pulumi-gcp 8.13.0__py3-none-any.whl → 8.13.0a1734503365__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +0 -43
- pulumi_gcp/accesscontextmanager/_inputs.py +3 -3
- pulumi_gcp/accesscontextmanager/outputs.py +2 -2
- pulumi_gcp/artifactregistry/_inputs.py +0 -83
- pulumi_gcp/artifactregistry/get_repository.py +4 -15
- pulumi_gcp/artifactregistry/outputs.py +0 -112
- pulumi_gcp/artifactregistry/repository.py +7 -93
- pulumi_gcp/backupdisasterrecovery/get_backup.py +2 -38
- pulumi_gcp/backupdisasterrecovery/get_data_source.py +2 -38
- pulumi_gcp/backupdisasterrecovery/outputs.py +8 -8
- pulumi_gcp/bigquery/_inputs.py +0 -369
- pulumi_gcp/bigquery/dataset_access.py +0 -61
- pulumi_gcp/bigquery/job.py +18 -6
- pulumi_gcp/bigquery/outputs.py +0 -350
- pulumi_gcp/bigquery/table.py +0 -47
- pulumi_gcp/cloudrunv2/_inputs.py +3 -6
- pulumi_gcp/cloudrunv2/outputs.py +6 -10
- pulumi_gcp/composer/_inputs.py +5 -80
- pulumi_gcp/composer/outputs.py +4 -111
- pulumi_gcp/compute/_inputs.py +87 -181
- pulumi_gcp/compute/firewall_policy_association.py +39 -50
- pulumi_gcp/compute/get_network.py +2 -17
- pulumi_gcp/compute/get_subnetwork.py +4 -18
- pulumi_gcp/compute/network.py +2 -39
- pulumi_gcp/compute/outputs.py +58 -157
- pulumi_gcp/compute/region_network_endpoint_group.py +1 -1
- pulumi_gcp/compute/resize_request.py +40 -26
- pulumi_gcp/config/__init__.pyi +0 -2
- pulumi_gcp/config/vars.py +0 -4
- pulumi_gcp/dataproc/batch.py +18 -4
- pulumi_gcp/datastream/_inputs.py +0 -68
- pulumi_gcp/datastream/outputs.py +1 -41
- pulumi_gcp/developerconnect/connection.py +12 -58
- pulumi_gcp/diagflow/_inputs.py +3 -3
- pulumi_gcp/diagflow/outputs.py +2 -2
- pulumi_gcp/filestore/backup.py +3 -71
- pulumi_gcp/firebase/hosting_custom_domain.py +4 -4
- pulumi_gcp/firestore/_inputs.py +3 -3
- pulumi_gcp/firestore/outputs.py +2 -2
- pulumi_gcp/gkehub/__init__.py +0 -1
- pulumi_gcp/gkehub/outputs.py +0 -1153
- pulumi_gcp/gkeonprem/__init__.py +0 -1
- pulumi_gcp/gkeonprem/_inputs.py +0 -2364
- pulumi_gcp/gkeonprem/outputs.py +0 -1780
- pulumi_gcp/integrationconnectors/_inputs.py +6 -6
- pulumi_gcp/integrationconnectors/connection.py +7 -7
- pulumi_gcp/integrationconnectors/outputs.py +4 -4
- pulumi_gcp/kms/__init__.py +0 -2
- pulumi_gcp/netapp/kmsconfig.py +14 -2
- pulumi_gcp/networkconnectivity/hub.py +0 -108
- pulumi_gcp/networkconnectivity/spoke.py +0 -195
- pulumi_gcp/networkmanagement/vpc_flow_logs_config.py +0 -4
- pulumi_gcp/networksecurity/__init__.py +0 -2
- pulumi_gcp/networksecurity/_inputs.py +0 -78
- pulumi_gcp/networksecurity/outputs.py +0 -48
- pulumi_gcp/oracledatabase/autonomous_database.py +2 -2
- pulumi_gcp/orgpolicy/policy.py +2 -2
- pulumi_gcp/parallelstore/instance.py +0 -149
- pulumi_gcp/projects/usage_export_bucket.py +110 -42
- pulumi_gcp/provider.py +0 -20
- pulumi_gcp/pubsub/subscription.py +6 -6
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/securesourcemanager/instance.py +16 -4
- pulumi_gcp/spanner/instance_iam_binding.py +0 -14
- pulumi_gcp/spanner/instance_iam_member.py +0 -14
- pulumi_gcp/sql/database_instance.py +7 -7
- pulumi_gcp/storage/__init__.py +0 -1
- pulumi_gcp/storage/_inputs.py +0 -431
- pulumi_gcp/storage/outputs.py +0 -363
- pulumi_gcp/storage/transfer_job.py +38 -84
- pulumi_gcp/vertex/_inputs.py +25 -26
- pulumi_gcp/vertex/ai_endpoint.py +4 -4
- pulumi_gcp/vertex/ai_feature_online_store_featureview.py +4 -4
- pulumi_gcp/vertex/outputs.py +14 -15
- pulumi_gcp/workstations/workstation.py +1 -55
- {pulumi_gcp-8.13.0.dist-info → pulumi_gcp-8.13.0a1734503365.dist-info}/METADATA +1 -1
- {pulumi_gcp-8.13.0.dist-info → pulumi_gcp-8.13.0a1734503365.dist-info}/RECORD +79 -90
- {pulumi_gcp-8.13.0.dist-info → pulumi_gcp-8.13.0a1734503365.dist-info}/WHEEL +1 -1
- pulumi_gcp/chronicle/__init__.py +0 -10
- pulumi_gcp/chronicle/_inputs.py +0 -169
- pulumi_gcp/chronicle/outputs.py +0 -107
- pulumi_gcp/chronicle/watchlist.py +0 -776
- pulumi_gcp/gkehub/get_feature.py +0 -226
- pulumi_gcp/gkeonprem/vmware_admin_cluster.py +0 -1715
- pulumi_gcp/kms/get_autokey_config.py +0 -121
- pulumi_gcp/kms/get_key_handle.py +0 -185
- pulumi_gcp/networksecurity/intercept_endpoint_group.py +0 -723
- pulumi_gcp/networksecurity/intercept_endpoint_group_association.py +0 -815
- pulumi_gcp/storage/folder.py +0 -483
- {pulumi_gcp-8.13.0.dist-info → pulumi_gcp-8.13.0a1734503365.dist-info}/top_level.txt +0 -0
pulumi_gcp/__init__.py
CHANGED
@@ -56,8 +56,6 @@ if typing.TYPE_CHECKING:
|
|
56
56
|
certificateauthority = __certificateauthority
|
57
57
|
import pulumi_gcp.certificatemanager as __certificatemanager
|
58
58
|
certificatemanager = __certificatemanager
|
59
|
-
import pulumi_gcp.chronicle as __chronicle
|
60
|
-
chronicle = __chronicle
|
61
59
|
import pulumi_gcp.cloudasset as __cloudasset
|
62
60
|
cloudasset = __cloudasset
|
63
61
|
import pulumi_gcp.cloudbuild as __cloudbuild
|
@@ -286,7 +284,6 @@ else:
|
|
286
284
|
blockchainnodeengine = _utilities.lazy_import('pulumi_gcp.blockchainnodeengine')
|
287
285
|
certificateauthority = _utilities.lazy_import('pulumi_gcp.certificateauthority')
|
288
286
|
certificatemanager = _utilities.lazy_import('pulumi_gcp.certificatemanager')
|
289
|
-
chronicle = _utilities.lazy_import('pulumi_gcp.chronicle')
|
290
287
|
cloudasset = _utilities.lazy_import('pulumi_gcp.cloudasset')
|
291
288
|
cloudbuild = _utilities.lazy_import('pulumi_gcp.cloudbuild')
|
292
289
|
cloudbuildv2 = _utilities.lazy_import('pulumi_gcp.cloudbuildv2')
|
@@ -1721,14 +1718,6 @@ _utilities.register(
|
|
1721
1718
|
"gcp:certificatemanager/trustConfig:TrustConfig": "TrustConfig"
|
1722
1719
|
}
|
1723
1720
|
},
|
1724
|
-
{
|
1725
|
-
"pkg": "gcp",
|
1726
|
-
"mod": "chronicle/watchlist",
|
1727
|
-
"fqn": "pulumi_gcp.chronicle",
|
1728
|
-
"classes": {
|
1729
|
-
"gcp:chronicle/watchlist:Watchlist": "Watchlist"
|
1730
|
-
}
|
1731
|
-
},
|
1732
1721
|
{
|
1733
1722
|
"pkg": "gcp",
|
1734
1723
|
"mod": "cloudasset/folderFeed",
|
@@ -5241,14 +5230,6 @@ _utilities.register(
|
|
5241
5230
|
"gcp:gkeonprem/vMwareNodePool:VMwareNodePool": "VMwareNodePool"
|
5242
5231
|
}
|
5243
5232
|
},
|
5244
|
-
{
|
5245
|
-
"pkg": "gcp",
|
5246
|
-
"mod": "gkeonprem/vmwareAdminCluster",
|
5247
|
-
"fqn": "pulumi_gcp.gkeonprem",
|
5248
|
-
"classes": {
|
5249
|
-
"gcp:gkeonprem/vmwareAdminCluster:VmwareAdminCluster": "VmwareAdminCluster"
|
5250
|
-
}
|
5251
|
-
},
|
5252
5233
|
{
|
5253
5234
|
"pkg": "gcp",
|
5254
5235
|
"mod": "healthcare/consentStore",
|
@@ -6561,22 +6542,6 @@ _utilities.register(
|
|
6561
6542
|
"gcp:networksecurity/interceptDeploymentGroup:InterceptDeploymentGroup": "InterceptDeploymentGroup"
|
6562
6543
|
}
|
6563
6544
|
},
|
6564
|
-
{
|
6565
|
-
"pkg": "gcp",
|
6566
|
-
"mod": "networksecurity/interceptEndpointGroup",
|
6567
|
-
"fqn": "pulumi_gcp.networksecurity",
|
6568
|
-
"classes": {
|
6569
|
-
"gcp:networksecurity/interceptEndpointGroup:InterceptEndpointGroup": "InterceptEndpointGroup"
|
6570
|
-
}
|
6571
|
-
},
|
6572
|
-
{
|
6573
|
-
"pkg": "gcp",
|
6574
|
-
"mod": "networksecurity/interceptEndpointGroupAssociation",
|
6575
|
-
"fqn": "pulumi_gcp.networksecurity",
|
6576
|
-
"classes": {
|
6577
|
-
"gcp:networksecurity/interceptEndpointGroupAssociation:InterceptEndpointGroupAssociation": "InterceptEndpointGroupAssociation"
|
6578
|
-
}
|
6579
|
-
},
|
6580
6545
|
{
|
6581
6546
|
"pkg": "gcp",
|
6582
6547
|
"mod": "networksecurity/mirroringDeployment",
|
@@ -8145,14 +8110,6 @@ _utilities.register(
|
|
8145
8110
|
"gcp:storage/defaultObjectAccessControl:DefaultObjectAccessControl": "DefaultObjectAccessControl"
|
8146
8111
|
}
|
8147
8112
|
},
|
8148
|
-
{
|
8149
|
-
"pkg": "gcp",
|
8150
|
-
"mod": "storage/folder",
|
8151
|
-
"fqn": "pulumi_gcp.storage",
|
8152
|
-
"classes": {
|
8153
|
-
"gcp:storage/folder:Folder": "Folder"
|
8154
|
-
}
|
8155
|
-
},
|
8156
8113
|
{
|
8157
8114
|
"pkg": "gcp",
|
8158
8115
|
"mod": "storage/hmacKey",
|
@@ -800,7 +800,7 @@ if not MYPY:
|
|
800
800
|
"""
|
801
801
|
vpc_ip_subnetworks: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
802
802
|
"""
|
803
|
-
|
803
|
+
CIDR block IP subnetwork specification. Must be IPv4.
|
804
804
|
"""
|
805
805
|
elif False:
|
806
806
|
AccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgsDict: TypeAlias = Mapping[str, Any]
|
@@ -812,7 +812,7 @@ class AccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgs:
|
|
812
812
|
vpc_ip_subnetworks: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
813
813
|
"""
|
814
814
|
:param pulumi.Input[str] network: Required. Network name to be allowed by this Access Level. Networks of foreign organizations requires `compute.network.get` permission to be granted to caller.
|
815
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] vpc_ip_subnetworks:
|
815
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] vpc_ip_subnetworks: CIDR block IP subnetwork specification. Must be IPv4.
|
816
816
|
"""
|
817
817
|
pulumi.set(__self__, "network", network)
|
818
818
|
if vpc_ip_subnetworks is not None:
|
@@ -834,7 +834,7 @@ class AccessLevelBasicConditionVpcNetworkSourceVpcSubnetworkArgs:
|
|
834
834
|
@pulumi.getter(name="vpcIpSubnetworks")
|
835
835
|
def vpc_ip_subnetworks(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
836
836
|
"""
|
837
|
-
|
837
|
+
CIDR block IP subnetwork specification. Must be IPv4.
|
838
838
|
"""
|
839
839
|
return pulumi.get(self, "vpc_ip_subnetworks")
|
840
840
|
|
@@ -598,7 +598,7 @@ class AccessLevelBasicConditionVpcNetworkSourceVpcSubnetwork(dict):
|
|
598
598
|
vpc_ip_subnetworks: Optional[Sequence[str]] = None):
|
599
599
|
"""
|
600
600
|
:param str network: Required. Network name to be allowed by this Access Level. Networks of foreign organizations requires `compute.network.get` permission to be granted to caller.
|
601
|
-
:param Sequence[str] vpc_ip_subnetworks:
|
601
|
+
:param Sequence[str] vpc_ip_subnetworks: CIDR block IP subnetwork specification. Must be IPv4.
|
602
602
|
"""
|
603
603
|
pulumi.set(__self__, "network", network)
|
604
604
|
if vpc_ip_subnetworks is not None:
|
@@ -616,7 +616,7 @@ class AccessLevelBasicConditionVpcNetworkSourceVpcSubnetwork(dict):
|
|
616
616
|
@pulumi.getter(name="vpcIpSubnetworks")
|
617
617
|
def vpc_ip_subnetworks(self) -> Optional[Sequence[str]]:
|
618
618
|
"""
|
619
|
-
|
619
|
+
CIDR block IP subnetwork specification. Must be IPv4.
|
620
620
|
"""
|
621
621
|
return pulumi.get(self, "vpc_ip_subnetworks")
|
622
622
|
|
@@ -65,8 +65,6 @@ __all__ = [
|
|
65
65
|
'RepositoryVirtualRepositoryConfigArgsDict',
|
66
66
|
'RepositoryVirtualRepositoryConfigUpstreamPolicyArgs',
|
67
67
|
'RepositoryVirtualRepositoryConfigUpstreamPolicyArgsDict',
|
68
|
-
'RepositoryVulnerabilityScanningConfigArgs',
|
69
|
-
'RepositoryVulnerabilityScanningConfigArgsDict',
|
70
68
|
]
|
71
69
|
|
72
70
|
MYPY = False
|
@@ -1584,84 +1582,3 @@ class RepositoryVirtualRepositoryConfigUpstreamPolicyArgs:
|
|
1584
1582
|
pulumi.set(self, "repository", value)
|
1585
1583
|
|
1586
1584
|
|
1587
|
-
if not MYPY:
|
1588
|
-
class RepositoryVulnerabilityScanningConfigArgsDict(TypedDict):
|
1589
|
-
enablement_config: NotRequired[pulumi.Input[str]]
|
1590
|
-
"""
|
1591
|
-
This configures whether vulnerability scanning is automatically performed for artifacts pushed to this repository.
|
1592
|
-
Possible values are: `INHERITED`, `DISABLED`.
|
1593
|
-
"""
|
1594
|
-
enablement_state: NotRequired[pulumi.Input[str]]
|
1595
|
-
"""
|
1596
|
-
(Output)
|
1597
|
-
This field returns whether scanning is active for this repository.
|
1598
|
-
"""
|
1599
|
-
enablement_state_reason: NotRequired[pulumi.Input[str]]
|
1600
|
-
"""
|
1601
|
-
(Output)
|
1602
|
-
This provides an explanation for the state of scanning on this repository.
|
1603
|
-
"""
|
1604
|
-
elif False:
|
1605
|
-
RepositoryVulnerabilityScanningConfigArgsDict: TypeAlias = Mapping[str, Any]
|
1606
|
-
|
1607
|
-
@pulumi.input_type
|
1608
|
-
class RepositoryVulnerabilityScanningConfigArgs:
|
1609
|
-
def __init__(__self__, *,
|
1610
|
-
enablement_config: Optional[pulumi.Input[str]] = None,
|
1611
|
-
enablement_state: Optional[pulumi.Input[str]] = None,
|
1612
|
-
enablement_state_reason: Optional[pulumi.Input[str]] = None):
|
1613
|
-
"""
|
1614
|
-
:param pulumi.Input[str] enablement_config: This configures whether vulnerability scanning is automatically performed for artifacts pushed to this repository.
|
1615
|
-
Possible values are: `INHERITED`, `DISABLED`.
|
1616
|
-
:param pulumi.Input[str] enablement_state: (Output)
|
1617
|
-
This field returns whether scanning is active for this repository.
|
1618
|
-
:param pulumi.Input[str] enablement_state_reason: (Output)
|
1619
|
-
This provides an explanation for the state of scanning on this repository.
|
1620
|
-
"""
|
1621
|
-
if enablement_config is not None:
|
1622
|
-
pulumi.set(__self__, "enablement_config", enablement_config)
|
1623
|
-
if enablement_state is not None:
|
1624
|
-
pulumi.set(__self__, "enablement_state", enablement_state)
|
1625
|
-
if enablement_state_reason is not None:
|
1626
|
-
pulumi.set(__self__, "enablement_state_reason", enablement_state_reason)
|
1627
|
-
|
1628
|
-
@property
|
1629
|
-
@pulumi.getter(name="enablementConfig")
|
1630
|
-
def enablement_config(self) -> Optional[pulumi.Input[str]]:
|
1631
|
-
"""
|
1632
|
-
This configures whether vulnerability scanning is automatically performed for artifacts pushed to this repository.
|
1633
|
-
Possible values are: `INHERITED`, `DISABLED`.
|
1634
|
-
"""
|
1635
|
-
return pulumi.get(self, "enablement_config")
|
1636
|
-
|
1637
|
-
@enablement_config.setter
|
1638
|
-
def enablement_config(self, value: Optional[pulumi.Input[str]]):
|
1639
|
-
pulumi.set(self, "enablement_config", value)
|
1640
|
-
|
1641
|
-
@property
|
1642
|
-
@pulumi.getter(name="enablementState")
|
1643
|
-
def enablement_state(self) -> Optional[pulumi.Input[str]]:
|
1644
|
-
"""
|
1645
|
-
(Output)
|
1646
|
-
This field returns whether scanning is active for this repository.
|
1647
|
-
"""
|
1648
|
-
return pulumi.get(self, "enablement_state")
|
1649
|
-
|
1650
|
-
@enablement_state.setter
|
1651
|
-
def enablement_state(self, value: Optional[pulumi.Input[str]]):
|
1652
|
-
pulumi.set(self, "enablement_state", value)
|
1653
|
-
|
1654
|
-
@property
|
1655
|
-
@pulumi.getter(name="enablementStateReason")
|
1656
|
-
def enablement_state_reason(self) -> Optional[pulumi.Input[str]]:
|
1657
|
-
"""
|
1658
|
-
(Output)
|
1659
|
-
This provides an explanation for the state of scanning on this repository.
|
1660
|
-
"""
|
1661
|
-
return pulumi.get(self, "enablement_state_reason")
|
1662
|
-
|
1663
|
-
@enablement_state_reason.setter
|
1664
|
-
def enablement_state_reason(self, value: Optional[pulumi.Input[str]]):
|
1665
|
-
pulumi.set(self, "enablement_state_reason", value)
|
1666
|
-
|
1667
|
-
|
@@ -27,7 +27,7 @@ class GetRepositoryResult:
|
|
27
27
|
"""
|
28
28
|
A collection of values returned by getRepository.
|
29
29
|
"""
|
30
|
-
def __init__(__self__, cleanup_policies=None, cleanup_policy_dry_run=None, create_time=None, description=None, docker_configs=None, effective_labels=None, format=None, id=None, kms_key_name=None, labels=None, location=None, maven_configs=None, mode=None, name=None, project=None, pulumi_labels=None, remote_repository_configs=None, repository_id=None, update_time=None, virtual_repository_configs=None
|
30
|
+
def __init__(__self__, cleanup_policies=None, cleanup_policy_dry_run=None, create_time=None, description=None, docker_configs=None, effective_labels=None, format=None, id=None, kms_key_name=None, labels=None, location=None, maven_configs=None, mode=None, name=None, project=None, pulumi_labels=None, remote_repository_configs=None, repository_id=None, update_time=None, virtual_repository_configs=None):
|
31
31
|
if cleanup_policies and not isinstance(cleanup_policies, list):
|
32
32
|
raise TypeError("Expected argument 'cleanup_policies' to be a list")
|
33
33
|
pulumi.set(__self__, "cleanup_policies", cleanup_policies)
|
@@ -88,9 +88,6 @@ class GetRepositoryResult:
|
|
88
88
|
if virtual_repository_configs and not isinstance(virtual_repository_configs, list):
|
89
89
|
raise TypeError("Expected argument 'virtual_repository_configs' to be a list")
|
90
90
|
pulumi.set(__self__, "virtual_repository_configs", virtual_repository_configs)
|
91
|
-
if vulnerability_scanning_configs and not isinstance(vulnerability_scanning_configs, list):
|
92
|
-
raise TypeError("Expected argument 'vulnerability_scanning_configs' to be a list")
|
93
|
-
pulumi.set(__self__, "vulnerability_scanning_configs", vulnerability_scanning_configs)
|
94
91
|
|
95
92
|
@property
|
96
93
|
@pulumi.getter(name="cleanupPolicies")
|
@@ -195,11 +192,6 @@ class GetRepositoryResult:
|
|
195
192
|
def virtual_repository_configs(self) -> Sequence['outputs.GetRepositoryVirtualRepositoryConfigResult']:
|
196
193
|
return pulumi.get(self, "virtual_repository_configs")
|
197
194
|
|
198
|
-
@property
|
199
|
-
@pulumi.getter(name="vulnerabilityScanningConfigs")
|
200
|
-
def vulnerability_scanning_configs(self) -> Sequence['outputs.GetRepositoryVulnerabilityScanningConfigResult']:
|
201
|
-
return pulumi.get(self, "vulnerability_scanning_configs")
|
202
|
-
|
203
195
|
|
204
196
|
class AwaitableGetRepositoryResult(GetRepositoryResult):
|
205
197
|
# pylint: disable=using-constant-test
|
@@ -226,8 +218,7 @@ class AwaitableGetRepositoryResult(GetRepositoryResult):
|
|
226
218
|
remote_repository_configs=self.remote_repository_configs,
|
227
219
|
repository_id=self.repository_id,
|
228
220
|
update_time=self.update_time,
|
229
|
-
virtual_repository_configs=self.virtual_repository_configs
|
230
|
-
vulnerability_scanning_configs=self.vulnerability_scanning_configs)
|
221
|
+
virtual_repository_configs=self.virtual_repository_configs)
|
231
222
|
|
232
223
|
|
233
224
|
def get_repository(location: Optional[str] = None,
|
@@ -284,8 +275,7 @@ def get_repository(location: Optional[str] = None,
|
|
284
275
|
remote_repository_configs=pulumi.get(__ret__, 'remote_repository_configs'),
|
285
276
|
repository_id=pulumi.get(__ret__, 'repository_id'),
|
286
277
|
update_time=pulumi.get(__ret__, 'update_time'),
|
287
|
-
virtual_repository_configs=pulumi.get(__ret__, 'virtual_repository_configs')
|
288
|
-
vulnerability_scanning_configs=pulumi.get(__ret__, 'vulnerability_scanning_configs'))
|
278
|
+
virtual_repository_configs=pulumi.get(__ret__, 'virtual_repository_configs'))
|
289
279
|
def get_repository_output(location: Optional[pulumi.Input[str]] = None,
|
290
280
|
project: Optional[pulumi.Input[Optional[str]]] = None,
|
291
281
|
repository_id: Optional[pulumi.Input[str]] = None,
|
@@ -339,5 +329,4 @@ def get_repository_output(location: Optional[pulumi.Input[str]] = None,
|
|
339
329
|
remote_repository_configs=pulumi.get(__response__, 'remote_repository_configs'),
|
340
330
|
repository_id=pulumi.get(__response__, 'repository_id'),
|
341
331
|
update_time=pulumi.get(__response__, 'update_time'),
|
342
|
-
virtual_repository_configs=pulumi.get(__response__, 'virtual_repository_configs')
|
343
|
-
vulnerability_scanning_configs=pulumi.get(__response__, 'vulnerability_scanning_configs')))
|
332
|
+
virtual_repository_configs=pulumi.get(__response__, 'virtual_repository_configs')))
|
@@ -41,7 +41,6 @@ __all__ = [
|
|
41
41
|
'RepositoryRemoteRepositoryConfigYumRepositoryPublicRepository',
|
42
42
|
'RepositoryVirtualRepositoryConfig',
|
43
43
|
'RepositoryVirtualRepositoryConfigUpstreamPolicy',
|
44
|
-
'RepositoryVulnerabilityScanningConfig',
|
45
44
|
'GetRepositoryCleanupPolicyResult',
|
46
45
|
'GetRepositoryCleanupPolicyConditionResult',
|
47
46
|
'GetRepositoryCleanupPolicyMostRecentVersionResult',
|
@@ -65,7 +64,6 @@ __all__ = [
|
|
65
64
|
'GetRepositoryRemoteRepositoryConfigYumRepositoryPublicRepositoryResult',
|
66
65
|
'GetRepositoryVirtualRepositoryConfigResult',
|
67
66
|
'GetRepositoryVirtualRepositoryConfigUpstreamPolicyResult',
|
68
|
-
'GetRepositoryVulnerabilityScanningConfigResult',
|
69
67
|
]
|
70
68
|
|
71
69
|
@pulumi.output_type
|
@@ -1306,76 +1304,6 @@ class RepositoryVirtualRepositoryConfigUpstreamPolicy(dict):
|
|
1306
1304
|
return pulumi.get(self, "repository")
|
1307
1305
|
|
1308
1306
|
|
1309
|
-
@pulumi.output_type
|
1310
|
-
class RepositoryVulnerabilityScanningConfig(dict):
|
1311
|
-
@staticmethod
|
1312
|
-
def __key_warning(key: str):
|
1313
|
-
suggest = None
|
1314
|
-
if key == "enablementConfig":
|
1315
|
-
suggest = "enablement_config"
|
1316
|
-
elif key == "enablementState":
|
1317
|
-
suggest = "enablement_state"
|
1318
|
-
elif key == "enablementStateReason":
|
1319
|
-
suggest = "enablement_state_reason"
|
1320
|
-
|
1321
|
-
if suggest:
|
1322
|
-
pulumi.log.warn(f"Key '{key}' not found in RepositoryVulnerabilityScanningConfig. Access the value via the '{suggest}' property getter instead.")
|
1323
|
-
|
1324
|
-
def __getitem__(self, key: str) -> Any:
|
1325
|
-
RepositoryVulnerabilityScanningConfig.__key_warning(key)
|
1326
|
-
return super().__getitem__(key)
|
1327
|
-
|
1328
|
-
def get(self, key: str, default = None) -> Any:
|
1329
|
-
RepositoryVulnerabilityScanningConfig.__key_warning(key)
|
1330
|
-
return super().get(key, default)
|
1331
|
-
|
1332
|
-
def __init__(__self__, *,
|
1333
|
-
enablement_config: Optional[str] = None,
|
1334
|
-
enablement_state: Optional[str] = None,
|
1335
|
-
enablement_state_reason: Optional[str] = None):
|
1336
|
-
"""
|
1337
|
-
:param str enablement_config: This configures whether vulnerability scanning is automatically performed for artifacts pushed to this repository.
|
1338
|
-
Possible values are: `INHERITED`, `DISABLED`.
|
1339
|
-
:param str enablement_state: (Output)
|
1340
|
-
This field returns whether scanning is active for this repository.
|
1341
|
-
:param str enablement_state_reason: (Output)
|
1342
|
-
This provides an explanation for the state of scanning on this repository.
|
1343
|
-
"""
|
1344
|
-
if enablement_config is not None:
|
1345
|
-
pulumi.set(__self__, "enablement_config", enablement_config)
|
1346
|
-
if enablement_state is not None:
|
1347
|
-
pulumi.set(__self__, "enablement_state", enablement_state)
|
1348
|
-
if enablement_state_reason is not None:
|
1349
|
-
pulumi.set(__self__, "enablement_state_reason", enablement_state_reason)
|
1350
|
-
|
1351
|
-
@property
|
1352
|
-
@pulumi.getter(name="enablementConfig")
|
1353
|
-
def enablement_config(self) -> Optional[str]:
|
1354
|
-
"""
|
1355
|
-
This configures whether vulnerability scanning is automatically performed for artifacts pushed to this repository.
|
1356
|
-
Possible values are: `INHERITED`, `DISABLED`.
|
1357
|
-
"""
|
1358
|
-
return pulumi.get(self, "enablement_config")
|
1359
|
-
|
1360
|
-
@property
|
1361
|
-
@pulumi.getter(name="enablementState")
|
1362
|
-
def enablement_state(self) -> Optional[str]:
|
1363
|
-
"""
|
1364
|
-
(Output)
|
1365
|
-
This field returns whether scanning is active for this repository.
|
1366
|
-
"""
|
1367
|
-
return pulumi.get(self, "enablement_state")
|
1368
|
-
|
1369
|
-
@property
|
1370
|
-
@pulumi.getter(name="enablementStateReason")
|
1371
|
-
def enablement_state_reason(self) -> Optional[str]:
|
1372
|
-
"""
|
1373
|
-
(Output)
|
1374
|
-
This provides an explanation for the state of scanning on this repository.
|
1375
|
-
"""
|
1376
|
-
return pulumi.get(self, "enablement_state_reason")
|
1377
|
-
|
1378
|
-
|
1379
1307
|
@pulumi.output_type
|
1380
1308
|
class GetRepositoryCleanupPolicyResult(dict):
|
1381
1309
|
def __init__(__self__, *,
|
@@ -2114,43 +2042,3 @@ class GetRepositoryVirtualRepositoryConfigUpstreamPolicyResult(dict):
|
|
2114
2042
|
return pulumi.get(self, "repository")
|
2115
2043
|
|
2116
2044
|
|
2117
|
-
@pulumi.output_type
|
2118
|
-
class GetRepositoryVulnerabilityScanningConfigResult(dict):
|
2119
|
-
def __init__(__self__, *,
|
2120
|
-
enablement_config: str,
|
2121
|
-
enablement_state: str,
|
2122
|
-
enablement_state_reason: str):
|
2123
|
-
"""
|
2124
|
-
:param str enablement_config: This configures whether vulnerability scanning is automatically performed for artifacts pushed to this repository. Possible values: ["INHERITED", "DISABLED"]
|
2125
|
-
:param str enablement_state: This field returns whether scanning is active for this repository.
|
2126
|
-
:param str enablement_state_reason: This provides an explanation for the state of scanning on this repository.
|
2127
|
-
"""
|
2128
|
-
pulumi.set(__self__, "enablement_config", enablement_config)
|
2129
|
-
pulumi.set(__self__, "enablement_state", enablement_state)
|
2130
|
-
pulumi.set(__self__, "enablement_state_reason", enablement_state_reason)
|
2131
|
-
|
2132
|
-
@property
|
2133
|
-
@pulumi.getter(name="enablementConfig")
|
2134
|
-
def enablement_config(self) -> str:
|
2135
|
-
"""
|
2136
|
-
This configures whether vulnerability scanning is automatically performed for artifacts pushed to this repository. Possible values: ["INHERITED", "DISABLED"]
|
2137
|
-
"""
|
2138
|
-
return pulumi.get(self, "enablement_config")
|
2139
|
-
|
2140
|
-
@property
|
2141
|
-
@pulumi.getter(name="enablementState")
|
2142
|
-
def enablement_state(self) -> str:
|
2143
|
-
"""
|
2144
|
-
This field returns whether scanning is active for this repository.
|
2145
|
-
"""
|
2146
|
-
return pulumi.get(self, "enablement_state")
|
2147
|
-
|
2148
|
-
@property
|
2149
|
-
@pulumi.getter(name="enablementStateReason")
|
2150
|
-
def enablement_state_reason(self) -> str:
|
2151
|
-
"""
|
2152
|
-
This provides an explanation for the state of scanning on this repository.
|
2153
|
-
"""
|
2154
|
-
return pulumi.get(self, "enablement_state_reason")
|
2155
|
-
|
2156
|
-
|
@@ -34,8 +34,7 @@ class RepositoryArgs:
|
|
34
34
|
mode: Optional[pulumi.Input[str]] = None,
|
35
35
|
project: Optional[pulumi.Input[str]] = None,
|
36
36
|
remote_repository_config: Optional[pulumi.Input['RepositoryRemoteRepositoryConfigArgs']] = None,
|
37
|
-
virtual_repository_config: Optional[pulumi.Input['RepositoryVirtualRepositoryConfigArgs']] = None
|
38
|
-
vulnerability_scanning_config: Optional[pulumi.Input['RepositoryVulnerabilityScanningConfigArgs']] = None):
|
37
|
+
virtual_repository_config: Optional[pulumi.Input['RepositoryVirtualRepositoryConfigArgs']] = None):
|
39
38
|
"""
|
40
39
|
The set of arguments for constructing a Repository resource.
|
41
40
|
:param pulumi.Input[str] format: The format of packages that are stored in the repository. Supported formats
|
@@ -88,8 +87,6 @@ class RepositoryArgs:
|
|
88
87
|
Structure is documented below.
|
89
88
|
:param pulumi.Input['RepositoryVirtualRepositoryConfigArgs'] virtual_repository_config: Configuration specific for a Virtual Repository.
|
90
89
|
Structure is documented below.
|
91
|
-
:param pulumi.Input['RepositoryVulnerabilityScanningConfigArgs'] vulnerability_scanning_config: Configuration for vulnerability scanning of artifacts stored in this repository.
|
92
|
-
Structure is documented below.
|
93
90
|
"""
|
94
91
|
pulumi.set(__self__, "format", format)
|
95
92
|
pulumi.set(__self__, "repository_id", repository_id)
|
@@ -117,8 +114,6 @@ class RepositoryArgs:
|
|
117
114
|
pulumi.set(__self__, "remote_repository_config", remote_repository_config)
|
118
115
|
if virtual_repository_config is not None:
|
119
116
|
pulumi.set(__self__, "virtual_repository_config", virtual_repository_config)
|
120
|
-
if vulnerability_scanning_config is not None:
|
121
|
-
pulumi.set(__self__, "vulnerability_scanning_config", vulnerability_scanning_config)
|
122
117
|
|
123
118
|
@property
|
124
119
|
@pulumi.getter
|
@@ -324,19 +319,6 @@ class RepositoryArgs:
|
|
324
319
|
def virtual_repository_config(self, value: Optional[pulumi.Input['RepositoryVirtualRepositoryConfigArgs']]):
|
325
320
|
pulumi.set(self, "virtual_repository_config", value)
|
326
321
|
|
327
|
-
@property
|
328
|
-
@pulumi.getter(name="vulnerabilityScanningConfig")
|
329
|
-
def vulnerability_scanning_config(self) -> Optional[pulumi.Input['RepositoryVulnerabilityScanningConfigArgs']]:
|
330
|
-
"""
|
331
|
-
Configuration for vulnerability scanning of artifacts stored in this repository.
|
332
|
-
Structure is documented below.
|
333
|
-
"""
|
334
|
-
return pulumi.get(self, "vulnerability_scanning_config")
|
335
|
-
|
336
|
-
@vulnerability_scanning_config.setter
|
337
|
-
def vulnerability_scanning_config(self, value: Optional[pulumi.Input['RepositoryVulnerabilityScanningConfigArgs']]):
|
338
|
-
pulumi.set(self, "vulnerability_scanning_config", value)
|
339
|
-
|
340
322
|
|
341
323
|
@pulumi.input_type
|
342
324
|
class _RepositoryState:
|
@@ -359,8 +341,7 @@ class _RepositoryState:
|
|
359
341
|
remote_repository_config: Optional[pulumi.Input['RepositoryRemoteRepositoryConfigArgs']] = None,
|
360
342
|
repository_id: Optional[pulumi.Input[str]] = None,
|
361
343
|
update_time: Optional[pulumi.Input[str]] = None,
|
362
|
-
virtual_repository_config: Optional[pulumi.Input['RepositoryVirtualRepositoryConfigArgs']] = None
|
363
|
-
vulnerability_scanning_config: Optional[pulumi.Input['RepositoryVulnerabilityScanningConfigArgs']] = None):
|
344
|
+
virtual_repository_config: Optional[pulumi.Input['RepositoryVirtualRepositoryConfigArgs']] = None):
|
364
345
|
"""
|
365
346
|
Input properties used for looking up and filtering Repository resources.
|
366
347
|
:param pulumi.Input[Sequence[pulumi.Input['RepositoryCleanupPolicyArgs']]] cleanup_policies: Cleanup policies for this repository. Cleanup policies indicate when
|
@@ -420,8 +401,6 @@ class _RepositoryState:
|
|
420
401
|
:param pulumi.Input[str] update_time: The time when the repository was last updated.
|
421
402
|
:param pulumi.Input['RepositoryVirtualRepositoryConfigArgs'] virtual_repository_config: Configuration specific for a Virtual Repository.
|
422
403
|
Structure is documented below.
|
423
|
-
:param pulumi.Input['RepositoryVulnerabilityScanningConfigArgs'] vulnerability_scanning_config: Configuration for vulnerability scanning of artifacts stored in this repository.
|
424
|
-
Structure is documented below.
|
425
404
|
"""
|
426
405
|
if cleanup_policies is not None:
|
427
406
|
pulumi.set(__self__, "cleanup_policies", cleanup_policies)
|
@@ -461,8 +440,6 @@ class _RepositoryState:
|
|
461
440
|
pulumi.set(__self__, "update_time", update_time)
|
462
441
|
if virtual_repository_config is not None:
|
463
442
|
pulumi.set(__self__, "virtual_repository_config", virtual_repository_config)
|
464
|
-
if vulnerability_scanning_config is not None:
|
465
|
-
pulumi.set(__self__, "vulnerability_scanning_config", vulnerability_scanning_config)
|
466
443
|
|
467
444
|
@property
|
468
445
|
@pulumi.getter(name="cleanupPolicies")
|
@@ -730,19 +707,6 @@ class _RepositoryState:
|
|
730
707
|
def virtual_repository_config(self, value: Optional[pulumi.Input['RepositoryVirtualRepositoryConfigArgs']]):
|
731
708
|
pulumi.set(self, "virtual_repository_config", value)
|
732
709
|
|
733
|
-
@property
|
734
|
-
@pulumi.getter(name="vulnerabilityScanningConfig")
|
735
|
-
def vulnerability_scanning_config(self) -> Optional[pulumi.Input['RepositoryVulnerabilityScanningConfigArgs']]:
|
736
|
-
"""
|
737
|
-
Configuration for vulnerability scanning of artifacts stored in this repository.
|
738
|
-
Structure is documented below.
|
739
|
-
"""
|
740
|
-
return pulumi.get(self, "vulnerability_scanning_config")
|
741
|
-
|
742
|
-
@vulnerability_scanning_config.setter
|
743
|
-
def vulnerability_scanning_config(self, value: Optional[pulumi.Input['RepositoryVulnerabilityScanningConfigArgs']]):
|
744
|
-
pulumi.set(self, "vulnerability_scanning_config", value)
|
745
|
-
|
746
710
|
|
747
711
|
class Repository(pulumi.CustomResource):
|
748
712
|
@overload
|
@@ -763,7 +727,6 @@ class Repository(pulumi.CustomResource):
|
|
763
727
|
remote_repository_config: Optional[pulumi.Input[Union['RepositoryRemoteRepositoryConfigArgs', 'RepositoryRemoteRepositoryConfigArgsDict']]] = None,
|
764
728
|
repository_id: Optional[pulumi.Input[str]] = None,
|
765
729
|
virtual_repository_config: Optional[pulumi.Input[Union['RepositoryVirtualRepositoryConfigArgs', 'RepositoryVirtualRepositoryConfigArgsDict']]] = None,
|
766
|
-
vulnerability_scanning_config: Optional[pulumi.Input[Union['RepositoryVulnerabilityScanningConfigArgs', 'RepositoryVulnerabilityScanningConfigArgsDict']]] = None,
|
767
730
|
__props__=None):
|
768
731
|
"""
|
769
732
|
A repository for storing artifacts
|
@@ -1233,10 +1196,9 @@ class Repository(pulumi.CustomResource):
|
|
1233
1196
|
remote_repository_config={
|
1234
1197
|
"description": "pull-through cache of another Artifact Registry repository by URL",
|
1235
1198
|
"common_repository": {
|
1236
|
-
"uri":
|
1199
|
+
"uri": "https://us-central1-docker.pkg.dev//example-upstream-repo",
|
1237
1200
|
},
|
1238
|
-
}
|
1239
|
-
opts = pulumi.ResourceOptions(depends_on=[upstream_repo]))
|
1201
|
+
})
|
1240
1202
|
```
|
1241
1203
|
### Artifact Registry Repository Remote Common Repository With Custom Upstream
|
1242
1204
|
|
@@ -1277,21 +1239,6 @@ class Repository(pulumi.CustomResource):
|
|
1277
1239
|
},
|
1278
1240
|
})
|
1279
1241
|
```
|
1280
|
-
### Artifact Registry Repository Vulnerability Scanning
|
1281
|
-
|
1282
|
-
```python
|
1283
|
-
import pulumi
|
1284
|
-
import pulumi_gcp as gcp
|
1285
|
-
|
1286
|
-
my_repo = gcp.artifactregistry.Repository("my-repo",
|
1287
|
-
location="us-central1",
|
1288
|
-
repository_id="my-repository",
|
1289
|
-
description="example docker repository with vulnerability scanning config",
|
1290
|
-
format="DOCKER",
|
1291
|
-
vulnerability_scanning_config={
|
1292
|
-
"enablement_config": "INHERITED",
|
1293
|
-
})
|
1294
|
-
```
|
1295
1242
|
|
1296
1243
|
## Import
|
1297
1244
|
|
@@ -1369,8 +1316,6 @@ class Repository(pulumi.CustomResource):
|
|
1369
1316
|
- - -
|
1370
1317
|
:param pulumi.Input[Union['RepositoryVirtualRepositoryConfigArgs', 'RepositoryVirtualRepositoryConfigArgsDict']] virtual_repository_config: Configuration specific for a Virtual Repository.
|
1371
1318
|
Structure is documented below.
|
1372
|
-
:param pulumi.Input[Union['RepositoryVulnerabilityScanningConfigArgs', 'RepositoryVulnerabilityScanningConfigArgsDict']] vulnerability_scanning_config: Configuration for vulnerability scanning of artifacts stored in this repository.
|
1373
|
-
Structure is documented below.
|
1374
1319
|
"""
|
1375
1320
|
...
|
1376
1321
|
@overload
|
@@ -1846,10 +1791,9 @@ class Repository(pulumi.CustomResource):
|
|
1846
1791
|
remote_repository_config={
|
1847
1792
|
"description": "pull-through cache of another Artifact Registry repository by URL",
|
1848
1793
|
"common_repository": {
|
1849
|
-
"uri":
|
1794
|
+
"uri": "https://us-central1-docker.pkg.dev//example-upstream-repo",
|
1850
1795
|
},
|
1851
|
-
}
|
1852
|
-
opts = pulumi.ResourceOptions(depends_on=[upstream_repo]))
|
1796
|
+
})
|
1853
1797
|
```
|
1854
1798
|
### Artifact Registry Repository Remote Common Repository With Custom Upstream
|
1855
1799
|
|
@@ -1890,21 +1834,6 @@ class Repository(pulumi.CustomResource):
|
|
1890
1834
|
},
|
1891
1835
|
})
|
1892
1836
|
```
|
1893
|
-
### Artifact Registry Repository Vulnerability Scanning
|
1894
|
-
|
1895
|
-
```python
|
1896
|
-
import pulumi
|
1897
|
-
import pulumi_gcp as gcp
|
1898
|
-
|
1899
|
-
my_repo = gcp.artifactregistry.Repository("my-repo",
|
1900
|
-
location="us-central1",
|
1901
|
-
repository_id="my-repository",
|
1902
|
-
description="example docker repository with vulnerability scanning config",
|
1903
|
-
format="DOCKER",
|
1904
|
-
vulnerability_scanning_config={
|
1905
|
-
"enablement_config": "INHERITED",
|
1906
|
-
})
|
1907
|
-
```
|
1908
1837
|
|
1909
1838
|
## Import
|
1910
1839
|
|
@@ -1959,7 +1888,6 @@ class Repository(pulumi.CustomResource):
|
|
1959
1888
|
remote_repository_config: Optional[pulumi.Input[Union['RepositoryRemoteRepositoryConfigArgs', 'RepositoryRemoteRepositoryConfigArgsDict']]] = None,
|
1960
1889
|
repository_id: Optional[pulumi.Input[str]] = None,
|
1961
1890
|
virtual_repository_config: Optional[pulumi.Input[Union['RepositoryVirtualRepositoryConfigArgs', 'RepositoryVirtualRepositoryConfigArgsDict']]] = None,
|
1962
|
-
vulnerability_scanning_config: Optional[pulumi.Input[Union['RepositoryVulnerabilityScanningConfigArgs', 'RepositoryVulnerabilityScanningConfigArgsDict']]] = None,
|
1963
1891
|
__props__=None):
|
1964
1892
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
1965
1893
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -1987,7 +1915,6 @@ class Repository(pulumi.CustomResource):
|
|
1987
1915
|
raise TypeError("Missing required property 'repository_id'")
|
1988
1916
|
__props__.__dict__["repository_id"] = repository_id
|
1989
1917
|
__props__.__dict__["virtual_repository_config"] = virtual_repository_config
|
1990
|
-
__props__.__dict__["vulnerability_scanning_config"] = vulnerability_scanning_config
|
1991
1918
|
__props__.__dict__["create_time"] = None
|
1992
1919
|
__props__.__dict__["effective_labels"] = None
|
1993
1920
|
__props__.__dict__["name"] = None
|
@@ -2023,8 +1950,7 @@ class Repository(pulumi.CustomResource):
|
|
2023
1950
|
remote_repository_config: Optional[pulumi.Input[Union['RepositoryRemoteRepositoryConfigArgs', 'RepositoryRemoteRepositoryConfigArgsDict']]] = None,
|
2024
1951
|
repository_id: Optional[pulumi.Input[str]] = None,
|
2025
1952
|
update_time: Optional[pulumi.Input[str]] = None,
|
2026
|
-
virtual_repository_config: Optional[pulumi.Input[Union['RepositoryVirtualRepositoryConfigArgs', 'RepositoryVirtualRepositoryConfigArgsDict']]] = None
|
2027
|
-
vulnerability_scanning_config: Optional[pulumi.Input[Union['RepositoryVulnerabilityScanningConfigArgs', 'RepositoryVulnerabilityScanningConfigArgsDict']]] = None) -> 'Repository':
|
1953
|
+
virtual_repository_config: Optional[pulumi.Input[Union['RepositoryVirtualRepositoryConfigArgs', 'RepositoryVirtualRepositoryConfigArgsDict']]] = None) -> 'Repository':
|
2028
1954
|
"""
|
2029
1955
|
Get an existing Repository resource's state with the given name, id, and optional extra
|
2030
1956
|
properties used to qualify the lookup.
|
@@ -2089,8 +2015,6 @@ class Repository(pulumi.CustomResource):
|
|
2089
2015
|
:param pulumi.Input[str] update_time: The time when the repository was last updated.
|
2090
2016
|
:param pulumi.Input[Union['RepositoryVirtualRepositoryConfigArgs', 'RepositoryVirtualRepositoryConfigArgsDict']] virtual_repository_config: Configuration specific for a Virtual Repository.
|
2091
2017
|
Structure is documented below.
|
2092
|
-
:param pulumi.Input[Union['RepositoryVulnerabilityScanningConfigArgs', 'RepositoryVulnerabilityScanningConfigArgsDict']] vulnerability_scanning_config: Configuration for vulnerability scanning of artifacts stored in this repository.
|
2093
|
-
Structure is documented below.
|
2094
2018
|
"""
|
2095
2019
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
2096
2020
|
|
@@ -2115,7 +2039,6 @@ class Repository(pulumi.CustomResource):
|
|
2115
2039
|
__props__.__dict__["repository_id"] = repository_id
|
2116
2040
|
__props__.__dict__["update_time"] = update_time
|
2117
2041
|
__props__.__dict__["virtual_repository_config"] = virtual_repository_config
|
2118
|
-
__props__.__dict__["vulnerability_scanning_config"] = vulnerability_scanning_config
|
2119
2042
|
return Repository(resource_name, opts=opts, __props__=__props__)
|
2120
2043
|
|
2121
2044
|
@property
|
@@ -2308,12 +2231,3 @@ class Repository(pulumi.CustomResource):
|
|
2308
2231
|
"""
|
2309
2232
|
return pulumi.get(self, "virtual_repository_config")
|
2310
2233
|
|
2311
|
-
@property
|
2312
|
-
@pulumi.getter(name="vulnerabilityScanningConfig")
|
2313
|
-
def vulnerability_scanning_config(self) -> pulumi.Output['outputs.RepositoryVulnerabilityScanningConfig']:
|
2314
|
-
"""
|
2315
|
-
Configuration for vulnerability scanning of artifacts stored in this repository.
|
2316
|
-
Structure is documented below.
|
2317
|
-
"""
|
2318
|
-
return pulumi.get(self, "vulnerability_scanning_config")
|
2319
|
-
|