pulumi-gcp 8.7.0__py3-none-any.whl → 8.7.0a1729107581__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +0 -70
- pulumi_gcp/accesscontextmanager/service_perimeter.py +0 -2
- pulumi_gcp/accesscontextmanager/service_perimeter_dry_run_egress_policy.py +0 -4
- pulumi_gcp/accesscontextmanager/service_perimeter_dry_run_ingress_policy.py +0 -4
- pulumi_gcp/accesscontextmanager/service_perimeter_egress_policy.py +0 -4
- pulumi_gcp/accesscontextmanager/service_perimeter_ingress_policy.py +0 -4
- pulumi_gcp/accesscontextmanager/service_perimeters.py +0 -2
- pulumi_gcp/apigee/__init__.py +0 -2
- pulumi_gcp/apigee/_inputs.py +0 -108
- pulumi_gcp/apigee/outputs.py +0 -64
- pulumi_gcp/artifactregistry/get_docker_image.py +0 -40
- pulumi_gcp/bigquery/connection.py +12 -12
- pulumi_gcp/bigquery/job.py +6 -6
- pulumi_gcp/cloudrunv2/get_service.py +1 -12
- pulumi_gcp/cloudrunv2/service.py +0 -92
- pulumi_gcp/compute/_inputs.py +116 -214
- pulumi_gcp/compute/backend_service.py +0 -76
- pulumi_gcp/compute/get_backend_service.py +1 -12
- pulumi_gcp/compute/get_instance.py +1 -29
- pulumi_gcp/compute/get_instance_template.py +1 -29
- pulumi_gcp/compute/get_region_instance_group_manager.py +18 -0
- pulumi_gcp/compute/get_region_instance_template.py +1 -29
- pulumi_gcp/compute/instance.py +0 -89
- pulumi_gcp/compute/instance_from_machine_image.py +0 -82
- pulumi_gcp/compute/instance_from_template.py +0 -82
- pulumi_gcp/compute/instance_template.py +0 -75
- pulumi_gcp/compute/network_firewall_policy_association.py +50 -76
- pulumi_gcp/compute/network_firewall_policy_rule.py +103 -149
- pulumi_gcp/compute/outputs.py +80 -170
- pulumi_gcp/compute/region_backend_service.py +0 -94
- pulumi_gcp/compute/region_instance_template.py +0 -75
- pulumi_gcp/compute/region_network_endpoint_group.py +4 -6
- pulumi_gcp/compute/region_network_firewall_policy_association.py +54 -104
- pulumi_gcp/compute/region_network_firewall_policy_rule.py +107 -160
- pulumi_gcp/config/__init__.pyi +0 -4
- pulumi_gcp/config/vars.py +0 -8
- pulumi_gcp/container/attached_cluster.py +6 -9
- pulumi_gcp/container/outputs.py +2 -2
- pulumi_gcp/datastream/stream.py +2 -2
- pulumi_gcp/diagflow/_inputs.py +2 -472
- pulumi_gcp/diagflow/cx_agent.py +4 -64
- pulumi_gcp/diagflow/cx_flow.py +0 -30
- pulumi_gcp/diagflow/outputs.py +2 -378
- pulumi_gcp/gkehub/feature.py +4 -2
- pulumi_gcp/iam/workload_identity_pool_provider.py +0 -56
- pulumi_gcp/looker/instance.py +2 -104
- pulumi_gcp/monitoring/_inputs.py +0 -23
- pulumi_gcp/monitoring/get_secret_version.py +3 -22
- pulumi_gcp/monitoring/outputs.py +0 -16
- pulumi_gcp/networkconnectivity/__init__.py +0 -1
- pulumi_gcp/networkconnectivity/_inputs.py +0 -148
- pulumi_gcp/networkconnectivity/outputs.py +0 -125
- pulumi_gcp/networkconnectivity/spoke.py +0 -144
- pulumi_gcp/networksecurity/server_tls_policy.py +2 -2
- pulumi_gcp/organizations/folder.py +7 -7
- pulumi_gcp/organizations/project.py +7 -7
- pulumi_gcp/orgpolicy/_inputs.py +3 -3
- pulumi_gcp/orgpolicy/outputs.py +2 -2
- pulumi_gcp/privilegedaccessmanager/get_entitlement.py +2 -46
- pulumi_gcp/provider.py +0 -40
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/get_regional_secret_version.py +5 -24
- pulumi_gcp/secretmanager/get_regional_secret_version_access.py +5 -24
- pulumi_gcp/secretmanager/get_secret_version.py +3 -22
- pulumi_gcp/secretmanager/get_secret_version_access.py +3 -22
- pulumi_gcp/secretmanager/regional_secret.py +2 -2
- pulumi_gcp/siteverification/get_token.py +16 -0
- pulumi_gcp/siteverification/owner.py +16 -0
- pulumi_gcp/spanner/_inputs.py +5 -29
- pulumi_gcp/spanner/outputs.py +3 -20
- pulumi_gcp/sql/_inputs.py +6 -6
- pulumi_gcp/sql/outputs.py +4 -4
- pulumi_gcp/sql/user.py +21 -28
- pulumi_gcp/storage/_inputs.py +0 -36
- pulumi_gcp/storage/bucket.py +0 -47
- pulumi_gcp/storage/get_bucket.py +1 -12
- pulumi_gcp/storage/outputs.py +0 -40
- pulumi_gcp/vertex/ai_deployment_resource_pool.py +2 -2
- pulumi_gcp/vmwareengine/_inputs.py +0 -440
- pulumi_gcp/vmwareengine/cluster.py +2 -100
- pulumi_gcp/vmwareengine/get_cluster.py +1 -12
- pulumi_gcp/vmwareengine/outputs.py +0 -615
- pulumi_gcp/workstations/_inputs.py +0 -54
- pulumi_gcp/workstations/outputs.py +0 -32
- pulumi_gcp/workstations/workstation_config.py +0 -205
- {pulumi_gcp-8.7.0.dist-info → pulumi_gcp-8.7.0a1729107581.dist-info}/METADATA +1 -1
- {pulumi_gcp-8.7.0.dist-info → pulumi_gcp-8.7.0a1729107581.dist-info}/RECORD +89 -111
- {pulumi_gcp-8.7.0.dist-info → pulumi_gcp-8.7.0a1729107581.dist-info}/WHEEL +1 -1
- pulumi_gcp/apigee/app_group.py +0 -811
- pulumi_gcp/apigee/developer.py +0 -757
- pulumi_gcp/networkconnectivity/group.py +0 -764
- pulumi_gcp/oracledatabase/__init__.py +0 -20
- pulumi_gcp/oracledatabase/_inputs.py +0 -4745
- pulumi_gcp/oracledatabase/autonomous_database.py +0 -983
- pulumi_gcp/oracledatabase/cloud_exadata_infrastructure.py +0 -842
- pulumi_gcp/oracledatabase/cloud_vm_cluster.py +0 -1086
- pulumi_gcp/oracledatabase/get_autonomous_database.py +0 -290
- pulumi_gcp/oracledatabase/get_autonomous_databases.py +0 -150
- pulumi_gcp/oracledatabase/get_cloud_exadata_infrastructure.py +0 -257
- pulumi_gcp/oracledatabase/get_cloud_exadata_infrastructures.py +0 -150
- pulumi_gcp/oracledatabase/get_cloud_vm_cluster.py +0 -290
- pulumi_gcp/oracledatabase/get_cloud_vm_clusters.py +0 -150
- pulumi_gcp/oracledatabase/get_db_nodes.py +0 -245
- pulumi_gcp/oracledatabase/get_db_servers.py +0 -245
- pulumi_gcp/oracledatabase/outputs.py +0 -9304
- pulumi_gcp/transcoder/__init__.py +0 -11
- pulumi_gcp/transcoder/_inputs.py +0 -3991
- pulumi_gcp/transcoder/job.py +0 -2134
- pulumi_gcp/transcoder/job_template.py +0 -1524
- pulumi_gcp/transcoder/outputs.py +0 -2918
- {pulumi_gcp-8.7.0.dist-info → pulumi_gcp-8.7.0a1729107581.dist-info}/top_level.txt +0 -0
@@ -38,31 +38,29 @@ class NetworkFirewallPolicyRuleArgs:
|
|
38
38
|
"""
|
39
39
|
The set of arguments for constructing a NetworkFirewallPolicyRule resource.
|
40
40
|
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
|
41
|
-
:param pulumi.Input[str] direction: The direction in which this rule applies.
|
42
|
-
Possible values are: `INGRESS`, `EGRESS`.
|
41
|
+
:param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
|
43
42
|
:param pulumi.Input[str] firewall_policy: The firewall policy of the resource.
|
44
43
|
:param pulumi.Input['NetworkFirewallPolicyRuleMatchArgs'] match: A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
|
45
|
-
|
46
|
-
:param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list.
|
47
|
-
The priority must be a positive value between 0 and 2147483647.
|
48
|
-
Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
|
44
|
+
:param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
|
49
45
|
:param pulumi.Input[str] description: An optional description for this resource.
|
50
46
|
:param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
|
51
47
|
traffic behaves as if it did not exist. If this is unspecified, the firewall policy rule will be enabled.
|
52
48
|
:param pulumi.Input[bool] enable_logging: Denotes whether to enable logging for a particular rule. If logging is enabled, logs will be exported to the configured
|
53
49
|
export destination in Stackdriver. Logs may be exported to BigQuery or Pub/Sub. Note: you cannot enable logging on
|
54
50
|
"goto_next" rules.
|
51
|
+
:param pulumi.Input[str] project: The project for the resource
|
55
52
|
:param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
|
56
|
-
:param pulumi.Input[str] security_profile_group: A fully-qualified URL of a
|
57
|
-
https://networksecurity.googleapis.com/v1/
|
58
|
-
|
59
|
-
:param pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are
|
60
|
-
the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
|
61
|
-
|
62
|
-
|
63
|
-
|
53
|
+
:param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
|
54
|
+
https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
|
55
|
+
It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
56
|
+
:param pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
|
57
|
+
specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
|
58
|
+
tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
|
59
|
+
<code>targetSecureTag</code> may not be set at the same time as <code>targetServiceAccounts</code>. If neither
|
60
|
+
<code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
|
61
|
+
instances on the specified network. Maximum number of target label tags allowed is 256.
|
64
62
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
|
65
|
-
:param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted.
|
63
|
+
:param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
|
66
64
|
'apply_security_profile_group' and cannot be set for other actions.
|
67
65
|
"""
|
68
66
|
pulumi.set(__self__, "action", action)
|
@@ -105,8 +103,7 @@ class NetworkFirewallPolicyRuleArgs:
|
|
105
103
|
@pulumi.getter
|
106
104
|
def direction(self) -> pulumi.Input[str]:
|
107
105
|
"""
|
108
|
-
The direction in which this rule applies.
|
109
|
-
Possible values are: `INGRESS`, `EGRESS`.
|
106
|
+
The direction in which this rule applies. Possible values: INGRESS, EGRESS
|
110
107
|
"""
|
111
108
|
return pulumi.get(self, "direction")
|
112
109
|
|
@@ -131,7 +128,6 @@ class NetworkFirewallPolicyRuleArgs:
|
|
131
128
|
def match(self) -> pulumi.Input['NetworkFirewallPolicyRuleMatchArgs']:
|
132
129
|
"""
|
133
130
|
A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
|
134
|
-
Structure is documented below.
|
135
131
|
"""
|
136
132
|
return pulumi.get(self, "match")
|
137
133
|
|
@@ -143,9 +139,7 @@ class NetworkFirewallPolicyRuleArgs:
|
|
143
139
|
@pulumi.getter
|
144
140
|
def priority(self) -> pulumi.Input[int]:
|
145
141
|
"""
|
146
|
-
An integer indicating the priority of a rule in the list.
|
147
|
-
The priority must be a positive value between 0 and 2147483647.
|
148
|
-
Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
|
142
|
+
An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
|
149
143
|
"""
|
150
144
|
return pulumi.get(self, "priority")
|
151
145
|
|
@@ -195,6 +189,9 @@ class NetworkFirewallPolicyRuleArgs:
|
|
195
189
|
@property
|
196
190
|
@pulumi.getter
|
197
191
|
def project(self) -> Optional[pulumi.Input[str]]:
|
192
|
+
"""
|
193
|
+
The project for the resource
|
194
|
+
"""
|
198
195
|
return pulumi.get(self, "project")
|
199
196
|
|
200
197
|
@project.setter
|
@@ -217,9 +214,9 @@ class NetworkFirewallPolicyRuleArgs:
|
|
217
214
|
@pulumi.getter(name="securityProfileGroup")
|
218
215
|
def security_profile_group(self) -> Optional[pulumi.Input[str]]:
|
219
216
|
"""
|
220
|
-
A fully-qualified URL of a
|
221
|
-
https://networksecurity.googleapis.com/v1/
|
222
|
-
|
217
|
+
A fully-qualified URL of a SecurityProfileGroup resource. Example:
|
218
|
+
https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
|
219
|
+
It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
223
220
|
"""
|
224
221
|
return pulumi.get(self, "security_profile_group")
|
225
222
|
|
@@ -231,11 +228,12 @@ class NetworkFirewallPolicyRuleArgs:
|
|
231
228
|
@pulumi.getter(name="targetSecureTags")
|
232
229
|
def target_secure_tags(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]]:
|
233
230
|
"""
|
234
|
-
A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are
|
235
|
-
the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
|
236
|
-
|
237
|
-
|
238
|
-
|
231
|
+
A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
|
232
|
+
specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
|
233
|
+
tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
|
234
|
+
<code>targetSecureTag</code> may not be set at the same time as <code>targetServiceAccounts</code>. If neither
|
235
|
+
<code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
|
236
|
+
instances on the specified network. Maximum number of target label tags allowed is 256.
|
239
237
|
"""
|
240
238
|
return pulumi.get(self, "target_secure_tags")
|
241
239
|
|
@@ -259,7 +257,7 @@ class NetworkFirewallPolicyRuleArgs:
|
|
259
257
|
@pulumi.getter(name="tlsInspect")
|
260
258
|
def tls_inspect(self) -> Optional[pulumi.Input[bool]]:
|
261
259
|
"""
|
262
|
-
Boolean flag indicating if the traffic should be TLS decrypted.
|
260
|
+
Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
|
263
261
|
'apply_security_profile_group' and cannot be set for other actions.
|
264
262
|
"""
|
265
263
|
return pulumi.get(self, "tls_inspect")
|
@@ -273,7 +271,6 @@ class NetworkFirewallPolicyRuleArgs:
|
|
273
271
|
class _NetworkFirewallPolicyRuleState:
|
274
272
|
def __init__(__self__, *,
|
275
273
|
action: Optional[pulumi.Input[str]] = None,
|
276
|
-
creation_timestamp: Optional[pulumi.Input[str]] = None,
|
277
274
|
description: Optional[pulumi.Input[str]] = None,
|
278
275
|
direction: Optional[pulumi.Input[str]] = None,
|
279
276
|
disabled: Optional[pulumi.Input[bool]] = None,
|
@@ -292,10 +289,8 @@ class _NetworkFirewallPolicyRuleState:
|
|
292
289
|
"""
|
293
290
|
Input properties used for looking up and filtering NetworkFirewallPolicyRule resources.
|
294
291
|
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
|
295
|
-
:param pulumi.Input[str] creation_timestamp: Creation timestamp in RFC3339 text format.
|
296
292
|
:param pulumi.Input[str] description: An optional description for this resource.
|
297
|
-
:param pulumi.Input[str] direction: The direction in which this rule applies.
|
298
|
-
Possible values are: `INGRESS`, `EGRESS`.
|
293
|
+
:param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
|
299
294
|
:param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
|
300
295
|
traffic behaves as if it did not exist. If this is unspecified, the firewall policy rule will be enabled.
|
301
296
|
:param pulumi.Input[bool] enable_logging: Denotes whether to enable logging for a particular rule. If logging is enabled, logs will be exported to the configured
|
@@ -304,28 +299,25 @@ class _NetworkFirewallPolicyRuleState:
|
|
304
299
|
:param pulumi.Input[str] firewall_policy: The firewall policy of the resource.
|
305
300
|
:param pulumi.Input[str] kind: Type of the resource. Always `compute#firewallPolicyRule` for firewall policy rules
|
306
301
|
:param pulumi.Input['NetworkFirewallPolicyRuleMatchArgs'] match: A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
|
307
|
-
|
308
|
-
:param pulumi.Input[
|
309
|
-
The priority must be a positive value between 0 and 2147483647.
|
310
|
-
Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
|
302
|
+
:param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
|
303
|
+
:param pulumi.Input[str] project: The project for the resource
|
311
304
|
:param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
|
312
305
|
:param pulumi.Input[int] rule_tuple_count: Calculation of the complexity of a single firewall policy rule.
|
313
|
-
:param pulumi.Input[str] security_profile_group: A fully-qualified URL of a
|
314
|
-
https://networksecurity.googleapis.com/v1/
|
315
|
-
|
316
|
-
:param pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are
|
317
|
-
the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
|
318
|
-
|
319
|
-
|
320
|
-
|
306
|
+
:param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
|
307
|
+
https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
|
308
|
+
It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
309
|
+
:param pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
|
310
|
+
specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
|
311
|
+
tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
|
312
|
+
<code>targetSecureTag</code> may not be set at the same time as <code>targetServiceAccounts</code>. If neither
|
313
|
+
<code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
|
314
|
+
instances on the specified network. Maximum number of target label tags allowed is 256.
|
321
315
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
|
322
|
-
:param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted.
|
316
|
+
:param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
|
323
317
|
'apply_security_profile_group' and cannot be set for other actions.
|
324
318
|
"""
|
325
319
|
if action is not None:
|
326
320
|
pulumi.set(__self__, "action", action)
|
327
|
-
if creation_timestamp is not None:
|
328
|
-
pulumi.set(__self__, "creation_timestamp", creation_timestamp)
|
329
321
|
if description is not None:
|
330
322
|
pulumi.set(__self__, "description", description)
|
331
323
|
if direction is not None:
|
@@ -369,18 +361,6 @@ class _NetworkFirewallPolicyRuleState:
|
|
369
361
|
def action(self, value: Optional[pulumi.Input[str]]):
|
370
362
|
pulumi.set(self, "action", value)
|
371
363
|
|
372
|
-
@property
|
373
|
-
@pulumi.getter(name="creationTimestamp")
|
374
|
-
def creation_timestamp(self) -> Optional[pulumi.Input[str]]:
|
375
|
-
"""
|
376
|
-
Creation timestamp in RFC3339 text format.
|
377
|
-
"""
|
378
|
-
return pulumi.get(self, "creation_timestamp")
|
379
|
-
|
380
|
-
@creation_timestamp.setter
|
381
|
-
def creation_timestamp(self, value: Optional[pulumi.Input[str]]):
|
382
|
-
pulumi.set(self, "creation_timestamp", value)
|
383
|
-
|
384
364
|
@property
|
385
365
|
@pulumi.getter
|
386
366
|
def description(self) -> Optional[pulumi.Input[str]]:
|
@@ -397,8 +377,7 @@ class _NetworkFirewallPolicyRuleState:
|
|
397
377
|
@pulumi.getter
|
398
378
|
def direction(self) -> Optional[pulumi.Input[str]]:
|
399
379
|
"""
|
400
|
-
The direction in which this rule applies.
|
401
|
-
Possible values are: `INGRESS`, `EGRESS`.
|
380
|
+
The direction in which this rule applies. Possible values: INGRESS, EGRESS
|
402
381
|
"""
|
403
382
|
return pulumi.get(self, "direction")
|
404
383
|
|
@@ -462,7 +441,6 @@ class _NetworkFirewallPolicyRuleState:
|
|
462
441
|
def match(self) -> Optional[pulumi.Input['NetworkFirewallPolicyRuleMatchArgs']]:
|
463
442
|
"""
|
464
443
|
A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
|
465
|
-
Structure is documented below.
|
466
444
|
"""
|
467
445
|
return pulumi.get(self, "match")
|
468
446
|
|
@@ -474,9 +452,7 @@ class _NetworkFirewallPolicyRuleState:
|
|
474
452
|
@pulumi.getter
|
475
453
|
def priority(self) -> Optional[pulumi.Input[int]]:
|
476
454
|
"""
|
477
|
-
An integer indicating the priority of a rule in the list.
|
478
|
-
The priority must be a positive value between 0 and 2147483647.
|
479
|
-
Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
|
455
|
+
An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
|
480
456
|
"""
|
481
457
|
return pulumi.get(self, "priority")
|
482
458
|
|
@@ -487,6 +463,9 @@ class _NetworkFirewallPolicyRuleState:
|
|
487
463
|
@property
|
488
464
|
@pulumi.getter
|
489
465
|
def project(self) -> Optional[pulumi.Input[str]]:
|
466
|
+
"""
|
467
|
+
The project for the resource
|
468
|
+
"""
|
490
469
|
return pulumi.get(self, "project")
|
491
470
|
|
492
471
|
@project.setter
|
@@ -521,9 +500,9 @@ class _NetworkFirewallPolicyRuleState:
|
|
521
500
|
@pulumi.getter(name="securityProfileGroup")
|
522
501
|
def security_profile_group(self) -> Optional[pulumi.Input[str]]:
|
523
502
|
"""
|
524
|
-
A fully-qualified URL of a
|
525
|
-
https://networksecurity.googleapis.com/v1/
|
526
|
-
|
503
|
+
A fully-qualified URL of a SecurityProfileGroup resource. Example:
|
504
|
+
https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
|
505
|
+
It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
527
506
|
"""
|
528
507
|
return pulumi.get(self, "security_profile_group")
|
529
508
|
|
@@ -535,11 +514,12 @@ class _NetworkFirewallPolicyRuleState:
|
|
535
514
|
@pulumi.getter(name="targetSecureTags")
|
536
515
|
def target_secure_tags(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]]:
|
537
516
|
"""
|
538
|
-
A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are
|
539
|
-
the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
|
540
|
-
|
541
|
-
|
542
|
-
|
517
|
+
A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
|
518
|
+
specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
|
519
|
+
tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
|
520
|
+
<code>targetSecureTag</code> may not be set at the same time as <code>targetServiceAccounts</code>. If neither
|
521
|
+
<code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
|
522
|
+
instances on the specified network. Maximum number of target label tags allowed is 256.
|
543
523
|
"""
|
544
524
|
return pulumi.get(self, "target_secure_tags")
|
545
525
|
|
@@ -563,7 +543,7 @@ class _NetworkFirewallPolicyRuleState:
|
|
563
543
|
@pulumi.getter(name="tlsInspect")
|
564
544
|
def tls_inspect(self) -> Optional[pulumi.Input[bool]]:
|
565
545
|
"""
|
566
|
-
Boolean flag indicating if the traffic should be TLS decrypted.
|
546
|
+
Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
|
567
547
|
'apply_security_profile_group' and cannot be set for other actions.
|
568
548
|
"""
|
569
549
|
return pulumi.get(self, "tls_inspect")
|
@@ -594,22 +574,17 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
594
574
|
tls_inspect: Optional[pulumi.Input[bool]] = None,
|
595
575
|
__props__=None):
|
596
576
|
"""
|
597
|
-
|
598
|
-
|
599
|
-
To get more information about NetworkFirewallPolicyRule, see:
|
600
|
-
|
601
|
-
* [API documentation](https://cloud.google.com/compute/docs/reference/rest/v1/networkFirewallPolicies/addRule)
|
577
|
+
The Compute NetworkFirewallPolicyRule resource
|
602
578
|
|
603
579
|
## Example Usage
|
604
580
|
|
605
|
-
###
|
606
|
-
|
581
|
+
### Global
|
607
582
|
```python
|
608
583
|
import pulumi
|
609
584
|
import pulumi_gcp as gcp
|
610
585
|
|
611
586
|
basic_global_networksecurity_address_group = gcp.networksecurity.AddressGroup("basic_global_networksecurity_address_group",
|
612
|
-
name="
|
587
|
+
name="policy",
|
613
588
|
parent="projects/my-project-name",
|
614
589
|
description="Sample global networksecurity_address_group",
|
615
590
|
location="global",
|
@@ -686,8 +661,7 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
686
661
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
687
662
|
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
|
688
663
|
:param pulumi.Input[str] description: An optional description for this resource.
|
689
|
-
:param pulumi.Input[str] direction: The direction in which this rule applies.
|
690
|
-
Possible values are: `INGRESS`, `EGRESS`.
|
664
|
+
:param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
|
691
665
|
:param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
|
692
666
|
traffic behaves as if it did not exist. If this is unspecified, the firewall policy rule will be enabled.
|
693
667
|
:param pulumi.Input[bool] enable_logging: Denotes whether to enable logging for a particular rule. If logging is enabled, logs will be exported to the configured
|
@@ -695,21 +669,20 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
695
669
|
"goto_next" rules.
|
696
670
|
:param pulumi.Input[str] firewall_policy: The firewall policy of the resource.
|
697
671
|
:param pulumi.Input[Union['NetworkFirewallPolicyRuleMatchArgs', 'NetworkFirewallPolicyRuleMatchArgsDict']] match: A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
|
698
|
-
|
699
|
-
:param pulumi.Input[
|
700
|
-
The priority must be a positive value between 0 and 2147483647.
|
701
|
-
Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
|
672
|
+
:param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
|
673
|
+
:param pulumi.Input[str] project: The project for the resource
|
702
674
|
:param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
|
703
|
-
:param pulumi.Input[str] security_profile_group: A fully-qualified URL of a
|
704
|
-
https://networksecurity.googleapis.com/v1/
|
705
|
-
|
706
|
-
:param pulumi.Input[Sequence[pulumi.Input[Union['NetworkFirewallPolicyRuleTargetSecureTagArgs', 'NetworkFirewallPolicyRuleTargetSecureTagArgsDict']]]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are
|
707
|
-
the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
|
708
|
-
|
709
|
-
|
710
|
-
|
675
|
+
:param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
|
676
|
+
https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
|
677
|
+
It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
678
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['NetworkFirewallPolicyRuleTargetSecureTagArgs', 'NetworkFirewallPolicyRuleTargetSecureTagArgsDict']]]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
|
679
|
+
specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
|
680
|
+
tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
|
681
|
+
<code>targetSecureTag</code> may not be set at the same time as <code>targetServiceAccounts</code>. If neither
|
682
|
+
<code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
|
683
|
+
instances on the specified network. Maximum number of target label tags allowed is 256.
|
711
684
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
|
712
|
-
:param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted.
|
685
|
+
:param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
|
713
686
|
'apply_security_profile_group' and cannot be set for other actions.
|
714
687
|
"""
|
715
688
|
...
|
@@ -719,22 +692,17 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
719
692
|
args: NetworkFirewallPolicyRuleArgs,
|
720
693
|
opts: Optional[pulumi.ResourceOptions] = None):
|
721
694
|
"""
|
722
|
-
|
723
|
-
|
724
|
-
To get more information about NetworkFirewallPolicyRule, see:
|
725
|
-
|
726
|
-
* [API documentation](https://cloud.google.com/compute/docs/reference/rest/v1/networkFirewallPolicies/addRule)
|
695
|
+
The Compute NetworkFirewallPolicyRule resource
|
727
696
|
|
728
697
|
## Example Usage
|
729
698
|
|
730
|
-
###
|
731
|
-
|
699
|
+
### Global
|
732
700
|
```python
|
733
701
|
import pulumi
|
734
702
|
import pulumi_gcp as gcp
|
735
703
|
|
736
704
|
basic_global_networksecurity_address_group = gcp.networksecurity.AddressGroup("basic_global_networksecurity_address_group",
|
737
|
-
name="
|
705
|
+
name="policy",
|
738
706
|
parent="projects/my-project-name",
|
739
707
|
description="Sample global networksecurity_address_group",
|
740
708
|
location="global",
|
@@ -869,7 +837,6 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
869
837
|
__props__.__dict__["target_secure_tags"] = target_secure_tags
|
870
838
|
__props__.__dict__["target_service_accounts"] = target_service_accounts
|
871
839
|
__props__.__dict__["tls_inspect"] = tls_inspect
|
872
|
-
__props__.__dict__["creation_timestamp"] = None
|
873
840
|
__props__.__dict__["kind"] = None
|
874
841
|
__props__.__dict__["rule_tuple_count"] = None
|
875
842
|
super(NetworkFirewallPolicyRule, __self__).__init__(
|
@@ -883,7 +850,6 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
883
850
|
id: pulumi.Input[str],
|
884
851
|
opts: Optional[pulumi.ResourceOptions] = None,
|
885
852
|
action: Optional[pulumi.Input[str]] = None,
|
886
|
-
creation_timestamp: Optional[pulumi.Input[str]] = None,
|
887
853
|
description: Optional[pulumi.Input[str]] = None,
|
888
854
|
direction: Optional[pulumi.Input[str]] = None,
|
889
855
|
disabled: Optional[pulumi.Input[bool]] = None,
|
@@ -907,10 +873,8 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
907
873
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
908
874
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
909
875
|
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
|
910
|
-
:param pulumi.Input[str] creation_timestamp: Creation timestamp in RFC3339 text format.
|
911
876
|
:param pulumi.Input[str] description: An optional description for this resource.
|
912
|
-
:param pulumi.Input[str] direction: The direction in which this rule applies.
|
913
|
-
Possible values are: `INGRESS`, `EGRESS`.
|
877
|
+
:param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
|
914
878
|
:param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
|
915
879
|
traffic behaves as if it did not exist. If this is unspecified, the firewall policy rule will be enabled.
|
916
880
|
:param pulumi.Input[bool] enable_logging: Denotes whether to enable logging for a particular rule. If logging is enabled, logs will be exported to the configured
|
@@ -919,22 +883,21 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
919
883
|
:param pulumi.Input[str] firewall_policy: The firewall policy of the resource.
|
920
884
|
:param pulumi.Input[str] kind: Type of the resource. Always `compute#firewallPolicyRule` for firewall policy rules
|
921
885
|
:param pulumi.Input[Union['NetworkFirewallPolicyRuleMatchArgs', 'NetworkFirewallPolicyRuleMatchArgsDict']] match: A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
|
922
|
-
|
923
|
-
:param pulumi.Input[
|
924
|
-
The priority must be a positive value between 0 and 2147483647.
|
925
|
-
Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
|
886
|
+
:param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
|
887
|
+
:param pulumi.Input[str] project: The project for the resource
|
926
888
|
:param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
|
927
889
|
:param pulumi.Input[int] rule_tuple_count: Calculation of the complexity of a single firewall policy rule.
|
928
|
-
:param pulumi.Input[str] security_profile_group: A fully-qualified URL of a
|
929
|
-
https://networksecurity.googleapis.com/v1/
|
930
|
-
|
931
|
-
:param pulumi.Input[Sequence[pulumi.Input[Union['NetworkFirewallPolicyRuleTargetSecureTagArgs', 'NetworkFirewallPolicyRuleTargetSecureTagArgsDict']]]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are
|
932
|
-
the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
|
933
|
-
|
934
|
-
|
935
|
-
|
890
|
+
:param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
|
891
|
+
https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
|
892
|
+
It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
893
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['NetworkFirewallPolicyRuleTargetSecureTagArgs', 'NetworkFirewallPolicyRuleTargetSecureTagArgsDict']]]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
|
894
|
+
specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
|
895
|
+
tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
|
896
|
+
<code>targetSecureTag</code> may not be set at the same time as <code>targetServiceAccounts</code>. If neither
|
897
|
+
<code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
|
898
|
+
instances on the specified network. Maximum number of target label tags allowed is 256.
|
936
899
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
|
937
|
-
:param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted.
|
900
|
+
:param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
|
938
901
|
'apply_security_profile_group' and cannot be set for other actions.
|
939
902
|
"""
|
940
903
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -942,7 +905,6 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
942
905
|
__props__ = _NetworkFirewallPolicyRuleState.__new__(_NetworkFirewallPolicyRuleState)
|
943
906
|
|
944
907
|
__props__.__dict__["action"] = action
|
945
|
-
__props__.__dict__["creation_timestamp"] = creation_timestamp
|
946
908
|
__props__.__dict__["description"] = description
|
947
909
|
__props__.__dict__["direction"] = direction
|
948
910
|
__props__.__dict__["disabled"] = disabled
|
@@ -968,14 +930,6 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
968
930
|
"""
|
969
931
|
return pulumi.get(self, "action")
|
970
932
|
|
971
|
-
@property
|
972
|
-
@pulumi.getter(name="creationTimestamp")
|
973
|
-
def creation_timestamp(self) -> pulumi.Output[str]:
|
974
|
-
"""
|
975
|
-
Creation timestamp in RFC3339 text format.
|
976
|
-
"""
|
977
|
-
return pulumi.get(self, "creation_timestamp")
|
978
|
-
|
979
933
|
@property
|
980
934
|
@pulumi.getter
|
981
935
|
def description(self) -> pulumi.Output[Optional[str]]:
|
@@ -988,8 +942,7 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
988
942
|
@pulumi.getter
|
989
943
|
def direction(self) -> pulumi.Output[str]:
|
990
944
|
"""
|
991
|
-
The direction in which this rule applies.
|
992
|
-
Possible values are: `INGRESS`, `EGRESS`.
|
945
|
+
The direction in which this rule applies. Possible values: INGRESS, EGRESS
|
993
946
|
"""
|
994
947
|
return pulumi.get(self, "direction")
|
995
948
|
|
@@ -1033,7 +986,6 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
1033
986
|
def match(self) -> pulumi.Output['outputs.NetworkFirewallPolicyRuleMatch']:
|
1034
987
|
"""
|
1035
988
|
A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
|
1036
|
-
Structure is documented below.
|
1037
989
|
"""
|
1038
990
|
return pulumi.get(self, "match")
|
1039
991
|
|
@@ -1041,15 +993,16 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
1041
993
|
@pulumi.getter
|
1042
994
|
def priority(self) -> pulumi.Output[int]:
|
1043
995
|
"""
|
1044
|
-
An integer indicating the priority of a rule in the list.
|
1045
|
-
The priority must be a positive value between 0 and 2147483647.
|
1046
|
-
Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
|
996
|
+
An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
|
1047
997
|
"""
|
1048
998
|
return pulumi.get(self, "priority")
|
1049
999
|
|
1050
1000
|
@property
|
1051
1001
|
@pulumi.getter
|
1052
1002
|
def project(self) -> pulumi.Output[str]:
|
1003
|
+
"""
|
1004
|
+
The project for the resource
|
1005
|
+
"""
|
1053
1006
|
return pulumi.get(self, "project")
|
1054
1007
|
|
1055
1008
|
@property
|
@@ -1072,9 +1025,9 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
1072
1025
|
@pulumi.getter(name="securityProfileGroup")
|
1073
1026
|
def security_profile_group(self) -> pulumi.Output[Optional[str]]:
|
1074
1027
|
"""
|
1075
|
-
A fully-qualified URL of a
|
1076
|
-
https://networksecurity.googleapis.com/v1/
|
1077
|
-
|
1028
|
+
A fully-qualified URL of a SecurityProfileGroup resource. Example:
|
1029
|
+
https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
|
1030
|
+
It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
1078
1031
|
"""
|
1079
1032
|
return pulumi.get(self, "security_profile_group")
|
1080
1033
|
|
@@ -1082,11 +1035,12 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
1082
1035
|
@pulumi.getter(name="targetSecureTags")
|
1083
1036
|
def target_secure_tags(self) -> pulumi.Output[Optional[Sequence['outputs.NetworkFirewallPolicyRuleTargetSecureTag']]]:
|
1084
1037
|
"""
|
1085
|
-
A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are
|
1086
|
-
the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
|
1087
|
-
|
1088
|
-
|
1089
|
-
|
1038
|
+
A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
|
1039
|
+
specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
|
1040
|
+
tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
|
1041
|
+
<code>targetSecureTag</code> may not be set at the same time as <code>targetServiceAccounts</code>. If neither
|
1042
|
+
<code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
|
1043
|
+
instances on the specified network. Maximum number of target label tags allowed is 256.
|
1090
1044
|
"""
|
1091
1045
|
return pulumi.get(self, "target_secure_tags")
|
1092
1046
|
|
@@ -1102,7 +1056,7 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
1102
1056
|
@pulumi.getter(name="tlsInspect")
|
1103
1057
|
def tls_inspect(self) -> pulumi.Output[Optional[bool]]:
|
1104
1058
|
"""
|
1105
|
-
Boolean flag indicating if the traffic should be TLS decrypted.
|
1059
|
+
Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
|
1106
1060
|
'apply_security_profile_group' and cannot be set for other actions.
|
1107
1061
|
"""
|
1108
1062
|
return pulumi.get(self, "tls_inspect")
|