pulumi-gcp 7.23.0__py3-none-any.whl → 7.23.0a1715621482__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (42) hide show
  1. pulumi_gcp/__init__.py +0 -24
  2. pulumi_gcp/bigquery/table.py +0 -47
  3. pulumi_gcp/bigtable/__init__.py +0 -1
  4. pulumi_gcp/bigtable/_inputs.py +0 -101
  5. pulumi_gcp/bigtable/outputs.py +0 -119
  6. pulumi_gcp/certificateauthority/certificate_template.py +0 -70
  7. pulumi_gcp/cloudbuildv2/repository.py +2 -2
  8. pulumi_gcp/clouddeploy/_inputs.py +0 -96
  9. pulumi_gcp/clouddeploy/custom_target_type.py +0 -46
  10. pulumi_gcp/clouddeploy/delivery_pipeline.py +7 -7
  11. pulumi_gcp/clouddeploy/outputs.py +1 -96
  12. pulumi_gcp/clouddeploy/target.py +7 -54
  13. pulumi_gcp/compute/_inputs.py +0 -689
  14. pulumi_gcp/compute/firewall_policy_rule.py +10 -125
  15. pulumi_gcp/compute/network_firewall_policy_rule.py +10 -125
  16. pulumi_gcp/compute/outputs.py +0 -684
  17. pulumi_gcp/compute/region_network_firewall_policy_rule.py +10 -125
  18. pulumi_gcp/compute/region_security_policy_rule.py +1 -230
  19. pulumi_gcp/container/_inputs.py +3 -67
  20. pulumi_gcp/container/outputs.py +4 -93
  21. pulumi_gcp/dataflow/flex_template_job.py +7 -7
  22. pulumi_gcp/dataflow/job.py +7 -7
  23. pulumi_gcp/iam/_inputs.py +2 -191
  24. pulumi_gcp/iam/outputs.py +2 -197
  25. pulumi_gcp/iam/workforce_pool_provider.py +0 -245
  26. pulumi_gcp/integrationconnectors/__init__.py +0 -1
  27. pulumi_gcp/networkconnectivity/__init__.py +0 -1
  28. pulumi_gcp/networksecurity/firewall_endpoint.py +0 -34
  29. pulumi_gcp/networksecurity/firewall_endpoint_association.py +0 -24
  30. pulumi_gcp/networksecurity/security_profile.py +0 -16
  31. pulumi_gcp/networksecurity/security_profile_group.py +0 -18
  32. pulumi_gcp/networksecurity/tls_inspection_policy.py +0 -16
  33. pulumi_gcp/orgpolicy/policy.py +2 -2
  34. pulumi_gcp/pubsub/subscription.py +4 -4
  35. pulumi_gcp/pulumi-plugin.json +1 -2
  36. {pulumi_gcp-7.23.0.dist-info → pulumi_gcp-7.23.0a1715621482.dist-info}/METADATA +1 -1
  37. {pulumi_gcp-7.23.0.dist-info → pulumi_gcp-7.23.0a1715621482.dist-info}/RECORD +39 -42
  38. pulumi_gcp/bigtable/authorized_view.py +0 -440
  39. pulumi_gcp/integrationconnectors/managed_zone.py +0 -753
  40. pulumi_gcp/networkconnectivity/regional_endpoint.py +0 -946
  41. {pulumi_gcp-7.23.0.dist-info → pulumi_gcp-7.23.0a1715621482.dist-info}/WHEEL +0 -0
  42. {pulumi_gcp-7.23.0.dist-info → pulumi_gcp-7.23.0a1715621482.dist-info}/top_level.txt +0 -0
@@ -26,13 +26,11 @@ class NetworkFirewallPolicyRuleArgs:
26
26
  enable_logging: Optional[pulumi.Input[bool]] = None,
27
27
  project: Optional[pulumi.Input[str]] = None,
28
28
  rule_name: Optional[pulumi.Input[str]] = None,
29
- security_profile_group: Optional[pulumi.Input[str]] = None,
30
29
  target_secure_tags: Optional[pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]] = None,
31
- target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
32
- tls_inspect: Optional[pulumi.Input[bool]] = None):
30
+ target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
33
31
  """
34
32
  The set of arguments for constructing a NetworkFirewallPolicyRule resource.
35
- :param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
33
+ :param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "goto_next".
36
34
  :param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
37
35
  :param pulumi.Input[str] firewall_policy: The firewall policy of the resource.
38
36
  :param pulumi.Input['NetworkFirewallPolicyRuleMatchArgs'] match: A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
@@ -45,9 +43,6 @@ class NetworkFirewallPolicyRuleArgs:
45
43
  "goto_next" rules.
46
44
  :param pulumi.Input[str] project: The project for the resource
47
45
  :param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
48
- :param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
49
- https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
50
- It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
51
46
  :param pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
52
47
  specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
53
48
  tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
@@ -55,8 +50,6 @@ class NetworkFirewallPolicyRuleArgs:
55
50
  <code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
56
51
  instances on the specified network. Maximum number of target label tags allowed is 256.
57
52
  :param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
58
- :param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
59
- 'apply_security_profile_group' and cannot be set for other actions.
60
53
  """
61
54
  pulumi.set(__self__, "action", action)
62
55
  pulumi.set(__self__, "direction", direction)
@@ -73,20 +66,16 @@ class NetworkFirewallPolicyRuleArgs:
73
66
  pulumi.set(__self__, "project", project)
74
67
  if rule_name is not None:
75
68
  pulumi.set(__self__, "rule_name", rule_name)
76
- if security_profile_group is not None:
77
- pulumi.set(__self__, "security_profile_group", security_profile_group)
78
69
  if target_secure_tags is not None:
79
70
  pulumi.set(__self__, "target_secure_tags", target_secure_tags)
80
71
  if target_service_accounts is not None:
81
72
  pulumi.set(__self__, "target_service_accounts", target_service_accounts)
82
- if tls_inspect is not None:
83
- pulumi.set(__self__, "tls_inspect", tls_inspect)
84
73
 
85
74
  @property
86
75
  @pulumi.getter
87
76
  def action(self) -> pulumi.Input[str]:
88
77
  """
89
- The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
78
+ The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "goto_next".
90
79
  """
91
80
  return pulumi.get(self, "action")
92
81
 
@@ -205,20 +194,6 @@ class NetworkFirewallPolicyRuleArgs:
205
194
  def rule_name(self, value: Optional[pulumi.Input[str]]):
206
195
  pulumi.set(self, "rule_name", value)
207
196
 
208
- @property
209
- @pulumi.getter(name="securityProfileGroup")
210
- def security_profile_group(self) -> Optional[pulumi.Input[str]]:
211
- """
212
- A fully-qualified URL of a SecurityProfileGroup resource. Example:
213
- https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
214
- It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
215
- """
216
- return pulumi.get(self, "security_profile_group")
217
-
218
- @security_profile_group.setter
219
- def security_profile_group(self, value: Optional[pulumi.Input[str]]):
220
- pulumi.set(self, "security_profile_group", value)
221
-
222
197
  @property
223
198
  @pulumi.getter(name="targetSecureTags")
224
199
  def target_secure_tags(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]]:
@@ -248,19 +223,6 @@ class NetworkFirewallPolicyRuleArgs:
248
223
  def target_service_accounts(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
249
224
  pulumi.set(self, "target_service_accounts", value)
250
225
 
251
- @property
252
- @pulumi.getter(name="tlsInspect")
253
- def tls_inspect(self) -> Optional[pulumi.Input[bool]]:
254
- """
255
- Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
256
- 'apply_security_profile_group' and cannot be set for other actions.
257
- """
258
- return pulumi.get(self, "tls_inspect")
259
-
260
- @tls_inspect.setter
261
- def tls_inspect(self, value: Optional[pulumi.Input[bool]]):
262
- pulumi.set(self, "tls_inspect", value)
263
-
264
226
 
265
227
  @pulumi.input_type
266
228
  class _NetworkFirewallPolicyRuleState:
@@ -277,13 +239,11 @@ class _NetworkFirewallPolicyRuleState:
277
239
  project: Optional[pulumi.Input[str]] = None,
278
240
  rule_name: Optional[pulumi.Input[str]] = None,
279
241
  rule_tuple_count: Optional[pulumi.Input[int]] = None,
280
- security_profile_group: Optional[pulumi.Input[str]] = None,
281
242
  target_secure_tags: Optional[pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]] = None,
282
- target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
283
- tls_inspect: Optional[pulumi.Input[bool]] = None):
243
+ target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
284
244
  """
285
245
  Input properties used for looking up and filtering NetworkFirewallPolicyRule resources.
286
- :param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
246
+ :param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "goto_next".
287
247
  :param pulumi.Input[str] description: An optional description for this resource.
288
248
  :param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
289
249
  :param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
@@ -298,9 +258,6 @@ class _NetworkFirewallPolicyRuleState:
298
258
  :param pulumi.Input[str] project: The project for the resource
299
259
  :param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
300
260
  :param pulumi.Input[int] rule_tuple_count: Calculation of the complexity of a single firewall policy rule.
301
- :param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
302
- https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
303
- It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
304
261
  :param pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
305
262
  specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
306
263
  tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
@@ -308,8 +265,6 @@ class _NetworkFirewallPolicyRuleState:
308
265
  <code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
309
266
  instances on the specified network. Maximum number of target label tags allowed is 256.
310
267
  :param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
311
- :param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
312
- 'apply_security_profile_group' and cannot be set for other actions.
313
268
  """
314
269
  if action is not None:
315
270
  pulumi.set(__self__, "action", action)
@@ -335,20 +290,16 @@ class _NetworkFirewallPolicyRuleState:
335
290
  pulumi.set(__self__, "rule_name", rule_name)
336
291
  if rule_tuple_count is not None:
337
292
  pulumi.set(__self__, "rule_tuple_count", rule_tuple_count)
338
- if security_profile_group is not None:
339
- pulumi.set(__self__, "security_profile_group", security_profile_group)
340
293
  if target_secure_tags is not None:
341
294
  pulumi.set(__self__, "target_secure_tags", target_secure_tags)
342
295
  if target_service_accounts is not None:
343
296
  pulumi.set(__self__, "target_service_accounts", target_service_accounts)
344
- if tls_inspect is not None:
345
- pulumi.set(__self__, "tls_inspect", tls_inspect)
346
297
 
347
298
  @property
348
299
  @pulumi.getter
349
300
  def action(self) -> Optional[pulumi.Input[str]]:
350
301
  """
351
- The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
302
+ The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "goto_next".
352
303
  """
353
304
  return pulumi.get(self, "action")
354
305
 
@@ -491,20 +442,6 @@ class _NetworkFirewallPolicyRuleState:
491
442
  def rule_tuple_count(self, value: Optional[pulumi.Input[int]]):
492
443
  pulumi.set(self, "rule_tuple_count", value)
493
444
 
494
- @property
495
- @pulumi.getter(name="securityProfileGroup")
496
- def security_profile_group(self) -> Optional[pulumi.Input[str]]:
497
- """
498
- A fully-qualified URL of a SecurityProfileGroup resource. Example:
499
- https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
500
- It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
501
- """
502
- return pulumi.get(self, "security_profile_group")
503
-
504
- @security_profile_group.setter
505
- def security_profile_group(self, value: Optional[pulumi.Input[str]]):
506
- pulumi.set(self, "security_profile_group", value)
507
-
508
445
  @property
509
446
  @pulumi.getter(name="targetSecureTags")
510
447
  def target_secure_tags(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]]:
@@ -534,19 +471,6 @@ class _NetworkFirewallPolicyRuleState:
534
471
  def target_service_accounts(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
535
472
  pulumi.set(self, "target_service_accounts", value)
536
473
 
537
- @property
538
- @pulumi.getter(name="tlsInspect")
539
- def tls_inspect(self) -> Optional[pulumi.Input[bool]]:
540
- """
541
- Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
542
- 'apply_security_profile_group' and cannot be set for other actions.
543
- """
544
- return pulumi.get(self, "tls_inspect")
545
-
546
- @tls_inspect.setter
547
- def tls_inspect(self, value: Optional[pulumi.Input[bool]]):
548
- pulumi.set(self, "tls_inspect", value)
549
-
550
474
 
551
475
  class NetworkFirewallPolicyRule(pulumi.CustomResource):
552
476
  @overload
@@ -563,10 +487,8 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
563
487
  priority: Optional[pulumi.Input[int]] = None,
564
488
  project: Optional[pulumi.Input[str]] = None,
565
489
  rule_name: Optional[pulumi.Input[str]] = None,
566
- security_profile_group: Optional[pulumi.Input[str]] = None,
567
490
  target_secure_tags: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]]] = None,
568
491
  target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
569
- tls_inspect: Optional[pulumi.Input[bool]] = None,
570
492
  __props__=None):
571
493
  """
572
494
  The Compute NetworkFirewallPolicyRule resource
@@ -654,7 +576,7 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
654
576
 
655
577
  :param str resource_name: The name of the resource.
656
578
  :param pulumi.ResourceOptions opts: Options for the resource.
657
- :param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
579
+ :param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "goto_next".
658
580
  :param pulumi.Input[str] description: An optional description for this resource.
659
581
  :param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
660
582
  :param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
@@ -667,9 +589,6 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
667
589
  :param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
668
590
  :param pulumi.Input[str] project: The project for the resource
669
591
  :param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
670
- :param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
671
- https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
672
- It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
673
592
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
674
593
  specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
675
594
  tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
@@ -677,8 +596,6 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
677
596
  <code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
678
597
  instances on the specified network. Maximum number of target label tags allowed is 256.
679
598
  :param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
680
- :param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
681
- 'apply_security_profile_group' and cannot be set for other actions.
682
599
  """
683
600
  ...
684
601
  @overload
@@ -795,10 +712,8 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
795
712
  priority: Optional[pulumi.Input[int]] = None,
796
713
  project: Optional[pulumi.Input[str]] = None,
797
714
  rule_name: Optional[pulumi.Input[str]] = None,
798
- security_profile_group: Optional[pulumi.Input[str]] = None,
799
715
  target_secure_tags: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]]] = None,
800
716
  target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
801
- tls_inspect: Optional[pulumi.Input[bool]] = None,
802
717
  __props__=None):
803
718
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
804
719
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -828,10 +743,8 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
828
743
  __props__.__dict__["priority"] = priority
829
744
  __props__.__dict__["project"] = project
830
745
  __props__.__dict__["rule_name"] = rule_name
831
- __props__.__dict__["security_profile_group"] = security_profile_group
832
746
  __props__.__dict__["target_secure_tags"] = target_secure_tags
833
747
  __props__.__dict__["target_service_accounts"] = target_service_accounts
834
- __props__.__dict__["tls_inspect"] = tls_inspect
835
748
  __props__.__dict__["kind"] = None
836
749
  __props__.__dict__["rule_tuple_count"] = None
837
750
  super(NetworkFirewallPolicyRule, __self__).__init__(
@@ -856,10 +769,8 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
856
769
  project: Optional[pulumi.Input[str]] = None,
857
770
  rule_name: Optional[pulumi.Input[str]] = None,
858
771
  rule_tuple_count: Optional[pulumi.Input[int]] = None,
859
- security_profile_group: Optional[pulumi.Input[str]] = None,
860
772
  target_secure_tags: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]]] = None,
861
- target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
862
- tls_inspect: Optional[pulumi.Input[bool]] = None) -> 'NetworkFirewallPolicyRule':
773
+ target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None) -> 'NetworkFirewallPolicyRule':
863
774
  """
864
775
  Get an existing NetworkFirewallPolicyRule resource's state with the given name, id, and optional extra
865
776
  properties used to qualify the lookup.
@@ -867,7 +778,7 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
867
778
  :param str resource_name: The unique name of the resulting resource.
868
779
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
869
780
  :param pulumi.ResourceOptions opts: Options for the resource.
870
- :param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
781
+ :param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "goto_next".
871
782
  :param pulumi.Input[str] description: An optional description for this resource.
872
783
  :param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
873
784
  :param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
@@ -882,9 +793,6 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
882
793
  :param pulumi.Input[str] project: The project for the resource
883
794
  :param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
884
795
  :param pulumi.Input[int] rule_tuple_count: Calculation of the complexity of a single firewall policy rule.
885
- :param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
886
- https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
887
- It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
888
796
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
889
797
  specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
890
798
  tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
@@ -892,8 +800,6 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
892
800
  <code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
893
801
  instances on the specified network. Maximum number of target label tags allowed is 256.
894
802
  :param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
895
- :param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
896
- 'apply_security_profile_group' and cannot be set for other actions.
897
803
  """
898
804
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
899
805
 
@@ -911,17 +817,15 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
911
817
  __props__.__dict__["project"] = project
912
818
  __props__.__dict__["rule_name"] = rule_name
913
819
  __props__.__dict__["rule_tuple_count"] = rule_tuple_count
914
- __props__.__dict__["security_profile_group"] = security_profile_group
915
820
  __props__.__dict__["target_secure_tags"] = target_secure_tags
916
821
  __props__.__dict__["target_service_accounts"] = target_service_accounts
917
- __props__.__dict__["tls_inspect"] = tls_inspect
918
822
  return NetworkFirewallPolicyRule(resource_name, opts=opts, __props__=__props__)
919
823
 
920
824
  @property
921
825
  @pulumi.getter
922
826
  def action(self) -> pulumi.Output[str]:
923
827
  """
924
- The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
828
+ The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "goto_next".
925
829
  """
926
830
  return pulumi.get(self, "action")
927
831
 
@@ -1016,16 +920,6 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
1016
920
  """
1017
921
  return pulumi.get(self, "rule_tuple_count")
1018
922
 
1019
- @property
1020
- @pulumi.getter(name="securityProfileGroup")
1021
- def security_profile_group(self) -> pulumi.Output[Optional[str]]:
1022
- """
1023
- A fully-qualified URL of a SecurityProfileGroup resource. Example:
1024
- https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
1025
- It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
1026
- """
1027
- return pulumi.get(self, "security_profile_group")
1028
-
1029
923
  @property
1030
924
  @pulumi.getter(name="targetSecureTags")
1031
925
  def target_secure_tags(self) -> pulumi.Output[Optional[Sequence['outputs.NetworkFirewallPolicyRuleTargetSecureTag']]]:
@@ -1047,12 +941,3 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
1047
941
  """
1048
942
  return pulumi.get(self, "target_service_accounts")
1049
943
 
1050
- @property
1051
- @pulumi.getter(name="tlsInspect")
1052
- def tls_inspect(self) -> pulumi.Output[Optional[bool]]:
1053
- """
1054
- Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
1055
- 'apply_security_profile_group' and cannot be set for other actions.
1056
- """
1057
- return pulumi.get(self, "tls_inspect")
1058
-