pulumi-gcp 7.20.0a1713984378__py3-none-any.whl → 7.21.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (131) hide show
  1. pulumi_gcp/__init__.py +48 -0
  2. pulumi_gcp/alloydb/_inputs.py +74 -0
  3. pulumi_gcp/alloydb/backup.py +0 -12
  4. pulumi_gcp/alloydb/cluster.py +0 -12
  5. pulumi_gcp/alloydb/instance.py +90 -81
  6. pulumi_gcp/alloydb/outputs.py +98 -0
  7. pulumi_gcp/apigee/environment.py +47 -0
  8. pulumi_gcp/apigee/organization.py +162 -0
  9. pulumi_gcp/apigee/sharedflow.py +0 -20
  10. pulumi_gcp/appengine/flexible_app_version.py +0 -20
  11. pulumi_gcp/applicationintegration/__init__.py +1 -0
  12. pulumi_gcp/applicationintegration/_inputs.py +843 -0
  13. pulumi_gcp/applicationintegration/auth_config.py +998 -0
  14. pulumi_gcp/applicationintegration/outputs.py +891 -0
  15. pulumi_gcp/artifactregistry/_inputs.py +186 -0
  16. pulumi_gcp/artifactregistry/outputs.py +297 -4
  17. pulumi_gcp/artifactregistry/repository.py +346 -16
  18. pulumi_gcp/bigquery/table.py +61 -0
  19. pulumi_gcp/bigquerydatapolicy/_inputs.py +21 -4
  20. pulumi_gcp/bigquerydatapolicy/data_policy.py +78 -0
  21. pulumi_gcp/bigquerydatapolicy/outputs.py +16 -3
  22. pulumi_gcp/billing/budget.py +54 -0
  23. pulumi_gcp/certificateauthority/_inputs.py +92 -12
  24. pulumi_gcp/certificateauthority/authority.py +117 -27
  25. pulumi_gcp/certificateauthority/certificate.py +176 -0
  26. pulumi_gcp/certificateauthority/outputs.py +144 -12
  27. pulumi_gcp/cloudbuild/worker_pool.py +0 -12
  28. pulumi_gcp/cloudbuildv2/connection.py +0 -12
  29. pulumi_gcp/cloudbuildv2/repository.py +0 -12
  30. pulumi_gcp/clouddeploy/automation.py +0 -12
  31. pulumi_gcp/clouddeploy/custom_target_type.py +0 -12
  32. pulumi_gcp/clouddeploy/delivery_pipeline.py +0 -12
  33. pulumi_gcp/clouddeploy/target.py +0 -12
  34. pulumi_gcp/cloudfunctionsv2/_inputs.py +16 -0
  35. pulumi_gcp/cloudfunctionsv2/function.py +110 -0
  36. pulumi_gcp/cloudfunctionsv2/outputs.py +25 -0
  37. pulumi_gcp/cloudrunv2/job.py +0 -12
  38. pulumi_gcp/cloudrunv2/service.py +0 -12
  39. pulumi_gcp/composer/__init__.py +1 -0
  40. pulumi_gcp/composer/environment.py +35 -47
  41. pulumi_gcp/composer/user_workloads_secret.py +441 -0
  42. pulumi_gcp/compute/__init__.py +1 -0
  43. pulumi_gcp/compute/_inputs.py +169 -58
  44. pulumi_gcp/compute/forwarding_rule.py +0 -13
  45. pulumi_gcp/compute/get_instance_group_manager.py +11 -1
  46. pulumi_gcp/compute/global_address.py +0 -12
  47. pulumi_gcp/compute/global_forwarding_rule.py +0 -282
  48. pulumi_gcp/compute/instance_from_machine_image.py +14 -46
  49. pulumi_gcp/compute/instance_from_template.py +14 -46
  50. pulumi_gcp/compute/instance_group_manager.py +68 -21
  51. pulumi_gcp/compute/outputs.py +213 -65
  52. pulumi_gcp/compute/region_instance_group_manager.py +61 -14
  53. pulumi_gcp/compute/region_instance_template.py +0 -13
  54. pulumi_gcp/compute/region_target_https_proxy.py +257 -0
  55. pulumi_gcp/compute/region_url_map.py +0 -470
  56. pulumi_gcp/compute/security_policy_rule.py +850 -0
  57. pulumi_gcp/container/attached_cluster.py +0 -12
  58. pulumi_gcp/container/aws_cluster.py +0 -12
  59. pulumi_gcp/container/aws_node_pool.py +0 -12
  60. pulumi_gcp/container/azure_cluster.py +0 -12
  61. pulumi_gcp/container/azure_node_pool.py +0 -12
  62. pulumi_gcp/container/cluster.py +0 -20
  63. pulumi_gcp/container/outputs.py +4 -4
  64. pulumi_gcp/dataflow/flex_template_job.py +0 -39
  65. pulumi_gcp/dataloss/__init__.py +1 -0
  66. pulumi_gcp/dataloss/_inputs.py +1040 -0
  67. pulumi_gcp/dataloss/outputs.py +1123 -0
  68. pulumi_gcp/dataloss/prevention_discovery_config.py +737 -0
  69. pulumi_gcp/dataproc/cluster.py +0 -20
  70. pulumi_gcp/dataproc/workflow_template.py +21 -26
  71. pulumi_gcp/deploymentmanager/deployment.py +0 -34
  72. pulumi_gcp/dns/_inputs.py +2 -130
  73. pulumi_gcp/dns/get_keys.py +1 -1
  74. pulumi_gcp/dns/get_managed_zones.py +3 -9
  75. pulumi_gcp/dns/get_record_set.py +3 -0
  76. pulumi_gcp/dns/outputs.py +36 -58
  77. pulumi_gcp/dns/record_set.py +2 -36
  78. pulumi_gcp/filestore/get_instance.py +11 -1
  79. pulumi_gcp/filestore/instance.py +101 -0
  80. pulumi_gcp/firebase/_inputs.py +16 -0
  81. pulumi_gcp/firebase/android_app.py +0 -27
  82. pulumi_gcp/firebase/app_check_play_integrity_config.py +20 -0
  83. pulumi_gcp/firebase/app_check_recaptcha_enterprise_config.py +10 -0
  84. pulumi_gcp/firebase/app_check_service_config.py +0 -125
  85. pulumi_gcp/firebase/apple_app.py +0 -27
  86. pulumi_gcp/firebase/hosting_custom_domain.py +0 -27
  87. pulumi_gcp/firebase/hosting_version.py +44 -0
  88. pulumi_gcp/firebase/outputs.py +12 -0
  89. pulumi_gcp/firebase/web_app.py +0 -20
  90. pulumi_gcp/firestore/database.py +0 -68
  91. pulumi_gcp/firestore/document.py +4 -4
  92. pulumi_gcp/gkeonprem/bare_metal_admin_cluster.py +0 -12
  93. pulumi_gcp/gkeonprem/bare_metal_cluster.py +0 -12
  94. pulumi_gcp/gkeonprem/bare_metal_node_pool.py +0 -12
  95. pulumi_gcp/gkeonprem/v_mware_cluster.py +0 -12
  96. pulumi_gcp/gkeonprem/v_mware_node_pool.py +0 -12
  97. pulumi_gcp/logging/folder_sink.py +54 -0
  98. pulumi_gcp/logging/organization_sink.py +54 -0
  99. pulumi_gcp/monitoring/_inputs.py +46 -2
  100. pulumi_gcp/monitoring/outputs.py +40 -2
  101. pulumi_gcp/monitoring/uptime_check_config.py +6 -0
  102. pulumi_gcp/netapp/active_directory.py +0 -20
  103. pulumi_gcp/netapp/volume_replication.py +0 -68
  104. pulumi_gcp/networkconnectivity/__init__.py +1 -0
  105. pulumi_gcp/networkconnectivity/internal_range.py +1024 -0
  106. pulumi_gcp/organizations/get_active_folder.py +18 -3
  107. pulumi_gcp/projects/__init__.py +1 -0
  108. pulumi_gcp/projects/iam_member_remove.py +313 -0
  109. pulumi_gcp/provider.py +3 -1
  110. pulumi_gcp/secretmanager/get_secret.py +13 -3
  111. pulumi_gcp/secretmanager/outputs.py +20 -1
  112. pulumi_gcp/secretmanager/secret.py +90 -15
  113. pulumi_gcp/servicenetworking/connection.py +0 -20
  114. pulumi_gcp/spanner/database.py +0 -41
  115. pulumi_gcp/spanner/instance.py +0 -40
  116. pulumi_gcp/storage/__init__.py +1 -0
  117. pulumi_gcp/storage/bucket.py +0 -12
  118. pulumi_gcp/storage/get_bucket_objects.py +153 -0
  119. pulumi_gcp/storage/outputs.py +63 -0
  120. pulumi_gcp/vmwareengine/_inputs.py +63 -5
  121. pulumi_gcp/vmwareengine/get_private_cloud.py +1 -21
  122. pulumi_gcp/vmwareengine/outputs.py +113 -5
  123. pulumi_gcp/vmwareengine/private_cloud.py +0 -94
  124. pulumi_gcp/workbench/instance.py +4 -4
  125. pulumi_gcp/workstations/workstation.py +0 -12
  126. pulumi_gcp/workstations/workstation_cluster.py +32 -12
  127. pulumi_gcp/workstations/workstation_config.py +0 -12
  128. {pulumi_gcp-7.20.0a1713984378.dist-info → pulumi_gcp-7.21.0.dist-info}/METADATA +1 -1
  129. {pulumi_gcp-7.20.0a1713984378.dist-info → pulumi_gcp-7.21.0.dist-info}/RECORD +131 -124
  130. {pulumi_gcp-7.20.0a1713984378.dist-info → pulumi_gcp-7.21.0.dist-info}/WHEEL +0 -0
  131. {pulumi_gcp-7.20.0a1713984378.dist-info → pulumi_gcp-7.21.0.dist-info}/top_level.txt +0 -0
@@ -44,8 +44,6 @@ class AuthorityArgs:
44
44
  :param pulumi.Input[str] location: Location of the CertificateAuthority. A full list of valid locations can be found by
45
45
  running `gcloud privateca locations list`.
46
46
  :param pulumi.Input[str] pool: The name of the CaPool this Certificate Authority belongs to.
47
- :param pulumi.Input[bool] deletion_protection: Whether or not to allow Terraform to destroy the CertificateAuthority. Unless this field is set to false in Terraform
48
- state, a 'terraform destroy' or 'terraform apply' that would delete the instance will fail.
49
47
  :param pulumi.Input[str] desired_state: Desired state of the CertificateAuthority. Set this field to 'STAGED' to create a 'STAGED' root CA.
50
48
  :param pulumi.Input[str] gcs_bucket: The name of a Cloud Storage bucket where this CertificateAuthority will publish content, such as the CA certificate and
51
49
  CRLs. This must be a bucket name, without any prefixes (such as 'gs://') or suffixes (such as '.googleapis.com'). For
@@ -65,7 +63,7 @@ class AuthorityArgs:
65
63
  'false'.
66
64
  :param pulumi.Input['AuthoritySubordinateConfigArgs'] subordinate_config: If this is a subordinate CertificateAuthority, this field will be set with the subordinate configuration, which
67
65
  describes its issuers.
68
- :param pulumi.Input[str] type: The Type of this CertificateAuthority. ~> **Note:** For 'SUBORDINATE' Certificate Authorities, they need to be activated
66
+ :param pulumi.Input[str] type: The Type of this CertificateAuthority. > **Note:** For 'SUBORDINATE' Certificate Authorities, they need to be activated
69
67
  before they can issue certificates. Default value: "SELF_SIGNED" Possible values: ["SELF_SIGNED", "SUBORDINATE"]
70
68
  """
71
69
  pulumi.set(__self__, "certificate_authority_id", certificate_authority_id)
@@ -164,10 +162,6 @@ class AuthorityArgs:
164
162
  @property
165
163
  @pulumi.getter(name="deletionProtection")
166
164
  def deletion_protection(self) -> Optional[pulumi.Input[bool]]:
167
- """
168
- Whether or not to allow Terraform to destroy the CertificateAuthority. Unless this field is set to false in Terraform
169
- state, a 'terraform destroy' or 'terraform apply' that would delete the instance will fail.
170
- """
171
165
  return pulumi.get(self, "deletion_protection")
172
166
 
173
167
  @deletion_protection.setter
@@ -294,7 +288,7 @@ class AuthorityArgs:
294
288
  @pulumi.getter
295
289
  def type(self) -> Optional[pulumi.Input[str]]:
296
290
  """
297
- The Type of this CertificateAuthority. ~> **Note:** For 'SUBORDINATE' Certificate Authorities, they need to be activated
291
+ The Type of this CertificateAuthority. > **Note:** For 'SUBORDINATE' Certificate Authorities, they need to be activated
298
292
  before they can issue certificates. Default value: "SELF_SIGNED" Possible values: ["SELF_SIGNED", "SUBORDINATE"]
299
293
  """
300
294
  return pulumi.get(self, "type")
@@ -341,8 +335,6 @@ class _AuthorityState:
341
335
  :param pulumi.Input[str] create_time: The time at which this CertificateAuthority was created.
342
336
  A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine
343
337
  fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
344
- :param pulumi.Input[bool] deletion_protection: Whether or not to allow Terraform to destroy the CertificateAuthority. Unless this field is set to false in Terraform
345
- state, a 'terraform destroy' or 'terraform apply' that would delete the instance will fail.
346
338
  :param pulumi.Input[str] desired_state: Desired state of the CertificateAuthority. Set this field to 'STAGED' to create a 'STAGED' root CA.
347
339
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] effective_labels: All of labels (key/value pairs) present on the resource in GCP, including the labels configured through Pulumi, other clients and services.
348
340
  :param pulumi.Input[str] gcs_bucket: The name of a Cloud Storage bucket where this CertificateAuthority will publish content, such as the CA certificate and
@@ -379,7 +371,7 @@ class _AuthorityState:
379
371
  :param pulumi.Input[str] state: The State for this CertificateAuthority.
380
372
  :param pulumi.Input['AuthoritySubordinateConfigArgs'] subordinate_config: If this is a subordinate CertificateAuthority, this field will be set with the subordinate configuration, which
381
373
  describes its issuers.
382
- :param pulumi.Input[str] type: The Type of this CertificateAuthority. ~> **Note:** For 'SUBORDINATE' Certificate Authorities, they need to be activated
374
+ :param pulumi.Input[str] type: The Type of this CertificateAuthority. > **Note:** For 'SUBORDINATE' Certificate Authorities, they need to be activated
383
375
  before they can issue certificates. Default value: "SELF_SIGNED" Possible values: ["SELF_SIGNED", "SUBORDINATE"]
384
376
  :param pulumi.Input[str] update_time: The time at which this CertificateAuthority was updated.
385
377
  A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine
@@ -489,10 +481,6 @@ class _AuthorityState:
489
481
  @property
490
482
  @pulumi.getter(name="deletionProtection")
491
483
  def deletion_protection(self) -> Optional[pulumi.Input[bool]]:
492
- """
493
- Whether or not to allow Terraform to destroy the CertificateAuthority. Unless this field is set to false in Terraform
494
- state, a 'terraform destroy' or 'terraform apply' that would delete the instance will fail.
495
- """
496
484
  return pulumi.get(self, "deletion_protection")
497
485
 
498
486
  @deletion_protection.setter
@@ -724,7 +712,7 @@ class _AuthorityState:
724
712
  @pulumi.getter
725
713
  def type(self) -> Optional[pulumi.Input[str]]:
726
714
  """
727
- The Type of this CertificateAuthority. ~> **Note:** For 'SUBORDINATE' Certificate Authorities, they need to be activated
715
+ The Type of this CertificateAuthority. > **Note:** For 'SUBORDINATE' Certificate Authorities, they need to be activated
728
716
  before they can issue certificates. Default value: "SELF_SIGNED" Possible values: ["SELF_SIGNED", "SUBORDINATE"]
729
717
  """
730
718
  return pulumi.get(self, "type")
@@ -987,6 +975,61 @@ class Authority(pulumi.CustomResource):
987
975
  ),
988
976
  ))
989
977
  ```
978
+ ### Privateca Certificate Authority Custom Ski
979
+
980
+ ```python
981
+ import pulumi
982
+ import pulumi_gcp as gcp
983
+
984
+ default = gcp.certificateauthority.Authority("default",
985
+ pool="ca-pool",
986
+ certificate_authority_id="my-certificate-authority",
987
+ location="us-central1",
988
+ deletion_protection=True,
989
+ config=gcp.certificateauthority.AuthorityConfigArgs(
990
+ subject_config=gcp.certificateauthority.AuthorityConfigSubjectConfigArgs(
991
+ subject=gcp.certificateauthority.AuthorityConfigSubjectConfigSubjectArgs(
992
+ organization="HashiCorp",
993
+ common_name="my-certificate-authority",
994
+ ),
995
+ subject_alt_name=gcp.certificateauthority.AuthorityConfigSubjectConfigSubjectAltNameArgs(
996
+ dns_names=["hashicorp.com"],
997
+ ),
998
+ ),
999
+ subject_key_id=gcp.certificateauthority.AuthorityConfigSubjectKeyIdArgs(
1000
+ key_id="4cf3372289b1d411b999dbb9ebcd44744b6b2fca",
1001
+ ),
1002
+ x509_config=gcp.certificateauthority.AuthorityConfigX509ConfigArgs(
1003
+ ca_options=gcp.certificateauthority.AuthorityConfigX509ConfigCaOptionsArgs(
1004
+ is_ca=True,
1005
+ max_issuer_path_length=10,
1006
+ ),
1007
+ key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageArgs(
1008
+ base_key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageBaseKeyUsageArgs(
1009
+ digital_signature=True,
1010
+ content_commitment=True,
1011
+ key_encipherment=False,
1012
+ data_encipherment=True,
1013
+ key_agreement=True,
1014
+ cert_sign=True,
1015
+ crl_sign=True,
1016
+ decipher_only=True,
1017
+ ),
1018
+ extended_key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageExtendedKeyUsageArgs(
1019
+ server_auth=True,
1020
+ client_auth=False,
1021
+ email_protection=True,
1022
+ code_signing=True,
1023
+ time_stamping=True,
1024
+ ),
1025
+ ),
1026
+ ),
1027
+ ),
1028
+ lifetime="86400s",
1029
+ key_spec=gcp.certificateauthority.AuthorityKeySpecArgs(
1030
+ cloud_kms_key_version="projects/keys-project/locations/us-central1/keyRings/key-ring/cryptoKeys/crypto-key/cryptoKeyVersions/1",
1031
+ ))
1032
+ ```
990
1033
 
991
1034
  ## Import
992
1035
 
@@ -1017,8 +1060,6 @@ class Authority(pulumi.CustomResource):
1017
1060
  :param pulumi.Input[str] certificate_authority_id: The user provided Resource ID for this Certificate Authority.
1018
1061
  :param pulumi.Input[pulumi.InputType['AuthorityConfigArgs']] config: The config used to create a self-signed X.509 certificate or CSR.
1019
1062
  Structure is documented below.
1020
- :param pulumi.Input[bool] deletion_protection: Whether or not to allow Terraform to destroy the CertificateAuthority. Unless this field is set to false in Terraform
1021
- state, a 'terraform destroy' or 'terraform apply' that would delete the instance will fail.
1022
1063
  :param pulumi.Input[str] desired_state: Desired state of the CertificateAuthority. Set this field to 'STAGED' to create a 'STAGED' root CA.
1023
1064
  :param pulumi.Input[str] gcs_bucket: The name of a Cloud Storage bucket where this CertificateAuthority will publish content, such as the CA certificate and
1024
1065
  CRLs. This must be a bucket name, without any prefixes (such as 'gs://') or suffixes (such as '.googleapis.com'). For
@@ -1045,7 +1086,7 @@ class Authority(pulumi.CustomResource):
1045
1086
  'false'.
1046
1087
  :param pulumi.Input[pulumi.InputType['AuthoritySubordinateConfigArgs']] subordinate_config: If this is a subordinate CertificateAuthority, this field will be set with the subordinate configuration, which
1047
1088
  describes its issuers.
1048
- :param pulumi.Input[str] type: The Type of this CertificateAuthority. ~> **Note:** For 'SUBORDINATE' Certificate Authorities, they need to be activated
1089
+ :param pulumi.Input[str] type: The Type of this CertificateAuthority. > **Note:** For 'SUBORDINATE' Certificate Authorities, they need to be activated
1049
1090
  before they can issue certificates. Default value: "SELF_SIGNED" Possible values: ["SELF_SIGNED", "SUBORDINATE"]
1050
1091
  """
1051
1092
  ...
@@ -1271,6 +1312,61 @@ class Authority(pulumi.CustomResource):
1271
1312
  ),
1272
1313
  ))
1273
1314
  ```
1315
+ ### Privateca Certificate Authority Custom Ski
1316
+
1317
+ ```python
1318
+ import pulumi
1319
+ import pulumi_gcp as gcp
1320
+
1321
+ default = gcp.certificateauthority.Authority("default",
1322
+ pool="ca-pool",
1323
+ certificate_authority_id="my-certificate-authority",
1324
+ location="us-central1",
1325
+ deletion_protection=True,
1326
+ config=gcp.certificateauthority.AuthorityConfigArgs(
1327
+ subject_config=gcp.certificateauthority.AuthorityConfigSubjectConfigArgs(
1328
+ subject=gcp.certificateauthority.AuthorityConfigSubjectConfigSubjectArgs(
1329
+ organization="HashiCorp",
1330
+ common_name="my-certificate-authority",
1331
+ ),
1332
+ subject_alt_name=gcp.certificateauthority.AuthorityConfigSubjectConfigSubjectAltNameArgs(
1333
+ dns_names=["hashicorp.com"],
1334
+ ),
1335
+ ),
1336
+ subject_key_id=gcp.certificateauthority.AuthorityConfigSubjectKeyIdArgs(
1337
+ key_id="4cf3372289b1d411b999dbb9ebcd44744b6b2fca",
1338
+ ),
1339
+ x509_config=gcp.certificateauthority.AuthorityConfigX509ConfigArgs(
1340
+ ca_options=gcp.certificateauthority.AuthorityConfigX509ConfigCaOptionsArgs(
1341
+ is_ca=True,
1342
+ max_issuer_path_length=10,
1343
+ ),
1344
+ key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageArgs(
1345
+ base_key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageBaseKeyUsageArgs(
1346
+ digital_signature=True,
1347
+ content_commitment=True,
1348
+ key_encipherment=False,
1349
+ data_encipherment=True,
1350
+ key_agreement=True,
1351
+ cert_sign=True,
1352
+ crl_sign=True,
1353
+ decipher_only=True,
1354
+ ),
1355
+ extended_key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageExtendedKeyUsageArgs(
1356
+ server_auth=True,
1357
+ client_auth=False,
1358
+ email_protection=True,
1359
+ code_signing=True,
1360
+ time_stamping=True,
1361
+ ),
1362
+ ),
1363
+ ),
1364
+ ),
1365
+ lifetime="86400s",
1366
+ key_spec=gcp.certificateauthority.AuthorityKeySpecArgs(
1367
+ cloud_kms_key_version="projects/keys-project/locations/us-central1/keyRings/key-ring/cryptoKeys/crypto-key/cryptoKeyVersions/1",
1368
+ ))
1369
+ ```
1274
1370
 
1275
1371
  ## Import
1276
1372
 
@@ -1421,8 +1517,6 @@ class Authority(pulumi.CustomResource):
1421
1517
  :param pulumi.Input[str] create_time: The time at which this CertificateAuthority was created.
1422
1518
  A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine
1423
1519
  fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
1424
- :param pulumi.Input[bool] deletion_protection: Whether or not to allow Terraform to destroy the CertificateAuthority. Unless this field is set to false in Terraform
1425
- state, a 'terraform destroy' or 'terraform apply' that would delete the instance will fail.
1426
1520
  :param pulumi.Input[str] desired_state: Desired state of the CertificateAuthority. Set this field to 'STAGED' to create a 'STAGED' root CA.
1427
1521
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] effective_labels: All of labels (key/value pairs) present on the resource in GCP, including the labels configured through Pulumi, other clients and services.
1428
1522
  :param pulumi.Input[str] gcs_bucket: The name of a Cloud Storage bucket where this CertificateAuthority will publish content, such as the CA certificate and
@@ -1459,7 +1553,7 @@ class Authority(pulumi.CustomResource):
1459
1553
  :param pulumi.Input[str] state: The State for this CertificateAuthority.
1460
1554
  :param pulumi.Input[pulumi.InputType['AuthoritySubordinateConfigArgs']] subordinate_config: If this is a subordinate CertificateAuthority, this field will be set with the subordinate configuration, which
1461
1555
  describes its issuers.
1462
- :param pulumi.Input[str] type: The Type of this CertificateAuthority. ~> **Note:** For 'SUBORDINATE' Certificate Authorities, they need to be activated
1556
+ :param pulumi.Input[str] type: The Type of this CertificateAuthority. > **Note:** For 'SUBORDINATE' Certificate Authorities, they need to be activated
1463
1557
  before they can issue certificates. Default value: "SELF_SIGNED" Possible values: ["SELF_SIGNED", "SUBORDINATE"]
1464
1558
  :param pulumi.Input[str] update_time: The time at which this CertificateAuthority was updated.
1465
1559
  A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine
@@ -1534,10 +1628,6 @@ class Authority(pulumi.CustomResource):
1534
1628
  @property
1535
1629
  @pulumi.getter(name="deletionProtection")
1536
1630
  def deletion_protection(self) -> pulumi.Output[Optional[bool]]:
1537
- """
1538
- Whether or not to allow Terraform to destroy the CertificateAuthority. Unless this field is set to false in Terraform
1539
- state, a 'terraform destroy' or 'terraform apply' that would delete the instance will fail.
1540
- """
1541
1631
  return pulumi.get(self, "deletion_protection")
1542
1632
 
1543
1633
  @property
@@ -1697,7 +1787,7 @@ class Authority(pulumi.CustomResource):
1697
1787
  @pulumi.getter
1698
1788
  def type(self) -> pulumi.Output[Optional[str]]:
1699
1789
  """
1700
- The Type of this CertificateAuthority. ~> **Note:** For 'SUBORDINATE' Certificate Authorities, they need to be activated
1790
+ The Type of this CertificateAuthority. > **Note:** For 'SUBORDINATE' Certificate Authorities, they need to be activated
1701
1791
  before they can issue certificates. Default value: "SELF_SIGNED" Possible values: ["SELF_SIGNED", "SUBORDINATE"]
1702
1792
  """
1703
1793
  return pulumi.get(self, "type")
@@ -968,6 +968,94 @@ class Certificate(pulumi.CustomResource):
968
968
  ),
969
969
  ))
970
970
  ```
971
+ ### Privateca Certificate Custom Ski
972
+
973
+ ```python
974
+ import pulumi
975
+ import pulumi_gcp as gcp
976
+ import pulumi_std as std
977
+
978
+ default = gcp.certificateauthority.CaPool("default",
979
+ location="us-central1",
980
+ name="my-pool",
981
+ tier="ENTERPRISE")
982
+ default_authority = gcp.certificateauthority.Authority("default",
983
+ location="us-central1",
984
+ pool=default.name,
985
+ certificate_authority_id="my-authority",
986
+ config=gcp.certificateauthority.AuthorityConfigArgs(
987
+ subject_config=gcp.certificateauthority.AuthorityConfigSubjectConfigArgs(
988
+ subject=gcp.certificateauthority.AuthorityConfigSubjectConfigSubjectArgs(
989
+ organization="HashiCorp",
990
+ common_name="my-certificate-authority",
991
+ ),
992
+ subject_alt_name=gcp.certificateauthority.AuthorityConfigSubjectConfigSubjectAltNameArgs(
993
+ dns_names=["hashicorp.com"],
994
+ ),
995
+ ),
996
+ x509_config=gcp.certificateauthority.AuthorityConfigX509ConfigArgs(
997
+ ca_options=gcp.certificateauthority.AuthorityConfigX509ConfigCaOptionsArgs(
998
+ is_ca=True,
999
+ ),
1000
+ key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageArgs(
1001
+ base_key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageBaseKeyUsageArgs(
1002
+ digital_signature=True,
1003
+ cert_sign=True,
1004
+ crl_sign=True,
1005
+ ),
1006
+ extended_key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageExtendedKeyUsageArgs(
1007
+ server_auth=True,
1008
+ ),
1009
+ ),
1010
+ ),
1011
+ ),
1012
+ lifetime="86400s",
1013
+ key_spec=gcp.certificateauthority.AuthorityKeySpecArgs(
1014
+ algorithm="RSA_PKCS1_4096_SHA256",
1015
+ ),
1016
+ deletion_protection=False,
1017
+ skip_grace_period=True,
1018
+ ignore_active_certificates_on_deletion=True)
1019
+ default_certificate = gcp.certificateauthority.Certificate("default",
1020
+ location="us-central1",
1021
+ pool=default.name,
1022
+ name="my-certificate",
1023
+ lifetime="860s",
1024
+ config=gcp.certificateauthority.CertificateConfigArgs(
1025
+ subject_config=gcp.certificateauthority.CertificateConfigSubjectConfigArgs(
1026
+ subject=gcp.certificateauthority.CertificateConfigSubjectConfigSubjectArgs(
1027
+ common_name="san1.example.com",
1028
+ country_code="us",
1029
+ organization="google",
1030
+ organizational_unit="enterprise",
1031
+ locality="mountain view",
1032
+ province="california",
1033
+ street_address="1600 amphitheatre parkway",
1034
+ postal_code="94109",
1035
+ ),
1036
+ ),
1037
+ subject_key_id=gcp.certificateauthority.CertificateConfigSubjectKeyIdArgs(
1038
+ key_id="4cf3372289b1d411b999dbb9ebcd44744b6b2fca",
1039
+ ),
1040
+ x509_config=gcp.certificateauthority.CertificateConfigX509ConfigArgs(
1041
+ ca_options=gcp.certificateauthority.CertificateConfigX509ConfigCaOptionsArgs(
1042
+ is_ca=False,
1043
+ ),
1044
+ key_usage=gcp.certificateauthority.CertificateConfigX509ConfigKeyUsageArgs(
1045
+ base_key_usage=gcp.certificateauthority.CertificateConfigX509ConfigKeyUsageBaseKeyUsageArgs(
1046
+ crl_sign=True,
1047
+ ),
1048
+ extended_key_usage=gcp.certificateauthority.CertificateConfigX509ConfigKeyUsageExtendedKeyUsageArgs(
1049
+ server_auth=True,
1050
+ ),
1051
+ ),
1052
+ ),
1053
+ public_key=gcp.certificateauthority.CertificateConfigPublicKeyArgs(
1054
+ format="PEM",
1055
+ key=std.filebase64(input="test-fixtures/rsa_public.pem").result,
1056
+ ),
1057
+ ))
1058
+ ```
971
1059
 
972
1060
  ## Import
973
1061
 
@@ -1407,6 +1495,94 @@ class Certificate(pulumi.CustomResource):
1407
1495
  ),
1408
1496
  ))
1409
1497
  ```
1498
+ ### Privateca Certificate Custom Ski
1499
+
1500
+ ```python
1501
+ import pulumi
1502
+ import pulumi_gcp as gcp
1503
+ import pulumi_std as std
1504
+
1505
+ default = gcp.certificateauthority.CaPool("default",
1506
+ location="us-central1",
1507
+ name="my-pool",
1508
+ tier="ENTERPRISE")
1509
+ default_authority = gcp.certificateauthority.Authority("default",
1510
+ location="us-central1",
1511
+ pool=default.name,
1512
+ certificate_authority_id="my-authority",
1513
+ config=gcp.certificateauthority.AuthorityConfigArgs(
1514
+ subject_config=gcp.certificateauthority.AuthorityConfigSubjectConfigArgs(
1515
+ subject=gcp.certificateauthority.AuthorityConfigSubjectConfigSubjectArgs(
1516
+ organization="HashiCorp",
1517
+ common_name="my-certificate-authority",
1518
+ ),
1519
+ subject_alt_name=gcp.certificateauthority.AuthorityConfigSubjectConfigSubjectAltNameArgs(
1520
+ dns_names=["hashicorp.com"],
1521
+ ),
1522
+ ),
1523
+ x509_config=gcp.certificateauthority.AuthorityConfigX509ConfigArgs(
1524
+ ca_options=gcp.certificateauthority.AuthorityConfigX509ConfigCaOptionsArgs(
1525
+ is_ca=True,
1526
+ ),
1527
+ key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageArgs(
1528
+ base_key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageBaseKeyUsageArgs(
1529
+ digital_signature=True,
1530
+ cert_sign=True,
1531
+ crl_sign=True,
1532
+ ),
1533
+ extended_key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageExtendedKeyUsageArgs(
1534
+ server_auth=True,
1535
+ ),
1536
+ ),
1537
+ ),
1538
+ ),
1539
+ lifetime="86400s",
1540
+ key_spec=gcp.certificateauthority.AuthorityKeySpecArgs(
1541
+ algorithm="RSA_PKCS1_4096_SHA256",
1542
+ ),
1543
+ deletion_protection=False,
1544
+ skip_grace_period=True,
1545
+ ignore_active_certificates_on_deletion=True)
1546
+ default_certificate = gcp.certificateauthority.Certificate("default",
1547
+ location="us-central1",
1548
+ pool=default.name,
1549
+ name="my-certificate",
1550
+ lifetime="860s",
1551
+ config=gcp.certificateauthority.CertificateConfigArgs(
1552
+ subject_config=gcp.certificateauthority.CertificateConfigSubjectConfigArgs(
1553
+ subject=gcp.certificateauthority.CertificateConfigSubjectConfigSubjectArgs(
1554
+ common_name="san1.example.com",
1555
+ country_code="us",
1556
+ organization="google",
1557
+ organizational_unit="enterprise",
1558
+ locality="mountain view",
1559
+ province="california",
1560
+ street_address="1600 amphitheatre parkway",
1561
+ postal_code="94109",
1562
+ ),
1563
+ ),
1564
+ subject_key_id=gcp.certificateauthority.CertificateConfigSubjectKeyIdArgs(
1565
+ key_id="4cf3372289b1d411b999dbb9ebcd44744b6b2fca",
1566
+ ),
1567
+ x509_config=gcp.certificateauthority.CertificateConfigX509ConfigArgs(
1568
+ ca_options=gcp.certificateauthority.CertificateConfigX509ConfigCaOptionsArgs(
1569
+ is_ca=False,
1570
+ ),
1571
+ key_usage=gcp.certificateauthority.CertificateConfigX509ConfigKeyUsageArgs(
1572
+ base_key_usage=gcp.certificateauthority.CertificateConfigX509ConfigKeyUsageBaseKeyUsageArgs(
1573
+ crl_sign=True,
1574
+ ),
1575
+ extended_key_usage=gcp.certificateauthority.CertificateConfigX509ConfigKeyUsageExtendedKeyUsageArgs(
1576
+ server_auth=True,
1577
+ ),
1578
+ ),
1579
+ ),
1580
+ public_key=gcp.certificateauthority.CertificateConfigPublicKeyArgs(
1581
+ format="PEM",
1582
+ key=std.filebase64(input="test-fixtures/rsa_public.pem").result,
1583
+ ),
1584
+ ))
1585
+ ```
1410
1586
 
1411
1587
  ## Import
1412
1588