pulumi-gcp 8.42.0a1758133038__py3-none-any.whl → 9.0.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +83 -48
- pulumi_gcp/activedirectory/peering.py +16 -0
- pulumi_gcp/alloydb/backup.py +8 -4
- pulumi_gcp/alloydb/cluster.py +56 -10
- pulumi_gcp/alloydb/get_cluster.py +12 -1
- pulumi_gcp/alloydb/instance.py +10 -4
- pulumi_gcp/alloydb/user.py +8 -4
- pulumi_gcp/apigateway/api_config_iam_binding.py +4 -4
- pulumi_gcp/apigateway/api_config_iam_member.py +4 -4
- pulumi_gcp/apigateway/api_config_iam_policy.py +4 -4
- pulumi_gcp/apigateway/api_iam_binding.py +4 -4
- pulumi_gcp/apigateway/api_iam_member.py +4 -4
- pulumi_gcp/apigateway/api_iam_policy.py +4 -4
- pulumi_gcp/apigateway/gateway_iam_binding.py +4 -4
- pulumi_gcp/apigateway/gateway_iam_member.py +4 -4
- pulumi_gcp/apigateway/gateway_iam_policy.py +4 -4
- pulumi_gcp/apigee/_inputs.py +151 -108
- pulumi_gcp/apigee/keystores_aliases_key_cert_file.py +52 -40
- pulumi_gcp/apigee/outputs.py +92 -88
- pulumi_gcp/artifactregistry/__init__.py +2 -0
- pulumi_gcp/artifactregistry/_inputs.py +0 -12
- pulumi_gcp/artifactregistry/get_npm_package.py +251 -0
- pulumi_gcp/artifactregistry/get_python_package.py +237 -0
- pulumi_gcp/artifactregistry/get_repository.py +12 -1
- pulumi_gcp/artifactregistry/outputs.py +8 -16
- pulumi_gcp/artifactregistry/repository.py +28 -0
- pulumi_gcp/backupdisasterrecovery/__init__.py +1 -0
- pulumi_gcp/backupdisasterrecovery/backup_plan.py +4 -4
- pulumi_gcp/backupdisasterrecovery/get_backup.py +12 -1
- pulumi_gcp/backupdisasterrecovery/get_backup_plan_association.py +4 -0
- pulumi_gcp/backupdisasterrecovery/get_data_source_references.py +135 -0
- pulumi_gcp/backupdisasterrecovery/get_management_server.py +4 -0
- pulumi_gcp/backupdisasterrecovery/outputs.py +103 -0
- pulumi_gcp/beyondcorp/__init__.py +0 -5
- pulumi_gcp/beyondcorp/_inputs.py +0 -312
- pulumi_gcp/beyondcorp/outputs.py +0 -200
- pulumi_gcp/bigquery/_inputs.py +114 -4
- pulumi_gcp/bigquery/app_profile.py +3 -5
- pulumi_gcp/bigquery/outputs.py +75 -5
- pulumi_gcp/bigqueryanalyticshub/data_exchange_subscription.py +20 -0
- pulumi_gcp/bigtable/app_profile.py +1 -1
- pulumi_gcp/bigtable/get_table_iam_policy.py +16 -18
- pulumi_gcp/bigtable/table_iam_binding.py +43 -43
- pulumi_gcp/bigtable/table_iam_member.py +43 -43
- pulumi_gcp/bigtable/table_iam_policy.py +43 -43
- pulumi_gcp/billing/_inputs.py +0 -6
- pulumi_gcp/billing/outputs.py +0 -4
- pulumi_gcp/certificatemanager/__init__.py +1 -0
- pulumi_gcp/certificatemanager/certificate_map_entry.py +7 -7
- pulumi_gcp/certificatemanager/get_dns_authorization.py +229 -0
- pulumi_gcp/certificatemanager/outputs.py +41 -0
- pulumi_gcp/chronicle/_inputs.py +6 -5
- pulumi_gcp/chronicle/outputs.py +4 -3
- pulumi_gcp/chronicle/reference_list.py +53 -5
- pulumi_gcp/cloudasset/get_resources_search_all.py +8 -0
- pulumi_gcp/cloudbuild/_inputs.py +309 -45
- pulumi_gcp/cloudbuild/bitbucket_server_config.py +2 -6
- pulumi_gcp/cloudbuild/get_trigger.py +12 -1
- pulumi_gcp/cloudbuild/outputs.py +380 -30
- pulumi_gcp/cloudbuild/trigger.py +160 -2
- pulumi_gcp/cloudbuild/worker_pool.py +2 -6
- pulumi_gcp/cloudfunctionsv2/_inputs.py +23 -21
- pulumi_gcp/cloudfunctionsv2/outputs.py +17 -16
- pulumi_gcp/cloudquota/s_quota_adjuster_settings.py +16 -0
- pulumi_gcp/cloudrunv2/_inputs.py +80 -26
- pulumi_gcp/cloudrunv2/get_service.py +12 -1
- pulumi_gcp/cloudrunv2/outputs.py +109 -30
- pulumi_gcp/cloudrunv2/service.py +72 -12
- pulumi_gcp/cloudrunv2/worker_pool.py +2 -2
- pulumi_gcp/cloudtasks/queue.py +98 -2
- pulumi_gcp/colab/_inputs.py +1 -114
- pulumi_gcp/colab/outputs.py +1 -106
- pulumi_gcp/compute/_inputs.py +884 -24
- pulumi_gcp/compute/backend_bucket.py +68 -0
- pulumi_gcp/compute/backend_bucket_iam_binding.py +236 -0
- pulumi_gcp/compute/backend_bucket_iam_member.py +236 -0
- pulumi_gcp/compute/backend_bucket_iam_policy.py +236 -0
- pulumi_gcp/compute/backend_service.py +54 -0
- pulumi_gcp/compute/backend_service_iam_binding.py +464 -0
- pulumi_gcp/compute/backend_service_iam_member.py +464 -0
- pulumi_gcp/compute/backend_service_iam_policy.py +464 -0
- pulumi_gcp/compute/cross_site_network.py +16 -0
- pulumi_gcp/compute/future_reservation.py +32 -0
- pulumi_gcp/compute/get_backend_bucket.py +12 -1
- pulumi_gcp/compute/get_backend_service.py +12 -1
- pulumi_gcp/compute/get_region_backend_service.py +12 -1
- pulumi_gcp/compute/get_resource_policy.py +2 -20
- pulumi_gcp/compute/machine_image_iam_binding.py +8 -4
- pulumi_gcp/compute/machine_image_iam_member.py +8 -4
- pulumi_gcp/compute/machine_image_iam_policy.py +8 -4
- pulumi_gcp/compute/network_edge_security_service.py +16 -0
- pulumi_gcp/compute/network_firewall_policy_packet_mirroring_rule.py +12 -0
- pulumi_gcp/compute/network_peering_routes_config.py +0 -100
- pulumi_gcp/compute/organization_security_policy.py +83 -51
- pulumi_gcp/compute/outputs.py +799 -16
- pulumi_gcp/compute/packet_mirroring.py +6 -0
- pulumi_gcp/compute/preview_feature.py +16 -0
- pulumi_gcp/compute/public_delegated_prefix.py +42 -0
- pulumi_gcp/compute/region_backend_service.py +54 -0
- pulumi_gcp/compute/region_backend_service_iam_binding.py +488 -0
- pulumi_gcp/compute/region_backend_service_iam_member.py +488 -0
- pulumi_gcp/compute/region_backend_service_iam_policy.py +488 -0
- pulumi_gcp/compute/region_network_endpoint_group.py +1 -3
- pulumi_gcp/compute/region_resize_request.py +24 -0
- pulumi_gcp/compute/region_url_map.py +75 -0
- pulumi_gcp/compute/subnetwork.py +0 -98
- pulumi_gcp/compute/wire_group.py +16 -0
- pulumi_gcp/config/__init__.pyi +2 -2
- pulumi_gcp/config/vars.py +4 -4
- pulumi_gcp/container/_inputs.py +466 -18
- pulumi_gcp/container/cluster.py +16 -7
- pulumi_gcp/container/outputs.py +448 -15
- pulumi_gcp/databasemigrationservice/connection_profile.py +4 -2
- pulumi_gcp/databasemigrationservice/migration_job.py +4 -2
- pulumi_gcp/dataflow/flex_template_job.py +10 -0
- pulumi_gcp/dataform/repository.py +16 -0
- pulumi_gcp/dataform/repository_release_config.py +16 -0
- pulumi_gcp/dataform/repository_workflow_config.py +16 -0
- pulumi_gcp/diagflow/_inputs.py +152 -0
- pulumi_gcp/diagflow/cx_agent.py +425 -0
- pulumi_gcp/diagflow/outputs.py +143 -0
- pulumi_gcp/discoveryengine/__init__.py +1 -0
- pulumi_gcp/discoveryengine/_inputs.py +94 -0
- pulumi_gcp/discoveryengine/acl_config.py +393 -0
- pulumi_gcp/discoveryengine/outputs.py +92 -0
- pulumi_gcp/firebase/android_app.py +16 -0
- pulumi_gcp/firebase/app_check_play_integrity_config.py +4 -8
- pulumi_gcp/firebase/app_check_recaptcha_enterprise_config.py +2 -4
- pulumi_gcp/firebase/app_check_service_config.py +6 -12
- pulumi_gcp/firebase/app_hosting_backend.py +4 -8
- pulumi_gcp/firebase/app_hosting_build.py +4 -8
- pulumi_gcp/firebase/app_hosting_traffic.py +6 -12
- pulumi_gcp/firebase/apple_app.py +16 -0
- pulumi_gcp/firebase/data_connect_service.py +4 -8
- pulumi_gcp/firebase/database_instance.py +20 -8
- pulumi_gcp/firebase/extensions_instance.py +12 -0
- pulumi_gcp/firebase/get_android_app.py +4 -2
- pulumi_gcp/firebase/get_apple_app.py +4 -2
- pulumi_gcp/firebase/get_apple_app_config.py +16 -2
- pulumi_gcp/firebase/get_hosting_channel.py +4 -2
- pulumi_gcp/firebase/hosting_channel.py +20 -0
- pulumi_gcp/firebase/hosting_custom_domain.py +20 -0
- pulumi_gcp/firebase/hosting_release.py +16 -0
- pulumi_gcp/firebase/hosting_site.py +16 -0
- pulumi_gcp/firebase/hosting_version.py +16 -0
- pulumi_gcp/firebase/storage_bucket.py +18 -0
- pulumi_gcp/firestore/index.py +118 -3
- pulumi_gcp/folder/service_identity.py +26 -0
- pulumi_gcp/gkehub/_inputs.py +0 -60
- pulumi_gcp/gkehub/get_membership.py +1 -12
- pulumi_gcp/gkehub/membership.py +0 -70
- pulumi_gcp/gkehub/membership_rbac_role_binding.py +16 -0
- pulumi_gcp/gkehub/outputs.py +0 -36
- pulumi_gcp/healthcare/_inputs.py +205 -0
- pulumi_gcp/healthcare/fhir_store.py +128 -0
- pulumi_gcp/healthcare/outputs.py +163 -0
- pulumi_gcp/iam/workload_identity_pool_iam_binding.py +464 -0
- pulumi_gcp/iam/workload_identity_pool_iam_member.py +464 -0
- pulumi_gcp/iam/workload_identity_pool_iam_policy.py +464 -0
- pulumi_gcp/iam/workload_identity_pool_managed_identity.py +18 -0
- pulumi_gcp/iam/workload_identity_pool_namespace.py +20 -0
- pulumi_gcp/iap/__init__.py +8 -0
- pulumi_gcp/iap/_inputs.py +260 -0
- pulumi_gcp/iap/get_web_forwarding_rule_service_iam_policy.py +159 -0
- pulumi_gcp/iap/get_web_region_forwarding_rule_service_iam_policy.py +182 -0
- pulumi_gcp/iap/outputs.py +152 -0
- pulumi_gcp/{beyondcorp/application_iam_binding.py → iap/web_forwarding_rule_service_iam_binding.py} +233 -315
- pulumi_gcp/{beyondcorp/application_iam_member.py → iap/web_forwarding_rule_service_iam_member.py} +233 -315
- pulumi_gcp/{beyondcorp/application_iam_policy.py → iap/web_forwarding_rule_service_iam_policy.py} +212 -294
- pulumi_gcp/iap/web_region_forwarding_rule_service_iam_binding.py +1091 -0
- pulumi_gcp/iap/web_region_forwarding_rule_service_iam_member.py +1091 -0
- pulumi_gcp/iap/web_region_forwarding_rule_service_iam_policy.py +910 -0
- pulumi_gcp/kms/autokey_config.py +0 -2
- pulumi_gcp/kms/get_kms_secret_asymmetric.py +22 -0
- pulumi_gcp/kms/key_handle.py +0 -2
- pulumi_gcp/logging/organization_sink.py +7 -7
- pulumi_gcp/managedkafka/connect_cluster.py +4 -0
- pulumi_gcp/managedkafka/connector.py +4 -0
- pulumi_gcp/memorystore/get_instance.py +1 -12
- pulumi_gcp/memorystore/instance.py +14 -84
- pulumi_gcp/netapp/storage_pool.py +91 -2
- pulumi_gcp/netapp/volume.py +47 -0
- pulumi_gcp/networkmanagement/__init__.py +1 -0
- pulumi_gcp/networkmanagement/organization_vpc_flow_logs_config.py +1028 -0
- pulumi_gcp/networksecurity/authorization_policy.py +12 -0
- pulumi_gcp/networkservices/gateway.py +7 -7
- pulumi_gcp/networkservices/lb_traffic_extension.py +24 -23
- pulumi_gcp/networkservices/service_lb_policies.py +12 -0
- pulumi_gcp/notebooks/__init__.py +0 -1
- pulumi_gcp/oracledatabase/autonomous_database.py +2 -2
- pulumi_gcp/oracledatabase/cloud_vm_cluster.py +3 -3
- pulumi_gcp/projects/service.py +2 -11
- pulumi_gcp/provider.py +20 -20
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/redis/cluster.py +0 -70
- pulumi_gcp/redis/get_cluster.py +1 -12
- pulumi_gcp/resourcemanager/capability.py +16 -0
- pulumi_gcp/runtimeconfig/config.py +16 -0
- pulumi_gcp/runtimeconfig/config_iam_binding.py +236 -0
- pulumi_gcp/runtimeconfig/config_iam_member.py +236 -0
- pulumi_gcp/runtimeconfig/config_iam_policy.py +236 -0
- pulumi_gcp/runtimeconfig/variable.py +10 -0
- pulumi_gcp/saasruntime/__init__.py +12 -0
- pulumi_gcp/saasruntime/_inputs.py +513 -0
- pulumi_gcp/saasruntime/outputs.py +431 -0
- pulumi_gcp/saasruntime/saa_s.py +819 -0
- pulumi_gcp/saasruntime/unit_kind.py +1024 -0
- pulumi_gcp/securesourcemanager/_inputs.py +20 -19
- pulumi_gcp/securesourcemanager/instance.py +7 -7
- pulumi_gcp/securesourcemanager/outputs.py +15 -14
- pulumi_gcp/securesourcemanager/repository.py +7 -7
- pulumi_gcp/serviceaccount/get_account_key.py +1 -21
- pulumi_gcp/servicedirectory/namespace_iam_binding.py +4 -4
- pulumi_gcp/servicedirectory/namespace_iam_member.py +4 -4
- pulumi_gcp/servicedirectory/namespace_iam_policy.py +4 -4
- pulumi_gcp/servicedirectory/service_iam_binding.py +4 -4
- pulumi_gcp/servicedirectory/service_iam_member.py +4 -4
- pulumi_gcp/servicedirectory/service_iam_policy.py +4 -4
- pulumi_gcp/sql/_inputs.py +135 -1
- pulumi_gcp/sql/database_instance.py +94 -0
- pulumi_gcp/sql/get_database_instance.py +23 -1
- pulumi_gcp/sql/outputs.py +276 -3
- pulumi_gcp/sql/user.py +61 -0
- pulumi_gcp/storage/_inputs.py +253 -7
- pulumi_gcp/storage/bucket_object.py +0 -9
- pulumi_gcp/storage/outputs.py +198 -8
- pulumi_gcp/storage/transfer_job.py +47 -0
- pulumi_gcp/tpu/__init__.py +0 -2
- pulumi_gcp/tpu/_inputs.py +0 -93
- pulumi_gcp/tpu/outputs.py +0 -72
- pulumi_gcp/tpu/v2_queued_resource.py +16 -0
- pulumi_gcp/tpu/v2_vm.py +16 -0
- pulumi_gcp/vertex/_inputs.py +8 -9
- pulumi_gcp/vertex/ai_endpoint.py +2 -4
- pulumi_gcp/vertex/ai_feature_group_iam_binding.py +236 -0
- pulumi_gcp/vertex/ai_feature_group_iam_member.py +236 -0
- pulumi_gcp/vertex/ai_feature_group_iam_policy.py +236 -0
- pulumi_gcp/vertex/ai_feature_online_store_featureview.py +0 -2
- pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_binding.py +248 -0
- pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_member.py +248 -0
- pulumi_gcp/vertex/ai_feature_online_store_featureview_iam_policy.py +248 -0
- pulumi_gcp/vertex/ai_feature_online_store_iam_binding.py +236 -0
- pulumi_gcp/vertex/ai_feature_online_store_iam_member.py +236 -0
- pulumi_gcp/vertex/ai_feature_online_store_iam_policy.py +236 -0
- pulumi_gcp/vertex/ai_feature_store_entity_type_iam_binding.py +238 -0
- pulumi_gcp/vertex/ai_feature_store_entity_type_iam_member.py +238 -0
- pulumi_gcp/vertex/ai_feature_store_entity_type_iam_policy.py +238 -0
- pulumi_gcp/vertex/ai_feature_store_iam_binding.py +248 -0
- pulumi_gcp/vertex/ai_feature_store_iam_member.py +248 -0
- pulumi_gcp/vertex/ai_feature_store_iam_policy.py +248 -0
- pulumi_gcp/vertex/ai_index.py +24 -23
- pulumi_gcp/vertex/ai_metadata_store.py +16 -0
- pulumi_gcp/vertex/outputs.py +7 -8
- pulumi_gcp/workstations/workstation.py +16 -0
- pulumi_gcp/workstations/workstation_cluster.py +16 -0
- pulumi_gcp/workstations/workstation_config.py +16 -0
- pulumi_gcp/workstations/workstation_config_iam_binding.py +260 -0
- pulumi_gcp/workstations/workstation_config_iam_member.py +260 -0
- pulumi_gcp/workstations/workstation_config_iam_policy.py +260 -0
- pulumi_gcp/workstations/workstation_iam_binding.py +272 -0
- pulumi_gcp/workstations/workstation_iam_member.py +272 -0
- pulumi_gcp/workstations/workstation_iam_policy.py +272 -0
- {pulumi_gcp-8.42.0a1758133038.dist-info → pulumi_gcp-9.0.0.dist-info}/METADATA +1 -1
- {pulumi_gcp-8.42.0a1758133038.dist-info → pulumi_gcp-9.0.0.dist-info}/RECORD +266 -255
- pulumi_gcp/beyondcorp/application.py +0 -746
- pulumi_gcp/beyondcorp/get_application_iam_policy.py +0 -182
- pulumi_gcp/notebooks/location.py +0 -285
- pulumi_gcp/tpu/get_tensorflow_versions.py +0 -184
- pulumi_gcp/tpu/node.py +0 -1062
- {pulumi_gcp-8.42.0a1758133038.dist-info → pulumi_gcp-9.0.0.dist-info}/WHEEL +0 -0
- {pulumi_gcp-8.42.0a1758133038.dist-info → pulumi_gcp-9.0.0.dist-info}/top_level.txt +0 -0
@@ -265,6 +265,124 @@ class BackendBucketIamMember(pulumi.CustomResource):
|
|
265
265
|
role: Optional[pulumi.Input[_builtins.str]] = None,
|
266
266
|
__props__=None):
|
267
267
|
"""
|
268
|
+
Three different resources help you manage your IAM policy for Compute Engine BackendBucket. Each of these resources serves a different use case:
|
269
|
+
|
270
|
+
* `compute.BackendBucketIamPolicy`: Authoritative. Sets the IAM policy for the backendbucket and replaces any existing policy already attached.
|
271
|
+
* `compute.BackendBucketIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backendbucket are preserved.
|
272
|
+
* `compute.BackendBucketIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backendbucket are preserved.
|
273
|
+
|
274
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
275
|
+
|
276
|
+
* `compute.BackendBucketIamPolicy`: Retrieves the IAM policy for the backendbucket
|
277
|
+
|
278
|
+
> **Note:** `compute.BackendBucketIamPolicy` **cannot** be used in conjunction with `compute.BackendBucketIamBinding` and `compute.BackendBucketIamMember` or they will fight over what your policy should be.
|
279
|
+
|
280
|
+
> **Note:** `compute.BackendBucketIamBinding` resources **can be** used in conjunction with `compute.BackendBucketIamMember` resources **only if** they do not grant privilege to the same role.
|
281
|
+
|
282
|
+
## compute.BackendBucketIamPolicy
|
283
|
+
|
284
|
+
```python
|
285
|
+
import pulumi
|
286
|
+
import pulumi_gcp as gcp
|
287
|
+
|
288
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
289
|
+
"role": "roles/viewer",
|
290
|
+
"members": ["user:jane@example.com"],
|
291
|
+
}])
|
292
|
+
policy = gcp.compute.BackendBucketIamPolicy("policy",
|
293
|
+
project=image_backend["project"],
|
294
|
+
name=image_backend["name"],
|
295
|
+
policy_data=admin.policy_data)
|
296
|
+
```
|
297
|
+
|
298
|
+
## compute.BackendBucketIamBinding
|
299
|
+
|
300
|
+
```python
|
301
|
+
import pulumi
|
302
|
+
import pulumi_gcp as gcp
|
303
|
+
|
304
|
+
binding = gcp.compute.BackendBucketIamBinding("binding",
|
305
|
+
project=image_backend["project"],
|
306
|
+
name=image_backend["name"],
|
307
|
+
role="roles/viewer",
|
308
|
+
members=["user:jane@example.com"])
|
309
|
+
```
|
310
|
+
|
311
|
+
## compute.BackendBucketIamMember
|
312
|
+
|
313
|
+
```python
|
314
|
+
import pulumi
|
315
|
+
import pulumi_gcp as gcp
|
316
|
+
|
317
|
+
member = gcp.compute.BackendBucketIamMember("member",
|
318
|
+
project=image_backend["project"],
|
319
|
+
name=image_backend["name"],
|
320
|
+
role="roles/viewer",
|
321
|
+
member="user:jane@example.com")
|
322
|
+
```
|
323
|
+
|
324
|
+
## This resource supports User Project Overrides.
|
325
|
+
|
326
|
+
-
|
327
|
+
|
328
|
+
# IAM policy for Compute Engine BackendBucket
|
329
|
+
|
330
|
+
Three different resources help you manage your IAM policy for Compute Engine BackendBucket. Each of these resources serves a different use case:
|
331
|
+
|
332
|
+
* `compute.BackendBucketIamPolicy`: Authoritative. Sets the IAM policy for the backendbucket and replaces any existing policy already attached.
|
333
|
+
* `compute.BackendBucketIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backendbucket are preserved.
|
334
|
+
* `compute.BackendBucketIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backendbucket are preserved.
|
335
|
+
|
336
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
337
|
+
|
338
|
+
* `compute.BackendBucketIamPolicy`: Retrieves the IAM policy for the backendbucket
|
339
|
+
|
340
|
+
> **Note:** `compute.BackendBucketIamPolicy` **cannot** be used in conjunction with `compute.BackendBucketIamBinding` and `compute.BackendBucketIamMember` or they will fight over what your policy should be.
|
341
|
+
|
342
|
+
> **Note:** `compute.BackendBucketIamBinding` resources **can be** used in conjunction with `compute.BackendBucketIamMember` resources **only if** they do not grant privilege to the same role.
|
343
|
+
|
344
|
+
## compute.BackendBucketIamPolicy
|
345
|
+
|
346
|
+
```python
|
347
|
+
import pulumi
|
348
|
+
import pulumi_gcp as gcp
|
349
|
+
|
350
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
351
|
+
"role": "roles/viewer",
|
352
|
+
"members": ["user:jane@example.com"],
|
353
|
+
}])
|
354
|
+
policy = gcp.compute.BackendBucketIamPolicy("policy",
|
355
|
+
project=image_backend["project"],
|
356
|
+
name=image_backend["name"],
|
357
|
+
policy_data=admin.policy_data)
|
358
|
+
```
|
359
|
+
|
360
|
+
## compute.BackendBucketIamBinding
|
361
|
+
|
362
|
+
```python
|
363
|
+
import pulumi
|
364
|
+
import pulumi_gcp as gcp
|
365
|
+
|
366
|
+
binding = gcp.compute.BackendBucketIamBinding("binding",
|
367
|
+
project=image_backend["project"],
|
368
|
+
name=image_backend["name"],
|
369
|
+
role="roles/viewer",
|
370
|
+
members=["user:jane@example.com"])
|
371
|
+
```
|
372
|
+
|
373
|
+
## compute.BackendBucketIamMember
|
374
|
+
|
375
|
+
```python
|
376
|
+
import pulumi
|
377
|
+
import pulumi_gcp as gcp
|
378
|
+
|
379
|
+
member = gcp.compute.BackendBucketIamMember("member",
|
380
|
+
project=image_backend["project"],
|
381
|
+
name=image_backend["name"],
|
382
|
+
role="roles/viewer",
|
383
|
+
member="user:jane@example.com")
|
384
|
+
```
|
385
|
+
|
268
386
|
## Import
|
269
387
|
|
270
388
|
For all import syntaxes, the "resource in question" can take any of the following forms:
|
@@ -328,6 +446,124 @@ class BackendBucketIamMember(pulumi.CustomResource):
|
|
328
446
|
args: BackendBucketIamMemberArgs,
|
329
447
|
opts: Optional[pulumi.ResourceOptions] = None):
|
330
448
|
"""
|
449
|
+
Three different resources help you manage your IAM policy for Compute Engine BackendBucket. Each of these resources serves a different use case:
|
450
|
+
|
451
|
+
* `compute.BackendBucketIamPolicy`: Authoritative. Sets the IAM policy for the backendbucket and replaces any existing policy already attached.
|
452
|
+
* `compute.BackendBucketIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backendbucket are preserved.
|
453
|
+
* `compute.BackendBucketIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backendbucket are preserved.
|
454
|
+
|
455
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
456
|
+
|
457
|
+
* `compute.BackendBucketIamPolicy`: Retrieves the IAM policy for the backendbucket
|
458
|
+
|
459
|
+
> **Note:** `compute.BackendBucketIamPolicy` **cannot** be used in conjunction with `compute.BackendBucketIamBinding` and `compute.BackendBucketIamMember` or they will fight over what your policy should be.
|
460
|
+
|
461
|
+
> **Note:** `compute.BackendBucketIamBinding` resources **can be** used in conjunction with `compute.BackendBucketIamMember` resources **only if** they do not grant privilege to the same role.
|
462
|
+
|
463
|
+
## compute.BackendBucketIamPolicy
|
464
|
+
|
465
|
+
```python
|
466
|
+
import pulumi
|
467
|
+
import pulumi_gcp as gcp
|
468
|
+
|
469
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
470
|
+
"role": "roles/viewer",
|
471
|
+
"members": ["user:jane@example.com"],
|
472
|
+
}])
|
473
|
+
policy = gcp.compute.BackendBucketIamPolicy("policy",
|
474
|
+
project=image_backend["project"],
|
475
|
+
name=image_backend["name"],
|
476
|
+
policy_data=admin.policy_data)
|
477
|
+
```
|
478
|
+
|
479
|
+
## compute.BackendBucketIamBinding
|
480
|
+
|
481
|
+
```python
|
482
|
+
import pulumi
|
483
|
+
import pulumi_gcp as gcp
|
484
|
+
|
485
|
+
binding = gcp.compute.BackendBucketIamBinding("binding",
|
486
|
+
project=image_backend["project"],
|
487
|
+
name=image_backend["name"],
|
488
|
+
role="roles/viewer",
|
489
|
+
members=["user:jane@example.com"])
|
490
|
+
```
|
491
|
+
|
492
|
+
## compute.BackendBucketIamMember
|
493
|
+
|
494
|
+
```python
|
495
|
+
import pulumi
|
496
|
+
import pulumi_gcp as gcp
|
497
|
+
|
498
|
+
member = gcp.compute.BackendBucketIamMember("member",
|
499
|
+
project=image_backend["project"],
|
500
|
+
name=image_backend["name"],
|
501
|
+
role="roles/viewer",
|
502
|
+
member="user:jane@example.com")
|
503
|
+
```
|
504
|
+
|
505
|
+
## This resource supports User Project Overrides.
|
506
|
+
|
507
|
+
-
|
508
|
+
|
509
|
+
# IAM policy for Compute Engine BackendBucket
|
510
|
+
|
511
|
+
Three different resources help you manage your IAM policy for Compute Engine BackendBucket. Each of these resources serves a different use case:
|
512
|
+
|
513
|
+
* `compute.BackendBucketIamPolicy`: Authoritative. Sets the IAM policy for the backendbucket and replaces any existing policy already attached.
|
514
|
+
* `compute.BackendBucketIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backendbucket are preserved.
|
515
|
+
* `compute.BackendBucketIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backendbucket are preserved.
|
516
|
+
|
517
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
518
|
+
|
519
|
+
* `compute.BackendBucketIamPolicy`: Retrieves the IAM policy for the backendbucket
|
520
|
+
|
521
|
+
> **Note:** `compute.BackendBucketIamPolicy` **cannot** be used in conjunction with `compute.BackendBucketIamBinding` and `compute.BackendBucketIamMember` or they will fight over what your policy should be.
|
522
|
+
|
523
|
+
> **Note:** `compute.BackendBucketIamBinding` resources **can be** used in conjunction with `compute.BackendBucketIamMember` resources **only if** they do not grant privilege to the same role.
|
524
|
+
|
525
|
+
## compute.BackendBucketIamPolicy
|
526
|
+
|
527
|
+
```python
|
528
|
+
import pulumi
|
529
|
+
import pulumi_gcp as gcp
|
530
|
+
|
531
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
532
|
+
"role": "roles/viewer",
|
533
|
+
"members": ["user:jane@example.com"],
|
534
|
+
}])
|
535
|
+
policy = gcp.compute.BackendBucketIamPolicy("policy",
|
536
|
+
project=image_backend["project"],
|
537
|
+
name=image_backend["name"],
|
538
|
+
policy_data=admin.policy_data)
|
539
|
+
```
|
540
|
+
|
541
|
+
## compute.BackendBucketIamBinding
|
542
|
+
|
543
|
+
```python
|
544
|
+
import pulumi
|
545
|
+
import pulumi_gcp as gcp
|
546
|
+
|
547
|
+
binding = gcp.compute.BackendBucketIamBinding("binding",
|
548
|
+
project=image_backend["project"],
|
549
|
+
name=image_backend["name"],
|
550
|
+
role="roles/viewer",
|
551
|
+
members=["user:jane@example.com"])
|
552
|
+
```
|
553
|
+
|
554
|
+
## compute.BackendBucketIamMember
|
555
|
+
|
556
|
+
```python
|
557
|
+
import pulumi
|
558
|
+
import pulumi_gcp as gcp
|
559
|
+
|
560
|
+
member = gcp.compute.BackendBucketIamMember("member",
|
561
|
+
project=image_backend["project"],
|
562
|
+
name=image_backend["name"],
|
563
|
+
role="roles/viewer",
|
564
|
+
member="user:jane@example.com")
|
565
|
+
```
|
566
|
+
|
331
567
|
## Import
|
332
568
|
|
333
569
|
For all import syntaxes, the "resource in question" can take any of the following forms:
|
@@ -162,6 +162,124 @@ class BackendBucketIamPolicy(pulumi.CustomResource):
|
|
162
162
|
project: Optional[pulumi.Input[_builtins.str]] = None,
|
163
163
|
__props__=None):
|
164
164
|
"""
|
165
|
+
Three different resources help you manage your IAM policy for Compute Engine BackendBucket. Each of these resources serves a different use case:
|
166
|
+
|
167
|
+
* `compute.BackendBucketIamPolicy`: Authoritative. Sets the IAM policy for the backendbucket and replaces any existing policy already attached.
|
168
|
+
* `compute.BackendBucketIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backendbucket are preserved.
|
169
|
+
* `compute.BackendBucketIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backendbucket are preserved.
|
170
|
+
|
171
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
172
|
+
|
173
|
+
* `compute.BackendBucketIamPolicy`: Retrieves the IAM policy for the backendbucket
|
174
|
+
|
175
|
+
> **Note:** `compute.BackendBucketIamPolicy` **cannot** be used in conjunction with `compute.BackendBucketIamBinding` and `compute.BackendBucketIamMember` or they will fight over what your policy should be.
|
176
|
+
|
177
|
+
> **Note:** `compute.BackendBucketIamBinding` resources **can be** used in conjunction with `compute.BackendBucketIamMember` resources **only if** they do not grant privilege to the same role.
|
178
|
+
|
179
|
+
## compute.BackendBucketIamPolicy
|
180
|
+
|
181
|
+
```python
|
182
|
+
import pulumi
|
183
|
+
import pulumi_gcp as gcp
|
184
|
+
|
185
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
186
|
+
"role": "roles/viewer",
|
187
|
+
"members": ["user:jane@example.com"],
|
188
|
+
}])
|
189
|
+
policy = gcp.compute.BackendBucketIamPolicy("policy",
|
190
|
+
project=image_backend["project"],
|
191
|
+
name=image_backend["name"],
|
192
|
+
policy_data=admin.policy_data)
|
193
|
+
```
|
194
|
+
|
195
|
+
## compute.BackendBucketIamBinding
|
196
|
+
|
197
|
+
```python
|
198
|
+
import pulumi
|
199
|
+
import pulumi_gcp as gcp
|
200
|
+
|
201
|
+
binding = gcp.compute.BackendBucketIamBinding("binding",
|
202
|
+
project=image_backend["project"],
|
203
|
+
name=image_backend["name"],
|
204
|
+
role="roles/viewer",
|
205
|
+
members=["user:jane@example.com"])
|
206
|
+
```
|
207
|
+
|
208
|
+
## compute.BackendBucketIamMember
|
209
|
+
|
210
|
+
```python
|
211
|
+
import pulumi
|
212
|
+
import pulumi_gcp as gcp
|
213
|
+
|
214
|
+
member = gcp.compute.BackendBucketIamMember("member",
|
215
|
+
project=image_backend["project"],
|
216
|
+
name=image_backend["name"],
|
217
|
+
role="roles/viewer",
|
218
|
+
member="user:jane@example.com")
|
219
|
+
```
|
220
|
+
|
221
|
+
## This resource supports User Project Overrides.
|
222
|
+
|
223
|
+
-
|
224
|
+
|
225
|
+
# IAM policy for Compute Engine BackendBucket
|
226
|
+
|
227
|
+
Three different resources help you manage your IAM policy for Compute Engine BackendBucket. Each of these resources serves a different use case:
|
228
|
+
|
229
|
+
* `compute.BackendBucketIamPolicy`: Authoritative. Sets the IAM policy for the backendbucket and replaces any existing policy already attached.
|
230
|
+
* `compute.BackendBucketIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backendbucket are preserved.
|
231
|
+
* `compute.BackendBucketIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backendbucket are preserved.
|
232
|
+
|
233
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
234
|
+
|
235
|
+
* `compute.BackendBucketIamPolicy`: Retrieves the IAM policy for the backendbucket
|
236
|
+
|
237
|
+
> **Note:** `compute.BackendBucketIamPolicy` **cannot** be used in conjunction with `compute.BackendBucketIamBinding` and `compute.BackendBucketIamMember` or they will fight over what your policy should be.
|
238
|
+
|
239
|
+
> **Note:** `compute.BackendBucketIamBinding` resources **can be** used in conjunction with `compute.BackendBucketIamMember` resources **only if** they do not grant privilege to the same role.
|
240
|
+
|
241
|
+
## compute.BackendBucketIamPolicy
|
242
|
+
|
243
|
+
```python
|
244
|
+
import pulumi
|
245
|
+
import pulumi_gcp as gcp
|
246
|
+
|
247
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
248
|
+
"role": "roles/viewer",
|
249
|
+
"members": ["user:jane@example.com"],
|
250
|
+
}])
|
251
|
+
policy = gcp.compute.BackendBucketIamPolicy("policy",
|
252
|
+
project=image_backend["project"],
|
253
|
+
name=image_backend["name"],
|
254
|
+
policy_data=admin.policy_data)
|
255
|
+
```
|
256
|
+
|
257
|
+
## compute.BackendBucketIamBinding
|
258
|
+
|
259
|
+
```python
|
260
|
+
import pulumi
|
261
|
+
import pulumi_gcp as gcp
|
262
|
+
|
263
|
+
binding = gcp.compute.BackendBucketIamBinding("binding",
|
264
|
+
project=image_backend["project"],
|
265
|
+
name=image_backend["name"],
|
266
|
+
role="roles/viewer",
|
267
|
+
members=["user:jane@example.com"])
|
268
|
+
```
|
269
|
+
|
270
|
+
## compute.BackendBucketIamMember
|
271
|
+
|
272
|
+
```python
|
273
|
+
import pulumi
|
274
|
+
import pulumi_gcp as gcp
|
275
|
+
|
276
|
+
member = gcp.compute.BackendBucketIamMember("member",
|
277
|
+
project=image_backend["project"],
|
278
|
+
name=image_backend["name"],
|
279
|
+
role="roles/viewer",
|
280
|
+
member="user:jane@example.com")
|
281
|
+
```
|
282
|
+
|
165
283
|
## Import
|
166
284
|
|
167
285
|
For all import syntaxes, the "resource in question" can take any of the following forms:
|
@@ -213,6 +331,124 @@ class BackendBucketIamPolicy(pulumi.CustomResource):
|
|
213
331
|
args: BackendBucketIamPolicyArgs,
|
214
332
|
opts: Optional[pulumi.ResourceOptions] = None):
|
215
333
|
"""
|
334
|
+
Three different resources help you manage your IAM policy for Compute Engine BackendBucket. Each of these resources serves a different use case:
|
335
|
+
|
336
|
+
* `compute.BackendBucketIamPolicy`: Authoritative. Sets the IAM policy for the backendbucket and replaces any existing policy already attached.
|
337
|
+
* `compute.BackendBucketIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backendbucket are preserved.
|
338
|
+
* `compute.BackendBucketIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backendbucket are preserved.
|
339
|
+
|
340
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
341
|
+
|
342
|
+
* `compute.BackendBucketIamPolicy`: Retrieves the IAM policy for the backendbucket
|
343
|
+
|
344
|
+
> **Note:** `compute.BackendBucketIamPolicy` **cannot** be used in conjunction with `compute.BackendBucketIamBinding` and `compute.BackendBucketIamMember` or they will fight over what your policy should be.
|
345
|
+
|
346
|
+
> **Note:** `compute.BackendBucketIamBinding` resources **can be** used in conjunction with `compute.BackendBucketIamMember` resources **only if** they do not grant privilege to the same role.
|
347
|
+
|
348
|
+
## compute.BackendBucketIamPolicy
|
349
|
+
|
350
|
+
```python
|
351
|
+
import pulumi
|
352
|
+
import pulumi_gcp as gcp
|
353
|
+
|
354
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
355
|
+
"role": "roles/viewer",
|
356
|
+
"members": ["user:jane@example.com"],
|
357
|
+
}])
|
358
|
+
policy = gcp.compute.BackendBucketIamPolicy("policy",
|
359
|
+
project=image_backend["project"],
|
360
|
+
name=image_backend["name"],
|
361
|
+
policy_data=admin.policy_data)
|
362
|
+
```
|
363
|
+
|
364
|
+
## compute.BackendBucketIamBinding
|
365
|
+
|
366
|
+
```python
|
367
|
+
import pulumi
|
368
|
+
import pulumi_gcp as gcp
|
369
|
+
|
370
|
+
binding = gcp.compute.BackendBucketIamBinding("binding",
|
371
|
+
project=image_backend["project"],
|
372
|
+
name=image_backend["name"],
|
373
|
+
role="roles/viewer",
|
374
|
+
members=["user:jane@example.com"])
|
375
|
+
```
|
376
|
+
|
377
|
+
## compute.BackendBucketIamMember
|
378
|
+
|
379
|
+
```python
|
380
|
+
import pulumi
|
381
|
+
import pulumi_gcp as gcp
|
382
|
+
|
383
|
+
member = gcp.compute.BackendBucketIamMember("member",
|
384
|
+
project=image_backend["project"],
|
385
|
+
name=image_backend["name"],
|
386
|
+
role="roles/viewer",
|
387
|
+
member="user:jane@example.com")
|
388
|
+
```
|
389
|
+
|
390
|
+
## This resource supports User Project Overrides.
|
391
|
+
|
392
|
+
-
|
393
|
+
|
394
|
+
# IAM policy for Compute Engine BackendBucket
|
395
|
+
|
396
|
+
Three different resources help you manage your IAM policy for Compute Engine BackendBucket. Each of these resources serves a different use case:
|
397
|
+
|
398
|
+
* `compute.BackendBucketIamPolicy`: Authoritative. Sets the IAM policy for the backendbucket and replaces any existing policy already attached.
|
399
|
+
* `compute.BackendBucketIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the backendbucket are preserved.
|
400
|
+
* `compute.BackendBucketIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the backendbucket are preserved.
|
401
|
+
|
402
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
403
|
+
|
404
|
+
* `compute.BackendBucketIamPolicy`: Retrieves the IAM policy for the backendbucket
|
405
|
+
|
406
|
+
> **Note:** `compute.BackendBucketIamPolicy` **cannot** be used in conjunction with `compute.BackendBucketIamBinding` and `compute.BackendBucketIamMember` or they will fight over what your policy should be.
|
407
|
+
|
408
|
+
> **Note:** `compute.BackendBucketIamBinding` resources **can be** used in conjunction with `compute.BackendBucketIamMember` resources **only if** they do not grant privilege to the same role.
|
409
|
+
|
410
|
+
## compute.BackendBucketIamPolicy
|
411
|
+
|
412
|
+
```python
|
413
|
+
import pulumi
|
414
|
+
import pulumi_gcp as gcp
|
415
|
+
|
416
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
417
|
+
"role": "roles/viewer",
|
418
|
+
"members": ["user:jane@example.com"],
|
419
|
+
}])
|
420
|
+
policy = gcp.compute.BackendBucketIamPolicy("policy",
|
421
|
+
project=image_backend["project"],
|
422
|
+
name=image_backend["name"],
|
423
|
+
policy_data=admin.policy_data)
|
424
|
+
```
|
425
|
+
|
426
|
+
## compute.BackendBucketIamBinding
|
427
|
+
|
428
|
+
```python
|
429
|
+
import pulumi
|
430
|
+
import pulumi_gcp as gcp
|
431
|
+
|
432
|
+
binding = gcp.compute.BackendBucketIamBinding("binding",
|
433
|
+
project=image_backend["project"],
|
434
|
+
name=image_backend["name"],
|
435
|
+
role="roles/viewer",
|
436
|
+
members=["user:jane@example.com"])
|
437
|
+
```
|
438
|
+
|
439
|
+
## compute.BackendBucketIamMember
|
440
|
+
|
441
|
+
```python
|
442
|
+
import pulumi
|
443
|
+
import pulumi_gcp as gcp
|
444
|
+
|
445
|
+
member = gcp.compute.BackendBucketIamMember("member",
|
446
|
+
project=image_backend["project"],
|
447
|
+
name=image_backend["name"],
|
448
|
+
role="roles/viewer",
|
449
|
+
member="user:jane@example.com")
|
450
|
+
```
|
451
|
+
|
216
452
|
## Import
|
217
453
|
|
218
454
|
For all import syntaxes, the "resource in question" can take any of the following forms:
|
@@ -48,6 +48,7 @@ class BackendServiceArgs:
|
|
48
48
|
name: Optional[pulumi.Input[_builtins.str]] = None,
|
49
49
|
network_pass_through_lb_traffic_policy: Optional[pulumi.Input['BackendServiceNetworkPassThroughLbTrafficPolicyArgs']] = None,
|
50
50
|
outlier_detection: Optional[pulumi.Input['BackendServiceOutlierDetectionArgs']] = None,
|
51
|
+
params: Optional[pulumi.Input['BackendServiceParamsArgs']] = None,
|
51
52
|
port_name: Optional[pulumi.Input[_builtins.str]] = None,
|
52
53
|
project: Optional[pulumi.Input[_builtins.str]] = None,
|
53
54
|
protocol: Optional[pulumi.Input[_builtins.str]] = None,
|
@@ -214,6 +215,8 @@ class BackendServiceArgs:
|
|
214
215
|
Applicable backend service types can be a global backend service with the
|
215
216
|
loadBalancingScheme set to INTERNAL_SELF_MANAGED or EXTERNAL_MANAGED.
|
216
217
|
Structure is documented below.
|
218
|
+
:param pulumi.Input['BackendServiceParamsArgs'] params: Additional params passed with the request, but not persisted as part of resource payload
|
219
|
+
Structure is documented below.
|
217
220
|
:param pulumi.Input[_builtins.str] port_name: Name of backend port. The same name should appear in the instance
|
218
221
|
groups referenced by this service. Required when the load balancing
|
219
222
|
scheme is EXTERNAL.
|
@@ -299,6 +302,8 @@ class BackendServiceArgs:
|
|
299
302
|
pulumi.set(__self__, "network_pass_through_lb_traffic_policy", network_pass_through_lb_traffic_policy)
|
300
303
|
if outlier_detection is not None:
|
301
304
|
pulumi.set(__self__, "outlier_detection", outlier_detection)
|
305
|
+
if params is not None:
|
306
|
+
pulumi.set(__self__, "params", params)
|
302
307
|
if port_name is not None:
|
303
308
|
pulumi.set(__self__, "port_name", port_name)
|
304
309
|
if project is not None:
|
@@ -771,6 +776,19 @@ class BackendServiceArgs:
|
|
771
776
|
def outlier_detection(self, value: Optional[pulumi.Input['BackendServiceOutlierDetectionArgs']]):
|
772
777
|
pulumi.set(self, "outlier_detection", value)
|
773
778
|
|
779
|
+
@_builtins.property
|
780
|
+
@pulumi.getter
|
781
|
+
def params(self) -> Optional[pulumi.Input['BackendServiceParamsArgs']]:
|
782
|
+
"""
|
783
|
+
Additional params passed with the request, but not persisted as part of resource payload
|
784
|
+
Structure is documented below.
|
785
|
+
"""
|
786
|
+
return pulumi.get(self, "params")
|
787
|
+
|
788
|
+
@params.setter
|
789
|
+
def params(self, value: Optional[pulumi.Input['BackendServiceParamsArgs']]):
|
790
|
+
pulumi.set(self, "params", value)
|
791
|
+
|
774
792
|
@_builtins.property
|
775
793
|
@pulumi.getter(name="portName")
|
776
794
|
def port_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -945,6 +963,7 @@ class _BackendServiceState:
|
|
945
963
|
name: Optional[pulumi.Input[_builtins.str]] = None,
|
946
964
|
network_pass_through_lb_traffic_policy: Optional[pulumi.Input['BackendServiceNetworkPassThroughLbTrafficPolicyArgs']] = None,
|
947
965
|
outlier_detection: Optional[pulumi.Input['BackendServiceOutlierDetectionArgs']] = None,
|
966
|
+
params: Optional[pulumi.Input['BackendServiceParamsArgs']] = None,
|
948
967
|
port_name: Optional[pulumi.Input[_builtins.str]] = None,
|
949
968
|
project: Optional[pulumi.Input[_builtins.str]] = None,
|
950
969
|
protocol: Optional[pulumi.Input[_builtins.str]] = None,
|
@@ -1116,6 +1135,8 @@ class _BackendServiceState:
|
|
1116
1135
|
Applicable backend service types can be a global backend service with the
|
1117
1136
|
loadBalancingScheme set to INTERNAL_SELF_MANAGED or EXTERNAL_MANAGED.
|
1118
1137
|
Structure is documented below.
|
1138
|
+
:param pulumi.Input['BackendServiceParamsArgs'] params: Additional params passed with the request, but not persisted as part of resource payload
|
1139
|
+
Structure is documented below.
|
1119
1140
|
:param pulumi.Input[_builtins.str] port_name: Name of backend port. The same name should appear in the instance
|
1120
1141
|
groups referenced by this service. Required when the load balancing
|
1121
1142
|
scheme is EXTERNAL.
|
@@ -1208,6 +1229,8 @@ class _BackendServiceState:
|
|
1208
1229
|
pulumi.set(__self__, "network_pass_through_lb_traffic_policy", network_pass_through_lb_traffic_policy)
|
1209
1230
|
if outlier_detection is not None:
|
1210
1231
|
pulumi.set(__self__, "outlier_detection", outlier_detection)
|
1232
|
+
if params is not None:
|
1233
|
+
pulumi.set(__self__, "params", params)
|
1211
1234
|
if port_name is not None:
|
1212
1235
|
pulumi.set(__self__, "port_name", port_name)
|
1213
1236
|
if project is not None:
|
@@ -1719,6 +1742,19 @@ class _BackendServiceState:
|
|
1719
1742
|
def outlier_detection(self, value: Optional[pulumi.Input['BackendServiceOutlierDetectionArgs']]):
|
1720
1743
|
pulumi.set(self, "outlier_detection", value)
|
1721
1744
|
|
1745
|
+
@_builtins.property
|
1746
|
+
@pulumi.getter
|
1747
|
+
def params(self) -> Optional[pulumi.Input['BackendServiceParamsArgs']]:
|
1748
|
+
"""
|
1749
|
+
Additional params passed with the request, but not persisted as part of resource payload
|
1750
|
+
Structure is documented below.
|
1751
|
+
"""
|
1752
|
+
return pulumi.get(self, "params")
|
1753
|
+
|
1754
|
+
@params.setter
|
1755
|
+
def params(self, value: Optional[pulumi.Input['BackendServiceParamsArgs']]):
|
1756
|
+
pulumi.set(self, "params", value)
|
1757
|
+
|
1722
1758
|
@_builtins.property
|
1723
1759
|
@pulumi.getter(name="portName")
|
1724
1760
|
def port_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
@@ -1905,6 +1941,7 @@ class BackendService(pulumi.CustomResource):
|
|
1905
1941
|
name: Optional[pulumi.Input[_builtins.str]] = None,
|
1906
1942
|
network_pass_through_lb_traffic_policy: Optional[pulumi.Input[Union['BackendServiceNetworkPassThroughLbTrafficPolicyArgs', 'BackendServiceNetworkPassThroughLbTrafficPolicyArgsDict']]] = None,
|
1907
1943
|
outlier_detection: Optional[pulumi.Input[Union['BackendServiceOutlierDetectionArgs', 'BackendServiceOutlierDetectionArgsDict']]] = None,
|
1944
|
+
params: Optional[pulumi.Input[Union['BackendServiceParamsArgs', 'BackendServiceParamsArgsDict']]] = None,
|
1908
1945
|
port_name: Optional[pulumi.Input[_builtins.str]] = None,
|
1909
1946
|
project: Optional[pulumi.Input[_builtins.str]] = None,
|
1910
1947
|
protocol: Optional[pulumi.Input[_builtins.str]] = None,
|
@@ -2506,6 +2543,8 @@ class BackendService(pulumi.CustomResource):
|
|
2506
2543
|
Applicable backend service types can be a global backend service with the
|
2507
2544
|
loadBalancingScheme set to INTERNAL_SELF_MANAGED or EXTERNAL_MANAGED.
|
2508
2545
|
Structure is documented below.
|
2546
|
+
:param pulumi.Input[Union['BackendServiceParamsArgs', 'BackendServiceParamsArgsDict']] params: Additional params passed with the request, but not persisted as part of resource payload
|
2547
|
+
Structure is documented below.
|
2509
2548
|
:param pulumi.Input[_builtins.str] port_name: Name of backend port. The same name should appear in the instance
|
2510
2549
|
groups referenced by this service. Required when the load balancing
|
2511
2550
|
scheme is EXTERNAL.
|
@@ -3019,6 +3058,7 @@ class BackendService(pulumi.CustomResource):
|
|
3019
3058
|
name: Optional[pulumi.Input[_builtins.str]] = None,
|
3020
3059
|
network_pass_through_lb_traffic_policy: Optional[pulumi.Input[Union['BackendServiceNetworkPassThroughLbTrafficPolicyArgs', 'BackendServiceNetworkPassThroughLbTrafficPolicyArgsDict']]] = None,
|
3021
3060
|
outlier_detection: Optional[pulumi.Input[Union['BackendServiceOutlierDetectionArgs', 'BackendServiceOutlierDetectionArgsDict']]] = None,
|
3061
|
+
params: Optional[pulumi.Input[Union['BackendServiceParamsArgs', 'BackendServiceParamsArgsDict']]] = None,
|
3022
3062
|
port_name: Optional[pulumi.Input[_builtins.str]] = None,
|
3023
3063
|
project: Optional[pulumi.Input[_builtins.str]] = None,
|
3024
3064
|
protocol: Optional[pulumi.Input[_builtins.str]] = None,
|
@@ -3065,6 +3105,7 @@ class BackendService(pulumi.CustomResource):
|
|
3065
3105
|
__props__.__dict__["name"] = name
|
3066
3106
|
__props__.__dict__["network_pass_through_lb_traffic_policy"] = network_pass_through_lb_traffic_policy
|
3067
3107
|
__props__.__dict__["outlier_detection"] = outlier_detection
|
3108
|
+
__props__.__dict__["params"] = params
|
3068
3109
|
__props__.__dict__["port_name"] = port_name
|
3069
3110
|
__props__.__dict__["project"] = project
|
3070
3111
|
__props__.__dict__["protocol"] = protocol
|
@@ -3119,6 +3160,7 @@ class BackendService(pulumi.CustomResource):
|
|
3119
3160
|
name: Optional[pulumi.Input[_builtins.str]] = None,
|
3120
3161
|
network_pass_through_lb_traffic_policy: Optional[pulumi.Input[Union['BackendServiceNetworkPassThroughLbTrafficPolicyArgs', 'BackendServiceNetworkPassThroughLbTrafficPolicyArgsDict']]] = None,
|
3121
3162
|
outlier_detection: Optional[pulumi.Input[Union['BackendServiceOutlierDetectionArgs', 'BackendServiceOutlierDetectionArgsDict']]] = None,
|
3163
|
+
params: Optional[pulumi.Input[Union['BackendServiceParamsArgs', 'BackendServiceParamsArgsDict']]] = None,
|
3122
3164
|
port_name: Optional[pulumi.Input[_builtins.str]] = None,
|
3123
3165
|
project: Optional[pulumi.Input[_builtins.str]] = None,
|
3124
3166
|
protocol: Optional[pulumi.Input[_builtins.str]] = None,
|
@@ -3295,6 +3337,8 @@ class BackendService(pulumi.CustomResource):
|
|
3295
3337
|
Applicable backend service types can be a global backend service with the
|
3296
3338
|
loadBalancingScheme set to INTERNAL_SELF_MANAGED or EXTERNAL_MANAGED.
|
3297
3339
|
Structure is documented below.
|
3340
|
+
:param pulumi.Input[Union['BackendServiceParamsArgs', 'BackendServiceParamsArgsDict']] params: Additional params passed with the request, but not persisted as part of resource payload
|
3341
|
+
Structure is documented below.
|
3298
3342
|
:param pulumi.Input[_builtins.str] port_name: Name of backend port. The same name should appear in the instance
|
3299
3343
|
groups referenced by this service. Required when the load balancing
|
3300
3344
|
scheme is EXTERNAL.
|
@@ -3361,6 +3405,7 @@ class BackendService(pulumi.CustomResource):
|
|
3361
3405
|
__props__.__dict__["name"] = name
|
3362
3406
|
__props__.__dict__["network_pass_through_lb_traffic_policy"] = network_pass_through_lb_traffic_policy
|
3363
3407
|
__props__.__dict__["outlier_detection"] = outlier_detection
|
3408
|
+
__props__.__dict__["params"] = params
|
3364
3409
|
__props__.__dict__["port_name"] = port_name
|
3365
3410
|
__props__.__dict__["project"] = project
|
3366
3411
|
__props__.__dict__["protocol"] = protocol
|
@@ -3742,6 +3787,15 @@ class BackendService(pulumi.CustomResource):
|
|
3742
3787
|
"""
|
3743
3788
|
return pulumi.get(self, "outlier_detection")
|
3744
3789
|
|
3790
|
+
@_builtins.property
|
3791
|
+
@pulumi.getter
|
3792
|
+
def params(self) -> pulumi.Output[Optional['outputs.BackendServiceParams']]:
|
3793
|
+
"""
|
3794
|
+
Additional params passed with the request, but not persisted as part of resource payload
|
3795
|
+
Structure is documented below.
|
3796
|
+
"""
|
3797
|
+
return pulumi.get(self, "params")
|
3798
|
+
|
3745
3799
|
@_builtins.property
|
3746
3800
|
@pulumi.getter(name="portName")
|
3747
3801
|
def port_name(self) -> pulumi.Output[_builtins.str]:
|