pulumi-gcp 8.22.0a1741888019__py3-none-any.whl → 8.23.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +32 -0
- pulumi_gcp/alloydb/_inputs.py +27 -1
- pulumi_gcp/alloydb/outputs.py +33 -2
- pulumi_gcp/applicationintegration/client.py +18 -24
- pulumi_gcp/bigquery/_inputs.py +20 -0
- pulumi_gcp/bigquery/outputs.py +12 -0
- pulumi_gcp/bigquery/table.py +61 -0
- pulumi_gcp/bigtable/table.py +7 -7
- pulumi_gcp/clouddeploy/_inputs.py +20 -0
- pulumi_gcp/clouddeploy/outputs.py +15 -1
- pulumi_gcp/cloudfunctions/function.py +11 -11
- pulumi_gcp/cloudfunctionsv2/function.py +24 -24
- pulumi_gcp/cloudidentity/get_group_transitive_memberships.py +41 -2
- pulumi_gcp/cloudidentity/outputs.py +18 -38
- pulumi_gcp/compute/firewall_policy.py +20 -0
- pulumi_gcp/compute/region_network_endpoint_group.py +2 -2
- pulumi_gcp/compute/subnetwork.py +109 -1
- pulumi_gcp/compute/target_https_proxy.py +7 -7
- pulumi_gcp/config/__init__.pyi +2 -0
- pulumi_gcp/config/vars.py +4 -0
- pulumi_gcp/container/_inputs.py +3 -3
- pulumi_gcp/container/get_attached_versions.py +2 -2
- pulumi_gcp/container/outputs.py +4 -4
- pulumi_gcp/dataform/repository.py +49 -0
- pulumi_gcp/dataproc/get_metastore_service.py +26 -4
- pulumi_gcp/dataproc/metastore_federation.py +56 -0
- pulumi_gcp/dataproc/metastore_service.py +58 -2
- pulumi_gcp/eventarc/__init__.py +1 -0
- pulumi_gcp/eventarc/_inputs.py +1758 -0
- pulumi_gcp/eventarc/outputs.py +1337 -0
- pulumi_gcp/eventarc/pipeline.py +1596 -0
- pulumi_gcp/firebase/__init__.py +1 -0
- pulumi_gcp/firebase/_inputs.py +154 -0
- pulumi_gcp/firebase/app_hosting_backend.py +1303 -0
- pulumi_gcp/firebase/hosting_version.py +2 -2
- pulumi_gcp/firebase/outputs.py +127 -0
- pulumi_gcp/kms/get_key_rings.py +39 -2
- pulumi_gcp/managedkafka/__init__.py +2 -0
- pulumi_gcp/managedkafka/_inputs.py +263 -0
- pulumi_gcp/managedkafka/connect_cluster.py +795 -0
- pulumi_gcp/managedkafka/connector.py +695 -0
- pulumi_gcp/managedkafka/outputs.py +248 -0
- pulumi_gcp/memorystore/instance.py +7 -7
- pulumi_gcp/monitoring/uptime_check_config.py +2 -2
- pulumi_gcp/networksecurity/_inputs.py +643 -0
- pulumi_gcp/networksecurity/gateway_security_policy.py +0 -7
- pulumi_gcp/networksecurity/mirroring_deployment.py +22 -0
- pulumi_gcp/networksecurity/mirroring_deployment_group.py +20 -0
- pulumi_gcp/networksecurity/mirroring_endpoint_group.py +24 -0
- pulumi_gcp/networksecurity/mirroring_endpoint_group_association.py +28 -0
- pulumi_gcp/networksecurity/outputs.py +475 -0
- pulumi_gcp/networksecurity/tls_inspection_policy.py +14 -0
- pulumi_gcp/networkservices/gateway.py +242 -120
- pulumi_gcp/projects/__init__.py +2 -0
- pulumi_gcp/projects/get_iam_custom_role.py +198 -0
- pulumi_gcp/projects/get_iam_custom_roles.py +164 -0
- pulumi_gcp/projects/outputs.py +96 -0
- pulumi_gcp/provider.py +20 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/servicenetworking/peered_dns_domain.py +4 -0
- pulumi_gcp/sql/outputs.py +8 -8
- pulumi_gcp/storage/_inputs.py +14 -6
- pulumi_gcp/storage/insights_report_config.py +121 -20
- pulumi_gcp/storage/outputs.py +7 -4
- pulumi_gcp/workflows/workflow.py +75 -7
- {pulumi_gcp-8.22.0a1741888019.dist-info → pulumi_gcp-8.23.0.dist-info}/METADATA +2 -2
- {pulumi_gcp-8.22.0a1741888019.dist-info → pulumi_gcp-8.23.0.dist-info}/RECORD +69 -63
- {pulumi_gcp-8.22.0a1741888019.dist-info → pulumi_gcp-8.23.0.dist-info}/WHEEL +1 -1
- {pulumi_gcp-8.22.0a1741888019.dist-info → pulumi_gcp-8.23.0.dist-info}/top_level.txt +0 -0
@@ -38,6 +38,12 @@ __all__ = [
|
|
38
38
|
'AuthzPolicyHttpRuleFromSourceResourceIamServiceAccount',
|
39
39
|
'AuthzPolicyHttpRuleFromSourceResourceTagValueIdSet',
|
40
40
|
'AuthzPolicyHttpRuleTo',
|
41
|
+
'AuthzPolicyHttpRuleToNotOperation',
|
42
|
+
'AuthzPolicyHttpRuleToNotOperationHeaderSet',
|
43
|
+
'AuthzPolicyHttpRuleToNotOperationHeaderSetHeader',
|
44
|
+
'AuthzPolicyHttpRuleToNotOperationHeaderSetHeaderValue',
|
45
|
+
'AuthzPolicyHttpRuleToNotOperationHost',
|
46
|
+
'AuthzPolicyHttpRuleToNotOperationPath',
|
41
47
|
'AuthzPolicyHttpRuleToOperation',
|
42
48
|
'AuthzPolicyHttpRuleToOperationHeaderSet',
|
43
49
|
'AuthzPolicyHttpRuleToOperationHeaderSetHeader',
|
@@ -1171,15 +1177,46 @@ class AuthzPolicyHttpRuleFromSourceResourceTagValueIdSet(dict):
|
|
1171
1177
|
|
1172
1178
|
@pulumi.output_type
|
1173
1179
|
class AuthzPolicyHttpRuleTo(dict):
|
1180
|
+
@staticmethod
|
1181
|
+
def __key_warning(key: str):
|
1182
|
+
suggest = None
|
1183
|
+
if key == "notOperations":
|
1184
|
+
suggest = "not_operations"
|
1185
|
+
|
1186
|
+
if suggest:
|
1187
|
+
pulumi.log.warn(f"Key '{key}' not found in AuthzPolicyHttpRuleTo. Access the value via the '{suggest}' property getter instead.")
|
1188
|
+
|
1189
|
+
def __getitem__(self, key: str) -> Any:
|
1190
|
+
AuthzPolicyHttpRuleTo.__key_warning(key)
|
1191
|
+
return super().__getitem__(key)
|
1192
|
+
|
1193
|
+
def get(self, key: str, default = None) -> Any:
|
1194
|
+
AuthzPolicyHttpRuleTo.__key_warning(key)
|
1195
|
+
return super().get(key, default)
|
1196
|
+
|
1174
1197
|
def __init__(__self__, *,
|
1198
|
+
not_operations: Optional[Sequence['outputs.AuthzPolicyHttpRuleToNotOperation']] = None,
|
1175
1199
|
operations: Optional[Sequence['outputs.AuthzPolicyHttpRuleToOperation']] = None):
|
1176
1200
|
"""
|
1201
|
+
:param Sequence['AuthzPolicyHttpRuleToNotOperationArgs'] not_operations: Describes the negated properties of the targets of a request. Matches requests for operations that do not match the criteria specified in this field. At least one of operations or notOperations must be specified.
|
1202
|
+
Structure is documented below.
|
1177
1203
|
:param Sequence['AuthzPolicyHttpRuleToOperationArgs'] operations: Describes properties of one or more targets of a request. At least one of operations or notOperations must be specified. Limited to 5 operations. A match occurs when ANY operation (in operations or notOperations) matches. Within an operation, the match follows AND semantics across fields and OR semantics within a field, i.e. a match occurs when ANY path matches AND ANY header matches and ANY method matches.
|
1178
1204
|
Structure is documented below.
|
1179
1205
|
"""
|
1206
|
+
if not_operations is not None:
|
1207
|
+
pulumi.set(__self__, "not_operations", not_operations)
|
1180
1208
|
if operations is not None:
|
1181
1209
|
pulumi.set(__self__, "operations", operations)
|
1182
1210
|
|
1211
|
+
@property
|
1212
|
+
@pulumi.getter(name="notOperations")
|
1213
|
+
def not_operations(self) -> Optional[Sequence['outputs.AuthzPolicyHttpRuleToNotOperation']]:
|
1214
|
+
"""
|
1215
|
+
Describes the negated properties of the targets of a request. Matches requests for operations that do not match the criteria specified in this field. At least one of operations or notOperations must be specified.
|
1216
|
+
Structure is documented below.
|
1217
|
+
"""
|
1218
|
+
return pulumi.get(self, "not_operations")
|
1219
|
+
|
1183
1220
|
@property
|
1184
1221
|
@pulumi.getter
|
1185
1222
|
def operations(self) -> Optional[Sequence['outputs.AuthzPolicyHttpRuleToOperation']]:
|
@@ -1190,6 +1227,444 @@ class AuthzPolicyHttpRuleTo(dict):
|
|
1190
1227
|
return pulumi.get(self, "operations")
|
1191
1228
|
|
1192
1229
|
|
1230
|
+
@pulumi.output_type
|
1231
|
+
class AuthzPolicyHttpRuleToNotOperation(dict):
|
1232
|
+
@staticmethod
|
1233
|
+
def __key_warning(key: str):
|
1234
|
+
suggest = None
|
1235
|
+
if key == "headerSet":
|
1236
|
+
suggest = "header_set"
|
1237
|
+
|
1238
|
+
if suggest:
|
1239
|
+
pulumi.log.warn(f"Key '{key}' not found in AuthzPolicyHttpRuleToNotOperation. Access the value via the '{suggest}' property getter instead.")
|
1240
|
+
|
1241
|
+
def __getitem__(self, key: str) -> Any:
|
1242
|
+
AuthzPolicyHttpRuleToNotOperation.__key_warning(key)
|
1243
|
+
return super().__getitem__(key)
|
1244
|
+
|
1245
|
+
def get(self, key: str, default = None) -> Any:
|
1246
|
+
AuthzPolicyHttpRuleToNotOperation.__key_warning(key)
|
1247
|
+
return super().get(key, default)
|
1248
|
+
|
1249
|
+
def __init__(__self__, *,
|
1250
|
+
header_set: Optional['outputs.AuthzPolicyHttpRuleToNotOperationHeaderSet'] = None,
|
1251
|
+
hosts: Optional[Sequence['outputs.AuthzPolicyHttpRuleToNotOperationHost']] = None,
|
1252
|
+
methods: Optional[Sequence[str]] = None,
|
1253
|
+
paths: Optional[Sequence['outputs.AuthzPolicyHttpRuleToNotOperationPath']] = None):
|
1254
|
+
"""
|
1255
|
+
:param 'AuthzPolicyHttpRuleToNotOperationHeaderSetArgs' header_set: A list of headers to match against in http header.
|
1256
|
+
Structure is documented below.
|
1257
|
+
:param Sequence['AuthzPolicyHttpRuleToNotOperationHostArgs'] hosts: A list of HTTP Hosts to match against. The match can be one of exact, prefix, suffix, or contains (substring match). Matches are always case sensitive unless the ignoreCase is set.
|
1258
|
+
Limited to 5 matches.
|
1259
|
+
Structure is documented below.
|
1260
|
+
:param Sequence[str] methods: A list of HTTP methods to match against. Each entry must be a valid HTTP method name (GET, PUT, POST, HEAD, PATCH, DELETE, OPTIONS). It only allows exact match and is always case sensitive.
|
1261
|
+
:param Sequence['AuthzPolicyHttpRuleToNotOperationPathArgs'] paths: A list of paths to match against. The match can be one of exact, prefix, suffix, or contains (substring match). Matches are always case sensitive unless the ignoreCase is set.
|
1262
|
+
Limited to 5 matches.
|
1263
|
+
Note that this path match includes the query parameters. For gRPC services, this should be a fully-qualified name of the form /package.service/method.
|
1264
|
+
Structure is documented below.
|
1265
|
+
"""
|
1266
|
+
if header_set is not None:
|
1267
|
+
pulumi.set(__self__, "header_set", header_set)
|
1268
|
+
if hosts is not None:
|
1269
|
+
pulumi.set(__self__, "hosts", hosts)
|
1270
|
+
if methods is not None:
|
1271
|
+
pulumi.set(__self__, "methods", methods)
|
1272
|
+
if paths is not None:
|
1273
|
+
pulumi.set(__self__, "paths", paths)
|
1274
|
+
|
1275
|
+
@property
|
1276
|
+
@pulumi.getter(name="headerSet")
|
1277
|
+
def header_set(self) -> Optional['outputs.AuthzPolicyHttpRuleToNotOperationHeaderSet']:
|
1278
|
+
"""
|
1279
|
+
A list of headers to match against in http header.
|
1280
|
+
Structure is documented below.
|
1281
|
+
"""
|
1282
|
+
return pulumi.get(self, "header_set")
|
1283
|
+
|
1284
|
+
@property
|
1285
|
+
@pulumi.getter
|
1286
|
+
def hosts(self) -> Optional[Sequence['outputs.AuthzPolicyHttpRuleToNotOperationHost']]:
|
1287
|
+
"""
|
1288
|
+
A list of HTTP Hosts to match against. The match can be one of exact, prefix, suffix, or contains (substring match). Matches are always case sensitive unless the ignoreCase is set.
|
1289
|
+
Limited to 5 matches.
|
1290
|
+
Structure is documented below.
|
1291
|
+
"""
|
1292
|
+
return pulumi.get(self, "hosts")
|
1293
|
+
|
1294
|
+
@property
|
1295
|
+
@pulumi.getter
|
1296
|
+
def methods(self) -> Optional[Sequence[str]]:
|
1297
|
+
"""
|
1298
|
+
A list of HTTP methods to match against. Each entry must be a valid HTTP method name (GET, PUT, POST, HEAD, PATCH, DELETE, OPTIONS). It only allows exact match and is always case sensitive.
|
1299
|
+
"""
|
1300
|
+
return pulumi.get(self, "methods")
|
1301
|
+
|
1302
|
+
@property
|
1303
|
+
@pulumi.getter
|
1304
|
+
def paths(self) -> Optional[Sequence['outputs.AuthzPolicyHttpRuleToNotOperationPath']]:
|
1305
|
+
"""
|
1306
|
+
A list of paths to match against. The match can be one of exact, prefix, suffix, or contains (substring match). Matches are always case sensitive unless the ignoreCase is set.
|
1307
|
+
Limited to 5 matches.
|
1308
|
+
Note that this path match includes the query parameters. For gRPC services, this should be a fully-qualified name of the form /package.service/method.
|
1309
|
+
Structure is documented below.
|
1310
|
+
"""
|
1311
|
+
return pulumi.get(self, "paths")
|
1312
|
+
|
1313
|
+
|
1314
|
+
@pulumi.output_type
|
1315
|
+
class AuthzPolicyHttpRuleToNotOperationHeaderSet(dict):
|
1316
|
+
def __init__(__self__, *,
|
1317
|
+
headers: Optional[Sequence['outputs.AuthzPolicyHttpRuleToNotOperationHeaderSetHeader']] = None):
|
1318
|
+
"""
|
1319
|
+
:param Sequence['AuthzPolicyHttpRuleToNotOperationHeaderSetHeaderArgs'] headers: A list of headers to match against in http header. The match can be one of exact, prefix, suffix, or contains (substring match). The match follows AND semantics which means all the headers must match. Matches are always case sensitive unless the ignoreCase is set. Limited to 5 matches.
|
1320
|
+
Structure is documented below.
|
1321
|
+
"""
|
1322
|
+
if headers is not None:
|
1323
|
+
pulumi.set(__self__, "headers", headers)
|
1324
|
+
|
1325
|
+
@property
|
1326
|
+
@pulumi.getter
|
1327
|
+
def headers(self) -> Optional[Sequence['outputs.AuthzPolicyHttpRuleToNotOperationHeaderSetHeader']]:
|
1328
|
+
"""
|
1329
|
+
A list of headers to match against in http header. The match can be one of exact, prefix, suffix, or contains (substring match). The match follows AND semantics which means all the headers must match. Matches are always case sensitive unless the ignoreCase is set. Limited to 5 matches.
|
1330
|
+
Structure is documented below.
|
1331
|
+
"""
|
1332
|
+
return pulumi.get(self, "headers")
|
1333
|
+
|
1334
|
+
|
1335
|
+
@pulumi.output_type
|
1336
|
+
class AuthzPolicyHttpRuleToNotOperationHeaderSetHeader(dict):
|
1337
|
+
def __init__(__self__, *,
|
1338
|
+
name: Optional[str] = None,
|
1339
|
+
value: Optional['outputs.AuthzPolicyHttpRuleToNotOperationHeaderSetHeaderValue'] = None):
|
1340
|
+
"""
|
1341
|
+
:param str name: Specifies the name of the header in the request.
|
1342
|
+
:param 'AuthzPolicyHttpRuleToNotOperationHeaderSetHeaderValueArgs' value: Specifies how the header match will be performed.
|
1343
|
+
Structure is documented below.
|
1344
|
+
"""
|
1345
|
+
if name is not None:
|
1346
|
+
pulumi.set(__self__, "name", name)
|
1347
|
+
if value is not None:
|
1348
|
+
pulumi.set(__self__, "value", value)
|
1349
|
+
|
1350
|
+
@property
|
1351
|
+
@pulumi.getter
|
1352
|
+
def name(self) -> Optional[str]:
|
1353
|
+
"""
|
1354
|
+
Specifies the name of the header in the request.
|
1355
|
+
"""
|
1356
|
+
return pulumi.get(self, "name")
|
1357
|
+
|
1358
|
+
@property
|
1359
|
+
@pulumi.getter
|
1360
|
+
def value(self) -> Optional['outputs.AuthzPolicyHttpRuleToNotOperationHeaderSetHeaderValue']:
|
1361
|
+
"""
|
1362
|
+
Specifies how the header match will be performed.
|
1363
|
+
Structure is documented below.
|
1364
|
+
"""
|
1365
|
+
return pulumi.get(self, "value")
|
1366
|
+
|
1367
|
+
|
1368
|
+
@pulumi.output_type
|
1369
|
+
class AuthzPolicyHttpRuleToNotOperationHeaderSetHeaderValue(dict):
|
1370
|
+
@staticmethod
|
1371
|
+
def __key_warning(key: str):
|
1372
|
+
suggest = None
|
1373
|
+
if key == "ignoreCase":
|
1374
|
+
suggest = "ignore_case"
|
1375
|
+
|
1376
|
+
if suggest:
|
1377
|
+
pulumi.log.warn(f"Key '{key}' not found in AuthzPolicyHttpRuleToNotOperationHeaderSetHeaderValue. Access the value via the '{suggest}' property getter instead.")
|
1378
|
+
|
1379
|
+
def __getitem__(self, key: str) -> Any:
|
1380
|
+
AuthzPolicyHttpRuleToNotOperationHeaderSetHeaderValue.__key_warning(key)
|
1381
|
+
return super().__getitem__(key)
|
1382
|
+
|
1383
|
+
def get(self, key: str, default = None) -> Any:
|
1384
|
+
AuthzPolicyHttpRuleToNotOperationHeaderSetHeaderValue.__key_warning(key)
|
1385
|
+
return super().get(key, default)
|
1386
|
+
|
1387
|
+
def __init__(__self__, *,
|
1388
|
+
contains: Optional[str] = None,
|
1389
|
+
exact: Optional[str] = None,
|
1390
|
+
ignore_case: Optional[bool] = None,
|
1391
|
+
prefix: Optional[str] = None,
|
1392
|
+
suffix: Optional[str] = None):
|
1393
|
+
"""
|
1394
|
+
:param str contains: The input string must have the substring specified here. Note: empty contains match is not allowed, please use regex instead.
|
1395
|
+
Examples:
|
1396
|
+
* abc matches the value xyz.abc.def
|
1397
|
+
:param str exact: The input string must match exactly the string specified here.
|
1398
|
+
Examples:
|
1399
|
+
* abc only matches the value abc.
|
1400
|
+
:param bool ignore_case: If true, indicates the exact/prefix/suffix/contains matching should be case insensitive. For example, the matcher data will match both input string Data and data if set to true.
|
1401
|
+
:param str prefix: The input string must have the prefix specified here. Note: empty prefix is not allowed, please use regex instead.
|
1402
|
+
Examples:
|
1403
|
+
* abc matches the value abc.xyz
|
1404
|
+
:param str suffix: The input string must have the suffix specified here. Note: empty prefix is not allowed, please use regex instead.
|
1405
|
+
Examples:
|
1406
|
+
* abc matches the value xyz.abc
|
1407
|
+
"""
|
1408
|
+
if contains is not None:
|
1409
|
+
pulumi.set(__self__, "contains", contains)
|
1410
|
+
if exact is not None:
|
1411
|
+
pulumi.set(__self__, "exact", exact)
|
1412
|
+
if ignore_case is not None:
|
1413
|
+
pulumi.set(__self__, "ignore_case", ignore_case)
|
1414
|
+
if prefix is not None:
|
1415
|
+
pulumi.set(__self__, "prefix", prefix)
|
1416
|
+
if suffix is not None:
|
1417
|
+
pulumi.set(__self__, "suffix", suffix)
|
1418
|
+
|
1419
|
+
@property
|
1420
|
+
@pulumi.getter
|
1421
|
+
def contains(self) -> Optional[str]:
|
1422
|
+
"""
|
1423
|
+
The input string must have the substring specified here. Note: empty contains match is not allowed, please use regex instead.
|
1424
|
+
Examples:
|
1425
|
+
* abc matches the value xyz.abc.def
|
1426
|
+
"""
|
1427
|
+
return pulumi.get(self, "contains")
|
1428
|
+
|
1429
|
+
@property
|
1430
|
+
@pulumi.getter
|
1431
|
+
def exact(self) -> Optional[str]:
|
1432
|
+
"""
|
1433
|
+
The input string must match exactly the string specified here.
|
1434
|
+
Examples:
|
1435
|
+
* abc only matches the value abc.
|
1436
|
+
"""
|
1437
|
+
return pulumi.get(self, "exact")
|
1438
|
+
|
1439
|
+
@property
|
1440
|
+
@pulumi.getter(name="ignoreCase")
|
1441
|
+
def ignore_case(self) -> Optional[bool]:
|
1442
|
+
"""
|
1443
|
+
If true, indicates the exact/prefix/suffix/contains matching should be case insensitive. For example, the matcher data will match both input string Data and data if set to true.
|
1444
|
+
"""
|
1445
|
+
return pulumi.get(self, "ignore_case")
|
1446
|
+
|
1447
|
+
@property
|
1448
|
+
@pulumi.getter
|
1449
|
+
def prefix(self) -> Optional[str]:
|
1450
|
+
"""
|
1451
|
+
The input string must have the prefix specified here. Note: empty prefix is not allowed, please use regex instead.
|
1452
|
+
Examples:
|
1453
|
+
* abc matches the value abc.xyz
|
1454
|
+
"""
|
1455
|
+
return pulumi.get(self, "prefix")
|
1456
|
+
|
1457
|
+
@property
|
1458
|
+
@pulumi.getter
|
1459
|
+
def suffix(self) -> Optional[str]:
|
1460
|
+
"""
|
1461
|
+
The input string must have the suffix specified here. Note: empty prefix is not allowed, please use regex instead.
|
1462
|
+
Examples:
|
1463
|
+
* abc matches the value xyz.abc
|
1464
|
+
"""
|
1465
|
+
return pulumi.get(self, "suffix")
|
1466
|
+
|
1467
|
+
|
1468
|
+
@pulumi.output_type
|
1469
|
+
class AuthzPolicyHttpRuleToNotOperationHost(dict):
|
1470
|
+
@staticmethod
|
1471
|
+
def __key_warning(key: str):
|
1472
|
+
suggest = None
|
1473
|
+
if key == "ignoreCase":
|
1474
|
+
suggest = "ignore_case"
|
1475
|
+
|
1476
|
+
if suggest:
|
1477
|
+
pulumi.log.warn(f"Key '{key}' not found in AuthzPolicyHttpRuleToNotOperationHost. Access the value via the '{suggest}' property getter instead.")
|
1478
|
+
|
1479
|
+
def __getitem__(self, key: str) -> Any:
|
1480
|
+
AuthzPolicyHttpRuleToNotOperationHost.__key_warning(key)
|
1481
|
+
return super().__getitem__(key)
|
1482
|
+
|
1483
|
+
def get(self, key: str, default = None) -> Any:
|
1484
|
+
AuthzPolicyHttpRuleToNotOperationHost.__key_warning(key)
|
1485
|
+
return super().get(key, default)
|
1486
|
+
|
1487
|
+
def __init__(__self__, *,
|
1488
|
+
contains: Optional[str] = None,
|
1489
|
+
exact: Optional[str] = None,
|
1490
|
+
ignore_case: Optional[bool] = None,
|
1491
|
+
prefix: Optional[str] = None,
|
1492
|
+
suffix: Optional[str] = None):
|
1493
|
+
"""
|
1494
|
+
:param str contains: The input string must have the substring specified here. Note: empty contains match is not allowed, please use regex instead.
|
1495
|
+
Examples:
|
1496
|
+
* abc matches the value xyz.abc.def
|
1497
|
+
:param str exact: The input string must match exactly the string specified here.
|
1498
|
+
Examples:
|
1499
|
+
* abc only matches the value abc.
|
1500
|
+
:param bool ignore_case: If true, indicates the exact/prefix/suffix/contains matching should be case insensitive. For example, the matcher data will match both input string Data and data if set to true.
|
1501
|
+
:param str prefix: The input string must have the prefix specified here. Note: empty prefix is not allowed, please use regex instead.
|
1502
|
+
Examples:
|
1503
|
+
* abc matches the value abc.xyz
|
1504
|
+
:param str suffix: The input string must have the suffix specified here. Note: empty prefix is not allowed, please use regex instead.
|
1505
|
+
Examples:
|
1506
|
+
* abc matches the value xyz.abc
|
1507
|
+
"""
|
1508
|
+
if contains is not None:
|
1509
|
+
pulumi.set(__self__, "contains", contains)
|
1510
|
+
if exact is not None:
|
1511
|
+
pulumi.set(__self__, "exact", exact)
|
1512
|
+
if ignore_case is not None:
|
1513
|
+
pulumi.set(__self__, "ignore_case", ignore_case)
|
1514
|
+
if prefix is not None:
|
1515
|
+
pulumi.set(__self__, "prefix", prefix)
|
1516
|
+
if suffix is not None:
|
1517
|
+
pulumi.set(__self__, "suffix", suffix)
|
1518
|
+
|
1519
|
+
@property
|
1520
|
+
@pulumi.getter
|
1521
|
+
def contains(self) -> Optional[str]:
|
1522
|
+
"""
|
1523
|
+
The input string must have the substring specified here. Note: empty contains match is not allowed, please use regex instead.
|
1524
|
+
Examples:
|
1525
|
+
* abc matches the value xyz.abc.def
|
1526
|
+
"""
|
1527
|
+
return pulumi.get(self, "contains")
|
1528
|
+
|
1529
|
+
@property
|
1530
|
+
@pulumi.getter
|
1531
|
+
def exact(self) -> Optional[str]:
|
1532
|
+
"""
|
1533
|
+
The input string must match exactly the string specified here.
|
1534
|
+
Examples:
|
1535
|
+
* abc only matches the value abc.
|
1536
|
+
"""
|
1537
|
+
return pulumi.get(self, "exact")
|
1538
|
+
|
1539
|
+
@property
|
1540
|
+
@pulumi.getter(name="ignoreCase")
|
1541
|
+
def ignore_case(self) -> Optional[bool]:
|
1542
|
+
"""
|
1543
|
+
If true, indicates the exact/prefix/suffix/contains matching should be case insensitive. For example, the matcher data will match both input string Data and data if set to true.
|
1544
|
+
"""
|
1545
|
+
return pulumi.get(self, "ignore_case")
|
1546
|
+
|
1547
|
+
@property
|
1548
|
+
@pulumi.getter
|
1549
|
+
def prefix(self) -> Optional[str]:
|
1550
|
+
"""
|
1551
|
+
The input string must have the prefix specified here. Note: empty prefix is not allowed, please use regex instead.
|
1552
|
+
Examples:
|
1553
|
+
* abc matches the value abc.xyz
|
1554
|
+
"""
|
1555
|
+
return pulumi.get(self, "prefix")
|
1556
|
+
|
1557
|
+
@property
|
1558
|
+
@pulumi.getter
|
1559
|
+
def suffix(self) -> Optional[str]:
|
1560
|
+
"""
|
1561
|
+
The input string must have the suffix specified here. Note: empty prefix is not allowed, please use regex instead.
|
1562
|
+
Examples:
|
1563
|
+
* abc matches the value xyz.abc
|
1564
|
+
"""
|
1565
|
+
return pulumi.get(self, "suffix")
|
1566
|
+
|
1567
|
+
|
1568
|
+
@pulumi.output_type
|
1569
|
+
class AuthzPolicyHttpRuleToNotOperationPath(dict):
|
1570
|
+
@staticmethod
|
1571
|
+
def __key_warning(key: str):
|
1572
|
+
suggest = None
|
1573
|
+
if key == "ignoreCase":
|
1574
|
+
suggest = "ignore_case"
|
1575
|
+
|
1576
|
+
if suggest:
|
1577
|
+
pulumi.log.warn(f"Key '{key}' not found in AuthzPolicyHttpRuleToNotOperationPath. Access the value via the '{suggest}' property getter instead.")
|
1578
|
+
|
1579
|
+
def __getitem__(self, key: str) -> Any:
|
1580
|
+
AuthzPolicyHttpRuleToNotOperationPath.__key_warning(key)
|
1581
|
+
return super().__getitem__(key)
|
1582
|
+
|
1583
|
+
def get(self, key: str, default = None) -> Any:
|
1584
|
+
AuthzPolicyHttpRuleToNotOperationPath.__key_warning(key)
|
1585
|
+
return super().get(key, default)
|
1586
|
+
|
1587
|
+
def __init__(__self__, *,
|
1588
|
+
contains: Optional[str] = None,
|
1589
|
+
exact: Optional[str] = None,
|
1590
|
+
ignore_case: Optional[bool] = None,
|
1591
|
+
prefix: Optional[str] = None,
|
1592
|
+
suffix: Optional[str] = None):
|
1593
|
+
"""
|
1594
|
+
:param str contains: The input string must have the substring specified here. Note: empty contains match is not allowed, please use regex instead.
|
1595
|
+
Examples:
|
1596
|
+
* abc matches the value xyz.abc.def
|
1597
|
+
:param str exact: The input string must match exactly the string specified here.
|
1598
|
+
Examples:
|
1599
|
+
* abc only matches the value abc.
|
1600
|
+
:param bool ignore_case: If true, indicates the exact/prefix/suffix/contains matching should be case insensitive. For example, the matcher data will match both input string Data and data if set to true.
|
1601
|
+
:param str prefix: The input string must have the prefix specified here. Note: empty prefix is not allowed, please use regex instead.
|
1602
|
+
Examples:
|
1603
|
+
* abc matches the value abc.xyz
|
1604
|
+
:param str suffix: The input string must have the suffix specified here. Note: empty prefix is not allowed, please use regex instead.
|
1605
|
+
Examples:
|
1606
|
+
* abc matches the value xyz.abc
|
1607
|
+
"""
|
1608
|
+
if contains is not None:
|
1609
|
+
pulumi.set(__self__, "contains", contains)
|
1610
|
+
if exact is not None:
|
1611
|
+
pulumi.set(__self__, "exact", exact)
|
1612
|
+
if ignore_case is not None:
|
1613
|
+
pulumi.set(__self__, "ignore_case", ignore_case)
|
1614
|
+
if prefix is not None:
|
1615
|
+
pulumi.set(__self__, "prefix", prefix)
|
1616
|
+
if suffix is not None:
|
1617
|
+
pulumi.set(__self__, "suffix", suffix)
|
1618
|
+
|
1619
|
+
@property
|
1620
|
+
@pulumi.getter
|
1621
|
+
def contains(self) -> Optional[str]:
|
1622
|
+
"""
|
1623
|
+
The input string must have the substring specified here. Note: empty contains match is not allowed, please use regex instead.
|
1624
|
+
Examples:
|
1625
|
+
* abc matches the value xyz.abc.def
|
1626
|
+
"""
|
1627
|
+
return pulumi.get(self, "contains")
|
1628
|
+
|
1629
|
+
@property
|
1630
|
+
@pulumi.getter
|
1631
|
+
def exact(self) -> Optional[str]:
|
1632
|
+
"""
|
1633
|
+
The input string must match exactly the string specified here.
|
1634
|
+
Examples:
|
1635
|
+
* abc only matches the value abc.
|
1636
|
+
"""
|
1637
|
+
return pulumi.get(self, "exact")
|
1638
|
+
|
1639
|
+
@property
|
1640
|
+
@pulumi.getter(name="ignoreCase")
|
1641
|
+
def ignore_case(self) -> Optional[bool]:
|
1642
|
+
"""
|
1643
|
+
If true, indicates the exact/prefix/suffix/contains matching should be case insensitive. For example, the matcher data will match both input string Data and data if set to true.
|
1644
|
+
"""
|
1645
|
+
return pulumi.get(self, "ignore_case")
|
1646
|
+
|
1647
|
+
@property
|
1648
|
+
@pulumi.getter
|
1649
|
+
def prefix(self) -> Optional[str]:
|
1650
|
+
"""
|
1651
|
+
The input string must have the prefix specified here. Note: empty prefix is not allowed, please use regex instead.
|
1652
|
+
Examples:
|
1653
|
+
* abc matches the value abc.xyz
|
1654
|
+
"""
|
1655
|
+
return pulumi.get(self, "prefix")
|
1656
|
+
|
1657
|
+
@property
|
1658
|
+
@pulumi.getter
|
1659
|
+
def suffix(self) -> Optional[str]:
|
1660
|
+
"""
|
1661
|
+
The input string must have the suffix specified here. Note: empty prefix is not allowed, please use regex instead.
|
1662
|
+
Examples:
|
1663
|
+
* abc matches the value xyz.abc
|
1664
|
+
"""
|
1665
|
+
return pulumi.get(self, "suffix")
|
1666
|
+
|
1667
|
+
|
1193
1668
|
@pulumi.output_type
|
1194
1669
|
class AuthzPolicyHttpRuleToOperation(dict):
|
1195
1670
|
@staticmethod
|
@@ -37,6 +37,7 @@ class TlsInspectionPolicyArgs:
|
|
37
37
|
:param pulumi.Input[bool] exclude_public_ca_set: If FALSE (the default), use our default set of public CAs in addition to any CAs specified in trustConfig. These public CAs are currently based on the Mozilla Root Program and are subject to change over time. If TRUE, do not accept our default set of public CAs. Only CAs specified in trustConfig will be accepted.
|
38
38
|
:param pulumi.Input[str] location: The location of the tls inspection policy.
|
39
39
|
:param pulumi.Input[str] min_tls_version: Minimum TLS version that the firewall should use when negotiating connections with both clients and servers. If this is not set, then the default value is to allow the broadest set of clients and servers (TLS 1.0 or higher). Setting this to more restrictive values may improve security, but may also prevent the firewall from connecting to some clients or servers. Note that Secure Web Proxy does not yet honor this field.
|
40
|
+
Default value is `TLS_VERSION_UNSPECIFIED`.
|
40
41
|
Possible values are: `TLS_VERSION_UNSPECIFIED`, `TLS_1_0`, `TLS_1_1`, `TLS_1_2`, `TLS_1_3`.
|
41
42
|
:param pulumi.Input[str] name: Short name of the TlsInspectionPolicy resource to be created.
|
42
43
|
|
@@ -45,6 +46,7 @@ class TlsInspectionPolicyArgs:
|
|
45
46
|
:param pulumi.Input[str] project: The ID of the project in which the resource belongs.
|
46
47
|
If it is not provided, the provider project is used.
|
47
48
|
:param pulumi.Input[str] tls_feature_profile: The selected Profile. If this is not set, then the default value is to allow the broadest set of clients and servers (\\"PROFILE_COMPATIBLE\\"). Setting this to more restrictive values may improve security, but may also prevent the TLS inspection proxy from connecting to some clients or servers. Note that Secure Web Proxy does not yet honor this field.
|
49
|
+
Default value is `PROFILE_UNSPECIFIED`.
|
48
50
|
Possible values are: `PROFILE_UNSPECIFIED`, `PROFILE_COMPATIBLE`, `PROFILE_MODERN`, `PROFILE_RESTRICTED`, `PROFILE_CUSTOM`.
|
49
51
|
:param pulumi.Input[str] trust_config: A TrustConfig resource used when making a connection to the TLS server. This is a relative resource path following the form \\"projects/{project}/locations/{location}/trustConfigs/{trust_config}\\". This is necessary to intercept TLS connections to servers with certificates signed by a private CA or self-signed certificates. Trust config and the TLS inspection policy must be in the same region. Note that Secure Web Proxy does not yet honor this field.
|
50
52
|
"""
|
@@ -133,6 +135,7 @@ class TlsInspectionPolicyArgs:
|
|
133
135
|
def min_tls_version(self) -> Optional[pulumi.Input[str]]:
|
134
136
|
"""
|
135
137
|
Minimum TLS version that the firewall should use when negotiating connections with both clients and servers. If this is not set, then the default value is to allow the broadest set of clients and servers (TLS 1.0 or higher). Setting this to more restrictive values may improve security, but may also prevent the firewall from connecting to some clients or servers. Note that Secure Web Proxy does not yet honor this field.
|
138
|
+
Default value is `TLS_VERSION_UNSPECIFIED`.
|
136
139
|
Possible values are: `TLS_VERSION_UNSPECIFIED`, `TLS_1_0`, `TLS_1_1`, `TLS_1_2`, `TLS_1_3`.
|
137
140
|
"""
|
138
141
|
return pulumi.get(self, "min_tls_version")
|
@@ -174,6 +177,7 @@ class TlsInspectionPolicyArgs:
|
|
174
177
|
def tls_feature_profile(self) -> Optional[pulumi.Input[str]]:
|
175
178
|
"""
|
176
179
|
The selected Profile. If this is not set, then the default value is to allow the broadest set of clients and servers (\\"PROFILE_COMPATIBLE\\"). Setting this to more restrictive values may improve security, but may also prevent the TLS inspection proxy from connecting to some clients or servers. Note that Secure Web Proxy does not yet honor this field.
|
180
|
+
Default value is `PROFILE_UNSPECIFIED`.
|
177
181
|
Possible values are: `PROFILE_UNSPECIFIED`, `PROFILE_COMPATIBLE`, `PROFILE_MODERN`, `PROFILE_RESTRICTED`, `PROFILE_CUSTOM`.
|
178
182
|
"""
|
179
183
|
return pulumi.get(self, "tls_feature_profile")
|
@@ -219,6 +223,7 @@ class _TlsInspectionPolicyState:
|
|
219
223
|
:param pulumi.Input[bool] exclude_public_ca_set: If FALSE (the default), use our default set of public CAs in addition to any CAs specified in trustConfig. These public CAs are currently based on the Mozilla Root Program and are subject to change over time. If TRUE, do not accept our default set of public CAs. Only CAs specified in trustConfig will be accepted.
|
220
224
|
:param pulumi.Input[str] location: The location of the tls inspection policy.
|
221
225
|
:param pulumi.Input[str] min_tls_version: Minimum TLS version that the firewall should use when negotiating connections with both clients and servers. If this is not set, then the default value is to allow the broadest set of clients and servers (TLS 1.0 or higher). Setting this to more restrictive values may improve security, but may also prevent the firewall from connecting to some clients or servers. Note that Secure Web Proxy does not yet honor this field.
|
226
|
+
Default value is `TLS_VERSION_UNSPECIFIED`.
|
222
227
|
Possible values are: `TLS_VERSION_UNSPECIFIED`, `TLS_1_0`, `TLS_1_1`, `TLS_1_2`, `TLS_1_3`.
|
223
228
|
:param pulumi.Input[str] name: Short name of the TlsInspectionPolicy resource to be created.
|
224
229
|
|
@@ -227,6 +232,7 @@ class _TlsInspectionPolicyState:
|
|
227
232
|
:param pulumi.Input[str] project: The ID of the project in which the resource belongs.
|
228
233
|
If it is not provided, the provider project is used.
|
229
234
|
:param pulumi.Input[str] tls_feature_profile: The selected Profile. If this is not set, then the default value is to allow the broadest set of clients and servers (\\"PROFILE_COMPATIBLE\\"). Setting this to more restrictive values may improve security, but may also prevent the TLS inspection proxy from connecting to some clients or servers. Note that Secure Web Proxy does not yet honor this field.
|
235
|
+
Default value is `PROFILE_UNSPECIFIED`.
|
230
236
|
Possible values are: `PROFILE_UNSPECIFIED`, `PROFILE_COMPATIBLE`, `PROFILE_MODERN`, `PROFILE_RESTRICTED`, `PROFILE_CUSTOM`.
|
231
237
|
:param pulumi.Input[str] trust_config: A TrustConfig resource used when making a connection to the TLS server. This is a relative resource path following the form \\"projects/{project}/locations/{location}/trustConfigs/{trust_config}\\". This is necessary to intercept TLS connections to servers with certificates signed by a private CA or self-signed certificates. Trust config and the TLS inspection policy must be in the same region. Note that Secure Web Proxy does not yet honor this field.
|
232
238
|
:param pulumi.Input[str] update_time: The timestamp when the resource was updated.
|
@@ -333,6 +339,7 @@ class _TlsInspectionPolicyState:
|
|
333
339
|
def min_tls_version(self) -> Optional[pulumi.Input[str]]:
|
334
340
|
"""
|
335
341
|
Minimum TLS version that the firewall should use when negotiating connections with both clients and servers. If this is not set, then the default value is to allow the broadest set of clients and servers (TLS 1.0 or higher). Setting this to more restrictive values may improve security, but may also prevent the firewall from connecting to some clients or servers. Note that Secure Web Proxy does not yet honor this field.
|
342
|
+
Default value is `TLS_VERSION_UNSPECIFIED`.
|
336
343
|
Possible values are: `TLS_VERSION_UNSPECIFIED`, `TLS_1_0`, `TLS_1_1`, `TLS_1_2`, `TLS_1_3`.
|
337
344
|
"""
|
338
345
|
return pulumi.get(self, "min_tls_version")
|
@@ -374,6 +381,7 @@ class _TlsInspectionPolicyState:
|
|
374
381
|
def tls_feature_profile(self) -> Optional[pulumi.Input[str]]:
|
375
382
|
"""
|
376
383
|
The selected Profile. If this is not set, then the default value is to allow the broadest set of clients and servers (\\"PROFILE_COMPATIBLE\\"). Setting this to more restrictive values may improve security, but may also prevent the TLS inspection proxy from connecting to some clients or servers. Note that Secure Web Proxy does not yet honor this field.
|
384
|
+
Default value is `PROFILE_UNSPECIFIED`.
|
377
385
|
Possible values are: `PROFILE_UNSPECIFIED`, `PROFILE_COMPATIBLE`, `PROFILE_MODERN`, `PROFILE_RESTRICTED`, `PROFILE_CUSTOM`.
|
378
386
|
"""
|
379
387
|
return pulumi.get(self, "tls_feature_profile")
|
@@ -655,6 +663,7 @@ class TlsInspectionPolicy(pulumi.CustomResource):
|
|
655
663
|
:param pulumi.Input[bool] exclude_public_ca_set: If FALSE (the default), use our default set of public CAs in addition to any CAs specified in trustConfig. These public CAs are currently based on the Mozilla Root Program and are subject to change over time. If TRUE, do not accept our default set of public CAs. Only CAs specified in trustConfig will be accepted.
|
656
664
|
:param pulumi.Input[str] location: The location of the tls inspection policy.
|
657
665
|
:param pulumi.Input[str] min_tls_version: Minimum TLS version that the firewall should use when negotiating connections with both clients and servers. If this is not set, then the default value is to allow the broadest set of clients and servers (TLS 1.0 or higher). Setting this to more restrictive values may improve security, but may also prevent the firewall from connecting to some clients or servers. Note that Secure Web Proxy does not yet honor this field.
|
666
|
+
Default value is `TLS_VERSION_UNSPECIFIED`.
|
658
667
|
Possible values are: `TLS_VERSION_UNSPECIFIED`, `TLS_1_0`, `TLS_1_1`, `TLS_1_2`, `TLS_1_3`.
|
659
668
|
:param pulumi.Input[str] name: Short name of the TlsInspectionPolicy resource to be created.
|
660
669
|
|
@@ -663,6 +672,7 @@ class TlsInspectionPolicy(pulumi.CustomResource):
|
|
663
672
|
:param pulumi.Input[str] project: The ID of the project in which the resource belongs.
|
664
673
|
If it is not provided, the provider project is used.
|
665
674
|
:param pulumi.Input[str] tls_feature_profile: The selected Profile. If this is not set, then the default value is to allow the broadest set of clients and servers (\\"PROFILE_COMPATIBLE\\"). Setting this to more restrictive values may improve security, but may also prevent the TLS inspection proxy from connecting to some clients or servers. Note that Secure Web Proxy does not yet honor this field.
|
675
|
+
Default value is `PROFILE_UNSPECIFIED`.
|
666
676
|
Possible values are: `PROFILE_UNSPECIFIED`, `PROFILE_COMPATIBLE`, `PROFILE_MODERN`, `PROFILE_RESTRICTED`, `PROFILE_CUSTOM`.
|
667
677
|
:param pulumi.Input[str] trust_config: A TrustConfig resource used when making a connection to the TLS server. This is a relative resource path following the form \\"projects/{project}/locations/{location}/trustConfigs/{trust_config}\\". This is necessary to intercept TLS connections to servers with certificates signed by a private CA or self-signed certificates. Trust config and the TLS inspection policy must be in the same region. Note that Secure Web Proxy does not yet honor this field.
|
668
678
|
"""
|
@@ -980,6 +990,7 @@ class TlsInspectionPolicy(pulumi.CustomResource):
|
|
980
990
|
:param pulumi.Input[bool] exclude_public_ca_set: If FALSE (the default), use our default set of public CAs in addition to any CAs specified in trustConfig. These public CAs are currently based on the Mozilla Root Program and are subject to change over time. If TRUE, do not accept our default set of public CAs. Only CAs specified in trustConfig will be accepted.
|
981
991
|
:param pulumi.Input[str] location: The location of the tls inspection policy.
|
982
992
|
:param pulumi.Input[str] min_tls_version: Minimum TLS version that the firewall should use when negotiating connections with both clients and servers. If this is not set, then the default value is to allow the broadest set of clients and servers (TLS 1.0 or higher). Setting this to more restrictive values may improve security, but may also prevent the firewall from connecting to some clients or servers. Note that Secure Web Proxy does not yet honor this field.
|
993
|
+
Default value is `TLS_VERSION_UNSPECIFIED`.
|
983
994
|
Possible values are: `TLS_VERSION_UNSPECIFIED`, `TLS_1_0`, `TLS_1_1`, `TLS_1_2`, `TLS_1_3`.
|
984
995
|
:param pulumi.Input[str] name: Short name of the TlsInspectionPolicy resource to be created.
|
985
996
|
|
@@ -988,6 +999,7 @@ class TlsInspectionPolicy(pulumi.CustomResource):
|
|
988
999
|
:param pulumi.Input[str] project: The ID of the project in which the resource belongs.
|
989
1000
|
If it is not provided, the provider project is used.
|
990
1001
|
:param pulumi.Input[str] tls_feature_profile: The selected Profile. If this is not set, then the default value is to allow the broadest set of clients and servers (\\"PROFILE_COMPATIBLE\\"). Setting this to more restrictive values may improve security, but may also prevent the TLS inspection proxy from connecting to some clients or servers. Note that Secure Web Proxy does not yet honor this field.
|
1002
|
+
Default value is `PROFILE_UNSPECIFIED`.
|
991
1003
|
Possible values are: `PROFILE_UNSPECIFIED`, `PROFILE_COMPATIBLE`, `PROFILE_MODERN`, `PROFILE_RESTRICTED`, `PROFILE_CUSTOM`.
|
992
1004
|
:param pulumi.Input[str] trust_config: A TrustConfig resource used when making a connection to the TLS server. This is a relative resource path following the form \\"projects/{project}/locations/{location}/trustConfigs/{trust_config}\\". This is necessary to intercept TLS connections to servers with certificates signed by a private CA or self-signed certificates. Trust config and the TLS inspection policy must be in the same region. Note that Secure Web Proxy does not yet honor this field.
|
993
1005
|
:param pulumi.Input[str] update_time: The timestamp when the resource was updated.
|
@@ -1063,6 +1075,7 @@ class TlsInspectionPolicy(pulumi.CustomResource):
|
|
1063
1075
|
def min_tls_version(self) -> pulumi.Output[Optional[str]]:
|
1064
1076
|
"""
|
1065
1077
|
Minimum TLS version that the firewall should use when negotiating connections with both clients and servers. If this is not set, then the default value is to allow the broadest set of clients and servers (TLS 1.0 or higher). Setting this to more restrictive values may improve security, but may also prevent the firewall from connecting to some clients or servers. Note that Secure Web Proxy does not yet honor this field.
|
1078
|
+
Default value is `TLS_VERSION_UNSPECIFIED`.
|
1066
1079
|
Possible values are: `TLS_VERSION_UNSPECIFIED`, `TLS_1_0`, `TLS_1_1`, `TLS_1_2`, `TLS_1_3`.
|
1067
1080
|
"""
|
1068
1081
|
return pulumi.get(self, "min_tls_version")
|
@@ -1092,6 +1105,7 @@ class TlsInspectionPolicy(pulumi.CustomResource):
|
|
1092
1105
|
def tls_feature_profile(self) -> pulumi.Output[Optional[str]]:
|
1093
1106
|
"""
|
1094
1107
|
The selected Profile. If this is not set, then the default value is to allow the broadest set of clients and servers (\\"PROFILE_COMPATIBLE\\"). Setting this to more restrictive values may improve security, but may also prevent the TLS inspection proxy from connecting to some clients or servers. Note that Secure Web Proxy does not yet honor this field.
|
1108
|
+
Default value is `PROFILE_UNSPECIFIED`.
|
1095
1109
|
Possible values are: `PROFILE_UNSPECIFIED`, `PROFILE_COMPATIBLE`, `PROFILE_MODERN`, `PROFILE_RESTRICTED`, `PROFILE_CUSTOM`.
|
1096
1110
|
"""
|
1097
1111
|
return pulumi.get(self, "tls_feature_profile")
|