pulumi-gcp 7.17.0__py3-none-any.whl → 7.17.0a1711607165__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (91) hide show
  1. pulumi_gcp/__init__.py +0 -27
  2. pulumi_gcp/apphub/__init__.py +0 -1
  3. pulumi_gcp/apphub/outputs.py +0 -214
  4. pulumi_gcp/bigquery/_inputs.py +0 -16
  5. pulumi_gcp/bigquery/outputs.py +0 -14
  6. pulumi_gcp/bigquery/routine.py +0 -98
  7. pulumi_gcp/bigtable/_inputs.py +4 -4
  8. pulumi_gcp/bigtable/gc_policy.py +0 -8
  9. pulumi_gcp/bigtable/outputs.py +4 -4
  10. pulumi_gcp/billing/_inputs.py +4 -4
  11. pulumi_gcp/billing/outputs.py +4 -4
  12. pulumi_gcp/billing/project_info.py +4 -4
  13. pulumi_gcp/cloudfunctionsv2/_inputs.py +2 -2
  14. pulumi_gcp/cloudfunctionsv2/outputs.py +4 -4
  15. pulumi_gcp/cloudquota/__init__.py +0 -2
  16. pulumi_gcp/cloudquota/outputs.py +0 -118
  17. pulumi_gcp/cloudrunv2/service.py +7 -7
  18. pulumi_gcp/composer/_inputs.py +4 -14
  19. pulumi_gcp/composer/outputs.py +10 -22
  20. pulumi_gcp/compute/_inputs.py +44 -40
  21. pulumi_gcp/compute/autoscaler.py +14 -14
  22. pulumi_gcp/compute/interconnect_attachment.py +0 -64
  23. pulumi_gcp/compute/network_endpoint.py +0 -8
  24. pulumi_gcp/compute/network_endpoint_list.py +0 -8
  25. pulumi_gcp/compute/outputs.py +60 -62
  26. pulumi_gcp/compute/region_autoscaler.py +14 -14
  27. pulumi_gcp/compute/region_backend_service.py +0 -28
  28. pulumi_gcp/compute/target_instance.py +4 -4
  29. pulumi_gcp/config/__init__.pyi +0 -2
  30. pulumi_gcp/config/vars.py +0 -4
  31. pulumi_gcp/container/_inputs.py +16 -148
  32. pulumi_gcp/container/outputs.py +16 -148
  33. pulumi_gcp/databasemigrationservice/connection_profile.py +6 -6
  34. pulumi_gcp/dataflow/flex_template_job.py +112 -84
  35. pulumi_gcp/dataloss/_inputs.py +6 -6
  36. pulumi_gcp/dataloss/outputs.py +6 -6
  37. pulumi_gcp/dataplex/task.py +16 -16
  38. pulumi_gcp/dataproc/_inputs.py +10 -85
  39. pulumi_gcp/dataproc/get_metastore_service.py +1 -11
  40. pulumi_gcp/dataproc/metastore_service.py +0 -120
  41. pulumi_gcp/dataproc/outputs.py +10 -142
  42. pulumi_gcp/firebase/app_check_service_config.py +2 -2
  43. pulumi_gcp/firestore/backup_schedule.py +14 -14
  44. pulumi_gcp/firestore/field.py +4 -4
  45. pulumi_gcp/gkehub/membership_binding.py +6 -6
  46. pulumi_gcp/gkehub/membership_rbac_role_binding.py +4 -4
  47. pulumi_gcp/gkehub/namespace.py +4 -4
  48. pulumi_gcp/gkehub/scope_rbac_role_binding.py +4 -4
  49. pulumi_gcp/iam/_inputs.py +0 -76
  50. pulumi_gcp/iam/outputs.py +0 -76
  51. pulumi_gcp/iam/workforce_pool_provider.py +0 -35
  52. pulumi_gcp/iam/workload_identity_pool_provider.py +0 -140
  53. pulumi_gcp/iap/tunnel_dest_group.py +2 -2
  54. pulumi_gcp/kms/_inputs.py +0 -46
  55. pulumi_gcp/kms/crypto_key.py +0 -54
  56. pulumi_gcp/kms/crypto_key_version.py +0 -54
  57. pulumi_gcp/kms/get_kms_crypto_key.py +1 -11
  58. pulumi_gcp/kms/outputs.py +0 -54
  59. pulumi_gcp/logging/_inputs.py +8 -8
  60. pulumi_gcp/logging/metric.py +7 -7
  61. pulumi_gcp/logging/outputs.py +8 -8
  62. pulumi_gcp/monitoring/_inputs.py +2 -2
  63. pulumi_gcp/monitoring/outputs.py +2 -2
  64. pulumi_gcp/monitoring/slo.py +4 -4
  65. pulumi_gcp/networkservices/_inputs.py +6 -6
  66. pulumi_gcp/networkservices/outputs.py +6 -6
  67. pulumi_gcp/orgpolicy/policy.py +2 -2
  68. pulumi_gcp/provider.py +0 -20
  69. pulumi_gcp/pubsub/subscription.py +4 -4
  70. pulumi_gcp/serviceusage/consumer_quota_override.py +7 -7
  71. pulumi_gcp/sql/_inputs.py +2 -20
  72. pulumi_gcp/sql/database_instance.py +2 -2
  73. pulumi_gcp/sql/outputs.py +2 -20
  74. pulumi_gcp/storage/_inputs.py +2 -2
  75. pulumi_gcp/storage/outputs.py +2 -2
  76. pulumi_gcp/vertex/__init__.py +0 -1
  77. pulumi_gcp/vertex/_inputs.py +8 -175
  78. pulumi_gcp/vertex/outputs.py +10 -202
  79. pulumi_gcp/vpcaccess/connector.py +28 -77
  80. {pulumi_gcp-7.17.0.dist-info → pulumi_gcp-7.17.0a1711607165.dist-info}/METADATA +1 -1
  81. {pulumi_gcp-7.17.0.dist-info → pulumi_gcp-7.17.0a1711607165.dist-info}/RECORD +83 -91
  82. pulumi_gcp/apphub/get_application.py +0 -220
  83. pulumi_gcp/applicationintegration/__init__.py +0 -10
  84. pulumi_gcp/applicationintegration/_inputs.py +0 -119
  85. pulumi_gcp/applicationintegration/client.py +0 -566
  86. pulumi_gcp/applicationintegration/outputs.py +0 -122
  87. pulumi_gcp/cloudquota/_inputs.py +0 -131
  88. pulumi_gcp/cloudquota/s_quota_preference.py +0 -777
  89. pulumi_gcp/vertex/ai_deployment_resource_pool.py +0 -477
  90. {pulumi_gcp-7.17.0.dist-info → pulumi_gcp-7.17.0a1711607165.dist-info}/WHEEL +0 -0
  91. {pulumi_gcp-7.17.0.dist-info → pulumi_gcp-7.17.0a1711607165.dist-info}/top_level.txt +0 -0
@@ -419,15 +419,15 @@ class MembershipBinding(pulumi.CustomResource):
419
419
  network="default",
420
420
  subnetwork="default")
421
421
  membership = gcp.gkehub.Membership("membership",
422
- membership_id="tf-test-membership_75125",
422
+ membership_id="tf-test-membership_74000",
423
423
  endpoint=gcp.gkehub.MembershipEndpointArgs(
424
424
  gke_cluster=gcp.gkehub.MembershipEndpointGkeClusterArgs(
425
425
  resource_link=primary.id.apply(lambda id: f"//container.googleapis.com/{id}"),
426
426
  ),
427
427
  ))
428
- scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_88722")
428
+ scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_75125")
429
429
  membership_binding = gcp.gkehub.MembershipBinding("membership_binding",
430
- membership_binding_id="tf-test-membership-binding_39249",
430
+ membership_binding_id="tf-test-membership-binding_88722",
431
431
  scope=scope.name,
432
432
  membership_id=membership.membership_id,
433
433
  location="global",
@@ -512,15 +512,15 @@ class MembershipBinding(pulumi.CustomResource):
512
512
  network="default",
513
513
  subnetwork="default")
514
514
  membership = gcp.gkehub.Membership("membership",
515
- membership_id="tf-test-membership_75125",
515
+ membership_id="tf-test-membership_74000",
516
516
  endpoint=gcp.gkehub.MembershipEndpointArgs(
517
517
  gke_cluster=gcp.gkehub.MembershipEndpointGkeClusterArgs(
518
518
  resource_link=primary.id.apply(lambda id: f"//container.googleapis.com/{id}"),
519
519
  ),
520
520
  ))
521
- scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_88722")
521
+ scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_75125")
522
522
  membership_binding = gcp.gkehub.MembershipBinding("membership_binding",
523
- membership_binding_id="tf-test-membership-binding_39249",
523
+ membership_binding_id="tf-test-membership-binding_88722",
524
524
  scope=scope.name,
525
525
  membership_id=membership.membership_id,
526
526
  location="global",
@@ -364,7 +364,7 @@ class MembershipRbacRoleBinding(pulumi.CustomResource):
364
364
  network="default",
365
365
  subnetwork="default")
366
366
  membership = gcp.gkehub.Membership("membership",
367
- membership_id="tf-test-membership_74391",
367
+ membership_id="tf-test-membership_39249",
368
368
  endpoint=gcp.gkehub.MembershipEndpointArgs(
369
369
  gke_cluster=gcp.gkehub.MembershipEndpointGkeClusterArgs(
370
370
  resource_link=primary.id.apply(lambda id: f"//container.googleapis.com/{id}"),
@@ -372,7 +372,7 @@ class MembershipRbacRoleBinding(pulumi.CustomResource):
372
372
  ))
373
373
  project = gcp.organizations.get_project()
374
374
  membership_rbac_role_binding = gcp.gkehub.MembershipRbacRoleBinding("membership_rbac_role_binding",
375
- membership_rbac_role_binding_id="tf-test-membership-rbac-role-binding_16511",
375
+ membership_rbac_role_binding_id="tf-test-membership-rbac-role-binding_74391",
376
376
  membership_id=membership.membership_id,
377
377
  user=f"service-{project.number}@gcp-sa-anthossupport.iam.gserviceaccount.com",
378
378
  role=gcp.gkehub.MembershipRbacRoleBindingRoleArgs(
@@ -444,7 +444,7 @@ class MembershipRbacRoleBinding(pulumi.CustomResource):
444
444
  network="default",
445
445
  subnetwork="default")
446
446
  membership = gcp.gkehub.Membership("membership",
447
- membership_id="tf-test-membership_74391",
447
+ membership_id="tf-test-membership_39249",
448
448
  endpoint=gcp.gkehub.MembershipEndpointArgs(
449
449
  gke_cluster=gcp.gkehub.MembershipEndpointGkeClusterArgs(
450
450
  resource_link=primary.id.apply(lambda id: f"//container.googleapis.com/{id}"),
@@ -452,7 +452,7 @@ class MembershipRbacRoleBinding(pulumi.CustomResource):
452
452
  ))
453
453
  project = gcp.organizations.get_project()
454
454
  membership_rbac_role_binding = gcp.gkehub.MembershipRbacRoleBinding("membership_rbac_role_binding",
455
- membership_rbac_role_binding_id="tf-test-membership-rbac-role-binding_16511",
455
+ membership_rbac_role_binding_id="tf-test-membership-rbac-role-binding_74391",
456
456
  membership_id=membership.membership_id,
457
457
  user=f"service-{project.number}@gcp-sa-anthossupport.iam.gserviceaccount.com",
458
458
  role=gcp.gkehub.MembershipRbacRoleBindingRoleArgs(
@@ -424,9 +424,9 @@ class Namespace(pulumi.CustomResource):
424
424
  import pulumi
425
425
  import pulumi_gcp as gcp
426
426
 
427
- scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_8493")
427
+ scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_16511")
428
428
  namespace = gcp.gkehub.Namespace("namespace",
429
- scope_namespace_id="tf-test-namespace_9106",
429
+ scope_namespace_id="tf-test-namespace_8493",
430
430
  scope_id=scope.scope_id,
431
431
  scope=scope.name,
432
432
  namespace_labels={
@@ -510,9 +510,9 @@ class Namespace(pulumi.CustomResource):
510
510
  import pulumi
511
511
  import pulumi_gcp as gcp
512
512
 
513
- scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_8493")
513
+ scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_16511")
514
514
  namespace = gcp.gkehub.Namespace("namespace",
515
- scope_namespace_id="tf-test-namespace_9106",
515
+ scope_namespace_id="tf-test-namespace_8493",
516
516
  scope_id=scope.scope_id,
517
517
  scope=scope.name,
518
518
  namespace_labels={
@@ -453,9 +453,9 @@ class ScopeRbacRoleBinding(pulumi.CustomResource):
453
453
  import pulumi
454
454
  import pulumi_gcp as gcp
455
455
 
456
- scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_27169")
456
+ scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_9106")
457
457
  scope_rbac_role_binding = gcp.gkehub.ScopeRbacRoleBinding("scope_rbac_role_binding",
458
- scope_rbac_role_binding_id="tf-test-scope-rbac-role-binding_75223",
458
+ scope_rbac_role_binding_id="tf-test-scope-rbac-role-binding_27169",
459
459
  scope_id=scope.scope_id,
460
460
  user="test-email@gmail.com",
461
461
  role=gcp.gkehub.ScopeRbacRoleBindingRoleArgs(
@@ -535,9 +535,9 @@ class ScopeRbacRoleBinding(pulumi.CustomResource):
535
535
  import pulumi
536
536
  import pulumi_gcp as gcp
537
537
 
538
- scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_27169")
538
+ scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_9106")
539
539
  scope_rbac_role_binding = gcp.gkehub.ScopeRbacRoleBinding("scope_rbac_role_binding",
540
- scope_rbac_role_binding_id="tf-test-scope-rbac-role-binding_75223",
540
+ scope_rbac_role_binding_id="tf-test-scope-rbac-role-binding_27169",
541
541
  scope_id=scope.scope_id,
542
542
  user="test-email@gmail.com",
543
543
  role=gcp.gkehub.ScopeRbacRoleBindingRoleArgs(
pulumi_gcp/iam/_inputs.py CHANGED
@@ -513,23 +513,6 @@ class WorkforcePoolProviderOidcArgs:
513
513
  .well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
514
514
  keys are supported. The JWK must use following format and include only
515
515
  the following fields:
516
- ```
517
- {
518
- "keys": [
519
- {
520
- "kty": "RSA/EC",
521
- "alg": "<algorithm>",
522
- "use": "sig",
523
- "kid": "<key-id>",
524
- "n": "",
525
- "e": "",
526
- "x": "",
527
- "y": "",
528
- "crv": ""
529
- }
530
- ]
531
- }
532
- ```
533
516
  :param pulumi.Input['WorkforcePoolProviderOidcWebSsoConfigArgs'] web_sso_config: Configuration for web single sign-on for the OIDC provider. Here, web sign-in refers to console sign-in and gcloud sign-in through the browser.
534
517
  Structure is documented below.
535
518
  """
@@ -589,23 +572,6 @@ class WorkforcePoolProviderOidcArgs:
589
572
  .well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
590
573
  keys are supported. The JWK must use following format and include only
591
574
  the following fields:
592
- ```
593
- {
594
- "keys": [
595
- {
596
- "kty": "RSA/EC",
597
- "alg": "<algorithm>",
598
- "use": "sig",
599
- "kid": "<key-id>",
600
- "n": "",
601
- "e": "",
602
- "x": "",
603
- "y": "",
604
- "crv": ""
605
- }
606
- ]
607
- }
608
- ```
609
575
  """
610
576
  return pulumi.get(self, "jwks_json")
611
577
 
@@ -846,33 +812,12 @@ class WorkloadIdentityPoolProviderOidcArgs:
846
812
  If this list is empty, the OIDC token audience must be equal to the full canonical
847
813
  resource name of the WorkloadIdentityPoolProvider, with or without the HTTPS prefix.
848
814
  For example:
849
- ```
850
- //iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
851
- https://iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
852
- ```
853
815
  :param pulumi.Input[str] jwks_json: OIDC JWKs in JSON String format. For details on definition of a
854
816
  JWK, see https:tools.ietf.org/html/rfc7517. If not set, then we
855
817
  use the `jwks_uri` from the discovery document fetched from the
856
818
  .well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
857
819
  keys are supported. The JWK must use following format and include only
858
820
  the following fields:
859
- ```
860
- {
861
- "keys": [
862
- {
863
- "kty": "RSA/EC",
864
- "alg": "<algorithm>",
865
- "use": "sig",
866
- "kid": "<key-id>",
867
- "n": "",
868
- "e": "",
869
- "x": "",
870
- "y": "",
871
- "crv": ""
872
- }
873
- ]
874
- }
875
- ```
876
821
  """
877
822
  pulumi.set(__self__, "issuer_uri", issuer_uri)
878
823
  if allowed_audiences is not None:
@@ -903,10 +848,6 @@ class WorkloadIdentityPoolProviderOidcArgs:
903
848
  If this list is empty, the OIDC token audience must be equal to the full canonical
904
849
  resource name of the WorkloadIdentityPoolProvider, with or without the HTTPS prefix.
905
850
  For example:
906
- ```
907
- //iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
908
- https://iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
909
- ```
910
851
  """
911
852
  return pulumi.get(self, "allowed_audiences")
912
853
 
@@ -924,23 +865,6 @@ class WorkloadIdentityPoolProviderOidcArgs:
924
865
  .well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
925
866
  keys are supported. The JWK must use following format and include only
926
867
  the following fields:
927
- ```
928
- {
929
- "keys": [
930
- {
931
- "kty": "RSA/EC",
932
- "alg": "<algorithm>",
933
- "use": "sig",
934
- "kid": "<key-id>",
935
- "n": "",
936
- "e": "",
937
- "x": "",
938
- "y": "",
939
- "crv": ""
940
- }
941
- ]
942
- }
943
- ```
944
868
  """
945
869
  return pulumi.get(self, "jwks_json")
946
870
 
pulumi_gcp/iam/outputs.py CHANGED
@@ -550,23 +550,6 @@ class WorkforcePoolProviderOidc(dict):
550
550
  .well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
551
551
  keys are supported. The JWK must use following format and include only
552
552
  the following fields:
553
- ```
554
- {
555
- "keys": [
556
- {
557
- "kty": "RSA/EC",
558
- "alg": "<algorithm>",
559
- "use": "sig",
560
- "kid": "<key-id>",
561
- "n": "",
562
- "e": "",
563
- "x": "",
564
- "y": "",
565
- "crv": ""
566
- }
567
- ]
568
- }
569
- ```
570
553
  :param 'WorkforcePoolProviderOidcWebSsoConfigArgs' web_sso_config: Configuration for web single sign-on for the OIDC provider. Here, web sign-in refers to console sign-in and gcloud sign-in through the browser.
571
554
  Structure is documented below.
572
555
  """
@@ -614,23 +597,6 @@ class WorkforcePoolProviderOidc(dict):
614
597
  .well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
615
598
  keys are supported. The JWK must use following format and include only
616
599
  the following fields:
617
- ```
618
- {
619
- "keys": [
620
- {
621
- "kty": "RSA/EC",
622
- "alg": "<algorithm>",
623
- "use": "sig",
624
- "kid": "<key-id>",
625
- "n": "",
626
- "e": "",
627
- "x": "",
628
- "y": "",
629
- "crv": ""
630
- }
631
- ]
632
- }
633
- ```
634
600
  """
635
601
  return pulumi.get(self, "jwks_json")
636
602
 
@@ -924,33 +890,12 @@ class WorkloadIdentityPoolProviderOidc(dict):
924
890
  If this list is empty, the OIDC token audience must be equal to the full canonical
925
891
  resource name of the WorkloadIdentityPoolProvider, with or without the HTTPS prefix.
926
892
  For example:
927
- ```
928
- //iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
929
- https://iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
930
- ```
931
893
  :param str jwks_json: OIDC JWKs in JSON String format. For details on definition of a
932
894
  JWK, see https:tools.ietf.org/html/rfc7517. If not set, then we
933
895
  use the `jwks_uri` from the discovery document fetched from the
934
896
  .well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
935
897
  keys are supported. The JWK must use following format and include only
936
898
  the following fields:
937
- ```
938
- {
939
- "keys": [
940
- {
941
- "kty": "RSA/EC",
942
- "alg": "<algorithm>",
943
- "use": "sig",
944
- "kid": "<key-id>",
945
- "n": "",
946
- "e": "",
947
- "x": "",
948
- "y": "",
949
- "crv": ""
950
- }
951
- ]
952
- }
953
- ```
954
899
  """
955
900
  pulumi.set(__self__, "issuer_uri", issuer_uri)
956
901
  if allowed_audiences is not None:
@@ -977,10 +922,6 @@ class WorkloadIdentityPoolProviderOidc(dict):
977
922
  If this list is empty, the OIDC token audience must be equal to the full canonical
978
923
  resource name of the WorkloadIdentityPoolProvider, with or without the HTTPS prefix.
979
924
  For example:
980
- ```
981
- //iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
982
- https://iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
983
- ```
984
925
  """
985
926
  return pulumi.get(self, "allowed_audiences")
986
927
 
@@ -994,23 +935,6 @@ class WorkloadIdentityPoolProviderOidc(dict):
994
935
  .well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
995
936
  keys are supported. The JWK must use following format and include only
996
937
  the following fields:
997
- ```
998
- {
999
- "keys": [
1000
- {
1001
- "kty": "RSA/EC",
1002
- "alg": "<algorithm>",
1003
- "use": "sig",
1004
- "kid": "<key-id>",
1005
- "n": "",
1006
- "e": "",
1007
- "x": "",
1008
- "y": "",
1009
- "crv": ""
1010
- }
1011
- ]
1012
- }
1013
- ```
1014
938
  """
1015
939
  return pulumi.get(self, "jwks_json")
1016
940
 
@@ -81,11 +81,6 @@ class WorkforcePoolProviderArgs:
81
81
  For OIDC providers, you must supply a custom mapping that includes the `google.subject` attribute.
82
82
  For example, the following maps the sub claim of the incoming credential to the `subject` attribute
83
83
  on a Google token:
84
- ```
85
- {"google.subject": "assertion.sub"}
86
- ```
87
- An object containing a list of `"key": value` pairs.
88
- Example: `{ "name": "wrench", "mass": "1.3kg", "count": "3" }`.
89
84
  :param pulumi.Input[str] description: A user-specified description of the provider. Cannot exceed 256 characters.
90
85
  :param pulumi.Input[bool] disabled: Whether the provider is disabled. You cannot use a disabled provider to exchange tokens.
91
86
  However, existing tokens still grant access.
@@ -214,11 +209,6 @@ class WorkforcePoolProviderArgs:
214
209
  For OIDC providers, you must supply a custom mapping that includes the `google.subject` attribute.
215
210
  For example, the following maps the sub claim of the incoming credential to the `subject` attribute
216
211
  on a Google token:
217
- ```
218
- {"google.subject": "assertion.sub"}
219
- ```
220
- An object containing a list of `"key": value` pairs.
221
- Example: `{ "name": "wrench", "mass": "1.3kg", "count": "3" }`.
222
212
  """
223
213
  return pulumi.get(self, "attribute_mapping")
224
214
 
@@ -349,11 +339,6 @@ class _WorkforcePoolProviderState:
349
339
  For OIDC providers, you must supply a custom mapping that includes the `google.subject` attribute.
350
340
  For example, the following maps the sub claim of the incoming credential to the `subject` attribute
351
341
  on a Google token:
352
- ```
353
- {"google.subject": "assertion.sub"}
354
- ```
355
- An object containing a list of `"key": value` pairs.
356
- Example: `{ "name": "wrench", "mass": "1.3kg", "count": "3" }`.
357
342
  :param pulumi.Input[str] description: A user-specified description of the provider. Cannot exceed 256 characters.
358
343
  :param pulumi.Input[bool] disabled: Whether the provider is disabled. You cannot use a disabled provider to exchange tokens.
359
344
  However, existing tokens still grant access.
@@ -464,11 +449,6 @@ class _WorkforcePoolProviderState:
464
449
  For OIDC providers, you must supply a custom mapping that includes the `google.subject` attribute.
465
450
  For example, the following maps the sub claim of the incoming credential to the `subject` attribute
466
451
  on a Google token:
467
- ```
468
- {"google.subject": "assertion.sub"}
469
- ```
470
- An object containing a list of `"key": value` pairs.
471
- Example: `{ "name": "wrench", "mass": "1.3kg", "count": "3" }`.
472
452
  """
473
453
  return pulumi.get(self, "attribute_mapping")
474
454
 
@@ -831,11 +811,6 @@ class WorkforcePoolProvider(pulumi.CustomResource):
831
811
  For OIDC providers, you must supply a custom mapping that includes the `google.subject` attribute.
832
812
  For example, the following maps the sub claim of the incoming credential to the `subject` attribute
833
813
  on a Google token:
834
- ```
835
- {"google.subject": "assertion.sub"}
836
- ```
837
- An object containing a list of `"key": value` pairs.
838
- Example: `{ "name": "wrench", "mass": "1.3kg", "count": "3" }`.
839
814
  :param pulumi.Input[str] description: A user-specified description of the provider. Cannot exceed 256 characters.
840
815
  :param pulumi.Input[bool] disabled: Whether the provider is disabled. You cannot use a disabled provider to exchange tokens.
841
816
  However, existing tokens still grant access.
@@ -1142,11 +1117,6 @@ class WorkforcePoolProvider(pulumi.CustomResource):
1142
1117
  For OIDC providers, you must supply a custom mapping that includes the `google.subject` attribute.
1143
1118
  For example, the following maps the sub claim of the incoming credential to the `subject` attribute
1144
1119
  on a Google token:
1145
- ```
1146
- {"google.subject": "assertion.sub"}
1147
- ```
1148
- An object containing a list of `"key": value` pairs.
1149
- Example: `{ "name": "wrench", "mass": "1.3kg", "count": "3" }`.
1150
1120
  :param pulumi.Input[str] description: A user-specified description of the provider. Cannot exceed 256 characters.
1151
1121
  :param pulumi.Input[bool] disabled: Whether the provider is disabled. You cannot use a disabled provider to exchange tokens.
1152
1122
  However, existing tokens still grant access.
@@ -1246,11 +1216,6 @@ class WorkforcePoolProvider(pulumi.CustomResource):
1246
1216
  For OIDC providers, you must supply a custom mapping that includes the `google.subject` attribute.
1247
1217
  For example, the following maps the sub claim of the incoming credential to the `subject` attribute
1248
1218
  on a Google token:
1249
- ```
1250
- {"google.subject": "assertion.sub"}
1251
- ```
1252
- An object containing a list of `"key": value` pairs.
1253
- Example: `{ "name": "wrench", "mass": "1.3kg", "count": "3" }`.
1254
1219
  """
1255
1220
  return pulumi.get(self, "attribute_mapping")
1256
1221
 
@@ -74,26 +74,6 @@ class WorkloadIdentityPoolProviderArgs:
74
74
  the total size of all mapped attributes must not exceed 8KB.
75
75
  For AWS providers, the following rules apply:
76
76
  - If no attribute mapping is defined, the following default mapping applies:
77
- ```
78
- {
79
- "google.subject":"assertion.arn",
80
- "attribute.aws_role":
81
- "assertion.arn.contains('assumed-role')"
82
- " ? assertion.arn.extract('{account_arn}assumed-role/')"
83
- " + 'assumed-role/'"
84
- " + assertion.arn.extract('assumed-role/{role_name}/')"
85
- " : assertion.arn",
86
- }
87
- ```
88
- - If any custom attribute mappings are defined, they must include a mapping to the
89
- `google.subject` attribute.
90
- For OIDC providers, the following rules apply:
91
- - Custom attribute mappings must be defined, and must include a mapping to the
92
- `google.subject` attribute. For example, the following maps the `sub` claim of the
93
- incoming credential to the `subject` attribute on a Google token.
94
- ```
95
- {"google.subject": "assertion.sub"}
96
- ```
97
77
  :param pulumi.Input['WorkloadIdentityPoolProviderAwsArgs'] aws: An Amazon Web Services identity provider. Not compatible with the property oidc or saml.
98
78
  Structure is documented below.
99
79
  :param pulumi.Input[str] description: A description for the provider. Cannot exceed 256 characters.
@@ -210,26 +190,6 @@ class WorkloadIdentityPoolProviderArgs:
210
190
  the total size of all mapped attributes must not exceed 8KB.
211
191
  For AWS providers, the following rules apply:
212
192
  - If no attribute mapping is defined, the following default mapping applies:
213
- ```
214
- {
215
- "google.subject":"assertion.arn",
216
- "attribute.aws_role":
217
- "assertion.arn.contains('assumed-role')"
218
- " ? assertion.arn.extract('{account_arn}assumed-role/')"
219
- " + 'assumed-role/'"
220
- " + assertion.arn.extract('assumed-role/{role_name}/')"
221
- " : assertion.arn",
222
- }
223
- ```
224
- - If any custom attribute mappings are defined, they must include a mapping to the
225
- `google.subject` attribute.
226
- For OIDC providers, the following rules apply:
227
- - Custom attribute mappings must be defined, and must include a mapping to the
228
- `google.subject` attribute. For example, the following maps the `sub` claim of the
229
- incoming credential to the `subject` attribute on a Google token.
230
- ```
231
- {"google.subject": "assertion.sub"}
232
- ```
233
193
  """
234
194
  return pulumi.get(self, "attribute_mapping")
235
195
 
@@ -381,26 +341,6 @@ class _WorkloadIdentityPoolProviderState:
381
341
  the total size of all mapped attributes must not exceed 8KB.
382
342
  For AWS providers, the following rules apply:
383
343
  - If no attribute mapping is defined, the following default mapping applies:
384
- ```
385
- {
386
- "google.subject":"assertion.arn",
387
- "attribute.aws_role":
388
- "assertion.arn.contains('assumed-role')"
389
- " ? assertion.arn.extract('{account_arn}assumed-role/')"
390
- " + 'assumed-role/'"
391
- " + assertion.arn.extract('assumed-role/{role_name}/')"
392
- " : assertion.arn",
393
- }
394
- ```
395
- - If any custom attribute mappings are defined, they must include a mapping to the
396
- `google.subject` attribute.
397
- For OIDC providers, the following rules apply:
398
- - Custom attribute mappings must be defined, and must include a mapping to the
399
- `google.subject` attribute. For example, the following maps the `sub` claim of the
400
- incoming credential to the `subject` attribute on a Google token.
401
- ```
402
- {"google.subject": "assertion.sub"}
403
- ```
404
344
  :param pulumi.Input['WorkloadIdentityPoolProviderAwsArgs'] aws: An Amazon Web Services identity provider. Not compatible with the property oidc or saml.
405
345
  Structure is documented below.
406
346
  :param pulumi.Input[str] description: A description for the provider. Cannot exceed 256 characters.
@@ -510,26 +450,6 @@ class _WorkloadIdentityPoolProviderState:
510
450
  the total size of all mapped attributes must not exceed 8KB.
511
451
  For AWS providers, the following rules apply:
512
452
  - If no attribute mapping is defined, the following default mapping applies:
513
- ```
514
- {
515
- "google.subject":"assertion.arn",
516
- "attribute.aws_role":
517
- "assertion.arn.contains('assumed-role')"
518
- " ? assertion.arn.extract('{account_arn}assumed-role/')"
519
- " + 'assumed-role/'"
520
- " + assertion.arn.extract('assumed-role/{role_name}/')"
521
- " : assertion.arn",
522
- }
523
- ```
524
- - If any custom attribute mappings are defined, they must include a mapping to the
525
- `google.subject` attribute.
526
- For OIDC providers, the following rules apply:
527
- - Custom attribute mappings must be defined, and must include a mapping to the
528
- `google.subject` attribute. For example, the following maps the `sub` claim of the
529
- incoming credential to the `subject` attribute on a Google token.
530
- ```
531
- {"google.subject": "assertion.sub"}
532
- ```
533
453
  """
534
454
  return pulumi.get(self, "attribute_mapping")
535
455
 
@@ -954,26 +874,6 @@ class WorkloadIdentityPoolProvider(pulumi.CustomResource):
954
874
  the total size of all mapped attributes must not exceed 8KB.
955
875
  For AWS providers, the following rules apply:
956
876
  - If no attribute mapping is defined, the following default mapping applies:
957
- ```
958
- {
959
- "google.subject":"assertion.arn",
960
- "attribute.aws_role":
961
- "assertion.arn.contains('assumed-role')"
962
- " ? assertion.arn.extract('{account_arn}assumed-role/')"
963
- " + 'assumed-role/'"
964
- " + assertion.arn.extract('assumed-role/{role_name}/')"
965
- " : assertion.arn",
966
- }
967
- ```
968
- - If any custom attribute mappings are defined, they must include a mapping to the
969
- `google.subject` attribute.
970
- For OIDC providers, the following rules apply:
971
- - Custom attribute mappings must be defined, and must include a mapping to the
972
- `google.subject` attribute. For example, the following maps the `sub` claim of the
973
- incoming credential to the `subject` attribute on a Google token.
974
- ```
975
- {"google.subject": "assertion.sub"}
976
- ```
977
877
  :param pulumi.Input[pulumi.InputType['WorkloadIdentityPoolProviderAwsArgs']] aws: An Amazon Web Services identity provider. Not compatible with the property oidc or saml.
978
878
  Structure is documented below.
979
879
  :param pulumi.Input[str] description: A description for the provider. Cannot exceed 256 characters.
@@ -1330,26 +1230,6 @@ class WorkloadIdentityPoolProvider(pulumi.CustomResource):
1330
1230
  the total size of all mapped attributes must not exceed 8KB.
1331
1231
  For AWS providers, the following rules apply:
1332
1232
  - If no attribute mapping is defined, the following default mapping applies:
1333
- ```
1334
- {
1335
- "google.subject":"assertion.arn",
1336
- "attribute.aws_role":
1337
- "assertion.arn.contains('assumed-role')"
1338
- " ? assertion.arn.extract('{account_arn}assumed-role/')"
1339
- " + 'assumed-role/'"
1340
- " + assertion.arn.extract('assumed-role/{role_name}/')"
1341
- " : assertion.arn",
1342
- }
1343
- ```
1344
- - If any custom attribute mappings are defined, they must include a mapping to the
1345
- `google.subject` attribute.
1346
- For OIDC providers, the following rules apply:
1347
- - Custom attribute mappings must be defined, and must include a mapping to the
1348
- `google.subject` attribute. For example, the following maps the `sub` claim of the
1349
- incoming credential to the `subject` attribute on a Google token.
1350
- ```
1351
- {"google.subject": "assertion.sub"}
1352
- ```
1353
1233
  :param pulumi.Input[pulumi.InputType['WorkloadIdentityPoolProviderAwsArgs']] aws: An Amazon Web Services identity provider. Not compatible with the property oidc or saml.
1354
1234
  Structure is documented below.
1355
1235
  :param pulumi.Input[str] description: A description for the provider. Cannot exceed 256 characters.
@@ -1447,26 +1327,6 @@ class WorkloadIdentityPoolProvider(pulumi.CustomResource):
1447
1327
  the total size of all mapped attributes must not exceed 8KB.
1448
1328
  For AWS providers, the following rules apply:
1449
1329
  - If no attribute mapping is defined, the following default mapping applies:
1450
- ```
1451
- {
1452
- "google.subject":"assertion.arn",
1453
- "attribute.aws_role":
1454
- "assertion.arn.contains('assumed-role')"
1455
- " ? assertion.arn.extract('{account_arn}assumed-role/')"
1456
- " + 'assumed-role/'"
1457
- " + assertion.arn.extract('assumed-role/{role_name}/')"
1458
- " : assertion.arn",
1459
- }
1460
- ```
1461
- - If any custom attribute mappings are defined, they must include a mapping to the
1462
- `google.subject` attribute.
1463
- For OIDC providers, the following rules apply:
1464
- - Custom attribute mappings must be defined, and must include a mapping to the
1465
- `google.subject` attribute. For example, the following maps the `sub` claim of the
1466
- incoming credential to the `subject` attribute on a Google token.
1467
- ```
1468
- {"google.subject": "assertion.sub"}
1469
- ```
1470
1330
  """
1471
1331
  return pulumi.get(self, "attribute_mapping")
1472
1332
 
@@ -249,7 +249,7 @@ class TunnelDestGroup(pulumi.CustomResource):
249
249
 
250
250
  dest_group = gcp.iap.TunnelDestGroup("dest_group",
251
251
  region="us-central1",
252
- group_name="testgroup_41819",
252
+ group_name="testgroup_75223",
253
253
  cidrs=[
254
254
  "10.1.0.0/16",
255
255
  "192.168.10.0/24",
@@ -337,7 +337,7 @@ class TunnelDestGroup(pulumi.CustomResource):
337
337
 
338
338
  dest_group = gcp.iap.TunnelDestGroup("dest_group",
339
339
  region="us-central1",
340
- group_name="testgroup_41819",
340
+ group_name="testgroup_75223",
341
341
  cidrs=[
342
342
  "10.1.0.0/16",
343
343
  "192.168.10.0/24",