pulumi-gcp 8.7.0a1730183903__py3-none-any.whl → 8.7.0a1730196225__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +70 -0
- pulumi_gcp/accesscontextmanager/service_perimeter.py +2 -0
- pulumi_gcp/accesscontextmanager/service_perimeter_dry_run_egress_policy.py +4 -0
- pulumi_gcp/accesscontextmanager/service_perimeter_dry_run_ingress_policy.py +4 -0
- pulumi_gcp/accesscontextmanager/service_perimeter_egress_policy.py +4 -0
- pulumi_gcp/accesscontextmanager/service_perimeter_ingress_policy.py +4 -0
- pulumi_gcp/accesscontextmanager/service_perimeters.py +2 -0
- pulumi_gcp/apigee/__init__.py +2 -0
- pulumi_gcp/apigee/_inputs.py +108 -0
- pulumi_gcp/apigee/app_group.py +811 -0
- pulumi_gcp/apigee/developer.py +757 -0
- pulumi_gcp/apigee/outputs.py +64 -0
- pulumi_gcp/artifactregistry/get_docker_image.py +40 -0
- pulumi_gcp/bigquery/connection.py +12 -12
- pulumi_gcp/bigquery/job.py +6 -6
- pulumi_gcp/cloudrunv2/get_service.py +12 -1
- pulumi_gcp/cloudrunv2/service.py +92 -0
- pulumi_gcp/compute/_inputs.py +214 -116
- pulumi_gcp/compute/backend_service.py +76 -0
- pulumi_gcp/compute/get_backend_service.py +12 -1
- pulumi_gcp/compute/get_instance.py +29 -1
- pulumi_gcp/compute/get_instance_template.py +29 -1
- pulumi_gcp/compute/get_region_instance_group_manager.py +0 -18
- pulumi_gcp/compute/get_region_instance_template.py +29 -1
- pulumi_gcp/compute/instance.py +89 -0
- pulumi_gcp/compute/instance_from_machine_image.py +82 -0
- pulumi_gcp/compute/instance_from_template.py +82 -0
- pulumi_gcp/compute/instance_template.py +75 -0
- pulumi_gcp/compute/network_firewall_policy_association.py +76 -50
- pulumi_gcp/compute/network_firewall_policy_rule.py +149 -103
- pulumi_gcp/compute/outputs.py +170 -80
- pulumi_gcp/compute/region_backend_service.py +94 -0
- pulumi_gcp/compute/region_instance_template.py +75 -0
- pulumi_gcp/compute/region_network_endpoint_group.py +6 -4
- pulumi_gcp/compute/region_network_firewall_policy_association.py +104 -54
- pulumi_gcp/compute/region_network_firewall_policy_rule.py +160 -107
- pulumi_gcp/config/__init__.pyi +4 -0
- pulumi_gcp/config/vars.py +8 -0
- pulumi_gcp/container/attached_cluster.py +9 -6
- pulumi_gcp/container/outputs.py +2 -2
- pulumi_gcp/datastream/stream.py +2 -2
- pulumi_gcp/diagflow/_inputs.py +472 -2
- pulumi_gcp/diagflow/cx_agent.py +64 -4
- pulumi_gcp/diagflow/cx_flow.py +30 -0
- pulumi_gcp/diagflow/outputs.py +378 -2
- pulumi_gcp/gkehub/feature.py +2 -4
- pulumi_gcp/iam/workload_identity_pool_provider.py +56 -0
- pulumi_gcp/looker/instance.py +104 -2
- pulumi_gcp/monitoring/_inputs.py +23 -0
- pulumi_gcp/monitoring/get_secret_version.py +22 -3
- pulumi_gcp/monitoring/outputs.py +16 -0
- pulumi_gcp/networkconnectivity/__init__.py +1 -0
- pulumi_gcp/networkconnectivity/_inputs.py +148 -0
- pulumi_gcp/networkconnectivity/group.py +764 -0
- pulumi_gcp/networkconnectivity/outputs.py +125 -0
- pulumi_gcp/networkconnectivity/spoke.py +144 -0
- pulumi_gcp/networksecurity/server_tls_policy.py +2 -2
- pulumi_gcp/oracledatabase/__init__.py +20 -0
- pulumi_gcp/oracledatabase/_inputs.py +4745 -0
- pulumi_gcp/oracledatabase/autonomous_database.py +983 -0
- pulumi_gcp/oracledatabase/cloud_exadata_infrastructure.py +842 -0
- pulumi_gcp/oracledatabase/cloud_vm_cluster.py +1086 -0
- pulumi_gcp/oracledatabase/get_autonomous_database.py +290 -0
- pulumi_gcp/oracledatabase/get_autonomous_databases.py +150 -0
- pulumi_gcp/oracledatabase/get_cloud_exadata_infrastructure.py +257 -0
- pulumi_gcp/oracledatabase/get_cloud_exadata_infrastructures.py +150 -0
- pulumi_gcp/oracledatabase/get_cloud_vm_cluster.py +290 -0
- pulumi_gcp/oracledatabase/get_cloud_vm_clusters.py +150 -0
- pulumi_gcp/oracledatabase/get_db_nodes.py +245 -0
- pulumi_gcp/oracledatabase/get_db_servers.py +245 -0
- pulumi_gcp/oracledatabase/outputs.py +9304 -0
- pulumi_gcp/organizations/folder.py +7 -7
- pulumi_gcp/organizations/project.py +7 -7
- pulumi_gcp/orgpolicy/_inputs.py +3 -3
- pulumi_gcp/orgpolicy/outputs.py +2 -2
- pulumi_gcp/privilegedaccessmanager/get_entitlement.py +46 -2
- pulumi_gcp/provider.py +40 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/secretmanager/get_regional_secret_version.py +24 -5
- pulumi_gcp/secretmanager/get_regional_secret_version_access.py +24 -5
- pulumi_gcp/secretmanager/get_secret_version.py +22 -3
- pulumi_gcp/secretmanager/get_secret_version_access.py +22 -3
- pulumi_gcp/secretmanager/regional_secret.py +2 -2
- pulumi_gcp/siteverification/get_token.py +0 -16
- pulumi_gcp/siteverification/owner.py +0 -16
- pulumi_gcp/spanner/_inputs.py +29 -5
- pulumi_gcp/spanner/outputs.py +20 -3
- pulumi_gcp/sql/_inputs.py +6 -6
- pulumi_gcp/sql/outputs.py +4 -4
- pulumi_gcp/sql/user.py +28 -21
- pulumi_gcp/storage/_inputs.py +36 -0
- pulumi_gcp/storage/bucket.py +47 -0
- pulumi_gcp/storage/get_bucket.py +12 -1
- pulumi_gcp/storage/outputs.py +40 -0
- pulumi_gcp/transcoder/__init__.py +11 -0
- pulumi_gcp/transcoder/_inputs.py +3991 -0
- pulumi_gcp/transcoder/job.py +2134 -0
- pulumi_gcp/transcoder/job_template.py +1524 -0
- pulumi_gcp/transcoder/outputs.py +2918 -0
- pulumi_gcp/vertex/ai_deployment_resource_pool.py +2 -2
- pulumi_gcp/vmwareengine/_inputs.py +440 -0
- pulumi_gcp/vmwareengine/cluster.py +100 -2
- pulumi_gcp/vmwareengine/get_cluster.py +12 -1
- pulumi_gcp/vmwareengine/outputs.py +615 -0
- pulumi_gcp/workstations/_inputs.py +54 -0
- pulumi_gcp/workstations/outputs.py +32 -0
- pulumi_gcp/workstations/workstation_config.py +205 -0
- {pulumi_gcp-8.7.0a1730183903.dist-info → pulumi_gcp-8.7.0a1730196225.dist-info}/METADATA +1 -1
- {pulumi_gcp-8.7.0a1730183903.dist-info → pulumi_gcp-8.7.0a1730196225.dist-info}/RECORD +111 -89
- {pulumi_gcp-8.7.0a1730183903.dist-info → pulumi_gcp-8.7.0a1730196225.dist-info}/WHEEL +1 -1
- {pulumi_gcp-8.7.0a1730183903.dist-info → pulumi_gcp-8.7.0a1730196225.dist-info}/top_level.txt +0 -0
@@ -38,29 +38,31 @@ class NetworkFirewallPolicyRuleArgs:
|
|
38
38
|
"""
|
39
39
|
The set of arguments for constructing a NetworkFirewallPolicyRule resource.
|
40
40
|
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
|
41
|
-
:param pulumi.Input[str] direction: The direction in which this rule applies.
|
41
|
+
:param pulumi.Input[str] direction: The direction in which this rule applies.
|
42
|
+
Possible values are: `INGRESS`, `EGRESS`.
|
42
43
|
:param pulumi.Input[str] firewall_policy: The firewall policy of the resource.
|
43
44
|
:param pulumi.Input['NetworkFirewallPolicyRuleMatchArgs'] match: A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
|
44
|
-
|
45
|
+
Structure is documented below.
|
46
|
+
:param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list.
|
47
|
+
The priority must be a positive value between 0 and 2147483647.
|
48
|
+
Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
|
45
49
|
:param pulumi.Input[str] description: An optional description for this resource.
|
46
50
|
:param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
|
47
51
|
traffic behaves as if it did not exist. If this is unspecified, the firewall policy rule will be enabled.
|
48
52
|
:param pulumi.Input[bool] enable_logging: Denotes whether to enable logging for a particular rule. If logging is enabled, logs will be exported to the configured
|
49
53
|
export destination in Stackdriver. Logs may be exported to BigQuery or Pub/Sub. Note: you cannot enable logging on
|
50
54
|
"goto_next" rules.
|
51
|
-
:param pulumi.Input[str] project: The project for the resource
|
52
55
|
:param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
|
53
|
-
:param pulumi.Input[str] security_profile_group: A fully-qualified URL of a
|
54
|
-
https://networksecurity.googleapis.com/v1/
|
55
|
-
|
56
|
-
:param pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If
|
57
|
-
|
58
|
-
|
59
|
-
|
60
|
-
|
61
|
-
instances on the specified network. Maximum number of target label tags allowed is 256.
|
56
|
+
:param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfile resource instance. Example:
|
57
|
+
https://networksecurity.googleapis.com/v1/projects/{project}/locations/{location}/securityProfileGroups/my-security-profile-group
|
58
|
+
Must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
59
|
+
:param pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are specified, then
|
60
|
+
the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure tags, if all the
|
61
|
+
targetSecureTag are in INEFFECTIVE state, then this rule will be ignored. targetSecureTag may not be set at the same
|
62
|
+
time as targetServiceAccounts. If neither targetServiceAccounts nor targetSecureTag are specified, the firewall rule
|
63
|
+
applies to all instances on the specified network. Maximum number of target label tags allowed is 256.
|
62
64
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
|
63
|
-
:param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted.
|
65
|
+
:param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. Can be set only if action =
|
64
66
|
'apply_security_profile_group' and cannot be set for other actions.
|
65
67
|
"""
|
66
68
|
pulumi.set(__self__, "action", action)
|
@@ -103,7 +105,8 @@ class NetworkFirewallPolicyRuleArgs:
|
|
103
105
|
@pulumi.getter
|
104
106
|
def direction(self) -> pulumi.Input[str]:
|
105
107
|
"""
|
106
|
-
The direction in which this rule applies.
|
108
|
+
The direction in which this rule applies.
|
109
|
+
Possible values are: `INGRESS`, `EGRESS`.
|
107
110
|
"""
|
108
111
|
return pulumi.get(self, "direction")
|
109
112
|
|
@@ -128,6 +131,7 @@ class NetworkFirewallPolicyRuleArgs:
|
|
128
131
|
def match(self) -> pulumi.Input['NetworkFirewallPolicyRuleMatchArgs']:
|
129
132
|
"""
|
130
133
|
A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
|
134
|
+
Structure is documented below.
|
131
135
|
"""
|
132
136
|
return pulumi.get(self, "match")
|
133
137
|
|
@@ -139,7 +143,9 @@ class NetworkFirewallPolicyRuleArgs:
|
|
139
143
|
@pulumi.getter
|
140
144
|
def priority(self) -> pulumi.Input[int]:
|
141
145
|
"""
|
142
|
-
An integer indicating the priority of a rule in the list.
|
146
|
+
An integer indicating the priority of a rule in the list.
|
147
|
+
The priority must be a positive value between 0 and 2147483647.
|
148
|
+
Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
|
143
149
|
"""
|
144
150
|
return pulumi.get(self, "priority")
|
145
151
|
|
@@ -189,9 +195,6 @@ class NetworkFirewallPolicyRuleArgs:
|
|
189
195
|
@property
|
190
196
|
@pulumi.getter
|
191
197
|
def project(self) -> Optional[pulumi.Input[str]]:
|
192
|
-
"""
|
193
|
-
The project for the resource
|
194
|
-
"""
|
195
198
|
return pulumi.get(self, "project")
|
196
199
|
|
197
200
|
@project.setter
|
@@ -214,9 +217,9 @@ class NetworkFirewallPolicyRuleArgs:
|
|
214
217
|
@pulumi.getter(name="securityProfileGroup")
|
215
218
|
def security_profile_group(self) -> Optional[pulumi.Input[str]]:
|
216
219
|
"""
|
217
|
-
A fully-qualified URL of a
|
218
|
-
https://networksecurity.googleapis.com/v1/
|
219
|
-
|
220
|
+
A fully-qualified URL of a SecurityProfile resource instance. Example:
|
221
|
+
https://networksecurity.googleapis.com/v1/projects/{project}/locations/{location}/securityProfileGroups/my-security-profile-group
|
222
|
+
Must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
220
223
|
"""
|
221
224
|
return pulumi.get(self, "security_profile_group")
|
222
225
|
|
@@ -228,12 +231,11 @@ class NetworkFirewallPolicyRuleArgs:
|
|
228
231
|
@pulumi.getter(name="targetSecureTags")
|
229
232
|
def target_secure_tags(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]]:
|
230
233
|
"""
|
231
|
-
A list of secure tags that controls which instances the firewall rule applies to. If
|
232
|
-
|
233
|
-
|
234
|
-
|
235
|
-
|
236
|
-
instances on the specified network. Maximum number of target label tags allowed is 256.
|
234
|
+
A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are specified, then
|
235
|
+
the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure tags, if all the
|
236
|
+
targetSecureTag are in INEFFECTIVE state, then this rule will be ignored. targetSecureTag may not be set at the same
|
237
|
+
time as targetServiceAccounts. If neither targetServiceAccounts nor targetSecureTag are specified, the firewall rule
|
238
|
+
applies to all instances on the specified network. Maximum number of target label tags allowed is 256.
|
237
239
|
"""
|
238
240
|
return pulumi.get(self, "target_secure_tags")
|
239
241
|
|
@@ -257,7 +259,7 @@ class NetworkFirewallPolicyRuleArgs:
|
|
257
259
|
@pulumi.getter(name="tlsInspect")
|
258
260
|
def tls_inspect(self) -> Optional[pulumi.Input[bool]]:
|
259
261
|
"""
|
260
|
-
Boolean flag indicating if the traffic should be TLS decrypted.
|
262
|
+
Boolean flag indicating if the traffic should be TLS decrypted. Can be set only if action =
|
261
263
|
'apply_security_profile_group' and cannot be set for other actions.
|
262
264
|
"""
|
263
265
|
return pulumi.get(self, "tls_inspect")
|
@@ -271,6 +273,7 @@ class NetworkFirewallPolicyRuleArgs:
|
|
271
273
|
class _NetworkFirewallPolicyRuleState:
|
272
274
|
def __init__(__self__, *,
|
273
275
|
action: Optional[pulumi.Input[str]] = None,
|
276
|
+
creation_timestamp: Optional[pulumi.Input[str]] = None,
|
274
277
|
description: Optional[pulumi.Input[str]] = None,
|
275
278
|
direction: Optional[pulumi.Input[str]] = None,
|
276
279
|
disabled: Optional[pulumi.Input[bool]] = None,
|
@@ -289,8 +292,10 @@ class _NetworkFirewallPolicyRuleState:
|
|
289
292
|
"""
|
290
293
|
Input properties used for looking up and filtering NetworkFirewallPolicyRule resources.
|
291
294
|
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
|
295
|
+
:param pulumi.Input[str] creation_timestamp: Creation timestamp in RFC3339 text format.
|
292
296
|
:param pulumi.Input[str] description: An optional description for this resource.
|
293
|
-
:param pulumi.Input[str] direction: The direction in which this rule applies.
|
297
|
+
:param pulumi.Input[str] direction: The direction in which this rule applies.
|
298
|
+
Possible values are: `INGRESS`, `EGRESS`.
|
294
299
|
:param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
|
295
300
|
traffic behaves as if it did not exist. If this is unspecified, the firewall policy rule will be enabled.
|
296
301
|
:param pulumi.Input[bool] enable_logging: Denotes whether to enable logging for a particular rule. If logging is enabled, logs will be exported to the configured
|
@@ -299,25 +304,28 @@ class _NetworkFirewallPolicyRuleState:
|
|
299
304
|
:param pulumi.Input[str] firewall_policy: The firewall policy of the resource.
|
300
305
|
:param pulumi.Input[str] kind: Type of the resource. Always `compute#firewallPolicyRule` for firewall policy rules
|
301
306
|
:param pulumi.Input['NetworkFirewallPolicyRuleMatchArgs'] match: A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
|
302
|
-
|
303
|
-
:param pulumi.Input[
|
307
|
+
Structure is documented below.
|
308
|
+
:param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list.
|
309
|
+
The priority must be a positive value between 0 and 2147483647.
|
310
|
+
Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
|
304
311
|
:param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
|
305
312
|
:param pulumi.Input[int] rule_tuple_count: Calculation of the complexity of a single firewall policy rule.
|
306
|
-
:param pulumi.Input[str] security_profile_group: A fully-qualified URL of a
|
307
|
-
https://networksecurity.googleapis.com/v1/
|
308
|
-
|
309
|
-
:param pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If
|
310
|
-
|
311
|
-
|
312
|
-
|
313
|
-
|
314
|
-
instances on the specified network. Maximum number of target label tags allowed is 256.
|
313
|
+
:param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfile resource instance. Example:
|
314
|
+
https://networksecurity.googleapis.com/v1/projects/{project}/locations/{location}/securityProfileGroups/my-security-profile-group
|
315
|
+
Must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
316
|
+
:param pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are specified, then
|
317
|
+
the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure tags, if all the
|
318
|
+
targetSecureTag are in INEFFECTIVE state, then this rule will be ignored. targetSecureTag may not be set at the same
|
319
|
+
time as targetServiceAccounts. If neither targetServiceAccounts nor targetSecureTag are specified, the firewall rule
|
320
|
+
applies to all instances on the specified network. Maximum number of target label tags allowed is 256.
|
315
321
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
|
316
|
-
:param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted.
|
322
|
+
:param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. Can be set only if action =
|
317
323
|
'apply_security_profile_group' and cannot be set for other actions.
|
318
324
|
"""
|
319
325
|
if action is not None:
|
320
326
|
pulumi.set(__self__, "action", action)
|
327
|
+
if creation_timestamp is not None:
|
328
|
+
pulumi.set(__self__, "creation_timestamp", creation_timestamp)
|
321
329
|
if description is not None:
|
322
330
|
pulumi.set(__self__, "description", description)
|
323
331
|
if direction is not None:
|
@@ -361,6 +369,18 @@ class _NetworkFirewallPolicyRuleState:
|
|
361
369
|
def action(self, value: Optional[pulumi.Input[str]]):
|
362
370
|
pulumi.set(self, "action", value)
|
363
371
|
|
372
|
+
@property
|
373
|
+
@pulumi.getter(name="creationTimestamp")
|
374
|
+
def creation_timestamp(self) -> Optional[pulumi.Input[str]]:
|
375
|
+
"""
|
376
|
+
Creation timestamp in RFC3339 text format.
|
377
|
+
"""
|
378
|
+
return pulumi.get(self, "creation_timestamp")
|
379
|
+
|
380
|
+
@creation_timestamp.setter
|
381
|
+
def creation_timestamp(self, value: Optional[pulumi.Input[str]]):
|
382
|
+
pulumi.set(self, "creation_timestamp", value)
|
383
|
+
|
364
384
|
@property
|
365
385
|
@pulumi.getter
|
366
386
|
def description(self) -> Optional[pulumi.Input[str]]:
|
@@ -377,7 +397,8 @@ class _NetworkFirewallPolicyRuleState:
|
|
377
397
|
@pulumi.getter
|
378
398
|
def direction(self) -> Optional[pulumi.Input[str]]:
|
379
399
|
"""
|
380
|
-
The direction in which this rule applies.
|
400
|
+
The direction in which this rule applies.
|
401
|
+
Possible values are: `INGRESS`, `EGRESS`.
|
381
402
|
"""
|
382
403
|
return pulumi.get(self, "direction")
|
383
404
|
|
@@ -441,6 +462,7 @@ class _NetworkFirewallPolicyRuleState:
|
|
441
462
|
def match(self) -> Optional[pulumi.Input['NetworkFirewallPolicyRuleMatchArgs']]:
|
442
463
|
"""
|
443
464
|
A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
|
465
|
+
Structure is documented below.
|
444
466
|
"""
|
445
467
|
return pulumi.get(self, "match")
|
446
468
|
|
@@ -452,7 +474,9 @@ class _NetworkFirewallPolicyRuleState:
|
|
452
474
|
@pulumi.getter
|
453
475
|
def priority(self) -> Optional[pulumi.Input[int]]:
|
454
476
|
"""
|
455
|
-
An integer indicating the priority of a rule in the list.
|
477
|
+
An integer indicating the priority of a rule in the list.
|
478
|
+
The priority must be a positive value between 0 and 2147483647.
|
479
|
+
Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
|
456
480
|
"""
|
457
481
|
return pulumi.get(self, "priority")
|
458
482
|
|
@@ -463,9 +487,6 @@ class _NetworkFirewallPolicyRuleState:
|
|
463
487
|
@property
|
464
488
|
@pulumi.getter
|
465
489
|
def project(self) -> Optional[pulumi.Input[str]]:
|
466
|
-
"""
|
467
|
-
The project for the resource
|
468
|
-
"""
|
469
490
|
return pulumi.get(self, "project")
|
470
491
|
|
471
492
|
@project.setter
|
@@ -500,9 +521,9 @@ class _NetworkFirewallPolicyRuleState:
|
|
500
521
|
@pulumi.getter(name="securityProfileGroup")
|
501
522
|
def security_profile_group(self) -> Optional[pulumi.Input[str]]:
|
502
523
|
"""
|
503
|
-
A fully-qualified URL of a
|
504
|
-
https://networksecurity.googleapis.com/v1/
|
505
|
-
|
524
|
+
A fully-qualified URL of a SecurityProfile resource instance. Example:
|
525
|
+
https://networksecurity.googleapis.com/v1/projects/{project}/locations/{location}/securityProfileGroups/my-security-profile-group
|
526
|
+
Must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
506
527
|
"""
|
507
528
|
return pulumi.get(self, "security_profile_group")
|
508
529
|
|
@@ -514,12 +535,11 @@ class _NetworkFirewallPolicyRuleState:
|
|
514
535
|
@pulumi.getter(name="targetSecureTags")
|
515
536
|
def target_secure_tags(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['NetworkFirewallPolicyRuleTargetSecureTagArgs']]]]:
|
516
537
|
"""
|
517
|
-
A list of secure tags that controls which instances the firewall rule applies to. If
|
518
|
-
|
519
|
-
|
520
|
-
|
521
|
-
|
522
|
-
instances on the specified network. Maximum number of target label tags allowed is 256.
|
538
|
+
A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are specified, then
|
539
|
+
the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure tags, if all the
|
540
|
+
targetSecureTag are in INEFFECTIVE state, then this rule will be ignored. targetSecureTag may not be set at the same
|
541
|
+
time as targetServiceAccounts. If neither targetServiceAccounts nor targetSecureTag are specified, the firewall rule
|
542
|
+
applies to all instances on the specified network. Maximum number of target label tags allowed is 256.
|
523
543
|
"""
|
524
544
|
return pulumi.get(self, "target_secure_tags")
|
525
545
|
|
@@ -543,7 +563,7 @@ class _NetworkFirewallPolicyRuleState:
|
|
543
563
|
@pulumi.getter(name="tlsInspect")
|
544
564
|
def tls_inspect(self) -> Optional[pulumi.Input[bool]]:
|
545
565
|
"""
|
546
|
-
Boolean flag indicating if the traffic should be TLS decrypted.
|
566
|
+
Boolean flag indicating if the traffic should be TLS decrypted. Can be set only if action =
|
547
567
|
'apply_security_profile_group' and cannot be set for other actions.
|
548
568
|
"""
|
549
569
|
return pulumi.get(self, "tls_inspect")
|
@@ -574,17 +594,22 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
574
594
|
tls_inspect: Optional[pulumi.Input[bool]] = None,
|
575
595
|
__props__=None):
|
576
596
|
"""
|
577
|
-
|
597
|
+
Represents a rule that describes one or more match conditions along with the action to be taken when traffic matches this condition (allow or deny).
|
598
|
+
|
599
|
+
To get more information about NetworkFirewallPolicyRule, see:
|
600
|
+
|
601
|
+
* [API documentation](https://cloud.google.com/compute/docs/reference/rest/v1/networkFirewallPolicies/addRule)
|
578
602
|
|
579
603
|
## Example Usage
|
580
604
|
|
581
|
-
###
|
605
|
+
### Network Firewall Policy Rule
|
606
|
+
|
582
607
|
```python
|
583
608
|
import pulumi
|
584
609
|
import pulumi_gcp as gcp
|
585
610
|
|
586
611
|
basic_global_networksecurity_address_group = gcp.networksecurity.AddressGroup("basic_global_networksecurity_address_group",
|
587
|
-
name="
|
612
|
+
name="address",
|
588
613
|
parent="projects/my-project-name",
|
589
614
|
description="Sample global networksecurity_address_group",
|
590
615
|
location="global",
|
@@ -661,7 +686,8 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
661
686
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
662
687
|
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
|
663
688
|
:param pulumi.Input[str] description: An optional description for this resource.
|
664
|
-
:param pulumi.Input[str] direction: The direction in which this rule applies.
|
689
|
+
:param pulumi.Input[str] direction: The direction in which this rule applies.
|
690
|
+
Possible values are: `INGRESS`, `EGRESS`.
|
665
691
|
:param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
|
666
692
|
traffic behaves as if it did not exist. If this is unspecified, the firewall policy rule will be enabled.
|
667
693
|
:param pulumi.Input[bool] enable_logging: Denotes whether to enable logging for a particular rule. If logging is enabled, logs will be exported to the configured
|
@@ -669,20 +695,21 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
669
695
|
"goto_next" rules.
|
670
696
|
:param pulumi.Input[str] firewall_policy: The firewall policy of the resource.
|
671
697
|
:param pulumi.Input[Union['NetworkFirewallPolicyRuleMatchArgs', 'NetworkFirewallPolicyRuleMatchArgsDict']] match: A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
|
672
|
-
|
673
|
-
:param pulumi.Input[
|
698
|
+
Structure is documented below.
|
699
|
+
:param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list.
|
700
|
+
The priority must be a positive value between 0 and 2147483647.
|
701
|
+
Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
|
674
702
|
:param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
|
675
|
-
:param pulumi.Input[str] security_profile_group: A fully-qualified URL of a
|
676
|
-
https://networksecurity.googleapis.com/v1/
|
677
|
-
|
678
|
-
:param pulumi.Input[Sequence[pulumi.Input[Union['NetworkFirewallPolicyRuleTargetSecureTagArgs', 'NetworkFirewallPolicyRuleTargetSecureTagArgsDict']]]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If
|
679
|
-
|
680
|
-
|
681
|
-
|
682
|
-
|
683
|
-
instances on the specified network. Maximum number of target label tags allowed is 256.
|
703
|
+
:param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfile resource instance. Example:
|
704
|
+
https://networksecurity.googleapis.com/v1/projects/{project}/locations/{location}/securityProfileGroups/my-security-profile-group
|
705
|
+
Must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
706
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['NetworkFirewallPolicyRuleTargetSecureTagArgs', 'NetworkFirewallPolicyRuleTargetSecureTagArgsDict']]]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are specified, then
|
707
|
+
the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure tags, if all the
|
708
|
+
targetSecureTag are in INEFFECTIVE state, then this rule will be ignored. targetSecureTag may not be set at the same
|
709
|
+
time as targetServiceAccounts. If neither targetServiceAccounts nor targetSecureTag are specified, the firewall rule
|
710
|
+
applies to all instances on the specified network. Maximum number of target label tags allowed is 256.
|
684
711
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
|
685
|
-
:param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted.
|
712
|
+
:param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. Can be set only if action =
|
686
713
|
'apply_security_profile_group' and cannot be set for other actions.
|
687
714
|
"""
|
688
715
|
...
|
@@ -692,17 +719,22 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
692
719
|
args: NetworkFirewallPolicyRuleArgs,
|
693
720
|
opts: Optional[pulumi.ResourceOptions] = None):
|
694
721
|
"""
|
695
|
-
|
722
|
+
Represents a rule that describes one or more match conditions along with the action to be taken when traffic matches this condition (allow or deny).
|
723
|
+
|
724
|
+
To get more information about NetworkFirewallPolicyRule, see:
|
725
|
+
|
726
|
+
* [API documentation](https://cloud.google.com/compute/docs/reference/rest/v1/networkFirewallPolicies/addRule)
|
696
727
|
|
697
728
|
## Example Usage
|
698
729
|
|
699
|
-
###
|
730
|
+
### Network Firewall Policy Rule
|
731
|
+
|
700
732
|
```python
|
701
733
|
import pulumi
|
702
734
|
import pulumi_gcp as gcp
|
703
735
|
|
704
736
|
basic_global_networksecurity_address_group = gcp.networksecurity.AddressGroup("basic_global_networksecurity_address_group",
|
705
|
-
name="
|
737
|
+
name="address",
|
706
738
|
parent="projects/my-project-name",
|
707
739
|
description="Sample global networksecurity_address_group",
|
708
740
|
location="global",
|
@@ -837,6 +869,7 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
837
869
|
__props__.__dict__["target_secure_tags"] = target_secure_tags
|
838
870
|
__props__.__dict__["target_service_accounts"] = target_service_accounts
|
839
871
|
__props__.__dict__["tls_inspect"] = tls_inspect
|
872
|
+
__props__.__dict__["creation_timestamp"] = None
|
840
873
|
__props__.__dict__["kind"] = None
|
841
874
|
__props__.__dict__["rule_tuple_count"] = None
|
842
875
|
super(NetworkFirewallPolicyRule, __self__).__init__(
|
@@ -850,6 +883,7 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
850
883
|
id: pulumi.Input[str],
|
851
884
|
opts: Optional[pulumi.ResourceOptions] = None,
|
852
885
|
action: Optional[pulumi.Input[str]] = None,
|
886
|
+
creation_timestamp: Optional[pulumi.Input[str]] = None,
|
853
887
|
description: Optional[pulumi.Input[str]] = None,
|
854
888
|
direction: Optional[pulumi.Input[str]] = None,
|
855
889
|
disabled: Optional[pulumi.Input[bool]] = None,
|
@@ -873,8 +907,10 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
873
907
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
874
908
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
875
909
|
:param pulumi.Input[str] action: The Action to perform when the client connection triggers the rule. Valid actions are "allow", "deny", "goto_next" and "apply_security_profile_group".
|
910
|
+
:param pulumi.Input[str] creation_timestamp: Creation timestamp in RFC3339 text format.
|
876
911
|
:param pulumi.Input[str] description: An optional description for this resource.
|
877
|
-
:param pulumi.Input[str] direction: The direction in which this rule applies.
|
912
|
+
:param pulumi.Input[str] direction: The direction in which this rule applies.
|
913
|
+
Possible values are: `INGRESS`, `EGRESS`.
|
878
914
|
:param pulumi.Input[bool] disabled: Denotes whether the firewall policy rule is disabled. When set to true, the firewall policy rule is not enforced and
|
879
915
|
traffic behaves as if it did not exist. If this is unspecified, the firewall policy rule will be enabled.
|
880
916
|
:param pulumi.Input[bool] enable_logging: Denotes whether to enable logging for a particular rule. If logging is enabled, logs will be exported to the configured
|
@@ -883,21 +919,22 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
883
919
|
:param pulumi.Input[str] firewall_policy: The firewall policy of the resource.
|
884
920
|
:param pulumi.Input[str] kind: Type of the resource. Always `compute#firewallPolicyRule` for firewall policy rules
|
885
921
|
:param pulumi.Input[Union['NetworkFirewallPolicyRuleMatchArgs', 'NetworkFirewallPolicyRuleMatchArgsDict']] match: A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
|
886
|
-
|
887
|
-
:param pulumi.Input[
|
922
|
+
Structure is documented below.
|
923
|
+
:param pulumi.Input[int] priority: An integer indicating the priority of a rule in the list.
|
924
|
+
The priority must be a positive value between 0 and 2147483647.
|
925
|
+
Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
|
888
926
|
:param pulumi.Input[str] rule_name: An optional name for the rule. This field is not a unique identifier and can be updated.
|
889
927
|
:param pulumi.Input[int] rule_tuple_count: Calculation of the complexity of a single firewall policy rule.
|
890
|
-
:param pulumi.Input[str] security_profile_group: A fully-qualified URL of a
|
891
|
-
https://networksecurity.googleapis.com/v1/
|
892
|
-
|
893
|
-
:param pulumi.Input[Sequence[pulumi.Input[Union['NetworkFirewallPolicyRuleTargetSecureTagArgs', 'NetworkFirewallPolicyRuleTargetSecureTagArgsDict']]]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If
|
894
|
-
|
895
|
-
|
896
|
-
|
897
|
-
|
898
|
-
instances on the specified network. Maximum number of target label tags allowed is 256.
|
928
|
+
:param pulumi.Input[str] security_profile_group: A fully-qualified URL of a SecurityProfile resource instance. Example:
|
929
|
+
https://networksecurity.googleapis.com/v1/projects/{project}/locations/{location}/securityProfileGroups/my-security-profile-group
|
930
|
+
Must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
931
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['NetworkFirewallPolicyRuleTargetSecureTagArgs', 'NetworkFirewallPolicyRuleTargetSecureTagArgsDict']]]] target_secure_tags: A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are specified, then
|
932
|
+
the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure tags, if all the
|
933
|
+
targetSecureTag are in INEFFECTIVE state, then this rule will be ignored. targetSecureTag may not be set at the same
|
934
|
+
time as targetServiceAccounts. If neither targetServiceAccounts nor targetSecureTag are specified, the firewall rule
|
935
|
+
applies to all instances on the specified network. Maximum number of target label tags allowed is 256.
|
899
936
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_service_accounts: A list of service accounts indicating the sets of instances that are applied with this rule.
|
900
|
-
:param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted.
|
937
|
+
:param pulumi.Input[bool] tls_inspect: Boolean flag indicating if the traffic should be TLS decrypted. Can be set only if action =
|
901
938
|
'apply_security_profile_group' and cannot be set for other actions.
|
902
939
|
"""
|
903
940
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -905,6 +942,7 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
905
942
|
__props__ = _NetworkFirewallPolicyRuleState.__new__(_NetworkFirewallPolicyRuleState)
|
906
943
|
|
907
944
|
__props__.__dict__["action"] = action
|
945
|
+
__props__.__dict__["creation_timestamp"] = creation_timestamp
|
908
946
|
__props__.__dict__["description"] = description
|
909
947
|
__props__.__dict__["direction"] = direction
|
910
948
|
__props__.__dict__["disabled"] = disabled
|
@@ -930,6 +968,14 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
930
968
|
"""
|
931
969
|
return pulumi.get(self, "action")
|
932
970
|
|
971
|
+
@property
|
972
|
+
@pulumi.getter(name="creationTimestamp")
|
973
|
+
def creation_timestamp(self) -> pulumi.Output[str]:
|
974
|
+
"""
|
975
|
+
Creation timestamp in RFC3339 text format.
|
976
|
+
"""
|
977
|
+
return pulumi.get(self, "creation_timestamp")
|
978
|
+
|
933
979
|
@property
|
934
980
|
@pulumi.getter
|
935
981
|
def description(self) -> pulumi.Output[Optional[str]]:
|
@@ -942,7 +988,8 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
942
988
|
@pulumi.getter
|
943
989
|
def direction(self) -> pulumi.Output[str]:
|
944
990
|
"""
|
945
|
-
The direction in which this rule applies.
|
991
|
+
The direction in which this rule applies.
|
992
|
+
Possible values are: `INGRESS`, `EGRESS`.
|
946
993
|
"""
|
947
994
|
return pulumi.get(self, "direction")
|
948
995
|
|
@@ -986,6 +1033,7 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
986
1033
|
def match(self) -> pulumi.Output['outputs.NetworkFirewallPolicyRuleMatch']:
|
987
1034
|
"""
|
988
1035
|
A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
|
1036
|
+
Structure is documented below.
|
989
1037
|
"""
|
990
1038
|
return pulumi.get(self, "match")
|
991
1039
|
|
@@ -993,16 +1041,15 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
993
1041
|
@pulumi.getter
|
994
1042
|
def priority(self) -> pulumi.Output[int]:
|
995
1043
|
"""
|
996
|
-
An integer indicating the priority of a rule in the list.
|
1044
|
+
An integer indicating the priority of a rule in the list.
|
1045
|
+
The priority must be a positive value between 0 and 2147483647.
|
1046
|
+
Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest prority.
|
997
1047
|
"""
|
998
1048
|
return pulumi.get(self, "priority")
|
999
1049
|
|
1000
1050
|
@property
|
1001
1051
|
@pulumi.getter
|
1002
1052
|
def project(self) -> pulumi.Output[str]:
|
1003
|
-
"""
|
1004
|
-
The project for the resource
|
1005
|
-
"""
|
1006
1053
|
return pulumi.get(self, "project")
|
1007
1054
|
|
1008
1055
|
@property
|
@@ -1025,9 +1072,9 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
1025
1072
|
@pulumi.getter(name="securityProfileGroup")
|
1026
1073
|
def security_profile_group(self) -> pulumi.Output[Optional[str]]:
|
1027
1074
|
"""
|
1028
|
-
A fully-qualified URL of a
|
1029
|
-
https://networksecurity.googleapis.com/v1/
|
1030
|
-
|
1075
|
+
A fully-qualified URL of a SecurityProfile resource instance. Example:
|
1076
|
+
https://networksecurity.googleapis.com/v1/projects/{project}/locations/{location}/securityProfileGroups/my-security-profile-group
|
1077
|
+
Must be specified if action = 'apply_security_profile_group' and cannot be specified for other actions.
|
1031
1078
|
"""
|
1032
1079
|
return pulumi.get(self, "security_profile_group")
|
1033
1080
|
|
@@ -1035,12 +1082,11 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
1035
1082
|
@pulumi.getter(name="targetSecureTags")
|
1036
1083
|
def target_secure_tags(self) -> pulumi.Output[Optional[Sequence['outputs.NetworkFirewallPolicyRuleTargetSecureTag']]]:
|
1037
1084
|
"""
|
1038
|
-
A list of secure tags that controls which instances the firewall rule applies to. If
|
1039
|
-
|
1040
|
-
|
1041
|
-
|
1042
|
-
|
1043
|
-
instances on the specified network. Maximum number of target label tags allowed is 256.
|
1085
|
+
A list of secure tags that controls which instances the firewall rule applies to. If targetSecureTag are specified, then
|
1086
|
+
the firewall rule applies only to instances in the VPC network that have one of those EFFECTIVE secure tags, if all the
|
1087
|
+
targetSecureTag are in INEFFECTIVE state, then this rule will be ignored. targetSecureTag may not be set at the same
|
1088
|
+
time as targetServiceAccounts. If neither targetServiceAccounts nor targetSecureTag are specified, the firewall rule
|
1089
|
+
applies to all instances on the specified network. Maximum number of target label tags allowed is 256.
|
1044
1090
|
"""
|
1045
1091
|
return pulumi.get(self, "target_secure_tags")
|
1046
1092
|
|
@@ -1056,7 +1102,7 @@ class NetworkFirewallPolicyRule(pulumi.CustomResource):
|
|
1056
1102
|
@pulumi.getter(name="tlsInspect")
|
1057
1103
|
def tls_inspect(self) -> pulumi.Output[Optional[bool]]:
|
1058
1104
|
"""
|
1059
|
-
Boolean flag indicating if the traffic should be TLS decrypted.
|
1105
|
+
Boolean flag indicating if the traffic should be TLS decrypted. Can be set only if action =
|
1060
1106
|
'apply_security_profile_group' and cannot be set for other actions.
|
1061
1107
|
"""
|
1062
1108
|
return pulumi.get(self, "tls_inspect")
|