pulumi-gcp 7.23.0a1715621482__py3-none-any.whl → 7.23.0a1715808346__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (42) hide show
  1. pulumi_gcp/__init__.py +24 -0
  2. pulumi_gcp/bigquery/table.py +47 -0
  3. pulumi_gcp/bigtable/__init__.py +1 -0
  4. pulumi_gcp/bigtable/_inputs.py +101 -0
  5. pulumi_gcp/bigtable/authorized_view.py +440 -0
  6. pulumi_gcp/bigtable/outputs.py +119 -0
  7. pulumi_gcp/certificateauthority/certificate_template.py +70 -0
  8. pulumi_gcp/cloudbuildv2/repository.py +2 -2
  9. pulumi_gcp/clouddeploy/_inputs.py +96 -0
  10. pulumi_gcp/clouddeploy/custom_target_type.py +46 -0
  11. pulumi_gcp/clouddeploy/delivery_pipeline.py +7 -7
  12. pulumi_gcp/clouddeploy/outputs.py +96 -1
  13. pulumi_gcp/clouddeploy/target.py +54 -7
  14. pulumi_gcp/compute/_inputs.py +689 -0
  15. pulumi_gcp/compute/firewall_policy_rule.py +125 -10
  16. pulumi_gcp/compute/network_firewall_policy_rule.py +125 -10
  17. pulumi_gcp/compute/outputs.py +684 -0
  18. pulumi_gcp/compute/region_network_firewall_policy_rule.py +125 -10
  19. pulumi_gcp/compute/region_security_policy_rule.py +230 -1
  20. pulumi_gcp/container/_inputs.py +67 -3
  21. pulumi_gcp/container/outputs.py +93 -4
  22. pulumi_gcp/dataflow/flex_template_job.py +7 -7
  23. pulumi_gcp/dataflow/job.py +7 -7
  24. pulumi_gcp/iam/_inputs.py +191 -2
  25. pulumi_gcp/iam/outputs.py +197 -2
  26. pulumi_gcp/iam/workforce_pool_provider.py +245 -0
  27. pulumi_gcp/integrationconnectors/__init__.py +1 -0
  28. pulumi_gcp/integrationconnectors/managed_zone.py +753 -0
  29. pulumi_gcp/networkconnectivity/__init__.py +1 -0
  30. pulumi_gcp/networkconnectivity/regional_endpoint.py +946 -0
  31. pulumi_gcp/networksecurity/firewall_endpoint.py +34 -0
  32. pulumi_gcp/networksecurity/firewall_endpoint_association.py +24 -0
  33. pulumi_gcp/networksecurity/security_profile.py +16 -0
  34. pulumi_gcp/networksecurity/security_profile_group.py +18 -0
  35. pulumi_gcp/networksecurity/tls_inspection_policy.py +16 -0
  36. pulumi_gcp/orgpolicy/policy.py +2 -2
  37. pulumi_gcp/pubsub/subscription.py +4 -4
  38. pulumi_gcp/pulumi-plugin.json +2 -1
  39. {pulumi_gcp-7.23.0a1715621482.dist-info → pulumi_gcp-7.23.0a1715808346.dist-info}/METADATA +1 -1
  40. {pulumi_gcp-7.23.0a1715621482.dist-info → pulumi_gcp-7.23.0a1715808346.dist-info}/RECORD +42 -39
  41. {pulumi_gcp-7.23.0a1715621482.dist-info → pulumi_gcp-7.23.0a1715808346.dist-info}/WHEEL +0 -0
  42. {pulumi_gcp-7.23.0a1715621482.dist-info → pulumi_gcp-7.23.0a1715808346.dist-info}/top_level.txt +0 -0
@@ -26,11 +26,13 @@ class NetworkFirewallPolicyRuleArgs:
26
26
  enable_logging: Optional[pulumi.Input[bool]] = None,
27
27
  project: Optional[pulumi.Input[str]] = None,
28
28
  rule_name: Optional[pulumi.Input[str]] = None,
29
+ security_profile_group: Optional[pulumi.Input[str]] = None,
29
30
  target_secure_tags: Optional[pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]] = None,
30
- target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
31
+ target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
32
+ tls_inspect: Optional[pulumi.Input[bool]] = None):
31
33
  """
32
34
  The set of arguments for constructing a NetworkFirewallPolicyRule resource.
33
- :param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "goto_next".
35
+ :param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
34
36
  :param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
35
37
  :param pulumi.Input[str] firewall_policy: The firewall policy of the resource.
36
38
  :param pulumi.Input['NetworkFirewallPolicyRuleMatchArgs'] match: A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
@@ -43,6 +45,9 @@ class NetworkFirewallPolicyRuleArgs:
43
45
  "goto_next" rules.
44
46
  :param pulumi.Input[str] project: The project for the resource
45
47
  :param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
48
+ :param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
49
+ https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
50
+ It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
46
51
  :param pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
47
52
  specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
48
53
  tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
@@ -50,6 +55,8 @@ class NetworkFirewallPolicyRuleArgs:
50
55
  <code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
51
56
  instances on the specified network. Maximum number of target label tags allowed is 256.
52
57
  :param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
58
+ :param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
59
+ 'apply_security_profile_group' and cannot be set for other actions.
53
60
  """
54
61
  pulumi.set(__self__, "action", action)
55
62
  pulumi.set(__self__, "direction", direction)
@@ -66,16 +73,20 @@ class NetworkFirewallPolicyRuleArgs:
66
73
  pulumi.set(__self__, "project", project)
67
74
  if rule_name is not None:
68
75
  pulumi.set(__self__, "rule_name", rule_name)
76
+ if security_profile_group is not None:
77
+ pulumi.set(__self__, "security_profile_group", security_profile_group)
69
78
  if target_secure_tags is not None:
70
79
  pulumi.set(__self__, "target_secure_tags", target_secure_tags)
71
80
  if target_service_accounts is not None:
72
81
  pulumi.set(__self__, "target_service_accounts", target_service_accounts)
82
+ if tls_inspect is not None:
83
+ pulumi.set(__self__, "tls_inspect", tls_inspect)
73
84
 
74
85
  @property
75
86
  @pulumi.getter
76
87
  def action(self) -> pulumi.Input[str]:
77
88
  """
78
- The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "goto_next".
89
+ The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
79
90
  """
80
91
  return pulumi.get(self, "action")
81
92
 
@@ -194,6 +205,20 @@ class NetworkFirewallPolicyRuleArgs:
194
205
  def rule_name(self, value: Optional[pulumi.Input[str]]):
195
206
  pulumi.set(self, "rule_name", value)
196
207
 
208
+ @property
209
+ @pulumi.getter(name="securityProfileGroup")
210
+ def security_profile_group(self) -> Optional[pulumi.Input[str]]:
211
+ """
212
+ A fully-qualified URL of a SecurityProfileGroup resource. Example:
213
+ https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
214
+ It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
215
+ """
216
+ return pulumi.get(self, "security_profile_group")
217
+
218
+ @security_profile_group.setter
219
+ def security_profile_group(self, value: Optional[pulumi.Input[str]]):
220
+ pulumi.set(self, "security_profile_group", value)
221
+
197
222
  @property
198
223
  @pulumi.getter(name="targetSecureTags")
199
224
  def target_secure_tags(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]]:
@@ -223,6 +248,19 @@ class NetworkFirewallPolicyRuleArgs:
223
248
  def target_service_accounts(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
224
249
  pulumi.set(self, "target_service_accounts", value)
225
250
 
251
+ @property
252
+ @pulumi.getter(name="tlsInspect")
253
+ def tls_inspect(self) -> Optional[pulumi.Input[bool]]:
254
+ """
255
+ Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
256
+ 'apply_security_profile_group' and cannot be set for other actions.
257
+ """
258
+ return pulumi.get(self, "tls_inspect")
259
+
260
+ @tls_inspect.setter
261
+ def tls_inspect(self, value: Optional[pulumi.Input[bool]]):
262
+ pulumi.set(self, "tls_inspect", value)
263
+
226
264
 
227
265
  @pulumi.input_type
228
266
  class _NetworkFirewallPolicyRuleState:
@@ -239,11 +277,13 @@ class _NetworkFirewallPolicyRuleState:
239
277
  project: Optional[pulumi.Input[str]] = None,
240
278
  rule_name: Optional[pulumi.Input[str]] = None,
241
279
  rule_tuple_count: Optional[pulumi.Input[int]] = None,
280
+ security_profile_group: Optional[pulumi.Input[str]] = None,
242
281
  target_secure_tags: Optional[pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]] = None,
243
- target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
282
+ target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
283
+ tls_inspect: Optional[pulumi.Input[bool]] = None):
244
284
  """
245
285
  Input properties used for looking up and filtering NetworkFirewallPolicyRule resources.
246
- :param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "goto_next".
286
+ :param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
247
287
  :param pulumi.Input[str] description: An optional description for this resource.
248
288
  :param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
249
289
  :param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
@@ -258,6 +298,9 @@ class _NetworkFirewallPolicyRuleState:
258
298
  :param pulumi.Input[str] project: The project for the resource
259
299
  :param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
260
300
  :param pulumi.Input[int] rule_tuple_count: Calculation of the complexity of a single firewall policy rule.
301
+ :param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
302
+ https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
303
+ It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
261
304
  :param pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
262
305
  specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
263
306
  tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
@@ -265,6 +308,8 @@ class _NetworkFirewallPolicyRuleState:
265
308
  <code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
266
309
  instances on the specified network. Maximum number of target label tags allowed is 256.
267
310
  :param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
311
+ :param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
312
+ 'apply_security_profile_group' and cannot be set for other actions.
268
313
  """
269
314
  if action is not None:
270
315
  pulumi.set(__self__, "action", action)
@@ -290,16 +335,20 @@ class _NetworkFirewallPolicyRuleState:
290
335
  pulumi.set(__self__, "rule_name", rule_name)
291
336
  if rule_tuple_count is not None:
292
337
  pulumi.set(__self__, "rule_tuple_count", rule_tuple_count)
338
+ if security_profile_group is not None:
339
+ pulumi.set(__self__, "security_profile_group", security_profile_group)
293
340
  if target_secure_tags is not None:
294
341
  pulumi.set(__self__, "target_secure_tags", target_secure_tags)
295
342
  if target_service_accounts is not None:
296
343
  pulumi.set(__self__, "target_service_accounts", target_service_accounts)
344
+ if tls_inspect is not None:
345
+ pulumi.set(__self__, "tls_inspect", tls_inspect)
297
346
 
298
347
  @property
299
348
  @pulumi.getter
300
349
  def action(self) -> Optional[pulumi.Input[str]]:
301
350
  """
302
- The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "goto_next".
351
+ The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
303
352
  """
304
353
  return pulumi.get(self, "action")
305
354
 
@@ -442,6 +491,20 @@ class _NetworkFirewallPolicyRuleState:
442
491
  def rule_tuple_count(self, value: Optional[pulumi.Input[int]]):
443
492
  pulumi.set(self, "rule_tuple_count", value)
444
493
 
494
+ @property
495
+ @pulumi.getter(name="securityProfileGroup")
496
+ def security_profile_group(self) -> Optional[pulumi.Input[str]]:
497
+ """
498
+ A fully-qualified URL of a SecurityProfileGroup resource. Example:
499
+ https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
500
+ It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
501
+ """
502
+ return pulumi.get(self, "security_profile_group")
503
+
504
+ @security_profile_group.setter
505
+ def security_profile_group(self, value: Optional[pulumi.Input[str]]):
506
+ pulumi.set(self, "security_profile_group", value)
507
+
445
508
  @property
446
509
  @pulumi.getter(name="targetSecureTags")
447
510
  def target_secure_tags(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]]:
@@ -471,6 +534,19 @@ class _NetworkFirewallPolicyRuleState:
471
534
  def target_service_accounts(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
472
535
  pulumi.set(self, "target_service_accounts", value)
473
536
 
537
+ @property
538
+ @pulumi.getter(name="tlsInspect")
539
+ def tls_inspect(self) -> Optional[pulumi.Input[bool]]:
540
+ """
541
+ Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
542
+ 'apply_security_profile_group' and cannot be set for other actions.
543
+ """
544
+ return pulumi.get(self, "tls_inspect")
545
+
546
+ @tls_inspect.setter
547
+ def tls_inspect(self, value: Optional[pulumi.Input[bool]]):
548
+ pulumi.set(self, "tls_inspect", value)
549
+
474
550
 
475
551
  class NetworkFirewallPolicyRule(pulumi.CustomResource):
476
552
  @overload
@@ -487,8 +563,10 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
487
563
  priority: Optional[pulumi.Input[int]] = None,
488
564
  project: Optional[pulumi.Input[str]] = None,
489
565
  rule_name: Optional[pulumi.Input[str]] = None,
566
+ security_profile_group: Optional[pulumi.Input[str]] = None,
490
567
  target_secure_tags: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]]] = None,
491
568
  target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
569
+ tls_inspect: Optional[pulumi.Input[bool]] = None,
492
570
  __props__=None):
493
571
  """
494
572
  The Compute NetworkFirewallPolicyRule resource
@@ -576,7 +654,7 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
576
654
 
577
655
  :param str resource_name: The name of the resource.
578
656
  :param pulumi.ResourceOptions opts: Options for the resource.
579
- :param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "goto_next".
657
+ :param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
580
658
  :param pulumi.Input[str] description: An optional description for this resource.
581
659
  :param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
582
660
  :param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
@@ -589,6 +667,9 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
589
667
  :param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
590
668
  :param pulumi.Input[str] project: The project for the resource
591
669
  :param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
670
+ :param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
671
+ https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
672
+ It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
592
673
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
593
674
  specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
594
675
  tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
@@ -596,6 +677,8 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
596
677
  <code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
597
678
  instances on the specified network. Maximum number of target label tags allowed is 256.
598
679
  :param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
680
+ :param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
681
+ 'apply_security_profile_group' and cannot be set for other actions.
599
682
  """
600
683
  ...
601
684
  @overload
@@ -712,8 +795,10 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
712
795
  priority: Optional[pulumi.Input[int]] = None,
713
796
  project: Optional[pulumi.Input[str]] = None,
714
797
  rule_name: Optional[pulumi.Input[str]] = None,
798
+ security_profile_group: Optional[pulumi.Input[str]] = None,
715
799
  target_secure_tags: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]]] = None,
716
800
  target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
801
+ tls_inspect: Optional[pulumi.Input[bool]] = None,
717
802
  __props__=None):
718
803
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
719
804
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -743,8 +828,10 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
743
828
  __props__.__dict__["priority"] = priority
744
829
  __props__.__dict__["project"] = project
745
830
  __props__.__dict__["rule_name"] = rule_name
831
+ __props__.__dict__["security_profile_group"] = security_profile_group
746
832
  __props__.__dict__["target_secure_tags"] = target_secure_tags
747
833
  __props__.__dict__["target_service_accounts"] = target_service_accounts
834
+ __props__.__dict__["tls_inspect"] = tls_inspect
748
835
  __props__.__dict__["kind"] = None
749
836
  __props__.__dict__["rule_tuple_count"] = None
750
837
  super(NetworkFirewallPolicyRule, __self__).__init__(
@@ -769,8 +856,10 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
769
856
  project: Optional[pulumi.Input[str]] = None,
770
857
  rule_name: Optional[pulumi.Input[str]] = None,
771
858
  rule_tuple_count: Optional[pulumi.Input[int]] = None,
859
+ security_profile_group: Optional[pulumi.Input[str]] = None,
772
860
  target_secure_tags: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]]] = None,
773
- target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None) -> 'NetworkFirewallPolicyRule':
861
+ target_service_accounts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
862
+ tls_inspect: Optional[pulumi.Input[bool]] = None) -> 'NetworkFirewallPolicyRule':
774
863
  """
775
864
  Get an existing NetworkFirewallPolicyRule resource's state with the given name, id, and optional extra
776
865
  properties used to qualify the lookup.
@@ -778,7 +867,7 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
778
867
  :param str resource_name: The unique name of the resulting resource.
779
868
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
780
869
  :param pulumi.ResourceOptions opts: Options for the resource.
781
- :param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "goto_next".
870
+ :param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
782
871
  :param pulumi.Input[str] description: An optional description for this resource.
783
872
  :param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
784
873
  :param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
@@ -793,6 +882,9 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
793
882
  :param pulumi.Input[str] project: The project for the resource
794
883
  :param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
795
884
  :param pulumi.Input[int] rule_tuple_count: Calculation of the complexity of a single firewall policy rule.
885
+ :param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
886
+ https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
887
+ It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
796
888
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
797
889
  specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
798
890
  tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
@@ -800,6 +892,8 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
800
892
  <code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
801
893
  instances on the specified network. Maximum number of target label tags allowed is 256.
802
894
  :param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
895
+ :param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
896
+ 'apply_security_profile_group' and cannot be set for other actions.
803
897
  """
804
898
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
805
899
 
@@ -817,15 +911,17 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
817
911
  __props__.__dict__["project"] = project
818
912
  __props__.__dict__["rule_name"] = rule_name
819
913
  __props__.__dict__["rule_tuple_count"] = rule_tuple_count
914
+ __props__.__dict__["security_profile_group"] = security_profile_group
820
915
  __props__.__dict__["target_secure_tags"] = target_secure_tags
821
916
  __props__.__dict__["target_service_accounts"] = target_service_accounts
917
+ __props__.__dict__["tls_inspect"] = tls_inspect
822
918
  return NetworkFirewallPolicyRule(resource_name, opts=opts, __props__=__props__)
823
919
 
824
920
  @property
825
921
  @pulumi.getter
826
922
  def action(self) -> pulumi.Output[str]:
827
923
  """
828
- The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny" and "goto_next".
924
+ The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
829
925
  """
830
926
  return pulumi.get(self, "action")
831
927
 
@@ -920,6 +1016,16 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
920
1016
  """
921
1017
  return pulumi.get(self, "rule_tuple_count")
922
1018
 
1019
+ @property
1020
+ @pulumi.getter(name="securityProfileGroup")
1021
+ def security_profile_group(self) -> pulumi.Output[Optional[str]]:
1022
+ """
1023
+ A fully-qualified URL of a SecurityProfileGroup resource. Example:
1024
+ https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
1025
+ It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
1026
+ """
1027
+ return pulumi.get(self, "security_profile_group")
1028
+
923
1029
  @property
924
1030
  @pulumi.getter(name="targetSecureTags")
925
1031
  def target_secure_tags(self) -> pulumi.Output[Optional[Sequence['outputs.NetworkFirewallPolicyRuleTargetSecureTag']]]:
@@ -941,3 +1047,12 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
941
1047
  """
942
1048
  return pulumi.get(self, "target_service_accounts")
943
1049
 
1050
+ @property
1051
+ @pulumi.getter(name="tlsInspect")
1052
+ def tls_inspect(self) -> pulumi.Output[Optional[bool]]:
1053
+ """
1054
+ Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
1055
+ 'apply_security_profile_group' and cannot be set for other actions.
1056
+ """
1057
+ return pulumi.get(self, "tls_inspect")
1058
+