pulumi-gcp 8.16.0a1738080576__py3-none-any.whl → 8.17.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (83) hide show
  1. pulumi_gcp/__init__.py +91 -0
  2. pulumi_gcp/alloydb/cluster.py +75 -7
  3. pulumi_gcp/apigee/_inputs.py +91 -0
  4. pulumi_gcp/apigee/endpoint_attachment.py +0 -64
  5. pulumi_gcp/apigee/environment.py +54 -0
  6. pulumi_gcp/apigee/outputs.py +54 -0
  7. pulumi_gcp/apihub/__init__.py +10 -0
  8. pulumi_gcp/apihub/_inputs.py +154 -0
  9. pulumi_gcp/apihub/api_hub_instance.py +784 -0
  10. pulumi_gcp/apihub/outputs.py +124 -0
  11. pulumi_gcp/chronicle/__init__.py +1 -0
  12. pulumi_gcp/chronicle/_inputs.py +124 -0
  13. pulumi_gcp/chronicle/outputs.py +112 -0
  14. pulumi_gcp/chronicle/retrohunt.py +645 -0
  15. pulumi_gcp/cloudrunv2/_inputs.py +197 -0
  16. pulumi_gcp/cloudrunv2/get_service.py +12 -1
  17. pulumi_gcp/cloudrunv2/outputs.py +256 -0
  18. pulumi_gcp/cloudrunv2/service.py +159 -0
  19. pulumi_gcp/colab/__init__.py +5 -0
  20. pulumi_gcp/colab/_inputs.py +131 -0
  21. pulumi_gcp/colab/get_runtime_template_iam_policy.py +182 -0
  22. pulumi_gcp/colab/outputs.py +92 -0
  23. pulumi_gcp/colab/runtime.py +696 -0
  24. pulumi_gcp/colab/runtime_template_iam_binding.py +828 -0
  25. pulumi_gcp/colab/runtime_template_iam_member.py +828 -0
  26. pulumi_gcp/colab/runtime_template_iam_policy.py +667 -0
  27. pulumi_gcp/compute/__init__.py +4 -0
  28. pulumi_gcp/compute/_inputs.py +526 -0
  29. pulumi_gcp/compute/firewall_policy_rule.py +104 -22
  30. pulumi_gcp/compute/firewall_policy_with_rules.py +114 -42
  31. pulumi_gcp/compute/get_instance_template_iam_policy.py +159 -0
  32. pulumi_gcp/compute/instance_template_iam_binding.py +998 -0
  33. pulumi_gcp/compute/instance_template_iam_member.py +998 -0
  34. pulumi_gcp/compute/instance_template_iam_policy.py +817 -0
  35. pulumi_gcp/compute/interconnect_attachment.py +189 -2
  36. pulumi_gcp/compute/network_firewall_policy_rule.py +122 -10
  37. pulumi_gcp/compute/network_firewall_policy_with_rules.py +116 -44
  38. pulumi_gcp/compute/outputs.py +352 -0
  39. pulumi_gcp/compute/project_metadata_item.py +12 -0
  40. pulumi_gcp/compute/public_advertised_prefix.py +87 -0
  41. pulumi_gcp/compute/region_network_firewall_policy_rule.py +130 -10
  42. pulumi_gcp/compute/region_network_firewall_policy_with_rules.py +104 -32
  43. pulumi_gcp/compute/router_peer.py +115 -3
  44. pulumi_gcp/config/__init__.pyi +2 -0
  45. pulumi_gcp/config/vars.py +4 -0
  46. pulumi_gcp/filestore/get_instance.py +12 -1
  47. pulumi_gcp/filestore/instance.py +75 -0
  48. pulumi_gcp/gemini/code_repository_index.py +29 -33
  49. pulumi_gcp/gemini/get_repository_group_iam_policy.py +28 -2
  50. pulumi_gcp/gemini/repository_group.py +76 -26
  51. pulumi_gcp/gemini/repository_group_iam_binding.py +258 -0
  52. pulumi_gcp/gemini/repository_group_iam_member.py +258 -0
  53. pulumi_gcp/gemini/repository_group_iam_policy.py +258 -0
  54. pulumi_gcp/kms/__init__.py +1 -0
  55. pulumi_gcp/kms/get_key_handles.py +172 -0
  56. pulumi_gcp/kms/outputs.py +45 -0
  57. pulumi_gcp/networksecurity/_inputs.py +72 -0
  58. pulumi_gcp/networksecurity/outputs.py +76 -0
  59. pulumi_gcp/networksecurity/security_profile.py +233 -7
  60. pulumi_gcp/networksecurity/security_profile_group.py +218 -0
  61. pulumi_gcp/organizations/__init__.py +1 -0
  62. pulumi_gcp/organizations/get_s.py +128 -0
  63. pulumi_gcp/organizations/outputs.py +63 -0
  64. pulumi_gcp/parametermanager/__init__.py +3 -0
  65. pulumi_gcp/parametermanager/get_parameter.py +211 -0
  66. pulumi_gcp/parametermanager/get_regional_parameters.py +157 -0
  67. pulumi_gcp/parametermanager/outputs.py +210 -0
  68. pulumi_gcp/parametermanager/parameter_version.py +496 -0
  69. pulumi_gcp/parametermanager/regional_parameter_version.py +10 -38
  70. pulumi_gcp/provider.py +20 -0
  71. pulumi_gcp/pubsub/_inputs.py +213 -1
  72. pulumi_gcp/pubsub/outputs.py +278 -2
  73. pulumi_gcp/pubsub/topic.py +42 -0
  74. pulumi_gcp/pulumi-plugin.json +1 -1
  75. pulumi_gcp/redis/__init__.py +1 -0
  76. pulumi_gcp/redis/_inputs.py +342 -6
  77. pulumi_gcp/redis/cluster.py +223 -102
  78. pulumi_gcp/redis/cluster_user_created_connections.py +845 -0
  79. pulumi_gcp/redis/outputs.py +268 -4
  80. {pulumi_gcp-8.16.0a1738080576.dist-info → pulumi_gcp-8.17.0.dist-info}/METADATA +1 -1
  81. {pulumi_gcp-8.16.0a1738080576.dist-info → pulumi_gcp-8.17.0.dist-info}/RECORD +83 -63
  82. {pulumi_gcp-8.16.0a1738080576.dist-info → pulumi_gcp-8.17.0.dist-info}/WHEEL +0 -0
  83. {pulumi_gcp-8.16.0a1738080576.dist-info → pulumi_gcp-8.17.0.dist-info}/top_level.txt +0 -0
@@ -316,7 +316,7 @@ class NetworkFirewallPolicyWithRules(pulumi.CustomResource):
316
316
 
317
317
  project = gcp.organizations.get_project()
318
318
  address_group1 = gcp.networksecurity.AddressGroup("address_group_1",
319
- name="tf-address-group",
319
+ name="address-group",
320
320
  parent=project.id,
321
321
  description="Global address group",
322
322
  location="global",
@@ -327,26 +327,29 @@ class NetworkFirewallPolicyWithRules(pulumi.CustomResource):
327
327
  description="Tag key",
328
328
  parent=project.id,
329
329
  purpose="GCE_FIREWALL",
330
- short_name="tf-tag-key",
330
+ short_name="tag-key",
331
331
  purpose_data={
332
332
  "network": f"{project.name}/default",
333
333
  })
334
334
  secure_tag_value1 = gcp.tags.TagValue("secure_tag_value_1",
335
335
  description="Tag value",
336
336
  parent=secure_tag_key1.id,
337
- short_name="tf-tag-value")
337
+ short_name="tag-value")
338
338
  security_profile1 = gcp.networksecurity.SecurityProfile("security_profile_1",
339
- name="tf-security-profile",
339
+ name="sp",
340
340
  type="THREAT_PREVENTION",
341
341
  parent="organizations/123456789",
342
342
  location="global")
343
343
  security_profile_group1 = gcp.networksecurity.SecurityProfileGroup("security_profile_group_1",
344
- name="tf-security-profile-group",
344
+ name="spg",
345
345
  parent="organizations/123456789",
346
346
  description="my description",
347
347
  threat_prevention_profile=security_profile1.id)
348
- network_firewall_policy_with_rules = gcp.compute.NetworkFirewallPolicyWithRules("network-firewall-policy-with-rules",
349
- name="tf-fw-policy-with-rules",
348
+ network = gcp.compute.Network("network",
349
+ name="network",
350
+ auto_create_subnetworks=False)
351
+ primary = gcp.compute.NetworkFirewallPolicyWithRules("primary",
352
+ name="fw-policy",
350
353
  description="Terraform test",
351
354
  rules=[
352
355
  {
@@ -356,13 +359,6 @@ class NetworkFirewallPolicyWithRules(pulumi.CustomResource):
356
359
  "action": "allow",
357
360
  "direction": "EGRESS",
358
361
  "match": {
359
- "layer4_configs": [{
360
- "ip_protocol": "tcp",
361
- "ports": [
362
- "8080",
363
- "7070",
364
- ],
365
- }],
366
362
  "dest_ip_ranges": ["11.100.0.1/32"],
367
363
  "dest_fqdns": [
368
364
  "www.yyy.com",
@@ -377,6 +373,13 @@ class NetworkFirewallPolicyWithRules(pulumi.CustomResource):
377
373
  "iplist-tor-exit-nodes",
378
374
  ],
379
375
  "dest_address_groups": [address_group1.id],
376
+ "layer4_configs": [{
377
+ "ip_protocol": "tcp",
378
+ "ports": [
379
+ "8080",
380
+ "7070",
381
+ ],
382
+ }],
380
383
  },
381
384
  "target_secure_tags": [{
382
385
  "name": secure_tag_value1.id,
@@ -388,10 +391,8 @@ class NetworkFirewallPolicyWithRules(pulumi.CustomResource):
388
391
  "enable_logging": False,
389
392
  "action": "deny",
390
393
  "direction": "INGRESS",
394
+ "disabled": True,
391
395
  "match": {
392
- "layer4_configs": [{
393
- "ip_protocol": "udp",
394
- }],
395
396
  "src_ip_ranges": ["0.0.0.0/0"],
396
397
  "src_fqdns": [
397
398
  "www.abc.com",
@@ -409,8 +410,10 @@ class NetworkFirewallPolicyWithRules(pulumi.CustomResource):
409
410
  "src_secure_tags": [{
410
411
  "name": secure_tag_value1.id,
411
412
  }],
413
+ "layer4_configs": [{
414
+ "ip_protocol": "udp",
415
+ }],
412
416
  },
413
- "disabled": True,
414
417
  },
415
418
  {
416
419
  "description": "security profile group rule",
@@ -419,15 +422,48 @@ class NetworkFirewallPolicyWithRules(pulumi.CustomResource):
419
422
  "enable_logging": False,
420
423
  "action": "apply_security_profile_group",
421
424
  "direction": "INGRESS",
425
+ "target_service_accounts": ["test@google.com"],
426
+ "security_profile_group": security_profile_group1.id.apply(lambda id: f"//networksecurity.googleapis.com/{id}"),
427
+ "tls_inspect": True,
428
+ "match": {
429
+ "src_ip_ranges": ["0.0.0.0/0"],
430
+ "layer4_configs": [{
431
+ "ip_protocol": "tcp",
432
+ }],
433
+ },
434
+ },
435
+ {
436
+ "description": "network scope rule 1",
437
+ "rule_name": "network scope 1",
438
+ "priority": 4000,
439
+ "enable_logging": False,
440
+ "action": "allow",
441
+ "direction": "INGRESS",
422
442
  "match": {
443
+ "src_ip_ranges": ["11.100.0.1/32"],
444
+ "src_network_scope": "VPC_NETWORKS",
445
+ "src_networks": [network.id],
423
446
  "layer4_configs": [{
424
447
  "ip_protocol": "tcp",
448
+ "ports": ["8080"],
449
+ }],
450
+ },
451
+ },
452
+ {
453
+ "description": "network scope rule 2",
454
+ "rule_name": "network scope 2",
455
+ "priority": 5000,
456
+ "enable_logging": False,
457
+ "action": "allow",
458
+ "direction": "EGRESS",
459
+ "match": {
460
+ "dest_ip_ranges": ["0.0.0.0/0"],
461
+ "dest_network_scope": "INTERNET",
462
+ "layer4_configs": [{
463
+ "ip_protocol": "tcp",
464
+ "ports": ["8080"],
425
465
  }],
426
- "src_ip_ranges": ["0.0.0.0/0"],
427
466
  },
428
- "target_service_accounts": ["test@google.com"],
429
- "security_profile_group": security_profile_group1.id.apply(lambda id: f"//networksecurity.googleapis.com/{id}"),
430
- "tls_inspect": True,
431
467
  },
432
468
  ])
433
469
  ```
@@ -486,7 +522,7 @@ class NetworkFirewallPolicyWithRules(pulumi.CustomResource):
486
522
 
487
523
  project = gcp.organizations.get_project()
488
524
  address_group1 = gcp.networksecurity.AddressGroup("address_group_1",
489
- name="tf-address-group",
525
+ name="address-group",
490
526
  parent=project.id,
491
527
  description="Global address group",
492
528
  location="global",
@@ -497,26 +533,29 @@ class NetworkFirewallPolicyWithRules(pulumi.CustomResource):
497
533
  description="Tag key",
498
534
  parent=project.id,
499
535
  purpose="GCE_FIREWALL",
500
- short_name="tf-tag-key",
536
+ short_name="tag-key",
501
537
  purpose_data={
502
538
  "network": f"{project.name}/default",
503
539
  })
504
540
  secure_tag_value1 = gcp.tags.TagValue("secure_tag_value_1",
505
541
  description="Tag value",
506
542
  parent=secure_tag_key1.id,
507
- short_name="tf-tag-value")
543
+ short_name="tag-value")
508
544
  security_profile1 = gcp.networksecurity.SecurityProfile("security_profile_1",
509
- name="tf-security-profile",
545
+ name="sp",
510
546
  type="THREAT_PREVENTION",
511
547
  parent="organizations/123456789",
512
548
  location="global")
513
549
  security_profile_group1 = gcp.networksecurity.SecurityProfileGroup("security_profile_group_1",
514
- name="tf-security-profile-group",
550
+ name="spg",
515
551
  parent="organizations/123456789",
516
552
  description="my description",
517
553
  threat_prevention_profile=security_profile1.id)
518
- network_firewall_policy_with_rules = gcp.compute.NetworkFirewallPolicyWithRules("network-firewall-policy-with-rules",
519
- name="tf-fw-policy-with-rules",
554
+ network = gcp.compute.Network("network",
555
+ name="network",
556
+ auto_create_subnetworks=False)
557
+ primary = gcp.compute.NetworkFirewallPolicyWithRules("primary",
558
+ name="fw-policy",
520
559
  description="Terraform test",
521
560
  rules=[
522
561
  {
@@ -526,13 +565,6 @@ class NetworkFirewallPolicyWithRules(pulumi.CustomResource):
526
565
  "action": "allow",
527
566
  "direction": "EGRESS",
528
567
  "match": {
529
- "layer4_configs": [{
530
- "ip_protocol": "tcp",
531
- "ports": [
532
- "8080",
533
- "7070",
534
- ],
535
- }],
536
568
  "dest_ip_ranges": ["11.100.0.1/32"],
537
569
  "dest_fqdns": [
538
570
  "www.yyy.com",
@@ -547,6 +579,13 @@ class NetworkFirewallPolicyWithRules(pulumi.CustomResource):
547
579
  "iplist-tor-exit-nodes",
548
580
  ],
549
581
  "dest_address_groups": [address_group1.id],
582
+ "layer4_configs": [{
583
+ "ip_protocol": "tcp",
584
+ "ports": [
585
+ "8080",
586
+ "7070",
587
+ ],
588
+ }],
550
589
  },
551
590
  "target_secure_tags": [{
552
591
  "name": secure_tag_value1.id,
@@ -558,10 +597,8 @@ class NetworkFirewallPolicyWithRules(pulumi.CustomResource):
558
597
  "enable_logging": False,
559
598
  "action": "deny",
560
599
  "direction": "INGRESS",
600
+ "disabled": True,
561
601
  "match": {
562
- "layer4_configs": [{
563
- "ip_protocol": "udp",
564
- }],
565
602
  "src_ip_ranges": ["0.0.0.0/0"],
566
603
  "src_fqdns": [
567
604
  "www.abc.com",
@@ -579,8 +616,10 @@ class NetworkFirewallPolicyWithRules(pulumi.CustomResource):
579
616
  "src_secure_tags": [{
580
617
  "name": secure_tag_value1.id,
581
618
  }],
619
+ "layer4_configs": [{
620
+ "ip_protocol": "udp",
621
+ }],
582
622
  },
583
- "disabled": True,
584
623
  },
585
624
  {
586
625
  "description": "security profile group rule",
@@ -589,15 +628,48 @@ class NetworkFirewallPolicyWithRules(pulumi.CustomResource):
589
628
  "enable_logging": False,
590
629
  "action": "apply_security_profile_group",
591
630
  "direction": "INGRESS",
631
+ "target_service_accounts": ["test@google.com"],
632
+ "security_profile_group": security_profile_group1.id.apply(lambda id: f"//networksecurity.googleapis.com/{id}"),
633
+ "tls_inspect": True,
634
+ "match": {
635
+ "src_ip_ranges": ["0.0.0.0/0"],
636
+ "layer4_configs": [{
637
+ "ip_protocol": "tcp",
638
+ }],
639
+ },
640
+ },
641
+ {
642
+ "description": "network scope rule 1",
643
+ "rule_name": "network scope 1",
644
+ "priority": 4000,
645
+ "enable_logging": False,
646
+ "action": "allow",
647
+ "direction": "INGRESS",
592
648
  "match": {
649
+ "src_ip_ranges": ["11.100.0.1/32"],
650
+ "src_network_scope": "VPC_NETWORKS",
651
+ "src_networks": [network.id],
593
652
  "layer4_configs": [{
594
653
  "ip_protocol": "tcp",
654
+ "ports": ["8080"],
655
+ }],
656
+ },
657
+ },
658
+ {
659
+ "description": "network scope rule 2",
660
+ "rule_name": "network scope 2",
661
+ "priority": 5000,
662
+ "enable_logging": False,
663
+ "action": "allow",
664
+ "direction": "EGRESS",
665
+ "match": {
666
+ "dest_ip_ranges": ["0.0.0.0/0"],
667
+ "dest_network_scope": "INTERNET",
668
+ "layer4_configs": [{
669
+ "ip_protocol": "tcp",
670
+ "ports": ["8080"],
595
671
  }],
596
- "src_ip_ranges": ["0.0.0.0/0"],
597
672
  },
598
- "target_service_accounts": ["test@google.com"],
599
- "security_profile_group": security_profile_group1.id.apply(lambda id: f"//networksecurity.googleapis.com/{id}"),
600
- "tls_inspect": True,
601
673
  },
602
674
  ])
603
675
  ```