pulumi-gcp 7.15.0a1711038061__py3-none-any.whl → 7.16.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (83) hide show
  1. pulumi_gcp/__init__.py +102 -0
  2. pulumi_gcp/accesscontextmanager/__init__.py +1 -0
  3. pulumi_gcp/accesscontextmanager/_inputs.py +74 -58
  4. pulumi_gcp/accesscontextmanager/outputs.py +74 -58
  5. pulumi_gcp/accesscontextmanager/service_perimeter.py +0 -2
  6. pulumi_gcp/accesscontextmanager/service_perimeter_dry_run_resource.py +345 -0
  7. pulumi_gcp/accesscontextmanager/service_perimeter_egress_policy.py +80 -0
  8. pulumi_gcp/accesscontextmanager/service_perimeter_ingress_policy.py +86 -0
  9. pulumi_gcp/accesscontextmanager/service_perimeter_resource.py +4 -2
  10. pulumi_gcp/apphub/__init__.py +15 -0
  11. pulumi_gcp/apphub/_inputs.py +1016 -0
  12. pulumi_gcp/apphub/application.py +775 -0
  13. pulumi_gcp/apphub/get_discovered_service.py +180 -0
  14. pulumi_gcp/apphub/get_discovered_workload.py +180 -0
  15. pulumi_gcp/apphub/outputs.py +1206 -0
  16. pulumi_gcp/apphub/service.py +1121 -0
  17. pulumi_gcp/apphub/service_project_attachment.py +516 -0
  18. pulumi_gcp/apphub/workload.py +1197 -0
  19. pulumi_gcp/cloudquota/__init__.py +10 -0
  20. pulumi_gcp/cloudquota/get_s_quota_info.py +322 -0
  21. pulumi_gcp/cloudquota/get_s_quota_infos.py +136 -0
  22. pulumi_gcp/cloudquota/outputs.py +375 -0
  23. pulumi_gcp/cloudrunv2/_inputs.py +85 -4
  24. pulumi_gcp/cloudrunv2/get_service.py +11 -1
  25. pulumi_gcp/cloudrunv2/outputs.py +165 -6
  26. pulumi_gcp/cloudrunv2/service.py +60 -6
  27. pulumi_gcp/composer/_inputs.py +16 -0
  28. pulumi_gcp/composer/outputs.py +23 -0
  29. pulumi_gcp/compute/_inputs.py +109 -11
  30. pulumi_gcp/compute/outputs.py +144 -13
  31. pulumi_gcp/compute/region_network_endpoint_group.py +30 -0
  32. pulumi_gcp/compute/region_url_map.py +152 -0
  33. pulumi_gcp/config/__init__.pyi +4 -0
  34. pulumi_gcp/config/vars.py +8 -0
  35. pulumi_gcp/dataform/repository.py +4 -74
  36. pulumi_gcp/firebase/__init__.py +1 -0
  37. pulumi_gcp/firebase/android_app.py +41 -40
  38. pulumi_gcp/firebase/app_check_device_check_config.py +572 -0
  39. pulumi_gcp/firestore/_inputs.py +69 -0
  40. pulumi_gcp/firestore/database.py +206 -0
  41. pulumi_gcp/firestore/index.py +34 -48
  42. pulumi_gcp/firestore/outputs.py +80 -0
  43. pulumi_gcp/gkeonprem/_inputs.py +1 -3
  44. pulumi_gcp/gkeonprem/outputs.py +1 -3
  45. pulumi_gcp/gkeonprem/v_mware_cluster.py +2 -0
  46. pulumi_gcp/iap/__init__.py +5 -0
  47. pulumi_gcp/iap/_inputs.py +100 -0
  48. pulumi_gcp/iap/get_tunnel_dest_group_iam_policy.py +172 -0
  49. pulumi_gcp/iap/outputs.py +76 -0
  50. pulumi_gcp/iap/tunnel_dest_group.py +524 -0
  51. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +858 -0
  52. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +858 -0
  53. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +760 -0
  54. pulumi_gcp/kms/__init__.py +1 -0
  55. pulumi_gcp/kms/_inputs.py +246 -0
  56. pulumi_gcp/kms/ekm_connection.py +610 -0
  57. pulumi_gcp/kms/outputs.py +242 -0
  58. pulumi_gcp/monitoring/_inputs.py +2 -0
  59. pulumi_gcp/monitoring/outputs.py +2 -0
  60. pulumi_gcp/networksecurity/__init__.py +1 -0
  61. pulumi_gcp/networksecurity/firewall_endpoint.py +48 -0
  62. pulumi_gcp/networksecurity/firewall_endpoint_association.py +753 -0
  63. pulumi_gcp/notebooks/instance.py +8 -0
  64. pulumi_gcp/orgpolicy/policy.py +2 -2
  65. pulumi_gcp/provider.py +40 -0
  66. pulumi_gcp/pubsub/_inputs.py +108 -0
  67. pulumi_gcp/pubsub/get_topic.py +11 -1
  68. pulumi_gcp/pubsub/outputs.py +213 -0
  69. pulumi_gcp/pubsub/subscription.py +4 -4
  70. pulumi_gcp/pubsub/topic.py +92 -0
  71. pulumi_gcp/securityposture/posture.py +2 -2
  72. pulumi_gcp/securityposture/posture_deployment.py +2 -2
  73. pulumi_gcp/storage/_inputs.py +72 -15
  74. pulumi_gcp/storage/bucket.py +54 -0
  75. pulumi_gcp/storage/get_bucket.py +11 -1
  76. pulumi_gcp/storage/outputs.py +110 -14
  77. pulumi_gcp/workstations/_inputs.py +247 -4
  78. pulumi_gcp/workstations/outputs.py +261 -5
  79. pulumi_gcp/workstations/workstation_config.py +160 -0
  80. {pulumi_gcp-7.15.0a1711038061.dist-info → pulumi_gcp-7.16.0.dist-info}/METADATA +1 -1
  81. {pulumi_gcp-7.15.0a1711038061.dist-info → pulumi_gcp-7.16.0.dist-info}/RECORD +83 -61
  82. {pulumi_gcp-7.15.0a1711038061.dist-info → pulumi_gcp-7.16.0.dist-info}/WHEEL +0 -0
  83. {pulumi_gcp-7.15.0a1711038061.dist-info → pulumi_gcp-7.16.0.dist-info}/top_level.txt +0 -0
@@ -166,10 +166,50 @@ class ServicePerimeterEgressPolicy(pulumi.CustomResource):
166
166
  perimeter in certain contexts (e.g. to read data from a Cloud Storage bucket
167
167
  or query against a BigQuery dataset).
168
168
 
169
+ > **Note:** By default, updates to this resource will remove the EgressPolicy from the
170
+ from the perimeter and add it back in a non-atomic manner. To ensure that the new EgressPolicy
171
+ is added before the old one is removed, add a `lifecycle` block with `create_before_destroy = true` to this resource.
172
+
169
173
  To get more information about ServicePerimeterEgressPolicy, see:
170
174
 
171
175
  * [API documentation](https://cloud.google.com/access-context-manager/docs/reference/rest/v1/accessPolicies.servicePerimeters#egresspolicy)
172
176
 
177
+ ## Example Usage
178
+
179
+ ### Access Context Manager Service Perimeter Egress Policy
180
+
181
+ <!--Start PulumiCodeChooser -->
182
+ ```python
183
+ import pulumi
184
+ import pulumi_gcp as gcp
185
+
186
+ access_policy = gcp.accesscontextmanager.AccessPolicy("access-policy",
187
+ parent="organizations/123456789",
188
+ title="Storage Policy")
189
+ storage_perimeter = gcp.accesscontextmanager.ServicePerimeter("storage-perimeter",
190
+ parent=access_policy.name.apply(lambda name: f"accesspolicies/{name}"),
191
+ name=access_policy.name.apply(lambda name: f"accesspolicies/{name}/serviceperimeters/storage-perimeter"),
192
+ title="Storage Perimeter",
193
+ status=gcp.accesscontextmanager.ServicePerimeterStatusArgs(
194
+ restricted_services=["storage.googleapis.com"],
195
+ ))
196
+ egress_policy = gcp.accesscontextmanager.ServicePerimeterEgressPolicy("egress_policy",
197
+ perimeter=storage_perimeter.name,
198
+ egress_from=gcp.accesscontextmanager.ServicePerimeterEgressPolicyEgressFromArgs(
199
+ identity_type="ANY_IDENTITY",
200
+ ),
201
+ egress_to=gcp.accesscontextmanager.ServicePerimeterEgressPolicyEgressToArgs(
202
+ resources=["*"],
203
+ operations=[gcp.accesscontextmanager.ServicePerimeterEgressPolicyEgressToOperationArgs(
204
+ service_name="bigquery.googleapis.com",
205
+ method_selectors=[gcp.accesscontextmanager.ServicePerimeterEgressPolicyEgressToOperationMethodSelectorArgs(
206
+ method="*",
207
+ )],
208
+ )],
209
+ ))
210
+ ```
211
+ <!--End PulumiCodeChooser -->
212
+
173
213
  ## Import
174
214
 
175
215
  ServicePerimeterEgressPolicy can be imported using any of these accepted formats:
@@ -209,10 +249,50 @@ class ServicePerimeterEgressPolicy(pulumi.CustomResource):
209
249
  perimeter in certain contexts (e.g. to read data from a Cloud Storage bucket
210
250
  or query against a BigQuery dataset).
211
251
 
252
+ > **Note:** By default, updates to this resource will remove the EgressPolicy from the
253
+ from the perimeter and add it back in a non-atomic manner. To ensure that the new EgressPolicy
254
+ is added before the old one is removed, add a `lifecycle` block with `create_before_destroy = true` to this resource.
255
+
212
256
  To get more information about ServicePerimeterEgressPolicy, see:
213
257
 
214
258
  * [API documentation](https://cloud.google.com/access-context-manager/docs/reference/rest/v1/accessPolicies.servicePerimeters#egresspolicy)
215
259
 
260
+ ## Example Usage
261
+
262
+ ### Access Context Manager Service Perimeter Egress Policy
263
+
264
+ <!--Start PulumiCodeChooser -->
265
+ ```python
266
+ import pulumi
267
+ import pulumi_gcp as gcp
268
+
269
+ access_policy = gcp.accesscontextmanager.AccessPolicy("access-policy",
270
+ parent="organizations/123456789",
271
+ title="Storage Policy")
272
+ storage_perimeter = gcp.accesscontextmanager.ServicePerimeter("storage-perimeter",
273
+ parent=access_policy.name.apply(lambda name: f"accesspolicies/{name}"),
274
+ name=access_policy.name.apply(lambda name: f"accesspolicies/{name}/serviceperimeters/storage-perimeter"),
275
+ title="Storage Perimeter",
276
+ status=gcp.accesscontextmanager.ServicePerimeterStatusArgs(
277
+ restricted_services=["storage.googleapis.com"],
278
+ ))
279
+ egress_policy = gcp.accesscontextmanager.ServicePerimeterEgressPolicy("egress_policy",
280
+ perimeter=storage_perimeter.name,
281
+ egress_from=gcp.accesscontextmanager.ServicePerimeterEgressPolicyEgressFromArgs(
282
+ identity_type="ANY_IDENTITY",
283
+ ),
284
+ egress_to=gcp.accesscontextmanager.ServicePerimeterEgressPolicyEgressToArgs(
285
+ resources=["*"],
286
+ operations=[gcp.accesscontextmanager.ServicePerimeterEgressPolicyEgressToOperationArgs(
287
+ service_name="bigquery.googleapis.com",
288
+ method_selectors=[gcp.accesscontextmanager.ServicePerimeterEgressPolicyEgressToOperationMethodSelectorArgs(
289
+ method="*",
290
+ )],
291
+ )],
292
+ ))
293
+ ```
294
+ <!--End PulumiCodeChooser -->
295
+
216
296
  ## Import
217
297
 
218
298
  ServicePerimeterEgressPolicy can be imported using any of these accepted formats:
@@ -171,10 +171,53 @@ class ServicePerimeterIngressPolicy(pulumi.CustomResource):
171
171
  Individual ingress policies can be limited by restricting which services and/
172
172
  or actions they match using the ingressTo field.
173
173
 
174
+ > **Note:** By default, updates to this resource will remove the IngressPolicy from the
175
+ from the perimeter and add it back in a non-atomic manner. To ensure that the new IngressPolicy
176
+ is added before the old one is removed, add a `lifecycle` block with `create_before_destroy = true` to this resource.
177
+
174
178
  To get more information about ServicePerimeterIngressPolicy, see:
175
179
 
176
180
  * [API documentation](https://cloud.google.com/access-context-manager/docs/reference/rest/v1/accessPolicies.servicePerimeters#ingresspolicy)
177
181
 
182
+ ## Example Usage
183
+
184
+ ### Access Context Manager Service Perimeter Ingress Policy
185
+
186
+ <!--Start PulumiCodeChooser -->
187
+ ```python
188
+ import pulumi
189
+ import pulumi_gcp as gcp
190
+
191
+ access_policy = gcp.accesscontextmanager.AccessPolicy("access-policy",
192
+ parent="organizations/123456789",
193
+ title="Storage Policy")
194
+ storage_perimeter = gcp.accesscontextmanager.ServicePerimeter("storage-perimeter",
195
+ parent=access_policy.name.apply(lambda name: f"accesspolicies/{name}"),
196
+ name=access_policy.name.apply(lambda name: f"accesspolicies/{name}/serviceperimeters/storage-perimeter"),
197
+ title="Storage Perimeter",
198
+ status=gcp.accesscontextmanager.ServicePerimeterStatusArgs(
199
+ restricted_services=["storage.googleapis.com"],
200
+ ))
201
+ ingress_policy = gcp.accesscontextmanager.ServicePerimeterIngressPolicy("ingress_policy",
202
+ perimeter=storage_perimeter.name,
203
+ ingress_from=gcp.accesscontextmanager.ServicePerimeterIngressPolicyIngressFromArgs(
204
+ identity_type="any_identity",
205
+ sources=[gcp.accesscontextmanager.ServicePerimeterIngressPolicyIngressFromSourceArgs(
206
+ access_level="*",
207
+ )],
208
+ ),
209
+ ingress_to=gcp.accesscontextmanager.ServicePerimeterIngressPolicyIngressToArgs(
210
+ resources=["*"],
211
+ operations=[gcp.accesscontextmanager.ServicePerimeterIngressPolicyIngressToOperationArgs(
212
+ service_name="bigquery.googleapis.com",
213
+ method_selectors=[gcp.accesscontextmanager.ServicePerimeterIngressPolicyIngressToOperationMethodSelectorArgs(
214
+ method="*",
215
+ )],
216
+ )],
217
+ ))
218
+ ```
219
+ <!--End PulumiCodeChooser -->
220
+
178
221
  ## Import
179
222
 
180
223
  ServicePerimeterIngressPolicy can be imported using any of these accepted formats:
@@ -216,10 +259,53 @@ class ServicePerimeterIngressPolicy(pulumi.CustomResource):
216
259
  Individual ingress policies can be limited by restricting which services and/
217
260
  or actions they match using the ingressTo field.
218
261
 
262
+ > **Note:** By default, updates to this resource will remove the IngressPolicy from the
263
+ from the perimeter and add it back in a non-atomic manner. To ensure that the new IngressPolicy
264
+ is added before the old one is removed, add a `lifecycle` block with `create_before_destroy = true` to this resource.
265
+
219
266
  To get more information about ServicePerimeterIngressPolicy, see:
220
267
 
221
268
  * [API documentation](https://cloud.google.com/access-context-manager/docs/reference/rest/v1/accessPolicies.servicePerimeters#ingresspolicy)
222
269
 
270
+ ## Example Usage
271
+
272
+ ### Access Context Manager Service Perimeter Ingress Policy
273
+
274
+ <!--Start PulumiCodeChooser -->
275
+ ```python
276
+ import pulumi
277
+ import pulumi_gcp as gcp
278
+
279
+ access_policy = gcp.accesscontextmanager.AccessPolicy("access-policy",
280
+ parent="organizations/123456789",
281
+ title="Storage Policy")
282
+ storage_perimeter = gcp.accesscontextmanager.ServicePerimeter("storage-perimeter",
283
+ parent=access_policy.name.apply(lambda name: f"accesspolicies/{name}"),
284
+ name=access_policy.name.apply(lambda name: f"accesspolicies/{name}/serviceperimeters/storage-perimeter"),
285
+ title="Storage Perimeter",
286
+ status=gcp.accesscontextmanager.ServicePerimeterStatusArgs(
287
+ restricted_services=["storage.googleapis.com"],
288
+ ))
289
+ ingress_policy = gcp.accesscontextmanager.ServicePerimeterIngressPolicy("ingress_policy",
290
+ perimeter=storage_perimeter.name,
291
+ ingress_from=gcp.accesscontextmanager.ServicePerimeterIngressPolicyIngressFromArgs(
292
+ identity_type="any_identity",
293
+ sources=[gcp.accesscontextmanager.ServicePerimeterIngressPolicyIngressFromSourceArgs(
294
+ access_level="*",
295
+ )],
296
+ ),
297
+ ingress_to=gcp.accesscontextmanager.ServicePerimeterIngressPolicyIngressToArgs(
298
+ resources=["*"],
299
+ operations=[gcp.accesscontextmanager.ServicePerimeterIngressPolicyIngressToOperationArgs(
300
+ service_name="bigquery.googleapis.com",
301
+ method_selectors=[gcp.accesscontextmanager.ServicePerimeterIngressPolicyIngressToOperationMethodSelectorArgs(
302
+ method="*",
303
+ )],
304
+ )],
305
+ ))
306
+ ```
307
+ <!--End PulumiCodeChooser -->
308
+
223
309
  ## Import
224
310
 
225
311
  ServicePerimeterIngressPolicy can be imported using any of these accepted formats:
@@ -118,10 +118,11 @@ class ServicePerimeterResource(pulumi.CustomResource):
118
118
  resource: Optional[pulumi.Input[str]] = None,
119
119
  __props__=None):
120
120
  """
121
- Allows configuring a single GCP resource that should be inside of a service perimeter.
121
+ Allows configuring a single GCP resource that should be inside the `status` block of a service perimeter.
122
122
  This resource is intended to be used in cases where it is not possible to compile a full list
123
123
  of projects to include in a `accesscontextmanager.ServicePerimeter` resource,
124
124
  to enable them to be added separately.
125
+ If your perimeter is in dry-run mode use `accesscontextmanager.ServicePerimeterDryRunResource` instead.
125
126
 
126
127
  > **Note:** If this resource is used alongside a `accesscontextmanager.ServicePerimeter` resource,
127
128
  the service perimeter resource must have a `lifecycle` block with `ignore_changes = [status[0].resources]` so
@@ -193,10 +194,11 @@ class ServicePerimeterResource(pulumi.CustomResource):
193
194
  args: ServicePerimeterResourceArgs,
194
195
  opts: Optional[pulumi.ResourceOptions] = None):
195
196
  """
196
- Allows configuring a single GCP resource that should be inside of a service perimeter.
197
+ Allows configuring a single GCP resource that should be inside the `status` block of a service perimeter.
197
198
  This resource is intended to be used in cases where it is not possible to compile a full list
198
199
  of projects to include in a `accesscontextmanager.ServicePerimeter` resource,
199
200
  to enable them to be added separately.
201
+ If your perimeter is in dry-run mode use `accesscontextmanager.ServicePerimeterDryRunResource` instead.
200
202
 
201
203
  > **Note:** If this resource is used alongside a `accesscontextmanager.ServicePerimeter` resource,
202
204
  the service perimeter resource must have a `lifecycle` block with `ignore_changes = [status[0].resources]` so
@@ -0,0 +1,15 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ from .. import _utilities
6
+ import typing
7
+ # Export this package's modules as members:
8
+ from .application import *
9
+ from .get_discovered_service import *
10
+ from .get_discovered_workload import *
11
+ from .service import *
12
+ from .service_project_attachment import *
13
+ from .workload import *
14
+ from ._inputs import *
15
+ from . import outputs