pulumi-gcp 8.8.2a1731515595__py3-none-any.whl → 8.9.0a1731097924__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (114) hide show
  1. pulumi_gcp/__init__.py +0 -64
  2. pulumi_gcp/activedirectory/domain.py +0 -24
  3. pulumi_gcp/apigee/__init__.py +0 -1
  4. pulumi_gcp/apigee/_inputs.py +0 -74
  5. pulumi_gcp/apigee/outputs.py +0 -65
  6. pulumi_gcp/applicationintegration/auth_config.py +0 -24
  7. pulumi_gcp/backupdisasterrecovery/__init__.py +0 -4
  8. pulumi_gcp/backupdisasterrecovery/_inputs.py +0 -533
  9. pulumi_gcp/backupdisasterrecovery/backup_vault.py +6 -146
  10. pulumi_gcp/backupdisasterrecovery/outputs.py +0 -702
  11. pulumi_gcp/bigquery/data_transfer_config.py +0 -24
  12. pulumi_gcp/cloudrunv2/_inputs.py +0 -46
  13. pulumi_gcp/cloudrunv2/job.py +2 -0
  14. pulumi_gcp/cloudrunv2/outputs.py +2 -60
  15. pulumi_gcp/cloudrunv2/service.py +2 -0
  16. pulumi_gcp/compute/__init__.py +0 -1
  17. pulumi_gcp/compute/_inputs.py +255 -2162
  18. pulumi_gcp/compute/disk.py +7 -7
  19. pulumi_gcp/compute/firewall_policy_rule.py +54 -108
  20. pulumi_gcp/compute/get_region_instance_group_manager.py +1 -12
  21. pulumi_gcp/compute/health_check.py +42 -42
  22. pulumi_gcp/compute/network_firewall_policy_rule.py +4 -4
  23. pulumi_gcp/compute/network_firewall_policy_with_rules.py +10 -10
  24. pulumi_gcp/compute/node_template.py +0 -95
  25. pulumi_gcp/compute/outputs.py +213 -1639
  26. pulumi_gcp/compute/region_disk.py +7 -7
  27. pulumi_gcp/compute/region_health_check.py +42 -42
  28. pulumi_gcp/compute/region_instance_group_manager.py +14 -54
  29. pulumi_gcp/compute/region_network_firewall_policy_rule.py +4 -4
  30. pulumi_gcp/compute/region_network_firewall_policy_with_rules.py +10 -10
  31. pulumi_gcp/compute/region_security_policy.py +0 -120
  32. pulumi_gcp/compute/region_security_policy_rule.py +6 -6
  33. pulumi_gcp/compute/router_peer.py +35 -56
  34. pulumi_gcp/compute/security_scan_config.py +8 -8
  35. pulumi_gcp/config/__init__.pyi +0 -4
  36. pulumi_gcp/config/vars.py +0 -8
  37. pulumi_gcp/container/_inputs.py +10 -345
  38. pulumi_gcp/container/cluster.py +0 -101
  39. pulumi_gcp/container/get_cluster.py +1 -23
  40. pulumi_gcp/container/outputs.py +8 -456
  41. pulumi_gcp/dataloss/prevention_discovery_config.py +7 -7
  42. pulumi_gcp/dataproc/__init__.py +0 -2
  43. pulumi_gcp/dataproc/_inputs.py +0 -101
  44. pulumi_gcp/dataproc/outputs.py +0 -94
  45. pulumi_gcp/edgecontainer/vpn_connection.py +4 -4
  46. pulumi_gcp/firebase/android_app.py +2 -2
  47. pulumi_gcp/firebase/apple_app.py +2 -2
  48. pulumi_gcp/firebase/web_app.py +2 -2
  49. pulumi_gcp/firestore/index.py +0 -44
  50. pulumi_gcp/gkeonprem/_inputs.py +15 -15
  51. pulumi_gcp/gkeonprem/outputs.py +10 -10
  52. pulumi_gcp/healthcare/dataset.py +7 -7
  53. pulumi_gcp/healthcare/dicom_store.py +7 -7
  54. pulumi_gcp/healthcare/fhir_store.py +7 -7
  55. pulumi_gcp/healthcare/hl7_store.py +14 -14
  56. pulumi_gcp/iam/__init__.py +0 -1
  57. pulumi_gcp/iam/_inputs.py +0 -161
  58. pulumi_gcp/iam/outputs.py +0 -114
  59. pulumi_gcp/logging/metric.py +2 -2
  60. pulumi_gcp/looker/_inputs.py +0 -6
  61. pulumi_gcp/looker/instance.py +321 -169
  62. pulumi_gcp/looker/outputs.py +0 -4
  63. pulumi_gcp/memorystore/instance.py +0 -4
  64. pulumi_gcp/monitoring/alert_policy.py +0 -24
  65. pulumi_gcp/monitoring/custom_service.py +0 -24
  66. pulumi_gcp/monitoring/group.py +0 -24
  67. pulumi_gcp/monitoring/metric_descriptor.py +0 -24
  68. pulumi_gcp/monitoring/slo.py +0 -24
  69. pulumi_gcp/monitoring/uptime_check_config.py +0 -24
  70. pulumi_gcp/networkmanagement/__init__.py +0 -1
  71. pulumi_gcp/osconfig/patch_deployment.py +8 -8
  72. pulumi_gcp/provider.py +0 -40
  73. pulumi_gcp/pulumi-plugin.json +1 -1
  74. pulumi_gcp/redis/_inputs.py +3 -3
  75. pulumi_gcp/redis/outputs.py +2 -2
  76. pulumi_gcp/securitycenter/notification_config.py +16 -4
  77. pulumi_gcp/securitycenter/project_notification_config.py +24 -0
  78. pulumi_gcp/securitycenter/v2_organization_notification_config.py +16 -4
  79. pulumi_gcp/spanner/__init__.py +0 -1
  80. pulumi_gcp/spanner/_inputs.py +9 -9
  81. pulumi_gcp/spanner/get_instance.py +1 -12
  82. pulumi_gcp/spanner/instance.py +0 -70
  83. pulumi_gcp/spanner/outputs.py +12 -46
  84. pulumi_gcp/sql/_inputs.py +0 -26
  85. pulumi_gcp/sql/database_instance.py +11 -124
  86. pulumi_gcp/sql/get_database_instance.py +1 -12
  87. pulumi_gcp/sql/outputs.py +0 -51
  88. pulumi_gcp/storage/_inputs.py +3 -3
  89. pulumi_gcp/storage/outputs.py +2 -2
  90. pulumi_gcp/tags/tag_binding.py +4 -4
  91. pulumi_gcp/tags/tag_value.py +2 -2
  92. pulumi_gcp/transcoder/job.py +0 -24
  93. pulumi_gcp/vertex/_inputs.py +0 -184
  94. pulumi_gcp/vertex/ai_endpoint.py +8 -394
  95. pulumi_gcp/vertex/ai_feature_online_store_featureview.py +4 -4
  96. pulumi_gcp/vertex/outputs.py +0 -166
  97. pulumi_gcp/workbench/instance.py +7 -21
  98. pulumi_gcp/workflows/workflow.py +0 -36
  99. pulumi_gcp/workstations/workstation_config.py +8 -8
  100. {pulumi_gcp-8.8.2a1731515595.dist-info → pulumi_gcp-8.9.0a1731097924.dist-info}/METADATA +1 -1
  101. {pulumi_gcp-8.8.2a1731515595.dist-info → pulumi_gcp-8.9.0a1731097924.dist-info}/RECORD +103 -114
  102. {pulumi_gcp-8.8.2a1731515595.dist-info → pulumi_gcp-8.9.0a1731097924.dist-info}/WHEEL +1 -1
  103. pulumi_gcp/apigee/api.py +0 -456
  104. pulumi_gcp/backupdisasterrecovery/backup_plan.py +0 -653
  105. pulumi_gcp/backupdisasterrecovery/backup_plan_association.py +0 -766
  106. pulumi_gcp/backupdisasterrecovery/get_backup_plan.py +0 -204
  107. pulumi_gcp/backupdisasterrecovery/get_backup_plan_association.py +0 -243
  108. pulumi_gcp/compute/region_resize_request.py +0 -772
  109. pulumi_gcp/dataproc/gdc_application_environment.py +0 -931
  110. pulumi_gcp/dataproc/gdc_service_instance.py +0 -1022
  111. pulumi_gcp/iam/principal_access_boundary_policy.py +0 -679
  112. pulumi_gcp/networkmanagement/vpc_flow_logs_config.py +0 -1358
  113. pulumi_gcp/spanner/get_database.py +0 -229
  114. {pulumi_gcp-8.8.2a1731515595.dist-info → pulumi_gcp-8.9.0a1731097924.dist-info}/top_level.txt +0 -0
@@ -179,8 +179,6 @@ __all__ = [
179
179
  'ClusterAddonsConfigKalmConfigArgsDict',
180
180
  'ClusterAddonsConfigNetworkPolicyConfigArgs',
181
181
  'ClusterAddonsConfigNetworkPolicyConfigArgsDict',
182
- 'ClusterAddonsConfigParallelstoreCsiDriverConfigArgs',
183
- 'ClusterAddonsConfigParallelstoreCsiDriverConfigArgsDict',
184
182
  'ClusterAddonsConfigRayOperatorConfigArgs',
185
183
  'ClusterAddonsConfigRayOperatorConfigArgsDict',
186
184
  'ClusterAddonsConfigRayOperatorConfigRayClusterLoggingConfigArgs',
@@ -215,10 +213,6 @@ __all__ = [
215
213
  'ClusterClusterTelemetryArgsDict',
216
214
  'ClusterConfidentialNodesArgs',
217
215
  'ClusterConfidentialNodesArgsDict',
218
- 'ClusterControlPlaneEndpointsConfigArgs',
219
- 'ClusterControlPlaneEndpointsConfigArgsDict',
220
- 'ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgs',
221
- 'ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgsDict',
222
216
  'ClusterCostManagementConfigArgs',
223
217
  'ClusterCostManagementConfigArgsDict',
224
218
  'ClusterDatabaseEncryptionArgs',
@@ -463,8 +457,6 @@ __all__ = [
463
457
  'ClusterServiceExternalIpsConfigArgsDict',
464
458
  'ClusterTpuConfigArgs',
465
459
  'ClusterTpuConfigArgsDict',
466
- 'ClusterUserManagedKeysConfigArgs',
467
- 'ClusterUserManagedKeysConfigArgsDict',
468
460
  'ClusterVerticalPodAutoscalingArgs',
469
461
  'ClusterVerticalPodAutoscalingArgsDict',
470
462
  'ClusterWorkloadAltsConfigArgs',
@@ -4624,16 +4616,6 @@ if not MYPY:
4624
4616
  It can only be disabled if the nodes already do not have network policies enabled.
4625
4617
  Defaults to disabled; set `disabled = false` to enable.
4626
4618
  """
4627
- parallelstore_csi_driver_config: NotRequired[pulumi.Input['ClusterAddonsConfigParallelstoreCsiDriverConfigArgsDict']]
4628
- """
4629
- The status of the Parallelstore CSI driver addon,
4630
- which allows the usage of a Parallelstore instances as volumes.
4631
- It is disabled by default for Standard clusters; set `enabled = true` to enable.
4632
- It is enabled by default for Autopilot clusters with version 1.29 or later; set `enabled = true` to enable it explicitly.
4633
- See [Enable the Parallelstore CSI driver](https://cloud.google.com/kubernetes-engine/docs/how-to/persistent-volumes/parallelstore-csi-new-volume#enable) for more information.
4634
-
4635
- This example `addons_config` disables two addons:
4636
- """
4637
4619
  ray_operator_configs: NotRequired[pulumi.Input[Sequence[pulumi.Input['ClusterAddonsConfigRayOperatorConfigArgsDict']]]]
4638
4620
  """
4639
4621
  . The status of the [Ray Operator
@@ -4648,6 +4630,9 @@ if not MYPY:
4648
4630
  clusters on
4649
4631
  GKE](https://cloud.google.com/kubernetes-engine/docs/add-on/ray-on-gke/how-to/collect-view-logs-metrics)
4650
4632
  for more information.
4633
+
4634
+
4635
+ This example `addons_config` disables two addons:
4651
4636
  """
4652
4637
  stateful_ha_config: NotRequired[pulumi.Input['ClusterAddonsConfigStatefulHaConfigArgsDict']]
4653
4638
  """
@@ -4673,7 +4658,6 @@ class ClusterAddonsConfigArgs:
4673
4658
  istio_config: Optional[pulumi.Input['ClusterAddonsConfigIstioConfigArgs']] = None,
4674
4659
  kalm_config: Optional[pulumi.Input['ClusterAddonsConfigKalmConfigArgs']] = None,
4675
4660
  network_policy_config: Optional[pulumi.Input['ClusterAddonsConfigNetworkPolicyConfigArgs']] = None,
4676
- parallelstore_csi_driver_config: Optional[pulumi.Input['ClusterAddonsConfigParallelstoreCsiDriverConfigArgs']] = None,
4677
4661
  ray_operator_configs: Optional[pulumi.Input[Sequence[pulumi.Input['ClusterAddonsConfigRayOperatorConfigArgs']]]] = None,
4678
4662
  stateful_ha_config: Optional[pulumi.Input['ClusterAddonsConfigStatefulHaConfigArgs']] = None):
4679
4663
  """
@@ -4718,13 +4702,6 @@ class ClusterAddonsConfigArgs:
4718
4702
  otherwise nothing will happen.
4719
4703
  It can only be disabled if the nodes already do not have network policies enabled.
4720
4704
  Defaults to disabled; set `disabled = false` to enable.
4721
- :param pulumi.Input['ClusterAddonsConfigParallelstoreCsiDriverConfigArgs'] parallelstore_csi_driver_config: The status of the Parallelstore CSI driver addon,
4722
- which allows the usage of a Parallelstore instances as volumes.
4723
- It is disabled by default for Standard clusters; set `enabled = true` to enable.
4724
- It is enabled by default for Autopilot clusters with version 1.29 or later; set `enabled = true` to enable it explicitly.
4725
- See [Enable the Parallelstore CSI driver](https://cloud.google.com/kubernetes-engine/docs/how-to/persistent-volumes/parallelstore-csi-new-volume#enable) for more information.
4726
-
4727
- This example `addons_config` disables two addons:
4728
4705
  :param pulumi.Input[Sequence[pulumi.Input['ClusterAddonsConfigRayOperatorConfigArgs']]] ray_operator_configs: . The status of the [Ray Operator
4729
4706
  addon](https://cloud.google.com/kubernetes-engine/docs/add-on/ray-on-gke/concepts/overview).
4730
4707
  It is disabled by default. Set `enabled = true` to enable. The minimum
@@ -4737,6 +4714,9 @@ class ClusterAddonsConfigArgs:
4737
4714
  clusters on
4738
4715
  GKE](https://cloud.google.com/kubernetes-engine/docs/add-on/ray-on-gke/how-to/collect-view-logs-metrics)
4739
4716
  for more information.
4717
+
4718
+
4719
+ This example `addons_config` disables two addons:
4740
4720
  :param pulumi.Input['ClusterAddonsConfigStatefulHaConfigArgs'] stateful_ha_config: .
4741
4721
  The status of the Stateful HA addon, which provides automatic configurable failover for stateful applications.
4742
4722
  It is disabled by default for Standard clusters. Set `enabled = true` to enable.
@@ -4765,8 +4745,6 @@ class ClusterAddonsConfigArgs:
4765
4745
  pulumi.set(__self__, "kalm_config", kalm_config)
4766
4746
  if network_policy_config is not None:
4767
4747
  pulumi.set(__self__, "network_policy_config", network_policy_config)
4768
- if parallelstore_csi_driver_config is not None:
4769
- pulumi.set(__self__, "parallelstore_csi_driver_config", parallelstore_csi_driver_config)
4770
4748
  if ray_operator_configs is not None:
4771
4749
  pulumi.set(__self__, "ray_operator_configs", ray_operator_configs)
4772
4750
  if stateful_ha_config is not None:
@@ -4945,24 +4923,6 @@ class ClusterAddonsConfigArgs:
4945
4923
  def network_policy_config(self, value: Optional[pulumi.Input['ClusterAddonsConfigNetworkPolicyConfigArgs']]):
4946
4924
  pulumi.set(self, "network_policy_config", value)
4947
4925
 
4948
- @property
4949
- @pulumi.getter(name="parallelstoreCsiDriverConfig")
4950
- def parallelstore_csi_driver_config(self) -> Optional[pulumi.Input['ClusterAddonsConfigParallelstoreCsiDriverConfigArgs']]:
4951
- """
4952
- The status of the Parallelstore CSI driver addon,
4953
- which allows the usage of a Parallelstore instances as volumes.
4954
- It is disabled by default for Standard clusters; set `enabled = true` to enable.
4955
- It is enabled by default for Autopilot clusters with version 1.29 or later; set `enabled = true` to enable it explicitly.
4956
- See [Enable the Parallelstore CSI driver](https://cloud.google.com/kubernetes-engine/docs/how-to/persistent-volumes/parallelstore-csi-new-volume#enable) for more information.
4957
-
4958
- This example `addons_config` disables two addons:
4959
- """
4960
- return pulumi.get(self, "parallelstore_csi_driver_config")
4961
-
4962
- @parallelstore_csi_driver_config.setter
4963
- def parallelstore_csi_driver_config(self, value: Optional[pulumi.Input['ClusterAddonsConfigParallelstoreCsiDriverConfigArgs']]):
4964
- pulumi.set(self, "parallelstore_csi_driver_config", value)
4965
-
4966
4926
  @property
4967
4927
  @pulumi.getter(name="rayOperatorConfigs")
4968
4928
  def ray_operator_configs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['ClusterAddonsConfigRayOperatorConfigArgs']]]]:
@@ -4979,6 +4939,9 @@ class ClusterAddonsConfigArgs:
4979
4939
  clusters on
4980
4940
  GKE](https://cloud.google.com/kubernetes-engine/docs/add-on/ray-on-gke/how-to/collect-view-logs-metrics)
4981
4941
  for more information.
4942
+
4943
+
4944
+ This example `addons_config` disables two addons:
4982
4945
  """
4983
4946
  return pulumi.get(self, "ray_operator_configs")
4984
4947
 
@@ -5374,28 +5337,6 @@ class ClusterAddonsConfigNetworkPolicyConfigArgs:
5374
5337
  pulumi.set(self, "disabled", value)
5375
5338
 
5376
5339
 
5377
- if not MYPY:
5378
- class ClusterAddonsConfigParallelstoreCsiDriverConfigArgsDict(TypedDict):
5379
- enabled: pulumi.Input[bool]
5380
- elif False:
5381
- ClusterAddonsConfigParallelstoreCsiDriverConfigArgsDict: TypeAlias = Mapping[str, Any]
5382
-
5383
- @pulumi.input_type
5384
- class ClusterAddonsConfigParallelstoreCsiDriverConfigArgs:
5385
- def __init__(__self__, *,
5386
- enabled: pulumi.Input[bool]):
5387
- pulumi.set(__self__, "enabled", enabled)
5388
-
5389
- @property
5390
- @pulumi.getter
5391
- def enabled(self) -> pulumi.Input[bool]:
5392
- return pulumi.get(self, "enabled")
5393
-
5394
- @enabled.setter
5395
- def enabled(self, value: pulumi.Input[bool]):
5396
- pulumi.set(self, "enabled", value)
5397
-
5398
-
5399
5340
  if not MYPY:
5400
5341
  class ClusterAddonsConfigRayOperatorConfigArgsDict(TypedDict):
5401
5342
  enabled: pulumi.Input[bool]
@@ -6537,90 +6478,6 @@ class ClusterConfidentialNodesArgs:
6537
6478
  pulumi.set(self, "enabled", value)
6538
6479
 
6539
6480
 
6540
- if not MYPY:
6541
- class ClusterControlPlaneEndpointsConfigArgsDict(TypedDict):
6542
- dns_endpoint_config: NotRequired[pulumi.Input['ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgsDict']]
6543
- """
6544
- DNS endpoint configuration.
6545
- """
6546
- elif False:
6547
- ClusterControlPlaneEndpointsConfigArgsDict: TypeAlias = Mapping[str, Any]
6548
-
6549
- @pulumi.input_type
6550
- class ClusterControlPlaneEndpointsConfigArgs:
6551
- def __init__(__self__, *,
6552
- dns_endpoint_config: Optional[pulumi.Input['ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgs']] = None):
6553
- """
6554
- :param pulumi.Input['ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgs'] dns_endpoint_config: DNS endpoint configuration.
6555
- """
6556
- if dns_endpoint_config is not None:
6557
- pulumi.set(__self__, "dns_endpoint_config", dns_endpoint_config)
6558
-
6559
- @property
6560
- @pulumi.getter(name="dnsEndpointConfig")
6561
- def dns_endpoint_config(self) -> Optional[pulumi.Input['ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgs']]:
6562
- """
6563
- DNS endpoint configuration.
6564
- """
6565
- return pulumi.get(self, "dns_endpoint_config")
6566
-
6567
- @dns_endpoint_config.setter
6568
- def dns_endpoint_config(self, value: Optional[pulumi.Input['ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgs']]):
6569
- pulumi.set(self, "dns_endpoint_config", value)
6570
-
6571
-
6572
- if not MYPY:
6573
- class ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgsDict(TypedDict):
6574
- allow_external_traffic: NotRequired[pulumi.Input[bool]]
6575
- """
6576
- Controls whether user traffic is allowed over this endpoint. Note that GCP-managed services may still use the endpoint even if this is false.
6577
- """
6578
- endpoint: NotRequired[pulumi.Input[str]]
6579
- """
6580
- The cluster's DNS endpoint.
6581
- """
6582
- elif False:
6583
- ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgsDict: TypeAlias = Mapping[str, Any]
6584
-
6585
- @pulumi.input_type
6586
- class ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgs:
6587
- def __init__(__self__, *,
6588
- allow_external_traffic: Optional[pulumi.Input[bool]] = None,
6589
- endpoint: Optional[pulumi.Input[str]] = None):
6590
- """
6591
- :param pulumi.Input[bool] allow_external_traffic: Controls whether user traffic is allowed over this endpoint. Note that GCP-managed services may still use the endpoint even if this is false.
6592
- :param pulumi.Input[str] endpoint: The cluster's DNS endpoint.
6593
- """
6594
- if allow_external_traffic is not None:
6595
- pulumi.set(__self__, "allow_external_traffic", allow_external_traffic)
6596
- if endpoint is not None:
6597
- pulumi.set(__self__, "endpoint", endpoint)
6598
-
6599
- @property
6600
- @pulumi.getter(name="allowExternalTraffic")
6601
- def allow_external_traffic(self) -> Optional[pulumi.Input[bool]]:
6602
- """
6603
- Controls whether user traffic is allowed over this endpoint. Note that GCP-managed services may still use the endpoint even if this is false.
6604
- """
6605
- return pulumi.get(self, "allow_external_traffic")
6606
-
6607
- @allow_external_traffic.setter
6608
- def allow_external_traffic(self, value: Optional[pulumi.Input[bool]]):
6609
- pulumi.set(self, "allow_external_traffic", value)
6610
-
6611
- @property
6612
- @pulumi.getter
6613
- def endpoint(self) -> Optional[pulumi.Input[str]]:
6614
- """
6615
- The cluster's DNS endpoint.
6616
- """
6617
- return pulumi.get(self, "endpoint")
6618
-
6619
- @endpoint.setter
6620
- def endpoint(self, value: Optional[pulumi.Input[str]]):
6621
- pulumi.set(self, "endpoint", value)
6622
-
6623
-
6624
6481
  if not MYPY:
6625
6482
  class ClusterCostManagementConfigArgsDict(TypedDict):
6626
6483
  enabled: pulumi.Input[bool]
@@ -7948,10 +7805,6 @@ if not MYPY:
7948
7805
  Whether Kubernetes master is
7949
7806
  accessible via Google Compute Engine Public IPs.
7950
7807
  """
7951
- private_endpoint_enforcement_enabled: NotRequired[pulumi.Input[bool]]
7952
- """
7953
- Whether authorized networks is enforced on the private endpoint or not. Defaults to false.
7954
- """
7955
7808
  elif False:
7956
7809
  ClusterMasterAuthorizedNetworksConfigArgsDict: TypeAlias = Mapping[str, Any]
7957
7810
 
@@ -7959,21 +7812,17 @@ elif False:
7959
7812
  class ClusterMasterAuthorizedNetworksConfigArgs:
7960
7813
  def __init__(__self__, *,
7961
7814
  cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input['ClusterMasterAuthorizedNetworksConfigCidrBlockArgs']]]] = None,
7962
- gcp_public_cidrs_access_enabled: Optional[pulumi.Input[bool]] = None,
7963
- private_endpoint_enforcement_enabled: Optional[pulumi.Input[bool]] = None):
7815
+ gcp_public_cidrs_access_enabled: Optional[pulumi.Input[bool]] = None):
7964
7816
  """
7965
7817
  :param pulumi.Input[Sequence[pulumi.Input['ClusterMasterAuthorizedNetworksConfigCidrBlockArgs']]] cidr_blocks: External networks that can access the
7966
7818
  Kubernetes cluster master through HTTPS.
7967
7819
  :param pulumi.Input[bool] gcp_public_cidrs_access_enabled: Whether Kubernetes master is
7968
7820
  accessible via Google Compute Engine Public IPs.
7969
- :param pulumi.Input[bool] private_endpoint_enforcement_enabled: Whether authorized networks is enforced on the private endpoint or not. Defaults to false.
7970
7821
  """
7971
7822
  if cidr_blocks is not None:
7972
7823
  pulumi.set(__self__, "cidr_blocks", cidr_blocks)
7973
7824
  if gcp_public_cidrs_access_enabled is not None:
7974
7825
  pulumi.set(__self__, "gcp_public_cidrs_access_enabled", gcp_public_cidrs_access_enabled)
7975
- if private_endpoint_enforcement_enabled is not None:
7976
- pulumi.set(__self__, "private_endpoint_enforcement_enabled", private_endpoint_enforcement_enabled)
7977
7826
 
7978
7827
  @property
7979
7828
  @pulumi.getter(name="cidrBlocks")
@@ -8001,18 +7850,6 @@ class ClusterMasterAuthorizedNetworksConfigArgs:
8001
7850
  def gcp_public_cidrs_access_enabled(self, value: Optional[pulumi.Input[bool]]):
8002
7851
  pulumi.set(self, "gcp_public_cidrs_access_enabled", value)
8003
7852
 
8004
- @property
8005
- @pulumi.getter(name="privateEndpointEnforcementEnabled")
8006
- def private_endpoint_enforcement_enabled(self) -> Optional[pulumi.Input[bool]]:
8007
- """
8008
- Whether authorized networks is enforced on the private endpoint or not. Defaults to false.
8009
- """
8010
- return pulumi.get(self, "private_endpoint_enforcement_enabled")
8011
-
8012
- @private_endpoint_enforcement_enabled.setter
8013
- def private_endpoint_enforcement_enabled(self, value: Optional[pulumi.Input[bool]]):
8014
- pulumi.set(self, "private_endpoint_enforcement_enabled", value)
8015
-
8016
7853
 
8017
7854
  if not MYPY:
8018
7855
  class ClusterMasterAuthorizedNetworksConfigCidrBlockArgsDict(TypedDict):
@@ -15886,178 +15723,6 @@ class ClusterTpuConfigArgs:
15886
15723
  pulumi.set(self, "use_service_networking", value)
15887
15724
 
15888
15725
 
15889
- if not MYPY:
15890
- class ClusterUserManagedKeysConfigArgsDict(TypedDict):
15891
- aggregation_ca: NotRequired[pulumi.Input[str]]
15892
- """
15893
- The Certificate Authority Service caPool to use for the aggreation CA in this cluster.
15894
- """
15895
- cluster_ca: NotRequired[pulumi.Input[str]]
15896
- """
15897
- The Certificate Authority Service caPool to use for the cluster CA in this cluster.
15898
- """
15899
- control_plane_disk_encryption_key: NotRequired[pulumi.Input[str]]
15900
- """
15901
- The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control plane nodes.
15902
- """
15903
- etcd_api_ca: NotRequired[pulumi.Input[str]]
15904
- """
15905
- The Certificate Authority Service caPool to use for the etcd API CA in this cluster.
15906
- """
15907
- etcd_peer_ca: NotRequired[pulumi.Input[str]]
15908
- """
15909
- The Certificate Authority Service caPool to use for the etcd peer CA in this cluster.
15910
- """
15911
- gkeops_etcd_backup_encryption_key: NotRequired[pulumi.Input[str]]
15912
- """
15913
- Resource path of the Cloud KMS cryptoKey to use for encryption of internal etcd backups.
15914
- """
15915
- service_account_signing_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
15916
- """
15917
- The Cloud KMS cryptoKeyVersions to use for signing service account JWTs issued by this cluster.
15918
- """
15919
- service_account_verification_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
15920
- """
15921
- The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs issued by this cluster.
15922
- """
15923
- elif False:
15924
- ClusterUserManagedKeysConfigArgsDict: TypeAlias = Mapping[str, Any]
15925
-
15926
- @pulumi.input_type
15927
- class ClusterUserManagedKeysConfigArgs:
15928
- def __init__(__self__, *,
15929
- aggregation_ca: Optional[pulumi.Input[str]] = None,
15930
- cluster_ca: Optional[pulumi.Input[str]] = None,
15931
- control_plane_disk_encryption_key: Optional[pulumi.Input[str]] = None,
15932
- etcd_api_ca: Optional[pulumi.Input[str]] = None,
15933
- etcd_peer_ca: Optional[pulumi.Input[str]] = None,
15934
- gkeops_etcd_backup_encryption_key: Optional[pulumi.Input[str]] = None,
15935
- service_account_signing_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
15936
- service_account_verification_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
15937
- """
15938
- :param pulumi.Input[str] aggregation_ca: The Certificate Authority Service caPool to use for the aggreation CA in this cluster.
15939
- :param pulumi.Input[str] cluster_ca: The Certificate Authority Service caPool to use for the cluster CA in this cluster.
15940
- :param pulumi.Input[str] control_plane_disk_encryption_key: The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control plane nodes.
15941
- :param pulumi.Input[str] etcd_api_ca: The Certificate Authority Service caPool to use for the etcd API CA in this cluster.
15942
- :param pulumi.Input[str] etcd_peer_ca: The Certificate Authority Service caPool to use for the etcd peer CA in this cluster.
15943
- :param pulumi.Input[str] gkeops_etcd_backup_encryption_key: Resource path of the Cloud KMS cryptoKey to use for encryption of internal etcd backups.
15944
- :param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_signing_keys: The Cloud KMS cryptoKeyVersions to use for signing service account JWTs issued by this cluster.
15945
- :param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_verification_keys: The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs issued by this cluster.
15946
- """
15947
- if aggregation_ca is not None:
15948
- pulumi.set(__self__, "aggregation_ca", aggregation_ca)
15949
- if cluster_ca is not None:
15950
- pulumi.set(__self__, "cluster_ca", cluster_ca)
15951
- if control_plane_disk_encryption_key is not None:
15952
- pulumi.set(__self__, "control_plane_disk_encryption_key", control_plane_disk_encryption_key)
15953
- if etcd_api_ca is not None:
15954
- pulumi.set(__self__, "etcd_api_ca", etcd_api_ca)
15955
- if etcd_peer_ca is not None:
15956
- pulumi.set(__self__, "etcd_peer_ca", etcd_peer_ca)
15957
- if gkeops_etcd_backup_encryption_key is not None:
15958
- pulumi.set(__self__, "gkeops_etcd_backup_encryption_key", gkeops_etcd_backup_encryption_key)
15959
- if service_account_signing_keys is not None:
15960
- pulumi.set(__self__, "service_account_signing_keys", service_account_signing_keys)
15961
- if service_account_verification_keys is not None:
15962
- pulumi.set(__self__, "service_account_verification_keys", service_account_verification_keys)
15963
-
15964
- @property
15965
- @pulumi.getter(name="aggregationCa")
15966
- def aggregation_ca(self) -> Optional[pulumi.Input[str]]:
15967
- """
15968
- The Certificate Authority Service caPool to use for the aggreation CA in this cluster.
15969
- """
15970
- return pulumi.get(self, "aggregation_ca")
15971
-
15972
- @aggregation_ca.setter
15973
- def aggregation_ca(self, value: Optional[pulumi.Input[str]]):
15974
- pulumi.set(self, "aggregation_ca", value)
15975
-
15976
- @property
15977
- @pulumi.getter(name="clusterCa")
15978
- def cluster_ca(self) -> Optional[pulumi.Input[str]]:
15979
- """
15980
- The Certificate Authority Service caPool to use for the cluster CA in this cluster.
15981
- """
15982
- return pulumi.get(self, "cluster_ca")
15983
-
15984
- @cluster_ca.setter
15985
- def cluster_ca(self, value: Optional[pulumi.Input[str]]):
15986
- pulumi.set(self, "cluster_ca", value)
15987
-
15988
- @property
15989
- @pulumi.getter(name="controlPlaneDiskEncryptionKey")
15990
- def control_plane_disk_encryption_key(self) -> Optional[pulumi.Input[str]]:
15991
- """
15992
- The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control plane nodes.
15993
- """
15994
- return pulumi.get(self, "control_plane_disk_encryption_key")
15995
-
15996
- @control_plane_disk_encryption_key.setter
15997
- def control_plane_disk_encryption_key(self, value: Optional[pulumi.Input[str]]):
15998
- pulumi.set(self, "control_plane_disk_encryption_key", value)
15999
-
16000
- @property
16001
- @pulumi.getter(name="etcdApiCa")
16002
- def etcd_api_ca(self) -> Optional[pulumi.Input[str]]:
16003
- """
16004
- The Certificate Authority Service caPool to use for the etcd API CA in this cluster.
16005
- """
16006
- return pulumi.get(self, "etcd_api_ca")
16007
-
16008
- @etcd_api_ca.setter
16009
- def etcd_api_ca(self, value: Optional[pulumi.Input[str]]):
16010
- pulumi.set(self, "etcd_api_ca", value)
16011
-
16012
- @property
16013
- @pulumi.getter(name="etcdPeerCa")
16014
- def etcd_peer_ca(self) -> Optional[pulumi.Input[str]]:
16015
- """
16016
- The Certificate Authority Service caPool to use for the etcd peer CA in this cluster.
16017
- """
16018
- return pulumi.get(self, "etcd_peer_ca")
16019
-
16020
- @etcd_peer_ca.setter
16021
- def etcd_peer_ca(self, value: Optional[pulumi.Input[str]]):
16022
- pulumi.set(self, "etcd_peer_ca", value)
16023
-
16024
- @property
16025
- @pulumi.getter(name="gkeopsEtcdBackupEncryptionKey")
16026
- def gkeops_etcd_backup_encryption_key(self) -> Optional[pulumi.Input[str]]:
16027
- """
16028
- Resource path of the Cloud KMS cryptoKey to use for encryption of internal etcd backups.
16029
- """
16030
- return pulumi.get(self, "gkeops_etcd_backup_encryption_key")
16031
-
16032
- @gkeops_etcd_backup_encryption_key.setter
16033
- def gkeops_etcd_backup_encryption_key(self, value: Optional[pulumi.Input[str]]):
16034
- pulumi.set(self, "gkeops_etcd_backup_encryption_key", value)
16035
-
16036
- @property
16037
- @pulumi.getter(name="serviceAccountSigningKeys")
16038
- def service_account_signing_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
16039
- """
16040
- The Cloud KMS cryptoKeyVersions to use for signing service account JWTs issued by this cluster.
16041
- """
16042
- return pulumi.get(self, "service_account_signing_keys")
16043
-
16044
- @service_account_signing_keys.setter
16045
- def service_account_signing_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
16046
- pulumi.set(self, "service_account_signing_keys", value)
16047
-
16048
- @property
16049
- @pulumi.getter(name="serviceAccountVerificationKeys")
16050
- def service_account_verification_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
16051
- """
16052
- The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs issued by this cluster.
16053
- """
16054
- return pulumi.get(self, "service_account_verification_keys")
16055
-
16056
- @service_account_verification_keys.setter
16057
- def service_account_verification_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
16058
- pulumi.set(self, "service_account_verification_keys", value)
16059
-
16060
-
16061
15726
  if not MYPY:
16062
15727
  class ClusterVerticalPodAutoscalingArgsDict(TypedDict):
16063
15728
  enabled: pulumi.Input[bool]