pulumi-gcp 7.7.0a1705990280__py3-none-any.whl → 7.8.0a1706310284__py3-none-any.whl

Sign up to get free protection for your applications and to get access to all the features.
Files changed (49) hide show
  1. pulumi_gcp/__init__.py +56 -0
  2. pulumi_gcp/alloydb/cluster.py +26 -21
  3. pulumi_gcp/bigquery/_inputs.py +231 -0
  4. pulumi_gcp/bigquery/outputs.py +229 -0
  5. pulumi_gcp/bigquery/routine.py +256 -10
  6. pulumi_gcp/bigquery/table.py +47 -0
  7. pulumi_gcp/cloudbuildv2/repository.py +60 -53
  8. pulumi_gcp/cloudrunv2/_inputs.py +176 -4
  9. pulumi_gcp/cloudrunv2/outputs.py +256 -3
  10. pulumi_gcp/cloudrunv2/service.py +148 -0
  11. pulumi_gcp/composer/_inputs.py +24 -0
  12. pulumi_gcp/composer/outputs.py +34 -0
  13. pulumi_gcp/compute/_inputs.py +4 -2
  14. pulumi_gcp/compute/disk.py +14 -14
  15. pulumi_gcp/compute/outputs.py +4 -2
  16. pulumi_gcp/healthcare/fhir_store.py +56 -0
  17. pulumi_gcp/kms/crypto_key.py +2 -2
  18. pulumi_gcp/kms/crypto_key_iam_binding.py +2 -2
  19. pulumi_gcp/kms/crypto_key_iam_member.py +2 -2
  20. pulumi_gcp/kms/crypto_key_iam_policy.py +2 -2
  21. pulumi_gcp/kms/crypto_key_version.py +2 -2
  22. pulumi_gcp/kms/secret_ciphertext.py +2 -2
  23. pulumi_gcp/netapp/__init__.py +4 -0
  24. pulumi_gcp/netapp/_inputs.py +643 -0
  25. pulumi_gcp/netapp/backup_policy.py +829 -0
  26. pulumi_gcp/netapp/kmsconfig.py +2 -2
  27. pulumi_gcp/netapp/outputs.py +651 -0
  28. pulumi_gcp/netapp/volume.py +1467 -0
  29. pulumi_gcp/networksecurity/__init__.py +5 -0
  30. pulumi_gcp/networksecurity/_inputs.py +228 -0
  31. pulumi_gcp/networksecurity/address_group_iam_binding.py +324 -0
  32. pulumi_gcp/networksecurity/address_group_iam_member.py +324 -0
  33. pulumi_gcp/networksecurity/address_group_iam_policy.py +492 -0
  34. pulumi_gcp/networksecurity/get_address_group_iam_policy.py +144 -0
  35. pulumi_gcp/networksecurity/outputs.py +212 -0
  36. pulumi_gcp/networksecurity/security_profile.py +800 -0
  37. pulumi_gcp/networkservices/gateway.py +1 -1
  38. pulumi_gcp/organizations/get_folders.py +1 -1
  39. pulumi_gcp/orgpolicy/_inputs.py +12 -12
  40. pulumi_gcp/orgpolicy/outputs.py +12 -12
  41. pulumi_gcp/securesourcemanager/instance.py +4 -2
  42. pulumi_gcp/storage/insights_report_config.py +12 -10
  43. pulumi_gcp/vertex/__init__.py +1 -0
  44. pulumi_gcp/vertex/ai_feature_group_feature.py +767 -0
  45. pulumi_gcp/workstations/workstation_config.py +47 -0
  46. {pulumi_gcp-7.7.0a1705990280.dist-info → pulumi_gcp-7.8.0a1706310284.dist-info}/METADATA +1 -1
  47. {pulumi_gcp-7.7.0a1705990280.dist-info → pulumi_gcp-7.8.0a1706310284.dist-info}/RECORD +49 -39
  48. {pulumi_gcp-7.7.0a1705990280.dist-info → pulumi_gcp-7.8.0a1706310284.dist-info}/WHEEL +0 -0
  49. {pulumi_gcp-7.7.0a1705990280.dist-info → pulumi_gcp-7.8.0a1706310284.dist-info}/top_level.txt +0 -0
@@ -1268,7 +1268,7 @@ class Gateway(pulumi.CustomResource):
1268
1268
 
1269
1269
  @property
1270
1270
  @pulumi.getter
1271
- def addresses(self) -> pulumi.Output[Optional[Sequence[str]]]:
1271
+ def addresses(self) -> pulumi.Output[Sequence[str]]:
1272
1272
  """
1273
1273
  Zero or one IPv4-address on which the Gateway will receive the traffic. When no address is provided,
1274
1274
  an IP from the subnetwork is allocated This field only applies to gateways of type 'SECURE_WEB_GATEWAY'.
@@ -37,7 +37,7 @@ class GetFoldersResult:
37
37
  @pulumi.getter
38
38
  def folders(self) -> Sequence['outputs.GetFoldersFolderResult']:
39
39
  """
40
- A list of projects matching the provided filter. Structure is defined below.
40
+ A list of folders matching the provided filter. Structure is defined below.
41
41
  """
42
42
  return pulumi.get(self, "folders")
43
43
 
@@ -116,10 +116,10 @@ class PolicyDryRunSpecRuleArgs:
116
116
  enforce: Optional[pulumi.Input[str]] = None,
117
117
  values: Optional[pulumi.Input['PolicyDryRunSpecRuleValuesArgs']] = None):
118
118
  """
119
- :param pulumi.Input[str] allow_all: Setting this to true means that all values are allowed. This field can be set only in Policies for list constraints.
119
+ :param pulumi.Input[str] allow_all: Setting this to `"TRUE"` means that all values are allowed. This field can be set only in Policies for list constraints.
120
120
  :param pulumi.Input['PolicyDryRunSpecRuleConditionArgs'] condition: A condition which determines whether this rule is used in the evaluation of the policy. When set, the `expression` field in the `Expr' must include from 1 to 10 subexpressions, joined by the "||" or "&&" operators. Each subexpression must be of the form "resource.matchTag('/tag_key_short_name, 'tag_value_short_name')". or "resource.matchTagId('tagKeys/key_id', 'tagValues/value_id')". where key_name and value_name are the resource names for Label Keys and Values. These names are available from the Tag Manager Service. An example expression is: "resource.matchTag('123456789/environment, 'prod')". or "resource.matchTagId('tagKeys/123', 'tagValues/456')".
121
- :param pulumi.Input[str] deny_all: Setting this to true means that all values are denied. This field can be set only in Policies for list constraints.
122
- :param pulumi.Input[str] enforce: If `true`, then the `Policy` is enforced. If `false`, then any configuration is acceptable. This field can be set only in Policies for boolean constraints.
121
+ :param pulumi.Input[str] deny_all: Setting this to `"TRUE"` means that all values are denied. This field can be set only in Policies for list constraints.
122
+ :param pulumi.Input[str] enforce: If `"TRUE"`, then the `Policy` is enforced. If `"FALSE"`, then any configuration is acceptable. This field can be set only in Policies for boolean constraints.
123
123
  :param pulumi.Input['PolicyDryRunSpecRuleValuesArgs'] values: List of values to be used for this PolicyRule. This field can be set only in Policies for list constraints.
124
124
  """
125
125
  if allow_all is not None:
@@ -137,7 +137,7 @@ class PolicyDryRunSpecRuleArgs:
137
137
  @pulumi.getter(name="allowAll")
138
138
  def allow_all(self) -> Optional[pulumi.Input[str]]:
139
139
  """
140
- Setting this to true means that all values are allowed. This field can be set only in Policies for list constraints.
140
+ Setting this to `"TRUE"` means that all values are allowed. This field can be set only in Policies for list constraints.
141
141
  """
142
142
  return pulumi.get(self, "allow_all")
143
143
 
@@ -161,7 +161,7 @@ class PolicyDryRunSpecRuleArgs:
161
161
  @pulumi.getter(name="denyAll")
162
162
  def deny_all(self) -> Optional[pulumi.Input[str]]:
163
163
  """
164
- Setting this to true means that all values are denied. This field can be set only in Policies for list constraints.
164
+ Setting this to `"TRUE"` means that all values are denied. This field can be set only in Policies for list constraints.
165
165
  """
166
166
  return pulumi.get(self, "deny_all")
167
167
 
@@ -173,7 +173,7 @@ class PolicyDryRunSpecRuleArgs:
173
173
  @pulumi.getter
174
174
  def enforce(self) -> Optional[pulumi.Input[str]]:
175
175
  """
176
- If `true`, then the `Policy` is enforced. If `false`, then any configuration is acceptable. This field can be set only in Policies for boolean constraints.
176
+ If `"TRUE"`, then the `Policy` is enforced. If `"FALSE"`, then any configuration is acceptable. This field can be set only in Policies for boolean constraints.
177
177
  """
178
178
  return pulumi.get(self, "enforce")
179
179
 
@@ -400,10 +400,10 @@ class PolicySpecRuleArgs:
400
400
  enforce: Optional[pulumi.Input[str]] = None,
401
401
  values: Optional[pulumi.Input['PolicySpecRuleValuesArgs']] = None):
402
402
  """
403
- :param pulumi.Input[str] allow_all: Setting this to true means that all values are allowed. This field can be set only in Policies for list constraints.
403
+ :param pulumi.Input[str] allow_all: Setting this to `"TRUE"` means that all values are allowed. This field can be set only in Policies for list constraints.
404
404
  :param pulumi.Input['PolicySpecRuleConditionArgs'] condition: A condition which determines whether this rule is used in the evaluation of the policy. When set, the `expression` field in the `Expr' must include from 1 to 10 subexpressions, joined by the "||" or "&&" operators. Each subexpression must be of the form "resource.matchTag('/tag_key_short_name, 'tag_value_short_name')". or "resource.matchTagId('tagKeys/key_id', 'tagValues/value_id')". where key_name and value_name are the resource names for Label Keys and Values. These names are available from the Tag Manager Service. An example expression is: "resource.matchTag('123456789/environment, 'prod')". or "resource.matchTagId('tagKeys/123', 'tagValues/456')".
405
- :param pulumi.Input[str] deny_all: Setting this to true means that all values are denied. This field can be set only in Policies for list constraints.
406
- :param pulumi.Input[str] enforce: If `true`, then the `Policy` is enforced. If `false`, then any configuration is acceptable. This field can be set only in Policies for boolean constraints.
405
+ :param pulumi.Input[str] deny_all: Setting this to `"TRUE"` means that all values are denied. This field can be set only in Policies for list constraints.
406
+ :param pulumi.Input[str] enforce: If `"TRUE"`, then the `Policy` is enforced. If `"FALSE"`, then any configuration is acceptable. This field can be set only in Policies for boolean constraints.
407
407
  :param pulumi.Input['PolicySpecRuleValuesArgs'] values: List of values to be used for this PolicyRule. This field can be set only in Policies for list constraints.
408
408
  """
409
409
  if allow_all is not None:
@@ -421,7 +421,7 @@ class PolicySpecRuleArgs:
421
421
  @pulumi.getter(name="allowAll")
422
422
  def allow_all(self) -> Optional[pulumi.Input[str]]:
423
423
  """
424
- Setting this to true means that all values are allowed. This field can be set only in Policies for list constraints.
424
+ Setting this to `"TRUE"` means that all values are allowed. This field can be set only in Policies for list constraints.
425
425
  """
426
426
  return pulumi.get(self, "allow_all")
427
427
 
@@ -445,7 +445,7 @@ class PolicySpecRuleArgs:
445
445
  @pulumi.getter(name="denyAll")
446
446
  def deny_all(self) -> Optional[pulumi.Input[str]]:
447
447
  """
448
- Setting this to true means that all values are denied. This field can be set only in Policies for list constraints.
448
+ Setting this to `"TRUE"` means that all values are denied. This field can be set only in Policies for list constraints.
449
449
  """
450
450
  return pulumi.get(self, "deny_all")
451
451
 
@@ -457,7 +457,7 @@ class PolicySpecRuleArgs:
457
457
  @pulumi.getter
458
458
  def enforce(self) -> Optional[pulumi.Input[str]]:
459
459
  """
460
- If `true`, then the `Policy` is enforced. If `false`, then any configuration is acceptable. This field can be set only in Policies for boolean constraints.
460
+ If `"TRUE"`, then the `Policy` is enforced. If `"FALSE"`, then any configuration is acceptable. This field can be set only in Policies for boolean constraints.
461
461
  """
462
462
  return pulumi.get(self, "enforce")
463
463
 
@@ -135,10 +135,10 @@ class PolicyDryRunSpecRule(dict):
135
135
  enforce: Optional[str] = None,
136
136
  values: Optional['outputs.PolicyDryRunSpecRuleValues'] = None):
137
137
  """
138
- :param str allow_all: Setting this to true means that all values are allowed. This field can be set only in Policies for list constraints.
138
+ :param str allow_all: Setting this to `"TRUE"` means that all values are allowed. This field can be set only in Policies for list constraints.
139
139
  :param 'PolicyDryRunSpecRuleConditionArgs' condition: A condition which determines whether this rule is used in the evaluation of the policy. When set, the `expression` field in the `Expr' must include from 1 to 10 subexpressions, joined by the "||" or "&&" operators. Each subexpression must be of the form "resource.matchTag('/tag_key_short_name, 'tag_value_short_name')". or "resource.matchTagId('tagKeys/key_id', 'tagValues/value_id')". where key_name and value_name are the resource names for Label Keys and Values. These names are available from the Tag Manager Service. An example expression is: "resource.matchTag('123456789/environment, 'prod')". or "resource.matchTagId('tagKeys/123', 'tagValues/456')".
140
- :param str deny_all: Setting this to true means that all values are denied. This field can be set only in Policies for list constraints.
141
- :param str enforce: If `true`, then the `Policy` is enforced. If `false`, then any configuration is acceptable. This field can be set only in Policies for boolean constraints.
140
+ :param str deny_all: Setting this to `"TRUE"` means that all values are denied. This field can be set only in Policies for list constraints.
141
+ :param str enforce: If `"TRUE"`, then the `Policy` is enforced. If `"FALSE"`, then any configuration is acceptable. This field can be set only in Policies for boolean constraints.
142
142
  :param 'PolicyDryRunSpecRuleValuesArgs' values: List of values to be used for this PolicyRule. This field can be set only in Policies for list constraints.
143
143
  """
144
144
  if allow_all is not None:
@@ -156,7 +156,7 @@ class PolicyDryRunSpecRule(dict):
156
156
  @pulumi.getter(name="allowAll")
157
157
  def allow_all(self) -> Optional[str]:
158
158
  """
159
- Setting this to true means that all values are allowed. This field can be set only in Policies for list constraints.
159
+ Setting this to `"TRUE"` means that all values are allowed. This field can be set only in Policies for list constraints.
160
160
  """
161
161
  return pulumi.get(self, "allow_all")
162
162
 
@@ -172,7 +172,7 @@ class PolicyDryRunSpecRule(dict):
172
172
  @pulumi.getter(name="denyAll")
173
173
  def deny_all(self) -> Optional[str]:
174
174
  """
175
- Setting this to true means that all values are denied. This field can be set only in Policies for list constraints.
175
+ Setting this to `"TRUE"` means that all values are denied. This field can be set only in Policies for list constraints.
176
176
  """
177
177
  return pulumi.get(self, "deny_all")
178
178
 
@@ -180,7 +180,7 @@ class PolicyDryRunSpecRule(dict):
180
180
  @pulumi.getter
181
181
  def enforce(self) -> Optional[str]:
182
182
  """
183
- If `true`, then the `Policy` is enforced. If `false`, then any configuration is acceptable. This field can be set only in Policies for boolean constraints.
183
+ If `"TRUE"`, then the `Policy` is enforced. If `"FALSE"`, then any configuration is acceptable. This field can be set only in Policies for boolean constraints.
184
184
  """
185
185
  return pulumi.get(self, "enforce")
186
186
 
@@ -412,10 +412,10 @@ class PolicySpecRule(dict):
412
412
  enforce: Optional[str] = None,
413
413
  values: Optional['outputs.PolicySpecRuleValues'] = None):
414
414
  """
415
- :param str allow_all: Setting this to true means that all values are allowed. This field can be set only in Policies for list constraints.
415
+ :param str allow_all: Setting this to `"TRUE"` means that all values are allowed. This field can be set only in Policies for list constraints.
416
416
  :param 'PolicySpecRuleConditionArgs' condition: A condition which determines whether this rule is used in the evaluation of the policy. When set, the `expression` field in the `Expr' must include from 1 to 10 subexpressions, joined by the "||" or "&&" operators. Each subexpression must be of the form "resource.matchTag('/tag_key_short_name, 'tag_value_short_name')". or "resource.matchTagId('tagKeys/key_id', 'tagValues/value_id')". where key_name and value_name are the resource names for Label Keys and Values. These names are available from the Tag Manager Service. An example expression is: "resource.matchTag('123456789/environment, 'prod')". or "resource.matchTagId('tagKeys/123', 'tagValues/456')".
417
- :param str deny_all: Setting this to true means that all values are denied. This field can be set only in Policies for list constraints.
418
- :param str enforce: If `true`, then the `Policy` is enforced. If `false`, then any configuration is acceptable. This field can be set only in Policies for boolean constraints.
417
+ :param str deny_all: Setting this to `"TRUE"` means that all values are denied. This field can be set only in Policies for list constraints.
418
+ :param str enforce: If `"TRUE"`, then the `Policy` is enforced. If `"FALSE"`, then any configuration is acceptable. This field can be set only in Policies for boolean constraints.
419
419
  :param 'PolicySpecRuleValuesArgs' values: List of values to be used for this PolicyRule. This field can be set only in Policies for list constraints.
420
420
  """
421
421
  if allow_all is not None:
@@ -433,7 +433,7 @@ class PolicySpecRule(dict):
433
433
  @pulumi.getter(name="allowAll")
434
434
  def allow_all(self) -> Optional[str]:
435
435
  """
436
- Setting this to true means that all values are allowed. This field can be set only in Policies for list constraints.
436
+ Setting this to `"TRUE"` means that all values are allowed. This field can be set only in Policies for list constraints.
437
437
  """
438
438
  return pulumi.get(self, "allow_all")
439
439
 
@@ -449,7 +449,7 @@ class PolicySpecRule(dict):
449
449
  @pulumi.getter(name="denyAll")
450
450
  def deny_all(self) -> Optional[str]:
451
451
  """
452
- Setting this to true means that all values are denied. This field can be set only in Policies for list constraints.
452
+ Setting this to `"TRUE"` means that all values are denied. This field can be set only in Policies for list constraints.
453
453
  """
454
454
  return pulumi.get(self, "deny_all")
455
455
 
@@ -457,7 +457,7 @@ class PolicySpecRule(dict):
457
457
  @pulumi.getter
458
458
  def enforce(self) -> Optional[str]:
459
459
  """
460
- If `true`, then the `Policy` is enforced. If `false`, then any configuration is acceptable. This field can be set only in Policies for boolean constraints.
460
+ If `"TRUE"`, then the `Policy` is enforced. If `"FALSE"`, then any configuration is acceptable. This field can be set only in Policies for boolean constraints.
461
461
  """
462
462
  return pulumi.get(self, "enforce")
463
463
 
@@ -434,7 +434,8 @@ class Instance(pulumi.CustomResource):
434
434
  default = gcp.securesourcemanager.Instance("default",
435
435
  location="us-central1",
436
436
  instance_id="my-instance",
437
- kms_key=crypto_key.id)
437
+ kms_key=crypto_key.id,
438
+ opts=pulumi.ResourceOptions(depends_on=[crypto_key_binding]))
438
439
  ```
439
440
 
440
441
  ## Import
@@ -527,7 +528,8 @@ class Instance(pulumi.CustomResource):
527
528
  default = gcp.securesourcemanager.Instance("default",
528
529
  location="us-central1",
529
530
  instance_id="my-instance",
530
- kms_key=crypto_key.id)
531
+ kms_key=crypto_key.id,
532
+ opts=pulumi.ResourceOptions(depends_on=[crypto_key_binding]))
531
533
  ```
532
534
 
533
535
  ## Import
@@ -288,6 +288,10 @@ class InsightsReportConfig(pulumi.CustomResource):
288
288
  location="us-central1",
289
289
  force_destroy=True,
290
290
  uniform_bucket_level_access=True)
291
+ admin = gcp.storage.BucketIAMMember("admin",
292
+ bucket=report_bucket.name,
293
+ role="roles/storage.admin",
294
+ member=f"serviceAccount:service-{project.number}@gcp-sa-storageinsights.iam.gserviceaccount.com")
291
295
  config = gcp.storage.InsightsReportConfig("config",
292
296
  display_name="Test Report Config",
293
297
  location="us-central1",
@@ -322,11 +326,8 @@ class InsightsReportConfig(pulumi.CustomResource):
322
326
  bucket=report_bucket.name,
323
327
  destination_path="test-insights-reports",
324
328
  ),
325
- ))
326
- admin = gcp.storage.BucketIAMMember("admin",
327
- bucket=report_bucket.name,
328
- role="roles/storage.admin",
329
- member=f"serviceAccount:service-{project.number}@gcp-sa-storageinsights.iam.gserviceaccount.com")
329
+ ),
330
+ opts=pulumi.ResourceOptions(depends_on=[admin]))
330
331
  ```
331
332
 
332
333
  ## Import
@@ -394,6 +395,10 @@ class InsightsReportConfig(pulumi.CustomResource):
394
395
  location="us-central1",
395
396
  force_destroy=True,
396
397
  uniform_bucket_level_access=True)
398
+ admin = gcp.storage.BucketIAMMember("admin",
399
+ bucket=report_bucket.name,
400
+ role="roles/storage.admin",
401
+ member=f"serviceAccount:service-{project.number}@gcp-sa-storageinsights.iam.gserviceaccount.com")
397
402
  config = gcp.storage.InsightsReportConfig("config",
398
403
  display_name="Test Report Config",
399
404
  location="us-central1",
@@ -428,11 +433,8 @@ class InsightsReportConfig(pulumi.CustomResource):
428
433
  bucket=report_bucket.name,
429
434
  destination_path="test-insights-reports",
430
435
  ),
431
- ))
432
- admin = gcp.storage.BucketIAMMember("admin",
433
- bucket=report_bucket.name,
434
- role="roles/storage.admin",
435
- member=f"serviceAccount:service-{project.number}@gcp-sa-storageinsights.iam.gserviceaccount.com")
436
+ ),
437
+ opts=pulumi.ResourceOptions(depends_on=[admin]))
436
438
  ```
437
439
 
438
440
  ## Import
@@ -11,6 +11,7 @@ from .ai_endpoint_iam_binding import *
11
11
  from .ai_endpoint_iam_member import *
12
12
  from .ai_endpoint_iam_policy import *
13
13
  from .ai_feature_group import *
14
+ from .ai_feature_group_feature import *
14
15
  from .ai_feature_online_store import *
15
16
  from .ai_feature_online_store_featureview import *
16
17
  from .ai_feature_store import *