{"name":"temporalcloud","displayName":"Temporal Cloud","version":"1.2.1","description":"A Pulumi provider dynamically bridged from temporalcloud.","attribution":"This Pulumi package is based on the [`temporalcloud` Terraform Provider](https://github.com/temporalio/terraform-provider-temporalcloud).","repository":"https://github.com/temporalio/terraform-provider-temporalcloud","publisher":"temporalio","meta":{"moduleFormat":"(.*)(?:/[^/]*)"},"language":{"csharp":{"compatibility":"tfbridge20","liftSingleValueMethodReturns":true,"respectSchemaVersion":true},"go":{"generateExtraInputTypes":true,"importBasePath":"github.com/pulumi/pulumi-terraform-provider/sdks/go/temporalcloud/temporalcloud","liftSingleValueMethodReturns":true,"respectSchemaVersion":true,"rootPackageName":"temporalcloud"},"java":{"basePackage":"","buildFiles":"","gradleNexusPublishPluginVersion":"","gradleTest":""},"nodejs":{"compatibility":"tfbridge20","disableUnionOutputTypes":true,"liftSingleValueMethodReturns":true,"packageDescription":"A Pulumi provider dynamically bridged from temporalcloud.","readme":"\u003e This provider is a derived work of the [Terraform Provider](https://github.com/temporalio/terraform-provider-temporalcloud)\n\u003e distributed under [MPL 2.0](https://www.mozilla.org/en-US/MPL/2.0/). If you encounter a bug or missing feature,\n\u003e please consult the source [`terraform-provider-temporalcloud` repo](https://github.com/temporalio/terraform-provider-temporalcloud/issues).","respectSchemaVersion":true},"python":{"compatibility":"tfbridge20","pyproject":{"enabled":true},"readme":"\u003e This provider is a derived work of the [Terraform Provider](https://github.com/temporalio/terraform-provider-temporalcloud)\n\u003e distributed under [MPL 2.0](https://www.mozilla.org/en-US/MPL/2.0/). If you encounter a bug or missing feature,\n\u003e please consult the source [`terraform-provider-temporalcloud` repo](https://github.com/temporalio/terraform-provider-temporalcloud/issues).","respectSchemaVersion":true}},"config":{"variables":{"allowInsecure":{"type":"boolean","description":"If set to True, it allows for an insecure connection to the Temporal Cloud API. This should never be set to 'true' in production and defaults to false."},"allowedAccountId":{"type":"string","description":"The ID of the account to operate on. Prevents accidental mutation of accounts other than that provided."},"apiKey":{"type":"string","description":"The API key for Temporal Cloud. See [this documentation](https://docs.temporal.io/cloud/api-keys) for information on how to obtain an API key.","secret":true},"endpoint":{"type":"string","description":"The endpoint for the Temporal Cloud API. Defaults to `saas-api.tmprl.cloud:443`."}}},"types":{"temporalcloud:index/AccountAuditLogSinkKinesis:AccountAuditLogSinkKinesis":{"properties":{"destinationUri":{"type":"string","description":"The destination URI of the Kinesis stream where Temporal will send data.\n"},"region":{"type":"string","description":"The region of the Kinesis stream.\n"},"roleName":{"type":"string","description":"The IAM role that Temporal Cloud assumes for writing records to the customer's Kinesis stream.\n"}},"type":"object","required":["destinationUri","region","roleName"]},"temporalcloud:index/AccountAuditLogSinkPubsub:AccountAuditLogSinkPubsub":{"properties":{"gcpProjectId":{"type":"string","description":"The GCP project ID of the PubSub topic and service account.\n"},"serviceAccountEmail":{"type":"string","description":"The service account email associated with the PubSub topic and service account.\n"},"serviceAccountId":{"type":"string","description":"The customer service account ID that Temporal Cloud impersonates for writing records to the customer's PubSub topic.\n"},"topicName":{"type":"string","description":"The destination PubSub topic name for Temporal.\n"}},"type":"object","required":["topicName"],"language":{"nodejs":{"requiredOutputs":["gcpProjectId","serviceAccountEmail","serviceAccountId","topicName"]}}},"temporalcloud:index/AccountAuditLogSinkTimeouts:AccountAuditLogSinkTimeouts":{"properties":{"create":{"type":"string","description":"A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as \"30s\" or \"2h45m\". Valid time units are \"s\" (seconds), \"m\" (minutes), \"h\" (hours).\n"},"delete":{"type":"string","description":"A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as \"30s\" or \"2h45m\". Valid time units are \"s\" (seconds), \"m\" (minutes), \"h\" (hours). Setting a timeout for a Delete operation is only applicable if changes are saved into state before the destroy operation occurs.\n"}},"type":"object"},"temporalcloud:index/ApikeyTimeouts:ApikeyTimeouts":{"properties":{"create":{"type":"string","description":"A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as \"30s\" or \"2h45m\". Valid time units are \"s\" (seconds), \"m\" (minutes), \"h\" (hours).\n"},"delete":{"type":"string","description":"A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as \"30s\" or \"2h45m\". Valid time units are \"s\" (seconds), \"m\" (minutes), \"h\" (hours). Setting a timeout for a Delete operation is only applicable if changes are saved into state before the destroy operation occurs.\n"}},"type":"object"},"temporalcloud:index/ConnectivityRuleTimeouts:ConnectivityRuleTimeouts":{"properties":{"create":{"type":"string","description":"A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as \"30s\" or \"2h45m\". Valid time units are \"s\" (seconds), \"m\" (minutes), \"h\" (hours).\n"},"delete":{"type":"string","description":"A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as \"30s\" or \"2h45m\". Valid time units are \"s\" (seconds), \"m\" (minutes), \"h\" (hours). Setting a timeout for a Delete operation is only applicable if changes are saved into state before the destroy operation occurs.\n"}},"type":"object"},"temporalcloud:index/GroupAccessNamespaceAccess:GroupAccessNamespaceAccess":{"properties":{"namespaceId":{"type":"string","description":"The namespace to assign permissions to.\n"},"permission":{"type":"string","description":"The permission to assign. Must be one of admin, write, or read (case-insensitive)\n"}},"type":"object","required":["namespaceId","permission"]},"temporalcloud:index/GroupMembersTimeouts:GroupMembersTimeouts":{"properties":{"create":{"type":"string","description":"A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as \"30s\" or \"2h45m\". Valid time units are \"s\" (seconds), \"m\" (minutes), \"h\" (hours).\n"},"delete":{"type":"string","description":"A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as \"30s\" or \"2h45m\". Valid time units are \"s\" (seconds), \"m\" (minutes), \"h\" (hours). Setting a timeout for a Delete operation is only applicable if changes are saved into state before the destroy operation occurs.\n"}},"type":"object"},"temporalcloud:index/GroupTimeouts:GroupTimeouts":{"properties":{"create":{"type":"string","description":"A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as \"30s\" or \"2h45m\". Valid time units are \"s\" (seconds), \"m\" (minutes), \"h\" (hours).\n"},"delete":{"type":"string","description":"A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as \"30s\" or \"2h45m\". Valid time units are \"s\" (seconds), \"m\" (minutes), \"h\" (hours). Setting a timeout for a Delete operation is only applicable if changes are saved into state before the destroy operation occurs.\n"}},"type":"object"},"temporalcloud:index/MetricsEndpointTimeouts:MetricsEndpointTimeouts":{"properties":{"create":{"type":"string","description":"A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as \"30s\" or \"2h45m\". Valid time units are \"s\" (seconds), \"m\" (minutes), \"h\" (hours).\n"},"delete":{"type":"string","description":"A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as \"30s\" or \"2h45m\". Valid time units are \"s\" (seconds), \"m\" (minutes), \"h\" (hours). Setting a timeout for a Delete operation is only applicable if changes are saved into state before the destroy operation occurs.\n"},"update":{"type":"string","description":"A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as \"30s\" or \"2h45m\". Valid time units are \"s\" (seconds), \"m\" (minutes), \"h\" (hours).\n"}},"type":"object"},"temporalcloud:index/NamespaceCapacity:NamespaceCapacity":{"properties":{"mode":{"type":"string","description":"The mode of the capacity configuration. Must be one of 'provisioned' or 'on_demand'.\n"},"value":{"type":"number","description":"The value of the capacity configuration. Must be set when mode is 'provisioned'.\n"}},"type":"object"},"temporalcloud:index/NamespaceCertificateFilter:NamespaceCertificateFilter":{"properties":{"commonName":{"type":"string","description":"The certificate's common name.\n"},"organization":{"type":"string","description":"The certificate's organization.\n"},"organizationalUnit":{"type":"string","description":"The certificate's organizational unit.\n"},"subjectAlternativeName":{"type":"string","description":"The certificate's subject alternative name (or SAN).\n"}},"type":"object"},"temporalcloud:index/NamespaceCodecServer:NamespaceCodecServer":{"properties":{"endpoint":{"type":"string","description":"The endpoint of the codec server. Must begin with \"https\".\n"},"includeCrossOriginCredentials":{"type":"boolean","description":"If true, Temporal Cloud will include cross-origin credentials in requests to the codec server.\n"},"passAccessToken":{"type":"boolean","description":"If true, Temporal Cloud will pass the access token to the codec server upon each request.\n"}},"type":"object","required":["endpoint"],"language":{"nodejs":{"requiredOutputs":["endpoint","includeCrossOriginCredentials","passAccessToken"]}}},"temporalcloud:index/NamespaceEndpoints:NamespaceEndpoints":{"properties":{"grpcAddress":{"type":"string","description":"The gRPC address for API key client connections (may be empty if API keys are disabled).\n"},"mtlsGrpcAddress":{"type":"string","description":"The gRPC address for mTLS client connections (may be empty if mTLS is disabled).\n"},"webAddress":{"type":"string","description":"The address in the Temporal Cloud Web UI for the namespace\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["grpcAddress","mtlsGrpcAddress","webAddress"]}}},"temporalcloud:index/NamespaceExportSinkGcs:NamespaceExportSinkGcs":{"properties":{"bucketName":{"type":"string","description":"The name of the destination GCS bucket where Temporal will send data.\n"},"gcpProjectId":{"type":"string","description":"The GCP project ID associated with the GCS bucket and service account. If not provided, the service*account*email must be provided.\n"},"region":{"type":"string","description":"The region of the gcs bucket\n"},"serviceAccountEmail":{"type":"string","description":"The service account email associated with the GCS bucket and service account. If not provided, the service*account*id and gcp*project*id must be provided.\n"},"serviceAccountId":{"type":"string","description":"The customer service account ID that Temporal Cloud impersonates for writing records to the customer's GCS bucket. If not provided, the service*account*email must be provided.\n"}},"type":"object","required":["bucketName","region"],"language":{"nodejs":{"requiredOutputs":["bucketName","gcpProjectId","region","serviceAccountEmail","serviceAccountId"]}}},"temporalcloud:index/NamespaceExportSinkS3:NamespaceExportSinkS3":{"properties":{"awsAccountId":{"type":"string","description":"The AWS account ID associated with the S3 bucket and the assumed role.\n"},"bucketName":{"type":"string","description":"The name of the destination S3 bucket where Temporal will send data.\n"},"kmsArn":{"type":"string","description":"The AWS Key Management Service (KMS) ARN used for encryption.\n"},"region":{"type":"string","description":"The region where the S3 bucket is located.\n"},"roleName":{"type":"string","description":"The IAM role that Temporal Cloud assumes for writing records to the customer's S3 bucket.\n"}},"type":"object","required":["awsAccountId","bucketName","region","roleName"]},"temporalcloud:index/NamespaceExportSinkTimeouts:NamespaceExportSinkTimeouts":{"properties":{"create":{"type":"string","description":"A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as \"30s\" or \"2h45m\". Valid time units are \"s\" (seconds), \"m\" (minutes), \"h\" (hours).\n"},"delete":{"type":"string","description":"A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as \"30s\" or \"2h45m\". Valid time units are \"s\" (seconds), \"m\" (minutes), \"h\" (hours). Setting a timeout for a Delete operation is only applicable if changes are saved into state before the destroy operation occurs.\n"}},"type":"object"},"temporalcloud:index/NamespaceNamespaceLifecycle:NamespaceNamespaceLifecycle":{"properties":{"enableDeleteProtection":{"type":"boolean","description":"If true, the namespace cannot be deleted. This is a safeguard against accidental deletion. To delete a namespace with this option enabled, you must first set it to false.\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["enableDeleteProtection"]}}},"temporalcloud:index/NamespaceTagsTimeouts:NamespaceTagsTimeouts":{"properties":{"create":{"type":"string","description":"A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as \"30s\" or \"2h45m\". Valid time units are \"s\" (seconds), \"m\" (minutes), \"h\" (hours).\n"},"delete":{"type":"string","description":"A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as \"30s\" or \"2h45m\". Valid time units are \"s\" (seconds), \"m\" (minutes), \"h\" (hours). Setting a timeout for a Delete operation is only applicable if changes are saved into state before the destroy operation occurs.\n"}},"type":"object"},"temporalcloud:index/NamespaceTimeouts:NamespaceTimeouts":{"properties":{"create":{"type":"string","description":"A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as \"30s\" or \"2h45m\". Valid time units are \"s\" (seconds), \"m\" (minutes), \"h\" (hours).\n"},"delete":{"type":"string","description":"A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as \"30s\" or \"2h45m\". Valid time units are \"s\" (seconds), \"m\" (minutes), \"h\" (hours). Setting a timeout for a Delete operation is only applicable if changes are saved into state before the destroy operation occurs.\n"}},"type":"object"},"temporalcloud:index/NexusEndpointTimeouts:NexusEndpointTimeouts":{"properties":{"create":{"type":"string","description":"A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as \"30s\" or \"2h45m\". Valid time units are \"s\" (seconds), \"m\" (minutes), \"h\" (hours).\n"},"delete":{"type":"string","description":"A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as \"30s\" or \"2h45m\". Valid time units are \"s\" (seconds), \"m\" (minutes), \"h\" (hours). Setting a timeout for a Delete operation is only applicable if changes are saved into state before the destroy operation occurs.\n"}},"type":"object"},"temporalcloud:index/NexusEndpointWorkerTarget:NexusEndpointWorkerTarget":{"properties":{"namespaceId":{"type":"string","description":"The target cloud namespace to route requests to. Namespace must be in same account as the endpoint.\n"},"taskQueue":{"type":"string","description":"The task queue on the cloud namespace to route requests to.\n"}},"type":"object","required":["namespaceId","taskQueue"]},"temporalcloud:index/ServiceAccountNamespaceAccess:ServiceAccountNamespaceAccess":{"properties":{"namespaceId":{"type":"string","description":"The namespace to assign permissions to.\n"},"permission":{"type":"string","description":"The permission to assign. Must be one of admin, write, or read (case-insensitive)\n"}},"type":"object","required":["namespaceId","permission"]},"temporalcloud:index/ServiceAccountNamespaceScopedAccess:ServiceAccountNamespaceScopedAccess":{"properties":{"namespaceId":{"type":"string","description":"The namespace to scope this service account to. This field is immutable after creation.\n"},"permission":{"type":"string","description":"The permission to assign. Must be one of admin, write, or read (case-insensitive). This field is mutable.\n"}},"type":"object","required":["namespaceId","permission"]},"temporalcloud:index/ServiceAccountTimeouts:ServiceAccountTimeouts":{"properties":{"create":{"type":"string","description":"A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as \"30s\" or \"2h45m\". Valid time units are \"s\" (seconds), \"m\" (minutes), \"h\" (hours).\n"},"delete":{"type":"string","description":"A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as \"30s\" or \"2h45m\". Valid time units are \"s\" (seconds), \"m\" (minutes), \"h\" (hours). Setting a timeout for a Delete operation is only applicable if changes are saved into state before the destroy operation occurs.\n"}},"type":"object"},"temporalcloud:index/UserNamespaceAccess:UserNamespaceAccess":{"properties":{"namespaceId":{"type":"string","description":"The namespace to assign permissions to.\n"},"permission":{"type":"string","description":"The permission to assign. Must be one of admin, write, or read (case-insensitive)\n"}},"type":"object","required":["namespaceId","permission"]},"temporalcloud:index/UserTimeouts:UserTimeouts":{"properties":{"create":{"type":"string","description":"A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as \"30s\" or \"2h45m\". Valid time units are \"s\" (seconds), \"m\" (minutes), \"h\" (hours).\n"},"delete":{"type":"string","description":"A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as \"30s\" or \"2h45m\". Valid time units are \"s\" (seconds), \"m\" (minutes), \"h\" (hours). Setting a timeout for a Delete operation is only applicable if changes are saved into state before the destroy operation occurs.\n"}},"type":"object"},"temporalcloud:index/getAccountAuditLogSinkKinesis:getAccountAuditLogSinkKinesis":{"properties":{"destinationUri":{"type":"string","description":"The destination URI of the Kinesis stream where Temporal will send data.\n"},"region":{"type":"string","description":"The region of the Kinesis stream.\n"},"roleName":{"type":"string","description":"The IAM role that Temporal Cloud assumes for writing records to the customer's Kinesis stream.\n"}},"type":"object","required":["destinationUri","region","roleName"],"language":{"nodejs":{"requiredInputs":[]}}},"temporalcloud:index/getAccountAuditLogSinkPubsub:getAccountAuditLogSinkPubsub":{"properties":{"gcpProjectId":{"type":"string","description":"The GCP project ID of the PubSub topic and service account.\n"},"serviceAccountEmail":{"type":"string","description":"The service account email associated with the PubSub topic and service account.\n"},"serviceAccountId":{"type":"string","description":"The customer service account ID that Temporal Cloud impersonates for writing records to the customer's PubSub topic.\n"},"topicName":{"type":"string","description":"The destination PubSub topic name for Temporal.\n"}},"type":"object","required":["gcpProjectId","serviceAccountEmail","serviceAccountId","topicName"],"language":{"nodejs":{"requiredInputs":[]}}},"temporalcloud:index/getNamespaceCertificateFilter:getNamespaceCertificateFilter":{"properties":{"commonName":{"type":"string","description":"The certificate's common name.\n"},"organization":{"type":"string","description":"The certificate's organization.\n"},"organizationalUnit":{"type":"string","description":"The certificate's organizational unit.\n"},"subjectAlternativeName":{"type":"string","description":"The certificate's subject alternative name (or SAN).\n"}},"type":"object","required":["commonName","organization","organizationalUnit","subjectAlternativeName"],"language":{"nodejs":{"requiredInputs":[]}}},"temporalcloud:index/getNamespaceCodecServer:getNamespaceCodecServer":{"properties":{"endpoint":{"type":"string","description":"The endpoint of the codec server.\n"},"includeCrossOriginCredentials":{"type":"boolean","description":"If true, Temporal Cloud will include cross-origin credentials in requests to the codec server.\n"},"passAccessToken":{"type":"boolean","description":"If true, Temporal Cloud will pass the access token to the codec server upon each request.\n"}},"type":"object","required":["endpoint","includeCrossOriginCredentials","passAccessToken"],"language":{"nodejs":{"requiredInputs":[]}}},"temporalcloud:index/getNamespaceEndpoints:getNamespaceEndpoints":{"properties":{"grpcAddress":{"type":"string","description":"The gRPC hostport address that the temporal workers, clients and tctl connect to.\n"},"webAddress":{"type":"string","description":"The web UI address.\n"}},"type":"object","required":["grpcAddress","webAddress"],"language":{"nodejs":{"requiredInputs":[]}}},"temporalcloud:index/getNamespaceLimits:getNamespaceLimits":{"properties":{"actionsPerSecondLimit":{"type":"number","description":"The number of actions per second (APS) that is currently allowed for the namespace. The namespace may be throttled if its APS exceeds the limit.\n"}},"type":"object","required":["actionsPerSecondLimit"],"language":{"nodejs":{"requiredInputs":[]}}},"temporalcloud:index/getNamespaceNamespaceLifecycle:getNamespaceNamespaceLifecycle":{"properties":{"enableDeleteProtection":{"type":"boolean","description":"If true, delete protection is enabled for the namespace. This means that the namespace cannot be deleted until this is set to false.\n"}},"type":"object","required":["enableDeleteProtection"],"language":{"nodejs":{"requiredInputs":[]}}},"temporalcloud:index/getNamespacePrivateConnectivity:getNamespacePrivateConnectivity":{"properties":{"awsPrivateLinkInfo":{"$ref":"#/types/temporalcloud:index%2FgetNamespacePrivateConnectivityAwsPrivateLinkInfo:getNamespacePrivateConnectivityAwsPrivateLinkInfo","description":"The AWS PrivateLink info. This will only be set for namespaces whose cloud provider is AWS.\n"},"region":{"type":"string","description":"The id of the region where the private connectivity applies.\n"}},"type":"object","required":["awsPrivateLinkInfo","region"],"language":{"nodejs":{"requiredInputs":[]}}},"temporalcloud:index/getNamespacePrivateConnectivityAwsPrivateLinkInfo:getNamespacePrivateConnectivityAwsPrivateLinkInfo":{"properties":{"allowedPrincipalArns":{"type":"array","items":{"type":"string"},"description":"The list of principal arns that are allowed to access the namespace on the private link.\n"},"vpcEndpointServiceNames":{"type":"array","items":{"type":"string"},"description":"The list of vpc endpoint service names that are associated with the namespace.\n"}},"type":"object","required":["allowedPrincipalArns","vpcEndpointServiceNames"],"language":{"nodejs":{"requiredInputs":[]}}},"temporalcloud:index/getNamespacesNamespace:getNamespacesNamespace":{"properties":{"acceptedClientCa":{"type":"string","description":"The Base64-encoded CA cert in PEM format that clients use when authenticating with Temporal Cloud.\n"},"activeRegion":{"type":"string","description":"The currently active region for the namespace.\n"},"apiKeyAuth":{"type":"boolean","description":"If true, Temporal Cloud will use API key authentication for this namespace. If false, mutual TLS (mTLS) authentication will be used.\n"},"certificateFilters":{"type":"array","items":{"$ref":"#/types/temporalcloud:index%2FgetNamespacesNamespaceCertificateFilter:getNamespacesNamespaceCertificateFilter"},"description":"A list of filters to apply to client certificates when initiating a connection Temporal Cloud. If present, connections will only be allowed from client certificates whose distinguished name properties match at least one of the filters.\n"},"codecServer":{"$ref":"#/types/temporalcloud:index%2FgetNamespacesNamespaceCodecServer:getNamespacesNamespaceCodecServer","description":"A codec server is used by the Temporal Cloud UI to decode payloads for all users interacting with this namespace, even if the workflow history itself is encrypted.\n"},"connectivityRuleIds":{"type":"array","items":{"type":"string"},"description":"The IDs of the connectivity rules for this namespace.\n"},"createdTime":{"type":"string","description":"The date and time when the namespace was created.\n"},"customSearchAttributes":{"type":"object","additionalProperties":{"type":"string"},"description":"The custom search attributes to use for the namespace.\n"},"endpoints":{"$ref":"#/types/temporalcloud:index%2FgetNamespacesNamespaceEndpoints:getNamespacesNamespaceEndpoints","description":"The endpoints for the namespace.\n"},"id":{"type":"string","description":"The unique identifier of the namespace across all Temporal Cloud tenants.\n"},"lastModifiedTime":{"type":"string","description":"The date and time when the namespace was last modified. Will not be set if the namespace has never been modified.\n"},"limits":{"$ref":"#/types/temporalcloud:index%2FgetNamespacesNamespaceLimits:getNamespacesNamespaceLimits","description":"The limits set on the namespace currently.\n"},"name":{"type":"string","description":"The name of the namespace.\n"},"namespaceLifecycle":{"$ref":"#/types/temporalcloud:index%2FgetNamespacesNamespaceNamespaceLifecycle:getNamespacesNamespaceNamespaceLifecycle","description":"The lifecycle settings for the namespace.\n"},"privateConnectivities":{"type":"array","items":{"$ref":"#/types/temporalcloud:index%2FgetNamespacesNamespacePrivateConnectivity:getNamespacesNamespacePrivateConnectivity"},"description":"The private connectivities for the namespace, if any.\n"},"regions":{"type":"array","items":{"type":"string"}},"retentionDays":{"type":"number","description":"The number of days to retain workflow history. Any changes to the retention period will be applied to all new running workflows.\n"},"state":{"type":"string","description":"The current state of the namespace.\n"},"tags":{"type":"object","additionalProperties":{"type":"string"},"description":"The tags for the namespace.\n"}},"type":"object","required":["acceptedClientCa","activeRegion","certificateFilters","codecServer","connectivityRuleIds","createdTime","customSearchAttributes","endpoints","id","lastModifiedTime","limits","name","namespaceLifecycle","privateConnectivities","regions","retentionDays","state","tags"],"language":{"nodejs":{"requiredInputs":[]}}},"temporalcloud:index/getNamespacesNamespaceCertificateFilter:getNamespacesNamespaceCertificateFilter":{"properties":{"commonName":{"type":"string","description":"The certificate's common name.\n"},"organization":{"type":"string","description":"The certificate's organization.\n"},"organizationalUnit":{"type":"string","description":"The certificate's organizational unit.\n"},"subjectAlternativeName":{"type":"string","description":"The certificate's subject alternative name (or SAN).\n"}},"type":"object","required":["commonName","organization","organizationalUnit","subjectAlternativeName"],"language":{"nodejs":{"requiredInputs":[]}}},"temporalcloud:index/getNamespacesNamespaceCodecServer:getNamespacesNamespaceCodecServer":{"properties":{"endpoint":{"type":"string","description":"The endpoint of the codec server.\n"},"includeCrossOriginCredentials":{"type":"boolean","description":"If true, Temporal Cloud will include cross-origin credentials in requests to the codec server.\n"},"passAccessToken":{"type":"boolean","description":"If true, Temporal Cloud will pass the access token to the codec server upon each request.\n"}},"type":"object","required":["endpoint","includeCrossOriginCredentials","passAccessToken"],"language":{"nodejs":{"requiredInputs":[]}}},"temporalcloud:index/getNamespacesNamespaceEndpoints:getNamespacesNamespaceEndpoints":{"properties":{"grpcAddress":{"type":"string","description":"The gRPC hostport address that the temporal workers, clients and tctl connect to.\n"},"webAddress":{"type":"string","description":"The web UI address.\n"}},"type":"object","required":["grpcAddress","webAddress"],"language":{"nodejs":{"requiredInputs":[]}}},"temporalcloud:index/getNamespacesNamespaceLimits:getNamespacesNamespaceLimits":{"properties":{"actionsPerSecondLimit":{"type":"number","description":"The number of actions per second (APS) that is currently allowed for the namespace. The namespace may be throttled if its APS exceeds the limit.\n"}},"type":"object","required":["actionsPerSecondLimit"],"language":{"nodejs":{"requiredInputs":[]}}},"temporalcloud:index/getNamespacesNamespaceNamespaceLifecycle:getNamespacesNamespaceNamespaceLifecycle":{"properties":{"enableDeleteProtection":{"type":"boolean","description":"If true, delete protection is enabled for the namespace. This means that the namespace cannot be deleted until this is set to false.\n"}},"type":"object","required":["enableDeleteProtection"],"language":{"nodejs":{"requiredInputs":[]}}},"temporalcloud:index/getNamespacesNamespacePrivateConnectivity:getNamespacesNamespacePrivateConnectivity":{"properties":{"awsPrivateLinkInfo":{"$ref":"#/types/temporalcloud:index%2FgetNamespacesNamespacePrivateConnectivityAwsPrivateLinkInfo:getNamespacesNamespacePrivateConnectivityAwsPrivateLinkInfo","description":"The AWS PrivateLink info. This will only be set for namespaces whose cloud provider is AWS.\n"},"region":{"type":"string","description":"The id of the region where the private connectivity applies.\n"}},"type":"object","required":["awsPrivateLinkInfo","region"],"language":{"nodejs":{"requiredInputs":[]}}},"temporalcloud:index/getNamespacesNamespacePrivateConnectivityAwsPrivateLinkInfo:getNamespacesNamespacePrivateConnectivityAwsPrivateLinkInfo":{"properties":{"allowedPrincipalArns":{"type":"array","items":{"type":"string"},"description":"The list of principal arns that are allowed to access the namespace on the private link.\n"},"vpcEndpointServiceNames":{"type":"array","items":{"type":"string"},"description":"The list of vpc endpoint service names that are associated with the namespace.\n"}},"type":"object","required":["allowedPrincipalArns","vpcEndpointServiceNames"],"language":{"nodejs":{"requiredInputs":[]}}},"temporalcloud:index/getNexusEndpointWorkerTarget:getNexusEndpointWorkerTarget":{"properties":{"namespaceId":{"type":"string","description":"The target cloud namespace to route requests to. Namespace is in same account as the endpoint.\n"},"taskQueue":{"type":"string","description":"The task queue on the cloud namespace to route requests to.\n"}},"type":"object","required":["namespaceId","taskQueue"],"language":{"nodejs":{"requiredInputs":[]}}},"temporalcloud:index/getNexusEndpointsNexusEndpoint:getNexusEndpointsNexusEndpoint":{"properties":{"allowedCallerNamespaces":{"type":"array","items":{"type":"string"},"description":"Namespace Id(s) that are allowed to call this Endpoint.\n"},"createdAt":{"type":"string","description":"The creation time of the Nexus Endpoint.\n"},"description":{"type":"string","description":"The description of the Nexus Endpoint.\n","secret":true},"id":{"type":"string","description":"The unique identifier of the Nexus Endpoint.\n"},"name":{"type":"string","description":"The name of the endpoint. Unique within an account and match `^[a-zA-Z][a-zA-Z0-9\\-]*[a-zA-Z0-9]$`\n"},"state":{"type":"string","description":"The current state of the Nexus Endpoint.\n"},"updatedAt":{"type":"string","description":"The last update time of the Nexus Endpoint.\n"},"workerTarget":{"$ref":"#/types/temporalcloud:index%2FgetNexusEndpointsNexusEndpointWorkerTarget:getNexusEndpointsNexusEndpointWorkerTarget","description":"The target spec for routing nexus requests to a specific cloud namespace worker.\n"}},"type":"object","required":["allowedCallerNamespaces","createdAt","description","id","name","state","updatedAt","workerTarget"],"language":{"nodejs":{"requiredInputs":[]}}},"temporalcloud:index/getNexusEndpointsNexusEndpointWorkerTarget:getNexusEndpointsNexusEndpointWorkerTarget":{"properties":{"namespaceId":{"type":"string","description":"The target cloud namespace to route requests to. Namespace is in same account as the endpoint.\n"},"taskQueue":{"type":"string","description":"The task queue on the cloud namespace to route requests to.\n"}},"type":"object","required":["namespaceId","taskQueue"],"language":{"nodejs":{"requiredInputs":[]}}},"temporalcloud:index/getRegionsRegion:getRegionsRegion":{"properties":{"cloudProvider":{"type":"string","description":"The name of the Cloud provider for this region, e.g. \u003cspan pulumi-lang-nodejs=\"`aws`\" pulumi-lang-dotnet=\"`Aws`\" pulumi-lang-go=\"`aws`\" pulumi-lang-python=\"`aws`\" pulumi-lang-yaml=\"`aws`\" pulumi-lang-java=\"`aws`\"\u003e`aws`\u003c/span\u003e.\n"},"cloudProviderRegion":{"type":"string","description":"The name of the region within the Cloud provider, e.g. `us-east-1`.\n"},"id":{"type":"string","description":"The unique identifier for the region, e.g. `aws-us-east-1`.\n"},"location":{"type":"string","description":"The physical location of the region, e.g. \"US East (N. Virginia)\".\n"}},"type":"object","required":["cloudProvider","cloudProviderRegion","id","location"],"language":{"nodejs":{"requiredInputs":[]}}},"temporalcloud:index/getServiceAccountNamespaceAccess:getServiceAccountNamespaceAccess":{"properties":{"namespaceId":{"type":"string","description":"The namespace to assign permissions to.\n"},"permission":{"type":"string","description":"The permission to assign. Must be one of admin, write, or read (case-insensitive).\n"}},"type":"object","required":["namespaceId","permission"],"language":{"nodejs":{"requiredInputs":[]}}},"temporalcloud:index/getServiceAccountNamespaceScopedAccess:getServiceAccountNamespaceScopedAccess":{"properties":{"namespaceId":{"type":"string","description":"The namespace this service account is scoped to.\n"},"permission":{"type":"string","description":"The permission to assign. Must be one of admin, write, or read (case-insensitive).\n"}},"type":"object","required":["namespaceId","permission"],"language":{"nodejs":{"requiredInputs":[]}}},"temporalcloud:index/getServiceAccountsServiceAccount:getServiceAccountsServiceAccount":{"properties":{"accountAccess":{"type":"string","description":"The role on the account. Must be one of admin, developer, read, or metricsread (case-insensitive).\n"},"createdAt":{"type":"string","description":"The creation time of the Service Account.\n"},"description":{"type":"string","description":"The description of the Service Account.\n"},"id":{"type":"string","description":"The unique identifier of the Service Account.\n"},"name":{"type":"string","description":"The name associated with the service account.\n"},"namespaceAccesses":{"type":"array","items":{"$ref":"#/types/temporalcloud:index%2FgetServiceAccountsServiceAccountNamespaceAccess:getServiceAccountsServiceAccountNamespaceAccess"},"description":"The set of namespace permissions for this service account, including each namespace and its role.\n"},"namespaceScopedAccess":{"$ref":"#/types/temporalcloud:index%2FgetServiceAccountsServiceAccountNamespaceScopedAccess:getServiceAccountsServiceAccountNamespaceScopedAccess","description":"The namespace-scoped access configuration for this service account.\n"},"state":{"type":"string","description":"The current state of the Service Account.\n"},"updatedAt":{"type":"string","description":"The last update time of the Service Account.\n"}},"type":"object","required":["accountAccess","createdAt","description","id","name","namespaceAccesses","namespaceScopedAccess","state","updatedAt"],"language":{"nodejs":{"requiredInputs":[]}}},"temporalcloud:index/getServiceAccountsServiceAccountNamespaceAccess:getServiceAccountsServiceAccountNamespaceAccess":{"properties":{"namespaceId":{"type":"string","description":"The namespace to assign permissions to.\n"},"permission":{"type":"string","description":"The permission to assign. Must be one of admin, write, or read (case-insensitive).\n"}},"type":"object","required":["namespaceId","permission"],"language":{"nodejs":{"requiredInputs":[]}}},"temporalcloud:index/getServiceAccountsServiceAccountNamespaceScopedAccess:getServiceAccountsServiceAccountNamespaceScopedAccess":{"properties":{"namespaceId":{"type":"string","description":"The namespace this service account is scoped to.\n"},"permission":{"type":"string","description":"The permission to assign. Must be one of admin, write, or read (case-insensitive).\n"}},"type":"object","required":["namespaceId","permission"],"language":{"nodejs":{"requiredInputs":[]}}},"temporalcloud:index/getUserNamespaceAccess:getUserNamespaceAccess":{"properties":{"namespaceId":{"type":"string","description":"The namespace to assign permissions to.\n"},"permission":{"type":"string","description":"The permission to assign. Must be one of admin, write, or read (case-insensitive)\n"}},"type":"object","required":["namespaceId","permission"],"language":{"nodejs":{"requiredInputs":[]}}},"temporalcloud:index/getUsersUser:getUsersUser":{"properties":{"accountAccess":{"type":"string","description":"The role on the account. Must be one of admin, developer, or read (case-insensitive).\n"},"createdAt":{"type":"string","description":"The creation time of the User.\n"},"email":{"type":"string","description":"The email of the User.\n"},"id":{"type":"string","description":"The unique identifier of the User.\n"},"namespaceAccesses":{"type":"array","items":{"$ref":"#/types/temporalcloud:index%2FgetUsersUserNamespaceAccess:getUsersUserNamespaceAccess"},"description":"The set of namespace permissions for this user, including each namespace and its role.\n"},"state":{"type":"string","description":"The current state of the User.\n"},"updatedAt":{"type":"string","description":"The last update time of the User.\n"}},"type":"object","required":["accountAccess","createdAt","email","id","namespaceAccesses","state","updatedAt"],"language":{"nodejs":{"requiredInputs":[]}}},"temporalcloud:index/getUsersUserNamespaceAccess:getUsersUserNamespaceAccess":{"properties":{"namespaceId":{"type":"string","description":"The namespace to assign permissions to.\n"},"permission":{"type":"string","description":"The permission to assign. Must be one of admin, write, or read (case-insensitive)\n"}},"type":"object","required":["namespaceId","permission"],"language":{"nodejs":{"requiredInputs":[]}}}},"provider":{"description":"The provider type for the temporalcloud package. By default, resources use package-wide configuration\nsettings, however an explicit `Provider` instance may be created and passed during resource\nconstruction to achieve fine-grained programmatic control over provider settings. See the\n[documentation](https://www.pulumi.com/docs/reference/programming-model/#providers) for more information.\n","properties":{"allowedAccountId":{"type":"string","description":"The ID of the account to operate on. Prevents accidental mutation of accounts other than that provided."},"apiKey":{"type":"string","description":"The API key for Temporal Cloud. See [this documentation](https://docs.temporal.io/cloud/api-keys) for information on how to obtain an API key.","secret":true},"endpoint":{"type":"string","description":"The endpoint for the Temporal Cloud API. Defaults to `saas-api.tmprl.cloud:443`."}},"type":"object","inputProperties":{"allowInsecure":{"type":"boolean","description":"If set to True, it allows for an insecure connection to the Temporal Cloud API. This should never be set to 'true' in production and defaults to false."},"allowedAccountId":{"type":"string","description":"The ID of the account to operate on. Prevents accidental mutation of accounts other than that provided."},"apiKey":{"type":"string","description":"The API key for Temporal Cloud. See [this documentation](https://docs.temporal.io/cloud/api-keys) for information on how to obtain an API key.","secret":true},"endpoint":{"type":"string","description":"The endpoint for the Temporal Cloud API. Defaults to `saas-api.tmprl.cloud:443`."}},"methods":{"terraformConfig":"pulumi:providers:temporalcloud/terraformConfig"}},"resources":{"temporalcloud:index/accountAuditLogSink:AccountAuditLogSink":{"description":"Provisions an account audit log sink.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as temporalcloud from \"@pulumi/temporalcloud\";\n\n// Example with Kinesis\nconst kinesisSink = new temporalcloud.AccountAuditLogSink(\"kinesis_sink\", {\n    sinkName: \"my-kinesis-sink\",\n    enabled: true,\n    kinesis: {\n        roleName: \"arn:aws:iam::123456789012:role/TemporalCloudKinesisRole\",\n        destinationUri: \"arn:aws:kinesis:us-east-1:123456789012:stream/my-audit-stream\",\n        region: \"us-east-1\",\n    },\n});\n// Example with PubSub\nconst pubsubSink = new temporalcloud.AccountAuditLogSink(\"pubsub_sink\", {\n    sinkName: \"my-pubsub-sink\",\n    enabled: true,\n    pubsub: {\n        serviceAccountId: \"my-service-account-id\",\n        topicName: \"temporal-audit-logs\",\n        gcpProjectId: \"my-gcp-project\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_temporalcloud as temporalcloud\n\n# Example with Kinesis\nkinesis_sink = temporalcloud.AccountAuditLogSink(\"kinesis_sink\",\n    sink_name=\"my-kinesis-sink\",\n    enabled=True,\n    kinesis={\n        \"role_name\": \"arn:aws:iam::123456789012:role/TemporalCloudKinesisRole\",\n        \"destination_uri\": \"arn:aws:kinesis:us-east-1:123456789012:stream/my-audit-stream\",\n        \"region\": \"us-east-1\",\n    })\n# Example with PubSub\npubsub_sink = temporalcloud.AccountAuditLogSink(\"pubsub_sink\",\n    sink_name=\"my-pubsub-sink\",\n    enabled=True,\n    pubsub={\n        \"service_account_id\": \"my-service-account-id\",\n        \"topic_name\": \"temporal-audit-logs\",\n        \"gcp_project_id\": \"my-gcp-project\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Temporalcloud = Pulumi.Temporalcloud;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    // Example with Kinesis\n    var kinesisSink = new Temporalcloud.AccountAuditLogSink(\"kinesis_sink\", new()\n    {\n        SinkName = \"my-kinesis-sink\",\n        Enabled = true,\n        Kinesis = new Temporalcloud.Inputs.AccountAuditLogSinkKinesisArgs\n        {\n            RoleName = \"arn:aws:iam::123456789012:role/TemporalCloudKinesisRole\",\n            DestinationUri = \"arn:aws:kinesis:us-east-1:123456789012:stream/my-audit-stream\",\n            Region = \"us-east-1\",\n        },\n    });\n\n    // Example with PubSub\n    var pubsubSink = new Temporalcloud.AccountAuditLogSink(\"pubsub_sink\", new()\n    {\n        SinkName = \"my-pubsub-sink\",\n        Enabled = true,\n        Pubsub = new Temporalcloud.Inputs.AccountAuditLogSinkPubsubArgs\n        {\n            ServiceAccountId = \"my-service-account-id\",\n            TopicName = \"temporal-audit-logs\",\n            GcpProjectId = \"my-gcp-project\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/temporalcloud/temporalcloud\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t// Example with Kinesis\n\t\t_, err := temporalcloud.NewAccountAuditLogSink(ctx, \"kinesis_sink\", \u0026temporalcloud.AccountAuditLogSinkArgs{\n\t\t\tSinkName: pulumi.String(\"my-kinesis-sink\"),\n\t\t\tEnabled:  pulumi.Bool(true),\n\t\t\tKinesis: \u0026temporalcloud.AccountAuditLogSinkKinesisArgs{\n\t\t\t\tRoleName:       pulumi.String(\"arn:aws:iam::123456789012:role/TemporalCloudKinesisRole\"),\n\t\t\t\tDestinationUri: pulumi.String(\"arn:aws:kinesis:us-east-1:123456789012:stream/my-audit-stream\"),\n\t\t\t\tRegion:         pulumi.String(\"us-east-1\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Example with PubSub\n\t\t_, err = temporalcloud.NewAccountAuditLogSink(ctx, \"pubsub_sink\", \u0026temporalcloud.AccountAuditLogSinkArgs{\n\t\t\tSinkName: pulumi.String(\"my-pubsub-sink\"),\n\t\t\tEnabled:  pulumi.Bool(true),\n\t\t\tPubsub: \u0026temporalcloud.AccountAuditLogSinkPubsubArgs{\n\t\t\t\tServiceAccountId: pulumi.String(\"my-service-account-id\"),\n\t\t\t\tTopicName:        pulumi.String(\"temporal-audit-logs\"),\n\t\t\t\tGcpProjectId:     pulumi.String(\"my-gcp-project\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.temporalcloud.AccountAuditLogSink;\nimport com.pulumi.temporalcloud.AccountAuditLogSinkArgs;\nimport com.pulumi.temporalcloud.inputs.AccountAuditLogSinkKinesisArgs;\nimport com.pulumi.temporalcloud.inputs.AccountAuditLogSinkPubsubArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        // Example with Kinesis\n        var kinesisSink = new AccountAuditLogSink(\"kinesisSink\", AccountAuditLogSinkArgs.builder()\n            .sinkName(\"my-kinesis-sink\")\n            .enabled(true)\n            .kinesis(AccountAuditLogSinkKinesisArgs.builder()\n                .roleName(\"arn:aws:iam::123456789012:role/TemporalCloudKinesisRole\")\n                .destinationUri(\"arn:aws:kinesis:us-east-1:123456789012:stream/my-audit-stream\")\n                .region(\"us-east-1\")\n                .build())\n            .build());\n\n        // Example with PubSub\n        var pubsubSink = new AccountAuditLogSink(\"pubsubSink\", AccountAuditLogSinkArgs.builder()\n            .sinkName(\"my-pubsub-sink\")\n            .enabled(true)\n            .pubsub(AccountAuditLogSinkPubsubArgs.builder()\n                .serviceAccountId(\"my-service-account-id\")\n                .topicName(\"temporal-audit-logs\")\n                .gcpProjectId(\"my-gcp-project\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  # Example with Kinesis\n  kinesisSink:\n    type: temporalcloud:AccountAuditLogSink\n    name: kinesis_sink\n    properties:\n      sinkName: my-kinesis-sink\n      enabled: true\n      kinesis:\n        roleName: arn:aws:iam::123456789012:role/TemporalCloudKinesisRole\n        destinationUri: arn:aws:kinesis:us-east-1:123456789012:stream/my-audit-stream\n        region: us-east-1\n  # Example with PubSub\n  pubsubSink:\n    type: temporalcloud:AccountAuditLogSink\n    name: pubsub_sink\n    properties:\n      sinkName: my-pubsub-sink\n      enabled: true\n      pubsub:\n        serviceAccountId: my-service-account-id\n        topicName: temporal-audit-logs\n        gcpProjectId: my-gcp-project\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","properties":{"enabled":{"type":"boolean","description":"A flag indicating whether the audit log sink is enabled or not.\n"},"kinesis":{"$ref":"#/types/temporalcloud:index%2FAccountAuditLogSinkKinesis:AccountAuditLogSinkKinesis","description":"The Kinesis configuration details when\u003cspan pulumi-lang-nodejs=\" destinationType \" pulumi-lang-dotnet=\" DestinationType \" pulumi-lang-go=\" destinationType \" pulumi-lang-python=\" destination_type \" pulumi-lang-yaml=\" destinationType \" pulumi-lang-java=\" destinationType \"\u003e destination_type \u003c/span\u003eis Kinesis.\n"},"pubsub":{"$ref":"#/types/temporalcloud:index%2FAccountAuditLogSinkPubsub:AccountAuditLogSinkPubsub","description":"The PubSub configuration details when\u003cspan pulumi-lang-nodejs=\" destinationType \" pulumi-lang-dotnet=\" DestinationType \" pulumi-lang-go=\" destinationType \" pulumi-lang-python=\" destination_type \" pulumi-lang-yaml=\" destinationType \" pulumi-lang-java=\" destinationType \"\u003e destination_type \u003c/span\u003eis PubSub.\n"},"sinkName":{"type":"string","description":"The unique name of the audit log sink, it can't be changed once set.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FAccountAuditLogSinkTimeouts:AccountAuditLogSinkTimeouts"}},"type":"object","required":["enabled","sinkName"],"inputProperties":{"enabled":{"type":"boolean","description":"A flag indicating whether the audit log sink is enabled or not.\n"},"kinesis":{"$ref":"#/types/temporalcloud:index%2FAccountAuditLogSinkKinesis:AccountAuditLogSinkKinesis","description":"The Kinesis configuration details when\u003cspan pulumi-lang-nodejs=\" destinationType \" pulumi-lang-dotnet=\" DestinationType \" pulumi-lang-go=\" destinationType \" pulumi-lang-python=\" destination_type \" pulumi-lang-yaml=\" destinationType \" pulumi-lang-java=\" destinationType \"\u003e destination_type \u003c/span\u003eis Kinesis.\n"},"pubsub":{"$ref":"#/types/temporalcloud:index%2FAccountAuditLogSinkPubsub:AccountAuditLogSinkPubsub","description":"The PubSub configuration details when\u003cspan pulumi-lang-nodejs=\" destinationType \" pulumi-lang-dotnet=\" DestinationType \" pulumi-lang-go=\" destinationType \" pulumi-lang-python=\" destination_type \" pulumi-lang-yaml=\" destinationType \" pulumi-lang-java=\" destinationType \"\u003e destination_type \u003c/span\u003eis PubSub.\n"},"sinkName":{"type":"string","description":"The unique name of the audit log sink, it can't be changed once set.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FAccountAuditLogSinkTimeouts:AccountAuditLogSinkTimeouts"}},"requiredInputs":["sinkName"],"stateInputs":{"description":"Input properties used for looking up and filtering AccountAuditLogSink resources.\n","properties":{"enabled":{"type":"boolean","description":"A flag indicating whether the audit log sink is enabled or not.\n"},"kinesis":{"$ref":"#/types/temporalcloud:index%2FAccountAuditLogSinkKinesis:AccountAuditLogSinkKinesis","description":"The Kinesis configuration details when\u003cspan pulumi-lang-nodejs=\" destinationType \" pulumi-lang-dotnet=\" DestinationType \" pulumi-lang-go=\" destinationType \" pulumi-lang-python=\" destination_type \" pulumi-lang-yaml=\" destinationType \" pulumi-lang-java=\" destinationType \"\u003e destination_type \u003c/span\u003eis Kinesis.\n"},"pubsub":{"$ref":"#/types/temporalcloud:index%2FAccountAuditLogSinkPubsub:AccountAuditLogSinkPubsub","description":"The PubSub configuration details when\u003cspan pulumi-lang-nodejs=\" destinationType \" pulumi-lang-dotnet=\" DestinationType \" pulumi-lang-go=\" destinationType \" pulumi-lang-python=\" destination_type \" pulumi-lang-yaml=\" destinationType \" pulumi-lang-java=\" destinationType \"\u003e destination_type \u003c/span\u003eis PubSub.\n"},"sinkName":{"type":"string","description":"The unique name of the audit log sink, it can't be changed once set.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FAccountAuditLogSinkTimeouts:AccountAuditLogSinkTimeouts"}},"type":"object"}},"temporalcloud:index/apikey:Apikey":{"description":"Provisions a Temporal Cloud API key.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as temporalcloud from \"@pulumi/temporalcloud\";\n\nconst globalServiceAccount = new temporalcloud.ServiceAccount(\"global_service_account\", {\n    name: \"admin\",\n    accountAccess: \"Admin\",\n});\nconst globalApikey = new temporalcloud.Apikey(\"global_apikey\", {\n    displayName: \"admin\",\n    ownerType: \"service-account\",\n    ownerId: globalServiceAccount.id,\n    expiryTime: \"2024-11-01T00:00:00Z\",\n    disabled: false,\n});\n```\n```python\nimport pulumi\nimport pulumi_temporalcloud as temporalcloud\n\nglobal_service_account = temporalcloud.ServiceAccount(\"global_service_account\",\n    name=\"admin\",\n    account_access=\"Admin\")\nglobal_apikey = temporalcloud.Apikey(\"global_apikey\",\n    display_name=\"admin\",\n    owner_type=\"service-account\",\n    owner_id=global_service_account.id,\n    expiry_time=\"2024-11-01T00:00:00Z\",\n    disabled=False)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Temporalcloud = Pulumi.Temporalcloud;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var globalServiceAccount = new Temporalcloud.ServiceAccount(\"global_service_account\", new()\n    {\n        Name = \"admin\",\n        AccountAccess = \"Admin\",\n    });\n\n    var globalApikey = new Temporalcloud.Apikey(\"global_apikey\", new()\n    {\n        DisplayName = \"admin\",\n        OwnerType = \"service-account\",\n        OwnerId = globalServiceAccount.Id,\n        ExpiryTime = \"2024-11-01T00:00:00Z\",\n        Disabled = false,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/temporalcloud/temporalcloud\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tglobalServiceAccount, err := temporalcloud.NewServiceAccount(ctx, \"global_service_account\", \u0026temporalcloud.ServiceAccountArgs{\n\t\t\tName:          pulumi.String(\"admin\"),\n\t\t\tAccountAccess: pulumi.String(\"Admin\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = temporalcloud.NewApikey(ctx, \"global_apikey\", \u0026temporalcloud.ApikeyArgs{\n\t\t\tDisplayName: pulumi.String(\"admin\"),\n\t\t\tOwnerType:   pulumi.String(\"service-account\"),\n\t\t\tOwnerId:     globalServiceAccount.ID(),\n\t\t\tExpiryTime:  pulumi.String(\"2024-11-01T00:00:00Z\"),\n\t\t\tDisabled:    pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.temporalcloud.ServiceAccount;\nimport com.pulumi.temporalcloud.ServiceAccountArgs;\nimport com.pulumi.temporalcloud.Apikey;\nimport com.pulumi.temporalcloud.ApikeyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var globalServiceAccount = new ServiceAccount(\"globalServiceAccount\", ServiceAccountArgs.builder()\n            .name(\"admin\")\n            .accountAccess(\"Admin\")\n            .build());\n\n        var globalApikey = new Apikey(\"globalApikey\", ApikeyArgs.builder()\n            .displayName(\"admin\")\n            .ownerType(\"service-account\")\n            .ownerId(globalServiceAccount.id())\n            .expiryTime(\"2024-11-01T00:00:00Z\")\n            .disabled(false)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  globalServiceAccount:\n    type: temporalcloud:ServiceAccount\n    name: global_service_account\n    properties:\n      name: admin\n      accountAccess: Admin\n  globalApikey:\n    type: temporalcloud:Apikey\n    name: global_apikey\n    properties:\n      displayName: admin\n      ownerType: service-account\n      ownerId: ${globalServiceAccount.id}\n      expiryTime: 2024-11-01T00:00:00Z\n      disabled: false\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","properties":{"description":{"type":"string","description":"The description for the API key.\n"},"disabled":{"type":"boolean","description":"Whether the API key is disabled.\n"},"displayName":{"type":"string","description":"The display name for the API key.\n"},"expiryTime":{"type":"string","description":"The expiry time for the API key in ISO 8601 format.\n"},"ownerId":{"type":"string","description":"The ID of the owner to create the API key for.\n"},"ownerType":{"type":"string","description":"The type of the owner to create the API key.\n"},"state":{"type":"string","description":"The current state of the API key.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FApikeyTimeouts:ApikeyTimeouts"},"token":{"type":"string","secret":true}},"type":"object","required":["disabled","displayName","expiryTime","ownerId","ownerType","state","token"],"inputProperties":{"description":{"type":"string","description":"The description for the API key.\n"},"disabled":{"type":"boolean","description":"Whether the API key is disabled.\n"},"displayName":{"type":"string","description":"The display name for the API key.\n"},"expiryTime":{"type":"string","description":"The expiry time for the API key in ISO 8601 format.\n"},"ownerId":{"type":"string","description":"The ID of the owner to create the API key for.\n"},"ownerType":{"type":"string","description":"The type of the owner to create the API key.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FApikeyTimeouts:ApikeyTimeouts"}},"requiredInputs":["displayName","expiryTime","ownerId","ownerType"],"stateInputs":{"description":"Input properties used for looking up and filtering Apikey resources.\n","properties":{"description":{"type":"string","description":"The description for the API key.\n"},"disabled":{"type":"boolean","description":"Whether the API key is disabled.\n"},"displayName":{"type":"string","description":"The display name for the API key.\n"},"expiryTime":{"type":"string","description":"The expiry time for the API key in ISO 8601 format.\n"},"ownerId":{"type":"string","description":"The ID of the owner to create the API key for.\n"},"ownerType":{"type":"string","description":"The type of the owner to create the API key.\n"},"state":{"type":"string","description":"The current state of the API key.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FApikeyTimeouts:ApikeyTimeouts"},"token":{"type":"string","secret":true}},"type":"object"}},"temporalcloud:index/connectivityRule:ConnectivityRule":{"description":"Provisions a Temporal Cloud Connectivity Rule.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as temporalcloud from \"@pulumi/temporalcloud\";\n\n// Create Public Connectivity Rule\nconst publicRule = new temporalcloud.ConnectivityRule(\"public_rule\", {connectivityType: \"public\"});\n// Create Private Connectivity Rule for AWS\nconst privateAws = new temporalcloud.ConnectivityRule(\"private_aws\", {\n    connectivityType: \"private\",\n    connectionId: \"vpce-12345678\",\n    region: \"aws-us-west-2\",\n});\n// Create Private Connectivity Rule for GCP\nconst privateGcp = new temporalcloud.ConnectivityRule(\"private_gcp\", {\n    connectivityType: \"private\",\n    connectionId: \"vpce-12345678\",\n    region: \"gcp-us-central1\",\n    gcpProjectId: \"my-gcp-project-id\",\n});\n// Attaching connectivity rules to a namespace\nconst ns_with_cr = new temporalcloud.Namespace(\"ns-with-cr\", {\n    name: \"ns-with-cr\",\n    regions: [\"aws-us-west-2\"],\n    apiKeyAuth: true,\n    retentionDays: 14,\n    connectivityRuleIds: [\n        id,\n        idPrivateAws,\n    ],\n});\n```\n```python\nimport pulumi\nimport pulumi_temporalcloud as temporalcloud\n\n# Create Public Connectivity Rule\npublic_rule = temporalcloud.ConnectivityRule(\"public_rule\", connectivity_type=\"public\")\n# Create Private Connectivity Rule for AWS\nprivate_aws = temporalcloud.ConnectivityRule(\"private_aws\",\n    connectivity_type=\"private\",\n    connection_id=\"vpce-12345678\",\n    region=\"aws-us-west-2\")\n# Create Private Connectivity Rule for GCP\nprivate_gcp = temporalcloud.ConnectivityRule(\"private_gcp\",\n    connectivity_type=\"private\",\n    connection_id=\"vpce-12345678\",\n    region=\"gcp-us-central1\",\n    gcp_project_id=\"my-gcp-project-id\")\n# Attaching connectivity rules to a namespace\nns_with_cr = temporalcloud.Namespace(\"ns-with-cr\",\n    name=\"ns-with-cr\",\n    regions=[\"aws-us-west-2\"],\n    api_key_auth=True,\n    retention_days=14,\n    connectivity_rule_ids=[\n        id,\n        id_private_aws,\n    ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Temporalcloud = Pulumi.Temporalcloud;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    // Create Public Connectivity Rule\n    var publicRule = new Temporalcloud.ConnectivityRule(\"public_rule\", new()\n    {\n        ConnectivityType = \"public\",\n    });\n\n    // Create Private Connectivity Rule for AWS\n    var privateAws = new Temporalcloud.ConnectivityRule(\"private_aws\", new()\n    {\n        ConnectivityType = \"private\",\n        ConnectionId = \"vpce-12345678\",\n        Region = \"aws-us-west-2\",\n    });\n\n    // Create Private Connectivity Rule for GCP\n    var privateGcp = new Temporalcloud.ConnectivityRule(\"private_gcp\", new()\n    {\n        ConnectivityType = \"private\",\n        ConnectionId = \"vpce-12345678\",\n        Region = \"gcp-us-central1\",\n        GcpProjectId = \"my-gcp-project-id\",\n    });\n\n    // Attaching connectivity rules to a namespace\n    var ns_with_cr = new Temporalcloud.Namespace(\"ns-with-cr\", new()\n    {\n        Name = \"ns-with-cr\",\n        Regions = new[]\n        {\n            \"aws-us-west-2\",\n        },\n        ApiKeyAuth = true,\n        RetentionDays = 14,\n        ConnectivityRuleIds = new[]\n        {\n            id,\n            idPrivateAws,\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/temporalcloud/temporalcloud\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t// Create Public Connectivity Rule\n\t\t_, err := temporalcloud.NewConnectivityRule(ctx, \"public_rule\", \u0026temporalcloud.ConnectivityRuleArgs{\n\t\t\tConnectivityType: pulumi.String(\"public\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Create Private Connectivity Rule for AWS\n\t\t_, err = temporalcloud.NewConnectivityRule(ctx, \"private_aws\", \u0026temporalcloud.ConnectivityRuleArgs{\n\t\t\tConnectivityType: pulumi.String(\"private\"),\n\t\t\tConnectionId:     pulumi.String(\"vpce-12345678\"),\n\t\t\tRegion:           pulumi.String(\"aws-us-west-2\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Create Private Connectivity Rule for GCP\n\t\t_, err = temporalcloud.NewConnectivityRule(ctx, \"private_gcp\", \u0026temporalcloud.ConnectivityRuleArgs{\n\t\t\tConnectivityType: pulumi.String(\"private\"),\n\t\t\tConnectionId:     pulumi.String(\"vpce-12345678\"),\n\t\t\tRegion:           pulumi.String(\"gcp-us-central1\"),\n\t\t\tGcpProjectId:     pulumi.String(\"my-gcp-project-id\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Attaching connectivity rules to a namespace\n\t\t_, err = temporalcloud.NewNamespace(ctx, \"ns-with-cr\", \u0026temporalcloud.NamespaceArgs{\n\t\t\tName: pulumi.String(\"ns-with-cr\"),\n\t\t\tRegions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"aws-us-west-2\"),\n\t\t\t},\n\t\t\tApiKeyAuth:    pulumi.Bool(true),\n\t\t\tRetentionDays: pulumi.Float64(14),\n\t\t\tConnectivityRuleIds: pulumi.StringArray{\n\t\t\t\tid,\n\t\t\t\tidPrivateAws,\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.temporalcloud.ConnectivityRule;\nimport com.pulumi.temporalcloud.ConnectivityRuleArgs;\nimport com.pulumi.temporalcloud.Namespace;\nimport com.pulumi.temporalcloud.NamespaceArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        // Create Public Connectivity Rule\n        var publicRule = new ConnectivityRule(\"publicRule\", ConnectivityRuleArgs.builder()\n            .connectivityType(\"public\")\n            .build());\n\n        // Create Private Connectivity Rule for AWS\n        var privateAws = new ConnectivityRule(\"privateAws\", ConnectivityRuleArgs.builder()\n            .connectivityType(\"private\")\n            .connectionId(\"vpce-12345678\")\n            .region(\"aws-us-west-2\")\n            .build());\n\n        // Create Private Connectivity Rule for GCP\n        var privateGcp = new ConnectivityRule(\"privateGcp\", ConnectivityRuleArgs.builder()\n            .connectivityType(\"private\")\n            .connectionId(\"vpce-12345678\")\n            .region(\"gcp-us-central1\")\n            .gcpProjectId(\"my-gcp-project-id\")\n            .build());\n\n        // Attaching connectivity rules to a namespace\n        var ns_with_cr = new Namespace(\"ns-with-cr\", NamespaceArgs.builder()\n            .name(\"ns-with-cr\")\n            .regions(\"aws-us-west-2\")\n            .apiKeyAuth(true)\n            .retentionDays(14.0)\n            .connectivityRuleIds(            \n                id,\n                idPrivateAws)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  # Create Public Connectivity Rule\n  publicRule:\n    type: temporalcloud:ConnectivityRule\n    name: public_rule\n    properties:\n      connectivityType: public\n  # Create Private Connectivity Rule for AWS\n  privateAws:\n    type: temporalcloud:ConnectivityRule\n    name: private_aws\n    properties:\n      connectivityType: private\n      connectionId: vpce-12345678\n      region: aws-us-west-2\n  # Create Private Connectivity Rule for GCP\n  privateGcp:\n    type: temporalcloud:ConnectivityRule\n    name: private_gcp\n    properties:\n      connectivityType: private\n      connectionId: vpce-12345678\n      region: gcp-us-central1\n      gcpProjectId: my-gcp-project-id\n  # Attaching connectivity rules to a namespace\n  ns-with-cr:\n    type: temporalcloud:Namespace\n    properties:\n      name: ns-with-cr\n      regions:\n        - aws-us-west-2\n      apiKeyAuth: true\n      retentionDays: 14\n      connectivityRuleIds:\n        - ${id}\n        - ${idPrivateAws}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","properties":{"connectionId":{"type":"string","description":"The connection ID of the private connection.\n"},"connectivityType":{"type":"string","description":"The type of connectivity. Must be one of 'public' or 'private'.\n"},"gcpProjectId":{"type":"string","description":"The GCP project ID. Required when\u003cspan pulumi-lang-nodejs=\" cloudProvider \" pulumi-lang-dotnet=\" CloudProvider \" pulumi-lang-go=\" cloudProvider \" pulumi-lang-python=\" cloud_provider \" pulumi-lang-yaml=\" cloudProvider \" pulumi-lang-java=\" cloudProvider \"\u003e cloud_provider \u003c/span\u003eis 'gcp'.\n"},"region":{"type":"string","description":"The region of the connection. Example: 'aws-us-west-2'.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FConnectivityRuleTimeouts:ConnectivityRuleTimeouts"}},"type":"object","required":["connectivityType"],"inputProperties":{"connectionId":{"type":"string","description":"The connection ID of the private connection.\n"},"connectivityType":{"type":"string","description":"The type of connectivity. Must be one of 'public' or 'private'.\n"},"gcpProjectId":{"type":"string","description":"The GCP project ID. Required when\u003cspan pulumi-lang-nodejs=\" cloudProvider \" pulumi-lang-dotnet=\" CloudProvider \" pulumi-lang-go=\" cloudProvider \" pulumi-lang-python=\" cloud_provider \" pulumi-lang-yaml=\" cloudProvider \" pulumi-lang-java=\" cloudProvider \"\u003e cloud_provider \u003c/span\u003eis 'gcp'.\n"},"region":{"type":"string","description":"The region of the connection. Example: 'aws-us-west-2'.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FConnectivityRuleTimeouts:ConnectivityRuleTimeouts"}},"requiredInputs":["connectivityType"],"stateInputs":{"description":"Input properties used for looking up and filtering ConnectivityRule resources.\n","properties":{"connectionId":{"type":"string","description":"The connection ID of the private connection.\n"},"connectivityType":{"type":"string","description":"The type of connectivity. Must be one of 'public' or 'private'.\n"},"gcpProjectId":{"type":"string","description":"The GCP project ID. Required when\u003cspan pulumi-lang-nodejs=\" cloudProvider \" pulumi-lang-dotnet=\" CloudProvider \" pulumi-lang-go=\" cloudProvider \" pulumi-lang-python=\" cloud_provider \" pulumi-lang-yaml=\" cloudProvider \" pulumi-lang-java=\" cloudProvider \"\u003e cloud_provider \u003c/span\u003eis 'gcp'.\n"},"region":{"type":"string","description":"The region of the connection. Example: 'aws-us-west-2'.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FConnectivityRuleTimeouts:ConnectivityRuleTimeouts"}},"type":"object"}},"temporalcloud:index/group:Group":{"description":"Provisions a Temporal Cloud User Group.\n\n## Import\n\nThe `pulumi import` command can be used, for example:\n\nGroups can be imported to incorporate existing Groups into your Terraform pipeline.\n\nTo import a Group, you need\n\n- a resource configuration in your Terraform configuration file/module to accept the imported Group. In the example below, the placeholder is \"temporalcloud_group\" \"group\"\n\n- the Group's ID, which is found using the Temporal Cloud CLI tcld g l. In the example below, this is 72360058153949edb2f1d47019c1e85f\n\n```sh\n$ pulumi import temporalcloud:index/group:Group group 72360058153949edb2f1d47019c1e85f\n```\n\n","properties":{"name":{"type":"string","description":"The name of the group\n"},"state":{"type":"string","description":"The current state of the group.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FGroupTimeouts:GroupTimeouts"}},"type":"object","required":["name","state"],"inputProperties":{"name":{"type":"string","description":"The name of the group\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FGroupTimeouts:GroupTimeouts"}},"stateInputs":{"description":"Input properties used for looking up and filtering Group resources.\n","properties":{"name":{"type":"string","description":"The name of the group\n"},"state":{"type":"string","description":"The current state of the group.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FGroupTimeouts:GroupTimeouts"}},"type":"object"}},"temporalcloud:index/groupAccess:GroupAccess":{"description":"Provisions Temporal Cloud group access.\n\n","properties":{"accountAccess":{"type":"string","description":"The role on the account. Must be one of owner, admin, developer, none, or read (case-insensitive). owner is only valid for import and cannot be created, updated or deleted without Temporal support. none is only valid for users managed via SCIM that derive their roles from group memberships or for group access resources.\n"},"groupAccessId":{"type":"string","description":"The unique identifier of the group access across all Temporal Cloud tenants.\n"},"namespaceAccesses":{"type":"array","items":{"$ref":"#/types/temporalcloud:index%2FGroupAccessNamespaceAccess:GroupAccessNamespaceAccess"},"description":"The set of namespace accesses. Empty sets are not allowed, omit the attribute instead. Users with account*access roles of owner or admin cannot be assigned explicit permissions to namespaces. They implicitly receive access to all Namespaces.\n"}},"type":"object","required":["accountAccess","groupAccessId"],"inputProperties":{"accountAccess":{"type":"string","description":"The role on the account. Must be one of owner, admin, developer, none, or read (case-insensitive). owner is only valid for import and cannot be created, updated or deleted without Temporal support. none is only valid for users managed via SCIM that derive their roles from group memberships or for group access resources.\n"},"groupAccessId":{"type":"string","description":"The unique identifier of the group access across all Temporal Cloud tenants.\n"},"namespaceAccesses":{"type":"array","items":{"$ref":"#/types/temporalcloud:index%2FGroupAccessNamespaceAccess:GroupAccessNamespaceAccess"},"description":"The set of namespace accesses. Empty sets are not allowed, omit the attribute instead. Users with account*access roles of owner or admin cannot be assigned explicit permissions to namespaces. They implicitly receive access to all Namespaces.\n"}},"requiredInputs":["accountAccess","groupAccessId"],"stateInputs":{"description":"Input properties used for looking up and filtering GroupAccess resources.\n","properties":{"accountAccess":{"type":"string","description":"The role on the account. Must be one of owner, admin, developer, none, or read (case-insensitive). owner is only valid for import and cannot be created, updated or deleted without Temporal support. none is only valid for users managed via SCIM that derive their roles from group memberships or for group access resources.\n"},"groupAccessId":{"type":"string","description":"The unique identifier of the group access across all Temporal Cloud tenants.\n"},"namespaceAccesses":{"type":"array","items":{"$ref":"#/types/temporalcloud:index%2FGroupAccessNamespaceAccess:GroupAccessNamespaceAccess"},"description":"The set of namespace accesses. Empty sets are not allowed, omit the attribute instead. Users with account*access roles of owner or admin cannot be assigned explicit permissions to namespaces. They implicitly receive access to all Namespaces.\n"}},"type":"object"}},"temporalcloud:index/groupMembers:GroupMembers":{"description":"Sets Group Membership for the provided Group ID. Only use one per group.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```yaml\nresources:\n  adminGroup:\n    type: temporalcloud:Group\n    name: admin_group\n    properties:\n      name: admins\n  reader:\n    type: temporalcloud:User\n    properties:\n      email: reader@yourdomain.com\n      accountAccess: reader\n  adminGroupAccess:\n    type: temporalcloud:GroupAccess\n    name: admin_group_access\n    properties:\n      groupId: ${adminGroup.id}\n      accountAccess: admin\n  adminGroupMembers:\n    type: temporalcloud:GroupMembers\n    name: admin_group_members\n    properties:\n      groupId: ${adminGroup.id}\n      users:\n        - ${reader.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nThe `pulumi import` command can be used, for example:\n\nGroup Members can be imported to incorporate existing Group Memberships into your Terraform pipeline.\n\nTo import Group Members, you need\n\n- a resource configuration in your Terraform configuration file/module to accept the imported Group Members. In the example below, the placeholder is \"temporalcloud_group_members\" \"group\"\n\n- the Group's ID, which is found using the Temporal Cloud CLI tcld g l. In the example below, this is 72360058153949edb2f1d47019c1e85f\n\n```sh\n$ pulumi import temporalcloud:index/groupMembers:GroupMembers group 72360058153949edb2f1d47019c1e85f\n```\n\n","properties":{"groupId":{"type":"string","description":"The Group ID to set the members for.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FGroupMembersTimeouts:GroupMembersTimeouts"},"users":{"type":"array","items":{"type":"string"},"description":"The users to add to the group.\n"}},"type":"object","required":["groupId","users"],"inputProperties":{"groupId":{"type":"string","description":"The Group ID to set the members for.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FGroupMembersTimeouts:GroupMembersTimeouts"},"users":{"type":"array","items":{"type":"string"},"description":"The users to add to the group.\n"}},"requiredInputs":["groupId","users"],"stateInputs":{"description":"Input properties used for looking up and filtering GroupMembers resources.\n","properties":{"groupId":{"type":"string","description":"The Group ID to set the members for.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FGroupMembersTimeouts:GroupMembersTimeouts"},"users":{"type":"array","items":{"type":"string"},"description":"The users to add to the group.\n"}},"type":"object"}},"temporalcloud:index/metricsEndpoint:MetricsEndpoint":{"description":"Configures a Temporal Cloud account's metrics\n\n## Import\n\nThe `pulumi import` command can be used, for example:\n\n```sh\n$ pulumi import temporalcloud:index/metricsEndpoint:MetricsEndpoint terraform terraform.account-11111-metrics\n```\n\n","properties":{"acceptedClientCa":{"type":"string","description":"The Base64-encoded CA cert in PEM format used to authenticate clients connecting to the metrics endpoint.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FMetricsEndpointTimeouts:MetricsEndpointTimeouts"},"uri":{"type":"string","description":"The Prometheus metrics endpoint URI\n"}},"type":"object","required":["acceptedClientCa","uri"],"inputProperties":{"acceptedClientCa":{"type":"string","description":"The Base64-encoded CA cert in PEM format used to authenticate clients connecting to the metrics endpoint.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FMetricsEndpointTimeouts:MetricsEndpointTimeouts"}},"requiredInputs":["acceptedClientCa"],"stateInputs":{"description":"Input properties used for looking up and filtering MetricsEndpoint resources.\n","properties":{"acceptedClientCa":{"type":"string","description":"The Base64-encoded CA cert in PEM format used to authenticate clients connecting to the metrics endpoint.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FMetricsEndpointTimeouts:MetricsEndpointTimeouts"},"uri":{"type":"string","description":"The Prometheus metrics endpoint URI\n"}},"type":"object"}},"temporalcloud:index/namespace:Namespace":{"description":"Provisions a Temporal Cloud namespace. \n\nRegions available in Temporal Cloud: https://docs.temporal.io/cloud/regions. \n\nNote that regions are prefixed with the cloud provider (aws-us-east-1, not us-east-1)\n\n## Import\n\nThe `pulumi import` command can be used, for example:\n\nNamespace can be imported to incorporate existing Namespaces into your Terraform pipeline. \n\nTo import a Namespace, you need\n\n- a resource configuration in your Terraform configuration file/module to accept the imported Namespace. In the example below, the placeholder is \"temporalcloud_namespace\" \"terraform\"\n\n- the Namespace ID, which includes the Namespace Name and Account ID available at the top of the Namespace's page in the Temporal Cloud UI. In the example below, this is namespaceid.acctid\n\n```sh\n$ pulumi import temporalcloud:index/namespace:Namespace terraform namespaceid.acctid\n```\n\n","properties":{"acceptedClientCa":{"type":"string","description":"The Base64-encoded CA cert in PEM format that clients use when authenticating with Temporal Cloud. This is a required field when a Namespace uses mTLS authentication.\n"},"apiKeyAuth":{"type":"boolean","description":"If true, Temporal Cloud will enable API key authentication for this namespace.\n"},"capacity":{"$ref":"#/types/temporalcloud:index%2FNamespaceCapacity:NamespaceCapacity","description":"The capacity configuration for the namespace.\n"},"certificateFilters":{"type":"array","items":{"$ref":"#/types/temporalcloud:index%2FNamespaceCertificateFilter:NamespaceCertificateFilter"},"description":"A list of filters to apply to client certificates when initiating a connection Temporal Cloud. If present, connections will only be allowed from client certificates whose distinguished name properties match at least one of the filters. Empty lists are not allowed, omit the attribute instead.\n"},"codecServer":{"$ref":"#/types/temporalcloud:index%2FNamespaceCodecServer:NamespaceCodecServer","description":"A codec server is used by the Temporal Cloud UI to decode payloads for all users interacting with this namespace, even if the workflow history itself is encrypted.\n"},"connectivityRuleIds":{"type":"array","items":{"type":"string"},"description":"The IDs of the connectivity rules for this namespace.\n"},"endpoints":{"$ref":"#/types/temporalcloud:index%2FNamespaceEndpoints:NamespaceEndpoints","description":"The endpoints for the namespace.\n"},"name":{"type":"string","description":"The name of the namespace. Must be 2-64 characters, start with a letter, contain only lowercase letters, numbers, and hyphens, and not end with a hyphen.\n"},"namespaceLifecycle":{"$ref":"#/types/temporalcloud:index%2FNamespaceNamespaceLifecycle:NamespaceNamespaceLifecycle"},"regions":{"type":"array","items":{"type":"string"},"description":"The list of regions where this namespace is available. Must be one or two regions. See https://docs.temporal.io/cloud/regions for a list of available regions and HA options. Note that regions are prefixed with the cloud provider (aws-us-east-1, not us-east-1). If two regions are specified, the namespace will be replicated across them in a high availability (HA) configuration. Same-region, multi-region, and multi-cloud HA namespaces are supported. Please note that changing, adding, or removing regions for an existing namespace is not currently supported and the provider will throw an error. For HA namespaces the provider will ignore order changes on regions, which can happen if the namespace fails over.\n"},"retentionDays":{"type":"number","description":"The number of days to retain workflow history. Any changes to the retention period will be applied to all new running workflows.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FNamespaceTimeouts:NamespaceTimeouts"}},"type":"object","required":["apiKeyAuth","endpoints","name","regions","retentionDays"],"inputProperties":{"acceptedClientCa":{"type":"string","description":"The Base64-encoded CA cert in PEM format that clients use when authenticating with Temporal Cloud. This is a required field when a Namespace uses mTLS authentication.\n"},"apiKeyAuth":{"type":"boolean","description":"If true, Temporal Cloud will enable API key authentication for this namespace.\n"},"capacity":{"$ref":"#/types/temporalcloud:index%2FNamespaceCapacity:NamespaceCapacity","description":"The capacity configuration for the namespace.\n"},"certificateFilters":{"type":"array","items":{"$ref":"#/types/temporalcloud:index%2FNamespaceCertificateFilter:NamespaceCertificateFilter"},"description":"A list of filters to apply to client certificates when initiating a connection Temporal Cloud. If present, connections will only be allowed from client certificates whose distinguished name properties match at least one of the filters. Empty lists are not allowed, omit the attribute instead.\n"},"codecServer":{"$ref":"#/types/temporalcloud:index%2FNamespaceCodecServer:NamespaceCodecServer","description":"A codec server is used by the Temporal Cloud UI to decode payloads for all users interacting with this namespace, even if the workflow history itself is encrypted.\n"},"connectivityRuleIds":{"type":"array","items":{"type":"string"},"description":"The IDs of the connectivity rules for this namespace.\n"},"name":{"type":"string","description":"The name of the namespace. Must be 2-64 characters, start with a letter, contain only lowercase letters, numbers, and hyphens, and not end with a hyphen.\n"},"namespaceLifecycle":{"$ref":"#/types/temporalcloud:index%2FNamespaceNamespaceLifecycle:NamespaceNamespaceLifecycle"},"regions":{"type":"array","items":{"type":"string"},"description":"The list of regions where this namespace is available. Must be one or two regions. See https://docs.temporal.io/cloud/regions for a list of available regions and HA options. Note that regions are prefixed with the cloud provider (aws-us-east-1, not us-east-1). If two regions are specified, the namespace will be replicated across them in a high availability (HA) configuration. Same-region, multi-region, and multi-cloud HA namespaces are supported. Please note that changing, adding, or removing regions for an existing namespace is not currently supported and the provider will throw an error. For HA namespaces the provider will ignore order changes on regions, which can happen if the namespace fails over.\n"},"retentionDays":{"type":"number","description":"The number of days to retain workflow history. Any changes to the retention period will be applied to all new running workflows.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FNamespaceTimeouts:NamespaceTimeouts"}},"requiredInputs":["regions","retentionDays"],"stateInputs":{"description":"Input properties used for looking up and filtering Namespace resources.\n","properties":{"acceptedClientCa":{"type":"string","description":"The Base64-encoded CA cert in PEM format that clients use when authenticating with Temporal Cloud. This is a required field when a Namespace uses mTLS authentication.\n"},"apiKeyAuth":{"type":"boolean","description":"If true, Temporal Cloud will enable API key authentication for this namespace.\n"},"capacity":{"$ref":"#/types/temporalcloud:index%2FNamespaceCapacity:NamespaceCapacity","description":"The capacity configuration for the namespace.\n"},"certificateFilters":{"type":"array","items":{"$ref":"#/types/temporalcloud:index%2FNamespaceCertificateFilter:NamespaceCertificateFilter"},"description":"A list of filters to apply to client certificates when initiating a connection Temporal Cloud. If present, connections will only be allowed from client certificates whose distinguished name properties match at least one of the filters. Empty lists are not allowed, omit the attribute instead.\n"},"codecServer":{"$ref":"#/types/temporalcloud:index%2FNamespaceCodecServer:NamespaceCodecServer","description":"A codec server is used by the Temporal Cloud UI to decode payloads for all users interacting with this namespace, even if the workflow history itself is encrypted.\n"},"connectivityRuleIds":{"type":"array","items":{"type":"string"},"description":"The IDs of the connectivity rules for this namespace.\n"},"endpoints":{"$ref":"#/types/temporalcloud:index%2FNamespaceEndpoints:NamespaceEndpoints","description":"The endpoints for the namespace.\n"},"name":{"type":"string","description":"The name of the namespace. Must be 2-64 characters, start with a letter, contain only lowercase letters, numbers, and hyphens, and not end with a hyphen.\n"},"namespaceLifecycle":{"$ref":"#/types/temporalcloud:index%2FNamespaceNamespaceLifecycle:NamespaceNamespaceLifecycle"},"regions":{"type":"array","items":{"type":"string"},"description":"The list of regions where this namespace is available. Must be one or two regions. See https://docs.temporal.io/cloud/regions for a list of available regions and HA options. Note that regions are prefixed with the cloud provider (aws-us-east-1, not us-east-1). If two regions are specified, the namespace will be replicated across them in a high availability (HA) configuration. Same-region, multi-region, and multi-cloud HA namespaces are supported. Please note that changing, adding, or removing regions for an existing namespace is not currently supported and the provider will throw an error. For HA namespaces the provider will ignore order changes on regions, which can happen if the namespace fails over.\n"},"retentionDays":{"type":"number","description":"The number of days to retain workflow history. Any changes to the retention period will be applied to all new running workflows.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FNamespaceTimeouts:NamespaceTimeouts"}},"type":"object"}},"temporalcloud:index/namespaceExportSink:NamespaceExportSink":{"description":"Provisions a namespace export sink.\n","properties":{"enabled":{"type":"boolean","description":"A flag indicating whether the export sink is enabled or not.\n"},"gcs":{"$ref":"#/types/temporalcloud:index%2FNamespaceExportSinkGcs:NamespaceExportSinkGcs","description":"The GCS configuration details when\u003cspan pulumi-lang-nodejs=\" destinationType \" pulumi-lang-dotnet=\" DestinationType \" pulumi-lang-go=\" destinationType \" pulumi-lang-python=\" destination_type \" pulumi-lang-yaml=\" destinationType \" pulumi-lang-java=\" destinationType \"\u003e destination_type \u003c/span\u003eis GCS.\n"},"namespace":{"type":"string","description":"The namespace under which the sink is configured, formatted as `\u003cnamespace\u003e.\u003caccount_id\u003e`\n"},"s3":{"$ref":"#/types/temporalcloud:index%2FNamespaceExportSinkS3:NamespaceExportSinkS3","description":"The S3 configuration details when\u003cspan pulumi-lang-nodejs=\" destinationType \" pulumi-lang-dotnet=\" DestinationType \" pulumi-lang-go=\" destinationType \" pulumi-lang-python=\" destination_type \" pulumi-lang-yaml=\" destinationType \" pulumi-lang-java=\" destinationType \"\u003e destination_type \u003c/span\u003eis S3.\n"},"sinkName":{"type":"string","description":"The unique name of the export sink, it can't be changed once set.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FNamespaceExportSinkTimeouts:NamespaceExportSinkTimeouts"}},"type":"object","required":["enabled","namespace","sinkName"],"inputProperties":{"enabled":{"type":"boolean","description":"A flag indicating whether the export sink is enabled or not.\n"},"gcs":{"$ref":"#/types/temporalcloud:index%2FNamespaceExportSinkGcs:NamespaceExportSinkGcs","description":"The GCS configuration details when\u003cspan pulumi-lang-nodejs=\" destinationType \" pulumi-lang-dotnet=\" DestinationType \" pulumi-lang-go=\" destinationType \" pulumi-lang-python=\" destination_type \" pulumi-lang-yaml=\" destinationType \" pulumi-lang-java=\" destinationType \"\u003e destination_type \u003c/span\u003eis GCS.\n"},"namespace":{"type":"string","description":"The namespace under which the sink is configured, formatted as `\u003cnamespace\u003e.\u003caccount_id\u003e`\n"},"s3":{"$ref":"#/types/temporalcloud:index%2FNamespaceExportSinkS3:NamespaceExportSinkS3","description":"The S3 configuration details when\u003cspan pulumi-lang-nodejs=\" destinationType \" pulumi-lang-dotnet=\" DestinationType \" pulumi-lang-go=\" destinationType \" pulumi-lang-python=\" destination_type \" pulumi-lang-yaml=\" destinationType \" pulumi-lang-java=\" destinationType \"\u003e destination_type \u003c/span\u003eis S3.\n"},"sinkName":{"type":"string","description":"The unique name of the export sink, it can't be changed once set.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FNamespaceExportSinkTimeouts:NamespaceExportSinkTimeouts"}},"requiredInputs":["namespace","sinkName"],"stateInputs":{"description":"Input properties used for looking up and filtering NamespaceExportSink resources.\n","properties":{"enabled":{"type":"boolean","description":"A flag indicating whether the export sink is enabled or not.\n"},"gcs":{"$ref":"#/types/temporalcloud:index%2FNamespaceExportSinkGcs:NamespaceExportSinkGcs","description":"The GCS configuration details when\u003cspan pulumi-lang-nodejs=\" destinationType \" pulumi-lang-dotnet=\" DestinationType \" pulumi-lang-go=\" destinationType \" pulumi-lang-python=\" destination_type \" pulumi-lang-yaml=\" destinationType \" pulumi-lang-java=\" destinationType \"\u003e destination_type \u003c/span\u003eis GCS.\n"},"namespace":{"type":"string","description":"The namespace under which the sink is configured, formatted as `\u003cnamespace\u003e.\u003caccount_id\u003e`\n"},"s3":{"$ref":"#/types/temporalcloud:index%2FNamespaceExportSinkS3:NamespaceExportSinkS3","description":"The S3 configuration details when\u003cspan pulumi-lang-nodejs=\" destinationType \" pulumi-lang-dotnet=\" DestinationType \" pulumi-lang-go=\" destinationType \" pulumi-lang-python=\" destination_type \" pulumi-lang-yaml=\" destinationType \" pulumi-lang-java=\" destinationType \"\u003e destination_type \u003c/span\u003eis S3.\n"},"sinkName":{"type":"string","description":"The unique name of the export sink, it can't be changed once set.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FNamespaceExportSinkTimeouts:NamespaceExportSinkTimeouts"}},"type":"object"}},"temporalcloud:index/namespaceSearchAttribute:NamespaceSearchAttribute":{"description":"Create a [search attribute](https://docs.temporal.io/visibility#search-attribute) in a Temporal Cloud namespace. Note the limits on [quantity](https://docs.temporal.io/cloud/limits#number-of-custom-search-attributes) and [naming](https://docs.temporal.io/cloud/limits#custom-search-attribute-names).\n\n## Import\n\nThe `pulumi import` command can be used, for example:\n\nSearch Attributes can be imported to incorporate existing Namespace Search Attributes into your Terraform pipeline. \n\nTo import a Search Attribute, you need\n\n- a resource configuration in your Terraform configuration file/module to accept the imported Search Attribute. In the example below, the placeholder is \"temporalcloud_namespace_search_attribute\" \"saimport\"\n\n- the Namespace ID, which includes the Namespace Name and Account ID available at the top of the Namespace's page in the Temporal Cloud UI. In the example below, this is namespaceid.acctid\n\n- the name of the Search Attribute, which is available in the Search Attribute configuration of Namespace's page in the Temporal Cloud UI. In the example below, this is searchAttr\n\n```sh\n$ pulumi import temporalcloud:index/namespaceSearchAttribute:NamespaceSearchAttribute saimport namespaceid.acctid/searchAttr\n```\n\n","properties":{"name":{"type":"string","description":"The name of the search attribute.\n"},"namespaceId":{"type":"string","description":"The ID of the namespace to which this search attribute belongs.\n"},"type":{"type":"string","description":"The type of the search attribute. Must be one of \u003cspan pulumi-lang-nodejs=\"`bool`\" pulumi-lang-dotnet=\"`Bool`\" pulumi-lang-go=\"`bool`\" pulumi-lang-python=\"`bool`\" pulumi-lang-yaml=\"`bool`\" pulumi-lang-java=\"`bool`\"\u003e`bool`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`datetime`\" pulumi-lang-dotnet=\"`Datetime`\" pulumi-lang-go=\"`datetime`\" pulumi-lang-python=\"`datetime`\" pulumi-lang-yaml=\"`datetime`\" pulumi-lang-java=\"`datetime`\"\u003e`datetime`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`double`\" pulumi-lang-dotnet=\"`Double`\" pulumi-lang-go=\"`double`\" pulumi-lang-python=\"`double`\" pulumi-lang-yaml=\"`double`\" pulumi-lang-java=\"`double`\"\u003e`double`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`int`\" pulumi-lang-dotnet=\"`Int`\" pulumi-lang-go=\"`int`\" pulumi-lang-python=\"`int`\" pulumi-lang-yaml=\"`int`\" pulumi-lang-java=\"`int`\"\u003e`int`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`keyword`\" pulumi-lang-dotnet=\"`Keyword`\" pulumi-lang-go=\"`keyword`\" pulumi-lang-python=\"`keyword`\" pulumi-lang-yaml=\"`keyword`\" pulumi-lang-java=\"`keyword`\"\u003e`keyword`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`keywordList`\" pulumi-lang-dotnet=\"`KeywordList`\" pulumi-lang-go=\"`keywordList`\" pulumi-lang-python=\"`keyword_list`\" pulumi-lang-yaml=\"`keywordList`\" pulumi-lang-java=\"`keywordList`\"\u003e`keyword_list`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`text`\" pulumi-lang-dotnet=\"`Text`\" pulumi-lang-go=\"`text`\" pulumi-lang-python=\"`text`\" pulumi-lang-yaml=\"`text`\" pulumi-lang-java=\"`text`\"\u003e`text`\u003c/span\u003e. (case-insensitive)\n"}},"type":"object","required":["name","namespaceId","type"],"inputProperties":{"name":{"type":"string","description":"The name of the search attribute.\n"},"namespaceId":{"type":"string","description":"The ID of the namespace to which this search attribute belongs.\n"},"type":{"type":"string","description":"The type of the search attribute. Must be one of \u003cspan pulumi-lang-nodejs=\"`bool`\" pulumi-lang-dotnet=\"`Bool`\" pulumi-lang-go=\"`bool`\" pulumi-lang-python=\"`bool`\" pulumi-lang-yaml=\"`bool`\" pulumi-lang-java=\"`bool`\"\u003e`bool`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`datetime`\" pulumi-lang-dotnet=\"`Datetime`\" pulumi-lang-go=\"`datetime`\" pulumi-lang-python=\"`datetime`\" pulumi-lang-yaml=\"`datetime`\" pulumi-lang-java=\"`datetime`\"\u003e`datetime`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`double`\" pulumi-lang-dotnet=\"`Double`\" pulumi-lang-go=\"`double`\" pulumi-lang-python=\"`double`\" pulumi-lang-yaml=\"`double`\" pulumi-lang-java=\"`double`\"\u003e`double`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`int`\" pulumi-lang-dotnet=\"`Int`\" pulumi-lang-go=\"`int`\" pulumi-lang-python=\"`int`\" pulumi-lang-yaml=\"`int`\" pulumi-lang-java=\"`int`\"\u003e`int`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`keyword`\" pulumi-lang-dotnet=\"`Keyword`\" pulumi-lang-go=\"`keyword`\" pulumi-lang-python=\"`keyword`\" pulumi-lang-yaml=\"`keyword`\" pulumi-lang-java=\"`keyword`\"\u003e`keyword`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`keywordList`\" pulumi-lang-dotnet=\"`KeywordList`\" pulumi-lang-go=\"`keywordList`\" pulumi-lang-python=\"`keyword_list`\" pulumi-lang-yaml=\"`keywordList`\" pulumi-lang-java=\"`keywordList`\"\u003e`keyword_list`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`text`\" pulumi-lang-dotnet=\"`Text`\" pulumi-lang-go=\"`text`\" pulumi-lang-python=\"`text`\" pulumi-lang-yaml=\"`text`\" pulumi-lang-java=\"`text`\"\u003e`text`\u003c/span\u003e. (case-insensitive)\n"}},"requiredInputs":["namespaceId","type"],"stateInputs":{"description":"Input properties used for looking up and filtering NamespaceSearchAttribute resources.\n","properties":{"name":{"type":"string","description":"The name of the search attribute.\n"},"namespaceId":{"type":"string","description":"The ID of the namespace to which this search attribute belongs.\n"},"type":{"type":"string","description":"The type of the search attribute. Must be one of \u003cspan pulumi-lang-nodejs=\"`bool`\" pulumi-lang-dotnet=\"`Bool`\" pulumi-lang-go=\"`bool`\" pulumi-lang-python=\"`bool`\" pulumi-lang-yaml=\"`bool`\" pulumi-lang-java=\"`bool`\"\u003e`bool`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`datetime`\" pulumi-lang-dotnet=\"`Datetime`\" pulumi-lang-go=\"`datetime`\" pulumi-lang-python=\"`datetime`\" pulumi-lang-yaml=\"`datetime`\" pulumi-lang-java=\"`datetime`\"\u003e`datetime`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`double`\" pulumi-lang-dotnet=\"`Double`\" pulumi-lang-go=\"`double`\" pulumi-lang-python=\"`double`\" pulumi-lang-yaml=\"`double`\" pulumi-lang-java=\"`double`\"\u003e`double`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`int`\" pulumi-lang-dotnet=\"`Int`\" pulumi-lang-go=\"`int`\" pulumi-lang-python=\"`int`\" pulumi-lang-yaml=\"`int`\" pulumi-lang-java=\"`int`\"\u003e`int`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`keyword`\" pulumi-lang-dotnet=\"`Keyword`\" pulumi-lang-go=\"`keyword`\" pulumi-lang-python=\"`keyword`\" pulumi-lang-yaml=\"`keyword`\" pulumi-lang-java=\"`keyword`\"\u003e`keyword`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`keywordList`\" pulumi-lang-dotnet=\"`KeywordList`\" pulumi-lang-go=\"`keywordList`\" pulumi-lang-python=\"`keyword_list`\" pulumi-lang-yaml=\"`keywordList`\" pulumi-lang-java=\"`keywordList`\"\u003e`keyword_list`\u003c/span\u003e or \u003cspan pulumi-lang-nodejs=\"`text`\" pulumi-lang-dotnet=\"`Text`\" pulumi-lang-go=\"`text`\" pulumi-lang-python=\"`text`\" pulumi-lang-yaml=\"`text`\" pulumi-lang-java=\"`text`\"\u003e`text`\u003c/span\u003e. (case-insensitive)\n"}},"type":"object"}},"temporalcloud:index/namespaceTags:NamespaceTags":{"description":"Manages the complete set of tags for a Temporal Cloud namespace.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as temporalcloud from \"@pulumi/temporalcloud\";\n\n// Create a namespace first\nconst example = new temporalcloud.Namespace(\"example\", {\n    name: \"example-namespace\",\n    regions: [\"aws-us-west-2\"],\n    apiKeyAuth: true,\n    retentionDays: 14,\n});\n// Basic namespace tags example, with a custom timeout\nconst exampleNamespaceTags = new temporalcloud.NamespaceTags(\"example\", {\n    namespaceId: example.id,\n    tags: {\n        environment: \"production\",\n        team: \"backend\",\n        project: \"temporal-workflows\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_temporalcloud as temporalcloud\n\n# Create a namespace first\nexample = temporalcloud.Namespace(\"example\",\n    name=\"example-namespace\",\n    regions=[\"aws-us-west-2\"],\n    api_key_auth=True,\n    retention_days=14)\n# Basic namespace tags example, with a custom timeout\nexample_namespace_tags = temporalcloud.NamespaceTags(\"example\",\n    namespace_id=example.id,\n    tags={\n        \"environment\": \"production\",\n        \"team\": \"backend\",\n        \"project\": \"temporal-workflows\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Temporalcloud = Pulumi.Temporalcloud;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    // Create a namespace first\n    var example = new Temporalcloud.Namespace(\"example\", new()\n    {\n        Name = \"example-namespace\",\n        Regions = new[]\n        {\n            \"aws-us-west-2\",\n        },\n        ApiKeyAuth = true,\n        RetentionDays = 14,\n    });\n\n    // Basic namespace tags example, with a custom timeout\n    var exampleNamespaceTags = new Temporalcloud.NamespaceTags(\"example\", new()\n    {\n        NamespaceId = example.Id,\n        Tags = \n        {\n            { \"environment\", \"production\" },\n            { \"team\", \"backend\" },\n            { \"project\", \"temporal-workflows\" },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/temporalcloud/temporalcloud\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t// Create a namespace first\n\t\texample, err := temporalcloud.NewNamespace(ctx, \"example\", \u0026temporalcloud.NamespaceArgs{\n\t\t\tName: pulumi.String(\"example-namespace\"),\n\t\t\tRegions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"aws-us-west-2\"),\n\t\t\t},\n\t\t\tApiKeyAuth:    pulumi.Bool(true),\n\t\t\tRetentionDays: pulumi.Float64(14),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Basic namespace tags example, with a custom timeout\n\t\t_, err = temporalcloud.NewNamespaceTags(ctx, \"example\", \u0026temporalcloud.NamespaceTagsArgs{\n\t\t\tNamespaceId: example.ID(),\n\t\t\tTags: pulumi.StringMap{\n\t\t\t\t\"environment\": pulumi.String(\"production\"),\n\t\t\t\t\"team\":        pulumi.String(\"backend\"),\n\t\t\t\t\"project\":     pulumi.String(\"temporal-workflows\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.temporalcloud.Namespace;\nimport com.pulumi.temporalcloud.NamespaceArgs;\nimport com.pulumi.temporalcloud.NamespaceTags;\nimport com.pulumi.temporalcloud.NamespaceTagsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        // Create a namespace first\n        var example = new Namespace(\"example\", NamespaceArgs.builder()\n            .name(\"example-namespace\")\n            .regions(\"aws-us-west-2\")\n            .apiKeyAuth(true)\n            .retentionDays(14.0)\n            .build());\n\n        // Basic namespace tags example, with a custom timeout\n        var exampleNamespaceTags = new NamespaceTags(\"exampleNamespaceTags\", NamespaceTagsArgs.builder()\n            .namespaceId(example.id())\n            .tags(Map.ofEntries(\n                Map.entry(\"environment\", \"production\"),\n                Map.entry(\"team\", \"backend\"),\n                Map.entry(\"project\", \"temporal-workflows\")\n            ))\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  # Create a namespace first\n  example:\n    type: temporalcloud:Namespace\n    properties:\n      name: example-namespace\n      regions:\n        - aws-us-west-2\n      apiKeyAuth: true\n      retentionDays: 14\n  # Basic namespace tags example, with a custom timeout\n  exampleNamespaceTags:\n    type: temporalcloud:NamespaceTags\n    name: example\n    properties:\n      namespaceId: ${example.id}\n      tags:\n        environment: production\n        team: backend\n        project: temporal-workflows\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nThe `pulumi import` command can be used, for example:\n\nNamespace Tags can be imported to incorporate existing Namespace Tags into your Terraform pipeline.\n\nTo import Namespace Tags, you need:\n\n- a resource configuration in your Terraform configuration file/module to accept the imported Namespace Tags. In the example below, the placeholder is \"temporalcloud_namespace_tags\" \"tags_import\"\n\n- the Namespace ID, which includes the Namespace Name and Account ID available at the top of the Namespace's page in the Temporal Cloud UI. In the example below, this is namespaceid.acctid\n\nThe import ID format is: namespaceid.acctid/tags\n\n```sh\n$ pulumi import temporalcloud:index/namespaceTags:NamespaceTags tags_import namespaceid.acctid/tags\n```\n\n","properties":{"namespaceId":{"type":"string","description":"The ID of the namespace to manage tags for.\n"},"tags":{"type":"object","additionalProperties":{"type":"string"},"description":"A map of tag keys to tag values.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FNamespaceTagsTimeouts:NamespaceTagsTimeouts"}},"type":"object","required":["namespaceId","tags"],"inputProperties":{"namespaceId":{"type":"string","description":"The ID of the namespace to manage tags for.\n"},"tags":{"type":"object","additionalProperties":{"type":"string"},"description":"A map of tag keys to tag values.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FNamespaceTagsTimeouts:NamespaceTagsTimeouts"}},"requiredInputs":["namespaceId","tags"],"stateInputs":{"description":"Input properties used for looking up and filtering NamespaceTags resources.\n","properties":{"namespaceId":{"type":"string","description":"The ID of the namespace to manage tags for.\n"},"tags":{"type":"object","additionalProperties":{"type":"string"},"description":"A map of tag keys to tag values.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FNamespaceTagsTimeouts:NamespaceTagsTimeouts"}},"type":"object"}},"temporalcloud:index/nexusEndpoint:NexusEndpoint":{"description":"Provisions a Temporal Cloud Nexus endpoint.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as temporalcloud from \"@pulumi/temporalcloud\";\n\nconst targetNamespace = new temporalcloud.Namespace(\"target_namespace\", {\n    name: \"terraform-target-namespace\",\n    regions: [\"aws-us-west-2\"],\n    apiKeyAuth: true,\n    retentionDays: 14,\n});\nconst callerNamespace = new temporalcloud.Namespace(\"caller_namespace\", {\n    name: \"terraform-caller-namespace\",\n    regions: [\"aws-us-east-1\"],\n    apiKeyAuth: true,\n    retentionDays: 14,\n});\nconst callerNamespace2 = new temporalcloud.Namespace(\"caller_namespace_2\", {\n    name: \"terraform-caller-namespace-2\",\n    regions: [\"gcp-us-central1\"],\n    apiKeyAuth: true,\n    retentionDays: 14,\n});\nconst nexusEndpoint = new temporalcloud.NexusEndpoint(\"nexus_endpoint\", {\n    name: \"terraform-nexus-endpoint\",\n    description: `Service Name:\n  my-hello-service\nOperation Names:\n  echo\n  say-hello\n\nInput / Output arguments are in the following repository:\nhttps://github.com/temporalio/samples-go/blob/main/nexus/service/api.go\n`,\n    workerTarget: {\n        namespaceId: targetNamespace.id,\n        taskQueue: \"terraform-task-queue\",\n    },\n    allowedCallerNamespaces: [\n        callerNamespace.id,\n        callerNamespace2.id,\n    ],\n});\n```\n```python\nimport pulumi\nimport pulumi_temporalcloud as temporalcloud\n\ntarget_namespace = temporalcloud.Namespace(\"target_namespace\",\n    name=\"terraform-target-namespace\",\n    regions=[\"aws-us-west-2\"],\n    api_key_auth=True,\n    retention_days=14)\ncaller_namespace = temporalcloud.Namespace(\"caller_namespace\",\n    name=\"terraform-caller-namespace\",\n    regions=[\"aws-us-east-1\"],\n    api_key_auth=True,\n    retention_days=14)\ncaller_namespace2 = temporalcloud.Namespace(\"caller_namespace_2\",\n    name=\"terraform-caller-namespace-2\",\n    regions=[\"gcp-us-central1\"],\n    api_key_auth=True,\n    retention_days=14)\nnexus_endpoint = temporalcloud.NexusEndpoint(\"nexus_endpoint\",\n    name=\"terraform-nexus-endpoint\",\n    description=\"\"\"Service Name:\n  my-hello-service\nOperation Names:\n  echo\n  say-hello\n\nInput / Output arguments are in the following repository:\nhttps://github.com/temporalio/samples-go/blob/main/nexus/service/api.go\n\"\"\",\n    worker_target={\n        \"namespace_id\": target_namespace.id,\n        \"task_queue\": \"terraform-task-queue\",\n    },\n    allowed_caller_namespaces=[\n        caller_namespace.id,\n        caller_namespace2.id,\n    ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Temporalcloud = Pulumi.Temporalcloud;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var targetNamespace = new Temporalcloud.Namespace(\"target_namespace\", new()\n    {\n        Name = \"terraform-target-namespace\",\n        Regions = new[]\n        {\n            \"aws-us-west-2\",\n        },\n        ApiKeyAuth = true,\n        RetentionDays = 14,\n    });\n\n    var callerNamespace = new Temporalcloud.Namespace(\"caller_namespace\", new()\n    {\n        Name = \"terraform-caller-namespace\",\n        Regions = new[]\n        {\n            \"aws-us-east-1\",\n        },\n        ApiKeyAuth = true,\n        RetentionDays = 14,\n    });\n\n    var callerNamespace2 = new Temporalcloud.Namespace(\"caller_namespace_2\", new()\n    {\n        Name = \"terraform-caller-namespace-2\",\n        Regions = new[]\n        {\n            \"gcp-us-central1\",\n        },\n        ApiKeyAuth = true,\n        RetentionDays = 14,\n    });\n\n    var nexusEndpoint = new Temporalcloud.NexusEndpoint(\"nexus_endpoint\", new()\n    {\n        Name = \"terraform-nexus-endpoint\",\n        Description = @\"Service Name:\n  my-hello-service\nOperation Names:\n  echo\n  say-hello\n\nInput / Output arguments are in the following repository:\nhttps://github.com/temporalio/samples-go/blob/main/nexus/service/api.go\n\",\n        WorkerTarget = new Temporalcloud.Inputs.NexusEndpointWorkerTargetArgs\n        {\n            NamespaceId = targetNamespace.Id,\n            TaskQueue = \"terraform-task-queue\",\n        },\n        AllowedCallerNamespaces = new[]\n        {\n            callerNamespace.Id,\n            callerNamespace2.Id,\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/temporalcloud/temporalcloud\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\ttargetNamespace, err := temporalcloud.NewNamespace(ctx, \"target_namespace\", \u0026temporalcloud.NamespaceArgs{\n\t\t\tName: pulumi.String(\"terraform-target-namespace\"),\n\t\t\tRegions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"aws-us-west-2\"),\n\t\t\t},\n\t\t\tApiKeyAuth:    pulumi.Bool(true),\n\t\t\tRetentionDays: pulumi.Float64(14),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcallerNamespace, err := temporalcloud.NewNamespace(ctx, \"caller_namespace\", \u0026temporalcloud.NamespaceArgs{\n\t\t\tName: pulumi.String(\"terraform-caller-namespace\"),\n\t\t\tRegions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"aws-us-east-1\"),\n\t\t\t},\n\t\t\tApiKeyAuth:    pulumi.Bool(true),\n\t\t\tRetentionDays: pulumi.Float64(14),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcallerNamespace2, err := temporalcloud.NewNamespace(ctx, \"caller_namespace_2\", \u0026temporalcloud.NamespaceArgs{\n\t\t\tName: pulumi.String(\"terraform-caller-namespace-2\"),\n\t\t\tRegions: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"gcp-us-central1\"),\n\t\t\t},\n\t\t\tApiKeyAuth:    pulumi.Bool(true),\n\t\t\tRetentionDays: pulumi.Float64(14),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = temporalcloud.NewNexusEndpoint(ctx, \"nexus_endpoint\", \u0026temporalcloud.NexusEndpointArgs{\n\t\t\tName: pulumi.String(\"terraform-nexus-endpoint\"),\n\t\t\tDescription: pulumi.String(`Service Name:\n  my-hello-service\nOperation Names:\n  echo\n  say-hello\n\nInput / Output arguments are in the following repository:\nhttps://github.com/temporalio/samples-go/blob/main/nexus/service/api.go\n`),\n\t\t\tWorkerTarget: \u0026temporalcloud.NexusEndpointWorkerTargetArgs{\n\t\t\t\tNamespaceId: targetNamespace.ID(),\n\t\t\t\tTaskQueue:   pulumi.String(\"terraform-task-queue\"),\n\t\t\t},\n\t\t\tAllowedCallerNamespaces: pulumi.StringArray{\n\t\t\t\tcallerNamespace.ID(),\n\t\t\t\tcallerNamespace2.ID(),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.temporalcloud.Namespace;\nimport com.pulumi.temporalcloud.NamespaceArgs;\nimport com.pulumi.temporalcloud.NexusEndpoint;\nimport com.pulumi.temporalcloud.NexusEndpointArgs;\nimport com.pulumi.temporalcloud.inputs.NexusEndpointWorkerTargetArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var targetNamespace = new Namespace(\"targetNamespace\", NamespaceArgs.builder()\n            .name(\"terraform-target-namespace\")\n            .regions(\"aws-us-west-2\")\n            .apiKeyAuth(true)\n            .retentionDays(14.0)\n            .build());\n\n        var callerNamespace = new Namespace(\"callerNamespace\", NamespaceArgs.builder()\n            .name(\"terraform-caller-namespace\")\n            .regions(\"aws-us-east-1\")\n            .apiKeyAuth(true)\n            .retentionDays(14.0)\n            .build());\n\n        var callerNamespace2 = new Namespace(\"callerNamespace2\", NamespaceArgs.builder()\n            .name(\"terraform-caller-namespace-2\")\n            .regions(\"gcp-us-central1\")\n            .apiKeyAuth(true)\n            .retentionDays(14.0)\n            .build());\n\n        var nexusEndpoint = new NexusEndpoint(\"nexusEndpoint\", NexusEndpointArgs.builder()\n            .name(\"terraform-nexus-endpoint\")\n            .description(\"\"\"\nService Name:\n  my-hello-service\nOperation Names:\n  echo\n  say-hello\n\nInput / Output arguments are in the following repository:\nhttps://github.com/temporalio/samples-go/blob/main/nexus/service/api.go\n            \"\"\")\n            .workerTarget(NexusEndpointWorkerTargetArgs.builder()\n                .namespaceId(targetNamespace.id())\n                .taskQueue(\"terraform-task-queue\")\n                .build())\n            .allowedCallerNamespaces(            \n                callerNamespace.id(),\n                callerNamespace2.id())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  targetNamespace:\n    type: temporalcloud:Namespace\n    name: target_namespace\n    properties:\n      name: terraform-target-namespace\n      regions:\n        - aws-us-west-2\n      apiKeyAuth: true\n      retentionDays: 14\n  callerNamespace:\n    type: temporalcloud:Namespace\n    name: caller_namespace\n    properties:\n      name: terraform-caller-namespace\n      regions:\n        - aws-us-east-1\n      apiKeyAuth: true\n      retentionDays: 14\n  callerNamespace2:\n    type: temporalcloud:Namespace\n    name: caller_namespace_2\n    properties:\n      name: terraform-caller-namespace-2\n      regions:\n        - gcp-us-central1\n      apiKeyAuth: true\n      retentionDays: 14\n  nexusEndpoint:\n    type: temporalcloud:NexusEndpoint\n    name: nexus_endpoint\n    properties:\n      name: terraform-nexus-endpoint\n      description: |\n        Service Name:\n          my-hello-service\n        Operation Names:\n          echo\n          say-hello\n\n        Input / Output arguments are in the following repository:\n        https://github.com/temporalio/samples-go/blob/main/nexus/service/api.go\n      workerTarget:\n        namespaceId: ${targetNamespace.id}\n        taskQueue: terraform-task-queue\n      allowedCallerNamespaces:\n        - ${callerNamespace.id}\n        - ${callerNamespace2.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nThe `pulumi import` command can be used, for example:\n\nNexus Endpoints can be imported to incorporate existing Nexus Endpoints into your Terraform pipeline. \n\nTo import a Nexus Endpoint, you need\n\n- a resource configuration in your Terraform configuration file/module to accept the imported Nexus Endpoint. In the example below, the placeholder is \"temporalcloud_nexus_endpoint\" \"nexus_endpoint\"\n\n- the Nexus Endpoint's ID, which is found using the Temporal Cloud CLI tcld nexus endpoint list. In the example below, this is 405f7da4224a43d99c211904ed9b3819\n\n```sh\n$ pulumi import temporalcloud:index/nexusEndpoint:NexusEndpoint nexus_endpoint 405f7da4224a43d99c211904ed9b3819\n```\n\n","properties":{"allowedCallerNamespaces":{"type":"array","items":{"type":"string"},"description":"Namespace Id(s) that are allowed to call this Endpoint.\n"},"description":{"type":"string","description":"The description for the Nexus endpoint.\n","secret":true},"name":{"type":"string","description":"The name of the endpoint. Must be unique within an account and match `^[a-zA-Z][a-zA-Z0-9\\-]*[a-zA-Z0-9]$`\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FNexusEndpointTimeouts:NexusEndpointTimeouts"},"workerTarget":{"$ref":"#/types/temporalcloud:index%2FNexusEndpointWorkerTarget:NexusEndpointWorkerTarget","description":"A target spec for routing nexus requests to a specific cloud namespace worker.\n"}},"type":"object","required":["allowedCallerNamespaces","name","workerTarget"],"inputProperties":{"allowedCallerNamespaces":{"type":"array","items":{"type":"string"},"description":"Namespace Id(s) that are allowed to call this Endpoint.\n"},"description":{"type":"string","description":"The description for the Nexus endpoint.\n","secret":true},"name":{"type":"string","description":"The name of the endpoint. Must be unique within an account and match `^[a-zA-Z][a-zA-Z0-9\\-]*[a-zA-Z0-9]$`\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FNexusEndpointTimeouts:NexusEndpointTimeouts"},"workerTarget":{"$ref":"#/types/temporalcloud:index%2FNexusEndpointWorkerTarget:NexusEndpointWorkerTarget","description":"A target spec for routing nexus requests to a specific cloud namespace worker.\n"}},"requiredInputs":["allowedCallerNamespaces","workerTarget"],"stateInputs":{"description":"Input properties used for looking up and filtering NexusEndpoint resources.\n","properties":{"allowedCallerNamespaces":{"type":"array","items":{"type":"string"},"description":"Namespace Id(s) that are allowed to call this Endpoint.\n"},"description":{"type":"string","description":"The description for the Nexus endpoint.\n","secret":true},"name":{"type":"string","description":"The name of the endpoint. Must be unique within an account and match `^[a-zA-Z][a-zA-Z0-9\\-]*[a-zA-Z0-9]$`\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FNexusEndpointTimeouts:NexusEndpointTimeouts"},"workerTarget":{"$ref":"#/types/temporalcloud:index%2FNexusEndpointWorkerTarget:NexusEndpointWorkerTarget","description":"A target spec for routing nexus requests to a specific cloud namespace worker.\n"}},"type":"object"}},"temporalcloud:index/serviceAccount:ServiceAccount":{"description":"Provisions a Temporal Cloud Service Account.\n\n## Import\n\nThe `pulumi import` command can be used, for example:\n\nService Accounts can be imported to incorporate existing Service Accounts into your Terraform pipeline. \n\nTo import a Service Account, you need\n\n- a resource configuration in your Terraform configuration file/module to accept the imported Service Account. In the example below, the placeholder is \"temporalcloud_service_account\" \"saimport\"\n\n- the Service Accounts's ID, which is found using the Temporal Cloud CLI tcld sa l. In the example below, this is e3cb94fbdbb845f480044d053d00665b\n\n```sh\n$ pulumi import temporalcloud:index/serviceAccount:ServiceAccount saimport e3cb94fbdbb845f480044d053d00665b\n```\n\n","properties":{"accountAccess":{"type":"string","description":"The role on the account. Must be one of admin, developer, read, or metricsread (case-insensitive). Cannot be set if namespace*scoped*access is provided.\n"},"description":{"type":"string","description":"The description for the service account.\n"},"name":{"type":"string","description":"The name associated with the service account.\n"},"namespaceAccesses":{"type":"array","items":{"$ref":"#/types/temporalcloud:index%2FServiceAccountNamespaceAccess:ServiceAccountNamespaceAccess"},"description":"The set of namespace accesses. Empty sets are not allowed, omit the attribute instead. Service Accounts with an account*access role of admin cannot be assigned explicit permissions to namespaces. Admins implicitly receive access to all Namespaces. Cannot be set if namespace*scoped*access is provided.\n"},"namespaceScopedAccess":{"$ref":"#/types/temporalcloud:index%2FServiceAccountNamespaceScopedAccess:ServiceAccountNamespaceScopedAccess","description":"Configures this service account as a namespace-scoped service account with access to only a single namespace. The namespace assignment is immutable after creation. Cannot be set if account*access or namespace*accesses are provided.\n"},"state":{"type":"string","description":"The current state of the Service Account.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FServiceAccountTimeouts:ServiceAccountTimeouts"}},"type":"object","required":["description","name","state"],"inputProperties":{"accountAccess":{"type":"string","description":"The role on the account. Must be one of admin, developer, read, or metricsread (case-insensitive). Cannot be set if namespace*scoped*access is provided.\n"},"description":{"type":"string","description":"The description for the service account.\n"},"name":{"type":"string","description":"The name associated with the service account.\n"},"namespaceAccesses":{"type":"array","items":{"$ref":"#/types/temporalcloud:index%2FServiceAccountNamespaceAccess:ServiceAccountNamespaceAccess"},"description":"The set of namespace accesses. Empty sets are not allowed, omit the attribute instead. Service Accounts with an account*access role of admin cannot be assigned explicit permissions to namespaces. Admins implicitly receive access to all Namespaces. Cannot be set if namespace*scoped*access is provided.\n"},"namespaceScopedAccess":{"$ref":"#/types/temporalcloud:index%2FServiceAccountNamespaceScopedAccess:ServiceAccountNamespaceScopedAccess","description":"Configures this service account as a namespace-scoped service account with access to only a single namespace. The namespace assignment is immutable after creation. Cannot be set if account*access or namespace*accesses are provided.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FServiceAccountTimeouts:ServiceAccountTimeouts"}},"stateInputs":{"description":"Input properties used for looking up and filtering ServiceAccount resources.\n","properties":{"accountAccess":{"type":"string","description":"The role on the account. Must be one of admin, developer, read, or metricsread (case-insensitive). Cannot be set if namespace*scoped*access is provided.\n"},"description":{"type":"string","description":"The description for the service account.\n"},"name":{"type":"string","description":"The name associated with the service account.\n"},"namespaceAccesses":{"type":"array","items":{"$ref":"#/types/temporalcloud:index%2FServiceAccountNamespaceAccess:ServiceAccountNamespaceAccess"},"description":"The set of namespace accesses. Empty sets are not allowed, omit the attribute instead. Service Accounts with an account*access role of admin cannot be assigned explicit permissions to namespaces. Admins implicitly receive access to all Namespaces. Cannot be set if namespace*scoped*access is provided.\n"},"namespaceScopedAccess":{"$ref":"#/types/temporalcloud:index%2FServiceAccountNamespaceScopedAccess:ServiceAccountNamespaceScopedAccess","description":"Configures this service account as a namespace-scoped service account with access to only a single namespace. The namespace assignment is immutable after creation. Cannot be set if account*access or namespace*accesses are provided.\n"},"state":{"type":"string","description":"The current state of the Service Account.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FServiceAccountTimeouts:ServiceAccountTimeouts"}},"type":"object"}},"temporalcloud:index/user:User":{"description":"Provisions a Temporal Cloud user.\n\n## Import\n\nThe `pulumi import` command can be used, for example:\n\nUsers can be imported to incorporate existing Users into your Terraform pipeline. \n\nTo import a User, you need\n\n- a resource configuration in your Terraform configuration file/module to accept the imported User. In the example below, the placeholder is \"temporalcloud_user\" \"user\"\n\n- the User's ID, which is found using the Temporal Cloud CLI tcld u l. In the example below, this is 72360058153949edb2f1d47019c1e85f\n\n```sh\n$ pulumi import temporalcloud:index/user:User user 72360058153949edb2f1d47019c1e85f\n```\n\n","properties":{"accountAccess":{"type":"string","description":"The role on the account. Must be one of \u003cspan pulumi-lang-nodejs=\"`owner`\" pulumi-lang-dotnet=\"`Owner`\" pulumi-lang-go=\"`owner`\" pulumi-lang-python=\"`owner`\" pulumi-lang-yaml=\"`owner`\" pulumi-lang-java=\"`owner`\"\u003e`owner`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`admin`\" pulumi-lang-dotnet=\"`Admin`\" pulumi-lang-go=\"`admin`\" pulumi-lang-python=\"`admin`\" pulumi-lang-yaml=\"`admin`\" pulumi-lang-java=\"`admin`\"\u003e`admin`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`developer`\" pulumi-lang-dotnet=\"`Developer`\" pulumi-lang-go=\"`developer`\" pulumi-lang-python=\"`developer`\" pulumi-lang-yaml=\"`developer`\" pulumi-lang-java=\"`developer`\"\u003e`developer`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`read`\" pulumi-lang-dotnet=\"`Read`\" pulumi-lang-go=\"`read`\" pulumi-lang-python=\"`read`\" pulumi-lang-yaml=\"`read`\" pulumi-lang-java=\"`read`\"\u003e`read`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`financeadmin`\" pulumi-lang-dotnet=\"`Financeadmin`\" pulumi-lang-go=\"`financeadmin`\" pulumi-lang-python=\"`financeadmin`\" pulumi-lang-yaml=\"`financeadmin`\" pulumi-lang-java=\"`financeadmin`\"\u003e`financeadmin`\u003c/span\u003e, or \u003cspan pulumi-lang-nodejs=\"`metricsread`\" pulumi-lang-dotnet=\"`Metricsread`\" pulumi-lang-go=\"`metricsread`\" pulumi-lang-python=\"`metricsread`\" pulumi-lang-yaml=\"`metricsread`\" pulumi-lang-java=\"`metricsread`\"\u003e`metricsread`\u003c/span\u003e (case-insensitive). \u003cspan pulumi-lang-nodejs=\"`owner`\" pulumi-lang-dotnet=\"`Owner`\" pulumi-lang-go=\"`owner`\" pulumi-lang-python=\"`owner`\" pulumi-lang-yaml=\"`owner`\" pulumi-lang-java=\"`owner`\"\u003e`owner`\u003c/span\u003e is only valid for import and cannot be created, updated or deleted without Temporal support. \u003cspan pulumi-lang-nodejs=\"`none`\" pulumi-lang-dotnet=\"`None`\" pulumi-lang-go=\"`none`\" pulumi-lang-python=\"`none`\" pulumi-lang-yaml=\"`none`\" pulumi-lang-java=\"`none`\"\u003e`none`\u003c/span\u003e is only valid for users managed via SCIM that derive their roles from group memberships.\n"},"email":{"type":"string","description":"The email address for the user.\n"},"namespaceAccesses":{"type":"array","items":{"$ref":"#/types/temporalcloud:index%2FUserNamespaceAccess:UserNamespaceAccess"},"description":"The set of namespace accesses. Empty sets are not allowed, omit the attribute instead. Users with account*access roles of owner or admin cannot be assigned explicit permissions to namespaces. They implicitly receive access to all Namespaces.\n"},"state":{"type":"string","description":"The current state of the user.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FUserTimeouts:UserTimeouts"}},"type":"object","required":["accountAccess","email","state"],"inputProperties":{"accountAccess":{"type":"string","description":"The role on the account. Must be one of \u003cspan pulumi-lang-nodejs=\"`owner`\" pulumi-lang-dotnet=\"`Owner`\" pulumi-lang-go=\"`owner`\" pulumi-lang-python=\"`owner`\" pulumi-lang-yaml=\"`owner`\" pulumi-lang-java=\"`owner`\"\u003e`owner`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`admin`\" pulumi-lang-dotnet=\"`Admin`\" pulumi-lang-go=\"`admin`\" pulumi-lang-python=\"`admin`\" pulumi-lang-yaml=\"`admin`\" pulumi-lang-java=\"`admin`\"\u003e`admin`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`developer`\" pulumi-lang-dotnet=\"`Developer`\" pulumi-lang-go=\"`developer`\" pulumi-lang-python=\"`developer`\" pulumi-lang-yaml=\"`developer`\" pulumi-lang-java=\"`developer`\"\u003e`developer`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`read`\" pulumi-lang-dotnet=\"`Read`\" pulumi-lang-go=\"`read`\" pulumi-lang-python=\"`read`\" pulumi-lang-yaml=\"`read`\" pulumi-lang-java=\"`read`\"\u003e`read`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`financeadmin`\" pulumi-lang-dotnet=\"`Financeadmin`\" pulumi-lang-go=\"`financeadmin`\" pulumi-lang-python=\"`financeadmin`\" pulumi-lang-yaml=\"`financeadmin`\" pulumi-lang-java=\"`financeadmin`\"\u003e`financeadmin`\u003c/span\u003e, or \u003cspan pulumi-lang-nodejs=\"`metricsread`\" pulumi-lang-dotnet=\"`Metricsread`\" pulumi-lang-go=\"`metricsread`\" pulumi-lang-python=\"`metricsread`\" pulumi-lang-yaml=\"`metricsread`\" pulumi-lang-java=\"`metricsread`\"\u003e`metricsread`\u003c/span\u003e (case-insensitive). \u003cspan pulumi-lang-nodejs=\"`owner`\" pulumi-lang-dotnet=\"`Owner`\" pulumi-lang-go=\"`owner`\" pulumi-lang-python=\"`owner`\" pulumi-lang-yaml=\"`owner`\" pulumi-lang-java=\"`owner`\"\u003e`owner`\u003c/span\u003e is only valid for import and cannot be created, updated or deleted without Temporal support. \u003cspan pulumi-lang-nodejs=\"`none`\" pulumi-lang-dotnet=\"`None`\" pulumi-lang-go=\"`none`\" pulumi-lang-python=\"`none`\" pulumi-lang-yaml=\"`none`\" pulumi-lang-java=\"`none`\"\u003e`none`\u003c/span\u003e is only valid for users managed via SCIM that derive their roles from group memberships.\n"},"email":{"type":"string","description":"The email address for the user.\n"},"namespaceAccesses":{"type":"array","items":{"$ref":"#/types/temporalcloud:index%2FUserNamespaceAccess:UserNamespaceAccess"},"description":"The set of namespace accesses. Empty sets are not allowed, omit the attribute instead. Users with account*access roles of owner or admin cannot be assigned explicit permissions to namespaces. They implicitly receive access to all Namespaces.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FUserTimeouts:UserTimeouts"}},"requiredInputs":["accountAccess","email"],"stateInputs":{"description":"Input properties used for looking up and filtering User resources.\n","properties":{"accountAccess":{"type":"string","description":"The role on the account. Must be one of \u003cspan pulumi-lang-nodejs=\"`owner`\" pulumi-lang-dotnet=\"`Owner`\" pulumi-lang-go=\"`owner`\" pulumi-lang-python=\"`owner`\" pulumi-lang-yaml=\"`owner`\" pulumi-lang-java=\"`owner`\"\u003e`owner`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`admin`\" pulumi-lang-dotnet=\"`Admin`\" pulumi-lang-go=\"`admin`\" pulumi-lang-python=\"`admin`\" pulumi-lang-yaml=\"`admin`\" pulumi-lang-java=\"`admin`\"\u003e`admin`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`developer`\" pulumi-lang-dotnet=\"`Developer`\" pulumi-lang-go=\"`developer`\" pulumi-lang-python=\"`developer`\" pulumi-lang-yaml=\"`developer`\" pulumi-lang-java=\"`developer`\"\u003e`developer`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`read`\" pulumi-lang-dotnet=\"`Read`\" pulumi-lang-go=\"`read`\" pulumi-lang-python=\"`read`\" pulumi-lang-yaml=\"`read`\" pulumi-lang-java=\"`read`\"\u003e`read`\u003c/span\u003e, \u003cspan pulumi-lang-nodejs=\"`financeadmin`\" pulumi-lang-dotnet=\"`Financeadmin`\" pulumi-lang-go=\"`financeadmin`\" pulumi-lang-python=\"`financeadmin`\" pulumi-lang-yaml=\"`financeadmin`\" pulumi-lang-java=\"`financeadmin`\"\u003e`financeadmin`\u003c/span\u003e, or \u003cspan pulumi-lang-nodejs=\"`metricsread`\" pulumi-lang-dotnet=\"`Metricsread`\" pulumi-lang-go=\"`metricsread`\" pulumi-lang-python=\"`metricsread`\" pulumi-lang-yaml=\"`metricsread`\" pulumi-lang-java=\"`metricsread`\"\u003e`metricsread`\u003c/span\u003e (case-insensitive). \u003cspan pulumi-lang-nodejs=\"`owner`\" pulumi-lang-dotnet=\"`Owner`\" pulumi-lang-go=\"`owner`\" pulumi-lang-python=\"`owner`\" pulumi-lang-yaml=\"`owner`\" pulumi-lang-java=\"`owner`\"\u003e`owner`\u003c/span\u003e is only valid for import and cannot be created, updated or deleted without Temporal support. \u003cspan pulumi-lang-nodejs=\"`none`\" pulumi-lang-dotnet=\"`None`\" pulumi-lang-go=\"`none`\" pulumi-lang-python=\"`none`\" pulumi-lang-yaml=\"`none`\" pulumi-lang-java=\"`none`\"\u003e`none`\u003c/span\u003e is only valid for users managed via SCIM that derive their roles from group memberships.\n"},"email":{"type":"string","description":"The email address for the user.\n"},"namespaceAccesses":{"type":"array","items":{"$ref":"#/types/temporalcloud:index%2FUserNamespaceAccess:UserNamespaceAccess"},"description":"The set of namespace accesses. Empty sets are not allowed, omit the attribute instead. Users with account*access roles of owner or admin cannot be assigned explicit permissions to namespaces. They implicitly receive access to all Namespaces.\n"},"state":{"type":"string","description":"The current state of the user.\n"},"timeouts":{"$ref":"#/types/temporalcloud:index%2FUserTimeouts:UserTimeouts"}},"type":"object"}}},"functions":{"pulumi:providers:temporalcloud/terraformConfig":{"description":"This function returns a Terraform config object with terraform-namecased keys,to be used with the Terraform Module Provider.","inputs":{"properties":{"__self__":{"$ref":"#/resources/pulumi:providers:temporalcloud"}},"type":"object","required":["__self__"]},"outputs":{"properties":{"result":{"additionalProperties":{"$ref":"pulumi.json#/Any"},"type":"object"}},"required":["result"],"type":"object"}},"temporalcloud:index/getAccountAuditLogSink:getAccountAuditLogSink":{"description":"Fetches details about an account audit log sink.\n","inputs":{"description":"A collection of arguments for invoking getAccountAuditLogSink.\n","properties":{"sinkName":{"type":"string","description":"The unique name of the audit log sink.\n"}},"type":"object","required":["sinkName"]},"outputs":{"description":"A collection of values returned by getAccountAuditLogSink.\n","properties":{"enabled":{"description":"A flag indicating whether the audit log sink is enabled or not.\n","type":"boolean"},"id":{"description":"The provider-assigned unique ID for this managed resource.","type":"string"},"kinesis":{"$ref":"#/types/temporalcloud:index%2FgetAccountAuditLogSinkKinesis:getAccountAuditLogSinkKinesis","description":"The Kinesis configuration details when\u003cspan pulumi-lang-nodejs=\" destinationType \" pulumi-lang-dotnet=\" DestinationType \" pulumi-lang-go=\" destinationType \" pulumi-lang-python=\" destination_type \" pulumi-lang-yaml=\" destinationType \" pulumi-lang-java=\" destinationType \"\u003e destination_type \u003c/span\u003eis Kinesis.\n"},"pubsub":{"$ref":"#/types/temporalcloud:index%2FgetAccountAuditLogSinkPubsub:getAccountAuditLogSinkPubsub","description":"The PubSub configuration details when\u003cspan pulumi-lang-nodejs=\" destinationType \" pulumi-lang-dotnet=\" DestinationType \" pulumi-lang-go=\" destinationType \" pulumi-lang-python=\" destination_type \" pulumi-lang-yaml=\" destinationType \" pulumi-lang-java=\" destinationType \"\u003e destination_type \u003c/span\u003eis PubSub.\n"},"sinkName":{"description":"The unique name of the audit log sink.\n","type":"string"},"state":{"description":"The current state of the audit log sink.\n","type":"string"}},"required":["enabled","id","kinesis","pubsub","sinkName","state"],"type":"object"}},"temporalcloud:index/getConnectivityRule:getConnectivityRule":{"description":"Fetches details about a connectivity rule.\n","inputs":{"description":"A collection of arguments for invoking getConnectivityRule.\n","properties":{"id":{"type":"string","description":"The unique identifier of the connectivity rule across all Temporal Cloud tenants.\n"}},"type":"object","required":["id"]},"outputs":{"description":"A collection of values returned by getConnectivityRule.\n","properties":{"connectionId":{"description":"The ID of the connection to the connectivity rule.\n","type":"string"},"connectivityType":{"description":"The type of connectivity.\n","type":"string"},"createdAt":{"description":"The time the connectivity rule was created.\n","type":"string"},"gcpProjectId":{"description":"The GCP project ID of the connectivity rule.\n","type":"string"},"id":{"description":"The unique identifier of the connectivity rule across all Temporal Cloud tenants.\n","type":"string"},"region":{"description":"The region of the connectivity rule.\n","type":"string"},"state":{"description":"The current state of the connectivity rule.\n","type":"string"}},"required":["connectionId","connectivityType","createdAt","gcpProjectId","id","region","state"],"type":"object"}},"temporalcloud:index/getNamespace:getNamespace":{"description":"Fetches details about a Namespace.\n\n","inputs":{"description":"A collection of arguments for invoking getNamespace.\n","properties":{"apiKeyAuth":{"type":"boolean","description":"If true, Temporal Cloud will use API key authentication for this namespace. If false, mutual TLS (mTLS) authentication will be used.\n"},"certificateFilters":{"type":"array","items":{"$ref":"#/types/temporalcloud:index%2FgetNamespaceCertificateFilter:getNamespaceCertificateFilter"},"description":"A list of filters to apply to client certificates when initiating a connection Temporal Cloud. If present, connections will only be allowed from client certificates whose distinguished name properties match at least one of the filters.\n"},"codecServer":{"$ref":"#/types/temporalcloud:index%2FgetNamespaceCodecServer:getNamespaceCodecServer","description":"A codec server is used by the Temporal Cloud UI to decode payloads for all users interacting with this namespace, even if the workflow history itself is encrypted.\n"},"connectivityRuleIds":{"type":"array","items":{"type":"string"},"description":"The IDs of the connectivity rules for this namespace.\n"},"customSearchAttributes":{"type":"object","additionalProperties":{"type":"string"},"description":"The custom search attributes to use for the namespace.\n"},"id":{"type":"string","description":"The unique identifier of the namespace across all Temporal Cloud tenants.\n"},"lastModifiedTime":{"type":"string","description":"The date and time when the namespace was last modified. Will not be set if the namespace has never been modified.\n"},"privateConnectivities":{"type":"array","items":{"$ref":"#/types/temporalcloud:index%2FgetNamespacePrivateConnectivity:getNamespacePrivateConnectivity"},"description":"The private connectivities for the namespace, if any.\n"},"tags":{"type":"object","additionalProperties":{"type":"string"},"description":"The tags for the namespace.\n"}},"type":"object","required":["id"]},"outputs":{"description":"A collection of values returned by getNamespace.\n","properties":{"acceptedClientCa":{"description":"The Base64-encoded CA cert in PEM format that clients use when authenticating with Temporal Cloud.\n","type":"string"},"activeRegion":{"description":"The currently active region for the namespace.\n","type":"string"},"apiKeyAuth":{"description":"If true, Temporal Cloud will use API key authentication for this namespace. If false, mutual TLS (mTLS) authentication will be used.\n","type":"boolean"},"certificateFilters":{"description":"A list of filters to apply to client certificates when initiating a connection Temporal Cloud. If present, connections will only be allowed from client certificates whose distinguished name properties match at least one of the filters.\n","items":{"$ref":"#/types/temporalcloud:index%2FgetNamespaceCertificateFilter:getNamespaceCertificateFilter"},"type":"array"},"codecServer":{"$ref":"#/types/temporalcloud:index%2FgetNamespaceCodecServer:getNamespaceCodecServer","description":"A codec server is used by the Temporal Cloud UI to decode payloads for all users interacting with this namespace, even if the workflow history itself is encrypted.\n"},"connectivityRuleIds":{"description":"The IDs of the connectivity rules for this namespace.\n","items":{"type":"string"},"type":"array"},"createdTime":{"description":"The date and time when the namespace was created.\n","type":"string"},"customSearchAttributes":{"additionalProperties":{"type":"string"},"description":"The custom search attributes to use for the namespace.\n","type":"object"},"endpoints":{"$ref":"#/types/temporalcloud:index%2FgetNamespaceEndpoints:getNamespaceEndpoints","description":"The endpoints for the namespace.\n"},"id":{"description":"The unique identifier of the namespace across all Temporal Cloud tenants.\n","type":"string"},"lastModifiedTime":{"description":"The date and time when the namespace was last modified. Will not be set if the namespace has never been modified.\n","type":"string"},"limits":{"$ref":"#/types/temporalcloud:index%2FgetNamespaceLimits:getNamespaceLimits","description":"The limits set on the namespace currently.\n"},"name":{"description":"The name of the namespace.\n","type":"string"},"namespaceLifecycle":{"$ref":"#/types/temporalcloud:index%2FgetNamespaceNamespaceLifecycle:getNamespaceNamespaceLifecycle","description":"The lifecycle settings for the namespace.\n"},"privateConnectivities":{"description":"The private connectivities for the namespace, if any.\n","items":{"$ref":"#/types/temporalcloud:index%2FgetNamespacePrivateConnectivity:getNamespacePrivateConnectivity"},"type":"array"},"regions":{"items":{"type":"string"},"type":"array"},"retentionDays":{"description":"The number of days to retain workflow history. Any changes to the retention period will be applied to all new running workflows.\n","type":"number"},"state":{"description":"The current state of the namespace.\n","type":"string"},"tags":{"additionalProperties":{"type":"string"},"description":"The tags for the namespace.\n","type":"object"}},"required":["acceptedClientCa","activeRegion","certificateFilters","codecServer","connectivityRuleIds","createdTime","customSearchAttributes","endpoints","id","lastModifiedTime","limits","name","namespaceLifecycle","privateConnectivities","regions","retentionDays","state","tags"],"type":"object"}},"temporalcloud:index/getNamespaces:getNamespaces":{"description":"Fetches details about all Namespaces.\n\n","outputs":{"description":"A collection of values returned by getNamespaces.\n","properties":{"id":{"description":"The ID of this resource.\n","type":"string"},"namespaces":{"items":{"$ref":"#/types/temporalcloud:index%2FgetNamespacesNamespace:getNamespacesNamespace"},"type":"array"}},"required":["id","namespaces"],"type":"object"}},"temporalcloud:index/getNexusEndpoint:getNexusEndpoint":{"description":"Fetches details about a Nexus Endpoint.\n\n","inputs":{"description":"A collection of arguments for invoking getNexusEndpoint.\n","properties":{"description":{"type":"string","description":"The description of the Nexus Endpoint.\n","secret":true},"id":{"type":"string","description":"The unique identifier of the Nexus Endpoint.\n"}},"type":"object","required":["id"]},"outputs":{"description":"A collection of values returned by getNexusEndpoint.\n","properties":{"allowedCallerNamespaces":{"description":"Namespace Id(s) that are allowed to call this Endpoint.\n","items":{"type":"string"},"type":"array"},"createdAt":{"description":"The creation time of the Nexus Endpoint.\n","type":"string"},"description":{"description":"The description of the Nexus Endpoint.\n","secret":true,"type":"string"},"id":{"description":"The unique identifier of the Nexus Endpoint.\n","type":"string"},"name":{"description":"The name of the endpoint. Unique within an account and match `^[a-zA-Z][a-zA-Z0-9\\-]*[a-zA-Z0-9]$`\n","type":"string"},"state":{"description":"The current state of the Nexus Endpoint.\n","type":"string"},"updatedAt":{"description":"The last update time of the Nexus Endpoint.\n","type":"string"},"workerTarget":{"$ref":"#/types/temporalcloud:index%2FgetNexusEndpointWorkerTarget:getNexusEndpointWorkerTarget","description":"The target spec for routing nexus requests to a specific cloud namespace worker.\n"}},"required":["allowedCallerNamespaces","createdAt","description","id","name","state","updatedAt","workerTarget"],"type":"object"}},"temporalcloud:index/getNexusEndpoints:getNexusEndpoints":{"description":"Fetches details about all Nexus Endpoints.\n\n","outputs":{"description":"A collection of values returned by getNexusEndpoints.\n","properties":{"id":{"description":"The unique identifier of the Nexus Endpoints data source.\n","type":"string"},"nexusEndpoints":{"description":"The list of Nexus Endpoints.\n","items":{"$ref":"#/types/temporalcloud:index%2FgetNexusEndpointsNexusEndpoint:getNexusEndpointsNexusEndpoint"},"type":"array"}},"required":["id","nexusEndpoints"],"type":"object"}},"temporalcloud:index/getRegions:getRegions":{"description":"## Example Usage\n\n","outputs":{"description":"A collection of values returned by getRegions.\n","properties":{"id":{"description":"The ID of this resource.\n","type":"string"},"regions":{"items":{"$ref":"#/types/temporalcloud:index%2FgetRegionsRegion:getRegionsRegion"},"type":"array"}},"required":["id","regions"],"type":"object"}},"temporalcloud:index/getScimGroup:getScimGroup":{"description":"Fetches details about a SCIM group.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as temporalcloud from \"@pulumi/temporalcloud\";\n\nconst myScimGroup = new temporalcloud.index.ScimGroup(\"my_scim_group\", {idpId: \"usually-group-name\"});\nexport const scimGroup = myScimGroupTemporalcloudScimGroup;\n```\n```python\nimport pulumi\nimport pulumi_temporalcloud as temporalcloud\n\nmy_scim_group = temporalcloud.index.ScimGroup(\"my_scim_group\", idp_id=usually-group-name)\npulumi.export(\"scimGroup\", my_scim_group_temporalcloud_scim_group)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Temporalcloud = Pulumi.Temporalcloud;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var myScimGroup = new Temporalcloud.Index.ScimGroup(\"my_scim_group\", new()\n    {\n        IdpId = \"usually-group-name\",\n    });\n\n    return new Dictionary\u003cstring, object?\u003e\n    {\n        [\"scimGroup\"] = myScimGroupTemporalcloudScimGroup,\n    };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/temporalcloud/temporalcloud\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := temporalcloud.NewScimGroup(ctx, \"my_scim_group\", \u0026temporalcloud.ScimGroupArgs{\n\t\t\tIdpId: \"usually-group-name\",\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"scimGroup\", myScimGroupTemporalcloudScimGroup)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.temporalcloud.ScimGroup;\nimport com.pulumi.temporalcloud.ScimGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var myScimGroup = new ScimGroup(\"myScimGroup\", ScimGroupArgs.builder()\n            .idpId(\"usually-group-name\")\n            .build());\n\n        ctx.export(\"scimGroup\", myScimGroupTemporalcloudScimGroup);\n    }\n}\n```\n```yaml\nresources:\n  myScimGroup:\n    type: temporalcloud:ScimGroup\n    name: my_scim_group\n    properties:\n      idpId: usually-group-name\noutputs:\n  scimGroup: ${myScimGroupTemporalcloudScimGroup}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n","inputs":{"description":"A collection of arguments for invoking getScimGroup.\n","properties":{"idpId":{"type":"string","description":"The IDP ID of the SCIM group.\n"}},"type":"object","required":["idpId"]},"outputs":{"description":"A collection of values returned by getScimGroup.\n","properties":{"id":{"description":"The ID of the SCIM group.\n","type":"string"},"idpId":{"description":"The IDP ID of the SCIM group.\n","type":"string"},"name":{"description":"The name of the SCIM group.\n","type":"string"}},"required":["id","idpId","name"],"type":"object"}},"temporalcloud:index/getServiceAccount:getServiceAccount":{"description":"Fetches details about a Service Account.\n\n","inputs":{"description":"A collection of arguments for invoking getServiceAccount.\n","properties":{"id":{"type":"string","description":"The unique identifier of the Service Account.\n"},"namespaceAccesses":{"type":"array","items":{"$ref":"#/types/temporalcloud:index%2FgetServiceAccountNamespaceAccess:getServiceAccountNamespaceAccess"},"description":"The set of namespace permissions for this service account, including each namespace and its role.\n"}},"type":"object","required":["id"]},"outputs":{"description":"A collection of values returned by getServiceAccount.\n","properties":{"accountAccess":{"description":"The role on the account. Must be one of admin, developer, read, or metricsread (case-insensitive).\n","type":"string"},"createdAt":{"description":"The creation time of the Service Account.\n","type":"string"},"description":{"description":"The description of the Service Account.\n","type":"string"},"id":{"description":"The unique identifier of the Service Account.\n","type":"string"},"name":{"description":"The name associated with the service account.\n","type":"string"},"namespaceAccesses":{"description":"The set of namespace permissions for this service account, including each namespace and its role.\n","items":{"$ref":"#/types/temporalcloud:index%2FgetServiceAccountNamespaceAccess:getServiceAccountNamespaceAccess"},"type":"array"},"namespaceScopedAccess":{"$ref":"#/types/temporalcloud:index%2FgetServiceAccountNamespaceScopedAccess:getServiceAccountNamespaceScopedAccess","description":"The namespace-scoped access configuration for this service account.\n"},"state":{"description":"The current state of the Service Account.\n","type":"string"},"updatedAt":{"description":"The last update time of the Service Account.\n","type":"string"}},"required":["accountAccess","createdAt","description","id","name","namespaceAccesses","namespaceScopedAccess","state","updatedAt"],"type":"object"}},"temporalcloud:index/getServiceAccounts:getServiceAccounts":{"description":"Fetches details about all Service Accounts.\n","outputs":{"description":"A collection of values returned by getServiceAccounts.\n","properties":{"id":{"description":"The unique identifier of the Service Accounts data source.\n","type":"string"},"serviceAccounts":{"description":"The list of Service Accounts.\n","items":{"$ref":"#/types/temporalcloud:index%2FgetServiceAccountsServiceAccount:getServiceAccountsServiceAccount"},"type":"array"}},"required":["id","serviceAccounts"],"type":"object"}},"temporalcloud:index/getUser:getUser":{"description":"Fetches details about a User.\n","inputs":{"description":"A collection of arguments for invoking getUser.\n","properties":{"id":{"type":"string","description":"The unique identifier of the User.\n"},"namespaceAccesses":{"type":"array","items":{"$ref":"#/types/temporalcloud:index%2FgetUserNamespaceAccess:getUserNamespaceAccess"},"description":"The set of namespace permissions for this user, including each namespace and its role.\n"}},"type":"object","required":["id"]},"outputs":{"description":"A collection of values returned by getUser.\n","properties":{"accountAccess":{"description":"The role on the account. Must be one of admin, developer, or read (case-insensitive).\n","type":"string"},"createdAt":{"description":"The creation time of the User.\n","type":"string"},"email":{"description":"The email of the User.\n","type":"string"},"id":{"description":"The unique identifier of the User.\n","type":"string"},"namespaceAccesses":{"description":"The set of namespace permissions for this user, including each namespace and its role.\n","items":{"$ref":"#/types/temporalcloud:index%2FgetUserNamespaceAccess:getUserNamespaceAccess"},"type":"array"},"state":{"description":"The current state of the User.\n","type":"string"},"updatedAt":{"description":"The last update time of the User.\n","type":"string"}},"required":["accountAccess","createdAt","email","id","namespaceAccesses","state","updatedAt"],"type":"object"}},"temporalcloud:index/getUsers:getUsers":{"description":"Fetches details about all Users.\n","outputs":{"description":"A collection of values returned by getUsers.\n","properties":{"id":{"description":"The unique identifier of the Users data source.\n","type":"string"},"users":{"description":"The list of Users.\n","items":{"$ref":"#/types/temporalcloud:index%2FgetUsersUser:getUsersUser"},"type":"array"}},"required":["id","users"],"type":"object"}}},"parameterization":{"baseProvider":{"name":"terraform-provider","version":"1.0.1"},"parameter":"eyJyZW1vdGUiOnsidXJsIjoicmVnaXN0cnkub3BlbnRvZnUub3JnL3RlbXBvcmFsaW8vdGVtcG9yYWxjbG91ZCIsInZlcnNpb24iOiIxLjIuMSJ9fQ=="}}