pulumi-gcp 8.7.0a1730183903__py3-none-any.whl → 8.7.0a1730196225__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (111) hide show
  1. pulumi_gcp/__init__.py +70 -0
  2. pulumi_gcp/accesscontextmanager/service_perimeter.py +2 -0
  3. pulumi_gcp/accesscontextmanager/service_perimeter_dry_run_egress_policy.py +4 -0
  4. pulumi_gcp/accesscontextmanager/service_perimeter_dry_run_ingress_policy.py +4 -0
  5. pulumi_gcp/accesscontextmanager/service_perimeter_egress_policy.py +4 -0
  6. pulumi_gcp/accesscontextmanager/service_perimeter_ingress_policy.py +4 -0
  7. pulumi_gcp/accesscontextmanager/service_perimeters.py +2 -0
  8. pulumi_gcp/apigee/__init__.py +2 -0
  9. pulumi_gcp/apigee/_inputs.py +108 -0
  10. pulumi_gcp/apigee/app_group.py +811 -0
  11. pulumi_gcp/apigee/developer.py +757 -0
  12. pulumi_gcp/apigee/outputs.py +64 -0
  13. pulumi_gcp/artifactregistry/get_docker_image.py +40 -0
  14. pulumi_gcp/bigquery/connection.py +12 -12
  15. pulumi_gcp/bigquery/job.py +6 -6
  16. pulumi_gcp/cloudrunv2/get_service.py +12 -1
  17. pulumi_gcp/cloudrunv2/service.py +92 -0
  18. pulumi_gcp/compute/_inputs.py +214 -116
  19. pulumi_gcp/compute/backend_service.py +76 -0
  20. pulumi_gcp/compute/get_backend_service.py +12 -1
  21. pulumi_gcp/compute/get_instance.py +29 -1
  22. pulumi_gcp/compute/get_instance_template.py +29 -1
  23. pulumi_gcp/compute/get_region_instance_group_manager.py +0 -18
  24. pulumi_gcp/compute/get_region_instance_template.py +29 -1
  25. pulumi_gcp/compute/instance.py +89 -0
  26. pulumi_gcp/compute/instance_from_machine_image.py +82 -0
  27. pulumi_gcp/compute/instance_from_template.py +82 -0
  28. pulumi_gcp/compute/instance_template.py +75 -0
  29. pulumi_gcp/compute/network_firewall_policy_association.py +76 -50
  30. pulumi_gcp/compute/network_firewall_policy_rule.py +149 -103
  31. pulumi_gcp/compute/outputs.py +170 -80
  32. pulumi_gcp/compute/region_backend_service.py +94 -0
  33. pulumi_gcp/compute/region_instance_template.py +75 -0
  34. pulumi_gcp/compute/region_network_endpoint_group.py +6 -4
  35. pulumi_gcp/compute/region_network_firewall_policy_association.py +104 -54
  36. pulumi_gcp/compute/region_network_firewall_policy_rule.py +160 -107
  37. pulumi_gcp/config/__init__.pyi +4 -0
  38. pulumi_gcp/config/vars.py +8 -0
  39. pulumi_gcp/container/attached_cluster.py +9 -6
  40. pulumi_gcp/container/outputs.py +2 -2
  41. pulumi_gcp/datastream/stream.py +2 -2
  42. pulumi_gcp/diagflow/_inputs.py +472 -2
  43. pulumi_gcp/diagflow/cx_agent.py +64 -4
  44. pulumi_gcp/diagflow/cx_flow.py +30 -0
  45. pulumi_gcp/diagflow/outputs.py +378 -2
  46. pulumi_gcp/gkehub/feature.py +2 -4
  47. pulumi_gcp/iam/workload_identity_pool_provider.py +56 -0
  48. pulumi_gcp/looker/instance.py +104 -2
  49. pulumi_gcp/monitoring/_inputs.py +23 -0
  50. pulumi_gcp/monitoring/get_secret_version.py +22 -3
  51. pulumi_gcp/monitoring/outputs.py +16 -0
  52. pulumi_gcp/networkconnectivity/__init__.py +1 -0
  53. pulumi_gcp/networkconnectivity/_inputs.py +148 -0
  54. pulumi_gcp/networkconnectivity/group.py +764 -0
  55. pulumi_gcp/networkconnectivity/outputs.py +125 -0
  56. pulumi_gcp/networkconnectivity/spoke.py +144 -0
  57. pulumi_gcp/networksecurity/server_tls_policy.py +2 -2
  58. pulumi_gcp/oracledatabase/__init__.py +20 -0
  59. pulumi_gcp/oracledatabase/_inputs.py +4745 -0
  60. pulumi_gcp/oracledatabase/autonomous_database.py +983 -0
  61. pulumi_gcp/oracledatabase/cloud_exadata_infrastructure.py +842 -0
  62. pulumi_gcp/oracledatabase/cloud_vm_cluster.py +1086 -0
  63. pulumi_gcp/oracledatabase/get_autonomous_database.py +290 -0
  64. pulumi_gcp/oracledatabase/get_autonomous_databases.py +150 -0
  65. pulumi_gcp/oracledatabase/get_cloud_exadata_infrastructure.py +257 -0
  66. pulumi_gcp/oracledatabase/get_cloud_exadata_infrastructures.py +150 -0
  67. pulumi_gcp/oracledatabase/get_cloud_vm_cluster.py +290 -0
  68. pulumi_gcp/oracledatabase/get_cloud_vm_clusters.py +150 -0
  69. pulumi_gcp/oracledatabase/get_db_nodes.py +245 -0
  70. pulumi_gcp/oracledatabase/get_db_servers.py +245 -0
  71. pulumi_gcp/oracledatabase/outputs.py +9304 -0
  72. pulumi_gcp/organizations/folder.py +7 -7
  73. pulumi_gcp/organizations/project.py +7 -7
  74. pulumi_gcp/orgpolicy/_inputs.py +3 -3
  75. pulumi_gcp/orgpolicy/outputs.py +2 -2
  76. pulumi_gcp/privilegedaccessmanager/get_entitlement.py +46 -2
  77. pulumi_gcp/provider.py +40 -0
  78. pulumi_gcp/pulumi-plugin.json +1 -1
  79. pulumi_gcp/secretmanager/get_regional_secret_version.py +24 -5
  80. pulumi_gcp/secretmanager/get_regional_secret_version_access.py +24 -5
  81. pulumi_gcp/secretmanager/get_secret_version.py +22 -3
  82. pulumi_gcp/secretmanager/get_secret_version_access.py +22 -3
  83. pulumi_gcp/secretmanager/regional_secret.py +2 -2
  84. pulumi_gcp/siteverification/get_token.py +0 -16
  85. pulumi_gcp/siteverification/owner.py +0 -16
  86. pulumi_gcp/spanner/_inputs.py +29 -5
  87. pulumi_gcp/spanner/outputs.py +20 -3
  88. pulumi_gcp/sql/_inputs.py +6 -6
  89. pulumi_gcp/sql/outputs.py +4 -4
  90. pulumi_gcp/sql/user.py +28 -21
  91. pulumi_gcp/storage/_inputs.py +36 -0
  92. pulumi_gcp/storage/bucket.py +47 -0
  93. pulumi_gcp/storage/get_bucket.py +12 -1
  94. pulumi_gcp/storage/outputs.py +40 -0
  95. pulumi_gcp/transcoder/__init__.py +11 -0
  96. pulumi_gcp/transcoder/_inputs.py +3991 -0
  97. pulumi_gcp/transcoder/job.py +2134 -0
  98. pulumi_gcp/transcoder/job_template.py +1524 -0
  99. pulumi_gcp/transcoder/outputs.py +2918 -0
  100. pulumi_gcp/vertex/ai_deployment_resource_pool.py +2 -2
  101. pulumi_gcp/vmwareengine/_inputs.py +440 -0
  102. pulumi_gcp/vmwareengine/cluster.py +100 -2
  103. pulumi_gcp/vmwareengine/get_cluster.py +12 -1
  104. pulumi_gcp/vmwareengine/outputs.py +615 -0
  105. pulumi_gcp/workstations/_inputs.py +54 -0
  106. pulumi_gcp/workstations/outputs.py +32 -0
  107. pulumi_gcp/workstations/workstation_config.py +205 -0
  108. {pulumi_gcp-8.7.0a1730183903.dist-info → pulumi_gcp-8.7.0a1730196225.dist-info}/METADATA +1 -1
  109. {pulumi_gcp-8.7.0a1730183903.dist-info → pulumi_gcp-8.7.0a1730196225.dist-info}/RECORD +111 -89
  110. {pulumi_gcp-8.7.0a1730183903.dist-info → pulumi_gcp-8.7.0a1730196225.dist-info}/WHEEL +1 -1
  111. {pulumi_gcp-8.7.0a1730183903.dist-info → pulumi_gcp-8.7.0a1730196225.dist-info}/top_level.txt +0 -0
@@ -38,29 +38,31 @@ class NetworkFirewallPolicyRuleArgs:
38
38
  """
39
39
  The set of arguments for constructing a NetworkFirewallPolicyRule resource.
40
40
  :param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
41
- :param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
41
+ :param pulumi.Input[str] direction: The direction in which this rule applies.
42
+ Possible values are: `INGRESS`, `EGRESS`.
42
43
  :param pulumi.Input[str] firewall_policy: The firewall policy of the resource.
43
44
  :param pulumi.Input['NetworkFirewallPolicyRuleMatchArgs'] match: A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
44
- :param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
45
+ Structure is documented below.
46
+ :param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list.
47
+ The priority must be a positive value between 0 and 2147483647.
48
+ Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
45
49
  :param pulumi.Input[str] description: An optional description for this resource.
46
50
  :param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
47
51
  traffic behaves as if it did not exist. If this is unspecified, the firewall policy rule will be enabled.
48
52
  :param pulumi.Input[bool] enable_logging: Denotes whether to enable logging for a particular rule. If logging is enabled, logs will be exported to the configured
49
53
  export destination in Stackdriver. Logs may be exported to BigQuery or Pub/Sub. Note: you cannot enable logging on
50
54
  "goto_next" rules.
51
- :param pulumi.Input[str] project: The project for the resource
52
55
  :param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
53
- :param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
54
- https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
55
- It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
56
- :param pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
57
- specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
58
- tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
59
- <code>targetSecureTag</code> may not be set at the same time as <code>targetServiceAccounts</code>. If neither
60
- <code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
61
- instances on the specified network. Maximum number of target label tags allowed is 256.
56
+ :param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfile resource instance. Example:
57
+ https://networksecurity.googleapis.com/v1/projects/{project}/locations/{location}/securityProfileGroups/my-security-profile-group
58
+ Must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
59
+ :param pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are specified, then
60
+ the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure tags, if all the
61
+ targetSecureTag are in INEFFECTIVE state, then this rule will be ignored. targetSecureTag may not be set at the same
62
+ time as targetServiceAccounts. If neither targetServiceAccounts nor targetSecureTag are specified, the firewall rule
63
+ applies to all instances on the specified network. Maximum number of target label tags allowed is 256.
62
64
  :param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
63
- :param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
65
+ :param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. Can be set only if action =
64
66
  'apply_security_profile_group' and cannot be set for other actions.
65
67
  """
66
68
  pulumi.set(__self__, "action", action)
@@ -103,7 +105,8 @@ class NetworkFirewallPolicyRuleArgs:
103
105
  @pulumi.getter
104
106
  def direction(self) -> pulumi.Input[str]:
105
107
  """
106
- The direction in which this rule applies. Possible values: INGRESS, EGRESS
108
+ The direction in which this rule applies.
109
+ Possible values are: `INGRESS`, `EGRESS`.
107
110
  """
108
111
  return pulumi.get(self, "direction")
109
112
 
@@ -128,6 +131,7 @@ class NetworkFirewallPolicyRuleArgs:
128
131
  def match(self) -> pulumi.Input['NetworkFirewallPolicyRuleMatchArgs']:
129
132
  """
130
133
  A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
134
+ Structure is documented below.
131
135
  """
132
136
  return pulumi.get(self, "match")
133
137
 
@@ -139,7 +143,9 @@ class NetworkFirewallPolicyRuleArgs:
139
143
  @pulumi.getter
140
144
  def priority(self) -> pulumi.Input[int]:
141
145
  """
142
- An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
146
+ An integer indicating the priority of a rule in the list.
147
+ The priority must be a positive value between 0 and 2147483647.
148
+ Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
143
149
  """
144
150
  return pulumi.get(self, "priority")
145
151
 
@@ -189,9 +195,6 @@ class NetworkFirewallPolicyRuleArgs:
189
195
  @property
190
196
  @pulumi.getter
191
197
  def project(self) -> Optional[pulumi.Input[str]]:
192
- """
193
- The project for the resource
194
- """
195
198
  return pulumi.get(self, "project")
196
199
 
197
200
  @project.setter
@@ -214,9 +217,9 @@ class NetworkFirewallPolicyRuleArgs:
214
217
  @pulumi.getter(name="securityProfileGroup")
215
218
  def security_profile_group(self) -> Optional[pulumi.Input[str]]:
216
219
  """
217
- A fully-qualified URL of a SecurityProfileGroup resource. Example:
218
- https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
219
- It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
220
+ A fully-qualified URL of a SecurityProfile resource instance. Example:
221
+ https://networksecurity.googleapis.com/v1/projects/{project}/locations/{location}/securityProfileGroups/my-security-profile-group
222
+ Must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
220
223
  """
221
224
  return pulumi.get(self, "security_profile_group")
222
225
 
@@ -228,12 +231,11 @@ class NetworkFirewallPolicyRuleArgs:
228
231
  @pulumi.getter(name="targetSecureTags")
229
232
  def target_secure_tags(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]]:
230
233
  """
231
- A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
232
- specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
233
- tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
234
- <code>targetSecureTag</code> may not be set at the same time as <code>targetServiceAccounts</code>. If neither
235
- <code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
236
- instances on the specified network. Maximum number of target label tags allowed is 256.
234
+ A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are specified, then
235
+ the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure tags, if all the
236
+ targetSecureTag are in INEFFECTIVE state, then this rule will be ignored. targetSecureTag may not be set at the same
237
+ time as targetServiceAccounts. If neither targetServiceAccounts nor targetSecureTag are specified, the firewall rule
238
+ applies to all instances on the specified network. Maximum number of target label tags allowed is 256.
237
239
  """
238
240
  return pulumi.get(self, "target_secure_tags")
239
241
 
@@ -257,7 +259,7 @@ class NetworkFirewallPolicyRuleArgs:
257
259
  @pulumi.getter(name="tlsInspect")
258
260
  def tls_inspect(self) -> Optional[pulumi.Input[bool]]:
259
261
  """
260
- Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
262
+ Boolean flag indicating if the traffic should be TLS decrypted. Can be set only if action =
261
263
  'apply_security_profile_group' and cannot be set for other actions.
262
264
  """
263
265
  return pulumi.get(self, "tls_inspect")
@@ -271,6 +273,7 @@ class NetworkFirewallPolicyRuleArgs:
271
273
  class _NetworkFirewallPolicyRuleState:
272
274
  def __init__(__self__, *,
273
275
  action: Optional[pulumi.Input[str]] = None,
276
+ creation_timestamp: Optional[pulumi.Input[str]] = None,
274
277
  description: Optional[pulumi.Input[str]] = None,
275
278
  direction: Optional[pulumi.Input[str]] = None,
276
279
  disabled: Optional[pulumi.Input[bool]] = None,
@@ -289,8 +292,10 @@ class _NetworkFirewallPolicyRuleState:
289
292
  """
290
293
  Input properties used for looking up and filtering NetworkFirewallPolicyRule resources.
291
294
  :param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
295
+ :param pulumi.Input[str] creation_timestamp: Creation timestamp in RFC3339 text format.
292
296
  :param pulumi.Input[str] description: An optional description for this resource.
293
- :param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
297
+ :param pulumi.Input[str] direction: The direction in which this rule applies.
298
+ Possible values are: `INGRESS`, `EGRESS`.
294
299
  :param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
295
300
  traffic behaves as if it did not exist. If this is unspecified, the firewall policy rule will be enabled.
296
301
  :param pulumi.Input[bool] enable_logging: Denotes whether to enable logging for a particular rule. If logging is enabled, logs will be exported to the configured
@@ -299,25 +304,28 @@ class _NetworkFirewallPolicyRuleState:
299
304
  :param pulumi.Input[str] firewall_policy: The firewall policy of the resource.
300
305
  :param pulumi.Input[str] kind: Type of the resource. Always `compute#firewallPolicyRule` for firewall policy rules
301
306
  :param pulumi.Input['NetworkFirewallPolicyRuleMatchArgs'] match: A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
302
- :param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
303
- :param pulumi.Input[str] project: The project for the resource
307
+ Structure is documented below.
308
+ :param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list.
309
+ The priority must be a positive value between 0 and 2147483647.
310
+ Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
304
311
  :param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
305
312
  :param pulumi.Input[int] rule_tuple_count: Calculation of the complexity of a single firewall policy rule.
306
- :param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
307
- https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
308
- It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
309
- :param pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
310
- specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
311
- tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
312
- <code>targetSecureTag</code> may not be set at the same time as <code>targetServiceAccounts</code>. If neither
313
- <code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
314
- instances on the specified network. Maximum number of target label tags allowed is 256.
313
+ :param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfile resource instance. Example:
314
+ https://networksecurity.googleapis.com/v1/projects/{project}/locations/{location}/securityProfileGroups/my-security-profile-group
315
+ Must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
316
+ :param pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are specified, then
317
+ the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure tags, if all the
318
+ targetSecureTag are in INEFFECTIVE state, then this rule will be ignored. targetSecureTag may not be set at the same
319
+ time as targetServiceAccounts. If neither targetServiceAccounts nor targetSecureTag are specified, the firewall rule
320
+ applies to all instances on the specified network. Maximum number of target label tags allowed is 256.
315
321
  :param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
316
- :param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
322
+ :param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. Can be set only if action =
317
323
  'apply_security_profile_group' and cannot be set for other actions.
318
324
  """
319
325
  if action is not None:
320
326
  pulumi.set(__self__, "action", action)
327
+ if creation_timestamp is not None:
328
+ pulumi.set(__self__, "creation_timestamp", creation_timestamp)
321
329
  if description is not None:
322
330
  pulumi.set(__self__, "description", description)
323
331
  if direction is not None:
@@ -361,6 +369,18 @@ class _NetworkFirewallPolicyRuleState:
361
369
  def action(self, value: Optional[pulumi.Input[str]]):
362
370
  pulumi.set(self, "action", value)
363
371
 
372
+ @property
373
+ @pulumi.getter(name="creationTimestamp")
374
+ def creation_timestamp(self) -> Optional[pulumi.Input[str]]:
375
+ """
376
+ Creation timestamp in RFC3339 text format.
377
+ """
378
+ return pulumi.get(self, "creation_timestamp")
379
+
380
+ @creation_timestamp.setter
381
+ def creation_timestamp(self, value: Optional[pulumi.Input[str]]):
382
+ pulumi.set(self, "creation_timestamp", value)
383
+
364
384
  @property
365
385
  @pulumi.getter
366
386
  def description(self) -> Optional[pulumi.Input[str]]:
@@ -377,7 +397,8 @@ class _NetworkFirewallPolicyRuleState:
377
397
  @pulumi.getter
378
398
  def direction(self) -> Optional[pulumi.Input[str]]:
379
399
  """
380
- The direction in which this rule applies. Possible values: INGRESS, EGRESS
400
+ The direction in which this rule applies.
401
+ Possible values are: `INGRESS`, `EGRESS`.
381
402
  """
382
403
  return pulumi.get(self, "direction")
383
404
 
@@ -441,6 +462,7 @@ class _NetworkFirewallPolicyRuleState:
441
462
  def match(self) -> Optional[pulumi.Input['NetworkFirewallPolicyRuleMatchArgs']]:
442
463
  """
443
464
  A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
465
+ Structure is documented below.
444
466
  """
445
467
  return pulumi.get(self, "match")
446
468
 
@@ -452,7 +474,9 @@ class _NetworkFirewallPolicyRuleState:
452
474
  @pulumi.getter
453
475
  def priority(self) -> Optional[pulumi.Input[int]]:
454
476
  """
455
- An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
477
+ An integer indicating the priority of a rule in the list.
478
+ The priority must be a positive value between 0 and 2147483647.
479
+ Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
456
480
  """
457
481
  return pulumi.get(self, "priority")
458
482
 
@@ -463,9 +487,6 @@ class _NetworkFirewallPolicyRuleState:
463
487
  @property
464
488
  @pulumi.getter
465
489
  def project(self) -> Optional[pulumi.Input[str]]:
466
- """
467
- The project for the resource
468
- """
469
490
  return pulumi.get(self, "project")
470
491
 
471
492
  @project.setter
@@ -500,9 +521,9 @@ class _NetworkFirewallPolicyRuleState:
500
521
  @pulumi.getter(name="securityProfileGroup")
501
522
  def security_profile_group(self) -> Optional[pulumi.Input[str]]:
502
523
  """
503
- A fully-qualified URL of a SecurityProfileGroup resource. Example:
504
- https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
505
- It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
524
+ A fully-qualified URL of a SecurityProfile resource instance. Example:
525
+ https://networksecurity.googleapis.com/v1/projects/{project}/locations/{location}/securityProfileGroups/my-security-profile-group
526
+ Must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
506
527
  """
507
528
  return pulumi.get(self, "security_profile_group")
508
529
 
@@ -514,12 +535,11 @@ class _NetworkFirewallPolicyRuleState:
514
535
  @pulumi.getter(name="targetSecureTags")
515
536
  def target_secure_tags(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]]:
516
537
  """
517
- A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
518
- specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
519
- tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
520
- <code>targetSecureTag</code> may not be set at the same time as <code>targetServiceAccounts</code>. If neither
521
- <code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
522
- instances on the specified network. Maximum number of target label tags allowed is 256.
538
+ A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are specified, then
539
+ the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure tags, if all the
540
+ targetSecureTag are in INEFFECTIVE state, then this rule will be ignored. targetSecureTag may not be set at the same
541
+ time as targetServiceAccounts. If neither targetServiceAccounts nor targetSecureTag are specified, the firewall rule
542
+ applies to all instances on the specified network. Maximum number of target label tags allowed is 256.
523
543
  """
524
544
  return pulumi.get(self, "target_secure_tags")
525
545
 
@@ -543,7 +563,7 @@ class _NetworkFirewallPolicyRuleState:
543
563
  @pulumi.getter(name="tlsInspect")
544
564
  def tls_inspect(self) -> Optional[pulumi.Input[bool]]:
545
565
  """
546
- Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
566
+ Boolean flag indicating if the traffic should be TLS decrypted. Can be set only if action =
547
567
  'apply_security_profile_group' and cannot be set for other actions.
548
568
  """
549
569
  return pulumi.get(self, "tls_inspect")
@@ -574,17 +594,22 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
574
594
  tls_inspect: Optional[pulumi.Input[bool]] = None,
575
595
  __props__=None):
576
596
  """
577
- The Compute NetworkFirewallPolicyRule resource
597
+ Represents a rule that describes one or more match conditions along with the action to be taken when traffic matches this condition (allow or deny).
598
+
599
+ To get more information about NetworkFirewallPolicyRule, see:
600
+
601
+ * [API documentation](https://cloud.google.com/compute/docs/reference/rest/v1/networkFirewallPolicies/addRule)
578
602
 
579
603
  ## Example Usage
580
604
 
581
- ### Global
605
+ ### Network Firewall Policy Rule
606
+
582
607
  ```python
583
608
  import pulumi
584
609
  import pulumi_gcp as gcp
585
610
 
586
611
  basic_global_networksecurity_address_group = gcp.networksecurity.AddressGroup("basic_global_networksecurity_address_group",
587
- name="policy",
612
+ name="address",
588
613
  parent="projects/my-project-name",
589
614
  description="Sample global networksecurity_address_group",
590
615
  location="global",
@@ -661,7 +686,8 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
661
686
  :param pulumi.ResourceOptions opts: Options for the resource.
662
687
  :param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
663
688
  :param pulumi.Input[str] description: An optional description for this resource.
664
- :param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
689
+ :param pulumi.Input[str] direction: The direction in which this rule applies.
690
+ Possible values are: `INGRESS`, `EGRESS`.
665
691
  :param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
666
692
  traffic behaves as if it did not exist. If this is unspecified, the firewall policy rule will be enabled.
667
693
  :param pulumi.Input[bool] enable_logging: Denotes whether to enable logging for a particular rule. If logging is enabled, logs will be exported to the configured
@@ -669,20 +695,21 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
669
695
  "goto_next" rules.
670
696
  :param pulumi.Input[str] firewall_policy: The firewall policy of the resource.
671
697
  :param pulumi.Input[Union['NetworkFirewallPolicyRuleMatchArgs', 'NetworkFirewallPolicyRuleMatchArgsDict']] match: A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
672
- :param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
673
- :param pulumi.Input[str] project: The project for the resource
698
+ Structure is documented below.
699
+ :param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list.
700
+ The priority must be a positive value between 0 and 2147483647.
701
+ Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
674
702
  :param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
675
- :param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
676
- https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
677
- It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
678
- :param pulumi.Input[Sequence[pulumi.Input[Union['NetworkFirewallPolicyRuleTargetSecureTagArgs', 'NetworkFirewallPolicyRuleTargetSecureTagArgsDict']]]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
679
- specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
680
- tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
681
- <code>targetSecureTag</code> may not be set at the same time as <code>targetServiceAccounts</code>. If neither
682
- <code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
683
- instances on the specified network. Maximum number of target label tags allowed is 256.
703
+ :param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfile resource instance. Example:
704
+ https://networksecurity.googleapis.com/v1/projects/{project}/locations/{location}/securityProfileGroups/my-security-profile-group
705
+ Must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
706
+ :param pulumi.Input[Sequence[pulumi.Input[Union['NetworkFirewallPolicyRuleTargetSecureTagArgs', 'NetworkFirewallPolicyRuleTargetSecureTagArgsDict']]]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are specified, then
707
+ the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure tags, if all the
708
+ targetSecureTag are in INEFFECTIVE state, then this rule will be ignored. targetSecureTag may not be set at the same
709
+ time as targetServiceAccounts. If neither targetServiceAccounts nor targetSecureTag are specified, the firewall rule
710
+ applies to all instances on the specified network. Maximum number of target label tags allowed is 256.
684
711
  :param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
685
- :param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
712
+ :param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. Can be set only if action =
686
713
  'apply_security_profile_group' and cannot be set for other actions.
687
714
  """
688
715
  ...
@@ -692,17 +719,22 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
692
719
  args: NetworkFirewallPolicyRuleArgs,
693
720
  opts: Optional[pulumi.ResourceOptions] = None):
694
721
  """
695
- The Compute NetworkFirewallPolicyRule resource
722
+ Represents a rule that describes one or more match conditions along with the action to be taken when traffic matches this condition (allow or deny).
723
+
724
+ To get more information about NetworkFirewallPolicyRule, see:
725
+
726
+ * [API documentation](https://cloud.google.com/compute/docs/reference/rest/v1/networkFirewallPolicies/addRule)
696
727
 
697
728
  ## Example Usage
698
729
 
699
- ### Global
730
+ ### Network Firewall Policy Rule
731
+
700
732
  ```python
701
733
  import pulumi
702
734
  import pulumi_gcp as gcp
703
735
 
704
736
  basic_global_networksecurity_address_group = gcp.networksecurity.AddressGroup("basic_global_networksecurity_address_group",
705
- name="policy",
737
+ name="address",
706
738
  parent="projects/my-project-name",
707
739
  description="Sample global networksecurity_address_group",
708
740
  location="global",
@@ -837,6 +869,7 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
837
869
  __props__.__dict__["target_secure_tags"] = target_secure_tags
838
870
  __props__.__dict__["target_service_accounts"] = target_service_accounts
839
871
  __props__.__dict__["tls_inspect"] = tls_inspect
872
+ __props__.__dict__["creation_timestamp"] = None
840
873
  __props__.__dict__["kind"] = None
841
874
  __props__.__dict__["rule_tuple_count"] = None
842
875
  super(NetworkFirewallPolicyRule, __self__).__init__(
@@ -850,6 +883,7 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
850
883
  id: pulumi.Input[str],
851
884
  opts: Optional[pulumi.ResourceOptions] = None,
852
885
  action: Optional[pulumi.Input[str]] = None,
886
+ creation_timestamp: Optional[pulumi.Input[str]] = None,
853
887
  description: Optional[pulumi.Input[str]] = None,
854
888
  direction: Optional[pulumi.Input[str]] = None,
855
889
  disabled: Optional[pulumi.Input[bool]] = None,
@@ -873,8 +907,10 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
873
907
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
874
908
  :param pulumi.ResourceOptions opts: Options for the resource.
875
909
  :param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
910
+ :param pulumi.Input[str] creation_timestamp: Creation timestamp in RFC3339 text format.
876
911
  :param pulumi.Input[str] description: An optional description for this resource.
877
- :param pulumi.Input[str] direction: The direction in which this rule applies. Possible values: INGRESS, EGRESS
912
+ :param pulumi.Input[str] direction: The direction in which this rule applies.
913
+ Possible values are: `INGRESS`, `EGRESS`.
878
914
  :param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
879
915
  traffic behaves as if it did not exist. If this is unspecified, the firewall policy rule will be enabled.
880
916
  :param pulumi.Input[bool] enable_logging: Denotes whether to enable logging for a particular rule. If logging is enabled, logs will be exported to the configured
@@ -883,21 +919,22 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
883
919
  :param pulumi.Input[str] firewall_policy: The firewall policy of the resource.
884
920
  :param pulumi.Input[str] kind: Type of the resource. Always `compute#firewallPolicyRule` for firewall policy rules
885
921
  :param pulumi.Input[Union['NetworkFirewallPolicyRuleMatchArgs', 'NetworkFirewallPolicyRuleMatchArgsDict']] match: A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
886
- :param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
887
- :param pulumi.Input[str] project: The project for the resource
922
+ Structure is documented below.
923
+ :param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list.
924
+ The priority must be a positive value between 0 and 2147483647.
925
+ Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
888
926
  :param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
889
927
  :param pulumi.Input[int] rule_tuple_count: Calculation of the complexity of a single firewall policy rule.
890
- :param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfileGroup resource. Example:
891
- https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
892
- It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
893
- :param pulumi.Input[Sequence[pulumi.Input[Union['NetworkFirewallPolicyRuleTargetSecureTagArgs', 'NetworkFirewallPolicyRuleTargetSecureTagArgsDict']]]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
894
- specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
895
- tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
896
- <code>targetSecureTag</code> may not be set at the same time as <code>targetServiceAccounts</code>. If neither
897
- <code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
898
- instances on the specified network. Maximum number of target label tags allowed is 256.
928
+ :param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfile resource instance. Example:
929
+ https://networksecurity.googleapis.com/v1/projects/{project}/locations/{location}/securityProfileGroups/my-security-profile-group
930
+ Must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
931
+ :param pulumi.Input[Sequence[pulumi.Input[Union['NetworkFirewallPolicyRuleTargetSecureTagArgs', 'NetworkFirewallPolicyRuleTargetSecureTagArgsDict']]]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are specified, then
932
+ the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure tags, if all the
933
+ targetSecureTag are in INEFFECTIVE state, then this rule will be ignored. targetSecureTag may not be set at the same
934
+ time as targetServiceAccounts. If neither targetServiceAccounts nor targetSecureTag are specified, the firewall rule
935
+ applies to all instances on the specified network. Maximum number of target label tags allowed is 256.
899
936
  :param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
900
- :param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
937
+ :param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. Can be set only if action =
901
938
  'apply_security_profile_group' and cannot be set for other actions.
902
939
  """
903
940
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -905,6 +942,7 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
905
942
  __props__ = _NetworkFirewallPolicyRuleState.__new__(_NetworkFirewallPolicyRuleState)
906
943
 
907
944
  __props__.__dict__["action"] = action
945
+ __props__.__dict__["creation_timestamp"] = creation_timestamp
908
946
  __props__.__dict__["description"] = description
909
947
  __props__.__dict__["direction"] = direction
910
948
  __props__.__dict__["disabled"] = disabled
@@ -930,6 +968,14 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
930
968
  """
931
969
  return pulumi.get(self, "action")
932
970
 
971
+ @property
972
+ @pulumi.getter(name="creationTimestamp")
973
+ def creation_timestamp(self) -> pulumi.Output[str]:
974
+ """
975
+ Creation timestamp in RFC3339 text format.
976
+ """
977
+ return pulumi.get(self, "creation_timestamp")
978
+
933
979
  @property
934
980
  @pulumi.getter
935
981
  def description(self) -> pulumi.Output[Optional[str]]:
@@ -942,7 +988,8 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
942
988
  @pulumi.getter
943
989
  def direction(self) -> pulumi.Output[str]:
944
990
  """
945
- The direction in which this rule applies. Possible values: INGRESS, EGRESS
991
+ The direction in which this rule applies.
992
+ Possible values are: `INGRESS`, `EGRESS`.
946
993
  """
947
994
  return pulumi.get(self, "direction")
948
995
 
@@ -986,6 +1033,7 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
986
1033
  def match(self) -> pulumi.Output['outputs.NetworkFirewallPolicyRuleMatch']:
987
1034
  """
988
1035
  A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
1036
+ Structure is documented below.
989
1037
  """
990
1038
  return pulumi.get(self, "match")
991
1039
 
@@ -993,16 +1041,15 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
993
1041
  @pulumi.getter
994
1042
  def priority(self) -> pulumi.Output[int]:
995
1043
  """
996
- An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
1044
+ An integer indicating the priority of a rule in the list.
1045
+ The priority must be a positive value between 0 and 2147483647.
1046
+ Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
997
1047
  """
998
1048
  return pulumi.get(self, "priority")
999
1049
 
1000
1050
  @property
1001
1051
  @pulumi.getter
1002
1052
  def project(self) -> pulumi.Output[str]:
1003
- """
1004
- The project for the resource
1005
- """
1006
1053
  return pulumi.get(self, "project")
1007
1054
 
1008
1055
  @property
@@ -1025,9 +1072,9 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
1025
1072
  @pulumi.getter(name="securityProfileGroup")
1026
1073
  def security_profile_group(self) -> pulumi.Output[Optional[str]]:
1027
1074
  """
1028
- A fully-qualified URL of a SecurityProfileGroup resource. Example:
1029
- https://networksecurity.googleapis.com/v1/organizations/{organizationId}/locations/global/securityProfileGroups/my-security-profile-group.
1030
- It must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
1075
+ A fully-qualified URL of a SecurityProfile resource instance. Example:
1076
+ https://networksecurity.googleapis.com/v1/projects/{project}/locations/{location}/securityProfileGroups/my-security-profile-group
1077
+ Must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
1031
1078
  """
1032
1079
  return pulumi.get(self, "security_profile_group")
1033
1080
 
@@ -1035,12 +1082,11 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
1035
1082
  @pulumi.getter(name="targetSecureTags")
1036
1083
  def target_secure_tags(self) -> pulumi.Output[Optional[Sequence['outputs.NetworkFirewallPolicyRuleTargetSecureTag']]]:
1037
1084
  """
1038
- A list of secure tags that controls which instances the firewall rule applies to. If <code>targetSecureTag</code> are
1039
- specified, then the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure
1040
- tags, if all the target_secure_tag are in INEFFECTIVE state, then this rule will be ignored.
1041
- <code>targetSecureTag</code> may not be set at the same time as <code>targetServiceAccounts</code>. If neither
1042
- <code>targetServiceAccounts</code> nor <code>targetSecureTag</code> are specified, the firewall rule applies to all
1043
- instances on the specified network. Maximum number of target label tags allowed is 256.
1085
+ A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are specified, then
1086
+ the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure tags, if all the
1087
+ targetSecureTag are in INEFFECTIVE state, then this rule will be ignored. targetSecureTag may not be set at the same
1088
+ time as targetServiceAccounts. If neither targetServiceAccounts nor targetSecureTag are specified, the firewall rule
1089
+ applies to all instances on the specified network. Maximum number of target label tags allowed is 256.
1044
1090
  """
1045
1091
  return pulumi.get(self, "target_secure_tags")
1046
1092
 
@@ -1056,7 +1102,7 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
1056
1102
  @pulumi.getter(name="tlsInspect")
1057
1103
  def tls_inspect(self) -> pulumi.Output[Optional[bool]]:
1058
1104
  """
1059
- Boolean flag indicating if the traffic should be TLS decrypted. It can be set only if action =
1105
+ Boolean flag indicating if the traffic should be TLS decrypted. Can be set only if action =
1060
1106
  'apply_security_profile_group' and cannot be set for other actions.
1061
1107
  """
1062
1108
  return pulumi.get(self, "tls_inspect")