@pulumi/gcp 8.36.0 → 8.37.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/apihub/index.d.ts +3 -0
- package/apihub/index.js +6 -1
- package/apihub/index.js.map +1 -1
- package/apihub/plugin.d.ts +403 -0
- package/apihub/plugin.js +195 -0
- package/apihub/plugin.js.map +1 -0
- package/bigqueryanalyticshub/dataExchange.d.ts +3 -3
- package/bigqueryanalyticshub/listing.d.ts +3 -3
- package/cloudidentity/groupMembership.d.ts +12 -0
- package/cloudidentity/groupMembership.js +2 -0
- package/cloudidentity/groupMembership.js.map +1 -1
- package/cloudrunv2/job.d.ts +23 -0
- package/cloudrunv2/job.js +23 -0
- package/cloudrunv2/job.js.map +1 -1
- package/cloudrunv2/service.d.ts +0 -1
- package/cloudrunv2/service.js +0 -1
- package/cloudrunv2/service.js.map +1 -1
- package/cloudrunv2/workerPool.d.ts +9 -10
- package/cloudrunv2/workerPool.js +9 -10
- package/cloudrunv2/workerPool.js.map +1 -1
- package/compute/disk.d.ts +15 -12
- package/compute/disk.js.map +1 -1
- package/compute/firewallPolicyRule.d.ts +97 -0
- package/compute/firewallPolicyRule.js +75 -0
- package/compute/firewallPolicyRule.js.map +1 -1
- package/compute/getInstanceGroupManager.d.ts +1 -0
- package/compute/getInstanceGroupManager.js.map +1 -1
- package/compute/getRegionDisk.d.ts +1 -0
- package/compute/getRegionDisk.js.map +1 -1
- package/compute/index.d.ts +3 -0
- package/compute/index.js +6 -1
- package/compute/index.js.map +1 -1
- package/compute/instanceGroupManager.d.ts +75 -6
- package/compute/instanceGroupManager.js +59 -0
- package/compute/instanceGroupManager.js.map +1 -1
- package/compute/network.d.ts +17 -0
- package/compute/network.js +2 -0
- package/compute/network.js.map +1 -1
- package/compute/networkFirewallPolicy.d.ts +21 -0
- package/compute/networkFirewallPolicy.js +2 -0
- package/compute/networkFirewallPolicy.js.map +1 -1
- package/compute/networkFirewallPolicyWithRules.d.ts +18 -0
- package/compute/networkFirewallPolicyWithRules.js +2 -0
- package/compute/networkFirewallPolicyWithRules.js.map +1 -1
- package/compute/regionDisk.d.ts +44 -0
- package/compute/regionDisk.js +19 -0
- package/compute/regionDisk.js.map +1 -1
- package/compute/regionNetworkFirewallPolicy.d.ts +33 -0
- package/compute/regionNetworkFirewallPolicy.js +14 -0
- package/compute/regionNetworkFirewallPolicy.js.map +1 -1
- package/compute/regionNetworkFirewallPolicyWithRules.d.ts +43 -0
- package/compute/regionNetworkFirewallPolicyWithRules.js +27 -0
- package/compute/regionNetworkFirewallPolicyWithRules.js.map +1 -1
- package/compute/wireGroup.d.ts +250 -0
- package/compute/wireGroup.js +127 -0
- package/compute/wireGroup.js.map +1 -0
- package/container/cluster.d.ts +15 -0
- package/container/cluster.js +2 -0
- package/container/cluster.js.map +1 -1
- package/container/getCluster.d.ts +1 -0
- package/container/getCluster.js.map +1 -1
- package/container/nodePool.d.ts +6 -0
- package/container/nodePool.js.map +1 -1
- package/diagflow/cxGenerativeSettings.d.ts +222 -0
- package/diagflow/cxGenerativeSettings.js +139 -0
- package/diagflow/cxGenerativeSettings.js.map +1 -0
- package/diagflow/index.d.ts +3 -0
- package/diagflow/index.js +6 -1
- package/diagflow/index.js.map +1 -1
- package/dns/recordSet.d.ts +1 -0
- package/dns/recordSet.js +1 -0
- package/dns/recordSet.js.map +1 -1
- package/firestore/database.d.ts +0 -9
- package/firestore/database.js.map +1 -1
- package/iam/workloadIdentityPoolManagedIdentity.d.ts +31 -0
- package/iam/workloadIdentityPoolManagedIdentity.js +10 -0
- package/iam/workloadIdentityPoolManagedIdentity.js.map +1 -1
- package/kms/autokeyConfig.d.ts +8 -0
- package/kms/autokeyConfig.js +2 -0
- package/kms/autokeyConfig.js.map +1 -1
- package/kms/getAutokeyConfig.d.ts +1 -0
- package/kms/getAutokeyConfig.js.map +1 -1
- package/memorystore/getInstance.d.ts +1 -0
- package/memorystore/getInstance.js.map +1 -1
- package/memorystore/instance.d.ts +13 -0
- package/memorystore/instance.js +3 -0
- package/memorystore/instance.js.map +1 -1
- package/monitoring/metricDescriptor.d.ts +13 -13
- package/monitoring/metricDescriptor.js +0 -6
- package/monitoring/metricDescriptor.js.map +1 -1
- package/notebooks/instance.d.ts +4 -4
- package/notebooks/instance.js +4 -4
- package/package.json +2 -2
- package/redis/getInstance.d.ts +1 -0
- package/redis/getInstance.js.map +1 -1
- package/redis/instance.d.ts +16 -0
- package/redis/instance.js +2 -0
- package/redis/instance.js.map +1 -1
- package/secretmanager/getRegionalSecret.d.ts +1 -0
- package/secretmanager/getRegionalSecret.js.map +1 -1
- package/secretmanager/regionalSecret.d.ts +4 -0
- package/secretmanager/regionalSecret.js +3 -0
- package/secretmanager/regionalSecret.js.map +1 -1
- package/types/input.d.ts +439 -9
- package/types/output.d.ts +488 -10
- package/workbench/instance.d.ts +1 -0
- package/workbench/instance.js +1 -0
- package/workbench/instance.js.map +1 -1
|
@@ -63,6 +63,20 @@ import * as outputs from "../types/output";
|
|
|
63
63
|
* ],
|
|
64
64
|
* },
|
|
65
65
|
* });
|
|
66
|
+
* const basicKey = new gcp.tags.TagKey("basic_key", {
|
|
67
|
+
* description: "For keyname resources.",
|
|
68
|
+
* parent: "organizations/123456789",
|
|
69
|
+
* purpose: "GCE_FIREWALL",
|
|
70
|
+
* shortName: "tag-key",
|
|
71
|
+
* purposeData: {
|
|
72
|
+
* organization: "auto",
|
|
73
|
+
* },
|
|
74
|
+
* });
|
|
75
|
+
* const basicValue = new gcp.tags.TagValue("basic_value", {
|
|
76
|
+
* description: "For valuename resources.",
|
|
77
|
+
* parent: basicKey.id,
|
|
78
|
+
* shortName: "tag-value",
|
|
79
|
+
* });
|
|
66
80
|
* ```
|
|
67
81
|
* ### Firewall Policy Rule Network Scope
|
|
68
82
|
*
|
|
@@ -108,6 +122,65 @@ import * as outputs from "../types/output";
|
|
|
108
122
|
* },
|
|
109
123
|
* });
|
|
110
124
|
* ```
|
|
125
|
+
* ### Firewall Policy Rule Secure Tags
|
|
126
|
+
*
|
|
127
|
+
* ```typescript
|
|
128
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
129
|
+
* import * as gcp from "@pulumi/gcp";
|
|
130
|
+
*
|
|
131
|
+
* const folder = new gcp.organizations.Folder("folder", {
|
|
132
|
+
* displayName: "folder",
|
|
133
|
+
* parent: "organizations/123456789",
|
|
134
|
+
* deletionProtection: false,
|
|
135
|
+
* });
|
|
136
|
+
* const _default = new gcp.compute.FirewallPolicy("default", {
|
|
137
|
+
* parent: folder.id,
|
|
138
|
+
* shortName: "fw-policy",
|
|
139
|
+
* description: "Resource created for Terraform acceptance testing",
|
|
140
|
+
* });
|
|
141
|
+
* const basicKey = new gcp.tags.TagKey("basic_key", {
|
|
142
|
+
* description: "For keyname resources.",
|
|
143
|
+
* parent: "organizations/123456789",
|
|
144
|
+
* purpose: "GCE_FIREWALL",
|
|
145
|
+
* shortName: "tag-key",
|
|
146
|
+
* purposeData: {
|
|
147
|
+
* organization: "auto",
|
|
148
|
+
* },
|
|
149
|
+
* });
|
|
150
|
+
* const basicValue = new gcp.tags.TagValue("basic_value", {
|
|
151
|
+
* description: "For valuename resources.",
|
|
152
|
+
* parent: basicKey.id,
|
|
153
|
+
* shortName: "tag-value",
|
|
154
|
+
* });
|
|
155
|
+
* const primary = new gcp.compute.FirewallPolicyRule("primary", {
|
|
156
|
+
* firewallPolicy: _default.name,
|
|
157
|
+
* description: "Resource created for Terraform acceptance testing",
|
|
158
|
+
* priority: 9000,
|
|
159
|
+
* enableLogging: true,
|
|
160
|
+
* action: "allow",
|
|
161
|
+
* direction: "INGRESS",
|
|
162
|
+
* disabled: false,
|
|
163
|
+
* targetSecureTags: [{
|
|
164
|
+
* name: basicValue.id,
|
|
165
|
+
* }],
|
|
166
|
+
* match: {
|
|
167
|
+
* srcIpRanges: ["11.100.0.1/32"],
|
|
168
|
+
* srcSecureTags: [{
|
|
169
|
+
* name: basicValue.id,
|
|
170
|
+
* }],
|
|
171
|
+
* layer4Configs: [
|
|
172
|
+
* {
|
|
173
|
+
* ipProtocol: "tcp",
|
|
174
|
+
* ports: ["8080"],
|
|
175
|
+
* },
|
|
176
|
+
* {
|
|
177
|
+
* ipProtocol: "udp",
|
|
178
|
+
* ports: ["22"],
|
|
179
|
+
* },
|
|
180
|
+
* ],
|
|
181
|
+
* },
|
|
182
|
+
* });
|
|
183
|
+
* ```
|
|
111
184
|
*
|
|
112
185
|
* ## Import
|
|
113
186
|
*
|
|
@@ -205,6 +278,14 @@ export declare class FirewallPolicyRule extends pulumi.CustomResource {
|
|
|
205
278
|
* this rule. If this field is left blank, all VMs within the organization will receive the rule.
|
|
206
279
|
*/
|
|
207
280
|
readonly targetResources: pulumi.Output<string[] | undefined>;
|
|
281
|
+
/**
|
|
282
|
+
* A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are specified, then
|
|
283
|
+
* the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure tags, if all the
|
|
284
|
+
* targetSecureTag are in INEFFECTIVE state, then this rule will be ignored. targetSecureTag may not be set at the same
|
|
285
|
+
* time as targetServiceAccounts. If neither targetServiceAccounts nor targetSecureTag are specified, the firewall rule
|
|
286
|
+
* applies to all instances on the specified network. Maximum number of target secure tags allowed is 256.
|
|
287
|
+
*/
|
|
288
|
+
readonly targetSecureTags: pulumi.Output<outputs.compute.FirewallPolicyRuleTargetSecureTag[] | undefined>;
|
|
208
289
|
/**
|
|
209
290
|
* A list of service accounts indicating the sets of instances that are applied with this rule.
|
|
210
291
|
*/
|
|
@@ -289,6 +370,14 @@ export interface FirewallPolicyRuleState {
|
|
|
289
370
|
* this rule. If this field is left blank, all VMs within the organization will receive the rule.
|
|
290
371
|
*/
|
|
291
372
|
targetResources?: pulumi.Input<pulumi.Input<string>[]>;
|
|
373
|
+
/**
|
|
374
|
+
* A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are specified, then
|
|
375
|
+
* the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure tags, if all the
|
|
376
|
+
* targetSecureTag are in INEFFECTIVE state, then this rule will be ignored. targetSecureTag may not be set at the same
|
|
377
|
+
* time as targetServiceAccounts. If neither targetServiceAccounts nor targetSecureTag are specified, the firewall rule
|
|
378
|
+
* applies to all instances on the specified network. Maximum number of target secure tags allowed is 256.
|
|
379
|
+
*/
|
|
380
|
+
targetSecureTags?: pulumi.Input<pulumi.Input<inputs.compute.FirewallPolicyRuleTargetSecureTag>[]>;
|
|
292
381
|
/**
|
|
293
382
|
* A list of service accounts indicating the sets of instances that are applied with this rule.
|
|
294
383
|
*/
|
|
@@ -353,6 +442,14 @@ export interface FirewallPolicyRuleArgs {
|
|
|
353
442
|
* this rule. If this field is left blank, all VMs within the organization will receive the rule.
|
|
354
443
|
*/
|
|
355
444
|
targetResources?: pulumi.Input<pulumi.Input<string>[]>;
|
|
445
|
+
/**
|
|
446
|
+
* A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are specified, then
|
|
447
|
+
* the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure tags, if all the
|
|
448
|
+
* targetSecureTag are in INEFFECTIVE state, then this rule will be ignored. targetSecureTag may not be set at the same
|
|
449
|
+
* time as targetServiceAccounts. If neither targetServiceAccounts nor targetSecureTag are specified, the firewall rule
|
|
450
|
+
* applies to all instances on the specified network. Maximum number of target secure tags allowed is 256.
|
|
451
|
+
*/
|
|
452
|
+
targetSecureTags?: pulumi.Input<pulumi.Input<inputs.compute.FirewallPolicyRuleTargetSecureTag>[]>;
|
|
356
453
|
/**
|
|
357
454
|
* A list of service accounts indicating the sets of instances that are applied with this rule.
|
|
358
455
|
*/
|
|
@@ -67,6 +67,20 @@ const utilities = require("../utilities");
|
|
|
67
67
|
* ],
|
|
68
68
|
* },
|
|
69
69
|
* });
|
|
70
|
+
* const basicKey = new gcp.tags.TagKey("basic_key", {
|
|
71
|
+
* description: "For keyname resources.",
|
|
72
|
+
* parent: "organizations/123456789",
|
|
73
|
+
* purpose: "GCE_FIREWALL",
|
|
74
|
+
* shortName: "tag-key",
|
|
75
|
+
* purposeData: {
|
|
76
|
+
* organization: "auto",
|
|
77
|
+
* },
|
|
78
|
+
* });
|
|
79
|
+
* const basicValue = new gcp.tags.TagValue("basic_value", {
|
|
80
|
+
* description: "For valuename resources.",
|
|
81
|
+
* parent: basicKey.id,
|
|
82
|
+
* shortName: "tag-value",
|
|
83
|
+
* });
|
|
70
84
|
* ```
|
|
71
85
|
* ### Firewall Policy Rule Network Scope
|
|
72
86
|
*
|
|
@@ -112,6 +126,65 @@ const utilities = require("../utilities");
|
|
|
112
126
|
* },
|
|
113
127
|
* });
|
|
114
128
|
* ```
|
|
129
|
+
* ### Firewall Policy Rule Secure Tags
|
|
130
|
+
*
|
|
131
|
+
* ```typescript
|
|
132
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
133
|
+
* import * as gcp from "@pulumi/gcp";
|
|
134
|
+
*
|
|
135
|
+
* const folder = new gcp.organizations.Folder("folder", {
|
|
136
|
+
* displayName: "folder",
|
|
137
|
+
* parent: "organizations/123456789",
|
|
138
|
+
* deletionProtection: false,
|
|
139
|
+
* });
|
|
140
|
+
* const _default = new gcp.compute.FirewallPolicy("default", {
|
|
141
|
+
* parent: folder.id,
|
|
142
|
+
* shortName: "fw-policy",
|
|
143
|
+
* description: "Resource created for Terraform acceptance testing",
|
|
144
|
+
* });
|
|
145
|
+
* const basicKey = new gcp.tags.TagKey("basic_key", {
|
|
146
|
+
* description: "For keyname resources.",
|
|
147
|
+
* parent: "organizations/123456789",
|
|
148
|
+
* purpose: "GCE_FIREWALL",
|
|
149
|
+
* shortName: "tag-key",
|
|
150
|
+
* purposeData: {
|
|
151
|
+
* organization: "auto",
|
|
152
|
+
* },
|
|
153
|
+
* });
|
|
154
|
+
* const basicValue = new gcp.tags.TagValue("basic_value", {
|
|
155
|
+
* description: "For valuename resources.",
|
|
156
|
+
* parent: basicKey.id,
|
|
157
|
+
* shortName: "tag-value",
|
|
158
|
+
* });
|
|
159
|
+
* const primary = new gcp.compute.FirewallPolicyRule("primary", {
|
|
160
|
+
* firewallPolicy: _default.name,
|
|
161
|
+
* description: "Resource created for Terraform acceptance testing",
|
|
162
|
+
* priority: 9000,
|
|
163
|
+
* enableLogging: true,
|
|
164
|
+
* action: "allow",
|
|
165
|
+
* direction: "INGRESS",
|
|
166
|
+
* disabled: false,
|
|
167
|
+
* targetSecureTags: [{
|
|
168
|
+
* name: basicValue.id,
|
|
169
|
+
* }],
|
|
170
|
+
* match: {
|
|
171
|
+
* srcIpRanges: ["11.100.0.1/32"],
|
|
172
|
+
* srcSecureTags: [{
|
|
173
|
+
* name: basicValue.id,
|
|
174
|
+
* }],
|
|
175
|
+
* layer4Configs: [
|
|
176
|
+
* {
|
|
177
|
+
* ipProtocol: "tcp",
|
|
178
|
+
* ports: ["8080"],
|
|
179
|
+
* },
|
|
180
|
+
* {
|
|
181
|
+
* ipProtocol: "udp",
|
|
182
|
+
* ports: ["22"],
|
|
183
|
+
* },
|
|
184
|
+
* ],
|
|
185
|
+
* },
|
|
186
|
+
* });
|
|
187
|
+
* ```
|
|
115
188
|
*
|
|
116
189
|
* ## Import
|
|
117
190
|
*
|
|
@@ -172,6 +245,7 @@ class FirewallPolicyRule extends pulumi.CustomResource {
|
|
|
172
245
|
resourceInputs["ruleTupleCount"] = state ? state.ruleTupleCount : undefined;
|
|
173
246
|
resourceInputs["securityProfileGroup"] = state ? state.securityProfileGroup : undefined;
|
|
174
247
|
resourceInputs["targetResources"] = state ? state.targetResources : undefined;
|
|
248
|
+
resourceInputs["targetSecureTags"] = state ? state.targetSecureTags : undefined;
|
|
175
249
|
resourceInputs["targetServiceAccounts"] = state ? state.targetServiceAccounts : undefined;
|
|
176
250
|
resourceInputs["tlsInspect"] = state ? state.tlsInspect : undefined;
|
|
177
251
|
}
|
|
@@ -202,6 +276,7 @@ class FirewallPolicyRule extends pulumi.CustomResource {
|
|
|
202
276
|
resourceInputs["priority"] = args ? args.priority : undefined;
|
|
203
277
|
resourceInputs["securityProfileGroup"] = args ? args.securityProfileGroup : undefined;
|
|
204
278
|
resourceInputs["targetResources"] = args ? args.targetResources : undefined;
|
|
279
|
+
resourceInputs["targetSecureTags"] = args ? args.targetSecureTags : undefined;
|
|
205
280
|
resourceInputs["targetServiceAccounts"] = args ? args.targetServiceAccounts : undefined;
|
|
206
281
|
resourceInputs["tlsInspect"] = args ? args.tlsInspect : undefined;
|
|
207
282
|
resourceInputs["creationTimestamp"] = undefined /*out*/;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"firewallPolicyRule.js","sourceRoot":"","sources":["../../compute/firewallPolicyRule.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"firewallPolicyRule.js","sourceRoot":"","sources":["../../compute/firewallPolicyRule.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAsMG;AACH,MAAa,kBAAmB,SAAQ,MAAM,CAAC,cAAc;IACzD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA+B,EAAE,IAAmC;QAC7H,OAAO,IAAI,kBAAkB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACzE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,kBAAkB,CAAC,YAAY,CAAC;IACnE,CAAC;IA0FD,YAAY,IAAY,EAAE,WAA8D,EAAE,IAAmC;QACzH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAkD,CAAC;YACjE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;SACvE;aAAM;YACH,MAAM,IAAI,GAAG,WAAiD,CAAC;YAC/D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,cAAc,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC3D,MAAM,IAAI,KAAK,CAAC,4CAA4C,CAAC,CAAC;aACjE;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,mBAAmB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACxD,cAAc,CAAC,MAAM,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC3C,cAAc,CAAC,gBAAgB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACxD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,kBAAkB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACvE,CAAC;;AA7KL,gDA8KC;AAhKG,gBAAgB;AACO,+BAAY,GAAG,mDAAmD,CAAC"}
|
|
@@ -65,6 +65,7 @@ export interface GetInstanceGroupManagerResult {
|
|
|
65
65
|
readonly operation: string;
|
|
66
66
|
readonly params: outputs.compute.GetInstanceGroupManagerParam[];
|
|
67
67
|
readonly project?: string;
|
|
68
|
+
readonly resourcePolicies: outputs.compute.GetInstanceGroupManagerResourcePolicy[];
|
|
68
69
|
readonly selfLink?: string;
|
|
69
70
|
readonly standbyPolicies: outputs.compute.GetInstanceGroupManagerStandbyPolicy[];
|
|
70
71
|
readonly statefulDisks: outputs.compute.GetInstanceGroupManagerStatefulDisk[];
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getInstanceGroupManager.js","sourceRoot":"","sources":["../../compute/getInstanceGroupManager.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;GAmBG;AACH,SAAgB,uBAAuB,CAAC,IAAkC,EAAE,IAA2B;IACnG,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAClB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,6DAA6D,EAAE;QACxF,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AATD,0DASC;
|
|
1
|
+
{"version":3,"file":"getInstanceGroupManager.js","sourceRoot":"","sources":["../../compute/getInstanceGroupManager.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;GAmBG;AACH,SAAgB,uBAAuB,CAAC,IAAkC,EAAE,IAA2B;IACnG,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAClB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,6DAA6D,EAAE;QACxF,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AATD,0DASC;AAgED;;;;;;;;;;;;;;;;;;;GAmBG;AACH,SAAgB,6BAA6B,CAAC,IAAwC,EAAE,IAAiC;IACrH,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAClB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,6DAA6D,EAAE;QAC9F,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AATD,sEASC"}
|
|
@@ -30,6 +30,7 @@ export interface GetRegionDiskArgs {
|
|
|
30
30
|
* A collection of values returned by getRegionDisk.
|
|
31
31
|
*/
|
|
32
32
|
export interface GetRegionDiskResult {
|
|
33
|
+
readonly accessMode: string;
|
|
33
34
|
readonly asyncPrimaryDisks: outputs.compute.GetRegionDiskAsyncPrimaryDisk[];
|
|
34
35
|
readonly createSnapshotBeforeDestroy: boolean;
|
|
35
36
|
readonly createSnapshotBeforeDestroyPrefix: string;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getRegionDisk.js","sourceRoot":"","sources":["../../compute/getRegionDisk.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;GAIG;AACH,SAAgB,aAAa,CAAC,IAAuB,EAAE,IAA2B;IAC9E,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,yCAAyC,EAAE;QACpE,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,QAAQ,EAAE,IAAI,CAAC,MAAM;KACxB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAPD,sCAOC;
|
|
1
|
+
{"version":3,"file":"getRegionDisk.js","sourceRoot":"","sources":["../../compute/getRegionDisk.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;GAIG;AACH,SAAgB,aAAa,CAAC,IAAuB,EAAE,IAA2B;IAC9E,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,yCAAyC,EAAE;QACpE,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,QAAQ,EAAE,IAAI,CAAC,MAAM;KACxB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAPD,sCAOC;AA+DD;;;;GAIG;AACH,SAAgB,mBAAmB,CAAC,IAA6B,EAAE,IAAiC;IAChG,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,yCAAyC,EAAE;QAC1E,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,QAAQ,EAAE,IAAI,CAAC,MAAM;KACxB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAPD,kDAOC"}
|
package/compute/index.d.ts
CHANGED
|
@@ -697,3 +697,6 @@ export declare const VPNGateway: typeof import("./vpngateway").VPNGateway;
|
|
|
697
697
|
export { VPNTunnelArgs, VPNTunnelState } from "./vpntunnel";
|
|
698
698
|
export type VPNTunnel = import("./vpntunnel").VPNTunnel;
|
|
699
699
|
export declare const VPNTunnel: typeof import("./vpntunnel").VPNTunnel;
|
|
700
|
+
export { WireGroupArgs, WireGroupState } from "./wireGroup";
|
|
701
|
+
export type WireGroup = import("./wireGroup").WireGroup;
|
|
702
|
+
export declare const WireGroup: typeof import("./wireGroup").WireGroup;
|
package/compute/index.js
CHANGED
|
@@ -7,7 +7,7 @@ exports.getNetworks = exports.getNetworkPeeringOutput = exports.getNetworkPeerin
|
|
|
7
7
|
exports.getSubnetworkIamPolicy = exports.getSubnetworkOutput = exports.getSubnetwork = exports.getStoragePoolTypesOutput = exports.getStoragePoolTypes = exports.getStoragePoolIamPolicyOutput = exports.getStoragePoolIamPolicy = exports.getSnapshotIamPolicyOutput = exports.getSnapshotIamPolicy = exports.getSnapshotOutput = exports.getSnapshot = exports.getSecurityPolicyOutput = exports.getSecurityPolicy = exports.getSSLPolicyOutput = exports.getSSLPolicy = exports.getRouterStatusOutput = exports.getRouterStatus = exports.getRouterNatOutput = exports.getRouterNat = exports.getRouterOutput = exports.getRouter = exports.getResourcePolicyOutput = exports.getResourcePolicy = exports.getReservationOutput = exports.getReservation = exports.getRegionsOutput = exports.getRegions = exports.getRegionSslCertificateOutput = exports.getRegionSslCertificate = exports.getRegionSSLPolicyOutput = exports.getRegionSSLPolicy = exports.getRegionNetworkEndpointGroupOutput = exports.getRegionNetworkEndpointGroup = exports.getRegionInstanceTemplateOutput = exports.getRegionInstanceTemplate = exports.getRegionInstanceGroupManagerOutput = exports.getRegionInstanceGroupManager = exports.getRegionInstanceGroupOutput = exports.getRegionInstanceGroup = exports.getRegionDiskIamPolicyOutput = exports.getRegionDiskIamPolicy = exports.getRegionDiskOutput = exports.getRegionDisk = exports.getRegionBackendServiceIamPolicyOutput = exports.getRegionBackendServiceIamPolicy = exports.getRegionBackendServiceOutput = exports.getRegionBackendService = exports.getNodeTypesOutput = exports.getNodeTypes = exports.getNetworksOutput = void 0;
|
|
8
8
|
exports.NetworkAttachment = exports.Network = exports.MangedSslCertificate = exports.ManagedSslCertificate = exports.MachineImageIamPolicy = exports.MachineImageIamMember = exports.MachineImageIamBinding = exports.MachineImage = exports.InterconnectGroup = exports.InterconnectAttachmentGroup = exports.InterconnectAttachment = exports.Interconnect = exports.InstantSnapshotIamPolicy = exports.InstantSnapshotIamMember = exports.InstantSnapshotIamBinding = exports.InstantSnapshot = exports.InstanceTemplateIamPolicy = exports.InstanceTemplateIamMember = exports.InstanceTemplateIamBinding = exports.InstanceTemplate = exports.InstanceSettings = exports.InstanceIAMPolicy = exports.InstanceIAMMember = exports.InstanceIAMBinding = exports.InstanceGroupNamedPort = exports.InstanceGroupMembership = exports.InstanceGroupManager = exports.InstanceGroup = exports.InstanceFromTemplate = exports.InstanceFromMachineImage = exports.Instance = exports.ImageIamPolicy = exports.ImageIamMember = exports.ImageIamBinding = exports.Image = exports.HttpsHealthCheck = exports.HttpHealthCheck = exports.HealthCheck = exports.HaVpnGateway = exports.GlobalNetworkEndpointGroup = exports.GlobalNetworkEndpoint = exports.GlobalForwardingRule = exports.GlobalAddress = exports.getZonesOutput = exports.getZones = exports.getVPNGatewayOutput = exports.getVPNGateway = exports.getSubnetworksOutput = exports.getSubnetworks = exports.getSubnetworkIamPolicyOutput = void 0;
|
|
9
9
|
exports.RegionSslPolicy = exports.RegionSslCertificate = exports.RegionSecurityPolicyRule = exports.RegionSecurityPolicy = exports.RegionResizeRequest = exports.RegionPerInstanceConfig = exports.RegionNetworkFirewallPolicyWithRules = exports.RegionNetworkFirewallPolicyRule = exports.RegionNetworkFirewallPolicyAssociation = exports.RegionNetworkFirewallPolicy = exports.RegionNetworkEndpointGroup = exports.RegionNetworkEndpoint = exports.RegionInstanceTemplate = exports.RegionInstanceGroupManager = exports.RegionHealthCheck = exports.RegionDiskResourcePolicyAttachment = exports.RegionDiskIamPolicy = exports.RegionDiskIamMember = exports.RegionDiskIamBinding = exports.RegionDisk = exports.RegionCommitment = exports.RegionBackendServiceIamPolicy = exports.RegionBackendServiceIamMember = exports.RegionBackendServiceIamBinding = exports.RegionBackendService = exports.RegionAutoscaler = exports.PublicDelegatedPrefix = exports.PublicAdvertisedPrefix = exports.ProjectMetadataItem = exports.ProjectMetadata = exports.ProjectDefaultNetworkTier = exports.ProjectCloudArmorTier = exports.PerInstanceConfig = exports.PacketMirroring = exports.OrganizationSecurityPolicyRule = exports.OrganizationSecurityPolicyAssociation = exports.OrganizationSecurityPolicy = exports.NodeTemplate = exports.NodeGroup = exports.NetworkPeeringRoutesConfig = exports.NetworkPeering = exports.NetworkFirewallPolicyWithRules = exports.NetworkFirewallPolicyRule = exports.NetworkFirewallPolicyPacketMirroringRule = exports.NetworkFirewallPolicyAssociation = exports.NetworkFirewallPolicy = exports.NetworkEndpointList = exports.NetworkEndpointGroup = exports.NetworkEndpoint = exports.NetworkEdgeSecurityService = void 0;
|
|
10
|
-
exports.VPNTunnel = exports.VPNGateway = exports.URLMap = exports.TargetTCPProxy = exports.TargetSSLProxy = exports.TargetPool = exports.TargetInstance = exports.TargetHttpsProxy = exports.TargetHttpProxy = exports.TargetGrpcProxy = exports.SubnetworkIAMPolicy = exports.SubnetworkIAMMember = exports.SubnetworkIAMBinding = exports.Subnetwork = exports.StoragePoolIamPolicy = exports.StoragePoolIamMember = exports.StoragePoolIamBinding = exports.StoragePool = exports.SSLPolicy = exports.SSLCertificate = exports.SnapshotSettings = exports.SnapshotIamPolicy = exports.SnapshotIamMember = exports.SnapshotIamBinding = exports.Snapshot = exports.SharedVPCServiceProject = exports.SharedVPCHostProject = exports.ServiceAttachment = exports.SecurityScanConfig = exports.SecurityPolicyRule = exports.SecurityPolicy = exports.routerStatusOutput = exports.routerStatus = exports.RouterRoutePolicy = exports.RouterPeer = exports.RouterNatAddress = exports.RouterNat = exports.RouterInterface = exports.Router = exports.Route = exports.ResourcePolicyAttachment = exports.ResourcePolicy = exports.ResizeRequest = exports.Reservation = exports.RegionUrlMap = exports.RegionTargetTcpProxy = exports.RegionTargetHttpsProxy = exports.RegionTargetHttpProxy = void 0;
|
|
10
|
+
exports.WireGroup = exports.VPNTunnel = exports.VPNGateway = exports.URLMap = exports.TargetTCPProxy = exports.TargetSSLProxy = exports.TargetPool = exports.TargetInstance = exports.TargetHttpsProxy = exports.TargetHttpProxy = exports.TargetGrpcProxy = exports.SubnetworkIAMPolicy = exports.SubnetworkIAMMember = exports.SubnetworkIAMBinding = exports.Subnetwork = exports.StoragePoolIamPolicy = exports.StoragePoolIamMember = exports.StoragePoolIamBinding = exports.StoragePool = exports.SSLPolicy = exports.SSLCertificate = exports.SnapshotSettings = exports.SnapshotIamPolicy = exports.SnapshotIamMember = exports.SnapshotIamBinding = exports.Snapshot = exports.SharedVPCServiceProject = exports.SharedVPCHostProject = exports.ServiceAttachment = exports.SecurityScanConfig = exports.SecurityPolicyRule = exports.SecurityPolicy = exports.routerStatusOutput = exports.routerStatus = exports.RouterRoutePolicy = exports.RouterPeer = exports.RouterNatAddress = exports.RouterNat = exports.RouterInterface = exports.Router = exports.Route = exports.ResourcePolicyAttachment = exports.ResourcePolicy = exports.ResizeRequest = exports.Reservation = exports.RegionUrlMap = exports.RegionTargetTcpProxy = exports.RegionTargetHttpsProxy = exports.RegionTargetHttpProxy = void 0;
|
|
11
11
|
const pulumi = require("@pulumi/pulumi");
|
|
12
12
|
const utilities = require("../utilities");
|
|
13
13
|
exports.Address = null;
|
|
@@ -541,6 +541,8 @@ exports.VPNGateway = null;
|
|
|
541
541
|
utilities.lazyLoad(exports, ["VPNGateway"], () => require("./vpngateway"));
|
|
542
542
|
exports.VPNTunnel = null;
|
|
543
543
|
utilities.lazyLoad(exports, ["VPNTunnel"], () => require("./vpntunnel"));
|
|
544
|
+
exports.WireGroup = null;
|
|
545
|
+
utilities.lazyLoad(exports, ["WireGroup"], () => require("./wireGroup"));
|
|
544
546
|
const _module = {
|
|
545
547
|
version: utilities.getVersion(),
|
|
546
548
|
construct: (name, type, urn) => {
|
|
@@ -881,6 +883,8 @@ const _module = {
|
|
|
881
883
|
return new exports.VPNGateway(name, undefined, { urn });
|
|
882
884
|
case "gcp:compute/vPNTunnel:VPNTunnel":
|
|
883
885
|
return new exports.VPNTunnel(name, undefined, { urn });
|
|
886
|
+
case "gcp:compute/wireGroup:WireGroup":
|
|
887
|
+
return new exports.WireGroup(name, undefined, { urn });
|
|
884
888
|
default:
|
|
885
889
|
throw new Error(`unknown resource type ${type}`);
|
|
886
890
|
}
|
|
@@ -1054,4 +1058,5 @@ pulumi.runtime.registerResourceModule("gcp", "compute/targetTCPProxy", _module);
|
|
|
1054
1058
|
pulumi.runtime.registerResourceModule("gcp", "compute/uRLMap", _module);
|
|
1055
1059
|
pulumi.runtime.registerResourceModule("gcp", "compute/vPNGateway", _module);
|
|
1056
1060
|
pulumi.runtime.registerResourceModule("gcp", "compute/vPNTunnel", _module);
|
|
1061
|
+
pulumi.runtime.registerResourceModule("gcp", "compute/wireGroup", _module);
|
|
1057
1062
|
//# sourceMappingURL=index.js.map
|