pulumi-gcp 8.8.2a1731515595__py3-none-any.whl → 8.9.0a1731097924__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (114) hide show
  1. pulumi_gcp/__init__.py +0 -64
  2. pulumi_gcp/activedirectory/domain.py +0 -24
  3. pulumi_gcp/apigee/__init__.py +0 -1
  4. pulumi_gcp/apigee/_inputs.py +0 -74
  5. pulumi_gcp/apigee/outputs.py +0 -65
  6. pulumi_gcp/applicationintegration/auth_config.py +0 -24
  7. pulumi_gcp/backupdisasterrecovery/__init__.py +0 -4
  8. pulumi_gcp/backupdisasterrecovery/_inputs.py +0 -533
  9. pulumi_gcp/backupdisasterrecovery/backup_vault.py +6 -146
  10. pulumi_gcp/backupdisasterrecovery/outputs.py +0 -702
  11. pulumi_gcp/bigquery/data_transfer_config.py +0 -24
  12. pulumi_gcp/cloudrunv2/_inputs.py +0 -46
  13. pulumi_gcp/cloudrunv2/job.py +2 -0
  14. pulumi_gcp/cloudrunv2/outputs.py +2 -60
  15. pulumi_gcp/cloudrunv2/service.py +2 -0
  16. pulumi_gcp/compute/__init__.py +0 -1
  17. pulumi_gcp/compute/_inputs.py +255 -2162
  18. pulumi_gcp/compute/disk.py +7 -7
  19. pulumi_gcp/compute/firewall_policy_rule.py +54 -108
  20. pulumi_gcp/compute/get_region_instance_group_manager.py +1 -12
  21. pulumi_gcp/compute/health_check.py +42 -42
  22. pulumi_gcp/compute/network_firewall_policy_rule.py +4 -4
  23. pulumi_gcp/compute/network_firewall_policy_with_rules.py +10 -10
  24. pulumi_gcp/compute/node_template.py +0 -95
  25. pulumi_gcp/compute/outputs.py +213 -1639
  26. pulumi_gcp/compute/region_disk.py +7 -7
  27. pulumi_gcp/compute/region_health_check.py +42 -42
  28. pulumi_gcp/compute/region_instance_group_manager.py +14 -54
  29. pulumi_gcp/compute/region_network_firewall_policy_rule.py +4 -4
  30. pulumi_gcp/compute/region_network_firewall_policy_with_rules.py +10 -10
  31. pulumi_gcp/compute/region_security_policy.py +0 -120
  32. pulumi_gcp/compute/region_security_policy_rule.py +6 -6
  33. pulumi_gcp/compute/router_peer.py +35 -56
  34. pulumi_gcp/compute/security_scan_config.py +8 -8
  35. pulumi_gcp/config/__init__.pyi +0 -4
  36. pulumi_gcp/config/vars.py +0 -8
  37. pulumi_gcp/container/_inputs.py +10 -345
  38. pulumi_gcp/container/cluster.py +0 -101
  39. pulumi_gcp/container/get_cluster.py +1 -23
  40. pulumi_gcp/container/outputs.py +8 -456
  41. pulumi_gcp/dataloss/prevention_discovery_config.py +7 -7
  42. pulumi_gcp/dataproc/__init__.py +0 -2
  43. pulumi_gcp/dataproc/_inputs.py +0 -101
  44. pulumi_gcp/dataproc/outputs.py +0 -94
  45. pulumi_gcp/edgecontainer/vpn_connection.py +4 -4
  46. pulumi_gcp/firebase/android_app.py +2 -2
  47. pulumi_gcp/firebase/apple_app.py +2 -2
  48. pulumi_gcp/firebase/web_app.py +2 -2
  49. pulumi_gcp/firestore/index.py +0 -44
  50. pulumi_gcp/gkeonprem/_inputs.py +15 -15
  51. pulumi_gcp/gkeonprem/outputs.py +10 -10
  52. pulumi_gcp/healthcare/dataset.py +7 -7
  53. pulumi_gcp/healthcare/dicom_store.py +7 -7
  54. pulumi_gcp/healthcare/fhir_store.py +7 -7
  55. pulumi_gcp/healthcare/hl7_store.py +14 -14
  56. pulumi_gcp/iam/__init__.py +0 -1
  57. pulumi_gcp/iam/_inputs.py +0 -161
  58. pulumi_gcp/iam/outputs.py +0 -114
  59. pulumi_gcp/logging/metric.py +2 -2
  60. pulumi_gcp/looker/_inputs.py +0 -6
  61. pulumi_gcp/looker/instance.py +321 -169
  62. pulumi_gcp/looker/outputs.py +0 -4
  63. pulumi_gcp/memorystore/instance.py +0 -4
  64. pulumi_gcp/monitoring/alert_policy.py +0 -24
  65. pulumi_gcp/monitoring/custom_service.py +0 -24
  66. pulumi_gcp/monitoring/group.py +0 -24
  67. pulumi_gcp/monitoring/metric_descriptor.py +0 -24
  68. pulumi_gcp/monitoring/slo.py +0 -24
  69. pulumi_gcp/monitoring/uptime_check_config.py +0 -24
  70. pulumi_gcp/networkmanagement/__init__.py +0 -1
  71. pulumi_gcp/osconfig/patch_deployment.py +8 -8
  72. pulumi_gcp/provider.py +0 -40
  73. pulumi_gcp/pulumi-plugin.json +1 -1
  74. pulumi_gcp/redis/_inputs.py +3 -3
  75. pulumi_gcp/redis/outputs.py +2 -2
  76. pulumi_gcp/securitycenter/notification_config.py +16 -4
  77. pulumi_gcp/securitycenter/project_notification_config.py +24 -0
  78. pulumi_gcp/securitycenter/v2_organization_notification_config.py +16 -4
  79. pulumi_gcp/spanner/__init__.py +0 -1
  80. pulumi_gcp/spanner/_inputs.py +9 -9
  81. pulumi_gcp/spanner/get_instance.py +1 -12
  82. pulumi_gcp/spanner/instance.py +0 -70
  83. pulumi_gcp/spanner/outputs.py +12 -46
  84. pulumi_gcp/sql/_inputs.py +0 -26
  85. pulumi_gcp/sql/database_instance.py +11 -124
  86. pulumi_gcp/sql/get_database_instance.py +1 -12
  87. pulumi_gcp/sql/outputs.py +0 -51
  88. pulumi_gcp/storage/_inputs.py +3 -3
  89. pulumi_gcp/storage/outputs.py +2 -2
  90. pulumi_gcp/tags/tag_binding.py +4 -4
  91. pulumi_gcp/tags/tag_value.py +2 -2
  92. pulumi_gcp/transcoder/job.py +0 -24
  93. pulumi_gcp/vertex/_inputs.py +0 -184
  94. pulumi_gcp/vertex/ai_endpoint.py +8 -394
  95. pulumi_gcp/vertex/ai_feature_online_store_featureview.py +4 -4
  96. pulumi_gcp/vertex/outputs.py +0 -166
  97. pulumi_gcp/workbench/instance.py +7 -21
  98. pulumi_gcp/workflows/workflow.py +0 -36
  99. pulumi_gcp/workstations/workstation_config.py +8 -8
  100. {pulumi_gcp-8.8.2a1731515595.dist-info → pulumi_gcp-8.9.0a1731097924.dist-info}/METADATA +1 -1
  101. {pulumi_gcp-8.8.2a1731515595.dist-info → pulumi_gcp-8.9.0a1731097924.dist-info}/RECORD +103 -114
  102. {pulumi_gcp-8.8.2a1731515595.dist-info → pulumi_gcp-8.9.0a1731097924.dist-info}/WHEEL +1 -1
  103. pulumi_gcp/apigee/api.py +0 -456
  104. pulumi_gcp/backupdisasterrecovery/backup_plan.py +0 -653
  105. pulumi_gcp/backupdisasterrecovery/backup_plan_association.py +0 -766
  106. pulumi_gcp/backupdisasterrecovery/get_backup_plan.py +0 -204
  107. pulumi_gcp/backupdisasterrecovery/get_backup_plan_association.py +0 -243
  108. pulumi_gcp/compute/region_resize_request.py +0 -772
  109. pulumi_gcp/dataproc/gdc_application_environment.py +0 -931
  110. pulumi_gcp/dataproc/gdc_service_instance.py +0 -1022
  111. pulumi_gcp/iam/principal_access_boundary_policy.py +0 -679
  112. pulumi_gcp/networkmanagement/vpc_flow_logs_config.py +0 -1358
  113. pulumi_gcp/spanner/get_database.py +0 -229
  114. {pulumi_gcp-8.8.2a1731515595.dist-info → pulumi_gcp-8.9.0a1731097924.dist-info}/top_level.txt +0 -0
@@ -98,7 +98,6 @@ __all__ = [
98
98
  'ClusterAddonsConfigIstioConfig',
99
99
  'ClusterAddonsConfigKalmConfig',
100
100
  'ClusterAddonsConfigNetworkPolicyConfig',
101
- 'ClusterAddonsConfigParallelstoreCsiDriverConfig',
102
101
  'ClusterAddonsConfigRayOperatorConfig',
103
102
  'ClusterAddonsConfigRayOperatorConfigRayClusterLoggingConfig',
104
103
  'ClusterAddonsConfigRayOperatorConfigRayClusterMonitoringConfig',
@@ -116,8 +115,6 @@ __all__ = [
116
115
  'ClusterClusterAutoscalingResourceLimit',
117
116
  'ClusterClusterTelemetry',
118
117
  'ClusterConfidentialNodes',
119
- 'ClusterControlPlaneEndpointsConfig',
120
- 'ClusterControlPlaneEndpointsConfigDnsEndpointConfig',
121
118
  'ClusterCostManagementConfig',
122
119
  'ClusterDatabaseEncryption',
123
120
  'ClusterDefaultSnatStatus',
@@ -240,7 +237,6 @@ __all__ = [
240
237
  'ClusterSecurityPostureConfig',
241
238
  'ClusterServiceExternalIpsConfig',
242
239
  'ClusterTpuConfig',
243
- 'ClusterUserManagedKeysConfig',
244
240
  'ClusterVerticalPodAutoscaling',
245
241
  'ClusterWorkloadAltsConfig',
246
242
  'ClusterWorkloadIdentityConfig',
@@ -298,7 +294,6 @@ __all__ = [
298
294
  'GetClusterAddonsConfigIstioConfigResult',
299
295
  'GetClusterAddonsConfigKalmConfigResult',
300
296
  'GetClusterAddonsConfigNetworkPolicyConfigResult',
301
- 'GetClusterAddonsConfigParallelstoreCsiDriverConfigResult',
302
297
  'GetClusterAddonsConfigRayOperatorConfigResult',
303
298
  'GetClusterAddonsConfigRayOperatorConfigRayClusterLoggingConfigResult',
304
299
  'GetClusterAddonsConfigRayOperatorConfigRayClusterMonitoringConfigResult',
@@ -316,8 +311,6 @@ __all__ = [
316
311
  'GetClusterClusterAutoscalingResourceLimitResult',
317
312
  'GetClusterClusterTelemetryResult',
318
313
  'GetClusterConfidentialNodeResult',
319
- 'GetClusterControlPlaneEndpointsConfigResult',
320
- 'GetClusterControlPlaneEndpointsConfigDnsEndpointConfigResult',
321
314
  'GetClusterCostManagementConfigResult',
322
315
  'GetClusterDatabaseEncryptionResult',
323
316
  'GetClusterDefaultSnatStatusResult',
@@ -440,7 +433,6 @@ __all__ = [
440
433
  'GetClusterSecurityPostureConfigResult',
441
434
  'GetClusterServiceExternalIpsConfigResult',
442
435
  'GetClusterTpuConfigResult',
443
- 'GetClusterUserManagedKeysConfigResult',
444
436
  'GetClusterVerticalPodAutoscalingResult',
445
437
  'GetClusterWorkloadAltsConfigResult',
446
438
  'GetClusterWorkloadIdentityConfigResult',
@@ -3900,8 +3892,6 @@ class ClusterAddonsConfig(dict):
3900
3892
  suggest = "kalm_config"
3901
3893
  elif key == "networkPolicyConfig":
3902
3894
  suggest = "network_policy_config"
3903
- elif key == "parallelstoreCsiDriverConfig":
3904
- suggest = "parallelstore_csi_driver_config"
3905
3895
  elif key == "rayOperatorConfigs":
3906
3896
  suggest = "ray_operator_configs"
3907
3897
  elif key == "statefulHaConfig":
@@ -3931,7 +3921,6 @@ class ClusterAddonsConfig(dict):
3931
3921
  istio_config: Optional['outputs.ClusterAddonsConfigIstioConfig'] = None,
3932
3922
  kalm_config: Optional['outputs.ClusterAddonsConfigKalmConfig'] = None,
3933
3923
  network_policy_config: Optional['outputs.ClusterAddonsConfigNetworkPolicyConfig'] = None,
3934
- parallelstore_csi_driver_config: Optional['outputs.ClusterAddonsConfigParallelstoreCsiDriverConfig'] = None,
3935
3924
  ray_operator_configs: Optional[Sequence['outputs.ClusterAddonsConfigRayOperatorConfig']] = None,
3936
3925
  stateful_ha_config: Optional['outputs.ClusterAddonsConfigStatefulHaConfig'] = None):
3937
3926
  """
@@ -3976,13 +3965,6 @@ class ClusterAddonsConfig(dict):
3976
3965
  otherwise nothing will happen.
3977
3966
  It can only be disabled if the nodes already do not have network policies enabled.
3978
3967
  Defaults to disabled; set `disabled = false` to enable.
3979
- :param 'ClusterAddonsConfigParallelstoreCsiDriverConfigArgs' parallelstore_csi_driver_config: The status of the Parallelstore CSI driver addon,
3980
- which allows the usage of a Parallelstore instances as volumes.
3981
- It is disabled by default for Standard clusters; set `enabled = true` to enable.
3982
- It is enabled by default for Autopilot clusters with version 1.29 or later; set `enabled = true` to enable it explicitly.
3983
- See [Enable the Parallelstore CSI driver](https://cloud.google.com/kubernetes-engine/docs/how-to/persistent-volumes/parallelstore-csi-new-volume#enable) for more information.
3984
-
3985
- This example `addons_config` disables two addons:
3986
3968
  :param Sequence['ClusterAddonsConfigRayOperatorConfigArgs'] ray_operator_configs: . The status of the [Ray Operator
3987
3969
  addon](https://cloud.google.com/kubernetes-engine/docs/add-on/ray-on-gke/concepts/overview).
3988
3970
  It is disabled by default. Set `enabled = true` to enable. The minimum
@@ -3995,6 +3977,9 @@ class ClusterAddonsConfig(dict):
3995
3977
  clusters on
3996
3978
  GKE](https://cloud.google.com/kubernetes-engine/docs/add-on/ray-on-gke/how-to/collect-view-logs-metrics)
3997
3979
  for more information.
3980
+
3981
+
3982
+ This example `addons_config` disables two addons:
3998
3983
  :param 'ClusterAddonsConfigStatefulHaConfigArgs' stateful_ha_config: .
3999
3984
  The status of the Stateful HA addon, which provides automatic configurable failover for stateful applications.
4000
3985
  It is disabled by default for Standard clusters. Set `enabled = true` to enable.
@@ -4023,8 +4008,6 @@ class ClusterAddonsConfig(dict):
4023
4008
  pulumi.set(__self__, "kalm_config", kalm_config)
4024
4009
  if network_policy_config is not None:
4025
4010
  pulumi.set(__self__, "network_policy_config", network_policy_config)
4026
- if parallelstore_csi_driver_config is not None:
4027
- pulumi.set(__self__, "parallelstore_csi_driver_config", parallelstore_csi_driver_config)
4028
4011
  if ray_operator_configs is not None:
4029
4012
  pulumi.set(__self__, "ray_operator_configs", ray_operator_configs)
4030
4013
  if stateful_ha_config is not None:
@@ -4155,20 +4138,6 @@ class ClusterAddonsConfig(dict):
4155
4138
  """
4156
4139
  return pulumi.get(self, "network_policy_config")
4157
4140
 
4158
- @property
4159
- @pulumi.getter(name="parallelstoreCsiDriverConfig")
4160
- def parallelstore_csi_driver_config(self) -> Optional['outputs.ClusterAddonsConfigParallelstoreCsiDriverConfig']:
4161
- """
4162
- The status of the Parallelstore CSI driver addon,
4163
- which allows the usage of a Parallelstore instances as volumes.
4164
- It is disabled by default for Standard clusters; set `enabled = true` to enable.
4165
- It is enabled by default for Autopilot clusters with version 1.29 or later; set `enabled = true` to enable it explicitly.
4166
- See [Enable the Parallelstore CSI driver](https://cloud.google.com/kubernetes-engine/docs/how-to/persistent-volumes/parallelstore-csi-new-volume#enable) for more information.
4167
-
4168
- This example `addons_config` disables two addons:
4169
- """
4170
- return pulumi.get(self, "parallelstore_csi_driver_config")
4171
-
4172
4141
  @property
4173
4142
  @pulumi.getter(name="rayOperatorConfigs")
4174
4143
  def ray_operator_configs(self) -> Optional[Sequence['outputs.ClusterAddonsConfigRayOperatorConfig']]:
@@ -4185,6 +4154,9 @@ class ClusterAddonsConfig(dict):
4185
4154
  clusters on
4186
4155
  GKE](https://cloud.google.com/kubernetes-engine/docs/add-on/ray-on-gke/how-to/collect-view-logs-metrics)
4187
4156
  for more information.
4157
+
4158
+
4159
+ This example `addons_config` disables two addons:
4188
4160
  """
4189
4161
  return pulumi.get(self, "ray_operator_configs")
4190
4162
 
@@ -4430,18 +4402,6 @@ class ClusterAddonsConfigNetworkPolicyConfig(dict):
4430
4402
  return pulumi.get(self, "disabled")
4431
4403
 
4432
4404
 
4433
- @pulumi.output_type
4434
- class ClusterAddonsConfigParallelstoreCsiDriverConfig(dict):
4435
- def __init__(__self__, *,
4436
- enabled: bool):
4437
- pulumi.set(__self__, "enabled", enabled)
4438
-
4439
- @property
4440
- @pulumi.getter
4441
- def enabled(self) -> bool:
4442
- return pulumi.get(self, "enabled")
4443
-
4444
-
4445
4405
  @pulumi.output_type
4446
4406
  class ClusterAddonsConfigRayOperatorConfig(dict):
4447
4407
  @staticmethod
@@ -5366,90 +5326,6 @@ class ClusterConfidentialNodes(dict):
5366
5326
  return pulumi.get(self, "enabled")
5367
5327
 
5368
5328
 
5369
- @pulumi.output_type
5370
- class ClusterControlPlaneEndpointsConfig(dict):
5371
- @staticmethod
5372
- def __key_warning(key: str):
5373
- suggest = None
5374
- if key == "dnsEndpointConfig":
5375
- suggest = "dns_endpoint_config"
5376
-
5377
- if suggest:
5378
- pulumi.log.warn(f"Key '{key}' not found in ClusterControlPlaneEndpointsConfig. Access the value via the '{suggest}' property getter instead.")
5379
-
5380
- def __getitem__(self, key: str) -> Any:
5381
- ClusterControlPlaneEndpointsConfig.__key_warning(key)
5382
- return super().__getitem__(key)
5383
-
5384
- def get(self, key: str, default = None) -> Any:
5385
- ClusterControlPlaneEndpointsConfig.__key_warning(key)
5386
- return super().get(key, default)
5387
-
5388
- def __init__(__self__, *,
5389
- dns_endpoint_config: Optional['outputs.ClusterControlPlaneEndpointsConfigDnsEndpointConfig'] = None):
5390
- """
5391
- :param 'ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgs' dns_endpoint_config: DNS endpoint configuration.
5392
- """
5393
- if dns_endpoint_config is not None:
5394
- pulumi.set(__self__, "dns_endpoint_config", dns_endpoint_config)
5395
-
5396
- @property
5397
- @pulumi.getter(name="dnsEndpointConfig")
5398
- def dns_endpoint_config(self) -> Optional['outputs.ClusterControlPlaneEndpointsConfigDnsEndpointConfig']:
5399
- """
5400
- DNS endpoint configuration.
5401
- """
5402
- return pulumi.get(self, "dns_endpoint_config")
5403
-
5404
-
5405
- @pulumi.output_type
5406
- class ClusterControlPlaneEndpointsConfigDnsEndpointConfig(dict):
5407
- @staticmethod
5408
- def __key_warning(key: str):
5409
- suggest = None
5410
- if key == "allowExternalTraffic":
5411
- suggest = "allow_external_traffic"
5412
-
5413
- if suggest:
5414
- pulumi.log.warn(f"Key '{key}' not found in ClusterControlPlaneEndpointsConfigDnsEndpointConfig. Access the value via the '{suggest}' property getter instead.")
5415
-
5416
- def __getitem__(self, key: str) -> Any:
5417
- ClusterControlPlaneEndpointsConfigDnsEndpointConfig.__key_warning(key)
5418
- return super().__getitem__(key)
5419
-
5420
- def get(self, key: str, default = None) -> Any:
5421
- ClusterControlPlaneEndpointsConfigDnsEndpointConfig.__key_warning(key)
5422
- return super().get(key, default)
5423
-
5424
- def __init__(__self__, *,
5425
- allow_external_traffic: Optional[bool] = None,
5426
- endpoint: Optional[str] = None):
5427
- """
5428
- :param bool allow_external_traffic: Controls whether user traffic is allowed over this endpoint. Note that GCP-managed services may still use the endpoint even if this is false.
5429
- :param str endpoint: The cluster's DNS endpoint.
5430
- """
5431
- if allow_external_traffic is not None:
5432
- pulumi.set(__self__, "allow_external_traffic", allow_external_traffic)
5433
- if endpoint is not None:
5434
- pulumi.set(__self__, "endpoint", endpoint)
5435
-
5436
- @property
5437
- @pulumi.getter(name="allowExternalTraffic")
5438
- def allow_external_traffic(self) -> Optional[bool]:
5439
- """
5440
- Controls whether user traffic is allowed over this endpoint. Note that GCP-managed services may still use the endpoint even if this is false.
5441
- """
5442
- return pulumi.get(self, "allow_external_traffic")
5443
-
5444
- @property
5445
- @pulumi.getter
5446
- def endpoint(self) -> Optional[str]:
5447
- """
5448
- The cluster's DNS endpoint.
5449
- """
5450
- return pulumi.get(self, "endpoint")
5451
-
5452
-
5453
5329
  @pulumi.output_type
5454
5330
  class ClusterCostManagementConfig(dict):
5455
5331
  def __init__(__self__, *,
@@ -6517,8 +6393,6 @@ class ClusterMasterAuthorizedNetworksConfig(dict):
6517
6393
  suggest = "cidr_blocks"
6518
6394
  elif key == "gcpPublicCidrsAccessEnabled":
6519
6395
  suggest = "gcp_public_cidrs_access_enabled"
6520
- elif key == "privateEndpointEnforcementEnabled":
6521
- suggest = "private_endpoint_enforcement_enabled"
6522
6396
 
6523
6397
  if suggest:
6524
6398
  pulumi.log.warn(f"Key '{key}' not found in ClusterMasterAuthorizedNetworksConfig. Access the value via the '{suggest}' property getter instead.")
@@ -6533,21 +6407,17 @@ class ClusterMasterAuthorizedNetworksConfig(dict):
6533
6407
 
6534
6408
  def __init__(__self__, *,
6535
6409
  cidr_blocks: Optional[Sequence['outputs.ClusterMasterAuthorizedNetworksConfigCidrBlock']] = None,
6536
- gcp_public_cidrs_access_enabled: Optional[bool] = None,
6537
- private_endpoint_enforcement_enabled: Optional[bool] = None):
6410
+ gcp_public_cidrs_access_enabled: Optional[bool] = None):
6538
6411
  """
6539
6412
  :param Sequence['ClusterMasterAuthorizedNetworksConfigCidrBlockArgs'] cidr_blocks: External networks that can access the
6540
6413
  Kubernetes cluster master through HTTPS.
6541
6414
  :param bool gcp_public_cidrs_access_enabled: Whether Kubernetes master is
6542
6415
  accessible via Google Compute Engine Public IPs.
6543
- :param bool private_endpoint_enforcement_enabled: Whether authorized networks is enforced on the private endpoint or not. Defaults to false.
6544
6416
  """
6545
6417
  if cidr_blocks is not None:
6546
6418
  pulumi.set(__self__, "cidr_blocks", cidr_blocks)
6547
6419
  if gcp_public_cidrs_access_enabled is not None:
6548
6420
  pulumi.set(__self__, "gcp_public_cidrs_access_enabled", gcp_public_cidrs_access_enabled)
6549
- if private_endpoint_enforcement_enabled is not None:
6550
- pulumi.set(__self__, "private_endpoint_enforcement_enabled", private_endpoint_enforcement_enabled)
6551
6421
 
6552
6422
  @property
6553
6423
  @pulumi.getter(name="cidrBlocks")
@@ -6567,14 +6437,6 @@ class ClusterMasterAuthorizedNetworksConfig(dict):
6567
6437
  """
6568
6438
  return pulumi.get(self, "gcp_public_cidrs_access_enabled")
6569
6439
 
6570
- @property
6571
- @pulumi.getter(name="privateEndpointEnforcementEnabled")
6572
- def private_endpoint_enforcement_enabled(self) -> Optional[bool]:
6573
- """
6574
- Whether authorized networks is enforced on the private endpoint or not. Defaults to false.
6575
- """
6576
- return pulumi.get(self, "private_endpoint_enforcement_enabled")
6577
-
6578
6440
 
6579
6441
  @pulumi.output_type
6580
6442
  class ClusterMasterAuthorizedNetworksConfigCidrBlock(dict):
@@ -12798,140 +12660,6 @@ class ClusterTpuConfig(dict):
12798
12660
  return pulumi.get(self, "use_service_networking")
12799
12661
 
12800
12662
 
12801
- @pulumi.output_type
12802
- class ClusterUserManagedKeysConfig(dict):
12803
- @staticmethod
12804
- def __key_warning(key: str):
12805
- suggest = None
12806
- if key == "aggregationCa":
12807
- suggest = "aggregation_ca"
12808
- elif key == "clusterCa":
12809
- suggest = "cluster_ca"
12810
- elif key == "controlPlaneDiskEncryptionKey":
12811
- suggest = "control_plane_disk_encryption_key"
12812
- elif key == "etcdApiCa":
12813
- suggest = "etcd_api_ca"
12814
- elif key == "etcdPeerCa":
12815
- suggest = "etcd_peer_ca"
12816
- elif key == "gkeopsEtcdBackupEncryptionKey":
12817
- suggest = "gkeops_etcd_backup_encryption_key"
12818
- elif key == "serviceAccountSigningKeys":
12819
- suggest = "service_account_signing_keys"
12820
- elif key == "serviceAccountVerificationKeys":
12821
- suggest = "service_account_verification_keys"
12822
-
12823
- if suggest:
12824
- pulumi.log.warn(f"Key '{key}' not found in ClusterUserManagedKeysConfig. Access the value via the '{suggest}' property getter instead.")
12825
-
12826
- def __getitem__(self, key: str) -> Any:
12827
- ClusterUserManagedKeysConfig.__key_warning(key)
12828
- return super().__getitem__(key)
12829
-
12830
- def get(self, key: str, default = None) -> Any:
12831
- ClusterUserManagedKeysConfig.__key_warning(key)
12832
- return super().get(key, default)
12833
-
12834
- def __init__(__self__, *,
12835
- aggregation_ca: Optional[str] = None,
12836
- cluster_ca: Optional[str] = None,
12837
- control_plane_disk_encryption_key: Optional[str] = None,
12838
- etcd_api_ca: Optional[str] = None,
12839
- etcd_peer_ca: Optional[str] = None,
12840
- gkeops_etcd_backup_encryption_key: Optional[str] = None,
12841
- service_account_signing_keys: Optional[Sequence[str]] = None,
12842
- service_account_verification_keys: Optional[Sequence[str]] = None):
12843
- """
12844
- :param str aggregation_ca: The Certificate Authority Service caPool to use for the aggreation CA in this cluster.
12845
- :param str cluster_ca: The Certificate Authority Service caPool to use for the cluster CA in this cluster.
12846
- :param str control_plane_disk_encryption_key: The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control plane nodes.
12847
- :param str etcd_api_ca: The Certificate Authority Service caPool to use for the etcd API CA in this cluster.
12848
- :param str etcd_peer_ca: The Certificate Authority Service caPool to use for the etcd peer CA in this cluster.
12849
- :param str gkeops_etcd_backup_encryption_key: Resource path of the Cloud KMS cryptoKey to use for encryption of internal etcd backups.
12850
- :param Sequence[str] service_account_signing_keys: The Cloud KMS cryptoKeyVersions to use for signing service account JWTs issued by this cluster.
12851
- :param Sequence[str] service_account_verification_keys: The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs issued by this cluster.
12852
- """
12853
- if aggregation_ca is not None:
12854
- pulumi.set(__self__, "aggregation_ca", aggregation_ca)
12855
- if cluster_ca is not None:
12856
- pulumi.set(__self__, "cluster_ca", cluster_ca)
12857
- if control_plane_disk_encryption_key is not None:
12858
- pulumi.set(__self__, "control_plane_disk_encryption_key", control_plane_disk_encryption_key)
12859
- if etcd_api_ca is not None:
12860
- pulumi.set(__self__, "etcd_api_ca", etcd_api_ca)
12861
- if etcd_peer_ca is not None:
12862
- pulumi.set(__self__, "etcd_peer_ca", etcd_peer_ca)
12863
- if gkeops_etcd_backup_encryption_key is not None:
12864
- pulumi.set(__self__, "gkeops_etcd_backup_encryption_key", gkeops_etcd_backup_encryption_key)
12865
- if service_account_signing_keys is not None:
12866
- pulumi.set(__self__, "service_account_signing_keys", service_account_signing_keys)
12867
- if service_account_verification_keys is not None:
12868
- pulumi.set(__self__, "service_account_verification_keys", service_account_verification_keys)
12869
-
12870
- @property
12871
- @pulumi.getter(name="aggregationCa")
12872
- def aggregation_ca(self) -> Optional[str]:
12873
- """
12874
- The Certificate Authority Service caPool to use for the aggreation CA in this cluster.
12875
- """
12876
- return pulumi.get(self, "aggregation_ca")
12877
-
12878
- @property
12879
- @pulumi.getter(name="clusterCa")
12880
- def cluster_ca(self) -> Optional[str]:
12881
- """
12882
- The Certificate Authority Service caPool to use for the cluster CA in this cluster.
12883
- """
12884
- return pulumi.get(self, "cluster_ca")
12885
-
12886
- @property
12887
- @pulumi.getter(name="controlPlaneDiskEncryptionKey")
12888
- def control_plane_disk_encryption_key(self) -> Optional[str]:
12889
- """
12890
- The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control plane nodes.
12891
- """
12892
- return pulumi.get(self, "control_plane_disk_encryption_key")
12893
-
12894
- @property
12895
- @pulumi.getter(name="etcdApiCa")
12896
- def etcd_api_ca(self) -> Optional[str]:
12897
- """
12898
- The Certificate Authority Service caPool to use for the etcd API CA in this cluster.
12899
- """
12900
- return pulumi.get(self, "etcd_api_ca")
12901
-
12902
- @property
12903
- @pulumi.getter(name="etcdPeerCa")
12904
- def etcd_peer_ca(self) -> Optional[str]:
12905
- """
12906
- The Certificate Authority Service caPool to use for the etcd peer CA in this cluster.
12907
- """
12908
- return pulumi.get(self, "etcd_peer_ca")
12909
-
12910
- @property
12911
- @pulumi.getter(name="gkeopsEtcdBackupEncryptionKey")
12912
- def gkeops_etcd_backup_encryption_key(self) -> Optional[str]:
12913
- """
12914
- Resource path of the Cloud KMS cryptoKey to use for encryption of internal etcd backups.
12915
- """
12916
- return pulumi.get(self, "gkeops_etcd_backup_encryption_key")
12917
-
12918
- @property
12919
- @pulumi.getter(name="serviceAccountSigningKeys")
12920
- def service_account_signing_keys(self) -> Optional[Sequence[str]]:
12921
- """
12922
- The Cloud KMS cryptoKeyVersions to use for signing service account JWTs issued by this cluster.
12923
- """
12924
- return pulumi.get(self, "service_account_signing_keys")
12925
-
12926
- @property
12927
- @pulumi.getter(name="serviceAccountVerificationKeys")
12928
- def service_account_verification_keys(self) -> Optional[Sequence[str]]:
12929
- """
12930
- The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs issued by this cluster.
12931
- """
12932
- return pulumi.get(self, "service_account_verification_keys")
12933
-
12934
-
12935
12663
  @pulumi.output_type
12936
12664
  class ClusterVerticalPodAutoscaling(dict):
12937
12665
  def __init__(__self__, *,
@@ -15539,7 +15267,6 @@ class GetClusterAddonsConfigResult(dict):
15539
15267
  istio_configs: Sequence['outputs.GetClusterAddonsConfigIstioConfigResult'],
15540
15268
  kalm_configs: Sequence['outputs.GetClusterAddonsConfigKalmConfigResult'],
15541
15269
  network_policy_configs: Sequence['outputs.GetClusterAddonsConfigNetworkPolicyConfigResult'],
15542
- parallelstore_csi_driver_configs: Sequence['outputs.GetClusterAddonsConfigParallelstoreCsiDriverConfigResult'],
15543
15270
  ray_operator_configs: Sequence['outputs.GetClusterAddonsConfigRayOperatorConfigResult'],
15544
15271
  stateful_ha_configs: Sequence['outputs.GetClusterAddonsConfigStatefulHaConfigResult']):
15545
15272
  """
@@ -15555,7 +15282,6 @@ class GetClusterAddonsConfigResult(dict):
15555
15282
  :param Sequence['GetClusterAddonsConfigIstioConfigArgs'] istio_configs: The status of the Istio addon.
15556
15283
  :param Sequence['GetClusterAddonsConfigKalmConfigArgs'] kalm_configs: Configuration for the KALM addon, which manages the lifecycle of k8s. It is disabled by default; Set enabled = true to enable.
15557
15284
  :param Sequence['GetClusterAddonsConfigNetworkPolicyConfigArgs'] network_policy_configs: Whether we should enable the network policy addon for the master. This must be enabled in order to enable network policy for the nodes. To enable this, you must also define a network_policy block, otherwise nothing will happen. It can only be disabled if the nodes already do not have network policies enabled. Defaults to disabled; set disabled = false to enable.
15558
- :param Sequence['GetClusterAddonsConfigParallelstoreCsiDriverConfigArgs'] parallelstore_csi_driver_configs: The status of the Parallelstore CSI driver addon, which allows the usage of Parallelstore instances as volumes. Defaults to disabled; set enabled = true to enable.
15559
15285
  :param Sequence['GetClusterAddonsConfigRayOperatorConfigArgs'] ray_operator_configs: The status of the Ray Operator addon, which enabled management of Ray AI/ML jobs on GKE. Defaults to disabled; set enabled = true to enable.
15560
15286
  :param Sequence['GetClusterAddonsConfigStatefulHaConfigArgs'] stateful_ha_configs: The status of the Stateful HA addon, which provides automatic configurable failover for stateful applications. Defaults to disabled; set enabled = true to enable.
15561
15287
  """
@@ -15571,7 +15297,6 @@ class GetClusterAddonsConfigResult(dict):
15571
15297
  pulumi.set(__self__, "istio_configs", istio_configs)
15572
15298
  pulumi.set(__self__, "kalm_configs", kalm_configs)
15573
15299
  pulumi.set(__self__, "network_policy_configs", network_policy_configs)
15574
- pulumi.set(__self__, "parallelstore_csi_driver_configs", parallelstore_csi_driver_configs)
15575
15300
  pulumi.set(__self__, "ray_operator_configs", ray_operator_configs)
15576
15301
  pulumi.set(__self__, "stateful_ha_configs", stateful_ha_configs)
15577
15302
 
@@ -15671,14 +15396,6 @@ class GetClusterAddonsConfigResult(dict):
15671
15396
  """
15672
15397
  return pulumi.get(self, "network_policy_configs")
15673
15398
 
15674
- @property
15675
- @pulumi.getter(name="parallelstoreCsiDriverConfigs")
15676
- def parallelstore_csi_driver_configs(self) -> Sequence['outputs.GetClusterAddonsConfigParallelstoreCsiDriverConfigResult']:
15677
- """
15678
- The status of the Parallelstore CSI driver addon, which allows the usage of Parallelstore instances as volumes. Defaults to disabled; set enabled = true to enable.
15679
- """
15680
- return pulumi.get(self, "parallelstore_csi_driver_configs")
15681
-
15682
15399
  @property
15683
15400
  @pulumi.getter(name="rayOperatorConfigs")
15684
15401
  def ray_operator_configs(self) -> Sequence['outputs.GetClusterAddonsConfigRayOperatorConfigResult']:
@@ -15864,18 +15581,6 @@ class GetClusterAddonsConfigNetworkPolicyConfigResult(dict):
15864
15581
  return pulumi.get(self, "disabled")
15865
15582
 
15866
15583
 
15867
- @pulumi.output_type
15868
- class GetClusterAddonsConfigParallelstoreCsiDriverConfigResult(dict):
15869
- def __init__(__self__, *,
15870
- enabled: bool):
15871
- pulumi.set(__self__, "enabled", enabled)
15872
-
15873
- @property
15874
- @pulumi.getter
15875
- def enabled(self) -> bool:
15876
- return pulumi.get(self, "enabled")
15877
-
15878
-
15879
15584
  @pulumi.output_type
15880
15585
  class GetClusterAddonsConfigRayOperatorConfigResult(dict):
15881
15586
  def __init__(__self__, *,
@@ -16476,53 +16181,6 @@ class GetClusterConfidentialNodeResult(dict):
16476
16181
  return pulumi.get(self, "enabled")
16477
16182
 
16478
16183
 
16479
- @pulumi.output_type
16480
- class GetClusterControlPlaneEndpointsConfigResult(dict):
16481
- def __init__(__self__, *,
16482
- dns_endpoint_configs: Sequence['outputs.GetClusterControlPlaneEndpointsConfigDnsEndpointConfigResult']):
16483
- """
16484
- :param Sequence['GetClusterControlPlaneEndpointsConfigDnsEndpointConfigArgs'] dns_endpoint_configs: DNS endpoint configuration.
16485
- """
16486
- pulumi.set(__self__, "dns_endpoint_configs", dns_endpoint_configs)
16487
-
16488
- @property
16489
- @pulumi.getter(name="dnsEndpointConfigs")
16490
- def dns_endpoint_configs(self) -> Sequence['outputs.GetClusterControlPlaneEndpointsConfigDnsEndpointConfigResult']:
16491
- """
16492
- DNS endpoint configuration.
16493
- """
16494
- return pulumi.get(self, "dns_endpoint_configs")
16495
-
16496
-
16497
- @pulumi.output_type
16498
- class GetClusterControlPlaneEndpointsConfigDnsEndpointConfigResult(dict):
16499
- def __init__(__self__, *,
16500
- allow_external_traffic: bool,
16501
- endpoint: str):
16502
- """
16503
- :param bool allow_external_traffic: Controls whether user traffic is allowed over this endpoint. Note that GCP-managed services may still use the endpoint even if this is false.
16504
- :param str endpoint: The cluster's DNS endpoint.
16505
- """
16506
- pulumi.set(__self__, "allow_external_traffic", allow_external_traffic)
16507
- pulumi.set(__self__, "endpoint", endpoint)
16508
-
16509
- @property
16510
- @pulumi.getter(name="allowExternalTraffic")
16511
- def allow_external_traffic(self) -> bool:
16512
- """
16513
- Controls whether user traffic is allowed over this endpoint. Note that GCP-managed services may still use the endpoint even if this is false.
16514
- """
16515
- return pulumi.get(self, "allow_external_traffic")
16516
-
16517
- @property
16518
- @pulumi.getter
16519
- def endpoint(self) -> str:
16520
- """
16521
- The cluster's DNS endpoint.
16522
- """
16523
- return pulumi.get(self, "endpoint")
16524
-
16525
-
16526
16184
  @pulumi.output_type
16527
16185
  class GetClusterCostManagementConfigResult(dict):
16528
16186
  def __init__(__self__, *,
@@ -17104,16 +16762,13 @@ class GetClusterMasterAuthClientCertificateConfigResult(dict):
17104
16762
  class GetClusterMasterAuthorizedNetworksConfigResult(dict):
17105
16763
  def __init__(__self__, *,
17106
16764
  cidr_blocks: Sequence['outputs.GetClusterMasterAuthorizedNetworksConfigCidrBlockResult'],
17107
- gcp_public_cidrs_access_enabled: bool,
17108
- private_endpoint_enforcement_enabled: bool):
16765
+ gcp_public_cidrs_access_enabled: bool):
17109
16766
  """
17110
16767
  :param Sequence['GetClusterMasterAuthorizedNetworksConfigCidrBlockArgs'] cidr_blocks: External networks that can access the Kubernetes cluster master through HTTPS.
17111
16768
  :param bool gcp_public_cidrs_access_enabled: Whether Kubernetes master is accessible via Google Compute Engine Public IPs.
17112
- :param bool private_endpoint_enforcement_enabled: Whether authorized networks is enforced on the private endpoint or not. Defaults to false.
17113
16769
  """
17114
16770
  pulumi.set(__self__, "cidr_blocks", cidr_blocks)
17115
16771
  pulumi.set(__self__, "gcp_public_cidrs_access_enabled", gcp_public_cidrs_access_enabled)
17116
- pulumi.set(__self__, "private_endpoint_enforcement_enabled", private_endpoint_enforcement_enabled)
17117
16772
 
17118
16773
  @property
17119
16774
  @pulumi.getter(name="cidrBlocks")
@@ -17131,14 +16786,6 @@ class GetClusterMasterAuthorizedNetworksConfigResult(dict):
17131
16786
  """
17132
16787
  return pulumi.get(self, "gcp_public_cidrs_access_enabled")
17133
16788
 
17134
- @property
17135
- @pulumi.getter(name="privateEndpointEnforcementEnabled")
17136
- def private_endpoint_enforcement_enabled(self) -> bool:
17137
- """
17138
- Whether authorized networks is enforced on the private endpoint or not. Defaults to false.
17139
- """
17140
- return pulumi.get(self, "private_endpoint_enforcement_enabled")
17141
-
17142
16789
 
17143
16790
  @pulumi.output_type
17144
16791
  class GetClusterMasterAuthorizedNetworksConfigCidrBlockResult(dict):
@@ -21121,101 +20768,6 @@ class GetClusterTpuConfigResult(dict):
21121
20768
  return pulumi.get(self, "use_service_networking")
21122
20769
 
21123
20770
 
21124
- @pulumi.output_type
21125
- class GetClusterUserManagedKeysConfigResult(dict):
21126
- def __init__(__self__, *,
21127
- aggregation_ca: str,
21128
- cluster_ca: str,
21129
- control_plane_disk_encryption_key: str,
21130
- etcd_api_ca: str,
21131
- etcd_peer_ca: str,
21132
- gkeops_etcd_backup_encryption_key: str,
21133
- service_account_signing_keys: Sequence[str],
21134
- service_account_verification_keys: Sequence[str]):
21135
- """
21136
- :param str aggregation_ca: The Certificate Authority Service caPool to use for the aggreation CA in this cluster.
21137
- :param str cluster_ca: The Certificate Authority Service caPool to use for the cluster CA in this cluster.
21138
- :param str control_plane_disk_encryption_key: The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control plane nodes.
21139
- :param str etcd_api_ca: The Certificate Authority Service caPool to use for the etcd API CA in this cluster.
21140
- :param str etcd_peer_ca: The Certificate Authority Service caPool to use for the etcd peer CA in this cluster.
21141
- :param str gkeops_etcd_backup_encryption_key: Resource path of the Cloud KMS cryptoKey to use for encryption of internal etcd backups.
21142
- :param Sequence[str] service_account_signing_keys: The Cloud KMS cryptoKeyVersions to use for signing service account JWTs issued by this cluster.
21143
- :param Sequence[str] service_account_verification_keys: The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs issued by this cluster.
21144
- """
21145
- pulumi.set(__self__, "aggregation_ca", aggregation_ca)
21146
- pulumi.set(__self__, "cluster_ca", cluster_ca)
21147
- pulumi.set(__self__, "control_plane_disk_encryption_key", control_plane_disk_encryption_key)
21148
- pulumi.set(__self__, "etcd_api_ca", etcd_api_ca)
21149
- pulumi.set(__self__, "etcd_peer_ca", etcd_peer_ca)
21150
- pulumi.set(__self__, "gkeops_etcd_backup_encryption_key", gkeops_etcd_backup_encryption_key)
21151
- pulumi.set(__self__, "service_account_signing_keys", service_account_signing_keys)
21152
- pulumi.set(__self__, "service_account_verification_keys", service_account_verification_keys)
21153
-
21154
- @property
21155
- @pulumi.getter(name="aggregationCa")
21156
- def aggregation_ca(self) -> str:
21157
- """
21158
- The Certificate Authority Service caPool to use for the aggreation CA in this cluster.
21159
- """
21160
- return pulumi.get(self, "aggregation_ca")
21161
-
21162
- @property
21163
- @pulumi.getter(name="clusterCa")
21164
- def cluster_ca(self) -> str:
21165
- """
21166
- The Certificate Authority Service caPool to use for the cluster CA in this cluster.
21167
- """
21168
- return pulumi.get(self, "cluster_ca")
21169
-
21170
- @property
21171
- @pulumi.getter(name="controlPlaneDiskEncryptionKey")
21172
- def control_plane_disk_encryption_key(self) -> str:
21173
- """
21174
- The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control plane nodes.
21175
- """
21176
- return pulumi.get(self, "control_plane_disk_encryption_key")
21177
-
21178
- @property
21179
- @pulumi.getter(name="etcdApiCa")
21180
- def etcd_api_ca(self) -> str:
21181
- """
21182
- The Certificate Authority Service caPool to use for the etcd API CA in this cluster.
21183
- """
21184
- return pulumi.get(self, "etcd_api_ca")
21185
-
21186
- @property
21187
- @pulumi.getter(name="etcdPeerCa")
21188
- def etcd_peer_ca(self) -> str:
21189
- """
21190
- The Certificate Authority Service caPool to use for the etcd peer CA in this cluster.
21191
- """
21192
- return pulumi.get(self, "etcd_peer_ca")
21193
-
21194
- @property
21195
- @pulumi.getter(name="gkeopsEtcdBackupEncryptionKey")
21196
- def gkeops_etcd_backup_encryption_key(self) -> str:
21197
- """
21198
- Resource path of the Cloud KMS cryptoKey to use for encryption of internal etcd backups.
21199
- """
21200
- return pulumi.get(self, "gkeops_etcd_backup_encryption_key")
21201
-
21202
- @property
21203
- @pulumi.getter(name="serviceAccountSigningKeys")
21204
- def service_account_signing_keys(self) -> Sequence[str]:
21205
- """
21206
- The Cloud KMS cryptoKeyVersions to use for signing service account JWTs issued by this cluster.
21207
- """
21208
- return pulumi.get(self, "service_account_signing_keys")
21209
-
21210
- @property
21211
- @pulumi.getter(name="serviceAccountVerificationKeys")
21212
- def service_account_verification_keys(self) -> Sequence[str]:
21213
- """
21214
- The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs issued by this cluster.
21215
- """
21216
- return pulumi.get(self, "service_account_verification_keys")
21217
-
21218
-
21219
20771
  @pulumi.output_type
21220
20772
  class GetClusterVerticalPodAutoscalingResult(dict):
21221
20773
  def __init__(__self__, *,