Many resources are needed to download a project. Please understand that we have to compensate our server costs. Thank you in advance. Project price only 1 $
You can buy this project and download/modify it how often you want.
Build cloud applications and infrastructure by combining the safety and reliability of infrastructure as code with the power of the Kotlin programming language.
@file:Suppress("NAME_SHADOWING", "DEPRECATION")
package com.pulumi.gcp.gkehub.kotlin.inputs
import com.pulumi.core.Output
import com.pulumi.core.Output.of
import com.pulumi.gcp.gkehub.inputs.FeatureMembershipPolicycontrollerPolicyControllerHubConfigArgs.builder
import com.pulumi.kotlin.ConvertibleToJava
import com.pulumi.kotlin.PulumiTagMarker
import com.pulumi.kotlin.applySuspend
import kotlin.Boolean
import kotlin.Int
import kotlin.String
import kotlin.Suppress
import kotlin.Unit
import kotlin.collections.List
import kotlin.jvm.JvmName
/**
*
* @property auditIntervalSeconds Sets the interval for Policy Controller Audit Scans (in seconds). When set to 0, this disables audit functionality altogether.
* @property constraintViolationLimit The maximum number of audit violations to be stored in a constraint. If not set, the default of 20 will be used.
* @property deploymentConfigs Map of deployment configs to deployments ("admission", "audit", "mutation").
* @property exemptableNamespaces The set of namespaces that are excluded from Policy Controller checks. Namespaces do not need to currently exist on the cluster.
* @property installSpec Configures the mode of the Policy Controller installation. Must be one of `INSTALL_SPEC_NOT_INSTALLED`, `INSTALL_SPEC_ENABLED`, `INSTALL_SPEC_SUSPENDED` or `INSTALL_SPEC_DETACHED`.
* @property logDeniesEnabled Logs all denies and dry run failures.
* @property monitoring Specifies the backends Policy Controller should export metrics to. Structure is documented below.
* @property mutationEnabled Enables mutation in policy controller. If true, mutation CRDs, webhook, and controller deployment will be deployed to the cluster.
* @property policyContent Specifies the desired policy content on the cluster. Structure is documented below.
* @property referentialRulesEnabled Enables the ability to use Constraint Templates that reference to objects other than the object currently being evaluated.
*/
public data class FeatureMembershipPolicycontrollerPolicyControllerHubConfigArgs(
public val auditIntervalSeconds: Output? = null,
public val constraintViolationLimit: Output? = null,
public val deploymentConfigs: Output>? =
null,
public val exemptableNamespaces: Output>? = null,
public val installSpec: Output? = null,
public val logDeniesEnabled: Output? = null,
public val monitoring: Output? = null,
public val mutationEnabled: Output? = null,
public val policyContent: Output? = null,
public val referentialRulesEnabled: Output? = null,
) :
ConvertibleToJava {
override fun toJava(): com.pulumi.gcp.gkehub.inputs.FeatureMembershipPolicycontrollerPolicyControllerHubConfigArgs =
com.pulumi.gcp.gkehub.inputs.FeatureMembershipPolicycontrollerPolicyControllerHubConfigArgs.builder()
.auditIntervalSeconds(auditIntervalSeconds?.applyValue({ args0 -> args0 }))
.constraintViolationLimit(constraintViolationLimit?.applyValue({ args0 -> args0 }))
.deploymentConfigs(
deploymentConfigs?.applyValue({ args0 ->
args0.map({ args0 ->
args0.let({ args0 ->
args0.toJava()
})
})
}),
)
.exemptableNamespaces(exemptableNamespaces?.applyValue({ args0 -> args0.map({ args0 -> args0 }) }))
.installSpec(installSpec?.applyValue({ args0 -> args0 }))
.logDeniesEnabled(logDeniesEnabled?.applyValue({ args0 -> args0 }))
.monitoring(monitoring?.applyValue({ args0 -> args0.let({ args0 -> args0.toJava() }) }))
.mutationEnabled(mutationEnabled?.applyValue({ args0 -> args0 }))
.policyContent(policyContent?.applyValue({ args0 -> args0.let({ args0 -> args0.toJava() }) }))
.referentialRulesEnabled(referentialRulesEnabled?.applyValue({ args0 -> args0 })).build()
}
/**
* Builder for [FeatureMembershipPolicycontrollerPolicyControllerHubConfigArgs].
*/
@PulumiTagMarker
public class FeatureMembershipPolicycontrollerPolicyControllerHubConfigArgsBuilder internal constructor() {
private var auditIntervalSeconds: Output? = null
private var constraintViolationLimit: Output? = null
private var deploymentConfigs:
Output>? =
null
private var exemptableNamespaces: Output>? = null
private var installSpec: Output? = null
private var logDeniesEnabled: Output? = null
private var monitoring:
Output? = null
private var mutationEnabled: Output? = null
private var policyContent:
Output? = null
private var referentialRulesEnabled: Output? = null
/**
* @param value Sets the interval for Policy Controller Audit Scans (in seconds). When set to 0, this disables audit functionality altogether.
*/
@JvmName("avtgbvfnwfrpknjo")
public suspend fun auditIntervalSeconds(`value`: Output) {
this.auditIntervalSeconds = value
}
/**
* @param value The maximum number of audit violations to be stored in a constraint. If not set, the default of 20 will be used.
*/
@JvmName("pwainnbqdagyuifx")
public suspend fun constraintViolationLimit(`value`: Output) {
this.constraintViolationLimit = value
}
/**
* @param value Map of deployment configs to deployments ("admission", "audit", "mutation").
*/
@JvmName("jgcxvdwnfbcsupui")
public suspend fun deploymentConfigs(`value`: Output>) {
this.deploymentConfigs = value
}
@JvmName("uhcurkrcsycdbwgo")
public suspend fun deploymentConfigs(vararg values: Output) {
this.deploymentConfigs = Output.all(values.asList())
}
/**
* @param values Map of deployment configs to deployments ("admission", "audit", "mutation").
*/
@JvmName("byywgpidsdbsydsn")
public suspend fun deploymentConfigs(values: List