pulumi-gcp 7.21.0a1714565535__py3-none-any.whl → 7.21.0a1714596856__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (56) hide show
  1. pulumi_gcp/__init__.py +40 -0
  2. pulumi_gcp/alloydb/_inputs.py +74 -0
  3. pulumi_gcp/alloydb/instance.py +90 -0
  4. pulumi_gcp/alloydb/outputs.py +98 -0
  5. pulumi_gcp/apigee/environment.py +47 -0
  6. pulumi_gcp/applicationintegration/__init__.py +1 -0
  7. pulumi_gcp/applicationintegration/_inputs.py +843 -0
  8. pulumi_gcp/applicationintegration/auth_config.py +998 -0
  9. pulumi_gcp/applicationintegration/outputs.py +891 -0
  10. pulumi_gcp/bigquerydatapolicy/_inputs.py +21 -4
  11. pulumi_gcp/bigquerydatapolicy/data_policy.py +78 -0
  12. pulumi_gcp/bigquerydatapolicy/outputs.py +16 -3
  13. pulumi_gcp/certificateauthority/_inputs.py +92 -12
  14. pulumi_gcp/certificateauthority/authority.py +110 -0
  15. pulumi_gcp/certificateauthority/certificate.py +176 -0
  16. pulumi_gcp/certificateauthority/outputs.py +144 -12
  17. pulumi_gcp/composer/__init__.py +1 -0
  18. pulumi_gcp/composer/user_workloads_secret.py +441 -0
  19. pulumi_gcp/compute/__init__.py +1 -0
  20. pulumi_gcp/compute/_inputs.py +121 -58
  21. pulumi_gcp/compute/global_forwarding_rule.py +0 -282
  22. pulumi_gcp/compute/outputs.py +120 -57
  23. pulumi_gcp/compute/region_target_https_proxy.py +257 -0
  24. pulumi_gcp/compute/region_url_map.py +0 -470
  25. pulumi_gcp/compute/security_policy_rule.py +850 -0
  26. pulumi_gcp/dataloss/__init__.py +1 -0
  27. pulumi_gcp/dataloss/_inputs.py +1040 -0
  28. pulumi_gcp/dataloss/outputs.py +1123 -0
  29. pulumi_gcp/dataloss/prevention_discovery_config.py +737 -0
  30. pulumi_gcp/dns/_inputs.py +2 -2
  31. pulumi_gcp/dns/outputs.py +2 -2
  32. pulumi_gcp/dns/record_set.py +2 -2
  33. pulumi_gcp/filestore/get_instance.py +11 -1
  34. pulumi_gcp/filestore/instance.py +101 -0
  35. pulumi_gcp/firebase/_inputs.py +16 -0
  36. pulumi_gcp/firebase/app_check_play_integrity_config.py +20 -0
  37. pulumi_gcp/firebase/app_check_recaptcha_enterprise_config.py +10 -0
  38. pulumi_gcp/firebase/hosting_version.py +44 -0
  39. pulumi_gcp/firebase/outputs.py +12 -0
  40. pulumi_gcp/logging/folder_sink.py +54 -0
  41. pulumi_gcp/logging/organization_sink.py +54 -0
  42. pulumi_gcp/monitoring/_inputs.py +46 -2
  43. pulumi_gcp/monitoring/outputs.py +40 -2
  44. pulumi_gcp/monitoring/uptime_check_config.py +6 -0
  45. pulumi_gcp/networkconnectivity/__init__.py +1 -0
  46. pulumi_gcp/networkconnectivity/internal_range.py +1024 -0
  47. pulumi_gcp/secretmanager/get_secret.py +13 -3
  48. pulumi_gcp/secretmanager/outputs.py +20 -1
  49. pulumi_gcp/secretmanager/secret.py +90 -3
  50. pulumi_gcp/storage/__init__.py +1 -0
  51. pulumi_gcp/storage/get_bucket_objects.py +153 -0
  52. pulumi_gcp/storage/outputs.py +63 -0
  53. {pulumi_gcp-7.21.0a1714565535.dist-info → pulumi_gcp-7.21.0a1714596856.dist-info}/METADATA +1 -1
  54. {pulumi_gcp-7.21.0a1714565535.dist-info → pulumi_gcp-7.21.0a1714596856.dist-info}/RECORD +56 -50
  55. {pulumi_gcp-7.21.0a1714565535.dist-info → pulumi_gcp-7.21.0a1714596856.dist-info}/WHEEL +0 -0
  56. {pulumi_gcp-7.21.0a1714565535.dist-info → pulumi_gcp-7.21.0a1714596856.dist-info}/top_level.txt +0 -0
@@ -968,6 +968,94 @@ class Certificate(pulumi.CustomResource):
968
968
  ),
969
969
  ))
970
970
  ```
971
+ ### Privateca Certificate Custom Ski
972
+
973
+ ```python
974
+ import pulumi
975
+ import pulumi_gcp as gcp
976
+ import pulumi_std as std
977
+
978
+ default = gcp.certificateauthority.CaPool("default",
979
+ location="us-central1",
980
+ name="my-pool",
981
+ tier="ENTERPRISE")
982
+ default_authority = gcp.certificateauthority.Authority("default",
983
+ location="us-central1",
984
+ pool=default.name,
985
+ certificate_authority_id="my-authority",
986
+ config=gcp.certificateauthority.AuthorityConfigArgs(
987
+ subject_config=gcp.certificateauthority.AuthorityConfigSubjectConfigArgs(
988
+ subject=gcp.certificateauthority.AuthorityConfigSubjectConfigSubjectArgs(
989
+ organization="HashiCorp",
990
+ common_name="my-certificate-authority",
991
+ ),
992
+ subject_alt_name=gcp.certificateauthority.AuthorityConfigSubjectConfigSubjectAltNameArgs(
993
+ dns_names=["hashicorp.com"],
994
+ ),
995
+ ),
996
+ x509_config=gcp.certificateauthority.AuthorityConfigX509ConfigArgs(
997
+ ca_options=gcp.certificateauthority.AuthorityConfigX509ConfigCaOptionsArgs(
998
+ is_ca=True,
999
+ ),
1000
+ key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageArgs(
1001
+ base_key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageBaseKeyUsageArgs(
1002
+ digital_signature=True,
1003
+ cert_sign=True,
1004
+ crl_sign=True,
1005
+ ),
1006
+ extended_key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageExtendedKeyUsageArgs(
1007
+ server_auth=True,
1008
+ ),
1009
+ ),
1010
+ ),
1011
+ ),
1012
+ lifetime="86400s",
1013
+ key_spec=gcp.certificateauthority.AuthorityKeySpecArgs(
1014
+ algorithm="RSA_PKCS1_4096_SHA256",
1015
+ ),
1016
+ deletion_protection=False,
1017
+ skip_grace_period=True,
1018
+ ignore_active_certificates_on_deletion=True)
1019
+ default_certificate = gcp.certificateauthority.Certificate("default",
1020
+ location="us-central1",
1021
+ pool=default.name,
1022
+ name="my-certificate",
1023
+ lifetime="860s",
1024
+ config=gcp.certificateauthority.CertificateConfigArgs(
1025
+ subject_config=gcp.certificateauthority.CertificateConfigSubjectConfigArgs(
1026
+ subject=gcp.certificateauthority.CertificateConfigSubjectConfigSubjectArgs(
1027
+ common_name="san1.example.com",
1028
+ country_code="us",
1029
+ organization="google",
1030
+ organizational_unit="enterprise",
1031
+ locality="mountain view",
1032
+ province="california",
1033
+ street_address="1600 amphitheatre parkway",
1034
+ postal_code="94109",
1035
+ ),
1036
+ ),
1037
+ subject_key_id=gcp.certificateauthority.CertificateConfigSubjectKeyIdArgs(
1038
+ key_id="4cf3372289b1d411b999dbb9ebcd44744b6b2fca",
1039
+ ),
1040
+ x509_config=gcp.certificateauthority.CertificateConfigX509ConfigArgs(
1041
+ ca_options=gcp.certificateauthority.CertificateConfigX509ConfigCaOptionsArgs(
1042
+ is_ca=False,
1043
+ ),
1044
+ key_usage=gcp.certificateauthority.CertificateConfigX509ConfigKeyUsageArgs(
1045
+ base_key_usage=gcp.certificateauthority.CertificateConfigX509ConfigKeyUsageBaseKeyUsageArgs(
1046
+ crl_sign=True,
1047
+ ),
1048
+ extended_key_usage=gcp.certificateauthority.CertificateConfigX509ConfigKeyUsageExtendedKeyUsageArgs(
1049
+ server_auth=True,
1050
+ ),
1051
+ ),
1052
+ ),
1053
+ public_key=gcp.certificateauthority.CertificateConfigPublicKeyArgs(
1054
+ format="PEM",
1055
+ key=std.filebase64(input="test-fixtures/rsa_public.pem").result,
1056
+ ),
1057
+ ))
1058
+ ```
971
1059
 
972
1060
  ## Import
973
1061
 
@@ -1407,6 +1495,94 @@ class Certificate(pulumi.CustomResource):
1407
1495
  ),
1408
1496
  ))
1409
1497
  ```
1498
+ ### Privateca Certificate Custom Ski
1499
+
1500
+ ```python
1501
+ import pulumi
1502
+ import pulumi_gcp as gcp
1503
+ import pulumi_std as std
1504
+
1505
+ default = gcp.certificateauthority.CaPool("default",
1506
+ location="us-central1",
1507
+ name="my-pool",
1508
+ tier="ENTERPRISE")
1509
+ default_authority = gcp.certificateauthority.Authority("default",
1510
+ location="us-central1",
1511
+ pool=default.name,
1512
+ certificate_authority_id="my-authority",
1513
+ config=gcp.certificateauthority.AuthorityConfigArgs(
1514
+ subject_config=gcp.certificateauthority.AuthorityConfigSubjectConfigArgs(
1515
+ subject=gcp.certificateauthority.AuthorityConfigSubjectConfigSubjectArgs(
1516
+ organization="HashiCorp",
1517
+ common_name="my-certificate-authority",
1518
+ ),
1519
+ subject_alt_name=gcp.certificateauthority.AuthorityConfigSubjectConfigSubjectAltNameArgs(
1520
+ dns_names=["hashicorp.com"],
1521
+ ),
1522
+ ),
1523
+ x509_config=gcp.certificateauthority.AuthorityConfigX509ConfigArgs(
1524
+ ca_options=gcp.certificateauthority.AuthorityConfigX509ConfigCaOptionsArgs(
1525
+ is_ca=True,
1526
+ ),
1527
+ key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageArgs(
1528
+ base_key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageBaseKeyUsageArgs(
1529
+ digital_signature=True,
1530
+ cert_sign=True,
1531
+ crl_sign=True,
1532
+ ),
1533
+ extended_key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageExtendedKeyUsageArgs(
1534
+ server_auth=True,
1535
+ ),
1536
+ ),
1537
+ ),
1538
+ ),
1539
+ lifetime="86400s",
1540
+ key_spec=gcp.certificateauthority.AuthorityKeySpecArgs(
1541
+ algorithm="RSA_PKCS1_4096_SHA256",
1542
+ ),
1543
+ deletion_protection=False,
1544
+ skip_grace_period=True,
1545
+ ignore_active_certificates_on_deletion=True)
1546
+ default_certificate = gcp.certificateauthority.Certificate("default",
1547
+ location="us-central1",
1548
+ pool=default.name,
1549
+ name="my-certificate",
1550
+ lifetime="860s",
1551
+ config=gcp.certificateauthority.CertificateConfigArgs(
1552
+ subject_config=gcp.certificateauthority.CertificateConfigSubjectConfigArgs(
1553
+ subject=gcp.certificateauthority.CertificateConfigSubjectConfigSubjectArgs(
1554
+ common_name="san1.example.com",
1555
+ country_code="us",
1556
+ organization="google",
1557
+ organizational_unit="enterprise",
1558
+ locality="mountain view",
1559
+ province="california",
1560
+ street_address="1600 amphitheatre parkway",
1561
+ postal_code="94109",
1562
+ ),
1563
+ ),
1564
+ subject_key_id=gcp.certificateauthority.CertificateConfigSubjectKeyIdArgs(
1565
+ key_id="4cf3372289b1d411b999dbb9ebcd44744b6b2fca",
1566
+ ),
1567
+ x509_config=gcp.certificateauthority.CertificateConfigX509ConfigArgs(
1568
+ ca_options=gcp.certificateauthority.CertificateConfigX509ConfigCaOptionsArgs(
1569
+ is_ca=False,
1570
+ ),
1571
+ key_usage=gcp.certificateauthority.CertificateConfigX509ConfigKeyUsageArgs(
1572
+ base_key_usage=gcp.certificateauthority.CertificateConfigX509ConfigKeyUsageBaseKeyUsageArgs(
1573
+ crl_sign=True,
1574
+ ),
1575
+ extended_key_usage=gcp.certificateauthority.CertificateConfigX509ConfigKeyUsageExtendedKeyUsageArgs(
1576
+ server_auth=True,
1577
+ ),
1578
+ ),
1579
+ ),
1580
+ public_key=gcp.certificateauthority.CertificateConfigPublicKeyArgs(
1581
+ format="PEM",
1582
+ key=std.filebase64(input="test-fixtures/rsa_public.pem").result,
1583
+ ),
1584
+ ))
1585
+ ```
1410
1586
 
1411
1587
  ## Import
1412
1588
 
@@ -16,6 +16,7 @@ __all__ = [
16
16
  'AuthorityConfigSubjectConfig',
17
17
  'AuthorityConfigSubjectConfigSubject',
18
18
  'AuthorityConfigSubjectConfigSubjectAltName',
19
+ 'AuthorityConfigSubjectKeyId',
19
20
  'AuthorityConfigX509Config',
20
21
  'AuthorityConfigX509ConfigAdditionalExtension',
21
22
  'AuthorityConfigX509ConfigAdditionalExtensionObjectId',
@@ -74,6 +75,7 @@ __all__ = [
74
75
  'CertificateConfigSubjectConfig',
75
76
  'CertificateConfigSubjectConfigSubject',
76
77
  'CertificateConfigSubjectConfigSubjectAltName',
78
+ 'CertificateConfigSubjectKeyId',
77
79
  'CertificateConfigX509Config',
78
80
  'CertificateConfigX509ConfigAdditionalExtension',
79
81
  'CertificateConfigX509ConfigAdditionalExtensionObjectId',
@@ -105,6 +107,7 @@ __all__ = [
105
107
  'GetAuthorityConfigSubjectConfigResult',
106
108
  'GetAuthorityConfigSubjectConfigSubjectResult',
107
109
  'GetAuthorityConfigSubjectConfigSubjectAltNameResult',
110
+ 'GetAuthorityConfigSubjectKeyIdResult',
108
111
  'GetAuthorityConfigX509ConfigResult',
109
112
  'GetAuthorityConfigX509ConfigAdditionalExtensionResult',
110
113
  'GetAuthorityConfigX509ConfigAdditionalExtensionObjectIdResult',
@@ -187,6 +190,8 @@ class AuthorityConfig(dict):
187
190
  suggest = "subject_config"
188
191
  elif key == "x509Config":
189
192
  suggest = "x509_config"
193
+ elif key == "subjectKeyId":
194
+ suggest = "subject_key_id"
190
195
 
191
196
  if suggest:
192
197
  pulumi.log.warn(f"Key '{key}' not found in AuthorityConfig. Access the value via the '{suggest}' property getter instead.")
@@ -201,18 +206,20 @@ class AuthorityConfig(dict):
201
206
 
202
207
  def __init__(__self__, *,
203
208
  subject_config: 'outputs.AuthorityConfigSubjectConfig',
204
- x509_config: 'outputs.AuthorityConfigX509Config'):
209
+ x509_config: 'outputs.AuthorityConfigX509Config',
210
+ subject_key_id: Optional['outputs.AuthorityConfigSubjectKeyId'] = None):
205
211
  """
206
212
  :param 'AuthorityConfigSubjectConfigArgs' subject_config: Specifies some of the values in a certificate that are related to the subject.
207
213
  Structure is documented below.
208
-
209
-
210
- <a name="nested_x509_config"></a>The `x509_config` block supports:
211
214
  :param 'AuthorityConfigX509ConfigArgs' x509_config: Describes how some of the technical X.509 fields in a certificate should be populated.
212
215
  Structure is documented below.
216
+ :param 'AuthorityConfigSubjectKeyIdArgs' subject_key_id: When specified this provides a custom SKI to be used in the certificate. This should only be used to maintain a SKI of an existing CA originally created outside CA service, which was not generated using method (1) described in RFC 5280 section 4.2.1.2..
217
+ Structure is documented below.
213
218
  """
214
219
  pulumi.set(__self__, "subject_config", subject_config)
215
220
  pulumi.set(__self__, "x509_config", x509_config)
221
+ if subject_key_id is not None:
222
+ pulumi.set(__self__, "subject_key_id", subject_key_id)
216
223
 
217
224
  @property
218
225
  @pulumi.getter(name="subjectConfig")
@@ -220,9 +227,6 @@ class AuthorityConfig(dict):
220
227
  """
221
228
  Specifies some of the values in a certificate that are related to the subject.
222
229
  Structure is documented below.
223
-
224
-
225
- <a name="nested_x509_config"></a>The `x509_config` block supports:
226
230
  """
227
231
  return pulumi.get(self, "subject_config")
228
232
 
@@ -235,6 +239,15 @@ class AuthorityConfig(dict):
235
239
  """
236
240
  return pulumi.get(self, "x509_config")
237
241
 
242
+ @property
243
+ @pulumi.getter(name="subjectKeyId")
244
+ def subject_key_id(self) -> Optional['outputs.AuthorityConfigSubjectKeyId']:
245
+ """
246
+ When specified this provides a custom SKI to be used in the certificate. This should only be used to maintain a SKI of an existing CA originally created outside CA service, which was not generated using method (1) described in RFC 5280 section 4.2.1.2..
247
+ Structure is documented below.
248
+ """
249
+ return pulumi.get(self, "subject_key_id")
250
+
238
251
 
239
252
  @pulumi.output_type
240
253
  class AuthorityConfigSubjectConfig(dict):
@@ -489,6 +502,46 @@ class AuthorityConfigSubjectConfigSubjectAltName(dict):
489
502
  return pulumi.get(self, "uris")
490
503
 
491
504
 
505
+ @pulumi.output_type
506
+ class AuthorityConfigSubjectKeyId(dict):
507
+ @staticmethod
508
+ def __key_warning(key: str):
509
+ suggest = None
510
+ if key == "keyId":
511
+ suggest = "key_id"
512
+
513
+ if suggest:
514
+ pulumi.log.warn(f"Key '{key}' not found in AuthorityConfigSubjectKeyId. Access the value via the '{suggest}' property getter instead.")
515
+
516
+ def __getitem__(self, key: str) -> Any:
517
+ AuthorityConfigSubjectKeyId.__key_warning(key)
518
+ return super().__getitem__(key)
519
+
520
+ def get(self, key: str, default = None) -> Any:
521
+ AuthorityConfigSubjectKeyId.__key_warning(key)
522
+ return super().get(key, default)
523
+
524
+ def __init__(__self__, *,
525
+ key_id: Optional[str] = None):
526
+ """
527
+ :param str key_id: The value of the KeyId in lowercase hexidecimal.
528
+
529
+ <a name="nested_x509_config"></a>The `x509_config` block supports:
530
+ """
531
+ if key_id is not None:
532
+ pulumi.set(__self__, "key_id", key_id)
533
+
534
+ @property
535
+ @pulumi.getter(name="keyId")
536
+ def key_id(self) -> Optional[str]:
537
+ """
538
+ The value of the KeyId in lowercase hexidecimal.
539
+
540
+ <a name="nested_x509_config"></a>The `x509_config` block supports:
541
+ """
542
+ return pulumi.get(self, "key_id")
543
+
544
+
492
545
  @pulumi.output_type
493
546
  class AuthorityConfigX509Config(dict):
494
547
  @staticmethod
@@ -3720,8 +3773,7 @@ class CertificateCertificateDescriptionSubjectKeyId(dict):
3720
3773
  def __init__(__self__, *,
3721
3774
  key_id: Optional[str] = None):
3722
3775
  """
3723
- :param str key_id: (Output)
3724
- Optional. The value of this KeyId encoded in lowercase hexadecimal. This is most likely the 160 bit SHA-1 hash of the public key.
3776
+ :param str key_id: The value of the KeyId in lowercase hexidecimal.
3725
3777
  """
3726
3778
  if key_id is not None:
3727
3779
  pulumi.set(__self__, "key_id", key_id)
@@ -3730,8 +3782,7 @@ class CertificateCertificateDescriptionSubjectKeyId(dict):
3730
3782
  @pulumi.getter(name="keyId")
3731
3783
  def key_id(self) -> Optional[str]:
3732
3784
  """
3733
- (Output)
3734
- Optional. The value of this KeyId encoded in lowercase hexadecimal. This is most likely the 160 bit SHA-1 hash of the public key.
3785
+ The value of the KeyId in lowercase hexidecimal.
3735
3786
  """
3736
3787
  return pulumi.get(self, "key_id")
3737
3788
 
@@ -4619,6 +4670,8 @@ class CertificateConfig(dict):
4619
4670
  suggest = "subject_config"
4620
4671
  elif key == "x509Config":
4621
4672
  suggest = "x509_config"
4673
+ elif key == "subjectKeyId":
4674
+ suggest = "subject_key_id"
4622
4675
 
4623
4676
  if suggest:
4624
4677
  pulumi.log.warn(f"Key '{key}' not found in CertificateConfig. Access the value via the '{suggest}' property getter instead.")
@@ -4634,7 +4687,8 @@ class CertificateConfig(dict):
4634
4687
  def __init__(__self__, *,
4635
4688
  public_key: 'outputs.CertificateConfigPublicKey',
4636
4689
  subject_config: 'outputs.CertificateConfigSubjectConfig',
4637
- x509_config: 'outputs.CertificateConfigX509Config'):
4690
+ x509_config: 'outputs.CertificateConfigX509Config',
4691
+ subject_key_id: Optional['outputs.CertificateConfigSubjectKeyId'] = None):
4638
4692
  """
4639
4693
  :param 'CertificateConfigPublicKeyArgs' public_key: A PublicKey describes a public key.
4640
4694
  Structure is documented below.
@@ -4645,10 +4699,14 @@ class CertificateConfig(dict):
4645
4699
  Structure is documented below.
4646
4700
  :param 'CertificateConfigX509ConfigArgs' x509_config: Describes how some of the technical X.509 fields in a certificate should be populated.
4647
4701
  Structure is documented below.
4702
+ :param 'CertificateConfigSubjectKeyIdArgs' subject_key_id: When specified this provides a custom SKI to be used in the certificate. This should only be used to maintain a SKI of an existing CA originally created outside CA service, which was not generated using method (1) described in RFC 5280 section 4.2.1.2..
4703
+ Structure is documented below.
4648
4704
  """
4649
4705
  pulumi.set(__self__, "public_key", public_key)
4650
4706
  pulumi.set(__self__, "subject_config", subject_config)
4651
4707
  pulumi.set(__self__, "x509_config", x509_config)
4708
+ if subject_key_id is not None:
4709
+ pulumi.set(__self__, "subject_key_id", subject_key_id)
4652
4710
 
4653
4711
  @property
4654
4712
  @pulumi.getter(name="publicKey")
@@ -4680,6 +4738,15 @@ class CertificateConfig(dict):
4680
4738
  """
4681
4739
  return pulumi.get(self, "x509_config")
4682
4740
 
4741
+ @property
4742
+ @pulumi.getter(name="subjectKeyId")
4743
+ def subject_key_id(self) -> Optional['outputs.CertificateConfigSubjectKeyId']:
4744
+ """
4745
+ When specified this provides a custom SKI to be used in the certificate. This should only be used to maintain a SKI of an existing CA originally created outside CA service, which was not generated using method (1) described in RFC 5280 section 4.2.1.2..
4746
+ Structure is documented below.
4747
+ """
4748
+ return pulumi.get(self, "subject_key_id")
4749
+
4683
4750
 
4684
4751
  @pulumi.output_type
4685
4752
  class CertificateConfigPublicKey(dict):
@@ -4966,6 +5033,42 @@ class CertificateConfigSubjectConfigSubjectAltName(dict):
4966
5033
  return pulumi.get(self, "uris")
4967
5034
 
4968
5035
 
5036
+ @pulumi.output_type
5037
+ class CertificateConfigSubjectKeyId(dict):
5038
+ @staticmethod
5039
+ def __key_warning(key: str):
5040
+ suggest = None
5041
+ if key == "keyId":
5042
+ suggest = "key_id"
5043
+
5044
+ if suggest:
5045
+ pulumi.log.warn(f"Key '{key}' not found in CertificateConfigSubjectKeyId. Access the value via the '{suggest}' property getter instead.")
5046
+
5047
+ def __getitem__(self, key: str) -> Any:
5048
+ CertificateConfigSubjectKeyId.__key_warning(key)
5049
+ return super().__getitem__(key)
5050
+
5051
+ def get(self, key: str, default = None) -> Any:
5052
+ CertificateConfigSubjectKeyId.__key_warning(key)
5053
+ return super().get(key, default)
5054
+
5055
+ def __init__(__self__, *,
5056
+ key_id: Optional[str] = None):
5057
+ """
5058
+ :param str key_id: The value of the KeyId in lowercase hexidecimal.
5059
+ """
5060
+ if key_id is not None:
5061
+ pulumi.set(__self__, "key_id", key_id)
5062
+
5063
+ @property
5064
+ @pulumi.getter(name="keyId")
5065
+ def key_id(self) -> Optional[str]:
5066
+ """
5067
+ The value of the KeyId in lowercase hexidecimal.
5068
+ """
5069
+ return pulumi.get(self, "key_id")
5070
+
5071
+
4969
5072
  @pulumi.output_type
4970
5073
  class CertificateConfigX509Config(dict):
4971
5074
  @staticmethod
@@ -6856,12 +6959,15 @@ class GetAuthorityAccessUrlResult(dict):
6856
6959
  class GetAuthorityConfigResult(dict):
6857
6960
  def __init__(__self__, *,
6858
6961
  subject_configs: Sequence['outputs.GetAuthorityConfigSubjectConfigResult'],
6962
+ subject_key_ids: Sequence['outputs.GetAuthorityConfigSubjectKeyIdResult'],
6859
6963
  x509_configs: Sequence['outputs.GetAuthorityConfigX509ConfigResult']):
6860
6964
  """
6861
6965
  :param Sequence['GetAuthorityConfigSubjectConfigArgs'] subject_configs: Specifies some of the values in a certificate that are related to the subject.
6966
+ :param Sequence['GetAuthorityConfigSubjectKeyIdArgs'] subject_key_ids: When specified this provides a custom SKI to be used in the certificate. This should only be used to maintain a SKI of an existing CA originally created outside CA service, which was not generated using method (1) described in RFC 5280 section 4.2.1.2..
6862
6967
  :param Sequence['GetAuthorityConfigX509ConfigArgs'] x509_configs: Describes how some of the technical X.509 fields in a certificate should be populated.
6863
6968
  """
6864
6969
  pulumi.set(__self__, "subject_configs", subject_configs)
6970
+ pulumi.set(__self__, "subject_key_ids", subject_key_ids)
6865
6971
  pulumi.set(__self__, "x509_configs", x509_configs)
6866
6972
 
6867
6973
  @property
@@ -6872,6 +6978,14 @@ class GetAuthorityConfigResult(dict):
6872
6978
  """
6873
6979
  return pulumi.get(self, "subject_configs")
6874
6980
 
6981
+ @property
6982
+ @pulumi.getter(name="subjectKeyIds")
6983
+ def subject_key_ids(self) -> Sequence['outputs.GetAuthorityConfigSubjectKeyIdResult']:
6984
+ """
6985
+ When specified this provides a custom SKI to be used in the certificate. This should only be used to maintain a SKI of an existing CA originally created outside CA service, which was not generated using method (1) described in RFC 5280 section 4.2.1.2..
6986
+ """
6987
+ return pulumi.get(self, "subject_key_ids")
6988
+
6875
6989
  @property
6876
6990
  @pulumi.getter(name="x509Configs")
6877
6991
  def x509_configs(self) -> Sequence['outputs.GetAuthorityConfigX509ConfigResult']:
@@ -7056,6 +7170,24 @@ class GetAuthorityConfigSubjectConfigSubjectAltNameResult(dict):
7056
7170
  return pulumi.get(self, "uris")
7057
7171
 
7058
7172
 
7173
+ @pulumi.output_type
7174
+ class GetAuthorityConfigSubjectKeyIdResult(dict):
7175
+ def __init__(__self__, *,
7176
+ key_id: str):
7177
+ """
7178
+ :param str key_id: The value of the KeyId in lowercase hexidecimal.
7179
+ """
7180
+ pulumi.set(__self__, "key_id", key_id)
7181
+
7182
+ @property
7183
+ @pulumi.getter(name="keyId")
7184
+ def key_id(self) -> str:
7185
+ """
7186
+ The value of the KeyId in lowercase hexidecimal.
7187
+ """
7188
+ return pulumi.get(self, "key_id")
7189
+
7190
+
7059
7191
  @pulumi.output_type
7060
7192
  class GetAuthorityConfigX509ConfigResult(dict):
7061
7193
  def __init__(__self__, *,
@@ -8,5 +8,6 @@ import typing
8
8
  from .environment import *
9
9
  from .get_environment import *
10
10
  from .get_image_versions import *
11
+ from .user_workloads_secret import *
11
12
  from ._inputs import *
12
13
  from . import outputs