pulumi-gcp 8.8.2a1731515595__py3-none-any.whl → 8.9.0a1731097924__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +0 -64
- pulumi_gcp/activedirectory/domain.py +0 -24
- pulumi_gcp/apigee/__init__.py +0 -1
- pulumi_gcp/apigee/_inputs.py +0 -74
- pulumi_gcp/apigee/outputs.py +0 -65
- pulumi_gcp/applicationintegration/auth_config.py +0 -24
- pulumi_gcp/backupdisasterrecovery/__init__.py +0 -4
- pulumi_gcp/backupdisasterrecovery/_inputs.py +0 -533
- pulumi_gcp/backupdisasterrecovery/backup_vault.py +6 -146
- pulumi_gcp/backupdisasterrecovery/outputs.py +0 -702
- pulumi_gcp/bigquery/data_transfer_config.py +0 -24
- pulumi_gcp/cloudrunv2/_inputs.py +0 -46
- pulumi_gcp/cloudrunv2/job.py +2 -0
- pulumi_gcp/cloudrunv2/outputs.py +2 -60
- pulumi_gcp/cloudrunv2/service.py +2 -0
- pulumi_gcp/compute/__init__.py +0 -1
- pulumi_gcp/compute/_inputs.py +255 -2162
- pulumi_gcp/compute/disk.py +7 -7
- pulumi_gcp/compute/firewall_policy_rule.py +54 -108
- pulumi_gcp/compute/get_region_instance_group_manager.py +1 -12
- pulumi_gcp/compute/health_check.py +42 -42
- pulumi_gcp/compute/network_firewall_policy_rule.py +4 -4
- pulumi_gcp/compute/network_firewall_policy_with_rules.py +10 -10
- pulumi_gcp/compute/node_template.py +0 -95
- pulumi_gcp/compute/outputs.py +213 -1639
- pulumi_gcp/compute/region_disk.py +7 -7
- pulumi_gcp/compute/region_health_check.py +42 -42
- pulumi_gcp/compute/region_instance_group_manager.py +14 -54
- pulumi_gcp/compute/region_network_firewall_policy_rule.py +4 -4
- pulumi_gcp/compute/region_network_firewall_policy_with_rules.py +10 -10
- pulumi_gcp/compute/region_security_policy.py +0 -120
- pulumi_gcp/compute/region_security_policy_rule.py +6 -6
- pulumi_gcp/compute/router_peer.py +35 -56
- pulumi_gcp/compute/security_scan_config.py +8 -8
- pulumi_gcp/config/__init__.pyi +0 -4
- pulumi_gcp/config/vars.py +0 -8
- pulumi_gcp/container/_inputs.py +10 -345
- pulumi_gcp/container/cluster.py +0 -101
- pulumi_gcp/container/get_cluster.py +1 -23
- pulumi_gcp/container/outputs.py +8 -456
- pulumi_gcp/dataloss/prevention_discovery_config.py +7 -7
- pulumi_gcp/dataproc/__init__.py +0 -2
- pulumi_gcp/dataproc/_inputs.py +0 -101
- pulumi_gcp/dataproc/outputs.py +0 -94
- pulumi_gcp/edgecontainer/vpn_connection.py +4 -4
- pulumi_gcp/firebase/android_app.py +2 -2
- pulumi_gcp/firebase/apple_app.py +2 -2
- pulumi_gcp/firebase/web_app.py +2 -2
- pulumi_gcp/firestore/index.py +0 -44
- pulumi_gcp/gkeonprem/_inputs.py +15 -15
- pulumi_gcp/gkeonprem/outputs.py +10 -10
- pulumi_gcp/healthcare/dataset.py +7 -7
- pulumi_gcp/healthcare/dicom_store.py +7 -7
- pulumi_gcp/healthcare/fhir_store.py +7 -7
- pulumi_gcp/healthcare/hl7_store.py +14 -14
- pulumi_gcp/iam/__init__.py +0 -1
- pulumi_gcp/iam/_inputs.py +0 -161
- pulumi_gcp/iam/outputs.py +0 -114
- pulumi_gcp/logging/metric.py +2 -2
- pulumi_gcp/looker/_inputs.py +0 -6
- pulumi_gcp/looker/instance.py +321 -169
- pulumi_gcp/looker/outputs.py +0 -4
- pulumi_gcp/memorystore/instance.py +0 -4
- pulumi_gcp/monitoring/alert_policy.py +0 -24
- pulumi_gcp/monitoring/custom_service.py +0 -24
- pulumi_gcp/monitoring/group.py +0 -24
- pulumi_gcp/monitoring/metric_descriptor.py +0 -24
- pulumi_gcp/monitoring/slo.py +0 -24
- pulumi_gcp/monitoring/uptime_check_config.py +0 -24
- pulumi_gcp/networkmanagement/__init__.py +0 -1
- pulumi_gcp/osconfig/patch_deployment.py +8 -8
- pulumi_gcp/provider.py +0 -40
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/redis/_inputs.py +3 -3
- pulumi_gcp/redis/outputs.py +2 -2
- pulumi_gcp/securitycenter/notification_config.py +16 -4
- pulumi_gcp/securitycenter/project_notification_config.py +24 -0
- pulumi_gcp/securitycenter/v2_organization_notification_config.py +16 -4
- pulumi_gcp/spanner/__init__.py +0 -1
- pulumi_gcp/spanner/_inputs.py +9 -9
- pulumi_gcp/spanner/get_instance.py +1 -12
- pulumi_gcp/spanner/instance.py +0 -70
- pulumi_gcp/spanner/outputs.py +12 -46
- pulumi_gcp/sql/_inputs.py +0 -26
- pulumi_gcp/sql/database_instance.py +11 -124
- pulumi_gcp/sql/get_database_instance.py +1 -12
- pulumi_gcp/sql/outputs.py +0 -51
- pulumi_gcp/storage/_inputs.py +3 -3
- pulumi_gcp/storage/outputs.py +2 -2
- pulumi_gcp/tags/tag_binding.py +4 -4
- pulumi_gcp/tags/tag_value.py +2 -2
- pulumi_gcp/transcoder/job.py +0 -24
- pulumi_gcp/vertex/_inputs.py +0 -184
- pulumi_gcp/vertex/ai_endpoint.py +8 -394
- pulumi_gcp/vertex/ai_feature_online_store_featureview.py +4 -4
- pulumi_gcp/vertex/outputs.py +0 -166
- pulumi_gcp/workbench/instance.py +7 -21
- pulumi_gcp/workflows/workflow.py +0 -36
- pulumi_gcp/workstations/workstation_config.py +8 -8
- {pulumi_gcp-8.8.2a1731515595.dist-info → pulumi_gcp-8.9.0a1731097924.dist-info}/METADATA +1 -1
- {pulumi_gcp-8.8.2a1731515595.dist-info → pulumi_gcp-8.9.0a1731097924.dist-info}/RECORD +103 -114
- {pulumi_gcp-8.8.2a1731515595.dist-info → pulumi_gcp-8.9.0a1731097924.dist-info}/WHEEL +1 -1
- pulumi_gcp/apigee/api.py +0 -456
- pulumi_gcp/backupdisasterrecovery/backup_plan.py +0 -653
- pulumi_gcp/backupdisasterrecovery/backup_plan_association.py +0 -766
- pulumi_gcp/backupdisasterrecovery/get_backup_plan.py +0 -204
- pulumi_gcp/backupdisasterrecovery/get_backup_plan_association.py +0 -243
- pulumi_gcp/compute/region_resize_request.py +0 -772
- pulumi_gcp/dataproc/gdc_application_environment.py +0 -931
- pulumi_gcp/dataproc/gdc_service_instance.py +0 -1022
- pulumi_gcp/iam/principal_access_boundary_policy.py +0 -679
- pulumi_gcp/networkmanagement/vpc_flow_logs_config.py +0 -1358
- pulumi_gcp/spanner/get_database.py +0 -229
- {pulumi_gcp-8.8.2a1731515595.dist-info → pulumi_gcp-8.9.0a1731097924.dist-info}/top_level.txt +0 -0
pulumi_gcp/container/_inputs.py
CHANGED
@@ -179,8 +179,6 @@ __all__ = [
|
|
179
179
|
'ClusterAddonsConfigKalmConfigArgsDict',
|
180
180
|
'ClusterAddonsConfigNetworkPolicyConfigArgs',
|
181
181
|
'ClusterAddonsConfigNetworkPolicyConfigArgsDict',
|
182
|
-
'ClusterAddonsConfigParallelstoreCsiDriverConfigArgs',
|
183
|
-
'ClusterAddonsConfigParallelstoreCsiDriverConfigArgsDict',
|
184
182
|
'ClusterAddonsConfigRayOperatorConfigArgs',
|
185
183
|
'ClusterAddonsConfigRayOperatorConfigArgsDict',
|
186
184
|
'ClusterAddonsConfigRayOperatorConfigRayClusterLoggingConfigArgs',
|
@@ -215,10 +213,6 @@ __all__ = [
|
|
215
213
|
'ClusterClusterTelemetryArgsDict',
|
216
214
|
'ClusterConfidentialNodesArgs',
|
217
215
|
'ClusterConfidentialNodesArgsDict',
|
218
|
-
'ClusterControlPlaneEndpointsConfigArgs',
|
219
|
-
'ClusterControlPlaneEndpointsConfigArgsDict',
|
220
|
-
'ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgs',
|
221
|
-
'ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgsDict',
|
222
216
|
'ClusterCostManagementConfigArgs',
|
223
217
|
'ClusterCostManagementConfigArgsDict',
|
224
218
|
'ClusterDatabaseEncryptionArgs',
|
@@ -463,8 +457,6 @@ __all__ = [
|
|
463
457
|
'ClusterServiceExternalIpsConfigArgsDict',
|
464
458
|
'ClusterTpuConfigArgs',
|
465
459
|
'ClusterTpuConfigArgsDict',
|
466
|
-
'ClusterUserManagedKeysConfigArgs',
|
467
|
-
'ClusterUserManagedKeysConfigArgsDict',
|
468
460
|
'ClusterVerticalPodAutoscalingArgs',
|
469
461
|
'ClusterVerticalPodAutoscalingArgsDict',
|
470
462
|
'ClusterWorkloadAltsConfigArgs',
|
@@ -4624,16 +4616,6 @@ if not MYPY:
|
|
4624
4616
|
It can only be disabled if the nodes already do not have network policies enabled.
|
4625
4617
|
Defaults to disabled; set `disabled = false` to enable.
|
4626
4618
|
"""
|
4627
|
-
parallelstore_csi_driver_config: NotRequired[pulumi.Input['ClusterAddonsConfigParallelstoreCsiDriverConfigArgsDict']]
|
4628
|
-
"""
|
4629
|
-
The status of the Parallelstore CSI driver addon,
|
4630
|
-
which allows the usage of a Parallelstore instances as volumes.
|
4631
|
-
It is disabled by default for Standard clusters; set `enabled = true` to enable.
|
4632
|
-
It is enabled by default for Autopilot clusters with version 1.29 or later; set `enabled = true` to enable it explicitly.
|
4633
|
-
See [Enable the Parallelstore CSI driver](https://cloud.google.com/kubernetes-engine/docs/how-to/persistent-volumes/parallelstore-csi-new-volume#enable) for more information.
|
4634
|
-
|
4635
|
-
This example `addons_config` disables two addons:
|
4636
|
-
"""
|
4637
4619
|
ray_operator_configs: NotRequired[pulumi.Input[Sequence[pulumi.Input['ClusterAddonsConfigRayOperatorConfigArgsDict']]]]
|
4638
4620
|
"""
|
4639
4621
|
. The status of the [Ray Operator
|
@@ -4648,6 +4630,9 @@ if not MYPY:
|
|
4648
4630
|
clusters on
|
4649
4631
|
GKE](https://cloud.google.com/kubernetes-engine/docs/add-on/ray-on-gke/how-to/collect-view-logs-metrics)
|
4650
4632
|
for more information.
|
4633
|
+
|
4634
|
+
|
4635
|
+
This example `addons_config` disables two addons:
|
4651
4636
|
"""
|
4652
4637
|
stateful_ha_config: NotRequired[pulumi.Input['ClusterAddonsConfigStatefulHaConfigArgsDict']]
|
4653
4638
|
"""
|
@@ -4673,7 +4658,6 @@ class ClusterAddonsConfigArgs:
|
|
4673
4658
|
istio_config: Optional[pulumi.Input['ClusterAddonsConfigIstioConfigArgs']] = None,
|
4674
4659
|
kalm_config: Optional[pulumi.Input['ClusterAddonsConfigKalmConfigArgs']] = None,
|
4675
4660
|
network_policy_config: Optional[pulumi.Input['ClusterAddonsConfigNetworkPolicyConfigArgs']] = None,
|
4676
|
-
parallelstore_csi_driver_config: Optional[pulumi.Input['ClusterAddonsConfigParallelstoreCsiDriverConfigArgs']] = None,
|
4677
4661
|
ray_operator_configs: Optional[pulumi.Input[Sequence[pulumi.Input['ClusterAddonsConfigRayOperatorConfigArgs']]]] = None,
|
4678
4662
|
stateful_ha_config: Optional[pulumi.Input['ClusterAddonsConfigStatefulHaConfigArgs']] = None):
|
4679
4663
|
"""
|
@@ -4718,13 +4702,6 @@ class ClusterAddonsConfigArgs:
|
|
4718
4702
|
otherwise nothing will happen.
|
4719
4703
|
It can only be disabled if the nodes already do not have network policies enabled.
|
4720
4704
|
Defaults to disabled; set `disabled = false` to enable.
|
4721
|
-
:param pulumi.Input['ClusterAddonsConfigParallelstoreCsiDriverConfigArgs'] parallelstore_csi_driver_config: The status of the Parallelstore CSI driver addon,
|
4722
|
-
which allows the usage of a Parallelstore instances as volumes.
|
4723
|
-
It is disabled by default for Standard clusters; set `enabled = true` to enable.
|
4724
|
-
It is enabled by default for Autopilot clusters with version 1.29 or later; set `enabled = true` to enable it explicitly.
|
4725
|
-
See [Enable the Parallelstore CSI driver](https://cloud.google.com/kubernetes-engine/docs/how-to/persistent-volumes/parallelstore-csi-new-volume#enable) for more information.
|
4726
|
-
|
4727
|
-
This example `addons_config` disables two addons:
|
4728
4705
|
:param pulumi.Input[Sequence[pulumi.Input['ClusterAddonsConfigRayOperatorConfigArgs']]] ray_operator_configs: . The status of the [Ray Operator
|
4729
4706
|
addon](https://cloud.google.com/kubernetes-engine/docs/add-on/ray-on-gke/concepts/overview).
|
4730
4707
|
It is disabled by default. Set `enabled = true` to enable. The minimum
|
@@ -4737,6 +4714,9 @@ class ClusterAddonsConfigArgs:
|
|
4737
4714
|
clusters on
|
4738
4715
|
GKE](https://cloud.google.com/kubernetes-engine/docs/add-on/ray-on-gke/how-to/collect-view-logs-metrics)
|
4739
4716
|
for more information.
|
4717
|
+
|
4718
|
+
|
4719
|
+
This example `addons_config` disables two addons:
|
4740
4720
|
:param pulumi.Input['ClusterAddonsConfigStatefulHaConfigArgs'] stateful_ha_config: .
|
4741
4721
|
The status of the Stateful HA addon, which provides automatic configurable failover for stateful applications.
|
4742
4722
|
It is disabled by default for Standard clusters. Set `enabled = true` to enable.
|
@@ -4765,8 +4745,6 @@ class ClusterAddonsConfigArgs:
|
|
4765
4745
|
pulumi.set(__self__, "kalm_config", kalm_config)
|
4766
4746
|
if network_policy_config is not None:
|
4767
4747
|
pulumi.set(__self__, "network_policy_config", network_policy_config)
|
4768
|
-
if parallelstore_csi_driver_config is not None:
|
4769
|
-
pulumi.set(__self__, "parallelstore_csi_driver_config", parallelstore_csi_driver_config)
|
4770
4748
|
if ray_operator_configs is not None:
|
4771
4749
|
pulumi.set(__self__, "ray_operator_configs", ray_operator_configs)
|
4772
4750
|
if stateful_ha_config is not None:
|
@@ -4945,24 +4923,6 @@ class ClusterAddonsConfigArgs:
|
|
4945
4923
|
def network_policy_config(self, value: Optional[pulumi.Input['ClusterAddonsConfigNetworkPolicyConfigArgs']]):
|
4946
4924
|
pulumi.set(self, "network_policy_config", value)
|
4947
4925
|
|
4948
|
-
@property
|
4949
|
-
@pulumi.getter(name="parallelstoreCsiDriverConfig")
|
4950
|
-
def parallelstore_csi_driver_config(self) -> Optional[pulumi.Input['ClusterAddonsConfigParallelstoreCsiDriverConfigArgs']]:
|
4951
|
-
"""
|
4952
|
-
The status of the Parallelstore CSI driver addon,
|
4953
|
-
which allows the usage of a Parallelstore instances as volumes.
|
4954
|
-
It is disabled by default for Standard clusters; set `enabled = true` to enable.
|
4955
|
-
It is enabled by default for Autopilot clusters with version 1.29 or later; set `enabled = true` to enable it explicitly.
|
4956
|
-
See [Enable the Parallelstore CSI driver](https://cloud.google.com/kubernetes-engine/docs/how-to/persistent-volumes/parallelstore-csi-new-volume#enable) for more information.
|
4957
|
-
|
4958
|
-
This example `addons_config` disables two addons:
|
4959
|
-
"""
|
4960
|
-
return pulumi.get(self, "parallelstore_csi_driver_config")
|
4961
|
-
|
4962
|
-
@parallelstore_csi_driver_config.setter
|
4963
|
-
def parallelstore_csi_driver_config(self, value: Optional[pulumi.Input['ClusterAddonsConfigParallelstoreCsiDriverConfigArgs']]):
|
4964
|
-
pulumi.set(self, "parallelstore_csi_driver_config", value)
|
4965
|
-
|
4966
4926
|
@property
|
4967
4927
|
@pulumi.getter(name="rayOperatorConfigs")
|
4968
4928
|
def ray_operator_configs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['ClusterAddonsConfigRayOperatorConfigArgs']]]]:
|
@@ -4979,6 +4939,9 @@ class ClusterAddonsConfigArgs:
|
|
4979
4939
|
clusters on
|
4980
4940
|
GKE](https://cloud.google.com/kubernetes-engine/docs/add-on/ray-on-gke/how-to/collect-view-logs-metrics)
|
4981
4941
|
for more information.
|
4942
|
+
|
4943
|
+
|
4944
|
+
This example `addons_config` disables two addons:
|
4982
4945
|
"""
|
4983
4946
|
return pulumi.get(self, "ray_operator_configs")
|
4984
4947
|
|
@@ -5374,28 +5337,6 @@ class ClusterAddonsConfigNetworkPolicyConfigArgs:
|
|
5374
5337
|
pulumi.set(self, "disabled", value)
|
5375
5338
|
|
5376
5339
|
|
5377
|
-
if not MYPY:
|
5378
|
-
class ClusterAddonsConfigParallelstoreCsiDriverConfigArgsDict(TypedDict):
|
5379
|
-
enabled: pulumi.Input[bool]
|
5380
|
-
elif False:
|
5381
|
-
ClusterAddonsConfigParallelstoreCsiDriverConfigArgsDict: TypeAlias = Mapping[str, Any]
|
5382
|
-
|
5383
|
-
@pulumi.input_type
|
5384
|
-
class ClusterAddonsConfigParallelstoreCsiDriverConfigArgs:
|
5385
|
-
def __init__(__self__, *,
|
5386
|
-
enabled: pulumi.Input[bool]):
|
5387
|
-
pulumi.set(__self__, "enabled", enabled)
|
5388
|
-
|
5389
|
-
@property
|
5390
|
-
@pulumi.getter
|
5391
|
-
def enabled(self) -> pulumi.Input[bool]:
|
5392
|
-
return pulumi.get(self, "enabled")
|
5393
|
-
|
5394
|
-
@enabled.setter
|
5395
|
-
def enabled(self, value: pulumi.Input[bool]):
|
5396
|
-
pulumi.set(self, "enabled", value)
|
5397
|
-
|
5398
|
-
|
5399
5340
|
if not MYPY:
|
5400
5341
|
class ClusterAddonsConfigRayOperatorConfigArgsDict(TypedDict):
|
5401
5342
|
enabled: pulumi.Input[bool]
|
@@ -6537,90 +6478,6 @@ class ClusterConfidentialNodesArgs:
|
|
6537
6478
|
pulumi.set(self, "enabled", value)
|
6538
6479
|
|
6539
6480
|
|
6540
|
-
if not MYPY:
|
6541
|
-
class ClusterControlPlaneEndpointsConfigArgsDict(TypedDict):
|
6542
|
-
dns_endpoint_config: NotRequired[pulumi.Input['ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgsDict']]
|
6543
|
-
"""
|
6544
|
-
DNS endpoint configuration.
|
6545
|
-
"""
|
6546
|
-
elif False:
|
6547
|
-
ClusterControlPlaneEndpointsConfigArgsDict: TypeAlias = Mapping[str, Any]
|
6548
|
-
|
6549
|
-
@pulumi.input_type
|
6550
|
-
class ClusterControlPlaneEndpointsConfigArgs:
|
6551
|
-
def __init__(__self__, *,
|
6552
|
-
dns_endpoint_config: Optional[pulumi.Input['ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgs']] = None):
|
6553
|
-
"""
|
6554
|
-
:param pulumi.Input['ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgs'] dns_endpoint_config: DNS endpoint configuration.
|
6555
|
-
"""
|
6556
|
-
if dns_endpoint_config is not None:
|
6557
|
-
pulumi.set(__self__, "dns_endpoint_config", dns_endpoint_config)
|
6558
|
-
|
6559
|
-
@property
|
6560
|
-
@pulumi.getter(name="dnsEndpointConfig")
|
6561
|
-
def dns_endpoint_config(self) -> Optional[pulumi.Input['ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgs']]:
|
6562
|
-
"""
|
6563
|
-
DNS endpoint configuration.
|
6564
|
-
"""
|
6565
|
-
return pulumi.get(self, "dns_endpoint_config")
|
6566
|
-
|
6567
|
-
@dns_endpoint_config.setter
|
6568
|
-
def dns_endpoint_config(self, value: Optional[pulumi.Input['ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgs']]):
|
6569
|
-
pulumi.set(self, "dns_endpoint_config", value)
|
6570
|
-
|
6571
|
-
|
6572
|
-
if not MYPY:
|
6573
|
-
class ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgsDict(TypedDict):
|
6574
|
-
allow_external_traffic: NotRequired[pulumi.Input[bool]]
|
6575
|
-
"""
|
6576
|
-
Controls whether user traffic is allowed over this endpoint. Note that GCP-managed services may still use the endpoint even if this is false.
|
6577
|
-
"""
|
6578
|
-
endpoint: NotRequired[pulumi.Input[str]]
|
6579
|
-
"""
|
6580
|
-
The cluster's DNS endpoint.
|
6581
|
-
"""
|
6582
|
-
elif False:
|
6583
|
-
ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgsDict: TypeAlias = Mapping[str, Any]
|
6584
|
-
|
6585
|
-
@pulumi.input_type
|
6586
|
-
class ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgs:
|
6587
|
-
def __init__(__self__, *,
|
6588
|
-
allow_external_traffic: Optional[pulumi.Input[bool]] = None,
|
6589
|
-
endpoint: Optional[pulumi.Input[str]] = None):
|
6590
|
-
"""
|
6591
|
-
:param pulumi.Input[bool] allow_external_traffic: Controls whether user traffic is allowed over this endpoint. Note that GCP-managed services may still use the endpoint even if this is false.
|
6592
|
-
:param pulumi.Input[str] endpoint: The cluster's DNS endpoint.
|
6593
|
-
"""
|
6594
|
-
if allow_external_traffic is not None:
|
6595
|
-
pulumi.set(__self__, "allow_external_traffic", allow_external_traffic)
|
6596
|
-
if endpoint is not None:
|
6597
|
-
pulumi.set(__self__, "endpoint", endpoint)
|
6598
|
-
|
6599
|
-
@property
|
6600
|
-
@pulumi.getter(name="allowExternalTraffic")
|
6601
|
-
def allow_external_traffic(self) -> Optional[pulumi.Input[bool]]:
|
6602
|
-
"""
|
6603
|
-
Controls whether user traffic is allowed over this endpoint. Note that GCP-managed services may still use the endpoint even if this is false.
|
6604
|
-
"""
|
6605
|
-
return pulumi.get(self, "allow_external_traffic")
|
6606
|
-
|
6607
|
-
@allow_external_traffic.setter
|
6608
|
-
def allow_external_traffic(self, value: Optional[pulumi.Input[bool]]):
|
6609
|
-
pulumi.set(self, "allow_external_traffic", value)
|
6610
|
-
|
6611
|
-
@property
|
6612
|
-
@pulumi.getter
|
6613
|
-
def endpoint(self) -> Optional[pulumi.Input[str]]:
|
6614
|
-
"""
|
6615
|
-
The cluster's DNS endpoint.
|
6616
|
-
"""
|
6617
|
-
return pulumi.get(self, "endpoint")
|
6618
|
-
|
6619
|
-
@endpoint.setter
|
6620
|
-
def endpoint(self, value: Optional[pulumi.Input[str]]):
|
6621
|
-
pulumi.set(self, "endpoint", value)
|
6622
|
-
|
6623
|
-
|
6624
6481
|
if not MYPY:
|
6625
6482
|
class ClusterCostManagementConfigArgsDict(TypedDict):
|
6626
6483
|
enabled: pulumi.Input[bool]
|
@@ -7948,10 +7805,6 @@ if not MYPY:
|
|
7948
7805
|
Whether Kubernetes master is
|
7949
7806
|
accessible via Google Compute Engine Public IPs.
|
7950
7807
|
"""
|
7951
|
-
private_endpoint_enforcement_enabled: NotRequired[pulumi.Input[bool]]
|
7952
|
-
"""
|
7953
|
-
Whether authorized networks is enforced on the private endpoint or not. Defaults to false.
|
7954
|
-
"""
|
7955
7808
|
elif False:
|
7956
7809
|
ClusterMasterAuthorizedNetworksConfigArgsDict: TypeAlias = Mapping[str, Any]
|
7957
7810
|
|
@@ -7959,21 +7812,17 @@ elif False:
|
|
7959
7812
|
class ClusterMasterAuthorizedNetworksConfigArgs:
|
7960
7813
|
def __init__(__self__, *,
|
7961
7814
|
cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input['ClusterMasterAuthorizedNetworksConfigCidrBlockArgs']]]] = None,
|
7962
|
-
gcp_public_cidrs_access_enabled: Optional[pulumi.Input[bool]] = None
|
7963
|
-
private_endpoint_enforcement_enabled: Optional[pulumi.Input[bool]] = None):
|
7815
|
+
gcp_public_cidrs_access_enabled: Optional[pulumi.Input[bool]] = None):
|
7964
7816
|
"""
|
7965
7817
|
:param pulumi.Input[Sequence[pulumi.Input['ClusterMasterAuthorizedNetworksConfigCidrBlockArgs']]] cidr_blocks: External networks that can access the
|
7966
7818
|
Kubernetes cluster master through HTTPS.
|
7967
7819
|
:param pulumi.Input[bool] gcp_public_cidrs_access_enabled: Whether Kubernetes master is
|
7968
7820
|
accessible via Google Compute Engine Public IPs.
|
7969
|
-
:param pulumi.Input[bool] private_endpoint_enforcement_enabled: Whether authorized networks is enforced on the private endpoint or not. Defaults to false.
|
7970
7821
|
"""
|
7971
7822
|
if cidr_blocks is not None:
|
7972
7823
|
pulumi.set(__self__, "cidr_blocks", cidr_blocks)
|
7973
7824
|
if gcp_public_cidrs_access_enabled is not None:
|
7974
7825
|
pulumi.set(__self__, "gcp_public_cidrs_access_enabled", gcp_public_cidrs_access_enabled)
|
7975
|
-
if private_endpoint_enforcement_enabled is not None:
|
7976
|
-
pulumi.set(__self__, "private_endpoint_enforcement_enabled", private_endpoint_enforcement_enabled)
|
7977
7826
|
|
7978
7827
|
@property
|
7979
7828
|
@pulumi.getter(name="cidrBlocks")
|
@@ -8001,18 +7850,6 @@ class ClusterMasterAuthorizedNetworksConfigArgs:
|
|
8001
7850
|
def gcp_public_cidrs_access_enabled(self, value: Optional[pulumi.Input[bool]]):
|
8002
7851
|
pulumi.set(self, "gcp_public_cidrs_access_enabled", value)
|
8003
7852
|
|
8004
|
-
@property
|
8005
|
-
@pulumi.getter(name="privateEndpointEnforcementEnabled")
|
8006
|
-
def private_endpoint_enforcement_enabled(self) -> Optional[pulumi.Input[bool]]:
|
8007
|
-
"""
|
8008
|
-
Whether authorized networks is enforced on the private endpoint or not. Defaults to false.
|
8009
|
-
"""
|
8010
|
-
return pulumi.get(self, "private_endpoint_enforcement_enabled")
|
8011
|
-
|
8012
|
-
@private_endpoint_enforcement_enabled.setter
|
8013
|
-
def private_endpoint_enforcement_enabled(self, value: Optional[pulumi.Input[bool]]):
|
8014
|
-
pulumi.set(self, "private_endpoint_enforcement_enabled", value)
|
8015
|
-
|
8016
7853
|
|
8017
7854
|
if not MYPY:
|
8018
7855
|
class ClusterMasterAuthorizedNetworksConfigCidrBlockArgsDict(TypedDict):
|
@@ -15886,178 +15723,6 @@ class ClusterTpuConfigArgs:
|
|
15886
15723
|
pulumi.set(self, "use_service_networking", value)
|
15887
15724
|
|
15888
15725
|
|
15889
|
-
if not MYPY:
|
15890
|
-
class ClusterUserManagedKeysConfigArgsDict(TypedDict):
|
15891
|
-
aggregation_ca: NotRequired[pulumi.Input[str]]
|
15892
|
-
"""
|
15893
|
-
The Certificate Authority Service caPool to use for the aggreation CA in this cluster.
|
15894
|
-
"""
|
15895
|
-
cluster_ca: NotRequired[pulumi.Input[str]]
|
15896
|
-
"""
|
15897
|
-
The Certificate Authority Service caPool to use for the cluster CA in this cluster.
|
15898
|
-
"""
|
15899
|
-
control_plane_disk_encryption_key: NotRequired[pulumi.Input[str]]
|
15900
|
-
"""
|
15901
|
-
The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control plane nodes.
|
15902
|
-
"""
|
15903
|
-
etcd_api_ca: NotRequired[pulumi.Input[str]]
|
15904
|
-
"""
|
15905
|
-
The Certificate Authority Service caPool to use for the etcd API CA in this cluster.
|
15906
|
-
"""
|
15907
|
-
etcd_peer_ca: NotRequired[pulumi.Input[str]]
|
15908
|
-
"""
|
15909
|
-
The Certificate Authority Service caPool to use for the etcd peer CA in this cluster.
|
15910
|
-
"""
|
15911
|
-
gkeops_etcd_backup_encryption_key: NotRequired[pulumi.Input[str]]
|
15912
|
-
"""
|
15913
|
-
Resource path of the Cloud KMS cryptoKey to use for encryption of internal etcd backups.
|
15914
|
-
"""
|
15915
|
-
service_account_signing_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
15916
|
-
"""
|
15917
|
-
The Cloud KMS cryptoKeyVersions to use for signing service account JWTs issued by this cluster.
|
15918
|
-
"""
|
15919
|
-
service_account_verification_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
15920
|
-
"""
|
15921
|
-
The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs issued by this cluster.
|
15922
|
-
"""
|
15923
|
-
elif False:
|
15924
|
-
ClusterUserManagedKeysConfigArgsDict: TypeAlias = Mapping[str, Any]
|
15925
|
-
|
15926
|
-
@pulumi.input_type
|
15927
|
-
class ClusterUserManagedKeysConfigArgs:
|
15928
|
-
def __init__(__self__, *,
|
15929
|
-
aggregation_ca: Optional[pulumi.Input[str]] = None,
|
15930
|
-
cluster_ca: Optional[pulumi.Input[str]] = None,
|
15931
|
-
control_plane_disk_encryption_key: Optional[pulumi.Input[str]] = None,
|
15932
|
-
etcd_api_ca: Optional[pulumi.Input[str]] = None,
|
15933
|
-
etcd_peer_ca: Optional[pulumi.Input[str]] = None,
|
15934
|
-
gkeops_etcd_backup_encryption_key: Optional[pulumi.Input[str]] = None,
|
15935
|
-
service_account_signing_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
15936
|
-
service_account_verification_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
15937
|
-
"""
|
15938
|
-
:param pulumi.Input[str] aggregation_ca: The Certificate Authority Service caPool to use for the aggreation CA in this cluster.
|
15939
|
-
:param pulumi.Input[str] cluster_ca: The Certificate Authority Service caPool to use for the cluster CA in this cluster.
|
15940
|
-
:param pulumi.Input[str] control_plane_disk_encryption_key: The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control plane nodes.
|
15941
|
-
:param pulumi.Input[str] etcd_api_ca: The Certificate Authority Service caPool to use for the etcd API CA in this cluster.
|
15942
|
-
:param pulumi.Input[str] etcd_peer_ca: The Certificate Authority Service caPool to use for the etcd peer CA in this cluster.
|
15943
|
-
:param pulumi.Input[str] gkeops_etcd_backup_encryption_key: Resource path of the Cloud KMS cryptoKey to use for encryption of internal etcd backups.
|
15944
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_signing_keys: The Cloud KMS cryptoKeyVersions to use for signing service account JWTs issued by this cluster.
|
15945
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_verification_keys: The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs issued by this cluster.
|
15946
|
-
"""
|
15947
|
-
if aggregation_ca is not None:
|
15948
|
-
pulumi.set(__self__, "aggregation_ca", aggregation_ca)
|
15949
|
-
if cluster_ca is not None:
|
15950
|
-
pulumi.set(__self__, "cluster_ca", cluster_ca)
|
15951
|
-
if control_plane_disk_encryption_key is not None:
|
15952
|
-
pulumi.set(__self__, "control_plane_disk_encryption_key", control_plane_disk_encryption_key)
|
15953
|
-
if etcd_api_ca is not None:
|
15954
|
-
pulumi.set(__self__, "etcd_api_ca", etcd_api_ca)
|
15955
|
-
if etcd_peer_ca is not None:
|
15956
|
-
pulumi.set(__self__, "etcd_peer_ca", etcd_peer_ca)
|
15957
|
-
if gkeops_etcd_backup_encryption_key is not None:
|
15958
|
-
pulumi.set(__self__, "gkeops_etcd_backup_encryption_key", gkeops_etcd_backup_encryption_key)
|
15959
|
-
if service_account_signing_keys is not None:
|
15960
|
-
pulumi.set(__self__, "service_account_signing_keys", service_account_signing_keys)
|
15961
|
-
if service_account_verification_keys is not None:
|
15962
|
-
pulumi.set(__self__, "service_account_verification_keys", service_account_verification_keys)
|
15963
|
-
|
15964
|
-
@property
|
15965
|
-
@pulumi.getter(name="aggregationCa")
|
15966
|
-
def aggregation_ca(self) -> Optional[pulumi.Input[str]]:
|
15967
|
-
"""
|
15968
|
-
The Certificate Authority Service caPool to use for the aggreation CA in this cluster.
|
15969
|
-
"""
|
15970
|
-
return pulumi.get(self, "aggregation_ca")
|
15971
|
-
|
15972
|
-
@aggregation_ca.setter
|
15973
|
-
def aggregation_ca(self, value: Optional[pulumi.Input[str]]):
|
15974
|
-
pulumi.set(self, "aggregation_ca", value)
|
15975
|
-
|
15976
|
-
@property
|
15977
|
-
@pulumi.getter(name="clusterCa")
|
15978
|
-
def cluster_ca(self) -> Optional[pulumi.Input[str]]:
|
15979
|
-
"""
|
15980
|
-
The Certificate Authority Service caPool to use for the cluster CA in this cluster.
|
15981
|
-
"""
|
15982
|
-
return pulumi.get(self, "cluster_ca")
|
15983
|
-
|
15984
|
-
@cluster_ca.setter
|
15985
|
-
def cluster_ca(self, value: Optional[pulumi.Input[str]]):
|
15986
|
-
pulumi.set(self, "cluster_ca", value)
|
15987
|
-
|
15988
|
-
@property
|
15989
|
-
@pulumi.getter(name="controlPlaneDiskEncryptionKey")
|
15990
|
-
def control_plane_disk_encryption_key(self) -> Optional[pulumi.Input[str]]:
|
15991
|
-
"""
|
15992
|
-
The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control plane nodes.
|
15993
|
-
"""
|
15994
|
-
return pulumi.get(self, "control_plane_disk_encryption_key")
|
15995
|
-
|
15996
|
-
@control_plane_disk_encryption_key.setter
|
15997
|
-
def control_plane_disk_encryption_key(self, value: Optional[pulumi.Input[str]]):
|
15998
|
-
pulumi.set(self, "control_plane_disk_encryption_key", value)
|
15999
|
-
|
16000
|
-
@property
|
16001
|
-
@pulumi.getter(name="etcdApiCa")
|
16002
|
-
def etcd_api_ca(self) -> Optional[pulumi.Input[str]]:
|
16003
|
-
"""
|
16004
|
-
The Certificate Authority Service caPool to use for the etcd API CA in this cluster.
|
16005
|
-
"""
|
16006
|
-
return pulumi.get(self, "etcd_api_ca")
|
16007
|
-
|
16008
|
-
@etcd_api_ca.setter
|
16009
|
-
def etcd_api_ca(self, value: Optional[pulumi.Input[str]]):
|
16010
|
-
pulumi.set(self, "etcd_api_ca", value)
|
16011
|
-
|
16012
|
-
@property
|
16013
|
-
@pulumi.getter(name="etcdPeerCa")
|
16014
|
-
def etcd_peer_ca(self) -> Optional[pulumi.Input[str]]:
|
16015
|
-
"""
|
16016
|
-
The Certificate Authority Service caPool to use for the etcd peer CA in this cluster.
|
16017
|
-
"""
|
16018
|
-
return pulumi.get(self, "etcd_peer_ca")
|
16019
|
-
|
16020
|
-
@etcd_peer_ca.setter
|
16021
|
-
def etcd_peer_ca(self, value: Optional[pulumi.Input[str]]):
|
16022
|
-
pulumi.set(self, "etcd_peer_ca", value)
|
16023
|
-
|
16024
|
-
@property
|
16025
|
-
@pulumi.getter(name="gkeopsEtcdBackupEncryptionKey")
|
16026
|
-
def gkeops_etcd_backup_encryption_key(self) -> Optional[pulumi.Input[str]]:
|
16027
|
-
"""
|
16028
|
-
Resource path of the Cloud KMS cryptoKey to use for encryption of internal etcd backups.
|
16029
|
-
"""
|
16030
|
-
return pulumi.get(self, "gkeops_etcd_backup_encryption_key")
|
16031
|
-
|
16032
|
-
@gkeops_etcd_backup_encryption_key.setter
|
16033
|
-
def gkeops_etcd_backup_encryption_key(self, value: Optional[pulumi.Input[str]]):
|
16034
|
-
pulumi.set(self, "gkeops_etcd_backup_encryption_key", value)
|
16035
|
-
|
16036
|
-
@property
|
16037
|
-
@pulumi.getter(name="serviceAccountSigningKeys")
|
16038
|
-
def service_account_signing_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
16039
|
-
"""
|
16040
|
-
The Cloud KMS cryptoKeyVersions to use for signing service account JWTs issued by this cluster.
|
16041
|
-
"""
|
16042
|
-
return pulumi.get(self, "service_account_signing_keys")
|
16043
|
-
|
16044
|
-
@service_account_signing_keys.setter
|
16045
|
-
def service_account_signing_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
16046
|
-
pulumi.set(self, "service_account_signing_keys", value)
|
16047
|
-
|
16048
|
-
@property
|
16049
|
-
@pulumi.getter(name="serviceAccountVerificationKeys")
|
16050
|
-
def service_account_verification_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
16051
|
-
"""
|
16052
|
-
The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs issued by this cluster.
|
16053
|
-
"""
|
16054
|
-
return pulumi.get(self, "service_account_verification_keys")
|
16055
|
-
|
16056
|
-
@service_account_verification_keys.setter
|
16057
|
-
def service_account_verification_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
16058
|
-
pulumi.set(self, "service_account_verification_keys", value)
|
16059
|
-
|
16060
|
-
|
16061
15726
|
if not MYPY:
|
16062
15727
|
class ClusterVerticalPodAutoscalingArgsDict(TypedDict):
|
16063
15728
|
enabled: pulumi.Input[bool]
|