pulumi-gcp 7.25.0a1717104660__py3-none-any.whl → 7.25.0a1717407024__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (59) hide show
  1. pulumi_gcp/__init__.py +88 -0
  2. pulumi_gcp/appengine/_inputs.py +18 -0
  3. pulumi_gcp/appengine/domain_mapping.py +1 -1
  4. pulumi_gcp/appengine/outputs.py +16 -0
  5. pulumi_gcp/bigquery/_inputs.py +286 -2
  6. pulumi_gcp/bigquery/outputs.py +289 -2
  7. pulumi_gcp/bigquery/table.py +77 -35
  8. pulumi_gcp/cloudfunctionsv2/function.py +0 -4
  9. pulumi_gcp/cloudrun/_inputs.py +80 -4
  10. pulumi_gcp/cloudrun/outputs.py +137 -4
  11. pulumi_gcp/composer/user_workloads_secret.py +4 -4
  12. pulumi_gcp/compute/__init__.py +1 -0
  13. pulumi_gcp/compute/_inputs.py +398 -176
  14. pulumi_gcp/compute/get_subnetworks.py +157 -0
  15. pulumi_gcp/compute/instance_group_membership.py +2 -2
  16. pulumi_gcp/compute/interconnect_attachment.py +82 -0
  17. pulumi_gcp/compute/network_endpoint.py +2 -2
  18. pulumi_gcp/compute/network_endpoint_list.py +2 -2
  19. pulumi_gcp/compute/outputs.py +609 -161
  20. pulumi_gcp/compute/region_ssl_policy.py +39 -40
  21. pulumi_gcp/compute/security_policy_rule.py +55 -1
  22. pulumi_gcp/container/_inputs.py +560 -0
  23. pulumi_gcp/container/outputs.py +1106 -51
  24. pulumi_gcp/dataplex/__init__.py +10 -0
  25. pulumi_gcp/dataplex/_inputs.py +160 -0
  26. pulumi_gcp/dataplex/aspect_type.py +1077 -0
  27. pulumi_gcp/dataplex/aspect_type_iam_binding.py +765 -0
  28. pulumi_gcp/dataplex/aspect_type_iam_member.py +765 -0
  29. pulumi_gcp/dataplex/aspect_type_iam_policy.py +604 -0
  30. pulumi_gcp/dataplex/entry_group.py +722 -0
  31. pulumi_gcp/dataplex/entry_group_iam_binding.py +765 -0
  32. pulumi_gcp/dataplex/entry_group_iam_member.py +765 -0
  33. pulumi_gcp/dataplex/entry_group_iam_policy.py +604 -0
  34. pulumi_gcp/dataplex/get_aspect_type_iam_policy.py +164 -0
  35. pulumi_gcp/dataplex/get_entry_group_iam_policy.py +164 -0
  36. pulumi_gcp/dataplex/outputs.py +112 -0
  37. pulumi_gcp/datastream/connection_profile.py +47 -0
  38. pulumi_gcp/datastream/private_connection.py +47 -0
  39. pulumi_gcp/datastream/stream.py +47 -0
  40. pulumi_gcp/kms/__init__.py +2 -0
  41. pulumi_gcp/kms/autokey_config.py +366 -0
  42. pulumi_gcp/kms/key_handle.py +548 -0
  43. pulumi_gcp/networkservices/__init__.py +1 -0
  44. pulumi_gcp/networkservices/_inputs.py +245 -27
  45. pulumi_gcp/networkservices/lb_route_extension.py +663 -0
  46. pulumi_gcp/networkservices/lb_traffic_extension.py +28 -14
  47. pulumi_gcp/networkservices/outputs.py +251 -20
  48. pulumi_gcp/orgpolicy/policy.py +2 -2
  49. pulumi_gcp/pubsub/_inputs.py +16 -0
  50. pulumi_gcp/pubsub/outputs.py +25 -0
  51. pulumi_gcp/pubsub/subscription.py +8 -4
  52. pulumi_gcp/pulumi-plugin.json +1 -1
  53. pulumi_gcp/sql/user.py +4 -4
  54. pulumi_gcp/tpu/_inputs.py +2 -2
  55. pulumi_gcp/tpu/outputs.py +2 -2
  56. {pulumi_gcp-7.25.0a1717104660.dist-info → pulumi_gcp-7.25.0a1717407024.dist-info}/METADATA +1 -1
  57. {pulumi_gcp-7.25.0a1717104660.dist-info → pulumi_gcp-7.25.0a1717407024.dist-info}/RECORD +59 -45
  58. {pulumi_gcp-7.25.0a1717104660.dist-info → pulumi_gcp-7.25.0a1717407024.dist-info}/WHEEL +0 -0
  59. {pulumi_gcp-7.25.0a1717104660.dist-info → pulumi_gcp-7.25.0a1717407024.dist-info}/top_level.txt +0 -0
@@ -134,6 +134,10 @@ __all__ = [
134
134
  'ClusterNodeConfig',
135
135
  'ClusterNodeConfigAdvancedMachineFeatures',
136
136
  'ClusterNodeConfigConfidentialNodes',
137
+ 'ClusterNodeConfigContainerdConfig',
138
+ 'ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfig',
139
+ 'ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig',
140
+ 'ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig',
137
141
  'ClusterNodeConfigEffectiveTaint',
138
142
  'ClusterNodeConfigEphemeralStorageConfig',
139
143
  'ClusterNodeConfigEphemeralStorageLocalSsdConfig',
@@ -161,6 +165,10 @@ __all__ = [
161
165
  'ClusterNodePoolAutoscaling',
162
166
  'ClusterNodePoolDefaults',
163
167
  'ClusterNodePoolDefaultsNodeConfigDefaults',
168
+ 'ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfig',
169
+ 'ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfig',
170
+ 'ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig',
171
+ 'ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig',
164
172
  'ClusterNodePoolDefaultsNodeConfigDefaultsGcfsConfig',
165
173
  'ClusterNodePoolManagement',
166
174
  'ClusterNodePoolNetworkConfig',
@@ -171,6 +179,10 @@ __all__ = [
171
179
  'ClusterNodePoolNodeConfig',
172
180
  'ClusterNodePoolNodeConfigAdvancedMachineFeatures',
173
181
  'ClusterNodePoolNodeConfigConfidentialNodes',
182
+ 'ClusterNodePoolNodeConfigContainerdConfig',
183
+ 'ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfig',
184
+ 'ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig',
185
+ 'ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig',
174
186
  'ClusterNodePoolNodeConfigEffectiveTaint',
175
187
  'ClusterNodePoolNodeConfigEphemeralStorageConfig',
176
188
  'ClusterNodePoolNodeConfigEphemeralStorageLocalSsdConfig',
@@ -224,6 +236,10 @@ __all__ = [
224
236
  'NodePoolNodeConfig',
225
237
  'NodePoolNodeConfigAdvancedMachineFeatures',
226
238
  'NodePoolNodeConfigConfidentialNodes',
239
+ 'NodePoolNodeConfigContainerdConfig',
240
+ 'NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfig',
241
+ 'NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig',
242
+ 'NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig',
227
243
  'NodePoolNodeConfigEffectiveTaint',
228
244
  'NodePoolNodeConfigEphemeralStorageConfig',
229
245
  'NodePoolNodeConfigEphemeralStorageLocalSsdConfig',
@@ -306,6 +322,10 @@ __all__ = [
306
322
  'GetClusterNodeConfigResult',
307
323
  'GetClusterNodeConfigAdvancedMachineFeatureResult',
308
324
  'GetClusterNodeConfigConfidentialNodeResult',
325
+ 'GetClusterNodeConfigContainerdConfigResult',
326
+ 'GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigResult',
327
+ 'GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigResult',
328
+ 'GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigResult',
309
329
  'GetClusterNodeConfigEffectiveTaintResult',
310
330
  'GetClusterNodeConfigEphemeralStorageConfigResult',
311
331
  'GetClusterNodeConfigEphemeralStorageLocalSsdConfigResult',
@@ -333,6 +353,10 @@ __all__ = [
333
353
  'GetClusterNodePoolAutoscalingResult',
334
354
  'GetClusterNodePoolDefaultResult',
335
355
  'GetClusterNodePoolDefaultNodeConfigDefaultResult',
356
+ 'GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigResult',
357
+ 'GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigResult',
358
+ 'GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigResult',
359
+ 'GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigResult',
336
360
  'GetClusterNodePoolDefaultNodeConfigDefaultGcfsConfigResult',
337
361
  'GetClusterNodePoolManagementResult',
338
362
  'GetClusterNodePoolNetworkConfigResult',
@@ -343,6 +367,10 @@ __all__ = [
343
367
  'GetClusterNodePoolNodeConfigResult',
344
368
  'GetClusterNodePoolNodeConfigAdvancedMachineFeatureResult',
345
369
  'GetClusterNodePoolNodeConfigConfidentialNodeResult',
370
+ 'GetClusterNodePoolNodeConfigContainerdConfigResult',
371
+ 'GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigResult',
372
+ 'GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigResult',
373
+ 'GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigResult',
346
374
  'GetClusterNodePoolNodeConfigEffectiveTaintResult',
347
375
  'GetClusterNodePoolNodeConfigEphemeralStorageConfigResult',
348
376
  'GetClusterNodePoolNodeConfigEphemeralStorageLocalSsdConfigResult',
@@ -6413,6 +6441,8 @@ class ClusterNodeConfig(dict):
6413
6441
  suggest = "boot_disk_kms_key"
6414
6442
  elif key == "confidentialNodes":
6415
6443
  suggest = "confidential_nodes"
6444
+ elif key == "containerdConfig":
6445
+ suggest = "containerd_config"
6416
6446
  elif key == "diskSizeGb":
6417
6447
  suggest = "disk_size_gb"
6418
6448
  elif key == "diskType":
@@ -6487,6 +6517,7 @@ class ClusterNodeConfig(dict):
6487
6517
  advanced_machine_features: Optional['outputs.ClusterNodeConfigAdvancedMachineFeatures'] = None,
6488
6518
  boot_disk_kms_key: Optional[str] = None,
6489
6519
  confidential_nodes: Optional['outputs.ClusterNodeConfigConfidentialNodes'] = None,
6520
+ containerd_config: Optional['outputs.ClusterNodeConfigContainerdConfig'] = None,
6490
6521
  disk_size_gb: Optional[int] = None,
6491
6522
  disk_type: Optional[str] = None,
6492
6523
  effective_taints: Optional[Sequence['outputs.ClusterNodeConfigEffectiveTaint']] = None,
@@ -6528,6 +6559,7 @@ class ClusterNodeConfig(dict):
6528
6559
  advanced machine features. Structure is documented below.
6529
6560
  :param str boot_disk_kms_key: The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool. This should be of the form projects/[KEY_PROJECT_ID]/locations/[LOCATION]/keyRings/[RING_NAME]/cryptoKeys/[KEY_NAME]. For more information about protecting resources with Cloud KMS Keys please see: <https://cloud.google.com/compute/docs/disks/customer-managed-encryption>
6530
6561
  :param 'ClusterNodeConfigConfidentialNodesArgs' confidential_nodes: Configuration for [Confidential Nodes](https://cloud.google.com/kubernetes-engine/docs/how-to/confidential-gke-nodes) feature. Structure is documented below documented below.
6562
+ :param 'ClusterNodeConfigContainerdConfigArgs' containerd_config: Parameters to customize containerd runtime. Structure is documented below.
6531
6563
  :param int disk_size_gb: Size of the disk attached to each node, specified
6532
6564
  in GB. The smallest allowed disk size is 10GB. Defaults to 100GB.
6533
6565
  :param str disk_type: Type of the disk attached to each node
@@ -6628,6 +6660,8 @@ class ClusterNodeConfig(dict):
6628
6660
  pulumi.set(__self__, "boot_disk_kms_key", boot_disk_kms_key)
6629
6661
  if confidential_nodes is not None:
6630
6662
  pulumi.set(__self__, "confidential_nodes", confidential_nodes)
6663
+ if containerd_config is not None:
6664
+ pulumi.set(__self__, "containerd_config", containerd_config)
6631
6665
  if disk_size_gb is not None:
6632
6666
  pulumi.set(__self__, "disk_size_gb", disk_size_gb)
6633
6667
  if disk_type is not None:
@@ -6726,6 +6760,14 @@ class ClusterNodeConfig(dict):
6726
6760
  """
6727
6761
  return pulumi.get(self, "confidential_nodes")
6728
6762
 
6763
+ @property
6764
+ @pulumi.getter(name="containerdConfig")
6765
+ def containerd_config(self) -> Optional['outputs.ClusterNodeConfigContainerdConfig']:
6766
+ """
6767
+ Parameters to customize containerd runtime. Structure is documented below.
6768
+ """
6769
+ return pulumi.get(self, "containerd_config")
6770
+
6729
6771
  @property
6730
6772
  @pulumi.getter(name="diskSizeGb")
6731
6773
  def disk_size_gb(self) -> Optional[int]:
@@ -7141,6 +7183,170 @@ class ClusterNodeConfigConfidentialNodes(dict):
7141
7183
  return pulumi.get(self, "enabled")
7142
7184
 
7143
7185
 
7186
+ @pulumi.output_type
7187
+ class ClusterNodeConfigContainerdConfig(dict):
7188
+ @staticmethod
7189
+ def __key_warning(key: str):
7190
+ suggest = None
7191
+ if key == "privateRegistryAccessConfig":
7192
+ suggest = "private_registry_access_config"
7193
+
7194
+ if suggest:
7195
+ pulumi.log.warn(f"Key '{key}' not found in ClusterNodeConfigContainerdConfig. Access the value via the '{suggest}' property getter instead.")
7196
+
7197
+ def __getitem__(self, key: str) -> Any:
7198
+ ClusterNodeConfigContainerdConfig.__key_warning(key)
7199
+ return super().__getitem__(key)
7200
+
7201
+ def get(self, key: str, default = None) -> Any:
7202
+ ClusterNodeConfigContainerdConfig.__key_warning(key)
7203
+ return super().get(key, default)
7204
+
7205
+ def __init__(__self__, *,
7206
+ private_registry_access_config: Optional['outputs.ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfig'] = None):
7207
+ """
7208
+ :param 'ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigArgs' private_registry_access_config: Configuration for private container registries. There are two fields in this config:
7209
+ """
7210
+ if private_registry_access_config is not None:
7211
+ pulumi.set(__self__, "private_registry_access_config", private_registry_access_config)
7212
+
7213
+ @property
7214
+ @pulumi.getter(name="privateRegistryAccessConfig")
7215
+ def private_registry_access_config(self) -> Optional['outputs.ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfig']:
7216
+ """
7217
+ Configuration for private container registries. There are two fields in this config:
7218
+ """
7219
+ return pulumi.get(self, "private_registry_access_config")
7220
+
7221
+
7222
+ @pulumi.output_type
7223
+ class ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfig(dict):
7224
+ @staticmethod
7225
+ def __key_warning(key: str):
7226
+ suggest = None
7227
+ if key == "certificateAuthorityDomainConfigs":
7228
+ suggest = "certificate_authority_domain_configs"
7229
+
7230
+ if suggest:
7231
+ pulumi.log.warn(f"Key '{key}' not found in ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfig. Access the value via the '{suggest}' property getter instead.")
7232
+
7233
+ def __getitem__(self, key: str) -> Any:
7234
+ ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfig.__key_warning(key)
7235
+ return super().__getitem__(key)
7236
+
7237
+ def get(self, key: str, default = None) -> Any:
7238
+ ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfig.__key_warning(key)
7239
+ return super().get(key, default)
7240
+
7241
+ def __init__(__self__, *,
7242
+ enabled: bool,
7243
+ certificate_authority_domain_configs: Optional[Sequence['outputs.ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig']] = None):
7244
+ """
7245
+ :param bool enabled: Enables private registry config. If set to false, all other fields in this object must not be set.
7246
+ :param Sequence['ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigArgs'] certificate_authority_domain_configs: List of configuration objects for CA and domains. Each object identifies a certificate and its assigned domains. See [how to configure for private container registries](https://cloud.google.com/kubernetes-engine/docs/how-to/access-private-registries-private-certificates) for more detail. Example:
7247
+ """
7248
+ pulumi.set(__self__, "enabled", enabled)
7249
+ if certificate_authority_domain_configs is not None:
7250
+ pulumi.set(__self__, "certificate_authority_domain_configs", certificate_authority_domain_configs)
7251
+
7252
+ @property
7253
+ @pulumi.getter
7254
+ def enabled(self) -> bool:
7255
+ """
7256
+ Enables private registry config. If set to false, all other fields in this object must not be set.
7257
+ """
7258
+ return pulumi.get(self, "enabled")
7259
+
7260
+ @property
7261
+ @pulumi.getter(name="certificateAuthorityDomainConfigs")
7262
+ def certificate_authority_domain_configs(self) -> Optional[Sequence['outputs.ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig']]:
7263
+ """
7264
+ List of configuration objects for CA and domains. Each object identifies a certificate and its assigned domains. See [how to configure for private container registries](https://cloud.google.com/kubernetes-engine/docs/how-to/access-private-registries-private-certificates) for more detail. Example:
7265
+ """
7266
+ return pulumi.get(self, "certificate_authority_domain_configs")
7267
+
7268
+
7269
+ @pulumi.output_type
7270
+ class ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig(dict):
7271
+ @staticmethod
7272
+ def __key_warning(key: str):
7273
+ suggest = None
7274
+ if key == "gcpSecretManagerCertificateConfig":
7275
+ suggest = "gcp_secret_manager_certificate_config"
7276
+
7277
+ if suggest:
7278
+ pulumi.log.warn(f"Key '{key}' not found in ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig. Access the value via the '{suggest}' property getter instead.")
7279
+
7280
+ def __getitem__(self, key: str) -> Any:
7281
+ ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig.__key_warning(key)
7282
+ return super().__getitem__(key)
7283
+
7284
+ def get(self, key: str, default = None) -> Any:
7285
+ ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig.__key_warning(key)
7286
+ return super().get(key, default)
7287
+
7288
+ def __init__(__self__, *,
7289
+ fqdns: Sequence[str],
7290
+ gcp_secret_manager_certificate_config: 'outputs.ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig'):
7291
+ """
7292
+ :param Sequence[str] fqdns: List of fully-qualified-domain-names. IPv4s and port specification are supported.
7293
+ :param 'ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigArgs' gcp_secret_manager_certificate_config: Parameters for configuring a certificate hosted in GCP SecretManager.
7294
+ """
7295
+ pulumi.set(__self__, "fqdns", fqdns)
7296
+ pulumi.set(__self__, "gcp_secret_manager_certificate_config", gcp_secret_manager_certificate_config)
7297
+
7298
+ @property
7299
+ @pulumi.getter
7300
+ def fqdns(self) -> Sequence[str]:
7301
+ """
7302
+ List of fully-qualified-domain-names. IPv4s and port specification are supported.
7303
+ """
7304
+ return pulumi.get(self, "fqdns")
7305
+
7306
+ @property
7307
+ @pulumi.getter(name="gcpSecretManagerCertificateConfig")
7308
+ def gcp_secret_manager_certificate_config(self) -> 'outputs.ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig':
7309
+ """
7310
+ Parameters for configuring a certificate hosted in GCP SecretManager.
7311
+ """
7312
+ return pulumi.get(self, "gcp_secret_manager_certificate_config")
7313
+
7314
+
7315
+ @pulumi.output_type
7316
+ class ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig(dict):
7317
+ @staticmethod
7318
+ def __key_warning(key: str):
7319
+ suggest = None
7320
+ if key == "secretUri":
7321
+ suggest = "secret_uri"
7322
+
7323
+ if suggest:
7324
+ pulumi.log.warn(f"Key '{key}' not found in ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig. Access the value via the '{suggest}' property getter instead.")
7325
+
7326
+ def __getitem__(self, key: str) -> Any:
7327
+ ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig.__key_warning(key)
7328
+ return super().__getitem__(key)
7329
+
7330
+ def get(self, key: str, default = None) -> Any:
7331
+ ClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig.__key_warning(key)
7332
+ return super().get(key, default)
7333
+
7334
+ def __init__(__self__, *,
7335
+ secret_uri: str):
7336
+ """
7337
+ :param str secret_uri: URI for the secret that hosts a certificate. Must be in the format 'projects/PROJECT_NUM/secrets/SECRET_NAME/versions/VERSION_OR_LATEST'.
7338
+ """
7339
+ pulumi.set(__self__, "secret_uri", secret_uri)
7340
+
7341
+ @property
7342
+ @pulumi.getter(name="secretUri")
7343
+ def secret_uri(self) -> str:
7344
+ """
7345
+ URI for the secret that hosts a certificate. Must be in the format 'projects/PROJECT_NUM/secrets/SECRET_NAME/versions/VERSION_OR_LATEST'.
7346
+ """
7347
+ return pulumi.get(self, "secret_uri")
7348
+
7349
+
7144
7350
  @pulumi.output_type
7145
7351
  class ClusterNodeConfigEffectiveTaint(dict):
7146
7352
  def __init__(__self__, *,
@@ -8566,7 +8772,9 @@ class ClusterNodePoolDefaultsNodeConfigDefaults(dict):
8566
8772
  @staticmethod
8567
8773
  def __key_warning(key: str):
8568
8774
  suggest = None
8569
- if key == "gcfsConfig":
8775
+ if key == "containerdConfig":
8776
+ suggest = "containerd_config"
8777
+ elif key == "gcfsConfig":
8570
8778
  suggest = "gcfs_config"
8571
8779
  elif key == "loggingVariant":
8572
8780
  suggest = "logging_variant"
@@ -8583,17 +8791,29 @@ class ClusterNodePoolDefaultsNodeConfigDefaults(dict):
8583
8791
  return super().get(key, default)
8584
8792
 
8585
8793
  def __init__(__self__, *,
8794
+ containerd_config: Optional['outputs.ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfig'] = None,
8586
8795
  gcfs_config: Optional['outputs.ClusterNodePoolDefaultsNodeConfigDefaultsGcfsConfig'] = None,
8587
8796
  logging_variant: Optional[str] = None):
8588
8797
  """
8798
+ :param 'ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigArgs' containerd_config: Parameters for containerd configuration.
8589
8799
  :param 'ClusterNodePoolDefaultsNodeConfigDefaultsGcfsConfigArgs' gcfs_config: The default Google Container Filesystem (GCFS) configuration at the cluster level. e.g. enable [image streaming](https://cloud.google.com/kubernetes-engine/docs/how-to/image-streaming) across all the node pools within the cluster. Structure is documented below.
8590
8800
  :param str logging_variant: The type of logging agent that is deployed by default for newly created node pools in the cluster. Valid values include DEFAULT and MAX_THROUGHPUT. See [Increasing logging agent throughput](https://cloud.google.com/stackdriver/docs/solutions/gke/managing-logs#throughput) for more information.
8591
8801
  """
8802
+ if containerd_config is not None:
8803
+ pulumi.set(__self__, "containerd_config", containerd_config)
8592
8804
  if gcfs_config is not None:
8593
8805
  pulumi.set(__self__, "gcfs_config", gcfs_config)
8594
8806
  if logging_variant is not None:
8595
8807
  pulumi.set(__self__, "logging_variant", logging_variant)
8596
8808
 
8809
+ @property
8810
+ @pulumi.getter(name="containerdConfig")
8811
+ def containerd_config(self) -> Optional['outputs.ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfig']:
8812
+ """
8813
+ Parameters for containerd configuration.
8814
+ """
8815
+ return pulumi.get(self, "containerd_config")
8816
+
8597
8817
  @property
8598
8818
  @pulumi.getter(name="gcfsConfig")
8599
8819
  def gcfs_config(self) -> Optional['outputs.ClusterNodePoolDefaultsNodeConfigDefaultsGcfsConfig']:
@@ -8611,6 +8831,170 @@ class ClusterNodePoolDefaultsNodeConfigDefaults(dict):
8611
8831
  return pulumi.get(self, "logging_variant")
8612
8832
 
8613
8833
 
8834
+ @pulumi.output_type
8835
+ class ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfig(dict):
8836
+ @staticmethod
8837
+ def __key_warning(key: str):
8838
+ suggest = None
8839
+ if key == "privateRegistryAccessConfig":
8840
+ suggest = "private_registry_access_config"
8841
+
8842
+ if suggest:
8843
+ pulumi.log.warn(f"Key '{key}' not found in ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfig. Access the value via the '{suggest}' property getter instead.")
8844
+
8845
+ def __getitem__(self, key: str) -> Any:
8846
+ ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfig.__key_warning(key)
8847
+ return super().__getitem__(key)
8848
+
8849
+ def get(self, key: str, default = None) -> Any:
8850
+ ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfig.__key_warning(key)
8851
+ return super().get(key, default)
8852
+
8853
+ def __init__(__self__, *,
8854
+ private_registry_access_config: Optional['outputs.ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfig'] = None):
8855
+ """
8856
+ :param 'ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigArgs' private_registry_access_config: Configuration for private container registries. There are two fields in this config:
8857
+ """
8858
+ if private_registry_access_config is not None:
8859
+ pulumi.set(__self__, "private_registry_access_config", private_registry_access_config)
8860
+
8861
+ @property
8862
+ @pulumi.getter(name="privateRegistryAccessConfig")
8863
+ def private_registry_access_config(self) -> Optional['outputs.ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfig']:
8864
+ """
8865
+ Configuration for private container registries. There are two fields in this config:
8866
+ """
8867
+ return pulumi.get(self, "private_registry_access_config")
8868
+
8869
+
8870
+ @pulumi.output_type
8871
+ class ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfig(dict):
8872
+ @staticmethod
8873
+ def __key_warning(key: str):
8874
+ suggest = None
8875
+ if key == "certificateAuthorityDomainConfigs":
8876
+ suggest = "certificate_authority_domain_configs"
8877
+
8878
+ if suggest:
8879
+ pulumi.log.warn(f"Key '{key}' not found in ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfig. Access the value via the '{suggest}' property getter instead.")
8880
+
8881
+ def __getitem__(self, key: str) -> Any:
8882
+ ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfig.__key_warning(key)
8883
+ return super().__getitem__(key)
8884
+
8885
+ def get(self, key: str, default = None) -> Any:
8886
+ ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfig.__key_warning(key)
8887
+ return super().get(key, default)
8888
+
8889
+ def __init__(__self__, *,
8890
+ enabled: bool,
8891
+ certificate_authority_domain_configs: Optional[Sequence['outputs.ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig']] = None):
8892
+ """
8893
+ :param bool enabled: Enables private registry config. If set to false, all other fields in this object must not be set.
8894
+ :param Sequence['ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigArgs'] certificate_authority_domain_configs: List of configuration objects for CA and domains. Each object identifies a certificate and its assigned domains. See [how to configure for private container registries](https://cloud.google.com/kubernetes-engine/docs/how-to/access-private-registries-private-certificates) for more detail. Example:
8895
+ """
8896
+ pulumi.set(__self__, "enabled", enabled)
8897
+ if certificate_authority_domain_configs is not None:
8898
+ pulumi.set(__self__, "certificate_authority_domain_configs", certificate_authority_domain_configs)
8899
+
8900
+ @property
8901
+ @pulumi.getter
8902
+ def enabled(self) -> bool:
8903
+ """
8904
+ Enables private registry config. If set to false, all other fields in this object must not be set.
8905
+ """
8906
+ return pulumi.get(self, "enabled")
8907
+
8908
+ @property
8909
+ @pulumi.getter(name="certificateAuthorityDomainConfigs")
8910
+ def certificate_authority_domain_configs(self) -> Optional[Sequence['outputs.ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig']]:
8911
+ """
8912
+ List of configuration objects for CA and domains. Each object identifies a certificate and its assigned domains. See [how to configure for private container registries](https://cloud.google.com/kubernetes-engine/docs/how-to/access-private-registries-private-certificates) for more detail. Example:
8913
+ """
8914
+ return pulumi.get(self, "certificate_authority_domain_configs")
8915
+
8916
+
8917
+ @pulumi.output_type
8918
+ class ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig(dict):
8919
+ @staticmethod
8920
+ def __key_warning(key: str):
8921
+ suggest = None
8922
+ if key == "gcpSecretManagerCertificateConfig":
8923
+ suggest = "gcp_secret_manager_certificate_config"
8924
+
8925
+ if suggest:
8926
+ pulumi.log.warn(f"Key '{key}' not found in ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig. Access the value via the '{suggest}' property getter instead.")
8927
+
8928
+ def __getitem__(self, key: str) -> Any:
8929
+ ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig.__key_warning(key)
8930
+ return super().__getitem__(key)
8931
+
8932
+ def get(self, key: str, default = None) -> Any:
8933
+ ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig.__key_warning(key)
8934
+ return super().get(key, default)
8935
+
8936
+ def __init__(__self__, *,
8937
+ fqdns: Sequence[str],
8938
+ gcp_secret_manager_certificate_config: 'outputs.ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig'):
8939
+ """
8940
+ :param Sequence[str] fqdns: List of fully-qualified-domain-names. IPv4s and port specification are supported.
8941
+ :param 'ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigArgs' gcp_secret_manager_certificate_config: Parameters for configuring a certificate hosted in GCP SecretManager.
8942
+ """
8943
+ pulumi.set(__self__, "fqdns", fqdns)
8944
+ pulumi.set(__self__, "gcp_secret_manager_certificate_config", gcp_secret_manager_certificate_config)
8945
+
8946
+ @property
8947
+ @pulumi.getter
8948
+ def fqdns(self) -> Sequence[str]:
8949
+ """
8950
+ List of fully-qualified-domain-names. IPv4s and port specification are supported.
8951
+ """
8952
+ return pulumi.get(self, "fqdns")
8953
+
8954
+ @property
8955
+ @pulumi.getter(name="gcpSecretManagerCertificateConfig")
8956
+ def gcp_secret_manager_certificate_config(self) -> 'outputs.ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig':
8957
+ """
8958
+ Parameters for configuring a certificate hosted in GCP SecretManager.
8959
+ """
8960
+ return pulumi.get(self, "gcp_secret_manager_certificate_config")
8961
+
8962
+
8963
+ @pulumi.output_type
8964
+ class ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig(dict):
8965
+ @staticmethod
8966
+ def __key_warning(key: str):
8967
+ suggest = None
8968
+ if key == "secretUri":
8969
+ suggest = "secret_uri"
8970
+
8971
+ if suggest:
8972
+ pulumi.log.warn(f"Key '{key}' not found in ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig. Access the value via the '{suggest}' property getter instead.")
8973
+
8974
+ def __getitem__(self, key: str) -> Any:
8975
+ ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig.__key_warning(key)
8976
+ return super().__getitem__(key)
8977
+
8978
+ def get(self, key: str, default = None) -> Any:
8979
+ ClusterNodePoolDefaultsNodeConfigDefaultsContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig.__key_warning(key)
8980
+ return super().get(key, default)
8981
+
8982
+ def __init__(__self__, *,
8983
+ secret_uri: str):
8984
+ """
8985
+ :param str secret_uri: URI for the secret that hosts a certificate. Must be in the format 'projects/PROJECT_NUM/secrets/SECRET_NAME/versions/VERSION_OR_LATEST'.
8986
+ """
8987
+ pulumi.set(__self__, "secret_uri", secret_uri)
8988
+
8989
+ @property
8990
+ @pulumi.getter(name="secretUri")
8991
+ def secret_uri(self) -> str:
8992
+ """
8993
+ URI for the secret that hosts a certificate. Must be in the format 'projects/PROJECT_NUM/secrets/SECRET_NAME/versions/VERSION_OR_LATEST'.
8994
+ """
8995
+ return pulumi.get(self, "secret_uri")
8996
+
8997
+
8614
8998
  @pulumi.output_type
8615
8999
  class ClusterNodePoolDefaultsNodeConfigDefaultsGcfsConfig(dict):
8616
9000
  def __init__(__self__, *,
@@ -8986,6 +9370,8 @@ class ClusterNodePoolNodeConfig(dict):
8986
9370
  suggest = "boot_disk_kms_key"
8987
9371
  elif key == "confidentialNodes":
8988
9372
  suggest = "confidential_nodes"
9373
+ elif key == "containerdConfig":
9374
+ suggest = "containerd_config"
8989
9375
  elif key == "diskSizeGb":
8990
9376
  suggest = "disk_size_gb"
8991
9377
  elif key == "diskType":
@@ -9060,6 +9446,7 @@ class ClusterNodePoolNodeConfig(dict):
9060
9446
  advanced_machine_features: Optional['outputs.ClusterNodePoolNodeConfigAdvancedMachineFeatures'] = None,
9061
9447
  boot_disk_kms_key: Optional[str] = None,
9062
9448
  confidential_nodes: Optional['outputs.ClusterNodePoolNodeConfigConfidentialNodes'] = None,
9449
+ containerd_config: Optional['outputs.ClusterNodePoolNodeConfigContainerdConfig'] = None,
9063
9450
  disk_size_gb: Optional[int] = None,
9064
9451
  disk_type: Optional[str] = None,
9065
9452
  effective_taints: Optional[Sequence['outputs.ClusterNodePoolNodeConfigEffectiveTaint']] = None,
@@ -9101,6 +9488,7 @@ class ClusterNodePoolNodeConfig(dict):
9101
9488
  advanced machine features. Structure is documented below.
9102
9489
  :param str boot_disk_kms_key: The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool. This should be of the form projects/[KEY_PROJECT_ID]/locations/[LOCATION]/keyRings/[RING_NAME]/cryptoKeys/[KEY_NAME]. For more information about protecting resources with Cloud KMS Keys please see: <https://cloud.google.com/compute/docs/disks/customer-managed-encryption>
9103
9490
  :param 'ClusterNodePoolNodeConfigConfidentialNodesArgs' confidential_nodes: Configuration for [Confidential Nodes](https://cloud.google.com/kubernetes-engine/docs/how-to/confidential-gke-nodes) feature. Structure is documented below documented below.
9491
+ :param 'ClusterNodePoolNodeConfigContainerdConfigArgs' containerd_config: Parameters to customize containerd runtime. Structure is documented below.
9104
9492
  :param int disk_size_gb: Size of the disk attached to each node, specified
9105
9493
  in GB. The smallest allowed disk size is 10GB. Defaults to 100GB.
9106
9494
  :param str disk_type: Type of the disk attached to each node
@@ -9201,6 +9589,8 @@ class ClusterNodePoolNodeConfig(dict):
9201
9589
  pulumi.set(__self__, "boot_disk_kms_key", boot_disk_kms_key)
9202
9590
  if confidential_nodes is not None:
9203
9591
  pulumi.set(__self__, "confidential_nodes", confidential_nodes)
9592
+ if containerd_config is not None:
9593
+ pulumi.set(__self__, "containerd_config", containerd_config)
9204
9594
  if disk_size_gb is not None:
9205
9595
  pulumi.set(__self__, "disk_size_gb", disk_size_gb)
9206
9596
  if disk_type is not None:
@@ -9299,6 +9689,14 @@ class ClusterNodePoolNodeConfig(dict):
9299
9689
  """
9300
9690
  return pulumi.get(self, "confidential_nodes")
9301
9691
 
9692
+ @property
9693
+ @pulumi.getter(name="containerdConfig")
9694
+ def containerd_config(self) -> Optional['outputs.ClusterNodePoolNodeConfigContainerdConfig']:
9695
+ """
9696
+ Parameters to customize containerd runtime. Structure is documented below.
9697
+ """
9698
+ return pulumi.get(self, "containerd_config")
9699
+
9302
9700
  @property
9303
9701
  @pulumi.getter(name="diskSizeGb")
9304
9702
  def disk_size_gb(self) -> Optional[int]:
@@ -9714,6 +10112,170 @@ class ClusterNodePoolNodeConfigConfidentialNodes(dict):
9714
10112
  return pulumi.get(self, "enabled")
9715
10113
 
9716
10114
 
10115
+ @pulumi.output_type
10116
+ class ClusterNodePoolNodeConfigContainerdConfig(dict):
10117
+ @staticmethod
10118
+ def __key_warning(key: str):
10119
+ suggest = None
10120
+ if key == "privateRegistryAccessConfig":
10121
+ suggest = "private_registry_access_config"
10122
+
10123
+ if suggest:
10124
+ pulumi.log.warn(f"Key '{key}' not found in ClusterNodePoolNodeConfigContainerdConfig. Access the value via the '{suggest}' property getter instead.")
10125
+
10126
+ def __getitem__(self, key: str) -> Any:
10127
+ ClusterNodePoolNodeConfigContainerdConfig.__key_warning(key)
10128
+ return super().__getitem__(key)
10129
+
10130
+ def get(self, key: str, default = None) -> Any:
10131
+ ClusterNodePoolNodeConfigContainerdConfig.__key_warning(key)
10132
+ return super().get(key, default)
10133
+
10134
+ def __init__(__self__, *,
10135
+ private_registry_access_config: Optional['outputs.ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfig'] = None):
10136
+ """
10137
+ :param 'ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigArgs' private_registry_access_config: Configuration for private container registries. There are two fields in this config:
10138
+ """
10139
+ if private_registry_access_config is not None:
10140
+ pulumi.set(__self__, "private_registry_access_config", private_registry_access_config)
10141
+
10142
+ @property
10143
+ @pulumi.getter(name="privateRegistryAccessConfig")
10144
+ def private_registry_access_config(self) -> Optional['outputs.ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfig']:
10145
+ """
10146
+ Configuration for private container registries. There are two fields in this config:
10147
+ """
10148
+ return pulumi.get(self, "private_registry_access_config")
10149
+
10150
+
10151
+ @pulumi.output_type
10152
+ class ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfig(dict):
10153
+ @staticmethod
10154
+ def __key_warning(key: str):
10155
+ suggest = None
10156
+ if key == "certificateAuthorityDomainConfigs":
10157
+ suggest = "certificate_authority_domain_configs"
10158
+
10159
+ if suggest:
10160
+ pulumi.log.warn(f"Key '{key}' not found in ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfig. Access the value via the '{suggest}' property getter instead.")
10161
+
10162
+ def __getitem__(self, key: str) -> Any:
10163
+ ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfig.__key_warning(key)
10164
+ return super().__getitem__(key)
10165
+
10166
+ def get(self, key: str, default = None) -> Any:
10167
+ ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfig.__key_warning(key)
10168
+ return super().get(key, default)
10169
+
10170
+ def __init__(__self__, *,
10171
+ enabled: bool,
10172
+ certificate_authority_domain_configs: Optional[Sequence['outputs.ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig']] = None):
10173
+ """
10174
+ :param bool enabled: Enables private registry config. If set to false, all other fields in this object must not be set.
10175
+ :param Sequence['ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigArgs'] certificate_authority_domain_configs: List of configuration objects for CA and domains. Each object identifies a certificate and its assigned domains. See [how to configure for private container registries](https://cloud.google.com/kubernetes-engine/docs/how-to/access-private-registries-private-certificates) for more detail. Example:
10176
+ """
10177
+ pulumi.set(__self__, "enabled", enabled)
10178
+ if certificate_authority_domain_configs is not None:
10179
+ pulumi.set(__self__, "certificate_authority_domain_configs", certificate_authority_domain_configs)
10180
+
10181
+ @property
10182
+ @pulumi.getter
10183
+ def enabled(self) -> bool:
10184
+ """
10185
+ Enables private registry config. If set to false, all other fields in this object must not be set.
10186
+ """
10187
+ return pulumi.get(self, "enabled")
10188
+
10189
+ @property
10190
+ @pulumi.getter(name="certificateAuthorityDomainConfigs")
10191
+ def certificate_authority_domain_configs(self) -> Optional[Sequence['outputs.ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig']]:
10192
+ """
10193
+ List of configuration objects for CA and domains. Each object identifies a certificate and its assigned domains. See [how to configure for private container registries](https://cloud.google.com/kubernetes-engine/docs/how-to/access-private-registries-private-certificates) for more detail. Example:
10194
+ """
10195
+ return pulumi.get(self, "certificate_authority_domain_configs")
10196
+
10197
+
10198
+ @pulumi.output_type
10199
+ class ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig(dict):
10200
+ @staticmethod
10201
+ def __key_warning(key: str):
10202
+ suggest = None
10203
+ if key == "gcpSecretManagerCertificateConfig":
10204
+ suggest = "gcp_secret_manager_certificate_config"
10205
+
10206
+ if suggest:
10207
+ pulumi.log.warn(f"Key '{key}' not found in ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig. Access the value via the '{suggest}' property getter instead.")
10208
+
10209
+ def __getitem__(self, key: str) -> Any:
10210
+ ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig.__key_warning(key)
10211
+ return super().__getitem__(key)
10212
+
10213
+ def get(self, key: str, default = None) -> Any:
10214
+ ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig.__key_warning(key)
10215
+ return super().get(key, default)
10216
+
10217
+ def __init__(__self__, *,
10218
+ fqdns: Sequence[str],
10219
+ gcp_secret_manager_certificate_config: 'outputs.ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig'):
10220
+ """
10221
+ :param Sequence[str] fqdns: List of fully-qualified-domain-names. IPv4s and port specification are supported.
10222
+ :param 'ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigArgs' gcp_secret_manager_certificate_config: Parameters for configuring a certificate hosted in GCP SecretManager.
10223
+ """
10224
+ pulumi.set(__self__, "fqdns", fqdns)
10225
+ pulumi.set(__self__, "gcp_secret_manager_certificate_config", gcp_secret_manager_certificate_config)
10226
+
10227
+ @property
10228
+ @pulumi.getter
10229
+ def fqdns(self) -> Sequence[str]:
10230
+ """
10231
+ List of fully-qualified-domain-names. IPv4s and port specification are supported.
10232
+ """
10233
+ return pulumi.get(self, "fqdns")
10234
+
10235
+ @property
10236
+ @pulumi.getter(name="gcpSecretManagerCertificateConfig")
10237
+ def gcp_secret_manager_certificate_config(self) -> 'outputs.ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig':
10238
+ """
10239
+ Parameters for configuring a certificate hosted in GCP SecretManager.
10240
+ """
10241
+ return pulumi.get(self, "gcp_secret_manager_certificate_config")
10242
+
10243
+
10244
+ @pulumi.output_type
10245
+ class ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig(dict):
10246
+ @staticmethod
10247
+ def __key_warning(key: str):
10248
+ suggest = None
10249
+ if key == "secretUri":
10250
+ suggest = "secret_uri"
10251
+
10252
+ if suggest:
10253
+ pulumi.log.warn(f"Key '{key}' not found in ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig. Access the value via the '{suggest}' property getter instead.")
10254
+
10255
+ def __getitem__(self, key: str) -> Any:
10256
+ ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig.__key_warning(key)
10257
+ return super().__getitem__(key)
10258
+
10259
+ def get(self, key: str, default = None) -> Any:
10260
+ ClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig.__key_warning(key)
10261
+ return super().get(key, default)
10262
+
10263
+ def __init__(__self__, *,
10264
+ secret_uri: str):
10265
+ """
10266
+ :param str secret_uri: URI for the secret that hosts a certificate. Must be in the format 'projects/PROJECT_NUM/secrets/SECRET_NAME/versions/VERSION_OR_LATEST'.
10267
+ """
10268
+ pulumi.set(__self__, "secret_uri", secret_uri)
10269
+
10270
+ @property
10271
+ @pulumi.getter(name="secretUri")
10272
+ def secret_uri(self) -> str:
10273
+ """
10274
+ URI for the secret that hosts a certificate. Must be in the format 'projects/PROJECT_NUM/secrets/SECRET_NAME/versions/VERSION_OR_LATEST'.
10275
+ """
10276
+ return pulumi.get(self, "secret_uri")
10277
+
10278
+
9717
10279
  @pulumi.output_type
9718
10280
  class ClusterNodePoolNodeConfigEffectiveTaint(dict):
9719
10281
  def __init__(__self__, *,
@@ -12124,6 +12686,8 @@ class NodePoolNodeConfig(dict):
12124
12686
  suggest = "boot_disk_kms_key"
12125
12687
  elif key == "confidentialNodes":
12126
12688
  suggest = "confidential_nodes"
12689
+ elif key == "containerdConfig":
12690
+ suggest = "containerd_config"
12127
12691
  elif key == "diskSizeGb":
12128
12692
  suggest = "disk_size_gb"
12129
12693
  elif key == "diskType":
@@ -12198,6 +12762,7 @@ class NodePoolNodeConfig(dict):
12198
12762
  advanced_machine_features: Optional['outputs.NodePoolNodeConfigAdvancedMachineFeatures'] = None,
12199
12763
  boot_disk_kms_key: Optional[str] = None,
12200
12764
  confidential_nodes: Optional['outputs.NodePoolNodeConfigConfidentialNodes'] = None,
12765
+ containerd_config: Optional['outputs.NodePoolNodeConfigContainerdConfig'] = None,
12201
12766
  disk_size_gb: Optional[int] = None,
12202
12767
  disk_type: Optional[str] = None,
12203
12768
  effective_taints: Optional[Sequence['outputs.NodePoolNodeConfigEffectiveTaint']] = None,
@@ -12238,6 +12803,7 @@ class NodePoolNodeConfig(dict):
12238
12803
  :param 'NodePoolNodeConfigAdvancedMachineFeaturesArgs' advanced_machine_features: Specifies options for controlling advanced machine features.
12239
12804
  :param str boot_disk_kms_key: The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool.
12240
12805
  :param 'NodePoolNodeConfigConfidentialNodesArgs' confidential_nodes: Configuration for Confidential Nodes feature. Structure is documented below.
12806
+ :param 'NodePoolNodeConfigContainerdConfigArgs' containerd_config: Parameters for containerd configuration.
12241
12807
  :param int disk_size_gb: Size of the disk attached to each node, specified in GB. The smallest allowed disk size is 10GB.
12242
12808
  :param str disk_type: Type of the disk attached to each node. Such as pd-standard, pd-balanced or pd-ssd
12243
12809
  :param Sequence['NodePoolNodeConfigEffectiveTaintArgs'] effective_taints: List of kubernetes taints applied to each node.
@@ -12281,6 +12847,8 @@ class NodePoolNodeConfig(dict):
12281
12847
  pulumi.set(__self__, "boot_disk_kms_key", boot_disk_kms_key)
12282
12848
  if confidential_nodes is not None:
12283
12849
  pulumi.set(__self__, "confidential_nodes", confidential_nodes)
12850
+ if containerd_config is not None:
12851
+ pulumi.set(__self__, "containerd_config", containerd_config)
12284
12852
  if disk_size_gb is not None:
12285
12853
  pulumi.set(__self__, "disk_size_gb", disk_size_gb)
12286
12854
  if disk_type is not None:
@@ -12378,6 +12946,14 @@ class NodePoolNodeConfig(dict):
12378
12946
  """
12379
12947
  return pulumi.get(self, "confidential_nodes")
12380
12948
 
12949
+ @property
12950
+ @pulumi.getter(name="containerdConfig")
12951
+ def containerd_config(self) -> Optional['outputs.NodePoolNodeConfigContainerdConfig']:
12952
+ """
12953
+ Parameters for containerd configuration.
12954
+ """
12955
+ return pulumi.get(self, "containerd_config")
12956
+
12381
12957
  @property
12382
12958
  @pulumi.getter(name="diskSizeGb")
12383
12959
  def disk_size_gb(self) -> Optional[int]:
@@ -12632,108 +13208,272 @@ class NodePoolNodeConfig(dict):
12632
13208
  """
12633
13209
  Node affinity options for sole tenant node pools.
12634
13210
  """
12635
- return pulumi.get(self, "sole_tenant_config")
13211
+ return pulumi.get(self, "sole_tenant_config")
13212
+
13213
+ @property
13214
+ @pulumi.getter
13215
+ def spot(self) -> Optional[bool]:
13216
+ """
13217
+ Whether the nodes are created as spot VM instances.
13218
+ """
13219
+ return pulumi.get(self, "spot")
13220
+
13221
+ @property
13222
+ @pulumi.getter
13223
+ def tags(self) -> Optional[Sequence[str]]:
13224
+ """
13225
+ The list of instance tags applied to all nodes.
13226
+ """
13227
+ return pulumi.get(self, "tags")
13228
+
13229
+ @property
13230
+ @pulumi.getter
13231
+ def taints(self) -> Optional[Sequence['outputs.NodePoolNodeConfigTaint']]:
13232
+ """
13233
+ List of Kubernetes taints to be applied to each node.
13234
+ """
13235
+ return pulumi.get(self, "taints")
13236
+
13237
+ @property
13238
+ @pulumi.getter(name="workloadMetadataConfig")
13239
+ def workload_metadata_config(self) -> Optional['outputs.NodePoolNodeConfigWorkloadMetadataConfig']:
13240
+ """
13241
+ The workload metadata configuration for this node.
13242
+ """
13243
+ return pulumi.get(self, "workload_metadata_config")
13244
+
13245
+
13246
+ @pulumi.output_type
13247
+ class NodePoolNodeConfigAdvancedMachineFeatures(dict):
13248
+ @staticmethod
13249
+ def __key_warning(key: str):
13250
+ suggest = None
13251
+ if key == "threadsPerCore":
13252
+ suggest = "threads_per_core"
13253
+ elif key == "enableNestedVirtualization":
13254
+ suggest = "enable_nested_virtualization"
13255
+
13256
+ if suggest:
13257
+ pulumi.log.warn(f"Key '{key}' not found in NodePoolNodeConfigAdvancedMachineFeatures. Access the value via the '{suggest}' property getter instead.")
13258
+
13259
+ def __getitem__(self, key: str) -> Any:
13260
+ NodePoolNodeConfigAdvancedMachineFeatures.__key_warning(key)
13261
+ return super().__getitem__(key)
13262
+
13263
+ def get(self, key: str, default = None) -> Any:
13264
+ NodePoolNodeConfigAdvancedMachineFeatures.__key_warning(key)
13265
+ return super().get(key, default)
13266
+
13267
+ def __init__(__self__, *,
13268
+ threads_per_core: int,
13269
+ enable_nested_virtualization: Optional[bool] = None):
13270
+ """
13271
+ :param int threads_per_core: The number of threads per physical core. To disable simultaneous multithreading (SMT) set this to 1. If unset, the maximum number of threads supported per core by the underlying processor is assumed.
13272
+ :param bool enable_nested_virtualization: Whether the node should have nested virtualization enabled.
13273
+ """
13274
+ pulumi.set(__self__, "threads_per_core", threads_per_core)
13275
+ if enable_nested_virtualization is not None:
13276
+ pulumi.set(__self__, "enable_nested_virtualization", enable_nested_virtualization)
13277
+
13278
+ @property
13279
+ @pulumi.getter(name="threadsPerCore")
13280
+ def threads_per_core(self) -> int:
13281
+ """
13282
+ The number of threads per physical core. To disable simultaneous multithreading (SMT) set this to 1. If unset, the maximum number of threads supported per core by the underlying processor is assumed.
13283
+ """
13284
+ return pulumi.get(self, "threads_per_core")
13285
+
13286
+ @property
13287
+ @pulumi.getter(name="enableNestedVirtualization")
13288
+ def enable_nested_virtualization(self) -> Optional[bool]:
13289
+ """
13290
+ Whether the node should have nested virtualization enabled.
13291
+ """
13292
+ return pulumi.get(self, "enable_nested_virtualization")
13293
+
13294
+
13295
+ @pulumi.output_type
13296
+ class NodePoolNodeConfigConfidentialNodes(dict):
13297
+ def __init__(__self__, *,
13298
+ enabled: bool):
13299
+ """
13300
+ :param bool enabled: Enable Confidential GKE Nodes for this cluster, to
13301
+ enforce encryption of data in-use.
13302
+ """
13303
+ pulumi.set(__self__, "enabled", enabled)
13304
+
13305
+ @property
13306
+ @pulumi.getter
13307
+ def enabled(self) -> bool:
13308
+ """
13309
+ Enable Confidential GKE Nodes for this cluster, to
13310
+ enforce encryption of data in-use.
13311
+ """
13312
+ return pulumi.get(self, "enabled")
13313
+
13314
+
13315
+ @pulumi.output_type
13316
+ class NodePoolNodeConfigContainerdConfig(dict):
13317
+ @staticmethod
13318
+ def __key_warning(key: str):
13319
+ suggest = None
13320
+ if key == "privateRegistryAccessConfig":
13321
+ suggest = "private_registry_access_config"
13322
+
13323
+ if suggest:
13324
+ pulumi.log.warn(f"Key '{key}' not found in NodePoolNodeConfigContainerdConfig. Access the value via the '{suggest}' property getter instead.")
13325
+
13326
+ def __getitem__(self, key: str) -> Any:
13327
+ NodePoolNodeConfigContainerdConfig.__key_warning(key)
13328
+ return super().__getitem__(key)
13329
+
13330
+ def get(self, key: str, default = None) -> Any:
13331
+ NodePoolNodeConfigContainerdConfig.__key_warning(key)
13332
+ return super().get(key, default)
13333
+
13334
+ def __init__(__self__, *,
13335
+ private_registry_access_config: Optional['outputs.NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfig'] = None):
13336
+ """
13337
+ :param 'NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigArgs' private_registry_access_config: Parameters for private container registries configuration.
13338
+ """
13339
+ if private_registry_access_config is not None:
13340
+ pulumi.set(__self__, "private_registry_access_config", private_registry_access_config)
12636
13341
 
12637
13342
  @property
12638
- @pulumi.getter
12639
- def spot(self) -> Optional[bool]:
13343
+ @pulumi.getter(name="privateRegistryAccessConfig")
13344
+ def private_registry_access_config(self) -> Optional['outputs.NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfig']:
12640
13345
  """
12641
- Whether the nodes are created as spot VM instances.
13346
+ Parameters for private container registries configuration.
12642
13347
  """
12643
- return pulumi.get(self, "spot")
13348
+ return pulumi.get(self, "private_registry_access_config")
12644
13349
 
12645
- @property
12646
- @pulumi.getter
12647
- def tags(self) -> Optional[Sequence[str]]:
13350
+
13351
+ @pulumi.output_type
13352
+ class NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfig(dict):
13353
+ @staticmethod
13354
+ def __key_warning(key: str):
13355
+ suggest = None
13356
+ if key == "certificateAuthorityDomainConfigs":
13357
+ suggest = "certificate_authority_domain_configs"
13358
+
13359
+ if suggest:
13360
+ pulumi.log.warn(f"Key '{key}' not found in NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfig. Access the value via the '{suggest}' property getter instead.")
13361
+
13362
+ def __getitem__(self, key: str) -> Any:
13363
+ NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfig.__key_warning(key)
13364
+ return super().__getitem__(key)
13365
+
13366
+ def get(self, key: str, default = None) -> Any:
13367
+ NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfig.__key_warning(key)
13368
+ return super().get(key, default)
13369
+
13370
+ def __init__(__self__, *,
13371
+ enabled: bool,
13372
+ certificate_authority_domain_configs: Optional[Sequence['outputs.NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig']] = None):
12648
13373
  """
12649
- The list of instance tags applied to all nodes.
13374
+ :param bool enabled: Whether or not private registries are configured.
13375
+ :param Sequence['NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigArgs'] certificate_authority_domain_configs: Parameters for configuring CA certificate and domains.
12650
13376
  """
12651
- return pulumi.get(self, "tags")
13377
+ pulumi.set(__self__, "enabled", enabled)
13378
+ if certificate_authority_domain_configs is not None:
13379
+ pulumi.set(__self__, "certificate_authority_domain_configs", certificate_authority_domain_configs)
12652
13380
 
12653
13381
  @property
12654
13382
  @pulumi.getter
12655
- def taints(self) -> Optional[Sequence['outputs.NodePoolNodeConfigTaint']]:
13383
+ def enabled(self) -> bool:
12656
13384
  """
12657
- List of Kubernetes taints to be applied to each node.
13385
+ Whether or not private registries are configured.
12658
13386
  """
12659
- return pulumi.get(self, "taints")
13387
+ return pulumi.get(self, "enabled")
12660
13388
 
12661
13389
  @property
12662
- @pulumi.getter(name="workloadMetadataConfig")
12663
- def workload_metadata_config(self) -> Optional['outputs.NodePoolNodeConfigWorkloadMetadataConfig']:
13390
+ @pulumi.getter(name="certificateAuthorityDomainConfigs")
13391
+ def certificate_authority_domain_configs(self) -> Optional[Sequence['outputs.NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig']]:
12664
13392
  """
12665
- The workload metadata configuration for this node.
13393
+ Parameters for configuring CA certificate and domains.
12666
13394
  """
12667
- return pulumi.get(self, "workload_metadata_config")
13395
+ return pulumi.get(self, "certificate_authority_domain_configs")
12668
13396
 
12669
13397
 
12670
13398
  @pulumi.output_type
12671
- class NodePoolNodeConfigAdvancedMachineFeatures(dict):
13399
+ class NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig(dict):
12672
13400
  @staticmethod
12673
13401
  def __key_warning(key: str):
12674
13402
  suggest = None
12675
- if key == "threadsPerCore":
12676
- suggest = "threads_per_core"
12677
- elif key == "enableNestedVirtualization":
12678
- suggest = "enable_nested_virtualization"
13403
+ if key == "gcpSecretManagerCertificateConfig":
13404
+ suggest = "gcp_secret_manager_certificate_config"
12679
13405
 
12680
13406
  if suggest:
12681
- pulumi.log.warn(f"Key '{key}' not found in NodePoolNodeConfigAdvancedMachineFeatures. Access the value via the '{suggest}' property getter instead.")
13407
+ pulumi.log.warn(f"Key '{key}' not found in NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig. Access the value via the '{suggest}' property getter instead.")
12682
13408
 
12683
13409
  def __getitem__(self, key: str) -> Any:
12684
- NodePoolNodeConfigAdvancedMachineFeatures.__key_warning(key)
13410
+ NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig.__key_warning(key)
12685
13411
  return super().__getitem__(key)
12686
13412
 
12687
13413
  def get(self, key: str, default = None) -> Any:
12688
- NodePoolNodeConfigAdvancedMachineFeatures.__key_warning(key)
13414
+ NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfig.__key_warning(key)
12689
13415
  return super().get(key, default)
12690
13416
 
12691
13417
  def __init__(__self__, *,
12692
- threads_per_core: int,
12693
- enable_nested_virtualization: Optional[bool] = None):
13418
+ fqdns: Sequence[str],
13419
+ gcp_secret_manager_certificate_config: 'outputs.NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig'):
12694
13420
  """
12695
- :param int threads_per_core: The number of threads per physical core. To disable simultaneous multithreading (SMT) set this to 1. If unset, the maximum number of threads supported per core by the underlying processor is assumed.
12696
- :param bool enable_nested_virtualization: Whether the node should have nested virtualization enabled.
13421
+ :param Sequence[str] fqdns: List of fully-qualified-domain-names. IPv4s and port specification are supported.
13422
+ :param 'NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigArgs' gcp_secret_manager_certificate_config: Parameters for configuring a certificate hosted in GCP SecretManager.
12697
13423
  """
12698
- pulumi.set(__self__, "threads_per_core", threads_per_core)
12699
- if enable_nested_virtualization is not None:
12700
- pulumi.set(__self__, "enable_nested_virtualization", enable_nested_virtualization)
13424
+ pulumi.set(__self__, "fqdns", fqdns)
13425
+ pulumi.set(__self__, "gcp_secret_manager_certificate_config", gcp_secret_manager_certificate_config)
12701
13426
 
12702
13427
  @property
12703
- @pulumi.getter(name="threadsPerCore")
12704
- def threads_per_core(self) -> int:
13428
+ @pulumi.getter
13429
+ def fqdns(self) -> Sequence[str]:
12705
13430
  """
12706
- The number of threads per physical core. To disable simultaneous multithreading (SMT) set this to 1. If unset, the maximum number of threads supported per core by the underlying processor is assumed.
13431
+ List of fully-qualified-domain-names. IPv4s and port specification are supported.
12707
13432
  """
12708
- return pulumi.get(self, "threads_per_core")
13433
+ return pulumi.get(self, "fqdns")
12709
13434
 
12710
13435
  @property
12711
- @pulumi.getter(name="enableNestedVirtualization")
12712
- def enable_nested_virtualization(self) -> Optional[bool]:
13436
+ @pulumi.getter(name="gcpSecretManagerCertificateConfig")
13437
+ def gcp_secret_manager_certificate_config(self) -> 'outputs.NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig':
12713
13438
  """
12714
- Whether the node should have nested virtualization enabled.
13439
+ Parameters for configuring a certificate hosted in GCP SecretManager.
12715
13440
  """
12716
- return pulumi.get(self, "enable_nested_virtualization")
13441
+ return pulumi.get(self, "gcp_secret_manager_certificate_config")
12717
13442
 
12718
13443
 
12719
13444
  @pulumi.output_type
12720
- class NodePoolNodeConfigConfidentialNodes(dict):
13445
+ class NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig(dict):
13446
+ @staticmethod
13447
+ def __key_warning(key: str):
13448
+ suggest = None
13449
+ if key == "secretUri":
13450
+ suggest = "secret_uri"
13451
+
13452
+ if suggest:
13453
+ pulumi.log.warn(f"Key '{key}' not found in NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig. Access the value via the '{suggest}' property getter instead.")
13454
+
13455
+ def __getitem__(self, key: str) -> Any:
13456
+ NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig.__key_warning(key)
13457
+ return super().__getitem__(key)
13458
+
13459
+ def get(self, key: str, default = None) -> Any:
13460
+ NodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfig.__key_warning(key)
13461
+ return super().get(key, default)
13462
+
12721
13463
  def __init__(__self__, *,
12722
- enabled: bool):
13464
+ secret_uri: str):
12723
13465
  """
12724
- :param bool enabled: Enable Confidential GKE Nodes for this cluster, to
12725
- enforce encryption of data in-use.
13466
+ :param str secret_uri: URI for the secret that hosts a certificate. Must be in the format 'projects/PROJECT_NUM/secrets/SECRET_NAME/versions/VERSION_OR_LATEST'.
12726
13467
  """
12727
- pulumi.set(__self__, "enabled", enabled)
13468
+ pulumi.set(__self__, "secret_uri", secret_uri)
12728
13469
 
12729
13470
  @property
12730
- @pulumi.getter
12731
- def enabled(self) -> bool:
13471
+ @pulumi.getter(name="secretUri")
13472
+ def secret_uri(self) -> str:
12732
13473
  """
12733
- Enable Confidential GKE Nodes for this cluster, to
12734
- enforce encryption of data in-use.
13474
+ URI for the secret that hosts a certificate. Must be in the format 'projects/PROJECT_NUM/secrets/SECRET_NAME/versions/VERSION_OR_LATEST'.
12735
13475
  """
12736
- return pulumi.get(self, "enabled")
13476
+ return pulumi.get(self, "secret_uri")
12737
13477
 
12738
13478
 
12739
13479
  @pulumi.output_type
@@ -15516,6 +16256,7 @@ class GetClusterNodeConfigResult(dict):
15516
16256
  advanced_machine_features: Sequence['outputs.GetClusterNodeConfigAdvancedMachineFeatureResult'],
15517
16257
  boot_disk_kms_key: str,
15518
16258
  confidential_nodes: Sequence['outputs.GetClusterNodeConfigConfidentialNodeResult'],
16259
+ containerd_configs: Sequence['outputs.GetClusterNodeConfigContainerdConfigResult'],
15519
16260
  disk_size_gb: int,
15520
16261
  disk_type: str,
15521
16262
  effective_taints: Sequence['outputs.GetClusterNodeConfigEffectiveTaintResult'],
@@ -15556,6 +16297,7 @@ class GetClusterNodeConfigResult(dict):
15556
16297
  :param Sequence['GetClusterNodeConfigAdvancedMachineFeatureArgs'] advanced_machine_features: Specifies options for controlling advanced machine features.
15557
16298
  :param str boot_disk_kms_key: The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool.
15558
16299
  :param Sequence['GetClusterNodeConfigConfidentialNodeArgs'] confidential_nodes: Configuration for the confidential nodes feature, which makes nodes run on confidential VMs. Warning: This configuration can't be changed (or added/removed) after pool creation without deleting and recreating the entire pool.
16300
+ :param Sequence['GetClusterNodeConfigContainerdConfigArgs'] containerd_configs: Parameters for containerd configuration.
15559
16301
  :param int disk_size_gb: Size of the disk attached to each node, specified in GB. The smallest allowed disk size is 10GB.
15560
16302
  :param str disk_type: Type of the disk attached to each node. Such as pd-standard, pd-balanced or pd-ssd
15561
16303
  :param Sequence['GetClusterNodeConfigEffectiveTaintArgs'] effective_taints: List of kubernetes taints applied to each node.
@@ -15596,6 +16338,7 @@ class GetClusterNodeConfigResult(dict):
15596
16338
  pulumi.set(__self__, "advanced_machine_features", advanced_machine_features)
15597
16339
  pulumi.set(__self__, "boot_disk_kms_key", boot_disk_kms_key)
15598
16340
  pulumi.set(__self__, "confidential_nodes", confidential_nodes)
16341
+ pulumi.set(__self__, "containerd_configs", containerd_configs)
15599
16342
  pulumi.set(__self__, "disk_size_gb", disk_size_gb)
15600
16343
  pulumi.set(__self__, "disk_type", disk_type)
15601
16344
  pulumi.set(__self__, "effective_taints", effective_taints)
@@ -15657,6 +16400,14 @@ class GetClusterNodeConfigResult(dict):
15657
16400
  """
15658
16401
  return pulumi.get(self, "confidential_nodes")
15659
16402
 
16403
+ @property
16404
+ @pulumi.getter(name="containerdConfigs")
16405
+ def containerd_configs(self) -> Sequence['outputs.GetClusterNodeConfigContainerdConfigResult']:
16406
+ """
16407
+ Parameters for containerd configuration.
16408
+ """
16409
+ return pulumi.get(self, "containerd_configs")
16410
+
15660
16411
  @property
15661
16412
  @pulumi.getter(name="diskSizeGb")
15662
16413
  def disk_size_gb(self) -> int:
@@ -15993,6 +16744,100 @@ class GetClusterNodeConfigConfidentialNodeResult(dict):
15993
16744
  return pulumi.get(self, "enabled")
15994
16745
 
15995
16746
 
16747
+ @pulumi.output_type
16748
+ class GetClusterNodeConfigContainerdConfigResult(dict):
16749
+ def __init__(__self__, *,
16750
+ private_registry_access_configs: Sequence['outputs.GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigResult']):
16751
+ """
16752
+ :param Sequence['GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigArgs'] private_registry_access_configs: Parameters for private container registries configuration.
16753
+ """
16754
+ pulumi.set(__self__, "private_registry_access_configs", private_registry_access_configs)
16755
+
16756
+ @property
16757
+ @pulumi.getter(name="privateRegistryAccessConfigs")
16758
+ def private_registry_access_configs(self) -> Sequence['outputs.GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigResult']:
16759
+ """
16760
+ Parameters for private container registries configuration.
16761
+ """
16762
+ return pulumi.get(self, "private_registry_access_configs")
16763
+
16764
+
16765
+ @pulumi.output_type
16766
+ class GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigResult(dict):
16767
+ def __init__(__self__, *,
16768
+ certificate_authority_domain_configs: Sequence['outputs.GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigResult'],
16769
+ enabled: bool):
16770
+ """
16771
+ :param Sequence['GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigArgs'] certificate_authority_domain_configs: Parameters for configuring CA certificate and domains.
16772
+ :param bool enabled: Whether or not private registries are configured.
16773
+ """
16774
+ pulumi.set(__self__, "certificate_authority_domain_configs", certificate_authority_domain_configs)
16775
+ pulumi.set(__self__, "enabled", enabled)
16776
+
16777
+ @property
16778
+ @pulumi.getter(name="certificateAuthorityDomainConfigs")
16779
+ def certificate_authority_domain_configs(self) -> Sequence['outputs.GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigResult']:
16780
+ """
16781
+ Parameters for configuring CA certificate and domains.
16782
+ """
16783
+ return pulumi.get(self, "certificate_authority_domain_configs")
16784
+
16785
+ @property
16786
+ @pulumi.getter
16787
+ def enabled(self) -> bool:
16788
+ """
16789
+ Whether or not private registries are configured.
16790
+ """
16791
+ return pulumi.get(self, "enabled")
16792
+
16793
+
16794
+ @pulumi.output_type
16795
+ class GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigResult(dict):
16796
+ def __init__(__self__, *,
16797
+ fqdns: Sequence[str],
16798
+ gcp_secret_manager_certificate_configs: Sequence['outputs.GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigResult']):
16799
+ """
16800
+ :param Sequence[str] fqdns: List of fully-qualified-domain-names. IPv4s and port specification are supported.
16801
+ :param Sequence['GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigArgs'] gcp_secret_manager_certificate_configs: Parameters for configuring a certificate hosted in GCP SecretManager.
16802
+ """
16803
+ pulumi.set(__self__, "fqdns", fqdns)
16804
+ pulumi.set(__self__, "gcp_secret_manager_certificate_configs", gcp_secret_manager_certificate_configs)
16805
+
16806
+ @property
16807
+ @pulumi.getter
16808
+ def fqdns(self) -> Sequence[str]:
16809
+ """
16810
+ List of fully-qualified-domain-names. IPv4s and port specification are supported.
16811
+ """
16812
+ return pulumi.get(self, "fqdns")
16813
+
16814
+ @property
16815
+ @pulumi.getter(name="gcpSecretManagerCertificateConfigs")
16816
+ def gcp_secret_manager_certificate_configs(self) -> Sequence['outputs.GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigResult']:
16817
+ """
16818
+ Parameters for configuring a certificate hosted in GCP SecretManager.
16819
+ """
16820
+ return pulumi.get(self, "gcp_secret_manager_certificate_configs")
16821
+
16822
+
16823
+ @pulumi.output_type
16824
+ class GetClusterNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigResult(dict):
16825
+ def __init__(__self__, *,
16826
+ secret_uri: str):
16827
+ """
16828
+ :param str secret_uri: URI for the secret that hosts a certificate. Must be in the format 'projects/PROJECT_NUM/secrets/SECRET_NAME/versions/VERSION_OR_LATEST'.
16829
+ """
16830
+ pulumi.set(__self__, "secret_uri", secret_uri)
16831
+
16832
+ @property
16833
+ @pulumi.getter(name="secretUri")
16834
+ def secret_uri(self) -> str:
16835
+ """
16836
+ URI for the secret that hosts a certificate. Must be in the format 'projects/PROJECT_NUM/secrets/SECRET_NAME/versions/VERSION_OR_LATEST'.
16837
+ """
16838
+ return pulumi.get(self, "secret_uri")
16839
+
16840
+
15996
16841
  @pulumi.output_type
15997
16842
  class GetClusterNodeConfigEffectiveTaintResult(dict):
15998
16843
  def __init__(__self__, *,
@@ -16889,15 +17734,26 @@ class GetClusterNodePoolDefaultResult(dict):
16889
17734
  @pulumi.output_type
16890
17735
  class GetClusterNodePoolDefaultNodeConfigDefaultResult(dict):
16891
17736
  def __init__(__self__, *,
17737
+ containerd_configs: Sequence['outputs.GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigResult'],
16892
17738
  gcfs_configs: Sequence['outputs.GetClusterNodePoolDefaultNodeConfigDefaultGcfsConfigResult'],
16893
17739
  logging_variant: str):
16894
17740
  """
17741
+ :param Sequence['GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigArgs'] containerd_configs: Parameters for containerd configuration.
16895
17742
  :param Sequence['GetClusterNodePoolDefaultNodeConfigDefaultGcfsConfigArgs'] gcfs_configs: GCFS configuration for this node.
16896
17743
  :param str logging_variant: Type of logging agent that is used as the default value for node pools in the cluster. Valid values include DEFAULT and MAX_THROUGHPUT.
16897
17744
  """
17745
+ pulumi.set(__self__, "containerd_configs", containerd_configs)
16898
17746
  pulumi.set(__self__, "gcfs_configs", gcfs_configs)
16899
17747
  pulumi.set(__self__, "logging_variant", logging_variant)
16900
17748
 
17749
+ @property
17750
+ @pulumi.getter(name="containerdConfigs")
17751
+ def containerd_configs(self) -> Sequence['outputs.GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigResult']:
17752
+ """
17753
+ Parameters for containerd configuration.
17754
+ """
17755
+ return pulumi.get(self, "containerd_configs")
17756
+
16901
17757
  @property
16902
17758
  @pulumi.getter(name="gcfsConfigs")
16903
17759
  def gcfs_configs(self) -> Sequence['outputs.GetClusterNodePoolDefaultNodeConfigDefaultGcfsConfigResult']:
@@ -16915,6 +17771,100 @@ class GetClusterNodePoolDefaultNodeConfigDefaultResult(dict):
16915
17771
  return pulumi.get(self, "logging_variant")
16916
17772
 
16917
17773
 
17774
+ @pulumi.output_type
17775
+ class GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigResult(dict):
17776
+ def __init__(__self__, *,
17777
+ private_registry_access_configs: Sequence['outputs.GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigResult']):
17778
+ """
17779
+ :param Sequence['GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigArgs'] private_registry_access_configs: Parameters for private container registries configuration.
17780
+ """
17781
+ pulumi.set(__self__, "private_registry_access_configs", private_registry_access_configs)
17782
+
17783
+ @property
17784
+ @pulumi.getter(name="privateRegistryAccessConfigs")
17785
+ def private_registry_access_configs(self) -> Sequence['outputs.GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigResult']:
17786
+ """
17787
+ Parameters for private container registries configuration.
17788
+ """
17789
+ return pulumi.get(self, "private_registry_access_configs")
17790
+
17791
+
17792
+ @pulumi.output_type
17793
+ class GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigResult(dict):
17794
+ def __init__(__self__, *,
17795
+ certificate_authority_domain_configs: Sequence['outputs.GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigResult'],
17796
+ enabled: bool):
17797
+ """
17798
+ :param Sequence['GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigArgs'] certificate_authority_domain_configs: Parameters for configuring CA certificate and domains.
17799
+ :param bool enabled: Whether or not private registries are configured.
17800
+ """
17801
+ pulumi.set(__self__, "certificate_authority_domain_configs", certificate_authority_domain_configs)
17802
+ pulumi.set(__self__, "enabled", enabled)
17803
+
17804
+ @property
17805
+ @pulumi.getter(name="certificateAuthorityDomainConfigs")
17806
+ def certificate_authority_domain_configs(self) -> Sequence['outputs.GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigResult']:
17807
+ """
17808
+ Parameters for configuring CA certificate and domains.
17809
+ """
17810
+ return pulumi.get(self, "certificate_authority_domain_configs")
17811
+
17812
+ @property
17813
+ @pulumi.getter
17814
+ def enabled(self) -> bool:
17815
+ """
17816
+ Whether or not private registries are configured.
17817
+ """
17818
+ return pulumi.get(self, "enabled")
17819
+
17820
+
17821
+ @pulumi.output_type
17822
+ class GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigResult(dict):
17823
+ def __init__(__self__, *,
17824
+ fqdns: Sequence[str],
17825
+ gcp_secret_manager_certificate_configs: Sequence['outputs.GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigResult']):
17826
+ """
17827
+ :param Sequence[str] fqdns: List of fully-qualified-domain-names. IPv4s and port specification are supported.
17828
+ :param Sequence['GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigArgs'] gcp_secret_manager_certificate_configs: Parameters for configuring a certificate hosted in GCP SecretManager.
17829
+ """
17830
+ pulumi.set(__self__, "fqdns", fqdns)
17831
+ pulumi.set(__self__, "gcp_secret_manager_certificate_configs", gcp_secret_manager_certificate_configs)
17832
+
17833
+ @property
17834
+ @pulumi.getter
17835
+ def fqdns(self) -> Sequence[str]:
17836
+ """
17837
+ List of fully-qualified-domain-names. IPv4s and port specification are supported.
17838
+ """
17839
+ return pulumi.get(self, "fqdns")
17840
+
17841
+ @property
17842
+ @pulumi.getter(name="gcpSecretManagerCertificateConfigs")
17843
+ def gcp_secret_manager_certificate_configs(self) -> Sequence['outputs.GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigResult']:
17844
+ """
17845
+ Parameters for configuring a certificate hosted in GCP SecretManager.
17846
+ """
17847
+ return pulumi.get(self, "gcp_secret_manager_certificate_configs")
17848
+
17849
+
17850
+ @pulumi.output_type
17851
+ class GetClusterNodePoolDefaultNodeConfigDefaultContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigResult(dict):
17852
+ def __init__(__self__, *,
17853
+ secret_uri: str):
17854
+ """
17855
+ :param str secret_uri: URI for the secret that hosts a certificate. Must be in the format 'projects/PROJECT_NUM/secrets/SECRET_NAME/versions/VERSION_OR_LATEST'.
17856
+ """
17857
+ pulumi.set(__self__, "secret_uri", secret_uri)
17858
+
17859
+ @property
17860
+ @pulumi.getter(name="secretUri")
17861
+ def secret_uri(self) -> str:
17862
+ """
17863
+ URI for the secret that hosts a certificate. Must be in the format 'projects/PROJECT_NUM/secrets/SECRET_NAME/versions/VERSION_OR_LATEST'.
17864
+ """
17865
+ return pulumi.get(self, "secret_uri")
17866
+
17867
+
16918
17868
  @pulumi.output_type
16919
17869
  class GetClusterNodePoolDefaultNodeConfigDefaultGcfsConfigResult(dict):
16920
17870
  def __init__(__self__, *,
@@ -17162,6 +18112,7 @@ class GetClusterNodePoolNodeConfigResult(dict):
17162
18112
  advanced_machine_features: Sequence['outputs.GetClusterNodePoolNodeConfigAdvancedMachineFeatureResult'],
17163
18113
  boot_disk_kms_key: str,
17164
18114
  confidential_nodes: Sequence['outputs.GetClusterNodePoolNodeConfigConfidentialNodeResult'],
18115
+ containerd_configs: Sequence['outputs.GetClusterNodePoolNodeConfigContainerdConfigResult'],
17165
18116
  disk_size_gb: int,
17166
18117
  disk_type: str,
17167
18118
  effective_taints: Sequence['outputs.GetClusterNodePoolNodeConfigEffectiveTaintResult'],
@@ -17202,6 +18153,7 @@ class GetClusterNodePoolNodeConfigResult(dict):
17202
18153
  :param Sequence['GetClusterNodePoolNodeConfigAdvancedMachineFeatureArgs'] advanced_machine_features: Specifies options for controlling advanced machine features.
17203
18154
  :param str boot_disk_kms_key: The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool.
17204
18155
  :param Sequence['GetClusterNodePoolNodeConfigConfidentialNodeArgs'] confidential_nodes: Configuration for the confidential nodes feature, which makes nodes run on confidential VMs. Warning: This configuration can't be changed (or added/removed) after pool creation without deleting and recreating the entire pool.
18156
+ :param Sequence['GetClusterNodePoolNodeConfigContainerdConfigArgs'] containerd_configs: Parameters for containerd configuration.
17205
18157
  :param int disk_size_gb: Size of the disk attached to each node, specified in GB. The smallest allowed disk size is 10GB.
17206
18158
  :param str disk_type: Type of the disk attached to each node. Such as pd-standard, pd-balanced or pd-ssd
17207
18159
  :param Sequence['GetClusterNodePoolNodeConfigEffectiveTaintArgs'] effective_taints: List of kubernetes taints applied to each node.
@@ -17242,6 +18194,7 @@ class GetClusterNodePoolNodeConfigResult(dict):
17242
18194
  pulumi.set(__self__, "advanced_machine_features", advanced_machine_features)
17243
18195
  pulumi.set(__self__, "boot_disk_kms_key", boot_disk_kms_key)
17244
18196
  pulumi.set(__self__, "confidential_nodes", confidential_nodes)
18197
+ pulumi.set(__self__, "containerd_configs", containerd_configs)
17245
18198
  pulumi.set(__self__, "disk_size_gb", disk_size_gb)
17246
18199
  pulumi.set(__self__, "disk_type", disk_type)
17247
18200
  pulumi.set(__self__, "effective_taints", effective_taints)
@@ -17303,6 +18256,14 @@ class GetClusterNodePoolNodeConfigResult(dict):
17303
18256
  """
17304
18257
  return pulumi.get(self, "confidential_nodes")
17305
18258
 
18259
+ @property
18260
+ @pulumi.getter(name="containerdConfigs")
18261
+ def containerd_configs(self) -> Sequence['outputs.GetClusterNodePoolNodeConfigContainerdConfigResult']:
18262
+ """
18263
+ Parameters for containerd configuration.
18264
+ """
18265
+ return pulumi.get(self, "containerd_configs")
18266
+
17306
18267
  @property
17307
18268
  @pulumi.getter(name="diskSizeGb")
17308
18269
  def disk_size_gb(self) -> int:
@@ -17639,6 +18600,100 @@ class GetClusterNodePoolNodeConfigConfidentialNodeResult(dict):
17639
18600
  return pulumi.get(self, "enabled")
17640
18601
 
17641
18602
 
18603
+ @pulumi.output_type
18604
+ class GetClusterNodePoolNodeConfigContainerdConfigResult(dict):
18605
+ def __init__(__self__, *,
18606
+ private_registry_access_configs: Sequence['outputs.GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigResult']):
18607
+ """
18608
+ :param Sequence['GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigArgs'] private_registry_access_configs: Parameters for private container registries configuration.
18609
+ """
18610
+ pulumi.set(__self__, "private_registry_access_configs", private_registry_access_configs)
18611
+
18612
+ @property
18613
+ @pulumi.getter(name="privateRegistryAccessConfigs")
18614
+ def private_registry_access_configs(self) -> Sequence['outputs.GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigResult']:
18615
+ """
18616
+ Parameters for private container registries configuration.
18617
+ """
18618
+ return pulumi.get(self, "private_registry_access_configs")
18619
+
18620
+
18621
+ @pulumi.output_type
18622
+ class GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigResult(dict):
18623
+ def __init__(__self__, *,
18624
+ certificate_authority_domain_configs: Sequence['outputs.GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigResult'],
18625
+ enabled: bool):
18626
+ """
18627
+ :param Sequence['GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigArgs'] certificate_authority_domain_configs: Parameters for configuring CA certificate and domains.
18628
+ :param bool enabled: Whether or not private registries are configured.
18629
+ """
18630
+ pulumi.set(__self__, "certificate_authority_domain_configs", certificate_authority_domain_configs)
18631
+ pulumi.set(__self__, "enabled", enabled)
18632
+
18633
+ @property
18634
+ @pulumi.getter(name="certificateAuthorityDomainConfigs")
18635
+ def certificate_authority_domain_configs(self) -> Sequence['outputs.GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigResult']:
18636
+ """
18637
+ Parameters for configuring CA certificate and domains.
18638
+ """
18639
+ return pulumi.get(self, "certificate_authority_domain_configs")
18640
+
18641
+ @property
18642
+ @pulumi.getter
18643
+ def enabled(self) -> bool:
18644
+ """
18645
+ Whether or not private registries are configured.
18646
+ """
18647
+ return pulumi.get(self, "enabled")
18648
+
18649
+
18650
+ @pulumi.output_type
18651
+ class GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigResult(dict):
18652
+ def __init__(__self__, *,
18653
+ fqdns: Sequence[str],
18654
+ gcp_secret_manager_certificate_configs: Sequence['outputs.GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigResult']):
18655
+ """
18656
+ :param Sequence[str] fqdns: List of fully-qualified-domain-names. IPv4s and port specification are supported.
18657
+ :param Sequence['GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigArgs'] gcp_secret_manager_certificate_configs: Parameters for configuring a certificate hosted in GCP SecretManager.
18658
+ """
18659
+ pulumi.set(__self__, "fqdns", fqdns)
18660
+ pulumi.set(__self__, "gcp_secret_manager_certificate_configs", gcp_secret_manager_certificate_configs)
18661
+
18662
+ @property
18663
+ @pulumi.getter
18664
+ def fqdns(self) -> Sequence[str]:
18665
+ """
18666
+ List of fully-qualified-domain-names. IPv4s and port specification are supported.
18667
+ """
18668
+ return pulumi.get(self, "fqdns")
18669
+
18670
+ @property
18671
+ @pulumi.getter(name="gcpSecretManagerCertificateConfigs")
18672
+ def gcp_secret_manager_certificate_configs(self) -> Sequence['outputs.GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigResult']:
18673
+ """
18674
+ Parameters for configuring a certificate hosted in GCP SecretManager.
18675
+ """
18676
+ return pulumi.get(self, "gcp_secret_manager_certificate_configs")
18677
+
18678
+
18679
+ @pulumi.output_type
18680
+ class GetClusterNodePoolNodeConfigContainerdConfigPrivateRegistryAccessConfigCertificateAuthorityDomainConfigGcpSecretManagerCertificateConfigResult(dict):
18681
+ def __init__(__self__, *,
18682
+ secret_uri: str):
18683
+ """
18684
+ :param str secret_uri: URI for the secret that hosts a certificate. Must be in the format 'projects/PROJECT_NUM/secrets/SECRET_NAME/versions/VERSION_OR_LATEST'.
18685
+ """
18686
+ pulumi.set(__self__, "secret_uri", secret_uri)
18687
+
18688
+ @property
18689
+ @pulumi.getter(name="secretUri")
18690
+ def secret_uri(self) -> str:
18691
+ """
18692
+ URI for the secret that hosts a certificate. Must be in the format 'projects/PROJECT_NUM/secrets/SECRET_NAME/versions/VERSION_OR_LATEST'.
18693
+ """
18694
+ return pulumi.get(self, "secret_uri")
18695
+
18696
+
17642
18697
  @pulumi.output_type
17643
18698
  class GetClusterNodePoolNodeConfigEffectiveTaintResult(dict):
17644
18699
  def __init__(__self__, *,