pulumi-gcp 6.66.0a1694816867__py3-none-any.whl → 6.66.0a1695056297__py3-none-any.whl

Sign up to get free protection for your applications and to get access to all the features.
@@ -412,6 +412,11 @@ def get_region_instance_template(filter: Optional[str] = None,
412
412
  region: Optional[str] = None,
413
413
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetRegionInstanceTemplateResult:
414
414
  """
415
+ Get information about a VM instance template resource within GCE. For more information see
416
+ [the official documentation](https://cloud.google.com/compute/docs/instance-templates)
417
+ and
418
+ [API](https://cloud.google.com/compute/docs/reference/rest/v1/regionInstanceTemplates).
419
+
415
420
  ## Example Usage
416
421
 
417
422
  ```python
@@ -485,6 +490,11 @@ def get_region_instance_template_output(filter: Optional[pulumi.Input[Optional[s
485
490
  region: Optional[pulumi.Input[Optional[str]]] = None,
486
491
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetRegionInstanceTemplateResult]:
487
492
  """
493
+ Get information about a VM instance template resource within GCE. For more information see
494
+ [the official documentation](https://cloud.google.com/compute/docs/instance-templates)
495
+ and
496
+ [API](https://cloud.google.com/compute/docs/reference/rest/v1/regionInstanceTemplates).
497
+
488
498
  ## Example Usage
489
499
 
490
500
  ```python
@@ -3077,6 +3077,7 @@ class ClusterAddonsConfigConfigConnectorConfigArgs:
3077
3077
 
3078
3078
 
3079
3079
 
3080
+ enforce encryption of data in-use.
3080
3081
 
3081
3082
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3082
3083
 
@@ -3099,6 +3100,7 @@ class ClusterAddonsConfigConfigConnectorConfigArgs:
3099
3100
 
3100
3101
 
3101
3102
 
3103
+ enforce encryption of data in-use.
3102
3104
 
3103
3105
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3104
3106
 
@@ -3127,6 +3129,7 @@ class ClusterAddonsConfigDnsCacheConfigArgs:
3127
3129
 
3128
3130
 
3129
3131
 
3132
+ enforce encryption of data in-use.
3130
3133
 
3131
3134
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3132
3135
 
@@ -3149,6 +3152,7 @@ class ClusterAddonsConfigDnsCacheConfigArgs:
3149
3152
 
3150
3153
 
3151
3154
 
3155
+ enforce encryption of data in-use.
3152
3156
 
3153
3157
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3154
3158
 
@@ -3177,6 +3181,7 @@ class ClusterAddonsConfigGcePersistentDiskCsiDriverConfigArgs:
3177
3181
 
3178
3182
 
3179
3183
 
3184
+ enforce encryption of data in-use.
3180
3185
 
3181
3186
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3182
3187
 
@@ -3199,6 +3204,7 @@ class ClusterAddonsConfigGcePersistentDiskCsiDriverConfigArgs:
3199
3204
 
3200
3205
 
3201
3206
 
3207
+ enforce encryption of data in-use.
3202
3208
 
3203
3209
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3204
3210
 
@@ -3227,6 +3233,7 @@ class ClusterAddonsConfigGcpFilestoreCsiDriverConfigArgs:
3227
3233
 
3228
3234
 
3229
3235
 
3236
+ enforce encryption of data in-use.
3230
3237
 
3231
3238
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3232
3239
 
@@ -3249,6 +3256,7 @@ class ClusterAddonsConfigGcpFilestoreCsiDriverConfigArgs:
3249
3256
 
3250
3257
 
3251
3258
 
3259
+ enforce encryption of data in-use.
3252
3260
 
3253
3261
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3254
3262
 
@@ -3277,6 +3285,7 @@ class ClusterAddonsConfigGcsFuseCsiDriverConfigArgs:
3277
3285
 
3278
3286
 
3279
3287
 
3288
+ enforce encryption of data in-use.
3280
3289
 
3281
3290
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3282
3291
 
@@ -3299,6 +3308,7 @@ class ClusterAddonsConfigGcsFuseCsiDriverConfigArgs:
3299
3308
 
3300
3309
 
3301
3310
 
3311
+ enforce encryption of data in-use.
3302
3312
 
3303
3313
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3304
3314
 
@@ -3327,6 +3337,7 @@ class ClusterAddonsConfigGkeBackupAgentConfigArgs:
3327
3337
 
3328
3338
 
3329
3339
 
3340
+ enforce encryption of data in-use.
3330
3341
 
3331
3342
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3332
3343
 
@@ -3349,6 +3360,7 @@ class ClusterAddonsConfigGkeBackupAgentConfigArgs:
3349
3360
 
3350
3361
 
3351
3362
 
3363
+ enforce encryption of data in-use.
3352
3364
 
3353
3365
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3354
3366
 
@@ -3469,6 +3481,7 @@ class ClusterAddonsConfigKalmConfigArgs:
3469
3481
 
3470
3482
 
3471
3483
 
3484
+ enforce encryption of data in-use.
3472
3485
 
3473
3486
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3474
3487
 
@@ -3491,6 +3504,7 @@ class ClusterAddonsConfigKalmConfigArgs:
3491
3504
 
3492
3505
 
3493
3506
 
3507
+ enforce encryption of data in-use.
3494
3508
 
3495
3509
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3496
3510
 
@@ -3568,6 +3582,7 @@ class ClusterBinaryAuthorizationArgs:
3568
3582
 
3569
3583
 
3570
3584
 
3585
+ enforce encryption of data in-use.
3571
3586
 
3572
3587
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3573
3588
 
@@ -3599,6 +3614,7 @@ class ClusterBinaryAuthorizationArgs:
3599
3614
 
3600
3615
 
3601
3616
 
3617
+ enforce encryption of data in-use.
3602
3618
 
3603
3619
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3604
3620
 
@@ -4281,7 +4297,8 @@ class ClusterConfidentialNodesArgs:
4281
4297
  def __init__(__self__, *,
4282
4298
  enabled: pulumi.Input[bool]):
4283
4299
  """
4284
- :param pulumi.Input[bool] enabled: Enable Confidential Nodes for this cluster.
4300
+ :param pulumi.Input[bool] enabled: Enable Confidential GKE Nodes for this cluster, to
4301
+ enforce encryption of data in-use.
4285
4302
  """
4286
4303
  pulumi.set(__self__, "enabled", enabled)
4287
4304
 
@@ -4289,7 +4306,8 @@ class ClusterConfidentialNodesArgs:
4289
4306
  @pulumi.getter
4290
4307
  def enabled(self) -> pulumi.Input[bool]:
4291
4308
  """
4292
- Enable Confidential Nodes for this cluster.
4309
+ Enable Confidential GKE Nodes for this cluster, to
4310
+ enforce encryption of data in-use.
4293
4311
  """
4294
4312
  return pulumi.get(self, "enabled")
4295
4313
 
@@ -5193,7 +5211,7 @@ class ClusterMonitoringConfigArgs:
5193
5211
  managed_prometheus: Optional[pulumi.Input['ClusterMonitoringConfigManagedPrometheusArgs']] = None):
5194
5212
  """
5195
5213
  :param pulumi.Input[Sequence[pulumi.Input['ClusterMonitoringConfigAdvancedDatapathObservabilityConfigArgs']]] advanced_datapath_observability_configs: Configuration for Advanced Datapath Monitoring. Structure is documented below.
5196
- :param pulumi.Input[Sequence[pulumi.Input[str]]] enable_components: The GKE components exposing metrics. Supported values include: `SYSTEM_COMPONENTS`, `APISERVER`, `CONTROLLER_MANAGER`, and `SCHEDULER`. In beta provider, `WORKLOADS` is supported on top of those 4 values. (`WORKLOADS` is deprecated and removed in GKE 1.24.)
5214
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] enable_components: The GKE components exposing metrics. Supported values include: `SYSTEM_COMPONENTS`, `APISERVER`, `SCHEDULER`, `CONTROLLER_MANAGER`, `STORAGE`, `HPA`, `POD`, `DAEMONSET`, `DEPLOYMENT` and `STATEFULSET`. In beta provider, `WORKLOADS` is supported on top of those 10 values. (`WORKLOADS` is deprecated and removed in GKE 1.24.)
5197
5215
  :param pulumi.Input['ClusterMonitoringConfigManagedPrometheusArgs'] managed_prometheus: Configuration for Managed Service for Prometheus. Structure is documented below.
5198
5216
  """
5199
5217
  if advanced_datapath_observability_configs is not None:
@@ -5219,7 +5237,7 @@ class ClusterMonitoringConfigArgs:
5219
5237
  @pulumi.getter(name="enableComponents")
5220
5238
  def enable_components(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
5221
5239
  """
5222
- The GKE components exposing metrics. Supported values include: `SYSTEM_COMPONENTS`, `APISERVER`, `CONTROLLER_MANAGER`, and `SCHEDULER`. In beta provider, `WORKLOADS` is supported on top of those 4 values. (`WORKLOADS` is deprecated and removed in GKE 1.24.)
5240
+ The GKE components exposing metrics. Supported values include: `SYSTEM_COMPONENTS`, `APISERVER`, `SCHEDULER`, `CONTROLLER_MANAGER`, `STORAGE`, `HPA`, `POD`, `DAEMONSET`, `DEPLOYMENT` and `STATEFULSET`. In beta provider, `WORKLOADS` is supported on top of those 10 values. (`WORKLOADS` is deprecated and removed in GKE 1.24.)
5223
5241
  """
5224
5242
  return pulumi.get(self, "enable_components")
5225
5243
 
@@ -5246,6 +5264,7 @@ class ClusterMonitoringConfigAdvancedDatapathObservabilityConfigArgs:
5246
5264
  enable_metrics: pulumi.Input[bool],
5247
5265
  relay_mode: Optional[pulumi.Input[str]] = None):
5248
5266
  """
5267
+ :param pulumi.Input[bool] enable_metrics: Whether or not to enable advanced datapath metrics.
5249
5268
  :param pulumi.Input[str] relay_mode: Mode used to make Relay available.
5250
5269
  """
5251
5270
  pulumi.set(__self__, "enable_metrics", enable_metrics)
@@ -5255,6 +5274,9 @@ class ClusterMonitoringConfigAdvancedDatapathObservabilityConfigArgs:
5255
5274
  @property
5256
5275
  @pulumi.getter(name="enableMetrics")
5257
5276
  def enable_metrics(self) -> pulumi.Input[bool]:
5277
+ """
5278
+ Whether or not to enable advanced datapath metrics.
5279
+ """
5258
5280
  return pulumi.get(self, "enable_metrics")
5259
5281
 
5260
5282
  @enable_metrics.setter
@@ -6058,7 +6080,8 @@ class ClusterNodeConfigConfidentialNodesArgs:
6058
6080
  def __init__(__self__, *,
6059
6081
  enabled: pulumi.Input[bool]):
6060
6082
  """
6061
- :param pulumi.Input[bool] enabled: Enable Confidential Nodes for this cluster.
6083
+ :param pulumi.Input[bool] enabled: Enable Confidential GKE Nodes for this cluster, to
6084
+ enforce encryption of data in-use.
6062
6085
  """
6063
6086
  pulumi.set(__self__, "enabled", enabled)
6064
6087
 
@@ -6066,7 +6089,8 @@ class ClusterNodeConfigConfidentialNodesArgs:
6066
6089
  @pulumi.getter
6067
6090
  def enabled(self) -> pulumi.Input[bool]:
6068
6091
  """
6069
- Enable Confidential Nodes for this cluster.
6092
+ Enable Confidential GKE Nodes for this cluster, to
6093
+ enforce encryption of data in-use.
6070
6094
  """
6071
6095
  return pulumi.get(self, "enabled")
6072
6096
 
@@ -8234,7 +8258,8 @@ class ClusterNodePoolNodeConfigConfidentialNodesArgs:
8234
8258
  def __init__(__self__, *,
8235
8259
  enabled: pulumi.Input[bool]):
8236
8260
  """
8237
- :param pulumi.Input[bool] enabled: Enable Confidential Nodes for this cluster.
8261
+ :param pulumi.Input[bool] enabled: Enable Confidential GKE Nodes for this cluster, to
8262
+ enforce encryption of data in-use.
8238
8263
  """
8239
8264
  pulumi.set(__self__, "enabled", enabled)
8240
8265
 
@@ -8242,7 +8267,8 @@ class ClusterNodePoolNodeConfigConfidentialNodesArgs:
8242
8267
  @pulumi.getter
8243
8268
  def enabled(self) -> pulumi.Input[bool]:
8244
8269
  """
8245
- Enable Confidential Nodes for this cluster.
8270
+ Enable Confidential GKE Nodes for this cluster, to
8271
+ enforce encryption of data in-use.
8246
8272
  """
8247
8273
  return pulumi.get(self, "enabled")
8248
8274
 
@@ -9747,6 +9773,7 @@ class ClusterTpuConfigArgs:
9747
9773
 
9748
9774
 
9749
9775
 
9776
+ enforce encryption of data in-use.
9750
9777
 
9751
9778
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
9752
9779
 
@@ -9773,6 +9800,7 @@ class ClusterTpuConfigArgs:
9773
9800
 
9774
9801
 
9775
9802
 
9803
+ enforce encryption of data in-use.
9776
9804
 
9777
9805
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
9778
9806
 
@@ -10268,6 +10296,9 @@ class NodePoolNodeConfigArgs:
10268
10296
  tags: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
10269
10297
  taints: Optional[pulumi.Input[Sequence[pulumi.Input['NodePoolNodeConfigTaintArgs']]]] = None,
10270
10298
  workload_metadata_config: Optional[pulumi.Input['NodePoolNodeConfigWorkloadMetadataConfigArgs']] = None):
10299
+ """
10300
+ :param pulumi.Input['NodePoolNodeConfigConfidentialNodesArgs'] confidential_nodes: Configuration for Confidential Nodes feature. Structure is documented below.
10301
+ """
10271
10302
  if advanced_machine_features is not None:
10272
10303
  pulumi.set(__self__, "advanced_machine_features", advanced_machine_features)
10273
10304
  if boot_disk_kms_key is not None:
@@ -10358,6 +10389,9 @@ class NodePoolNodeConfigArgs:
10358
10389
  @property
10359
10390
  @pulumi.getter(name="confidentialNodes")
10360
10391
  def confidential_nodes(self) -> Optional[pulumi.Input['NodePoolNodeConfigConfidentialNodesArgs']]:
10392
+ """
10393
+ Configuration for Confidential Nodes feature. Structure is documented below.
10394
+ """
10361
10395
  return pulumi.get(self, "confidential_nodes")
10362
10396
 
10363
10397
  @confidential_nodes.setter
@@ -10664,11 +10698,19 @@ class NodePoolNodeConfigAdvancedMachineFeaturesArgs:
10664
10698
  class NodePoolNodeConfigConfidentialNodesArgs:
10665
10699
  def __init__(__self__, *,
10666
10700
  enabled: pulumi.Input[bool]):
10701
+ """
10702
+ :param pulumi.Input[bool] enabled: Enable Confidential GKE Nodes for this cluster, to
10703
+ enforce encryption of data in-use.
10704
+ """
10667
10705
  pulumi.set(__self__, "enabled", enabled)
10668
10706
 
10669
10707
  @property
10670
10708
  @pulumi.getter
10671
10709
  def enabled(self) -> pulumi.Input[bool]:
10710
+ """
10711
+ Enable Confidential GKE Nodes for this cluster, to
10712
+ enforce encryption of data in-use.
10713
+ """
10672
10714
  return pulumi.get(self, "enabled")
10673
10715
 
10674
10716
  @enabled.setter
@@ -10712,11 +10754,19 @@ class NodePoolNodeConfigEphemeralStorageLocalSsdConfigArgs:
10712
10754
  class NodePoolNodeConfigGcfsConfigArgs:
10713
10755
  def __init__(__self__, *,
10714
10756
  enabled: pulumi.Input[bool]):
10757
+ """
10758
+ :param pulumi.Input[bool] enabled: Enable Confidential GKE Nodes for this cluster, to
10759
+ enforce encryption of data in-use.
10760
+ """
10715
10761
  pulumi.set(__self__, "enabled", enabled)
10716
10762
 
10717
10763
  @property
10718
10764
  @pulumi.getter
10719
10765
  def enabled(self) -> pulumi.Input[bool]:
10766
+ """
10767
+ Enable Confidential GKE Nodes for this cluster, to
10768
+ enforce encryption of data in-use.
10769
+ """
10720
10770
  return pulumi.get(self, "enabled")
10721
10771
 
10722
10772
  @enabled.setter
@@ -10844,11 +10894,19 @@ class NodePoolNodeConfigGuestAcceleratorGpuSharingConfigArgs:
10844
10894
  class NodePoolNodeConfigGvnicArgs:
10845
10895
  def __init__(__self__, *,
10846
10896
  enabled: pulumi.Input[bool]):
10897
+ """
10898
+ :param pulumi.Input[bool] enabled: Enable Confidential GKE Nodes for this cluster, to
10899
+ enforce encryption of data in-use.
10900
+ """
10847
10901
  pulumi.set(__self__, "enabled", enabled)
10848
10902
 
10849
10903
  @property
10850
10904
  @pulumi.getter
10851
10905
  def enabled(self) -> pulumi.Input[bool]:
10906
+ """
10907
+ Enable Confidential GKE Nodes for this cluster, to
10908
+ enforce encryption of data in-use.
10909
+ """
10852
10910
  return pulumi.get(self, "enabled")
10853
10911
 
10854
10912
  @enabled.setter
@@ -3557,6 +3557,7 @@ class ClusterAddonsConfigConfigConnectorConfig(dict):
3557
3557
 
3558
3558
 
3559
3559
 
3560
+ enforce encryption of data in-use.
3560
3561
 
3561
3562
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3562
3563
 
@@ -3579,6 +3580,7 @@ class ClusterAddonsConfigConfigConnectorConfig(dict):
3579
3580
 
3580
3581
 
3581
3582
 
3583
+ enforce encryption of data in-use.
3582
3584
 
3583
3585
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3584
3586
 
@@ -3603,6 +3605,7 @@ class ClusterAddonsConfigDnsCacheConfig(dict):
3603
3605
 
3604
3606
 
3605
3607
 
3608
+ enforce encryption of data in-use.
3606
3609
 
3607
3610
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3608
3611
 
@@ -3625,6 +3628,7 @@ class ClusterAddonsConfigDnsCacheConfig(dict):
3625
3628
 
3626
3629
 
3627
3630
 
3631
+ enforce encryption of data in-use.
3628
3632
 
3629
3633
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3630
3634
 
@@ -3649,6 +3653,7 @@ class ClusterAddonsConfigGcePersistentDiskCsiDriverConfig(dict):
3649
3653
 
3650
3654
 
3651
3655
 
3656
+ enforce encryption of data in-use.
3652
3657
 
3653
3658
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3654
3659
 
@@ -3671,6 +3676,7 @@ class ClusterAddonsConfigGcePersistentDiskCsiDriverConfig(dict):
3671
3676
 
3672
3677
 
3673
3678
 
3679
+ enforce encryption of data in-use.
3674
3680
 
3675
3681
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3676
3682
 
@@ -3695,6 +3701,7 @@ class ClusterAddonsConfigGcpFilestoreCsiDriverConfig(dict):
3695
3701
 
3696
3702
 
3697
3703
 
3704
+ enforce encryption of data in-use.
3698
3705
 
3699
3706
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3700
3707
 
@@ -3717,6 +3724,7 @@ class ClusterAddonsConfigGcpFilestoreCsiDriverConfig(dict):
3717
3724
 
3718
3725
 
3719
3726
 
3727
+ enforce encryption of data in-use.
3720
3728
 
3721
3729
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3722
3730
 
@@ -3741,6 +3749,7 @@ class ClusterAddonsConfigGcsFuseCsiDriverConfig(dict):
3741
3749
 
3742
3750
 
3743
3751
 
3752
+ enforce encryption of data in-use.
3744
3753
 
3745
3754
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3746
3755
 
@@ -3763,6 +3772,7 @@ class ClusterAddonsConfigGcsFuseCsiDriverConfig(dict):
3763
3772
 
3764
3773
 
3765
3774
 
3775
+ enforce encryption of data in-use.
3766
3776
 
3767
3777
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3768
3778
 
@@ -3787,6 +3797,7 @@ class ClusterAddonsConfigGkeBackupAgentConfig(dict):
3787
3797
 
3788
3798
 
3789
3799
 
3800
+ enforce encryption of data in-use.
3790
3801
 
3791
3802
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3792
3803
 
@@ -3809,6 +3820,7 @@ class ClusterAddonsConfigGkeBackupAgentConfig(dict):
3809
3820
 
3810
3821
 
3811
3822
 
3823
+ enforce encryption of data in-use.
3812
3824
 
3813
3825
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3814
3826
 
@@ -3909,6 +3921,7 @@ class ClusterAddonsConfigKalmConfig(dict):
3909
3921
 
3910
3922
 
3911
3923
 
3924
+ enforce encryption of data in-use.
3912
3925
 
3913
3926
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3914
3927
 
@@ -3931,6 +3944,7 @@ class ClusterAddonsConfigKalmConfig(dict):
3931
3944
 
3932
3945
 
3933
3946
 
3947
+ enforce encryption of data in-use.
3934
3948
 
3935
3949
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
3936
3950
 
@@ -4030,6 +4044,7 @@ class ClusterBinaryAuthorization(dict):
4030
4044
 
4031
4045
 
4032
4046
 
4047
+ enforce encryption of data in-use.
4033
4048
 
4034
4049
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
4035
4050
 
@@ -4058,6 +4073,7 @@ class ClusterBinaryAuthorization(dict):
4058
4073
 
4059
4074
 
4060
4075
 
4076
+ enforce encryption of data in-use.
4061
4077
 
4062
4078
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
4063
4079
 
@@ -4785,7 +4801,8 @@ class ClusterConfidentialNodes(dict):
4785
4801
  def __init__(__self__, *,
4786
4802
  enabled: bool):
4787
4803
  """
4788
- :param bool enabled: Enable Confidential Nodes for this cluster.
4804
+ :param bool enabled: Enable Confidential GKE Nodes for this cluster, to
4805
+ enforce encryption of data in-use.
4789
4806
  """
4790
4807
  pulumi.set(__self__, "enabled", enabled)
4791
4808
 
@@ -4793,7 +4810,8 @@ class ClusterConfidentialNodes(dict):
4793
4810
  @pulumi.getter
4794
4811
  def enabled(self) -> bool:
4795
4812
  """
4796
- Enable Confidential Nodes for this cluster.
4813
+ Enable Confidential GKE Nodes for this cluster, to
4814
+ enforce encryption of data in-use.
4797
4815
  """
4798
4816
  return pulumi.get(self, "enabled")
4799
4817
 
@@ -5835,7 +5853,7 @@ class ClusterMonitoringConfig(dict):
5835
5853
  managed_prometheus: Optional['outputs.ClusterMonitoringConfigManagedPrometheus'] = None):
5836
5854
  """
5837
5855
  :param Sequence['ClusterMonitoringConfigAdvancedDatapathObservabilityConfigArgs'] advanced_datapath_observability_configs: Configuration for Advanced Datapath Monitoring. Structure is documented below.
5838
- :param Sequence[str] enable_components: The GKE components exposing metrics. Supported values include: `SYSTEM_COMPONENTS`, `APISERVER`, `CONTROLLER_MANAGER`, and `SCHEDULER`. In beta provider, `WORKLOADS` is supported on top of those 4 values. (`WORKLOADS` is deprecated and removed in GKE 1.24.)
5856
+ :param Sequence[str] enable_components: The GKE components exposing metrics. Supported values include: `SYSTEM_COMPONENTS`, `APISERVER`, `SCHEDULER`, `CONTROLLER_MANAGER`, `STORAGE`, `HPA`, `POD`, `DAEMONSET`, `DEPLOYMENT` and `STATEFULSET`. In beta provider, `WORKLOADS` is supported on top of those 10 values. (`WORKLOADS` is deprecated and removed in GKE 1.24.)
5839
5857
  :param 'ClusterMonitoringConfigManagedPrometheusArgs' managed_prometheus: Configuration for Managed Service for Prometheus. Structure is documented below.
5840
5858
  """
5841
5859
  if advanced_datapath_observability_configs is not None:
@@ -5857,7 +5875,7 @@ class ClusterMonitoringConfig(dict):
5857
5875
  @pulumi.getter(name="enableComponents")
5858
5876
  def enable_components(self) -> Optional[Sequence[str]]:
5859
5877
  """
5860
- The GKE components exposing metrics. Supported values include: `SYSTEM_COMPONENTS`, `APISERVER`, `CONTROLLER_MANAGER`, and `SCHEDULER`. In beta provider, `WORKLOADS` is supported on top of those 4 values. (`WORKLOADS` is deprecated and removed in GKE 1.24.)
5878
+ The GKE components exposing metrics. Supported values include: `SYSTEM_COMPONENTS`, `APISERVER`, `SCHEDULER`, `CONTROLLER_MANAGER`, `STORAGE`, `HPA`, `POD`, `DAEMONSET`, `DEPLOYMENT` and `STATEFULSET`. In beta provider, `WORKLOADS` is supported on top of those 10 values. (`WORKLOADS` is deprecated and removed in GKE 1.24.)
5861
5879
  """
5862
5880
  return pulumi.get(self, "enable_components")
5863
5881
 
@@ -5895,6 +5913,7 @@ class ClusterMonitoringConfigAdvancedDatapathObservabilityConfig(dict):
5895
5913
  enable_metrics: bool,
5896
5914
  relay_mode: Optional[str] = None):
5897
5915
  """
5916
+ :param bool enable_metrics: Whether or not to enable advanced datapath metrics.
5898
5917
  :param str relay_mode: Mode used to make Relay available.
5899
5918
  """
5900
5919
  pulumi.set(__self__, "enable_metrics", enable_metrics)
@@ -5904,6 +5923,9 @@ class ClusterMonitoringConfigAdvancedDatapathObservabilityConfig(dict):
5904
5923
  @property
5905
5924
  @pulumi.getter(name="enableMetrics")
5906
5925
  def enable_metrics(self) -> bool:
5926
+ """
5927
+ Whether or not to enable advanced datapath metrics.
5928
+ """
5907
5929
  return pulumi.get(self, "enable_metrics")
5908
5930
 
5909
5931
  @property
@@ -6633,7 +6655,8 @@ class ClusterNodeConfigConfidentialNodes(dict):
6633
6655
  def __init__(__self__, *,
6634
6656
  enabled: bool):
6635
6657
  """
6636
- :param bool enabled: Enable Confidential Nodes for this cluster.
6658
+ :param bool enabled: Enable Confidential GKE Nodes for this cluster, to
6659
+ enforce encryption of data in-use.
6637
6660
  """
6638
6661
  pulumi.set(__self__, "enabled", enabled)
6639
6662
 
@@ -6641,7 +6664,8 @@ class ClusterNodeConfigConfidentialNodes(dict):
6641
6664
  @pulumi.getter
6642
6665
  def enabled(self) -> bool:
6643
6666
  """
6644
- Enable Confidential Nodes for this cluster.
6667
+ Enable Confidential GKE Nodes for this cluster, to
6668
+ enforce encryption of data in-use.
6645
6669
  """
6646
6670
  return pulumi.get(self, "enabled")
6647
6671
 
@@ -8855,7 +8879,8 @@ class ClusterNodePoolNodeConfigConfidentialNodes(dict):
8855
8879
  def __init__(__self__, *,
8856
8880
  enabled: bool):
8857
8881
  """
8858
- :param bool enabled: Enable Confidential Nodes for this cluster.
8882
+ :param bool enabled: Enable Confidential GKE Nodes for this cluster, to
8883
+ enforce encryption of data in-use.
8859
8884
  """
8860
8885
  pulumi.set(__self__, "enabled", enabled)
8861
8886
 
@@ -8863,7 +8888,8 @@ class ClusterNodePoolNodeConfigConfidentialNodes(dict):
8863
8888
  @pulumi.getter
8864
8889
  def enabled(self) -> bool:
8865
8890
  """
8866
- Enable Confidential Nodes for this cluster.
8891
+ Enable Confidential GKE Nodes for this cluster, to
8892
+ enforce encryption of data in-use.
8867
8893
  """
8868
8894
  return pulumi.get(self, "enabled")
8869
8895
 
@@ -10536,6 +10562,7 @@ class ClusterTpuConfig(dict):
10536
10562
 
10537
10563
 
10538
10564
 
10565
+ enforce encryption of data in-use.
10539
10566
 
10540
10567
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
10541
10568
 
@@ -10562,6 +10589,7 @@ class ClusterTpuConfig(dict):
10562
10589
 
10563
10590
 
10564
10591
 
10592
+ enforce encryption of data in-use.
10565
10593
 
10566
10594
  If enabled, pods must be valid under a PodSecurityPolicy to be created.
10567
10595
 
@@ -11135,6 +11163,9 @@ class NodePoolNodeConfig(dict):
11135
11163
  tags: Optional[Sequence[str]] = None,
11136
11164
  taints: Optional[Sequence['outputs.NodePoolNodeConfigTaint']] = None,
11137
11165
  workload_metadata_config: Optional['outputs.NodePoolNodeConfigWorkloadMetadataConfig'] = None):
11166
+ """
11167
+ :param 'NodePoolNodeConfigConfidentialNodesArgs' confidential_nodes: Configuration for Confidential Nodes feature. Structure is documented below.
11168
+ """
11138
11169
  if advanced_machine_features is not None:
11139
11170
  pulumi.set(__self__, "advanced_machine_features", advanced_machine_features)
11140
11171
  if boot_disk_kms_key is not None:
@@ -11217,6 +11248,9 @@ class NodePoolNodeConfig(dict):
11217
11248
  @property
11218
11249
  @pulumi.getter(name="confidentialNodes")
11219
11250
  def confidential_nodes(self) -> Optional['outputs.NodePoolNodeConfigConfidentialNodes']:
11251
+ """
11252
+ Configuration for Confidential Nodes feature. Structure is documented below.
11253
+ """
11220
11254
  return pulumi.get(self, "confidential_nodes")
11221
11255
 
11222
11256
  @property
@@ -11408,11 +11442,19 @@ class NodePoolNodeConfigAdvancedMachineFeatures(dict):
11408
11442
  class NodePoolNodeConfigConfidentialNodes(dict):
11409
11443
  def __init__(__self__, *,
11410
11444
  enabled: bool):
11445
+ """
11446
+ :param bool enabled: Enable Confidential GKE Nodes for this cluster, to
11447
+ enforce encryption of data in-use.
11448
+ """
11411
11449
  pulumi.set(__self__, "enabled", enabled)
11412
11450
 
11413
11451
  @property
11414
11452
  @pulumi.getter
11415
11453
  def enabled(self) -> bool:
11454
+ """
11455
+ Enable Confidential GKE Nodes for this cluster, to
11456
+ enforce encryption of data in-use.
11457
+ """
11416
11458
  return pulumi.get(self, "enabled")
11417
11459
 
11418
11460
 
@@ -11478,11 +11520,19 @@ class NodePoolNodeConfigEphemeralStorageLocalSsdConfig(dict):
11478
11520
  class NodePoolNodeConfigGcfsConfig(dict):
11479
11521
  def __init__(__self__, *,
11480
11522
  enabled: bool):
11523
+ """
11524
+ :param bool enabled: Enable Confidential GKE Nodes for this cluster, to
11525
+ enforce encryption of data in-use.
11526
+ """
11481
11527
  pulumi.set(__self__, "enabled", enabled)
11482
11528
 
11483
11529
  @property
11484
11530
  @pulumi.getter
11485
11531
  def enabled(self) -> bool:
11532
+ """
11533
+ Enable Confidential GKE Nodes for this cluster, to
11534
+ enforce encryption of data in-use.
11535
+ """
11486
11536
  return pulumi.get(self, "enabled")
11487
11537
 
11488
11538
 
@@ -11631,11 +11681,19 @@ class NodePoolNodeConfigGuestAcceleratorGpuSharingConfig(dict):
11631
11681
  class NodePoolNodeConfigGvnic(dict):
11632
11682
  def __init__(__self__, *,
11633
11683
  enabled: bool):
11684
+ """
11685
+ :param bool enabled: Enable Confidential GKE Nodes for this cluster, to
11686
+ enforce encryption of data in-use.
11687
+ """
11634
11688
  pulumi.set(__self__, "enabled", enabled)
11635
11689
 
11636
11690
  @property
11637
11691
  @pulumi.getter
11638
11692
  def enabled(self) -> bool:
11693
+ """
11694
+ Enable Confidential GKE Nodes for this cluster, to
11695
+ enforce encryption of data in-use.
11696
+ """
11639
11697
  return pulumi.get(self, "enabled")
11640
11698
 
11641
11699
 
@@ -20,6 +20,7 @@ class ScopeRbacRoleBindingArgs:
20
20
  scope_id: pulumi.Input[str],
21
21
  scope_rbac_role_binding_id: pulumi.Input[str],
22
22
  group: Optional[pulumi.Input[str]] = None,
23
+ labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
23
24
  project: Optional[pulumi.Input[str]] = None,
24
25
  user: Optional[pulumi.Input[str]] = None):
25
26
  """
@@ -31,6 +32,7 @@ class ScopeRbacRoleBindingArgs:
31
32
  :param pulumi.Input[str] group: Principal that is be authorized in the cluster (at least of one the oneof
32
33
  is required). Updating one will unset the other automatically.
33
34
  group is the group, as seen by the kubernetes cluster.
35
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] labels: Labels for this ScopeRBACRoleBinding.
34
36
  :param pulumi.Input[str] project: The ID of the project in which the resource belongs.
35
37
  If it is not provided, the provider project is used.
36
38
  :param pulumi.Input[str] user: Principal that is be authorized in the cluster (at least of one the oneof
@@ -43,6 +45,8 @@ class ScopeRbacRoleBindingArgs:
43
45
  pulumi.set(__self__, "scope_rbac_role_binding_id", scope_rbac_role_binding_id)
44
46
  if group is not None:
45
47
  pulumi.set(__self__, "group", group)
48
+ if labels is not None:
49
+ pulumi.set(__self__, "labels", labels)
46
50
  if project is not None:
47
51
  pulumi.set(__self__, "project", project)
48
52
  if user is not None:
@@ -99,6 +103,18 @@ class ScopeRbacRoleBindingArgs:
99
103
  def group(self, value: Optional[pulumi.Input[str]]):
100
104
  pulumi.set(self, "group", value)
101
105
 
106
+ @property
107
+ @pulumi.getter
108
+ def labels(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
109
+ """
110
+ Labels for this ScopeRBACRoleBinding.
111
+ """
112
+ return pulumi.get(self, "labels")
113
+
114
+ @labels.setter
115
+ def labels(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
116
+ pulumi.set(self, "labels", value)
117
+
102
118
  @property
103
119
  @pulumi.getter
104
120
  def project(self) -> Optional[pulumi.Input[str]]:
@@ -134,6 +150,7 @@ class _ScopeRbacRoleBindingState:
134
150
  create_time: Optional[pulumi.Input[str]] = None,
135
151
  delete_time: Optional[pulumi.Input[str]] = None,
136
152
  group: Optional[pulumi.Input[str]] = None,
153
+ labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
137
154
  name: Optional[pulumi.Input[str]] = None,
138
155
  project: Optional[pulumi.Input[str]] = None,
139
156
  role: Optional[pulumi.Input['ScopeRbacRoleBindingRoleArgs']] = None,
@@ -150,6 +167,7 @@ class _ScopeRbacRoleBindingState:
150
167
  :param pulumi.Input[str] group: Principal that is be authorized in the cluster (at least of one the oneof
151
168
  is required). Updating one will unset the other automatically.
152
169
  group is the group, as seen by the kubernetes cluster.
170
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] labels: Labels for this ScopeRBACRoleBinding.
153
171
  :param pulumi.Input[str] name: The resource name for the RBAC Role Binding
154
172
  :param pulumi.Input[str] project: The ID of the project in which the resource belongs.
155
173
  If it is not provided, the provider project is used.
@@ -172,6 +190,8 @@ class _ScopeRbacRoleBindingState:
172
190
  pulumi.set(__self__, "delete_time", delete_time)
173
191
  if group is not None:
174
192
  pulumi.set(__self__, "group", group)
193
+ if labels is not None:
194
+ pulumi.set(__self__, "labels", labels)
175
195
  if name is not None:
176
196
  pulumi.set(__self__, "name", name)
177
197
  if project is not None:
@@ -229,6 +249,18 @@ class _ScopeRbacRoleBindingState:
229
249
  def group(self, value: Optional[pulumi.Input[str]]):
230
250
  pulumi.set(self, "group", value)
231
251
 
252
+ @property
253
+ @pulumi.getter
254
+ def labels(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
255
+ """
256
+ Labels for this ScopeRBACRoleBinding.
257
+ """
258
+ return pulumi.get(self, "labels")
259
+
260
+ @labels.setter
261
+ def labels(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
262
+ pulumi.set(self, "labels", value)
263
+
232
264
  @property
233
265
  @pulumi.getter
234
266
  def name(self) -> Optional[pulumi.Input[str]]:
@@ -350,6 +382,7 @@ class ScopeRbacRoleBinding(pulumi.CustomResource):
350
382
  resource_name: str,
351
383
  opts: Optional[pulumi.ResourceOptions] = None,
352
384
  group: Optional[pulumi.Input[str]] = None,
385
+ labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
353
386
  project: Optional[pulumi.Input[str]] = None,
354
387
  role: Optional[pulumi.Input[pulumi.InputType['ScopeRbacRoleBindingRoleArgs']]] = None,
355
388
  scope_id: Optional[pulumi.Input[str]] = None,
@@ -388,6 +421,7 @@ class ScopeRbacRoleBinding(pulumi.CustomResource):
388
421
  :param pulumi.Input[str] group: Principal that is be authorized in the cluster (at least of one the oneof
389
422
  is required). Updating one will unset the other automatically.
390
423
  group is the group, as seen by the kubernetes cluster.
424
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] labels: Labels for this ScopeRBACRoleBinding.
391
425
  :param pulumi.Input[str] project: The ID of the project in which the resource belongs.
392
426
  If it is not provided, the provider project is used.
393
427
  :param pulumi.Input[pulumi.InputType['ScopeRbacRoleBindingRoleArgs']] role: Role to bind to the principal.
@@ -448,6 +482,7 @@ class ScopeRbacRoleBinding(pulumi.CustomResource):
448
482
  resource_name: str,
449
483
  opts: Optional[pulumi.ResourceOptions] = None,
450
484
  group: Optional[pulumi.Input[str]] = None,
485
+ labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
451
486
  project: Optional[pulumi.Input[str]] = None,
452
487
  role: Optional[pulumi.Input[pulumi.InputType['ScopeRbacRoleBindingRoleArgs']]] = None,
453
488
  scope_id: Optional[pulumi.Input[str]] = None,
@@ -463,6 +498,7 @@ class ScopeRbacRoleBinding(pulumi.CustomResource):
463
498
  __props__ = ScopeRbacRoleBindingArgs.__new__(ScopeRbacRoleBindingArgs)
464
499
 
465
500
  __props__.__dict__["group"] = group
501
+ __props__.__dict__["labels"] = labels
466
502
  __props__.__dict__["project"] = project
467
503
  if role is None and not opts.urn:
468
504
  raise TypeError("Missing required property 'role'")
@@ -493,6 +529,7 @@ class ScopeRbacRoleBinding(pulumi.CustomResource):
493
529
  create_time: Optional[pulumi.Input[str]] = None,
494
530
  delete_time: Optional[pulumi.Input[str]] = None,
495
531
  group: Optional[pulumi.Input[str]] = None,
532
+ labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
496
533
  name: Optional[pulumi.Input[str]] = None,
497
534
  project: Optional[pulumi.Input[str]] = None,
498
535
  role: Optional[pulumi.Input[pulumi.InputType['ScopeRbacRoleBindingRoleArgs']]] = None,
@@ -514,6 +551,7 @@ class ScopeRbacRoleBinding(pulumi.CustomResource):
514
551
  :param pulumi.Input[str] group: Principal that is be authorized in the cluster (at least of one the oneof
515
552
  is required). Updating one will unset the other automatically.
516
553
  group is the group, as seen by the kubernetes cluster.
554
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] labels: Labels for this ScopeRBACRoleBinding.
517
555
  :param pulumi.Input[str] name: The resource name for the RBAC Role Binding
518
556
  :param pulumi.Input[str] project: The ID of the project in which the resource belongs.
519
557
  If it is not provided, the provider project is used.
@@ -537,6 +575,7 @@ class ScopeRbacRoleBinding(pulumi.CustomResource):
537
575
  __props__.__dict__["create_time"] = create_time
538
576
  __props__.__dict__["delete_time"] = delete_time
539
577
  __props__.__dict__["group"] = group
578
+ __props__.__dict__["labels"] = labels
540
579
  __props__.__dict__["name"] = name
541
580
  __props__.__dict__["project"] = project
542
581
  __props__.__dict__["role"] = role
@@ -574,6 +613,14 @@ class ScopeRbacRoleBinding(pulumi.CustomResource):
574
613
  """
575
614
  return pulumi.get(self, "group")
576
615
 
616
+ @property
617
+ @pulumi.getter
618
+ def labels(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
619
+ """
620
+ Labels for this ScopeRBACRoleBinding.
621
+ """
622
+ return pulumi.get(self, "labels")
623
+
577
624
  @property
578
625
  @pulumi.getter
579
626
  def name(self) -> pulumi.Output[str]:
@@ -241,13 +241,18 @@ class ServiceConnectionPolicyPscConnectionArgs:
241
241
  class ServiceConnectionPolicyPscConnectionErrorArgs:
242
242
  def __init__(__self__, *,
243
243
  code: Optional[pulumi.Input[int]] = None,
244
+ details: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, Any]]]]] = None,
244
245
  message: Optional[pulumi.Input[str]] = None):
245
246
  """
246
247
  :param pulumi.Input[int] code: The status code, which should be an enum value of [google.rpc.Code][].
248
+ :param pulumi.Input[Sequence[pulumi.Input[Mapping[str, Any]]]] details: (Output)
249
+ A list of messages that carry the error details.
247
250
  :param pulumi.Input[str] message: A developer-facing error message.
248
251
  """
249
252
  if code is not None:
250
253
  pulumi.set(__self__, "code", code)
254
+ if details is not None:
255
+ pulumi.set(__self__, "details", details)
251
256
  if message is not None:
252
257
  pulumi.set(__self__, "message", message)
253
258
 
@@ -263,6 +268,19 @@ class ServiceConnectionPolicyPscConnectionErrorArgs:
263
268
  def code(self, value: Optional[pulumi.Input[int]]):
264
269
  pulumi.set(self, "code", value)
265
270
 
271
+ @property
272
+ @pulumi.getter
273
+ def details(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, Any]]]]]:
274
+ """
275
+ (Output)
276
+ A list of messages that carry the error details.
277
+ """
278
+ return pulumi.get(self, "details")
279
+
280
+ @details.setter
281
+ def details(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, Any]]]]]):
282
+ pulumi.set(self, "details", value)
283
+
266
284
  @property
267
285
  @pulumi.getter
268
286
  def message(self) -> Optional[pulumi.Input[str]]:
@@ -223,13 +223,18 @@ class ServiceConnectionPolicyPscConnection(dict):
223
223
  class ServiceConnectionPolicyPscConnectionError(dict):
224
224
  def __init__(__self__, *,
225
225
  code: Optional[int] = None,
226
+ details: Optional[Sequence[Mapping[str, Any]]] = None,
226
227
  message: Optional[str] = None):
227
228
  """
228
229
  :param int code: The status code, which should be an enum value of [google.rpc.Code][].
230
+ :param Sequence[Mapping[str, Any]] details: (Output)
231
+ A list of messages that carry the error details.
229
232
  :param str message: A developer-facing error message.
230
233
  """
231
234
  if code is not None:
232
235
  pulumi.set(__self__, "code", code)
236
+ if details is not None:
237
+ pulumi.set(__self__, "details", details)
233
238
  if message is not None:
234
239
  pulumi.set(__self__, "message", message)
235
240
 
@@ -241,6 +246,15 @@ class ServiceConnectionPolicyPscConnectionError(dict):
241
246
  """
242
247
  return pulumi.get(self, "code")
243
248
 
249
+ @property
250
+ @pulumi.getter
251
+ def details(self) -> Optional[Sequence[Mapping[str, Any]]]:
252
+ """
253
+ (Output)
254
+ A list of messages that carry the error details.
255
+ """
256
+ return pulumi.get(self, "details")
257
+
244
258
  @property
245
259
  @pulumi.getter
246
260
  def message(self) -> Optional[str]:
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: pulumi-gcp
3
- Version: 6.66.0a1694816867
3
+ Version: 6.66.0a1695056297
4
4
  Summary: A Pulumi package for creating and managing Google Cloud Platform resources.
5
5
  License: Apache-2.0
6
6
  Project-URL: Homepage, https://pulumi.io
@@ -392,7 +392,7 @@ pulumi_gcp/compute/get_node_types.py,sha256=sfU1aLxX6EGeu8_Cd0Jm2exjvGJSJPafVkUD
392
392
  pulumi_gcp/compute/get_region_backend_service_iam_policy.py,sha256=VXXqfAp7ZjNcwBRG4gWQ-TpR_CBHnn975fGwyVwsNc4,6680
393
393
  pulumi_gcp/compute/get_region_disk_iam_policy.py,sha256=tfaHpAhJsNoZRFN3aGAmSK02QCsbsUaMy4YlJoXw3oU,6871
394
394
  pulumi_gcp/compute/get_region_instance_group.py,sha256=Dnr5CSCalpIH5D7sV8O4NDbrj7nO1MHBoA-X9io54X8,7838
395
- pulumi_gcp/compute/get_region_instance_template.py,sha256=dkO6ldMS5ujmX7UVHoQQ3006aaVBRvWQfPC7LVB9jX0,24433
395
+ pulumi_gcp/compute/get_region_instance_template.py,sha256=XkWC5eC-KIrFqpreVekm_KASOiudXGB4KuoGvidnqeo,25007
396
396
  pulumi_gcp/compute/get_region_network_endpoint_group.py,sha256=UQOLzg1vPxdzzzPWrpaBLypTDv9gkDghu116ymbmHMQ,11507
397
397
  pulumi_gcp/compute/get_region_ssl_certificate.py,sha256=D_kRMwkS9_7VeUPJOG_KnIpuNPai10JwvAZ8aHQLml0,8720
398
398
  pulumi_gcp/compute/get_regions.py,sha256=Z4V3g2P9cqMrbdhJq2Ii-YAM0wrgrDiNrVL7FmUt5FI,5140
@@ -524,7 +524,7 @@ pulumi_gcp/config/__init__.py,sha256=cfY0smRZD3fDVc93ZIAxEl_IM2pynmXB52n3Ahzi030
524
524
  pulumi_gcp/config/outputs.py,sha256=NX6HQIexmUVsFBMqvoZH1PzCrkfy582L5E5CHWVLmqs,1060
525
525
  pulumi_gcp/config/vars.py,sha256=0PYHOgX976gXPcJDVPafR3UFSls1FYb5twJqHxtNbyg,20330
526
526
  pulumi_gcp/container/__init__.py,sha256=KbuEacj9tsLxH3rVHSnPd3VtGOOnpdgVgv-Fq0o_Ll4,845
527
- pulumi_gcp/container/_inputs.py,sha256=e93PXZ2t-rpdLvH4FFfKr6S04XAtnXyXEse_6SDLv2o,532339
527
+ pulumi_gcp/container/_inputs.py,sha256=ksQ7CMV7fJQ62FRdeYXh9JDUtgJg3oGDX8NvBJWSgRI,535000
528
528
  pulumi_gcp/container/attached_cluster.py,sha256=0dgFKHFJQnOiEIDyHvKjfz9_3QiMOoPbldVp8p_RmXM,59758
529
529
  pulumi_gcp/container/aws_cluster.py,sha256=JFEV2g_2Z_JeDohbXwOcjseaZOVjcoow45wfPQpacqc,65250
530
530
  pulumi_gcp/container/aws_node_pool.py,sha256=wcR6p4DKZqMLtG6566jK6GbEcjPstVYQOkeJgrx5J50,72010
@@ -541,7 +541,7 @@ pulumi_gcp/container/get_engine_versions.py,sha256=Hk9eC0xG6KAl66vrGpShBWgkciYMu
541
541
  pulumi_gcp/container/get_registry_image.py,sha256=BK2v8NjiPMfRdXiuhJauP4H0otPr9xYzZJmDJNyidtQ,6992
542
542
  pulumi_gcp/container/get_registry_repository.py,sha256=8j5cl1J9lQtItliF6Cjayatzqclp7-9PDwEX1bo8-uM,5353
543
543
  pulumi_gcp/container/node_pool.py,sha256=X9iENLoK-uD4DH1zlXBo32ei_KeyF496VBqYYtPOlKo,67370
544
- pulumi_gcp/container/outputs.py,sha256=Ly5BPdchVzNXMTW4ZRTpJ5OWyoYbQLSWb8gtOl07s0Y,650424
544
+ pulumi_gcp/container/outputs.py,sha256=CkAe-kJl36yeqL940WLnLoO7KNG1Dvf_BcEl8fDznbo,653015
545
545
  pulumi_gcp/container/registry.py,sha256=5GWPN8eMmNsSUYKEtxFo5pfpLwT5cBza0U3oWkYU0JQ,13113
546
546
  pulumi_gcp/containeranalysis/__init__.py,sha256=gENWQXPC0oV7t5uEv6IgscsCOVeXKa7AHewwOiVIgek,488
547
547
  pulumi_gcp/containeranalysis/_inputs.py,sha256=1yTLGmL7agpwp0maJz0rEzueNmb9QOpSEcdah1zfBus,12213
@@ -820,7 +820,7 @@ pulumi_gcp/gkehub/scope.py,sha256=t9wNBMRusmte9bIPZj8hX_czPvMEaM1jStNntktjKuM,16
820
820
  pulumi_gcp/gkehub/scope_iam_binding.py,sha256=RJ86BR-zWitLGuJaJ92h7lE3W_tOocLLOz2bkFLn3Bg,33077
821
821
  pulumi_gcp/gkehub/scope_iam_member.py,sha256=L6nTxpgYVr5iHkiSBUxV4jTqWXm8Qg1c9wN7VPYmqBU,32781
822
822
  pulumi_gcp/gkehub/scope_iam_policy.py,sha256=dEd36-RoVG88r_vJrUffX9F-HF6dveCM4gj_dAdD9Zk,29289
823
- pulumi_gcp/gkehub/scope_rbac_role_binding.py,sha256=i-OH4yXvl1WGmAvb4KpO4pB0l5g3u-l5ucEQKxu85Nk,28092
823
+ pulumi_gcp/gkehub/scope_rbac_role_binding.py,sha256=PJ0qFxjxKudGXQTNINrnb7d4Ma3FGqs4hZK8O7Ilmys,30184
824
824
  pulumi_gcp/gkeonprem/__init__.py,sha256=Mvd41ZaItFnzM4iQtQTqhAwcPeZ-cpWq1hjgdvBi_e8,488
825
825
  pulumi_gcp/gkeonprem/_inputs.py,sha256=1uPKIZRXltZKOm8UjsFLU5eIJL4ORhiNUVo6Hc0EvHM,267956
826
826
  pulumi_gcp/gkeonprem/bare_metal_admin_cluster.py,sha256=O0hmdkNEAp1wMra65DIYAtILBmI7TlXSCxjnInN3wZI,88129
@@ -1009,9 +1009,9 @@ pulumi_gcp/monitoring/outputs.py,sha256=8zroIHKr_x4nAYynhAG3xZ3G1362G7Rlcb42G6E9
1009
1009
  pulumi_gcp/monitoring/slo.py,sha256=_qqB8jd5AEtMllQnSS-mzLtjgCT31w3NhddPuPoPXG4,48548
1010
1010
  pulumi_gcp/monitoring/uptime_check_config.py,sha256=XY40sZKJoHauyaGC_UWiaD2jjchkpL8rF_8FvRHZ5HU,61618
1011
1011
  pulumi_gcp/networkconnectivity/__init__.py,sha256=8uArcrOhPk7Cua1jwPiKICpLALh8FKJT2ksLsvVtDRU,395
1012
- pulumi_gcp/networkconnectivity/_inputs.py,sha256=jf3zA6Y3DQxoYHdHoJ7vDVR-WaKDYGpJ3PBjvnue3d8,19466
1012
+ pulumi_gcp/networkconnectivity/_inputs.py,sha256=j4ATUlyw0rKCZpcbWHz-4rHMnMsoVn8y_wtW9LLcuuU,20232
1013
1013
  pulumi_gcp/networkconnectivity/hub.py,sha256=g7E0iQNVkgW7CiAVf_Ip0o0aZX5VKV94fmDdka9mnRw,22418
1014
- pulumi_gcp/networkconnectivity/outputs.py,sha256=It4LMr82Fm2UGXDkI04V7Xjfw26HLwLZQZ6si14up_A,18386
1014
+ pulumi_gcp/networkconnectivity/outputs.py,sha256=E4B3ftnUVOPiv4H0U3YzfY2tPL-CU7yvzd_C0yBIbh4,18907
1015
1015
  pulumi_gcp/networkconnectivity/service_connection_policy.py,sha256=eLqTrOO2CbeVnzSdxJVeqEIxKVvGeET7O7QymW1uy7Y,35126
1016
1016
  pulumi_gcp/networkconnectivity/spoke.py,sha256=JpbIE-OkXL4BqMbRw29a84z6lH43KNfcqf8lU0x8NCI,36670
1017
1017
  pulumi_gcp/networkmanagement/__init__.py,sha256=w0jJqOXlyUgN1FT_j4bGJV6EBhRPAJG4ZTKByZy5kUE,347
@@ -1350,7 +1350,7 @@ pulumi_gcp/workstations/workstation_config_iam_policy.py,sha256=ZS9JWOhvwHgpZdI1
1350
1350
  pulumi_gcp/workstations/workstation_iam_binding.py,sha256=sLyb9vNFrG9sh_1uGiWddwbZFGLtaj5JGY31oh-SwS8,35727
1351
1351
  pulumi_gcp/workstations/workstation_iam_member.py,sha256=QOR7nZrcFdheKQrUxv6gOj74o1QZwiGcTxXvKTIWArY,35431
1352
1352
  pulumi_gcp/workstations/workstation_iam_policy.py,sha256=t_pyrWOuX9A4kuJ3IV9S7Qg4Xb8zRRCzRDdatPshlIU,31795
1353
- pulumi_gcp-6.66.0a1694816867.dist-info/METADATA,sha256=asIf1mqbPuoMBOLJSxTUJP5mE2GFHv0KM2h25i7bDbc,2662
1354
- pulumi_gcp-6.66.0a1694816867.dist-info/WHEEL,sha256=yQN5g4mg4AybRjkgi-9yy4iQEFibGQmlz78Pik5Or-A,92
1355
- pulumi_gcp-6.66.0a1694816867.dist-info/top_level.txt,sha256=acmDGVRVMJWpVhhj-l-aHbZ7mrvmzjmUeqRyCN8nnjM,11
1356
- pulumi_gcp-6.66.0a1694816867.dist-info/RECORD,,
1353
+ pulumi_gcp-6.66.0a1695056297.dist-info/METADATA,sha256=FjMGVuG7TfIDiwrRXXh42_pB9duAvz6q2SOyBzRudYY,2662
1354
+ pulumi_gcp-6.66.0a1695056297.dist-info/WHEEL,sha256=yQN5g4mg4AybRjkgi-9yy4iQEFibGQmlz78Pik5Or-A,92
1355
+ pulumi_gcp-6.66.0a1695056297.dist-info/top_level.txt,sha256=acmDGVRVMJWpVhhj-l-aHbZ7mrvmzjmUeqRyCN8nnjM,11
1356
+ pulumi_gcp-6.66.0a1695056297.dist-info/RECORD,,