pulumi-gcp 7.21.0a1714565535__py3-none-any.whl → 7.21.0a1714596856__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +40 -0
- pulumi_gcp/alloydb/_inputs.py +74 -0
- pulumi_gcp/alloydb/instance.py +90 -0
- pulumi_gcp/alloydb/outputs.py +98 -0
- pulumi_gcp/apigee/environment.py +47 -0
- pulumi_gcp/applicationintegration/__init__.py +1 -0
- pulumi_gcp/applicationintegration/_inputs.py +843 -0
- pulumi_gcp/applicationintegration/auth_config.py +998 -0
- pulumi_gcp/applicationintegration/outputs.py +891 -0
- pulumi_gcp/bigquerydatapolicy/_inputs.py +21 -4
- pulumi_gcp/bigquerydatapolicy/data_policy.py +78 -0
- pulumi_gcp/bigquerydatapolicy/outputs.py +16 -3
- pulumi_gcp/certificateauthority/_inputs.py +92 -12
- pulumi_gcp/certificateauthority/authority.py +110 -0
- pulumi_gcp/certificateauthority/certificate.py +176 -0
- pulumi_gcp/certificateauthority/outputs.py +144 -12
- pulumi_gcp/composer/__init__.py +1 -0
- pulumi_gcp/composer/user_workloads_secret.py +441 -0
- pulumi_gcp/compute/__init__.py +1 -0
- pulumi_gcp/compute/_inputs.py +121 -58
- pulumi_gcp/compute/global_forwarding_rule.py +0 -282
- pulumi_gcp/compute/outputs.py +120 -57
- pulumi_gcp/compute/region_target_https_proxy.py +257 -0
- pulumi_gcp/compute/region_url_map.py +0 -470
- pulumi_gcp/compute/security_policy_rule.py +850 -0
- pulumi_gcp/dataloss/__init__.py +1 -0
- pulumi_gcp/dataloss/_inputs.py +1040 -0
- pulumi_gcp/dataloss/outputs.py +1123 -0
- pulumi_gcp/dataloss/prevention_discovery_config.py +737 -0
- pulumi_gcp/dns/_inputs.py +2 -2
- pulumi_gcp/dns/outputs.py +2 -2
- pulumi_gcp/dns/record_set.py +2 -2
- pulumi_gcp/filestore/get_instance.py +11 -1
- pulumi_gcp/filestore/instance.py +101 -0
- pulumi_gcp/firebase/_inputs.py +16 -0
- pulumi_gcp/firebase/app_check_play_integrity_config.py +20 -0
- pulumi_gcp/firebase/app_check_recaptcha_enterprise_config.py +10 -0
- pulumi_gcp/firebase/hosting_version.py +44 -0
- pulumi_gcp/firebase/outputs.py +12 -0
- pulumi_gcp/logging/folder_sink.py +54 -0
- pulumi_gcp/logging/organization_sink.py +54 -0
- pulumi_gcp/monitoring/_inputs.py +46 -2
- pulumi_gcp/monitoring/outputs.py +40 -2
- pulumi_gcp/monitoring/uptime_check_config.py +6 -0
- pulumi_gcp/networkconnectivity/__init__.py +1 -0
- pulumi_gcp/networkconnectivity/internal_range.py +1024 -0
- pulumi_gcp/secretmanager/get_secret.py +13 -3
- pulumi_gcp/secretmanager/outputs.py +20 -1
- pulumi_gcp/secretmanager/secret.py +90 -3
- pulumi_gcp/storage/__init__.py +1 -0
- pulumi_gcp/storage/get_bucket_objects.py +153 -0
- pulumi_gcp/storage/outputs.py +63 -0
- {pulumi_gcp-7.21.0a1714565535.dist-info → pulumi_gcp-7.21.0a1714596856.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.21.0a1714565535.dist-info → pulumi_gcp-7.21.0a1714596856.dist-info}/RECORD +56 -50
- {pulumi_gcp-7.21.0a1714565535.dist-info → pulumi_gcp-7.21.0a1714596856.dist-info}/WHEEL +0 -0
- {pulumi_gcp-7.21.0a1714565535.dist-info → pulumi_gcp-7.21.0a1714596856.dist-info}/top_level.txt +0 -0
@@ -1186,147 +1186,6 @@ class GlobalForwardingRule(pulumi.CustomResource):
|
|
1186
1186
|
|
1187
1187
|
## Example Usage
|
1188
1188
|
|
1189
|
-
### External Ssl Proxy Lb Mig Backend
|
1190
|
-
|
1191
|
-
```python
|
1192
|
-
import pulumi
|
1193
|
-
import pulumi_gcp as gcp
|
1194
|
-
import pulumi_tls as tls
|
1195
|
-
|
1196
|
-
# External SSL proxy load balancer with managed instance group backend
|
1197
|
-
# VPC
|
1198
|
-
default = gcp.compute.Network("default",
|
1199
|
-
name="ssl-proxy-xlb-network",
|
1200
|
-
auto_create_subnetworks=False)
|
1201
|
-
# backend subnet
|
1202
|
-
default_subnetwork = gcp.compute.Subnetwork("default",
|
1203
|
-
name="ssl-proxy-xlb-subnet",
|
1204
|
-
ip_cidr_range="10.0.1.0/24",
|
1205
|
-
region="us-central1",
|
1206
|
-
network=default.id)
|
1207
|
-
# reserved IP address
|
1208
|
-
default_global_address = gcp.compute.GlobalAddress("default", name="ssl-proxy-xlb-ip")
|
1209
|
-
# Self-signed regional SSL certificate for testing
|
1210
|
-
default_private_key = tls.PrivateKey("default",
|
1211
|
-
algorithm="RSA",
|
1212
|
-
rsa_bits=2048)
|
1213
|
-
default_self_signed_cert = tls.SelfSignedCert("default",
|
1214
|
-
key_algorithm=default_private_key.algorithm,
|
1215
|
-
private_key_pem=default_private_key.private_key_pem,
|
1216
|
-
validity_period_hours=12,
|
1217
|
-
early_renewal_hours=3,
|
1218
|
-
allowed_uses=[
|
1219
|
-
"key_encipherment",
|
1220
|
-
"digital_signature",
|
1221
|
-
"server_auth",
|
1222
|
-
],
|
1223
|
-
dns_names=["example.com"],
|
1224
|
-
subject=tls.SelfSignedCertSubjectArgs(
|
1225
|
-
common_name="example.com",
|
1226
|
-
organization="ACME Examples, Inc",
|
1227
|
-
))
|
1228
|
-
default_ssl_certificate = gcp.compute.SSLCertificate("default",
|
1229
|
-
name="default-cert",
|
1230
|
-
private_key=default_private_key.private_key_pem,
|
1231
|
-
certificate=default_self_signed_cert.cert_pem)
|
1232
|
-
default_health_check = gcp.compute.HealthCheck("default",
|
1233
|
-
name="ssl-proxy-health-check",
|
1234
|
-
timeout_sec=1,
|
1235
|
-
check_interval_sec=1,
|
1236
|
-
tcp_health_check=gcp.compute.HealthCheckTcpHealthCheckArgs(
|
1237
|
-
port=443,
|
1238
|
-
))
|
1239
|
-
# instance template
|
1240
|
-
default_instance_template = gcp.compute.InstanceTemplate("default",
|
1241
|
-
network_interfaces=[gcp.compute.InstanceTemplateNetworkInterfaceArgs(
|
1242
|
-
access_configs=[gcp.compute.InstanceTemplateNetworkInterfaceAccessConfigArgs()],
|
1243
|
-
network=default.id,
|
1244
|
-
subnetwork=default_subnetwork.id,
|
1245
|
-
)],
|
1246
|
-
name="ssl-proxy-xlb-mig-template",
|
1247
|
-
machine_type="e2-small",
|
1248
|
-
tags=["allow-health-check"],
|
1249
|
-
disks=[gcp.compute.InstanceTemplateDiskArgs(
|
1250
|
-
source_image="debian-cloud/debian-10",
|
1251
|
-
auto_delete=True,
|
1252
|
-
boot=True,
|
1253
|
-
)],
|
1254
|
-
metadata={
|
1255
|
-
"startup-script": \"\"\"#! /bin/bash
|
1256
|
-
set -euo pipefail
|
1257
|
-
export DEBIAN_FRONTEND=noninteractive
|
1258
|
-
sudo apt-get update
|
1259
|
-
sudo apt-get install -y apache2 jq
|
1260
|
-
sudo a2ensite default-ssl
|
1261
|
-
sudo a2enmod ssl
|
1262
|
-
sudo service apache2 restart
|
1263
|
-
NAME=$(curl -H "Metadata-Flavor: Google" "http://metadata.google.internal/computeMetadata/v1/instance/hostname")
|
1264
|
-
IP=$(curl -H "Metadata-Flavor: Google" "http://metadata.google.internal/computeMetadata/v1/instance/network-interfaces/0/ip")
|
1265
|
-
METADATA=$(curl -f -H "Metadata-Flavor: Google" "http://metadata.google.internal/computeMetadata/v1/instance/attributes/?recursive=True" | jq 'del(.["startup-script"])')
|
1266
|
-
cat <<EOF > /var/www/html/index.html
|
1267
|
-
<h1>SSL Load Balancer</h1>
|
1268
|
-
<pre>
|
1269
|
-
Name: $NAME
|
1270
|
-
IP: $IP
|
1271
|
-
Metadata: $METADATA
|
1272
|
-
</pre>
|
1273
|
-
EOF
|
1274
|
-
\"\"\",
|
1275
|
-
})
|
1276
|
-
# MIG
|
1277
|
-
default_instance_group_manager = gcp.compute.InstanceGroupManager("default",
|
1278
|
-
name="ssl-proxy-xlb-mig1",
|
1279
|
-
zone="us-central1-c",
|
1280
|
-
named_ports=[gcp.compute.InstanceGroupManagerNamedPortArgs(
|
1281
|
-
name="tcp",
|
1282
|
-
port=443,
|
1283
|
-
)],
|
1284
|
-
versions=[gcp.compute.InstanceGroupManagerVersionArgs(
|
1285
|
-
instance_template=default_instance_template.id,
|
1286
|
-
name="primary",
|
1287
|
-
)],
|
1288
|
-
base_instance_name="vm",
|
1289
|
-
target_size=2)
|
1290
|
-
# backend service
|
1291
|
-
default_backend_service = gcp.compute.BackendService("default",
|
1292
|
-
name="ssl-proxy-xlb-backend-service",
|
1293
|
-
protocol="SSL",
|
1294
|
-
port_name="tcp",
|
1295
|
-
load_balancing_scheme="EXTERNAL",
|
1296
|
-
timeout_sec=10,
|
1297
|
-
health_checks=default_health_check.id,
|
1298
|
-
backends=[gcp.compute.BackendServiceBackendArgs(
|
1299
|
-
group=default_instance_group_manager.instance_group,
|
1300
|
-
balancing_mode="UTILIZATION",
|
1301
|
-
max_utilization=1,
|
1302
|
-
capacity_scaler=1,
|
1303
|
-
)])
|
1304
|
-
default_target_ssl_proxy = gcp.compute.TargetSSLProxy("default",
|
1305
|
-
name="test-proxy",
|
1306
|
-
backend_service=default_backend_service.id,
|
1307
|
-
ssl_certificates=[default_ssl_certificate.id])
|
1308
|
-
# forwarding rule
|
1309
|
-
default_global_forwarding_rule = gcp.compute.GlobalForwardingRule("default",
|
1310
|
-
name="ssl-proxy-xlb-forwarding-rule",
|
1311
|
-
ip_protocol="TCP",
|
1312
|
-
load_balancing_scheme="EXTERNAL",
|
1313
|
-
port_range="443",
|
1314
|
-
target=default_target_ssl_proxy.id,
|
1315
|
-
ip_address=default_global_address.id)
|
1316
|
-
# allow access from health check ranges
|
1317
|
-
default_firewall = gcp.compute.Firewall("default",
|
1318
|
-
name="ssl-proxy-xlb-fw-allow-hc",
|
1319
|
-
direction="INGRESS",
|
1320
|
-
network=default.id,
|
1321
|
-
source_ranges=[
|
1322
|
-
"130.211.0.0/22",
|
1323
|
-
"35.191.0.0/16",
|
1324
|
-
],
|
1325
|
-
allows=[gcp.compute.FirewallAllowArgs(
|
1326
|
-
protocol="tcp",
|
1327
|
-
)],
|
1328
|
-
target_tags=["allow-health-check"])
|
1329
|
-
```
|
1330
1189
|
### External Tcp Proxy Lb Mig Backend
|
1331
1190
|
|
1332
1191
|
```python
|
@@ -2226,147 +2085,6 @@ class GlobalForwardingRule(pulumi.CustomResource):
|
|
2226
2085
|
|
2227
2086
|
## Example Usage
|
2228
2087
|
|
2229
|
-
### External Ssl Proxy Lb Mig Backend
|
2230
|
-
|
2231
|
-
```python
|
2232
|
-
import pulumi
|
2233
|
-
import pulumi_gcp as gcp
|
2234
|
-
import pulumi_tls as tls
|
2235
|
-
|
2236
|
-
# External SSL proxy load balancer with managed instance group backend
|
2237
|
-
# VPC
|
2238
|
-
default = gcp.compute.Network("default",
|
2239
|
-
name="ssl-proxy-xlb-network",
|
2240
|
-
auto_create_subnetworks=False)
|
2241
|
-
# backend subnet
|
2242
|
-
default_subnetwork = gcp.compute.Subnetwork("default",
|
2243
|
-
name="ssl-proxy-xlb-subnet",
|
2244
|
-
ip_cidr_range="10.0.1.0/24",
|
2245
|
-
region="us-central1",
|
2246
|
-
network=default.id)
|
2247
|
-
# reserved IP address
|
2248
|
-
default_global_address = gcp.compute.GlobalAddress("default", name="ssl-proxy-xlb-ip")
|
2249
|
-
# Self-signed regional SSL certificate for testing
|
2250
|
-
default_private_key = tls.PrivateKey("default",
|
2251
|
-
algorithm="RSA",
|
2252
|
-
rsa_bits=2048)
|
2253
|
-
default_self_signed_cert = tls.SelfSignedCert("default",
|
2254
|
-
key_algorithm=default_private_key.algorithm,
|
2255
|
-
private_key_pem=default_private_key.private_key_pem,
|
2256
|
-
validity_period_hours=12,
|
2257
|
-
early_renewal_hours=3,
|
2258
|
-
allowed_uses=[
|
2259
|
-
"key_encipherment",
|
2260
|
-
"digital_signature",
|
2261
|
-
"server_auth",
|
2262
|
-
],
|
2263
|
-
dns_names=["example.com"],
|
2264
|
-
subject=tls.SelfSignedCertSubjectArgs(
|
2265
|
-
common_name="example.com",
|
2266
|
-
organization="ACME Examples, Inc",
|
2267
|
-
))
|
2268
|
-
default_ssl_certificate = gcp.compute.SSLCertificate("default",
|
2269
|
-
name="default-cert",
|
2270
|
-
private_key=default_private_key.private_key_pem,
|
2271
|
-
certificate=default_self_signed_cert.cert_pem)
|
2272
|
-
default_health_check = gcp.compute.HealthCheck("default",
|
2273
|
-
name="ssl-proxy-health-check",
|
2274
|
-
timeout_sec=1,
|
2275
|
-
check_interval_sec=1,
|
2276
|
-
tcp_health_check=gcp.compute.HealthCheckTcpHealthCheckArgs(
|
2277
|
-
port=443,
|
2278
|
-
))
|
2279
|
-
# instance template
|
2280
|
-
default_instance_template = gcp.compute.InstanceTemplate("default",
|
2281
|
-
network_interfaces=[gcp.compute.InstanceTemplateNetworkInterfaceArgs(
|
2282
|
-
access_configs=[gcp.compute.InstanceTemplateNetworkInterfaceAccessConfigArgs()],
|
2283
|
-
network=default.id,
|
2284
|
-
subnetwork=default_subnetwork.id,
|
2285
|
-
)],
|
2286
|
-
name="ssl-proxy-xlb-mig-template",
|
2287
|
-
machine_type="e2-small",
|
2288
|
-
tags=["allow-health-check"],
|
2289
|
-
disks=[gcp.compute.InstanceTemplateDiskArgs(
|
2290
|
-
source_image="debian-cloud/debian-10",
|
2291
|
-
auto_delete=True,
|
2292
|
-
boot=True,
|
2293
|
-
)],
|
2294
|
-
metadata={
|
2295
|
-
"startup-script": \"\"\"#! /bin/bash
|
2296
|
-
set -euo pipefail
|
2297
|
-
export DEBIAN_FRONTEND=noninteractive
|
2298
|
-
sudo apt-get update
|
2299
|
-
sudo apt-get install -y apache2 jq
|
2300
|
-
sudo a2ensite default-ssl
|
2301
|
-
sudo a2enmod ssl
|
2302
|
-
sudo service apache2 restart
|
2303
|
-
NAME=$(curl -H "Metadata-Flavor: Google" "http://metadata.google.internal/computeMetadata/v1/instance/hostname")
|
2304
|
-
IP=$(curl -H "Metadata-Flavor: Google" "http://metadata.google.internal/computeMetadata/v1/instance/network-interfaces/0/ip")
|
2305
|
-
METADATA=$(curl -f -H "Metadata-Flavor: Google" "http://metadata.google.internal/computeMetadata/v1/instance/attributes/?recursive=True" | jq 'del(.["startup-script"])')
|
2306
|
-
cat <<EOF > /var/www/html/index.html
|
2307
|
-
<h1>SSL Load Balancer</h1>
|
2308
|
-
<pre>
|
2309
|
-
Name: $NAME
|
2310
|
-
IP: $IP
|
2311
|
-
Metadata: $METADATA
|
2312
|
-
</pre>
|
2313
|
-
EOF
|
2314
|
-
\"\"\",
|
2315
|
-
})
|
2316
|
-
# MIG
|
2317
|
-
default_instance_group_manager = gcp.compute.InstanceGroupManager("default",
|
2318
|
-
name="ssl-proxy-xlb-mig1",
|
2319
|
-
zone="us-central1-c",
|
2320
|
-
named_ports=[gcp.compute.InstanceGroupManagerNamedPortArgs(
|
2321
|
-
name="tcp",
|
2322
|
-
port=443,
|
2323
|
-
)],
|
2324
|
-
versions=[gcp.compute.InstanceGroupManagerVersionArgs(
|
2325
|
-
instance_template=default_instance_template.id,
|
2326
|
-
name="primary",
|
2327
|
-
)],
|
2328
|
-
base_instance_name="vm",
|
2329
|
-
target_size=2)
|
2330
|
-
# backend service
|
2331
|
-
default_backend_service = gcp.compute.BackendService("default",
|
2332
|
-
name="ssl-proxy-xlb-backend-service",
|
2333
|
-
protocol="SSL",
|
2334
|
-
port_name="tcp",
|
2335
|
-
load_balancing_scheme="EXTERNAL",
|
2336
|
-
timeout_sec=10,
|
2337
|
-
health_checks=default_health_check.id,
|
2338
|
-
backends=[gcp.compute.BackendServiceBackendArgs(
|
2339
|
-
group=default_instance_group_manager.instance_group,
|
2340
|
-
balancing_mode="UTILIZATION",
|
2341
|
-
max_utilization=1,
|
2342
|
-
capacity_scaler=1,
|
2343
|
-
)])
|
2344
|
-
default_target_ssl_proxy = gcp.compute.TargetSSLProxy("default",
|
2345
|
-
name="test-proxy",
|
2346
|
-
backend_service=default_backend_service.id,
|
2347
|
-
ssl_certificates=[default_ssl_certificate.id])
|
2348
|
-
# forwarding rule
|
2349
|
-
default_global_forwarding_rule = gcp.compute.GlobalForwardingRule("default",
|
2350
|
-
name="ssl-proxy-xlb-forwarding-rule",
|
2351
|
-
ip_protocol="TCP",
|
2352
|
-
load_balancing_scheme="EXTERNAL",
|
2353
|
-
port_range="443",
|
2354
|
-
target=default_target_ssl_proxy.id,
|
2355
|
-
ip_address=default_global_address.id)
|
2356
|
-
# allow access from health check ranges
|
2357
|
-
default_firewall = gcp.compute.Firewall("default",
|
2358
|
-
name="ssl-proxy-xlb-fw-allow-hc",
|
2359
|
-
direction="INGRESS",
|
2360
|
-
network=default.id,
|
2361
|
-
source_ranges=[
|
2362
|
-
"130.211.0.0/22",
|
2363
|
-
"35.191.0.0/16",
|
2364
|
-
],
|
2365
|
-
allows=[gcp.compute.FirewallAllowArgs(
|
2366
|
-
protocol="tcp",
|
2367
|
-
)],
|
2368
|
-
target_tags=["allow-health-check"])
|
2369
|
-
```
|
2370
2088
|
### External Tcp Proxy Lb Mig Backend
|
2371
2089
|
|
2372
2090
|
```python
|