Hi there! Are you looking for the official Deno documentation? Try docs.deno.com for all your Deno learning needs.

PrivateEnvironmentConfig

import type { PrivateEnvironmentConfig } from "https://googleapis.deno.dev/v1/composer:v1.ts";

The configuration information for configuring a Private IP Cloud Composer environment.

interface PrivateEnvironmentConfig {
cloudComposerConnectionSubnetwork?: string;
cloudComposerNetworkIpv4CidrBlock?: string;
readonly cloudComposerNetworkIpv4ReservedRange?: string;
cloudSqlIpv4CidrBlock?: string;
enablePrivateBuildsOnly?: boolean;
enablePrivateEnvironment?: boolean;
enablePrivatelyUsedPublicIps?: boolean;
networkingConfig?: NetworkingConfig;
privateClusterConfig?: PrivateClusterConfig;
webServerIpv4CidrBlock?: string;
readonly webServerIpv4ReservedRange?: string;
}

§Properties

§
cloudComposerConnectionSubnetwork?: string
[src]

Optional. When specified, the environment will use Private Service Connect instead of VPC peerings to connect to Cloud SQL in the Tenant Project, and the PSC endpoint in the Customer Project will use an IP address from this subnetwork.

§
cloudComposerNetworkIpv4CidrBlock?: string
[src]

Optional. The CIDR block from which IP range for Cloud Composer Network in tenant project will be reserved. Needs to be disjoint from private_cluster_config.master_ipv4_cidr_block and cloud_sql_ipv4_cidr_block. This field is supported for Cloud Composer environments in versions composer-2..-airflow-..* and newer.

§
readonly cloudComposerNetworkIpv4ReservedRange?: string
[src]

Output only. The IP range reserved for the tenant project's Cloud Composer network. This field is supported for Cloud Composer environments in versions composer-2..-airflow-..* and newer.

§
cloudSqlIpv4CidrBlock?: string
[src]

Optional. The CIDR block from which IP range in tenant project will be reserved for Cloud SQL. Needs to be disjoint from web_server_ipv4_cidr_block.

§
enablePrivateBuildsOnly?: boolean
[src]

Optional. If true, builds performed during operations that install Python packages have only private connectivity to Google services (including Artifact Registry) and VPC network (if either NodeConfig.network and NodeConfig.subnetwork fields or NodeConfig.composer_network_attachment field are specified). If false, the builds also have access to the internet. This field is supported for Cloud Composer environments in versions composer-3..-airflow-..* and newer.

§
enablePrivateEnvironment?: boolean
[src]

Optional. If true, a Private IP Cloud Composer environment is created. If this field is set to true, IPAllocationPolicy.use_ip_aliases must be set to true for Cloud Composer environments in versions composer-1..-airflow-..*.

§
enablePrivatelyUsedPublicIps?: boolean
[src]

Optional. When enabled, IPs from public (non-RFC1918) ranges can be used for IPAllocationPolicy.cluster_ipv4_cidr_block and IPAllocationPolicy.service_ipv4_cidr_block.

§
networkingConfig?: NetworkingConfig
[src]

Optional. Configuration for the network connections configuration in the environment.

§
privateClusterConfig?: PrivateClusterConfig
[src]

Optional. Configuration for the private GKE cluster for a Private IP Cloud Composer environment.

§
webServerIpv4CidrBlock?: string
[src]

Optional. The CIDR block from which IP range for web server will be reserved. Needs to be disjoint from private_cluster_config.master_ipv4_cidr_block and cloud_sql_ipv4_cidr_block. This field is supported for Cloud Composer environments in versions composer-1..-airflow-..*.

§
readonly webServerIpv4ReservedRange?: string
[src]

Output only. The IP range reserved for the tenant project's App Engine VMs. This field is supported for Cloud Composer environments in versions composer-1..-airflow-..*.