pulumi-gcp 7.21.0a1714565535__py3-none-any.whl → 7.21.0a1714768411__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (56) hide show
  1. pulumi_gcp/__init__.py +40 -0
  2. pulumi_gcp/alloydb/_inputs.py +74 -0
  3. pulumi_gcp/alloydb/instance.py +90 -0
  4. pulumi_gcp/alloydb/outputs.py +98 -0
  5. pulumi_gcp/apigee/environment.py +47 -0
  6. pulumi_gcp/applicationintegration/__init__.py +1 -0
  7. pulumi_gcp/applicationintegration/_inputs.py +843 -0
  8. pulumi_gcp/applicationintegration/auth_config.py +998 -0
  9. pulumi_gcp/applicationintegration/outputs.py +891 -0
  10. pulumi_gcp/bigquerydatapolicy/_inputs.py +21 -4
  11. pulumi_gcp/bigquerydatapolicy/data_policy.py +78 -0
  12. pulumi_gcp/bigquerydatapolicy/outputs.py +16 -3
  13. pulumi_gcp/certificateauthority/_inputs.py +92 -12
  14. pulumi_gcp/certificateauthority/authority.py +110 -0
  15. pulumi_gcp/certificateauthority/certificate.py +176 -0
  16. pulumi_gcp/certificateauthority/outputs.py +144 -12
  17. pulumi_gcp/composer/__init__.py +1 -0
  18. pulumi_gcp/composer/user_workloads_secret.py +441 -0
  19. pulumi_gcp/compute/__init__.py +1 -0
  20. pulumi_gcp/compute/_inputs.py +121 -58
  21. pulumi_gcp/compute/global_forwarding_rule.py +0 -282
  22. pulumi_gcp/compute/outputs.py +120 -57
  23. pulumi_gcp/compute/region_target_https_proxy.py +257 -0
  24. pulumi_gcp/compute/region_url_map.py +0 -470
  25. pulumi_gcp/compute/security_policy_rule.py +850 -0
  26. pulumi_gcp/dataloss/__init__.py +1 -0
  27. pulumi_gcp/dataloss/_inputs.py +1040 -0
  28. pulumi_gcp/dataloss/outputs.py +1123 -0
  29. pulumi_gcp/dataloss/prevention_discovery_config.py +737 -0
  30. pulumi_gcp/dns/_inputs.py +2 -2
  31. pulumi_gcp/dns/outputs.py +2 -2
  32. pulumi_gcp/dns/record_set.py +2 -2
  33. pulumi_gcp/filestore/get_instance.py +11 -1
  34. pulumi_gcp/filestore/instance.py +101 -0
  35. pulumi_gcp/firebase/_inputs.py +16 -0
  36. pulumi_gcp/firebase/app_check_play_integrity_config.py +20 -0
  37. pulumi_gcp/firebase/app_check_recaptcha_enterprise_config.py +10 -0
  38. pulumi_gcp/firebase/hosting_version.py +44 -0
  39. pulumi_gcp/firebase/outputs.py +12 -0
  40. pulumi_gcp/logging/folder_sink.py +54 -0
  41. pulumi_gcp/logging/organization_sink.py +54 -0
  42. pulumi_gcp/monitoring/_inputs.py +46 -2
  43. pulumi_gcp/monitoring/outputs.py +40 -2
  44. pulumi_gcp/monitoring/uptime_check_config.py +6 -0
  45. pulumi_gcp/networkconnectivity/__init__.py +1 -0
  46. pulumi_gcp/networkconnectivity/internal_range.py +1024 -0
  47. pulumi_gcp/secretmanager/get_secret.py +13 -3
  48. pulumi_gcp/secretmanager/outputs.py +20 -1
  49. pulumi_gcp/secretmanager/secret.py +90 -3
  50. pulumi_gcp/storage/__init__.py +1 -0
  51. pulumi_gcp/storage/get_bucket_objects.py +153 -0
  52. pulumi_gcp/storage/outputs.py +63 -0
  53. {pulumi_gcp-7.21.0a1714565535.dist-info → pulumi_gcp-7.21.0a1714768411.dist-info}/METADATA +1 -1
  54. {pulumi_gcp-7.21.0a1714565535.dist-info → pulumi_gcp-7.21.0a1714768411.dist-info}/RECORD +56 -50
  55. {pulumi_gcp-7.21.0a1714565535.dist-info → pulumi_gcp-7.21.0a1714768411.dist-info}/WHEEL +0 -0
  56. {pulumi_gcp-7.21.0a1714565535.dist-info → pulumi_gcp-7.21.0a1714768411.dist-info}/top_level.txt +0 -0
@@ -1186,147 +1186,6 @@ class GlobalForwardingRule(pulumi.CustomResource):
1186
1186
 
1187
1187
  ## Example Usage
1188
1188
 
1189
- ### External Ssl Proxy Lb Mig Backend
1190
-
1191
- ```python
1192
- import pulumi
1193
- import pulumi_gcp as gcp
1194
- import pulumi_tls as tls
1195
-
1196
- # External SSL proxy load balancer with managed instance group backend
1197
- # VPC
1198
- default = gcp.compute.Network("default",
1199
- name="ssl-proxy-xlb-network",
1200
- auto_create_subnetworks=False)
1201
- # backend subnet
1202
- default_subnetwork = gcp.compute.Subnetwork("default",
1203
- name="ssl-proxy-xlb-subnet",
1204
- ip_cidr_range="10.0.1.0/24",
1205
- region="us-central1",
1206
- network=default.id)
1207
- # reserved IP address
1208
- default_global_address = gcp.compute.GlobalAddress("default", name="ssl-proxy-xlb-ip")
1209
- # Self-signed regional SSL certificate for testing
1210
- default_private_key = tls.PrivateKey("default",
1211
- algorithm="RSA",
1212
- rsa_bits=2048)
1213
- default_self_signed_cert = tls.SelfSignedCert("default",
1214
- key_algorithm=default_private_key.algorithm,
1215
- private_key_pem=default_private_key.private_key_pem,
1216
- validity_period_hours=12,
1217
- early_renewal_hours=3,
1218
- allowed_uses=[
1219
- "key_encipherment",
1220
- "digital_signature",
1221
- "server_auth",
1222
- ],
1223
- dns_names=["example.com"],
1224
- subject=tls.SelfSignedCertSubjectArgs(
1225
- common_name="example.com",
1226
- organization="ACME Examples, Inc",
1227
- ))
1228
- default_ssl_certificate = gcp.compute.SSLCertificate("default",
1229
- name="default-cert",
1230
- private_key=default_private_key.private_key_pem,
1231
- certificate=default_self_signed_cert.cert_pem)
1232
- default_health_check = gcp.compute.HealthCheck("default",
1233
- name="ssl-proxy-health-check",
1234
- timeout_sec=1,
1235
- check_interval_sec=1,
1236
- tcp_health_check=gcp.compute.HealthCheckTcpHealthCheckArgs(
1237
- port=443,
1238
- ))
1239
- # instance template
1240
- default_instance_template = gcp.compute.InstanceTemplate("default",
1241
- network_interfaces=[gcp.compute.InstanceTemplateNetworkInterfaceArgs(
1242
- access_configs=[gcp.compute.InstanceTemplateNetworkInterfaceAccessConfigArgs()],
1243
- network=default.id,
1244
- subnetwork=default_subnetwork.id,
1245
- )],
1246
- name="ssl-proxy-xlb-mig-template",
1247
- machine_type="e2-small",
1248
- tags=["allow-health-check"],
1249
- disks=[gcp.compute.InstanceTemplateDiskArgs(
1250
- source_image="debian-cloud/debian-10",
1251
- auto_delete=True,
1252
- boot=True,
1253
- )],
1254
- metadata={
1255
- "startup-script": \"\"\"#! /bin/bash
1256
- set -euo pipefail
1257
- export DEBIAN_FRONTEND=noninteractive
1258
- sudo apt-get update
1259
- sudo apt-get install -y apache2 jq
1260
- sudo a2ensite default-ssl
1261
- sudo a2enmod ssl
1262
- sudo service apache2 restart
1263
- NAME=$(curl -H "Metadata-Flavor: Google" "http://metadata.google.internal/computeMetadata/v1/instance/hostname")
1264
- IP=$(curl -H "Metadata-Flavor: Google" "http://metadata.google.internal/computeMetadata/v1/instance/network-interfaces/0/ip")
1265
- METADATA=$(curl -f -H "Metadata-Flavor: Google" "http://metadata.google.internal/computeMetadata/v1/instance/attributes/?recursive=True" | jq 'del(.["startup-script"])')
1266
- cat <<EOF > /var/www/html/index.html
1267
- <h1>SSL Load Balancer</h1>
1268
- <pre>
1269
- Name: $NAME
1270
- IP: $IP
1271
- Metadata: $METADATA
1272
- </pre>
1273
- EOF
1274
- \"\"\",
1275
- })
1276
- # MIG
1277
- default_instance_group_manager = gcp.compute.InstanceGroupManager("default",
1278
- name="ssl-proxy-xlb-mig1",
1279
- zone="us-central1-c",
1280
- named_ports=[gcp.compute.InstanceGroupManagerNamedPortArgs(
1281
- name="tcp",
1282
- port=443,
1283
- )],
1284
- versions=[gcp.compute.InstanceGroupManagerVersionArgs(
1285
- instance_template=default_instance_template.id,
1286
- name="primary",
1287
- )],
1288
- base_instance_name="vm",
1289
- target_size=2)
1290
- # backend service
1291
- default_backend_service = gcp.compute.BackendService("default",
1292
- name="ssl-proxy-xlb-backend-service",
1293
- protocol="SSL",
1294
- port_name="tcp",
1295
- load_balancing_scheme="EXTERNAL",
1296
- timeout_sec=10,
1297
- health_checks=default_health_check.id,
1298
- backends=[gcp.compute.BackendServiceBackendArgs(
1299
- group=default_instance_group_manager.instance_group,
1300
- balancing_mode="UTILIZATION",
1301
- max_utilization=1,
1302
- capacity_scaler=1,
1303
- )])
1304
- default_target_ssl_proxy = gcp.compute.TargetSSLProxy("default",
1305
- name="test-proxy",
1306
- backend_service=default_backend_service.id,
1307
- ssl_certificates=[default_ssl_certificate.id])
1308
- # forwarding rule
1309
- default_global_forwarding_rule = gcp.compute.GlobalForwardingRule("default",
1310
- name="ssl-proxy-xlb-forwarding-rule",
1311
- ip_protocol="TCP",
1312
- load_balancing_scheme="EXTERNAL",
1313
- port_range="443",
1314
- target=default_target_ssl_proxy.id,
1315
- ip_address=default_global_address.id)
1316
- # allow access from health check ranges
1317
- default_firewall = gcp.compute.Firewall("default",
1318
- name="ssl-proxy-xlb-fw-allow-hc",
1319
- direction="INGRESS",
1320
- network=default.id,
1321
- source_ranges=[
1322
- "130.211.0.0/22",
1323
- "35.191.0.0/16",
1324
- ],
1325
- allows=[gcp.compute.FirewallAllowArgs(
1326
- protocol="tcp",
1327
- )],
1328
- target_tags=["allow-health-check"])
1329
- ```
1330
1189
  ### External Tcp Proxy Lb Mig Backend
1331
1190
 
1332
1191
  ```python
@@ -2226,147 +2085,6 @@ class GlobalForwardingRule(pulumi.CustomResource):
2226
2085
 
2227
2086
  ## Example Usage
2228
2087
 
2229
- ### External Ssl Proxy Lb Mig Backend
2230
-
2231
- ```python
2232
- import pulumi
2233
- import pulumi_gcp as gcp
2234
- import pulumi_tls as tls
2235
-
2236
- # External SSL proxy load balancer with managed instance group backend
2237
- # VPC
2238
- default = gcp.compute.Network("default",
2239
- name="ssl-proxy-xlb-network",
2240
- auto_create_subnetworks=False)
2241
- # backend subnet
2242
- default_subnetwork = gcp.compute.Subnetwork("default",
2243
- name="ssl-proxy-xlb-subnet",
2244
- ip_cidr_range="10.0.1.0/24",
2245
- region="us-central1",
2246
- network=default.id)
2247
- # reserved IP address
2248
- default_global_address = gcp.compute.GlobalAddress("default", name="ssl-proxy-xlb-ip")
2249
- # Self-signed regional SSL certificate for testing
2250
- default_private_key = tls.PrivateKey("default",
2251
- algorithm="RSA",
2252
- rsa_bits=2048)
2253
- default_self_signed_cert = tls.SelfSignedCert("default",
2254
- key_algorithm=default_private_key.algorithm,
2255
- private_key_pem=default_private_key.private_key_pem,
2256
- validity_period_hours=12,
2257
- early_renewal_hours=3,
2258
- allowed_uses=[
2259
- "key_encipherment",
2260
- "digital_signature",
2261
- "server_auth",
2262
- ],
2263
- dns_names=["example.com"],
2264
- subject=tls.SelfSignedCertSubjectArgs(
2265
- common_name="example.com",
2266
- organization="ACME Examples, Inc",
2267
- ))
2268
- default_ssl_certificate = gcp.compute.SSLCertificate("default",
2269
- name="default-cert",
2270
- private_key=default_private_key.private_key_pem,
2271
- certificate=default_self_signed_cert.cert_pem)
2272
- default_health_check = gcp.compute.HealthCheck("default",
2273
- name="ssl-proxy-health-check",
2274
- timeout_sec=1,
2275
- check_interval_sec=1,
2276
- tcp_health_check=gcp.compute.HealthCheckTcpHealthCheckArgs(
2277
- port=443,
2278
- ))
2279
- # instance template
2280
- default_instance_template = gcp.compute.InstanceTemplate("default",
2281
- network_interfaces=[gcp.compute.InstanceTemplateNetworkInterfaceArgs(
2282
- access_configs=[gcp.compute.InstanceTemplateNetworkInterfaceAccessConfigArgs()],
2283
- network=default.id,
2284
- subnetwork=default_subnetwork.id,
2285
- )],
2286
- name="ssl-proxy-xlb-mig-template",
2287
- machine_type="e2-small",
2288
- tags=["allow-health-check"],
2289
- disks=[gcp.compute.InstanceTemplateDiskArgs(
2290
- source_image="debian-cloud/debian-10",
2291
- auto_delete=True,
2292
- boot=True,
2293
- )],
2294
- metadata={
2295
- "startup-script": \"\"\"#! /bin/bash
2296
- set -euo pipefail
2297
- export DEBIAN_FRONTEND=noninteractive
2298
- sudo apt-get update
2299
- sudo apt-get install -y apache2 jq
2300
- sudo a2ensite default-ssl
2301
- sudo a2enmod ssl
2302
- sudo service apache2 restart
2303
- NAME=$(curl -H "Metadata-Flavor: Google" "http://metadata.google.internal/computeMetadata/v1/instance/hostname")
2304
- IP=$(curl -H "Metadata-Flavor: Google" "http://metadata.google.internal/computeMetadata/v1/instance/network-interfaces/0/ip")
2305
- METADATA=$(curl -f -H "Metadata-Flavor: Google" "http://metadata.google.internal/computeMetadata/v1/instance/attributes/?recursive=True" | jq 'del(.["startup-script"])')
2306
- cat <<EOF > /var/www/html/index.html
2307
- <h1>SSL Load Balancer</h1>
2308
- <pre>
2309
- Name: $NAME
2310
- IP: $IP
2311
- Metadata: $METADATA
2312
- </pre>
2313
- EOF
2314
- \"\"\",
2315
- })
2316
- # MIG
2317
- default_instance_group_manager = gcp.compute.InstanceGroupManager("default",
2318
- name="ssl-proxy-xlb-mig1",
2319
- zone="us-central1-c",
2320
- named_ports=[gcp.compute.InstanceGroupManagerNamedPortArgs(
2321
- name="tcp",
2322
- port=443,
2323
- )],
2324
- versions=[gcp.compute.InstanceGroupManagerVersionArgs(
2325
- instance_template=default_instance_template.id,
2326
- name="primary",
2327
- )],
2328
- base_instance_name="vm",
2329
- target_size=2)
2330
- # backend service
2331
- default_backend_service = gcp.compute.BackendService("default",
2332
- name="ssl-proxy-xlb-backend-service",
2333
- protocol="SSL",
2334
- port_name="tcp",
2335
- load_balancing_scheme="EXTERNAL",
2336
- timeout_sec=10,
2337
- health_checks=default_health_check.id,
2338
- backends=[gcp.compute.BackendServiceBackendArgs(
2339
- group=default_instance_group_manager.instance_group,
2340
- balancing_mode="UTILIZATION",
2341
- max_utilization=1,
2342
- capacity_scaler=1,
2343
- )])
2344
- default_target_ssl_proxy = gcp.compute.TargetSSLProxy("default",
2345
- name="test-proxy",
2346
- backend_service=default_backend_service.id,
2347
- ssl_certificates=[default_ssl_certificate.id])
2348
- # forwarding rule
2349
- default_global_forwarding_rule = gcp.compute.GlobalForwardingRule("default",
2350
- name="ssl-proxy-xlb-forwarding-rule",
2351
- ip_protocol="TCP",
2352
- load_balancing_scheme="EXTERNAL",
2353
- port_range="443",
2354
- target=default_target_ssl_proxy.id,
2355
- ip_address=default_global_address.id)
2356
- # allow access from health check ranges
2357
- default_firewall = gcp.compute.Firewall("default",
2358
- name="ssl-proxy-xlb-fw-allow-hc",
2359
- direction="INGRESS",
2360
- network=default.id,
2361
- source_ranges=[
2362
- "130.211.0.0/22",
2363
- "35.191.0.0/16",
2364
- ],
2365
- allows=[gcp.compute.FirewallAllowArgs(
2366
- protocol="tcp",
2367
- )],
2368
- target_tags=["allow-health-check"])
2369
- ```
2370
2088
  ### External Tcp Proxy Lb Mig Backend
2371
2089
 
2372
2090
  ```python