pulumi-gcp 8.9.0a1731366299__py3-none-any.whl → 8.9.0a1731432418__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +64 -0
- pulumi_gcp/activedirectory/domain.py +24 -0
- pulumi_gcp/apigee/__init__.py +1 -0
- pulumi_gcp/apigee/_inputs.py +74 -0
- pulumi_gcp/apigee/api.py +456 -0
- pulumi_gcp/apigee/outputs.py +65 -0
- pulumi_gcp/applicationintegration/auth_config.py +24 -0
- pulumi_gcp/backupdisasterrecovery/__init__.py +4 -0
- pulumi_gcp/backupdisasterrecovery/_inputs.py +533 -0
- pulumi_gcp/backupdisasterrecovery/backup_plan.py +653 -0
- pulumi_gcp/backupdisasterrecovery/backup_plan_association.py +766 -0
- pulumi_gcp/backupdisasterrecovery/backup_vault.py +146 -6
- pulumi_gcp/backupdisasterrecovery/get_backup_plan.py +204 -0
- pulumi_gcp/backupdisasterrecovery/get_backup_plan_association.py +243 -0
- pulumi_gcp/backupdisasterrecovery/outputs.py +702 -0
- pulumi_gcp/bigquery/data_transfer_config.py +24 -0
- pulumi_gcp/cloudrunv2/_inputs.py +46 -0
- pulumi_gcp/cloudrunv2/job.py +0 -2
- pulumi_gcp/cloudrunv2/outputs.py +60 -2
- pulumi_gcp/cloudrunv2/service.py +0 -2
- pulumi_gcp/compute/__init__.py +1 -0
- pulumi_gcp/compute/_inputs.py +2163 -256
- pulumi_gcp/compute/disk.py +7 -7
- pulumi_gcp/compute/firewall_policy_rule.py +108 -54
- pulumi_gcp/compute/get_region_instance_group_manager.py +12 -1
- pulumi_gcp/compute/health_check.py +42 -42
- pulumi_gcp/compute/network_firewall_policy_rule.py +4 -4
- pulumi_gcp/compute/network_firewall_policy_with_rules.py +10 -10
- pulumi_gcp/compute/node_template.py +95 -0
- pulumi_gcp/compute/outputs.py +1639 -213
- pulumi_gcp/compute/region_disk.py +7 -7
- pulumi_gcp/compute/region_health_check.py +42 -42
- pulumi_gcp/compute/region_instance_group_manager.py +54 -14
- pulumi_gcp/compute/region_network_firewall_policy_rule.py +4 -4
- pulumi_gcp/compute/region_network_firewall_policy_with_rules.py +10 -10
- pulumi_gcp/compute/region_resize_request.py +772 -0
- pulumi_gcp/compute/region_security_policy.py +120 -0
- pulumi_gcp/compute/region_security_policy_rule.py +6 -6
- pulumi_gcp/compute/router_peer.py +56 -35
- pulumi_gcp/compute/security_scan_config.py +8 -8
- pulumi_gcp/config/__init__.pyi +4 -0
- pulumi_gcp/config/vars.py +8 -0
- pulumi_gcp/container/_inputs.py +345 -10
- pulumi_gcp/container/cluster.py +101 -0
- pulumi_gcp/container/get_cluster.py +23 -1
- pulumi_gcp/container/outputs.py +456 -8
- pulumi_gcp/dataloss/prevention_discovery_config.py +7 -7
- pulumi_gcp/dataproc/__init__.py +2 -0
- pulumi_gcp/dataproc/_inputs.py +101 -0
- pulumi_gcp/dataproc/gdc_application_environment.py +931 -0
- pulumi_gcp/dataproc/gdc_service_instance.py +1022 -0
- pulumi_gcp/dataproc/outputs.py +94 -0
- pulumi_gcp/edgecontainer/vpn_connection.py +4 -4
- pulumi_gcp/firebase/android_app.py +2 -2
- pulumi_gcp/firebase/apple_app.py +2 -2
- pulumi_gcp/firebase/web_app.py +2 -2
- pulumi_gcp/firestore/index.py +44 -0
- pulumi_gcp/gkeonprem/_inputs.py +15 -15
- pulumi_gcp/gkeonprem/outputs.py +10 -10
- pulumi_gcp/healthcare/dataset.py +7 -7
- pulumi_gcp/healthcare/dicom_store.py +7 -7
- pulumi_gcp/healthcare/fhir_store.py +7 -7
- pulumi_gcp/healthcare/hl7_store.py +14 -14
- pulumi_gcp/iam/__init__.py +1 -0
- pulumi_gcp/iam/_inputs.py +161 -0
- pulumi_gcp/iam/outputs.py +114 -0
- pulumi_gcp/iam/principal_access_boundary_policy.py +679 -0
- pulumi_gcp/logging/metric.py +2 -2
- pulumi_gcp/looker/_inputs.py +6 -0
- pulumi_gcp/looker/instance.py +169 -321
- pulumi_gcp/looker/outputs.py +4 -0
- pulumi_gcp/memorystore/instance.py +4 -0
- pulumi_gcp/monitoring/alert_policy.py +24 -0
- pulumi_gcp/monitoring/custom_service.py +24 -0
- pulumi_gcp/monitoring/group.py +24 -0
- pulumi_gcp/monitoring/metric_descriptor.py +24 -0
- pulumi_gcp/monitoring/slo.py +24 -0
- pulumi_gcp/monitoring/uptime_check_config.py +24 -0
- pulumi_gcp/networkmanagement/__init__.py +1 -0
- pulumi_gcp/networkmanagement/vpc_flow_logs_config.py +1358 -0
- pulumi_gcp/osconfig/patch_deployment.py +8 -8
- pulumi_gcp/provider.py +40 -0
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/redis/_inputs.py +3 -3
- pulumi_gcp/redis/outputs.py +2 -2
- pulumi_gcp/securitycenter/notification_config.py +4 -16
- pulumi_gcp/securitycenter/project_notification_config.py +0 -24
- pulumi_gcp/securitycenter/v2_organization_notification_config.py +4 -16
- pulumi_gcp/spanner/__init__.py +1 -0
- pulumi_gcp/spanner/_inputs.py +9 -9
- pulumi_gcp/spanner/get_database.py +229 -0
- pulumi_gcp/spanner/get_instance.py +12 -1
- pulumi_gcp/spanner/instance.py +70 -0
- pulumi_gcp/spanner/outputs.py +46 -12
- pulumi_gcp/sql/_inputs.py +26 -0
- pulumi_gcp/sql/database_instance.py +124 -11
- pulumi_gcp/sql/get_database_instance.py +12 -1
- pulumi_gcp/sql/outputs.py +51 -0
- pulumi_gcp/storage/_inputs.py +3 -3
- pulumi_gcp/storage/outputs.py +2 -2
- pulumi_gcp/tags/tag_binding.py +4 -4
- pulumi_gcp/tags/tag_value.py +2 -2
- pulumi_gcp/transcoder/job.py +24 -0
- pulumi_gcp/vertex/_inputs.py +184 -0
- pulumi_gcp/vertex/ai_endpoint.py +394 -8
- pulumi_gcp/vertex/ai_feature_online_store_featureview.py +4 -4
- pulumi_gcp/vertex/outputs.py +166 -0
- pulumi_gcp/workbench/instance.py +21 -7
- pulumi_gcp/workflows/workflow.py +36 -0
- pulumi_gcp/workstations/workstation_config.py +8 -8
- {pulumi_gcp-8.9.0a1731366299.dist-info → pulumi_gcp-8.9.0a1731432418.dist-info}/METADATA +1 -1
- {pulumi_gcp-8.9.0a1731366299.dist-info → pulumi_gcp-8.9.0a1731432418.dist-info}/RECORD +114 -103
- {pulumi_gcp-8.9.0a1731366299.dist-info → pulumi_gcp-8.9.0a1731432418.dist-info}/WHEEL +0 -0
- {pulumi_gcp-8.9.0a1731366299.dist-info → pulumi_gcp-8.9.0a1731432418.dist-info}/top_level.txt +0 -0
pulumi_gcp/container/_inputs.py
CHANGED
@@ -179,6 +179,8 @@ __all__ = [
|
|
179
179
|
'ClusterAddonsConfigKalmConfigArgsDict',
|
180
180
|
'ClusterAddonsConfigNetworkPolicyConfigArgs',
|
181
181
|
'ClusterAddonsConfigNetworkPolicyConfigArgsDict',
|
182
|
+
'ClusterAddonsConfigParallelstoreCsiDriverConfigArgs',
|
183
|
+
'ClusterAddonsConfigParallelstoreCsiDriverConfigArgsDict',
|
182
184
|
'ClusterAddonsConfigRayOperatorConfigArgs',
|
183
185
|
'ClusterAddonsConfigRayOperatorConfigArgsDict',
|
184
186
|
'ClusterAddonsConfigRayOperatorConfigRayClusterLoggingConfigArgs',
|
@@ -213,6 +215,10 @@ __all__ = [
|
|
213
215
|
'ClusterClusterTelemetryArgsDict',
|
214
216
|
'ClusterConfidentialNodesArgs',
|
215
217
|
'ClusterConfidentialNodesArgsDict',
|
218
|
+
'ClusterControlPlaneEndpointsConfigArgs',
|
219
|
+
'ClusterControlPlaneEndpointsConfigArgsDict',
|
220
|
+
'ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgs',
|
221
|
+
'ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgsDict',
|
216
222
|
'ClusterCostManagementConfigArgs',
|
217
223
|
'ClusterCostManagementConfigArgsDict',
|
218
224
|
'ClusterDatabaseEncryptionArgs',
|
@@ -457,6 +463,8 @@ __all__ = [
|
|
457
463
|
'ClusterServiceExternalIpsConfigArgsDict',
|
458
464
|
'ClusterTpuConfigArgs',
|
459
465
|
'ClusterTpuConfigArgsDict',
|
466
|
+
'ClusterUserManagedKeysConfigArgs',
|
467
|
+
'ClusterUserManagedKeysConfigArgsDict',
|
460
468
|
'ClusterVerticalPodAutoscalingArgs',
|
461
469
|
'ClusterVerticalPodAutoscalingArgsDict',
|
462
470
|
'ClusterWorkloadAltsConfigArgs',
|
@@ -4616,6 +4624,16 @@ if not MYPY:
|
|
4616
4624
|
It can only be disabled if the nodes already do not have network policies enabled.
|
4617
4625
|
Defaults to disabled; set `disabled = false` to enable.
|
4618
4626
|
"""
|
4627
|
+
parallelstore_csi_driver_config: NotRequired[pulumi.Input['ClusterAddonsConfigParallelstoreCsiDriverConfigArgsDict']]
|
4628
|
+
"""
|
4629
|
+
The status of the Parallelstore CSI driver addon,
|
4630
|
+
which allows the usage of a Parallelstore instances as volumes.
|
4631
|
+
It is disabled by default for Standard clusters; set `enabled = true` to enable.
|
4632
|
+
It is enabled by default for Autopilot clusters with version 1.29 or later; set `enabled = true` to enable it explicitly.
|
4633
|
+
See [Enable the Parallelstore CSI driver](https://cloud.google.com/kubernetes-engine/docs/how-to/persistent-volumes/parallelstore-csi-new-volume#enable) for more information.
|
4634
|
+
|
4635
|
+
This example `addons_config` disables two addons:
|
4636
|
+
"""
|
4619
4637
|
ray_operator_configs: NotRequired[pulumi.Input[Sequence[pulumi.Input['ClusterAddonsConfigRayOperatorConfigArgsDict']]]]
|
4620
4638
|
"""
|
4621
4639
|
. The status of the [Ray Operator
|
@@ -4630,9 +4648,6 @@ if not MYPY:
|
|
4630
4648
|
clusters on
|
4631
4649
|
GKE](https://cloud.google.com/kubernetes-engine/docs/add-on/ray-on-gke/how-to/collect-view-logs-metrics)
|
4632
4650
|
for more information.
|
4633
|
-
|
4634
|
-
|
4635
|
-
This example `addons_config` disables two addons:
|
4636
4651
|
"""
|
4637
4652
|
stateful_ha_config: NotRequired[pulumi.Input['ClusterAddonsConfigStatefulHaConfigArgsDict']]
|
4638
4653
|
"""
|
@@ -4658,6 +4673,7 @@ class ClusterAddonsConfigArgs:
|
|
4658
4673
|
istio_config: Optional[pulumi.Input['ClusterAddonsConfigIstioConfigArgs']] = None,
|
4659
4674
|
kalm_config: Optional[pulumi.Input['ClusterAddonsConfigKalmConfigArgs']] = None,
|
4660
4675
|
network_policy_config: Optional[pulumi.Input['ClusterAddonsConfigNetworkPolicyConfigArgs']] = None,
|
4676
|
+
parallelstore_csi_driver_config: Optional[pulumi.Input['ClusterAddonsConfigParallelstoreCsiDriverConfigArgs']] = None,
|
4661
4677
|
ray_operator_configs: Optional[pulumi.Input[Sequence[pulumi.Input['ClusterAddonsConfigRayOperatorConfigArgs']]]] = None,
|
4662
4678
|
stateful_ha_config: Optional[pulumi.Input['ClusterAddonsConfigStatefulHaConfigArgs']] = None):
|
4663
4679
|
"""
|
@@ -4702,6 +4718,13 @@ class ClusterAddonsConfigArgs:
|
|
4702
4718
|
otherwise nothing will happen.
|
4703
4719
|
It can only be disabled if the nodes already do not have network policies enabled.
|
4704
4720
|
Defaults to disabled; set `disabled = false` to enable.
|
4721
|
+
:param pulumi.Input['ClusterAddonsConfigParallelstoreCsiDriverConfigArgs'] parallelstore_csi_driver_config: The status of the Parallelstore CSI driver addon,
|
4722
|
+
which allows the usage of a Parallelstore instances as volumes.
|
4723
|
+
It is disabled by default for Standard clusters; set `enabled = true` to enable.
|
4724
|
+
It is enabled by default for Autopilot clusters with version 1.29 or later; set `enabled = true` to enable it explicitly.
|
4725
|
+
See [Enable the Parallelstore CSI driver](https://cloud.google.com/kubernetes-engine/docs/how-to/persistent-volumes/parallelstore-csi-new-volume#enable) for more information.
|
4726
|
+
|
4727
|
+
This example `addons_config` disables two addons:
|
4705
4728
|
:param pulumi.Input[Sequence[pulumi.Input['ClusterAddonsConfigRayOperatorConfigArgs']]] ray_operator_configs: . The status of the [Ray Operator
|
4706
4729
|
addon](https://cloud.google.com/kubernetes-engine/docs/add-on/ray-on-gke/concepts/overview).
|
4707
4730
|
It is disabled by default. Set `enabled = true` to enable. The minimum
|
@@ -4714,9 +4737,6 @@ class ClusterAddonsConfigArgs:
|
|
4714
4737
|
clusters on
|
4715
4738
|
GKE](https://cloud.google.com/kubernetes-engine/docs/add-on/ray-on-gke/how-to/collect-view-logs-metrics)
|
4716
4739
|
for more information.
|
4717
|
-
|
4718
|
-
|
4719
|
-
This example `addons_config` disables two addons:
|
4720
4740
|
:param pulumi.Input['ClusterAddonsConfigStatefulHaConfigArgs'] stateful_ha_config: .
|
4721
4741
|
The status of the Stateful HA addon, which provides automatic configurable failover for stateful applications.
|
4722
4742
|
It is disabled by default for Standard clusters. Set `enabled = true` to enable.
|
@@ -4745,6 +4765,8 @@ class ClusterAddonsConfigArgs:
|
|
4745
4765
|
pulumi.set(__self__, "kalm_config", kalm_config)
|
4746
4766
|
if network_policy_config is not None:
|
4747
4767
|
pulumi.set(__self__, "network_policy_config", network_policy_config)
|
4768
|
+
if parallelstore_csi_driver_config is not None:
|
4769
|
+
pulumi.set(__self__, "parallelstore_csi_driver_config", parallelstore_csi_driver_config)
|
4748
4770
|
if ray_operator_configs is not None:
|
4749
4771
|
pulumi.set(__self__, "ray_operator_configs", ray_operator_configs)
|
4750
4772
|
if stateful_ha_config is not None:
|
@@ -4923,6 +4945,24 @@ class ClusterAddonsConfigArgs:
|
|
4923
4945
|
def network_policy_config(self, value: Optional[pulumi.Input['ClusterAddonsConfigNetworkPolicyConfigArgs']]):
|
4924
4946
|
pulumi.set(self, "network_policy_config", value)
|
4925
4947
|
|
4948
|
+
@property
|
4949
|
+
@pulumi.getter(name="parallelstoreCsiDriverConfig")
|
4950
|
+
def parallelstore_csi_driver_config(self) -> Optional[pulumi.Input['ClusterAddonsConfigParallelstoreCsiDriverConfigArgs']]:
|
4951
|
+
"""
|
4952
|
+
The status of the Parallelstore CSI driver addon,
|
4953
|
+
which allows the usage of a Parallelstore instances as volumes.
|
4954
|
+
It is disabled by default for Standard clusters; set `enabled = true` to enable.
|
4955
|
+
It is enabled by default for Autopilot clusters with version 1.29 or later; set `enabled = true` to enable it explicitly.
|
4956
|
+
See [Enable the Parallelstore CSI driver](https://cloud.google.com/kubernetes-engine/docs/how-to/persistent-volumes/parallelstore-csi-new-volume#enable) for more information.
|
4957
|
+
|
4958
|
+
This example `addons_config` disables two addons:
|
4959
|
+
"""
|
4960
|
+
return pulumi.get(self, "parallelstore_csi_driver_config")
|
4961
|
+
|
4962
|
+
@parallelstore_csi_driver_config.setter
|
4963
|
+
def parallelstore_csi_driver_config(self, value: Optional[pulumi.Input['ClusterAddonsConfigParallelstoreCsiDriverConfigArgs']]):
|
4964
|
+
pulumi.set(self, "parallelstore_csi_driver_config", value)
|
4965
|
+
|
4926
4966
|
@property
|
4927
4967
|
@pulumi.getter(name="rayOperatorConfigs")
|
4928
4968
|
def ray_operator_configs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['ClusterAddonsConfigRayOperatorConfigArgs']]]]:
|
@@ -4939,9 +4979,6 @@ class ClusterAddonsConfigArgs:
|
|
4939
4979
|
clusters on
|
4940
4980
|
GKE](https://cloud.google.com/kubernetes-engine/docs/add-on/ray-on-gke/how-to/collect-view-logs-metrics)
|
4941
4981
|
for more information.
|
4942
|
-
|
4943
|
-
|
4944
|
-
This example `addons_config` disables two addons:
|
4945
4982
|
"""
|
4946
4983
|
return pulumi.get(self, "ray_operator_configs")
|
4947
4984
|
|
@@ -5337,6 +5374,28 @@ class ClusterAddonsConfigNetworkPolicyConfigArgs:
|
|
5337
5374
|
pulumi.set(self, "disabled", value)
|
5338
5375
|
|
5339
5376
|
|
5377
|
+
if not MYPY:
|
5378
|
+
class ClusterAddonsConfigParallelstoreCsiDriverConfigArgsDict(TypedDict):
|
5379
|
+
enabled: pulumi.Input[bool]
|
5380
|
+
elif False:
|
5381
|
+
ClusterAddonsConfigParallelstoreCsiDriverConfigArgsDict: TypeAlias = Mapping[str, Any]
|
5382
|
+
|
5383
|
+
@pulumi.input_type
|
5384
|
+
class ClusterAddonsConfigParallelstoreCsiDriverConfigArgs:
|
5385
|
+
def __init__(__self__, *,
|
5386
|
+
enabled: pulumi.Input[bool]):
|
5387
|
+
pulumi.set(__self__, "enabled", enabled)
|
5388
|
+
|
5389
|
+
@property
|
5390
|
+
@pulumi.getter
|
5391
|
+
def enabled(self) -> pulumi.Input[bool]:
|
5392
|
+
return pulumi.get(self, "enabled")
|
5393
|
+
|
5394
|
+
@enabled.setter
|
5395
|
+
def enabled(self, value: pulumi.Input[bool]):
|
5396
|
+
pulumi.set(self, "enabled", value)
|
5397
|
+
|
5398
|
+
|
5340
5399
|
if not MYPY:
|
5341
5400
|
class ClusterAddonsConfigRayOperatorConfigArgsDict(TypedDict):
|
5342
5401
|
enabled: pulumi.Input[bool]
|
@@ -6478,6 +6537,90 @@ class ClusterConfidentialNodesArgs:
|
|
6478
6537
|
pulumi.set(self, "enabled", value)
|
6479
6538
|
|
6480
6539
|
|
6540
|
+
if not MYPY:
|
6541
|
+
class ClusterControlPlaneEndpointsConfigArgsDict(TypedDict):
|
6542
|
+
dns_endpoint_config: NotRequired[pulumi.Input['ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgsDict']]
|
6543
|
+
"""
|
6544
|
+
DNS endpoint configuration.
|
6545
|
+
"""
|
6546
|
+
elif False:
|
6547
|
+
ClusterControlPlaneEndpointsConfigArgsDict: TypeAlias = Mapping[str, Any]
|
6548
|
+
|
6549
|
+
@pulumi.input_type
|
6550
|
+
class ClusterControlPlaneEndpointsConfigArgs:
|
6551
|
+
def __init__(__self__, *,
|
6552
|
+
dns_endpoint_config: Optional[pulumi.Input['ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgs']] = None):
|
6553
|
+
"""
|
6554
|
+
:param pulumi.Input['ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgs'] dns_endpoint_config: DNS endpoint configuration.
|
6555
|
+
"""
|
6556
|
+
if dns_endpoint_config is not None:
|
6557
|
+
pulumi.set(__self__, "dns_endpoint_config", dns_endpoint_config)
|
6558
|
+
|
6559
|
+
@property
|
6560
|
+
@pulumi.getter(name="dnsEndpointConfig")
|
6561
|
+
def dns_endpoint_config(self) -> Optional[pulumi.Input['ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgs']]:
|
6562
|
+
"""
|
6563
|
+
DNS endpoint configuration.
|
6564
|
+
"""
|
6565
|
+
return pulumi.get(self, "dns_endpoint_config")
|
6566
|
+
|
6567
|
+
@dns_endpoint_config.setter
|
6568
|
+
def dns_endpoint_config(self, value: Optional[pulumi.Input['ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgs']]):
|
6569
|
+
pulumi.set(self, "dns_endpoint_config", value)
|
6570
|
+
|
6571
|
+
|
6572
|
+
if not MYPY:
|
6573
|
+
class ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgsDict(TypedDict):
|
6574
|
+
allow_external_traffic: NotRequired[pulumi.Input[bool]]
|
6575
|
+
"""
|
6576
|
+
Controls whether user traffic is allowed over this endpoint. Note that GCP-managed services may still use the endpoint even if this is false.
|
6577
|
+
"""
|
6578
|
+
endpoint: NotRequired[pulumi.Input[str]]
|
6579
|
+
"""
|
6580
|
+
The cluster's DNS endpoint.
|
6581
|
+
"""
|
6582
|
+
elif False:
|
6583
|
+
ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgsDict: TypeAlias = Mapping[str, Any]
|
6584
|
+
|
6585
|
+
@pulumi.input_type
|
6586
|
+
class ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgs:
|
6587
|
+
def __init__(__self__, *,
|
6588
|
+
allow_external_traffic: Optional[pulumi.Input[bool]] = None,
|
6589
|
+
endpoint: Optional[pulumi.Input[str]] = None):
|
6590
|
+
"""
|
6591
|
+
:param pulumi.Input[bool] allow_external_traffic: Controls whether user traffic is allowed over this endpoint. Note that GCP-managed services may still use the endpoint even if this is false.
|
6592
|
+
:param pulumi.Input[str] endpoint: The cluster's DNS endpoint.
|
6593
|
+
"""
|
6594
|
+
if allow_external_traffic is not None:
|
6595
|
+
pulumi.set(__self__, "allow_external_traffic", allow_external_traffic)
|
6596
|
+
if endpoint is not None:
|
6597
|
+
pulumi.set(__self__, "endpoint", endpoint)
|
6598
|
+
|
6599
|
+
@property
|
6600
|
+
@pulumi.getter(name="allowExternalTraffic")
|
6601
|
+
def allow_external_traffic(self) -> Optional[pulumi.Input[bool]]:
|
6602
|
+
"""
|
6603
|
+
Controls whether user traffic is allowed over this endpoint. Note that GCP-managed services may still use the endpoint even if this is false.
|
6604
|
+
"""
|
6605
|
+
return pulumi.get(self, "allow_external_traffic")
|
6606
|
+
|
6607
|
+
@allow_external_traffic.setter
|
6608
|
+
def allow_external_traffic(self, value: Optional[pulumi.Input[bool]]):
|
6609
|
+
pulumi.set(self, "allow_external_traffic", value)
|
6610
|
+
|
6611
|
+
@property
|
6612
|
+
@pulumi.getter
|
6613
|
+
def endpoint(self) -> Optional[pulumi.Input[str]]:
|
6614
|
+
"""
|
6615
|
+
The cluster's DNS endpoint.
|
6616
|
+
"""
|
6617
|
+
return pulumi.get(self, "endpoint")
|
6618
|
+
|
6619
|
+
@endpoint.setter
|
6620
|
+
def endpoint(self, value: Optional[pulumi.Input[str]]):
|
6621
|
+
pulumi.set(self, "endpoint", value)
|
6622
|
+
|
6623
|
+
|
6481
6624
|
if not MYPY:
|
6482
6625
|
class ClusterCostManagementConfigArgsDict(TypedDict):
|
6483
6626
|
enabled: pulumi.Input[bool]
|
@@ -7805,6 +7948,10 @@ if not MYPY:
|
|
7805
7948
|
Whether Kubernetes master is
|
7806
7949
|
accessible via Google Compute Engine Public IPs.
|
7807
7950
|
"""
|
7951
|
+
private_endpoint_enforcement_enabled: NotRequired[pulumi.Input[bool]]
|
7952
|
+
"""
|
7953
|
+
Whether authorized networks is enforced on the private endpoint or not. Defaults to false.
|
7954
|
+
"""
|
7808
7955
|
elif False:
|
7809
7956
|
ClusterMasterAuthorizedNetworksConfigArgsDict: TypeAlias = Mapping[str, Any]
|
7810
7957
|
|
@@ -7812,17 +7959,21 @@ elif False:
|
|
7812
7959
|
class ClusterMasterAuthorizedNetworksConfigArgs:
|
7813
7960
|
def __init__(__self__, *,
|
7814
7961
|
cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input['ClusterMasterAuthorizedNetworksConfigCidrBlockArgs']]]] = None,
|
7815
|
-
gcp_public_cidrs_access_enabled: Optional[pulumi.Input[bool]] = None
|
7962
|
+
gcp_public_cidrs_access_enabled: Optional[pulumi.Input[bool]] = None,
|
7963
|
+
private_endpoint_enforcement_enabled: Optional[pulumi.Input[bool]] = None):
|
7816
7964
|
"""
|
7817
7965
|
:param pulumi.Input[Sequence[pulumi.Input['ClusterMasterAuthorizedNetworksConfigCidrBlockArgs']]] cidr_blocks: External networks that can access the
|
7818
7966
|
Kubernetes cluster master through HTTPS.
|
7819
7967
|
:param pulumi.Input[bool] gcp_public_cidrs_access_enabled: Whether Kubernetes master is
|
7820
7968
|
accessible via Google Compute Engine Public IPs.
|
7969
|
+
:param pulumi.Input[bool] private_endpoint_enforcement_enabled: Whether authorized networks is enforced on the private endpoint or not. Defaults to false.
|
7821
7970
|
"""
|
7822
7971
|
if cidr_blocks is not None:
|
7823
7972
|
pulumi.set(__self__, "cidr_blocks", cidr_blocks)
|
7824
7973
|
if gcp_public_cidrs_access_enabled is not None:
|
7825
7974
|
pulumi.set(__self__, "gcp_public_cidrs_access_enabled", gcp_public_cidrs_access_enabled)
|
7975
|
+
if private_endpoint_enforcement_enabled is not None:
|
7976
|
+
pulumi.set(__self__, "private_endpoint_enforcement_enabled", private_endpoint_enforcement_enabled)
|
7826
7977
|
|
7827
7978
|
@property
|
7828
7979
|
@pulumi.getter(name="cidrBlocks")
|
@@ -7850,6 +8001,18 @@ class ClusterMasterAuthorizedNetworksConfigArgs:
|
|
7850
8001
|
def gcp_public_cidrs_access_enabled(self, value: Optional[pulumi.Input[bool]]):
|
7851
8002
|
pulumi.set(self, "gcp_public_cidrs_access_enabled", value)
|
7852
8003
|
|
8004
|
+
@property
|
8005
|
+
@pulumi.getter(name="privateEndpointEnforcementEnabled")
|
8006
|
+
def private_endpoint_enforcement_enabled(self) -> Optional[pulumi.Input[bool]]:
|
8007
|
+
"""
|
8008
|
+
Whether authorized networks is enforced on the private endpoint or not. Defaults to false.
|
8009
|
+
"""
|
8010
|
+
return pulumi.get(self, "private_endpoint_enforcement_enabled")
|
8011
|
+
|
8012
|
+
@private_endpoint_enforcement_enabled.setter
|
8013
|
+
def private_endpoint_enforcement_enabled(self, value: Optional[pulumi.Input[bool]]):
|
8014
|
+
pulumi.set(self, "private_endpoint_enforcement_enabled", value)
|
8015
|
+
|
7853
8016
|
|
7854
8017
|
if not MYPY:
|
7855
8018
|
class ClusterMasterAuthorizedNetworksConfigCidrBlockArgsDict(TypedDict):
|
@@ -15723,6 +15886,178 @@ class ClusterTpuConfigArgs:
|
|
15723
15886
|
pulumi.set(self, "use_service_networking", value)
|
15724
15887
|
|
15725
15888
|
|
15889
|
+
if not MYPY:
|
15890
|
+
class ClusterUserManagedKeysConfigArgsDict(TypedDict):
|
15891
|
+
aggregation_ca: NotRequired[pulumi.Input[str]]
|
15892
|
+
"""
|
15893
|
+
The Certificate Authority Service caPool to use for the aggreation CA in this cluster.
|
15894
|
+
"""
|
15895
|
+
cluster_ca: NotRequired[pulumi.Input[str]]
|
15896
|
+
"""
|
15897
|
+
The Certificate Authority Service caPool to use for the cluster CA in this cluster.
|
15898
|
+
"""
|
15899
|
+
control_plane_disk_encryption_key: NotRequired[pulumi.Input[str]]
|
15900
|
+
"""
|
15901
|
+
The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control plane nodes.
|
15902
|
+
"""
|
15903
|
+
etcd_api_ca: NotRequired[pulumi.Input[str]]
|
15904
|
+
"""
|
15905
|
+
The Certificate Authority Service caPool to use for the etcd API CA in this cluster.
|
15906
|
+
"""
|
15907
|
+
etcd_peer_ca: NotRequired[pulumi.Input[str]]
|
15908
|
+
"""
|
15909
|
+
The Certificate Authority Service caPool to use for the etcd peer CA in this cluster.
|
15910
|
+
"""
|
15911
|
+
gkeops_etcd_backup_encryption_key: NotRequired[pulumi.Input[str]]
|
15912
|
+
"""
|
15913
|
+
Resource path of the Cloud KMS cryptoKey to use for encryption of internal etcd backups.
|
15914
|
+
"""
|
15915
|
+
service_account_signing_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
15916
|
+
"""
|
15917
|
+
The Cloud KMS cryptoKeyVersions to use for signing service account JWTs issued by this cluster.
|
15918
|
+
"""
|
15919
|
+
service_account_verification_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
15920
|
+
"""
|
15921
|
+
The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs issued by this cluster.
|
15922
|
+
"""
|
15923
|
+
elif False:
|
15924
|
+
ClusterUserManagedKeysConfigArgsDict: TypeAlias = Mapping[str, Any]
|
15925
|
+
|
15926
|
+
@pulumi.input_type
|
15927
|
+
class ClusterUserManagedKeysConfigArgs:
|
15928
|
+
def __init__(__self__, *,
|
15929
|
+
aggregation_ca: Optional[pulumi.Input[str]] = None,
|
15930
|
+
cluster_ca: Optional[pulumi.Input[str]] = None,
|
15931
|
+
control_plane_disk_encryption_key: Optional[pulumi.Input[str]] = None,
|
15932
|
+
etcd_api_ca: Optional[pulumi.Input[str]] = None,
|
15933
|
+
etcd_peer_ca: Optional[pulumi.Input[str]] = None,
|
15934
|
+
gkeops_etcd_backup_encryption_key: Optional[pulumi.Input[str]] = None,
|
15935
|
+
service_account_signing_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
15936
|
+
service_account_verification_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
15937
|
+
"""
|
15938
|
+
:param pulumi.Input[str] aggregation_ca: The Certificate Authority Service caPool to use for the aggreation CA in this cluster.
|
15939
|
+
:param pulumi.Input[str] cluster_ca: The Certificate Authority Service caPool to use for the cluster CA in this cluster.
|
15940
|
+
:param pulumi.Input[str] control_plane_disk_encryption_key: The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control plane nodes.
|
15941
|
+
:param pulumi.Input[str] etcd_api_ca: The Certificate Authority Service caPool to use for the etcd API CA in this cluster.
|
15942
|
+
:param pulumi.Input[str] etcd_peer_ca: The Certificate Authority Service caPool to use for the etcd peer CA in this cluster.
|
15943
|
+
:param pulumi.Input[str] gkeops_etcd_backup_encryption_key: Resource path of the Cloud KMS cryptoKey to use for encryption of internal etcd backups.
|
15944
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_signing_keys: The Cloud KMS cryptoKeyVersions to use for signing service account JWTs issued by this cluster.
|
15945
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_verification_keys: The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs issued by this cluster.
|
15946
|
+
"""
|
15947
|
+
if aggregation_ca is not None:
|
15948
|
+
pulumi.set(__self__, "aggregation_ca", aggregation_ca)
|
15949
|
+
if cluster_ca is not None:
|
15950
|
+
pulumi.set(__self__, "cluster_ca", cluster_ca)
|
15951
|
+
if control_plane_disk_encryption_key is not None:
|
15952
|
+
pulumi.set(__self__, "control_plane_disk_encryption_key", control_plane_disk_encryption_key)
|
15953
|
+
if etcd_api_ca is not None:
|
15954
|
+
pulumi.set(__self__, "etcd_api_ca", etcd_api_ca)
|
15955
|
+
if etcd_peer_ca is not None:
|
15956
|
+
pulumi.set(__self__, "etcd_peer_ca", etcd_peer_ca)
|
15957
|
+
if gkeops_etcd_backup_encryption_key is not None:
|
15958
|
+
pulumi.set(__self__, "gkeops_etcd_backup_encryption_key", gkeops_etcd_backup_encryption_key)
|
15959
|
+
if service_account_signing_keys is not None:
|
15960
|
+
pulumi.set(__self__, "service_account_signing_keys", service_account_signing_keys)
|
15961
|
+
if service_account_verification_keys is not None:
|
15962
|
+
pulumi.set(__self__, "service_account_verification_keys", service_account_verification_keys)
|
15963
|
+
|
15964
|
+
@property
|
15965
|
+
@pulumi.getter(name="aggregationCa")
|
15966
|
+
def aggregation_ca(self) -> Optional[pulumi.Input[str]]:
|
15967
|
+
"""
|
15968
|
+
The Certificate Authority Service caPool to use for the aggreation CA in this cluster.
|
15969
|
+
"""
|
15970
|
+
return pulumi.get(self, "aggregation_ca")
|
15971
|
+
|
15972
|
+
@aggregation_ca.setter
|
15973
|
+
def aggregation_ca(self, value: Optional[pulumi.Input[str]]):
|
15974
|
+
pulumi.set(self, "aggregation_ca", value)
|
15975
|
+
|
15976
|
+
@property
|
15977
|
+
@pulumi.getter(name="clusterCa")
|
15978
|
+
def cluster_ca(self) -> Optional[pulumi.Input[str]]:
|
15979
|
+
"""
|
15980
|
+
The Certificate Authority Service caPool to use for the cluster CA in this cluster.
|
15981
|
+
"""
|
15982
|
+
return pulumi.get(self, "cluster_ca")
|
15983
|
+
|
15984
|
+
@cluster_ca.setter
|
15985
|
+
def cluster_ca(self, value: Optional[pulumi.Input[str]]):
|
15986
|
+
pulumi.set(self, "cluster_ca", value)
|
15987
|
+
|
15988
|
+
@property
|
15989
|
+
@pulumi.getter(name="controlPlaneDiskEncryptionKey")
|
15990
|
+
def control_plane_disk_encryption_key(self) -> Optional[pulumi.Input[str]]:
|
15991
|
+
"""
|
15992
|
+
The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control plane nodes.
|
15993
|
+
"""
|
15994
|
+
return pulumi.get(self, "control_plane_disk_encryption_key")
|
15995
|
+
|
15996
|
+
@control_plane_disk_encryption_key.setter
|
15997
|
+
def control_plane_disk_encryption_key(self, value: Optional[pulumi.Input[str]]):
|
15998
|
+
pulumi.set(self, "control_plane_disk_encryption_key", value)
|
15999
|
+
|
16000
|
+
@property
|
16001
|
+
@pulumi.getter(name="etcdApiCa")
|
16002
|
+
def etcd_api_ca(self) -> Optional[pulumi.Input[str]]:
|
16003
|
+
"""
|
16004
|
+
The Certificate Authority Service caPool to use for the etcd API CA in this cluster.
|
16005
|
+
"""
|
16006
|
+
return pulumi.get(self, "etcd_api_ca")
|
16007
|
+
|
16008
|
+
@etcd_api_ca.setter
|
16009
|
+
def etcd_api_ca(self, value: Optional[pulumi.Input[str]]):
|
16010
|
+
pulumi.set(self, "etcd_api_ca", value)
|
16011
|
+
|
16012
|
+
@property
|
16013
|
+
@pulumi.getter(name="etcdPeerCa")
|
16014
|
+
def etcd_peer_ca(self) -> Optional[pulumi.Input[str]]:
|
16015
|
+
"""
|
16016
|
+
The Certificate Authority Service caPool to use for the etcd peer CA in this cluster.
|
16017
|
+
"""
|
16018
|
+
return pulumi.get(self, "etcd_peer_ca")
|
16019
|
+
|
16020
|
+
@etcd_peer_ca.setter
|
16021
|
+
def etcd_peer_ca(self, value: Optional[pulumi.Input[str]]):
|
16022
|
+
pulumi.set(self, "etcd_peer_ca", value)
|
16023
|
+
|
16024
|
+
@property
|
16025
|
+
@pulumi.getter(name="gkeopsEtcdBackupEncryptionKey")
|
16026
|
+
def gkeops_etcd_backup_encryption_key(self) -> Optional[pulumi.Input[str]]:
|
16027
|
+
"""
|
16028
|
+
Resource path of the Cloud KMS cryptoKey to use for encryption of internal etcd backups.
|
16029
|
+
"""
|
16030
|
+
return pulumi.get(self, "gkeops_etcd_backup_encryption_key")
|
16031
|
+
|
16032
|
+
@gkeops_etcd_backup_encryption_key.setter
|
16033
|
+
def gkeops_etcd_backup_encryption_key(self, value: Optional[pulumi.Input[str]]):
|
16034
|
+
pulumi.set(self, "gkeops_etcd_backup_encryption_key", value)
|
16035
|
+
|
16036
|
+
@property
|
16037
|
+
@pulumi.getter(name="serviceAccountSigningKeys")
|
16038
|
+
def service_account_signing_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
16039
|
+
"""
|
16040
|
+
The Cloud KMS cryptoKeyVersions to use for signing service account JWTs issued by this cluster.
|
16041
|
+
"""
|
16042
|
+
return pulumi.get(self, "service_account_signing_keys")
|
16043
|
+
|
16044
|
+
@service_account_signing_keys.setter
|
16045
|
+
def service_account_signing_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
16046
|
+
pulumi.set(self, "service_account_signing_keys", value)
|
16047
|
+
|
16048
|
+
@property
|
16049
|
+
@pulumi.getter(name="serviceAccountVerificationKeys")
|
16050
|
+
def service_account_verification_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
16051
|
+
"""
|
16052
|
+
The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs issued by this cluster.
|
16053
|
+
"""
|
16054
|
+
return pulumi.get(self, "service_account_verification_keys")
|
16055
|
+
|
16056
|
+
@service_account_verification_keys.setter
|
16057
|
+
def service_account_verification_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
16058
|
+
pulumi.set(self, "service_account_verification_keys", value)
|
16059
|
+
|
16060
|
+
|
15726
16061
|
if not MYPY:
|
15727
16062
|
class ClusterVerticalPodAutoscalingArgsDict(TypedDict):
|
15728
16063
|
enabled: pulumi.Input[bool]
|