pulumi-gcp 6.66.0a1694816867__py3-none-any.whl → 6.66.0a1695056297__py3-none-any.whl
Sign up to get free protection for your applications and to get access to all the features.
- pulumi_gcp/compute/get_region_instance_template.py +10 -0
- pulumi_gcp/container/_inputs.py +66 -8
- pulumi_gcp/container/outputs.py +66 -8
- pulumi_gcp/gkehub/scope_rbac_role_binding.py +47 -0
- pulumi_gcp/networkconnectivity/_inputs.py +18 -0
- pulumi_gcp/networkconnectivity/outputs.py +14 -0
- {pulumi_gcp-6.66.0a1694816867.dist-info → pulumi_gcp-6.66.0a1695056297.dist-info}/METADATA +1 -1
- {pulumi_gcp-6.66.0a1694816867.dist-info → pulumi_gcp-6.66.0a1695056297.dist-info}/RECORD +10 -10
- {pulumi_gcp-6.66.0a1694816867.dist-info → pulumi_gcp-6.66.0a1695056297.dist-info}/WHEEL +0 -0
- {pulumi_gcp-6.66.0a1694816867.dist-info → pulumi_gcp-6.66.0a1695056297.dist-info}/top_level.txt +0 -0
@@ -412,6 +412,11 @@ def get_region_instance_template(filter: Optional[str] = None,
|
|
412
412
|
region: Optional[str] = None,
|
413
413
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetRegionInstanceTemplateResult:
|
414
414
|
"""
|
415
|
+
Get information about a VM instance template resource within GCE. For more information see
|
416
|
+
[the official documentation](https://cloud.google.com/compute/docs/instance-templates)
|
417
|
+
and
|
418
|
+
[API](https://cloud.google.com/compute/docs/reference/rest/v1/regionInstanceTemplates).
|
419
|
+
|
415
420
|
## Example Usage
|
416
421
|
|
417
422
|
```python
|
@@ -485,6 +490,11 @@ def get_region_instance_template_output(filter: Optional[pulumi.Input[Optional[s
|
|
485
490
|
region: Optional[pulumi.Input[Optional[str]]] = None,
|
486
491
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetRegionInstanceTemplateResult]:
|
487
492
|
"""
|
493
|
+
Get information about a VM instance template resource within GCE. For more information see
|
494
|
+
[the official documentation](https://cloud.google.com/compute/docs/instance-templates)
|
495
|
+
and
|
496
|
+
[API](https://cloud.google.com/compute/docs/reference/rest/v1/regionInstanceTemplates).
|
497
|
+
|
488
498
|
## Example Usage
|
489
499
|
|
490
500
|
```python
|
pulumi_gcp/container/_inputs.py
CHANGED
@@ -3077,6 +3077,7 @@ class ClusterAddonsConfigConfigConnectorConfigArgs:
|
|
3077
3077
|
|
3078
3078
|
|
3079
3079
|
|
3080
|
+
enforce encryption of data in-use.
|
3080
3081
|
|
3081
3082
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3082
3083
|
|
@@ -3099,6 +3100,7 @@ class ClusterAddonsConfigConfigConnectorConfigArgs:
|
|
3099
3100
|
|
3100
3101
|
|
3101
3102
|
|
3103
|
+
enforce encryption of data in-use.
|
3102
3104
|
|
3103
3105
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3104
3106
|
|
@@ -3127,6 +3129,7 @@ class ClusterAddonsConfigDnsCacheConfigArgs:
|
|
3127
3129
|
|
3128
3130
|
|
3129
3131
|
|
3132
|
+
enforce encryption of data in-use.
|
3130
3133
|
|
3131
3134
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3132
3135
|
|
@@ -3149,6 +3152,7 @@ class ClusterAddonsConfigDnsCacheConfigArgs:
|
|
3149
3152
|
|
3150
3153
|
|
3151
3154
|
|
3155
|
+
enforce encryption of data in-use.
|
3152
3156
|
|
3153
3157
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3154
3158
|
|
@@ -3177,6 +3181,7 @@ class ClusterAddonsConfigGcePersistentDiskCsiDriverConfigArgs:
|
|
3177
3181
|
|
3178
3182
|
|
3179
3183
|
|
3184
|
+
enforce encryption of data in-use.
|
3180
3185
|
|
3181
3186
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3182
3187
|
|
@@ -3199,6 +3204,7 @@ class ClusterAddonsConfigGcePersistentDiskCsiDriverConfigArgs:
|
|
3199
3204
|
|
3200
3205
|
|
3201
3206
|
|
3207
|
+
enforce encryption of data in-use.
|
3202
3208
|
|
3203
3209
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3204
3210
|
|
@@ -3227,6 +3233,7 @@ class ClusterAddonsConfigGcpFilestoreCsiDriverConfigArgs:
|
|
3227
3233
|
|
3228
3234
|
|
3229
3235
|
|
3236
|
+
enforce encryption of data in-use.
|
3230
3237
|
|
3231
3238
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3232
3239
|
|
@@ -3249,6 +3256,7 @@ class ClusterAddonsConfigGcpFilestoreCsiDriverConfigArgs:
|
|
3249
3256
|
|
3250
3257
|
|
3251
3258
|
|
3259
|
+
enforce encryption of data in-use.
|
3252
3260
|
|
3253
3261
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3254
3262
|
|
@@ -3277,6 +3285,7 @@ class ClusterAddonsConfigGcsFuseCsiDriverConfigArgs:
|
|
3277
3285
|
|
3278
3286
|
|
3279
3287
|
|
3288
|
+
enforce encryption of data in-use.
|
3280
3289
|
|
3281
3290
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3282
3291
|
|
@@ -3299,6 +3308,7 @@ class ClusterAddonsConfigGcsFuseCsiDriverConfigArgs:
|
|
3299
3308
|
|
3300
3309
|
|
3301
3310
|
|
3311
|
+
enforce encryption of data in-use.
|
3302
3312
|
|
3303
3313
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3304
3314
|
|
@@ -3327,6 +3337,7 @@ class ClusterAddonsConfigGkeBackupAgentConfigArgs:
|
|
3327
3337
|
|
3328
3338
|
|
3329
3339
|
|
3340
|
+
enforce encryption of data in-use.
|
3330
3341
|
|
3331
3342
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3332
3343
|
|
@@ -3349,6 +3360,7 @@ class ClusterAddonsConfigGkeBackupAgentConfigArgs:
|
|
3349
3360
|
|
3350
3361
|
|
3351
3362
|
|
3363
|
+
enforce encryption of data in-use.
|
3352
3364
|
|
3353
3365
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3354
3366
|
|
@@ -3469,6 +3481,7 @@ class ClusterAddonsConfigKalmConfigArgs:
|
|
3469
3481
|
|
3470
3482
|
|
3471
3483
|
|
3484
|
+
enforce encryption of data in-use.
|
3472
3485
|
|
3473
3486
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3474
3487
|
|
@@ -3491,6 +3504,7 @@ class ClusterAddonsConfigKalmConfigArgs:
|
|
3491
3504
|
|
3492
3505
|
|
3493
3506
|
|
3507
|
+
enforce encryption of data in-use.
|
3494
3508
|
|
3495
3509
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3496
3510
|
|
@@ -3568,6 +3582,7 @@ class ClusterBinaryAuthorizationArgs:
|
|
3568
3582
|
|
3569
3583
|
|
3570
3584
|
|
3585
|
+
enforce encryption of data in-use.
|
3571
3586
|
|
3572
3587
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3573
3588
|
|
@@ -3599,6 +3614,7 @@ class ClusterBinaryAuthorizationArgs:
|
|
3599
3614
|
|
3600
3615
|
|
3601
3616
|
|
3617
|
+
enforce encryption of data in-use.
|
3602
3618
|
|
3603
3619
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3604
3620
|
|
@@ -4281,7 +4297,8 @@ class ClusterConfidentialNodesArgs:
|
|
4281
4297
|
def __init__(__self__, *,
|
4282
4298
|
enabled: pulumi.Input[bool]):
|
4283
4299
|
"""
|
4284
|
-
:param pulumi.Input[bool] enabled: Enable Confidential Nodes for this cluster
|
4300
|
+
:param pulumi.Input[bool] enabled: Enable Confidential GKE Nodes for this cluster, to
|
4301
|
+
enforce encryption of data in-use.
|
4285
4302
|
"""
|
4286
4303
|
pulumi.set(__self__, "enabled", enabled)
|
4287
4304
|
|
@@ -4289,7 +4306,8 @@ class ClusterConfidentialNodesArgs:
|
|
4289
4306
|
@pulumi.getter
|
4290
4307
|
def enabled(self) -> pulumi.Input[bool]:
|
4291
4308
|
"""
|
4292
|
-
Enable Confidential Nodes for this cluster
|
4309
|
+
Enable Confidential GKE Nodes for this cluster, to
|
4310
|
+
enforce encryption of data in-use.
|
4293
4311
|
"""
|
4294
4312
|
return pulumi.get(self, "enabled")
|
4295
4313
|
|
@@ -5193,7 +5211,7 @@ class ClusterMonitoringConfigArgs:
|
|
5193
5211
|
managed_prometheus: Optional[pulumi.Input['ClusterMonitoringConfigManagedPrometheusArgs']] = None):
|
5194
5212
|
"""
|
5195
5213
|
:param pulumi.Input[Sequence[pulumi.Input['ClusterMonitoringConfigAdvancedDatapathObservabilityConfigArgs']]] advanced_datapath_observability_configs: Configuration for Advanced Datapath Monitoring. Structure is documented below.
|
5196
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] enable_components: The GKE components exposing metrics. Supported values include: `SYSTEM_COMPONENTS`, `APISERVER`, `CONTROLLER_MANAGER`, and `
|
5214
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] enable_components: The GKE components exposing metrics. Supported values include: `SYSTEM_COMPONENTS`, `APISERVER`, `SCHEDULER`, `CONTROLLER_MANAGER`, `STORAGE`, `HPA`, `POD`, `DAEMONSET`, `DEPLOYMENT` and `STATEFULSET`. In beta provider, `WORKLOADS` is supported on top of those 10 values. (`WORKLOADS` is deprecated and removed in GKE 1.24.)
|
5197
5215
|
:param pulumi.Input['ClusterMonitoringConfigManagedPrometheusArgs'] managed_prometheus: Configuration for Managed Service for Prometheus. Structure is documented below.
|
5198
5216
|
"""
|
5199
5217
|
if advanced_datapath_observability_configs is not None:
|
@@ -5219,7 +5237,7 @@ class ClusterMonitoringConfigArgs:
|
|
5219
5237
|
@pulumi.getter(name="enableComponents")
|
5220
5238
|
def enable_components(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
5221
5239
|
"""
|
5222
|
-
The GKE components exposing metrics. Supported values include: `SYSTEM_COMPONENTS`, `APISERVER`, `CONTROLLER_MANAGER`, and `
|
5240
|
+
The GKE components exposing metrics. Supported values include: `SYSTEM_COMPONENTS`, `APISERVER`, `SCHEDULER`, `CONTROLLER_MANAGER`, `STORAGE`, `HPA`, `POD`, `DAEMONSET`, `DEPLOYMENT` and `STATEFULSET`. In beta provider, `WORKLOADS` is supported on top of those 10 values. (`WORKLOADS` is deprecated and removed in GKE 1.24.)
|
5223
5241
|
"""
|
5224
5242
|
return pulumi.get(self, "enable_components")
|
5225
5243
|
|
@@ -5246,6 +5264,7 @@ class ClusterMonitoringConfigAdvancedDatapathObservabilityConfigArgs:
|
|
5246
5264
|
enable_metrics: pulumi.Input[bool],
|
5247
5265
|
relay_mode: Optional[pulumi.Input[str]] = None):
|
5248
5266
|
"""
|
5267
|
+
:param pulumi.Input[bool] enable_metrics: Whether or not to enable advanced datapath metrics.
|
5249
5268
|
:param pulumi.Input[str] relay_mode: Mode used to make Relay available.
|
5250
5269
|
"""
|
5251
5270
|
pulumi.set(__self__, "enable_metrics", enable_metrics)
|
@@ -5255,6 +5274,9 @@ class ClusterMonitoringConfigAdvancedDatapathObservabilityConfigArgs:
|
|
5255
5274
|
@property
|
5256
5275
|
@pulumi.getter(name="enableMetrics")
|
5257
5276
|
def enable_metrics(self) -> pulumi.Input[bool]:
|
5277
|
+
"""
|
5278
|
+
Whether or not to enable advanced datapath metrics.
|
5279
|
+
"""
|
5258
5280
|
return pulumi.get(self, "enable_metrics")
|
5259
5281
|
|
5260
5282
|
@enable_metrics.setter
|
@@ -6058,7 +6080,8 @@ class ClusterNodeConfigConfidentialNodesArgs:
|
|
6058
6080
|
def __init__(__self__, *,
|
6059
6081
|
enabled: pulumi.Input[bool]):
|
6060
6082
|
"""
|
6061
|
-
:param pulumi.Input[bool] enabled: Enable Confidential Nodes for this cluster
|
6083
|
+
:param pulumi.Input[bool] enabled: Enable Confidential GKE Nodes for this cluster, to
|
6084
|
+
enforce encryption of data in-use.
|
6062
6085
|
"""
|
6063
6086
|
pulumi.set(__self__, "enabled", enabled)
|
6064
6087
|
|
@@ -6066,7 +6089,8 @@ class ClusterNodeConfigConfidentialNodesArgs:
|
|
6066
6089
|
@pulumi.getter
|
6067
6090
|
def enabled(self) -> pulumi.Input[bool]:
|
6068
6091
|
"""
|
6069
|
-
Enable Confidential Nodes for this cluster
|
6092
|
+
Enable Confidential GKE Nodes for this cluster, to
|
6093
|
+
enforce encryption of data in-use.
|
6070
6094
|
"""
|
6071
6095
|
return pulumi.get(self, "enabled")
|
6072
6096
|
|
@@ -8234,7 +8258,8 @@ class ClusterNodePoolNodeConfigConfidentialNodesArgs:
|
|
8234
8258
|
def __init__(__self__, *,
|
8235
8259
|
enabled: pulumi.Input[bool]):
|
8236
8260
|
"""
|
8237
|
-
:param pulumi.Input[bool] enabled: Enable Confidential Nodes for this cluster
|
8261
|
+
:param pulumi.Input[bool] enabled: Enable Confidential GKE Nodes for this cluster, to
|
8262
|
+
enforce encryption of data in-use.
|
8238
8263
|
"""
|
8239
8264
|
pulumi.set(__self__, "enabled", enabled)
|
8240
8265
|
|
@@ -8242,7 +8267,8 @@ class ClusterNodePoolNodeConfigConfidentialNodesArgs:
|
|
8242
8267
|
@pulumi.getter
|
8243
8268
|
def enabled(self) -> pulumi.Input[bool]:
|
8244
8269
|
"""
|
8245
|
-
Enable Confidential Nodes for this cluster
|
8270
|
+
Enable Confidential GKE Nodes for this cluster, to
|
8271
|
+
enforce encryption of data in-use.
|
8246
8272
|
"""
|
8247
8273
|
return pulumi.get(self, "enabled")
|
8248
8274
|
|
@@ -9747,6 +9773,7 @@ class ClusterTpuConfigArgs:
|
|
9747
9773
|
|
9748
9774
|
|
9749
9775
|
|
9776
|
+
enforce encryption of data in-use.
|
9750
9777
|
|
9751
9778
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
9752
9779
|
|
@@ -9773,6 +9800,7 @@ class ClusterTpuConfigArgs:
|
|
9773
9800
|
|
9774
9801
|
|
9775
9802
|
|
9803
|
+
enforce encryption of data in-use.
|
9776
9804
|
|
9777
9805
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
9778
9806
|
|
@@ -10268,6 +10296,9 @@ class NodePoolNodeConfigArgs:
|
|
10268
10296
|
tags: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
10269
10297
|
taints: Optional[pulumi.Input[Sequence[pulumi.Input['NodePoolNodeConfigTaintArgs']]]] = None,
|
10270
10298
|
workload_metadata_config: Optional[pulumi.Input['NodePoolNodeConfigWorkloadMetadataConfigArgs']] = None):
|
10299
|
+
"""
|
10300
|
+
:param pulumi.Input['NodePoolNodeConfigConfidentialNodesArgs'] confidential_nodes: Configuration for Confidential Nodes feature. Structure is documented below.
|
10301
|
+
"""
|
10271
10302
|
if advanced_machine_features is not None:
|
10272
10303
|
pulumi.set(__self__, "advanced_machine_features", advanced_machine_features)
|
10273
10304
|
if boot_disk_kms_key is not None:
|
@@ -10358,6 +10389,9 @@ class NodePoolNodeConfigArgs:
|
|
10358
10389
|
@property
|
10359
10390
|
@pulumi.getter(name="confidentialNodes")
|
10360
10391
|
def confidential_nodes(self) -> Optional[pulumi.Input['NodePoolNodeConfigConfidentialNodesArgs']]:
|
10392
|
+
"""
|
10393
|
+
Configuration for Confidential Nodes feature. Structure is documented below.
|
10394
|
+
"""
|
10361
10395
|
return pulumi.get(self, "confidential_nodes")
|
10362
10396
|
|
10363
10397
|
@confidential_nodes.setter
|
@@ -10664,11 +10698,19 @@ class NodePoolNodeConfigAdvancedMachineFeaturesArgs:
|
|
10664
10698
|
class NodePoolNodeConfigConfidentialNodesArgs:
|
10665
10699
|
def __init__(__self__, *,
|
10666
10700
|
enabled: pulumi.Input[bool]):
|
10701
|
+
"""
|
10702
|
+
:param pulumi.Input[bool] enabled: Enable Confidential GKE Nodes for this cluster, to
|
10703
|
+
enforce encryption of data in-use.
|
10704
|
+
"""
|
10667
10705
|
pulumi.set(__self__, "enabled", enabled)
|
10668
10706
|
|
10669
10707
|
@property
|
10670
10708
|
@pulumi.getter
|
10671
10709
|
def enabled(self) -> pulumi.Input[bool]:
|
10710
|
+
"""
|
10711
|
+
Enable Confidential GKE Nodes for this cluster, to
|
10712
|
+
enforce encryption of data in-use.
|
10713
|
+
"""
|
10672
10714
|
return pulumi.get(self, "enabled")
|
10673
10715
|
|
10674
10716
|
@enabled.setter
|
@@ -10712,11 +10754,19 @@ class NodePoolNodeConfigEphemeralStorageLocalSsdConfigArgs:
|
|
10712
10754
|
class NodePoolNodeConfigGcfsConfigArgs:
|
10713
10755
|
def __init__(__self__, *,
|
10714
10756
|
enabled: pulumi.Input[bool]):
|
10757
|
+
"""
|
10758
|
+
:param pulumi.Input[bool] enabled: Enable Confidential GKE Nodes for this cluster, to
|
10759
|
+
enforce encryption of data in-use.
|
10760
|
+
"""
|
10715
10761
|
pulumi.set(__self__, "enabled", enabled)
|
10716
10762
|
|
10717
10763
|
@property
|
10718
10764
|
@pulumi.getter
|
10719
10765
|
def enabled(self) -> pulumi.Input[bool]:
|
10766
|
+
"""
|
10767
|
+
Enable Confidential GKE Nodes for this cluster, to
|
10768
|
+
enforce encryption of data in-use.
|
10769
|
+
"""
|
10720
10770
|
return pulumi.get(self, "enabled")
|
10721
10771
|
|
10722
10772
|
@enabled.setter
|
@@ -10844,11 +10894,19 @@ class NodePoolNodeConfigGuestAcceleratorGpuSharingConfigArgs:
|
|
10844
10894
|
class NodePoolNodeConfigGvnicArgs:
|
10845
10895
|
def __init__(__self__, *,
|
10846
10896
|
enabled: pulumi.Input[bool]):
|
10897
|
+
"""
|
10898
|
+
:param pulumi.Input[bool] enabled: Enable Confidential GKE Nodes for this cluster, to
|
10899
|
+
enforce encryption of data in-use.
|
10900
|
+
"""
|
10847
10901
|
pulumi.set(__self__, "enabled", enabled)
|
10848
10902
|
|
10849
10903
|
@property
|
10850
10904
|
@pulumi.getter
|
10851
10905
|
def enabled(self) -> pulumi.Input[bool]:
|
10906
|
+
"""
|
10907
|
+
Enable Confidential GKE Nodes for this cluster, to
|
10908
|
+
enforce encryption of data in-use.
|
10909
|
+
"""
|
10852
10910
|
return pulumi.get(self, "enabled")
|
10853
10911
|
|
10854
10912
|
@enabled.setter
|
pulumi_gcp/container/outputs.py
CHANGED
@@ -3557,6 +3557,7 @@ class ClusterAddonsConfigConfigConnectorConfig(dict):
|
|
3557
3557
|
|
3558
3558
|
|
3559
3559
|
|
3560
|
+
enforce encryption of data in-use.
|
3560
3561
|
|
3561
3562
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3562
3563
|
|
@@ -3579,6 +3580,7 @@ class ClusterAddonsConfigConfigConnectorConfig(dict):
|
|
3579
3580
|
|
3580
3581
|
|
3581
3582
|
|
3583
|
+
enforce encryption of data in-use.
|
3582
3584
|
|
3583
3585
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3584
3586
|
|
@@ -3603,6 +3605,7 @@ class ClusterAddonsConfigDnsCacheConfig(dict):
|
|
3603
3605
|
|
3604
3606
|
|
3605
3607
|
|
3608
|
+
enforce encryption of data in-use.
|
3606
3609
|
|
3607
3610
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3608
3611
|
|
@@ -3625,6 +3628,7 @@ class ClusterAddonsConfigDnsCacheConfig(dict):
|
|
3625
3628
|
|
3626
3629
|
|
3627
3630
|
|
3631
|
+
enforce encryption of data in-use.
|
3628
3632
|
|
3629
3633
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3630
3634
|
|
@@ -3649,6 +3653,7 @@ class ClusterAddonsConfigGcePersistentDiskCsiDriverConfig(dict):
|
|
3649
3653
|
|
3650
3654
|
|
3651
3655
|
|
3656
|
+
enforce encryption of data in-use.
|
3652
3657
|
|
3653
3658
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3654
3659
|
|
@@ -3671,6 +3676,7 @@ class ClusterAddonsConfigGcePersistentDiskCsiDriverConfig(dict):
|
|
3671
3676
|
|
3672
3677
|
|
3673
3678
|
|
3679
|
+
enforce encryption of data in-use.
|
3674
3680
|
|
3675
3681
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3676
3682
|
|
@@ -3695,6 +3701,7 @@ class ClusterAddonsConfigGcpFilestoreCsiDriverConfig(dict):
|
|
3695
3701
|
|
3696
3702
|
|
3697
3703
|
|
3704
|
+
enforce encryption of data in-use.
|
3698
3705
|
|
3699
3706
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3700
3707
|
|
@@ -3717,6 +3724,7 @@ class ClusterAddonsConfigGcpFilestoreCsiDriverConfig(dict):
|
|
3717
3724
|
|
3718
3725
|
|
3719
3726
|
|
3727
|
+
enforce encryption of data in-use.
|
3720
3728
|
|
3721
3729
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3722
3730
|
|
@@ -3741,6 +3749,7 @@ class ClusterAddonsConfigGcsFuseCsiDriverConfig(dict):
|
|
3741
3749
|
|
3742
3750
|
|
3743
3751
|
|
3752
|
+
enforce encryption of data in-use.
|
3744
3753
|
|
3745
3754
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3746
3755
|
|
@@ -3763,6 +3772,7 @@ class ClusterAddonsConfigGcsFuseCsiDriverConfig(dict):
|
|
3763
3772
|
|
3764
3773
|
|
3765
3774
|
|
3775
|
+
enforce encryption of data in-use.
|
3766
3776
|
|
3767
3777
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3768
3778
|
|
@@ -3787,6 +3797,7 @@ class ClusterAddonsConfigGkeBackupAgentConfig(dict):
|
|
3787
3797
|
|
3788
3798
|
|
3789
3799
|
|
3800
|
+
enforce encryption of data in-use.
|
3790
3801
|
|
3791
3802
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3792
3803
|
|
@@ -3809,6 +3820,7 @@ class ClusterAddonsConfigGkeBackupAgentConfig(dict):
|
|
3809
3820
|
|
3810
3821
|
|
3811
3822
|
|
3823
|
+
enforce encryption of data in-use.
|
3812
3824
|
|
3813
3825
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3814
3826
|
|
@@ -3909,6 +3921,7 @@ class ClusterAddonsConfigKalmConfig(dict):
|
|
3909
3921
|
|
3910
3922
|
|
3911
3923
|
|
3924
|
+
enforce encryption of data in-use.
|
3912
3925
|
|
3913
3926
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3914
3927
|
|
@@ -3931,6 +3944,7 @@ class ClusterAddonsConfigKalmConfig(dict):
|
|
3931
3944
|
|
3932
3945
|
|
3933
3946
|
|
3947
|
+
enforce encryption of data in-use.
|
3934
3948
|
|
3935
3949
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
3936
3950
|
|
@@ -4030,6 +4044,7 @@ class ClusterBinaryAuthorization(dict):
|
|
4030
4044
|
|
4031
4045
|
|
4032
4046
|
|
4047
|
+
enforce encryption of data in-use.
|
4033
4048
|
|
4034
4049
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
4035
4050
|
|
@@ -4058,6 +4073,7 @@ class ClusterBinaryAuthorization(dict):
|
|
4058
4073
|
|
4059
4074
|
|
4060
4075
|
|
4076
|
+
enforce encryption of data in-use.
|
4061
4077
|
|
4062
4078
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
4063
4079
|
|
@@ -4785,7 +4801,8 @@ class ClusterConfidentialNodes(dict):
|
|
4785
4801
|
def __init__(__self__, *,
|
4786
4802
|
enabled: bool):
|
4787
4803
|
"""
|
4788
|
-
:param bool enabled: Enable Confidential Nodes for this cluster
|
4804
|
+
:param bool enabled: Enable Confidential GKE Nodes for this cluster, to
|
4805
|
+
enforce encryption of data in-use.
|
4789
4806
|
"""
|
4790
4807
|
pulumi.set(__self__, "enabled", enabled)
|
4791
4808
|
|
@@ -4793,7 +4810,8 @@ class ClusterConfidentialNodes(dict):
|
|
4793
4810
|
@pulumi.getter
|
4794
4811
|
def enabled(self) -> bool:
|
4795
4812
|
"""
|
4796
|
-
Enable Confidential Nodes for this cluster
|
4813
|
+
Enable Confidential GKE Nodes for this cluster, to
|
4814
|
+
enforce encryption of data in-use.
|
4797
4815
|
"""
|
4798
4816
|
return pulumi.get(self, "enabled")
|
4799
4817
|
|
@@ -5835,7 +5853,7 @@ class ClusterMonitoringConfig(dict):
|
|
5835
5853
|
managed_prometheus: Optional['outputs.ClusterMonitoringConfigManagedPrometheus'] = None):
|
5836
5854
|
"""
|
5837
5855
|
:param Sequence['ClusterMonitoringConfigAdvancedDatapathObservabilityConfigArgs'] advanced_datapath_observability_configs: Configuration for Advanced Datapath Monitoring. Structure is documented below.
|
5838
|
-
:param Sequence[str] enable_components: The GKE components exposing metrics. Supported values include: `SYSTEM_COMPONENTS`, `APISERVER`, `CONTROLLER_MANAGER`, and `
|
5856
|
+
:param Sequence[str] enable_components: The GKE components exposing metrics. Supported values include: `SYSTEM_COMPONENTS`, `APISERVER`, `SCHEDULER`, `CONTROLLER_MANAGER`, `STORAGE`, `HPA`, `POD`, `DAEMONSET`, `DEPLOYMENT` and `STATEFULSET`. In beta provider, `WORKLOADS` is supported on top of those 10 values. (`WORKLOADS` is deprecated and removed in GKE 1.24.)
|
5839
5857
|
:param 'ClusterMonitoringConfigManagedPrometheusArgs' managed_prometheus: Configuration for Managed Service for Prometheus. Structure is documented below.
|
5840
5858
|
"""
|
5841
5859
|
if advanced_datapath_observability_configs is not None:
|
@@ -5857,7 +5875,7 @@ class ClusterMonitoringConfig(dict):
|
|
5857
5875
|
@pulumi.getter(name="enableComponents")
|
5858
5876
|
def enable_components(self) -> Optional[Sequence[str]]:
|
5859
5877
|
"""
|
5860
|
-
The GKE components exposing metrics. Supported values include: `SYSTEM_COMPONENTS`, `APISERVER`, `CONTROLLER_MANAGER`, and `
|
5878
|
+
The GKE components exposing metrics. Supported values include: `SYSTEM_COMPONENTS`, `APISERVER`, `SCHEDULER`, `CONTROLLER_MANAGER`, `STORAGE`, `HPA`, `POD`, `DAEMONSET`, `DEPLOYMENT` and `STATEFULSET`. In beta provider, `WORKLOADS` is supported on top of those 10 values. (`WORKLOADS` is deprecated and removed in GKE 1.24.)
|
5861
5879
|
"""
|
5862
5880
|
return pulumi.get(self, "enable_components")
|
5863
5881
|
|
@@ -5895,6 +5913,7 @@ class ClusterMonitoringConfigAdvancedDatapathObservabilityConfig(dict):
|
|
5895
5913
|
enable_metrics: bool,
|
5896
5914
|
relay_mode: Optional[str] = None):
|
5897
5915
|
"""
|
5916
|
+
:param bool enable_metrics: Whether or not to enable advanced datapath metrics.
|
5898
5917
|
:param str relay_mode: Mode used to make Relay available.
|
5899
5918
|
"""
|
5900
5919
|
pulumi.set(__self__, "enable_metrics", enable_metrics)
|
@@ -5904,6 +5923,9 @@ class ClusterMonitoringConfigAdvancedDatapathObservabilityConfig(dict):
|
|
5904
5923
|
@property
|
5905
5924
|
@pulumi.getter(name="enableMetrics")
|
5906
5925
|
def enable_metrics(self) -> bool:
|
5926
|
+
"""
|
5927
|
+
Whether or not to enable advanced datapath metrics.
|
5928
|
+
"""
|
5907
5929
|
return pulumi.get(self, "enable_metrics")
|
5908
5930
|
|
5909
5931
|
@property
|
@@ -6633,7 +6655,8 @@ class ClusterNodeConfigConfidentialNodes(dict):
|
|
6633
6655
|
def __init__(__self__, *,
|
6634
6656
|
enabled: bool):
|
6635
6657
|
"""
|
6636
|
-
:param bool enabled: Enable Confidential Nodes for this cluster
|
6658
|
+
:param bool enabled: Enable Confidential GKE Nodes for this cluster, to
|
6659
|
+
enforce encryption of data in-use.
|
6637
6660
|
"""
|
6638
6661
|
pulumi.set(__self__, "enabled", enabled)
|
6639
6662
|
|
@@ -6641,7 +6664,8 @@ class ClusterNodeConfigConfidentialNodes(dict):
|
|
6641
6664
|
@pulumi.getter
|
6642
6665
|
def enabled(self) -> bool:
|
6643
6666
|
"""
|
6644
|
-
Enable Confidential Nodes for this cluster
|
6667
|
+
Enable Confidential GKE Nodes for this cluster, to
|
6668
|
+
enforce encryption of data in-use.
|
6645
6669
|
"""
|
6646
6670
|
return pulumi.get(self, "enabled")
|
6647
6671
|
|
@@ -8855,7 +8879,8 @@ class ClusterNodePoolNodeConfigConfidentialNodes(dict):
|
|
8855
8879
|
def __init__(__self__, *,
|
8856
8880
|
enabled: bool):
|
8857
8881
|
"""
|
8858
|
-
:param bool enabled: Enable Confidential Nodes for this cluster
|
8882
|
+
:param bool enabled: Enable Confidential GKE Nodes for this cluster, to
|
8883
|
+
enforce encryption of data in-use.
|
8859
8884
|
"""
|
8860
8885
|
pulumi.set(__self__, "enabled", enabled)
|
8861
8886
|
|
@@ -8863,7 +8888,8 @@ class ClusterNodePoolNodeConfigConfidentialNodes(dict):
|
|
8863
8888
|
@pulumi.getter
|
8864
8889
|
def enabled(self) -> bool:
|
8865
8890
|
"""
|
8866
|
-
Enable Confidential Nodes for this cluster
|
8891
|
+
Enable Confidential GKE Nodes for this cluster, to
|
8892
|
+
enforce encryption of data in-use.
|
8867
8893
|
"""
|
8868
8894
|
return pulumi.get(self, "enabled")
|
8869
8895
|
|
@@ -10536,6 +10562,7 @@ class ClusterTpuConfig(dict):
|
|
10536
10562
|
|
10537
10563
|
|
10538
10564
|
|
10565
|
+
enforce encryption of data in-use.
|
10539
10566
|
|
10540
10567
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
10541
10568
|
|
@@ -10562,6 +10589,7 @@ class ClusterTpuConfig(dict):
|
|
10562
10589
|
|
10563
10590
|
|
10564
10591
|
|
10592
|
+
enforce encryption of data in-use.
|
10565
10593
|
|
10566
10594
|
If enabled, pods must be valid under a PodSecurityPolicy to be created.
|
10567
10595
|
|
@@ -11135,6 +11163,9 @@ class NodePoolNodeConfig(dict):
|
|
11135
11163
|
tags: Optional[Sequence[str]] = None,
|
11136
11164
|
taints: Optional[Sequence['outputs.NodePoolNodeConfigTaint']] = None,
|
11137
11165
|
workload_metadata_config: Optional['outputs.NodePoolNodeConfigWorkloadMetadataConfig'] = None):
|
11166
|
+
"""
|
11167
|
+
:param 'NodePoolNodeConfigConfidentialNodesArgs' confidential_nodes: Configuration for Confidential Nodes feature. Structure is documented below.
|
11168
|
+
"""
|
11138
11169
|
if advanced_machine_features is not None:
|
11139
11170
|
pulumi.set(__self__, "advanced_machine_features", advanced_machine_features)
|
11140
11171
|
if boot_disk_kms_key is not None:
|
@@ -11217,6 +11248,9 @@ class NodePoolNodeConfig(dict):
|
|
11217
11248
|
@property
|
11218
11249
|
@pulumi.getter(name="confidentialNodes")
|
11219
11250
|
def confidential_nodes(self) -> Optional['outputs.NodePoolNodeConfigConfidentialNodes']:
|
11251
|
+
"""
|
11252
|
+
Configuration for Confidential Nodes feature. Structure is documented below.
|
11253
|
+
"""
|
11220
11254
|
return pulumi.get(self, "confidential_nodes")
|
11221
11255
|
|
11222
11256
|
@property
|
@@ -11408,11 +11442,19 @@ class NodePoolNodeConfigAdvancedMachineFeatures(dict):
|
|
11408
11442
|
class NodePoolNodeConfigConfidentialNodes(dict):
|
11409
11443
|
def __init__(__self__, *,
|
11410
11444
|
enabled: bool):
|
11445
|
+
"""
|
11446
|
+
:param bool enabled: Enable Confidential GKE Nodes for this cluster, to
|
11447
|
+
enforce encryption of data in-use.
|
11448
|
+
"""
|
11411
11449
|
pulumi.set(__self__, "enabled", enabled)
|
11412
11450
|
|
11413
11451
|
@property
|
11414
11452
|
@pulumi.getter
|
11415
11453
|
def enabled(self) -> bool:
|
11454
|
+
"""
|
11455
|
+
Enable Confidential GKE Nodes for this cluster, to
|
11456
|
+
enforce encryption of data in-use.
|
11457
|
+
"""
|
11416
11458
|
return pulumi.get(self, "enabled")
|
11417
11459
|
|
11418
11460
|
|
@@ -11478,11 +11520,19 @@ class NodePoolNodeConfigEphemeralStorageLocalSsdConfig(dict):
|
|
11478
11520
|
class NodePoolNodeConfigGcfsConfig(dict):
|
11479
11521
|
def __init__(__self__, *,
|
11480
11522
|
enabled: bool):
|
11523
|
+
"""
|
11524
|
+
:param bool enabled: Enable Confidential GKE Nodes for this cluster, to
|
11525
|
+
enforce encryption of data in-use.
|
11526
|
+
"""
|
11481
11527
|
pulumi.set(__self__, "enabled", enabled)
|
11482
11528
|
|
11483
11529
|
@property
|
11484
11530
|
@pulumi.getter
|
11485
11531
|
def enabled(self) -> bool:
|
11532
|
+
"""
|
11533
|
+
Enable Confidential GKE Nodes for this cluster, to
|
11534
|
+
enforce encryption of data in-use.
|
11535
|
+
"""
|
11486
11536
|
return pulumi.get(self, "enabled")
|
11487
11537
|
|
11488
11538
|
|
@@ -11631,11 +11681,19 @@ class NodePoolNodeConfigGuestAcceleratorGpuSharingConfig(dict):
|
|
11631
11681
|
class NodePoolNodeConfigGvnic(dict):
|
11632
11682
|
def __init__(__self__, *,
|
11633
11683
|
enabled: bool):
|
11684
|
+
"""
|
11685
|
+
:param bool enabled: Enable Confidential GKE Nodes for this cluster, to
|
11686
|
+
enforce encryption of data in-use.
|
11687
|
+
"""
|
11634
11688
|
pulumi.set(__self__, "enabled", enabled)
|
11635
11689
|
|
11636
11690
|
@property
|
11637
11691
|
@pulumi.getter
|
11638
11692
|
def enabled(self) -> bool:
|
11693
|
+
"""
|
11694
|
+
Enable Confidential GKE Nodes for this cluster, to
|
11695
|
+
enforce encryption of data in-use.
|
11696
|
+
"""
|
11639
11697
|
return pulumi.get(self, "enabled")
|
11640
11698
|
|
11641
11699
|
|
@@ -20,6 +20,7 @@ class ScopeRbacRoleBindingArgs:
|
|
20
20
|
scope_id: pulumi.Input[str],
|
21
21
|
scope_rbac_role_binding_id: pulumi.Input[str],
|
22
22
|
group: Optional[pulumi.Input[str]] = None,
|
23
|
+
labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
23
24
|
project: Optional[pulumi.Input[str]] = None,
|
24
25
|
user: Optional[pulumi.Input[str]] = None):
|
25
26
|
"""
|
@@ -31,6 +32,7 @@ class ScopeRbacRoleBindingArgs:
|
|
31
32
|
:param pulumi.Input[str] group: Principal that is be authorized in the cluster (at least of one the oneof
|
32
33
|
is required). Updating one will unset the other automatically.
|
33
34
|
group is the group, as seen by the kubernetes cluster.
|
35
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] labels: Labels for this ScopeRBACRoleBinding.
|
34
36
|
:param pulumi.Input[str] project: The ID of the project in which the resource belongs.
|
35
37
|
If it is not provided, the provider project is used.
|
36
38
|
:param pulumi.Input[str] user: Principal that is be authorized in the cluster (at least of one the oneof
|
@@ -43,6 +45,8 @@ class ScopeRbacRoleBindingArgs:
|
|
43
45
|
pulumi.set(__self__, "scope_rbac_role_binding_id", scope_rbac_role_binding_id)
|
44
46
|
if group is not None:
|
45
47
|
pulumi.set(__self__, "group", group)
|
48
|
+
if labels is not None:
|
49
|
+
pulumi.set(__self__, "labels", labels)
|
46
50
|
if project is not None:
|
47
51
|
pulumi.set(__self__, "project", project)
|
48
52
|
if user is not None:
|
@@ -99,6 +103,18 @@ class ScopeRbacRoleBindingArgs:
|
|
99
103
|
def group(self, value: Optional[pulumi.Input[str]]):
|
100
104
|
pulumi.set(self, "group", value)
|
101
105
|
|
106
|
+
@property
|
107
|
+
@pulumi.getter
|
108
|
+
def labels(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
109
|
+
"""
|
110
|
+
Labels for this ScopeRBACRoleBinding.
|
111
|
+
"""
|
112
|
+
return pulumi.get(self, "labels")
|
113
|
+
|
114
|
+
@labels.setter
|
115
|
+
def labels(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
116
|
+
pulumi.set(self, "labels", value)
|
117
|
+
|
102
118
|
@property
|
103
119
|
@pulumi.getter
|
104
120
|
def project(self) -> Optional[pulumi.Input[str]]:
|
@@ -134,6 +150,7 @@ class _ScopeRbacRoleBindingState:
|
|
134
150
|
create_time: Optional[pulumi.Input[str]] = None,
|
135
151
|
delete_time: Optional[pulumi.Input[str]] = None,
|
136
152
|
group: Optional[pulumi.Input[str]] = None,
|
153
|
+
labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
137
154
|
name: Optional[pulumi.Input[str]] = None,
|
138
155
|
project: Optional[pulumi.Input[str]] = None,
|
139
156
|
role: Optional[pulumi.Input['ScopeRbacRoleBindingRoleArgs']] = None,
|
@@ -150,6 +167,7 @@ class _ScopeRbacRoleBindingState:
|
|
150
167
|
:param pulumi.Input[str] group: Principal that is be authorized in the cluster (at least of one the oneof
|
151
168
|
is required). Updating one will unset the other automatically.
|
152
169
|
group is the group, as seen by the kubernetes cluster.
|
170
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] labels: Labels for this ScopeRBACRoleBinding.
|
153
171
|
:param pulumi.Input[str] name: The resource name for the RBAC Role Binding
|
154
172
|
:param pulumi.Input[str] project: The ID of the project in which the resource belongs.
|
155
173
|
If it is not provided, the provider project is used.
|
@@ -172,6 +190,8 @@ class _ScopeRbacRoleBindingState:
|
|
172
190
|
pulumi.set(__self__, "delete_time", delete_time)
|
173
191
|
if group is not None:
|
174
192
|
pulumi.set(__self__, "group", group)
|
193
|
+
if labels is not None:
|
194
|
+
pulumi.set(__self__, "labels", labels)
|
175
195
|
if name is not None:
|
176
196
|
pulumi.set(__self__, "name", name)
|
177
197
|
if project is not None:
|
@@ -229,6 +249,18 @@ class _ScopeRbacRoleBindingState:
|
|
229
249
|
def group(self, value: Optional[pulumi.Input[str]]):
|
230
250
|
pulumi.set(self, "group", value)
|
231
251
|
|
252
|
+
@property
|
253
|
+
@pulumi.getter
|
254
|
+
def labels(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
255
|
+
"""
|
256
|
+
Labels for this ScopeRBACRoleBinding.
|
257
|
+
"""
|
258
|
+
return pulumi.get(self, "labels")
|
259
|
+
|
260
|
+
@labels.setter
|
261
|
+
def labels(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
262
|
+
pulumi.set(self, "labels", value)
|
263
|
+
|
232
264
|
@property
|
233
265
|
@pulumi.getter
|
234
266
|
def name(self) -> Optional[pulumi.Input[str]]:
|
@@ -350,6 +382,7 @@ class ScopeRbacRoleBinding(pulumi.CustomResource):
|
|
350
382
|
resource_name: str,
|
351
383
|
opts: Optional[pulumi.ResourceOptions] = None,
|
352
384
|
group: Optional[pulumi.Input[str]] = None,
|
385
|
+
labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
353
386
|
project: Optional[pulumi.Input[str]] = None,
|
354
387
|
role: Optional[pulumi.Input[pulumi.InputType['ScopeRbacRoleBindingRoleArgs']]] = None,
|
355
388
|
scope_id: Optional[pulumi.Input[str]] = None,
|
@@ -388,6 +421,7 @@ class ScopeRbacRoleBinding(pulumi.CustomResource):
|
|
388
421
|
:param pulumi.Input[str] group: Principal that is be authorized in the cluster (at least of one the oneof
|
389
422
|
is required). Updating one will unset the other automatically.
|
390
423
|
group is the group, as seen by the kubernetes cluster.
|
424
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] labels: Labels for this ScopeRBACRoleBinding.
|
391
425
|
:param pulumi.Input[str] project: The ID of the project in which the resource belongs.
|
392
426
|
If it is not provided, the provider project is used.
|
393
427
|
:param pulumi.Input[pulumi.InputType['ScopeRbacRoleBindingRoleArgs']] role: Role to bind to the principal.
|
@@ -448,6 +482,7 @@ class ScopeRbacRoleBinding(pulumi.CustomResource):
|
|
448
482
|
resource_name: str,
|
449
483
|
opts: Optional[pulumi.ResourceOptions] = None,
|
450
484
|
group: Optional[pulumi.Input[str]] = None,
|
485
|
+
labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
451
486
|
project: Optional[pulumi.Input[str]] = None,
|
452
487
|
role: Optional[pulumi.Input[pulumi.InputType['ScopeRbacRoleBindingRoleArgs']]] = None,
|
453
488
|
scope_id: Optional[pulumi.Input[str]] = None,
|
@@ -463,6 +498,7 @@ class ScopeRbacRoleBinding(pulumi.CustomResource):
|
|
463
498
|
__props__ = ScopeRbacRoleBindingArgs.__new__(ScopeRbacRoleBindingArgs)
|
464
499
|
|
465
500
|
__props__.__dict__["group"] = group
|
501
|
+
__props__.__dict__["labels"] = labels
|
466
502
|
__props__.__dict__["project"] = project
|
467
503
|
if role is None and not opts.urn:
|
468
504
|
raise TypeError("Missing required property 'role'")
|
@@ -493,6 +529,7 @@ class ScopeRbacRoleBinding(pulumi.CustomResource):
|
|
493
529
|
create_time: Optional[pulumi.Input[str]] = None,
|
494
530
|
delete_time: Optional[pulumi.Input[str]] = None,
|
495
531
|
group: Optional[pulumi.Input[str]] = None,
|
532
|
+
labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
496
533
|
name: Optional[pulumi.Input[str]] = None,
|
497
534
|
project: Optional[pulumi.Input[str]] = None,
|
498
535
|
role: Optional[pulumi.Input[pulumi.InputType['ScopeRbacRoleBindingRoleArgs']]] = None,
|
@@ -514,6 +551,7 @@ class ScopeRbacRoleBinding(pulumi.CustomResource):
|
|
514
551
|
:param pulumi.Input[str] group: Principal that is be authorized in the cluster (at least of one the oneof
|
515
552
|
is required). Updating one will unset the other automatically.
|
516
553
|
group is the group, as seen by the kubernetes cluster.
|
554
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] labels: Labels for this ScopeRBACRoleBinding.
|
517
555
|
:param pulumi.Input[str] name: The resource name for the RBAC Role Binding
|
518
556
|
:param pulumi.Input[str] project: The ID of the project in which the resource belongs.
|
519
557
|
If it is not provided, the provider project is used.
|
@@ -537,6 +575,7 @@ class ScopeRbacRoleBinding(pulumi.CustomResource):
|
|
537
575
|
__props__.__dict__["create_time"] = create_time
|
538
576
|
__props__.__dict__["delete_time"] = delete_time
|
539
577
|
__props__.__dict__["group"] = group
|
578
|
+
__props__.__dict__["labels"] = labels
|
540
579
|
__props__.__dict__["name"] = name
|
541
580
|
__props__.__dict__["project"] = project
|
542
581
|
__props__.__dict__["role"] = role
|
@@ -574,6 +613,14 @@ class ScopeRbacRoleBinding(pulumi.CustomResource):
|
|
574
613
|
"""
|
575
614
|
return pulumi.get(self, "group")
|
576
615
|
|
616
|
+
@property
|
617
|
+
@pulumi.getter
|
618
|
+
def labels(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
619
|
+
"""
|
620
|
+
Labels for this ScopeRBACRoleBinding.
|
621
|
+
"""
|
622
|
+
return pulumi.get(self, "labels")
|
623
|
+
|
577
624
|
@property
|
578
625
|
@pulumi.getter
|
579
626
|
def name(self) -> pulumi.Output[str]:
|
@@ -241,13 +241,18 @@ class ServiceConnectionPolicyPscConnectionArgs:
|
|
241
241
|
class ServiceConnectionPolicyPscConnectionErrorArgs:
|
242
242
|
def __init__(__self__, *,
|
243
243
|
code: Optional[pulumi.Input[int]] = None,
|
244
|
+
details: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, Any]]]]] = None,
|
244
245
|
message: Optional[pulumi.Input[str]] = None):
|
245
246
|
"""
|
246
247
|
:param pulumi.Input[int] code: The status code, which should be an enum value of [google.rpc.Code][].
|
248
|
+
:param pulumi.Input[Sequence[pulumi.Input[Mapping[str, Any]]]] details: (Output)
|
249
|
+
A list of messages that carry the error details.
|
247
250
|
:param pulumi.Input[str] message: A developer-facing error message.
|
248
251
|
"""
|
249
252
|
if code is not None:
|
250
253
|
pulumi.set(__self__, "code", code)
|
254
|
+
if details is not None:
|
255
|
+
pulumi.set(__self__, "details", details)
|
251
256
|
if message is not None:
|
252
257
|
pulumi.set(__self__, "message", message)
|
253
258
|
|
@@ -263,6 +268,19 @@ class ServiceConnectionPolicyPscConnectionErrorArgs:
|
|
263
268
|
def code(self, value: Optional[pulumi.Input[int]]):
|
264
269
|
pulumi.set(self, "code", value)
|
265
270
|
|
271
|
+
@property
|
272
|
+
@pulumi.getter
|
273
|
+
def details(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, Any]]]]]:
|
274
|
+
"""
|
275
|
+
(Output)
|
276
|
+
A list of messages that carry the error details.
|
277
|
+
"""
|
278
|
+
return pulumi.get(self, "details")
|
279
|
+
|
280
|
+
@details.setter
|
281
|
+
def details(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, Any]]]]]):
|
282
|
+
pulumi.set(self, "details", value)
|
283
|
+
|
266
284
|
@property
|
267
285
|
@pulumi.getter
|
268
286
|
def message(self) -> Optional[pulumi.Input[str]]:
|
@@ -223,13 +223,18 @@ class ServiceConnectionPolicyPscConnection(dict):
|
|
223
223
|
class ServiceConnectionPolicyPscConnectionError(dict):
|
224
224
|
def __init__(__self__, *,
|
225
225
|
code: Optional[int] = None,
|
226
|
+
details: Optional[Sequence[Mapping[str, Any]]] = None,
|
226
227
|
message: Optional[str] = None):
|
227
228
|
"""
|
228
229
|
:param int code: The status code, which should be an enum value of [google.rpc.Code][].
|
230
|
+
:param Sequence[Mapping[str, Any]] details: (Output)
|
231
|
+
A list of messages that carry the error details.
|
229
232
|
:param str message: A developer-facing error message.
|
230
233
|
"""
|
231
234
|
if code is not None:
|
232
235
|
pulumi.set(__self__, "code", code)
|
236
|
+
if details is not None:
|
237
|
+
pulumi.set(__self__, "details", details)
|
233
238
|
if message is not None:
|
234
239
|
pulumi.set(__self__, "message", message)
|
235
240
|
|
@@ -241,6 +246,15 @@ class ServiceConnectionPolicyPscConnectionError(dict):
|
|
241
246
|
"""
|
242
247
|
return pulumi.get(self, "code")
|
243
248
|
|
249
|
+
@property
|
250
|
+
@pulumi.getter
|
251
|
+
def details(self) -> Optional[Sequence[Mapping[str, Any]]]:
|
252
|
+
"""
|
253
|
+
(Output)
|
254
|
+
A list of messages that carry the error details.
|
255
|
+
"""
|
256
|
+
return pulumi.get(self, "details")
|
257
|
+
|
244
258
|
@property
|
245
259
|
@pulumi.getter
|
246
260
|
def message(self) -> Optional[str]:
|
@@ -392,7 +392,7 @@ pulumi_gcp/compute/get_node_types.py,sha256=sfU1aLxX6EGeu8_Cd0Jm2exjvGJSJPafVkUD
|
|
392
392
|
pulumi_gcp/compute/get_region_backend_service_iam_policy.py,sha256=VXXqfAp7ZjNcwBRG4gWQ-TpR_CBHnn975fGwyVwsNc4,6680
|
393
393
|
pulumi_gcp/compute/get_region_disk_iam_policy.py,sha256=tfaHpAhJsNoZRFN3aGAmSK02QCsbsUaMy4YlJoXw3oU,6871
|
394
394
|
pulumi_gcp/compute/get_region_instance_group.py,sha256=Dnr5CSCalpIH5D7sV8O4NDbrj7nO1MHBoA-X9io54X8,7838
|
395
|
-
pulumi_gcp/compute/get_region_instance_template.py,sha256=
|
395
|
+
pulumi_gcp/compute/get_region_instance_template.py,sha256=XkWC5eC-KIrFqpreVekm_KASOiudXGB4KuoGvidnqeo,25007
|
396
396
|
pulumi_gcp/compute/get_region_network_endpoint_group.py,sha256=UQOLzg1vPxdzzzPWrpaBLypTDv9gkDghu116ymbmHMQ,11507
|
397
397
|
pulumi_gcp/compute/get_region_ssl_certificate.py,sha256=D_kRMwkS9_7VeUPJOG_KnIpuNPai10JwvAZ8aHQLml0,8720
|
398
398
|
pulumi_gcp/compute/get_regions.py,sha256=Z4V3g2P9cqMrbdhJq2Ii-YAM0wrgrDiNrVL7FmUt5FI,5140
|
@@ -524,7 +524,7 @@ pulumi_gcp/config/__init__.py,sha256=cfY0smRZD3fDVc93ZIAxEl_IM2pynmXB52n3Ahzi030
|
|
524
524
|
pulumi_gcp/config/outputs.py,sha256=NX6HQIexmUVsFBMqvoZH1PzCrkfy582L5E5CHWVLmqs,1060
|
525
525
|
pulumi_gcp/config/vars.py,sha256=0PYHOgX976gXPcJDVPafR3UFSls1FYb5twJqHxtNbyg,20330
|
526
526
|
pulumi_gcp/container/__init__.py,sha256=KbuEacj9tsLxH3rVHSnPd3VtGOOnpdgVgv-Fq0o_Ll4,845
|
527
|
-
pulumi_gcp/container/_inputs.py,sha256=
|
527
|
+
pulumi_gcp/container/_inputs.py,sha256=ksQ7CMV7fJQ62FRdeYXh9JDUtgJg3oGDX8NvBJWSgRI,535000
|
528
528
|
pulumi_gcp/container/attached_cluster.py,sha256=0dgFKHFJQnOiEIDyHvKjfz9_3QiMOoPbldVp8p_RmXM,59758
|
529
529
|
pulumi_gcp/container/aws_cluster.py,sha256=JFEV2g_2Z_JeDohbXwOcjseaZOVjcoow45wfPQpacqc,65250
|
530
530
|
pulumi_gcp/container/aws_node_pool.py,sha256=wcR6p4DKZqMLtG6566jK6GbEcjPstVYQOkeJgrx5J50,72010
|
@@ -541,7 +541,7 @@ pulumi_gcp/container/get_engine_versions.py,sha256=Hk9eC0xG6KAl66vrGpShBWgkciYMu
|
|
541
541
|
pulumi_gcp/container/get_registry_image.py,sha256=BK2v8NjiPMfRdXiuhJauP4H0otPr9xYzZJmDJNyidtQ,6992
|
542
542
|
pulumi_gcp/container/get_registry_repository.py,sha256=8j5cl1J9lQtItliF6Cjayatzqclp7-9PDwEX1bo8-uM,5353
|
543
543
|
pulumi_gcp/container/node_pool.py,sha256=X9iENLoK-uD4DH1zlXBo32ei_KeyF496VBqYYtPOlKo,67370
|
544
|
-
pulumi_gcp/container/outputs.py,sha256=
|
544
|
+
pulumi_gcp/container/outputs.py,sha256=CkAe-kJl36yeqL940WLnLoO7KNG1Dvf_BcEl8fDznbo,653015
|
545
545
|
pulumi_gcp/container/registry.py,sha256=5GWPN8eMmNsSUYKEtxFo5pfpLwT5cBza0U3oWkYU0JQ,13113
|
546
546
|
pulumi_gcp/containeranalysis/__init__.py,sha256=gENWQXPC0oV7t5uEv6IgscsCOVeXKa7AHewwOiVIgek,488
|
547
547
|
pulumi_gcp/containeranalysis/_inputs.py,sha256=1yTLGmL7agpwp0maJz0rEzueNmb9QOpSEcdah1zfBus,12213
|
@@ -820,7 +820,7 @@ pulumi_gcp/gkehub/scope.py,sha256=t9wNBMRusmte9bIPZj8hX_czPvMEaM1jStNntktjKuM,16
|
|
820
820
|
pulumi_gcp/gkehub/scope_iam_binding.py,sha256=RJ86BR-zWitLGuJaJ92h7lE3W_tOocLLOz2bkFLn3Bg,33077
|
821
821
|
pulumi_gcp/gkehub/scope_iam_member.py,sha256=L6nTxpgYVr5iHkiSBUxV4jTqWXm8Qg1c9wN7VPYmqBU,32781
|
822
822
|
pulumi_gcp/gkehub/scope_iam_policy.py,sha256=dEd36-RoVG88r_vJrUffX9F-HF6dveCM4gj_dAdD9Zk,29289
|
823
|
-
pulumi_gcp/gkehub/scope_rbac_role_binding.py,sha256=
|
823
|
+
pulumi_gcp/gkehub/scope_rbac_role_binding.py,sha256=PJ0qFxjxKudGXQTNINrnb7d4Ma3FGqs4hZK8O7Ilmys,30184
|
824
824
|
pulumi_gcp/gkeonprem/__init__.py,sha256=Mvd41ZaItFnzM4iQtQTqhAwcPeZ-cpWq1hjgdvBi_e8,488
|
825
825
|
pulumi_gcp/gkeonprem/_inputs.py,sha256=1uPKIZRXltZKOm8UjsFLU5eIJL4ORhiNUVo6Hc0EvHM,267956
|
826
826
|
pulumi_gcp/gkeonprem/bare_metal_admin_cluster.py,sha256=O0hmdkNEAp1wMra65DIYAtILBmI7TlXSCxjnInN3wZI,88129
|
@@ -1009,9 +1009,9 @@ pulumi_gcp/monitoring/outputs.py,sha256=8zroIHKr_x4nAYynhAG3xZ3G1362G7Rlcb42G6E9
|
|
1009
1009
|
pulumi_gcp/monitoring/slo.py,sha256=_qqB8jd5AEtMllQnSS-mzLtjgCT31w3NhddPuPoPXG4,48548
|
1010
1010
|
pulumi_gcp/monitoring/uptime_check_config.py,sha256=XY40sZKJoHauyaGC_UWiaD2jjchkpL8rF_8FvRHZ5HU,61618
|
1011
1011
|
pulumi_gcp/networkconnectivity/__init__.py,sha256=8uArcrOhPk7Cua1jwPiKICpLALh8FKJT2ksLsvVtDRU,395
|
1012
|
-
pulumi_gcp/networkconnectivity/_inputs.py,sha256=
|
1012
|
+
pulumi_gcp/networkconnectivity/_inputs.py,sha256=j4ATUlyw0rKCZpcbWHz-4rHMnMsoVn8y_wtW9LLcuuU,20232
|
1013
1013
|
pulumi_gcp/networkconnectivity/hub.py,sha256=g7E0iQNVkgW7CiAVf_Ip0o0aZX5VKV94fmDdka9mnRw,22418
|
1014
|
-
pulumi_gcp/networkconnectivity/outputs.py,sha256=
|
1014
|
+
pulumi_gcp/networkconnectivity/outputs.py,sha256=E4B3ftnUVOPiv4H0U3YzfY2tPL-CU7yvzd_C0yBIbh4,18907
|
1015
1015
|
pulumi_gcp/networkconnectivity/service_connection_policy.py,sha256=eLqTrOO2CbeVnzSdxJVeqEIxKVvGeET7O7QymW1uy7Y,35126
|
1016
1016
|
pulumi_gcp/networkconnectivity/spoke.py,sha256=JpbIE-OkXL4BqMbRw29a84z6lH43KNfcqf8lU0x8NCI,36670
|
1017
1017
|
pulumi_gcp/networkmanagement/__init__.py,sha256=w0jJqOXlyUgN1FT_j4bGJV6EBhRPAJG4ZTKByZy5kUE,347
|
@@ -1350,7 +1350,7 @@ pulumi_gcp/workstations/workstation_config_iam_policy.py,sha256=ZS9JWOhvwHgpZdI1
|
|
1350
1350
|
pulumi_gcp/workstations/workstation_iam_binding.py,sha256=sLyb9vNFrG9sh_1uGiWddwbZFGLtaj5JGY31oh-SwS8,35727
|
1351
1351
|
pulumi_gcp/workstations/workstation_iam_member.py,sha256=QOR7nZrcFdheKQrUxv6gOj74o1QZwiGcTxXvKTIWArY,35431
|
1352
1352
|
pulumi_gcp/workstations/workstation_iam_policy.py,sha256=t_pyrWOuX9A4kuJ3IV9S7Qg4Xb8zRRCzRDdatPshlIU,31795
|
1353
|
-
pulumi_gcp-6.66.
|
1354
|
-
pulumi_gcp-6.66.
|
1355
|
-
pulumi_gcp-6.66.
|
1356
|
-
pulumi_gcp-6.66.
|
1353
|
+
pulumi_gcp-6.66.0a1695056297.dist-info/METADATA,sha256=FjMGVuG7TfIDiwrRXXh42_pB9duAvz6q2SOyBzRudYY,2662
|
1354
|
+
pulumi_gcp-6.66.0a1695056297.dist-info/WHEEL,sha256=yQN5g4mg4AybRjkgi-9yy4iQEFibGQmlz78Pik5Or-A,92
|
1355
|
+
pulumi_gcp-6.66.0a1695056297.dist-info/top_level.txt,sha256=acmDGVRVMJWpVhhj-l-aHbZ7mrvmzjmUeqRyCN8nnjM,11
|
1356
|
+
pulumi_gcp-6.66.0a1695056297.dist-info/RECORD,,
|
File without changes
|
{pulumi_gcp-6.66.0a1694816867.dist-info → pulumi_gcp-6.66.0a1695056297.dist-info}/top_level.txt
RENAMED
File without changes
|