pulumi-gcp 7.17.0a1712163201__py3-none-any.whl → 7.17.0a1712602552__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +27 -0
- pulumi_gcp/apphub/__init__.py +1 -0
- pulumi_gcp/apphub/get_application.py +220 -0
- pulumi_gcp/apphub/outputs.py +214 -0
- pulumi_gcp/applicationintegration/__init__.py +10 -0
- pulumi_gcp/applicationintegration/_inputs.py +119 -0
- pulumi_gcp/applicationintegration/client.py +566 -0
- pulumi_gcp/applicationintegration/outputs.py +122 -0
- pulumi_gcp/bigquery/_inputs.py +16 -0
- pulumi_gcp/bigquery/outputs.py +14 -0
- pulumi_gcp/bigquery/routine.py +98 -0
- pulumi_gcp/bigtable/_inputs.py +4 -4
- pulumi_gcp/bigtable/gc_policy.py +8 -0
- pulumi_gcp/bigtable/outputs.py +4 -4
- pulumi_gcp/billing/_inputs.py +4 -4
- pulumi_gcp/billing/outputs.py +4 -4
- pulumi_gcp/billing/project_info.py +4 -4
- pulumi_gcp/cloudfunctionsv2/_inputs.py +2 -2
- pulumi_gcp/cloudfunctionsv2/outputs.py +4 -4
- pulumi_gcp/cloudquota/__init__.py +2 -0
- pulumi_gcp/cloudquota/_inputs.py +131 -0
- pulumi_gcp/cloudquota/outputs.py +118 -0
- pulumi_gcp/cloudquota/s_quota_preference.py +777 -0
- pulumi_gcp/cloudrunv2/service.py +7 -7
- pulumi_gcp/composer/_inputs.py +14 -4
- pulumi_gcp/composer/outputs.py +22 -10
- pulumi_gcp/compute/_inputs.py +40 -44
- pulumi_gcp/compute/autoscaler.py +14 -14
- pulumi_gcp/compute/interconnect_attachment.py +64 -0
- pulumi_gcp/compute/network_endpoint.py +8 -0
- pulumi_gcp/compute/network_endpoint_list.py +8 -0
- pulumi_gcp/compute/outputs.py +62 -60
- pulumi_gcp/compute/region_autoscaler.py +14 -14
- pulumi_gcp/compute/region_backend_service.py +28 -0
- pulumi_gcp/compute/target_instance.py +4 -4
- pulumi_gcp/config/__init__.pyi +2 -0
- pulumi_gcp/config/vars.py +4 -0
- pulumi_gcp/container/_inputs.py +148 -16
- pulumi_gcp/container/outputs.py +148 -16
- pulumi_gcp/databasemigrationservice/connection_profile.py +6 -6
- pulumi_gcp/dataflow/flex_template_job.py +84 -112
- pulumi_gcp/dataloss/_inputs.py +6 -6
- pulumi_gcp/dataloss/outputs.py +6 -6
- pulumi_gcp/dataplex/task.py +16 -16
- pulumi_gcp/dataproc/_inputs.py +85 -10
- pulumi_gcp/dataproc/get_metastore_service.py +11 -1
- pulumi_gcp/dataproc/metastore_service.py +120 -0
- pulumi_gcp/dataproc/outputs.py +142 -10
- pulumi_gcp/firebase/app_check_service_config.py +2 -2
- pulumi_gcp/firestore/backup_schedule.py +14 -14
- pulumi_gcp/firestore/field.py +4 -4
- pulumi_gcp/gkehub/membership_binding.py +6 -6
- pulumi_gcp/gkehub/membership_rbac_role_binding.py +4 -4
- pulumi_gcp/gkehub/namespace.py +4 -4
- pulumi_gcp/gkehub/scope_rbac_role_binding.py +4 -4
- pulumi_gcp/iam/_inputs.py +76 -0
- pulumi_gcp/iam/outputs.py +76 -0
- pulumi_gcp/iam/workforce_pool_provider.py +35 -0
- pulumi_gcp/iam/workload_identity_pool_provider.py +140 -0
- pulumi_gcp/iap/tunnel_dest_group.py +2 -2
- pulumi_gcp/kms/_inputs.py +46 -0
- pulumi_gcp/kms/crypto_key.py +54 -0
- pulumi_gcp/kms/crypto_key_version.py +54 -0
- pulumi_gcp/kms/get_kms_crypto_key.py +11 -1
- pulumi_gcp/kms/outputs.py +54 -0
- pulumi_gcp/logging/_inputs.py +8 -8
- pulumi_gcp/logging/metric.py +7 -7
- pulumi_gcp/logging/outputs.py +8 -8
- pulumi_gcp/monitoring/_inputs.py +2 -2
- pulumi_gcp/monitoring/outputs.py +2 -2
- pulumi_gcp/monitoring/slo.py +4 -4
- pulumi_gcp/networkservices/_inputs.py +6 -6
- pulumi_gcp/networkservices/outputs.py +6 -6
- pulumi_gcp/orgpolicy/policy.py +2 -2
- pulumi_gcp/provider.py +20 -0
- pulumi_gcp/pubsub/subscription.py +4 -4
- pulumi_gcp/serviceusage/consumer_quota_override.py +7 -7
- pulumi_gcp/sql/_inputs.py +20 -2
- pulumi_gcp/sql/database_instance.py +2 -2
- pulumi_gcp/sql/outputs.py +20 -2
- pulumi_gcp/storage/_inputs.py +2 -2
- pulumi_gcp/storage/outputs.py +2 -2
- pulumi_gcp/vertex/__init__.py +1 -0
- pulumi_gcp/vertex/_inputs.py +175 -8
- pulumi_gcp/vertex/ai_deployment_resource_pool.py +477 -0
- pulumi_gcp/vertex/outputs.py +202 -10
- pulumi_gcp/vpcaccess/connector.py +77 -28
- {pulumi_gcp-7.17.0a1712163201.dist-info → pulumi_gcp-7.17.0a1712602552.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.17.0a1712163201.dist-info → pulumi_gcp-7.17.0a1712602552.dist-info}/RECORD +91 -83
- {pulumi_gcp-7.17.0a1712163201.dist-info → pulumi_gcp-7.17.0a1712602552.dist-info}/WHEEL +0 -0
- {pulumi_gcp-7.17.0a1712163201.dist-info → pulumi_gcp-7.17.0a1712602552.dist-info}/top_level.txt +0 -0
@@ -419,15 +419,15 @@ class MembershipBinding(pulumi.CustomResource):
|
|
419
419
|
network="default",
|
420
420
|
subnetwork="default")
|
421
421
|
membership = gcp.gkehub.Membership("membership",
|
422
|
-
membership_id="tf-test-
|
422
|
+
membership_id="tf-test-membership_75125",
|
423
423
|
endpoint=gcp.gkehub.MembershipEndpointArgs(
|
424
424
|
gke_cluster=gcp.gkehub.MembershipEndpointGkeClusterArgs(
|
425
425
|
resource_link=primary.id.apply(lambda id: f"//container.googleapis.com/{id}"),
|
426
426
|
),
|
427
427
|
))
|
428
|
-
scope = gcp.gkehub.Scope("scope", scope_id="tf-test-
|
428
|
+
scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_88722")
|
429
429
|
membership_binding = gcp.gkehub.MembershipBinding("membership_binding",
|
430
|
-
membership_binding_id="tf-test-membership-
|
430
|
+
membership_binding_id="tf-test-membership-binding_39249",
|
431
431
|
scope=scope.name,
|
432
432
|
membership_id=membership.membership_id,
|
433
433
|
location="global",
|
@@ -512,15 +512,15 @@ class MembershipBinding(pulumi.CustomResource):
|
|
512
512
|
network="default",
|
513
513
|
subnetwork="default")
|
514
514
|
membership = gcp.gkehub.Membership("membership",
|
515
|
-
membership_id="tf-test-
|
515
|
+
membership_id="tf-test-membership_75125",
|
516
516
|
endpoint=gcp.gkehub.MembershipEndpointArgs(
|
517
517
|
gke_cluster=gcp.gkehub.MembershipEndpointGkeClusterArgs(
|
518
518
|
resource_link=primary.id.apply(lambda id: f"//container.googleapis.com/{id}"),
|
519
519
|
),
|
520
520
|
))
|
521
|
-
scope = gcp.gkehub.Scope("scope", scope_id="tf-test-
|
521
|
+
scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_88722")
|
522
522
|
membership_binding = gcp.gkehub.MembershipBinding("membership_binding",
|
523
|
-
membership_binding_id="tf-test-membership-
|
523
|
+
membership_binding_id="tf-test-membership-binding_39249",
|
524
524
|
scope=scope.name,
|
525
525
|
membership_id=membership.membership_id,
|
526
526
|
location="global",
|
@@ -364,7 +364,7 @@ class MembershipRbacRoleBinding(pulumi.CustomResource):
|
|
364
364
|
network="default",
|
365
365
|
subnetwork="default")
|
366
366
|
membership = gcp.gkehub.Membership("membership",
|
367
|
-
membership_id="tf-test-
|
367
|
+
membership_id="tf-test-membership_74391",
|
368
368
|
endpoint=gcp.gkehub.MembershipEndpointArgs(
|
369
369
|
gke_cluster=gcp.gkehub.MembershipEndpointGkeClusterArgs(
|
370
370
|
resource_link=primary.id.apply(lambda id: f"//container.googleapis.com/{id}"),
|
@@ -372,7 +372,7 @@ class MembershipRbacRoleBinding(pulumi.CustomResource):
|
|
372
372
|
))
|
373
373
|
project = gcp.organizations.get_project()
|
374
374
|
membership_rbac_role_binding = gcp.gkehub.MembershipRbacRoleBinding("membership_rbac_role_binding",
|
375
|
-
membership_rbac_role_binding_id="tf-test-membership-rbac-role-
|
375
|
+
membership_rbac_role_binding_id="tf-test-membership-rbac-role-binding_16511",
|
376
376
|
membership_id=membership.membership_id,
|
377
377
|
user=f"service-{project.number}@gcp-sa-anthossupport.iam.gserviceaccount.com",
|
378
378
|
role=gcp.gkehub.MembershipRbacRoleBindingRoleArgs(
|
@@ -444,7 +444,7 @@ class MembershipRbacRoleBinding(pulumi.CustomResource):
|
|
444
444
|
network="default",
|
445
445
|
subnetwork="default")
|
446
446
|
membership = gcp.gkehub.Membership("membership",
|
447
|
-
membership_id="tf-test-
|
447
|
+
membership_id="tf-test-membership_74391",
|
448
448
|
endpoint=gcp.gkehub.MembershipEndpointArgs(
|
449
449
|
gke_cluster=gcp.gkehub.MembershipEndpointGkeClusterArgs(
|
450
450
|
resource_link=primary.id.apply(lambda id: f"//container.googleapis.com/{id}"),
|
@@ -452,7 +452,7 @@ class MembershipRbacRoleBinding(pulumi.CustomResource):
|
|
452
452
|
))
|
453
453
|
project = gcp.organizations.get_project()
|
454
454
|
membership_rbac_role_binding = gcp.gkehub.MembershipRbacRoleBinding("membership_rbac_role_binding",
|
455
|
-
membership_rbac_role_binding_id="tf-test-membership-rbac-role-
|
455
|
+
membership_rbac_role_binding_id="tf-test-membership-rbac-role-binding_16511",
|
456
456
|
membership_id=membership.membership_id,
|
457
457
|
user=f"service-{project.number}@gcp-sa-anthossupport.iam.gserviceaccount.com",
|
458
458
|
role=gcp.gkehub.MembershipRbacRoleBindingRoleArgs(
|
pulumi_gcp/gkehub/namespace.py
CHANGED
@@ -424,9 +424,9 @@ class Namespace(pulumi.CustomResource):
|
|
424
424
|
import pulumi
|
425
425
|
import pulumi_gcp as gcp
|
426
426
|
|
427
|
-
scope = gcp.gkehub.Scope("scope", scope_id="tf-test-
|
427
|
+
scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_8493")
|
428
428
|
namespace = gcp.gkehub.Namespace("namespace",
|
429
|
-
scope_namespace_id="tf-test-
|
429
|
+
scope_namespace_id="tf-test-namespace_9106",
|
430
430
|
scope_id=scope.scope_id,
|
431
431
|
scope=scope.name,
|
432
432
|
namespace_labels={
|
@@ -510,9 +510,9 @@ class Namespace(pulumi.CustomResource):
|
|
510
510
|
import pulumi
|
511
511
|
import pulumi_gcp as gcp
|
512
512
|
|
513
|
-
scope = gcp.gkehub.Scope("scope", scope_id="tf-test-
|
513
|
+
scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_8493")
|
514
514
|
namespace = gcp.gkehub.Namespace("namespace",
|
515
|
-
scope_namespace_id="tf-test-
|
515
|
+
scope_namespace_id="tf-test-namespace_9106",
|
516
516
|
scope_id=scope.scope_id,
|
517
517
|
scope=scope.name,
|
518
518
|
namespace_labels={
|
@@ -453,9 +453,9 @@ class ScopeRbacRoleBinding(pulumi.CustomResource):
|
|
453
453
|
import pulumi
|
454
454
|
import pulumi_gcp as gcp
|
455
455
|
|
456
|
-
scope = gcp.gkehub.Scope("scope", scope_id="tf-test-
|
456
|
+
scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_27169")
|
457
457
|
scope_rbac_role_binding = gcp.gkehub.ScopeRbacRoleBinding("scope_rbac_role_binding",
|
458
|
-
scope_rbac_role_binding_id="tf-test-scope-rbac-role-
|
458
|
+
scope_rbac_role_binding_id="tf-test-scope-rbac-role-binding_75223",
|
459
459
|
scope_id=scope.scope_id,
|
460
460
|
user="test-email@gmail.com",
|
461
461
|
role=gcp.gkehub.ScopeRbacRoleBindingRoleArgs(
|
@@ -535,9 +535,9 @@ class ScopeRbacRoleBinding(pulumi.CustomResource):
|
|
535
535
|
import pulumi
|
536
536
|
import pulumi_gcp as gcp
|
537
537
|
|
538
|
-
scope = gcp.gkehub.Scope("scope", scope_id="tf-test-
|
538
|
+
scope = gcp.gkehub.Scope("scope", scope_id="tf-test-scope_27169")
|
539
539
|
scope_rbac_role_binding = gcp.gkehub.ScopeRbacRoleBinding("scope_rbac_role_binding",
|
540
|
-
scope_rbac_role_binding_id="tf-test-scope-rbac-role-
|
540
|
+
scope_rbac_role_binding_id="tf-test-scope-rbac-role-binding_75223",
|
541
541
|
scope_id=scope.scope_id,
|
542
542
|
user="test-email@gmail.com",
|
543
543
|
role=gcp.gkehub.ScopeRbacRoleBindingRoleArgs(
|
pulumi_gcp/iam/_inputs.py
CHANGED
@@ -513,6 +513,23 @@ class WorkforcePoolProviderOidcArgs:
|
|
513
513
|
.well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
|
514
514
|
keys are supported. The JWK must use following format and include only
|
515
515
|
the following fields:
|
516
|
+
```
|
517
|
+
{
|
518
|
+
"keys": [
|
519
|
+
{
|
520
|
+
"kty": "RSA/EC",
|
521
|
+
"alg": "<algorithm>",
|
522
|
+
"use": "sig",
|
523
|
+
"kid": "<key-id>",
|
524
|
+
"n": "",
|
525
|
+
"e": "",
|
526
|
+
"x": "",
|
527
|
+
"y": "",
|
528
|
+
"crv": ""
|
529
|
+
}
|
530
|
+
]
|
531
|
+
}
|
532
|
+
```
|
516
533
|
:param pulumi.Input['WorkforcePoolProviderOidcWebSsoConfigArgs'] web_sso_config: Configuration for web single sign-on for the OIDC provider. Here, web sign-in refers to console sign-in and gcloud sign-in through the browser.
|
517
534
|
Structure is documented below.
|
518
535
|
"""
|
@@ -572,6 +589,23 @@ class WorkforcePoolProviderOidcArgs:
|
|
572
589
|
.well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
|
573
590
|
keys are supported. The JWK must use following format and include only
|
574
591
|
the following fields:
|
592
|
+
```
|
593
|
+
{
|
594
|
+
"keys": [
|
595
|
+
{
|
596
|
+
"kty": "RSA/EC",
|
597
|
+
"alg": "<algorithm>",
|
598
|
+
"use": "sig",
|
599
|
+
"kid": "<key-id>",
|
600
|
+
"n": "",
|
601
|
+
"e": "",
|
602
|
+
"x": "",
|
603
|
+
"y": "",
|
604
|
+
"crv": ""
|
605
|
+
}
|
606
|
+
]
|
607
|
+
}
|
608
|
+
```
|
575
609
|
"""
|
576
610
|
return pulumi.get(self, "jwks_json")
|
577
611
|
|
@@ -812,12 +846,33 @@ class WorkloadIdentityPoolProviderOidcArgs:
|
|
812
846
|
If this list is empty, the OIDC token audience must be equal to the full canonical
|
813
847
|
resource name of the WorkloadIdentityPoolProvider, with or without the HTTPS prefix.
|
814
848
|
For example:
|
849
|
+
```
|
850
|
+
//iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
|
851
|
+
https://iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
|
852
|
+
```
|
815
853
|
:param pulumi.Input[str] jwks_json: OIDC JWKs in JSON String format. For details on definition of a
|
816
854
|
JWK, see https:tools.ietf.org/html/rfc7517. If not set, then we
|
817
855
|
use the `jwks_uri` from the discovery document fetched from the
|
818
856
|
.well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
|
819
857
|
keys are supported. The JWK must use following format and include only
|
820
858
|
the following fields:
|
859
|
+
```
|
860
|
+
{
|
861
|
+
"keys": [
|
862
|
+
{
|
863
|
+
"kty": "RSA/EC",
|
864
|
+
"alg": "<algorithm>",
|
865
|
+
"use": "sig",
|
866
|
+
"kid": "<key-id>",
|
867
|
+
"n": "",
|
868
|
+
"e": "",
|
869
|
+
"x": "",
|
870
|
+
"y": "",
|
871
|
+
"crv": ""
|
872
|
+
}
|
873
|
+
]
|
874
|
+
}
|
875
|
+
```
|
821
876
|
"""
|
822
877
|
pulumi.set(__self__, "issuer_uri", issuer_uri)
|
823
878
|
if allowed_audiences is not None:
|
@@ -848,6 +903,10 @@ class WorkloadIdentityPoolProviderOidcArgs:
|
|
848
903
|
If this list is empty, the OIDC token audience must be equal to the full canonical
|
849
904
|
resource name of the WorkloadIdentityPoolProvider, with or without the HTTPS prefix.
|
850
905
|
For example:
|
906
|
+
```
|
907
|
+
//iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
|
908
|
+
https://iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
|
909
|
+
```
|
851
910
|
"""
|
852
911
|
return pulumi.get(self, "allowed_audiences")
|
853
912
|
|
@@ -865,6 +924,23 @@ class WorkloadIdentityPoolProviderOidcArgs:
|
|
865
924
|
.well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
|
866
925
|
keys are supported. The JWK must use following format and include only
|
867
926
|
the following fields:
|
927
|
+
```
|
928
|
+
{
|
929
|
+
"keys": [
|
930
|
+
{
|
931
|
+
"kty": "RSA/EC",
|
932
|
+
"alg": "<algorithm>",
|
933
|
+
"use": "sig",
|
934
|
+
"kid": "<key-id>",
|
935
|
+
"n": "",
|
936
|
+
"e": "",
|
937
|
+
"x": "",
|
938
|
+
"y": "",
|
939
|
+
"crv": ""
|
940
|
+
}
|
941
|
+
]
|
942
|
+
}
|
943
|
+
```
|
868
944
|
"""
|
869
945
|
return pulumi.get(self, "jwks_json")
|
870
946
|
|
pulumi_gcp/iam/outputs.py
CHANGED
@@ -550,6 +550,23 @@ class WorkforcePoolProviderOidc(dict):
|
|
550
550
|
.well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
|
551
551
|
keys are supported. The JWK must use following format and include only
|
552
552
|
the following fields:
|
553
|
+
```
|
554
|
+
{
|
555
|
+
"keys": [
|
556
|
+
{
|
557
|
+
"kty": "RSA/EC",
|
558
|
+
"alg": "<algorithm>",
|
559
|
+
"use": "sig",
|
560
|
+
"kid": "<key-id>",
|
561
|
+
"n": "",
|
562
|
+
"e": "",
|
563
|
+
"x": "",
|
564
|
+
"y": "",
|
565
|
+
"crv": ""
|
566
|
+
}
|
567
|
+
]
|
568
|
+
}
|
569
|
+
```
|
553
570
|
:param 'WorkforcePoolProviderOidcWebSsoConfigArgs' web_sso_config: Configuration for web single sign-on for the OIDC provider. Here, web sign-in refers to console sign-in and gcloud sign-in through the browser.
|
554
571
|
Structure is documented below.
|
555
572
|
"""
|
@@ -597,6 +614,23 @@ class WorkforcePoolProviderOidc(dict):
|
|
597
614
|
.well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
|
598
615
|
keys are supported. The JWK must use following format and include only
|
599
616
|
the following fields:
|
617
|
+
```
|
618
|
+
{
|
619
|
+
"keys": [
|
620
|
+
{
|
621
|
+
"kty": "RSA/EC",
|
622
|
+
"alg": "<algorithm>",
|
623
|
+
"use": "sig",
|
624
|
+
"kid": "<key-id>",
|
625
|
+
"n": "",
|
626
|
+
"e": "",
|
627
|
+
"x": "",
|
628
|
+
"y": "",
|
629
|
+
"crv": ""
|
630
|
+
}
|
631
|
+
]
|
632
|
+
}
|
633
|
+
```
|
600
634
|
"""
|
601
635
|
return pulumi.get(self, "jwks_json")
|
602
636
|
|
@@ -890,12 +924,33 @@ class WorkloadIdentityPoolProviderOidc(dict):
|
|
890
924
|
If this list is empty, the OIDC token audience must be equal to the full canonical
|
891
925
|
resource name of the WorkloadIdentityPoolProvider, with or without the HTTPS prefix.
|
892
926
|
For example:
|
927
|
+
```
|
928
|
+
//iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
|
929
|
+
https://iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
|
930
|
+
```
|
893
931
|
:param str jwks_json: OIDC JWKs in JSON String format. For details on definition of a
|
894
932
|
JWK, see https:tools.ietf.org/html/rfc7517. If not set, then we
|
895
933
|
use the `jwks_uri` from the discovery document fetched from the
|
896
934
|
.well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
|
897
935
|
keys are supported. The JWK must use following format and include only
|
898
936
|
the following fields:
|
937
|
+
```
|
938
|
+
{
|
939
|
+
"keys": [
|
940
|
+
{
|
941
|
+
"kty": "RSA/EC",
|
942
|
+
"alg": "<algorithm>",
|
943
|
+
"use": "sig",
|
944
|
+
"kid": "<key-id>",
|
945
|
+
"n": "",
|
946
|
+
"e": "",
|
947
|
+
"x": "",
|
948
|
+
"y": "",
|
949
|
+
"crv": ""
|
950
|
+
}
|
951
|
+
]
|
952
|
+
}
|
953
|
+
```
|
899
954
|
"""
|
900
955
|
pulumi.set(__self__, "issuer_uri", issuer_uri)
|
901
956
|
if allowed_audiences is not None:
|
@@ -922,6 +977,10 @@ class WorkloadIdentityPoolProviderOidc(dict):
|
|
922
977
|
If this list is empty, the OIDC token audience must be equal to the full canonical
|
923
978
|
resource name of the WorkloadIdentityPoolProvider, with or without the HTTPS prefix.
|
924
979
|
For example:
|
980
|
+
```
|
981
|
+
//iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
|
982
|
+
https://iam.googleapis.com/projects/<project-number>/locations/<location>/workloadIdentityPools/<pool-id>/providers/<provider-id>
|
983
|
+
```
|
925
984
|
"""
|
926
985
|
return pulumi.get(self, "allowed_audiences")
|
927
986
|
|
@@ -935,6 +994,23 @@ class WorkloadIdentityPoolProviderOidc(dict):
|
|
935
994
|
.well-known path for the `issuer_uri`. Currently, RSA and EC asymmetric
|
936
995
|
keys are supported. The JWK must use following format and include only
|
937
996
|
the following fields:
|
997
|
+
```
|
998
|
+
{
|
999
|
+
"keys": [
|
1000
|
+
{
|
1001
|
+
"kty": "RSA/EC",
|
1002
|
+
"alg": "<algorithm>",
|
1003
|
+
"use": "sig",
|
1004
|
+
"kid": "<key-id>",
|
1005
|
+
"n": "",
|
1006
|
+
"e": "",
|
1007
|
+
"x": "",
|
1008
|
+
"y": "",
|
1009
|
+
"crv": ""
|
1010
|
+
}
|
1011
|
+
]
|
1012
|
+
}
|
1013
|
+
```
|
938
1014
|
"""
|
939
1015
|
return pulumi.get(self, "jwks_json")
|
940
1016
|
|
@@ -81,6 +81,11 @@ class WorkforcePoolProviderArgs:
|
|
81
81
|
For OIDC providers, you must supply a custom mapping that includes the `google.subject` attribute.
|
82
82
|
For example, the following maps the sub claim of the incoming credential to the `subject` attribute
|
83
83
|
on a Google token:
|
84
|
+
```
|
85
|
+
{"google.subject": "assertion.sub"}
|
86
|
+
```
|
87
|
+
An object containing a list of `"key": value` pairs.
|
88
|
+
Example: `{ "name": "wrench", "mass": "1.3kg", "count": "3" }`.
|
84
89
|
:param pulumi.Input[str] description: A user-specified description of the provider. Cannot exceed 256 characters.
|
85
90
|
:param pulumi.Input[bool] disabled: Whether the provider is disabled. You cannot use a disabled provider to exchange tokens.
|
86
91
|
However, existing tokens still grant access.
|
@@ -209,6 +214,11 @@ class WorkforcePoolProviderArgs:
|
|
209
214
|
For OIDC providers, you must supply a custom mapping that includes the `google.subject` attribute.
|
210
215
|
For example, the following maps the sub claim of the incoming credential to the `subject` attribute
|
211
216
|
on a Google token:
|
217
|
+
```
|
218
|
+
{"google.subject": "assertion.sub"}
|
219
|
+
```
|
220
|
+
An object containing a list of `"key": value` pairs.
|
221
|
+
Example: `{ "name": "wrench", "mass": "1.3kg", "count": "3" }`.
|
212
222
|
"""
|
213
223
|
return pulumi.get(self, "attribute_mapping")
|
214
224
|
|
@@ -339,6 +349,11 @@ class _WorkforcePoolProviderState:
|
|
339
349
|
For OIDC providers, you must supply a custom mapping that includes the `google.subject` attribute.
|
340
350
|
For example, the following maps the sub claim of the incoming credential to the `subject` attribute
|
341
351
|
on a Google token:
|
352
|
+
```
|
353
|
+
{"google.subject": "assertion.sub"}
|
354
|
+
```
|
355
|
+
An object containing a list of `"key": value` pairs.
|
356
|
+
Example: `{ "name": "wrench", "mass": "1.3kg", "count": "3" }`.
|
342
357
|
:param pulumi.Input[str] description: A user-specified description of the provider. Cannot exceed 256 characters.
|
343
358
|
:param pulumi.Input[bool] disabled: Whether the provider is disabled. You cannot use a disabled provider to exchange tokens.
|
344
359
|
However, existing tokens still grant access.
|
@@ -449,6 +464,11 @@ class _WorkforcePoolProviderState:
|
|
449
464
|
For OIDC providers, you must supply a custom mapping that includes the `google.subject` attribute.
|
450
465
|
For example, the following maps the sub claim of the incoming credential to the `subject` attribute
|
451
466
|
on a Google token:
|
467
|
+
```
|
468
|
+
{"google.subject": "assertion.sub"}
|
469
|
+
```
|
470
|
+
An object containing a list of `"key": value` pairs.
|
471
|
+
Example: `{ "name": "wrench", "mass": "1.3kg", "count": "3" }`.
|
452
472
|
"""
|
453
473
|
return pulumi.get(self, "attribute_mapping")
|
454
474
|
|
@@ -811,6 +831,11 @@ class WorkforcePoolProvider(pulumi.CustomResource):
|
|
811
831
|
For OIDC providers, you must supply a custom mapping that includes the `google.subject` attribute.
|
812
832
|
For example, the following maps the sub claim of the incoming credential to the `subject` attribute
|
813
833
|
on a Google token:
|
834
|
+
```
|
835
|
+
{"google.subject": "assertion.sub"}
|
836
|
+
```
|
837
|
+
An object containing a list of `"key": value` pairs.
|
838
|
+
Example: `{ "name": "wrench", "mass": "1.3kg", "count": "3" }`.
|
814
839
|
:param pulumi.Input[str] description: A user-specified description of the provider. Cannot exceed 256 characters.
|
815
840
|
:param pulumi.Input[bool] disabled: Whether the provider is disabled. You cannot use a disabled provider to exchange tokens.
|
816
841
|
However, existing tokens still grant access.
|
@@ -1117,6 +1142,11 @@ class WorkforcePoolProvider(pulumi.CustomResource):
|
|
1117
1142
|
For OIDC providers, you must supply a custom mapping that includes the `google.subject` attribute.
|
1118
1143
|
For example, the following maps the sub claim of the incoming credential to the `subject` attribute
|
1119
1144
|
on a Google token:
|
1145
|
+
```
|
1146
|
+
{"google.subject": "assertion.sub"}
|
1147
|
+
```
|
1148
|
+
An object containing a list of `"key": value` pairs.
|
1149
|
+
Example: `{ "name": "wrench", "mass": "1.3kg", "count": "3" }`.
|
1120
1150
|
:param pulumi.Input[str] description: A user-specified description of the provider. Cannot exceed 256 characters.
|
1121
1151
|
:param pulumi.Input[bool] disabled: Whether the provider is disabled. You cannot use a disabled provider to exchange tokens.
|
1122
1152
|
However, existing tokens still grant access.
|
@@ -1216,6 +1246,11 @@ class WorkforcePoolProvider(pulumi.CustomResource):
|
|
1216
1246
|
For OIDC providers, you must supply a custom mapping that includes the `google.subject` attribute.
|
1217
1247
|
For example, the following maps the sub claim of the incoming credential to the `subject` attribute
|
1218
1248
|
on a Google token:
|
1249
|
+
```
|
1250
|
+
{"google.subject": "assertion.sub"}
|
1251
|
+
```
|
1252
|
+
An object containing a list of `"key": value` pairs.
|
1253
|
+
Example: `{ "name": "wrench", "mass": "1.3kg", "count": "3" }`.
|
1219
1254
|
"""
|
1220
1255
|
return pulumi.get(self, "attribute_mapping")
|
1221
1256
|
|
@@ -74,6 +74,26 @@ class WorkloadIdentityPoolProviderArgs:
|
|
74
74
|
the total size of all mapped attributes must not exceed 8KB.
|
75
75
|
For AWS providers, the following rules apply:
|
76
76
|
- If no attribute mapping is defined, the following default mapping applies:
|
77
|
+
```
|
78
|
+
{
|
79
|
+
"google.subject":"assertion.arn",
|
80
|
+
"attribute.aws_role":
|
81
|
+
"assertion.arn.contains('assumed-role')"
|
82
|
+
" ? assertion.arn.extract('{account_arn}assumed-role/')"
|
83
|
+
" + 'assumed-role/'"
|
84
|
+
" + assertion.arn.extract('assumed-role/{role_name}/')"
|
85
|
+
" : assertion.arn",
|
86
|
+
}
|
87
|
+
```
|
88
|
+
- If any custom attribute mappings are defined, they must include a mapping to the
|
89
|
+
`google.subject` attribute.
|
90
|
+
For OIDC providers, the following rules apply:
|
91
|
+
- Custom attribute mappings must be defined, and must include a mapping to the
|
92
|
+
`google.subject` attribute. For example, the following maps the `sub` claim of the
|
93
|
+
incoming credential to the `subject` attribute on a Google token.
|
94
|
+
```
|
95
|
+
{"google.subject": "assertion.sub"}
|
96
|
+
```
|
77
97
|
:param pulumi.Input['WorkloadIdentityPoolProviderAwsArgs'] aws: An Amazon Web Services identity provider. Not compatible with the property oidc or saml.
|
78
98
|
Structure is documented below.
|
79
99
|
:param pulumi.Input[str] description: A description for the provider. Cannot exceed 256 characters.
|
@@ -190,6 +210,26 @@ class WorkloadIdentityPoolProviderArgs:
|
|
190
210
|
the total size of all mapped attributes must not exceed 8KB.
|
191
211
|
For AWS providers, the following rules apply:
|
192
212
|
- If no attribute mapping is defined, the following default mapping applies:
|
213
|
+
```
|
214
|
+
{
|
215
|
+
"google.subject":"assertion.arn",
|
216
|
+
"attribute.aws_role":
|
217
|
+
"assertion.arn.contains('assumed-role')"
|
218
|
+
" ? assertion.arn.extract('{account_arn}assumed-role/')"
|
219
|
+
" + 'assumed-role/'"
|
220
|
+
" + assertion.arn.extract('assumed-role/{role_name}/')"
|
221
|
+
" : assertion.arn",
|
222
|
+
}
|
223
|
+
```
|
224
|
+
- If any custom attribute mappings are defined, they must include a mapping to the
|
225
|
+
`google.subject` attribute.
|
226
|
+
For OIDC providers, the following rules apply:
|
227
|
+
- Custom attribute mappings must be defined, and must include a mapping to the
|
228
|
+
`google.subject` attribute. For example, the following maps the `sub` claim of the
|
229
|
+
incoming credential to the `subject` attribute on a Google token.
|
230
|
+
```
|
231
|
+
{"google.subject": "assertion.sub"}
|
232
|
+
```
|
193
233
|
"""
|
194
234
|
return pulumi.get(self, "attribute_mapping")
|
195
235
|
|
@@ -341,6 +381,26 @@ class _WorkloadIdentityPoolProviderState:
|
|
341
381
|
the total size of all mapped attributes must not exceed 8KB.
|
342
382
|
For AWS providers, the following rules apply:
|
343
383
|
- If no attribute mapping is defined, the following default mapping applies:
|
384
|
+
```
|
385
|
+
{
|
386
|
+
"google.subject":"assertion.arn",
|
387
|
+
"attribute.aws_role":
|
388
|
+
"assertion.arn.contains('assumed-role')"
|
389
|
+
" ? assertion.arn.extract('{account_arn}assumed-role/')"
|
390
|
+
" + 'assumed-role/'"
|
391
|
+
" + assertion.arn.extract('assumed-role/{role_name}/')"
|
392
|
+
" : assertion.arn",
|
393
|
+
}
|
394
|
+
```
|
395
|
+
- If any custom attribute mappings are defined, they must include a mapping to the
|
396
|
+
`google.subject` attribute.
|
397
|
+
For OIDC providers, the following rules apply:
|
398
|
+
- Custom attribute mappings must be defined, and must include a mapping to the
|
399
|
+
`google.subject` attribute. For example, the following maps the `sub` claim of the
|
400
|
+
incoming credential to the `subject` attribute on a Google token.
|
401
|
+
```
|
402
|
+
{"google.subject": "assertion.sub"}
|
403
|
+
```
|
344
404
|
:param pulumi.Input['WorkloadIdentityPoolProviderAwsArgs'] aws: An Amazon Web Services identity provider. Not compatible with the property oidc or saml.
|
345
405
|
Structure is documented below.
|
346
406
|
:param pulumi.Input[str] description: A description for the provider. Cannot exceed 256 characters.
|
@@ -450,6 +510,26 @@ class _WorkloadIdentityPoolProviderState:
|
|
450
510
|
the total size of all mapped attributes must not exceed 8KB.
|
451
511
|
For AWS providers, the following rules apply:
|
452
512
|
- If no attribute mapping is defined, the following default mapping applies:
|
513
|
+
```
|
514
|
+
{
|
515
|
+
"google.subject":"assertion.arn",
|
516
|
+
"attribute.aws_role":
|
517
|
+
"assertion.arn.contains('assumed-role')"
|
518
|
+
" ? assertion.arn.extract('{account_arn}assumed-role/')"
|
519
|
+
" + 'assumed-role/'"
|
520
|
+
" + assertion.arn.extract('assumed-role/{role_name}/')"
|
521
|
+
" : assertion.arn",
|
522
|
+
}
|
523
|
+
```
|
524
|
+
- If any custom attribute mappings are defined, they must include a mapping to the
|
525
|
+
`google.subject` attribute.
|
526
|
+
For OIDC providers, the following rules apply:
|
527
|
+
- Custom attribute mappings must be defined, and must include a mapping to the
|
528
|
+
`google.subject` attribute. For example, the following maps the `sub` claim of the
|
529
|
+
incoming credential to the `subject` attribute on a Google token.
|
530
|
+
```
|
531
|
+
{"google.subject": "assertion.sub"}
|
532
|
+
```
|
453
533
|
"""
|
454
534
|
return pulumi.get(self, "attribute_mapping")
|
455
535
|
|
@@ -874,6 +954,26 @@ class WorkloadIdentityPoolProvider(pulumi.CustomResource):
|
|
874
954
|
the total size of all mapped attributes must not exceed 8KB.
|
875
955
|
For AWS providers, the following rules apply:
|
876
956
|
- If no attribute mapping is defined, the following default mapping applies:
|
957
|
+
```
|
958
|
+
{
|
959
|
+
"google.subject":"assertion.arn",
|
960
|
+
"attribute.aws_role":
|
961
|
+
"assertion.arn.contains('assumed-role')"
|
962
|
+
" ? assertion.arn.extract('{account_arn}assumed-role/')"
|
963
|
+
" + 'assumed-role/'"
|
964
|
+
" + assertion.arn.extract('assumed-role/{role_name}/')"
|
965
|
+
" : assertion.arn",
|
966
|
+
}
|
967
|
+
```
|
968
|
+
- If any custom attribute mappings are defined, they must include a mapping to the
|
969
|
+
`google.subject` attribute.
|
970
|
+
For OIDC providers, the following rules apply:
|
971
|
+
- Custom attribute mappings must be defined, and must include a mapping to the
|
972
|
+
`google.subject` attribute. For example, the following maps the `sub` claim of the
|
973
|
+
incoming credential to the `subject` attribute on a Google token.
|
974
|
+
```
|
975
|
+
{"google.subject": "assertion.sub"}
|
976
|
+
```
|
877
977
|
:param pulumi.Input[pulumi.InputType['WorkloadIdentityPoolProviderAwsArgs']] aws: An Amazon Web Services identity provider. Not compatible with the property oidc or saml.
|
878
978
|
Structure is documented below.
|
879
979
|
:param pulumi.Input[str] description: A description for the provider. Cannot exceed 256 characters.
|
@@ -1230,6 +1330,26 @@ class WorkloadIdentityPoolProvider(pulumi.CustomResource):
|
|
1230
1330
|
the total size of all mapped attributes must not exceed 8KB.
|
1231
1331
|
For AWS providers, the following rules apply:
|
1232
1332
|
- If no attribute mapping is defined, the following default mapping applies:
|
1333
|
+
```
|
1334
|
+
{
|
1335
|
+
"google.subject":"assertion.arn",
|
1336
|
+
"attribute.aws_role":
|
1337
|
+
"assertion.arn.contains('assumed-role')"
|
1338
|
+
" ? assertion.arn.extract('{account_arn}assumed-role/')"
|
1339
|
+
" + 'assumed-role/'"
|
1340
|
+
" + assertion.arn.extract('assumed-role/{role_name}/')"
|
1341
|
+
" : assertion.arn",
|
1342
|
+
}
|
1343
|
+
```
|
1344
|
+
- If any custom attribute mappings are defined, they must include a mapping to the
|
1345
|
+
`google.subject` attribute.
|
1346
|
+
For OIDC providers, the following rules apply:
|
1347
|
+
- Custom attribute mappings must be defined, and must include a mapping to the
|
1348
|
+
`google.subject` attribute. For example, the following maps the `sub` claim of the
|
1349
|
+
incoming credential to the `subject` attribute on a Google token.
|
1350
|
+
```
|
1351
|
+
{"google.subject": "assertion.sub"}
|
1352
|
+
```
|
1233
1353
|
:param pulumi.Input[pulumi.InputType['WorkloadIdentityPoolProviderAwsArgs']] aws: An Amazon Web Services identity provider. Not compatible with the property oidc or saml.
|
1234
1354
|
Structure is documented below.
|
1235
1355
|
:param pulumi.Input[str] description: A description for the provider. Cannot exceed 256 characters.
|
@@ -1327,6 +1447,26 @@ class WorkloadIdentityPoolProvider(pulumi.CustomResource):
|
|
1327
1447
|
the total size of all mapped attributes must not exceed 8KB.
|
1328
1448
|
For AWS providers, the following rules apply:
|
1329
1449
|
- If no attribute mapping is defined, the following default mapping applies:
|
1450
|
+
```
|
1451
|
+
{
|
1452
|
+
"google.subject":"assertion.arn",
|
1453
|
+
"attribute.aws_role":
|
1454
|
+
"assertion.arn.contains('assumed-role')"
|
1455
|
+
" ? assertion.arn.extract('{account_arn}assumed-role/')"
|
1456
|
+
" + 'assumed-role/'"
|
1457
|
+
" + assertion.arn.extract('assumed-role/{role_name}/')"
|
1458
|
+
" : assertion.arn",
|
1459
|
+
}
|
1460
|
+
```
|
1461
|
+
- If any custom attribute mappings are defined, they must include a mapping to the
|
1462
|
+
`google.subject` attribute.
|
1463
|
+
For OIDC providers, the following rules apply:
|
1464
|
+
- Custom attribute mappings must be defined, and must include a mapping to the
|
1465
|
+
`google.subject` attribute. For example, the following maps the `sub` claim of the
|
1466
|
+
incoming credential to the `subject` attribute on a Google token.
|
1467
|
+
```
|
1468
|
+
{"google.subject": "assertion.sub"}
|
1469
|
+
```
|
1330
1470
|
"""
|
1331
1471
|
return pulumi.get(self, "attribute_mapping")
|
1332
1472
|
|
@@ -249,7 +249,7 @@ class TunnelDestGroup(pulumi.CustomResource):
|
|
249
249
|
|
250
250
|
dest_group = gcp.iap.TunnelDestGroup("dest_group",
|
251
251
|
region="us-central1",
|
252
|
-
group_name="
|
252
|
+
group_name="testgroup_41819",
|
253
253
|
cidrs=[
|
254
254
|
"10.1.0.0/16",
|
255
255
|
"192.168.10.0/24",
|
@@ -337,7 +337,7 @@ class TunnelDestGroup(pulumi.CustomResource):
|
|
337
337
|
|
338
338
|
dest_group = gcp.iap.TunnelDestGroup("dest_group",
|
339
339
|
region="us-central1",
|
340
|
-
group_name="
|
340
|
+
group_name="testgroup_41819",
|
341
341
|
cidrs=[
|
342
342
|
"10.1.0.0/16",
|
343
343
|
"192.168.10.0/24",
|