@pulumi/gcp 7.36.0 → 7.37.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (88) hide show
  1. package/accesscontextmanager/index.d.ts +6 -0
  2. package/accesscontextmanager/index.js +11 -1
  3. package/accesscontextmanager/index.js.map +1 -1
  4. package/accesscontextmanager/servicePerimeterDryRunEgressPolicy.d.ts +112 -0
  5. package/accesscontextmanager/servicePerimeterDryRunEgressPolicy.js +76 -0
  6. package/accesscontextmanager/servicePerimeterDryRunEgressPolicy.js.map +1 -0
  7. package/accesscontextmanager/servicePerimeterDryRunIngressPolicy.d.ts +116 -0
  8. package/accesscontextmanager/servicePerimeterDryRunIngressPolicy.js +77 -0
  9. package/accesscontextmanager/servicePerimeterDryRunIngressPolicy.js.map +1 -0
  10. package/accesscontextmanager/servicePerimeterEgressPolicy.d.ts +1 -12
  11. package/accesscontextmanager/servicePerimeterEgressPolicy.js +1 -12
  12. package/accesscontextmanager/servicePerimeterEgressPolicy.js.map +1 -1
  13. package/accesscontextmanager/servicePerimeterIngressPolicy.d.ts +1 -12
  14. package/accesscontextmanager/servicePerimeterIngressPolicy.js +1 -12
  15. package/accesscontextmanager/servicePerimeterIngressPolicy.js.map +1 -1
  16. package/applicationintegration/client.d.ts +1 -1
  17. package/applicationintegration/client.js +1 -1
  18. package/compute/regionTargetHttpsProxy.d.ts +12 -0
  19. package/compute/regionTargetHttpsProxy.js.map +1 -1
  20. package/dataform/repository.d.ts +31 -0
  21. package/dataform/repository.js +18 -0
  22. package/dataform/repository.js.map +1 -1
  23. package/discoveryengine/dataStore.d.ts +31 -0
  24. package/discoveryengine/dataStore.js +3 -0
  25. package/discoveryengine/dataStore.js.map +1 -1
  26. package/logging/getLogViewIamPolicy.d.ts +34 -0
  27. package/logging/getLogViewIamPolicy.js +34 -0
  28. package/logging/getLogViewIamPolicy.js.map +1 -1
  29. package/logging/logViewIamBinding.d.ts +276 -0
  30. package/logging/logViewIamBinding.js +276 -0
  31. package/logging/logViewIamBinding.js.map +1 -1
  32. package/logging/logViewIamMember.d.ts +276 -0
  33. package/logging/logViewIamMember.js +276 -0
  34. package/logging/logViewIamMember.js.map +1 -1
  35. package/logging/logViewIamPolicy.d.ts +276 -0
  36. package/logging/logViewIamPolicy.js +276 -0
  37. package/logging/logViewIamPolicy.js.map +1 -1
  38. package/networkconnectivity/regionalEndpoint.d.ts +3 -3
  39. package/networkconnectivity/regionalEndpoint.js +3 -3
  40. package/organizations/getProject.d.ts +1 -0
  41. package/organizations/getProject.js.map +1 -1
  42. package/organizations/project.d.ts +21 -9
  43. package/organizations/project.js +2 -0
  44. package/organizations/project.js.map +1 -1
  45. package/package.json +2 -2
  46. package/securitycenter/getV2OrganizationSourceIamPolicy.d.ts +71 -0
  47. package/securitycenter/getV2OrganizationSourceIamPolicy.js +48 -0
  48. package/securitycenter/getV2OrganizationSourceIamPolicy.js.map +1 -0
  49. package/securitycenter/index.d.ts +24 -0
  50. package/securitycenter/index.js +39 -1
  51. package/securitycenter/index.js.map +1 -1
  52. package/securitycenter/v2folderMuteConfig.d.ts +230 -0
  53. package/securitycenter/v2folderMuteConfig.js +129 -0
  54. package/securitycenter/v2folderMuteConfig.js.map +1 -0
  55. package/securitycenter/v2organizationSource.d.ts +151 -0
  56. package/securitycenter/v2organizationSource.js +106 -0
  57. package/securitycenter/v2organizationSource.js.map +1 -0
  58. package/securitycenter/v2organizationSourceIamBinding.d.ts +283 -0
  59. package/securitycenter/v2organizationSourceIamBinding.js +230 -0
  60. package/securitycenter/v2organizationSourceIamBinding.js.map +1 -0
  61. package/securitycenter/v2organizationSourceIamMember.d.ts +283 -0
  62. package/securitycenter/v2organizationSourceIamMember.js +230 -0
  63. package/securitycenter/v2organizationSourceIamMember.js.map +1 -0
  64. package/securitycenter/v2organizationSourceIamPolicy.d.ts +233 -0
  65. package/securitycenter/v2organizationSourceIamPolicy.js +223 -0
  66. package/securitycenter/v2organizationSourceIamPolicy.js.map +1 -0
  67. package/securitycenter/v2projectMuteConfig.d.ts +232 -0
  68. package/securitycenter/v2projectMuteConfig.js +128 -0
  69. package/securitycenter/v2projectMuteConfig.js.map +1 -0
  70. package/securitycenter/v2projectNotificationConfig.d.ts +184 -0
  71. package/securitycenter/v2projectNotificationConfig.js +129 -0
  72. package/securitycenter/v2projectNotificationConfig.js.map +1 -0
  73. package/spanner/instance.d.ts +0 -3
  74. package/spanner/instance.js.map +1 -1
  75. package/storage/bucketObject.d.ts +8 -0
  76. package/storage/bucketObject.js +2 -0
  77. package/storage/bucketObject.js.map +1 -1
  78. package/storage/getBucketObject.d.ts +4 -0
  79. package/storage/getBucketObject.js.map +1 -1
  80. package/storage/getBucketObjectContent.d.ts +1 -0
  81. package/storage/getBucketObjectContent.js.map +1 -1
  82. package/storage/managedFolder.d.ts +22 -0
  83. package/storage/managedFolder.js +3 -0
  84. package/storage/managedFolder.js.map +1 -1
  85. package/types/input.d.ts +242 -3
  86. package/types/output.d.ts +256 -5
  87. package/vmwareengine/networkPolicy.d.ts +3 -3
  88. package/vmwareengine/networkPolicy.js +3 -3
package/types/output.d.ts CHANGED
@@ -432,6 +432,178 @@ export declare namespace accesscontextmanager {
432
432
  expression: string;
433
433
  title: string;
434
434
  }
435
+ interface ServicePerimeterDryRunEgressPolicyEgressFrom {
436
+ /**
437
+ * A list of identities that are allowed access through this `EgressPolicy`.
438
+ * Should be in the format of email address. The email address should
439
+ * represent individual user or service account only.
440
+ */
441
+ identities?: string[];
442
+ /**
443
+ * Specifies the type of identities that are allowed access to outside the
444
+ * perimeter. If left unspecified, then members of `identities` field will
445
+ * be allowed access.
446
+ * Possible values are: `ANY_IDENTITY`, `ANY_USER_ACCOUNT`, `ANY_SERVICE_ACCOUNT`.
447
+ */
448
+ identityType?: string;
449
+ /**
450
+ * Whether to enforce traffic restrictions based on `sources` field. If the `sources` field is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.
451
+ * Possible values are: `SOURCE_RESTRICTION_ENABLED`, `SOURCE_RESTRICTION_DISABLED`.
452
+ */
453
+ sourceRestriction?: string;
454
+ /**
455
+ * Sources that this EgressPolicy authorizes access from.
456
+ * Structure is documented below.
457
+ */
458
+ sources?: outputs.accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressFromSource[];
459
+ }
460
+ interface ServicePerimeterDryRunEgressPolicyEgressFromSource {
461
+ /**
462
+ * An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
463
+ */
464
+ accessLevel?: string;
465
+ }
466
+ interface ServicePerimeterDryRunEgressPolicyEgressTo {
467
+ /**
468
+ * A list of external resources that are allowed to be accessed. A request
469
+ * matches if it contains an external resource in this list (Example:
470
+ * s3://bucket/path). Currently '*' is not allowed.
471
+ */
472
+ externalResources?: string[];
473
+ /**
474
+ * A list of `ApiOperations` that this egress rule applies to. A request matches
475
+ * if it contains an operation/service in this list.
476
+ * Structure is documented below.
477
+ */
478
+ operations?: outputs.accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressToOperation[];
479
+ /**
480
+ * A list of resources, currently only projects in the form
481
+ * `projects/<projectnumber>`, that match this to stanza. A request matches
482
+ * if it contains a resource in this list. If * is specified for resources,
483
+ * then this `EgressTo` rule will authorize access to all resources outside
484
+ * the perimeter.
485
+ */
486
+ resources?: string[];
487
+ }
488
+ interface ServicePerimeterDryRunEgressPolicyEgressToOperation {
489
+ /**
490
+ * API methods or permissions to allow. Method or permission must belong
491
+ * to the service specified by `serviceName` field. A single MethodSelector
492
+ * entry with `*` specified for the `method` field will allow all methods
493
+ * AND permissions for the service specified in `serviceName`.
494
+ * Structure is documented below.
495
+ */
496
+ methodSelectors?: outputs.accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelector[];
497
+ /**
498
+ * The name of the API whose methods or permissions the `IngressPolicy` or
499
+ * `EgressPolicy` want to allow. A single `ApiOperation` with serviceName
500
+ * field set to `*` will allow all methods AND permissions for all services.
501
+ */
502
+ serviceName?: string;
503
+ }
504
+ interface ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelector {
505
+ /**
506
+ * Value for `method` should be a valid method name for the corresponding
507
+ * `serviceName` in `ApiOperation`. If `*` used as value for method,
508
+ * then ALL methods and permissions are allowed.
509
+ */
510
+ method?: string;
511
+ /**
512
+ * Value for permission should be a valid Cloud IAM permission for the
513
+ * corresponding `serviceName` in `ApiOperation`.
514
+ */
515
+ permission?: string;
516
+ }
517
+ interface ServicePerimeterDryRunIngressPolicyIngressFrom {
518
+ /**
519
+ * A list of identities that are allowed access through this ingress policy.
520
+ * Should be in the format of email address. The email address should represent
521
+ * individual user or service account only.
522
+ */
523
+ identities?: string[];
524
+ /**
525
+ * Specifies the type of identities that are allowed access from outside the
526
+ * perimeter. If left unspecified, then members of `identities` field will be
527
+ * allowed access.
528
+ * Possible values are: `ANY_IDENTITY`, `ANY_USER_ACCOUNT`, `ANY_SERVICE_ACCOUNT`.
529
+ */
530
+ identityType?: string;
531
+ /**
532
+ * Sources that this `IngressPolicy` authorizes access from.
533
+ * Structure is documented below.
534
+ */
535
+ sources?: outputs.accesscontextmanager.ServicePerimeterDryRunIngressPolicyIngressFromSource[];
536
+ }
537
+ interface ServicePerimeterDryRunIngressPolicyIngressFromSource {
538
+ /**
539
+ * An `AccessLevel` resource name that allow resources within the
540
+ * `ServicePerimeters` to be accessed from the internet. `AccessLevels` listed
541
+ * must be in the same policy as this `ServicePerimeter`. Referencing a nonexistent
542
+ * `AccessLevel` will cause an error. If no `AccessLevel` names are listed,
543
+ * resources within the perimeter can only be accessed via Google Cloud calls
544
+ * with request origins within the perimeter.
545
+ * Example `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL.`
546
+ * If * is specified, then all IngressSources will be allowed.
547
+ */
548
+ accessLevel?: string;
549
+ /**
550
+ * A Google Cloud resource that is allowed to ingress the perimeter.
551
+ * Requests from these resources will be allowed to access perimeter data.
552
+ * Currently only projects are allowed. Format `projects/{project_number}`
553
+ * The project may be in any Google Cloud organization, not just the
554
+ * organization that the perimeter is defined in. `*` is not allowed, the case
555
+ * of allowing all Google Cloud resources only is not supported.
556
+ */
557
+ resource?: string;
558
+ }
559
+ interface ServicePerimeterDryRunIngressPolicyIngressTo {
560
+ /**
561
+ * A list of `ApiOperations` the sources specified in corresponding `IngressFrom`
562
+ * are allowed to perform in this `ServicePerimeter`.
563
+ * Structure is documented below.
564
+ */
565
+ operations?: outputs.accesscontextmanager.ServicePerimeterDryRunIngressPolicyIngressToOperation[];
566
+ /**
567
+ * A list of resources, currently only projects in the form
568
+ * `projects/<projectnumber>`, protected by this `ServicePerimeter`
569
+ * that are allowed to be accessed by sources defined in the
570
+ * corresponding `IngressFrom`. A request matches if it contains
571
+ * a resource in this list. If `*` is specified for resources,
572
+ * then this `IngressTo` rule will authorize access to all
573
+ * resources inside the perimeter, provided that the request
574
+ * also matches the `operations` field.
575
+ */
576
+ resources?: string[];
577
+ }
578
+ interface ServicePerimeterDryRunIngressPolicyIngressToOperation {
579
+ /**
580
+ * API methods or permissions to allow. Method or permission must belong to
581
+ * the service specified by serviceName field. A single `MethodSelector` entry
582
+ * with `*` specified for the method field will allow all methods AND
583
+ * permissions for the service specified in `serviceName`.
584
+ * Structure is documented below.
585
+ */
586
+ methodSelectors?: outputs.accesscontextmanager.ServicePerimeterDryRunIngressPolicyIngressToOperationMethodSelector[];
587
+ /**
588
+ * The name of the API whose methods or permissions the `IngressPolicy` or
589
+ * `EgressPolicy` want to allow. A single `ApiOperation` with `serviceName`
590
+ * field set to `*` will allow all methods AND permissions for all services.
591
+ */
592
+ serviceName?: string;
593
+ }
594
+ interface ServicePerimeterDryRunIngressPolicyIngressToOperationMethodSelector {
595
+ /**
596
+ * Value for method should be a valid method name for the corresponding
597
+ * serviceName in `ApiOperation`. If `*` used as value for `method`, then
598
+ * ALL methods and permissions are allowed.
599
+ */
600
+ method?: string;
601
+ /**
602
+ * Value for permission should be a valid Cloud IAM permission for the
603
+ * corresponding `serviceName` in `ApiOperation`.
604
+ */
605
+ permission?: string;
606
+ }
435
607
  interface ServicePerimeterEgressPolicyEgressFrom {
436
608
  /**
437
609
  * A list of identities that are allowed access through this `EgressPolicy`.
@@ -12460,6 +12632,10 @@ export declare namespace clouddeploy {
12460
12632
  * Optional. If true, `cluster` is accessed using the private IP address of the control plane endpoint. Otherwise, the default IP address of the control plane endpoint is used. The default IP address is the private IP address for clusters with private control-plane endpoints and the public IP address otherwise. Only specify this option when `cluster` is a [private GKE cluster](https://cloud.google.com/kubernetes-engine/docs/concepts/private-cluster-concept).
12461
12633
  */
12462
12634
  internalIp?: boolean;
12635
+ /**
12636
+ * Optional. If set, used to configure a [proxy](https://kubernetes.io/docs/concepts/configuration/organize-cluster-access-kubeconfig/#proxy) to the Kubernetes server.
12637
+ */
12638
+ proxyUrl?: string;
12463
12639
  }
12464
12640
  interface TargetIamBindingCondition {
12465
12641
  description?: string;
@@ -15793,6 +15969,10 @@ export declare namespace cloudrunv2 {
15793
15969
  * If present, indicates to use Breakglass using this justification. If useDefault is False, then it must be empty. For more information on breakglass, see https://cloud.google.com/binary-authorization/docs/using-breakglass
15794
15970
  */
15795
15971
  breakglassJustification: string;
15972
+ /**
15973
+ * The path to a binary authorization policy. Format: projects/{project}/platforms/cloudRun/{policy-name}
15974
+ */
15975
+ policy: string;
15796
15976
  /**
15797
15977
  * If True, indicates to use the default project's binary authorization policy. If False, binary authorization will be disabled.
15798
15978
  */
@@ -16189,6 +16369,10 @@ export declare namespace cloudrunv2 {
16189
16369
  * If present, indicates to use Breakglass using this justification. If useDefault is False, then it must be empty. For more information on breakglass, see https://cloud.google.com/binary-authorization/docs/using-breakglass
16190
16370
  */
16191
16371
  breakglassJustification: string;
16372
+ /**
16373
+ * The path to a binary authorization policy. Format: projects/{project}/platforms/cloudRun/{policy-name}
16374
+ */
16375
+ policy: string;
16192
16376
  /**
16193
16377
  * If True, indicates to use the default project's binary authorization policy. If False, binary authorization will be disabled.
16194
16378
  */
@@ -16791,6 +16975,10 @@ export declare namespace cloudrunv2 {
16791
16975
  * If present, indicates to use Breakglass using this justification. If useDefault is False, then it must be empty. For more information on breakglass, see https://cloud.google.com/binary-authorization/docs/using-breakglass
16792
16976
  */
16793
16977
  breakglassJustification?: string;
16978
+ /**
16979
+ * The path to a binary authorization policy. Format: projects/{project}/platforms/cloudRun/{policy-name}
16980
+ */
16981
+ policy?: string;
16794
16982
  /**
16795
16983
  * If True, indicates to use the default project's binary authorization policy. If False, binary authorization will be disabled.
16796
16984
  */
@@ -17229,6 +17417,10 @@ export declare namespace cloudrunv2 {
17229
17417
  * If present, indicates to use Breakglass using this justification. If useDefault is False, then it must be empty. For more information on breakglass, see https://cloud.google.com/binary-authorization/docs/using-breakglass
17230
17418
  */
17231
17419
  breakglassJustification?: string;
17420
+ /**
17421
+ * The path to a binary authorization policy. Format: projects/{project}/platforms/cloudRun/{policy-name}
17422
+ */
17423
+ policy?: string;
17232
17424
  /**
17233
17425
  * If True, indicates to use the default project's binary authorization policy. If False, binary authorization will be disabled.
17234
17426
  */
@@ -36367,6 +36559,12 @@ export declare namespace container {
36367
36559
  * Structure is documented below.
36368
36560
  */
36369
36561
  autoProvisioningDefaults: outputs.container.ClusterClusterAutoscalingAutoProvisioningDefaults;
36562
+ /**
36563
+ * The list of Google Compute Engine
36564
+ * [zones](https://cloud.google.com/compute/docs/zones#available) in which the
36565
+ * NodePool's nodes can be created by NAP.
36566
+ */
36567
+ autoProvisioningLocations: string[];
36370
36568
  /**
36371
36569
  * Configuration
36372
36570
  * options for the [Autoscaling profile](https://cloud.google.com/kubernetes-engine/docs/concepts/cluster-autoscaler#autoscaling_profiles)
@@ -38633,6 +38831,10 @@ export declare namespace container {
38633
38831
  * Contains defaults for a node pool created by NAP.
38634
38832
  */
38635
38833
  autoProvisioningDefaults: outputs.container.GetClusterClusterAutoscalingAutoProvisioningDefault[];
38834
+ /**
38835
+ * The list of Google Compute Engine zones in which the NodePool's nodes can be created by NAP.
38836
+ */
38837
+ autoProvisioningLocations: string[];
38636
38838
  /**
38637
38839
  * Configuration options for the Autoscaling profile feature, which lets you choose whether the cluster autoscaler should optimize for resource utilization or resource availability when deciding to remove nodes from a cluster. Can be BALANCED or OPTIMIZE_UTILIZATION. Defaults to BALANCED.
38638
38840
  */
@@ -57652,6 +57854,11 @@ export declare namespace gkehub {
57652
57854
  * Structure is documented below.
57653
57855
  */
57654
57856
  configSync?: outputs.gkehub.FeatureFleetDefaultMemberConfigConfigmanagementConfigSync;
57857
+ /**
57858
+ * Set this field to MANAGEMENT_AUTOMATIC to enable Config Sync auto-upgrades, and set this field to MANAGEMENT_MANUAL or MANAGEMENT_UNSPECIFIED to disable Config Sync auto-upgrades.
57859
+ * Possible values are: `MANAGEMENT_UNSPECIFIED`, `MANAGEMENT_AUTOMATIC`, `MANAGEMENT_MANUAL`.
57860
+ */
57861
+ management?: string;
57655
57862
  /**
57656
57863
  * Version of ACM installed
57657
57864
  */
@@ -57944,6 +58151,10 @@ export declare namespace gkehub {
57944
58151
  * Hierarchy Controller configuration for the cluster. Structure is documented below.
57945
58152
  */
57946
58153
  hierarchyController?: outputs.gkehub.FeatureMembershipConfigmanagementHierarchyController;
58154
+ /**
58155
+ * Set this field to MANAGEMENT_AUTOMATIC to enable Config Sync auto-upgrades, and set this field to MANAGEMENT_MANUAL or MANAGEMENT_UNSPECIFIED to disable Config Sync auto-upgrades.
58156
+ */
58157
+ management: string;
57947
58158
  /**
57948
58159
  * Policy Controller configuration for the cluster. Structure is documented below.
57949
58160
  */
@@ -57960,6 +58171,10 @@ export declare namespace gkehub {
57960
58171
  enabled?: boolean;
57961
58172
  }
57962
58173
  interface FeatureMembershipConfigmanagementConfigSync {
58174
+ /**
58175
+ * Enables the installation of ConfigSync. If set to true, ConfigSync resources will be created and the other ConfigSync fields will be applied if exist. If set to false, all other ConfigSync fields will be ignored, ConfigSync resources will be deleted. If omitted, ConfigSync resources will be managed depends on the presence of the git or oci field.
58176
+ */
58177
+ enabled?: boolean;
57963
58178
  /**
57964
58179
  * (Optional) Structure is documented below.
57965
58180
  */
@@ -65435,12 +65650,12 @@ export declare namespace netapp {
65435
65650
  lastTransferError: string;
65436
65651
  /**
65437
65652
  * (Output)
65438
- * Total time taken so far during current transfer.
65653
+ * Cumulative time taken across all transfers for the replication relationship.
65439
65654
  */
65440
65655
  totalTransferDuration: string;
65441
65656
  /**
65442
65657
  * (Output)
65443
- * Number of bytes transferred so far in current transfer.
65658
+ * Cumulative bytes transferred so far for the replication relationship.
65444
65659
  */
65445
65660
  transferBytes: string;
65446
65661
  /**
@@ -72826,6 +73041,42 @@ export declare namespace securitycenter {
72826
73041
  */
72827
73042
  filter: string;
72828
73043
  }
73044
+ interface V2OrganizationSourceIamBindingCondition {
73045
+ description?: string;
73046
+ expression: string;
73047
+ title: string;
73048
+ }
73049
+ interface V2OrganizationSourceIamMemberCondition {
73050
+ description?: string;
73051
+ expression: string;
73052
+ title: string;
73053
+ }
73054
+ interface V2ProjectNotificationConfigStreamingConfig {
73055
+ /**
73056
+ * Expression that defines the filter to apply across create/update
73057
+ * events of assets or findings as specified by the event type. The
73058
+ * expression is a list of zero or more restrictions combined via
73059
+ * logical operators AND and OR. Parentheses are supported, and OR
73060
+ * has higher precedence than AND.
73061
+ * Restrictions have the form <field> <operator> <value> and may have
73062
+ * a - character in front of them to indicate negation. The fields
73063
+ * map to those defined in the corresponding resource.
73064
+ * The supported operators are:
73065
+ * * = for all value types.
73066
+ * * >, <, >=, <= for integer values.
73067
+ * * :, meaning substring matching, for strings.
73068
+ * The supported value types are:
73069
+ * * string literals in quotes.
73070
+ * * integer literals without quotes.
73071
+ * * boolean literals true and false without quotes.
73072
+ * See
73073
+ * [Filtering notifications](https://cloud.google.com/security-command-center/docs/how-to-api-filter-notifications)
73074
+ * for information on how to write a filter.
73075
+ *
73076
+ * - - -
73077
+ */
73078
+ filter: string;
73079
+ }
72829
73080
  }
72830
73081
  export declare namespace securityposture {
72831
73082
  interface PosturePolicySet {
@@ -73629,7 +73880,7 @@ export declare namespace sql {
73629
73880
  */
73630
73881
  collation?: string;
73631
73882
  /**
73632
- * Specifies if connections must use Cloud SQL connectors.
73883
+ * Enables the enforcement of Cloud SQL Auth Proxy or Cloud SQL connectors for all the connections. If enabled, all the direct connections are rejected.
73633
73884
  */
73634
73885
  connectorEnforcement: string;
73635
73886
  /**
@@ -74108,7 +74359,7 @@ export declare namespace sql {
74108
74359
  */
74109
74360
  collation: string;
74110
74361
  /**
74111
- * Specifies if connections must use Cloud SQL connectors.
74362
+ * Enables the enforcement of Cloud SQL Auth Proxy or Cloud SQL connectors for all the connections. If enabled, all the direct connections are rejected.
74112
74363
  */
74113
74364
  connectorEnforcement: string;
74114
74365
  /**
@@ -74608,7 +74859,7 @@ export declare namespace sql {
74608
74859
  */
74609
74860
  collation: string;
74610
74861
  /**
74611
- * Specifies if connections must use Cloud SQL connectors.
74862
+ * Enables the enforcement of Cloud SQL Auth Proxy or Cloud SQL connectors for all the connections. If enabled, all the direct connections are rejected.
74612
74863
  */
74613
74864
  connectorEnforcement: string;
74614
74865
  /**
@@ -17,7 +17,7 @@ import * as outputs from "../types/output";
17
17
  * import * as gcp from "@pulumi/gcp";
18
18
  *
19
19
  * const network_policy_nw = new gcp.vmwareengine.Network("network-policy-nw", {
20
- * name: "standard-nw",
20
+ * name: "sample-network",
21
21
  * location: "global",
22
22
  * type: "STANDARD",
23
23
  * description: "VMwareEngine standard network sample",
@@ -36,14 +36,14 @@ import * as outputs from "../types/output";
36
36
  * import * as gcp from "@pulumi/gcp";
37
37
  *
38
38
  * const network_policy_nw = new gcp.vmwareengine.Network("network-policy-nw", {
39
- * name: "standard-full-nw",
39
+ * name: "sample-network",
40
40
  * location: "global",
41
41
  * type: "STANDARD",
42
42
  * description: "VMwareEngine standard network sample",
43
43
  * });
44
44
  * const vmw_engine_network_policy = new gcp.vmwareengine.NetworkPolicy("vmw-engine-network-policy", {
45
45
  * location: "us-west1",
46
- * name: "sample-network-policy-full",
46
+ * name: "sample-network-policy",
47
47
  * edgeServicesCidr: "192.168.30.0/26",
48
48
  * vmwareEngineNetwork: network_policy_nw.id,
49
49
  * description: "Sample Network Policy",
@@ -21,7 +21,7 @@ const utilities = require("../utilities");
21
21
  * import * as gcp from "@pulumi/gcp";
22
22
  *
23
23
  * const network_policy_nw = new gcp.vmwareengine.Network("network-policy-nw", {
24
- * name: "standard-nw",
24
+ * name: "sample-network",
25
25
  * location: "global",
26
26
  * type: "STANDARD",
27
27
  * description: "VMwareEngine standard network sample",
@@ -40,14 +40,14 @@ const utilities = require("../utilities");
40
40
  * import * as gcp from "@pulumi/gcp";
41
41
  *
42
42
  * const network_policy_nw = new gcp.vmwareengine.Network("network-policy-nw", {
43
- * name: "standard-full-nw",
43
+ * name: "sample-network",
44
44
  * location: "global",
45
45
  * type: "STANDARD",
46
46
  * description: "VMwareEngine standard network sample",
47
47
  * });
48
48
  * const vmw_engine_network_policy = new gcp.vmwareengine.NetworkPolicy("vmw-engine-network-policy", {
49
49
  * location: "us-west1",
50
- * name: "sample-network-policy-full",
50
+ * name: "sample-network-policy",
51
51
  * edgeServicesCidr: "192.168.30.0/26",
52
52
  * vmwareEngineNetwork: network_policy_nw.id,
53
53
  * description: "Sample Network Policy",