pulumi-gcp 7.28.0a1718950249__py3-none-any.whl → 7.29.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (214) hide show
  1. pulumi_gcp/__init__.py +67 -0
  2. pulumi_gcp/_utilities.py +35 -0
  3. pulumi_gcp/accesscontextmanager/_inputs.py +58 -74
  4. pulumi_gcp/accesscontextmanager/access_levels.py +0 -20
  5. pulumi_gcp/accesscontextmanager/outputs.py +58 -74
  6. pulumi_gcp/accesscontextmanager/service_perimeter.py +2 -0
  7. pulumi_gcp/activedirectory/domain.py +14 -14
  8. pulumi_gcp/activedirectory/domain_trust.py +14 -14
  9. pulumi_gcp/alloydb/backup.py +8 -8
  10. pulumi_gcp/alloydb/cluster.py +11 -17
  11. pulumi_gcp/alloydb/instance.py +8 -8
  12. pulumi_gcp/alloydb/user.py +8 -8
  13. pulumi_gcp/apigee/addons_config.py +4 -4
  14. pulumi_gcp/apigee/endpoint_attachment.py +2 -2
  15. pulumi_gcp/apigee/env_group.py +2 -2
  16. pulumi_gcp/apigee/environment.py +2 -2
  17. pulumi_gcp/apigee/instance.py +8 -8
  18. pulumi_gcp/apigee/keystores_aliases_self_signed_cert.py +10 -10
  19. pulumi_gcp/apigee/nat_address.py +2 -2
  20. pulumi_gcp/apigee/organization.py +6 -6
  21. pulumi_gcp/apigee/sync_authorization.py +4 -4
  22. pulumi_gcp/apigee/target_server.py +10 -10
  23. pulumi_gcp/apphub/service.py +20 -20
  24. pulumi_gcp/apphub/service_project_attachment.py +8 -8
  25. pulumi_gcp/applicationintegration/auth_config.py +2 -2
  26. pulumi_gcp/applicationintegration/client.py +6 -18
  27. pulumi_gcp/artifactregistry/__init__.py +1 -0
  28. pulumi_gcp/artifactregistry/_inputs.py +4 -4
  29. pulumi_gcp/artifactregistry/get_docker_image.py +244 -0
  30. pulumi_gcp/artifactregistry/outputs.py +6 -6
  31. pulumi_gcp/artifactregistry/repository.py +10 -10
  32. pulumi_gcp/backupdisasterrecovery/management_server.py +2 -2
  33. pulumi_gcp/bigquery/_inputs.py +2 -6
  34. pulumi_gcp/bigquery/data_transfer_config.py +4 -4
  35. pulumi_gcp/bigquery/dataset.py +75 -0
  36. pulumi_gcp/bigquery/get_dataset.py +11 -1
  37. pulumi_gcp/bigquery/job.py +6 -6
  38. pulumi_gcp/bigquery/outputs.py +2 -6
  39. pulumi_gcp/bigtable/_inputs.py +41 -3
  40. pulumi_gcp/bigtable/instance.py +3 -9
  41. pulumi_gcp/bigtable/outputs.py +50 -3
  42. pulumi_gcp/bigtable/table.py +54 -0
  43. pulumi_gcp/billing/_inputs.py +22 -0
  44. pulumi_gcp/billing/budget.py +50 -0
  45. pulumi_gcp/billing/outputs.py +20 -0
  46. pulumi_gcp/certificateauthority/authority.py +2 -2
  47. pulumi_gcp/certificateauthority/certificate.py +4 -4
  48. pulumi_gcp/certificatemanager/_inputs.py +2 -6
  49. pulumi_gcp/certificatemanager/certificate.py +4 -4
  50. pulumi_gcp/certificatemanager/certificate_issuance_config.py +2 -2
  51. pulumi_gcp/certificatemanager/outputs.py +2 -6
  52. pulumi_gcp/cloudbuild/bitbucket_server_config.py +6 -6
  53. pulumi_gcp/cloudbuild/trigger.py +2 -2
  54. pulumi_gcp/cloudbuild/worker_pool.py +6 -6
  55. pulumi_gcp/cloudbuildv2/_inputs.py +383 -0
  56. pulumi_gcp/cloudbuildv2/connection.py +112 -4
  57. pulumi_gcp/cloudbuildv2/outputs.py +421 -0
  58. pulumi_gcp/cloudbuildv2/repository.py +2 -2
  59. pulumi_gcp/cloudfunctionsv2/function.py +28 -28
  60. pulumi_gcp/cloudids/endpoint.py +2 -2
  61. pulumi_gcp/cloudrun/_inputs.py +3 -9
  62. pulumi_gcp/cloudrun/outputs.py +3 -9
  63. pulumi_gcp/cloudrunv2/get_job.py +21 -1
  64. pulumi_gcp/cloudrunv2/job.py +163 -19
  65. pulumi_gcp/cloudrunv2/service.py +8 -8
  66. pulumi_gcp/composer/__init__.py +3 -0
  67. pulumi_gcp/composer/get_user_workloads_config_map.py +190 -0
  68. pulumi_gcp/composer/get_user_workloads_secret.py +188 -0
  69. pulumi_gcp/composer/user_workloads_config_map.py +475 -0
  70. pulumi_gcp/compute/_inputs.py +87 -2
  71. pulumi_gcp/compute/backend_service.py +28 -48
  72. pulumi_gcp/compute/disk.py +3 -9
  73. pulumi_gcp/compute/firewall.py +3 -9
  74. pulumi_gcp/compute/forwarding_rule.py +22 -22
  75. pulumi_gcp/compute/interconnect.py +4 -4
  76. pulumi_gcp/compute/outputs.py +176 -5
  77. pulumi_gcp/compute/packet_mirroring.py +2 -2
  78. pulumi_gcp/compute/project_cloud_armor_tier.py +2 -2
  79. pulumi_gcp/compute/region_backend_service.py +35 -48
  80. pulumi_gcp/compute/region_disk.py +3 -9
  81. pulumi_gcp/compute/region_network_endpoint.py +187 -0
  82. pulumi_gcp/compute/region_network_endpoint_group.py +49 -9
  83. pulumi_gcp/compute/region_security_policy_rule.py +2 -2
  84. pulumi_gcp/compute/region_target_https_proxy.py +7 -14
  85. pulumi_gcp/compute/route.py +2 -2
  86. pulumi_gcp/compute/subnetwork.py +2 -6
  87. pulumi_gcp/compute/target_https_proxy.py +28 -14
  88. pulumi_gcp/compute/target_instance.py +2 -2
  89. pulumi_gcp/compute/vpn_gateway.py +2 -2
  90. pulumi_gcp/compute/vpn_tunnel.py +2 -2
  91. pulumi_gcp/config/__init__.pyi +2 -0
  92. pulumi_gcp/config/vars.py +4 -0
  93. pulumi_gcp/container/_inputs.py +4 -8
  94. pulumi_gcp/container/outputs.py +6 -10
  95. pulumi_gcp/databasemigrationservice/connection_profile.py +16 -16
  96. pulumi_gcp/datacatalog/policy_tag.py +2 -2
  97. pulumi_gcp/datafusion/instance.py +4 -8
  98. pulumi_gcp/dataplex/asset.py +2 -2
  99. pulumi_gcp/dataplex/datascan.py +2 -2
  100. pulumi_gcp/dataproc/_inputs.py +100 -0
  101. pulumi_gcp/dataproc/metastore_service.py +172 -0
  102. pulumi_gcp/dataproc/outputs.py +192 -1
  103. pulumi_gcp/dataproc/workflow_template.py +3 -9
  104. pulumi_gcp/datastore/data_store_index.py +2 -2
  105. pulumi_gcp/datastream/stream.py +6 -6
  106. pulumi_gcp/diagflow/entity_type.py +2 -2
  107. pulumi_gcp/diagflow/fulfillment.py +2 -2
  108. pulumi_gcp/diagflow/intent.py +4 -4
  109. pulumi_gcp/discoveryengine/_inputs.py +227 -0
  110. pulumi_gcp/discoveryengine/data_store.py +108 -0
  111. pulumi_gcp/discoveryengine/outputs.py +280 -0
  112. pulumi_gcp/edgecontainer/_inputs.py +107 -1
  113. pulumi_gcp/edgecontainer/node_pool.py +2 -2
  114. pulumi_gcp/edgecontainer/outputs.py +123 -1
  115. pulumi_gcp/edgecontainer/vpn_connection.py +2 -2
  116. pulumi_gcp/eventarc/channel.py +2 -2
  117. pulumi_gcp/eventarc/google_channel_config.py +2 -2
  118. pulumi_gcp/filestore/instance.py +3 -9
  119. pulumi_gcp/firebase/app_check_app_attest_config.py +8 -8
  120. pulumi_gcp/firebase/app_check_debug_token.py +4 -4
  121. pulumi_gcp/firebase/app_check_device_check_config.py +4 -4
  122. pulumi_gcp/firebase/app_check_play_integrity_config.py +8 -8
  123. pulumi_gcp/firebase/app_check_recaptcha_enterprise_config.py +4 -4
  124. pulumi_gcp/firebase/app_check_recaptcha_v3_config.py +4 -4
  125. pulumi_gcp/firebase/app_check_service_config.py +6 -6
  126. pulumi_gcp/firebase/database_instance.py +2 -2
  127. pulumi_gcp/firestore/database.py +4 -4
  128. pulumi_gcp/firestore/document.py +12 -12
  129. pulumi_gcp/folder/access_approval_settings.py +2 -2
  130. pulumi_gcp/gkehub/_inputs.py +20 -8
  131. pulumi_gcp/gkehub/membership.py +3 -9
  132. pulumi_gcp/gkehub/membership_binding.py +4 -4
  133. pulumi_gcp/gkehub/membership_rbac_role_binding.py +4 -4
  134. pulumi_gcp/gkehub/namespace.py +2 -2
  135. pulumi_gcp/gkehub/outputs.py +19 -9
  136. pulumi_gcp/gkehub/scope_rbac_role_binding.py +2 -2
  137. pulumi_gcp/healthcare/fhir_store.py +3 -9
  138. pulumi_gcp/healthcare/hl7_store.py +3 -9
  139. pulumi_gcp/integrationconnectors/connection.py +2 -2
  140. pulumi_gcp/integrationconnectors/managed_zone.py +6 -6
  141. pulumi_gcp/kms/_inputs.py +1 -3
  142. pulumi_gcp/kms/autokey_config.py +16 -16
  143. pulumi_gcp/kms/key_handle.py +22 -22
  144. pulumi_gcp/kms/outputs.py +1 -3
  145. pulumi_gcp/logging/folder_settings.py +2 -2
  146. pulumi_gcp/logging/folder_sink.py +14 -14
  147. pulumi_gcp/logging/linked_dataset.py +2 -2
  148. pulumi_gcp/logging/organization_settings.py +2 -2
  149. pulumi_gcp/logging/organization_sink.py +14 -14
  150. pulumi_gcp/logging/project_bucket_config.py +2 -2
  151. pulumi_gcp/looker/instance.py +2 -2
  152. pulumi_gcp/managedkafka/__init__.py +11 -0
  153. pulumi_gcp/managedkafka/_inputs.py +169 -0
  154. pulumi_gcp/managedkafka/cluster.py +807 -0
  155. pulumi_gcp/managedkafka/outputs.py +197 -0
  156. pulumi_gcp/managedkafka/topic.py +599 -0
  157. pulumi_gcp/netapp/__init__.py +1 -0
  158. pulumi_gcp/netapp/active_directory.py +55 -0
  159. pulumi_gcp/netapp/backup.py +903 -0
  160. pulumi_gcp/netapp/volume_replication.py +2 -2
  161. pulumi_gcp/netapp/volume_snapshot.py +2 -2
  162. pulumi_gcp/networkconnectivity/internal_range.py +2 -2
  163. pulumi_gcp/networksecurity/gateway_security_policy.py +4 -4
  164. pulumi_gcp/networksecurity/tls_inspection_policy.py +4 -4
  165. pulumi_gcp/networkservices/gateway.py +6 -6
  166. pulumi_gcp/organizations/access_approval_settings.py +2 -2
  167. pulumi_gcp/parallelstore/instance.py +2 -2
  168. pulumi_gcp/projects/access_approval_settings.py +5 -11
  169. pulumi_gcp/provider.py +20 -0
  170. pulumi_gcp/pubsub/_inputs.py +40 -0
  171. pulumi_gcp/pubsub/outputs.py +66 -0
  172. pulumi_gcp/pubsub/schema.py +2 -2
  173. pulumi_gcp/pubsub/subscription.py +174 -8
  174. pulumi_gcp/pubsub/topic.py +2 -2
  175. pulumi_gcp/pulumi-plugin.json +1 -1
  176. pulumi_gcp/redis/cluster.py +4 -4
  177. pulumi_gcp/redis/get_instance.py +11 -1
  178. pulumi_gcp/redis/instance.py +49 -2
  179. pulumi_gcp/secretmanager/secret.py +2 -2
  180. pulumi_gcp/securesourcemanager/instance.py +6 -6
  181. pulumi_gcp/securitycenter/__init__.py +3 -0
  182. pulumi_gcp/securitycenter/_inputs.py +1105 -0
  183. pulumi_gcp/securitycenter/instance_iam_binding.py +2 -2
  184. pulumi_gcp/securitycenter/instance_iam_member.py +2 -2
  185. pulumi_gcp/securitycenter/instance_iam_policy.py +2 -2
  186. pulumi_gcp/securitycenter/management_folder_security_health_analytics_custom_module.py +725 -0
  187. pulumi_gcp/securitycenter/management_organization_security_health_analytics_custom_module.py +713 -0
  188. pulumi_gcp/securitycenter/management_project_security_health_analytics_custom_module.py +706 -0
  189. pulumi_gcp/securitycenter/outputs.py +1048 -0
  190. pulumi_gcp/servicenetworking/__init__.py +1 -0
  191. pulumi_gcp/servicenetworking/vpc_service_controls.py +511 -0
  192. pulumi_gcp/sql/_inputs.py +1 -3
  193. pulumi_gcp/sql/database_instance.py +2 -2
  194. pulumi_gcp/sql/outputs.py +1 -3
  195. pulumi_gcp/sql/user.py +21 -7
  196. pulumi_gcp/storage/get_project_service_account.py +2 -2
  197. pulumi_gcp/storage/insights_report_config.py +2 -2
  198. pulumi_gcp/storage/notification.py +2 -2
  199. pulumi_gcp/storage/transfer_agent_pool.py +2 -2
  200. pulumi_gcp/storage/transfer_job.py +4 -4
  201. pulumi_gcp/tpu/v2_vm.py +4 -4
  202. pulumi_gcp/vertex/_inputs.py +1 -3
  203. pulumi_gcp/vertex/ai_endpoint.py +2 -2
  204. pulumi_gcp/vertex/ai_feature_online_store.py +31 -8
  205. pulumi_gcp/vertex/ai_index_endpoint.py +2 -2
  206. pulumi_gcp/vertex/ai_tensorboard.py +2 -2
  207. pulumi_gcp/vertex/outputs.py +1 -3
  208. pulumi_gcp/vmwareengine/external_address.py +2 -2
  209. pulumi_gcp/vmwareengine/network.py +4 -4
  210. pulumi_gcp/vpcaccess/connector.py +2 -8
  211. {pulumi_gcp-7.28.0a1718950249.dist-info → pulumi_gcp-7.29.0.dist-info}/METADATA +1 -1
  212. {pulumi_gcp-7.28.0a1718950249.dist-info → pulumi_gcp-7.29.0.dist-info}/RECORD +214 -200
  213. {pulumi_gcp-7.28.0a1718950249.dist-info → pulumi_gcp-7.29.0.dist-info}/WHEEL +1 -1
  214. {pulumi_gcp-7.28.0a1718950249.dist-info → pulumi_gcp-7.29.0.dist-info}/top_level.txt +0 -0
@@ -11,6 +11,13 @@ from .. import _utilities
11
11
  from . import outputs
12
12
 
13
13
  __all__ = [
14
+ 'ConnectionBitbucketCloudConfig',
15
+ 'ConnectionBitbucketCloudConfigAuthorizerCredential',
16
+ 'ConnectionBitbucketCloudConfigReadAuthorizerCredential',
17
+ 'ConnectionBitbucketDataCenterConfig',
18
+ 'ConnectionBitbucketDataCenterConfigAuthorizerCredential',
19
+ 'ConnectionBitbucketDataCenterConfigReadAuthorizerCredential',
20
+ 'ConnectionBitbucketDataCenterConfigServiceDirectoryConfig',
14
21
  'ConnectionGithubConfig',
15
22
  'ConnectionGithubConfigAuthorizerCredential',
16
23
  'ConnectionGithubEnterpriseConfig',
@@ -24,6 +31,420 @@ __all__ = [
24
31
  'ConnectionInstallationState',
25
32
  ]
26
33
 
34
+ @pulumi.output_type
35
+ class ConnectionBitbucketCloudConfig(dict):
36
+ @staticmethod
37
+ def __key_warning(key: str):
38
+ suggest = None
39
+ if key == "authorizerCredential":
40
+ suggest = "authorizer_credential"
41
+ elif key == "readAuthorizerCredential":
42
+ suggest = "read_authorizer_credential"
43
+ elif key == "webhookSecretSecretVersion":
44
+ suggest = "webhook_secret_secret_version"
45
+
46
+ if suggest:
47
+ pulumi.log.warn(f"Key '{key}' not found in ConnectionBitbucketCloudConfig. Access the value via the '{suggest}' property getter instead.")
48
+
49
+ def __getitem__(self, key: str) -> Any:
50
+ ConnectionBitbucketCloudConfig.__key_warning(key)
51
+ return super().__getitem__(key)
52
+
53
+ def get(self, key: str, default = None) -> Any:
54
+ ConnectionBitbucketCloudConfig.__key_warning(key)
55
+ return super().get(key, default)
56
+
57
+ def __init__(__self__, *,
58
+ authorizer_credential: 'outputs.ConnectionBitbucketCloudConfigAuthorizerCredential',
59
+ read_authorizer_credential: 'outputs.ConnectionBitbucketCloudConfigReadAuthorizerCredential',
60
+ webhook_secret_secret_version: str,
61
+ workspace: str):
62
+ """
63
+ :param 'ConnectionBitbucketCloudConfigAuthorizerCredentialArgs' authorizer_credential: Required. An access token with the `webhook`, `repository`, `repository:admin` and `pullrequest` scope access. It can be either a workspace, project or repository access token. It's recommended to use a system account to generate these credentials.
64
+ Structure is documented below.
65
+ :param 'ConnectionBitbucketCloudConfigReadAuthorizerCredentialArgs' read_authorizer_credential: Required. An access token with the `repository` access. It can be either a workspace, project or repository access token. It's recommended to use a system account to generate the credentials.
66
+ Structure is documented below.
67
+ :param str webhook_secret_secret_version: Required. Immutable. SecretManager resource containing the webhook secret used to verify webhook events, formatted as `projects/*/secrets/*/versions/*`.
68
+ :param str workspace: The Bitbucket Cloud Workspace ID to be connected to Google Cloud Platform.
69
+ """
70
+ pulumi.set(__self__, "authorizer_credential", authorizer_credential)
71
+ pulumi.set(__self__, "read_authorizer_credential", read_authorizer_credential)
72
+ pulumi.set(__self__, "webhook_secret_secret_version", webhook_secret_secret_version)
73
+ pulumi.set(__self__, "workspace", workspace)
74
+
75
+ @property
76
+ @pulumi.getter(name="authorizerCredential")
77
+ def authorizer_credential(self) -> 'outputs.ConnectionBitbucketCloudConfigAuthorizerCredential':
78
+ """
79
+ Required. An access token with the `webhook`, `repository`, `repository:admin` and `pullrequest` scope access. It can be either a workspace, project or repository access token. It's recommended to use a system account to generate these credentials.
80
+ Structure is documented below.
81
+ """
82
+ return pulumi.get(self, "authorizer_credential")
83
+
84
+ @property
85
+ @pulumi.getter(name="readAuthorizerCredential")
86
+ def read_authorizer_credential(self) -> 'outputs.ConnectionBitbucketCloudConfigReadAuthorizerCredential':
87
+ """
88
+ Required. An access token with the `repository` access. It can be either a workspace, project or repository access token. It's recommended to use a system account to generate the credentials.
89
+ Structure is documented below.
90
+ """
91
+ return pulumi.get(self, "read_authorizer_credential")
92
+
93
+ @property
94
+ @pulumi.getter(name="webhookSecretSecretVersion")
95
+ def webhook_secret_secret_version(self) -> str:
96
+ """
97
+ Required. Immutable. SecretManager resource containing the webhook secret used to verify webhook events, formatted as `projects/*/secrets/*/versions/*`.
98
+ """
99
+ return pulumi.get(self, "webhook_secret_secret_version")
100
+
101
+ @property
102
+ @pulumi.getter
103
+ def workspace(self) -> str:
104
+ """
105
+ The Bitbucket Cloud Workspace ID to be connected to Google Cloud Platform.
106
+ """
107
+ return pulumi.get(self, "workspace")
108
+
109
+
110
+ @pulumi.output_type
111
+ class ConnectionBitbucketCloudConfigAuthorizerCredential(dict):
112
+ @staticmethod
113
+ def __key_warning(key: str):
114
+ suggest = None
115
+ if key == "userTokenSecretVersion":
116
+ suggest = "user_token_secret_version"
117
+
118
+ if suggest:
119
+ pulumi.log.warn(f"Key '{key}' not found in ConnectionBitbucketCloudConfigAuthorizerCredential. Access the value via the '{suggest}' property getter instead.")
120
+
121
+ def __getitem__(self, key: str) -> Any:
122
+ ConnectionBitbucketCloudConfigAuthorizerCredential.__key_warning(key)
123
+ return super().__getitem__(key)
124
+
125
+ def get(self, key: str, default = None) -> Any:
126
+ ConnectionBitbucketCloudConfigAuthorizerCredential.__key_warning(key)
127
+ return super().get(key, default)
128
+
129
+ def __init__(__self__, *,
130
+ user_token_secret_version: str,
131
+ username: Optional[str] = None):
132
+ """
133
+ :param str user_token_secret_version: Required. A SecretManager resource containing the user token that authorizes the Cloud Build connection. Format: `projects/*/secrets/*/versions/*`.
134
+ :param str username: (Output)
135
+ Output only. The username associated to this token.
136
+ """
137
+ pulumi.set(__self__, "user_token_secret_version", user_token_secret_version)
138
+ if username is not None:
139
+ pulumi.set(__self__, "username", username)
140
+
141
+ @property
142
+ @pulumi.getter(name="userTokenSecretVersion")
143
+ def user_token_secret_version(self) -> str:
144
+ """
145
+ Required. A SecretManager resource containing the user token that authorizes the Cloud Build connection. Format: `projects/*/secrets/*/versions/*`.
146
+ """
147
+ return pulumi.get(self, "user_token_secret_version")
148
+
149
+ @property
150
+ @pulumi.getter
151
+ def username(self) -> Optional[str]:
152
+ """
153
+ (Output)
154
+ Output only. The username associated to this token.
155
+ """
156
+ return pulumi.get(self, "username")
157
+
158
+
159
+ @pulumi.output_type
160
+ class ConnectionBitbucketCloudConfigReadAuthorizerCredential(dict):
161
+ @staticmethod
162
+ def __key_warning(key: str):
163
+ suggest = None
164
+ if key == "userTokenSecretVersion":
165
+ suggest = "user_token_secret_version"
166
+
167
+ if suggest:
168
+ pulumi.log.warn(f"Key '{key}' not found in ConnectionBitbucketCloudConfigReadAuthorizerCredential. Access the value via the '{suggest}' property getter instead.")
169
+
170
+ def __getitem__(self, key: str) -> Any:
171
+ ConnectionBitbucketCloudConfigReadAuthorizerCredential.__key_warning(key)
172
+ return super().__getitem__(key)
173
+
174
+ def get(self, key: str, default = None) -> Any:
175
+ ConnectionBitbucketCloudConfigReadAuthorizerCredential.__key_warning(key)
176
+ return super().get(key, default)
177
+
178
+ def __init__(__self__, *,
179
+ user_token_secret_version: str,
180
+ username: Optional[str] = None):
181
+ """
182
+ :param str user_token_secret_version: Required. A SecretManager resource containing the user token that authorizes the Cloud Build connection. Format: `projects/*/secrets/*/versions/*`.
183
+ :param str username: (Output)
184
+ Output only. The username associated to this token.
185
+ """
186
+ pulumi.set(__self__, "user_token_secret_version", user_token_secret_version)
187
+ if username is not None:
188
+ pulumi.set(__self__, "username", username)
189
+
190
+ @property
191
+ @pulumi.getter(name="userTokenSecretVersion")
192
+ def user_token_secret_version(self) -> str:
193
+ """
194
+ Required. A SecretManager resource containing the user token that authorizes the Cloud Build connection. Format: `projects/*/secrets/*/versions/*`.
195
+ """
196
+ return pulumi.get(self, "user_token_secret_version")
197
+
198
+ @property
199
+ @pulumi.getter
200
+ def username(self) -> Optional[str]:
201
+ """
202
+ (Output)
203
+ Output only. The username associated to this token.
204
+ """
205
+ return pulumi.get(self, "username")
206
+
207
+
208
+ @pulumi.output_type
209
+ class ConnectionBitbucketDataCenterConfig(dict):
210
+ @staticmethod
211
+ def __key_warning(key: str):
212
+ suggest = None
213
+ if key == "authorizerCredential":
214
+ suggest = "authorizer_credential"
215
+ elif key == "hostUri":
216
+ suggest = "host_uri"
217
+ elif key == "readAuthorizerCredential":
218
+ suggest = "read_authorizer_credential"
219
+ elif key == "webhookSecretSecretVersion":
220
+ suggest = "webhook_secret_secret_version"
221
+ elif key == "serverVersion":
222
+ suggest = "server_version"
223
+ elif key == "serviceDirectoryConfig":
224
+ suggest = "service_directory_config"
225
+ elif key == "sslCa":
226
+ suggest = "ssl_ca"
227
+
228
+ if suggest:
229
+ pulumi.log.warn(f"Key '{key}' not found in ConnectionBitbucketDataCenterConfig. Access the value via the '{suggest}' property getter instead.")
230
+
231
+ def __getitem__(self, key: str) -> Any:
232
+ ConnectionBitbucketDataCenterConfig.__key_warning(key)
233
+ return super().__getitem__(key)
234
+
235
+ def get(self, key: str, default = None) -> Any:
236
+ ConnectionBitbucketDataCenterConfig.__key_warning(key)
237
+ return super().get(key, default)
238
+
239
+ def __init__(__self__, *,
240
+ authorizer_credential: 'outputs.ConnectionBitbucketDataCenterConfigAuthorizerCredential',
241
+ host_uri: str,
242
+ read_authorizer_credential: 'outputs.ConnectionBitbucketDataCenterConfigReadAuthorizerCredential',
243
+ webhook_secret_secret_version: str,
244
+ server_version: Optional[str] = None,
245
+ service_directory_config: Optional['outputs.ConnectionBitbucketDataCenterConfigServiceDirectoryConfig'] = None,
246
+ ssl_ca: Optional[str] = None):
247
+ """
248
+ :param 'ConnectionBitbucketDataCenterConfigAuthorizerCredentialArgs' authorizer_credential: Required. A http access token with the `REPO_ADMIN` scope access.
249
+ Structure is documented below.
250
+ :param str host_uri: The URI of the Bitbucket Data Center host this connection is for.
251
+ :param 'ConnectionBitbucketDataCenterConfigReadAuthorizerCredentialArgs' read_authorizer_credential: Required. A http access token with the `REPO_READ` access.
252
+ Structure is documented below.
253
+ :param str webhook_secret_secret_version: Required. Immutable. SecretManager resource containing the webhook secret used to verify webhook events, formatted as `projects/*/secrets/*/versions/*`.
254
+ :param str server_version: (Output)
255
+ Output only. Version of the Bitbucket Data Center running on the `host_uri`.
256
+ :param 'ConnectionBitbucketDataCenterConfigServiceDirectoryConfigArgs' service_directory_config: Configuration for using Service Directory to privately connect to a Bitbucket Data Center. This should only be set if the Bitbucket Data Center is hosted on-premises and not reachable by public internet. If this field is left empty, calls to the Bitbucket Data Center will be made over the public internet.
257
+ Structure is documented below.
258
+ :param str ssl_ca: SSL certificate to use for requests to the Bitbucket Data Center.
259
+ """
260
+ pulumi.set(__self__, "authorizer_credential", authorizer_credential)
261
+ pulumi.set(__self__, "host_uri", host_uri)
262
+ pulumi.set(__self__, "read_authorizer_credential", read_authorizer_credential)
263
+ pulumi.set(__self__, "webhook_secret_secret_version", webhook_secret_secret_version)
264
+ if server_version is not None:
265
+ pulumi.set(__self__, "server_version", server_version)
266
+ if service_directory_config is not None:
267
+ pulumi.set(__self__, "service_directory_config", service_directory_config)
268
+ if ssl_ca is not None:
269
+ pulumi.set(__self__, "ssl_ca", ssl_ca)
270
+
271
+ @property
272
+ @pulumi.getter(name="authorizerCredential")
273
+ def authorizer_credential(self) -> 'outputs.ConnectionBitbucketDataCenterConfigAuthorizerCredential':
274
+ """
275
+ Required. A http access token with the `REPO_ADMIN` scope access.
276
+ Structure is documented below.
277
+ """
278
+ return pulumi.get(self, "authorizer_credential")
279
+
280
+ @property
281
+ @pulumi.getter(name="hostUri")
282
+ def host_uri(self) -> str:
283
+ """
284
+ The URI of the Bitbucket Data Center host this connection is for.
285
+ """
286
+ return pulumi.get(self, "host_uri")
287
+
288
+ @property
289
+ @pulumi.getter(name="readAuthorizerCredential")
290
+ def read_authorizer_credential(self) -> 'outputs.ConnectionBitbucketDataCenterConfigReadAuthorizerCredential':
291
+ """
292
+ Required. A http access token with the `REPO_READ` access.
293
+ Structure is documented below.
294
+ """
295
+ return pulumi.get(self, "read_authorizer_credential")
296
+
297
+ @property
298
+ @pulumi.getter(name="webhookSecretSecretVersion")
299
+ def webhook_secret_secret_version(self) -> str:
300
+ """
301
+ Required. Immutable. SecretManager resource containing the webhook secret used to verify webhook events, formatted as `projects/*/secrets/*/versions/*`.
302
+ """
303
+ return pulumi.get(self, "webhook_secret_secret_version")
304
+
305
+ @property
306
+ @pulumi.getter(name="serverVersion")
307
+ def server_version(self) -> Optional[str]:
308
+ """
309
+ (Output)
310
+ Output only. Version of the Bitbucket Data Center running on the `host_uri`.
311
+ """
312
+ return pulumi.get(self, "server_version")
313
+
314
+ @property
315
+ @pulumi.getter(name="serviceDirectoryConfig")
316
+ def service_directory_config(self) -> Optional['outputs.ConnectionBitbucketDataCenterConfigServiceDirectoryConfig']:
317
+ """
318
+ Configuration for using Service Directory to privately connect to a Bitbucket Data Center. This should only be set if the Bitbucket Data Center is hosted on-premises and not reachable by public internet. If this field is left empty, calls to the Bitbucket Data Center will be made over the public internet.
319
+ Structure is documented below.
320
+ """
321
+ return pulumi.get(self, "service_directory_config")
322
+
323
+ @property
324
+ @pulumi.getter(name="sslCa")
325
+ def ssl_ca(self) -> Optional[str]:
326
+ """
327
+ SSL certificate to use for requests to the Bitbucket Data Center.
328
+ """
329
+ return pulumi.get(self, "ssl_ca")
330
+
331
+
332
+ @pulumi.output_type
333
+ class ConnectionBitbucketDataCenterConfigAuthorizerCredential(dict):
334
+ @staticmethod
335
+ def __key_warning(key: str):
336
+ suggest = None
337
+ if key == "userTokenSecretVersion":
338
+ suggest = "user_token_secret_version"
339
+
340
+ if suggest:
341
+ pulumi.log.warn(f"Key '{key}' not found in ConnectionBitbucketDataCenterConfigAuthorizerCredential. Access the value via the '{suggest}' property getter instead.")
342
+
343
+ def __getitem__(self, key: str) -> Any:
344
+ ConnectionBitbucketDataCenterConfigAuthorizerCredential.__key_warning(key)
345
+ return super().__getitem__(key)
346
+
347
+ def get(self, key: str, default = None) -> Any:
348
+ ConnectionBitbucketDataCenterConfigAuthorizerCredential.__key_warning(key)
349
+ return super().get(key, default)
350
+
351
+ def __init__(__self__, *,
352
+ user_token_secret_version: str,
353
+ username: Optional[str] = None):
354
+ """
355
+ :param str user_token_secret_version: Required. A SecretManager resource containing the user token that authorizes the Cloud Build connection. Format: `projects/*/secrets/*/versions/*`.
356
+ :param str username: (Output)
357
+ Output only. The username associated to this token.
358
+ """
359
+ pulumi.set(__self__, "user_token_secret_version", user_token_secret_version)
360
+ if username is not None:
361
+ pulumi.set(__self__, "username", username)
362
+
363
+ @property
364
+ @pulumi.getter(name="userTokenSecretVersion")
365
+ def user_token_secret_version(self) -> str:
366
+ """
367
+ Required. A SecretManager resource containing the user token that authorizes the Cloud Build connection. Format: `projects/*/secrets/*/versions/*`.
368
+ """
369
+ return pulumi.get(self, "user_token_secret_version")
370
+
371
+ @property
372
+ @pulumi.getter
373
+ def username(self) -> Optional[str]:
374
+ """
375
+ (Output)
376
+ Output only. The username associated to this token.
377
+ """
378
+ return pulumi.get(self, "username")
379
+
380
+
381
+ @pulumi.output_type
382
+ class ConnectionBitbucketDataCenterConfigReadAuthorizerCredential(dict):
383
+ @staticmethod
384
+ def __key_warning(key: str):
385
+ suggest = None
386
+ if key == "userTokenSecretVersion":
387
+ suggest = "user_token_secret_version"
388
+
389
+ if suggest:
390
+ pulumi.log.warn(f"Key '{key}' not found in ConnectionBitbucketDataCenterConfigReadAuthorizerCredential. Access the value via the '{suggest}' property getter instead.")
391
+
392
+ def __getitem__(self, key: str) -> Any:
393
+ ConnectionBitbucketDataCenterConfigReadAuthorizerCredential.__key_warning(key)
394
+ return super().__getitem__(key)
395
+
396
+ def get(self, key: str, default = None) -> Any:
397
+ ConnectionBitbucketDataCenterConfigReadAuthorizerCredential.__key_warning(key)
398
+ return super().get(key, default)
399
+
400
+ def __init__(__self__, *,
401
+ user_token_secret_version: str,
402
+ username: Optional[str] = None):
403
+ """
404
+ :param str user_token_secret_version: Required. A SecretManager resource containing the user token that authorizes the Cloud Build connection. Format: `projects/*/secrets/*/versions/*`.
405
+ :param str username: (Output)
406
+ Output only. The username associated to this token.
407
+ """
408
+ pulumi.set(__self__, "user_token_secret_version", user_token_secret_version)
409
+ if username is not None:
410
+ pulumi.set(__self__, "username", username)
411
+
412
+ @property
413
+ @pulumi.getter(name="userTokenSecretVersion")
414
+ def user_token_secret_version(self) -> str:
415
+ """
416
+ Required. A SecretManager resource containing the user token that authorizes the Cloud Build connection. Format: `projects/*/secrets/*/versions/*`.
417
+ """
418
+ return pulumi.get(self, "user_token_secret_version")
419
+
420
+ @property
421
+ @pulumi.getter
422
+ def username(self) -> Optional[str]:
423
+ """
424
+ (Output)
425
+ Output only. The username associated to this token.
426
+ """
427
+ return pulumi.get(self, "username")
428
+
429
+
430
+ @pulumi.output_type
431
+ class ConnectionBitbucketDataCenterConfigServiceDirectoryConfig(dict):
432
+ def __init__(__self__, *,
433
+ service: str):
434
+ """
435
+ :param str service: Required. The Service Directory service name. Format: projects/{project}/locations/{location}/namespaces/{namespace}/services/{service}.
436
+ """
437
+ pulumi.set(__self__, "service", service)
438
+
439
+ @property
440
+ @pulumi.getter
441
+ def service(self) -> str:
442
+ """
443
+ Required. The Service Directory service name. Format: projects/{project}/locations/{location}/namespaces/{namespace}/services/{service}.
444
+ """
445
+ return pulumi.get(self, "service")
446
+
447
+
27
448
  @pulumi.output_type
28
449
  class ConnectionGithubConfig(dict):
29
450
  @staticmethod
@@ -368,7 +368,7 @@ class Repository(pulumi.CustomResource):
368
368
  app_slug="gcb-app",
369
369
  app_installation_id=300,
370
370
  ),
371
- opts=pulumi.ResourceOptions(depends_on=[
371
+ opts = pulumi.ResourceOptions(depends_on=[
372
372
  policy_pk,
373
373
  policy_whs,
374
374
  ]))
@@ -516,7 +516,7 @@ class Repository(pulumi.CustomResource):
516
516
  app_slug="gcb-app",
517
517
  app_installation_id=300,
518
518
  ),
519
- opts=pulumi.ResourceOptions(depends_on=[
519
+ opts = pulumi.ResourceOptions(depends_on=[
520
520
  policy_pk,
521
521
  policy_whs,
522
522
  ]))
@@ -684,17 +684,17 @@ class Function(pulumi.CustomResource):
684
684
  project="my-project-name",
685
685
  role="roles/run.invoker",
686
686
  member=account.email.apply(lambda email: f"serviceAccount:{email}"),
687
- opts=pulumi.ResourceOptions(depends_on=[gcs_pubsub_publishing]))
687
+ opts = pulumi.ResourceOptions(depends_on=[gcs_pubsub_publishing]))
688
688
  event_receiving = gcp.projects.IAMMember("event-receiving",
689
689
  project="my-project-name",
690
690
  role="roles/eventarc.eventReceiver",
691
691
  member=account.email.apply(lambda email: f"serviceAccount:{email}"),
692
- opts=pulumi.ResourceOptions(depends_on=[invoking]))
692
+ opts = pulumi.ResourceOptions(depends_on=[invoking]))
693
693
  artifactregistry_reader = gcp.projects.IAMMember("artifactregistry-reader",
694
694
  project="my-project-name",
695
695
  role="roles/artifactregistry.reader",
696
696
  member=account.email.apply(lambda email: f"serviceAccount:{email}"),
697
- opts=pulumi.ResourceOptions(depends_on=[event_receiving]))
697
+ opts = pulumi.ResourceOptions(depends_on=[event_receiving]))
698
698
  function = gcp.cloudfunctionsv2.Function("function",
699
699
  name="gcf-function",
700
700
  location="us-central1",
@@ -733,7 +733,7 @@ class Function(pulumi.CustomResource):
733
733
  value=trigger_bucket.name,
734
734
  )],
735
735
  ),
736
- opts=pulumi.ResourceOptions(depends_on=[
736
+ opts = pulumi.ResourceOptions(depends_on=[
737
737
  event_receiving,
738
738
  artifactregistry_reader,
739
739
  ]))
@@ -775,12 +775,12 @@ class Function(pulumi.CustomResource):
775
775
  project="my-project-name",
776
776
  role="roles/eventarc.eventReceiver",
777
777
  member=account.email.apply(lambda email: f"serviceAccount:{email}"),
778
- opts=pulumi.ResourceOptions(depends_on=[invoking]))
778
+ opts = pulumi.ResourceOptions(depends_on=[invoking]))
779
779
  artifactregistry_reader = gcp.projects.IAMMember("artifactregistry-reader",
780
780
  project="my-project-name",
781
781
  role="roles/artifactregistry.reader",
782
782
  member=account.email.apply(lambda email: f"serviceAccount:{email}"),
783
- opts=pulumi.ResourceOptions(depends_on=[event_receiving]))
783
+ opts = pulumi.ResourceOptions(depends_on=[event_receiving]))
784
784
  function = gcp.cloudfunctionsv2.Function("function",
785
785
  name="gcf-function",
786
786
  location="us-central1",
@@ -831,7 +831,7 @@ class Function(pulumi.CustomResource):
831
831
  ),
832
832
  ],
833
833
  ),
834
- opts=pulumi.ResourceOptions(depends_on=[
834
+ opts = pulumi.ResourceOptions(depends_on=[
835
835
  event_receiving,
836
836
  artifactregistry_reader,
837
837
  ]))
@@ -869,7 +869,7 @@ class Function(pulumi.CustomResource):
869
869
  source=pulumi.FileAsset("function-source.zip"))
870
870
  # builder permissions need to stablize before it can pull the source zip
871
871
  wait60s = time.index.Sleep("wait_60s", create_duration=60s,
872
- opts=pulumi.ResourceOptions(depends_on=[
872
+ opts = pulumi.ResourceOptions(depends_on=[
873
873
  log_writer,
874
874
  artifact_registry_writer,
875
875
  storage_object_admin,
@@ -894,7 +894,7 @@ class Function(pulumi.CustomResource):
894
894
  available_memory="256M",
895
895
  timeout_seconds=60,
896
896
  ),
897
- opts=pulumi.ResourceOptions(depends_on=[wait60s]))
897
+ opts = pulumi.ResourceOptions(depends_on=[wait60s]))
898
898
  ```
899
899
  ### Cloudfunctions2 Secret Env
900
900
 
@@ -949,7 +949,7 @@ class Function(pulumi.CustomResource):
949
949
  version="latest",
950
950
  )],
951
951
  ),
952
- opts=pulumi.ResourceOptions(depends_on=[secret_secret_version]))
952
+ opts = pulumi.ResourceOptions(depends_on=[secret_secret_version]))
953
953
  ```
954
954
  ### Cloudfunctions2 Secret Volume
955
955
 
@@ -1003,7 +1003,7 @@ class Function(pulumi.CustomResource):
1003
1003
  secret=secret.secret_id,
1004
1004
  )],
1005
1005
  ),
1006
- opts=pulumi.ResourceOptions(depends_on=[secret_secret_version]))
1006
+ opts = pulumi.ResourceOptions(depends_on=[secret_secret_version]))
1007
1007
  ```
1008
1008
  ### Cloudfunctions2 Private Workerpool
1009
1009
 
@@ -1082,13 +1082,13 @@ class Function(pulumi.CustomResource):
1082
1082
  f"serviceAccount:service-{project_get_project.number}@serverless-robot-prod.iam.gserviceaccount.com",
1083
1083
  ea_sa.email.apply(lambda email: f"serviceAccount:{email}"),
1084
1084
  ],
1085
- opts=pulumi.ResourceOptions(depends_on=[ea_sa]))
1085
+ opts = pulumi.ResourceOptions(depends_on=[ea_sa]))
1086
1086
  encoded_ar_repo = gcp.artifactregistry.Repository("encoded-ar-repo",
1087
1087
  location="us-central1",
1088
1088
  repository_id="cmek-repo",
1089
1089
  format="DOCKER",
1090
1090
  kms_key_name="cmek-key",
1091
- opts=pulumi.ResourceOptions(depends_on=[gcf_cmek_keyuser]))
1091
+ opts = pulumi.ResourceOptions(depends_on=[gcf_cmek_keyuser]))
1092
1092
  binding = gcp.artifactregistry.RepositoryIamBinding("binding",
1093
1093
  location=encoded_ar_repo.location,
1094
1094
  repository=encoded_ar_repo.name,
@@ -1115,7 +1115,7 @@ class Function(pulumi.CustomResource):
1115
1115
  available_memory="256M",
1116
1116
  timeout_seconds=60,
1117
1117
  ),
1118
- opts=pulumi.ResourceOptions(depends_on=[gcf_cmek_keyuser]))
1118
+ opts = pulumi.ResourceOptions(depends_on=[gcf_cmek_keyuser]))
1119
1119
  ```
1120
1120
 
1121
1121
  ## Import
@@ -1373,17 +1373,17 @@ class Function(pulumi.CustomResource):
1373
1373
  project="my-project-name",
1374
1374
  role="roles/run.invoker",
1375
1375
  member=account.email.apply(lambda email: f"serviceAccount:{email}"),
1376
- opts=pulumi.ResourceOptions(depends_on=[gcs_pubsub_publishing]))
1376
+ opts = pulumi.ResourceOptions(depends_on=[gcs_pubsub_publishing]))
1377
1377
  event_receiving = gcp.projects.IAMMember("event-receiving",
1378
1378
  project="my-project-name",
1379
1379
  role="roles/eventarc.eventReceiver",
1380
1380
  member=account.email.apply(lambda email: f"serviceAccount:{email}"),
1381
- opts=pulumi.ResourceOptions(depends_on=[invoking]))
1381
+ opts = pulumi.ResourceOptions(depends_on=[invoking]))
1382
1382
  artifactregistry_reader = gcp.projects.IAMMember("artifactregistry-reader",
1383
1383
  project="my-project-name",
1384
1384
  role="roles/artifactregistry.reader",
1385
1385
  member=account.email.apply(lambda email: f"serviceAccount:{email}"),
1386
- opts=pulumi.ResourceOptions(depends_on=[event_receiving]))
1386
+ opts = pulumi.ResourceOptions(depends_on=[event_receiving]))
1387
1387
  function = gcp.cloudfunctionsv2.Function("function",
1388
1388
  name="gcf-function",
1389
1389
  location="us-central1",
@@ -1422,7 +1422,7 @@ class Function(pulumi.CustomResource):
1422
1422
  value=trigger_bucket.name,
1423
1423
  )],
1424
1424
  ),
1425
- opts=pulumi.ResourceOptions(depends_on=[
1425
+ opts = pulumi.ResourceOptions(depends_on=[
1426
1426
  event_receiving,
1427
1427
  artifactregistry_reader,
1428
1428
  ]))
@@ -1464,12 +1464,12 @@ class Function(pulumi.CustomResource):
1464
1464
  project="my-project-name",
1465
1465
  role="roles/eventarc.eventReceiver",
1466
1466
  member=account.email.apply(lambda email: f"serviceAccount:{email}"),
1467
- opts=pulumi.ResourceOptions(depends_on=[invoking]))
1467
+ opts = pulumi.ResourceOptions(depends_on=[invoking]))
1468
1468
  artifactregistry_reader = gcp.projects.IAMMember("artifactregistry-reader",
1469
1469
  project="my-project-name",
1470
1470
  role="roles/artifactregistry.reader",
1471
1471
  member=account.email.apply(lambda email: f"serviceAccount:{email}"),
1472
- opts=pulumi.ResourceOptions(depends_on=[event_receiving]))
1472
+ opts = pulumi.ResourceOptions(depends_on=[event_receiving]))
1473
1473
  function = gcp.cloudfunctionsv2.Function("function",
1474
1474
  name="gcf-function",
1475
1475
  location="us-central1",
@@ -1520,7 +1520,7 @@ class Function(pulumi.CustomResource):
1520
1520
  ),
1521
1521
  ],
1522
1522
  ),
1523
- opts=pulumi.ResourceOptions(depends_on=[
1523
+ opts = pulumi.ResourceOptions(depends_on=[
1524
1524
  event_receiving,
1525
1525
  artifactregistry_reader,
1526
1526
  ]))
@@ -1558,7 +1558,7 @@ class Function(pulumi.CustomResource):
1558
1558
  source=pulumi.FileAsset("function-source.zip"))
1559
1559
  # builder permissions need to stablize before it can pull the source zip
1560
1560
  wait60s = time.index.Sleep("wait_60s", create_duration=60s,
1561
- opts=pulumi.ResourceOptions(depends_on=[
1561
+ opts = pulumi.ResourceOptions(depends_on=[
1562
1562
  log_writer,
1563
1563
  artifact_registry_writer,
1564
1564
  storage_object_admin,
@@ -1583,7 +1583,7 @@ class Function(pulumi.CustomResource):
1583
1583
  available_memory="256M",
1584
1584
  timeout_seconds=60,
1585
1585
  ),
1586
- opts=pulumi.ResourceOptions(depends_on=[wait60s]))
1586
+ opts = pulumi.ResourceOptions(depends_on=[wait60s]))
1587
1587
  ```
1588
1588
  ### Cloudfunctions2 Secret Env
1589
1589
 
@@ -1638,7 +1638,7 @@ class Function(pulumi.CustomResource):
1638
1638
  version="latest",
1639
1639
  )],
1640
1640
  ),
1641
- opts=pulumi.ResourceOptions(depends_on=[secret_secret_version]))
1641
+ opts = pulumi.ResourceOptions(depends_on=[secret_secret_version]))
1642
1642
  ```
1643
1643
  ### Cloudfunctions2 Secret Volume
1644
1644
 
@@ -1692,7 +1692,7 @@ class Function(pulumi.CustomResource):
1692
1692
  secret=secret.secret_id,
1693
1693
  )],
1694
1694
  ),
1695
- opts=pulumi.ResourceOptions(depends_on=[secret_secret_version]))
1695
+ opts = pulumi.ResourceOptions(depends_on=[secret_secret_version]))
1696
1696
  ```
1697
1697
  ### Cloudfunctions2 Private Workerpool
1698
1698
 
@@ -1771,13 +1771,13 @@ class Function(pulumi.CustomResource):
1771
1771
  f"serviceAccount:service-{project_get_project.number}@serverless-robot-prod.iam.gserviceaccount.com",
1772
1772
  ea_sa.email.apply(lambda email: f"serviceAccount:{email}"),
1773
1773
  ],
1774
- opts=pulumi.ResourceOptions(depends_on=[ea_sa]))
1774
+ opts = pulumi.ResourceOptions(depends_on=[ea_sa]))
1775
1775
  encoded_ar_repo = gcp.artifactregistry.Repository("encoded-ar-repo",
1776
1776
  location="us-central1",
1777
1777
  repository_id="cmek-repo",
1778
1778
  format="DOCKER",
1779
1779
  kms_key_name="cmek-key",
1780
- opts=pulumi.ResourceOptions(depends_on=[gcf_cmek_keyuser]))
1780
+ opts = pulumi.ResourceOptions(depends_on=[gcf_cmek_keyuser]))
1781
1781
  binding = gcp.artifactregistry.RepositoryIamBinding("binding",
1782
1782
  location=encoded_ar_repo.location,
1783
1783
  repository=encoded_ar_repo.name,
@@ -1804,7 +1804,7 @@ class Function(pulumi.CustomResource):
1804
1804
  available_memory="256M",
1805
1805
  timeout_seconds=60,
1806
1806
  ),
1807
- opts=pulumi.ResourceOptions(depends_on=[gcf_cmek_keyuser]))
1807
+ opts = pulumi.ResourceOptions(depends_on=[gcf_cmek_keyuser]))
1808
1808
  ```
1809
1809
 
1810
1810
  ## Import