pulumi-alicloud 3.77.0a1746076596__py3-none-any.whl → 3.77.0a1746220593__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-alicloud might be problematic. Click here for more details.
- pulumi_alicloud/__init__.py +72 -0
- pulumi_alicloud/_inputs.py +13 -0
- pulumi_alicloud/adb/db_cluster_lake_version.py +94 -0
- pulumi_alicloud/alb/_inputs.py +6 -3
- pulumi_alicloud/alb/outputs.py +4 -2
- pulumi_alicloud/apig/environment.py +2 -2
- pulumi_alicloud/apig/http_api.py +2 -2
- pulumi_alicloud/arms/grafana_workspace.py +56 -14
- pulumi_alicloud/cloudfirewall/instance_member.py +4 -4
- pulumi_alicloud/cloudfirewall/vpc_cen_tr_firewall.py +2 -2
- pulumi_alicloud/cloudsso/_inputs.py +697 -7
- pulumi_alicloud/cloudsso/directory.py +345 -65
- pulumi_alicloud/cloudsso/outputs.py +557 -8
- pulumi_alicloud/config/outputs.py +8 -0
- pulumi_alicloud/cs/_inputs.py +18 -18
- pulumi_alicloud/cs/edge_kubernetes.py +136 -100
- pulumi_alicloud/cs/get_kubernetes_node_pools.py +21 -1
- pulumi_alicloud/cs/kubernetes.py +118 -39
- pulumi_alicloud/cs/managed_kubernetes.py +125 -46
- pulumi_alicloud/cs/outputs.py +14 -14
- pulumi_alicloud/cs/serverless_kubernetes.py +66 -73
- pulumi_alicloud/ddos/ddos_coo_instance.py +175 -25
- pulumi_alicloud/dns/ddos_coo_instance.py +175 -25
- pulumi_alicloud/dts/job_monitor_rule.py +2 -2
- pulumi_alicloud/dts/synchronization_job.py +2 -2
- pulumi_alicloud/ecs/get_instance_types.py +4 -4
- pulumi_alicloud/ecs/instance.py +28 -28
- pulumi_alicloud/ecs/outputs.py +2 -2
- pulumi_alicloud/ecs/security_group_rule.py +32 -4
- pulumi_alicloud/eflo/__init__.py +3 -0
- pulumi_alicloud/eflo/_inputs.py +623 -0
- pulumi_alicloud/eflo/experiment_plan.py +573 -0
- pulumi_alicloud/eflo/experiment_plan_template.py +464 -0
- pulumi_alicloud/eflo/outputs.py +476 -0
- pulumi_alicloud/eflo/resource.py +388 -0
- pulumi_alicloud/ens/disk.py +120 -69
- pulumi_alicloud/ens/eip.py +45 -41
- pulumi_alicloud/esa/__init__.py +2 -0
- pulumi_alicloud/esa/scheduled_preload_execution.py +479 -0
- pulumi_alicloud/esa/scheduled_preload_job.py +467 -0
- pulumi_alicloud/gwlb/listener.py +2 -2
- pulumi_alicloud/gwlb/load_balancer.py +2 -2
- pulumi_alicloud/gwlb/server_group.py +2 -2
- pulumi_alicloud/ims/__init__.py +2 -0
- pulumi_alicloud/ims/get_oidc_providers.py +216 -0
- pulumi_alicloud/ims/outputs.py +138 -0
- pulumi_alicloud/mongodb/__init__.py +2 -0
- pulumi_alicloud/mongodb/_inputs.py +154 -0
- pulumi_alicloud/mongodb/instance.py +7 -7
- pulumi_alicloud/mongodb/outputs.py +121 -0
- pulumi_alicloud/mongodb/public_network_address.py +275 -0
- pulumi_alicloud/mongodb/replica_set_role.py +533 -0
- pulumi_alicloud/nas/_inputs.py +252 -18
- pulumi_alicloud/nas/file_system.py +649 -264
- pulumi_alicloud/nas/outputs.py +198 -12
- pulumi_alicloud/nlb/server_group_server_attachment.py +4 -0
- pulumi_alicloud/pai/__init__.py +1 -0
- pulumi_alicloud/pai/flow_pipeline.py +491 -0
- pulumi_alicloud/pulumi-plugin.json +1 -1
- pulumi_alicloud/ram/__init__.py +1 -0
- pulumi_alicloud/ram/get_role_policy_attachments.py +272 -0
- pulumi_alicloud/ram/outputs.py +63 -0
- pulumi_alicloud/ram/security_preference.py +496 -110
- pulumi_alicloud/rdc/organization.py +2 -2
- pulumi_alicloud/rds/instance.py +1 -1
- pulumi_alicloud/sae/application_scaling_rule.py +2 -2
- pulumi_alicloud/sae/ingress.py +2 -2
- pulumi_alicloud/schedulerx/app_group.py +2 -2
- pulumi_alicloud/schedulerx/job.py +2 -2
- pulumi_alicloud/selectdb/db_cluster.py +2 -0
- pulumi_alicloud/selectdb/db_instance.py +43 -13
- pulumi_alicloud/selectdb/get_db_clusters.py +2 -0
- pulumi_alicloud/selectdb/get_db_instances.py +2 -0
- pulumi_alicloud/selectdb/outputs.py +3 -3
- pulumi_alicloud/sls/__init__.py +1 -0
- pulumi_alicloud/sls/_inputs.py +295 -0
- pulumi_alicloud/sls/etl.py +516 -0
- pulumi_alicloud/sls/outputs.py +209 -0
- pulumi_alicloud/vpc/network.py +156 -88
- {pulumi_alicloud-3.77.0a1746076596.dist-info → pulumi_alicloud-3.77.0a1746220593.dist-info}/METADATA +1 -1
- {pulumi_alicloud-3.77.0a1746076596.dist-info → pulumi_alicloud-3.77.0a1746220593.dist-info}/RECORD +83 -71
- {pulumi_alicloud-3.77.0a1746076596.dist-info → pulumi_alicloud-3.77.0a1746220593.dist-info}/WHEEL +0 -0
- {pulumi_alicloud-3.77.0a1746076596.dist-info → pulumi_alicloud-3.77.0a1746220593.dist-info}/top_level.txt +0 -0
pulumi_alicloud/cs/_inputs.py
CHANGED
|
@@ -386,11 +386,11 @@ if not MYPY:
|
|
|
386
386
|
class EdgeKubernetesCertificateAuthorityArgsDict(TypedDict):
|
|
387
387
|
client_cert: NotRequired[pulumi.Input[builtins.str]]
|
|
388
388
|
"""
|
|
389
|
-
|
|
389
|
+
From version 1.248.0, new DataSource `cs_get_cluster_credential` is recommended to manage cluster's kubeconfig, you can also save the certificate_authority.client_cert attribute content of new DataSource `cs_get_cluster_credential` to an appropriate path(like ~/.kube/client-cert.pem) for replace it.
|
|
390
390
|
"""
|
|
391
391
|
client_key: NotRequired[pulumi.Input[builtins.str]]
|
|
392
392
|
"""
|
|
393
|
-
|
|
393
|
+
From version 1.248.0, new DataSource `cs_get_cluster_credential` is recommended to manage cluster's kubeconfig, you can also save the certificate_authority.client_key attribute content of new DataSource `cs_get_cluster_credential` to an appropriate path(like ~/.kube/client-key.pem) for replace it.
|
|
394
394
|
"""
|
|
395
395
|
cluster_cert: NotRequired[pulumi.Input[builtins.str]]
|
|
396
396
|
"""
|
|
@@ -406,8 +406,8 @@ class EdgeKubernetesCertificateAuthorityArgs:
|
|
|
406
406
|
client_key: Optional[pulumi.Input[builtins.str]] = None,
|
|
407
407
|
cluster_cert: Optional[pulumi.Input[builtins.str]] = None):
|
|
408
408
|
"""
|
|
409
|
-
:param pulumi.Input[builtins.str] client_cert:
|
|
410
|
-
:param pulumi.Input[builtins.str] client_key:
|
|
409
|
+
:param pulumi.Input[builtins.str] client_cert: From version 1.248.0, new DataSource `cs_get_cluster_credential` is recommended to manage cluster's kubeconfig, you can also save the certificate_authority.client_cert attribute content of new DataSource `cs_get_cluster_credential` to an appropriate path(like ~/.kube/client-cert.pem) for replace it.
|
|
410
|
+
:param pulumi.Input[builtins.str] client_key: From version 1.248.0, new DataSource `cs_get_cluster_credential` is recommended to manage cluster's kubeconfig, you can also save the certificate_authority.client_key attribute content of new DataSource `cs_get_cluster_credential` to an appropriate path(like ~/.kube/client-key.pem) for replace it.
|
|
411
411
|
:param pulumi.Input[builtins.str] cluster_cert: The base64 encoded cluster certificate data required to communicate with your cluster. Add this to the certificate-authority-data section of the kubeconfig file for your cluster.
|
|
412
412
|
"""
|
|
413
413
|
if client_cert is not None:
|
|
@@ -421,7 +421,7 @@ class EdgeKubernetesCertificateAuthorityArgs:
|
|
|
421
421
|
@pulumi.getter(name="clientCert")
|
|
422
422
|
def client_cert(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
423
423
|
"""
|
|
424
|
-
|
|
424
|
+
From version 1.248.0, new DataSource `cs_get_cluster_credential` is recommended to manage cluster's kubeconfig, you can also save the certificate_authority.client_cert attribute content of new DataSource `cs_get_cluster_credential` to an appropriate path(like ~/.kube/client-cert.pem) for replace it.
|
|
425
425
|
"""
|
|
426
426
|
return pulumi.get(self, "client_cert")
|
|
427
427
|
|
|
@@ -433,7 +433,7 @@ class EdgeKubernetesCertificateAuthorityArgs:
|
|
|
433
433
|
@pulumi.getter(name="clientKey")
|
|
434
434
|
def client_key(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
435
435
|
"""
|
|
436
|
-
|
|
436
|
+
From version 1.248.0, new DataSource `cs_get_cluster_credential` is recommended to manage cluster's kubeconfig, you can also save the certificate_authority.client_key attribute content of new DataSource `cs_get_cluster_credential` to an appropriate path(like ~/.kube/client-key.pem) for replace it.
|
|
437
437
|
"""
|
|
438
438
|
return pulumi.get(self, "client_key")
|
|
439
439
|
|
|
@@ -1147,11 +1147,11 @@ if not MYPY:
|
|
|
1147
1147
|
class KubernetesCertificateAuthorityArgsDict(TypedDict):
|
|
1148
1148
|
client_cert: NotRequired[pulumi.Input[builtins.str]]
|
|
1149
1149
|
"""
|
|
1150
|
-
|
|
1150
|
+
From version 1.248.0, new DataSource `cs_get_cluster_credential` is recommended to manage cluster's kubeconfig, you can also save the certificate_authority.client_cert attribute content of new DataSource `cs_get_cluster_credential` to an appropriate path(like ~/.kube/client-cert.pem) for replace it.
|
|
1151
1151
|
"""
|
|
1152
1152
|
client_key: NotRequired[pulumi.Input[builtins.str]]
|
|
1153
1153
|
"""
|
|
1154
|
-
|
|
1154
|
+
From version 1.248.0, new DataSource `cs_get_cluster_credential` is recommended to manage cluster's kubeconfig, you can also save the certificate_authority.client_key attribute content of new DataSource `cs_get_cluster_credential` to an appropriate path(like ~/.kube/client-key.pem) for replace it.
|
|
1155
1155
|
"""
|
|
1156
1156
|
cluster_cert: NotRequired[pulumi.Input[builtins.str]]
|
|
1157
1157
|
"""
|
|
@@ -1167,8 +1167,8 @@ class KubernetesCertificateAuthorityArgs:
|
|
|
1167
1167
|
client_key: Optional[pulumi.Input[builtins.str]] = None,
|
|
1168
1168
|
cluster_cert: Optional[pulumi.Input[builtins.str]] = None):
|
|
1169
1169
|
"""
|
|
1170
|
-
:param pulumi.Input[builtins.str] client_cert:
|
|
1171
|
-
:param pulumi.Input[builtins.str] client_key:
|
|
1170
|
+
:param pulumi.Input[builtins.str] client_cert: From version 1.248.0, new DataSource `cs_get_cluster_credential` is recommended to manage cluster's kubeconfig, you can also save the certificate_authority.client_cert attribute content of new DataSource `cs_get_cluster_credential` to an appropriate path(like ~/.kube/client-cert.pem) for replace it.
|
|
1171
|
+
:param pulumi.Input[builtins.str] client_key: From version 1.248.0, new DataSource `cs_get_cluster_credential` is recommended to manage cluster's kubeconfig, you can also save the certificate_authority.client_key attribute content of new DataSource `cs_get_cluster_credential` to an appropriate path(like ~/.kube/client-key.pem) for replace it.
|
|
1172
1172
|
:param pulumi.Input[builtins.str] cluster_cert: The base64 encoded cluster certificate data required to communicate with your cluster. Add this to the certificate-authority-data section of the kubeconfig file for your cluster.
|
|
1173
1173
|
"""
|
|
1174
1174
|
if client_cert is not None:
|
|
@@ -1182,7 +1182,7 @@ class KubernetesCertificateAuthorityArgs:
|
|
|
1182
1182
|
@pulumi.getter(name="clientCert")
|
|
1183
1183
|
def client_cert(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
1184
1184
|
"""
|
|
1185
|
-
|
|
1185
|
+
From version 1.248.0, new DataSource `cs_get_cluster_credential` is recommended to manage cluster's kubeconfig, you can also save the certificate_authority.client_cert attribute content of new DataSource `cs_get_cluster_credential` to an appropriate path(like ~/.kube/client-cert.pem) for replace it.
|
|
1186
1186
|
"""
|
|
1187
1187
|
return pulumi.get(self, "client_cert")
|
|
1188
1188
|
|
|
@@ -1194,7 +1194,7 @@ class KubernetesCertificateAuthorityArgs:
|
|
|
1194
1194
|
@pulumi.getter(name="clientKey")
|
|
1195
1195
|
def client_key(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
1196
1196
|
"""
|
|
1197
|
-
|
|
1197
|
+
From version 1.248.0, new DataSource `cs_get_cluster_credential` is recommended to manage cluster's kubeconfig, you can also save the certificate_authority.client_key attribute content of new DataSource `cs_get_cluster_credential` to an appropriate path(like ~/.kube/client-key.pem) for replace it.
|
|
1198
1198
|
"""
|
|
1199
1199
|
return pulumi.get(self, "client_key")
|
|
1200
1200
|
|
|
@@ -1852,11 +1852,11 @@ if not MYPY:
|
|
|
1852
1852
|
class ManagedKubernetesCertificateAuthorityArgsDict(TypedDict):
|
|
1853
1853
|
client_cert: NotRequired[pulumi.Input[builtins.str]]
|
|
1854
1854
|
"""
|
|
1855
|
-
|
|
1855
|
+
From version 1.248.0, new DataSource `cs_get_cluster_credential` is recommended to manage cluster's kubeconfig, you can also save the certificate_authority.client_cert attribute content of new DataSource `cs_get_cluster_credential` to an appropriate path(like ~/.kube/client-cert.pem) for replace it.
|
|
1856
1856
|
"""
|
|
1857
1857
|
client_key: NotRequired[pulumi.Input[builtins.str]]
|
|
1858
1858
|
"""
|
|
1859
|
-
|
|
1859
|
+
From version 1.248.0, new DataSource `cs_get_cluster_credential` is recommended to manage cluster's kubeconfig, you can also save the certificate_authority.client_key attribute content of new DataSource `cs_get_cluster_credential` to an appropriate path(like ~/.kube/client-key.pem) for replace it.
|
|
1860
1860
|
"""
|
|
1861
1861
|
cluster_cert: NotRequired[pulumi.Input[builtins.str]]
|
|
1862
1862
|
"""
|
|
@@ -1872,8 +1872,8 @@ class ManagedKubernetesCertificateAuthorityArgs:
|
|
|
1872
1872
|
client_key: Optional[pulumi.Input[builtins.str]] = None,
|
|
1873
1873
|
cluster_cert: Optional[pulumi.Input[builtins.str]] = None):
|
|
1874
1874
|
"""
|
|
1875
|
-
:param pulumi.Input[builtins.str] client_cert:
|
|
1876
|
-
:param pulumi.Input[builtins.str] client_key:
|
|
1875
|
+
:param pulumi.Input[builtins.str] client_cert: From version 1.248.0, new DataSource `cs_get_cluster_credential` is recommended to manage cluster's kubeconfig, you can also save the certificate_authority.client_cert attribute content of new DataSource `cs_get_cluster_credential` to an appropriate path(like ~/.kube/client-cert.pem) for replace it.
|
|
1876
|
+
:param pulumi.Input[builtins.str] client_key: From version 1.248.0, new DataSource `cs_get_cluster_credential` is recommended to manage cluster's kubeconfig, you can also save the certificate_authority.client_key attribute content of new DataSource `cs_get_cluster_credential` to an appropriate path(like ~/.kube/client-key.pem) for replace it.
|
|
1877
1877
|
:param pulumi.Input[builtins.str] cluster_cert: The base64 encoded cluster certificate data required to communicate with your cluster. Add this to the certificate-authority-data section of the kubeconfig file for your cluster.
|
|
1878
1878
|
"""
|
|
1879
1879
|
if client_cert is not None:
|
|
@@ -1887,7 +1887,7 @@ class ManagedKubernetesCertificateAuthorityArgs:
|
|
|
1887
1887
|
@pulumi.getter(name="clientCert")
|
|
1888
1888
|
def client_cert(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
1889
1889
|
"""
|
|
1890
|
-
|
|
1890
|
+
From version 1.248.0, new DataSource `cs_get_cluster_credential` is recommended to manage cluster's kubeconfig, you can also save the certificate_authority.client_cert attribute content of new DataSource `cs_get_cluster_credential` to an appropriate path(like ~/.kube/client-cert.pem) for replace it.
|
|
1891
1891
|
"""
|
|
1892
1892
|
return pulumi.get(self, "client_cert")
|
|
1893
1893
|
|
|
@@ -1899,7 +1899,7 @@ class ManagedKubernetesCertificateAuthorityArgs:
|
|
|
1899
1899
|
@pulumi.getter(name="clientKey")
|
|
1900
1900
|
def client_key(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
1901
1901
|
"""
|
|
1902
|
-
|
|
1902
|
+
From version 1.248.0, new DataSource `cs_get_cluster_credential` is recommended to manage cluster's kubeconfig, you can also save the certificate_authority.client_key attribute content of new DataSource `cs_get_cluster_credential` to an appropriate path(like ~/.kube/client-key.pem) for replace it.
|
|
1903
1903
|
"""
|
|
1904
1904
|
return pulumi.get(self, "client_key")
|
|
1905
1905
|
|