchResults { - get => _batchResults ?? (_batchResults = new List>()); + get => _batchResults ?? (_batchResults = new List>()); set => _batchResults = value; } @@ -219,26 +219,26 @@ public GetEncodeArgs() public sealed class GetEncodeInvokeArgs : global::Pulumi.InvokeArgs { [Input("batchInputs")] - private InputList>? _batchInputs; + private InputList>? _batchInputs; /// /// Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. /// - public InputList> BatchInputs + public InputList> BatchInputs { - get => _batchInputs ?? (_batchInputs = new InputList>()); + get => _batchInputs ?? (_batchInputs = new InputList>()); set => _batchInputs = value; } [Input("batchResults")] - private InputList>? _batchResults; + private InputList>? _batchResults; /// /// The result of encoding a batch. /// - public InputList> BatchResults + public InputList> BatchResults { - get => _batchResults ?? (_batchResults = new InputList>()); + get => _batchResults ?? (_batchResults = new InputList>()); set => _batchResults = value; } @@ -297,8 +297,8 @@ public GetEncodeInvokeArgs() [OutputType] public sealed class GetEncodeResult { - public readonly ImmutableArray> BatchInputs; - public readonly ImmutableArray> BatchResults; + public readonly ImmutableArray> BatchInputs; + public readonly ImmutableArray> BatchResults; public readonly string EncodedValue; /// /// The provider-assigned unique ID for this managed resource. @@ -313,9 +313,9 @@ public sealed class GetEncodeResult [OutputConstructor] private GetEncodeResult( - ImmutableArray> batchInputs, + ImmutableArray> batchInputs, - ImmutableArray> batchResults, + ImmutableArray> batchResults, string encodedValue, diff --git a/sdk/dotnet/Transform/Template.cs b/sdk/dotnet/Transform/Template.cs index 4d7546c1b..b7d899a0c 100644 --- a/sdk/dotnet/Transform/Template.cs +++ b/sdk/dotnet/Transform/Template.cs @@ -79,7 +79,7 @@ public partial class Template : global::Pulumi.CustomResource /// the decoded output. (requires Vault Enterprise 1.9+) /// [Output("decodeFormats")] - public Output?> DecodeFormats { get; private set; } = null!; + public Output?> DecodeFormats { get; private set; } = null!; /// /// The regular expression template used to format encoded values. @@ -174,15 +174,15 @@ public sealed class TemplateArgs : global::Pulumi.ResourceArgs public Input? Alphabet { get; set; } [Input("decodeFormats")] - private InputMap? _decodeFormats; + private InputMap? _decodeFormats; /// /// Optional mapping of name to regular expression template, used to customize /// the decoded output. (requires Vault Enterprise 1.9+) /// - public InputMap DecodeFormats + public InputMap DecodeFormats { - get => _decodeFormats ?? (_decodeFormats = new InputMap()); + get => _decodeFormats ?? (_decodeFormats = new InputMap()); set => _decodeFormats = value; } @@ -241,15 +241,15 @@ public sealed class TemplateState : global::Pulumi.ResourceArgs public Input? Alphabet { get; set; } [Input("decodeFormats")] - private InputMap? _decodeFormats; + private InputMap? _decodeFormats; /// /// Optional mapping of name to regular expression template, used to customize /// the decoded output. (requires Vault Enterprise 1.9+) /// - public InputMap DecodeFormats + public InputMap DecodeFormats { - get => _decodeFormats ?? (_decodeFormats = new InputMap()); + get => _decodeFormats ?? (_decodeFormats = new InputMap()); set => _decodeFormats = value; } diff --git a/sdk/dotnet/Transit/SecretBackendKey.cs b/sdk/dotnet/Transit/SecretBackendKey.cs index b8b4d159e..c6a5add91 100644 --- a/sdk/dotnet/Transit/SecretBackendKey.cs +++ b/sdk/dotnet/Transit/SecretBackendKey.cs @@ -107,7 +107,7 @@ public partial class SecretBackendKey : global::Pulumi.CustomResource /// * for key types `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `rsa-2048`, `rsa-3072` and `rsa-4096`, each key version will be a map of the following: /// [Output("keys")] - public Output>> Keys { get; private set; } = null!; + public Output>> Keys { get; private set; } = null!; /// /// Latest key version available. This value is 1-indexed, so if `latest_version` is `1`, then the key's information can be referenced from `keys` by selecting element `0` @@ -368,16 +368,16 @@ public sealed class SecretBackendKeyState : global::Pulumi.ResourceArgs public Input? KeySize { get; set; } [Input("keys")] - private InputList>? _keys; + private InputList>? _keys; /// /// List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the `type` of the encryption key. /// * for key types `aes128-gcm96`, `aes256-gcm96` and `chacha20-poly1305`, each key version will be a map of a single value `id` which is just a hash of the key's metadata. /// * for key types `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `rsa-2048`, `rsa-3072` and `rsa-4096`, each key version will be a map of the following: /// - public InputList> Keys + public InputList> Keys { - get => _keys ?? (_keys = new InputList>()); + get => _keys ?? (_keys = new InputList>()); set => _keys = value; } diff --git a/sdk/dotnet/kv/GetSecret.cs b/sdk/dotnet/kv/GetSecret.cs index ab1310464..99843d003 100644 --- a/sdk/dotnet/kv/GetSecret.cs +++ b/sdk/dotnet/kv/GetSecret.cs @@ -165,7 +165,7 @@ public sealed class GetSecretResult /// represent string data, so any non-string values returned from Vault are /// serialized as JSON. /// - public readonly ImmutableDictionary Data; + public readonly ImmutableDictionary Data; /// /// JSON-encoded string that that is /// read as the secret data at the given path. @@ -194,7 +194,7 @@ public sealed class GetSecretResult [OutputConstructor] private GetSecretResult( - ImmutableDictionary data, + ImmutableDictionary data, string dataJson, diff --git a/sdk/dotnet/kv/GetSecretSubkeysV2.cs b/sdk/dotnet/kv/GetSecretSubkeysV2.cs index 572fe21a8..36d6c8d53 100644 --- a/sdk/dotnet/kv/GetSecretSubkeysV2.cs +++ b/sdk/dotnet/kv/GetSecretSubkeysV2.cs @@ -216,7 +216,7 @@ public sealed class GetSecretSubkeysV2Result /// /// Subkeys for the KV-V2 secret stored as a serialized map of strings. /// - public readonly ImmutableDictionary Data; + public readonly ImmutableDictionary Data; /// /// Subkeys for the KV-V2 secret read from Vault. /// @@ -237,7 +237,7 @@ public sealed class GetSecretSubkeysV2Result [OutputConstructor] private GetSecretSubkeysV2Result( - ImmutableDictionary data, + ImmutableDictionary data, string dataJson, diff --git a/sdk/dotnet/kv/GetSecretV2.cs b/sdk/dotnet/kv/GetSecretV2.cs index 4667771d7..e75ccf353 100644 --- a/sdk/dotnet/kv/GetSecretV2.cs +++ b/sdk/dotnet/kv/GetSecretV2.cs @@ -204,14 +204,14 @@ public sealed class GetSecretV2Result /// /// Custom metadata for the secret. /// - public readonly ImmutableDictionary CustomMetadata; + public readonly ImmutableDictionary CustomMetadata; /// /// A mapping whose keys are the top-level data keys returned from /// Vault and whose values are the corresponding values. This map can only /// represent string data, so any non-string values returned from Vault are /// serialized as JSON. /// - public readonly ImmutableDictionary Data; + public readonly ImmutableDictionary Data; /// /// JSON-encoded string that that is /// read as the secret data at the given path. @@ -245,9 +245,9 @@ public sealed class GetSecretV2Result private GetSecretV2Result( string createdTime, - ImmutableDictionary customMetadata, + ImmutableDictionary customMetadata, - ImmutableDictionary data, + ImmutableDictionary data, string dataJson, diff --git a/sdk/dotnet/kv/Inputs/SecretV2CustomMetadataArgs.cs b/sdk/dotnet/kv/Inputs/SecretV2CustomMetadataArgs.cs index 7e18654e7..e6d8cfa70 100644 --- a/sdk/dotnet/kv/Inputs/SecretV2CustomMetadataArgs.cs +++ b/sdk/dotnet/kv/Inputs/SecretV2CustomMetadataArgs.cs @@ -19,7 +19,7 @@ public sealed class SecretV2CustomMetadataArgs : global::Pulumi.ResourceArgs public Input? CasRequired { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A mapping whose keys are the top-level data keys returned from @@ -27,9 +27,9 @@ public sealed class SecretV2CustomMetadataArgs : global::Pulumi.ResourceArgs /// represent string data, so any non-string values returned from Vault are /// serialized as JSON. /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/kv/Inputs/SecretV2CustomMetadataGetArgs.cs b/sdk/dotnet/kv/Inputs/SecretV2CustomMetadataGetArgs.cs index 5b72cdfd9..ed2d820bd 100644 --- a/sdk/dotnet/kv/Inputs/SecretV2CustomMetadataGetArgs.cs +++ b/sdk/dotnet/kv/Inputs/SecretV2CustomMetadataGetArgs.cs @@ -19,7 +19,7 @@ public sealed class SecretV2CustomMetadataGetArgs : global::Pulumi.ResourceArgs public Input? CasRequired { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A mapping whose keys are the top-level data keys returned from @@ -27,9 +27,9 @@ public sealed class SecretV2CustomMetadataGetArgs : global::Pulumi.ResourceArgs /// represent string data, so any non-string values returned from Vault are /// serialized as JSON. /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set => _data = value; } diff --git a/sdk/dotnet/kv/Outputs/SecretV2CustomMetadata.cs b/sdk/dotnet/kv/Outputs/SecretV2CustomMetadata.cs index 92a660901..46f964534 100644 --- a/sdk/dotnet/kv/Outputs/SecretV2CustomMetadata.cs +++ b/sdk/dotnet/kv/Outputs/SecretV2CustomMetadata.cs @@ -23,7 +23,7 @@ public sealed class SecretV2CustomMetadata /// represent string data, so any non-string values returned from Vault are /// serialized as JSON. /// - public readonly ImmutableDictionary? Data; + public readonly ImmutableDictionary? Data; /// /// If set, specifies the length of time before a version is deleted. /// @@ -37,7 +37,7 @@ public sealed class SecretV2CustomMetadata private SecretV2CustomMetadata( bool? casRequired, - ImmutableDictionary? data, + ImmutableDictionary? data, int? deleteVersionAfter, diff --git a/sdk/dotnet/kv/Secret.cs b/sdk/dotnet/kv/Secret.cs index 4075b90de..f1b731ff7 100644 --- a/sdk/dotnet/kv/Secret.cs +++ b/sdk/dotnet/kv/Secret.cs @@ -75,7 +75,7 @@ public partial class Secret : global::Pulumi.CustomResource /// serialized as JSON. /// [Output("data")] - public Output> Data { get; private set; } = null!; + public Output> Data { get; private set; } = null!; /// /// JSON-encoded string that will be @@ -191,7 +191,7 @@ public SecretArgs() public sealed class SecretState : global::Pulumi.ResourceArgs { [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A mapping whose keys are the top-level data keys returned from @@ -199,12 +199,12 @@ public sealed class SecretState : global::Pulumi.ResourceArgs /// represent string data, so any non-string values returned from Vault are /// serialized as JSON. /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set { - var emptySecret = Output.CreateSecret(ImmutableDictionary.Create()); + var emptySecret = Output.CreateSecret(ImmutableDictionary.Create()); _data = Output.All(value, emptySecret).Apply(v => v[0]); } } diff --git a/sdk/dotnet/kv/SecretV2.cs b/sdk/dotnet/kv/SecretV2.cs index cef8eb996..857769f05 100644 --- a/sdk/dotnet/kv/SecretV2.cs +++ b/sdk/dotnet/kv/SecretV2.cs @@ -116,7 +116,7 @@ public partial class SecretV2 : global::Pulumi.CustomResource /// serialized as JSON. /// [Output("data")] - public Output> Data { get; private set; } = null!; + public Output> Data { get; private set; } = null!; /// /// JSON-encoded string that will be @@ -143,7 +143,7 @@ public partial class SecretV2 : global::Pulumi.CustomResource /// Metadata associated with this secret read from Vault. /// [Output("metadata")] - public Output> Metadata { get; private set; } = null!; + public Output> Metadata { get; private set; } = null!; /// /// Path where KV-V2 engine is mounted. @@ -173,7 +173,7 @@ public partial class SecretV2 : global::Pulumi.CustomResource /// An object that holds option settings. /// [Output("options")] - public Output?> Options { get; private set; } = null!; + public Output?> Options { get; private set; } = null!; /// /// Full path where the KV-V2 secret will be written. @@ -305,14 +305,14 @@ public Input? DataJson public Input? Namespace { get; set; } [Input("options")] - private InputMap? _options; + private InputMap? _options; /// /// An object that holds option settings. /// - public InputMap Options + public InputMap Options { - get => _options ?? (_options = new InputMap()); + get => _options ?? (_options = new InputMap()); set => _options = value; } @@ -342,7 +342,7 @@ public sealed class SecretV2State : global::Pulumi.ResourceArgs public Input? CustomMetadata { get; set; } [Input("data")] - private InputMap? _data; + private InputMap? _data; /// /// A mapping whose keys are the top-level data keys returned from @@ -350,12 +350,12 @@ public sealed class SecretV2State : global::Pulumi.ResourceArgs /// represent string data, so any non-string values returned from Vault are /// serialized as JSON. /// - public InputMap Data + public InputMap Data { - get => _data ?? (_data = new InputMap()); + get => _data ?? (_data = new InputMap()); set { - var emptySecret = Output.CreateSecret(ImmutableDictionary.Create()); + var emptySecret = Output.CreateSecret(ImmutableDictionary.Create()); _data = Output.All(value, emptySecret).Apply(v => v[0]); } } @@ -392,14 +392,14 @@ public Input? DataJson public Input? DisableRead { get; set; } [Input("metadata")] - private InputMap? _metadata; + private InputMap? _metadata; /// /// Metadata associated with this secret read from Vault. /// - public InputMap Metadata + public InputMap Metadata { - get => _metadata ?? (_metadata = new InputMap()); + get => _metadata ?? (_metadata = new InputMap()); set => _metadata = value; } @@ -428,14 +428,14 @@ public InputMap Metadata public Input? Namespace { get; set; } [Input("options")] - private InputMap? _options; + private InputMap? _options; /// /// An object that holds option settings. /// - public InputMap Options + public InputMap Options { - get => _options ?? (_options = new InputMap()); + get => _options ?? (_options = new InputMap()); set => _options = value; } diff --git a/sdk/go/vault/aws/authBackendLogin.go b/sdk/go/vault/aws/authBackendLogin.go index 2a33f2ac0..c131803eb 100644 --- a/sdk/go/vault/aws/authBackendLogin.go +++ b/sdk/go/vault/aws/authBackendLogin.go @@ -48,7 +48,7 @@ type AuthBackendLogin struct { LeaseStartTime pulumi.StringOutput `pulumi:"leaseStartTime"` // A map of information returned by the Vault server about the // authentication used to generate this token. - Metadata pulumi.MapOutput `pulumi:"metadata"` + Metadata pulumi.StringMapOutput `pulumi:"metadata"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace). @@ -140,7 +140,7 @@ type authBackendLoginState struct { LeaseStartTime *string `pulumi:"leaseStartTime"` // A map of information returned by the Vault server about the // authentication used to generate this token. - Metadata map[string]interface{} `pulumi:"metadata"` + Metadata map[string]string `pulumi:"metadata"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace). @@ -199,7 +199,7 @@ type AuthBackendLoginState struct { LeaseStartTime pulumi.StringPtrInput // A map of information returned by the Vault server about the // authentication used to generate this token. - Metadata pulumi.MapInput + Metadata pulumi.StringMapInput // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace). @@ -466,8 +466,8 @@ func (o AuthBackendLoginOutput) LeaseStartTime() pulumi.StringOutput { // A map of information returned by the Vault server about the // authentication used to generate this token. -func (o AuthBackendLoginOutput) Metadata() pulumi.MapOutput { - return o.ApplyT(func(v *AuthBackendLogin) pulumi.MapOutput { return v.Metadata }).(pulumi.MapOutput) +func (o AuthBackendLoginOutput) Metadata() pulumi.StringMapOutput { + return o.ApplyT(func(v *AuthBackendLogin) pulumi.StringMapOutput { return v.Metadata }).(pulumi.StringMapOutput) } // The namespace to provision the resource in. diff --git a/sdk/go/vault/config/uiCustomMessage.go b/sdk/go/vault/config/uiCustomMessage.go index f470d0cc2..ebbf5622d 100644 --- a/sdk/go/vault/config/uiCustomMessage.go +++ b/sdk/go/vault/config/uiCustomMessage.go @@ -26,7 +26,7 @@ type UiCustomMessage struct { // Target namespace. (requires Enterprise) Namespace pulumi.StringPtrOutput `pulumi:"namespace"` // A map containing additional options for the custom message - Options pulumi.MapOutput `pulumi:"options"` + Options pulumi.StringMapOutput `pulumi:"options"` // The starting time of the active period of the custom message StartTime pulumi.StringOutput `pulumi:"startTime"` // The title of the custom message @@ -85,7 +85,7 @@ type uiCustomMessageState struct { // Target namespace. (requires Enterprise) Namespace *string `pulumi:"namespace"` // A map containing additional options for the custom message - Options map[string]interface{} `pulumi:"options"` + Options map[string]string `pulumi:"options"` // The starting time of the active period of the custom message StartTime *string `pulumi:"startTime"` // The title of the custom message @@ -106,7 +106,7 @@ type UiCustomMessageState struct { // Target namespace. (requires Enterprise) Namespace pulumi.StringPtrInput // A map containing additional options for the custom message - Options pulumi.MapInput + Options pulumi.StringMapInput // The starting time of the active period of the custom message StartTime pulumi.StringPtrInput // The title of the custom message @@ -131,7 +131,7 @@ type uiCustomMessageArgs struct { // Target namespace. (requires Enterprise) Namespace *string `pulumi:"namespace"` // A map containing additional options for the custom message - Options map[string]interface{} `pulumi:"options"` + Options map[string]string `pulumi:"options"` // The starting time of the active period of the custom message StartTime string `pulumi:"startTime"` // The title of the custom message @@ -153,7 +153,7 @@ type UiCustomMessageArgs struct { // Target namespace. (requires Enterprise) Namespace pulumi.StringPtrInput // A map containing additional options for the custom message - Options pulumi.MapInput + Options pulumi.StringMapInput // The starting time of the active period of the custom message StartTime pulumi.StringInput // The title of the custom message @@ -275,8 +275,8 @@ func (o UiCustomMessageOutput) Namespace() pulumi.StringPtrOutput { } // A map containing additional options for the custom message -func (o UiCustomMessageOutput) Options() pulumi.MapOutput { - return o.ApplyT(func(v *UiCustomMessage) pulumi.MapOutput { return v.Options }).(pulumi.MapOutput) +func (o UiCustomMessageOutput) Options() pulumi.StringMapOutput { + return o.ApplyT(func(v *UiCustomMessage) pulumi.StringMapOutput { return v.Options }).(pulumi.StringMapOutput) } // The starting time of the active period of the custom message diff --git a/sdk/go/vault/database/pulumiTypes.go b/sdk/go/vault/database/pulumiTypes.go index 0f4325ed8..d2616de5e 100644 --- a/sdk/go/vault/database/pulumiTypes.go +++ b/sdk/go/vault/database/pulumiTypes.go @@ -5053,7 +5053,7 @@ type SecretsMountCassandra struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data map[string]interface{} `pulumi:"data"` + Data map[string]string `pulumi:"data"` // Cassandra hosts to connect to. Hosts []string `pulumi:"hosts"` // Whether to skip verification of the server certificate when using TLS. @@ -5103,7 +5103,7 @@ type SecretsMountCassandraArgs struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data pulumi.MapInput `pulumi:"data"` + Data pulumi.StringMapInput `pulumi:"data"` // Cassandra hosts to connect to. Hosts pulumi.StringArrayInput `pulumi:"hosts"` // Whether to skip verification of the server certificate when using TLS. @@ -5198,8 +5198,8 @@ func (o SecretsMountCassandraOutput) ConnectTimeout() pulumi.IntPtrOutput { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: -func (o SecretsMountCassandraOutput) Data() pulumi.MapOutput { - return o.ApplyT(func(v SecretsMountCassandra) map[string]interface{} { return v.Data }).(pulumi.MapOutput) +func (o SecretsMountCassandraOutput) Data() pulumi.StringMapOutput { + return o.ApplyT(func(v SecretsMountCassandra) map[string]string { return v.Data }).(pulumi.StringMapOutput) } // Cassandra hosts to connect to. @@ -5299,7 +5299,7 @@ type SecretsMountCouchbase struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data map[string]interface{} `pulumi:"data"` + Data map[string]string `pulumi:"data"` // A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. Hosts []string `pulumi:"hosts"` // Specifies whether to skip verification of the server certificate when using TLS. @@ -5345,7 +5345,7 @@ type SecretsMountCouchbaseArgs struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data pulumi.MapInput `pulumi:"data"` + Data pulumi.StringMapInput `pulumi:"data"` // A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. Hosts pulumi.StringArrayInput `pulumi:"hosts"` // Specifies whether to skip verification of the server certificate when using TLS. @@ -5439,8 +5439,8 @@ func (o SecretsMountCouchbaseOutput) BucketName() pulumi.StringPtrOutput { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: -func (o SecretsMountCouchbaseOutput) Data() pulumi.MapOutput { - return o.ApplyT(func(v SecretsMountCouchbase) map[string]interface{} { return v.Data }).(pulumi.MapOutput) +func (o SecretsMountCouchbaseOutput) Data() pulumi.StringMapOutput { + return o.ApplyT(func(v SecretsMountCouchbase) map[string]string { return v.Data }).(pulumi.StringMapOutput) } // A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. @@ -5529,7 +5529,7 @@ type SecretsMountElasticsearch struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data map[string]interface{} `pulumi:"data"` + Data map[string]string `pulumi:"data"` // Whether to disable certificate verification Insecure *bool `pulumi:"insecure"` // Name of the database connection. @@ -5579,7 +5579,7 @@ type SecretsMountElasticsearchArgs struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data pulumi.MapInput `pulumi:"data"` + Data pulumi.StringMapInput `pulumi:"data"` // Whether to disable certificate verification Insecure pulumi.BoolPtrInput `pulumi:"insecure"` // Name of the database connection. @@ -5683,8 +5683,8 @@ func (o SecretsMountElasticsearchOutput) ClientKey() pulumi.StringPtrOutput { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: -func (o SecretsMountElasticsearchOutput) Data() pulumi.MapOutput { - return o.ApplyT(func(v SecretsMountElasticsearch) map[string]interface{} { return v.Data }).(pulumi.MapOutput) +func (o SecretsMountElasticsearchOutput) Data() pulumi.StringMapOutput { + return o.ApplyT(func(v SecretsMountElasticsearch) map[string]string { return v.Data }).(pulumi.StringMapOutput) } // Whether to disable certificate verification @@ -5767,7 +5767,7 @@ type SecretsMountHana struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data map[string]interface{} `pulumi:"data"` + Data map[string]string `pulumi:"data"` // Disable special character escaping in username and password DisableEscaping *bool `pulumi:"disableEscaping"` // Maximum number of seconds a connection may be reused. @@ -5811,7 +5811,7 @@ type SecretsMountHanaArgs struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data pulumi.MapInput `pulumi:"data"` + Data pulumi.StringMapInput `pulumi:"data"` // Disable special character escaping in username and password DisableEscaping pulumi.BoolPtrInput `pulumi:"disableEscaping"` // Maximum number of seconds a connection may be reused. @@ -5900,8 +5900,8 @@ func (o SecretsMountHanaOutput) ConnectionUrl() pulumi.StringPtrOutput { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: -func (o SecretsMountHanaOutput) Data() pulumi.MapOutput { - return o.ApplyT(func(v SecretsMountHana) map[string]interface{} { return v.Data }).(pulumi.MapOutput) +func (o SecretsMountHanaOutput) Data() pulumi.StringMapOutput { + return o.ApplyT(func(v SecretsMountHana) map[string]string { return v.Data }).(pulumi.StringMapOutput) } // Disable special character escaping in username and password @@ -5984,7 +5984,7 @@ type SecretsMountInfluxdb struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data map[string]interface{} `pulumi:"data"` + Data map[string]string `pulumi:"data"` // Influxdb host to connect to. Host string `pulumi:"host"` // Whether to skip verification of the server certificate when using TLS. @@ -6034,7 +6034,7 @@ type SecretsMountInfluxdbArgs struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data pulumi.MapInput `pulumi:"data"` + Data pulumi.StringMapInput `pulumi:"data"` // Influxdb host to connect to. Host pulumi.StringInput `pulumi:"host"` // Whether to skip verification of the server certificate when using TLS. @@ -6129,8 +6129,8 @@ func (o SecretsMountInfluxdbOutput) ConnectTimeout() pulumi.IntPtrOutput { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: -func (o SecretsMountInfluxdbOutput) Data() pulumi.MapOutput { - return o.ApplyT(func(v SecretsMountInfluxdb) map[string]interface{} { return v.Data }).(pulumi.MapOutput) +func (o SecretsMountInfluxdbOutput) Data() pulumi.StringMapOutput { + return o.ApplyT(func(v SecretsMountInfluxdb) map[string]string { return v.Data }).(pulumi.StringMapOutput) } // Influxdb host to connect to. @@ -6228,7 +6228,7 @@ type SecretsMountMongodb struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data map[string]interface{} `pulumi:"data"` + Data map[string]string `pulumi:"data"` // Maximum number of seconds a connection may be reused. MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"` // Maximum number of idle connections to the database. @@ -6272,7 +6272,7 @@ type SecretsMountMongodbArgs struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data pulumi.MapInput `pulumi:"data"` + Data pulumi.StringMapInput `pulumi:"data"` // Maximum number of seconds a connection may be reused. MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"` // Maximum number of idle connections to the database. @@ -6361,8 +6361,8 @@ func (o SecretsMountMongodbOutput) ConnectionUrl() pulumi.StringPtrOutput { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: -func (o SecretsMountMongodbOutput) Data() pulumi.MapOutput { - return o.ApplyT(func(v SecretsMountMongodb) map[string]interface{} { return v.Data }).(pulumi.MapOutput) +func (o SecretsMountMongodbOutput) Data() pulumi.StringMapOutput { + return o.ApplyT(func(v SecretsMountMongodb) map[string]string { return v.Data }).(pulumi.StringMapOutput) } // Maximum number of seconds a connection may be reused. @@ -6443,7 +6443,7 @@ type SecretsMountMongodbatla struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data map[string]interface{} `pulumi:"data"` + Data map[string]string `pulumi:"data"` // Name of the database connection. Name string `pulumi:"name"` // Specifies the name of the plugin to use. @@ -6479,7 +6479,7 @@ type SecretsMountMongodbatlaArgs struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data pulumi.MapInput `pulumi:"data"` + Data pulumi.StringMapInput `pulumi:"data"` // Name of the database connection. Name pulumi.StringInput `pulumi:"name"` // Specifies the name of the plugin to use. @@ -6557,8 +6557,8 @@ func (o SecretsMountMongodbatlaOutput) AllowedRoles() pulumi.StringArrayOutput { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: -func (o SecretsMountMongodbatlaOutput) Data() pulumi.MapOutput { - return o.ApplyT(func(v SecretsMountMongodbatla) map[string]interface{} { return v.Data }).(pulumi.MapOutput) +func (o SecretsMountMongodbatlaOutput) Data() pulumi.StringMapOutput { + return o.ApplyT(func(v SecretsMountMongodbatla) map[string]string { return v.Data }).(pulumi.StringMapOutput) } // Name of the database connection. @@ -6628,7 +6628,7 @@ type SecretsMountMssql struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data map[string]interface{} `pulumi:"data"` + Data map[string]string `pulumi:"data"` // Disable special character escaping in username and password DisableEscaping *bool `pulumi:"disableEscaping"` // Maximum number of seconds a connection may be reused. @@ -6676,7 +6676,7 @@ type SecretsMountMssqlArgs struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data pulumi.MapInput `pulumi:"data"` + Data pulumi.StringMapInput `pulumi:"data"` // Disable special character escaping in username and password DisableEscaping pulumi.BoolPtrInput `pulumi:"disableEscaping"` // Maximum number of seconds a connection may be reused. @@ -6772,8 +6772,8 @@ func (o SecretsMountMssqlOutput) ContainedDb() pulumi.BoolPtrOutput { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: -func (o SecretsMountMssqlOutput) Data() pulumi.MapOutput { - return o.ApplyT(func(v SecretsMountMssql) map[string]interface{} { return v.Data }).(pulumi.MapOutput) +func (o SecretsMountMssqlOutput) Data() pulumi.StringMapOutput { + return o.ApplyT(func(v SecretsMountMssql) map[string]string { return v.Data }).(pulumi.StringMapOutput) } // Disable special character escaping in username and password @@ -6863,7 +6863,7 @@ type SecretsMountMysql struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data map[string]interface{} `pulumi:"data"` + Data map[string]string `pulumi:"data"` // Maximum number of seconds a connection may be reused. MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"` // Maximum number of idle connections to the database. @@ -6915,7 +6915,7 @@ type SecretsMountMysqlArgs struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data pulumi.MapInput `pulumi:"data"` + Data pulumi.StringMapInput `pulumi:"data"` // Maximum number of seconds a connection may be reused. MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"` // Maximum number of idle connections to the database. @@ -7015,8 +7015,8 @@ func (o SecretsMountMysqlOutput) ConnectionUrl() pulumi.StringPtrOutput { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: -func (o SecretsMountMysqlOutput) Data() pulumi.MapOutput { - return o.ApplyT(func(v SecretsMountMysql) map[string]interface{} { return v.Data }).(pulumi.MapOutput) +func (o SecretsMountMysqlOutput) Data() pulumi.StringMapOutput { + return o.ApplyT(func(v SecretsMountMysql) map[string]string { return v.Data }).(pulumi.StringMapOutput) } // Maximum number of seconds a connection may be reused. @@ -7116,7 +7116,7 @@ type SecretsMountMysqlAurora struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data map[string]interface{} `pulumi:"data"` + Data map[string]string `pulumi:"data"` // Maximum number of seconds a connection may be reused. MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"` // Maximum number of idle connections to the database. @@ -7168,7 +7168,7 @@ type SecretsMountMysqlAuroraArgs struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data pulumi.MapInput `pulumi:"data"` + Data pulumi.StringMapInput `pulumi:"data"` // Maximum number of seconds a connection may be reused. MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"` // Maximum number of idle connections to the database. @@ -7268,8 +7268,8 @@ func (o SecretsMountMysqlAuroraOutput) ConnectionUrl() pulumi.StringPtrOutput { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: -func (o SecretsMountMysqlAuroraOutput) Data() pulumi.MapOutput { - return o.ApplyT(func(v SecretsMountMysqlAurora) map[string]interface{} { return v.Data }).(pulumi.MapOutput) +func (o SecretsMountMysqlAuroraOutput) Data() pulumi.StringMapOutput { + return o.ApplyT(func(v SecretsMountMysqlAurora) map[string]string { return v.Data }).(pulumi.StringMapOutput) } // Maximum number of seconds a connection may be reused. @@ -7369,7 +7369,7 @@ type SecretsMountMysqlLegacy struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data map[string]interface{} `pulumi:"data"` + Data map[string]string `pulumi:"data"` // Maximum number of seconds a connection may be reused. MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"` // Maximum number of idle connections to the database. @@ -7421,7 +7421,7 @@ type SecretsMountMysqlLegacyArgs struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data pulumi.MapInput `pulumi:"data"` + Data pulumi.StringMapInput `pulumi:"data"` // Maximum number of seconds a connection may be reused. MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"` // Maximum number of idle connections to the database. @@ -7521,8 +7521,8 @@ func (o SecretsMountMysqlLegacyOutput) ConnectionUrl() pulumi.StringPtrOutput { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: -func (o SecretsMountMysqlLegacyOutput) Data() pulumi.MapOutput { - return o.ApplyT(func(v SecretsMountMysqlLegacy) map[string]interface{} { return v.Data }).(pulumi.MapOutput) +func (o SecretsMountMysqlLegacyOutput) Data() pulumi.StringMapOutput { + return o.ApplyT(func(v SecretsMountMysqlLegacy) map[string]string { return v.Data }).(pulumi.StringMapOutput) } // Maximum number of seconds a connection may be reused. @@ -7622,7 +7622,7 @@ type SecretsMountMysqlRd struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data map[string]interface{} `pulumi:"data"` + Data map[string]string `pulumi:"data"` // Maximum number of seconds a connection may be reused. MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"` // Maximum number of idle connections to the database. @@ -7674,7 +7674,7 @@ type SecretsMountMysqlRdArgs struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data pulumi.MapInput `pulumi:"data"` + Data pulumi.StringMapInput `pulumi:"data"` // Maximum number of seconds a connection may be reused. MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"` // Maximum number of idle connections to the database. @@ -7774,8 +7774,8 @@ func (o SecretsMountMysqlRdOutput) ConnectionUrl() pulumi.StringPtrOutput { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: -func (o SecretsMountMysqlRdOutput) Data() pulumi.MapOutput { - return o.ApplyT(func(v SecretsMountMysqlRd) map[string]interface{} { return v.Data }).(pulumi.MapOutput) +func (o SecretsMountMysqlRdOutput) Data() pulumi.StringMapOutput { + return o.ApplyT(func(v SecretsMountMysqlRd) map[string]string { return v.Data }).(pulumi.StringMapOutput) } // Maximum number of seconds a connection may be reused. @@ -7873,7 +7873,7 @@ type SecretsMountOracle struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data map[string]interface{} `pulumi:"data"` + Data map[string]string `pulumi:"data"` // Set to true to disconnect any open sessions prior to running the revocation statements. DisconnectSessions *bool `pulumi:"disconnectSessions"` // Maximum number of seconds a connection may be reused. @@ -7921,7 +7921,7 @@ type SecretsMountOracleArgs struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data pulumi.MapInput `pulumi:"data"` + Data pulumi.StringMapInput `pulumi:"data"` // Set to true to disconnect any open sessions prior to running the revocation statements. DisconnectSessions pulumi.BoolPtrInput `pulumi:"disconnectSessions"` // Maximum number of seconds a connection may be reused. @@ -8014,8 +8014,8 @@ func (o SecretsMountOracleOutput) ConnectionUrl() pulumi.StringPtrOutput { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: -func (o SecretsMountOracleOutput) Data() pulumi.MapOutput { - return o.ApplyT(func(v SecretsMountOracle) map[string]interface{} { return v.Data }).(pulumi.MapOutput) +func (o SecretsMountOracleOutput) Data() pulumi.StringMapOutput { + return o.ApplyT(func(v SecretsMountOracle) map[string]string { return v.Data }).(pulumi.StringMapOutput) } // Set to true to disconnect any open sessions prior to running the revocation statements. @@ -8110,7 +8110,7 @@ type SecretsMountPostgresql struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data map[string]interface{} `pulumi:"data"` + Data map[string]string `pulumi:"data"` // Disable special character escaping in username and password DisableEscaping *bool `pulumi:"disableEscaping"` // Maximum number of seconds a connection may be reused. @@ -8160,7 +8160,7 @@ type SecretsMountPostgresqlArgs struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data pulumi.MapInput `pulumi:"data"` + Data pulumi.StringMapInput `pulumi:"data"` // Disable special character escaping in username and password DisableEscaping pulumi.BoolPtrInput `pulumi:"disableEscaping"` // Maximum number of seconds a connection may be reused. @@ -8258,8 +8258,8 @@ func (o SecretsMountPostgresqlOutput) ConnectionUrl() pulumi.StringPtrOutput { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: -func (o SecretsMountPostgresqlOutput) Data() pulumi.MapOutput { - return o.ApplyT(func(v SecretsMountPostgresql) map[string]interface{} { return v.Data }).(pulumi.MapOutput) +func (o SecretsMountPostgresqlOutput) Data() pulumi.StringMapOutput { + return o.ApplyT(func(v SecretsMountPostgresql) map[string]string { return v.Data }).(pulumi.StringMapOutput) } // Disable special character escaping in username and password @@ -8352,7 +8352,7 @@ type SecretsMountRedi struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data map[string]interface{} `pulumi:"data"` + Data map[string]string `pulumi:"data"` // Specifies the host to connect to Host string `pulumi:"host"` // Specifies whether to skip verification of the server certificate when using TLS. @@ -8396,7 +8396,7 @@ type SecretsMountRediArgs struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data pulumi.MapInput `pulumi:"data"` + Data pulumi.StringMapInput `pulumi:"data"` // Specifies the host to connect to Host pulumi.StringInput `pulumi:"host"` // Specifies whether to skip verification of the server certificate when using TLS. @@ -8485,8 +8485,8 @@ func (o SecretsMountRediOutput) CaCert() pulumi.StringPtrOutput { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: -func (o SecretsMountRediOutput) Data() pulumi.MapOutput { - return o.ApplyT(func(v SecretsMountRedi) map[string]interface{} { return v.Data }).(pulumi.MapOutput) +func (o SecretsMountRediOutput) Data() pulumi.StringMapOutput { + return o.ApplyT(func(v SecretsMountRedi) map[string]string { return v.Data }).(pulumi.StringMapOutput) } // Specifies the host to connect to @@ -8567,7 +8567,7 @@ type SecretsMountRedisElasticach struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data map[string]interface{} `pulumi:"data"` + Data map[string]string `pulumi:"data"` // Name of the database connection. Name string `pulumi:"name"` // The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. @@ -8605,7 +8605,7 @@ type SecretsMountRedisElasticachArgs struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data pulumi.MapInput `pulumi:"data"` + Data pulumi.StringMapInput `pulumi:"data"` // Name of the database connection. Name pulumi.StringInput `pulumi:"name"` // The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. @@ -8685,8 +8685,8 @@ func (o SecretsMountRedisElasticachOutput) AllowedRoles() pulumi.StringArrayOutp // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: -func (o SecretsMountRedisElasticachOutput) Data() pulumi.MapOutput { - return o.ApplyT(func(v SecretsMountRedisElasticach) map[string]interface{} { return v.Data }).(pulumi.MapOutput) +func (o SecretsMountRedisElasticachOutput) Data() pulumi.StringMapOutput { + return o.ApplyT(func(v SecretsMountRedisElasticach) map[string]string { return v.Data }).(pulumi.StringMapOutput) } // Name of the database connection. @@ -8759,7 +8759,7 @@ type SecretsMountRedshift struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data map[string]interface{} `pulumi:"data"` + Data map[string]string `pulumi:"data"` // Disable special character escaping in username and password DisableEscaping *bool `pulumi:"disableEscaping"` // Maximum number of seconds a connection may be reused. @@ -8805,7 +8805,7 @@ type SecretsMountRedshiftArgs struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data pulumi.MapInput `pulumi:"data"` + Data pulumi.StringMapInput `pulumi:"data"` // Disable special character escaping in username and password DisableEscaping pulumi.BoolPtrInput `pulumi:"disableEscaping"` // Maximum number of seconds a connection may be reused. @@ -8896,8 +8896,8 @@ func (o SecretsMountRedshiftOutput) ConnectionUrl() pulumi.StringPtrOutput { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: -func (o SecretsMountRedshiftOutput) Data() pulumi.MapOutput { - return o.ApplyT(func(v SecretsMountRedshift) map[string]interface{} { return v.Data }).(pulumi.MapOutput) +func (o SecretsMountRedshiftOutput) Data() pulumi.StringMapOutput { + return o.ApplyT(func(v SecretsMountRedshift) map[string]string { return v.Data }).(pulumi.StringMapOutput) } // Disable special character escaping in username and password @@ -8985,7 +8985,7 @@ type SecretsMountSnowflake struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data map[string]interface{} `pulumi:"data"` + Data map[string]string `pulumi:"data"` // Maximum number of seconds a connection may be reused. MaxConnectionLifetime *int `pulumi:"maxConnectionLifetime"` // Maximum number of idle connections to the database. @@ -9029,7 +9029,7 @@ type SecretsMountSnowflakeArgs struct { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: - Data pulumi.MapInput `pulumi:"data"` + Data pulumi.StringMapInput `pulumi:"data"` // Maximum number of seconds a connection may be reused. MaxConnectionLifetime pulumi.IntPtrInput `pulumi:"maxConnectionLifetime"` // Maximum number of idle connections to the database. @@ -9118,8 +9118,8 @@ func (o SecretsMountSnowflakeOutput) ConnectionUrl() pulumi.StringPtrOutput { // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. // // Supported list of database secrets engines that can be configured: -func (o SecretsMountSnowflakeOutput) Data() pulumi.MapOutput { - return o.ApplyT(func(v SecretsMountSnowflake) map[string]interface{} { return v.Data }).(pulumi.MapOutput) +func (o SecretsMountSnowflakeOutput) Data() pulumi.StringMapOutput { + return o.ApplyT(func(v SecretsMountSnowflake) map[string]string { return v.Data }).(pulumi.StringMapOutput) } // Maximum number of seconds a connection may be reused. diff --git a/sdk/go/vault/database/secretBackendConnection.go b/sdk/go/vault/database/secretBackendConnection.go index 6a44adca1..3b0c94c45 100644 --- a/sdk/go/vault/database/secretBackendConnection.go +++ b/sdk/go/vault/database/secretBackendConnection.go @@ -74,7 +74,7 @@ type SecretBackendConnection struct { // A nested block containing configuration options for Couchbase connections. Couchbase SecretBackendConnectionCouchbasePtrOutput `pulumi:"couchbase"` // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. - Data pulumi.MapOutput `pulumi:"data"` + Data pulumi.StringMapOutput `pulumi:"data"` // A nested block containing configuration options for Elasticsearch connections. Elasticsearch SecretBackendConnectionElasticsearchPtrOutput `pulumi:"elasticsearch"` // A nested block containing configuration options for SAP HanaDB connections. @@ -168,7 +168,7 @@ type secretBackendConnectionState struct { // A nested block containing configuration options for Couchbase connections. Couchbase *SecretBackendConnectionCouchbase `pulumi:"couchbase"` // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. - Data map[string]interface{} `pulumi:"data"` + Data map[string]string `pulumi:"data"` // A nested block containing configuration options for Elasticsearch connections. Elasticsearch *SecretBackendConnectionElasticsearch `pulumi:"elasticsearch"` // A nested block containing configuration options for SAP HanaDB connections. @@ -230,7 +230,7 @@ type SecretBackendConnectionState struct { // A nested block containing configuration options for Couchbase connections. Couchbase SecretBackendConnectionCouchbasePtrInput // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. - Data pulumi.MapInput + Data pulumi.StringMapInput // A nested block containing configuration options for Elasticsearch connections. Elasticsearch SecretBackendConnectionElasticsearchPtrInput // A nested block containing configuration options for SAP HanaDB connections. @@ -296,7 +296,7 @@ type secretBackendConnectionArgs struct { // A nested block containing configuration options for Couchbase connections. Couchbase *SecretBackendConnectionCouchbase `pulumi:"couchbase"` // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. - Data map[string]interface{} `pulumi:"data"` + Data map[string]string `pulumi:"data"` // A nested block containing configuration options for Elasticsearch connections. Elasticsearch *SecretBackendConnectionElasticsearch `pulumi:"elasticsearch"` // A nested block containing configuration options for SAP HanaDB connections. @@ -359,7 +359,7 @@ type SecretBackendConnectionArgs struct { // A nested block containing configuration options for Couchbase connections. Couchbase SecretBackendConnectionCouchbasePtrInput // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. - Data pulumi.MapInput + Data pulumi.StringMapInput // A nested block containing configuration options for Elasticsearch connections. Elasticsearch SecretBackendConnectionElasticsearchPtrInput // A nested block containing configuration options for SAP HanaDB connections. @@ -519,8 +519,8 @@ func (o SecretBackendConnectionOutput) Couchbase() SecretBackendConnectionCouchb } // A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -func (o SecretBackendConnectionOutput) Data() pulumi.MapOutput { - return o.ApplyT(func(v *SecretBackendConnection) pulumi.MapOutput { return v.Data }).(pulumi.MapOutput) +func (o SecretBackendConnectionOutput) Data() pulumi.StringMapOutput { + return o.ApplyT(func(v *SecretBackendConnection) pulumi.StringMapOutput { return v.Data }).(pulumi.StringMapOutput) } // A nested block containing configuration options for Elasticsearch connections. diff --git a/sdk/go/vault/database/secretBackendRole.go b/sdk/go/vault/database/secretBackendRole.go index d45aa15ec..a15fe8dcd 100644 --- a/sdk/go/vault/database/secretBackendRole.go +++ b/sdk/go/vault/database/secretBackendRole.go @@ -84,7 +84,7 @@ type SecretBackendRole struct { // for the given `credentialType`. // // The following options are available for each `credentialType` value: - CredentialConfig pulumi.MapOutput `pulumi:"credentialConfig"` + CredentialConfig pulumi.StringMapOutput `pulumi:"credentialConfig"` // Specifies the type of credential that // will be generated for the role. Options include: `password`, `rsaPrivateKey`, `clientCertificate`. // See the plugin's API page for credential types supported by individual databases. @@ -164,7 +164,7 @@ type secretBackendRoleState struct { // for the given `credentialType`. // // The following options are available for each `credentialType` value: - CredentialConfig map[string]interface{} `pulumi:"credentialConfig"` + CredentialConfig map[string]string `pulumi:"credentialConfig"` // Specifies the type of credential that // will be generated for the role. Options include: `password`, `rsaPrivateKey`, `clientCertificate`. // See the plugin's API page for credential types supported by individual databases. @@ -206,7 +206,7 @@ type SecretBackendRoleState struct { // for the given `credentialType`. // // The following options are available for each `credentialType` value: - CredentialConfig pulumi.MapInput + CredentialConfig pulumi.StringMapInput // Specifies the type of credential that // will be generated for the role. Options include: `password`, `rsaPrivateKey`, `clientCertificate`. // See the plugin's API page for credential types supported by individual databases. @@ -252,7 +252,7 @@ type secretBackendRoleArgs struct { // for the given `credentialType`. // // The following options are available for each `credentialType` value: - CredentialConfig map[string]interface{} `pulumi:"credentialConfig"` + CredentialConfig map[string]string `pulumi:"credentialConfig"` // Specifies the type of credential that // will be generated for the role. Options include: `password`, `rsaPrivateKey`, `clientCertificate`. // See the plugin's API page for credential types supported by individual databases. @@ -295,7 +295,7 @@ type SecretBackendRoleArgs struct { // for the given `credentialType`. // // The following options are available for each `credentialType` value: - CredentialConfig pulumi.MapInput + CredentialConfig pulumi.StringMapInput // Specifies the type of credential that // will be generated for the role. Options include: `password`, `rsaPrivateKey`, `clientCertificate`. // See the plugin's API page for credential types supported by individual databases. @@ -429,8 +429,8 @@ func (o SecretBackendRoleOutput) CreationStatements() pulumi.StringArrayOutput { // for the given `credentialType`. // // The following options are available for each `credentialType` value: -func (o SecretBackendRoleOutput) CredentialConfig() pulumi.MapOutput { - return o.ApplyT(func(v *SecretBackendRole) pulumi.MapOutput { return v.CredentialConfig }).(pulumi.MapOutput) +func (o SecretBackendRoleOutput) CredentialConfig() pulumi.StringMapOutput { + return o.ApplyT(func(v *SecretBackendRole) pulumi.StringMapOutput { return v.CredentialConfig }).(pulumi.StringMapOutput) } // Specifies the type of credential that diff --git a/sdk/go/vault/database/secretsMount.go b/sdk/go/vault/database/secretsMount.go index 440af0b58..e7bb88e84 100644 --- a/sdk/go/vault/database/secretsMount.go +++ b/sdk/go/vault/database/secretsMount.go @@ -169,7 +169,7 @@ type SecretsMount struct { // Target namespace. (requires Enterprise) Namespace pulumi.StringPtrOutput `pulumi:"namespace"` // Specifies mount type specific options that are passed to the backend - Options pulumi.MapOutput `pulumi:"options"` + Options pulumi.StringMapOutput `pulumi:"options"` // A nested block containing configuration options for Oracle connections.\ // *See Configuration Options for more info* Oracles SecretsMountOracleArrayOutput `pulumi:"oracles"` @@ -300,7 +300,7 @@ type secretsMountState struct { // Target namespace. (requires Enterprise) Namespace *string `pulumi:"namespace"` // Specifies mount type specific options that are passed to the backend - Options map[string]interface{} `pulumi:"options"` + Options map[string]string `pulumi:"options"` // A nested block containing configuration options for Oracle connections.\ // *See Configuration Options for more info* Oracles []SecretsMountOracle `pulumi:"oracles"` @@ -399,7 +399,7 @@ type SecretsMountState struct { // Target namespace. (requires Enterprise) Namespace pulumi.StringPtrInput // Specifies mount type specific options that are passed to the backend - Options pulumi.MapInput + Options pulumi.StringMapInput // A nested block containing configuration options for Oracle connections.\ // *See Configuration Options for more info* Oracles SecretsMountOracleArrayInput @@ -498,7 +498,7 @@ type secretsMountArgs struct { // Target namespace. (requires Enterprise) Namespace *string `pulumi:"namespace"` // Specifies mount type specific options that are passed to the backend - Options map[string]interface{} `pulumi:"options"` + Options map[string]string `pulumi:"options"` // A nested block containing configuration options for Oracle connections.\ // *See Configuration Options for more info* Oracles []SecretsMountOracle `pulumi:"oracles"` @@ -594,7 +594,7 @@ type SecretsMountArgs struct { // Target namespace. (requires Enterprise) Namespace pulumi.StringPtrInput // Specifies mount type specific options that are passed to the backend - Options pulumi.MapInput + Options pulumi.StringMapInput // A nested block containing configuration options for Oracle connections.\ // *See Configuration Options for more info* Oracles SecretsMountOracleArrayInput @@ -860,8 +860,8 @@ func (o SecretsMountOutput) Namespace() pulumi.StringPtrOutput { } // Specifies mount type specific options that are passed to the backend -func (o SecretsMountOutput) Options() pulumi.MapOutput { - return o.ApplyT(func(v *SecretsMount) pulumi.MapOutput { return v.Options }).(pulumi.MapOutput) +func (o SecretsMountOutput) Options() pulumi.StringMapOutput { + return o.ApplyT(func(v *SecretsMount) pulumi.StringMapOutput { return v.Options }).(pulumi.StringMapOutput) } // A nested block containing configuration options for Oracle connections.\ diff --git a/sdk/go/vault/generic/getSecret.go b/sdk/go/vault/generic/getSecret.go index fc0a0ef20..85e0bcf99 100644 --- a/sdk/go/vault/generic/getSecret.go +++ b/sdk/go/vault/generic/getSecret.go @@ -114,7 +114,7 @@ type LookupSecretResult struct { // Vault and whose values are the corresponding values. This map can only // represent string data, so any non-string values returned from Vault are // serialized as JSON. - Data map[string]interface{} `pulumi:"data"` + Data map[string]string `pulumi:"data"` // A string containing the full data payload retrieved from // Vault, serialized in JSON format. DataJson string `pulumi:"dataJson"` @@ -193,8 +193,8 @@ func (o LookupSecretResultOutput) ToLookupSecretResultOutputWithContext(ctx cont // Vault and whose values are the corresponding values. This map can only // represent string data, so any non-string values returned from Vault are // serialized as JSON. -func (o LookupSecretResultOutput) Data() pulumi.MapOutput { - return o.ApplyT(func(v LookupSecretResult) map[string]interface{} { return v.Data }).(pulumi.MapOutput) +func (o LookupSecretResultOutput) Data() pulumi.StringMapOutput { + return o.ApplyT(func(v LookupSecretResult) map[string]string { return v.Data }).(pulumi.StringMapOutput) } // A string containing the full data payload retrieved from diff --git a/sdk/go/vault/generic/secret.go b/sdk/go/vault/generic/secret.go index fe6cc3bb3..1080c29fe 100644 --- a/sdk/go/vault/generic/secret.go +++ b/sdk/go/vault/generic/secret.go @@ -26,7 +26,7 @@ type Secret struct { // Vault and whose values are the corresponding values. This map can only // represent string data, so any non-string values returned from Vault are // serialized as JSON. - Data pulumi.MapOutput `pulumi:"data"` + Data pulumi.StringMapOutput `pulumi:"data"` // String containing a JSON-encoded object that will be // written as the secret data at the given path. DataJson pulumi.StringOutput `pulumi:"dataJson"` @@ -100,7 +100,7 @@ type secretState struct { // Vault and whose values are the corresponding values. This map can only // represent string data, so any non-string values returned from Vault are // serialized as JSON. - Data map[string]interface{} `pulumi:"data"` + Data map[string]string `pulumi:"data"` // String containing a JSON-encoded object that will be // written as the secret data at the given path. DataJson *string `pulumi:"dataJson"` @@ -131,7 +131,7 @@ type SecretState struct { // Vault and whose values are the corresponding values. This map can only // represent string data, so any non-string values returned from Vault are // serialized as JSON. - Data pulumi.MapInput + Data pulumi.StringMapInput // String containing a JSON-encoded object that will be // written as the secret data at the given path. DataJson pulumi.StringPtrInput @@ -305,8 +305,8 @@ func (o SecretOutput) ToSecretOutputWithContext(ctx context.Context) SecretOutpu // Vault and whose values are the corresponding values. This map can only // represent string data, so any non-string values returned from Vault are // serialized as JSON. -func (o SecretOutput) Data() pulumi.MapOutput { - return o.ApplyT(func(v *Secret) pulumi.MapOutput { return v.Data }).(pulumi.MapOutput) +func (o SecretOutput) Data() pulumi.StringMapOutput { + return o.ApplyT(func(v *Secret) pulumi.StringMapOutput { return v.Data }).(pulumi.StringMapOutput) } // String containing a JSON-encoded object that will be diff --git a/sdk/go/vault/getNamespace.go b/sdk/go/vault/getNamespace.go index 0d2ed3945..49da3620f 100644 --- a/sdk/go/vault/getNamespace.go +++ b/sdk/go/vault/getNamespace.go @@ -120,7 +120,7 @@ type LookupNamespaceResult struct { // (Optional) A map of strings containing arbitrary metadata for the namespace. // Only fetched if `path` is specified. // *Requires Vault 1.12+.* - CustomMetadata map[string]interface{} `pulumi:"customMetadata"` + CustomMetadata map[string]string `pulumi:"customMetadata"` // The provider-assigned unique ID for this managed resource. Id string `pulumi:"id"` Namespace *string `pulumi:"namespace"` @@ -181,8 +181,8 @@ func (o LookupNamespaceResultOutput) ToLookupNamespaceResultOutputWithContext(ct // (Optional) A map of strings containing arbitrary metadata for the namespace. // Only fetched if `path` is specified. // *Requires Vault 1.12+.* -func (o LookupNamespaceResultOutput) CustomMetadata() pulumi.MapOutput { - return o.ApplyT(func(v LookupNamespaceResult) map[string]interface{} { return v.CustomMetadata }).(pulumi.MapOutput) +func (o LookupNamespaceResultOutput) CustomMetadata() pulumi.StringMapOutput { + return o.ApplyT(func(v LookupNamespaceResult) map[string]string { return v.CustomMetadata }).(pulumi.StringMapOutput) } // The provider-assigned unique ID for this managed resource. diff --git a/sdk/go/vault/getRaftAutopilotState.go b/sdk/go/vault/getRaftAutopilotState.go index 5aa71ec22..1ebc80630 100644 --- a/sdk/go/vault/getRaftAutopilotState.go +++ b/sdk/go/vault/getRaftAutopilotState.go @@ -68,15 +68,15 @@ type GetRaftAutopilotStateResult struct { // The cluster-level optimistic failure tolerance. OptimisticFailureTolerance int `pulumi:"optimisticFailureTolerance"` // Additional output related to redundancy zones stored as a serialized map of strings. - RedundancyZones map[string]interface{} `pulumi:"redundancyZones"` + RedundancyZones map[string]string `pulumi:"redundancyZones"` // Additional output related to redundancy zones. RedundancyZonesJson string `pulumi:"redundancyZonesJson"` // Additionaly output related to servers in the cluster stored as a serialized map of strings. - Servers map[string]interface{} `pulumi:"servers"` + Servers map[string]string `pulumi:"servers"` // Additionaly output related to servers in the cluster. ServersJson string `pulumi:"serversJson"` // Additional output related to upgrade information stored as a serialized map of strings. - UpgradeInfo map[string]interface{} `pulumi:"upgradeInfo"` + UpgradeInfo map[string]string `pulumi:"upgradeInfo"` // Additional output related to upgrade information. UpgradeInfoJson string `pulumi:"upgradeInfoJson"` // The voters in the Vault cluster. @@ -154,8 +154,8 @@ func (o GetRaftAutopilotStateResultOutput) OptimisticFailureTolerance() pulumi.I } // Additional output related to redundancy zones stored as a serialized map of strings. -func (o GetRaftAutopilotStateResultOutput) RedundancyZones() pulumi.MapOutput { - return o.ApplyT(func(v GetRaftAutopilotStateResult) map[string]interface{} { return v.RedundancyZones }).(pulumi.MapOutput) +func (o GetRaftAutopilotStateResultOutput) RedundancyZones() pulumi.StringMapOutput { + return o.ApplyT(func(v GetRaftAutopilotStateResult) map[string]string { return v.RedundancyZones }).(pulumi.StringMapOutput) } // Additional output related to redundancy zones. @@ -164,8 +164,8 @@ func (o GetRaftAutopilotStateResultOutput) RedundancyZonesJson() pulumi.StringOu } // Additionaly output related to servers in the cluster stored as a serialized map of strings. -func (o GetRaftAutopilotStateResultOutput) Servers() pulumi.MapOutput { - return o.ApplyT(func(v GetRaftAutopilotStateResult) map[string]interface{} { return v.Servers }).(pulumi.MapOutput) +func (o GetRaftAutopilotStateResultOutput) Servers() pulumi.StringMapOutput { + return o.ApplyT(func(v GetRaftAutopilotStateResult) map[string]string { return v.Servers }).(pulumi.StringMapOutput) } // Additionaly output related to servers in the cluster. @@ -174,8 +174,8 @@ func (o GetRaftAutopilotStateResultOutput) ServersJson() pulumi.StringOutput { } // Additional output related to upgrade information stored as a serialized map of strings. -func (o GetRaftAutopilotStateResultOutput) UpgradeInfo() pulumi.MapOutput { - return o.ApplyT(func(v GetRaftAutopilotStateResult) map[string]interface{} { return v.UpgradeInfo }).(pulumi.MapOutput) +func (o GetRaftAutopilotStateResultOutput) UpgradeInfo() pulumi.StringMapOutput { + return o.ApplyT(func(v GetRaftAutopilotStateResult) map[string]string { return v.UpgradeInfo }).(pulumi.StringMapOutput) } // Additional output related to upgrade information. diff --git a/sdk/go/vault/identity/getEntity.go b/sdk/go/vault/identity/getEntity.go index 501ceb76c..a548148bc 100644 --- a/sdk/go/vault/identity/getEntity.go +++ b/sdk/go/vault/identity/getEntity.go @@ -103,8 +103,8 @@ type LookupEntityResult struct { // Other entity IDs which is merged with this entity MergedEntityIds []string `pulumi:"mergedEntityIds"` // Arbitrary metadata - Metadata map[string]interface{} `pulumi:"metadata"` - Namespace *string `pulumi:"namespace"` + Metadata map[string]string `pulumi:"metadata"` + Namespace *string `pulumi:"namespace"` // Namespace of which the entity is part of NamespaceId string `pulumi:"namespaceId"` // List of policies attached to the entity @@ -239,8 +239,8 @@ func (o LookupEntityResultOutput) MergedEntityIds() pulumi.StringArrayOutput { } // Arbitrary metadata -func (o LookupEntityResultOutput) Metadata() pulumi.MapOutput { - return o.ApplyT(func(v LookupEntityResult) map[string]interface{} { return v.Metadata }).(pulumi.MapOutput) +func (o LookupEntityResultOutput) Metadata() pulumi.StringMapOutput { + return o.ApplyT(func(v LookupEntityResult) map[string]string { return v.Metadata }).(pulumi.StringMapOutput) } func (o LookupEntityResultOutput) Namespace() pulumi.StringPtrOutput { diff --git a/sdk/go/vault/identity/getGroup.go b/sdk/go/vault/identity/getGroup.go index 44b297aec..4f3a3f2d2 100644 --- a/sdk/go/vault/identity/getGroup.go +++ b/sdk/go/vault/identity/getGroup.go @@ -86,8 +86,8 @@ type LookupGroupResult struct { // List of canonical IDs merged with this alias AliasMergedFromCanonicalIds []string `pulumi:"aliasMergedFromCanonicalIds"` // Arbitrary metadata - AliasMetadata map[string]interface{} `pulumi:"aliasMetadata"` - AliasMountAccessor string `pulumi:"aliasMountAccessor"` + AliasMetadata map[string]string `pulumi:"aliasMetadata"` + AliasMountAccessor string `pulumi:"aliasMountAccessor"` // Authentication mount path which this alias belongs to AliasMountPath string `pulumi:"aliasMountPath"` // Authentication mount type which this alias belongs to @@ -109,7 +109,7 @@ type LookupGroupResult struct { // List of Group IDs which are members of this group MemberGroupIds []string `pulumi:"memberGroupIds"` // Arbitrary metadata - Metadata map[string]interface{} `pulumi:"metadata"` + Metadata map[string]string `pulumi:"metadata"` // Modify index of the group ModifyIndex int `pulumi:"modifyIndex"` Namespace *string `pulumi:"namespace"` @@ -204,8 +204,8 @@ func (o LookupGroupResultOutput) AliasMergedFromCanonicalIds() pulumi.StringArra } // Arbitrary metadata -func (o LookupGroupResultOutput) AliasMetadata() pulumi.MapOutput { - return o.ApplyT(func(v LookupGroupResult) map[string]interface{} { return v.AliasMetadata }).(pulumi.MapOutput) +func (o LookupGroupResultOutput) AliasMetadata() pulumi.StringMapOutput { + return o.ApplyT(func(v LookupGroupResult) map[string]string { return v.AliasMetadata }).(pulumi.StringMapOutput) } func (o LookupGroupResultOutput) AliasMountAccessor() pulumi.StringOutput { @@ -266,8 +266,8 @@ func (o LookupGroupResultOutput) MemberGroupIds() pulumi.StringArrayOutput { } // Arbitrary metadata -func (o LookupGroupResultOutput) Metadata() pulumi.MapOutput { - return o.ApplyT(func(v LookupGroupResult) map[string]interface{} { return v.Metadata }).(pulumi.MapOutput) +func (o LookupGroupResultOutput) Metadata() pulumi.StringMapOutput { + return o.ApplyT(func(v LookupGroupResult) map[string]string { return v.Metadata }).(pulumi.StringMapOutput) } // Modify index of the group diff --git a/sdk/go/vault/identity/getOidcPublicKeys.go b/sdk/go/vault/identity/getOidcPublicKeys.go index b509ede8d..010de707c 100644 --- a/sdk/go/vault/identity/getOidcPublicKeys.go +++ b/sdk/go/vault/identity/getOidcPublicKeys.go @@ -94,9 +94,9 @@ type GetOidcPublicKeysResult struct { Id string `pulumi:"id"` // The public portion of keys for an OIDC provider. // Clients can use them to validate the authenticity of an identity token. - Keys []map[string]interface{} `pulumi:"keys"` - Name string `pulumi:"name"` - Namespace *string `pulumi:"namespace"` + Keys []map[string]string `pulumi:"keys"` + Name string `pulumi:"name"` + Namespace *string `pulumi:"namespace"` } func GetOidcPublicKeysOutput(ctx *pulumi.Context, args GetOidcPublicKeysOutputArgs, opts ...pulumi.InvokeOption) GetOidcPublicKeysResultOutput { @@ -149,8 +149,8 @@ func (o GetOidcPublicKeysResultOutput) Id() pulumi.StringOutput { // The public portion of keys for an OIDC provider. // Clients can use them to validate the authenticity of an identity token. -func (o GetOidcPublicKeysResultOutput) Keys() pulumi.MapArrayOutput { - return o.ApplyT(func(v GetOidcPublicKeysResult) []map[string]interface{} { return v.Keys }).(pulumi.MapArrayOutput) +func (o GetOidcPublicKeysResultOutput) Keys() pulumi.StringMapArrayOutput { + return o.ApplyT(func(v GetOidcPublicKeysResult) []map[string]string { return v.Keys }).(pulumi.StringMapArrayOutput) } func (o GetOidcPublicKeysResultOutput) Name() pulumi.StringOutput { diff --git a/sdk/go/vault/identity/pulumiTypes.go b/sdk/go/vault/identity/pulumiTypes.go index c25efd68a..ff9d826b1 100644 --- a/sdk/go/vault/identity/pulumiTypes.go +++ b/sdk/go/vault/identity/pulumiTypes.go @@ -25,7 +25,7 @@ type GetEntityAliasType struct { // List of canonical IDs merged with this alias MergedFromCanonicalIds []string `pulumi:"mergedFromCanonicalIds"` // Arbitrary metadata - Metadata map[string]interface{} `pulumi:"metadata"` + Metadata map[string]string `pulumi:"metadata"` // Authentication mount acccessor which this alias belongs to MountAccessor string `pulumi:"mountAccessor"` // Authentication mount path which this alias belongs to @@ -59,7 +59,7 @@ type GetEntityAliasTypeArgs struct { // List of canonical IDs merged with this alias MergedFromCanonicalIds pulumi.StringArrayInput `pulumi:"mergedFromCanonicalIds"` // Arbitrary metadata - Metadata pulumi.MapInput `pulumi:"metadata"` + Metadata pulumi.StringMapInput `pulumi:"metadata"` // Authentication mount acccessor which this alias belongs to MountAccessor pulumi.StringInput `pulumi:"mountAccessor"` // Authentication mount path which this alias belongs to @@ -147,8 +147,8 @@ func (o GetEntityAliasTypeOutput) MergedFromCanonicalIds() pulumi.StringArrayOut } // Arbitrary metadata -func (o GetEntityAliasTypeOutput) Metadata() pulumi.MapOutput { - return o.ApplyT(func(v GetEntityAliasType) map[string]interface{} { return v.Metadata }).(pulumi.MapOutput) +func (o GetEntityAliasTypeOutput) Metadata() pulumi.StringMapOutput { + return o.ApplyT(func(v GetEntityAliasType) map[string]string { return v.Metadata }).(pulumi.StringMapOutput) } // Authentication mount acccessor which this alias belongs to diff --git a/sdk/go/vault/jwt/authBackendRole.go b/sdk/go/vault/jwt/authBackendRole.go index b9063ebc1..66983a29b 100644 --- a/sdk/go/vault/jwt/authBackendRole.go +++ b/sdk/go/vault/jwt/authBackendRole.go @@ -49,8 +49,8 @@ import ( // BoundAudiences: pulumi.StringArray{ // pulumi.String("https://myco.test"), // }, -// BoundClaims: pulumi.Map{ -// "color": pulumi.Any("red,green,blue"), +// BoundClaims: pulumi.StringMap{ +// "color": pulumi.String("red,green,blue"), // }, // UserClaim: pulumi.String("https://vault/user"), // RoleType: pulumi.String("jwt"), @@ -130,7 +130,7 @@ type AuthBackendRole struct { // If set, a map of claims to values to match against. // A claim's value must be a string, which may contain one value or multiple // comma-separated values, e.g. `"red"` or `"red,green,blue"`. - BoundClaims pulumi.MapOutput `pulumi:"boundClaims"` + BoundClaims pulumi.StringMapOutput `pulumi:"boundClaims"` // How to interpret values in the claims/values // map (`boundClaims`): can be either `string` (exact match) or `glob` (wildcard // match). Requires Vault 1.4.0 or above. @@ -140,7 +140,7 @@ type AuthBackendRole struct { BoundSubject pulumi.StringPtrOutput `pulumi:"boundSubject"` // If set, a map of claims (keys) to be copied // to specified metadata fields (values). - ClaimMappings pulumi.MapOutput `pulumi:"claimMappings"` + ClaimMappings pulumi.StringMapOutput `pulumi:"claimMappings"` // The amount of leeway to add to all claims to account for clock skew, in // seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`. // Only applicable with "jwt" roles. @@ -256,7 +256,7 @@ type authBackendRoleState struct { // If set, a map of claims to values to match against. // A claim's value must be a string, which may contain one value or multiple // comma-separated values, e.g. `"red"` or `"red,green,blue"`. - BoundClaims map[string]interface{} `pulumi:"boundClaims"` + BoundClaims map[string]string `pulumi:"boundClaims"` // How to interpret values in the claims/values // map (`boundClaims`): can be either `string` (exact match) or `glob` (wildcard // match). Requires Vault 1.4.0 or above. @@ -266,7 +266,7 @@ type authBackendRoleState struct { BoundSubject *string `pulumi:"boundSubject"` // If set, a map of claims (keys) to be copied // to specified metadata fields (values). - ClaimMappings map[string]interface{} `pulumi:"claimMappings"` + ClaimMappings map[string]string `pulumi:"claimMappings"` // The amount of leeway to add to all claims to account for clock skew, in // seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`. // Only applicable with "jwt" roles. @@ -347,7 +347,7 @@ type AuthBackendRoleState struct { // If set, a map of claims to values to match against. // A claim's value must be a string, which may contain one value or multiple // comma-separated values, e.g. `"red"` or `"red,green,blue"`. - BoundClaims pulumi.MapInput + BoundClaims pulumi.StringMapInput // How to interpret values in the claims/values // map (`boundClaims`): can be either `string` (exact match) or `glob` (wildcard // match). Requires Vault 1.4.0 or above. @@ -357,7 +357,7 @@ type AuthBackendRoleState struct { BoundSubject pulumi.StringPtrInput // If set, a map of claims (keys) to be copied // to specified metadata fields (values). - ClaimMappings pulumi.MapInput + ClaimMappings pulumi.StringMapInput // The amount of leeway to add to all claims to account for clock skew, in // seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`. // Only applicable with "jwt" roles. @@ -442,7 +442,7 @@ type authBackendRoleArgs struct { // If set, a map of claims to values to match against. // A claim's value must be a string, which may contain one value or multiple // comma-separated values, e.g. `"red"` or `"red,green,blue"`. - BoundClaims map[string]interface{} `pulumi:"boundClaims"` + BoundClaims map[string]string `pulumi:"boundClaims"` // How to interpret values in the claims/values // map (`boundClaims`): can be either `string` (exact match) or `glob` (wildcard // match). Requires Vault 1.4.0 or above. @@ -452,7 +452,7 @@ type authBackendRoleArgs struct { BoundSubject *string `pulumi:"boundSubject"` // If set, a map of claims (keys) to be copied // to specified metadata fields (values). - ClaimMappings map[string]interface{} `pulumi:"claimMappings"` + ClaimMappings map[string]string `pulumi:"claimMappings"` // The amount of leeway to add to all claims to account for clock skew, in // seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`. // Only applicable with "jwt" roles. @@ -534,7 +534,7 @@ type AuthBackendRoleArgs struct { // If set, a map of claims to values to match against. // A claim's value must be a string, which may contain one value or multiple // comma-separated values, e.g. `"red"` or `"red,green,blue"`. - BoundClaims pulumi.MapInput + BoundClaims pulumi.StringMapInput // How to interpret values in the claims/values // map (`boundClaims`): can be either `string` (exact match) or `glob` (wildcard // match). Requires Vault 1.4.0 or above. @@ -544,7 +544,7 @@ type AuthBackendRoleArgs struct { BoundSubject pulumi.StringPtrInput // If set, a map of claims (keys) to be copied // to specified metadata fields (values). - ClaimMappings pulumi.MapInput + ClaimMappings pulumi.StringMapInput // The amount of leeway to add to all claims to account for clock skew, in // seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`. // Only applicable with "jwt" roles. @@ -720,8 +720,8 @@ func (o AuthBackendRoleOutput) BoundAudiences() pulumi.StringArrayOutput { // If set, a map of claims to values to match against. // A claim's value must be a string, which may contain one value or multiple // comma-separated values, e.g. `"red"` or `"red,green,blue"`. -func (o AuthBackendRoleOutput) BoundClaims() pulumi.MapOutput { - return o.ApplyT(func(v *AuthBackendRole) pulumi.MapOutput { return v.BoundClaims }).(pulumi.MapOutput) +func (o AuthBackendRoleOutput) BoundClaims() pulumi.StringMapOutput { + return o.ApplyT(func(v *AuthBackendRole) pulumi.StringMapOutput { return v.BoundClaims }).(pulumi.StringMapOutput) } // How to interpret values in the claims/values @@ -739,8 +739,8 @@ func (o AuthBackendRoleOutput) BoundSubject() pulumi.StringPtrOutput { // If set, a map of claims (keys) to be copied // to specified metadata fields (values). -func (o AuthBackendRoleOutput) ClaimMappings() pulumi.MapOutput { - return o.ApplyT(func(v *AuthBackendRole) pulumi.MapOutput { return v.ClaimMappings }).(pulumi.MapOutput) +func (o AuthBackendRoleOutput) ClaimMappings() pulumi.StringMapOutput { + return o.ApplyT(func(v *AuthBackendRole) pulumi.StringMapOutput { return v.ClaimMappings }).(pulumi.StringMapOutput) } // The amount of leeway to add to all claims to account for clock skew, in diff --git a/sdk/go/vault/kubernetes/secretBackend.go b/sdk/go/vault/kubernetes/secretBackend.go index 552b74c07..e601c41ea 100644 --- a/sdk/go/vault/kubernetes/secretBackend.go +++ b/sdk/go/vault/kubernetes/secretBackend.go @@ -112,7 +112,7 @@ type SecretBackend struct { // *Available only for Vault Enterprise*. Namespace pulumi.StringPtrOutput `pulumi:"namespace"` // Specifies mount type specific options that are passed to the backend - Options pulumi.MapOutput `pulumi:"options"` + Options pulumi.StringMapOutput `pulumi:"options"` // List of headers to allow and pass from the request to the plugin PassthroughRequestHeaders pulumi.StringArrayOutput `pulumi:"passthroughRequestHeaders"` // Where the secret backend will be mounted @@ -211,7 +211,7 @@ type secretBackendState struct { // *Available only for Vault Enterprise*. Namespace *string `pulumi:"namespace"` // Specifies mount type specific options that are passed to the backend - Options map[string]interface{} `pulumi:"options"` + Options map[string]string `pulumi:"options"` // List of headers to allow and pass from the request to the plugin PassthroughRequestHeaders []string `pulumi:"passthroughRequestHeaders"` // Where the secret backend will be mounted @@ -271,7 +271,7 @@ type SecretBackendState struct { // *Available only for Vault Enterprise*. Namespace pulumi.StringPtrInput // Specifies mount type specific options that are passed to the backend - Options pulumi.MapInput + Options pulumi.StringMapInput // List of headers to allow and pass from the request to the plugin PassthroughRequestHeaders pulumi.StringArrayInput // Where the secret backend will be mounted @@ -333,7 +333,7 @@ type secretBackendArgs struct { // *Available only for Vault Enterprise*. Namespace *string `pulumi:"namespace"` // Specifies mount type specific options that are passed to the backend - Options map[string]interface{} `pulumi:"options"` + Options map[string]string `pulumi:"options"` // List of headers to allow and pass from the request to the plugin PassthroughRequestHeaders []string `pulumi:"passthroughRequestHeaders"` // Where the secret backend will be mounted @@ -392,7 +392,7 @@ type SecretBackendArgs struct { // *Available only for Vault Enterprise*. Namespace pulumi.StringPtrInput // Specifies mount type specific options that are passed to the backend - Options pulumi.MapInput + Options pulumi.StringMapInput // List of headers to allow and pass from the request to the plugin PassthroughRequestHeaders pulumi.StringArrayInput // Where the secret backend will be mounted @@ -589,8 +589,8 @@ func (o SecretBackendOutput) Namespace() pulumi.StringPtrOutput { } // Specifies mount type specific options that are passed to the backend -func (o SecretBackendOutput) Options() pulumi.MapOutput { - return o.ApplyT(func(v *SecretBackend) pulumi.MapOutput { return v.Options }).(pulumi.MapOutput) +func (o SecretBackendOutput) Options() pulumi.StringMapOutput { + return o.ApplyT(func(v *SecretBackend) pulumi.StringMapOutput { return v.Options }).(pulumi.StringMapOutput) } // List of headers to allow and pass from the request to the plugin diff --git a/sdk/go/vault/kv/getSecret.go b/sdk/go/vault/kv/getSecret.go index 8caa9c89b..218e15259 100644 --- a/sdk/go/vault/kv/getSecret.go +++ b/sdk/go/vault/kv/getSecret.go @@ -32,8 +32,8 @@ import ( // kvv1, err := vault.NewMount(ctx, "kvv1", &vault.MountArgs{ // Path: pulumi.String("kvv1"), // Type: pulumi.String("kv"), -// Options: pulumi.Map{ -// "version": pulumi.Any("1"), +// Options: pulumi.StringMap{ +// "version": pulumi.String("1"), // }, // Description: pulumi.String("KV Version 1 secret engine mount"), // }) @@ -96,7 +96,7 @@ type LookupSecretResult struct { // Vault and whose values are the corresponding values. This map can only // represent string data, so any non-string values returned from Vault are // serialized as JSON. - Data map[string]interface{} `pulumi:"data"` + Data map[string]string `pulumi:"data"` // JSON-encoded string that that is // read as the secret data at the given path. DataJson string `pulumi:"dataJson"` @@ -161,8 +161,8 @@ func (o LookupSecretResultOutput) ToLookupSecretResultOutputWithContext(ctx cont // Vault and whose values are the corresponding values. This map can only // represent string data, so any non-string values returned from Vault are // serialized as JSON. -func (o LookupSecretResultOutput) Data() pulumi.MapOutput { - return o.ApplyT(func(v LookupSecretResult) map[string]interface{} { return v.Data }).(pulumi.MapOutput) +func (o LookupSecretResultOutput) Data() pulumi.StringMapOutput { + return o.ApplyT(func(v LookupSecretResult) map[string]string { return v.Data }).(pulumi.StringMapOutput) } // JSON-encoded string that that is diff --git a/sdk/go/vault/kv/getSecretSubkeysV2.go b/sdk/go/vault/kv/getSecretSubkeysV2.go index a97403683..b49c7f580 100644 --- a/sdk/go/vault/kv/getSecretSubkeysV2.go +++ b/sdk/go/vault/kv/getSecretSubkeysV2.go @@ -31,8 +31,8 @@ import ( // kvv2, err := vault.NewMount(ctx, "kvv2", &vault.MountArgs{ // Path: pulumi.String("kvv2"), // Type: pulumi.String("kv"), -// Options: pulumi.Map{ -// "version": pulumi.Any("2"), +// Options: pulumi.StringMap{ +// "version": pulumi.String("2"), // }, // Description: pulumi.String("KV Version 2 secret engine mount"), // }) @@ -105,7 +105,7 @@ type GetSecretSubkeysV2Args struct { // A collection of values returned by getSecretSubkeysV2. type GetSecretSubkeysV2Result struct { // Subkeys for the KV-V2 secret stored as a serialized map of strings. - Data map[string]interface{} `pulumi:"data"` + Data map[string]string `pulumi:"data"` // Subkeys for the KV-V2 secret read from Vault. DataJson string `pulumi:"dataJson"` Depth *int `pulumi:"depth"` @@ -176,8 +176,8 @@ func (o GetSecretSubkeysV2ResultOutput) ToGetSecretSubkeysV2ResultOutputWithCont } // Subkeys for the KV-V2 secret stored as a serialized map of strings. -func (o GetSecretSubkeysV2ResultOutput) Data() pulumi.MapOutput { - return o.ApplyT(func(v GetSecretSubkeysV2Result) map[string]interface{} { return v.Data }).(pulumi.MapOutput) +func (o GetSecretSubkeysV2ResultOutput) Data() pulumi.StringMapOutput { + return o.ApplyT(func(v GetSecretSubkeysV2Result) map[string]string { return v.Data }).(pulumi.StringMapOutput) } // Subkeys for the KV-V2 secret read from Vault. diff --git a/sdk/go/vault/kv/getSecretV2.go b/sdk/go/vault/kv/getSecretV2.go index 0a8835c95..2892c5aba 100644 --- a/sdk/go/vault/kv/getSecretV2.go +++ b/sdk/go/vault/kv/getSecretV2.go @@ -31,8 +31,8 @@ import ( // kvv2, err := vault.NewMount(ctx, "kvv2", &vault.MountArgs{ // Path: pulumi.String("kvv2"), // Type: pulumi.String("kv"), -// Options: pulumi.Map{ -// "version": pulumi.Any("2"), +// Options: pulumi.StringMap{ +// "version": pulumi.String("2"), // }, // Description: pulumi.String("KV Version 2 secret engine mount"), // }) @@ -103,12 +103,12 @@ type LookupSecretV2Result struct { // Time at which secret was created. CreatedTime string `pulumi:"createdTime"` // Custom metadata for the secret. - CustomMetadata map[string]interface{} `pulumi:"customMetadata"` + CustomMetadata map[string]string `pulumi:"customMetadata"` // A mapping whose keys are the top-level data keys returned from // Vault and whose values are the corresponding values. This map can only // represent string data, so any non-string values returned from Vault are // serialized as JSON. - Data map[string]interface{} `pulumi:"data"` + Data map[string]string `pulumi:"data"` // JSON-encoded string that that is // read as the secret data at the given path. DataJson string `pulumi:"dataJson"` @@ -183,16 +183,16 @@ func (o LookupSecretV2ResultOutput) CreatedTime() pulumi.StringOutput { } // Custom metadata for the secret. -func (o LookupSecretV2ResultOutput) CustomMetadata() pulumi.MapOutput { - return o.ApplyT(func(v LookupSecretV2Result) map[string]interface{} { return v.CustomMetadata }).(pulumi.MapOutput) +func (o LookupSecretV2ResultOutput) CustomMetadata() pulumi.StringMapOutput { + return o.ApplyT(func(v LookupSecretV2Result) map[string]string { return v.CustomMetadata }).(pulumi.StringMapOutput) } // A mapping whose keys are the top-level data keys returned from // Vault and whose values are the corresponding values. This map can only // represent string data, so any non-string values returned from Vault are // serialized as JSON. -func (o LookupSecretV2ResultOutput) Data() pulumi.MapOutput { - return o.ApplyT(func(v LookupSecretV2Result) map[string]interface{} { return v.Data }).(pulumi.MapOutput) +func (o LookupSecretV2ResultOutput) Data() pulumi.StringMapOutput { + return o.ApplyT(func(v LookupSecretV2Result) map[string]string { return v.Data }).(pulumi.StringMapOutput) } // JSON-encoded string that that is diff --git a/sdk/go/vault/kv/getSecretsList.go b/sdk/go/vault/kv/getSecretsList.go index 92d33961e..c3e9e9f67 100644 --- a/sdk/go/vault/kv/getSecretsList.go +++ b/sdk/go/vault/kv/getSecretsList.go @@ -32,8 +32,8 @@ import ( // kvv1, err := vault.NewMount(ctx, "kvv1", &vault.MountArgs{ // Path: pulumi.String("kvv1"), // Type: pulumi.String("kv"), -// Options: pulumi.Map{ -// "version": pulumi.Any("1"), +// Options: pulumi.StringMap{ +// "version": pulumi.String("1"), // }, // Description: pulumi.String("KV Version 1 secret engine mount"), // }) diff --git a/sdk/go/vault/kv/getSecretsListV2.go b/sdk/go/vault/kv/getSecretsListV2.go index 9da1e3e9c..528c16676 100644 --- a/sdk/go/vault/kv/getSecretsListV2.go +++ b/sdk/go/vault/kv/getSecretsListV2.go @@ -32,8 +32,8 @@ import ( // kvv2, err := vault.NewMount(ctx, "kvv2", &vault.MountArgs{ // Path: pulumi.String("kvv2"), // Type: pulumi.String("kv"), -// Options: pulumi.Map{ -// "version": pulumi.Any("2"), +// Options: pulumi.StringMap{ +// "version": pulumi.String("2"), // }, // Description: pulumi.String("KV Version 2 secret engine mount"), // }) diff --git a/sdk/go/vault/kv/pulumiTypes.go b/sdk/go/vault/kv/pulumiTypes.go index c95aa512f..42c5deb65 100644 --- a/sdk/go/vault/kv/pulumiTypes.go +++ b/sdk/go/vault/kv/pulumiTypes.go @@ -20,7 +20,7 @@ type SecretV2CustomMetadata struct { // Vault and whose values are the corresponding values. This map can only // represent string data, so any non-string values returned from Vault are // serialized as JSON. - Data map[string]interface{} `pulumi:"data"` + Data map[string]string `pulumi:"data"` // If set, specifies the length of time before a version is deleted. DeleteVersionAfter *int `pulumi:"deleteVersionAfter"` // The number of versions to keep per key. @@ -45,7 +45,7 @@ type SecretV2CustomMetadataArgs struct { // Vault and whose values are the corresponding values. This map can only // represent string data, so any non-string values returned from Vault are // serialized as JSON. - Data pulumi.MapInput `pulumi:"data"` + Data pulumi.StringMapInput `pulumi:"data"` // If set, specifies the length of time before a version is deleted. DeleteVersionAfter pulumi.IntPtrInput `pulumi:"deleteVersionAfter"` // The number of versions to keep per key. @@ -138,8 +138,8 @@ func (o SecretV2CustomMetadataOutput) CasRequired() pulumi.BoolPtrOutput { // Vault and whose values are the corresponding values. This map can only // represent string data, so any non-string values returned from Vault are // serialized as JSON. -func (o SecretV2CustomMetadataOutput) Data() pulumi.MapOutput { - return o.ApplyT(func(v SecretV2CustomMetadata) map[string]interface{} { return v.Data }).(pulumi.MapOutput) +func (o SecretV2CustomMetadataOutput) Data() pulumi.StringMapOutput { + return o.ApplyT(func(v SecretV2CustomMetadata) map[string]string { return v.Data }).(pulumi.StringMapOutput) } // If set, specifies the length of time before a version is deleted. @@ -190,13 +190,13 @@ func (o SecretV2CustomMetadataPtrOutput) CasRequired() pulumi.BoolPtrOutput { // Vault and whose values are the corresponding values. This map can only // represent string data, so any non-string values returned from Vault are // serialized as JSON. -func (o SecretV2CustomMetadataPtrOutput) Data() pulumi.MapOutput { - return o.ApplyT(func(v *SecretV2CustomMetadata) map[string]interface{} { +func (o SecretV2CustomMetadataPtrOutput) Data() pulumi.StringMapOutput { + return o.ApplyT(func(v *SecretV2CustomMetadata) map[string]string { if v == nil { return nil } return v.Data - }).(pulumi.MapOutput) + }).(pulumi.StringMapOutput) } // If set, specifies the length of time before a version is deleted. diff --git a/sdk/go/vault/kv/secret.go b/sdk/go/vault/kv/secret.go index deb64bd60..581e13115 100644 --- a/sdk/go/vault/kv/secret.go +++ b/sdk/go/vault/kv/secret.go @@ -38,8 +38,8 @@ import ( // kvv1, err := vault.NewMount(ctx, "kvv1", &vault.MountArgs{ // Path: pulumi.String("kvv1"), // Type: pulumi.String("kv"), -// Options: pulumi.Map{ -// "version": pulumi.Any("1"), +// Options: pulumi.StringMap{ +// "version": pulumi.String("1"), // }, // Description: pulumi.String("KV Version 1 secret engine mount"), // }) @@ -90,7 +90,7 @@ type Secret struct { // Vault and whose values are the corresponding values. This map can only // represent string data, so any non-string values returned from Vault are // serialized as JSON. - Data pulumi.MapOutput `pulumi:"data"` + Data pulumi.StringMapOutput `pulumi:"data"` // JSON-encoded string that will be // written as the secret data at the given path. DataJson pulumi.StringOutput `pulumi:"dataJson"` @@ -151,7 +151,7 @@ type secretState struct { // Vault and whose values are the corresponding values. This map can only // represent string data, so any non-string values returned from Vault are // serialized as JSON. - Data map[string]interface{} `pulumi:"data"` + Data map[string]string `pulumi:"data"` // JSON-encoded string that will be // written as the secret data at the given path. DataJson *string `pulumi:"dataJson"` @@ -169,7 +169,7 @@ type SecretState struct { // Vault and whose values are the corresponding values. This map can only // represent string data, so any non-string values returned from Vault are // serialized as JSON. - Data pulumi.MapInput + Data pulumi.StringMapInput // JSON-encoded string that will be // written as the secret data at the given path. DataJson pulumi.StringPtrInput @@ -304,8 +304,8 @@ func (o SecretOutput) ToSecretOutputWithContext(ctx context.Context) SecretOutpu // Vault and whose values are the corresponding values. This map can only // represent string data, so any non-string values returned from Vault are // serialized as JSON. -func (o SecretOutput) Data() pulumi.MapOutput { - return o.ApplyT(func(v *Secret) pulumi.MapOutput { return v.Data }).(pulumi.MapOutput) +func (o SecretOutput) Data() pulumi.StringMapOutput { + return o.ApplyT(func(v *Secret) pulumi.StringMapOutput { return v.Data }).(pulumi.StringMapOutput) } // JSON-encoded string that will be diff --git a/sdk/go/vault/kv/secretBackendV2.go b/sdk/go/vault/kv/secretBackendV2.go index c6d976e2f..3b42c84a3 100644 --- a/sdk/go/vault/kv/secretBackendV2.go +++ b/sdk/go/vault/kv/secretBackendV2.go @@ -36,8 +36,8 @@ import ( // kvv2, err := vault.NewMount(ctx, "kvv2", &vault.MountArgs{ // Path: pulumi.String("kvv2"), // Type: pulumi.String("kv"), -// Options: pulumi.Map{ -// "version": pulumi.Any("2"), +// Options: pulumi.StringMap{ +// "version": pulumi.String("2"), // }, // Description: pulumi.String("KV Version 2 secret engine mount"), // }) diff --git a/sdk/go/vault/kv/secretV2.go b/sdk/go/vault/kv/secretV2.go index ea913b34c..6c80046c0 100644 --- a/sdk/go/vault/kv/secretV2.go +++ b/sdk/go/vault/kv/secretV2.go @@ -37,8 +37,8 @@ import ( // kvv2, err := vault.NewMount(ctx, "kvv2", &vault.MountArgs{ // Path: pulumi.String("kvv2"), // Type: pulumi.String("kv"), -// Options: pulumi.Map{ -// "version": pulumi.Any("2"), +// Options: pulumi.StringMap{ +// "version": pulumi.String("2"), // }, // Description: pulumi.String("KV Version 2 secret engine mount"), // }) @@ -61,9 +61,9 @@ import ( // DataJson: pulumi.String(json0), // CustomMetadata: &kv.SecretV2CustomMetadataArgs{ // MaxVersions: pulumi.Int(5), -// Data: pulumi.Map{ -// "foo": pulumi.Any("vault@example.com"), -// "bar": pulumi.Any("12345"), +// Data: pulumi.StringMap{ +// "foo": pulumi.String("vault@example.com"), +// "bar": pulumi.String("12345"), // }, // }, // }) @@ -118,7 +118,7 @@ type SecretV2 struct { // Vault and whose values are the corresponding values. This map can only // represent string data, so any non-string values returned from Vault are // serialized as JSON. - Data pulumi.MapOutput `pulumi:"data"` + Data pulumi.StringMapOutput `pulumi:"data"` // JSON-encoded string that will be // written as the secret data at the given path. DataJson pulumi.StringOutput `pulumi:"dataJson"` @@ -129,7 +129,7 @@ type SecretV2 struct { // note: drift won't be detected. DisableRead pulumi.BoolPtrOutput `pulumi:"disableRead"` // Metadata associated with this secret read from Vault. - Metadata pulumi.MapOutput `pulumi:"metadata"` + Metadata pulumi.StringMapOutput `pulumi:"metadata"` // Path where KV-V2 engine is mounted. Mount pulumi.StringOutput `pulumi:"mount"` // Full name of the secret. For a nested secret @@ -143,7 +143,7 @@ type SecretV2 struct { // *Available only for Vault Enterprise*. Namespace pulumi.StringPtrOutput `pulumi:"namespace"` // An object that holds option settings. - Options pulumi.MapOutput `pulumi:"options"` + Options pulumi.StringMapOutput `pulumi:"options"` // Full path where the KV-V2 secret will be written. Path pulumi.StringOutput `pulumi:"path"` } @@ -205,7 +205,7 @@ type secretV2State struct { // Vault and whose values are the corresponding values. This map can only // represent string data, so any non-string values returned from Vault are // serialized as JSON. - Data map[string]interface{} `pulumi:"data"` + Data map[string]string `pulumi:"data"` // JSON-encoded string that will be // written as the secret data at the given path. DataJson *string `pulumi:"dataJson"` @@ -216,7 +216,7 @@ type secretV2State struct { // note: drift won't be detected. DisableRead *bool `pulumi:"disableRead"` // Metadata associated with this secret read from Vault. - Metadata map[string]interface{} `pulumi:"metadata"` + Metadata map[string]string `pulumi:"metadata"` // Path where KV-V2 engine is mounted. Mount *string `pulumi:"mount"` // Full name of the secret. For a nested secret @@ -230,7 +230,7 @@ type secretV2State struct { // *Available only for Vault Enterprise*. Namespace *string `pulumi:"namespace"` // An object that holds option settings. - Options map[string]interface{} `pulumi:"options"` + Options map[string]string `pulumi:"options"` // Full path where the KV-V2 secret will be written. Path *string `pulumi:"path"` } @@ -249,7 +249,7 @@ type SecretV2State struct { // Vault and whose values are the corresponding values. This map can only // represent string data, so any non-string values returned from Vault are // serialized as JSON. - Data pulumi.MapInput + Data pulumi.StringMapInput // JSON-encoded string that will be // written as the secret data at the given path. DataJson pulumi.StringPtrInput @@ -260,7 +260,7 @@ type SecretV2State struct { // note: drift won't be detected. DisableRead pulumi.BoolPtrInput // Metadata associated with this secret read from Vault. - Metadata pulumi.MapInput + Metadata pulumi.StringMapInput // Path where KV-V2 engine is mounted. Mount pulumi.StringPtrInput // Full name of the secret. For a nested secret @@ -274,7 +274,7 @@ type SecretV2State struct { // *Available only for Vault Enterprise*. Namespace pulumi.StringPtrInput // An object that holds option settings. - Options pulumi.MapInput + Options pulumi.StringMapInput // Full path where the KV-V2 secret will be written. Path pulumi.StringPtrInput } @@ -315,7 +315,7 @@ type secretV2Args struct { // *Available only for Vault Enterprise*. Namespace *string `pulumi:"namespace"` // An object that holds option settings. - Options map[string]interface{} `pulumi:"options"` + Options map[string]string `pulumi:"options"` } // The set of arguments for constructing a SecretV2 resource. @@ -351,7 +351,7 @@ type SecretV2Args struct { // *Available only for Vault Enterprise*. Namespace pulumi.StringPtrInput // An object that holds option settings. - Options pulumi.MapInput + Options pulumi.StringMapInput } func (SecretV2Args) ElementType() reflect.Type { @@ -460,8 +460,8 @@ func (o SecretV2Output) CustomMetadata() SecretV2CustomMetadataOutput { // Vault and whose values are the corresponding values. This map can only // represent string data, so any non-string values returned from Vault are // serialized as JSON. -func (o SecretV2Output) Data() pulumi.MapOutput { - return o.ApplyT(func(v *SecretV2) pulumi.MapOutput { return v.Data }).(pulumi.MapOutput) +func (o SecretV2Output) Data() pulumi.StringMapOutput { + return o.ApplyT(func(v *SecretV2) pulumi.StringMapOutput { return v.Data }).(pulumi.StringMapOutput) } // JSON-encoded string that will be @@ -483,8 +483,8 @@ func (o SecretV2Output) DisableRead() pulumi.BoolPtrOutput { } // Metadata associated with this secret read from Vault. -func (o SecretV2Output) Metadata() pulumi.MapOutput { - return o.ApplyT(func(v *SecretV2) pulumi.MapOutput { return v.Metadata }).(pulumi.MapOutput) +func (o SecretV2Output) Metadata() pulumi.StringMapOutput { + return o.ApplyT(func(v *SecretV2) pulumi.StringMapOutput { return v.Metadata }).(pulumi.StringMapOutput) } // Path where KV-V2 engine is mounted. @@ -509,8 +509,8 @@ func (o SecretV2Output) Namespace() pulumi.StringPtrOutput { } // An object that holds option settings. -func (o SecretV2Output) Options() pulumi.MapOutput { - return o.ApplyT(func(v *SecretV2) pulumi.MapOutput { return v.Options }).(pulumi.MapOutput) +func (o SecretV2Output) Options() pulumi.StringMapOutput { + return o.ApplyT(func(v *SecretV2) pulumi.StringMapOutput { return v.Options }).(pulumi.StringMapOutput) } // Full path where the KV-V2 secret will be written. diff --git a/sdk/go/vault/ldap/secretBackend.go b/sdk/go/vault/ldap/secretBackend.go index ca9d210bc..670e720ab 100644 --- a/sdk/go/vault/ldap/secretBackend.go +++ b/sdk/go/vault/ldap/secretBackend.go @@ -105,7 +105,7 @@ type SecretBackend struct { // *Available only for Vault Enterprise*. Namespace pulumi.StringPtrOutput `pulumi:"namespace"` // Specifies mount type specific options that are passed to the backend - Options pulumi.MapOutput `pulumi:"options"` + Options pulumi.StringMapOutput `pulumi:"options"` // List of headers to allow and pass from the request to the plugin PassthroughRequestHeaders pulumi.StringArrayOutput `pulumi:"passthroughRequestHeaders"` // Name of the password policy to use to generate passwords. @@ -241,7 +241,7 @@ type secretBackendState struct { // *Available only for Vault Enterprise*. Namespace *string `pulumi:"namespace"` // Specifies mount type specific options that are passed to the backend - Options map[string]interface{} `pulumi:"options"` + Options map[string]string `pulumi:"options"` // List of headers to allow and pass from the request to the plugin PassthroughRequestHeaders []string `pulumi:"passthroughRequestHeaders"` // Name of the password policy to use to generate passwords. @@ -327,7 +327,7 @@ type SecretBackendState struct { // *Available only for Vault Enterprise*. Namespace pulumi.StringPtrInput // Specifies mount type specific options that are passed to the backend - Options pulumi.MapInput + Options pulumi.StringMapInput // List of headers to allow and pass from the request to the plugin PassthroughRequestHeaders pulumi.StringArrayInput // Name of the password policy to use to generate passwords. @@ -415,7 +415,7 @@ type secretBackendArgs struct { // *Available only for Vault Enterprise*. Namespace *string `pulumi:"namespace"` // Specifies mount type specific options that are passed to the backend - Options map[string]interface{} `pulumi:"options"` + Options map[string]string `pulumi:"options"` // List of headers to allow and pass from the request to the plugin PassthroughRequestHeaders []string `pulumi:"passthroughRequestHeaders"` // Name of the password policy to use to generate passwords. @@ -500,7 +500,7 @@ type SecretBackendArgs struct { // *Available only for Vault Enterprise*. Namespace pulumi.StringPtrInput // Specifies mount type specific options that are passed to the backend - Options pulumi.MapInput + Options pulumi.StringMapInput // List of headers to allow and pass from the request to the plugin PassthroughRequestHeaders pulumi.StringArrayInput // Name of the password policy to use to generate passwords. @@ -738,8 +738,8 @@ func (o SecretBackendOutput) Namespace() pulumi.StringPtrOutput { } // Specifies mount type specific options that are passed to the backend -func (o SecretBackendOutput) Options() pulumi.MapOutput { - return o.ApplyT(func(v *SecretBackend) pulumi.MapOutput { return v.Options }).(pulumi.MapOutput) +func (o SecretBackendOutput) Options() pulumi.StringMapOutput { + return o.ApplyT(func(v *SecretBackend) pulumi.StringMapOutput { return v.Options }).(pulumi.StringMapOutput) } // List of headers to allow and pass from the request to the plugin diff --git a/sdk/go/vault/mount.go b/sdk/go/vault/mount.go index 4cf24281a..4d1d16074 100644 --- a/sdk/go/vault/mount.go +++ b/sdk/go/vault/mount.go @@ -57,9 +57,9 @@ import ( // _, err := vault.NewMount(ctx, "kvv2-example", &vault.MountArgs{ // Path: pulumi.String("version2-example"), // Type: pulumi.String("kv-v2"), -// Options: pulumi.Map{ -// "version": pulumi.Any("2"), -// "type": pulumi.Any("kv-v2"), +// Options: pulumi.StringMap{ +// "version": pulumi.String("2"), +// "type": pulumi.String("kv-v2"), // }, // Description: pulumi.String("This is an example KV Version 2 secret engine mount"), // }) @@ -88,8 +88,8 @@ import ( // Path: pulumi.String("transit-example"), // Type: pulumi.String("transit"), // Description: pulumi.String("This is an example transit secret engine mount"), -// Options: pulumi.Map{ -// "convergent_encryption": pulumi.Any(false), +// Options: pulumi.StringMap{ +// "convergent_encryption": pulumi.String("false"), // }, // }) // if err != nil { @@ -175,7 +175,7 @@ type Mount struct { // *Available only for Vault Enterprise*. Namespace pulumi.StringPtrOutput `pulumi:"namespace"` // Specifies mount type specific options that are passed to the backend - Options pulumi.MapOutput `pulumi:"options"` + Options pulumi.StringMapOutput `pulumi:"options"` // List of headers to allow and pass from the request to // the plugin. PassthroughRequestHeaders pulumi.StringArrayOutput `pulumi:"passthroughRequestHeaders"` @@ -263,7 +263,7 @@ type mountState struct { // *Available only for Vault Enterprise*. Namespace *string `pulumi:"namespace"` // Specifies mount type specific options that are passed to the backend - Options map[string]interface{} `pulumi:"options"` + Options map[string]string `pulumi:"options"` // List of headers to allow and pass from the request to // the plugin. PassthroughRequestHeaders []string `pulumi:"passthroughRequestHeaders"` @@ -316,7 +316,7 @@ type MountState struct { // *Available only for Vault Enterprise*. Namespace pulumi.StringPtrInput // Specifies mount type specific options that are passed to the backend - Options pulumi.MapInput + Options pulumi.StringMapInput // List of headers to allow and pass from the request to // the plugin. PassthroughRequestHeaders pulumi.StringArrayInput @@ -371,7 +371,7 @@ type mountArgs struct { // *Available only for Vault Enterprise*. Namespace *string `pulumi:"namespace"` // Specifies mount type specific options that are passed to the backend - Options map[string]interface{} `pulumi:"options"` + Options map[string]string `pulumi:"options"` // List of headers to allow and pass from the request to // the plugin. PassthroughRequestHeaders []string `pulumi:"passthroughRequestHeaders"` @@ -423,7 +423,7 @@ type MountArgs struct { // *Available only for Vault Enterprise*. Namespace pulumi.StringPtrInput // Specifies mount type specific options that are passed to the backend - Options pulumi.MapInput + Options pulumi.StringMapInput // List of headers to allow and pass from the request to // the plugin. PassthroughRequestHeaders pulumi.StringArrayInput @@ -604,8 +604,8 @@ func (o MountOutput) Namespace() pulumi.StringPtrOutput { } // Specifies mount type specific options that are passed to the backend -func (o MountOutput) Options() pulumi.MapOutput { - return o.ApplyT(func(v *Mount) pulumi.MapOutput { return v.Options }).(pulumi.MapOutput) +func (o MountOutput) Options() pulumi.StringMapOutput { + return o.ApplyT(func(v *Mount) pulumi.StringMapOutput { return v.Options }).(pulumi.StringMapOutput) } // List of headers to allow and pass from the request to diff --git a/sdk/go/vault/namespace.go b/sdk/go/vault/namespace.go index 83fd0493c..6dd0dc126 100644 --- a/sdk/go/vault/namespace.go +++ b/sdk/go/vault/namespace.go @@ -66,7 +66,7 @@ type Namespace struct { // Custom metadata describing this namespace. Value type // is `map[string]string`. Requires Vault version 1.12+. - CustomMetadata pulumi.MapOutput `pulumi:"customMetadata"` + CustomMetadata pulumi.StringMapOutput `pulumi:"customMetadata"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace). @@ -116,7 +116,7 @@ func GetNamespace(ctx *pulumi.Context, type namespaceState struct { // Custom metadata describing this namespace. Value type // is `map[string]string`. Requires Vault version 1.12+. - CustomMetadata map[string]interface{} `pulumi:"customMetadata"` + CustomMetadata map[string]string `pulumi:"customMetadata"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace). @@ -134,7 +134,7 @@ type namespaceState struct { type NamespaceState struct { // Custom metadata describing this namespace. Value type // is `map[string]string`. Requires Vault version 1.12+. - CustomMetadata pulumi.MapInput + CustomMetadata pulumi.StringMapInput // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace). @@ -156,7 +156,7 @@ func (NamespaceState) ElementType() reflect.Type { type namespaceArgs struct { // Custom metadata describing this namespace. Value type // is `map[string]string`. Requires Vault version 1.12+. - CustomMetadata map[string]interface{} `pulumi:"customMetadata"` + CustomMetadata map[string]string `pulumi:"customMetadata"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace). @@ -173,7 +173,7 @@ type namespaceArgs struct { type NamespaceArgs struct { // Custom metadata describing this namespace. Value type // is `map[string]string`. Requires Vault version 1.12+. - CustomMetadata pulumi.MapInput + CustomMetadata pulumi.StringMapInput // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace). @@ -275,8 +275,8 @@ func (o NamespaceOutput) ToNamespaceOutputWithContext(ctx context.Context) Names // Custom metadata describing this namespace. Value type // is `map[string]string`. Requires Vault version 1.12+. -func (o NamespaceOutput) CustomMetadata() pulumi.MapOutput { - return o.ApplyT(func(v *Namespace) pulumi.MapOutput { return v.CustomMetadata }).(pulumi.MapOutput) +func (o NamespaceOutput) CustomMetadata() pulumi.StringMapOutput { + return o.ApplyT(func(v *Namespace) pulumi.StringMapOutput { return v.CustomMetadata }).(pulumi.StringMapOutput) } // The namespace to provision the resource in. diff --git a/sdk/go/vault/pkisecret/backendConfigEst.go b/sdk/go/vault/pkisecret/backendConfigEst.go index 23fdf738f..337fd96eb 100644 --- a/sdk/go/vault/pkisecret/backendConfigEst.go +++ b/sdk/go/vault/pkisecret/backendConfigEst.go @@ -44,7 +44,7 @@ type BackendConfigEst struct { // Specifies whether EST is enabled. Enabled pulumi.BoolPtrOutput `pulumi:"enabled"` // Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:. Labels must be unique across Vault cluster, and will register .well-known/est/