1. Packages
  2. Google Cloud (GCP) Classic
  3. API Docs
  4. firebase
  5. AppCheckServiceConfig
Google Cloud Classic v7.18.0 published on Wednesday, Apr 10, 2024 by Pulumi

gcp.firebase.AppCheckServiceConfig

Explore with Pulumi AI

gcp logo
Google Cloud Classic v7.18.0 published on Wednesday, Apr 10, 2024 by Pulumi

    The enforcement configuration for a service supported by App Check.

    To get more information about ServiceConfig, see:

    Example Usage

    Firebase App Check Service Config Off

    import * as pulumi from "@pulumi/pulumi";
    import * as gcp from "@pulumi/gcp";
    
    const appcheck = new gcp.projects.Service("appcheck", {
        project: "my-project-name",
        service: "firebaseappcheck.googleapis.com",
        disableOnDestroy: false,
    });
    const _default = new gcp.firebase.AppCheckServiceConfig("default", {
        project: "my-project-name",
        serviceId: "firestore.googleapis.com",
    });
    
    import pulumi
    import pulumi_gcp as gcp
    
    appcheck = gcp.projects.Service("appcheck",
        project="my-project-name",
        service="firebaseappcheck.googleapis.com",
        disable_on_destroy=False)
    default = gcp.firebase.AppCheckServiceConfig("default",
        project="my-project-name",
        service_id="firestore.googleapis.com")
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-gcp/sdk/v7/go/gcp/firebase"
    	"github.com/pulumi/pulumi-gcp/sdk/v7/go/gcp/projects"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := projects.NewService(ctx, "appcheck", &projects.ServiceArgs{
    			Project:          pulumi.String("my-project-name"),
    			Service:          pulumi.String("firebaseappcheck.googleapis.com"),
    			DisableOnDestroy: pulumi.Bool(false),
    		})
    		if err != nil {
    			return err
    		}
    		_, err = firebase.NewAppCheckServiceConfig(ctx, "default", &firebase.AppCheckServiceConfigArgs{
    			Project:   pulumi.String("my-project-name"),
    			ServiceId: pulumi.String("firestore.googleapis.com"),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Gcp = Pulumi.Gcp;
    
    return await Deployment.RunAsync(() => 
    {
        var appcheck = new Gcp.Projects.Service("appcheck", new()
        {
            Project = "my-project-name",
            ServiceName = "firebaseappcheck.googleapis.com",
            DisableOnDestroy = false,
        });
    
        var @default = new Gcp.Firebase.AppCheckServiceConfig("default", new()
        {
            Project = "my-project-name",
            ServiceId = "firestore.googleapis.com",
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.gcp.projects.Service;
    import com.pulumi.gcp.projects.ServiceArgs;
    import com.pulumi.gcp.firebase.AppCheckServiceConfig;
    import com.pulumi.gcp.firebase.AppCheckServiceConfigArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var appcheck = new Service("appcheck", ServiceArgs.builder()        
                .project("my-project-name")
                .service("firebaseappcheck.googleapis.com")
                .disableOnDestroy(false)
                .build());
    
            var default_ = new AppCheckServiceConfig("default", AppCheckServiceConfigArgs.builder()        
                .project("my-project-name")
                .serviceId("firestore.googleapis.com")
                .build());
    
        }
    }
    
    resources:
      appcheck:
        type: gcp:projects:Service
        properties:
          project: my-project-name
          service: firebaseappcheck.googleapis.com
          disableOnDestroy: false
      default:
        type: gcp:firebase:AppCheckServiceConfig
        properties:
          project: my-project-name
          serviceId: firestore.googleapis.com
    

    Firebase App Check Service Config Enforced

    import * as pulumi from "@pulumi/pulumi";
    import * as gcp from "@pulumi/gcp";
    
    const appcheck = new gcp.projects.Service("appcheck", {
        project: "my-project-name",
        service: "firebaseappcheck.googleapis.com",
        disableOnDestroy: false,
    });
    const _default = new gcp.firebase.AppCheckServiceConfig("default", {
        project: "my-project-name",
        serviceId: "firebasestorage.googleapis.com",
        enforcementMode: "ENFORCED",
    });
    
    import pulumi
    import pulumi_gcp as gcp
    
    appcheck = gcp.projects.Service("appcheck",
        project="my-project-name",
        service="firebaseappcheck.googleapis.com",
        disable_on_destroy=False)
    default = gcp.firebase.AppCheckServiceConfig("default",
        project="my-project-name",
        service_id="firebasestorage.googleapis.com",
        enforcement_mode="ENFORCED")
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-gcp/sdk/v7/go/gcp/firebase"
    	"github.com/pulumi/pulumi-gcp/sdk/v7/go/gcp/projects"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := projects.NewService(ctx, "appcheck", &projects.ServiceArgs{
    			Project:          pulumi.String("my-project-name"),
    			Service:          pulumi.String("firebaseappcheck.googleapis.com"),
    			DisableOnDestroy: pulumi.Bool(false),
    		})
    		if err != nil {
    			return err
    		}
    		_, err = firebase.NewAppCheckServiceConfig(ctx, "default", &firebase.AppCheckServiceConfigArgs{
    			Project:         pulumi.String("my-project-name"),
    			ServiceId:       pulumi.String("firebasestorage.googleapis.com"),
    			EnforcementMode: pulumi.String("ENFORCED"),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Gcp = Pulumi.Gcp;
    
    return await Deployment.RunAsync(() => 
    {
        var appcheck = new Gcp.Projects.Service("appcheck", new()
        {
            Project = "my-project-name",
            ServiceName = "firebaseappcheck.googleapis.com",
            DisableOnDestroy = false,
        });
    
        var @default = new Gcp.Firebase.AppCheckServiceConfig("default", new()
        {
            Project = "my-project-name",
            ServiceId = "firebasestorage.googleapis.com",
            EnforcementMode = "ENFORCED",
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.gcp.projects.Service;
    import com.pulumi.gcp.projects.ServiceArgs;
    import com.pulumi.gcp.firebase.AppCheckServiceConfig;
    import com.pulumi.gcp.firebase.AppCheckServiceConfigArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var appcheck = new Service("appcheck", ServiceArgs.builder()        
                .project("my-project-name")
                .service("firebaseappcheck.googleapis.com")
                .disableOnDestroy(false)
                .build());
    
            var default_ = new AppCheckServiceConfig("default", AppCheckServiceConfigArgs.builder()        
                .project("my-project-name")
                .serviceId("firebasestorage.googleapis.com")
                .enforcementMode("ENFORCED")
                .build());
    
        }
    }
    
    resources:
      appcheck:
        type: gcp:projects:Service
        properties:
          project: my-project-name
          service: firebaseappcheck.googleapis.com
          disableOnDestroy: false
      default:
        type: gcp:firebase:AppCheckServiceConfig
        properties:
          project: my-project-name
          serviceId: firebasestorage.googleapis.com
          enforcementMode: ENFORCED
    

    Firebase App Check Service Config Unenforced

    import * as pulumi from "@pulumi/pulumi";
    import * as gcp from "@pulumi/gcp";
    
    const appcheck = new gcp.projects.Service("appcheck", {
        project: "my-project-name",
        service: "firebaseappcheck.googleapis.com",
        disableOnDestroy: false,
    });
    const _default = new gcp.firebase.AppCheckServiceConfig("default", {
        project: "my-project-name",
        serviceId: "identitytoolkit.googleapis.com",
        enforcementMode: "UNENFORCED",
    });
    
    import pulumi
    import pulumi_gcp as gcp
    
    appcheck = gcp.projects.Service("appcheck",
        project="my-project-name",
        service="firebaseappcheck.googleapis.com",
        disable_on_destroy=False)
    default = gcp.firebase.AppCheckServiceConfig("default",
        project="my-project-name",
        service_id="identitytoolkit.googleapis.com",
        enforcement_mode="UNENFORCED")
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-gcp/sdk/v7/go/gcp/firebase"
    	"github.com/pulumi/pulumi-gcp/sdk/v7/go/gcp/projects"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := projects.NewService(ctx, "appcheck", &projects.ServiceArgs{
    			Project:          pulumi.String("my-project-name"),
    			Service:          pulumi.String("firebaseappcheck.googleapis.com"),
    			DisableOnDestroy: pulumi.Bool(false),
    		})
    		if err != nil {
    			return err
    		}
    		_, err = firebase.NewAppCheckServiceConfig(ctx, "default", &firebase.AppCheckServiceConfigArgs{
    			Project:         pulumi.String("my-project-name"),
    			ServiceId:       pulumi.String("identitytoolkit.googleapis.com"),
    			EnforcementMode: pulumi.String("UNENFORCED"),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Gcp = Pulumi.Gcp;
    
    return await Deployment.RunAsync(() => 
    {
        var appcheck = new Gcp.Projects.Service("appcheck", new()
        {
            Project = "my-project-name",
            ServiceName = "firebaseappcheck.googleapis.com",
            DisableOnDestroy = false,
        });
    
        var @default = new Gcp.Firebase.AppCheckServiceConfig("default", new()
        {
            Project = "my-project-name",
            ServiceId = "identitytoolkit.googleapis.com",
            EnforcementMode = "UNENFORCED",
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.gcp.projects.Service;
    import com.pulumi.gcp.projects.ServiceArgs;
    import com.pulumi.gcp.firebase.AppCheckServiceConfig;
    import com.pulumi.gcp.firebase.AppCheckServiceConfigArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var appcheck = new Service("appcheck", ServiceArgs.builder()        
                .project("my-project-name")
                .service("firebaseappcheck.googleapis.com")
                .disableOnDestroy(false)
                .build());
    
            var default_ = new AppCheckServiceConfig("default", AppCheckServiceConfigArgs.builder()        
                .project("my-project-name")
                .serviceId("identitytoolkit.googleapis.com")
                .enforcementMode("UNENFORCED")
                .build());
    
        }
    }
    
    resources:
      appcheck:
        type: gcp:projects:Service
        properties:
          project: my-project-name
          service: firebaseappcheck.googleapis.com
          disableOnDestroy: false
      default:
        type: gcp:firebase:AppCheckServiceConfig
        properties:
          project: my-project-name
          serviceId: identitytoolkit.googleapis.com
          enforcementMode: UNENFORCED
    

    Create AppCheckServiceConfig Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new AppCheckServiceConfig(name: string, args: AppCheckServiceConfigArgs, opts?: CustomResourceOptions);
    @overload
    def AppCheckServiceConfig(resource_name: str,
                              args: AppCheckServiceConfigArgs,
                              opts: Optional[ResourceOptions] = None)
    
    @overload
    def AppCheckServiceConfig(resource_name: str,
                              opts: Optional[ResourceOptions] = None,
                              service_id: Optional[str] = None,
                              enforcement_mode: Optional[str] = None,
                              project: Optional[str] = None)
    func NewAppCheckServiceConfig(ctx *Context, name string, args AppCheckServiceConfigArgs, opts ...ResourceOption) (*AppCheckServiceConfig, error)
    public AppCheckServiceConfig(string name, AppCheckServiceConfigArgs args, CustomResourceOptions? opts = null)
    public AppCheckServiceConfig(String name, AppCheckServiceConfigArgs args)
    public AppCheckServiceConfig(String name, AppCheckServiceConfigArgs args, CustomResourceOptions options)
    
    type: gcp:firebase:AppCheckServiceConfig
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args AppCheckServiceConfigArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args AppCheckServiceConfigArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args AppCheckServiceConfigArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args AppCheckServiceConfigArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args AppCheckServiceConfigArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Example

    The following reference example uses placeholder values for all input properties.

    var appCheckServiceConfigResource = new Gcp.Firebase.AppCheckServiceConfig("appCheckServiceConfigResource", new()
    {
        ServiceId = "string",
        EnforcementMode = "string",
        Project = "string",
    });
    
    example, err := firebase.NewAppCheckServiceConfig(ctx, "appCheckServiceConfigResource", &firebase.AppCheckServiceConfigArgs{
    	ServiceId:       pulumi.String("string"),
    	EnforcementMode: pulumi.String("string"),
    	Project:         pulumi.String("string"),
    })
    
    var appCheckServiceConfigResource = new AppCheckServiceConfig("appCheckServiceConfigResource", AppCheckServiceConfigArgs.builder()        
        .serviceId("string")
        .enforcementMode("string")
        .project("string")
        .build());
    
    app_check_service_config_resource = gcp.firebase.AppCheckServiceConfig("appCheckServiceConfigResource",
        service_id="string",
        enforcement_mode="string",
        project="string")
    
    const appCheckServiceConfigResource = new gcp.firebase.AppCheckServiceConfig("appCheckServiceConfigResource", {
        serviceId: "string",
        enforcementMode: "string",
        project: "string",
    });
    
    type: gcp:firebase:AppCheckServiceConfig
    properties:
        enforcementMode: string
        project: string
        serviceId: string
    

    AppCheckServiceConfig Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    The AppCheckServiceConfig resource accepts the following input properties:

    ServiceId string
    The identifier of the service to configure enforcement. Currently, the following service IDs are supported: firebasestorage.googleapis.com (Cloud Storage for Firebase) firebasedatabase.googleapis.com (Firebase Realtime Database) firestore.googleapis.com (Cloud Firestore) identitytoolkit.googleapis.com (Authentication)


    EnforcementMode string
    The App Check enforcement mode for a service supported by App Check. Valid values are (Unset) Firebase App Check is not enforced for the service, nor are App Check metrics collected. Though the service is not protected by App Check in this mode, other applicable protections, such as user authorization, are still enforced. An unconfigured service is in this mode by default. This is equivalent to OFF in the REST API. Deleting the Terraform resource will also switch the enforcement to OFF for this service. UNENFORCED Firebase App Check is not enforced for the service. App Check metrics are collected to help you decide when to turn on enforcement for the service. Though the service is not protected by App Check in this mode, other applicable protections, such as user authorization, are still enforced. ENFORCED Firebase App Check is enforced for the service. The service will reject any request that attempts to access your project's resources if it does not have valid App Check token attached, with some exceptions depending on the service; for example, some services will still allow requests bearing the developer's privileged service account credentials without an App Check token. App Check metrics continue to be collected to help you detect issues with your App Check integration and monitor the composition of your callers. While the service is protected by App Check, other applicable protections, such as user authorization, continue to be enforced at the same time. Use caution when choosing to enforce App Check on a Firebase service. If your users have not updated to an App Check capable version of your app, their apps will no longer be able to use your Firebase services that are enforcing App Check. App Check metrics can help you decide whether to enforce App Check on your Firebase services. If your app has not launched yet, you should enable enforcement immediately, since there are no outdated clients in use. Possible values: ["UNENFORCED", "ENFORCED"]
    Project string
    The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
    ServiceId string
    The identifier of the service to configure enforcement. Currently, the following service IDs are supported: firebasestorage.googleapis.com (Cloud Storage for Firebase) firebasedatabase.googleapis.com (Firebase Realtime Database) firestore.googleapis.com (Cloud Firestore) identitytoolkit.googleapis.com (Authentication)


    EnforcementMode string
    The App Check enforcement mode for a service supported by App Check. Valid values are (Unset) Firebase App Check is not enforced for the service, nor are App Check metrics collected. Though the service is not protected by App Check in this mode, other applicable protections, such as user authorization, are still enforced. An unconfigured service is in this mode by default. This is equivalent to OFF in the REST API. Deleting the Terraform resource will also switch the enforcement to OFF for this service. UNENFORCED Firebase App Check is not enforced for the service. App Check metrics are collected to help you decide when to turn on enforcement for the service. Though the service is not protected by App Check in this mode, other applicable protections, such as user authorization, are still enforced. ENFORCED Firebase App Check is enforced for the service. The service will reject any request that attempts to access your project's resources if it does not have valid App Check token attached, with some exceptions depending on the service; for example, some services will still allow requests bearing the developer's privileged service account credentials without an App Check token. App Check metrics continue to be collected to help you detect issues with your App Check integration and monitor the composition of your callers. While the service is protected by App Check, other applicable protections, such as user authorization, continue to be enforced at the same time. Use caution when choosing to enforce App Check on a Firebase service. If your users have not updated to an App Check capable version of your app, their apps will no longer be able to use your Firebase services that are enforcing App Check. App Check metrics can help you decide whether to enforce App Check on your Firebase services. If your app has not launched yet, you should enable enforcement immediately, since there are no outdated clients in use. Possible values: ["UNENFORCED", "ENFORCED"]
    Project string
    The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
    serviceId String
    The identifier of the service to configure enforcement. Currently, the following service IDs are supported: firebasestorage.googleapis.com (Cloud Storage for Firebase) firebasedatabase.googleapis.com (Firebase Realtime Database) firestore.googleapis.com (Cloud Firestore) identitytoolkit.googleapis.com (Authentication)


    enforcementMode String
    The App Check enforcement mode for a service supported by App Check. Valid values are (Unset) Firebase App Check is not enforced for the service, nor are App Check metrics collected. Though the service is not protected by App Check in this mode, other applicable protections, such as user authorization, are still enforced. An unconfigured service is in this mode by default. This is equivalent to OFF in the REST API. Deleting the Terraform resource will also switch the enforcement to OFF for this service. UNENFORCED Firebase App Check is not enforced for the service. App Check metrics are collected to help you decide when to turn on enforcement for the service. Though the service is not protected by App Check in this mode, other applicable protections, such as user authorization, are still enforced. ENFORCED Firebase App Check is enforced for the service. The service will reject any request that attempts to access your project's resources if it does not have valid App Check token attached, with some exceptions depending on the service; for example, some services will still allow requests bearing the developer's privileged service account credentials without an App Check token. App Check metrics continue to be collected to help you detect issues with your App Check integration and monitor the composition of your callers. While the service is protected by App Check, other applicable protections, such as user authorization, continue to be enforced at the same time. Use caution when choosing to enforce App Check on a Firebase service. If your users have not updated to an App Check capable version of your app, their apps will no longer be able to use your Firebase services that are enforcing App Check. App Check metrics can help you decide whether to enforce App Check on your Firebase services. If your app has not launched yet, you should enable enforcement immediately, since there are no outdated clients in use. Possible values: ["UNENFORCED", "ENFORCED"]
    project String
    The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
    serviceId string
    The identifier of the service to configure enforcement. Currently, the following service IDs are supported: firebasestorage.googleapis.com (Cloud Storage for Firebase) firebasedatabase.googleapis.com (Firebase Realtime Database) firestore.googleapis.com (Cloud Firestore) identitytoolkit.googleapis.com (Authentication)


    enforcementMode string
    The App Check enforcement mode for a service supported by App Check. Valid values are (Unset) Firebase App Check is not enforced for the service, nor are App Check metrics collected. Though the service is not protected by App Check in this mode, other applicable protections, such as user authorization, are still enforced. An unconfigured service is in this mode by default. This is equivalent to OFF in the REST API. Deleting the Terraform resource will also switch the enforcement to OFF for this service. UNENFORCED Firebase App Check is not enforced for the service. App Check metrics are collected to help you decide when to turn on enforcement for the service. Though the service is not protected by App Check in this mode, other applicable protections, such as user authorization, are still enforced. ENFORCED Firebase App Check is enforced for the service. The service will reject any request that attempts to access your project's resources if it does not have valid App Check token attached, with some exceptions depending on the service; for example, some services will still allow requests bearing the developer's privileged service account credentials without an App Check token. App Check metrics continue to be collected to help you detect issues with your App Check integration and monitor the composition of your callers. While the service is protected by App Check, other applicable protections, such as user authorization, continue to be enforced at the same time. Use caution when choosing to enforce App Check on a Firebase service. If your users have not updated to an App Check capable version of your app, their apps will no longer be able to use your Firebase services that are enforcing App Check. App Check metrics can help you decide whether to enforce App Check on your Firebase services. If your app has not launched yet, you should enable enforcement immediately, since there are no outdated clients in use. Possible values: ["UNENFORCED", "ENFORCED"]
    project string
    The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
    service_id str
    The identifier of the service to configure enforcement. Currently, the following service IDs are supported: firebasestorage.googleapis.com (Cloud Storage for Firebase) firebasedatabase.googleapis.com (Firebase Realtime Database) firestore.googleapis.com (Cloud Firestore) identitytoolkit.googleapis.com (Authentication)


    enforcement_mode str
    The App Check enforcement mode for a service supported by App Check. Valid values are (Unset) Firebase App Check is not enforced for the service, nor are App Check metrics collected. Though the service is not protected by App Check in this mode, other applicable protections, such as user authorization, are still enforced. An unconfigured service is in this mode by default. This is equivalent to OFF in the REST API. Deleting the Terraform resource will also switch the enforcement to OFF for this service. UNENFORCED Firebase App Check is not enforced for the service. App Check metrics are collected to help you decide when to turn on enforcement for the service. Though the service is not protected by App Check in this mode, other applicable protections, such as user authorization, are still enforced. ENFORCED Firebase App Check is enforced for the service. The service will reject any request that attempts to access your project's resources if it does not have valid App Check token attached, with some exceptions depending on the service; for example, some services will still allow requests bearing the developer's privileged service account credentials without an App Check token. App Check metrics continue to be collected to help you detect issues with your App Check integration and monitor the composition of your callers. While the service is protected by App Check, other applicable protections, such as user authorization, continue to be enforced at the same time. Use caution when choosing to enforce App Check on a Firebase service. If your users have not updated to an App Check capable version of your app, their apps will no longer be able to use your Firebase services that are enforcing App Check. App Check metrics can help you decide whether to enforce App Check on your Firebase services. If your app has not launched yet, you should enable enforcement immediately, since there are no outdated clients in use. Possible values: ["UNENFORCED", "ENFORCED"]
    project str
    The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
    serviceId String
    The identifier of the service to configure enforcement. Currently, the following service IDs are supported: firebasestorage.googleapis.com (Cloud Storage for Firebase) firebasedatabase.googleapis.com (Firebase Realtime Database) firestore.googleapis.com (Cloud Firestore) identitytoolkit.googleapis.com (Authentication)


    enforcementMode String
    The App Check enforcement mode for a service supported by App Check. Valid values are (Unset) Firebase App Check is not enforced for the service, nor are App Check metrics collected. Though the service is not protected by App Check in this mode, other applicable protections, such as user authorization, are still enforced. An unconfigured service is in this mode by default. This is equivalent to OFF in the REST API. Deleting the Terraform resource will also switch the enforcement to OFF for this service. UNENFORCED Firebase App Check is not enforced for the service. App Check metrics are collected to help you decide when to turn on enforcement for the service. Though the service is not protected by App Check in this mode, other applicable protections, such as user authorization, are still enforced. ENFORCED Firebase App Check is enforced for the service. The service will reject any request that attempts to access your project's resources if it does not have valid App Check token attached, with some exceptions depending on the service; for example, some services will still allow requests bearing the developer's privileged service account credentials without an App Check token. App Check metrics continue to be collected to help you detect issues with your App Check integration and monitor the composition of your callers. While the service is protected by App Check, other applicable protections, such as user authorization, continue to be enforced at the same time. Use caution when choosing to enforce App Check on a Firebase service. If your users have not updated to an App Check capable version of your app, their apps will no longer be able to use your Firebase services that are enforcing App Check. App Check metrics can help you decide whether to enforce App Check on your Firebase services. If your app has not launched yet, you should enable enforcement immediately, since there are no outdated clients in use. Possible values: ["UNENFORCED", "ENFORCED"]
    project String
    The ID of the project in which the resource belongs. If it is not provided, the provider project is used.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the AppCheckServiceConfig resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Name string
    The fully-qualified resource name of the service enforcement configuration.
    Id string
    The provider-assigned unique ID for this managed resource.
    Name string
    The fully-qualified resource name of the service enforcement configuration.
    id String
    The provider-assigned unique ID for this managed resource.
    name String
    The fully-qualified resource name of the service enforcement configuration.
    id string
    The provider-assigned unique ID for this managed resource.
    name string
    The fully-qualified resource name of the service enforcement configuration.
    id str
    The provider-assigned unique ID for this managed resource.
    name str
    The fully-qualified resource name of the service enforcement configuration.
    id String
    The provider-assigned unique ID for this managed resource.
    name String
    The fully-qualified resource name of the service enforcement configuration.

    Look up Existing AppCheckServiceConfig Resource

    Get an existing AppCheckServiceConfig resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: AppCheckServiceConfigState, opts?: CustomResourceOptions): AppCheckServiceConfig
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            enforcement_mode: Optional[str] = None,
            name: Optional[str] = None,
            project: Optional[str] = None,
            service_id: Optional[str] = None) -> AppCheckServiceConfig
    func GetAppCheckServiceConfig(ctx *Context, name string, id IDInput, state *AppCheckServiceConfigState, opts ...ResourceOption) (*AppCheckServiceConfig, error)
    public static AppCheckServiceConfig Get(string name, Input<string> id, AppCheckServiceConfigState? state, CustomResourceOptions? opts = null)
    public static AppCheckServiceConfig get(String name, Output<String> id, AppCheckServiceConfigState state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    EnforcementMode string
    The App Check enforcement mode for a service supported by App Check. Valid values are (Unset) Firebase App Check is not enforced for the service, nor are App Check metrics collected. Though the service is not protected by App Check in this mode, other applicable protections, such as user authorization, are still enforced. An unconfigured service is in this mode by default. This is equivalent to OFF in the REST API. Deleting the Terraform resource will also switch the enforcement to OFF for this service. UNENFORCED Firebase App Check is not enforced for the service. App Check metrics are collected to help you decide when to turn on enforcement for the service. Though the service is not protected by App Check in this mode, other applicable protections, such as user authorization, are still enforced. ENFORCED Firebase App Check is enforced for the service. The service will reject any request that attempts to access your project's resources if it does not have valid App Check token attached, with some exceptions depending on the service; for example, some services will still allow requests bearing the developer's privileged service account credentials without an App Check token. App Check metrics continue to be collected to help you detect issues with your App Check integration and monitor the composition of your callers. While the service is protected by App Check, other applicable protections, such as user authorization, continue to be enforced at the same time. Use caution when choosing to enforce App Check on a Firebase service. If your users have not updated to an App Check capable version of your app, their apps will no longer be able to use your Firebase services that are enforcing App Check. App Check metrics can help you decide whether to enforce App Check on your Firebase services. If your app has not launched yet, you should enable enforcement immediately, since there are no outdated clients in use. Possible values: ["UNENFORCED", "ENFORCED"]
    Name string
    The fully-qualified resource name of the service enforcement configuration.
    Project string
    The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
    ServiceId string
    The identifier of the service to configure enforcement. Currently, the following service IDs are supported: firebasestorage.googleapis.com (Cloud Storage for Firebase) firebasedatabase.googleapis.com (Firebase Realtime Database) firestore.googleapis.com (Cloud Firestore) identitytoolkit.googleapis.com (Authentication)


    EnforcementMode string
    The App Check enforcement mode for a service supported by App Check. Valid values are (Unset) Firebase App Check is not enforced for the service, nor are App Check metrics collected. Though the service is not protected by App Check in this mode, other applicable protections, such as user authorization, are still enforced. An unconfigured service is in this mode by default. This is equivalent to OFF in the REST API. Deleting the Terraform resource will also switch the enforcement to OFF for this service. UNENFORCED Firebase App Check is not enforced for the service. App Check metrics are collected to help you decide when to turn on enforcement for the service. Though the service is not protected by App Check in this mode, other applicable protections, such as user authorization, are still enforced. ENFORCED Firebase App Check is enforced for the service. The service will reject any request that attempts to access your project's resources if it does not have valid App Check token attached, with some exceptions depending on the service; for example, some services will still allow requests bearing the developer's privileged service account credentials without an App Check token. App Check metrics continue to be collected to help you detect issues with your App Check integration and monitor the composition of your callers. While the service is protected by App Check, other applicable protections, such as user authorization, continue to be enforced at the same time. Use caution when choosing to enforce App Check on a Firebase service. If your users have not updated to an App Check capable version of your app, their apps will no longer be able to use your Firebase services that are enforcing App Check. App Check metrics can help you decide whether to enforce App Check on your Firebase services. If your app has not launched yet, you should enable enforcement immediately, since there are no outdated clients in use. Possible values: ["UNENFORCED", "ENFORCED"]
    Name string
    The fully-qualified resource name of the service enforcement configuration.
    Project string
    The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
    ServiceId string
    The identifier of the service to configure enforcement. Currently, the following service IDs are supported: firebasestorage.googleapis.com (Cloud Storage for Firebase) firebasedatabase.googleapis.com (Firebase Realtime Database) firestore.googleapis.com (Cloud Firestore) identitytoolkit.googleapis.com (Authentication)


    enforcementMode String
    The App Check enforcement mode for a service supported by App Check. Valid values are (Unset) Firebase App Check is not enforced for the service, nor are App Check metrics collected. Though the service is not protected by App Check in this mode, other applicable protections, such as user authorization, are still enforced. An unconfigured service is in this mode by default. This is equivalent to OFF in the REST API. Deleting the Terraform resource will also switch the enforcement to OFF for this service. UNENFORCED Firebase App Check is not enforced for the service. App Check metrics are collected to help you decide when to turn on enforcement for the service. Though the service is not protected by App Check in this mode, other applicable protections, such as user authorization, are still enforced. ENFORCED Firebase App Check is enforced for the service. The service will reject any request that attempts to access your project's resources if it does not have valid App Check token attached, with some exceptions depending on the service; for example, some services will still allow requests bearing the developer's privileged service account credentials without an App Check token. App Check metrics continue to be collected to help you detect issues with your App Check integration and monitor the composition of your callers. While the service is protected by App Check, other applicable protections, such as user authorization, continue to be enforced at the same time. Use caution when choosing to enforce App Check on a Firebase service. If your users have not updated to an App Check capable version of your app, their apps will no longer be able to use your Firebase services that are enforcing App Check. App Check metrics can help you decide whether to enforce App Check on your Firebase services. If your app has not launched yet, you should enable enforcement immediately, since there are no outdated clients in use. Possible values: ["UNENFORCED", "ENFORCED"]
    name String
    The fully-qualified resource name of the service enforcement configuration.
    project String
    The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
    serviceId String
    The identifier of the service to configure enforcement. Currently, the following service IDs are supported: firebasestorage.googleapis.com (Cloud Storage for Firebase) firebasedatabase.googleapis.com (Firebase Realtime Database) firestore.googleapis.com (Cloud Firestore) identitytoolkit.googleapis.com (Authentication)


    enforcementMode string
    The App Check enforcement mode for a service supported by App Check. Valid values are (Unset) Firebase App Check is not enforced for the service, nor are App Check metrics collected. Though the service is not protected by App Check in this mode, other applicable protections, such as user authorization, are still enforced. An unconfigured service is in this mode by default. This is equivalent to OFF in the REST API. Deleting the Terraform resource will also switch the enforcement to OFF for this service. UNENFORCED Firebase App Check is not enforced for the service. App Check metrics are collected to help you decide when to turn on enforcement for the service. Though the service is not protected by App Check in this mode, other applicable protections, such as user authorization, are still enforced. ENFORCED Firebase App Check is enforced for the service. The service will reject any request that attempts to access your project's resources if it does not have valid App Check token attached, with some exceptions depending on the service; for example, some services will still allow requests bearing the developer's privileged service account credentials without an App Check token. App Check metrics continue to be collected to help you detect issues with your App Check integration and monitor the composition of your callers. While the service is protected by App Check, other applicable protections, such as user authorization, continue to be enforced at the same time. Use caution when choosing to enforce App Check on a Firebase service. If your users have not updated to an App Check capable version of your app, their apps will no longer be able to use your Firebase services that are enforcing App Check. App Check metrics can help you decide whether to enforce App Check on your Firebase services. If your app has not launched yet, you should enable enforcement immediately, since there are no outdated clients in use. Possible values: ["UNENFORCED", "ENFORCED"]
    name string
    The fully-qualified resource name of the service enforcement configuration.
    project string
    The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
    serviceId string
    The identifier of the service to configure enforcement. Currently, the following service IDs are supported: firebasestorage.googleapis.com (Cloud Storage for Firebase) firebasedatabase.googleapis.com (Firebase Realtime Database) firestore.googleapis.com (Cloud Firestore) identitytoolkit.googleapis.com (Authentication)


    enforcement_mode str
    The App Check enforcement mode for a service supported by App Check. Valid values are (Unset) Firebase App Check is not enforced for the service, nor are App Check metrics collected. Though the service is not protected by App Check in this mode, other applicable protections, such as user authorization, are still enforced. An unconfigured service is in this mode by default. This is equivalent to OFF in the REST API. Deleting the Terraform resource will also switch the enforcement to OFF for this service. UNENFORCED Firebase App Check is not enforced for the service. App Check metrics are collected to help you decide when to turn on enforcement for the service. Though the service is not protected by App Check in this mode, other applicable protections, such as user authorization, are still enforced. ENFORCED Firebase App Check is enforced for the service. The service will reject any request that attempts to access your project's resources if it does not have valid App Check token attached, with some exceptions depending on the service; for example, some services will still allow requests bearing the developer's privileged service account credentials without an App Check token. App Check metrics continue to be collected to help you detect issues with your App Check integration and monitor the composition of your callers. While the service is protected by App Check, other applicable protections, such as user authorization, continue to be enforced at the same time. Use caution when choosing to enforce App Check on a Firebase service. If your users have not updated to an App Check capable version of your app, their apps will no longer be able to use your Firebase services that are enforcing App Check. App Check metrics can help you decide whether to enforce App Check on your Firebase services. If your app has not launched yet, you should enable enforcement immediately, since there are no outdated clients in use. Possible values: ["UNENFORCED", "ENFORCED"]
    name str
    The fully-qualified resource name of the service enforcement configuration.
    project str
    The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
    service_id str
    The identifier of the service to configure enforcement. Currently, the following service IDs are supported: firebasestorage.googleapis.com (Cloud Storage for Firebase) firebasedatabase.googleapis.com (Firebase Realtime Database) firestore.googleapis.com (Cloud Firestore) identitytoolkit.googleapis.com (Authentication)


    enforcementMode String
    The App Check enforcement mode for a service supported by App Check. Valid values are (Unset) Firebase App Check is not enforced for the service, nor are App Check metrics collected. Though the service is not protected by App Check in this mode, other applicable protections, such as user authorization, are still enforced. An unconfigured service is in this mode by default. This is equivalent to OFF in the REST API. Deleting the Terraform resource will also switch the enforcement to OFF for this service. UNENFORCED Firebase App Check is not enforced for the service. App Check metrics are collected to help you decide when to turn on enforcement for the service. Though the service is not protected by App Check in this mode, other applicable protections, such as user authorization, are still enforced. ENFORCED Firebase App Check is enforced for the service. The service will reject any request that attempts to access your project's resources if it does not have valid App Check token attached, with some exceptions depending on the service; for example, some services will still allow requests bearing the developer's privileged service account credentials without an App Check token. App Check metrics continue to be collected to help you detect issues with your App Check integration and monitor the composition of your callers. While the service is protected by App Check, other applicable protections, such as user authorization, continue to be enforced at the same time. Use caution when choosing to enforce App Check on a Firebase service. If your users have not updated to an App Check capable version of your app, their apps will no longer be able to use your Firebase services that are enforcing App Check. App Check metrics can help you decide whether to enforce App Check on your Firebase services. If your app has not launched yet, you should enable enforcement immediately, since there are no outdated clients in use. Possible values: ["UNENFORCED", "ENFORCED"]
    name String
    The fully-qualified resource name of the service enforcement configuration.
    project String
    The ID of the project in which the resource belongs. If it is not provided, the provider project is used.
    serviceId String
    The identifier of the service to configure enforcement. Currently, the following service IDs are supported: firebasestorage.googleapis.com (Cloud Storage for Firebase) firebasedatabase.googleapis.com (Firebase Realtime Database) firestore.googleapis.com (Cloud Firestore) identitytoolkit.googleapis.com (Authentication)


    Import

    ServiceConfig can be imported using any of these accepted formats:

    • projects/{{project}}/services/{{service_id}}

    • {{project}}/{{service_id}}

    • {{service_id}}

    When using the pulumi import command, ServiceConfig can be imported using one of the formats above. For example:

    $ pulumi import gcp:firebase/appCheckServiceConfig:AppCheckServiceConfig default projects/{{project}}/services/{{service_id}}
    
    $ pulumi import gcp:firebase/appCheckServiceConfig:AppCheckServiceConfig default {{project}}/{{service_id}}
    
    $ pulumi import gcp:firebase/appCheckServiceConfig:AppCheckServiceConfig default {{service_id}}
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    Google Cloud (GCP) Classic pulumi/pulumi-gcp
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the google-beta Terraform Provider.
    gcp logo
    Google Cloud Classic v7.18.0 published on Wednesday, Apr 10, 2024 by Pulumi