pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,24 +19,24 @@ __all__ = ['AuthBackendConfigIdentityArgs', 'AuthBackendConfigIdentity']
20
19
  @pulumi.input_type
21
20
  class AuthBackendConfigIdentityArgs:
22
21
  def __init__(__self__, *,
23
- backend: Optional[pulumi.Input[builtins.str]] = None,
24
- ec2_alias: Optional[pulumi.Input[builtins.str]] = None,
25
- ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
26
- iam_alias: Optional[pulumi.Input[builtins.str]] = None,
27
- iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
28
- namespace: Optional[pulumi.Input[builtins.str]] = None):
22
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
23
+ ec2_alias: Optional[pulumi.Input[_builtins.str]] = None,
24
+ ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ iam_alias: Optional[pulumi.Input[_builtins.str]] = None,
26
+ iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
29
28
  """
30
29
  The set of arguments for constructing a AuthBackendConfigIdentity resource.
31
- :param pulumi.Input[builtins.str] backend: Unique name of the auth backend to configure.
32
- :param pulumi.Input[builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
30
+ :param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
31
+ :param pulumi.Input[_builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
33
32
  `role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
34
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
33
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
35
34
  added to both audit logs, and on the `ec2_alias`
36
- :param pulumi.Input[builtins.str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
35
+ :param pulumi.Input[_builtins.str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
37
36
  `role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
38
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
37
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
39
38
  added to both audit logs, and on the `iam_alias`
40
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
39
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
41
40
  The value should not contain leading or trailing forward slashes.
42
41
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
43
42
  *Available only for Vault Enterprise*.
@@ -55,21 +54,21 @@ class AuthBackendConfigIdentityArgs:
55
54
  if namespace is not None:
56
55
  pulumi.set(__self__, "namespace", namespace)
57
56
 
58
- @property
57
+ @_builtins.property
59
58
  @pulumi.getter
60
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
59
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
61
60
  """
62
61
  Unique name of the auth backend to configure.
63
62
  """
64
63
  return pulumi.get(self, "backend")
65
64
 
66
65
  @backend.setter
67
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
66
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
68
67
  pulumi.set(self, "backend", value)
69
68
 
70
- @property
69
+ @_builtins.property
71
70
  @pulumi.getter(name="ec2Alias")
72
- def ec2_alias(self) -> Optional[pulumi.Input[builtins.str]]:
71
+ def ec2_alias(self) -> Optional[pulumi.Input[_builtins.str]]:
73
72
  """
74
73
  How to generate the identity alias when using the ec2 auth method. Valid choices are
75
74
  `role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
@@ -77,12 +76,12 @@ class AuthBackendConfigIdentityArgs:
77
76
  return pulumi.get(self, "ec2_alias")
78
77
 
79
78
  @ec2_alias.setter
80
- def ec2_alias(self, value: Optional[pulumi.Input[builtins.str]]):
79
+ def ec2_alias(self, value: Optional[pulumi.Input[_builtins.str]]):
81
80
  pulumi.set(self, "ec2_alias", value)
82
81
 
83
- @property
82
+ @_builtins.property
84
83
  @pulumi.getter(name="ec2Metadatas")
85
- def ec2_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
84
+ def ec2_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
86
85
  """
87
86
  The metadata to include on the token returned by the `login` endpoint. This metadata will be
88
87
  added to both audit logs, and on the `ec2_alias`
@@ -90,12 +89,12 @@ class AuthBackendConfigIdentityArgs:
90
89
  return pulumi.get(self, "ec2_metadatas")
91
90
 
92
91
  @ec2_metadatas.setter
93
- def ec2_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
92
+ def ec2_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
94
93
  pulumi.set(self, "ec2_metadatas", value)
95
94
 
96
- @property
95
+ @_builtins.property
97
96
  @pulumi.getter(name="iamAlias")
98
- def iam_alias(self) -> Optional[pulumi.Input[builtins.str]]:
97
+ def iam_alias(self) -> Optional[pulumi.Input[_builtins.str]]:
99
98
  """
100
99
  How to generate the identity alias when using the iam auth method. Valid choices are
101
100
  `role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
@@ -103,12 +102,12 @@ class AuthBackendConfigIdentityArgs:
103
102
  return pulumi.get(self, "iam_alias")
104
103
 
105
104
  @iam_alias.setter
106
- def iam_alias(self, value: Optional[pulumi.Input[builtins.str]]):
105
+ def iam_alias(self, value: Optional[pulumi.Input[_builtins.str]]):
107
106
  pulumi.set(self, "iam_alias", value)
108
107
 
109
- @property
108
+ @_builtins.property
110
109
  @pulumi.getter(name="iamMetadatas")
111
- def iam_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
110
+ def iam_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
112
111
  """
113
112
  The metadata to include on the token returned by the `login` endpoint. This metadata will be
114
113
  added to both audit logs, and on the `iam_alias`
@@ -116,12 +115,12 @@ class AuthBackendConfigIdentityArgs:
116
115
  return pulumi.get(self, "iam_metadatas")
117
116
 
118
117
  @iam_metadatas.setter
119
- def iam_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
118
+ def iam_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
120
119
  pulumi.set(self, "iam_metadatas", value)
121
120
 
122
- @property
121
+ @_builtins.property
123
122
  @pulumi.getter
124
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
123
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
125
124
  """
126
125
  The namespace to provision the resource in.
127
126
  The value should not contain leading or trailing forward slashes.
@@ -131,31 +130,31 @@ class AuthBackendConfigIdentityArgs:
131
130
  return pulumi.get(self, "namespace")
132
131
 
133
132
  @namespace.setter
134
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
133
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
135
134
  pulumi.set(self, "namespace", value)
136
135
 
137
136
 
138
137
  @pulumi.input_type
139
138
  class _AuthBackendConfigIdentityState:
140
139
  def __init__(__self__, *,
141
- backend: Optional[pulumi.Input[builtins.str]] = None,
142
- ec2_alias: Optional[pulumi.Input[builtins.str]] = None,
143
- ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
144
- iam_alias: Optional[pulumi.Input[builtins.str]] = None,
145
- iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
146
- namespace: Optional[pulumi.Input[builtins.str]] = None):
140
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
141
+ ec2_alias: Optional[pulumi.Input[_builtins.str]] = None,
142
+ ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
143
+ iam_alias: Optional[pulumi.Input[_builtins.str]] = None,
144
+ iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
145
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
147
146
  """
148
147
  Input properties used for looking up and filtering AuthBackendConfigIdentity resources.
149
- :param pulumi.Input[builtins.str] backend: Unique name of the auth backend to configure.
150
- :param pulumi.Input[builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
148
+ :param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
149
+ :param pulumi.Input[_builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
151
150
  `role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
152
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
151
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
153
152
  added to both audit logs, and on the `ec2_alias`
154
- :param pulumi.Input[builtins.str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
153
+ :param pulumi.Input[_builtins.str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
155
154
  `role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
156
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
155
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
157
156
  added to both audit logs, and on the `iam_alias`
158
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
157
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
159
158
  The value should not contain leading or trailing forward slashes.
160
159
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
161
160
  *Available only for Vault Enterprise*.
@@ -173,21 +172,21 @@ class _AuthBackendConfigIdentityState:
173
172
  if namespace is not None:
174
173
  pulumi.set(__self__, "namespace", namespace)
175
174
 
176
- @property
175
+ @_builtins.property
177
176
  @pulumi.getter
178
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
177
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
179
178
  """
180
179
  Unique name of the auth backend to configure.
181
180
  """
182
181
  return pulumi.get(self, "backend")
183
182
 
184
183
  @backend.setter
185
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
184
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
186
185
  pulumi.set(self, "backend", value)
187
186
 
188
- @property
187
+ @_builtins.property
189
188
  @pulumi.getter(name="ec2Alias")
190
- def ec2_alias(self) -> Optional[pulumi.Input[builtins.str]]:
189
+ def ec2_alias(self) -> Optional[pulumi.Input[_builtins.str]]:
191
190
  """
192
191
  How to generate the identity alias when using the ec2 auth method. Valid choices are
193
192
  `role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
@@ -195,12 +194,12 @@ class _AuthBackendConfigIdentityState:
195
194
  return pulumi.get(self, "ec2_alias")
196
195
 
197
196
  @ec2_alias.setter
198
- def ec2_alias(self, value: Optional[pulumi.Input[builtins.str]]):
197
+ def ec2_alias(self, value: Optional[pulumi.Input[_builtins.str]]):
199
198
  pulumi.set(self, "ec2_alias", value)
200
199
 
201
- @property
200
+ @_builtins.property
202
201
  @pulumi.getter(name="ec2Metadatas")
203
- def ec2_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
202
+ def ec2_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
204
203
  """
205
204
  The metadata to include on the token returned by the `login` endpoint. This metadata will be
206
205
  added to both audit logs, and on the `ec2_alias`
@@ -208,12 +207,12 @@ class _AuthBackendConfigIdentityState:
208
207
  return pulumi.get(self, "ec2_metadatas")
209
208
 
210
209
  @ec2_metadatas.setter
211
- def ec2_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
210
+ def ec2_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
212
211
  pulumi.set(self, "ec2_metadatas", value)
213
212
 
214
- @property
213
+ @_builtins.property
215
214
  @pulumi.getter(name="iamAlias")
216
- def iam_alias(self) -> Optional[pulumi.Input[builtins.str]]:
215
+ def iam_alias(self) -> Optional[pulumi.Input[_builtins.str]]:
217
216
  """
218
217
  How to generate the identity alias when using the iam auth method. Valid choices are
219
218
  `role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
@@ -221,12 +220,12 @@ class _AuthBackendConfigIdentityState:
221
220
  return pulumi.get(self, "iam_alias")
222
221
 
223
222
  @iam_alias.setter
224
- def iam_alias(self, value: Optional[pulumi.Input[builtins.str]]):
223
+ def iam_alias(self, value: Optional[pulumi.Input[_builtins.str]]):
225
224
  pulumi.set(self, "iam_alias", value)
226
225
 
227
- @property
226
+ @_builtins.property
228
227
  @pulumi.getter(name="iamMetadatas")
229
- def iam_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
228
+ def iam_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
230
229
  """
231
230
  The metadata to include on the token returned by the `login` endpoint. This metadata will be
232
231
  added to both audit logs, and on the `iam_alias`
@@ -234,12 +233,12 @@ class _AuthBackendConfigIdentityState:
234
233
  return pulumi.get(self, "iam_metadatas")
235
234
 
236
235
  @iam_metadatas.setter
237
- def iam_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
236
+ def iam_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
238
237
  pulumi.set(self, "iam_metadatas", value)
239
238
 
240
- @property
239
+ @_builtins.property
241
240
  @pulumi.getter
242
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
241
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
243
242
  """
244
243
  The namespace to provision the resource in.
245
244
  The value should not contain leading or trailing forward slashes.
@@ -249,7 +248,7 @@ class _AuthBackendConfigIdentityState:
249
248
  return pulumi.get(self, "namespace")
250
249
 
251
250
  @namespace.setter
252
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
251
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
253
252
  pulumi.set(self, "namespace", value)
254
253
 
255
254
 
@@ -259,12 +258,12 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
259
258
  def __init__(__self__,
260
259
  resource_name: str,
261
260
  opts: Optional[pulumi.ResourceOptions] = None,
262
- backend: Optional[pulumi.Input[builtins.str]] = None,
263
- ec2_alias: Optional[pulumi.Input[builtins.str]] = None,
264
- ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
265
- iam_alias: Optional[pulumi.Input[builtins.str]] = None,
266
- iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
267
- namespace: Optional[pulumi.Input[builtins.str]] = None,
261
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
262
+ ec2_alias: Optional[pulumi.Input[_builtins.str]] = None,
263
+ ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
264
+ iam_alias: Optional[pulumi.Input[_builtins.str]] = None,
265
+ iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
266
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
268
267
  __props__=None):
269
268
  """
270
269
  Manages an AWS auth backend identity configuration in a Vault server. This configuration defines how Vault interacts
@@ -297,16 +296,16 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
297
296
 
298
297
  :param str resource_name: The name of the resource.
299
298
  :param pulumi.ResourceOptions opts: Options for the resource.
300
- :param pulumi.Input[builtins.str] backend: Unique name of the auth backend to configure.
301
- :param pulumi.Input[builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
299
+ :param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
300
+ :param pulumi.Input[_builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
302
301
  `role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
303
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
302
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
304
303
  added to both audit logs, and on the `ec2_alias`
305
- :param pulumi.Input[builtins.str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
304
+ :param pulumi.Input[_builtins.str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
306
305
  `role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
307
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
306
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
308
307
  added to both audit logs, and on the `iam_alias`
309
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
308
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
310
309
  The value should not contain leading or trailing forward slashes.
311
310
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
312
311
  *Available only for Vault Enterprise*.
@@ -361,12 +360,12 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
361
360
  def _internal_init(__self__,
362
361
  resource_name: str,
363
362
  opts: Optional[pulumi.ResourceOptions] = None,
364
- backend: Optional[pulumi.Input[builtins.str]] = None,
365
- ec2_alias: Optional[pulumi.Input[builtins.str]] = None,
366
- ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
367
- iam_alias: Optional[pulumi.Input[builtins.str]] = None,
368
- iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
369
- namespace: Optional[pulumi.Input[builtins.str]] = None,
363
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
364
+ ec2_alias: Optional[pulumi.Input[_builtins.str]] = None,
365
+ ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
366
+ iam_alias: Optional[pulumi.Input[_builtins.str]] = None,
367
+ iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
368
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
370
369
  __props__=None):
371
370
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
372
371
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -392,12 +391,12 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
392
391
  def get(resource_name: str,
393
392
  id: pulumi.Input[str],
394
393
  opts: Optional[pulumi.ResourceOptions] = None,
395
- backend: Optional[pulumi.Input[builtins.str]] = None,
396
- ec2_alias: Optional[pulumi.Input[builtins.str]] = None,
397
- ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
398
- iam_alias: Optional[pulumi.Input[builtins.str]] = None,
399
- iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
400
- namespace: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackendConfigIdentity':
394
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
395
+ ec2_alias: Optional[pulumi.Input[_builtins.str]] = None,
396
+ ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
397
+ iam_alias: Optional[pulumi.Input[_builtins.str]] = None,
398
+ iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
399
+ namespace: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendConfigIdentity':
401
400
  """
402
401
  Get an existing AuthBackendConfigIdentity resource's state with the given name, id, and optional extra
403
402
  properties used to qualify the lookup.
@@ -405,16 +404,16 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
405
404
  :param str resource_name: The unique name of the resulting resource.
406
405
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
407
406
  :param pulumi.ResourceOptions opts: Options for the resource.
408
- :param pulumi.Input[builtins.str] backend: Unique name of the auth backend to configure.
409
- :param pulumi.Input[builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
407
+ :param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
408
+ :param pulumi.Input[_builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
410
409
  `role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
411
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
410
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
412
411
  added to both audit logs, and on the `ec2_alias`
413
- :param pulumi.Input[builtins.str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
412
+ :param pulumi.Input[_builtins.str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
414
413
  `role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
415
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
414
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
416
415
  added to both audit logs, and on the `iam_alias`
417
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
416
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
418
417
  The value should not contain leading or trailing forward slashes.
419
418
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
420
419
  *Available only for Vault Enterprise*.
@@ -431,53 +430,53 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
431
430
  __props__.__dict__["namespace"] = namespace
432
431
  return AuthBackendConfigIdentity(resource_name, opts=opts, __props__=__props__)
433
432
 
434
- @property
433
+ @_builtins.property
435
434
  @pulumi.getter
436
- def backend(self) -> pulumi.Output[Optional[builtins.str]]:
435
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
437
436
  """
438
437
  Unique name of the auth backend to configure.
439
438
  """
440
439
  return pulumi.get(self, "backend")
441
440
 
442
- @property
441
+ @_builtins.property
443
442
  @pulumi.getter(name="ec2Alias")
444
- def ec2_alias(self) -> pulumi.Output[Optional[builtins.str]]:
443
+ def ec2_alias(self) -> pulumi.Output[Optional[_builtins.str]]:
445
444
  """
446
445
  How to generate the identity alias when using the ec2 auth method. Valid choices are
447
446
  `role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
448
447
  """
449
448
  return pulumi.get(self, "ec2_alias")
450
449
 
451
- @property
450
+ @_builtins.property
452
451
  @pulumi.getter(name="ec2Metadatas")
453
- def ec2_metadatas(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
452
+ def ec2_metadatas(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
454
453
  """
455
454
  The metadata to include on the token returned by the `login` endpoint. This metadata will be
456
455
  added to both audit logs, and on the `ec2_alias`
457
456
  """
458
457
  return pulumi.get(self, "ec2_metadatas")
459
458
 
460
- @property
459
+ @_builtins.property
461
460
  @pulumi.getter(name="iamAlias")
462
- def iam_alias(self) -> pulumi.Output[Optional[builtins.str]]:
461
+ def iam_alias(self) -> pulumi.Output[Optional[_builtins.str]]:
463
462
  """
464
463
  How to generate the identity alias when using the iam auth method. Valid choices are
465
464
  `role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
466
465
  """
467
466
  return pulumi.get(self, "iam_alias")
468
467
 
469
- @property
468
+ @_builtins.property
470
469
  @pulumi.getter(name="iamMetadatas")
471
- def iam_metadatas(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
470
+ def iam_metadatas(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
472
471
  """
473
472
  The metadata to include on the token returned by the `login` endpoint. This metadata will be
474
473
  added to both audit logs, and on the `iam_alias`
475
474
  """
476
475
  return pulumi.get(self, "iam_metadatas")
477
476
 
478
- @property
477
+ @_builtins.property
479
478
  @pulumi.getter
480
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
479
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
481
480
  """
482
481
  The namespace to provision the resource in.
483
482
  The value should not contain leading or trailing forward slashes.