pulumi-gcp 7.30.0__py3-none-any.whl → 7.30.0a1719470057__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (1485) hide show
  1. pulumi_gcp/__init__.py +0 -32
  2. pulumi_gcp/_inputs.py +0 -15
  3. pulumi_gcp/accessapproval/get_folder_service_account.py +0 -5
  4. pulumi_gcp/accessapproval/get_organization_service_account.py +0 -5
  5. pulumi_gcp/accessapproval/get_project_service_account.py +0 -5
  6. pulumi_gcp/accesscontextmanager/_inputs.py +12 -2072
  7. pulumi_gcp/accesscontextmanager/access_level.py +32 -37
  8. pulumi_gcp/accesscontextmanager/access_level_condition.py +48 -53
  9. pulumi_gcp/accesscontextmanager/access_levels.py +65 -70
  10. pulumi_gcp/accesscontextmanager/access_policy.py +0 -5
  11. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +19 -24
  12. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +19 -24
  13. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +16 -21
  14. pulumi_gcp/accesscontextmanager/authorized_orgs_desc.py +0 -5
  15. pulumi_gcp/accesscontextmanager/egress_policy.py +0 -5
  16. pulumi_gcp/accesscontextmanager/gcp_user_access_binding.py +28 -33
  17. pulumi_gcp/accesscontextmanager/get_access_policy_iam_policy.py +0 -5
  18. pulumi_gcp/accesscontextmanager/ingress_policy.py +0 -5
  19. pulumi_gcp/accesscontextmanager/outputs.py +0 -5
  20. pulumi_gcp/accesscontextmanager/service_perimeter.py +196 -201
  21. pulumi_gcp/accesscontextmanager/service_perimeter_dry_run_resource.py +6 -11
  22. pulumi_gcp/accesscontextmanager/service_perimeter_egress_policy.py +10 -15
  23. pulumi_gcp/accesscontextmanager/service_perimeter_ingress_policy.py +10 -15
  24. pulumi_gcp/accesscontextmanager/service_perimeter_resource.py +6 -11
  25. pulumi_gcp/accesscontextmanager/service_perimeters.py +55 -60
  26. pulumi_gcp/activedirectory/domain.py +0 -5
  27. pulumi_gcp/activedirectory/domain_trust.py +0 -5
  28. pulumi_gcp/activedirectory/peering.py +0 -5
  29. pulumi_gcp/alloydb/_inputs.py +0 -535
  30. pulumi_gcp/alloydb/backup.py +21 -26
  31. pulumi_gcp/alloydb/cluster.py +172 -177
  32. pulumi_gcp/alloydb/get_locations.py +0 -5
  33. pulumi_gcp/alloydb/get_supported_database_flags.py +0 -5
  34. pulumi_gcp/alloydb/instance.py +72 -77
  35. pulumi_gcp/alloydb/outputs.py +0 -5
  36. pulumi_gcp/alloydb/user.py +12 -17
  37. pulumi_gcp/apigateway/_inputs.py +0 -168
  38. pulumi_gcp/apigateway/api.py +0 -5
  39. pulumi_gcp/apigateway/api_config.py +20 -25
  40. pulumi_gcp/apigateway/api_config_iam_binding.py +19 -24
  41. pulumi_gcp/apigateway/api_config_iam_member.py +19 -24
  42. pulumi_gcp/apigateway/api_config_iam_policy.py +16 -21
  43. pulumi_gcp/apigateway/api_iam_binding.py +19 -24
  44. pulumi_gcp/apigateway/api_iam_member.py +19 -24
  45. pulumi_gcp/apigateway/api_iam_policy.py +16 -21
  46. pulumi_gcp/apigateway/gateway.py +0 -5
  47. pulumi_gcp/apigateway/gateway_iam_binding.py +19 -24
  48. pulumi_gcp/apigateway/gateway_iam_member.py +19 -24
  49. pulumi_gcp/apigateway/gateway_iam_policy.py +16 -21
  50. pulumi_gcp/apigateway/get_api_config_iam_policy.py +0 -5
  51. pulumi_gcp/apigateway/get_api_iam_policy.py +0 -5
  52. pulumi_gcp/apigateway/get_gateway_iam_policy.py +0 -5
  53. pulumi_gcp/apigateway/outputs.py +0 -5
  54. pulumi_gcp/apigee/_inputs.py +0 -508
  55. pulumi_gcp/apigee/addons_config.py +55 -60
  56. pulumi_gcp/apigee/endpoint_attachment.py +0 -5
  57. pulumi_gcp/apigee/env_group.py +0 -5
  58. pulumi_gcp/apigee/env_group_attachment.py +0 -5
  59. pulumi_gcp/apigee/env_keystore.py +0 -5
  60. pulumi_gcp/apigee/env_references.py +0 -5
  61. pulumi_gcp/apigee/environment.py +5 -10
  62. pulumi_gcp/apigee/environment_iam_binding.py +19 -24
  63. pulumi_gcp/apigee/environment_iam_member.py +19 -24
  64. pulumi_gcp/apigee/environment_iam_policy.py +16 -21
  65. pulumi_gcp/apigee/flowhook.py +0 -5
  66. pulumi_gcp/apigee/get_environment_iam_policy.py +0 -5
  67. pulumi_gcp/apigee/instance.py +0 -5
  68. pulumi_gcp/apigee/instance_attachment.py +0 -5
  69. pulumi_gcp/apigee/keystores_aliases_key_cert_file.py +5 -10
  70. pulumi_gcp/apigee/keystores_aliases_pkcs12.py +2 -7
  71. pulumi_gcp/apigee/keystores_aliases_self_signed_cert.py +26 -31
  72. pulumi_gcp/apigee/nat_address.py +0 -5
  73. pulumi_gcp/apigee/organization.py +5 -10
  74. pulumi_gcp/apigee/outputs.py +0 -5
  75. pulumi_gcp/apigee/sharedflow.py +2 -7
  76. pulumi_gcp/apigee/sharedflow_deployment.py +0 -5
  77. pulumi_gcp/apigee/sync_authorization.py +0 -5
  78. pulumi_gcp/apigee/target_server.py +5 -10
  79. pulumi_gcp/appengine/_inputs.py +8 -991
  80. pulumi_gcp/appengine/application.py +12 -17
  81. pulumi_gcp/appengine/application_url_dispatch_rules.py +41 -46
  82. pulumi_gcp/appengine/domain_mapping.py +13 -18
  83. pulumi_gcp/appengine/engine_split_traffic.py +45 -50
  84. pulumi_gcp/appengine/firewall_rule.py +0 -5
  85. pulumi_gcp/appengine/flexible_app_version.py +125 -130
  86. pulumi_gcp/appengine/get_default_service_account.py +0 -5
  87. pulumi_gcp/appengine/outputs.py +0 -5
  88. pulumi_gcp/appengine/service_network_settings.py +27 -32
  89. pulumi_gcp/appengine/standard_app_version.py +104 -109
  90. pulumi_gcp/apphub/_inputs.py +0 -370
  91. pulumi_gcp/apphub/application.py +62 -67
  92. pulumi_gcp/apphub/get_application.py +0 -5
  93. pulumi_gcp/apphub/get_discovered_service.py +0 -5
  94. pulumi_gcp/apphub/get_discovered_workload.py +0 -5
  95. pulumi_gcp/apphub/outputs.py +0 -5
  96. pulumi_gcp/apphub/service.py +73 -78
  97. pulumi_gcp/apphub/service_project_attachment.py +0 -5
  98. pulumi_gcp/apphub/workload.py +9 -14
  99. pulumi_gcp/applicationintegration/_inputs.py +0 -324
  100. pulumi_gcp/applicationintegration/auth_config.py +24 -29
  101. pulumi_gcp/applicationintegration/client.py +19 -24
  102. pulumi_gcp/applicationintegration/outputs.py +0 -5
  103. pulumi_gcp/artifactregistry/_inputs.py +0 -392
  104. pulumi_gcp/artifactregistry/get_docker_image.py +2 -7
  105. pulumi_gcp/artifactregistry/get_repository.py +0 -5
  106. pulumi_gcp/artifactregistry/get_repository_iam_policy.py +0 -5
  107. pulumi_gcp/artifactregistry/outputs.py +0 -5
  108. pulumi_gcp/artifactregistry/repository.py +333 -338
  109. pulumi_gcp/artifactregistry/repository_iam_binding.py +19 -24
  110. pulumi_gcp/artifactregistry/repository_iam_member.py +19 -24
  111. pulumi_gcp/artifactregistry/repository_iam_policy.py +16 -21
  112. pulumi_gcp/artifactregistry/vpcsc_config.py +0 -5
  113. pulumi_gcp/assuredworkloads/_inputs.py +0 -117
  114. pulumi_gcp/assuredworkloads/outputs.py +0 -5
  115. pulumi_gcp/assuredworkloads/workload.py +81 -86
  116. pulumi_gcp/backupdisasterrecovery/_inputs.py +0 -41
  117. pulumi_gcp/backupdisasterrecovery/get_management_server.py +0 -5
  118. pulumi_gcp/backupdisasterrecovery/management_server.py +15 -20
  119. pulumi_gcp/backupdisasterrecovery/outputs.py +0 -5
  120. pulumi_gcp/beyondcorp/_inputs.py +0 -86
  121. pulumi_gcp/beyondcorp/app_connection.py +52 -57
  122. pulumi_gcp/beyondcorp/app_connector.py +25 -30
  123. pulumi_gcp/beyondcorp/app_gateway.py +2 -7
  124. pulumi_gcp/beyondcorp/get_app_connection.py +0 -5
  125. pulumi_gcp/beyondcorp/get_app_connector.py +0 -5
  126. pulumi_gcp/beyondcorp/get_app_gateway.py +0 -5
  127. pulumi_gcp/beyondcorp/outputs.py +0 -5
  128. pulumi_gcp/biglake/_inputs.py +0 -64
  129. pulumi_gcp/biglake/catalog.py +0 -5
  130. pulumi_gcp/biglake/database.py +13 -18
  131. pulumi_gcp/biglake/outputs.py +0 -5
  132. pulumi_gcp/biglake/table.py +31 -36
  133. pulumi_gcp/bigquery/_inputs.py +13 -1937
  134. pulumi_gcp/bigquery/app_profile.py +128 -133
  135. pulumi_gcp/bigquery/bi_reservation.py +5 -10
  136. pulumi_gcp/bigquery/capacity_commitment.py +0 -5
  137. pulumi_gcp/bigquery/connection.py +176 -181
  138. pulumi_gcp/bigquery/connection_iam_binding.py +19 -24
  139. pulumi_gcp/bigquery/connection_iam_member.py +19 -24
  140. pulumi_gcp/bigquery/connection_iam_policy.py +16 -21
  141. pulumi_gcp/bigquery/data_transfer_config.py +15 -20
  142. pulumi_gcp/bigquery/dataset.py +127 -132
  143. pulumi_gcp/bigquery/dataset_access.py +67 -72
  144. pulumi_gcp/bigquery/dataset_iam_binding.py +19 -24
  145. pulumi_gcp/bigquery/dataset_iam_member.py +19 -24
  146. pulumi_gcp/bigquery/dataset_iam_policy.py +16 -21
  147. pulumi_gcp/bigquery/get_connection_iam_policy.py +0 -5
  148. pulumi_gcp/bigquery/get_dataset.py +0 -5
  149. pulumi_gcp/bigquery/get_dataset_iam_policy.py +0 -5
  150. pulumi_gcp/bigquery/get_default_service_account.py +0 -5
  151. pulumi_gcp/bigquery/get_table_iam_policy.py +0 -5
  152. pulumi_gcp/bigquery/iam_binding.py +97 -102
  153. pulumi_gcp/bigquery/iam_member.py +97 -102
  154. pulumi_gcp/bigquery/iam_policy.py +92 -97
  155. pulumi_gcp/bigquery/job.py +224 -229
  156. pulumi_gcp/bigquery/outputs.py +0 -5
  157. pulumi_gcp/bigquery/reservation.py +11 -16
  158. pulumi_gcp/bigquery/reservation_assignment.py +0 -5
  159. pulumi_gcp/bigquery/routine.py +109 -114
  160. pulumi_gcp/bigquery/table.py +62 -67
  161. pulumi_gcp/bigqueryanalyticshub/_inputs.py +0 -97
  162. pulumi_gcp/bigqueryanalyticshub/data_exchange.py +0 -5
  163. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +19 -24
  164. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +19 -24
  165. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +16 -21
  166. pulumi_gcp/bigqueryanalyticshub/get_data_exchange_iam_policy.py +0 -5
  167. pulumi_gcp/bigqueryanalyticshub/get_listing_iam_policy.py +0 -5
  168. pulumi_gcp/bigqueryanalyticshub/listing.py +40 -45
  169. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +19 -24
  170. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +19 -24
  171. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +16 -21
  172. pulumi_gcp/bigqueryanalyticshub/outputs.py +0 -5
  173. pulumi_gcp/bigquerydatapolicy/_inputs.py +0 -40
  174. pulumi_gcp/bigquerydatapolicy/data_policy.py +19 -24
  175. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +19 -24
  176. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +19 -24
  177. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +16 -21
  178. pulumi_gcp/bigquerydatapolicy/get_iam_policy.py +0 -5
  179. pulumi_gcp/bigquerydatapolicy/outputs.py +0 -5
  180. pulumi_gcp/bigtable/_inputs.py +0 -202
  181. pulumi_gcp/bigtable/authorized_view.py +5 -10
  182. pulumi_gcp/bigtable/gc_policy.py +54 -113
  183. pulumi_gcp/bigtable/get_instance_iam_policy.py +0 -5
  184. pulumi_gcp/bigtable/get_table_iam_policy.py +0 -5
  185. pulumi_gcp/bigtable/instance.py +47 -52
  186. pulumi_gcp/bigtable/instance_iam_binding.py +19 -24
  187. pulumi_gcp/bigtable/instance_iam_member.py +19 -24
  188. pulumi_gcp/bigtable/instance_iam_policy.py +16 -21
  189. pulumi_gcp/bigtable/outputs.py +0 -5
  190. pulumi_gcp/bigtable/table.py +34 -39
  191. pulumi_gcp/bigtable/table_iam_binding.py +19 -24
  192. pulumi_gcp/bigtable/table_iam_member.py +19 -24
  193. pulumi_gcp/bigtable/table_iam_policy.py +16 -21
  194. pulumi_gcp/billing/_inputs.py +0 -257
  195. pulumi_gcp/billing/account_iam_binding.py +19 -24
  196. pulumi_gcp/billing/account_iam_member.py +19 -24
  197. pulumi_gcp/billing/account_iam_policy.py +16 -21
  198. pulumi_gcp/billing/budget.py +220 -225
  199. pulumi_gcp/billing/get_account_iam_policy.py +0 -5
  200. pulumi_gcp/billing/outputs.py +0 -5
  201. pulumi_gcp/billing/project_info.py +0 -5
  202. pulumi_gcp/billing/sub_account.py +0 -5
  203. pulumi_gcp/binaryauthorization/_inputs.py +0 -199
  204. pulumi_gcp/binaryauthorization/attestor.py +63 -68
  205. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +19 -24
  206. pulumi_gcp/binaryauthorization/attestor_iam_member.py +19 -24
  207. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +16 -21
  208. pulumi_gcp/binaryauthorization/get_attestor_iam_policy.py +0 -5
  209. pulumi_gcp/binaryauthorization/outputs.py +0 -5
  210. pulumi_gcp/binaryauthorization/policy.py +83 -88
  211. pulumi_gcp/blockchainnodeengine/_inputs.py +0 -131
  212. pulumi_gcp/blockchainnodeengine/blockchain_nodes.py +57 -62
  213. pulumi_gcp/blockchainnodeengine/outputs.py +0 -5
  214. pulumi_gcp/certificateauthority/_inputs.py +29 -2150
  215. pulumi_gcp/certificateauthority/authority.py +393 -398
  216. pulumi_gcp/certificateauthority/ca_pool.py +184 -189
  217. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +97 -102
  218. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +97 -102
  219. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +92 -97
  220. pulumi_gcp/certificateauthority/certificate.py +631 -636
  221. pulumi_gcp/certificateauthority/certificate_template.py +129 -134
  222. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +97 -102
  223. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +97 -102
  224. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +92 -97
  225. pulumi_gcp/certificateauthority/get_authority.py +0 -5
  226. pulumi_gcp/certificateauthority/get_ca_pool_iam_policy.py +0 -5
  227. pulumi_gcp/certificateauthority/get_certificate_template_iam_policy.py +0 -5
  228. pulumi_gcp/certificateauthority/outputs.py +0 -5
  229. pulumi_gcp/certificatemanager/_inputs.py +0 -256
  230. pulumi_gcp/certificatemanager/certificate.py +198 -203
  231. pulumi_gcp/certificatemanager/certificate_issuance_config.py +71 -76
  232. pulumi_gcp/certificatemanager/certificate_map.py +2 -7
  233. pulumi_gcp/certificatemanager/certificate_map_entry.py +8 -13
  234. pulumi_gcp/certificatemanager/dns_authorization.py +2 -7
  235. pulumi_gcp/certificatemanager/get_certificate_map.py +0 -5
  236. pulumi_gcp/certificatemanager/outputs.py +0 -5
  237. pulumi_gcp/certificatemanager/trust_config.py +21 -26
  238. pulumi_gcp/cloudasset/_inputs.py +0 -151
  239. pulumi_gcp/cloudasset/folder_feed.py +30 -35
  240. pulumi_gcp/cloudasset/get_resources_search_all.py +0 -5
  241. pulumi_gcp/cloudasset/get_search_all_resources.py +0 -5
  242. pulumi_gcp/cloudasset/organization_feed.py +30 -35
  243. pulumi_gcp/cloudasset/outputs.py +0 -5
  244. pulumi_gcp/cloudasset/project_feed.py +30 -35
  245. pulumi_gcp/cloudbuild/_inputs.py +30 -1039
  246. pulumi_gcp/cloudbuild/bitbucket_server_config.py +56 -61
  247. pulumi_gcp/cloudbuild/get_trigger.py +0 -5
  248. pulumi_gcp/cloudbuild/outputs.py +0 -5
  249. pulumi_gcp/cloudbuild/trigger.py +728 -733
  250. pulumi_gcp/cloudbuild/worker_pool.py +38 -43
  251. pulumi_gcp/cloudbuildv2/_inputs.py +0 -335
  252. pulumi_gcp/cloudbuildv2/connection.py +101 -106
  253. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +19 -24
  254. pulumi_gcp/cloudbuildv2/connection_iam_member.py +19 -24
  255. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +16 -21
  256. pulumi_gcp/cloudbuildv2/get_connection_iam_policy.py +0 -5
  257. pulumi_gcp/cloudbuildv2/outputs.py +0 -5
  258. pulumi_gcp/cloudbuildv2/repository.py +62 -67
  259. pulumi_gcp/clouddeploy/_inputs.py +0 -700
  260. pulumi_gcp/clouddeploy/automation.py +96 -101
  261. pulumi_gcp/clouddeploy/custom_target_type.py +83 -88
  262. pulumi_gcp/clouddeploy/custom_target_type_iam_binding.py +3 -8
  263. pulumi_gcp/clouddeploy/custom_target_type_iam_member.py +3 -8
  264. pulumi_gcp/clouddeploy/custom_target_type_iam_policy.py +0 -5
  265. pulumi_gcp/clouddeploy/delivery_pipeline.py +157 -162
  266. pulumi_gcp/clouddeploy/delivery_pipeline_iam_binding.py +3 -8
  267. pulumi_gcp/clouddeploy/delivery_pipeline_iam_member.py +3 -8
  268. pulumi_gcp/clouddeploy/delivery_pipeline_iam_policy.py +0 -5
  269. pulumi_gcp/clouddeploy/get_custom_target_type_iam_policy.py +0 -5
  270. pulumi_gcp/clouddeploy/get_delivery_pipeline_iam_policy.py +0 -5
  271. pulumi_gcp/clouddeploy/get_target_iam_policy.py +0 -5
  272. pulumi_gcp/clouddeploy/outputs.py +0 -5
  273. pulumi_gcp/clouddeploy/target.py +64 -69
  274. pulumi_gcp/clouddeploy/target_iam_binding.py +3 -8
  275. pulumi_gcp/clouddeploy/target_iam_member.py +3 -8
  276. pulumi_gcp/clouddeploy/target_iam_policy.py +0 -5
  277. pulumi_gcp/clouddomains/_inputs.py +0 -372
  278. pulumi_gcp/clouddomains/outputs.py +0 -5
  279. pulumi_gcp/clouddomains/registration.py +116 -121
  280. pulumi_gcp/cloudfunctions/_inputs.py +0 -132
  281. pulumi_gcp/cloudfunctions/function.py +20 -25
  282. pulumi_gcp/cloudfunctions/function_iam_binding.py +19 -24
  283. pulumi_gcp/cloudfunctions/function_iam_member.py +19 -24
  284. pulumi_gcp/cloudfunctions/function_iam_policy.py +16 -21
  285. pulumi_gcp/cloudfunctions/get_function.py +0 -5
  286. pulumi_gcp/cloudfunctions/get_function_iam_policy.py +0 -5
  287. pulumi_gcp/cloudfunctions/outputs.py +0 -5
  288. pulumi_gcp/cloudfunctionsv2/_inputs.py +0 -454
  289. pulumi_gcp/cloudfunctionsv2/function.py +509 -746
  290. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +19 -24
  291. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +19 -24
  292. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +16 -21
  293. pulumi_gcp/cloudfunctionsv2/get_function.py +0 -5
  294. pulumi_gcp/cloudfunctionsv2/get_function_iam_policy.py +0 -5
  295. pulumi_gcp/cloudfunctionsv2/outputs.py +1 -134
  296. pulumi_gcp/cloudidentity/_inputs.py +0 -161
  297. pulumi_gcp/cloudidentity/get_group_lookup.py +4 -9
  298. pulumi_gcp/cloudidentity/get_group_memberships.py +0 -5
  299. pulumi_gcp/cloudidentity/get_groups.py +0 -5
  300. pulumi_gcp/cloudidentity/group.py +13 -18
  301. pulumi_gcp/cloudidentity/group_membership.py +63 -68
  302. pulumi_gcp/cloudidentity/outputs.py +0 -5
  303. pulumi_gcp/cloudids/endpoint.py +0 -5
  304. pulumi_gcp/cloudquota/_inputs.py +0 -44
  305. pulumi_gcp/cloudquota/get_s_quota_info.py +0 -5
  306. pulumi_gcp/cloudquota/get_s_quota_infos.py +0 -5
  307. pulumi_gcp/cloudquota/outputs.py +0 -5
  308. pulumi_gcp/cloudquota/s_quota_preference.py +11 -16
  309. pulumi_gcp/cloudrun/_inputs.py +16 -1166
  310. pulumi_gcp/cloudrun/domain_mapping.py +44 -49
  311. pulumi_gcp/cloudrun/get_locations.py +0 -5
  312. pulumi_gcp/cloudrun/get_service.py +0 -5
  313. pulumi_gcp/cloudrun/get_service_iam_policy.py +0 -5
  314. pulumi_gcp/cloudrun/iam_binding.py +19 -24
  315. pulumi_gcp/cloudrun/iam_member.py +19 -24
  316. pulumi_gcp/cloudrun/iam_policy.py +16 -21
  317. pulumi_gcp/cloudrun/outputs.py +0 -5
  318. pulumi_gcp/cloudrun/service.py +265 -270
  319. pulumi_gcp/cloudrunv2/_inputs.py +20 -1353
  320. pulumi_gcp/cloudrunv2/get_job.py +0 -5
  321. pulumi_gcp/cloudrunv2/get_job_iam_policy.py +0 -5
  322. pulumi_gcp/cloudrunv2/get_service.py +0 -5
  323. pulumi_gcp/cloudrunv2/get_service_iam_policy.py +0 -5
  324. pulumi_gcp/cloudrunv2/job.py +282 -287
  325. pulumi_gcp/cloudrunv2/job_iam_binding.py +19 -24
  326. pulumi_gcp/cloudrunv2/job_iam_member.py +19 -24
  327. pulumi_gcp/cloudrunv2/job_iam_policy.py +16 -21
  328. pulumi_gcp/cloudrunv2/outputs.py +0 -5
  329. pulumi_gcp/cloudrunv2/service.py +432 -437
  330. pulumi_gcp/cloudrunv2/service_iam_binding.py +19 -24
  331. pulumi_gcp/cloudrunv2/service_iam_member.py +19 -24
  332. pulumi_gcp/cloudrunv2/service_iam_policy.py +16 -21
  333. pulumi_gcp/cloudscheduler/_inputs.py +0 -193
  334. pulumi_gcp/cloudscheduler/job.py +122 -127
  335. pulumi_gcp/cloudscheduler/outputs.py +0 -5
  336. pulumi_gcp/cloudtasks/_inputs.py +0 -134
  337. pulumi_gcp/cloudtasks/get_queue_iam_policy.py +0 -5
  338. pulumi_gcp/cloudtasks/outputs.py +0 -5
  339. pulumi_gcp/cloudtasks/queue.py +58 -63
  340. pulumi_gcp/cloudtasks/queue_iam_binding.py +19 -24
  341. pulumi_gcp/cloudtasks/queue_iam_member.py +19 -24
  342. pulumi_gcp/cloudtasks/queue_iam_policy.py +16 -21
  343. pulumi_gcp/composer/_inputs.py +0 -566
  344. pulumi_gcp/composer/environment.py +10 -15
  345. pulumi_gcp/composer/get_environment.py +0 -5
  346. pulumi_gcp/composer/get_image_versions.py +10 -15
  347. pulumi_gcp/composer/get_user_workloads_config_map.py +10 -15
  348. pulumi_gcp/composer/get_user_workloads_secret.py +10 -15
  349. pulumi_gcp/composer/outputs.py +0 -5
  350. pulumi_gcp/composer/user_workloads_config_map.py +10 -15
  351. pulumi_gcp/composer/user_workloads_secret.py +10 -15
  352. pulumi_gcp/compute/_inputs.py +145 -14134
  353. pulumi_gcp/compute/address.py +29 -27
  354. pulumi_gcp/compute/attached_disk.py +16 -21
  355. pulumi_gcp/compute/autoscaler.py +93 -98
  356. pulumi_gcp/compute/backend_bucket.py +25 -30
  357. pulumi_gcp/compute/backend_bucket_iam_binding.py +3 -8
  358. pulumi_gcp/compute/backend_bucket_iam_member.py +3 -8
  359. pulumi_gcp/compute/backend_bucket_iam_policy.py +0 -5
  360. pulumi_gcp/compute/backend_bucket_signed_url_key.py +0 -5
  361. pulumi_gcp/compute/backend_service.py +213 -204
  362. pulumi_gcp/compute/backend_service_iam_binding.py +5 -10
  363. pulumi_gcp/compute/backend_service_iam_member.py +5 -10
  364. pulumi_gcp/compute/backend_service_iam_policy.py +0 -5
  365. pulumi_gcp/compute/backend_service_signed_url_key.py +30 -35
  366. pulumi_gcp/compute/ca_external_account_key.py +0 -5
  367. pulumi_gcp/compute/disk.py +49 -54
  368. pulumi_gcp/compute/disk_async_replication.py +5 -10
  369. pulumi_gcp/compute/disk_iam_binding.py +19 -24
  370. pulumi_gcp/compute/disk_iam_member.py +19 -24
  371. pulumi_gcp/compute/disk_iam_policy.py +16 -21
  372. pulumi_gcp/compute/disk_resource_policy_attachment.py +16 -21
  373. pulumi_gcp/compute/external_vpn_gateway.py +19 -24
  374. pulumi_gcp/compute/firewall.py +37 -42
  375. pulumi_gcp/compute/firewall_policy.py +0 -5
  376. pulumi_gcp/compute/firewall_policy_association.py +0 -5
  377. pulumi_gcp/compute/firewall_policy_rule.py +39 -44
  378. pulumi_gcp/compute/forwarding_rule.py +264 -248
  379. pulumi_gcp/compute/get_address.py +0 -5
  380. pulumi_gcp/compute/get_addresses.py +0 -5
  381. pulumi_gcp/compute/get_backend_bucket.py +0 -5
  382. pulumi_gcp/compute/get_backend_bucket_iam_policy.py +0 -5
  383. pulumi_gcp/compute/get_backend_service.py +0 -5
  384. pulumi_gcp/compute/get_backend_service_iam_policy.py +0 -5
  385. pulumi_gcp/compute/get_certificate.py +0 -5
  386. pulumi_gcp/compute/get_default_service_account.py +0 -5
  387. pulumi_gcp/compute/get_disk.py +8 -13
  388. pulumi_gcp/compute/get_disk_iam_policy.py +0 -5
  389. pulumi_gcp/compute/get_forwarding_rule.py +0 -5
  390. pulumi_gcp/compute/get_forwarding_rules.py +0 -5
  391. pulumi_gcp/compute/get_global_address.py +0 -5
  392. pulumi_gcp/compute/get_global_forwarding_rule.py +0 -5
  393. pulumi_gcp/compute/get_hc_vpn_gateway.py +0 -5
  394. pulumi_gcp/compute/get_health_check.py +0 -5
  395. pulumi_gcp/compute/get_image.py +10 -15
  396. pulumi_gcp/compute/get_image_iam_policy.py +0 -5
  397. pulumi_gcp/compute/get_instance.py +0 -5
  398. pulumi_gcp/compute/get_instance_group.py +0 -5
  399. pulumi_gcp/compute/get_instance_group_manager.py +0 -5
  400. pulumi_gcp/compute/get_instance_iam_policy.py +0 -5
  401. pulumi_gcp/compute/get_instance_serial_port.py +24 -29
  402. pulumi_gcp/compute/get_instance_template.py +0 -5
  403. pulumi_gcp/compute/get_lbip_ranges.py +0 -5
  404. pulumi_gcp/compute/get_machine_image_iam_policy.py +0 -5
  405. pulumi_gcp/compute/get_machine_types.py +0 -5
  406. pulumi_gcp/compute/get_netblock_ip_ranges.py +0 -5
  407. pulumi_gcp/compute/get_network.py +0 -5
  408. pulumi_gcp/compute/get_network_endpoint_group.py +0 -5
  409. pulumi_gcp/compute/get_network_peering.py +0 -5
  410. pulumi_gcp/compute/get_networks.py +0 -5
  411. pulumi_gcp/compute/get_node_types.py +0 -5
  412. pulumi_gcp/compute/get_region_backend_service_iam_policy.py +0 -5
  413. pulumi_gcp/compute/get_region_disk.py +0 -5
  414. pulumi_gcp/compute/get_region_disk_iam_policy.py +0 -5
  415. pulumi_gcp/compute/get_region_instance_group.py +0 -5
  416. pulumi_gcp/compute/get_region_instance_template.py +0 -5
  417. pulumi_gcp/compute/get_region_network_endpoint_group.py +0 -5
  418. pulumi_gcp/compute/get_region_ssl_certificate.py +0 -5
  419. pulumi_gcp/compute/get_regions.py +0 -5
  420. pulumi_gcp/compute/get_reservation.py +0 -5
  421. pulumi_gcp/compute/get_resource_policy.py +0 -5
  422. pulumi_gcp/compute/get_router.py +0 -5
  423. pulumi_gcp/compute/get_router_nat.py +0 -5
  424. pulumi_gcp/compute/get_router_status.py +0 -5
  425. pulumi_gcp/compute/get_security_policy.py +0 -5
  426. pulumi_gcp/compute/get_snapshot.py +0 -5
  427. pulumi_gcp/compute/get_snapshot_iam_policy.py +0 -5
  428. pulumi_gcp/compute/get_ssl_policy.py +0 -5
  429. pulumi_gcp/compute/get_subnetwork.py +0 -5
  430. pulumi_gcp/compute/get_subnetwork_iam_policy.py +0 -5
  431. pulumi_gcp/compute/get_subnetworks.py +0 -5
  432. pulumi_gcp/compute/get_vpn_gateway.py +0 -5
  433. pulumi_gcp/compute/get_zones.py +0 -5
  434. pulumi_gcp/compute/global_address.py +0 -5
  435. pulumi_gcp/compute/global_forwarding_rule.py +227 -211
  436. pulumi_gcp/compute/global_network_endpoint.py +0 -5
  437. pulumi_gcp/compute/global_network_endpoint_group.py +0 -5
  438. pulumi_gcp/compute/ha_vpn_gateway.py +27 -32
  439. pulumi_gcp/compute/health_check.py +169 -174
  440. pulumi_gcp/compute/http_health_check.py +0 -5
  441. pulumi_gcp/compute/https_health_check.py +0 -5
  442. pulumi_gcp/compute/image.py +45 -50
  443. pulumi_gcp/compute/image_iam_binding.py +97 -102
  444. pulumi_gcp/compute/image_iam_member.py +97 -102
  445. pulumi_gcp/compute/image_iam_policy.py +92 -97
  446. pulumi_gcp/compute/instance.py +99 -104
  447. pulumi_gcp/compute/instance_from_machine_image.py +56 -61
  448. pulumi_gcp/compute/instance_from_template.py +83 -88
  449. pulumi_gcp/compute/instance_group.py +21 -26
  450. pulumi_gcp/compute/instance_group_manager.py +133 -138
  451. pulumi_gcp/compute/instance_group_membership.py +16 -21
  452. pulumi_gcp/compute/instance_group_named_port.py +8 -13
  453. pulumi_gcp/compute/instance_iam_binding.py +97 -102
  454. pulumi_gcp/compute/instance_iam_member.py +97 -102
  455. pulumi_gcp/compute/instance_iam_policy.py +92 -97
  456. pulumi_gcp/compute/instance_settings.py +11 -16
  457. pulumi_gcp/compute/instance_template.py +142 -147
  458. pulumi_gcp/compute/interconnect.py +9 -14
  459. pulumi_gcp/compute/interconnect_attachment.py +14 -19
  460. pulumi_gcp/compute/machine_image.py +43 -48
  461. pulumi_gcp/compute/machine_image_iam_binding.py +97 -102
  462. pulumi_gcp/compute/machine_image_iam_member.py +97 -102
  463. pulumi_gcp/compute/machine_image_iam_policy.py +92 -97
  464. pulumi_gcp/compute/managed_ssl_certificate.py +42 -40
  465. pulumi_gcp/compute/manged_ssl_certificate.py +42 -40
  466. pulumi_gcp/compute/network.py +0 -5
  467. pulumi_gcp/compute/network_attachment.py +24 -45
  468. pulumi_gcp/compute/network_edge_security_service.py +0 -5
  469. pulumi_gcp/compute/network_endpoint.py +18 -23
  470. pulumi_gcp/compute/network_endpoint_group.py +0 -5
  471. pulumi_gcp/compute/network_endpoint_list.py +61 -66
  472. pulumi_gcp/compute/network_firewall_policy.py +0 -5
  473. pulumi_gcp/compute/network_firewall_policy_association.py +0 -5
  474. pulumi_gcp/compute/network_firewall_policy_rule.py +36 -41
  475. pulumi_gcp/compute/network_peering.py +0 -5
  476. pulumi_gcp/compute/network_peering_routes_config.py +36 -41
  477. pulumi_gcp/compute/node_group.py +45 -50
  478. pulumi_gcp/compute/node_template.py +16 -21
  479. pulumi_gcp/compute/organization_security_policy.py +0 -5
  480. pulumi_gcp/compute/organization_security_policy_association.py +26 -31
  481. pulumi_gcp/compute/organization_security_policy_rule.py +31 -36
  482. pulumi_gcp/compute/outputs.py +8 -509
  483. pulumi_gcp/compute/packet_mirroring.py +78 -83
  484. pulumi_gcp/compute/per_instance_config.py +51 -56
  485. pulumi_gcp/compute/project_cloud_armor_tier.py +0 -5
  486. pulumi_gcp/compute/project_default_network_tier.py +0 -5
  487. pulumi_gcp/compute/project_metadata.py +0 -5
  488. pulumi_gcp/compute/project_metadata_item.py +0 -5
  489. pulumi_gcp/compute/public_advertised_prefix.py +0 -5
  490. pulumi_gcp/compute/public_delegated_prefix.py +0 -5
  491. pulumi_gcp/compute/region_autoscaler.py +55 -60
  492. pulumi_gcp/compute/region_backend_service.py +212 -203
  493. pulumi_gcp/compute/region_backend_service_iam_binding.py +5 -10
  494. pulumi_gcp/compute/region_backend_service_iam_member.py +5 -10
  495. pulumi_gcp/compute/region_backend_service_iam_policy.py +0 -5
  496. pulumi_gcp/compute/region_commitment.py +42 -47
  497. pulumi_gcp/compute/region_disk.py +44 -49
  498. pulumi_gcp/compute/region_disk_iam_binding.py +114 -146
  499. pulumi_gcp/compute/region_disk_iam_member.py +114 -146
  500. pulumi_gcp/compute/region_disk_iam_policy.py +104 -136
  501. pulumi_gcp/compute/region_disk_resource_policy_attachment.py +16 -21
  502. pulumi_gcp/compute/region_health_check.py +169 -174
  503. pulumi_gcp/compute/region_instance_group_manager.py +129 -134
  504. pulumi_gcp/compute/region_instance_template.py +50 -55
  505. pulumi_gcp/compute/region_network_endpoint.py +18 -23
  506. pulumi_gcp/compute/region_network_endpoint_group.py +130 -135
  507. pulumi_gcp/compute/region_network_firewall_policy.py +0 -5
  508. pulumi_gcp/compute/region_network_firewall_policy_association.py +0 -5
  509. pulumi_gcp/compute/region_network_firewall_policy_rule.py +36 -41
  510. pulumi_gcp/compute/region_per_instance_config.py +61 -66
  511. pulumi_gcp/compute/region_security_policy.py +44 -49
  512. pulumi_gcp/compute/region_security_policy_rule.py +156 -161
  513. pulumi_gcp/compute/region_ssl_certificate.py +7 -5
  514. pulumi_gcp/compute/region_ssl_policy.py +0 -5
  515. pulumi_gcp/compute/region_target_http_proxy.py +38 -43
  516. pulumi_gcp/compute/region_target_https_proxy.py +92 -97
  517. pulumi_gcp/compute/region_target_tcp_proxy.py +6 -11
  518. pulumi_gcp/compute/region_url_map.py +819 -824
  519. pulumi_gcp/compute/reservation.py +24 -29
  520. pulumi_gcp/compute/resource_policy.py +148 -153
  521. pulumi_gcp/compute/route.py +12 -17
  522. pulumi_gcp/compute/router.py +35 -40
  523. pulumi_gcp/compute/router_interface.py +0 -5
  524. pulumi_gcp/compute/router_nat.py +93 -98
  525. pulumi_gcp/compute/router_peer.py +73 -78
  526. pulumi_gcp/compute/router_status.py +0 -5
  527. pulumi_gcp/compute/security_policy.py +196 -201
  528. pulumi_gcp/compute/security_policy_rule.py +75 -80
  529. pulumi_gcp/compute/security_scan_config.py +10 -15
  530. pulumi_gcp/compute/service_attachment.py +55 -60
  531. pulumi_gcp/compute/shared_vpc_host_project.py +0 -5
  532. pulumi_gcp/compute/shared_vpc_service_project.py +0 -5
  533. pulumi_gcp/compute/snapshot.py +10 -15
  534. pulumi_gcp/compute/snapshot_iam_binding.py +19 -24
  535. pulumi_gcp/compute/snapshot_iam_member.py +19 -24
  536. pulumi_gcp/compute/snapshot_iam_policy.py +16 -21
  537. pulumi_gcp/compute/ssl_certificate.py +7 -5
  538. pulumi_gcp/compute/ssl_policy.py +0 -5
  539. pulumi_gcp/compute/subnetwork.py +28 -33
  540. pulumi_gcp/compute/subnetwork_iam_binding.py +97 -102
  541. pulumi_gcp/compute/subnetwork_iam_member.py +97 -102
  542. pulumi_gcp/compute/subnetwork_iam_policy.py +92 -97
  543. pulumi_gcp/compute/target_grpc_proxy.py +124 -129
  544. pulumi_gcp/compute/target_http_proxy.py +56 -61
  545. pulumi_gcp/compute/target_https_proxy.py +129 -209
  546. pulumi_gcp/compute/target_instance.py +58 -63
  547. pulumi_gcp/compute/target_pool.py +0 -5
  548. pulumi_gcp/compute/target_ssl_proxy.py +6 -11
  549. pulumi_gcp/compute/target_tcp_proxy.py +6 -11
  550. pulumi_gcp/compute/url_map.py +726 -986
  551. pulumi_gcp/compute/vpn_gateway.py +0 -5
  552. pulumi_gcp/compute/vpn_tunnel.py +0 -5
  553. pulumi_gcp/config/__init__.pyi +0 -5
  554. pulumi_gcp/config/outputs.py +0 -5
  555. pulumi_gcp/config/vars.py +0 -5
  556. pulumi_gcp/container/_inputs.py +343 -5022
  557. pulumi_gcp/container/attached_cluster.py +123 -128
  558. pulumi_gcp/container/aws_cluster.py +356 -361
  559. pulumi_gcp/container/aws_node_pool.py +551 -556
  560. pulumi_gcp/container/azure_client.py +2 -7
  561. pulumi_gcp/container/azure_cluster.py +130 -135
  562. pulumi_gcp/container/azure_node_pool.py +112 -117
  563. pulumi_gcp/container/cluster.py +219 -224
  564. pulumi_gcp/container/get_attached_install_manifest.py +0 -5
  565. pulumi_gcp/container/get_attached_versions.py +0 -5
  566. pulumi_gcp/container/get_aws_versions.py +0 -5
  567. pulumi_gcp/container/get_azure_versions.py +0 -5
  568. pulumi_gcp/container/get_cluster.py +0 -5
  569. pulumi_gcp/container/get_engine_versions.py +0 -5
  570. pulumi_gcp/container/get_registry_image.py +0 -5
  571. pulumi_gcp/container/get_registry_repository.py +0 -5
  572. pulumi_gcp/container/node_pool.py +73 -78
  573. pulumi_gcp/container/outputs.py +0 -5
  574. pulumi_gcp/container/registry.py +0 -5
  575. pulumi_gcp/containeranalysis/_inputs.py +0 -121
  576. pulumi_gcp/containeranalysis/get_note_iam_policy.py +0 -5
  577. pulumi_gcp/containeranalysis/note.py +44 -49
  578. pulumi_gcp/containeranalysis/note_iam_binding.py +19 -24
  579. pulumi_gcp/containeranalysis/note_iam_member.py +19 -24
  580. pulumi_gcp/containeranalysis/note_iam_policy.py +16 -21
  581. pulumi_gcp/containeranalysis/occurence.py +5 -10
  582. pulumi_gcp/containeranalysis/outputs.py +0 -5
  583. pulumi_gcp/databasemigrationservice/_inputs.py +0 -578
  584. pulumi_gcp/databasemigrationservice/connection_profile.py +183 -188
  585. pulumi_gcp/databasemigrationservice/outputs.py +0 -5
  586. pulumi_gcp/databasemigrationservice/private_connection.py +15 -20
  587. pulumi_gcp/datacatalog/_inputs.py +0 -318
  588. pulumi_gcp/datacatalog/entry.py +15 -20
  589. pulumi_gcp/datacatalog/entry_group.py +0 -5
  590. pulumi_gcp/datacatalog/entry_group_iam_binding.py +19 -24
  591. pulumi_gcp/datacatalog/entry_group_iam_member.py +19 -24
  592. pulumi_gcp/datacatalog/entry_group_iam_policy.py +16 -21
  593. pulumi_gcp/datacatalog/get_entry_group_iam_policy.py +0 -5
  594. pulumi_gcp/datacatalog/get_policy_tag_iam_policy.py +0 -5
  595. pulumi_gcp/datacatalog/get_tag_template_iam_policy.py +0 -5
  596. pulumi_gcp/datacatalog/get_taxonomy_iam_policy.py +0 -5
  597. pulumi_gcp/datacatalog/outputs.py +0 -5
  598. pulumi_gcp/datacatalog/policy_tag.py +0 -5
  599. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +19 -24
  600. pulumi_gcp/datacatalog/policy_tag_iam_member.py +19 -24
  601. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +16 -21
  602. pulumi_gcp/datacatalog/tag.py +259 -264
  603. pulumi_gcp/datacatalog/tag_template.py +71 -76
  604. pulumi_gcp/datacatalog/tag_template_iam_binding.py +19 -24
  605. pulumi_gcp/datacatalog/tag_template_iam_member.py +19 -24
  606. pulumi_gcp/datacatalog/tag_template_iam_policy.py +16 -21
  607. pulumi_gcp/datacatalog/taxonomy.py +0 -5
  608. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +19 -24
  609. pulumi_gcp/datacatalog/taxonomy_iam_member.py +19 -24
  610. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +16 -21
  611. pulumi_gcp/dataflow/_inputs.py +0 -316
  612. pulumi_gcp/dataflow/flex_template_job.py +0 -5
  613. pulumi_gcp/dataflow/job.py +0 -5
  614. pulumi_gcp/dataflow/outputs.py +0 -5
  615. pulumi_gcp/dataflow/pipeline.py +70 -75
  616. pulumi_gcp/dataform/_inputs.py +0 -251
  617. pulumi_gcp/dataform/get_repository_iam_policy.py +0 -5
  618. pulumi_gcp/dataform/outputs.py +0 -5
  619. pulumi_gcp/dataform/repository.py +36 -41
  620. pulumi_gcp/dataform/repository_iam_binding.py +3 -8
  621. pulumi_gcp/dataform/repository_iam_member.py +3 -8
  622. pulumi_gcp/dataform/repository_iam_policy.py +0 -5
  623. pulumi_gcp/dataform/repository_release_config.py +53 -58
  624. pulumi_gcp/dataform/repository_workflow_config.py +89 -94
  625. pulumi_gcp/datafusion/_inputs.py +8 -224
  626. pulumi_gcp/datafusion/get_instance_iam_policy.py +0 -5
  627. pulumi_gcp/datafusion/instance.py +50 -119
  628. pulumi_gcp/datafusion/outputs.py +7 -132
  629. pulumi_gcp/dataloss/_inputs.py +85 -6537
  630. pulumi_gcp/dataloss/outputs.py +0 -5
  631. pulumi_gcp/dataloss/prevention_deidentify_template.py +221 -226
  632. pulumi_gcp/dataloss/prevention_discovery_config.py +17 -22
  633. pulumi_gcp/dataloss/prevention_inspect_template.py +437 -442
  634. pulumi_gcp/dataloss/prevention_job_trigger.py +696 -701
  635. pulumi_gcp/dataloss/prevention_stored_info_type.py +57 -62
  636. pulumi_gcp/dataplex/_inputs.py +7 -1213
  637. pulumi_gcp/dataplex/aspect_type.py +0 -5
  638. pulumi_gcp/dataplex/aspect_type_iam_binding.py +19 -24
  639. pulumi_gcp/dataplex/aspect_type_iam_member.py +19 -24
  640. pulumi_gcp/dataplex/aspect_type_iam_policy.py +16 -21
  641. pulumi_gcp/dataplex/asset.py +42 -47
  642. pulumi_gcp/dataplex/asset_iam_binding.py +19 -24
  643. pulumi_gcp/dataplex/asset_iam_member.py +19 -24
  644. pulumi_gcp/dataplex/asset_iam_policy.py +16 -21
  645. pulumi_gcp/dataplex/datascan.py +284 -289
  646. pulumi_gcp/dataplex/datascan_iam_binding.py +19 -24
  647. pulumi_gcp/dataplex/datascan_iam_member.py +19 -24
  648. pulumi_gcp/dataplex/datascan_iam_policy.py +16 -21
  649. pulumi_gcp/dataplex/entry_group.py +0 -5
  650. pulumi_gcp/dataplex/entry_group_iam_binding.py +19 -24
  651. pulumi_gcp/dataplex/entry_group_iam_member.py +19 -24
  652. pulumi_gcp/dataplex/entry_group_iam_policy.py +16 -21
  653. pulumi_gcp/dataplex/entry_type.py +11 -16
  654. pulumi_gcp/dataplex/entry_type_iam_binding.py +19 -24
  655. pulumi_gcp/dataplex/entry_type_iam_member.py +19 -24
  656. pulumi_gcp/dataplex/entry_type_iam_policy.py +16 -21
  657. pulumi_gcp/dataplex/get_aspect_type_iam_policy.py +0 -5
  658. pulumi_gcp/dataplex/get_asset_iam_policy.py +0 -5
  659. pulumi_gcp/dataplex/get_datascan_iam_policy.py +0 -5
  660. pulumi_gcp/dataplex/get_entry_group_iam_policy.py +0 -5
  661. pulumi_gcp/dataplex/get_entry_type_iam_policy.py +0 -5
  662. pulumi_gcp/dataplex/get_lake_iam_policy.py +0 -5
  663. pulumi_gcp/dataplex/get_task_iam_policy.py +0 -5
  664. pulumi_gcp/dataplex/get_zone_iam_policy.py +0 -5
  665. pulumi_gcp/dataplex/lake.py +9 -14
  666. pulumi_gcp/dataplex/lake_iam_binding.py +19 -24
  667. pulumi_gcp/dataplex/lake_iam_member.py +19 -24
  668. pulumi_gcp/dataplex/lake_iam_policy.py +16 -21
  669. pulumi_gcp/dataplex/outputs.py +0 -5
  670. pulumi_gcp/dataplex/task.py +168 -173
  671. pulumi_gcp/dataplex/task_iam_binding.py +19 -24
  672. pulumi_gcp/dataplex/task_iam_member.py +19 -24
  673. pulumi_gcp/dataplex/task_iam_policy.py +16 -21
  674. pulumi_gcp/dataplex/zone.py +24 -29
  675. pulumi_gcp/dataplex/zone_iam_binding.py +19 -24
  676. pulumi_gcp/dataplex/zone_iam_member.py +19 -24
  677. pulumi_gcp/dataplex/zone_iam_policy.py +16 -21
  678. pulumi_gcp/dataproc/_inputs.py +41 -3216
  679. pulumi_gcp/dataproc/autoscaling_policy.py +45 -50
  680. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +19 -24
  681. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +19 -24
  682. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +16 -21
  683. pulumi_gcp/dataproc/cluster.py +104 -109
  684. pulumi_gcp/dataproc/cluster_iam_binding.py +19 -24
  685. pulumi_gcp/dataproc/cluster_iam_member.py +19 -24
  686. pulumi_gcp/dataproc/cluster_iam_policy.py +16 -21
  687. pulumi_gcp/dataproc/get_autoscaling_policy_iam_policy.py +0 -5
  688. pulumi_gcp/dataproc/get_cluster_iam_policy.py +0 -5
  689. pulumi_gcp/dataproc/get_job_iam_policy.py +0 -5
  690. pulumi_gcp/dataproc/get_metastore_federation_iam_policy.py +0 -5
  691. pulumi_gcp/dataproc/get_metastore_service.py +0 -5
  692. pulumi_gcp/dataproc/get_metastore_service_iam_policy.py +0 -5
  693. pulumi_gcp/dataproc/job.py +90 -95
  694. pulumi_gcp/dataproc/job_iam_binding.py +19 -24
  695. pulumi_gcp/dataproc/job_iam_member.py +19 -24
  696. pulumi_gcp/dataproc/job_iam_policy.py +16 -21
  697. pulumi_gcp/dataproc/metastore_federation.py +51 -56
  698. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +19 -24
  699. pulumi_gcp/dataproc/metastore_federation_iam_member.py +19 -24
  700. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +16 -21
  701. pulumi_gcp/dataproc/metastore_service.py +234 -239
  702. pulumi_gcp/dataproc/metastore_service_iam_binding.py +19 -24
  703. pulumi_gcp/dataproc/metastore_service_iam_member.py +19 -24
  704. pulumi_gcp/dataproc/metastore_service_iam_policy.py +16 -21
  705. pulumi_gcp/dataproc/outputs.py +0 -5
  706. pulumi_gcp/dataproc/workflow_template.py +107 -112
  707. pulumi_gcp/datastore/_inputs.py +0 -22
  708. pulumi_gcp/datastore/data_store_index.py +21 -26
  709. pulumi_gcp/datastore/outputs.py +0 -5
  710. pulumi_gcp/datastream/_inputs.py +22 -1618
  711. pulumi_gcp/datastream/connection_profile.py +246 -251
  712. pulumi_gcp/datastream/get_static_ips.py +0 -5
  713. pulumi_gcp/datastream/outputs.py +0 -5
  714. pulumi_gcp/datastream/private_connection.py +15 -20
  715. pulumi_gcp/datastream/stream.py +772 -777
  716. pulumi_gcp/deploymentmanager/_inputs.py +0 -66
  717. pulumi_gcp/deploymentmanager/deployment.py +28 -33
  718. pulumi_gcp/deploymentmanager/outputs.py +0 -5
  719. pulumi_gcp/diagflow/_inputs.py +42 -2591
  720. pulumi_gcp/diagflow/agent.py +0 -5
  721. pulumi_gcp/diagflow/cx_agent.py +70 -75
  722. pulumi_gcp/diagflow/cx_entity_type.py +32 -37
  723. pulumi_gcp/diagflow/cx_environment.py +17 -22
  724. pulumi_gcp/diagflow/cx_flow.py +450 -455
  725. pulumi_gcp/diagflow/cx_intent.py +50 -55
  726. pulumi_gcp/diagflow/cx_page.py +713 -718
  727. pulumi_gcp/diagflow/cx_security_settings.py +64 -69
  728. pulumi_gcp/diagflow/cx_test_case.py +192 -197
  729. pulumi_gcp/diagflow/cx_version.py +8 -13
  730. pulumi_gcp/diagflow/cx_webhook.py +22 -27
  731. pulumi_gcp/diagflow/entity_type.py +21 -26
  732. pulumi_gcp/diagflow/fulfillment.py +22 -27
  733. pulumi_gcp/diagflow/intent.py +2 -7
  734. pulumi_gcp/diagflow/outputs.py +0 -5
  735. pulumi_gcp/discoveryengine/_inputs.py +0 -183
  736. pulumi_gcp/discoveryengine/chat_engine.py +32 -37
  737. pulumi_gcp/discoveryengine/data_store.py +27 -32
  738. pulumi_gcp/discoveryengine/outputs.py +0 -5
  739. pulumi_gcp/discoveryengine/search_engine.py +12 -17
  740. pulumi_gcp/dns/_inputs.py +0 -589
  741. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +19 -24
  742. pulumi_gcp/dns/dns_managed_zone_iam_member.py +19 -24
  743. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +16 -21
  744. pulumi_gcp/dns/get_keys.py +8 -13
  745. pulumi_gcp/dns/get_managed_zone.py +0 -5
  746. pulumi_gcp/dns/get_managed_zone_iam_policy.py +0 -5
  747. pulumi_gcp/dns/get_managed_zones.py +0 -5
  748. pulumi_gcp/dns/get_record_set.py +0 -5
  749. pulumi_gcp/dns/managed_zone.py +178 -183
  750. pulumi_gcp/dns/outputs.py +0 -5
  751. pulumi_gcp/dns/policy.py +42 -47
  752. pulumi_gcp/dns/record_set.py +95 -100
  753. pulumi_gcp/dns/response_policy.py +76 -81
  754. pulumi_gcp/dns/response_policy_rule.py +33 -38
  755. pulumi_gcp/edgecontainer/_inputs.py +0 -464
  756. pulumi_gcp/edgecontainer/cluster.py +147 -152
  757. pulumi_gcp/edgecontainer/node_pool.py +104 -109
  758. pulumi_gcp/edgecontainer/outputs.py +0 -5
  759. pulumi_gcp/edgecontainer/vpn_connection.py +31 -36
  760. pulumi_gcp/edgenetwork/network.py +0 -5
  761. pulumi_gcp/edgenetwork/subnet.py +0 -5
  762. pulumi_gcp/endpoints/_inputs.py +0 -101
  763. pulumi_gcp/endpoints/consumers_iam_binding.py +3 -8
  764. pulumi_gcp/endpoints/consumers_iam_member.py +3 -8
  765. pulumi_gcp/endpoints/consumers_iam_policy.py +0 -5
  766. pulumi_gcp/endpoints/get_service_consumers_iam_policy.py +0 -5
  767. pulumi_gcp/endpoints/get_service_iam_policy.py +0 -5
  768. pulumi_gcp/endpoints/outputs.py +0 -5
  769. pulumi_gcp/endpoints/service.py +4 -9
  770. pulumi_gcp/endpoints/service_iam_binding.py +19 -24
  771. pulumi_gcp/endpoints/service_iam_member.py +19 -24
  772. pulumi_gcp/endpoints/service_iam_policy.py +16 -21
  773. pulumi_gcp/essentialcontacts/_inputs.py +0 -313
  774. pulumi_gcp/essentialcontacts/contact.py +0 -5
  775. pulumi_gcp/essentialcontacts/document_ai_processor.py +0 -5
  776. pulumi_gcp/essentialcontacts/document_ai_processor_default_version.py +0 -5
  777. pulumi_gcp/essentialcontacts/document_ai_warehouse_document_schema.py +35 -40
  778. pulumi_gcp/essentialcontacts/document_ai_warehouse_location.py +0 -5
  779. pulumi_gcp/essentialcontacts/outputs.py +0 -5
  780. pulumi_gcp/eventarc/_inputs.py +0 -145
  781. pulumi_gcp/eventarc/channel.py +0 -5
  782. pulumi_gcp/eventarc/google_channel_config.py +0 -5
  783. pulumi_gcp/eventarc/outputs.py +0 -5
  784. pulumi_gcp/eventarc/trigger.py +73 -78
  785. pulumi_gcp/filestore/_inputs.py +0 -108
  786. pulumi_gcp/filestore/backup.py +18 -23
  787. pulumi_gcp/filestore/get_instance.py +0 -5
  788. pulumi_gcp/filestore/instance.py +102 -107
  789. pulumi_gcp/filestore/outputs.py +0 -5
  790. pulumi_gcp/filestore/snapshot.py +32 -37
  791. pulumi_gcp/firebase/_inputs.py +0 -511
  792. pulumi_gcp/firebase/android_app.py +16 -21
  793. pulumi_gcp/firebase/app_check_app_attest_config.py +0 -5
  794. pulumi_gcp/firebase/app_check_debug_token.py +0 -5
  795. pulumi_gcp/firebase/app_check_device_check_config.py +0 -5
  796. pulumi_gcp/firebase/app_check_play_integrity_config.py +0 -5
  797. pulumi_gcp/firebase/app_check_recaptcha_enterprise_config.py +0 -5
  798. pulumi_gcp/firebase/app_check_recaptcha_v3_config.py +0 -5
  799. pulumi_gcp/firebase/app_check_service_config.py +0 -5
  800. pulumi_gcp/firebase/apple_app.py +10 -15
  801. pulumi_gcp/firebase/database_instance.py +0 -5
  802. pulumi_gcp/firebase/extensions_instance.py +25 -30
  803. pulumi_gcp/firebase/get_android_app.py +0 -5
  804. pulumi_gcp/firebase/get_android_app_config.py +0 -5
  805. pulumi_gcp/firebase/get_apple_app.py +0 -5
  806. pulumi_gcp/firebase/get_apple_app_config.py +0 -5
  807. pulumi_gcp/firebase/get_hosting_channel.py +0 -5
  808. pulumi_gcp/firebase/get_web_app.py +0 -5
  809. pulumi_gcp/firebase/get_web_app_config.py +0 -5
  810. pulumi_gcp/firebase/hosting_channel.py +0 -5
  811. pulumi_gcp/firebase/hosting_custom_domain.py +34 -39
  812. pulumi_gcp/firebase/hosting_release.py +28 -33
  813. pulumi_gcp/firebase/hosting_site.py +0 -5
  814. pulumi_gcp/firebase/hosting_version.py +71 -76
  815. pulumi_gcp/firebase/outputs.py +0 -5
  816. pulumi_gcp/firebase/project.py +0 -5
  817. pulumi_gcp/firebase/storage_bucket.py +0 -5
  818. pulumi_gcp/firebase/web_app.py +10 -15
  819. pulumi_gcp/firebaserules/_inputs.py +0 -51
  820. pulumi_gcp/firebaserules/outputs.py +0 -5
  821. pulumi_gcp/firebaserules/release.py +0 -5
  822. pulumi_gcp/firebaserules/ruleset.py +35 -40
  823. pulumi_gcp/firestore/_inputs.py +0 -154
  824. pulumi_gcp/firestore/backup_schedule.py +18 -23
  825. pulumi_gcp/firestore/database.py +17 -22
  826. pulumi_gcp/firestore/document.py +0 -5
  827. pulumi_gcp/firestore/field.py +58 -63
  828. pulumi_gcp/firestore/index.py +67 -72
  829. pulumi_gcp/firestore/outputs.py +0 -5
  830. pulumi_gcp/folder/_inputs.py +0 -165
  831. pulumi_gcp/folder/access_approval_settings.py +23 -28
  832. pulumi_gcp/folder/get_iam_policy.py +0 -5
  833. pulumi_gcp/folder/get_organization_policy.py +0 -5
  834. pulumi_gcp/folder/iam_audit_config.py +125 -130
  835. pulumi_gcp/folder/iam_binding.py +3 -8
  836. pulumi_gcp/folder/iam_member.py +125 -130
  837. pulumi_gcp/folder/iam_policy.py +120 -125
  838. pulumi_gcp/folder/organization_policy.py +49 -54
  839. pulumi_gcp/folder/outputs.py +0 -5
  840. pulumi_gcp/gkebackup/_inputs.py +0 -694
  841. pulumi_gcp/gkebackup/backup_plan.py +431 -436
  842. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +19 -24
  843. pulumi_gcp/gkebackup/backup_plan_iam_member.py +19 -24
  844. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +16 -21
  845. pulumi_gcp/gkebackup/get_backup_plan_iam_policy.py +0 -5
  846. pulumi_gcp/gkebackup/get_restore_plan_iam_policy.py +0 -5
  847. pulumi_gcp/gkebackup/outputs.py +0 -5
  848. pulumi_gcp/gkebackup/restore_plan.py +575 -580
  849. pulumi_gcp/gkebackup/restore_plan_iam_binding.py +956 -336
  850. pulumi_gcp/gkebackup/restore_plan_iam_member.py +956 -336
  851. pulumi_gcp/gkebackup/restore_plan_iam_policy.py +953 -243
  852. pulumi_gcp/gkehub/_inputs.py +6 -1204
  853. pulumi_gcp/gkehub/feature.py +314 -319
  854. pulumi_gcp/gkehub/feature_iam_binding.py +19 -24
  855. pulumi_gcp/gkehub/feature_iam_member.py +19 -24
  856. pulumi_gcp/gkehub/feature_iam_policy.py +16 -21
  857. pulumi_gcp/gkehub/feature_membership.py +179 -184
  858. pulumi_gcp/gkehub/fleet.py +19 -24
  859. pulumi_gcp/gkehub/get_feature_iam_policy.py +0 -5
  860. pulumi_gcp/gkehub/get_membership_iam_policy.py +0 -5
  861. pulumi_gcp/gkehub/get_scope_iam_policy.py +0 -5
  862. pulumi_gcp/gkehub/membership.py +52 -57
  863. pulumi_gcp/gkehub/membership_binding.py +12 -17
  864. pulumi_gcp/gkehub/membership_iam_binding.py +19 -24
  865. pulumi_gcp/gkehub/membership_iam_member.py +19 -24
  866. pulumi_gcp/gkehub/membership_iam_policy.py +16 -21
  867. pulumi_gcp/gkehub/membership_rbac_role_binding.py +23 -28
  868. pulumi_gcp/gkehub/namespace.py +2 -7
  869. pulumi_gcp/gkehub/outputs.py +0 -5
  870. pulumi_gcp/gkehub/scope.py +2 -7
  871. pulumi_gcp/gkehub/scope_iam_binding.py +19 -24
  872. pulumi_gcp/gkehub/scope_iam_member.py +19 -24
  873. pulumi_gcp/gkehub/scope_iam_policy.py +16 -21
  874. pulumi_gcp/gkehub/scope_rbac_role_binding.py +13 -18
  875. pulumi_gcp/gkeonprem/_inputs.py +17 -2317
  876. pulumi_gcp/gkeonprem/bare_metal_admin_cluster.py +330 -335
  877. pulumi_gcp/gkeonprem/bare_metal_cluster.py +523 -528
  878. pulumi_gcp/gkeonprem/bare_metal_node_pool.py +257 -262
  879. pulumi_gcp/gkeonprem/outputs.py +0 -5
  880. pulumi_gcp/gkeonprem/v_mware_cluster.py +394 -399
  881. pulumi_gcp/gkeonprem/v_mware_node_pool.py +84 -89
  882. pulumi_gcp/healthcare/_inputs.py +0 -359
  883. pulumi_gcp/healthcare/consent_store.py +0 -5
  884. pulumi_gcp/healthcare/consent_store_iam_binding.py +19 -24
  885. pulumi_gcp/healthcare/consent_store_iam_member.py +19 -24
  886. pulumi_gcp/healthcare/consent_store_iam_policy.py +16 -21
  887. pulumi_gcp/healthcare/dataset.py +0 -115
  888. pulumi_gcp/healthcare/dataset_iam_binding.py +19 -24
  889. pulumi_gcp/healthcare/dataset_iam_member.py +19 -24
  890. pulumi_gcp/healthcare/dataset_iam_policy.py +16 -21
  891. pulumi_gcp/healthcare/dicom_store.py +34 -39
  892. pulumi_gcp/healthcare/dicom_store_iam_binding.py +19 -24
  893. pulumi_gcp/healthcare/dicom_store_iam_member.py +19 -24
  894. pulumi_gcp/healthcare/dicom_store_iam_policy.py +16 -21
  895. pulumi_gcp/healthcare/fhir_store.py +57 -62
  896. pulumi_gcp/healthcare/fhir_store_iam_binding.py +19 -24
  897. pulumi_gcp/healthcare/fhir_store_iam_member.py +19 -24
  898. pulumi_gcp/healthcare/fhir_store_iam_policy.py +16 -21
  899. pulumi_gcp/healthcare/get_consent_store_iam_policy.py +0 -5
  900. pulumi_gcp/healthcare/get_dataset_iam_policy.py +0 -5
  901. pulumi_gcp/healthcare/get_dicom_store_iam_policy.py +0 -5
  902. pulumi_gcp/healthcare/get_fhir_store_iam_policy.py +0 -5
  903. pulumi_gcp/healthcare/get_hl7_v2_store_iam_policy.py +0 -5
  904. pulumi_gcp/healthcare/hl7_store.py +41 -46
  905. pulumi_gcp/healthcare/hl7_store_iam_binding.py +19 -24
  906. pulumi_gcp/healthcare/hl7_store_iam_member.py +19 -24
  907. pulumi_gcp/healthcare/hl7_store_iam_policy.py +16 -21
  908. pulumi_gcp/healthcare/outputs.py +0 -48
  909. pulumi_gcp/iam/_inputs.py +0 -433
  910. pulumi_gcp/iam/access_boundary_policy.py +49 -54
  911. pulumi_gcp/iam/deny_policy.py +51 -56
  912. pulumi_gcp/iam/get_rule.py +0 -5
  913. pulumi_gcp/iam/get_testable_permissions.py +0 -5
  914. pulumi_gcp/iam/get_workload_identity_pool.py +0 -5
  915. pulumi_gcp/iam/get_workload_identity_pool_provider.py +0 -5
  916. pulumi_gcp/iam/outputs.py +0 -5
  917. pulumi_gcp/iam/workforce_pool.py +17 -22
  918. pulumi_gcp/iam/workforce_pool_provider.py +179 -184
  919. pulumi_gcp/iam/workload_identity_pool.py +0 -5
  920. pulumi_gcp/iam/workload_identity_pool_provider.py +63 -68
  921. pulumi_gcp/iap/_inputs.py +0 -411
  922. pulumi_gcp/iap/app_engine_service_iam_binding.py +97 -102
  923. pulumi_gcp/iap/app_engine_service_iam_member.py +97 -102
  924. pulumi_gcp/iap/app_engine_service_iam_policy.py +92 -97
  925. pulumi_gcp/iap/app_engine_version_iam_binding.py +97 -102
  926. pulumi_gcp/iap/app_engine_version_iam_member.py +97 -102
  927. pulumi_gcp/iap/app_engine_version_iam_policy.py +92 -97
  928. pulumi_gcp/iap/brand.py +0 -5
  929. pulumi_gcp/iap/client.py +0 -5
  930. pulumi_gcp/iap/get_app_engine_service_iam_policy.py +0 -5
  931. pulumi_gcp/iap/get_app_engine_version_iam_policy.py +0 -5
  932. pulumi_gcp/iap/get_client.py +0 -5
  933. pulumi_gcp/iap/get_tunnel_dest_group_iam_policy.py +0 -5
  934. pulumi_gcp/iap/get_tunnel_iam_policy.py +0 -5
  935. pulumi_gcp/iap/get_tunnel_instance_iam_policy.py +0 -5
  936. pulumi_gcp/iap/get_web_backend_service_iam_policy.py +0 -5
  937. pulumi_gcp/iap/get_web_iam_policy.py +0 -5
  938. pulumi_gcp/iap/get_web_region_backend_service_iam_policy.py +0 -5
  939. pulumi_gcp/iap/get_web_type_app_engine_iam_policy.py +0 -5
  940. pulumi_gcp/iap/get_web_type_compute_iam_policy.py +0 -5
  941. pulumi_gcp/iap/outputs.py +0 -5
  942. pulumi_gcp/iap/tunnel_dest_group.py +0 -5
  943. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +97 -102
  944. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +97 -102
  945. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +92 -97
  946. pulumi_gcp/iap/tunnel_iam_binding.py +97 -102
  947. pulumi_gcp/iap/tunnel_iam_member.py +97 -102
  948. pulumi_gcp/iap/tunnel_iam_policy.py +92 -97
  949. pulumi_gcp/iap/tunnel_instance_iam_binding.py +97 -102
  950. pulumi_gcp/iap/tunnel_instance_iam_member.py +97 -102
  951. pulumi_gcp/iap/tunnel_instance_iam_policy.py +92 -97
  952. pulumi_gcp/iap/web_backend_service_iam_binding.py +97 -102
  953. pulumi_gcp/iap/web_backend_service_iam_member.py +97 -102
  954. pulumi_gcp/iap/web_backend_service_iam_policy.py +92 -97
  955. pulumi_gcp/iap/web_iam_binding.py +97 -102
  956. pulumi_gcp/iap/web_iam_member.py +97 -102
  957. pulumi_gcp/iap/web_iam_policy.py +92 -97
  958. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +97 -102
  959. pulumi_gcp/iap/web_region_backend_service_iam_member.py +97 -102
  960. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +92 -97
  961. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +97 -102
  962. pulumi_gcp/iap/web_type_app_enging_iam_member.py +97 -102
  963. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +92 -97
  964. pulumi_gcp/iap/web_type_compute_iam_binding.py +97 -102
  965. pulumi_gcp/iap/web_type_compute_iam_member.py +97 -102
  966. pulumi_gcp/iap/web_type_compute_iam_policy.py +92 -97
  967. pulumi_gcp/identityplatform/_inputs.py +0 -576
  968. pulumi_gcp/identityplatform/config.py +115 -120
  969. pulumi_gcp/identityplatform/default_supported_idp_config.py +0 -5
  970. pulumi_gcp/identityplatform/inbound_saml_config.py +34 -39
  971. pulumi_gcp/identityplatform/oauth_idp_config.py +0 -5
  972. pulumi_gcp/identityplatform/outputs.py +0 -5
  973. pulumi_gcp/identityplatform/project_default_config.py +33 -38
  974. pulumi_gcp/identityplatform/tenant.py +0 -5
  975. pulumi_gcp/identityplatform/tenant_default_supported_idp_config.py +0 -5
  976. pulumi_gcp/identityplatform/tenant_inbound_saml_config.py +34 -39
  977. pulumi_gcp/identityplatform/tenant_oauth_idp_config.py +0 -5
  978. pulumi_gcp/integrationconnectors/_inputs.py +0 -868
  979. pulumi_gcp/integrationconnectors/connection.py +460 -465
  980. pulumi_gcp/integrationconnectors/endpoint_attachment.py +0 -5
  981. pulumi_gcp/integrationconnectors/managed_zone.py +10 -15
  982. pulumi_gcp/integrationconnectors/outputs.py +0 -5
  983. pulumi_gcp/kms/_inputs.py +0 -303
  984. pulumi_gcp/kms/autokey_config.py +0 -5
  985. pulumi_gcp/kms/crypto_key.py +13 -18
  986. pulumi_gcp/kms/crypto_key_iam_binding.py +51 -56
  987. pulumi_gcp/kms/crypto_key_iam_member.py +51 -56
  988. pulumi_gcp/kms/crypto_key_iam_policy.py +46 -51
  989. pulumi_gcp/kms/crypto_key_version.py +7 -12
  990. pulumi_gcp/kms/ekm_connection.py +19 -24
  991. pulumi_gcp/kms/get_crypto_key_iam_policy.py +0 -5
  992. pulumi_gcp/kms/get_key_ring_iam_policy.py +0 -5
  993. pulumi_gcp/kms/get_kms_crypto_key.py +0 -5
  994. pulumi_gcp/kms/get_kms_crypto_key_version.py +0 -5
  995. pulumi_gcp/kms/get_kms_key_ring.py +0 -5
  996. pulumi_gcp/kms/get_kms_secret.py +6 -11
  997. pulumi_gcp/kms/get_kms_secret_asymmetric.py +12 -17
  998. pulumi_gcp/kms/get_kms_secret_ciphertext.py +18 -23
  999. pulumi_gcp/kms/key_handle.py +0 -5
  1000. pulumi_gcp/kms/key_ring.py +0 -5
  1001. pulumi_gcp/kms/key_ring_iam_binding.py +97 -102
  1002. pulumi_gcp/kms/key_ring_iam_member.py +97 -102
  1003. pulumi_gcp/kms/key_ring_iam_policy.py +92 -97
  1004. pulumi_gcp/kms/key_ring_import_job.py +4 -9
  1005. pulumi_gcp/kms/outputs.py +0 -5
  1006. pulumi_gcp/kms/secret_ciphertext.py +18 -23
  1007. pulumi_gcp/logging/_inputs.py +0 -520
  1008. pulumi_gcp/logging/billing_account_bucket_config.py +11 -16
  1009. pulumi_gcp/logging/billing_account_exclusion.py +0 -5
  1010. pulumi_gcp/logging/billing_account_sink.py +10 -15
  1011. pulumi_gcp/logging/folder_bucket_config.py +11 -16
  1012. pulumi_gcp/logging/folder_exclusion.py +0 -5
  1013. pulumi_gcp/logging/folder_settings.py +0 -5
  1014. pulumi_gcp/logging/folder_sink.py +10 -15
  1015. pulumi_gcp/logging/get_folder_settings.py +0 -5
  1016. pulumi_gcp/logging/get_log_view_iam_policy.py +0 -5
  1017. pulumi_gcp/logging/get_organization_settings.py +0 -5
  1018. pulumi_gcp/logging/get_project_cmek_settings.py +0 -5
  1019. pulumi_gcp/logging/get_project_settings.py +0 -5
  1020. pulumi_gcp/logging/get_sink.py +0 -5
  1021. pulumi_gcp/logging/linked_dataset.py +5 -10
  1022. pulumi_gcp/logging/log_view.py +0 -5
  1023. pulumi_gcp/logging/log_view_iam_binding.py +5 -10
  1024. pulumi_gcp/logging/log_view_iam_member.py +5 -10
  1025. pulumi_gcp/logging/log_view_iam_policy.py +0 -5
  1026. pulumi_gcp/logging/metric.py +92 -97
  1027. pulumi_gcp/logging/organization_bucket_config.py +11 -16
  1028. pulumi_gcp/logging/organization_exclusion.py +0 -5
  1029. pulumi_gcp/logging/organization_settings.py +0 -5
  1030. pulumi_gcp/logging/organization_sink.py +10 -15
  1031. pulumi_gcp/logging/outputs.py +0 -5
  1032. pulumi_gcp/logging/project_bucket_config.py +16 -21
  1033. pulumi_gcp/logging/project_exclusion.py +0 -5
  1034. pulumi_gcp/logging/project_sink.py +10 -15
  1035. pulumi_gcp/looker/_inputs.py +0 -211
  1036. pulumi_gcp/looker/instance.py +199 -204
  1037. pulumi_gcp/looker/outputs.py +0 -5
  1038. pulumi_gcp/managedkafka/_inputs.py +0 -69
  1039. pulumi_gcp/managedkafka/cluster.py +67 -72
  1040. pulumi_gcp/managedkafka/outputs.py +0 -5
  1041. pulumi_gcp/managedkafka/topic.py +22 -27
  1042. pulumi_gcp/memcache/_inputs.py +0 -184
  1043. pulumi_gcp/memcache/instance.py +51 -56
  1044. pulumi_gcp/memcache/outputs.py +0 -5
  1045. pulumi_gcp/migrationcenter/_inputs.py +0 -182
  1046. pulumi_gcp/migrationcenter/group.py +0 -5
  1047. pulumi_gcp/migrationcenter/outputs.py +0 -5
  1048. pulumi_gcp/migrationcenter/preference_set.py +77 -82
  1049. pulumi_gcp/ml/_inputs.py +0 -17
  1050. pulumi_gcp/ml/engine_model.py +5 -10
  1051. pulumi_gcp/ml/outputs.py +0 -5
  1052. pulumi_gcp/monitoring/_inputs.py +15 -1731
  1053. pulumi_gcp/monitoring/alert_policy.py +123 -128
  1054. pulumi_gcp/monitoring/custom_service.py +11 -16
  1055. pulumi_gcp/monitoring/dashboard.py +0 -5
  1056. pulumi_gcp/monitoring/generic_service.py +15 -20
  1057. pulumi_gcp/monitoring/get_app_engine_service.py +16 -21
  1058. pulumi_gcp/monitoring/get_cluster_istio_service.py +0 -5
  1059. pulumi_gcp/monitoring/get_istio_canonical_service.py +0 -5
  1060. pulumi_gcp/monitoring/get_mesh_istio_service.py +0 -5
  1061. pulumi_gcp/monitoring/get_notification_channel.py +24 -29
  1062. pulumi_gcp/monitoring/get_secret_version.py +0 -5
  1063. pulumi_gcp/monitoring/get_uptime_check_i_ps.py +0 -5
  1064. pulumi_gcp/monitoring/group.py +0 -5
  1065. pulumi_gcp/monitoring/metric_descriptor.py +44 -49
  1066. pulumi_gcp/monitoring/monitored_project.py +0 -5
  1067. pulumi_gcp/monitoring/notification_channel.py +11 -16
  1068. pulumi_gcp/monitoring/outputs.py +0 -68
  1069. pulumi_gcp/monitoring/slo.py +115 -120
  1070. pulumi_gcp/monitoring/uptime_check_config.py +236 -241
  1071. pulumi_gcp/netapp/_inputs.py +0 -311
  1072. pulumi_gcp/netapp/active_directory.py +0 -5
  1073. pulumi_gcp/netapp/backup.py +6 -11
  1074. pulumi_gcp/netapp/backup_policy.py +0 -5
  1075. pulumi_gcp/netapp/backup_vault.py +0 -5
  1076. pulumi_gcp/netapp/kmsconfig.py +0 -5
  1077. pulumi_gcp/netapp/outputs.py +0 -5
  1078. pulumi_gcp/netapp/storage_pool.py +0 -5
  1079. pulumi_gcp/netapp/volume.py +22 -27
  1080. pulumi_gcp/netapp/volume_replication.py +19 -24
  1081. pulumi_gcp/netapp/volume_snapshot.py +0 -5
  1082. pulumi_gcp/networkconnectivity/_inputs.py +0 -253
  1083. pulumi_gcp/networkconnectivity/hub.py +2 -7
  1084. pulumi_gcp/networkconnectivity/internal_range.py +0 -5
  1085. pulumi_gcp/networkconnectivity/outputs.py +0 -5
  1086. pulumi_gcp/networkconnectivity/policy_based_route.py +41 -46
  1087. pulumi_gcp/networkconnectivity/regional_endpoint.py +0 -5
  1088. pulumi_gcp/networkconnectivity/service_connection_policy.py +15 -20
  1089. pulumi_gcp/networkconnectivity/spoke.py +66 -71
  1090. pulumi_gcp/networkmanagement/_inputs.py +0 -87
  1091. pulumi_gcp/networkmanagement/connectivity_test.py +80 -85
  1092. pulumi_gcp/networkmanagement/outputs.py +0 -5
  1093. pulumi_gcp/networksecurity/_inputs.py +0 -321
  1094. pulumi_gcp/networksecurity/address_group.py +0 -5
  1095. pulumi_gcp/networksecurity/address_group_iam_binding.py +5 -297
  1096. pulumi_gcp/networksecurity/address_group_iam_member.py +5 -297
  1097. pulumi_gcp/networksecurity/address_group_iam_policy.py +0 -5
  1098. pulumi_gcp/networksecurity/authorization_policy.py +47 -52
  1099. pulumi_gcp/networksecurity/client_tls_policy.py +40 -45
  1100. pulumi_gcp/networksecurity/firewall_endpoint.py +0 -5
  1101. pulumi_gcp/networksecurity/firewall_endpoint_association.py +0 -5
  1102. pulumi_gcp/networksecurity/gateway_security_policy.py +86 -91
  1103. pulumi_gcp/networksecurity/gateway_security_policy_rule.py +0 -5
  1104. pulumi_gcp/networksecurity/get_address_group_iam_policy.py +0 -5
  1105. pulumi_gcp/networksecurity/outputs.py +0 -5
  1106. pulumi_gcp/networksecurity/security_profile.py +35 -40
  1107. pulumi_gcp/networksecurity/security_profile_group.py +0 -5
  1108. pulumi_gcp/networksecurity/server_tls_policy.py +96 -101
  1109. pulumi_gcp/networksecurity/tls_inspection_policy.py +188 -193
  1110. pulumi_gcp/networksecurity/url_list.py +0 -5
  1111. pulumi_gcp/networkservices/_inputs.py +31 -1783
  1112. pulumi_gcp/networkservices/edge_cache_keyset.py +46 -51
  1113. pulumi_gcp/networkservices/edge_cache_origin.py +84 -89
  1114. pulumi_gcp/networkservices/edge_cache_service.py +562 -567
  1115. pulumi_gcp/networkservices/endpoint_policy.py +50 -55
  1116. pulumi_gcp/networkservices/gateway.py +16 -21
  1117. pulumi_gcp/networkservices/grpc_route.py +141 -146
  1118. pulumi_gcp/networkservices/http_route.py +289 -294
  1119. pulumi_gcp/networkservices/lb_route_extension.py +5 -10
  1120. pulumi_gcp/networkservices/lb_traffic_extension.py +5 -10
  1121. pulumi_gcp/networkservices/mesh.py +0 -5
  1122. pulumi_gcp/networkservices/outputs.py +0 -5
  1123. pulumi_gcp/networkservices/service_binding.py +0 -5
  1124. pulumi_gcp/networkservices/service_lb_policies.py +22 -27
  1125. pulumi_gcp/networkservices/tcp_route.py +101 -106
  1126. pulumi_gcp/networkservices/tls_route.py +77 -82
  1127. pulumi_gcp/notebooks/_inputs.py +0 -615
  1128. pulumi_gcp/notebooks/environment.py +16 -21
  1129. pulumi_gcp/notebooks/get_instance_iam_policy.py +0 -5
  1130. pulumi_gcp/notebooks/get_runtime_iam_policy.py +0 -5
  1131. pulumi_gcp/notebooks/instance.py +73 -78
  1132. pulumi_gcp/notebooks/instance_iam_binding.py +19 -24
  1133. pulumi_gcp/notebooks/instance_iam_member.py +19 -24
  1134. pulumi_gcp/notebooks/instance_iam_policy.py +16 -21
  1135. pulumi_gcp/notebooks/location.py +0 -5
  1136. pulumi_gcp/notebooks/outputs.py +0 -5
  1137. pulumi_gcp/notebooks/runtime.py +217 -222
  1138. pulumi_gcp/notebooks/runtime_iam_binding.py +19 -24
  1139. pulumi_gcp/notebooks/runtime_iam_member.py +19 -24
  1140. pulumi_gcp/notebooks/runtime_iam_policy.py +16 -21
  1141. pulumi_gcp/organizations/_inputs.py +0 -231
  1142. pulumi_gcp/organizations/access_approval_settings.py +31 -36
  1143. pulumi_gcp/organizations/folder.py +0 -5
  1144. pulumi_gcp/organizations/get_active_folder.py +0 -5
  1145. pulumi_gcp/organizations/get_billing_account.py +0 -5
  1146. pulumi_gcp/organizations/get_client_config.py +0 -5
  1147. pulumi_gcp/organizations/get_client_open_id_user_info.py +0 -5
  1148. pulumi_gcp/organizations/get_folder.py +0 -5
  1149. pulumi_gcp/organizations/get_folders.py +0 -5
  1150. pulumi_gcp/organizations/get_iam_policy.py +8 -13
  1151. pulumi_gcp/organizations/get_organization.py +0 -5
  1152. pulumi_gcp/organizations/get_project.py +0 -5
  1153. pulumi_gcp/organizations/iam_audit_config.py +13 -18
  1154. pulumi_gcp/organizations/iam_binding.py +3 -8
  1155. pulumi_gcp/organizations/iam_custom_role.py +0 -5
  1156. pulumi_gcp/organizations/iam_member.py +125 -130
  1157. pulumi_gcp/organizations/iam_policy.py +120 -125
  1158. pulumi_gcp/organizations/outputs.py +0 -5
  1159. pulumi_gcp/organizations/policy.py +49 -54
  1160. pulumi_gcp/organizations/project.py +0 -5
  1161. pulumi_gcp/orgpolicy/_inputs.py +0 -183
  1162. pulumi_gcp/orgpolicy/custom_constraint.py +10 -15
  1163. pulumi_gcp/orgpolicy/outputs.py +0 -5
  1164. pulumi_gcp/orgpolicy/policy.py +98 -103
  1165. pulumi_gcp/osconfig/_inputs.py +27 -2232
  1166. pulumi_gcp/osconfig/guest_policies.py +166 -171
  1167. pulumi_gcp/osconfig/os_policy_assignment.py +153 -158
  1168. pulumi_gcp/osconfig/outputs.py +0 -5
  1169. pulumi_gcp/osconfig/patch_deployment.py +321 -326
  1170. pulumi_gcp/oslogin/ssh_public_key.py +0 -5
  1171. pulumi_gcp/parallelstore/instance.py +0 -5
  1172. pulumi_gcp/privilegedaccessmanager/_inputs.py +0 -170
  1173. pulumi_gcp/privilegedaccessmanager/entitlement.py +89 -94
  1174. pulumi_gcp/privilegedaccessmanager/outputs.py +0 -5
  1175. pulumi_gcp/projects/_inputs.py +0 -262
  1176. pulumi_gcp/projects/access_approval_settings.py +25 -30
  1177. pulumi_gcp/projects/api_key.py +83 -88
  1178. pulumi_gcp/projects/default_service_accounts.py +0 -5
  1179. pulumi_gcp/projects/get_iam_policy.py +0 -5
  1180. pulumi_gcp/projects/get_organization_policy.py +0 -5
  1181. pulumi_gcp/projects/get_project.py +0 -5
  1182. pulumi_gcp/projects/get_project_service.py +0 -5
  1183. pulumi_gcp/projects/iam_audit_config.py +125 -130
  1184. pulumi_gcp/projects/iam_binding.py +125 -130
  1185. pulumi_gcp/projects/iam_custom_role.py +0 -5
  1186. pulumi_gcp/projects/iam_member.py +125 -130
  1187. pulumi_gcp/projects/iam_member_remove.py +0 -5
  1188. pulumi_gcp/projects/iam_policy.py +120 -125
  1189. pulumi_gcp/projects/organization_policy.py +49 -54
  1190. pulumi_gcp/projects/outputs.py +0 -5
  1191. pulumi_gcp/projects/service.py +0 -5
  1192. pulumi_gcp/projects/service_identity.py +0 -5
  1193. pulumi_gcp/projects/usage_export_bucket.py +0 -5
  1194. pulumi_gcp/provider.py +2 -7
  1195. pulumi_gcp/pubsub/_inputs.py +0 -438
  1196. pulumi_gcp/pubsub/get_schema_iam_policy.py +0 -5
  1197. pulumi_gcp/pubsub/get_subscription.py +0 -5
  1198. pulumi_gcp/pubsub/get_subscription_iam_policy.py +0 -5
  1199. pulumi_gcp/pubsub/get_topic.py +0 -5
  1200. pulumi_gcp/pubsub/get_topic_iam_policy.py +0 -5
  1201. pulumi_gcp/pubsub/lite_reservation.py +0 -5
  1202. pulumi_gcp/pubsub/lite_subscription.py +31 -36
  1203. pulumi_gcp/pubsub/lite_topic.py +41 -46
  1204. pulumi_gcp/pubsub/outputs.py +0 -5
  1205. pulumi_gcp/pubsub/schema.py +8 -13
  1206. pulumi_gcp/pubsub/schema_iam_binding.py +19 -24
  1207. pulumi_gcp/pubsub/schema_iam_member.py +19 -24
  1208. pulumi_gcp/pubsub/schema_iam_policy.py +16 -21
  1209. pulumi_gcp/pubsub/subscription.py +136 -141
  1210. pulumi_gcp/pubsub/subscription_iam_binding.py +19 -24
  1211. pulumi_gcp/pubsub/subscription_iam_member.py +19 -24
  1212. pulumi_gcp/pubsub/subscription_iam_policy.py +16 -21
  1213. pulumi_gcp/pubsub/topic.py +45 -50
  1214. pulumi_gcp/pubsub/topic_iam_binding.py +19 -24
  1215. pulumi_gcp/pubsub/topic_iam_member.py +19 -24
  1216. pulumi_gcp/pubsub/topic_iam_policy.py +16 -21
  1217. pulumi_gcp/pulumi-plugin.json +1 -1
  1218. pulumi_gcp/recaptcha/_inputs.py +0 -89
  1219. pulumi_gcp/recaptcha/enterprise_key.py +127 -132
  1220. pulumi_gcp/recaptcha/outputs.py +0 -5
  1221. pulumi_gcp/redis/_inputs.py +0 -321
  1222. pulumi_gcp/redis/cluster.py +54 -59
  1223. pulumi_gcp/redis/get_instance.py +0 -5
  1224. pulumi_gcp/redis/instance.py +46 -51
  1225. pulumi_gcp/redis/outputs.py +0 -5
  1226. pulumi_gcp/resourcemanager/lien.py +0 -5
  1227. pulumi_gcp/runtimeconfig/_inputs.py +0 -25
  1228. pulumi_gcp/runtimeconfig/config.py +0 -5
  1229. pulumi_gcp/runtimeconfig/config_iam_binding.py +3 -8
  1230. pulumi_gcp/runtimeconfig/config_iam_member.py +3 -8
  1231. pulumi_gcp/runtimeconfig/config_iam_policy.py +0 -5
  1232. pulumi_gcp/runtimeconfig/get_config.py +0 -5
  1233. pulumi_gcp/runtimeconfig/get_config_iam_policy.py +0 -5
  1234. pulumi_gcp/runtimeconfig/get_variable.py +0 -5
  1235. pulumi_gcp/runtimeconfig/outputs.py +0 -5
  1236. pulumi_gcp/runtimeconfig/variable.py +0 -5
  1237. pulumi_gcp/secretmanager/_inputs.py +0 -143
  1238. pulumi_gcp/secretmanager/get_secret.py +0 -5
  1239. pulumi_gcp/secretmanager/get_secret_iam_policy.py +0 -5
  1240. pulumi_gcp/secretmanager/get_secret_version.py +0 -5
  1241. pulumi_gcp/secretmanager/get_secret_version_access.py +0 -5
  1242. pulumi_gcp/secretmanager/get_secrets.py +0 -5
  1243. pulumi_gcp/secretmanager/outputs.py +0 -5
  1244. pulumi_gcp/secretmanager/secret.py +63 -68
  1245. pulumi_gcp/secretmanager/secret_iam_binding.py +97 -102
  1246. pulumi_gcp/secretmanager/secret_iam_member.py +97 -102
  1247. pulumi_gcp/secretmanager/secret_iam_policy.py +92 -97
  1248. pulumi_gcp/secretmanager/secret_version.py +48 -53
  1249. pulumi_gcp/securesourcemanager/_inputs.py +0 -75
  1250. pulumi_gcp/securesourcemanager/get_instance_iam_policy.py +0 -5
  1251. pulumi_gcp/securesourcemanager/instance.py +73 -78
  1252. pulumi_gcp/securesourcemanager/instance_iam_binding.py +3 -8
  1253. pulumi_gcp/securesourcemanager/instance_iam_member.py +3 -8
  1254. pulumi_gcp/securesourcemanager/instance_iam_policy.py +0 -5
  1255. pulumi_gcp/securesourcemanager/outputs.py +0 -5
  1256. pulumi_gcp/securitycenter/_inputs.py +9 -862
  1257. pulumi_gcp/securitycenter/event_threat_detection_custom_module.py +0 -5
  1258. pulumi_gcp/securitycenter/folder_custom_module.py +77 -82
  1259. pulumi_gcp/securitycenter/get_source_iam_policy.py +0 -5
  1260. pulumi_gcp/securitycenter/instance_iam_binding.py +33 -102
  1261. pulumi_gcp/securitycenter/instance_iam_member.py +33 -102
  1262. pulumi_gcp/securitycenter/instance_iam_policy.py +30 -99
  1263. pulumi_gcp/securitycenter/management_folder_security_health_analytics_custom_module.py +77 -82
  1264. pulumi_gcp/securitycenter/management_organization_event_threat_detection_custom_module.py +0 -5
  1265. pulumi_gcp/securitycenter/management_organization_security_health_analytics_custom_module.py +77 -82
  1266. pulumi_gcp/securitycenter/management_project_security_health_analytics_custom_module.py +77 -82
  1267. pulumi_gcp/securitycenter/mute_config.py +0 -5
  1268. pulumi_gcp/securitycenter/notification_config.py +11 -16
  1269. pulumi_gcp/securitycenter/organization_custom_module.py +77 -82
  1270. pulumi_gcp/securitycenter/outputs.py +0 -5
  1271. pulumi_gcp/securitycenter/project_custom_module.py +77 -82
  1272. pulumi_gcp/securitycenter/source.py +0 -5
  1273. pulumi_gcp/securitycenter/source_iam_binding.py +3 -8
  1274. pulumi_gcp/securitycenter/source_iam_member.py +3 -8
  1275. pulumi_gcp/securitycenter/source_iam_policy.py +0 -5
  1276. pulumi_gcp/securityposture/_inputs.py +0 -457
  1277. pulumi_gcp/securityposture/outputs.py +0 -5
  1278. pulumi_gcp/securityposture/posture.py +181 -186
  1279. pulumi_gcp/securityposture/posture_deployment.py +30 -35
  1280. pulumi_gcp/serviceaccount/_inputs.py +0 -51
  1281. pulumi_gcp/serviceaccount/account.py +0 -5
  1282. pulumi_gcp/serviceaccount/get_account.py +0 -5
  1283. pulumi_gcp/serviceaccount/get_account_access_token.py +0 -5
  1284. pulumi_gcp/serviceaccount/get_account_id_token.py +0 -5
  1285. pulumi_gcp/serviceaccount/get_account_jwt.py +0 -5
  1286. pulumi_gcp/serviceaccount/get_account_key.py +0 -5
  1287. pulumi_gcp/serviceaccount/get_iam_policy.py +0 -5
  1288. pulumi_gcp/serviceaccount/iam_binding.py +61 -66
  1289. pulumi_gcp/serviceaccount/iam_member.py +61 -66
  1290. pulumi_gcp/serviceaccount/iam_policy.py +56 -61
  1291. pulumi_gcp/serviceaccount/key.py +0 -5
  1292. pulumi_gcp/serviceaccount/outputs.py +0 -5
  1293. pulumi_gcp/servicedirectory/_inputs.py +0 -43
  1294. pulumi_gcp/servicedirectory/endpoint.py +0 -5
  1295. pulumi_gcp/servicedirectory/get_namespace_iam_policy.py +0 -5
  1296. pulumi_gcp/servicedirectory/get_service_iam_policy.py +0 -5
  1297. pulumi_gcp/servicedirectory/namespace.py +0 -5
  1298. pulumi_gcp/servicedirectory/namespace_iam_binding.py +19 -24
  1299. pulumi_gcp/servicedirectory/namespace_iam_member.py +19 -24
  1300. pulumi_gcp/servicedirectory/namespace_iam_policy.py +16 -21
  1301. pulumi_gcp/servicedirectory/outputs.py +0 -5
  1302. pulumi_gcp/servicedirectory/service.py +0 -5
  1303. pulumi_gcp/servicedirectory/service_iam_binding.py +19 -24
  1304. pulumi_gcp/servicedirectory/service_iam_member.py +19 -24
  1305. pulumi_gcp/servicedirectory/service_iam_policy.py +16 -21
  1306. pulumi_gcp/servicenetworking/connection.py +0 -5
  1307. pulumi_gcp/servicenetworking/get_peered_dns_domain.py +0 -5
  1308. pulumi_gcp/servicenetworking/peered_dns_domain.py +0 -5
  1309. pulumi_gcp/servicenetworking/vpc_service_controls.py +0 -5
  1310. pulumi_gcp/serviceusage/consumer_quota_override.py +0 -5
  1311. pulumi_gcp/sourcerepo/_inputs.py +0 -49
  1312. pulumi_gcp/sourcerepo/get_repository.py +0 -5
  1313. pulumi_gcp/sourcerepo/get_repository_iam_policy.py +0 -5
  1314. pulumi_gcp/sourcerepo/outputs.py +0 -5
  1315. pulumi_gcp/sourcerepo/repository.py +15 -20
  1316. pulumi_gcp/sourcerepo/repository_iam_binding.py +102 -116
  1317. pulumi_gcp/sourcerepo/repository_iam_member.py +102 -116
  1318. pulumi_gcp/sourcerepo/repository_iam_policy.py +92 -106
  1319. pulumi_gcp/spanner/_inputs.py +0 -157
  1320. pulumi_gcp/spanner/database.py +5 -10
  1321. pulumi_gcp/spanner/database_iam_binding.py +97 -102
  1322. pulumi_gcp/spanner/database_iam_member.py +97 -102
  1323. pulumi_gcp/spanner/database_iam_policy.py +92 -97
  1324. pulumi_gcp/spanner/get_database_iam_policy.py +0 -5
  1325. pulumi_gcp/spanner/get_instance.py +0 -5
  1326. pulumi_gcp/spanner/get_instance_iam_policy.py +0 -5
  1327. pulumi_gcp/spanner/instance.py +25 -30
  1328. pulumi_gcp/spanner/instance_config.py +5 -10
  1329. pulumi_gcp/spanner/instance_iam_binding.py +19 -24
  1330. pulumi_gcp/spanner/instance_iam_member.py +19 -24
  1331. pulumi_gcp/spanner/instance_iam_policy.py +16 -21
  1332. pulumi_gcp/spanner/outputs.py +0 -5
  1333. pulumi_gcp/sql/_inputs.py +0 -616
  1334. pulumi_gcp/sql/database.py +12 -17
  1335. pulumi_gcp/sql/database_instance.py +88 -93
  1336. pulumi_gcp/sql/get_backup_run.py +0 -5
  1337. pulumi_gcp/sql/get_ca_certs.py +0 -5
  1338. pulumi_gcp/sql/get_database.py +0 -5
  1339. pulumi_gcp/sql/get_database_instance.py +0 -5
  1340. pulumi_gcp/sql/get_database_instance_latest_recovery_time.py +0 -5
  1341. pulumi_gcp/sql/get_database_instances.py +0 -5
  1342. pulumi_gcp/sql/get_databases.py +0 -5
  1343. pulumi_gcp/sql/get_tiers.py +0 -5
  1344. pulumi_gcp/sql/outputs.py +0 -5
  1345. pulumi_gcp/sql/source_representation_instance.py +0 -5
  1346. pulumi_gcp/sql/ssl_cert.py +6 -11
  1347. pulumi_gcp/sql/user.py +38 -43
  1348. pulumi_gcp/storage/__init__.py +0 -5
  1349. pulumi_gcp/storage/_inputs.py +0 -958
  1350. pulumi_gcp/storage/bucket.py +120 -125
  1351. pulumi_gcp/storage/bucket_access_control.py +0 -5
  1352. pulumi_gcp/storage/bucket_acl.py +0 -5
  1353. pulumi_gcp/storage/bucket_iam_binding.py +97 -102
  1354. pulumi_gcp/storage/bucket_iam_member.py +97 -102
  1355. pulumi_gcp/storage/bucket_iam_policy.py +92 -97
  1356. pulumi_gcp/storage/bucket_object.py +10 -15
  1357. pulumi_gcp/storage/default_object_access_control.py +2 -7
  1358. pulumi_gcp/storage/default_object_acl.py +0 -5
  1359. pulumi_gcp/storage/get_bucket.py +0 -5
  1360. pulumi_gcp/storage/get_bucket_iam_policy.py +0 -5
  1361. pulumi_gcp/storage/get_bucket_object.py +0 -5
  1362. pulumi_gcp/storage/get_bucket_object_content.py +0 -5
  1363. pulumi_gcp/storage/get_bucket_objects.py +0 -5
  1364. pulumi_gcp/storage/get_buckets.py +0 -5
  1365. pulumi_gcp/storage/get_object_signed_url.py +0 -5
  1366. pulumi_gcp/storage/get_project_service_account.py +6 -11
  1367. pulumi_gcp/storage/get_transfer_project_service_account.py +0 -5
  1368. pulumi_gcp/storage/get_transfer_project_servie_account.py +0 -5
  1369. pulumi_gcp/storage/hmac_key.py +0 -5
  1370. pulumi_gcp/storage/insights_report_config.py +71 -76
  1371. pulumi_gcp/storage/notification.py +0 -5
  1372. pulumi_gcp/storage/object_access_control.py +2 -7
  1373. pulumi_gcp/storage/object_acl.py +0 -5
  1374. pulumi_gcp/storage/outputs.py +0 -81
  1375. pulumi_gcp/storage/transfer_agent_pool.py +11 -16
  1376. pulumi_gcp/storage/transfer_job.py +108 -113
  1377. pulumi_gcp/tags/_inputs.py +0 -43
  1378. pulumi_gcp/tags/get_tag_key.py +0 -5
  1379. pulumi_gcp/tags/get_tag_key_iam_policy.py +0 -5
  1380. pulumi_gcp/tags/get_tag_keys.py +0 -5
  1381. pulumi_gcp/tags/get_tag_value.py +0 -5
  1382. pulumi_gcp/tags/get_tag_value_iam_policy.py +0 -5
  1383. pulumi_gcp/tags/get_tag_values.py +0 -5
  1384. pulumi_gcp/tags/location_tag_binding.py +0 -5
  1385. pulumi_gcp/tags/outputs.py +0 -5
  1386. pulumi_gcp/tags/tag_binding.py +0 -5
  1387. pulumi_gcp/tags/tag_key.py +0 -5
  1388. pulumi_gcp/tags/tag_key_iam_binding.py +19 -24
  1389. pulumi_gcp/tags/tag_key_iam_member.py +19 -24
  1390. pulumi_gcp/tags/tag_key_iam_policy.py +16 -21
  1391. pulumi_gcp/tags/tag_value.py +0 -5
  1392. pulumi_gcp/tags/tag_value_iam_binding.py +19 -24
  1393. pulumi_gcp/tags/tag_value_iam_member.py +19 -24
  1394. pulumi_gcp/tags/tag_value_iam_policy.py +16 -21
  1395. pulumi_gcp/tpu/_inputs.py +0 -194
  1396. pulumi_gcp/tpu/get_tensorflow_versions.py +0 -5
  1397. pulumi_gcp/tpu/get_v2_accelerator_types.py +0 -5
  1398. pulumi_gcp/tpu/get_v2_runtime_versions.py +0 -5
  1399. pulumi_gcp/tpu/node.py +13 -18
  1400. pulumi_gcp/tpu/outputs.py +0 -5
  1401. pulumi_gcp/tpu/v2_vm.py +82 -87
  1402. pulumi_gcp/vertex/_inputs.py +2 -843
  1403. pulumi_gcp/vertex/ai_dataset.py +5 -10
  1404. pulumi_gcp/vertex/ai_deployment_resource_pool.py +31 -36
  1405. pulumi_gcp/vertex/ai_endpoint.py +13 -18
  1406. pulumi_gcp/vertex/ai_endpoint_iam_binding.py +3 -8
  1407. pulumi_gcp/vertex/ai_endpoint_iam_member.py +3 -8
  1408. pulumi_gcp/vertex/ai_endpoint_iam_policy.py +0 -5
  1409. pulumi_gcp/vertex/ai_feature_group.py +17 -22
  1410. pulumi_gcp/vertex/ai_feature_group_feature.py +12 -17
  1411. pulumi_gcp/vertex/ai_feature_online_store.py +75 -80
  1412. pulumi_gcp/vertex/ai_feature_online_store_featureview.py +146 -151
  1413. pulumi_gcp/vertex/ai_feature_store.py +52 -57
  1414. pulumi_gcp/vertex/ai_feature_store_entity_type.py +87 -92
  1415. pulumi_gcp/vertex/ai_feature_store_entity_type_feature.py +36 -41
  1416. pulumi_gcp/vertex/ai_feature_store_entity_type_iam_binding.py +3 -8
  1417. pulumi_gcp/vertex/ai_feature_store_entity_type_iam_member.py +3 -8
  1418. pulumi_gcp/vertex/ai_feature_store_entity_type_iam_policy.py +0 -5
  1419. pulumi_gcp/vertex/ai_feature_store_iam_binding.py +3 -8
  1420. pulumi_gcp/vertex/ai_feature_store_iam_member.py +3 -8
  1421. pulumi_gcp/vertex/ai_feature_store_iam_policy.py +0 -5
  1422. pulumi_gcp/vertex/ai_index.py +63 -68
  1423. pulumi_gcp/vertex/ai_index_endpoint.py +13 -18
  1424. pulumi_gcp/vertex/ai_metadata_store.py +7 -12
  1425. pulumi_gcp/vertex/ai_tensorboard.py +11 -16
  1426. pulumi_gcp/vertex/get_ai_endpoint_iam_policy.py +0 -5
  1427. pulumi_gcp/vertex/get_ai_featurestore_entitytype_iam_policy.py +0 -5
  1428. pulumi_gcp/vertex/get_ai_featurestore_iam_policy.py +0 -5
  1429. pulumi_gcp/vertex/get_ai_index.py +0 -5
  1430. pulumi_gcp/vertex/outputs.py +2 -7
  1431. pulumi_gcp/vmwareengine/_inputs.py +0 -290
  1432. pulumi_gcp/vmwareengine/cluster.py +69 -74
  1433. pulumi_gcp/vmwareengine/external_access_rule.py +56 -61
  1434. pulumi_gcp/vmwareengine/external_address.py +22 -27
  1435. pulumi_gcp/vmwareengine/get_cluster.py +0 -5
  1436. pulumi_gcp/vmwareengine/get_external_access_rule.py +0 -5
  1437. pulumi_gcp/vmwareengine/get_external_address.py +0 -5
  1438. pulumi_gcp/vmwareengine/get_network.py +0 -5
  1439. pulumi_gcp/vmwareengine/get_network_peering.py +0 -5
  1440. pulumi_gcp/vmwareengine/get_network_policy.py +0 -5
  1441. pulumi_gcp/vmwareengine/get_nsx_credentials.py +0 -5
  1442. pulumi_gcp/vmwareengine/get_private_cloud.py +0 -5
  1443. pulumi_gcp/vmwareengine/get_subnet.py +0 -5
  1444. pulumi_gcp/vmwareengine/get_vcenter_credentials.py +0 -5
  1445. pulumi_gcp/vmwareengine/network.py +2 -7
  1446. pulumi_gcp/vmwareengine/network_peering.py +0 -5
  1447. pulumi_gcp/vmwareengine/network_policy.py +22 -27
  1448. pulumi_gcp/vmwareengine/outputs.py +0 -5
  1449. pulumi_gcp/vmwareengine/private_cloud.py +62 -67
  1450. pulumi_gcp/vmwareengine/subnet.py +24 -29
  1451. pulumi_gcp/vpcaccess/_inputs.py +0 -22
  1452. pulumi_gcp/vpcaccess/connector.py +11 -16
  1453. pulumi_gcp/vpcaccess/get_connector.py +0 -5
  1454. pulumi_gcp/vpcaccess/outputs.py +0 -5
  1455. pulumi_gcp/workbench/_inputs.py +0 -319
  1456. pulumi_gcp/workbench/get_instance_iam_policy.py +0 -5
  1457. pulumi_gcp/workbench/instance.py +139 -144
  1458. pulumi_gcp/workbench/instance_iam_binding.py +3 -8
  1459. pulumi_gcp/workbench/instance_iam_member.py +3 -8
  1460. pulumi_gcp/workbench/instance_iam_policy.py +0 -5
  1461. pulumi_gcp/workbench/outputs.py +0 -5
  1462. pulumi_gcp/workflows/workflow.py +0 -5
  1463. pulumi_gcp/workstations/_inputs.py +0 -433
  1464. pulumi_gcp/workstations/get_workstation_config_iam_policy.py +0 -5
  1465. pulumi_gcp/workstations/get_workstation_iam_policy.py +0 -5
  1466. pulumi_gcp/workstations/outputs.py +0 -5
  1467. pulumi_gcp/workstations/workstation.py +14 -19
  1468. pulumi_gcp/workstations/workstation_cluster.py +30 -35
  1469. pulumi_gcp/workstations/workstation_config.py +246 -251
  1470. pulumi_gcp/workstations/workstation_config_iam_binding.py +3 -8
  1471. pulumi_gcp/workstations/workstation_config_iam_member.py +3 -8
  1472. pulumi_gcp/workstations/workstation_config_iam_policy.py +0 -5
  1473. pulumi_gcp/workstations/workstation_iam_binding.py +3 -8
  1474. pulumi_gcp/workstations/workstation_iam_member.py +3 -8
  1475. pulumi_gcp/workstations/workstation_iam_policy.py +0 -5
  1476. {pulumi_gcp-7.30.0.dist-info → pulumi_gcp-7.30.0a1719470057.dist-info}/METADATA +1 -2
  1477. pulumi_gcp-7.30.0a1719470057.dist-info/RECORD +1600 -0
  1478. {pulumi_gcp-7.30.0.dist-info → pulumi_gcp-7.30.0a1719470057.dist-info}/WHEEL +1 -1
  1479. pulumi_gcp/storage/get_managed_folder_iam_policy.py +0 -115
  1480. pulumi_gcp/storage/managed_folder.py +0 -440
  1481. pulumi_gcp/storage/managed_folder_iam_binding.py +0 -947
  1482. pulumi_gcp/storage/managed_folder_iam_member.py +0 -947
  1483. pulumi_gcp/storage/managed_folder_iam_policy.py +0 -766
  1484. pulumi_gcp-7.30.0.dist-info/RECORD +0 -1605
  1485. {pulumi_gcp-7.30.0.dist-info → pulumi_gcp-7.30.0a1719470057.dist-info}/top_level.txt +0 -0
@@ -4,221 +4,104 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
- import sys
8
7
  import pulumi
9
8
  import pulumi.runtime
10
9
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
10
  from .. import _utilities
16
11
 
17
12
  __all__ = [
18
13
  'AccessLevelBasicArgs',
19
- 'AccessLevelBasicArgsDict',
20
14
  'AccessLevelBasicConditionArgs',
21
- 'AccessLevelBasicConditionArgsDict',
22
15
  'AccessLevelBasicConditionDevicePolicyArgs',
23
- 'AccessLevelBasicConditionDevicePolicyArgsDict',
24
16
  'AccessLevelBasicConditionDevicePolicyOsConstraintArgs',
25
- 'AccessLevelBasicConditionDevicePolicyOsConstraintArgsDict',
26
17
  'AccessLevelBasicConditionVpcNetworkSourceArgs',
27
- 'AccessLevelBasicConditionVpcNetworkSourceArgsDict',
28
18
  'AccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgs',
29
- 'AccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgsDict',
30
19
  'AccessLevelConditionDevicePolicyArgs',
31
- 'AccessLevelConditionDevicePolicyArgsDict',
32
20
  'AccessLevelConditionDevicePolicyOsConstraintArgs',
33
- 'AccessLevelConditionDevicePolicyOsConstraintArgsDict',
34
21
  'AccessLevelConditionVpcNetworkSourceArgs',
35
- 'AccessLevelConditionVpcNetworkSourceArgsDict',
36
22
  'AccessLevelConditionVpcNetworkSourceVpcSubnetworkArgs',
37
- 'AccessLevelConditionVpcNetworkSourceVpcSubnetworkArgsDict',
38
23
  'AccessLevelCustomArgs',
39
- 'AccessLevelCustomArgsDict',
40
24
  'AccessLevelCustomExprArgs',
41
- 'AccessLevelCustomExprArgsDict',
42
25
  'AccessLevelsAccessLevelArgs',
43
- 'AccessLevelsAccessLevelArgsDict',
44
26
  'AccessLevelsAccessLevelBasicArgs',
45
- 'AccessLevelsAccessLevelBasicArgsDict',
46
27
  'AccessLevelsAccessLevelBasicConditionArgs',
47
- 'AccessLevelsAccessLevelBasicConditionArgsDict',
48
28
  'AccessLevelsAccessLevelBasicConditionDevicePolicyArgs',
49
- 'AccessLevelsAccessLevelBasicConditionDevicePolicyArgsDict',
50
29
  'AccessLevelsAccessLevelBasicConditionDevicePolicyOsConstraintArgs',
51
- 'AccessLevelsAccessLevelBasicConditionDevicePolicyOsConstraintArgsDict',
52
30
  'AccessLevelsAccessLevelBasicConditionVpcNetworkSourceArgs',
53
- 'AccessLevelsAccessLevelBasicConditionVpcNetworkSourceArgsDict',
54
31
  'AccessLevelsAccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgs',
55
- 'AccessLevelsAccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgsDict',
56
32
  'AccessLevelsAccessLevelCustomArgs',
57
- 'AccessLevelsAccessLevelCustomArgsDict',
58
33
  'AccessLevelsAccessLevelCustomExprArgs',
59
- 'AccessLevelsAccessLevelCustomExprArgsDict',
60
34
  'AccessPolicyIamBindingConditionArgs',
61
- 'AccessPolicyIamBindingConditionArgsDict',
62
35
  'AccessPolicyIamMemberConditionArgs',
63
- 'AccessPolicyIamMemberConditionArgsDict',
64
36
  'ServicePerimeterEgressPolicyEgressFromArgs',
65
- 'ServicePerimeterEgressPolicyEgressFromArgsDict',
66
37
  'ServicePerimeterEgressPolicyEgressFromSourceArgs',
67
- 'ServicePerimeterEgressPolicyEgressFromSourceArgsDict',
68
38
  'ServicePerimeterEgressPolicyEgressToArgs',
69
- 'ServicePerimeterEgressPolicyEgressToArgsDict',
70
39
  'ServicePerimeterEgressPolicyEgressToOperationArgs',
71
- 'ServicePerimeterEgressPolicyEgressToOperationArgsDict',
72
40
  'ServicePerimeterEgressPolicyEgressToOperationMethodSelectorArgs',
73
- 'ServicePerimeterEgressPolicyEgressToOperationMethodSelectorArgsDict',
74
41
  'ServicePerimeterIngressPolicyIngressFromArgs',
75
- 'ServicePerimeterIngressPolicyIngressFromArgsDict',
76
42
  'ServicePerimeterIngressPolicyIngressFromSourceArgs',
77
- 'ServicePerimeterIngressPolicyIngressFromSourceArgsDict',
78
43
  'ServicePerimeterIngressPolicyIngressToArgs',
79
- 'ServicePerimeterIngressPolicyIngressToArgsDict',
80
44
  'ServicePerimeterIngressPolicyIngressToOperationArgs',
81
- 'ServicePerimeterIngressPolicyIngressToOperationArgsDict',
82
45
  'ServicePerimeterIngressPolicyIngressToOperationMethodSelectorArgs',
83
- 'ServicePerimeterIngressPolicyIngressToOperationMethodSelectorArgsDict',
84
46
  'ServicePerimeterSpecArgs',
85
- 'ServicePerimeterSpecArgsDict',
86
47
  'ServicePerimeterSpecEgressPolicyArgs',
87
- 'ServicePerimeterSpecEgressPolicyArgsDict',
88
48
  'ServicePerimeterSpecEgressPolicyEgressFromArgs',
89
- 'ServicePerimeterSpecEgressPolicyEgressFromArgsDict',
90
49
  'ServicePerimeterSpecEgressPolicyEgressFromSourceArgs',
91
- 'ServicePerimeterSpecEgressPolicyEgressFromSourceArgsDict',
92
50
  'ServicePerimeterSpecEgressPolicyEgressToArgs',
93
- 'ServicePerimeterSpecEgressPolicyEgressToArgsDict',
94
51
  'ServicePerimeterSpecEgressPolicyEgressToOperationArgs',
95
- 'ServicePerimeterSpecEgressPolicyEgressToOperationArgsDict',
96
52
  'ServicePerimeterSpecEgressPolicyEgressToOperationMethodSelectorArgs',
97
- 'ServicePerimeterSpecEgressPolicyEgressToOperationMethodSelectorArgsDict',
98
53
  'ServicePerimeterSpecIngressPolicyArgs',
99
- 'ServicePerimeterSpecIngressPolicyArgsDict',
100
54
  'ServicePerimeterSpecIngressPolicyIngressFromArgs',
101
- 'ServicePerimeterSpecIngressPolicyIngressFromArgsDict',
102
55
  'ServicePerimeterSpecIngressPolicyIngressFromSourceArgs',
103
- 'ServicePerimeterSpecIngressPolicyIngressFromSourceArgsDict',
104
56
  'ServicePerimeterSpecIngressPolicyIngressToArgs',
105
- 'ServicePerimeterSpecIngressPolicyIngressToArgsDict',
106
57
  'ServicePerimeterSpecIngressPolicyIngressToOperationArgs',
107
- 'ServicePerimeterSpecIngressPolicyIngressToOperationArgsDict',
108
58
  'ServicePerimeterSpecIngressPolicyIngressToOperationMethodSelectorArgs',
109
- 'ServicePerimeterSpecIngressPolicyIngressToOperationMethodSelectorArgsDict',
110
59
  'ServicePerimeterSpecVpcAccessibleServicesArgs',
111
- 'ServicePerimeterSpecVpcAccessibleServicesArgsDict',
112
60
  'ServicePerimeterStatusArgs',
113
- 'ServicePerimeterStatusArgsDict',
114
61
  'ServicePerimeterStatusEgressPolicyArgs',
115
- 'ServicePerimeterStatusEgressPolicyArgsDict',
116
62
  'ServicePerimeterStatusEgressPolicyEgressFromArgs',
117
- 'ServicePerimeterStatusEgressPolicyEgressFromArgsDict',
118
63
  'ServicePerimeterStatusEgressPolicyEgressFromSourceArgs',
119
- 'ServicePerimeterStatusEgressPolicyEgressFromSourceArgsDict',
120
64
  'ServicePerimeterStatusEgressPolicyEgressToArgs',
121
- 'ServicePerimeterStatusEgressPolicyEgressToArgsDict',
122
65
  'ServicePerimeterStatusEgressPolicyEgressToOperationArgs',
123
- 'ServicePerimeterStatusEgressPolicyEgressToOperationArgsDict',
124
66
  'ServicePerimeterStatusEgressPolicyEgressToOperationMethodSelectorArgs',
125
- 'ServicePerimeterStatusEgressPolicyEgressToOperationMethodSelectorArgsDict',
126
67
  'ServicePerimeterStatusIngressPolicyArgs',
127
- 'ServicePerimeterStatusIngressPolicyArgsDict',
128
68
  'ServicePerimeterStatusIngressPolicyIngressFromArgs',
129
- 'ServicePerimeterStatusIngressPolicyIngressFromArgsDict',
130
69
  'ServicePerimeterStatusIngressPolicyIngressFromSourceArgs',
131
- 'ServicePerimeterStatusIngressPolicyIngressFromSourceArgsDict',
132
70
  'ServicePerimeterStatusIngressPolicyIngressToArgs',
133
- 'ServicePerimeterStatusIngressPolicyIngressToArgsDict',
134
71
  'ServicePerimeterStatusIngressPolicyIngressToOperationArgs',
135
- 'ServicePerimeterStatusIngressPolicyIngressToOperationArgsDict',
136
72
  'ServicePerimeterStatusIngressPolicyIngressToOperationMethodSelectorArgs',
137
- 'ServicePerimeterStatusIngressPolicyIngressToOperationMethodSelectorArgsDict',
138
73
  'ServicePerimeterStatusVpcAccessibleServicesArgs',
139
- 'ServicePerimeterStatusVpcAccessibleServicesArgsDict',
140
74
  'ServicePerimetersServicePerimeterArgs',
141
- 'ServicePerimetersServicePerimeterArgsDict',
142
75
  'ServicePerimetersServicePerimeterSpecArgs',
143
- 'ServicePerimetersServicePerimeterSpecArgsDict',
144
76
  'ServicePerimetersServicePerimeterSpecEgressPolicyArgs',
145
- 'ServicePerimetersServicePerimeterSpecEgressPolicyArgsDict',
146
77
  'ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromArgs',
147
- 'ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromArgsDict',
148
78
  'ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromSourceArgs',
149
- 'ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromSourceArgsDict',
150
79
  'ServicePerimetersServicePerimeterSpecEgressPolicyEgressToArgs',
151
- 'ServicePerimetersServicePerimeterSpecEgressPolicyEgressToArgsDict',
152
80
  'ServicePerimetersServicePerimeterSpecEgressPolicyEgressToOperationArgs',
153
- 'ServicePerimetersServicePerimeterSpecEgressPolicyEgressToOperationArgsDict',
154
81
  'ServicePerimetersServicePerimeterSpecEgressPolicyEgressToOperationMethodSelectorArgs',
155
- 'ServicePerimetersServicePerimeterSpecEgressPolicyEgressToOperationMethodSelectorArgsDict',
156
82
  'ServicePerimetersServicePerimeterSpecIngressPolicyArgs',
157
- 'ServicePerimetersServicePerimeterSpecIngressPolicyArgsDict',
158
83
  'ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromArgs',
159
- 'ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromArgsDict',
160
84
  'ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromSourceArgs',
161
- 'ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromSourceArgsDict',
162
85
  'ServicePerimetersServicePerimeterSpecIngressPolicyIngressToArgs',
163
- 'ServicePerimetersServicePerimeterSpecIngressPolicyIngressToArgsDict',
164
86
  'ServicePerimetersServicePerimeterSpecIngressPolicyIngressToOperationArgs',
165
- 'ServicePerimetersServicePerimeterSpecIngressPolicyIngressToOperationArgsDict',
166
87
  'ServicePerimetersServicePerimeterSpecIngressPolicyIngressToOperationMethodSelectorArgs',
167
- 'ServicePerimetersServicePerimeterSpecIngressPolicyIngressToOperationMethodSelectorArgsDict',
168
88
  'ServicePerimetersServicePerimeterSpecVpcAccessibleServicesArgs',
169
- 'ServicePerimetersServicePerimeterSpecVpcAccessibleServicesArgsDict',
170
89
  'ServicePerimetersServicePerimeterStatusArgs',
171
- 'ServicePerimetersServicePerimeterStatusArgsDict',
172
90
  'ServicePerimetersServicePerimeterStatusEgressPolicyArgs',
173
- 'ServicePerimetersServicePerimeterStatusEgressPolicyArgsDict',
174
91
  'ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromArgs',
175
- 'ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromArgsDict',
176
92
  'ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromSourceArgs',
177
- 'ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromSourceArgsDict',
178
93
  'ServicePerimetersServicePerimeterStatusEgressPolicyEgressToArgs',
179
- 'ServicePerimetersServicePerimeterStatusEgressPolicyEgressToArgsDict',
180
94
  'ServicePerimetersServicePerimeterStatusEgressPolicyEgressToOperationArgs',
181
- 'ServicePerimetersServicePerimeterStatusEgressPolicyEgressToOperationArgsDict',
182
95
  'ServicePerimetersServicePerimeterStatusEgressPolicyEgressToOperationMethodSelectorArgs',
183
- 'ServicePerimetersServicePerimeterStatusEgressPolicyEgressToOperationMethodSelectorArgsDict',
184
96
  'ServicePerimetersServicePerimeterStatusIngressPolicyArgs',
185
- 'ServicePerimetersServicePerimeterStatusIngressPolicyArgsDict',
186
97
  'ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromArgs',
187
- 'ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromArgsDict',
188
98
  'ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromSourceArgs',
189
- 'ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromSourceArgsDict',
190
99
  'ServicePerimetersServicePerimeterStatusIngressPolicyIngressToArgs',
191
- 'ServicePerimetersServicePerimeterStatusIngressPolicyIngressToArgsDict',
192
100
  'ServicePerimetersServicePerimeterStatusIngressPolicyIngressToOperationArgs',
193
- 'ServicePerimetersServicePerimeterStatusIngressPolicyIngressToOperationArgsDict',
194
101
  'ServicePerimetersServicePerimeterStatusIngressPolicyIngressToOperationMethodSelectorArgs',
195
- 'ServicePerimetersServicePerimeterStatusIngressPolicyIngressToOperationMethodSelectorArgsDict',
196
102
  'ServicePerimetersServicePerimeterStatusVpcAccessibleServicesArgs',
197
- 'ServicePerimetersServicePerimeterStatusVpcAccessibleServicesArgsDict',
198
103
  ]
199
104
 
200
- MYPY = False
201
-
202
- if not MYPY:
203
- class AccessLevelBasicArgsDict(TypedDict):
204
- conditions: pulumi.Input[Sequence[pulumi.Input['AccessLevelBasicConditionArgsDict']]]
205
- """
206
- A set of requirements for the AccessLevel to be granted.
207
- Structure is documented below.
208
- """
209
- combining_function: NotRequired[pulumi.Input[str]]
210
- """
211
- How the conditions list should be combined to determine if a request
212
- is granted this AccessLevel. If AND is used, each Condition in
213
- conditions must be satisfied for the AccessLevel to be applied. If
214
- OR is used, at least one Condition in conditions must be satisfied
215
- for the AccessLevel to be applied.
216
- Default value is `AND`.
217
- Possible values are: `AND`, `OR`.
218
- """
219
- elif False:
220
- AccessLevelBasicArgsDict: TypeAlias = Mapping[str, Any]
221
-
222
105
  @pulumi.input_type
223
106
  class AccessLevelBasicArgs:
224
107
  def __init__(__self__, *,
@@ -271,66 +154,6 @@ class AccessLevelBasicArgs:
271
154
  pulumi.set(self, "combining_function", value)
272
155
 
273
156
 
274
- if not MYPY:
275
- class AccessLevelBasicConditionArgsDict(TypedDict):
276
- device_policy: NotRequired[pulumi.Input['AccessLevelBasicConditionDevicePolicyArgsDict']]
277
- """
278
- Device specific restrictions, all restrictions must hold for
279
- the Condition to be true. If not specified, all devices are
280
- allowed.
281
- Structure is documented below.
282
- """
283
- ip_subnetworks: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
284
- """
285
- A list of CIDR block IP subnetwork specification. May be IPv4
286
- or IPv6.
287
- Note that for a CIDR IP address block, the specified IP address
288
- portion must be properly truncated (i.e. all the host bits must
289
- be zero) or the input is considered malformed. For example,
290
- "192.0.2.0/24" is accepted but "192.0.2.1/24" is not. Similarly,
291
- for IPv6, "2001:db8::/32" is accepted whereas "2001:db8::1/32"
292
- is not. The originating IP of a request must be in one of the
293
- listed subnets in order for this Condition to be true.
294
- If empty, all IP addresses are allowed.
295
- """
296
- members: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
297
- """
298
- An allowed list of members (users, service accounts).
299
- Using groups is not supported yet.
300
- The signed-in user originating the request must be a part of one
301
- of the provided members. If not specified, a request may come
302
- from any user (logged in/not logged in, not present in any
303
- groups, etc.).
304
- Formats: `user:{emailid}`, `serviceAccount:{emailid}`
305
- """
306
- negate: NotRequired[pulumi.Input[bool]]
307
- """
308
- Whether to negate the Condition. If true, the Condition becomes
309
- a NAND over its non-empty fields, each field must be false for
310
- the Condition overall to be satisfied. Defaults to false.
311
- """
312
- regions: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
313
- """
314
- The request must originate from one of the provided
315
- countries/regions.
316
- Format: A valid ISO 3166-1 alpha-2 code.
317
- """
318
- required_access_levels: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
319
- """
320
- A list of other access levels defined in the same Policy,
321
- referenced by resource name. Referencing an AccessLevel which
322
- does not exist is an error. All access levels listed must be
323
- granted for the Condition to be true.
324
- Format: accessPolicies/{policy_id}/accessLevels/{short_name}
325
- """
326
- vpc_network_sources: NotRequired[pulumi.Input[Sequence[pulumi.Input['AccessLevelBasicConditionVpcNetworkSourceArgsDict']]]]
327
- """
328
- The request must originate from one of the provided VPC networks in Google Cloud. Cannot specify this field together with `ip_subnetworks`.
329
- Structure is documented below.
330
- """
331
- elif False:
332
- AccessLevelBasicConditionArgsDict: TypeAlias = Mapping[str, Any]
333
-
334
157
  @pulumi.input_type
335
158
  class AccessLevelBasicConditionArgs:
336
159
  def __init__(__self__, *,
@@ -504,42 +327,6 @@ class AccessLevelBasicConditionArgs:
504
327
  pulumi.set(self, "vpc_network_sources", value)
505
328
 
506
329
 
507
- if not MYPY:
508
- class AccessLevelBasicConditionDevicePolicyArgsDict(TypedDict):
509
- allowed_device_management_levels: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
510
- """
511
- A list of allowed device management levels.
512
- An empty list allows all management levels.
513
- Each value may be one of: `MANAGEMENT_UNSPECIFIED`, `NONE`, `BASIC`, `COMPLETE`.
514
- """
515
- allowed_encryption_statuses: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
516
- """
517
- A list of allowed encryptions statuses.
518
- An empty list allows all statuses.
519
- Each value may be one of: `ENCRYPTION_UNSPECIFIED`, `ENCRYPTION_UNSUPPORTED`, `UNENCRYPTED`, `ENCRYPTED`.
520
- """
521
- os_constraints: NotRequired[pulumi.Input[Sequence[pulumi.Input['AccessLevelBasicConditionDevicePolicyOsConstraintArgsDict']]]]
522
- """
523
- A list of allowed OS versions.
524
- An empty list allows all types and all versions.
525
- Structure is documented below.
526
- """
527
- require_admin_approval: NotRequired[pulumi.Input[bool]]
528
- """
529
- Whether the device needs to be approved by the customer admin.
530
- """
531
- require_corp_owned: NotRequired[pulumi.Input[bool]]
532
- """
533
- Whether the device needs to be corp owned.
534
- """
535
- require_screen_lock: NotRequired[pulumi.Input[bool]]
536
- """
537
- Whether or not screenlock is required for the DevicePolicy
538
- to be true. Defaults to false.
539
- """
540
- elif False:
541
- AccessLevelBasicConditionDevicePolicyArgsDict: TypeAlias = Mapping[str, Any]
542
-
543
330
  @pulumi.input_type
544
331
  class AccessLevelBasicConditionDevicePolicyArgs:
545
332
  def __init__(__self__, *,
@@ -657,26 +444,6 @@ class AccessLevelBasicConditionDevicePolicyArgs:
657
444
  pulumi.set(self, "require_screen_lock", value)
658
445
 
659
446
 
660
- if not MYPY:
661
- class AccessLevelBasicConditionDevicePolicyOsConstraintArgsDict(TypedDict):
662
- os_type: pulumi.Input[str]
663
- """
664
- The operating system type of the device.
665
- Possible values are: `OS_UNSPECIFIED`, `DESKTOP_MAC`, `DESKTOP_WINDOWS`, `DESKTOP_LINUX`, `DESKTOP_CHROME_OS`, `ANDROID`, `IOS`.
666
- """
667
- minimum_version: NotRequired[pulumi.Input[str]]
668
- """
669
- The minimum allowed OS version. If not set, any version
670
- of this OS satisfies the constraint.
671
- Format: "major.minor.patch" such as "10.5.301", "9.2.1".
672
- """
673
- require_verified_chrome_os: NotRequired[pulumi.Input[bool]]
674
- """
675
- If you specify DESKTOP_CHROME_OS for osType, you can optionally include requireVerifiedChromeOs to require Chrome Verified Access.
676
- """
677
- elif False:
678
- AccessLevelBasicConditionDevicePolicyOsConstraintArgsDict: TypeAlias = Mapping[str, Any]
679
-
680
447
  @pulumi.input_type
681
448
  class AccessLevelBasicConditionDevicePolicyOsConstraintArgs:
682
449
  def __init__(__self__, *,
@@ -737,16 +504,6 @@ class AccessLevelBasicConditionDevicePolicyOsConstraintArgs:
737
504
  pulumi.set(self, "require_verified_chrome_os", value)
738
505
 
739
506
 
740
- if not MYPY:
741
- class AccessLevelBasicConditionVpcNetworkSourceArgsDict(TypedDict):
742
- vpc_subnetwork: NotRequired[pulumi.Input['AccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgsDict']]
743
- """
744
- Sub networks within a VPC network.
745
- Structure is documented below.
746
- """
747
- elif False:
748
- AccessLevelBasicConditionVpcNetworkSourceArgsDict: TypeAlias = Mapping[str, Any]
749
-
750
507
  @pulumi.input_type
751
508
  class AccessLevelBasicConditionVpcNetworkSourceArgs:
752
509
  def __init__(__self__, *,
@@ -772,19 +529,6 @@ class AccessLevelBasicConditionVpcNetworkSourceArgs:
772
529
  pulumi.set(self, "vpc_subnetwork", value)
773
530
 
774
531
 
775
- if not MYPY:
776
- class AccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgsDict(TypedDict):
777
- network: pulumi.Input[str]
778
- """
779
- Required. Network name to be allowed by this Access Level. Networks of foreign organizations requires `compute.network.get` permission to be granted to caller.
780
- """
781
- vpc_ip_subnetworks: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
782
- """
783
- CIDR block IP subnetwork specification. Must be IPv4.
784
- """
785
- elif False:
786
- AccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgsDict: TypeAlias = Mapping[str, Any]
787
-
788
532
  @pulumi.input_type
789
533
  class AccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgs:
790
534
  def __init__(__self__, *,
@@ -823,42 +567,6 @@ class AccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgs:
823
567
  pulumi.set(self, "vpc_ip_subnetworks", value)
824
568
 
825
569
 
826
- if not MYPY:
827
- class AccessLevelConditionDevicePolicyArgsDict(TypedDict):
828
- allowed_device_management_levels: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
829
- """
830
- A list of allowed device management levels.
831
- An empty list allows all management levels.
832
- Each value may be one of: `MANAGEMENT_UNSPECIFIED`, `NONE`, `BASIC`, `COMPLETE`.
833
- """
834
- allowed_encryption_statuses: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
835
- """
836
- A list of allowed encryptions statuses.
837
- An empty list allows all statuses.
838
- Each value may be one of: `ENCRYPTION_UNSPECIFIED`, `ENCRYPTION_UNSUPPORTED`, `UNENCRYPTED`, `ENCRYPTED`.
839
- """
840
- os_constraints: NotRequired[pulumi.Input[Sequence[pulumi.Input['AccessLevelConditionDevicePolicyOsConstraintArgsDict']]]]
841
- """
842
- A list of allowed OS versions.
843
- An empty list allows all types and all versions.
844
- Structure is documented below.
845
- """
846
- require_admin_approval: NotRequired[pulumi.Input[bool]]
847
- """
848
- Whether the device needs to be approved by the customer admin.
849
- """
850
- require_corp_owned: NotRequired[pulumi.Input[bool]]
851
- """
852
- Whether the device needs to be corp owned.
853
- """
854
- require_screen_lock: NotRequired[pulumi.Input[bool]]
855
- """
856
- Whether or not screenlock is required for the DevicePolicy
857
- to be true. Defaults to false.
858
- """
859
- elif False:
860
- AccessLevelConditionDevicePolicyArgsDict: TypeAlias = Mapping[str, Any]
861
-
862
570
  @pulumi.input_type
863
571
  class AccessLevelConditionDevicePolicyArgs:
864
572
  def __init__(__self__, *,
@@ -976,22 +684,6 @@ class AccessLevelConditionDevicePolicyArgs:
976
684
  pulumi.set(self, "require_screen_lock", value)
977
685
 
978
686
 
979
- if not MYPY:
980
- class AccessLevelConditionDevicePolicyOsConstraintArgsDict(TypedDict):
981
- os_type: pulumi.Input[str]
982
- """
983
- The operating system type of the device.
984
- Possible values are: `OS_UNSPECIFIED`, `DESKTOP_MAC`, `DESKTOP_WINDOWS`, `DESKTOP_LINUX`, `DESKTOP_CHROME_OS`, `ANDROID`, `IOS`.
985
- """
986
- minimum_version: NotRequired[pulumi.Input[str]]
987
- """
988
- The minimum allowed OS version. If not set, any version
989
- of this OS satisfies the constraint.
990
- Format: "major.minor.patch" such as "10.5.301", "9.2.1".
991
- """
992
- elif False:
993
- AccessLevelConditionDevicePolicyOsConstraintArgsDict: TypeAlias = Mapping[str, Any]
994
-
995
687
  @pulumi.input_type
996
688
  class AccessLevelConditionDevicePolicyOsConstraintArgs:
997
689
  def __init__(__self__, *,
@@ -1036,16 +728,6 @@ class AccessLevelConditionDevicePolicyOsConstraintArgs:
1036
728
  pulumi.set(self, "minimum_version", value)
1037
729
 
1038
730
 
1039
- if not MYPY:
1040
- class AccessLevelConditionVpcNetworkSourceArgsDict(TypedDict):
1041
- vpc_subnetwork: NotRequired[pulumi.Input['AccessLevelConditionVpcNetworkSourceVpcSubnetworkArgsDict']]
1042
- """
1043
- Sub networks within a VPC network.
1044
- Structure is documented below.
1045
- """
1046
- elif False:
1047
- AccessLevelConditionVpcNetworkSourceArgsDict: TypeAlias = Mapping[str, Any]
1048
-
1049
731
  @pulumi.input_type
1050
732
  class AccessLevelConditionVpcNetworkSourceArgs:
1051
733
  def __init__(__self__, *,
@@ -1071,19 +753,6 @@ class AccessLevelConditionVpcNetworkSourceArgs:
1071
753
  pulumi.set(self, "vpc_subnetwork", value)
1072
754
 
1073
755
 
1074
- if not MYPY:
1075
- class AccessLevelConditionVpcNetworkSourceVpcSubnetworkArgsDict(TypedDict):
1076
- network: pulumi.Input[str]
1077
- """
1078
- Required. Network name to be allowed by this Access Level. Networks of foreign organizations requires `compute.network.get` permission to be granted to caller.
1079
- """
1080
- vpc_ip_subnetworks: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
1081
- """
1082
- CIDR block IP subnetwork specification. Must be IPv4.
1083
- """
1084
- elif False:
1085
- AccessLevelConditionVpcNetworkSourceVpcSubnetworkArgsDict: TypeAlias = Mapping[str, Any]
1086
-
1087
756
  @pulumi.input_type
1088
757
  class AccessLevelConditionVpcNetworkSourceVpcSubnetworkArgs:
1089
758
  def __init__(__self__, *,
@@ -1122,18 +791,6 @@ class AccessLevelConditionVpcNetworkSourceVpcSubnetworkArgs:
1122
791
  pulumi.set(self, "vpc_ip_subnetworks", value)
1123
792
 
1124
793
 
1125
- if not MYPY:
1126
- class AccessLevelCustomArgsDict(TypedDict):
1127
- expr: pulumi.Input['AccessLevelCustomExprArgsDict']
1128
- """
1129
- Represents a textual expression in the Common Expression Language (CEL) syntax. CEL is a C-like expression language.
1130
- This page details the objects and attributes that are used to the build the CEL expressions for
1131
- custom access levels - https://cloud.google.com/access-context-manager/docs/custom-access-level-spec.
1132
- Structure is documented below.
1133
- """
1134
- elif False:
1135
- AccessLevelCustomArgsDict: TypeAlias = Mapping[str, Any]
1136
-
1137
794
  @pulumi.input_type
1138
795
  class AccessLevelCustomArgs:
1139
796
  def __init__(__self__, *,
@@ -1162,27 +819,6 @@ class AccessLevelCustomArgs:
1162
819
  pulumi.set(self, "expr", value)
1163
820
 
1164
821
 
1165
- if not MYPY:
1166
- class AccessLevelCustomExprArgsDict(TypedDict):
1167
- expression: pulumi.Input[str]
1168
- """
1169
- Textual representation of an expression in Common Expression Language syntax.
1170
- """
1171
- description: NotRequired[pulumi.Input[str]]
1172
- """
1173
- Description of the expression
1174
- """
1175
- location: NotRequired[pulumi.Input[str]]
1176
- """
1177
- String indicating the location of the expression for error reporting, e.g. a file name and a position in the file
1178
- """
1179
- title: NotRequired[pulumi.Input[str]]
1180
- """
1181
- Title for the expression, i.e. a short string describing its purpose.
1182
- """
1183
- elif False:
1184
- AccessLevelCustomExprArgsDict: TypeAlias = Mapping[str, Any]
1185
-
1186
822
  @pulumi.input_type
1187
823
  class AccessLevelCustomExprArgs:
1188
824
  def __init__(__self__, *,
@@ -1253,36 +889,6 @@ class AccessLevelCustomExprArgs:
1253
889
  pulumi.set(self, "title", value)
1254
890
 
1255
891
 
1256
- if not MYPY:
1257
- class AccessLevelsAccessLevelArgsDict(TypedDict):
1258
- name: pulumi.Input[str]
1259
- """
1260
- Resource name for the Access Level. The short_name component must begin
1261
- with a letter and only include alphanumeric and '_'.
1262
- Format: accessPolicies/{policy_id}/accessLevels/{short_name}
1263
- """
1264
- title: pulumi.Input[str]
1265
- """
1266
- Human readable title. Must be unique within the Policy.
1267
- """
1268
- basic: NotRequired[pulumi.Input['AccessLevelsAccessLevelBasicArgsDict']]
1269
- """
1270
- A set of predefined conditions for the access level and a combining function.
1271
- Structure is documented below.
1272
- """
1273
- custom: NotRequired[pulumi.Input['AccessLevelsAccessLevelCustomArgsDict']]
1274
- """
1275
- Custom access level conditions are set using the Cloud Common Expression Language to represent the necessary conditions for the level to apply to a request.
1276
- See CEL spec at: https://github.com/google/cel-spec.
1277
- Structure is documented below.
1278
- """
1279
- description: NotRequired[pulumi.Input[str]]
1280
- """
1281
- Description of the AccessLevel and its use. Does not affect behavior.
1282
- """
1283
- elif False:
1284
- AccessLevelsAccessLevelArgsDict: TypeAlias = Mapping[str, Any]
1285
-
1286
892
  @pulumi.input_type
1287
893
  class AccessLevelsAccessLevelArgs:
1288
894
  def __init__(__self__, *,
@@ -1378,26 +984,6 @@ class AccessLevelsAccessLevelArgs:
1378
984
  pulumi.set(self, "description", value)
1379
985
 
1380
986
 
1381
- if not MYPY:
1382
- class AccessLevelsAccessLevelBasicArgsDict(TypedDict):
1383
- conditions: pulumi.Input[Sequence[pulumi.Input['AccessLevelsAccessLevelBasicConditionArgsDict']]]
1384
- """
1385
- A set of requirements for the AccessLevel to be granted.
1386
- Structure is documented below.
1387
- """
1388
- combining_function: NotRequired[pulumi.Input[str]]
1389
- """
1390
- How the conditions list should be combined to determine if a request
1391
- is granted this AccessLevel. If AND is used, each Condition in
1392
- conditions must be satisfied for the AccessLevel to be applied. If
1393
- OR is used, at least one Condition in conditions must be satisfied
1394
- for the AccessLevel to be applied.
1395
- Default value is `AND`.
1396
- Possible values are: `AND`, `OR`.
1397
- """
1398
- elif False:
1399
- AccessLevelsAccessLevelBasicArgsDict: TypeAlias = Mapping[str, Any]
1400
-
1401
987
  @pulumi.input_type
1402
988
  class AccessLevelsAccessLevelBasicArgs:
1403
989
  def __init__(__self__, *,
@@ -1450,66 +1036,6 @@ class AccessLevelsAccessLevelBasicArgs:
1450
1036
  pulumi.set(self, "combining_function", value)
1451
1037
 
1452
1038
 
1453
- if not MYPY:
1454
- class AccessLevelsAccessLevelBasicConditionArgsDict(TypedDict):
1455
- device_policy: NotRequired[pulumi.Input['AccessLevelsAccessLevelBasicConditionDevicePolicyArgsDict']]
1456
- """
1457
- Device specific restrictions, all restrictions must hold for
1458
- the Condition to be true. If not specified, all devices are
1459
- allowed.
1460
- Structure is documented below.
1461
- """
1462
- ip_subnetworks: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
1463
- """
1464
- A list of CIDR block IP subnetwork specification. May be IPv4
1465
- or IPv6.
1466
- Note that for a CIDR IP address block, the specified IP address
1467
- portion must be properly truncated (i.e. all the host bits must
1468
- be zero) or the input is considered malformed. For example,
1469
- "192.0.2.0/24" is accepted but "192.0.2.1/24" is not. Similarly,
1470
- for IPv6, "2001:db8::/32" is accepted whereas "2001:db8::1/32"
1471
- is not. The originating IP of a request must be in one of the
1472
- listed subnets in order for this Condition to be true.
1473
- If empty, all IP addresses are allowed.
1474
- """
1475
- members: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
1476
- """
1477
- An allowed list of members (users, service accounts).
1478
- Using groups is not supported yet.
1479
- The signed-in user originating the request must be a part of one
1480
- of the provided members. If not specified, a request may come
1481
- from any user (logged in/not logged in, not present in any
1482
- groups, etc.).
1483
- Formats: `user:{emailid}`, `serviceAccount:{emailid}`
1484
- """
1485
- negate: NotRequired[pulumi.Input[bool]]
1486
- """
1487
- Whether to negate the Condition. If true, the Condition becomes
1488
- a NAND over its non-empty fields, each field must be false for
1489
- the Condition overall to be satisfied. Defaults to false.
1490
- """
1491
- regions: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
1492
- """
1493
- The request must originate from one of the provided
1494
- countries/regions.
1495
- Format: A valid ISO 3166-1 alpha-2 code.
1496
- """
1497
- required_access_levels: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
1498
- """
1499
- A list of other access levels defined in the same Policy,
1500
- referenced by resource name. Referencing an AccessLevel which
1501
- does not exist is an error. All access levels listed must be
1502
- granted for the Condition to be true.
1503
- Format: accessPolicies/{policy_id}/accessLevels/{short_name}
1504
- """
1505
- vpc_network_sources: NotRequired[pulumi.Input[Sequence[pulumi.Input['AccessLevelsAccessLevelBasicConditionVpcNetworkSourceArgsDict']]]]
1506
- """
1507
- The request must originate from one of the provided VPC networks in Google Cloud. Cannot specify this field together with `ip_subnetworks`.
1508
- Structure is documented below.
1509
- """
1510
- elif False:
1511
- AccessLevelsAccessLevelBasicConditionArgsDict: TypeAlias = Mapping[str, Any]
1512
-
1513
1039
  @pulumi.input_type
1514
1040
  class AccessLevelsAccessLevelBasicConditionArgs:
1515
1041
  def __init__(__self__, *,
@@ -1683,42 +1209,6 @@ class AccessLevelsAccessLevelBasicConditionArgs:
1683
1209
  pulumi.set(self, "vpc_network_sources", value)
1684
1210
 
1685
1211
 
1686
- if not MYPY:
1687
- class AccessLevelsAccessLevelBasicConditionDevicePolicyArgsDict(TypedDict):
1688
- allowed_device_management_levels: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
1689
- """
1690
- A list of allowed device management levels.
1691
- An empty list allows all management levels.
1692
- Each value may be one of: `MANAGEMENT_UNSPECIFIED`, `NONE`, `BASIC`, `COMPLETE`.
1693
- """
1694
- allowed_encryption_statuses: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
1695
- """
1696
- A list of allowed encryptions statuses.
1697
- An empty list allows all statuses.
1698
- Each value may be one of: `ENCRYPTION_UNSPECIFIED`, `ENCRYPTION_UNSUPPORTED`, `UNENCRYPTED`, `ENCRYPTED`.
1699
- """
1700
- os_constraints: NotRequired[pulumi.Input[Sequence[pulumi.Input['AccessLevelsAccessLevelBasicConditionDevicePolicyOsConstraintArgsDict']]]]
1701
- """
1702
- A list of allowed OS versions.
1703
- An empty list allows all types and all versions.
1704
- Structure is documented below.
1705
- """
1706
- require_admin_approval: NotRequired[pulumi.Input[bool]]
1707
- """
1708
- Whether the device needs to be approved by the customer admin.
1709
- """
1710
- require_corp_owned: NotRequired[pulumi.Input[bool]]
1711
- """
1712
- Whether the device needs to be corp owned.
1713
- """
1714
- require_screen_lock: NotRequired[pulumi.Input[bool]]
1715
- """
1716
- Whether or not screenlock is required for the DevicePolicy
1717
- to be true. Defaults to false.
1718
- """
1719
- elif False:
1720
- AccessLevelsAccessLevelBasicConditionDevicePolicyArgsDict: TypeAlias = Mapping[str, Any]
1721
-
1722
1212
  @pulumi.input_type
1723
1213
  class AccessLevelsAccessLevelBasicConditionDevicePolicyArgs:
1724
1214
  def __init__(__self__, *,
@@ -1836,22 +1326,6 @@ class AccessLevelsAccessLevelBasicConditionDevicePolicyArgs:
1836
1326
  pulumi.set(self, "require_screen_lock", value)
1837
1327
 
1838
1328
 
1839
- if not MYPY:
1840
- class AccessLevelsAccessLevelBasicConditionDevicePolicyOsConstraintArgsDict(TypedDict):
1841
- os_type: pulumi.Input[str]
1842
- """
1843
- The operating system type of the device.
1844
- Possible values are: `OS_UNSPECIFIED`, `DESKTOP_MAC`, `DESKTOP_WINDOWS`, `DESKTOP_LINUX`, `DESKTOP_CHROME_OS`, `ANDROID`, `IOS`.
1845
- """
1846
- minimum_version: NotRequired[pulumi.Input[str]]
1847
- """
1848
- The minimum allowed OS version. If not set, any version
1849
- of this OS satisfies the constraint.
1850
- Format: "major.minor.patch" such as "10.5.301", "9.2.1".
1851
- """
1852
- elif False:
1853
- AccessLevelsAccessLevelBasicConditionDevicePolicyOsConstraintArgsDict: TypeAlias = Mapping[str, Any]
1854
-
1855
1329
  @pulumi.input_type
1856
1330
  class AccessLevelsAccessLevelBasicConditionDevicePolicyOsConstraintArgs:
1857
1331
  def __init__(__self__, *,
@@ -1896,16 +1370,6 @@ class AccessLevelsAccessLevelBasicConditionDevicePolicyOsConstraintArgs:
1896
1370
  pulumi.set(self, "minimum_version", value)
1897
1371
 
1898
1372
 
1899
- if not MYPY:
1900
- class AccessLevelsAccessLevelBasicConditionVpcNetworkSourceArgsDict(TypedDict):
1901
- vpc_subnetwork: NotRequired[pulumi.Input['AccessLevelsAccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgsDict']]
1902
- """
1903
- Sub networks within a VPC network.
1904
- Structure is documented below.
1905
- """
1906
- elif False:
1907
- AccessLevelsAccessLevelBasicConditionVpcNetworkSourceArgsDict: TypeAlias = Mapping[str, Any]
1908
-
1909
1373
  @pulumi.input_type
1910
1374
  class AccessLevelsAccessLevelBasicConditionVpcNetworkSourceArgs:
1911
1375
  def __init__(__self__, *,
@@ -1931,19 +1395,6 @@ class AccessLevelsAccessLevelBasicConditionVpcNetworkSourceArgs:
1931
1395
  pulumi.set(self, "vpc_subnetwork", value)
1932
1396
 
1933
1397
 
1934
- if not MYPY:
1935
- class AccessLevelsAccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgsDict(TypedDict):
1936
- network: pulumi.Input[str]
1937
- """
1938
- Required. Network name to be allowed by this Access Level. Networks of foreign organizations requires `compute.network.get` permission to be granted to caller.
1939
- """
1940
- vpc_ip_subnetworks: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
1941
- """
1942
- CIDR block IP subnetwork specification. Must be IPv4.
1943
- """
1944
- elif False:
1945
- AccessLevelsAccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgsDict: TypeAlias = Mapping[str, Any]
1946
-
1947
1398
  @pulumi.input_type
1948
1399
  class AccessLevelsAccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgs:
1949
1400
  def __init__(__self__, *,
@@ -1982,18 +1433,6 @@ class AccessLevelsAccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgs:
1982
1433
  pulumi.set(self, "vpc_ip_subnetworks", value)
1983
1434
 
1984
1435
 
1985
- if not MYPY:
1986
- class AccessLevelsAccessLevelCustomArgsDict(TypedDict):
1987
- expr: pulumi.Input['AccessLevelsAccessLevelCustomExprArgsDict']
1988
- """
1989
- Represents a textual expression in the Common Expression Language (CEL) syntax. CEL is a C-like expression language.
1990
- This page details the objects and attributes that are used to the build the CEL expressions for
1991
- custom access levels - https://cloud.google.com/access-context-manager/docs/custom-access-level-spec.
1992
- Structure is documented below.
1993
- """
1994
- elif False:
1995
- AccessLevelsAccessLevelCustomArgsDict: TypeAlias = Mapping[str, Any]
1996
-
1997
1436
  @pulumi.input_type
1998
1437
  class AccessLevelsAccessLevelCustomArgs:
1999
1438
  def __init__(__self__, *,
@@ -2022,27 +1461,6 @@ class AccessLevelsAccessLevelCustomArgs:
2022
1461
  pulumi.set(self, "expr", value)
2023
1462
 
2024
1463
 
2025
- if not MYPY:
2026
- class AccessLevelsAccessLevelCustomExprArgsDict(TypedDict):
2027
- expression: pulumi.Input[str]
2028
- """
2029
- Textual representation of an expression in Common Expression Language syntax.
2030
- """
2031
- description: NotRequired[pulumi.Input[str]]
2032
- """
2033
- Description of the expression
2034
- """
2035
- location: NotRequired[pulumi.Input[str]]
2036
- """
2037
- String indicating the location of the expression for error reporting, e.g. a file name and a position in the file
2038
- """
2039
- title: NotRequired[pulumi.Input[str]]
2040
- """
2041
- Title for the expression, i.e. a short string describing its purpose.
2042
- """
2043
- elif False:
2044
- AccessLevelsAccessLevelCustomExprArgsDict: TypeAlias = Mapping[str, Any]
2045
-
2046
1464
  @pulumi.input_type
2047
1465
  class AccessLevelsAccessLevelCustomExprArgs:
2048
1466
  def __init__(__self__, *,
@@ -2113,14 +1531,6 @@ class AccessLevelsAccessLevelCustomExprArgs:
2113
1531
  pulumi.set(self, "title", value)
2114
1532
 
2115
1533
 
2116
- if not MYPY:
2117
- class AccessPolicyIamBindingConditionArgsDict(TypedDict):
2118
- expression: pulumi.Input[str]
2119
- title: pulumi.Input[str]
2120
- description: NotRequired[pulumi.Input[str]]
2121
- elif False:
2122
- AccessPolicyIamBindingConditionArgsDict: TypeAlias = Mapping[str, Any]
2123
-
2124
1534
  @pulumi.input_type
2125
1535
  class AccessPolicyIamBindingConditionArgs:
2126
1536
  def __init__(__self__, *,
@@ -2160,14 +1570,6 @@ class AccessPolicyIamBindingConditionArgs:
2160
1570
  pulumi.set(self, "description", value)
2161
1571
 
2162
1572
 
2163
- if not MYPY:
2164
- class AccessPolicyIamMemberConditionArgsDict(TypedDict):
2165
- expression: pulumi.Input[str]
2166
- title: pulumi.Input[str]
2167
- description: NotRequired[pulumi.Input[str]]
2168
- elif False:
2169
- AccessPolicyIamMemberConditionArgsDict: TypeAlias = Mapping[str, Any]
2170
-
2171
1573
  @pulumi.input_type
2172
1574
  class AccessPolicyIamMemberConditionArgs:
2173
1575
  def __init__(__self__, *,
@@ -2204,36 +1606,8 @@ class AccessPolicyIamMemberConditionArgs:
2204
1606
 
2205
1607
  @description.setter
2206
1608
  def description(self, value: Optional[pulumi.Input[str]]):
2207
- pulumi.set(self, "description", value)
2208
-
2209
-
2210
- if not MYPY:
2211
- class ServicePerimeterEgressPolicyEgressFromArgsDict(TypedDict):
2212
- identities: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
2213
- """
2214
- A list of identities that are allowed access through this `EgressPolicy`.
2215
- Should be in the format of email address. The email address should
2216
- represent individual user or service account only.
2217
- """
2218
- identity_type: NotRequired[pulumi.Input[str]]
2219
- """
2220
- Specifies the type of identities that are allowed access to outside the
2221
- perimeter. If left unspecified, then members of `identities` field will
2222
- be allowed access.
2223
- Possible values are: `ANY_IDENTITY`, `ANY_USER_ACCOUNT`, `ANY_SERVICE_ACCOUNT`.
2224
- """
2225
- source_restriction: NotRequired[pulumi.Input[str]]
2226
- """
2227
- Whether to enforce traffic restrictions based on `sources` field. If the `sources` field is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.
2228
- Possible values are: `SOURCE_RESTRICTION_UNSPECIFIED`, `SOURCE_RESTRICTION_ENABLED`, `SOURCE_RESTRICTION_DISABLED`.
2229
- """
2230
- sources: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterEgressPolicyEgressFromSourceArgsDict']]]]
2231
- """
2232
- Sources that this EgressPolicy authorizes access from.
2233
- Structure is documented below.
2234
- """
2235
- elif False:
2236
- ServicePerimeterEgressPolicyEgressFromArgsDict: TypeAlias = Mapping[str, Any]
1609
+ pulumi.set(self, "description", value)
1610
+
2237
1611
 
2238
1612
  @pulumi.input_type
2239
1613
  class ServicePerimeterEgressPolicyEgressFromArgs:
@@ -2320,15 +1694,6 @@ class ServicePerimeterEgressPolicyEgressFromArgs:
2320
1694
  pulumi.set(self, "sources", value)
2321
1695
 
2322
1696
 
2323
- if not MYPY:
2324
- class ServicePerimeterEgressPolicyEgressFromSourceArgsDict(TypedDict):
2325
- access_level: NotRequired[pulumi.Input[str]]
2326
- """
2327
- An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
2328
- """
2329
- elif False:
2330
- ServicePerimeterEgressPolicyEgressFromSourceArgsDict: TypeAlias = Mapping[str, Any]
2331
-
2332
1697
  @pulumi.input_type
2333
1698
  class ServicePerimeterEgressPolicyEgressFromSourceArgs:
2334
1699
  def __init__(__self__, *,
@@ -2352,31 +1717,6 @@ class ServicePerimeterEgressPolicyEgressFromSourceArgs:
2352
1717
  pulumi.set(self, "access_level", value)
2353
1718
 
2354
1719
 
2355
- if not MYPY:
2356
- class ServicePerimeterEgressPolicyEgressToArgsDict(TypedDict):
2357
- external_resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
2358
- """
2359
- A list of external resources that are allowed to be accessed. A request
2360
- matches if it contains an external resource in this list (Example:
2361
- s3://bucket/path). Currently '*' is not allowed.
2362
- """
2363
- operations: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterEgressPolicyEgressToOperationArgsDict']]]]
2364
- """
2365
- A list of `ApiOperations` that this egress rule applies to. A request matches
2366
- if it contains an operation/service in this list.
2367
- Structure is documented below.
2368
- """
2369
- resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
2370
- """
2371
- A list of resources, currently only projects in the form
2372
- `projects/<projectnumber>`, that match this to stanza. A request matches
2373
- if it contains a resource in this list. If * is specified for resources,
2374
- then this `EgressTo` rule will authorize access to all resources outside
2375
- the perimeter.
2376
- """
2377
- elif False:
2378
- ServicePerimeterEgressPolicyEgressToArgsDict: TypeAlias = Mapping[str, Any]
2379
-
2380
1720
  @pulumi.input_type
2381
1721
  class ServicePerimeterEgressPolicyEgressToArgs:
2382
1722
  def __init__(__self__, *,
@@ -2448,25 +1788,6 @@ class ServicePerimeterEgressPolicyEgressToArgs:
2448
1788
  pulumi.set(self, "resources", value)
2449
1789
 
2450
1790
 
2451
- if not MYPY:
2452
- class ServicePerimeterEgressPolicyEgressToOperationArgsDict(TypedDict):
2453
- method_selectors: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterEgressPolicyEgressToOperationMethodSelectorArgsDict']]]]
2454
- """
2455
- API methods or permissions to allow. Method or permission must belong
2456
- to the service specified by `serviceName` field. A single MethodSelector
2457
- entry with `*` specified for the `method` field will allow all methods
2458
- AND permissions for the service specified in `serviceName`.
2459
- Structure is documented below.
2460
- """
2461
- service_name: NotRequired[pulumi.Input[str]]
2462
- """
2463
- The name of the API whose methods or permissions the `IngressPolicy` or
2464
- `EgressPolicy` want to allow. A single `ApiOperation` with serviceName
2465
- field set to `*` will allow all methods AND permissions for all services.
2466
- """
2467
- elif False:
2468
- ServicePerimeterEgressPolicyEgressToOperationArgsDict: TypeAlias = Mapping[str, Any]
2469
-
2470
1791
  @pulumi.input_type
2471
1792
  class ServicePerimeterEgressPolicyEgressToOperationArgs:
2472
1793
  def __init__(__self__, *,
@@ -2518,22 +1839,6 @@ class ServicePerimeterEgressPolicyEgressToOperationArgs:
2518
1839
  pulumi.set(self, "service_name", value)
2519
1840
 
2520
1841
 
2521
- if not MYPY:
2522
- class ServicePerimeterEgressPolicyEgressToOperationMethodSelectorArgsDict(TypedDict):
2523
- method: NotRequired[pulumi.Input[str]]
2524
- """
2525
- Value for `method` should be a valid method name for the corresponding
2526
- `serviceName` in `ApiOperation`. If `*` used as value for method,
2527
- then ALL methods and permissions are allowed.
2528
- """
2529
- permission: NotRequired[pulumi.Input[str]]
2530
- """
2531
- Value for permission should be a valid Cloud IAM permission for the
2532
- corresponding `serviceName` in `ApiOperation`.
2533
- """
2534
- elif False:
2535
- ServicePerimeterEgressPolicyEgressToOperationMethodSelectorArgsDict: TypeAlias = Mapping[str, Any]
2536
-
2537
1842
  @pulumi.input_type
2538
1843
  class ServicePerimeterEgressPolicyEgressToOperationMethodSelectorArgs:
2539
1844
  def __init__(__self__, *,
@@ -2579,29 +1884,6 @@ class ServicePerimeterEgressPolicyEgressToOperationMethodSelectorArgs:
2579
1884
  pulumi.set(self, "permission", value)
2580
1885
 
2581
1886
 
2582
- if not MYPY:
2583
- class ServicePerimeterIngressPolicyIngressFromArgsDict(TypedDict):
2584
- identities: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
2585
- """
2586
- A list of identities that are allowed access through this ingress policy.
2587
- Should be in the format of email address. The email address should represent
2588
- individual user or service account only.
2589
- """
2590
- identity_type: NotRequired[pulumi.Input[str]]
2591
- """
2592
- Specifies the type of identities that are allowed access from outside the
2593
- perimeter. If left unspecified, then members of `identities` field will be
2594
- allowed access.
2595
- Possible values are: `ANY_IDENTITY`, `ANY_USER_ACCOUNT`, `ANY_SERVICE_ACCOUNT`.
2596
- """
2597
- sources: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterIngressPolicyIngressFromSourceArgsDict']]]]
2598
- """
2599
- Sources that this `IngressPolicy` authorizes access from.
2600
- Structure is documented below.
2601
- """
2602
- elif False:
2603
- ServicePerimeterIngressPolicyIngressFromArgsDict: TypeAlias = Mapping[str, Any]
2604
-
2605
1887
  @pulumi.input_type
2606
1888
  class ServicePerimeterIngressPolicyIngressFromArgs:
2607
1889
  def __init__(__self__, *,
@@ -2669,31 +1951,6 @@ class ServicePerimeterIngressPolicyIngressFromArgs:
2669
1951
  pulumi.set(self, "sources", value)
2670
1952
 
2671
1953
 
2672
- if not MYPY:
2673
- class ServicePerimeterIngressPolicyIngressFromSourceArgsDict(TypedDict):
2674
- access_level: NotRequired[pulumi.Input[str]]
2675
- """
2676
- An `AccessLevel` resource name that allow resources within the
2677
- `ServicePerimeters` to be accessed from the internet. `AccessLevels` listed
2678
- must be in the same policy as this `ServicePerimeter`. Referencing a nonexistent
2679
- `AccessLevel` will cause an error. If no `AccessLevel` names are listed,
2680
- resources within the perimeter can only be accessed via Google Cloud calls
2681
- with request origins within the perimeter.
2682
- Example `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL.`
2683
- If * is specified, then all IngressSources will be allowed.
2684
- """
2685
- resource: NotRequired[pulumi.Input[str]]
2686
- """
2687
- A Google Cloud resource that is allowed to ingress the perimeter.
2688
- Requests from these resources will be allowed to access perimeter data.
2689
- Currently only projects are allowed. Format `projects/{project_number}`
2690
- The project may be in any Google Cloud organization, not just the
2691
- organization that the perimeter is defined in. `*` is not allowed, the case
2692
- of allowing all Google Cloud resources only is not supported.
2693
- """
2694
- elif False:
2695
- ServicePerimeterIngressPolicyIngressFromSourceArgsDict: TypeAlias = Mapping[str, Any]
2696
-
2697
1954
  @pulumi.input_type
2698
1955
  class ServicePerimeterIngressPolicyIngressFromSourceArgs:
2699
1956
  def __init__(__self__, *,
@@ -2757,28 +2014,6 @@ class ServicePerimeterIngressPolicyIngressFromSourceArgs:
2757
2014
  pulumi.set(self, "resource", value)
2758
2015
 
2759
2016
 
2760
- if not MYPY:
2761
- class ServicePerimeterIngressPolicyIngressToArgsDict(TypedDict):
2762
- operations: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterIngressPolicyIngressToOperationArgsDict']]]]
2763
- """
2764
- A list of `ApiOperations` the sources specified in corresponding `IngressFrom`
2765
- are allowed to perform in this `ServicePerimeter`.
2766
- Structure is documented below.
2767
- """
2768
- resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
2769
- """
2770
- A list of resources, currently only projects in the form
2771
- `projects/<projectnumber>`, protected by this `ServicePerimeter`
2772
- that are allowed to be accessed by sources defined in the
2773
- corresponding `IngressFrom`. A request matches if it contains
2774
- a resource in this list. If `*` is specified for resources,
2775
- then this `IngressTo` rule will authorize access to all
2776
- resources inside the perimeter, provided that the request
2777
- also matches the `operations` field.
2778
- """
2779
- elif False:
2780
- ServicePerimeterIngressPolicyIngressToArgsDict: TypeAlias = Mapping[str, Any]
2781
-
2782
2017
  @pulumi.input_type
2783
2018
  class ServicePerimeterIngressPolicyIngressToArgs:
2784
2019
  def __init__(__self__, *,
@@ -2836,25 +2071,6 @@ class ServicePerimeterIngressPolicyIngressToArgs:
2836
2071
  pulumi.set(self, "resources", value)
2837
2072
 
2838
2073
 
2839
- if not MYPY:
2840
- class ServicePerimeterIngressPolicyIngressToOperationArgsDict(TypedDict):
2841
- method_selectors: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterIngressPolicyIngressToOperationMethodSelectorArgsDict']]]]
2842
- """
2843
- API methods or permissions to allow. Method or permission must belong to
2844
- the service specified by serviceName field. A single `MethodSelector` entry
2845
- with `*` specified for the method field will allow all methods AND
2846
- permissions for the service specified in `serviceName`.
2847
- Structure is documented below.
2848
- """
2849
- service_name: NotRequired[pulumi.Input[str]]
2850
- """
2851
- The name of the API whose methods or permissions the `IngressPolicy` or
2852
- `EgressPolicy` want to allow. A single `ApiOperation` with `serviceName`
2853
- field set to `*` will allow all methods AND permissions for all services.
2854
- """
2855
- elif False:
2856
- ServicePerimeterIngressPolicyIngressToOperationArgsDict: TypeAlias = Mapping[str, Any]
2857
-
2858
2074
  @pulumi.input_type
2859
2075
  class ServicePerimeterIngressPolicyIngressToOperationArgs:
2860
2076
  def __init__(__self__, *,
@@ -2906,22 +2122,6 @@ class ServicePerimeterIngressPolicyIngressToOperationArgs:
2906
2122
  pulumi.set(self, "service_name", value)
2907
2123
 
2908
2124
 
2909
- if not MYPY:
2910
- class ServicePerimeterIngressPolicyIngressToOperationMethodSelectorArgsDict(TypedDict):
2911
- method: NotRequired[pulumi.Input[str]]
2912
- """
2913
- Value for method should be a valid method name for the corresponding
2914
- serviceName in `ApiOperation`. If `*` used as value for `method`, then
2915
- ALL methods and permissions are allowed.
2916
- """
2917
- permission: NotRequired[pulumi.Input[str]]
2918
- """
2919
- Value for permission should be a valid Cloud IAM permission for the
2920
- corresponding `serviceName` in `ApiOperation`.
2921
- """
2922
- elif False:
2923
- ServicePerimeterIngressPolicyIngressToOperationMethodSelectorArgsDict: TypeAlias = Mapping[str, Any]
2924
-
2925
2125
  @pulumi.input_type
2926
2126
  class ServicePerimeterIngressPolicyIngressToOperationMethodSelectorArgs:
2927
2127
  def __init__(__self__, *,
@@ -2967,59 +2167,6 @@ class ServicePerimeterIngressPolicyIngressToOperationMethodSelectorArgs:
2967
2167
  pulumi.set(self, "permission", value)
2968
2168
 
2969
2169
 
2970
- if not MYPY:
2971
- class ServicePerimeterSpecArgsDict(TypedDict):
2972
- access_levels: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
2973
- """
2974
- A list of AccessLevel resource names that allow resources within
2975
- the ServicePerimeter to be accessed from the internet.
2976
- AccessLevels listed must be in the same policy as this
2977
- ServicePerimeter. Referencing a nonexistent AccessLevel is a
2978
- syntax error. If no AccessLevel names are listed, resources within
2979
- the perimeter can only be accessed via GCP calls with request
2980
- origins within the perimeter. For Service Perimeter Bridge, must
2981
- be empty.
2982
- Format: accessPolicies/{policy_id}/accessLevels/{access_level_name}
2983
- """
2984
- egress_policies: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterSpecEgressPolicyArgsDict']]]]
2985
- """
2986
- List of EgressPolicies to apply to the perimeter. A perimeter may
2987
- have multiple EgressPolicies, each of which is evaluated separately.
2988
- Access is granted if any EgressPolicy grants it. Must be empty for
2989
- a perimeter bridge.
2990
- Structure is documented below.
2991
- """
2992
- ingress_policies: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterSpecIngressPolicyArgsDict']]]]
2993
- """
2994
- List of `IngressPolicies` to apply to the perimeter. A perimeter may
2995
- have multiple `IngressPolicies`, each of which is evaluated
2996
- separately. Access is granted if any `Ingress Policy` grants it.
2997
- Must be empty for a perimeter bridge.
2998
- Structure is documented below.
2999
- """
3000
- resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
3001
- """
3002
- A list of GCP resources that are inside of the service perimeter.
3003
- Currently only projects are allowed.
3004
- Format: projects/{project_number}
3005
- """
3006
- restricted_services: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
3007
- """
3008
- GCP services that are subject to the Service Perimeter
3009
- restrictions. Must contain a list of services. For example, if
3010
- `storage.googleapis.com` is specified, access to the storage
3011
- buckets inside the perimeter must meet the perimeter's access
3012
- restrictions.
3013
- """
3014
- vpc_accessible_services: NotRequired[pulumi.Input['ServicePerimeterSpecVpcAccessibleServicesArgsDict']]
3015
- """
3016
- Specifies how APIs are allowed to communicate within the Service
3017
- Perimeter.
3018
- Structure is documented below.
3019
- """
3020
- elif False:
3021
- ServicePerimeterSpecArgsDict: TypeAlias = Mapping[str, Any]
3022
-
3023
2170
  @pulumi.input_type
3024
2171
  class ServicePerimeterSpecArgs:
3025
2172
  def __init__(__self__, *,
@@ -3171,22 +2318,6 @@ class ServicePerimeterSpecArgs:
3171
2318
  pulumi.set(self, "vpc_accessible_services", value)
3172
2319
 
3173
2320
 
3174
- if not MYPY:
3175
- class ServicePerimeterSpecEgressPolicyArgsDict(TypedDict):
3176
- egress_from: NotRequired[pulumi.Input['ServicePerimeterSpecEgressPolicyEgressFromArgsDict']]
3177
- """
3178
- Defines conditions on the source of a request causing this `EgressPolicy` to apply.
3179
- Structure is documented below.
3180
- """
3181
- egress_to: NotRequired[pulumi.Input['ServicePerimeterSpecEgressPolicyEgressToArgsDict']]
3182
- """
3183
- Defines the conditions on the `ApiOperation` and destination resources that
3184
- cause this `EgressPolicy` to apply.
3185
- Structure is documented below.
3186
- """
3187
- elif False:
3188
- ServicePerimeterSpecEgressPolicyArgsDict: TypeAlias = Mapping[str, Any]
3189
-
3190
2321
  @pulumi.input_type
3191
2322
  class ServicePerimeterSpecEgressPolicyArgs:
3192
2323
  def __init__(__self__, *,
@@ -3232,34 +2363,6 @@ class ServicePerimeterSpecEgressPolicyArgs:
3232
2363
  pulumi.set(self, "egress_to", value)
3233
2364
 
3234
2365
 
3235
- if not MYPY:
3236
- class ServicePerimeterSpecEgressPolicyEgressFromArgsDict(TypedDict):
3237
- identities: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
3238
- """
3239
- A list of identities that are allowed access through this `EgressPolicy`.
3240
- Should be in the format of email address. The email address should
3241
- represent individual user or service account only.
3242
- """
3243
- identity_type: NotRequired[pulumi.Input[str]]
3244
- """
3245
- Specifies the type of identities that are allowed access to outside the
3246
- perimeter. If left unspecified, then members of `identities` field will
3247
- be allowed access.
3248
- Possible values are: `IDENTITY_TYPE_UNSPECIFIED`, `ANY_IDENTITY`, `ANY_USER_ACCOUNT`, `ANY_SERVICE_ACCOUNT`.
3249
- """
3250
- source_restriction: NotRequired[pulumi.Input[str]]
3251
- """
3252
- Whether to enforce traffic restrictions based on `sources` field. If the `sources` field is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.
3253
- Possible values are: `SOURCE_RESTRICTION_UNSPECIFIED`, `SOURCE_RESTRICTION_ENABLED`, `SOURCE_RESTRICTION_DISABLED`.
3254
- """
3255
- sources: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterSpecEgressPolicyEgressFromSourceArgsDict']]]]
3256
- """
3257
- Sources that this EgressPolicy authorizes access from.
3258
- Structure is documented below.
3259
- """
3260
- elif False:
3261
- ServicePerimeterSpecEgressPolicyEgressFromArgsDict: TypeAlias = Mapping[str, Any]
3262
-
3263
2366
  @pulumi.input_type
3264
2367
  class ServicePerimeterSpecEgressPolicyEgressFromArgs:
3265
2368
  def __init__(__self__, *,
@@ -3345,15 +2448,6 @@ class ServicePerimeterSpecEgressPolicyEgressFromArgs:
3345
2448
  pulumi.set(self, "sources", value)
3346
2449
 
3347
2450
 
3348
- if not MYPY:
3349
- class ServicePerimeterSpecEgressPolicyEgressFromSourceArgsDict(TypedDict):
3350
- access_level: NotRequired[pulumi.Input[str]]
3351
- """
3352
- An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
3353
- """
3354
- elif False:
3355
- ServicePerimeterSpecEgressPolicyEgressFromSourceArgsDict: TypeAlias = Mapping[str, Any]
3356
-
3357
2451
  @pulumi.input_type
3358
2452
  class ServicePerimeterSpecEgressPolicyEgressFromSourceArgs:
3359
2453
  def __init__(__self__, *,
@@ -3377,31 +2471,6 @@ class ServicePerimeterSpecEgressPolicyEgressFromSourceArgs:
3377
2471
  pulumi.set(self, "access_level", value)
3378
2472
 
3379
2473
 
3380
- if not MYPY:
3381
- class ServicePerimeterSpecEgressPolicyEgressToArgsDict(TypedDict):
3382
- external_resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
3383
- """
3384
- A list of external resources that are allowed to be accessed. A request
3385
- matches if it contains an external resource in this list (Example:
3386
- s3://bucket/path). Currently '*' is not allowed.
3387
- """
3388
- operations: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterSpecEgressPolicyEgressToOperationArgsDict']]]]
3389
- """
3390
- A list of `ApiOperations` that this egress rule applies to. A request matches
3391
- if it contains an operation/service in this list.
3392
- Structure is documented below.
3393
- """
3394
- resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
3395
- """
3396
- A list of resources, currently only projects in the form
3397
- `projects/<projectnumber>`, that match this to stanza. A request matches
3398
- if it contains a resource in this list. If * is specified for resources,
3399
- then this `EgressTo` rule will authorize access to all resources outside
3400
- the perimeter.
3401
- """
3402
- elif False:
3403
- ServicePerimeterSpecEgressPolicyEgressToArgsDict: TypeAlias = Mapping[str, Any]
3404
-
3405
2474
  @pulumi.input_type
3406
2475
  class ServicePerimeterSpecEgressPolicyEgressToArgs:
3407
2476
  def __init__(__self__, *,
@@ -3473,25 +2542,6 @@ class ServicePerimeterSpecEgressPolicyEgressToArgs:
3473
2542
  pulumi.set(self, "resources", value)
3474
2543
 
3475
2544
 
3476
- if not MYPY:
3477
- class ServicePerimeterSpecEgressPolicyEgressToOperationArgsDict(TypedDict):
3478
- method_selectors: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterSpecEgressPolicyEgressToOperationMethodSelectorArgsDict']]]]
3479
- """
3480
- API methods or permissions to allow. Method or permission must belong
3481
- to the service specified by `serviceName` field. A single MethodSelector
3482
- entry with `*` specified for the `method` field will allow all methods
3483
- AND permissions for the service specified in `serviceName`.
3484
- Structure is documented below.
3485
- """
3486
- service_name: NotRequired[pulumi.Input[str]]
3487
- """
3488
- The name of the API whose methods or permissions the `IngressPolicy` or
3489
- `EgressPolicy` want to allow. A single `ApiOperation` with serviceName
3490
- field set to `*` will allow all methods AND permissions for all services.
3491
- """
3492
- elif False:
3493
- ServicePerimeterSpecEgressPolicyEgressToOperationArgsDict: TypeAlias = Mapping[str, Any]
3494
-
3495
2545
  @pulumi.input_type
3496
2546
  class ServicePerimeterSpecEgressPolicyEgressToOperationArgs:
3497
2547
  def __init__(__self__, *,
@@ -3543,22 +2593,6 @@ class ServicePerimeterSpecEgressPolicyEgressToOperationArgs:
3543
2593
  pulumi.set(self, "service_name", value)
3544
2594
 
3545
2595
 
3546
- if not MYPY:
3547
- class ServicePerimeterSpecEgressPolicyEgressToOperationMethodSelectorArgsDict(TypedDict):
3548
- method: NotRequired[pulumi.Input[str]]
3549
- """
3550
- Value for `method` should be a valid method name for the corresponding
3551
- `serviceName` in `ApiOperation`. If `*` used as value for method,
3552
- then ALL methods and permissions are allowed.
3553
- """
3554
- permission: NotRequired[pulumi.Input[str]]
3555
- """
3556
- Value for permission should be a valid Cloud IAM permission for the
3557
- corresponding `serviceName` in `ApiOperation`.
3558
- """
3559
- elif False:
3560
- ServicePerimeterSpecEgressPolicyEgressToOperationMethodSelectorArgsDict: TypeAlias = Mapping[str, Any]
3561
-
3562
2596
  @pulumi.input_type
3563
2597
  class ServicePerimeterSpecEgressPolicyEgressToOperationMethodSelectorArgs:
3564
2598
  def __init__(__self__, *,
@@ -3597,29 +2631,12 @@ class ServicePerimeterSpecEgressPolicyEgressToOperationMethodSelectorArgs:
3597
2631
  Value for permission should be a valid Cloud IAM permission for the
3598
2632
  corresponding `serviceName` in `ApiOperation`.
3599
2633
  """
3600
- return pulumi.get(self, "permission")
3601
-
3602
- @permission.setter
3603
- def permission(self, value: Optional[pulumi.Input[str]]):
3604
- pulumi.set(self, "permission", value)
3605
-
3606
-
3607
- if not MYPY:
3608
- class ServicePerimeterSpecIngressPolicyArgsDict(TypedDict):
3609
- ingress_from: NotRequired[pulumi.Input['ServicePerimeterSpecIngressPolicyIngressFromArgsDict']]
3610
- """
3611
- Defines the conditions on the source of a request causing this `IngressPolicy`
3612
- to apply.
3613
- Structure is documented below.
3614
- """
3615
- ingress_to: NotRequired[pulumi.Input['ServicePerimeterSpecIngressPolicyIngressToArgsDict']]
3616
- """
3617
- Defines the conditions on the `ApiOperation` and request destination that cause
3618
- this `IngressPolicy` to apply.
3619
- Structure is documented below.
3620
- """
3621
- elif False:
3622
- ServicePerimeterSpecIngressPolicyArgsDict: TypeAlias = Mapping[str, Any]
2634
+ return pulumi.get(self, "permission")
2635
+
2636
+ @permission.setter
2637
+ def permission(self, value: Optional[pulumi.Input[str]]):
2638
+ pulumi.set(self, "permission", value)
2639
+
3623
2640
 
3624
2641
  @pulumi.input_type
3625
2642
  class ServicePerimeterSpecIngressPolicyArgs:
@@ -3668,29 +2685,6 @@ class ServicePerimeterSpecIngressPolicyArgs:
3668
2685
  pulumi.set(self, "ingress_to", value)
3669
2686
 
3670
2687
 
3671
- if not MYPY:
3672
- class ServicePerimeterSpecIngressPolicyIngressFromArgsDict(TypedDict):
3673
- identities: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
3674
- """
3675
- A list of identities that are allowed access through this ingress policy.
3676
- Should be in the format of email address. The email address should represent
3677
- individual user or service account only.
3678
- """
3679
- identity_type: NotRequired[pulumi.Input[str]]
3680
- """
3681
- Specifies the type of identities that are allowed access from outside the
3682
- perimeter. If left unspecified, then members of `identities` field will be
3683
- allowed access.
3684
- Possible values are: `IDENTITY_TYPE_UNSPECIFIED`, `ANY_IDENTITY`, `ANY_USER_ACCOUNT`, `ANY_SERVICE_ACCOUNT`.
3685
- """
3686
- sources: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterSpecIngressPolicyIngressFromSourceArgsDict']]]]
3687
- """
3688
- Sources that this `IngressPolicy` authorizes access from.
3689
- Structure is documented below.
3690
- """
3691
- elif False:
3692
- ServicePerimeterSpecIngressPolicyIngressFromArgsDict: TypeAlias = Mapping[str, Any]
3693
-
3694
2688
  @pulumi.input_type
3695
2689
  class ServicePerimeterSpecIngressPolicyIngressFromArgs:
3696
2690
  def __init__(__self__, *,
@@ -3758,24 +2752,6 @@ class ServicePerimeterSpecIngressPolicyIngressFromArgs:
3758
2752
  pulumi.set(self, "sources", value)
3759
2753
 
3760
2754
 
3761
- if not MYPY:
3762
- class ServicePerimeterSpecIngressPolicyIngressFromSourceArgsDict(TypedDict):
3763
- access_level: NotRequired[pulumi.Input[str]]
3764
- """
3765
- An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
3766
- """
3767
- resource: NotRequired[pulumi.Input[str]]
3768
- """
3769
- A Google Cloud resource that is allowed to ingress the perimeter.
3770
- Requests from these resources will be allowed to access perimeter data.
3771
- Currently only projects are allowed. Format `projects/{project_number}`
3772
- The project may be in any Google Cloud organization, not just the
3773
- organization that the perimeter is defined in. `*` is not allowed, the case
3774
- of allowing all Google Cloud resources only is not supported.
3775
- """
3776
- elif False:
3777
- ServicePerimeterSpecIngressPolicyIngressFromSourceArgsDict: TypeAlias = Mapping[str, Any]
3778
-
3779
2755
  @pulumi.input_type
3780
2756
  class ServicePerimeterSpecIngressPolicyIngressFromSourceArgs:
3781
2757
  def __init__(__self__, *,
@@ -3825,28 +2801,6 @@ class ServicePerimeterSpecIngressPolicyIngressFromSourceArgs:
3825
2801
  pulumi.set(self, "resource", value)
3826
2802
 
3827
2803
 
3828
- if not MYPY:
3829
- class ServicePerimeterSpecIngressPolicyIngressToArgsDict(TypedDict):
3830
- operations: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterSpecIngressPolicyIngressToOperationArgsDict']]]]
3831
- """
3832
- A list of `ApiOperations` the sources specified in corresponding `IngressFrom`
3833
- are allowed to perform in this `ServicePerimeter`.
3834
- Structure is documented below.
3835
- """
3836
- resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
3837
- """
3838
- A list of resources, currently only projects in the form
3839
- `projects/<projectnumber>`, protected by this `ServicePerimeter`
3840
- that are allowed to be accessed by sources defined in the
3841
- corresponding `IngressFrom`. A request matches if it contains
3842
- a resource in this list. If `*` is specified for resources,
3843
- then this `IngressTo` rule will authorize access to all
3844
- resources inside the perimeter, provided that the request
3845
- also matches the `operations` field.
3846
- """
3847
- elif False:
3848
- ServicePerimeterSpecIngressPolicyIngressToArgsDict: TypeAlias = Mapping[str, Any]
3849
-
3850
2804
  @pulumi.input_type
3851
2805
  class ServicePerimeterSpecIngressPolicyIngressToArgs:
3852
2806
  def __init__(__self__, *,
@@ -3904,25 +2858,6 @@ class ServicePerimeterSpecIngressPolicyIngressToArgs:
3904
2858
  pulumi.set(self, "resources", value)
3905
2859
 
3906
2860
 
3907
- if not MYPY:
3908
- class ServicePerimeterSpecIngressPolicyIngressToOperationArgsDict(TypedDict):
3909
- method_selectors: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterSpecIngressPolicyIngressToOperationMethodSelectorArgsDict']]]]
3910
- """
3911
- API methods or permissions to allow. Method or permission must belong
3912
- to the service specified by `serviceName` field. A single MethodSelector
3913
- entry with `*` specified for the `method` field will allow all methods
3914
- AND permissions for the service specified in `serviceName`.
3915
- Structure is documented below.
3916
- """
3917
- service_name: NotRequired[pulumi.Input[str]]
3918
- """
3919
- The name of the API whose methods or permissions the `IngressPolicy` or
3920
- `EgressPolicy` want to allow. A single `ApiOperation` with serviceName
3921
- field set to `*` will allow all methods AND permissions for all services.
3922
- """
3923
- elif False:
3924
- ServicePerimeterSpecIngressPolicyIngressToOperationArgsDict: TypeAlias = Mapping[str, Any]
3925
-
3926
2861
  @pulumi.input_type
3927
2862
  class ServicePerimeterSpecIngressPolicyIngressToOperationArgs:
3928
2863
  def __init__(__self__, *,
@@ -3974,22 +2909,6 @@ class ServicePerimeterSpecIngressPolicyIngressToOperationArgs:
3974
2909
  pulumi.set(self, "service_name", value)
3975
2910
 
3976
2911
 
3977
- if not MYPY:
3978
- class ServicePerimeterSpecIngressPolicyIngressToOperationMethodSelectorArgsDict(TypedDict):
3979
- method: NotRequired[pulumi.Input[str]]
3980
- """
3981
- Value for `method` should be a valid method name for the corresponding
3982
- `serviceName` in `ApiOperation`. If `*` used as value for method,
3983
- then ALL methods and permissions are allowed.
3984
- """
3985
- permission: NotRequired[pulumi.Input[str]]
3986
- """
3987
- Value for permission should be a valid Cloud IAM permission for the
3988
- corresponding `serviceName` in `ApiOperation`.
3989
- """
3990
- elif False:
3991
- ServicePerimeterSpecIngressPolicyIngressToOperationMethodSelectorArgsDict: TypeAlias = Mapping[str, Any]
3992
-
3993
2912
  @pulumi.input_type
3994
2913
  class ServicePerimeterSpecIngressPolicyIngressToOperationMethodSelectorArgs:
3995
2914
  def __init__(__self__, *,
@@ -4035,21 +2954,6 @@ class ServicePerimeterSpecIngressPolicyIngressToOperationMethodSelectorArgs:
4035
2954
  pulumi.set(self, "permission", value)
4036
2955
 
4037
2956
 
4038
- if not MYPY:
4039
- class ServicePerimeterSpecVpcAccessibleServicesArgsDict(TypedDict):
4040
- allowed_services: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
4041
- """
4042
- The list of APIs usable within the Service Perimeter.
4043
- Must be empty unless `enableRestriction` is True.
4044
- """
4045
- enable_restriction: NotRequired[pulumi.Input[bool]]
4046
- """
4047
- Whether to restrict API calls within the Service Perimeter to the
4048
- list of APIs specified in 'allowedServices'.
4049
- """
4050
- elif False:
4051
- ServicePerimeterSpecVpcAccessibleServicesArgsDict: TypeAlias = Mapping[str, Any]
4052
-
4053
2957
  @pulumi.input_type
4054
2958
  class ServicePerimeterSpecVpcAccessibleServicesArgs:
4055
2959
  def __init__(__self__, *,
@@ -4093,59 +2997,6 @@ class ServicePerimeterSpecVpcAccessibleServicesArgs:
4093
2997
  pulumi.set(self, "enable_restriction", value)
4094
2998
 
4095
2999
 
4096
- if not MYPY:
4097
- class ServicePerimeterStatusArgsDict(TypedDict):
4098
- access_levels: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
4099
- """
4100
- A list of AccessLevel resource names that allow resources within
4101
- the ServicePerimeter to be accessed from the internet.
4102
- AccessLevels listed must be in the same policy as this
4103
- ServicePerimeter. Referencing a nonexistent AccessLevel is a
4104
- syntax error. If no AccessLevel names are listed, resources within
4105
- the perimeter can only be accessed via GCP calls with request
4106
- origins within the perimeter. For Service Perimeter Bridge, must
4107
- be empty.
4108
- Format: accessPolicies/{policy_id}/accessLevels/{access_level_name}
4109
- """
4110
- egress_policies: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterStatusEgressPolicyArgsDict']]]]
4111
- """
4112
- List of EgressPolicies to apply to the perimeter. A perimeter may
4113
- have multiple EgressPolicies, each of which is evaluated separately.
4114
- Access is granted if any EgressPolicy grants it. Must be empty for
4115
- a perimeter bridge.
4116
- Structure is documented below.
4117
- """
4118
- ingress_policies: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterStatusIngressPolicyArgsDict']]]]
4119
- """
4120
- List of `IngressPolicies` to apply to the perimeter. A perimeter may
4121
- have multiple `IngressPolicies`, each of which is evaluated
4122
- separately. Access is granted if any `Ingress Policy` grants it.
4123
- Must be empty for a perimeter bridge.
4124
- Structure is documented below.
4125
- """
4126
- resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
4127
- """
4128
- A list of GCP resources that are inside of the service perimeter.
4129
- Currently only projects are allowed.
4130
- Format: projects/{project_number}
4131
- """
4132
- restricted_services: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
4133
- """
4134
- GCP services that are subject to the Service Perimeter
4135
- restrictions. Must contain a list of services. For example, if
4136
- `storage.googleapis.com` is specified, access to the storage
4137
- buckets inside the perimeter must meet the perimeter's access
4138
- restrictions.
4139
- """
4140
- vpc_accessible_services: NotRequired[pulumi.Input['ServicePerimeterStatusVpcAccessibleServicesArgsDict']]
4141
- """
4142
- Specifies how APIs are allowed to communicate within the Service
4143
- Perimeter.
4144
- Structure is documented below.
4145
- """
4146
- elif False:
4147
- ServicePerimeterStatusArgsDict: TypeAlias = Mapping[str, Any]
4148
-
4149
3000
  @pulumi.input_type
4150
3001
  class ServicePerimeterStatusArgs:
4151
3002
  def __init__(__self__, *,
@@ -4297,22 +3148,6 @@ class ServicePerimeterStatusArgs:
4297
3148
  pulumi.set(self, "vpc_accessible_services", value)
4298
3149
 
4299
3150
 
4300
- if not MYPY:
4301
- class ServicePerimeterStatusEgressPolicyArgsDict(TypedDict):
4302
- egress_from: NotRequired[pulumi.Input['ServicePerimeterStatusEgressPolicyEgressFromArgsDict']]
4303
- """
4304
- Defines conditions on the source of a request causing this `EgressPolicy` to apply.
4305
- Structure is documented below.
4306
- """
4307
- egress_to: NotRequired[pulumi.Input['ServicePerimeterStatusEgressPolicyEgressToArgsDict']]
4308
- """
4309
- Defines the conditions on the `ApiOperation` and destination resources that
4310
- cause this `EgressPolicy` to apply.
4311
- Structure is documented below.
4312
- """
4313
- elif False:
4314
- ServicePerimeterStatusEgressPolicyArgsDict: TypeAlias = Mapping[str, Any]
4315
-
4316
3151
  @pulumi.input_type
4317
3152
  class ServicePerimeterStatusEgressPolicyArgs:
4318
3153
  def __init__(__self__, *,
@@ -4358,34 +3193,6 @@ class ServicePerimeterStatusEgressPolicyArgs:
4358
3193
  pulumi.set(self, "egress_to", value)
4359
3194
 
4360
3195
 
4361
- if not MYPY:
4362
- class ServicePerimeterStatusEgressPolicyEgressFromArgsDict(TypedDict):
4363
- identities: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
4364
- """
4365
- A list of identities that are allowed access through this `EgressPolicy`.
4366
- Should be in the format of email address. The email address should
4367
- represent individual user or service account only.
4368
- """
4369
- identity_type: NotRequired[pulumi.Input[str]]
4370
- """
4371
- Specifies the type of identities that are allowed access to outside the
4372
- perimeter. If left unspecified, then members of `identities` field will
4373
- be allowed access.
4374
- Possible values are: `IDENTITY_TYPE_UNSPECIFIED`, `ANY_IDENTITY`, `ANY_USER_ACCOUNT`, `ANY_SERVICE_ACCOUNT`.
4375
- """
4376
- source_restriction: NotRequired[pulumi.Input[str]]
4377
- """
4378
- Whether to enforce traffic restrictions based on `sources` field. If the `sources` field is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.
4379
- Possible values are: `SOURCE_RESTRICTION_UNSPECIFIED`, `SOURCE_RESTRICTION_ENABLED`, `SOURCE_RESTRICTION_DISABLED`.
4380
- """
4381
- sources: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterStatusEgressPolicyEgressFromSourceArgsDict']]]]
4382
- """
4383
- Sources that this EgressPolicy authorizes access from.
4384
- Structure is documented below.
4385
- """
4386
- elif False:
4387
- ServicePerimeterStatusEgressPolicyEgressFromArgsDict: TypeAlias = Mapping[str, Any]
4388
-
4389
3196
  @pulumi.input_type
4390
3197
  class ServicePerimeterStatusEgressPolicyEgressFromArgs:
4391
3198
  def __init__(__self__, *,
@@ -4471,15 +3278,6 @@ class ServicePerimeterStatusEgressPolicyEgressFromArgs:
4471
3278
  pulumi.set(self, "sources", value)
4472
3279
 
4473
3280
 
4474
- if not MYPY:
4475
- class ServicePerimeterStatusEgressPolicyEgressFromSourceArgsDict(TypedDict):
4476
- access_level: NotRequired[pulumi.Input[str]]
4477
- """
4478
- An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
4479
- """
4480
- elif False:
4481
- ServicePerimeterStatusEgressPolicyEgressFromSourceArgsDict: TypeAlias = Mapping[str, Any]
4482
-
4483
3281
  @pulumi.input_type
4484
3282
  class ServicePerimeterStatusEgressPolicyEgressFromSourceArgs:
4485
3283
  def __init__(__self__, *,
@@ -4503,31 +3301,6 @@ class ServicePerimeterStatusEgressPolicyEgressFromSourceArgs:
4503
3301
  pulumi.set(self, "access_level", value)
4504
3302
 
4505
3303
 
4506
- if not MYPY:
4507
- class ServicePerimeterStatusEgressPolicyEgressToArgsDict(TypedDict):
4508
- external_resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
4509
- """
4510
- A list of external resources that are allowed to be accessed. A request
4511
- matches if it contains an external resource in this list (Example:
4512
- s3://bucket/path). Currently '*' is not allowed.
4513
- """
4514
- operations: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterStatusEgressPolicyEgressToOperationArgsDict']]]]
4515
- """
4516
- A list of `ApiOperations` that this egress rule applies to. A request matches
4517
- if it contains an operation/service in this list.
4518
- Structure is documented below.
4519
- """
4520
- resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
4521
- """
4522
- A list of resources, currently only projects in the form
4523
- `projects/<projectnumber>`, that match this to stanza. A request matches
4524
- if it contains a resource in this list. If * is specified for resources,
4525
- then this `EgressTo` rule will authorize access to all resources outside
4526
- the perimeter.
4527
- """
4528
- elif False:
4529
- ServicePerimeterStatusEgressPolicyEgressToArgsDict: TypeAlias = Mapping[str, Any]
4530
-
4531
3304
  @pulumi.input_type
4532
3305
  class ServicePerimeterStatusEgressPolicyEgressToArgs:
4533
3306
  def __init__(__self__, *,
@@ -4599,25 +3372,6 @@ class ServicePerimeterStatusEgressPolicyEgressToArgs:
4599
3372
  pulumi.set(self, "resources", value)
4600
3373
 
4601
3374
 
4602
- if not MYPY:
4603
- class ServicePerimeterStatusEgressPolicyEgressToOperationArgsDict(TypedDict):
4604
- method_selectors: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterStatusEgressPolicyEgressToOperationMethodSelectorArgsDict']]]]
4605
- """
4606
- API methods or permissions to allow. Method or permission must belong
4607
- to the service specified by `serviceName` field. A single MethodSelector
4608
- entry with `*` specified for the `method` field will allow all methods
4609
- AND permissions for the service specified in `serviceName`.
4610
- Structure is documented below.
4611
- """
4612
- service_name: NotRequired[pulumi.Input[str]]
4613
- """
4614
- The name of the API whose methods or permissions the `IngressPolicy` or
4615
- `EgressPolicy` want to allow. A single `ApiOperation` with serviceName
4616
- field set to `*` will allow all methods AND permissions for all services.
4617
- """
4618
- elif False:
4619
- ServicePerimeterStatusEgressPolicyEgressToOperationArgsDict: TypeAlias = Mapping[str, Any]
4620
-
4621
3375
  @pulumi.input_type
4622
3376
  class ServicePerimeterStatusEgressPolicyEgressToOperationArgs:
4623
3377
  def __init__(__self__, *,
@@ -4669,22 +3423,6 @@ class ServicePerimeterStatusEgressPolicyEgressToOperationArgs:
4669
3423
  pulumi.set(self, "service_name", value)
4670
3424
 
4671
3425
 
4672
- if not MYPY:
4673
- class ServicePerimeterStatusEgressPolicyEgressToOperationMethodSelectorArgsDict(TypedDict):
4674
- method: NotRequired[pulumi.Input[str]]
4675
- """
4676
- Value for `method` should be a valid method name for the corresponding
4677
- `serviceName` in `ApiOperation`. If `*` used as value for method,
4678
- then ALL methods and permissions are allowed.
4679
- """
4680
- permission: NotRequired[pulumi.Input[str]]
4681
- """
4682
- Value for permission should be a valid Cloud IAM permission for the
4683
- corresponding `serviceName` in `ApiOperation`.
4684
- """
4685
- elif False:
4686
- ServicePerimeterStatusEgressPolicyEgressToOperationMethodSelectorArgsDict: TypeAlias = Mapping[str, Any]
4687
-
4688
3426
  @pulumi.input_type
4689
3427
  class ServicePerimeterStatusEgressPolicyEgressToOperationMethodSelectorArgs:
4690
3428
  def __init__(__self__, *,
@@ -4730,23 +3468,6 @@ class ServicePerimeterStatusEgressPolicyEgressToOperationMethodSelectorArgs:
4730
3468
  pulumi.set(self, "permission", value)
4731
3469
 
4732
3470
 
4733
- if not MYPY:
4734
- class ServicePerimeterStatusIngressPolicyArgsDict(TypedDict):
4735
- ingress_from: NotRequired[pulumi.Input['ServicePerimeterStatusIngressPolicyIngressFromArgsDict']]
4736
- """
4737
- Defines the conditions on the source of a request causing this `IngressPolicy`
4738
- to apply.
4739
- Structure is documented below.
4740
- """
4741
- ingress_to: NotRequired[pulumi.Input['ServicePerimeterStatusIngressPolicyIngressToArgsDict']]
4742
- """
4743
- Defines the conditions on the `ApiOperation` and request destination that cause
4744
- this `IngressPolicy` to apply.
4745
- Structure is documented below.
4746
- """
4747
- elif False:
4748
- ServicePerimeterStatusIngressPolicyArgsDict: TypeAlias = Mapping[str, Any]
4749
-
4750
3471
  @pulumi.input_type
4751
3472
  class ServicePerimeterStatusIngressPolicyArgs:
4752
3473
  def __init__(__self__, *,
@@ -4794,29 +3515,6 @@ class ServicePerimeterStatusIngressPolicyArgs:
4794
3515
  pulumi.set(self, "ingress_to", value)
4795
3516
 
4796
3517
 
4797
- if not MYPY:
4798
- class ServicePerimeterStatusIngressPolicyIngressFromArgsDict(TypedDict):
4799
- identities: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
4800
- """
4801
- A list of identities that are allowed access through this ingress policy.
4802
- Should be in the format of email address. The email address should represent
4803
- individual user or service account only.
4804
- """
4805
- identity_type: NotRequired[pulumi.Input[str]]
4806
- """
4807
- Specifies the type of identities that are allowed access from outside the
4808
- perimeter. If left unspecified, then members of `identities` field will be
4809
- allowed access.
4810
- Possible values are: `IDENTITY_TYPE_UNSPECIFIED`, `ANY_IDENTITY`, `ANY_USER_ACCOUNT`, `ANY_SERVICE_ACCOUNT`.
4811
- """
4812
- sources: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterStatusIngressPolicyIngressFromSourceArgsDict']]]]
4813
- """
4814
- Sources that this `IngressPolicy` authorizes access from.
4815
- Structure is documented below.
4816
- """
4817
- elif False:
4818
- ServicePerimeterStatusIngressPolicyIngressFromArgsDict: TypeAlias = Mapping[str, Any]
4819
-
4820
3518
  @pulumi.input_type
4821
3519
  class ServicePerimeterStatusIngressPolicyIngressFromArgs:
4822
3520
  def __init__(__self__, *,
@@ -4884,24 +3582,6 @@ class ServicePerimeterStatusIngressPolicyIngressFromArgs:
4884
3582
  pulumi.set(self, "sources", value)
4885
3583
 
4886
3584
 
4887
- if not MYPY:
4888
- class ServicePerimeterStatusIngressPolicyIngressFromSourceArgsDict(TypedDict):
4889
- access_level: NotRequired[pulumi.Input[str]]
4890
- """
4891
- An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
4892
- """
4893
- resource: NotRequired[pulumi.Input[str]]
4894
- """
4895
- A Google Cloud resource that is allowed to ingress the perimeter.
4896
- Requests from these resources will be allowed to access perimeter data.
4897
- Currently only projects are allowed. Format `projects/{project_number}`
4898
- The project may be in any Google Cloud organization, not just the
4899
- organization that the perimeter is defined in. `*` is not allowed, the case
4900
- of allowing all Google Cloud resources only is not supported.
4901
- """
4902
- elif False:
4903
- ServicePerimeterStatusIngressPolicyIngressFromSourceArgsDict: TypeAlias = Mapping[str, Any]
4904
-
4905
3585
  @pulumi.input_type
4906
3586
  class ServicePerimeterStatusIngressPolicyIngressFromSourceArgs:
4907
3587
  def __init__(__self__, *,
@@ -4950,29 +3630,7 @@ class ServicePerimeterStatusIngressPolicyIngressFromSourceArgs:
4950
3630
  def resource(self, value: Optional[pulumi.Input[str]]):
4951
3631
  pulumi.set(self, "resource", value)
4952
3632
 
4953
-
4954
- if not MYPY:
4955
- class ServicePerimeterStatusIngressPolicyIngressToArgsDict(TypedDict):
4956
- operations: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterStatusIngressPolicyIngressToOperationArgsDict']]]]
4957
- """
4958
- A list of `ApiOperations` the sources specified in corresponding `IngressFrom`
4959
- are allowed to perform in this `ServicePerimeter`.
4960
- Structure is documented below.
4961
- """
4962
- resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
4963
- """
4964
- A list of resources, currently only projects in the form
4965
- `projects/<projectnumber>`, protected by this `ServicePerimeter`
4966
- that are allowed to be accessed by sources defined in the
4967
- corresponding `IngressFrom`. A request matches if it contains
4968
- a resource in this list. If `*` is specified for resources,
4969
- then this `IngressTo` rule will authorize access to all
4970
- resources inside the perimeter, provided that the request
4971
- also matches the `operations` field.
4972
- """
4973
- elif False:
4974
- ServicePerimeterStatusIngressPolicyIngressToArgsDict: TypeAlias = Mapping[str, Any]
4975
-
3633
+
4976
3634
  @pulumi.input_type
4977
3635
  class ServicePerimeterStatusIngressPolicyIngressToArgs:
4978
3636
  def __init__(__self__, *,
@@ -5030,25 +3688,6 @@ class ServicePerimeterStatusIngressPolicyIngressToArgs:
5030
3688
  pulumi.set(self, "resources", value)
5031
3689
 
5032
3690
 
5033
- if not MYPY:
5034
- class ServicePerimeterStatusIngressPolicyIngressToOperationArgsDict(TypedDict):
5035
- method_selectors: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimeterStatusIngressPolicyIngressToOperationMethodSelectorArgsDict']]]]
5036
- """
5037
- API methods or permissions to allow. Method or permission must belong
5038
- to the service specified by `serviceName` field. A single MethodSelector
5039
- entry with `*` specified for the `method` field will allow all methods
5040
- AND permissions for the service specified in `serviceName`.
5041
- Structure is documented below.
5042
- """
5043
- service_name: NotRequired[pulumi.Input[str]]
5044
- """
5045
- The name of the API whose methods or permissions the `IngressPolicy` or
5046
- `EgressPolicy` want to allow. A single `ApiOperation` with serviceName
5047
- field set to `*` will allow all methods AND permissions for all services.
5048
- """
5049
- elif False:
5050
- ServicePerimeterStatusIngressPolicyIngressToOperationArgsDict: TypeAlias = Mapping[str, Any]
5051
-
5052
3691
  @pulumi.input_type
5053
3692
  class ServicePerimeterStatusIngressPolicyIngressToOperationArgs:
5054
3693
  def __init__(__self__, *,
@@ -5100,22 +3739,6 @@ class ServicePerimeterStatusIngressPolicyIngressToOperationArgs:
5100
3739
  pulumi.set(self, "service_name", value)
5101
3740
 
5102
3741
 
5103
- if not MYPY:
5104
- class ServicePerimeterStatusIngressPolicyIngressToOperationMethodSelectorArgsDict(TypedDict):
5105
- method: NotRequired[pulumi.Input[str]]
5106
- """
5107
- Value for `method` should be a valid method name for the corresponding
5108
- `serviceName` in `ApiOperation`. If `*` used as value for method,
5109
- then ALL methods and permissions are allowed.
5110
- """
5111
- permission: NotRequired[pulumi.Input[str]]
5112
- """
5113
- Value for permission should be a valid Cloud IAM permission for the
5114
- corresponding `serviceName` in `ApiOperation`.
5115
- """
5116
- elif False:
5117
- ServicePerimeterStatusIngressPolicyIngressToOperationMethodSelectorArgsDict: TypeAlias = Mapping[str, Any]
5118
-
5119
3742
  @pulumi.input_type
5120
3743
  class ServicePerimeterStatusIngressPolicyIngressToOperationMethodSelectorArgs:
5121
3744
  def __init__(__self__, *,
@@ -5161,21 +3784,6 @@ class ServicePerimeterStatusIngressPolicyIngressToOperationMethodSelectorArgs:
5161
3784
  pulumi.set(self, "permission", value)
5162
3785
 
5163
3786
 
5164
- if not MYPY:
5165
- class ServicePerimeterStatusVpcAccessibleServicesArgsDict(TypedDict):
5166
- allowed_services: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
5167
- """
5168
- The list of APIs usable within the Service Perimeter.
5169
- Must be empty unless `enableRestriction` is True.
5170
- """
5171
- enable_restriction: NotRequired[pulumi.Input[bool]]
5172
- """
5173
- Whether to restrict API calls within the Service Perimeter to the
5174
- list of APIs specified in 'allowedServices'.
5175
- """
5176
- elif False:
5177
- ServicePerimeterStatusVpcAccessibleServicesArgsDict: TypeAlias = Mapping[str, Any]
5178
-
5179
3787
  @pulumi.input_type
5180
3788
  class ServicePerimeterStatusVpcAccessibleServicesArgs:
5181
3789
  def __init__(__self__, *,
@@ -5219,82 +3827,6 @@ class ServicePerimeterStatusVpcAccessibleServicesArgs:
5219
3827
  pulumi.set(self, "enable_restriction", value)
5220
3828
 
5221
3829
 
5222
- if not MYPY:
5223
- class ServicePerimetersServicePerimeterArgsDict(TypedDict):
5224
- name: pulumi.Input[str]
5225
- """
5226
- Resource name for the ServicePerimeter. The short_name component must
5227
- begin with a letter and only include alphanumeric and '_'.
5228
- Format: accessPolicies/{policy_id}/servicePerimeters/{short_name}
5229
- """
5230
- title: pulumi.Input[str]
5231
- """
5232
- Human readable title. Must be unique within the Policy.
5233
- """
5234
- create_time: NotRequired[pulumi.Input[str]]
5235
- """
5236
- (Output)
5237
- Time the AccessPolicy was created in UTC.
5238
- """
5239
- description: NotRequired[pulumi.Input[str]]
5240
- """
5241
- Description of the ServicePerimeter and its use. Does not affect
5242
- behavior.
5243
- """
5244
- perimeter_type: NotRequired[pulumi.Input[str]]
5245
- """
5246
- Specifies the type of the Perimeter. There are two types: regular and
5247
- bridge. Regular Service Perimeter contains resources, access levels,
5248
- and restricted services. Every resource can be in at most
5249
- ONE regular Service Perimeter.
5250
- In addition to being in a regular service perimeter, a resource can also
5251
- be in zero or more perimeter bridges. A perimeter bridge only contains
5252
- resources. Cross project operations are permitted if all effected
5253
- resources share some perimeter (whether bridge or regular). Perimeter
5254
- Bridge does not contain access levels or services: those are governed
5255
- entirely by the regular perimeter that resource is in.
5256
- Perimeter Bridges are typically useful when building more complex
5257
- topologies with many independent perimeters that need to share some data
5258
- with a common perimeter, but should not be able to share data among
5259
- themselves.
5260
- Default value is `PERIMETER_TYPE_REGULAR`.
5261
- Possible values are: `PERIMETER_TYPE_REGULAR`, `PERIMETER_TYPE_BRIDGE`.
5262
- """
5263
- spec: NotRequired[pulumi.Input['ServicePerimetersServicePerimeterSpecArgsDict']]
5264
- """
5265
- Proposed (or dry run) ServicePerimeter configuration.
5266
- This configuration allows to specify and test ServicePerimeter configuration
5267
- without enforcing actual access restrictions. Only allowed to be set when
5268
- the `useExplicitDryRunSpec` flag is set.
5269
- Structure is documented below.
5270
- """
5271
- status: NotRequired[pulumi.Input['ServicePerimetersServicePerimeterStatusArgsDict']]
5272
- """
5273
- ServicePerimeter configuration. Specifies sets of resources,
5274
- restricted services and access levels that determine
5275
- perimeter content and boundaries.
5276
- Structure is documented below.
5277
- """
5278
- update_time: NotRequired[pulumi.Input[str]]
5279
- """
5280
- (Output)
5281
- Time the AccessPolicy was updated in UTC.
5282
- """
5283
- use_explicit_dry_run_spec: NotRequired[pulumi.Input[bool]]
5284
- """
5285
- Use explicit dry run spec flag. Ordinarily, a dry-run spec implicitly exists
5286
- for all Service Perimeters, and that spec is identical to the status for those
5287
- Service Perimeters. When this flag is set, it inhibits the generation of the
5288
- implicit spec, thereby allowing the user to explicitly provide a
5289
- configuration ("spec") to use in a dry-run version of the Service Perimeter.
5290
- This allows the user to test changes to the enforced config ("status") without
5291
- actually enforcing them. This testing is done through analyzing the differences
5292
- between currently enforced and suggested restrictions. useExplicitDryRunSpec must
5293
- bet set to True if any of the fields in the spec are set to non-default values.
5294
- """
5295
- elif False:
5296
- ServicePerimetersServicePerimeterArgsDict: TypeAlias = Mapping[str, Any]
5297
-
5298
3830
  @pulumi.input_type
5299
3831
  class ServicePerimetersServicePerimeterArgs:
5300
3832
  def __init__(__self__, *,
@@ -5514,59 +4046,6 @@ class ServicePerimetersServicePerimeterArgs:
5514
4046
  pulumi.set(self, "use_explicit_dry_run_spec", value)
5515
4047
 
5516
4048
 
5517
- if not MYPY:
5518
- class ServicePerimetersServicePerimeterSpecArgsDict(TypedDict):
5519
- access_levels: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
5520
- """
5521
- A list of AccessLevel resource names that allow resources within
5522
- the ServicePerimeter to be accessed from the internet.
5523
- AccessLevels listed must be in the same policy as this
5524
- ServicePerimeter. Referencing a nonexistent AccessLevel is a
5525
- syntax error. If no AccessLevel names are listed, resources within
5526
- the perimeter can only be accessed via GCP calls with request
5527
- origins within the perimeter. For Service Perimeter Bridge, must
5528
- be empty.
5529
- Format: accessPolicies/{policy_id}/accessLevels/{access_level_name}
5530
- """
5531
- egress_policies: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterSpecEgressPolicyArgsDict']]]]
5532
- """
5533
- List of EgressPolicies to apply to the perimeter. A perimeter may
5534
- have multiple EgressPolicies, each of which is evaluated separately.
5535
- Access is granted if any EgressPolicy grants it. Must be empty for
5536
- a perimeter bridge.
5537
- Structure is documented below.
5538
- """
5539
- ingress_policies: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterSpecIngressPolicyArgsDict']]]]
5540
- """
5541
- List of `IngressPolicies` to apply to the perimeter. A perimeter may
5542
- have multiple `IngressPolicies`, each of which is evaluated
5543
- separately. Access is granted if any `Ingress Policy` grants it.
5544
- Must be empty for a perimeter bridge.
5545
- Structure is documented below.
5546
- """
5547
- resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
5548
- """
5549
- A list of GCP resources that are inside of the service perimeter.
5550
- Currently only projects are allowed.
5551
- Format: projects/{project_number}
5552
- """
5553
- restricted_services: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
5554
- """
5555
- GCP services that are subject to the Service Perimeter
5556
- restrictions. Must contain a list of services. For example, if
5557
- `storage.googleapis.com` is specified, access to the storage
5558
- buckets inside the perimeter must meet the perimeter's access
5559
- restrictions.
5560
- """
5561
- vpc_accessible_services: NotRequired[pulumi.Input['ServicePerimetersServicePerimeterSpecVpcAccessibleServicesArgsDict']]
5562
- """
5563
- Specifies how APIs are allowed to communicate within the Service
5564
- Perimeter.
5565
- Structure is documented below.
5566
- """
5567
- elif False:
5568
- ServicePerimetersServicePerimeterSpecArgsDict: TypeAlias = Mapping[str, Any]
5569
-
5570
4049
  @pulumi.input_type
5571
4050
  class ServicePerimetersServicePerimeterSpecArgs:
5572
4051
  def __init__(__self__, *,
@@ -5718,22 +4197,6 @@ class ServicePerimetersServicePerimeterSpecArgs:
5718
4197
  pulumi.set(self, "vpc_accessible_services", value)
5719
4198
 
5720
4199
 
5721
- if not MYPY:
5722
- class ServicePerimetersServicePerimeterSpecEgressPolicyArgsDict(TypedDict):
5723
- egress_from: NotRequired[pulumi.Input['ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromArgsDict']]
5724
- """
5725
- Defines conditions on the source of a request causing this `EgressPolicy` to apply.
5726
- Structure is documented below.
5727
- """
5728
- egress_to: NotRequired[pulumi.Input['ServicePerimetersServicePerimeterSpecEgressPolicyEgressToArgsDict']]
5729
- """
5730
- Defines the conditions on the `ApiOperation` and destination resources that
5731
- cause this `EgressPolicy` to apply.
5732
- Structure is documented below.
5733
- """
5734
- elif False:
5735
- ServicePerimetersServicePerimeterSpecEgressPolicyArgsDict: TypeAlias = Mapping[str, Any]
5736
-
5737
4200
  @pulumi.input_type
5738
4201
  class ServicePerimetersServicePerimeterSpecEgressPolicyArgs:
5739
4202
  def __init__(__self__, *,
@@ -5779,34 +4242,6 @@ class ServicePerimetersServicePerimeterSpecEgressPolicyArgs:
5779
4242
  pulumi.set(self, "egress_to", value)
5780
4243
 
5781
4244
 
5782
- if not MYPY:
5783
- class ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromArgsDict(TypedDict):
5784
- identities: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
5785
- """
5786
- A list of identities that are allowed access through this `EgressPolicy`.
5787
- Should be in the format of email address. The email address should
5788
- represent individual user or service account only.
5789
- """
5790
- identity_type: NotRequired[pulumi.Input[str]]
5791
- """
5792
- Specifies the type of identities that are allowed access to outside the
5793
- perimeter. If left unspecified, then members of `identities` field will
5794
- be allowed access.
5795
- Possible values are: `IDENTITY_TYPE_UNSPECIFIED`, `ANY_IDENTITY`, `ANY_USER_ACCOUNT`, `ANY_SERVICE_ACCOUNT`.
5796
- """
5797
- source_restriction: NotRequired[pulumi.Input[str]]
5798
- """
5799
- Whether to enforce traffic restrictions based on `sources` field. If the `sources` field is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.
5800
- Possible values are: `SOURCE_RESTRICTION_UNSPECIFIED`, `SOURCE_RESTRICTION_ENABLED`, `SOURCE_RESTRICTION_DISABLED`.
5801
- """
5802
- sources: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromSourceArgsDict']]]]
5803
- """
5804
- Sources that this EgressPolicy authorizes access from.
5805
- Structure is documented below.
5806
- """
5807
- elif False:
5808
- ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromArgsDict: TypeAlias = Mapping[str, Any]
5809
-
5810
4245
  @pulumi.input_type
5811
4246
  class ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromArgs:
5812
4247
  def __init__(__self__, *,
@@ -5892,15 +4327,6 @@ class ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromArgs:
5892
4327
  pulumi.set(self, "sources", value)
5893
4328
 
5894
4329
 
5895
- if not MYPY:
5896
- class ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromSourceArgsDict(TypedDict):
5897
- access_level: NotRequired[pulumi.Input[str]]
5898
- """
5899
- An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
5900
- """
5901
- elif False:
5902
- ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromSourceArgsDict: TypeAlias = Mapping[str, Any]
5903
-
5904
4330
  @pulumi.input_type
5905
4331
  class ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromSourceArgs:
5906
4332
  def __init__(__self__, *,
@@ -5924,31 +4350,6 @@ class ServicePerimetersServicePerimeterSpecEgressPolicyEgressFromSourceArgs:
5924
4350
  pulumi.set(self, "access_level", value)
5925
4351
 
5926
4352
 
5927
- if not MYPY:
5928
- class ServicePerimetersServicePerimeterSpecEgressPolicyEgressToArgsDict(TypedDict):
5929
- external_resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
5930
- """
5931
- A list of external resources that are allowed to be accessed. A request
5932
- matches if it contains an external resource in this list (Example:
5933
- s3://bucket/path). Currently '*' is not allowed.
5934
- """
5935
- operations: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterSpecEgressPolicyEgressToOperationArgsDict']]]]
5936
- """
5937
- A list of `ApiOperations` that this egress rule applies to. A request matches
5938
- if it contains an operation/service in this list.
5939
- Structure is documented below.
5940
- """
5941
- resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
5942
- """
5943
- A list of resources, currently only projects in the form
5944
- `projects/<projectnumber>`, that match this to stanza. A request matches
5945
- if it contains a resource in this list. If * is specified for resources,
5946
- then this `EgressTo` rule will authorize access to all resources outside
5947
- the perimeter.
5948
- """
5949
- elif False:
5950
- ServicePerimetersServicePerimeterSpecEgressPolicyEgressToArgsDict: TypeAlias = Mapping[str, Any]
5951
-
5952
4353
  @pulumi.input_type
5953
4354
  class ServicePerimetersServicePerimeterSpecEgressPolicyEgressToArgs:
5954
4355
  def __init__(__self__, *,
@@ -6020,25 +4421,6 @@ class ServicePerimetersServicePerimeterSpecEgressPolicyEgressToArgs:
6020
4421
  pulumi.set(self, "resources", value)
6021
4422
 
6022
4423
 
6023
- if not MYPY:
6024
- class ServicePerimetersServicePerimeterSpecEgressPolicyEgressToOperationArgsDict(TypedDict):
6025
- method_selectors: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterSpecEgressPolicyEgressToOperationMethodSelectorArgsDict']]]]
6026
- """
6027
- API methods or permissions to allow. Method or permission must belong
6028
- to the service specified by `serviceName` field. A single MethodSelector
6029
- entry with `*` specified for the `method` field will allow all methods
6030
- AND permissions for the service specified in `serviceName`.
6031
- Structure is documented below.
6032
- """
6033
- service_name: NotRequired[pulumi.Input[str]]
6034
- """
6035
- The name of the API whose methods or permissions the `IngressPolicy` or
6036
- `EgressPolicy` want to allow. A single `ApiOperation` with serviceName
6037
- field set to `*` will allow all methods AND permissions for all services.
6038
- """
6039
- elif False:
6040
- ServicePerimetersServicePerimeterSpecEgressPolicyEgressToOperationArgsDict: TypeAlias = Mapping[str, Any]
6041
-
6042
4424
  @pulumi.input_type
6043
4425
  class ServicePerimetersServicePerimeterSpecEgressPolicyEgressToOperationArgs:
6044
4426
  def __init__(__self__, *,
@@ -6090,22 +4472,6 @@ class ServicePerimetersServicePerimeterSpecEgressPolicyEgressToOperationArgs:
6090
4472
  pulumi.set(self, "service_name", value)
6091
4473
 
6092
4474
 
6093
- if not MYPY:
6094
- class ServicePerimetersServicePerimeterSpecEgressPolicyEgressToOperationMethodSelectorArgsDict(TypedDict):
6095
- method: NotRequired[pulumi.Input[str]]
6096
- """
6097
- Value for `method` should be a valid method name for the corresponding
6098
- `serviceName` in `ApiOperation`. If `*` used as value for method,
6099
- then ALL methods and permissions are allowed.
6100
- """
6101
- permission: NotRequired[pulumi.Input[str]]
6102
- """
6103
- Value for permission should be a valid Cloud IAM permission for the
6104
- corresponding `serviceName` in `ApiOperation`.
6105
- """
6106
- elif False:
6107
- ServicePerimetersServicePerimeterSpecEgressPolicyEgressToOperationMethodSelectorArgsDict: TypeAlias = Mapping[str, Any]
6108
-
6109
4475
  @pulumi.input_type
6110
4476
  class ServicePerimetersServicePerimeterSpecEgressPolicyEgressToOperationMethodSelectorArgs:
6111
4477
  def __init__(__self__, *,
@@ -6151,23 +4517,6 @@ class ServicePerimetersServicePerimeterSpecEgressPolicyEgressToOperationMethodSe
6151
4517
  pulumi.set(self, "permission", value)
6152
4518
 
6153
4519
 
6154
- if not MYPY:
6155
- class ServicePerimetersServicePerimeterSpecIngressPolicyArgsDict(TypedDict):
6156
- ingress_from: NotRequired[pulumi.Input['ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromArgsDict']]
6157
- """
6158
- Defines the conditions on the source of a request causing this `IngressPolicy`
6159
- to apply.
6160
- Structure is documented below.
6161
- """
6162
- ingress_to: NotRequired[pulumi.Input['ServicePerimetersServicePerimeterSpecIngressPolicyIngressToArgsDict']]
6163
- """
6164
- Defines the conditions on the `ApiOperation` and request destination that cause
6165
- this `IngressPolicy` to apply.
6166
- Structure is documented below.
6167
- """
6168
- elif False:
6169
- ServicePerimetersServicePerimeterSpecIngressPolicyArgsDict: TypeAlias = Mapping[str, Any]
6170
-
6171
4520
  @pulumi.input_type
6172
4521
  class ServicePerimetersServicePerimeterSpecIngressPolicyArgs:
6173
4522
  def __init__(__self__, *,
@@ -6215,29 +4564,6 @@ class ServicePerimetersServicePerimeterSpecIngressPolicyArgs:
6215
4564
  pulumi.set(self, "ingress_to", value)
6216
4565
 
6217
4566
 
6218
- if not MYPY:
6219
- class ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromArgsDict(TypedDict):
6220
- identities: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
6221
- """
6222
- A list of identities that are allowed access through this ingress policy.
6223
- Should be in the format of email address. The email address should represent
6224
- individual user or service account only.
6225
- """
6226
- identity_type: NotRequired[pulumi.Input[str]]
6227
- """
6228
- Specifies the type of identities that are allowed access from outside the
6229
- perimeter. If left unspecified, then members of `identities` field will be
6230
- allowed access.
6231
- Possible values are: `IDENTITY_TYPE_UNSPECIFIED`, `ANY_IDENTITY`, `ANY_USER_ACCOUNT`, `ANY_SERVICE_ACCOUNT`.
6232
- """
6233
- sources: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromSourceArgsDict']]]]
6234
- """
6235
- Sources that this `IngressPolicy` authorizes access from.
6236
- Structure is documented below.
6237
- """
6238
- elif False:
6239
- ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromArgsDict: TypeAlias = Mapping[str, Any]
6240
-
6241
4567
  @pulumi.input_type
6242
4568
  class ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromArgs:
6243
4569
  def __init__(__self__, *,
@@ -6301,27 +4627,9 @@ class ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromArgs:
6301
4627
  return pulumi.get(self, "sources")
6302
4628
 
6303
4629
  @sources.setter
6304
- def sources(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromSourceArgs']]]]):
6305
- pulumi.set(self, "sources", value)
6306
-
6307
-
6308
- if not MYPY:
6309
- class ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromSourceArgsDict(TypedDict):
6310
- access_level: NotRequired[pulumi.Input[str]]
6311
- """
6312
- An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
6313
- """
6314
- resource: NotRequired[pulumi.Input[str]]
6315
- """
6316
- A Google Cloud resource that is allowed to ingress the perimeter.
6317
- Requests from these resources will be allowed to access perimeter data.
6318
- Currently only projects are allowed. Format `projects/{project_number}`
6319
- The project may be in any Google Cloud organization, not just the
6320
- organization that the perimeter is defined in. `*` is not allowed, the case
6321
- of allowing all Google Cloud resources only is not supported.
6322
- """
6323
- elif False:
6324
- ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromSourceArgsDict: TypeAlias = Mapping[str, Any]
4630
+ def sources(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromSourceArgs']]]]):
4631
+ pulumi.set(self, "sources", value)
4632
+
6325
4633
 
6326
4634
  @pulumi.input_type
6327
4635
  class ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromSourceArgs:
@@ -6372,28 +4680,6 @@ class ServicePerimetersServicePerimeterSpecIngressPolicyIngressFromSourceArgs:
6372
4680
  pulumi.set(self, "resource", value)
6373
4681
 
6374
4682
 
6375
- if not MYPY:
6376
- class ServicePerimetersServicePerimeterSpecIngressPolicyIngressToArgsDict(TypedDict):
6377
- operations: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterSpecIngressPolicyIngressToOperationArgsDict']]]]
6378
- """
6379
- A list of `ApiOperations` the sources specified in corresponding `IngressFrom`
6380
- are allowed to perform in this `ServicePerimeter`.
6381
- Structure is documented below.
6382
- """
6383
- resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
6384
- """
6385
- A list of resources, currently only projects in the form
6386
- `projects/<projectnumber>`, protected by this `ServicePerimeter`
6387
- that are allowed to be accessed by sources defined in the
6388
- corresponding `IngressFrom`. A request matches if it contains
6389
- a resource in this list. If `*` is specified for resources,
6390
- then this `IngressTo` rule will authorize access to all
6391
- resources inside the perimeter, provided that the request
6392
- also matches the `operations` field.
6393
- """
6394
- elif False:
6395
- ServicePerimetersServicePerimeterSpecIngressPolicyIngressToArgsDict: TypeAlias = Mapping[str, Any]
6396
-
6397
4683
  @pulumi.input_type
6398
4684
  class ServicePerimetersServicePerimeterSpecIngressPolicyIngressToArgs:
6399
4685
  def __init__(__self__, *,
@@ -6451,25 +4737,6 @@ class ServicePerimetersServicePerimeterSpecIngressPolicyIngressToArgs:
6451
4737
  pulumi.set(self, "resources", value)
6452
4738
 
6453
4739
 
6454
- if not MYPY:
6455
- class ServicePerimetersServicePerimeterSpecIngressPolicyIngressToOperationArgsDict(TypedDict):
6456
- method_selectors: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterSpecIngressPolicyIngressToOperationMethodSelectorArgsDict']]]]
6457
- """
6458
- API methods or permissions to allow. Method or permission must belong
6459
- to the service specified by `serviceName` field. A single MethodSelector
6460
- entry with `*` specified for the `method` field will allow all methods
6461
- AND permissions for the service specified in `serviceName`.
6462
- Structure is documented below.
6463
- """
6464
- service_name: NotRequired[pulumi.Input[str]]
6465
- """
6466
- The name of the API whose methods or permissions the `IngressPolicy` or
6467
- `EgressPolicy` want to allow. A single `ApiOperation` with serviceName
6468
- field set to `*` will allow all methods AND permissions for all services.
6469
- """
6470
- elif False:
6471
- ServicePerimetersServicePerimeterSpecIngressPolicyIngressToOperationArgsDict: TypeAlias = Mapping[str, Any]
6472
-
6473
4740
  @pulumi.input_type
6474
4741
  class ServicePerimetersServicePerimeterSpecIngressPolicyIngressToOperationArgs:
6475
4742
  def __init__(__self__, *,
@@ -6521,22 +4788,6 @@ class ServicePerimetersServicePerimeterSpecIngressPolicyIngressToOperationArgs:
6521
4788
  pulumi.set(self, "service_name", value)
6522
4789
 
6523
4790
 
6524
- if not MYPY:
6525
- class ServicePerimetersServicePerimeterSpecIngressPolicyIngressToOperationMethodSelectorArgsDict(TypedDict):
6526
- method: NotRequired[pulumi.Input[str]]
6527
- """
6528
- Value for `method` should be a valid method name for the corresponding
6529
- `serviceName` in `ApiOperation`. If `*` used as value for method,
6530
- then ALL methods and permissions are allowed.
6531
- """
6532
- permission: NotRequired[pulumi.Input[str]]
6533
- """
6534
- Value for permission should be a valid Cloud IAM permission for the
6535
- corresponding `serviceName` in `ApiOperation`.
6536
- """
6537
- elif False:
6538
- ServicePerimetersServicePerimeterSpecIngressPolicyIngressToOperationMethodSelectorArgsDict: TypeAlias = Mapping[str, Any]
6539
-
6540
4791
  @pulumi.input_type
6541
4792
  class ServicePerimetersServicePerimeterSpecIngressPolicyIngressToOperationMethodSelectorArgs:
6542
4793
  def __init__(__self__, *,
@@ -6582,21 +4833,6 @@ class ServicePerimetersServicePerimeterSpecIngressPolicyIngressToOperationMethod
6582
4833
  pulumi.set(self, "permission", value)
6583
4834
 
6584
4835
 
6585
- if not MYPY:
6586
- class ServicePerimetersServicePerimeterSpecVpcAccessibleServicesArgsDict(TypedDict):
6587
- allowed_services: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
6588
- """
6589
- The list of APIs usable within the Service Perimeter.
6590
- Must be empty unless `enableRestriction` is True.
6591
- """
6592
- enable_restriction: NotRequired[pulumi.Input[bool]]
6593
- """
6594
- Whether to restrict API calls within the Service Perimeter to the
6595
- list of APIs specified in 'allowedServices'.
6596
- """
6597
- elif False:
6598
- ServicePerimetersServicePerimeterSpecVpcAccessibleServicesArgsDict: TypeAlias = Mapping[str, Any]
6599
-
6600
4836
  @pulumi.input_type
6601
4837
  class ServicePerimetersServicePerimeterSpecVpcAccessibleServicesArgs:
6602
4838
  def __init__(__self__, *,
@@ -6640,59 +4876,6 @@ class ServicePerimetersServicePerimeterSpecVpcAccessibleServicesArgs:
6640
4876
  pulumi.set(self, "enable_restriction", value)
6641
4877
 
6642
4878
 
6643
- if not MYPY:
6644
- class ServicePerimetersServicePerimeterStatusArgsDict(TypedDict):
6645
- access_levels: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
6646
- """
6647
- A list of AccessLevel resource names that allow resources within
6648
- the ServicePerimeter to be accessed from the internet.
6649
- AccessLevels listed must be in the same policy as this
6650
- ServicePerimeter. Referencing a nonexistent AccessLevel is a
6651
- syntax error. If no AccessLevel names are listed, resources within
6652
- the perimeter can only be accessed via GCP calls with request
6653
- origins within the perimeter. For Service Perimeter Bridge, must
6654
- be empty.
6655
- Format: accessPolicies/{policy_id}/accessLevels/{access_level_name}
6656
- """
6657
- egress_policies: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterStatusEgressPolicyArgsDict']]]]
6658
- """
6659
- List of EgressPolicies to apply to the perimeter. A perimeter may
6660
- have multiple EgressPolicies, each of which is evaluated separately.
6661
- Access is granted if any EgressPolicy grants it. Must be empty for
6662
- a perimeter bridge.
6663
- Structure is documented below.
6664
- """
6665
- ingress_policies: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterStatusIngressPolicyArgsDict']]]]
6666
- """
6667
- List of `IngressPolicies` to apply to the perimeter. A perimeter may
6668
- have multiple `IngressPolicies`, each of which is evaluated
6669
- separately. Access is granted if any `Ingress Policy` grants it.
6670
- Must be empty for a perimeter bridge.
6671
- Structure is documented below.
6672
- """
6673
- resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
6674
- """
6675
- A list of GCP resources that are inside of the service perimeter.
6676
- Currently only projects are allowed.
6677
- Format: projects/{project_number}
6678
- """
6679
- restricted_services: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
6680
- """
6681
- GCP services that are subject to the Service Perimeter
6682
- restrictions. Must contain a list of services. For example, if
6683
- `storage.googleapis.com` is specified, access to the storage
6684
- buckets inside the perimeter must meet the perimeter's access
6685
- restrictions.
6686
- """
6687
- vpc_accessible_services: NotRequired[pulumi.Input['ServicePerimetersServicePerimeterStatusVpcAccessibleServicesArgsDict']]
6688
- """
6689
- Specifies how APIs are allowed to communicate within the Service
6690
- Perimeter.
6691
- Structure is documented below.
6692
- """
6693
- elif False:
6694
- ServicePerimetersServicePerimeterStatusArgsDict: TypeAlias = Mapping[str, Any]
6695
-
6696
4879
  @pulumi.input_type
6697
4880
  class ServicePerimetersServicePerimeterStatusArgs:
6698
4881
  def __init__(__self__, *,
@@ -6844,22 +5027,6 @@ class ServicePerimetersServicePerimeterStatusArgs:
6844
5027
  pulumi.set(self, "vpc_accessible_services", value)
6845
5028
 
6846
5029
 
6847
- if not MYPY:
6848
- class ServicePerimetersServicePerimeterStatusEgressPolicyArgsDict(TypedDict):
6849
- egress_from: NotRequired[pulumi.Input['ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromArgsDict']]
6850
- """
6851
- Defines conditions on the source of a request causing this `EgressPolicy` to apply.
6852
- Structure is documented below.
6853
- """
6854
- egress_to: NotRequired[pulumi.Input['ServicePerimetersServicePerimeterStatusEgressPolicyEgressToArgsDict']]
6855
- """
6856
- Defines the conditions on the `ApiOperation` and destination resources that
6857
- cause this `EgressPolicy` to apply.
6858
- Structure is documented below.
6859
- """
6860
- elif False:
6861
- ServicePerimetersServicePerimeterStatusEgressPolicyArgsDict: TypeAlias = Mapping[str, Any]
6862
-
6863
5030
  @pulumi.input_type
6864
5031
  class ServicePerimetersServicePerimeterStatusEgressPolicyArgs:
6865
5032
  def __init__(__self__, *,
@@ -6905,34 +5072,6 @@ class ServicePerimetersServicePerimeterStatusEgressPolicyArgs:
6905
5072
  pulumi.set(self, "egress_to", value)
6906
5073
 
6907
5074
 
6908
- if not MYPY:
6909
- class ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromArgsDict(TypedDict):
6910
- identities: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
6911
- """
6912
- A list of identities that are allowed access through this `EgressPolicy`.
6913
- Should be in the format of email address. The email address should
6914
- represent individual user or service account only.
6915
- """
6916
- identity_type: NotRequired[pulumi.Input[str]]
6917
- """
6918
- Specifies the type of identities that are allowed access to outside the
6919
- perimeter. If left unspecified, then members of `identities` field will
6920
- be allowed access.
6921
- Possible values are: `IDENTITY_TYPE_UNSPECIFIED`, `ANY_IDENTITY`, `ANY_USER_ACCOUNT`, `ANY_SERVICE_ACCOUNT`.
6922
- """
6923
- source_restriction: NotRequired[pulumi.Input[str]]
6924
- """
6925
- Whether to enforce traffic restrictions based on `sources` field. If the `sources` field is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.
6926
- Possible values are: `SOURCE_RESTRICTION_UNSPECIFIED`, `SOURCE_RESTRICTION_ENABLED`, `SOURCE_RESTRICTION_DISABLED`.
6927
- """
6928
- sources: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromSourceArgsDict']]]]
6929
- """
6930
- Sources that this EgressPolicy authorizes access from.
6931
- Structure is documented below.
6932
- """
6933
- elif False:
6934
- ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromArgsDict: TypeAlias = Mapping[str, Any]
6935
-
6936
5075
  @pulumi.input_type
6937
5076
  class ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromArgs:
6938
5077
  def __init__(__self__, *,
@@ -7018,15 +5157,6 @@ class ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromArgs:
7018
5157
  pulumi.set(self, "sources", value)
7019
5158
 
7020
5159
 
7021
- if not MYPY:
7022
- class ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromSourceArgsDict(TypedDict):
7023
- access_level: NotRequired[pulumi.Input[str]]
7024
- """
7025
- An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
7026
- """
7027
- elif False:
7028
- ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromSourceArgsDict: TypeAlias = Mapping[str, Any]
7029
-
7030
5160
  @pulumi.input_type
7031
5161
  class ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromSourceArgs:
7032
5162
  def __init__(__self__, *,
@@ -7050,31 +5180,6 @@ class ServicePerimetersServicePerimeterStatusEgressPolicyEgressFromSourceArgs:
7050
5180
  pulumi.set(self, "access_level", value)
7051
5181
 
7052
5182
 
7053
- if not MYPY:
7054
- class ServicePerimetersServicePerimeterStatusEgressPolicyEgressToArgsDict(TypedDict):
7055
- external_resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
7056
- """
7057
- A list of external resources that are allowed to be accessed. A request
7058
- matches if it contains an external resource in this list (Example:
7059
- s3://bucket/path). Currently '*' is not allowed.
7060
- """
7061
- operations: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterStatusEgressPolicyEgressToOperationArgsDict']]]]
7062
- """
7063
- A list of `ApiOperations` that this egress rule applies to. A request matches
7064
- if it contains an operation/service in this list.
7065
- Structure is documented below.
7066
- """
7067
- resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
7068
- """
7069
- A list of resources, currently only projects in the form
7070
- `projects/<projectnumber>`, that match this to stanza. A request matches
7071
- if it contains a resource in this list. If * is specified for resources,
7072
- then this `EgressTo` rule will authorize access to all resources outside
7073
- the perimeter.
7074
- """
7075
- elif False:
7076
- ServicePerimetersServicePerimeterStatusEgressPolicyEgressToArgsDict: TypeAlias = Mapping[str, Any]
7077
-
7078
5183
  @pulumi.input_type
7079
5184
  class ServicePerimetersServicePerimeterStatusEgressPolicyEgressToArgs:
7080
5185
  def __init__(__self__, *,
@@ -7146,25 +5251,6 @@ class ServicePerimetersServicePerimeterStatusEgressPolicyEgressToArgs:
7146
5251
  pulumi.set(self, "resources", value)
7147
5252
 
7148
5253
 
7149
- if not MYPY:
7150
- class ServicePerimetersServicePerimeterStatusEgressPolicyEgressToOperationArgsDict(TypedDict):
7151
- method_selectors: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterStatusEgressPolicyEgressToOperationMethodSelectorArgsDict']]]]
7152
- """
7153
- API methods or permissions to allow. Method or permission must belong
7154
- to the service specified by `serviceName` field. A single MethodSelector
7155
- entry with `*` specified for the `method` field will allow all methods
7156
- AND permissions for the service specified in `serviceName`.
7157
- Structure is documented below.
7158
- """
7159
- service_name: NotRequired[pulumi.Input[str]]
7160
- """
7161
- The name of the API whose methods or permissions the `IngressPolicy` or
7162
- `EgressPolicy` want to allow. A single `ApiOperation` with serviceName
7163
- field set to `*` will allow all methods AND permissions for all services.
7164
- """
7165
- elif False:
7166
- ServicePerimetersServicePerimeterStatusEgressPolicyEgressToOperationArgsDict: TypeAlias = Mapping[str, Any]
7167
-
7168
5254
  @pulumi.input_type
7169
5255
  class ServicePerimetersServicePerimeterStatusEgressPolicyEgressToOperationArgs:
7170
5256
  def __init__(__self__, *,
@@ -7216,22 +5302,6 @@ class ServicePerimetersServicePerimeterStatusEgressPolicyEgressToOperationArgs:
7216
5302
  pulumi.set(self, "service_name", value)
7217
5303
 
7218
5304
 
7219
- if not MYPY:
7220
- class ServicePerimetersServicePerimeterStatusEgressPolicyEgressToOperationMethodSelectorArgsDict(TypedDict):
7221
- method: NotRequired[pulumi.Input[str]]
7222
- """
7223
- Value for `method` should be a valid method name for the corresponding
7224
- `serviceName` in `ApiOperation`. If `*` used as value for method,
7225
- then ALL methods and permissions are allowed.
7226
- """
7227
- permission: NotRequired[pulumi.Input[str]]
7228
- """
7229
- Value for permission should be a valid Cloud IAM permission for the
7230
- corresponding `serviceName` in `ApiOperation`.
7231
- """
7232
- elif False:
7233
- ServicePerimetersServicePerimeterStatusEgressPolicyEgressToOperationMethodSelectorArgsDict: TypeAlias = Mapping[str, Any]
7234
-
7235
5305
  @pulumi.input_type
7236
5306
  class ServicePerimetersServicePerimeterStatusEgressPolicyEgressToOperationMethodSelectorArgs:
7237
5307
  def __init__(__self__, *,
@@ -7277,23 +5347,6 @@ class ServicePerimetersServicePerimeterStatusEgressPolicyEgressToOperationMethod
7277
5347
  pulumi.set(self, "permission", value)
7278
5348
 
7279
5349
 
7280
- if not MYPY:
7281
- class ServicePerimetersServicePerimeterStatusIngressPolicyArgsDict(TypedDict):
7282
- ingress_from: NotRequired[pulumi.Input['ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromArgsDict']]
7283
- """
7284
- Defines the conditions on the source of a request causing this `IngressPolicy`
7285
- to apply.
7286
- Structure is documented below.
7287
- """
7288
- ingress_to: NotRequired[pulumi.Input['ServicePerimetersServicePerimeterStatusIngressPolicyIngressToArgsDict']]
7289
- """
7290
- Defines the conditions on the `ApiOperation` and request destination that cause
7291
- this `IngressPolicy` to apply.
7292
- Structure is documented below.
7293
- """
7294
- elif False:
7295
- ServicePerimetersServicePerimeterStatusIngressPolicyArgsDict: TypeAlias = Mapping[str, Any]
7296
-
7297
5350
  @pulumi.input_type
7298
5351
  class ServicePerimetersServicePerimeterStatusIngressPolicyArgs:
7299
5352
  def __init__(__self__, *,
@@ -7341,29 +5394,6 @@ class ServicePerimetersServicePerimeterStatusIngressPolicyArgs:
7341
5394
  pulumi.set(self, "ingress_to", value)
7342
5395
 
7343
5396
 
7344
- if not MYPY:
7345
- class ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromArgsDict(TypedDict):
7346
- identities: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
7347
- """
7348
- A list of identities that are allowed access through this ingress policy.
7349
- Should be in the format of email address. The email address should represent
7350
- individual user or service account only.
7351
- """
7352
- identity_type: NotRequired[pulumi.Input[str]]
7353
- """
7354
- Specifies the type of identities that are allowed access from outside the
7355
- perimeter. If left unspecified, then members of `identities` field will be
7356
- allowed access.
7357
- Possible values are: `IDENTITY_TYPE_UNSPECIFIED`, `ANY_IDENTITY`, `ANY_USER_ACCOUNT`, `ANY_SERVICE_ACCOUNT`.
7358
- """
7359
- sources: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromSourceArgsDict']]]]
7360
- """
7361
- Sources that this `IngressPolicy` authorizes access from.
7362
- Structure is documented below.
7363
- """
7364
- elif False:
7365
- ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromArgsDict: TypeAlias = Mapping[str, Any]
7366
-
7367
5397
  @pulumi.input_type
7368
5398
  class ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromArgs:
7369
5399
  def __init__(__self__, *,
@@ -7431,24 +5461,6 @@ class ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromArgs:
7431
5461
  pulumi.set(self, "sources", value)
7432
5462
 
7433
5463
 
7434
- if not MYPY:
7435
- class ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromSourceArgsDict(TypedDict):
7436
- access_level: NotRequired[pulumi.Input[str]]
7437
- """
7438
- An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
7439
- """
7440
- resource: NotRequired[pulumi.Input[str]]
7441
- """
7442
- A Google Cloud resource that is allowed to ingress the perimeter.
7443
- Requests from these resources will be allowed to access perimeter data.
7444
- Currently only projects are allowed. Format `projects/{project_number}`
7445
- The project may be in any Google Cloud organization, not just the
7446
- organization that the perimeter is defined in. `*` is not allowed, the case
7447
- of allowing all Google Cloud resources only is not supported.
7448
- """
7449
- elif False:
7450
- ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromSourceArgsDict: TypeAlias = Mapping[str, Any]
7451
-
7452
5464
  @pulumi.input_type
7453
5465
  class ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromSourceArgs:
7454
5466
  def __init__(__self__, *,
@@ -7498,28 +5510,6 @@ class ServicePerimetersServicePerimeterStatusIngressPolicyIngressFromSourceArgs:
7498
5510
  pulumi.set(self, "resource", value)
7499
5511
 
7500
5512
 
7501
- if not MYPY:
7502
- class ServicePerimetersServicePerimeterStatusIngressPolicyIngressToArgsDict(TypedDict):
7503
- operations: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterStatusIngressPolicyIngressToOperationArgsDict']]]]
7504
- """
7505
- A list of `ApiOperations` the sources specified in corresponding `IngressFrom`
7506
- are allowed to perform in this `ServicePerimeter`.
7507
- Structure is documented below.
7508
- """
7509
- resources: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
7510
- """
7511
- A list of resources, currently only projects in the form
7512
- `projects/<projectnumber>`, protected by this `ServicePerimeter`
7513
- that are allowed to be accessed by sources defined in the
7514
- corresponding `IngressFrom`. A request matches if it contains
7515
- a resource in this list. If `*` is specified for resources,
7516
- then this `IngressTo` rule will authorize access to all
7517
- resources inside the perimeter, provided that the request
7518
- also matches the `operations` field.
7519
- """
7520
- elif False:
7521
- ServicePerimetersServicePerimeterStatusIngressPolicyIngressToArgsDict: TypeAlias = Mapping[str, Any]
7522
-
7523
5513
  @pulumi.input_type
7524
5514
  class ServicePerimetersServicePerimeterStatusIngressPolicyIngressToArgs:
7525
5515
  def __init__(__self__, *,
@@ -7577,25 +5567,6 @@ class ServicePerimetersServicePerimeterStatusIngressPolicyIngressToArgs:
7577
5567
  pulumi.set(self, "resources", value)
7578
5568
 
7579
5569
 
7580
- if not MYPY:
7581
- class ServicePerimetersServicePerimeterStatusIngressPolicyIngressToOperationArgsDict(TypedDict):
7582
- method_selectors: NotRequired[pulumi.Input[Sequence[pulumi.Input['ServicePerimetersServicePerimeterStatusIngressPolicyIngressToOperationMethodSelectorArgsDict']]]]
7583
- """
7584
- API methods or permissions to allow. Method or permission must belong
7585
- to the service specified by `serviceName` field. A single MethodSelector
7586
- entry with `*` specified for the `method` field will allow all methods
7587
- AND permissions for the service specified in `serviceName`.
7588
- Structure is documented below.
7589
- """
7590
- service_name: NotRequired[pulumi.Input[str]]
7591
- """
7592
- The name of the API whose methods or permissions the `IngressPolicy` or
7593
- `EgressPolicy` want to allow. A single `ApiOperation` with serviceName
7594
- field set to `*` will allow all methods AND permissions for all services.
7595
- """
7596
- elif False:
7597
- ServicePerimetersServicePerimeterStatusIngressPolicyIngressToOperationArgsDict: TypeAlias = Mapping[str, Any]
7598
-
7599
5570
  @pulumi.input_type
7600
5571
  class ServicePerimetersServicePerimeterStatusIngressPolicyIngressToOperationArgs:
7601
5572
  def __init__(__self__, *,
@@ -7647,22 +5618,6 @@ class ServicePerimetersServicePerimeterStatusIngressPolicyIngressToOperationArgs
7647
5618
  pulumi.set(self, "service_name", value)
7648
5619
 
7649
5620
 
7650
- if not MYPY:
7651
- class ServicePerimetersServicePerimeterStatusIngressPolicyIngressToOperationMethodSelectorArgsDict(TypedDict):
7652
- method: NotRequired[pulumi.Input[str]]
7653
- """
7654
- Value for `method` should be a valid method name for the corresponding
7655
- `serviceName` in `ApiOperation`. If `*` used as value for method,
7656
- then ALL methods and permissions are allowed.
7657
- """
7658
- permission: NotRequired[pulumi.Input[str]]
7659
- """
7660
- Value for permission should be a valid Cloud IAM permission for the
7661
- corresponding `serviceName` in `ApiOperation`.
7662
- """
7663
- elif False:
7664
- ServicePerimetersServicePerimeterStatusIngressPolicyIngressToOperationMethodSelectorArgsDict: TypeAlias = Mapping[str, Any]
7665
-
7666
5621
  @pulumi.input_type
7667
5622
  class ServicePerimetersServicePerimeterStatusIngressPolicyIngressToOperationMethodSelectorArgs:
7668
5623
  def __init__(__self__, *,
@@ -7708,21 +5663,6 @@ class ServicePerimetersServicePerimeterStatusIngressPolicyIngressToOperationMeth
7708
5663
  pulumi.set(self, "permission", value)
7709
5664
 
7710
5665
 
7711
- if not MYPY:
7712
- class ServicePerimetersServicePerimeterStatusVpcAccessibleServicesArgsDict(TypedDict):
7713
- allowed_services: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
7714
- """
7715
- The list of APIs usable within the Service Perimeter.
7716
- Must be empty unless `enableRestriction` is True.
7717
- """
7718
- enable_restriction: NotRequired[pulumi.Input[bool]]
7719
- """
7720
- Whether to restrict API calls within the Service Perimeter to the
7721
- list of APIs specified in 'allowedServices'.
7722
- """
7723
- elif False:
7724
- ServicePerimetersServicePerimeterStatusVpcAccessibleServicesArgsDict: TypeAlias = Mapping[str, Any]
7725
-
7726
5666
  @pulumi.input_type
7727
5667
  class ServicePerimetersServicePerimeterStatusVpcAccessibleServicesArgs:
7728
5668
  def __init__(__self__, *,