@pulumi/gcp 7.36.0 → 7.37.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/accesscontextmanager/index.d.ts +6 -0
- package/accesscontextmanager/index.js +11 -1
- package/accesscontextmanager/index.js.map +1 -1
- package/accesscontextmanager/servicePerimeterDryRunEgressPolicy.d.ts +112 -0
- package/accesscontextmanager/servicePerimeterDryRunEgressPolicy.js +76 -0
- package/accesscontextmanager/servicePerimeterDryRunEgressPolicy.js.map +1 -0
- package/accesscontextmanager/servicePerimeterDryRunIngressPolicy.d.ts +116 -0
- package/accesscontextmanager/servicePerimeterDryRunIngressPolicy.js +77 -0
- package/accesscontextmanager/servicePerimeterDryRunIngressPolicy.js.map +1 -0
- package/accesscontextmanager/servicePerimeterEgressPolicy.d.ts +1 -12
- package/accesscontextmanager/servicePerimeterEgressPolicy.js +1 -12
- package/accesscontextmanager/servicePerimeterEgressPolicy.js.map +1 -1
- package/accesscontextmanager/servicePerimeterIngressPolicy.d.ts +1 -12
- package/accesscontextmanager/servicePerimeterIngressPolicy.js +1 -12
- package/accesscontextmanager/servicePerimeterIngressPolicy.js.map +1 -1
- package/applicationintegration/client.d.ts +1 -1
- package/applicationintegration/client.js +1 -1
- package/compute/regionTargetHttpsProxy.d.ts +12 -0
- package/compute/regionTargetHttpsProxy.js.map +1 -1
- package/dataform/repository.d.ts +31 -0
- package/dataform/repository.js +18 -0
- package/dataform/repository.js.map +1 -1
- package/discoveryengine/dataStore.d.ts +31 -0
- package/discoveryengine/dataStore.js +3 -0
- package/discoveryengine/dataStore.js.map +1 -1
- package/logging/getLogViewIamPolicy.d.ts +34 -0
- package/logging/getLogViewIamPolicy.js +34 -0
- package/logging/getLogViewIamPolicy.js.map +1 -1
- package/logging/logViewIamBinding.d.ts +276 -0
- package/logging/logViewIamBinding.js +276 -0
- package/logging/logViewIamBinding.js.map +1 -1
- package/logging/logViewIamMember.d.ts +276 -0
- package/logging/logViewIamMember.js +276 -0
- package/logging/logViewIamMember.js.map +1 -1
- package/logging/logViewIamPolicy.d.ts +276 -0
- package/logging/logViewIamPolicy.js +276 -0
- package/logging/logViewIamPolicy.js.map +1 -1
- package/networkconnectivity/regionalEndpoint.d.ts +3 -3
- package/networkconnectivity/regionalEndpoint.js +3 -3
- package/organizations/getProject.d.ts +1 -0
- package/organizations/getProject.js.map +1 -1
- package/organizations/project.d.ts +21 -9
- package/organizations/project.js +2 -0
- package/organizations/project.js.map +1 -1
- package/package.json +2 -2
- package/securitycenter/getV2OrganizationSourceIamPolicy.d.ts +71 -0
- package/securitycenter/getV2OrganizationSourceIamPolicy.js +48 -0
- package/securitycenter/getV2OrganizationSourceIamPolicy.js.map +1 -0
- package/securitycenter/index.d.ts +24 -0
- package/securitycenter/index.js +39 -1
- package/securitycenter/index.js.map +1 -1
- package/securitycenter/v2folderMuteConfig.d.ts +230 -0
- package/securitycenter/v2folderMuteConfig.js +129 -0
- package/securitycenter/v2folderMuteConfig.js.map +1 -0
- package/securitycenter/v2organizationSource.d.ts +151 -0
- package/securitycenter/v2organizationSource.js +106 -0
- package/securitycenter/v2organizationSource.js.map +1 -0
- package/securitycenter/v2organizationSourceIamBinding.d.ts +283 -0
- package/securitycenter/v2organizationSourceIamBinding.js +230 -0
- package/securitycenter/v2organizationSourceIamBinding.js.map +1 -0
- package/securitycenter/v2organizationSourceIamMember.d.ts +283 -0
- package/securitycenter/v2organizationSourceIamMember.js +230 -0
- package/securitycenter/v2organizationSourceIamMember.js.map +1 -0
- package/securitycenter/v2organizationSourceIamPolicy.d.ts +233 -0
- package/securitycenter/v2organizationSourceIamPolicy.js +223 -0
- package/securitycenter/v2organizationSourceIamPolicy.js.map +1 -0
- package/securitycenter/v2projectMuteConfig.d.ts +232 -0
- package/securitycenter/v2projectMuteConfig.js +128 -0
- package/securitycenter/v2projectMuteConfig.js.map +1 -0
- package/securitycenter/v2projectNotificationConfig.d.ts +184 -0
- package/securitycenter/v2projectNotificationConfig.js +129 -0
- package/securitycenter/v2projectNotificationConfig.js.map +1 -0
- package/spanner/instance.d.ts +0 -3
- package/spanner/instance.js.map +1 -1
- package/storage/bucketObject.d.ts +8 -0
- package/storage/bucketObject.js +2 -0
- package/storage/bucketObject.js.map +1 -1
- package/storage/getBucketObject.d.ts +4 -0
- package/storage/getBucketObject.js.map +1 -1
- package/storage/getBucketObjectContent.d.ts +1 -0
- package/storage/getBucketObjectContent.js.map +1 -1
- package/storage/managedFolder.d.ts +22 -0
- package/storage/managedFolder.js +3 -0
- package/storage/managedFolder.js.map +1 -1
- package/types/input.d.ts +242 -3
- package/types/output.d.ts +256 -5
- package/vmwareengine/networkPolicy.d.ts +3 -3
- package/vmwareengine/networkPolicy.js +3 -3
|
@@ -37,6 +37,12 @@ export declare const IngressPolicy: typeof import("./ingressPolicy").IngressPoli
|
|
|
37
37
|
export { ServicePerimeterArgs, ServicePerimeterState } from "./servicePerimeter";
|
|
38
38
|
export type ServicePerimeter = import("./servicePerimeter").ServicePerimeter;
|
|
39
39
|
export declare const ServicePerimeter: typeof import("./servicePerimeter").ServicePerimeter;
|
|
40
|
+
export { ServicePerimeterDryRunEgressPolicyArgs, ServicePerimeterDryRunEgressPolicyState } from "./servicePerimeterDryRunEgressPolicy";
|
|
41
|
+
export type ServicePerimeterDryRunEgressPolicy = import("./servicePerimeterDryRunEgressPolicy").ServicePerimeterDryRunEgressPolicy;
|
|
42
|
+
export declare const ServicePerimeterDryRunEgressPolicy: typeof import("./servicePerimeterDryRunEgressPolicy").ServicePerimeterDryRunEgressPolicy;
|
|
43
|
+
export { ServicePerimeterDryRunIngressPolicyArgs, ServicePerimeterDryRunIngressPolicyState } from "./servicePerimeterDryRunIngressPolicy";
|
|
44
|
+
export type ServicePerimeterDryRunIngressPolicy = import("./servicePerimeterDryRunIngressPolicy").ServicePerimeterDryRunIngressPolicy;
|
|
45
|
+
export declare const ServicePerimeterDryRunIngressPolicy: typeof import("./servicePerimeterDryRunIngressPolicy").ServicePerimeterDryRunIngressPolicy;
|
|
40
46
|
export { ServicePerimeterDryRunResourceArgs, ServicePerimeterDryRunResourceState } from "./servicePerimeterDryRunResource";
|
|
41
47
|
export type ServicePerimeterDryRunResource = import("./servicePerimeterDryRunResource").ServicePerimeterDryRunResource;
|
|
42
48
|
export declare const ServicePerimeterDryRunResource: typeof import("./servicePerimeterDryRunResource").ServicePerimeterDryRunResource;
|
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
-
exports.ServicePerimeters = exports.ServicePerimeterResource = exports.ServicePerimeterIngressPolicy = exports.ServicePerimeterEgressPolicy = exports.ServicePerimeterDryRunResource = exports.ServicePerimeter = exports.IngressPolicy = exports.getAccessPolicyIamPolicyOutput = exports.getAccessPolicyIamPolicy = exports.GcpUserAccessBinding = exports.EgressPolicy = exports.AuthorizedOrgsDesc = exports.AccessPolicyIamPolicy = exports.AccessPolicyIamMember = exports.AccessPolicyIamBinding = exports.AccessPolicy = exports.AccessLevels = exports.AccessLevelCondition = exports.AccessLevel = void 0;
|
|
5
|
+
exports.ServicePerimeters = exports.ServicePerimeterResource = exports.ServicePerimeterIngressPolicy = exports.ServicePerimeterEgressPolicy = exports.ServicePerimeterDryRunResource = exports.ServicePerimeterDryRunIngressPolicy = exports.ServicePerimeterDryRunEgressPolicy = exports.ServicePerimeter = exports.IngressPolicy = exports.getAccessPolicyIamPolicyOutput = exports.getAccessPolicyIamPolicy = exports.GcpUserAccessBinding = exports.EgressPolicy = exports.AuthorizedOrgsDesc = exports.AccessPolicyIamPolicy = exports.AccessPolicyIamMember = exports.AccessPolicyIamBinding = exports.AccessPolicy = exports.AccessLevels = exports.AccessLevelCondition = exports.AccessLevel = void 0;
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
8
|
exports.AccessLevel = null;
|
|
@@ -32,6 +32,10 @@ exports.IngressPolicy = null;
|
|
|
32
32
|
utilities.lazyLoad(exports, ["IngressPolicy"], () => require("./ingressPolicy"));
|
|
33
33
|
exports.ServicePerimeter = null;
|
|
34
34
|
utilities.lazyLoad(exports, ["ServicePerimeter"], () => require("./servicePerimeter"));
|
|
35
|
+
exports.ServicePerimeterDryRunEgressPolicy = null;
|
|
36
|
+
utilities.lazyLoad(exports, ["ServicePerimeterDryRunEgressPolicy"], () => require("./servicePerimeterDryRunEgressPolicy"));
|
|
37
|
+
exports.ServicePerimeterDryRunIngressPolicy = null;
|
|
38
|
+
utilities.lazyLoad(exports, ["ServicePerimeterDryRunIngressPolicy"], () => require("./servicePerimeterDryRunIngressPolicy"));
|
|
35
39
|
exports.ServicePerimeterDryRunResource = null;
|
|
36
40
|
utilities.lazyLoad(exports, ["ServicePerimeterDryRunResource"], () => require("./servicePerimeterDryRunResource"));
|
|
37
41
|
exports.ServicePerimeterEgressPolicy = null;
|
|
@@ -70,6 +74,10 @@ const _module = {
|
|
|
70
74
|
return new exports.IngressPolicy(name, undefined, { urn });
|
|
71
75
|
case "gcp:accesscontextmanager/servicePerimeter:ServicePerimeter":
|
|
72
76
|
return new exports.ServicePerimeter(name, undefined, { urn });
|
|
77
|
+
case "gcp:accesscontextmanager/servicePerimeterDryRunEgressPolicy:ServicePerimeterDryRunEgressPolicy":
|
|
78
|
+
return new exports.ServicePerimeterDryRunEgressPolicy(name, undefined, { urn });
|
|
79
|
+
case "gcp:accesscontextmanager/servicePerimeterDryRunIngressPolicy:ServicePerimeterDryRunIngressPolicy":
|
|
80
|
+
return new exports.ServicePerimeterDryRunIngressPolicy(name, undefined, { urn });
|
|
73
81
|
case "gcp:accesscontextmanager/servicePerimeterDryRunResource:ServicePerimeterDryRunResource":
|
|
74
82
|
return new exports.ServicePerimeterDryRunResource(name, undefined, { urn });
|
|
75
83
|
case "gcp:accesscontextmanager/servicePerimeterEgressPolicy:ServicePerimeterEgressPolicy":
|
|
@@ -97,6 +105,8 @@ pulumi.runtime.registerResourceModule("gcp", "accesscontextmanager/egressPolicy"
|
|
|
97
105
|
pulumi.runtime.registerResourceModule("gcp", "accesscontextmanager/gcpUserAccessBinding", _module);
|
|
98
106
|
pulumi.runtime.registerResourceModule("gcp", "accesscontextmanager/ingressPolicy", _module);
|
|
99
107
|
pulumi.runtime.registerResourceModule("gcp", "accesscontextmanager/servicePerimeter", _module);
|
|
108
|
+
pulumi.runtime.registerResourceModule("gcp", "accesscontextmanager/servicePerimeterDryRunEgressPolicy", _module);
|
|
109
|
+
pulumi.runtime.registerResourceModule("gcp", "accesscontextmanager/servicePerimeterDryRunIngressPolicy", _module);
|
|
100
110
|
pulumi.runtime.registerResourceModule("gcp", "accesscontextmanager/servicePerimeterDryRunResource", _module);
|
|
101
111
|
pulumi.runtime.registerResourceModule("gcp", "accesscontextmanager/servicePerimeterEgressPolicy", _module);
|
|
102
112
|
pulumi.runtime.registerResourceModule("gcp", "accesscontextmanager/servicePerimeterIngressPolicy", _module);
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../accesscontextmanager/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAK7B,QAAA,WAAW,GAA+C,IAAW,CAAC;AACnF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,aAAa,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,eAAe,CAAC,CAAC,CAAC;AAIhE,QAAA,oBAAoB,GAAiE,IAAW,CAAC;AAC9G,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,sBAAsB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,wBAAwB,CAAC,CAAC,CAAC;AAIlF,QAAA,YAAY,GAAiD,IAAW,CAAC;AACtF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,cAAc,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC,CAAC;AAIlE,QAAA,YAAY,GAAiD,IAAW,CAAC;AACtF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,cAAc,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC,CAAC;AAIlE,QAAA,sBAAsB,GAAqE,IAAW,CAAC;AACpH,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,wBAAwB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,0BAA0B,CAAC,CAAC,CAAC;AAItF,QAAA,qBAAqB,GAAmE,IAAW,CAAC;AACjH,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,uBAAuB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,yBAAyB,CAAC,CAAC,CAAC;AAIpF,QAAA,qBAAqB,GAAmE,IAAW,CAAC;AACjH,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,uBAAuB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,yBAAyB,CAAC,CAAC,CAAC;AAIpF,QAAA,kBAAkB,GAA6D,IAAW,CAAC;AACxG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,oBAAoB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,sBAAsB,CAAC,CAAC,CAAC;AAI9E,QAAA,YAAY,GAAiD,IAAW,CAAC;AACtF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,cAAc,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC,CAAC;AAIlE,QAAA,oBAAoB,GAAiE,IAAW,CAAC;AAC9G,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,sBAAsB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,wBAAwB,CAAC,CAAC,CAAC;AAGlF,QAAA,wBAAwB,GAAyE,IAAW,CAAC;AAC7G,QAAA,8BAA8B,GAA+E,IAAW,CAAC;AACtI,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,0BAA0B,EAAC,gCAAgC,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,4BAA4B,CAAC,CAAC,CAAC;AAI3H,QAAA,aAAa,GAAmD,IAAW,CAAC;AACzF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,eAAe,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC,CAAC;AAIpE,QAAA,gBAAgB,GAAyD,IAAW,CAAC;AAClG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,kBAAkB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,oBAAoB,CAAC,CAAC,CAAC;AAI1E,QAAA,8BAA8B,GAAqF,IAAW,CAAC;AAC5I,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,gCAAgC,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,kCAAkC,CAAC,CAAC,CAAC;AAItG,QAAA,4BAA4B,GAAiF,IAAW,CAAC;AACtI,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,8BAA8B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,gCAAgC,CAAC,CAAC,CAAC;AAIlG,QAAA,6BAA6B,GAAmF,IAAW,CAAC;AACzI,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,+BAA+B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,iCAAiC,CAAC,CAAC,CAAC;AAIpG,QAAA,wBAAwB,GAAyE,IAAW,CAAC;AAC1H,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,0BAA0B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,4BAA4B,CAAC,CAAC,CAAC;AAI1F,QAAA,iBAAiB,GAA2D,IAAW,CAAC;AACrG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,mBAAmB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,qBAAqB,CAAC,CAAC,CAAC;AAGzF,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,kDAAkD;gBACnD,OAAO,IAAI,mBAAW,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACzD,KAAK,oEAAoE;gBACrE,OAAO,IAAI,4BAAoB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAClE,KAAK,oDAAoD;gBACrD,OAAO,IAAI,oBAAY,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC1D,KAAK,oDAAoD;gBACrD,OAAO,IAAI,oBAAY,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC1D,KAAK,wEAAwE;gBACzE,OAAO,IAAI,8BAAsB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACpE,KAAK,sEAAsE;gBACvE,OAAO,IAAI,6BAAqB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACnE,KAAK,sEAAsE;gBACvE,OAAO,IAAI,6BAAqB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACnE,KAAK,gEAAgE;gBACjE,OAAO,IAAI,0BAAkB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAChE,KAAK,oDAAoD;gBACrD,OAAO,IAAI,oBAAY,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC1D,KAAK,oEAAoE;gBACrE,OAAO,IAAI,4BAAoB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAClE,KAAK,sDAAsD;gBACvD,OAAO,IAAI,qBAAa,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC3D,KAAK,4DAA4D;gBAC7D,OAAO,IAAI,wBAAgB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC9D,KAAK,wFAAwF;gBACzF,OAAO,IAAI,sCAA8B,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC5E,KAAK,oFAAoF;gBACrF,OAAO,IAAI,oCAA4B,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC1E,KAAK,sFAAsF;gBACvF,OAAO,IAAI,qCAA6B,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC3E,KAAK,4EAA4E;gBAC7E,OAAO,IAAI,gCAAwB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACtE,KAAK,8DAA8D;gBAC/D,OAAO,IAAI,yBAAiB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC/D;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,kCAAkC,EAAE,OAAO,CAAC,CAAA;AACzF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,2CAA2C,EAAE,OAAO,CAAC,CAAA;AAClG,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,mCAAmC,EAAE,OAAO,CAAC,CAAA;AAC1F,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,mCAAmC,EAAE,OAAO,CAAC,CAAA;AAC1F,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,6CAA6C,EAAE,OAAO,CAAC,CAAA;AACpG,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,4CAA4C,EAAE,OAAO,CAAC,CAAA;AACnG,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,4CAA4C,EAAE,OAAO,CAAC,CAAA;AACnG,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,yCAAyC,EAAE,OAAO,CAAC,CAAA;AAChG,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,mCAAmC,EAAE,OAAO,CAAC,CAAA;AAC1F,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,2CAA2C,EAAE,OAAO,CAAC,CAAA;AAClG,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,oCAAoC,EAAE,OAAO,CAAC,CAAA;AAC3F,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,uCAAuC,EAAE,OAAO,CAAC,CAAA;AAC9F,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,qDAAqD,EAAE,OAAO,CAAC,CAAA;AAC5G,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,mDAAmD,EAAE,OAAO,CAAC,CAAA;AAC1G,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,oDAAoD,EAAE,OAAO,CAAC,CAAA;AAC3G,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,+CAA+C,EAAE,OAAO,CAAC,CAAA;AACtG,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,wCAAwC,EAAE,OAAO,CAAC,CAAA"}
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../accesscontextmanager/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAK7B,QAAA,WAAW,GAA+C,IAAW,CAAC;AACnF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,aAAa,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,eAAe,CAAC,CAAC,CAAC;AAIhE,QAAA,oBAAoB,GAAiE,IAAW,CAAC;AAC9G,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,sBAAsB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,wBAAwB,CAAC,CAAC,CAAC;AAIlF,QAAA,YAAY,GAAiD,IAAW,CAAC;AACtF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,cAAc,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC,CAAC;AAIlE,QAAA,YAAY,GAAiD,IAAW,CAAC;AACtF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,cAAc,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC,CAAC;AAIlE,QAAA,sBAAsB,GAAqE,IAAW,CAAC;AACpH,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,wBAAwB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,0BAA0B,CAAC,CAAC,CAAC;AAItF,QAAA,qBAAqB,GAAmE,IAAW,CAAC;AACjH,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,uBAAuB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,yBAAyB,CAAC,CAAC,CAAC;AAIpF,QAAA,qBAAqB,GAAmE,IAAW,CAAC;AACjH,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,uBAAuB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,yBAAyB,CAAC,CAAC,CAAC;AAIpF,QAAA,kBAAkB,GAA6D,IAAW,CAAC;AACxG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,oBAAoB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,sBAAsB,CAAC,CAAC,CAAC;AAI9E,QAAA,YAAY,GAAiD,IAAW,CAAC;AACtF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,cAAc,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC,CAAC;AAIlE,QAAA,oBAAoB,GAAiE,IAAW,CAAC;AAC9G,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,sBAAsB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,wBAAwB,CAAC,CAAC,CAAC;AAGlF,QAAA,wBAAwB,GAAyE,IAAW,CAAC;AAC7G,QAAA,8BAA8B,GAA+E,IAAW,CAAC;AACtI,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,0BAA0B,EAAC,gCAAgC,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,4BAA4B,CAAC,CAAC,CAAC;AAI3H,QAAA,aAAa,GAAmD,IAAW,CAAC;AACzF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,eAAe,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC,CAAC;AAIpE,QAAA,gBAAgB,GAAyD,IAAW,CAAC;AAClG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,kBAAkB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,oBAAoB,CAAC,CAAC,CAAC;AAI1E,QAAA,kCAAkC,GAA6F,IAAW,CAAC;AACxJ,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,oCAAoC,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,sCAAsC,CAAC,CAAC,CAAC;AAI9G,QAAA,mCAAmC,GAA+F,IAAW,CAAC;AAC3J,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,qCAAqC,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,uCAAuC,CAAC,CAAC,CAAC;AAIhH,QAAA,8BAA8B,GAAqF,IAAW,CAAC;AAC5I,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,gCAAgC,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,kCAAkC,CAAC,CAAC,CAAC;AAItG,QAAA,4BAA4B,GAAiF,IAAW,CAAC;AACtI,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,8BAA8B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,gCAAgC,CAAC,CAAC,CAAC;AAIlG,QAAA,6BAA6B,GAAmF,IAAW,CAAC;AACzI,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,+BAA+B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,iCAAiC,CAAC,CAAC,CAAC;AAIpG,QAAA,wBAAwB,GAAyE,IAAW,CAAC;AAC1H,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,0BAA0B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,4BAA4B,CAAC,CAAC,CAAC;AAI1F,QAAA,iBAAiB,GAA2D,IAAW,CAAC;AACrG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,mBAAmB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,qBAAqB,CAAC,CAAC,CAAC;AAGzF,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,kDAAkD;gBACnD,OAAO,IAAI,mBAAW,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACzD,KAAK,oEAAoE;gBACrE,OAAO,IAAI,4BAAoB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAClE,KAAK,oDAAoD;gBACrD,OAAO,IAAI,oBAAY,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC1D,KAAK,oDAAoD;gBACrD,OAAO,IAAI,oBAAY,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC1D,KAAK,wEAAwE;gBACzE,OAAO,IAAI,8BAAsB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACpE,KAAK,sEAAsE;gBACvE,OAAO,IAAI,6BAAqB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACnE,KAAK,sEAAsE;gBACvE,OAAO,IAAI,6BAAqB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACnE,KAAK,gEAAgE;gBACjE,OAAO,IAAI,0BAAkB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAChE,KAAK,oDAAoD;gBACrD,OAAO,IAAI,oBAAY,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC1D,KAAK,oEAAoE;gBACrE,OAAO,IAAI,4BAAoB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAClE,KAAK,sDAAsD;gBACvD,OAAO,IAAI,qBAAa,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC3D,KAAK,4DAA4D;gBAC7D,OAAO,IAAI,wBAAgB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC9D,KAAK,gGAAgG;gBACjG,OAAO,IAAI,0CAAkC,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAChF,KAAK,kGAAkG;gBACnG,OAAO,IAAI,2CAAmC,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACjF,KAAK,wFAAwF;gBACzF,OAAO,IAAI,sCAA8B,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC5E,KAAK,oFAAoF;gBACrF,OAAO,IAAI,oCAA4B,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC1E,KAAK,sFAAsF;gBACvF,OAAO,IAAI,qCAA6B,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC3E,KAAK,4EAA4E;gBAC7E,OAAO,IAAI,gCAAwB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACtE,KAAK,8DAA8D;gBAC/D,OAAO,IAAI,yBAAiB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC/D;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,kCAAkC,EAAE,OAAO,CAAC,CAAA;AACzF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,2CAA2C,EAAE,OAAO,CAAC,CAAA;AAClG,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,mCAAmC,EAAE,OAAO,CAAC,CAAA;AAC1F,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,mCAAmC,EAAE,OAAO,CAAC,CAAA;AAC1F,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,6CAA6C,EAAE,OAAO,CAAC,CAAA;AACpG,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,4CAA4C,EAAE,OAAO,CAAC,CAAA;AACnG,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,4CAA4C,EAAE,OAAO,CAAC,CAAA;AACnG,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,yCAAyC,EAAE,OAAO,CAAC,CAAA;AAChG,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,mCAAmC,EAAE,OAAO,CAAC,CAAA;AAC1F,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,2CAA2C,EAAE,OAAO,CAAC,CAAA;AAClG,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,oCAAoC,EAAE,OAAO,CAAC,CAAA;AAC3F,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,uCAAuC,EAAE,OAAO,CAAC,CAAA;AAC9F,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,yDAAyD,EAAE,OAAO,CAAC,CAAA;AAChH,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,0DAA0D,EAAE,OAAO,CAAC,CAAA;AACjH,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,qDAAqD,EAAE,OAAO,CAAC,CAAA;AAC5G,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,mDAAmD,EAAE,OAAO,CAAC,CAAA;AAC1G,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,oDAAoD,EAAE,OAAO,CAAC,CAAA;AAC3G,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,+CAA+C,EAAE,OAAO,CAAC,CAAA;AACtG,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,wCAAwC,EAAE,OAAO,CAAC,CAAA"}
|
|
@@ -0,0 +1,112 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
import * as inputs from "../types/input";
|
|
3
|
+
import * as outputs from "../types/output";
|
|
4
|
+
/**
|
|
5
|
+
* Manage a single EgressPolicy in the spec (dry-run) configuration for a service perimeter.
|
|
6
|
+
* EgressPolicies match requests based on egressFrom and egressTo stanzas.
|
|
7
|
+
* For an EgressPolicy to match, both egressFrom and egressTo stanzas must be matched.
|
|
8
|
+
* If an EgressPolicy matches a request, the request is allowed to span the ServicePerimeter
|
|
9
|
+
* boundary. For example, an EgressPolicy can be used to allow VMs on networks
|
|
10
|
+
* within the ServicePerimeter to access a defined set of projects outside the
|
|
11
|
+
* perimeter in certain contexts (e.g. to read data from a Cloud Storage bucket
|
|
12
|
+
* or query against a BigQuery dataset).
|
|
13
|
+
*
|
|
14
|
+
* > **Note:** By default, updates to this resource will remove the EgressPolicy from the
|
|
15
|
+
* from the perimeter and add it back in a non-atomic manner. To ensure that the new EgressPolicy
|
|
16
|
+
* is added before the old one is removed, add a `lifecycle` block with `createBeforeDestroy = true` to this resource.
|
|
17
|
+
*
|
|
18
|
+
* To get more information about ServicePerimeterDryRunEgressPolicy, see:
|
|
19
|
+
*
|
|
20
|
+
* * [API documentation](https://cloud.google.com/access-context-manager/docs/reference/rest/v1/accessPolicies.servicePerimeters#egresspolicy)
|
|
21
|
+
*
|
|
22
|
+
* ## Example Usage
|
|
23
|
+
*/
|
|
24
|
+
export declare class ServicePerimeterDryRunEgressPolicy extends pulumi.CustomResource {
|
|
25
|
+
/**
|
|
26
|
+
* Get an existing ServicePerimeterDryRunEgressPolicy resource's state with the given name, ID, and optional extra
|
|
27
|
+
* properties used to qualify the lookup.
|
|
28
|
+
*
|
|
29
|
+
* @param name The _unique_ name of the resulting resource.
|
|
30
|
+
* @param id The _unique_ provider ID of the resource to lookup.
|
|
31
|
+
* @param state Any extra arguments used during the lookup.
|
|
32
|
+
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
33
|
+
*/
|
|
34
|
+
static get(name: string, id: pulumi.Input<pulumi.ID>, state?: ServicePerimeterDryRunEgressPolicyState, opts?: pulumi.CustomResourceOptions): ServicePerimeterDryRunEgressPolicy;
|
|
35
|
+
/**
|
|
36
|
+
* Returns true if the given object is an instance of ServicePerimeterDryRunEgressPolicy. This is designed to work even
|
|
37
|
+
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
38
|
+
*/
|
|
39
|
+
static isInstance(obj: any): obj is ServicePerimeterDryRunEgressPolicy;
|
|
40
|
+
/**
|
|
41
|
+
* Defines conditions on the source of a request causing this `EgressPolicy` to apply.
|
|
42
|
+
* Structure is documented below.
|
|
43
|
+
*/
|
|
44
|
+
readonly egressFrom: pulumi.Output<outputs.accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressFrom | undefined>;
|
|
45
|
+
/**
|
|
46
|
+
* Defines the conditions on the `ApiOperation` and destination resources that
|
|
47
|
+
* cause this `EgressPolicy` to apply.
|
|
48
|
+
* Structure is documented below.
|
|
49
|
+
*/
|
|
50
|
+
readonly egressTo: pulumi.Output<outputs.accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressTo | undefined>;
|
|
51
|
+
/**
|
|
52
|
+
* The name of the Service Perimeter to add this resource to.
|
|
53
|
+
*
|
|
54
|
+
*
|
|
55
|
+
* - - -
|
|
56
|
+
*/
|
|
57
|
+
readonly perimeter: pulumi.Output<string>;
|
|
58
|
+
/**
|
|
59
|
+
* Create a ServicePerimeterDryRunEgressPolicy resource with the given unique name, arguments, and options.
|
|
60
|
+
*
|
|
61
|
+
* @param name The _unique_ name of the resource.
|
|
62
|
+
* @param args The arguments to use to populate this resource's properties.
|
|
63
|
+
* @param opts A bag of options that control this resource's behavior.
|
|
64
|
+
*/
|
|
65
|
+
constructor(name: string, args: ServicePerimeterDryRunEgressPolicyArgs, opts?: pulumi.CustomResourceOptions);
|
|
66
|
+
}
|
|
67
|
+
/**
|
|
68
|
+
* Input properties used for looking up and filtering ServicePerimeterDryRunEgressPolicy resources.
|
|
69
|
+
*/
|
|
70
|
+
export interface ServicePerimeterDryRunEgressPolicyState {
|
|
71
|
+
/**
|
|
72
|
+
* Defines conditions on the source of a request causing this `EgressPolicy` to apply.
|
|
73
|
+
* Structure is documented below.
|
|
74
|
+
*/
|
|
75
|
+
egressFrom?: pulumi.Input<inputs.accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressFrom>;
|
|
76
|
+
/**
|
|
77
|
+
* Defines the conditions on the `ApiOperation` and destination resources that
|
|
78
|
+
* cause this `EgressPolicy` to apply.
|
|
79
|
+
* Structure is documented below.
|
|
80
|
+
*/
|
|
81
|
+
egressTo?: pulumi.Input<inputs.accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressTo>;
|
|
82
|
+
/**
|
|
83
|
+
* The name of the Service Perimeter to add this resource to.
|
|
84
|
+
*
|
|
85
|
+
*
|
|
86
|
+
* - - -
|
|
87
|
+
*/
|
|
88
|
+
perimeter?: pulumi.Input<string>;
|
|
89
|
+
}
|
|
90
|
+
/**
|
|
91
|
+
* The set of arguments for constructing a ServicePerimeterDryRunEgressPolicy resource.
|
|
92
|
+
*/
|
|
93
|
+
export interface ServicePerimeterDryRunEgressPolicyArgs {
|
|
94
|
+
/**
|
|
95
|
+
* Defines conditions on the source of a request causing this `EgressPolicy` to apply.
|
|
96
|
+
* Structure is documented below.
|
|
97
|
+
*/
|
|
98
|
+
egressFrom?: pulumi.Input<inputs.accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressFrom>;
|
|
99
|
+
/**
|
|
100
|
+
* Defines the conditions on the `ApiOperation` and destination resources that
|
|
101
|
+
* cause this `EgressPolicy` to apply.
|
|
102
|
+
* Structure is documented below.
|
|
103
|
+
*/
|
|
104
|
+
egressTo?: pulumi.Input<inputs.accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressTo>;
|
|
105
|
+
/**
|
|
106
|
+
* The name of the Service Perimeter to add this resource to.
|
|
107
|
+
*
|
|
108
|
+
*
|
|
109
|
+
* - - -
|
|
110
|
+
*/
|
|
111
|
+
perimeter: pulumi.Input<string>;
|
|
112
|
+
}
|
|
@@ -0,0 +1,76 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.ServicePerimeterDryRunEgressPolicy = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* Manage a single EgressPolicy in the spec (dry-run) configuration for a service perimeter.
|
|
10
|
+
* EgressPolicies match requests based on egressFrom and egressTo stanzas.
|
|
11
|
+
* For an EgressPolicy to match, both egressFrom and egressTo stanzas must be matched.
|
|
12
|
+
* If an EgressPolicy matches a request, the request is allowed to span the ServicePerimeter
|
|
13
|
+
* boundary. For example, an EgressPolicy can be used to allow VMs on networks
|
|
14
|
+
* within the ServicePerimeter to access a defined set of projects outside the
|
|
15
|
+
* perimeter in certain contexts (e.g. to read data from a Cloud Storage bucket
|
|
16
|
+
* or query against a BigQuery dataset).
|
|
17
|
+
*
|
|
18
|
+
* > **Note:** By default, updates to this resource will remove the EgressPolicy from the
|
|
19
|
+
* from the perimeter and add it back in a non-atomic manner. To ensure that the new EgressPolicy
|
|
20
|
+
* is added before the old one is removed, add a `lifecycle` block with `createBeforeDestroy = true` to this resource.
|
|
21
|
+
*
|
|
22
|
+
* To get more information about ServicePerimeterDryRunEgressPolicy, see:
|
|
23
|
+
*
|
|
24
|
+
* * [API documentation](https://cloud.google.com/access-context-manager/docs/reference/rest/v1/accessPolicies.servicePerimeters#egresspolicy)
|
|
25
|
+
*
|
|
26
|
+
* ## Example Usage
|
|
27
|
+
*/
|
|
28
|
+
class ServicePerimeterDryRunEgressPolicy extends pulumi.CustomResource {
|
|
29
|
+
/**
|
|
30
|
+
* Get an existing ServicePerimeterDryRunEgressPolicy resource's state with the given name, ID, and optional extra
|
|
31
|
+
* properties used to qualify the lookup.
|
|
32
|
+
*
|
|
33
|
+
* @param name The _unique_ name of the resulting resource.
|
|
34
|
+
* @param id The _unique_ provider ID of the resource to lookup.
|
|
35
|
+
* @param state Any extra arguments used during the lookup.
|
|
36
|
+
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
37
|
+
*/
|
|
38
|
+
static get(name, id, state, opts) {
|
|
39
|
+
return new ServicePerimeterDryRunEgressPolicy(name, state, Object.assign(Object.assign({}, opts), { id: id }));
|
|
40
|
+
}
|
|
41
|
+
/**
|
|
42
|
+
* Returns true if the given object is an instance of ServicePerimeterDryRunEgressPolicy. This is designed to work even
|
|
43
|
+
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
44
|
+
*/
|
|
45
|
+
static isInstance(obj) {
|
|
46
|
+
if (obj === undefined || obj === null) {
|
|
47
|
+
return false;
|
|
48
|
+
}
|
|
49
|
+
return obj['__pulumiType'] === ServicePerimeterDryRunEgressPolicy.__pulumiType;
|
|
50
|
+
}
|
|
51
|
+
constructor(name, argsOrState, opts) {
|
|
52
|
+
let resourceInputs = {};
|
|
53
|
+
opts = opts || {};
|
|
54
|
+
if (opts.id) {
|
|
55
|
+
const state = argsOrState;
|
|
56
|
+
resourceInputs["egressFrom"] = state ? state.egressFrom : undefined;
|
|
57
|
+
resourceInputs["egressTo"] = state ? state.egressTo : undefined;
|
|
58
|
+
resourceInputs["perimeter"] = state ? state.perimeter : undefined;
|
|
59
|
+
}
|
|
60
|
+
else {
|
|
61
|
+
const args = argsOrState;
|
|
62
|
+
if ((!args || args.perimeter === undefined) && !opts.urn) {
|
|
63
|
+
throw new Error("Missing required property 'perimeter'");
|
|
64
|
+
}
|
|
65
|
+
resourceInputs["egressFrom"] = args ? args.egressFrom : undefined;
|
|
66
|
+
resourceInputs["egressTo"] = args ? args.egressTo : undefined;
|
|
67
|
+
resourceInputs["perimeter"] = args ? args.perimeter : undefined;
|
|
68
|
+
}
|
|
69
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
70
|
+
super(ServicePerimeterDryRunEgressPolicy.__pulumiType, name, resourceInputs, opts);
|
|
71
|
+
}
|
|
72
|
+
}
|
|
73
|
+
exports.ServicePerimeterDryRunEgressPolicy = ServicePerimeterDryRunEgressPolicy;
|
|
74
|
+
/** @internal */
|
|
75
|
+
ServicePerimeterDryRunEgressPolicy.__pulumiType = 'gcp:accesscontextmanager/servicePerimeterDryRunEgressPolicy:ServicePerimeterDryRunEgressPolicy';
|
|
76
|
+
//# sourceMappingURL=servicePerimeterDryRunEgressPolicy.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"servicePerimeterDryRunEgressPolicy.js","sourceRoot":"","sources":["../../accesscontextmanager/servicePerimeterDryRunEgressPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;GAmBG;AACH,MAAa,kCAAmC,SAAQ,MAAM,CAAC,cAAc;IACzE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA+C,EAAE,IAAmC;QAC7I,OAAO,IAAI,kCAAkC,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACzF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,kCAAkC,CAAC,YAAY,CAAC;IACnF,CAAC;IA6BD,YAAY,IAAY,EAAE,WAA8F,EAAE,IAAmC;QACzJ,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAkE,CAAC;YACjF,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SACrE;aAAM;YACH,MAAM,IAAI,GAAG,WAAiE,CAAC;YAC/E,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,kCAAkC,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACvF,CAAC;;AA1EL,gFA2EC;AA7DG,gBAAgB;AACO,+CAAY,GAAG,gGAAgG,CAAC"}
|
|
@@ -0,0 +1,116 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
import * as inputs from "../types/input";
|
|
3
|
+
import * as outputs from "../types/output";
|
|
4
|
+
/**
|
|
5
|
+
* Manage a single IngressPolicy in the spec (dry-run) configuration for a service perimeter.
|
|
6
|
+
* IngressPolicies match requests based on ingressFrom and ingressTo stanzas. For an ingress policy to match,
|
|
7
|
+
* both the ingressFrom and ingressTo stanzas must be matched. If an IngressPolicy matches a request,
|
|
8
|
+
* the request is allowed through the perimeter boundary from outside the perimeter.
|
|
9
|
+
* For example, access from the internet can be allowed either based on an AccessLevel or,
|
|
10
|
+
* for traffic hosted on Google Cloud, the project of the source network.
|
|
11
|
+
* For access from private networks, using the project of the hosting network is required.
|
|
12
|
+
* Individual ingress policies can be limited by restricting which services and/
|
|
13
|
+
* or actions they match using the ingressTo field.
|
|
14
|
+
*
|
|
15
|
+
* > **Note:** By default, updates to this resource will remove the IngressPolicy from the
|
|
16
|
+
* from the perimeter and add it back in a non-atomic manner. To ensure that the new IngressPolicy
|
|
17
|
+
* is added before the old one is removed, add a `lifecycle` block with `createBeforeDestroy = true` to this resource.
|
|
18
|
+
*
|
|
19
|
+
* To get more information about ServicePerimeterDryRunIngressPolicy, see:
|
|
20
|
+
*
|
|
21
|
+
* * [API documentation](https://cloud.google.com/access-context-manager/docs/reference/rest/v1/accessPolicies.servicePerimeters#ingresspolicy)
|
|
22
|
+
*
|
|
23
|
+
* ## Example Usage
|
|
24
|
+
*/
|
|
25
|
+
export declare class ServicePerimeterDryRunIngressPolicy extends pulumi.CustomResource {
|
|
26
|
+
/**
|
|
27
|
+
* Get an existing ServicePerimeterDryRunIngressPolicy resource's state with the given name, ID, and optional extra
|
|
28
|
+
* properties used to qualify the lookup.
|
|
29
|
+
*
|
|
30
|
+
* @param name The _unique_ name of the resulting resource.
|
|
31
|
+
* @param id The _unique_ provider ID of the resource to lookup.
|
|
32
|
+
* @param state Any extra arguments used during the lookup.
|
|
33
|
+
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
34
|
+
*/
|
|
35
|
+
static get(name: string, id: pulumi.Input<pulumi.ID>, state?: ServicePerimeterDryRunIngressPolicyState, opts?: pulumi.CustomResourceOptions): ServicePerimeterDryRunIngressPolicy;
|
|
36
|
+
/**
|
|
37
|
+
* Returns true if the given object is an instance of ServicePerimeterDryRunIngressPolicy. This is designed to work even
|
|
38
|
+
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
39
|
+
*/
|
|
40
|
+
static isInstance(obj: any): obj is ServicePerimeterDryRunIngressPolicy;
|
|
41
|
+
/**
|
|
42
|
+
* Defines the conditions on the source of a request causing this `IngressPolicy`
|
|
43
|
+
* to apply.
|
|
44
|
+
* Structure is documented below.
|
|
45
|
+
*/
|
|
46
|
+
readonly ingressFrom: pulumi.Output<outputs.accesscontextmanager.ServicePerimeterDryRunIngressPolicyIngressFrom | undefined>;
|
|
47
|
+
/**
|
|
48
|
+
* Defines the conditions on the `ApiOperation` and request destination that cause
|
|
49
|
+
* this `IngressPolicy` to apply.
|
|
50
|
+
* Structure is documented below.
|
|
51
|
+
*/
|
|
52
|
+
readonly ingressTo: pulumi.Output<outputs.accesscontextmanager.ServicePerimeterDryRunIngressPolicyIngressTo | undefined>;
|
|
53
|
+
/**
|
|
54
|
+
* The name of the Service Perimeter to add this resource to.
|
|
55
|
+
*
|
|
56
|
+
*
|
|
57
|
+
* - - -
|
|
58
|
+
*/
|
|
59
|
+
readonly perimeter: pulumi.Output<string>;
|
|
60
|
+
/**
|
|
61
|
+
* Create a ServicePerimeterDryRunIngressPolicy resource with the given unique name, arguments, and options.
|
|
62
|
+
*
|
|
63
|
+
* @param name The _unique_ name of the resource.
|
|
64
|
+
* @param args The arguments to use to populate this resource's properties.
|
|
65
|
+
* @param opts A bag of options that control this resource's behavior.
|
|
66
|
+
*/
|
|
67
|
+
constructor(name: string, args: ServicePerimeterDryRunIngressPolicyArgs, opts?: pulumi.CustomResourceOptions);
|
|
68
|
+
}
|
|
69
|
+
/**
|
|
70
|
+
* Input properties used for looking up and filtering ServicePerimeterDryRunIngressPolicy resources.
|
|
71
|
+
*/
|
|
72
|
+
export interface ServicePerimeterDryRunIngressPolicyState {
|
|
73
|
+
/**
|
|
74
|
+
* Defines the conditions on the source of a request causing this `IngressPolicy`
|
|
75
|
+
* to apply.
|
|
76
|
+
* Structure is documented below.
|
|
77
|
+
*/
|
|
78
|
+
ingressFrom?: pulumi.Input<inputs.accesscontextmanager.ServicePerimeterDryRunIngressPolicyIngressFrom>;
|
|
79
|
+
/**
|
|
80
|
+
* Defines the conditions on the `ApiOperation` and request destination that cause
|
|
81
|
+
* this `IngressPolicy` to apply.
|
|
82
|
+
* Structure is documented below.
|
|
83
|
+
*/
|
|
84
|
+
ingressTo?: pulumi.Input<inputs.accesscontextmanager.ServicePerimeterDryRunIngressPolicyIngressTo>;
|
|
85
|
+
/**
|
|
86
|
+
* The name of the Service Perimeter to add this resource to.
|
|
87
|
+
*
|
|
88
|
+
*
|
|
89
|
+
* - - -
|
|
90
|
+
*/
|
|
91
|
+
perimeter?: pulumi.Input<string>;
|
|
92
|
+
}
|
|
93
|
+
/**
|
|
94
|
+
* The set of arguments for constructing a ServicePerimeterDryRunIngressPolicy resource.
|
|
95
|
+
*/
|
|
96
|
+
export interface ServicePerimeterDryRunIngressPolicyArgs {
|
|
97
|
+
/**
|
|
98
|
+
* Defines the conditions on the source of a request causing this `IngressPolicy`
|
|
99
|
+
* to apply.
|
|
100
|
+
* Structure is documented below.
|
|
101
|
+
*/
|
|
102
|
+
ingressFrom?: pulumi.Input<inputs.accesscontextmanager.ServicePerimeterDryRunIngressPolicyIngressFrom>;
|
|
103
|
+
/**
|
|
104
|
+
* Defines the conditions on the `ApiOperation` and request destination that cause
|
|
105
|
+
* this `IngressPolicy` to apply.
|
|
106
|
+
* Structure is documented below.
|
|
107
|
+
*/
|
|
108
|
+
ingressTo?: pulumi.Input<inputs.accesscontextmanager.ServicePerimeterDryRunIngressPolicyIngressTo>;
|
|
109
|
+
/**
|
|
110
|
+
* The name of the Service Perimeter to add this resource to.
|
|
111
|
+
*
|
|
112
|
+
*
|
|
113
|
+
* - - -
|
|
114
|
+
*/
|
|
115
|
+
perimeter: pulumi.Input<string>;
|
|
116
|
+
}
|
|
@@ -0,0 +1,77 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.ServicePerimeterDryRunIngressPolicy = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* Manage a single IngressPolicy in the spec (dry-run) configuration for a service perimeter.
|
|
10
|
+
* IngressPolicies match requests based on ingressFrom and ingressTo stanzas. For an ingress policy to match,
|
|
11
|
+
* both the ingressFrom and ingressTo stanzas must be matched. If an IngressPolicy matches a request,
|
|
12
|
+
* the request is allowed through the perimeter boundary from outside the perimeter.
|
|
13
|
+
* For example, access from the internet can be allowed either based on an AccessLevel or,
|
|
14
|
+
* for traffic hosted on Google Cloud, the project of the source network.
|
|
15
|
+
* For access from private networks, using the project of the hosting network is required.
|
|
16
|
+
* Individual ingress policies can be limited by restricting which services and/
|
|
17
|
+
* or actions they match using the ingressTo field.
|
|
18
|
+
*
|
|
19
|
+
* > **Note:** By default, updates to this resource will remove the IngressPolicy from the
|
|
20
|
+
* from the perimeter and add it back in a non-atomic manner. To ensure that the new IngressPolicy
|
|
21
|
+
* is added before the old one is removed, add a `lifecycle` block with `createBeforeDestroy = true` to this resource.
|
|
22
|
+
*
|
|
23
|
+
* To get more information about ServicePerimeterDryRunIngressPolicy, see:
|
|
24
|
+
*
|
|
25
|
+
* * [API documentation](https://cloud.google.com/access-context-manager/docs/reference/rest/v1/accessPolicies.servicePerimeters#ingresspolicy)
|
|
26
|
+
*
|
|
27
|
+
* ## Example Usage
|
|
28
|
+
*/
|
|
29
|
+
class ServicePerimeterDryRunIngressPolicy extends pulumi.CustomResource {
|
|
30
|
+
/**
|
|
31
|
+
* Get an existing ServicePerimeterDryRunIngressPolicy resource's state with the given name, ID, and optional extra
|
|
32
|
+
* properties used to qualify the lookup.
|
|
33
|
+
*
|
|
34
|
+
* @param name The _unique_ name of the resulting resource.
|
|
35
|
+
* @param id The _unique_ provider ID of the resource to lookup.
|
|
36
|
+
* @param state Any extra arguments used during the lookup.
|
|
37
|
+
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
38
|
+
*/
|
|
39
|
+
static get(name, id, state, opts) {
|
|
40
|
+
return new ServicePerimeterDryRunIngressPolicy(name, state, Object.assign(Object.assign({}, opts), { id: id }));
|
|
41
|
+
}
|
|
42
|
+
/**
|
|
43
|
+
* Returns true if the given object is an instance of ServicePerimeterDryRunIngressPolicy. This is designed to work even
|
|
44
|
+
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
45
|
+
*/
|
|
46
|
+
static isInstance(obj) {
|
|
47
|
+
if (obj === undefined || obj === null) {
|
|
48
|
+
return false;
|
|
49
|
+
}
|
|
50
|
+
return obj['__pulumiType'] === ServicePerimeterDryRunIngressPolicy.__pulumiType;
|
|
51
|
+
}
|
|
52
|
+
constructor(name, argsOrState, opts) {
|
|
53
|
+
let resourceInputs = {};
|
|
54
|
+
opts = opts || {};
|
|
55
|
+
if (opts.id) {
|
|
56
|
+
const state = argsOrState;
|
|
57
|
+
resourceInputs["ingressFrom"] = state ? state.ingressFrom : undefined;
|
|
58
|
+
resourceInputs["ingressTo"] = state ? state.ingressTo : undefined;
|
|
59
|
+
resourceInputs["perimeter"] = state ? state.perimeter : undefined;
|
|
60
|
+
}
|
|
61
|
+
else {
|
|
62
|
+
const args = argsOrState;
|
|
63
|
+
if ((!args || args.perimeter === undefined) && !opts.urn) {
|
|
64
|
+
throw new Error("Missing required property 'perimeter'");
|
|
65
|
+
}
|
|
66
|
+
resourceInputs["ingressFrom"] = args ? args.ingressFrom : undefined;
|
|
67
|
+
resourceInputs["ingressTo"] = args ? args.ingressTo : undefined;
|
|
68
|
+
resourceInputs["perimeter"] = args ? args.perimeter : undefined;
|
|
69
|
+
}
|
|
70
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
71
|
+
super(ServicePerimeterDryRunIngressPolicy.__pulumiType, name, resourceInputs, opts);
|
|
72
|
+
}
|
|
73
|
+
}
|
|
74
|
+
exports.ServicePerimeterDryRunIngressPolicy = ServicePerimeterDryRunIngressPolicy;
|
|
75
|
+
/** @internal */
|
|
76
|
+
ServicePerimeterDryRunIngressPolicy.__pulumiType = 'gcp:accesscontextmanager/servicePerimeterDryRunIngressPolicy:ServicePerimeterDryRunIngressPolicy';
|
|
77
|
+
//# sourceMappingURL=servicePerimeterDryRunIngressPolicy.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"servicePerimeterDryRunIngressPolicy.js","sourceRoot":"","sources":["../../accesscontextmanager/servicePerimeterDryRunIngressPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,MAAa,mCAAoC,SAAQ,MAAM,CAAC,cAAc;IAC1E;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAgD,EAAE,IAAmC;QAC9I,OAAO,IAAI,mCAAmC,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC1F,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,mCAAmC,CAAC,YAAY,CAAC;IACpF,CAAC;IA8BD,YAAY,IAAY,EAAE,WAAgG,EAAE,IAAmC;QAC3J,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAmE,CAAC;YAClF,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SACrE;aAAM;YACH,MAAM,IAAI,GAAG,WAAkE,CAAC;YAChF,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,mCAAmC,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACxF,CAAC;;AA3EL,kFA4EC;AA9DG,gBAAgB;AACO,gDAAY,GAAG,kGAAkG,CAAC"}
|
|
@@ -2,6 +2,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as inputs from "../types/input";
|
|
3
3
|
import * as outputs from "../types/output";
|
|
4
4
|
/**
|
|
5
|
+
* Manage a single EgressPolicy in the status (enforced) configuration for a service perimeter.
|
|
5
6
|
* EgressPolicies match requests based on egressFrom and egressTo stanzas.
|
|
6
7
|
* For an EgressPolicy to match, both egressFrom and egressTo stanzas must be matched.
|
|
7
8
|
* If an EgressPolicy matches a request, the request is allowed to span the ServicePerimeter
|
|
@@ -19,18 +20,6 @@ import * as outputs from "../types/output";
|
|
|
19
20
|
* * [API documentation](https://cloud.google.com/access-context-manager/docs/reference/rest/v1/accessPolicies.servicePerimeters#egresspolicy)
|
|
20
21
|
*
|
|
21
22
|
* ## Example Usage
|
|
22
|
-
*
|
|
23
|
-
* ## Import
|
|
24
|
-
*
|
|
25
|
-
* ServicePerimeterEgressPolicy can be imported using any of these accepted formats:
|
|
26
|
-
*
|
|
27
|
-
* * `{{perimeter}}`
|
|
28
|
-
*
|
|
29
|
-
* When using the `pulumi import` command, ServicePerimeterEgressPolicy can be imported using one of the formats above. For example:
|
|
30
|
-
*
|
|
31
|
-
* ```sh
|
|
32
|
-
* $ pulumi import gcp:accesscontextmanager/servicePerimeterEgressPolicy:ServicePerimeterEgressPolicy default {{perimeter}}
|
|
33
|
-
* ```
|
|
34
23
|
*/
|
|
35
24
|
export declare class ServicePerimeterEgressPolicy extends pulumi.CustomResource {
|
|
36
25
|
/**
|
|
@@ -6,6 +6,7 @@ exports.ServicePerimeterEgressPolicy = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
8
|
/**
|
|
9
|
+
* Manage a single EgressPolicy in the status (enforced) configuration for a service perimeter.
|
|
9
10
|
* EgressPolicies match requests based on egressFrom and egressTo stanzas.
|
|
10
11
|
* For an EgressPolicy to match, both egressFrom and egressTo stanzas must be matched.
|
|
11
12
|
* If an EgressPolicy matches a request, the request is allowed to span the ServicePerimeter
|
|
@@ -23,18 +24,6 @@ const utilities = require("../utilities");
|
|
|
23
24
|
* * [API documentation](https://cloud.google.com/access-context-manager/docs/reference/rest/v1/accessPolicies.servicePerimeters#egresspolicy)
|
|
24
25
|
*
|
|
25
26
|
* ## Example Usage
|
|
26
|
-
*
|
|
27
|
-
* ## Import
|
|
28
|
-
*
|
|
29
|
-
* ServicePerimeterEgressPolicy can be imported using any of these accepted formats:
|
|
30
|
-
*
|
|
31
|
-
* * `{{perimeter}}`
|
|
32
|
-
*
|
|
33
|
-
* When using the `pulumi import` command, ServicePerimeterEgressPolicy can be imported using one of the formats above. For example:
|
|
34
|
-
*
|
|
35
|
-
* ```sh
|
|
36
|
-
* $ pulumi import gcp:accesscontextmanager/servicePerimeterEgressPolicy:ServicePerimeterEgressPolicy default {{perimeter}}
|
|
37
|
-
* ```
|
|
38
27
|
*/
|
|
39
28
|
class ServicePerimeterEgressPolicy extends pulumi.CustomResource {
|
|
40
29
|
/**
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"servicePerimeterEgressPolicy.js","sourceRoot":"","sources":["../../accesscontextmanager/servicePerimeterEgressPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"servicePerimeterEgressPolicy.js","sourceRoot":"","sources":["../../accesscontextmanager/servicePerimeterEgressPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;GAmBG;AACH,MAAa,4BAA6B,SAAQ,MAAM,CAAC,cAAc;IACnE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAyC,EAAE,IAAmC;QACvI,OAAO,IAAI,4BAA4B,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACnF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,4BAA4B,CAAC,YAAY,CAAC;IAC7E,CAAC;IA6BD,YAAY,IAAY,EAAE,WAAkF,EAAE,IAAmC;QAC7I,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA4D,CAAC;YAC3E,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SACrE;aAAM;YACH,MAAM,IAAI,GAAG,WAA2D,CAAC;YACzE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,4BAA4B,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACjF,CAAC;;AA1EL,oEA2EC;AA7DG,gBAAgB;AACO,yCAAY,GAAG,oFAAoF,CAAC"}
|
|
@@ -2,6 +2,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as inputs from "../types/input";
|
|
3
3
|
import * as outputs from "../types/output";
|
|
4
4
|
/**
|
|
5
|
+
* Manage a single IngressPolicy in the status (enforced) configuration for a service perimeter.
|
|
5
6
|
* IngressPolicies match requests based on ingressFrom and ingressTo stanzas. For an ingress policy to match,
|
|
6
7
|
* both the ingressFrom and ingressTo stanzas must be matched. If an IngressPolicy matches a request,
|
|
7
8
|
* the request is allowed through the perimeter boundary from outside the perimeter.
|
|
@@ -20,18 +21,6 @@ import * as outputs from "../types/output";
|
|
|
20
21
|
* * [API documentation](https://cloud.google.com/access-context-manager/docs/reference/rest/v1/accessPolicies.servicePerimeters#ingresspolicy)
|
|
21
22
|
*
|
|
22
23
|
* ## Example Usage
|
|
23
|
-
*
|
|
24
|
-
* ## Import
|
|
25
|
-
*
|
|
26
|
-
* ServicePerimeterIngressPolicy can be imported using any of these accepted formats:
|
|
27
|
-
*
|
|
28
|
-
* * `{{perimeter}}`
|
|
29
|
-
*
|
|
30
|
-
* When using the `pulumi import` command, ServicePerimeterIngressPolicy can be imported using one of the formats above. For example:
|
|
31
|
-
*
|
|
32
|
-
* ```sh
|
|
33
|
-
* $ pulumi import gcp:accesscontextmanager/servicePerimeterIngressPolicy:ServicePerimeterIngressPolicy default {{perimeter}}
|
|
34
|
-
* ```
|
|
35
24
|
*/
|
|
36
25
|
export declare class ServicePerimeterIngressPolicy extends pulumi.CustomResource {
|
|
37
26
|
/**
|
|
@@ -6,6 +6,7 @@ exports.ServicePerimeterIngressPolicy = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
8
|
/**
|
|
9
|
+
* Manage a single IngressPolicy in the status (enforced) configuration for a service perimeter.
|
|
9
10
|
* IngressPolicies match requests based on ingressFrom and ingressTo stanzas. For an ingress policy to match,
|
|
10
11
|
* both the ingressFrom and ingressTo stanzas must be matched. If an IngressPolicy matches a request,
|
|
11
12
|
* the request is allowed through the perimeter boundary from outside the perimeter.
|
|
@@ -24,18 +25,6 @@ const utilities = require("../utilities");
|
|
|
24
25
|
* * [API documentation](https://cloud.google.com/access-context-manager/docs/reference/rest/v1/accessPolicies.servicePerimeters#ingresspolicy)
|
|
25
26
|
*
|
|
26
27
|
* ## Example Usage
|
|
27
|
-
*
|
|
28
|
-
* ## Import
|
|
29
|
-
*
|
|
30
|
-
* ServicePerimeterIngressPolicy can be imported using any of these accepted formats:
|
|
31
|
-
*
|
|
32
|
-
* * `{{perimeter}}`
|
|
33
|
-
*
|
|
34
|
-
* When using the `pulumi import` command, ServicePerimeterIngressPolicy can be imported using one of the formats above. For example:
|
|
35
|
-
*
|
|
36
|
-
* ```sh
|
|
37
|
-
* $ pulumi import gcp:accesscontextmanager/servicePerimeterIngressPolicy:ServicePerimeterIngressPolicy default {{perimeter}}
|
|
38
|
-
* ```
|
|
39
28
|
*/
|
|
40
29
|
class ServicePerimeterIngressPolicy extends pulumi.CustomResource {
|
|
41
30
|
/**
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"servicePerimeterIngressPolicy.js","sourceRoot":"","sources":["../../accesscontextmanager/servicePerimeterIngressPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"servicePerimeterIngressPolicy.js","sourceRoot":"","sources":["../../accesscontextmanager/servicePerimeterIngressPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,MAAa,6BAA8B,SAAQ,MAAM,CAAC,cAAc;IACpE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0C,EAAE,IAAmC;QACxI,OAAO,IAAI,6BAA6B,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACpF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,6BAA6B,CAAC,YAAY,CAAC;IAC9E,CAAC;IA8BD,YAAY,IAAY,EAAE,WAAoF,EAAE,IAAmC;QAC/I,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6D,CAAC;YAC5E,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SACrE;aAAM;YACH,MAAM,IAAI,GAAG,WAA4D,CAAC;YAC1E,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,6BAA6B,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClF,CAAC;;AA3EL,sEA4EC;AA9DG,gBAAgB;AACO,0CAAY,GAAG,sFAAsF,CAAC"}
|
|
@@ -39,7 +39,7 @@ import * as outputs from "../types/output";
|
|
|
39
39
|
* });
|
|
40
40
|
* const testKey = new gcp.kms.CryptoKeyVersion("test_key", {cryptoKey: cryptokey.id});
|
|
41
41
|
* const serviceAccount = new gcp.serviceaccount.Account("service_account", {
|
|
42
|
-
* accountId: "service-
|
|
42
|
+
* accountId: "my-service-acc",
|
|
43
43
|
* displayName: "Service Account",
|
|
44
44
|
* });
|
|
45
45
|
* const example = new gcp.applicationintegration.Client("example", {
|
|
@@ -43,7 +43,7 @@ const utilities = require("../utilities");
|
|
|
43
43
|
* });
|
|
44
44
|
* const testKey = new gcp.kms.CryptoKeyVersion("test_key", {cryptoKey: cryptokey.id});
|
|
45
45
|
* const serviceAccount = new gcp.serviceaccount.Account("service_account", {
|
|
46
|
-
* accountId: "service-
|
|
46
|
+
* accountId: "my-service-acc",
|
|
47
47
|
* displayName: "Service Account",
|
|
48
48
|
* });
|
|
49
49
|
* const example = new gcp.applicationintegration.Client("example", {
|