pulumi-gcp 8.35.0a1750142992__py3-none-any.whl → 8.35.0a1750225231__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (52) hide show
  1. pulumi_gcp/__init__.py +8 -0
  2. pulumi_gcp/backupdisasterrecovery/backup_plan.py +100 -7
  3. pulumi_gcp/backupdisasterrecovery/backup_plan_association.py +35 -7
  4. pulumi_gcp/backupdisasterrecovery/get_backup_plan.py +12 -1
  5. pulumi_gcp/bigqueryanalyticshub/listing.py +108 -0
  6. pulumi_gcp/compute/_inputs.py +2028 -175
  7. pulumi_gcp/compute/disk.py +7 -7
  8. pulumi_gcp/compute/outputs.py +1483 -110
  9. pulumi_gcp/compute/region_url_map.py +344 -0
  10. pulumi_gcp/compute/target_http_proxy.py +118 -0
  11. pulumi_gcp/compute/target_https_proxy.py +132 -0
  12. pulumi_gcp/compute/url_map.py +344 -0
  13. pulumi_gcp/compute/vpn_tunnel.py +178 -0
  14. pulumi_gcp/dataplex/__init__.py +1 -0
  15. pulumi_gcp/dataplex/get_data_quality_rules.py +169 -0
  16. pulumi_gcp/dataplex/outputs.py +420 -0
  17. pulumi_gcp/diagflow/__init__.py +1 -0
  18. pulumi_gcp/diagflow/_inputs.py +939 -0
  19. pulumi_gcp/diagflow/cx_agent.py +34 -0
  20. pulumi_gcp/diagflow/cx_tool.py +899 -0
  21. pulumi_gcp/diagflow/outputs.py +780 -0
  22. pulumi_gcp/firestore/field.py +6 -6
  23. pulumi_gcp/gkehub/membership_binding.py +6 -6
  24. pulumi_gcp/gkehub/membership_rbac_role_binding.py +4 -4
  25. pulumi_gcp/gkehub/namespace.py +4 -4
  26. pulumi_gcp/gkehub/scope_rbac_role_binding.py +8 -8
  27. pulumi_gcp/iap/tunnel_dest_group.py +2 -2
  28. pulumi_gcp/integrationconnectors/_inputs.py +24 -1
  29. pulumi_gcp/integrationconnectors/managed_zone.py +8 -8
  30. pulumi_gcp/integrationconnectors/outputs.py +15 -1
  31. pulumi_gcp/managedkafka/connect_cluster.py +4 -4
  32. pulumi_gcp/managedkafka/connector.py +4 -4
  33. pulumi_gcp/netapp/_inputs.py +23 -0
  34. pulumi_gcp/netapp/outputs.py +16 -0
  35. pulumi_gcp/netapp/storage_pool.py +108 -0
  36. pulumi_gcp/networkconnectivity/_inputs.py +71 -1
  37. pulumi_gcp/networkconnectivity/outputs.py +64 -1
  38. pulumi_gcp/networkconnectivity/spoke.py +14 -14
  39. pulumi_gcp/notebooks/runtime.py +4 -0
  40. pulumi_gcp/orgpolicy/policy.py +2 -2
  41. pulumi_gcp/pubsub/subscription.py +6 -6
  42. pulumi_gcp/pulumi-plugin.json +1 -1
  43. pulumi_gcp/redis/_inputs.py +77 -0
  44. pulumi_gcp/redis/cluster.py +32 -0
  45. pulumi_gcp/redis/outputs.py +63 -0
  46. pulumi_gcp/vertex/ai_endpoint.py +4 -4
  47. pulumi_gcp/vertex/ai_feature_online_store_featureview.py +4 -4
  48. pulumi_gcp/vertex/ai_index_endpoint_deployed_index.py +99 -64
  49. {pulumi_gcp-8.35.0a1750142992.dist-info → pulumi_gcp-8.35.0a1750225231.dist-info}/METADATA +1 -1
  50. {pulumi_gcp-8.35.0a1750142992.dist-info → pulumi_gcp-8.35.0a1750225231.dist-info}/RECORD +52 -50
  51. {pulumi_gcp-8.35.0a1750142992.dist-info → pulumi_gcp-8.35.0a1750225231.dist-info}/WHEEL +0 -0
  52. {pulumi_gcp-8.35.0a1750142992.dist-info → pulumi_gcp-8.35.0a1750225231.dist-info}/top_level.txt +0 -0
@@ -50,6 +50,10 @@ __all__ = [
50
50
  'ClusterMaintenanceScheduleArgsDict',
51
51
  'ClusterManagedBackupSourceArgs',
52
52
  'ClusterManagedBackupSourceArgsDict',
53
+ 'ClusterManagedServerCaArgs',
54
+ 'ClusterManagedServerCaArgsDict',
55
+ 'ClusterManagedServerCaCaCertArgs',
56
+ 'ClusterManagedServerCaCaCertArgsDict',
53
57
  'ClusterPersistenceConfigArgs',
54
58
  'ClusterPersistenceConfigArgsDict',
55
59
  'ClusterPersistenceConfigAofConfigArgs',
@@ -1225,6 +1229,79 @@ class ClusterManagedBackupSourceArgs:
1225
1229
  pulumi.set(self, "backup", value)
1226
1230
 
1227
1231
 
1232
+ if not MYPY:
1233
+ class ClusterManagedServerCaArgsDict(TypedDict):
1234
+ ca_certs: NotRequired[pulumi.Input[Sequence[pulumi.Input['ClusterManagedServerCaCaCertArgsDict']]]]
1235
+ """
1236
+ (Output)
1237
+ The PEM encoded CA certificate chains for redis managed server authentication
1238
+ Structure is documented below.
1239
+ """
1240
+ elif False:
1241
+ ClusterManagedServerCaArgsDict: TypeAlias = Mapping[str, Any]
1242
+
1243
+ @pulumi.input_type
1244
+ class ClusterManagedServerCaArgs:
1245
+ def __init__(__self__, *,
1246
+ ca_certs: Optional[pulumi.Input[Sequence[pulumi.Input['ClusterManagedServerCaCaCertArgs']]]] = None):
1247
+ """
1248
+ :param pulumi.Input[Sequence[pulumi.Input['ClusterManagedServerCaCaCertArgs']]] ca_certs: (Output)
1249
+ The PEM encoded CA certificate chains for redis managed server authentication
1250
+ Structure is documented below.
1251
+ """
1252
+ if ca_certs is not None:
1253
+ pulumi.set(__self__, "ca_certs", ca_certs)
1254
+
1255
+ @property
1256
+ @pulumi.getter(name="caCerts")
1257
+ def ca_certs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['ClusterManagedServerCaCaCertArgs']]]]:
1258
+ """
1259
+ (Output)
1260
+ The PEM encoded CA certificate chains for redis managed server authentication
1261
+ Structure is documented below.
1262
+ """
1263
+ return pulumi.get(self, "ca_certs")
1264
+
1265
+ @ca_certs.setter
1266
+ def ca_certs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['ClusterManagedServerCaCaCertArgs']]]]):
1267
+ pulumi.set(self, "ca_certs", value)
1268
+
1269
+
1270
+ if not MYPY:
1271
+ class ClusterManagedServerCaCaCertArgsDict(TypedDict):
1272
+ certificates: NotRequired[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]
1273
+ """
1274
+ (Output)
1275
+ The certificates that form the CA chain, from leaf to root order
1276
+ """
1277
+ elif False:
1278
+ ClusterManagedServerCaCaCertArgsDict: TypeAlias = Mapping[str, Any]
1279
+
1280
+ @pulumi.input_type
1281
+ class ClusterManagedServerCaCaCertArgs:
1282
+ def __init__(__self__, *,
1283
+ certificates: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
1284
+ """
1285
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] certificates: (Output)
1286
+ The certificates that form the CA chain, from leaf to root order
1287
+ """
1288
+ if certificates is not None:
1289
+ pulumi.set(__self__, "certificates", certificates)
1290
+
1291
+ @property
1292
+ @pulumi.getter
1293
+ def certificates(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
1294
+ """
1295
+ (Output)
1296
+ The certificates that form the CA chain, from leaf to root order
1297
+ """
1298
+ return pulumi.get(self, "certificates")
1299
+
1300
+ @certificates.setter
1301
+ def certificates(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
1302
+ pulumi.set(self, "certificates", value)
1303
+
1304
+
1228
1305
  if not MYPY:
1229
1306
  class ClusterPersistenceConfigArgsDict(TypedDict):
1230
1307
  aof_config: NotRequired[pulumi.Input['ClusterPersistenceConfigAofConfigArgsDict']]
@@ -397,6 +397,7 @@ class _ClusterState:
397
397
  maintenance_policy: Optional[pulumi.Input['ClusterMaintenancePolicyArgs']] = None,
398
398
  maintenance_schedules: Optional[pulumi.Input[Sequence[pulumi.Input['ClusterMaintenanceScheduleArgs']]]] = None,
399
399
  managed_backup_source: Optional[pulumi.Input['ClusterManagedBackupSourceArgs']] = None,
400
+ managed_server_cas: Optional[pulumi.Input[Sequence[pulumi.Input['ClusterManagedServerCaArgs']]]] = None,
400
401
  name: Optional[pulumi.Input[builtins.str]] = None,
401
402
  node_type: Optional[pulumi.Input[builtins.str]] = None,
402
403
  persistence_config: Optional[pulumi.Input['ClusterPersistenceConfigArgs']] = None,
@@ -445,6 +446,8 @@ class _ClusterState:
445
446
  Structure is documented below.
446
447
  :param pulumi.Input['ClusterManagedBackupSourceArgs'] managed_backup_source: Backups that generated and managed by memorystore.
447
448
  Structure is documented below.
449
+ :param pulumi.Input[Sequence[pulumi.Input['ClusterManagedServerCaArgs']]] managed_server_cas: Cluster's Certificate Authority. This field will only be populated if Redis Cluster's transit_encryption_mode is TRANSIT_ENCRYPTION_MODE_SERVER_AUTHENTICATION
450
+ Structure is documented below.
448
451
  :param pulumi.Input[builtins.str] name: Unique name of the resource in this scope including project and location using the form:
449
452
  projects/{projectId}/locations/{locationId}/clusters/{clusterId}
450
453
 
@@ -508,6 +511,8 @@ class _ClusterState:
508
511
  pulumi.set(__self__, "maintenance_schedules", maintenance_schedules)
509
512
  if managed_backup_source is not None:
510
513
  pulumi.set(__self__, "managed_backup_source", managed_backup_source)
514
+ if managed_server_cas is not None:
515
+ pulumi.set(__self__, "managed_server_cas", managed_server_cas)
511
516
  if name is not None:
512
517
  pulumi.set(__self__, "name", name)
513
518
  if node_type is not None:
@@ -705,6 +710,19 @@ class _ClusterState:
705
710
  def managed_backup_source(self, value: Optional[pulumi.Input['ClusterManagedBackupSourceArgs']]):
706
711
  pulumi.set(self, "managed_backup_source", value)
707
712
 
713
+ @property
714
+ @pulumi.getter(name="managedServerCas")
715
+ def managed_server_cas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['ClusterManagedServerCaArgs']]]]:
716
+ """
717
+ Cluster's Certificate Authority. This field will only be populated if Redis Cluster's transit_encryption_mode is TRANSIT_ENCRYPTION_MODE_SERVER_AUTHENTICATION
718
+ Structure is documented below.
719
+ """
720
+ return pulumi.get(self, "managed_server_cas")
721
+
722
+ @managed_server_cas.setter
723
+ def managed_server_cas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['ClusterManagedServerCaArgs']]]]):
724
+ pulumi.set(self, "managed_server_cas", value)
725
+
708
726
  @property
709
727
  @pulumi.getter
710
728
  def name(self) -> Optional[pulumi.Input[builtins.str]]:
@@ -1914,6 +1932,7 @@ class Cluster(pulumi.CustomResource):
1914
1932
  __props__.__dict__["create_time"] = None
1915
1933
  __props__.__dict__["discovery_endpoints"] = None
1916
1934
  __props__.__dict__["maintenance_schedules"] = None
1935
+ __props__.__dict__["managed_server_cas"] = None
1917
1936
  __props__.__dict__["precise_size_gb"] = None
1918
1937
  __props__.__dict__["psc_connections"] = None
1919
1938
  __props__.__dict__["psc_service_attachments"] = None
@@ -1943,6 +1962,7 @@ class Cluster(pulumi.CustomResource):
1943
1962
  maintenance_policy: Optional[pulumi.Input[Union['ClusterMaintenancePolicyArgs', 'ClusterMaintenancePolicyArgsDict']]] = None,
1944
1963
  maintenance_schedules: Optional[pulumi.Input[Sequence[pulumi.Input[Union['ClusterMaintenanceScheduleArgs', 'ClusterMaintenanceScheduleArgsDict']]]]] = None,
1945
1964
  managed_backup_source: Optional[pulumi.Input[Union['ClusterManagedBackupSourceArgs', 'ClusterManagedBackupSourceArgsDict']]] = None,
1965
+ managed_server_cas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['ClusterManagedServerCaArgs', 'ClusterManagedServerCaArgsDict']]]]] = None,
1946
1966
  name: Optional[pulumi.Input[builtins.str]] = None,
1947
1967
  node_type: Optional[pulumi.Input[builtins.str]] = None,
1948
1968
  persistence_config: Optional[pulumi.Input[Union['ClusterPersistenceConfigArgs', 'ClusterPersistenceConfigArgsDict']]] = None,
@@ -1996,6 +2016,8 @@ class Cluster(pulumi.CustomResource):
1996
2016
  Structure is documented below.
1997
2017
  :param pulumi.Input[Union['ClusterManagedBackupSourceArgs', 'ClusterManagedBackupSourceArgsDict']] managed_backup_source: Backups that generated and managed by memorystore.
1998
2018
  Structure is documented below.
2019
+ :param pulumi.Input[Sequence[pulumi.Input[Union['ClusterManagedServerCaArgs', 'ClusterManagedServerCaArgsDict']]]] managed_server_cas: Cluster's Certificate Authority. This field will only be populated if Redis Cluster's transit_encryption_mode is TRANSIT_ENCRYPTION_MODE_SERVER_AUTHENTICATION
2020
+ Structure is documented below.
1999
2021
  :param pulumi.Input[builtins.str] name: Unique name of the resource in this scope including project and location using the form:
2000
2022
  projects/{projectId}/locations/{locationId}/clusters/{clusterId}
2001
2023
 
@@ -2051,6 +2073,7 @@ class Cluster(pulumi.CustomResource):
2051
2073
  __props__.__dict__["maintenance_policy"] = maintenance_policy
2052
2074
  __props__.__dict__["maintenance_schedules"] = maintenance_schedules
2053
2075
  __props__.__dict__["managed_backup_source"] = managed_backup_source
2076
+ __props__.__dict__["managed_server_cas"] = managed_server_cas
2054
2077
  __props__.__dict__["name"] = name
2055
2078
  __props__.__dict__["node_type"] = node_type
2056
2079
  __props__.__dict__["persistence_config"] = persistence_config
@@ -2183,6 +2206,15 @@ class Cluster(pulumi.CustomResource):
2183
2206
  """
2184
2207
  return pulumi.get(self, "managed_backup_source")
2185
2208
 
2209
+ @property
2210
+ @pulumi.getter(name="managedServerCas")
2211
+ def managed_server_cas(self) -> pulumi.Output[Sequence['outputs.ClusterManagedServerCa']]:
2212
+ """
2213
+ Cluster's Certificate Authority. This field will only be populated if Redis Cluster's transit_encryption_mode is TRANSIT_ENCRYPTION_MODE_SERVER_AUTHENTICATION
2214
+ Structure is documented below.
2215
+ """
2216
+ return pulumi.get(self, "managed_server_cas")
2217
+
2186
2218
  @property
2187
2219
  @pulumi.getter
2188
2220
  def name(self) -> pulumi.Output[builtins.str]:
@@ -34,6 +34,8 @@ __all__ = [
34
34
  'ClusterMaintenancePolicyWeeklyMaintenanceWindowStartTime',
35
35
  'ClusterMaintenanceSchedule',
36
36
  'ClusterManagedBackupSource',
37
+ 'ClusterManagedServerCa',
38
+ 'ClusterManagedServerCaCaCert',
37
39
  'ClusterPersistenceConfig',
38
40
  'ClusterPersistenceConfigAofConfig',
39
41
  'ClusterPersistenceConfigRdbConfig',
@@ -899,6 +901,67 @@ class ClusterManagedBackupSource(dict):
899
901
  return pulumi.get(self, "backup")
900
902
 
901
903
 
904
+ @pulumi.output_type
905
+ class ClusterManagedServerCa(dict):
906
+ @staticmethod
907
+ def __key_warning(key: str):
908
+ suggest = None
909
+ if key == "caCerts":
910
+ suggest = "ca_certs"
911
+
912
+ if suggest:
913
+ pulumi.log.warn(f"Key '{key}' not found in ClusterManagedServerCa. Access the value via the '{suggest}' property getter instead.")
914
+
915
+ def __getitem__(self, key: str) -> Any:
916
+ ClusterManagedServerCa.__key_warning(key)
917
+ return super().__getitem__(key)
918
+
919
+ def get(self, key: str, default = None) -> Any:
920
+ ClusterManagedServerCa.__key_warning(key)
921
+ return super().get(key, default)
922
+
923
+ def __init__(__self__, *,
924
+ ca_certs: Optional[Sequence['outputs.ClusterManagedServerCaCaCert']] = None):
925
+ """
926
+ :param Sequence['ClusterManagedServerCaCaCertArgs'] ca_certs: (Output)
927
+ The PEM encoded CA certificate chains for redis managed server authentication
928
+ Structure is documented below.
929
+ """
930
+ if ca_certs is not None:
931
+ pulumi.set(__self__, "ca_certs", ca_certs)
932
+
933
+ @property
934
+ @pulumi.getter(name="caCerts")
935
+ def ca_certs(self) -> Optional[Sequence['outputs.ClusterManagedServerCaCaCert']]:
936
+ """
937
+ (Output)
938
+ The PEM encoded CA certificate chains for redis managed server authentication
939
+ Structure is documented below.
940
+ """
941
+ return pulumi.get(self, "ca_certs")
942
+
943
+
944
+ @pulumi.output_type
945
+ class ClusterManagedServerCaCaCert(dict):
946
+ def __init__(__self__, *,
947
+ certificates: Optional[Sequence[builtins.str]] = None):
948
+ """
949
+ :param Sequence[builtins.str] certificates: (Output)
950
+ The certificates that form the CA chain, from leaf to root order
951
+ """
952
+ if certificates is not None:
953
+ pulumi.set(__self__, "certificates", certificates)
954
+
955
+ @property
956
+ @pulumi.getter
957
+ def certificates(self) -> Optional[Sequence[builtins.str]]:
958
+ """
959
+ (Output)
960
+ The certificates that form the CA chain, from leaf to root order
961
+ """
962
+ return pulumi.get(self, "certificates")
963
+
964
+
902
965
  @pulumi.output_type
903
966
  class ClusterPersistenceConfig(dict):
904
967
  @staticmethod
@@ -732,7 +732,7 @@ class AiEndpoint(pulumi.CustomResource):
732
732
 
733
733
  project = gcp.organizations.get_project()
734
734
  endpoint = gcp.vertex.AiEndpoint("endpoint",
735
- name="endpoint-name_10719",
735
+ name="endpoint-name_1443",
736
736
  display_name="sample-endpoint",
737
737
  description="A sample vertex endpoint",
738
738
  location="us-central1",
@@ -753,7 +753,7 @@ class AiEndpoint(pulumi.CustomResource):
753
753
  import pulumi_gcp as gcp
754
754
 
755
755
  endpoint = gcp.vertex.AiEndpoint("endpoint",
756
- name="endpoint-name_1443",
756
+ name="endpoint-name_26032",
757
757
  display_name="sample-endpoint",
758
758
  description="A sample vertex endpoint",
759
759
  location="us-central1",
@@ -898,7 +898,7 @@ class AiEndpoint(pulumi.CustomResource):
898
898
 
899
899
  project = gcp.organizations.get_project()
900
900
  endpoint = gcp.vertex.AiEndpoint("endpoint",
901
- name="endpoint-name_10719",
901
+ name="endpoint-name_1443",
902
902
  display_name="sample-endpoint",
903
903
  description="A sample vertex endpoint",
904
904
  location="us-central1",
@@ -919,7 +919,7 @@ class AiEndpoint(pulumi.CustomResource):
919
919
  import pulumi_gcp as gcp
920
920
 
921
921
  endpoint = gcp.vertex.AiEndpoint("endpoint",
922
- name="endpoint-name_1443",
922
+ name="endpoint-name_26032",
923
923
  display_name="sample-endpoint",
924
924
  description="A sample vertex endpoint",
925
925
  location="us-central1",
@@ -621,8 +621,8 @@ class AiFeatureOnlineStoreFeatureview(pulumi.CustomResource):
621
621
 
622
622
  test_project = gcp.organizations.get_project()
623
623
  project = gcp.organizations.Project("project",
624
- project_id="tf-test_26032",
625
- name="tf-test_8647",
624
+ project_id="tf-test_8647",
625
+ name="tf-test_50610",
626
626
  org_id="123456789",
627
627
  billing_account="000000-0000000-0000000-000000",
628
628
  deletion_policy="DELETE")
@@ -1060,8 +1060,8 @@ class AiFeatureOnlineStoreFeatureview(pulumi.CustomResource):
1060
1060
 
1061
1061
  test_project = gcp.organizations.get_project()
1062
1062
  project = gcp.organizations.Project("project",
1063
- project_id="tf-test_26032",
1064
- name="tf-test_8647",
1063
+ project_id="tf-test_8647",
1064
+ name="tf-test_50610",
1065
1065
  org_id="123456789",
1066
1066
  billing_account="000000-0000000-0000000-000000",
1067
1067
  deletion_policy="DELETE")