pulumi-gcp 7.8.0a1706805960__py3-none-any.whl → 7.8.0a1706829616__py3-none-any.whl
Sign up to get free protection for your applications and to get access to all the features.
- pulumi_gcp/_utilities.py +6 -2
- pulumi_gcp/alloydb/outputs.py +16 -0
- pulumi_gcp/artifactregistry/outputs.py +204 -0
- pulumi_gcp/assuredworkloads/_inputs.py +34 -0
- pulumi_gcp/assuredworkloads/outputs.py +34 -0
- pulumi_gcp/backupdisasterrecovery/outputs.py +20 -0
- pulumi_gcp/beyondcorp/outputs.py +54 -0
- pulumi_gcp/bigquery/_inputs.py +18 -0
- pulumi_gcp/bigquery/outputs.py +172 -0
- pulumi_gcp/bigtable/_inputs.py +4 -0
- pulumi_gcp/bigtable/outputs.py +4 -0
- pulumi_gcp/certificateauthority/outputs.py +378 -0
- pulumi_gcp/certificatemanager/outputs.py +32 -0
- pulumi_gcp/cloudbuild/outputs.py +1009 -3
- pulumi_gcp/cloudbuildv2/_inputs.py +14 -0
- pulumi_gcp/cloudbuildv2/outputs.py +14 -0
- pulumi_gcp/clouddeploy/_inputs.py +36 -0
- pulumi_gcp/clouddeploy/outputs.py +36 -0
- pulumi_gcp/cloudfunctions/_inputs.py +4 -0
- pulumi_gcp/cloudfunctions/outputs.py +54 -0
- pulumi_gcp/cloudfunctionsv2/outputs.py +302 -0
- pulumi_gcp/cloudidentity/outputs.py +54 -0
- pulumi_gcp/cloudrun/outputs.py +704 -0
- pulumi_gcp/cloudrunv2/outputs.py +929 -5
- pulumi_gcp/composer/_inputs.py +430 -0
- pulumi_gcp/composer/outputs.py +860 -0
- pulumi_gcp/compute/_inputs.py +924 -0
- pulumi_gcp/compute/outputs.py +4091 -1
- pulumi_gcp/container/_inputs.py +542 -0
- pulumi_gcp/container/outputs.py +2137 -3
- pulumi_gcp/dataplex/_inputs.py +66 -0
- pulumi_gcp/dataplex/outputs.py +66 -0
- pulumi_gcp/dataproc/_inputs.py +174 -0
- pulumi_gcp/dataproc/outputs.py +174 -0
- pulumi_gcp/dns/_inputs.py +34 -0
- pulumi_gcp/dns/outputs.py +34 -0
- pulumi_gcp/filestore/outputs.py +88 -0
- pulumi_gcp/firebaserules/_inputs.py +6 -0
- pulumi_gcp/firebaserules/outputs.py +6 -0
- pulumi_gcp/folder/_inputs.py +4 -0
- pulumi_gcp/folder/iam_audit_config.py +2 -2
- pulumi_gcp/folder/iam_member.py +2 -2
- pulumi_gcp/folder/iam_policy.py +2 -2
- pulumi_gcp/folder/outputs.py +54 -0
- pulumi_gcp/gkehub/_inputs.py +8 -0
- pulumi_gcp/gkehub/outputs.py +8 -0
- pulumi_gcp/iam/outputs.py +92 -0
- pulumi_gcp/kms/outputs.py +16 -0
- pulumi_gcp/logging/_inputs.py +108 -0
- pulumi_gcp/logging/outputs.py +108 -0
- pulumi_gcp/monitoring/outputs.py +14 -0
- pulumi_gcp/networkconnectivity/_inputs.py +6 -0
- pulumi_gcp/networkconnectivity/outputs.py +6 -0
- pulumi_gcp/organizations/_inputs.py +4 -0
- pulumi_gcp/organizations/iam_audit_config.py +2 -2
- pulumi_gcp/organizations/iam_member.py +2 -2
- pulumi_gcp/organizations/iam_policy.py +2 -2
- pulumi_gcp/organizations/outputs.py +4 -0
- pulumi_gcp/projects/_inputs.py +4 -0
- pulumi_gcp/projects/iam_audit_config.py +2 -2
- pulumi_gcp/projects/iam_binding.py +2 -2
- pulumi_gcp/projects/iam_member.py +2 -2
- pulumi_gcp/projects/iam_policy.py +2 -2
- pulumi_gcp/projects/outputs.py +54 -0
- pulumi_gcp/pubsub/outputs.py +282 -0
- pulumi_gcp/redis/outputs.py +204 -0
- pulumi_gcp/secretmanager/outputs.py +88 -0
- pulumi_gcp/sourcerepo/outputs.py +20 -0
- pulumi_gcp/spanner/outputs.py +68 -0
- pulumi_gcp/sql/_inputs.py +50 -0
- pulumi_gcp/sql/outputs.py +904 -0
- pulumi_gcp/storage/outputs.py +188 -0
- pulumi_gcp/vertex/outputs.py +124 -0
- pulumi_gcp/vmwareengine/outputs.py +208 -0
- pulumi_gcp/vpcaccess/outputs.py +4 -0
- {pulumi_gcp-7.8.0a1706805960.dist-info → pulumi_gcp-7.8.0a1706829616.dist-info}/METADATA +2 -1
- {pulumi_gcp-7.8.0a1706805960.dist-info → pulumi_gcp-7.8.0a1706829616.dist-info}/RECORD +79 -79
- {pulumi_gcp-7.8.0a1706805960.dist-info → pulumi_gcp-7.8.0a1706829616.dist-info}/WHEEL +0 -0
- {pulumi_gcp-7.8.0a1706805960.dist-info → pulumi_gcp-7.8.0a1706829616.dist-info}/top_level.txt +0 -0
pulumi_gcp/gkehub/outputs.py
CHANGED
@@ -1303,6 +1303,7 @@ class FeatureMembershipConfigmanagementConfigSync(dict):
|
|
1303
1303
|
source_format: Optional[str] = None):
|
1304
1304
|
"""
|
1305
1305
|
:param 'FeatureMembershipConfigmanagementConfigSyncGitArgs' git: (Optional) Structure is documented below.
|
1306
|
+
:param str metrics_gcp_service_account_email: The Email of the Google Cloud Service Account (GSA) used for exporting Config Sync metrics to Cloud Monitoring. The GSA should have the Monitoring Metric Writer(roles/monitoring.metricWriter) IAM role. The Kubernetes ServiceAccount `default` in the namespace `config-management-monitoring` should be bound to the GSA.
|
1306
1307
|
:param 'FeatureMembershipConfigmanagementConfigSyncOciArgs' oci: (Optional) Supported from ACM versions 1.12.0 onwards. Structure is documented below.
|
1307
1308
|
|
1308
1309
|
Use either `git` or `oci` config option.
|
@@ -1331,6 +1332,9 @@ class FeatureMembershipConfigmanagementConfigSync(dict):
|
|
1331
1332
|
@property
|
1332
1333
|
@pulumi.getter(name="metricsGcpServiceAccountEmail")
|
1333
1334
|
def metrics_gcp_service_account_email(self) -> Optional[str]:
|
1335
|
+
"""
|
1336
|
+
The Email of the Google Cloud Service Account (GSA) used for exporting Config Sync metrics to Cloud Monitoring. The GSA should have the Monitoring Metric Writer(roles/monitoring.metricWriter) IAM role. The Kubernetes ServiceAccount `default` in the namespace `config-management-monitoring` should be bound to the GSA.
|
1337
|
+
"""
|
1334
1338
|
return pulumi.get(self, "metrics_gcp_service_account_email")
|
1335
1339
|
|
1336
1340
|
@property
|
@@ -1820,6 +1824,7 @@ class FeatureMembershipMesh(dict):
|
|
1820
1824
|
control_plane: Optional[str] = None,
|
1821
1825
|
management: Optional[str] = None):
|
1822
1826
|
"""
|
1827
|
+
:param str control_plane: **DEPRECATED** Whether to automatically manage Service Mesh control planes. Possible values: CONTROL_PLANE_MANAGEMENT_UNSPECIFIED, AUTOMATIC, MANUAL
|
1823
1828
|
:param str management: Whether to automatically manage Service Mesh. Can either be `MANAGEMENT_AUTOMATIC` or `MANAGEMENT_MANUAL`.
|
1824
1829
|
"""
|
1825
1830
|
if control_plane is not None:
|
@@ -1830,6 +1835,9 @@ class FeatureMembershipMesh(dict):
|
|
1830
1835
|
@property
|
1831
1836
|
@pulumi.getter(name="controlPlane")
|
1832
1837
|
def control_plane(self) -> Optional[str]:
|
1838
|
+
"""
|
1839
|
+
**DEPRECATED** Whether to automatically manage Service Mesh control planes. Possible values: CONTROL_PLANE_MANAGEMENT_UNSPECIFIED, AUTOMATIC, MANUAL
|
1840
|
+
"""
|
1833
1841
|
warnings.warn("""Deprecated in favor of the `management` field""", DeprecationWarning)
|
1834
1842
|
pulumi.log.warn("""control_plane is deprecated: Deprecated in favor of the `management` field""")
|
1835
1843
|
|
pulumi_gcp/iam/outputs.py
CHANGED
@@ -1058,11 +1058,17 @@ class GetTestablePermissionsPermissionResult(dict):
|
|
1058
1058
|
class GetWorkloadIdentityPoolProviderAwResult(dict):
|
1059
1059
|
def __init__(__self__, *,
|
1060
1060
|
account_id: str):
|
1061
|
+
"""
|
1062
|
+
:param str account_id: The AWS account ID.
|
1063
|
+
"""
|
1061
1064
|
pulumi.set(__self__, "account_id", account_id)
|
1062
1065
|
|
1063
1066
|
@property
|
1064
1067
|
@pulumi.getter(name="accountId")
|
1065
1068
|
def account_id(self) -> str:
|
1069
|
+
"""
|
1070
|
+
The AWS account ID.
|
1071
|
+
"""
|
1066
1072
|
return pulumi.get(self, "account_id")
|
1067
1073
|
|
1068
1074
|
|
@@ -1072,6 +1078,44 @@ class GetWorkloadIdentityPoolProviderOidcResult(dict):
|
|
1072
1078
|
allowed_audiences: Sequence[str],
|
1073
1079
|
issuer_uri: str,
|
1074
1080
|
jwks_json: str):
|
1081
|
+
"""
|
1082
|
+
:param Sequence[str] allowed_audiences: Acceptable values for the 'aud' field (audience) in the OIDC token. Token exchange
|
1083
|
+
requests are rejected if the token audience does not match one of the configured
|
1084
|
+
values. Each audience may be at most 256 characters. A maximum of 10 audiences may
|
1085
|
+
be configured.
|
1086
|
+
|
1087
|
+
If this list is empty, the OIDC token audience must be equal to the full canonical
|
1088
|
+
resource name of the WorkloadIdentityPoolProvider, with or without the HTTPS prefix.
|
1089
|
+
For example:
|
1090
|
+
'''
|
1091
|
+
//iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
|
1092
|
+
https://iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
|
1093
|
+
'''
|
1094
|
+
:param str issuer_uri: The OIDC issuer URL.
|
1095
|
+
:param str jwks_json: OIDC JWKs in JSON String format. For details on definition of a
|
1096
|
+
JWK, see https:tools.ietf.org/html/rfc7517. If not set, then we
|
1097
|
+
use the 'jwks_uri' from the discovery document fetched from the
|
1098
|
+
.well-known path for the 'issuer_uri'. Currently, RSA and EC asymmetric
|
1099
|
+
keys are supported. The JWK must use following format and include only
|
1100
|
+
the following fields:
|
1101
|
+
'''
|
1102
|
+
{
|
1103
|
+
"keys": [
|
1104
|
+
{
|
1105
|
+
"kty": "RSA/EC",
|
1106
|
+
"alg": "<algorithm>",
|
1107
|
+
"use": "sig",
|
1108
|
+
"kid": "<key-id>",
|
1109
|
+
"n": "",
|
1110
|
+
"e": "",
|
1111
|
+
"x": "",
|
1112
|
+
"y": "",
|
1113
|
+
"crv": ""
|
1114
|
+
}
|
1115
|
+
]
|
1116
|
+
}
|
1117
|
+
'''
|
1118
|
+
"""
|
1075
1119
|
pulumi.set(__self__, "allowed_audiences", allowed_audiences)
|
1076
1120
|
pulumi.set(__self__, "issuer_uri", issuer_uri)
|
1077
1121
|
pulumi.set(__self__, "jwks_json", jwks_json)
|
@@ -1079,16 +1123,58 @@ class GetWorkloadIdentityPoolProviderOidcResult(dict):
|
|
1079
1123
|
@property
|
1080
1124
|
@pulumi.getter(name="allowedAudiences")
|
1081
1125
|
def allowed_audiences(self) -> Sequence[str]:
|
1126
|
+
"""
|
1127
|
+
Acceptable values for the 'aud' field (audience) in the OIDC token. Token exchange
|
1128
|
+
requests are rejected if the token audience does not match one of the configured
|
1129
|
+
values. Each audience may be at most 256 characters. A maximum of 10 audiences may
|
1130
|
+
be configured.
|
1131
|
+
|
1132
|
+
If this list is empty, the OIDC token audience must be equal to the full canonical
|
1133
|
+
resource name of the WorkloadIdentityPoolProvider, with or without the HTTPS prefix.
|
1134
|
+
For example:
|
1135
|
+
'''
|
1136
|
+
//iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
|
1137
|
+
https://iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
|
1138
|
+
'''
|
1139
|
+
"""
|
1082
1140
|
return pulumi.get(self, "allowed_audiences")
|
1083
1141
|
|
1084
1142
|
@property
|
1085
1143
|
@pulumi.getter(name="issuerUri")
|
1086
1144
|
def issuer_uri(self) -> str:
|
1145
|
+
"""
|
1146
|
+
The OIDC issuer URL.
|
1147
|
+
"""
|
1087
1148
|
return pulumi.get(self, "issuer_uri")
|
1088
1149
|
|
1089
1150
|
@property
|
1090
1151
|
@pulumi.getter(name="jwksJson")
|
1091
1152
|
def jwks_json(self) -> str:
|
1153
|
+
"""
|
1154
|
+
OIDC JWKs in JSON String format. For details on definition of a
|
1155
|
+
JWK, see https:tools.ietf.org/html/rfc7517. If not set, then we
|
1156
|
+
use the 'jwks_uri' from the discovery document fetched from the
|
1157
|
+
.well-known path for the 'issuer_uri'. Currently, RSA and EC asymmetric
|
1158
|
+
keys are supported. The JWK must use following format and include only
|
1159
|
+
the following fields:
|
1160
|
+
'''
|
1161
|
+
{
|
1162
|
+
"keys": [
|
1163
|
+
{
|
1164
|
+
"kty": "RSA/EC",
|
1165
|
+
"alg": "<algorithm>",
|
1166
|
+
"use": "sig",
|
1167
|
+
"kid": "<key-id>",
|
1168
|
+
"n": "",
|
1169
|
+
"e": "",
|
1170
|
+
"x": "",
|
1171
|
+
"y": "",
|
1172
|
+
"crv": ""
|
1173
|
+
}
|
1174
|
+
]
|
1175
|
+
}
|
1176
|
+
'''
|
1177
|
+
"""
|
1092
1178
|
return pulumi.get(self, "jwks_json")
|
1093
1179
|
|
1094
1180
|
|
@@ -1096,11 +1182,17 @@ class GetWorkloadIdentityPoolProviderOidcResult(dict):
|
|
1096
1182
|
class GetWorkloadIdentityPoolProviderSamlResult(dict):
|
1097
1183
|
def __init__(__self__, *,
|
1098
1184
|
idp_metadata_xml: str):
|
1185
|
+
"""
|
1186
|
+
:param str idp_metadata_xml: SAML Identity provider configuration metadata xml doc.
|
1187
|
+
"""
|
1099
1188
|
pulumi.set(__self__, "idp_metadata_xml", idp_metadata_xml)
|
1100
1189
|
|
1101
1190
|
@property
|
1102
1191
|
@pulumi.getter(name="idpMetadataXml")
|
1103
1192
|
def idp_metadata_xml(self) -> str:
|
1193
|
+
"""
|
1194
|
+
SAML Identity provider configuration metadata xml doc.
|
1195
|
+
"""
|
1104
1196
|
return pulumi.get(self, "idp_metadata_xml")
|
1105
1197
|
|
1106
1198
|
|
pulumi_gcp/kms/outputs.py
CHANGED
@@ -569,6 +569,7 @@ class GetKMSCryptoKeyPrimaryResult(dict):
|
|
569
569
|
"""
|
570
570
|
:param str name: The CryptoKey's name.
|
571
571
|
A CryptoKey’s name belonging to the specified Google Cloud Platform KeyRing and match the regular expression `[a-zA-Z0-9_-]{1,63}`
|
572
|
+
:param str state: The current state of the CryptoKeyVersion.
|
572
573
|
"""
|
573
574
|
pulumi.set(__self__, "name", name)
|
574
575
|
pulumi.set(__self__, "state", state)
|
@@ -585,6 +586,9 @@ class GetKMSCryptoKeyPrimaryResult(dict):
|
|
585
586
|
@property
|
586
587
|
@pulumi.getter
|
587
588
|
def state(self) -> str:
|
589
|
+
"""
|
590
|
+
The current state of the CryptoKeyVersion.
|
591
|
+
"""
|
588
592
|
return pulumi.get(self, "state")
|
589
593
|
|
590
594
|
|
@@ -622,17 +626,29 @@ class GetKMSCryptoKeyVersionTemplateResult(dict):
|
|
622
626
|
def __init__(__self__, *,
|
623
627
|
algorithm: str,
|
624
628
|
protection_level: str):
|
629
|
+
"""
|
630
|
+
:param str algorithm: The algorithm to use when creating a version based on this template.
|
631
|
+
See the [algorithm reference](https://cloud.google.com/kms/docs/reference/rest/v1/CryptoKeyVersionAlgorithm) for possible inputs.
|
632
|
+
:param str protection_level: The protection level to use when creating a version based on this template. Possible values include "SOFTWARE", "HSM", "EXTERNAL", "EXTERNAL_VPC". Defaults to "SOFTWARE".
|
633
|
+
"""
|
625
634
|
pulumi.set(__self__, "algorithm", algorithm)
|
626
635
|
pulumi.set(__self__, "protection_level", protection_level)
|
627
636
|
|
628
637
|
@property
|
629
638
|
@pulumi.getter
|
630
639
|
def algorithm(self) -> str:
|
640
|
+
"""
|
641
|
+
The algorithm to use when creating a version based on this template.
|
642
|
+
See the [algorithm reference](https://cloud.google.com/kms/docs/reference/rest/v1/CryptoKeyVersionAlgorithm) for possible inputs.
|
643
|
+
"""
|
631
644
|
return pulumi.get(self, "algorithm")
|
632
645
|
|
633
646
|
@property
|
634
647
|
@pulumi.getter(name="protectionLevel")
|
635
648
|
def protection_level(self) -> str:
|
649
|
+
"""
|
650
|
+
The protection level to use when creating a version based on this template. Possible values include "SOFTWARE", "HSM", "EXTERNAL", "EXTERNAL_VPC". Defaults to "SOFTWARE".
|
651
|
+
"""
|
636
652
|
return pulumi.get(self, "protection_level")
|
637
653
|
|
638
654
|
|
pulumi_gcp/logging/_inputs.py
CHANGED
@@ -43,7 +43,22 @@ class BillingAccountBucketConfigCmekSettingsArgs:
|
|
43
43
|
name: Optional[pulumi.Input[str]] = None,
|
44
44
|
service_account_id: Optional[pulumi.Input[str]] = None):
|
45
45
|
"""
|
46
|
+
:param pulumi.Input[str] kms_key_name: The resource name for the configured Cloud KMS key.
|
47
|
+
KMS key name format:
|
48
|
+
"projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]"
|
49
|
+
To enable CMEK for the bucket, set this field to a valid kmsKeyName for which the associated service account has the required cloudkms.cryptoKeyEncrypterDecrypter roles assigned for the key.
|
50
|
+
The Cloud KMS key used by the bucket can be updated by changing the kmsKeyName to a new valid key name. Encryption operations that are in progress will be completed with the key that was in use when they started. Decryption operations will be completed using the key that was used at the time of encryption unless access to that key has been revoked.
|
51
|
+
See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
|
52
|
+
:param pulumi.Input[str] kms_key_version_name: The CryptoKeyVersion resource name for the configured Cloud KMS key.
|
53
|
+
KMS key name format:
|
54
|
+
"projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]/cryptoKeyVersions/[VERSION]"
|
55
|
+
For example:
|
56
|
+
"projects/my-project/locations/us-central1/keyRings/my-ring/cryptoKeys/my-key/cryptoKeyVersions/1"
|
57
|
+
This is a read-only field used to convey the specific configured CryptoKeyVersion of kms_key that has been configured. It will be populated in cases where the CMEK settings are bound to a single key version.
|
46
58
|
:param pulumi.Input[str] name: The resource name of the bucket. For example: "projects/my-project-id/locations/my-location/buckets/my-bucket-id"
|
59
|
+
:param pulumi.Input[str] service_account_id: The service account associated with a project for which CMEK will apply.
|
60
|
+
Before enabling CMEK for a logging bucket, you must first assign the cloudkms.cryptoKeyEncrypterDecrypter role to the service account associated with the project for which CMEK will apply. Use [v2.getCmekSettings](https://cloud.google.com/logging/docs/reference/v2/rest/v2/TopLevel/getCmekSettings#google.logging.v2.ConfigServiceV2.GetCmekSettings) to obtain the service account ID.
|
61
|
+
See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
|
47
62
|
"""
|
48
63
|
pulumi.set(__self__, "kms_key_name", kms_key_name)
|
49
64
|
if kms_key_version_name is not None:
|
@@ -56,6 +71,14 @@ class BillingAccountBucketConfigCmekSettingsArgs:
|
|
56
71
|
@property
|
57
72
|
@pulumi.getter(name="kmsKeyName")
|
58
73
|
def kms_key_name(self) -> pulumi.Input[str]:
|
74
|
+
"""
|
75
|
+
The resource name for the configured Cloud KMS key.
|
76
|
+
KMS key name format:
|
77
|
+
"projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]"
|
78
|
+
To enable CMEK for the bucket, set this field to a valid kmsKeyName for which the associated service account has the required cloudkms.cryptoKeyEncrypterDecrypter roles assigned for the key.
|
79
|
+
The Cloud KMS key used by the bucket can be updated by changing the kmsKeyName to a new valid key name. Encryption operations that are in progress will be completed with the key that was in use when they started. Decryption operations will be completed using the key that was used at the time of encryption unless access to that key has been revoked.
|
80
|
+
See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
|
81
|
+
"""
|
59
82
|
return pulumi.get(self, "kms_key_name")
|
60
83
|
|
61
84
|
@kms_key_name.setter
|
@@ -65,6 +88,14 @@ class BillingAccountBucketConfigCmekSettingsArgs:
|
|
65
88
|
@property
|
66
89
|
@pulumi.getter(name="kmsKeyVersionName")
|
67
90
|
def kms_key_version_name(self) -> Optional[pulumi.Input[str]]:
|
91
|
+
"""
|
92
|
+
The CryptoKeyVersion resource name for the configured Cloud KMS key.
|
93
|
+
KMS key name format:
|
94
|
+
"projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]/cryptoKeyVersions/[VERSION]"
|
95
|
+
For example:
|
96
|
+
"projects/my-project/locations/us-central1/keyRings/my-ring/cryptoKeys/my-key/cryptoKeyVersions/1"
|
97
|
+
This is a read-only field used to convey the specific configured CryptoKeyVersion of kms_key that has been configured. It will be populated in cases where the CMEK settings are bound to a single key version.
|
98
|
+
"""
|
68
99
|
return pulumi.get(self, "kms_key_version_name")
|
69
100
|
|
70
101
|
@kms_key_version_name.setter
|
@@ -86,6 +117,11 @@ class BillingAccountBucketConfigCmekSettingsArgs:
|
|
86
117
|
@property
|
87
118
|
@pulumi.getter(name="serviceAccountId")
|
88
119
|
def service_account_id(self) -> Optional[pulumi.Input[str]]:
|
120
|
+
"""
|
121
|
+
The service account associated with a project for which CMEK will apply.
|
122
|
+
Before enabling CMEK for a logging bucket, you must first assign the cloudkms.cryptoKeyEncrypterDecrypter role to the service account associated with the project for which CMEK will apply. Use [v2.getCmekSettings](https://cloud.google.com/logging/docs/reference/v2/rest/v2/TopLevel/getCmekSettings#google.logging.v2.ConfigServiceV2.GetCmekSettings) to obtain the service account ID.
|
123
|
+
See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
|
124
|
+
"""
|
89
125
|
return pulumi.get(self, "service_account_id")
|
90
126
|
|
91
127
|
@service_account_id.setter
|
@@ -239,7 +275,22 @@ class FolderBucketConfigCmekSettingsArgs:
|
|
239
275
|
name: Optional[pulumi.Input[str]] = None,
|
240
276
|
service_account_id: Optional[pulumi.Input[str]] = None):
|
241
277
|
"""
|
278
|
+
:param pulumi.Input[str] kms_key_name: The resource name for the configured Cloud KMS key.
|
279
|
+
KMS key name format:
|
280
|
+
"projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]"
|
281
|
+
To enable CMEK for the bucket, set this field to a valid kmsKeyName for which the associated service account has the required cloudkms.cryptoKeyEncrypterDecrypter roles assigned for the key.
|
282
|
+
The Cloud KMS key used by the bucket can be updated by changing the kmsKeyName to a new valid key name. Encryption operations that are in progress will be completed with the key that was in use when they started. Decryption operations will be completed using the key that was used at the time of encryption unless access to that key has been revoked.
|
283
|
+
See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
|
284
|
+
:param pulumi.Input[str] kms_key_version_name: The CryptoKeyVersion resource name for the configured Cloud KMS key.
|
285
|
+
KMS key name format:
|
286
|
+
"projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]/cryptoKeyVersions/[VERSION]"
|
287
|
+
For example:
|
288
|
+
"projects/my-project/locations/us-central1/keyRings/my-ring/cryptoKeys/my-key/cryptoKeyVersions/1"
|
289
|
+
This is a read-only field used to convey the specific configured CryptoKeyVersion of kms_key that has been configured. It will be populated in cases where the CMEK settings are bound to a single key version.
|
242
290
|
:param pulumi.Input[str] name: The resource name of the bucket. For example: "folders/my-folder-id/locations/my-location/buckets/my-bucket-id"
|
291
|
+
:param pulumi.Input[str] service_account_id: The service account associated with a project for which CMEK will apply.
|
292
|
+
Before enabling CMEK for a logging bucket, you must first assign the cloudkms.cryptoKeyEncrypterDecrypter role to the service account associated with the project for which CMEK will apply. Use [v2.getCmekSettings](https://cloud.google.com/logging/docs/reference/v2/rest/v2/TopLevel/getCmekSettings#google.logging.v2.ConfigServiceV2.GetCmekSettings) to obtain the service account ID.
|
293
|
+
See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
|
243
294
|
"""
|
244
295
|
pulumi.set(__self__, "kms_key_name", kms_key_name)
|
245
296
|
if kms_key_version_name is not None:
|
@@ -252,6 +303,14 @@ class FolderBucketConfigCmekSettingsArgs:
|
|
252
303
|
@property
|
253
304
|
@pulumi.getter(name="kmsKeyName")
|
254
305
|
def kms_key_name(self) -> pulumi.Input[str]:
|
306
|
+
"""
|
307
|
+
The resource name for the configured Cloud KMS key.
|
308
|
+
KMS key name format:
|
309
|
+
"projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]"
|
310
|
+
To enable CMEK for the bucket, set this field to a valid kmsKeyName for which the associated service account has the required cloudkms.cryptoKeyEncrypterDecrypter roles assigned for the key.
|
311
|
+
The Cloud KMS key used by the bucket can be updated by changing the kmsKeyName to a new valid key name. Encryption operations that are in progress will be completed with the key that was in use when they started. Decryption operations will be completed using the key that was used at the time of encryption unless access to that key has been revoked.
|
312
|
+
See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
|
313
|
+
"""
|
255
314
|
return pulumi.get(self, "kms_key_name")
|
256
315
|
|
257
316
|
@kms_key_name.setter
|
@@ -261,6 +320,14 @@ class FolderBucketConfigCmekSettingsArgs:
|
|
261
320
|
@property
|
262
321
|
@pulumi.getter(name="kmsKeyVersionName")
|
263
322
|
def kms_key_version_name(self) -> Optional[pulumi.Input[str]]:
|
323
|
+
"""
|
324
|
+
The CryptoKeyVersion resource name for the configured Cloud KMS key.
|
325
|
+
KMS key name format:
|
326
|
+
"projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]/cryptoKeyVersions/[VERSION]"
|
327
|
+
For example:
|
328
|
+
"projects/my-project/locations/us-central1/keyRings/my-ring/cryptoKeys/my-key/cryptoKeyVersions/1"
|
329
|
+
This is a read-only field used to convey the specific configured CryptoKeyVersion of kms_key that has been configured. It will be populated in cases where the CMEK settings are bound to a single key version.
|
330
|
+
"""
|
264
331
|
return pulumi.get(self, "kms_key_version_name")
|
265
332
|
|
266
333
|
@kms_key_version_name.setter
|
@@ -282,6 +349,11 @@ class FolderBucketConfigCmekSettingsArgs:
|
|
282
349
|
@property
|
283
350
|
@pulumi.getter(name="serviceAccountId")
|
284
351
|
def service_account_id(self) -> Optional[pulumi.Input[str]]:
|
352
|
+
"""
|
353
|
+
The service account associated with a project for which CMEK will apply.
|
354
|
+
Before enabling CMEK for a logging bucket, you must first assign the cloudkms.cryptoKeyEncrypterDecrypter role to the service account associated with the project for which CMEK will apply. Use [v2.getCmekSettings](https://cloud.google.com/logging/docs/reference/v2/rest/v2/TopLevel/getCmekSettings#google.logging.v2.ConfigServiceV2.GetCmekSettings) to obtain the service account ID.
|
355
|
+
See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
|
356
|
+
"""
|
285
357
|
return pulumi.get(self, "service_account_id")
|
286
358
|
|
287
359
|
@service_account_id.setter
|
@@ -828,7 +900,22 @@ class OrganizationBucketConfigCmekSettingsArgs:
|
|
828
900
|
name: Optional[pulumi.Input[str]] = None,
|
829
901
|
service_account_id: Optional[pulumi.Input[str]] = None):
|
830
902
|
"""
|
903
|
+
:param pulumi.Input[str] kms_key_name: The resource name for the configured Cloud KMS key.
|
904
|
+
KMS key name format:
|
905
|
+
"projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]"
|
906
|
+
To enable CMEK for the bucket, set this field to a valid kmsKeyName for which the associated service account has the required cloudkms.cryptoKeyEncrypterDecrypter roles assigned for the key.
|
907
|
+
The Cloud KMS key used by the bucket can be updated by changing the kmsKeyName to a new valid key name. Encryption operations that are in progress will be completed with the key that was in use when they started. Decryption operations will be completed using the key that was used at the time of encryption unless access to that key has been revoked.
|
908
|
+
See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
|
909
|
+
:param pulumi.Input[str] kms_key_version_name: The CryptoKeyVersion resource name for the configured Cloud KMS key.
|
910
|
+
KMS key name format:
|
911
|
+
"projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]/cryptoKeyVersions/[VERSION]"
|
912
|
+
For example:
|
913
|
+
"projects/my-project/locations/us-central1/keyRings/my-ring/cryptoKeys/my-key/cryptoKeyVersions/1"
|
914
|
+
This is a read-only field used to convey the specific configured CryptoKeyVersion of kms_key that has been configured. It will be populated in cases where the CMEK settings are bound to a single key version.
|
831
915
|
:param pulumi.Input[str] name: The resource name of the bucket. For example: "organizations/my-organization-id/locations/my-location/buckets/my-bucket-id"
|
916
|
+
:param pulumi.Input[str] service_account_id: The service account associated with a project for which CMEK will apply.
|
917
|
+
Before enabling CMEK for a logging bucket, you must first assign the cloudkms.cryptoKeyEncrypterDecrypter role to the service account associated with the project for which CMEK will apply. Use [v2.getCmekSettings](https://cloud.google.com/logging/docs/reference/v2/rest/v2/TopLevel/getCmekSettings#google.logging.v2.ConfigServiceV2.GetCmekSettings) to obtain the service account ID.
|
918
|
+
See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
|
832
919
|
"""
|
833
920
|
pulumi.set(__self__, "kms_key_name", kms_key_name)
|
834
921
|
if kms_key_version_name is not None:
|
@@ -841,6 +928,14 @@ class OrganizationBucketConfigCmekSettingsArgs:
|
|
841
928
|
@property
|
842
929
|
@pulumi.getter(name="kmsKeyName")
|
843
930
|
def kms_key_name(self) -> pulumi.Input[str]:
|
931
|
+
"""
|
932
|
+
The resource name for the configured Cloud KMS key.
|
933
|
+
KMS key name format:
|
934
|
+
"projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]"
|
935
|
+
To enable CMEK for the bucket, set this field to a valid kmsKeyName for which the associated service account has the required cloudkms.cryptoKeyEncrypterDecrypter roles assigned for the key.
|
936
|
+
The Cloud KMS key used by the bucket can be updated by changing the kmsKeyName to a new valid key name. Encryption operations that are in progress will be completed with the key that was in use when they started. Decryption operations will be completed using the key that was used at the time of encryption unless access to that key has been revoked.
|
937
|
+
See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
|
938
|
+
"""
|
844
939
|
return pulumi.get(self, "kms_key_name")
|
845
940
|
|
846
941
|
@kms_key_name.setter
|
@@ -850,6 +945,14 @@ class OrganizationBucketConfigCmekSettingsArgs:
|
|
850
945
|
@property
|
851
946
|
@pulumi.getter(name="kmsKeyVersionName")
|
852
947
|
def kms_key_version_name(self) -> Optional[pulumi.Input[str]]:
|
948
|
+
"""
|
949
|
+
The CryptoKeyVersion resource name for the configured Cloud KMS key.
|
950
|
+
KMS key name format:
|
951
|
+
"projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]/cryptoKeyVersions/[VERSION]"
|
952
|
+
For example:
|
953
|
+
"projects/my-project/locations/us-central1/keyRings/my-ring/cryptoKeys/my-key/cryptoKeyVersions/1"
|
954
|
+
This is a read-only field used to convey the specific configured CryptoKeyVersion of kms_key that has been configured. It will be populated in cases where the CMEK settings are bound to a single key version.
|
955
|
+
"""
|
853
956
|
return pulumi.get(self, "kms_key_version_name")
|
854
957
|
|
855
958
|
@kms_key_version_name.setter
|
@@ -871,6 +974,11 @@ class OrganizationBucketConfigCmekSettingsArgs:
|
|
871
974
|
@property
|
872
975
|
@pulumi.getter(name="serviceAccountId")
|
873
976
|
def service_account_id(self) -> Optional[pulumi.Input[str]]:
|
977
|
+
"""
|
978
|
+
The service account associated with a project for which CMEK will apply.
|
979
|
+
Before enabling CMEK for a logging bucket, you must first assign the cloudkms.cryptoKeyEncrypterDecrypter role to the service account associated with the project for which CMEK will apply. Use [v2.getCmekSettings](https://cloud.google.com/logging/docs/reference/v2/rest/v2/TopLevel/getCmekSettings#google.logging.v2.ConfigServiceV2.GetCmekSettings) to obtain the service account ID.
|
980
|
+
See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
|
981
|
+
"""
|
874
982
|
return pulumi.get(self, "service_account_id")
|
875
983
|
|
876
984
|
@service_account_id.setter
|
pulumi_gcp/logging/outputs.py
CHANGED
@@ -67,7 +67,22 @@ class BillingAccountBucketConfigCmekSettings(dict):
|
|
67
67
|
name: Optional[str] = None,
|
68
68
|
service_account_id: Optional[str] = None):
|
69
69
|
"""
|
70
|
+
:param str kms_key_name: The resource name for the configured Cloud KMS key.
|
71
|
+
KMS key name format:
|
72
|
+
"projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]"
|
73
|
+
To enable CMEK for the bucket, set this field to a valid kmsKeyName for which the associated service account has the required cloudkms.cryptoKeyEncrypterDecrypter roles assigned for the key.
|
74
|
+
The Cloud KMS key used by the bucket can be updated by changing the kmsKeyName to a new valid key name. Encryption operations that are in progress will be completed with the key that was in use when they started. Decryption operations will be completed using the key that was used at the time of encryption unless access to that key has been revoked.
|
75
|
+
See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
|
76
|
+
:param str kms_key_version_name: The CryptoKeyVersion resource name for the configured Cloud KMS key.
|
77
|
+
KMS key name format:
|
78
|
+
"projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]/cryptoKeyVersions/[VERSION]"
|
79
|
+
For example:
|
80
|
+
"projects/my-project/locations/us-central1/keyRings/my-ring/cryptoKeys/my-key/cryptoKeyVersions/1"
|
81
|
+
This is a read-only field used to convey the specific configured CryptoKeyVersion of kms_key that has been configured. It will be populated in cases where the CMEK settings are bound to a single key version.
|
70
82
|
:param str name: The resource name of the bucket. For example: "projects/my-project-id/locations/my-location/buckets/my-bucket-id"
|
83
|
+
:param str service_account_id: The service account associated with a project for which CMEK will apply.
|
84
|
+
Before enabling CMEK for a logging bucket, you must first assign the cloudkms.cryptoKeyEncrypterDecrypter role to the service account associated with the project for which CMEK will apply. Use [v2.getCmekSettings](https://cloud.google.com/logging/docs/reference/v2/rest/v2/TopLevel/getCmekSettings#google.logging.v2.ConfigServiceV2.GetCmekSettings) to obtain the service account ID.
|
85
|
+
See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
|
71
86
|
"""
|
72
87
|
pulumi.set(__self__, "kms_key_name", kms_key_name)
|
73
88
|
if kms_key_version_name is not None:
|
@@ -80,11 +95,27 @@ class BillingAccountBucketConfigCmekSettings(dict):
|
|
80
95
|
@property
|
81
96
|
@pulumi.getter(name="kmsKeyName")
|
82
97
|
def kms_key_name(self) -> str:
|
98
|
+
"""
|
99
|
+
The resource name for the configured Cloud KMS key.
|
100
|
+
KMS key name format:
|
101
|
+
"projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]"
|
102
|
+
To enable CMEK for the bucket, set this field to a valid kmsKeyName for which the associated service account has the required cloudkms.cryptoKeyEncrypterDecrypter roles assigned for the key.
|
103
|
+
The Cloud KMS key used by the bucket can be updated by changing the kmsKeyName to a new valid key name. Encryption operations that are in progress will be completed with the key that was in use when they started. Decryption operations will be completed using the key that was used at the time of encryption unless access to that key has been revoked.
|
104
|
+
See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
|
105
|
+
"""
|
83
106
|
return pulumi.get(self, "kms_key_name")
|
84
107
|
|
85
108
|
@property
|
86
109
|
@pulumi.getter(name="kmsKeyVersionName")
|
87
110
|
def kms_key_version_name(self) -> Optional[str]:
|
111
|
+
"""
|
112
|
+
The CryptoKeyVersion resource name for the configured Cloud KMS key.
|
113
|
+
KMS key name format:
|
114
|
+
"projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]/cryptoKeyVersions/[VERSION]"
|
115
|
+
For example:
|
116
|
+
"projects/my-project/locations/us-central1/keyRings/my-ring/cryptoKeys/my-key/cryptoKeyVersions/1"
|
117
|
+
This is a read-only field used to convey the specific configured CryptoKeyVersion of kms_key that has been configured. It will be populated in cases where the CMEK settings are bound to a single key version.
|
118
|
+
"""
|
88
119
|
return pulumi.get(self, "kms_key_version_name")
|
89
120
|
|
90
121
|
@property
|
@@ -98,6 +129,11 @@ class BillingAccountBucketConfigCmekSettings(dict):
|
|
98
129
|
@property
|
99
130
|
@pulumi.getter(name="serviceAccountId")
|
100
131
|
def service_account_id(self) -> Optional[str]:
|
132
|
+
"""
|
133
|
+
The service account associated with a project for which CMEK will apply.
|
134
|
+
Before enabling CMEK for a logging bucket, you must first assign the cloudkms.cryptoKeyEncrypterDecrypter role to the service account associated with the project for which CMEK will apply. Use [v2.getCmekSettings](https://cloud.google.com/logging/docs/reference/v2/rest/v2/TopLevel/getCmekSettings#google.logging.v2.ConfigServiceV2.GetCmekSettings) to obtain the service account ID.
|
135
|
+
See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
|
136
|
+
"""
|
101
137
|
return pulumi.get(self, "service_account_id")
|
102
138
|
|
103
139
|
|
@@ -274,7 +310,22 @@ class FolderBucketConfigCmekSettings(dict):
|
|
274
310
|
name: Optional[str] = None,
|
275
311
|
service_account_id: Optional[str] = None):
|
276
312
|
"""
|
313
|
+
:param str kms_key_name: The resource name for the configured Cloud KMS key.
|
314
|
+
KMS key name format:
|
315
|
+
"projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]"
|
316
|
+
To enable CMEK for the bucket, set this field to a valid kmsKeyName for which the associated service account has the required cloudkms.cryptoKeyEncrypterDecrypter roles assigned for the key.
|
317
|
+
The Cloud KMS key used by the bucket can be updated by changing the kmsKeyName to a new valid key name. Encryption operations that are in progress will be completed with the key that was in use when they started. Decryption operations will be completed using the key that was used at the time of encryption unless access to that key has been revoked.
|
318
|
+
See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
|
319
|
+
:param str kms_key_version_name: The CryptoKeyVersion resource name for the configured Cloud KMS key.
|
320
|
+
KMS key name format:
|
321
|
+
"projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]/cryptoKeyVersions/[VERSION]"
|
322
|
+
For example:
|
323
|
+
"projects/my-project/locations/us-central1/keyRings/my-ring/cryptoKeys/my-key/cryptoKeyVersions/1"
|
324
|
+
This is a read-only field used to convey the specific configured CryptoKeyVersion of kms_key that has been configured. It will be populated in cases where the CMEK settings are bound to a single key version.
|
277
325
|
:param str name: The resource name of the bucket. For example: "folders/my-folder-id/locations/my-location/buckets/my-bucket-id"
|
326
|
+
:param str service_account_id: The service account associated with a project for which CMEK will apply.
|
327
|
+
Before enabling CMEK for a logging bucket, you must first assign the cloudkms.cryptoKeyEncrypterDecrypter role to the service account associated with the project for which CMEK will apply. Use [v2.getCmekSettings](https://cloud.google.com/logging/docs/reference/v2/rest/v2/TopLevel/getCmekSettings#google.logging.v2.ConfigServiceV2.GetCmekSettings) to obtain the service account ID.
|
328
|
+
See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
|
278
329
|
"""
|
279
330
|
pulumi.set(__self__, "kms_key_name", kms_key_name)
|
280
331
|
if kms_key_version_name is not None:
|
@@ -287,11 +338,27 @@ class FolderBucketConfigCmekSettings(dict):
|
|
287
338
|
@property
|
288
339
|
@pulumi.getter(name="kmsKeyName")
|
289
340
|
def kms_key_name(self) -> str:
|
341
|
+
"""
|
342
|
+
The resource name for the configured Cloud KMS key.
|
343
|
+
KMS key name format:
|
344
|
+
"projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]"
|
345
|
+
To enable CMEK for the bucket, set this field to a valid kmsKeyName for which the associated service account has the required cloudkms.cryptoKeyEncrypterDecrypter roles assigned for the key.
|
346
|
+
The Cloud KMS key used by the bucket can be updated by changing the kmsKeyName to a new valid key name. Encryption operations that are in progress will be completed with the key that was in use when they started. Decryption operations will be completed using the key that was used at the time of encryption unless access to that key has been revoked.
|
347
|
+
See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
|
348
|
+
"""
|
290
349
|
return pulumi.get(self, "kms_key_name")
|
291
350
|
|
292
351
|
@property
|
293
352
|
@pulumi.getter(name="kmsKeyVersionName")
|
294
353
|
def kms_key_version_name(self) -> Optional[str]:
|
354
|
+
"""
|
355
|
+
The CryptoKeyVersion resource name for the configured Cloud KMS key.
|
356
|
+
KMS key name format:
|
357
|
+
"projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]/cryptoKeyVersions/[VERSION]"
|
358
|
+
For example:
|
359
|
+
"projects/my-project/locations/us-central1/keyRings/my-ring/cryptoKeys/my-key/cryptoKeyVersions/1"
|
360
|
+
This is a read-only field used to convey the specific configured CryptoKeyVersion of kms_key that has been configured. It will be populated in cases where the CMEK settings are bound to a single key version.
|
361
|
+
"""
|
295
362
|
return pulumi.get(self, "kms_key_version_name")
|
296
363
|
|
297
364
|
@property
|
@@ -305,6 +372,11 @@ class FolderBucketConfigCmekSettings(dict):
|
|
305
372
|
@property
|
306
373
|
@pulumi.getter(name="serviceAccountId")
|
307
374
|
def service_account_id(self) -> Optional[str]:
|
375
|
+
"""
|
376
|
+
The service account associated with a project for which CMEK will apply.
|
377
|
+
Before enabling CMEK for a logging bucket, you must first assign the cloudkms.cryptoKeyEncrypterDecrypter role to the service account associated with the project for which CMEK will apply. Use [v2.getCmekSettings](https://cloud.google.com/logging/docs/reference/v2/rest/v2/TopLevel/getCmekSettings#google.logging.v2.ConfigServiceV2.GetCmekSettings) to obtain the service account ID.
|
378
|
+
See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
|
379
|
+
"""
|
308
380
|
return pulumi.get(self, "service_account_id")
|
309
381
|
|
310
382
|
|
@@ -910,7 +982,22 @@ class OrganizationBucketConfigCmekSettings(dict):
|
|
910
982
|
name: Optional[str] = None,
|
911
983
|
service_account_id: Optional[str] = None):
|
912
984
|
"""
|
985
|
+
:param str kms_key_name: The resource name for the configured Cloud KMS key.
|
986
|
+
KMS key name format:
|
987
|
+
"projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]"
|
988
|
+
To enable CMEK for the bucket, set this field to a valid kmsKeyName for which the associated service account has the required cloudkms.cryptoKeyEncrypterDecrypter roles assigned for the key.
|
989
|
+
The Cloud KMS key used by the bucket can be updated by changing the kmsKeyName to a new valid key name. Encryption operations that are in progress will be completed with the key that was in use when they started. Decryption operations will be completed using the key that was used at the time of encryption unless access to that key has been revoked.
|
990
|
+
See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
|
991
|
+
:param str kms_key_version_name: The CryptoKeyVersion resource name for the configured Cloud KMS key.
|
992
|
+
KMS key name format:
|
993
|
+
"projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]/cryptoKeyVersions/[VERSION]"
|
994
|
+
For example:
|
995
|
+
"projects/my-project/locations/us-central1/keyRings/my-ring/cryptoKeys/my-key/cryptoKeyVersions/1"
|
996
|
+
This is a read-only field used to convey the specific configured CryptoKeyVersion of kms_key that has been configured. It will be populated in cases where the CMEK settings are bound to a single key version.
|
913
997
|
:param str name: The resource name of the bucket. For example: "organizations/my-organization-id/locations/my-location/buckets/my-bucket-id"
|
998
|
+
:param str service_account_id: The service account associated with a project for which CMEK will apply.
|
999
|
+
Before enabling CMEK for a logging bucket, you must first assign the cloudkms.cryptoKeyEncrypterDecrypter role to the service account associated with the project for which CMEK will apply. Use [v2.getCmekSettings](https://cloud.google.com/logging/docs/reference/v2/rest/v2/TopLevel/getCmekSettings#google.logging.v2.ConfigServiceV2.GetCmekSettings) to obtain the service account ID.
|
1000
|
+
See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
|
914
1001
|
"""
|
915
1002
|
pulumi.set(__self__, "kms_key_name", kms_key_name)
|
916
1003
|
if kms_key_version_name is not None:
|
@@ -923,11 +1010,27 @@ class OrganizationBucketConfigCmekSettings(dict):
|
|
923
1010
|
@property
|
924
1011
|
@pulumi.getter(name="kmsKeyName")
|
925
1012
|
def kms_key_name(self) -> str:
|
1013
|
+
"""
|
1014
|
+
The resource name for the configured Cloud KMS key.
|
1015
|
+
KMS key name format:
|
1016
|
+
"projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]"
|
1017
|
+
To enable CMEK for the bucket, set this field to a valid kmsKeyName for which the associated service account has the required cloudkms.cryptoKeyEncrypterDecrypter roles assigned for the key.
|
1018
|
+
The Cloud KMS key used by the bucket can be updated by changing the kmsKeyName to a new valid key name. Encryption operations that are in progress will be completed with the key that was in use when they started. Decryption operations will be completed using the key that was used at the time of encryption unless access to that key has been revoked.
|
1019
|
+
See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
|
1020
|
+
"""
|
926
1021
|
return pulumi.get(self, "kms_key_name")
|
927
1022
|
|
928
1023
|
@property
|
929
1024
|
@pulumi.getter(name="kmsKeyVersionName")
|
930
1025
|
def kms_key_version_name(self) -> Optional[str]:
|
1026
|
+
"""
|
1027
|
+
The CryptoKeyVersion resource name for the configured Cloud KMS key.
|
1028
|
+
KMS key name format:
|
1029
|
+
"projects/[PROJECT_ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY]/cryptoKeyVersions/[VERSION]"
|
1030
|
+
For example:
|
1031
|
+
"projects/my-project/locations/us-central1/keyRings/my-ring/cryptoKeys/my-key/cryptoKeyVersions/1"
|
1032
|
+
This is a read-only field used to convey the specific configured CryptoKeyVersion of kms_key that has been configured. It will be populated in cases where the CMEK settings are bound to a single key version.
|
1033
|
+
"""
|
931
1034
|
return pulumi.get(self, "kms_key_version_name")
|
932
1035
|
|
933
1036
|
@property
|
@@ -941,6 +1044,11 @@ class OrganizationBucketConfigCmekSettings(dict):
|
|
941
1044
|
@property
|
942
1045
|
@pulumi.getter(name="serviceAccountId")
|
943
1046
|
def service_account_id(self) -> Optional[str]:
|
1047
|
+
"""
|
1048
|
+
The service account associated with a project for which CMEK will apply.
|
1049
|
+
Before enabling CMEK for a logging bucket, you must first assign the cloudkms.cryptoKeyEncrypterDecrypter role to the service account associated with the project for which CMEK will apply. Use [v2.getCmekSettings](https://cloud.google.com/logging/docs/reference/v2/rest/v2/TopLevel/getCmekSettings#google.logging.v2.ConfigServiceV2.GetCmekSettings) to obtain the service account ID.
|
1050
|
+
See [Enabling CMEK for Logging Buckets](https://cloud.google.com/logging/docs/routing/managed-encryption-storage) for more information.
|
1051
|
+
"""
|
944
1052
|
return pulumi.get(self, "service_account_id")
|
945
1053
|
|
946
1054
|
|