pulumi-gcp 7.15.0a1711038061__py3-none-any.whl → 7.16.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +102 -0
- pulumi_gcp/accesscontextmanager/__init__.py +1 -0
- pulumi_gcp/accesscontextmanager/_inputs.py +74 -58
- pulumi_gcp/accesscontextmanager/outputs.py +74 -58
- pulumi_gcp/accesscontextmanager/service_perimeter.py +0 -2
- pulumi_gcp/accesscontextmanager/service_perimeter_dry_run_resource.py +345 -0
- pulumi_gcp/accesscontextmanager/service_perimeter_egress_policy.py +80 -0
- pulumi_gcp/accesscontextmanager/service_perimeter_ingress_policy.py +86 -0
- pulumi_gcp/accesscontextmanager/service_perimeter_resource.py +4 -2
- pulumi_gcp/apphub/__init__.py +15 -0
- pulumi_gcp/apphub/_inputs.py +1016 -0
- pulumi_gcp/apphub/application.py +775 -0
- pulumi_gcp/apphub/get_discovered_service.py +180 -0
- pulumi_gcp/apphub/get_discovered_workload.py +180 -0
- pulumi_gcp/apphub/outputs.py +1206 -0
- pulumi_gcp/apphub/service.py +1121 -0
- pulumi_gcp/apphub/service_project_attachment.py +516 -0
- pulumi_gcp/apphub/workload.py +1197 -0
- pulumi_gcp/cloudquota/__init__.py +10 -0
- pulumi_gcp/cloudquota/get_s_quota_info.py +322 -0
- pulumi_gcp/cloudquota/get_s_quota_infos.py +136 -0
- pulumi_gcp/cloudquota/outputs.py +375 -0
- pulumi_gcp/cloudrunv2/_inputs.py +85 -4
- pulumi_gcp/cloudrunv2/get_service.py +11 -1
- pulumi_gcp/cloudrunv2/outputs.py +165 -6
- pulumi_gcp/cloudrunv2/service.py +60 -6
- pulumi_gcp/composer/_inputs.py +16 -0
- pulumi_gcp/composer/outputs.py +23 -0
- pulumi_gcp/compute/_inputs.py +109 -11
- pulumi_gcp/compute/outputs.py +144 -13
- pulumi_gcp/compute/region_network_endpoint_group.py +30 -0
- pulumi_gcp/compute/region_url_map.py +152 -0
- pulumi_gcp/config/__init__.pyi +4 -0
- pulumi_gcp/config/vars.py +8 -0
- pulumi_gcp/dataform/repository.py +4 -74
- pulumi_gcp/firebase/__init__.py +1 -0
- pulumi_gcp/firebase/android_app.py +41 -40
- pulumi_gcp/firebase/app_check_device_check_config.py +572 -0
- pulumi_gcp/firestore/_inputs.py +69 -0
- pulumi_gcp/firestore/database.py +206 -0
- pulumi_gcp/firestore/index.py +34 -48
- pulumi_gcp/firestore/outputs.py +80 -0
- pulumi_gcp/gkeonprem/_inputs.py +1 -3
- pulumi_gcp/gkeonprem/outputs.py +1 -3
- pulumi_gcp/gkeonprem/v_mware_cluster.py +2 -0
- pulumi_gcp/iap/__init__.py +5 -0
- pulumi_gcp/iap/_inputs.py +100 -0
- pulumi_gcp/iap/get_tunnel_dest_group_iam_policy.py +172 -0
- pulumi_gcp/iap/outputs.py +76 -0
- pulumi_gcp/iap/tunnel_dest_group.py +524 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +858 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +858 -0
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +760 -0
- pulumi_gcp/kms/__init__.py +1 -0
- pulumi_gcp/kms/_inputs.py +246 -0
- pulumi_gcp/kms/ekm_connection.py +610 -0
- pulumi_gcp/kms/outputs.py +242 -0
- pulumi_gcp/monitoring/_inputs.py +2 -0
- pulumi_gcp/monitoring/outputs.py +2 -0
- pulumi_gcp/networksecurity/__init__.py +1 -0
- pulumi_gcp/networksecurity/firewall_endpoint.py +48 -0
- pulumi_gcp/networksecurity/firewall_endpoint_association.py +753 -0
- pulumi_gcp/notebooks/instance.py +8 -0
- pulumi_gcp/orgpolicy/policy.py +2 -2
- pulumi_gcp/provider.py +40 -0
- pulumi_gcp/pubsub/_inputs.py +108 -0
- pulumi_gcp/pubsub/get_topic.py +11 -1
- pulumi_gcp/pubsub/outputs.py +213 -0
- pulumi_gcp/pubsub/subscription.py +4 -4
- pulumi_gcp/pubsub/topic.py +92 -0
- pulumi_gcp/securityposture/posture.py +2 -2
- pulumi_gcp/securityposture/posture_deployment.py +2 -2
- pulumi_gcp/storage/_inputs.py +72 -15
- pulumi_gcp/storage/bucket.py +54 -0
- pulumi_gcp/storage/get_bucket.py +11 -1
- pulumi_gcp/storage/outputs.py +110 -14
- pulumi_gcp/workstations/_inputs.py +247 -4
- pulumi_gcp/workstations/outputs.py +261 -5
- pulumi_gcp/workstations/workstation_config.py +160 -0
- {pulumi_gcp-7.15.0a1711038061.dist-info → pulumi_gcp-7.16.0.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.15.0a1711038061.dist-info → pulumi_gcp-7.16.0.dist-info}/RECORD +83 -61
- {pulumi_gcp-7.15.0a1711038061.dist-info → pulumi_gcp-7.16.0.dist-info}/WHEEL +0 -0
- {pulumi_gcp-7.15.0a1711038061.dist-info → pulumi_gcp-7.16.0.dist-info}/top_level.txt +0 -0
@@ -166,10 +166,50 @@ class ServicePerimeterEgressPolicy(pulumi.CustomResource):
|
|
166
166
|
perimeter in certain contexts (e.g. to read data from a Cloud Storage bucket
|
167
167
|
or query against a BigQuery dataset).
|
168
168
|
|
169
|
+
> **Note:** By default, updates to this resource will remove the EgressPolicy from the
|
170
|
+
from the perimeter and add it back in a non-atomic manner. To ensure that the new EgressPolicy
|
171
|
+
is added before the old one is removed, add a `lifecycle` block with `create_before_destroy = true` to this resource.
|
172
|
+
|
169
173
|
To get more information about ServicePerimeterEgressPolicy, see:
|
170
174
|
|
171
175
|
* [API documentation](https://cloud.google.com/access-context-manager/docs/reference/rest/v1/accessPolicies.servicePerimeters#egresspolicy)
|
172
176
|
|
177
|
+
## Example Usage
|
178
|
+
|
179
|
+
### Access Context Manager Service Perimeter Egress Policy
|
180
|
+
|
181
|
+
<!--Start PulumiCodeChooser -->
|
182
|
+
```python
|
183
|
+
import pulumi
|
184
|
+
import pulumi_gcp as gcp
|
185
|
+
|
186
|
+
access_policy = gcp.accesscontextmanager.AccessPolicy("access-policy",
|
187
|
+
parent="organizations/123456789",
|
188
|
+
title="Storage Policy")
|
189
|
+
storage_perimeter = gcp.accesscontextmanager.ServicePerimeter("storage-perimeter",
|
190
|
+
parent=access_policy.name.apply(lambda name: f"accesspolicies/{name}"),
|
191
|
+
name=access_policy.name.apply(lambda name: f"accesspolicies/{name}/serviceperimeters/storage-perimeter"),
|
192
|
+
title="Storage Perimeter",
|
193
|
+
status=gcp.accesscontextmanager.ServicePerimeterStatusArgs(
|
194
|
+
restricted_services=["storage.googleapis.com"],
|
195
|
+
))
|
196
|
+
egress_policy = gcp.accesscontextmanager.ServicePerimeterEgressPolicy("egress_policy",
|
197
|
+
perimeter=storage_perimeter.name,
|
198
|
+
egress_from=gcp.accesscontextmanager.ServicePerimeterEgressPolicyEgressFromArgs(
|
199
|
+
identity_type="ANY_IDENTITY",
|
200
|
+
),
|
201
|
+
egress_to=gcp.accesscontextmanager.ServicePerimeterEgressPolicyEgressToArgs(
|
202
|
+
resources=["*"],
|
203
|
+
operations=[gcp.accesscontextmanager.ServicePerimeterEgressPolicyEgressToOperationArgs(
|
204
|
+
service_name="bigquery.googleapis.com",
|
205
|
+
method_selectors=[gcp.accesscontextmanager.ServicePerimeterEgressPolicyEgressToOperationMethodSelectorArgs(
|
206
|
+
method="*",
|
207
|
+
)],
|
208
|
+
)],
|
209
|
+
))
|
210
|
+
```
|
211
|
+
<!--End PulumiCodeChooser -->
|
212
|
+
|
173
213
|
## Import
|
174
214
|
|
175
215
|
ServicePerimeterEgressPolicy can be imported using any of these accepted formats:
|
@@ -209,10 +249,50 @@ class ServicePerimeterEgressPolicy(pulumi.CustomResource):
|
|
209
249
|
perimeter in certain contexts (e.g. to read data from a Cloud Storage bucket
|
210
250
|
or query against a BigQuery dataset).
|
211
251
|
|
252
|
+
> **Note:** By default, updates to this resource will remove the EgressPolicy from the
|
253
|
+
from the perimeter and add it back in a non-atomic manner. To ensure that the new EgressPolicy
|
254
|
+
is added before the old one is removed, add a `lifecycle` block with `create_before_destroy = true` to this resource.
|
255
|
+
|
212
256
|
To get more information about ServicePerimeterEgressPolicy, see:
|
213
257
|
|
214
258
|
* [API documentation](https://cloud.google.com/access-context-manager/docs/reference/rest/v1/accessPolicies.servicePerimeters#egresspolicy)
|
215
259
|
|
260
|
+
## Example Usage
|
261
|
+
|
262
|
+
### Access Context Manager Service Perimeter Egress Policy
|
263
|
+
|
264
|
+
<!--Start PulumiCodeChooser -->
|
265
|
+
```python
|
266
|
+
import pulumi
|
267
|
+
import pulumi_gcp as gcp
|
268
|
+
|
269
|
+
access_policy = gcp.accesscontextmanager.AccessPolicy("access-policy",
|
270
|
+
parent="organizations/123456789",
|
271
|
+
title="Storage Policy")
|
272
|
+
storage_perimeter = gcp.accesscontextmanager.ServicePerimeter("storage-perimeter",
|
273
|
+
parent=access_policy.name.apply(lambda name: f"accesspolicies/{name}"),
|
274
|
+
name=access_policy.name.apply(lambda name: f"accesspolicies/{name}/serviceperimeters/storage-perimeter"),
|
275
|
+
title="Storage Perimeter",
|
276
|
+
status=gcp.accesscontextmanager.ServicePerimeterStatusArgs(
|
277
|
+
restricted_services=["storage.googleapis.com"],
|
278
|
+
))
|
279
|
+
egress_policy = gcp.accesscontextmanager.ServicePerimeterEgressPolicy("egress_policy",
|
280
|
+
perimeter=storage_perimeter.name,
|
281
|
+
egress_from=gcp.accesscontextmanager.ServicePerimeterEgressPolicyEgressFromArgs(
|
282
|
+
identity_type="ANY_IDENTITY",
|
283
|
+
),
|
284
|
+
egress_to=gcp.accesscontextmanager.ServicePerimeterEgressPolicyEgressToArgs(
|
285
|
+
resources=["*"],
|
286
|
+
operations=[gcp.accesscontextmanager.ServicePerimeterEgressPolicyEgressToOperationArgs(
|
287
|
+
service_name="bigquery.googleapis.com",
|
288
|
+
method_selectors=[gcp.accesscontextmanager.ServicePerimeterEgressPolicyEgressToOperationMethodSelectorArgs(
|
289
|
+
method="*",
|
290
|
+
)],
|
291
|
+
)],
|
292
|
+
))
|
293
|
+
```
|
294
|
+
<!--End PulumiCodeChooser -->
|
295
|
+
|
216
296
|
## Import
|
217
297
|
|
218
298
|
ServicePerimeterEgressPolicy can be imported using any of these accepted formats:
|
@@ -171,10 +171,53 @@ class ServicePerimeterIngressPolicy(pulumi.CustomResource):
|
|
171
171
|
Individual ingress policies can be limited by restricting which services and/
|
172
172
|
or actions they match using the ingressTo field.
|
173
173
|
|
174
|
+
> **Note:** By default, updates to this resource will remove the IngressPolicy from the
|
175
|
+
from the perimeter and add it back in a non-atomic manner. To ensure that the new IngressPolicy
|
176
|
+
is added before the old one is removed, add a `lifecycle` block with `create_before_destroy = true` to this resource.
|
177
|
+
|
174
178
|
To get more information about ServicePerimeterIngressPolicy, see:
|
175
179
|
|
176
180
|
* [API documentation](https://cloud.google.com/access-context-manager/docs/reference/rest/v1/accessPolicies.servicePerimeters#ingresspolicy)
|
177
181
|
|
182
|
+
## Example Usage
|
183
|
+
|
184
|
+
### Access Context Manager Service Perimeter Ingress Policy
|
185
|
+
|
186
|
+
<!--Start PulumiCodeChooser -->
|
187
|
+
```python
|
188
|
+
import pulumi
|
189
|
+
import pulumi_gcp as gcp
|
190
|
+
|
191
|
+
access_policy = gcp.accesscontextmanager.AccessPolicy("access-policy",
|
192
|
+
parent="organizations/123456789",
|
193
|
+
title="Storage Policy")
|
194
|
+
storage_perimeter = gcp.accesscontextmanager.ServicePerimeter("storage-perimeter",
|
195
|
+
parent=access_policy.name.apply(lambda name: f"accesspolicies/{name}"),
|
196
|
+
name=access_policy.name.apply(lambda name: f"accesspolicies/{name}/serviceperimeters/storage-perimeter"),
|
197
|
+
title="Storage Perimeter",
|
198
|
+
status=gcp.accesscontextmanager.ServicePerimeterStatusArgs(
|
199
|
+
restricted_services=["storage.googleapis.com"],
|
200
|
+
))
|
201
|
+
ingress_policy = gcp.accesscontextmanager.ServicePerimeterIngressPolicy("ingress_policy",
|
202
|
+
perimeter=storage_perimeter.name,
|
203
|
+
ingress_from=gcp.accesscontextmanager.ServicePerimeterIngressPolicyIngressFromArgs(
|
204
|
+
identity_type="any_identity",
|
205
|
+
sources=[gcp.accesscontextmanager.ServicePerimeterIngressPolicyIngressFromSourceArgs(
|
206
|
+
access_level="*",
|
207
|
+
)],
|
208
|
+
),
|
209
|
+
ingress_to=gcp.accesscontextmanager.ServicePerimeterIngressPolicyIngressToArgs(
|
210
|
+
resources=["*"],
|
211
|
+
operations=[gcp.accesscontextmanager.ServicePerimeterIngressPolicyIngressToOperationArgs(
|
212
|
+
service_name="bigquery.googleapis.com",
|
213
|
+
method_selectors=[gcp.accesscontextmanager.ServicePerimeterIngressPolicyIngressToOperationMethodSelectorArgs(
|
214
|
+
method="*",
|
215
|
+
)],
|
216
|
+
)],
|
217
|
+
))
|
218
|
+
```
|
219
|
+
<!--End PulumiCodeChooser -->
|
220
|
+
|
178
221
|
## Import
|
179
222
|
|
180
223
|
ServicePerimeterIngressPolicy can be imported using any of these accepted formats:
|
@@ -216,10 +259,53 @@ class ServicePerimeterIngressPolicy(pulumi.CustomResource):
|
|
216
259
|
Individual ingress policies can be limited by restricting which services and/
|
217
260
|
or actions they match using the ingressTo field.
|
218
261
|
|
262
|
+
> **Note:** By default, updates to this resource will remove the IngressPolicy from the
|
263
|
+
from the perimeter and add it back in a non-atomic manner. To ensure that the new IngressPolicy
|
264
|
+
is added before the old one is removed, add a `lifecycle` block with `create_before_destroy = true` to this resource.
|
265
|
+
|
219
266
|
To get more information about ServicePerimeterIngressPolicy, see:
|
220
267
|
|
221
268
|
* [API documentation](https://cloud.google.com/access-context-manager/docs/reference/rest/v1/accessPolicies.servicePerimeters#ingresspolicy)
|
222
269
|
|
270
|
+
## Example Usage
|
271
|
+
|
272
|
+
### Access Context Manager Service Perimeter Ingress Policy
|
273
|
+
|
274
|
+
<!--Start PulumiCodeChooser -->
|
275
|
+
```python
|
276
|
+
import pulumi
|
277
|
+
import pulumi_gcp as gcp
|
278
|
+
|
279
|
+
access_policy = gcp.accesscontextmanager.AccessPolicy("access-policy",
|
280
|
+
parent="organizations/123456789",
|
281
|
+
title="Storage Policy")
|
282
|
+
storage_perimeter = gcp.accesscontextmanager.ServicePerimeter("storage-perimeter",
|
283
|
+
parent=access_policy.name.apply(lambda name: f"accesspolicies/{name}"),
|
284
|
+
name=access_policy.name.apply(lambda name: f"accesspolicies/{name}/serviceperimeters/storage-perimeter"),
|
285
|
+
title="Storage Perimeter",
|
286
|
+
status=gcp.accesscontextmanager.ServicePerimeterStatusArgs(
|
287
|
+
restricted_services=["storage.googleapis.com"],
|
288
|
+
))
|
289
|
+
ingress_policy = gcp.accesscontextmanager.ServicePerimeterIngressPolicy("ingress_policy",
|
290
|
+
perimeter=storage_perimeter.name,
|
291
|
+
ingress_from=gcp.accesscontextmanager.ServicePerimeterIngressPolicyIngressFromArgs(
|
292
|
+
identity_type="any_identity",
|
293
|
+
sources=[gcp.accesscontextmanager.ServicePerimeterIngressPolicyIngressFromSourceArgs(
|
294
|
+
access_level="*",
|
295
|
+
)],
|
296
|
+
),
|
297
|
+
ingress_to=gcp.accesscontextmanager.ServicePerimeterIngressPolicyIngressToArgs(
|
298
|
+
resources=["*"],
|
299
|
+
operations=[gcp.accesscontextmanager.ServicePerimeterIngressPolicyIngressToOperationArgs(
|
300
|
+
service_name="bigquery.googleapis.com",
|
301
|
+
method_selectors=[gcp.accesscontextmanager.ServicePerimeterIngressPolicyIngressToOperationMethodSelectorArgs(
|
302
|
+
method="*",
|
303
|
+
)],
|
304
|
+
)],
|
305
|
+
))
|
306
|
+
```
|
307
|
+
<!--End PulumiCodeChooser -->
|
308
|
+
|
223
309
|
## Import
|
224
310
|
|
225
311
|
ServicePerimeterIngressPolicy can be imported using any of these accepted formats:
|
@@ -118,10 +118,11 @@ class ServicePerimeterResource(pulumi.CustomResource):
|
|
118
118
|
resource: Optional[pulumi.Input[str]] = None,
|
119
119
|
__props__=None):
|
120
120
|
"""
|
121
|
-
Allows configuring a single GCP resource that should be inside of a service perimeter.
|
121
|
+
Allows configuring a single GCP resource that should be inside the `status` block of a service perimeter.
|
122
122
|
This resource is intended to be used in cases where it is not possible to compile a full list
|
123
123
|
of projects to include in a `accesscontextmanager.ServicePerimeter` resource,
|
124
124
|
to enable them to be added separately.
|
125
|
+
If your perimeter is in dry-run mode use `accesscontextmanager.ServicePerimeterDryRunResource` instead.
|
125
126
|
|
126
127
|
> **Note:** If this resource is used alongside a `accesscontextmanager.ServicePerimeter` resource,
|
127
128
|
the service perimeter resource must have a `lifecycle` block with `ignore_changes = [status[0].resources]` so
|
@@ -193,10 +194,11 @@ class ServicePerimeterResource(pulumi.CustomResource):
|
|
193
194
|
args: ServicePerimeterResourceArgs,
|
194
195
|
opts: Optional[pulumi.ResourceOptions] = None):
|
195
196
|
"""
|
196
|
-
Allows configuring a single GCP resource that should be inside of a service perimeter.
|
197
|
+
Allows configuring a single GCP resource that should be inside the `status` block of a service perimeter.
|
197
198
|
This resource is intended to be used in cases where it is not possible to compile a full list
|
198
199
|
of projects to include in a `accesscontextmanager.ServicePerimeter` resource,
|
199
200
|
to enable them to be added separately.
|
201
|
+
If your perimeter is in dry-run mode use `accesscontextmanager.ServicePerimeterDryRunResource` instead.
|
200
202
|
|
201
203
|
> **Note:** If this resource is used alongside a `accesscontextmanager.ServicePerimeter` resource,
|
202
204
|
the service perimeter resource must have a `lifecycle` block with `ignore_changes = [status[0].resources]` so
|
@@ -0,0 +1,15 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
from .. import _utilities
|
6
|
+
import typing
|
7
|
+
# Export this package's modules as members:
|
8
|
+
from .application import *
|
9
|
+
from .get_discovered_service import *
|
10
|
+
from .get_discovered_workload import *
|
11
|
+
from .service import *
|
12
|
+
from .service_project_attachment import *
|
13
|
+
from .workload import *
|
14
|
+
from ._inputs import *
|
15
|
+
from . import outputs
|