pulumi-gcp 8.7.0__py3-none-any.whl → 8.7.0a1729107581__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (111) hide show
  1. pulumi_gcp/__init__.py +0 -70
  2. pulumi_gcp/accesscontextmanager/service_perimeter.py +0 -2
  3. pulumi_gcp/accesscontextmanager/service_perimeter_dry_run_egress_policy.py +0 -4
  4. pulumi_gcp/accesscontextmanager/service_perimeter_dry_run_ingress_policy.py +0 -4
  5. pulumi_gcp/accesscontextmanager/service_perimeter_egress_policy.py +0 -4
  6. pulumi_gcp/accesscontextmanager/service_perimeter_ingress_policy.py +0 -4
  7. pulumi_gcp/accesscontextmanager/service_perimeters.py +0 -2
  8. pulumi_gcp/apigee/__init__.py +0 -2
  9. pulumi_gcp/apigee/_inputs.py +0 -108
  10. pulumi_gcp/apigee/outputs.py +0 -64
  11. pulumi_gcp/artifactregistry/get_docker_image.py +0 -40
  12. pulumi_gcp/bigquery/connection.py +12 -12
  13. pulumi_gcp/bigquery/job.py +6 -6
  14. pulumi_gcp/cloudrunv2/get_service.py +1 -12
  15. pulumi_gcp/cloudrunv2/service.py +0 -92
  16. pulumi_gcp/compute/_inputs.py +116 -214
  17. pulumi_gcp/compute/backend_service.py +0 -76
  18. pulumi_gcp/compute/get_backend_service.py +1 -12
  19. pulumi_gcp/compute/get_instance.py +1 -29
  20. pulumi_gcp/compute/get_instance_template.py +1 -29
  21. pulumi_gcp/compute/get_region_instance_group_manager.py +18 -0
  22. pulumi_gcp/compute/get_region_instance_template.py +1 -29
  23. pulumi_gcp/compute/instance.py +0 -89
  24. pulumi_gcp/compute/instance_from_machine_image.py +0 -82
  25. pulumi_gcp/compute/instance_from_template.py +0 -82
  26. pulumi_gcp/compute/instance_template.py +0 -75
  27. pulumi_gcp/compute/network_firewall_policy_association.py +50 -76
  28. pulumi_gcp/compute/network_firewall_policy_rule.py +103 -149
  29. pulumi_gcp/compute/outputs.py +80 -170
  30. pulumi_gcp/compute/region_backend_service.py +0 -94
  31. pulumi_gcp/compute/region_instance_template.py +0 -75
  32. pulumi_gcp/compute/region_network_endpoint_group.py +4 -6
  33. pulumi_gcp/compute/region_network_firewall_policy_association.py +54 -104
  34. pulumi_gcp/compute/region_network_firewall_policy_rule.py +107 -160
  35. pulumi_gcp/config/__init__.pyi +0 -4
  36. pulumi_gcp/config/vars.py +0 -8
  37. pulumi_gcp/container/attached_cluster.py +6 -9
  38. pulumi_gcp/container/outputs.py +2 -2
  39. pulumi_gcp/datastream/stream.py +2 -2
  40. pulumi_gcp/diagflow/_inputs.py +2 -472
  41. pulumi_gcp/diagflow/cx_agent.py +4 -64
  42. pulumi_gcp/diagflow/cx_flow.py +0 -30
  43. pulumi_gcp/diagflow/outputs.py +2 -378
  44. pulumi_gcp/gkehub/feature.py +4 -2
  45. pulumi_gcp/iam/workload_identity_pool_provider.py +0 -56
  46. pulumi_gcp/looker/instance.py +2 -104
  47. pulumi_gcp/monitoring/_inputs.py +0 -23
  48. pulumi_gcp/monitoring/get_secret_version.py +3 -22
  49. pulumi_gcp/monitoring/outputs.py +0 -16
  50. pulumi_gcp/networkconnectivity/__init__.py +0 -1
  51. pulumi_gcp/networkconnectivity/_inputs.py +0 -148
  52. pulumi_gcp/networkconnectivity/outputs.py +0 -125
  53. pulumi_gcp/networkconnectivity/spoke.py +0 -144
  54. pulumi_gcp/networksecurity/server_tls_policy.py +2 -2
  55. pulumi_gcp/organizations/folder.py +7 -7
  56. pulumi_gcp/organizations/project.py +7 -7
  57. pulumi_gcp/orgpolicy/_inputs.py +3 -3
  58. pulumi_gcp/orgpolicy/outputs.py +2 -2
  59. pulumi_gcp/privilegedaccessmanager/get_entitlement.py +2 -46
  60. pulumi_gcp/provider.py +0 -40
  61. pulumi_gcp/pulumi-plugin.json +1 -1
  62. pulumi_gcp/secretmanager/get_regional_secret_version.py +5 -24
  63. pulumi_gcp/secretmanager/get_regional_secret_version_access.py +5 -24
  64. pulumi_gcp/secretmanager/get_secret_version.py +3 -22
  65. pulumi_gcp/secretmanager/get_secret_version_access.py +3 -22
  66. pulumi_gcp/secretmanager/regional_secret.py +2 -2
  67. pulumi_gcp/siteverification/get_token.py +16 -0
  68. pulumi_gcp/siteverification/owner.py +16 -0
  69. pulumi_gcp/spanner/_inputs.py +5 -29
  70. pulumi_gcp/spanner/outputs.py +3 -20
  71. pulumi_gcp/sql/_inputs.py +6 -6
  72. pulumi_gcp/sql/outputs.py +4 -4
  73. pulumi_gcp/sql/user.py +21 -28
  74. pulumi_gcp/storage/_inputs.py +0 -36
  75. pulumi_gcp/storage/bucket.py +0 -47
  76. pulumi_gcp/storage/get_bucket.py +1 -12
  77. pulumi_gcp/storage/outputs.py +0 -40
  78. pulumi_gcp/vertex/ai_deployment_resource_pool.py +2 -2
  79. pulumi_gcp/vmwareengine/_inputs.py +0 -440
  80. pulumi_gcp/vmwareengine/cluster.py +2 -100
  81. pulumi_gcp/vmwareengine/get_cluster.py +1 -12
  82. pulumi_gcp/vmwareengine/outputs.py +0 -615
  83. pulumi_gcp/workstations/_inputs.py +0 -54
  84. pulumi_gcp/workstations/outputs.py +0 -32
  85. pulumi_gcp/workstations/workstation_config.py +0 -205
  86. {pulumi_gcp-8.7.0.dist-info → pulumi_gcp-8.7.0a1729107581.dist-info}/METADATA +1 -1
  87. {pulumi_gcp-8.7.0.dist-info → pulumi_gcp-8.7.0a1729107581.dist-info}/RECORD +89 -111
  88. {pulumi_gcp-8.7.0.dist-info → pulumi_gcp-8.7.0a1729107581.dist-info}/WHEEL +1 -1
  89. pulumi_gcp/apigee/app_group.py +0 -811
  90. pulumi_gcp/apigee/developer.py +0 -757
  91. pulumi_gcp/networkconnectivity/group.py +0 -764
  92. pulumi_gcp/oracledatabase/__init__.py +0 -20
  93. pulumi_gcp/oracledatabase/_inputs.py +0 -4745
  94. pulumi_gcp/oracledatabase/autonomous_database.py +0 -983
  95. pulumi_gcp/oracledatabase/cloud_exadata_infrastructure.py +0 -842
  96. pulumi_gcp/oracledatabase/cloud_vm_cluster.py +0 -1086
  97. pulumi_gcp/oracledatabase/get_autonomous_database.py +0 -290
  98. pulumi_gcp/oracledatabase/get_autonomous_databases.py +0 -150
  99. pulumi_gcp/oracledatabase/get_cloud_exadata_infrastructure.py +0 -257
  100. pulumi_gcp/oracledatabase/get_cloud_exadata_infrastructures.py +0 -150
  101. pulumi_gcp/oracledatabase/get_cloud_vm_cluster.py +0 -290
  102. pulumi_gcp/oracledatabase/get_cloud_vm_clusters.py +0 -150
  103. pulumi_gcp/oracledatabase/get_db_nodes.py +0 -245
  104. pulumi_gcp/oracledatabase/get_db_servers.py +0 -245
  105. pulumi_gcp/oracledatabase/outputs.py +0 -9304
  106. pulumi_gcp/transcoder/__init__.py +0 -11
  107. pulumi_gcp/transcoder/_inputs.py +0 -3991
  108. pulumi_gcp/transcoder/job.py +0 -2134
  109. pulumi_gcp/transcoder/job_template.py +0 -1524
  110. pulumi_gcp/transcoder/outputs.py +0 -2918
  111. {pulumi_gcp-8.7.0.dist-info → pulumi_gcp-8.7.0a1729107581.dist-info}/top_level.txt +0 -0
@@ -38,31 +38,29 @@ class NetworkFirewallPolicyRuleArgs:
38
38
  """
39
39
  The set of arguments for constructing a NetworkFirewallPolicyRule resource.
40
40
  :param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
41
- :param pulumi.Input[str] direction: The direction in which this rule applies.
42
- Possible values are: `INGRESS`, `EGRESS`.
41
+ :param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
43
42
  :param pulumi.Input[str] firewall_policy: The firewall policy of the resource.
44
43
  :param pulumi.Input['NetworkFirewallPolicyRuleMatchArgs'] match: A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
45
- Structure is documented below.
46
- :param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list.
47
- The priority must be a positive value between 0 and 2147483647.
48
- Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
44
+ :param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
49
45
  :param pulumi.Input[str] description: An optional description for this resource.
50
46
  :param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
51
47
  traffic behaves as if it did not exist. If this is unspecified, the firewall policy rule will be enabled.
52
48
  :param pulumi.Input[bool] enable_logging: Denotes whether to enable logging for a particular rule. If logging is enabled, logs will be exported to the configured
53
49
  export destination in Stackdriver. Logs may be exported to BigQuery or Pub/Sub. Note: you cannot enable logging on
54
50
  "goto_next" rules.
51
+ :param pulumi.Input[str] project: The project for the resource
55
52
  :param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
56
- :param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfile resource instance. Example:
57
- https://networksecurity.googleapis.com/v1/projects/{project}/locations/{location}/securityProfileGroups/my-security-profile-group
58
- Must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
59
- :param pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are specified, then
60
- the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure tags, if all the
61
- targetSecureTag are in INEFFECTIVE state, then this rule will be ignored. targetSecureTag may not be set at the same
62
- time as targetServiceAccounts. If neither targetServiceAccounts nor targetSecureTag are specified, the firewall rule
63
- applies to all instances on the specified network. Maximum number of target label tags allowed is 256.
53
+ :param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
54
+ https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
55
+ It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
56
+ :param pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
57
+ specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
58
+ tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
59
+ <code>targetSecureTag</code> may not be set at the same time as <code>targetServiceAccounts</code>. If neither
60
+ <code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
61
+ instances on the specified network. Maximum number of target label tags allowed is 256.
64
62
  :param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
65
- :param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. Can be set only if action =
63
+ :param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
66
64
  'apply_security_profile_group' and cannot be set for other actions.
67
65
  """
68
66
  pulumi.set(__self__, "action", action)
@@ -105,8 +103,7 @@ class NetworkFirewallPolicyRuleArgs:
105
103
  @pulumi.getter
106
104
  def direction(self) -> pulumi.Input[str]:
107
105
  """
108
- The direction in which this rule applies.
109
- Possible values are: `INGRESS`, `EGRESS`.
106
+ The direction in which this rule applies. Possible values: INGRESS, EGRESS
110
107
  """
111
108
  return pulumi.get(self, "direction")
112
109
 
@@ -131,7 +128,6 @@ class NetworkFirewallPolicyRuleArgs:
131
128
  def match(self) -> pulumi.Input['NetworkFirewallPolicyRuleMatchArgs']:
132
129
  """
133
130
  A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
134
- Structure is documented below.
135
131
  """
136
132
  return pulumi.get(self, "match")
137
133
 
@@ -143,9 +139,7 @@ class NetworkFirewallPolicyRuleArgs:
143
139
  @pulumi.getter
144
140
  def priority(self) -> pulumi.Input[int]:
145
141
  """
146
- An integer indicating the priority of a rule in the list.
147
- The priority must be a positive value between 0 and 2147483647.
148
- Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
142
+ An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
149
143
  """
150
144
  return pulumi.get(self, "priority")
151
145
 
@@ -195,6 +189,9 @@ class NetworkFirewallPolicyRuleArgs:
195
189
  @property
196
190
  @pulumi.getter
197
191
  def project(self) -> Optional[pulumi.Input[str]]:
192
+ """
193
+ The project for the resource
194
+ """
198
195
  return pulumi.get(self, "project")
199
196
 
200
197
  @project.setter
@@ -217,9 +214,9 @@ class NetworkFirewallPolicyRuleArgs:
217
214
  @pulumi.getter(name="securityProfileGroup")
218
215
  def security_profile_group(self) -> Optional[pulumi.Input[str]]:
219
216
  """
220
- A fully-qualified URL of a SecurityProfile resource instance. Example:
221
- https://networksecurity.googleapis.com/v1/projects/{project}/locations/{location}/securityProfileGroups/my-security-profile-group
222
- Must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
217
+ A fully-qualified URL of a SecurityProfileGroup resource. Example:
218
+ https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
219
+ It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
223
220
  """
224
221
  return pulumi.get(self, "security_profile_group")
225
222
 
@@ -231,11 +228,12 @@ class NetworkFirewallPolicyRuleArgs:
231
228
  @pulumi.getter(name="targetSecureTags")
232
229
  def target_secure_tags(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]]:
233
230
  """
234
- A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are specified, then
235
- the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure tags, if all the
236
- targetSecureTag are in INEFFECTIVE state, then this rule will be ignored. targetSecureTag may not be set at the same
237
- time as targetServiceAccounts. If neither targetServiceAccounts nor targetSecureTag are specified, the firewall rule
238
- applies to all instances on the specified network. Maximum number of target label tags allowed is 256.
231
+ A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
232
+ specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
233
+ tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
234
+ <code>targetSecureTag</code> may not be set at the same time as <code>targetServiceAccounts</code>. If neither
235
+ <code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
236
+ instances on the specified network. Maximum number of target label tags allowed is 256.
239
237
  """
240
238
  return pulumi.get(self, "target_secure_tags")
241
239
 
@@ -259,7 +257,7 @@ class NetworkFirewallPolicyRuleArgs:
259
257
  @pulumi.getter(name="tlsInspect")
260
258
  def tls_inspect(self) -> Optional[pulumi.Input[bool]]:
261
259
  """
262
- Boolean flag indicating if the traffic should be TLS decrypted. Can be set only if action =
260
+ Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
263
261
  'apply_security_profile_group' and cannot be set for other actions.
264
262
  """
265
263
  return pulumi.get(self, "tls_inspect")
@@ -273,7 +271,6 @@ class NetworkFirewallPolicyRuleArgs:
273
271
  class _NetworkFirewallPolicyRuleState:
274
272
  def __init__(__self__, *,
275
273
  action: Optional[pulumi.Input[str]] = None,
276
- creation_timestamp: Optional[pulumi.Input[str]] = None,
277
274
  description: Optional[pulumi.Input[str]] = None,
278
275
  direction: Optional[pulumi.Input[str]] = None,
279
276
  disabled: Optional[pulumi.Input[bool]] = None,
@@ -292,10 +289,8 @@ class _NetworkFirewallPolicyRuleState:
292
289
  """
293
290
  Input properties used for looking up and filtering NetworkFirewallPolicyRule resources.
294
291
  :param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
295
- :param pulumi.Input[str] creation_timestamp: Creation timestamp in RFC3339 text format.
296
292
  :param pulumi.Input[str] description: An optional description for this resource.
297
- :param pulumi.Input[str] direction: The direction in which this rule applies.
298
- Possible values are: `INGRESS`, `EGRESS`.
293
+ :param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
299
294
  :param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
300
295
  traffic behaves as if it did not exist. If this is unspecified, the firewall policy rule will be enabled.
301
296
  :param pulumi.Input[bool] enable_logging: Denotes whether to enable logging for a particular rule. If logging is enabled, logs will be exported to the configured
@@ -304,28 +299,25 @@ class _NetworkFirewallPolicyRuleState:
304
299
  :param pulumi.Input[str] firewall_policy: The firewall policy of the resource.
305
300
  :param pulumi.Input[str] kind: Type of the resource. Always `compute#firewallPolicyRule` for firewall policy rules
306
301
  :param pulumi.Input['NetworkFirewallPolicyRuleMatchArgs'] match: A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
307
- Structure is documented below.
308
- :param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list.
309
- The priority must be a positive value between 0 and 2147483647.
310
- Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
302
+ :param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
303
+ :param pulumi.Input[str] project: The project for the resource
311
304
  :param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
312
305
  :param pulumi.Input[int] rule_tuple_count: Calculation of the complexity of a single firewall policy rule.
313
- :param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfile resource instance. Example:
314
- https://networksecurity.googleapis.com/v1/projects/{project}/locations/{location}/securityProfileGroups/my-security-profile-group
315
- Must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
316
- :param pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are specified, then
317
- the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure tags, if all the
318
- targetSecureTag are in INEFFECTIVE state, then this rule will be ignored. targetSecureTag may not be set at the same
319
- time as targetServiceAccounts. If neither targetServiceAccounts nor targetSecureTag are specified, the firewall rule
320
- applies to all instances on the specified network. Maximum number of target label tags allowed is 256.
306
+ :param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
307
+ https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
308
+ It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
309
+ :param pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
310
+ specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
311
+ tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
312
+ <code>targetSecureTag</code> may not be set at the same time as <code>targetServiceAccounts</code>. If neither
313
+ <code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
314
+ instances on the specified network. Maximum number of target label tags allowed is 256.
321
315
  :param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
322
- :param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. Can be set only if action =
316
+ :param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
323
317
  'apply_security_profile_group' and cannot be set for other actions.
324
318
  """
325
319
  if action is not None:
326
320
  pulumi.set(__self__, "action", action)
327
- if creation_timestamp is not None:
328
- pulumi.set(__self__, "creation_timestamp", creation_timestamp)
329
321
  if description is not None:
330
322
  pulumi.set(__self__, "description", description)
331
323
  if direction is not None:
@@ -369,18 +361,6 @@ class _NetworkFirewallPolicyRuleState:
369
361
  def action(self, value: Optional[pulumi.Input[str]]):
370
362
  pulumi.set(self, "action", value)
371
363
 
372
- @property
373
- @pulumi.getter(name="creationTimestamp")
374
- def creation_timestamp(self) -> Optional[pulumi.Input[str]]:
375
- """
376
- Creation timestamp in RFC3339 text format.
377
- """
378
- return pulumi.get(self, "creation_timestamp")
379
-
380
- @creation_timestamp.setter
381
- def creation_timestamp(self, value: Optional[pulumi.Input[str]]):
382
- pulumi.set(self, "creation_timestamp", value)
383
-
384
364
  @property
385
365
  @pulumi.getter
386
366
  def description(self) -> Optional[pulumi.Input[str]]:
@@ -397,8 +377,7 @@ class _NetworkFirewallPolicyRuleState:
397
377
  @pulumi.getter
398
378
  def direction(self) -> Optional[pulumi.Input[str]]:
399
379
  """
400
- The direction in which this rule applies.
401
- Possible values are: `INGRESS`, `EGRESS`.
380
+ The direction in which this rule applies. Possible values: INGRESS, EGRESS
402
381
  """
403
382
  return pulumi.get(self, "direction")
404
383
 
@@ -462,7 +441,6 @@ class _NetworkFirewallPolicyRuleState:
462
441
  def match(self) -> Optional[pulumi.Input['NetworkFirewallPolicyRuleMatchArgs']]:
463
442
  """
464
443
  A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
465
- Structure is documented below.
466
444
  """
467
445
  return pulumi.get(self, "match")
468
446
 
@@ -474,9 +452,7 @@ class _NetworkFirewallPolicyRuleState:
474
452
  @pulumi.getter
475
453
  def priority(self) -> Optional[pulumi.Input[int]]:
476
454
  """
477
- An integer indicating the priority of a rule in the list.
478
- The priority must be a positive value between 0 and 2147483647.
479
- Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
455
+ An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
480
456
  """
481
457
  return pulumi.get(self, "priority")
482
458
 
@@ -487,6 +463,9 @@ class _NetworkFirewallPolicyRuleState:
487
463
  @property
488
464
  @pulumi.getter
489
465
  def project(self) -> Optional[pulumi.Input[str]]:
466
+ """
467
+ The project for the resource
468
+ """
490
469
  return pulumi.get(self, "project")
491
470
 
492
471
  @project.setter
@@ -521,9 +500,9 @@ class _NetworkFirewallPolicyRuleState:
521
500
  @pulumi.getter(name="securityProfileGroup")
522
501
  def security_profile_group(self) -> Optional[pulumi.Input[str]]:
523
502
  """
524
- A fully-qualified URL of a SecurityProfile resource instance. Example:
525
- https://networksecurity.googleapis.com/v1/projects/{project}/locations/{location}/securityProfileGroups/my-security-profile-group
526
- Must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
503
+ A fully-qualified URL of a SecurityProfileGroup resource. Example:
504
+ https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
505
+ It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
527
506
  """
528
507
  return pulumi.get(self, "security_profile_group")
529
508
 
@@ -535,11 +514,12 @@ class _NetworkFirewallPolicyRuleState:
535
514
  @pulumi.getter(name="targetSecureTags")
536
515
  def target_secure_tags(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]]:
537
516
  """
538
- A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are specified, then
539
- the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure tags, if all the
540
- targetSecureTag are in INEFFECTIVE state, then this rule will be ignored. targetSecureTag may not be set at the same
541
- time as targetServiceAccounts. If neither targetServiceAccounts nor targetSecureTag are specified, the firewall rule
542
- applies to all instances on the specified network. Maximum number of target label tags allowed is 256.
517
+ A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
518
+ specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
519
+ tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
520
+ <code>targetSecureTag</code> may not be set at the same time as <code>targetServiceAccounts</code>. If neither
521
+ <code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
522
+ instances on the specified network. Maximum number of target label tags allowed is 256.
543
523
  """
544
524
  return pulumi.get(self, "target_secure_tags")
545
525
 
@@ -563,7 +543,7 @@ class _NetworkFirewallPolicyRuleState:
563
543
  @pulumi.getter(name="tlsInspect")
564
544
  def tls_inspect(self) -> Optional[pulumi.Input[bool]]:
565
545
  """
566
- Boolean flag indicating if the traffic should be TLS decrypted. Can be set only if action =
546
+ Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
567
547
  'apply_security_profile_group' and cannot be set for other actions.
568
548
  """
569
549
  return pulumi.get(self, "tls_inspect")
@@ -594,22 +574,17 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
594
574
  tls_inspect: Optional[pulumi.Input[bool]] = None,
595
575
  __props__=None):
596
576
  """
597
- Represents a rule that describes one or more match conditions along with the action to be taken when traffic matches this condition (allow or deny).
598
-
599
- To get more information about NetworkFirewallPolicyRule, see:
600
-
601
- * [API documentation](https://cloud.google.com/compute/docs/reference/rest/v1/networkFirewallPolicies/addRule)
577
+ The Compute NetworkFirewallPolicyRule resource
602
578
 
603
579
  ## Example Usage
604
580
 
605
- ### Network Firewall Policy Rule
606
-
581
+ ### Global
607
582
  ```python
608
583
  import pulumi
609
584
  import pulumi_gcp as gcp
610
585
 
611
586
  basic_global_networksecurity_address_group = gcp.networksecurity.AddressGroup("basic_global_networksecurity_address_group",
612
- name="address",
587
+ name="policy",
613
588
  parent="projects/my-project-name",
614
589
  description="Sample global networksecurity_address_group",
615
590
  location="global",
@@ -686,8 +661,7 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
686
661
  :param pulumi.ResourceOptions opts: Options for the resource.
687
662
  :param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
688
663
  :param pulumi.Input[str] description: An optional description for this resource.
689
- :param pulumi.Input[str] direction: The direction in which this rule applies.
690
- Possible values are: `INGRESS`, `EGRESS`.
664
+ :param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
691
665
  :param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
692
666
  traffic behaves as if it did not exist. If this is unspecified, the firewall policy rule will be enabled.
693
667
  :param pulumi.Input[bool] enable_logging: Denotes whether to enable logging for a particular rule. If logging is enabled, logs will be exported to the configured
@@ -695,21 +669,20 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
695
669
  "goto_next" rules.
696
670
  :param pulumi.Input[str] firewall_policy: The firewall policy of the resource.
697
671
  :param pulumi.Input[Union['NetworkFirewallPolicyRuleMatchArgs', 'NetworkFirewallPolicyRuleMatchArgsDict']] match: A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
698
- Structure is documented below.
699
- :param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list.
700
- The priority must be a positive value between 0 and 2147483647.
701
- Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
672
+ :param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
673
+ :param pulumi.Input[str] project: The project for the resource
702
674
  :param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
703
- :param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfile resource instance. Example:
704
- https://networksecurity.googleapis.com/v1/projects/{project}/locations/{location}/securityProfileGroups/my-security-profile-group
705
- Must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
706
- :param pulumi.Input[Sequence[pulumi.Input[Union['NetworkFirewallPolicyRuleTargetSecureTagArgs', 'NetworkFirewallPolicyRuleTargetSecureTagArgsDict']]]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are specified, then
707
- the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure tags, if all the
708
- targetSecureTag are in INEFFECTIVE state, then this rule will be ignored. targetSecureTag may not be set at the same
709
- time as targetServiceAccounts. If neither targetServiceAccounts nor targetSecureTag are specified, the firewall rule
710
- applies to all instances on the specified network. Maximum number of target label tags allowed is 256.
675
+ :param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
676
+ https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
677
+ It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
678
+ :param pulumi.Input[Sequence[pulumi.Input[Union['NetworkFirewallPolicyRuleTargetSecureTagArgs', 'NetworkFirewallPolicyRuleTargetSecureTagArgsDict']]]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
679
+ specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
680
+ tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
681
+ <code>targetSecureTag</code> may not be set at the same time as <code>targetServiceAccounts</code>. If neither
682
+ <code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
683
+ instances on the specified network. Maximum number of target label tags allowed is 256.
711
684
  :param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
712
- :param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. Can be set only if action =
685
+ :param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
713
686
  'apply_security_profile_group' and cannot be set for other actions.
714
687
  """
715
688
  ...
@@ -719,22 +692,17 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
719
692
  args: NetworkFirewallPolicyRuleArgs,
720
693
  opts: Optional[pulumi.ResourceOptions] = None):
721
694
  """
722
- Represents a rule that describes one or more match conditions along with the action to be taken when traffic matches this condition (allow or deny).
723
-
724
- To get more information about NetworkFirewallPolicyRule, see:
725
-
726
- * [API documentation](https://cloud.google.com/compute/docs/reference/rest/v1/networkFirewallPolicies/addRule)
695
+ The Compute NetworkFirewallPolicyRule resource
727
696
 
728
697
  ## Example Usage
729
698
 
730
- ### Network Firewall Policy Rule
731
-
699
+ ### Global
732
700
  ```python
733
701
  import pulumi
734
702
  import pulumi_gcp as gcp
735
703
 
736
704
  basic_global_networksecurity_address_group = gcp.networksecurity.AddressGroup("basic_global_networksecurity_address_group",
737
- name="address",
705
+ name="policy",
738
706
  parent="projects/my-project-name",
739
707
  description="Sample global networksecurity_address_group",
740
708
  location="global",
@@ -869,7 +837,6 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
869
837
  __props__.__dict__["target_secure_tags"] = target_secure_tags
870
838
  __props__.__dict__["target_service_accounts"] = target_service_accounts
871
839
  __props__.__dict__["tls_inspect"] = tls_inspect
872
- __props__.__dict__["creation_timestamp"] = None
873
840
  __props__.__dict__["kind"] = None
874
841
  __props__.__dict__["rule_tuple_count"] = None
875
842
  super(NetworkFirewallPolicyRule, __self__).__init__(
@@ -883,7 +850,6 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
883
850
  id: pulumi.Input[str],
884
851
  opts: Optional[pulumi.ResourceOptions] = None,
885
852
  action: Optional[pulumi.Input[str]] = None,
886
- creation_timestamp: Optional[pulumi.Input[str]] = None,
887
853
  description: Optional[pulumi.Input[str]] = None,
888
854
  direction: Optional[pulumi.Input[str]] = None,
889
855
  disabled: Optional[pulumi.Input[bool]] = None,
@@ -907,10 +873,8 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
907
873
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
908
874
  :param pulumi.ResourceOptions opts: Options for the resource.
909
875
  :param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
910
- :param pulumi.Input[str] creation_timestamp: Creation timestamp in RFC3339 text format.
911
876
  :param pulumi.Input[str] description: An optional description for this resource.
912
- :param pulumi.Input[str] direction: The direction in which this rule applies.
913
- Possible values are: `INGRESS`, `EGRESS`.
877
+ :param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
914
878
  :param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
915
879
  traffic behaves as if it did not exist. If this is unspecified, the firewall policy rule will be enabled.
916
880
  :param pulumi.Input[bool] enable_logging: Denotes whether to enable logging for a particular rule. If logging is enabled, logs will be exported to the configured
@@ -919,22 +883,21 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
919
883
  :param pulumi.Input[str] firewall_policy: The firewall policy of the resource.
920
884
  :param pulumi.Input[str] kind: Type of the resource. Always `compute#firewallPolicyRule` for firewall policy rules
921
885
  :param pulumi.Input[Union['NetworkFirewallPolicyRuleMatchArgs', 'NetworkFirewallPolicyRuleMatchArgsDict']] match: A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
922
- Structure is documented below.
923
- :param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list.
924
- The priority must be a positive value between 0 and 2147483647.
925
- Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
886
+ :param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
887
+ :param pulumi.Input[str] project: The project for the resource
926
888
  :param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
927
889
  :param pulumi.Input[int] rule_tuple_count: Calculation of the complexity of a single firewall policy rule.
928
- :param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfile resource instance. Example:
929
- https://networksecurity.googleapis.com/v1/projects/{project}/locations/{location}/securityProfileGroups/my-security-profile-group
930
- Must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
931
- :param pulumi.Input[Sequence[pulumi.Input[Union['NetworkFirewallPolicyRuleTargetSecureTagArgs', 'NetworkFirewallPolicyRuleTargetSecureTagArgsDict']]]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are specified, then
932
- the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure tags, if all the
933
- targetSecureTag are in INEFFECTIVE state, then this rule will be ignored. targetSecureTag may not be set at the same
934
- time as targetServiceAccounts. If neither targetServiceAccounts nor targetSecureTag are specified, the firewall rule
935
- applies to all instances on the specified network. Maximum number of target label tags allowed is 256.
890
+ :param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
891
+ https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
892
+ It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
893
+ :param pulumi.Input[Sequence[pulumi.Input[Union['NetworkFirewallPolicyRuleTargetSecureTagArgs', 'NetworkFirewallPolicyRuleTargetSecureTagArgsDict']]]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
894
+ specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
895
+ tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
896
+ <code>targetSecureTag</code> may not be set at the same time as <code>targetServiceAccounts</code>. If neither
897
+ <code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
898
+ instances on the specified network. Maximum number of target label tags allowed is 256.
936
899
  :param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
937
- :param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. Can be set only if action =
900
+ :param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
938
901
  'apply_security_profile_group' and cannot be set for other actions.
939
902
  """
940
903
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -942,7 +905,6 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
942
905
  __props__ = _NetworkFirewallPolicyRuleState.__new__(_NetworkFirewallPolicyRuleState)
943
906
 
944
907
  __props__.__dict__["action"] = action
945
- __props__.__dict__["creation_timestamp"] = creation_timestamp
946
908
  __props__.__dict__["description"] = description
947
909
  __props__.__dict__["direction"] = direction
948
910
  __props__.__dict__["disabled"] = disabled
@@ -968,14 +930,6 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
968
930
  """
969
931
  return pulumi.get(self, "action")
970
932
 
971
- @property
972
- @pulumi.getter(name="creationTimestamp")
973
- def creation_timestamp(self) -> pulumi.Output[str]:
974
- """
975
- Creation timestamp in RFC3339 text format.
976
- """
977
- return pulumi.get(self, "creation_timestamp")
978
-
979
933
  @property
980
934
  @pulumi.getter
981
935
  def description(self) -> pulumi.Output[Optional[str]]:
@@ -988,8 +942,7 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
988
942
  @pulumi.getter
989
943
  def direction(self) -> pulumi.Output[str]:
990
944
  """
991
- The direction in which this rule applies.
992
- Possible values are: `INGRESS`, `EGRESS`.
945
+ The direction in which this rule applies. Possible values: INGRESS, EGRESS
993
946
  """
994
947
  return pulumi.get(self, "direction")
995
948
 
@@ -1033,7 +986,6 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
1033
986
  def match(self) -> pulumi.Output['outputs.NetworkFirewallPolicyRuleMatch']:
1034
987
  """
1035
988
  A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
1036
- Structure is documented below.
1037
989
  """
1038
990
  return pulumi.get(self, "match")
1039
991
 
@@ -1041,15 +993,16 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
1041
993
  @pulumi.getter
1042
994
  def priority(self) -> pulumi.Output[int]:
1043
995
  """
1044
- An integer indicating the priority of a rule in the list.
1045
- The priority must be a positive value between 0 and 2147483647.
1046
- Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
996
+ An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
1047
997
  """
1048
998
  return pulumi.get(self, "priority")
1049
999
 
1050
1000
  @property
1051
1001
  @pulumi.getter
1052
1002
  def project(self) -> pulumi.Output[str]:
1003
+ """
1004
+ The project for the resource
1005
+ """
1053
1006
  return pulumi.get(self, "project")
1054
1007
 
1055
1008
  @property
@@ -1072,9 +1025,9 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
1072
1025
  @pulumi.getter(name="securityProfileGroup")
1073
1026
  def security_profile_group(self) -> pulumi.Output[Optional[str]]:
1074
1027
  """
1075
- A fully-qualified URL of a SecurityProfile resource instance. Example:
1076
- https://networksecurity.googleapis.com/v1/projects/{project}/locations/{location}/securityProfileGroups/my-security-profile-group
1077
- Must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
1028
+ A fully-qualified URL of a SecurityProfileGroup resource. Example:
1029
+ https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
1030
+ It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
1078
1031
  """
1079
1032
  return pulumi.get(self, "security_profile_group")
1080
1033
 
@@ -1082,11 +1035,12 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
1082
1035
  @pulumi.getter(name="targetSecureTags")
1083
1036
  def target_secure_tags(self) -> pulumi.Output[Optional[Sequence['outputs.NetworkFirewallPolicyRuleTargetSecureTag']]]:
1084
1037
  """
1085
- A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are specified, then
1086
- the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure tags, if all the
1087
- targetSecureTag are in INEFFECTIVE state, then this rule will be ignored. targetSecureTag may not be set at the same
1088
- time as targetServiceAccounts. If neither targetServiceAccounts nor targetSecureTag are specified, the firewall rule
1089
- applies to all instances on the specified network. Maximum number of target label tags allowed is 256.
1038
+ A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
1039
+ specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
1040
+ tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
1041
+ <code>targetSecureTag</code> may not be set at the same time as <code>targetServiceAccounts</code>. If neither
1042
+ <code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
1043
+ instances on the specified network. Maximum number of target label tags allowed is 256.
1090
1044
  """
1091
1045
  return pulumi.get(self, "target_secure_tags")
1092
1046
 
@@ -1102,7 +1056,7 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
1102
1056
  @pulumi.getter(name="tlsInspect")
1103
1057
  def tls_inspect(self) -> pulumi.Output[Optional[bool]]:
1104
1058
  """
1105
- Boolean flag indicating if the traffic should be TLS decrypted. Can be set only if action =
1059
+ Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
1106
1060
  'apply_security_profile_group' and cannot be set for other actions.
1107
1061
  """
1108
1062
  return pulumi.get(self, "tls_inspect")