pulumi-gcp 7.17.0a1712163201__py3-none-any.whl → 7.17.0a1712602552__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (91) hide show
  1. pulumi_gcp/__init__.py +27 -0
  2. pulumi_gcp/apphub/__init__.py +1 -0
  3. pulumi_gcp/apphub/get_application.py +220 -0
  4. pulumi_gcp/apphub/outputs.py +214 -0
  5. pulumi_gcp/applicationintegration/__init__.py +10 -0
  6. pulumi_gcp/applicationintegration/_inputs.py +119 -0
  7. pulumi_gcp/applicationintegration/client.py +566 -0
  8. pulumi_gcp/applicationintegration/outputs.py +122 -0
  9. pulumi_gcp/bigquery/_inputs.py +16 -0
  10. pulumi_gcp/bigquery/outputs.py +14 -0
  11. pulumi_gcp/bigquery/routine.py +98 -0
  12. pulumi_gcp/bigtable/_inputs.py +4 -4
  13. pulumi_gcp/bigtable/gc_policy.py +8 -0
  14. pulumi_gcp/bigtable/outputs.py +4 -4
  15. pulumi_gcp/billing/_inputs.py +4 -4
  16. pulumi_gcp/billing/outputs.py +4 -4
  17. pulumi_gcp/billing/project_info.py +4 -4
  18. pulumi_gcp/cloudfunctionsv2/_inputs.py +2 -2
  19. pulumi_gcp/cloudfunctionsv2/outputs.py +4 -4
  20. pulumi_gcp/cloudquota/__init__.py +2 -0
  21. pulumi_gcp/cloudquota/_inputs.py +131 -0
  22. pulumi_gcp/cloudquota/outputs.py +118 -0
  23. pulumi_gcp/cloudquota/s_quota_preference.py +777 -0
  24. pulumi_gcp/cloudrunv2/service.py +7 -7
  25. pulumi_gcp/composer/_inputs.py +14 -4
  26. pulumi_gcp/composer/outputs.py +22 -10
  27. pulumi_gcp/compute/_inputs.py +40 -44
  28. pulumi_gcp/compute/autoscaler.py +14 -14
  29. pulumi_gcp/compute/interconnect_attachment.py +64 -0
  30. pulumi_gcp/compute/network_endpoint.py +8 -0
  31. pulumi_gcp/compute/network_endpoint_list.py +8 -0
  32. pulumi_gcp/compute/outputs.py +62 -60
  33. pulumi_gcp/compute/region_autoscaler.py +14 -14
  34. pulumi_gcp/compute/region_backend_service.py +28 -0
  35. pulumi_gcp/compute/target_instance.py +4 -4
  36. pulumi_gcp/config/__init__.pyi +2 -0
  37. pulumi_gcp/config/vars.py +4 -0
  38. pulumi_gcp/container/_inputs.py +148 -16
  39. pulumi_gcp/container/outputs.py +148 -16
  40. pulumi_gcp/databasemigrationservice/connection_profile.py +6 -6
  41. pulumi_gcp/dataflow/flex_template_job.py +84 -112
  42. pulumi_gcp/dataloss/_inputs.py +6 -6
  43. pulumi_gcp/dataloss/outputs.py +6 -6
  44. pulumi_gcp/dataplex/task.py +16 -16
  45. pulumi_gcp/dataproc/_inputs.py +85 -10
  46. pulumi_gcp/dataproc/get_metastore_service.py +11 -1
  47. pulumi_gcp/dataproc/metastore_service.py +120 -0
  48. pulumi_gcp/dataproc/outputs.py +142 -10
  49. pulumi_gcp/firebase/app_check_service_config.py +2 -2
  50. pulumi_gcp/firestore/backup_schedule.py +14 -14
  51. pulumi_gcp/firestore/field.py +4 -4
  52. pulumi_gcp/gkehub/membership_binding.py +6 -6
  53. pulumi_gcp/gkehub/membership_rbac_role_binding.py +4 -4
  54. pulumi_gcp/gkehub/namespace.py +4 -4
  55. pulumi_gcp/gkehub/scope_rbac_role_binding.py +4 -4
  56. pulumi_gcp/iam/_inputs.py +76 -0
  57. pulumi_gcp/iam/outputs.py +76 -0
  58. pulumi_gcp/iam/workforce_pool_provider.py +35 -0
  59. pulumi_gcp/iam/workload_identity_pool_provider.py +140 -0
  60. pulumi_gcp/iap/tunnel_dest_group.py +2 -2
  61. pulumi_gcp/kms/_inputs.py +46 -0
  62. pulumi_gcp/kms/crypto_key.py +54 -0
  63. pulumi_gcp/kms/crypto_key_version.py +54 -0
  64. pulumi_gcp/kms/get_kms_crypto_key.py +11 -1
  65. pulumi_gcp/kms/outputs.py +54 -0
  66. pulumi_gcp/logging/_inputs.py +8 -8
  67. pulumi_gcp/logging/metric.py +7 -7
  68. pulumi_gcp/logging/outputs.py +8 -8
  69. pulumi_gcp/monitoring/_inputs.py +2 -2
  70. pulumi_gcp/monitoring/outputs.py +2 -2
  71. pulumi_gcp/monitoring/slo.py +4 -4
  72. pulumi_gcp/networkservices/_inputs.py +6 -6
  73. pulumi_gcp/networkservices/outputs.py +6 -6
  74. pulumi_gcp/orgpolicy/policy.py +2 -2
  75. pulumi_gcp/provider.py +20 -0
  76. pulumi_gcp/pubsub/subscription.py +4 -4
  77. pulumi_gcp/serviceusage/consumer_quota_override.py +7 -7
  78. pulumi_gcp/sql/_inputs.py +20 -2
  79. pulumi_gcp/sql/database_instance.py +2 -2
  80. pulumi_gcp/sql/outputs.py +20 -2
  81. pulumi_gcp/storage/_inputs.py +2 -2
  82. pulumi_gcp/storage/outputs.py +2 -2
  83. pulumi_gcp/vertex/__init__.py +1 -0
  84. pulumi_gcp/vertex/_inputs.py +175 -8
  85. pulumi_gcp/vertex/ai_deployment_resource_pool.py +477 -0
  86. pulumi_gcp/vertex/outputs.py +202 -10
  87. pulumi_gcp/vpcaccess/connector.py +77 -28
  88. {pulumi_gcp-7.17.0a1712163201.dist-info → pulumi_gcp-7.17.0a1712602552.dist-info}/METADATA +1 -1
  89. {pulumi_gcp-7.17.0a1712163201.dist-info → pulumi_gcp-7.17.0a1712602552.dist-info}/RECORD +91 -83
  90. {pulumi_gcp-7.17.0a1712163201.dist-info → pulumi_gcp-7.17.0a1712602552.dist-info}/WHEEL +0 -0
  91. {pulumi_gcp-7.17.0a1712163201.dist-info → pulumi_gcp-7.17.0a1712602552.dist-info}/top_level.txt +0 -0
@@ -419,15 +419,15 @@ class MembershipBinding(pulumi.CustomResource):
419
419
  network="default",
420
420
  subnetwork="default")
421
421
  membership = gcp.gkehub.Membership("membership",
422
- membership_id="tf-test-membership_74000",
422
+ membership_id="tf-test-membership_75125",
423
423
  endpoint=gcp.gkehub.MembershipEndpointArgs(
424
424
  gke_cluster=gcp.gkehub.MembershipEndpointGkeClusterArgs(
425
425
  resource_link=primary.id.apply(lambda id: f"//container.googleapis.com/{id}"),
426
426
  ),
427
427
  ))
428
- scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_75125")
428
+ scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_88722")
429
429
  membership_binding = gcp.gkehub.MembershipBinding("membership_binding",
430
- membership_binding_id="tf-test-membership-binding_88722",
430
+ membership_binding_id="tf-test-membership-binding_39249",
431
431
  scope=scope.name,
432
432
  membership_id=membership.membership_id,
433
433
  location="global",
@@ -512,15 +512,15 @@ class MembershipBinding(pulumi.CustomResource):
512
512
  network="default",
513
513
  subnetwork="default")
514
514
  membership = gcp.gkehub.Membership("membership",
515
- membership_id="tf-test-membership_74000",
515
+ membership_id="tf-test-membership_75125",
516
516
  endpoint=gcp.gkehub.MembershipEndpointArgs(
517
517
  gke_cluster=gcp.gkehub.MembershipEndpointGkeClusterArgs(
518
518
  resource_link=primary.id.apply(lambda id: f"//container.googleapis.com/{id}"),
519
519
  ),
520
520
  ))
521
- scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_75125")
521
+ scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_88722")
522
522
  membership_binding = gcp.gkehub.MembershipBinding("membership_binding",
523
- membership_binding_id="tf-test-membership-binding_88722",
523
+ membership_binding_id="tf-test-membership-binding_39249",
524
524
  scope=scope.name,
525
525
  membership_id=membership.membership_id,
526
526
  location="global",
@@ -364,7 +364,7 @@ class MembershipRbacRoleBinding(pulumi.CustomResource):
364
364
  network="default",
365
365
  subnetwork="default")
366
366
  membership = gcp.gkehub.Membership("membership",
367
- membership_id="tf-test-membership_39249",
367
+ membership_id="tf-test-membership_74391",
368
368
  endpoint=gcp.gkehub.MembershipEndpointArgs(
369
369
  gke_cluster=gcp.gkehub.MembershipEndpointGkeClusterArgs(
370
370
  resource_link=primary.id.apply(lambda id: f"//container.googleapis.com/{id}"),
@@ -372,7 +372,7 @@ class MembershipRbacRoleBinding(pulumi.CustomResource):
372
372
  ))
373
373
  project = gcp.organizations.get_project()
374
374
  membership_rbac_role_binding = gcp.gkehub.MembershipRbacRoleBinding("membership_rbac_role_binding",
375
- membership_rbac_role_binding_id="tf-test-membership-rbac-role-binding_74391",
375
+ membership_rbac_role_binding_id="tf-test-membership-rbac-role-binding_16511",
376
376
  membership_id=membership.membership_id,
377
377
  user=f"service-{project.number}@gcp-sa-anthossupport.iam.gserviceaccount.com",
378
378
  role=gcp.gkehub.MembershipRbacRoleBindingRoleArgs(
@@ -444,7 +444,7 @@ class MembershipRbacRoleBinding(pulumi.CustomResource):
444
444
  network="default",
445
445
  subnetwork="default")
446
446
  membership = gcp.gkehub.Membership("membership",
447
- membership_id="tf-test-membership_39249",
447
+ membership_id="tf-test-membership_74391",
448
448
  endpoint=gcp.gkehub.MembershipEndpointArgs(
449
449
  gke_cluster=gcp.gkehub.MembershipEndpointGkeClusterArgs(
450
450
  resource_link=primary.id.apply(lambda id: f"//container.googleapis.com/{id}"),
@@ -452,7 +452,7 @@ class MembershipRbacRoleBinding(pulumi.CustomResource):
452
452
  ))
453
453
  project = gcp.organizations.get_project()
454
454
  membership_rbac_role_binding = gcp.gkehub.MembershipRbacRoleBinding("membership_rbac_role_binding",
455
- membership_rbac_role_binding_id="tf-test-membership-rbac-role-binding_74391",
455
+ membership_rbac_role_binding_id="tf-test-membership-rbac-role-binding_16511",
456
456
  membership_id=membership.membership_id,
457
457
  user=f"service-{project.number}@gcp-sa-anthossupport.iam.gserviceaccount.com",
458
458
  role=gcp.gkehub.MembershipRbacRoleBindingRoleArgs(
@@ -424,9 +424,9 @@ class Namespace(pulumi.CustomResource):
424
424
  import pulumi
425
425
  import pulumi_gcp as gcp
426
426
 
427
- scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_16511")
427
+ scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_8493")
428
428
  namespace = gcp.gkehub.Namespace("namespace",
429
- scope_namespace_id="tf-test-namespace_8493",
429
+ scope_namespace_id="tf-test-namespace_9106",
430
430
  scope_id=scope.scope_id,
431
431
  scope=scope.name,
432
432
  namespace_labels={
@@ -510,9 +510,9 @@ class Namespace(pulumi.CustomResource):
510
510
  import pulumi
511
511
  import pulumi_gcp as gcp
512
512
 
513
- scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_16511")
513
+ scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_8493")
514
514
  namespace = gcp.gkehub.Namespace("namespace",
515
- scope_namespace_id="tf-test-namespace_8493",
515
+ scope_namespace_id="tf-test-namespace_9106",
516
516
  scope_id=scope.scope_id,
517
517
  scope=scope.name,
518
518
  namespace_labels={
@@ -453,9 +453,9 @@ class ScopeRbacRoleBinding(pulumi.CustomResource):
453
453
  import pulumi
454
454
  import pulumi_gcp as gcp
455
455
 
456
- scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_9106")
456
+ scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_27169")
457
457
  scope_rbac_role_binding = gcp.gkehub.ScopeRbacRoleBinding("scope_rbac_role_binding",
458
- scope_rbac_role_binding_id="tf-test-scope-rbac-role-binding_27169",
458
+ scope_rbac_role_binding_id="tf-test-scope-rbac-role-binding_75223",
459
459
  scope_id=scope.scope_id,
460
460
  user="test-email@gmail.com",
461
461
  role=gcp.gkehub.ScopeRbacRoleBindingRoleArgs(
@@ -535,9 +535,9 @@ class ScopeRbacRoleBinding(pulumi.CustomResource):
535
535
  import pulumi
536
536
  import pulumi_gcp as gcp
537
537
 
538
- scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_9106")
538
+ scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_27169")
539
539
  scope_rbac_role_binding = gcp.gkehub.ScopeRbacRoleBinding("scope_rbac_role_binding",
540
- scope_rbac_role_binding_id="tf-test-scope-rbac-role-binding_27169",
540
+ scope_rbac_role_binding_id="tf-test-scope-rbac-role-binding_75223",
541
541
  scope_id=scope.scope_id,
542
542
  user="test-email@gmail.com",
543
543
  role=gcp.gkehub.ScopeRbacRoleBindingRoleArgs(
pulumi_gcp/iam/_inputs.py CHANGED
@@ -513,6 +513,23 @@ class WorkforcePoolProviderOidcArgs:
513
513
  .well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
514
514
  keys are supported. The JWK must use following format and include only
515
515
  the following fields:
516
+ ```
517
+ {
518
+ "keys": [
519
+ {
520
+ "kty": "RSA/EC",
521
+ "alg": "<algorithm>",
522
+ "use": "sig",
523
+ "kid": "<key-id>",
524
+ "n": "",
525
+ "e": "",
526
+ "x": "",
527
+ "y": "",
528
+ "crv": ""
529
+ }
530
+ ]
531
+ }
532
+ ```
516
533
  :param pulumi.Input['WorkforcePoolProviderOidcWebSsoConfigArgs'] web_sso_config: Configuration for web single sign-on for the OIDC provider. Here, web sign-in refers to console sign-in and gcloud sign-in through the browser.
517
534
  Structure is documented below.
518
535
  """
@@ -572,6 +589,23 @@ class WorkforcePoolProviderOidcArgs:
572
589
  .well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
573
590
  keys are supported. The JWK must use following format and include only
574
591
  the following fields:
592
+ ```
593
+ {
594
+ "keys": [
595
+ {
596
+ "kty": "RSA/EC",
597
+ "alg": "<algorithm>",
598
+ "use": "sig",
599
+ "kid": "<key-id>",
600
+ "n": "",
601
+ "e": "",
602
+ "x": "",
603
+ "y": "",
604
+ "crv": ""
605
+ }
606
+ ]
607
+ }
608
+ ```
575
609
  """
576
610
  return pulumi.get(self, "jwks_json")
577
611
 
@@ -812,12 +846,33 @@ class WorkloadIdentityPoolProviderOidcArgs:
812
846
  If this list is empty, the OIDC token audience must be equal to the full canonical
813
847
  resource name of the WorkloadIdentityPoolProvider, with or without the HTTPS prefix.
814
848
  For example:
849
+ ```
850
+ //iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
851
+ https://iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
852
+ ```
815
853
  :param pulumi.Input[str] jwks_json: OIDC JWKs in JSON String format. For details on definition of a
816
854
  JWK, see https:tools.ietf.org/html/rfc7517. If not set, then we
817
855
  use the `jwks_uri` from the discovery document fetched from the
818
856
  .well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
819
857
  keys are supported. The JWK must use following format and include only
820
858
  the following fields:
859
+ ```
860
+ {
861
+ "keys": [
862
+ {
863
+ "kty": "RSA/EC",
864
+ "alg": "<algorithm>",
865
+ "use": "sig",
866
+ "kid": "<key-id>",
867
+ "n": "",
868
+ "e": "",
869
+ "x": "",
870
+ "y": "",
871
+ "crv": ""
872
+ }
873
+ ]
874
+ }
875
+ ```
821
876
  """
822
877
  pulumi.set(__self__, "issuer_uri", issuer_uri)
823
878
  if allowed_audiences is not None:
@@ -848,6 +903,10 @@ class WorkloadIdentityPoolProviderOidcArgs:
848
903
  If this list is empty, the OIDC token audience must be equal to the full canonical
849
904
  resource name of the WorkloadIdentityPoolProvider, with or without the HTTPS prefix.
850
905
  For example:
906
+ ```
907
+ //iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
908
+ https://iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
909
+ ```
851
910
  """
852
911
  return pulumi.get(self, "allowed_audiences")
853
912
 
@@ -865,6 +924,23 @@ class WorkloadIdentityPoolProviderOidcArgs:
865
924
  .well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
866
925
  keys are supported. The JWK must use following format and include only
867
926
  the following fields:
927
+ ```
928
+ {
929
+ "keys": [
930
+ {
931
+ "kty": "RSA/EC",
932
+ "alg": "<algorithm>",
933
+ "use": "sig",
934
+ "kid": "<key-id>",
935
+ "n": "",
936
+ "e": "",
937
+ "x": "",
938
+ "y": "",
939
+ "crv": ""
940
+ }
941
+ ]
942
+ }
943
+ ```
868
944
  """
869
945
  return pulumi.get(self, "jwks_json")
870
946
 
pulumi_gcp/iam/outputs.py CHANGED
@@ -550,6 +550,23 @@ class WorkforcePoolProviderOidc(dict):
550
550
  .well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
551
551
  keys are supported. The JWK must use following format and include only
552
552
  the following fields:
553
+ ```
554
+ {
555
+ "keys": [
556
+ {
557
+ "kty": "RSA/EC",
558
+ "alg": "<algorithm>",
559
+ "use": "sig",
560
+ "kid": "<key-id>",
561
+ "n": "",
562
+ "e": "",
563
+ "x": "",
564
+ "y": "",
565
+ "crv": ""
566
+ }
567
+ ]
568
+ }
569
+ ```
553
570
  :param 'WorkforcePoolProviderOidcWebSsoConfigArgs' web_sso_config: Configuration for web single sign-on for the OIDC provider. Here, web sign-in refers to console sign-in and gcloud sign-in through the browser.
554
571
  Structure is documented below.
555
572
  """
@@ -597,6 +614,23 @@ class WorkforcePoolProviderOidc(dict):
597
614
  .well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
598
615
  keys are supported. The JWK must use following format and include only
599
616
  the following fields:
617
+ ```
618
+ {
619
+ "keys": [
620
+ {
621
+ "kty": "RSA/EC",
622
+ "alg": "<algorithm>",
623
+ "use": "sig",
624
+ "kid": "<key-id>",
625
+ "n": "",
626
+ "e": "",
627
+ "x": "",
628
+ "y": "",
629
+ "crv": ""
630
+ }
631
+ ]
632
+ }
633
+ ```
600
634
  """
601
635
  return pulumi.get(self, "jwks_json")
602
636
 
@@ -890,12 +924,33 @@ class WorkloadIdentityPoolProviderOidc(dict):
890
924
  If this list is empty, the OIDC token audience must be equal to the full canonical
891
925
  resource name of the WorkloadIdentityPoolProvider, with or without the HTTPS prefix.
892
926
  For example:
927
+ ```
928
+ //iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
929
+ https://iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
930
+ ```
893
931
  :param str jwks_json: OIDC JWKs in JSON String format. For details on definition of a
894
932
  JWK, see https:tools.ietf.org/html/rfc7517. If not set, then we
895
933
  use the `jwks_uri` from the discovery document fetched from the
896
934
  .well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
897
935
  keys are supported. The JWK must use following format and include only
898
936
  the following fields:
937
+ ```
938
+ {
939
+ "keys": [
940
+ {
941
+ "kty": "RSA/EC",
942
+ "alg": "<algorithm>",
943
+ "use": "sig",
944
+ "kid": "<key-id>",
945
+ "n": "",
946
+ "e": "",
947
+ "x": "",
948
+ "y": "",
949
+ "crv": ""
950
+ }
951
+ ]
952
+ }
953
+ ```
899
954
  """
900
955
  pulumi.set(__self__, "issuer_uri", issuer_uri)
901
956
  if allowed_audiences is not None:
@@ -922,6 +977,10 @@ class WorkloadIdentityPoolProviderOidc(dict):
922
977
  If this list is empty, the OIDC token audience must be equal to the full canonical
923
978
  resource name of the WorkloadIdentityPoolProvider, with or without the HTTPS prefix.
924
979
  For example:
980
+ ```
981
+ //iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
982
+ https://iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
983
+ ```
925
984
  """
926
985
  return pulumi.get(self, "allowed_audiences")
927
986
 
@@ -935,6 +994,23 @@ class WorkloadIdentityPoolProviderOidc(dict):
935
994
  .well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
936
995
  keys are supported. The JWK must use following format and include only
937
996
  the following fields:
997
+ ```
998
+ {
999
+ "keys": [
1000
+ {
1001
+ "kty": "RSA/EC",
1002
+ "alg": "<algorithm>",
1003
+ "use": "sig",
1004
+ "kid": "<key-id>",
1005
+ "n": "",
1006
+ "e": "",
1007
+ "x": "",
1008
+ "y": "",
1009
+ "crv": ""
1010
+ }
1011
+ ]
1012
+ }
1013
+ ```
938
1014
  """
939
1015
  return pulumi.get(self, "jwks_json")
940
1016
 
@@ -81,6 +81,11 @@ class WorkforcePoolProviderArgs:
81
81
  For OIDC providers, you must supply a custom mapping that includes the `google.subject` attribute.
82
82
  For example, the following maps the sub claim of the incoming credential to the `subject` attribute
83
83
  on a Google token:
84
+ ```
85
+ {"google.subject": "assertion.sub"}
86
+ ```
87
+ An object containing a list of `"key": value` pairs.
88
+ Example: `{ "name": "wrench", "mass": "1.3kg", "count": "3" }`.
84
89
  :param pulumi.Input[str] description: A user-specified description of the provider. Cannot exceed 256 characters.
85
90
  :param pulumi.Input[bool] disabled: Whether the provider is disabled. You cannot use a disabled provider to exchange tokens.
86
91
  However, existing tokens still grant access.
@@ -209,6 +214,11 @@ class WorkforcePoolProviderArgs:
209
214
  For OIDC providers, you must supply a custom mapping that includes the `google.subject` attribute.
210
215
  For example, the following maps the sub claim of the incoming credential to the `subject` attribute
211
216
  on a Google token:
217
+ ```
218
+ {"google.subject": "assertion.sub"}
219
+ ```
220
+ An object containing a list of `"key": value` pairs.
221
+ Example: `{ "name": "wrench", "mass": "1.3kg", "count": "3" }`.
212
222
  """
213
223
  return pulumi.get(self, "attribute_mapping")
214
224
 
@@ -339,6 +349,11 @@ class _WorkforcePoolProviderState:
339
349
  For OIDC providers, you must supply a custom mapping that includes the `google.subject` attribute.
340
350
  For example, the following maps the sub claim of the incoming credential to the `subject` attribute
341
351
  on a Google token:
352
+ ```
353
+ {"google.subject": "assertion.sub"}
354
+ ```
355
+ An object containing a list of `"key": value` pairs.
356
+ Example: `{ "name": "wrench", "mass": "1.3kg", "count": "3" }`.
342
357
  :param pulumi.Input[str] description: A user-specified description of the provider. Cannot exceed 256 characters.
343
358
  :param pulumi.Input[bool] disabled: Whether the provider is disabled. You cannot use a disabled provider to exchange tokens.
344
359
  However, existing tokens still grant access.
@@ -449,6 +464,11 @@ class _WorkforcePoolProviderState:
449
464
  For OIDC providers, you must supply a custom mapping that includes the `google.subject` attribute.
450
465
  For example, the following maps the sub claim of the incoming credential to the `subject` attribute
451
466
  on a Google token:
467
+ ```
468
+ {"google.subject": "assertion.sub"}
469
+ ```
470
+ An object containing a list of `"key": value` pairs.
471
+ Example: `{ "name": "wrench", "mass": "1.3kg", "count": "3" }`.
452
472
  """
453
473
  return pulumi.get(self, "attribute_mapping")
454
474
 
@@ -811,6 +831,11 @@ class WorkforcePoolProvider(pulumi.CustomResource):
811
831
  For OIDC providers, you must supply a custom mapping that includes the `google.subject` attribute.
812
832
  For example, the following maps the sub claim of the incoming credential to the `subject` attribute
813
833
  on a Google token:
834
+ ```
835
+ {"google.subject": "assertion.sub"}
836
+ ```
837
+ An object containing a list of `"key": value` pairs.
838
+ Example: `{ "name": "wrench", "mass": "1.3kg", "count": "3" }`.
814
839
  :param pulumi.Input[str] description: A user-specified description of the provider. Cannot exceed 256 characters.
815
840
  :param pulumi.Input[bool] disabled: Whether the provider is disabled. You cannot use a disabled provider to exchange tokens.
816
841
  However, existing tokens still grant access.
@@ -1117,6 +1142,11 @@ class WorkforcePoolProvider(pulumi.CustomResource):
1117
1142
  For OIDC providers, you must supply a custom mapping that includes the `google.subject` attribute.
1118
1143
  For example, the following maps the sub claim of the incoming credential to the `subject` attribute
1119
1144
  on a Google token:
1145
+ ```
1146
+ {"google.subject": "assertion.sub"}
1147
+ ```
1148
+ An object containing a list of `"key": value` pairs.
1149
+ Example: `{ "name": "wrench", "mass": "1.3kg", "count": "3" }`.
1120
1150
  :param pulumi.Input[str] description: A user-specified description of the provider. Cannot exceed 256 characters.
1121
1151
  :param pulumi.Input[bool] disabled: Whether the provider is disabled. You cannot use a disabled provider to exchange tokens.
1122
1152
  However, existing tokens still grant access.
@@ -1216,6 +1246,11 @@ class WorkforcePoolProvider(pulumi.CustomResource):
1216
1246
  For OIDC providers, you must supply a custom mapping that includes the `google.subject` attribute.
1217
1247
  For example, the following maps the sub claim of the incoming credential to the `subject` attribute
1218
1248
  on a Google token:
1249
+ ```
1250
+ {"google.subject": "assertion.sub"}
1251
+ ```
1252
+ An object containing a list of `"key": value` pairs.
1253
+ Example: `{ "name": "wrench", "mass": "1.3kg", "count": "3" }`.
1219
1254
  """
1220
1255
  return pulumi.get(self, "attribute_mapping")
1221
1256
 
@@ -74,6 +74,26 @@ class WorkloadIdentityPoolProviderArgs:
74
74
  the total size of all mapped attributes must not exceed 8KB.
75
75
  For AWS providers, the following rules apply:
76
76
  - If no attribute mapping is defined, the following default mapping applies:
77
+ ```
78
+ {
79
+ "google.subject":"assertion.arn",
80
+ "attribute.aws_role":
81
+ "assertion.arn.contains('assumed-role')"
82
+ " ? assertion.arn.extract('{account_arn}assumed-role/')"
83
+ " + 'assumed-role/'"
84
+ " + assertion.arn.extract('assumed-role/{role_name}/')"
85
+ " : assertion.arn",
86
+ }
87
+ ```
88
+ - If any custom attribute mappings are defined, they must include a mapping to the
89
+ `google.subject` attribute.
90
+ For OIDC providers, the following rules apply:
91
+ - Custom attribute mappings must be defined, and must include a mapping to the
92
+ `google.subject` attribute. For example, the following maps the `sub` claim of the
93
+ incoming credential to the `subject` attribute on a Google token.
94
+ ```
95
+ {"google.subject": "assertion.sub"}
96
+ ```
77
97
  :param pulumi.Input['WorkloadIdentityPoolProviderAwsArgs'] aws: An Amazon Web Services identity provider. Not compatible with the property oidc or saml.
78
98
  Structure is documented below.
79
99
  :param pulumi.Input[str] description: A description for the provider. Cannot exceed 256 characters.
@@ -190,6 +210,26 @@ class WorkloadIdentityPoolProviderArgs:
190
210
  the total size of all mapped attributes must not exceed 8KB.
191
211
  For AWS providers, the following rules apply:
192
212
  - If no attribute mapping is defined, the following default mapping applies:
213
+ ```
214
+ {
215
+ "google.subject":"assertion.arn",
216
+ "attribute.aws_role":
217
+ "assertion.arn.contains('assumed-role')"
218
+ " ? assertion.arn.extract('{account_arn}assumed-role/')"
219
+ " + 'assumed-role/'"
220
+ " + assertion.arn.extract('assumed-role/{role_name}/')"
221
+ " : assertion.arn",
222
+ }
223
+ ```
224
+ - If any custom attribute mappings are defined, they must include a mapping to the
225
+ `google.subject` attribute.
226
+ For OIDC providers, the following rules apply:
227
+ - Custom attribute mappings must be defined, and must include a mapping to the
228
+ `google.subject` attribute. For example, the following maps the `sub` claim of the
229
+ incoming credential to the `subject` attribute on a Google token.
230
+ ```
231
+ {"google.subject": "assertion.sub"}
232
+ ```
193
233
  """
194
234
  return pulumi.get(self, "attribute_mapping")
195
235
 
@@ -341,6 +381,26 @@ class _WorkloadIdentityPoolProviderState:
341
381
  the total size of all mapped attributes must not exceed 8KB.
342
382
  For AWS providers, the following rules apply:
343
383
  - If no attribute mapping is defined, the following default mapping applies:
384
+ ```
385
+ {
386
+ "google.subject":"assertion.arn",
387
+ "attribute.aws_role":
388
+ "assertion.arn.contains('assumed-role')"
389
+ " ? assertion.arn.extract('{account_arn}assumed-role/')"
390
+ " + 'assumed-role/'"
391
+ " + assertion.arn.extract('assumed-role/{role_name}/')"
392
+ " : assertion.arn",
393
+ }
394
+ ```
395
+ - If any custom attribute mappings are defined, they must include a mapping to the
396
+ `google.subject` attribute.
397
+ For OIDC providers, the following rules apply:
398
+ - Custom attribute mappings must be defined, and must include a mapping to the
399
+ `google.subject` attribute. For example, the following maps the `sub` claim of the
400
+ incoming credential to the `subject` attribute on a Google token.
401
+ ```
402
+ {"google.subject": "assertion.sub"}
403
+ ```
344
404
  :param pulumi.Input['WorkloadIdentityPoolProviderAwsArgs'] aws: An Amazon Web Services identity provider. Not compatible with the property oidc or saml.
345
405
  Structure is documented below.
346
406
  :param pulumi.Input[str] description: A description for the provider. Cannot exceed 256 characters.
@@ -450,6 +510,26 @@ class _WorkloadIdentityPoolProviderState:
450
510
  the total size of all mapped attributes must not exceed 8KB.
451
511
  For AWS providers, the following rules apply:
452
512
  - If no attribute mapping is defined, the following default mapping applies:
513
+ ```
514
+ {
515
+ "google.subject":"assertion.arn",
516
+ "attribute.aws_role":
517
+ "assertion.arn.contains('assumed-role')"
518
+ " ? assertion.arn.extract('{account_arn}assumed-role/')"
519
+ " + 'assumed-role/'"
520
+ " + assertion.arn.extract('assumed-role/{role_name}/')"
521
+ " : assertion.arn",
522
+ }
523
+ ```
524
+ - If any custom attribute mappings are defined, they must include a mapping to the
525
+ `google.subject` attribute.
526
+ For OIDC providers, the following rules apply:
527
+ - Custom attribute mappings must be defined, and must include a mapping to the
528
+ `google.subject` attribute. For example, the following maps the `sub` claim of the
529
+ incoming credential to the `subject` attribute on a Google token.
530
+ ```
531
+ {"google.subject": "assertion.sub"}
532
+ ```
453
533
  """
454
534
  return pulumi.get(self, "attribute_mapping")
455
535
 
@@ -874,6 +954,26 @@ class WorkloadIdentityPoolProvider(pulumi.CustomResource):
874
954
  the total size of all mapped attributes must not exceed 8KB.
875
955
  For AWS providers, the following rules apply:
876
956
  - If no attribute mapping is defined, the following default mapping applies:
957
+ ```
958
+ {
959
+ "google.subject":"assertion.arn",
960
+ "attribute.aws_role":
961
+ "assertion.arn.contains('assumed-role')"
962
+ " ? assertion.arn.extract('{account_arn}assumed-role/')"
963
+ " + 'assumed-role/'"
964
+ " + assertion.arn.extract('assumed-role/{role_name}/')"
965
+ " : assertion.arn",
966
+ }
967
+ ```
968
+ - If any custom attribute mappings are defined, they must include a mapping to the
969
+ `google.subject` attribute.
970
+ For OIDC providers, the following rules apply:
971
+ - Custom attribute mappings must be defined, and must include a mapping to the
972
+ `google.subject` attribute. For example, the following maps the `sub` claim of the
973
+ incoming credential to the `subject` attribute on a Google token.
974
+ ```
975
+ {"google.subject": "assertion.sub"}
976
+ ```
877
977
  :param pulumi.Input[pulumi.InputType['WorkloadIdentityPoolProviderAwsArgs']] aws: An Amazon Web Services identity provider. Not compatible with the property oidc or saml.
878
978
  Structure is documented below.
879
979
  :param pulumi.Input[str] description: A description for the provider. Cannot exceed 256 characters.
@@ -1230,6 +1330,26 @@ class WorkloadIdentityPoolProvider(pulumi.CustomResource):
1230
1330
  the total size of all mapped attributes must not exceed 8KB.
1231
1331
  For AWS providers, the following rules apply:
1232
1332
  - If no attribute mapping is defined, the following default mapping applies:
1333
+ ```
1334
+ {
1335
+ "google.subject":"assertion.arn",
1336
+ "attribute.aws_role":
1337
+ "assertion.arn.contains('assumed-role')"
1338
+ " ? assertion.arn.extract('{account_arn}assumed-role/')"
1339
+ " + 'assumed-role/'"
1340
+ " + assertion.arn.extract('assumed-role/{role_name}/')"
1341
+ " : assertion.arn",
1342
+ }
1343
+ ```
1344
+ - If any custom attribute mappings are defined, they must include a mapping to the
1345
+ `google.subject` attribute.
1346
+ For OIDC providers, the following rules apply:
1347
+ - Custom attribute mappings must be defined, and must include a mapping to the
1348
+ `google.subject` attribute. For example, the following maps the `sub` claim of the
1349
+ incoming credential to the `subject` attribute on a Google token.
1350
+ ```
1351
+ {"google.subject": "assertion.sub"}
1352
+ ```
1233
1353
  :param pulumi.Input[pulumi.InputType['WorkloadIdentityPoolProviderAwsArgs']] aws: An Amazon Web Services identity provider. Not compatible with the property oidc or saml.
1234
1354
  Structure is documented below.
1235
1355
  :param pulumi.Input[str] description: A description for the provider. Cannot exceed 256 characters.
@@ -1327,6 +1447,26 @@ class WorkloadIdentityPoolProvider(pulumi.CustomResource):
1327
1447
  the total size of all mapped attributes must not exceed 8KB.
1328
1448
  For AWS providers, the following rules apply:
1329
1449
  - If no attribute mapping is defined, the following default mapping applies:
1450
+ ```
1451
+ {
1452
+ "google.subject":"assertion.arn",
1453
+ "attribute.aws_role":
1454
+ "assertion.arn.contains('assumed-role')"
1455
+ " ? assertion.arn.extract('{account_arn}assumed-role/')"
1456
+ " + 'assumed-role/'"
1457
+ " + assertion.arn.extract('assumed-role/{role_name}/')"
1458
+ " : assertion.arn",
1459
+ }
1460
+ ```
1461
+ - If any custom attribute mappings are defined, they must include a mapping to the
1462
+ `google.subject` attribute.
1463
+ For OIDC providers, the following rules apply:
1464
+ - Custom attribute mappings must be defined, and must include a mapping to the
1465
+ `google.subject` attribute. For example, the following maps the `sub` claim of the
1466
+ incoming credential to the `subject` attribute on a Google token.
1467
+ ```
1468
+ {"google.subject": "assertion.sub"}
1469
+ ```
1330
1470
  """
1331
1471
  return pulumi.get(self, "attribute_mapping")
1332
1472
 
@@ -249,7 +249,7 @@ class TunnelDestGroup(pulumi.CustomResource):
249
249
 
250
250
  dest_group = gcp.iap.TunnelDestGroup("dest_group",
251
251
  region="us-central1",
252
- group_name="testgroup_75223",
252
+ group_name="testgroup_41819",
253
253
  cidrs=[
254
254
  "10.1.0.0/16",
255
255
  "192.168.10.0/24",
@@ -337,7 +337,7 @@ class TunnelDestGroup(pulumi.CustomResource):
337
337
 
338
338
  dest_group = gcp.iap.TunnelDestGroup("dest_group",
339
339
  region="us-central1",
340
- group_name="testgroup_75223",
340
+ group_name="testgroup_41819",
341
341
  cidrs=[
342
342
  "10.1.0.0/16",
343
343
  "192.168.10.0/24",