pulumi-gcp 7.7.0a1705990280__py3-none-any.whl → 7.8.0a1706310284__py3-none-any.whl

Sign up to get free protection for your applications and to get access to all the features.
Files changed (49) hide show
  1. pulumi_gcp/__init__.py +56 -0
  2. pulumi_gcp/alloydb/cluster.py +26 -21
  3. pulumi_gcp/bigquery/_inputs.py +231 -0
  4. pulumi_gcp/bigquery/outputs.py +229 -0
  5. pulumi_gcp/bigquery/routine.py +256 -10
  6. pulumi_gcp/bigquery/table.py +47 -0
  7. pulumi_gcp/cloudbuildv2/repository.py +60 -53
  8. pulumi_gcp/cloudrunv2/_inputs.py +176 -4
  9. pulumi_gcp/cloudrunv2/outputs.py +256 -3
  10. pulumi_gcp/cloudrunv2/service.py +148 -0
  11. pulumi_gcp/composer/_inputs.py +24 -0
  12. pulumi_gcp/composer/outputs.py +34 -0
  13. pulumi_gcp/compute/_inputs.py +4 -2
  14. pulumi_gcp/compute/disk.py +14 -14
  15. pulumi_gcp/compute/outputs.py +4 -2
  16. pulumi_gcp/healthcare/fhir_store.py +56 -0
  17. pulumi_gcp/kms/crypto_key.py +2 -2
  18. pulumi_gcp/kms/crypto_key_iam_binding.py +2 -2
  19. pulumi_gcp/kms/crypto_key_iam_member.py +2 -2
  20. pulumi_gcp/kms/crypto_key_iam_policy.py +2 -2
  21. pulumi_gcp/kms/crypto_key_version.py +2 -2
  22. pulumi_gcp/kms/secret_ciphertext.py +2 -2
  23. pulumi_gcp/netapp/__init__.py +4 -0
  24. pulumi_gcp/netapp/_inputs.py +643 -0
  25. pulumi_gcp/netapp/backup_policy.py +829 -0
  26. pulumi_gcp/netapp/kmsconfig.py +2 -2
  27. pulumi_gcp/netapp/outputs.py +651 -0
  28. pulumi_gcp/netapp/volume.py +1467 -0
  29. pulumi_gcp/networksecurity/__init__.py +5 -0
  30. pulumi_gcp/networksecurity/_inputs.py +228 -0
  31. pulumi_gcp/networksecurity/address_group_iam_binding.py +324 -0
  32. pulumi_gcp/networksecurity/address_group_iam_member.py +324 -0
  33. pulumi_gcp/networksecurity/address_group_iam_policy.py +492 -0
  34. pulumi_gcp/networksecurity/get_address_group_iam_policy.py +144 -0
  35. pulumi_gcp/networksecurity/outputs.py +212 -0
  36. pulumi_gcp/networksecurity/security_profile.py +800 -0
  37. pulumi_gcp/networkservices/gateway.py +1 -1
  38. pulumi_gcp/organizations/get_folders.py +1 -1
  39. pulumi_gcp/orgpolicy/_inputs.py +12 -12
  40. pulumi_gcp/orgpolicy/outputs.py +12 -12
  41. pulumi_gcp/securesourcemanager/instance.py +4 -2
  42. pulumi_gcp/storage/insights_report_config.py +12 -10
  43. pulumi_gcp/vertex/__init__.py +1 -0
  44. pulumi_gcp/vertex/ai_feature_group_feature.py +767 -0
  45. pulumi_gcp/workstations/workstation_config.py +47 -0
  46. {pulumi_gcp-7.7.0a1705990280.dist-info → pulumi_gcp-7.8.0a1706310284.dist-info}/METADATA +1 -1
  47. {pulumi_gcp-7.7.0a1705990280.dist-info → pulumi_gcp-7.8.0a1706310284.dist-info}/RECORD +49 -39
  48. {pulumi_gcp-7.7.0a1705990280.dist-info → pulumi_gcp-7.8.0a1706310284.dist-info}/WHEEL +0 -0
  49. {pulumi_gcp-7.7.0a1705990280.dist-info → pulumi_gcp-7.8.0a1706310284.dist-info}/top_level.txt +0 -0
@@ -71,6 +71,10 @@ class EnvironmentConfig(dict):
71
71
  suggest = "dag_gcs_prefix"
72
72
  elif key == "databaseConfig":
73
73
  suggest = "database_config"
74
+ elif key == "enablePrivateBuildsOnly":
75
+ suggest = "enable_private_builds_only"
76
+ elif key == "enablePrivateEnvironment":
77
+ suggest = "enable_private_environment"
74
78
  elif key == "encryptionConfig":
75
79
  suggest = "encryption_config"
76
80
  elif key == "environmentSize":
@@ -115,6 +119,8 @@ class EnvironmentConfig(dict):
115
119
  airflow_uri: Optional[str] = None,
116
120
  dag_gcs_prefix: Optional[str] = None,
117
121
  database_config: Optional['outputs.EnvironmentConfigDatabaseConfig'] = None,
122
+ enable_private_builds_only: Optional[bool] = None,
123
+ enable_private_environment: Optional[bool] = None,
118
124
  encryption_config: Optional['outputs.EnvironmentConfigEncryptionConfig'] = None,
119
125
  environment_size: Optional[str] = None,
120
126
  gke_cluster: Optional[str] = None,
@@ -135,6 +141,10 @@ class EnvironmentConfig(dict):
135
141
  pulumi.set(__self__, "dag_gcs_prefix", dag_gcs_prefix)
136
142
  if database_config is not None:
137
143
  pulumi.set(__self__, "database_config", database_config)
144
+ if enable_private_builds_only is not None:
145
+ pulumi.set(__self__, "enable_private_builds_only", enable_private_builds_only)
146
+ if enable_private_environment is not None:
147
+ pulumi.set(__self__, "enable_private_environment", enable_private_environment)
138
148
  if encryption_config is not None:
139
149
  pulumi.set(__self__, "encryption_config", encryption_config)
140
150
  if environment_size is not None:
@@ -179,6 +189,16 @@ class EnvironmentConfig(dict):
179
189
  def database_config(self) -> Optional['outputs.EnvironmentConfigDatabaseConfig']:
180
190
  return pulumi.get(self, "database_config")
181
191
 
192
+ @property
193
+ @pulumi.getter(name="enablePrivateBuildsOnly")
194
+ def enable_private_builds_only(self) -> Optional[bool]:
195
+ return pulumi.get(self, "enable_private_builds_only")
196
+
197
+ @property
198
+ @pulumi.getter(name="enablePrivateEnvironment")
199
+ def enable_private_environment(self) -> Optional[bool]:
200
+ return pulumi.get(self, "enable_private_environment")
201
+
182
202
  @property
183
203
  @pulumi.getter(name="encryptionConfig")
184
204
  def encryption_config(self) -> Optional['outputs.EnvironmentConfigEncryptionConfig']:
@@ -1363,6 +1383,8 @@ class GetEnvironmentConfigResult(dict):
1363
1383
  airflow_uri: str,
1364
1384
  dag_gcs_prefix: str,
1365
1385
  database_configs: Sequence['outputs.GetEnvironmentConfigDatabaseConfigResult'],
1386
+ enable_private_builds_only: bool,
1387
+ enable_private_environment: bool,
1366
1388
  encryption_configs: Sequence['outputs.GetEnvironmentConfigEncryptionConfigResult'],
1367
1389
  environment_size: str,
1368
1390
  gke_cluster: str,
@@ -1380,6 +1402,8 @@ class GetEnvironmentConfigResult(dict):
1380
1402
  pulumi.set(__self__, "airflow_uri", airflow_uri)
1381
1403
  pulumi.set(__self__, "dag_gcs_prefix", dag_gcs_prefix)
1382
1404
  pulumi.set(__self__, "database_configs", database_configs)
1405
+ pulumi.set(__self__, "enable_private_builds_only", enable_private_builds_only)
1406
+ pulumi.set(__self__, "enable_private_environment", enable_private_environment)
1383
1407
  pulumi.set(__self__, "encryption_configs", encryption_configs)
1384
1408
  pulumi.set(__self__, "environment_size", environment_size)
1385
1409
  pulumi.set(__self__, "gke_cluster", gke_cluster)
@@ -1410,6 +1434,16 @@ class GetEnvironmentConfigResult(dict):
1410
1434
  def database_configs(self) -> Sequence['outputs.GetEnvironmentConfigDatabaseConfigResult']:
1411
1435
  return pulumi.get(self, "database_configs")
1412
1436
 
1437
+ @property
1438
+ @pulumi.getter(name="enablePrivateBuildsOnly")
1439
+ def enable_private_builds_only(self) -> bool:
1440
+ return pulumi.get(self, "enable_private_builds_only")
1441
+
1442
+ @property
1443
+ @pulumi.getter(name="enablePrivateEnvironment")
1444
+ def enable_private_environment(self) -> bool:
1445
+ return pulumi.get(self, "enable_private_environment")
1446
+
1413
1447
  @property
1414
1448
  @pulumi.getter(name="encryptionConfigs")
1415
1449
  def encryption_configs(self) -> Sequence['outputs.GetEnvironmentConfigEncryptionConfigResult']:
@@ -5943,7 +5943,8 @@ class InstanceBootDiskInitializeParamsArgs:
5943
5943
  size: Optional[pulumi.Input[int]] = None,
5944
5944
  type: Optional[pulumi.Input[str]] = None):
5945
5945
  """
5946
- :param pulumi.Input[bool] enable_confidential_compute: Defines whether the instance should have confidential compute enabled. `on_host_maintenance` has to be set to TERMINATE or this will fail to create the VM.
5946
+ :param pulumi.Input[bool] enable_confidential_compute: Whether this disk is using confidential compute mode.
5947
+ Note: Only supported on hyperdisk skus, disk_encryption_key is required when setting to true.
5947
5948
  :param pulumi.Input[str] image: The image from which to initialize this disk. This can be
5948
5949
  one of: the image's `self_link`, `projects/{project}/global/images/{image}`,
5949
5950
  `projects/{project}/global/images/family/{family}`, `global/images/{image}`,
@@ -5994,7 +5995,8 @@ class InstanceBootDiskInitializeParamsArgs:
5994
5995
  @pulumi.getter(name="enableConfidentialCompute")
5995
5996
  def enable_confidential_compute(self) -> Optional[pulumi.Input[bool]]:
5996
5997
  """
5997
- Defines whether the instance should have confidential compute enabled. `on_host_maintenance` has to be set to TERMINATE or this will fail to create the VM.
5998
+ Whether this disk is using confidential compute mode.
5999
+ Note: Only supported on hyperdisk skus, disk_encryption_key is required when setting to true.
5998
6000
  """
5999
6001
  return pulumi.get(self, "enable_confidential_compute")
6000
6002
 
@@ -55,8 +55,8 @@ class DiskArgs:
55
55
  the disk will be encrypted using an automatically generated key and
56
56
  you do not need to provide a key to use the disk later.
57
57
  Structure is documented below.
58
- :param pulumi.Input[bool] enable_confidential_compute: Whether this disk is using confidential compute mode. Note: Only supported on hyperdisk skus, disk_encryption_key is
59
- required when setting to true
58
+ :param pulumi.Input[bool] enable_confidential_compute: Whether this disk is using confidential compute mode.
59
+ Note: Only supported on hyperdisk skus, disk_encryption_key is required when setting to true
60
60
  :param pulumi.Input[Sequence[pulumi.Input['DiskGuestOsFeatureArgs']]] guest_os_features: A list of features to enable on the guest operating system.
61
61
  Applicable only for bootable disks.
62
62
  Structure is documented below.
@@ -243,8 +243,8 @@ class DiskArgs:
243
243
  @pulumi.getter(name="enableConfidentialCompute")
244
244
  def enable_confidential_compute(self) -> Optional[pulumi.Input[bool]]:
245
245
  """
246
- Whether this disk is using confidential compute mode. Note: Only supported on hyperdisk skus, disk_encryption_key is
247
- required when setting to true
246
+ Whether this disk is using confidential compute mode.
247
+ Note: Only supported on hyperdisk skus, disk_encryption_key is required when setting to true
248
248
  """
249
249
  return pulumi.get(self, "enable_confidential_compute")
250
250
 
@@ -604,8 +604,8 @@ class _DiskState:
604
604
  you do not need to provide a key to use the disk later.
605
605
  Structure is documented below.
606
606
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] effective_labels: All of labels (key/value pairs) present on the resource in GCP, including the labels configured through Pulumi, other clients and services.
607
- :param pulumi.Input[bool] enable_confidential_compute: Whether this disk is using confidential compute mode. Note: Only supported on hyperdisk skus, disk_encryption_key is
608
- required when setting to true
607
+ :param pulumi.Input[bool] enable_confidential_compute: Whether this disk is using confidential compute mode.
608
+ Note: Only supported on hyperdisk skus, disk_encryption_key is required when setting to true
609
609
  :param pulumi.Input[Sequence[pulumi.Input['DiskGuestOsFeatureArgs']]] guest_os_features: A list of features to enable on the guest operating system.
610
610
  Applicable only for bootable disks.
611
611
  Structure is documented below.
@@ -861,8 +861,8 @@ class _DiskState:
861
861
  @pulumi.getter(name="enableConfidentialCompute")
862
862
  def enable_confidential_compute(self) -> Optional[pulumi.Input[bool]]:
863
863
  """
864
- Whether this disk is using confidential compute mode. Note: Only supported on hyperdisk skus, disk_encryption_key is
865
- required when setting to true
864
+ Whether this disk is using confidential compute mode.
865
+ Note: Only supported on hyperdisk skus, disk_encryption_key is required when setting to true
866
866
  """
867
867
  return pulumi.get(self, "enable_confidential_compute")
868
868
 
@@ -1446,8 +1446,8 @@ class Disk(pulumi.CustomResource):
1446
1446
  the disk will be encrypted using an automatically generated key and
1447
1447
  you do not need to provide a key to use the disk later.
1448
1448
  Structure is documented below.
1449
- :param pulumi.Input[bool] enable_confidential_compute: Whether this disk is using confidential compute mode. Note: Only supported on hyperdisk skus, disk_encryption_key is
1450
- required when setting to true
1449
+ :param pulumi.Input[bool] enable_confidential_compute: Whether this disk is using confidential compute mode.
1450
+ Note: Only supported on hyperdisk skus, disk_encryption_key is required when setting to true
1451
1451
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['DiskGuestOsFeatureArgs']]]] guest_os_features: A list of features to enable on the guest operating system.
1452
1452
  Applicable only for bootable disks.
1453
1453
  Structure is documented below.
@@ -1801,8 +1801,8 @@ class Disk(pulumi.CustomResource):
1801
1801
  you do not need to provide a key to use the disk later.
1802
1802
  Structure is documented below.
1803
1803
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] effective_labels: All of labels (key/value pairs) present on the resource in GCP, including the labels configured through Pulumi, other clients and services.
1804
- :param pulumi.Input[bool] enable_confidential_compute: Whether this disk is using confidential compute mode. Note: Only supported on hyperdisk skus, disk_encryption_key is
1805
- required when setting to true
1804
+ :param pulumi.Input[bool] enable_confidential_compute: Whether this disk is using confidential compute mode.
1805
+ Note: Only supported on hyperdisk skus, disk_encryption_key is required when setting to true
1806
1806
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['DiskGuestOsFeatureArgs']]]] guest_os_features: A list of features to enable on the guest operating system.
1807
1807
  Applicable only for bootable disks.
1808
1808
  Structure is documented below.
@@ -2006,8 +2006,8 @@ class Disk(pulumi.CustomResource):
2006
2006
  @pulumi.getter(name="enableConfidentialCompute")
2007
2007
  def enable_confidential_compute(self) -> pulumi.Output[bool]:
2008
2008
  """
2009
- Whether this disk is using confidential compute mode. Note: Only supported on hyperdisk skus, disk_encryption_key is
2010
- required when setting to true
2009
+ Whether this disk is using confidential compute mode.
2010
+ Note: Only supported on hyperdisk skus, disk_encryption_key is required when setting to true
2011
2011
  """
2012
2012
  return pulumi.get(self, "enable_confidential_compute")
2013
2013
 
@@ -6001,7 +6001,8 @@ class InstanceBootDiskInitializeParams(dict):
6001
6001
  size: Optional[int] = None,
6002
6002
  type: Optional[str] = None):
6003
6003
  """
6004
- :param bool enable_confidential_compute: Defines whether the instance should have confidential compute enabled. `on_host_maintenance` has to be set to TERMINATE or this will fail to create the VM.
6004
+ :param bool enable_confidential_compute: Whether this disk is using confidential compute mode.
6005
+ Note: Only supported on hyperdisk skus, disk_encryption_key is required when setting to true.
6005
6006
  :param str image: The image from which to initialize this disk. This can be
6006
6007
  one of: the image's `self_link`, `projects/{project}/global/images/{image}`,
6007
6008
  `projects/{project}/global/images/family/{family}`, `global/images/{image}`,
@@ -6052,7 +6053,8 @@ class InstanceBootDiskInitializeParams(dict):
6052
6053
  @pulumi.getter(name="enableConfidentialCompute")
6053
6054
  def enable_confidential_compute(self) -> Optional[bool]:
6054
6055
  """
6055
- Defines whether the instance should have confidential compute enabled. `on_host_maintenance` has to be set to TERMINATE or this will fail to create the VM.
6056
+ Whether this disk is using confidential compute mode.
6057
+ Note: Only supported on hyperdisk skus, disk_encryption_key is required when setting to true.
6056
6058
  """
6057
6059
  return pulumi.get(self, "enable_confidential_compute")
6058
6060
 
@@ -22,6 +22,7 @@ class FhirStoreArgs:
22
22
  disable_referential_integrity: Optional[pulumi.Input[bool]] = None,
23
23
  disable_resource_versioning: Optional[pulumi.Input[bool]] = None,
24
24
  enable_history_import: Optional[pulumi.Input[bool]] = None,
25
+ enable_history_modifications: Optional[pulumi.Input[bool]] = None,
25
26
  enable_update_create: Optional[pulumi.Input[bool]] = None,
26
27
  labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
27
28
  name: Optional[pulumi.Input[str]] = None,
@@ -59,6 +60,8 @@ class FhirStoreArgs:
59
60
  will fail with an error.
60
61
  ** Changing this property may recreate the FHIR store (removing all data) **
61
62
  ** This property can be changed manually in the Google Cloud Healthcare admin console without recreating the FHIR store **
63
+ :param pulumi.Input[bool] enable_history_modifications: Whether to allow the ExecuteBundle API to accept history bundles, and directly insert and overwrite historical resource
64
+ versions into the FHIR store. If set to false, using history bundles fails with an error.
62
65
  :param pulumi.Input[bool] enable_update_create: Whether this FHIR store has the updateCreate capability. This determines if the client can use an Update
63
66
  operation to create a new resource with a client-specified ID. If false, all IDs are server-assigned through
64
67
  the Create operation and attempts to Update a non-existent resource will return errors. Please treat the audit
@@ -103,6 +106,8 @@ class FhirStoreArgs:
103
106
  pulumi.set(__self__, "disable_resource_versioning", disable_resource_versioning)
104
107
  if enable_history_import is not None:
105
108
  pulumi.set(__self__, "enable_history_import", enable_history_import)
109
+ if enable_history_modifications is not None:
110
+ pulumi.set(__self__, "enable_history_modifications", enable_history_modifications)
106
111
  if enable_update_create is not None:
107
112
  pulumi.set(__self__, "enable_update_create", enable_update_create)
108
113
  if labels is not None:
@@ -212,6 +217,19 @@ class FhirStoreArgs:
212
217
  def enable_history_import(self, value: Optional[pulumi.Input[bool]]):
213
218
  pulumi.set(self, "enable_history_import", value)
214
219
 
220
+ @property
221
+ @pulumi.getter(name="enableHistoryModifications")
222
+ def enable_history_modifications(self) -> Optional[pulumi.Input[bool]]:
223
+ """
224
+ Whether to allow the ExecuteBundle API to accept history bundles, and directly insert and overwrite historical resource
225
+ versions into the FHIR store. If set to false, using history bundles fails with an error.
226
+ """
227
+ return pulumi.get(self, "enable_history_modifications")
228
+
229
+ @enable_history_modifications.setter
230
+ def enable_history_modifications(self, value: Optional[pulumi.Input[bool]]):
231
+ pulumi.set(self, "enable_history_modifications", value)
232
+
215
233
  @property
216
234
  @pulumi.getter(name="enableUpdateCreate")
217
235
  def enable_update_create(self) -> Optional[pulumi.Input[bool]]:
@@ -332,6 +350,7 @@ class _FhirStoreState:
332
350
  disable_resource_versioning: Optional[pulumi.Input[bool]] = None,
333
351
  effective_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
334
352
  enable_history_import: Optional[pulumi.Input[bool]] = None,
353
+ enable_history_modifications: Optional[pulumi.Input[bool]] = None,
335
354
  enable_update_create: Optional[pulumi.Input[bool]] = None,
336
355
  labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
337
356
  name: Optional[pulumi.Input[str]] = None,
@@ -372,6 +391,8 @@ class _FhirStoreState:
372
391
  will fail with an error.
373
392
  ** Changing this property may recreate the FHIR store (removing all data) **
374
393
  ** This property can be changed manually in the Google Cloud Healthcare admin console without recreating the FHIR store **
394
+ :param pulumi.Input[bool] enable_history_modifications: Whether to allow the ExecuteBundle API to accept history bundles, and directly insert and overwrite historical resource
395
+ versions into the FHIR store. If set to false, using history bundles fails with an error.
375
396
  :param pulumi.Input[bool] enable_update_create: Whether this FHIR store has the updateCreate capability. This determines if the client can use an Update
376
397
  operation to create a new resource with a client-specified ID. If false, all IDs are server-assigned through
377
398
  the Create operation and attempts to Update a non-existent resource will return errors. Please treat the audit
@@ -422,6 +443,8 @@ class _FhirStoreState:
422
443
  pulumi.set(__self__, "effective_labels", effective_labels)
423
444
  if enable_history_import is not None:
424
445
  pulumi.set(__self__, "enable_history_import", enable_history_import)
446
+ if enable_history_modifications is not None:
447
+ pulumi.set(__self__, "enable_history_modifications", enable_history_modifications)
425
448
  if enable_update_create is not None:
426
449
  pulumi.set(__self__, "enable_update_create", enable_update_create)
427
450
  if labels is not None:
@@ -547,6 +570,19 @@ class _FhirStoreState:
547
570
  def enable_history_import(self, value: Optional[pulumi.Input[bool]]):
548
571
  pulumi.set(self, "enable_history_import", value)
549
572
 
573
+ @property
574
+ @pulumi.getter(name="enableHistoryModifications")
575
+ def enable_history_modifications(self) -> Optional[pulumi.Input[bool]]:
576
+ """
577
+ Whether to allow the ExecuteBundle API to accept history bundles, and directly insert and overwrite historical resource
578
+ versions into the FHIR store. If set to false, using history bundles fails with an error.
579
+ """
580
+ return pulumi.get(self, "enable_history_modifications")
581
+
582
+ @enable_history_modifications.setter
583
+ def enable_history_modifications(self, value: Optional[pulumi.Input[bool]]):
584
+ pulumi.set(self, "enable_history_modifications", value)
585
+
550
586
  @property
551
587
  @pulumi.getter(name="enableUpdateCreate")
552
588
  def enable_update_create(self) -> Optional[pulumi.Input[bool]]:
@@ -693,6 +729,7 @@ class FhirStore(pulumi.CustomResource):
693
729
  disable_referential_integrity: Optional[pulumi.Input[bool]] = None,
694
730
  disable_resource_versioning: Optional[pulumi.Input[bool]] = None,
695
731
  enable_history_import: Optional[pulumi.Input[bool]] = None,
732
+ enable_history_modifications: Optional[pulumi.Input[bool]] = None,
696
733
  enable_update_create: Optional[pulumi.Input[bool]] = None,
697
734
  labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
698
735
  name: Optional[pulumi.Input[str]] = None,
@@ -812,6 +849,7 @@ class FhirStore(pulumi.CustomResource):
812
849
  disable_referential_integrity=False,
813
850
  disable_resource_versioning=False,
814
851
  enable_history_import=False,
852
+ enable_history_modifications=False,
815
853
  labels={
816
854
  "label1": "labelvalue1",
817
855
  },
@@ -873,6 +911,8 @@ class FhirStore(pulumi.CustomResource):
873
911
  will fail with an error.
874
912
  ** Changing this property may recreate the FHIR store (removing all data) **
875
913
  ** This property can be changed manually in the Google Cloud Healthcare admin console without recreating the FHIR store **
914
+ :param pulumi.Input[bool] enable_history_modifications: Whether to allow the ExecuteBundle API to accept history bundles, and directly insert and overwrite historical resource
915
+ versions into the FHIR store. If set to false, using history bundles fails with an error.
876
916
  :param pulumi.Input[bool] enable_update_create: Whether this FHIR store has the updateCreate capability. This determines if the client can use an Update
877
917
  operation to create a new resource with a client-specified ID. If false, all IDs are server-assigned through
878
918
  the Create operation and attempts to Update a non-existent resource will return errors. Please treat the audit
@@ -1023,6 +1063,7 @@ class FhirStore(pulumi.CustomResource):
1023
1063
  disable_referential_integrity=False,
1024
1064
  disable_resource_versioning=False,
1025
1065
  enable_history_import=False,
1066
+ enable_history_modifications=False,
1026
1067
  labels={
1027
1068
  "label1": "labelvalue1",
1028
1069
  },
@@ -1075,6 +1116,7 @@ class FhirStore(pulumi.CustomResource):
1075
1116
  disable_referential_integrity: Optional[pulumi.Input[bool]] = None,
1076
1117
  disable_resource_versioning: Optional[pulumi.Input[bool]] = None,
1077
1118
  enable_history_import: Optional[pulumi.Input[bool]] = None,
1119
+ enable_history_modifications: Optional[pulumi.Input[bool]] = None,
1078
1120
  enable_update_create: Optional[pulumi.Input[bool]] = None,
1079
1121
  labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1080
1122
  name: Optional[pulumi.Input[str]] = None,
@@ -1099,6 +1141,7 @@ class FhirStore(pulumi.CustomResource):
1099
1141
  __props__.__dict__["disable_referential_integrity"] = disable_referential_integrity
1100
1142
  __props__.__dict__["disable_resource_versioning"] = disable_resource_versioning
1101
1143
  __props__.__dict__["enable_history_import"] = enable_history_import
1144
+ __props__.__dict__["enable_history_modifications"] = enable_history_modifications
1102
1145
  __props__.__dict__["enable_update_create"] = enable_update_create
1103
1146
  __props__.__dict__["labels"] = labels
1104
1147
  __props__.__dict__["name"] = name
@@ -1128,6 +1171,7 @@ class FhirStore(pulumi.CustomResource):
1128
1171
  disable_resource_versioning: Optional[pulumi.Input[bool]] = None,
1129
1172
  effective_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1130
1173
  enable_history_import: Optional[pulumi.Input[bool]] = None,
1174
+ enable_history_modifications: Optional[pulumi.Input[bool]] = None,
1131
1175
  enable_update_create: Optional[pulumi.Input[bool]] = None,
1132
1176
  labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1133
1177
  name: Optional[pulumi.Input[str]] = None,
@@ -1173,6 +1217,8 @@ class FhirStore(pulumi.CustomResource):
1173
1217
  will fail with an error.
1174
1218
  ** Changing this property may recreate the FHIR store (removing all data) **
1175
1219
  ** This property can be changed manually in the Google Cloud Healthcare admin console without recreating the FHIR store **
1220
+ :param pulumi.Input[bool] enable_history_modifications: Whether to allow the ExecuteBundle API to accept history bundles, and directly insert and overwrite historical resource
1221
+ versions into the FHIR store. If set to false, using history bundles fails with an error.
1176
1222
  :param pulumi.Input[bool] enable_update_create: Whether this FHIR store has the updateCreate capability. This determines if the client can use an Update
1177
1223
  operation to create a new resource with a client-specified ID. If false, all IDs are server-assigned through
1178
1224
  the Create operation and attempts to Update a non-existent resource will return errors. Please treat the audit
@@ -1220,6 +1266,7 @@ class FhirStore(pulumi.CustomResource):
1220
1266
  __props__.__dict__["disable_resource_versioning"] = disable_resource_versioning
1221
1267
  __props__.__dict__["effective_labels"] = effective_labels
1222
1268
  __props__.__dict__["enable_history_import"] = enable_history_import
1269
+ __props__.__dict__["enable_history_modifications"] = enable_history_modifications
1223
1270
  __props__.__dict__["enable_update_create"] = enable_update_create
1224
1271
  __props__.__dict__["labels"] = labels
1225
1272
  __props__.__dict__["name"] = name
@@ -1309,6 +1356,15 @@ class FhirStore(pulumi.CustomResource):
1309
1356
  """
1310
1357
  return pulumi.get(self, "enable_history_import")
1311
1358
 
1359
+ @property
1360
+ @pulumi.getter(name="enableHistoryModifications")
1361
+ def enable_history_modifications(self) -> pulumi.Output[Optional[bool]]:
1362
+ """
1363
+ Whether to allow the ExecuteBundle API to accept history bundles, and directly insert and overwrite historical resource
1364
+ versions into the FHIR store. If set to false, using history bundles fails with an error.
1365
+ """
1366
+ return pulumi.get(self, "enable_history_modifications")
1367
+
1312
1368
  @property
1313
1369
  @pulumi.getter(name="enableUpdateCreate")
1314
1370
  def enable_update_create(self) -> pulumi.Output[Optional[bool]]:
@@ -460,7 +460,7 @@ class CryptoKey(pulumi.CustomResource):
460
460
  keyring = gcp.kms.KeyRing("keyring", location="global")
461
461
  example_key = gcp.kms.CryptoKey("example-key",
462
462
  key_ring=keyring.id,
463
- rotation_period="100000s")
463
+ rotation_period="7776000s")
464
464
  ```
465
465
  ### Kms Crypto Key Asymmetric Sign
466
466
 
@@ -542,7 +542,7 @@ class CryptoKey(pulumi.CustomResource):
542
542
  keyring = gcp.kms.KeyRing("keyring", location="global")
543
543
  example_key = gcp.kms.CryptoKey("example-key",
544
544
  key_ring=keyring.id,
545
- rotation_period="100000s")
545
+ rotation_period="7776000s")
546
546
  ```
547
547
  ### Kms Crypto Key Asymmetric Sign
548
548
 
@@ -246,7 +246,7 @@ class CryptoKeyIAMBinding(pulumi.CustomResource):
246
246
  keyring = gcp.kms.KeyRing("keyring", location="global")
247
247
  key = gcp.kms.CryptoKey("key",
248
248
  key_ring=keyring.id,
249
- rotation_period="100000s")
249
+ rotation_period="7776000s")
250
250
  admin = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
251
251
  role="roles/cloudkms.cryptoKeyEncrypter",
252
252
  members=["user:jane@example.com"],
@@ -387,7 +387,7 @@ class CryptoKeyIAMBinding(pulumi.CustomResource):
387
387
  keyring = gcp.kms.KeyRing("keyring", location="global")
388
388
  key = gcp.kms.CryptoKey("key",
389
389
  key_ring=keyring.id,
390
- rotation_period="100000s")
390
+ rotation_period="7776000s")
391
391
  admin = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
392
392
  role="roles/cloudkms.cryptoKeyEncrypter",
393
393
  members=["user:jane@example.com"],
@@ -246,7 +246,7 @@ class CryptoKeyIAMMember(pulumi.CustomResource):
246
246
  keyring = gcp.kms.KeyRing("keyring", location="global")
247
247
  key = gcp.kms.CryptoKey("key",
248
248
  key_ring=keyring.id,
249
- rotation_period="100000s")
249
+ rotation_period="7776000s")
250
250
  admin = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
251
251
  role="roles/cloudkms.cryptoKeyEncrypter",
252
252
  members=["user:jane@example.com"],
@@ -387,7 +387,7 @@ class CryptoKeyIAMMember(pulumi.CustomResource):
387
387
  keyring = gcp.kms.KeyRing("keyring", location="global")
388
388
  key = gcp.kms.CryptoKey("key",
389
389
  key_ring=keyring.id,
390
- rotation_period="100000s")
390
+ rotation_period="7776000s")
391
391
  admin = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
392
392
  role="roles/cloudkms.cryptoKeyEncrypter",
393
393
  members=["user:jane@example.com"],
@@ -183,7 +183,7 @@ class CryptoKeyIAMPolicy(pulumi.CustomResource):
183
183
  keyring = gcp.kms.KeyRing("keyring", location="global")
184
184
  key = gcp.kms.CryptoKey("key",
185
185
  key_ring=keyring.id,
186
- rotation_period="100000s")
186
+ rotation_period="7776000s")
187
187
  admin = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
188
188
  role="roles/cloudkms.cryptoKeyEncrypter",
189
189
  members=["user:jane@example.com"],
@@ -322,7 +322,7 @@ class CryptoKeyIAMPolicy(pulumi.CustomResource):
322
322
  keyring = gcp.kms.KeyRing("keyring", location="global")
323
323
  key = gcp.kms.CryptoKey("key",
324
324
  key_ring=keyring.id,
325
- rotation_period="100000s")
325
+ rotation_period="7776000s")
326
326
  admin = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
327
327
  role="roles/cloudkms.cryptoKeyEncrypter",
328
328
  members=["user:jane@example.com"],
@@ -225,7 +225,7 @@ class CryptoKeyVersion(pulumi.CustomResource):
225
225
  keyring = gcp.kms.KeyRing("keyring", location="global")
226
226
  cryptokey = gcp.kms.CryptoKey("cryptokey",
227
227
  key_ring=keyring.id,
228
- rotation_period="100000s")
228
+ rotation_period="7776000s")
229
229
  example_key = gcp.kms.CryptoKeyVersion("example-key", crypto_key=cryptokey.id)
230
230
  ```
231
231
 
@@ -282,7 +282,7 @@ class CryptoKeyVersion(pulumi.CustomResource):
282
282
  keyring = gcp.kms.KeyRing("keyring", location="global")
283
283
  cryptokey = gcp.kms.CryptoKey("cryptokey",
284
284
  key_ring=keyring.id,
285
- rotation_period="100000s")
285
+ rotation_period="7776000s")
286
286
  example_key = gcp.kms.CryptoKeyVersion("example-key", crypto_key=cryptokey.id)
287
287
  ```
288
288
 
@@ -194,7 +194,7 @@ class SecretCiphertext(pulumi.CustomResource):
194
194
  keyring = gcp.kms.KeyRing("keyring", location="global")
195
195
  cryptokey = gcp.kms.CryptoKey("cryptokey",
196
196
  key_ring=keyring.id,
197
- rotation_period="100000s")
197
+ rotation_period="7776000s")
198
198
  my_password = gcp.kms.SecretCiphertext("myPassword",
199
199
  crypto_key=cryptokey.id,
200
200
  plaintext="my-secret-password")
@@ -261,7 +261,7 @@ class SecretCiphertext(pulumi.CustomResource):
261
261
  keyring = gcp.kms.KeyRing("keyring", location="global")
262
262
  cryptokey = gcp.kms.CryptoKey("cryptokey",
263
263
  key_ring=keyring.id,
264
- rotation_period="100000s")
264
+ rotation_period="7776000s")
265
265
  my_password = gcp.kms.SecretCiphertext("myPassword",
266
266
  crypto_key=cryptokey.id,
267
267
  plaintext="my-secret-password")
@@ -6,6 +6,10 @@ from .. import _utilities
6
6
  import typing
7
7
  # Export this package's modules as members:
8
8
  from .active_directory import *
9
+ from .backup_policy import *
9
10
  from .backup_vault import *
10
11
  from .kmsconfig import *
11
12
  from .storage_pool import *
13
+ from .volume import *
14
+ from ._inputs import *
15
+ from . import outputs