All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.pulumi.gcp.accesscontextmanager.kotlin.ServicePerimeterDryRunResourceArgs.kt Maven / Gradle / Ivy

Go to download

Build cloud applications and infrastructure by combining the safety and reliability of infrastructure as code with the power of the Kotlin programming language.

There is a newer version: 8.10.0.0
Show newest version
@file:Suppress("NAME_SHADOWING", "DEPRECATION")

package com.pulumi.gcp.accesscontextmanager.kotlin

import com.pulumi.core.Output
import com.pulumi.core.Output.of
import com.pulumi.gcp.accesscontextmanager.ServicePerimeterDryRunResourceArgs.builder
import com.pulumi.kotlin.ConvertibleToJava
import com.pulumi.kotlin.PulumiTagMarker
import kotlin.String
import kotlin.Suppress
import kotlin.jvm.JvmName

/**
 * Allows configuring a single GCP resource that should be inside of the `spec` block of a dry run service perimeter.
 * This resource is intended to be used in cases where it is not possible to compile a full list
 * of projects to include in a `gcp.accesscontextmanager.ServicePerimeter` resource,
 * to enable them to be added separately.
 * If your perimeter is NOT in dry-run mode use `gcp.accesscontextmanager.ServicePerimeterResource` instead.
 * > **Note:** If this resource is used alongside a `gcp.accesscontextmanager.ServicePerimeter` resource,
 * the service perimeter resource must have a `lifecycle` block with `ignore_changes = [spec[0].resources]` so
 * they don't fight over which resources should be in the policy.
 * To get more information about ServicePerimeterDryRunResource, see:
 * * [API documentation](https://cloud.google.com/access-context-manager/docs/reference/rest/v1/accessPolicies.servicePerimeters)
 * * How-to Guides
 *     * [Service Perimeter Quickstart](https://cloud.google.com/vpc-service-controls/docs/quickstart)
 * > **Warning:** If you are using User ADCs (Application Default Credentials) with this resource,
 * you must specify a `billing_project` and set `user_project_override` to true
 * in the provider configuration. Otherwise the ACM API will return a 403 error.
 * Your account must have the `serviceusage.services.use` permission on the
 * `billing_project` you defined.
 * ## Example Usage
 * ### Access Context Manager Service Perimeter Dry Run Resource Basic
 * 
 * ```typescript
 * import * as pulumi from "@pulumi/pulumi";
 * import * as gcp from "@pulumi/gcp";
 * const access_policy = new gcp.accesscontextmanager.AccessPolicy("access-policy", {
 *     parent: "organizations/123456789",
 *     title: "my policy",
 * });
 * const service_perimeter_dry_run_resourceServicePerimeter = new gcp.accesscontextmanager.ServicePerimeter("service-perimeter-dry-run-resource", {
 *     parent: pulumi.interpolate`accessPolicies/${access_policy.name}`,
 *     name: pulumi.interpolate`accessPolicies/${access_policy.name}/servicePerimeters/restrict_all`,
 *     title: "restrict_all",
 *     spec: {
 *         restrictedServices: ["storage.googleapis.com"],
 *     },
 *     useExplicitDryRunSpec: true,
 * });
 * const service_perimeter_dry_run_resource = new gcp.accesscontextmanager.ServicePerimeterDryRunResource("service-perimeter-dry-run-resource", {
 *     perimeterName: service_perimeter_dry_run_resourceServicePerimeter.name,
 *     resource: "projects/987654321",
 * });
 * ```
 * ```python
 * import pulumi
 * import pulumi_gcp as gcp
 * access_policy = gcp.accesscontextmanager.AccessPolicy("access-policy",
 *     parent="organizations/123456789",
 *     title="my policy")
 * service_perimeter_dry_run_resource_service_perimeter = gcp.accesscontextmanager.ServicePerimeter("service-perimeter-dry-run-resource",
 *     parent=access_policy.name.apply(lambda name: f"accessPolicies/{name}"),
 *     name=access_policy.name.apply(lambda name: f"accessPolicies/{name}/servicePerimeters/restrict_all"),
 *     title="restrict_all",
 *     spec=gcp.accesscontextmanager.ServicePerimeterSpecArgs(
 *         restricted_services=["storage.googleapis.com"],
 *     ),
 *     use_explicit_dry_run_spec=True)
 * service_perimeter_dry_run_resource = gcp.accesscontextmanager.ServicePerimeterDryRunResource("service-perimeter-dry-run-resource",
 *     perimeter_name=service_perimeter_dry_run_resource_service_perimeter.name,
 *     resource="projects/987654321")
 * ```
 * ```csharp
 * using System.Collections.Generic;
 * using System.Linq;
 * using Pulumi;
 * using Gcp = Pulumi.Gcp;
 * return await Deployment.RunAsync(() =>
 * {
 *     var access_policy = new Gcp.AccessContextManager.AccessPolicy("access-policy", new()
 *     {
 *         Parent = "organizations/123456789",
 *         Title = "my policy",
 *     });
 *     var service_perimeter_dry_run_resourceServicePerimeter = new Gcp.AccessContextManager.ServicePerimeter("service-perimeter-dry-run-resource", new()
 *     {
 *         Parent = access_policy.Name.Apply(name => $"accessPolicies/{name}"),
 *         Name = access_policy.Name.Apply(name => $"accessPolicies/{name}/servicePerimeters/restrict_all"),
 *         Title = "restrict_all",
 *         Spec = new Gcp.AccessContextManager.Inputs.ServicePerimeterSpecArgs
 *         {
 *             RestrictedServices = new[]
 *             {
 *                 "storage.googleapis.com",
 *             },
 *         },
 *         UseExplicitDryRunSpec = true,
 *     });
 *     var service_perimeter_dry_run_resource = new Gcp.AccessContextManager.ServicePerimeterDryRunResource("service-perimeter-dry-run-resource", new()
 *     {
 *         PerimeterName = service_perimeter_dry_run_resourceServicePerimeter.Name,
 *         Resource = "projects/987654321",
 *     });
 * });
 * ```
 * ```go
 * package main
 * import (
 * 	"fmt"
 * 	"github.com/pulumi/pulumi-gcp/sdk/v7/go/gcp/accesscontextmanager"
 * 	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
 * )
 * func main() {
 * 	pulumi.Run(func(ctx *pulumi.Context) error {
 * 		_, err := accesscontextmanager.NewAccessPolicy(ctx, "access-policy", &accesscontextmanager.AccessPolicyArgs{
 * 			Parent: pulumi.String("organizations/123456789"),
 * 			Title:  pulumi.String("my policy"),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = accesscontextmanager.NewServicePerimeter(ctx, "service-perimeter-dry-run-resource", &accesscontextmanager.ServicePerimeterArgs{
 * 			Parent: access_policy.Name.ApplyT(func(name string) (string, error) {
 * 				return fmt.Sprintf("accessPolicies/%v", name), nil
 * 			}).(pulumi.StringOutput),
 * 			Name: access_policy.Name.ApplyT(func(name string) (string, error) {
 * 				return fmt.Sprintf("accessPolicies/%v/servicePerimeters/restrict_all", name), nil
 * 			}).(pulumi.StringOutput),
 * 			Title: pulumi.String("restrict_all"),
 * 			Spec: &accesscontextmanager.ServicePerimeterSpecArgs{
 * 				RestrictedServices: pulumi.StringArray{
 * 					pulumi.String("storage.googleapis.com"),
 * 				},
 * 			},
 * 			UseExplicitDryRunSpec: pulumi.Bool(true),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		_, err = accesscontextmanager.NewServicePerimeterDryRunResource(ctx, "service-perimeter-dry-run-resource", &accesscontextmanager.ServicePerimeterDryRunResourceArgs{
 * 			PerimeterName: service_perimeter_dry_run_resourceServicePerimeter.Name,
 * 			Resource:      pulumi.String("projects/987654321"),
 * 		})
 * 		if err != nil {
 * 			return err
 * 		}
 * 		return nil
 * 	})
 * }
 * ```
 * ```java
 * package generated_program;
 * import com.pulumi.Context;
 * import com.pulumi.Pulumi;
 * import com.pulumi.core.Output;
 * import com.pulumi.gcp.accesscontextmanager.AccessPolicy;
 * import com.pulumi.gcp.accesscontextmanager.AccessPolicyArgs;
 * import com.pulumi.gcp.accesscontextmanager.ServicePerimeter;
 * import com.pulumi.gcp.accesscontextmanager.ServicePerimeterArgs;
 * import com.pulumi.gcp.accesscontextmanager.inputs.ServicePerimeterSpecArgs;
 * import com.pulumi.gcp.accesscontextmanager.ServicePerimeterDryRunResource;
 * import com.pulumi.gcp.accesscontextmanager.ServicePerimeterDryRunResourceArgs;
 * import java.util.List;
 * import java.util.ArrayList;
 * import java.util.Map;
 * import java.io.File;
 * import java.nio.file.Files;
 * import java.nio.file.Paths;
 * public class App {
 *     public static void main(String[] args) {
 *         Pulumi.run(App::stack);
 *     }
 *     public static void stack(Context ctx) {
 *         var access_policy = new AccessPolicy("access-policy", AccessPolicyArgs.builder()
 *             .parent("organizations/123456789")
 *             .title("my policy")
 *             .build());
 *         var service_perimeter_dry_run_resourceServicePerimeter = new ServicePerimeter("service-perimeter-dry-run-resourceServicePerimeter", ServicePerimeterArgs.builder()
 *             .parent(access_policy.name().applyValue(name -> String.format("accessPolicies/%s", name)))
 *             .name(access_policy.name().applyValue(name -> String.format("accessPolicies/%s/servicePerimeters/restrict_all", name)))
 *             .title("restrict_all")
 *             .spec(ServicePerimeterSpecArgs.builder()
 *                 .restrictedServices("storage.googleapis.com")
 *                 .build())
 *             .useExplicitDryRunSpec(true)
 *             .build());
 *         var service_perimeter_dry_run_resource = new ServicePerimeterDryRunResource("service-perimeter-dry-run-resource", ServicePerimeterDryRunResourceArgs.builder()
 *             .perimeterName(service_perimeter_dry_run_resourceServicePerimeter.name())
 *             .resource("projects/987654321")
 *             .build());
 *     }
 * }
 * ```
 * ```yaml
 * resources:
 *   service-perimeter-dry-run-resource:
 *     type: gcp:accesscontextmanager:ServicePerimeterDryRunResource
 *     properties:
 *       perimeterName: ${["service-perimeter-dry-run-resourceServicePerimeter"].name}
 *       resource: projects/987654321
 *   service-perimeter-dry-run-resourceServicePerimeter:
 *     type: gcp:accesscontextmanager:ServicePerimeter
 *     name: service-perimeter-dry-run-resource
 *     properties:
 *       parent: accessPolicies/${["access-policy"].name}
 *       name: accessPolicies/${["access-policy"].name}/servicePerimeters/restrict_all
 *       title: restrict_all
 *       spec:
 *         restrictedServices:
 *           - storage.googleapis.com
 *       useExplicitDryRunSpec: true
 *   access-policy:
 *     type: gcp:accesscontextmanager:AccessPolicy
 *     properties:
 *       parent: organizations/123456789
 *       title: my policy
 * ```
 * 
 * ## Import
 * ServicePerimeterDryRunResource can be imported using any of these accepted formats:
 * * `{{perimeter_name}}/{{resource}}`
 * When using the `pulumi import` command, ServicePerimeterDryRunResource can be imported using one of the formats above. For example:
 * ```sh
 * $ pulumi import gcp:accesscontextmanager/servicePerimeterDryRunResource:ServicePerimeterDryRunResource default {{perimeter_name}}/{{resource}}
 * ```
 * @property perimeterName The name of the Service Perimeter to add this resource to.
 * - - -
 * @property resource A GCP resource that is inside of the service perimeter.
 * Currently only projects are allowed.
 * Format: projects/{project_number}
 */
public data class ServicePerimeterDryRunResourceArgs(
    public val perimeterName: Output? = null,
    public val resource: Output? = null,
) : ConvertibleToJava {
    override fun toJava(): com.pulumi.gcp.accesscontextmanager.ServicePerimeterDryRunResourceArgs =
        com.pulumi.gcp.accesscontextmanager.ServicePerimeterDryRunResourceArgs.builder()
            .perimeterName(perimeterName?.applyValue({ args0 -> args0 }))
            .resource(resource?.applyValue({ args0 -> args0 })).build()
}

/**
 * Builder for [ServicePerimeterDryRunResourceArgs].
 */
@PulumiTagMarker
public class ServicePerimeterDryRunResourceArgsBuilder internal constructor() {
    private var perimeterName: Output? = null

    private var resource: Output? = null

    /**
     * @param value The name of the Service Perimeter to add this resource to.
     * - - -
     */
    @JvmName("nskiovsogggmxnxj")
    public suspend fun perimeterName(`value`: Output) {
        this.perimeterName = value
    }

    /**
     * @param value A GCP resource that is inside of the service perimeter.
     * Currently only projects are allowed.
     * Format: projects/{project_number}
     */
    @JvmName("muggdtomrlhkhwsy")
    public suspend fun resource(`value`: Output) {
        this.resource = value
    }

    /**
     * @param value The name of the Service Perimeter to add this resource to.
     * - - -
     */
    @JvmName("uqimgorysrvfqkkh")
    public suspend fun perimeterName(`value`: String?) {
        val toBeMapped = value
        val mapped = toBeMapped?.let({ args0 -> of(args0) })
        this.perimeterName = mapped
    }

    /**
     * @param value A GCP resource that is inside of the service perimeter.
     * Currently only projects are allowed.
     * Format: projects/{project_number}
     */
    @JvmName("yrxhmebiaediyubp")
    public suspend fun resource(`value`: String?) {
        val toBeMapped = value
        val mapped = toBeMapped?.let({ args0 -> of(args0) })
        this.resource = mapped
    }

    internal fun build(): ServicePerimeterDryRunResourceArgs = ServicePerimeterDryRunResourceArgs(
        perimeterName = perimeterName,
        resource = resource,
    )
}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy