pulumi-gcp 7.23.0a1715621482__py3-none-any.whl → 7.23.0a1715808346__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +24 -0
- pulumi_gcp/bigquery/table.py +47 -0
- pulumi_gcp/bigtable/__init__.py +1 -0
- pulumi_gcp/bigtable/_inputs.py +101 -0
- pulumi_gcp/bigtable/authorized_view.py +440 -0
- pulumi_gcp/bigtable/outputs.py +119 -0
- pulumi_gcp/certificateauthority/certificate_template.py +70 -0
- pulumi_gcp/cloudbuildv2/repository.py +2 -2
- pulumi_gcp/clouddeploy/_inputs.py +96 -0
- pulumi_gcp/clouddeploy/custom_target_type.py +46 -0
- pulumi_gcp/clouddeploy/delivery_pipeline.py +7 -7
- pulumi_gcp/clouddeploy/outputs.py +96 -1
- pulumi_gcp/clouddeploy/target.py +54 -7
- pulumi_gcp/compute/_inputs.py +689 -0
- pulumi_gcp/compute/firewall_policy_rule.py +125 -10
- pulumi_gcp/compute/network_firewall_policy_rule.py +125 -10
- pulumi_gcp/compute/outputs.py +684 -0
- pulumi_gcp/compute/region_network_firewall_policy_rule.py +125 -10
- pulumi_gcp/compute/region_security_policy_rule.py +230 -1
- pulumi_gcp/container/_inputs.py +67 -3
- pulumi_gcp/container/outputs.py +93 -4
- pulumi_gcp/dataflow/flex_template_job.py +7 -7
- pulumi_gcp/dataflow/job.py +7 -7
- pulumi_gcp/iam/_inputs.py +191 -2
- pulumi_gcp/iam/outputs.py +197 -2
- pulumi_gcp/iam/workforce_pool_provider.py +245 -0
- pulumi_gcp/integrationconnectors/__init__.py +1 -0
- pulumi_gcp/integrationconnectors/managed_zone.py +753 -0
- pulumi_gcp/networkconnectivity/__init__.py +1 -0
- pulumi_gcp/networkconnectivity/regional_endpoint.py +946 -0
- pulumi_gcp/networksecurity/firewall_endpoint.py +34 -0
- pulumi_gcp/networksecurity/firewall_endpoint_association.py +24 -0
- pulumi_gcp/networksecurity/security_profile.py +16 -0
- pulumi_gcp/networksecurity/security_profile_group.py +18 -0
- pulumi_gcp/networksecurity/tls_inspection_policy.py +16 -0
- pulumi_gcp/orgpolicy/policy.py +2 -2
- pulumi_gcp/pubsub/subscription.py +4 -4
- pulumi_gcp/pulumi-plugin.json +2 -1
- {pulumi_gcp-7.23.0a1715621482.dist-info → pulumi_gcp-7.23.0a1715808346.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.23.0a1715621482.dist-info → pulumi_gcp-7.23.0a1715808346.dist-info}/RECORD +42 -39
- {pulumi_gcp-7.23.0a1715621482.dist-info → pulumi_gcp-7.23.0a1715808346.dist-info}/WHEEL +0 -0
- {pulumi_gcp-7.23.0a1715621482.dist-info → pulumi_gcp-7.23.0a1715808346.dist-info}/top_level.txt +0 -0
@@ -24,11 +24,13 @@ class FirewallPolicyRuleArgs:
|
|
24
24
|
description: Optional[pulumi.Input[str]] = None,
|
25
25
|
disabled: Optional[pulumi.Input[bool]] = None,
|
26
26
|
enable_logging: Optional[pulumi.Input[bool]] = None,
|
27
|
+
security_profile_group: Optional[pulumi.Input[str]] = None,
|
27
28
|
target_resources: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
28
|
-
target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None
|
29
|
+
target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
30
|
+
tls_inspect: Optional[pulumi.Input[bool]] = None):
|
29
31
|
"""
|
30
32
|
The set of arguments for constructing a FirewallPolicyRule resource.
|
31
|
-
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "
|
33
|
+
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
|
32
34
|
:param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
|
33
35
|
:param pulumi.Input[str] firewall_policy: The firewall policy of the resource.
|
34
36
|
:param pulumi.Input['FirewallPolicyRuleMatchArgs'] match: A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
|
@@ -39,9 +41,14 @@ class FirewallPolicyRuleArgs:
|
|
39
41
|
:param pulumi.Input[bool] enable_logging: Denotes whether to enable logging for a particular rule. If logging is enabled, logs will be exported to the configured
|
40
42
|
export destination in Stackdriver. Logs may be exported to BigQuery or Pub/Sub. Note: you cannot enable logging on
|
41
43
|
"goto_next" rules.
|
44
|
+
:param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
|
45
|
+
https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
|
46
|
+
It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
42
47
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_resources: A list of network resource URLs to which this rule applies. This field allows you to control which network's VMs get
|
43
48
|
this rule. If this field is left blank, all VMs within the organization will receive the rule.
|
44
49
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
|
50
|
+
:param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
|
51
|
+
'apply_security_profile_group' and cannot be set for other actions.
|
45
52
|
"""
|
46
53
|
pulumi.set(__self__, "action", action)
|
47
54
|
pulumi.set(__self__, "direction", direction)
|
@@ -54,16 +61,20 @@ class FirewallPolicyRuleArgs:
|
|
54
61
|
pulumi.set(__self__, "disabled", disabled)
|
55
62
|
if enable_logging is not None:
|
56
63
|
pulumi.set(__self__, "enable_logging", enable_logging)
|
64
|
+
if security_profile_group is not None:
|
65
|
+
pulumi.set(__self__, "security_profile_group", security_profile_group)
|
57
66
|
if target_resources is not None:
|
58
67
|
pulumi.set(__self__, "target_resources", target_resources)
|
59
68
|
if target_service_accounts is not None:
|
60
69
|
pulumi.set(__self__, "target_service_accounts", target_service_accounts)
|
70
|
+
if tls_inspect is not None:
|
71
|
+
pulumi.set(__self__, "tls_inspect", tls_inspect)
|
61
72
|
|
62
73
|
@property
|
63
74
|
@pulumi.getter
|
64
75
|
def action(self) -> pulumi.Input[str]:
|
65
76
|
"""
|
66
|
-
The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "
|
77
|
+
The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
|
67
78
|
"""
|
68
79
|
return pulumi.get(self, "action")
|
69
80
|
|
@@ -158,6 +169,20 @@ class FirewallPolicyRuleArgs:
|
|
158
169
|
def enable_logging(self, value: Optional[pulumi.Input[bool]]):
|
159
170
|
pulumi.set(self, "enable_logging", value)
|
160
171
|
|
172
|
+
@property
|
173
|
+
@pulumi.getter(name="securityProfileGroup")
|
174
|
+
def security_profile_group(self) -> Optional[pulumi.Input[str]]:
|
175
|
+
"""
|
176
|
+
A fully-qualified URL of a SecurityProfileGroup resource. Example:
|
177
|
+
https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
|
178
|
+
It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
179
|
+
"""
|
180
|
+
return pulumi.get(self, "security_profile_group")
|
181
|
+
|
182
|
+
@security_profile_group.setter
|
183
|
+
def security_profile_group(self, value: Optional[pulumi.Input[str]]):
|
184
|
+
pulumi.set(self, "security_profile_group", value)
|
185
|
+
|
161
186
|
@property
|
162
187
|
@pulumi.getter(name="targetResources")
|
163
188
|
def target_resources(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -183,6 +208,19 @@ class FirewallPolicyRuleArgs:
|
|
183
208
|
def target_service_accounts(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
184
209
|
pulumi.set(self, "target_service_accounts", value)
|
185
210
|
|
211
|
+
@property
|
212
|
+
@pulumi.getter(name="tlsInspect")
|
213
|
+
def tls_inspect(self) -> Optional[pulumi.Input[bool]]:
|
214
|
+
"""
|
215
|
+
Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
|
216
|
+
'apply_security_profile_group' and cannot be set for other actions.
|
217
|
+
"""
|
218
|
+
return pulumi.get(self, "tls_inspect")
|
219
|
+
|
220
|
+
@tls_inspect.setter
|
221
|
+
def tls_inspect(self, value: Optional[pulumi.Input[bool]]):
|
222
|
+
pulumi.set(self, "tls_inspect", value)
|
223
|
+
|
186
224
|
|
187
225
|
@pulumi.input_type
|
188
226
|
class _FirewallPolicyRuleState:
|
@@ -197,11 +235,13 @@ class _FirewallPolicyRuleState:
|
|
197
235
|
match: Optional[pulumi.Input['FirewallPolicyRuleMatchArgs']] = None,
|
198
236
|
priority: Optional[pulumi.Input[int]] = None,
|
199
237
|
rule_tuple_count: Optional[pulumi.Input[int]] = None,
|
238
|
+
security_profile_group: Optional[pulumi.Input[str]] = None,
|
200
239
|
target_resources: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
201
|
-
target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None
|
240
|
+
target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
241
|
+
tls_inspect: Optional[pulumi.Input[bool]] = None):
|
202
242
|
"""
|
203
243
|
Input properties used for looking up and filtering FirewallPolicyRule resources.
|
204
|
-
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "
|
244
|
+
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
|
205
245
|
:param pulumi.Input[str] description: An optional description for this resource.
|
206
246
|
:param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
|
207
247
|
:param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
|
@@ -214,9 +254,14 @@ class _FirewallPolicyRuleState:
|
|
214
254
|
:param pulumi.Input['FirewallPolicyRuleMatchArgs'] match: A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
|
215
255
|
:param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
|
216
256
|
:param pulumi.Input[int] rule_tuple_count: Calculation of the complexity of a single firewall policy rule.
|
257
|
+
:param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
|
258
|
+
https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
|
259
|
+
It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
217
260
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_resources: A list of network resource URLs to which this rule applies. This field allows you to control which network's VMs get
|
218
261
|
this rule. If this field is left blank, all VMs within the organization will receive the rule.
|
219
262
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
|
263
|
+
:param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
|
264
|
+
'apply_security_profile_group' and cannot be set for other actions.
|
220
265
|
"""
|
221
266
|
if action is not None:
|
222
267
|
pulumi.set(__self__, "action", action)
|
@@ -238,16 +283,20 @@ class _FirewallPolicyRuleState:
|
|
238
283
|
pulumi.set(__self__, "priority", priority)
|
239
284
|
if rule_tuple_count is not None:
|
240
285
|
pulumi.set(__self__, "rule_tuple_count", rule_tuple_count)
|
286
|
+
if security_profile_group is not None:
|
287
|
+
pulumi.set(__self__, "security_profile_group", security_profile_group)
|
241
288
|
if target_resources is not None:
|
242
289
|
pulumi.set(__self__, "target_resources", target_resources)
|
243
290
|
if target_service_accounts is not None:
|
244
291
|
pulumi.set(__self__, "target_service_accounts", target_service_accounts)
|
292
|
+
if tls_inspect is not None:
|
293
|
+
pulumi.set(__self__, "tls_inspect", tls_inspect)
|
245
294
|
|
246
295
|
@property
|
247
296
|
@pulumi.getter
|
248
297
|
def action(self) -> Optional[pulumi.Input[str]]:
|
249
298
|
"""
|
250
|
-
The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "
|
299
|
+
The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
|
251
300
|
"""
|
252
301
|
return pulumi.get(self, "action")
|
253
302
|
|
@@ -366,6 +415,20 @@ class _FirewallPolicyRuleState:
|
|
366
415
|
def rule_tuple_count(self, value: Optional[pulumi.Input[int]]):
|
367
416
|
pulumi.set(self, "rule_tuple_count", value)
|
368
417
|
|
418
|
+
@property
|
419
|
+
@pulumi.getter(name="securityProfileGroup")
|
420
|
+
def security_profile_group(self) -> Optional[pulumi.Input[str]]:
|
421
|
+
"""
|
422
|
+
A fully-qualified URL of a SecurityProfileGroup resource. Example:
|
423
|
+
https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
|
424
|
+
It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
425
|
+
"""
|
426
|
+
return pulumi.get(self, "security_profile_group")
|
427
|
+
|
428
|
+
@security_profile_group.setter
|
429
|
+
def security_profile_group(self, value: Optional[pulumi.Input[str]]):
|
430
|
+
pulumi.set(self, "security_profile_group", value)
|
431
|
+
|
369
432
|
@property
|
370
433
|
@pulumi.getter(name="targetResources")
|
371
434
|
def target_resources(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -391,6 +454,19 @@ class _FirewallPolicyRuleState:
|
|
391
454
|
def target_service_accounts(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
392
455
|
pulumi.set(self, "target_service_accounts", value)
|
393
456
|
|
457
|
+
@property
|
458
|
+
@pulumi.getter(name="tlsInspect")
|
459
|
+
def tls_inspect(self) -> Optional[pulumi.Input[bool]]:
|
460
|
+
"""
|
461
|
+
Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
|
462
|
+
'apply_security_profile_group' and cannot be set for other actions.
|
463
|
+
"""
|
464
|
+
return pulumi.get(self, "tls_inspect")
|
465
|
+
|
466
|
+
@tls_inspect.setter
|
467
|
+
def tls_inspect(self, value: Optional[pulumi.Input[bool]]):
|
468
|
+
pulumi.set(self, "tls_inspect", value)
|
469
|
+
|
394
470
|
|
395
471
|
class FirewallPolicyRule(pulumi.CustomResource):
|
396
472
|
@overload
|
@@ -405,8 +481,10 @@ class FirewallPolicyRule(pulumi.CustomResource):
|
|
405
481
|
firewall_policy: Optional[pulumi.Input[str]] = None,
|
406
482
|
match: Optional[pulumi.Input[pulumi.InputType['FirewallPolicyRuleMatchArgs']]] = None,
|
407
483
|
priority: Optional[pulumi.Input[int]] = None,
|
484
|
+
security_profile_group: Optional[pulumi.Input[str]] = None,
|
408
485
|
target_resources: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
409
486
|
target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
487
|
+
tls_inspect: Optional[pulumi.Input[bool]] = None,
|
410
488
|
__props__=None):
|
411
489
|
"""
|
412
490
|
The Compute FirewallPolicyRule resource
|
@@ -482,7 +560,7 @@ class FirewallPolicyRule(pulumi.CustomResource):
|
|
482
560
|
|
483
561
|
:param str resource_name: The name of the resource.
|
484
562
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
485
|
-
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "
|
563
|
+
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
|
486
564
|
:param pulumi.Input[str] description: An optional description for this resource.
|
487
565
|
:param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
|
488
566
|
:param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
|
@@ -493,9 +571,14 @@ class FirewallPolicyRule(pulumi.CustomResource):
|
|
493
571
|
:param pulumi.Input[str] firewall_policy: The firewall policy of the resource.
|
494
572
|
:param pulumi.Input[pulumi.InputType['FirewallPolicyRuleMatchArgs']] match: A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
|
495
573
|
:param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
|
574
|
+
:param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
|
575
|
+
https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
|
576
|
+
It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
496
577
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_resources: A list of network resource URLs to which this rule applies. This field allows you to control which network's VMs get
|
497
578
|
this rule. If this field is left blank, all VMs within the organization will receive the rule.
|
498
579
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
|
580
|
+
:param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
|
581
|
+
'apply_security_profile_group' and cannot be set for other actions.
|
499
582
|
"""
|
500
583
|
...
|
501
584
|
@overload
|
@@ -598,8 +681,10 @@ class FirewallPolicyRule(pulumi.CustomResource):
|
|
598
681
|
firewall_policy: Optional[pulumi.Input[str]] = None,
|
599
682
|
match: Optional[pulumi.Input[pulumi.InputType['FirewallPolicyRuleMatchArgs']]] = None,
|
600
683
|
priority: Optional[pulumi.Input[int]] = None,
|
684
|
+
security_profile_group: Optional[pulumi.Input[str]] = None,
|
601
685
|
target_resources: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
602
686
|
target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
687
|
+
tls_inspect: Optional[pulumi.Input[bool]] = None,
|
603
688
|
__props__=None):
|
604
689
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
605
690
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -627,8 +712,10 @@ class FirewallPolicyRule(pulumi.CustomResource):
|
|
627
712
|
if priority is None and not opts.urn:
|
628
713
|
raise TypeError("Missing required property 'priority'")
|
629
714
|
__props__.__dict__["priority"] = priority
|
715
|
+
__props__.__dict__["security_profile_group"] = security_profile_group
|
630
716
|
__props__.__dict__["target_resources"] = target_resources
|
631
717
|
__props__.__dict__["target_service_accounts"] = target_service_accounts
|
718
|
+
__props__.__dict__["tls_inspect"] = tls_inspect
|
632
719
|
__props__.__dict__["kind"] = None
|
633
720
|
__props__.__dict__["rule_tuple_count"] = None
|
634
721
|
super(FirewallPolicyRule, __self__).__init__(
|
@@ -651,8 +738,10 @@ class FirewallPolicyRule(pulumi.CustomResource):
|
|
651
738
|
match: Optional[pulumi.Input[pulumi.InputType['FirewallPolicyRuleMatchArgs']]] = None,
|
652
739
|
priority: Optional[pulumi.Input[int]] = None,
|
653
740
|
rule_tuple_count: Optional[pulumi.Input[int]] = None,
|
741
|
+
security_profile_group: Optional[pulumi.Input[str]] = None,
|
654
742
|
target_resources: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
655
|
-
target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None
|
743
|
+
target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
744
|
+
tls_inspect: Optional[pulumi.Input[bool]] = None) -> 'FirewallPolicyRule':
|
656
745
|
"""
|
657
746
|
Get an existing FirewallPolicyRule resource's state with the given name, id, and optional extra
|
658
747
|
properties used to qualify the lookup.
|
@@ -660,7 +749,7 @@ class FirewallPolicyRule(pulumi.CustomResource):
|
|
660
749
|
:param str resource_name: The unique name of the resulting resource.
|
661
750
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
662
751
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
663
|
-
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "
|
752
|
+
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
|
664
753
|
:param pulumi.Input[str] description: An optional description for this resource.
|
665
754
|
:param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
|
666
755
|
:param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
|
@@ -673,9 +762,14 @@ class FirewallPolicyRule(pulumi.CustomResource):
|
|
673
762
|
:param pulumi.Input[pulumi.InputType['FirewallPolicyRuleMatchArgs']] match: A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
|
674
763
|
:param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
|
675
764
|
:param pulumi.Input[int] rule_tuple_count: Calculation of the complexity of a single firewall policy rule.
|
765
|
+
:param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
|
766
|
+
https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
|
767
|
+
It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
676
768
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_resources: A list of network resource URLs to which this rule applies. This field allows you to control which network's VMs get
|
677
769
|
this rule. If this field is left blank, all VMs within the organization will receive the rule.
|
678
770
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
|
771
|
+
:param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
|
772
|
+
'apply_security_profile_group' and cannot be set for other actions.
|
679
773
|
"""
|
680
774
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
681
775
|
|
@@ -691,15 +785,17 @@ class FirewallPolicyRule(pulumi.CustomResource):
|
|
691
785
|
__props__.__dict__["match"] = match
|
692
786
|
__props__.__dict__["priority"] = priority
|
693
787
|
__props__.__dict__["rule_tuple_count"] = rule_tuple_count
|
788
|
+
__props__.__dict__["security_profile_group"] = security_profile_group
|
694
789
|
__props__.__dict__["target_resources"] = target_resources
|
695
790
|
__props__.__dict__["target_service_accounts"] = target_service_accounts
|
791
|
+
__props__.__dict__["tls_inspect"] = tls_inspect
|
696
792
|
return FirewallPolicyRule(resource_name, opts=opts, __props__=__props__)
|
697
793
|
|
698
794
|
@property
|
699
795
|
@pulumi.getter
|
700
796
|
def action(self) -> pulumi.Output[str]:
|
701
797
|
"""
|
702
|
-
The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "
|
798
|
+
The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
|
703
799
|
"""
|
704
800
|
return pulumi.get(self, "action")
|
705
801
|
|
@@ -778,6 +874,16 @@ class FirewallPolicyRule(pulumi.CustomResource):
|
|
778
874
|
"""
|
779
875
|
return pulumi.get(self, "rule_tuple_count")
|
780
876
|
|
877
|
+
@property
|
878
|
+
@pulumi.getter(name="securityProfileGroup")
|
879
|
+
def security_profile_group(self) -> pulumi.Output[Optional[str]]:
|
880
|
+
"""
|
881
|
+
A fully-qualified URL of a SecurityProfileGroup resource. Example:
|
882
|
+
https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
|
883
|
+
It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
884
|
+
"""
|
885
|
+
return pulumi.get(self, "security_profile_group")
|
886
|
+
|
781
887
|
@property
|
782
888
|
@pulumi.getter(name="targetResources")
|
783
889
|
def target_resources(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
@@ -795,3 +901,12 @@ class FirewallPolicyRule(pulumi.CustomResource):
|
|
795
901
|
"""
|
796
902
|
return pulumi.get(self, "target_service_accounts")
|
797
903
|
|
904
|
+
@property
|
905
|
+
@pulumi.getter(name="tlsInspect")
|
906
|
+
def tls_inspect(self) -> pulumi.Output[Optional[bool]]:
|
907
|
+
"""
|
908
|
+
Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
|
909
|
+
'apply_security_profile_group' and cannot be set for other actions.
|
910
|
+
"""
|
911
|
+
return pulumi.get(self, "tls_inspect")
|
912
|
+
|