pulumi-gcp 7.23.0a1715621482__py3-none-any.whl → 7.23.0a1715808346__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +24 -0
- pulumi_gcp/bigquery/table.py +47 -0
- pulumi_gcp/bigtable/__init__.py +1 -0
- pulumi_gcp/bigtable/_inputs.py +101 -0
- pulumi_gcp/bigtable/authorized_view.py +440 -0
- pulumi_gcp/bigtable/outputs.py +119 -0
- pulumi_gcp/certificateauthority/certificate_template.py +70 -0
- pulumi_gcp/cloudbuildv2/repository.py +2 -2
- pulumi_gcp/clouddeploy/_inputs.py +96 -0
- pulumi_gcp/clouddeploy/custom_target_type.py +46 -0
- pulumi_gcp/clouddeploy/delivery_pipeline.py +7 -7
- pulumi_gcp/clouddeploy/outputs.py +96 -1
- pulumi_gcp/clouddeploy/target.py +54 -7
- pulumi_gcp/compute/_inputs.py +689 -0
- pulumi_gcp/compute/firewall_policy_rule.py +125 -10
- pulumi_gcp/compute/network_firewall_policy_rule.py +125 -10
- pulumi_gcp/compute/outputs.py +684 -0
- pulumi_gcp/compute/region_network_firewall_policy_rule.py +125 -10
- pulumi_gcp/compute/region_security_policy_rule.py +230 -1
- pulumi_gcp/container/_inputs.py +67 -3
- pulumi_gcp/container/outputs.py +93 -4
- pulumi_gcp/dataflow/flex_template_job.py +7 -7
- pulumi_gcp/dataflow/job.py +7 -7
- pulumi_gcp/iam/_inputs.py +191 -2
- pulumi_gcp/iam/outputs.py +197 -2
- pulumi_gcp/iam/workforce_pool_provider.py +245 -0
- pulumi_gcp/integrationconnectors/__init__.py +1 -0
- pulumi_gcp/integrationconnectors/managed_zone.py +753 -0
- pulumi_gcp/networkconnectivity/__init__.py +1 -0
- pulumi_gcp/networkconnectivity/regional_endpoint.py +946 -0
- pulumi_gcp/networksecurity/firewall_endpoint.py +34 -0
- pulumi_gcp/networksecurity/firewall_endpoint_association.py +24 -0
- pulumi_gcp/networksecurity/security_profile.py +16 -0
- pulumi_gcp/networksecurity/security_profile_group.py +18 -0
- pulumi_gcp/networksecurity/tls_inspection_policy.py +16 -0
- pulumi_gcp/orgpolicy/policy.py +2 -2
- pulumi_gcp/pubsub/subscription.py +4 -4
- pulumi_gcp/pulumi-plugin.json +2 -1
- {pulumi_gcp-7.23.0a1715621482.dist-info → pulumi_gcp-7.23.0a1715808346.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.23.0a1715621482.dist-info → pulumi_gcp-7.23.0a1715808346.dist-info}/RECORD +42 -39
- {pulumi_gcp-7.23.0a1715621482.dist-info → pulumi_gcp-7.23.0a1715808346.dist-info}/WHEEL +0 -0
- {pulumi_gcp-7.23.0a1715621482.dist-info → pulumi_gcp-7.23.0a1715808346.dist-info}/top_level.txt +0 -0
@@ -26,11 +26,13 @@ class NetworkFirewallPolicyRuleArgs:
|
|
26
26
|
enable_logging: Optional[pulumi.Input[bool]] = None,
|
27
27
|
project: Optional[pulumi.Input[str]] = None,
|
28
28
|
rule_name: Optional[pulumi.Input[str]] = None,
|
29
|
+
security_profile_group: Optional[pulumi.Input[str]] = None,
|
29
30
|
target_secure_tags: Optional[pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]] = None,
|
30
|
-
target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None
|
31
|
+
target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
32
|
+
tls_inspect: Optional[pulumi.Input[bool]] = None):
|
31
33
|
"""
|
32
34
|
The set of arguments for constructing a NetworkFirewallPolicyRule resource.
|
33
|
-
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "
|
35
|
+
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
|
34
36
|
:param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
|
35
37
|
:param pulumi.Input[str] firewall_policy: The firewall policy of the resource.
|
36
38
|
:param pulumi.Input['NetworkFirewallPolicyRuleMatchArgs'] match: A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
|
@@ -43,6 +45,9 @@ class NetworkFirewallPolicyRuleArgs:
|
|
43
45
|
"goto_next" rules.
|
44
46
|
:param pulumi.Input[str] project: The project for the resource
|
45
47
|
:param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
|
48
|
+
:param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
|
49
|
+
https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
|
50
|
+
It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
46
51
|
:param pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
|
47
52
|
specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
|
48
53
|
tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
|
@@ -50,6 +55,8 @@ class NetworkFirewallPolicyRuleArgs:
|
|
50
55
|
<code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
|
51
56
|
instances on the specified network. Maximum number of target label tags allowed is 256.
|
52
57
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
|
58
|
+
:param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
|
59
|
+
'apply_security_profile_group' and cannot be set for other actions.
|
53
60
|
"""
|
54
61
|
pulumi.set(__self__, "action", action)
|
55
62
|
pulumi.set(__self__, "direction", direction)
|
@@ -66,16 +73,20 @@ class NetworkFirewallPolicyRuleArgs:
|
|
66
73
|
pulumi.set(__self__, "project", project)
|
67
74
|
if rule_name is not None:
|
68
75
|
pulumi.set(__self__, "rule_name", rule_name)
|
76
|
+
if security_profile_group is not None:
|
77
|
+
pulumi.set(__self__, "security_profile_group", security_profile_group)
|
69
78
|
if target_secure_tags is not None:
|
70
79
|
pulumi.set(__self__, "target_secure_tags", target_secure_tags)
|
71
80
|
if target_service_accounts is not None:
|
72
81
|
pulumi.set(__self__, "target_service_accounts", target_service_accounts)
|
82
|
+
if tls_inspect is not None:
|
83
|
+
pulumi.set(__self__, "tls_inspect", tls_inspect)
|
73
84
|
|
74
85
|
@property
|
75
86
|
@pulumi.getter
|
76
87
|
def action(self) -> pulumi.Input[str]:
|
77
88
|
"""
|
78
|
-
The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "
|
89
|
+
The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
|
79
90
|
"""
|
80
91
|
return pulumi.get(self, "action")
|
81
92
|
|
@@ -194,6 +205,20 @@ class NetworkFirewallPolicyRuleArgs:
|
|
194
205
|
def rule_name(self, value: Optional[pulumi.Input[str]]):
|
195
206
|
pulumi.set(self, "rule_name", value)
|
196
207
|
|
208
|
+
@property
|
209
|
+
@pulumi.getter(name="securityProfileGroup")
|
210
|
+
def security_profile_group(self) -> Optional[pulumi.Input[str]]:
|
211
|
+
"""
|
212
|
+
A fully-qualified URL of a SecurityProfileGroup resource. Example:
|
213
|
+
https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
|
214
|
+
It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
215
|
+
"""
|
216
|
+
return pulumi.get(self, "security_profile_group")
|
217
|
+
|
218
|
+
@security_profile_group.setter
|
219
|
+
def security_profile_group(self, value: Optional[pulumi.Input[str]]):
|
220
|
+
pulumi.set(self, "security_profile_group", value)
|
221
|
+
|
197
222
|
@property
|
198
223
|
@pulumi.getter(name="targetSecureTags")
|
199
224
|
def target_secure_tags(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]]:
|
@@ -223,6 +248,19 @@ class NetworkFirewallPolicyRuleArgs:
|
|
223
248
|
def target_service_accounts(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
224
249
|
pulumi.set(self, "target_service_accounts", value)
|
225
250
|
|
251
|
+
@property
|
252
|
+
@pulumi.getter(name="tlsInspect")
|
253
|
+
def tls_inspect(self) -> Optional[pulumi.Input[bool]]:
|
254
|
+
"""
|
255
|
+
Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
|
256
|
+
'apply_security_profile_group' and cannot be set for other actions.
|
257
|
+
"""
|
258
|
+
return pulumi.get(self, "tls_inspect")
|
259
|
+
|
260
|
+
@tls_inspect.setter
|
261
|
+
def tls_inspect(self, value: Optional[pulumi.Input[bool]]):
|
262
|
+
pulumi.set(self, "tls_inspect", value)
|
263
|
+
|
226
264
|
|
227
265
|
@pulumi.input_type
|
228
266
|
class _NetworkFirewallPolicyRuleState:
|
@@ -239,11 +277,13 @@ class _NetworkFirewallPolicyRuleState:
|
|
239
277
|
project: Optional[pulumi.Input[str]] = None,
|
240
278
|
rule_name: Optional[pulumi.Input[str]] = None,
|
241
279
|
rule_tuple_count: Optional[pulumi.Input[int]] = None,
|
280
|
+
security_profile_group: Optional[pulumi.Input[str]] = None,
|
242
281
|
target_secure_tags: Optional[pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]] = None,
|
243
|
-
target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None
|
282
|
+
target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
283
|
+
tls_inspect: Optional[pulumi.Input[bool]] = None):
|
244
284
|
"""
|
245
285
|
Input properties used for looking up and filtering NetworkFirewallPolicyRule resources.
|
246
|
-
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "
|
286
|
+
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
|
247
287
|
:param pulumi.Input[str] description: An optional description for this resource.
|
248
288
|
:param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
|
249
289
|
:param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
|
@@ -258,6 +298,9 @@ class _NetworkFirewallPolicyRuleState:
|
|
258
298
|
:param pulumi.Input[str] project: The project for the resource
|
259
299
|
:param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
|
260
300
|
:param pulumi.Input[int] rule_tuple_count: Calculation of the complexity of a single firewall policy rule.
|
301
|
+
:param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
|
302
|
+
https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
|
303
|
+
It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
261
304
|
:param pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
|
262
305
|
specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
|
263
306
|
tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
|
@@ -265,6 +308,8 @@ class _NetworkFirewallPolicyRuleState:
|
|
265
308
|
<code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
|
266
309
|
instances on the specified network. Maximum number of target label tags allowed is 256.
|
267
310
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
|
311
|
+
:param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
|
312
|
+
'apply_security_profile_group' and cannot be set for other actions.
|
268
313
|
"""
|
269
314
|
if action is not None:
|
270
315
|
pulumi.set(__self__, "action", action)
|
@@ -290,16 +335,20 @@ class _NetworkFirewallPolicyRuleState:
|
|
290
335
|
pulumi.set(__self__, "rule_name", rule_name)
|
291
336
|
if rule_tuple_count is not None:
|
292
337
|
pulumi.set(__self__, "rule_tuple_count", rule_tuple_count)
|
338
|
+
if security_profile_group is not None:
|
339
|
+
pulumi.set(__self__, "security_profile_group", security_profile_group)
|
293
340
|
if target_secure_tags is not None:
|
294
341
|
pulumi.set(__self__, "target_secure_tags", target_secure_tags)
|
295
342
|
if target_service_accounts is not None:
|
296
343
|
pulumi.set(__self__, "target_service_accounts", target_service_accounts)
|
344
|
+
if tls_inspect is not None:
|
345
|
+
pulumi.set(__self__, "tls_inspect", tls_inspect)
|
297
346
|
|
298
347
|
@property
|
299
348
|
@pulumi.getter
|
300
349
|
def action(self) -> Optional[pulumi.Input[str]]:
|
301
350
|
"""
|
302
|
-
The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "
|
351
|
+
The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
|
303
352
|
"""
|
304
353
|
return pulumi.get(self, "action")
|
305
354
|
|
@@ -442,6 +491,20 @@ class _NetworkFirewallPolicyRuleState:
|
|
442
491
|
def rule_tuple_count(self, value: Optional[pulumi.Input[int]]):
|
443
492
|
pulumi.set(self, "rule_tuple_count", value)
|
444
493
|
|
494
|
+
@property
|
495
|
+
@pulumi.getter(name="securityProfileGroup")
|
496
|
+
def security_profile_group(self) -> Optional[pulumi.Input[str]]:
|
497
|
+
"""
|
498
|
+
A fully-qualified URL of a SecurityProfileGroup resource. Example:
|
499
|
+
https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
|
500
|
+
It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
501
|
+
"""
|
502
|
+
return pulumi.get(self, "security_profile_group")
|
503
|
+
|
504
|
+
@security_profile_group.setter
|
505
|
+
def security_profile_group(self, value: Optional[pulumi.Input[str]]):
|
506
|
+
pulumi.set(self, "security_profile_group", value)
|
507
|
+
|
445
508
|
@property
|
446
509
|
@pulumi.getter(name="targetSecureTags")
|
447
510
|
def target_secure_tags(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]]:
|
@@ -471,6 +534,19 @@ class _NetworkFirewallPolicyRuleState:
|
|
471
534
|
def target_service_accounts(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
472
535
|
pulumi.set(self, "target_service_accounts", value)
|
473
536
|
|
537
|
+
@property
|
538
|
+
@pulumi.getter(name="tlsInspect")
|
539
|
+
def tls_inspect(self) -> Optional[pulumi.Input[bool]]:
|
540
|
+
"""
|
541
|
+
Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
|
542
|
+
'apply_security_profile_group' and cannot be set for other actions.
|
543
|
+
"""
|
544
|
+
return pulumi.get(self, "tls_inspect")
|
545
|
+
|
546
|
+
@tls_inspect.setter
|
547
|
+
def tls_inspect(self, value: Optional[pulumi.Input[bool]]):
|
548
|
+
pulumi.set(self, "tls_inspect", value)
|
549
|
+
|
474
550
|
|
475
551
|
class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
476
552
|
@overload
|
@@ -487,8 +563,10 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
487
563
|
priority: Optional[pulumi.Input[int]] = None,
|
488
564
|
project: Optional[pulumi.Input[str]] = None,
|
489
565
|
rule_name: Optional[pulumi.Input[str]] = None,
|
566
|
+
security_profile_group: Optional[pulumi.Input[str]] = None,
|
490
567
|
target_secure_tags: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]]] = None,
|
491
568
|
target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
569
|
+
tls_inspect: Optional[pulumi.Input[bool]] = None,
|
492
570
|
__props__=None):
|
493
571
|
"""
|
494
572
|
The Compute NetworkFirewallPolicyRule resource
|
@@ -576,7 +654,7 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
576
654
|
|
577
655
|
:param str resource_name: The name of the resource.
|
578
656
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
579
|
-
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "
|
657
|
+
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
|
580
658
|
:param pulumi.Input[str] description: An optional description for this resource.
|
581
659
|
:param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
|
582
660
|
:param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
|
@@ -589,6 +667,9 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
589
667
|
:param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
|
590
668
|
:param pulumi.Input[str] project: The project for the resource
|
591
669
|
:param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
|
670
|
+
:param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
|
671
|
+
https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
|
672
|
+
It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
592
673
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
|
593
674
|
specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
|
594
675
|
tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
|
@@ -596,6 +677,8 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
596
677
|
<code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
|
597
678
|
instances on the specified network. Maximum number of target label tags allowed is 256.
|
598
679
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
|
680
|
+
:param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
|
681
|
+
'apply_security_profile_group' and cannot be set for other actions.
|
599
682
|
"""
|
600
683
|
...
|
601
684
|
@overload
|
@@ -712,8 +795,10 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
712
795
|
priority: Optional[pulumi.Input[int]] = None,
|
713
796
|
project: Optional[pulumi.Input[str]] = None,
|
714
797
|
rule_name: Optional[pulumi.Input[str]] = None,
|
798
|
+
security_profile_group: Optional[pulumi.Input[str]] = None,
|
715
799
|
target_secure_tags: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]]] = None,
|
716
800
|
target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
801
|
+
tls_inspect: Optional[pulumi.Input[bool]] = None,
|
717
802
|
__props__=None):
|
718
803
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
719
804
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -743,8 +828,10 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
743
828
|
__props__.__dict__["priority"] = priority
|
744
829
|
__props__.__dict__["project"] = project
|
745
830
|
__props__.__dict__["rule_name"] = rule_name
|
831
|
+
__props__.__dict__["security_profile_group"] = security_profile_group
|
746
832
|
__props__.__dict__["target_secure_tags"] = target_secure_tags
|
747
833
|
__props__.__dict__["target_service_accounts"] = target_service_accounts
|
834
|
+
__props__.__dict__["tls_inspect"] = tls_inspect
|
748
835
|
__props__.__dict__["kind"] = None
|
749
836
|
__props__.__dict__["rule_tuple_count"] = None
|
750
837
|
super(NetworkFirewallPolicyRule, __self__).__init__(
|
@@ -769,8 +856,10 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
769
856
|
project: Optional[pulumi.Input[str]] = None,
|
770
857
|
rule_name: Optional[pulumi.Input[str]] = None,
|
771
858
|
rule_tuple_count: Optional[pulumi.Input[int]] = None,
|
859
|
+
security_profile_group: Optional[pulumi.Input[str]] = None,
|
772
860
|
target_secure_tags: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]]] = None,
|
773
|
-
target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None
|
861
|
+
target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
862
|
+
tls_inspect: Optional[pulumi.Input[bool]] = None) -> 'NetworkFirewallPolicyRule':
|
774
863
|
"""
|
775
864
|
Get an existing NetworkFirewallPolicyRule resource's state with the given name, id, and optional extra
|
776
865
|
properties used to qualify the lookup.
|
@@ -778,7 +867,7 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
778
867
|
:param str resource_name: The unique name of the resulting resource.
|
779
868
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
780
869
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
781
|
-
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "
|
870
|
+
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
|
782
871
|
:param pulumi.Input[str] description: An optional description for this resource.
|
783
872
|
:param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
|
784
873
|
:param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
|
@@ -793,6 +882,9 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
793
882
|
:param pulumi.Input[str] project: The project for the resource
|
794
883
|
:param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
|
795
884
|
:param pulumi.Input[int] rule_tuple_count: Calculation of the complexity of a single firewall policy rule.
|
885
|
+
:param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
|
886
|
+
https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
|
887
|
+
It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
796
888
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
|
797
889
|
specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
|
798
890
|
tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
|
@@ -800,6 +892,8 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
800
892
|
<code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
|
801
893
|
instances on the specified network. Maximum number of target label tags allowed is 256.
|
802
894
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
|
895
|
+
:param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
|
896
|
+
'apply_security_profile_group' and cannot be set for other actions.
|
803
897
|
"""
|
804
898
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
805
899
|
|
@@ -817,15 +911,17 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
817
911
|
__props__.__dict__["project"] = project
|
818
912
|
__props__.__dict__["rule_name"] = rule_name
|
819
913
|
__props__.__dict__["rule_tuple_count"] = rule_tuple_count
|
914
|
+
__props__.__dict__["security_profile_group"] = security_profile_group
|
820
915
|
__props__.__dict__["target_secure_tags"] = target_secure_tags
|
821
916
|
__props__.__dict__["target_service_accounts"] = target_service_accounts
|
917
|
+
__props__.__dict__["tls_inspect"] = tls_inspect
|
822
918
|
return NetworkFirewallPolicyRule(resource_name, opts=opts, __props__=__props__)
|
823
919
|
|
824
920
|
@property
|
825
921
|
@pulumi.getter
|
826
922
|
def action(self) -> pulumi.Output[str]:
|
827
923
|
"""
|
828
|
-
The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "
|
924
|
+
The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
|
829
925
|
"""
|
830
926
|
return pulumi.get(self, "action")
|
831
927
|
|
@@ -920,6 +1016,16 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
920
1016
|
"""
|
921
1017
|
return pulumi.get(self, "rule_tuple_count")
|
922
1018
|
|
1019
|
+
@property
|
1020
|
+
@pulumi.getter(name="securityProfileGroup")
|
1021
|
+
def security_profile_group(self) -> pulumi.Output[Optional[str]]:
|
1022
|
+
"""
|
1023
|
+
A fully-qualified URL of a SecurityProfileGroup resource. Example:
|
1024
|
+
https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
|
1025
|
+
It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
1026
|
+
"""
|
1027
|
+
return pulumi.get(self, "security_profile_group")
|
1028
|
+
|
923
1029
|
@property
|
924
1030
|
@pulumi.getter(name="targetSecureTags")
|
925
1031
|
def target_secure_tags(self) -> pulumi.Output[Optional[Sequence['outputs.NetworkFirewallPolicyRuleTargetSecureTag']]]:
|
@@ -941,3 +1047,12 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
941
1047
|
"""
|
942
1048
|
return pulumi.get(self, "target_service_accounts")
|
943
1049
|
|
1050
|
+
@property
|
1051
|
+
@pulumi.getter(name="tlsInspect")
|
1052
|
+
def tls_inspect(self) -> pulumi.Output[Optional[bool]]:
|
1053
|
+
"""
|
1054
|
+
Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
|
1055
|
+
'apply_security_profile_group' and cannot be set for other actions.
|
1056
|
+
"""
|
1057
|
+
return pulumi.get(self, "tls_inspect")
|
1058
|
+
|