pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723820369__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +0 -560
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +4 -19
  4. pulumi_vault/ad/secret_backend.py +0 -5
  5. pulumi_vault/ad/secret_library.py +0 -5
  6. pulumi_vault/ad/secret_role.py +0 -5
  7. pulumi_vault/alicloud/auth_backend_role.py +0 -5
  8. pulumi_vault/approle/auth_backend_login.py +0 -5
  9. pulumi_vault/approle/auth_backend_role.py +0 -5
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
  11. pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
  12. pulumi_vault/audit.py +0 -5
  13. pulumi_vault/audit_request_header.py +0 -5
  14. pulumi_vault/auth_backend.py +0 -5
  15. pulumi_vault/aws/auth_backend_cert.py +0 -5
  16. pulumi_vault/aws/auth_backend_client.py +0 -5
  17. pulumi_vault/aws/auth_backend_config_identity.py +0 -5
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
  19. pulumi_vault/aws/auth_backend_login.py +0 -5
  20. pulumi_vault/aws/auth_backend_role.py +0 -5
  21. pulumi_vault/aws/auth_backend_role_tag.py +0 -5
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
  23. pulumi_vault/aws/auth_backend_sts_role.py +0 -5
  24. pulumi_vault/aws/get_access_credentials.py +4 -31
  25. pulumi_vault/aws/get_static_access_credentials.py +4 -18
  26. pulumi_vault/aws/secret_backend.py +0 -5
  27. pulumi_vault/aws/secret_backend_role.py +0 -5
  28. pulumi_vault/aws/secret_backend_static_role.py +0 -5
  29. pulumi_vault/azure/_inputs.py +0 -24
  30. pulumi_vault/azure/auth_backend_config.py +0 -5
  31. pulumi_vault/azure/auth_backend_role.py +0 -5
  32. pulumi_vault/azure/backend.py +0 -5
  33. pulumi_vault/azure/backend_role.py +0 -5
  34. pulumi_vault/azure/get_access_credentials.py +4 -36
  35. pulumi_vault/azure/outputs.py +0 -5
  36. pulumi_vault/cert_auth_backend_role.py +0 -5
  37. pulumi_vault/config/__init__.pyi +0 -5
  38. pulumi_vault/config/_inputs.py +0 -21
  39. pulumi_vault/config/outputs.py +0 -5
  40. pulumi_vault/config/ui_custom_message.py +0 -5
  41. pulumi_vault/config/vars.py +0 -5
  42. pulumi_vault/consul/secret_backend.py +0 -5
  43. pulumi_vault/consul/secret_backend_role.py +0 -5
  44. pulumi_vault/database/_inputs.py +34 -2185
  45. pulumi_vault/database/outputs.py +0 -145
  46. pulumi_vault/database/secret_backend_connection.py +0 -5
  47. pulumi_vault/database/secret_backend_role.py +0 -5
  48. pulumi_vault/database/secret_backend_static_role.py +1 -69
  49. pulumi_vault/database/secrets_mount.py +0 -5
  50. pulumi_vault/egp_policy.py +0 -5
  51. pulumi_vault/gcp/_inputs.py +0 -111
  52. pulumi_vault/gcp/auth_backend.py +0 -5
  53. pulumi_vault/gcp/auth_backend_role.py +0 -5
  54. pulumi_vault/gcp/get_auth_backend_role.py +4 -42
  55. pulumi_vault/gcp/outputs.py +0 -5
  56. pulumi_vault/gcp/secret_backend.py +0 -5
  57. pulumi_vault/gcp/secret_impersonated_account.py +3 -62
  58. pulumi_vault/gcp/secret_roleset.py +0 -5
  59. pulumi_vault/gcp/secret_static_account.py +0 -5
  60. pulumi_vault/generic/endpoint.py +0 -5
  61. pulumi_vault/generic/get_secret.py +4 -24
  62. pulumi_vault/generic/secret.py +0 -5
  63. pulumi_vault/get_auth_backend.py +4 -21
  64. pulumi_vault/get_auth_backends.py +4 -16
  65. pulumi_vault/get_namespace.py +4 -17
  66. pulumi_vault/get_namespaces.py +4 -13
  67. pulumi_vault/get_nomad_access_token.py +4 -18
  68. pulumi_vault/get_policy_document.py +4 -15
  69. pulumi_vault/get_raft_autopilot_state.py +4 -23
  70. pulumi_vault/github/_inputs.py +0 -55
  71. pulumi_vault/github/auth_backend.py +0 -5
  72. pulumi_vault/github/outputs.py +0 -5
  73. pulumi_vault/github/team.py +0 -5
  74. pulumi_vault/github/user.py +0 -5
  75. pulumi_vault/identity/entity.py +0 -5
  76. pulumi_vault/identity/entity_alias.py +0 -5
  77. pulumi_vault/identity/entity_policies.py +0 -5
  78. pulumi_vault/identity/get_entity.py +4 -34
  79. pulumi_vault/identity/get_group.py +4 -40
  80. pulumi_vault/identity/get_oidc_client_creds.py +4 -16
  81. pulumi_vault/identity/get_oidc_openid_config.py +4 -26
  82. pulumi_vault/identity/get_oidc_public_keys.py +4 -15
  83. pulumi_vault/identity/group.py +0 -5
  84. pulumi_vault/identity/group_alias.py +0 -5
  85. pulumi_vault/identity/group_member_entity_ids.py +0 -5
  86. pulumi_vault/identity/group_member_group_ids.py +0 -5
  87. pulumi_vault/identity/group_policies.py +0 -5
  88. pulumi_vault/identity/mfa_duo.py +0 -5
  89. pulumi_vault/identity/mfa_login_enforcement.py +0 -5
  90. pulumi_vault/identity/mfa_okta.py +0 -5
  91. pulumi_vault/identity/mfa_pingid.py +0 -5
  92. pulumi_vault/identity/mfa_totp.py +0 -5
  93. pulumi_vault/identity/oidc.py +0 -5
  94. pulumi_vault/identity/oidc_assignment.py +0 -5
  95. pulumi_vault/identity/oidc_client.py +0 -5
  96. pulumi_vault/identity/oidc_key.py +0 -5
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
  98. pulumi_vault/identity/oidc_provider.py +0 -5
  99. pulumi_vault/identity/oidc_role.py +0 -5
  100. pulumi_vault/identity/oidc_scope.py +0 -5
  101. pulumi_vault/identity/outputs.py +0 -5
  102. pulumi_vault/jwt/_inputs.py +0 -55
  103. pulumi_vault/jwt/auth_backend.py +0 -5
  104. pulumi_vault/jwt/auth_backend_role.py +0 -5
  105. pulumi_vault/jwt/outputs.py +0 -5
  106. pulumi_vault/kmip/secret_backend.py +0 -5
  107. pulumi_vault/kmip/secret_role.py +0 -5
  108. pulumi_vault/kmip/secret_scope.py +0 -5
  109. pulumi_vault/kubernetes/auth_backend_config.py +3 -55
  110. pulumi_vault/kubernetes/auth_backend_role.py +0 -5
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
  113. pulumi_vault/kubernetes/get_service_account_token.py +4 -28
  114. pulumi_vault/kubernetes/secret_backend.py +0 -5
  115. pulumi_vault/kubernetes/secret_backend_role.py +0 -5
  116. pulumi_vault/kv/_inputs.py +0 -32
  117. pulumi_vault/kv/get_secret.py +4 -19
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -23
  119. pulumi_vault/kv/get_secret_v2.py +6 -25
  120. pulumi_vault/kv/get_secrets_list.py +4 -15
  121. pulumi_vault/kv/get_secrets_list_v2.py +4 -18
  122. pulumi_vault/kv/outputs.py +0 -5
  123. pulumi_vault/kv/secret.py +0 -5
  124. pulumi_vault/kv/secret_backend_v2.py +0 -5
  125. pulumi_vault/kv/secret_v2.py +0 -5
  126. pulumi_vault/ldap/auth_backend.py +0 -52
  127. pulumi_vault/ldap/auth_backend_group.py +0 -5
  128. pulumi_vault/ldap/auth_backend_user.py +0 -5
  129. pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
  130. pulumi_vault/ldap/get_static_credentials.py +4 -23
  131. pulumi_vault/ldap/secret_backend.py +0 -5
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
  133. pulumi_vault/ldap/secret_backend_library_set.py +0 -5
  134. pulumi_vault/ldap/secret_backend_static_role.py +0 -5
  135. pulumi_vault/managed/_inputs.py +0 -205
  136. pulumi_vault/managed/keys.py +0 -5
  137. pulumi_vault/managed/outputs.py +0 -5
  138. pulumi_vault/mfa_duo.py +0 -5
  139. pulumi_vault/mfa_okta.py +0 -5
  140. pulumi_vault/mfa_pingid.py +0 -5
  141. pulumi_vault/mfa_totp.py +0 -5
  142. pulumi_vault/mongodbatlas/secret_backend.py +0 -5
  143. pulumi_vault/mongodbatlas/secret_role.py +0 -5
  144. pulumi_vault/mount.py +0 -5
  145. pulumi_vault/namespace.py +0 -5
  146. pulumi_vault/nomad_secret_backend.py +0 -5
  147. pulumi_vault/nomad_secret_role.py +0 -5
  148. pulumi_vault/okta/_inputs.py +0 -39
  149. pulumi_vault/okta/auth_backend.py +0 -5
  150. pulumi_vault/okta/auth_backend_group.py +0 -5
  151. pulumi_vault/okta/auth_backend_user.py +0 -5
  152. pulumi_vault/okta/outputs.py +0 -5
  153. pulumi_vault/outputs.py +0 -5
  154. pulumi_vault/password_policy.py +0 -5
  155. pulumi_vault/pkisecret/_inputs.py +0 -41
  156. pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
  157. pulumi_vault/pkisecret/backend_config_est.py +0 -5
  158. pulumi_vault/pkisecret/get_backend_config_est.py +4 -22
  159. pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
  160. pulumi_vault/pkisecret/get_backend_issuers.py +4 -17
  161. pulumi_vault/pkisecret/get_backend_key.py +4 -19
  162. pulumi_vault/pkisecret/get_backend_keys.py +4 -17
  163. pulumi_vault/pkisecret/outputs.py +0 -5
  164. pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
  172. pulumi_vault/pkisecret/secret_backend_key.py +0 -5
  173. pulumi_vault/pkisecret/secret_backend_role.py +0 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
  176. pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
  177. pulumi_vault/plugin.py +0 -5
  178. pulumi_vault/plugin_pinned_version.py +0 -5
  179. pulumi_vault/policy.py +0 -5
  180. pulumi_vault/provider.py +0 -5
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +0 -5
  183. pulumi_vault/quota_rate_limit.py +0 -5
  184. pulumi_vault/rabbitmq/_inputs.py +0 -61
  185. pulumi_vault/rabbitmq/outputs.py +0 -5
  186. pulumi_vault/rabbitmq/secret_backend.py +0 -5
  187. pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
  188. pulumi_vault/raft_autopilot.py +0 -5
  189. pulumi_vault/raft_snapshot_agent_config.py +0 -5
  190. pulumi_vault/rgp_policy.py +0 -5
  191. pulumi_vault/saml/auth_backend.py +0 -5
  192. pulumi_vault/saml/auth_backend_role.py +0 -5
  193. pulumi_vault/secrets/_inputs.py +0 -30
  194. pulumi_vault/secrets/outputs.py +0 -5
  195. pulumi_vault/secrets/sync_association.py +0 -5
  196. pulumi_vault/secrets/sync_aws_destination.py +0 -5
  197. pulumi_vault/secrets/sync_azure_destination.py +0 -5
  198. pulumi_vault/secrets/sync_config.py +0 -5
  199. pulumi_vault/secrets/sync_gcp_destination.py +0 -5
  200. pulumi_vault/secrets/sync_gh_destination.py +0 -5
  201. pulumi_vault/secrets/sync_github_apps.py +0 -5
  202. pulumi_vault/secrets/sync_vercel_destination.py +0 -5
  203. pulumi_vault/ssh/_inputs.py +0 -22
  204. pulumi_vault/ssh/outputs.py +0 -5
  205. pulumi_vault/ssh/secret_backend_ca.py +0 -5
  206. pulumi_vault/ssh/secret_backend_role.py +0 -39
  207. pulumi_vault/terraformcloud/secret_backend.py +0 -5
  208. pulumi_vault/terraformcloud/secret_creds.py +0 -5
  209. pulumi_vault/terraformcloud/secret_role.py +0 -5
  210. pulumi_vault/token.py +0 -5
  211. pulumi_vault/tokenauth/auth_backend_role.py +14 -5
  212. pulumi_vault/transform/alphabet.py +0 -5
  213. pulumi_vault/transform/get_decode.py +4 -28
  214. pulumi_vault/transform/get_encode.py +4 -28
  215. pulumi_vault/transform/role.py +0 -5
  216. pulumi_vault/transform/template.py +0 -5
  217. pulumi_vault/transform/transformation.py +0 -5
  218. pulumi_vault/transit/get_decrypt.py +4 -21
  219. pulumi_vault/transit/get_encrypt.py +4 -23
  220. pulumi_vault/transit/secret_backend_key.py +0 -5
  221. pulumi_vault/transit/secret_cache_config.py +0 -5
  222. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/METADATA +2 -3
  223. pulumi_vault-6.4.0a1723820369.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.4.0.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/top_level.txt +0 -0
@@ -4,53 +4,18 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
18
13
  'AuthBackendCustomEndpointArgs',
19
- 'AuthBackendCustomEndpointArgsDict',
20
14
  'AuthBackendTuneArgs',
21
- 'AuthBackendTuneArgsDict',
22
15
  'SecretRolesetBindingArgs',
23
- 'SecretRolesetBindingArgsDict',
24
16
  'SecretStaticAccountBindingArgs',
25
- 'SecretStaticAccountBindingArgsDict',
26
17
  ]
27
18
 
28
- MYPY = False
29
-
30
- if not MYPY:
31
- class AuthBackendCustomEndpointArgsDict(TypedDict):
32
- api: NotRequired[pulumi.Input[str]]
33
- """
34
- Replaces the service endpoint used in API requests to `https://www.googleapis.com`.
35
- """
36
- compute: NotRequired[pulumi.Input[str]]
37
- """
38
- Replaces the service endpoint used in API requests to `https://compute.googleapis.com`.
39
-
40
- The endpoint value provided for a given key has the form of `scheme://host:port`.
41
- The `scheme://` and `:port` portions of the endpoint value are optional.
42
- """
43
- crm: NotRequired[pulumi.Input[str]]
44
- """
45
- Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`.
46
- """
47
- iam: NotRequired[pulumi.Input[str]]
48
- """
49
- Replaces the service endpoint used in API requests to `https://iam.googleapis.com`.
50
- """
51
- elif False:
52
- AuthBackendCustomEndpointArgsDict: TypeAlias = Mapping[str, Any]
53
-
54
19
  @pulumi.input_type
55
20
  class AuthBackendCustomEndpointArgs:
56
21
  def __init__(__self__, *,
@@ -128,56 +93,6 @@ class AuthBackendCustomEndpointArgs:
128
93
  pulumi.set(self, "iam", value)
129
94
 
130
95
 
131
- if not MYPY:
132
- class AuthBackendTuneArgsDict(TypedDict):
133
- allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
134
- """
135
- List of headers to whitelist and allowing
136
- a plugin to include them in the response.
137
- """
138
- audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
139
- """
140
- Specifies the list of keys that will
141
- not be HMAC'd by audit devices in the request data object.
142
- """
143
- audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
144
- """
145
- Specifies the list of keys that will
146
- not be HMAC'd by audit devices in the response data object.
147
- """
148
- default_lease_ttl: NotRequired[pulumi.Input[str]]
149
- """
150
- Specifies the default time-to-live.
151
- If set, this overrides the global default.
152
- Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
153
- """
154
- listing_visibility: NotRequired[pulumi.Input[str]]
155
- """
156
- Specifies whether to show this mount in
157
- the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
158
- """
159
- max_lease_ttl: NotRequired[pulumi.Input[str]]
160
- """
161
- Specifies the maximum time-to-live.
162
- If set, this overrides the global default.
163
- Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
164
- """
165
- passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
166
- """
167
- List of headers to whitelist and
168
- pass from the request to the backend.
169
- """
170
- token_type: NotRequired[pulumi.Input[str]]
171
- """
172
- Specifies the type of tokens that should be returned by
173
- the mount. Valid values are "default-service", "default-batch", "service", "batch".
174
-
175
-
176
- For more details on the usage of each argument consult the [Vault GCP API documentation](https://www.vaultproject.io/api-docs/auth/gcp#configure).
177
- """
178
- elif False:
179
- AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
180
-
181
96
  @pulumi.input_type
182
97
  class AuthBackendTuneArgs:
183
98
  def __init__(__self__, *,
@@ -339,19 +254,6 @@ class AuthBackendTuneArgs:
339
254
  pulumi.set(self, "token_type", value)
340
255
 
341
256
 
342
- if not MYPY:
343
- class SecretRolesetBindingArgsDict(TypedDict):
344
- resource: pulumi.Input[str]
345
- """
346
- Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#roleset-bindings).
347
- """
348
- roles: pulumi.Input[Sequence[pulumi.Input[str]]]
349
- """
350
- List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
351
- """
352
- elif False:
353
- SecretRolesetBindingArgsDict: TypeAlias = Mapping[str, Any]
354
-
355
257
  @pulumi.input_type
356
258
  class SecretRolesetBindingArgs:
357
259
  def __init__(__self__, *,
@@ -389,19 +291,6 @@ class SecretRolesetBindingArgs:
389
291
  pulumi.set(self, "roles", value)
390
292
 
391
293
 
392
- if not MYPY:
393
- class SecretStaticAccountBindingArgsDict(TypedDict):
394
- resource: pulumi.Input[str]
395
- """
396
- Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#bindings).
397
- """
398
- roles: pulumi.Input[Sequence[pulumi.Input[str]]]
399
- """
400
- List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
401
- """
402
- elif False:
403
- SecretStaticAccountBindingArgsDict: TypeAlias = Mapping[str, Any]
404
-
405
294
  @pulumi.input_type
406
295
  class SecretStaticAccountBindingArgs:
407
296
  def __init__(__self__, *,
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -398,6 +393,9 @@ def get_auth_backend_role(backend: Optional[str] = None,
398
393
  token_ttl=pulumi.get(__ret__, 'token_ttl'),
399
394
  token_type=pulumi.get(__ret__, 'token_type'),
400
395
  type=pulumi.get(__ret__, 'type'))
396
+
397
+
398
+ @_utilities.lift_output_func(get_auth_backend_role)
401
399
  def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]] = None,
402
400
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
403
401
  role_name: Optional[pulumi.Input[str]] = None,
@@ -460,40 +458,4 @@ def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]]
460
458
  `default-service` and `default-batch` which specify the type to return unless the client
461
459
  requests a different type at generation time.
462
460
  """
463
- __args__ = dict()
464
- __args__['backend'] = backend
465
- __args__['namespace'] = namespace
466
- __args__['roleName'] = role_name
467
- __args__['tokenBoundCidrs'] = token_bound_cidrs
468
- __args__['tokenExplicitMaxTtl'] = token_explicit_max_ttl
469
- __args__['tokenMaxTtl'] = token_max_ttl
470
- __args__['tokenNoDefaultPolicy'] = token_no_default_policy
471
- __args__['tokenNumUses'] = token_num_uses
472
- __args__['tokenPeriod'] = token_period
473
- __args__['tokenPolicies'] = token_policies
474
- __args__['tokenTtl'] = token_ttl
475
- __args__['tokenType'] = token_type
476
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
477
- __ret__ = pulumi.runtime.invoke_output('vault:gcp/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult)
478
- return __ret__.apply(lambda __response__: GetAuthBackendRoleResult(
479
- backend=pulumi.get(__response__, 'backend'),
480
- bound_instance_groups=pulumi.get(__response__, 'bound_instance_groups'),
481
- bound_labels=pulumi.get(__response__, 'bound_labels'),
482
- bound_projects=pulumi.get(__response__, 'bound_projects'),
483
- bound_regions=pulumi.get(__response__, 'bound_regions'),
484
- bound_service_accounts=pulumi.get(__response__, 'bound_service_accounts'),
485
- bound_zones=pulumi.get(__response__, 'bound_zones'),
486
- id=pulumi.get(__response__, 'id'),
487
- namespace=pulumi.get(__response__, 'namespace'),
488
- role_id=pulumi.get(__response__, 'role_id'),
489
- role_name=pulumi.get(__response__, 'role_name'),
490
- token_bound_cidrs=pulumi.get(__response__, 'token_bound_cidrs'),
491
- token_explicit_max_ttl=pulumi.get(__response__, 'token_explicit_max_ttl'),
492
- token_max_ttl=pulumi.get(__response__, 'token_max_ttl'),
493
- token_no_default_policy=pulumi.get(__response__, 'token_no_default_policy'),
494
- token_num_uses=pulumi.get(__response__, 'token_num_uses'),
495
- token_period=pulumi.get(__response__, 'token_period'),
496
- token_policies=pulumi.get(__response__, 'token_policies'),
497
- token_ttl=pulumi.get(__response__, 'token_ttl'),
498
- token_type=pulumi.get(__response__, 'token_type'),
499
- type=pulumi.get(__response__, 'type')))
461
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretImpersonatedAccountArgs', 'SecretImpersonatedAccount']
@@ -23,8 +18,7 @@ class SecretImpersonatedAccountArgs:
23
18
  impersonated_account: pulumi.Input[str],
24
19
  service_account_email: pulumi.Input[str],
25
20
  namespace: Optional[pulumi.Input[str]] = None,
26
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
27
- ttl: Optional[pulumi.Input[str]] = None):
21
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
28
22
  """
29
23
  The set of arguments for constructing a SecretImpersonatedAccount resource.
30
24
  :param pulumi.Input[str] backend: Path where the GCP Secrets Engine is mounted
@@ -32,8 +26,6 @@ class SecretImpersonatedAccountArgs:
32
26
  :param pulumi.Input[str] service_account_email: Email of the GCP service account to impersonate.
33
27
  :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
34
28
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
35
- :param pulumi.Input[str] ttl: Specifies the default TTL for service principals generated using this role.
36
- Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
37
29
  """
38
30
  pulumi.set(__self__, "backend", backend)
39
31
  pulumi.set(__self__, "impersonated_account", impersonated_account)
@@ -42,8 +34,6 @@ class SecretImpersonatedAccountArgs:
42
34
  pulumi.set(__self__, "namespace", namespace)
43
35
  if token_scopes is not None:
44
36
  pulumi.set(__self__, "token_scopes", token_scopes)
45
- if ttl is not None:
46
- pulumi.set(__self__, "ttl", ttl)
47
37
 
48
38
  @property
49
39
  @pulumi.getter
@@ -105,19 +95,6 @@ class SecretImpersonatedAccountArgs:
105
95
  def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
106
96
  pulumi.set(self, "token_scopes", value)
107
97
 
108
- @property
109
- @pulumi.getter
110
- def ttl(self) -> Optional[pulumi.Input[str]]:
111
- """
112
- Specifies the default TTL for service principals generated using this role.
113
- Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
114
- """
115
- return pulumi.get(self, "ttl")
116
-
117
- @ttl.setter
118
- def ttl(self, value: Optional[pulumi.Input[str]]):
119
- pulumi.set(self, "ttl", value)
120
-
121
98
 
122
99
  @pulumi.input_type
123
100
  class _SecretImpersonatedAccountState:
@@ -127,8 +104,7 @@ class _SecretImpersonatedAccountState:
127
104
  namespace: Optional[pulumi.Input[str]] = None,
128
105
  service_account_email: Optional[pulumi.Input[str]] = None,
129
106
  service_account_project: Optional[pulumi.Input[str]] = None,
130
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
131
- ttl: Optional[pulumi.Input[str]] = None):
107
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
132
108
  """
133
109
  Input properties used for looking up and filtering SecretImpersonatedAccount resources.
134
110
  :param pulumi.Input[str] backend: Path where the GCP Secrets Engine is mounted
@@ -137,8 +113,6 @@ class _SecretImpersonatedAccountState:
137
113
  :param pulumi.Input[str] service_account_email: Email of the GCP service account to impersonate.
138
114
  :param pulumi.Input[str] service_account_project: Project the service account belongs to.
139
115
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
140
- :param pulumi.Input[str] ttl: Specifies the default TTL for service principals generated using this role.
141
- Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
142
116
  """
143
117
  if backend is not None:
144
118
  pulumi.set(__self__, "backend", backend)
@@ -152,8 +126,6 @@ class _SecretImpersonatedAccountState:
152
126
  pulumi.set(__self__, "service_account_project", service_account_project)
153
127
  if token_scopes is not None:
154
128
  pulumi.set(__self__, "token_scopes", token_scopes)
155
- if ttl is not None:
156
- pulumi.set(__self__, "ttl", ttl)
157
129
 
158
130
  @property
159
131
  @pulumi.getter
@@ -227,19 +199,6 @@ class _SecretImpersonatedAccountState:
227
199
  def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
228
200
  pulumi.set(self, "token_scopes", value)
229
201
 
230
- @property
231
- @pulumi.getter
232
- def ttl(self) -> Optional[pulumi.Input[str]]:
233
- """
234
- Specifies the default TTL for service principals generated using this role.
235
- Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
236
- """
237
- return pulumi.get(self, "ttl")
238
-
239
- @ttl.setter
240
- def ttl(self, value: Optional[pulumi.Input[str]]):
241
- pulumi.set(self, "ttl", value)
242
-
243
202
 
244
203
  class SecretImpersonatedAccount(pulumi.CustomResource):
245
204
  @overload
@@ -251,7 +210,6 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
251
210
  namespace: Optional[pulumi.Input[str]] = None,
252
211
  service_account_email: Optional[pulumi.Input[str]] = None,
253
212
  token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
254
- ttl: Optional[pulumi.Input[str]] = None,
255
213
  __props__=None):
256
214
  """
257
215
  Creates a Impersonated Account in the [GCP Secrets Engine](https://www.vaultproject.io/docs/secrets/gcp/index.html) for Vault.
@@ -293,8 +251,6 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
293
251
  :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
294
252
  :param pulumi.Input[str] service_account_email: Email of the GCP service account to impersonate.
295
253
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
296
- :param pulumi.Input[str] ttl: Specifies the default TTL for service principals generated using this role.
297
- Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
298
254
  """
299
255
  ...
300
256
  @overload
@@ -355,7 +311,6 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
355
311
  namespace: Optional[pulumi.Input[str]] = None,
356
312
  service_account_email: Optional[pulumi.Input[str]] = None,
357
313
  token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
358
- ttl: Optional[pulumi.Input[str]] = None,
359
314
  __props__=None):
360
315
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
361
316
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -376,7 +331,6 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
376
331
  raise TypeError("Missing required property 'service_account_email'")
377
332
  __props__.__dict__["service_account_email"] = service_account_email
378
333
  __props__.__dict__["token_scopes"] = token_scopes
379
- __props__.__dict__["ttl"] = ttl
380
334
  __props__.__dict__["service_account_project"] = None
381
335
  super(SecretImpersonatedAccount, __self__).__init__(
382
336
  'vault:gcp/secretImpersonatedAccount:SecretImpersonatedAccount',
@@ -393,8 +347,7 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
393
347
  namespace: Optional[pulumi.Input[str]] = None,
394
348
  service_account_email: Optional[pulumi.Input[str]] = None,
395
349
  service_account_project: Optional[pulumi.Input[str]] = None,
396
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
397
- ttl: Optional[pulumi.Input[str]] = None) -> 'SecretImpersonatedAccount':
350
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None) -> 'SecretImpersonatedAccount':
398
351
  """
399
352
  Get an existing SecretImpersonatedAccount resource's state with the given name, id, and optional extra
400
353
  properties used to qualify the lookup.
@@ -408,8 +361,6 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
408
361
  :param pulumi.Input[str] service_account_email: Email of the GCP service account to impersonate.
409
362
  :param pulumi.Input[str] service_account_project: Project the service account belongs to.
410
363
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
411
- :param pulumi.Input[str] ttl: Specifies the default TTL for service principals generated using this role.
412
- Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
413
364
  """
414
365
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
415
366
 
@@ -421,7 +372,6 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
421
372
  __props__.__dict__["service_account_email"] = service_account_email
422
373
  __props__.__dict__["service_account_project"] = service_account_project
423
374
  __props__.__dict__["token_scopes"] = token_scopes
424
- __props__.__dict__["ttl"] = ttl
425
375
  return SecretImpersonatedAccount(resource_name, opts=opts, __props__=__props__)
426
376
 
427
377
  @property
@@ -472,12 +422,3 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
472
422
  """
473
423
  return pulumi.get(self, "token_scopes")
474
424
 
475
- @property
476
- @pulumi.getter
477
- def ttl(self) -> pulumi.Output[str]:
478
- """
479
- Specifies the default TTL for service principals generated using this role.
480
- Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
481
- """
482
- return pulumi.get(self, "ttl")
483
-
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
  from . import outputs
17
12
  from ._inputs import *
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['EndpointArgs', 'Endpoint']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
@@ -231,6 +226,9 @@ def get_secret(namespace: Optional[str] = None,
231
226
  path=pulumi.get(__ret__, 'path'),
232
227
  version=pulumi.get(__ret__, 'version'),
233
228
  with_lease_start_time=pulumi.get(__ret__, 'with_lease_start_time'))
229
+
230
+
231
+ @_utilities.lift_output_func(get_secret)
234
232
  def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
235
233
  path: Optional[pulumi.Input[str]] = None,
236
234
  version: Optional[pulumi.Input[Optional[int]]] = None,
@@ -285,22 +283,4 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
285
283
  Note that storing the `lease_start_time` in the TF state will cause a persistent drift
286
284
  on every `pulumi preview` and will require a `pulumi up`.
287
285
  """
288
- __args__ = dict()
289
- __args__['namespace'] = namespace
290
- __args__['path'] = path
291
- __args__['version'] = version
292
- __args__['withLeaseStartTime'] = with_lease_start_time
293
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
294
- __ret__ = pulumi.runtime.invoke_output('vault:generic/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult)
295
- return __ret__.apply(lambda __response__: GetSecretResult(
296
- data=pulumi.get(__response__, 'data'),
297
- data_json=pulumi.get(__response__, 'data_json'),
298
- id=pulumi.get(__response__, 'id'),
299
- lease_duration=pulumi.get(__response__, 'lease_duration'),
300
- lease_id=pulumi.get(__response__, 'lease_id'),
301
- lease_renewable=pulumi.get(__response__, 'lease_renewable'),
302
- lease_start_time=pulumi.get(__response__, 'lease_start_time'),
303
- namespace=pulumi.get(__response__, 'namespace'),
304
- path=pulumi.get(__response__, 'path'),
305
- version=pulumi.get(__response__, 'version'),
306
- with_lease_start_time=pulumi.get(__response__, 'with_lease_start_time')))
286
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = ['SecretArgs', 'Secret']
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = [
@@ -188,6 +183,9 @@ def get_auth_backend(namespace: Optional[str] = None,
188
183
  namespace=pulumi.get(__ret__, 'namespace'),
189
184
  path=pulumi.get(__ret__, 'path'),
190
185
  type=pulumi.get(__ret__, 'type'))
186
+
187
+
188
+ @_utilities.lift_output_func(get_auth_backend)
191
189
  def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
192
190
  path: Optional[pulumi.Input[str]] = None,
193
191
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendResult]:
@@ -208,19 +206,4 @@ def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
208
206
  *Available only for Vault Enterprise*.
209
207
  :param str path: The auth backend mount point.
210
208
  """
211
- __args__ = dict()
212
- __args__['namespace'] = namespace
213
- __args__['path'] = path
214
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
215
- __ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackend:getAuthBackend', __args__, opts=opts, typ=GetAuthBackendResult)
216
- return __ret__.apply(lambda __response__: GetAuthBackendResult(
217
- accessor=pulumi.get(__response__, 'accessor'),
218
- default_lease_ttl_seconds=pulumi.get(__response__, 'default_lease_ttl_seconds'),
219
- description=pulumi.get(__response__, 'description'),
220
- id=pulumi.get(__response__, 'id'),
221
- listing_visibility=pulumi.get(__response__, 'listing_visibility'),
222
- local=pulumi.get(__response__, 'local'),
223
- max_lease_ttl_seconds=pulumi.get(__response__, 'max_lease_ttl_seconds'),
224
- namespace=pulumi.get(__response__, 'namespace'),
225
- path=pulumi.get(__response__, 'path'),
226
- type=pulumi.get(__response__, 'type')))
209
+ ...
@@ -4,14 +4,9 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from . import _utilities
16
11
 
17
12
  __all__ = [
@@ -130,6 +125,9 @@ def get_auth_backends(namespace: Optional[str] = None,
130
125
  namespace=pulumi.get(__ret__, 'namespace'),
131
126
  paths=pulumi.get(__ret__, 'paths'),
132
127
  type=pulumi.get(__ret__, 'type'))
128
+
129
+
130
+ @_utilities.lift_output_func(get_auth_backends)
133
131
  def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
134
132
  type: Optional[pulumi.Input[Optional[str]]] = None,
135
133
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendsResult]:
@@ -157,14 +155,4 @@ def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] =
157
155
  *Available only for Vault Enterprise*.
158
156
  :param str type: The name of the auth method type. Allows filtering of backends returned by type.
159
157
  """
160
- __args__ = dict()
161
- __args__['namespace'] = namespace
162
- __args__['type'] = type
163
- opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
164
- __ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackends:getAuthBackends', __args__, opts=opts, typ=GetAuthBackendsResult)
165
- return __ret__.apply(lambda __response__: GetAuthBackendsResult(
166
- accessors=pulumi.get(__response__, 'accessors'),
167
- id=pulumi.get(__response__, 'id'),
168
- namespace=pulumi.get(__response__, 'namespace'),
169
- paths=pulumi.get(__response__, 'paths'),
170
- type=pulumi.get(__response__, 'type')))
158
+ ...