pulumi-gcp 7.23.0a1715621482__py3-none-any.whl → 7.23.0a1715808346__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (42) hide show
  1. pulumi_gcp/__init__.py +24 -0
  2. pulumi_gcp/bigquery/table.py +47 -0
  3. pulumi_gcp/bigtable/__init__.py +1 -0
  4. pulumi_gcp/bigtable/_inputs.py +101 -0
  5. pulumi_gcp/bigtable/authorized_view.py +440 -0
  6. pulumi_gcp/bigtable/outputs.py +119 -0
  7. pulumi_gcp/certificateauthority/certificate_template.py +70 -0
  8. pulumi_gcp/cloudbuildv2/repository.py +2 -2
  9. pulumi_gcp/clouddeploy/_inputs.py +96 -0
  10. pulumi_gcp/clouddeploy/custom_target_type.py +46 -0
  11. pulumi_gcp/clouddeploy/delivery_pipeline.py +7 -7
  12. pulumi_gcp/clouddeploy/outputs.py +96 -1
  13. pulumi_gcp/clouddeploy/target.py +54 -7
  14. pulumi_gcp/compute/_inputs.py +689 -0
  15. pulumi_gcp/compute/firewall_policy_rule.py +125 -10
  16. pulumi_gcp/compute/network_firewall_policy_rule.py +125 -10
  17. pulumi_gcp/compute/outputs.py +684 -0
  18. pulumi_gcp/compute/region_network_firewall_policy_rule.py +125 -10
  19. pulumi_gcp/compute/region_security_policy_rule.py +230 -1
  20. pulumi_gcp/container/_inputs.py +67 -3
  21. pulumi_gcp/container/outputs.py +93 -4
  22. pulumi_gcp/dataflow/flex_template_job.py +7 -7
  23. pulumi_gcp/dataflow/job.py +7 -7
  24. pulumi_gcp/iam/_inputs.py +191 -2
  25. pulumi_gcp/iam/outputs.py +197 -2
  26. pulumi_gcp/iam/workforce_pool_provider.py +245 -0
  27. pulumi_gcp/integrationconnectors/__init__.py +1 -0
  28. pulumi_gcp/integrationconnectors/managed_zone.py +753 -0
  29. pulumi_gcp/networkconnectivity/__init__.py +1 -0
  30. pulumi_gcp/networkconnectivity/regional_endpoint.py +946 -0
  31. pulumi_gcp/networksecurity/firewall_endpoint.py +34 -0
  32. pulumi_gcp/networksecurity/firewall_endpoint_association.py +24 -0
  33. pulumi_gcp/networksecurity/security_profile.py +16 -0
  34. pulumi_gcp/networksecurity/security_profile_group.py +18 -0
  35. pulumi_gcp/networksecurity/tls_inspection_policy.py +16 -0
  36. pulumi_gcp/orgpolicy/policy.py +2 -2
  37. pulumi_gcp/pubsub/subscription.py +4 -4
  38. pulumi_gcp/pulumi-plugin.json +2 -1
  39. {pulumi_gcp-7.23.0a1715621482.dist-info → pulumi_gcp-7.23.0a1715808346.dist-info}/METADATA +1 -1
  40. {pulumi_gcp-7.23.0a1715621482.dist-info → pulumi_gcp-7.23.0a1715808346.dist-info}/RECORD +42 -39
  41. {pulumi_gcp-7.23.0a1715621482.dist-info → pulumi_gcp-7.23.0a1715808346.dist-info}/WHEEL +0 -0
  42. {pulumi_gcp-7.23.0a1715621482.dist-info → pulumi_gcp-7.23.0a1715808346.dist-info}/top_level.txt +0 -0
@@ -312,6 +312,16 @@ __all__ = [
312
312
  'RegionSecurityPolicyRuleMatchConfig',
313
313
  'RegionSecurityPolicyRuleNetworkMatch',
314
314
  'RegionSecurityPolicyRuleNetworkMatchUserDefinedField',
315
+ 'RegionSecurityPolicyRulePreconfiguredWafConfig',
316
+ 'RegionSecurityPolicyRulePreconfiguredWafConfigExclusion',
317
+ 'RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestCooky',
318
+ 'RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestHeader',
319
+ 'RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestQueryParam',
320
+ 'RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestUri',
321
+ 'RegionSecurityPolicyRuleRateLimitOptions',
322
+ 'RegionSecurityPolicyRuleRateLimitOptionsBanThreshold',
323
+ 'RegionSecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig',
324
+ 'RegionSecurityPolicyRuleRateLimitOptionsRateLimitThreshold',
315
325
  'RegionSecurityPolicyUserDefinedField',
316
326
  'RegionUrlMapDefaultRouteAction',
317
327
  'RegionUrlMapDefaultRouteActionCorsPolicy',
@@ -22284,6 +22294,680 @@ class RegionSecurityPolicyRuleNetworkMatchUserDefinedField(dict):
22284
22294
  return pulumi.get(self, "values")
22285
22295
 
22286
22296
 
22297
+ @pulumi.output_type
22298
+ class RegionSecurityPolicyRulePreconfiguredWafConfig(dict):
22299
+ def __init__(__self__, *,
22300
+ exclusions: Optional[Sequence['outputs.RegionSecurityPolicyRulePreconfiguredWafConfigExclusion']] = None):
22301
+ """
22302
+ :param Sequence['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionArgs'] exclusions: An exclusion to apply during preconfigured WAF evaluation.
22303
+ Structure is documented below.
22304
+ """
22305
+ if exclusions is not None:
22306
+ pulumi.set(__self__, "exclusions", exclusions)
22307
+
22308
+ @property
22309
+ @pulumi.getter
22310
+ def exclusions(self) -> Optional[Sequence['outputs.RegionSecurityPolicyRulePreconfiguredWafConfigExclusion']]:
22311
+ """
22312
+ An exclusion to apply during preconfigured WAF evaluation.
22313
+ Structure is documented below.
22314
+ """
22315
+ return pulumi.get(self, "exclusions")
22316
+
22317
+
22318
+ @pulumi.output_type
22319
+ class RegionSecurityPolicyRulePreconfiguredWafConfigExclusion(dict):
22320
+ @staticmethod
22321
+ def __key_warning(key: str):
22322
+ suggest = None
22323
+ if key == "targetRuleSet":
22324
+ suggest = "target_rule_set"
22325
+ elif key == "requestCookies":
22326
+ suggest = "request_cookies"
22327
+ elif key == "requestHeaders":
22328
+ suggest = "request_headers"
22329
+ elif key == "requestQueryParams":
22330
+ suggest = "request_query_params"
22331
+ elif key == "requestUris":
22332
+ suggest = "request_uris"
22333
+ elif key == "targetRuleIds":
22334
+ suggest = "target_rule_ids"
22335
+
22336
+ if suggest:
22337
+ pulumi.log.warn(f"Key '{key}' not found in RegionSecurityPolicyRulePreconfiguredWafConfigExclusion. Access the value via the '{suggest}' property getter instead.")
22338
+
22339
+ def __getitem__(self, key: str) -> Any:
22340
+ RegionSecurityPolicyRulePreconfiguredWafConfigExclusion.__key_warning(key)
22341
+ return super().__getitem__(key)
22342
+
22343
+ def get(self, key: str, default = None) -> Any:
22344
+ RegionSecurityPolicyRulePreconfiguredWafConfigExclusion.__key_warning(key)
22345
+ return super().get(key, default)
22346
+
22347
+ def __init__(__self__, *,
22348
+ target_rule_set: str,
22349
+ request_cookies: Optional[Sequence['outputs.RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestCooky']] = None,
22350
+ request_headers: Optional[Sequence['outputs.RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestHeader']] = None,
22351
+ request_query_params: Optional[Sequence['outputs.RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestQueryParam']] = None,
22352
+ request_uris: Optional[Sequence['outputs.RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestUri']] = None,
22353
+ target_rule_ids: Optional[Sequence[str]] = None):
22354
+ """
22355
+ :param str target_rule_set: Target WAF rule set to apply the preconfigured WAF exclusion.
22356
+ :param Sequence['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestCookyArgs'] request_cookies: Request cookie whose value will be excluded from inspection during preconfigured WAF evaluation.
22357
+ Structure is documented below.
22358
+ :param Sequence['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestHeaderArgs'] request_headers: Request header whose value will be excluded from inspection during preconfigured WAF evaluation.
22359
+ Structure is documented below.
22360
+ :param Sequence['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestQueryParamArgs'] request_query_params: Request query parameter whose value will be excluded from inspection during preconfigured WAF evaluation.
22361
+ Note that the parameter can be in the query string or in the POST body.
22362
+ Structure is documented below.
22363
+ :param Sequence['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestUriArgs'] request_uris: Request URI from the request line to be excluded from inspection during preconfigured WAF evaluation.
22364
+ When specifying this field, the query or fragment part should be excluded.
22365
+ Structure is documented below.
22366
+ :param Sequence[str] target_rule_ids: A list of target rule IDs under the WAF rule set to apply the preconfigured WAF exclusion.
22367
+ If omitted, it refers to all the rule IDs under the WAF rule set.
22368
+ """
22369
+ pulumi.set(__self__, "target_rule_set", target_rule_set)
22370
+ if request_cookies is not None:
22371
+ pulumi.set(__self__, "request_cookies", request_cookies)
22372
+ if request_headers is not None:
22373
+ pulumi.set(__self__, "request_headers", request_headers)
22374
+ if request_query_params is not None:
22375
+ pulumi.set(__self__, "request_query_params", request_query_params)
22376
+ if request_uris is not None:
22377
+ pulumi.set(__self__, "request_uris", request_uris)
22378
+ if target_rule_ids is not None:
22379
+ pulumi.set(__self__, "target_rule_ids", target_rule_ids)
22380
+
22381
+ @property
22382
+ @pulumi.getter(name="targetRuleSet")
22383
+ def target_rule_set(self) -> str:
22384
+ """
22385
+ Target WAF rule set to apply the preconfigured WAF exclusion.
22386
+ """
22387
+ return pulumi.get(self, "target_rule_set")
22388
+
22389
+ @property
22390
+ @pulumi.getter(name="requestCookies")
22391
+ def request_cookies(self) -> Optional[Sequence['outputs.RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestCooky']]:
22392
+ """
22393
+ Request cookie whose value will be excluded from inspection during preconfigured WAF evaluation.
22394
+ Structure is documented below.
22395
+ """
22396
+ return pulumi.get(self, "request_cookies")
22397
+
22398
+ @property
22399
+ @pulumi.getter(name="requestHeaders")
22400
+ def request_headers(self) -> Optional[Sequence['outputs.RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestHeader']]:
22401
+ """
22402
+ Request header whose value will be excluded from inspection during preconfigured WAF evaluation.
22403
+ Structure is documented below.
22404
+ """
22405
+ return pulumi.get(self, "request_headers")
22406
+
22407
+ @property
22408
+ @pulumi.getter(name="requestQueryParams")
22409
+ def request_query_params(self) -> Optional[Sequence['outputs.RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestQueryParam']]:
22410
+ """
22411
+ Request query parameter whose value will be excluded from inspection during preconfigured WAF evaluation.
22412
+ Note that the parameter can be in the query string or in the POST body.
22413
+ Structure is documented below.
22414
+ """
22415
+ return pulumi.get(self, "request_query_params")
22416
+
22417
+ @property
22418
+ @pulumi.getter(name="requestUris")
22419
+ def request_uris(self) -> Optional[Sequence['outputs.RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestUri']]:
22420
+ """
22421
+ Request URI from the request line to be excluded from inspection during preconfigured WAF evaluation.
22422
+ When specifying this field, the query or fragment part should be excluded.
22423
+ Structure is documented below.
22424
+ """
22425
+ return pulumi.get(self, "request_uris")
22426
+
22427
+ @property
22428
+ @pulumi.getter(name="targetRuleIds")
22429
+ def target_rule_ids(self) -> Optional[Sequence[str]]:
22430
+ """
22431
+ A list of target rule IDs under the WAF rule set to apply the preconfigured WAF exclusion.
22432
+ If omitted, it refers to all the rule IDs under the WAF rule set.
22433
+ """
22434
+ return pulumi.get(self, "target_rule_ids")
22435
+
22436
+
22437
+ @pulumi.output_type
22438
+ class RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestCooky(dict):
22439
+ def __init__(__self__, *,
22440
+ operator: str,
22441
+ value: Optional[str] = None):
22442
+ """
22443
+ :param str operator: You can specify an exact match or a partial match by using a field operator and a field value.
22444
+ Available options:
22445
+ EQUALS: The operator matches if the field value equals the specified value.
22446
+ STARTS_WITH: The operator matches if the field value starts with the specified value.
22447
+ ENDS_WITH: The operator matches if the field value ends with the specified value.
22448
+ CONTAINS: The operator matches if the field value contains the specified value.
22449
+ EQUALS_ANY: The operator matches if the field value is any value.
22450
+ Possible values are: `CONTAINS`, `ENDS_WITH`, `EQUALS`, `EQUALS_ANY`, `STARTS_WITH`.
22451
+ :param str value: A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation.
22452
+ The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
22453
+ """
22454
+ pulumi.set(__self__, "operator", operator)
22455
+ if value is not None:
22456
+ pulumi.set(__self__, "value", value)
22457
+
22458
+ @property
22459
+ @pulumi.getter
22460
+ def operator(self) -> str:
22461
+ """
22462
+ You can specify an exact match or a partial match by using a field operator and a field value.
22463
+ Available options:
22464
+ EQUALS: The operator matches if the field value equals the specified value.
22465
+ STARTS_WITH: The operator matches if the field value starts with the specified value.
22466
+ ENDS_WITH: The operator matches if the field value ends with the specified value.
22467
+ CONTAINS: The operator matches if the field value contains the specified value.
22468
+ EQUALS_ANY: The operator matches if the field value is any value.
22469
+ Possible values are: `CONTAINS`, `ENDS_WITH`, `EQUALS`, `EQUALS_ANY`, `STARTS_WITH`.
22470
+ """
22471
+ return pulumi.get(self, "operator")
22472
+
22473
+ @property
22474
+ @pulumi.getter
22475
+ def value(self) -> Optional[str]:
22476
+ """
22477
+ A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation.
22478
+ The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
22479
+ """
22480
+ return pulumi.get(self, "value")
22481
+
22482
+
22483
+ @pulumi.output_type
22484
+ class RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestHeader(dict):
22485
+ def __init__(__self__, *,
22486
+ operator: str,
22487
+ value: Optional[str] = None):
22488
+ """
22489
+ :param str operator: You can specify an exact match or a partial match by using a field operator and a field value.
22490
+ Available options:
22491
+ EQUALS: The operator matches if the field value equals the specified value.
22492
+ STARTS_WITH: The operator matches if the field value starts with the specified value.
22493
+ ENDS_WITH: The operator matches if the field value ends with the specified value.
22494
+ CONTAINS: The operator matches if the field value contains the specified value.
22495
+ EQUALS_ANY: The operator matches if the field value is any value.
22496
+ Possible values are: `CONTAINS`, `ENDS_WITH`, `EQUALS`, `EQUALS_ANY`, `STARTS_WITH`.
22497
+ :param str value: A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation.
22498
+ The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
22499
+ """
22500
+ pulumi.set(__self__, "operator", operator)
22501
+ if value is not None:
22502
+ pulumi.set(__self__, "value", value)
22503
+
22504
+ @property
22505
+ @pulumi.getter
22506
+ def operator(self) -> str:
22507
+ """
22508
+ You can specify an exact match or a partial match by using a field operator and a field value.
22509
+ Available options:
22510
+ EQUALS: The operator matches if the field value equals the specified value.
22511
+ STARTS_WITH: The operator matches if the field value starts with the specified value.
22512
+ ENDS_WITH: The operator matches if the field value ends with the specified value.
22513
+ CONTAINS: The operator matches if the field value contains the specified value.
22514
+ EQUALS_ANY: The operator matches if the field value is any value.
22515
+ Possible values are: `CONTAINS`, `ENDS_WITH`, `EQUALS`, `EQUALS_ANY`, `STARTS_WITH`.
22516
+ """
22517
+ return pulumi.get(self, "operator")
22518
+
22519
+ @property
22520
+ @pulumi.getter
22521
+ def value(self) -> Optional[str]:
22522
+ """
22523
+ A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation.
22524
+ The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
22525
+ """
22526
+ return pulumi.get(self, "value")
22527
+
22528
+
22529
+ @pulumi.output_type
22530
+ class RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestQueryParam(dict):
22531
+ def __init__(__self__, *,
22532
+ operator: str,
22533
+ value: Optional[str] = None):
22534
+ """
22535
+ :param str operator: You can specify an exact match or a partial match by using a field operator and a field value.
22536
+ Available options:
22537
+ EQUALS: The operator matches if the field value equals the specified value.
22538
+ STARTS_WITH: The operator matches if the field value starts with the specified value.
22539
+ ENDS_WITH: The operator matches if the field value ends with the specified value.
22540
+ CONTAINS: The operator matches if the field value contains the specified value.
22541
+ EQUALS_ANY: The operator matches if the field value is any value.
22542
+ Possible values are: `CONTAINS`, `ENDS_WITH`, `EQUALS`, `EQUALS_ANY`, `STARTS_WITH`.
22543
+ :param str value: A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation.
22544
+ The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
22545
+ """
22546
+ pulumi.set(__self__, "operator", operator)
22547
+ if value is not None:
22548
+ pulumi.set(__self__, "value", value)
22549
+
22550
+ @property
22551
+ @pulumi.getter
22552
+ def operator(self) -> str:
22553
+ """
22554
+ You can specify an exact match or a partial match by using a field operator and a field value.
22555
+ Available options:
22556
+ EQUALS: The operator matches if the field value equals the specified value.
22557
+ STARTS_WITH: The operator matches if the field value starts with the specified value.
22558
+ ENDS_WITH: The operator matches if the field value ends with the specified value.
22559
+ CONTAINS: The operator matches if the field value contains the specified value.
22560
+ EQUALS_ANY: The operator matches if the field value is any value.
22561
+ Possible values are: `CONTAINS`, `ENDS_WITH`, `EQUALS`, `EQUALS_ANY`, `STARTS_WITH`.
22562
+ """
22563
+ return pulumi.get(self, "operator")
22564
+
22565
+ @property
22566
+ @pulumi.getter
22567
+ def value(self) -> Optional[str]:
22568
+ """
22569
+ A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation.
22570
+ The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
22571
+ """
22572
+ return pulumi.get(self, "value")
22573
+
22574
+
22575
+ @pulumi.output_type
22576
+ class RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestUri(dict):
22577
+ def __init__(__self__, *,
22578
+ operator: str,
22579
+ value: Optional[str] = None):
22580
+ """
22581
+ :param str operator: You can specify an exact match or a partial match by using a field operator and a field value.
22582
+ Available options:
22583
+ EQUALS: The operator matches if the field value equals the specified value.
22584
+ STARTS_WITH: The operator matches if the field value starts with the specified value.
22585
+ ENDS_WITH: The operator matches if the field value ends with the specified value.
22586
+ CONTAINS: The operator matches if the field value contains the specified value.
22587
+ EQUALS_ANY: The operator matches if the field value is any value.
22588
+ Possible values are: `CONTAINS`, `ENDS_WITH`, `EQUALS`, `EQUALS_ANY`, `STARTS_WITH`.
22589
+ :param str value: A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation.
22590
+ The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
22591
+ """
22592
+ pulumi.set(__self__, "operator", operator)
22593
+ if value is not None:
22594
+ pulumi.set(__self__, "value", value)
22595
+
22596
+ @property
22597
+ @pulumi.getter
22598
+ def operator(self) -> str:
22599
+ """
22600
+ You can specify an exact match or a partial match by using a field operator and a field value.
22601
+ Available options:
22602
+ EQUALS: The operator matches if the field value equals the specified value.
22603
+ STARTS_WITH: The operator matches if the field value starts with the specified value.
22604
+ ENDS_WITH: The operator matches if the field value ends with the specified value.
22605
+ CONTAINS: The operator matches if the field value contains the specified value.
22606
+ EQUALS_ANY: The operator matches if the field value is any value.
22607
+ Possible values are: `CONTAINS`, `ENDS_WITH`, `EQUALS`, `EQUALS_ANY`, `STARTS_WITH`.
22608
+ """
22609
+ return pulumi.get(self, "operator")
22610
+
22611
+ @property
22612
+ @pulumi.getter
22613
+ def value(self) -> Optional[str]:
22614
+ """
22615
+ A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation.
22616
+ The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
22617
+ """
22618
+ return pulumi.get(self, "value")
22619
+
22620
+
22621
+ @pulumi.output_type
22622
+ class RegionSecurityPolicyRuleRateLimitOptions(dict):
22623
+ @staticmethod
22624
+ def __key_warning(key: str):
22625
+ suggest = None
22626
+ if key == "banDurationSec":
22627
+ suggest = "ban_duration_sec"
22628
+ elif key == "banThreshold":
22629
+ suggest = "ban_threshold"
22630
+ elif key == "conformAction":
22631
+ suggest = "conform_action"
22632
+ elif key == "enforceOnKey":
22633
+ suggest = "enforce_on_key"
22634
+ elif key == "enforceOnKeyConfigs":
22635
+ suggest = "enforce_on_key_configs"
22636
+ elif key == "enforceOnKeyName":
22637
+ suggest = "enforce_on_key_name"
22638
+ elif key == "exceedAction":
22639
+ suggest = "exceed_action"
22640
+ elif key == "rateLimitThreshold":
22641
+ suggest = "rate_limit_threshold"
22642
+
22643
+ if suggest:
22644
+ pulumi.log.warn(f"Key '{key}' not found in RegionSecurityPolicyRuleRateLimitOptions. Access the value via the '{suggest}' property getter instead.")
22645
+
22646
+ def __getitem__(self, key: str) -> Any:
22647
+ RegionSecurityPolicyRuleRateLimitOptions.__key_warning(key)
22648
+ return super().__getitem__(key)
22649
+
22650
+ def get(self, key: str, default = None) -> Any:
22651
+ RegionSecurityPolicyRuleRateLimitOptions.__key_warning(key)
22652
+ return super().get(key, default)
22653
+
22654
+ def __init__(__self__, *,
22655
+ ban_duration_sec: Optional[int] = None,
22656
+ ban_threshold: Optional['outputs.RegionSecurityPolicyRuleRateLimitOptionsBanThreshold'] = None,
22657
+ conform_action: Optional[str] = None,
22658
+ enforce_on_key: Optional[str] = None,
22659
+ enforce_on_key_configs: Optional[Sequence['outputs.RegionSecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig']] = None,
22660
+ enforce_on_key_name: Optional[str] = None,
22661
+ exceed_action: Optional[str] = None,
22662
+ rate_limit_threshold: Optional['outputs.RegionSecurityPolicyRuleRateLimitOptionsRateLimitThreshold'] = None):
22663
+ """
22664
+ :param int ban_duration_sec: Can only be specified if the action for the rule is "rate_based_ban".
22665
+ If specified, determines the time (in seconds) the traffic will continue to be banned by the rate limit after the rate falls below the threshold.
22666
+ :param 'RegionSecurityPolicyRuleRateLimitOptionsBanThresholdArgs' ban_threshold: Can only be specified if the action for the rule is "rate_based_ban".
22667
+ If specified, the key will be banned for the configured 'banDurationSec' when the number of requests that exceed the 'rateLimitThreshold' also exceed this 'banThreshold'.
22668
+ Structure is documented below.
22669
+ :param str conform_action: Action to take for requests that are under the configured rate limit threshold.
22670
+ Valid option is "allow" only.
22671
+ :param str enforce_on_key: Determines the key to enforce the rateLimitThreshold on. Possible values are:
22672
+ * ALL: A single rate limit threshold is applied to all the requests matching this rule. This is the default value if "enforceOnKey" is not configured.
22673
+ * IP: The source IP address of the request is the key. Each IP has this limit enforced separately.
22674
+ * HTTP_HEADER: The value of the HTTP header whose name is configured under "enforceOnKeyName". The key value is truncated to the first 128 bytes of the header value. If no such header is present in the request, the key type defaults to ALL.
22675
+ * XFF_IP: The first IP address (i.e. the originating client IP address) specified in the list of IPs under X-Forwarded-For HTTP header. If no such header is present or the value is not a valid IP, the key defaults to the source IP address of the request i.e. key type IP.
22676
+ * HTTP_COOKIE: The value of the HTTP cookie whose name is configured under "enforceOnKeyName". The key value is truncated to the first 128 bytes of the cookie value. If no such cookie is present in the request, the key type defaults to ALL.
22677
+ * HTTP_PATH: The URL path of the HTTP request. The key value is truncated to the first 128 bytes.
22678
+ * SNI: Server name indication in the TLS session of the HTTPS request. The key value is truncated to the first 128 bytes. The key type defaults to ALL on a HTTP session.
22679
+ * REGION_CODE: The country/region from which the request originates.
22680
+ * TLS_JA3_FINGERPRINT: JA3 TLS/SSL fingerprint if the client connects using HTTPS, HTTP/2 or HTTP/3. If not available, the key type defaults to ALL.
22681
+ * USER_IP: The IP address of the originating client, which is resolved based on "userIpRequestHeaders" configured with the security policy. If there is no "userIpRequestHeaders" configuration or an IP address cannot be resolved from it, the key type defaults to IP.
22682
+ Possible values are: `ALL`, `IP`, `HTTP_HEADER`, `XFF_IP`, `HTTP_COOKIE`, `HTTP_PATH`, `SNI`, `REGION_CODE`, `TLS_JA3_FINGERPRINT`, `USER_IP`.
22683
+ :param Sequence['RegionSecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfigArgs'] enforce_on_key_configs: If specified, any combination of values of enforceOnKeyType/enforceOnKeyName is treated as the key on which ratelimit threshold/action is enforced.
22684
+ You can specify up to 3 enforceOnKeyConfigs.
22685
+ If enforceOnKeyConfigs is specified, enforceOnKey must not be specified.
22686
+ Structure is documented below.
22687
+ :param str enforce_on_key_name: Rate limit key name applicable only for the following key types:
22688
+ HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value.
22689
+ HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
22690
+ :param str exceed_action: Action to take for requests that are above the configured rate limit threshold, to deny with a specified HTTP response code.
22691
+ Valid options are deny(STATUS), where valid values for STATUS are 403, 404, 429, and 502.
22692
+ :param 'RegionSecurityPolicyRuleRateLimitOptionsRateLimitThresholdArgs' rate_limit_threshold: Threshold at which to begin ratelimiting.
22693
+ Structure is documented below.
22694
+ """
22695
+ if ban_duration_sec is not None:
22696
+ pulumi.set(__self__, "ban_duration_sec", ban_duration_sec)
22697
+ if ban_threshold is not None:
22698
+ pulumi.set(__self__, "ban_threshold", ban_threshold)
22699
+ if conform_action is not None:
22700
+ pulumi.set(__self__, "conform_action", conform_action)
22701
+ if enforce_on_key is not None:
22702
+ pulumi.set(__self__, "enforce_on_key", enforce_on_key)
22703
+ if enforce_on_key_configs is not None:
22704
+ pulumi.set(__self__, "enforce_on_key_configs", enforce_on_key_configs)
22705
+ if enforce_on_key_name is not None:
22706
+ pulumi.set(__self__, "enforce_on_key_name", enforce_on_key_name)
22707
+ if exceed_action is not None:
22708
+ pulumi.set(__self__, "exceed_action", exceed_action)
22709
+ if rate_limit_threshold is not None:
22710
+ pulumi.set(__self__, "rate_limit_threshold", rate_limit_threshold)
22711
+
22712
+ @property
22713
+ @pulumi.getter(name="banDurationSec")
22714
+ def ban_duration_sec(self) -> Optional[int]:
22715
+ """
22716
+ Can only be specified if the action for the rule is "rate_based_ban".
22717
+ If specified, determines the time (in seconds) the traffic will continue to be banned by the rate limit after the rate falls below the threshold.
22718
+ """
22719
+ return pulumi.get(self, "ban_duration_sec")
22720
+
22721
+ @property
22722
+ @pulumi.getter(name="banThreshold")
22723
+ def ban_threshold(self) -> Optional['outputs.RegionSecurityPolicyRuleRateLimitOptionsBanThreshold']:
22724
+ """
22725
+ Can only be specified if the action for the rule is "rate_based_ban".
22726
+ If specified, the key will be banned for the configured 'banDurationSec' when the number of requests that exceed the 'rateLimitThreshold' also exceed this 'banThreshold'.
22727
+ Structure is documented below.
22728
+ """
22729
+ return pulumi.get(self, "ban_threshold")
22730
+
22731
+ @property
22732
+ @pulumi.getter(name="conformAction")
22733
+ def conform_action(self) -> Optional[str]:
22734
+ """
22735
+ Action to take for requests that are under the configured rate limit threshold.
22736
+ Valid option is "allow" only.
22737
+ """
22738
+ return pulumi.get(self, "conform_action")
22739
+
22740
+ @property
22741
+ @pulumi.getter(name="enforceOnKey")
22742
+ def enforce_on_key(self) -> Optional[str]:
22743
+ """
22744
+ Determines the key to enforce the rateLimitThreshold on. Possible values are:
22745
+ * ALL: A single rate limit threshold is applied to all the requests matching this rule. This is the default value if "enforceOnKey" is not configured.
22746
+ * IP: The source IP address of the request is the key. Each IP has this limit enforced separately.
22747
+ * HTTP_HEADER: The value of the HTTP header whose name is configured under "enforceOnKeyName". The key value is truncated to the first 128 bytes of the header value. If no such header is present in the request, the key type defaults to ALL.
22748
+ * XFF_IP: The first IP address (i.e. the originating client IP address) specified in the list of IPs under X-Forwarded-For HTTP header. If no such header is present or the value is not a valid IP, the key defaults to the source IP address of the request i.e. key type IP.
22749
+ * HTTP_COOKIE: The value of the HTTP cookie whose name is configured under "enforceOnKeyName". The key value is truncated to the first 128 bytes of the cookie value. If no such cookie is present in the request, the key type defaults to ALL.
22750
+ * HTTP_PATH: The URL path of the HTTP request. The key value is truncated to the first 128 bytes.
22751
+ * SNI: Server name indication in the TLS session of the HTTPS request. The key value is truncated to the first 128 bytes. The key type defaults to ALL on a HTTP session.
22752
+ * REGION_CODE: The country/region from which the request originates.
22753
+ * TLS_JA3_FINGERPRINT: JA3 TLS/SSL fingerprint if the client connects using HTTPS, HTTP/2 or HTTP/3. If not available, the key type defaults to ALL.
22754
+ * USER_IP: The IP address of the originating client, which is resolved based on "userIpRequestHeaders" configured with the security policy. If there is no "userIpRequestHeaders" configuration or an IP address cannot be resolved from it, the key type defaults to IP.
22755
+ Possible values are: `ALL`, `IP`, `HTTP_HEADER`, `XFF_IP`, `HTTP_COOKIE`, `HTTP_PATH`, `SNI`, `REGION_CODE`, `TLS_JA3_FINGERPRINT`, `USER_IP`.
22756
+ """
22757
+ return pulumi.get(self, "enforce_on_key")
22758
+
22759
+ @property
22760
+ @pulumi.getter(name="enforceOnKeyConfigs")
22761
+ def enforce_on_key_configs(self) -> Optional[Sequence['outputs.RegionSecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig']]:
22762
+ """
22763
+ If specified, any combination of values of enforceOnKeyType/enforceOnKeyName is treated as the key on which ratelimit threshold/action is enforced.
22764
+ You can specify up to 3 enforceOnKeyConfigs.
22765
+ If enforceOnKeyConfigs is specified, enforceOnKey must not be specified.
22766
+ Structure is documented below.
22767
+ """
22768
+ return pulumi.get(self, "enforce_on_key_configs")
22769
+
22770
+ @property
22771
+ @pulumi.getter(name="enforceOnKeyName")
22772
+ def enforce_on_key_name(self) -> Optional[str]:
22773
+ """
22774
+ Rate limit key name applicable only for the following key types:
22775
+ HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value.
22776
+ HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
22777
+ """
22778
+ return pulumi.get(self, "enforce_on_key_name")
22779
+
22780
+ @property
22781
+ @pulumi.getter(name="exceedAction")
22782
+ def exceed_action(self) -> Optional[str]:
22783
+ """
22784
+ Action to take for requests that are above the configured rate limit threshold, to deny with a specified HTTP response code.
22785
+ Valid options are deny(STATUS), where valid values for STATUS are 403, 404, 429, and 502.
22786
+ """
22787
+ return pulumi.get(self, "exceed_action")
22788
+
22789
+ @property
22790
+ @pulumi.getter(name="rateLimitThreshold")
22791
+ def rate_limit_threshold(self) -> Optional['outputs.RegionSecurityPolicyRuleRateLimitOptionsRateLimitThreshold']:
22792
+ """
22793
+ Threshold at which to begin ratelimiting.
22794
+ Structure is documented below.
22795
+ """
22796
+ return pulumi.get(self, "rate_limit_threshold")
22797
+
22798
+
22799
+ @pulumi.output_type
22800
+ class RegionSecurityPolicyRuleRateLimitOptionsBanThreshold(dict):
22801
+ @staticmethod
22802
+ def __key_warning(key: str):
22803
+ suggest = None
22804
+ if key == "intervalSec":
22805
+ suggest = "interval_sec"
22806
+
22807
+ if suggest:
22808
+ pulumi.log.warn(f"Key '{key}' not found in RegionSecurityPolicyRuleRateLimitOptionsBanThreshold. Access the value via the '{suggest}' property getter instead.")
22809
+
22810
+ def __getitem__(self, key: str) -> Any:
22811
+ RegionSecurityPolicyRuleRateLimitOptionsBanThreshold.__key_warning(key)
22812
+ return super().__getitem__(key)
22813
+
22814
+ def get(self, key: str, default = None) -> Any:
22815
+ RegionSecurityPolicyRuleRateLimitOptionsBanThreshold.__key_warning(key)
22816
+ return super().get(key, default)
22817
+
22818
+ def __init__(__self__, *,
22819
+ count: Optional[int] = None,
22820
+ interval_sec: Optional[int] = None):
22821
+ """
22822
+ :param int count: Number of HTTP(S) requests for calculating the threshold.
22823
+ :param int interval_sec: Interval over which the threshold is computed.
22824
+ """
22825
+ if count is not None:
22826
+ pulumi.set(__self__, "count", count)
22827
+ if interval_sec is not None:
22828
+ pulumi.set(__self__, "interval_sec", interval_sec)
22829
+
22830
+ @property
22831
+ @pulumi.getter
22832
+ def count(self) -> Optional[int]:
22833
+ """
22834
+ Number of HTTP(S) requests for calculating the threshold.
22835
+ """
22836
+ return pulumi.get(self, "count")
22837
+
22838
+ @property
22839
+ @pulumi.getter(name="intervalSec")
22840
+ def interval_sec(self) -> Optional[int]:
22841
+ """
22842
+ Interval over which the threshold is computed.
22843
+ """
22844
+ return pulumi.get(self, "interval_sec")
22845
+
22846
+
22847
+ @pulumi.output_type
22848
+ class RegionSecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig(dict):
22849
+ @staticmethod
22850
+ def __key_warning(key: str):
22851
+ suggest = None
22852
+ if key == "enforceOnKeyName":
22853
+ suggest = "enforce_on_key_name"
22854
+ elif key == "enforceOnKeyType":
22855
+ suggest = "enforce_on_key_type"
22856
+
22857
+ if suggest:
22858
+ pulumi.log.warn(f"Key '{key}' not found in RegionSecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig. Access the value via the '{suggest}' property getter instead.")
22859
+
22860
+ def __getitem__(self, key: str) -> Any:
22861
+ RegionSecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig.__key_warning(key)
22862
+ return super().__getitem__(key)
22863
+
22864
+ def get(self, key: str, default = None) -> Any:
22865
+ RegionSecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig.__key_warning(key)
22866
+ return super().get(key, default)
22867
+
22868
+ def __init__(__self__, *,
22869
+ enforce_on_key_name: Optional[str] = None,
22870
+ enforce_on_key_type: Optional[str] = None):
22871
+ """
22872
+ :param str enforce_on_key_name: Rate limit key name applicable only for the following key types:
22873
+ HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value.
22874
+ HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
22875
+ :param str enforce_on_key_type: Determines the key to enforce the rateLimitThreshold on. Possible values are:
22876
+ * ALL: A single rate limit threshold is applied to all the requests matching this rule. This is the default value if "enforceOnKeyConfigs" is not configured.
22877
+ * IP: The source IP address of the request is the key. Each IP has this limit enforced separately.
22878
+ * HTTP_HEADER: The value of the HTTP header whose name is configured under "enforceOnKeyName". The key value is truncated to the first 128 bytes of the header value. If no such header is present in the request, the key type defaults to ALL.
22879
+ * XFF_IP: The first IP address (i.e. the originating client IP address) specified in the list of IPs under X-Forwarded-For HTTP header. If no such header is present or the value is not a valid IP, the key defaults to the source IP address of the request i.e. key type IP.
22880
+ * HTTP_COOKIE: The value of the HTTP cookie whose name is configured under "enforceOnKeyName". The key value is truncated to the first 128 bytes of the cookie value. If no such cookie is present in the request, the key type defaults to ALL.
22881
+ * HTTP_PATH: The URL path of the HTTP request. The key value is truncated to the first 128 bytes.
22882
+ * SNI: Server name indication in the TLS session of the HTTPS request. The key value is truncated to the first 128 bytes. The key type defaults to ALL on a HTTP session.
22883
+ * REGION_CODE: The country/region from which the request originates.
22884
+ * TLS_JA3_FINGERPRINT: JA3 TLS/SSL fingerprint if the client connects using HTTPS, HTTP/2 or HTTP/3. If not available, the key type defaults to ALL.
22885
+ * USER_IP: The IP address of the originating client, which is resolved based on "userIpRequestHeaders" configured with the security policy. If there is no "userIpRequestHeaders" configuration or an IP address cannot be resolved from it, the key type defaults to IP.
22886
+ Possible values are: `ALL`, `IP`, `HTTP_HEADER`, `XFF_IP`, `HTTP_COOKIE`, `HTTP_PATH`, `SNI`, `REGION_CODE`, `TLS_JA3_FINGERPRINT`, `USER_IP`.
22887
+ """
22888
+ if enforce_on_key_name is not None:
22889
+ pulumi.set(__self__, "enforce_on_key_name", enforce_on_key_name)
22890
+ if enforce_on_key_type is not None:
22891
+ pulumi.set(__self__, "enforce_on_key_type", enforce_on_key_type)
22892
+
22893
+ @property
22894
+ @pulumi.getter(name="enforceOnKeyName")
22895
+ def enforce_on_key_name(self) -> Optional[str]:
22896
+ """
22897
+ Rate limit key name applicable only for the following key types:
22898
+ HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value.
22899
+ HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
22900
+ """
22901
+ return pulumi.get(self, "enforce_on_key_name")
22902
+
22903
+ @property
22904
+ @pulumi.getter(name="enforceOnKeyType")
22905
+ def enforce_on_key_type(self) -> Optional[str]:
22906
+ """
22907
+ Determines the key to enforce the rateLimitThreshold on. Possible values are:
22908
+ * ALL: A single rate limit threshold is applied to all the requests matching this rule. This is the default value if "enforceOnKeyConfigs" is not configured.
22909
+ * IP: The source IP address of the request is the key. Each IP has this limit enforced separately.
22910
+ * HTTP_HEADER: The value of the HTTP header whose name is configured under "enforceOnKeyName". The key value is truncated to the first 128 bytes of the header value. If no such header is present in the request, the key type defaults to ALL.
22911
+ * XFF_IP: The first IP address (i.e. the originating client IP address) specified in the list of IPs under X-Forwarded-For HTTP header. If no such header is present or the value is not a valid IP, the key defaults to the source IP address of the request i.e. key type IP.
22912
+ * HTTP_COOKIE: The value of the HTTP cookie whose name is configured under "enforceOnKeyName". The key value is truncated to the first 128 bytes of the cookie value. If no such cookie is present in the request, the key type defaults to ALL.
22913
+ * HTTP_PATH: The URL path of the HTTP request. The key value is truncated to the first 128 bytes.
22914
+ * SNI: Server name indication in the TLS session of the HTTPS request. The key value is truncated to the first 128 bytes. The key type defaults to ALL on a HTTP session.
22915
+ * REGION_CODE: The country/region from which the request originates.
22916
+ * TLS_JA3_FINGERPRINT: JA3 TLS/SSL fingerprint if the client connects using HTTPS, HTTP/2 or HTTP/3. If not available, the key type defaults to ALL.
22917
+ * USER_IP: The IP address of the originating client, which is resolved based on "userIpRequestHeaders" configured with the security policy. If there is no "userIpRequestHeaders" configuration or an IP address cannot be resolved from it, the key type defaults to IP.
22918
+ Possible values are: `ALL`, `IP`, `HTTP_HEADER`, `XFF_IP`, `HTTP_COOKIE`, `HTTP_PATH`, `SNI`, `REGION_CODE`, `TLS_JA3_FINGERPRINT`, `USER_IP`.
22919
+ """
22920
+ return pulumi.get(self, "enforce_on_key_type")
22921
+
22922
+
22923
+ @pulumi.output_type
22924
+ class RegionSecurityPolicyRuleRateLimitOptionsRateLimitThreshold(dict):
22925
+ @staticmethod
22926
+ def __key_warning(key: str):
22927
+ suggest = None
22928
+ if key == "intervalSec":
22929
+ suggest = "interval_sec"
22930
+
22931
+ if suggest:
22932
+ pulumi.log.warn(f"Key '{key}' not found in RegionSecurityPolicyRuleRateLimitOptionsRateLimitThreshold. Access the value via the '{suggest}' property getter instead.")
22933
+
22934
+ def __getitem__(self, key: str) -> Any:
22935
+ RegionSecurityPolicyRuleRateLimitOptionsRateLimitThreshold.__key_warning(key)
22936
+ return super().__getitem__(key)
22937
+
22938
+ def get(self, key: str, default = None) -> Any:
22939
+ RegionSecurityPolicyRuleRateLimitOptionsRateLimitThreshold.__key_warning(key)
22940
+ return super().get(key, default)
22941
+
22942
+ def __init__(__self__, *,
22943
+ count: Optional[int] = None,
22944
+ interval_sec: Optional[int] = None):
22945
+ """
22946
+ :param int count: Number of HTTP(S) requests for calculating the threshold.
22947
+ :param int interval_sec: Interval over which the threshold is computed.
22948
+ """
22949
+ if count is not None:
22950
+ pulumi.set(__self__, "count", count)
22951
+ if interval_sec is not None:
22952
+ pulumi.set(__self__, "interval_sec", interval_sec)
22953
+
22954
+ @property
22955
+ @pulumi.getter
22956
+ def count(self) -> Optional[int]:
22957
+ """
22958
+ Number of HTTP(S) requests for calculating the threshold.
22959
+ """
22960
+ return pulumi.get(self, "count")
22961
+
22962
+ @property
22963
+ @pulumi.getter(name="intervalSec")
22964
+ def interval_sec(self) -> Optional[int]:
22965
+ """
22966
+ Interval over which the threshold is computed.
22967
+ """
22968
+ return pulumi.get(self, "interval_sec")
22969
+
22970
+
22287
22971
  @pulumi.output_type
22288
22972
  class RegionSecurityPolicyUserDefinedField(dict):
22289
22973
  def __init__(__self__, *,