pulumi-gcp 8.27.0a1744872023__py3-none-any.whl → 8.27.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +80 -0
- pulumi_gcp/bigquery/_inputs.py +87 -30
- pulumi_gcp/bigquery/outputs.py +58 -20
- pulumi_gcp/bigquery/table.py +28 -14
- pulumi_gcp/cloudrun/service.py +46 -0
- pulumi_gcp/cloudrunv2/get_service.py +12 -1
- pulumi_gcp/cloudrunv2/service.py +85 -0
- pulumi_gcp/compute/_inputs.py +428 -1
- pulumi_gcp/compute/image.py +183 -0
- pulumi_gcp/compute/outputs.py +362 -3
- pulumi_gcp/compute/region_backend_service.py +6 -2
- pulumi_gcp/compute/snapshot.py +6 -0
- pulumi_gcp/databasemigrationservice/_inputs.py +27 -24
- pulumi_gcp/databasemigrationservice/connection_profile.py +168 -0
- pulumi_gcp/databasemigrationservice/migration_job.py +6 -0
- pulumi_gcp/databasemigrationservice/outputs.py +18 -15
- pulumi_gcp/developerconnect/__init__.py +1 -0
- pulumi_gcp/developerconnect/_inputs.py +77 -0
- pulumi_gcp/developerconnect/account_connector.py +866 -0
- pulumi_gcp/developerconnect/outputs.py +64 -0
- pulumi_gcp/firestore/database.py +82 -0
- pulumi_gcp/firestore/index.py +263 -7
- pulumi_gcp/folder/service_identity.py +0 -26
- pulumi_gcp/managedkafka/_inputs.py +6 -6
- pulumi_gcp/managedkafka/connect_cluster.py +84 -40
- pulumi_gcp/managedkafka/connector.py +98 -44
- pulumi_gcp/managedkafka/outputs.py +4 -4
- pulumi_gcp/memorystore/_inputs.py +69 -0
- pulumi_gcp/memorystore/get_instance.py +34 -1
- pulumi_gcp/memorystore/instance.py +140 -0
- pulumi_gcp/memorystore/outputs.py +80 -0
- pulumi_gcp/ml/engine_model.py +0 -22
- pulumi_gcp/monitoring/_inputs.py +37 -19
- pulumi_gcp/monitoring/outputs.py +39 -11
- pulumi_gcp/monitoring/uptime_check_config.py +8 -0
- pulumi_gcp/netapp/_inputs.py +3 -3
- pulumi_gcp/netapp/outputs.py +2 -2
- pulumi_gcp/networkconnectivity/spoke.py +14 -14
- pulumi_gcp/orgpolicy/policy.py +2 -2
- pulumi_gcp/osconfig/v2_policy_orchestrator.py +8 -0
- pulumi_gcp/osconfig/v2_policy_orchestrator_for_organization.py +8 -0
- pulumi_gcp/pubsub/subscription.py +6 -6
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/redis/_inputs.py +69 -0
- pulumi_gcp/redis/cluster.py +140 -0
- pulumi_gcp/redis/outputs.py +40 -0
- pulumi_gcp/secretmanager/secret.py +16 -17
- pulumi_gcp/storage/_inputs.py +111 -0
- pulumi_gcp/storage/control_folder_intelligence_config.py +32 -0
- pulumi_gcp/storage/control_organization_intelligence_config.py +32 -0
- pulumi_gcp/storage/control_project_intelligence_config.py +32 -0
- pulumi_gcp/storage/get_control_folder_intelligence_config.py +12 -1
- pulumi_gcp/storage/get_control_organization_intelligence_config.py +12 -1
- pulumi_gcp/storage/get_control_project_intelligence_config.py +12 -1
- pulumi_gcp/storage/outputs.py +174 -0
- pulumi_gcp/vertex/__init__.py +12 -0
- pulumi_gcp/vertex/_inputs.py +294 -0
- pulumi_gcp/vertex/ai_endpoint.py +4 -4
- pulumi_gcp/vertex/ai_feature_group.py +1 -1
- pulumi_gcp/vertex/ai_feature_group_iam_binding.py +583 -0
- pulumi_gcp/vertex/ai_feature_group_iam_member.py +583 -0
- pulumi_gcp/vertex/ai_feature_group_iam_policy.py +422 -0
- pulumi_gcp/vertex/ai_feature_online_store_featureview.py +26 -27
- pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_binding.py +614 -0
- pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_member.py +614 -0
- pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_policy.py +453 -0
- pulumi_gcp/vertex/ai_feature_online_store_iam_binding.py +583 -0
- pulumi_gcp/vertex/ai_feature_online_store_iam_member.py +583 -0
- pulumi_gcp/vertex/ai_feature_online_store_iam_policy.py +422 -0
- pulumi_gcp/vertex/get_ai_feature_group_iam_policy.py +177 -0
- pulumi_gcp/vertex/get_ai_feature_online_store_featureview_iam_policy.py +194 -0
- pulumi_gcp/vertex/get_ai_feature_online_store_iam_policy.py +177 -0
- pulumi_gcp/vertex/outputs.py +168 -0
- {pulumi_gcp-8.27.0a1744872023.dist-info → pulumi_gcp-8.27.1.dist-info}/METADATA +1 -1
- {pulumi_gcp-8.27.0a1744872023.dist-info → pulumi_gcp-8.27.1.dist-info}/RECORD +77 -64
- {pulumi_gcp-8.27.0a1744872023.dist-info → pulumi_gcp-8.27.1.dist-info}/WHEEL +1 -1
- {pulumi_gcp-8.27.0a1744872023.dist-info → pulumi_gcp-8.27.1.dist-info}/top_level.txt +0 -0
pulumi_gcp/compute/outputs.py
CHANGED
@@ -103,6 +103,9 @@ __all__ = [
|
|
103
103
|
'ImageShieldedInstanceInitialStateDbx',
|
104
104
|
'ImageShieldedInstanceInitialStateKek',
|
105
105
|
'ImageShieldedInstanceInitialStatePk',
|
106
|
+
'ImageSourceDiskEncryptionKey',
|
107
|
+
'ImageSourceImageEncryptionKey',
|
108
|
+
'ImageSourceSnapshotEncryptionKey',
|
106
109
|
'InstanceAdvancedMachineFeatures',
|
107
110
|
'InstanceAttachedDisk',
|
108
111
|
'InstanceBootDisk',
|
@@ -8022,6 +8025,306 @@ class ImageShieldedInstanceInitialStatePk(dict):
|
|
8022
8025
|
return pulumi.get(self, "file_type")
|
8023
8026
|
|
8024
8027
|
|
8028
|
+
@pulumi.output_type
|
8029
|
+
class ImageSourceDiskEncryptionKey(dict):
|
8030
|
+
@staticmethod
|
8031
|
+
def __key_warning(key: str):
|
8032
|
+
suggest = None
|
8033
|
+
if key == "kmsKeySelfLink":
|
8034
|
+
suggest = "kms_key_self_link"
|
8035
|
+
elif key == "kmsKeyServiceAccount":
|
8036
|
+
suggest = "kms_key_service_account"
|
8037
|
+
elif key == "rawKey":
|
8038
|
+
suggest = "raw_key"
|
8039
|
+
elif key == "rsaEncryptedKey":
|
8040
|
+
suggest = "rsa_encrypted_key"
|
8041
|
+
|
8042
|
+
if suggest:
|
8043
|
+
pulumi.log.warn(f"Key '{key}' not found in ImageSourceDiskEncryptionKey. Access the value via the '{suggest}' property getter instead.")
|
8044
|
+
|
8045
|
+
def __getitem__(self, key: str) -> Any:
|
8046
|
+
ImageSourceDiskEncryptionKey.__key_warning(key)
|
8047
|
+
return super().__getitem__(key)
|
8048
|
+
|
8049
|
+
def get(self, key: str, default = None) -> Any:
|
8050
|
+
ImageSourceDiskEncryptionKey.__key_warning(key)
|
8051
|
+
return super().get(key, default)
|
8052
|
+
|
8053
|
+
def __init__(__self__, *,
|
8054
|
+
kms_key_self_link: Optional[builtins.str] = None,
|
8055
|
+
kms_key_service_account: Optional[builtins.str] = None,
|
8056
|
+
raw_key: Optional[builtins.str] = None,
|
8057
|
+
rsa_encrypted_key: Optional[builtins.str] = None):
|
8058
|
+
"""
|
8059
|
+
:param builtins.str kms_key_self_link: The self link of the encryption key used to decrypt this resource. Also called KmsKeyName
|
8060
|
+
in the cloud console. Your project's Compute Engine System service account
|
8061
|
+
(`service-{{PROJECT_NUMBER}}@compute-system.iam.gserviceaccount.com`) must have
|
8062
|
+
`roles/cloudkms.cryptoKeyEncrypterDecrypter` to use this feature.
|
8063
|
+
See https://cloud.google.com/compute/docs/disks/customer-managed-encryption#encrypt_a_new_persistent_disk_with_your_own_keys
|
8064
|
+
:param builtins.str kms_key_service_account: The service account being used for the encryption request for the
|
8065
|
+
given KMS key. If absent, the Compute Engine default service
|
8066
|
+
account is used.
|
8067
|
+
:param builtins.str raw_key: Specifies a 256-bit customer-supplied encryption key, encoded in
|
8068
|
+
RFC 4648 base64 to either encrypt or decrypt this resource.
|
8069
|
+
**Note**: This property is sensitive and will not be displayed in the plan.
|
8070
|
+
:param builtins.str rsa_encrypted_key: Specifies an RFC 4648 base64 encoded, RSA-wrapped 2048-bit
|
8071
|
+
customer-supplied encryption key to either encrypt or decrypt
|
8072
|
+
this resource. You can provide either the rawKey or the rsaEncryptedKey.
|
8073
|
+
**Note**: This property is sensitive and will not be displayed in the plan.
|
8074
|
+
"""
|
8075
|
+
if kms_key_self_link is not None:
|
8076
|
+
pulumi.set(__self__, "kms_key_self_link", kms_key_self_link)
|
8077
|
+
if kms_key_service_account is not None:
|
8078
|
+
pulumi.set(__self__, "kms_key_service_account", kms_key_service_account)
|
8079
|
+
if raw_key is not None:
|
8080
|
+
pulumi.set(__self__, "raw_key", raw_key)
|
8081
|
+
if rsa_encrypted_key is not None:
|
8082
|
+
pulumi.set(__self__, "rsa_encrypted_key", rsa_encrypted_key)
|
8083
|
+
|
8084
|
+
@property
|
8085
|
+
@pulumi.getter(name="kmsKeySelfLink")
|
8086
|
+
def kms_key_self_link(self) -> Optional[builtins.str]:
|
8087
|
+
"""
|
8088
|
+
The self link of the encryption key used to decrypt this resource. Also called KmsKeyName
|
8089
|
+
in the cloud console. Your project's Compute Engine System service account
|
8090
|
+
(`service-{{PROJECT_NUMBER}}@compute-system.iam.gserviceaccount.com`) must have
|
8091
|
+
`roles/cloudkms.cryptoKeyEncrypterDecrypter` to use this feature.
|
8092
|
+
See https://cloud.google.com/compute/docs/disks/customer-managed-encryption#encrypt_a_new_persistent_disk_with_your_own_keys
|
8093
|
+
"""
|
8094
|
+
return pulumi.get(self, "kms_key_self_link")
|
8095
|
+
|
8096
|
+
@property
|
8097
|
+
@pulumi.getter(name="kmsKeyServiceAccount")
|
8098
|
+
def kms_key_service_account(self) -> Optional[builtins.str]:
|
8099
|
+
"""
|
8100
|
+
The service account being used for the encryption request for the
|
8101
|
+
given KMS key. If absent, the Compute Engine default service
|
8102
|
+
account is used.
|
8103
|
+
"""
|
8104
|
+
return pulumi.get(self, "kms_key_service_account")
|
8105
|
+
|
8106
|
+
@property
|
8107
|
+
@pulumi.getter(name="rawKey")
|
8108
|
+
def raw_key(self) -> Optional[builtins.str]:
|
8109
|
+
"""
|
8110
|
+
Specifies a 256-bit customer-supplied encryption key, encoded in
|
8111
|
+
RFC 4648 base64 to either encrypt or decrypt this resource.
|
8112
|
+
**Note**: This property is sensitive and will not be displayed in the plan.
|
8113
|
+
"""
|
8114
|
+
return pulumi.get(self, "raw_key")
|
8115
|
+
|
8116
|
+
@property
|
8117
|
+
@pulumi.getter(name="rsaEncryptedKey")
|
8118
|
+
def rsa_encrypted_key(self) -> Optional[builtins.str]:
|
8119
|
+
"""
|
8120
|
+
Specifies an RFC 4648 base64 encoded, RSA-wrapped 2048-bit
|
8121
|
+
customer-supplied encryption key to either encrypt or decrypt
|
8122
|
+
this resource. You can provide either the rawKey or the rsaEncryptedKey.
|
8123
|
+
**Note**: This property is sensitive and will not be displayed in the plan.
|
8124
|
+
"""
|
8125
|
+
return pulumi.get(self, "rsa_encrypted_key")
|
8126
|
+
|
8127
|
+
|
8128
|
+
@pulumi.output_type
|
8129
|
+
class ImageSourceImageEncryptionKey(dict):
|
8130
|
+
@staticmethod
|
8131
|
+
def __key_warning(key: str):
|
8132
|
+
suggest = None
|
8133
|
+
if key == "kmsKeySelfLink":
|
8134
|
+
suggest = "kms_key_self_link"
|
8135
|
+
elif key == "kmsKeyServiceAccount":
|
8136
|
+
suggest = "kms_key_service_account"
|
8137
|
+
elif key == "rawKey":
|
8138
|
+
suggest = "raw_key"
|
8139
|
+
elif key == "rsaEncryptedKey":
|
8140
|
+
suggest = "rsa_encrypted_key"
|
8141
|
+
|
8142
|
+
if suggest:
|
8143
|
+
pulumi.log.warn(f"Key '{key}' not found in ImageSourceImageEncryptionKey. Access the value via the '{suggest}' property getter instead.")
|
8144
|
+
|
8145
|
+
def __getitem__(self, key: str) -> Any:
|
8146
|
+
ImageSourceImageEncryptionKey.__key_warning(key)
|
8147
|
+
return super().__getitem__(key)
|
8148
|
+
|
8149
|
+
def get(self, key: str, default = None) -> Any:
|
8150
|
+
ImageSourceImageEncryptionKey.__key_warning(key)
|
8151
|
+
return super().get(key, default)
|
8152
|
+
|
8153
|
+
def __init__(__self__, *,
|
8154
|
+
kms_key_self_link: Optional[builtins.str] = None,
|
8155
|
+
kms_key_service_account: Optional[builtins.str] = None,
|
8156
|
+
raw_key: Optional[builtins.str] = None,
|
8157
|
+
rsa_encrypted_key: Optional[builtins.str] = None):
|
8158
|
+
"""
|
8159
|
+
:param builtins.str kms_key_self_link: The self link of the encryption key used to decrypt this resource. Also called KmsKeyName
|
8160
|
+
in the cloud console. Your project's Compute Engine System service account
|
8161
|
+
(`service-{{PROJECT_NUMBER}}@compute-system.iam.gserviceaccount.com`) must have
|
8162
|
+
`roles/cloudkms.cryptoKeyEncrypterDecrypter` to use this feature.
|
8163
|
+
See https://cloud.google.com/compute/docs/disks/customer-managed-encryption#encrypt_a_new_persistent_disk_with_your_own_keys
|
8164
|
+
:param builtins.str kms_key_service_account: The service account being used for the encryption request for the
|
8165
|
+
given KMS key. If absent, the Compute Engine default service
|
8166
|
+
account is used.
|
8167
|
+
:param builtins.str raw_key: Specifies a 256-bit customer-supplied encryption key, encoded in
|
8168
|
+
RFC 4648 base64 to either encrypt or decrypt this resource.
|
8169
|
+
**Note**: This property is sensitive and will not be displayed in the plan.
|
8170
|
+
:param builtins.str rsa_encrypted_key: Specifies an RFC 4648 base64 encoded, RSA-wrapped 2048-bit
|
8171
|
+
customer-supplied encryption key to either encrypt or decrypt
|
8172
|
+
this resource. You can provide either the rawKey or the rsaEncryptedKey.
|
8173
|
+
**Note**: This property is sensitive and will not be displayed in the plan.
|
8174
|
+
"""
|
8175
|
+
if kms_key_self_link is not None:
|
8176
|
+
pulumi.set(__self__, "kms_key_self_link", kms_key_self_link)
|
8177
|
+
if kms_key_service_account is not None:
|
8178
|
+
pulumi.set(__self__, "kms_key_service_account", kms_key_service_account)
|
8179
|
+
if raw_key is not None:
|
8180
|
+
pulumi.set(__self__, "raw_key", raw_key)
|
8181
|
+
if rsa_encrypted_key is not None:
|
8182
|
+
pulumi.set(__self__, "rsa_encrypted_key", rsa_encrypted_key)
|
8183
|
+
|
8184
|
+
@property
|
8185
|
+
@pulumi.getter(name="kmsKeySelfLink")
|
8186
|
+
def kms_key_self_link(self) -> Optional[builtins.str]:
|
8187
|
+
"""
|
8188
|
+
The self link of the encryption key used to decrypt this resource. Also called KmsKeyName
|
8189
|
+
in the cloud console. Your project's Compute Engine System service account
|
8190
|
+
(`service-{{PROJECT_NUMBER}}@compute-system.iam.gserviceaccount.com`) must have
|
8191
|
+
`roles/cloudkms.cryptoKeyEncrypterDecrypter` to use this feature.
|
8192
|
+
See https://cloud.google.com/compute/docs/disks/customer-managed-encryption#encrypt_a_new_persistent_disk_with_your_own_keys
|
8193
|
+
"""
|
8194
|
+
return pulumi.get(self, "kms_key_self_link")
|
8195
|
+
|
8196
|
+
@property
|
8197
|
+
@pulumi.getter(name="kmsKeyServiceAccount")
|
8198
|
+
def kms_key_service_account(self) -> Optional[builtins.str]:
|
8199
|
+
"""
|
8200
|
+
The service account being used for the encryption request for the
|
8201
|
+
given KMS key. If absent, the Compute Engine default service
|
8202
|
+
account is used.
|
8203
|
+
"""
|
8204
|
+
return pulumi.get(self, "kms_key_service_account")
|
8205
|
+
|
8206
|
+
@property
|
8207
|
+
@pulumi.getter(name="rawKey")
|
8208
|
+
def raw_key(self) -> Optional[builtins.str]:
|
8209
|
+
"""
|
8210
|
+
Specifies a 256-bit customer-supplied encryption key, encoded in
|
8211
|
+
RFC 4648 base64 to either encrypt or decrypt this resource.
|
8212
|
+
**Note**: This property is sensitive and will not be displayed in the plan.
|
8213
|
+
"""
|
8214
|
+
return pulumi.get(self, "raw_key")
|
8215
|
+
|
8216
|
+
@property
|
8217
|
+
@pulumi.getter(name="rsaEncryptedKey")
|
8218
|
+
def rsa_encrypted_key(self) -> Optional[builtins.str]:
|
8219
|
+
"""
|
8220
|
+
Specifies an RFC 4648 base64 encoded, RSA-wrapped 2048-bit
|
8221
|
+
customer-supplied encryption key to either encrypt or decrypt
|
8222
|
+
this resource. You can provide either the rawKey or the rsaEncryptedKey.
|
8223
|
+
**Note**: This property is sensitive and will not be displayed in the plan.
|
8224
|
+
"""
|
8225
|
+
return pulumi.get(self, "rsa_encrypted_key")
|
8226
|
+
|
8227
|
+
|
8228
|
+
@pulumi.output_type
|
8229
|
+
class ImageSourceSnapshotEncryptionKey(dict):
|
8230
|
+
@staticmethod
|
8231
|
+
def __key_warning(key: str):
|
8232
|
+
suggest = None
|
8233
|
+
if key == "kmsKeySelfLink":
|
8234
|
+
suggest = "kms_key_self_link"
|
8235
|
+
elif key == "kmsKeyServiceAccount":
|
8236
|
+
suggest = "kms_key_service_account"
|
8237
|
+
elif key == "rawKey":
|
8238
|
+
suggest = "raw_key"
|
8239
|
+
elif key == "rsaEncryptedKey":
|
8240
|
+
suggest = "rsa_encrypted_key"
|
8241
|
+
|
8242
|
+
if suggest:
|
8243
|
+
pulumi.log.warn(f"Key '{key}' not found in ImageSourceSnapshotEncryptionKey. Access the value via the '{suggest}' property getter instead.")
|
8244
|
+
|
8245
|
+
def __getitem__(self, key: str) -> Any:
|
8246
|
+
ImageSourceSnapshotEncryptionKey.__key_warning(key)
|
8247
|
+
return super().__getitem__(key)
|
8248
|
+
|
8249
|
+
def get(self, key: str, default = None) -> Any:
|
8250
|
+
ImageSourceSnapshotEncryptionKey.__key_warning(key)
|
8251
|
+
return super().get(key, default)
|
8252
|
+
|
8253
|
+
def __init__(__self__, *,
|
8254
|
+
kms_key_self_link: Optional[builtins.str] = None,
|
8255
|
+
kms_key_service_account: Optional[builtins.str] = None,
|
8256
|
+
raw_key: Optional[builtins.str] = None,
|
8257
|
+
rsa_encrypted_key: Optional[builtins.str] = None):
|
8258
|
+
"""
|
8259
|
+
:param builtins.str kms_key_self_link: The self link of the encryption key used to decrypt this resource. Also called KmsKeyName
|
8260
|
+
in the cloud console. Your project's Compute Engine System service account
|
8261
|
+
(`service-{{PROJECT_NUMBER}}@compute-system.iam.gserviceaccount.com`) must have
|
8262
|
+
`roles/cloudkms.cryptoKeyEncrypterDecrypter` to use this feature.
|
8263
|
+
See https://cloud.google.com/compute/docs/disks/customer-managed-encryption#encrypt_a_new_persistent_disk_with_your_own_keys
|
8264
|
+
:param builtins.str kms_key_service_account: The service account being used for the encryption request for the
|
8265
|
+
given KMS key. If absent, the Compute Engine default service
|
8266
|
+
account is used.
|
8267
|
+
:param builtins.str raw_key: Specifies a 256-bit customer-supplied encryption key, encoded in
|
8268
|
+
RFC 4648 base64 to either encrypt or decrypt this resource.
|
8269
|
+
**Note**: This property is sensitive and will not be displayed in the plan.
|
8270
|
+
:param builtins.str rsa_encrypted_key: Specifies an RFC 4648 base64 encoded, RSA-wrapped 2048-bit
|
8271
|
+
customer-supplied encryption key to either encrypt or decrypt
|
8272
|
+
this resource. You can provide either the rawKey or the rsaEncryptedKey.
|
8273
|
+
**Note**: This property is sensitive and will not be displayed in the plan.
|
8274
|
+
"""
|
8275
|
+
if kms_key_self_link is not None:
|
8276
|
+
pulumi.set(__self__, "kms_key_self_link", kms_key_self_link)
|
8277
|
+
if kms_key_service_account is not None:
|
8278
|
+
pulumi.set(__self__, "kms_key_service_account", kms_key_service_account)
|
8279
|
+
if raw_key is not None:
|
8280
|
+
pulumi.set(__self__, "raw_key", raw_key)
|
8281
|
+
if rsa_encrypted_key is not None:
|
8282
|
+
pulumi.set(__self__, "rsa_encrypted_key", rsa_encrypted_key)
|
8283
|
+
|
8284
|
+
@property
|
8285
|
+
@pulumi.getter(name="kmsKeySelfLink")
|
8286
|
+
def kms_key_self_link(self) -> Optional[builtins.str]:
|
8287
|
+
"""
|
8288
|
+
The self link of the encryption key used to decrypt this resource. Also called KmsKeyName
|
8289
|
+
in the cloud console. Your project's Compute Engine System service account
|
8290
|
+
(`service-{{PROJECT_NUMBER}}@compute-system.iam.gserviceaccount.com`) must have
|
8291
|
+
`roles/cloudkms.cryptoKeyEncrypterDecrypter` to use this feature.
|
8292
|
+
See https://cloud.google.com/compute/docs/disks/customer-managed-encryption#encrypt_a_new_persistent_disk_with_your_own_keys
|
8293
|
+
"""
|
8294
|
+
return pulumi.get(self, "kms_key_self_link")
|
8295
|
+
|
8296
|
+
@property
|
8297
|
+
@pulumi.getter(name="kmsKeyServiceAccount")
|
8298
|
+
def kms_key_service_account(self) -> Optional[builtins.str]:
|
8299
|
+
"""
|
8300
|
+
The service account being used for the encryption request for the
|
8301
|
+
given KMS key. If absent, the Compute Engine default service
|
8302
|
+
account is used.
|
8303
|
+
"""
|
8304
|
+
return pulumi.get(self, "kms_key_service_account")
|
8305
|
+
|
8306
|
+
@property
|
8307
|
+
@pulumi.getter(name="rawKey")
|
8308
|
+
def raw_key(self) -> Optional[builtins.str]:
|
8309
|
+
"""
|
8310
|
+
Specifies a 256-bit customer-supplied encryption key, encoded in
|
8311
|
+
RFC 4648 base64 to either encrypt or decrypt this resource.
|
8312
|
+
**Note**: This property is sensitive and will not be displayed in the plan.
|
8313
|
+
"""
|
8314
|
+
return pulumi.get(self, "raw_key")
|
8315
|
+
|
8316
|
+
@property
|
8317
|
+
@pulumi.getter(name="rsaEncryptedKey")
|
8318
|
+
def rsa_encrypted_key(self) -> Optional[builtins.str]:
|
8319
|
+
"""
|
8320
|
+
Specifies an RFC 4648 base64 encoded, RSA-wrapped 2048-bit
|
8321
|
+
customer-supplied encryption key to either encrypt or decrypt
|
8322
|
+
this resource. You can provide either the rawKey or the rsaEncryptedKey.
|
8323
|
+
**Note**: This property is sensitive and will not be displayed in the plan.
|
8324
|
+
"""
|
8325
|
+
return pulumi.get(self, "rsa_encrypted_key")
|
8326
|
+
|
8327
|
+
|
8025
8328
|
@pulumi.output_type
|
8026
8329
|
class InstanceAdvancedMachineFeatures(dict):
|
8027
8330
|
@staticmethod
|
@@ -44880,10 +45183,14 @@ class SnapshotSourceDiskEncryptionKey(dict):
|
|
44880
45183
|
@staticmethod
|
44881
45184
|
def __key_warning(key: str):
|
44882
45185
|
suggest = None
|
44883
|
-
if key == "
|
45186
|
+
if key == "kmsKeySelfLink":
|
45187
|
+
suggest = "kms_key_self_link"
|
45188
|
+
elif key == "kmsKeyServiceAccount":
|
44884
45189
|
suggest = "kms_key_service_account"
|
44885
45190
|
elif key == "rawKey":
|
44886
45191
|
suggest = "raw_key"
|
45192
|
+
elif key == "rsaEncryptedKey":
|
45193
|
+
suggest = "rsa_encrypted_key"
|
44887
45194
|
|
44888
45195
|
if suggest:
|
44889
45196
|
pulumi.log.warn(f"Key '{key}' not found in SnapshotSourceDiskEncryptionKey. Access the value via the '{suggest}' property getter instead.")
|
@@ -44897,19 +45204,37 @@ class SnapshotSourceDiskEncryptionKey(dict):
|
|
44897
45204
|
return super().get(key, default)
|
44898
45205
|
|
44899
45206
|
def __init__(__self__, *,
|
45207
|
+
kms_key_self_link: Optional[builtins.str] = None,
|
44900
45208
|
kms_key_service_account: Optional[builtins.str] = None,
|
44901
|
-
raw_key: Optional[builtins.str] = None
|
45209
|
+
raw_key: Optional[builtins.str] = None,
|
45210
|
+
rsa_encrypted_key: Optional[builtins.str] = None):
|
44902
45211
|
"""
|
45212
|
+
:param builtins.str kms_key_self_link: The name of the encryption key that is stored in Google Cloud KMS.
|
44903
45213
|
:param builtins.str kms_key_service_account: The service account used for the encryption request for the given KMS key.
|
44904
45214
|
If absent, the Compute Engine Service Agent service account is used.
|
44905
45215
|
:param builtins.str raw_key: Specifies a 256-bit customer-supplied encryption key, encoded in
|
44906
45216
|
RFC 4648 base64 to either encrypt or decrypt this resource.
|
44907
45217
|
**Note**: This property is sensitive and will not be displayed in the plan.
|
45218
|
+
:param builtins.str rsa_encrypted_key: Specifies an encryption key stored in Google Cloud KMS, encoded in
|
45219
|
+
RFC 4648 base64 to either encrypt or decrypt this resource.
|
45220
|
+
**Note**: This property is sensitive and will not be displayed in the plan.
|
44908
45221
|
"""
|
45222
|
+
if kms_key_self_link is not None:
|
45223
|
+
pulumi.set(__self__, "kms_key_self_link", kms_key_self_link)
|
44909
45224
|
if kms_key_service_account is not None:
|
44910
45225
|
pulumi.set(__self__, "kms_key_service_account", kms_key_service_account)
|
44911
45226
|
if raw_key is not None:
|
44912
45227
|
pulumi.set(__self__, "raw_key", raw_key)
|
45228
|
+
if rsa_encrypted_key is not None:
|
45229
|
+
pulumi.set(__self__, "rsa_encrypted_key", rsa_encrypted_key)
|
45230
|
+
|
45231
|
+
@property
|
45232
|
+
@pulumi.getter(name="kmsKeySelfLink")
|
45233
|
+
def kms_key_self_link(self) -> Optional[builtins.str]:
|
45234
|
+
"""
|
45235
|
+
The name of the encryption key that is stored in Google Cloud KMS.
|
45236
|
+
"""
|
45237
|
+
return pulumi.get(self, "kms_key_self_link")
|
44913
45238
|
|
44914
45239
|
@property
|
44915
45240
|
@pulumi.getter(name="kmsKeyServiceAccount")
|
@@ -44930,6 +45255,16 @@ class SnapshotSourceDiskEncryptionKey(dict):
|
|
44930
45255
|
"""
|
44931
45256
|
return pulumi.get(self, "raw_key")
|
44932
45257
|
|
45258
|
+
@property
|
45259
|
+
@pulumi.getter(name="rsaEncryptedKey")
|
45260
|
+
def rsa_encrypted_key(self) -> Optional[builtins.str]:
|
45261
|
+
"""
|
45262
|
+
Specifies an encryption key stored in Google Cloud KMS, encoded in
|
45263
|
+
RFC 4648 base64 to either encrypt or decrypt this resource.
|
45264
|
+
**Note**: This property is sensitive and will not be displayed in the plan.
|
45265
|
+
"""
|
45266
|
+
return pulumi.get(self, "rsa_encrypted_key")
|
45267
|
+
|
44933
45268
|
|
44934
45269
|
@pulumi.output_type
|
44935
45270
|
class SubnetworkIAMBindingCondition(dict):
|
@@ -67945,16 +68280,31 @@ class GetSnapshotSnapshotEncryptionKeyResult(dict):
|
|
67945
68280
|
@pulumi.output_type
|
67946
68281
|
class GetSnapshotSourceDiskEncryptionKeyResult(dict):
|
67947
68282
|
def __init__(__self__, *,
|
68283
|
+
kms_key_self_link: builtins.str,
|
67948
68284
|
kms_key_service_account: builtins.str,
|
67949
|
-
raw_key: builtins.str
|
68285
|
+
raw_key: builtins.str,
|
68286
|
+
rsa_encrypted_key: builtins.str):
|
67950
68287
|
"""
|
68288
|
+
:param builtins.str kms_key_self_link: The name of the encryption key that is stored in Google Cloud KMS.
|
67951
68289
|
:param builtins.str kms_key_service_account: The service account used for the encryption request for the given KMS key.
|
67952
68290
|
If absent, the Compute Engine Service Agent service account is used.
|
67953
68291
|
:param builtins.str raw_key: Specifies a 256-bit customer-supplied encryption key, encoded in
|
67954
68292
|
RFC 4648 base64 to either encrypt or decrypt this resource.
|
68293
|
+
:param builtins.str rsa_encrypted_key: Specifies an encryption key stored in Google Cloud KMS, encoded in
|
68294
|
+
RFC 4648 base64 to either encrypt or decrypt this resource.
|
67955
68295
|
"""
|
68296
|
+
pulumi.set(__self__, "kms_key_self_link", kms_key_self_link)
|
67956
68297
|
pulumi.set(__self__, "kms_key_service_account", kms_key_service_account)
|
67957
68298
|
pulumi.set(__self__, "raw_key", raw_key)
|
68299
|
+
pulumi.set(__self__, "rsa_encrypted_key", rsa_encrypted_key)
|
68300
|
+
|
68301
|
+
@property
|
68302
|
+
@pulumi.getter(name="kmsKeySelfLink")
|
68303
|
+
def kms_key_self_link(self) -> builtins.str:
|
68304
|
+
"""
|
68305
|
+
The name of the encryption key that is stored in Google Cloud KMS.
|
68306
|
+
"""
|
68307
|
+
return pulumi.get(self, "kms_key_self_link")
|
67958
68308
|
|
67959
68309
|
@property
|
67960
68310
|
@pulumi.getter(name="kmsKeyServiceAccount")
|
@@ -67974,6 +68324,15 @@ class GetSnapshotSourceDiskEncryptionKeyResult(dict):
|
|
67974
68324
|
"""
|
67975
68325
|
return pulumi.get(self, "raw_key")
|
67976
68326
|
|
68327
|
+
@property
|
68328
|
+
@pulumi.getter(name="rsaEncryptedKey")
|
68329
|
+
def rsa_encrypted_key(self) -> builtins.str:
|
68330
|
+
"""
|
68331
|
+
Specifies an encryption key stored in Google Cloud KMS, encoded in
|
68332
|
+
RFC 4648 base64 to either encrypt or decrypt this resource.
|
68333
|
+
"""
|
68334
|
+
return pulumi.get(self, "rsa_encrypted_key")
|
68335
|
+
|
67977
68336
|
|
67978
68337
|
@pulumi.output_type
|
67979
68338
|
class GetSubnetworkSecondaryIpRangeResult(dict):
|
@@ -1536,6 +1536,9 @@ class RegionBackendService(pulumi.CustomResource):
|
|
1536
1536
|
A Region Backend Service defines a regionally-scoped group of virtual
|
1537
1537
|
machines that will serve traffic for load balancing.
|
1538
1538
|
|
1539
|
+
> **Note:** Recreating a `compute.RegionBackendService` that references other dependent resources like `compute.InstanceGroup` will give a `resourceInUseByAnotherResource` error, when decreasing the number of other dependent resources.
|
1540
|
+
Use `lifecycle.create_before_destroy` on the dependent resources to avoid this type of error as shown in the Dynamic Backend Count example.
|
1541
|
+
|
1539
1542
|
To get more information about RegionBackendService, see:
|
1540
1543
|
|
1541
1544
|
* [API documentation](https://cloud.google.com/compute/docs/reference/latest/regionBackendServices)
|
@@ -1882,7 +1885,6 @@ class RegionBackendService(pulumi.CustomResource):
|
|
1882
1885
|
],
|
1883
1886
|
}])
|
1884
1887
|
```
|
1885
|
-
|
1886
1888
|
## Import
|
1887
1889
|
|
1888
1890
|
RegionBackendService can be imported using any of these accepted formats:
|
@@ -2072,6 +2074,9 @@ class RegionBackendService(pulumi.CustomResource):
|
|
2072
2074
|
A Region Backend Service defines a regionally-scoped group of virtual
|
2073
2075
|
machines that will serve traffic for load balancing.
|
2074
2076
|
|
2077
|
+
> **Note:** Recreating a `compute.RegionBackendService` that references other dependent resources like `compute.InstanceGroup` will give a `resourceInUseByAnotherResource` error, when decreasing the number of other dependent resources.
|
2078
|
+
Use `lifecycle.create_before_destroy` on the dependent resources to avoid this type of error as shown in the Dynamic Backend Count example.
|
2079
|
+
|
2075
2080
|
To get more information about RegionBackendService, see:
|
2076
2081
|
|
2077
2082
|
* [API documentation](https://cloud.google.com/compute/docs/reference/latest/regionBackendServices)
|
@@ -2418,7 +2423,6 @@ class RegionBackendService(pulumi.CustomResource):
|
|
2418
2423
|
],
|
2419
2424
|
}])
|
2420
2425
|
```
|
2421
|
-
|
2422
2426
|
## Import
|
2423
2427
|
|
2424
2428
|
RegionBackendService can be imported using any of these accepted formats:
|
pulumi_gcp/compute/snapshot.py
CHANGED
@@ -668,6 +668,9 @@ class Snapshot(pulumi.CustomResource):
|
|
668
668
|
* How-to Guides
|
669
669
|
* [Official Documentation](https://cloud.google.com/compute/docs/disks/create-snapshots)
|
670
670
|
|
671
|
+
> **Warning:** All arguments including the following potentially sensitive
|
672
|
+
values will be stored in the raw state as plain text: `snapshot_encryption_key.raw_key`, `snapshot_encryption_key.rsa_encrypted_key`, `source_disk_encryption_key.raw_key`, `source_disk_encryption_key.rsa_encrypted_key`.
|
673
|
+
|
671
674
|
## Example Usage
|
672
675
|
|
673
676
|
### Snapshot Basic
|
@@ -811,6 +814,9 @@ class Snapshot(pulumi.CustomResource):
|
|
811
814
|
* How-to Guides
|
812
815
|
* [Official Documentation](https://cloud.google.com/compute/docs/disks/create-snapshots)
|
813
816
|
|
817
|
+
> **Warning:** All arguments including the following potentially sensitive
|
818
|
+
values will be stored in the raw state as plain text: `snapshot_encryption_key.raw_key`, `snapshot_encryption_key.rsa_encrypted_key`, `source_disk_encryption_key.raw_key`, `source_disk_encryption_key.rsa_encrypted_key`.
|
819
|
+
|
814
820
|
## Example Usage
|
815
821
|
|
816
822
|
### Snapshot Basic
|
@@ -1370,9 +1370,9 @@ class ConnectionProfileMysqlArgs:
|
|
1370
1370
|
|
1371
1371
|
if not MYPY:
|
1372
1372
|
class ConnectionProfileMysqlSslArgsDict(TypedDict):
|
1373
|
-
ca_certificate: pulumi.Input[builtins.str]
|
1373
|
+
ca_certificate: NotRequired[pulumi.Input[builtins.str]]
|
1374
1374
|
"""
|
1375
|
-
|
1375
|
+
Input only. The x509 PEM-encoded certificate of the CA that signed the source database server's certificate.
|
1376
1376
|
The replica will use this certificate to verify it's connecting to the right host.
|
1377
1377
|
**Note**: This property is sensitive and will not be displayed in the plan.
|
1378
1378
|
"""
|
@@ -1399,12 +1399,12 @@ elif False:
|
|
1399
1399
|
@pulumi.input_type
|
1400
1400
|
class ConnectionProfileMysqlSslArgs:
|
1401
1401
|
def __init__(__self__, *,
|
1402
|
-
ca_certificate: pulumi.Input[builtins.str],
|
1402
|
+
ca_certificate: Optional[pulumi.Input[builtins.str]] = None,
|
1403
1403
|
client_certificate: Optional[pulumi.Input[builtins.str]] = None,
|
1404
1404
|
client_key: Optional[pulumi.Input[builtins.str]] = None,
|
1405
1405
|
type: Optional[pulumi.Input[builtins.str]] = None):
|
1406
1406
|
"""
|
1407
|
-
:param pulumi.Input[builtins.str] ca_certificate:
|
1407
|
+
:param pulumi.Input[builtins.str] ca_certificate: Input only. The x509 PEM-encoded certificate of the CA that signed the source database server's certificate.
|
1408
1408
|
The replica will use this certificate to verify it's connecting to the right host.
|
1409
1409
|
**Note**: This property is sensitive and will not be displayed in the plan.
|
1410
1410
|
:param pulumi.Input[builtins.str] client_certificate: Input only. The x509 PEM-encoded certificate that will be used by the replica to authenticate against the source database server.
|
@@ -1416,7 +1416,8 @@ class ConnectionProfileMysqlSslArgs:
|
|
1416
1416
|
:param pulumi.Input[builtins.str] type: (Output)
|
1417
1417
|
The current connection profile state.
|
1418
1418
|
"""
|
1419
|
-
|
1419
|
+
if ca_certificate is not None:
|
1420
|
+
pulumi.set(__self__, "ca_certificate", ca_certificate)
|
1420
1421
|
if client_certificate is not None:
|
1421
1422
|
pulumi.set(__self__, "client_certificate", client_certificate)
|
1422
1423
|
if client_key is not None:
|
@@ -1426,16 +1427,16 @@ class ConnectionProfileMysqlSslArgs:
|
|
1426
1427
|
|
1427
1428
|
@property
|
1428
1429
|
@pulumi.getter(name="caCertificate")
|
1429
|
-
def ca_certificate(self) -> pulumi.Input[builtins.str]:
|
1430
|
+
def ca_certificate(self) -> Optional[pulumi.Input[builtins.str]]:
|
1430
1431
|
"""
|
1431
|
-
|
1432
|
+
Input only. The x509 PEM-encoded certificate of the CA that signed the source database server's certificate.
|
1432
1433
|
The replica will use this certificate to verify it's connecting to the right host.
|
1433
1434
|
**Note**: This property is sensitive and will not be displayed in the plan.
|
1434
1435
|
"""
|
1435
1436
|
return pulumi.get(self, "ca_certificate")
|
1436
1437
|
|
1437
1438
|
@ca_certificate.setter
|
1438
|
-
def ca_certificate(self, value: pulumi.Input[builtins.str]):
|
1439
|
+
def ca_certificate(self, value: Optional[pulumi.Input[builtins.str]]):
|
1439
1440
|
pulumi.set(self, "ca_certificate", value)
|
1440
1441
|
|
1441
1442
|
@property
|
@@ -1856,9 +1857,9 @@ class ConnectionProfileOraclePrivateConnectivityArgs:
|
|
1856
1857
|
|
1857
1858
|
if not MYPY:
|
1858
1859
|
class ConnectionProfileOracleSslArgsDict(TypedDict):
|
1859
|
-
ca_certificate: pulumi.Input[builtins.str]
|
1860
|
+
ca_certificate: NotRequired[pulumi.Input[builtins.str]]
|
1860
1861
|
"""
|
1861
|
-
|
1862
|
+
Input only. The x509 PEM-encoded certificate of the CA that signed the source database server's certificate.
|
1862
1863
|
The replica will use this certificate to verify it's connecting to the right host.
|
1863
1864
|
**Note**: This property is sensitive and will not be displayed in the plan.
|
1864
1865
|
"""
|
@@ -1885,12 +1886,12 @@ elif False:
|
|
1885
1886
|
@pulumi.input_type
|
1886
1887
|
class ConnectionProfileOracleSslArgs:
|
1887
1888
|
def __init__(__self__, *,
|
1888
|
-
ca_certificate: pulumi.Input[builtins.str],
|
1889
|
+
ca_certificate: Optional[pulumi.Input[builtins.str]] = None,
|
1889
1890
|
client_certificate: Optional[pulumi.Input[builtins.str]] = None,
|
1890
1891
|
client_key: Optional[pulumi.Input[builtins.str]] = None,
|
1891
1892
|
type: Optional[pulumi.Input[builtins.str]] = None):
|
1892
1893
|
"""
|
1893
|
-
:param pulumi.Input[builtins.str] ca_certificate:
|
1894
|
+
:param pulumi.Input[builtins.str] ca_certificate: Input only. The x509 PEM-encoded certificate of the CA that signed the source database server's certificate.
|
1894
1895
|
The replica will use this certificate to verify it's connecting to the right host.
|
1895
1896
|
**Note**: This property is sensitive and will not be displayed in the plan.
|
1896
1897
|
:param pulumi.Input[builtins.str] client_certificate: Input only. The x509 PEM-encoded certificate that will be used by the replica to authenticate against the source database server.
|
@@ -1902,7 +1903,8 @@ class ConnectionProfileOracleSslArgs:
|
|
1902
1903
|
:param pulumi.Input[builtins.str] type: (Output)
|
1903
1904
|
The current connection profile state.
|
1904
1905
|
"""
|
1905
|
-
|
1906
|
+
if ca_certificate is not None:
|
1907
|
+
pulumi.set(__self__, "ca_certificate", ca_certificate)
|
1906
1908
|
if client_certificate is not None:
|
1907
1909
|
pulumi.set(__self__, "client_certificate", client_certificate)
|
1908
1910
|
if client_key is not None:
|
@@ -1912,16 +1914,16 @@ class ConnectionProfileOracleSslArgs:
|
|
1912
1914
|
|
1913
1915
|
@property
|
1914
1916
|
@pulumi.getter(name="caCertificate")
|
1915
|
-
def ca_certificate(self) -> pulumi.Input[builtins.str]:
|
1917
|
+
def ca_certificate(self) -> Optional[pulumi.Input[builtins.str]]:
|
1916
1918
|
"""
|
1917
|
-
|
1919
|
+
Input only. The x509 PEM-encoded certificate of the CA that signed the source database server's certificate.
|
1918
1920
|
The replica will use this certificate to verify it's connecting to the right host.
|
1919
1921
|
**Note**: This property is sensitive and will not be displayed in the plan.
|
1920
1922
|
"""
|
1921
1923
|
return pulumi.get(self, "ca_certificate")
|
1922
1924
|
|
1923
1925
|
@ca_certificate.setter
|
1924
|
-
def ca_certificate(self, value: pulumi.Input[builtins.str]):
|
1926
|
+
def ca_certificate(self, value: Optional[pulumi.Input[builtins.str]]):
|
1925
1927
|
pulumi.set(self, "ca_certificate", value)
|
1926
1928
|
|
1927
1929
|
@property
|
@@ -2187,9 +2189,9 @@ class ConnectionProfilePostgresqlArgs:
|
|
2187
2189
|
|
2188
2190
|
if not MYPY:
|
2189
2191
|
class ConnectionProfilePostgresqlSslArgsDict(TypedDict):
|
2190
|
-
ca_certificate: pulumi.Input[builtins.str]
|
2192
|
+
ca_certificate: NotRequired[pulumi.Input[builtins.str]]
|
2191
2193
|
"""
|
2192
|
-
|
2194
|
+
Input only. The x509 PEM-encoded certificate of the CA that signed the source database server's certificate.
|
2193
2195
|
The replica will use this certificate to verify it's connecting to the right host.
|
2194
2196
|
**Note**: This property is sensitive and will not be displayed in the plan.
|
2195
2197
|
"""
|
@@ -2216,12 +2218,12 @@ elif False:
|
|
2216
2218
|
@pulumi.input_type
|
2217
2219
|
class ConnectionProfilePostgresqlSslArgs:
|
2218
2220
|
def __init__(__self__, *,
|
2219
|
-
ca_certificate: pulumi.Input[builtins.str],
|
2221
|
+
ca_certificate: Optional[pulumi.Input[builtins.str]] = None,
|
2220
2222
|
client_certificate: Optional[pulumi.Input[builtins.str]] = None,
|
2221
2223
|
client_key: Optional[pulumi.Input[builtins.str]] = None,
|
2222
2224
|
type: Optional[pulumi.Input[builtins.str]] = None):
|
2223
2225
|
"""
|
2224
|
-
:param pulumi.Input[builtins.str] ca_certificate:
|
2226
|
+
:param pulumi.Input[builtins.str] ca_certificate: Input only. The x509 PEM-encoded certificate of the CA that signed the source database server's certificate.
|
2225
2227
|
The replica will use this certificate to verify it's connecting to the right host.
|
2226
2228
|
**Note**: This property is sensitive and will not be displayed in the plan.
|
2227
2229
|
:param pulumi.Input[builtins.str] client_certificate: Input only. The x509 PEM-encoded certificate that will be used by the replica to authenticate against the source database server.
|
@@ -2233,7 +2235,8 @@ class ConnectionProfilePostgresqlSslArgs:
|
|
2233
2235
|
:param pulumi.Input[builtins.str] type: (Output)
|
2234
2236
|
The current connection profile state.
|
2235
2237
|
"""
|
2236
|
-
|
2238
|
+
if ca_certificate is not None:
|
2239
|
+
pulumi.set(__self__, "ca_certificate", ca_certificate)
|
2237
2240
|
if client_certificate is not None:
|
2238
2241
|
pulumi.set(__self__, "client_certificate", client_certificate)
|
2239
2242
|
if client_key is not None:
|
@@ -2243,16 +2246,16 @@ class ConnectionProfilePostgresqlSslArgs:
|
|
2243
2246
|
|
2244
2247
|
@property
|
2245
2248
|
@pulumi.getter(name="caCertificate")
|
2246
|
-
def ca_certificate(self) -> pulumi.Input[builtins.str]:
|
2249
|
+
def ca_certificate(self) -> Optional[pulumi.Input[builtins.str]]:
|
2247
2250
|
"""
|
2248
|
-
|
2251
|
+
Input only. The x509 PEM-encoded certificate of the CA that signed the source database server's certificate.
|
2249
2252
|
The replica will use this certificate to verify it's connecting to the right host.
|
2250
2253
|
**Note**: This property is sensitive and will not be displayed in the plan.
|
2251
2254
|
"""
|
2252
2255
|
return pulumi.get(self, "ca_certificate")
|
2253
2256
|
|
2254
2257
|
@ca_certificate.setter
|
2255
|
-
def ca_certificate(self, value: pulumi.Input[builtins.str]):
|
2258
|
+
def ca_certificate(self, value: Optional[pulumi.Input[builtins.str]]):
|
2256
2259
|
pulumi.set(self, "ca_certificate", value)
|
2257
2260
|
|
2258
2261
|
@property
|