@pulumi/gcp 7.36.0 → 7.37.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/accesscontextmanager/index.d.ts +6 -0
- package/accesscontextmanager/index.js +11 -1
- package/accesscontextmanager/index.js.map +1 -1
- package/accesscontextmanager/servicePerimeterDryRunEgressPolicy.d.ts +112 -0
- package/accesscontextmanager/servicePerimeterDryRunEgressPolicy.js +76 -0
- package/accesscontextmanager/servicePerimeterDryRunEgressPolicy.js.map +1 -0
- package/accesscontextmanager/servicePerimeterDryRunIngressPolicy.d.ts +116 -0
- package/accesscontextmanager/servicePerimeterDryRunIngressPolicy.js +77 -0
- package/accesscontextmanager/servicePerimeterDryRunIngressPolicy.js.map +1 -0
- package/accesscontextmanager/servicePerimeterEgressPolicy.d.ts +1 -12
- package/accesscontextmanager/servicePerimeterEgressPolicy.js +1 -12
- package/accesscontextmanager/servicePerimeterEgressPolicy.js.map +1 -1
- package/accesscontextmanager/servicePerimeterIngressPolicy.d.ts +1 -12
- package/accesscontextmanager/servicePerimeterIngressPolicy.js +1 -12
- package/accesscontextmanager/servicePerimeterIngressPolicy.js.map +1 -1
- package/applicationintegration/client.d.ts +1 -1
- package/applicationintegration/client.js +1 -1
- package/compute/regionTargetHttpsProxy.d.ts +12 -0
- package/compute/regionTargetHttpsProxy.js.map +1 -1
- package/dataform/repository.d.ts +31 -0
- package/dataform/repository.js +18 -0
- package/dataform/repository.js.map +1 -1
- package/discoveryengine/dataStore.d.ts +31 -0
- package/discoveryengine/dataStore.js +3 -0
- package/discoveryengine/dataStore.js.map +1 -1
- package/logging/getLogViewIamPolicy.d.ts +34 -0
- package/logging/getLogViewIamPolicy.js +34 -0
- package/logging/getLogViewIamPolicy.js.map +1 -1
- package/logging/logViewIamBinding.d.ts +276 -0
- package/logging/logViewIamBinding.js +276 -0
- package/logging/logViewIamBinding.js.map +1 -1
- package/logging/logViewIamMember.d.ts +276 -0
- package/logging/logViewIamMember.js +276 -0
- package/logging/logViewIamMember.js.map +1 -1
- package/logging/logViewIamPolicy.d.ts +276 -0
- package/logging/logViewIamPolicy.js +276 -0
- package/logging/logViewIamPolicy.js.map +1 -1
- package/networkconnectivity/regionalEndpoint.d.ts +3 -3
- package/networkconnectivity/regionalEndpoint.js +3 -3
- package/organizations/getProject.d.ts +1 -0
- package/organizations/getProject.js.map +1 -1
- package/organizations/project.d.ts +21 -9
- package/organizations/project.js +2 -0
- package/organizations/project.js.map +1 -1
- package/package.json +2 -2
- package/securitycenter/getV2OrganizationSourceIamPolicy.d.ts +71 -0
- package/securitycenter/getV2OrganizationSourceIamPolicy.js +48 -0
- package/securitycenter/getV2OrganizationSourceIamPolicy.js.map +1 -0
- package/securitycenter/index.d.ts +24 -0
- package/securitycenter/index.js +39 -1
- package/securitycenter/index.js.map +1 -1
- package/securitycenter/v2folderMuteConfig.d.ts +230 -0
- package/securitycenter/v2folderMuteConfig.js +129 -0
- package/securitycenter/v2folderMuteConfig.js.map +1 -0
- package/securitycenter/v2organizationSource.d.ts +151 -0
- package/securitycenter/v2organizationSource.js +106 -0
- package/securitycenter/v2organizationSource.js.map +1 -0
- package/securitycenter/v2organizationSourceIamBinding.d.ts +283 -0
- package/securitycenter/v2organizationSourceIamBinding.js +230 -0
- package/securitycenter/v2organizationSourceIamBinding.js.map +1 -0
- package/securitycenter/v2organizationSourceIamMember.d.ts +283 -0
- package/securitycenter/v2organizationSourceIamMember.js +230 -0
- package/securitycenter/v2organizationSourceIamMember.js.map +1 -0
- package/securitycenter/v2organizationSourceIamPolicy.d.ts +233 -0
- package/securitycenter/v2organizationSourceIamPolicy.js +223 -0
- package/securitycenter/v2organizationSourceIamPolicy.js.map +1 -0
- package/securitycenter/v2projectMuteConfig.d.ts +232 -0
- package/securitycenter/v2projectMuteConfig.js +128 -0
- package/securitycenter/v2projectMuteConfig.js.map +1 -0
- package/securitycenter/v2projectNotificationConfig.d.ts +184 -0
- package/securitycenter/v2projectNotificationConfig.js +129 -0
- package/securitycenter/v2projectNotificationConfig.js.map +1 -0
- package/spanner/instance.d.ts +0 -3
- package/spanner/instance.js.map +1 -1
- package/storage/bucketObject.d.ts +8 -0
- package/storage/bucketObject.js +2 -0
- package/storage/bucketObject.js.map +1 -1
- package/storage/getBucketObject.d.ts +4 -0
- package/storage/getBucketObject.js.map +1 -1
- package/storage/getBucketObjectContent.d.ts +1 -0
- package/storage/getBucketObjectContent.js.map +1 -1
- package/storage/managedFolder.d.ts +22 -0
- package/storage/managedFolder.js +3 -0
- package/storage/managedFolder.js.map +1 -1
- package/types/input.d.ts +242 -3
- package/types/output.d.ts +256 -5
- package/vmwareengine/networkPolicy.d.ts +3 -3
- package/vmwareengine/networkPolicy.js +3 -3
package/types/output.d.ts
CHANGED
|
@@ -432,6 +432,178 @@ export declare namespace accesscontextmanager {
|
|
|
432
432
|
expression: string;
|
|
433
433
|
title: string;
|
|
434
434
|
}
|
|
435
|
+
interface ServicePerimeterDryRunEgressPolicyEgressFrom {
|
|
436
|
+
/**
|
|
437
|
+
* A list of identities that are allowed access through this `EgressPolicy`.
|
|
438
|
+
* Should be in the format of email address. The email address should
|
|
439
|
+
* represent individual user or service account only.
|
|
440
|
+
*/
|
|
441
|
+
identities?: string[];
|
|
442
|
+
/**
|
|
443
|
+
* Specifies the type of identities that are allowed access to outside the
|
|
444
|
+
* perimeter. If left unspecified, then members of `identities` field will
|
|
445
|
+
* be allowed access.
|
|
446
|
+
* Possible values are: `ANY_IDENTITY`, `ANY_USER_ACCOUNT`, `ANY_SERVICE_ACCOUNT`.
|
|
447
|
+
*/
|
|
448
|
+
identityType?: string;
|
|
449
|
+
/**
|
|
450
|
+
* Whether to enforce traffic restrictions based on `sources` field. If the `sources` field is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.
|
|
451
|
+
* Possible values are: `SOURCE_RESTRICTION_ENABLED`, `SOURCE_RESTRICTION_DISABLED`.
|
|
452
|
+
*/
|
|
453
|
+
sourceRestriction?: string;
|
|
454
|
+
/**
|
|
455
|
+
* Sources that this EgressPolicy authorizes access from.
|
|
456
|
+
* Structure is documented below.
|
|
457
|
+
*/
|
|
458
|
+
sources?: outputs.accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressFromSource[];
|
|
459
|
+
}
|
|
460
|
+
interface ServicePerimeterDryRunEgressPolicyEgressFromSource {
|
|
461
|
+
/**
|
|
462
|
+
* An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
|
|
463
|
+
*/
|
|
464
|
+
accessLevel?: string;
|
|
465
|
+
}
|
|
466
|
+
interface ServicePerimeterDryRunEgressPolicyEgressTo {
|
|
467
|
+
/**
|
|
468
|
+
* A list of external resources that are allowed to be accessed. A request
|
|
469
|
+
* matches if it contains an external resource in this list (Example:
|
|
470
|
+
* s3://bucket/path). Currently '*' is not allowed.
|
|
471
|
+
*/
|
|
472
|
+
externalResources?: string[];
|
|
473
|
+
/**
|
|
474
|
+
* A list of `ApiOperations` that this egress rule applies to. A request matches
|
|
475
|
+
* if it contains an operation/service in this list.
|
|
476
|
+
* Structure is documented below.
|
|
477
|
+
*/
|
|
478
|
+
operations?: outputs.accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressToOperation[];
|
|
479
|
+
/**
|
|
480
|
+
* A list of resources, currently only projects in the form
|
|
481
|
+
* `projects/<projectnumber>`, that match this to stanza. A request matches
|
|
482
|
+
* if it contains a resource in this list. If * is specified for resources,
|
|
483
|
+
* then this `EgressTo` rule will authorize access to all resources outside
|
|
484
|
+
* the perimeter.
|
|
485
|
+
*/
|
|
486
|
+
resources?: string[];
|
|
487
|
+
}
|
|
488
|
+
interface ServicePerimeterDryRunEgressPolicyEgressToOperation {
|
|
489
|
+
/**
|
|
490
|
+
* API methods or permissions to allow. Method or permission must belong
|
|
491
|
+
* to the service specified by `serviceName` field. A single MethodSelector
|
|
492
|
+
* entry with `*` specified for the `method` field will allow all methods
|
|
493
|
+
* AND permissions for the service specified in `serviceName`.
|
|
494
|
+
* Structure is documented below.
|
|
495
|
+
*/
|
|
496
|
+
methodSelectors?: outputs.accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelector[];
|
|
497
|
+
/**
|
|
498
|
+
* The name of the API whose methods or permissions the `IngressPolicy` or
|
|
499
|
+
* `EgressPolicy` want to allow. A single `ApiOperation` with serviceName
|
|
500
|
+
* field set to `*` will allow all methods AND permissions for all services.
|
|
501
|
+
*/
|
|
502
|
+
serviceName?: string;
|
|
503
|
+
}
|
|
504
|
+
interface ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelector {
|
|
505
|
+
/**
|
|
506
|
+
* Value for `method` should be a valid method name for the corresponding
|
|
507
|
+
* `serviceName` in `ApiOperation`. If `*` used as value for method,
|
|
508
|
+
* then ALL methods and permissions are allowed.
|
|
509
|
+
*/
|
|
510
|
+
method?: string;
|
|
511
|
+
/**
|
|
512
|
+
* Value for permission should be a valid Cloud IAM permission for the
|
|
513
|
+
* corresponding `serviceName` in `ApiOperation`.
|
|
514
|
+
*/
|
|
515
|
+
permission?: string;
|
|
516
|
+
}
|
|
517
|
+
interface ServicePerimeterDryRunIngressPolicyIngressFrom {
|
|
518
|
+
/**
|
|
519
|
+
* A list of identities that are allowed access through this ingress policy.
|
|
520
|
+
* Should be in the format of email address. The email address should represent
|
|
521
|
+
* individual user or service account only.
|
|
522
|
+
*/
|
|
523
|
+
identities?: string[];
|
|
524
|
+
/**
|
|
525
|
+
* Specifies the type of identities that are allowed access from outside the
|
|
526
|
+
* perimeter. If left unspecified, then members of `identities` field will be
|
|
527
|
+
* allowed access.
|
|
528
|
+
* Possible values are: `ANY_IDENTITY`, `ANY_USER_ACCOUNT`, `ANY_SERVICE_ACCOUNT`.
|
|
529
|
+
*/
|
|
530
|
+
identityType?: string;
|
|
531
|
+
/**
|
|
532
|
+
* Sources that this `IngressPolicy` authorizes access from.
|
|
533
|
+
* Structure is documented below.
|
|
534
|
+
*/
|
|
535
|
+
sources?: outputs.accesscontextmanager.ServicePerimeterDryRunIngressPolicyIngressFromSource[];
|
|
536
|
+
}
|
|
537
|
+
interface ServicePerimeterDryRunIngressPolicyIngressFromSource {
|
|
538
|
+
/**
|
|
539
|
+
* An `AccessLevel` resource name that allow resources within the
|
|
540
|
+
* `ServicePerimeters` to be accessed from the internet. `AccessLevels` listed
|
|
541
|
+
* must be in the same policy as this `ServicePerimeter`. Referencing a nonexistent
|
|
542
|
+
* `AccessLevel` will cause an error. If no `AccessLevel` names are listed,
|
|
543
|
+
* resources within the perimeter can only be accessed via Google Cloud calls
|
|
544
|
+
* with request origins within the perimeter.
|
|
545
|
+
* Example `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL.`
|
|
546
|
+
* If * is specified, then all IngressSources will be allowed.
|
|
547
|
+
*/
|
|
548
|
+
accessLevel?: string;
|
|
549
|
+
/**
|
|
550
|
+
* A Google Cloud resource that is allowed to ingress the perimeter.
|
|
551
|
+
* Requests from these resources will be allowed to access perimeter data.
|
|
552
|
+
* Currently only projects are allowed. Format `projects/{project_number}`
|
|
553
|
+
* The project may be in any Google Cloud organization, not just the
|
|
554
|
+
* organization that the perimeter is defined in. `*` is not allowed, the case
|
|
555
|
+
* of allowing all Google Cloud resources only is not supported.
|
|
556
|
+
*/
|
|
557
|
+
resource?: string;
|
|
558
|
+
}
|
|
559
|
+
interface ServicePerimeterDryRunIngressPolicyIngressTo {
|
|
560
|
+
/**
|
|
561
|
+
* A list of `ApiOperations` the sources specified in corresponding `IngressFrom`
|
|
562
|
+
* are allowed to perform in this `ServicePerimeter`.
|
|
563
|
+
* Structure is documented below.
|
|
564
|
+
*/
|
|
565
|
+
operations?: outputs.accesscontextmanager.ServicePerimeterDryRunIngressPolicyIngressToOperation[];
|
|
566
|
+
/**
|
|
567
|
+
* A list of resources, currently only projects in the form
|
|
568
|
+
* `projects/<projectnumber>`, protected by this `ServicePerimeter`
|
|
569
|
+
* that are allowed to be accessed by sources defined in the
|
|
570
|
+
* corresponding `IngressFrom`. A request matches if it contains
|
|
571
|
+
* a resource in this list. If `*` is specified for resources,
|
|
572
|
+
* then this `IngressTo` rule will authorize access to all
|
|
573
|
+
* resources inside the perimeter, provided that the request
|
|
574
|
+
* also matches the `operations` field.
|
|
575
|
+
*/
|
|
576
|
+
resources?: string[];
|
|
577
|
+
}
|
|
578
|
+
interface ServicePerimeterDryRunIngressPolicyIngressToOperation {
|
|
579
|
+
/**
|
|
580
|
+
* API methods or permissions to allow. Method or permission must belong to
|
|
581
|
+
* the service specified by serviceName field. A single `MethodSelector` entry
|
|
582
|
+
* with `*` specified for the method field will allow all methods AND
|
|
583
|
+
* permissions for the service specified in `serviceName`.
|
|
584
|
+
* Structure is documented below.
|
|
585
|
+
*/
|
|
586
|
+
methodSelectors?: outputs.accesscontextmanager.ServicePerimeterDryRunIngressPolicyIngressToOperationMethodSelector[];
|
|
587
|
+
/**
|
|
588
|
+
* The name of the API whose methods or permissions the `IngressPolicy` or
|
|
589
|
+
* `EgressPolicy` want to allow. A single `ApiOperation` with `serviceName`
|
|
590
|
+
* field set to `*` will allow all methods AND permissions for all services.
|
|
591
|
+
*/
|
|
592
|
+
serviceName?: string;
|
|
593
|
+
}
|
|
594
|
+
interface ServicePerimeterDryRunIngressPolicyIngressToOperationMethodSelector {
|
|
595
|
+
/**
|
|
596
|
+
* Value for method should be a valid method name for the corresponding
|
|
597
|
+
* serviceName in `ApiOperation`. If `*` used as value for `method`, then
|
|
598
|
+
* ALL methods and permissions are allowed.
|
|
599
|
+
*/
|
|
600
|
+
method?: string;
|
|
601
|
+
/**
|
|
602
|
+
* Value for permission should be a valid Cloud IAM permission for the
|
|
603
|
+
* corresponding `serviceName` in `ApiOperation`.
|
|
604
|
+
*/
|
|
605
|
+
permission?: string;
|
|
606
|
+
}
|
|
435
607
|
interface ServicePerimeterEgressPolicyEgressFrom {
|
|
436
608
|
/**
|
|
437
609
|
* A list of identities that are allowed access through this `EgressPolicy`.
|
|
@@ -12460,6 +12632,10 @@ export declare namespace clouddeploy {
|
|
|
12460
12632
|
* Optional. If true, `cluster` is accessed using the private IP address of the control plane endpoint. Otherwise, the default IP address of the control plane endpoint is used. The default IP address is the private IP address for clusters with private control-plane endpoints and the public IP address otherwise. Only specify this option when `cluster` is a [private GKE cluster](https://cloud.google.com/kubernetes-engine/docs/concepts/private-cluster-concept).
|
|
12461
12633
|
*/
|
|
12462
12634
|
internalIp?: boolean;
|
|
12635
|
+
/**
|
|
12636
|
+
* Optional. If set, used to configure a [proxy](https://kubernetes.io/docs/concepts/configuration/organize-cluster-access-kubeconfig/#proxy) to the Kubernetes server.
|
|
12637
|
+
*/
|
|
12638
|
+
proxyUrl?: string;
|
|
12463
12639
|
}
|
|
12464
12640
|
interface TargetIamBindingCondition {
|
|
12465
12641
|
description?: string;
|
|
@@ -15793,6 +15969,10 @@ export declare namespace cloudrunv2 {
|
|
|
15793
15969
|
* If present, indicates to use Breakglass using this justification. If useDefault is False, then it must be empty. For more information on breakglass, see https://cloud.google.com/binary-authorization/docs/using-breakglass
|
|
15794
15970
|
*/
|
|
15795
15971
|
breakglassJustification: string;
|
|
15972
|
+
/**
|
|
15973
|
+
* The path to a binary authorization policy. Format: projects/{project}/platforms/cloudRun/{policy-name}
|
|
15974
|
+
*/
|
|
15975
|
+
policy: string;
|
|
15796
15976
|
/**
|
|
15797
15977
|
* If True, indicates to use the default project's binary authorization policy. If False, binary authorization will be disabled.
|
|
15798
15978
|
*/
|
|
@@ -16189,6 +16369,10 @@ export declare namespace cloudrunv2 {
|
|
|
16189
16369
|
* If present, indicates to use Breakglass using this justification. If useDefault is False, then it must be empty. For more information on breakglass, see https://cloud.google.com/binary-authorization/docs/using-breakglass
|
|
16190
16370
|
*/
|
|
16191
16371
|
breakglassJustification: string;
|
|
16372
|
+
/**
|
|
16373
|
+
* The path to a binary authorization policy. Format: projects/{project}/platforms/cloudRun/{policy-name}
|
|
16374
|
+
*/
|
|
16375
|
+
policy: string;
|
|
16192
16376
|
/**
|
|
16193
16377
|
* If True, indicates to use the default project's binary authorization policy. If False, binary authorization will be disabled.
|
|
16194
16378
|
*/
|
|
@@ -16791,6 +16975,10 @@ export declare namespace cloudrunv2 {
|
|
|
16791
16975
|
* If present, indicates to use Breakglass using this justification. If useDefault is False, then it must be empty. For more information on breakglass, see https://cloud.google.com/binary-authorization/docs/using-breakglass
|
|
16792
16976
|
*/
|
|
16793
16977
|
breakglassJustification?: string;
|
|
16978
|
+
/**
|
|
16979
|
+
* The path to a binary authorization policy. Format: projects/{project}/platforms/cloudRun/{policy-name}
|
|
16980
|
+
*/
|
|
16981
|
+
policy?: string;
|
|
16794
16982
|
/**
|
|
16795
16983
|
* If True, indicates to use the default project's binary authorization policy. If False, binary authorization will be disabled.
|
|
16796
16984
|
*/
|
|
@@ -17229,6 +17417,10 @@ export declare namespace cloudrunv2 {
|
|
|
17229
17417
|
* If present, indicates to use Breakglass using this justification. If useDefault is False, then it must be empty. For more information on breakglass, see https://cloud.google.com/binary-authorization/docs/using-breakglass
|
|
17230
17418
|
*/
|
|
17231
17419
|
breakglassJustification?: string;
|
|
17420
|
+
/**
|
|
17421
|
+
* The path to a binary authorization policy. Format: projects/{project}/platforms/cloudRun/{policy-name}
|
|
17422
|
+
*/
|
|
17423
|
+
policy?: string;
|
|
17232
17424
|
/**
|
|
17233
17425
|
* If True, indicates to use the default project's binary authorization policy. If False, binary authorization will be disabled.
|
|
17234
17426
|
*/
|
|
@@ -36367,6 +36559,12 @@ export declare namespace container {
|
|
|
36367
36559
|
* Structure is documented below.
|
|
36368
36560
|
*/
|
|
36369
36561
|
autoProvisioningDefaults: outputs.container.ClusterClusterAutoscalingAutoProvisioningDefaults;
|
|
36562
|
+
/**
|
|
36563
|
+
* The list of Google Compute Engine
|
|
36564
|
+
* [zones](https://cloud.google.com/compute/docs/zones#available) in which the
|
|
36565
|
+
* NodePool's nodes can be created by NAP.
|
|
36566
|
+
*/
|
|
36567
|
+
autoProvisioningLocations: string[];
|
|
36370
36568
|
/**
|
|
36371
36569
|
* Configuration
|
|
36372
36570
|
* options for the [Autoscaling profile](https://cloud.google.com/kubernetes-engine/docs/concepts/cluster-autoscaler#autoscaling_profiles)
|
|
@@ -38633,6 +38831,10 @@ export declare namespace container {
|
|
|
38633
38831
|
* Contains defaults for a node pool created by NAP.
|
|
38634
38832
|
*/
|
|
38635
38833
|
autoProvisioningDefaults: outputs.container.GetClusterClusterAutoscalingAutoProvisioningDefault[];
|
|
38834
|
+
/**
|
|
38835
|
+
* The list of Google Compute Engine zones in which the NodePool's nodes can be created by NAP.
|
|
38836
|
+
*/
|
|
38837
|
+
autoProvisioningLocations: string[];
|
|
38636
38838
|
/**
|
|
38637
38839
|
* Configuration options for the Autoscaling profile feature, which lets you choose whether the cluster autoscaler should optimize for resource utilization or resource availability when deciding to remove nodes from a cluster. Can be BALANCED or OPTIMIZE_UTILIZATION. Defaults to BALANCED.
|
|
38638
38840
|
*/
|
|
@@ -57652,6 +57854,11 @@ export declare namespace gkehub {
|
|
|
57652
57854
|
* Structure is documented below.
|
|
57653
57855
|
*/
|
|
57654
57856
|
configSync?: outputs.gkehub.FeatureFleetDefaultMemberConfigConfigmanagementConfigSync;
|
|
57857
|
+
/**
|
|
57858
|
+
* Set this field to MANAGEMENT_AUTOMATIC to enable Config Sync auto-upgrades, and set this field to MANAGEMENT_MANUAL or MANAGEMENT_UNSPECIFIED to disable Config Sync auto-upgrades.
|
|
57859
|
+
* Possible values are: `MANAGEMENT_UNSPECIFIED`, `MANAGEMENT_AUTOMATIC`, `MANAGEMENT_MANUAL`.
|
|
57860
|
+
*/
|
|
57861
|
+
management?: string;
|
|
57655
57862
|
/**
|
|
57656
57863
|
* Version of ACM installed
|
|
57657
57864
|
*/
|
|
@@ -57944,6 +58151,10 @@ export declare namespace gkehub {
|
|
|
57944
58151
|
* Hierarchy Controller configuration for the cluster. Structure is documented below.
|
|
57945
58152
|
*/
|
|
57946
58153
|
hierarchyController?: outputs.gkehub.FeatureMembershipConfigmanagementHierarchyController;
|
|
58154
|
+
/**
|
|
58155
|
+
* Set this field to MANAGEMENT_AUTOMATIC to enable Config Sync auto-upgrades, and set this field to MANAGEMENT_MANUAL or MANAGEMENT_UNSPECIFIED to disable Config Sync auto-upgrades.
|
|
58156
|
+
*/
|
|
58157
|
+
management: string;
|
|
57947
58158
|
/**
|
|
57948
58159
|
* Policy Controller configuration for the cluster. Structure is documented below.
|
|
57949
58160
|
*/
|
|
@@ -57960,6 +58171,10 @@ export declare namespace gkehub {
|
|
|
57960
58171
|
enabled?: boolean;
|
|
57961
58172
|
}
|
|
57962
58173
|
interface FeatureMembershipConfigmanagementConfigSync {
|
|
58174
|
+
/**
|
|
58175
|
+
* Enables the installation of ConfigSync. If set to true, ConfigSync resources will be created and the other ConfigSync fields will be applied if exist. If set to false, all other ConfigSync fields will be ignored, ConfigSync resources will be deleted. If omitted, ConfigSync resources will be managed depends on the presence of the git or oci field.
|
|
58176
|
+
*/
|
|
58177
|
+
enabled?: boolean;
|
|
57963
58178
|
/**
|
|
57964
58179
|
* (Optional) Structure is documented below.
|
|
57965
58180
|
*/
|
|
@@ -65435,12 +65650,12 @@ export declare namespace netapp {
|
|
|
65435
65650
|
lastTransferError: string;
|
|
65436
65651
|
/**
|
|
65437
65652
|
* (Output)
|
|
65438
|
-
*
|
|
65653
|
+
* Cumulative time taken across all transfers for the replication relationship.
|
|
65439
65654
|
*/
|
|
65440
65655
|
totalTransferDuration: string;
|
|
65441
65656
|
/**
|
|
65442
65657
|
* (Output)
|
|
65443
|
-
*
|
|
65658
|
+
* Cumulative bytes transferred so far for the replication relationship.
|
|
65444
65659
|
*/
|
|
65445
65660
|
transferBytes: string;
|
|
65446
65661
|
/**
|
|
@@ -72826,6 +73041,42 @@ export declare namespace securitycenter {
|
|
|
72826
73041
|
*/
|
|
72827
73042
|
filter: string;
|
|
72828
73043
|
}
|
|
73044
|
+
interface V2OrganizationSourceIamBindingCondition {
|
|
73045
|
+
description?: string;
|
|
73046
|
+
expression: string;
|
|
73047
|
+
title: string;
|
|
73048
|
+
}
|
|
73049
|
+
interface V2OrganizationSourceIamMemberCondition {
|
|
73050
|
+
description?: string;
|
|
73051
|
+
expression: string;
|
|
73052
|
+
title: string;
|
|
73053
|
+
}
|
|
73054
|
+
interface V2ProjectNotificationConfigStreamingConfig {
|
|
73055
|
+
/**
|
|
73056
|
+
* Expression that defines the filter to apply across create/update
|
|
73057
|
+
* events of assets or findings as specified by the event type. The
|
|
73058
|
+
* expression is a list of zero or more restrictions combined via
|
|
73059
|
+
* logical operators AND and OR. Parentheses are supported, and OR
|
|
73060
|
+
* has higher precedence than AND.
|
|
73061
|
+
* Restrictions have the form <field> <operator> <value> and may have
|
|
73062
|
+
* a - character in front of them to indicate negation. The fields
|
|
73063
|
+
* map to those defined in the corresponding resource.
|
|
73064
|
+
* The supported operators are:
|
|
73065
|
+
* * = for all value types.
|
|
73066
|
+
* * >, <, >=, <= for integer values.
|
|
73067
|
+
* * :, meaning substring matching, for strings.
|
|
73068
|
+
* The supported value types are:
|
|
73069
|
+
* * string literals in quotes.
|
|
73070
|
+
* * integer literals without quotes.
|
|
73071
|
+
* * boolean literals true and false without quotes.
|
|
73072
|
+
* See
|
|
73073
|
+
* [Filtering notifications](https://cloud.google.com/security-command-center/docs/how-to-api-filter-notifications)
|
|
73074
|
+
* for information on how to write a filter.
|
|
73075
|
+
*
|
|
73076
|
+
* - - -
|
|
73077
|
+
*/
|
|
73078
|
+
filter: string;
|
|
73079
|
+
}
|
|
72829
73080
|
}
|
|
72830
73081
|
export declare namespace securityposture {
|
|
72831
73082
|
interface PosturePolicySet {
|
|
@@ -73629,7 +73880,7 @@ export declare namespace sql {
|
|
|
73629
73880
|
*/
|
|
73630
73881
|
collation?: string;
|
|
73631
73882
|
/**
|
|
73632
|
-
*
|
|
73883
|
+
* Enables the enforcement of Cloud SQL Auth Proxy or Cloud SQL connectors for all the connections. If enabled, all the direct connections are rejected.
|
|
73633
73884
|
*/
|
|
73634
73885
|
connectorEnforcement: string;
|
|
73635
73886
|
/**
|
|
@@ -74108,7 +74359,7 @@ export declare namespace sql {
|
|
|
74108
74359
|
*/
|
|
74109
74360
|
collation: string;
|
|
74110
74361
|
/**
|
|
74111
|
-
*
|
|
74362
|
+
* Enables the enforcement of Cloud SQL Auth Proxy or Cloud SQL connectors for all the connections. If enabled, all the direct connections are rejected.
|
|
74112
74363
|
*/
|
|
74113
74364
|
connectorEnforcement: string;
|
|
74114
74365
|
/**
|
|
@@ -74608,7 +74859,7 @@ export declare namespace sql {
|
|
|
74608
74859
|
*/
|
|
74609
74860
|
collation: string;
|
|
74610
74861
|
/**
|
|
74611
|
-
*
|
|
74862
|
+
* Enables the enforcement of Cloud SQL Auth Proxy or Cloud SQL connectors for all the connections. If enabled, all the direct connections are rejected.
|
|
74612
74863
|
*/
|
|
74613
74864
|
connectorEnforcement: string;
|
|
74614
74865
|
/**
|
|
@@ -17,7 +17,7 @@ import * as outputs from "../types/output";
|
|
|
17
17
|
* import * as gcp from "@pulumi/gcp";
|
|
18
18
|
*
|
|
19
19
|
* const network_policy_nw = new gcp.vmwareengine.Network("network-policy-nw", {
|
|
20
|
-
* name: "
|
|
20
|
+
* name: "sample-network",
|
|
21
21
|
* location: "global",
|
|
22
22
|
* type: "STANDARD",
|
|
23
23
|
* description: "VMwareEngine standard network sample",
|
|
@@ -36,14 +36,14 @@ import * as outputs from "../types/output";
|
|
|
36
36
|
* import * as gcp from "@pulumi/gcp";
|
|
37
37
|
*
|
|
38
38
|
* const network_policy_nw = new gcp.vmwareengine.Network("network-policy-nw", {
|
|
39
|
-
* name: "
|
|
39
|
+
* name: "sample-network",
|
|
40
40
|
* location: "global",
|
|
41
41
|
* type: "STANDARD",
|
|
42
42
|
* description: "VMwareEngine standard network sample",
|
|
43
43
|
* });
|
|
44
44
|
* const vmw_engine_network_policy = new gcp.vmwareengine.NetworkPolicy("vmw-engine-network-policy", {
|
|
45
45
|
* location: "us-west1",
|
|
46
|
-
* name: "sample-network-policy
|
|
46
|
+
* name: "sample-network-policy",
|
|
47
47
|
* edgeServicesCidr: "192.168.30.0/26",
|
|
48
48
|
* vmwareEngineNetwork: network_policy_nw.id,
|
|
49
49
|
* description: "Sample Network Policy",
|
|
@@ -21,7 +21,7 @@ const utilities = require("../utilities");
|
|
|
21
21
|
* import * as gcp from "@pulumi/gcp";
|
|
22
22
|
*
|
|
23
23
|
* const network_policy_nw = new gcp.vmwareengine.Network("network-policy-nw", {
|
|
24
|
-
* name: "
|
|
24
|
+
* name: "sample-network",
|
|
25
25
|
* location: "global",
|
|
26
26
|
* type: "STANDARD",
|
|
27
27
|
* description: "VMwareEngine standard network sample",
|
|
@@ -40,14 +40,14 @@ const utilities = require("../utilities");
|
|
|
40
40
|
* import * as gcp from "@pulumi/gcp";
|
|
41
41
|
*
|
|
42
42
|
* const network_policy_nw = new gcp.vmwareengine.Network("network-policy-nw", {
|
|
43
|
-
* name: "
|
|
43
|
+
* name: "sample-network",
|
|
44
44
|
* location: "global",
|
|
45
45
|
* type: "STANDARD",
|
|
46
46
|
* description: "VMwareEngine standard network sample",
|
|
47
47
|
* });
|
|
48
48
|
* const vmw_engine_network_policy = new gcp.vmwareengine.NetworkPolicy("vmw-engine-network-policy", {
|
|
49
49
|
* location: "us-west1",
|
|
50
|
-
* name: "sample-network-policy
|
|
50
|
+
* name: "sample-network-policy",
|
|
51
51
|
* edgeServicesCidr: "192.168.30.0/26",
|
|
52
52
|
* vmwareEngineNetwork: network_policy_nw.id,
|
|
53
53
|
* description: "Sample Network Policy",
|