pulumi-gcp 7.17.0__py3-none-any.whl → 7.17.0a1711607165__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +0 -27
- pulumi_gcp/apphub/__init__.py +0 -1
- pulumi_gcp/apphub/outputs.py +0 -214
- pulumi_gcp/bigquery/_inputs.py +0 -16
- pulumi_gcp/bigquery/outputs.py +0 -14
- pulumi_gcp/bigquery/routine.py +0 -98
- pulumi_gcp/bigtable/_inputs.py +4 -4
- pulumi_gcp/bigtable/gc_policy.py +0 -8
- pulumi_gcp/bigtable/outputs.py +4 -4
- pulumi_gcp/billing/_inputs.py +4 -4
- pulumi_gcp/billing/outputs.py +4 -4
- pulumi_gcp/billing/project_info.py +4 -4
- pulumi_gcp/cloudfunctionsv2/_inputs.py +2 -2
- pulumi_gcp/cloudfunctionsv2/outputs.py +4 -4
- pulumi_gcp/cloudquota/__init__.py +0 -2
- pulumi_gcp/cloudquota/outputs.py +0 -118
- pulumi_gcp/cloudrunv2/service.py +7 -7
- pulumi_gcp/composer/_inputs.py +4 -14
- pulumi_gcp/composer/outputs.py +10 -22
- pulumi_gcp/compute/_inputs.py +44 -40
- pulumi_gcp/compute/autoscaler.py +14 -14
- pulumi_gcp/compute/interconnect_attachment.py +0 -64
- pulumi_gcp/compute/network_endpoint.py +0 -8
- pulumi_gcp/compute/network_endpoint_list.py +0 -8
- pulumi_gcp/compute/outputs.py +60 -62
- pulumi_gcp/compute/region_autoscaler.py +14 -14
- pulumi_gcp/compute/region_backend_service.py +0 -28
- pulumi_gcp/compute/target_instance.py +4 -4
- pulumi_gcp/config/__init__.pyi +0 -2
- pulumi_gcp/config/vars.py +0 -4
- pulumi_gcp/container/_inputs.py +16 -148
- pulumi_gcp/container/outputs.py +16 -148
- pulumi_gcp/databasemigrationservice/connection_profile.py +6 -6
- pulumi_gcp/dataflow/flex_template_job.py +112 -84
- pulumi_gcp/dataloss/_inputs.py +6 -6
- pulumi_gcp/dataloss/outputs.py +6 -6
- pulumi_gcp/dataplex/task.py +16 -16
- pulumi_gcp/dataproc/_inputs.py +10 -85
- pulumi_gcp/dataproc/get_metastore_service.py +1 -11
- pulumi_gcp/dataproc/metastore_service.py +0 -120
- pulumi_gcp/dataproc/outputs.py +10 -142
- pulumi_gcp/firebase/app_check_service_config.py +2 -2
- pulumi_gcp/firestore/backup_schedule.py +14 -14
- pulumi_gcp/firestore/field.py +4 -4
- pulumi_gcp/gkehub/membership_binding.py +6 -6
- pulumi_gcp/gkehub/membership_rbac_role_binding.py +4 -4
- pulumi_gcp/gkehub/namespace.py +4 -4
- pulumi_gcp/gkehub/scope_rbac_role_binding.py +4 -4
- pulumi_gcp/iam/_inputs.py +0 -76
- pulumi_gcp/iam/outputs.py +0 -76
- pulumi_gcp/iam/workforce_pool_provider.py +0 -35
- pulumi_gcp/iam/workload_identity_pool_provider.py +0 -140
- pulumi_gcp/iap/tunnel_dest_group.py +2 -2
- pulumi_gcp/kms/_inputs.py +0 -46
- pulumi_gcp/kms/crypto_key.py +0 -54
- pulumi_gcp/kms/crypto_key_version.py +0 -54
- pulumi_gcp/kms/get_kms_crypto_key.py +1 -11
- pulumi_gcp/kms/outputs.py +0 -54
- pulumi_gcp/logging/_inputs.py +8 -8
- pulumi_gcp/logging/metric.py +7 -7
- pulumi_gcp/logging/outputs.py +8 -8
- pulumi_gcp/monitoring/_inputs.py +2 -2
- pulumi_gcp/monitoring/outputs.py +2 -2
- pulumi_gcp/monitoring/slo.py +4 -4
- pulumi_gcp/networkservices/_inputs.py +6 -6
- pulumi_gcp/networkservices/outputs.py +6 -6
- pulumi_gcp/orgpolicy/policy.py +2 -2
- pulumi_gcp/provider.py +0 -20
- pulumi_gcp/pubsub/subscription.py +4 -4
- pulumi_gcp/serviceusage/consumer_quota_override.py +7 -7
- pulumi_gcp/sql/_inputs.py +2 -20
- pulumi_gcp/sql/database_instance.py +2 -2
- pulumi_gcp/sql/outputs.py +2 -20
- pulumi_gcp/storage/_inputs.py +2 -2
- pulumi_gcp/storage/outputs.py +2 -2
- pulumi_gcp/vertex/__init__.py +0 -1
- pulumi_gcp/vertex/_inputs.py +8 -175
- pulumi_gcp/vertex/outputs.py +10 -202
- pulumi_gcp/vpcaccess/connector.py +28 -77
- {pulumi_gcp-7.17.0.dist-info → pulumi_gcp-7.17.0a1711607165.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.17.0.dist-info → pulumi_gcp-7.17.0a1711607165.dist-info}/RECORD +83 -91
- pulumi_gcp/apphub/get_application.py +0 -220
- pulumi_gcp/applicationintegration/__init__.py +0 -10
- pulumi_gcp/applicationintegration/_inputs.py +0 -119
- pulumi_gcp/applicationintegration/client.py +0 -566
- pulumi_gcp/applicationintegration/outputs.py +0 -122
- pulumi_gcp/cloudquota/_inputs.py +0 -131
- pulumi_gcp/cloudquota/s_quota_preference.py +0 -777
- pulumi_gcp/vertex/ai_deployment_resource_pool.py +0 -477
- {pulumi_gcp-7.17.0.dist-info → pulumi_gcp-7.17.0a1711607165.dist-info}/WHEEL +0 -0
- {pulumi_gcp-7.17.0.dist-info → pulumi_gcp-7.17.0a1711607165.dist-info}/top_level.txt +0 -0
@@ -419,15 +419,15 @@ class MembershipBinding(pulumi.CustomResource):
|
|
419
419
|
network="default",
|
420
420
|
subnetwork="default")
|
421
421
|
membership = gcp.gkehub.Membership("membership",
|
422
|
-
membership_id="tf-test-
|
422
|
+
membership_id="tf-test-membership_74000",
|
423
423
|
endpoint=gcp.gkehub.MembershipEndpointArgs(
|
424
424
|
gke_cluster=gcp.gkehub.MembershipEndpointGkeClusterArgs(
|
425
425
|
resource_link=primary.id.apply(lambda id: f"//container.googleapis.com/{id}"),
|
426
426
|
),
|
427
427
|
))
|
428
|
-
scope = gcp.gkehub.Scope("scope", scope_id="tf-test-
|
428
|
+
scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_75125")
|
429
429
|
membership_binding = gcp.gkehub.MembershipBinding("membership_binding",
|
430
|
-
membership_binding_id="tf-test-membership-
|
430
|
+
membership_binding_id="tf-test-membership-binding_88722",
|
431
431
|
scope=scope.name,
|
432
432
|
membership_id=membership.membership_id,
|
433
433
|
location="global",
|
@@ -512,15 +512,15 @@ class MembershipBinding(pulumi.CustomResource):
|
|
512
512
|
network="default",
|
513
513
|
subnetwork="default")
|
514
514
|
membership = gcp.gkehub.Membership("membership",
|
515
|
-
membership_id="tf-test-
|
515
|
+
membership_id="tf-test-membership_74000",
|
516
516
|
endpoint=gcp.gkehub.MembershipEndpointArgs(
|
517
517
|
gke_cluster=gcp.gkehub.MembershipEndpointGkeClusterArgs(
|
518
518
|
resource_link=primary.id.apply(lambda id: f"//container.googleapis.com/{id}"),
|
519
519
|
),
|
520
520
|
))
|
521
|
-
scope = gcp.gkehub.Scope("scope", scope_id="tf-test-
|
521
|
+
scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_75125")
|
522
522
|
membership_binding = gcp.gkehub.MembershipBinding("membership_binding",
|
523
|
-
membership_binding_id="tf-test-membership-
|
523
|
+
membership_binding_id="tf-test-membership-binding_88722",
|
524
524
|
scope=scope.name,
|
525
525
|
membership_id=membership.membership_id,
|
526
526
|
location="global",
|
@@ -364,7 +364,7 @@ class MembershipRbacRoleBinding(pulumi.CustomResource):
|
|
364
364
|
network="default",
|
365
365
|
subnetwork="default")
|
366
366
|
membership = gcp.gkehub.Membership("membership",
|
367
|
-
membership_id="tf-test-
|
367
|
+
membership_id="tf-test-membership_39249",
|
368
368
|
endpoint=gcp.gkehub.MembershipEndpointArgs(
|
369
369
|
gke_cluster=gcp.gkehub.MembershipEndpointGkeClusterArgs(
|
370
370
|
resource_link=primary.id.apply(lambda id: f"//container.googleapis.com/{id}"),
|
@@ -372,7 +372,7 @@ class MembershipRbacRoleBinding(pulumi.CustomResource):
|
|
372
372
|
))
|
373
373
|
project = gcp.organizations.get_project()
|
374
374
|
membership_rbac_role_binding = gcp.gkehub.MembershipRbacRoleBinding("membership_rbac_role_binding",
|
375
|
-
membership_rbac_role_binding_id="tf-test-membership-rbac-role-
|
375
|
+
membership_rbac_role_binding_id="tf-test-membership-rbac-role-binding_74391",
|
376
376
|
membership_id=membership.membership_id,
|
377
377
|
user=f"service-{project.number}@gcp-sa-anthossupport.iam.gserviceaccount.com",
|
378
378
|
role=gcp.gkehub.MembershipRbacRoleBindingRoleArgs(
|
@@ -444,7 +444,7 @@ class MembershipRbacRoleBinding(pulumi.CustomResource):
|
|
444
444
|
network="default",
|
445
445
|
subnetwork="default")
|
446
446
|
membership = gcp.gkehub.Membership("membership",
|
447
|
-
membership_id="tf-test-
|
447
|
+
membership_id="tf-test-membership_39249",
|
448
448
|
endpoint=gcp.gkehub.MembershipEndpointArgs(
|
449
449
|
gke_cluster=gcp.gkehub.MembershipEndpointGkeClusterArgs(
|
450
450
|
resource_link=primary.id.apply(lambda id: f"//container.googleapis.com/{id}"),
|
@@ -452,7 +452,7 @@ class MembershipRbacRoleBinding(pulumi.CustomResource):
|
|
452
452
|
))
|
453
453
|
project = gcp.organizations.get_project()
|
454
454
|
membership_rbac_role_binding = gcp.gkehub.MembershipRbacRoleBinding("membership_rbac_role_binding",
|
455
|
-
membership_rbac_role_binding_id="tf-test-membership-rbac-role-
|
455
|
+
membership_rbac_role_binding_id="tf-test-membership-rbac-role-binding_74391",
|
456
456
|
membership_id=membership.membership_id,
|
457
457
|
user=f"service-{project.number}@gcp-sa-anthossupport.iam.gserviceaccount.com",
|
458
458
|
role=gcp.gkehub.MembershipRbacRoleBindingRoleArgs(
|
pulumi_gcp/gkehub/namespace.py
CHANGED
@@ -424,9 +424,9 @@ class Namespace(pulumi.CustomResource):
|
|
424
424
|
import pulumi
|
425
425
|
import pulumi_gcp as gcp
|
426
426
|
|
427
|
-
scope = gcp.gkehub.Scope("scope", scope_id="tf-test-
|
427
|
+
scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_16511")
|
428
428
|
namespace = gcp.gkehub.Namespace("namespace",
|
429
|
-
scope_namespace_id="tf-test-
|
429
|
+
scope_namespace_id="tf-test-namespace_8493",
|
430
430
|
scope_id=scope.scope_id,
|
431
431
|
scope=scope.name,
|
432
432
|
namespace_labels={
|
@@ -510,9 +510,9 @@ class Namespace(pulumi.CustomResource):
|
|
510
510
|
import pulumi
|
511
511
|
import pulumi_gcp as gcp
|
512
512
|
|
513
|
-
scope = gcp.gkehub.Scope("scope", scope_id="tf-test-
|
513
|
+
scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_16511")
|
514
514
|
namespace = gcp.gkehub.Namespace("namespace",
|
515
|
-
scope_namespace_id="tf-test-
|
515
|
+
scope_namespace_id="tf-test-namespace_8493",
|
516
516
|
scope_id=scope.scope_id,
|
517
517
|
scope=scope.name,
|
518
518
|
namespace_labels={
|
@@ -453,9 +453,9 @@ class ScopeRbacRoleBinding(pulumi.CustomResource):
|
|
453
453
|
import pulumi
|
454
454
|
import pulumi_gcp as gcp
|
455
455
|
|
456
|
-
scope = gcp.gkehub.Scope("scope", scope_id="tf-test-
|
456
|
+
scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_9106")
|
457
457
|
scope_rbac_role_binding = gcp.gkehub.ScopeRbacRoleBinding("scope_rbac_role_binding",
|
458
|
-
scope_rbac_role_binding_id="tf-test-scope-rbac-role-
|
458
|
+
scope_rbac_role_binding_id="tf-test-scope-rbac-role-binding_27169",
|
459
459
|
scope_id=scope.scope_id,
|
460
460
|
user="test-email@gmail.com",
|
461
461
|
role=gcp.gkehub.ScopeRbacRoleBindingRoleArgs(
|
@@ -535,9 +535,9 @@ class ScopeRbacRoleBinding(pulumi.CustomResource):
|
|
535
535
|
import pulumi
|
536
536
|
import pulumi_gcp as gcp
|
537
537
|
|
538
|
-
scope = gcp.gkehub.Scope("scope", scope_id="tf-test-
|
538
|
+
scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_9106")
|
539
539
|
scope_rbac_role_binding = gcp.gkehub.ScopeRbacRoleBinding("scope_rbac_role_binding",
|
540
|
-
scope_rbac_role_binding_id="tf-test-scope-rbac-role-
|
540
|
+
scope_rbac_role_binding_id="tf-test-scope-rbac-role-binding_27169",
|
541
541
|
scope_id=scope.scope_id,
|
542
542
|
user="test-email@gmail.com",
|
543
543
|
role=gcp.gkehub.ScopeRbacRoleBindingRoleArgs(
|
pulumi_gcp/iam/_inputs.py
CHANGED
@@ -513,23 +513,6 @@ class WorkforcePoolProviderOidcArgs:
|
|
513
513
|
.well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
|
514
514
|
keys are supported. The JWK must use following format and include only
|
515
515
|
the following fields:
|
516
|
-
```
|
517
|
-
{
|
518
|
-
"keys": [
|
519
|
-
{
|
520
|
-
"kty": "RSA/EC",
|
521
|
-
"alg": "<algorithm>",
|
522
|
-
"use": "sig",
|
523
|
-
"kid": "<key-id>",
|
524
|
-
"n": "",
|
525
|
-
"e": "",
|
526
|
-
"x": "",
|
527
|
-
"y": "",
|
528
|
-
"crv": ""
|
529
|
-
}
|
530
|
-
]
|
531
|
-
}
|
532
|
-
```
|
533
516
|
:param pulumi.Input['WorkforcePoolProviderOidcWebSsoConfigArgs'] web_sso_config: Configuration for web single sign-on for the OIDC provider. Here, web sign-in refers to console sign-in and gcloud sign-in through the browser.
|
534
517
|
Structure is documented below.
|
535
518
|
"""
|
@@ -589,23 +572,6 @@ class WorkforcePoolProviderOidcArgs:
|
|
589
572
|
.well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
|
590
573
|
keys are supported. The JWK must use following format and include only
|
591
574
|
the following fields:
|
592
|
-
```
|
593
|
-
{
|
594
|
-
"keys": [
|
595
|
-
{
|
596
|
-
"kty": "RSA/EC",
|
597
|
-
"alg": "<algorithm>",
|
598
|
-
"use": "sig",
|
599
|
-
"kid": "<key-id>",
|
600
|
-
"n": "",
|
601
|
-
"e": "",
|
602
|
-
"x": "",
|
603
|
-
"y": "",
|
604
|
-
"crv": ""
|
605
|
-
}
|
606
|
-
]
|
607
|
-
}
|
608
|
-
```
|
609
575
|
"""
|
610
576
|
return pulumi.get(self, "jwks_json")
|
611
577
|
|
@@ -846,33 +812,12 @@ class WorkloadIdentityPoolProviderOidcArgs:
|
|
846
812
|
If this list is empty, the OIDC token audience must be equal to the full canonical
|
847
813
|
resource name of the WorkloadIdentityPoolProvider, with or without the HTTPS prefix.
|
848
814
|
For example:
|
849
|
-
```
|
850
|
-
//iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
|
851
|
-
https://iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
|
852
|
-
```
|
853
815
|
:param pulumi.Input[str] jwks_json: OIDC JWKs in JSON String format. For details on definition of a
|
854
816
|
JWK, see https:tools.ietf.org/html/rfc7517. If not set, then we
|
855
817
|
use the `jwks_uri` from the discovery document fetched from the
|
856
818
|
.well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
|
857
819
|
keys are supported. The JWK must use following format and include only
|
858
820
|
the following fields:
|
859
|
-
```
|
860
|
-
{
|
861
|
-
"keys": [
|
862
|
-
{
|
863
|
-
"kty": "RSA/EC",
|
864
|
-
"alg": "<algorithm>",
|
865
|
-
"use": "sig",
|
866
|
-
"kid": "<key-id>",
|
867
|
-
"n": "",
|
868
|
-
"e": "",
|
869
|
-
"x": "",
|
870
|
-
"y": "",
|
871
|
-
"crv": ""
|
872
|
-
}
|
873
|
-
]
|
874
|
-
}
|
875
|
-
```
|
876
821
|
"""
|
877
822
|
pulumi.set(__self__, "issuer_uri", issuer_uri)
|
878
823
|
if allowed_audiences is not None:
|
@@ -903,10 +848,6 @@ class WorkloadIdentityPoolProviderOidcArgs:
|
|
903
848
|
If this list is empty, the OIDC token audience must be equal to the full canonical
|
904
849
|
resource name of the WorkloadIdentityPoolProvider, with or without the HTTPS prefix.
|
905
850
|
For example:
|
906
|
-
```
|
907
|
-
//iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
|
908
|
-
https://iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
|
909
|
-
```
|
910
851
|
"""
|
911
852
|
return pulumi.get(self, "allowed_audiences")
|
912
853
|
|
@@ -924,23 +865,6 @@ class WorkloadIdentityPoolProviderOidcArgs:
|
|
924
865
|
.well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
|
925
866
|
keys are supported. The JWK must use following format and include only
|
926
867
|
the following fields:
|
927
|
-
```
|
928
|
-
{
|
929
|
-
"keys": [
|
930
|
-
{
|
931
|
-
"kty": "RSA/EC",
|
932
|
-
"alg": "<algorithm>",
|
933
|
-
"use": "sig",
|
934
|
-
"kid": "<key-id>",
|
935
|
-
"n": "",
|
936
|
-
"e": "",
|
937
|
-
"x": "",
|
938
|
-
"y": "",
|
939
|
-
"crv": ""
|
940
|
-
}
|
941
|
-
]
|
942
|
-
}
|
943
|
-
```
|
944
868
|
"""
|
945
869
|
return pulumi.get(self, "jwks_json")
|
946
870
|
|
pulumi_gcp/iam/outputs.py
CHANGED
@@ -550,23 +550,6 @@ class WorkforcePoolProviderOidc(dict):
|
|
550
550
|
.well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
|
551
551
|
keys are supported. The JWK must use following format and include only
|
552
552
|
the following fields:
|
553
|
-
```
|
554
|
-
{
|
555
|
-
"keys": [
|
556
|
-
{
|
557
|
-
"kty": "RSA/EC",
|
558
|
-
"alg": "<algorithm>",
|
559
|
-
"use": "sig",
|
560
|
-
"kid": "<key-id>",
|
561
|
-
"n": "",
|
562
|
-
"e": "",
|
563
|
-
"x": "",
|
564
|
-
"y": "",
|
565
|
-
"crv": ""
|
566
|
-
}
|
567
|
-
]
|
568
|
-
}
|
569
|
-
```
|
570
553
|
:param 'WorkforcePoolProviderOidcWebSsoConfigArgs' web_sso_config: Configuration for web single sign-on for the OIDC provider. Here, web sign-in refers to console sign-in and gcloud sign-in through the browser.
|
571
554
|
Structure is documented below.
|
572
555
|
"""
|
@@ -614,23 +597,6 @@ class WorkforcePoolProviderOidc(dict):
|
|
614
597
|
.well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
|
615
598
|
keys are supported. The JWK must use following format and include only
|
616
599
|
the following fields:
|
617
|
-
```
|
618
|
-
{
|
619
|
-
"keys": [
|
620
|
-
{
|
621
|
-
"kty": "RSA/EC",
|
622
|
-
"alg": "<algorithm>",
|
623
|
-
"use": "sig",
|
624
|
-
"kid": "<key-id>",
|
625
|
-
"n": "",
|
626
|
-
"e": "",
|
627
|
-
"x": "",
|
628
|
-
"y": "",
|
629
|
-
"crv": ""
|
630
|
-
}
|
631
|
-
]
|
632
|
-
}
|
633
|
-
```
|
634
600
|
"""
|
635
601
|
return pulumi.get(self, "jwks_json")
|
636
602
|
|
@@ -924,33 +890,12 @@ class WorkloadIdentityPoolProviderOidc(dict):
|
|
924
890
|
If this list is empty, the OIDC token audience must be equal to the full canonical
|
925
891
|
resource name of the WorkloadIdentityPoolProvider, with or without the HTTPS prefix.
|
926
892
|
For example:
|
927
|
-
```
|
928
|
-
//iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
|
929
|
-
https://iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
|
930
|
-
```
|
931
893
|
:param str jwks_json: OIDC JWKs in JSON String format. For details on definition of a
|
932
894
|
JWK, see https:tools.ietf.org/html/rfc7517. If not set, then we
|
933
895
|
use the `jwks_uri` from the discovery document fetched from the
|
934
896
|
.well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
|
935
897
|
keys are supported. The JWK must use following format and include only
|
936
898
|
the following fields:
|
937
|
-
```
|
938
|
-
{
|
939
|
-
"keys": [
|
940
|
-
{
|
941
|
-
"kty": "RSA/EC",
|
942
|
-
"alg": "<algorithm>",
|
943
|
-
"use": "sig",
|
944
|
-
"kid": "<key-id>",
|
945
|
-
"n": "",
|
946
|
-
"e": "",
|
947
|
-
"x": "",
|
948
|
-
"y": "",
|
949
|
-
"crv": ""
|
950
|
-
}
|
951
|
-
]
|
952
|
-
}
|
953
|
-
```
|
954
899
|
"""
|
955
900
|
pulumi.set(__self__, "issuer_uri", issuer_uri)
|
956
901
|
if allowed_audiences is not None:
|
@@ -977,10 +922,6 @@ class WorkloadIdentityPoolProviderOidc(dict):
|
|
977
922
|
If this list is empty, the OIDC token audience must be equal to the full canonical
|
978
923
|
resource name of the WorkloadIdentityPoolProvider, with or without the HTTPS prefix.
|
979
924
|
For example:
|
980
|
-
```
|
981
|
-
//iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
|
982
|
-
https://iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
|
983
|
-
```
|
984
925
|
"""
|
985
926
|
return pulumi.get(self, "allowed_audiences")
|
986
927
|
|
@@ -994,23 +935,6 @@ class WorkloadIdentityPoolProviderOidc(dict):
|
|
994
935
|
.well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
|
995
936
|
keys are supported. The JWK must use following format and include only
|
996
937
|
the following fields:
|
997
|
-
```
|
998
|
-
{
|
999
|
-
"keys": [
|
1000
|
-
{
|
1001
|
-
"kty": "RSA/EC",
|
1002
|
-
"alg": "<algorithm>",
|
1003
|
-
"use": "sig",
|
1004
|
-
"kid": "<key-id>",
|
1005
|
-
"n": "",
|
1006
|
-
"e": "",
|
1007
|
-
"x": "",
|
1008
|
-
"y": "",
|
1009
|
-
"crv": ""
|
1010
|
-
}
|
1011
|
-
]
|
1012
|
-
}
|
1013
|
-
```
|
1014
938
|
"""
|
1015
939
|
return pulumi.get(self, "jwks_json")
|
1016
940
|
|
@@ -81,11 +81,6 @@ class WorkforcePoolProviderArgs:
|
|
81
81
|
For OIDC providers, you must supply a custom mapping that includes the `google.subject` attribute.
|
82
82
|
For example, the following maps the sub claim of the incoming credential to the `subject` attribute
|
83
83
|
on a Google token:
|
84
|
-
```
|
85
|
-
{"google.subject": "assertion.sub"}
|
86
|
-
```
|
87
|
-
An object containing a list of `"key": value` pairs.
|
88
|
-
Example: `{ "name": "wrench", "mass": "1.3kg", "count": "3" }`.
|
89
84
|
:param pulumi.Input[str] description: A user-specified description of the provider. Cannot exceed 256 characters.
|
90
85
|
:param pulumi.Input[bool] disabled: Whether the provider is disabled. You cannot use a disabled provider to exchange tokens.
|
91
86
|
However, existing tokens still grant access.
|
@@ -214,11 +209,6 @@ class WorkforcePoolProviderArgs:
|
|
214
209
|
For OIDC providers, you must supply a custom mapping that includes the `google.subject` attribute.
|
215
210
|
For example, the following maps the sub claim of the incoming credential to the `subject` attribute
|
216
211
|
on a Google token:
|
217
|
-
```
|
218
|
-
{"google.subject": "assertion.sub"}
|
219
|
-
```
|
220
|
-
An object containing a list of `"key": value` pairs.
|
221
|
-
Example: `{ "name": "wrench", "mass": "1.3kg", "count": "3" }`.
|
222
212
|
"""
|
223
213
|
return pulumi.get(self, "attribute_mapping")
|
224
214
|
|
@@ -349,11 +339,6 @@ class _WorkforcePoolProviderState:
|
|
349
339
|
For OIDC providers, you must supply a custom mapping that includes the `google.subject` attribute.
|
350
340
|
For example, the following maps the sub claim of the incoming credential to the `subject` attribute
|
351
341
|
on a Google token:
|
352
|
-
```
|
353
|
-
{"google.subject": "assertion.sub"}
|
354
|
-
```
|
355
|
-
An object containing a list of `"key": value` pairs.
|
356
|
-
Example: `{ "name": "wrench", "mass": "1.3kg", "count": "3" }`.
|
357
342
|
:param pulumi.Input[str] description: A user-specified description of the provider. Cannot exceed 256 characters.
|
358
343
|
:param pulumi.Input[bool] disabled: Whether the provider is disabled. You cannot use a disabled provider to exchange tokens.
|
359
344
|
However, existing tokens still grant access.
|
@@ -464,11 +449,6 @@ class _WorkforcePoolProviderState:
|
|
464
449
|
For OIDC providers, you must supply a custom mapping that includes the `google.subject` attribute.
|
465
450
|
For example, the following maps the sub claim of the incoming credential to the `subject` attribute
|
466
451
|
on a Google token:
|
467
|
-
```
|
468
|
-
{"google.subject": "assertion.sub"}
|
469
|
-
```
|
470
|
-
An object containing a list of `"key": value` pairs.
|
471
|
-
Example: `{ "name": "wrench", "mass": "1.3kg", "count": "3" }`.
|
472
452
|
"""
|
473
453
|
return pulumi.get(self, "attribute_mapping")
|
474
454
|
|
@@ -831,11 +811,6 @@ class WorkforcePoolProvider(pulumi.CustomResource):
|
|
831
811
|
For OIDC providers, you must supply a custom mapping that includes the `google.subject` attribute.
|
832
812
|
For example, the following maps the sub claim of the incoming credential to the `subject` attribute
|
833
813
|
on a Google token:
|
834
|
-
```
|
835
|
-
{"google.subject": "assertion.sub"}
|
836
|
-
```
|
837
|
-
An object containing a list of `"key": value` pairs.
|
838
|
-
Example: `{ "name": "wrench", "mass": "1.3kg", "count": "3" }`.
|
839
814
|
:param pulumi.Input[str] description: A user-specified description of the provider. Cannot exceed 256 characters.
|
840
815
|
:param pulumi.Input[bool] disabled: Whether the provider is disabled. You cannot use a disabled provider to exchange tokens.
|
841
816
|
However, existing tokens still grant access.
|
@@ -1142,11 +1117,6 @@ class WorkforcePoolProvider(pulumi.CustomResource):
|
|
1142
1117
|
For OIDC providers, you must supply a custom mapping that includes the `google.subject` attribute.
|
1143
1118
|
For example, the following maps the sub claim of the incoming credential to the `subject` attribute
|
1144
1119
|
on a Google token:
|
1145
|
-
```
|
1146
|
-
{"google.subject": "assertion.sub"}
|
1147
|
-
```
|
1148
|
-
An object containing a list of `"key": value` pairs.
|
1149
|
-
Example: `{ "name": "wrench", "mass": "1.3kg", "count": "3" }`.
|
1150
1120
|
:param pulumi.Input[str] description: A user-specified description of the provider. Cannot exceed 256 characters.
|
1151
1121
|
:param pulumi.Input[bool] disabled: Whether the provider is disabled. You cannot use a disabled provider to exchange tokens.
|
1152
1122
|
However, existing tokens still grant access.
|
@@ -1246,11 +1216,6 @@ class WorkforcePoolProvider(pulumi.CustomResource):
|
|
1246
1216
|
For OIDC providers, you must supply a custom mapping that includes the `google.subject` attribute.
|
1247
1217
|
For example, the following maps the sub claim of the incoming credential to the `subject` attribute
|
1248
1218
|
on a Google token:
|
1249
|
-
```
|
1250
|
-
{"google.subject": "assertion.sub"}
|
1251
|
-
```
|
1252
|
-
An object containing a list of `"key": value` pairs.
|
1253
|
-
Example: `{ "name": "wrench", "mass": "1.3kg", "count": "3" }`.
|
1254
1219
|
"""
|
1255
1220
|
return pulumi.get(self, "attribute_mapping")
|
1256
1221
|
|
@@ -74,26 +74,6 @@ class WorkloadIdentityPoolProviderArgs:
|
|
74
74
|
the total size of all mapped attributes must not exceed 8KB.
|
75
75
|
For AWS providers, the following rules apply:
|
76
76
|
- If no attribute mapping is defined, the following default mapping applies:
|
77
|
-
```
|
78
|
-
{
|
79
|
-
"google.subject":"assertion.arn",
|
80
|
-
"attribute.aws_role":
|
81
|
-
"assertion.arn.contains('assumed-role')"
|
82
|
-
" ? assertion.arn.extract('{account_arn}assumed-role/')"
|
83
|
-
" + 'assumed-role/'"
|
84
|
-
" + assertion.arn.extract('assumed-role/{role_name}/')"
|
85
|
-
" : assertion.arn",
|
86
|
-
}
|
87
|
-
```
|
88
|
-
- If any custom attribute mappings are defined, they must include a mapping to the
|
89
|
-
`google.subject` attribute.
|
90
|
-
For OIDC providers, the following rules apply:
|
91
|
-
- Custom attribute mappings must be defined, and must include a mapping to the
|
92
|
-
`google.subject` attribute. For example, the following maps the `sub` claim of the
|
93
|
-
incoming credential to the `subject` attribute on a Google token.
|
94
|
-
```
|
95
|
-
{"google.subject": "assertion.sub"}
|
96
|
-
```
|
97
77
|
:param pulumi.Input['WorkloadIdentityPoolProviderAwsArgs'] aws: An Amazon Web Services identity provider. Not compatible with the property oidc or saml.
|
98
78
|
Structure is documented below.
|
99
79
|
:param pulumi.Input[str] description: A description for the provider. Cannot exceed 256 characters.
|
@@ -210,26 +190,6 @@ class WorkloadIdentityPoolProviderArgs:
|
|
210
190
|
the total size of all mapped attributes must not exceed 8KB.
|
211
191
|
For AWS providers, the following rules apply:
|
212
192
|
- If no attribute mapping is defined, the following default mapping applies:
|
213
|
-
```
|
214
|
-
{
|
215
|
-
"google.subject":"assertion.arn",
|
216
|
-
"attribute.aws_role":
|
217
|
-
"assertion.arn.contains('assumed-role')"
|
218
|
-
" ? assertion.arn.extract('{account_arn}assumed-role/')"
|
219
|
-
" + 'assumed-role/'"
|
220
|
-
" + assertion.arn.extract('assumed-role/{role_name}/')"
|
221
|
-
" : assertion.arn",
|
222
|
-
}
|
223
|
-
```
|
224
|
-
- If any custom attribute mappings are defined, they must include a mapping to the
|
225
|
-
`google.subject` attribute.
|
226
|
-
For OIDC providers, the following rules apply:
|
227
|
-
- Custom attribute mappings must be defined, and must include a mapping to the
|
228
|
-
`google.subject` attribute. For example, the following maps the `sub` claim of the
|
229
|
-
incoming credential to the `subject` attribute on a Google token.
|
230
|
-
```
|
231
|
-
{"google.subject": "assertion.sub"}
|
232
|
-
```
|
233
193
|
"""
|
234
194
|
return pulumi.get(self, "attribute_mapping")
|
235
195
|
|
@@ -381,26 +341,6 @@ class _WorkloadIdentityPoolProviderState:
|
|
381
341
|
the total size of all mapped attributes must not exceed 8KB.
|
382
342
|
For AWS providers, the following rules apply:
|
383
343
|
- If no attribute mapping is defined, the following default mapping applies:
|
384
|
-
```
|
385
|
-
{
|
386
|
-
"google.subject":"assertion.arn",
|
387
|
-
"attribute.aws_role":
|
388
|
-
"assertion.arn.contains('assumed-role')"
|
389
|
-
" ? assertion.arn.extract('{account_arn}assumed-role/')"
|
390
|
-
" + 'assumed-role/'"
|
391
|
-
" + assertion.arn.extract('assumed-role/{role_name}/')"
|
392
|
-
" : assertion.arn",
|
393
|
-
}
|
394
|
-
```
|
395
|
-
- If any custom attribute mappings are defined, they must include a mapping to the
|
396
|
-
`google.subject` attribute.
|
397
|
-
For OIDC providers, the following rules apply:
|
398
|
-
- Custom attribute mappings must be defined, and must include a mapping to the
|
399
|
-
`google.subject` attribute. For example, the following maps the `sub` claim of the
|
400
|
-
incoming credential to the `subject` attribute on a Google token.
|
401
|
-
```
|
402
|
-
{"google.subject": "assertion.sub"}
|
403
|
-
```
|
404
344
|
:param pulumi.Input['WorkloadIdentityPoolProviderAwsArgs'] aws: An Amazon Web Services identity provider. Not compatible with the property oidc or saml.
|
405
345
|
Structure is documented below.
|
406
346
|
:param pulumi.Input[str] description: A description for the provider. Cannot exceed 256 characters.
|
@@ -510,26 +450,6 @@ class _WorkloadIdentityPoolProviderState:
|
|
510
450
|
the total size of all mapped attributes must not exceed 8KB.
|
511
451
|
For AWS providers, the following rules apply:
|
512
452
|
- If no attribute mapping is defined, the following default mapping applies:
|
513
|
-
```
|
514
|
-
{
|
515
|
-
"google.subject":"assertion.arn",
|
516
|
-
"attribute.aws_role":
|
517
|
-
"assertion.arn.contains('assumed-role')"
|
518
|
-
" ? assertion.arn.extract('{account_arn}assumed-role/')"
|
519
|
-
" + 'assumed-role/'"
|
520
|
-
" + assertion.arn.extract('assumed-role/{role_name}/')"
|
521
|
-
" : assertion.arn",
|
522
|
-
}
|
523
|
-
```
|
524
|
-
- If any custom attribute mappings are defined, they must include a mapping to the
|
525
|
-
`google.subject` attribute.
|
526
|
-
For OIDC providers, the following rules apply:
|
527
|
-
- Custom attribute mappings must be defined, and must include a mapping to the
|
528
|
-
`google.subject` attribute. For example, the following maps the `sub` claim of the
|
529
|
-
incoming credential to the `subject` attribute on a Google token.
|
530
|
-
```
|
531
|
-
{"google.subject": "assertion.sub"}
|
532
|
-
```
|
533
453
|
"""
|
534
454
|
return pulumi.get(self, "attribute_mapping")
|
535
455
|
|
@@ -954,26 +874,6 @@ class WorkloadIdentityPoolProvider(pulumi.CustomResource):
|
|
954
874
|
the total size of all mapped attributes must not exceed 8KB.
|
955
875
|
For AWS providers, the following rules apply:
|
956
876
|
- If no attribute mapping is defined, the following default mapping applies:
|
957
|
-
```
|
958
|
-
{
|
959
|
-
"google.subject":"assertion.arn",
|
960
|
-
"attribute.aws_role":
|
961
|
-
"assertion.arn.contains('assumed-role')"
|
962
|
-
" ? assertion.arn.extract('{account_arn}assumed-role/')"
|
963
|
-
" + 'assumed-role/'"
|
964
|
-
" + assertion.arn.extract('assumed-role/{role_name}/')"
|
965
|
-
" : assertion.arn",
|
966
|
-
}
|
967
|
-
```
|
968
|
-
- If any custom attribute mappings are defined, they must include a mapping to the
|
969
|
-
`google.subject` attribute.
|
970
|
-
For OIDC providers, the following rules apply:
|
971
|
-
- Custom attribute mappings must be defined, and must include a mapping to the
|
972
|
-
`google.subject` attribute. For example, the following maps the `sub` claim of the
|
973
|
-
incoming credential to the `subject` attribute on a Google token.
|
974
|
-
```
|
975
|
-
{"google.subject": "assertion.sub"}
|
976
|
-
```
|
977
877
|
:param pulumi.Input[pulumi.InputType['WorkloadIdentityPoolProviderAwsArgs']] aws: An Amazon Web Services identity provider. Not compatible with the property oidc or saml.
|
978
878
|
Structure is documented below.
|
979
879
|
:param pulumi.Input[str] description: A description for the provider. Cannot exceed 256 characters.
|
@@ -1330,26 +1230,6 @@ class WorkloadIdentityPoolProvider(pulumi.CustomResource):
|
|
1330
1230
|
the total size of all mapped attributes must not exceed 8KB.
|
1331
1231
|
For AWS providers, the following rules apply:
|
1332
1232
|
- If no attribute mapping is defined, the following default mapping applies:
|
1333
|
-
```
|
1334
|
-
{
|
1335
|
-
"google.subject":"assertion.arn",
|
1336
|
-
"attribute.aws_role":
|
1337
|
-
"assertion.arn.contains('assumed-role')"
|
1338
|
-
" ? assertion.arn.extract('{account_arn}assumed-role/')"
|
1339
|
-
" + 'assumed-role/'"
|
1340
|
-
" + assertion.arn.extract('assumed-role/{role_name}/')"
|
1341
|
-
" : assertion.arn",
|
1342
|
-
}
|
1343
|
-
```
|
1344
|
-
- If any custom attribute mappings are defined, they must include a mapping to the
|
1345
|
-
`google.subject` attribute.
|
1346
|
-
For OIDC providers, the following rules apply:
|
1347
|
-
- Custom attribute mappings must be defined, and must include a mapping to the
|
1348
|
-
`google.subject` attribute. For example, the following maps the `sub` claim of the
|
1349
|
-
incoming credential to the `subject` attribute on a Google token.
|
1350
|
-
```
|
1351
|
-
{"google.subject": "assertion.sub"}
|
1352
|
-
```
|
1353
1233
|
:param pulumi.Input[pulumi.InputType['WorkloadIdentityPoolProviderAwsArgs']] aws: An Amazon Web Services identity provider. Not compatible with the property oidc or saml.
|
1354
1234
|
Structure is documented below.
|
1355
1235
|
:param pulumi.Input[str] description: A description for the provider. Cannot exceed 256 characters.
|
@@ -1447,26 +1327,6 @@ class WorkloadIdentityPoolProvider(pulumi.CustomResource):
|
|
1447
1327
|
the total size of all mapped attributes must not exceed 8KB.
|
1448
1328
|
For AWS providers, the following rules apply:
|
1449
1329
|
- If no attribute mapping is defined, the following default mapping applies:
|
1450
|
-
```
|
1451
|
-
{
|
1452
|
-
"google.subject":"assertion.arn",
|
1453
|
-
"attribute.aws_role":
|
1454
|
-
"assertion.arn.contains('assumed-role')"
|
1455
|
-
" ? assertion.arn.extract('{account_arn}assumed-role/')"
|
1456
|
-
" + 'assumed-role/'"
|
1457
|
-
" + assertion.arn.extract('assumed-role/{role_name}/')"
|
1458
|
-
" : assertion.arn",
|
1459
|
-
}
|
1460
|
-
```
|
1461
|
-
- If any custom attribute mappings are defined, they must include a mapping to the
|
1462
|
-
`google.subject` attribute.
|
1463
|
-
For OIDC providers, the following rules apply:
|
1464
|
-
- Custom attribute mappings must be defined, and must include a mapping to the
|
1465
|
-
`google.subject` attribute. For example, the following maps the `sub` claim of the
|
1466
|
-
incoming credential to the `subject` attribute on a Google token.
|
1467
|
-
```
|
1468
|
-
{"google.subject": "assertion.sub"}
|
1469
|
-
```
|
1470
1330
|
"""
|
1471
1331
|
return pulumi.get(self, "attribute_mapping")
|
1472
1332
|
|
@@ -249,7 +249,7 @@ class TunnelDestGroup(pulumi.CustomResource):
|
|
249
249
|
|
250
250
|
dest_group = gcp.iap.TunnelDestGroup("dest_group",
|
251
251
|
region="us-central1",
|
252
|
-
group_name="
|
252
|
+
group_name="testgroup_75223",
|
253
253
|
cidrs=[
|
254
254
|
"10.1.0.0/16",
|
255
255
|
"192.168.10.0/24",
|
@@ -337,7 +337,7 @@ class TunnelDestGroup(pulumi.CustomResource):
|
|
337
337
|
|
338
338
|
dest_group = gcp.iap.TunnelDestGroup("dest_group",
|
339
339
|
region="us-central1",
|
340
|
-
group_name="
|
340
|
+
group_name="testgroup_75223",
|
341
341
|
cidrs=[
|
342
342
|
"10.1.0.0/16",
|
343
343
|
"192.168.10.0/24",
|