pulumi-gcp 7.23.0__py3-none-any.whl → 7.23.0a1715695885__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +0 -24
- pulumi_gcp/bigquery/table.py +0 -47
- pulumi_gcp/bigtable/__init__.py +0 -1
- pulumi_gcp/bigtable/_inputs.py +0 -101
- pulumi_gcp/bigtable/outputs.py +0 -119
- pulumi_gcp/certificateauthority/certificate_template.py +0 -70
- pulumi_gcp/cloudbuildv2/repository.py +2 -2
- pulumi_gcp/clouddeploy/_inputs.py +0 -96
- pulumi_gcp/clouddeploy/custom_target_type.py +0 -46
- pulumi_gcp/clouddeploy/delivery_pipeline.py +7 -7
- pulumi_gcp/clouddeploy/outputs.py +1 -96
- pulumi_gcp/clouddeploy/target.py +7 -54
- pulumi_gcp/compute/_inputs.py +0 -689
- pulumi_gcp/compute/firewall_policy_rule.py +10 -125
- pulumi_gcp/compute/network_firewall_policy_rule.py +10 -125
- pulumi_gcp/compute/outputs.py +0 -684
- pulumi_gcp/compute/region_network_firewall_policy_rule.py +10 -125
- pulumi_gcp/compute/region_security_policy_rule.py +1 -230
- pulumi_gcp/container/_inputs.py +3 -67
- pulumi_gcp/container/outputs.py +4 -93
- pulumi_gcp/dataflow/flex_template_job.py +7 -7
- pulumi_gcp/dataflow/job.py +7 -7
- pulumi_gcp/iam/_inputs.py +2 -191
- pulumi_gcp/iam/outputs.py +2 -197
- pulumi_gcp/iam/workforce_pool_provider.py +0 -245
- pulumi_gcp/integrationconnectors/__init__.py +0 -1
- pulumi_gcp/networkconnectivity/__init__.py +0 -1
- pulumi_gcp/networksecurity/firewall_endpoint.py +0 -34
- pulumi_gcp/networksecurity/firewall_endpoint_association.py +0 -24
- pulumi_gcp/networksecurity/security_profile.py +0 -16
- pulumi_gcp/networksecurity/security_profile_group.py +0 -18
- pulumi_gcp/networksecurity/tls_inspection_policy.py +0 -16
- pulumi_gcp/orgpolicy/policy.py +2 -2
- pulumi_gcp/pubsub/subscription.py +4 -4
- pulumi_gcp/pulumi-plugin.json +1 -1
- {pulumi_gcp-7.23.0.dist-info → pulumi_gcp-7.23.0a1715695885.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.23.0.dist-info → pulumi_gcp-7.23.0a1715695885.dist-info}/RECORD +39 -42
- pulumi_gcp/bigtable/authorized_view.py +0 -440
- pulumi_gcp/integrationconnectors/managed_zone.py +0 -753
- pulumi_gcp/networkconnectivity/regional_endpoint.py +0 -946
- {pulumi_gcp-7.23.0.dist-info → pulumi_gcp-7.23.0a1715695885.dist-info}/WHEEL +0 -0
- {pulumi_gcp-7.23.0.dist-info → pulumi_gcp-7.23.0a1715695885.dist-info}/top_level.txt +0 -0
@@ -26,13 +26,11 @@ class NetworkFirewallPolicyRuleArgs:
|
|
26
26
|
enable_logging: Optional[pulumi.Input[bool]] = None,
|
27
27
|
project: Optional[pulumi.Input[str]] = None,
|
28
28
|
rule_name: Optional[pulumi.Input[str]] = None,
|
29
|
-
security_profile_group: Optional[pulumi.Input[str]] = None,
|
30
29
|
target_secure_tags: Optional[pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]] = None,
|
31
|
-
target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None
|
32
|
-
tls_inspect: Optional[pulumi.Input[bool]] = None):
|
30
|
+
target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
33
31
|
"""
|
34
32
|
The set of arguments for constructing a NetworkFirewallPolicyRule resource.
|
35
|
-
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny"
|
33
|
+
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "goto_next".
|
36
34
|
:param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
|
37
35
|
:param pulumi.Input[str] firewall_policy: The firewall policy of the resource.
|
38
36
|
:param pulumi.Input['NetworkFirewallPolicyRuleMatchArgs'] match: A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
|
@@ -45,9 +43,6 @@ class NetworkFirewallPolicyRuleArgs:
|
|
45
43
|
"goto_next" rules.
|
46
44
|
:param pulumi.Input[str] project: The project for the resource
|
47
45
|
:param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
|
48
|
-
:param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
|
49
|
-
https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
|
50
|
-
It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
51
46
|
:param pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
|
52
47
|
specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
|
53
48
|
tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
|
@@ -55,8 +50,6 @@ class NetworkFirewallPolicyRuleArgs:
|
|
55
50
|
<code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
|
56
51
|
instances on the specified network. Maximum number of target label tags allowed is 256.
|
57
52
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
|
58
|
-
:param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
|
59
|
-
'apply_security_profile_group' and cannot be set for other actions.
|
60
53
|
"""
|
61
54
|
pulumi.set(__self__, "action", action)
|
62
55
|
pulumi.set(__self__, "direction", direction)
|
@@ -73,20 +66,16 @@ class NetworkFirewallPolicyRuleArgs:
|
|
73
66
|
pulumi.set(__self__, "project", project)
|
74
67
|
if rule_name is not None:
|
75
68
|
pulumi.set(__self__, "rule_name", rule_name)
|
76
|
-
if security_profile_group is not None:
|
77
|
-
pulumi.set(__self__, "security_profile_group", security_profile_group)
|
78
69
|
if target_secure_tags is not None:
|
79
70
|
pulumi.set(__self__, "target_secure_tags", target_secure_tags)
|
80
71
|
if target_service_accounts is not None:
|
81
72
|
pulumi.set(__self__, "target_service_accounts", target_service_accounts)
|
82
|
-
if tls_inspect is not None:
|
83
|
-
pulumi.set(__self__, "tls_inspect", tls_inspect)
|
84
73
|
|
85
74
|
@property
|
86
75
|
@pulumi.getter
|
87
76
|
def action(self) -> pulumi.Input[str]:
|
88
77
|
"""
|
89
|
-
The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny"
|
78
|
+
The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "goto_next".
|
90
79
|
"""
|
91
80
|
return pulumi.get(self, "action")
|
92
81
|
|
@@ -205,20 +194,6 @@ class NetworkFirewallPolicyRuleArgs:
|
|
205
194
|
def rule_name(self, value: Optional[pulumi.Input[str]]):
|
206
195
|
pulumi.set(self, "rule_name", value)
|
207
196
|
|
208
|
-
@property
|
209
|
-
@pulumi.getter(name="securityProfileGroup")
|
210
|
-
def security_profile_group(self) -> Optional[pulumi.Input[str]]:
|
211
|
-
"""
|
212
|
-
A fully-qualified URL of a SecurityProfileGroup resource. Example:
|
213
|
-
https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
|
214
|
-
It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
215
|
-
"""
|
216
|
-
return pulumi.get(self, "security_profile_group")
|
217
|
-
|
218
|
-
@security_profile_group.setter
|
219
|
-
def security_profile_group(self, value: Optional[pulumi.Input[str]]):
|
220
|
-
pulumi.set(self, "security_profile_group", value)
|
221
|
-
|
222
197
|
@property
|
223
198
|
@pulumi.getter(name="targetSecureTags")
|
224
199
|
def target_secure_tags(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]]:
|
@@ -248,19 +223,6 @@ class NetworkFirewallPolicyRuleArgs:
|
|
248
223
|
def target_service_accounts(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
249
224
|
pulumi.set(self, "target_service_accounts", value)
|
250
225
|
|
251
|
-
@property
|
252
|
-
@pulumi.getter(name="tlsInspect")
|
253
|
-
def tls_inspect(self) -> Optional[pulumi.Input[bool]]:
|
254
|
-
"""
|
255
|
-
Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
|
256
|
-
'apply_security_profile_group' and cannot be set for other actions.
|
257
|
-
"""
|
258
|
-
return pulumi.get(self, "tls_inspect")
|
259
|
-
|
260
|
-
@tls_inspect.setter
|
261
|
-
def tls_inspect(self, value: Optional[pulumi.Input[bool]]):
|
262
|
-
pulumi.set(self, "tls_inspect", value)
|
263
|
-
|
264
226
|
|
265
227
|
@pulumi.input_type
|
266
228
|
class _NetworkFirewallPolicyRuleState:
|
@@ -277,13 +239,11 @@ class _NetworkFirewallPolicyRuleState:
|
|
277
239
|
project: Optional[pulumi.Input[str]] = None,
|
278
240
|
rule_name: Optional[pulumi.Input[str]] = None,
|
279
241
|
rule_tuple_count: Optional[pulumi.Input[int]] = None,
|
280
|
-
security_profile_group: Optional[pulumi.Input[str]] = None,
|
281
242
|
target_secure_tags: Optional[pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]] = None,
|
282
|
-
target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None
|
283
|
-
tls_inspect: Optional[pulumi.Input[bool]] = None):
|
243
|
+
target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
284
244
|
"""
|
285
245
|
Input properties used for looking up and filtering NetworkFirewallPolicyRule resources.
|
286
|
-
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny"
|
246
|
+
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "goto_next".
|
287
247
|
:param pulumi.Input[str] description: An optional description for this resource.
|
288
248
|
:param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
|
289
249
|
:param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
|
@@ -298,9 +258,6 @@ class _NetworkFirewallPolicyRuleState:
|
|
298
258
|
:param pulumi.Input[str] project: The project for the resource
|
299
259
|
:param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
|
300
260
|
:param pulumi.Input[int] rule_tuple_count: Calculation of the complexity of a single firewall policy rule.
|
301
|
-
:param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
|
302
|
-
https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
|
303
|
-
It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
304
261
|
:param pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
|
305
262
|
specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
|
306
263
|
tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
|
@@ -308,8 +265,6 @@ class _NetworkFirewallPolicyRuleState:
|
|
308
265
|
<code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
|
309
266
|
instances on the specified network. Maximum number of target label tags allowed is 256.
|
310
267
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
|
311
|
-
:param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
|
312
|
-
'apply_security_profile_group' and cannot be set for other actions.
|
313
268
|
"""
|
314
269
|
if action is not None:
|
315
270
|
pulumi.set(__self__, "action", action)
|
@@ -335,20 +290,16 @@ class _NetworkFirewallPolicyRuleState:
|
|
335
290
|
pulumi.set(__self__, "rule_name", rule_name)
|
336
291
|
if rule_tuple_count is not None:
|
337
292
|
pulumi.set(__self__, "rule_tuple_count", rule_tuple_count)
|
338
|
-
if security_profile_group is not None:
|
339
|
-
pulumi.set(__self__, "security_profile_group", security_profile_group)
|
340
293
|
if target_secure_tags is not None:
|
341
294
|
pulumi.set(__self__, "target_secure_tags", target_secure_tags)
|
342
295
|
if target_service_accounts is not None:
|
343
296
|
pulumi.set(__self__, "target_service_accounts", target_service_accounts)
|
344
|
-
if tls_inspect is not None:
|
345
|
-
pulumi.set(__self__, "tls_inspect", tls_inspect)
|
346
297
|
|
347
298
|
@property
|
348
299
|
@pulumi.getter
|
349
300
|
def action(self) -> Optional[pulumi.Input[str]]:
|
350
301
|
"""
|
351
|
-
The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny"
|
302
|
+
The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "goto_next".
|
352
303
|
"""
|
353
304
|
return pulumi.get(self, "action")
|
354
305
|
|
@@ -491,20 +442,6 @@ class _NetworkFirewallPolicyRuleState:
|
|
491
442
|
def rule_tuple_count(self, value: Optional[pulumi.Input[int]]):
|
492
443
|
pulumi.set(self, "rule_tuple_count", value)
|
493
444
|
|
494
|
-
@property
|
495
|
-
@pulumi.getter(name="securityProfileGroup")
|
496
|
-
def security_profile_group(self) -> Optional[pulumi.Input[str]]:
|
497
|
-
"""
|
498
|
-
A fully-qualified URL of a SecurityProfileGroup resource. Example:
|
499
|
-
https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
|
500
|
-
It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
501
|
-
"""
|
502
|
-
return pulumi.get(self, "security_profile_group")
|
503
|
-
|
504
|
-
@security_profile_group.setter
|
505
|
-
def security_profile_group(self, value: Optional[pulumi.Input[str]]):
|
506
|
-
pulumi.set(self, "security_profile_group", value)
|
507
|
-
|
508
445
|
@property
|
509
446
|
@pulumi.getter(name="targetSecureTags")
|
510
447
|
def target_secure_tags(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]]:
|
@@ -534,19 +471,6 @@ class _NetworkFirewallPolicyRuleState:
|
|
534
471
|
def target_service_accounts(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
535
472
|
pulumi.set(self, "target_service_accounts", value)
|
536
473
|
|
537
|
-
@property
|
538
|
-
@pulumi.getter(name="tlsInspect")
|
539
|
-
def tls_inspect(self) -> Optional[pulumi.Input[bool]]:
|
540
|
-
"""
|
541
|
-
Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
|
542
|
-
'apply_security_profile_group' and cannot be set for other actions.
|
543
|
-
"""
|
544
|
-
return pulumi.get(self, "tls_inspect")
|
545
|
-
|
546
|
-
@tls_inspect.setter
|
547
|
-
def tls_inspect(self, value: Optional[pulumi.Input[bool]]):
|
548
|
-
pulumi.set(self, "tls_inspect", value)
|
549
|
-
|
550
474
|
|
551
475
|
class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
552
476
|
@overload
|
@@ -563,10 +487,8 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
563
487
|
priority: Optional[pulumi.Input[int]] = None,
|
564
488
|
project: Optional[pulumi.Input[str]] = None,
|
565
489
|
rule_name: Optional[pulumi.Input[str]] = None,
|
566
|
-
security_profile_group: Optional[pulumi.Input[str]] = None,
|
567
490
|
target_secure_tags: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]]] = None,
|
568
491
|
target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
569
|
-
tls_inspect: Optional[pulumi.Input[bool]] = None,
|
570
492
|
__props__=None):
|
571
493
|
"""
|
572
494
|
The Compute NetworkFirewallPolicyRule resource
|
@@ -654,7 +576,7 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
654
576
|
|
655
577
|
:param str resource_name: The name of the resource.
|
656
578
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
657
|
-
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny"
|
579
|
+
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "goto_next".
|
658
580
|
:param pulumi.Input[str] description: An optional description for this resource.
|
659
581
|
:param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
|
660
582
|
:param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
|
@@ -667,9 +589,6 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
667
589
|
:param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
|
668
590
|
:param pulumi.Input[str] project: The project for the resource
|
669
591
|
:param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
|
670
|
-
:param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
|
671
|
-
https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
|
672
|
-
It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
673
592
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
|
674
593
|
specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
|
675
594
|
tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
|
@@ -677,8 +596,6 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
677
596
|
<code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
|
678
597
|
instances on the specified network. Maximum number of target label tags allowed is 256.
|
679
598
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
|
680
|
-
:param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
|
681
|
-
'apply_security_profile_group' and cannot be set for other actions.
|
682
599
|
"""
|
683
600
|
...
|
684
601
|
@overload
|
@@ -795,10 +712,8 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
795
712
|
priority: Optional[pulumi.Input[int]] = None,
|
796
713
|
project: Optional[pulumi.Input[str]] = None,
|
797
714
|
rule_name: Optional[pulumi.Input[str]] = None,
|
798
|
-
security_profile_group: Optional[pulumi.Input[str]] = None,
|
799
715
|
target_secure_tags: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]]] = None,
|
800
716
|
target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
801
|
-
tls_inspect: Optional[pulumi.Input[bool]] = None,
|
802
717
|
__props__=None):
|
803
718
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
804
719
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -828,10 +743,8 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
828
743
|
__props__.__dict__["priority"] = priority
|
829
744
|
__props__.__dict__["project"] = project
|
830
745
|
__props__.__dict__["rule_name"] = rule_name
|
831
|
-
__props__.__dict__["security_profile_group"] = security_profile_group
|
832
746
|
__props__.__dict__["target_secure_tags"] = target_secure_tags
|
833
747
|
__props__.__dict__["target_service_accounts"] = target_service_accounts
|
834
|
-
__props__.__dict__["tls_inspect"] = tls_inspect
|
835
748
|
__props__.__dict__["kind"] = None
|
836
749
|
__props__.__dict__["rule_tuple_count"] = None
|
837
750
|
super(NetworkFirewallPolicyRule, __self__).__init__(
|
@@ -856,10 +769,8 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
856
769
|
project: Optional[pulumi.Input[str]] = None,
|
857
770
|
rule_name: Optional[pulumi.Input[str]] = None,
|
858
771
|
rule_tuple_count: Optional[pulumi.Input[int]] = None,
|
859
|
-
security_profile_group: Optional[pulumi.Input[str]] = None,
|
860
772
|
target_secure_tags: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]]] = None,
|
861
|
-
target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None
|
862
|
-
tls_inspect: Optional[pulumi.Input[bool]] = None) -> 'NetworkFirewallPolicyRule':
|
773
|
+
target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None) -> 'NetworkFirewallPolicyRule':
|
863
774
|
"""
|
864
775
|
Get an existing NetworkFirewallPolicyRule resource's state with the given name, id, and optional extra
|
865
776
|
properties used to qualify the lookup.
|
@@ -867,7 +778,7 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
867
778
|
:param str resource_name: The unique name of the resulting resource.
|
868
779
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
869
780
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
870
|
-
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny"
|
781
|
+
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "goto_next".
|
871
782
|
:param pulumi.Input[str] description: An optional description for this resource.
|
872
783
|
:param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
|
873
784
|
:param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
|
@@ -882,9 +793,6 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
882
793
|
:param pulumi.Input[str] project: The project for the resource
|
883
794
|
:param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
|
884
795
|
:param pulumi.Input[int] rule_tuple_count: Calculation of the complexity of a single firewall policy rule.
|
885
|
-
:param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
|
886
|
-
https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
|
887
|
-
It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
888
796
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
|
889
797
|
specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
|
890
798
|
tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
|
@@ -892,8 +800,6 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
892
800
|
<code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
|
893
801
|
instances on the specified network. Maximum number of target label tags allowed is 256.
|
894
802
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
|
895
|
-
:param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
|
896
|
-
'apply_security_profile_group' and cannot be set for other actions.
|
897
803
|
"""
|
898
804
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
899
805
|
|
@@ -911,17 +817,15 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
911
817
|
__props__.__dict__["project"] = project
|
912
818
|
__props__.__dict__["rule_name"] = rule_name
|
913
819
|
__props__.__dict__["rule_tuple_count"] = rule_tuple_count
|
914
|
-
__props__.__dict__["security_profile_group"] = security_profile_group
|
915
820
|
__props__.__dict__["target_secure_tags"] = target_secure_tags
|
916
821
|
__props__.__dict__["target_service_accounts"] = target_service_accounts
|
917
|
-
__props__.__dict__["tls_inspect"] = tls_inspect
|
918
822
|
return NetworkFirewallPolicyRule(resource_name, opts=opts, __props__=__props__)
|
919
823
|
|
920
824
|
@property
|
921
825
|
@pulumi.getter
|
922
826
|
def action(self) -> pulumi.Output[str]:
|
923
827
|
"""
|
924
|
-
The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny"
|
828
|
+
The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "goto_next".
|
925
829
|
"""
|
926
830
|
return pulumi.get(self, "action")
|
927
831
|
|
@@ -1016,16 +920,6 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
1016
920
|
"""
|
1017
921
|
return pulumi.get(self, "rule_tuple_count")
|
1018
922
|
|
1019
|
-
@property
|
1020
|
-
@pulumi.getter(name="securityProfileGroup")
|
1021
|
-
def security_profile_group(self) -> pulumi.Output[Optional[str]]:
|
1022
|
-
"""
|
1023
|
-
A fully-qualified URL of a SecurityProfileGroup resource. Example:
|
1024
|
-
https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
|
1025
|
-
It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
1026
|
-
"""
|
1027
|
-
return pulumi.get(self, "security_profile_group")
|
1028
|
-
|
1029
923
|
@property
|
1030
924
|
@pulumi.getter(name="targetSecureTags")
|
1031
925
|
def target_secure_tags(self) -> pulumi.Output[Optional[Sequence['outputs.NetworkFirewallPolicyRuleTargetSecureTag']]]:
|
@@ -1047,12 +941,3 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
1047
941
|
"""
|
1048
942
|
return pulumi.get(self, "target_service_accounts")
|
1049
943
|
|
1050
|
-
@property
|
1051
|
-
@pulumi.getter(name="tlsInspect")
|
1052
|
-
def tls_inspect(self) -> pulumi.Output[Optional[bool]]:
|
1053
|
-
"""
|
1054
|
-
Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
|
1055
|
-
'apply_security_profile_group' and cannot be set for other actions.
|
1056
|
-
"""
|
1057
|
-
return pulumi.get(self, "tls_inspect")
|
1058
|
-
|