pulumi-gcp 8.9.0a1731366299__py3-none-any.whl → 8.9.0a1731432418__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (114) hide show
  1. pulumi_gcp/__init__.py +64 -0
  2. pulumi_gcp/activedirectory/domain.py +24 -0
  3. pulumi_gcp/apigee/__init__.py +1 -0
  4. pulumi_gcp/apigee/_inputs.py +74 -0
  5. pulumi_gcp/apigee/api.py +456 -0
  6. pulumi_gcp/apigee/outputs.py +65 -0
  7. pulumi_gcp/applicationintegration/auth_config.py +24 -0
  8. pulumi_gcp/backupdisasterrecovery/__init__.py +4 -0
  9. pulumi_gcp/backupdisasterrecovery/_inputs.py +533 -0
  10. pulumi_gcp/backupdisasterrecovery/backup_plan.py +653 -0
  11. pulumi_gcp/backupdisasterrecovery/backup_plan_association.py +766 -0
  12. pulumi_gcp/backupdisasterrecovery/backup_vault.py +146 -6
  13. pulumi_gcp/backupdisasterrecovery/get_backup_plan.py +204 -0
  14. pulumi_gcp/backupdisasterrecovery/get_backup_plan_association.py +243 -0
  15. pulumi_gcp/backupdisasterrecovery/outputs.py +702 -0
  16. pulumi_gcp/bigquery/data_transfer_config.py +24 -0
  17. pulumi_gcp/cloudrunv2/_inputs.py +46 -0
  18. pulumi_gcp/cloudrunv2/job.py +0 -2
  19. pulumi_gcp/cloudrunv2/outputs.py +60 -2
  20. pulumi_gcp/cloudrunv2/service.py +0 -2
  21. pulumi_gcp/compute/__init__.py +1 -0
  22. pulumi_gcp/compute/_inputs.py +2163 -256
  23. pulumi_gcp/compute/disk.py +7 -7
  24. pulumi_gcp/compute/firewall_policy_rule.py +108 -54
  25. pulumi_gcp/compute/get_region_instance_group_manager.py +12 -1
  26. pulumi_gcp/compute/health_check.py +42 -42
  27. pulumi_gcp/compute/network_firewall_policy_rule.py +4 -4
  28. pulumi_gcp/compute/network_firewall_policy_with_rules.py +10 -10
  29. pulumi_gcp/compute/node_template.py +95 -0
  30. pulumi_gcp/compute/outputs.py +1639 -213
  31. pulumi_gcp/compute/region_disk.py +7 -7
  32. pulumi_gcp/compute/region_health_check.py +42 -42
  33. pulumi_gcp/compute/region_instance_group_manager.py +54 -14
  34. pulumi_gcp/compute/region_network_firewall_policy_rule.py +4 -4
  35. pulumi_gcp/compute/region_network_firewall_policy_with_rules.py +10 -10
  36. pulumi_gcp/compute/region_resize_request.py +772 -0
  37. pulumi_gcp/compute/region_security_policy.py +120 -0
  38. pulumi_gcp/compute/region_security_policy_rule.py +6 -6
  39. pulumi_gcp/compute/router_peer.py +56 -35
  40. pulumi_gcp/compute/security_scan_config.py +8 -8
  41. pulumi_gcp/config/__init__.pyi +4 -0
  42. pulumi_gcp/config/vars.py +8 -0
  43. pulumi_gcp/container/_inputs.py +345 -10
  44. pulumi_gcp/container/cluster.py +101 -0
  45. pulumi_gcp/container/get_cluster.py +23 -1
  46. pulumi_gcp/container/outputs.py +456 -8
  47. pulumi_gcp/dataloss/prevention_discovery_config.py +7 -7
  48. pulumi_gcp/dataproc/__init__.py +2 -0
  49. pulumi_gcp/dataproc/_inputs.py +101 -0
  50. pulumi_gcp/dataproc/gdc_application_environment.py +931 -0
  51. pulumi_gcp/dataproc/gdc_service_instance.py +1022 -0
  52. pulumi_gcp/dataproc/outputs.py +94 -0
  53. pulumi_gcp/edgecontainer/vpn_connection.py +4 -4
  54. pulumi_gcp/firebase/android_app.py +2 -2
  55. pulumi_gcp/firebase/apple_app.py +2 -2
  56. pulumi_gcp/firebase/web_app.py +2 -2
  57. pulumi_gcp/firestore/index.py +44 -0
  58. pulumi_gcp/gkeonprem/_inputs.py +15 -15
  59. pulumi_gcp/gkeonprem/outputs.py +10 -10
  60. pulumi_gcp/healthcare/dataset.py +7 -7
  61. pulumi_gcp/healthcare/dicom_store.py +7 -7
  62. pulumi_gcp/healthcare/fhir_store.py +7 -7
  63. pulumi_gcp/healthcare/hl7_store.py +14 -14
  64. pulumi_gcp/iam/__init__.py +1 -0
  65. pulumi_gcp/iam/_inputs.py +161 -0
  66. pulumi_gcp/iam/outputs.py +114 -0
  67. pulumi_gcp/iam/principal_access_boundary_policy.py +679 -0
  68. pulumi_gcp/logging/metric.py +2 -2
  69. pulumi_gcp/looker/_inputs.py +6 -0
  70. pulumi_gcp/looker/instance.py +169 -321
  71. pulumi_gcp/looker/outputs.py +4 -0
  72. pulumi_gcp/memorystore/instance.py +4 -0
  73. pulumi_gcp/monitoring/alert_policy.py +24 -0
  74. pulumi_gcp/monitoring/custom_service.py +24 -0
  75. pulumi_gcp/monitoring/group.py +24 -0
  76. pulumi_gcp/monitoring/metric_descriptor.py +24 -0
  77. pulumi_gcp/monitoring/slo.py +24 -0
  78. pulumi_gcp/monitoring/uptime_check_config.py +24 -0
  79. pulumi_gcp/networkmanagement/__init__.py +1 -0
  80. pulumi_gcp/networkmanagement/vpc_flow_logs_config.py +1358 -0
  81. pulumi_gcp/osconfig/patch_deployment.py +8 -8
  82. pulumi_gcp/provider.py +40 -0
  83. pulumi_gcp/pulumi-plugin.json +1 -1
  84. pulumi_gcp/redis/_inputs.py +3 -3
  85. pulumi_gcp/redis/outputs.py +2 -2
  86. pulumi_gcp/securitycenter/notification_config.py +4 -16
  87. pulumi_gcp/securitycenter/project_notification_config.py +0 -24
  88. pulumi_gcp/securitycenter/v2_organization_notification_config.py +4 -16
  89. pulumi_gcp/spanner/__init__.py +1 -0
  90. pulumi_gcp/spanner/_inputs.py +9 -9
  91. pulumi_gcp/spanner/get_database.py +229 -0
  92. pulumi_gcp/spanner/get_instance.py +12 -1
  93. pulumi_gcp/spanner/instance.py +70 -0
  94. pulumi_gcp/spanner/outputs.py +46 -12
  95. pulumi_gcp/sql/_inputs.py +26 -0
  96. pulumi_gcp/sql/database_instance.py +124 -11
  97. pulumi_gcp/sql/get_database_instance.py +12 -1
  98. pulumi_gcp/sql/outputs.py +51 -0
  99. pulumi_gcp/storage/_inputs.py +3 -3
  100. pulumi_gcp/storage/outputs.py +2 -2
  101. pulumi_gcp/tags/tag_binding.py +4 -4
  102. pulumi_gcp/tags/tag_value.py +2 -2
  103. pulumi_gcp/transcoder/job.py +24 -0
  104. pulumi_gcp/vertex/_inputs.py +184 -0
  105. pulumi_gcp/vertex/ai_endpoint.py +394 -8
  106. pulumi_gcp/vertex/ai_feature_online_store_featureview.py +4 -4
  107. pulumi_gcp/vertex/outputs.py +166 -0
  108. pulumi_gcp/workbench/instance.py +21 -7
  109. pulumi_gcp/workflows/workflow.py +36 -0
  110. pulumi_gcp/workstations/workstation_config.py +8 -8
  111. {pulumi_gcp-8.9.0a1731366299.dist-info → pulumi_gcp-8.9.0a1731432418.dist-info}/METADATA +1 -1
  112. {pulumi_gcp-8.9.0a1731366299.dist-info → pulumi_gcp-8.9.0a1731432418.dist-info}/RECORD +114 -103
  113. {pulumi_gcp-8.9.0a1731366299.dist-info → pulumi_gcp-8.9.0a1731432418.dist-info}/WHEEL +0 -0
  114. {pulumi_gcp-8.9.0a1731366299.dist-info → pulumi_gcp-8.9.0a1731432418.dist-info}/top_level.txt +0 -0
@@ -179,6 +179,8 @@ __all__ = [
179
179
  'ClusterAddonsConfigKalmConfigArgsDict',
180
180
  'ClusterAddonsConfigNetworkPolicyConfigArgs',
181
181
  'ClusterAddonsConfigNetworkPolicyConfigArgsDict',
182
+ 'ClusterAddonsConfigParallelstoreCsiDriverConfigArgs',
183
+ 'ClusterAddonsConfigParallelstoreCsiDriverConfigArgsDict',
182
184
  'ClusterAddonsConfigRayOperatorConfigArgs',
183
185
  'ClusterAddonsConfigRayOperatorConfigArgsDict',
184
186
  'ClusterAddonsConfigRayOperatorConfigRayClusterLoggingConfigArgs',
@@ -213,6 +215,10 @@ __all__ = [
213
215
  'ClusterClusterTelemetryArgsDict',
214
216
  'ClusterConfidentialNodesArgs',
215
217
  'ClusterConfidentialNodesArgsDict',
218
+ 'ClusterControlPlaneEndpointsConfigArgs',
219
+ 'ClusterControlPlaneEndpointsConfigArgsDict',
220
+ 'ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgs',
221
+ 'ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgsDict',
216
222
  'ClusterCostManagementConfigArgs',
217
223
  'ClusterCostManagementConfigArgsDict',
218
224
  'ClusterDatabaseEncryptionArgs',
@@ -457,6 +463,8 @@ __all__ = [
457
463
  'ClusterServiceExternalIpsConfigArgsDict',
458
464
  'ClusterTpuConfigArgs',
459
465
  'ClusterTpuConfigArgsDict',
466
+ 'ClusterUserManagedKeysConfigArgs',
467
+ 'ClusterUserManagedKeysConfigArgsDict',
460
468
  'ClusterVerticalPodAutoscalingArgs',
461
469
  'ClusterVerticalPodAutoscalingArgsDict',
462
470
  'ClusterWorkloadAltsConfigArgs',
@@ -4616,6 +4624,16 @@ if not MYPY:
4616
4624
  It can only be disabled if the nodes already do not have network policies enabled.
4617
4625
  Defaults to disabled; set `disabled = false` to enable.
4618
4626
  """
4627
+ parallelstore_csi_driver_config: NotRequired[pulumi.Input['ClusterAddonsConfigParallelstoreCsiDriverConfigArgsDict']]
4628
+ """
4629
+ The status of the Parallelstore CSI driver addon,
4630
+ which allows the usage of a Parallelstore instances as volumes.
4631
+ It is disabled by default for Standard clusters; set `enabled = true` to enable.
4632
+ It is enabled by default for Autopilot clusters with version 1.29 or later; set `enabled = true` to enable it explicitly.
4633
+ See [Enable the Parallelstore CSI driver](https://cloud.google.com/kubernetes-engine/docs/how-to/persistent-volumes/parallelstore-csi-new-volume#enable) for more information.
4634
+
4635
+ This example `addons_config` disables two addons:
4636
+ """
4619
4637
  ray_operator_configs: NotRequired[pulumi.Input[Sequence[pulumi.Input['ClusterAddonsConfigRayOperatorConfigArgsDict']]]]
4620
4638
  """
4621
4639
  . The status of the [Ray Operator
@@ -4630,9 +4648,6 @@ if not MYPY:
4630
4648
  clusters on
4631
4649
  GKE](https://cloud.google.com/kubernetes-engine/docs/add-on/ray-on-gke/how-to/collect-view-logs-metrics)
4632
4650
  for more information.
4633
-
4634
-
4635
- This example `addons_config` disables two addons:
4636
4651
  """
4637
4652
  stateful_ha_config: NotRequired[pulumi.Input['ClusterAddonsConfigStatefulHaConfigArgsDict']]
4638
4653
  """
@@ -4658,6 +4673,7 @@ class ClusterAddonsConfigArgs:
4658
4673
  istio_config: Optional[pulumi.Input['ClusterAddonsConfigIstioConfigArgs']] = None,
4659
4674
  kalm_config: Optional[pulumi.Input['ClusterAddonsConfigKalmConfigArgs']] = None,
4660
4675
  network_policy_config: Optional[pulumi.Input['ClusterAddonsConfigNetworkPolicyConfigArgs']] = None,
4676
+ parallelstore_csi_driver_config: Optional[pulumi.Input['ClusterAddonsConfigParallelstoreCsiDriverConfigArgs']] = None,
4661
4677
  ray_operator_configs: Optional[pulumi.Input[Sequence[pulumi.Input['ClusterAddonsConfigRayOperatorConfigArgs']]]] = None,
4662
4678
  stateful_ha_config: Optional[pulumi.Input['ClusterAddonsConfigStatefulHaConfigArgs']] = None):
4663
4679
  """
@@ -4702,6 +4718,13 @@ class ClusterAddonsConfigArgs:
4702
4718
  otherwise nothing will happen.
4703
4719
  It can only be disabled if the nodes already do not have network policies enabled.
4704
4720
  Defaults to disabled; set `disabled = false` to enable.
4721
+ :param pulumi.Input['ClusterAddonsConfigParallelstoreCsiDriverConfigArgs'] parallelstore_csi_driver_config: The status of the Parallelstore CSI driver addon,
4722
+ which allows the usage of a Parallelstore instances as volumes.
4723
+ It is disabled by default for Standard clusters; set `enabled = true` to enable.
4724
+ It is enabled by default for Autopilot clusters with version 1.29 or later; set `enabled = true` to enable it explicitly.
4725
+ See [Enable the Parallelstore CSI driver](https://cloud.google.com/kubernetes-engine/docs/how-to/persistent-volumes/parallelstore-csi-new-volume#enable) for more information.
4726
+
4727
+ This example `addons_config` disables two addons:
4705
4728
  :param pulumi.Input[Sequence[pulumi.Input['ClusterAddonsConfigRayOperatorConfigArgs']]] ray_operator_configs: . The status of the [Ray Operator
4706
4729
  addon](https://cloud.google.com/kubernetes-engine/docs/add-on/ray-on-gke/concepts/overview).
4707
4730
  It is disabled by default. Set `enabled = true` to enable. The minimum
@@ -4714,9 +4737,6 @@ class ClusterAddonsConfigArgs:
4714
4737
  clusters on
4715
4738
  GKE](https://cloud.google.com/kubernetes-engine/docs/add-on/ray-on-gke/how-to/collect-view-logs-metrics)
4716
4739
  for more information.
4717
-
4718
-
4719
- This example `addons_config` disables two addons:
4720
4740
  :param pulumi.Input['ClusterAddonsConfigStatefulHaConfigArgs'] stateful_ha_config: .
4721
4741
  The status of the Stateful HA addon, which provides automatic configurable failover for stateful applications.
4722
4742
  It is disabled by default for Standard clusters. Set `enabled = true` to enable.
@@ -4745,6 +4765,8 @@ class ClusterAddonsConfigArgs:
4745
4765
  pulumi.set(__self__, "kalm_config", kalm_config)
4746
4766
  if network_policy_config is not None:
4747
4767
  pulumi.set(__self__, "network_policy_config", network_policy_config)
4768
+ if parallelstore_csi_driver_config is not None:
4769
+ pulumi.set(__self__, "parallelstore_csi_driver_config", parallelstore_csi_driver_config)
4748
4770
  if ray_operator_configs is not None:
4749
4771
  pulumi.set(__self__, "ray_operator_configs", ray_operator_configs)
4750
4772
  if stateful_ha_config is not None:
@@ -4923,6 +4945,24 @@ class ClusterAddonsConfigArgs:
4923
4945
  def network_policy_config(self, value: Optional[pulumi.Input['ClusterAddonsConfigNetworkPolicyConfigArgs']]):
4924
4946
  pulumi.set(self, "network_policy_config", value)
4925
4947
 
4948
+ @property
4949
+ @pulumi.getter(name="parallelstoreCsiDriverConfig")
4950
+ def parallelstore_csi_driver_config(self) -> Optional[pulumi.Input['ClusterAddonsConfigParallelstoreCsiDriverConfigArgs']]:
4951
+ """
4952
+ The status of the Parallelstore CSI driver addon,
4953
+ which allows the usage of a Parallelstore instances as volumes.
4954
+ It is disabled by default for Standard clusters; set `enabled = true` to enable.
4955
+ It is enabled by default for Autopilot clusters with version 1.29 or later; set `enabled = true` to enable it explicitly.
4956
+ See [Enable the Parallelstore CSI driver](https://cloud.google.com/kubernetes-engine/docs/how-to/persistent-volumes/parallelstore-csi-new-volume#enable) for more information.
4957
+
4958
+ This example `addons_config` disables two addons:
4959
+ """
4960
+ return pulumi.get(self, "parallelstore_csi_driver_config")
4961
+
4962
+ @parallelstore_csi_driver_config.setter
4963
+ def parallelstore_csi_driver_config(self, value: Optional[pulumi.Input['ClusterAddonsConfigParallelstoreCsiDriverConfigArgs']]):
4964
+ pulumi.set(self, "parallelstore_csi_driver_config", value)
4965
+
4926
4966
  @property
4927
4967
  @pulumi.getter(name="rayOperatorConfigs")
4928
4968
  def ray_operator_configs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['ClusterAddonsConfigRayOperatorConfigArgs']]]]:
@@ -4939,9 +4979,6 @@ class ClusterAddonsConfigArgs:
4939
4979
  clusters on
4940
4980
  GKE](https://cloud.google.com/kubernetes-engine/docs/add-on/ray-on-gke/how-to/collect-view-logs-metrics)
4941
4981
  for more information.
4942
-
4943
-
4944
- This example `addons_config` disables two addons:
4945
4982
  """
4946
4983
  return pulumi.get(self, "ray_operator_configs")
4947
4984
 
@@ -5337,6 +5374,28 @@ class ClusterAddonsConfigNetworkPolicyConfigArgs:
5337
5374
  pulumi.set(self, "disabled", value)
5338
5375
 
5339
5376
 
5377
+ if not MYPY:
5378
+ class ClusterAddonsConfigParallelstoreCsiDriverConfigArgsDict(TypedDict):
5379
+ enabled: pulumi.Input[bool]
5380
+ elif False:
5381
+ ClusterAddonsConfigParallelstoreCsiDriverConfigArgsDict: TypeAlias = Mapping[str, Any]
5382
+
5383
+ @pulumi.input_type
5384
+ class ClusterAddonsConfigParallelstoreCsiDriverConfigArgs:
5385
+ def __init__(__self__, *,
5386
+ enabled: pulumi.Input[bool]):
5387
+ pulumi.set(__self__, "enabled", enabled)
5388
+
5389
+ @property
5390
+ @pulumi.getter
5391
+ def enabled(self) -> pulumi.Input[bool]:
5392
+ return pulumi.get(self, "enabled")
5393
+
5394
+ @enabled.setter
5395
+ def enabled(self, value: pulumi.Input[bool]):
5396
+ pulumi.set(self, "enabled", value)
5397
+
5398
+
5340
5399
  if not MYPY:
5341
5400
  class ClusterAddonsConfigRayOperatorConfigArgsDict(TypedDict):
5342
5401
  enabled: pulumi.Input[bool]
@@ -6478,6 +6537,90 @@ class ClusterConfidentialNodesArgs:
6478
6537
  pulumi.set(self, "enabled", value)
6479
6538
 
6480
6539
 
6540
+ if not MYPY:
6541
+ class ClusterControlPlaneEndpointsConfigArgsDict(TypedDict):
6542
+ dns_endpoint_config: NotRequired[pulumi.Input['ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgsDict']]
6543
+ """
6544
+ DNS endpoint configuration.
6545
+ """
6546
+ elif False:
6547
+ ClusterControlPlaneEndpointsConfigArgsDict: TypeAlias = Mapping[str, Any]
6548
+
6549
+ @pulumi.input_type
6550
+ class ClusterControlPlaneEndpointsConfigArgs:
6551
+ def __init__(__self__, *,
6552
+ dns_endpoint_config: Optional[pulumi.Input['ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgs']] = None):
6553
+ """
6554
+ :param pulumi.Input['ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgs'] dns_endpoint_config: DNS endpoint configuration.
6555
+ """
6556
+ if dns_endpoint_config is not None:
6557
+ pulumi.set(__self__, "dns_endpoint_config", dns_endpoint_config)
6558
+
6559
+ @property
6560
+ @pulumi.getter(name="dnsEndpointConfig")
6561
+ def dns_endpoint_config(self) -> Optional[pulumi.Input['ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgs']]:
6562
+ """
6563
+ DNS endpoint configuration.
6564
+ """
6565
+ return pulumi.get(self, "dns_endpoint_config")
6566
+
6567
+ @dns_endpoint_config.setter
6568
+ def dns_endpoint_config(self, value: Optional[pulumi.Input['ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgs']]):
6569
+ pulumi.set(self, "dns_endpoint_config", value)
6570
+
6571
+
6572
+ if not MYPY:
6573
+ class ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgsDict(TypedDict):
6574
+ allow_external_traffic: NotRequired[pulumi.Input[bool]]
6575
+ """
6576
+ Controls whether user traffic is allowed over this endpoint. Note that GCP-managed services may still use the endpoint even if this is false.
6577
+ """
6578
+ endpoint: NotRequired[pulumi.Input[str]]
6579
+ """
6580
+ The cluster's DNS endpoint.
6581
+ """
6582
+ elif False:
6583
+ ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgsDict: TypeAlias = Mapping[str, Any]
6584
+
6585
+ @pulumi.input_type
6586
+ class ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgs:
6587
+ def __init__(__self__, *,
6588
+ allow_external_traffic: Optional[pulumi.Input[bool]] = None,
6589
+ endpoint: Optional[pulumi.Input[str]] = None):
6590
+ """
6591
+ :param pulumi.Input[bool] allow_external_traffic: Controls whether user traffic is allowed over this endpoint. Note that GCP-managed services may still use the endpoint even if this is false.
6592
+ :param pulumi.Input[str] endpoint: The cluster's DNS endpoint.
6593
+ """
6594
+ if allow_external_traffic is not None:
6595
+ pulumi.set(__self__, "allow_external_traffic", allow_external_traffic)
6596
+ if endpoint is not None:
6597
+ pulumi.set(__self__, "endpoint", endpoint)
6598
+
6599
+ @property
6600
+ @pulumi.getter(name="allowExternalTraffic")
6601
+ def allow_external_traffic(self) -> Optional[pulumi.Input[bool]]:
6602
+ """
6603
+ Controls whether user traffic is allowed over this endpoint. Note that GCP-managed services may still use the endpoint even if this is false.
6604
+ """
6605
+ return pulumi.get(self, "allow_external_traffic")
6606
+
6607
+ @allow_external_traffic.setter
6608
+ def allow_external_traffic(self, value: Optional[pulumi.Input[bool]]):
6609
+ pulumi.set(self, "allow_external_traffic", value)
6610
+
6611
+ @property
6612
+ @pulumi.getter
6613
+ def endpoint(self) -> Optional[pulumi.Input[str]]:
6614
+ """
6615
+ The cluster's DNS endpoint.
6616
+ """
6617
+ return pulumi.get(self, "endpoint")
6618
+
6619
+ @endpoint.setter
6620
+ def endpoint(self, value: Optional[pulumi.Input[str]]):
6621
+ pulumi.set(self, "endpoint", value)
6622
+
6623
+
6481
6624
  if not MYPY:
6482
6625
  class ClusterCostManagementConfigArgsDict(TypedDict):
6483
6626
  enabled: pulumi.Input[bool]
@@ -7805,6 +7948,10 @@ if not MYPY:
7805
7948
  Whether Kubernetes master is
7806
7949
  accessible via Google Compute Engine Public IPs.
7807
7950
  """
7951
+ private_endpoint_enforcement_enabled: NotRequired[pulumi.Input[bool]]
7952
+ """
7953
+ Whether authorized networks is enforced on the private endpoint or not. Defaults to false.
7954
+ """
7808
7955
  elif False:
7809
7956
  ClusterMasterAuthorizedNetworksConfigArgsDict: TypeAlias = Mapping[str, Any]
7810
7957
 
@@ -7812,17 +7959,21 @@ elif False:
7812
7959
  class ClusterMasterAuthorizedNetworksConfigArgs:
7813
7960
  def __init__(__self__, *,
7814
7961
  cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input['ClusterMasterAuthorizedNetworksConfigCidrBlockArgs']]]] = None,
7815
- gcp_public_cidrs_access_enabled: Optional[pulumi.Input[bool]] = None):
7962
+ gcp_public_cidrs_access_enabled: Optional[pulumi.Input[bool]] = None,
7963
+ private_endpoint_enforcement_enabled: Optional[pulumi.Input[bool]] = None):
7816
7964
  """
7817
7965
  :param pulumi.Input[Sequence[pulumi.Input['ClusterMasterAuthorizedNetworksConfigCidrBlockArgs']]] cidr_blocks: External networks that can access the
7818
7966
  Kubernetes cluster master through HTTPS.
7819
7967
  :param pulumi.Input[bool] gcp_public_cidrs_access_enabled: Whether Kubernetes master is
7820
7968
  accessible via Google Compute Engine Public IPs.
7969
+ :param pulumi.Input[bool] private_endpoint_enforcement_enabled: Whether authorized networks is enforced on the private endpoint or not. Defaults to false.
7821
7970
  """
7822
7971
  if cidr_blocks is not None:
7823
7972
  pulumi.set(__self__, "cidr_blocks", cidr_blocks)
7824
7973
  if gcp_public_cidrs_access_enabled is not None:
7825
7974
  pulumi.set(__self__, "gcp_public_cidrs_access_enabled", gcp_public_cidrs_access_enabled)
7975
+ if private_endpoint_enforcement_enabled is not None:
7976
+ pulumi.set(__self__, "private_endpoint_enforcement_enabled", private_endpoint_enforcement_enabled)
7826
7977
 
7827
7978
  @property
7828
7979
  @pulumi.getter(name="cidrBlocks")
@@ -7850,6 +8001,18 @@ class ClusterMasterAuthorizedNetworksConfigArgs:
7850
8001
  def gcp_public_cidrs_access_enabled(self, value: Optional[pulumi.Input[bool]]):
7851
8002
  pulumi.set(self, "gcp_public_cidrs_access_enabled", value)
7852
8003
 
8004
+ @property
8005
+ @pulumi.getter(name="privateEndpointEnforcementEnabled")
8006
+ def private_endpoint_enforcement_enabled(self) -> Optional[pulumi.Input[bool]]:
8007
+ """
8008
+ Whether authorized networks is enforced on the private endpoint or not. Defaults to false.
8009
+ """
8010
+ return pulumi.get(self, "private_endpoint_enforcement_enabled")
8011
+
8012
+ @private_endpoint_enforcement_enabled.setter
8013
+ def private_endpoint_enforcement_enabled(self, value: Optional[pulumi.Input[bool]]):
8014
+ pulumi.set(self, "private_endpoint_enforcement_enabled", value)
8015
+
7853
8016
 
7854
8017
  if not MYPY:
7855
8018
  class ClusterMasterAuthorizedNetworksConfigCidrBlockArgsDict(TypedDict):
@@ -15723,6 +15886,178 @@ class ClusterTpuConfigArgs:
15723
15886
  pulumi.set(self, "use_service_networking", value)
15724
15887
 
15725
15888
 
15889
+ if not MYPY:
15890
+ class ClusterUserManagedKeysConfigArgsDict(TypedDict):
15891
+ aggregation_ca: NotRequired[pulumi.Input[str]]
15892
+ """
15893
+ The Certificate Authority Service caPool to use for the aggreation CA in this cluster.
15894
+ """
15895
+ cluster_ca: NotRequired[pulumi.Input[str]]
15896
+ """
15897
+ The Certificate Authority Service caPool to use for the cluster CA in this cluster.
15898
+ """
15899
+ control_plane_disk_encryption_key: NotRequired[pulumi.Input[str]]
15900
+ """
15901
+ The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control plane nodes.
15902
+ """
15903
+ etcd_api_ca: NotRequired[pulumi.Input[str]]
15904
+ """
15905
+ The Certificate Authority Service caPool to use for the etcd API CA in this cluster.
15906
+ """
15907
+ etcd_peer_ca: NotRequired[pulumi.Input[str]]
15908
+ """
15909
+ The Certificate Authority Service caPool to use for the etcd peer CA in this cluster.
15910
+ """
15911
+ gkeops_etcd_backup_encryption_key: NotRequired[pulumi.Input[str]]
15912
+ """
15913
+ Resource path of the Cloud KMS cryptoKey to use for encryption of internal etcd backups.
15914
+ """
15915
+ service_account_signing_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
15916
+ """
15917
+ The Cloud KMS cryptoKeyVersions to use for signing service account JWTs issued by this cluster.
15918
+ """
15919
+ service_account_verification_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
15920
+ """
15921
+ The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs issued by this cluster.
15922
+ """
15923
+ elif False:
15924
+ ClusterUserManagedKeysConfigArgsDict: TypeAlias = Mapping[str, Any]
15925
+
15926
+ @pulumi.input_type
15927
+ class ClusterUserManagedKeysConfigArgs:
15928
+ def __init__(__self__, *,
15929
+ aggregation_ca: Optional[pulumi.Input[str]] = None,
15930
+ cluster_ca: Optional[pulumi.Input[str]] = None,
15931
+ control_plane_disk_encryption_key: Optional[pulumi.Input[str]] = None,
15932
+ etcd_api_ca: Optional[pulumi.Input[str]] = None,
15933
+ etcd_peer_ca: Optional[pulumi.Input[str]] = None,
15934
+ gkeops_etcd_backup_encryption_key: Optional[pulumi.Input[str]] = None,
15935
+ service_account_signing_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
15936
+ service_account_verification_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
15937
+ """
15938
+ :param pulumi.Input[str] aggregation_ca: The Certificate Authority Service caPool to use for the aggreation CA in this cluster.
15939
+ :param pulumi.Input[str] cluster_ca: The Certificate Authority Service caPool to use for the cluster CA in this cluster.
15940
+ :param pulumi.Input[str] control_plane_disk_encryption_key: The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control plane nodes.
15941
+ :param pulumi.Input[str] etcd_api_ca: The Certificate Authority Service caPool to use for the etcd API CA in this cluster.
15942
+ :param pulumi.Input[str] etcd_peer_ca: The Certificate Authority Service caPool to use for the etcd peer CA in this cluster.
15943
+ :param pulumi.Input[str] gkeops_etcd_backup_encryption_key: Resource path of the Cloud KMS cryptoKey to use for encryption of internal etcd backups.
15944
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_signing_keys: The Cloud KMS cryptoKeyVersions to use for signing service account JWTs issued by this cluster.
15945
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_verification_keys: The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs issued by this cluster.
15946
+ """
15947
+ if aggregation_ca is not None:
15948
+ pulumi.set(__self__, "aggregation_ca", aggregation_ca)
15949
+ if cluster_ca is not None:
15950
+ pulumi.set(__self__, "cluster_ca", cluster_ca)
15951
+ if control_plane_disk_encryption_key is not None:
15952
+ pulumi.set(__self__, "control_plane_disk_encryption_key", control_plane_disk_encryption_key)
15953
+ if etcd_api_ca is not None:
15954
+ pulumi.set(__self__, "etcd_api_ca", etcd_api_ca)
15955
+ if etcd_peer_ca is not None:
15956
+ pulumi.set(__self__, "etcd_peer_ca", etcd_peer_ca)
15957
+ if gkeops_etcd_backup_encryption_key is not None:
15958
+ pulumi.set(__self__, "gkeops_etcd_backup_encryption_key", gkeops_etcd_backup_encryption_key)
15959
+ if service_account_signing_keys is not None:
15960
+ pulumi.set(__self__, "service_account_signing_keys", service_account_signing_keys)
15961
+ if service_account_verification_keys is not None:
15962
+ pulumi.set(__self__, "service_account_verification_keys", service_account_verification_keys)
15963
+
15964
+ @property
15965
+ @pulumi.getter(name="aggregationCa")
15966
+ def aggregation_ca(self) -> Optional[pulumi.Input[str]]:
15967
+ """
15968
+ The Certificate Authority Service caPool to use for the aggreation CA in this cluster.
15969
+ """
15970
+ return pulumi.get(self, "aggregation_ca")
15971
+
15972
+ @aggregation_ca.setter
15973
+ def aggregation_ca(self, value: Optional[pulumi.Input[str]]):
15974
+ pulumi.set(self, "aggregation_ca", value)
15975
+
15976
+ @property
15977
+ @pulumi.getter(name="clusterCa")
15978
+ def cluster_ca(self) -> Optional[pulumi.Input[str]]:
15979
+ """
15980
+ The Certificate Authority Service caPool to use for the cluster CA in this cluster.
15981
+ """
15982
+ return pulumi.get(self, "cluster_ca")
15983
+
15984
+ @cluster_ca.setter
15985
+ def cluster_ca(self, value: Optional[pulumi.Input[str]]):
15986
+ pulumi.set(self, "cluster_ca", value)
15987
+
15988
+ @property
15989
+ @pulumi.getter(name="controlPlaneDiskEncryptionKey")
15990
+ def control_plane_disk_encryption_key(self) -> Optional[pulumi.Input[str]]:
15991
+ """
15992
+ The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control plane nodes.
15993
+ """
15994
+ return pulumi.get(self, "control_plane_disk_encryption_key")
15995
+
15996
+ @control_plane_disk_encryption_key.setter
15997
+ def control_plane_disk_encryption_key(self, value: Optional[pulumi.Input[str]]):
15998
+ pulumi.set(self, "control_plane_disk_encryption_key", value)
15999
+
16000
+ @property
16001
+ @pulumi.getter(name="etcdApiCa")
16002
+ def etcd_api_ca(self) -> Optional[pulumi.Input[str]]:
16003
+ """
16004
+ The Certificate Authority Service caPool to use for the etcd API CA in this cluster.
16005
+ """
16006
+ return pulumi.get(self, "etcd_api_ca")
16007
+
16008
+ @etcd_api_ca.setter
16009
+ def etcd_api_ca(self, value: Optional[pulumi.Input[str]]):
16010
+ pulumi.set(self, "etcd_api_ca", value)
16011
+
16012
+ @property
16013
+ @pulumi.getter(name="etcdPeerCa")
16014
+ def etcd_peer_ca(self) -> Optional[pulumi.Input[str]]:
16015
+ """
16016
+ The Certificate Authority Service caPool to use for the etcd peer CA in this cluster.
16017
+ """
16018
+ return pulumi.get(self, "etcd_peer_ca")
16019
+
16020
+ @etcd_peer_ca.setter
16021
+ def etcd_peer_ca(self, value: Optional[pulumi.Input[str]]):
16022
+ pulumi.set(self, "etcd_peer_ca", value)
16023
+
16024
+ @property
16025
+ @pulumi.getter(name="gkeopsEtcdBackupEncryptionKey")
16026
+ def gkeops_etcd_backup_encryption_key(self) -> Optional[pulumi.Input[str]]:
16027
+ """
16028
+ Resource path of the Cloud KMS cryptoKey to use for encryption of internal etcd backups.
16029
+ """
16030
+ return pulumi.get(self, "gkeops_etcd_backup_encryption_key")
16031
+
16032
+ @gkeops_etcd_backup_encryption_key.setter
16033
+ def gkeops_etcd_backup_encryption_key(self, value: Optional[pulumi.Input[str]]):
16034
+ pulumi.set(self, "gkeops_etcd_backup_encryption_key", value)
16035
+
16036
+ @property
16037
+ @pulumi.getter(name="serviceAccountSigningKeys")
16038
+ def service_account_signing_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
16039
+ """
16040
+ The Cloud KMS cryptoKeyVersions to use for signing service account JWTs issued by this cluster.
16041
+ """
16042
+ return pulumi.get(self, "service_account_signing_keys")
16043
+
16044
+ @service_account_signing_keys.setter
16045
+ def service_account_signing_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
16046
+ pulumi.set(self, "service_account_signing_keys", value)
16047
+
16048
+ @property
16049
+ @pulumi.getter(name="serviceAccountVerificationKeys")
16050
+ def service_account_verification_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
16051
+ """
16052
+ The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs issued by this cluster.
16053
+ """
16054
+ return pulumi.get(self, "service_account_verification_keys")
16055
+
16056
+ @service_account_verification_keys.setter
16057
+ def service_account_verification_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
16058
+ pulumi.set(self, "service_account_verification_keys", value)
16059
+
16060
+
15726
16061
  if not MYPY:
15727
16062
  class ClusterVerticalPodAutoscalingArgsDict(TypedDict):
15728
16063
  enabled: pulumi.Input[bool]