pulumi-gcp 7.0.0rc0__py3-none-any.whl → 7.1.0__py3-none-any.whl
Sign up to get free protection for your applications and to get access to all the features.
- pulumi_gcp/__init__.py +118 -0
- pulumi_gcp/accesscontextmanager/_inputs.py +546 -71
- pulumi_gcp/accesscontextmanager/access_level.py +18 -2
- pulumi_gcp/accesscontextmanager/access_level_condition.py +57 -3
- pulumi_gcp/accesscontextmanager/access_levels.py +18 -2
- pulumi_gcp/accesscontextmanager/access_policy.py +18 -2
- pulumi_gcp/accesscontextmanager/authorized_orgs_desc.py +18 -2
- pulumi_gcp/accesscontextmanager/egress_policy.py +18 -2
- pulumi_gcp/accesscontextmanager/gcp_user_access_binding.py +18 -2
- pulumi_gcp/accesscontextmanager/ingress_policy.py +18 -2
- pulumi_gcp/accesscontextmanager/outputs.py +643 -71
- pulumi_gcp/accesscontextmanager/service_perimeter.py +18 -2
- pulumi_gcp/accesscontextmanager/service_perimeter_egress_policy.py +18 -2
- pulumi_gcp/accesscontextmanager/service_perimeter_ingress_policy.py +18 -2
- pulumi_gcp/accesscontextmanager/service_perimeter_resource.py +18 -2
- pulumi_gcp/accesscontextmanager/service_perimeters.py +18 -2
- pulumi_gcp/activedirectory/domain.py +22 -10
- pulumi_gcp/activedirectory/domain_trust.py +18 -2
- pulumi_gcp/activedirectory/peering.py +4 -8
- pulumi_gcp/alloydb/__init__.py +1 -0
- pulumi_gcp/alloydb/_inputs.py +93 -0
- pulumi_gcp/alloydb/backup.py +22 -10
- pulumi_gcp/alloydb/cluster.py +283 -11
- pulumi_gcp/alloydb/instance.py +241 -40
- pulumi_gcp/alloydb/outputs.py +130 -0
- pulumi_gcp/alloydb/user.py +609 -0
- pulumi_gcp/apigateway/api.py +22 -10
- pulumi_gcp/apigateway/api_config.py +22 -10
- pulumi_gcp/apigateway/gateway.py +22 -10
- pulumi_gcp/apigee/addons_config.py +18 -2
- pulumi_gcp/apigee/endpoint_attachment.py +18 -2
- pulumi_gcp/apigee/env_group.py +18 -2
- pulumi_gcp/apigee/env_group_attachment.py +18 -2
- pulumi_gcp/apigee/env_keystore.py +18 -2
- pulumi_gcp/apigee/env_references.py +18 -2
- pulumi_gcp/apigee/environment.py +96 -5
- pulumi_gcp/apigee/flowhook.py +18 -2
- pulumi_gcp/apigee/instance.py +18 -2
- pulumi_gcp/apigee/instance_attachment.py +18 -2
- pulumi_gcp/apigee/keystores_aliases_key_cert_file.py +18 -2
- pulumi_gcp/apigee/keystores_aliases_pkcs12.py +18 -2
- pulumi_gcp/apigee/keystores_aliases_self_signed_cert.py +18 -2
- pulumi_gcp/apigee/nat_address.py +18 -2
- pulumi_gcp/apigee/organization.py +18 -2
- pulumi_gcp/apigee/sharedflow.py +18 -2
- pulumi_gcp/apigee/sharedflow_deployment.py +18 -2
- pulumi_gcp/apigee/sync_authorization.py +18 -2
- pulumi_gcp/apigee/target_server.py +18 -2
- pulumi_gcp/appengine/application.py +20 -4
- pulumi_gcp/appengine/application_url_dispatch_rules.py +18 -2
- pulumi_gcp/appengine/domain_mapping.py +18 -2
- pulumi_gcp/appengine/engine_split_traffic.py +18 -2
- pulumi_gcp/appengine/firewall_rule.py +18 -2
- pulumi_gcp/appengine/flexible_app_version.py +18 -2
- pulumi_gcp/appengine/service_network_settings.py +18 -2
- pulumi_gcp/appengine/standard_app_version.py +18 -2
- pulumi_gcp/artifactregistry/_inputs.py +4 -4
- pulumi_gcp/artifactregistry/outputs.py +4 -4
- pulumi_gcp/artifactregistry/repository.py +24 -12
- pulumi_gcp/artifactregistry/vpcsc_config.py +18 -2
- pulumi_gcp/assuredworkloads/_inputs.py +178 -4
- pulumi_gcp/assuredworkloads/outputs.py +217 -5
- pulumi_gcp/assuredworkloads/workload.py +474 -63
- pulumi_gcp/backupdisasterrecovery/__init__.py +1 -0
- pulumi_gcp/backupdisasterrecovery/get_management_server.py +152 -0
- pulumi_gcp/backupdisasterrecovery/management_server.py +18 -2
- pulumi_gcp/backupdisasterrecovery/outputs.py +40 -0
- pulumi_gcp/beyondcorp/app_connection.py +22 -10
- pulumi_gcp/beyondcorp/app_connector.py +22 -10
- pulumi_gcp/beyondcorp/app_gateway.py +22 -10
- pulumi_gcp/biglake/catalog.py +18 -2
- pulumi_gcp/biglake/database.py +18 -2
- pulumi_gcp/biglake/table.py +18 -2
- pulumi_gcp/bigquery/__init__.py +1 -0
- pulumi_gcp/bigquery/_inputs.py +94 -8
- pulumi_gcp/bigquery/app_profile.py +18 -2
- pulumi_gcp/bigquery/bi_reservation.py +18 -2
- pulumi_gcp/bigquery/capacity_commitment.py +25 -9
- pulumi_gcp/bigquery/connection.py +56 -2
- pulumi_gcp/bigquery/data_transfer_config.py +18 -2
- pulumi_gcp/bigquery/dataset.py +22 -10
- pulumi_gcp/bigquery/dataset_iam_binding.py +10 -38
- pulumi_gcp/bigquery/dataset_iam_member.py +10 -38
- pulumi_gcp/bigquery/dataset_iam_policy.py +10 -38
- pulumi_gcp/bigquery/get_dataset.py +315 -0
- pulumi_gcp/bigquery/job.py +26 -10
- pulumi_gcp/bigquery/outputs.py +275 -9
- pulumi_gcp/bigquery/reservation.py +18 -2
- pulumi_gcp/bigquery/reservation_assignment.py +18 -2
- pulumi_gcp/bigquery/routine.py +18 -2
- pulumi_gcp/bigquery/table.py +171 -17
- pulumi_gcp/bigqueryanalyticshub/data_exchange.py +18 -2
- pulumi_gcp/bigqueryanalyticshub/listing.py +18 -2
- pulumi_gcp/bigquerydatapolicy/data_policy.py +18 -2
- pulumi_gcp/bigtable/instance.py +30 -10
- pulumi_gcp/bigtable/instance_iam_binding.py +12 -20
- pulumi_gcp/bigtable/instance_iam_member.py +12 -20
- pulumi_gcp/bigtable/instance_iam_policy.py +12 -20
- pulumi_gcp/bigtable/table.py +18 -6
- pulumi_gcp/bigtable/table_iam_binding.py +12 -20
- pulumi_gcp/bigtable/table_iam_member.py +12 -20
- pulumi_gcp/bigtable/table_iam_policy.py +12 -20
- pulumi_gcp/billing/account_iam_binding.py +12 -20
- pulumi_gcp/billing/account_iam_member.py +12 -20
- pulumi_gcp/billing/account_iam_policy.py +12 -20
- pulumi_gcp/billing/budget.py +18 -2
- pulumi_gcp/billing/project_info.py +18 -2
- pulumi_gcp/billing/sub_account.py +18 -2
- pulumi_gcp/binaryauthorization/attestor.py +18 -2
- pulumi_gcp/binaryauthorization/policy.py +18 -2
- pulumi_gcp/certificateauthority/authority.py +22 -10
- pulumi_gcp/certificateauthority/ca_pool.py +22 -10
- pulumi_gcp/certificateauthority/certificate.py +22 -10
- pulumi_gcp/certificateauthority/certificate_template.py +22 -10
- pulumi_gcp/certificatemanager/certificate.py +223 -31
- pulumi_gcp/certificatemanager/certificate_issuance_config.py +22 -10
- pulumi_gcp/certificatemanager/certificate_map.py +22 -10
- pulumi_gcp/certificatemanager/certificate_map_entry.py +22 -10
- pulumi_gcp/certificatemanager/dns_authorization.py +22 -10
- pulumi_gcp/certificatemanager/trust_config.py +22 -10
- pulumi_gcp/cloudasset/folder_feed.py +18 -2
- pulumi_gcp/cloudasset/organization_feed.py +18 -2
- pulumi_gcp/cloudasset/project_feed.py +18 -2
- pulumi_gcp/cloudbuild/bitbucket_server_config.py +18 -2
- pulumi_gcp/cloudbuild/trigger.py +18 -2
- pulumi_gcp/cloudbuild/worker_pool.py +18 -2
- pulumi_gcp/cloudbuildv2/connection.py +18 -2
- pulumi_gcp/cloudbuildv2/repository.py +18 -2
- pulumi_gcp/clouddeploy/delivery_pipeline.py +22 -10
- pulumi_gcp/clouddeploy/target.py +22 -10
- pulumi_gcp/cloudfunctions/function.py +26 -14
- pulumi_gcp/cloudfunctions/get_function.py +3 -0
- pulumi_gcp/cloudfunctionsv2/function.py +22 -10
- pulumi_gcp/cloudidentity/__init__.py +1 -0
- pulumi_gcp/cloudidentity/_inputs.py +119 -0
- pulumi_gcp/cloudidentity/get_group_lookup.py +128 -0
- pulumi_gcp/cloudidentity/group.py +50 -2
- pulumi_gcp/cloudidentity/group_membership.py +18 -2
- pulumi_gcp/cloudidentity/outputs.py +156 -0
- pulumi_gcp/cloudids/endpoint.py +18 -2
- pulumi_gcp/cloudrun/_inputs.py +12 -0
- pulumi_gcp/cloudrun/domain_mapping.py +18 -2
- pulumi_gcp/cloudrun/outputs.py +12 -0
- pulumi_gcp/cloudrun/service.py +18 -2
- pulumi_gcp/cloudrunv2/__init__.py +2 -0
- pulumi_gcp/cloudrunv2/get_job.py +394 -0
- pulumi_gcp/cloudrunv2/get_service.py +454 -0
- pulumi_gcp/cloudrunv2/job.py +40 -27
- pulumi_gcp/cloudrunv2/outputs.py +1687 -0
- pulumi_gcp/cloudrunv2/service.py +40 -27
- pulumi_gcp/cloudscheduler/job.py +18 -2
- pulumi_gcp/cloudtasks/queue.py +18 -2
- pulumi_gcp/composer/_inputs.py +17 -0
- pulumi_gcp/composer/environment.py +68 -5
- pulumi_gcp/composer/get_environment.py +13 -3
- pulumi_gcp/composer/outputs.py +26 -0
- pulumi_gcp/compute/__init__.py +2 -0
- pulumi_gcp/compute/_inputs.py +158 -4
- pulumi_gcp/compute/address.py +38 -18
- pulumi_gcp/compute/attached_disk.py +18 -2
- pulumi_gcp/compute/autoscaler.py +18 -2
- pulumi_gcp/compute/backend_bucket.py +18 -2
- pulumi_gcp/compute/backend_service.py +32 -16
- pulumi_gcp/compute/disk.py +22 -10
- pulumi_gcp/compute/disk_resource_policy_attachment.py +18 -2
- pulumi_gcp/compute/external_vpn_gateway.py +22 -10
- pulumi_gcp/compute/firewall.py +18 -2
- pulumi_gcp/compute/firewall_policy_association.py +18 -2
- pulumi_gcp/compute/firewall_policy_rule.py +18 -2
- pulumi_gcp/compute/forwarding_rule.py +377 -276
- pulumi_gcp/compute/get_disk.py +3 -0
- pulumi_gcp/compute/get_forwarding_rule.py +11 -1
- pulumi_gcp/compute/get_image.py +3 -0
- pulumi_gcp/compute/get_network.py +14 -1
- pulumi_gcp/compute/get_networks.py +130 -0
- pulumi_gcp/compute/get_subnetwork.py +14 -1
- pulumi_gcp/compute/global_address.py +18 -2
- pulumi_gcp/compute/global_forwarding_rule.py +127 -108
- pulumi_gcp/compute/global_network_endpoint.py +18 -2
- pulumi_gcp/compute/global_network_endpoint_group.py +18 -2
- pulumi_gcp/compute/ha_vpn_gateway.py +18 -2
- pulumi_gcp/compute/health_check.py +18 -2
- pulumi_gcp/compute/http_health_check.py +18 -2
- pulumi_gcp/compute/https_health_check.py +18 -2
- pulumi_gcp/compute/image.py +22 -10
- pulumi_gcp/compute/instance.py +44 -36
- pulumi_gcp/compute/instance_group.py +24 -8
- pulumi_gcp/compute/instance_group_manager.py +26 -10
- pulumi_gcp/compute/instance_group_named_port.py +18 -2
- pulumi_gcp/compute/instance_settings.py +387 -0
- pulumi_gcp/compute/instance_template.py +29 -21
- pulumi_gcp/compute/interconnect_attachment.py +18 -2
- pulumi_gcp/compute/machine_image.py +18 -2
- pulumi_gcp/compute/managed_ssl_certificate.py +18 -2
- pulumi_gcp/compute/manged_ssl_certificate.py +18 -2
- pulumi_gcp/compute/network.py +18 -2
- pulumi_gcp/compute/network_attachment.py +156 -2
- pulumi_gcp/compute/network_edge_security_service.py +18 -2
- pulumi_gcp/compute/network_endpoint.py +18 -2
- pulumi_gcp/compute/network_endpoint_group.py +32 -16
- pulumi_gcp/compute/network_endpoint_list.py +18 -2
- pulumi_gcp/compute/network_firewall_policy.py +18 -2
- pulumi_gcp/compute/network_firewall_policy_association.py +18 -2
- pulumi_gcp/compute/network_firewall_policy_rule.py +18 -2
- pulumi_gcp/compute/network_peering.py +20 -4
- pulumi_gcp/compute/network_peering_routes_config.py +18 -2
- pulumi_gcp/compute/node_group.py +129 -2
- pulumi_gcp/compute/node_template.py +18 -2
- pulumi_gcp/compute/organization_security_policy.py +18 -2
- pulumi_gcp/compute/organization_security_policy_association.py +18 -2
- pulumi_gcp/compute/organization_security_policy_rule.py +18 -2
- pulumi_gcp/compute/outputs.py +230 -7
- pulumi_gcp/compute/packet_mirroring.py +18 -2
- pulumi_gcp/compute/per_instance_config.py +18 -2
- pulumi_gcp/compute/project_default_network_tier.py +20 -4
- pulumi_gcp/compute/project_metadata.py +20 -4
- pulumi_gcp/compute/project_metadata_item.py +20 -4
- pulumi_gcp/compute/public_advertised_prefix.py +18 -2
- pulumi_gcp/compute/public_delegated_prefix.py +18 -2
- pulumi_gcp/compute/region_autoscaler.py +18 -2
- pulumi_gcp/compute/region_backend_service.py +18 -2
- pulumi_gcp/compute/region_commitment.py +18 -2
- pulumi_gcp/compute/region_disk.py +22 -10
- pulumi_gcp/compute/region_disk_resource_policy_attachment.py +18 -2
- pulumi_gcp/compute/region_health_check.py +18 -2
- pulumi_gcp/compute/region_instance_group_manager.py +20 -4
- pulumi_gcp/compute/region_instance_template.py +29 -21
- pulumi_gcp/compute/region_network_endpoint_group.py +18 -2
- pulumi_gcp/compute/region_network_firewall_policy.py +18 -2
- pulumi_gcp/compute/region_network_firewall_policy_association.py +18 -2
- pulumi_gcp/compute/region_network_firewall_policy_rule.py +18 -2
- pulumi_gcp/compute/region_per_instance_config.py +18 -2
- pulumi_gcp/compute/region_security_policy.py +18 -2
- pulumi_gcp/compute/region_security_policy_rule.py +18 -2
- pulumi_gcp/compute/region_ssl_certificate.py +18 -2
- pulumi_gcp/compute/region_ssl_policy.py +18 -2
- pulumi_gcp/compute/region_target_http_proxy.py +18 -2
- pulumi_gcp/compute/region_target_https_proxy.py +18 -2
- pulumi_gcp/compute/region_target_tcp_proxy.py +18 -2
- pulumi_gcp/compute/region_url_map.py +18 -2
- pulumi_gcp/compute/reservation.py +18 -2
- pulumi_gcp/compute/resource_policy.py +18 -2
- pulumi_gcp/compute/route.py +18 -2
- pulumi_gcp/compute/router.py +18 -2
- pulumi_gcp/compute/router_interface.py +22 -6
- pulumi_gcp/compute/router_nat.py +18 -2
- pulumi_gcp/compute/router_peer.py +18 -2
- pulumi_gcp/compute/security_policy.py +52 -4
- pulumi_gcp/compute/security_scan_config.py +18 -2
- pulumi_gcp/compute/service_attachment.py +18 -2
- pulumi_gcp/compute/shared_vpc_host_project.py +20 -4
- pulumi_gcp/compute/shared_vpc_service_project.py +20 -4
- pulumi_gcp/compute/snapshot.py +22 -10
- pulumi_gcp/compute/ssl_certificate.py +18 -2
- pulumi_gcp/compute/ssl_policy.py +18 -2
- pulumi_gcp/compute/subnetwork.py +109 -2
- pulumi_gcp/compute/target_grpc_proxy.py +18 -2
- pulumi_gcp/compute/target_http_proxy.py +18 -2
- pulumi_gcp/compute/target_https_proxy.py +181 -16
- pulumi_gcp/compute/target_instance.py +18 -2
- pulumi_gcp/compute/target_pool.py +18 -2
- pulumi_gcp/compute/target_ssl_proxy.py +18 -2
- pulumi_gcp/compute/target_tcp_proxy.py +18 -2
- pulumi_gcp/compute/url_map.py +18 -2
- pulumi_gcp/compute/vpn_gateway.py +18 -2
- pulumi_gcp/compute/vpn_tunnel.py +18 -2
- pulumi_gcp/config/vars.py +12 -0
- pulumi_gcp/container/_inputs.py +299 -54
- pulumi_gcp/container/attached_cluster.py +18 -2
- pulumi_gcp/container/aws_cluster.py +24 -2
- pulumi_gcp/container/aws_node_pool.py +18 -2
- pulumi_gcp/container/azure_client.py +18 -2
- pulumi_gcp/container/azure_cluster.py +24 -2
- pulumi_gcp/container/azure_node_pool.py +18 -2
- pulumi_gcp/container/cluster.py +92 -29
- pulumi_gcp/container/get_cluster.py +11 -1
- pulumi_gcp/container/node_pool.py +22 -6
- pulumi_gcp/container/outputs.py +384 -52
- pulumi_gcp/containeranalysis/note.py +18 -2
- pulumi_gcp/containeranalysis/occurence.py +18 -2
- pulumi_gcp/databasemigrationservice/__init__.py +1 -0
- pulumi_gcp/databasemigrationservice/_inputs.py +465 -0
- pulumi_gcp/databasemigrationservice/connection_profile.py +122 -12
- pulumi_gcp/databasemigrationservice/outputs.py +466 -0
- pulumi_gcp/databasemigrationservice/private_connection.py +672 -0
- pulumi_gcp/datacatalog/entry.py +18 -2
- pulumi_gcp/datacatalog/entry_group.py +18 -2
- pulumi_gcp/datacatalog/policy_tag.py +18 -2
- pulumi_gcp/datacatalog/tag.py +18 -2
- pulumi_gcp/datacatalog/tag_template.py +18 -2
- pulumi_gcp/datacatalog/taxonomy.py +18 -2
- pulumi_gcp/dataflow/job.py +24 -12
- pulumi_gcp/dataflow/pipeline.py +18 -2
- pulumi_gcp/dataform/_inputs.py +78 -21
- pulumi_gcp/dataform/outputs.py +86 -20
- pulumi_gcp/dataform/repository.py +140 -9
- pulumi_gcp/dataform/repository_release_config.py +18 -2
- pulumi_gcp/dataform/repository_workflow_config.py +20 -4
- pulumi_gcp/datafusion/instance.py +22 -10
- pulumi_gcp/dataloss/prevention_deidentify_template.py +18 -2
- pulumi_gcp/dataloss/prevention_inspect_template.py +18 -2
- pulumi_gcp/dataloss/prevention_job_trigger.py +18 -2
- pulumi_gcp/dataloss/prevention_stored_info_type.py +18 -2
- pulumi_gcp/dataplex/asset.py +22 -10
- pulumi_gcp/dataplex/datascan.py +22 -10
- pulumi_gcp/dataplex/lake.py +22 -10
- pulumi_gcp/dataplex/task.py +22 -10
- pulumi_gcp/dataplex/zone.py +22 -10
- pulumi_gcp/dataproc/_inputs.py +148 -0
- pulumi_gcp/dataproc/autoscaling_policy.py +18 -2
- pulumi_gcp/dataproc/cluster.py +2 -2
- pulumi_gcp/dataproc/cluster_iam_binding.py +12 -20
- pulumi_gcp/dataproc/cluster_iam_member.py +12 -20
- pulumi_gcp/dataproc/cluster_iam_policy.py +12 -20
- pulumi_gcp/dataproc/job.py +20 -8
- pulumi_gcp/dataproc/job_iam_binding.py +12 -20
- pulumi_gcp/dataproc/job_iam_member.py +12 -20
- pulumi_gcp/dataproc/job_iam_policy.py +12 -20
- pulumi_gcp/dataproc/metastore_federation.py +22 -10
- pulumi_gcp/dataproc/metastore_service.py +22 -10
- pulumi_gcp/dataproc/outputs.py +175 -0
- pulumi_gcp/dataproc/workflow_template.py +18 -2
- pulumi_gcp/datastore/data_store_index.py +18 -2
- pulumi_gcp/datastream/connection_profile.py +22 -10
- pulumi_gcp/datastream/private_connection.py +22 -10
- pulumi_gcp/datastream/stream.py +22 -10
- pulumi_gcp/deploymentmanager/deployment.py +18 -2
- pulumi_gcp/diagflow/_inputs.py +626 -4
- pulumi_gcp/diagflow/agent.py +18 -2
- pulumi_gcp/diagflow/cx_agent.py +288 -21
- pulumi_gcp/diagflow/cx_entity_type.py +18 -2
- pulumi_gcp/diagflow/cx_environment.py +18 -2
- pulumi_gcp/diagflow/cx_flow.py +309 -4
- pulumi_gcp/diagflow/cx_intent.py +165 -10
- pulumi_gcp/diagflow/cx_page.py +109 -4
- pulumi_gcp/diagflow/cx_security_settings.py +18 -2
- pulumi_gcp/diagflow/cx_test_case.py +18 -2
- pulumi_gcp/diagflow/cx_version.py +18 -2
- pulumi_gcp/diagflow/cx_webhook.py +18 -2
- pulumi_gcp/diagflow/entity_type.py +18 -2
- pulumi_gcp/diagflow/fulfillment.py +18 -2
- pulumi_gcp/diagflow/intent.py +18 -2
- pulumi_gcp/diagflow/outputs.py +722 -5
- pulumi_gcp/dns/get_keys.py +16 -2
- pulumi_gcp/dns/managed_zone.py +22 -10
- pulumi_gcp/dns/policy.py +18 -2
- pulumi_gcp/dns/record_set.py +24 -8
- pulumi_gcp/dns/response_policy.py +18 -2
- pulumi_gcp/dns/response_policy_rule.py +18 -2
- pulumi_gcp/edgecontainer/__init__.py +12 -0
- pulumi_gcp/edgecontainer/_inputs.py +1171 -0
- pulumi_gcp/edgecontainer/cluster.py +1539 -0
- pulumi_gcp/edgecontainer/node_pool.py +1062 -0
- pulumi_gcp/edgecontainer/outputs.py +1204 -0
- pulumi_gcp/edgecontainer/vpn_connection.py +918 -0
- pulumi_gcp/edgenetwork/network.py +18 -2
- pulumi_gcp/edgenetwork/subnet.py +18 -2
- pulumi_gcp/essentialcontacts/contact.py +18 -2
- pulumi_gcp/essentialcontacts/document_ai_processor.py +18 -2
- pulumi_gcp/essentialcontacts/document_ai_processor_default_version.py +18 -2
- pulumi_gcp/essentialcontacts/document_ai_warehouse_document_schema.py +18 -2
- pulumi_gcp/eventarc/channel.py +18 -2
- pulumi_gcp/eventarc/google_channel_config.py +18 -2
- pulumi_gcp/eventarc/trigger.py +22 -10
- pulumi_gcp/filestore/backup.py +22 -10
- pulumi_gcp/filestore/instance.py +22 -10
- pulumi_gcp/filestore/snapshot.py +22 -10
- pulumi_gcp/firebase/__init__.py +1 -0
- pulumi_gcp/firebase/_inputs.py +878 -0
- pulumi_gcp/firebase/android_app.py +18 -2
- pulumi_gcp/firebase/apple_app.py +18 -2
- pulumi_gcp/firebase/database_instance.py +18 -2
- pulumi_gcp/firebase/extensions_instance.py +18 -2
- pulumi_gcp/firebase/hosting_channel.py +22 -10
- pulumi_gcp/firebase/hosting_custom_domain.py +1274 -0
- pulumi_gcp/firebase/hosting_release.py +18 -2
- pulumi_gcp/firebase/hosting_site.py +18 -2
- pulumi_gcp/firebase/hosting_version.py +18 -2
- pulumi_gcp/firebase/outputs.py +905 -0
- pulumi_gcp/firebase/project.py +18 -2
- pulumi_gcp/firebase/storage_bucket.py +18 -2
- pulumi_gcp/firebase/web_app.py +18 -2
- pulumi_gcp/firebaserules/release.py +18 -2
- pulumi_gcp/firebaserules/ruleset.py +18 -2
- pulumi_gcp/firestore/__init__.py +1 -0
- pulumi_gcp/firestore/_inputs.py +35 -2
- pulumi_gcp/firestore/backup_schedule.py +547 -0
- pulumi_gcp/firestore/database.py +24 -4
- pulumi_gcp/firestore/document.py +22 -2
- pulumi_gcp/firestore/field.py +27 -13
- pulumi_gcp/firestore/index.py +140 -21
- pulumi_gcp/firestore/outputs.py +31 -2
- pulumi_gcp/folder/access_approval_settings.py +18 -2
- pulumi_gcp/folder/iam_audit_config.py +10 -58
- pulumi_gcp/folder/iam_member.py +10 -58
- pulumi_gcp/folder/iam_policy.py +10 -58
- pulumi_gcp/folder/organization_policy.py +22 -6
- pulumi_gcp/gkebackup/backup_plan.py +22 -10
- pulumi_gcp/gkebackup/restore_plan.py +22 -10
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +18 -2
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +18 -2
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +18 -2
- pulumi_gcp/gkehub/__init__.py +1 -0
- pulumi_gcp/gkehub/_inputs.py +431 -0
- pulumi_gcp/gkehub/feature.py +76 -10
- pulumi_gcp/gkehub/feature_membership.py +22 -2
- pulumi_gcp/gkehub/fleet.py +432 -0
- pulumi_gcp/gkehub/get_membership_iam_policy.py +24 -3
- pulumi_gcp/gkehub/membership.py +120 -16
- pulumi_gcp/gkehub/membership_binding.py +22 -10
- pulumi_gcp/gkehub/membership_iam_binding.py +67 -0
- pulumi_gcp/gkehub/membership_iam_member.py +67 -0
- pulumi_gcp/gkehub/membership_iam_policy.py +67 -0
- pulumi_gcp/gkehub/membership_rbac_role_binding.py +18 -2
- pulumi_gcp/gkehub/namespace.py +22 -10
- pulumi_gcp/gkehub/outputs.py +432 -1
- pulumi_gcp/gkehub/scope.py +22 -10
- pulumi_gcp/gkehub/scope_rbac_role_binding.py +22 -10
- pulumi_gcp/gkeonprem/_inputs.py +17 -31
- pulumi_gcp/gkeonprem/bare_metal_admin_cluster.py +148 -132
- pulumi_gcp/gkeonprem/bare_metal_cluster.py +260 -246
- pulumi_gcp/gkeonprem/bare_metal_node_pool.py +30 -18
- pulumi_gcp/gkeonprem/outputs.py +17 -31
- pulumi_gcp/gkeonprem/v_mware_cluster.py +287 -230
- pulumi_gcp/gkeonprem/v_mware_node_pool.py +30 -18
- pulumi_gcp/healthcare/consent_store.py +22 -10
- pulumi_gcp/healthcare/dataset.py +18 -2
- pulumi_gcp/healthcare/dataset_iam_binding.py +10 -38
- pulumi_gcp/healthcare/dataset_iam_member.py +10 -38
- pulumi_gcp/healthcare/dataset_iam_policy.py +10 -38
- pulumi_gcp/healthcare/dicom_store.py +22 -10
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +10 -30
- pulumi_gcp/healthcare/dicom_store_iam_member.py +10 -30
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +10 -30
- pulumi_gcp/healthcare/fhir_store.py +22 -10
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +10 -30
- pulumi_gcp/healthcare/fhir_store_iam_member.py +10 -30
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +10 -30
- pulumi_gcp/healthcare/hl7_store.py +22 -10
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +10 -30
- pulumi_gcp/healthcare/hl7_store_iam_member.py +10 -30
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +10 -30
- pulumi_gcp/iam/_inputs.py +20 -0
- pulumi_gcp/iam/access_boundary_policy.py +18 -2
- pulumi_gcp/iam/deny_policy.py +18 -2
- pulumi_gcp/iam/outputs.py +20 -0
- pulumi_gcp/iam/workforce_pool.py +18 -2
- pulumi_gcp/iam/workforce_pool_provider.py +18 -2
- pulumi_gcp/iam/workload_identity_pool.py +18 -2
- pulumi_gcp/iam/workload_identity_pool_provider.py +18 -2
- pulumi_gcp/iap/brand.py +18 -2
- pulumi_gcp/iap/client.py +18 -2
- pulumi_gcp/identityplatform/_inputs.py +92 -0
- pulumi_gcp/identityplatform/config.py +91 -5
- pulumi_gcp/identityplatform/default_supported_idp_config.py +18 -2
- pulumi_gcp/identityplatform/inbound_saml_config.py +18 -2
- pulumi_gcp/identityplatform/oauth_idp_config.py +18 -2
- pulumi_gcp/identityplatform/outputs.py +129 -0
- pulumi_gcp/identityplatform/project_default_config.py +18 -2
- pulumi_gcp/identityplatform/tenant.py +18 -2
- pulumi_gcp/identityplatform/tenant_default_supported_idp_config.py +18 -2
- pulumi_gcp/identityplatform/tenant_inbound_saml_config.py +18 -2
- pulumi_gcp/identityplatform/tenant_oauth_idp_config.py +18 -2
- pulumi_gcp/integrationconnectors/__init__.py +10 -0
- pulumi_gcp/integrationconnectors/_inputs.py +2518 -0
- pulumi_gcp/integrationconnectors/connection.py +1921 -0
- pulumi_gcp/integrationconnectors/outputs.py +2780 -0
- pulumi_gcp/kms/crypto_key.py +22 -10
- pulumi_gcp/kms/crypto_key_iam_binding.py +10 -30
- pulumi_gcp/kms/crypto_key_iam_member.py +10 -30
- pulumi_gcp/kms/crypto_key_iam_policy.py +10 -30
- pulumi_gcp/kms/crypto_key_version.py +18 -2
- pulumi_gcp/kms/key_ring.py +18 -2
- pulumi_gcp/kms/key_ring_iam_binding.py +10 -30
- pulumi_gcp/kms/key_ring_iam_member.py +10 -30
- pulumi_gcp/kms/key_ring_iam_policy.py +10 -30
- pulumi_gcp/kms/key_ring_import_job.py +18 -2
- pulumi_gcp/logging/_inputs.py +160 -0
- pulumi_gcp/logging/billing_account_bucket_config.py +61 -26
- pulumi_gcp/logging/billing_account_exclusion.py +20 -4
- pulumi_gcp/logging/billing_account_sink.py +20 -4
- pulumi_gcp/logging/folder_bucket_config.py +75 -4
- pulumi_gcp/logging/folder_exclusion.py +20 -4
- pulumi_gcp/logging/folder_sink.py +20 -4
- pulumi_gcp/logging/linked_dataset.py +18 -2
- pulumi_gcp/logging/log_view.py +18 -2
- pulumi_gcp/logging/metric.py +18 -2
- pulumi_gcp/logging/organization_bucket_config.py +75 -4
- pulumi_gcp/logging/organization_exclusion.py +20 -4
- pulumi_gcp/logging/organization_sink.py +20 -4
- pulumi_gcp/logging/outputs.py +196 -0
- pulumi_gcp/logging/project_bucket_config.py +59 -134
- pulumi_gcp/logging/project_exclusion.py +20 -4
- pulumi_gcp/logging/project_sink.py +95 -18
- pulumi_gcp/looker/instance.py +18 -2
- pulumi_gcp/memcache/instance.py +22 -10
- pulumi_gcp/ml/engine_model.py +22 -10
- pulumi_gcp/monitoring/_inputs.py +127 -13
- pulumi_gcp/monitoring/alert_policy.py +64 -2
- pulumi_gcp/monitoring/custom_service.py +18 -2
- pulumi_gcp/monitoring/dashboard.py +18 -2
- pulumi_gcp/monitoring/generic_service.py +18 -2
- pulumi_gcp/monitoring/group.py +18 -2
- pulumi_gcp/monitoring/metric_descriptor.py +18 -2
- pulumi_gcp/monitoring/monitored_project.py +18 -2
- pulumi_gcp/monitoring/notification_channel.py +18 -2
- pulumi_gcp/monitoring/outputs.py +158 -13
- pulumi_gcp/monitoring/slo.py +18 -2
- pulumi_gcp/monitoring/uptime_check_config.py +92 -9
- pulumi_gcp/networkconnectivity/__init__.py +1 -0
- pulumi_gcp/networkconnectivity/_inputs.py +185 -0
- pulumi_gcp/networkconnectivity/hub.py +22 -10
- pulumi_gcp/networkconnectivity/outputs.py +189 -0
- pulumi_gcp/networkconnectivity/policy_based_route.py +1003 -0
- pulumi_gcp/networkconnectivity/service_connection_policy.py +22 -10
- pulumi_gcp/networkconnectivity/spoke.py +22 -10
- pulumi_gcp/networkmanagement/connectivity_test.py +22 -10
- pulumi_gcp/networksecurity/address_group.py +22 -10
- pulumi_gcp/networksecurity/authorization_policy.py +22 -10
- pulumi_gcp/networksecurity/client_tls_policy.py +22 -10
- pulumi_gcp/networksecurity/gateway_security_policy.py +18 -2
- pulumi_gcp/networksecurity/gateway_security_policy_rule.py +18 -2
- pulumi_gcp/networksecurity/server_tls_policy.py +92 -10
- pulumi_gcp/networksecurity/tls_inspection_policy.py +18 -2
- pulumi_gcp/networksecurity/url_list.py +18 -2
- pulumi_gcp/networkservices/edge_cache_keyset.py +22 -10
- pulumi_gcp/networkservices/edge_cache_origin.py +22 -10
- pulumi_gcp/networkservices/edge_cache_service.py +22 -10
- pulumi_gcp/networkservices/endpoint_policy.py +22 -10
- pulumi_gcp/networkservices/gateway.py +22 -10
- pulumi_gcp/networkservices/grpc_route.py +22 -10
- pulumi_gcp/networkservices/http_route.py +22 -10
- pulumi_gcp/networkservices/mesh.py +22 -10
- pulumi_gcp/networkservices/service_binding.py +22 -10
- pulumi_gcp/networkservices/tcp_route.py +22 -10
- pulumi_gcp/networkservices/tls_route.py +18 -2
- pulumi_gcp/notebooks/environment.py +18 -2
- pulumi_gcp/notebooks/instance.py +22 -10
- pulumi_gcp/notebooks/location.py +18 -2
- pulumi_gcp/notebooks/runtime.py +18 -2
- pulumi_gcp/organizations/access_approval_settings.py +18 -2
- pulumi_gcp/organizations/folder.py +22 -6
- pulumi_gcp/organizations/iam_member.py +10 -58
- pulumi_gcp/organizations/iam_policy.py +10 -58
- pulumi_gcp/organizations/policy.py +22 -4
- pulumi_gcp/organizations/project.py +24 -12
- pulumi_gcp/orgpolicy/custom_constraint.py +50 -22
- pulumi_gcp/orgpolicy/policy.py +18 -2
- pulumi_gcp/osconfig/guest_policies.py +18 -2
- pulumi_gcp/osconfig/os_policy_assignment.py +18 -2
- pulumi_gcp/osconfig/patch_deployment.py +18 -2
- pulumi_gcp/oslogin/ssh_public_key.py +18 -2
- pulumi_gcp/projects/access_approval_settings.py +18 -2
- pulumi_gcp/projects/api_key.py +18 -2
- pulumi_gcp/projects/iam_audit_config.py +10 -58
- pulumi_gcp/projects/iam_binding.py +10 -58
- pulumi_gcp/projects/iam_custom_role.py +18 -2
- pulumi_gcp/projects/iam_member.py +10 -58
- pulumi_gcp/projects/iam_policy.py +10 -58
- pulumi_gcp/projects/organization_policy.py +24 -8
- pulumi_gcp/projects/service.py +22 -4
- pulumi_gcp/projects/usage_export_bucket.py +20 -4
- pulumi_gcp/provider.py +60 -0
- pulumi_gcp/pubsub/__init__.py +4 -0
- pulumi_gcp/pubsub/_inputs.py +80 -0
- pulumi_gcp/pubsub/get_schema_iam_policy.py +147 -0
- pulumi_gcp/pubsub/lite_reservation.py +18 -2
- pulumi_gcp/pubsub/lite_subscription.py +18 -2
- pulumi_gcp/pubsub/lite_topic.py +18 -2
- pulumi_gcp/pubsub/outputs.py +56 -0
- pulumi_gcp/pubsub/schema.py +18 -2
- pulumi_gcp/pubsub/schema_iam_binding.py +601 -0
- pulumi_gcp/pubsub/schema_iam_member.py +601 -0
- pulumi_gcp/pubsub/schema_iam_policy.py +523 -0
- pulumi_gcp/pubsub/subscription.py +22 -10
- pulumi_gcp/pubsub/subscription_iam_binding.py +12 -20
- pulumi_gcp/pubsub/subscription_iam_member.py +12 -20
- pulumi_gcp/pubsub/subscription_iam_policy.py +12 -20
- pulumi_gcp/pubsub/topic.py +36 -17
- pulumi_gcp/recaptcha/enterprise_key.py +22 -10
- pulumi_gcp/redis/cluster.py +42 -18
- pulumi_gcp/redis/instance.py +22 -58
- pulumi_gcp/resourcemanager/lien.py +18 -2
- pulumi_gcp/runtimeconfig/config.py +26 -6
- pulumi_gcp/runtimeconfig/variable.py +26 -6
- pulumi_gcp/secretmanager/__init__.py +1 -0
- pulumi_gcp/secretmanager/get_secrets.py +133 -0
- pulumi_gcp/secretmanager/outputs.py +354 -0
- pulumi_gcp/secretmanager/secret.py +36 -10
- pulumi_gcp/secretmanager/secret_version.py +18 -2
- pulumi_gcp/securitycenter/folder_custom_module.py +18 -2
- pulumi_gcp/securitycenter/instance_iam_binding.py +18 -2
- pulumi_gcp/securitycenter/instance_iam_member.py +18 -2
- pulumi_gcp/securitycenter/instance_iam_policy.py +18 -2
- pulumi_gcp/securitycenter/mute_config.py +18 -2
- pulumi_gcp/securitycenter/notification_config.py +18 -2
- pulumi_gcp/securitycenter/organization_custom_module.py +18 -2
- pulumi_gcp/securitycenter/project_custom_module.py +18 -2
- pulumi_gcp/securitycenter/source.py +18 -2
- pulumi_gcp/securitycenter/source_iam_binding.py +18 -2
- pulumi_gcp/securitycenter/source_iam_member.py +18 -2
- pulumi_gcp/securitycenter/source_iam_policy.py +18 -2
- pulumi_gcp/serviceaccount/account.py +20 -4
- pulumi_gcp/serviceaccount/iam_binding.py +2 -30
- pulumi_gcp/serviceaccount/iam_member.py +2 -30
- pulumi_gcp/serviceaccount/iam_policy.py +2 -30
- pulumi_gcp/servicedirectory/endpoint.py +18 -2
- pulumi_gcp/servicedirectory/namespace.py +22 -10
- pulumi_gcp/servicedirectory/service.py +18 -2
- pulumi_gcp/servicenetworking/connection.py +22 -6
- pulumi_gcp/servicenetworking/peered_dns_domain.py +18 -6
- pulumi_gcp/serviceusage/consumer_quota_override.py +18 -2
- pulumi_gcp/sourcerepo/repository.py +18 -2
- pulumi_gcp/spanner/_inputs.py +142 -0
- pulumi_gcp/spanner/database.py +18 -2
- pulumi_gcp/spanner/database_iam_binding.py +10 -26
- pulumi_gcp/spanner/database_iam_member.py +10 -26
- pulumi_gcp/spanner/database_iam_policy.py +10 -26
- pulumi_gcp/spanner/get_instance.py +12 -1
- pulumi_gcp/spanner/instance.py +99 -10
- pulumi_gcp/spanner/instance_iam_binding.py +10 -26
- pulumi_gcp/spanner/instance_iam_member.py +10 -26
- pulumi_gcp/spanner/instance_iam_policy.py +10 -26
- pulumi_gcp/spanner/outputs.py +236 -0
- pulumi_gcp/sql/_inputs.py +27 -7
- pulumi_gcp/sql/database.py +18 -2
- pulumi_gcp/sql/database_instance.py +24 -8
- pulumi_gcp/sql/outputs.py +41 -9
- pulumi_gcp/sql/source_representation_instance.py +25 -9
- pulumi_gcp/sql/user.py +38 -8
- pulumi_gcp/storage/_inputs.py +59 -1
- pulumi_gcp/storage/bucket.py +69 -6
- pulumi_gcp/storage/bucket_access_control.py +18 -2
- pulumi_gcp/storage/bucket_object.py +47 -0
- pulumi_gcp/storage/default_object_access_control.py +18 -2
- pulumi_gcp/storage/get_bucket.py +11 -1
- pulumi_gcp/storage/get_bucket_object.py +11 -1
- pulumi_gcp/storage/get_bucket_object_content.py +11 -1
- pulumi_gcp/storage/hmac_key.py +18 -2
- pulumi_gcp/storage/insights_report_config.py +18 -2
- pulumi_gcp/storage/notification.py +20 -4
- pulumi_gcp/storage/object_access_control.py +18 -2
- pulumi_gcp/storage/outputs.py +129 -2
- pulumi_gcp/storage/transfer_agent_pool.py +18 -2
- pulumi_gcp/storage/transfer_job.py +20 -4
- pulumi_gcp/tags/location_tag_binding.py +35 -19
- pulumi_gcp/tags/tag_binding.py +18 -2
- pulumi_gcp/tags/tag_key.py +18 -2
- pulumi_gcp/tags/tag_value.py +18 -2
- pulumi_gcp/tpu/_inputs.py +450 -0
- pulumi_gcp/tpu/node.py +22 -10
- pulumi_gcp/tpu/outputs.py +477 -0
- pulumi_gcp/tpu/v2_vm.py +906 -38
- pulumi_gcp/vertex/_inputs.py +39 -0
- pulumi_gcp/vertex/ai_dataset.py +4 -8
- pulumi_gcp/vertex/ai_endpoint.py +22 -10
- pulumi_gcp/vertex/ai_feature_store.py +22 -10
- pulumi_gcp/vertex/ai_feature_store_entity_type.py +22 -10
- pulumi_gcp/vertex/ai_feature_store_entity_type_feature.py +22 -10
- pulumi_gcp/vertex/ai_index.py +22 -10
- pulumi_gcp/vertex/ai_index_endpoint.py +116 -10
- pulumi_gcp/vertex/ai_metadata_store.py +18 -2
- pulumi_gcp/vertex/ai_tensorboard.py +22 -10
- pulumi_gcp/vertex/outputs.py +50 -0
- pulumi_gcp/vmwareengine/cluster.py +18 -2
- pulumi_gcp/vmwareengine/network.py +18 -2
- pulumi_gcp/vmwareengine/private_cloud.py +18 -2
- pulumi_gcp/vpcaccess/connector.py +18 -2
- pulumi_gcp/workflows/workflow.py +159 -11
- pulumi_gcp/workstations/_inputs.py +23 -0
- pulumi_gcp/workstations/outputs.py +19 -0
- pulumi_gcp/workstations/workstation.py +22 -10
- pulumi_gcp/workstations/workstation_cluster.py +142 -10
- pulumi_gcp/workstations/workstation_config.py +24 -12
- {pulumi_gcp-7.0.0rc0.dist-info → pulumi_gcp-7.1.0.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.0.0rc0.dist-info → pulumi_gcp-7.1.0.dist-info}/RECORD +678 -650
- {pulumi_gcp-7.0.0rc0.dist-info → pulumi_gcp-7.1.0.dist-info}/WHEEL +0 -0
- {pulumi_gcp-7.0.0rc0.dist-info → pulumi_gcp-7.1.0.dist-info}/top_level.txt +0 -0
pulumi_gcp/kms/crypto_key.py
CHANGED
@@ -214,8 +214,7 @@ class _CryptoKeyState:
|
|
214
214
|
Input properties used for looking up and filtering CryptoKey resources.
|
215
215
|
:param pulumi.Input[str] destroy_scheduled_duration: The period of time that versions of this key spend in the DESTROY_SCHEDULED state before transitioning to DESTROYED.
|
216
216
|
If not specified at creation time, the default duration is 24 hours.
|
217
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] effective_labels: All of labels (key/value pairs) present on the resource in GCP, including the labels configured through
|
218
|
-
clients and services.
|
217
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] effective_labels: All of labels (key/value pairs) present on the resource in GCP, including the labels configured through Pulumi, other clients and services.
|
219
218
|
:param pulumi.Input[bool] import_only: Whether this key may contain imported versions only.
|
220
219
|
:param pulumi.Input[str] key_ring: The KeyRing that this key belongs to.
|
221
220
|
Format: `'projects/{{project}}/locations/{{location}}/keyRings/{{keyRing}}'`.
|
@@ -282,8 +281,7 @@ class _CryptoKeyState:
|
|
282
281
|
@pulumi.getter(name="effectiveLabels")
|
283
282
|
def effective_labels(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
284
283
|
"""
|
285
|
-
All of labels (key/value pairs) present on the resource in GCP, including the labels configured through
|
286
|
-
clients and services.
|
284
|
+
All of labels (key/value pairs) present on the resource in GCP, including the labels configured through Pulumi, other clients and services.
|
287
285
|
"""
|
288
286
|
return pulumi.get(self, "effective_labels")
|
289
287
|
|
@@ -477,7 +475,15 @@ class CryptoKey(pulumi.CustomResource):
|
|
477
475
|
|
478
476
|
## Import
|
479
477
|
|
480
|
-
CryptoKey can be imported using any of these accepted formats
|
478
|
+
CryptoKey can be imported using any of these accepted formats* `{{key_ring}}/cryptoKeys/{{name}}` * `{{key_ring}}/{{name}}` In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to import CryptoKey using one of the formats above. For exampletf import {
|
479
|
+
|
480
|
+
id = "{{key_ring}}/cryptoKeys/{{name}}"
|
481
|
+
|
482
|
+
to = google_kms_crypto_key.default }
|
483
|
+
|
484
|
+
```sh
|
485
|
+
$ pulumi import gcp:kms/cryptoKey:CryptoKey When using the [`terraform import` command](https://developer.hashicorp.com/terraform/cli/commands/import), CryptoKey can be imported using one of the formats above. For example
|
486
|
+
```
|
481
487
|
|
482
488
|
```sh
|
483
489
|
$ pulumi import gcp:kms/cryptoKey:CryptoKey default {{key_ring}}/cryptoKeys/{{name}}
|
@@ -567,7 +573,15 @@ class CryptoKey(pulumi.CustomResource):
|
|
567
573
|
|
568
574
|
## Import
|
569
575
|
|
570
|
-
CryptoKey can be imported using any of these accepted formats
|
576
|
+
CryptoKey can be imported using any of these accepted formats* `{{key_ring}}/cryptoKeys/{{name}}` * `{{key_ring}}/{{name}}` In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to import CryptoKey using one of the formats above. For exampletf import {
|
577
|
+
|
578
|
+
id = "{{key_ring}}/cryptoKeys/{{name}}"
|
579
|
+
|
580
|
+
to = google_kms_crypto_key.default }
|
581
|
+
|
582
|
+
```sh
|
583
|
+
$ pulumi import gcp:kms/cryptoKey:CryptoKey When using the [`terraform import` command](https://developer.hashicorp.com/terraform/cli/commands/import), CryptoKey can be imported using one of the formats above. For example
|
584
|
+
```
|
571
585
|
|
572
586
|
```sh
|
573
587
|
$ pulumi import gcp:kms/cryptoKey:CryptoKey default {{key_ring}}/cryptoKeys/{{name}}
|
@@ -655,8 +669,7 @@ class CryptoKey(pulumi.CustomResource):
|
|
655
669
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
656
670
|
:param pulumi.Input[str] destroy_scheduled_duration: The period of time that versions of this key spend in the DESTROY_SCHEDULED state before transitioning to DESTROYED.
|
657
671
|
If not specified at creation time, the default duration is 24 hours.
|
658
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] effective_labels: All of labels (key/value pairs) present on the resource in GCP, including the labels configured through
|
659
|
-
clients and services.
|
672
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] effective_labels: All of labels (key/value pairs) present on the resource in GCP, including the labels configured through Pulumi, other clients and services.
|
660
673
|
:param pulumi.Input[bool] import_only: Whether this key may contain imported versions only.
|
661
674
|
:param pulumi.Input[str] key_ring: The KeyRing that this key belongs to.
|
662
675
|
Format: `'projects/{{project}}/locations/{{location}}/keyRings/{{keyRing}}'`.
|
@@ -713,8 +726,7 @@ class CryptoKey(pulumi.CustomResource):
|
|
713
726
|
@pulumi.getter(name="effectiveLabels")
|
714
727
|
def effective_labels(self) -> pulumi.Output[Mapping[str, str]]:
|
715
728
|
"""
|
716
|
-
All of labels (key/value pairs) present on the resource in GCP, including the labels configured through
|
717
|
-
clients and services.
|
729
|
+
All of labels (key/value pairs) present on the resource in GCP, including the labels configured through Pulumi, other clients and services.
|
718
730
|
"""
|
719
731
|
return pulumi.get(self, "effective_labels")
|
720
732
|
|
@@ -329,28 +329,18 @@ class CryptoKeyIAMBinding(pulumi.CustomResource):
|
|
329
329
|
|
330
330
|
## Import
|
331
331
|
|
332
|
-
IAM
|
332
|
+
### Importing IAM policies IAM policy imports use the identifier of the KMS crypto key only. For example* `{{project_id}}/{{location}}/{{key_ring_name}}/{{crypto_key_name}}` An [`import` block](https://developer.hashicorp.com/terraform/language/import) (Terraform v1.5.0 and later) can be used to import IAM policiestf import {
|
333
333
|
|
334
|
-
|
334
|
+
id = "{{project_id}}/{{location}}/{{key_ring_name}}/{{crypto_key_name}}"
|
335
335
|
|
336
|
-
|
337
|
-
$ pulumi import gcp:kms/cryptoKeyIAMBinding:CryptoKeyIAMBinding crypto_key "your-project-id/location-name/key-ring-name/key-name roles/viewer user:foo@example.com"
|
338
|
-
```
|
339
|
-
|
340
|
-
IAM binding imports use space-delimited identifiers; first the resource in question and then the role.
|
341
|
-
|
342
|
-
These bindings can be imported using the `crypto_key_id` and role, e.g.
|
336
|
+
to = google_kms_crypto_key_iam_policy.default }
|
343
337
|
|
344
338
|
```sh
|
345
|
-
$ pulumi import gcp:kms/cryptoKeyIAMBinding:CryptoKeyIAMBinding
|
339
|
+
$ pulumi import gcp:kms/cryptoKeyIAMBinding:CryptoKeyIAMBinding The [`terraform import` command](https://developer.hashicorp.com/terraform/cli/commands/import) can also be used
|
346
340
|
```
|
347
341
|
|
348
|
-
IAM policy imports use the identifier of the resource in question.
|
349
|
-
|
350
|
-
This policy resource can be imported using the `crypto_key_id`, e.g.
|
351
|
-
|
352
342
|
```sh
|
353
|
-
$ pulumi import gcp:kms/cryptoKeyIAMBinding:CryptoKeyIAMBinding
|
343
|
+
$ pulumi import gcp:kms/cryptoKeyIAMBinding:CryptoKeyIAMBinding default {{project_id}}/{{location}}/{{key_ring_name}}/{{crypto_key_name}}
|
354
344
|
```
|
355
345
|
|
356
346
|
:param str resource_name: The name of the resource.
|
@@ -480,28 +470,18 @@ class CryptoKeyIAMBinding(pulumi.CustomResource):
|
|
480
470
|
|
481
471
|
## Import
|
482
472
|
|
483
|
-
IAM
|
473
|
+
### Importing IAM policies IAM policy imports use the identifier of the KMS crypto key only. For example* `{{project_id}}/{{location}}/{{key_ring_name}}/{{crypto_key_name}}` An [`import` block](https://developer.hashicorp.com/terraform/language/import) (Terraform v1.5.0 and later) can be used to import IAM policiestf import {
|
484
474
|
|
485
|
-
|
475
|
+
id = "{{project_id}}/{{location}}/{{key_ring_name}}/{{crypto_key_name}}"
|
486
476
|
|
487
|
-
|
488
|
-
$ pulumi import gcp:kms/cryptoKeyIAMBinding:CryptoKeyIAMBinding crypto_key "your-project-id/location-name/key-ring-name/key-name roles/viewer user:foo@example.com"
|
489
|
-
```
|
490
|
-
|
491
|
-
IAM binding imports use space-delimited identifiers; first the resource in question and then the role.
|
492
|
-
|
493
|
-
These bindings can be imported using the `crypto_key_id` and role, e.g.
|
477
|
+
to = google_kms_crypto_key_iam_policy.default }
|
494
478
|
|
495
479
|
```sh
|
496
|
-
$ pulumi import gcp:kms/cryptoKeyIAMBinding:CryptoKeyIAMBinding
|
480
|
+
$ pulumi import gcp:kms/cryptoKeyIAMBinding:CryptoKeyIAMBinding The [`terraform import` command](https://developer.hashicorp.com/terraform/cli/commands/import) can also be used
|
497
481
|
```
|
498
482
|
|
499
|
-
IAM policy imports use the identifier of the resource in question.
|
500
|
-
|
501
|
-
This policy resource can be imported using the `crypto_key_id`, e.g.
|
502
|
-
|
503
483
|
```sh
|
504
|
-
$ pulumi import gcp:kms/cryptoKeyIAMBinding:CryptoKeyIAMBinding
|
484
|
+
$ pulumi import gcp:kms/cryptoKeyIAMBinding:CryptoKeyIAMBinding default {{project_id}}/{{location}}/{{key_ring_name}}/{{crypto_key_name}}
|
505
485
|
```
|
506
486
|
|
507
487
|
:param str resource_name: The name of the resource.
|
@@ -329,28 +329,18 @@ class CryptoKeyIAMMember(pulumi.CustomResource):
|
|
329
329
|
|
330
330
|
## Import
|
331
331
|
|
332
|
-
IAM
|
332
|
+
### Importing IAM policies IAM policy imports use the identifier of the KMS crypto key only. For example* `{{project_id}}/{{location}}/{{key_ring_name}}/{{crypto_key_name}}` An [`import` block](https://developer.hashicorp.com/terraform/language/import) (Terraform v1.5.0 and later) can be used to import IAM policiestf import {
|
333
333
|
|
334
|
-
|
334
|
+
id = "{{project_id}}/{{location}}/{{key_ring_name}}/{{crypto_key_name}}"
|
335
335
|
|
336
|
-
|
337
|
-
$ pulumi import gcp:kms/cryptoKeyIAMMember:CryptoKeyIAMMember crypto_key "your-project-id/location-name/key-ring-name/key-name roles/viewer user:foo@example.com"
|
338
|
-
```
|
339
|
-
|
340
|
-
IAM binding imports use space-delimited identifiers; first the resource in question and then the role.
|
341
|
-
|
342
|
-
These bindings can be imported using the `crypto_key_id` and role, e.g.
|
336
|
+
to = google_kms_crypto_key_iam_policy.default }
|
343
337
|
|
344
338
|
```sh
|
345
|
-
$ pulumi import gcp:kms/cryptoKeyIAMMember:CryptoKeyIAMMember
|
339
|
+
$ pulumi import gcp:kms/cryptoKeyIAMMember:CryptoKeyIAMMember The [`terraform import` command](https://developer.hashicorp.com/terraform/cli/commands/import) can also be used
|
346
340
|
```
|
347
341
|
|
348
|
-
IAM policy imports use the identifier of the resource in question.
|
349
|
-
|
350
|
-
This policy resource can be imported using the `crypto_key_id`, e.g.
|
351
|
-
|
352
342
|
```sh
|
353
|
-
$ pulumi import gcp:kms/cryptoKeyIAMMember:CryptoKeyIAMMember
|
343
|
+
$ pulumi import gcp:kms/cryptoKeyIAMMember:CryptoKeyIAMMember default {{project_id}}/{{location}}/{{key_ring_name}}/{{crypto_key_name}}
|
354
344
|
```
|
355
345
|
|
356
346
|
:param str resource_name: The name of the resource.
|
@@ -480,28 +470,18 @@ class CryptoKeyIAMMember(pulumi.CustomResource):
|
|
480
470
|
|
481
471
|
## Import
|
482
472
|
|
483
|
-
IAM
|
473
|
+
### Importing IAM policies IAM policy imports use the identifier of the KMS crypto key only. For example* `{{project_id}}/{{location}}/{{key_ring_name}}/{{crypto_key_name}}` An [`import` block](https://developer.hashicorp.com/terraform/language/import) (Terraform v1.5.0 and later) can be used to import IAM policiestf import {
|
484
474
|
|
485
|
-
|
475
|
+
id = "{{project_id}}/{{location}}/{{key_ring_name}}/{{crypto_key_name}}"
|
486
476
|
|
487
|
-
|
488
|
-
$ pulumi import gcp:kms/cryptoKeyIAMMember:CryptoKeyIAMMember crypto_key "your-project-id/location-name/key-ring-name/key-name roles/viewer user:foo@example.com"
|
489
|
-
```
|
490
|
-
|
491
|
-
IAM binding imports use space-delimited identifiers; first the resource in question and then the role.
|
492
|
-
|
493
|
-
These bindings can be imported using the `crypto_key_id` and role, e.g.
|
477
|
+
to = google_kms_crypto_key_iam_policy.default }
|
494
478
|
|
495
479
|
```sh
|
496
|
-
$ pulumi import gcp:kms/cryptoKeyIAMMember:CryptoKeyIAMMember
|
480
|
+
$ pulumi import gcp:kms/cryptoKeyIAMMember:CryptoKeyIAMMember The [`terraform import` command](https://developer.hashicorp.com/terraform/cli/commands/import) can also be used
|
497
481
|
```
|
498
482
|
|
499
|
-
IAM policy imports use the identifier of the resource in question.
|
500
|
-
|
501
|
-
This policy resource can be imported using the `crypto_key_id`, e.g.
|
502
|
-
|
503
483
|
```sh
|
504
|
-
$ pulumi import gcp:kms/cryptoKeyIAMMember:CryptoKeyIAMMember
|
484
|
+
$ pulumi import gcp:kms/cryptoKeyIAMMember:CryptoKeyIAMMember default {{project_id}}/{{location}}/{{key_ring_name}}/{{crypto_key_name}}
|
505
485
|
```
|
506
486
|
|
507
487
|
:param str resource_name: The name of the resource.
|
@@ -266,28 +266,18 @@ class CryptoKeyIAMPolicy(pulumi.CustomResource):
|
|
266
266
|
|
267
267
|
## Import
|
268
268
|
|
269
|
-
IAM
|
269
|
+
### Importing IAM policies IAM policy imports use the identifier of the KMS crypto key only. For example* `{{project_id}}/{{location}}/{{key_ring_name}}/{{crypto_key_name}}` An [`import` block](https://developer.hashicorp.com/terraform/language/import) (Terraform v1.5.0 and later) can be used to import IAM policiestf import {
|
270
270
|
|
271
|
-
|
271
|
+
id = "{{project_id}}/{{location}}/{{key_ring_name}}/{{crypto_key_name}}"
|
272
272
|
|
273
|
-
|
274
|
-
$ pulumi import gcp:kms/cryptoKeyIAMPolicy:CryptoKeyIAMPolicy crypto_key "your-project-id/location-name/key-ring-name/key-name roles/viewer user:foo@example.com"
|
275
|
-
```
|
276
|
-
|
277
|
-
IAM binding imports use space-delimited identifiers; first the resource in question and then the role.
|
278
|
-
|
279
|
-
These bindings can be imported using the `crypto_key_id` and role, e.g.
|
273
|
+
to = google_kms_crypto_key_iam_policy.default }
|
280
274
|
|
281
275
|
```sh
|
282
|
-
$ pulumi import gcp:kms/cryptoKeyIAMPolicy:CryptoKeyIAMPolicy
|
276
|
+
$ pulumi import gcp:kms/cryptoKeyIAMPolicy:CryptoKeyIAMPolicy The [`terraform import` command](https://developer.hashicorp.com/terraform/cli/commands/import) can also be used
|
283
277
|
```
|
284
278
|
|
285
|
-
IAM policy imports use the identifier of the resource in question.
|
286
|
-
|
287
|
-
This policy resource can be imported using the `crypto_key_id`, e.g.
|
288
|
-
|
289
279
|
```sh
|
290
|
-
$ pulumi import gcp:kms/cryptoKeyIAMPolicy:CryptoKeyIAMPolicy
|
280
|
+
$ pulumi import gcp:kms/cryptoKeyIAMPolicy:CryptoKeyIAMPolicy default {{project_id}}/{{location}}/{{key_ring_name}}/{{crypto_key_name}}
|
291
281
|
```
|
292
282
|
|
293
283
|
:param str resource_name: The name of the resource.
|
@@ -415,28 +405,18 @@ class CryptoKeyIAMPolicy(pulumi.CustomResource):
|
|
415
405
|
|
416
406
|
## Import
|
417
407
|
|
418
|
-
IAM
|
408
|
+
### Importing IAM policies IAM policy imports use the identifier of the KMS crypto key only. For example* `{{project_id}}/{{location}}/{{key_ring_name}}/{{crypto_key_name}}` An [`import` block](https://developer.hashicorp.com/terraform/language/import) (Terraform v1.5.0 and later) can be used to import IAM policiestf import {
|
419
409
|
|
420
|
-
|
410
|
+
id = "{{project_id}}/{{location}}/{{key_ring_name}}/{{crypto_key_name}}"
|
421
411
|
|
422
|
-
|
423
|
-
$ pulumi import gcp:kms/cryptoKeyIAMPolicy:CryptoKeyIAMPolicy crypto_key "your-project-id/location-name/key-ring-name/key-name roles/viewer user:foo@example.com"
|
424
|
-
```
|
425
|
-
|
426
|
-
IAM binding imports use space-delimited identifiers; first the resource in question and then the role.
|
427
|
-
|
428
|
-
These bindings can be imported using the `crypto_key_id` and role, e.g.
|
412
|
+
to = google_kms_crypto_key_iam_policy.default }
|
429
413
|
|
430
414
|
```sh
|
431
|
-
$ pulumi import gcp:kms/cryptoKeyIAMPolicy:CryptoKeyIAMPolicy
|
415
|
+
$ pulumi import gcp:kms/cryptoKeyIAMPolicy:CryptoKeyIAMPolicy The [`terraform import` command](https://developer.hashicorp.com/terraform/cli/commands/import) can also be used
|
432
416
|
```
|
433
417
|
|
434
|
-
IAM policy imports use the identifier of the resource in question.
|
435
|
-
|
436
|
-
This policy resource can be imported using the `crypto_key_id`, e.g.
|
437
|
-
|
438
418
|
```sh
|
439
|
-
$ pulumi import gcp:kms/cryptoKeyIAMPolicy:CryptoKeyIAMPolicy
|
419
|
+
$ pulumi import gcp:kms/cryptoKeyIAMPolicy:CryptoKeyIAMPolicy default {{project_id}}/{{location}}/{{key_ring_name}}/{{crypto_key_name}}
|
440
420
|
```
|
441
421
|
|
442
422
|
:param str resource_name: The name of the resource.
|
@@ -231,7 +231,15 @@ class CryptoKeyVersion(pulumi.CustomResource):
|
|
231
231
|
|
232
232
|
## Import
|
233
233
|
|
234
|
-
CryptoKeyVersion can be imported using any of these accepted formats
|
234
|
+
CryptoKeyVersion can be imported using any of these accepted formats* `{{name}}` In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to import CryptoKeyVersion using one of the formats above. For exampletf import {
|
235
|
+
|
236
|
+
id = "{{name}}"
|
237
|
+
|
238
|
+
to = google_kms_crypto_key_version.default }
|
239
|
+
|
240
|
+
```sh
|
241
|
+
$ pulumi import gcp:kms/cryptoKeyVersion:CryptoKeyVersion When using the [`terraform import` command](https://developer.hashicorp.com/terraform/cli/commands/import), CryptoKeyVersion can be imported using one of the formats above. For example
|
242
|
+
```
|
235
243
|
|
236
244
|
```sh
|
237
245
|
$ pulumi import gcp:kms/cryptoKeyVersion:CryptoKeyVersion default {{name}}
|
@@ -280,7 +288,15 @@ class CryptoKeyVersion(pulumi.CustomResource):
|
|
280
288
|
|
281
289
|
## Import
|
282
290
|
|
283
|
-
CryptoKeyVersion can be imported using any of these accepted formats
|
291
|
+
CryptoKeyVersion can be imported using any of these accepted formats* `{{name}}` In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to import CryptoKeyVersion using one of the formats above. For exampletf import {
|
292
|
+
|
293
|
+
id = "{{name}}"
|
294
|
+
|
295
|
+
to = google_kms_crypto_key_version.default }
|
296
|
+
|
297
|
+
```sh
|
298
|
+
$ pulumi import gcp:kms/cryptoKeyVersion:CryptoKeyVersion When using the [`terraform import` command](https://developer.hashicorp.com/terraform/cli/commands/import), CryptoKeyVersion can be imported using one of the formats above. For example
|
299
|
+
```
|
284
300
|
|
285
301
|
```sh
|
286
302
|
$ pulumi import gcp:kms/cryptoKeyVersion:CryptoKeyVersion default {{name}}
|
pulumi_gcp/kms/key_ring.py
CHANGED
@@ -176,7 +176,15 @@ class KeyRing(pulumi.CustomResource):
|
|
176
176
|
|
177
177
|
## Import
|
178
178
|
|
179
|
-
KeyRing can be imported using any of these accepted formats
|
179
|
+
KeyRing can be imported using any of these accepted formats* `projects/{{project}}/locations/{{location}}/keyRings/{{name}}` * `{{project}}/{{location}}/{{name}}` * `{{location}}/{{name}}` In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to import KeyRing using one of the formats above. For exampletf import {
|
180
|
+
|
181
|
+
id = "projects/{{project}}/locations/{{location}}/keyRings/{{name}}"
|
182
|
+
|
183
|
+
to = google_kms_key_ring.default }
|
184
|
+
|
185
|
+
```sh
|
186
|
+
$ pulumi import gcp:kms/keyRing:KeyRing When using the [`terraform import` command](https://developer.hashicorp.com/terraform/cli/commands/import), KeyRing can be imported using one of the formats above. For example
|
187
|
+
```
|
180
188
|
|
181
189
|
```sh
|
182
190
|
$ pulumi import gcp:kms/keyRing:KeyRing default projects/{{project}}/locations/{{location}}/keyRings/{{name}}
|
@@ -232,7 +240,15 @@ class KeyRing(pulumi.CustomResource):
|
|
232
240
|
|
233
241
|
## Import
|
234
242
|
|
235
|
-
KeyRing can be imported using any of these accepted formats
|
243
|
+
KeyRing can be imported using any of these accepted formats* `projects/{{project}}/locations/{{location}}/keyRings/{{name}}` * `{{project}}/{{location}}/{{name}}` * `{{location}}/{{name}}` In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to import KeyRing using one of the formats above. For exampletf import {
|
244
|
+
|
245
|
+
id = "projects/{{project}}/locations/{{location}}/keyRings/{{name}}"
|
246
|
+
|
247
|
+
to = google_kms_key_ring.default }
|
248
|
+
|
249
|
+
```sh
|
250
|
+
$ pulumi import gcp:kms/keyRing:KeyRing When using the [`terraform import` command](https://developer.hashicorp.com/terraform/cli/commands/import), KeyRing can be imported using one of the formats above. For example
|
251
|
+
```
|
236
252
|
|
237
253
|
```sh
|
238
254
|
$ pulumi import gcp:kms/keyRing:KeyRing default projects/{{project}}/locations/{{location}}/keyRings/{{name}}
|
@@ -340,28 +340,18 @@ class KeyRingIAMBinding(pulumi.CustomResource):
|
|
340
340
|
|
341
341
|
## Import
|
342
342
|
|
343
|
-
IAM
|
343
|
+
### Importing IAM policies IAM policy imports use the identifier of the Cloud KMS key ring only. For example* `{{project_id}}/{{location}}/{{key_ring_name}}` An [`import` block](https://developer.hashicorp.com/terraform/language/import) (Terraform v1.5.0 and later) can be used to import IAM policiestf import {
|
344
344
|
|
345
|
-
|
345
|
+
id = "{{project_id}}/{{location}}/{{key_ring_name}}"
|
346
346
|
|
347
|
-
|
348
|
-
$ pulumi import gcp:kms/keyRingIAMBinding:KeyRingIAMBinding key_ring_iam "your-project-id/location-name/key-ring-name roles/viewer user:foo@example.com"
|
349
|
-
```
|
350
|
-
|
351
|
-
IAM binding imports use space-delimited identifiers; the resource in question and the role.
|
352
|
-
|
353
|
-
This binding resource can be imported using the `key_ring_id` and role, e.g.
|
347
|
+
to = google_kms_key_ring_iam_policy.default }
|
354
348
|
|
355
349
|
```sh
|
356
|
-
$ pulumi import gcp:kms/keyRingIAMBinding:KeyRingIAMBinding
|
350
|
+
$ pulumi import gcp:kms/keyRingIAMBinding:KeyRingIAMBinding The [`terraform import` command](https://developer.hashicorp.com/terraform/cli/commands/import) can also be used
|
357
351
|
```
|
358
352
|
|
359
|
-
IAM policy imports use the identifier of the resource in question.
|
360
|
-
|
361
|
-
This policy resource can be imported using the `key_ring_id`, e.g.
|
362
|
-
|
363
353
|
```sh
|
364
|
-
$ pulumi import gcp:kms/keyRingIAMBinding:KeyRingIAMBinding
|
354
|
+
$ pulumi import gcp:kms/keyRingIAMBinding:KeyRingIAMBinding default {{project_id}}/{{location}}/{{key_ring_name}}
|
365
355
|
```
|
366
356
|
|
367
357
|
:param str resource_name: The name of the resource.
|
@@ -499,28 +489,18 @@ class KeyRingIAMBinding(pulumi.CustomResource):
|
|
499
489
|
|
500
490
|
## Import
|
501
491
|
|
502
|
-
IAM
|
492
|
+
### Importing IAM policies IAM policy imports use the identifier of the Cloud KMS key ring only. For example* `{{project_id}}/{{location}}/{{key_ring_name}}` An [`import` block](https://developer.hashicorp.com/terraform/language/import) (Terraform v1.5.0 and later) can be used to import IAM policiestf import {
|
503
493
|
|
504
|
-
|
494
|
+
id = "{{project_id}}/{{location}}/{{key_ring_name}}"
|
505
495
|
|
506
|
-
|
507
|
-
$ pulumi import gcp:kms/keyRingIAMBinding:KeyRingIAMBinding key_ring_iam "your-project-id/location-name/key-ring-name roles/viewer user:foo@example.com"
|
508
|
-
```
|
509
|
-
|
510
|
-
IAM binding imports use space-delimited identifiers; the resource in question and the role.
|
511
|
-
|
512
|
-
This binding resource can be imported using the `key_ring_id` and role, e.g.
|
496
|
+
to = google_kms_key_ring_iam_policy.default }
|
513
497
|
|
514
498
|
```sh
|
515
|
-
$ pulumi import gcp:kms/keyRingIAMBinding:KeyRingIAMBinding
|
499
|
+
$ pulumi import gcp:kms/keyRingIAMBinding:KeyRingIAMBinding The [`terraform import` command](https://developer.hashicorp.com/terraform/cli/commands/import) can also be used
|
516
500
|
```
|
517
501
|
|
518
|
-
IAM policy imports use the identifier of the resource in question.
|
519
|
-
|
520
|
-
This policy resource can be imported using the `key_ring_id`, e.g.
|
521
|
-
|
522
502
|
```sh
|
523
|
-
$ pulumi import gcp:kms/keyRingIAMBinding:KeyRingIAMBinding
|
503
|
+
$ pulumi import gcp:kms/keyRingIAMBinding:KeyRingIAMBinding default {{project_id}}/{{location}}/{{key_ring_name}}
|
524
504
|
```
|
525
505
|
|
526
506
|
:param str resource_name: The name of the resource.
|
@@ -340,28 +340,18 @@ class KeyRingIAMMember(pulumi.CustomResource):
|
|
340
340
|
|
341
341
|
## Import
|
342
342
|
|
343
|
-
IAM
|
343
|
+
### Importing IAM policies IAM policy imports use the identifier of the Cloud KMS key ring only. For example* `{{project_id}}/{{location}}/{{key_ring_name}}` An [`import` block](https://developer.hashicorp.com/terraform/language/import) (Terraform v1.5.0 and later) can be used to import IAM policiestf import {
|
344
344
|
|
345
|
-
|
345
|
+
id = "{{project_id}}/{{location}}/{{key_ring_name}}"
|
346
346
|
|
347
|
-
|
348
|
-
$ pulumi import gcp:kms/keyRingIAMMember:KeyRingIAMMember key_ring_iam "your-project-id/location-name/key-ring-name roles/viewer user:foo@example.com"
|
349
|
-
```
|
350
|
-
|
351
|
-
IAM binding imports use space-delimited identifiers; the resource in question and the role.
|
352
|
-
|
353
|
-
This binding resource can be imported using the `key_ring_id` and role, e.g.
|
347
|
+
to = google_kms_key_ring_iam_policy.default }
|
354
348
|
|
355
349
|
```sh
|
356
|
-
$ pulumi import gcp:kms/keyRingIAMMember:KeyRingIAMMember
|
350
|
+
$ pulumi import gcp:kms/keyRingIAMMember:KeyRingIAMMember The [`terraform import` command](https://developer.hashicorp.com/terraform/cli/commands/import) can also be used
|
357
351
|
```
|
358
352
|
|
359
|
-
IAM policy imports use the identifier of the resource in question.
|
360
|
-
|
361
|
-
This policy resource can be imported using the `key_ring_id`, e.g.
|
362
|
-
|
363
353
|
```sh
|
364
|
-
$ pulumi import gcp:kms/keyRingIAMMember:KeyRingIAMMember
|
354
|
+
$ pulumi import gcp:kms/keyRingIAMMember:KeyRingIAMMember default {{project_id}}/{{location}}/{{key_ring_name}}
|
365
355
|
```
|
366
356
|
|
367
357
|
:param str resource_name: The name of the resource.
|
@@ -499,28 +489,18 @@ class KeyRingIAMMember(pulumi.CustomResource):
|
|
499
489
|
|
500
490
|
## Import
|
501
491
|
|
502
|
-
IAM
|
492
|
+
### Importing IAM policies IAM policy imports use the identifier of the Cloud KMS key ring only. For example* `{{project_id}}/{{location}}/{{key_ring_name}}` An [`import` block](https://developer.hashicorp.com/terraform/language/import) (Terraform v1.5.0 and later) can be used to import IAM policiestf import {
|
503
493
|
|
504
|
-
|
494
|
+
id = "{{project_id}}/{{location}}/{{key_ring_name}}"
|
505
495
|
|
506
|
-
|
507
|
-
$ pulumi import gcp:kms/keyRingIAMMember:KeyRingIAMMember key_ring_iam "your-project-id/location-name/key-ring-name roles/viewer user:foo@example.com"
|
508
|
-
```
|
509
|
-
|
510
|
-
IAM binding imports use space-delimited identifiers; the resource in question and the role.
|
511
|
-
|
512
|
-
This binding resource can be imported using the `key_ring_id` and role, e.g.
|
496
|
+
to = google_kms_key_ring_iam_policy.default }
|
513
497
|
|
514
498
|
```sh
|
515
|
-
$ pulumi import gcp:kms/keyRingIAMMember:KeyRingIAMMember
|
499
|
+
$ pulumi import gcp:kms/keyRingIAMMember:KeyRingIAMMember The [`terraform import` command](https://developer.hashicorp.com/terraform/cli/commands/import) can also be used
|
516
500
|
```
|
517
501
|
|
518
|
-
IAM policy imports use the identifier of the resource in question.
|
519
|
-
|
520
|
-
This policy resource can be imported using the `key_ring_id`, e.g.
|
521
|
-
|
522
502
|
```sh
|
523
|
-
$ pulumi import gcp:kms/keyRingIAMMember:KeyRingIAMMember
|
503
|
+
$ pulumi import gcp:kms/keyRingIAMMember:KeyRingIAMMember default {{project_id}}/{{location}}/{{key_ring_name}}
|
524
504
|
```
|
525
505
|
|
526
506
|
:param str resource_name: The name of the resource.
|
@@ -273,28 +273,18 @@ class KeyRingIAMPolicy(pulumi.CustomResource):
|
|
273
273
|
|
274
274
|
## Import
|
275
275
|
|
276
|
-
IAM
|
276
|
+
### Importing IAM policies IAM policy imports use the identifier of the Cloud KMS key ring only. For example* `{{project_id}}/{{location}}/{{key_ring_name}}` An [`import` block](https://developer.hashicorp.com/terraform/language/import) (Terraform v1.5.0 and later) can be used to import IAM policiestf import {
|
277
277
|
|
278
|
-
|
278
|
+
id = "{{project_id}}/{{location}}/{{key_ring_name}}"
|
279
279
|
|
280
|
-
|
281
|
-
$ pulumi import gcp:kms/keyRingIAMPolicy:KeyRingIAMPolicy key_ring_iam "your-project-id/location-name/key-ring-name roles/viewer user:foo@example.com"
|
282
|
-
```
|
283
|
-
|
284
|
-
IAM binding imports use space-delimited identifiers; the resource in question and the role.
|
285
|
-
|
286
|
-
This binding resource can be imported using the `key_ring_id` and role, e.g.
|
280
|
+
to = google_kms_key_ring_iam_policy.default }
|
287
281
|
|
288
282
|
```sh
|
289
|
-
$ pulumi import gcp:kms/keyRingIAMPolicy:KeyRingIAMPolicy
|
283
|
+
$ pulumi import gcp:kms/keyRingIAMPolicy:KeyRingIAMPolicy The [`terraform import` command](https://developer.hashicorp.com/terraform/cli/commands/import) can also be used
|
290
284
|
```
|
291
285
|
|
292
|
-
IAM policy imports use the identifier of the resource in question.
|
293
|
-
|
294
|
-
This policy resource can be imported using the `key_ring_id`, e.g.
|
295
|
-
|
296
286
|
```sh
|
297
|
-
$ pulumi import gcp:kms/keyRingIAMPolicy:KeyRingIAMPolicy
|
287
|
+
$ pulumi import gcp:kms/keyRingIAMPolicy:KeyRingIAMPolicy default {{project_id}}/{{location}}/{{key_ring_name}}
|
298
288
|
```
|
299
289
|
|
300
290
|
:param str resource_name: The name of the resource.
|
@@ -429,28 +419,18 @@ class KeyRingIAMPolicy(pulumi.CustomResource):
|
|
429
419
|
|
430
420
|
## Import
|
431
421
|
|
432
|
-
IAM
|
422
|
+
### Importing IAM policies IAM policy imports use the identifier of the Cloud KMS key ring only. For example* `{{project_id}}/{{location}}/{{key_ring_name}}` An [`import` block](https://developer.hashicorp.com/terraform/language/import) (Terraform v1.5.0 and later) can be used to import IAM policiestf import {
|
433
423
|
|
434
|
-
|
424
|
+
id = "{{project_id}}/{{location}}/{{key_ring_name}}"
|
435
425
|
|
436
|
-
|
437
|
-
$ pulumi import gcp:kms/keyRingIAMPolicy:KeyRingIAMPolicy key_ring_iam "your-project-id/location-name/key-ring-name roles/viewer user:foo@example.com"
|
438
|
-
```
|
439
|
-
|
440
|
-
IAM binding imports use space-delimited identifiers; the resource in question and the role.
|
441
|
-
|
442
|
-
This binding resource can be imported using the `key_ring_id` and role, e.g.
|
426
|
+
to = google_kms_key_ring_iam_policy.default }
|
443
427
|
|
444
428
|
```sh
|
445
|
-
$ pulumi import gcp:kms/keyRingIAMPolicy:KeyRingIAMPolicy
|
429
|
+
$ pulumi import gcp:kms/keyRingIAMPolicy:KeyRingIAMPolicy The [`terraform import` command](https://developer.hashicorp.com/terraform/cli/commands/import) can also be used
|
446
430
|
```
|
447
431
|
|
448
|
-
IAM policy imports use the identifier of the resource in question.
|
449
|
-
|
450
|
-
This policy resource can be imported using the `key_ring_id`, e.g.
|
451
|
-
|
452
432
|
```sh
|
453
|
-
$ pulumi import gcp:kms/keyRingIAMPolicy:KeyRingIAMPolicy
|
433
|
+
$ pulumi import gcp:kms/keyRingIAMPolicy:KeyRingIAMPolicy default {{project_id}}/{{location}}/{{key_ring_name}}
|
454
434
|
```
|
455
435
|
|
456
436
|
:param str resource_name: The name of the resource.
|
@@ -301,7 +301,15 @@ class KeyRingImportJob(pulumi.CustomResource):
|
|
301
301
|
|
302
302
|
## Import
|
303
303
|
|
304
|
-
KeyRingImportJob can be imported using any of these accepted formats
|
304
|
+
KeyRingImportJob can be imported using any of these accepted formats* `{{name}}` In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to import KeyRingImportJob using one of the formats above. For exampletf import {
|
305
|
+
|
306
|
+
id = "{{name}}"
|
307
|
+
|
308
|
+
to = google_kms_key_ring_import_job.default }
|
309
|
+
|
310
|
+
```sh
|
311
|
+
$ pulumi import gcp:kms/keyRingImportJob:KeyRingImportJob When using the [`terraform import` command](https://developer.hashicorp.com/terraform/cli/commands/import), KeyRingImportJob can be imported using one of the formats above. For example
|
312
|
+
```
|
305
313
|
|
306
314
|
```sh
|
307
315
|
$ pulumi import gcp:kms/keyRingImportJob:KeyRingImportJob default {{name}}
|
@@ -347,7 +355,15 @@ class KeyRingImportJob(pulumi.CustomResource):
|
|
347
355
|
|
348
356
|
## Import
|
349
357
|
|
350
|
-
KeyRingImportJob can be imported using any of these accepted formats
|
358
|
+
KeyRingImportJob can be imported using any of these accepted formats* `{{name}}` In Terraform v1.5.0 and later, use an [`import` block](https://developer.hashicorp.com/terraform/language/import) to import KeyRingImportJob using one of the formats above. For exampletf import {
|
359
|
+
|
360
|
+
id = "{{name}}"
|
361
|
+
|
362
|
+
to = google_kms_key_ring_import_job.default }
|
363
|
+
|
364
|
+
```sh
|
365
|
+
$ pulumi import gcp:kms/keyRingImportJob:KeyRingImportJob When using the [`terraform import` command](https://developer.hashicorp.com/terraform/cli/commands/import), KeyRingImportJob can be imported using one of the formats above. For example
|
366
|
+
```
|
351
367
|
|
352
368
|
```sh
|
353
369
|
$ pulumi import gcp:kms/keyRingImportJob:KeyRingImportJob default {{name}}
|