diff --git a/README.md b/README.md
index c434448..6851f76 100644
--- a/README.md
+++ b/README.md
@@ -166,13 +166,13 @@ No modules.
| [name](#input\_name) | Friendly name of the new secret. The secret name can consist of uppercase letters, lowercase letters, digits, and any of the following characters: `/_+=.@-` | `string` | `null` | no |
| [name\_prefix](#input\_name\_prefix) | Creates a unique name beginning with the specified prefix | `string` | `null` | no |
| [override\_policy\_documents](#input\_override\_policy\_documents) | List of IAM policy documents that are merged together into the exported document. In merging, statements with non-blank `sid`s will override statements with the same `sid` | `list(string)` | `[]` | no |
-| [policy\_statements](#input\_policy\_statements) | A map of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) for custom permission usage | `any` | `{}` | no |
+| [policy\_statements](#input\_policy\_statements) | A map of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) for custom permission usage | `map(any)` | `{}` | no |
| [random\_password\_length](#input\_random\_password\_length) | The length of the generated random password | `number` | `32` | no |
| [random\_password\_override\_special](#input\_random\_password\_override\_special) | Supply your own list of special characters to use for string generation. This overrides the default character list in the special argument | `string` | `"!@#$%&*()-_=+[]{}<>:?"` | no |
| [recovery\_window\_in\_days](#input\_recovery\_window\_in\_days) | Number of days that AWS Secrets Manager waits before it can delete the secret. This value can be `0` to force deletion without recovery or range from `7` to `30` days. The default value is `30` | `number` | `null` | no |
-| [replica](#input\_replica) | Configuration block to support secret replication | `any` | `{}` | no |
+| [replica](#input\_replica) | Configuration block to support secret replication | `map(any)` | `{}` | no |
| [rotation\_lambda\_arn](#input\_rotation\_lambda\_arn) | Specifies the ARN of the Lambda function that can rotate the secret | `string` | `""` | no |
-| [rotation\_rules](#input\_rotation\_rules) | A structure that defines the rotation configuration for this secret | `any` | `{}` | no |
+| [rotation\_rules](#input\_rotation\_rules) | A structure that defines the rotation configuration for this secret | `map(any)` | `{}` | no |
| [secret\_binary](#input\_secret\_binary) | Specifies binary data that you want to encrypt and store in this version of the secret. This is required if `secret_string` is not set. Needs to be encoded to base64 | `string` | `null` | no |
| [secret\_string](#input\_secret\_string) | Specifies text data that you want to encrypt and store in this version of the secret. This is required if `secret_binary` is not set | `string` | `null` | no |
| [source\_policy\_documents](#input\_source\_policy\_documents) | List of IAM policy documents that are merged together into the exported document. Statements must have unique `sid`s | `list(string)` | `[]` | no |
diff --git a/examples/complete/README.md b/examples/complete/README.md
index fef48e4..5e15845 100644
--- a/examples/complete/README.md
+++ b/examples/complete/README.md
@@ -41,7 +41,7 @@ Note that this example may create resources which will incur monetary charges on
| Name | Source | Version |
|------|--------|---------|
-| [lambda](#module\_lambda) | terraform-aws-modules/lambda/aws | ~> 5.0 |
+| [lambda](#module\_lambda) | terraform-aws-modules/lambda/aws | ~> 6.0 |
| [secrets\_manager](#module\_secrets\_manager) | ../.. | n/a |
| [secrets\_manager\_disabled](#module\_secrets\_manager\_disabled) | ../.. | n/a |
| [secrets\_manager\_rotate](#module\_secrets\_manager\_rotate) | ../.. | n/a |
diff --git a/examples/complete/main.tf b/examples/complete/main.tf
index ad23794..4c2be4e 100644
--- a/examples/complete/main.tf
+++ b/examples/complete/main.tf
@@ -152,7 +152,7 @@ data "aws_iam_policy_document" "this" {
module "lambda" {
source = "terraform-aws-modules/lambda/aws"
- version = "~> 5.0"
+ version = "~> 6.0"
function_name = local.name
description = "Example Secrets Manager secret rotation lambda function"
diff --git a/variables.tf b/variables.tf
index 1f8c1b0..b4b915a 100644
--- a/variables.tf
+++ b/variables.tf
@@ -52,7 +52,7 @@ variable "recovery_window_in_days" {
variable "replica" {
description = "Configuration block to support secret replication"
- type = any
+ type = map(any)
default = {}
}
@@ -80,7 +80,7 @@ variable "override_policy_documents" {
variable "policy_statements" {
description = "A map of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) for custom permission usage"
- type = any
+ type = map(any)
default = {}
}
@@ -154,6 +154,6 @@ variable "rotation_lambda_arn" {
variable "rotation_rules" {
description = "A structure that defines the rotation configuration for this secret"
- type = any
+ type = map(any)
default = {}
}