pulumi-gcp 7.20.0a1713984378__py3-none-any.whl → 7.21.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +48 -0
- pulumi_gcp/alloydb/_inputs.py +74 -0
- pulumi_gcp/alloydb/backup.py +0 -12
- pulumi_gcp/alloydb/cluster.py +0 -12
- pulumi_gcp/alloydb/instance.py +90 -81
- pulumi_gcp/alloydb/outputs.py +98 -0
- pulumi_gcp/apigee/environment.py +47 -0
- pulumi_gcp/apigee/organization.py +162 -0
- pulumi_gcp/apigee/sharedflow.py +0 -20
- pulumi_gcp/appengine/flexible_app_version.py +0 -20
- pulumi_gcp/applicationintegration/__init__.py +1 -0
- pulumi_gcp/applicationintegration/_inputs.py +843 -0
- pulumi_gcp/applicationintegration/auth_config.py +998 -0
- pulumi_gcp/applicationintegration/outputs.py +891 -0
- pulumi_gcp/artifactregistry/_inputs.py +186 -0
- pulumi_gcp/artifactregistry/outputs.py +297 -4
- pulumi_gcp/artifactregistry/repository.py +346 -16
- pulumi_gcp/bigquery/table.py +61 -0
- pulumi_gcp/bigquerydatapolicy/_inputs.py +21 -4
- pulumi_gcp/bigquerydatapolicy/data_policy.py +78 -0
- pulumi_gcp/bigquerydatapolicy/outputs.py +16 -3
- pulumi_gcp/billing/budget.py +54 -0
- pulumi_gcp/certificateauthority/_inputs.py +92 -12
- pulumi_gcp/certificateauthority/authority.py +117 -27
- pulumi_gcp/certificateauthority/certificate.py +176 -0
- pulumi_gcp/certificateauthority/outputs.py +144 -12
- pulumi_gcp/cloudbuild/worker_pool.py +0 -12
- pulumi_gcp/cloudbuildv2/connection.py +0 -12
- pulumi_gcp/cloudbuildv2/repository.py +0 -12
- pulumi_gcp/clouddeploy/automation.py +0 -12
- pulumi_gcp/clouddeploy/custom_target_type.py +0 -12
- pulumi_gcp/clouddeploy/delivery_pipeline.py +0 -12
- pulumi_gcp/clouddeploy/target.py +0 -12
- pulumi_gcp/cloudfunctionsv2/_inputs.py +16 -0
- pulumi_gcp/cloudfunctionsv2/function.py +110 -0
- pulumi_gcp/cloudfunctionsv2/outputs.py +25 -0
- pulumi_gcp/cloudrunv2/job.py +0 -12
- pulumi_gcp/cloudrunv2/service.py +0 -12
- pulumi_gcp/composer/__init__.py +1 -0
- pulumi_gcp/composer/environment.py +35 -47
- pulumi_gcp/composer/user_workloads_secret.py +441 -0
- pulumi_gcp/compute/__init__.py +1 -0
- pulumi_gcp/compute/_inputs.py +169 -58
- pulumi_gcp/compute/forwarding_rule.py +0 -13
- pulumi_gcp/compute/get_instance_group_manager.py +11 -1
- pulumi_gcp/compute/global_address.py +0 -12
- pulumi_gcp/compute/global_forwarding_rule.py +0 -282
- pulumi_gcp/compute/instance_from_machine_image.py +14 -46
- pulumi_gcp/compute/instance_from_template.py +14 -46
- pulumi_gcp/compute/instance_group_manager.py +68 -21
- pulumi_gcp/compute/outputs.py +213 -65
- pulumi_gcp/compute/region_instance_group_manager.py +61 -14
- pulumi_gcp/compute/region_instance_template.py +0 -13
- pulumi_gcp/compute/region_target_https_proxy.py +257 -0
- pulumi_gcp/compute/region_url_map.py +0 -470
- pulumi_gcp/compute/security_policy_rule.py +850 -0
- pulumi_gcp/container/attached_cluster.py +0 -12
- pulumi_gcp/container/aws_cluster.py +0 -12
- pulumi_gcp/container/aws_node_pool.py +0 -12
- pulumi_gcp/container/azure_cluster.py +0 -12
- pulumi_gcp/container/azure_node_pool.py +0 -12
- pulumi_gcp/container/cluster.py +0 -20
- pulumi_gcp/container/outputs.py +4 -4
- pulumi_gcp/dataflow/flex_template_job.py +0 -39
- pulumi_gcp/dataloss/__init__.py +1 -0
- pulumi_gcp/dataloss/_inputs.py +1040 -0
- pulumi_gcp/dataloss/outputs.py +1123 -0
- pulumi_gcp/dataloss/prevention_discovery_config.py +737 -0
- pulumi_gcp/dataproc/cluster.py +0 -20
- pulumi_gcp/dataproc/workflow_template.py +21 -26
- pulumi_gcp/deploymentmanager/deployment.py +0 -34
- pulumi_gcp/dns/_inputs.py +2 -130
- pulumi_gcp/dns/get_keys.py +1 -1
- pulumi_gcp/dns/get_managed_zones.py +3 -9
- pulumi_gcp/dns/get_record_set.py +3 -0
- pulumi_gcp/dns/outputs.py +36 -58
- pulumi_gcp/dns/record_set.py +2 -36
- pulumi_gcp/filestore/get_instance.py +11 -1
- pulumi_gcp/filestore/instance.py +101 -0
- pulumi_gcp/firebase/_inputs.py +16 -0
- pulumi_gcp/firebase/android_app.py +0 -27
- pulumi_gcp/firebase/app_check_play_integrity_config.py +20 -0
- pulumi_gcp/firebase/app_check_recaptcha_enterprise_config.py +10 -0
- pulumi_gcp/firebase/app_check_service_config.py +0 -125
- pulumi_gcp/firebase/apple_app.py +0 -27
- pulumi_gcp/firebase/hosting_custom_domain.py +0 -27
- pulumi_gcp/firebase/hosting_version.py +44 -0
- pulumi_gcp/firebase/outputs.py +12 -0
- pulumi_gcp/firebase/web_app.py +0 -20
- pulumi_gcp/firestore/database.py +0 -68
- pulumi_gcp/firestore/document.py +4 -4
- pulumi_gcp/gkeonprem/bare_metal_admin_cluster.py +0 -12
- pulumi_gcp/gkeonprem/bare_metal_cluster.py +0 -12
- pulumi_gcp/gkeonprem/bare_metal_node_pool.py +0 -12
- pulumi_gcp/gkeonprem/v_mware_cluster.py +0 -12
- pulumi_gcp/gkeonprem/v_mware_node_pool.py +0 -12
- pulumi_gcp/logging/folder_sink.py +54 -0
- pulumi_gcp/logging/organization_sink.py +54 -0
- pulumi_gcp/monitoring/_inputs.py +46 -2
- pulumi_gcp/monitoring/outputs.py +40 -2
- pulumi_gcp/monitoring/uptime_check_config.py +6 -0
- pulumi_gcp/netapp/active_directory.py +0 -20
- pulumi_gcp/netapp/volume_replication.py +0 -68
- pulumi_gcp/networkconnectivity/__init__.py +1 -0
- pulumi_gcp/networkconnectivity/internal_range.py +1024 -0
- pulumi_gcp/organizations/get_active_folder.py +18 -3
- pulumi_gcp/projects/__init__.py +1 -0
- pulumi_gcp/projects/iam_member_remove.py +313 -0
- pulumi_gcp/provider.py +3 -1
- pulumi_gcp/secretmanager/get_secret.py +13 -3
- pulumi_gcp/secretmanager/outputs.py +20 -1
- pulumi_gcp/secretmanager/secret.py +90 -15
- pulumi_gcp/servicenetworking/connection.py +0 -20
- pulumi_gcp/spanner/database.py +0 -41
- pulumi_gcp/spanner/instance.py +0 -40
- pulumi_gcp/storage/__init__.py +1 -0
- pulumi_gcp/storage/bucket.py +0 -12
- pulumi_gcp/storage/get_bucket_objects.py +153 -0
- pulumi_gcp/storage/outputs.py +63 -0
- pulumi_gcp/vmwareengine/_inputs.py +63 -5
- pulumi_gcp/vmwareengine/get_private_cloud.py +1 -21
- pulumi_gcp/vmwareengine/outputs.py +113 -5
- pulumi_gcp/vmwareengine/private_cloud.py +0 -94
- pulumi_gcp/workbench/instance.py +4 -4
- pulumi_gcp/workstations/workstation.py +0 -12
- pulumi_gcp/workstations/workstation_cluster.py +32 -12
- pulumi_gcp/workstations/workstation_config.py +0 -12
- {pulumi_gcp-7.20.0a1713984378.dist-info → pulumi_gcp-7.21.0.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.20.0a1713984378.dist-info → pulumi_gcp-7.21.0.dist-info}/RECORD +131 -124
- {pulumi_gcp-7.20.0a1713984378.dist-info → pulumi_gcp-7.21.0.dist-info}/WHEEL +0 -0
- {pulumi_gcp-7.20.0a1713984378.dist-info → pulumi_gcp-7.21.0.dist-info}/top_level.txt +0 -0
@@ -44,8 +44,6 @@ class AuthorityArgs:
|
|
44
44
|
:param pulumi.Input[str] location: Location of the CertificateAuthority. A full list of valid locations can be found by
|
45
45
|
running `gcloud privateca locations list`.
|
46
46
|
:param pulumi.Input[str] pool: The name of the CaPool this Certificate Authority belongs to.
|
47
|
-
:param pulumi.Input[bool] deletion_protection: Whether or not to allow Terraform to destroy the CertificateAuthority. Unless this field is set to false in Terraform
|
48
|
-
state, a 'terraform destroy' or 'terraform apply' that would delete the instance will fail.
|
49
47
|
:param pulumi.Input[str] desired_state: Desired state of the CertificateAuthority. Set this field to 'STAGED' to create a 'STAGED' root CA.
|
50
48
|
:param pulumi.Input[str] gcs_bucket: The name of a Cloud Storage bucket where this CertificateAuthority will publish content, such as the CA certificate and
|
51
49
|
CRLs. This must be a bucket name, without any prefixes (such as 'gs://') or suffixes (such as '.googleapis.com'). For
|
@@ -65,7 +63,7 @@ class AuthorityArgs:
|
|
65
63
|
'false'.
|
66
64
|
:param pulumi.Input['AuthoritySubordinateConfigArgs'] subordinate_config: If this is a subordinate CertificateAuthority, this field will be set with the subordinate configuration, which
|
67
65
|
describes its issuers.
|
68
|
-
:param pulumi.Input[str] type: The Type of this CertificateAuthority.
|
66
|
+
:param pulumi.Input[str] type: The Type of this CertificateAuthority. > **Note:** For 'SUBORDINATE' Certificate Authorities, they need to be activated
|
69
67
|
before they can issue certificates. Default value: "SELF_SIGNED" Possible values: ["SELF_SIGNED", "SUBORDINATE"]
|
70
68
|
"""
|
71
69
|
pulumi.set(__self__, "certificate_authority_id", certificate_authority_id)
|
@@ -164,10 +162,6 @@ class AuthorityArgs:
|
|
164
162
|
@property
|
165
163
|
@pulumi.getter(name="deletionProtection")
|
166
164
|
def deletion_protection(self) -> Optional[pulumi.Input[bool]]:
|
167
|
-
"""
|
168
|
-
Whether or not to allow Terraform to destroy the CertificateAuthority. Unless this field is set to false in Terraform
|
169
|
-
state, a 'terraform destroy' or 'terraform apply' that would delete the instance will fail.
|
170
|
-
"""
|
171
165
|
return pulumi.get(self, "deletion_protection")
|
172
166
|
|
173
167
|
@deletion_protection.setter
|
@@ -294,7 +288,7 @@ class AuthorityArgs:
|
|
294
288
|
@pulumi.getter
|
295
289
|
def type(self) -> Optional[pulumi.Input[str]]:
|
296
290
|
"""
|
297
|
-
The Type of this CertificateAuthority.
|
291
|
+
The Type of this CertificateAuthority. > **Note:** For 'SUBORDINATE' Certificate Authorities, they need to be activated
|
298
292
|
before they can issue certificates. Default value: "SELF_SIGNED" Possible values: ["SELF_SIGNED", "SUBORDINATE"]
|
299
293
|
"""
|
300
294
|
return pulumi.get(self, "type")
|
@@ -341,8 +335,6 @@ class _AuthorityState:
|
|
341
335
|
:param pulumi.Input[str] create_time: The time at which this CertificateAuthority was created.
|
342
336
|
A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine
|
343
337
|
fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
|
344
|
-
:param pulumi.Input[bool] deletion_protection: Whether or not to allow Terraform to destroy the CertificateAuthority. Unless this field is set to false in Terraform
|
345
|
-
state, a 'terraform destroy' or 'terraform apply' that would delete the instance will fail.
|
346
338
|
:param pulumi.Input[str] desired_state: Desired state of the CertificateAuthority. Set this field to 'STAGED' to create a 'STAGED' root CA.
|
347
339
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] effective_labels: All of labels (key/value pairs) present on the resource in GCP, including the labels configured through Pulumi, other clients and services.
|
348
340
|
:param pulumi.Input[str] gcs_bucket: The name of a Cloud Storage bucket where this CertificateAuthority will publish content, such as the CA certificate and
|
@@ -379,7 +371,7 @@ class _AuthorityState:
|
|
379
371
|
:param pulumi.Input[str] state: The State for this CertificateAuthority.
|
380
372
|
:param pulumi.Input['AuthoritySubordinateConfigArgs'] subordinate_config: If this is a subordinate CertificateAuthority, this field will be set with the subordinate configuration, which
|
381
373
|
describes its issuers.
|
382
|
-
:param pulumi.Input[str] type: The Type of this CertificateAuthority.
|
374
|
+
:param pulumi.Input[str] type: The Type of this CertificateAuthority. > **Note:** For 'SUBORDINATE' Certificate Authorities, they need to be activated
|
383
375
|
before they can issue certificates. Default value: "SELF_SIGNED" Possible values: ["SELF_SIGNED", "SUBORDINATE"]
|
384
376
|
:param pulumi.Input[str] update_time: The time at which this CertificateAuthority was updated.
|
385
377
|
A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine
|
@@ -489,10 +481,6 @@ class _AuthorityState:
|
|
489
481
|
@property
|
490
482
|
@pulumi.getter(name="deletionProtection")
|
491
483
|
def deletion_protection(self) -> Optional[pulumi.Input[bool]]:
|
492
|
-
"""
|
493
|
-
Whether or not to allow Terraform to destroy the CertificateAuthority. Unless this field is set to false in Terraform
|
494
|
-
state, a 'terraform destroy' or 'terraform apply' that would delete the instance will fail.
|
495
|
-
"""
|
496
484
|
return pulumi.get(self, "deletion_protection")
|
497
485
|
|
498
486
|
@deletion_protection.setter
|
@@ -724,7 +712,7 @@ class _AuthorityState:
|
|
724
712
|
@pulumi.getter
|
725
713
|
def type(self) -> Optional[pulumi.Input[str]]:
|
726
714
|
"""
|
727
|
-
The Type of this CertificateAuthority.
|
715
|
+
The Type of this CertificateAuthority. > **Note:** For 'SUBORDINATE' Certificate Authorities, they need to be activated
|
728
716
|
before they can issue certificates. Default value: "SELF_SIGNED" Possible values: ["SELF_SIGNED", "SUBORDINATE"]
|
729
717
|
"""
|
730
718
|
return pulumi.get(self, "type")
|
@@ -987,6 +975,61 @@ class Authority(pulumi.CustomResource):
|
|
987
975
|
),
|
988
976
|
))
|
989
977
|
```
|
978
|
+
### Privateca Certificate Authority Custom Ski
|
979
|
+
|
980
|
+
```python
|
981
|
+
import pulumi
|
982
|
+
import pulumi_gcp as gcp
|
983
|
+
|
984
|
+
default = gcp.certificateauthority.Authority("default",
|
985
|
+
pool="ca-pool",
|
986
|
+
certificate_authority_id="my-certificate-authority",
|
987
|
+
location="us-central1",
|
988
|
+
deletion_protection=True,
|
989
|
+
config=gcp.certificateauthority.AuthorityConfigArgs(
|
990
|
+
subject_config=gcp.certificateauthority.AuthorityConfigSubjectConfigArgs(
|
991
|
+
subject=gcp.certificateauthority.AuthorityConfigSubjectConfigSubjectArgs(
|
992
|
+
organization="HashiCorp",
|
993
|
+
common_name="my-certificate-authority",
|
994
|
+
),
|
995
|
+
subject_alt_name=gcp.certificateauthority.AuthorityConfigSubjectConfigSubjectAltNameArgs(
|
996
|
+
dns_names=["hashicorp.com"],
|
997
|
+
),
|
998
|
+
),
|
999
|
+
subject_key_id=gcp.certificateauthority.AuthorityConfigSubjectKeyIdArgs(
|
1000
|
+
key_id="4cf3372289b1d411b999dbb9ebcd44744b6b2fca",
|
1001
|
+
),
|
1002
|
+
x509_config=gcp.certificateauthority.AuthorityConfigX509ConfigArgs(
|
1003
|
+
ca_options=gcp.certificateauthority.AuthorityConfigX509ConfigCaOptionsArgs(
|
1004
|
+
is_ca=True,
|
1005
|
+
max_issuer_path_length=10,
|
1006
|
+
),
|
1007
|
+
key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageArgs(
|
1008
|
+
base_key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageBaseKeyUsageArgs(
|
1009
|
+
digital_signature=True,
|
1010
|
+
content_commitment=True,
|
1011
|
+
key_encipherment=False,
|
1012
|
+
data_encipherment=True,
|
1013
|
+
key_agreement=True,
|
1014
|
+
cert_sign=True,
|
1015
|
+
crl_sign=True,
|
1016
|
+
decipher_only=True,
|
1017
|
+
),
|
1018
|
+
extended_key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageExtendedKeyUsageArgs(
|
1019
|
+
server_auth=True,
|
1020
|
+
client_auth=False,
|
1021
|
+
email_protection=True,
|
1022
|
+
code_signing=True,
|
1023
|
+
time_stamping=True,
|
1024
|
+
),
|
1025
|
+
),
|
1026
|
+
),
|
1027
|
+
),
|
1028
|
+
lifetime="86400s",
|
1029
|
+
key_spec=gcp.certificateauthority.AuthorityKeySpecArgs(
|
1030
|
+
cloud_kms_key_version="projects/keys-project/locations/us-central1/keyRings/key-ring/cryptoKeys/crypto-key/cryptoKeyVersions/1",
|
1031
|
+
))
|
1032
|
+
```
|
990
1033
|
|
991
1034
|
## Import
|
992
1035
|
|
@@ -1017,8 +1060,6 @@ class Authority(pulumi.CustomResource):
|
|
1017
1060
|
:param pulumi.Input[str] certificate_authority_id: The user provided Resource ID for this Certificate Authority.
|
1018
1061
|
:param pulumi.Input[pulumi.InputType['AuthorityConfigArgs']] config: The config used to create a self-signed X.509 certificate or CSR.
|
1019
1062
|
Structure is documented below.
|
1020
|
-
:param pulumi.Input[bool] deletion_protection: Whether or not to allow Terraform to destroy the CertificateAuthority. Unless this field is set to false in Terraform
|
1021
|
-
state, a 'terraform destroy' or 'terraform apply' that would delete the instance will fail.
|
1022
1063
|
:param pulumi.Input[str] desired_state: Desired state of the CertificateAuthority. Set this field to 'STAGED' to create a 'STAGED' root CA.
|
1023
1064
|
:param pulumi.Input[str] gcs_bucket: The name of a Cloud Storage bucket where this CertificateAuthority will publish content, such as the CA certificate and
|
1024
1065
|
CRLs. This must be a bucket name, without any prefixes (such as 'gs://') or suffixes (such as '.googleapis.com'). For
|
@@ -1045,7 +1086,7 @@ class Authority(pulumi.CustomResource):
|
|
1045
1086
|
'false'.
|
1046
1087
|
:param pulumi.Input[pulumi.InputType['AuthoritySubordinateConfigArgs']] subordinate_config: If this is a subordinate CertificateAuthority, this field will be set with the subordinate configuration, which
|
1047
1088
|
describes its issuers.
|
1048
|
-
:param pulumi.Input[str] type: The Type of this CertificateAuthority.
|
1089
|
+
:param pulumi.Input[str] type: The Type of this CertificateAuthority. > **Note:** For 'SUBORDINATE' Certificate Authorities, they need to be activated
|
1049
1090
|
before they can issue certificates. Default value: "SELF_SIGNED" Possible values: ["SELF_SIGNED", "SUBORDINATE"]
|
1050
1091
|
"""
|
1051
1092
|
...
|
@@ -1271,6 +1312,61 @@ class Authority(pulumi.CustomResource):
|
|
1271
1312
|
),
|
1272
1313
|
))
|
1273
1314
|
```
|
1315
|
+
### Privateca Certificate Authority Custom Ski
|
1316
|
+
|
1317
|
+
```python
|
1318
|
+
import pulumi
|
1319
|
+
import pulumi_gcp as gcp
|
1320
|
+
|
1321
|
+
default = gcp.certificateauthority.Authority("default",
|
1322
|
+
pool="ca-pool",
|
1323
|
+
certificate_authority_id="my-certificate-authority",
|
1324
|
+
location="us-central1",
|
1325
|
+
deletion_protection=True,
|
1326
|
+
config=gcp.certificateauthority.AuthorityConfigArgs(
|
1327
|
+
subject_config=gcp.certificateauthority.AuthorityConfigSubjectConfigArgs(
|
1328
|
+
subject=gcp.certificateauthority.AuthorityConfigSubjectConfigSubjectArgs(
|
1329
|
+
organization="HashiCorp",
|
1330
|
+
common_name="my-certificate-authority",
|
1331
|
+
),
|
1332
|
+
subject_alt_name=gcp.certificateauthority.AuthorityConfigSubjectConfigSubjectAltNameArgs(
|
1333
|
+
dns_names=["hashicorp.com"],
|
1334
|
+
),
|
1335
|
+
),
|
1336
|
+
subject_key_id=gcp.certificateauthority.AuthorityConfigSubjectKeyIdArgs(
|
1337
|
+
key_id="4cf3372289b1d411b999dbb9ebcd44744b6b2fca",
|
1338
|
+
),
|
1339
|
+
x509_config=gcp.certificateauthority.AuthorityConfigX509ConfigArgs(
|
1340
|
+
ca_options=gcp.certificateauthority.AuthorityConfigX509ConfigCaOptionsArgs(
|
1341
|
+
is_ca=True,
|
1342
|
+
max_issuer_path_length=10,
|
1343
|
+
),
|
1344
|
+
key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageArgs(
|
1345
|
+
base_key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageBaseKeyUsageArgs(
|
1346
|
+
digital_signature=True,
|
1347
|
+
content_commitment=True,
|
1348
|
+
key_encipherment=False,
|
1349
|
+
data_encipherment=True,
|
1350
|
+
key_agreement=True,
|
1351
|
+
cert_sign=True,
|
1352
|
+
crl_sign=True,
|
1353
|
+
decipher_only=True,
|
1354
|
+
),
|
1355
|
+
extended_key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageExtendedKeyUsageArgs(
|
1356
|
+
server_auth=True,
|
1357
|
+
client_auth=False,
|
1358
|
+
email_protection=True,
|
1359
|
+
code_signing=True,
|
1360
|
+
time_stamping=True,
|
1361
|
+
),
|
1362
|
+
),
|
1363
|
+
),
|
1364
|
+
),
|
1365
|
+
lifetime="86400s",
|
1366
|
+
key_spec=gcp.certificateauthority.AuthorityKeySpecArgs(
|
1367
|
+
cloud_kms_key_version="projects/keys-project/locations/us-central1/keyRings/key-ring/cryptoKeys/crypto-key/cryptoKeyVersions/1",
|
1368
|
+
))
|
1369
|
+
```
|
1274
1370
|
|
1275
1371
|
## Import
|
1276
1372
|
|
@@ -1421,8 +1517,6 @@ class Authority(pulumi.CustomResource):
|
|
1421
1517
|
:param pulumi.Input[str] create_time: The time at which this CertificateAuthority was created.
|
1422
1518
|
A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine
|
1423
1519
|
fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
|
1424
|
-
:param pulumi.Input[bool] deletion_protection: Whether or not to allow Terraform to destroy the CertificateAuthority. Unless this field is set to false in Terraform
|
1425
|
-
state, a 'terraform destroy' or 'terraform apply' that would delete the instance will fail.
|
1426
1520
|
:param pulumi.Input[str] desired_state: Desired state of the CertificateAuthority. Set this field to 'STAGED' to create a 'STAGED' root CA.
|
1427
1521
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] effective_labels: All of labels (key/value pairs) present on the resource in GCP, including the labels configured through Pulumi, other clients and services.
|
1428
1522
|
:param pulumi.Input[str] gcs_bucket: The name of a Cloud Storage bucket where this CertificateAuthority will publish content, such as the CA certificate and
|
@@ -1459,7 +1553,7 @@ class Authority(pulumi.CustomResource):
|
|
1459
1553
|
:param pulumi.Input[str] state: The State for this CertificateAuthority.
|
1460
1554
|
:param pulumi.Input[pulumi.InputType['AuthoritySubordinateConfigArgs']] subordinate_config: If this is a subordinate CertificateAuthority, this field will be set with the subordinate configuration, which
|
1461
1555
|
describes its issuers.
|
1462
|
-
:param pulumi.Input[str] type: The Type of this CertificateAuthority.
|
1556
|
+
:param pulumi.Input[str] type: The Type of this CertificateAuthority. > **Note:** For 'SUBORDINATE' Certificate Authorities, they need to be activated
|
1463
1557
|
before they can issue certificates. Default value: "SELF_SIGNED" Possible values: ["SELF_SIGNED", "SUBORDINATE"]
|
1464
1558
|
:param pulumi.Input[str] update_time: The time at which this CertificateAuthority was updated.
|
1465
1559
|
A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine
|
@@ -1534,10 +1628,6 @@ class Authority(pulumi.CustomResource):
|
|
1534
1628
|
@property
|
1535
1629
|
@pulumi.getter(name="deletionProtection")
|
1536
1630
|
def deletion_protection(self) -> pulumi.Output[Optional[bool]]:
|
1537
|
-
"""
|
1538
|
-
Whether or not to allow Terraform to destroy the CertificateAuthority. Unless this field is set to false in Terraform
|
1539
|
-
state, a 'terraform destroy' or 'terraform apply' that would delete the instance will fail.
|
1540
|
-
"""
|
1541
1631
|
return pulumi.get(self, "deletion_protection")
|
1542
1632
|
|
1543
1633
|
@property
|
@@ -1697,7 +1787,7 @@ class Authority(pulumi.CustomResource):
|
|
1697
1787
|
@pulumi.getter
|
1698
1788
|
def type(self) -> pulumi.Output[Optional[str]]:
|
1699
1789
|
"""
|
1700
|
-
The Type of this CertificateAuthority.
|
1790
|
+
The Type of this CertificateAuthority. > **Note:** For 'SUBORDINATE' Certificate Authorities, they need to be activated
|
1701
1791
|
before they can issue certificates. Default value: "SELF_SIGNED" Possible values: ["SELF_SIGNED", "SUBORDINATE"]
|
1702
1792
|
"""
|
1703
1793
|
return pulumi.get(self, "type")
|
@@ -968,6 +968,94 @@ class Certificate(pulumi.CustomResource):
|
|
968
968
|
),
|
969
969
|
))
|
970
970
|
```
|
971
|
+
### Privateca Certificate Custom Ski
|
972
|
+
|
973
|
+
```python
|
974
|
+
import pulumi
|
975
|
+
import pulumi_gcp as gcp
|
976
|
+
import pulumi_std as std
|
977
|
+
|
978
|
+
default = gcp.certificateauthority.CaPool("default",
|
979
|
+
location="us-central1",
|
980
|
+
name="my-pool",
|
981
|
+
tier="ENTERPRISE")
|
982
|
+
default_authority = gcp.certificateauthority.Authority("default",
|
983
|
+
location="us-central1",
|
984
|
+
pool=default.name,
|
985
|
+
certificate_authority_id="my-authority",
|
986
|
+
config=gcp.certificateauthority.AuthorityConfigArgs(
|
987
|
+
subject_config=gcp.certificateauthority.AuthorityConfigSubjectConfigArgs(
|
988
|
+
subject=gcp.certificateauthority.AuthorityConfigSubjectConfigSubjectArgs(
|
989
|
+
organization="HashiCorp",
|
990
|
+
common_name="my-certificate-authority",
|
991
|
+
),
|
992
|
+
subject_alt_name=gcp.certificateauthority.AuthorityConfigSubjectConfigSubjectAltNameArgs(
|
993
|
+
dns_names=["hashicorp.com"],
|
994
|
+
),
|
995
|
+
),
|
996
|
+
x509_config=gcp.certificateauthority.AuthorityConfigX509ConfigArgs(
|
997
|
+
ca_options=gcp.certificateauthority.AuthorityConfigX509ConfigCaOptionsArgs(
|
998
|
+
is_ca=True,
|
999
|
+
),
|
1000
|
+
key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageArgs(
|
1001
|
+
base_key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageBaseKeyUsageArgs(
|
1002
|
+
digital_signature=True,
|
1003
|
+
cert_sign=True,
|
1004
|
+
crl_sign=True,
|
1005
|
+
),
|
1006
|
+
extended_key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageExtendedKeyUsageArgs(
|
1007
|
+
server_auth=True,
|
1008
|
+
),
|
1009
|
+
),
|
1010
|
+
),
|
1011
|
+
),
|
1012
|
+
lifetime="86400s",
|
1013
|
+
key_spec=gcp.certificateauthority.AuthorityKeySpecArgs(
|
1014
|
+
algorithm="RSA_PKCS1_4096_SHA256",
|
1015
|
+
),
|
1016
|
+
deletion_protection=False,
|
1017
|
+
skip_grace_period=True,
|
1018
|
+
ignore_active_certificates_on_deletion=True)
|
1019
|
+
default_certificate = gcp.certificateauthority.Certificate("default",
|
1020
|
+
location="us-central1",
|
1021
|
+
pool=default.name,
|
1022
|
+
name="my-certificate",
|
1023
|
+
lifetime="860s",
|
1024
|
+
config=gcp.certificateauthority.CertificateConfigArgs(
|
1025
|
+
subject_config=gcp.certificateauthority.CertificateConfigSubjectConfigArgs(
|
1026
|
+
subject=gcp.certificateauthority.CertificateConfigSubjectConfigSubjectArgs(
|
1027
|
+
common_name="san1.example.com",
|
1028
|
+
country_code="us",
|
1029
|
+
organization="google",
|
1030
|
+
organizational_unit="enterprise",
|
1031
|
+
locality="mountain view",
|
1032
|
+
province="california",
|
1033
|
+
street_address="1600 amphitheatre parkway",
|
1034
|
+
postal_code="94109",
|
1035
|
+
),
|
1036
|
+
),
|
1037
|
+
subject_key_id=gcp.certificateauthority.CertificateConfigSubjectKeyIdArgs(
|
1038
|
+
key_id="4cf3372289b1d411b999dbb9ebcd44744b6b2fca",
|
1039
|
+
),
|
1040
|
+
x509_config=gcp.certificateauthority.CertificateConfigX509ConfigArgs(
|
1041
|
+
ca_options=gcp.certificateauthority.CertificateConfigX509ConfigCaOptionsArgs(
|
1042
|
+
is_ca=False,
|
1043
|
+
),
|
1044
|
+
key_usage=gcp.certificateauthority.CertificateConfigX509ConfigKeyUsageArgs(
|
1045
|
+
base_key_usage=gcp.certificateauthority.CertificateConfigX509ConfigKeyUsageBaseKeyUsageArgs(
|
1046
|
+
crl_sign=True,
|
1047
|
+
),
|
1048
|
+
extended_key_usage=gcp.certificateauthority.CertificateConfigX509ConfigKeyUsageExtendedKeyUsageArgs(
|
1049
|
+
server_auth=True,
|
1050
|
+
),
|
1051
|
+
),
|
1052
|
+
),
|
1053
|
+
public_key=gcp.certificateauthority.CertificateConfigPublicKeyArgs(
|
1054
|
+
format="PEM",
|
1055
|
+
key=std.filebase64(input="test-fixtures/rsa_public.pem").result,
|
1056
|
+
),
|
1057
|
+
))
|
1058
|
+
```
|
971
1059
|
|
972
1060
|
## Import
|
973
1061
|
|
@@ -1407,6 +1495,94 @@ class Certificate(pulumi.CustomResource):
|
|
1407
1495
|
),
|
1408
1496
|
))
|
1409
1497
|
```
|
1498
|
+
### Privateca Certificate Custom Ski
|
1499
|
+
|
1500
|
+
```python
|
1501
|
+
import pulumi
|
1502
|
+
import pulumi_gcp as gcp
|
1503
|
+
import pulumi_std as std
|
1504
|
+
|
1505
|
+
default = gcp.certificateauthority.CaPool("default",
|
1506
|
+
location="us-central1",
|
1507
|
+
name="my-pool",
|
1508
|
+
tier="ENTERPRISE")
|
1509
|
+
default_authority = gcp.certificateauthority.Authority("default",
|
1510
|
+
location="us-central1",
|
1511
|
+
pool=default.name,
|
1512
|
+
certificate_authority_id="my-authority",
|
1513
|
+
config=gcp.certificateauthority.AuthorityConfigArgs(
|
1514
|
+
subject_config=gcp.certificateauthority.AuthorityConfigSubjectConfigArgs(
|
1515
|
+
subject=gcp.certificateauthority.AuthorityConfigSubjectConfigSubjectArgs(
|
1516
|
+
organization="HashiCorp",
|
1517
|
+
common_name="my-certificate-authority",
|
1518
|
+
),
|
1519
|
+
subject_alt_name=gcp.certificateauthority.AuthorityConfigSubjectConfigSubjectAltNameArgs(
|
1520
|
+
dns_names=["hashicorp.com"],
|
1521
|
+
),
|
1522
|
+
),
|
1523
|
+
x509_config=gcp.certificateauthority.AuthorityConfigX509ConfigArgs(
|
1524
|
+
ca_options=gcp.certificateauthority.AuthorityConfigX509ConfigCaOptionsArgs(
|
1525
|
+
is_ca=True,
|
1526
|
+
),
|
1527
|
+
key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageArgs(
|
1528
|
+
base_key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageBaseKeyUsageArgs(
|
1529
|
+
digital_signature=True,
|
1530
|
+
cert_sign=True,
|
1531
|
+
crl_sign=True,
|
1532
|
+
),
|
1533
|
+
extended_key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageExtendedKeyUsageArgs(
|
1534
|
+
server_auth=True,
|
1535
|
+
),
|
1536
|
+
),
|
1537
|
+
),
|
1538
|
+
),
|
1539
|
+
lifetime="86400s",
|
1540
|
+
key_spec=gcp.certificateauthority.AuthorityKeySpecArgs(
|
1541
|
+
algorithm="RSA_PKCS1_4096_SHA256",
|
1542
|
+
),
|
1543
|
+
deletion_protection=False,
|
1544
|
+
skip_grace_period=True,
|
1545
|
+
ignore_active_certificates_on_deletion=True)
|
1546
|
+
default_certificate = gcp.certificateauthority.Certificate("default",
|
1547
|
+
location="us-central1",
|
1548
|
+
pool=default.name,
|
1549
|
+
name="my-certificate",
|
1550
|
+
lifetime="860s",
|
1551
|
+
config=gcp.certificateauthority.CertificateConfigArgs(
|
1552
|
+
subject_config=gcp.certificateauthority.CertificateConfigSubjectConfigArgs(
|
1553
|
+
subject=gcp.certificateauthority.CertificateConfigSubjectConfigSubjectArgs(
|
1554
|
+
common_name="san1.example.com",
|
1555
|
+
country_code="us",
|
1556
|
+
organization="google",
|
1557
|
+
organizational_unit="enterprise",
|
1558
|
+
locality="mountain view",
|
1559
|
+
province="california",
|
1560
|
+
street_address="1600 amphitheatre parkway",
|
1561
|
+
postal_code="94109",
|
1562
|
+
),
|
1563
|
+
),
|
1564
|
+
subject_key_id=gcp.certificateauthority.CertificateConfigSubjectKeyIdArgs(
|
1565
|
+
key_id="4cf3372289b1d411b999dbb9ebcd44744b6b2fca",
|
1566
|
+
),
|
1567
|
+
x509_config=gcp.certificateauthority.CertificateConfigX509ConfigArgs(
|
1568
|
+
ca_options=gcp.certificateauthority.CertificateConfigX509ConfigCaOptionsArgs(
|
1569
|
+
is_ca=False,
|
1570
|
+
),
|
1571
|
+
key_usage=gcp.certificateauthority.CertificateConfigX509ConfigKeyUsageArgs(
|
1572
|
+
base_key_usage=gcp.certificateauthority.CertificateConfigX509ConfigKeyUsageBaseKeyUsageArgs(
|
1573
|
+
crl_sign=True,
|
1574
|
+
),
|
1575
|
+
extended_key_usage=gcp.certificateauthority.CertificateConfigX509ConfigKeyUsageExtendedKeyUsageArgs(
|
1576
|
+
server_auth=True,
|
1577
|
+
),
|
1578
|
+
),
|
1579
|
+
),
|
1580
|
+
public_key=gcp.certificateauthority.CertificateConfigPublicKeyArgs(
|
1581
|
+
format="PEM",
|
1582
|
+
key=std.filebase64(input="test-fixtures/rsa_public.pem").result,
|
1583
|
+
),
|
1584
|
+
))
|
1585
|
+
```
|
1410
1586
|
|
1411
1587
|
## Import
|
1412
1588
|
|