pulumi-gcp 7.7.0a1705990280__py3-none-any.whl → 7.8.0a1706310284__py3-none-any.whl
Sign up to get free protection for your applications and to get access to all the features.
- pulumi_gcp/__init__.py +56 -0
- pulumi_gcp/alloydb/cluster.py +26 -21
- pulumi_gcp/bigquery/_inputs.py +231 -0
- pulumi_gcp/bigquery/outputs.py +229 -0
- pulumi_gcp/bigquery/routine.py +256 -10
- pulumi_gcp/bigquery/table.py +47 -0
- pulumi_gcp/cloudbuildv2/repository.py +60 -53
- pulumi_gcp/cloudrunv2/_inputs.py +176 -4
- pulumi_gcp/cloudrunv2/outputs.py +256 -3
- pulumi_gcp/cloudrunv2/service.py +148 -0
- pulumi_gcp/composer/_inputs.py +24 -0
- pulumi_gcp/composer/outputs.py +34 -0
- pulumi_gcp/compute/_inputs.py +4 -2
- pulumi_gcp/compute/disk.py +14 -14
- pulumi_gcp/compute/outputs.py +4 -2
- pulumi_gcp/healthcare/fhir_store.py +56 -0
- pulumi_gcp/kms/crypto_key.py +2 -2
- pulumi_gcp/kms/crypto_key_iam_binding.py +2 -2
- pulumi_gcp/kms/crypto_key_iam_member.py +2 -2
- pulumi_gcp/kms/crypto_key_iam_policy.py +2 -2
- pulumi_gcp/kms/crypto_key_version.py +2 -2
- pulumi_gcp/kms/secret_ciphertext.py +2 -2
- pulumi_gcp/netapp/__init__.py +4 -0
- pulumi_gcp/netapp/_inputs.py +643 -0
- pulumi_gcp/netapp/backup_policy.py +829 -0
- pulumi_gcp/netapp/kmsconfig.py +2 -2
- pulumi_gcp/netapp/outputs.py +651 -0
- pulumi_gcp/netapp/volume.py +1467 -0
- pulumi_gcp/networksecurity/__init__.py +5 -0
- pulumi_gcp/networksecurity/_inputs.py +228 -0
- pulumi_gcp/networksecurity/address_group_iam_binding.py +324 -0
- pulumi_gcp/networksecurity/address_group_iam_member.py +324 -0
- pulumi_gcp/networksecurity/address_group_iam_policy.py +492 -0
- pulumi_gcp/networksecurity/get_address_group_iam_policy.py +144 -0
- pulumi_gcp/networksecurity/outputs.py +212 -0
- pulumi_gcp/networksecurity/security_profile.py +800 -0
- pulumi_gcp/networkservices/gateway.py +1 -1
- pulumi_gcp/organizations/get_folders.py +1 -1
- pulumi_gcp/orgpolicy/_inputs.py +12 -12
- pulumi_gcp/orgpolicy/outputs.py +12 -12
- pulumi_gcp/securesourcemanager/instance.py +4 -2
- pulumi_gcp/storage/insights_report_config.py +12 -10
- pulumi_gcp/vertex/__init__.py +1 -0
- pulumi_gcp/vertex/ai_feature_group_feature.py +767 -0
- pulumi_gcp/workstations/workstation_config.py +47 -0
- {pulumi_gcp-7.7.0a1705990280.dist-info → pulumi_gcp-7.8.0a1706310284.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.7.0a1705990280.dist-info → pulumi_gcp-7.8.0a1706310284.dist-info}/RECORD +49 -39
- {pulumi_gcp-7.7.0a1705990280.dist-info → pulumi_gcp-7.8.0a1706310284.dist-info}/WHEEL +0 -0
- {pulumi_gcp-7.7.0a1705990280.dist-info → pulumi_gcp-7.8.0a1706310284.dist-info}/top_level.txt +0 -0
pulumi_gcp/composer/outputs.py
CHANGED
@@ -71,6 +71,10 @@ class EnvironmentConfig(dict):
|
|
71
71
|
suggest = "dag_gcs_prefix"
|
72
72
|
elif key == "databaseConfig":
|
73
73
|
suggest = "database_config"
|
74
|
+
elif key == "enablePrivateBuildsOnly":
|
75
|
+
suggest = "enable_private_builds_only"
|
76
|
+
elif key == "enablePrivateEnvironment":
|
77
|
+
suggest = "enable_private_environment"
|
74
78
|
elif key == "encryptionConfig":
|
75
79
|
suggest = "encryption_config"
|
76
80
|
elif key == "environmentSize":
|
@@ -115,6 +119,8 @@ class EnvironmentConfig(dict):
|
|
115
119
|
airflow_uri: Optional[str] = None,
|
116
120
|
dag_gcs_prefix: Optional[str] = None,
|
117
121
|
database_config: Optional['outputs.EnvironmentConfigDatabaseConfig'] = None,
|
122
|
+
enable_private_builds_only: Optional[bool] = None,
|
123
|
+
enable_private_environment: Optional[bool] = None,
|
118
124
|
encryption_config: Optional['outputs.EnvironmentConfigEncryptionConfig'] = None,
|
119
125
|
environment_size: Optional[str] = None,
|
120
126
|
gke_cluster: Optional[str] = None,
|
@@ -135,6 +141,10 @@ class EnvironmentConfig(dict):
|
|
135
141
|
pulumi.set(__self__, "dag_gcs_prefix", dag_gcs_prefix)
|
136
142
|
if database_config is not None:
|
137
143
|
pulumi.set(__self__, "database_config", database_config)
|
144
|
+
if enable_private_builds_only is not None:
|
145
|
+
pulumi.set(__self__, "enable_private_builds_only", enable_private_builds_only)
|
146
|
+
if enable_private_environment is not None:
|
147
|
+
pulumi.set(__self__, "enable_private_environment", enable_private_environment)
|
138
148
|
if encryption_config is not None:
|
139
149
|
pulumi.set(__self__, "encryption_config", encryption_config)
|
140
150
|
if environment_size is not None:
|
@@ -179,6 +189,16 @@ class EnvironmentConfig(dict):
|
|
179
189
|
def database_config(self) -> Optional['outputs.EnvironmentConfigDatabaseConfig']:
|
180
190
|
return pulumi.get(self, "database_config")
|
181
191
|
|
192
|
+
@property
|
193
|
+
@pulumi.getter(name="enablePrivateBuildsOnly")
|
194
|
+
def enable_private_builds_only(self) -> Optional[bool]:
|
195
|
+
return pulumi.get(self, "enable_private_builds_only")
|
196
|
+
|
197
|
+
@property
|
198
|
+
@pulumi.getter(name="enablePrivateEnvironment")
|
199
|
+
def enable_private_environment(self) -> Optional[bool]:
|
200
|
+
return pulumi.get(self, "enable_private_environment")
|
201
|
+
|
182
202
|
@property
|
183
203
|
@pulumi.getter(name="encryptionConfig")
|
184
204
|
def encryption_config(self) -> Optional['outputs.EnvironmentConfigEncryptionConfig']:
|
@@ -1363,6 +1383,8 @@ class GetEnvironmentConfigResult(dict):
|
|
1363
1383
|
airflow_uri: str,
|
1364
1384
|
dag_gcs_prefix: str,
|
1365
1385
|
database_configs: Sequence['outputs.GetEnvironmentConfigDatabaseConfigResult'],
|
1386
|
+
enable_private_builds_only: bool,
|
1387
|
+
enable_private_environment: bool,
|
1366
1388
|
encryption_configs: Sequence['outputs.GetEnvironmentConfigEncryptionConfigResult'],
|
1367
1389
|
environment_size: str,
|
1368
1390
|
gke_cluster: str,
|
@@ -1380,6 +1402,8 @@ class GetEnvironmentConfigResult(dict):
|
|
1380
1402
|
pulumi.set(__self__, "airflow_uri", airflow_uri)
|
1381
1403
|
pulumi.set(__self__, "dag_gcs_prefix", dag_gcs_prefix)
|
1382
1404
|
pulumi.set(__self__, "database_configs", database_configs)
|
1405
|
+
pulumi.set(__self__, "enable_private_builds_only", enable_private_builds_only)
|
1406
|
+
pulumi.set(__self__, "enable_private_environment", enable_private_environment)
|
1383
1407
|
pulumi.set(__self__, "encryption_configs", encryption_configs)
|
1384
1408
|
pulumi.set(__self__, "environment_size", environment_size)
|
1385
1409
|
pulumi.set(__self__, "gke_cluster", gke_cluster)
|
@@ -1410,6 +1434,16 @@ class GetEnvironmentConfigResult(dict):
|
|
1410
1434
|
def database_configs(self) -> Sequence['outputs.GetEnvironmentConfigDatabaseConfigResult']:
|
1411
1435
|
return pulumi.get(self, "database_configs")
|
1412
1436
|
|
1437
|
+
@property
|
1438
|
+
@pulumi.getter(name="enablePrivateBuildsOnly")
|
1439
|
+
def enable_private_builds_only(self) -> bool:
|
1440
|
+
return pulumi.get(self, "enable_private_builds_only")
|
1441
|
+
|
1442
|
+
@property
|
1443
|
+
@pulumi.getter(name="enablePrivateEnvironment")
|
1444
|
+
def enable_private_environment(self) -> bool:
|
1445
|
+
return pulumi.get(self, "enable_private_environment")
|
1446
|
+
|
1413
1447
|
@property
|
1414
1448
|
@pulumi.getter(name="encryptionConfigs")
|
1415
1449
|
def encryption_configs(self) -> Sequence['outputs.GetEnvironmentConfigEncryptionConfigResult']:
|
pulumi_gcp/compute/_inputs.py
CHANGED
@@ -5943,7 +5943,8 @@ class InstanceBootDiskInitializeParamsArgs:
|
|
5943
5943
|
size: Optional[pulumi.Input[int]] = None,
|
5944
5944
|
type: Optional[pulumi.Input[str]] = None):
|
5945
5945
|
"""
|
5946
|
-
:param pulumi.Input[bool] enable_confidential_compute:
|
5946
|
+
:param pulumi.Input[bool] enable_confidential_compute: Whether this disk is using confidential compute mode.
|
5947
|
+
Note: Only supported on hyperdisk skus, disk_encryption_key is required when setting to true.
|
5947
5948
|
:param pulumi.Input[str] image: The image from which to initialize this disk. This can be
|
5948
5949
|
one of: the image's `self_link`, `projects/{project}/global/images/{image}`,
|
5949
5950
|
`projects/{project}/global/images/family/{family}`, `global/images/{image}`,
|
@@ -5994,7 +5995,8 @@ class InstanceBootDiskInitializeParamsArgs:
|
|
5994
5995
|
@pulumi.getter(name="enableConfidentialCompute")
|
5995
5996
|
def enable_confidential_compute(self) -> Optional[pulumi.Input[bool]]:
|
5996
5997
|
"""
|
5997
|
-
|
5998
|
+
Whether this disk is using confidential compute mode.
|
5999
|
+
Note: Only supported on hyperdisk skus, disk_encryption_key is required when setting to true.
|
5998
6000
|
"""
|
5999
6001
|
return pulumi.get(self, "enable_confidential_compute")
|
6000
6002
|
|
pulumi_gcp/compute/disk.py
CHANGED
@@ -55,8 +55,8 @@ class DiskArgs:
|
|
55
55
|
the disk will be encrypted using an automatically generated key and
|
56
56
|
you do not need to provide a key to use the disk later.
|
57
57
|
Structure is documented below.
|
58
|
-
:param pulumi.Input[bool] enable_confidential_compute: Whether this disk is using confidential compute mode.
|
59
|
-
required when setting to true
|
58
|
+
:param pulumi.Input[bool] enable_confidential_compute: Whether this disk is using confidential compute mode.
|
59
|
+
Note: Only supported on hyperdisk skus, disk_encryption_key is required when setting to true
|
60
60
|
:param pulumi.Input[Sequence[pulumi.Input['DiskGuestOsFeatureArgs']]] guest_os_features: A list of features to enable on the guest operating system.
|
61
61
|
Applicable only for bootable disks.
|
62
62
|
Structure is documented below.
|
@@ -243,8 +243,8 @@ class DiskArgs:
|
|
243
243
|
@pulumi.getter(name="enableConfidentialCompute")
|
244
244
|
def enable_confidential_compute(self) -> Optional[pulumi.Input[bool]]:
|
245
245
|
"""
|
246
|
-
Whether this disk is using confidential compute mode.
|
247
|
-
required when setting to true
|
246
|
+
Whether this disk is using confidential compute mode.
|
247
|
+
Note: Only supported on hyperdisk skus, disk_encryption_key is required when setting to true
|
248
248
|
"""
|
249
249
|
return pulumi.get(self, "enable_confidential_compute")
|
250
250
|
|
@@ -604,8 +604,8 @@ class _DiskState:
|
|
604
604
|
you do not need to provide a key to use the disk later.
|
605
605
|
Structure is documented below.
|
606
606
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] effective_labels: All of labels (key/value pairs) present on the resource in GCP, including the labels configured through Pulumi, other clients and services.
|
607
|
-
:param pulumi.Input[bool] enable_confidential_compute: Whether this disk is using confidential compute mode.
|
608
|
-
required when setting to true
|
607
|
+
:param pulumi.Input[bool] enable_confidential_compute: Whether this disk is using confidential compute mode.
|
608
|
+
Note: Only supported on hyperdisk skus, disk_encryption_key is required when setting to true
|
609
609
|
:param pulumi.Input[Sequence[pulumi.Input['DiskGuestOsFeatureArgs']]] guest_os_features: A list of features to enable on the guest operating system.
|
610
610
|
Applicable only for bootable disks.
|
611
611
|
Structure is documented below.
|
@@ -861,8 +861,8 @@ class _DiskState:
|
|
861
861
|
@pulumi.getter(name="enableConfidentialCompute")
|
862
862
|
def enable_confidential_compute(self) -> Optional[pulumi.Input[bool]]:
|
863
863
|
"""
|
864
|
-
Whether this disk is using confidential compute mode.
|
865
|
-
required when setting to true
|
864
|
+
Whether this disk is using confidential compute mode.
|
865
|
+
Note: Only supported on hyperdisk skus, disk_encryption_key is required when setting to true
|
866
866
|
"""
|
867
867
|
return pulumi.get(self, "enable_confidential_compute")
|
868
868
|
|
@@ -1446,8 +1446,8 @@ class Disk(pulumi.CustomResource):
|
|
1446
1446
|
the disk will be encrypted using an automatically generated key and
|
1447
1447
|
you do not need to provide a key to use the disk later.
|
1448
1448
|
Structure is documented below.
|
1449
|
-
:param pulumi.Input[bool] enable_confidential_compute: Whether this disk is using confidential compute mode.
|
1450
|
-
required when setting to true
|
1449
|
+
:param pulumi.Input[bool] enable_confidential_compute: Whether this disk is using confidential compute mode.
|
1450
|
+
Note: Only supported on hyperdisk skus, disk_encryption_key is required when setting to true
|
1451
1451
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['DiskGuestOsFeatureArgs']]]] guest_os_features: A list of features to enable on the guest operating system.
|
1452
1452
|
Applicable only for bootable disks.
|
1453
1453
|
Structure is documented below.
|
@@ -1801,8 +1801,8 @@ class Disk(pulumi.CustomResource):
|
|
1801
1801
|
you do not need to provide a key to use the disk later.
|
1802
1802
|
Structure is documented below.
|
1803
1803
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] effective_labels: All of labels (key/value pairs) present on the resource in GCP, including the labels configured through Pulumi, other clients and services.
|
1804
|
-
:param pulumi.Input[bool] enable_confidential_compute: Whether this disk is using confidential compute mode.
|
1805
|
-
required when setting to true
|
1804
|
+
:param pulumi.Input[bool] enable_confidential_compute: Whether this disk is using confidential compute mode.
|
1805
|
+
Note: Only supported on hyperdisk skus, disk_encryption_key is required when setting to true
|
1806
1806
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['DiskGuestOsFeatureArgs']]]] guest_os_features: A list of features to enable on the guest operating system.
|
1807
1807
|
Applicable only for bootable disks.
|
1808
1808
|
Structure is documented below.
|
@@ -2006,8 +2006,8 @@ class Disk(pulumi.CustomResource):
|
|
2006
2006
|
@pulumi.getter(name="enableConfidentialCompute")
|
2007
2007
|
def enable_confidential_compute(self) -> pulumi.Output[bool]:
|
2008
2008
|
"""
|
2009
|
-
Whether this disk is using confidential compute mode.
|
2010
|
-
required when setting to true
|
2009
|
+
Whether this disk is using confidential compute mode.
|
2010
|
+
Note: Only supported on hyperdisk skus, disk_encryption_key is required when setting to true
|
2011
2011
|
"""
|
2012
2012
|
return pulumi.get(self, "enable_confidential_compute")
|
2013
2013
|
|
pulumi_gcp/compute/outputs.py
CHANGED
@@ -6001,7 +6001,8 @@ class InstanceBootDiskInitializeParams(dict):
|
|
6001
6001
|
size: Optional[int] = None,
|
6002
6002
|
type: Optional[str] = None):
|
6003
6003
|
"""
|
6004
|
-
:param bool enable_confidential_compute:
|
6004
|
+
:param bool enable_confidential_compute: Whether this disk is using confidential compute mode.
|
6005
|
+
Note: Only supported on hyperdisk skus, disk_encryption_key is required when setting to true.
|
6005
6006
|
:param str image: The image from which to initialize this disk. This can be
|
6006
6007
|
one of: the image's `self_link`, `projects/{project}/global/images/{image}`,
|
6007
6008
|
`projects/{project}/global/images/family/{family}`, `global/images/{image}`,
|
@@ -6052,7 +6053,8 @@ class InstanceBootDiskInitializeParams(dict):
|
|
6052
6053
|
@pulumi.getter(name="enableConfidentialCompute")
|
6053
6054
|
def enable_confidential_compute(self) -> Optional[bool]:
|
6054
6055
|
"""
|
6055
|
-
|
6056
|
+
Whether this disk is using confidential compute mode.
|
6057
|
+
Note: Only supported on hyperdisk skus, disk_encryption_key is required when setting to true.
|
6056
6058
|
"""
|
6057
6059
|
return pulumi.get(self, "enable_confidential_compute")
|
6058
6060
|
|
@@ -22,6 +22,7 @@ class FhirStoreArgs:
|
|
22
22
|
disable_referential_integrity: Optional[pulumi.Input[bool]] = None,
|
23
23
|
disable_resource_versioning: Optional[pulumi.Input[bool]] = None,
|
24
24
|
enable_history_import: Optional[pulumi.Input[bool]] = None,
|
25
|
+
enable_history_modifications: Optional[pulumi.Input[bool]] = None,
|
25
26
|
enable_update_create: Optional[pulumi.Input[bool]] = None,
|
26
27
|
labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
27
28
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -59,6 +60,8 @@ class FhirStoreArgs:
|
|
59
60
|
will fail with an error.
|
60
61
|
** Changing this property may recreate the FHIR store (removing all data) **
|
61
62
|
** This property can be changed manually in the Google Cloud Healthcare admin console without recreating the FHIR store **
|
63
|
+
:param pulumi.Input[bool] enable_history_modifications: Whether to allow the ExecuteBundle API to accept history bundles, and directly insert and overwrite historical resource
|
64
|
+
versions into the FHIR store. If set to false, using history bundles fails with an error.
|
62
65
|
:param pulumi.Input[bool] enable_update_create: Whether this FHIR store has the updateCreate capability. This determines if the client can use an Update
|
63
66
|
operation to create a new resource with a client-specified ID. If false, all IDs are server-assigned through
|
64
67
|
the Create operation and attempts to Update a non-existent resource will return errors. Please treat the audit
|
@@ -103,6 +106,8 @@ class FhirStoreArgs:
|
|
103
106
|
pulumi.set(__self__, "disable_resource_versioning", disable_resource_versioning)
|
104
107
|
if enable_history_import is not None:
|
105
108
|
pulumi.set(__self__, "enable_history_import", enable_history_import)
|
109
|
+
if enable_history_modifications is not None:
|
110
|
+
pulumi.set(__self__, "enable_history_modifications", enable_history_modifications)
|
106
111
|
if enable_update_create is not None:
|
107
112
|
pulumi.set(__self__, "enable_update_create", enable_update_create)
|
108
113
|
if labels is not None:
|
@@ -212,6 +217,19 @@ class FhirStoreArgs:
|
|
212
217
|
def enable_history_import(self, value: Optional[pulumi.Input[bool]]):
|
213
218
|
pulumi.set(self, "enable_history_import", value)
|
214
219
|
|
220
|
+
@property
|
221
|
+
@pulumi.getter(name="enableHistoryModifications")
|
222
|
+
def enable_history_modifications(self) -> Optional[pulumi.Input[bool]]:
|
223
|
+
"""
|
224
|
+
Whether to allow the ExecuteBundle API to accept history bundles, and directly insert and overwrite historical resource
|
225
|
+
versions into the FHIR store. If set to false, using history bundles fails with an error.
|
226
|
+
"""
|
227
|
+
return pulumi.get(self, "enable_history_modifications")
|
228
|
+
|
229
|
+
@enable_history_modifications.setter
|
230
|
+
def enable_history_modifications(self, value: Optional[pulumi.Input[bool]]):
|
231
|
+
pulumi.set(self, "enable_history_modifications", value)
|
232
|
+
|
215
233
|
@property
|
216
234
|
@pulumi.getter(name="enableUpdateCreate")
|
217
235
|
def enable_update_create(self) -> Optional[pulumi.Input[bool]]:
|
@@ -332,6 +350,7 @@ class _FhirStoreState:
|
|
332
350
|
disable_resource_versioning: Optional[pulumi.Input[bool]] = None,
|
333
351
|
effective_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
334
352
|
enable_history_import: Optional[pulumi.Input[bool]] = None,
|
353
|
+
enable_history_modifications: Optional[pulumi.Input[bool]] = None,
|
335
354
|
enable_update_create: Optional[pulumi.Input[bool]] = None,
|
336
355
|
labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
337
356
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -372,6 +391,8 @@ class _FhirStoreState:
|
|
372
391
|
will fail with an error.
|
373
392
|
** Changing this property may recreate the FHIR store (removing all data) **
|
374
393
|
** This property can be changed manually in the Google Cloud Healthcare admin console without recreating the FHIR store **
|
394
|
+
:param pulumi.Input[bool] enable_history_modifications: Whether to allow the ExecuteBundle API to accept history bundles, and directly insert and overwrite historical resource
|
395
|
+
versions into the FHIR store. If set to false, using history bundles fails with an error.
|
375
396
|
:param pulumi.Input[bool] enable_update_create: Whether this FHIR store has the updateCreate capability. This determines if the client can use an Update
|
376
397
|
operation to create a new resource with a client-specified ID. If false, all IDs are server-assigned through
|
377
398
|
the Create operation and attempts to Update a non-existent resource will return errors. Please treat the audit
|
@@ -422,6 +443,8 @@ class _FhirStoreState:
|
|
422
443
|
pulumi.set(__self__, "effective_labels", effective_labels)
|
423
444
|
if enable_history_import is not None:
|
424
445
|
pulumi.set(__self__, "enable_history_import", enable_history_import)
|
446
|
+
if enable_history_modifications is not None:
|
447
|
+
pulumi.set(__self__, "enable_history_modifications", enable_history_modifications)
|
425
448
|
if enable_update_create is not None:
|
426
449
|
pulumi.set(__self__, "enable_update_create", enable_update_create)
|
427
450
|
if labels is not None:
|
@@ -547,6 +570,19 @@ class _FhirStoreState:
|
|
547
570
|
def enable_history_import(self, value: Optional[pulumi.Input[bool]]):
|
548
571
|
pulumi.set(self, "enable_history_import", value)
|
549
572
|
|
573
|
+
@property
|
574
|
+
@pulumi.getter(name="enableHistoryModifications")
|
575
|
+
def enable_history_modifications(self) -> Optional[pulumi.Input[bool]]:
|
576
|
+
"""
|
577
|
+
Whether to allow the ExecuteBundle API to accept history bundles, and directly insert and overwrite historical resource
|
578
|
+
versions into the FHIR store. If set to false, using history bundles fails with an error.
|
579
|
+
"""
|
580
|
+
return pulumi.get(self, "enable_history_modifications")
|
581
|
+
|
582
|
+
@enable_history_modifications.setter
|
583
|
+
def enable_history_modifications(self, value: Optional[pulumi.Input[bool]]):
|
584
|
+
pulumi.set(self, "enable_history_modifications", value)
|
585
|
+
|
550
586
|
@property
|
551
587
|
@pulumi.getter(name="enableUpdateCreate")
|
552
588
|
def enable_update_create(self) -> Optional[pulumi.Input[bool]]:
|
@@ -693,6 +729,7 @@ class FhirStore(pulumi.CustomResource):
|
|
693
729
|
disable_referential_integrity: Optional[pulumi.Input[bool]] = None,
|
694
730
|
disable_resource_versioning: Optional[pulumi.Input[bool]] = None,
|
695
731
|
enable_history_import: Optional[pulumi.Input[bool]] = None,
|
732
|
+
enable_history_modifications: Optional[pulumi.Input[bool]] = None,
|
696
733
|
enable_update_create: Optional[pulumi.Input[bool]] = None,
|
697
734
|
labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
698
735
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -812,6 +849,7 @@ class FhirStore(pulumi.CustomResource):
|
|
812
849
|
disable_referential_integrity=False,
|
813
850
|
disable_resource_versioning=False,
|
814
851
|
enable_history_import=False,
|
852
|
+
enable_history_modifications=False,
|
815
853
|
labels={
|
816
854
|
"label1": "labelvalue1",
|
817
855
|
},
|
@@ -873,6 +911,8 @@ class FhirStore(pulumi.CustomResource):
|
|
873
911
|
will fail with an error.
|
874
912
|
** Changing this property may recreate the FHIR store (removing all data) **
|
875
913
|
** This property can be changed manually in the Google Cloud Healthcare admin console without recreating the FHIR store **
|
914
|
+
:param pulumi.Input[bool] enable_history_modifications: Whether to allow the ExecuteBundle API to accept history bundles, and directly insert and overwrite historical resource
|
915
|
+
versions into the FHIR store. If set to false, using history bundles fails with an error.
|
876
916
|
:param pulumi.Input[bool] enable_update_create: Whether this FHIR store has the updateCreate capability. This determines if the client can use an Update
|
877
917
|
operation to create a new resource with a client-specified ID. If false, all IDs are server-assigned through
|
878
918
|
the Create operation and attempts to Update a non-existent resource will return errors. Please treat the audit
|
@@ -1023,6 +1063,7 @@ class FhirStore(pulumi.CustomResource):
|
|
1023
1063
|
disable_referential_integrity=False,
|
1024
1064
|
disable_resource_versioning=False,
|
1025
1065
|
enable_history_import=False,
|
1066
|
+
enable_history_modifications=False,
|
1026
1067
|
labels={
|
1027
1068
|
"label1": "labelvalue1",
|
1028
1069
|
},
|
@@ -1075,6 +1116,7 @@ class FhirStore(pulumi.CustomResource):
|
|
1075
1116
|
disable_referential_integrity: Optional[pulumi.Input[bool]] = None,
|
1076
1117
|
disable_resource_versioning: Optional[pulumi.Input[bool]] = None,
|
1077
1118
|
enable_history_import: Optional[pulumi.Input[bool]] = None,
|
1119
|
+
enable_history_modifications: Optional[pulumi.Input[bool]] = None,
|
1078
1120
|
enable_update_create: Optional[pulumi.Input[bool]] = None,
|
1079
1121
|
labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
1080
1122
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -1099,6 +1141,7 @@ class FhirStore(pulumi.CustomResource):
|
|
1099
1141
|
__props__.__dict__["disable_referential_integrity"] = disable_referential_integrity
|
1100
1142
|
__props__.__dict__["disable_resource_versioning"] = disable_resource_versioning
|
1101
1143
|
__props__.__dict__["enable_history_import"] = enable_history_import
|
1144
|
+
__props__.__dict__["enable_history_modifications"] = enable_history_modifications
|
1102
1145
|
__props__.__dict__["enable_update_create"] = enable_update_create
|
1103
1146
|
__props__.__dict__["labels"] = labels
|
1104
1147
|
__props__.__dict__["name"] = name
|
@@ -1128,6 +1171,7 @@ class FhirStore(pulumi.CustomResource):
|
|
1128
1171
|
disable_resource_versioning: Optional[pulumi.Input[bool]] = None,
|
1129
1172
|
effective_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
1130
1173
|
enable_history_import: Optional[pulumi.Input[bool]] = None,
|
1174
|
+
enable_history_modifications: Optional[pulumi.Input[bool]] = None,
|
1131
1175
|
enable_update_create: Optional[pulumi.Input[bool]] = None,
|
1132
1176
|
labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
1133
1177
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -1173,6 +1217,8 @@ class FhirStore(pulumi.CustomResource):
|
|
1173
1217
|
will fail with an error.
|
1174
1218
|
** Changing this property may recreate the FHIR store (removing all data) **
|
1175
1219
|
** This property can be changed manually in the Google Cloud Healthcare admin console without recreating the FHIR store **
|
1220
|
+
:param pulumi.Input[bool] enable_history_modifications: Whether to allow the ExecuteBundle API to accept history bundles, and directly insert and overwrite historical resource
|
1221
|
+
versions into the FHIR store. If set to false, using history bundles fails with an error.
|
1176
1222
|
:param pulumi.Input[bool] enable_update_create: Whether this FHIR store has the updateCreate capability. This determines if the client can use an Update
|
1177
1223
|
operation to create a new resource with a client-specified ID. If false, all IDs are server-assigned through
|
1178
1224
|
the Create operation and attempts to Update a non-existent resource will return errors. Please treat the audit
|
@@ -1220,6 +1266,7 @@ class FhirStore(pulumi.CustomResource):
|
|
1220
1266
|
__props__.__dict__["disable_resource_versioning"] = disable_resource_versioning
|
1221
1267
|
__props__.__dict__["effective_labels"] = effective_labels
|
1222
1268
|
__props__.__dict__["enable_history_import"] = enable_history_import
|
1269
|
+
__props__.__dict__["enable_history_modifications"] = enable_history_modifications
|
1223
1270
|
__props__.__dict__["enable_update_create"] = enable_update_create
|
1224
1271
|
__props__.__dict__["labels"] = labels
|
1225
1272
|
__props__.__dict__["name"] = name
|
@@ -1309,6 +1356,15 @@ class FhirStore(pulumi.CustomResource):
|
|
1309
1356
|
"""
|
1310
1357
|
return pulumi.get(self, "enable_history_import")
|
1311
1358
|
|
1359
|
+
@property
|
1360
|
+
@pulumi.getter(name="enableHistoryModifications")
|
1361
|
+
def enable_history_modifications(self) -> pulumi.Output[Optional[bool]]:
|
1362
|
+
"""
|
1363
|
+
Whether to allow the ExecuteBundle API to accept history bundles, and directly insert and overwrite historical resource
|
1364
|
+
versions into the FHIR store. If set to false, using history bundles fails with an error.
|
1365
|
+
"""
|
1366
|
+
return pulumi.get(self, "enable_history_modifications")
|
1367
|
+
|
1312
1368
|
@property
|
1313
1369
|
@pulumi.getter(name="enableUpdateCreate")
|
1314
1370
|
def enable_update_create(self) -> pulumi.Output[Optional[bool]]:
|
pulumi_gcp/kms/crypto_key.py
CHANGED
@@ -460,7 +460,7 @@ class CryptoKey(pulumi.CustomResource):
|
|
460
460
|
keyring = gcp.kms.KeyRing("keyring", location="global")
|
461
461
|
example_key = gcp.kms.CryptoKey("example-key",
|
462
462
|
key_ring=keyring.id,
|
463
|
-
rotation_period="
|
463
|
+
rotation_period="7776000s")
|
464
464
|
```
|
465
465
|
### Kms Crypto Key Asymmetric Sign
|
466
466
|
|
@@ -542,7 +542,7 @@ class CryptoKey(pulumi.CustomResource):
|
|
542
542
|
keyring = gcp.kms.KeyRing("keyring", location="global")
|
543
543
|
example_key = gcp.kms.CryptoKey("example-key",
|
544
544
|
key_ring=keyring.id,
|
545
|
-
rotation_period="
|
545
|
+
rotation_period="7776000s")
|
546
546
|
```
|
547
547
|
### Kms Crypto Key Asymmetric Sign
|
548
548
|
|
@@ -246,7 +246,7 @@ class CryptoKeyIAMBinding(pulumi.CustomResource):
|
|
246
246
|
keyring = gcp.kms.KeyRing("keyring", location="global")
|
247
247
|
key = gcp.kms.CryptoKey("key",
|
248
248
|
key_ring=keyring.id,
|
249
|
-
rotation_period="
|
249
|
+
rotation_period="7776000s")
|
250
250
|
admin = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
|
251
251
|
role="roles/cloudkms.cryptoKeyEncrypter",
|
252
252
|
members=["user:jane@example.com"],
|
@@ -387,7 +387,7 @@ class CryptoKeyIAMBinding(pulumi.CustomResource):
|
|
387
387
|
keyring = gcp.kms.KeyRing("keyring", location="global")
|
388
388
|
key = gcp.kms.CryptoKey("key",
|
389
389
|
key_ring=keyring.id,
|
390
|
-
rotation_period="
|
390
|
+
rotation_period="7776000s")
|
391
391
|
admin = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
|
392
392
|
role="roles/cloudkms.cryptoKeyEncrypter",
|
393
393
|
members=["user:jane@example.com"],
|
@@ -246,7 +246,7 @@ class CryptoKeyIAMMember(pulumi.CustomResource):
|
|
246
246
|
keyring = gcp.kms.KeyRing("keyring", location="global")
|
247
247
|
key = gcp.kms.CryptoKey("key",
|
248
248
|
key_ring=keyring.id,
|
249
|
-
rotation_period="
|
249
|
+
rotation_period="7776000s")
|
250
250
|
admin = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
|
251
251
|
role="roles/cloudkms.cryptoKeyEncrypter",
|
252
252
|
members=["user:jane@example.com"],
|
@@ -387,7 +387,7 @@ class CryptoKeyIAMMember(pulumi.CustomResource):
|
|
387
387
|
keyring = gcp.kms.KeyRing("keyring", location="global")
|
388
388
|
key = gcp.kms.CryptoKey("key",
|
389
389
|
key_ring=keyring.id,
|
390
|
-
rotation_period="
|
390
|
+
rotation_period="7776000s")
|
391
391
|
admin = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
|
392
392
|
role="roles/cloudkms.cryptoKeyEncrypter",
|
393
393
|
members=["user:jane@example.com"],
|
@@ -183,7 +183,7 @@ class CryptoKeyIAMPolicy(pulumi.CustomResource):
|
|
183
183
|
keyring = gcp.kms.KeyRing("keyring", location="global")
|
184
184
|
key = gcp.kms.CryptoKey("key",
|
185
185
|
key_ring=keyring.id,
|
186
|
-
rotation_period="
|
186
|
+
rotation_period="7776000s")
|
187
187
|
admin = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
|
188
188
|
role="roles/cloudkms.cryptoKeyEncrypter",
|
189
189
|
members=["user:jane@example.com"],
|
@@ -322,7 +322,7 @@ class CryptoKeyIAMPolicy(pulumi.CustomResource):
|
|
322
322
|
keyring = gcp.kms.KeyRing("keyring", location="global")
|
323
323
|
key = gcp.kms.CryptoKey("key",
|
324
324
|
key_ring=keyring.id,
|
325
|
-
rotation_period="
|
325
|
+
rotation_period="7776000s")
|
326
326
|
admin = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
|
327
327
|
role="roles/cloudkms.cryptoKeyEncrypter",
|
328
328
|
members=["user:jane@example.com"],
|
@@ -225,7 +225,7 @@ class CryptoKeyVersion(pulumi.CustomResource):
|
|
225
225
|
keyring = gcp.kms.KeyRing("keyring", location="global")
|
226
226
|
cryptokey = gcp.kms.CryptoKey("cryptokey",
|
227
227
|
key_ring=keyring.id,
|
228
|
-
rotation_period="
|
228
|
+
rotation_period="7776000s")
|
229
229
|
example_key = gcp.kms.CryptoKeyVersion("example-key", crypto_key=cryptokey.id)
|
230
230
|
```
|
231
231
|
|
@@ -282,7 +282,7 @@ class CryptoKeyVersion(pulumi.CustomResource):
|
|
282
282
|
keyring = gcp.kms.KeyRing("keyring", location="global")
|
283
283
|
cryptokey = gcp.kms.CryptoKey("cryptokey",
|
284
284
|
key_ring=keyring.id,
|
285
|
-
rotation_period="
|
285
|
+
rotation_period="7776000s")
|
286
286
|
example_key = gcp.kms.CryptoKeyVersion("example-key", crypto_key=cryptokey.id)
|
287
287
|
```
|
288
288
|
|
@@ -194,7 +194,7 @@ class SecretCiphertext(pulumi.CustomResource):
|
|
194
194
|
keyring = gcp.kms.KeyRing("keyring", location="global")
|
195
195
|
cryptokey = gcp.kms.CryptoKey("cryptokey",
|
196
196
|
key_ring=keyring.id,
|
197
|
-
rotation_period="
|
197
|
+
rotation_period="7776000s")
|
198
198
|
my_password = gcp.kms.SecretCiphertext("myPassword",
|
199
199
|
crypto_key=cryptokey.id,
|
200
200
|
plaintext="my-secret-password")
|
@@ -261,7 +261,7 @@ class SecretCiphertext(pulumi.CustomResource):
|
|
261
261
|
keyring = gcp.kms.KeyRing("keyring", location="global")
|
262
262
|
cryptokey = gcp.kms.CryptoKey("cryptokey",
|
263
263
|
key_ring=keyring.id,
|
264
|
-
rotation_period="
|
264
|
+
rotation_period="7776000s")
|
265
265
|
my_password = gcp.kms.SecretCiphertext("myPassword",
|
266
266
|
crypto_key=cryptokey.id,
|
267
267
|
plaintext="my-secret-password")
|
pulumi_gcp/netapp/__init__.py
CHANGED
@@ -6,6 +6,10 @@ from .. import _utilities
|
|
6
6
|
import typing
|
7
7
|
# Export this package's modules as members:
|
8
8
|
from .active_directory import *
|
9
|
+
from .backup_policy import *
|
9
10
|
from .backup_vault import *
|
10
11
|
from .kmsconfig import *
|
11
12
|
from .storage_pool import *
|
13
|
+
from .volume import *
|
14
|
+
from ._inputs import *
|
15
|
+
from . import outputs
|