pulumi-gcp 7.32.0__py3-none-any.whl → 7.32.0a1721151794__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +0 -11
- pulumi_gcp/alloydb/cluster.py +24 -0
- pulumi_gcp/bigquery/_inputs.py +12 -0
- pulumi_gcp/bigquery/dataset.py +28 -0
- pulumi_gcp/bigquery/dataset_access.py +28 -0
- pulumi_gcp/bigquery/outputs.py +24 -0
- pulumi_gcp/bigtable/authorized_view.py +0 -104
- pulumi_gcp/compute/global_address.py +4 -16
- pulumi_gcp/compute/target_instance.py +2 -2
- pulumi_gcp/config/__init__.pyi +0 -2
- pulumi_gcp/config/vars.py +0 -4
- pulumi_gcp/gkehub/__init__.py +0 -1
- pulumi_gcp/gkehub/outputs.py +0 -19
- pulumi_gcp/iap/client.py +7 -7
- pulumi_gcp/kms/_inputs.py +0 -40
- pulumi_gcp/kms/crypto_key.py +0 -103
- pulumi_gcp/kms/get_kms_crypto_key.py +1 -11
- pulumi_gcp/kms/outputs.py +0 -112
- pulumi_gcp/networksecurity/address_group.py +1 -1
- pulumi_gcp/privilegedaccessmanager/entitlement.py +0 -4
- pulumi_gcp/provider.py +0 -20
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/securitycenter/__init__.py +0 -1
- pulumi_gcp/securitycenter/_inputs.py +0 -93
- pulumi_gcp/securitycenter/outputs.py +0 -59
- {pulumi_gcp-7.32.0.dist-info → pulumi_gcp-7.32.0a1721151794.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.32.0.dist-info → pulumi_gcp-7.32.0a1721151794.dist-info}/RECORD +29 -33
- pulumi_gcp/gkehub/get_membership_binding.py +0 -222
- pulumi_gcp/securitycenter/project_notification_config.py +0 -518
- pulumi_gcp/siteverification/__init__.py +0 -8
- pulumi_gcp/siteverification/get_token.py +0 -221
- {pulumi_gcp-7.32.0.dist-info → pulumi_gcp-7.32.0a1721151794.dist-info}/WHEEL +0 -0
- {pulumi_gcp-7.32.0.dist-info → pulumi_gcp-7.32.0a1721151794.dist-info}/top_level.txt +0 -0
@@ -452,7 +452,7 @@ class TargetInstance(pulumi.CustomResource):
|
|
452
452
|
import pulumi_gcp as gcp
|
453
453
|
|
454
454
|
target_vm = gcp.compute.get_network(name="default")
|
455
|
-
vmimage = gcp.compute.get_image(family="debian-
|
455
|
+
vmimage = gcp.compute.get_image(family="debian-10",
|
456
456
|
project="debian-cloud")
|
457
457
|
target_vm_instance = gcp.compute.Instance("target-vm",
|
458
458
|
name="custom-network-target-vm",
|
@@ -642,7 +642,7 @@ class TargetInstance(pulumi.CustomResource):
|
|
642
642
|
import pulumi_gcp as gcp
|
643
643
|
|
644
644
|
target_vm = gcp.compute.get_network(name="default")
|
645
|
-
vmimage = gcp.compute.get_image(family="debian-
|
645
|
+
vmimage = gcp.compute.get_image(family="debian-10",
|
646
646
|
project="debian-cloud")
|
647
647
|
target_vm_instance = gcp.compute.Instance("target-vm",
|
648
648
|
name="custom-network-target-vm",
|
pulumi_gcp/config/__init__.pyi
CHANGED
pulumi_gcp/config/vars.py
CHANGED
@@ -629,10 +629,6 @@ class _ExportableConfig(types.ModuleType):
|
|
629
629
|
def service_usage_custom_endpoint(self) -> Optional[str]:
|
630
630
|
return __config__.get('serviceUsageCustomEndpoint')
|
631
631
|
|
632
|
-
@property
|
633
|
-
def site_verification_custom_endpoint(self) -> Optional[str]:
|
634
|
-
return __config__.get('siteVerificationCustomEndpoint')
|
635
|
-
|
636
632
|
@property
|
637
633
|
def skip_region_validation(self) -> bool:
|
638
634
|
return __config__.get_bool('skipRegionValidation') or (_utilities.get_env_bool('PULUMI_GCP_SKIP_REGION_VALIDATION') or False)
|
pulumi_gcp/gkehub/__init__.py
CHANGED
@@ -12,7 +12,6 @@ from .feature_iam_policy import *
|
|
12
12
|
from .feature_membership import *
|
13
13
|
from .fleet import *
|
14
14
|
from .get_feature_iam_policy import *
|
15
|
-
from .get_membership_binding import *
|
16
15
|
from .get_membership_iam_policy import *
|
17
16
|
from .get_scope_iam_policy import *
|
18
17
|
from .membership import *
|
pulumi_gcp/gkehub/outputs.py
CHANGED
@@ -88,7 +88,6 @@ __all__ = [
|
|
88
88
|
'ScopeRbacRoleBindingRole',
|
89
89
|
'ScopeRbacRoleBindingState',
|
90
90
|
'ScopeState',
|
91
|
-
'GetMembershipBindingStateResult',
|
92
91
|
]
|
93
92
|
|
94
93
|
@pulumi.output_type
|
@@ -3589,21 +3588,3 @@ class ScopeState(dict):
|
|
3589
3588
|
return pulumi.get(self, "code")
|
3590
3589
|
|
3591
3590
|
|
3592
|
-
@pulumi.output_type
|
3593
|
-
class GetMembershipBindingStateResult(dict):
|
3594
|
-
def __init__(__self__, *,
|
3595
|
-
code: str):
|
3596
|
-
"""
|
3597
|
-
:param str code: Code describes the state of a MembershipBinding resource.
|
3598
|
-
"""
|
3599
|
-
pulumi.set(__self__, "code", code)
|
3600
|
-
|
3601
|
-
@property
|
3602
|
-
@pulumi.getter
|
3603
|
-
def code(self) -> str:
|
3604
|
-
"""
|
3605
|
-
Code describes the state of a MembershipBinding resource.
|
3606
|
-
"""
|
3607
|
-
return pulumi.get(self, "code")
|
3608
|
-
|
3609
|
-
|
pulumi_gcp/iap/client.py
CHANGED
@@ -25,7 +25,7 @@ class ClientArgs:
|
|
25
25
|
The set of arguments for constructing a Client resource.
|
26
26
|
:param pulumi.Input[str] brand: Identifier of the brand to which this client
|
27
27
|
is attached to. The format is
|
28
|
-
`projects/{project_number}/brands/{brand_id}`.
|
28
|
+
`projects/{project_number}/brands/{brand_id}/identityAwareProxyClients/{client_id}`.
|
29
29
|
|
30
30
|
|
31
31
|
- - -
|
@@ -40,7 +40,7 @@ class ClientArgs:
|
|
40
40
|
"""
|
41
41
|
Identifier of the brand to which this client
|
42
42
|
is attached to. The format is
|
43
|
-
`projects/{project_number}/brands/{brand_id}`.
|
43
|
+
`projects/{project_number}/brands/{brand_id}/identityAwareProxyClients/{client_id}`.
|
44
44
|
|
45
45
|
|
46
46
|
- - -
|
@@ -75,7 +75,7 @@ class _ClientState:
|
|
75
75
|
Input properties used for looking up and filtering Client resources.
|
76
76
|
:param pulumi.Input[str] brand: Identifier of the brand to which this client
|
77
77
|
is attached to. The format is
|
78
|
-
`projects/{project_number}/brands/{brand_id}`.
|
78
|
+
`projects/{project_number}/brands/{brand_id}/identityAwareProxyClients/{client_id}`.
|
79
79
|
|
80
80
|
|
81
81
|
- - -
|
@@ -99,7 +99,7 @@ class _ClientState:
|
|
99
99
|
"""
|
100
100
|
Identifier of the brand to which this client
|
101
101
|
is attached to. The format is
|
102
|
-
`projects/{project_number}/brands/{brand_id}`.
|
102
|
+
`projects/{project_number}/brands/{brand_id}/identityAwareProxyClients/{client_id}`.
|
103
103
|
|
104
104
|
|
105
105
|
- - -
|
@@ -215,7 +215,7 @@ class Client(pulumi.CustomResource):
|
|
215
215
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
216
216
|
:param pulumi.Input[str] brand: Identifier of the brand to which this client
|
217
217
|
is attached to. The format is
|
218
|
-
`projects/{project_number}/brands/{brand_id}`.
|
218
|
+
`projects/{project_number}/brands/{brand_id}/identityAwareProxyClients/{client_id}`.
|
219
219
|
|
220
220
|
|
221
221
|
- - -
|
@@ -341,7 +341,7 @@ class Client(pulumi.CustomResource):
|
|
341
341
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
342
342
|
:param pulumi.Input[str] brand: Identifier of the brand to which this client
|
343
343
|
is attached to. The format is
|
344
|
-
`projects/{project_number}/brands/{brand_id}`.
|
344
|
+
`projects/{project_number}/brands/{brand_id}/identityAwareProxyClients/{client_id}`.
|
345
345
|
|
346
346
|
|
347
347
|
- - -
|
@@ -366,7 +366,7 @@ class Client(pulumi.CustomResource):
|
|
366
366
|
"""
|
367
367
|
Identifier of the brand to which this client
|
368
368
|
is attached to. The format is
|
369
|
-
`projects/{project_number}/brands/{brand_id}`.
|
369
|
+
`projects/{project_number}/brands/{brand_id}/identityAwareProxyClients/{client_id}`.
|
370
370
|
|
371
371
|
|
372
372
|
- - -
|
pulumi_gcp/kms/_inputs.py
CHANGED
@@ -19,8 +19,6 @@ __all__ = [
|
|
19
19
|
'CryptoKeyIAMBindingConditionArgsDict',
|
20
20
|
'CryptoKeyIAMMemberConditionArgs',
|
21
21
|
'CryptoKeyIAMMemberConditionArgsDict',
|
22
|
-
'CryptoKeyKeyAccessJustificationsPolicyArgs',
|
23
|
-
'CryptoKeyKeyAccessJustificationsPolicyArgsDict',
|
24
22
|
'CryptoKeyPrimaryArgs',
|
25
23
|
'CryptoKeyPrimaryArgsDict',
|
26
24
|
'CryptoKeyVersionAttestationArgs',
|
@@ -213,44 +211,6 @@ class CryptoKeyIAMMemberConditionArgs:
|
|
213
211
|
pulumi.set(self, "description", value)
|
214
212
|
|
215
213
|
|
216
|
-
if not MYPY:
|
217
|
-
class CryptoKeyKeyAccessJustificationsPolicyArgsDict(TypedDict):
|
218
|
-
allowed_access_reasons: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
219
|
-
"""
|
220
|
-
The list of allowed reasons for access to this CryptoKey. Zero allowed
|
221
|
-
access reasons means all encrypt, decrypt, and sign operations for
|
222
|
-
this CryptoKey will fail.
|
223
|
-
"""
|
224
|
-
elif False:
|
225
|
-
CryptoKeyKeyAccessJustificationsPolicyArgsDict: TypeAlias = Mapping[str, Any]
|
226
|
-
|
227
|
-
@pulumi.input_type
|
228
|
-
class CryptoKeyKeyAccessJustificationsPolicyArgs:
|
229
|
-
def __init__(__self__, *,
|
230
|
-
allowed_access_reasons: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
231
|
-
"""
|
232
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_access_reasons: The list of allowed reasons for access to this CryptoKey. Zero allowed
|
233
|
-
access reasons means all encrypt, decrypt, and sign operations for
|
234
|
-
this CryptoKey will fail.
|
235
|
-
"""
|
236
|
-
if allowed_access_reasons is not None:
|
237
|
-
pulumi.set(__self__, "allowed_access_reasons", allowed_access_reasons)
|
238
|
-
|
239
|
-
@property
|
240
|
-
@pulumi.getter(name="allowedAccessReasons")
|
241
|
-
def allowed_access_reasons(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
242
|
-
"""
|
243
|
-
The list of allowed reasons for access to this CryptoKey. Zero allowed
|
244
|
-
access reasons means all encrypt, decrypt, and sign operations for
|
245
|
-
this CryptoKey will fail.
|
246
|
-
"""
|
247
|
-
return pulumi.get(self, "allowed_access_reasons")
|
248
|
-
|
249
|
-
@allowed_access_reasons.setter
|
250
|
-
def allowed_access_reasons(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
251
|
-
pulumi.set(self, "allowed_access_reasons", value)
|
252
|
-
|
253
|
-
|
254
214
|
if not MYPY:
|
255
215
|
class CryptoKeyPrimaryArgsDict(TypedDict):
|
256
216
|
name: NotRequired[pulumi.Input[str]]
|
pulumi_gcp/kms/crypto_key.py
CHANGED
@@ -25,7 +25,6 @@ class CryptoKeyArgs:
|
|
25
25
|
crypto_key_backend: Optional[pulumi.Input[str]] = None,
|
26
26
|
destroy_scheduled_duration: Optional[pulumi.Input[str]] = None,
|
27
27
|
import_only: Optional[pulumi.Input[bool]] = None,
|
28
|
-
key_access_justifications_policy: Optional[pulumi.Input['CryptoKeyKeyAccessJustificationsPolicyArgs']] = None,
|
29
28
|
labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
30
29
|
name: Optional[pulumi.Input[str]] = None,
|
31
30
|
purpose: Optional[pulumi.Input[str]] = None,
|
@@ -44,15 +43,6 @@ class CryptoKeyArgs:
|
|
44
43
|
:param pulumi.Input[str] destroy_scheduled_duration: The period of time that versions of this key spend in the DESTROY_SCHEDULED state before transitioning to DESTROYED.
|
45
44
|
If not specified at creation time, the default duration is 30 days.
|
46
45
|
:param pulumi.Input[bool] import_only: Whether this key may contain imported versions only.
|
47
|
-
:param pulumi.Input['CryptoKeyKeyAccessJustificationsPolicyArgs'] key_access_justifications_policy: The policy used for Key Access Justifications Policy Enforcement. If this
|
48
|
-
field is present and this key is enrolled in Key Access Justifications
|
49
|
-
Policy Enforcement, the policy will be evaluated in encrypt, decrypt, and
|
50
|
-
sign operations, and the operation will fail if rejected by the policy. The
|
51
|
-
policy is defined by specifying zero or more allowed justification codes.
|
52
|
-
https://cloud.google.com/assured-workloads/key-access-justifications/docs/justification-codes
|
53
|
-
By default, this field is absent, and all justification codes are allowed.
|
54
|
-
This field is currently in beta and is subject to change.
|
55
|
-
Structure is documented below.
|
56
46
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] labels: Labels with user-defined metadata to apply to this resource.
|
57
47
|
|
58
48
|
**Note**: This field is non-authoritative, and will only manage the labels present in your configuration.
|
@@ -79,8 +69,6 @@ class CryptoKeyArgs:
|
|
79
69
|
pulumi.set(__self__, "destroy_scheduled_duration", destroy_scheduled_duration)
|
80
70
|
if import_only is not None:
|
81
71
|
pulumi.set(__self__, "import_only", import_only)
|
82
|
-
if key_access_justifications_policy is not None:
|
83
|
-
pulumi.set(__self__, "key_access_justifications_policy", key_access_justifications_policy)
|
84
72
|
if labels is not None:
|
85
73
|
pulumi.set(__self__, "labels", labels)
|
86
74
|
if name is not None:
|
@@ -148,26 +136,6 @@ class CryptoKeyArgs:
|
|
148
136
|
def import_only(self, value: Optional[pulumi.Input[bool]]):
|
149
137
|
pulumi.set(self, "import_only", value)
|
150
138
|
|
151
|
-
@property
|
152
|
-
@pulumi.getter(name="keyAccessJustificationsPolicy")
|
153
|
-
def key_access_justifications_policy(self) -> Optional[pulumi.Input['CryptoKeyKeyAccessJustificationsPolicyArgs']]:
|
154
|
-
"""
|
155
|
-
The policy used for Key Access Justifications Policy Enforcement. If this
|
156
|
-
field is present and this key is enrolled in Key Access Justifications
|
157
|
-
Policy Enforcement, the policy will be evaluated in encrypt, decrypt, and
|
158
|
-
sign operations, and the operation will fail if rejected by the policy. The
|
159
|
-
policy is defined by specifying zero or more allowed justification codes.
|
160
|
-
https://cloud.google.com/assured-workloads/key-access-justifications/docs/justification-codes
|
161
|
-
By default, this field is absent, and all justification codes are allowed.
|
162
|
-
This field is currently in beta and is subject to change.
|
163
|
-
Structure is documented below.
|
164
|
-
"""
|
165
|
-
return pulumi.get(self, "key_access_justifications_policy")
|
166
|
-
|
167
|
-
@key_access_justifications_policy.setter
|
168
|
-
def key_access_justifications_policy(self, value: Optional[pulumi.Input['CryptoKeyKeyAccessJustificationsPolicyArgs']]):
|
169
|
-
pulumi.set(self, "key_access_justifications_policy", value)
|
170
|
-
|
171
139
|
@property
|
172
140
|
@pulumi.getter
|
173
141
|
def labels(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
@@ -260,7 +228,6 @@ class _CryptoKeyState:
|
|
260
228
|
destroy_scheduled_duration: Optional[pulumi.Input[str]] = None,
|
261
229
|
effective_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
262
230
|
import_only: Optional[pulumi.Input[bool]] = None,
|
263
|
-
key_access_justifications_policy: Optional[pulumi.Input['CryptoKeyKeyAccessJustificationsPolicyArgs']] = None,
|
264
231
|
key_ring: Optional[pulumi.Input[str]] = None,
|
265
232
|
labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
266
233
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -278,15 +245,6 @@ class _CryptoKeyState:
|
|
278
245
|
If not specified at creation time, the default duration is 30 days.
|
279
246
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] effective_labels: All of labels (key/value pairs) present on the resource in GCP, including the labels configured through Pulumi, other clients and services.
|
280
247
|
:param pulumi.Input[bool] import_only: Whether this key may contain imported versions only.
|
281
|
-
:param pulumi.Input['CryptoKeyKeyAccessJustificationsPolicyArgs'] key_access_justifications_policy: The policy used for Key Access Justifications Policy Enforcement. If this
|
282
|
-
field is present and this key is enrolled in Key Access Justifications
|
283
|
-
Policy Enforcement, the policy will be evaluated in encrypt, decrypt, and
|
284
|
-
sign operations, and the operation will fail if rejected by the policy. The
|
285
|
-
policy is defined by specifying zero or more allowed justification codes.
|
286
|
-
https://cloud.google.com/assured-workloads/key-access-justifications/docs/justification-codes
|
287
|
-
By default, this field is absent, and all justification codes are allowed.
|
288
|
-
This field is currently in beta and is subject to change.
|
289
|
-
Structure is documented below.
|
290
248
|
:param pulumi.Input[str] key_ring: The KeyRing that this key belongs to.
|
291
249
|
Format: `'projects/{{project}}/locations/{{location}}/keyRings/{{keyRing}}'`.
|
292
250
|
|
@@ -324,8 +282,6 @@ class _CryptoKeyState:
|
|
324
282
|
pulumi.set(__self__, "effective_labels", effective_labels)
|
325
283
|
if import_only is not None:
|
326
284
|
pulumi.set(__self__, "import_only", import_only)
|
327
|
-
if key_access_justifications_policy is not None:
|
328
|
-
pulumi.set(__self__, "key_access_justifications_policy", key_access_justifications_policy)
|
329
285
|
if key_ring is not None:
|
330
286
|
pulumi.set(__self__, "key_ring", key_ring)
|
331
287
|
if labels is not None:
|
@@ -395,26 +351,6 @@ class _CryptoKeyState:
|
|
395
351
|
def import_only(self, value: Optional[pulumi.Input[bool]]):
|
396
352
|
pulumi.set(self, "import_only", value)
|
397
353
|
|
398
|
-
@property
|
399
|
-
@pulumi.getter(name="keyAccessJustificationsPolicy")
|
400
|
-
def key_access_justifications_policy(self) -> Optional[pulumi.Input['CryptoKeyKeyAccessJustificationsPolicyArgs']]:
|
401
|
-
"""
|
402
|
-
The policy used for Key Access Justifications Policy Enforcement. If this
|
403
|
-
field is present and this key is enrolled in Key Access Justifications
|
404
|
-
Policy Enforcement, the policy will be evaluated in encrypt, decrypt, and
|
405
|
-
sign operations, and the operation will fail if rejected by the policy. The
|
406
|
-
policy is defined by specifying zero or more allowed justification codes.
|
407
|
-
https://cloud.google.com/assured-workloads/key-access-justifications/docs/justification-codes
|
408
|
-
By default, this field is absent, and all justification codes are allowed.
|
409
|
-
This field is currently in beta and is subject to change.
|
410
|
-
Structure is documented below.
|
411
|
-
"""
|
412
|
-
return pulumi.get(self, "key_access_justifications_policy")
|
413
|
-
|
414
|
-
@key_access_justifications_policy.setter
|
415
|
-
def key_access_justifications_policy(self, value: Optional[pulumi.Input['CryptoKeyKeyAccessJustificationsPolicyArgs']]):
|
416
|
-
pulumi.set(self, "key_access_justifications_policy", value)
|
417
|
-
|
418
354
|
@property
|
419
355
|
@pulumi.getter(name="keyRing")
|
420
356
|
def key_ring(self) -> Optional[pulumi.Input[str]]:
|
@@ -551,7 +487,6 @@ class CryptoKey(pulumi.CustomResource):
|
|
551
487
|
crypto_key_backend: Optional[pulumi.Input[str]] = None,
|
552
488
|
destroy_scheduled_duration: Optional[pulumi.Input[str]] = None,
|
553
489
|
import_only: Optional[pulumi.Input[bool]] = None,
|
554
|
-
key_access_justifications_policy: Optional[pulumi.Input[Union['CryptoKeyKeyAccessJustificationsPolicyArgs', 'CryptoKeyKeyAccessJustificationsPolicyArgsDict']]] = None,
|
555
490
|
key_ring: Optional[pulumi.Input[str]] = None,
|
556
491
|
labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
557
492
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -635,15 +570,6 @@ class CryptoKey(pulumi.CustomResource):
|
|
635
570
|
:param pulumi.Input[str] destroy_scheduled_duration: The period of time that versions of this key spend in the DESTROY_SCHEDULED state before transitioning to DESTROYED.
|
636
571
|
If not specified at creation time, the default duration is 30 days.
|
637
572
|
:param pulumi.Input[bool] import_only: Whether this key may contain imported versions only.
|
638
|
-
:param pulumi.Input[Union['CryptoKeyKeyAccessJustificationsPolicyArgs', 'CryptoKeyKeyAccessJustificationsPolicyArgsDict']] key_access_justifications_policy: The policy used for Key Access Justifications Policy Enforcement. If this
|
639
|
-
field is present and this key is enrolled in Key Access Justifications
|
640
|
-
Policy Enforcement, the policy will be evaluated in encrypt, decrypt, and
|
641
|
-
sign operations, and the operation will fail if rejected by the policy. The
|
642
|
-
policy is defined by specifying zero or more allowed justification codes.
|
643
|
-
https://cloud.google.com/assured-workloads/key-access-justifications/docs/justification-codes
|
644
|
-
By default, this field is absent, and all justification codes are allowed.
|
645
|
-
This field is currently in beta and is subject to change.
|
646
|
-
Structure is documented below.
|
647
573
|
:param pulumi.Input[str] key_ring: The KeyRing that this key belongs to.
|
648
574
|
Format: `'projects/{{project}}/locations/{{location}}/keyRings/{{keyRing}}'`.
|
649
575
|
|
@@ -760,7 +686,6 @@ class CryptoKey(pulumi.CustomResource):
|
|
760
686
|
crypto_key_backend: Optional[pulumi.Input[str]] = None,
|
761
687
|
destroy_scheduled_duration: Optional[pulumi.Input[str]] = None,
|
762
688
|
import_only: Optional[pulumi.Input[bool]] = None,
|
763
|
-
key_access_justifications_policy: Optional[pulumi.Input[Union['CryptoKeyKeyAccessJustificationsPolicyArgs', 'CryptoKeyKeyAccessJustificationsPolicyArgsDict']]] = None,
|
764
689
|
key_ring: Optional[pulumi.Input[str]] = None,
|
765
690
|
labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
766
691
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -780,7 +705,6 @@ class CryptoKey(pulumi.CustomResource):
|
|
780
705
|
__props__.__dict__["crypto_key_backend"] = crypto_key_backend
|
781
706
|
__props__.__dict__["destroy_scheduled_duration"] = destroy_scheduled_duration
|
782
707
|
__props__.__dict__["import_only"] = import_only
|
783
|
-
__props__.__dict__["key_access_justifications_policy"] = key_access_justifications_policy
|
784
708
|
if key_ring is None and not opts.urn:
|
785
709
|
raise TypeError("Missing required property 'key_ring'")
|
786
710
|
__props__.__dict__["key_ring"] = key_ring
|
@@ -809,7 +733,6 @@ class CryptoKey(pulumi.CustomResource):
|
|
809
733
|
destroy_scheduled_duration: Optional[pulumi.Input[str]] = None,
|
810
734
|
effective_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
811
735
|
import_only: Optional[pulumi.Input[bool]] = None,
|
812
|
-
key_access_justifications_policy: Optional[pulumi.Input[Union['CryptoKeyKeyAccessJustificationsPolicyArgs', 'CryptoKeyKeyAccessJustificationsPolicyArgsDict']]] = None,
|
813
736
|
key_ring: Optional[pulumi.Input[str]] = None,
|
814
737
|
labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
815
738
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -832,15 +755,6 @@ class CryptoKey(pulumi.CustomResource):
|
|
832
755
|
If not specified at creation time, the default duration is 30 days.
|
833
756
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] effective_labels: All of labels (key/value pairs) present on the resource in GCP, including the labels configured through Pulumi, other clients and services.
|
834
757
|
:param pulumi.Input[bool] import_only: Whether this key may contain imported versions only.
|
835
|
-
:param pulumi.Input[Union['CryptoKeyKeyAccessJustificationsPolicyArgs', 'CryptoKeyKeyAccessJustificationsPolicyArgsDict']] key_access_justifications_policy: The policy used for Key Access Justifications Policy Enforcement. If this
|
836
|
-
field is present and this key is enrolled in Key Access Justifications
|
837
|
-
Policy Enforcement, the policy will be evaluated in encrypt, decrypt, and
|
838
|
-
sign operations, and the operation will fail if rejected by the policy. The
|
839
|
-
policy is defined by specifying zero or more allowed justification codes.
|
840
|
-
https://cloud.google.com/assured-workloads/key-access-justifications/docs/justification-codes
|
841
|
-
By default, this field is absent, and all justification codes are allowed.
|
842
|
-
This field is currently in beta and is subject to change.
|
843
|
-
Structure is documented below.
|
844
758
|
:param pulumi.Input[str] key_ring: The KeyRing that this key belongs to.
|
845
759
|
Format: `'projects/{{project}}/locations/{{location}}/keyRings/{{keyRing}}'`.
|
846
760
|
|
@@ -878,7 +792,6 @@ class CryptoKey(pulumi.CustomResource):
|
|
878
792
|
__props__.__dict__["destroy_scheduled_duration"] = destroy_scheduled_duration
|
879
793
|
__props__.__dict__["effective_labels"] = effective_labels
|
880
794
|
__props__.__dict__["import_only"] = import_only
|
881
|
-
__props__.__dict__["key_access_justifications_policy"] = key_access_justifications_policy
|
882
795
|
__props__.__dict__["key_ring"] = key_ring
|
883
796
|
__props__.__dict__["labels"] = labels
|
884
797
|
__props__.__dict__["name"] = name
|
@@ -924,22 +837,6 @@ class CryptoKey(pulumi.CustomResource):
|
|
924
837
|
"""
|
925
838
|
return pulumi.get(self, "import_only")
|
926
839
|
|
927
|
-
@property
|
928
|
-
@pulumi.getter(name="keyAccessJustificationsPolicy")
|
929
|
-
def key_access_justifications_policy(self) -> pulumi.Output['outputs.CryptoKeyKeyAccessJustificationsPolicy']:
|
930
|
-
"""
|
931
|
-
The policy used for Key Access Justifications Policy Enforcement. If this
|
932
|
-
field is present and this key is enrolled in Key Access Justifications
|
933
|
-
Policy Enforcement, the policy will be evaluated in encrypt, decrypt, and
|
934
|
-
sign operations, and the operation will fail if rejected by the policy. The
|
935
|
-
policy is defined by specifying zero or more allowed justification codes.
|
936
|
-
https://cloud.google.com/assured-workloads/key-access-justifications/docs/justification-codes
|
937
|
-
By default, this field is absent, and all justification codes are allowed.
|
938
|
-
This field is currently in beta and is subject to change.
|
939
|
-
Structure is documented below.
|
940
|
-
"""
|
941
|
-
return pulumi.get(self, "key_access_justifications_policy")
|
942
|
-
|
943
840
|
@property
|
944
841
|
@pulumi.getter(name="keyRing")
|
945
842
|
def key_ring(self) -> pulumi.Output[str]:
|
@@ -27,7 +27,7 @@ class GetKMSCryptoKeyResult:
|
|
27
27
|
"""
|
28
28
|
A collection of values returned by getKMSCryptoKey.
|
29
29
|
"""
|
30
|
-
def __init__(__self__, crypto_key_backend=None, destroy_scheduled_duration=None, effective_labels=None, id=None, import_only=None,
|
30
|
+
def __init__(__self__, crypto_key_backend=None, destroy_scheduled_duration=None, effective_labels=None, id=None, import_only=None, key_ring=None, labels=None, name=None, primaries=None, pulumi_labels=None, purpose=None, rotation_period=None, skip_initial_version_creation=None, version_templates=None):
|
31
31
|
if crypto_key_backend and not isinstance(crypto_key_backend, str):
|
32
32
|
raise TypeError("Expected argument 'crypto_key_backend' to be a str")
|
33
33
|
pulumi.set(__self__, "crypto_key_backend", crypto_key_backend)
|
@@ -43,9 +43,6 @@ class GetKMSCryptoKeyResult:
|
|
43
43
|
if import_only and not isinstance(import_only, bool):
|
44
44
|
raise TypeError("Expected argument 'import_only' to be a bool")
|
45
45
|
pulumi.set(__self__, "import_only", import_only)
|
46
|
-
if key_access_justifications_policies and not isinstance(key_access_justifications_policies, list):
|
47
|
-
raise TypeError("Expected argument 'key_access_justifications_policies' to be a list")
|
48
|
-
pulumi.set(__self__, "key_access_justifications_policies", key_access_justifications_policies)
|
49
46
|
if key_ring and not isinstance(key_ring, str):
|
50
47
|
raise TypeError("Expected argument 'key_ring' to be a str")
|
51
48
|
pulumi.set(__self__, "key_ring", key_ring)
|
@@ -102,11 +99,6 @@ class GetKMSCryptoKeyResult:
|
|
102
99
|
def import_only(self) -> bool:
|
103
100
|
return pulumi.get(self, "import_only")
|
104
101
|
|
105
|
-
@property
|
106
|
-
@pulumi.getter(name="keyAccessJustificationsPolicies")
|
107
|
-
def key_access_justifications_policies(self) -> Sequence['outputs.GetKMSCryptoKeyKeyAccessJustificationsPolicyResult']:
|
108
|
-
return pulumi.get(self, "key_access_justifications_policies")
|
109
|
-
|
110
102
|
@property
|
111
103
|
@pulumi.getter(name="keyRing")
|
112
104
|
def key_ring(self) -> str:
|
@@ -172,7 +164,6 @@ class AwaitableGetKMSCryptoKeyResult(GetKMSCryptoKeyResult):
|
|
172
164
|
effective_labels=self.effective_labels,
|
173
165
|
id=self.id,
|
174
166
|
import_only=self.import_only,
|
175
|
-
key_access_justifications_policies=self.key_access_justifications_policies,
|
176
167
|
key_ring=self.key_ring,
|
177
168
|
labels=self.labels,
|
178
169
|
name=self.name,
|
@@ -225,7 +216,6 @@ def get_kms_crypto_key(key_ring: Optional[str] = None,
|
|
225
216
|
effective_labels=pulumi.get(__ret__, 'effective_labels'),
|
226
217
|
id=pulumi.get(__ret__, 'id'),
|
227
218
|
import_only=pulumi.get(__ret__, 'import_only'),
|
228
|
-
key_access_justifications_policies=pulumi.get(__ret__, 'key_access_justifications_policies'),
|
229
219
|
key_ring=pulumi.get(__ret__, 'key_ring'),
|
230
220
|
labels=pulumi.get(__ret__, 'labels'),
|
231
221
|
name=pulumi.get(__ret__, 'name'),
|
pulumi_gcp/kms/outputs.py
CHANGED
@@ -18,7 +18,6 @@ from . import outputs
|
|
18
18
|
__all__ = [
|
19
19
|
'CryptoKeyIAMBindingCondition',
|
20
20
|
'CryptoKeyIAMMemberCondition',
|
21
|
-
'CryptoKeyKeyAccessJustificationsPolicy',
|
22
21
|
'CryptoKeyPrimary',
|
23
22
|
'CryptoKeyVersionAttestation',
|
24
23
|
'CryptoKeyVersionAttestationCertChains',
|
@@ -32,10 +31,8 @@ __all__ = [
|
|
32
31
|
'KeyRingImportJobAttestation',
|
33
32
|
'KeyRingImportJobPublicKey',
|
34
33
|
'GetCryptoKeysKeyResult',
|
35
|
-
'GetCryptoKeysKeyKeyAccessJustificationsPolicyResult',
|
36
34
|
'GetCryptoKeysKeyPrimaryResult',
|
37
35
|
'GetCryptoKeysKeyVersionTemplateResult',
|
38
|
-
'GetKMSCryptoKeyKeyAccessJustificationsPolicyResult',
|
39
36
|
'GetKMSCryptoKeyPrimaryResult',
|
40
37
|
'GetKMSCryptoKeyVersionPublicKeyResult',
|
41
38
|
'GetKMSCryptoKeyVersionTemplateResult',
|
@@ -140,46 +137,6 @@ class CryptoKeyIAMMemberCondition(dict):
|
|
140
137
|
return pulumi.get(self, "description")
|
141
138
|
|
142
139
|
|
143
|
-
@pulumi.output_type
|
144
|
-
class CryptoKeyKeyAccessJustificationsPolicy(dict):
|
145
|
-
@staticmethod
|
146
|
-
def __key_warning(key: str):
|
147
|
-
suggest = None
|
148
|
-
if key == "allowedAccessReasons":
|
149
|
-
suggest = "allowed_access_reasons"
|
150
|
-
|
151
|
-
if suggest:
|
152
|
-
pulumi.log.warn(f"Key '{key}' not found in CryptoKeyKeyAccessJustificationsPolicy. Access the value via the '{suggest}' property getter instead.")
|
153
|
-
|
154
|
-
def __getitem__(self, key: str) -> Any:
|
155
|
-
CryptoKeyKeyAccessJustificationsPolicy.__key_warning(key)
|
156
|
-
return super().__getitem__(key)
|
157
|
-
|
158
|
-
def get(self, key: str, default = None) -> Any:
|
159
|
-
CryptoKeyKeyAccessJustificationsPolicy.__key_warning(key)
|
160
|
-
return super().get(key, default)
|
161
|
-
|
162
|
-
def __init__(__self__, *,
|
163
|
-
allowed_access_reasons: Optional[Sequence[str]] = None):
|
164
|
-
"""
|
165
|
-
:param Sequence[str] allowed_access_reasons: The list of allowed reasons for access to this CryptoKey. Zero allowed
|
166
|
-
access reasons means all encrypt, decrypt, and sign operations for
|
167
|
-
this CryptoKey will fail.
|
168
|
-
"""
|
169
|
-
if allowed_access_reasons is not None:
|
170
|
-
pulumi.set(__self__, "allowed_access_reasons", allowed_access_reasons)
|
171
|
-
|
172
|
-
@property
|
173
|
-
@pulumi.getter(name="allowedAccessReasons")
|
174
|
-
def allowed_access_reasons(self) -> Optional[Sequence[str]]:
|
175
|
-
"""
|
176
|
-
The list of allowed reasons for access to this CryptoKey. Zero allowed
|
177
|
-
access reasons means all encrypt, decrypt, and sign operations for
|
178
|
-
this CryptoKey will fail.
|
179
|
-
"""
|
180
|
-
return pulumi.get(self, "allowed_access_reasons")
|
181
|
-
|
182
|
-
|
183
140
|
@pulumi.output_type
|
184
141
|
class CryptoKeyPrimary(dict):
|
185
142
|
def __init__(__self__, *,
|
@@ -915,7 +872,6 @@ class GetCryptoKeysKeyResult(dict):
|
|
915
872
|
effective_labels: Mapping[str, str],
|
916
873
|
id: str,
|
917
874
|
import_only: bool,
|
918
|
-
key_access_justifications_policies: Sequence['outputs.GetCryptoKeysKeyKeyAccessJustificationsPolicyResult'],
|
919
875
|
labels: Mapping[str, str],
|
920
876
|
primaries: Sequence['outputs.GetCryptoKeysKeyPrimaryResult'],
|
921
877
|
pulumi_labels: Mapping[str, str],
|
@@ -931,14 +887,6 @@ class GetCryptoKeysKeyResult(dict):
|
|
931
887
|
:param str destroy_scheduled_duration: The period of time that versions of this key spend in the DESTROY_SCHEDULED state before transitioning to DESTROYED.
|
932
888
|
If not specified at creation time, the default duration is 30 days.
|
933
889
|
:param bool import_only: Whether this key may contain imported versions only.
|
934
|
-
:param Sequence['GetCryptoKeysKeyKeyAccessJustificationsPolicyArgs'] key_access_justifications_policies: The policy used for Key Access Justifications Policy Enforcement. If this
|
935
|
-
field is present and this key is enrolled in Key Access Justifications
|
936
|
-
Policy Enforcement, the policy will be evaluated in encrypt, decrypt, and
|
937
|
-
sign operations, and the operation will fail if rejected by the policy. The
|
938
|
-
policy is defined by specifying zero or more allowed justification codes.
|
939
|
-
https://cloud.google.com/assured-workloads/key-access-justifications/docs/justification-codes
|
940
|
-
By default, this field is absent, and all justification codes are allowed.
|
941
|
-
This field is currently in beta and is subject to change.
|
942
890
|
:param Mapping[str, str] labels: Labels with user-defined metadata to apply to this resource.
|
943
891
|
|
944
892
|
|
@@ -968,7 +916,6 @@ class GetCryptoKeysKeyResult(dict):
|
|
968
916
|
pulumi.set(__self__, "effective_labels", effective_labels)
|
969
917
|
pulumi.set(__self__, "id", id)
|
970
918
|
pulumi.set(__self__, "import_only", import_only)
|
971
|
-
pulumi.set(__self__, "key_access_justifications_policies", key_access_justifications_policies)
|
972
919
|
pulumi.set(__self__, "labels", labels)
|
973
920
|
pulumi.set(__self__, "primaries", primaries)
|
974
921
|
pulumi.set(__self__, "pulumi_labels", pulumi_labels)
|
@@ -1017,21 +964,6 @@ class GetCryptoKeysKeyResult(dict):
|
|
1017
964
|
"""
|
1018
965
|
return pulumi.get(self, "import_only")
|
1019
966
|
|
1020
|
-
@property
|
1021
|
-
@pulumi.getter(name="keyAccessJustificationsPolicies")
|
1022
|
-
def key_access_justifications_policies(self) -> Sequence['outputs.GetCryptoKeysKeyKeyAccessJustificationsPolicyResult']:
|
1023
|
-
"""
|
1024
|
-
The policy used for Key Access Justifications Policy Enforcement. If this
|
1025
|
-
field is present and this key is enrolled in Key Access Justifications
|
1026
|
-
Policy Enforcement, the policy will be evaluated in encrypt, decrypt, and
|
1027
|
-
sign operations, and the operation will fail if rejected by the policy. The
|
1028
|
-
policy is defined by specifying zero or more allowed justification codes.
|
1029
|
-
https://cloud.google.com/assured-workloads/key-access-justifications/docs/justification-codes
|
1030
|
-
By default, this field is absent, and all justification codes are allowed.
|
1031
|
-
This field is currently in beta and is subject to change.
|
1032
|
-
"""
|
1033
|
-
return pulumi.get(self, "key_access_justifications_policies")
|
1034
|
-
|
1035
967
|
@property
|
1036
968
|
@pulumi.getter
|
1037
969
|
def labels(self) -> Mapping[str, str]:
|
@@ -1119,28 +1051,6 @@ class GetCryptoKeysKeyResult(dict):
|
|
1119
1051
|
return pulumi.get(self, "name")
|
1120
1052
|
|
1121
1053
|
|
1122
|
-
@pulumi.output_type
|
1123
|
-
class GetCryptoKeysKeyKeyAccessJustificationsPolicyResult(dict):
|
1124
|
-
def __init__(__self__, *,
|
1125
|
-
allowed_access_reasons: Sequence[str]):
|
1126
|
-
"""
|
1127
|
-
:param Sequence[str] allowed_access_reasons: The list of allowed reasons for access to this CryptoKey. Zero allowed
|
1128
|
-
access reasons means all encrypt, decrypt, and sign operations for
|
1129
|
-
this CryptoKey will fail.
|
1130
|
-
"""
|
1131
|
-
pulumi.set(__self__, "allowed_access_reasons", allowed_access_reasons)
|
1132
|
-
|
1133
|
-
@property
|
1134
|
-
@pulumi.getter(name="allowedAccessReasons")
|
1135
|
-
def allowed_access_reasons(self) -> Sequence[str]:
|
1136
|
-
"""
|
1137
|
-
The list of allowed reasons for access to this CryptoKey. Zero allowed
|
1138
|
-
access reasons means all encrypt, decrypt, and sign operations for
|
1139
|
-
this CryptoKey will fail.
|
1140
|
-
"""
|
1141
|
-
return pulumi.get(self, "allowed_access_reasons")
|
1142
|
-
|
1143
|
-
|
1144
1054
|
@pulumi.output_type
|
1145
1055
|
class GetCryptoKeysKeyPrimaryResult(dict):
|
1146
1056
|
def __init__(__self__, *,
|
@@ -1201,28 +1111,6 @@ class GetCryptoKeysKeyVersionTemplateResult(dict):
|
|
1201
1111
|
return pulumi.get(self, "protection_level")
|
1202
1112
|
|
1203
1113
|
|
1204
|
-
@pulumi.output_type
|
1205
|
-
class GetKMSCryptoKeyKeyAccessJustificationsPolicyResult(dict):
|
1206
|
-
def __init__(__self__, *,
|
1207
|
-
allowed_access_reasons: Sequence[str]):
|
1208
|
-
"""
|
1209
|
-
:param Sequence[str] allowed_access_reasons: The list of allowed reasons for access to this CryptoKey. Zero allowed
|
1210
|
-
access reasons means all encrypt, decrypt, and sign operations for
|
1211
|
-
this CryptoKey will fail.
|
1212
|
-
"""
|
1213
|
-
pulumi.set(__self__, "allowed_access_reasons", allowed_access_reasons)
|
1214
|
-
|
1215
|
-
@property
|
1216
|
-
@pulumi.getter(name="allowedAccessReasons")
|
1217
|
-
def allowed_access_reasons(self) -> Sequence[str]:
|
1218
|
-
"""
|
1219
|
-
The list of allowed reasons for access to this CryptoKey. Zero allowed
|
1220
|
-
access reasons means all encrypt, decrypt, and sign operations for
|
1221
|
-
this CryptoKey will fail.
|
1222
|
-
"""
|
1223
|
-
return pulumi.get(self, "allowed_access_reasons")
|
1224
|
-
|
1225
|
-
|
1226
1114
|
@pulumi.output_type
|
1227
1115
|
class GetKMSCryptoKeyPrimaryResult(dict):
|
1228
1116
|
def __init__(__self__, *,
|
@@ -863,7 +863,7 @@ class AddressGroup(pulumi.CustomResource):
|
|
863
863
|
|
864
864
|
@property
|
865
865
|
@pulumi.getter
|
866
|
-
def purposes(self) -> pulumi.Output[Sequence[str]]:
|
866
|
+
def purposes(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
867
867
|
"""
|
868
868
|
List of supported purposes of the Address Group.
|
869
869
|
Each value may be one of: `DEFAULT`, `CLOUD_ARMOR`.
|
@@ -449,8 +449,6 @@ class Entitlement(pulumi.CustomResource):
|
|
449
449
|
requester_justification_config: Optional[pulumi.Input[Union['EntitlementRequesterJustificationConfigArgs', 'EntitlementRequesterJustificationConfigArgsDict']]] = None,
|
450
450
|
__props__=None):
|
451
451
|
"""
|
452
|
-
An Entitlement defines the eligibility of a set of users to obtain a predefined access for some time possibly after going through an approval workflow.
|
453
|
-
|
454
452
|
## Example Usage
|
455
453
|
|
456
454
|
### Privileged Access Manager Entitlement Basic
|
@@ -537,8 +535,6 @@ class Entitlement(pulumi.CustomResource):
|
|
537
535
|
args: EntitlementArgs,
|
538
536
|
opts: Optional[pulumi.ResourceOptions] = None):
|
539
537
|
"""
|
540
|
-
An Entitlement defines the eligibility of a set of users to obtain a predefined access for some time possibly after going through an approval workflow.
|
541
|
-
|
542
538
|
## Example Usage
|
543
539
|
|
544
540
|
### Privileged Access Manager Entitlement Basic
|