pulumi-gcp 8.27.0a1744872023__py3-none-any.whl → 8.27.0a1744903336__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (76) hide show
  1. pulumi_gcp/__init__.py +80 -0
  2. pulumi_gcp/bigquery/_inputs.py +87 -30
  3. pulumi_gcp/bigquery/outputs.py +58 -20
  4. pulumi_gcp/bigquery/table.py +28 -14
  5. pulumi_gcp/cloudrun/service.py +46 -0
  6. pulumi_gcp/cloudrunv2/get_service.py +12 -1
  7. pulumi_gcp/cloudrunv2/service.py +85 -0
  8. pulumi_gcp/compute/_inputs.py +428 -1
  9. pulumi_gcp/compute/image.py +183 -0
  10. pulumi_gcp/compute/outputs.py +362 -3
  11. pulumi_gcp/compute/region_backend_service.py +6 -2
  12. pulumi_gcp/compute/snapshot.py +6 -0
  13. pulumi_gcp/databasemigrationservice/_inputs.py +27 -24
  14. pulumi_gcp/databasemigrationservice/connection_profile.py +168 -0
  15. pulumi_gcp/databasemigrationservice/migration_job.py +6 -0
  16. pulumi_gcp/databasemigrationservice/outputs.py +18 -15
  17. pulumi_gcp/developerconnect/__init__.py +1 -0
  18. pulumi_gcp/developerconnect/_inputs.py +77 -0
  19. pulumi_gcp/developerconnect/account_connector.py +866 -0
  20. pulumi_gcp/developerconnect/outputs.py +64 -0
  21. pulumi_gcp/firestore/database.py +82 -0
  22. pulumi_gcp/firestore/index.py +263 -7
  23. pulumi_gcp/folder/service_identity.py +0 -26
  24. pulumi_gcp/managedkafka/_inputs.py +6 -6
  25. pulumi_gcp/managedkafka/connect_cluster.py +84 -40
  26. pulumi_gcp/managedkafka/connector.py +98 -44
  27. pulumi_gcp/managedkafka/outputs.py +4 -4
  28. pulumi_gcp/memorystore/_inputs.py +69 -0
  29. pulumi_gcp/memorystore/get_instance.py +34 -1
  30. pulumi_gcp/memorystore/instance.py +140 -0
  31. pulumi_gcp/memorystore/outputs.py +80 -0
  32. pulumi_gcp/ml/engine_model.py +0 -22
  33. pulumi_gcp/monitoring/_inputs.py +37 -19
  34. pulumi_gcp/monitoring/outputs.py +39 -11
  35. pulumi_gcp/monitoring/uptime_check_config.py +8 -0
  36. pulumi_gcp/netapp/_inputs.py +3 -3
  37. pulumi_gcp/netapp/outputs.py +2 -2
  38. pulumi_gcp/networkconnectivity/spoke.py +14 -14
  39. pulumi_gcp/orgpolicy/policy.py +2 -2
  40. pulumi_gcp/osconfig/v2_policy_orchestrator.py +8 -0
  41. pulumi_gcp/osconfig/v2_policy_orchestrator_for_organization.py +8 -0
  42. pulumi_gcp/pubsub/subscription.py +6 -6
  43. pulumi_gcp/pulumi-plugin.json +1 -1
  44. pulumi_gcp/redis/_inputs.py +69 -0
  45. pulumi_gcp/redis/cluster.py +140 -0
  46. pulumi_gcp/redis/outputs.py +40 -0
  47. pulumi_gcp/storage/_inputs.py +111 -0
  48. pulumi_gcp/storage/control_folder_intelligence_config.py +32 -0
  49. pulumi_gcp/storage/control_organization_intelligence_config.py +32 -0
  50. pulumi_gcp/storage/control_project_intelligence_config.py +32 -0
  51. pulumi_gcp/storage/get_control_folder_intelligence_config.py +12 -1
  52. pulumi_gcp/storage/get_control_organization_intelligence_config.py +12 -1
  53. pulumi_gcp/storage/get_control_project_intelligence_config.py +12 -1
  54. pulumi_gcp/storage/outputs.py +174 -0
  55. pulumi_gcp/vertex/__init__.py +12 -0
  56. pulumi_gcp/vertex/_inputs.py +294 -0
  57. pulumi_gcp/vertex/ai_endpoint.py +4 -4
  58. pulumi_gcp/vertex/ai_feature_group.py +1 -1
  59. pulumi_gcp/vertex/ai_feature_group_iam_binding.py +583 -0
  60. pulumi_gcp/vertex/ai_feature_group_iam_member.py +583 -0
  61. pulumi_gcp/vertex/ai_feature_group_iam_policy.py +422 -0
  62. pulumi_gcp/vertex/ai_feature_online_store_featureview.py +26 -27
  63. pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_binding.py +614 -0
  64. pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_member.py +614 -0
  65. pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_policy.py +453 -0
  66. pulumi_gcp/vertex/ai_feature_online_store_iam_binding.py +583 -0
  67. pulumi_gcp/vertex/ai_feature_online_store_iam_member.py +583 -0
  68. pulumi_gcp/vertex/ai_feature_online_store_iam_policy.py +422 -0
  69. pulumi_gcp/vertex/get_ai_feature_group_iam_policy.py +177 -0
  70. pulumi_gcp/vertex/get_ai_feature_online_store_featureview_iam_policy.py +194 -0
  71. pulumi_gcp/vertex/get_ai_feature_online_store_iam_policy.py +177 -0
  72. pulumi_gcp/vertex/outputs.py +168 -0
  73. {pulumi_gcp-8.27.0a1744872023.dist-info → pulumi_gcp-8.27.0a1744903336.dist-info}/METADATA +1 -1
  74. {pulumi_gcp-8.27.0a1744872023.dist-info → pulumi_gcp-8.27.0a1744903336.dist-info}/RECORD +76 -63
  75. {pulumi_gcp-8.27.0a1744872023.dist-info → pulumi_gcp-8.27.0a1744903336.dist-info}/WHEEL +0 -0
  76. {pulumi_gcp-8.27.0a1744872023.dist-info → pulumi_gcp-8.27.0a1744903336.dist-info}/top_level.txt +0 -0
@@ -103,6 +103,9 @@ __all__ = [
103
103
  'ImageShieldedInstanceInitialStateDbx',
104
104
  'ImageShieldedInstanceInitialStateKek',
105
105
  'ImageShieldedInstanceInitialStatePk',
106
+ 'ImageSourceDiskEncryptionKey',
107
+ 'ImageSourceImageEncryptionKey',
108
+ 'ImageSourceSnapshotEncryptionKey',
106
109
  'InstanceAdvancedMachineFeatures',
107
110
  'InstanceAttachedDisk',
108
111
  'InstanceBootDisk',
@@ -8022,6 +8025,306 @@ class ImageShieldedInstanceInitialStatePk(dict):
8022
8025
  return pulumi.get(self, "file_type")
8023
8026
 
8024
8027
 
8028
+ @pulumi.output_type
8029
+ class ImageSourceDiskEncryptionKey(dict):
8030
+ @staticmethod
8031
+ def __key_warning(key: str):
8032
+ suggest = None
8033
+ if key == "kmsKeySelfLink":
8034
+ suggest = "kms_key_self_link"
8035
+ elif key == "kmsKeyServiceAccount":
8036
+ suggest = "kms_key_service_account"
8037
+ elif key == "rawKey":
8038
+ suggest = "raw_key"
8039
+ elif key == "rsaEncryptedKey":
8040
+ suggest = "rsa_encrypted_key"
8041
+
8042
+ if suggest:
8043
+ pulumi.log.warn(f"Key '{key}' not found in ImageSourceDiskEncryptionKey. Access the value via the '{suggest}' property getter instead.")
8044
+
8045
+ def __getitem__(self, key: str) -> Any:
8046
+ ImageSourceDiskEncryptionKey.__key_warning(key)
8047
+ return super().__getitem__(key)
8048
+
8049
+ def get(self, key: str, default = None) -> Any:
8050
+ ImageSourceDiskEncryptionKey.__key_warning(key)
8051
+ return super().get(key, default)
8052
+
8053
+ def __init__(__self__, *,
8054
+ kms_key_self_link: Optional[builtins.str] = None,
8055
+ kms_key_service_account: Optional[builtins.str] = None,
8056
+ raw_key: Optional[builtins.str] = None,
8057
+ rsa_encrypted_key: Optional[builtins.str] = None):
8058
+ """
8059
+ :param builtins.str kms_key_self_link: The self link of the encryption key used to decrypt this resource. Also called KmsKeyName
8060
+ in the cloud console. Your project's Compute Engine System service account
8061
+ (`service-{{PROJECT_NUMBER}}@compute-system.iam.gserviceaccount.com`) must have
8062
+ `roles/cloudkms.cryptoKeyEncrypterDecrypter` to use this feature.
8063
+ See https://cloud.google.com/compute/docs/disks/customer-managed-encryption#encrypt_a_new_persistent_disk_with_your_own_keys
8064
+ :param builtins.str kms_key_service_account: The service account being used for the encryption request for the
8065
+ given KMS key. If absent, the Compute Engine default service
8066
+ account is used.
8067
+ :param builtins.str raw_key: Specifies a 256-bit customer-supplied encryption key, encoded in
8068
+ RFC 4648 base64 to either encrypt or decrypt this resource.
8069
+ **Note**: This property is sensitive and will not be displayed in the plan.
8070
+ :param builtins.str rsa_encrypted_key: Specifies an RFC 4648 base64 encoded, RSA-wrapped 2048-bit
8071
+ customer-supplied encryption key to either encrypt or decrypt
8072
+ this resource. You can provide either the rawKey or the rsaEncryptedKey.
8073
+ **Note**: This property is sensitive and will not be displayed in the plan.
8074
+ """
8075
+ if kms_key_self_link is not None:
8076
+ pulumi.set(__self__, "kms_key_self_link", kms_key_self_link)
8077
+ if kms_key_service_account is not None:
8078
+ pulumi.set(__self__, "kms_key_service_account", kms_key_service_account)
8079
+ if raw_key is not None:
8080
+ pulumi.set(__self__, "raw_key", raw_key)
8081
+ if rsa_encrypted_key is not None:
8082
+ pulumi.set(__self__, "rsa_encrypted_key", rsa_encrypted_key)
8083
+
8084
+ @property
8085
+ @pulumi.getter(name="kmsKeySelfLink")
8086
+ def kms_key_self_link(self) -> Optional[builtins.str]:
8087
+ """
8088
+ The self link of the encryption key used to decrypt this resource. Also called KmsKeyName
8089
+ in the cloud console. Your project's Compute Engine System service account
8090
+ (`service-{{PROJECT_NUMBER}}@compute-system.iam.gserviceaccount.com`) must have
8091
+ `roles/cloudkms.cryptoKeyEncrypterDecrypter` to use this feature.
8092
+ See https://cloud.google.com/compute/docs/disks/customer-managed-encryption#encrypt_a_new_persistent_disk_with_your_own_keys
8093
+ """
8094
+ return pulumi.get(self, "kms_key_self_link")
8095
+
8096
+ @property
8097
+ @pulumi.getter(name="kmsKeyServiceAccount")
8098
+ def kms_key_service_account(self) -> Optional[builtins.str]:
8099
+ """
8100
+ The service account being used for the encryption request for the
8101
+ given KMS key. If absent, the Compute Engine default service
8102
+ account is used.
8103
+ """
8104
+ return pulumi.get(self, "kms_key_service_account")
8105
+
8106
+ @property
8107
+ @pulumi.getter(name="rawKey")
8108
+ def raw_key(self) -> Optional[builtins.str]:
8109
+ """
8110
+ Specifies a 256-bit customer-supplied encryption key, encoded in
8111
+ RFC 4648 base64 to either encrypt or decrypt this resource.
8112
+ **Note**: This property is sensitive and will not be displayed in the plan.
8113
+ """
8114
+ return pulumi.get(self, "raw_key")
8115
+
8116
+ @property
8117
+ @pulumi.getter(name="rsaEncryptedKey")
8118
+ def rsa_encrypted_key(self) -> Optional[builtins.str]:
8119
+ """
8120
+ Specifies an RFC 4648 base64 encoded, RSA-wrapped 2048-bit
8121
+ customer-supplied encryption key to either encrypt or decrypt
8122
+ this resource. You can provide either the rawKey or the rsaEncryptedKey.
8123
+ **Note**: This property is sensitive and will not be displayed in the plan.
8124
+ """
8125
+ return pulumi.get(self, "rsa_encrypted_key")
8126
+
8127
+
8128
+ @pulumi.output_type
8129
+ class ImageSourceImageEncryptionKey(dict):
8130
+ @staticmethod
8131
+ def __key_warning(key: str):
8132
+ suggest = None
8133
+ if key == "kmsKeySelfLink":
8134
+ suggest = "kms_key_self_link"
8135
+ elif key == "kmsKeyServiceAccount":
8136
+ suggest = "kms_key_service_account"
8137
+ elif key == "rawKey":
8138
+ suggest = "raw_key"
8139
+ elif key == "rsaEncryptedKey":
8140
+ suggest = "rsa_encrypted_key"
8141
+
8142
+ if suggest:
8143
+ pulumi.log.warn(f"Key '{key}' not found in ImageSourceImageEncryptionKey. Access the value via the '{suggest}' property getter instead.")
8144
+
8145
+ def __getitem__(self, key: str) -> Any:
8146
+ ImageSourceImageEncryptionKey.__key_warning(key)
8147
+ return super().__getitem__(key)
8148
+
8149
+ def get(self, key: str, default = None) -> Any:
8150
+ ImageSourceImageEncryptionKey.__key_warning(key)
8151
+ return super().get(key, default)
8152
+
8153
+ def __init__(__self__, *,
8154
+ kms_key_self_link: Optional[builtins.str] = None,
8155
+ kms_key_service_account: Optional[builtins.str] = None,
8156
+ raw_key: Optional[builtins.str] = None,
8157
+ rsa_encrypted_key: Optional[builtins.str] = None):
8158
+ """
8159
+ :param builtins.str kms_key_self_link: The self link of the encryption key used to decrypt this resource. Also called KmsKeyName
8160
+ in the cloud console. Your project's Compute Engine System service account
8161
+ (`service-{{PROJECT_NUMBER}}@compute-system.iam.gserviceaccount.com`) must have
8162
+ `roles/cloudkms.cryptoKeyEncrypterDecrypter` to use this feature.
8163
+ See https://cloud.google.com/compute/docs/disks/customer-managed-encryption#encrypt_a_new_persistent_disk_with_your_own_keys
8164
+ :param builtins.str kms_key_service_account: The service account being used for the encryption request for the
8165
+ given KMS key. If absent, the Compute Engine default service
8166
+ account is used.
8167
+ :param builtins.str raw_key: Specifies a 256-bit customer-supplied encryption key, encoded in
8168
+ RFC 4648 base64 to either encrypt or decrypt this resource.
8169
+ **Note**: This property is sensitive and will not be displayed in the plan.
8170
+ :param builtins.str rsa_encrypted_key: Specifies an RFC 4648 base64 encoded, RSA-wrapped 2048-bit
8171
+ customer-supplied encryption key to either encrypt or decrypt
8172
+ this resource. You can provide either the rawKey or the rsaEncryptedKey.
8173
+ **Note**: This property is sensitive and will not be displayed in the plan.
8174
+ """
8175
+ if kms_key_self_link is not None:
8176
+ pulumi.set(__self__, "kms_key_self_link", kms_key_self_link)
8177
+ if kms_key_service_account is not None:
8178
+ pulumi.set(__self__, "kms_key_service_account", kms_key_service_account)
8179
+ if raw_key is not None:
8180
+ pulumi.set(__self__, "raw_key", raw_key)
8181
+ if rsa_encrypted_key is not None:
8182
+ pulumi.set(__self__, "rsa_encrypted_key", rsa_encrypted_key)
8183
+
8184
+ @property
8185
+ @pulumi.getter(name="kmsKeySelfLink")
8186
+ def kms_key_self_link(self) -> Optional[builtins.str]:
8187
+ """
8188
+ The self link of the encryption key used to decrypt this resource. Also called KmsKeyName
8189
+ in the cloud console. Your project's Compute Engine System service account
8190
+ (`service-{{PROJECT_NUMBER}}@compute-system.iam.gserviceaccount.com`) must have
8191
+ `roles/cloudkms.cryptoKeyEncrypterDecrypter` to use this feature.
8192
+ See https://cloud.google.com/compute/docs/disks/customer-managed-encryption#encrypt_a_new_persistent_disk_with_your_own_keys
8193
+ """
8194
+ return pulumi.get(self, "kms_key_self_link")
8195
+
8196
+ @property
8197
+ @pulumi.getter(name="kmsKeyServiceAccount")
8198
+ def kms_key_service_account(self) -> Optional[builtins.str]:
8199
+ """
8200
+ The service account being used for the encryption request for the
8201
+ given KMS key. If absent, the Compute Engine default service
8202
+ account is used.
8203
+ """
8204
+ return pulumi.get(self, "kms_key_service_account")
8205
+
8206
+ @property
8207
+ @pulumi.getter(name="rawKey")
8208
+ def raw_key(self) -> Optional[builtins.str]:
8209
+ """
8210
+ Specifies a 256-bit customer-supplied encryption key, encoded in
8211
+ RFC 4648 base64 to either encrypt or decrypt this resource.
8212
+ **Note**: This property is sensitive and will not be displayed in the plan.
8213
+ """
8214
+ return pulumi.get(self, "raw_key")
8215
+
8216
+ @property
8217
+ @pulumi.getter(name="rsaEncryptedKey")
8218
+ def rsa_encrypted_key(self) -> Optional[builtins.str]:
8219
+ """
8220
+ Specifies an RFC 4648 base64 encoded, RSA-wrapped 2048-bit
8221
+ customer-supplied encryption key to either encrypt or decrypt
8222
+ this resource. You can provide either the rawKey or the rsaEncryptedKey.
8223
+ **Note**: This property is sensitive and will not be displayed in the plan.
8224
+ """
8225
+ return pulumi.get(self, "rsa_encrypted_key")
8226
+
8227
+
8228
+ @pulumi.output_type
8229
+ class ImageSourceSnapshotEncryptionKey(dict):
8230
+ @staticmethod
8231
+ def __key_warning(key: str):
8232
+ suggest = None
8233
+ if key == "kmsKeySelfLink":
8234
+ suggest = "kms_key_self_link"
8235
+ elif key == "kmsKeyServiceAccount":
8236
+ suggest = "kms_key_service_account"
8237
+ elif key == "rawKey":
8238
+ suggest = "raw_key"
8239
+ elif key == "rsaEncryptedKey":
8240
+ suggest = "rsa_encrypted_key"
8241
+
8242
+ if suggest:
8243
+ pulumi.log.warn(f"Key '{key}' not found in ImageSourceSnapshotEncryptionKey. Access the value via the '{suggest}' property getter instead.")
8244
+
8245
+ def __getitem__(self, key: str) -> Any:
8246
+ ImageSourceSnapshotEncryptionKey.__key_warning(key)
8247
+ return super().__getitem__(key)
8248
+
8249
+ def get(self, key: str, default = None) -> Any:
8250
+ ImageSourceSnapshotEncryptionKey.__key_warning(key)
8251
+ return super().get(key, default)
8252
+
8253
+ def __init__(__self__, *,
8254
+ kms_key_self_link: Optional[builtins.str] = None,
8255
+ kms_key_service_account: Optional[builtins.str] = None,
8256
+ raw_key: Optional[builtins.str] = None,
8257
+ rsa_encrypted_key: Optional[builtins.str] = None):
8258
+ """
8259
+ :param builtins.str kms_key_self_link: The self link of the encryption key used to decrypt this resource. Also called KmsKeyName
8260
+ in the cloud console. Your project's Compute Engine System service account
8261
+ (`service-{{PROJECT_NUMBER}}@compute-system.iam.gserviceaccount.com`) must have
8262
+ `roles/cloudkms.cryptoKeyEncrypterDecrypter` to use this feature.
8263
+ See https://cloud.google.com/compute/docs/disks/customer-managed-encryption#encrypt_a_new_persistent_disk_with_your_own_keys
8264
+ :param builtins.str kms_key_service_account: The service account being used for the encryption request for the
8265
+ given KMS key. If absent, the Compute Engine default service
8266
+ account is used.
8267
+ :param builtins.str raw_key: Specifies a 256-bit customer-supplied encryption key, encoded in
8268
+ RFC 4648 base64 to either encrypt or decrypt this resource.
8269
+ **Note**: This property is sensitive and will not be displayed in the plan.
8270
+ :param builtins.str rsa_encrypted_key: Specifies an RFC 4648 base64 encoded, RSA-wrapped 2048-bit
8271
+ customer-supplied encryption key to either encrypt or decrypt
8272
+ this resource. You can provide either the rawKey or the rsaEncryptedKey.
8273
+ **Note**: This property is sensitive and will not be displayed in the plan.
8274
+ """
8275
+ if kms_key_self_link is not None:
8276
+ pulumi.set(__self__, "kms_key_self_link", kms_key_self_link)
8277
+ if kms_key_service_account is not None:
8278
+ pulumi.set(__self__, "kms_key_service_account", kms_key_service_account)
8279
+ if raw_key is not None:
8280
+ pulumi.set(__self__, "raw_key", raw_key)
8281
+ if rsa_encrypted_key is not None:
8282
+ pulumi.set(__self__, "rsa_encrypted_key", rsa_encrypted_key)
8283
+
8284
+ @property
8285
+ @pulumi.getter(name="kmsKeySelfLink")
8286
+ def kms_key_self_link(self) -> Optional[builtins.str]:
8287
+ """
8288
+ The self link of the encryption key used to decrypt this resource. Also called KmsKeyName
8289
+ in the cloud console. Your project's Compute Engine System service account
8290
+ (`service-{{PROJECT_NUMBER}}@compute-system.iam.gserviceaccount.com`) must have
8291
+ `roles/cloudkms.cryptoKeyEncrypterDecrypter` to use this feature.
8292
+ See https://cloud.google.com/compute/docs/disks/customer-managed-encryption#encrypt_a_new_persistent_disk_with_your_own_keys
8293
+ """
8294
+ return pulumi.get(self, "kms_key_self_link")
8295
+
8296
+ @property
8297
+ @pulumi.getter(name="kmsKeyServiceAccount")
8298
+ def kms_key_service_account(self) -> Optional[builtins.str]:
8299
+ """
8300
+ The service account being used for the encryption request for the
8301
+ given KMS key. If absent, the Compute Engine default service
8302
+ account is used.
8303
+ """
8304
+ return pulumi.get(self, "kms_key_service_account")
8305
+
8306
+ @property
8307
+ @pulumi.getter(name="rawKey")
8308
+ def raw_key(self) -> Optional[builtins.str]:
8309
+ """
8310
+ Specifies a 256-bit customer-supplied encryption key, encoded in
8311
+ RFC 4648 base64 to either encrypt or decrypt this resource.
8312
+ **Note**: This property is sensitive and will not be displayed in the plan.
8313
+ """
8314
+ return pulumi.get(self, "raw_key")
8315
+
8316
+ @property
8317
+ @pulumi.getter(name="rsaEncryptedKey")
8318
+ def rsa_encrypted_key(self) -> Optional[builtins.str]:
8319
+ """
8320
+ Specifies an RFC 4648 base64 encoded, RSA-wrapped 2048-bit
8321
+ customer-supplied encryption key to either encrypt or decrypt
8322
+ this resource. You can provide either the rawKey or the rsaEncryptedKey.
8323
+ **Note**: This property is sensitive and will not be displayed in the plan.
8324
+ """
8325
+ return pulumi.get(self, "rsa_encrypted_key")
8326
+
8327
+
8025
8328
  @pulumi.output_type
8026
8329
  class InstanceAdvancedMachineFeatures(dict):
8027
8330
  @staticmethod
@@ -44880,10 +45183,14 @@ class SnapshotSourceDiskEncryptionKey(dict):
44880
45183
  @staticmethod
44881
45184
  def __key_warning(key: str):
44882
45185
  suggest = None
44883
- if key == "kmsKeyServiceAccount":
45186
+ if key == "kmsKeySelfLink":
45187
+ suggest = "kms_key_self_link"
45188
+ elif key == "kmsKeyServiceAccount":
44884
45189
  suggest = "kms_key_service_account"
44885
45190
  elif key == "rawKey":
44886
45191
  suggest = "raw_key"
45192
+ elif key == "rsaEncryptedKey":
45193
+ suggest = "rsa_encrypted_key"
44887
45194
 
44888
45195
  if suggest:
44889
45196
  pulumi.log.warn(f"Key '{key}' not found in SnapshotSourceDiskEncryptionKey. Access the value via the '{suggest}' property getter instead.")
@@ -44897,19 +45204,37 @@ class SnapshotSourceDiskEncryptionKey(dict):
44897
45204
  return super().get(key, default)
44898
45205
 
44899
45206
  def __init__(__self__, *,
45207
+ kms_key_self_link: Optional[builtins.str] = None,
44900
45208
  kms_key_service_account: Optional[builtins.str] = None,
44901
- raw_key: Optional[builtins.str] = None):
45209
+ raw_key: Optional[builtins.str] = None,
45210
+ rsa_encrypted_key: Optional[builtins.str] = None):
44902
45211
  """
45212
+ :param builtins.str kms_key_self_link: The name of the encryption key that is stored in Google Cloud KMS.
44903
45213
  :param builtins.str kms_key_service_account: The service account used for the encryption request for the given KMS key.
44904
45214
  If absent, the Compute Engine Service Agent service account is used.
44905
45215
  :param builtins.str raw_key: Specifies a 256-bit customer-supplied encryption key, encoded in
44906
45216
  RFC 4648 base64 to either encrypt or decrypt this resource.
44907
45217
  **Note**: This property is sensitive and will not be displayed in the plan.
45218
+ :param builtins.str rsa_encrypted_key: Specifies an encryption key stored in Google Cloud KMS, encoded in
45219
+ RFC 4648 base64 to either encrypt or decrypt this resource.
45220
+ **Note**: This property is sensitive and will not be displayed in the plan.
44908
45221
  """
45222
+ if kms_key_self_link is not None:
45223
+ pulumi.set(__self__, "kms_key_self_link", kms_key_self_link)
44909
45224
  if kms_key_service_account is not None:
44910
45225
  pulumi.set(__self__, "kms_key_service_account", kms_key_service_account)
44911
45226
  if raw_key is not None:
44912
45227
  pulumi.set(__self__, "raw_key", raw_key)
45228
+ if rsa_encrypted_key is not None:
45229
+ pulumi.set(__self__, "rsa_encrypted_key", rsa_encrypted_key)
45230
+
45231
+ @property
45232
+ @pulumi.getter(name="kmsKeySelfLink")
45233
+ def kms_key_self_link(self) -> Optional[builtins.str]:
45234
+ """
45235
+ The name of the encryption key that is stored in Google Cloud KMS.
45236
+ """
45237
+ return pulumi.get(self, "kms_key_self_link")
44913
45238
 
44914
45239
  @property
44915
45240
  @pulumi.getter(name="kmsKeyServiceAccount")
@@ -44930,6 +45255,16 @@ class SnapshotSourceDiskEncryptionKey(dict):
44930
45255
  """
44931
45256
  return pulumi.get(self, "raw_key")
44932
45257
 
45258
+ @property
45259
+ @pulumi.getter(name="rsaEncryptedKey")
45260
+ def rsa_encrypted_key(self) -> Optional[builtins.str]:
45261
+ """
45262
+ Specifies an encryption key stored in Google Cloud KMS, encoded in
45263
+ RFC 4648 base64 to either encrypt or decrypt this resource.
45264
+ **Note**: This property is sensitive and will not be displayed in the plan.
45265
+ """
45266
+ return pulumi.get(self, "rsa_encrypted_key")
45267
+
44933
45268
 
44934
45269
  @pulumi.output_type
44935
45270
  class SubnetworkIAMBindingCondition(dict):
@@ -67945,16 +68280,31 @@ class GetSnapshotSnapshotEncryptionKeyResult(dict):
67945
68280
  @pulumi.output_type
67946
68281
  class GetSnapshotSourceDiskEncryptionKeyResult(dict):
67947
68282
  def __init__(__self__, *,
68283
+ kms_key_self_link: builtins.str,
67948
68284
  kms_key_service_account: builtins.str,
67949
- raw_key: builtins.str):
68285
+ raw_key: builtins.str,
68286
+ rsa_encrypted_key: builtins.str):
67950
68287
  """
68288
+ :param builtins.str kms_key_self_link: The name of the encryption key that is stored in Google Cloud KMS.
67951
68289
  :param builtins.str kms_key_service_account: The service account used for the encryption request for the given KMS key.
67952
68290
  If absent, the Compute Engine Service Agent service account is used.
67953
68291
  :param builtins.str raw_key: Specifies a 256-bit customer-supplied encryption key, encoded in
67954
68292
  RFC 4648 base64 to either encrypt or decrypt this resource.
68293
+ :param builtins.str rsa_encrypted_key: Specifies an encryption key stored in Google Cloud KMS, encoded in
68294
+ RFC 4648 base64 to either encrypt or decrypt this resource.
67955
68295
  """
68296
+ pulumi.set(__self__, "kms_key_self_link", kms_key_self_link)
67956
68297
  pulumi.set(__self__, "kms_key_service_account", kms_key_service_account)
67957
68298
  pulumi.set(__self__, "raw_key", raw_key)
68299
+ pulumi.set(__self__, "rsa_encrypted_key", rsa_encrypted_key)
68300
+
68301
+ @property
68302
+ @pulumi.getter(name="kmsKeySelfLink")
68303
+ def kms_key_self_link(self) -> builtins.str:
68304
+ """
68305
+ The name of the encryption key that is stored in Google Cloud KMS.
68306
+ """
68307
+ return pulumi.get(self, "kms_key_self_link")
67958
68308
 
67959
68309
  @property
67960
68310
  @pulumi.getter(name="kmsKeyServiceAccount")
@@ -67974,6 +68324,15 @@ class GetSnapshotSourceDiskEncryptionKeyResult(dict):
67974
68324
  """
67975
68325
  return pulumi.get(self, "raw_key")
67976
68326
 
68327
+ @property
68328
+ @pulumi.getter(name="rsaEncryptedKey")
68329
+ def rsa_encrypted_key(self) -> builtins.str:
68330
+ """
68331
+ Specifies an encryption key stored in Google Cloud KMS, encoded in
68332
+ RFC 4648 base64 to either encrypt or decrypt this resource.
68333
+ """
68334
+ return pulumi.get(self, "rsa_encrypted_key")
68335
+
67977
68336
 
67978
68337
  @pulumi.output_type
67979
68338
  class GetSubnetworkSecondaryIpRangeResult(dict):
@@ -1536,6 +1536,9 @@ class RegionBackendService(pulumi.CustomResource):
1536
1536
  A Region Backend Service defines a regionally-scoped group of virtual
1537
1537
  machines that will serve traffic for load balancing.
1538
1538
 
1539
+ > **Note:** Recreating a `compute.RegionBackendService` that references other dependent resources like `compute.InstanceGroup` will give a `resourceInUseByAnotherResource` error, when decreasing the number of other dependent resources.
1540
+ Use `lifecycle.create_before_destroy` on the dependent resources to avoid this type of error as shown in the Dynamic Backend Count example.
1541
+
1539
1542
  To get more information about RegionBackendService, see:
1540
1543
 
1541
1544
  * [API documentation](https://cloud.google.com/compute/docs/reference/latest/regionBackendServices)
@@ -1882,7 +1885,6 @@ class RegionBackendService(pulumi.CustomResource):
1882
1885
  ],
1883
1886
  }])
1884
1887
  ```
1885
-
1886
1888
  ## Import
1887
1889
 
1888
1890
  RegionBackendService can be imported using any of these accepted formats:
@@ -2072,6 +2074,9 @@ class RegionBackendService(pulumi.CustomResource):
2072
2074
  A Region Backend Service defines a regionally-scoped group of virtual
2073
2075
  machines that will serve traffic for load balancing.
2074
2076
 
2077
+ > **Note:** Recreating a `compute.RegionBackendService` that references other dependent resources like `compute.InstanceGroup` will give a `resourceInUseByAnotherResource` error, when decreasing the number of other dependent resources.
2078
+ Use `lifecycle.create_before_destroy` on the dependent resources to avoid this type of error as shown in the Dynamic Backend Count example.
2079
+
2075
2080
  To get more information about RegionBackendService, see:
2076
2081
 
2077
2082
  * [API documentation](https://cloud.google.com/compute/docs/reference/latest/regionBackendServices)
@@ -2418,7 +2423,6 @@ class RegionBackendService(pulumi.CustomResource):
2418
2423
  ],
2419
2424
  }])
2420
2425
  ```
2421
-
2422
2426
  ## Import
2423
2427
 
2424
2428
  RegionBackendService can be imported using any of these accepted formats:
@@ -668,6 +668,9 @@ class Snapshot(pulumi.CustomResource):
668
668
  * How-to Guides
669
669
  * [Official Documentation](https://cloud.google.com/compute/docs/disks/create-snapshots)
670
670
 
671
+ > **Warning:** All arguments including the following potentially sensitive
672
+ values will be stored in the raw state as plain text: `snapshot_encryption_key.raw_key`, `snapshot_encryption_key.rsa_encrypted_key`, `source_disk_encryption_key.raw_key`, `source_disk_encryption_key.rsa_encrypted_key`.
673
+
671
674
  ## Example Usage
672
675
 
673
676
  ### Snapshot Basic
@@ -811,6 +814,9 @@ class Snapshot(pulumi.CustomResource):
811
814
  * How-to Guides
812
815
  * [Official Documentation](https://cloud.google.com/compute/docs/disks/create-snapshots)
813
816
 
817
+ > **Warning:** All arguments including the following potentially sensitive
818
+ values will be stored in the raw state as plain text: `snapshot_encryption_key.raw_key`, `snapshot_encryption_key.rsa_encrypted_key`, `source_disk_encryption_key.raw_key`, `source_disk_encryption_key.rsa_encrypted_key`.
819
+
814
820
  ## Example Usage
815
821
 
816
822
  ### Snapshot Basic
@@ -1370,9 +1370,9 @@ class ConnectionProfileMysqlArgs:
1370
1370
 
1371
1371
  if not MYPY:
1372
1372
  class ConnectionProfileMysqlSslArgsDict(TypedDict):
1373
- ca_certificate: pulumi.Input[builtins.str]
1373
+ ca_certificate: NotRequired[pulumi.Input[builtins.str]]
1374
1374
  """
1375
- Required. Input only. The x509 PEM-encoded certificate of the CA that signed the source database server's certificate.
1375
+ Input only. The x509 PEM-encoded certificate of the CA that signed the source database server's certificate.
1376
1376
  The replica will use this certificate to verify it's connecting to the right host.
1377
1377
  **Note**: This property is sensitive and will not be displayed in the plan.
1378
1378
  """
@@ -1399,12 +1399,12 @@ elif False:
1399
1399
  @pulumi.input_type
1400
1400
  class ConnectionProfileMysqlSslArgs:
1401
1401
  def __init__(__self__, *,
1402
- ca_certificate: pulumi.Input[builtins.str],
1402
+ ca_certificate: Optional[pulumi.Input[builtins.str]] = None,
1403
1403
  client_certificate: Optional[pulumi.Input[builtins.str]] = None,
1404
1404
  client_key: Optional[pulumi.Input[builtins.str]] = None,
1405
1405
  type: Optional[pulumi.Input[builtins.str]] = None):
1406
1406
  """
1407
- :param pulumi.Input[builtins.str] ca_certificate: Required. Input only. The x509 PEM-encoded certificate of the CA that signed the source database server's certificate.
1407
+ :param pulumi.Input[builtins.str] ca_certificate: Input only. The x509 PEM-encoded certificate of the CA that signed the source database server's certificate.
1408
1408
  The replica will use this certificate to verify it's connecting to the right host.
1409
1409
  **Note**: This property is sensitive and will not be displayed in the plan.
1410
1410
  :param pulumi.Input[builtins.str] client_certificate: Input only. The x509 PEM-encoded certificate that will be used by the replica to authenticate against the source database server.
@@ -1416,7 +1416,8 @@ class ConnectionProfileMysqlSslArgs:
1416
1416
  :param pulumi.Input[builtins.str] type: (Output)
1417
1417
  The current connection profile state.
1418
1418
  """
1419
- pulumi.set(__self__, "ca_certificate", ca_certificate)
1419
+ if ca_certificate is not None:
1420
+ pulumi.set(__self__, "ca_certificate", ca_certificate)
1420
1421
  if client_certificate is not None:
1421
1422
  pulumi.set(__self__, "client_certificate", client_certificate)
1422
1423
  if client_key is not None:
@@ -1426,16 +1427,16 @@ class ConnectionProfileMysqlSslArgs:
1426
1427
 
1427
1428
  @property
1428
1429
  @pulumi.getter(name="caCertificate")
1429
- def ca_certificate(self) -> pulumi.Input[builtins.str]:
1430
+ def ca_certificate(self) -> Optional[pulumi.Input[builtins.str]]:
1430
1431
  """
1431
- Required. Input only. The x509 PEM-encoded certificate of the CA that signed the source database server's certificate.
1432
+ Input only. The x509 PEM-encoded certificate of the CA that signed the source database server's certificate.
1432
1433
  The replica will use this certificate to verify it's connecting to the right host.
1433
1434
  **Note**: This property is sensitive and will not be displayed in the plan.
1434
1435
  """
1435
1436
  return pulumi.get(self, "ca_certificate")
1436
1437
 
1437
1438
  @ca_certificate.setter
1438
- def ca_certificate(self, value: pulumi.Input[builtins.str]):
1439
+ def ca_certificate(self, value: Optional[pulumi.Input[builtins.str]]):
1439
1440
  pulumi.set(self, "ca_certificate", value)
1440
1441
 
1441
1442
  @property
@@ -1856,9 +1857,9 @@ class ConnectionProfileOraclePrivateConnectivityArgs:
1856
1857
 
1857
1858
  if not MYPY:
1858
1859
  class ConnectionProfileOracleSslArgsDict(TypedDict):
1859
- ca_certificate: pulumi.Input[builtins.str]
1860
+ ca_certificate: NotRequired[pulumi.Input[builtins.str]]
1860
1861
  """
1861
- Required. Input only. The x509 PEM-encoded certificate of the CA that signed the source database server's certificate.
1862
+ Input only. The x509 PEM-encoded certificate of the CA that signed the source database server's certificate.
1862
1863
  The replica will use this certificate to verify it's connecting to the right host.
1863
1864
  **Note**: This property is sensitive and will not be displayed in the plan.
1864
1865
  """
@@ -1885,12 +1886,12 @@ elif False:
1885
1886
  @pulumi.input_type
1886
1887
  class ConnectionProfileOracleSslArgs:
1887
1888
  def __init__(__self__, *,
1888
- ca_certificate: pulumi.Input[builtins.str],
1889
+ ca_certificate: Optional[pulumi.Input[builtins.str]] = None,
1889
1890
  client_certificate: Optional[pulumi.Input[builtins.str]] = None,
1890
1891
  client_key: Optional[pulumi.Input[builtins.str]] = None,
1891
1892
  type: Optional[pulumi.Input[builtins.str]] = None):
1892
1893
  """
1893
- :param pulumi.Input[builtins.str] ca_certificate: Required. Input only. The x509 PEM-encoded certificate of the CA that signed the source database server's certificate.
1894
+ :param pulumi.Input[builtins.str] ca_certificate: Input only. The x509 PEM-encoded certificate of the CA that signed the source database server's certificate.
1894
1895
  The replica will use this certificate to verify it's connecting to the right host.
1895
1896
  **Note**: This property is sensitive and will not be displayed in the plan.
1896
1897
  :param pulumi.Input[builtins.str] client_certificate: Input only. The x509 PEM-encoded certificate that will be used by the replica to authenticate against the source database server.
@@ -1902,7 +1903,8 @@ class ConnectionProfileOracleSslArgs:
1902
1903
  :param pulumi.Input[builtins.str] type: (Output)
1903
1904
  The current connection profile state.
1904
1905
  """
1905
- pulumi.set(__self__, "ca_certificate", ca_certificate)
1906
+ if ca_certificate is not None:
1907
+ pulumi.set(__self__, "ca_certificate", ca_certificate)
1906
1908
  if client_certificate is not None:
1907
1909
  pulumi.set(__self__, "client_certificate", client_certificate)
1908
1910
  if client_key is not None:
@@ -1912,16 +1914,16 @@ class ConnectionProfileOracleSslArgs:
1912
1914
 
1913
1915
  @property
1914
1916
  @pulumi.getter(name="caCertificate")
1915
- def ca_certificate(self) -> pulumi.Input[builtins.str]:
1917
+ def ca_certificate(self) -> Optional[pulumi.Input[builtins.str]]:
1916
1918
  """
1917
- Required. Input only. The x509 PEM-encoded certificate of the CA that signed the source database server's certificate.
1919
+ Input only. The x509 PEM-encoded certificate of the CA that signed the source database server's certificate.
1918
1920
  The replica will use this certificate to verify it's connecting to the right host.
1919
1921
  **Note**: This property is sensitive and will not be displayed in the plan.
1920
1922
  """
1921
1923
  return pulumi.get(self, "ca_certificate")
1922
1924
 
1923
1925
  @ca_certificate.setter
1924
- def ca_certificate(self, value: pulumi.Input[builtins.str]):
1926
+ def ca_certificate(self, value: Optional[pulumi.Input[builtins.str]]):
1925
1927
  pulumi.set(self, "ca_certificate", value)
1926
1928
 
1927
1929
  @property
@@ -2187,9 +2189,9 @@ class ConnectionProfilePostgresqlArgs:
2187
2189
 
2188
2190
  if not MYPY:
2189
2191
  class ConnectionProfilePostgresqlSslArgsDict(TypedDict):
2190
- ca_certificate: pulumi.Input[builtins.str]
2192
+ ca_certificate: NotRequired[pulumi.Input[builtins.str]]
2191
2193
  """
2192
- Required. Input only. The x509 PEM-encoded certificate of the CA that signed the source database server's certificate.
2194
+ Input only. The x509 PEM-encoded certificate of the CA that signed the source database server's certificate.
2193
2195
  The replica will use this certificate to verify it's connecting to the right host.
2194
2196
  **Note**: This property is sensitive and will not be displayed in the plan.
2195
2197
  """
@@ -2216,12 +2218,12 @@ elif False:
2216
2218
  @pulumi.input_type
2217
2219
  class ConnectionProfilePostgresqlSslArgs:
2218
2220
  def __init__(__self__, *,
2219
- ca_certificate: pulumi.Input[builtins.str],
2221
+ ca_certificate: Optional[pulumi.Input[builtins.str]] = None,
2220
2222
  client_certificate: Optional[pulumi.Input[builtins.str]] = None,
2221
2223
  client_key: Optional[pulumi.Input[builtins.str]] = None,
2222
2224
  type: Optional[pulumi.Input[builtins.str]] = None):
2223
2225
  """
2224
- :param pulumi.Input[builtins.str] ca_certificate: Required. Input only. The x509 PEM-encoded certificate of the CA that signed the source database server's certificate.
2226
+ :param pulumi.Input[builtins.str] ca_certificate: Input only. The x509 PEM-encoded certificate of the CA that signed the source database server's certificate.
2225
2227
  The replica will use this certificate to verify it's connecting to the right host.
2226
2228
  **Note**: This property is sensitive and will not be displayed in the plan.
2227
2229
  :param pulumi.Input[builtins.str] client_certificate: Input only. The x509 PEM-encoded certificate that will be used by the replica to authenticate against the source database server.
@@ -2233,7 +2235,8 @@ class ConnectionProfilePostgresqlSslArgs:
2233
2235
  :param pulumi.Input[builtins.str] type: (Output)
2234
2236
  The current connection profile state.
2235
2237
  """
2236
- pulumi.set(__self__, "ca_certificate", ca_certificate)
2238
+ if ca_certificate is not None:
2239
+ pulumi.set(__self__, "ca_certificate", ca_certificate)
2237
2240
  if client_certificate is not None:
2238
2241
  pulumi.set(__self__, "client_certificate", client_certificate)
2239
2242
  if client_key is not None:
@@ -2243,16 +2246,16 @@ class ConnectionProfilePostgresqlSslArgs:
2243
2246
 
2244
2247
  @property
2245
2248
  @pulumi.getter(name="caCertificate")
2246
- def ca_certificate(self) -> pulumi.Input[builtins.str]:
2249
+ def ca_certificate(self) -> Optional[pulumi.Input[builtins.str]]:
2247
2250
  """
2248
- Required. Input only. The x509 PEM-encoded certificate of the CA that signed the source database server's certificate.
2251
+ Input only. The x509 PEM-encoded certificate of the CA that signed the source database server's certificate.
2249
2252
  The replica will use this certificate to verify it's connecting to the right host.
2250
2253
  **Note**: This property is sensitive and will not be displayed in the plan.
2251
2254
  """
2252
2255
  return pulumi.get(self, "ca_certificate")
2253
2256
 
2254
2257
  @ca_certificate.setter
2255
- def ca_certificate(self, value: pulumi.Input[builtins.str]):
2258
+ def ca_certificate(self, value: Optional[pulumi.Input[builtins.str]]):
2256
2259
  pulumi.set(self, "ca_certificate", value)
2257
2260
 
2258
2261
  @property