pulumi-gcp 7.21.0a1714565535__py3-none-any.whl → 7.21.0a1714768411__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (56) hide show
  1. pulumi_gcp/__init__.py +40 -0
  2. pulumi_gcp/alloydb/_inputs.py +74 -0
  3. pulumi_gcp/alloydb/instance.py +90 -0
  4. pulumi_gcp/alloydb/outputs.py +98 -0
  5. pulumi_gcp/apigee/environment.py +47 -0
  6. pulumi_gcp/applicationintegration/__init__.py +1 -0
  7. pulumi_gcp/applicationintegration/_inputs.py +843 -0
  8. pulumi_gcp/applicationintegration/auth_config.py +998 -0
  9. pulumi_gcp/applicationintegration/outputs.py +891 -0
  10. pulumi_gcp/bigquerydatapolicy/_inputs.py +21 -4
  11. pulumi_gcp/bigquerydatapolicy/data_policy.py +78 -0
  12. pulumi_gcp/bigquerydatapolicy/outputs.py +16 -3
  13. pulumi_gcp/certificateauthority/_inputs.py +92 -12
  14. pulumi_gcp/certificateauthority/authority.py +110 -0
  15. pulumi_gcp/certificateauthority/certificate.py +176 -0
  16. pulumi_gcp/certificateauthority/outputs.py +144 -12
  17. pulumi_gcp/composer/__init__.py +1 -0
  18. pulumi_gcp/composer/user_workloads_secret.py +441 -0
  19. pulumi_gcp/compute/__init__.py +1 -0
  20. pulumi_gcp/compute/_inputs.py +121 -58
  21. pulumi_gcp/compute/global_forwarding_rule.py +0 -282
  22. pulumi_gcp/compute/outputs.py +120 -57
  23. pulumi_gcp/compute/region_target_https_proxy.py +257 -0
  24. pulumi_gcp/compute/region_url_map.py +0 -470
  25. pulumi_gcp/compute/security_policy_rule.py +850 -0
  26. pulumi_gcp/dataloss/__init__.py +1 -0
  27. pulumi_gcp/dataloss/_inputs.py +1040 -0
  28. pulumi_gcp/dataloss/outputs.py +1123 -0
  29. pulumi_gcp/dataloss/prevention_discovery_config.py +737 -0
  30. pulumi_gcp/dns/_inputs.py +2 -2
  31. pulumi_gcp/dns/outputs.py +2 -2
  32. pulumi_gcp/dns/record_set.py +2 -2
  33. pulumi_gcp/filestore/get_instance.py +11 -1
  34. pulumi_gcp/filestore/instance.py +101 -0
  35. pulumi_gcp/firebase/_inputs.py +16 -0
  36. pulumi_gcp/firebase/app_check_play_integrity_config.py +20 -0
  37. pulumi_gcp/firebase/app_check_recaptcha_enterprise_config.py +10 -0
  38. pulumi_gcp/firebase/hosting_version.py +44 -0
  39. pulumi_gcp/firebase/outputs.py +12 -0
  40. pulumi_gcp/logging/folder_sink.py +54 -0
  41. pulumi_gcp/logging/organization_sink.py +54 -0
  42. pulumi_gcp/monitoring/_inputs.py +46 -2
  43. pulumi_gcp/monitoring/outputs.py +40 -2
  44. pulumi_gcp/monitoring/uptime_check_config.py +6 -0
  45. pulumi_gcp/networkconnectivity/__init__.py +1 -0
  46. pulumi_gcp/networkconnectivity/internal_range.py +1024 -0
  47. pulumi_gcp/secretmanager/get_secret.py +13 -3
  48. pulumi_gcp/secretmanager/outputs.py +20 -1
  49. pulumi_gcp/secretmanager/secret.py +90 -3
  50. pulumi_gcp/storage/__init__.py +1 -0
  51. pulumi_gcp/storage/get_bucket_objects.py +153 -0
  52. pulumi_gcp/storage/outputs.py +63 -0
  53. {pulumi_gcp-7.21.0a1714565535.dist-info → pulumi_gcp-7.21.0a1714768411.dist-info}/METADATA +1 -1
  54. {pulumi_gcp-7.21.0a1714565535.dist-info → pulumi_gcp-7.21.0a1714768411.dist-info}/RECORD +56 -50
  55. {pulumi_gcp-7.21.0a1714565535.dist-info → pulumi_gcp-7.21.0a1714768411.dist-info}/WHEEL +0 -0
  56. {pulumi_gcp-7.21.0a1714565535.dist-info → pulumi_gcp-7.21.0a1714768411.dist-info}/top_level.txt +0 -0
@@ -8,11 +8,902 @@ import pulumi
8
8
  import pulumi.runtime
9
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
10
10
  from .. import _utilities
11
+ from . import outputs
11
12
 
12
13
  __all__ = [
14
+ 'AuthConfigClientCertificate',
15
+ 'AuthConfigDecryptedCredential',
16
+ 'AuthConfigDecryptedCredentialAuthToken',
17
+ 'AuthConfigDecryptedCredentialJwt',
18
+ 'AuthConfigDecryptedCredentialOauth2AuthorizationCode',
19
+ 'AuthConfigDecryptedCredentialOauth2ClientCredentials',
20
+ 'AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParams',
21
+ 'AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntry',
22
+ 'AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryKey',
23
+ 'AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryKeyLiteralValue',
24
+ 'AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryValue',
25
+ 'AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryValueLiteralValue',
26
+ 'AuthConfigDecryptedCredentialOidcToken',
27
+ 'AuthConfigDecryptedCredentialServiceAccountCredentials',
28
+ 'AuthConfigDecryptedCredentialUsernameAndPassword',
13
29
  'ClientCloudKmsConfig',
14
30
  ]
15
31
 
32
+ @pulumi.output_type
33
+ class AuthConfigClientCertificate(dict):
34
+ @staticmethod
35
+ def __key_warning(key: str):
36
+ suggest = None
37
+ if key == "encryptedPrivateKey":
38
+ suggest = "encrypted_private_key"
39
+ elif key == "sslCertificate":
40
+ suggest = "ssl_certificate"
41
+
42
+ if suggest:
43
+ pulumi.log.warn(f"Key '{key}' not found in AuthConfigClientCertificate. Access the value via the '{suggest}' property getter instead.")
44
+
45
+ def __getitem__(self, key: str) -> Any:
46
+ AuthConfigClientCertificate.__key_warning(key)
47
+ return super().__getitem__(key)
48
+
49
+ def get(self, key: str, default = None) -> Any:
50
+ AuthConfigClientCertificate.__key_warning(key)
51
+ return super().get(key, default)
52
+
53
+ def __init__(__self__, *,
54
+ encrypted_private_key: str,
55
+ ssl_certificate: str,
56
+ passphrase: Optional[str] = None):
57
+ """
58
+ :param str encrypted_private_key: The ssl certificate encoded in PEM format. This string must include the begin header and end footer lines.
59
+ :param str ssl_certificate: The ssl certificate encoded in PEM format. This string must include the begin header and end footer lines.
60
+ :param str passphrase: 'passphrase' should be left unset if private key is not encrypted.
61
+ Note that 'passphrase' is not the password for web server, but an extra layer of security to protected private key.
62
+ """
63
+ pulumi.set(__self__, "encrypted_private_key", encrypted_private_key)
64
+ pulumi.set(__self__, "ssl_certificate", ssl_certificate)
65
+ if passphrase is not None:
66
+ pulumi.set(__self__, "passphrase", passphrase)
67
+
68
+ @property
69
+ @pulumi.getter(name="encryptedPrivateKey")
70
+ def encrypted_private_key(self) -> str:
71
+ """
72
+ The ssl certificate encoded in PEM format. This string must include the begin header and end footer lines.
73
+ """
74
+ return pulumi.get(self, "encrypted_private_key")
75
+
76
+ @property
77
+ @pulumi.getter(name="sslCertificate")
78
+ def ssl_certificate(self) -> str:
79
+ """
80
+ The ssl certificate encoded in PEM format. This string must include the begin header and end footer lines.
81
+ """
82
+ return pulumi.get(self, "ssl_certificate")
83
+
84
+ @property
85
+ @pulumi.getter
86
+ def passphrase(self) -> Optional[str]:
87
+ """
88
+ 'passphrase' should be left unset if private key is not encrypted.
89
+ Note that 'passphrase' is not the password for web server, but an extra layer of security to protected private key.
90
+ """
91
+ return pulumi.get(self, "passphrase")
92
+
93
+
94
+ @pulumi.output_type
95
+ class AuthConfigDecryptedCredential(dict):
96
+ @staticmethod
97
+ def __key_warning(key: str):
98
+ suggest = None
99
+ if key == "credentialType":
100
+ suggest = "credential_type"
101
+ elif key == "authToken":
102
+ suggest = "auth_token"
103
+ elif key == "oauth2AuthorizationCode":
104
+ suggest = "oauth2_authorization_code"
105
+ elif key == "oauth2ClientCredentials":
106
+ suggest = "oauth2_client_credentials"
107
+ elif key == "oidcToken":
108
+ suggest = "oidc_token"
109
+ elif key == "serviceAccountCredentials":
110
+ suggest = "service_account_credentials"
111
+ elif key == "usernameAndPassword":
112
+ suggest = "username_and_password"
113
+
114
+ if suggest:
115
+ pulumi.log.warn(f"Key '{key}' not found in AuthConfigDecryptedCredential. Access the value via the '{suggest}' property getter instead.")
116
+
117
+ def __getitem__(self, key: str) -> Any:
118
+ AuthConfigDecryptedCredential.__key_warning(key)
119
+ return super().__getitem__(key)
120
+
121
+ def get(self, key: str, default = None) -> Any:
122
+ AuthConfigDecryptedCredential.__key_warning(key)
123
+ return super().get(key, default)
124
+
125
+ def __init__(__self__, *,
126
+ credential_type: str,
127
+ auth_token: Optional['outputs.AuthConfigDecryptedCredentialAuthToken'] = None,
128
+ jwt: Optional['outputs.AuthConfigDecryptedCredentialJwt'] = None,
129
+ oauth2_authorization_code: Optional['outputs.AuthConfigDecryptedCredentialOauth2AuthorizationCode'] = None,
130
+ oauth2_client_credentials: Optional['outputs.AuthConfigDecryptedCredentialOauth2ClientCredentials'] = None,
131
+ oidc_token: Optional['outputs.AuthConfigDecryptedCredentialOidcToken'] = None,
132
+ service_account_credentials: Optional['outputs.AuthConfigDecryptedCredentialServiceAccountCredentials'] = None,
133
+ username_and_password: Optional['outputs.AuthConfigDecryptedCredentialUsernameAndPassword'] = None):
134
+ """
135
+ :param str credential_type: Credential type associated with auth configs.
136
+ :param 'AuthConfigDecryptedCredentialAuthTokenArgs' auth_token: Auth token credential.
137
+ Structure is documented below.
138
+ :param 'AuthConfigDecryptedCredentialJwtArgs' jwt: JWT credential.
139
+ Structure is documented below.
140
+ :param 'AuthConfigDecryptedCredentialOauth2AuthorizationCodeArgs' oauth2_authorization_code: OAuth2 authorization code credential.
141
+ Structure is documented below.
142
+ :param 'AuthConfigDecryptedCredentialOauth2ClientCredentialsArgs' oauth2_client_credentials: OAuth2 client credentials.
143
+ Structure is documented below.
144
+ :param 'AuthConfigDecryptedCredentialOidcTokenArgs' oidc_token: Google OIDC ID Token.
145
+ Structure is documented below.
146
+ :param 'AuthConfigDecryptedCredentialServiceAccountCredentialsArgs' service_account_credentials: Service account credential.
147
+ Structure is documented below.
148
+ :param 'AuthConfigDecryptedCredentialUsernameAndPasswordArgs' username_and_password: Username and password credential.
149
+ Structure is documented below.
150
+ """
151
+ pulumi.set(__self__, "credential_type", credential_type)
152
+ if auth_token is not None:
153
+ pulumi.set(__self__, "auth_token", auth_token)
154
+ if jwt is not None:
155
+ pulumi.set(__self__, "jwt", jwt)
156
+ if oauth2_authorization_code is not None:
157
+ pulumi.set(__self__, "oauth2_authorization_code", oauth2_authorization_code)
158
+ if oauth2_client_credentials is not None:
159
+ pulumi.set(__self__, "oauth2_client_credentials", oauth2_client_credentials)
160
+ if oidc_token is not None:
161
+ pulumi.set(__self__, "oidc_token", oidc_token)
162
+ if service_account_credentials is not None:
163
+ pulumi.set(__self__, "service_account_credentials", service_account_credentials)
164
+ if username_and_password is not None:
165
+ pulumi.set(__self__, "username_and_password", username_and_password)
166
+
167
+ @property
168
+ @pulumi.getter(name="credentialType")
169
+ def credential_type(self) -> str:
170
+ """
171
+ Credential type associated with auth configs.
172
+ """
173
+ return pulumi.get(self, "credential_type")
174
+
175
+ @property
176
+ @pulumi.getter(name="authToken")
177
+ def auth_token(self) -> Optional['outputs.AuthConfigDecryptedCredentialAuthToken']:
178
+ """
179
+ Auth token credential.
180
+ Structure is documented below.
181
+ """
182
+ return pulumi.get(self, "auth_token")
183
+
184
+ @property
185
+ @pulumi.getter
186
+ def jwt(self) -> Optional['outputs.AuthConfigDecryptedCredentialJwt']:
187
+ """
188
+ JWT credential.
189
+ Structure is documented below.
190
+ """
191
+ return pulumi.get(self, "jwt")
192
+
193
+ @property
194
+ @pulumi.getter(name="oauth2AuthorizationCode")
195
+ def oauth2_authorization_code(self) -> Optional['outputs.AuthConfigDecryptedCredentialOauth2AuthorizationCode']:
196
+ """
197
+ OAuth2 authorization code credential.
198
+ Structure is documented below.
199
+ """
200
+ return pulumi.get(self, "oauth2_authorization_code")
201
+
202
+ @property
203
+ @pulumi.getter(name="oauth2ClientCredentials")
204
+ def oauth2_client_credentials(self) -> Optional['outputs.AuthConfigDecryptedCredentialOauth2ClientCredentials']:
205
+ """
206
+ OAuth2 client credentials.
207
+ Structure is documented below.
208
+ """
209
+ return pulumi.get(self, "oauth2_client_credentials")
210
+
211
+ @property
212
+ @pulumi.getter(name="oidcToken")
213
+ def oidc_token(self) -> Optional['outputs.AuthConfigDecryptedCredentialOidcToken']:
214
+ """
215
+ Google OIDC ID Token.
216
+ Structure is documented below.
217
+ """
218
+ return pulumi.get(self, "oidc_token")
219
+
220
+ @property
221
+ @pulumi.getter(name="serviceAccountCredentials")
222
+ def service_account_credentials(self) -> Optional['outputs.AuthConfigDecryptedCredentialServiceAccountCredentials']:
223
+ """
224
+ Service account credential.
225
+ Structure is documented below.
226
+ """
227
+ return pulumi.get(self, "service_account_credentials")
228
+
229
+ @property
230
+ @pulumi.getter(name="usernameAndPassword")
231
+ def username_and_password(self) -> Optional['outputs.AuthConfigDecryptedCredentialUsernameAndPassword']:
232
+ """
233
+ Username and password credential.
234
+ Structure is documented below.
235
+ """
236
+ return pulumi.get(self, "username_and_password")
237
+
238
+
239
+ @pulumi.output_type
240
+ class AuthConfigDecryptedCredentialAuthToken(dict):
241
+ def __init__(__self__, *,
242
+ token: Optional[str] = None,
243
+ type: Optional[str] = None):
244
+ """
245
+ :param str token: The token for the auth type.
246
+ :param str type: Authentication type, e.g. "Basic", "Bearer", etc.
247
+ """
248
+ if token is not None:
249
+ pulumi.set(__self__, "token", token)
250
+ if type is not None:
251
+ pulumi.set(__self__, "type", type)
252
+
253
+ @property
254
+ @pulumi.getter
255
+ def token(self) -> Optional[str]:
256
+ """
257
+ The token for the auth type.
258
+ """
259
+ return pulumi.get(self, "token")
260
+
261
+ @property
262
+ @pulumi.getter
263
+ def type(self) -> Optional[str]:
264
+ """
265
+ Authentication type, e.g. "Basic", "Bearer", etc.
266
+ """
267
+ return pulumi.get(self, "type")
268
+
269
+
270
+ @pulumi.output_type
271
+ class AuthConfigDecryptedCredentialJwt(dict):
272
+ @staticmethod
273
+ def __key_warning(key: str):
274
+ suggest = None
275
+ if key == "jwtHeader":
276
+ suggest = "jwt_header"
277
+ elif key == "jwtPayload":
278
+ suggest = "jwt_payload"
279
+
280
+ if suggest:
281
+ pulumi.log.warn(f"Key '{key}' not found in AuthConfigDecryptedCredentialJwt. Access the value via the '{suggest}' property getter instead.")
282
+
283
+ def __getitem__(self, key: str) -> Any:
284
+ AuthConfigDecryptedCredentialJwt.__key_warning(key)
285
+ return super().__getitem__(key)
286
+
287
+ def get(self, key: str, default = None) -> Any:
288
+ AuthConfigDecryptedCredentialJwt.__key_warning(key)
289
+ return super().get(key, default)
290
+
291
+ def __init__(__self__, *,
292
+ jwt: Optional[str] = None,
293
+ jwt_header: Optional[str] = None,
294
+ jwt_payload: Optional[str] = None,
295
+ secret: Optional[str] = None):
296
+ """
297
+ :param str jwt: (Output)
298
+ The token calculated by the header, payload and signature.
299
+ :param str jwt_header: Identifies which algorithm is used to generate the signature.
300
+ :param str jwt_payload: Contains a set of claims. The JWT specification defines seven Registered Claim Names which are the standard fields commonly included in tokens. Custom claims are usually also included, depending on the purpose of the token.
301
+ :param str secret: User's pre-shared secret to sign the token.
302
+ """
303
+ if jwt is not None:
304
+ pulumi.set(__self__, "jwt", jwt)
305
+ if jwt_header is not None:
306
+ pulumi.set(__self__, "jwt_header", jwt_header)
307
+ if jwt_payload is not None:
308
+ pulumi.set(__self__, "jwt_payload", jwt_payload)
309
+ if secret is not None:
310
+ pulumi.set(__self__, "secret", secret)
311
+
312
+ @property
313
+ @pulumi.getter
314
+ def jwt(self) -> Optional[str]:
315
+ """
316
+ (Output)
317
+ The token calculated by the header, payload and signature.
318
+ """
319
+ return pulumi.get(self, "jwt")
320
+
321
+ @property
322
+ @pulumi.getter(name="jwtHeader")
323
+ def jwt_header(self) -> Optional[str]:
324
+ """
325
+ Identifies which algorithm is used to generate the signature.
326
+ """
327
+ return pulumi.get(self, "jwt_header")
328
+
329
+ @property
330
+ @pulumi.getter(name="jwtPayload")
331
+ def jwt_payload(self) -> Optional[str]:
332
+ """
333
+ Contains a set of claims. The JWT specification defines seven Registered Claim Names which are the standard fields commonly included in tokens. Custom claims are usually also included, depending on the purpose of the token.
334
+ """
335
+ return pulumi.get(self, "jwt_payload")
336
+
337
+ @property
338
+ @pulumi.getter
339
+ def secret(self) -> Optional[str]:
340
+ """
341
+ User's pre-shared secret to sign the token.
342
+ """
343
+ return pulumi.get(self, "secret")
344
+
345
+
346
+ @pulumi.output_type
347
+ class AuthConfigDecryptedCredentialOauth2AuthorizationCode(dict):
348
+ @staticmethod
349
+ def __key_warning(key: str):
350
+ suggest = None
351
+ if key == "authEndpoint":
352
+ suggest = "auth_endpoint"
353
+ elif key == "clientId":
354
+ suggest = "client_id"
355
+ elif key == "clientSecret":
356
+ suggest = "client_secret"
357
+ elif key == "tokenEndpoint":
358
+ suggest = "token_endpoint"
359
+
360
+ if suggest:
361
+ pulumi.log.warn(f"Key '{key}' not found in AuthConfigDecryptedCredentialOauth2AuthorizationCode. Access the value via the '{suggest}' property getter instead.")
362
+
363
+ def __getitem__(self, key: str) -> Any:
364
+ AuthConfigDecryptedCredentialOauth2AuthorizationCode.__key_warning(key)
365
+ return super().__getitem__(key)
366
+
367
+ def get(self, key: str, default = None) -> Any:
368
+ AuthConfigDecryptedCredentialOauth2AuthorizationCode.__key_warning(key)
369
+ return super().get(key, default)
370
+
371
+ def __init__(__self__, *,
372
+ auth_endpoint: Optional[str] = None,
373
+ client_id: Optional[str] = None,
374
+ client_secret: Optional[str] = None,
375
+ scope: Optional[str] = None,
376
+ token_endpoint: Optional[str] = None):
377
+ """
378
+ :param str auth_endpoint: The auth url endpoint to send the auth code request to.
379
+ :param str client_id: The client's id.
380
+ :param str client_secret: The client's secret.
381
+ :param str scope: A space-delimited list of requested scope permissions.
382
+ :param str token_endpoint: The token url endpoint to send the token request to.
383
+ """
384
+ if auth_endpoint is not None:
385
+ pulumi.set(__self__, "auth_endpoint", auth_endpoint)
386
+ if client_id is not None:
387
+ pulumi.set(__self__, "client_id", client_id)
388
+ if client_secret is not None:
389
+ pulumi.set(__self__, "client_secret", client_secret)
390
+ if scope is not None:
391
+ pulumi.set(__self__, "scope", scope)
392
+ if token_endpoint is not None:
393
+ pulumi.set(__self__, "token_endpoint", token_endpoint)
394
+
395
+ @property
396
+ @pulumi.getter(name="authEndpoint")
397
+ def auth_endpoint(self) -> Optional[str]:
398
+ """
399
+ The auth url endpoint to send the auth code request to.
400
+ """
401
+ return pulumi.get(self, "auth_endpoint")
402
+
403
+ @property
404
+ @pulumi.getter(name="clientId")
405
+ def client_id(self) -> Optional[str]:
406
+ """
407
+ The client's id.
408
+ """
409
+ return pulumi.get(self, "client_id")
410
+
411
+ @property
412
+ @pulumi.getter(name="clientSecret")
413
+ def client_secret(self) -> Optional[str]:
414
+ """
415
+ The client's secret.
416
+ """
417
+ return pulumi.get(self, "client_secret")
418
+
419
+ @property
420
+ @pulumi.getter
421
+ def scope(self) -> Optional[str]:
422
+ """
423
+ A space-delimited list of requested scope permissions.
424
+ """
425
+ return pulumi.get(self, "scope")
426
+
427
+ @property
428
+ @pulumi.getter(name="tokenEndpoint")
429
+ def token_endpoint(self) -> Optional[str]:
430
+ """
431
+ The token url endpoint to send the token request to.
432
+ """
433
+ return pulumi.get(self, "token_endpoint")
434
+
435
+
436
+ @pulumi.output_type
437
+ class AuthConfigDecryptedCredentialOauth2ClientCredentials(dict):
438
+ @staticmethod
439
+ def __key_warning(key: str):
440
+ suggest = None
441
+ if key == "clientId":
442
+ suggest = "client_id"
443
+ elif key == "clientSecret":
444
+ suggest = "client_secret"
445
+ elif key == "requestType":
446
+ suggest = "request_type"
447
+ elif key == "tokenEndpoint":
448
+ suggest = "token_endpoint"
449
+ elif key == "tokenParams":
450
+ suggest = "token_params"
451
+
452
+ if suggest:
453
+ pulumi.log.warn(f"Key '{key}' not found in AuthConfigDecryptedCredentialOauth2ClientCredentials. Access the value via the '{suggest}' property getter instead.")
454
+
455
+ def __getitem__(self, key: str) -> Any:
456
+ AuthConfigDecryptedCredentialOauth2ClientCredentials.__key_warning(key)
457
+ return super().__getitem__(key)
458
+
459
+ def get(self, key: str, default = None) -> Any:
460
+ AuthConfigDecryptedCredentialOauth2ClientCredentials.__key_warning(key)
461
+ return super().get(key, default)
462
+
463
+ def __init__(__self__, *,
464
+ client_id: Optional[str] = None,
465
+ client_secret: Optional[str] = None,
466
+ request_type: Optional[str] = None,
467
+ scope: Optional[str] = None,
468
+ token_endpoint: Optional[str] = None,
469
+ token_params: Optional['outputs.AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParams'] = None):
470
+ """
471
+ :param str client_id: The client's ID.
472
+ :param str client_secret: The client's secret.
473
+ :param str request_type: Represent how to pass parameters to fetch access token Possible values: ["REQUEST_TYPE_UNSPECIFIED", "REQUEST_BODY", "QUERY_PARAMETERS", "ENCODED_HEADER"]
474
+ :param str scope: A space-delimited list of requested scope permissions.
475
+ :param str token_endpoint: The token endpoint is used by the client to obtain an access token by presenting its authorization grant or refresh token.
476
+ :param 'AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsArgs' token_params: Token parameters for the auth request.
477
+ """
478
+ if client_id is not None:
479
+ pulumi.set(__self__, "client_id", client_id)
480
+ if client_secret is not None:
481
+ pulumi.set(__self__, "client_secret", client_secret)
482
+ if request_type is not None:
483
+ pulumi.set(__self__, "request_type", request_type)
484
+ if scope is not None:
485
+ pulumi.set(__self__, "scope", scope)
486
+ if token_endpoint is not None:
487
+ pulumi.set(__self__, "token_endpoint", token_endpoint)
488
+ if token_params is not None:
489
+ pulumi.set(__self__, "token_params", token_params)
490
+
491
+ @property
492
+ @pulumi.getter(name="clientId")
493
+ def client_id(self) -> Optional[str]:
494
+ """
495
+ The client's ID.
496
+ """
497
+ return pulumi.get(self, "client_id")
498
+
499
+ @property
500
+ @pulumi.getter(name="clientSecret")
501
+ def client_secret(self) -> Optional[str]:
502
+ """
503
+ The client's secret.
504
+ """
505
+ return pulumi.get(self, "client_secret")
506
+
507
+ @property
508
+ @pulumi.getter(name="requestType")
509
+ def request_type(self) -> Optional[str]:
510
+ """
511
+ Represent how to pass parameters to fetch access token Possible values: ["REQUEST_TYPE_UNSPECIFIED", "REQUEST_BODY", "QUERY_PARAMETERS", "ENCODED_HEADER"]
512
+ """
513
+ return pulumi.get(self, "request_type")
514
+
515
+ @property
516
+ @pulumi.getter
517
+ def scope(self) -> Optional[str]:
518
+ """
519
+ A space-delimited list of requested scope permissions.
520
+ """
521
+ return pulumi.get(self, "scope")
522
+
523
+ @property
524
+ @pulumi.getter(name="tokenEndpoint")
525
+ def token_endpoint(self) -> Optional[str]:
526
+ """
527
+ The token endpoint is used by the client to obtain an access token by presenting its authorization grant or refresh token.
528
+ """
529
+ return pulumi.get(self, "token_endpoint")
530
+
531
+ @property
532
+ @pulumi.getter(name="tokenParams")
533
+ def token_params(self) -> Optional['outputs.AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParams']:
534
+ """
535
+ Token parameters for the auth request.
536
+ """
537
+ return pulumi.get(self, "token_params")
538
+
539
+
540
+ @pulumi.output_type
541
+ class AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParams(dict):
542
+ def __init__(__self__, *,
543
+ entries: Optional[Sequence['outputs.AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntry']] = None):
544
+ """
545
+ :param Sequence['AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryArgs'] entries: A list of parameter map entries.
546
+ Structure is documented below.
547
+ """
548
+ if entries is not None:
549
+ pulumi.set(__self__, "entries", entries)
550
+
551
+ @property
552
+ @pulumi.getter
553
+ def entries(self) -> Optional[Sequence['outputs.AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntry']]:
554
+ """
555
+ A list of parameter map entries.
556
+ Structure is documented below.
557
+ """
558
+ return pulumi.get(self, "entries")
559
+
560
+
561
+ @pulumi.output_type
562
+ class AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntry(dict):
563
+ def __init__(__self__, *,
564
+ key: Optional['outputs.AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryKey'] = None,
565
+ value: Optional['outputs.AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryValue'] = None):
566
+ """
567
+ :param 'AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryKeyArgs' key: Key of the map entry.
568
+ Structure is documented below.
569
+ :param 'AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryValueArgs' value: Value of the map entry.
570
+ Structure is documented below.
571
+ """
572
+ if key is not None:
573
+ pulumi.set(__self__, "key", key)
574
+ if value is not None:
575
+ pulumi.set(__self__, "value", value)
576
+
577
+ @property
578
+ @pulumi.getter
579
+ def key(self) -> Optional['outputs.AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryKey']:
580
+ """
581
+ Key of the map entry.
582
+ Structure is documented below.
583
+ """
584
+ return pulumi.get(self, "key")
585
+
586
+ @property
587
+ @pulumi.getter
588
+ def value(self) -> Optional['outputs.AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryValue']:
589
+ """
590
+ Value of the map entry.
591
+ Structure is documented below.
592
+ """
593
+ return pulumi.get(self, "value")
594
+
595
+
596
+ @pulumi.output_type
597
+ class AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryKey(dict):
598
+ @staticmethod
599
+ def __key_warning(key: str):
600
+ suggest = None
601
+ if key == "literalValue":
602
+ suggest = "literal_value"
603
+
604
+ if suggest:
605
+ pulumi.log.warn(f"Key '{key}' not found in AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryKey. Access the value via the '{suggest}' property getter instead.")
606
+
607
+ def __getitem__(self, key: str) -> Any:
608
+ AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryKey.__key_warning(key)
609
+ return super().__getitem__(key)
610
+
611
+ def get(self, key: str, default = None) -> Any:
612
+ AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryKey.__key_warning(key)
613
+ return super().get(key, default)
614
+
615
+ def __init__(__self__, *,
616
+ literal_value: Optional['outputs.AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryKeyLiteralValue'] = None):
617
+ """
618
+ :param 'AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryKeyLiteralValueArgs' literal_value: Passing a literal value
619
+ Structure is documented below.
620
+ """
621
+ if literal_value is not None:
622
+ pulumi.set(__self__, "literal_value", literal_value)
623
+
624
+ @property
625
+ @pulumi.getter(name="literalValue")
626
+ def literal_value(self) -> Optional['outputs.AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryKeyLiteralValue']:
627
+ """
628
+ Passing a literal value
629
+ Structure is documented below.
630
+ """
631
+ return pulumi.get(self, "literal_value")
632
+
633
+
634
+ @pulumi.output_type
635
+ class AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryKeyLiteralValue(dict):
636
+ @staticmethod
637
+ def __key_warning(key: str):
638
+ suggest = None
639
+ if key == "stringValue":
640
+ suggest = "string_value"
641
+
642
+ if suggest:
643
+ pulumi.log.warn(f"Key '{key}' not found in AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryKeyLiteralValue. Access the value via the '{suggest}' property getter instead.")
644
+
645
+ def __getitem__(self, key: str) -> Any:
646
+ AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryKeyLiteralValue.__key_warning(key)
647
+ return super().__getitem__(key)
648
+
649
+ def get(self, key: str, default = None) -> Any:
650
+ AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryKeyLiteralValue.__key_warning(key)
651
+ return super().get(key, default)
652
+
653
+ def __init__(__self__, *,
654
+ string_value: Optional[str] = None):
655
+ """
656
+ :param str string_value: String.
657
+ """
658
+ if string_value is not None:
659
+ pulumi.set(__self__, "string_value", string_value)
660
+
661
+ @property
662
+ @pulumi.getter(name="stringValue")
663
+ def string_value(self) -> Optional[str]:
664
+ """
665
+ String.
666
+ """
667
+ return pulumi.get(self, "string_value")
668
+
669
+
670
+ @pulumi.output_type
671
+ class AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryValue(dict):
672
+ @staticmethod
673
+ def __key_warning(key: str):
674
+ suggest = None
675
+ if key == "literalValue":
676
+ suggest = "literal_value"
677
+
678
+ if suggest:
679
+ pulumi.log.warn(f"Key '{key}' not found in AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryValue. Access the value via the '{suggest}' property getter instead.")
680
+
681
+ def __getitem__(self, key: str) -> Any:
682
+ AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryValue.__key_warning(key)
683
+ return super().__getitem__(key)
684
+
685
+ def get(self, key: str, default = None) -> Any:
686
+ AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryValue.__key_warning(key)
687
+ return super().get(key, default)
688
+
689
+ def __init__(__self__, *,
690
+ literal_value: Optional['outputs.AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryValueLiteralValue'] = None):
691
+ """
692
+ :param 'AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryValueLiteralValueArgs' literal_value: Passing a literal value
693
+ Structure is documented below.
694
+ """
695
+ if literal_value is not None:
696
+ pulumi.set(__self__, "literal_value", literal_value)
697
+
698
+ @property
699
+ @pulumi.getter(name="literalValue")
700
+ def literal_value(self) -> Optional['outputs.AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryValueLiteralValue']:
701
+ """
702
+ Passing a literal value
703
+ Structure is documented below.
704
+ """
705
+ return pulumi.get(self, "literal_value")
706
+
707
+
708
+ @pulumi.output_type
709
+ class AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryValueLiteralValue(dict):
710
+ @staticmethod
711
+ def __key_warning(key: str):
712
+ suggest = None
713
+ if key == "stringValue":
714
+ suggest = "string_value"
715
+
716
+ if suggest:
717
+ pulumi.log.warn(f"Key '{key}' not found in AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryValueLiteralValue. Access the value via the '{suggest}' property getter instead.")
718
+
719
+ def __getitem__(self, key: str) -> Any:
720
+ AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryValueLiteralValue.__key_warning(key)
721
+ return super().__getitem__(key)
722
+
723
+ def get(self, key: str, default = None) -> Any:
724
+ AuthConfigDecryptedCredentialOauth2ClientCredentialsTokenParamsEntryValueLiteralValue.__key_warning(key)
725
+ return super().get(key, default)
726
+
727
+ def __init__(__self__, *,
728
+ string_value: Optional[str] = None):
729
+ """
730
+ :param str string_value: String.
731
+ """
732
+ if string_value is not None:
733
+ pulumi.set(__self__, "string_value", string_value)
734
+
735
+ @property
736
+ @pulumi.getter(name="stringValue")
737
+ def string_value(self) -> Optional[str]:
738
+ """
739
+ String.
740
+ """
741
+ return pulumi.get(self, "string_value")
742
+
743
+
744
+ @pulumi.output_type
745
+ class AuthConfigDecryptedCredentialOidcToken(dict):
746
+ @staticmethod
747
+ def __key_warning(key: str):
748
+ suggest = None
749
+ if key == "serviceAccountEmail":
750
+ suggest = "service_account_email"
751
+ elif key == "tokenExpireTime":
752
+ suggest = "token_expire_time"
753
+
754
+ if suggest:
755
+ pulumi.log.warn(f"Key '{key}' not found in AuthConfigDecryptedCredentialOidcToken. Access the value via the '{suggest}' property getter instead.")
756
+
757
+ def __getitem__(self, key: str) -> Any:
758
+ AuthConfigDecryptedCredentialOidcToken.__key_warning(key)
759
+ return super().__getitem__(key)
760
+
761
+ def get(self, key: str, default = None) -> Any:
762
+ AuthConfigDecryptedCredentialOidcToken.__key_warning(key)
763
+ return super().get(key, default)
764
+
765
+ def __init__(__self__, *,
766
+ audience: Optional[str] = None,
767
+ service_account_email: Optional[str] = None,
768
+ token: Optional[str] = None,
769
+ token_expire_time: Optional[str] = None):
770
+ """
771
+ :param str audience: Audience to be used when generating OIDC token. The audience claim identifies the recipients that the JWT is intended for.
772
+ :param str service_account_email: The service account email to be used as the identity for the token.
773
+ :param str token: (Output)
774
+ ID token obtained for the service account.
775
+ :param str token_expire_time: (Output)
776
+ The approximate time until the token retrieved is valid.
777
+ A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
778
+ """
779
+ if audience is not None:
780
+ pulumi.set(__self__, "audience", audience)
781
+ if service_account_email is not None:
782
+ pulumi.set(__self__, "service_account_email", service_account_email)
783
+ if token is not None:
784
+ pulumi.set(__self__, "token", token)
785
+ if token_expire_time is not None:
786
+ pulumi.set(__self__, "token_expire_time", token_expire_time)
787
+
788
+ @property
789
+ @pulumi.getter
790
+ def audience(self) -> Optional[str]:
791
+ """
792
+ Audience to be used when generating OIDC token. The audience claim identifies the recipients that the JWT is intended for.
793
+ """
794
+ return pulumi.get(self, "audience")
795
+
796
+ @property
797
+ @pulumi.getter(name="serviceAccountEmail")
798
+ def service_account_email(self) -> Optional[str]:
799
+ """
800
+ The service account email to be used as the identity for the token.
801
+ """
802
+ return pulumi.get(self, "service_account_email")
803
+
804
+ @property
805
+ @pulumi.getter
806
+ def token(self) -> Optional[str]:
807
+ """
808
+ (Output)
809
+ ID token obtained for the service account.
810
+ """
811
+ return pulumi.get(self, "token")
812
+
813
+ @property
814
+ @pulumi.getter(name="tokenExpireTime")
815
+ def token_expire_time(self) -> Optional[str]:
816
+ """
817
+ (Output)
818
+ The approximate time until the token retrieved is valid.
819
+ A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: "2014-10-02T15:01:23Z" and "2014-10-02T15:01:23.045123456Z".
820
+ """
821
+ return pulumi.get(self, "token_expire_time")
822
+
823
+
824
+ @pulumi.output_type
825
+ class AuthConfigDecryptedCredentialServiceAccountCredentials(dict):
826
+ @staticmethod
827
+ def __key_warning(key: str):
828
+ suggest = None
829
+ if key == "serviceAccount":
830
+ suggest = "service_account"
831
+
832
+ if suggest:
833
+ pulumi.log.warn(f"Key '{key}' not found in AuthConfigDecryptedCredentialServiceAccountCredentials. Access the value via the '{suggest}' property getter instead.")
834
+
835
+ def __getitem__(self, key: str) -> Any:
836
+ AuthConfigDecryptedCredentialServiceAccountCredentials.__key_warning(key)
837
+ return super().__getitem__(key)
838
+
839
+ def get(self, key: str, default = None) -> Any:
840
+ AuthConfigDecryptedCredentialServiceAccountCredentials.__key_warning(key)
841
+ return super().get(key, default)
842
+
843
+ def __init__(__self__, *,
844
+ scope: Optional[str] = None,
845
+ service_account: Optional[str] = None):
846
+ """
847
+ :param str scope: A space-delimited list of requested scope permissions.
848
+ :param str service_account: Name of the service account that has the permission to make the request.
849
+ """
850
+ if scope is not None:
851
+ pulumi.set(__self__, "scope", scope)
852
+ if service_account is not None:
853
+ pulumi.set(__self__, "service_account", service_account)
854
+
855
+ @property
856
+ @pulumi.getter
857
+ def scope(self) -> Optional[str]:
858
+ """
859
+ A space-delimited list of requested scope permissions.
860
+ """
861
+ return pulumi.get(self, "scope")
862
+
863
+ @property
864
+ @pulumi.getter(name="serviceAccount")
865
+ def service_account(self) -> Optional[str]:
866
+ """
867
+ Name of the service account that has the permission to make the request.
868
+ """
869
+ return pulumi.get(self, "service_account")
870
+
871
+
872
+ @pulumi.output_type
873
+ class AuthConfigDecryptedCredentialUsernameAndPassword(dict):
874
+ def __init__(__self__, *,
875
+ password: Optional[str] = None,
876
+ username: Optional[str] = None):
877
+ """
878
+ :param str password: Password to be used.
879
+
880
+ <a name="nested_oauth2_authorization_code"></a>The `oauth2_authorization_code` block supports:
881
+ :param str username: Username to be used.
882
+ """
883
+ if password is not None:
884
+ pulumi.set(__self__, "password", password)
885
+ if username is not None:
886
+ pulumi.set(__self__, "username", username)
887
+
888
+ @property
889
+ @pulumi.getter
890
+ def password(self) -> Optional[str]:
891
+ """
892
+ Password to be used.
893
+
894
+ <a name="nested_oauth2_authorization_code"></a>The `oauth2_authorization_code` block supports:
895
+ """
896
+ return pulumi.get(self, "password")
897
+
898
+ @property
899
+ @pulumi.getter
900
+ def username(self) -> Optional[str]:
901
+ """
902
+ Username to be used.
903
+ """
904
+ return pulumi.get(self, "username")
905
+
906
+
16
907
  @pulumi.output_type
17
908
  class ClientCloudKmsConfig(dict):
18
909
  @staticmethod