pulumi-gcp 7.8.0a1706805960__py3-none-any.whl → 7.8.0a1706829616__py3-none-any.whl

Sign up to get free protection for your applications and to get access to all the features.
Files changed (79) hide show
  1. pulumi_gcp/_utilities.py +6 -2
  2. pulumi_gcp/alloydb/outputs.py +16 -0
  3. pulumi_gcp/artifactregistry/outputs.py +204 -0
  4. pulumi_gcp/assuredworkloads/_inputs.py +34 -0
  5. pulumi_gcp/assuredworkloads/outputs.py +34 -0
  6. pulumi_gcp/backupdisasterrecovery/outputs.py +20 -0
  7. pulumi_gcp/beyondcorp/outputs.py +54 -0
  8. pulumi_gcp/bigquery/_inputs.py +18 -0
  9. pulumi_gcp/bigquery/outputs.py +172 -0
  10. pulumi_gcp/bigtable/_inputs.py +4 -0
  11. pulumi_gcp/bigtable/outputs.py +4 -0
  12. pulumi_gcp/certificateauthority/outputs.py +378 -0
  13. pulumi_gcp/certificatemanager/outputs.py +32 -0
  14. pulumi_gcp/cloudbuild/outputs.py +1009 -3
  15. pulumi_gcp/cloudbuildv2/_inputs.py +14 -0
  16. pulumi_gcp/cloudbuildv2/outputs.py +14 -0
  17. pulumi_gcp/clouddeploy/_inputs.py +36 -0
  18. pulumi_gcp/clouddeploy/outputs.py +36 -0
  19. pulumi_gcp/cloudfunctions/_inputs.py +4 -0
  20. pulumi_gcp/cloudfunctions/outputs.py +54 -0
  21. pulumi_gcp/cloudfunctionsv2/outputs.py +302 -0
  22. pulumi_gcp/cloudidentity/outputs.py +54 -0
  23. pulumi_gcp/cloudrun/outputs.py +704 -0
  24. pulumi_gcp/cloudrunv2/outputs.py +929 -5
  25. pulumi_gcp/composer/_inputs.py +430 -0
  26. pulumi_gcp/composer/outputs.py +860 -0
  27. pulumi_gcp/compute/_inputs.py +924 -0
  28. pulumi_gcp/compute/outputs.py +4091 -1
  29. pulumi_gcp/container/_inputs.py +542 -0
  30. pulumi_gcp/container/outputs.py +2137 -3
  31. pulumi_gcp/dataplex/_inputs.py +66 -0
  32. pulumi_gcp/dataplex/outputs.py +66 -0
  33. pulumi_gcp/dataproc/_inputs.py +174 -0
  34. pulumi_gcp/dataproc/outputs.py +174 -0
  35. pulumi_gcp/dns/_inputs.py +34 -0
  36. pulumi_gcp/dns/outputs.py +34 -0
  37. pulumi_gcp/filestore/outputs.py +88 -0
  38. pulumi_gcp/firebaserules/_inputs.py +6 -0
  39. pulumi_gcp/firebaserules/outputs.py +6 -0
  40. pulumi_gcp/folder/_inputs.py +4 -0
  41. pulumi_gcp/folder/iam_audit_config.py +2 -2
  42. pulumi_gcp/folder/iam_member.py +2 -2
  43. pulumi_gcp/folder/iam_policy.py +2 -2
  44. pulumi_gcp/folder/outputs.py +54 -0
  45. pulumi_gcp/gkehub/_inputs.py +8 -0
  46. pulumi_gcp/gkehub/outputs.py +8 -0
  47. pulumi_gcp/iam/outputs.py +92 -0
  48. pulumi_gcp/kms/outputs.py +16 -0
  49. pulumi_gcp/logging/_inputs.py +108 -0
  50. pulumi_gcp/logging/outputs.py +108 -0
  51. pulumi_gcp/monitoring/outputs.py +14 -0
  52. pulumi_gcp/networkconnectivity/_inputs.py +6 -0
  53. pulumi_gcp/networkconnectivity/outputs.py +6 -0
  54. pulumi_gcp/organizations/_inputs.py +4 -0
  55. pulumi_gcp/organizations/iam_audit_config.py +2 -2
  56. pulumi_gcp/organizations/iam_member.py +2 -2
  57. pulumi_gcp/organizations/iam_policy.py +2 -2
  58. pulumi_gcp/organizations/outputs.py +4 -0
  59. pulumi_gcp/projects/_inputs.py +4 -0
  60. pulumi_gcp/projects/iam_audit_config.py +2 -2
  61. pulumi_gcp/projects/iam_binding.py +2 -2
  62. pulumi_gcp/projects/iam_member.py +2 -2
  63. pulumi_gcp/projects/iam_policy.py +2 -2
  64. pulumi_gcp/projects/outputs.py +54 -0
  65. pulumi_gcp/pubsub/outputs.py +282 -0
  66. pulumi_gcp/redis/outputs.py +204 -0
  67. pulumi_gcp/secretmanager/outputs.py +88 -0
  68. pulumi_gcp/sourcerepo/outputs.py +20 -0
  69. pulumi_gcp/spanner/outputs.py +68 -0
  70. pulumi_gcp/sql/_inputs.py +50 -0
  71. pulumi_gcp/sql/outputs.py +904 -0
  72. pulumi_gcp/storage/outputs.py +188 -0
  73. pulumi_gcp/vertex/outputs.py +124 -0
  74. pulumi_gcp/vmwareengine/outputs.py +208 -0
  75. pulumi_gcp/vpcaccess/outputs.py +4 -0
  76. {pulumi_gcp-7.8.0a1706805960.dist-info → pulumi_gcp-7.8.0a1706829616.dist-info}/METADATA +2 -1
  77. {pulumi_gcp-7.8.0a1706805960.dist-info → pulumi_gcp-7.8.0a1706829616.dist-info}/RECORD +79 -79
  78. {pulumi_gcp-7.8.0a1706805960.dist-info → pulumi_gcp-7.8.0a1706829616.dist-info}/WHEEL +0 -0
  79. {pulumi_gcp-7.8.0a1706805960.dist-info → pulumi_gcp-7.8.0a1706829616.dist-info}/top_level.txt +0 -0
@@ -1303,6 +1303,7 @@ class FeatureMembershipConfigmanagementConfigSync(dict):
1303
1303
  source_format: Optional[str] = None):
1304
1304
  """
1305
1305
  :param 'FeatureMembershipConfigmanagementConfigSyncGitArgs' git: (Optional) Structure is documented below.
1306
+ :param str metrics_gcp_service_account_email: The Email of the Google Cloud Service Account (GSA) used for exporting Config Sync metrics to Cloud Monitoring. The GSA should have the Monitoring Metric Writer(roles/monitoring.metricWriter) IAM role. The Kubernetes ServiceAccount `default` in the namespace `config-management-monitoring` should be bound to the GSA.
1306
1307
  :param 'FeatureMembershipConfigmanagementConfigSyncOciArgs' oci: (Optional) Supported from ACM versions 1.12.0 onwards. Structure is documented below.
1307
1308
 
1308
1309
  Use either `git` or `oci` config option.
@@ -1331,6 +1332,9 @@ class FeatureMembershipConfigmanagementConfigSync(dict):
1331
1332
  @property
1332
1333
  @pulumi.getter(name="metricsGcpServiceAccountEmail")
1333
1334
  def metrics_gcp_service_account_email(self) -> Optional[str]:
1335
+ """
1336
+ The Email of the Google Cloud Service Account (GSA) used for exporting Config Sync metrics to Cloud Monitoring. The GSA should have the Monitoring Metric Writer(roles/monitoring.metricWriter) IAM role. The Kubernetes ServiceAccount `default` in the namespace `config-management-monitoring` should be bound to the GSA.
1337
+ """
1334
1338
  return pulumi.get(self, "metrics_gcp_service_account_email")
1335
1339
 
1336
1340
  @property
@@ -1820,6 +1824,7 @@ class FeatureMembershipMesh(dict):
1820
1824
  control_plane: Optional[str] = None,
1821
1825
  management: Optional[str] = None):
1822
1826
  """
1827
+ :param str control_plane: **DEPRECATED** Whether to automatically manage Service Mesh control planes. Possible values: CONTROL_PLANE_MANAGEMENT_UNSPECIFIED, AUTOMATIC, MANUAL
1823
1828
  :param str management: Whether to automatically manage Service Mesh. Can either be `MANAGEMENT_AUTOMATIC` or `MANAGEMENT_MANUAL`.
1824
1829
  """
1825
1830
  if control_plane is not None:
@@ -1830,6 +1835,9 @@ class FeatureMembershipMesh(dict):
1830
1835
  @property
1831
1836
  @pulumi.getter(name="controlPlane")
1832
1837
  def control_plane(self) -> Optional[str]:
1838
+ """
1839
+ **DEPRECATED** Whether to automatically manage Service Mesh control planes. Possible values: CONTROL_PLANE_MANAGEMENT_UNSPECIFIED, AUTOMATIC, MANUAL
1840
+ """
1833
1841
  warnings.warn("""Deprecated in favor of the `management` field""", DeprecationWarning)
1834
1842
  pulumi.log.warn("""control_plane is deprecated: Deprecated in favor of the `management` field""")
1835
1843
 
pulumi_gcp/iam/outputs.py CHANGED
@@ -1058,11 +1058,17 @@ class GetTestablePermissionsPermissionResult(dict):
1058
1058
  class GetWorkloadIdentityPoolProviderAwResult(dict):
1059
1059
  def __init__(__self__, *,
1060
1060
  account_id: str):
1061
+ """
1062
+ :param str account_id: The AWS account ID.
1063
+ """
1061
1064
  pulumi.set(__self__, "account_id", account_id)
1062
1065
 
1063
1066
  @property
1064
1067
  @pulumi.getter(name="accountId")
1065
1068
  def account_id(self) -> str:
1069
+ """
1070
+ The AWS account ID.
1071
+ """
1066
1072
  return pulumi.get(self, "account_id")
1067
1073
 
1068
1074
 
@@ -1072,6 +1078,44 @@ class GetWorkloadIdentityPoolProviderOidcResult(dict):
1072
1078
  allowed_audiences: Sequence[str],
1073
1079
  issuer_uri: str,
1074
1080
  jwks_json: str):
1081
+ """
1082
+ :param Sequence[str] allowed_audiences: Acceptable values for the 'aud' field (audience) in the OIDC token. Token exchange
1083
+ requests are rejected if the token audience does not match one of the configured
1084
+ values. Each audience may be at most 256 characters. A maximum of 10 audiences may
1085
+ be configured.
1086
+
1087
+ If this list is empty, the OIDC token audience must be equal to the full canonical
1088
+ resource name of the WorkloadIdentityPoolProvider, with or without the HTTPS prefix.
1089
+ For example:
1090
+ '''
1091
+ //iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
1092
+ https://iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
1093
+ '''
1094
+ :param str issuer_uri: The OIDC issuer URL.
1095
+ :param str jwks_json: OIDC JWKs in JSON String format. For details on definition of a
1096
+ JWK, see https:tools.ietf.org/html/rfc7517. If not set, then we
1097
+ use the 'jwks_uri' from the discovery document fetched from the
1098
+ .well-known path for the 'issuer_uri'. Currently, RSA and EC asymmetric
1099
+ keys are supported. The JWK must use following format and include only
1100
+ the following fields:
1101
+ '''
1102
+ {
1103
+ "keys": [
1104
+ {
1105
+ "kty": "RSA/EC",
1106
+ "alg": "<algorithm>",
1107
+ "use": "sig",
1108
+ "kid": "<key-id>",
1109
+ "n": "",
1110
+ "e": "",
1111
+ "x": "",
1112
+ "y": "",
1113
+ "crv": ""
1114
+ }
1115
+ ]
1116
+ }
1117
+ '''
1118
+ """
1075
1119
  pulumi.set(__self__, "allowed_audiences", allowed_audiences)
1076
1120
  pulumi.set(__self__, "issuer_uri", issuer_uri)
1077
1121
  pulumi.set(__self__, "jwks_json", jwks_json)
@@ -1079,16 +1123,58 @@ class GetWorkloadIdentityPoolProviderOidcResult(dict):
1079
1123
  @property
1080
1124
  @pulumi.getter(name="allowedAudiences")
1081
1125
  def allowed_audiences(self) -> Sequence[str]:
1126
+ """
1127
+ Acceptable values for the 'aud' field (audience) in the OIDC token. Token exchange
1128
+ requests are rejected if the token audience does not match one of the configured
1129
+ values. Each audience may be at most 256 characters. A maximum of 10 audiences may
1130
+ be configured.
1131
+
1132
+ If this list is empty, the OIDC token audience must be equal to the full canonical
1133
+ resource name of the WorkloadIdentityPoolProvider, with or without the HTTPS prefix.
1134
+ For example:
1135
+ '''
1136
+ //iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
1137
+ https://iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
1138
+ '''
1139
+ """
1082
1140
  return pulumi.get(self, "allowed_audiences")
1083
1141
 
1084
1142
  @property
1085
1143
  @pulumi.getter(name="issuerUri")
1086
1144
  def issuer_uri(self) -> str:
1145
+ """
1146
+ The OIDC issuer URL.
1147
+ """
1087
1148
  return pulumi.get(self, "issuer_uri")
1088
1149
 
1089
1150
  @property
1090
1151
  @pulumi.getter(name="jwksJson")
1091
1152
  def jwks_json(self) -> str:
1153
+ """
1154
+ OIDC JWKs in JSON String format. For details on definition of a
1155
+ JWK, see https:tools.ietf.org/html/rfc7517. If not set, then we
1156
+ use the 'jwks_uri' from the discovery document fetched from the
1157
+ .well-known path for the 'issuer_uri'. Currently, RSA and EC asymmetric
1158
+ keys are supported. The JWK must use following format and include only
1159
+ the following fields:
1160
+ '''
1161
+ {
1162
+ "keys": [
1163
+ {
1164
+ "kty": "RSA/EC",
1165
+ "alg": "<algorithm>",
1166
+ "use": "sig",
1167
+ "kid": "<key-id>",
1168
+ "n": "",
1169
+ "e": "",
1170
+ "x": "",
1171
+ "y": "",
1172
+ "crv": ""
1173
+ }
1174
+ ]
1175
+ }
1176
+ '''
1177
+ """
1092
1178
  return pulumi.get(self, "jwks_json")
1093
1179
 
1094
1180
 
@@ -1096,11 +1182,17 @@ class GetWorkloadIdentityPoolProviderOidcResult(dict):
1096
1182
  class GetWorkloadIdentityPoolProviderSamlResult(dict):
1097
1183
  def __init__(__self__, *,
1098
1184
  idp_metadata_xml: str):
1185
+ """
1186
+ :param str idp_metadata_xml: SAML Identity provider configuration metadata xml doc.
1187
+ """
1099
1188
  pulumi.set(__self__, "idp_metadata_xml", idp_metadata_xml)
1100
1189
 
1101
1190
  @property
1102
1191
  @pulumi.getter(name="idpMetadataXml")
1103
1192
  def idp_metadata_xml(self) -> str:
1193
+ """
1194
+ SAML Identity provider configuration metadata xml doc.
1195
+ """
1104
1196
  return pulumi.get(self, "idp_metadata_xml")
1105
1197
 
1106
1198
 
pulumi_gcp/kms/outputs.py CHANGED
@@ -569,6 +569,7 @@ class GetKMSCryptoKeyPrimaryResult(dict):
569
569
  """
570
570
  :param str name: The CryptoKey's name.
571
571
  A CryptoKey’s name belonging to the specified Google Cloud Platform KeyRing and match the regular expression `[a-zA-Z0-9_-]{1,63}`
572
+ :param str state: The current state of the CryptoKeyVersion.
572
573
  """
573
574
  pulumi.set(__self__, "name", name)
574
575
  pulumi.set(__self__, "state", state)
@@ -585,6 +586,9 @@ class GetKMSCryptoKeyPrimaryResult(dict):
585
586
  @property
586
587
  @pulumi.getter
587
588
  def state(self) -> str:
589
+ """
590
+ The current state of the CryptoKeyVersion.
591
+ """
588
592
  return pulumi.get(self, "state")
589
593
 
590
594
 
@@ -622,17 +626,29 @@ class GetKMSCryptoKeyVersionTemplateResult(dict):
622
626
  def __init__(__self__, *,
623
627
  algorithm: str,
624
628
  protection_level: str):
629
+ """
630
+ :param str algorithm: The algorithm to use when creating a version based on this template.
631
+ See the [algorithm reference](https://cloud.google.com/kms/docs/reference/rest/v1/CryptoKeyVersionAlgorithm) for possible inputs.
632
+ :param str protection_level: The protection level to use when creating a version based on this template. Possible values include "SOFTWARE", "HSM", "EXTERNAL", "EXTERNAL_VPC". Defaults to "SOFTWARE".
633
+ """
625
634
  pulumi.set(__self__, "algorithm", algorithm)
626
635
  pulumi.set(__self__, "protection_level", protection_level)
627
636
 
628
637
  @property
629
638
  @pulumi.getter
630
639
  def algorithm(self) -> str:
640
+ """
641
+ The algorithm to use when creating a version based on this template.
642
+ See the [algorithm reference](https://cloud.google.com/kms/docs/reference/rest/v1/CryptoKeyVersionAlgorithm) for possible inputs.
643
+ """
631
644
  return pulumi.get(self, "algorithm")
632
645
 
633
646
  @property
634
647
  @pulumi.getter(name="protectionLevel")
635
648
  def protection_level(self) -> str:
649
+ """
650
+ The protection level to use when creating a version based on this template. Possible values include "SOFTWARE", "HSM", "EXTERNAL", "EXTERNAL_VPC". Defaults to "SOFTWARE".
651
+ """
636
652
  return pulumi.get(self, "protection_level")
637
653
 
638
654
 
@@ -43,7 +43,22 @@ class BillingAccountBucketConfigCmekSettingsArgs:
43
43
  name: Optional[pulumi.Input[str]] = None,
44
44
  service_account_id: Optional[pulumi.Input[str]] = None):
45
45
  """
46
+ :param pulumi.Input[str] kms_key_name: The resource name for the configured Cloud KMS key.
47
+ KMS key name format:
48
+ "projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]"
49
+ To enable CMEK for the bucket, set this field to a valid kmsKeyName for which the associated service account has the required cloudkms.cryptoKeyEncrypterDecrypter roles assigned for the key.
50
+ The Cloud KMS key used by the bucket can be updated by changing the kmsKeyName to a new valid key name. Encryption operations that are in progress will be completed with the key that was in use when they started. Decryption operations will be completed using the key that was used at the time of encryption unless access to that key has been revoked.
51
+ See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
52
+ :param pulumi.Input[str] kms_key_version_name: The CryptoKeyVersion resource name for the configured Cloud KMS key.
53
+ KMS key name format:
54
+ "projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]/cryptoKeyVersions/[VERSION]"
55
+ For example:
56
+ "projects/my-project/locations/us-central1/keyRings/my-ring/cryptoKeys/my-key/cryptoKeyVersions/1"
57
+ This is a read-only field used to convey the specific configured CryptoKeyVersion of kms_key that has been configured. It will be populated in cases where the CMEK settings are bound to a single key version.
46
58
  :param pulumi.Input[str] name: The resource name of the bucket. For example: "projects/my-project-id/locations/my-location/buckets/my-bucket-id"
59
+ :param pulumi.Input[str] service_account_id: The service account associated with a project for which CMEK will apply.
60
+ Before enabling CMEK for a logging bucket, you must first assign the cloudkms.cryptoKeyEncrypterDecrypter role to the service account associated with the project for which CMEK will apply. Use [v2.getCmekSettings](https://cloud.google.com/logging/docs/reference/v2/rest/v2/TopLevel/getCmekSettings#google.logging.v2.ConfigServiceV2.GetCmekSettings) to obtain the service account ID.
61
+ See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
47
62
  """
48
63
  pulumi.set(__self__, "kms_key_name", kms_key_name)
49
64
  if kms_key_version_name is not None:
@@ -56,6 +71,14 @@ class BillingAccountBucketConfigCmekSettingsArgs:
56
71
  @property
57
72
  @pulumi.getter(name="kmsKeyName")
58
73
  def kms_key_name(self) -> pulumi.Input[str]:
74
+ """
75
+ The resource name for the configured Cloud KMS key.
76
+ KMS key name format:
77
+ "projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]"
78
+ To enable CMEK for the bucket, set this field to a valid kmsKeyName for which the associated service account has the required cloudkms.cryptoKeyEncrypterDecrypter roles assigned for the key.
79
+ The Cloud KMS key used by the bucket can be updated by changing the kmsKeyName to a new valid key name. Encryption operations that are in progress will be completed with the key that was in use when they started. Decryption operations will be completed using the key that was used at the time of encryption unless access to that key has been revoked.
80
+ See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
81
+ """
59
82
  return pulumi.get(self, "kms_key_name")
60
83
 
61
84
  @kms_key_name.setter
@@ -65,6 +88,14 @@ class BillingAccountBucketConfigCmekSettingsArgs:
65
88
  @property
66
89
  @pulumi.getter(name="kmsKeyVersionName")
67
90
  def kms_key_version_name(self) -> Optional[pulumi.Input[str]]:
91
+ """
92
+ The CryptoKeyVersion resource name for the configured Cloud KMS key.
93
+ KMS key name format:
94
+ "projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]/cryptoKeyVersions/[VERSION]"
95
+ For example:
96
+ "projects/my-project/locations/us-central1/keyRings/my-ring/cryptoKeys/my-key/cryptoKeyVersions/1"
97
+ This is a read-only field used to convey the specific configured CryptoKeyVersion of kms_key that has been configured. It will be populated in cases where the CMEK settings are bound to a single key version.
98
+ """
68
99
  return pulumi.get(self, "kms_key_version_name")
69
100
 
70
101
  @kms_key_version_name.setter
@@ -86,6 +117,11 @@ class BillingAccountBucketConfigCmekSettingsArgs:
86
117
  @property
87
118
  @pulumi.getter(name="serviceAccountId")
88
119
  def service_account_id(self) -> Optional[pulumi.Input[str]]:
120
+ """
121
+ The service account associated with a project for which CMEK will apply.
122
+ Before enabling CMEK for a logging bucket, you must first assign the cloudkms.cryptoKeyEncrypterDecrypter role to the service account associated with the project for which CMEK will apply. Use [v2.getCmekSettings](https://cloud.google.com/logging/docs/reference/v2/rest/v2/TopLevel/getCmekSettings#google.logging.v2.ConfigServiceV2.GetCmekSettings) to obtain the service account ID.
123
+ See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
124
+ """
89
125
  return pulumi.get(self, "service_account_id")
90
126
 
91
127
  @service_account_id.setter
@@ -239,7 +275,22 @@ class FolderBucketConfigCmekSettingsArgs:
239
275
  name: Optional[pulumi.Input[str]] = None,
240
276
  service_account_id: Optional[pulumi.Input[str]] = None):
241
277
  """
278
+ :param pulumi.Input[str] kms_key_name: The resource name for the configured Cloud KMS key.
279
+ KMS key name format:
280
+ "projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]"
281
+ To enable CMEK for the bucket, set this field to a valid kmsKeyName for which the associated service account has the required cloudkms.cryptoKeyEncrypterDecrypter roles assigned for the key.
282
+ The Cloud KMS key used by the bucket can be updated by changing the kmsKeyName to a new valid key name. Encryption operations that are in progress will be completed with the key that was in use when they started. Decryption operations will be completed using the key that was used at the time of encryption unless access to that key has been revoked.
283
+ See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
284
+ :param pulumi.Input[str] kms_key_version_name: The CryptoKeyVersion resource name for the configured Cloud KMS key.
285
+ KMS key name format:
286
+ "projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]/cryptoKeyVersions/[VERSION]"
287
+ For example:
288
+ "projects/my-project/locations/us-central1/keyRings/my-ring/cryptoKeys/my-key/cryptoKeyVersions/1"
289
+ This is a read-only field used to convey the specific configured CryptoKeyVersion of kms_key that has been configured. It will be populated in cases where the CMEK settings are bound to a single key version.
242
290
  :param pulumi.Input[str] name: The resource name of the bucket. For example: "folders/my-folder-id/locations/my-location/buckets/my-bucket-id"
291
+ :param pulumi.Input[str] service_account_id: The service account associated with a project for which CMEK will apply.
292
+ Before enabling CMEK for a logging bucket, you must first assign the cloudkms.cryptoKeyEncrypterDecrypter role to the service account associated with the project for which CMEK will apply. Use [v2.getCmekSettings](https://cloud.google.com/logging/docs/reference/v2/rest/v2/TopLevel/getCmekSettings#google.logging.v2.ConfigServiceV2.GetCmekSettings) to obtain the service account ID.
293
+ See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
243
294
  """
244
295
  pulumi.set(__self__, "kms_key_name", kms_key_name)
245
296
  if kms_key_version_name is not None:
@@ -252,6 +303,14 @@ class FolderBucketConfigCmekSettingsArgs:
252
303
  @property
253
304
  @pulumi.getter(name="kmsKeyName")
254
305
  def kms_key_name(self) -> pulumi.Input[str]:
306
+ """
307
+ The resource name for the configured Cloud KMS key.
308
+ KMS key name format:
309
+ "projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]"
310
+ To enable CMEK for the bucket, set this field to a valid kmsKeyName for which the associated service account has the required cloudkms.cryptoKeyEncrypterDecrypter roles assigned for the key.
311
+ The Cloud KMS key used by the bucket can be updated by changing the kmsKeyName to a new valid key name. Encryption operations that are in progress will be completed with the key that was in use when they started. Decryption operations will be completed using the key that was used at the time of encryption unless access to that key has been revoked.
312
+ See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
313
+ """
255
314
  return pulumi.get(self, "kms_key_name")
256
315
 
257
316
  @kms_key_name.setter
@@ -261,6 +320,14 @@ class FolderBucketConfigCmekSettingsArgs:
261
320
  @property
262
321
  @pulumi.getter(name="kmsKeyVersionName")
263
322
  def kms_key_version_name(self) -> Optional[pulumi.Input[str]]:
323
+ """
324
+ The CryptoKeyVersion resource name for the configured Cloud KMS key.
325
+ KMS key name format:
326
+ "projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]/cryptoKeyVersions/[VERSION]"
327
+ For example:
328
+ "projects/my-project/locations/us-central1/keyRings/my-ring/cryptoKeys/my-key/cryptoKeyVersions/1"
329
+ This is a read-only field used to convey the specific configured CryptoKeyVersion of kms_key that has been configured. It will be populated in cases where the CMEK settings are bound to a single key version.
330
+ """
264
331
  return pulumi.get(self, "kms_key_version_name")
265
332
 
266
333
  @kms_key_version_name.setter
@@ -282,6 +349,11 @@ class FolderBucketConfigCmekSettingsArgs:
282
349
  @property
283
350
  @pulumi.getter(name="serviceAccountId")
284
351
  def service_account_id(self) -> Optional[pulumi.Input[str]]:
352
+ """
353
+ The service account associated with a project for which CMEK will apply.
354
+ Before enabling CMEK for a logging bucket, you must first assign the cloudkms.cryptoKeyEncrypterDecrypter role to the service account associated with the project for which CMEK will apply. Use [v2.getCmekSettings](https://cloud.google.com/logging/docs/reference/v2/rest/v2/TopLevel/getCmekSettings#google.logging.v2.ConfigServiceV2.GetCmekSettings) to obtain the service account ID.
355
+ See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
356
+ """
285
357
  return pulumi.get(self, "service_account_id")
286
358
 
287
359
  @service_account_id.setter
@@ -828,7 +900,22 @@ class OrganizationBucketConfigCmekSettingsArgs:
828
900
  name: Optional[pulumi.Input[str]] = None,
829
901
  service_account_id: Optional[pulumi.Input[str]] = None):
830
902
  """
903
+ :param pulumi.Input[str] kms_key_name: The resource name for the configured Cloud KMS key.
904
+ KMS key name format:
905
+ "projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]"
906
+ To enable CMEK for the bucket, set this field to a valid kmsKeyName for which the associated service account has the required cloudkms.cryptoKeyEncrypterDecrypter roles assigned for the key.
907
+ The Cloud KMS key used by the bucket can be updated by changing the kmsKeyName to a new valid key name. Encryption operations that are in progress will be completed with the key that was in use when they started. Decryption operations will be completed using the key that was used at the time of encryption unless access to that key has been revoked.
908
+ See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
909
+ :param pulumi.Input[str] kms_key_version_name: The CryptoKeyVersion resource name for the configured Cloud KMS key.
910
+ KMS key name format:
911
+ "projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]/cryptoKeyVersions/[VERSION]"
912
+ For example:
913
+ "projects/my-project/locations/us-central1/keyRings/my-ring/cryptoKeys/my-key/cryptoKeyVersions/1"
914
+ This is a read-only field used to convey the specific configured CryptoKeyVersion of kms_key that has been configured. It will be populated in cases where the CMEK settings are bound to a single key version.
831
915
  :param pulumi.Input[str] name: The resource name of the bucket. For example: "organizations/my-organization-id/locations/my-location/buckets/my-bucket-id"
916
+ :param pulumi.Input[str] service_account_id: The service account associated with a project for which CMEK will apply.
917
+ Before enabling CMEK for a logging bucket, you must first assign the cloudkms.cryptoKeyEncrypterDecrypter role to the service account associated with the project for which CMEK will apply. Use [v2.getCmekSettings](https://cloud.google.com/logging/docs/reference/v2/rest/v2/TopLevel/getCmekSettings#google.logging.v2.ConfigServiceV2.GetCmekSettings) to obtain the service account ID.
918
+ See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
832
919
  """
833
920
  pulumi.set(__self__, "kms_key_name", kms_key_name)
834
921
  if kms_key_version_name is not None:
@@ -841,6 +928,14 @@ class OrganizationBucketConfigCmekSettingsArgs:
841
928
  @property
842
929
  @pulumi.getter(name="kmsKeyName")
843
930
  def kms_key_name(self) -> pulumi.Input[str]:
931
+ """
932
+ The resource name for the configured Cloud KMS key.
933
+ KMS key name format:
934
+ "projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]"
935
+ To enable CMEK for the bucket, set this field to a valid kmsKeyName for which the associated service account has the required cloudkms.cryptoKeyEncrypterDecrypter roles assigned for the key.
936
+ The Cloud KMS key used by the bucket can be updated by changing the kmsKeyName to a new valid key name. Encryption operations that are in progress will be completed with the key that was in use when they started. Decryption operations will be completed using the key that was used at the time of encryption unless access to that key has been revoked.
937
+ See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
938
+ """
844
939
  return pulumi.get(self, "kms_key_name")
845
940
 
846
941
  @kms_key_name.setter
@@ -850,6 +945,14 @@ class OrganizationBucketConfigCmekSettingsArgs:
850
945
  @property
851
946
  @pulumi.getter(name="kmsKeyVersionName")
852
947
  def kms_key_version_name(self) -> Optional[pulumi.Input[str]]:
948
+ """
949
+ The CryptoKeyVersion resource name for the configured Cloud KMS key.
950
+ KMS key name format:
951
+ "projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]/cryptoKeyVersions/[VERSION]"
952
+ For example:
953
+ "projects/my-project/locations/us-central1/keyRings/my-ring/cryptoKeys/my-key/cryptoKeyVersions/1"
954
+ This is a read-only field used to convey the specific configured CryptoKeyVersion of kms_key that has been configured. It will be populated in cases where the CMEK settings are bound to a single key version.
955
+ """
853
956
  return pulumi.get(self, "kms_key_version_name")
854
957
 
855
958
  @kms_key_version_name.setter
@@ -871,6 +974,11 @@ class OrganizationBucketConfigCmekSettingsArgs:
871
974
  @property
872
975
  @pulumi.getter(name="serviceAccountId")
873
976
  def service_account_id(self) -> Optional[pulumi.Input[str]]:
977
+ """
978
+ The service account associated with a project for which CMEK will apply.
979
+ Before enabling CMEK for a logging bucket, you must first assign the cloudkms.cryptoKeyEncrypterDecrypter role to the service account associated with the project for which CMEK will apply. Use [v2.getCmekSettings](https://cloud.google.com/logging/docs/reference/v2/rest/v2/TopLevel/getCmekSettings#google.logging.v2.ConfigServiceV2.GetCmekSettings) to obtain the service account ID.
980
+ See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
981
+ """
874
982
  return pulumi.get(self, "service_account_id")
875
983
 
876
984
  @service_account_id.setter
@@ -67,7 +67,22 @@ class BillingAccountBucketConfigCmekSettings(dict):
67
67
  name: Optional[str] = None,
68
68
  service_account_id: Optional[str] = None):
69
69
  """
70
+ :param str kms_key_name: The resource name for the configured Cloud KMS key.
71
+ KMS key name format:
72
+ "projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]"
73
+ To enable CMEK for the bucket, set this field to a valid kmsKeyName for which the associated service account has the required cloudkms.cryptoKeyEncrypterDecrypter roles assigned for the key.
74
+ The Cloud KMS key used by the bucket can be updated by changing the kmsKeyName to a new valid key name. Encryption operations that are in progress will be completed with the key that was in use when they started. Decryption operations will be completed using the key that was used at the time of encryption unless access to that key has been revoked.
75
+ See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
76
+ :param str kms_key_version_name: The CryptoKeyVersion resource name for the configured Cloud KMS key.
77
+ KMS key name format:
78
+ "projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]/cryptoKeyVersions/[VERSION]"
79
+ For example:
80
+ "projects/my-project/locations/us-central1/keyRings/my-ring/cryptoKeys/my-key/cryptoKeyVersions/1"
81
+ This is a read-only field used to convey the specific configured CryptoKeyVersion of kms_key that has been configured. It will be populated in cases where the CMEK settings are bound to a single key version.
70
82
  :param str name: The resource name of the bucket. For example: "projects/my-project-id/locations/my-location/buckets/my-bucket-id"
83
+ :param str service_account_id: The service account associated with a project for which CMEK will apply.
84
+ Before enabling CMEK for a logging bucket, you must first assign the cloudkms.cryptoKeyEncrypterDecrypter role to the service account associated with the project for which CMEK will apply. Use [v2.getCmekSettings](https://cloud.google.com/logging/docs/reference/v2/rest/v2/TopLevel/getCmekSettings#google.logging.v2.ConfigServiceV2.GetCmekSettings) to obtain the service account ID.
85
+ See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
71
86
  """
72
87
  pulumi.set(__self__, "kms_key_name", kms_key_name)
73
88
  if kms_key_version_name is not None:
@@ -80,11 +95,27 @@ class BillingAccountBucketConfigCmekSettings(dict):
80
95
  @property
81
96
  @pulumi.getter(name="kmsKeyName")
82
97
  def kms_key_name(self) -> str:
98
+ """
99
+ The resource name for the configured Cloud KMS key.
100
+ KMS key name format:
101
+ "projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]"
102
+ To enable CMEK for the bucket, set this field to a valid kmsKeyName for which the associated service account has the required cloudkms.cryptoKeyEncrypterDecrypter roles assigned for the key.
103
+ The Cloud KMS key used by the bucket can be updated by changing the kmsKeyName to a new valid key name. Encryption operations that are in progress will be completed with the key that was in use when they started. Decryption operations will be completed using the key that was used at the time of encryption unless access to that key has been revoked.
104
+ See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
105
+ """
83
106
  return pulumi.get(self, "kms_key_name")
84
107
 
85
108
  @property
86
109
  @pulumi.getter(name="kmsKeyVersionName")
87
110
  def kms_key_version_name(self) -> Optional[str]:
111
+ """
112
+ The CryptoKeyVersion resource name for the configured Cloud KMS key.
113
+ KMS key name format:
114
+ "projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]/cryptoKeyVersions/[VERSION]"
115
+ For example:
116
+ "projects/my-project/locations/us-central1/keyRings/my-ring/cryptoKeys/my-key/cryptoKeyVersions/1"
117
+ This is a read-only field used to convey the specific configured CryptoKeyVersion of kms_key that has been configured. It will be populated in cases where the CMEK settings are bound to a single key version.
118
+ """
88
119
  return pulumi.get(self, "kms_key_version_name")
89
120
 
90
121
  @property
@@ -98,6 +129,11 @@ class BillingAccountBucketConfigCmekSettings(dict):
98
129
  @property
99
130
  @pulumi.getter(name="serviceAccountId")
100
131
  def service_account_id(self) -> Optional[str]:
132
+ """
133
+ The service account associated with a project for which CMEK will apply.
134
+ Before enabling CMEK for a logging bucket, you must first assign the cloudkms.cryptoKeyEncrypterDecrypter role to the service account associated with the project for which CMEK will apply. Use [v2.getCmekSettings](https://cloud.google.com/logging/docs/reference/v2/rest/v2/TopLevel/getCmekSettings#google.logging.v2.ConfigServiceV2.GetCmekSettings) to obtain the service account ID.
135
+ See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
136
+ """
101
137
  return pulumi.get(self, "service_account_id")
102
138
 
103
139
 
@@ -274,7 +310,22 @@ class FolderBucketConfigCmekSettings(dict):
274
310
  name: Optional[str] = None,
275
311
  service_account_id: Optional[str] = None):
276
312
  """
313
+ :param str kms_key_name: The resource name for the configured Cloud KMS key.
314
+ KMS key name format:
315
+ "projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]"
316
+ To enable CMEK for the bucket, set this field to a valid kmsKeyName for which the associated service account has the required cloudkms.cryptoKeyEncrypterDecrypter roles assigned for the key.
317
+ The Cloud KMS key used by the bucket can be updated by changing the kmsKeyName to a new valid key name. Encryption operations that are in progress will be completed with the key that was in use when they started. Decryption operations will be completed using the key that was used at the time of encryption unless access to that key has been revoked.
318
+ See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
319
+ :param str kms_key_version_name: The CryptoKeyVersion resource name for the configured Cloud KMS key.
320
+ KMS key name format:
321
+ "projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]/cryptoKeyVersions/[VERSION]"
322
+ For example:
323
+ "projects/my-project/locations/us-central1/keyRings/my-ring/cryptoKeys/my-key/cryptoKeyVersions/1"
324
+ This is a read-only field used to convey the specific configured CryptoKeyVersion of kms_key that has been configured. It will be populated in cases where the CMEK settings are bound to a single key version.
277
325
  :param str name: The resource name of the bucket. For example: "folders/my-folder-id/locations/my-location/buckets/my-bucket-id"
326
+ :param str service_account_id: The service account associated with a project for which CMEK will apply.
327
+ Before enabling CMEK for a logging bucket, you must first assign the cloudkms.cryptoKeyEncrypterDecrypter role to the service account associated with the project for which CMEK will apply. Use [v2.getCmekSettings](https://cloud.google.com/logging/docs/reference/v2/rest/v2/TopLevel/getCmekSettings#google.logging.v2.ConfigServiceV2.GetCmekSettings) to obtain the service account ID.
328
+ See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
278
329
  """
279
330
  pulumi.set(__self__, "kms_key_name", kms_key_name)
280
331
  if kms_key_version_name is not None:
@@ -287,11 +338,27 @@ class FolderBucketConfigCmekSettings(dict):
287
338
  @property
288
339
  @pulumi.getter(name="kmsKeyName")
289
340
  def kms_key_name(self) -> str:
341
+ """
342
+ The resource name for the configured Cloud KMS key.
343
+ KMS key name format:
344
+ "projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]"
345
+ To enable CMEK for the bucket, set this field to a valid kmsKeyName for which the associated service account has the required cloudkms.cryptoKeyEncrypterDecrypter roles assigned for the key.
346
+ The Cloud KMS key used by the bucket can be updated by changing the kmsKeyName to a new valid key name. Encryption operations that are in progress will be completed with the key that was in use when they started. Decryption operations will be completed using the key that was used at the time of encryption unless access to that key has been revoked.
347
+ See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
348
+ """
290
349
  return pulumi.get(self, "kms_key_name")
291
350
 
292
351
  @property
293
352
  @pulumi.getter(name="kmsKeyVersionName")
294
353
  def kms_key_version_name(self) -> Optional[str]:
354
+ """
355
+ The CryptoKeyVersion resource name for the configured Cloud KMS key.
356
+ KMS key name format:
357
+ "projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]/cryptoKeyVersions/[VERSION]"
358
+ For example:
359
+ "projects/my-project/locations/us-central1/keyRings/my-ring/cryptoKeys/my-key/cryptoKeyVersions/1"
360
+ This is a read-only field used to convey the specific configured CryptoKeyVersion of kms_key that has been configured. It will be populated in cases where the CMEK settings are bound to a single key version.
361
+ """
295
362
  return pulumi.get(self, "kms_key_version_name")
296
363
 
297
364
  @property
@@ -305,6 +372,11 @@ class FolderBucketConfigCmekSettings(dict):
305
372
  @property
306
373
  @pulumi.getter(name="serviceAccountId")
307
374
  def service_account_id(self) -> Optional[str]:
375
+ """
376
+ The service account associated with a project for which CMEK will apply.
377
+ Before enabling CMEK for a logging bucket, you must first assign the cloudkms.cryptoKeyEncrypterDecrypter role to the service account associated with the project for which CMEK will apply. Use [v2.getCmekSettings](https://cloud.google.com/logging/docs/reference/v2/rest/v2/TopLevel/getCmekSettings#google.logging.v2.ConfigServiceV2.GetCmekSettings) to obtain the service account ID.
378
+ See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
379
+ """
308
380
  return pulumi.get(self, "service_account_id")
309
381
 
310
382
 
@@ -910,7 +982,22 @@ class OrganizationBucketConfigCmekSettings(dict):
910
982
  name: Optional[str] = None,
911
983
  service_account_id: Optional[str] = None):
912
984
  """
985
+ :param str kms_key_name: The resource name for the configured Cloud KMS key.
986
+ KMS key name format:
987
+ "projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]"
988
+ To enable CMEK for the bucket, set this field to a valid kmsKeyName for which the associated service account has the required cloudkms.cryptoKeyEncrypterDecrypter roles assigned for the key.
989
+ The Cloud KMS key used by the bucket can be updated by changing the kmsKeyName to a new valid key name. Encryption operations that are in progress will be completed with the key that was in use when they started. Decryption operations will be completed using the key that was used at the time of encryption unless access to that key has been revoked.
990
+ See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
991
+ :param str kms_key_version_name: The CryptoKeyVersion resource name for the configured Cloud KMS key.
992
+ KMS key name format:
993
+ "projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]/cryptoKeyVersions/[VERSION]"
994
+ For example:
995
+ "projects/my-project/locations/us-central1/keyRings/my-ring/cryptoKeys/my-key/cryptoKeyVersions/1"
996
+ This is a read-only field used to convey the specific configured CryptoKeyVersion of kms_key that has been configured. It will be populated in cases where the CMEK settings are bound to a single key version.
913
997
  :param str name: The resource name of the bucket. For example: "organizations/my-organization-id/locations/my-location/buckets/my-bucket-id"
998
+ :param str service_account_id: The service account associated with a project for which CMEK will apply.
999
+ Before enabling CMEK for a logging bucket, you must first assign the cloudkms.cryptoKeyEncrypterDecrypter role to the service account associated with the project for which CMEK will apply. Use [v2.getCmekSettings](https://cloud.google.com/logging/docs/reference/v2/rest/v2/TopLevel/getCmekSettings#google.logging.v2.ConfigServiceV2.GetCmekSettings) to obtain the service account ID.
1000
+ See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
914
1001
  """
915
1002
  pulumi.set(__self__, "kms_key_name", kms_key_name)
916
1003
  if kms_key_version_name is not None:
@@ -923,11 +1010,27 @@ class OrganizationBucketConfigCmekSettings(dict):
923
1010
  @property
924
1011
  @pulumi.getter(name="kmsKeyName")
925
1012
  def kms_key_name(self) -> str:
1013
+ """
1014
+ The resource name for the configured Cloud KMS key.
1015
+ KMS key name format:
1016
+ "projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]"
1017
+ To enable CMEK for the bucket, set this field to a valid kmsKeyName for which the associated service account has the required cloudkms.cryptoKeyEncrypterDecrypter roles assigned for the key.
1018
+ The Cloud KMS key used by the bucket can be updated by changing the kmsKeyName to a new valid key name. Encryption operations that are in progress will be completed with the key that was in use when they started. Decryption operations will be completed using the key that was used at the time of encryption unless access to that key has been revoked.
1019
+ See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
1020
+ """
926
1021
  return pulumi.get(self, "kms_key_name")
927
1022
 
928
1023
  @property
929
1024
  @pulumi.getter(name="kmsKeyVersionName")
930
1025
  def kms_key_version_name(self) -> Optional[str]:
1026
+ """
1027
+ The CryptoKeyVersion resource name for the configured Cloud KMS key.
1028
+ KMS key name format:
1029
+ "projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]/cryptoKeyVersions/[VERSION]"
1030
+ For example:
1031
+ "projects/my-project/locations/us-central1/keyRings/my-ring/cryptoKeys/my-key/cryptoKeyVersions/1"
1032
+ This is a read-only field used to convey the specific configured CryptoKeyVersion of kms_key that has been configured. It will be populated in cases where the CMEK settings are bound to a single key version.
1033
+ """
931
1034
  return pulumi.get(self, "kms_key_version_name")
932
1035
 
933
1036
  @property
@@ -941,6 +1044,11 @@ class OrganizationBucketConfigCmekSettings(dict):
941
1044
  @property
942
1045
  @pulumi.getter(name="serviceAccountId")
943
1046
  def service_account_id(self) -> Optional[str]:
1047
+ """
1048
+ The service account associated with a project for which CMEK will apply.
1049
+ Before enabling CMEK for a logging bucket, you must first assign the cloudkms.cryptoKeyEncrypterDecrypter role to the service account associated with the project for which CMEK will apply. Use [v2.getCmekSettings](https://cloud.google.com/logging/docs/reference/v2/rest/v2/TopLevel/getCmekSettings#google.logging.v2.ConfigServiceV2.GetCmekSettings) to obtain the service account ID.
1050
+ See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
1051
+ """
944
1052
  return pulumi.get(self, "service_account_id")
945
1053
 
946
1054