pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,14 +19,14 @@ __all__ = ['AuditRequestHeaderArgs', 'AuditRequestHeader']
20
19
  @pulumi.input_type
21
20
  class AuditRequestHeaderArgs:
22
21
  def __init__(__self__, *,
23
- hmac: Optional[pulumi.Input[builtins.bool]] = None,
24
- name: Optional[pulumi.Input[builtins.str]] = None,
25
- namespace: Optional[pulumi.Input[builtins.str]] = None):
22
+ hmac: Optional[pulumi.Input[_builtins.bool]] = None,
23
+ name: Optional[pulumi.Input[_builtins.str]] = None,
24
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
26
25
  """
27
26
  The set of arguments for constructing a AuditRequestHeader resource.
28
- :param pulumi.Input[builtins.bool] hmac: Whether this header's value should be HMAC'd in the audit logs.
29
- :param pulumi.Input[builtins.str] name: The name of the request header to audit.
30
- :param pulumi.Input[builtins.str] namespace: Target namespace. (requires Enterprise)
27
+ :param pulumi.Input[_builtins.bool] hmac: Whether this header's value should be HMAC'd in the audit logs.
28
+ :param pulumi.Input[_builtins.str] name: The name of the request header to audit.
29
+ :param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
31
30
  """
32
31
  if hmac is not None:
33
32
  pulumi.set(__self__, "hmac", hmac)
@@ -36,54 +35,54 @@ class AuditRequestHeaderArgs:
36
35
  if namespace is not None:
37
36
  pulumi.set(__self__, "namespace", namespace)
38
37
 
39
- @property
38
+ @_builtins.property
40
39
  @pulumi.getter
41
- def hmac(self) -> Optional[pulumi.Input[builtins.bool]]:
40
+ def hmac(self) -> Optional[pulumi.Input[_builtins.bool]]:
42
41
  """
43
42
  Whether this header's value should be HMAC'd in the audit logs.
44
43
  """
45
44
  return pulumi.get(self, "hmac")
46
45
 
47
46
  @hmac.setter
48
- def hmac(self, value: Optional[pulumi.Input[builtins.bool]]):
47
+ def hmac(self, value: Optional[pulumi.Input[_builtins.bool]]):
49
48
  pulumi.set(self, "hmac", value)
50
49
 
51
- @property
50
+ @_builtins.property
52
51
  @pulumi.getter
53
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
52
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
54
53
  """
55
54
  The name of the request header to audit.
56
55
  """
57
56
  return pulumi.get(self, "name")
58
57
 
59
58
  @name.setter
60
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
59
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
61
60
  pulumi.set(self, "name", value)
62
61
 
63
- @property
62
+ @_builtins.property
64
63
  @pulumi.getter
65
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
64
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
66
65
  """
67
66
  Target namespace. (requires Enterprise)
68
67
  """
69
68
  return pulumi.get(self, "namespace")
70
69
 
71
70
  @namespace.setter
72
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
71
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
73
72
  pulumi.set(self, "namespace", value)
74
73
 
75
74
 
76
75
  @pulumi.input_type
77
76
  class _AuditRequestHeaderState:
78
77
  def __init__(__self__, *,
79
- hmac: Optional[pulumi.Input[builtins.bool]] = None,
80
- name: Optional[pulumi.Input[builtins.str]] = None,
81
- namespace: Optional[pulumi.Input[builtins.str]] = None):
78
+ hmac: Optional[pulumi.Input[_builtins.bool]] = None,
79
+ name: Optional[pulumi.Input[_builtins.str]] = None,
80
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
82
81
  """
83
82
  Input properties used for looking up and filtering AuditRequestHeader resources.
84
- :param pulumi.Input[builtins.bool] hmac: Whether this header's value should be HMAC'd in the audit logs.
85
- :param pulumi.Input[builtins.str] name: The name of the request header to audit.
86
- :param pulumi.Input[builtins.str] namespace: Target namespace. (requires Enterprise)
83
+ :param pulumi.Input[_builtins.bool] hmac: Whether this header's value should be HMAC'd in the audit logs.
84
+ :param pulumi.Input[_builtins.str] name: The name of the request header to audit.
85
+ :param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
87
86
  """
88
87
  if hmac is not None:
89
88
  pulumi.set(__self__, "hmac", hmac)
@@ -92,40 +91,40 @@ class _AuditRequestHeaderState:
92
91
  if namespace is not None:
93
92
  pulumi.set(__self__, "namespace", namespace)
94
93
 
95
- @property
94
+ @_builtins.property
96
95
  @pulumi.getter
97
- def hmac(self) -> Optional[pulumi.Input[builtins.bool]]:
96
+ def hmac(self) -> Optional[pulumi.Input[_builtins.bool]]:
98
97
  """
99
98
  Whether this header's value should be HMAC'd in the audit logs.
100
99
  """
101
100
  return pulumi.get(self, "hmac")
102
101
 
103
102
  @hmac.setter
104
- def hmac(self, value: Optional[pulumi.Input[builtins.bool]]):
103
+ def hmac(self, value: Optional[pulumi.Input[_builtins.bool]]):
105
104
  pulumi.set(self, "hmac", value)
106
105
 
107
- @property
106
+ @_builtins.property
108
107
  @pulumi.getter
109
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
108
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
110
109
  """
111
110
  The name of the request header to audit.
112
111
  """
113
112
  return pulumi.get(self, "name")
114
113
 
115
114
  @name.setter
116
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
115
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
117
116
  pulumi.set(self, "name", value)
118
117
 
119
- @property
118
+ @_builtins.property
120
119
  @pulumi.getter
121
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
120
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
122
121
  """
123
122
  Target namespace. (requires Enterprise)
124
123
  """
125
124
  return pulumi.get(self, "namespace")
126
125
 
127
126
  @namespace.setter
128
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
127
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
129
128
  pulumi.set(self, "namespace", value)
130
129
 
131
130
 
@@ -135,9 +134,9 @@ class AuditRequestHeader(pulumi.CustomResource):
135
134
  def __init__(__self__,
136
135
  resource_name: str,
137
136
  opts: Optional[pulumi.ResourceOptions] = None,
138
- hmac: Optional[pulumi.Input[builtins.bool]] = None,
139
- name: Optional[pulumi.Input[builtins.str]] = None,
140
- namespace: Optional[pulumi.Input[builtins.str]] = None,
137
+ hmac: Optional[pulumi.Input[_builtins.bool]] = None,
138
+ name: Optional[pulumi.Input[_builtins.str]] = None,
139
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
141
140
  __props__=None):
142
141
  """
143
142
  Manages additional request headers that appear in audited requests.
@@ -160,9 +159,9 @@ class AuditRequestHeader(pulumi.CustomResource):
160
159
 
161
160
  :param str resource_name: The name of the resource.
162
161
  :param pulumi.ResourceOptions opts: Options for the resource.
163
- :param pulumi.Input[builtins.bool] hmac: Whether this header's value should be HMAC'd in the audit logs.
164
- :param pulumi.Input[builtins.str] name: The name of the request header to audit.
165
- :param pulumi.Input[builtins.str] namespace: Target namespace. (requires Enterprise)
162
+ :param pulumi.Input[_builtins.bool] hmac: Whether this header's value should be HMAC'd in the audit logs.
163
+ :param pulumi.Input[_builtins.str] name: The name of the request header to audit.
164
+ :param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
166
165
  """
167
166
  ...
168
167
  @overload
@@ -204,9 +203,9 @@ class AuditRequestHeader(pulumi.CustomResource):
204
203
  def _internal_init(__self__,
205
204
  resource_name: str,
206
205
  opts: Optional[pulumi.ResourceOptions] = None,
207
- hmac: Optional[pulumi.Input[builtins.bool]] = None,
208
- name: Optional[pulumi.Input[builtins.str]] = None,
209
- namespace: Optional[pulumi.Input[builtins.str]] = None,
206
+ hmac: Optional[pulumi.Input[_builtins.bool]] = None,
207
+ name: Optional[pulumi.Input[_builtins.str]] = None,
208
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
210
209
  __props__=None):
211
210
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
212
211
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -229,9 +228,9 @@ class AuditRequestHeader(pulumi.CustomResource):
229
228
  def get(resource_name: str,
230
229
  id: pulumi.Input[str],
231
230
  opts: Optional[pulumi.ResourceOptions] = None,
232
- hmac: Optional[pulumi.Input[builtins.bool]] = None,
233
- name: Optional[pulumi.Input[builtins.str]] = None,
234
- namespace: Optional[pulumi.Input[builtins.str]] = None) -> 'AuditRequestHeader':
231
+ hmac: Optional[pulumi.Input[_builtins.bool]] = None,
232
+ name: Optional[pulumi.Input[_builtins.str]] = None,
233
+ namespace: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuditRequestHeader':
235
234
  """
236
235
  Get an existing AuditRequestHeader resource's state with the given name, id, and optional extra
237
236
  properties used to qualify the lookup.
@@ -239,9 +238,9 @@ class AuditRequestHeader(pulumi.CustomResource):
239
238
  :param str resource_name: The unique name of the resulting resource.
240
239
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
241
240
  :param pulumi.ResourceOptions opts: Options for the resource.
242
- :param pulumi.Input[builtins.bool] hmac: Whether this header's value should be HMAC'd in the audit logs.
243
- :param pulumi.Input[builtins.str] name: The name of the request header to audit.
244
- :param pulumi.Input[builtins.str] namespace: Target namespace. (requires Enterprise)
241
+ :param pulumi.Input[_builtins.bool] hmac: Whether this header's value should be HMAC'd in the audit logs.
242
+ :param pulumi.Input[_builtins.str] name: The name of the request header to audit.
243
+ :param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
245
244
  """
246
245
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
247
246
 
@@ -252,25 +251,25 @@ class AuditRequestHeader(pulumi.CustomResource):
252
251
  __props__.__dict__["namespace"] = namespace
253
252
  return AuditRequestHeader(resource_name, opts=opts, __props__=__props__)
254
253
 
255
- @property
254
+ @_builtins.property
256
255
  @pulumi.getter
257
- def hmac(self) -> pulumi.Output[Optional[builtins.bool]]:
256
+ def hmac(self) -> pulumi.Output[Optional[_builtins.bool]]:
258
257
  """
259
258
  Whether this header's value should be HMAC'd in the audit logs.
260
259
  """
261
260
  return pulumi.get(self, "hmac")
262
261
 
263
- @property
262
+ @_builtins.property
264
263
  @pulumi.getter
265
- def name(self) -> pulumi.Output[builtins.str]:
264
+ def name(self) -> pulumi.Output[_builtins.str]:
266
265
  """
267
266
  The name of the request header to audit.
268
267
  """
269
268
  return pulumi.get(self, "name")
270
269
 
271
- @property
270
+ @_builtins.property
272
271
  @pulumi.getter
273
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
272
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
274
273
  """
275
274
  Target namespace. (requires Enterprise)
276
275
  """