pulumi-gcp 7.30.0__py3-none-any.whl → 7.30.0a1719470057__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +0 -32
- pulumi_gcp/_inputs.py +0 -15
- pulumi_gcp/accessapproval/get_folder_service_account.py +0 -5
- pulumi_gcp/accessapproval/get_organization_service_account.py +0 -5
- pulumi_gcp/accessapproval/get_project_service_account.py +0 -5
- pulumi_gcp/accesscontextmanager/_inputs.py +12 -2072
- pulumi_gcp/accesscontextmanager/access_level.py +32 -37
- pulumi_gcp/accesscontextmanager/access_level_condition.py +48 -53
- pulumi_gcp/accesscontextmanager/access_levels.py +65 -70
- pulumi_gcp/accesscontextmanager/access_policy.py +0 -5
- pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +19 -24
- pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +19 -24
- pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +16 -21
- pulumi_gcp/accesscontextmanager/authorized_orgs_desc.py +0 -5
- pulumi_gcp/accesscontextmanager/egress_policy.py +0 -5
- pulumi_gcp/accesscontextmanager/gcp_user_access_binding.py +28 -33
- pulumi_gcp/accesscontextmanager/get_access_policy_iam_policy.py +0 -5
- pulumi_gcp/accesscontextmanager/ingress_policy.py +0 -5
- pulumi_gcp/accesscontextmanager/outputs.py +0 -5
- pulumi_gcp/accesscontextmanager/service_perimeter.py +196 -201
- pulumi_gcp/accesscontextmanager/service_perimeter_dry_run_resource.py +6 -11
- pulumi_gcp/accesscontextmanager/service_perimeter_egress_policy.py +10 -15
- pulumi_gcp/accesscontextmanager/service_perimeter_ingress_policy.py +10 -15
- pulumi_gcp/accesscontextmanager/service_perimeter_resource.py +6 -11
- pulumi_gcp/accesscontextmanager/service_perimeters.py +55 -60
- pulumi_gcp/activedirectory/domain.py +0 -5
- pulumi_gcp/activedirectory/domain_trust.py +0 -5
- pulumi_gcp/activedirectory/peering.py +0 -5
- pulumi_gcp/alloydb/_inputs.py +0 -535
- pulumi_gcp/alloydb/backup.py +21 -26
- pulumi_gcp/alloydb/cluster.py +172 -177
- pulumi_gcp/alloydb/get_locations.py +0 -5
- pulumi_gcp/alloydb/get_supported_database_flags.py +0 -5
- pulumi_gcp/alloydb/instance.py +72 -77
- pulumi_gcp/alloydb/outputs.py +0 -5
- pulumi_gcp/alloydb/user.py +12 -17
- pulumi_gcp/apigateway/_inputs.py +0 -168
- pulumi_gcp/apigateway/api.py +0 -5
- pulumi_gcp/apigateway/api_config.py +20 -25
- pulumi_gcp/apigateway/api_config_iam_binding.py +19 -24
- pulumi_gcp/apigateway/api_config_iam_member.py +19 -24
- pulumi_gcp/apigateway/api_config_iam_policy.py +16 -21
- pulumi_gcp/apigateway/api_iam_binding.py +19 -24
- pulumi_gcp/apigateway/api_iam_member.py +19 -24
- pulumi_gcp/apigateway/api_iam_policy.py +16 -21
- pulumi_gcp/apigateway/gateway.py +0 -5
- pulumi_gcp/apigateway/gateway_iam_binding.py +19 -24
- pulumi_gcp/apigateway/gateway_iam_member.py +19 -24
- pulumi_gcp/apigateway/gateway_iam_policy.py +16 -21
- pulumi_gcp/apigateway/get_api_config_iam_policy.py +0 -5
- pulumi_gcp/apigateway/get_api_iam_policy.py +0 -5
- pulumi_gcp/apigateway/get_gateway_iam_policy.py +0 -5
- pulumi_gcp/apigateway/outputs.py +0 -5
- pulumi_gcp/apigee/_inputs.py +0 -508
- pulumi_gcp/apigee/addons_config.py +55 -60
- pulumi_gcp/apigee/endpoint_attachment.py +0 -5
- pulumi_gcp/apigee/env_group.py +0 -5
- pulumi_gcp/apigee/env_group_attachment.py +0 -5
- pulumi_gcp/apigee/env_keystore.py +0 -5
- pulumi_gcp/apigee/env_references.py +0 -5
- pulumi_gcp/apigee/environment.py +5 -10
- pulumi_gcp/apigee/environment_iam_binding.py +19 -24
- pulumi_gcp/apigee/environment_iam_member.py +19 -24
- pulumi_gcp/apigee/environment_iam_policy.py +16 -21
- pulumi_gcp/apigee/flowhook.py +0 -5
- pulumi_gcp/apigee/get_environment_iam_policy.py +0 -5
- pulumi_gcp/apigee/instance.py +0 -5
- pulumi_gcp/apigee/instance_attachment.py +0 -5
- pulumi_gcp/apigee/keystores_aliases_key_cert_file.py +5 -10
- pulumi_gcp/apigee/keystores_aliases_pkcs12.py +2 -7
- pulumi_gcp/apigee/keystores_aliases_self_signed_cert.py +26 -31
- pulumi_gcp/apigee/nat_address.py +0 -5
- pulumi_gcp/apigee/organization.py +5 -10
- pulumi_gcp/apigee/outputs.py +0 -5
- pulumi_gcp/apigee/sharedflow.py +2 -7
- pulumi_gcp/apigee/sharedflow_deployment.py +0 -5
- pulumi_gcp/apigee/sync_authorization.py +0 -5
- pulumi_gcp/apigee/target_server.py +5 -10
- pulumi_gcp/appengine/_inputs.py +8 -991
- pulumi_gcp/appengine/application.py +12 -17
- pulumi_gcp/appengine/application_url_dispatch_rules.py +41 -46
- pulumi_gcp/appengine/domain_mapping.py +13 -18
- pulumi_gcp/appengine/engine_split_traffic.py +45 -50
- pulumi_gcp/appengine/firewall_rule.py +0 -5
- pulumi_gcp/appengine/flexible_app_version.py +125 -130
- pulumi_gcp/appengine/get_default_service_account.py +0 -5
- pulumi_gcp/appengine/outputs.py +0 -5
- pulumi_gcp/appengine/service_network_settings.py +27 -32
- pulumi_gcp/appengine/standard_app_version.py +104 -109
- pulumi_gcp/apphub/_inputs.py +0 -370
- pulumi_gcp/apphub/application.py +62 -67
- pulumi_gcp/apphub/get_application.py +0 -5
- pulumi_gcp/apphub/get_discovered_service.py +0 -5
- pulumi_gcp/apphub/get_discovered_workload.py +0 -5
- pulumi_gcp/apphub/outputs.py +0 -5
- pulumi_gcp/apphub/service.py +73 -78
- pulumi_gcp/apphub/service_project_attachment.py +0 -5
- pulumi_gcp/apphub/workload.py +9 -14
- pulumi_gcp/applicationintegration/_inputs.py +0 -324
- pulumi_gcp/applicationintegration/auth_config.py +24 -29
- pulumi_gcp/applicationintegration/client.py +19 -24
- pulumi_gcp/applicationintegration/outputs.py +0 -5
- pulumi_gcp/artifactregistry/_inputs.py +0 -392
- pulumi_gcp/artifactregistry/get_docker_image.py +2 -7
- pulumi_gcp/artifactregistry/get_repository.py +0 -5
- pulumi_gcp/artifactregistry/get_repository_iam_policy.py +0 -5
- pulumi_gcp/artifactregistry/outputs.py +0 -5
- pulumi_gcp/artifactregistry/repository.py +333 -338
- pulumi_gcp/artifactregistry/repository_iam_binding.py +19 -24
- pulumi_gcp/artifactregistry/repository_iam_member.py +19 -24
- pulumi_gcp/artifactregistry/repository_iam_policy.py +16 -21
- pulumi_gcp/artifactregistry/vpcsc_config.py +0 -5
- pulumi_gcp/assuredworkloads/_inputs.py +0 -117
- pulumi_gcp/assuredworkloads/outputs.py +0 -5
- pulumi_gcp/assuredworkloads/workload.py +81 -86
- pulumi_gcp/backupdisasterrecovery/_inputs.py +0 -41
- pulumi_gcp/backupdisasterrecovery/get_management_server.py +0 -5
- pulumi_gcp/backupdisasterrecovery/management_server.py +15 -20
- pulumi_gcp/backupdisasterrecovery/outputs.py +0 -5
- pulumi_gcp/beyondcorp/_inputs.py +0 -86
- pulumi_gcp/beyondcorp/app_connection.py +52 -57
- pulumi_gcp/beyondcorp/app_connector.py +25 -30
- pulumi_gcp/beyondcorp/app_gateway.py +2 -7
- pulumi_gcp/beyondcorp/get_app_connection.py +0 -5
- pulumi_gcp/beyondcorp/get_app_connector.py +0 -5
- pulumi_gcp/beyondcorp/get_app_gateway.py +0 -5
- pulumi_gcp/beyondcorp/outputs.py +0 -5
- pulumi_gcp/biglake/_inputs.py +0 -64
- pulumi_gcp/biglake/catalog.py +0 -5
- pulumi_gcp/biglake/database.py +13 -18
- pulumi_gcp/biglake/outputs.py +0 -5
- pulumi_gcp/biglake/table.py +31 -36
- pulumi_gcp/bigquery/_inputs.py +13 -1937
- pulumi_gcp/bigquery/app_profile.py +128 -133
- pulumi_gcp/bigquery/bi_reservation.py +5 -10
- pulumi_gcp/bigquery/capacity_commitment.py +0 -5
- pulumi_gcp/bigquery/connection.py +176 -181
- pulumi_gcp/bigquery/connection_iam_binding.py +19 -24
- pulumi_gcp/bigquery/connection_iam_member.py +19 -24
- pulumi_gcp/bigquery/connection_iam_policy.py +16 -21
- pulumi_gcp/bigquery/data_transfer_config.py +15 -20
- pulumi_gcp/bigquery/dataset.py +127 -132
- pulumi_gcp/bigquery/dataset_access.py +67 -72
- pulumi_gcp/bigquery/dataset_iam_binding.py +19 -24
- pulumi_gcp/bigquery/dataset_iam_member.py +19 -24
- pulumi_gcp/bigquery/dataset_iam_policy.py +16 -21
- pulumi_gcp/bigquery/get_connection_iam_policy.py +0 -5
- pulumi_gcp/bigquery/get_dataset.py +0 -5
- pulumi_gcp/bigquery/get_dataset_iam_policy.py +0 -5
- pulumi_gcp/bigquery/get_default_service_account.py +0 -5
- pulumi_gcp/bigquery/get_table_iam_policy.py +0 -5
- pulumi_gcp/bigquery/iam_binding.py +97 -102
- pulumi_gcp/bigquery/iam_member.py +97 -102
- pulumi_gcp/bigquery/iam_policy.py +92 -97
- pulumi_gcp/bigquery/job.py +224 -229
- pulumi_gcp/bigquery/outputs.py +0 -5
- pulumi_gcp/bigquery/reservation.py +11 -16
- pulumi_gcp/bigquery/reservation_assignment.py +0 -5
- pulumi_gcp/bigquery/routine.py +109 -114
- pulumi_gcp/bigquery/table.py +62 -67
- pulumi_gcp/bigqueryanalyticshub/_inputs.py +0 -97
- pulumi_gcp/bigqueryanalyticshub/data_exchange.py +0 -5
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +19 -24
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +19 -24
- pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +16 -21
- pulumi_gcp/bigqueryanalyticshub/get_data_exchange_iam_policy.py +0 -5
- pulumi_gcp/bigqueryanalyticshub/get_listing_iam_policy.py +0 -5
- pulumi_gcp/bigqueryanalyticshub/listing.py +40 -45
- pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +19 -24
- pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +19 -24
- pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +16 -21
- pulumi_gcp/bigqueryanalyticshub/outputs.py +0 -5
- pulumi_gcp/bigquerydatapolicy/_inputs.py +0 -40
- pulumi_gcp/bigquerydatapolicy/data_policy.py +19 -24
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +19 -24
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +19 -24
- pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +16 -21
- pulumi_gcp/bigquerydatapolicy/get_iam_policy.py +0 -5
- pulumi_gcp/bigquerydatapolicy/outputs.py +0 -5
- pulumi_gcp/bigtable/_inputs.py +0 -202
- pulumi_gcp/bigtable/authorized_view.py +5 -10
- pulumi_gcp/bigtable/gc_policy.py +54 -113
- pulumi_gcp/bigtable/get_instance_iam_policy.py +0 -5
- pulumi_gcp/bigtable/get_table_iam_policy.py +0 -5
- pulumi_gcp/bigtable/instance.py +47 -52
- pulumi_gcp/bigtable/instance_iam_binding.py +19 -24
- pulumi_gcp/bigtable/instance_iam_member.py +19 -24
- pulumi_gcp/bigtable/instance_iam_policy.py +16 -21
- pulumi_gcp/bigtable/outputs.py +0 -5
- pulumi_gcp/bigtable/table.py +34 -39
- pulumi_gcp/bigtable/table_iam_binding.py +19 -24
- pulumi_gcp/bigtable/table_iam_member.py +19 -24
- pulumi_gcp/bigtable/table_iam_policy.py +16 -21
- pulumi_gcp/billing/_inputs.py +0 -257
- pulumi_gcp/billing/account_iam_binding.py +19 -24
- pulumi_gcp/billing/account_iam_member.py +19 -24
- pulumi_gcp/billing/account_iam_policy.py +16 -21
- pulumi_gcp/billing/budget.py +220 -225
- pulumi_gcp/billing/get_account_iam_policy.py +0 -5
- pulumi_gcp/billing/outputs.py +0 -5
- pulumi_gcp/billing/project_info.py +0 -5
- pulumi_gcp/billing/sub_account.py +0 -5
- pulumi_gcp/binaryauthorization/_inputs.py +0 -199
- pulumi_gcp/binaryauthorization/attestor.py +63 -68
- pulumi_gcp/binaryauthorization/attestor_iam_binding.py +19 -24
- pulumi_gcp/binaryauthorization/attestor_iam_member.py +19 -24
- pulumi_gcp/binaryauthorization/attestor_iam_policy.py +16 -21
- pulumi_gcp/binaryauthorization/get_attestor_iam_policy.py +0 -5
- pulumi_gcp/binaryauthorization/outputs.py +0 -5
- pulumi_gcp/binaryauthorization/policy.py +83 -88
- pulumi_gcp/blockchainnodeengine/_inputs.py +0 -131
- pulumi_gcp/blockchainnodeengine/blockchain_nodes.py +57 -62
- pulumi_gcp/blockchainnodeengine/outputs.py +0 -5
- pulumi_gcp/certificateauthority/_inputs.py +29 -2150
- pulumi_gcp/certificateauthority/authority.py +393 -398
- pulumi_gcp/certificateauthority/ca_pool.py +184 -189
- pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +97 -102
- pulumi_gcp/certificateauthority/ca_pool_iam_member.py +97 -102
- pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +92 -97
- pulumi_gcp/certificateauthority/certificate.py +631 -636
- pulumi_gcp/certificateauthority/certificate_template.py +129 -134
- pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +97 -102
- pulumi_gcp/certificateauthority/certificate_template_iam_member.py +97 -102
- pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +92 -97
- pulumi_gcp/certificateauthority/get_authority.py +0 -5
- pulumi_gcp/certificateauthority/get_ca_pool_iam_policy.py +0 -5
- pulumi_gcp/certificateauthority/get_certificate_template_iam_policy.py +0 -5
- pulumi_gcp/certificateauthority/outputs.py +0 -5
- pulumi_gcp/certificatemanager/_inputs.py +0 -256
- pulumi_gcp/certificatemanager/certificate.py +198 -203
- pulumi_gcp/certificatemanager/certificate_issuance_config.py +71 -76
- pulumi_gcp/certificatemanager/certificate_map.py +2 -7
- pulumi_gcp/certificatemanager/certificate_map_entry.py +8 -13
- pulumi_gcp/certificatemanager/dns_authorization.py +2 -7
- pulumi_gcp/certificatemanager/get_certificate_map.py +0 -5
- pulumi_gcp/certificatemanager/outputs.py +0 -5
- pulumi_gcp/certificatemanager/trust_config.py +21 -26
- pulumi_gcp/cloudasset/_inputs.py +0 -151
- pulumi_gcp/cloudasset/folder_feed.py +30 -35
- pulumi_gcp/cloudasset/get_resources_search_all.py +0 -5
- pulumi_gcp/cloudasset/get_search_all_resources.py +0 -5
- pulumi_gcp/cloudasset/organization_feed.py +30 -35
- pulumi_gcp/cloudasset/outputs.py +0 -5
- pulumi_gcp/cloudasset/project_feed.py +30 -35
- pulumi_gcp/cloudbuild/_inputs.py +30 -1039
- pulumi_gcp/cloudbuild/bitbucket_server_config.py +56 -61
- pulumi_gcp/cloudbuild/get_trigger.py +0 -5
- pulumi_gcp/cloudbuild/outputs.py +0 -5
- pulumi_gcp/cloudbuild/trigger.py +728 -733
- pulumi_gcp/cloudbuild/worker_pool.py +38 -43
- pulumi_gcp/cloudbuildv2/_inputs.py +0 -335
- pulumi_gcp/cloudbuildv2/connection.py +101 -106
- pulumi_gcp/cloudbuildv2/connection_iam_binding.py +19 -24
- pulumi_gcp/cloudbuildv2/connection_iam_member.py +19 -24
- pulumi_gcp/cloudbuildv2/connection_iam_policy.py +16 -21
- pulumi_gcp/cloudbuildv2/get_connection_iam_policy.py +0 -5
- pulumi_gcp/cloudbuildv2/outputs.py +0 -5
- pulumi_gcp/cloudbuildv2/repository.py +62 -67
- pulumi_gcp/clouddeploy/_inputs.py +0 -700
- pulumi_gcp/clouddeploy/automation.py +96 -101
- pulumi_gcp/clouddeploy/custom_target_type.py +83 -88
- pulumi_gcp/clouddeploy/custom_target_type_iam_binding.py +3 -8
- pulumi_gcp/clouddeploy/custom_target_type_iam_member.py +3 -8
- pulumi_gcp/clouddeploy/custom_target_type_iam_policy.py +0 -5
- pulumi_gcp/clouddeploy/delivery_pipeline.py +157 -162
- pulumi_gcp/clouddeploy/delivery_pipeline_iam_binding.py +3 -8
- pulumi_gcp/clouddeploy/delivery_pipeline_iam_member.py +3 -8
- pulumi_gcp/clouddeploy/delivery_pipeline_iam_policy.py +0 -5
- pulumi_gcp/clouddeploy/get_custom_target_type_iam_policy.py +0 -5
- pulumi_gcp/clouddeploy/get_delivery_pipeline_iam_policy.py +0 -5
- pulumi_gcp/clouddeploy/get_target_iam_policy.py +0 -5
- pulumi_gcp/clouddeploy/outputs.py +0 -5
- pulumi_gcp/clouddeploy/target.py +64 -69
- pulumi_gcp/clouddeploy/target_iam_binding.py +3 -8
- pulumi_gcp/clouddeploy/target_iam_member.py +3 -8
- pulumi_gcp/clouddeploy/target_iam_policy.py +0 -5
- pulumi_gcp/clouddomains/_inputs.py +0 -372
- pulumi_gcp/clouddomains/outputs.py +0 -5
- pulumi_gcp/clouddomains/registration.py +116 -121
- pulumi_gcp/cloudfunctions/_inputs.py +0 -132
- pulumi_gcp/cloudfunctions/function.py +20 -25
- pulumi_gcp/cloudfunctions/function_iam_binding.py +19 -24
- pulumi_gcp/cloudfunctions/function_iam_member.py +19 -24
- pulumi_gcp/cloudfunctions/function_iam_policy.py +16 -21
- pulumi_gcp/cloudfunctions/get_function.py +0 -5
- pulumi_gcp/cloudfunctions/get_function_iam_policy.py +0 -5
- pulumi_gcp/cloudfunctions/outputs.py +0 -5
- pulumi_gcp/cloudfunctionsv2/_inputs.py +0 -454
- pulumi_gcp/cloudfunctionsv2/function.py +509 -746
- pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +19 -24
- pulumi_gcp/cloudfunctionsv2/function_iam_member.py +19 -24
- pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +16 -21
- pulumi_gcp/cloudfunctionsv2/get_function.py +0 -5
- pulumi_gcp/cloudfunctionsv2/get_function_iam_policy.py +0 -5
- pulumi_gcp/cloudfunctionsv2/outputs.py +1 -134
- pulumi_gcp/cloudidentity/_inputs.py +0 -161
- pulumi_gcp/cloudidentity/get_group_lookup.py +4 -9
- pulumi_gcp/cloudidentity/get_group_memberships.py +0 -5
- pulumi_gcp/cloudidentity/get_groups.py +0 -5
- pulumi_gcp/cloudidentity/group.py +13 -18
- pulumi_gcp/cloudidentity/group_membership.py +63 -68
- pulumi_gcp/cloudidentity/outputs.py +0 -5
- pulumi_gcp/cloudids/endpoint.py +0 -5
- pulumi_gcp/cloudquota/_inputs.py +0 -44
- pulumi_gcp/cloudquota/get_s_quota_info.py +0 -5
- pulumi_gcp/cloudquota/get_s_quota_infos.py +0 -5
- pulumi_gcp/cloudquota/outputs.py +0 -5
- pulumi_gcp/cloudquota/s_quota_preference.py +11 -16
- pulumi_gcp/cloudrun/_inputs.py +16 -1166
- pulumi_gcp/cloudrun/domain_mapping.py +44 -49
- pulumi_gcp/cloudrun/get_locations.py +0 -5
- pulumi_gcp/cloudrun/get_service.py +0 -5
- pulumi_gcp/cloudrun/get_service_iam_policy.py +0 -5
- pulumi_gcp/cloudrun/iam_binding.py +19 -24
- pulumi_gcp/cloudrun/iam_member.py +19 -24
- pulumi_gcp/cloudrun/iam_policy.py +16 -21
- pulumi_gcp/cloudrun/outputs.py +0 -5
- pulumi_gcp/cloudrun/service.py +265 -270
- pulumi_gcp/cloudrunv2/_inputs.py +20 -1353
- pulumi_gcp/cloudrunv2/get_job.py +0 -5
- pulumi_gcp/cloudrunv2/get_job_iam_policy.py +0 -5
- pulumi_gcp/cloudrunv2/get_service.py +0 -5
- pulumi_gcp/cloudrunv2/get_service_iam_policy.py +0 -5
- pulumi_gcp/cloudrunv2/job.py +282 -287
- pulumi_gcp/cloudrunv2/job_iam_binding.py +19 -24
- pulumi_gcp/cloudrunv2/job_iam_member.py +19 -24
- pulumi_gcp/cloudrunv2/job_iam_policy.py +16 -21
- pulumi_gcp/cloudrunv2/outputs.py +0 -5
- pulumi_gcp/cloudrunv2/service.py +432 -437
- pulumi_gcp/cloudrunv2/service_iam_binding.py +19 -24
- pulumi_gcp/cloudrunv2/service_iam_member.py +19 -24
- pulumi_gcp/cloudrunv2/service_iam_policy.py +16 -21
- pulumi_gcp/cloudscheduler/_inputs.py +0 -193
- pulumi_gcp/cloudscheduler/job.py +122 -127
- pulumi_gcp/cloudscheduler/outputs.py +0 -5
- pulumi_gcp/cloudtasks/_inputs.py +0 -134
- pulumi_gcp/cloudtasks/get_queue_iam_policy.py +0 -5
- pulumi_gcp/cloudtasks/outputs.py +0 -5
- pulumi_gcp/cloudtasks/queue.py +58 -63
- pulumi_gcp/cloudtasks/queue_iam_binding.py +19 -24
- pulumi_gcp/cloudtasks/queue_iam_member.py +19 -24
- pulumi_gcp/cloudtasks/queue_iam_policy.py +16 -21
- pulumi_gcp/composer/_inputs.py +0 -566
- pulumi_gcp/composer/environment.py +10 -15
- pulumi_gcp/composer/get_environment.py +0 -5
- pulumi_gcp/composer/get_image_versions.py +10 -15
- pulumi_gcp/composer/get_user_workloads_config_map.py +10 -15
- pulumi_gcp/composer/get_user_workloads_secret.py +10 -15
- pulumi_gcp/composer/outputs.py +0 -5
- pulumi_gcp/composer/user_workloads_config_map.py +10 -15
- pulumi_gcp/composer/user_workloads_secret.py +10 -15
- pulumi_gcp/compute/_inputs.py +145 -14134
- pulumi_gcp/compute/address.py +29 -27
- pulumi_gcp/compute/attached_disk.py +16 -21
- pulumi_gcp/compute/autoscaler.py +93 -98
- pulumi_gcp/compute/backend_bucket.py +25 -30
- pulumi_gcp/compute/backend_bucket_iam_binding.py +3 -8
- pulumi_gcp/compute/backend_bucket_iam_member.py +3 -8
- pulumi_gcp/compute/backend_bucket_iam_policy.py +0 -5
- pulumi_gcp/compute/backend_bucket_signed_url_key.py +0 -5
- pulumi_gcp/compute/backend_service.py +213 -204
- pulumi_gcp/compute/backend_service_iam_binding.py +5 -10
- pulumi_gcp/compute/backend_service_iam_member.py +5 -10
- pulumi_gcp/compute/backend_service_iam_policy.py +0 -5
- pulumi_gcp/compute/backend_service_signed_url_key.py +30 -35
- pulumi_gcp/compute/ca_external_account_key.py +0 -5
- pulumi_gcp/compute/disk.py +49 -54
- pulumi_gcp/compute/disk_async_replication.py +5 -10
- pulumi_gcp/compute/disk_iam_binding.py +19 -24
- pulumi_gcp/compute/disk_iam_member.py +19 -24
- pulumi_gcp/compute/disk_iam_policy.py +16 -21
- pulumi_gcp/compute/disk_resource_policy_attachment.py +16 -21
- pulumi_gcp/compute/external_vpn_gateway.py +19 -24
- pulumi_gcp/compute/firewall.py +37 -42
- pulumi_gcp/compute/firewall_policy.py +0 -5
- pulumi_gcp/compute/firewall_policy_association.py +0 -5
- pulumi_gcp/compute/firewall_policy_rule.py +39 -44
- pulumi_gcp/compute/forwarding_rule.py +264 -248
- pulumi_gcp/compute/get_address.py +0 -5
- pulumi_gcp/compute/get_addresses.py +0 -5
- pulumi_gcp/compute/get_backend_bucket.py +0 -5
- pulumi_gcp/compute/get_backend_bucket_iam_policy.py +0 -5
- pulumi_gcp/compute/get_backend_service.py +0 -5
- pulumi_gcp/compute/get_backend_service_iam_policy.py +0 -5
- pulumi_gcp/compute/get_certificate.py +0 -5
- pulumi_gcp/compute/get_default_service_account.py +0 -5
- pulumi_gcp/compute/get_disk.py +8 -13
- pulumi_gcp/compute/get_disk_iam_policy.py +0 -5
- pulumi_gcp/compute/get_forwarding_rule.py +0 -5
- pulumi_gcp/compute/get_forwarding_rules.py +0 -5
- pulumi_gcp/compute/get_global_address.py +0 -5
- pulumi_gcp/compute/get_global_forwarding_rule.py +0 -5
- pulumi_gcp/compute/get_hc_vpn_gateway.py +0 -5
- pulumi_gcp/compute/get_health_check.py +0 -5
- pulumi_gcp/compute/get_image.py +10 -15
- pulumi_gcp/compute/get_image_iam_policy.py +0 -5
- pulumi_gcp/compute/get_instance.py +0 -5
- pulumi_gcp/compute/get_instance_group.py +0 -5
- pulumi_gcp/compute/get_instance_group_manager.py +0 -5
- pulumi_gcp/compute/get_instance_iam_policy.py +0 -5
- pulumi_gcp/compute/get_instance_serial_port.py +24 -29
- pulumi_gcp/compute/get_instance_template.py +0 -5
- pulumi_gcp/compute/get_lbip_ranges.py +0 -5
- pulumi_gcp/compute/get_machine_image_iam_policy.py +0 -5
- pulumi_gcp/compute/get_machine_types.py +0 -5
- pulumi_gcp/compute/get_netblock_ip_ranges.py +0 -5
- pulumi_gcp/compute/get_network.py +0 -5
- pulumi_gcp/compute/get_network_endpoint_group.py +0 -5
- pulumi_gcp/compute/get_network_peering.py +0 -5
- pulumi_gcp/compute/get_networks.py +0 -5
- pulumi_gcp/compute/get_node_types.py +0 -5
- pulumi_gcp/compute/get_region_backend_service_iam_policy.py +0 -5
- pulumi_gcp/compute/get_region_disk.py +0 -5
- pulumi_gcp/compute/get_region_disk_iam_policy.py +0 -5
- pulumi_gcp/compute/get_region_instance_group.py +0 -5
- pulumi_gcp/compute/get_region_instance_template.py +0 -5
- pulumi_gcp/compute/get_region_network_endpoint_group.py +0 -5
- pulumi_gcp/compute/get_region_ssl_certificate.py +0 -5
- pulumi_gcp/compute/get_regions.py +0 -5
- pulumi_gcp/compute/get_reservation.py +0 -5
- pulumi_gcp/compute/get_resource_policy.py +0 -5
- pulumi_gcp/compute/get_router.py +0 -5
- pulumi_gcp/compute/get_router_nat.py +0 -5
- pulumi_gcp/compute/get_router_status.py +0 -5
- pulumi_gcp/compute/get_security_policy.py +0 -5
- pulumi_gcp/compute/get_snapshot.py +0 -5
- pulumi_gcp/compute/get_snapshot_iam_policy.py +0 -5
- pulumi_gcp/compute/get_ssl_policy.py +0 -5
- pulumi_gcp/compute/get_subnetwork.py +0 -5
- pulumi_gcp/compute/get_subnetwork_iam_policy.py +0 -5
- pulumi_gcp/compute/get_subnetworks.py +0 -5
- pulumi_gcp/compute/get_vpn_gateway.py +0 -5
- pulumi_gcp/compute/get_zones.py +0 -5
- pulumi_gcp/compute/global_address.py +0 -5
- pulumi_gcp/compute/global_forwarding_rule.py +227 -211
- pulumi_gcp/compute/global_network_endpoint.py +0 -5
- pulumi_gcp/compute/global_network_endpoint_group.py +0 -5
- pulumi_gcp/compute/ha_vpn_gateway.py +27 -32
- pulumi_gcp/compute/health_check.py +169 -174
- pulumi_gcp/compute/http_health_check.py +0 -5
- pulumi_gcp/compute/https_health_check.py +0 -5
- pulumi_gcp/compute/image.py +45 -50
- pulumi_gcp/compute/image_iam_binding.py +97 -102
- pulumi_gcp/compute/image_iam_member.py +97 -102
- pulumi_gcp/compute/image_iam_policy.py +92 -97
- pulumi_gcp/compute/instance.py +99 -104
- pulumi_gcp/compute/instance_from_machine_image.py +56 -61
- pulumi_gcp/compute/instance_from_template.py +83 -88
- pulumi_gcp/compute/instance_group.py +21 -26
- pulumi_gcp/compute/instance_group_manager.py +133 -138
- pulumi_gcp/compute/instance_group_membership.py +16 -21
- pulumi_gcp/compute/instance_group_named_port.py +8 -13
- pulumi_gcp/compute/instance_iam_binding.py +97 -102
- pulumi_gcp/compute/instance_iam_member.py +97 -102
- pulumi_gcp/compute/instance_iam_policy.py +92 -97
- pulumi_gcp/compute/instance_settings.py +11 -16
- pulumi_gcp/compute/instance_template.py +142 -147
- pulumi_gcp/compute/interconnect.py +9 -14
- pulumi_gcp/compute/interconnect_attachment.py +14 -19
- pulumi_gcp/compute/machine_image.py +43 -48
- pulumi_gcp/compute/machine_image_iam_binding.py +97 -102
- pulumi_gcp/compute/machine_image_iam_member.py +97 -102
- pulumi_gcp/compute/machine_image_iam_policy.py +92 -97
- pulumi_gcp/compute/managed_ssl_certificate.py +42 -40
- pulumi_gcp/compute/manged_ssl_certificate.py +42 -40
- pulumi_gcp/compute/network.py +0 -5
- pulumi_gcp/compute/network_attachment.py +24 -45
- pulumi_gcp/compute/network_edge_security_service.py +0 -5
- pulumi_gcp/compute/network_endpoint.py +18 -23
- pulumi_gcp/compute/network_endpoint_group.py +0 -5
- pulumi_gcp/compute/network_endpoint_list.py +61 -66
- pulumi_gcp/compute/network_firewall_policy.py +0 -5
- pulumi_gcp/compute/network_firewall_policy_association.py +0 -5
- pulumi_gcp/compute/network_firewall_policy_rule.py +36 -41
- pulumi_gcp/compute/network_peering.py +0 -5
- pulumi_gcp/compute/network_peering_routes_config.py +36 -41
- pulumi_gcp/compute/node_group.py +45 -50
- pulumi_gcp/compute/node_template.py +16 -21
- pulumi_gcp/compute/organization_security_policy.py +0 -5
- pulumi_gcp/compute/organization_security_policy_association.py +26 -31
- pulumi_gcp/compute/organization_security_policy_rule.py +31 -36
- pulumi_gcp/compute/outputs.py +8 -509
- pulumi_gcp/compute/packet_mirroring.py +78 -83
- pulumi_gcp/compute/per_instance_config.py +51 -56
- pulumi_gcp/compute/project_cloud_armor_tier.py +0 -5
- pulumi_gcp/compute/project_default_network_tier.py +0 -5
- pulumi_gcp/compute/project_metadata.py +0 -5
- pulumi_gcp/compute/project_metadata_item.py +0 -5
- pulumi_gcp/compute/public_advertised_prefix.py +0 -5
- pulumi_gcp/compute/public_delegated_prefix.py +0 -5
- pulumi_gcp/compute/region_autoscaler.py +55 -60
- pulumi_gcp/compute/region_backend_service.py +212 -203
- pulumi_gcp/compute/region_backend_service_iam_binding.py +5 -10
- pulumi_gcp/compute/region_backend_service_iam_member.py +5 -10
- pulumi_gcp/compute/region_backend_service_iam_policy.py +0 -5
- pulumi_gcp/compute/region_commitment.py +42 -47
- pulumi_gcp/compute/region_disk.py +44 -49
- pulumi_gcp/compute/region_disk_iam_binding.py +114 -146
- pulumi_gcp/compute/region_disk_iam_member.py +114 -146
- pulumi_gcp/compute/region_disk_iam_policy.py +104 -136
- pulumi_gcp/compute/region_disk_resource_policy_attachment.py +16 -21
- pulumi_gcp/compute/region_health_check.py +169 -174
- pulumi_gcp/compute/region_instance_group_manager.py +129 -134
- pulumi_gcp/compute/region_instance_template.py +50 -55
- pulumi_gcp/compute/region_network_endpoint.py +18 -23
- pulumi_gcp/compute/region_network_endpoint_group.py +130 -135
- pulumi_gcp/compute/region_network_firewall_policy.py +0 -5
- pulumi_gcp/compute/region_network_firewall_policy_association.py +0 -5
- pulumi_gcp/compute/region_network_firewall_policy_rule.py +36 -41
- pulumi_gcp/compute/region_per_instance_config.py +61 -66
- pulumi_gcp/compute/region_security_policy.py +44 -49
- pulumi_gcp/compute/region_security_policy_rule.py +156 -161
- pulumi_gcp/compute/region_ssl_certificate.py +7 -5
- pulumi_gcp/compute/region_ssl_policy.py +0 -5
- pulumi_gcp/compute/region_target_http_proxy.py +38 -43
- pulumi_gcp/compute/region_target_https_proxy.py +92 -97
- pulumi_gcp/compute/region_target_tcp_proxy.py +6 -11
- pulumi_gcp/compute/region_url_map.py +819 -824
- pulumi_gcp/compute/reservation.py +24 -29
- pulumi_gcp/compute/resource_policy.py +148 -153
- pulumi_gcp/compute/route.py +12 -17
- pulumi_gcp/compute/router.py +35 -40
- pulumi_gcp/compute/router_interface.py +0 -5
- pulumi_gcp/compute/router_nat.py +93 -98
- pulumi_gcp/compute/router_peer.py +73 -78
- pulumi_gcp/compute/router_status.py +0 -5
- pulumi_gcp/compute/security_policy.py +196 -201
- pulumi_gcp/compute/security_policy_rule.py +75 -80
- pulumi_gcp/compute/security_scan_config.py +10 -15
- pulumi_gcp/compute/service_attachment.py +55 -60
- pulumi_gcp/compute/shared_vpc_host_project.py +0 -5
- pulumi_gcp/compute/shared_vpc_service_project.py +0 -5
- pulumi_gcp/compute/snapshot.py +10 -15
- pulumi_gcp/compute/snapshot_iam_binding.py +19 -24
- pulumi_gcp/compute/snapshot_iam_member.py +19 -24
- pulumi_gcp/compute/snapshot_iam_policy.py +16 -21
- pulumi_gcp/compute/ssl_certificate.py +7 -5
- pulumi_gcp/compute/ssl_policy.py +0 -5
- pulumi_gcp/compute/subnetwork.py +28 -33
- pulumi_gcp/compute/subnetwork_iam_binding.py +97 -102
- pulumi_gcp/compute/subnetwork_iam_member.py +97 -102
- pulumi_gcp/compute/subnetwork_iam_policy.py +92 -97
- pulumi_gcp/compute/target_grpc_proxy.py +124 -129
- pulumi_gcp/compute/target_http_proxy.py +56 -61
- pulumi_gcp/compute/target_https_proxy.py +129 -209
- pulumi_gcp/compute/target_instance.py +58 -63
- pulumi_gcp/compute/target_pool.py +0 -5
- pulumi_gcp/compute/target_ssl_proxy.py +6 -11
- pulumi_gcp/compute/target_tcp_proxy.py +6 -11
- pulumi_gcp/compute/url_map.py +726 -986
- pulumi_gcp/compute/vpn_gateway.py +0 -5
- pulumi_gcp/compute/vpn_tunnel.py +0 -5
- pulumi_gcp/config/__init__.pyi +0 -5
- pulumi_gcp/config/outputs.py +0 -5
- pulumi_gcp/config/vars.py +0 -5
- pulumi_gcp/container/_inputs.py +343 -5022
- pulumi_gcp/container/attached_cluster.py +123 -128
- pulumi_gcp/container/aws_cluster.py +356 -361
- pulumi_gcp/container/aws_node_pool.py +551 -556
- pulumi_gcp/container/azure_client.py +2 -7
- pulumi_gcp/container/azure_cluster.py +130 -135
- pulumi_gcp/container/azure_node_pool.py +112 -117
- pulumi_gcp/container/cluster.py +219 -224
- pulumi_gcp/container/get_attached_install_manifest.py +0 -5
- pulumi_gcp/container/get_attached_versions.py +0 -5
- pulumi_gcp/container/get_aws_versions.py +0 -5
- pulumi_gcp/container/get_azure_versions.py +0 -5
- pulumi_gcp/container/get_cluster.py +0 -5
- pulumi_gcp/container/get_engine_versions.py +0 -5
- pulumi_gcp/container/get_registry_image.py +0 -5
- pulumi_gcp/container/get_registry_repository.py +0 -5
- pulumi_gcp/container/node_pool.py +73 -78
- pulumi_gcp/container/outputs.py +0 -5
- pulumi_gcp/container/registry.py +0 -5
- pulumi_gcp/containeranalysis/_inputs.py +0 -121
- pulumi_gcp/containeranalysis/get_note_iam_policy.py +0 -5
- pulumi_gcp/containeranalysis/note.py +44 -49
- pulumi_gcp/containeranalysis/note_iam_binding.py +19 -24
- pulumi_gcp/containeranalysis/note_iam_member.py +19 -24
- pulumi_gcp/containeranalysis/note_iam_policy.py +16 -21
- pulumi_gcp/containeranalysis/occurence.py +5 -10
- pulumi_gcp/containeranalysis/outputs.py +0 -5
- pulumi_gcp/databasemigrationservice/_inputs.py +0 -578
- pulumi_gcp/databasemigrationservice/connection_profile.py +183 -188
- pulumi_gcp/databasemigrationservice/outputs.py +0 -5
- pulumi_gcp/databasemigrationservice/private_connection.py +15 -20
- pulumi_gcp/datacatalog/_inputs.py +0 -318
- pulumi_gcp/datacatalog/entry.py +15 -20
- pulumi_gcp/datacatalog/entry_group.py +0 -5
- pulumi_gcp/datacatalog/entry_group_iam_binding.py +19 -24
- pulumi_gcp/datacatalog/entry_group_iam_member.py +19 -24
- pulumi_gcp/datacatalog/entry_group_iam_policy.py +16 -21
- pulumi_gcp/datacatalog/get_entry_group_iam_policy.py +0 -5
- pulumi_gcp/datacatalog/get_policy_tag_iam_policy.py +0 -5
- pulumi_gcp/datacatalog/get_tag_template_iam_policy.py +0 -5
- pulumi_gcp/datacatalog/get_taxonomy_iam_policy.py +0 -5
- pulumi_gcp/datacatalog/outputs.py +0 -5
- pulumi_gcp/datacatalog/policy_tag.py +0 -5
- pulumi_gcp/datacatalog/policy_tag_iam_binding.py +19 -24
- pulumi_gcp/datacatalog/policy_tag_iam_member.py +19 -24
- pulumi_gcp/datacatalog/policy_tag_iam_policy.py +16 -21
- pulumi_gcp/datacatalog/tag.py +259 -264
- pulumi_gcp/datacatalog/tag_template.py +71 -76
- pulumi_gcp/datacatalog/tag_template_iam_binding.py +19 -24
- pulumi_gcp/datacatalog/tag_template_iam_member.py +19 -24
- pulumi_gcp/datacatalog/tag_template_iam_policy.py +16 -21
- pulumi_gcp/datacatalog/taxonomy.py +0 -5
- pulumi_gcp/datacatalog/taxonomy_iam_binding.py +19 -24
- pulumi_gcp/datacatalog/taxonomy_iam_member.py +19 -24
- pulumi_gcp/datacatalog/taxonomy_iam_policy.py +16 -21
- pulumi_gcp/dataflow/_inputs.py +0 -316
- pulumi_gcp/dataflow/flex_template_job.py +0 -5
- pulumi_gcp/dataflow/job.py +0 -5
- pulumi_gcp/dataflow/outputs.py +0 -5
- pulumi_gcp/dataflow/pipeline.py +70 -75
- pulumi_gcp/dataform/_inputs.py +0 -251
- pulumi_gcp/dataform/get_repository_iam_policy.py +0 -5
- pulumi_gcp/dataform/outputs.py +0 -5
- pulumi_gcp/dataform/repository.py +36 -41
- pulumi_gcp/dataform/repository_iam_binding.py +3 -8
- pulumi_gcp/dataform/repository_iam_member.py +3 -8
- pulumi_gcp/dataform/repository_iam_policy.py +0 -5
- pulumi_gcp/dataform/repository_release_config.py +53 -58
- pulumi_gcp/dataform/repository_workflow_config.py +89 -94
- pulumi_gcp/datafusion/_inputs.py +8 -224
- pulumi_gcp/datafusion/get_instance_iam_policy.py +0 -5
- pulumi_gcp/datafusion/instance.py +50 -119
- pulumi_gcp/datafusion/outputs.py +7 -132
- pulumi_gcp/dataloss/_inputs.py +85 -6537
- pulumi_gcp/dataloss/outputs.py +0 -5
- pulumi_gcp/dataloss/prevention_deidentify_template.py +221 -226
- pulumi_gcp/dataloss/prevention_discovery_config.py +17 -22
- pulumi_gcp/dataloss/prevention_inspect_template.py +437 -442
- pulumi_gcp/dataloss/prevention_job_trigger.py +696 -701
- pulumi_gcp/dataloss/prevention_stored_info_type.py +57 -62
- pulumi_gcp/dataplex/_inputs.py +7 -1213
- pulumi_gcp/dataplex/aspect_type.py +0 -5
- pulumi_gcp/dataplex/aspect_type_iam_binding.py +19 -24
- pulumi_gcp/dataplex/aspect_type_iam_member.py +19 -24
- pulumi_gcp/dataplex/aspect_type_iam_policy.py +16 -21
- pulumi_gcp/dataplex/asset.py +42 -47
- pulumi_gcp/dataplex/asset_iam_binding.py +19 -24
- pulumi_gcp/dataplex/asset_iam_member.py +19 -24
- pulumi_gcp/dataplex/asset_iam_policy.py +16 -21
- pulumi_gcp/dataplex/datascan.py +284 -289
- pulumi_gcp/dataplex/datascan_iam_binding.py +19 -24
- pulumi_gcp/dataplex/datascan_iam_member.py +19 -24
- pulumi_gcp/dataplex/datascan_iam_policy.py +16 -21
- pulumi_gcp/dataplex/entry_group.py +0 -5
- pulumi_gcp/dataplex/entry_group_iam_binding.py +19 -24
- pulumi_gcp/dataplex/entry_group_iam_member.py +19 -24
- pulumi_gcp/dataplex/entry_group_iam_policy.py +16 -21
- pulumi_gcp/dataplex/entry_type.py +11 -16
- pulumi_gcp/dataplex/entry_type_iam_binding.py +19 -24
- pulumi_gcp/dataplex/entry_type_iam_member.py +19 -24
- pulumi_gcp/dataplex/entry_type_iam_policy.py +16 -21
- pulumi_gcp/dataplex/get_aspect_type_iam_policy.py +0 -5
- pulumi_gcp/dataplex/get_asset_iam_policy.py +0 -5
- pulumi_gcp/dataplex/get_datascan_iam_policy.py +0 -5
- pulumi_gcp/dataplex/get_entry_group_iam_policy.py +0 -5
- pulumi_gcp/dataplex/get_entry_type_iam_policy.py +0 -5
- pulumi_gcp/dataplex/get_lake_iam_policy.py +0 -5
- pulumi_gcp/dataplex/get_task_iam_policy.py +0 -5
- pulumi_gcp/dataplex/get_zone_iam_policy.py +0 -5
- pulumi_gcp/dataplex/lake.py +9 -14
- pulumi_gcp/dataplex/lake_iam_binding.py +19 -24
- pulumi_gcp/dataplex/lake_iam_member.py +19 -24
- pulumi_gcp/dataplex/lake_iam_policy.py +16 -21
- pulumi_gcp/dataplex/outputs.py +0 -5
- pulumi_gcp/dataplex/task.py +168 -173
- pulumi_gcp/dataplex/task_iam_binding.py +19 -24
- pulumi_gcp/dataplex/task_iam_member.py +19 -24
- pulumi_gcp/dataplex/task_iam_policy.py +16 -21
- pulumi_gcp/dataplex/zone.py +24 -29
- pulumi_gcp/dataplex/zone_iam_binding.py +19 -24
- pulumi_gcp/dataplex/zone_iam_member.py +19 -24
- pulumi_gcp/dataplex/zone_iam_policy.py +16 -21
- pulumi_gcp/dataproc/_inputs.py +41 -3216
- pulumi_gcp/dataproc/autoscaling_policy.py +45 -50
- pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +19 -24
- pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +19 -24
- pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +16 -21
- pulumi_gcp/dataproc/cluster.py +104 -109
- pulumi_gcp/dataproc/cluster_iam_binding.py +19 -24
- pulumi_gcp/dataproc/cluster_iam_member.py +19 -24
- pulumi_gcp/dataproc/cluster_iam_policy.py +16 -21
- pulumi_gcp/dataproc/get_autoscaling_policy_iam_policy.py +0 -5
- pulumi_gcp/dataproc/get_cluster_iam_policy.py +0 -5
- pulumi_gcp/dataproc/get_job_iam_policy.py +0 -5
- pulumi_gcp/dataproc/get_metastore_federation_iam_policy.py +0 -5
- pulumi_gcp/dataproc/get_metastore_service.py +0 -5
- pulumi_gcp/dataproc/get_metastore_service_iam_policy.py +0 -5
- pulumi_gcp/dataproc/job.py +90 -95
- pulumi_gcp/dataproc/job_iam_binding.py +19 -24
- pulumi_gcp/dataproc/job_iam_member.py +19 -24
- pulumi_gcp/dataproc/job_iam_policy.py +16 -21
- pulumi_gcp/dataproc/metastore_federation.py +51 -56
- pulumi_gcp/dataproc/metastore_federation_iam_binding.py +19 -24
- pulumi_gcp/dataproc/metastore_federation_iam_member.py +19 -24
- pulumi_gcp/dataproc/metastore_federation_iam_policy.py +16 -21
- pulumi_gcp/dataproc/metastore_service.py +234 -239
- pulumi_gcp/dataproc/metastore_service_iam_binding.py +19 -24
- pulumi_gcp/dataproc/metastore_service_iam_member.py +19 -24
- pulumi_gcp/dataproc/metastore_service_iam_policy.py +16 -21
- pulumi_gcp/dataproc/outputs.py +0 -5
- pulumi_gcp/dataproc/workflow_template.py +107 -112
- pulumi_gcp/datastore/_inputs.py +0 -22
- pulumi_gcp/datastore/data_store_index.py +21 -26
- pulumi_gcp/datastore/outputs.py +0 -5
- pulumi_gcp/datastream/_inputs.py +22 -1618
- pulumi_gcp/datastream/connection_profile.py +246 -251
- pulumi_gcp/datastream/get_static_ips.py +0 -5
- pulumi_gcp/datastream/outputs.py +0 -5
- pulumi_gcp/datastream/private_connection.py +15 -20
- pulumi_gcp/datastream/stream.py +772 -777
- pulumi_gcp/deploymentmanager/_inputs.py +0 -66
- pulumi_gcp/deploymentmanager/deployment.py +28 -33
- pulumi_gcp/deploymentmanager/outputs.py +0 -5
- pulumi_gcp/diagflow/_inputs.py +42 -2591
- pulumi_gcp/diagflow/agent.py +0 -5
- pulumi_gcp/diagflow/cx_agent.py +70 -75
- pulumi_gcp/diagflow/cx_entity_type.py +32 -37
- pulumi_gcp/diagflow/cx_environment.py +17 -22
- pulumi_gcp/diagflow/cx_flow.py +450 -455
- pulumi_gcp/diagflow/cx_intent.py +50 -55
- pulumi_gcp/diagflow/cx_page.py +713 -718
- pulumi_gcp/diagflow/cx_security_settings.py +64 -69
- pulumi_gcp/diagflow/cx_test_case.py +192 -197
- pulumi_gcp/diagflow/cx_version.py +8 -13
- pulumi_gcp/diagflow/cx_webhook.py +22 -27
- pulumi_gcp/diagflow/entity_type.py +21 -26
- pulumi_gcp/diagflow/fulfillment.py +22 -27
- pulumi_gcp/diagflow/intent.py +2 -7
- pulumi_gcp/diagflow/outputs.py +0 -5
- pulumi_gcp/discoveryengine/_inputs.py +0 -183
- pulumi_gcp/discoveryengine/chat_engine.py +32 -37
- pulumi_gcp/discoveryengine/data_store.py +27 -32
- pulumi_gcp/discoveryengine/outputs.py +0 -5
- pulumi_gcp/discoveryengine/search_engine.py +12 -17
- pulumi_gcp/dns/_inputs.py +0 -589
- pulumi_gcp/dns/dns_managed_zone_iam_binding.py +19 -24
- pulumi_gcp/dns/dns_managed_zone_iam_member.py +19 -24
- pulumi_gcp/dns/dns_managed_zone_iam_policy.py +16 -21
- pulumi_gcp/dns/get_keys.py +8 -13
- pulumi_gcp/dns/get_managed_zone.py +0 -5
- pulumi_gcp/dns/get_managed_zone_iam_policy.py +0 -5
- pulumi_gcp/dns/get_managed_zones.py +0 -5
- pulumi_gcp/dns/get_record_set.py +0 -5
- pulumi_gcp/dns/managed_zone.py +178 -183
- pulumi_gcp/dns/outputs.py +0 -5
- pulumi_gcp/dns/policy.py +42 -47
- pulumi_gcp/dns/record_set.py +95 -100
- pulumi_gcp/dns/response_policy.py +76 -81
- pulumi_gcp/dns/response_policy_rule.py +33 -38
- pulumi_gcp/edgecontainer/_inputs.py +0 -464
- pulumi_gcp/edgecontainer/cluster.py +147 -152
- pulumi_gcp/edgecontainer/node_pool.py +104 -109
- pulumi_gcp/edgecontainer/outputs.py +0 -5
- pulumi_gcp/edgecontainer/vpn_connection.py +31 -36
- pulumi_gcp/edgenetwork/network.py +0 -5
- pulumi_gcp/edgenetwork/subnet.py +0 -5
- pulumi_gcp/endpoints/_inputs.py +0 -101
- pulumi_gcp/endpoints/consumers_iam_binding.py +3 -8
- pulumi_gcp/endpoints/consumers_iam_member.py +3 -8
- pulumi_gcp/endpoints/consumers_iam_policy.py +0 -5
- pulumi_gcp/endpoints/get_service_consumers_iam_policy.py +0 -5
- pulumi_gcp/endpoints/get_service_iam_policy.py +0 -5
- pulumi_gcp/endpoints/outputs.py +0 -5
- pulumi_gcp/endpoints/service.py +4 -9
- pulumi_gcp/endpoints/service_iam_binding.py +19 -24
- pulumi_gcp/endpoints/service_iam_member.py +19 -24
- pulumi_gcp/endpoints/service_iam_policy.py +16 -21
- pulumi_gcp/essentialcontacts/_inputs.py +0 -313
- pulumi_gcp/essentialcontacts/contact.py +0 -5
- pulumi_gcp/essentialcontacts/document_ai_processor.py +0 -5
- pulumi_gcp/essentialcontacts/document_ai_processor_default_version.py +0 -5
- pulumi_gcp/essentialcontacts/document_ai_warehouse_document_schema.py +35 -40
- pulumi_gcp/essentialcontacts/document_ai_warehouse_location.py +0 -5
- pulumi_gcp/essentialcontacts/outputs.py +0 -5
- pulumi_gcp/eventarc/_inputs.py +0 -145
- pulumi_gcp/eventarc/channel.py +0 -5
- pulumi_gcp/eventarc/google_channel_config.py +0 -5
- pulumi_gcp/eventarc/outputs.py +0 -5
- pulumi_gcp/eventarc/trigger.py +73 -78
- pulumi_gcp/filestore/_inputs.py +0 -108
- pulumi_gcp/filestore/backup.py +18 -23
- pulumi_gcp/filestore/get_instance.py +0 -5
- pulumi_gcp/filestore/instance.py +102 -107
- pulumi_gcp/filestore/outputs.py +0 -5
- pulumi_gcp/filestore/snapshot.py +32 -37
- pulumi_gcp/firebase/_inputs.py +0 -511
- pulumi_gcp/firebase/android_app.py +16 -21
- pulumi_gcp/firebase/app_check_app_attest_config.py +0 -5
- pulumi_gcp/firebase/app_check_debug_token.py +0 -5
- pulumi_gcp/firebase/app_check_device_check_config.py +0 -5
- pulumi_gcp/firebase/app_check_play_integrity_config.py +0 -5
- pulumi_gcp/firebase/app_check_recaptcha_enterprise_config.py +0 -5
- pulumi_gcp/firebase/app_check_recaptcha_v3_config.py +0 -5
- pulumi_gcp/firebase/app_check_service_config.py +0 -5
- pulumi_gcp/firebase/apple_app.py +10 -15
- pulumi_gcp/firebase/database_instance.py +0 -5
- pulumi_gcp/firebase/extensions_instance.py +25 -30
- pulumi_gcp/firebase/get_android_app.py +0 -5
- pulumi_gcp/firebase/get_android_app_config.py +0 -5
- pulumi_gcp/firebase/get_apple_app.py +0 -5
- pulumi_gcp/firebase/get_apple_app_config.py +0 -5
- pulumi_gcp/firebase/get_hosting_channel.py +0 -5
- pulumi_gcp/firebase/get_web_app.py +0 -5
- pulumi_gcp/firebase/get_web_app_config.py +0 -5
- pulumi_gcp/firebase/hosting_channel.py +0 -5
- pulumi_gcp/firebase/hosting_custom_domain.py +34 -39
- pulumi_gcp/firebase/hosting_release.py +28 -33
- pulumi_gcp/firebase/hosting_site.py +0 -5
- pulumi_gcp/firebase/hosting_version.py +71 -76
- pulumi_gcp/firebase/outputs.py +0 -5
- pulumi_gcp/firebase/project.py +0 -5
- pulumi_gcp/firebase/storage_bucket.py +0 -5
- pulumi_gcp/firebase/web_app.py +10 -15
- pulumi_gcp/firebaserules/_inputs.py +0 -51
- pulumi_gcp/firebaserules/outputs.py +0 -5
- pulumi_gcp/firebaserules/release.py +0 -5
- pulumi_gcp/firebaserules/ruleset.py +35 -40
- pulumi_gcp/firestore/_inputs.py +0 -154
- pulumi_gcp/firestore/backup_schedule.py +18 -23
- pulumi_gcp/firestore/database.py +17 -22
- pulumi_gcp/firestore/document.py +0 -5
- pulumi_gcp/firestore/field.py +58 -63
- pulumi_gcp/firestore/index.py +67 -72
- pulumi_gcp/firestore/outputs.py +0 -5
- pulumi_gcp/folder/_inputs.py +0 -165
- pulumi_gcp/folder/access_approval_settings.py +23 -28
- pulumi_gcp/folder/get_iam_policy.py +0 -5
- pulumi_gcp/folder/get_organization_policy.py +0 -5
- pulumi_gcp/folder/iam_audit_config.py +125 -130
- pulumi_gcp/folder/iam_binding.py +3 -8
- pulumi_gcp/folder/iam_member.py +125 -130
- pulumi_gcp/folder/iam_policy.py +120 -125
- pulumi_gcp/folder/organization_policy.py +49 -54
- pulumi_gcp/folder/outputs.py +0 -5
- pulumi_gcp/gkebackup/_inputs.py +0 -694
- pulumi_gcp/gkebackup/backup_plan.py +431 -436
- pulumi_gcp/gkebackup/backup_plan_iam_binding.py +19 -24
- pulumi_gcp/gkebackup/backup_plan_iam_member.py +19 -24
- pulumi_gcp/gkebackup/backup_plan_iam_policy.py +16 -21
- pulumi_gcp/gkebackup/get_backup_plan_iam_policy.py +0 -5
- pulumi_gcp/gkebackup/get_restore_plan_iam_policy.py +0 -5
- pulumi_gcp/gkebackup/outputs.py +0 -5
- pulumi_gcp/gkebackup/restore_plan.py +575 -580
- pulumi_gcp/gkebackup/restore_plan_iam_binding.py +956 -336
- pulumi_gcp/gkebackup/restore_plan_iam_member.py +956 -336
- pulumi_gcp/gkebackup/restore_plan_iam_policy.py +953 -243
- pulumi_gcp/gkehub/_inputs.py +6 -1204
- pulumi_gcp/gkehub/feature.py +314 -319
- pulumi_gcp/gkehub/feature_iam_binding.py +19 -24
- pulumi_gcp/gkehub/feature_iam_member.py +19 -24
- pulumi_gcp/gkehub/feature_iam_policy.py +16 -21
- pulumi_gcp/gkehub/feature_membership.py +179 -184
- pulumi_gcp/gkehub/fleet.py +19 -24
- pulumi_gcp/gkehub/get_feature_iam_policy.py +0 -5
- pulumi_gcp/gkehub/get_membership_iam_policy.py +0 -5
- pulumi_gcp/gkehub/get_scope_iam_policy.py +0 -5
- pulumi_gcp/gkehub/membership.py +52 -57
- pulumi_gcp/gkehub/membership_binding.py +12 -17
- pulumi_gcp/gkehub/membership_iam_binding.py +19 -24
- pulumi_gcp/gkehub/membership_iam_member.py +19 -24
- pulumi_gcp/gkehub/membership_iam_policy.py +16 -21
- pulumi_gcp/gkehub/membership_rbac_role_binding.py +23 -28
- pulumi_gcp/gkehub/namespace.py +2 -7
- pulumi_gcp/gkehub/outputs.py +0 -5
- pulumi_gcp/gkehub/scope.py +2 -7
- pulumi_gcp/gkehub/scope_iam_binding.py +19 -24
- pulumi_gcp/gkehub/scope_iam_member.py +19 -24
- pulumi_gcp/gkehub/scope_iam_policy.py +16 -21
- pulumi_gcp/gkehub/scope_rbac_role_binding.py +13 -18
- pulumi_gcp/gkeonprem/_inputs.py +17 -2317
- pulumi_gcp/gkeonprem/bare_metal_admin_cluster.py +330 -335
- pulumi_gcp/gkeonprem/bare_metal_cluster.py +523 -528
- pulumi_gcp/gkeonprem/bare_metal_node_pool.py +257 -262
- pulumi_gcp/gkeonprem/outputs.py +0 -5
- pulumi_gcp/gkeonprem/v_mware_cluster.py +394 -399
- pulumi_gcp/gkeonprem/v_mware_node_pool.py +84 -89
- pulumi_gcp/healthcare/_inputs.py +0 -359
- pulumi_gcp/healthcare/consent_store.py +0 -5
- pulumi_gcp/healthcare/consent_store_iam_binding.py +19 -24
- pulumi_gcp/healthcare/consent_store_iam_member.py +19 -24
- pulumi_gcp/healthcare/consent_store_iam_policy.py +16 -21
- pulumi_gcp/healthcare/dataset.py +0 -115
- pulumi_gcp/healthcare/dataset_iam_binding.py +19 -24
- pulumi_gcp/healthcare/dataset_iam_member.py +19 -24
- pulumi_gcp/healthcare/dataset_iam_policy.py +16 -21
- pulumi_gcp/healthcare/dicom_store.py +34 -39
- pulumi_gcp/healthcare/dicom_store_iam_binding.py +19 -24
- pulumi_gcp/healthcare/dicom_store_iam_member.py +19 -24
- pulumi_gcp/healthcare/dicom_store_iam_policy.py +16 -21
- pulumi_gcp/healthcare/fhir_store.py +57 -62
- pulumi_gcp/healthcare/fhir_store_iam_binding.py +19 -24
- pulumi_gcp/healthcare/fhir_store_iam_member.py +19 -24
- pulumi_gcp/healthcare/fhir_store_iam_policy.py +16 -21
- pulumi_gcp/healthcare/get_consent_store_iam_policy.py +0 -5
- pulumi_gcp/healthcare/get_dataset_iam_policy.py +0 -5
- pulumi_gcp/healthcare/get_dicom_store_iam_policy.py +0 -5
- pulumi_gcp/healthcare/get_fhir_store_iam_policy.py +0 -5
- pulumi_gcp/healthcare/get_hl7_v2_store_iam_policy.py +0 -5
- pulumi_gcp/healthcare/hl7_store.py +41 -46
- pulumi_gcp/healthcare/hl7_store_iam_binding.py +19 -24
- pulumi_gcp/healthcare/hl7_store_iam_member.py +19 -24
- pulumi_gcp/healthcare/hl7_store_iam_policy.py +16 -21
- pulumi_gcp/healthcare/outputs.py +0 -48
- pulumi_gcp/iam/_inputs.py +0 -433
- pulumi_gcp/iam/access_boundary_policy.py +49 -54
- pulumi_gcp/iam/deny_policy.py +51 -56
- pulumi_gcp/iam/get_rule.py +0 -5
- pulumi_gcp/iam/get_testable_permissions.py +0 -5
- pulumi_gcp/iam/get_workload_identity_pool.py +0 -5
- pulumi_gcp/iam/get_workload_identity_pool_provider.py +0 -5
- pulumi_gcp/iam/outputs.py +0 -5
- pulumi_gcp/iam/workforce_pool.py +17 -22
- pulumi_gcp/iam/workforce_pool_provider.py +179 -184
- pulumi_gcp/iam/workload_identity_pool.py +0 -5
- pulumi_gcp/iam/workload_identity_pool_provider.py +63 -68
- pulumi_gcp/iap/_inputs.py +0 -411
- pulumi_gcp/iap/app_engine_service_iam_binding.py +97 -102
- pulumi_gcp/iap/app_engine_service_iam_member.py +97 -102
- pulumi_gcp/iap/app_engine_service_iam_policy.py +92 -97
- pulumi_gcp/iap/app_engine_version_iam_binding.py +97 -102
- pulumi_gcp/iap/app_engine_version_iam_member.py +97 -102
- pulumi_gcp/iap/app_engine_version_iam_policy.py +92 -97
- pulumi_gcp/iap/brand.py +0 -5
- pulumi_gcp/iap/client.py +0 -5
- pulumi_gcp/iap/get_app_engine_service_iam_policy.py +0 -5
- pulumi_gcp/iap/get_app_engine_version_iam_policy.py +0 -5
- pulumi_gcp/iap/get_client.py +0 -5
- pulumi_gcp/iap/get_tunnel_dest_group_iam_policy.py +0 -5
- pulumi_gcp/iap/get_tunnel_iam_policy.py +0 -5
- pulumi_gcp/iap/get_tunnel_instance_iam_policy.py +0 -5
- pulumi_gcp/iap/get_web_backend_service_iam_policy.py +0 -5
- pulumi_gcp/iap/get_web_iam_policy.py +0 -5
- pulumi_gcp/iap/get_web_region_backend_service_iam_policy.py +0 -5
- pulumi_gcp/iap/get_web_type_app_engine_iam_policy.py +0 -5
- pulumi_gcp/iap/get_web_type_compute_iam_policy.py +0 -5
- pulumi_gcp/iap/outputs.py +0 -5
- pulumi_gcp/iap/tunnel_dest_group.py +0 -5
- pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +97 -102
- pulumi_gcp/iap/tunnel_dest_group_iam_member.py +97 -102
- pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +92 -97
- pulumi_gcp/iap/tunnel_iam_binding.py +97 -102
- pulumi_gcp/iap/tunnel_iam_member.py +97 -102
- pulumi_gcp/iap/tunnel_iam_policy.py +92 -97
- pulumi_gcp/iap/tunnel_instance_iam_binding.py +97 -102
- pulumi_gcp/iap/tunnel_instance_iam_member.py +97 -102
- pulumi_gcp/iap/tunnel_instance_iam_policy.py +92 -97
- pulumi_gcp/iap/web_backend_service_iam_binding.py +97 -102
- pulumi_gcp/iap/web_backend_service_iam_member.py +97 -102
- pulumi_gcp/iap/web_backend_service_iam_policy.py +92 -97
- pulumi_gcp/iap/web_iam_binding.py +97 -102
- pulumi_gcp/iap/web_iam_member.py +97 -102
- pulumi_gcp/iap/web_iam_policy.py +92 -97
- pulumi_gcp/iap/web_region_backend_service_iam_binding.py +97 -102
- pulumi_gcp/iap/web_region_backend_service_iam_member.py +97 -102
- pulumi_gcp/iap/web_region_backend_service_iam_policy.py +92 -97
- pulumi_gcp/iap/web_type_app_enging_iam_binding.py +97 -102
- pulumi_gcp/iap/web_type_app_enging_iam_member.py +97 -102
- pulumi_gcp/iap/web_type_app_enging_iam_policy.py +92 -97
- pulumi_gcp/iap/web_type_compute_iam_binding.py +97 -102
- pulumi_gcp/iap/web_type_compute_iam_member.py +97 -102
- pulumi_gcp/iap/web_type_compute_iam_policy.py +92 -97
- pulumi_gcp/identityplatform/_inputs.py +0 -576
- pulumi_gcp/identityplatform/config.py +115 -120
- pulumi_gcp/identityplatform/default_supported_idp_config.py +0 -5
- pulumi_gcp/identityplatform/inbound_saml_config.py +34 -39
- pulumi_gcp/identityplatform/oauth_idp_config.py +0 -5
- pulumi_gcp/identityplatform/outputs.py +0 -5
- pulumi_gcp/identityplatform/project_default_config.py +33 -38
- pulumi_gcp/identityplatform/tenant.py +0 -5
- pulumi_gcp/identityplatform/tenant_default_supported_idp_config.py +0 -5
- pulumi_gcp/identityplatform/tenant_inbound_saml_config.py +34 -39
- pulumi_gcp/identityplatform/tenant_oauth_idp_config.py +0 -5
- pulumi_gcp/integrationconnectors/_inputs.py +0 -868
- pulumi_gcp/integrationconnectors/connection.py +460 -465
- pulumi_gcp/integrationconnectors/endpoint_attachment.py +0 -5
- pulumi_gcp/integrationconnectors/managed_zone.py +10 -15
- pulumi_gcp/integrationconnectors/outputs.py +0 -5
- pulumi_gcp/kms/_inputs.py +0 -303
- pulumi_gcp/kms/autokey_config.py +0 -5
- pulumi_gcp/kms/crypto_key.py +13 -18
- pulumi_gcp/kms/crypto_key_iam_binding.py +51 -56
- pulumi_gcp/kms/crypto_key_iam_member.py +51 -56
- pulumi_gcp/kms/crypto_key_iam_policy.py +46 -51
- pulumi_gcp/kms/crypto_key_version.py +7 -12
- pulumi_gcp/kms/ekm_connection.py +19 -24
- pulumi_gcp/kms/get_crypto_key_iam_policy.py +0 -5
- pulumi_gcp/kms/get_key_ring_iam_policy.py +0 -5
- pulumi_gcp/kms/get_kms_crypto_key.py +0 -5
- pulumi_gcp/kms/get_kms_crypto_key_version.py +0 -5
- pulumi_gcp/kms/get_kms_key_ring.py +0 -5
- pulumi_gcp/kms/get_kms_secret.py +6 -11
- pulumi_gcp/kms/get_kms_secret_asymmetric.py +12 -17
- pulumi_gcp/kms/get_kms_secret_ciphertext.py +18 -23
- pulumi_gcp/kms/key_handle.py +0 -5
- pulumi_gcp/kms/key_ring.py +0 -5
- pulumi_gcp/kms/key_ring_iam_binding.py +97 -102
- pulumi_gcp/kms/key_ring_iam_member.py +97 -102
- pulumi_gcp/kms/key_ring_iam_policy.py +92 -97
- pulumi_gcp/kms/key_ring_import_job.py +4 -9
- pulumi_gcp/kms/outputs.py +0 -5
- pulumi_gcp/kms/secret_ciphertext.py +18 -23
- pulumi_gcp/logging/_inputs.py +0 -520
- pulumi_gcp/logging/billing_account_bucket_config.py +11 -16
- pulumi_gcp/logging/billing_account_exclusion.py +0 -5
- pulumi_gcp/logging/billing_account_sink.py +10 -15
- pulumi_gcp/logging/folder_bucket_config.py +11 -16
- pulumi_gcp/logging/folder_exclusion.py +0 -5
- pulumi_gcp/logging/folder_settings.py +0 -5
- pulumi_gcp/logging/folder_sink.py +10 -15
- pulumi_gcp/logging/get_folder_settings.py +0 -5
- pulumi_gcp/logging/get_log_view_iam_policy.py +0 -5
- pulumi_gcp/logging/get_organization_settings.py +0 -5
- pulumi_gcp/logging/get_project_cmek_settings.py +0 -5
- pulumi_gcp/logging/get_project_settings.py +0 -5
- pulumi_gcp/logging/get_sink.py +0 -5
- pulumi_gcp/logging/linked_dataset.py +5 -10
- pulumi_gcp/logging/log_view.py +0 -5
- pulumi_gcp/logging/log_view_iam_binding.py +5 -10
- pulumi_gcp/logging/log_view_iam_member.py +5 -10
- pulumi_gcp/logging/log_view_iam_policy.py +0 -5
- pulumi_gcp/logging/metric.py +92 -97
- pulumi_gcp/logging/organization_bucket_config.py +11 -16
- pulumi_gcp/logging/organization_exclusion.py +0 -5
- pulumi_gcp/logging/organization_settings.py +0 -5
- pulumi_gcp/logging/organization_sink.py +10 -15
- pulumi_gcp/logging/outputs.py +0 -5
- pulumi_gcp/logging/project_bucket_config.py +16 -21
- pulumi_gcp/logging/project_exclusion.py +0 -5
- pulumi_gcp/logging/project_sink.py +10 -15
- pulumi_gcp/looker/_inputs.py +0 -211
- pulumi_gcp/looker/instance.py +199 -204
- pulumi_gcp/looker/outputs.py +0 -5
- pulumi_gcp/managedkafka/_inputs.py +0 -69
- pulumi_gcp/managedkafka/cluster.py +67 -72
- pulumi_gcp/managedkafka/outputs.py +0 -5
- pulumi_gcp/managedkafka/topic.py +22 -27
- pulumi_gcp/memcache/_inputs.py +0 -184
- pulumi_gcp/memcache/instance.py +51 -56
- pulumi_gcp/memcache/outputs.py +0 -5
- pulumi_gcp/migrationcenter/_inputs.py +0 -182
- pulumi_gcp/migrationcenter/group.py +0 -5
- pulumi_gcp/migrationcenter/outputs.py +0 -5
- pulumi_gcp/migrationcenter/preference_set.py +77 -82
- pulumi_gcp/ml/_inputs.py +0 -17
- pulumi_gcp/ml/engine_model.py +5 -10
- pulumi_gcp/ml/outputs.py +0 -5
- pulumi_gcp/monitoring/_inputs.py +15 -1731
- pulumi_gcp/monitoring/alert_policy.py +123 -128
- pulumi_gcp/monitoring/custom_service.py +11 -16
- pulumi_gcp/monitoring/dashboard.py +0 -5
- pulumi_gcp/monitoring/generic_service.py +15 -20
- pulumi_gcp/monitoring/get_app_engine_service.py +16 -21
- pulumi_gcp/monitoring/get_cluster_istio_service.py +0 -5
- pulumi_gcp/monitoring/get_istio_canonical_service.py +0 -5
- pulumi_gcp/monitoring/get_mesh_istio_service.py +0 -5
- pulumi_gcp/monitoring/get_notification_channel.py +24 -29
- pulumi_gcp/monitoring/get_secret_version.py +0 -5
- pulumi_gcp/monitoring/get_uptime_check_i_ps.py +0 -5
- pulumi_gcp/monitoring/group.py +0 -5
- pulumi_gcp/monitoring/metric_descriptor.py +44 -49
- pulumi_gcp/monitoring/monitored_project.py +0 -5
- pulumi_gcp/monitoring/notification_channel.py +11 -16
- pulumi_gcp/monitoring/outputs.py +0 -68
- pulumi_gcp/monitoring/slo.py +115 -120
- pulumi_gcp/monitoring/uptime_check_config.py +236 -241
- pulumi_gcp/netapp/_inputs.py +0 -311
- pulumi_gcp/netapp/active_directory.py +0 -5
- pulumi_gcp/netapp/backup.py +6 -11
- pulumi_gcp/netapp/backup_policy.py +0 -5
- pulumi_gcp/netapp/backup_vault.py +0 -5
- pulumi_gcp/netapp/kmsconfig.py +0 -5
- pulumi_gcp/netapp/outputs.py +0 -5
- pulumi_gcp/netapp/storage_pool.py +0 -5
- pulumi_gcp/netapp/volume.py +22 -27
- pulumi_gcp/netapp/volume_replication.py +19 -24
- pulumi_gcp/netapp/volume_snapshot.py +0 -5
- pulumi_gcp/networkconnectivity/_inputs.py +0 -253
- pulumi_gcp/networkconnectivity/hub.py +2 -7
- pulumi_gcp/networkconnectivity/internal_range.py +0 -5
- pulumi_gcp/networkconnectivity/outputs.py +0 -5
- pulumi_gcp/networkconnectivity/policy_based_route.py +41 -46
- pulumi_gcp/networkconnectivity/regional_endpoint.py +0 -5
- pulumi_gcp/networkconnectivity/service_connection_policy.py +15 -20
- pulumi_gcp/networkconnectivity/spoke.py +66 -71
- pulumi_gcp/networkmanagement/_inputs.py +0 -87
- pulumi_gcp/networkmanagement/connectivity_test.py +80 -85
- pulumi_gcp/networkmanagement/outputs.py +0 -5
- pulumi_gcp/networksecurity/_inputs.py +0 -321
- pulumi_gcp/networksecurity/address_group.py +0 -5
- pulumi_gcp/networksecurity/address_group_iam_binding.py +5 -297
- pulumi_gcp/networksecurity/address_group_iam_member.py +5 -297
- pulumi_gcp/networksecurity/address_group_iam_policy.py +0 -5
- pulumi_gcp/networksecurity/authorization_policy.py +47 -52
- pulumi_gcp/networksecurity/client_tls_policy.py +40 -45
- pulumi_gcp/networksecurity/firewall_endpoint.py +0 -5
- pulumi_gcp/networksecurity/firewall_endpoint_association.py +0 -5
- pulumi_gcp/networksecurity/gateway_security_policy.py +86 -91
- pulumi_gcp/networksecurity/gateway_security_policy_rule.py +0 -5
- pulumi_gcp/networksecurity/get_address_group_iam_policy.py +0 -5
- pulumi_gcp/networksecurity/outputs.py +0 -5
- pulumi_gcp/networksecurity/security_profile.py +35 -40
- pulumi_gcp/networksecurity/security_profile_group.py +0 -5
- pulumi_gcp/networksecurity/server_tls_policy.py +96 -101
- pulumi_gcp/networksecurity/tls_inspection_policy.py +188 -193
- pulumi_gcp/networksecurity/url_list.py +0 -5
- pulumi_gcp/networkservices/_inputs.py +31 -1783
- pulumi_gcp/networkservices/edge_cache_keyset.py +46 -51
- pulumi_gcp/networkservices/edge_cache_origin.py +84 -89
- pulumi_gcp/networkservices/edge_cache_service.py +562 -567
- pulumi_gcp/networkservices/endpoint_policy.py +50 -55
- pulumi_gcp/networkservices/gateway.py +16 -21
- pulumi_gcp/networkservices/grpc_route.py +141 -146
- pulumi_gcp/networkservices/http_route.py +289 -294
- pulumi_gcp/networkservices/lb_route_extension.py +5 -10
- pulumi_gcp/networkservices/lb_traffic_extension.py +5 -10
- pulumi_gcp/networkservices/mesh.py +0 -5
- pulumi_gcp/networkservices/outputs.py +0 -5
- pulumi_gcp/networkservices/service_binding.py +0 -5
- pulumi_gcp/networkservices/service_lb_policies.py +22 -27
- pulumi_gcp/networkservices/tcp_route.py +101 -106
- pulumi_gcp/networkservices/tls_route.py +77 -82
- pulumi_gcp/notebooks/_inputs.py +0 -615
- pulumi_gcp/notebooks/environment.py +16 -21
- pulumi_gcp/notebooks/get_instance_iam_policy.py +0 -5
- pulumi_gcp/notebooks/get_runtime_iam_policy.py +0 -5
- pulumi_gcp/notebooks/instance.py +73 -78
- pulumi_gcp/notebooks/instance_iam_binding.py +19 -24
- pulumi_gcp/notebooks/instance_iam_member.py +19 -24
- pulumi_gcp/notebooks/instance_iam_policy.py +16 -21
- pulumi_gcp/notebooks/location.py +0 -5
- pulumi_gcp/notebooks/outputs.py +0 -5
- pulumi_gcp/notebooks/runtime.py +217 -222
- pulumi_gcp/notebooks/runtime_iam_binding.py +19 -24
- pulumi_gcp/notebooks/runtime_iam_member.py +19 -24
- pulumi_gcp/notebooks/runtime_iam_policy.py +16 -21
- pulumi_gcp/organizations/_inputs.py +0 -231
- pulumi_gcp/organizations/access_approval_settings.py +31 -36
- pulumi_gcp/organizations/folder.py +0 -5
- pulumi_gcp/organizations/get_active_folder.py +0 -5
- pulumi_gcp/organizations/get_billing_account.py +0 -5
- pulumi_gcp/organizations/get_client_config.py +0 -5
- pulumi_gcp/organizations/get_client_open_id_user_info.py +0 -5
- pulumi_gcp/organizations/get_folder.py +0 -5
- pulumi_gcp/organizations/get_folders.py +0 -5
- pulumi_gcp/organizations/get_iam_policy.py +8 -13
- pulumi_gcp/organizations/get_organization.py +0 -5
- pulumi_gcp/organizations/get_project.py +0 -5
- pulumi_gcp/organizations/iam_audit_config.py +13 -18
- pulumi_gcp/organizations/iam_binding.py +3 -8
- pulumi_gcp/organizations/iam_custom_role.py +0 -5
- pulumi_gcp/organizations/iam_member.py +125 -130
- pulumi_gcp/organizations/iam_policy.py +120 -125
- pulumi_gcp/organizations/outputs.py +0 -5
- pulumi_gcp/organizations/policy.py +49 -54
- pulumi_gcp/organizations/project.py +0 -5
- pulumi_gcp/orgpolicy/_inputs.py +0 -183
- pulumi_gcp/orgpolicy/custom_constraint.py +10 -15
- pulumi_gcp/orgpolicy/outputs.py +0 -5
- pulumi_gcp/orgpolicy/policy.py +98 -103
- pulumi_gcp/osconfig/_inputs.py +27 -2232
- pulumi_gcp/osconfig/guest_policies.py +166 -171
- pulumi_gcp/osconfig/os_policy_assignment.py +153 -158
- pulumi_gcp/osconfig/outputs.py +0 -5
- pulumi_gcp/osconfig/patch_deployment.py +321 -326
- pulumi_gcp/oslogin/ssh_public_key.py +0 -5
- pulumi_gcp/parallelstore/instance.py +0 -5
- pulumi_gcp/privilegedaccessmanager/_inputs.py +0 -170
- pulumi_gcp/privilegedaccessmanager/entitlement.py +89 -94
- pulumi_gcp/privilegedaccessmanager/outputs.py +0 -5
- pulumi_gcp/projects/_inputs.py +0 -262
- pulumi_gcp/projects/access_approval_settings.py +25 -30
- pulumi_gcp/projects/api_key.py +83 -88
- pulumi_gcp/projects/default_service_accounts.py +0 -5
- pulumi_gcp/projects/get_iam_policy.py +0 -5
- pulumi_gcp/projects/get_organization_policy.py +0 -5
- pulumi_gcp/projects/get_project.py +0 -5
- pulumi_gcp/projects/get_project_service.py +0 -5
- pulumi_gcp/projects/iam_audit_config.py +125 -130
- pulumi_gcp/projects/iam_binding.py +125 -130
- pulumi_gcp/projects/iam_custom_role.py +0 -5
- pulumi_gcp/projects/iam_member.py +125 -130
- pulumi_gcp/projects/iam_member_remove.py +0 -5
- pulumi_gcp/projects/iam_policy.py +120 -125
- pulumi_gcp/projects/organization_policy.py +49 -54
- pulumi_gcp/projects/outputs.py +0 -5
- pulumi_gcp/projects/service.py +0 -5
- pulumi_gcp/projects/service_identity.py +0 -5
- pulumi_gcp/projects/usage_export_bucket.py +0 -5
- pulumi_gcp/provider.py +2 -7
- pulumi_gcp/pubsub/_inputs.py +0 -438
- pulumi_gcp/pubsub/get_schema_iam_policy.py +0 -5
- pulumi_gcp/pubsub/get_subscription.py +0 -5
- pulumi_gcp/pubsub/get_subscription_iam_policy.py +0 -5
- pulumi_gcp/pubsub/get_topic.py +0 -5
- pulumi_gcp/pubsub/get_topic_iam_policy.py +0 -5
- pulumi_gcp/pubsub/lite_reservation.py +0 -5
- pulumi_gcp/pubsub/lite_subscription.py +31 -36
- pulumi_gcp/pubsub/lite_topic.py +41 -46
- pulumi_gcp/pubsub/outputs.py +0 -5
- pulumi_gcp/pubsub/schema.py +8 -13
- pulumi_gcp/pubsub/schema_iam_binding.py +19 -24
- pulumi_gcp/pubsub/schema_iam_member.py +19 -24
- pulumi_gcp/pubsub/schema_iam_policy.py +16 -21
- pulumi_gcp/pubsub/subscription.py +136 -141
- pulumi_gcp/pubsub/subscription_iam_binding.py +19 -24
- pulumi_gcp/pubsub/subscription_iam_member.py +19 -24
- pulumi_gcp/pubsub/subscription_iam_policy.py +16 -21
- pulumi_gcp/pubsub/topic.py +45 -50
- pulumi_gcp/pubsub/topic_iam_binding.py +19 -24
- pulumi_gcp/pubsub/topic_iam_member.py +19 -24
- pulumi_gcp/pubsub/topic_iam_policy.py +16 -21
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/recaptcha/_inputs.py +0 -89
- pulumi_gcp/recaptcha/enterprise_key.py +127 -132
- pulumi_gcp/recaptcha/outputs.py +0 -5
- pulumi_gcp/redis/_inputs.py +0 -321
- pulumi_gcp/redis/cluster.py +54 -59
- pulumi_gcp/redis/get_instance.py +0 -5
- pulumi_gcp/redis/instance.py +46 -51
- pulumi_gcp/redis/outputs.py +0 -5
- pulumi_gcp/resourcemanager/lien.py +0 -5
- pulumi_gcp/runtimeconfig/_inputs.py +0 -25
- pulumi_gcp/runtimeconfig/config.py +0 -5
- pulumi_gcp/runtimeconfig/config_iam_binding.py +3 -8
- pulumi_gcp/runtimeconfig/config_iam_member.py +3 -8
- pulumi_gcp/runtimeconfig/config_iam_policy.py +0 -5
- pulumi_gcp/runtimeconfig/get_config.py +0 -5
- pulumi_gcp/runtimeconfig/get_config_iam_policy.py +0 -5
- pulumi_gcp/runtimeconfig/get_variable.py +0 -5
- pulumi_gcp/runtimeconfig/outputs.py +0 -5
- pulumi_gcp/runtimeconfig/variable.py +0 -5
- pulumi_gcp/secretmanager/_inputs.py +0 -143
- pulumi_gcp/secretmanager/get_secret.py +0 -5
- pulumi_gcp/secretmanager/get_secret_iam_policy.py +0 -5
- pulumi_gcp/secretmanager/get_secret_version.py +0 -5
- pulumi_gcp/secretmanager/get_secret_version_access.py +0 -5
- pulumi_gcp/secretmanager/get_secrets.py +0 -5
- pulumi_gcp/secretmanager/outputs.py +0 -5
- pulumi_gcp/secretmanager/secret.py +63 -68
- pulumi_gcp/secretmanager/secret_iam_binding.py +97 -102
- pulumi_gcp/secretmanager/secret_iam_member.py +97 -102
- pulumi_gcp/secretmanager/secret_iam_policy.py +92 -97
- pulumi_gcp/secretmanager/secret_version.py +48 -53
- pulumi_gcp/securesourcemanager/_inputs.py +0 -75
- pulumi_gcp/securesourcemanager/get_instance_iam_policy.py +0 -5
- pulumi_gcp/securesourcemanager/instance.py +73 -78
- pulumi_gcp/securesourcemanager/instance_iam_binding.py +3 -8
- pulumi_gcp/securesourcemanager/instance_iam_member.py +3 -8
- pulumi_gcp/securesourcemanager/instance_iam_policy.py +0 -5
- pulumi_gcp/securesourcemanager/outputs.py +0 -5
- pulumi_gcp/securitycenter/_inputs.py +9 -862
- pulumi_gcp/securitycenter/event_threat_detection_custom_module.py +0 -5
- pulumi_gcp/securitycenter/folder_custom_module.py +77 -82
- pulumi_gcp/securitycenter/get_source_iam_policy.py +0 -5
- pulumi_gcp/securitycenter/instance_iam_binding.py +33 -102
- pulumi_gcp/securitycenter/instance_iam_member.py +33 -102
- pulumi_gcp/securitycenter/instance_iam_policy.py +30 -99
- pulumi_gcp/securitycenter/management_folder_security_health_analytics_custom_module.py +77 -82
- pulumi_gcp/securitycenter/management_organization_event_threat_detection_custom_module.py +0 -5
- pulumi_gcp/securitycenter/management_organization_security_health_analytics_custom_module.py +77 -82
- pulumi_gcp/securitycenter/management_project_security_health_analytics_custom_module.py +77 -82
- pulumi_gcp/securitycenter/mute_config.py +0 -5
- pulumi_gcp/securitycenter/notification_config.py +11 -16
- pulumi_gcp/securitycenter/organization_custom_module.py +77 -82
- pulumi_gcp/securitycenter/outputs.py +0 -5
- pulumi_gcp/securitycenter/project_custom_module.py +77 -82
- pulumi_gcp/securitycenter/source.py +0 -5
- pulumi_gcp/securitycenter/source_iam_binding.py +3 -8
- pulumi_gcp/securitycenter/source_iam_member.py +3 -8
- pulumi_gcp/securitycenter/source_iam_policy.py +0 -5
- pulumi_gcp/securityposture/_inputs.py +0 -457
- pulumi_gcp/securityposture/outputs.py +0 -5
- pulumi_gcp/securityposture/posture.py +181 -186
- pulumi_gcp/securityposture/posture_deployment.py +30 -35
- pulumi_gcp/serviceaccount/_inputs.py +0 -51
- pulumi_gcp/serviceaccount/account.py +0 -5
- pulumi_gcp/serviceaccount/get_account.py +0 -5
- pulumi_gcp/serviceaccount/get_account_access_token.py +0 -5
- pulumi_gcp/serviceaccount/get_account_id_token.py +0 -5
- pulumi_gcp/serviceaccount/get_account_jwt.py +0 -5
- pulumi_gcp/serviceaccount/get_account_key.py +0 -5
- pulumi_gcp/serviceaccount/get_iam_policy.py +0 -5
- pulumi_gcp/serviceaccount/iam_binding.py +61 -66
- pulumi_gcp/serviceaccount/iam_member.py +61 -66
- pulumi_gcp/serviceaccount/iam_policy.py +56 -61
- pulumi_gcp/serviceaccount/key.py +0 -5
- pulumi_gcp/serviceaccount/outputs.py +0 -5
- pulumi_gcp/servicedirectory/_inputs.py +0 -43
- pulumi_gcp/servicedirectory/endpoint.py +0 -5
- pulumi_gcp/servicedirectory/get_namespace_iam_policy.py +0 -5
- pulumi_gcp/servicedirectory/get_service_iam_policy.py +0 -5
- pulumi_gcp/servicedirectory/namespace.py +0 -5
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +19 -24
- pulumi_gcp/servicedirectory/namespace_iam_member.py +19 -24
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +16 -21
- pulumi_gcp/servicedirectory/outputs.py +0 -5
- pulumi_gcp/servicedirectory/service.py +0 -5
- pulumi_gcp/servicedirectory/service_iam_binding.py +19 -24
- pulumi_gcp/servicedirectory/service_iam_member.py +19 -24
- pulumi_gcp/servicedirectory/service_iam_policy.py +16 -21
- pulumi_gcp/servicenetworking/connection.py +0 -5
- pulumi_gcp/servicenetworking/get_peered_dns_domain.py +0 -5
- pulumi_gcp/servicenetworking/peered_dns_domain.py +0 -5
- pulumi_gcp/servicenetworking/vpc_service_controls.py +0 -5
- pulumi_gcp/serviceusage/consumer_quota_override.py +0 -5
- pulumi_gcp/sourcerepo/_inputs.py +0 -49
- pulumi_gcp/sourcerepo/get_repository.py +0 -5
- pulumi_gcp/sourcerepo/get_repository_iam_policy.py +0 -5
- pulumi_gcp/sourcerepo/outputs.py +0 -5
- pulumi_gcp/sourcerepo/repository.py +15 -20
- pulumi_gcp/sourcerepo/repository_iam_binding.py +102 -116
- pulumi_gcp/sourcerepo/repository_iam_member.py +102 -116
- pulumi_gcp/sourcerepo/repository_iam_policy.py +92 -106
- pulumi_gcp/spanner/_inputs.py +0 -157
- pulumi_gcp/spanner/database.py +5 -10
- pulumi_gcp/spanner/database_iam_binding.py +97 -102
- pulumi_gcp/spanner/database_iam_member.py +97 -102
- pulumi_gcp/spanner/database_iam_policy.py +92 -97
- pulumi_gcp/spanner/get_database_iam_policy.py +0 -5
- pulumi_gcp/spanner/get_instance.py +0 -5
- pulumi_gcp/spanner/get_instance_iam_policy.py +0 -5
- pulumi_gcp/spanner/instance.py +25 -30
- pulumi_gcp/spanner/instance_config.py +5 -10
- pulumi_gcp/spanner/instance_iam_binding.py +19 -24
- pulumi_gcp/spanner/instance_iam_member.py +19 -24
- pulumi_gcp/spanner/instance_iam_policy.py +16 -21
- pulumi_gcp/spanner/outputs.py +0 -5
- pulumi_gcp/sql/_inputs.py +0 -616
- pulumi_gcp/sql/database.py +12 -17
- pulumi_gcp/sql/database_instance.py +88 -93
- pulumi_gcp/sql/get_backup_run.py +0 -5
- pulumi_gcp/sql/get_ca_certs.py +0 -5
- pulumi_gcp/sql/get_database.py +0 -5
- pulumi_gcp/sql/get_database_instance.py +0 -5
- pulumi_gcp/sql/get_database_instance_latest_recovery_time.py +0 -5
- pulumi_gcp/sql/get_database_instances.py +0 -5
- pulumi_gcp/sql/get_databases.py +0 -5
- pulumi_gcp/sql/get_tiers.py +0 -5
- pulumi_gcp/sql/outputs.py +0 -5
- pulumi_gcp/sql/source_representation_instance.py +0 -5
- pulumi_gcp/sql/ssl_cert.py +6 -11
- pulumi_gcp/sql/user.py +38 -43
- pulumi_gcp/storage/__init__.py +0 -5
- pulumi_gcp/storage/_inputs.py +0 -958
- pulumi_gcp/storage/bucket.py +120 -125
- pulumi_gcp/storage/bucket_access_control.py +0 -5
- pulumi_gcp/storage/bucket_acl.py +0 -5
- pulumi_gcp/storage/bucket_iam_binding.py +97 -102
- pulumi_gcp/storage/bucket_iam_member.py +97 -102
- pulumi_gcp/storage/bucket_iam_policy.py +92 -97
- pulumi_gcp/storage/bucket_object.py +10 -15
- pulumi_gcp/storage/default_object_access_control.py +2 -7
- pulumi_gcp/storage/default_object_acl.py +0 -5
- pulumi_gcp/storage/get_bucket.py +0 -5
- pulumi_gcp/storage/get_bucket_iam_policy.py +0 -5
- pulumi_gcp/storage/get_bucket_object.py +0 -5
- pulumi_gcp/storage/get_bucket_object_content.py +0 -5
- pulumi_gcp/storage/get_bucket_objects.py +0 -5
- pulumi_gcp/storage/get_buckets.py +0 -5
- pulumi_gcp/storage/get_object_signed_url.py +0 -5
- pulumi_gcp/storage/get_project_service_account.py +6 -11
- pulumi_gcp/storage/get_transfer_project_service_account.py +0 -5
- pulumi_gcp/storage/get_transfer_project_servie_account.py +0 -5
- pulumi_gcp/storage/hmac_key.py +0 -5
- pulumi_gcp/storage/insights_report_config.py +71 -76
- pulumi_gcp/storage/notification.py +0 -5
- pulumi_gcp/storage/object_access_control.py +2 -7
- pulumi_gcp/storage/object_acl.py +0 -5
- pulumi_gcp/storage/outputs.py +0 -81
- pulumi_gcp/storage/transfer_agent_pool.py +11 -16
- pulumi_gcp/storage/transfer_job.py +108 -113
- pulumi_gcp/tags/_inputs.py +0 -43
- pulumi_gcp/tags/get_tag_key.py +0 -5
- pulumi_gcp/tags/get_tag_key_iam_policy.py +0 -5
- pulumi_gcp/tags/get_tag_keys.py +0 -5
- pulumi_gcp/tags/get_tag_value.py +0 -5
- pulumi_gcp/tags/get_tag_value_iam_policy.py +0 -5
- pulumi_gcp/tags/get_tag_values.py +0 -5
- pulumi_gcp/tags/location_tag_binding.py +0 -5
- pulumi_gcp/tags/outputs.py +0 -5
- pulumi_gcp/tags/tag_binding.py +0 -5
- pulumi_gcp/tags/tag_key.py +0 -5
- pulumi_gcp/tags/tag_key_iam_binding.py +19 -24
- pulumi_gcp/tags/tag_key_iam_member.py +19 -24
- pulumi_gcp/tags/tag_key_iam_policy.py +16 -21
- pulumi_gcp/tags/tag_value.py +0 -5
- pulumi_gcp/tags/tag_value_iam_binding.py +19 -24
- pulumi_gcp/tags/tag_value_iam_member.py +19 -24
- pulumi_gcp/tags/tag_value_iam_policy.py +16 -21
- pulumi_gcp/tpu/_inputs.py +0 -194
- pulumi_gcp/tpu/get_tensorflow_versions.py +0 -5
- pulumi_gcp/tpu/get_v2_accelerator_types.py +0 -5
- pulumi_gcp/tpu/get_v2_runtime_versions.py +0 -5
- pulumi_gcp/tpu/node.py +13 -18
- pulumi_gcp/tpu/outputs.py +0 -5
- pulumi_gcp/tpu/v2_vm.py +82 -87
- pulumi_gcp/vertex/_inputs.py +2 -843
- pulumi_gcp/vertex/ai_dataset.py +5 -10
- pulumi_gcp/vertex/ai_deployment_resource_pool.py +31 -36
- pulumi_gcp/vertex/ai_endpoint.py +13 -18
- pulumi_gcp/vertex/ai_endpoint_iam_binding.py +3 -8
- pulumi_gcp/vertex/ai_endpoint_iam_member.py +3 -8
- pulumi_gcp/vertex/ai_endpoint_iam_policy.py +0 -5
- pulumi_gcp/vertex/ai_feature_group.py +17 -22
- pulumi_gcp/vertex/ai_feature_group_feature.py +12 -17
- pulumi_gcp/vertex/ai_feature_online_store.py +75 -80
- pulumi_gcp/vertex/ai_feature_online_store_featureview.py +146 -151
- pulumi_gcp/vertex/ai_feature_store.py +52 -57
- pulumi_gcp/vertex/ai_feature_store_entity_type.py +87 -92
- pulumi_gcp/vertex/ai_feature_store_entity_type_feature.py +36 -41
- pulumi_gcp/vertex/ai_feature_store_entity_type_iam_binding.py +3 -8
- pulumi_gcp/vertex/ai_feature_store_entity_type_iam_member.py +3 -8
- pulumi_gcp/vertex/ai_feature_store_entity_type_iam_policy.py +0 -5
- pulumi_gcp/vertex/ai_feature_store_iam_binding.py +3 -8
- pulumi_gcp/vertex/ai_feature_store_iam_member.py +3 -8
- pulumi_gcp/vertex/ai_feature_store_iam_policy.py +0 -5
- pulumi_gcp/vertex/ai_index.py +63 -68
- pulumi_gcp/vertex/ai_index_endpoint.py +13 -18
- pulumi_gcp/vertex/ai_metadata_store.py +7 -12
- pulumi_gcp/vertex/ai_tensorboard.py +11 -16
- pulumi_gcp/vertex/get_ai_endpoint_iam_policy.py +0 -5
- pulumi_gcp/vertex/get_ai_featurestore_entitytype_iam_policy.py +0 -5
- pulumi_gcp/vertex/get_ai_featurestore_iam_policy.py +0 -5
- pulumi_gcp/vertex/get_ai_index.py +0 -5
- pulumi_gcp/vertex/outputs.py +2 -7
- pulumi_gcp/vmwareengine/_inputs.py +0 -290
- pulumi_gcp/vmwareengine/cluster.py +69 -74
- pulumi_gcp/vmwareengine/external_access_rule.py +56 -61
- pulumi_gcp/vmwareengine/external_address.py +22 -27
- pulumi_gcp/vmwareengine/get_cluster.py +0 -5
- pulumi_gcp/vmwareengine/get_external_access_rule.py +0 -5
- pulumi_gcp/vmwareengine/get_external_address.py +0 -5
- pulumi_gcp/vmwareengine/get_network.py +0 -5
- pulumi_gcp/vmwareengine/get_network_peering.py +0 -5
- pulumi_gcp/vmwareengine/get_network_policy.py +0 -5
- pulumi_gcp/vmwareengine/get_nsx_credentials.py +0 -5
- pulumi_gcp/vmwareengine/get_private_cloud.py +0 -5
- pulumi_gcp/vmwareengine/get_subnet.py +0 -5
- pulumi_gcp/vmwareengine/get_vcenter_credentials.py +0 -5
- pulumi_gcp/vmwareengine/network.py +2 -7
- pulumi_gcp/vmwareengine/network_peering.py +0 -5
- pulumi_gcp/vmwareengine/network_policy.py +22 -27
- pulumi_gcp/vmwareengine/outputs.py +0 -5
- pulumi_gcp/vmwareengine/private_cloud.py +62 -67
- pulumi_gcp/vmwareengine/subnet.py +24 -29
- pulumi_gcp/vpcaccess/_inputs.py +0 -22
- pulumi_gcp/vpcaccess/connector.py +11 -16
- pulumi_gcp/vpcaccess/get_connector.py +0 -5
- pulumi_gcp/vpcaccess/outputs.py +0 -5
- pulumi_gcp/workbench/_inputs.py +0 -319
- pulumi_gcp/workbench/get_instance_iam_policy.py +0 -5
- pulumi_gcp/workbench/instance.py +139 -144
- pulumi_gcp/workbench/instance_iam_binding.py +3 -8
- pulumi_gcp/workbench/instance_iam_member.py +3 -8
- pulumi_gcp/workbench/instance_iam_policy.py +0 -5
- pulumi_gcp/workbench/outputs.py +0 -5
- pulumi_gcp/workflows/workflow.py +0 -5
- pulumi_gcp/workstations/_inputs.py +0 -433
- pulumi_gcp/workstations/get_workstation_config_iam_policy.py +0 -5
- pulumi_gcp/workstations/get_workstation_iam_policy.py +0 -5
- pulumi_gcp/workstations/outputs.py +0 -5
- pulumi_gcp/workstations/workstation.py +14 -19
- pulumi_gcp/workstations/workstation_cluster.py +30 -35
- pulumi_gcp/workstations/workstation_config.py +246 -251
- pulumi_gcp/workstations/workstation_config_iam_binding.py +3 -8
- pulumi_gcp/workstations/workstation_config_iam_member.py +3 -8
- pulumi_gcp/workstations/workstation_config_iam_policy.py +0 -5
- pulumi_gcp/workstations/workstation_iam_binding.py +3 -8
- pulumi_gcp/workstations/workstation_iam_member.py +3 -8
- pulumi_gcp/workstations/workstation_iam_policy.py +0 -5
- {pulumi_gcp-7.30.0.dist-info → pulumi_gcp-7.30.0a1719470057.dist-info}/METADATA +1 -2
- pulumi_gcp-7.30.0a1719470057.dist-info/RECORD +1600 -0
- {pulumi_gcp-7.30.0.dist-info → pulumi_gcp-7.30.0a1719470057.dist-info}/WHEEL +1 -1
- pulumi_gcp/storage/get_managed_folder_iam_policy.py +0 -115
- pulumi_gcp/storage/managed_folder.py +0 -440
- pulumi_gcp/storage/managed_folder_iam_binding.py +0 -947
- pulumi_gcp/storage/managed_folder_iam_member.py +0 -947
- pulumi_gcp/storage/managed_folder_iam_policy.py +0 -766
- pulumi_gcp-7.30.0.dist-info/RECORD +0 -1605
- {pulumi_gcp-7.30.0.dist-info → pulumi_gcp-7.30.0a1719470057.dist-info}/top_level.txt +0 -0
@@ -4,221 +4,104 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
18
13
|
'AccessLevelBasicArgs',
|
19
|
-
'AccessLevelBasicArgsDict',
|
20
14
|
'AccessLevelBasicConditionArgs',
|
21
|
-
'AccessLevelBasicConditionArgsDict',
|
22
15
|
'AccessLevelBasicConditionDevicePolicyArgs',
|
23
|
-
'AccessLevelBasicConditionDevicePolicyArgsDict',
|
24
16
|
'AccessLevelBasicConditionDevicePolicyOsConstraintArgs',
|
25
|
-
'AccessLevelBasicConditionDevicePolicyOsConstraintArgsDict',
|
26
17
|
'AccessLevelBasicConditionVpcNetworkSourceArgs',
|
27
|
-
'AccessLevelBasicConditionVpcNetworkSourceArgsDict',
|
28
18
|
'AccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgs',
|
29
|
-
'AccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgsDict',
|
30
19
|
'AccessLevelConditionDevicePolicyArgs',
|
31
|
-
'AccessLevelConditionDevicePolicyArgsDict',
|
32
20
|
'AccessLevelConditionDevicePolicyOsConstraintArgs',
|
33
|
-
'AccessLevelConditionDevicePolicyOsConstraintArgsDict',
|
34
21
|
'AccessLevelConditionVpcNetworkSourceArgs',
|
35
|
-
'AccessLevelConditionVpcNetworkSourceArgsDict',
|
36
22
|
'AccessLevelConditionVpcNetworkSourceVpcSubnetworkArgs',
|
37
|
-
'AccessLevelConditionVpcNetworkSourceVpcSubnetworkArgsDict',
|
38
23
|
'AccessLevelCustomArgs',
|
39
|
-
'AccessLevelCustomArgsDict',
|
40
24
|
'AccessLevelCustomExprArgs',
|
41
|
-
'AccessLevelCustomExprArgsDict',
|
42
25
|
'AccessLevelsAccessLevelArgs',
|
43
|
-
'AccessLevelsAccessLevelArgsDict',
|
44
26
|
'AccessLevelsAccessLevelBasicArgs',
|
45
|
-
'AccessLevelsAccessLevelBasicArgsDict',
|
46
27
|
'AccessLevelsAccessLevelBasicConditionArgs',
|
47
|
-
'AccessLevelsAccessLevelBasicConditionArgsDict',
|
48
28
|
'AccessLevelsAccessLevelBasicConditionDevicePolicyArgs',
|
49
|
-
'AccessLevelsAccessLevelBasicConditionDevicePolicyArgsDict',
|
50
29
|
'AccessLevelsAccessLevelBasicConditionDevicePolicyOsConstraintArgs',
|
51
|
-
'AccessLevelsAccessLevelBasicConditionDevicePolicyOsConstraintArgsDict',
|
52
30
|
'AccessLevelsAccessLevelBasicConditionVpcNetworkSourceArgs',
|
53
|
-
'AccessLevelsAccessLevelBasicConditionVpcNetworkSourceArgsDict',
|
54
31
|
'AccessLevelsAccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgs',
|
55
|
-
'AccessLevelsAccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgsDict',
|
56
32
|
'AccessLevelsAccessLevelCustomArgs',
|
57
|
-
'AccessLevelsAccessLevelCustomArgsDict',
|
58
33
|
'AccessLevelsAccessLevelCustomExprArgs',
|
59
|
-
'AccessLevelsAccessLevelCustomExprArgsDict',
|
60
34
|
'AccessPolicyIamBindingConditionArgs',
|
61
|
-
'AccessPolicyIamBindingConditionArgsDict',
|
62
35
|
'AccessPolicyIamMemberConditionArgs',
|
63
|
-
'AccessPolicyIamMemberConditionArgsDict',
|
64
36
|
'ServicePerimeterEgressPolicyEgressFromArgs',
|
65
|
-
'ServicePerimeterEgressPolicyEgressFromArgsDict',
|
66
37
|
'ServicePerimeterEgressPolicyEgressFromSourceArgs',
|
67
|
-
'ServicePerimeterEgressPolicyEgressFromSourceArgsDict',
|
68
38
|
'ServicePerimeterEgressPolicyEgressToArgs',
|
69
|
-
'ServicePerimeterEgressPolicyEgressToArgsDict',
|
70
39
|
'ServicePerimeterEgressPolicyEgressToOperationArgs',
|
71
|
-
'ServicePerimeterEgressPolicyEgressToOperationArgsDict',
|
72
40
|
'ServicePerimeterEgressPolicyEgressToOperationMethodSelectorArgs',
|
73
|
-
'ServicePerimeterEgressPolicyEgressToOperationMethodSelectorArgsDict',
|
74
41
|
'ServicePerimeterIngressPolicyIngressFromArgs',
|
75
|
-
'ServicePerimeterIngressPolicyIngressFromArgsDict',
|
76
42
|
'ServicePerimeterIngressPolicyIngressFromSourceArgs',
|
77
|
-
'ServicePerimeterIngressPolicyIngressFromSourceArgsDict',
|
78
43
|
'ServicePerimeterIngressPolicyIngressToArgs',
|
79
|
-
'ServicePerimeterIngressPolicyIngressToArgsDict',
|
80
44
|
'ServicePerimeterIngressPolicyIngressToOperationArgs',
|
81
|
-
'ServicePerimeterIngressPolicyIngressToOperationArgsDict',
|
82
45
|
'ServicePerimeterIngressPolicyIngressToOperationMethodSelectorArgs',
|
83
|
-
'ServicePerimeterIngressPolicyIngressToOperationMethodSelectorArgsDict',
|
84
46
|
'ServicePerimeterSpecArgs',
|
85
|
-
'ServicePerimeterSpecArgsDict',
|
86
47
|
'ServicePerimeterSpecEgressPolicyArgs',
|
87
|
-
'ServicePerimeterSpecEgressPolicyArgsDict',
|
88
48
|
'ServicePerimeterSpecEgressPolicyEgressFromArgs',
|
89
|
-
'ServicePerimeterSpecEgressPolicyEgressFromArgsDict',
|
90
49
|
'ServicePerimeterSpecEgressPolicyEgressFromSourceArgs',
|
91
|
-
'ServicePerimeterSpecEgressPolicyEgressFromSourceArgsDict',
|
92
50
|
'ServicePerimeterSpecEgressPolicyEgressToArgs',
|
93
|
-
'ServicePerimeterSpecEgressPolicyEgressToArgsDict',
|
94
51
|
'ServicePerimeterSpecEgressPolicyEgressToOperationArgs',
|
95
|
-
'ServicePerimeterSpecEgressPolicyEgressToOperationArgsDict',
|
96
52
|
'ServicePerimeterSpecEgressPolicyEgressToOperationMethodSelectorArgs',
|
97
|
-
'ServicePerimeterSpecEgressPolicyEgressToOperationMethodSelectorArgsDict',
|
98
53
|
'ServicePerimeterSpecIngressPolicyArgs',
|
99
|
-
'ServicePerimeterSpecIngressPolicyArgsDict',
|
100
54
|
'ServicePerimeterSpecIngressPolicyIngressFromArgs',
|
101
|
-
'ServicePerimeterSpecIngressPolicyIngressFromArgsDict',
|
102
55
|
'ServicePerimeterSpecIngressPolicyIngressFromSourceArgs',
|
103
|
-
'ServicePerimeterSpecIngressPolicyIngressFromSourceArgsDict',
|
104
56
|
'ServicePerimeterSpecIngressPolicyIngressToArgs',
|
105
|
-
'ServicePerimeterSpecIngressPolicyIngressToArgsDict',
|
106
57
|
'ServicePerimeterSpecIngressPolicyIngressToOperationArgs',
|
107
|
-
'ServicePerimeterSpecIngressPolicyIngressToOperationArgsDict',
|
108
58
|
'ServicePerimeterSpecIngressPolicyIngressToOperationMethodSelectorArgs',
|
109
|
-
'ServicePerimeterSpecIngressPolicyIngressToOperationMethodSelectorArgsDict',
|
110
59
|
'ServicePerimeterSpecVpcAccessibleServicesArgs',
|
111
|
-
'ServicePerimeterSpecVpcAccessibleServicesArgsDict',
|
112
60
|
'ServicePerimeterStatusArgs',
|
113
|
-
'ServicePerimeterStatusArgsDict',
|
114
61
|
'ServicePerimeterStatusEgressPolicyArgs',
|
115
|
-
'ServicePerimeterStatusEgressPolicyArgsDict',
|
116
62
|
'ServicePerimeterStatusEgressPolicyEgressFromArgs',
|
117
|
-
'ServicePerimeterStatusEgressPolicyEgressFromArgsDict',
|
118
63
|
'ServicePerimeterStatusEgressPolicyEgressFromSourceArgs',
|
119
|
-
'ServicePerimeterStatusEgressPolicyEgressFromSourceArgsDict',
|
120
64
|
'ServicePerimeterStatusEgressPolicyEgressToArgs',
|
121
|
-
'ServicePerimeterStatusEgressPolicyEgressToArgsDict',
|
122
65
|
'ServicePerimeterStatusEgressPolicyEgressToOperationArgs',
|
123
|
-
'ServicePerimeterStatusEgressPolicyEgressToOperationArgsDict',
|
124
66
|
'ServicePerimeterStatusEgressPolicyEgressToOperationMethodSelectorArgs',
|
125
|
-
'ServicePerimeterStatusEgressPolicyEgressToOperationMethodSelectorArgsDict',
|
126
67
|
'ServicePerimeterStatusIngressPolicyArgs',
|
127
|
-
'ServicePerimeterStatusIngressPolicyArgsDict',
|
128
68
|
'ServicePerimeterStatusIngressPolicyIngressFromArgs',
|
129
|
-
'ServicePerimeterStatusIngressPolicyIngressFromArgsDict',
|
130
69
|
'ServicePerimeterStatusIngressPolicyIngressFromSourceArgs',
|
131
|
-
'ServicePerimeterStatusIngressPolicyIngressFromSourceArgsDict',
|
132
70
|
'ServicePerimeterStatusIngressPolicyIngressToArgs',
|
133
|
-
'ServicePerimeterStatusIngressPolicyIngressToArgsDict',
|
134
71
|
'ServicePerimeterStatusIngressPolicyIngressToOperationArgs',
|
135
|
-
'ServicePerimeterStatusIngressPolicyIngressToOperationArgsDict',
|
136
72
|
'ServicePerimeterStatusIngressPolicyIngressToOperationMethodSelectorArgs',
|
137
|
-
'ServicePerimeterStatusIngressPolicyIngressToOperationMethodSelectorArgsDict',
|
138
73
|
'ServicePerimeterStatusVpcAccessibleServicesArgs',
|
139
|
-
'ServicePerimeterStatusVpcAccessibleServicesArgsDict',
|
140
74
|
'ServicePerimetersServicePerimeterArgs',
|
141
|
-
'ServicePerimetersServicePerimeterArgsDict',
|
142
75
|
'ServicePerimetersServicePerimeterSpecArgs',
|
143
|
-
'ServicePerimetersServicePerimeterSpecArgsDict',
|
144
76
|
'ServicePerimetersServicePerimeterSpecEgressPolicyArgs',
|
145
|
-
'ServicePerimetersServicePerimeterSpecEgressPolicyArgsDict',
|
146
77
|
'ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromArgs',
|
147
|
-
'ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromArgsDict',
|
148
78
|
'ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromSourceArgs',
|
149
|
-
'ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromSourceArgsDict',
|
150
79
|
'ServicePerimetersServicePerimeterSpecEgressPolicyEgressToArgs',
|
151
|
-
'ServicePerimetersServicePerimeterSpecEgressPolicyEgressToArgsDict',
|
152
80
|
'ServicePerimetersServicePerimeterSpecEgressPolicyEgressToOperationArgs',
|
153
|
-
'ServicePerimetersServicePerimeterSpecEgressPolicyEgressToOperationArgsDict',
|
154
81
|
'ServicePerimetersServicePerimeterSpecEgressPolicyEgressToOperationMethodSelectorArgs',
|
155
|
-
'ServicePerimetersServicePerimeterSpecEgressPolicyEgressToOperationMethodSelectorArgsDict',
|
156
82
|
'ServicePerimetersServicePerimeterSpecIngressPolicyArgs',
|
157
|
-
'ServicePerimetersServicePerimeterSpecIngressPolicyArgsDict',
|
158
83
|
'ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromArgs',
|
159
|
-
'ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromArgsDict',
|
160
84
|
'ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromSourceArgs',
|
161
|
-
'ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromSourceArgsDict',
|
162
85
|
'ServicePerimetersServicePerimeterSpecIngressPolicyIngressToArgs',
|
163
|
-
'ServicePerimetersServicePerimeterSpecIngressPolicyIngressToArgsDict',
|
164
86
|
'ServicePerimetersServicePerimeterSpecIngressPolicyIngressToOperationArgs',
|
165
|
-
'ServicePerimetersServicePerimeterSpecIngressPolicyIngressToOperationArgsDict',
|
166
87
|
'ServicePerimetersServicePerimeterSpecIngressPolicyIngressToOperationMethodSelectorArgs',
|
167
|
-
'ServicePerimetersServicePerimeterSpecIngressPolicyIngressToOperationMethodSelectorArgsDict',
|
168
88
|
'ServicePerimetersServicePerimeterSpecVpcAccessibleServicesArgs',
|
169
|
-
'ServicePerimetersServicePerimeterSpecVpcAccessibleServicesArgsDict',
|
170
89
|
'ServicePerimetersServicePerimeterStatusArgs',
|
171
|
-
'ServicePerimetersServicePerimeterStatusArgsDict',
|
172
90
|
'ServicePerimetersServicePerimeterStatusEgressPolicyArgs',
|
173
|
-
'ServicePerimetersServicePerimeterStatusEgressPolicyArgsDict',
|
174
91
|
'ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromArgs',
|
175
|
-
'ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromArgsDict',
|
176
92
|
'ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromSourceArgs',
|
177
|
-
'ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromSourceArgsDict',
|
178
93
|
'ServicePerimetersServicePerimeterStatusEgressPolicyEgressToArgs',
|
179
|
-
'ServicePerimetersServicePerimeterStatusEgressPolicyEgressToArgsDict',
|
180
94
|
'ServicePerimetersServicePerimeterStatusEgressPolicyEgressToOperationArgs',
|
181
|
-
'ServicePerimetersServicePerimeterStatusEgressPolicyEgressToOperationArgsDict',
|
182
95
|
'ServicePerimetersServicePerimeterStatusEgressPolicyEgressToOperationMethodSelectorArgs',
|
183
|
-
'ServicePerimetersServicePerimeterStatusEgressPolicyEgressToOperationMethodSelectorArgsDict',
|
184
96
|
'ServicePerimetersServicePerimeterStatusIngressPolicyArgs',
|
185
|
-
'ServicePerimetersServicePerimeterStatusIngressPolicyArgsDict',
|
186
97
|
'ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromArgs',
|
187
|
-
'ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromArgsDict',
|
188
98
|
'ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromSourceArgs',
|
189
|
-
'ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromSourceArgsDict',
|
190
99
|
'ServicePerimetersServicePerimeterStatusIngressPolicyIngressToArgs',
|
191
|
-
'ServicePerimetersServicePerimeterStatusIngressPolicyIngressToArgsDict',
|
192
100
|
'ServicePerimetersServicePerimeterStatusIngressPolicyIngressToOperationArgs',
|
193
|
-
'ServicePerimetersServicePerimeterStatusIngressPolicyIngressToOperationArgsDict',
|
194
101
|
'ServicePerimetersServicePerimeterStatusIngressPolicyIngressToOperationMethodSelectorArgs',
|
195
|
-
'ServicePerimetersServicePerimeterStatusIngressPolicyIngressToOperationMethodSelectorArgsDict',
|
196
102
|
'ServicePerimetersServicePerimeterStatusVpcAccessibleServicesArgs',
|
197
|
-
'ServicePerimetersServicePerimeterStatusVpcAccessibleServicesArgsDict',
|
198
103
|
]
|
199
104
|
|
200
|
-
MYPY = False
|
201
|
-
|
202
|
-
if not MYPY:
|
203
|
-
class AccessLevelBasicArgsDict(TypedDict):
|
204
|
-
conditions: pulumi.Input[Sequence[pulumi.Input['AccessLevelBasicConditionArgsDict']]]
|
205
|
-
"""
|
206
|
-
A set of requirements for the AccessLevel to be granted.
|
207
|
-
Structure is documented below.
|
208
|
-
"""
|
209
|
-
combining_function: NotRequired[pulumi.Input[str]]
|
210
|
-
"""
|
211
|
-
How the conditions list should be combined to determine if a request
|
212
|
-
is granted this AccessLevel. If AND is used, each Condition in
|
213
|
-
conditions must be satisfied for the AccessLevel to be applied. If
|
214
|
-
OR is used, at least one Condition in conditions must be satisfied
|
215
|
-
for the AccessLevel to be applied.
|
216
|
-
Default value is `AND`.
|
217
|
-
Possible values are: `AND`, `OR`.
|
218
|
-
"""
|
219
|
-
elif False:
|
220
|
-
AccessLevelBasicArgsDict: TypeAlias = Mapping[str, Any]
|
221
|
-
|
222
105
|
@pulumi.input_type
|
223
106
|
class AccessLevelBasicArgs:
|
224
107
|
def __init__(__self__, *,
|
@@ -271,66 +154,6 @@ class AccessLevelBasicArgs:
|
|
271
154
|
pulumi.set(self, "combining_function", value)
|
272
155
|
|
273
156
|
|
274
|
-
if not MYPY:
|
275
|
-
class AccessLevelBasicConditionArgsDict(TypedDict):
|
276
|
-
device_policy: NotRequired[pulumi.Input['AccessLevelBasicConditionDevicePolicyArgsDict']]
|
277
|
-
"""
|
278
|
-
Device specific restrictions, all restrictions must hold for
|
279
|
-
the Condition to be true. If not specified, all devices are
|
280
|
-
allowed.
|
281
|
-
Structure is documented below.
|
282
|
-
"""
|
283
|
-
ip_subnetworks: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
284
|
-
"""
|
285
|
-
A list of CIDR block IP subnetwork specification. May be IPv4
|
286
|
-
or IPv6.
|
287
|
-
Note that for a CIDR IP address block, the specified IP address
|
288
|
-
portion must be properly truncated (i.e. all the host bits must
|
289
|
-
be zero) or the input is considered malformed. For example,
|
290
|
-
"192.0.2.0/24" is accepted but "192.0.2.1/24" is not. Similarly,
|
291
|
-
for IPv6, "2001:db8::/32" is accepted whereas "2001:db8::1/32"
|
292
|
-
is not. The originating IP of a request must be in one of the
|
293
|
-
listed subnets in order for this Condition to be true.
|
294
|
-
If empty, all IP addresses are allowed.
|
295
|
-
"""
|
296
|
-
members: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
297
|
-
"""
|
298
|
-
An allowed list of members (users, service accounts).
|
299
|
-
Using groups is not supported yet.
|
300
|
-
The signed-in user originating the request must be a part of one
|
301
|
-
of the provided members. If not specified, a request may come
|
302
|
-
from any user (logged in/not logged in, not present in any
|
303
|
-
groups, etc.).
|
304
|
-
Formats: `user:{emailid}`, `serviceAccount:{emailid}`
|
305
|
-
"""
|
306
|
-
negate: NotRequired[pulumi.Input[bool]]
|
307
|
-
"""
|
308
|
-
Whether to negate the Condition. If true, the Condition becomes
|
309
|
-
a NAND over its non-empty fields, each field must be false for
|
310
|
-
the Condition overall to be satisfied. Defaults to false.
|
311
|
-
"""
|
312
|
-
regions: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
313
|
-
"""
|
314
|
-
The request must originate from one of the provided
|
315
|
-
countries/regions.
|
316
|
-
Format: A valid ISO 3166-1 alpha-2 code.
|
317
|
-
"""
|
318
|
-
required_access_levels: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
319
|
-
"""
|
320
|
-
A list of other access levels defined in the same Policy,
|
321
|
-
referenced by resource name. Referencing an AccessLevel which
|
322
|
-
does not exist is an error. All access levels listed must be
|
323
|
-
granted for the Condition to be true.
|
324
|
-
Format: accessPolicies/{policy_id}/accessLevels/{short_name}
|
325
|
-
"""
|
326
|
-
vpc_network_sources: NotRequired[pulumi.Input[Sequence[pulumi.Input['AccessLevelBasicConditionVpcNetworkSourceArgsDict']]]]
|
327
|
-
"""
|
328
|
-
The request must originate from one of the provided VPC networks in Google Cloud. Cannot specify this field together with `ip_subnetworks`.
|
329
|
-
Structure is documented below.
|
330
|
-
"""
|
331
|
-
elif False:
|
332
|
-
AccessLevelBasicConditionArgsDict: TypeAlias = Mapping[str, Any]
|
333
|
-
|
334
157
|
@pulumi.input_type
|
335
158
|
class AccessLevelBasicConditionArgs:
|
336
159
|
def __init__(__self__, *,
|
@@ -504,42 +327,6 @@ class AccessLevelBasicConditionArgs:
|
|
504
327
|
pulumi.set(self, "vpc_network_sources", value)
|
505
328
|
|
506
329
|
|
507
|
-
if not MYPY:
|
508
|
-
class AccessLevelBasicConditionDevicePolicyArgsDict(TypedDict):
|
509
|
-
allowed_device_management_levels: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
510
|
-
"""
|
511
|
-
A list of allowed device management levels.
|
512
|
-
An empty list allows all management levels.
|
513
|
-
Each value may be one of: `MANAGEMENT_UNSPECIFIED`, `NONE`, `BASIC`, `COMPLETE`.
|
514
|
-
"""
|
515
|
-
allowed_encryption_statuses: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
516
|
-
"""
|
517
|
-
A list of allowed encryptions statuses.
|
518
|
-
An empty list allows all statuses.
|
519
|
-
Each value may be one of: `ENCRYPTION_UNSPECIFIED`, `ENCRYPTION_UNSUPPORTED`, `UNENCRYPTED`, `ENCRYPTED`.
|
520
|
-
"""
|
521
|
-
os_constraints: NotRequired[pulumi.Input[Sequence[pulumi.Input['AccessLevelBasicConditionDevicePolicyOsConstraintArgsDict']]]]
|
522
|
-
"""
|
523
|
-
A list of allowed OS versions.
|
524
|
-
An empty list allows all types and all versions.
|
525
|
-
Structure is documented below.
|
526
|
-
"""
|
527
|
-
require_admin_approval: NotRequired[pulumi.Input[bool]]
|
528
|
-
"""
|
529
|
-
Whether the device needs to be approved by the customer admin.
|
530
|
-
"""
|
531
|
-
require_corp_owned: NotRequired[pulumi.Input[bool]]
|
532
|
-
"""
|
533
|
-
Whether the device needs to be corp owned.
|
534
|
-
"""
|
535
|
-
require_screen_lock: NotRequired[pulumi.Input[bool]]
|
536
|
-
"""
|
537
|
-
Whether or not screenlock is required for the DevicePolicy
|
538
|
-
to be true. Defaults to false.
|
539
|
-
"""
|
540
|
-
elif False:
|
541
|
-
AccessLevelBasicConditionDevicePolicyArgsDict: TypeAlias = Mapping[str, Any]
|
542
|
-
|
543
330
|
@pulumi.input_type
|
544
331
|
class AccessLevelBasicConditionDevicePolicyArgs:
|
545
332
|
def __init__(__self__, *,
|
@@ -657,26 +444,6 @@ class AccessLevelBasicConditionDevicePolicyArgs:
|
|
657
444
|
pulumi.set(self, "require_screen_lock", value)
|
658
445
|
|
659
446
|
|
660
|
-
if not MYPY:
|
661
|
-
class AccessLevelBasicConditionDevicePolicyOsConstraintArgsDict(TypedDict):
|
662
|
-
os_type: pulumi.Input[str]
|
663
|
-
"""
|
664
|
-
The operating system type of the device.
|
665
|
-
Possible values are: `OS_UNSPECIFIED`, `DESKTOP_MAC`, `DESKTOP_WINDOWS`, `DESKTOP_LINUX`, `DESKTOP_CHROME_OS`, `ANDROID`, `IOS`.
|
666
|
-
"""
|
667
|
-
minimum_version: NotRequired[pulumi.Input[str]]
|
668
|
-
"""
|
669
|
-
The minimum allowed OS version. If not set, any version
|
670
|
-
of this OS satisfies the constraint.
|
671
|
-
Format: "major.minor.patch" such as "10.5.301", "9.2.1".
|
672
|
-
"""
|
673
|
-
require_verified_chrome_os: NotRequired[pulumi.Input[bool]]
|
674
|
-
"""
|
675
|
-
If you specify DESKTOP_CHROME_OS for osType, you can optionally include requireVerifiedChromeOs to require Chrome Verified Access.
|
676
|
-
"""
|
677
|
-
elif False:
|
678
|
-
AccessLevelBasicConditionDevicePolicyOsConstraintArgsDict: TypeAlias = Mapping[str, Any]
|
679
|
-
|
680
447
|
@pulumi.input_type
|
681
448
|
class AccessLevelBasicConditionDevicePolicyOsConstraintArgs:
|
682
449
|
def __init__(__self__, *,
|
@@ -737,16 +504,6 @@ class AccessLevelBasicConditionDevicePolicyOsConstraintArgs:
|
|
737
504
|
pulumi.set(self, "require_verified_chrome_os", value)
|
738
505
|
|
739
506
|
|
740
|
-
if not MYPY:
|
741
|
-
class AccessLevelBasicConditionVpcNetworkSourceArgsDict(TypedDict):
|
742
|
-
vpc_subnetwork: NotRequired[pulumi.Input['AccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgsDict']]
|
743
|
-
"""
|
744
|
-
Sub networks within a VPC network.
|
745
|
-
Structure is documented below.
|
746
|
-
"""
|
747
|
-
elif False:
|
748
|
-
AccessLevelBasicConditionVpcNetworkSourceArgsDict: TypeAlias = Mapping[str, Any]
|
749
|
-
|
750
507
|
@pulumi.input_type
|
751
508
|
class AccessLevelBasicConditionVpcNetworkSourceArgs:
|
752
509
|
def __init__(__self__, *,
|
@@ -772,19 +529,6 @@ class AccessLevelBasicConditionVpcNetworkSourceArgs:
|
|
772
529
|
pulumi.set(self, "vpc_subnetwork", value)
|
773
530
|
|
774
531
|
|
775
|
-
if not MYPY:
|
776
|
-
class AccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgsDict(TypedDict):
|
777
|
-
network: pulumi.Input[str]
|
778
|
-
"""
|
779
|
-
Required. Network name to be allowed by this Access Level. Networks of foreign organizations requires `compute.network.get` permission to be granted to caller.
|
780
|
-
"""
|
781
|
-
vpc_ip_subnetworks: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
782
|
-
"""
|
783
|
-
CIDR block IP subnetwork specification. Must be IPv4.
|
784
|
-
"""
|
785
|
-
elif False:
|
786
|
-
AccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgsDict: TypeAlias = Mapping[str, Any]
|
787
|
-
|
788
532
|
@pulumi.input_type
|
789
533
|
class AccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgs:
|
790
534
|
def __init__(__self__, *,
|
@@ -823,42 +567,6 @@ class AccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgs:
|
|
823
567
|
pulumi.set(self, "vpc_ip_subnetworks", value)
|
824
568
|
|
825
569
|
|
826
|
-
if not MYPY:
|
827
|
-
class AccessLevelConditionDevicePolicyArgsDict(TypedDict):
|
828
|
-
allowed_device_management_levels: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
829
|
-
"""
|
830
|
-
A list of allowed device management levels.
|
831
|
-
An empty list allows all management levels.
|
832
|
-
Each value may be one of: `MANAGEMENT_UNSPECIFIED`, `NONE`, `BASIC`, `COMPLETE`.
|
833
|
-
"""
|
834
|
-
allowed_encryption_statuses: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
835
|
-
"""
|
836
|
-
A list of allowed encryptions statuses.
|
837
|
-
An empty list allows all statuses.
|
838
|
-
Each value may be one of: `ENCRYPTION_UNSPECIFIED`, `ENCRYPTION_UNSUPPORTED`, `UNENCRYPTED`, `ENCRYPTED`.
|
839
|
-
"""
|
840
|
-
os_constraints: NotRequired[pulumi.Input[Sequence[pulumi.Input['AccessLevelConditionDevicePolicyOsConstraintArgsDict']]]]
|
841
|
-
"""
|
842
|
-
A list of allowed OS versions.
|
843
|
-
An empty list allows all types and all versions.
|
844
|
-
Structure is documented below.
|
845
|
-
"""
|
846
|
-
require_admin_approval: NotRequired[pulumi.Input[bool]]
|
847
|
-
"""
|
848
|
-
Whether the device needs to be approved by the customer admin.
|
849
|
-
"""
|
850
|
-
require_corp_owned: NotRequired[pulumi.Input[bool]]
|
851
|
-
"""
|
852
|
-
Whether the device needs to be corp owned.
|
853
|
-
"""
|
854
|
-
require_screen_lock: NotRequired[pulumi.Input[bool]]
|
855
|
-
"""
|
856
|
-
Whether or not screenlock is required for the DevicePolicy
|
857
|
-
to be true. Defaults to false.
|
858
|
-
"""
|
859
|
-
elif False:
|
860
|
-
AccessLevelConditionDevicePolicyArgsDict: TypeAlias = Mapping[str, Any]
|
861
|
-
|
862
570
|
@pulumi.input_type
|
863
571
|
class AccessLevelConditionDevicePolicyArgs:
|
864
572
|
def __init__(__self__, *,
|
@@ -976,22 +684,6 @@ class AccessLevelConditionDevicePolicyArgs:
|
|
976
684
|
pulumi.set(self, "require_screen_lock", value)
|
977
685
|
|
978
686
|
|
979
|
-
if not MYPY:
|
980
|
-
class AccessLevelConditionDevicePolicyOsConstraintArgsDict(TypedDict):
|
981
|
-
os_type: pulumi.Input[str]
|
982
|
-
"""
|
983
|
-
The operating system type of the device.
|
984
|
-
Possible values are: `OS_UNSPECIFIED`, `DESKTOP_MAC`, `DESKTOP_WINDOWS`, `DESKTOP_LINUX`, `DESKTOP_CHROME_OS`, `ANDROID`, `IOS`.
|
985
|
-
"""
|
986
|
-
minimum_version: NotRequired[pulumi.Input[str]]
|
987
|
-
"""
|
988
|
-
The minimum allowed OS version. If not set, any version
|
989
|
-
of this OS satisfies the constraint.
|
990
|
-
Format: "major.minor.patch" such as "10.5.301", "9.2.1".
|
991
|
-
"""
|
992
|
-
elif False:
|
993
|
-
AccessLevelConditionDevicePolicyOsConstraintArgsDict: TypeAlias = Mapping[str, Any]
|
994
|
-
|
995
687
|
@pulumi.input_type
|
996
688
|
class AccessLevelConditionDevicePolicyOsConstraintArgs:
|
997
689
|
def __init__(__self__, *,
|
@@ -1036,16 +728,6 @@ class AccessLevelConditionDevicePolicyOsConstraintArgs:
|
|
1036
728
|
pulumi.set(self, "minimum_version", value)
|
1037
729
|
|
1038
730
|
|
1039
|
-
if not MYPY:
|
1040
|
-
class AccessLevelConditionVpcNetworkSourceArgsDict(TypedDict):
|
1041
|
-
vpc_subnetwork: NotRequired[pulumi.Input['AccessLevelConditionVpcNetworkSourceVpcSubnetworkArgsDict']]
|
1042
|
-
"""
|
1043
|
-
Sub networks within a VPC network.
|
1044
|
-
Structure is documented below.
|
1045
|
-
"""
|
1046
|
-
elif False:
|
1047
|
-
AccessLevelConditionVpcNetworkSourceArgsDict: TypeAlias = Mapping[str, Any]
|
1048
|
-
|
1049
731
|
@pulumi.input_type
|
1050
732
|
class AccessLevelConditionVpcNetworkSourceArgs:
|
1051
733
|
def __init__(__self__, *,
|
@@ -1071,19 +753,6 @@ class AccessLevelConditionVpcNetworkSourceArgs:
|
|
1071
753
|
pulumi.set(self, "vpc_subnetwork", value)
|
1072
754
|
|
1073
755
|
|
1074
|
-
if not MYPY:
|
1075
|
-
class AccessLevelConditionVpcNetworkSourceVpcSubnetworkArgsDict(TypedDict):
|
1076
|
-
network: pulumi.Input[str]
|
1077
|
-
"""
|
1078
|
-
Required. Network name to be allowed by this Access Level. Networks of foreign organizations requires `compute.network.get` permission to be granted to caller.
|
1079
|
-
"""
|
1080
|
-
vpc_ip_subnetworks: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
1081
|
-
"""
|
1082
|
-
CIDR block IP subnetwork specification. Must be IPv4.
|
1083
|
-
"""
|
1084
|
-
elif False:
|
1085
|
-
AccessLevelConditionVpcNetworkSourceVpcSubnetworkArgsDict: TypeAlias = Mapping[str, Any]
|
1086
|
-
|
1087
756
|
@pulumi.input_type
|
1088
757
|
class AccessLevelConditionVpcNetworkSourceVpcSubnetworkArgs:
|
1089
758
|
def __init__(__self__, *,
|
@@ -1122,18 +791,6 @@ class AccessLevelConditionVpcNetworkSourceVpcSubnetworkArgs:
|
|
1122
791
|
pulumi.set(self, "vpc_ip_subnetworks", value)
|
1123
792
|
|
1124
793
|
|
1125
|
-
if not MYPY:
|
1126
|
-
class AccessLevelCustomArgsDict(TypedDict):
|
1127
|
-
expr: pulumi.Input['AccessLevelCustomExprArgsDict']
|
1128
|
-
"""
|
1129
|
-
Represents a textual expression in the Common Expression Language (CEL) syntax. CEL is a C-like expression language.
|
1130
|
-
This page details the objects and attributes that are used to the build the CEL expressions for
|
1131
|
-
custom access levels - https://cloud.google.com/access-context-manager/docs/custom-access-level-spec.
|
1132
|
-
Structure is documented below.
|
1133
|
-
"""
|
1134
|
-
elif False:
|
1135
|
-
AccessLevelCustomArgsDict: TypeAlias = Mapping[str, Any]
|
1136
|
-
|
1137
794
|
@pulumi.input_type
|
1138
795
|
class AccessLevelCustomArgs:
|
1139
796
|
def __init__(__self__, *,
|
@@ -1162,27 +819,6 @@ class AccessLevelCustomArgs:
|
|
1162
819
|
pulumi.set(self, "expr", value)
|
1163
820
|
|
1164
821
|
|
1165
|
-
if not MYPY:
|
1166
|
-
class AccessLevelCustomExprArgsDict(TypedDict):
|
1167
|
-
expression: pulumi.Input[str]
|
1168
|
-
"""
|
1169
|
-
Textual representation of an expression in Common Expression Language syntax.
|
1170
|
-
"""
|
1171
|
-
description: NotRequired[pulumi.Input[str]]
|
1172
|
-
"""
|
1173
|
-
Description of the expression
|
1174
|
-
"""
|
1175
|
-
location: NotRequired[pulumi.Input[str]]
|
1176
|
-
"""
|
1177
|
-
String indicating the location of the expression for error reporting, e.g. a file name and a position in the file
|
1178
|
-
"""
|
1179
|
-
title: NotRequired[pulumi.Input[str]]
|
1180
|
-
"""
|
1181
|
-
Title for the expression, i.e. a short string describing its purpose.
|
1182
|
-
"""
|
1183
|
-
elif False:
|
1184
|
-
AccessLevelCustomExprArgsDict: TypeAlias = Mapping[str, Any]
|
1185
|
-
|
1186
822
|
@pulumi.input_type
|
1187
823
|
class AccessLevelCustomExprArgs:
|
1188
824
|
def __init__(__self__, *,
|
@@ -1253,36 +889,6 @@ class AccessLevelCustomExprArgs:
|
|
1253
889
|
pulumi.set(self, "title", value)
|
1254
890
|
|
1255
891
|
|
1256
|
-
if not MYPY:
|
1257
|
-
class AccessLevelsAccessLevelArgsDict(TypedDict):
|
1258
|
-
name: pulumi.Input[str]
|
1259
|
-
"""
|
1260
|
-
Resource name for the Access Level. The short_name component must begin
|
1261
|
-
with a letter and only include alphanumeric and '_'.
|
1262
|
-
Format: accessPolicies/{policy_id}/accessLevels/{short_name}
|
1263
|
-
"""
|
1264
|
-
title: pulumi.Input[str]
|
1265
|
-
"""
|
1266
|
-
Human readable title. Must be unique within the Policy.
|
1267
|
-
"""
|
1268
|
-
basic: NotRequired[pulumi.Input['AccessLevelsAccessLevelBasicArgsDict']]
|
1269
|
-
"""
|
1270
|
-
A set of predefined conditions for the access level and a combining function.
|
1271
|
-
Structure is documented below.
|
1272
|
-
"""
|
1273
|
-
custom: NotRequired[pulumi.Input['AccessLevelsAccessLevelCustomArgsDict']]
|
1274
|
-
"""
|
1275
|
-
Custom access level conditions are set using the Cloud Common Expression Language to represent the necessary conditions for the level to apply to a request.
|
1276
|
-
See CEL spec at: https://github.com/google/cel-spec.
|
1277
|
-
Structure is documented below.
|
1278
|
-
"""
|
1279
|
-
description: NotRequired[pulumi.Input[str]]
|
1280
|
-
"""
|
1281
|
-
Description of the AccessLevel and its use. Does not affect behavior.
|
1282
|
-
"""
|
1283
|
-
elif False:
|
1284
|
-
AccessLevelsAccessLevelArgsDict: TypeAlias = Mapping[str, Any]
|
1285
|
-
|
1286
892
|
@pulumi.input_type
|
1287
893
|
class AccessLevelsAccessLevelArgs:
|
1288
894
|
def __init__(__self__, *,
|
@@ -1378,26 +984,6 @@ class AccessLevelsAccessLevelArgs:
|
|
1378
984
|
pulumi.set(self, "description", value)
|
1379
985
|
|
1380
986
|
|
1381
|
-
if not MYPY:
|
1382
|
-
class AccessLevelsAccessLevelBasicArgsDict(TypedDict):
|
1383
|
-
conditions: pulumi.Input[Sequence[pulumi.Input['AccessLevelsAccessLevelBasicConditionArgsDict']]]
|
1384
|
-
"""
|
1385
|
-
A set of requirements for the AccessLevel to be granted.
|
1386
|
-
Structure is documented below.
|
1387
|
-
"""
|
1388
|
-
combining_function: NotRequired[pulumi.Input[str]]
|
1389
|
-
"""
|
1390
|
-
How the conditions list should be combined to determine if a request
|
1391
|
-
is granted this AccessLevel. If AND is used, each Condition in
|
1392
|
-
conditions must be satisfied for the AccessLevel to be applied. If
|
1393
|
-
OR is used, at least one Condition in conditions must be satisfied
|
1394
|
-
for the AccessLevel to be applied.
|
1395
|
-
Default value is `AND`.
|
1396
|
-
Possible values are: `AND`, `OR`.
|
1397
|
-
"""
|
1398
|
-
elif False:
|
1399
|
-
AccessLevelsAccessLevelBasicArgsDict: TypeAlias = Mapping[str, Any]
|
1400
|
-
|
1401
987
|
@pulumi.input_type
|
1402
988
|
class AccessLevelsAccessLevelBasicArgs:
|
1403
989
|
def __init__(__self__, *,
|
@@ -1450,66 +1036,6 @@ class AccessLevelsAccessLevelBasicArgs:
|
|
1450
1036
|
pulumi.set(self, "combining_function", value)
|
1451
1037
|
|
1452
1038
|
|
1453
|
-
if not MYPY:
|
1454
|
-
class AccessLevelsAccessLevelBasicConditionArgsDict(TypedDict):
|
1455
|
-
device_policy: NotRequired[pulumi.Input['AccessLevelsAccessLevelBasicConditionDevicePolicyArgsDict']]
|
1456
|
-
"""
|
1457
|
-
Device specific restrictions, all restrictions must hold for
|
1458
|
-
the Condition to be true. If not specified, all devices are
|
1459
|
-
allowed.
|
1460
|
-
Structure is documented below.
|
1461
|
-
"""
|
1462
|
-
ip_subnetworks: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
1463
|
-
"""
|
1464
|
-
A list of CIDR block IP subnetwork specification. May be IPv4
|
1465
|
-
or IPv6.
|
1466
|
-
Note that for a CIDR IP address block, the specified IP address
|
1467
|
-
portion must be properly truncated (i.e. all the host bits must
|
1468
|
-
be zero) or the input is considered malformed. For example,
|
1469
|
-
"192.0.2.0/24" is accepted but "192.0.2.1/24" is not. Similarly,
|
1470
|
-
for IPv6, "2001:db8::/32" is accepted whereas "2001:db8::1/32"
|
1471
|
-
is not. The originating IP of a request must be in one of the
|
1472
|
-
listed subnets in order for this Condition to be true.
|
1473
|
-
If empty, all IP addresses are allowed.
|
1474
|
-
"""
|
1475
|
-
members: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
1476
|
-
"""
|
1477
|
-
An allowed list of members (users, service accounts).
|
1478
|
-
Using groups is not supported yet.
|
1479
|
-
The signed-in user originating the request must be a part of one
|
1480
|
-
of the provided members. If not specified, a request may come
|
1481
|
-
from any user (logged in/not logged in, not present in any
|
1482
|
-
groups, etc.).
|
1483
|
-
Formats: `user:{emailid}`, `serviceAccount:{emailid}`
|
1484
|
-
"""
|
1485
|
-
negate: NotRequired[pulumi.Input[bool]]
|
1486
|
-
"""
|
1487
|
-
Whether to negate the Condition. If true, the Condition becomes
|
1488
|
-
a NAND over its non-empty fields, each field must be false for
|
1489
|
-
the Condition overall to be satisfied. Defaults to false.
|
1490
|
-
"""
|
1491
|
-
regions: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
1492
|
-
"""
|
1493
|
-
The request must originate from one of the provided
|
1494
|
-
countries/regions.
|
1495
|
-
Format: A valid ISO 3166-1 alpha-2 code.
|
1496
|
-
"""
|
1497
|
-
required_access_levels: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
1498
|
-
"""
|
1499
|
-
A list of other access levels defined in the same Policy,
|
1500
|
-
referenced by resource name. Referencing an AccessLevel which
|
1501
|
-
does not exist is an error. All access levels listed must be
|
1502
|
-
granted for the Condition to be true.
|
1503
|
-
Format: accessPolicies/{policy_id}/accessLevels/{short_name}
|
1504
|
-
"""
|
1505
|
-
vpc_network_sources: NotRequired[pulumi.Input[Sequence[pulumi.Input['AccessLevelsAccessLevelBasicConditionVpcNetworkSourceArgsDict']]]]
|
1506
|
-
"""
|
1507
|
-
The request must originate from one of the provided VPC networks in Google Cloud. Cannot specify this field together with `ip_subnetworks`.
|
1508
|
-
Structure is documented below.
|
1509
|
-
"""
|
1510
|
-
elif False:
|
1511
|
-
AccessLevelsAccessLevelBasicConditionArgsDict: TypeAlias = Mapping[str, Any]
|
1512
|
-
|
1513
1039
|
@pulumi.input_type
|
1514
1040
|
class AccessLevelsAccessLevelBasicConditionArgs:
|
1515
1041
|
def __init__(__self__, *,
|
@@ -1683,42 +1209,6 @@ class AccessLevelsAccessLevelBasicConditionArgs:
|
|
1683
1209
|
pulumi.set(self, "vpc_network_sources", value)
|
1684
1210
|
|
1685
1211
|
|
1686
|
-
if not MYPY:
|
1687
|
-
class AccessLevelsAccessLevelBasicConditionDevicePolicyArgsDict(TypedDict):
|
1688
|
-
allowed_device_management_levels: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
1689
|
-
"""
|
1690
|
-
A list of allowed device management levels.
|
1691
|
-
An empty list allows all management levels.
|
1692
|
-
Each value may be one of: `MANAGEMENT_UNSPECIFIED`, `NONE`, `BASIC`, `COMPLETE`.
|
1693
|
-
"""
|
1694
|
-
allowed_encryption_statuses: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
1695
|
-
"""
|
1696
|
-
A list of allowed encryptions statuses.
|
1697
|
-
An empty list allows all statuses.
|
1698
|
-
Each value may be one of: `ENCRYPTION_UNSPECIFIED`, `ENCRYPTION_UNSUPPORTED`, `UNENCRYPTED`, `ENCRYPTED`.
|
1699
|
-
"""
|
1700
|
-
os_constraints: NotRequired[pulumi.Input[Sequence[pulumi.Input['AccessLevelsAccessLevelBasicConditionDevicePolicyOsConstraintArgsDict']]]]
|
1701
|
-
"""
|
1702
|
-
A list of allowed OS versions.
|
1703
|
-
An empty list allows all types and all versions.
|
1704
|
-
Structure is documented below.
|
1705
|
-
"""
|
1706
|
-
require_admin_approval: NotRequired[pulumi.Input[bool]]
|
1707
|
-
"""
|
1708
|
-
Whether the device needs to be approved by the customer admin.
|
1709
|
-
"""
|
1710
|
-
require_corp_owned: NotRequired[pulumi.Input[bool]]
|
1711
|
-
"""
|
1712
|
-
Whether the device needs to be corp owned.
|
1713
|
-
"""
|
1714
|
-
require_screen_lock: NotRequired[pulumi.Input[bool]]
|
1715
|
-
"""
|
1716
|
-
Whether or not screenlock is required for the DevicePolicy
|
1717
|
-
to be true. Defaults to false.
|
1718
|
-
"""
|
1719
|
-
elif False:
|
1720
|
-
AccessLevelsAccessLevelBasicConditionDevicePolicyArgsDict: TypeAlias = Mapping[str, Any]
|
1721
|
-
|
1722
1212
|
@pulumi.input_type
|
1723
1213
|
class AccessLevelsAccessLevelBasicConditionDevicePolicyArgs:
|
1724
1214
|
def __init__(__self__, *,
|
@@ -1836,22 +1326,6 @@ class AccessLevelsAccessLevelBasicConditionDevicePolicyArgs:
|
|
1836
1326
|
pulumi.set(self, "require_screen_lock", value)
|
1837
1327
|
|
1838
1328
|
|
1839
|
-
if not MYPY:
|
1840
|
-
class AccessLevelsAccessLevelBasicConditionDevicePolicyOsConstraintArgsDict(TypedDict):
|
1841
|
-
os_type: pulumi.Input[str]
|
1842
|
-
"""
|
1843
|
-
The operating system type of the device.
|
1844
|
-
Possible values are: `OS_UNSPECIFIED`, `DESKTOP_MAC`, `DESKTOP_WINDOWS`, `DESKTOP_LINUX`, `DESKTOP_CHROME_OS`, `ANDROID`, `IOS`.
|
1845
|
-
"""
|
1846
|
-
minimum_version: NotRequired[pulumi.Input[str]]
|
1847
|
-
"""
|
1848
|
-
The minimum allowed OS version. If not set, any version
|
1849
|
-
of this OS satisfies the constraint.
|
1850
|
-
Format: "major.minor.patch" such as "10.5.301", "9.2.1".
|
1851
|
-
"""
|
1852
|
-
elif False:
|
1853
|
-
AccessLevelsAccessLevelBasicConditionDevicePolicyOsConstraintArgsDict: TypeAlias = Mapping[str, Any]
|
1854
|
-
|
1855
1329
|
@pulumi.input_type
|
1856
1330
|
class AccessLevelsAccessLevelBasicConditionDevicePolicyOsConstraintArgs:
|
1857
1331
|
def __init__(__self__, *,
|
@@ -1896,16 +1370,6 @@ class AccessLevelsAccessLevelBasicConditionDevicePolicyOsConstraintArgs:
|
|
1896
1370
|
pulumi.set(self, "minimum_version", value)
|
1897
1371
|
|
1898
1372
|
|
1899
|
-
if not MYPY:
|
1900
|
-
class AccessLevelsAccessLevelBasicConditionVpcNetworkSourceArgsDict(TypedDict):
|
1901
|
-
vpc_subnetwork: NotRequired[pulumi.Input['AccessLevelsAccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgsDict']]
|
1902
|
-
"""
|
1903
|
-
Sub networks within a VPC network.
|
1904
|
-
Structure is documented below.
|
1905
|
-
"""
|
1906
|
-
elif False:
|
1907
|
-
AccessLevelsAccessLevelBasicConditionVpcNetworkSourceArgsDict: TypeAlias = Mapping[str, Any]
|
1908
|
-
|
1909
1373
|
@pulumi.input_type
|
1910
1374
|
class AccessLevelsAccessLevelBasicConditionVpcNetworkSourceArgs:
|
1911
1375
|
def __init__(__self__, *,
|
@@ -1931,19 +1395,6 @@ class AccessLevelsAccessLevelBasicConditionVpcNetworkSourceArgs:
|
|
1931
1395
|
pulumi.set(self, "vpc_subnetwork", value)
|
1932
1396
|
|
1933
1397
|
|
1934
|
-
if not MYPY:
|
1935
|
-
class AccessLevelsAccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgsDict(TypedDict):
|
1936
|
-
network: pulumi.Input[str]
|
1937
|
-
"""
|
1938
|
-
Required. Network name to be allowed by this Access Level. Networks of foreign organizations requires `compute.network.get` permission to be granted to caller.
|
1939
|
-
"""
|
1940
|
-
vpc_ip_subnetworks: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
1941
|
-
"""
|
1942
|
-
CIDR block IP subnetwork specification. Must be IPv4.
|
1943
|
-
"""
|
1944
|
-
elif False:
|
1945
|
-
AccessLevelsAccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgsDict: TypeAlias = Mapping[str, Any]
|
1946
|
-
|
1947
1398
|
@pulumi.input_type
|
1948
1399
|
class AccessLevelsAccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgs:
|
1949
1400
|
def __init__(__self__, *,
|
@@ -1982,18 +1433,6 @@ class AccessLevelsAccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgs:
|
|
1982
1433
|
pulumi.set(self, "vpc_ip_subnetworks", value)
|
1983
1434
|
|
1984
1435
|
|
1985
|
-
if not MYPY:
|
1986
|
-
class AccessLevelsAccessLevelCustomArgsDict(TypedDict):
|
1987
|
-
expr: pulumi.Input['AccessLevelsAccessLevelCustomExprArgsDict']
|
1988
|
-
"""
|
1989
|
-
Represents a textual expression in the Common Expression Language (CEL) syntax. CEL is a C-like expression language.
|
1990
|
-
This page details the objects and attributes that are used to the build the CEL expressions for
|
1991
|
-
custom access levels - https://cloud.google.com/access-context-manager/docs/custom-access-level-spec.
|
1992
|
-
Structure is documented below.
|
1993
|
-
"""
|
1994
|
-
elif False:
|
1995
|
-
AccessLevelsAccessLevelCustomArgsDict: TypeAlias = Mapping[str, Any]
|
1996
|
-
|
1997
1436
|
@pulumi.input_type
|
1998
1437
|
class AccessLevelsAccessLevelCustomArgs:
|
1999
1438
|
def __init__(__self__, *,
|
@@ -2022,27 +1461,6 @@ class AccessLevelsAccessLevelCustomArgs:
|
|
2022
1461
|
pulumi.set(self, "expr", value)
|
2023
1462
|
|
2024
1463
|
|
2025
|
-
if not MYPY:
|
2026
|
-
class AccessLevelsAccessLevelCustomExprArgsDict(TypedDict):
|
2027
|
-
expression: pulumi.Input[str]
|
2028
|
-
"""
|
2029
|
-
Textual representation of an expression in Common Expression Language syntax.
|
2030
|
-
"""
|
2031
|
-
description: NotRequired[pulumi.Input[str]]
|
2032
|
-
"""
|
2033
|
-
Description of the expression
|
2034
|
-
"""
|
2035
|
-
location: NotRequired[pulumi.Input[str]]
|
2036
|
-
"""
|
2037
|
-
String indicating the location of the expression for error reporting, e.g. a file name and a position in the file
|
2038
|
-
"""
|
2039
|
-
title: NotRequired[pulumi.Input[str]]
|
2040
|
-
"""
|
2041
|
-
Title for the expression, i.e. a short string describing its purpose.
|
2042
|
-
"""
|
2043
|
-
elif False:
|
2044
|
-
AccessLevelsAccessLevelCustomExprArgsDict: TypeAlias = Mapping[str, Any]
|
2045
|
-
|
2046
1464
|
@pulumi.input_type
|
2047
1465
|
class AccessLevelsAccessLevelCustomExprArgs:
|
2048
1466
|
def __init__(__self__, *,
|
@@ -2113,14 +1531,6 @@ class AccessLevelsAccessLevelCustomExprArgs:
|
|
2113
1531
|
pulumi.set(self, "title", value)
|
2114
1532
|
|
2115
1533
|
|
2116
|
-
if not MYPY:
|
2117
|
-
class AccessPolicyIamBindingConditionArgsDict(TypedDict):
|
2118
|
-
expression: pulumi.Input[str]
|
2119
|
-
title: pulumi.Input[str]
|
2120
|
-
description: NotRequired[pulumi.Input[str]]
|
2121
|
-
elif False:
|
2122
|
-
AccessPolicyIamBindingConditionArgsDict: TypeAlias = Mapping[str, Any]
|
2123
|
-
|
2124
1534
|
@pulumi.input_type
|
2125
1535
|
class AccessPolicyIamBindingConditionArgs:
|
2126
1536
|
def __init__(__self__, *,
|
@@ -2160,14 +1570,6 @@ class AccessPolicyIamBindingConditionArgs:
|
|
2160
1570
|
pulumi.set(self, "description", value)
|
2161
1571
|
|
2162
1572
|
|
2163
|
-
if not MYPY:
|
2164
|
-
class AccessPolicyIamMemberConditionArgsDict(TypedDict):
|
2165
|
-
expression: pulumi.Input[str]
|
2166
|
-
title: pulumi.Input[str]
|
2167
|
-
description: NotRequired[pulumi.Input[str]]
|
2168
|
-
elif False:
|
2169
|
-
AccessPolicyIamMemberConditionArgsDict: TypeAlias = Mapping[str, Any]
|
2170
|
-
|
2171
1573
|
@pulumi.input_type
|
2172
1574
|
class AccessPolicyIamMemberConditionArgs:
|
2173
1575
|
def __init__(__self__, *,
|
@@ -2204,36 +1606,8 @@ class AccessPolicyIamMemberConditionArgs:
|
|
2204
1606
|
|
2205
1607
|
@description.setter
|
2206
1608
|
def description(self, value: Optional[pulumi.Input[str]]):
|
2207
|
-
pulumi.set(self, "description", value)
|
2208
|
-
|
2209
|
-
|
2210
|
-
if not MYPY:
|
2211
|
-
class ServicePerimeterEgressPolicyEgressFromArgsDict(TypedDict):
|
2212
|
-
identities: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
2213
|
-
"""
|
2214
|
-
A list of identities that are allowed access through this `EgressPolicy`.
|
2215
|
-
Should be in the format of email address. The email address should
|
2216
|
-
represent individual user or service account only.
|
2217
|
-
"""
|
2218
|
-
identity_type: NotRequired[pulumi.Input[str]]
|
2219
|
-
"""
|
2220
|
-
Specifies the type of identities that are allowed access to outside the
|
2221
|
-
perimeter. If left unspecified, then members of `identities` field will
|
2222
|
-
be allowed access.
|
2223
|
-
Possible values are: `ANY_IDENTITY`, `ANY_USER_ACCOUNT`, `ANY_SERVICE_ACCOUNT`.
|
2224
|
-
"""
|
2225
|
-
source_restriction: NotRequired[pulumi.Input[str]]
|
2226
|
-
"""
|
2227
|
-
Whether to enforce traffic restrictions based on `sources` field. If the `sources` field is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.
|
2228
|
-
Possible values are: `SOURCE_RESTRICTION_UNSPECIFIED`, `SOURCE_RESTRICTION_ENABLED`, `SOURCE_RESTRICTION_DISABLED`.
|
2229
|
-
"""
|
2230
|
-
sources: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterEgressPolicyEgressFromSourceArgsDict']]]]
|
2231
|
-
"""
|
2232
|
-
Sources that this EgressPolicy authorizes access from.
|
2233
|
-
Structure is documented below.
|
2234
|
-
"""
|
2235
|
-
elif False:
|
2236
|
-
ServicePerimeterEgressPolicyEgressFromArgsDict: TypeAlias = Mapping[str, Any]
|
1609
|
+
pulumi.set(self, "description", value)
|
1610
|
+
|
2237
1611
|
|
2238
1612
|
@pulumi.input_type
|
2239
1613
|
class ServicePerimeterEgressPolicyEgressFromArgs:
|
@@ -2320,15 +1694,6 @@ class ServicePerimeterEgressPolicyEgressFromArgs:
|
|
2320
1694
|
pulumi.set(self, "sources", value)
|
2321
1695
|
|
2322
1696
|
|
2323
|
-
if not MYPY:
|
2324
|
-
class ServicePerimeterEgressPolicyEgressFromSourceArgsDict(TypedDict):
|
2325
|
-
access_level: NotRequired[pulumi.Input[str]]
|
2326
|
-
"""
|
2327
|
-
An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
|
2328
|
-
"""
|
2329
|
-
elif False:
|
2330
|
-
ServicePerimeterEgressPolicyEgressFromSourceArgsDict: TypeAlias = Mapping[str, Any]
|
2331
|
-
|
2332
1697
|
@pulumi.input_type
|
2333
1698
|
class ServicePerimeterEgressPolicyEgressFromSourceArgs:
|
2334
1699
|
def __init__(__self__, *,
|
@@ -2352,31 +1717,6 @@ class ServicePerimeterEgressPolicyEgressFromSourceArgs:
|
|
2352
1717
|
pulumi.set(self, "access_level", value)
|
2353
1718
|
|
2354
1719
|
|
2355
|
-
if not MYPY:
|
2356
|
-
class ServicePerimeterEgressPolicyEgressToArgsDict(TypedDict):
|
2357
|
-
external_resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
2358
|
-
"""
|
2359
|
-
A list of external resources that are allowed to be accessed. A request
|
2360
|
-
matches if it contains an external resource in this list (Example:
|
2361
|
-
s3://bucket/path). Currently '*' is not allowed.
|
2362
|
-
"""
|
2363
|
-
operations: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterEgressPolicyEgressToOperationArgsDict']]]]
|
2364
|
-
"""
|
2365
|
-
A list of `ApiOperations` that this egress rule applies to. A request matches
|
2366
|
-
if it contains an operation/service in this list.
|
2367
|
-
Structure is documented below.
|
2368
|
-
"""
|
2369
|
-
resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
2370
|
-
"""
|
2371
|
-
A list of resources, currently only projects in the form
|
2372
|
-
`projects/<projectnumber>`, that match this to stanza. A request matches
|
2373
|
-
if it contains a resource in this list. If * is specified for resources,
|
2374
|
-
then this `EgressTo` rule will authorize access to all resources outside
|
2375
|
-
the perimeter.
|
2376
|
-
"""
|
2377
|
-
elif False:
|
2378
|
-
ServicePerimeterEgressPolicyEgressToArgsDict: TypeAlias = Mapping[str, Any]
|
2379
|
-
|
2380
1720
|
@pulumi.input_type
|
2381
1721
|
class ServicePerimeterEgressPolicyEgressToArgs:
|
2382
1722
|
def __init__(__self__, *,
|
@@ -2448,25 +1788,6 @@ class ServicePerimeterEgressPolicyEgressToArgs:
|
|
2448
1788
|
pulumi.set(self, "resources", value)
|
2449
1789
|
|
2450
1790
|
|
2451
|
-
if not MYPY:
|
2452
|
-
class ServicePerimeterEgressPolicyEgressToOperationArgsDict(TypedDict):
|
2453
|
-
method_selectors: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterEgressPolicyEgressToOperationMethodSelectorArgsDict']]]]
|
2454
|
-
"""
|
2455
|
-
API methods or permissions to allow. Method or permission must belong
|
2456
|
-
to the service specified by `serviceName` field. A single MethodSelector
|
2457
|
-
entry with `*` specified for the `method` field will allow all methods
|
2458
|
-
AND permissions for the service specified in `serviceName`.
|
2459
|
-
Structure is documented below.
|
2460
|
-
"""
|
2461
|
-
service_name: NotRequired[pulumi.Input[str]]
|
2462
|
-
"""
|
2463
|
-
The name of the API whose methods or permissions the `IngressPolicy` or
|
2464
|
-
`EgressPolicy` want to allow. A single `ApiOperation` with serviceName
|
2465
|
-
field set to `*` will allow all methods AND permissions for all services.
|
2466
|
-
"""
|
2467
|
-
elif False:
|
2468
|
-
ServicePerimeterEgressPolicyEgressToOperationArgsDict: TypeAlias = Mapping[str, Any]
|
2469
|
-
|
2470
1791
|
@pulumi.input_type
|
2471
1792
|
class ServicePerimeterEgressPolicyEgressToOperationArgs:
|
2472
1793
|
def __init__(__self__, *,
|
@@ -2518,22 +1839,6 @@ class ServicePerimeterEgressPolicyEgressToOperationArgs:
|
|
2518
1839
|
pulumi.set(self, "service_name", value)
|
2519
1840
|
|
2520
1841
|
|
2521
|
-
if not MYPY:
|
2522
|
-
class ServicePerimeterEgressPolicyEgressToOperationMethodSelectorArgsDict(TypedDict):
|
2523
|
-
method: NotRequired[pulumi.Input[str]]
|
2524
|
-
"""
|
2525
|
-
Value for `method` should be a valid method name for the corresponding
|
2526
|
-
`serviceName` in `ApiOperation`. If `*` used as value for method,
|
2527
|
-
then ALL methods and permissions are allowed.
|
2528
|
-
"""
|
2529
|
-
permission: NotRequired[pulumi.Input[str]]
|
2530
|
-
"""
|
2531
|
-
Value for permission should be a valid Cloud IAM permission for the
|
2532
|
-
corresponding `serviceName` in `ApiOperation`.
|
2533
|
-
"""
|
2534
|
-
elif False:
|
2535
|
-
ServicePerimeterEgressPolicyEgressToOperationMethodSelectorArgsDict: TypeAlias = Mapping[str, Any]
|
2536
|
-
|
2537
1842
|
@pulumi.input_type
|
2538
1843
|
class ServicePerimeterEgressPolicyEgressToOperationMethodSelectorArgs:
|
2539
1844
|
def __init__(__self__, *,
|
@@ -2579,29 +1884,6 @@ class ServicePerimeterEgressPolicyEgressToOperationMethodSelectorArgs:
|
|
2579
1884
|
pulumi.set(self, "permission", value)
|
2580
1885
|
|
2581
1886
|
|
2582
|
-
if not MYPY:
|
2583
|
-
class ServicePerimeterIngressPolicyIngressFromArgsDict(TypedDict):
|
2584
|
-
identities: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
2585
|
-
"""
|
2586
|
-
A list of identities that are allowed access through this ingress policy.
|
2587
|
-
Should be in the format of email address. The email address should represent
|
2588
|
-
individual user or service account only.
|
2589
|
-
"""
|
2590
|
-
identity_type: NotRequired[pulumi.Input[str]]
|
2591
|
-
"""
|
2592
|
-
Specifies the type of identities that are allowed access from outside the
|
2593
|
-
perimeter. If left unspecified, then members of `identities` field will be
|
2594
|
-
allowed access.
|
2595
|
-
Possible values are: `ANY_IDENTITY`, `ANY_USER_ACCOUNT`, `ANY_SERVICE_ACCOUNT`.
|
2596
|
-
"""
|
2597
|
-
sources: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterIngressPolicyIngressFromSourceArgsDict']]]]
|
2598
|
-
"""
|
2599
|
-
Sources that this `IngressPolicy` authorizes access from.
|
2600
|
-
Structure is documented below.
|
2601
|
-
"""
|
2602
|
-
elif False:
|
2603
|
-
ServicePerimeterIngressPolicyIngressFromArgsDict: TypeAlias = Mapping[str, Any]
|
2604
|
-
|
2605
1887
|
@pulumi.input_type
|
2606
1888
|
class ServicePerimeterIngressPolicyIngressFromArgs:
|
2607
1889
|
def __init__(__self__, *,
|
@@ -2669,31 +1951,6 @@ class ServicePerimeterIngressPolicyIngressFromArgs:
|
|
2669
1951
|
pulumi.set(self, "sources", value)
|
2670
1952
|
|
2671
1953
|
|
2672
|
-
if not MYPY:
|
2673
|
-
class ServicePerimeterIngressPolicyIngressFromSourceArgsDict(TypedDict):
|
2674
|
-
access_level: NotRequired[pulumi.Input[str]]
|
2675
|
-
"""
|
2676
|
-
An `AccessLevel` resource name that allow resources within the
|
2677
|
-
`ServicePerimeters` to be accessed from the internet. `AccessLevels` listed
|
2678
|
-
must be in the same policy as this `ServicePerimeter`. Referencing a nonexistent
|
2679
|
-
`AccessLevel` will cause an error. If no `AccessLevel` names are listed,
|
2680
|
-
resources within the perimeter can only be accessed via Google Cloud calls
|
2681
|
-
with request origins within the perimeter.
|
2682
|
-
Example `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL.`
|
2683
|
-
If * is specified, then all IngressSources will be allowed.
|
2684
|
-
"""
|
2685
|
-
resource: NotRequired[pulumi.Input[str]]
|
2686
|
-
"""
|
2687
|
-
A Google Cloud resource that is allowed to ingress the perimeter.
|
2688
|
-
Requests from these resources will be allowed to access perimeter data.
|
2689
|
-
Currently only projects are allowed. Format `projects/{project_number}`
|
2690
|
-
The project may be in any Google Cloud organization, not just the
|
2691
|
-
organization that the perimeter is defined in. `*` is not allowed, the case
|
2692
|
-
of allowing all Google Cloud resources only is not supported.
|
2693
|
-
"""
|
2694
|
-
elif False:
|
2695
|
-
ServicePerimeterIngressPolicyIngressFromSourceArgsDict: TypeAlias = Mapping[str, Any]
|
2696
|
-
|
2697
1954
|
@pulumi.input_type
|
2698
1955
|
class ServicePerimeterIngressPolicyIngressFromSourceArgs:
|
2699
1956
|
def __init__(__self__, *,
|
@@ -2757,28 +2014,6 @@ class ServicePerimeterIngressPolicyIngressFromSourceArgs:
|
|
2757
2014
|
pulumi.set(self, "resource", value)
|
2758
2015
|
|
2759
2016
|
|
2760
|
-
if not MYPY:
|
2761
|
-
class ServicePerimeterIngressPolicyIngressToArgsDict(TypedDict):
|
2762
|
-
operations: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterIngressPolicyIngressToOperationArgsDict']]]]
|
2763
|
-
"""
|
2764
|
-
A list of `ApiOperations` the sources specified in corresponding `IngressFrom`
|
2765
|
-
are allowed to perform in this `ServicePerimeter`.
|
2766
|
-
Structure is documented below.
|
2767
|
-
"""
|
2768
|
-
resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
2769
|
-
"""
|
2770
|
-
A list of resources, currently only projects in the form
|
2771
|
-
`projects/<projectnumber>`, protected by this `ServicePerimeter`
|
2772
|
-
that are allowed to be accessed by sources defined in the
|
2773
|
-
corresponding `IngressFrom`. A request matches if it contains
|
2774
|
-
a resource in this list. If `*` is specified for resources,
|
2775
|
-
then this `IngressTo` rule will authorize access to all
|
2776
|
-
resources inside the perimeter, provided that the request
|
2777
|
-
also matches the `operations` field.
|
2778
|
-
"""
|
2779
|
-
elif False:
|
2780
|
-
ServicePerimeterIngressPolicyIngressToArgsDict: TypeAlias = Mapping[str, Any]
|
2781
|
-
|
2782
2017
|
@pulumi.input_type
|
2783
2018
|
class ServicePerimeterIngressPolicyIngressToArgs:
|
2784
2019
|
def __init__(__self__, *,
|
@@ -2836,25 +2071,6 @@ class ServicePerimeterIngressPolicyIngressToArgs:
|
|
2836
2071
|
pulumi.set(self, "resources", value)
|
2837
2072
|
|
2838
2073
|
|
2839
|
-
if not MYPY:
|
2840
|
-
class ServicePerimeterIngressPolicyIngressToOperationArgsDict(TypedDict):
|
2841
|
-
method_selectors: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterIngressPolicyIngressToOperationMethodSelectorArgsDict']]]]
|
2842
|
-
"""
|
2843
|
-
API methods or permissions to allow. Method or permission must belong to
|
2844
|
-
the service specified by serviceName field. A single `MethodSelector` entry
|
2845
|
-
with `*` specified for the method field will allow all methods AND
|
2846
|
-
permissions for the service specified in `serviceName`.
|
2847
|
-
Structure is documented below.
|
2848
|
-
"""
|
2849
|
-
service_name: NotRequired[pulumi.Input[str]]
|
2850
|
-
"""
|
2851
|
-
The name of the API whose methods or permissions the `IngressPolicy` or
|
2852
|
-
`EgressPolicy` want to allow. A single `ApiOperation` with `serviceName`
|
2853
|
-
field set to `*` will allow all methods AND permissions for all services.
|
2854
|
-
"""
|
2855
|
-
elif False:
|
2856
|
-
ServicePerimeterIngressPolicyIngressToOperationArgsDict: TypeAlias = Mapping[str, Any]
|
2857
|
-
|
2858
2074
|
@pulumi.input_type
|
2859
2075
|
class ServicePerimeterIngressPolicyIngressToOperationArgs:
|
2860
2076
|
def __init__(__self__, *,
|
@@ -2906,22 +2122,6 @@ class ServicePerimeterIngressPolicyIngressToOperationArgs:
|
|
2906
2122
|
pulumi.set(self, "service_name", value)
|
2907
2123
|
|
2908
2124
|
|
2909
|
-
if not MYPY:
|
2910
|
-
class ServicePerimeterIngressPolicyIngressToOperationMethodSelectorArgsDict(TypedDict):
|
2911
|
-
method: NotRequired[pulumi.Input[str]]
|
2912
|
-
"""
|
2913
|
-
Value for method should be a valid method name for the corresponding
|
2914
|
-
serviceName in `ApiOperation`. If `*` used as value for `method`, then
|
2915
|
-
ALL methods and permissions are allowed.
|
2916
|
-
"""
|
2917
|
-
permission: NotRequired[pulumi.Input[str]]
|
2918
|
-
"""
|
2919
|
-
Value for permission should be a valid Cloud IAM permission for the
|
2920
|
-
corresponding `serviceName` in `ApiOperation`.
|
2921
|
-
"""
|
2922
|
-
elif False:
|
2923
|
-
ServicePerimeterIngressPolicyIngressToOperationMethodSelectorArgsDict: TypeAlias = Mapping[str, Any]
|
2924
|
-
|
2925
2125
|
@pulumi.input_type
|
2926
2126
|
class ServicePerimeterIngressPolicyIngressToOperationMethodSelectorArgs:
|
2927
2127
|
def __init__(__self__, *,
|
@@ -2967,59 +2167,6 @@ class ServicePerimeterIngressPolicyIngressToOperationMethodSelectorArgs:
|
|
2967
2167
|
pulumi.set(self, "permission", value)
|
2968
2168
|
|
2969
2169
|
|
2970
|
-
if not MYPY:
|
2971
|
-
class ServicePerimeterSpecArgsDict(TypedDict):
|
2972
|
-
access_levels: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
2973
|
-
"""
|
2974
|
-
A list of AccessLevel resource names that allow resources within
|
2975
|
-
the ServicePerimeter to be accessed from the internet.
|
2976
|
-
AccessLevels listed must be in the same policy as this
|
2977
|
-
ServicePerimeter. Referencing a nonexistent AccessLevel is a
|
2978
|
-
syntax error. If no AccessLevel names are listed, resources within
|
2979
|
-
the perimeter can only be accessed via GCP calls with request
|
2980
|
-
origins within the perimeter. For Service Perimeter Bridge, must
|
2981
|
-
be empty.
|
2982
|
-
Format: accessPolicies/{policy_id}/accessLevels/{access_level_name}
|
2983
|
-
"""
|
2984
|
-
egress_policies: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterSpecEgressPolicyArgsDict']]]]
|
2985
|
-
"""
|
2986
|
-
List of EgressPolicies to apply to the perimeter. A perimeter may
|
2987
|
-
have multiple EgressPolicies, each of which is evaluated separately.
|
2988
|
-
Access is granted if any EgressPolicy grants it. Must be empty for
|
2989
|
-
a perimeter bridge.
|
2990
|
-
Structure is documented below.
|
2991
|
-
"""
|
2992
|
-
ingress_policies: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterSpecIngressPolicyArgsDict']]]]
|
2993
|
-
"""
|
2994
|
-
List of `IngressPolicies` to apply to the perimeter. A perimeter may
|
2995
|
-
have multiple `IngressPolicies`, each of which is evaluated
|
2996
|
-
separately. Access is granted if any `Ingress Policy` grants it.
|
2997
|
-
Must be empty for a perimeter bridge.
|
2998
|
-
Structure is documented below.
|
2999
|
-
"""
|
3000
|
-
resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
3001
|
-
"""
|
3002
|
-
A list of GCP resources that are inside of the service perimeter.
|
3003
|
-
Currently only projects are allowed.
|
3004
|
-
Format: projects/{project_number}
|
3005
|
-
"""
|
3006
|
-
restricted_services: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
3007
|
-
"""
|
3008
|
-
GCP services that are subject to the Service Perimeter
|
3009
|
-
restrictions. Must contain a list of services. For example, if
|
3010
|
-
`storage.googleapis.com` is specified, access to the storage
|
3011
|
-
buckets inside the perimeter must meet the perimeter's access
|
3012
|
-
restrictions.
|
3013
|
-
"""
|
3014
|
-
vpc_accessible_services: NotRequired[pulumi.Input['ServicePerimeterSpecVpcAccessibleServicesArgsDict']]
|
3015
|
-
"""
|
3016
|
-
Specifies how APIs are allowed to communicate within the Service
|
3017
|
-
Perimeter.
|
3018
|
-
Structure is documented below.
|
3019
|
-
"""
|
3020
|
-
elif False:
|
3021
|
-
ServicePerimeterSpecArgsDict: TypeAlias = Mapping[str, Any]
|
3022
|
-
|
3023
2170
|
@pulumi.input_type
|
3024
2171
|
class ServicePerimeterSpecArgs:
|
3025
2172
|
def __init__(__self__, *,
|
@@ -3171,22 +2318,6 @@ class ServicePerimeterSpecArgs:
|
|
3171
2318
|
pulumi.set(self, "vpc_accessible_services", value)
|
3172
2319
|
|
3173
2320
|
|
3174
|
-
if not MYPY:
|
3175
|
-
class ServicePerimeterSpecEgressPolicyArgsDict(TypedDict):
|
3176
|
-
egress_from: NotRequired[pulumi.Input['ServicePerimeterSpecEgressPolicyEgressFromArgsDict']]
|
3177
|
-
"""
|
3178
|
-
Defines conditions on the source of a request causing this `EgressPolicy` to apply.
|
3179
|
-
Structure is documented below.
|
3180
|
-
"""
|
3181
|
-
egress_to: NotRequired[pulumi.Input['ServicePerimeterSpecEgressPolicyEgressToArgsDict']]
|
3182
|
-
"""
|
3183
|
-
Defines the conditions on the `ApiOperation` and destination resources that
|
3184
|
-
cause this `EgressPolicy` to apply.
|
3185
|
-
Structure is documented below.
|
3186
|
-
"""
|
3187
|
-
elif False:
|
3188
|
-
ServicePerimeterSpecEgressPolicyArgsDict: TypeAlias = Mapping[str, Any]
|
3189
|
-
|
3190
2321
|
@pulumi.input_type
|
3191
2322
|
class ServicePerimeterSpecEgressPolicyArgs:
|
3192
2323
|
def __init__(__self__, *,
|
@@ -3232,34 +2363,6 @@ class ServicePerimeterSpecEgressPolicyArgs:
|
|
3232
2363
|
pulumi.set(self, "egress_to", value)
|
3233
2364
|
|
3234
2365
|
|
3235
|
-
if not MYPY:
|
3236
|
-
class ServicePerimeterSpecEgressPolicyEgressFromArgsDict(TypedDict):
|
3237
|
-
identities: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
3238
|
-
"""
|
3239
|
-
A list of identities that are allowed access through this `EgressPolicy`.
|
3240
|
-
Should be in the format of email address. The email address should
|
3241
|
-
represent individual user or service account only.
|
3242
|
-
"""
|
3243
|
-
identity_type: NotRequired[pulumi.Input[str]]
|
3244
|
-
"""
|
3245
|
-
Specifies the type of identities that are allowed access to outside the
|
3246
|
-
perimeter. If left unspecified, then members of `identities` field will
|
3247
|
-
be allowed access.
|
3248
|
-
Possible values are: `IDENTITY_TYPE_UNSPECIFIED`, `ANY_IDENTITY`, `ANY_USER_ACCOUNT`, `ANY_SERVICE_ACCOUNT`.
|
3249
|
-
"""
|
3250
|
-
source_restriction: NotRequired[pulumi.Input[str]]
|
3251
|
-
"""
|
3252
|
-
Whether to enforce traffic restrictions based on `sources` field. If the `sources` field is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.
|
3253
|
-
Possible values are: `SOURCE_RESTRICTION_UNSPECIFIED`, `SOURCE_RESTRICTION_ENABLED`, `SOURCE_RESTRICTION_DISABLED`.
|
3254
|
-
"""
|
3255
|
-
sources: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterSpecEgressPolicyEgressFromSourceArgsDict']]]]
|
3256
|
-
"""
|
3257
|
-
Sources that this EgressPolicy authorizes access from.
|
3258
|
-
Structure is documented below.
|
3259
|
-
"""
|
3260
|
-
elif False:
|
3261
|
-
ServicePerimeterSpecEgressPolicyEgressFromArgsDict: TypeAlias = Mapping[str, Any]
|
3262
|
-
|
3263
2366
|
@pulumi.input_type
|
3264
2367
|
class ServicePerimeterSpecEgressPolicyEgressFromArgs:
|
3265
2368
|
def __init__(__self__, *,
|
@@ -3345,15 +2448,6 @@ class ServicePerimeterSpecEgressPolicyEgressFromArgs:
|
|
3345
2448
|
pulumi.set(self, "sources", value)
|
3346
2449
|
|
3347
2450
|
|
3348
|
-
if not MYPY:
|
3349
|
-
class ServicePerimeterSpecEgressPolicyEgressFromSourceArgsDict(TypedDict):
|
3350
|
-
access_level: NotRequired[pulumi.Input[str]]
|
3351
|
-
"""
|
3352
|
-
An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
|
3353
|
-
"""
|
3354
|
-
elif False:
|
3355
|
-
ServicePerimeterSpecEgressPolicyEgressFromSourceArgsDict: TypeAlias = Mapping[str, Any]
|
3356
|
-
|
3357
2451
|
@pulumi.input_type
|
3358
2452
|
class ServicePerimeterSpecEgressPolicyEgressFromSourceArgs:
|
3359
2453
|
def __init__(__self__, *,
|
@@ -3377,31 +2471,6 @@ class ServicePerimeterSpecEgressPolicyEgressFromSourceArgs:
|
|
3377
2471
|
pulumi.set(self, "access_level", value)
|
3378
2472
|
|
3379
2473
|
|
3380
|
-
if not MYPY:
|
3381
|
-
class ServicePerimeterSpecEgressPolicyEgressToArgsDict(TypedDict):
|
3382
|
-
external_resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
3383
|
-
"""
|
3384
|
-
A list of external resources that are allowed to be accessed. A request
|
3385
|
-
matches if it contains an external resource in this list (Example:
|
3386
|
-
s3://bucket/path). Currently '*' is not allowed.
|
3387
|
-
"""
|
3388
|
-
operations: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterSpecEgressPolicyEgressToOperationArgsDict']]]]
|
3389
|
-
"""
|
3390
|
-
A list of `ApiOperations` that this egress rule applies to. A request matches
|
3391
|
-
if it contains an operation/service in this list.
|
3392
|
-
Structure is documented below.
|
3393
|
-
"""
|
3394
|
-
resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
3395
|
-
"""
|
3396
|
-
A list of resources, currently only projects in the form
|
3397
|
-
`projects/<projectnumber>`, that match this to stanza. A request matches
|
3398
|
-
if it contains a resource in this list. If * is specified for resources,
|
3399
|
-
then this `EgressTo` rule will authorize access to all resources outside
|
3400
|
-
the perimeter.
|
3401
|
-
"""
|
3402
|
-
elif False:
|
3403
|
-
ServicePerimeterSpecEgressPolicyEgressToArgsDict: TypeAlias = Mapping[str, Any]
|
3404
|
-
|
3405
2474
|
@pulumi.input_type
|
3406
2475
|
class ServicePerimeterSpecEgressPolicyEgressToArgs:
|
3407
2476
|
def __init__(__self__, *,
|
@@ -3473,25 +2542,6 @@ class ServicePerimeterSpecEgressPolicyEgressToArgs:
|
|
3473
2542
|
pulumi.set(self, "resources", value)
|
3474
2543
|
|
3475
2544
|
|
3476
|
-
if not MYPY:
|
3477
|
-
class ServicePerimeterSpecEgressPolicyEgressToOperationArgsDict(TypedDict):
|
3478
|
-
method_selectors: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterSpecEgressPolicyEgressToOperationMethodSelectorArgsDict']]]]
|
3479
|
-
"""
|
3480
|
-
API methods or permissions to allow. Method or permission must belong
|
3481
|
-
to the service specified by `serviceName` field. A single MethodSelector
|
3482
|
-
entry with `*` specified for the `method` field will allow all methods
|
3483
|
-
AND permissions for the service specified in `serviceName`.
|
3484
|
-
Structure is documented below.
|
3485
|
-
"""
|
3486
|
-
service_name: NotRequired[pulumi.Input[str]]
|
3487
|
-
"""
|
3488
|
-
The name of the API whose methods or permissions the `IngressPolicy` or
|
3489
|
-
`EgressPolicy` want to allow. A single `ApiOperation` with serviceName
|
3490
|
-
field set to `*` will allow all methods AND permissions for all services.
|
3491
|
-
"""
|
3492
|
-
elif False:
|
3493
|
-
ServicePerimeterSpecEgressPolicyEgressToOperationArgsDict: TypeAlias = Mapping[str, Any]
|
3494
|
-
|
3495
2545
|
@pulumi.input_type
|
3496
2546
|
class ServicePerimeterSpecEgressPolicyEgressToOperationArgs:
|
3497
2547
|
def __init__(__self__, *,
|
@@ -3543,22 +2593,6 @@ class ServicePerimeterSpecEgressPolicyEgressToOperationArgs:
|
|
3543
2593
|
pulumi.set(self, "service_name", value)
|
3544
2594
|
|
3545
2595
|
|
3546
|
-
if not MYPY:
|
3547
|
-
class ServicePerimeterSpecEgressPolicyEgressToOperationMethodSelectorArgsDict(TypedDict):
|
3548
|
-
method: NotRequired[pulumi.Input[str]]
|
3549
|
-
"""
|
3550
|
-
Value for `method` should be a valid method name for the corresponding
|
3551
|
-
`serviceName` in `ApiOperation`. If `*` used as value for method,
|
3552
|
-
then ALL methods and permissions are allowed.
|
3553
|
-
"""
|
3554
|
-
permission: NotRequired[pulumi.Input[str]]
|
3555
|
-
"""
|
3556
|
-
Value for permission should be a valid Cloud IAM permission for the
|
3557
|
-
corresponding `serviceName` in `ApiOperation`.
|
3558
|
-
"""
|
3559
|
-
elif False:
|
3560
|
-
ServicePerimeterSpecEgressPolicyEgressToOperationMethodSelectorArgsDict: TypeAlias = Mapping[str, Any]
|
3561
|
-
|
3562
2596
|
@pulumi.input_type
|
3563
2597
|
class ServicePerimeterSpecEgressPolicyEgressToOperationMethodSelectorArgs:
|
3564
2598
|
def __init__(__self__, *,
|
@@ -3597,29 +2631,12 @@ class ServicePerimeterSpecEgressPolicyEgressToOperationMethodSelectorArgs:
|
|
3597
2631
|
Value for permission should be a valid Cloud IAM permission for the
|
3598
2632
|
corresponding `serviceName` in `ApiOperation`.
|
3599
2633
|
"""
|
3600
|
-
return pulumi.get(self, "permission")
|
3601
|
-
|
3602
|
-
@permission.setter
|
3603
|
-
def permission(self, value: Optional[pulumi.Input[str]]):
|
3604
|
-
pulumi.set(self, "permission", value)
|
3605
|
-
|
3606
|
-
|
3607
|
-
if not MYPY:
|
3608
|
-
class ServicePerimeterSpecIngressPolicyArgsDict(TypedDict):
|
3609
|
-
ingress_from: NotRequired[pulumi.Input['ServicePerimeterSpecIngressPolicyIngressFromArgsDict']]
|
3610
|
-
"""
|
3611
|
-
Defines the conditions on the source of a request causing this `IngressPolicy`
|
3612
|
-
to apply.
|
3613
|
-
Structure is documented below.
|
3614
|
-
"""
|
3615
|
-
ingress_to: NotRequired[pulumi.Input['ServicePerimeterSpecIngressPolicyIngressToArgsDict']]
|
3616
|
-
"""
|
3617
|
-
Defines the conditions on the `ApiOperation` and request destination that cause
|
3618
|
-
this `IngressPolicy` to apply.
|
3619
|
-
Structure is documented below.
|
3620
|
-
"""
|
3621
|
-
elif False:
|
3622
|
-
ServicePerimeterSpecIngressPolicyArgsDict: TypeAlias = Mapping[str, Any]
|
2634
|
+
return pulumi.get(self, "permission")
|
2635
|
+
|
2636
|
+
@permission.setter
|
2637
|
+
def permission(self, value: Optional[pulumi.Input[str]]):
|
2638
|
+
pulumi.set(self, "permission", value)
|
2639
|
+
|
3623
2640
|
|
3624
2641
|
@pulumi.input_type
|
3625
2642
|
class ServicePerimeterSpecIngressPolicyArgs:
|
@@ -3668,29 +2685,6 @@ class ServicePerimeterSpecIngressPolicyArgs:
|
|
3668
2685
|
pulumi.set(self, "ingress_to", value)
|
3669
2686
|
|
3670
2687
|
|
3671
|
-
if not MYPY:
|
3672
|
-
class ServicePerimeterSpecIngressPolicyIngressFromArgsDict(TypedDict):
|
3673
|
-
identities: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
3674
|
-
"""
|
3675
|
-
A list of identities that are allowed access through this ingress policy.
|
3676
|
-
Should be in the format of email address. The email address should represent
|
3677
|
-
individual user or service account only.
|
3678
|
-
"""
|
3679
|
-
identity_type: NotRequired[pulumi.Input[str]]
|
3680
|
-
"""
|
3681
|
-
Specifies the type of identities that are allowed access from outside the
|
3682
|
-
perimeter. If left unspecified, then members of `identities` field will be
|
3683
|
-
allowed access.
|
3684
|
-
Possible values are: `IDENTITY_TYPE_UNSPECIFIED`, `ANY_IDENTITY`, `ANY_USER_ACCOUNT`, `ANY_SERVICE_ACCOUNT`.
|
3685
|
-
"""
|
3686
|
-
sources: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterSpecIngressPolicyIngressFromSourceArgsDict']]]]
|
3687
|
-
"""
|
3688
|
-
Sources that this `IngressPolicy` authorizes access from.
|
3689
|
-
Structure is documented below.
|
3690
|
-
"""
|
3691
|
-
elif False:
|
3692
|
-
ServicePerimeterSpecIngressPolicyIngressFromArgsDict: TypeAlias = Mapping[str, Any]
|
3693
|
-
|
3694
2688
|
@pulumi.input_type
|
3695
2689
|
class ServicePerimeterSpecIngressPolicyIngressFromArgs:
|
3696
2690
|
def __init__(__self__, *,
|
@@ -3758,24 +2752,6 @@ class ServicePerimeterSpecIngressPolicyIngressFromArgs:
|
|
3758
2752
|
pulumi.set(self, "sources", value)
|
3759
2753
|
|
3760
2754
|
|
3761
|
-
if not MYPY:
|
3762
|
-
class ServicePerimeterSpecIngressPolicyIngressFromSourceArgsDict(TypedDict):
|
3763
|
-
access_level: NotRequired[pulumi.Input[str]]
|
3764
|
-
"""
|
3765
|
-
An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
|
3766
|
-
"""
|
3767
|
-
resource: NotRequired[pulumi.Input[str]]
|
3768
|
-
"""
|
3769
|
-
A Google Cloud resource that is allowed to ingress the perimeter.
|
3770
|
-
Requests from these resources will be allowed to access perimeter data.
|
3771
|
-
Currently only projects are allowed. Format `projects/{project_number}`
|
3772
|
-
The project may be in any Google Cloud organization, not just the
|
3773
|
-
organization that the perimeter is defined in. `*` is not allowed, the case
|
3774
|
-
of allowing all Google Cloud resources only is not supported.
|
3775
|
-
"""
|
3776
|
-
elif False:
|
3777
|
-
ServicePerimeterSpecIngressPolicyIngressFromSourceArgsDict: TypeAlias = Mapping[str, Any]
|
3778
|
-
|
3779
2755
|
@pulumi.input_type
|
3780
2756
|
class ServicePerimeterSpecIngressPolicyIngressFromSourceArgs:
|
3781
2757
|
def __init__(__self__, *,
|
@@ -3825,28 +2801,6 @@ class ServicePerimeterSpecIngressPolicyIngressFromSourceArgs:
|
|
3825
2801
|
pulumi.set(self, "resource", value)
|
3826
2802
|
|
3827
2803
|
|
3828
|
-
if not MYPY:
|
3829
|
-
class ServicePerimeterSpecIngressPolicyIngressToArgsDict(TypedDict):
|
3830
|
-
operations: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterSpecIngressPolicyIngressToOperationArgsDict']]]]
|
3831
|
-
"""
|
3832
|
-
A list of `ApiOperations` the sources specified in corresponding `IngressFrom`
|
3833
|
-
are allowed to perform in this `ServicePerimeter`.
|
3834
|
-
Structure is documented below.
|
3835
|
-
"""
|
3836
|
-
resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
3837
|
-
"""
|
3838
|
-
A list of resources, currently only projects in the form
|
3839
|
-
`projects/<projectnumber>`, protected by this `ServicePerimeter`
|
3840
|
-
that are allowed to be accessed by sources defined in the
|
3841
|
-
corresponding `IngressFrom`. A request matches if it contains
|
3842
|
-
a resource in this list. If `*` is specified for resources,
|
3843
|
-
then this `IngressTo` rule will authorize access to all
|
3844
|
-
resources inside the perimeter, provided that the request
|
3845
|
-
also matches the `operations` field.
|
3846
|
-
"""
|
3847
|
-
elif False:
|
3848
|
-
ServicePerimeterSpecIngressPolicyIngressToArgsDict: TypeAlias = Mapping[str, Any]
|
3849
|
-
|
3850
2804
|
@pulumi.input_type
|
3851
2805
|
class ServicePerimeterSpecIngressPolicyIngressToArgs:
|
3852
2806
|
def __init__(__self__, *,
|
@@ -3904,25 +2858,6 @@ class ServicePerimeterSpecIngressPolicyIngressToArgs:
|
|
3904
2858
|
pulumi.set(self, "resources", value)
|
3905
2859
|
|
3906
2860
|
|
3907
|
-
if not MYPY:
|
3908
|
-
class ServicePerimeterSpecIngressPolicyIngressToOperationArgsDict(TypedDict):
|
3909
|
-
method_selectors: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterSpecIngressPolicyIngressToOperationMethodSelectorArgsDict']]]]
|
3910
|
-
"""
|
3911
|
-
API methods or permissions to allow. Method or permission must belong
|
3912
|
-
to the service specified by `serviceName` field. A single MethodSelector
|
3913
|
-
entry with `*` specified for the `method` field will allow all methods
|
3914
|
-
AND permissions for the service specified in `serviceName`.
|
3915
|
-
Structure is documented below.
|
3916
|
-
"""
|
3917
|
-
service_name: NotRequired[pulumi.Input[str]]
|
3918
|
-
"""
|
3919
|
-
The name of the API whose methods or permissions the `IngressPolicy` or
|
3920
|
-
`EgressPolicy` want to allow. A single `ApiOperation` with serviceName
|
3921
|
-
field set to `*` will allow all methods AND permissions for all services.
|
3922
|
-
"""
|
3923
|
-
elif False:
|
3924
|
-
ServicePerimeterSpecIngressPolicyIngressToOperationArgsDict: TypeAlias = Mapping[str, Any]
|
3925
|
-
|
3926
2861
|
@pulumi.input_type
|
3927
2862
|
class ServicePerimeterSpecIngressPolicyIngressToOperationArgs:
|
3928
2863
|
def __init__(__self__, *,
|
@@ -3974,22 +2909,6 @@ class ServicePerimeterSpecIngressPolicyIngressToOperationArgs:
|
|
3974
2909
|
pulumi.set(self, "service_name", value)
|
3975
2910
|
|
3976
2911
|
|
3977
|
-
if not MYPY:
|
3978
|
-
class ServicePerimeterSpecIngressPolicyIngressToOperationMethodSelectorArgsDict(TypedDict):
|
3979
|
-
method: NotRequired[pulumi.Input[str]]
|
3980
|
-
"""
|
3981
|
-
Value for `method` should be a valid method name for the corresponding
|
3982
|
-
`serviceName` in `ApiOperation`. If `*` used as value for method,
|
3983
|
-
then ALL methods and permissions are allowed.
|
3984
|
-
"""
|
3985
|
-
permission: NotRequired[pulumi.Input[str]]
|
3986
|
-
"""
|
3987
|
-
Value for permission should be a valid Cloud IAM permission for the
|
3988
|
-
corresponding `serviceName` in `ApiOperation`.
|
3989
|
-
"""
|
3990
|
-
elif False:
|
3991
|
-
ServicePerimeterSpecIngressPolicyIngressToOperationMethodSelectorArgsDict: TypeAlias = Mapping[str, Any]
|
3992
|
-
|
3993
2912
|
@pulumi.input_type
|
3994
2913
|
class ServicePerimeterSpecIngressPolicyIngressToOperationMethodSelectorArgs:
|
3995
2914
|
def __init__(__self__, *,
|
@@ -4035,21 +2954,6 @@ class ServicePerimeterSpecIngressPolicyIngressToOperationMethodSelectorArgs:
|
|
4035
2954
|
pulumi.set(self, "permission", value)
|
4036
2955
|
|
4037
2956
|
|
4038
|
-
if not MYPY:
|
4039
|
-
class ServicePerimeterSpecVpcAccessibleServicesArgsDict(TypedDict):
|
4040
|
-
allowed_services: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4041
|
-
"""
|
4042
|
-
The list of APIs usable within the Service Perimeter.
|
4043
|
-
Must be empty unless `enableRestriction` is True.
|
4044
|
-
"""
|
4045
|
-
enable_restriction: NotRequired[pulumi.Input[bool]]
|
4046
|
-
"""
|
4047
|
-
Whether to restrict API calls within the Service Perimeter to the
|
4048
|
-
list of APIs specified in 'allowedServices'.
|
4049
|
-
"""
|
4050
|
-
elif False:
|
4051
|
-
ServicePerimeterSpecVpcAccessibleServicesArgsDict: TypeAlias = Mapping[str, Any]
|
4052
|
-
|
4053
2957
|
@pulumi.input_type
|
4054
2958
|
class ServicePerimeterSpecVpcAccessibleServicesArgs:
|
4055
2959
|
def __init__(__self__, *,
|
@@ -4093,59 +2997,6 @@ class ServicePerimeterSpecVpcAccessibleServicesArgs:
|
|
4093
2997
|
pulumi.set(self, "enable_restriction", value)
|
4094
2998
|
|
4095
2999
|
|
4096
|
-
if not MYPY:
|
4097
|
-
class ServicePerimeterStatusArgsDict(TypedDict):
|
4098
|
-
access_levels: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4099
|
-
"""
|
4100
|
-
A list of AccessLevel resource names that allow resources within
|
4101
|
-
the ServicePerimeter to be accessed from the internet.
|
4102
|
-
AccessLevels listed must be in the same policy as this
|
4103
|
-
ServicePerimeter. Referencing a nonexistent AccessLevel is a
|
4104
|
-
syntax error. If no AccessLevel names are listed, resources within
|
4105
|
-
the perimeter can only be accessed via GCP calls with request
|
4106
|
-
origins within the perimeter. For Service Perimeter Bridge, must
|
4107
|
-
be empty.
|
4108
|
-
Format: accessPolicies/{policy_id}/accessLevels/{access_level_name}
|
4109
|
-
"""
|
4110
|
-
egress_policies: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterStatusEgressPolicyArgsDict']]]]
|
4111
|
-
"""
|
4112
|
-
List of EgressPolicies to apply to the perimeter. A perimeter may
|
4113
|
-
have multiple EgressPolicies, each of which is evaluated separately.
|
4114
|
-
Access is granted if any EgressPolicy grants it. Must be empty for
|
4115
|
-
a perimeter bridge.
|
4116
|
-
Structure is documented below.
|
4117
|
-
"""
|
4118
|
-
ingress_policies: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterStatusIngressPolicyArgsDict']]]]
|
4119
|
-
"""
|
4120
|
-
List of `IngressPolicies` to apply to the perimeter. A perimeter may
|
4121
|
-
have multiple `IngressPolicies`, each of which is evaluated
|
4122
|
-
separately. Access is granted if any `Ingress Policy` grants it.
|
4123
|
-
Must be empty for a perimeter bridge.
|
4124
|
-
Structure is documented below.
|
4125
|
-
"""
|
4126
|
-
resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4127
|
-
"""
|
4128
|
-
A list of GCP resources that are inside of the service perimeter.
|
4129
|
-
Currently only projects are allowed.
|
4130
|
-
Format: projects/{project_number}
|
4131
|
-
"""
|
4132
|
-
restricted_services: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4133
|
-
"""
|
4134
|
-
GCP services that are subject to the Service Perimeter
|
4135
|
-
restrictions. Must contain a list of services. For example, if
|
4136
|
-
`storage.googleapis.com` is specified, access to the storage
|
4137
|
-
buckets inside the perimeter must meet the perimeter's access
|
4138
|
-
restrictions.
|
4139
|
-
"""
|
4140
|
-
vpc_accessible_services: NotRequired[pulumi.Input['ServicePerimeterStatusVpcAccessibleServicesArgsDict']]
|
4141
|
-
"""
|
4142
|
-
Specifies how APIs are allowed to communicate within the Service
|
4143
|
-
Perimeter.
|
4144
|
-
Structure is documented below.
|
4145
|
-
"""
|
4146
|
-
elif False:
|
4147
|
-
ServicePerimeterStatusArgsDict: TypeAlias = Mapping[str, Any]
|
4148
|
-
|
4149
3000
|
@pulumi.input_type
|
4150
3001
|
class ServicePerimeterStatusArgs:
|
4151
3002
|
def __init__(__self__, *,
|
@@ -4297,22 +3148,6 @@ class ServicePerimeterStatusArgs:
|
|
4297
3148
|
pulumi.set(self, "vpc_accessible_services", value)
|
4298
3149
|
|
4299
3150
|
|
4300
|
-
if not MYPY:
|
4301
|
-
class ServicePerimeterStatusEgressPolicyArgsDict(TypedDict):
|
4302
|
-
egress_from: NotRequired[pulumi.Input['ServicePerimeterStatusEgressPolicyEgressFromArgsDict']]
|
4303
|
-
"""
|
4304
|
-
Defines conditions on the source of a request causing this `EgressPolicy` to apply.
|
4305
|
-
Structure is documented below.
|
4306
|
-
"""
|
4307
|
-
egress_to: NotRequired[pulumi.Input['ServicePerimeterStatusEgressPolicyEgressToArgsDict']]
|
4308
|
-
"""
|
4309
|
-
Defines the conditions on the `ApiOperation` and destination resources that
|
4310
|
-
cause this `EgressPolicy` to apply.
|
4311
|
-
Structure is documented below.
|
4312
|
-
"""
|
4313
|
-
elif False:
|
4314
|
-
ServicePerimeterStatusEgressPolicyArgsDict: TypeAlias = Mapping[str, Any]
|
4315
|
-
|
4316
3151
|
@pulumi.input_type
|
4317
3152
|
class ServicePerimeterStatusEgressPolicyArgs:
|
4318
3153
|
def __init__(__self__, *,
|
@@ -4358,34 +3193,6 @@ class ServicePerimeterStatusEgressPolicyArgs:
|
|
4358
3193
|
pulumi.set(self, "egress_to", value)
|
4359
3194
|
|
4360
3195
|
|
4361
|
-
if not MYPY:
|
4362
|
-
class ServicePerimeterStatusEgressPolicyEgressFromArgsDict(TypedDict):
|
4363
|
-
identities: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4364
|
-
"""
|
4365
|
-
A list of identities that are allowed access through this `EgressPolicy`.
|
4366
|
-
Should be in the format of email address. The email address should
|
4367
|
-
represent individual user or service account only.
|
4368
|
-
"""
|
4369
|
-
identity_type: NotRequired[pulumi.Input[str]]
|
4370
|
-
"""
|
4371
|
-
Specifies the type of identities that are allowed access to outside the
|
4372
|
-
perimeter. If left unspecified, then members of `identities` field will
|
4373
|
-
be allowed access.
|
4374
|
-
Possible values are: `IDENTITY_TYPE_UNSPECIFIED`, `ANY_IDENTITY`, `ANY_USER_ACCOUNT`, `ANY_SERVICE_ACCOUNT`.
|
4375
|
-
"""
|
4376
|
-
source_restriction: NotRequired[pulumi.Input[str]]
|
4377
|
-
"""
|
4378
|
-
Whether to enforce traffic restrictions based on `sources` field. If the `sources` field is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.
|
4379
|
-
Possible values are: `SOURCE_RESTRICTION_UNSPECIFIED`, `SOURCE_RESTRICTION_ENABLED`, `SOURCE_RESTRICTION_DISABLED`.
|
4380
|
-
"""
|
4381
|
-
sources: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterStatusEgressPolicyEgressFromSourceArgsDict']]]]
|
4382
|
-
"""
|
4383
|
-
Sources that this EgressPolicy authorizes access from.
|
4384
|
-
Structure is documented below.
|
4385
|
-
"""
|
4386
|
-
elif False:
|
4387
|
-
ServicePerimeterStatusEgressPolicyEgressFromArgsDict: TypeAlias = Mapping[str, Any]
|
4388
|
-
|
4389
3196
|
@pulumi.input_type
|
4390
3197
|
class ServicePerimeterStatusEgressPolicyEgressFromArgs:
|
4391
3198
|
def __init__(__self__, *,
|
@@ -4471,15 +3278,6 @@ class ServicePerimeterStatusEgressPolicyEgressFromArgs:
|
|
4471
3278
|
pulumi.set(self, "sources", value)
|
4472
3279
|
|
4473
3280
|
|
4474
|
-
if not MYPY:
|
4475
|
-
class ServicePerimeterStatusEgressPolicyEgressFromSourceArgsDict(TypedDict):
|
4476
|
-
access_level: NotRequired[pulumi.Input[str]]
|
4477
|
-
"""
|
4478
|
-
An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
|
4479
|
-
"""
|
4480
|
-
elif False:
|
4481
|
-
ServicePerimeterStatusEgressPolicyEgressFromSourceArgsDict: TypeAlias = Mapping[str, Any]
|
4482
|
-
|
4483
3281
|
@pulumi.input_type
|
4484
3282
|
class ServicePerimeterStatusEgressPolicyEgressFromSourceArgs:
|
4485
3283
|
def __init__(__self__, *,
|
@@ -4503,31 +3301,6 @@ class ServicePerimeterStatusEgressPolicyEgressFromSourceArgs:
|
|
4503
3301
|
pulumi.set(self, "access_level", value)
|
4504
3302
|
|
4505
3303
|
|
4506
|
-
if not MYPY:
|
4507
|
-
class ServicePerimeterStatusEgressPolicyEgressToArgsDict(TypedDict):
|
4508
|
-
external_resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4509
|
-
"""
|
4510
|
-
A list of external resources that are allowed to be accessed. A request
|
4511
|
-
matches if it contains an external resource in this list (Example:
|
4512
|
-
s3://bucket/path). Currently '*' is not allowed.
|
4513
|
-
"""
|
4514
|
-
operations: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterStatusEgressPolicyEgressToOperationArgsDict']]]]
|
4515
|
-
"""
|
4516
|
-
A list of `ApiOperations` that this egress rule applies to. A request matches
|
4517
|
-
if it contains an operation/service in this list.
|
4518
|
-
Structure is documented below.
|
4519
|
-
"""
|
4520
|
-
resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4521
|
-
"""
|
4522
|
-
A list of resources, currently only projects in the form
|
4523
|
-
`projects/<projectnumber>`, that match this to stanza. A request matches
|
4524
|
-
if it contains a resource in this list. If * is specified for resources,
|
4525
|
-
then this `EgressTo` rule will authorize access to all resources outside
|
4526
|
-
the perimeter.
|
4527
|
-
"""
|
4528
|
-
elif False:
|
4529
|
-
ServicePerimeterStatusEgressPolicyEgressToArgsDict: TypeAlias = Mapping[str, Any]
|
4530
|
-
|
4531
3304
|
@pulumi.input_type
|
4532
3305
|
class ServicePerimeterStatusEgressPolicyEgressToArgs:
|
4533
3306
|
def __init__(__self__, *,
|
@@ -4599,25 +3372,6 @@ class ServicePerimeterStatusEgressPolicyEgressToArgs:
|
|
4599
3372
|
pulumi.set(self, "resources", value)
|
4600
3373
|
|
4601
3374
|
|
4602
|
-
if not MYPY:
|
4603
|
-
class ServicePerimeterStatusEgressPolicyEgressToOperationArgsDict(TypedDict):
|
4604
|
-
method_selectors: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterStatusEgressPolicyEgressToOperationMethodSelectorArgsDict']]]]
|
4605
|
-
"""
|
4606
|
-
API methods or permissions to allow. Method or permission must belong
|
4607
|
-
to the service specified by `serviceName` field. A single MethodSelector
|
4608
|
-
entry with `*` specified for the `method` field will allow all methods
|
4609
|
-
AND permissions for the service specified in `serviceName`.
|
4610
|
-
Structure is documented below.
|
4611
|
-
"""
|
4612
|
-
service_name: NotRequired[pulumi.Input[str]]
|
4613
|
-
"""
|
4614
|
-
The name of the API whose methods or permissions the `IngressPolicy` or
|
4615
|
-
`EgressPolicy` want to allow. A single `ApiOperation` with serviceName
|
4616
|
-
field set to `*` will allow all methods AND permissions for all services.
|
4617
|
-
"""
|
4618
|
-
elif False:
|
4619
|
-
ServicePerimeterStatusEgressPolicyEgressToOperationArgsDict: TypeAlias = Mapping[str, Any]
|
4620
|
-
|
4621
3375
|
@pulumi.input_type
|
4622
3376
|
class ServicePerimeterStatusEgressPolicyEgressToOperationArgs:
|
4623
3377
|
def __init__(__self__, *,
|
@@ -4669,22 +3423,6 @@ class ServicePerimeterStatusEgressPolicyEgressToOperationArgs:
|
|
4669
3423
|
pulumi.set(self, "service_name", value)
|
4670
3424
|
|
4671
3425
|
|
4672
|
-
if not MYPY:
|
4673
|
-
class ServicePerimeterStatusEgressPolicyEgressToOperationMethodSelectorArgsDict(TypedDict):
|
4674
|
-
method: NotRequired[pulumi.Input[str]]
|
4675
|
-
"""
|
4676
|
-
Value for `method` should be a valid method name for the corresponding
|
4677
|
-
`serviceName` in `ApiOperation`. If `*` used as value for method,
|
4678
|
-
then ALL methods and permissions are allowed.
|
4679
|
-
"""
|
4680
|
-
permission: NotRequired[pulumi.Input[str]]
|
4681
|
-
"""
|
4682
|
-
Value for permission should be a valid Cloud IAM permission for the
|
4683
|
-
corresponding `serviceName` in `ApiOperation`.
|
4684
|
-
"""
|
4685
|
-
elif False:
|
4686
|
-
ServicePerimeterStatusEgressPolicyEgressToOperationMethodSelectorArgsDict: TypeAlias = Mapping[str, Any]
|
4687
|
-
|
4688
3426
|
@pulumi.input_type
|
4689
3427
|
class ServicePerimeterStatusEgressPolicyEgressToOperationMethodSelectorArgs:
|
4690
3428
|
def __init__(__self__, *,
|
@@ -4730,23 +3468,6 @@ class ServicePerimeterStatusEgressPolicyEgressToOperationMethodSelectorArgs:
|
|
4730
3468
|
pulumi.set(self, "permission", value)
|
4731
3469
|
|
4732
3470
|
|
4733
|
-
if not MYPY:
|
4734
|
-
class ServicePerimeterStatusIngressPolicyArgsDict(TypedDict):
|
4735
|
-
ingress_from: NotRequired[pulumi.Input['ServicePerimeterStatusIngressPolicyIngressFromArgsDict']]
|
4736
|
-
"""
|
4737
|
-
Defines the conditions on the source of a request causing this `IngressPolicy`
|
4738
|
-
to apply.
|
4739
|
-
Structure is documented below.
|
4740
|
-
"""
|
4741
|
-
ingress_to: NotRequired[pulumi.Input['ServicePerimeterStatusIngressPolicyIngressToArgsDict']]
|
4742
|
-
"""
|
4743
|
-
Defines the conditions on the `ApiOperation` and request destination that cause
|
4744
|
-
this `IngressPolicy` to apply.
|
4745
|
-
Structure is documented below.
|
4746
|
-
"""
|
4747
|
-
elif False:
|
4748
|
-
ServicePerimeterStatusIngressPolicyArgsDict: TypeAlias = Mapping[str, Any]
|
4749
|
-
|
4750
3471
|
@pulumi.input_type
|
4751
3472
|
class ServicePerimeterStatusIngressPolicyArgs:
|
4752
3473
|
def __init__(__self__, *,
|
@@ -4794,29 +3515,6 @@ class ServicePerimeterStatusIngressPolicyArgs:
|
|
4794
3515
|
pulumi.set(self, "ingress_to", value)
|
4795
3516
|
|
4796
3517
|
|
4797
|
-
if not MYPY:
|
4798
|
-
class ServicePerimeterStatusIngressPolicyIngressFromArgsDict(TypedDict):
|
4799
|
-
identities: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4800
|
-
"""
|
4801
|
-
A list of identities that are allowed access through this ingress policy.
|
4802
|
-
Should be in the format of email address. The email address should represent
|
4803
|
-
individual user or service account only.
|
4804
|
-
"""
|
4805
|
-
identity_type: NotRequired[pulumi.Input[str]]
|
4806
|
-
"""
|
4807
|
-
Specifies the type of identities that are allowed access from outside the
|
4808
|
-
perimeter. If left unspecified, then members of `identities` field will be
|
4809
|
-
allowed access.
|
4810
|
-
Possible values are: `IDENTITY_TYPE_UNSPECIFIED`, `ANY_IDENTITY`, `ANY_USER_ACCOUNT`, `ANY_SERVICE_ACCOUNT`.
|
4811
|
-
"""
|
4812
|
-
sources: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterStatusIngressPolicyIngressFromSourceArgsDict']]]]
|
4813
|
-
"""
|
4814
|
-
Sources that this `IngressPolicy` authorizes access from.
|
4815
|
-
Structure is documented below.
|
4816
|
-
"""
|
4817
|
-
elif False:
|
4818
|
-
ServicePerimeterStatusIngressPolicyIngressFromArgsDict: TypeAlias = Mapping[str, Any]
|
4819
|
-
|
4820
3518
|
@pulumi.input_type
|
4821
3519
|
class ServicePerimeterStatusIngressPolicyIngressFromArgs:
|
4822
3520
|
def __init__(__self__, *,
|
@@ -4884,24 +3582,6 @@ class ServicePerimeterStatusIngressPolicyIngressFromArgs:
|
|
4884
3582
|
pulumi.set(self, "sources", value)
|
4885
3583
|
|
4886
3584
|
|
4887
|
-
if not MYPY:
|
4888
|
-
class ServicePerimeterStatusIngressPolicyIngressFromSourceArgsDict(TypedDict):
|
4889
|
-
access_level: NotRequired[pulumi.Input[str]]
|
4890
|
-
"""
|
4891
|
-
An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
|
4892
|
-
"""
|
4893
|
-
resource: NotRequired[pulumi.Input[str]]
|
4894
|
-
"""
|
4895
|
-
A Google Cloud resource that is allowed to ingress the perimeter.
|
4896
|
-
Requests from these resources will be allowed to access perimeter data.
|
4897
|
-
Currently only projects are allowed. Format `projects/{project_number}`
|
4898
|
-
The project may be in any Google Cloud organization, not just the
|
4899
|
-
organization that the perimeter is defined in. `*` is not allowed, the case
|
4900
|
-
of allowing all Google Cloud resources only is not supported.
|
4901
|
-
"""
|
4902
|
-
elif False:
|
4903
|
-
ServicePerimeterStatusIngressPolicyIngressFromSourceArgsDict: TypeAlias = Mapping[str, Any]
|
4904
|
-
|
4905
3585
|
@pulumi.input_type
|
4906
3586
|
class ServicePerimeterStatusIngressPolicyIngressFromSourceArgs:
|
4907
3587
|
def __init__(__self__, *,
|
@@ -4950,29 +3630,7 @@ class ServicePerimeterStatusIngressPolicyIngressFromSourceArgs:
|
|
4950
3630
|
def resource(self, value: Optional[pulumi.Input[str]]):
|
4951
3631
|
pulumi.set(self, "resource", value)
|
4952
3632
|
|
4953
|
-
|
4954
|
-
if not MYPY:
|
4955
|
-
class ServicePerimeterStatusIngressPolicyIngressToArgsDict(TypedDict):
|
4956
|
-
operations: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterStatusIngressPolicyIngressToOperationArgsDict']]]]
|
4957
|
-
"""
|
4958
|
-
A list of `ApiOperations` the sources specified in corresponding `IngressFrom`
|
4959
|
-
are allowed to perform in this `ServicePerimeter`.
|
4960
|
-
Structure is documented below.
|
4961
|
-
"""
|
4962
|
-
resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
4963
|
-
"""
|
4964
|
-
A list of resources, currently only projects in the form
|
4965
|
-
`projects/<projectnumber>`, protected by this `ServicePerimeter`
|
4966
|
-
that are allowed to be accessed by sources defined in the
|
4967
|
-
corresponding `IngressFrom`. A request matches if it contains
|
4968
|
-
a resource in this list. If `*` is specified for resources,
|
4969
|
-
then this `IngressTo` rule will authorize access to all
|
4970
|
-
resources inside the perimeter, provided that the request
|
4971
|
-
also matches the `operations` field.
|
4972
|
-
"""
|
4973
|
-
elif False:
|
4974
|
-
ServicePerimeterStatusIngressPolicyIngressToArgsDict: TypeAlias = Mapping[str, Any]
|
4975
|
-
|
3633
|
+
|
4976
3634
|
@pulumi.input_type
|
4977
3635
|
class ServicePerimeterStatusIngressPolicyIngressToArgs:
|
4978
3636
|
def __init__(__self__, *,
|
@@ -5030,25 +3688,6 @@ class ServicePerimeterStatusIngressPolicyIngressToArgs:
|
|
5030
3688
|
pulumi.set(self, "resources", value)
|
5031
3689
|
|
5032
3690
|
|
5033
|
-
if not MYPY:
|
5034
|
-
class ServicePerimeterStatusIngressPolicyIngressToOperationArgsDict(TypedDict):
|
5035
|
-
method_selectors: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterStatusIngressPolicyIngressToOperationMethodSelectorArgsDict']]]]
|
5036
|
-
"""
|
5037
|
-
API methods or permissions to allow. Method or permission must belong
|
5038
|
-
to the service specified by `serviceName` field. A single MethodSelector
|
5039
|
-
entry with `*` specified for the `method` field will allow all methods
|
5040
|
-
AND permissions for the service specified in `serviceName`.
|
5041
|
-
Structure is documented below.
|
5042
|
-
"""
|
5043
|
-
service_name: NotRequired[pulumi.Input[str]]
|
5044
|
-
"""
|
5045
|
-
The name of the API whose methods or permissions the `IngressPolicy` or
|
5046
|
-
`EgressPolicy` want to allow. A single `ApiOperation` with serviceName
|
5047
|
-
field set to `*` will allow all methods AND permissions for all services.
|
5048
|
-
"""
|
5049
|
-
elif False:
|
5050
|
-
ServicePerimeterStatusIngressPolicyIngressToOperationArgsDict: TypeAlias = Mapping[str, Any]
|
5051
|
-
|
5052
3691
|
@pulumi.input_type
|
5053
3692
|
class ServicePerimeterStatusIngressPolicyIngressToOperationArgs:
|
5054
3693
|
def __init__(__self__, *,
|
@@ -5100,22 +3739,6 @@ class ServicePerimeterStatusIngressPolicyIngressToOperationArgs:
|
|
5100
3739
|
pulumi.set(self, "service_name", value)
|
5101
3740
|
|
5102
3741
|
|
5103
|
-
if not MYPY:
|
5104
|
-
class ServicePerimeterStatusIngressPolicyIngressToOperationMethodSelectorArgsDict(TypedDict):
|
5105
|
-
method: NotRequired[pulumi.Input[str]]
|
5106
|
-
"""
|
5107
|
-
Value for `method` should be a valid method name for the corresponding
|
5108
|
-
`serviceName` in `ApiOperation`. If `*` used as value for method,
|
5109
|
-
then ALL methods and permissions are allowed.
|
5110
|
-
"""
|
5111
|
-
permission: NotRequired[pulumi.Input[str]]
|
5112
|
-
"""
|
5113
|
-
Value for permission should be a valid Cloud IAM permission for the
|
5114
|
-
corresponding `serviceName` in `ApiOperation`.
|
5115
|
-
"""
|
5116
|
-
elif False:
|
5117
|
-
ServicePerimeterStatusIngressPolicyIngressToOperationMethodSelectorArgsDict: TypeAlias = Mapping[str, Any]
|
5118
|
-
|
5119
3742
|
@pulumi.input_type
|
5120
3743
|
class ServicePerimeterStatusIngressPolicyIngressToOperationMethodSelectorArgs:
|
5121
3744
|
def __init__(__self__, *,
|
@@ -5161,21 +3784,6 @@ class ServicePerimeterStatusIngressPolicyIngressToOperationMethodSelectorArgs:
|
|
5161
3784
|
pulumi.set(self, "permission", value)
|
5162
3785
|
|
5163
3786
|
|
5164
|
-
if not MYPY:
|
5165
|
-
class ServicePerimeterStatusVpcAccessibleServicesArgsDict(TypedDict):
|
5166
|
-
allowed_services: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5167
|
-
"""
|
5168
|
-
The list of APIs usable within the Service Perimeter.
|
5169
|
-
Must be empty unless `enableRestriction` is True.
|
5170
|
-
"""
|
5171
|
-
enable_restriction: NotRequired[pulumi.Input[bool]]
|
5172
|
-
"""
|
5173
|
-
Whether to restrict API calls within the Service Perimeter to the
|
5174
|
-
list of APIs specified in 'allowedServices'.
|
5175
|
-
"""
|
5176
|
-
elif False:
|
5177
|
-
ServicePerimeterStatusVpcAccessibleServicesArgsDict: TypeAlias = Mapping[str, Any]
|
5178
|
-
|
5179
3787
|
@pulumi.input_type
|
5180
3788
|
class ServicePerimeterStatusVpcAccessibleServicesArgs:
|
5181
3789
|
def __init__(__self__, *,
|
@@ -5219,82 +3827,6 @@ class ServicePerimeterStatusVpcAccessibleServicesArgs:
|
|
5219
3827
|
pulumi.set(self, "enable_restriction", value)
|
5220
3828
|
|
5221
3829
|
|
5222
|
-
if not MYPY:
|
5223
|
-
class ServicePerimetersServicePerimeterArgsDict(TypedDict):
|
5224
|
-
name: pulumi.Input[str]
|
5225
|
-
"""
|
5226
|
-
Resource name for the ServicePerimeter. The short_name component must
|
5227
|
-
begin with a letter and only include alphanumeric and '_'.
|
5228
|
-
Format: accessPolicies/{policy_id}/servicePerimeters/{short_name}
|
5229
|
-
"""
|
5230
|
-
title: pulumi.Input[str]
|
5231
|
-
"""
|
5232
|
-
Human readable title. Must be unique within the Policy.
|
5233
|
-
"""
|
5234
|
-
create_time: NotRequired[pulumi.Input[str]]
|
5235
|
-
"""
|
5236
|
-
(Output)
|
5237
|
-
Time the AccessPolicy was created in UTC.
|
5238
|
-
"""
|
5239
|
-
description: NotRequired[pulumi.Input[str]]
|
5240
|
-
"""
|
5241
|
-
Description of the ServicePerimeter and its use. Does not affect
|
5242
|
-
behavior.
|
5243
|
-
"""
|
5244
|
-
perimeter_type: NotRequired[pulumi.Input[str]]
|
5245
|
-
"""
|
5246
|
-
Specifies the type of the Perimeter. There are two types: regular and
|
5247
|
-
bridge. Regular Service Perimeter contains resources, access levels,
|
5248
|
-
and restricted services. Every resource can be in at most
|
5249
|
-
ONE regular Service Perimeter.
|
5250
|
-
In addition to being in a regular service perimeter, a resource can also
|
5251
|
-
be in zero or more perimeter bridges. A perimeter bridge only contains
|
5252
|
-
resources. Cross project operations are permitted if all effected
|
5253
|
-
resources share some perimeter (whether bridge or regular). Perimeter
|
5254
|
-
Bridge does not contain access levels or services: those are governed
|
5255
|
-
entirely by the regular perimeter that resource is in.
|
5256
|
-
Perimeter Bridges are typically useful when building more complex
|
5257
|
-
topologies with many independent perimeters that need to share some data
|
5258
|
-
with a common perimeter, but should not be able to share data among
|
5259
|
-
themselves.
|
5260
|
-
Default value is `PERIMETER_TYPE_REGULAR`.
|
5261
|
-
Possible values are: `PERIMETER_TYPE_REGULAR`, `PERIMETER_TYPE_BRIDGE`.
|
5262
|
-
"""
|
5263
|
-
spec: NotRequired[pulumi.Input['ServicePerimetersServicePerimeterSpecArgsDict']]
|
5264
|
-
"""
|
5265
|
-
Proposed (or dry run) ServicePerimeter configuration.
|
5266
|
-
This configuration allows to specify and test ServicePerimeter configuration
|
5267
|
-
without enforcing actual access restrictions. Only allowed to be set when
|
5268
|
-
the `useExplicitDryRunSpec` flag is set.
|
5269
|
-
Structure is documented below.
|
5270
|
-
"""
|
5271
|
-
status: NotRequired[pulumi.Input['ServicePerimetersServicePerimeterStatusArgsDict']]
|
5272
|
-
"""
|
5273
|
-
ServicePerimeter configuration. Specifies sets of resources,
|
5274
|
-
restricted services and access levels that determine
|
5275
|
-
perimeter content and boundaries.
|
5276
|
-
Structure is documented below.
|
5277
|
-
"""
|
5278
|
-
update_time: NotRequired[pulumi.Input[str]]
|
5279
|
-
"""
|
5280
|
-
(Output)
|
5281
|
-
Time the AccessPolicy was updated in UTC.
|
5282
|
-
"""
|
5283
|
-
use_explicit_dry_run_spec: NotRequired[pulumi.Input[bool]]
|
5284
|
-
"""
|
5285
|
-
Use explicit dry run spec flag. Ordinarily, a dry-run spec implicitly exists
|
5286
|
-
for all Service Perimeters, and that spec is identical to the status for those
|
5287
|
-
Service Perimeters. When this flag is set, it inhibits the generation of the
|
5288
|
-
implicit spec, thereby allowing the user to explicitly provide a
|
5289
|
-
configuration ("spec") to use in a dry-run version of the Service Perimeter.
|
5290
|
-
This allows the user to test changes to the enforced config ("status") without
|
5291
|
-
actually enforcing them. This testing is done through analyzing the differences
|
5292
|
-
between currently enforced and suggested restrictions. useExplicitDryRunSpec must
|
5293
|
-
bet set to True if any of the fields in the spec are set to non-default values.
|
5294
|
-
"""
|
5295
|
-
elif False:
|
5296
|
-
ServicePerimetersServicePerimeterArgsDict: TypeAlias = Mapping[str, Any]
|
5297
|
-
|
5298
3830
|
@pulumi.input_type
|
5299
3831
|
class ServicePerimetersServicePerimeterArgs:
|
5300
3832
|
def __init__(__self__, *,
|
@@ -5514,59 +4046,6 @@ class ServicePerimetersServicePerimeterArgs:
|
|
5514
4046
|
pulumi.set(self, "use_explicit_dry_run_spec", value)
|
5515
4047
|
|
5516
4048
|
|
5517
|
-
if not MYPY:
|
5518
|
-
class ServicePerimetersServicePerimeterSpecArgsDict(TypedDict):
|
5519
|
-
access_levels: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5520
|
-
"""
|
5521
|
-
A list of AccessLevel resource names that allow resources within
|
5522
|
-
the ServicePerimeter to be accessed from the internet.
|
5523
|
-
AccessLevels listed must be in the same policy as this
|
5524
|
-
ServicePerimeter. Referencing a nonexistent AccessLevel is a
|
5525
|
-
syntax error. If no AccessLevel names are listed, resources within
|
5526
|
-
the perimeter can only be accessed via GCP calls with request
|
5527
|
-
origins within the perimeter. For Service Perimeter Bridge, must
|
5528
|
-
be empty.
|
5529
|
-
Format: accessPolicies/{policy_id}/accessLevels/{access_level_name}
|
5530
|
-
"""
|
5531
|
-
egress_policies: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterSpecEgressPolicyArgsDict']]]]
|
5532
|
-
"""
|
5533
|
-
List of EgressPolicies to apply to the perimeter. A perimeter may
|
5534
|
-
have multiple EgressPolicies, each of which is evaluated separately.
|
5535
|
-
Access is granted if any EgressPolicy grants it. Must be empty for
|
5536
|
-
a perimeter bridge.
|
5537
|
-
Structure is documented below.
|
5538
|
-
"""
|
5539
|
-
ingress_policies: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterSpecIngressPolicyArgsDict']]]]
|
5540
|
-
"""
|
5541
|
-
List of `IngressPolicies` to apply to the perimeter. A perimeter may
|
5542
|
-
have multiple `IngressPolicies`, each of which is evaluated
|
5543
|
-
separately. Access is granted if any `Ingress Policy` grants it.
|
5544
|
-
Must be empty for a perimeter bridge.
|
5545
|
-
Structure is documented below.
|
5546
|
-
"""
|
5547
|
-
resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5548
|
-
"""
|
5549
|
-
A list of GCP resources that are inside of the service perimeter.
|
5550
|
-
Currently only projects are allowed.
|
5551
|
-
Format: projects/{project_number}
|
5552
|
-
"""
|
5553
|
-
restricted_services: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5554
|
-
"""
|
5555
|
-
GCP services that are subject to the Service Perimeter
|
5556
|
-
restrictions. Must contain a list of services. For example, if
|
5557
|
-
`storage.googleapis.com` is specified, access to the storage
|
5558
|
-
buckets inside the perimeter must meet the perimeter's access
|
5559
|
-
restrictions.
|
5560
|
-
"""
|
5561
|
-
vpc_accessible_services: NotRequired[pulumi.Input['ServicePerimetersServicePerimeterSpecVpcAccessibleServicesArgsDict']]
|
5562
|
-
"""
|
5563
|
-
Specifies how APIs are allowed to communicate within the Service
|
5564
|
-
Perimeter.
|
5565
|
-
Structure is documented below.
|
5566
|
-
"""
|
5567
|
-
elif False:
|
5568
|
-
ServicePerimetersServicePerimeterSpecArgsDict: TypeAlias = Mapping[str, Any]
|
5569
|
-
|
5570
4049
|
@pulumi.input_type
|
5571
4050
|
class ServicePerimetersServicePerimeterSpecArgs:
|
5572
4051
|
def __init__(__self__, *,
|
@@ -5718,22 +4197,6 @@ class ServicePerimetersServicePerimeterSpecArgs:
|
|
5718
4197
|
pulumi.set(self, "vpc_accessible_services", value)
|
5719
4198
|
|
5720
4199
|
|
5721
|
-
if not MYPY:
|
5722
|
-
class ServicePerimetersServicePerimeterSpecEgressPolicyArgsDict(TypedDict):
|
5723
|
-
egress_from: NotRequired[pulumi.Input['ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromArgsDict']]
|
5724
|
-
"""
|
5725
|
-
Defines conditions on the source of a request causing this `EgressPolicy` to apply.
|
5726
|
-
Structure is documented below.
|
5727
|
-
"""
|
5728
|
-
egress_to: NotRequired[pulumi.Input['ServicePerimetersServicePerimeterSpecEgressPolicyEgressToArgsDict']]
|
5729
|
-
"""
|
5730
|
-
Defines the conditions on the `ApiOperation` and destination resources that
|
5731
|
-
cause this `EgressPolicy` to apply.
|
5732
|
-
Structure is documented below.
|
5733
|
-
"""
|
5734
|
-
elif False:
|
5735
|
-
ServicePerimetersServicePerimeterSpecEgressPolicyArgsDict: TypeAlias = Mapping[str, Any]
|
5736
|
-
|
5737
4200
|
@pulumi.input_type
|
5738
4201
|
class ServicePerimetersServicePerimeterSpecEgressPolicyArgs:
|
5739
4202
|
def __init__(__self__, *,
|
@@ -5779,34 +4242,6 @@ class ServicePerimetersServicePerimeterSpecEgressPolicyArgs:
|
|
5779
4242
|
pulumi.set(self, "egress_to", value)
|
5780
4243
|
|
5781
4244
|
|
5782
|
-
if not MYPY:
|
5783
|
-
class ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromArgsDict(TypedDict):
|
5784
|
-
identities: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5785
|
-
"""
|
5786
|
-
A list of identities that are allowed access through this `EgressPolicy`.
|
5787
|
-
Should be in the format of email address. The email address should
|
5788
|
-
represent individual user or service account only.
|
5789
|
-
"""
|
5790
|
-
identity_type: NotRequired[pulumi.Input[str]]
|
5791
|
-
"""
|
5792
|
-
Specifies the type of identities that are allowed access to outside the
|
5793
|
-
perimeter. If left unspecified, then members of `identities` field will
|
5794
|
-
be allowed access.
|
5795
|
-
Possible values are: `IDENTITY_TYPE_UNSPECIFIED`, `ANY_IDENTITY`, `ANY_USER_ACCOUNT`, `ANY_SERVICE_ACCOUNT`.
|
5796
|
-
"""
|
5797
|
-
source_restriction: NotRequired[pulumi.Input[str]]
|
5798
|
-
"""
|
5799
|
-
Whether to enforce traffic restrictions based on `sources` field. If the `sources` field is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.
|
5800
|
-
Possible values are: `SOURCE_RESTRICTION_UNSPECIFIED`, `SOURCE_RESTRICTION_ENABLED`, `SOURCE_RESTRICTION_DISABLED`.
|
5801
|
-
"""
|
5802
|
-
sources: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromSourceArgsDict']]]]
|
5803
|
-
"""
|
5804
|
-
Sources that this EgressPolicy authorizes access from.
|
5805
|
-
Structure is documented below.
|
5806
|
-
"""
|
5807
|
-
elif False:
|
5808
|
-
ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromArgsDict: TypeAlias = Mapping[str, Any]
|
5809
|
-
|
5810
4245
|
@pulumi.input_type
|
5811
4246
|
class ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromArgs:
|
5812
4247
|
def __init__(__self__, *,
|
@@ -5892,15 +4327,6 @@ class ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromArgs:
|
|
5892
4327
|
pulumi.set(self, "sources", value)
|
5893
4328
|
|
5894
4329
|
|
5895
|
-
if not MYPY:
|
5896
|
-
class ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromSourceArgsDict(TypedDict):
|
5897
|
-
access_level: NotRequired[pulumi.Input[str]]
|
5898
|
-
"""
|
5899
|
-
An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
|
5900
|
-
"""
|
5901
|
-
elif False:
|
5902
|
-
ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromSourceArgsDict: TypeAlias = Mapping[str, Any]
|
5903
|
-
|
5904
4330
|
@pulumi.input_type
|
5905
4331
|
class ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromSourceArgs:
|
5906
4332
|
def __init__(__self__, *,
|
@@ -5924,31 +4350,6 @@ class ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromSourceArgs:
|
|
5924
4350
|
pulumi.set(self, "access_level", value)
|
5925
4351
|
|
5926
4352
|
|
5927
|
-
if not MYPY:
|
5928
|
-
class ServicePerimetersServicePerimeterSpecEgressPolicyEgressToArgsDict(TypedDict):
|
5929
|
-
external_resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5930
|
-
"""
|
5931
|
-
A list of external resources that are allowed to be accessed. A request
|
5932
|
-
matches if it contains an external resource in this list (Example:
|
5933
|
-
s3://bucket/path). Currently '*' is not allowed.
|
5934
|
-
"""
|
5935
|
-
operations: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterSpecEgressPolicyEgressToOperationArgsDict']]]]
|
5936
|
-
"""
|
5937
|
-
A list of `ApiOperations` that this egress rule applies to. A request matches
|
5938
|
-
if it contains an operation/service in this list.
|
5939
|
-
Structure is documented below.
|
5940
|
-
"""
|
5941
|
-
resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
5942
|
-
"""
|
5943
|
-
A list of resources, currently only projects in the form
|
5944
|
-
`projects/<projectnumber>`, that match this to stanza. A request matches
|
5945
|
-
if it contains a resource in this list. If * is specified for resources,
|
5946
|
-
then this `EgressTo` rule will authorize access to all resources outside
|
5947
|
-
the perimeter.
|
5948
|
-
"""
|
5949
|
-
elif False:
|
5950
|
-
ServicePerimetersServicePerimeterSpecEgressPolicyEgressToArgsDict: TypeAlias = Mapping[str, Any]
|
5951
|
-
|
5952
4353
|
@pulumi.input_type
|
5953
4354
|
class ServicePerimetersServicePerimeterSpecEgressPolicyEgressToArgs:
|
5954
4355
|
def __init__(__self__, *,
|
@@ -6020,25 +4421,6 @@ class ServicePerimetersServicePerimeterSpecEgressPolicyEgressToArgs:
|
|
6020
4421
|
pulumi.set(self, "resources", value)
|
6021
4422
|
|
6022
4423
|
|
6023
|
-
if not MYPY:
|
6024
|
-
class ServicePerimetersServicePerimeterSpecEgressPolicyEgressToOperationArgsDict(TypedDict):
|
6025
|
-
method_selectors: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterSpecEgressPolicyEgressToOperationMethodSelectorArgsDict']]]]
|
6026
|
-
"""
|
6027
|
-
API methods or permissions to allow. Method or permission must belong
|
6028
|
-
to the service specified by `serviceName` field. A single MethodSelector
|
6029
|
-
entry with `*` specified for the `method` field will allow all methods
|
6030
|
-
AND permissions for the service specified in `serviceName`.
|
6031
|
-
Structure is documented below.
|
6032
|
-
"""
|
6033
|
-
service_name: NotRequired[pulumi.Input[str]]
|
6034
|
-
"""
|
6035
|
-
The name of the API whose methods or permissions the `IngressPolicy` or
|
6036
|
-
`EgressPolicy` want to allow. A single `ApiOperation` with serviceName
|
6037
|
-
field set to `*` will allow all methods AND permissions for all services.
|
6038
|
-
"""
|
6039
|
-
elif False:
|
6040
|
-
ServicePerimetersServicePerimeterSpecEgressPolicyEgressToOperationArgsDict: TypeAlias = Mapping[str, Any]
|
6041
|
-
|
6042
4424
|
@pulumi.input_type
|
6043
4425
|
class ServicePerimetersServicePerimeterSpecEgressPolicyEgressToOperationArgs:
|
6044
4426
|
def __init__(__self__, *,
|
@@ -6090,22 +4472,6 @@ class ServicePerimetersServicePerimeterSpecEgressPolicyEgressToOperationArgs:
|
|
6090
4472
|
pulumi.set(self, "service_name", value)
|
6091
4473
|
|
6092
4474
|
|
6093
|
-
if not MYPY:
|
6094
|
-
class ServicePerimetersServicePerimeterSpecEgressPolicyEgressToOperationMethodSelectorArgsDict(TypedDict):
|
6095
|
-
method: NotRequired[pulumi.Input[str]]
|
6096
|
-
"""
|
6097
|
-
Value for `method` should be a valid method name for the corresponding
|
6098
|
-
`serviceName` in `ApiOperation`. If `*` used as value for method,
|
6099
|
-
then ALL methods and permissions are allowed.
|
6100
|
-
"""
|
6101
|
-
permission: NotRequired[pulumi.Input[str]]
|
6102
|
-
"""
|
6103
|
-
Value for permission should be a valid Cloud IAM permission for the
|
6104
|
-
corresponding `serviceName` in `ApiOperation`.
|
6105
|
-
"""
|
6106
|
-
elif False:
|
6107
|
-
ServicePerimetersServicePerimeterSpecEgressPolicyEgressToOperationMethodSelectorArgsDict: TypeAlias = Mapping[str, Any]
|
6108
|
-
|
6109
4475
|
@pulumi.input_type
|
6110
4476
|
class ServicePerimetersServicePerimeterSpecEgressPolicyEgressToOperationMethodSelectorArgs:
|
6111
4477
|
def __init__(__self__, *,
|
@@ -6151,23 +4517,6 @@ class ServicePerimetersServicePerimeterSpecEgressPolicyEgressToOperationMethodSe
|
|
6151
4517
|
pulumi.set(self, "permission", value)
|
6152
4518
|
|
6153
4519
|
|
6154
|
-
if not MYPY:
|
6155
|
-
class ServicePerimetersServicePerimeterSpecIngressPolicyArgsDict(TypedDict):
|
6156
|
-
ingress_from: NotRequired[pulumi.Input['ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromArgsDict']]
|
6157
|
-
"""
|
6158
|
-
Defines the conditions on the source of a request causing this `IngressPolicy`
|
6159
|
-
to apply.
|
6160
|
-
Structure is documented below.
|
6161
|
-
"""
|
6162
|
-
ingress_to: NotRequired[pulumi.Input['ServicePerimetersServicePerimeterSpecIngressPolicyIngressToArgsDict']]
|
6163
|
-
"""
|
6164
|
-
Defines the conditions on the `ApiOperation` and request destination that cause
|
6165
|
-
this `IngressPolicy` to apply.
|
6166
|
-
Structure is documented below.
|
6167
|
-
"""
|
6168
|
-
elif False:
|
6169
|
-
ServicePerimetersServicePerimeterSpecIngressPolicyArgsDict: TypeAlias = Mapping[str, Any]
|
6170
|
-
|
6171
4520
|
@pulumi.input_type
|
6172
4521
|
class ServicePerimetersServicePerimeterSpecIngressPolicyArgs:
|
6173
4522
|
def __init__(__self__, *,
|
@@ -6215,29 +4564,6 @@ class ServicePerimetersServicePerimeterSpecIngressPolicyArgs:
|
|
6215
4564
|
pulumi.set(self, "ingress_to", value)
|
6216
4565
|
|
6217
4566
|
|
6218
|
-
if not MYPY:
|
6219
|
-
class ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromArgsDict(TypedDict):
|
6220
|
-
identities: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
6221
|
-
"""
|
6222
|
-
A list of identities that are allowed access through this ingress policy.
|
6223
|
-
Should be in the format of email address. The email address should represent
|
6224
|
-
individual user or service account only.
|
6225
|
-
"""
|
6226
|
-
identity_type: NotRequired[pulumi.Input[str]]
|
6227
|
-
"""
|
6228
|
-
Specifies the type of identities that are allowed access from outside the
|
6229
|
-
perimeter. If left unspecified, then members of `identities` field will be
|
6230
|
-
allowed access.
|
6231
|
-
Possible values are: `IDENTITY_TYPE_UNSPECIFIED`, `ANY_IDENTITY`, `ANY_USER_ACCOUNT`, `ANY_SERVICE_ACCOUNT`.
|
6232
|
-
"""
|
6233
|
-
sources: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromSourceArgsDict']]]]
|
6234
|
-
"""
|
6235
|
-
Sources that this `IngressPolicy` authorizes access from.
|
6236
|
-
Structure is documented below.
|
6237
|
-
"""
|
6238
|
-
elif False:
|
6239
|
-
ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromArgsDict: TypeAlias = Mapping[str, Any]
|
6240
|
-
|
6241
4567
|
@pulumi.input_type
|
6242
4568
|
class ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromArgs:
|
6243
4569
|
def __init__(__self__, *,
|
@@ -6301,27 +4627,9 @@ class ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromArgs:
|
|
6301
4627
|
return pulumi.get(self, "sources")
|
6302
4628
|
|
6303
4629
|
@sources.setter
|
6304
|
-
def sources(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromSourceArgs']]]]):
|
6305
|
-
pulumi.set(self, "sources", value)
|
6306
|
-
|
6307
|
-
|
6308
|
-
if not MYPY:
|
6309
|
-
class ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromSourceArgsDict(TypedDict):
|
6310
|
-
access_level: NotRequired[pulumi.Input[str]]
|
6311
|
-
"""
|
6312
|
-
An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
|
6313
|
-
"""
|
6314
|
-
resource: NotRequired[pulumi.Input[str]]
|
6315
|
-
"""
|
6316
|
-
A Google Cloud resource that is allowed to ingress the perimeter.
|
6317
|
-
Requests from these resources will be allowed to access perimeter data.
|
6318
|
-
Currently only projects are allowed. Format `projects/{project_number}`
|
6319
|
-
The project may be in any Google Cloud organization, not just the
|
6320
|
-
organization that the perimeter is defined in. `*` is not allowed, the case
|
6321
|
-
of allowing all Google Cloud resources only is not supported.
|
6322
|
-
"""
|
6323
|
-
elif False:
|
6324
|
-
ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromSourceArgsDict: TypeAlias = Mapping[str, Any]
|
4630
|
+
def sources(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromSourceArgs']]]]):
|
4631
|
+
pulumi.set(self, "sources", value)
|
4632
|
+
|
6325
4633
|
|
6326
4634
|
@pulumi.input_type
|
6327
4635
|
class ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromSourceArgs:
|
@@ -6372,28 +4680,6 @@ class ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromSourceArgs:
|
|
6372
4680
|
pulumi.set(self, "resource", value)
|
6373
4681
|
|
6374
4682
|
|
6375
|
-
if not MYPY:
|
6376
|
-
class ServicePerimetersServicePerimeterSpecIngressPolicyIngressToArgsDict(TypedDict):
|
6377
|
-
operations: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterSpecIngressPolicyIngressToOperationArgsDict']]]]
|
6378
|
-
"""
|
6379
|
-
A list of `ApiOperations` the sources specified in corresponding `IngressFrom`
|
6380
|
-
are allowed to perform in this `ServicePerimeter`.
|
6381
|
-
Structure is documented below.
|
6382
|
-
"""
|
6383
|
-
resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
6384
|
-
"""
|
6385
|
-
A list of resources, currently only projects in the form
|
6386
|
-
`projects/<projectnumber>`, protected by this `ServicePerimeter`
|
6387
|
-
that are allowed to be accessed by sources defined in the
|
6388
|
-
corresponding `IngressFrom`. A request matches if it contains
|
6389
|
-
a resource in this list. If `*` is specified for resources,
|
6390
|
-
then this `IngressTo` rule will authorize access to all
|
6391
|
-
resources inside the perimeter, provided that the request
|
6392
|
-
also matches the `operations` field.
|
6393
|
-
"""
|
6394
|
-
elif False:
|
6395
|
-
ServicePerimetersServicePerimeterSpecIngressPolicyIngressToArgsDict: TypeAlias = Mapping[str, Any]
|
6396
|
-
|
6397
4683
|
@pulumi.input_type
|
6398
4684
|
class ServicePerimetersServicePerimeterSpecIngressPolicyIngressToArgs:
|
6399
4685
|
def __init__(__self__, *,
|
@@ -6451,25 +4737,6 @@ class ServicePerimetersServicePerimeterSpecIngressPolicyIngressToArgs:
|
|
6451
4737
|
pulumi.set(self, "resources", value)
|
6452
4738
|
|
6453
4739
|
|
6454
|
-
if not MYPY:
|
6455
|
-
class ServicePerimetersServicePerimeterSpecIngressPolicyIngressToOperationArgsDict(TypedDict):
|
6456
|
-
method_selectors: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterSpecIngressPolicyIngressToOperationMethodSelectorArgsDict']]]]
|
6457
|
-
"""
|
6458
|
-
API methods or permissions to allow. Method or permission must belong
|
6459
|
-
to the service specified by `serviceName` field. A single MethodSelector
|
6460
|
-
entry with `*` specified for the `method` field will allow all methods
|
6461
|
-
AND permissions for the service specified in `serviceName`.
|
6462
|
-
Structure is documented below.
|
6463
|
-
"""
|
6464
|
-
service_name: NotRequired[pulumi.Input[str]]
|
6465
|
-
"""
|
6466
|
-
The name of the API whose methods or permissions the `IngressPolicy` or
|
6467
|
-
`EgressPolicy` want to allow. A single `ApiOperation` with serviceName
|
6468
|
-
field set to `*` will allow all methods AND permissions for all services.
|
6469
|
-
"""
|
6470
|
-
elif False:
|
6471
|
-
ServicePerimetersServicePerimeterSpecIngressPolicyIngressToOperationArgsDict: TypeAlias = Mapping[str, Any]
|
6472
|
-
|
6473
4740
|
@pulumi.input_type
|
6474
4741
|
class ServicePerimetersServicePerimeterSpecIngressPolicyIngressToOperationArgs:
|
6475
4742
|
def __init__(__self__, *,
|
@@ -6521,22 +4788,6 @@ class ServicePerimetersServicePerimeterSpecIngressPolicyIngressToOperationArgs:
|
|
6521
4788
|
pulumi.set(self, "service_name", value)
|
6522
4789
|
|
6523
4790
|
|
6524
|
-
if not MYPY:
|
6525
|
-
class ServicePerimetersServicePerimeterSpecIngressPolicyIngressToOperationMethodSelectorArgsDict(TypedDict):
|
6526
|
-
method: NotRequired[pulumi.Input[str]]
|
6527
|
-
"""
|
6528
|
-
Value for `method` should be a valid method name for the corresponding
|
6529
|
-
`serviceName` in `ApiOperation`. If `*` used as value for method,
|
6530
|
-
then ALL methods and permissions are allowed.
|
6531
|
-
"""
|
6532
|
-
permission: NotRequired[pulumi.Input[str]]
|
6533
|
-
"""
|
6534
|
-
Value for permission should be a valid Cloud IAM permission for the
|
6535
|
-
corresponding `serviceName` in `ApiOperation`.
|
6536
|
-
"""
|
6537
|
-
elif False:
|
6538
|
-
ServicePerimetersServicePerimeterSpecIngressPolicyIngressToOperationMethodSelectorArgsDict: TypeAlias = Mapping[str, Any]
|
6539
|
-
|
6540
4791
|
@pulumi.input_type
|
6541
4792
|
class ServicePerimetersServicePerimeterSpecIngressPolicyIngressToOperationMethodSelectorArgs:
|
6542
4793
|
def __init__(__self__, *,
|
@@ -6582,21 +4833,6 @@ class ServicePerimetersServicePerimeterSpecIngressPolicyIngressToOperationMethod
|
|
6582
4833
|
pulumi.set(self, "permission", value)
|
6583
4834
|
|
6584
4835
|
|
6585
|
-
if not MYPY:
|
6586
|
-
class ServicePerimetersServicePerimeterSpecVpcAccessibleServicesArgsDict(TypedDict):
|
6587
|
-
allowed_services: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
6588
|
-
"""
|
6589
|
-
The list of APIs usable within the Service Perimeter.
|
6590
|
-
Must be empty unless `enableRestriction` is True.
|
6591
|
-
"""
|
6592
|
-
enable_restriction: NotRequired[pulumi.Input[bool]]
|
6593
|
-
"""
|
6594
|
-
Whether to restrict API calls within the Service Perimeter to the
|
6595
|
-
list of APIs specified in 'allowedServices'.
|
6596
|
-
"""
|
6597
|
-
elif False:
|
6598
|
-
ServicePerimetersServicePerimeterSpecVpcAccessibleServicesArgsDict: TypeAlias = Mapping[str, Any]
|
6599
|
-
|
6600
4836
|
@pulumi.input_type
|
6601
4837
|
class ServicePerimetersServicePerimeterSpecVpcAccessibleServicesArgs:
|
6602
4838
|
def __init__(__self__, *,
|
@@ -6640,59 +4876,6 @@ class ServicePerimetersServicePerimeterSpecVpcAccessibleServicesArgs:
|
|
6640
4876
|
pulumi.set(self, "enable_restriction", value)
|
6641
4877
|
|
6642
4878
|
|
6643
|
-
if not MYPY:
|
6644
|
-
class ServicePerimetersServicePerimeterStatusArgsDict(TypedDict):
|
6645
|
-
access_levels: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
6646
|
-
"""
|
6647
|
-
A list of AccessLevel resource names that allow resources within
|
6648
|
-
the ServicePerimeter to be accessed from the internet.
|
6649
|
-
AccessLevels listed must be in the same policy as this
|
6650
|
-
ServicePerimeter. Referencing a nonexistent AccessLevel is a
|
6651
|
-
syntax error. If no AccessLevel names are listed, resources within
|
6652
|
-
the perimeter can only be accessed via GCP calls with request
|
6653
|
-
origins within the perimeter. For Service Perimeter Bridge, must
|
6654
|
-
be empty.
|
6655
|
-
Format: accessPolicies/{policy_id}/accessLevels/{access_level_name}
|
6656
|
-
"""
|
6657
|
-
egress_policies: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterStatusEgressPolicyArgsDict']]]]
|
6658
|
-
"""
|
6659
|
-
List of EgressPolicies to apply to the perimeter. A perimeter may
|
6660
|
-
have multiple EgressPolicies, each of which is evaluated separately.
|
6661
|
-
Access is granted if any EgressPolicy grants it. Must be empty for
|
6662
|
-
a perimeter bridge.
|
6663
|
-
Structure is documented below.
|
6664
|
-
"""
|
6665
|
-
ingress_policies: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterStatusIngressPolicyArgsDict']]]]
|
6666
|
-
"""
|
6667
|
-
List of `IngressPolicies` to apply to the perimeter. A perimeter may
|
6668
|
-
have multiple `IngressPolicies`, each of which is evaluated
|
6669
|
-
separately. Access is granted if any `Ingress Policy` grants it.
|
6670
|
-
Must be empty for a perimeter bridge.
|
6671
|
-
Structure is documented below.
|
6672
|
-
"""
|
6673
|
-
resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
6674
|
-
"""
|
6675
|
-
A list of GCP resources that are inside of the service perimeter.
|
6676
|
-
Currently only projects are allowed.
|
6677
|
-
Format: projects/{project_number}
|
6678
|
-
"""
|
6679
|
-
restricted_services: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
6680
|
-
"""
|
6681
|
-
GCP services that are subject to the Service Perimeter
|
6682
|
-
restrictions. Must contain a list of services. For example, if
|
6683
|
-
`storage.googleapis.com` is specified, access to the storage
|
6684
|
-
buckets inside the perimeter must meet the perimeter's access
|
6685
|
-
restrictions.
|
6686
|
-
"""
|
6687
|
-
vpc_accessible_services: NotRequired[pulumi.Input['ServicePerimetersServicePerimeterStatusVpcAccessibleServicesArgsDict']]
|
6688
|
-
"""
|
6689
|
-
Specifies how APIs are allowed to communicate within the Service
|
6690
|
-
Perimeter.
|
6691
|
-
Structure is documented below.
|
6692
|
-
"""
|
6693
|
-
elif False:
|
6694
|
-
ServicePerimetersServicePerimeterStatusArgsDict: TypeAlias = Mapping[str, Any]
|
6695
|
-
|
6696
4879
|
@pulumi.input_type
|
6697
4880
|
class ServicePerimetersServicePerimeterStatusArgs:
|
6698
4881
|
def __init__(__self__, *,
|
@@ -6844,22 +5027,6 @@ class ServicePerimetersServicePerimeterStatusArgs:
|
|
6844
5027
|
pulumi.set(self, "vpc_accessible_services", value)
|
6845
5028
|
|
6846
5029
|
|
6847
|
-
if not MYPY:
|
6848
|
-
class ServicePerimetersServicePerimeterStatusEgressPolicyArgsDict(TypedDict):
|
6849
|
-
egress_from: NotRequired[pulumi.Input['ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromArgsDict']]
|
6850
|
-
"""
|
6851
|
-
Defines conditions on the source of a request causing this `EgressPolicy` to apply.
|
6852
|
-
Structure is documented below.
|
6853
|
-
"""
|
6854
|
-
egress_to: NotRequired[pulumi.Input['ServicePerimetersServicePerimeterStatusEgressPolicyEgressToArgsDict']]
|
6855
|
-
"""
|
6856
|
-
Defines the conditions on the `ApiOperation` and destination resources that
|
6857
|
-
cause this `EgressPolicy` to apply.
|
6858
|
-
Structure is documented below.
|
6859
|
-
"""
|
6860
|
-
elif False:
|
6861
|
-
ServicePerimetersServicePerimeterStatusEgressPolicyArgsDict: TypeAlias = Mapping[str, Any]
|
6862
|
-
|
6863
5030
|
@pulumi.input_type
|
6864
5031
|
class ServicePerimetersServicePerimeterStatusEgressPolicyArgs:
|
6865
5032
|
def __init__(__self__, *,
|
@@ -6905,34 +5072,6 @@ class ServicePerimetersServicePerimeterStatusEgressPolicyArgs:
|
|
6905
5072
|
pulumi.set(self, "egress_to", value)
|
6906
5073
|
|
6907
5074
|
|
6908
|
-
if not MYPY:
|
6909
|
-
class ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromArgsDict(TypedDict):
|
6910
|
-
identities: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
6911
|
-
"""
|
6912
|
-
A list of identities that are allowed access through this `EgressPolicy`.
|
6913
|
-
Should be in the format of email address. The email address should
|
6914
|
-
represent individual user or service account only.
|
6915
|
-
"""
|
6916
|
-
identity_type: NotRequired[pulumi.Input[str]]
|
6917
|
-
"""
|
6918
|
-
Specifies the type of identities that are allowed access to outside the
|
6919
|
-
perimeter. If left unspecified, then members of `identities` field will
|
6920
|
-
be allowed access.
|
6921
|
-
Possible values are: `IDENTITY_TYPE_UNSPECIFIED`, `ANY_IDENTITY`, `ANY_USER_ACCOUNT`, `ANY_SERVICE_ACCOUNT`.
|
6922
|
-
"""
|
6923
|
-
source_restriction: NotRequired[pulumi.Input[str]]
|
6924
|
-
"""
|
6925
|
-
Whether to enforce traffic restrictions based on `sources` field. If the `sources` field is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.
|
6926
|
-
Possible values are: `SOURCE_RESTRICTION_UNSPECIFIED`, `SOURCE_RESTRICTION_ENABLED`, `SOURCE_RESTRICTION_DISABLED`.
|
6927
|
-
"""
|
6928
|
-
sources: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromSourceArgsDict']]]]
|
6929
|
-
"""
|
6930
|
-
Sources that this EgressPolicy authorizes access from.
|
6931
|
-
Structure is documented below.
|
6932
|
-
"""
|
6933
|
-
elif False:
|
6934
|
-
ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromArgsDict: TypeAlias = Mapping[str, Any]
|
6935
|
-
|
6936
5075
|
@pulumi.input_type
|
6937
5076
|
class ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromArgs:
|
6938
5077
|
def __init__(__self__, *,
|
@@ -7018,15 +5157,6 @@ class ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromArgs:
|
|
7018
5157
|
pulumi.set(self, "sources", value)
|
7019
5158
|
|
7020
5159
|
|
7021
|
-
if not MYPY:
|
7022
|
-
class ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromSourceArgsDict(TypedDict):
|
7023
|
-
access_level: NotRequired[pulumi.Input[str]]
|
7024
|
-
"""
|
7025
|
-
An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
|
7026
|
-
"""
|
7027
|
-
elif False:
|
7028
|
-
ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromSourceArgsDict: TypeAlias = Mapping[str, Any]
|
7029
|
-
|
7030
5160
|
@pulumi.input_type
|
7031
5161
|
class ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromSourceArgs:
|
7032
5162
|
def __init__(__self__, *,
|
@@ -7050,31 +5180,6 @@ class ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromSourceArgs:
|
|
7050
5180
|
pulumi.set(self, "access_level", value)
|
7051
5181
|
|
7052
5182
|
|
7053
|
-
if not MYPY:
|
7054
|
-
class ServicePerimetersServicePerimeterStatusEgressPolicyEgressToArgsDict(TypedDict):
|
7055
|
-
external_resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
7056
|
-
"""
|
7057
|
-
A list of external resources that are allowed to be accessed. A request
|
7058
|
-
matches if it contains an external resource in this list (Example:
|
7059
|
-
s3://bucket/path). Currently '*' is not allowed.
|
7060
|
-
"""
|
7061
|
-
operations: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterStatusEgressPolicyEgressToOperationArgsDict']]]]
|
7062
|
-
"""
|
7063
|
-
A list of `ApiOperations` that this egress rule applies to. A request matches
|
7064
|
-
if it contains an operation/service in this list.
|
7065
|
-
Structure is documented below.
|
7066
|
-
"""
|
7067
|
-
resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
7068
|
-
"""
|
7069
|
-
A list of resources, currently only projects in the form
|
7070
|
-
`projects/<projectnumber>`, that match this to stanza. A request matches
|
7071
|
-
if it contains a resource in this list. If * is specified for resources,
|
7072
|
-
then this `EgressTo` rule will authorize access to all resources outside
|
7073
|
-
the perimeter.
|
7074
|
-
"""
|
7075
|
-
elif False:
|
7076
|
-
ServicePerimetersServicePerimeterStatusEgressPolicyEgressToArgsDict: TypeAlias = Mapping[str, Any]
|
7077
|
-
|
7078
5183
|
@pulumi.input_type
|
7079
5184
|
class ServicePerimetersServicePerimeterStatusEgressPolicyEgressToArgs:
|
7080
5185
|
def __init__(__self__, *,
|
@@ -7146,25 +5251,6 @@ class ServicePerimetersServicePerimeterStatusEgressPolicyEgressToArgs:
|
|
7146
5251
|
pulumi.set(self, "resources", value)
|
7147
5252
|
|
7148
5253
|
|
7149
|
-
if not MYPY:
|
7150
|
-
class ServicePerimetersServicePerimeterStatusEgressPolicyEgressToOperationArgsDict(TypedDict):
|
7151
|
-
method_selectors: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterStatusEgressPolicyEgressToOperationMethodSelectorArgsDict']]]]
|
7152
|
-
"""
|
7153
|
-
API methods or permissions to allow. Method or permission must belong
|
7154
|
-
to the service specified by `serviceName` field. A single MethodSelector
|
7155
|
-
entry with `*` specified for the `method` field will allow all methods
|
7156
|
-
AND permissions for the service specified in `serviceName`.
|
7157
|
-
Structure is documented below.
|
7158
|
-
"""
|
7159
|
-
service_name: NotRequired[pulumi.Input[str]]
|
7160
|
-
"""
|
7161
|
-
The name of the API whose methods or permissions the `IngressPolicy` or
|
7162
|
-
`EgressPolicy` want to allow. A single `ApiOperation` with serviceName
|
7163
|
-
field set to `*` will allow all methods AND permissions for all services.
|
7164
|
-
"""
|
7165
|
-
elif False:
|
7166
|
-
ServicePerimetersServicePerimeterStatusEgressPolicyEgressToOperationArgsDict: TypeAlias = Mapping[str, Any]
|
7167
|
-
|
7168
5254
|
@pulumi.input_type
|
7169
5255
|
class ServicePerimetersServicePerimeterStatusEgressPolicyEgressToOperationArgs:
|
7170
5256
|
def __init__(__self__, *,
|
@@ -7216,22 +5302,6 @@ class ServicePerimetersServicePerimeterStatusEgressPolicyEgressToOperationArgs:
|
|
7216
5302
|
pulumi.set(self, "service_name", value)
|
7217
5303
|
|
7218
5304
|
|
7219
|
-
if not MYPY:
|
7220
|
-
class ServicePerimetersServicePerimeterStatusEgressPolicyEgressToOperationMethodSelectorArgsDict(TypedDict):
|
7221
|
-
method: NotRequired[pulumi.Input[str]]
|
7222
|
-
"""
|
7223
|
-
Value for `method` should be a valid method name for the corresponding
|
7224
|
-
`serviceName` in `ApiOperation`. If `*` used as value for method,
|
7225
|
-
then ALL methods and permissions are allowed.
|
7226
|
-
"""
|
7227
|
-
permission: NotRequired[pulumi.Input[str]]
|
7228
|
-
"""
|
7229
|
-
Value for permission should be a valid Cloud IAM permission for the
|
7230
|
-
corresponding `serviceName` in `ApiOperation`.
|
7231
|
-
"""
|
7232
|
-
elif False:
|
7233
|
-
ServicePerimetersServicePerimeterStatusEgressPolicyEgressToOperationMethodSelectorArgsDict: TypeAlias = Mapping[str, Any]
|
7234
|
-
|
7235
5305
|
@pulumi.input_type
|
7236
5306
|
class ServicePerimetersServicePerimeterStatusEgressPolicyEgressToOperationMethodSelectorArgs:
|
7237
5307
|
def __init__(__self__, *,
|
@@ -7277,23 +5347,6 @@ class ServicePerimetersServicePerimeterStatusEgressPolicyEgressToOperationMethod
|
|
7277
5347
|
pulumi.set(self, "permission", value)
|
7278
5348
|
|
7279
5349
|
|
7280
|
-
if not MYPY:
|
7281
|
-
class ServicePerimetersServicePerimeterStatusIngressPolicyArgsDict(TypedDict):
|
7282
|
-
ingress_from: NotRequired[pulumi.Input['ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromArgsDict']]
|
7283
|
-
"""
|
7284
|
-
Defines the conditions on the source of a request causing this `IngressPolicy`
|
7285
|
-
to apply.
|
7286
|
-
Structure is documented below.
|
7287
|
-
"""
|
7288
|
-
ingress_to: NotRequired[pulumi.Input['ServicePerimetersServicePerimeterStatusIngressPolicyIngressToArgsDict']]
|
7289
|
-
"""
|
7290
|
-
Defines the conditions on the `ApiOperation` and request destination that cause
|
7291
|
-
this `IngressPolicy` to apply.
|
7292
|
-
Structure is documented below.
|
7293
|
-
"""
|
7294
|
-
elif False:
|
7295
|
-
ServicePerimetersServicePerimeterStatusIngressPolicyArgsDict: TypeAlias = Mapping[str, Any]
|
7296
|
-
|
7297
5350
|
@pulumi.input_type
|
7298
5351
|
class ServicePerimetersServicePerimeterStatusIngressPolicyArgs:
|
7299
5352
|
def __init__(__self__, *,
|
@@ -7341,29 +5394,6 @@ class ServicePerimetersServicePerimeterStatusIngressPolicyArgs:
|
|
7341
5394
|
pulumi.set(self, "ingress_to", value)
|
7342
5395
|
|
7343
5396
|
|
7344
|
-
if not MYPY:
|
7345
|
-
class ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromArgsDict(TypedDict):
|
7346
|
-
identities: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
7347
|
-
"""
|
7348
|
-
A list of identities that are allowed access through this ingress policy.
|
7349
|
-
Should be in the format of email address. The email address should represent
|
7350
|
-
individual user or service account only.
|
7351
|
-
"""
|
7352
|
-
identity_type: NotRequired[pulumi.Input[str]]
|
7353
|
-
"""
|
7354
|
-
Specifies the type of identities that are allowed access from outside the
|
7355
|
-
perimeter. If left unspecified, then members of `identities` field will be
|
7356
|
-
allowed access.
|
7357
|
-
Possible values are: `IDENTITY_TYPE_UNSPECIFIED`, `ANY_IDENTITY`, `ANY_USER_ACCOUNT`, `ANY_SERVICE_ACCOUNT`.
|
7358
|
-
"""
|
7359
|
-
sources: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromSourceArgsDict']]]]
|
7360
|
-
"""
|
7361
|
-
Sources that this `IngressPolicy` authorizes access from.
|
7362
|
-
Structure is documented below.
|
7363
|
-
"""
|
7364
|
-
elif False:
|
7365
|
-
ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromArgsDict: TypeAlias = Mapping[str, Any]
|
7366
|
-
|
7367
5397
|
@pulumi.input_type
|
7368
5398
|
class ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromArgs:
|
7369
5399
|
def __init__(__self__, *,
|
@@ -7431,24 +5461,6 @@ class ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromArgs:
|
|
7431
5461
|
pulumi.set(self, "sources", value)
|
7432
5462
|
|
7433
5463
|
|
7434
|
-
if not MYPY:
|
7435
|
-
class ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromSourceArgsDict(TypedDict):
|
7436
|
-
access_level: NotRequired[pulumi.Input[str]]
|
7437
|
-
"""
|
7438
|
-
An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
|
7439
|
-
"""
|
7440
|
-
resource: NotRequired[pulumi.Input[str]]
|
7441
|
-
"""
|
7442
|
-
A Google Cloud resource that is allowed to ingress the perimeter.
|
7443
|
-
Requests from these resources will be allowed to access perimeter data.
|
7444
|
-
Currently only projects are allowed. Format `projects/{project_number}`
|
7445
|
-
The project may be in any Google Cloud organization, not just the
|
7446
|
-
organization that the perimeter is defined in. `*` is not allowed, the case
|
7447
|
-
of allowing all Google Cloud resources only is not supported.
|
7448
|
-
"""
|
7449
|
-
elif False:
|
7450
|
-
ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromSourceArgsDict: TypeAlias = Mapping[str, Any]
|
7451
|
-
|
7452
5464
|
@pulumi.input_type
|
7453
5465
|
class ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromSourceArgs:
|
7454
5466
|
def __init__(__self__, *,
|
@@ -7498,28 +5510,6 @@ class ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromSourceArgs:
|
|
7498
5510
|
pulumi.set(self, "resource", value)
|
7499
5511
|
|
7500
5512
|
|
7501
|
-
if not MYPY:
|
7502
|
-
class ServicePerimetersServicePerimeterStatusIngressPolicyIngressToArgsDict(TypedDict):
|
7503
|
-
operations: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterStatusIngressPolicyIngressToOperationArgsDict']]]]
|
7504
|
-
"""
|
7505
|
-
A list of `ApiOperations` the sources specified in corresponding `IngressFrom`
|
7506
|
-
are allowed to perform in this `ServicePerimeter`.
|
7507
|
-
Structure is documented below.
|
7508
|
-
"""
|
7509
|
-
resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
7510
|
-
"""
|
7511
|
-
A list of resources, currently only projects in the form
|
7512
|
-
`projects/<projectnumber>`, protected by this `ServicePerimeter`
|
7513
|
-
that are allowed to be accessed by sources defined in the
|
7514
|
-
corresponding `IngressFrom`. A request matches if it contains
|
7515
|
-
a resource in this list. If `*` is specified for resources,
|
7516
|
-
then this `IngressTo` rule will authorize access to all
|
7517
|
-
resources inside the perimeter, provided that the request
|
7518
|
-
also matches the `operations` field.
|
7519
|
-
"""
|
7520
|
-
elif False:
|
7521
|
-
ServicePerimetersServicePerimeterStatusIngressPolicyIngressToArgsDict: TypeAlias = Mapping[str, Any]
|
7522
|
-
|
7523
5513
|
@pulumi.input_type
|
7524
5514
|
class ServicePerimetersServicePerimeterStatusIngressPolicyIngressToArgs:
|
7525
5515
|
def __init__(__self__, *,
|
@@ -7577,25 +5567,6 @@ class ServicePerimetersServicePerimeterStatusIngressPolicyIngressToArgs:
|
|
7577
5567
|
pulumi.set(self, "resources", value)
|
7578
5568
|
|
7579
5569
|
|
7580
|
-
if not MYPY:
|
7581
|
-
class ServicePerimetersServicePerimeterStatusIngressPolicyIngressToOperationArgsDict(TypedDict):
|
7582
|
-
method_selectors: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterStatusIngressPolicyIngressToOperationMethodSelectorArgsDict']]]]
|
7583
|
-
"""
|
7584
|
-
API methods or permissions to allow. Method or permission must belong
|
7585
|
-
to the service specified by `serviceName` field. A single MethodSelector
|
7586
|
-
entry with `*` specified for the `method` field will allow all methods
|
7587
|
-
AND permissions for the service specified in `serviceName`.
|
7588
|
-
Structure is documented below.
|
7589
|
-
"""
|
7590
|
-
service_name: NotRequired[pulumi.Input[str]]
|
7591
|
-
"""
|
7592
|
-
The name of the API whose methods or permissions the `IngressPolicy` or
|
7593
|
-
`EgressPolicy` want to allow. A single `ApiOperation` with serviceName
|
7594
|
-
field set to `*` will allow all methods AND permissions for all services.
|
7595
|
-
"""
|
7596
|
-
elif False:
|
7597
|
-
ServicePerimetersServicePerimeterStatusIngressPolicyIngressToOperationArgsDict: TypeAlias = Mapping[str, Any]
|
7598
|
-
|
7599
5570
|
@pulumi.input_type
|
7600
5571
|
class ServicePerimetersServicePerimeterStatusIngressPolicyIngressToOperationArgs:
|
7601
5572
|
def __init__(__self__, *,
|
@@ -7647,22 +5618,6 @@ class ServicePerimetersServicePerimeterStatusIngressPolicyIngressToOperationArgs
|
|
7647
5618
|
pulumi.set(self, "service_name", value)
|
7648
5619
|
|
7649
5620
|
|
7650
|
-
if not MYPY:
|
7651
|
-
class ServicePerimetersServicePerimeterStatusIngressPolicyIngressToOperationMethodSelectorArgsDict(TypedDict):
|
7652
|
-
method: NotRequired[pulumi.Input[str]]
|
7653
|
-
"""
|
7654
|
-
Value for `method` should be a valid method name for the corresponding
|
7655
|
-
`serviceName` in `ApiOperation`. If `*` used as value for method,
|
7656
|
-
then ALL methods and permissions are allowed.
|
7657
|
-
"""
|
7658
|
-
permission: NotRequired[pulumi.Input[str]]
|
7659
|
-
"""
|
7660
|
-
Value for permission should be a valid Cloud IAM permission for the
|
7661
|
-
corresponding `serviceName` in `ApiOperation`.
|
7662
|
-
"""
|
7663
|
-
elif False:
|
7664
|
-
ServicePerimetersServicePerimeterStatusIngressPolicyIngressToOperationMethodSelectorArgsDict: TypeAlias = Mapping[str, Any]
|
7665
|
-
|
7666
5621
|
@pulumi.input_type
|
7667
5622
|
class ServicePerimetersServicePerimeterStatusIngressPolicyIngressToOperationMethodSelectorArgs:
|
7668
5623
|
def __init__(__self__, *,
|
@@ -7708,21 +5663,6 @@ class ServicePerimetersServicePerimeterStatusIngressPolicyIngressToOperationMeth
|
|
7708
5663
|
pulumi.set(self, "permission", value)
|
7709
5664
|
|
7710
5665
|
|
7711
|
-
if not MYPY:
|
7712
|
-
class ServicePerimetersServicePerimeterStatusVpcAccessibleServicesArgsDict(TypedDict):
|
7713
|
-
allowed_services: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
7714
|
-
"""
|
7715
|
-
The list of APIs usable within the Service Perimeter.
|
7716
|
-
Must be empty unless `enableRestriction` is True.
|
7717
|
-
"""
|
7718
|
-
enable_restriction: NotRequired[pulumi.Input[bool]]
|
7719
|
-
"""
|
7720
|
-
Whether to restrict API calls within the Service Perimeter to the
|
7721
|
-
list of APIs specified in 'allowedServices'.
|
7722
|
-
"""
|
7723
|
-
elif False:
|
7724
|
-
ServicePerimetersServicePerimeterStatusVpcAccessibleServicesArgsDict: TypeAlias = Mapping[str, Any]
|
7725
|
-
|
7726
5666
|
@pulumi.input_type
|
7727
5667
|
class ServicePerimetersServicePerimeterStatusVpcAccessibleServicesArgs:
|
7728
5668
|
def __init__(__self__, *,
|