pulumi-gcp 7.28.0a1718863699__py3-none-any.whl → 7.28.0a1718995220__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +59 -0
- pulumi_gcp/accesscontextmanager/_inputs.py +58 -74
- pulumi_gcp/accesscontextmanager/access_levels.py +0 -20
- pulumi_gcp/accesscontextmanager/outputs.py +58 -74
- pulumi_gcp/accesscontextmanager/service_perimeter.py +2 -0
- pulumi_gcp/bigtable/_inputs.py +40 -0
- pulumi_gcp/bigtable/outputs.py +49 -0
- pulumi_gcp/bigtable/table.py +54 -0
- pulumi_gcp/cloudbuildv2/_inputs.py +383 -0
- pulumi_gcp/cloudbuildv2/connection.py +110 -2
- pulumi_gcp/cloudbuildv2/outputs.py +421 -0
- pulumi_gcp/composer/__init__.py +3 -0
- pulumi_gcp/composer/get_user_workloads_config_map.py +190 -0
- pulumi_gcp/composer/get_user_workloads_secret.py +188 -0
- pulumi_gcp/composer/user_workloads_config_map.py +475 -0
- pulumi_gcp/compute/_inputs.py +4 -2
- pulumi_gcp/compute/backend_service.py +28 -48
- pulumi_gcp/compute/interconnect.py +4 -4
- pulumi_gcp/compute/outputs.py +10 -4
- pulumi_gcp/compute/region_backend_service.py +35 -48
- pulumi_gcp/compute/region_network_endpoint.py +187 -0
- pulumi_gcp/compute/region_network_endpoint_group.py +49 -9
- pulumi_gcp/compute/region_target_https_proxy.py +7 -14
- pulumi_gcp/compute/target_https_proxy.py +28 -14
- pulumi_gcp/config/__init__.pyi +2 -0
- pulumi_gcp/config/vars.py +4 -0
- pulumi_gcp/container/_inputs.py +2 -2
- pulumi_gcp/container/outputs.py +4 -4
- pulumi_gcp/discoveryengine/_inputs.py +227 -0
- pulumi_gcp/discoveryengine/data_store.py +108 -0
- pulumi_gcp/discoveryengine/outputs.py +280 -0
- pulumi_gcp/edgecontainer/_inputs.py +107 -1
- pulumi_gcp/edgecontainer/outputs.py +123 -1
- pulumi_gcp/gkehub/_inputs.py +16 -0
- pulumi_gcp/gkehub/outputs.py +15 -1
- pulumi_gcp/logging/folder_sink.py +14 -14
- pulumi_gcp/logging/organization_sink.py +14 -14
- pulumi_gcp/managedkafka/__init__.py +11 -0
- pulumi_gcp/managedkafka/_inputs.py +169 -0
- pulumi_gcp/managedkafka/cluster.py +807 -0
- pulumi_gcp/managedkafka/outputs.py +197 -0
- pulumi_gcp/managedkafka/topic.py +599 -0
- pulumi_gcp/netapp/__init__.py +1 -0
- pulumi_gcp/netapp/active_directory.py +55 -0
- pulumi_gcp/netapp/backup.py +903 -0
- pulumi_gcp/provider.py +20 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/securitycenter/__init__.py +3 -0
- pulumi_gcp/securitycenter/_inputs.py +1105 -0
- pulumi_gcp/securitycenter/management_folder_security_health_analytics_custom_module.py +725 -0
- pulumi_gcp/securitycenter/management_organization_security_health_analytics_custom_module.py +713 -0
- pulumi_gcp/securitycenter/management_project_security_health_analytics_custom_module.py +706 -0
- pulumi_gcp/securitycenter/outputs.py +1048 -0
- pulumi_gcp/vertex/ai_feature_online_store.py +37 -8
- {pulumi_gcp-7.28.0a1718863699.dist-info → pulumi_gcp-7.28.0a1718995220.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.28.0a1718863699.dist-info → pulumi_gcp-7.28.0a1718995220.dist-info}/RECORD +58 -46
- {pulumi_gcp-7.28.0a1718863699.dist-info → pulumi_gcp-7.28.0a1718995220.dist-info}/WHEEL +0 -0
- {pulumi_gcp-7.28.0a1718863699.dist-info → pulumi_gcp-7.28.0a1718995220.dist-info}/top_level.txt +0 -0
pulumi_gcp/__init__.py
CHANGED
@@ -164,6 +164,8 @@ if typing.TYPE_CHECKING:
|
|
164
164
|
logging = __logging
|
165
165
|
import pulumi_gcp.looker as __looker
|
166
166
|
looker = __looker
|
167
|
+
import pulumi_gcp.managedkafka as __managedkafka
|
168
|
+
managedkafka = __managedkafka
|
167
169
|
import pulumi_gcp.memcache as __memcache
|
168
170
|
memcache = __memcache
|
169
171
|
import pulumi_gcp.migrationcenter as __migrationcenter
|
@@ -326,6 +328,7 @@ else:
|
|
326
328
|
kms = _utilities.lazy_import('pulumi_gcp.kms')
|
327
329
|
logging = _utilities.lazy_import('pulumi_gcp.logging')
|
328
330
|
looker = _utilities.lazy_import('pulumi_gcp.looker')
|
331
|
+
managedkafka = _utilities.lazy_import('pulumi_gcp.managedkafka')
|
329
332
|
memcache = _utilities.lazy_import('pulumi_gcp.memcache')
|
330
333
|
migrationcenter = _utilities.lazy_import('pulumi_gcp.migrationcenter')
|
331
334
|
ml = _utilities.lazy_import('pulumi_gcp.ml')
|
@@ -2068,6 +2071,14 @@ _utilities.register(
|
|
2068
2071
|
"gcp:composer/environment:Environment": "Environment"
|
2069
2072
|
}
|
2070
2073
|
},
|
2074
|
+
{
|
2075
|
+
"pkg": "gcp",
|
2076
|
+
"mod": "composer/userWorkloadsConfigMap",
|
2077
|
+
"fqn": "pulumi_gcp.composer",
|
2078
|
+
"classes": {
|
2079
|
+
"gcp:composer/userWorkloadsConfigMap:UserWorkloadsConfigMap": "UserWorkloadsConfigMap"
|
2080
|
+
}
|
2081
|
+
},
|
2071
2082
|
{
|
2072
2083
|
"pkg": "gcp",
|
2073
2084
|
"mod": "composer/userWorkloadsSecret",
|
@@ -5812,6 +5823,22 @@ _utilities.register(
|
|
5812
5823
|
"gcp:looker/instance:Instance": "Instance"
|
5813
5824
|
}
|
5814
5825
|
},
|
5826
|
+
{
|
5827
|
+
"pkg": "gcp",
|
5828
|
+
"mod": "managedkafka/cluster",
|
5829
|
+
"fqn": "pulumi_gcp.managedkafka",
|
5830
|
+
"classes": {
|
5831
|
+
"gcp:managedkafka/cluster:Cluster": "Cluster"
|
5832
|
+
}
|
5833
|
+
},
|
5834
|
+
{
|
5835
|
+
"pkg": "gcp",
|
5836
|
+
"mod": "managedkafka/topic",
|
5837
|
+
"fqn": "pulumi_gcp.managedkafka",
|
5838
|
+
"classes": {
|
5839
|
+
"gcp:managedkafka/topic:Topic": "Topic"
|
5840
|
+
}
|
5841
|
+
},
|
5815
5842
|
{
|
5816
5843
|
"pkg": "gcp",
|
5817
5844
|
"mod": "memcache/instance",
|
@@ -5932,6 +5959,14 @@ _utilities.register(
|
|
5932
5959
|
"gcp:netapp/activeDirectory:ActiveDirectory": "ActiveDirectory"
|
5933
5960
|
}
|
5934
5961
|
},
|
5962
|
+
{
|
5963
|
+
"pkg": "gcp",
|
5964
|
+
"mod": "netapp/backup",
|
5965
|
+
"fqn": "pulumi_gcp.netapp",
|
5966
|
+
"classes": {
|
5967
|
+
"gcp:netapp/backup:Backup": "Backup"
|
5968
|
+
}
|
5969
|
+
},
|
5935
5970
|
{
|
5936
5971
|
"pkg": "gcp",
|
5937
5972
|
"mod": "netapp/backupPolicy",
|
@@ -6900,6 +6935,14 @@ _utilities.register(
|
|
6900
6935
|
"gcp:securitycenter/instanceIamPolicy:InstanceIamPolicy": "InstanceIamPolicy"
|
6901
6936
|
}
|
6902
6937
|
},
|
6938
|
+
{
|
6939
|
+
"pkg": "gcp",
|
6940
|
+
"mod": "securitycenter/managementFolderSecurityHealthAnalyticsCustomModule",
|
6941
|
+
"fqn": "pulumi_gcp.securitycenter",
|
6942
|
+
"classes": {
|
6943
|
+
"gcp:securitycenter/managementFolderSecurityHealthAnalyticsCustomModule:ManagementFolderSecurityHealthAnalyticsCustomModule": "ManagementFolderSecurityHealthAnalyticsCustomModule"
|
6944
|
+
}
|
6945
|
+
},
|
6903
6946
|
{
|
6904
6947
|
"pkg": "gcp",
|
6905
6948
|
"mod": "securitycenter/managementOrganizationEventThreatDetectionCustomModule",
|
@@ -6908,6 +6951,22 @@ _utilities.register(
|
|
6908
6951
|
"gcp:securitycenter/managementOrganizationEventThreatDetectionCustomModule:ManagementOrganizationEventThreatDetectionCustomModule": "ManagementOrganizationEventThreatDetectionCustomModule"
|
6909
6952
|
}
|
6910
6953
|
},
|
6954
|
+
{
|
6955
|
+
"pkg": "gcp",
|
6956
|
+
"mod": "securitycenter/managementOrganizationSecurityHealthAnalyticsCustomModule",
|
6957
|
+
"fqn": "pulumi_gcp.securitycenter",
|
6958
|
+
"classes": {
|
6959
|
+
"gcp:securitycenter/managementOrganizationSecurityHealthAnalyticsCustomModule:ManagementOrganizationSecurityHealthAnalyticsCustomModule": "ManagementOrganizationSecurityHealthAnalyticsCustomModule"
|
6960
|
+
}
|
6961
|
+
},
|
6962
|
+
{
|
6963
|
+
"pkg": "gcp",
|
6964
|
+
"mod": "securitycenter/managementProjectSecurityHealthAnalyticsCustomModule",
|
6965
|
+
"fqn": "pulumi_gcp.securitycenter",
|
6966
|
+
"classes": {
|
6967
|
+
"gcp:securitycenter/managementProjectSecurityHealthAnalyticsCustomModule:ManagementProjectSecurityHealthAnalyticsCustomModule": "ManagementProjectSecurityHealthAnalyticsCustomModule"
|
6968
|
+
}
|
6969
|
+
},
|
6911
6970
|
{
|
6912
6971
|
"pkg": "gcp",
|
6913
6972
|
"mod": "securitycenter/muteConfig",
|
@@ -1618,8 +1618,8 @@ class ServicePerimeterEgressPolicyEgressFromArgs:
|
|
1618
1618
|
sources: Optional[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterEgressPolicyEgressFromSourceArgs']]]] = None):
|
1619
1619
|
"""
|
1620
1620
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] identities: A list of identities that are allowed access through this `EgressPolicy`.
|
1621
|
-
Should be in the format of
|
1622
|
-
represent
|
1621
|
+
Should be in the format of email address. The email address should
|
1622
|
+
represent individual user or service account only.
|
1623
1623
|
:param pulumi.Input[str] identity_type: Specifies the type of identities that are allowed access to outside the
|
1624
1624
|
perimeter. If left unspecified, then members of `identities` field will
|
1625
1625
|
be allowed access.
|
@@ -1643,8 +1643,8 @@ class ServicePerimeterEgressPolicyEgressFromArgs:
|
|
1643
1643
|
def identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
1644
1644
|
"""
|
1645
1645
|
A list of identities that are allowed access through this `EgressPolicy`.
|
1646
|
-
Should be in the format of
|
1647
|
-
represent
|
1646
|
+
Should be in the format of email address. The email address should
|
1647
|
+
represent individual user or service account only.
|
1648
1648
|
"""
|
1649
1649
|
return pulumi.get(self, "identities")
|
1650
1650
|
|
@@ -1891,9 +1891,9 @@ class ServicePerimeterIngressPolicyIngressFromArgs:
|
|
1891
1891
|
identity_type: Optional[pulumi.Input[str]] = None,
|
1892
1892
|
sources: Optional[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterIngressPolicyIngressFromSourceArgs']]]] = None):
|
1893
1893
|
"""
|
1894
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] identities: A list of identities that are allowed access through this
|
1895
|
-
Should be in the format of
|
1896
|
-
|
1894
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] identities: A list of identities that are allowed access through this ingress policy.
|
1895
|
+
Should be in the format of email address. The email address should represent
|
1896
|
+
individual user or service account only.
|
1897
1897
|
:param pulumi.Input[str] identity_type: Specifies the type of identities that are allowed access from outside the
|
1898
1898
|
perimeter. If left unspecified, then members of `identities` field will be
|
1899
1899
|
allowed access.
|
@@ -1912,9 +1912,9 @@ class ServicePerimeterIngressPolicyIngressFromArgs:
|
|
1912
1912
|
@pulumi.getter
|
1913
1913
|
def identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
1914
1914
|
"""
|
1915
|
-
A list of identities that are allowed access through this
|
1916
|
-
Should be in the format of
|
1917
|
-
|
1915
|
+
A list of identities that are allowed access through this ingress policy.
|
1916
|
+
Should be in the format of email address. The email address should represent
|
1917
|
+
individual user or service account only.
|
1918
1918
|
"""
|
1919
1919
|
return pulumi.get(self, "identities")
|
1920
1920
|
|
@@ -2371,10 +2371,9 @@ class ServicePerimeterSpecEgressPolicyEgressFromArgs:
|
|
2371
2371
|
source_restriction: Optional[pulumi.Input[str]] = None,
|
2372
2372
|
sources: Optional[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterSpecEgressPolicyEgressFromSourceArgs']]]] = None):
|
2373
2373
|
"""
|
2374
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] identities:
|
2375
|
-
|
2376
|
-
|
2377
|
-
The following prefixes are supprted: user, group, serviceAccount, principal, and principalSet.'
|
2374
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] identities: A list of identities that are allowed access through this `EgressPolicy`.
|
2375
|
+
Should be in the format of email address. The email address should
|
2376
|
+
represent individual user or service account only.
|
2378
2377
|
:param pulumi.Input[str] identity_type: Specifies the type of identities that are allowed access to outside the
|
2379
2378
|
perimeter. If left unspecified, then members of `identities` field will
|
2380
2379
|
be allowed access.
|
@@ -2397,10 +2396,9 @@ class ServicePerimeterSpecEgressPolicyEgressFromArgs:
|
|
2397
2396
|
@pulumi.getter
|
2398
2397
|
def identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
2399
2398
|
"""
|
2400
|
-
|
2401
|
-
|
2402
|
-
|
2403
|
-
The following prefixes are supprted: user, group, serviceAccount, principal, and principalSet.'
|
2399
|
+
A list of identities that are allowed access through this `EgressPolicy`.
|
2400
|
+
Should be in the format of email address. The email address should
|
2401
|
+
represent individual user or service account only.
|
2404
2402
|
"""
|
2405
2403
|
return pulumi.get(self, "identities")
|
2406
2404
|
|
@@ -2694,10 +2692,9 @@ class ServicePerimeterSpecIngressPolicyIngressFromArgs:
|
|
2694
2692
|
identity_type: Optional[pulumi.Input[str]] = None,
|
2695
2693
|
sources: Optional[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterSpecIngressPolicyIngressFromSourceArgs']]]] = None):
|
2696
2694
|
"""
|
2697
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] identities:
|
2698
|
-
|
2699
|
-
|
2700
|
-
The following prefixes are supprted: user, group, serviceAccount, principal, and principalSet.'
|
2695
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] identities: A list of identities that are allowed access through this ingress policy.
|
2696
|
+
Should be in the format of email address. The email address should represent
|
2697
|
+
individual user or service account only.
|
2701
2698
|
:param pulumi.Input[str] identity_type: Specifies the type of identities that are allowed access from outside the
|
2702
2699
|
perimeter. If left unspecified, then members of `identities` field will be
|
2703
2700
|
allowed access.
|
@@ -2716,10 +2713,9 @@ class ServicePerimeterSpecIngressPolicyIngressFromArgs:
|
|
2716
2713
|
@pulumi.getter
|
2717
2714
|
def identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
2718
2715
|
"""
|
2719
|
-
|
2720
|
-
|
2721
|
-
|
2722
|
-
The following prefixes are supprted: user, group, serviceAccount, principal, and principalSet.'
|
2716
|
+
A list of identities that are allowed access through this ingress policy.
|
2717
|
+
Should be in the format of email address. The email address should represent
|
2718
|
+
individual user or service account only.
|
2723
2719
|
"""
|
2724
2720
|
return pulumi.get(self, "identities")
|
2725
2721
|
|
@@ -3205,10 +3201,9 @@ class ServicePerimeterStatusEgressPolicyEgressFromArgs:
|
|
3205
3201
|
source_restriction: Optional[pulumi.Input[str]] = None,
|
3206
3202
|
sources: Optional[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterStatusEgressPolicyEgressFromSourceArgs']]]] = None):
|
3207
3203
|
"""
|
3208
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] identities:
|
3209
|
-
|
3210
|
-
|
3211
|
-
The following prefixes are supprted: user, group, serviceAccount, principal, and principalSet.'
|
3204
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] identities: A list of identities that are allowed access through this `EgressPolicy`.
|
3205
|
+
Should be in the format of email address. The email address should
|
3206
|
+
represent individual user or service account only.
|
3212
3207
|
:param pulumi.Input[str] identity_type: Specifies the type of identities that are allowed access to outside the
|
3213
3208
|
perimeter. If left unspecified, then members of `identities` field will
|
3214
3209
|
be allowed access.
|
@@ -3231,10 +3226,9 @@ class ServicePerimeterStatusEgressPolicyEgressFromArgs:
|
|
3231
3226
|
@pulumi.getter
|
3232
3227
|
def identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
3233
3228
|
"""
|
3234
|
-
|
3235
|
-
|
3236
|
-
|
3237
|
-
The following prefixes are supprted: user, group, serviceAccount, principal, and principalSet.'
|
3229
|
+
A list of identities that are allowed access through this `EgressPolicy`.
|
3230
|
+
Should be in the format of email address. The email address should
|
3231
|
+
represent individual user or service account only.
|
3238
3232
|
"""
|
3239
3233
|
return pulumi.get(self, "identities")
|
3240
3234
|
|
@@ -3528,10 +3522,9 @@ class ServicePerimeterStatusIngressPolicyIngressFromArgs:
|
|
3528
3522
|
identity_type: Optional[pulumi.Input[str]] = None,
|
3529
3523
|
sources: Optional[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterStatusIngressPolicyIngressFromSourceArgs']]]] = None):
|
3530
3524
|
"""
|
3531
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] identities:
|
3532
|
-
|
3533
|
-
|
3534
|
-
The following prefixes are supprted: user, group, serviceAccount, principal, and principalSet.'
|
3525
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] identities: A list of identities that are allowed access through this ingress policy.
|
3526
|
+
Should be in the format of email address. The email address should represent
|
3527
|
+
individual user or service account only.
|
3535
3528
|
:param pulumi.Input[str] identity_type: Specifies the type of identities that are allowed access from outside the
|
3536
3529
|
perimeter. If left unspecified, then members of `identities` field will be
|
3537
3530
|
allowed access.
|
@@ -3550,10 +3543,9 @@ class ServicePerimeterStatusIngressPolicyIngressFromArgs:
|
|
3550
3543
|
@pulumi.getter
|
3551
3544
|
def identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
3552
3545
|
"""
|
3553
|
-
|
3554
|
-
|
3555
|
-
|
3556
|
-
The following prefixes are supprted: user, group, serviceAccount, principal, and principalSet.'
|
3546
|
+
A list of identities that are allowed access through this ingress policy.
|
3547
|
+
Should be in the format of email address. The email address should represent
|
3548
|
+
individual user or service account only.
|
3557
3549
|
"""
|
3558
3550
|
return pulumi.get(self, "identities")
|
3559
3551
|
|
@@ -4258,10 +4250,9 @@ class ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromArgs:
|
|
4258
4250
|
source_restriction: Optional[pulumi.Input[str]] = None,
|
4259
4251
|
sources: Optional[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromSourceArgs']]]] = None):
|
4260
4252
|
"""
|
4261
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] identities:
|
4262
|
-
|
4263
|
-
|
4264
|
-
The following prefixes are supprted: user, group, serviceAccount, principal, and principalSet.'
|
4253
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] identities: A list of identities that are allowed access through this `EgressPolicy`.
|
4254
|
+
Should be in the format of email address. The email address should
|
4255
|
+
represent individual user or service account only.
|
4265
4256
|
:param pulumi.Input[str] identity_type: Specifies the type of identities that are allowed access to outside the
|
4266
4257
|
perimeter. If left unspecified, then members of `identities` field will
|
4267
4258
|
be allowed access.
|
@@ -4284,10 +4275,9 @@ class ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromArgs:
|
|
4284
4275
|
@pulumi.getter
|
4285
4276
|
def identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
4286
4277
|
"""
|
4287
|
-
|
4288
|
-
|
4289
|
-
|
4290
|
-
The following prefixes are supprted: user, group, serviceAccount, principal, and principalSet.'
|
4278
|
+
A list of identities that are allowed access through this `EgressPolicy`.
|
4279
|
+
Should be in the format of email address. The email address should
|
4280
|
+
represent individual user or service account only.
|
4291
4281
|
"""
|
4292
4282
|
return pulumi.get(self, "identities")
|
4293
4283
|
|
@@ -4581,10 +4571,9 @@ class ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromArgs:
|
|
4581
4571
|
identity_type: Optional[pulumi.Input[str]] = None,
|
4582
4572
|
sources: Optional[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromSourceArgs']]]] = None):
|
4583
4573
|
"""
|
4584
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] identities:
|
4585
|
-
|
4586
|
-
|
4587
|
-
The following prefixes are supprted: user, group, serviceAccount, principal, and principalSet.'
|
4574
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] identities: A list of identities that are allowed access through this ingress policy.
|
4575
|
+
Should be in the format of email address. The email address should represent
|
4576
|
+
individual user or service account only.
|
4588
4577
|
:param pulumi.Input[str] identity_type: Specifies the type of identities that are allowed access from outside the
|
4589
4578
|
perimeter. If left unspecified, then members of `identities` field will be
|
4590
4579
|
allowed access.
|
@@ -4603,10 +4592,9 @@ class ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromArgs:
|
|
4603
4592
|
@pulumi.getter
|
4604
4593
|
def identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
4605
4594
|
"""
|
4606
|
-
|
4607
|
-
|
4608
|
-
|
4609
|
-
The following prefixes are supprted: user, group, serviceAccount, principal, and principalSet.'
|
4595
|
+
A list of identities that are allowed access through this ingress policy.
|
4596
|
+
Should be in the format of email address. The email address should represent
|
4597
|
+
individual user or service account only.
|
4610
4598
|
"""
|
4611
4599
|
return pulumi.get(self, "identities")
|
4612
4600
|
|
@@ -5092,10 +5080,9 @@ class ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromArgs:
|
|
5092
5080
|
source_restriction: Optional[pulumi.Input[str]] = None,
|
5093
5081
|
sources: Optional[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromSourceArgs']]]] = None):
|
5094
5082
|
"""
|
5095
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] identities:
|
5096
|
-
|
5097
|
-
|
5098
|
-
The following prefixes are supprted: user, group, serviceAccount, principal, and principalSet.'
|
5083
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] identities: A list of identities that are allowed access through this `EgressPolicy`.
|
5084
|
+
Should be in the format of email address. The email address should
|
5085
|
+
represent individual user or service account only.
|
5099
5086
|
:param pulumi.Input[str] identity_type: Specifies the type of identities that are allowed access to outside the
|
5100
5087
|
perimeter. If left unspecified, then members of `identities` field will
|
5101
5088
|
be allowed access.
|
@@ -5118,10 +5105,9 @@ class ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromArgs:
|
|
5118
5105
|
@pulumi.getter
|
5119
5106
|
def identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
5120
5107
|
"""
|
5121
|
-
|
5122
|
-
|
5123
|
-
|
5124
|
-
The following prefixes are supprted: user, group, serviceAccount, principal, and principalSet.'
|
5108
|
+
A list of identities that are allowed access through this `EgressPolicy`.
|
5109
|
+
Should be in the format of email address. The email address should
|
5110
|
+
represent individual user or service account only.
|
5125
5111
|
"""
|
5126
5112
|
return pulumi.get(self, "identities")
|
5127
5113
|
|
@@ -5415,10 +5401,9 @@ class ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromArgs:
|
|
5415
5401
|
identity_type: Optional[pulumi.Input[str]] = None,
|
5416
5402
|
sources: Optional[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromSourceArgs']]]] = None):
|
5417
5403
|
"""
|
5418
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] identities:
|
5419
|
-
|
5420
|
-
|
5421
|
-
The following prefixes are supprted: user, group, serviceAccount, principal, and principalSet.'
|
5404
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] identities: A list of identities that are allowed access through this ingress policy.
|
5405
|
+
Should be in the format of email address. The email address should represent
|
5406
|
+
individual user or service account only.
|
5422
5407
|
:param pulumi.Input[str] identity_type: Specifies the type of identities that are allowed access from outside the
|
5423
5408
|
perimeter. If left unspecified, then members of `identities` field will be
|
5424
5409
|
allowed access.
|
@@ -5437,10 +5422,9 @@ class ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromArgs:
|
|
5437
5422
|
@pulumi.getter
|
5438
5423
|
def identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
5439
5424
|
"""
|
5440
|
-
|
5441
|
-
|
5442
|
-
|
5443
|
-
The following prefixes are supprted: user, group, serviceAccount, principal, and principalSet.'
|
5425
|
+
A list of identities that are allowed access through this ingress policy.
|
5426
|
+
Should be in the format of email address. The email address should represent
|
5427
|
+
individual user or service account only.
|
5444
5428
|
"""
|
5445
5429
|
return pulumi.get(self, "identities")
|
5446
5430
|
|
@@ -121,16 +121,6 @@ class AccessLevels(pulumi.CustomResource):
|
|
121
121
|
parent: Optional[pulumi.Input[str]] = None,
|
122
122
|
__props__=None):
|
123
123
|
"""
|
124
|
-
Replace all existing Access Levels in an Access Policy with the Access Levels provided. This is done atomically.
|
125
|
-
This is a bulk edit of all Access Levels and may override existing Access Levels created by `accesscontextmanager.AccessLevel`,
|
126
|
-
thus causing a permadiff if used alongside `accesscontextmanager.AccessLevel` on the same parent.
|
127
|
-
|
128
|
-
To get more information about AccessLevels, see:
|
129
|
-
|
130
|
-
* [API documentation](https://cloud.google.com/access-context-manager/docs/reference/rest/v1/accessPolicies.accessLevels)
|
131
|
-
* How-to Guides
|
132
|
-
* [Access Policy Quickstart](https://cloud.google.com/access-context-manager/docs/quickstart)
|
133
|
-
|
134
124
|
## Example Usage
|
135
125
|
|
136
126
|
### Access Context Manager Access Levels Basic
|
@@ -221,16 +211,6 @@ class AccessLevels(pulumi.CustomResource):
|
|
221
211
|
args: AccessLevelsArgs,
|
222
212
|
opts: Optional[pulumi.ResourceOptions] = None):
|
223
213
|
"""
|
224
|
-
Replace all existing Access Levels in an Access Policy with the Access Levels provided. This is done atomically.
|
225
|
-
This is a bulk edit of all Access Levels and may override existing Access Levels created by `accesscontextmanager.AccessLevel`,
|
226
|
-
thus causing a permadiff if used alongside `accesscontextmanager.AccessLevel` on the same parent.
|
227
|
-
|
228
|
-
To get more information about AccessLevels, see:
|
229
|
-
|
230
|
-
* [API documentation](https://cloud.google.com/access-context-manager/docs/reference/rest/v1/accessPolicies.accessLevels)
|
231
|
-
* How-to Guides
|
232
|
-
* [Access Policy Quickstart](https://cloud.google.com/access-context-manager/docs/quickstart)
|
233
|
-
|
234
214
|
## Example Usage
|
235
215
|
|
236
216
|
### Access Context Manager Access Levels Basic
|