pulumi-gcp 7.25.0a1717104660__py3-none-any.whl → 7.25.0a1717407024__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +88 -0
- pulumi_gcp/appengine/_inputs.py +18 -0
- pulumi_gcp/appengine/domain_mapping.py +1 -1
- pulumi_gcp/appengine/outputs.py +16 -0
- pulumi_gcp/bigquery/_inputs.py +286 -2
- pulumi_gcp/bigquery/outputs.py +289 -2
- pulumi_gcp/bigquery/table.py +77 -35
- pulumi_gcp/cloudfunctionsv2/function.py +0 -4
- pulumi_gcp/cloudrun/_inputs.py +80 -4
- pulumi_gcp/cloudrun/outputs.py +137 -4
- pulumi_gcp/composer/user_workloads_secret.py +4 -4
- pulumi_gcp/compute/__init__.py +1 -0
- pulumi_gcp/compute/_inputs.py +398 -176
- pulumi_gcp/compute/get_subnetworks.py +157 -0
- pulumi_gcp/compute/instance_group_membership.py +2 -2
- pulumi_gcp/compute/interconnect_attachment.py +82 -0
- pulumi_gcp/compute/network_endpoint.py +2 -2
- pulumi_gcp/compute/network_endpoint_list.py +2 -2
- pulumi_gcp/compute/outputs.py +609 -161
- pulumi_gcp/compute/region_ssl_policy.py +39 -40
- pulumi_gcp/compute/security_policy_rule.py +55 -1
- pulumi_gcp/container/_inputs.py +560 -0
- pulumi_gcp/container/outputs.py +1106 -51
- pulumi_gcp/dataplex/__init__.py +10 -0
- pulumi_gcp/dataplex/_inputs.py +160 -0
- pulumi_gcp/dataplex/aspect_type.py +1077 -0
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +765 -0
- pulumi_gcp/dataplex/aspect_type_iam_member.py +765 -0
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +604 -0
- pulumi_gcp/dataplex/entry_group.py +722 -0
- pulumi_gcp/dataplex/entry_group_iam_binding.py +765 -0
- pulumi_gcp/dataplex/entry_group_iam_member.py +765 -0
- pulumi_gcp/dataplex/entry_group_iam_policy.py +604 -0
- pulumi_gcp/dataplex/get_aspect_type_iam_policy.py +164 -0
- pulumi_gcp/dataplex/get_entry_group_iam_policy.py +164 -0
- pulumi_gcp/dataplex/outputs.py +112 -0
- pulumi_gcp/datastream/connection_profile.py +47 -0
- pulumi_gcp/datastream/private_connection.py +47 -0
- pulumi_gcp/datastream/stream.py +47 -0
- pulumi_gcp/kms/__init__.py +2 -0
- pulumi_gcp/kms/autokey_config.py +366 -0
- pulumi_gcp/kms/key_handle.py +548 -0
- pulumi_gcp/networkservices/__init__.py +1 -0
- pulumi_gcp/networkservices/_inputs.py +245 -27
- pulumi_gcp/networkservices/lb_route_extension.py +663 -0
- pulumi_gcp/networkservices/lb_traffic_extension.py +28 -14
- pulumi_gcp/networkservices/outputs.py +251 -20
- pulumi_gcp/orgpolicy/policy.py +2 -2
- pulumi_gcp/pubsub/_inputs.py +16 -0
- pulumi_gcp/pubsub/outputs.py +25 -0
- pulumi_gcp/pubsub/subscription.py +8 -4
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/sql/user.py +4 -4
- pulumi_gcp/tpu/_inputs.py +2 -2
- pulumi_gcp/tpu/outputs.py +2 -2
- {pulumi_gcp-7.25.0a1717104660.dist-info → pulumi_gcp-7.25.0a1717407024.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.25.0a1717104660.dist-info → pulumi_gcp-7.25.0a1717407024.dist-info}/RECORD +59 -45
- {pulumi_gcp-7.25.0a1717104660.dist-info → pulumi_gcp-7.25.0a1717407024.dist-info}/WHEEL +0 -0
- {pulumi_gcp-7.25.0a1717104660.dist-info → pulumi_gcp-7.25.0a1717407024.dist-info}/top_level.txt +0 -0
pulumi_gcp/container/outputs.py
CHANGED
@@ -134,6 +134,10 @@ __all__ = [
|
|
134
134
|
'ClusterNodeConfig',
|
135
135
|
'ClusterNodeConfigAdvancedMachineFeatures',
|
136
136
|
'ClusterNodeConfigConfidentialNodes',
|
137
|
+
'ClusterNodeConfigContainerdConfig',
|
138
|
+
'ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfig',
|
139
|
+
'ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig',
|
140
|
+
'ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig',
|
137
141
|
'ClusterNodeConfigEffectiveTaint',
|
138
142
|
'ClusterNodeConfigEphemeralStorageConfig',
|
139
143
|
'ClusterNodeConfigEphemeralStorageLocalSsdConfig',
|
@@ -161,6 +165,10 @@ __all__ = [
|
|
161
165
|
'ClusterNodePoolAutoscaling',
|
162
166
|
'ClusterNodePoolDefaults',
|
163
167
|
'ClusterNodePoolDefaultsNodeConfigDefaults',
|
168
|
+
'ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfig',
|
169
|
+
'ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfig',
|
170
|
+
'ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig',
|
171
|
+
'ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig',
|
164
172
|
'ClusterNodePoolDefaultsNodeConfigDefaultsGcfsConfig',
|
165
173
|
'ClusterNodePoolManagement',
|
166
174
|
'ClusterNodePoolNetworkConfig',
|
@@ -171,6 +179,10 @@ __all__ = [
|
|
171
179
|
'ClusterNodePoolNodeConfig',
|
172
180
|
'ClusterNodePoolNodeConfigAdvancedMachineFeatures',
|
173
181
|
'ClusterNodePoolNodeConfigConfidentialNodes',
|
182
|
+
'ClusterNodePoolNodeConfigContainerdConfig',
|
183
|
+
'ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfig',
|
184
|
+
'ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig',
|
185
|
+
'ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig',
|
174
186
|
'ClusterNodePoolNodeConfigEffectiveTaint',
|
175
187
|
'ClusterNodePoolNodeConfigEphemeralStorageConfig',
|
176
188
|
'ClusterNodePoolNodeConfigEphemeralStorageLocalSsdConfig',
|
@@ -224,6 +236,10 @@ __all__ = [
|
|
224
236
|
'NodePoolNodeConfig',
|
225
237
|
'NodePoolNodeConfigAdvancedMachineFeatures',
|
226
238
|
'NodePoolNodeConfigConfidentialNodes',
|
239
|
+
'NodePoolNodeConfigContainerdConfig',
|
240
|
+
'NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfig',
|
241
|
+
'NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig',
|
242
|
+
'NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig',
|
227
243
|
'NodePoolNodeConfigEffectiveTaint',
|
228
244
|
'NodePoolNodeConfigEphemeralStorageConfig',
|
229
245
|
'NodePoolNodeConfigEphemeralStorageLocalSsdConfig',
|
@@ -306,6 +322,10 @@ __all__ = [
|
|
306
322
|
'GetClusterNodeConfigResult',
|
307
323
|
'GetClusterNodeConfigAdvancedMachineFeatureResult',
|
308
324
|
'GetClusterNodeConfigConfidentialNodeResult',
|
325
|
+
'GetClusterNodeConfigContainerdConfigResult',
|
326
|
+
'GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigResult',
|
327
|
+
'GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigResult',
|
328
|
+
'GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigResult',
|
309
329
|
'GetClusterNodeConfigEffectiveTaintResult',
|
310
330
|
'GetClusterNodeConfigEphemeralStorageConfigResult',
|
311
331
|
'GetClusterNodeConfigEphemeralStorageLocalSsdConfigResult',
|
@@ -333,6 +353,10 @@ __all__ = [
|
|
333
353
|
'GetClusterNodePoolAutoscalingResult',
|
334
354
|
'GetClusterNodePoolDefaultResult',
|
335
355
|
'GetClusterNodePoolDefaultNodeConfigDefaultResult',
|
356
|
+
'GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigResult',
|
357
|
+
'GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigResult',
|
358
|
+
'GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigResult',
|
359
|
+
'GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigResult',
|
336
360
|
'GetClusterNodePoolDefaultNodeConfigDefaultGcfsConfigResult',
|
337
361
|
'GetClusterNodePoolManagementResult',
|
338
362
|
'GetClusterNodePoolNetworkConfigResult',
|
@@ -343,6 +367,10 @@ __all__ = [
|
|
343
367
|
'GetClusterNodePoolNodeConfigResult',
|
344
368
|
'GetClusterNodePoolNodeConfigAdvancedMachineFeatureResult',
|
345
369
|
'GetClusterNodePoolNodeConfigConfidentialNodeResult',
|
370
|
+
'GetClusterNodePoolNodeConfigContainerdConfigResult',
|
371
|
+
'GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigResult',
|
372
|
+
'GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigResult',
|
373
|
+
'GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigResult',
|
346
374
|
'GetClusterNodePoolNodeConfigEffectiveTaintResult',
|
347
375
|
'GetClusterNodePoolNodeConfigEphemeralStorageConfigResult',
|
348
376
|
'GetClusterNodePoolNodeConfigEphemeralStorageLocalSsdConfigResult',
|
@@ -6413,6 +6441,8 @@ class ClusterNodeConfig(dict):
|
|
6413
6441
|
suggest = "boot_disk_kms_key"
|
6414
6442
|
elif key == "confidentialNodes":
|
6415
6443
|
suggest = "confidential_nodes"
|
6444
|
+
elif key == "containerdConfig":
|
6445
|
+
suggest = "containerd_config"
|
6416
6446
|
elif key == "diskSizeGb":
|
6417
6447
|
suggest = "disk_size_gb"
|
6418
6448
|
elif key == "diskType":
|
@@ -6487,6 +6517,7 @@ class ClusterNodeConfig(dict):
|
|
6487
6517
|
advanced_machine_features: Optional['outputs.ClusterNodeConfigAdvancedMachineFeatures'] = None,
|
6488
6518
|
boot_disk_kms_key: Optional[str] = None,
|
6489
6519
|
confidential_nodes: Optional['outputs.ClusterNodeConfigConfidentialNodes'] = None,
|
6520
|
+
containerd_config: Optional['outputs.ClusterNodeConfigContainerdConfig'] = None,
|
6490
6521
|
disk_size_gb: Optional[int] = None,
|
6491
6522
|
disk_type: Optional[str] = None,
|
6492
6523
|
effective_taints: Optional[Sequence['outputs.ClusterNodeConfigEffectiveTaint']] = None,
|
@@ -6528,6 +6559,7 @@ class ClusterNodeConfig(dict):
|
|
6528
6559
|
advanced machine features. Structure is documented below.
|
6529
6560
|
:param str boot_disk_kms_key: The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool. This should be of the form projects/[KEY_PROJECT_ID]/locations/[LOCATION]/keyRings/[RING_NAME]/cryptoKeys/[KEY_NAME]. For more information about protecting resources with Cloud KMS Keys please see: <https://cloud.google.com/compute/docs/disks/customer-managed-encryption>
|
6530
6561
|
:param 'ClusterNodeConfigConfidentialNodesArgs' confidential_nodes: Configuration for [Confidential Nodes](https://cloud.google.com/kubernetes-engine/docs/how-to/confidential-gke-nodes) feature. Structure is documented below documented below.
|
6562
|
+
:param 'ClusterNodeConfigContainerdConfigArgs' containerd_config: Parameters to customize containerd runtime. Structure is documented below.
|
6531
6563
|
:param int disk_size_gb: Size of the disk attached to each node, specified
|
6532
6564
|
in GB. The smallest allowed disk size is 10GB. Defaults to 100GB.
|
6533
6565
|
:param str disk_type: Type of the disk attached to each node
|
@@ -6628,6 +6660,8 @@ class ClusterNodeConfig(dict):
|
|
6628
6660
|
pulumi.set(__self__, "boot_disk_kms_key", boot_disk_kms_key)
|
6629
6661
|
if confidential_nodes is not None:
|
6630
6662
|
pulumi.set(__self__, "confidential_nodes", confidential_nodes)
|
6663
|
+
if containerd_config is not None:
|
6664
|
+
pulumi.set(__self__, "containerd_config", containerd_config)
|
6631
6665
|
if disk_size_gb is not None:
|
6632
6666
|
pulumi.set(__self__, "disk_size_gb", disk_size_gb)
|
6633
6667
|
if disk_type is not None:
|
@@ -6726,6 +6760,14 @@ class ClusterNodeConfig(dict):
|
|
6726
6760
|
"""
|
6727
6761
|
return pulumi.get(self, "confidential_nodes")
|
6728
6762
|
|
6763
|
+
@property
|
6764
|
+
@pulumi.getter(name="containerdConfig")
|
6765
|
+
def containerd_config(self) -> Optional['outputs.ClusterNodeConfigContainerdConfig']:
|
6766
|
+
"""
|
6767
|
+
Parameters to customize containerd runtime. Structure is documented below.
|
6768
|
+
"""
|
6769
|
+
return pulumi.get(self, "containerd_config")
|
6770
|
+
|
6729
6771
|
@property
|
6730
6772
|
@pulumi.getter(name="diskSizeGb")
|
6731
6773
|
def disk_size_gb(self) -> Optional[int]:
|
@@ -7141,6 +7183,170 @@ class ClusterNodeConfigConfidentialNodes(dict):
|
|
7141
7183
|
return pulumi.get(self, "enabled")
|
7142
7184
|
|
7143
7185
|
|
7186
|
+
@pulumi.output_type
|
7187
|
+
class ClusterNodeConfigContainerdConfig(dict):
|
7188
|
+
@staticmethod
|
7189
|
+
def __key_warning(key: str):
|
7190
|
+
suggest = None
|
7191
|
+
if key == "privateRegistryAccessConfig":
|
7192
|
+
suggest = "private_registry_access_config"
|
7193
|
+
|
7194
|
+
if suggest:
|
7195
|
+
pulumi.log.warn(f"Key '{key}' not found in ClusterNodeConfigContainerdConfig. Access the value via the '{suggest}' property getter instead.")
|
7196
|
+
|
7197
|
+
def __getitem__(self, key: str) -> Any:
|
7198
|
+
ClusterNodeConfigContainerdConfig.__key_warning(key)
|
7199
|
+
return super().__getitem__(key)
|
7200
|
+
|
7201
|
+
def get(self, key: str, default = None) -> Any:
|
7202
|
+
ClusterNodeConfigContainerdConfig.__key_warning(key)
|
7203
|
+
return super().get(key, default)
|
7204
|
+
|
7205
|
+
def __init__(__self__, *,
|
7206
|
+
private_registry_access_config: Optional['outputs.ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfig'] = None):
|
7207
|
+
"""
|
7208
|
+
:param 'ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigArgs' private_registry_access_config: Configuration for private container registries. There are two fields in this config:
|
7209
|
+
"""
|
7210
|
+
if private_registry_access_config is not None:
|
7211
|
+
pulumi.set(__self__, "private_registry_access_config", private_registry_access_config)
|
7212
|
+
|
7213
|
+
@property
|
7214
|
+
@pulumi.getter(name="privateRegistryAccessConfig")
|
7215
|
+
def private_registry_access_config(self) -> Optional['outputs.ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfig']:
|
7216
|
+
"""
|
7217
|
+
Configuration for private container registries. There are two fields in this config:
|
7218
|
+
"""
|
7219
|
+
return pulumi.get(self, "private_registry_access_config")
|
7220
|
+
|
7221
|
+
|
7222
|
+
@pulumi.output_type
|
7223
|
+
class ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfig(dict):
|
7224
|
+
@staticmethod
|
7225
|
+
def __key_warning(key: str):
|
7226
|
+
suggest = None
|
7227
|
+
if key == "certificateAuthorityDomainConfigs":
|
7228
|
+
suggest = "certificate_authority_domain_configs"
|
7229
|
+
|
7230
|
+
if suggest:
|
7231
|
+
pulumi.log.warn(f"Key '{key}' not found in ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfig. Access the value via the '{suggest}' property getter instead.")
|
7232
|
+
|
7233
|
+
def __getitem__(self, key: str) -> Any:
|
7234
|
+
ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfig.__key_warning(key)
|
7235
|
+
return super().__getitem__(key)
|
7236
|
+
|
7237
|
+
def get(self, key: str, default = None) -> Any:
|
7238
|
+
ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfig.__key_warning(key)
|
7239
|
+
return super().get(key, default)
|
7240
|
+
|
7241
|
+
def __init__(__self__, *,
|
7242
|
+
enabled: bool,
|
7243
|
+
certificate_authority_domain_configs: Optional[Sequence['outputs.ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig']] = None):
|
7244
|
+
"""
|
7245
|
+
:param bool enabled: Enables private registry config. If set to false, all other fields in this object must not be set.
|
7246
|
+
:param Sequence['ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigArgs'] certificate_authority_domain_configs: List of configuration objects for CA and domains. Each object identifies a certificate and its assigned domains. See [how to configure for private container registries](https://cloud.google.com/kubernetes-engine/docs/how-to/access-private-registries-private-certificates) for more detail. Example:
|
7247
|
+
"""
|
7248
|
+
pulumi.set(__self__, "enabled", enabled)
|
7249
|
+
if certificate_authority_domain_configs is not None:
|
7250
|
+
pulumi.set(__self__, "certificate_authority_domain_configs", certificate_authority_domain_configs)
|
7251
|
+
|
7252
|
+
@property
|
7253
|
+
@pulumi.getter
|
7254
|
+
def enabled(self) -> bool:
|
7255
|
+
"""
|
7256
|
+
Enables private registry config. If set to false, all other fields in this object must not be set.
|
7257
|
+
"""
|
7258
|
+
return pulumi.get(self, "enabled")
|
7259
|
+
|
7260
|
+
@property
|
7261
|
+
@pulumi.getter(name="certificateAuthorityDomainConfigs")
|
7262
|
+
def certificate_authority_domain_configs(self) -> Optional[Sequence['outputs.ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig']]:
|
7263
|
+
"""
|
7264
|
+
List of configuration objects for CA and domains. Each object identifies a certificate and its assigned domains. See [how to configure for private container registries](https://cloud.google.com/kubernetes-engine/docs/how-to/access-private-registries-private-certificates) for more detail. Example:
|
7265
|
+
"""
|
7266
|
+
return pulumi.get(self, "certificate_authority_domain_configs")
|
7267
|
+
|
7268
|
+
|
7269
|
+
@pulumi.output_type
|
7270
|
+
class ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig(dict):
|
7271
|
+
@staticmethod
|
7272
|
+
def __key_warning(key: str):
|
7273
|
+
suggest = None
|
7274
|
+
if key == "gcpSecretManagerCertificateConfig":
|
7275
|
+
suggest = "gcp_secret_manager_certificate_config"
|
7276
|
+
|
7277
|
+
if suggest:
|
7278
|
+
pulumi.log.warn(f"Key '{key}' not found in ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig. Access the value via the '{suggest}' property getter instead.")
|
7279
|
+
|
7280
|
+
def __getitem__(self, key: str) -> Any:
|
7281
|
+
ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig.__key_warning(key)
|
7282
|
+
return super().__getitem__(key)
|
7283
|
+
|
7284
|
+
def get(self, key: str, default = None) -> Any:
|
7285
|
+
ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig.__key_warning(key)
|
7286
|
+
return super().get(key, default)
|
7287
|
+
|
7288
|
+
def __init__(__self__, *,
|
7289
|
+
fqdns: Sequence[str],
|
7290
|
+
gcp_secret_manager_certificate_config: 'outputs.ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig'):
|
7291
|
+
"""
|
7292
|
+
:param Sequence[str] fqdns: List of fully-qualified-domain-names. IPv4s and port specification are supported.
|
7293
|
+
:param 'ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigArgs' gcp_secret_manager_certificate_config: Parameters for configuring a certificate hosted in GCP SecretManager.
|
7294
|
+
"""
|
7295
|
+
pulumi.set(__self__, "fqdns", fqdns)
|
7296
|
+
pulumi.set(__self__, "gcp_secret_manager_certificate_config", gcp_secret_manager_certificate_config)
|
7297
|
+
|
7298
|
+
@property
|
7299
|
+
@pulumi.getter
|
7300
|
+
def fqdns(self) -> Sequence[str]:
|
7301
|
+
"""
|
7302
|
+
List of fully-qualified-domain-names. IPv4s and port specification are supported.
|
7303
|
+
"""
|
7304
|
+
return pulumi.get(self, "fqdns")
|
7305
|
+
|
7306
|
+
@property
|
7307
|
+
@pulumi.getter(name="gcpSecretManagerCertificateConfig")
|
7308
|
+
def gcp_secret_manager_certificate_config(self) -> 'outputs.ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig':
|
7309
|
+
"""
|
7310
|
+
Parameters for configuring a certificate hosted in GCP SecretManager.
|
7311
|
+
"""
|
7312
|
+
return pulumi.get(self, "gcp_secret_manager_certificate_config")
|
7313
|
+
|
7314
|
+
|
7315
|
+
@pulumi.output_type
|
7316
|
+
class ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig(dict):
|
7317
|
+
@staticmethod
|
7318
|
+
def __key_warning(key: str):
|
7319
|
+
suggest = None
|
7320
|
+
if key == "secretUri":
|
7321
|
+
suggest = "secret_uri"
|
7322
|
+
|
7323
|
+
if suggest:
|
7324
|
+
pulumi.log.warn(f"Key '{key}' not found in ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig. Access the value via the '{suggest}' property getter instead.")
|
7325
|
+
|
7326
|
+
def __getitem__(self, key: str) -> Any:
|
7327
|
+
ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig.__key_warning(key)
|
7328
|
+
return super().__getitem__(key)
|
7329
|
+
|
7330
|
+
def get(self, key: str, default = None) -> Any:
|
7331
|
+
ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig.__key_warning(key)
|
7332
|
+
return super().get(key, default)
|
7333
|
+
|
7334
|
+
def __init__(__self__, *,
|
7335
|
+
secret_uri: str):
|
7336
|
+
"""
|
7337
|
+
:param str secret_uri: URI for the secret that hosts a certificate. Must be in the format 'projects/PROJECT_NUM/secrets/SECRET_NAME/versions/VERSION_OR_LATEST'.
|
7338
|
+
"""
|
7339
|
+
pulumi.set(__self__, "secret_uri", secret_uri)
|
7340
|
+
|
7341
|
+
@property
|
7342
|
+
@pulumi.getter(name="secretUri")
|
7343
|
+
def secret_uri(self) -> str:
|
7344
|
+
"""
|
7345
|
+
URI for the secret that hosts a certificate. Must be in the format 'projects/PROJECT_NUM/secrets/SECRET_NAME/versions/VERSION_OR_LATEST'.
|
7346
|
+
"""
|
7347
|
+
return pulumi.get(self, "secret_uri")
|
7348
|
+
|
7349
|
+
|
7144
7350
|
@pulumi.output_type
|
7145
7351
|
class ClusterNodeConfigEffectiveTaint(dict):
|
7146
7352
|
def __init__(__self__, *,
|
@@ -8566,7 +8772,9 @@ class ClusterNodePoolDefaultsNodeConfigDefaults(dict):
|
|
8566
8772
|
@staticmethod
|
8567
8773
|
def __key_warning(key: str):
|
8568
8774
|
suggest = None
|
8569
|
-
if key == "
|
8775
|
+
if key == "containerdConfig":
|
8776
|
+
suggest = "containerd_config"
|
8777
|
+
elif key == "gcfsConfig":
|
8570
8778
|
suggest = "gcfs_config"
|
8571
8779
|
elif key == "loggingVariant":
|
8572
8780
|
suggest = "logging_variant"
|
@@ -8583,17 +8791,29 @@ class ClusterNodePoolDefaultsNodeConfigDefaults(dict):
|
|
8583
8791
|
return super().get(key, default)
|
8584
8792
|
|
8585
8793
|
def __init__(__self__, *,
|
8794
|
+
containerd_config: Optional['outputs.ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfig'] = None,
|
8586
8795
|
gcfs_config: Optional['outputs.ClusterNodePoolDefaultsNodeConfigDefaultsGcfsConfig'] = None,
|
8587
8796
|
logging_variant: Optional[str] = None):
|
8588
8797
|
"""
|
8798
|
+
:param 'ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigArgs' containerd_config: Parameters for containerd configuration.
|
8589
8799
|
:param 'ClusterNodePoolDefaultsNodeConfigDefaultsGcfsConfigArgs' gcfs_config: The default Google Container Filesystem (GCFS) configuration at the cluster level. e.g. enable [image streaming](https://cloud.google.com/kubernetes-engine/docs/how-to/image-streaming) across all the node pools within the cluster. Structure is documented below.
|
8590
8800
|
:param str logging_variant: The type of logging agent that is deployed by default for newly created node pools in the cluster. Valid values include DEFAULT and MAX_THROUGHPUT. See [Increasing logging agent throughput](https://cloud.google.com/stackdriver/docs/solutions/gke/managing-logs#throughput) for more information.
|
8591
8801
|
"""
|
8802
|
+
if containerd_config is not None:
|
8803
|
+
pulumi.set(__self__, "containerd_config", containerd_config)
|
8592
8804
|
if gcfs_config is not None:
|
8593
8805
|
pulumi.set(__self__, "gcfs_config", gcfs_config)
|
8594
8806
|
if logging_variant is not None:
|
8595
8807
|
pulumi.set(__self__, "logging_variant", logging_variant)
|
8596
8808
|
|
8809
|
+
@property
|
8810
|
+
@pulumi.getter(name="containerdConfig")
|
8811
|
+
def containerd_config(self) -> Optional['outputs.ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfig']:
|
8812
|
+
"""
|
8813
|
+
Parameters for containerd configuration.
|
8814
|
+
"""
|
8815
|
+
return pulumi.get(self, "containerd_config")
|
8816
|
+
|
8597
8817
|
@property
|
8598
8818
|
@pulumi.getter(name="gcfsConfig")
|
8599
8819
|
def gcfs_config(self) -> Optional['outputs.ClusterNodePoolDefaultsNodeConfigDefaultsGcfsConfig']:
|
@@ -8611,6 +8831,170 @@ class ClusterNodePoolDefaultsNodeConfigDefaults(dict):
|
|
8611
8831
|
return pulumi.get(self, "logging_variant")
|
8612
8832
|
|
8613
8833
|
|
8834
|
+
@pulumi.output_type
|
8835
|
+
class ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfig(dict):
|
8836
|
+
@staticmethod
|
8837
|
+
def __key_warning(key: str):
|
8838
|
+
suggest = None
|
8839
|
+
if key == "privateRegistryAccessConfig":
|
8840
|
+
suggest = "private_registry_access_config"
|
8841
|
+
|
8842
|
+
if suggest:
|
8843
|
+
pulumi.log.warn(f"Key '{key}' not found in ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfig. Access the value via the '{suggest}' property getter instead.")
|
8844
|
+
|
8845
|
+
def __getitem__(self, key: str) -> Any:
|
8846
|
+
ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfig.__key_warning(key)
|
8847
|
+
return super().__getitem__(key)
|
8848
|
+
|
8849
|
+
def get(self, key: str, default = None) -> Any:
|
8850
|
+
ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfig.__key_warning(key)
|
8851
|
+
return super().get(key, default)
|
8852
|
+
|
8853
|
+
def __init__(__self__, *,
|
8854
|
+
private_registry_access_config: Optional['outputs.ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfig'] = None):
|
8855
|
+
"""
|
8856
|
+
:param 'ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigArgs' private_registry_access_config: Configuration for private container registries. There are two fields in this config:
|
8857
|
+
"""
|
8858
|
+
if private_registry_access_config is not None:
|
8859
|
+
pulumi.set(__self__, "private_registry_access_config", private_registry_access_config)
|
8860
|
+
|
8861
|
+
@property
|
8862
|
+
@pulumi.getter(name="privateRegistryAccessConfig")
|
8863
|
+
def private_registry_access_config(self) -> Optional['outputs.ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfig']:
|
8864
|
+
"""
|
8865
|
+
Configuration for private container registries. There are two fields in this config:
|
8866
|
+
"""
|
8867
|
+
return pulumi.get(self, "private_registry_access_config")
|
8868
|
+
|
8869
|
+
|
8870
|
+
@pulumi.output_type
|
8871
|
+
class ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfig(dict):
|
8872
|
+
@staticmethod
|
8873
|
+
def __key_warning(key: str):
|
8874
|
+
suggest = None
|
8875
|
+
if key == "certificateAuthorityDomainConfigs":
|
8876
|
+
suggest = "certificate_authority_domain_configs"
|
8877
|
+
|
8878
|
+
if suggest:
|
8879
|
+
pulumi.log.warn(f"Key '{key}' not found in ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfig. Access the value via the '{suggest}' property getter instead.")
|
8880
|
+
|
8881
|
+
def __getitem__(self, key: str) -> Any:
|
8882
|
+
ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfig.__key_warning(key)
|
8883
|
+
return super().__getitem__(key)
|
8884
|
+
|
8885
|
+
def get(self, key: str, default = None) -> Any:
|
8886
|
+
ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfig.__key_warning(key)
|
8887
|
+
return super().get(key, default)
|
8888
|
+
|
8889
|
+
def __init__(__self__, *,
|
8890
|
+
enabled: bool,
|
8891
|
+
certificate_authority_domain_configs: Optional[Sequence['outputs.ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig']] = None):
|
8892
|
+
"""
|
8893
|
+
:param bool enabled: Enables private registry config. If set to false, all other fields in this object must not be set.
|
8894
|
+
:param Sequence['ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigArgs'] certificate_authority_domain_configs: List of configuration objects for CA and domains. Each object identifies a certificate and its assigned domains. See [how to configure for private container registries](https://cloud.google.com/kubernetes-engine/docs/how-to/access-private-registries-private-certificates) for more detail. Example:
|
8895
|
+
"""
|
8896
|
+
pulumi.set(__self__, "enabled", enabled)
|
8897
|
+
if certificate_authority_domain_configs is not None:
|
8898
|
+
pulumi.set(__self__, "certificate_authority_domain_configs", certificate_authority_domain_configs)
|
8899
|
+
|
8900
|
+
@property
|
8901
|
+
@pulumi.getter
|
8902
|
+
def enabled(self) -> bool:
|
8903
|
+
"""
|
8904
|
+
Enables private registry config. If set to false, all other fields in this object must not be set.
|
8905
|
+
"""
|
8906
|
+
return pulumi.get(self, "enabled")
|
8907
|
+
|
8908
|
+
@property
|
8909
|
+
@pulumi.getter(name="certificateAuthorityDomainConfigs")
|
8910
|
+
def certificate_authority_domain_configs(self) -> Optional[Sequence['outputs.ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig']]:
|
8911
|
+
"""
|
8912
|
+
List of configuration objects for CA and domains. Each object identifies a certificate and its assigned domains. See [how to configure for private container registries](https://cloud.google.com/kubernetes-engine/docs/how-to/access-private-registries-private-certificates) for more detail. Example:
|
8913
|
+
"""
|
8914
|
+
return pulumi.get(self, "certificate_authority_domain_configs")
|
8915
|
+
|
8916
|
+
|
8917
|
+
@pulumi.output_type
|
8918
|
+
class ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig(dict):
|
8919
|
+
@staticmethod
|
8920
|
+
def __key_warning(key: str):
|
8921
|
+
suggest = None
|
8922
|
+
if key == "gcpSecretManagerCertificateConfig":
|
8923
|
+
suggest = "gcp_secret_manager_certificate_config"
|
8924
|
+
|
8925
|
+
if suggest:
|
8926
|
+
pulumi.log.warn(f"Key '{key}' not found in ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig. Access the value via the '{suggest}' property getter instead.")
|
8927
|
+
|
8928
|
+
def __getitem__(self, key: str) -> Any:
|
8929
|
+
ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig.__key_warning(key)
|
8930
|
+
return super().__getitem__(key)
|
8931
|
+
|
8932
|
+
def get(self, key: str, default = None) -> Any:
|
8933
|
+
ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig.__key_warning(key)
|
8934
|
+
return super().get(key, default)
|
8935
|
+
|
8936
|
+
def __init__(__self__, *,
|
8937
|
+
fqdns: Sequence[str],
|
8938
|
+
gcp_secret_manager_certificate_config: 'outputs.ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig'):
|
8939
|
+
"""
|
8940
|
+
:param Sequence[str] fqdns: List of fully-qualified-domain-names. IPv4s and port specification are supported.
|
8941
|
+
:param 'ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigArgs' gcp_secret_manager_certificate_config: Parameters for configuring a certificate hosted in GCP SecretManager.
|
8942
|
+
"""
|
8943
|
+
pulumi.set(__self__, "fqdns", fqdns)
|
8944
|
+
pulumi.set(__self__, "gcp_secret_manager_certificate_config", gcp_secret_manager_certificate_config)
|
8945
|
+
|
8946
|
+
@property
|
8947
|
+
@pulumi.getter
|
8948
|
+
def fqdns(self) -> Sequence[str]:
|
8949
|
+
"""
|
8950
|
+
List of fully-qualified-domain-names. IPv4s and port specification are supported.
|
8951
|
+
"""
|
8952
|
+
return pulumi.get(self, "fqdns")
|
8953
|
+
|
8954
|
+
@property
|
8955
|
+
@pulumi.getter(name="gcpSecretManagerCertificateConfig")
|
8956
|
+
def gcp_secret_manager_certificate_config(self) -> 'outputs.ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig':
|
8957
|
+
"""
|
8958
|
+
Parameters for configuring a certificate hosted in GCP SecretManager.
|
8959
|
+
"""
|
8960
|
+
return pulumi.get(self, "gcp_secret_manager_certificate_config")
|
8961
|
+
|
8962
|
+
|
8963
|
+
@pulumi.output_type
|
8964
|
+
class ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig(dict):
|
8965
|
+
@staticmethod
|
8966
|
+
def __key_warning(key: str):
|
8967
|
+
suggest = None
|
8968
|
+
if key == "secretUri":
|
8969
|
+
suggest = "secret_uri"
|
8970
|
+
|
8971
|
+
if suggest:
|
8972
|
+
pulumi.log.warn(f"Key '{key}' not found in ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig. Access the value via the '{suggest}' property getter instead.")
|
8973
|
+
|
8974
|
+
def __getitem__(self, key: str) -> Any:
|
8975
|
+
ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig.__key_warning(key)
|
8976
|
+
return super().__getitem__(key)
|
8977
|
+
|
8978
|
+
def get(self, key: str, default = None) -> Any:
|
8979
|
+
ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig.__key_warning(key)
|
8980
|
+
return super().get(key, default)
|
8981
|
+
|
8982
|
+
def __init__(__self__, *,
|
8983
|
+
secret_uri: str):
|
8984
|
+
"""
|
8985
|
+
:param str secret_uri: URI for the secret that hosts a certificate. Must be in the format 'projects/PROJECT_NUM/secrets/SECRET_NAME/versions/VERSION_OR_LATEST'.
|
8986
|
+
"""
|
8987
|
+
pulumi.set(__self__, "secret_uri", secret_uri)
|
8988
|
+
|
8989
|
+
@property
|
8990
|
+
@pulumi.getter(name="secretUri")
|
8991
|
+
def secret_uri(self) -> str:
|
8992
|
+
"""
|
8993
|
+
URI for the secret that hosts a certificate. Must be in the format 'projects/PROJECT_NUM/secrets/SECRET_NAME/versions/VERSION_OR_LATEST'.
|
8994
|
+
"""
|
8995
|
+
return pulumi.get(self, "secret_uri")
|
8996
|
+
|
8997
|
+
|
8614
8998
|
@pulumi.output_type
|
8615
8999
|
class ClusterNodePoolDefaultsNodeConfigDefaultsGcfsConfig(dict):
|
8616
9000
|
def __init__(__self__, *,
|
@@ -8986,6 +9370,8 @@ class ClusterNodePoolNodeConfig(dict):
|
|
8986
9370
|
suggest = "boot_disk_kms_key"
|
8987
9371
|
elif key == "confidentialNodes":
|
8988
9372
|
suggest = "confidential_nodes"
|
9373
|
+
elif key == "containerdConfig":
|
9374
|
+
suggest = "containerd_config"
|
8989
9375
|
elif key == "diskSizeGb":
|
8990
9376
|
suggest = "disk_size_gb"
|
8991
9377
|
elif key == "diskType":
|
@@ -9060,6 +9446,7 @@ class ClusterNodePoolNodeConfig(dict):
|
|
9060
9446
|
advanced_machine_features: Optional['outputs.ClusterNodePoolNodeConfigAdvancedMachineFeatures'] = None,
|
9061
9447
|
boot_disk_kms_key: Optional[str] = None,
|
9062
9448
|
confidential_nodes: Optional['outputs.ClusterNodePoolNodeConfigConfidentialNodes'] = None,
|
9449
|
+
containerd_config: Optional['outputs.ClusterNodePoolNodeConfigContainerdConfig'] = None,
|
9063
9450
|
disk_size_gb: Optional[int] = None,
|
9064
9451
|
disk_type: Optional[str] = None,
|
9065
9452
|
effective_taints: Optional[Sequence['outputs.ClusterNodePoolNodeConfigEffectiveTaint']] = None,
|
@@ -9101,6 +9488,7 @@ class ClusterNodePoolNodeConfig(dict):
|
|
9101
9488
|
advanced machine features. Structure is documented below.
|
9102
9489
|
:param str boot_disk_kms_key: The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool. This should be of the form projects/[KEY_PROJECT_ID]/locations/[LOCATION]/keyRings/[RING_NAME]/cryptoKeys/[KEY_NAME]. For more information about protecting resources with Cloud KMS Keys please see: <https://cloud.google.com/compute/docs/disks/customer-managed-encryption>
|
9103
9490
|
:param 'ClusterNodePoolNodeConfigConfidentialNodesArgs' confidential_nodes: Configuration for [Confidential Nodes](https://cloud.google.com/kubernetes-engine/docs/how-to/confidential-gke-nodes) feature. Structure is documented below documented below.
|
9491
|
+
:param 'ClusterNodePoolNodeConfigContainerdConfigArgs' containerd_config: Parameters to customize containerd runtime. Structure is documented below.
|
9104
9492
|
:param int disk_size_gb: Size of the disk attached to each node, specified
|
9105
9493
|
in GB. The smallest allowed disk size is 10GB. Defaults to 100GB.
|
9106
9494
|
:param str disk_type: Type of the disk attached to each node
|
@@ -9201,6 +9589,8 @@ class ClusterNodePoolNodeConfig(dict):
|
|
9201
9589
|
pulumi.set(__self__, "boot_disk_kms_key", boot_disk_kms_key)
|
9202
9590
|
if confidential_nodes is not None:
|
9203
9591
|
pulumi.set(__self__, "confidential_nodes", confidential_nodes)
|
9592
|
+
if containerd_config is not None:
|
9593
|
+
pulumi.set(__self__, "containerd_config", containerd_config)
|
9204
9594
|
if disk_size_gb is not None:
|
9205
9595
|
pulumi.set(__self__, "disk_size_gb", disk_size_gb)
|
9206
9596
|
if disk_type is not None:
|
@@ -9299,6 +9689,14 @@ class ClusterNodePoolNodeConfig(dict):
|
|
9299
9689
|
"""
|
9300
9690
|
return pulumi.get(self, "confidential_nodes")
|
9301
9691
|
|
9692
|
+
@property
|
9693
|
+
@pulumi.getter(name="containerdConfig")
|
9694
|
+
def containerd_config(self) -> Optional['outputs.ClusterNodePoolNodeConfigContainerdConfig']:
|
9695
|
+
"""
|
9696
|
+
Parameters to customize containerd runtime. Structure is documented below.
|
9697
|
+
"""
|
9698
|
+
return pulumi.get(self, "containerd_config")
|
9699
|
+
|
9302
9700
|
@property
|
9303
9701
|
@pulumi.getter(name="diskSizeGb")
|
9304
9702
|
def disk_size_gb(self) -> Optional[int]:
|
@@ -9714,6 +10112,170 @@ class ClusterNodePoolNodeConfigConfidentialNodes(dict):
|
|
9714
10112
|
return pulumi.get(self, "enabled")
|
9715
10113
|
|
9716
10114
|
|
10115
|
+
@pulumi.output_type
|
10116
|
+
class ClusterNodePoolNodeConfigContainerdConfig(dict):
|
10117
|
+
@staticmethod
|
10118
|
+
def __key_warning(key: str):
|
10119
|
+
suggest = None
|
10120
|
+
if key == "privateRegistryAccessConfig":
|
10121
|
+
suggest = "private_registry_access_config"
|
10122
|
+
|
10123
|
+
if suggest:
|
10124
|
+
pulumi.log.warn(f"Key '{key}' not found in ClusterNodePoolNodeConfigContainerdConfig. Access the value via the '{suggest}' property getter instead.")
|
10125
|
+
|
10126
|
+
def __getitem__(self, key: str) -> Any:
|
10127
|
+
ClusterNodePoolNodeConfigContainerdConfig.__key_warning(key)
|
10128
|
+
return super().__getitem__(key)
|
10129
|
+
|
10130
|
+
def get(self, key: str, default = None) -> Any:
|
10131
|
+
ClusterNodePoolNodeConfigContainerdConfig.__key_warning(key)
|
10132
|
+
return super().get(key, default)
|
10133
|
+
|
10134
|
+
def __init__(__self__, *,
|
10135
|
+
private_registry_access_config: Optional['outputs.ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfig'] = None):
|
10136
|
+
"""
|
10137
|
+
:param 'ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigArgs' private_registry_access_config: Configuration for private container registries. There are two fields in this config:
|
10138
|
+
"""
|
10139
|
+
if private_registry_access_config is not None:
|
10140
|
+
pulumi.set(__self__, "private_registry_access_config", private_registry_access_config)
|
10141
|
+
|
10142
|
+
@property
|
10143
|
+
@pulumi.getter(name="privateRegistryAccessConfig")
|
10144
|
+
def private_registry_access_config(self) -> Optional['outputs.ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfig']:
|
10145
|
+
"""
|
10146
|
+
Configuration for private container registries. There are two fields in this config:
|
10147
|
+
"""
|
10148
|
+
return pulumi.get(self, "private_registry_access_config")
|
10149
|
+
|
10150
|
+
|
10151
|
+
@pulumi.output_type
|
10152
|
+
class ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfig(dict):
|
10153
|
+
@staticmethod
|
10154
|
+
def __key_warning(key: str):
|
10155
|
+
suggest = None
|
10156
|
+
if key == "certificateAuthorityDomainConfigs":
|
10157
|
+
suggest = "certificate_authority_domain_configs"
|
10158
|
+
|
10159
|
+
if suggest:
|
10160
|
+
pulumi.log.warn(f"Key '{key}' not found in ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfig. Access the value via the '{suggest}' property getter instead.")
|
10161
|
+
|
10162
|
+
def __getitem__(self, key: str) -> Any:
|
10163
|
+
ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfig.__key_warning(key)
|
10164
|
+
return super().__getitem__(key)
|
10165
|
+
|
10166
|
+
def get(self, key: str, default = None) -> Any:
|
10167
|
+
ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfig.__key_warning(key)
|
10168
|
+
return super().get(key, default)
|
10169
|
+
|
10170
|
+
def __init__(__self__, *,
|
10171
|
+
enabled: bool,
|
10172
|
+
certificate_authority_domain_configs: Optional[Sequence['outputs.ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig']] = None):
|
10173
|
+
"""
|
10174
|
+
:param bool enabled: Enables private registry config. If set to false, all other fields in this object must not be set.
|
10175
|
+
:param Sequence['ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigArgs'] certificate_authority_domain_configs: List of configuration objects for CA and domains. Each object identifies a certificate and its assigned domains. See [how to configure for private container registries](https://cloud.google.com/kubernetes-engine/docs/how-to/access-private-registries-private-certificates) for more detail. Example:
|
10176
|
+
"""
|
10177
|
+
pulumi.set(__self__, "enabled", enabled)
|
10178
|
+
if certificate_authority_domain_configs is not None:
|
10179
|
+
pulumi.set(__self__, "certificate_authority_domain_configs", certificate_authority_domain_configs)
|
10180
|
+
|
10181
|
+
@property
|
10182
|
+
@pulumi.getter
|
10183
|
+
def enabled(self) -> bool:
|
10184
|
+
"""
|
10185
|
+
Enables private registry config. If set to false, all other fields in this object must not be set.
|
10186
|
+
"""
|
10187
|
+
return pulumi.get(self, "enabled")
|
10188
|
+
|
10189
|
+
@property
|
10190
|
+
@pulumi.getter(name="certificateAuthorityDomainConfigs")
|
10191
|
+
def certificate_authority_domain_configs(self) -> Optional[Sequence['outputs.ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig']]:
|
10192
|
+
"""
|
10193
|
+
List of configuration objects for CA and domains. Each object identifies a certificate and its assigned domains. See [how to configure for private container registries](https://cloud.google.com/kubernetes-engine/docs/how-to/access-private-registries-private-certificates) for more detail. Example:
|
10194
|
+
"""
|
10195
|
+
return pulumi.get(self, "certificate_authority_domain_configs")
|
10196
|
+
|
10197
|
+
|
10198
|
+
@pulumi.output_type
|
10199
|
+
class ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig(dict):
|
10200
|
+
@staticmethod
|
10201
|
+
def __key_warning(key: str):
|
10202
|
+
suggest = None
|
10203
|
+
if key == "gcpSecretManagerCertificateConfig":
|
10204
|
+
suggest = "gcp_secret_manager_certificate_config"
|
10205
|
+
|
10206
|
+
if suggest:
|
10207
|
+
pulumi.log.warn(f"Key '{key}' not found in ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig. Access the value via the '{suggest}' property getter instead.")
|
10208
|
+
|
10209
|
+
def __getitem__(self, key: str) -> Any:
|
10210
|
+
ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig.__key_warning(key)
|
10211
|
+
return super().__getitem__(key)
|
10212
|
+
|
10213
|
+
def get(self, key: str, default = None) -> Any:
|
10214
|
+
ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig.__key_warning(key)
|
10215
|
+
return super().get(key, default)
|
10216
|
+
|
10217
|
+
def __init__(__self__, *,
|
10218
|
+
fqdns: Sequence[str],
|
10219
|
+
gcp_secret_manager_certificate_config: 'outputs.ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig'):
|
10220
|
+
"""
|
10221
|
+
:param Sequence[str] fqdns: List of fully-qualified-domain-names. IPv4s and port specification are supported.
|
10222
|
+
:param 'ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigArgs' gcp_secret_manager_certificate_config: Parameters for configuring a certificate hosted in GCP SecretManager.
|
10223
|
+
"""
|
10224
|
+
pulumi.set(__self__, "fqdns", fqdns)
|
10225
|
+
pulumi.set(__self__, "gcp_secret_manager_certificate_config", gcp_secret_manager_certificate_config)
|
10226
|
+
|
10227
|
+
@property
|
10228
|
+
@pulumi.getter
|
10229
|
+
def fqdns(self) -> Sequence[str]:
|
10230
|
+
"""
|
10231
|
+
List of fully-qualified-domain-names. IPv4s and port specification are supported.
|
10232
|
+
"""
|
10233
|
+
return pulumi.get(self, "fqdns")
|
10234
|
+
|
10235
|
+
@property
|
10236
|
+
@pulumi.getter(name="gcpSecretManagerCertificateConfig")
|
10237
|
+
def gcp_secret_manager_certificate_config(self) -> 'outputs.ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig':
|
10238
|
+
"""
|
10239
|
+
Parameters for configuring a certificate hosted in GCP SecretManager.
|
10240
|
+
"""
|
10241
|
+
return pulumi.get(self, "gcp_secret_manager_certificate_config")
|
10242
|
+
|
10243
|
+
|
10244
|
+
@pulumi.output_type
|
10245
|
+
class ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig(dict):
|
10246
|
+
@staticmethod
|
10247
|
+
def __key_warning(key: str):
|
10248
|
+
suggest = None
|
10249
|
+
if key == "secretUri":
|
10250
|
+
suggest = "secret_uri"
|
10251
|
+
|
10252
|
+
if suggest:
|
10253
|
+
pulumi.log.warn(f"Key '{key}' not found in ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig. Access the value via the '{suggest}' property getter instead.")
|
10254
|
+
|
10255
|
+
def __getitem__(self, key: str) -> Any:
|
10256
|
+
ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig.__key_warning(key)
|
10257
|
+
return super().__getitem__(key)
|
10258
|
+
|
10259
|
+
def get(self, key: str, default = None) -> Any:
|
10260
|
+
ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig.__key_warning(key)
|
10261
|
+
return super().get(key, default)
|
10262
|
+
|
10263
|
+
def __init__(__self__, *,
|
10264
|
+
secret_uri: str):
|
10265
|
+
"""
|
10266
|
+
:param str secret_uri: URI for the secret that hosts a certificate. Must be in the format 'projects/PROJECT_NUM/secrets/SECRET_NAME/versions/VERSION_OR_LATEST'.
|
10267
|
+
"""
|
10268
|
+
pulumi.set(__self__, "secret_uri", secret_uri)
|
10269
|
+
|
10270
|
+
@property
|
10271
|
+
@pulumi.getter(name="secretUri")
|
10272
|
+
def secret_uri(self) -> str:
|
10273
|
+
"""
|
10274
|
+
URI for the secret that hosts a certificate. Must be in the format 'projects/PROJECT_NUM/secrets/SECRET_NAME/versions/VERSION_OR_LATEST'.
|
10275
|
+
"""
|
10276
|
+
return pulumi.get(self, "secret_uri")
|
10277
|
+
|
10278
|
+
|
9717
10279
|
@pulumi.output_type
|
9718
10280
|
class ClusterNodePoolNodeConfigEffectiveTaint(dict):
|
9719
10281
|
def __init__(__self__, *,
|
@@ -12124,6 +12686,8 @@ class NodePoolNodeConfig(dict):
|
|
12124
12686
|
suggest = "boot_disk_kms_key"
|
12125
12687
|
elif key == "confidentialNodes":
|
12126
12688
|
suggest = "confidential_nodes"
|
12689
|
+
elif key == "containerdConfig":
|
12690
|
+
suggest = "containerd_config"
|
12127
12691
|
elif key == "diskSizeGb":
|
12128
12692
|
suggest = "disk_size_gb"
|
12129
12693
|
elif key == "diskType":
|
@@ -12198,6 +12762,7 @@ class NodePoolNodeConfig(dict):
|
|
12198
12762
|
advanced_machine_features: Optional['outputs.NodePoolNodeConfigAdvancedMachineFeatures'] = None,
|
12199
12763
|
boot_disk_kms_key: Optional[str] = None,
|
12200
12764
|
confidential_nodes: Optional['outputs.NodePoolNodeConfigConfidentialNodes'] = None,
|
12765
|
+
containerd_config: Optional['outputs.NodePoolNodeConfigContainerdConfig'] = None,
|
12201
12766
|
disk_size_gb: Optional[int] = None,
|
12202
12767
|
disk_type: Optional[str] = None,
|
12203
12768
|
effective_taints: Optional[Sequence['outputs.NodePoolNodeConfigEffectiveTaint']] = None,
|
@@ -12238,6 +12803,7 @@ class NodePoolNodeConfig(dict):
|
|
12238
12803
|
:param 'NodePoolNodeConfigAdvancedMachineFeaturesArgs' advanced_machine_features: Specifies options for controlling advanced machine features.
|
12239
12804
|
:param str boot_disk_kms_key: The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool.
|
12240
12805
|
:param 'NodePoolNodeConfigConfidentialNodesArgs' confidential_nodes: Configuration for Confidential Nodes feature. Structure is documented below.
|
12806
|
+
:param 'NodePoolNodeConfigContainerdConfigArgs' containerd_config: Parameters for containerd configuration.
|
12241
12807
|
:param int disk_size_gb: Size of the disk attached to each node, specified in GB. The smallest allowed disk size is 10GB.
|
12242
12808
|
:param str disk_type: Type of the disk attached to each node. Such as pd-standard, pd-balanced or pd-ssd
|
12243
12809
|
:param Sequence['NodePoolNodeConfigEffectiveTaintArgs'] effective_taints: List of kubernetes taints applied to each node.
|
@@ -12281,6 +12847,8 @@ class NodePoolNodeConfig(dict):
|
|
12281
12847
|
pulumi.set(__self__, "boot_disk_kms_key", boot_disk_kms_key)
|
12282
12848
|
if confidential_nodes is not None:
|
12283
12849
|
pulumi.set(__self__, "confidential_nodes", confidential_nodes)
|
12850
|
+
if containerd_config is not None:
|
12851
|
+
pulumi.set(__self__, "containerd_config", containerd_config)
|
12284
12852
|
if disk_size_gb is not None:
|
12285
12853
|
pulumi.set(__self__, "disk_size_gb", disk_size_gb)
|
12286
12854
|
if disk_type is not None:
|
@@ -12378,6 +12946,14 @@ class NodePoolNodeConfig(dict):
|
|
12378
12946
|
"""
|
12379
12947
|
return pulumi.get(self, "confidential_nodes")
|
12380
12948
|
|
12949
|
+
@property
|
12950
|
+
@pulumi.getter(name="containerdConfig")
|
12951
|
+
def containerd_config(self) -> Optional['outputs.NodePoolNodeConfigContainerdConfig']:
|
12952
|
+
"""
|
12953
|
+
Parameters for containerd configuration.
|
12954
|
+
"""
|
12955
|
+
return pulumi.get(self, "containerd_config")
|
12956
|
+
|
12381
12957
|
@property
|
12382
12958
|
@pulumi.getter(name="diskSizeGb")
|
12383
12959
|
def disk_size_gb(self) -> Optional[int]:
|
@@ -12632,108 +13208,272 @@ class NodePoolNodeConfig(dict):
|
|
12632
13208
|
"""
|
12633
13209
|
Node affinity options for sole tenant node pools.
|
12634
13210
|
"""
|
12635
|
-
return pulumi.get(self, "sole_tenant_config")
|
13211
|
+
return pulumi.get(self, "sole_tenant_config")
|
13212
|
+
|
13213
|
+
@property
|
13214
|
+
@pulumi.getter
|
13215
|
+
def spot(self) -> Optional[bool]:
|
13216
|
+
"""
|
13217
|
+
Whether the nodes are created as spot VM instances.
|
13218
|
+
"""
|
13219
|
+
return pulumi.get(self, "spot")
|
13220
|
+
|
13221
|
+
@property
|
13222
|
+
@pulumi.getter
|
13223
|
+
def tags(self) -> Optional[Sequence[str]]:
|
13224
|
+
"""
|
13225
|
+
The list of instance tags applied to all nodes.
|
13226
|
+
"""
|
13227
|
+
return pulumi.get(self, "tags")
|
13228
|
+
|
13229
|
+
@property
|
13230
|
+
@pulumi.getter
|
13231
|
+
def taints(self) -> Optional[Sequence['outputs.NodePoolNodeConfigTaint']]:
|
13232
|
+
"""
|
13233
|
+
List of Kubernetes taints to be applied to each node.
|
13234
|
+
"""
|
13235
|
+
return pulumi.get(self, "taints")
|
13236
|
+
|
13237
|
+
@property
|
13238
|
+
@pulumi.getter(name="workloadMetadataConfig")
|
13239
|
+
def workload_metadata_config(self) -> Optional['outputs.NodePoolNodeConfigWorkloadMetadataConfig']:
|
13240
|
+
"""
|
13241
|
+
The workload metadata configuration for this node.
|
13242
|
+
"""
|
13243
|
+
return pulumi.get(self, "workload_metadata_config")
|
13244
|
+
|
13245
|
+
|
13246
|
+
@pulumi.output_type
|
13247
|
+
class NodePoolNodeConfigAdvancedMachineFeatures(dict):
|
13248
|
+
@staticmethod
|
13249
|
+
def __key_warning(key: str):
|
13250
|
+
suggest = None
|
13251
|
+
if key == "threadsPerCore":
|
13252
|
+
suggest = "threads_per_core"
|
13253
|
+
elif key == "enableNestedVirtualization":
|
13254
|
+
suggest = "enable_nested_virtualization"
|
13255
|
+
|
13256
|
+
if suggest:
|
13257
|
+
pulumi.log.warn(f"Key '{key}' not found in NodePoolNodeConfigAdvancedMachineFeatures. Access the value via the '{suggest}' property getter instead.")
|
13258
|
+
|
13259
|
+
def __getitem__(self, key: str) -> Any:
|
13260
|
+
NodePoolNodeConfigAdvancedMachineFeatures.__key_warning(key)
|
13261
|
+
return super().__getitem__(key)
|
13262
|
+
|
13263
|
+
def get(self, key: str, default = None) -> Any:
|
13264
|
+
NodePoolNodeConfigAdvancedMachineFeatures.__key_warning(key)
|
13265
|
+
return super().get(key, default)
|
13266
|
+
|
13267
|
+
def __init__(__self__, *,
|
13268
|
+
threads_per_core: int,
|
13269
|
+
enable_nested_virtualization: Optional[bool] = None):
|
13270
|
+
"""
|
13271
|
+
:param int threads_per_core: The number of threads per physical core. To disable simultaneous multithreading (SMT) set this to 1. If unset, the maximum number of threads supported per core by the underlying processor is assumed.
|
13272
|
+
:param bool enable_nested_virtualization: Whether the node should have nested virtualization enabled.
|
13273
|
+
"""
|
13274
|
+
pulumi.set(__self__, "threads_per_core", threads_per_core)
|
13275
|
+
if enable_nested_virtualization is not None:
|
13276
|
+
pulumi.set(__self__, "enable_nested_virtualization", enable_nested_virtualization)
|
13277
|
+
|
13278
|
+
@property
|
13279
|
+
@pulumi.getter(name="threadsPerCore")
|
13280
|
+
def threads_per_core(self) -> int:
|
13281
|
+
"""
|
13282
|
+
The number of threads per physical core. To disable simultaneous multithreading (SMT) set this to 1. If unset, the maximum number of threads supported per core by the underlying processor is assumed.
|
13283
|
+
"""
|
13284
|
+
return pulumi.get(self, "threads_per_core")
|
13285
|
+
|
13286
|
+
@property
|
13287
|
+
@pulumi.getter(name="enableNestedVirtualization")
|
13288
|
+
def enable_nested_virtualization(self) -> Optional[bool]:
|
13289
|
+
"""
|
13290
|
+
Whether the node should have nested virtualization enabled.
|
13291
|
+
"""
|
13292
|
+
return pulumi.get(self, "enable_nested_virtualization")
|
13293
|
+
|
13294
|
+
|
13295
|
+
@pulumi.output_type
|
13296
|
+
class NodePoolNodeConfigConfidentialNodes(dict):
|
13297
|
+
def __init__(__self__, *,
|
13298
|
+
enabled: bool):
|
13299
|
+
"""
|
13300
|
+
:param bool enabled: Enable Confidential GKE Nodes for this cluster, to
|
13301
|
+
enforce encryption of data in-use.
|
13302
|
+
"""
|
13303
|
+
pulumi.set(__self__, "enabled", enabled)
|
13304
|
+
|
13305
|
+
@property
|
13306
|
+
@pulumi.getter
|
13307
|
+
def enabled(self) -> bool:
|
13308
|
+
"""
|
13309
|
+
Enable Confidential GKE Nodes for this cluster, to
|
13310
|
+
enforce encryption of data in-use.
|
13311
|
+
"""
|
13312
|
+
return pulumi.get(self, "enabled")
|
13313
|
+
|
13314
|
+
|
13315
|
+
@pulumi.output_type
|
13316
|
+
class NodePoolNodeConfigContainerdConfig(dict):
|
13317
|
+
@staticmethod
|
13318
|
+
def __key_warning(key: str):
|
13319
|
+
suggest = None
|
13320
|
+
if key == "privateRegistryAccessConfig":
|
13321
|
+
suggest = "private_registry_access_config"
|
13322
|
+
|
13323
|
+
if suggest:
|
13324
|
+
pulumi.log.warn(f"Key '{key}' not found in NodePoolNodeConfigContainerdConfig. Access the value via the '{suggest}' property getter instead.")
|
13325
|
+
|
13326
|
+
def __getitem__(self, key: str) -> Any:
|
13327
|
+
NodePoolNodeConfigContainerdConfig.__key_warning(key)
|
13328
|
+
return super().__getitem__(key)
|
13329
|
+
|
13330
|
+
def get(self, key: str, default = None) -> Any:
|
13331
|
+
NodePoolNodeConfigContainerdConfig.__key_warning(key)
|
13332
|
+
return super().get(key, default)
|
13333
|
+
|
13334
|
+
def __init__(__self__, *,
|
13335
|
+
private_registry_access_config: Optional['outputs.NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfig'] = None):
|
13336
|
+
"""
|
13337
|
+
:param 'NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigArgs' private_registry_access_config: Parameters for private container registries configuration.
|
13338
|
+
"""
|
13339
|
+
if private_registry_access_config is not None:
|
13340
|
+
pulumi.set(__self__, "private_registry_access_config", private_registry_access_config)
|
12636
13341
|
|
12637
13342
|
@property
|
12638
|
-
@pulumi.getter
|
12639
|
-
def
|
13343
|
+
@pulumi.getter(name="privateRegistryAccessConfig")
|
13344
|
+
def private_registry_access_config(self) -> Optional['outputs.NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfig']:
|
12640
13345
|
"""
|
12641
|
-
|
13346
|
+
Parameters for private container registries configuration.
|
12642
13347
|
"""
|
12643
|
-
return pulumi.get(self, "
|
13348
|
+
return pulumi.get(self, "private_registry_access_config")
|
12644
13349
|
|
12645
|
-
|
12646
|
-
|
12647
|
-
|
13350
|
+
|
13351
|
+
@pulumi.output_type
|
13352
|
+
class NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfig(dict):
|
13353
|
+
@staticmethod
|
13354
|
+
def __key_warning(key: str):
|
13355
|
+
suggest = None
|
13356
|
+
if key == "certificateAuthorityDomainConfigs":
|
13357
|
+
suggest = "certificate_authority_domain_configs"
|
13358
|
+
|
13359
|
+
if suggest:
|
13360
|
+
pulumi.log.warn(f"Key '{key}' not found in NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfig. Access the value via the '{suggest}' property getter instead.")
|
13361
|
+
|
13362
|
+
def __getitem__(self, key: str) -> Any:
|
13363
|
+
NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfig.__key_warning(key)
|
13364
|
+
return super().__getitem__(key)
|
13365
|
+
|
13366
|
+
def get(self, key: str, default = None) -> Any:
|
13367
|
+
NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfig.__key_warning(key)
|
13368
|
+
return super().get(key, default)
|
13369
|
+
|
13370
|
+
def __init__(__self__, *,
|
13371
|
+
enabled: bool,
|
13372
|
+
certificate_authority_domain_configs: Optional[Sequence['outputs.NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig']] = None):
|
12648
13373
|
"""
|
12649
|
-
|
13374
|
+
:param bool enabled: Whether or not private registries are configured.
|
13375
|
+
:param Sequence['NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigArgs'] certificate_authority_domain_configs: Parameters for configuring CA certificate and domains.
|
12650
13376
|
"""
|
12651
|
-
|
13377
|
+
pulumi.set(__self__, "enabled", enabled)
|
13378
|
+
if certificate_authority_domain_configs is not None:
|
13379
|
+
pulumi.set(__self__, "certificate_authority_domain_configs", certificate_authority_domain_configs)
|
12652
13380
|
|
12653
13381
|
@property
|
12654
13382
|
@pulumi.getter
|
12655
|
-
def
|
13383
|
+
def enabled(self) -> bool:
|
12656
13384
|
"""
|
12657
|
-
|
13385
|
+
Whether or not private registries are configured.
|
12658
13386
|
"""
|
12659
|
-
return pulumi.get(self, "
|
13387
|
+
return pulumi.get(self, "enabled")
|
12660
13388
|
|
12661
13389
|
@property
|
12662
|
-
@pulumi.getter(name="
|
12663
|
-
def
|
13390
|
+
@pulumi.getter(name="certificateAuthorityDomainConfigs")
|
13391
|
+
def certificate_authority_domain_configs(self) -> Optional[Sequence['outputs.NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig']]:
|
12664
13392
|
"""
|
12665
|
-
|
13393
|
+
Parameters for configuring CA certificate and domains.
|
12666
13394
|
"""
|
12667
|
-
return pulumi.get(self, "
|
13395
|
+
return pulumi.get(self, "certificate_authority_domain_configs")
|
12668
13396
|
|
12669
13397
|
|
12670
13398
|
@pulumi.output_type
|
12671
|
-
class
|
13399
|
+
class NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig(dict):
|
12672
13400
|
@staticmethod
|
12673
13401
|
def __key_warning(key: str):
|
12674
13402
|
suggest = None
|
12675
|
-
if key == "
|
12676
|
-
suggest = "
|
12677
|
-
elif key == "enableNestedVirtualization":
|
12678
|
-
suggest = "enable_nested_virtualization"
|
13403
|
+
if key == "gcpSecretManagerCertificateConfig":
|
13404
|
+
suggest = "gcp_secret_manager_certificate_config"
|
12679
13405
|
|
12680
13406
|
if suggest:
|
12681
|
-
pulumi.log.warn(f"Key '{key}' not found in
|
13407
|
+
pulumi.log.warn(f"Key '{key}' not found in NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig. Access the value via the '{suggest}' property getter instead.")
|
12682
13408
|
|
12683
13409
|
def __getitem__(self, key: str) -> Any:
|
12684
|
-
|
13410
|
+
NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig.__key_warning(key)
|
12685
13411
|
return super().__getitem__(key)
|
12686
13412
|
|
12687
13413
|
def get(self, key: str, default = None) -> Any:
|
12688
|
-
|
13414
|
+
NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig.__key_warning(key)
|
12689
13415
|
return super().get(key, default)
|
12690
13416
|
|
12691
13417
|
def __init__(__self__, *,
|
12692
|
-
|
12693
|
-
|
13418
|
+
fqdns: Sequence[str],
|
13419
|
+
gcp_secret_manager_certificate_config: 'outputs.NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig'):
|
12694
13420
|
"""
|
12695
|
-
:param
|
12696
|
-
:param
|
13421
|
+
:param Sequence[str] fqdns: List of fully-qualified-domain-names. IPv4s and port specification are supported.
|
13422
|
+
:param 'NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigArgs' gcp_secret_manager_certificate_config: Parameters for configuring a certificate hosted in GCP SecretManager.
|
12697
13423
|
"""
|
12698
|
-
pulumi.set(__self__, "
|
12699
|
-
|
12700
|
-
pulumi.set(__self__, "enable_nested_virtualization", enable_nested_virtualization)
|
13424
|
+
pulumi.set(__self__, "fqdns", fqdns)
|
13425
|
+
pulumi.set(__self__, "gcp_secret_manager_certificate_config", gcp_secret_manager_certificate_config)
|
12701
13426
|
|
12702
13427
|
@property
|
12703
|
-
@pulumi.getter
|
12704
|
-
def
|
13428
|
+
@pulumi.getter
|
13429
|
+
def fqdns(self) -> Sequence[str]:
|
12705
13430
|
"""
|
12706
|
-
|
13431
|
+
List of fully-qualified-domain-names. IPv4s and port specification are supported.
|
12707
13432
|
"""
|
12708
|
-
return pulumi.get(self, "
|
13433
|
+
return pulumi.get(self, "fqdns")
|
12709
13434
|
|
12710
13435
|
@property
|
12711
|
-
@pulumi.getter(name="
|
12712
|
-
def
|
13436
|
+
@pulumi.getter(name="gcpSecretManagerCertificateConfig")
|
13437
|
+
def gcp_secret_manager_certificate_config(self) -> 'outputs.NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig':
|
12713
13438
|
"""
|
12714
|
-
|
13439
|
+
Parameters for configuring a certificate hosted in GCP SecretManager.
|
12715
13440
|
"""
|
12716
|
-
return pulumi.get(self, "
|
13441
|
+
return pulumi.get(self, "gcp_secret_manager_certificate_config")
|
12717
13442
|
|
12718
13443
|
|
12719
13444
|
@pulumi.output_type
|
12720
|
-
class
|
13445
|
+
class NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig(dict):
|
13446
|
+
@staticmethod
|
13447
|
+
def __key_warning(key: str):
|
13448
|
+
suggest = None
|
13449
|
+
if key == "secretUri":
|
13450
|
+
suggest = "secret_uri"
|
13451
|
+
|
13452
|
+
if suggest:
|
13453
|
+
pulumi.log.warn(f"Key '{key}' not found in NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig. Access the value via the '{suggest}' property getter instead.")
|
13454
|
+
|
13455
|
+
def __getitem__(self, key: str) -> Any:
|
13456
|
+
NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig.__key_warning(key)
|
13457
|
+
return super().__getitem__(key)
|
13458
|
+
|
13459
|
+
def get(self, key: str, default = None) -> Any:
|
13460
|
+
NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig.__key_warning(key)
|
13461
|
+
return super().get(key, default)
|
13462
|
+
|
12721
13463
|
def __init__(__self__, *,
|
12722
|
-
|
13464
|
+
secret_uri: str):
|
12723
13465
|
"""
|
12724
|
-
:param
|
12725
|
-
enforce encryption of data in-use.
|
13466
|
+
:param str secret_uri: URI for the secret that hosts a certificate. Must be in the format 'projects/PROJECT_NUM/secrets/SECRET_NAME/versions/VERSION_OR_LATEST'.
|
12726
13467
|
"""
|
12727
|
-
pulumi.set(__self__, "
|
13468
|
+
pulumi.set(__self__, "secret_uri", secret_uri)
|
12728
13469
|
|
12729
13470
|
@property
|
12730
|
-
@pulumi.getter
|
12731
|
-
def
|
13471
|
+
@pulumi.getter(name="secretUri")
|
13472
|
+
def secret_uri(self) -> str:
|
12732
13473
|
"""
|
12733
|
-
|
12734
|
-
enforce encryption of data in-use.
|
13474
|
+
URI for the secret that hosts a certificate. Must be in the format 'projects/PROJECT_NUM/secrets/SECRET_NAME/versions/VERSION_OR_LATEST'.
|
12735
13475
|
"""
|
12736
|
-
return pulumi.get(self, "
|
13476
|
+
return pulumi.get(self, "secret_uri")
|
12737
13477
|
|
12738
13478
|
|
12739
13479
|
@pulumi.output_type
|
@@ -15516,6 +16256,7 @@ class GetClusterNodeConfigResult(dict):
|
|
15516
16256
|
advanced_machine_features: Sequence['outputs.GetClusterNodeConfigAdvancedMachineFeatureResult'],
|
15517
16257
|
boot_disk_kms_key: str,
|
15518
16258
|
confidential_nodes: Sequence['outputs.GetClusterNodeConfigConfidentialNodeResult'],
|
16259
|
+
containerd_configs: Sequence['outputs.GetClusterNodeConfigContainerdConfigResult'],
|
15519
16260
|
disk_size_gb: int,
|
15520
16261
|
disk_type: str,
|
15521
16262
|
effective_taints: Sequence['outputs.GetClusterNodeConfigEffectiveTaintResult'],
|
@@ -15556,6 +16297,7 @@ class GetClusterNodeConfigResult(dict):
|
|
15556
16297
|
:param Sequence['GetClusterNodeConfigAdvancedMachineFeatureArgs'] advanced_machine_features: Specifies options for controlling advanced machine features.
|
15557
16298
|
:param str boot_disk_kms_key: The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool.
|
15558
16299
|
:param Sequence['GetClusterNodeConfigConfidentialNodeArgs'] confidential_nodes: Configuration for the confidential nodes feature, which makes nodes run on confidential VMs. Warning: This configuration can't be changed (or added/removed) after pool creation without deleting and recreating the entire pool.
|
16300
|
+
:param Sequence['GetClusterNodeConfigContainerdConfigArgs'] containerd_configs: Parameters for containerd configuration.
|
15559
16301
|
:param int disk_size_gb: Size of the disk attached to each node, specified in GB. The smallest allowed disk size is 10GB.
|
15560
16302
|
:param str disk_type: Type of the disk attached to each node. Such as pd-standard, pd-balanced or pd-ssd
|
15561
16303
|
:param Sequence['GetClusterNodeConfigEffectiveTaintArgs'] effective_taints: List of kubernetes taints applied to each node.
|
@@ -15596,6 +16338,7 @@ class GetClusterNodeConfigResult(dict):
|
|
15596
16338
|
pulumi.set(__self__, "advanced_machine_features", advanced_machine_features)
|
15597
16339
|
pulumi.set(__self__, "boot_disk_kms_key", boot_disk_kms_key)
|
15598
16340
|
pulumi.set(__self__, "confidential_nodes", confidential_nodes)
|
16341
|
+
pulumi.set(__self__, "containerd_configs", containerd_configs)
|
15599
16342
|
pulumi.set(__self__, "disk_size_gb", disk_size_gb)
|
15600
16343
|
pulumi.set(__self__, "disk_type", disk_type)
|
15601
16344
|
pulumi.set(__self__, "effective_taints", effective_taints)
|
@@ -15657,6 +16400,14 @@ class GetClusterNodeConfigResult(dict):
|
|
15657
16400
|
"""
|
15658
16401
|
return pulumi.get(self, "confidential_nodes")
|
15659
16402
|
|
16403
|
+
@property
|
16404
|
+
@pulumi.getter(name="containerdConfigs")
|
16405
|
+
def containerd_configs(self) -> Sequence['outputs.GetClusterNodeConfigContainerdConfigResult']:
|
16406
|
+
"""
|
16407
|
+
Parameters for containerd configuration.
|
16408
|
+
"""
|
16409
|
+
return pulumi.get(self, "containerd_configs")
|
16410
|
+
|
15660
16411
|
@property
|
15661
16412
|
@pulumi.getter(name="diskSizeGb")
|
15662
16413
|
def disk_size_gb(self) -> int:
|
@@ -15993,6 +16744,100 @@ class GetClusterNodeConfigConfidentialNodeResult(dict):
|
|
15993
16744
|
return pulumi.get(self, "enabled")
|
15994
16745
|
|
15995
16746
|
|
16747
|
+
@pulumi.output_type
|
16748
|
+
class GetClusterNodeConfigContainerdConfigResult(dict):
|
16749
|
+
def __init__(__self__, *,
|
16750
|
+
private_registry_access_configs: Sequence['outputs.GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigResult']):
|
16751
|
+
"""
|
16752
|
+
:param Sequence['GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigArgs'] private_registry_access_configs: Parameters for private container registries configuration.
|
16753
|
+
"""
|
16754
|
+
pulumi.set(__self__, "private_registry_access_configs", private_registry_access_configs)
|
16755
|
+
|
16756
|
+
@property
|
16757
|
+
@pulumi.getter(name="privateRegistryAccessConfigs")
|
16758
|
+
def private_registry_access_configs(self) -> Sequence['outputs.GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigResult']:
|
16759
|
+
"""
|
16760
|
+
Parameters for private container registries configuration.
|
16761
|
+
"""
|
16762
|
+
return pulumi.get(self, "private_registry_access_configs")
|
16763
|
+
|
16764
|
+
|
16765
|
+
@pulumi.output_type
|
16766
|
+
class GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigResult(dict):
|
16767
|
+
def __init__(__self__, *,
|
16768
|
+
certificate_authority_domain_configs: Sequence['outputs.GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigResult'],
|
16769
|
+
enabled: bool):
|
16770
|
+
"""
|
16771
|
+
:param Sequence['GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigArgs'] certificate_authority_domain_configs: Parameters for configuring CA certificate and domains.
|
16772
|
+
:param bool enabled: Whether or not private registries are configured.
|
16773
|
+
"""
|
16774
|
+
pulumi.set(__self__, "certificate_authority_domain_configs", certificate_authority_domain_configs)
|
16775
|
+
pulumi.set(__self__, "enabled", enabled)
|
16776
|
+
|
16777
|
+
@property
|
16778
|
+
@pulumi.getter(name="certificateAuthorityDomainConfigs")
|
16779
|
+
def certificate_authority_domain_configs(self) -> Sequence['outputs.GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigResult']:
|
16780
|
+
"""
|
16781
|
+
Parameters for configuring CA certificate and domains.
|
16782
|
+
"""
|
16783
|
+
return pulumi.get(self, "certificate_authority_domain_configs")
|
16784
|
+
|
16785
|
+
@property
|
16786
|
+
@pulumi.getter
|
16787
|
+
def enabled(self) -> bool:
|
16788
|
+
"""
|
16789
|
+
Whether or not private registries are configured.
|
16790
|
+
"""
|
16791
|
+
return pulumi.get(self, "enabled")
|
16792
|
+
|
16793
|
+
|
16794
|
+
@pulumi.output_type
|
16795
|
+
class GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigResult(dict):
|
16796
|
+
def __init__(__self__, *,
|
16797
|
+
fqdns: Sequence[str],
|
16798
|
+
gcp_secret_manager_certificate_configs: Sequence['outputs.GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigResult']):
|
16799
|
+
"""
|
16800
|
+
:param Sequence[str] fqdns: List of fully-qualified-domain-names. IPv4s and port specification are supported.
|
16801
|
+
:param Sequence['GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigArgs'] gcp_secret_manager_certificate_configs: Parameters for configuring a certificate hosted in GCP SecretManager.
|
16802
|
+
"""
|
16803
|
+
pulumi.set(__self__, "fqdns", fqdns)
|
16804
|
+
pulumi.set(__self__, "gcp_secret_manager_certificate_configs", gcp_secret_manager_certificate_configs)
|
16805
|
+
|
16806
|
+
@property
|
16807
|
+
@pulumi.getter
|
16808
|
+
def fqdns(self) -> Sequence[str]:
|
16809
|
+
"""
|
16810
|
+
List of fully-qualified-domain-names. IPv4s and port specification are supported.
|
16811
|
+
"""
|
16812
|
+
return pulumi.get(self, "fqdns")
|
16813
|
+
|
16814
|
+
@property
|
16815
|
+
@pulumi.getter(name="gcpSecretManagerCertificateConfigs")
|
16816
|
+
def gcp_secret_manager_certificate_configs(self) -> Sequence['outputs.GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigResult']:
|
16817
|
+
"""
|
16818
|
+
Parameters for configuring a certificate hosted in GCP SecretManager.
|
16819
|
+
"""
|
16820
|
+
return pulumi.get(self, "gcp_secret_manager_certificate_configs")
|
16821
|
+
|
16822
|
+
|
16823
|
+
@pulumi.output_type
|
16824
|
+
class GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigResult(dict):
|
16825
|
+
def __init__(__self__, *,
|
16826
|
+
secret_uri: str):
|
16827
|
+
"""
|
16828
|
+
:param str secret_uri: URI for the secret that hosts a certificate. Must be in the format 'projects/PROJECT_NUM/secrets/SECRET_NAME/versions/VERSION_OR_LATEST'.
|
16829
|
+
"""
|
16830
|
+
pulumi.set(__self__, "secret_uri", secret_uri)
|
16831
|
+
|
16832
|
+
@property
|
16833
|
+
@pulumi.getter(name="secretUri")
|
16834
|
+
def secret_uri(self) -> str:
|
16835
|
+
"""
|
16836
|
+
URI for the secret that hosts a certificate. Must be in the format 'projects/PROJECT_NUM/secrets/SECRET_NAME/versions/VERSION_OR_LATEST'.
|
16837
|
+
"""
|
16838
|
+
return pulumi.get(self, "secret_uri")
|
16839
|
+
|
16840
|
+
|
15996
16841
|
@pulumi.output_type
|
15997
16842
|
class GetClusterNodeConfigEffectiveTaintResult(dict):
|
15998
16843
|
def __init__(__self__, *,
|
@@ -16889,15 +17734,26 @@ class GetClusterNodePoolDefaultResult(dict):
|
|
16889
17734
|
@pulumi.output_type
|
16890
17735
|
class GetClusterNodePoolDefaultNodeConfigDefaultResult(dict):
|
16891
17736
|
def __init__(__self__, *,
|
17737
|
+
containerd_configs: Sequence['outputs.GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigResult'],
|
16892
17738
|
gcfs_configs: Sequence['outputs.GetClusterNodePoolDefaultNodeConfigDefaultGcfsConfigResult'],
|
16893
17739
|
logging_variant: str):
|
16894
17740
|
"""
|
17741
|
+
:param Sequence['GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigArgs'] containerd_configs: Parameters for containerd configuration.
|
16895
17742
|
:param Sequence['GetClusterNodePoolDefaultNodeConfigDefaultGcfsConfigArgs'] gcfs_configs: GCFS configuration for this node.
|
16896
17743
|
:param str logging_variant: Type of logging agent that is used as the default value for node pools in the cluster. Valid values include DEFAULT and MAX_THROUGHPUT.
|
16897
17744
|
"""
|
17745
|
+
pulumi.set(__self__, "containerd_configs", containerd_configs)
|
16898
17746
|
pulumi.set(__self__, "gcfs_configs", gcfs_configs)
|
16899
17747
|
pulumi.set(__self__, "logging_variant", logging_variant)
|
16900
17748
|
|
17749
|
+
@property
|
17750
|
+
@pulumi.getter(name="containerdConfigs")
|
17751
|
+
def containerd_configs(self) -> Sequence['outputs.GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigResult']:
|
17752
|
+
"""
|
17753
|
+
Parameters for containerd configuration.
|
17754
|
+
"""
|
17755
|
+
return pulumi.get(self, "containerd_configs")
|
17756
|
+
|
16901
17757
|
@property
|
16902
17758
|
@pulumi.getter(name="gcfsConfigs")
|
16903
17759
|
def gcfs_configs(self) -> Sequence['outputs.GetClusterNodePoolDefaultNodeConfigDefaultGcfsConfigResult']:
|
@@ -16915,6 +17771,100 @@ class GetClusterNodePoolDefaultNodeConfigDefaultResult(dict):
|
|
16915
17771
|
return pulumi.get(self, "logging_variant")
|
16916
17772
|
|
16917
17773
|
|
17774
|
+
@pulumi.output_type
|
17775
|
+
class GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigResult(dict):
|
17776
|
+
def __init__(__self__, *,
|
17777
|
+
private_registry_access_configs: Sequence['outputs.GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigResult']):
|
17778
|
+
"""
|
17779
|
+
:param Sequence['GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigArgs'] private_registry_access_configs: Parameters for private container registries configuration.
|
17780
|
+
"""
|
17781
|
+
pulumi.set(__self__, "private_registry_access_configs", private_registry_access_configs)
|
17782
|
+
|
17783
|
+
@property
|
17784
|
+
@pulumi.getter(name="privateRegistryAccessConfigs")
|
17785
|
+
def private_registry_access_configs(self) -> Sequence['outputs.GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigResult']:
|
17786
|
+
"""
|
17787
|
+
Parameters for private container registries configuration.
|
17788
|
+
"""
|
17789
|
+
return pulumi.get(self, "private_registry_access_configs")
|
17790
|
+
|
17791
|
+
|
17792
|
+
@pulumi.output_type
|
17793
|
+
class GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigResult(dict):
|
17794
|
+
def __init__(__self__, *,
|
17795
|
+
certificate_authority_domain_configs: Sequence['outputs.GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigResult'],
|
17796
|
+
enabled: bool):
|
17797
|
+
"""
|
17798
|
+
:param Sequence['GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigArgs'] certificate_authority_domain_configs: Parameters for configuring CA certificate and domains.
|
17799
|
+
:param bool enabled: Whether or not private registries are configured.
|
17800
|
+
"""
|
17801
|
+
pulumi.set(__self__, "certificate_authority_domain_configs", certificate_authority_domain_configs)
|
17802
|
+
pulumi.set(__self__, "enabled", enabled)
|
17803
|
+
|
17804
|
+
@property
|
17805
|
+
@pulumi.getter(name="certificateAuthorityDomainConfigs")
|
17806
|
+
def certificate_authority_domain_configs(self) -> Sequence['outputs.GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigResult']:
|
17807
|
+
"""
|
17808
|
+
Parameters for configuring CA certificate and domains.
|
17809
|
+
"""
|
17810
|
+
return pulumi.get(self, "certificate_authority_domain_configs")
|
17811
|
+
|
17812
|
+
@property
|
17813
|
+
@pulumi.getter
|
17814
|
+
def enabled(self) -> bool:
|
17815
|
+
"""
|
17816
|
+
Whether or not private registries are configured.
|
17817
|
+
"""
|
17818
|
+
return pulumi.get(self, "enabled")
|
17819
|
+
|
17820
|
+
|
17821
|
+
@pulumi.output_type
|
17822
|
+
class GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigResult(dict):
|
17823
|
+
def __init__(__self__, *,
|
17824
|
+
fqdns: Sequence[str],
|
17825
|
+
gcp_secret_manager_certificate_configs: Sequence['outputs.GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigResult']):
|
17826
|
+
"""
|
17827
|
+
:param Sequence[str] fqdns: List of fully-qualified-domain-names. IPv4s and port specification are supported.
|
17828
|
+
:param Sequence['GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigArgs'] gcp_secret_manager_certificate_configs: Parameters for configuring a certificate hosted in GCP SecretManager.
|
17829
|
+
"""
|
17830
|
+
pulumi.set(__self__, "fqdns", fqdns)
|
17831
|
+
pulumi.set(__self__, "gcp_secret_manager_certificate_configs", gcp_secret_manager_certificate_configs)
|
17832
|
+
|
17833
|
+
@property
|
17834
|
+
@pulumi.getter
|
17835
|
+
def fqdns(self) -> Sequence[str]:
|
17836
|
+
"""
|
17837
|
+
List of fully-qualified-domain-names. IPv4s and port specification are supported.
|
17838
|
+
"""
|
17839
|
+
return pulumi.get(self, "fqdns")
|
17840
|
+
|
17841
|
+
@property
|
17842
|
+
@pulumi.getter(name="gcpSecretManagerCertificateConfigs")
|
17843
|
+
def gcp_secret_manager_certificate_configs(self) -> Sequence['outputs.GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigResult']:
|
17844
|
+
"""
|
17845
|
+
Parameters for configuring a certificate hosted in GCP SecretManager.
|
17846
|
+
"""
|
17847
|
+
return pulumi.get(self, "gcp_secret_manager_certificate_configs")
|
17848
|
+
|
17849
|
+
|
17850
|
+
@pulumi.output_type
|
17851
|
+
class GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigResult(dict):
|
17852
|
+
def __init__(__self__, *,
|
17853
|
+
secret_uri: str):
|
17854
|
+
"""
|
17855
|
+
:param str secret_uri: URI for the secret that hosts a certificate. Must be in the format 'projects/PROJECT_NUM/secrets/SECRET_NAME/versions/VERSION_OR_LATEST'.
|
17856
|
+
"""
|
17857
|
+
pulumi.set(__self__, "secret_uri", secret_uri)
|
17858
|
+
|
17859
|
+
@property
|
17860
|
+
@pulumi.getter(name="secretUri")
|
17861
|
+
def secret_uri(self) -> str:
|
17862
|
+
"""
|
17863
|
+
URI for the secret that hosts a certificate. Must be in the format 'projects/PROJECT_NUM/secrets/SECRET_NAME/versions/VERSION_OR_LATEST'.
|
17864
|
+
"""
|
17865
|
+
return pulumi.get(self, "secret_uri")
|
17866
|
+
|
17867
|
+
|
16918
17868
|
@pulumi.output_type
|
16919
17869
|
class GetClusterNodePoolDefaultNodeConfigDefaultGcfsConfigResult(dict):
|
16920
17870
|
def __init__(__self__, *,
|
@@ -17162,6 +18112,7 @@ class GetClusterNodePoolNodeConfigResult(dict):
|
|
17162
18112
|
advanced_machine_features: Sequence['outputs.GetClusterNodePoolNodeConfigAdvancedMachineFeatureResult'],
|
17163
18113
|
boot_disk_kms_key: str,
|
17164
18114
|
confidential_nodes: Sequence['outputs.GetClusterNodePoolNodeConfigConfidentialNodeResult'],
|
18115
|
+
containerd_configs: Sequence['outputs.GetClusterNodePoolNodeConfigContainerdConfigResult'],
|
17165
18116
|
disk_size_gb: int,
|
17166
18117
|
disk_type: str,
|
17167
18118
|
effective_taints: Sequence['outputs.GetClusterNodePoolNodeConfigEffectiveTaintResult'],
|
@@ -17202,6 +18153,7 @@ class GetClusterNodePoolNodeConfigResult(dict):
|
|
17202
18153
|
:param Sequence['GetClusterNodePoolNodeConfigAdvancedMachineFeatureArgs'] advanced_machine_features: Specifies options for controlling advanced machine features.
|
17203
18154
|
:param str boot_disk_kms_key: The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool.
|
17204
18155
|
:param Sequence['GetClusterNodePoolNodeConfigConfidentialNodeArgs'] confidential_nodes: Configuration for the confidential nodes feature, which makes nodes run on confidential VMs. Warning: This configuration can't be changed (or added/removed) after pool creation without deleting and recreating the entire pool.
|
18156
|
+
:param Sequence['GetClusterNodePoolNodeConfigContainerdConfigArgs'] containerd_configs: Parameters for containerd configuration.
|
17205
18157
|
:param int disk_size_gb: Size of the disk attached to each node, specified in GB. The smallest allowed disk size is 10GB.
|
17206
18158
|
:param str disk_type: Type of the disk attached to each node. Such as pd-standard, pd-balanced or pd-ssd
|
17207
18159
|
:param Sequence['GetClusterNodePoolNodeConfigEffectiveTaintArgs'] effective_taints: List of kubernetes taints applied to each node.
|
@@ -17242,6 +18194,7 @@ class GetClusterNodePoolNodeConfigResult(dict):
|
|
17242
18194
|
pulumi.set(__self__, "advanced_machine_features", advanced_machine_features)
|
17243
18195
|
pulumi.set(__self__, "boot_disk_kms_key", boot_disk_kms_key)
|
17244
18196
|
pulumi.set(__self__, "confidential_nodes", confidential_nodes)
|
18197
|
+
pulumi.set(__self__, "containerd_configs", containerd_configs)
|
17245
18198
|
pulumi.set(__self__, "disk_size_gb", disk_size_gb)
|
17246
18199
|
pulumi.set(__self__, "disk_type", disk_type)
|
17247
18200
|
pulumi.set(__self__, "effective_taints", effective_taints)
|
@@ -17303,6 +18256,14 @@ class GetClusterNodePoolNodeConfigResult(dict):
|
|
17303
18256
|
"""
|
17304
18257
|
return pulumi.get(self, "confidential_nodes")
|
17305
18258
|
|
18259
|
+
@property
|
18260
|
+
@pulumi.getter(name="containerdConfigs")
|
18261
|
+
def containerd_configs(self) -> Sequence['outputs.GetClusterNodePoolNodeConfigContainerdConfigResult']:
|
18262
|
+
"""
|
18263
|
+
Parameters for containerd configuration.
|
18264
|
+
"""
|
18265
|
+
return pulumi.get(self, "containerd_configs")
|
18266
|
+
|
17306
18267
|
@property
|
17307
18268
|
@pulumi.getter(name="diskSizeGb")
|
17308
18269
|
def disk_size_gb(self) -> int:
|
@@ -17639,6 +18600,100 @@ class GetClusterNodePoolNodeConfigConfidentialNodeResult(dict):
|
|
17639
18600
|
return pulumi.get(self, "enabled")
|
17640
18601
|
|
17641
18602
|
|
18603
|
+
@pulumi.output_type
|
18604
|
+
class GetClusterNodePoolNodeConfigContainerdConfigResult(dict):
|
18605
|
+
def __init__(__self__, *,
|
18606
|
+
private_registry_access_configs: Sequence['outputs.GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigResult']):
|
18607
|
+
"""
|
18608
|
+
:param Sequence['GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigArgs'] private_registry_access_configs: Parameters for private container registries configuration.
|
18609
|
+
"""
|
18610
|
+
pulumi.set(__self__, "private_registry_access_configs", private_registry_access_configs)
|
18611
|
+
|
18612
|
+
@property
|
18613
|
+
@pulumi.getter(name="privateRegistryAccessConfigs")
|
18614
|
+
def private_registry_access_configs(self) -> Sequence['outputs.GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigResult']:
|
18615
|
+
"""
|
18616
|
+
Parameters for private container registries configuration.
|
18617
|
+
"""
|
18618
|
+
return pulumi.get(self, "private_registry_access_configs")
|
18619
|
+
|
18620
|
+
|
18621
|
+
@pulumi.output_type
|
18622
|
+
class GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigResult(dict):
|
18623
|
+
def __init__(__self__, *,
|
18624
|
+
certificate_authority_domain_configs: Sequence['outputs.GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigResult'],
|
18625
|
+
enabled: bool):
|
18626
|
+
"""
|
18627
|
+
:param Sequence['GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigArgs'] certificate_authority_domain_configs: Parameters for configuring CA certificate and domains.
|
18628
|
+
:param bool enabled: Whether or not private registries are configured.
|
18629
|
+
"""
|
18630
|
+
pulumi.set(__self__, "certificate_authority_domain_configs", certificate_authority_domain_configs)
|
18631
|
+
pulumi.set(__self__, "enabled", enabled)
|
18632
|
+
|
18633
|
+
@property
|
18634
|
+
@pulumi.getter(name="certificateAuthorityDomainConfigs")
|
18635
|
+
def certificate_authority_domain_configs(self) -> Sequence['outputs.GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigResult']:
|
18636
|
+
"""
|
18637
|
+
Parameters for configuring CA certificate and domains.
|
18638
|
+
"""
|
18639
|
+
return pulumi.get(self, "certificate_authority_domain_configs")
|
18640
|
+
|
18641
|
+
@property
|
18642
|
+
@pulumi.getter
|
18643
|
+
def enabled(self) -> bool:
|
18644
|
+
"""
|
18645
|
+
Whether or not private registries are configured.
|
18646
|
+
"""
|
18647
|
+
return pulumi.get(self, "enabled")
|
18648
|
+
|
18649
|
+
|
18650
|
+
@pulumi.output_type
|
18651
|
+
class GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigResult(dict):
|
18652
|
+
def __init__(__self__, *,
|
18653
|
+
fqdns: Sequence[str],
|
18654
|
+
gcp_secret_manager_certificate_configs: Sequence['outputs.GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigResult']):
|
18655
|
+
"""
|
18656
|
+
:param Sequence[str] fqdns: List of fully-qualified-domain-names. IPv4s and port specification are supported.
|
18657
|
+
:param Sequence['GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigArgs'] gcp_secret_manager_certificate_configs: Parameters for configuring a certificate hosted in GCP SecretManager.
|
18658
|
+
"""
|
18659
|
+
pulumi.set(__self__, "fqdns", fqdns)
|
18660
|
+
pulumi.set(__self__, "gcp_secret_manager_certificate_configs", gcp_secret_manager_certificate_configs)
|
18661
|
+
|
18662
|
+
@property
|
18663
|
+
@pulumi.getter
|
18664
|
+
def fqdns(self) -> Sequence[str]:
|
18665
|
+
"""
|
18666
|
+
List of fully-qualified-domain-names. IPv4s and port specification are supported.
|
18667
|
+
"""
|
18668
|
+
return pulumi.get(self, "fqdns")
|
18669
|
+
|
18670
|
+
@property
|
18671
|
+
@pulumi.getter(name="gcpSecretManagerCertificateConfigs")
|
18672
|
+
def gcp_secret_manager_certificate_configs(self) -> Sequence['outputs.GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigResult']:
|
18673
|
+
"""
|
18674
|
+
Parameters for configuring a certificate hosted in GCP SecretManager.
|
18675
|
+
"""
|
18676
|
+
return pulumi.get(self, "gcp_secret_manager_certificate_configs")
|
18677
|
+
|
18678
|
+
|
18679
|
+
@pulumi.output_type
|
18680
|
+
class GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigResult(dict):
|
18681
|
+
def __init__(__self__, *,
|
18682
|
+
secret_uri: str):
|
18683
|
+
"""
|
18684
|
+
:param str secret_uri: URI for the secret that hosts a certificate. Must be in the format 'projects/PROJECT_NUM/secrets/SECRET_NAME/versions/VERSION_OR_LATEST'.
|
18685
|
+
"""
|
18686
|
+
pulumi.set(__self__, "secret_uri", secret_uri)
|
18687
|
+
|
18688
|
+
@property
|
18689
|
+
@pulumi.getter(name="secretUri")
|
18690
|
+
def secret_uri(self) -> str:
|
18691
|
+
"""
|
18692
|
+
URI for the secret that hosts a certificate. Must be in the format 'projects/PROJECT_NUM/secrets/SECRET_NAME/versions/VERSION_OR_LATEST'.
|
18693
|
+
"""
|
18694
|
+
return pulumi.get(self, "secret_uri")
|
18695
|
+
|
18696
|
+
|
17642
18697
|
@pulumi.output_type
|
17643
18698
|
class GetClusterNodePoolNodeConfigEffectiveTaintResult(dict):
|
17644
18699
|
def __init__(__self__, *,
|