@pulumi/gcp 7.36.0 → 7.37.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (88) hide show
  1. package/accesscontextmanager/index.d.ts +6 -0
  2. package/accesscontextmanager/index.js +11 -1
  3. package/accesscontextmanager/index.js.map +1 -1
  4. package/accesscontextmanager/servicePerimeterDryRunEgressPolicy.d.ts +112 -0
  5. package/accesscontextmanager/servicePerimeterDryRunEgressPolicy.js +76 -0
  6. package/accesscontextmanager/servicePerimeterDryRunEgressPolicy.js.map +1 -0
  7. package/accesscontextmanager/servicePerimeterDryRunIngressPolicy.d.ts +116 -0
  8. package/accesscontextmanager/servicePerimeterDryRunIngressPolicy.js +77 -0
  9. package/accesscontextmanager/servicePerimeterDryRunIngressPolicy.js.map +1 -0
  10. package/accesscontextmanager/servicePerimeterEgressPolicy.d.ts +1 -12
  11. package/accesscontextmanager/servicePerimeterEgressPolicy.js +1 -12
  12. package/accesscontextmanager/servicePerimeterEgressPolicy.js.map +1 -1
  13. package/accesscontextmanager/servicePerimeterIngressPolicy.d.ts +1 -12
  14. package/accesscontextmanager/servicePerimeterIngressPolicy.js +1 -12
  15. package/accesscontextmanager/servicePerimeterIngressPolicy.js.map +1 -1
  16. package/applicationintegration/client.d.ts +1 -1
  17. package/applicationintegration/client.js +1 -1
  18. package/compute/regionTargetHttpsProxy.d.ts +12 -0
  19. package/compute/regionTargetHttpsProxy.js.map +1 -1
  20. package/dataform/repository.d.ts +31 -0
  21. package/dataform/repository.js +18 -0
  22. package/dataform/repository.js.map +1 -1
  23. package/discoveryengine/dataStore.d.ts +31 -0
  24. package/discoveryengine/dataStore.js +3 -0
  25. package/discoveryengine/dataStore.js.map +1 -1
  26. package/logging/getLogViewIamPolicy.d.ts +34 -0
  27. package/logging/getLogViewIamPolicy.js +34 -0
  28. package/logging/getLogViewIamPolicy.js.map +1 -1
  29. package/logging/logViewIamBinding.d.ts +276 -0
  30. package/logging/logViewIamBinding.js +276 -0
  31. package/logging/logViewIamBinding.js.map +1 -1
  32. package/logging/logViewIamMember.d.ts +276 -0
  33. package/logging/logViewIamMember.js +276 -0
  34. package/logging/logViewIamMember.js.map +1 -1
  35. package/logging/logViewIamPolicy.d.ts +276 -0
  36. package/logging/logViewIamPolicy.js +276 -0
  37. package/logging/logViewIamPolicy.js.map +1 -1
  38. package/networkconnectivity/regionalEndpoint.d.ts +3 -3
  39. package/networkconnectivity/regionalEndpoint.js +3 -3
  40. package/organizations/getProject.d.ts +1 -0
  41. package/organizations/getProject.js.map +1 -1
  42. package/organizations/project.d.ts +21 -9
  43. package/organizations/project.js +2 -0
  44. package/organizations/project.js.map +1 -1
  45. package/package.json +2 -2
  46. package/securitycenter/getV2OrganizationSourceIamPolicy.d.ts +71 -0
  47. package/securitycenter/getV2OrganizationSourceIamPolicy.js +48 -0
  48. package/securitycenter/getV2OrganizationSourceIamPolicy.js.map +1 -0
  49. package/securitycenter/index.d.ts +24 -0
  50. package/securitycenter/index.js +39 -1
  51. package/securitycenter/index.js.map +1 -1
  52. package/securitycenter/v2folderMuteConfig.d.ts +230 -0
  53. package/securitycenter/v2folderMuteConfig.js +129 -0
  54. package/securitycenter/v2folderMuteConfig.js.map +1 -0
  55. package/securitycenter/v2organizationSource.d.ts +151 -0
  56. package/securitycenter/v2organizationSource.js +106 -0
  57. package/securitycenter/v2organizationSource.js.map +1 -0
  58. package/securitycenter/v2organizationSourceIamBinding.d.ts +283 -0
  59. package/securitycenter/v2organizationSourceIamBinding.js +230 -0
  60. package/securitycenter/v2organizationSourceIamBinding.js.map +1 -0
  61. package/securitycenter/v2organizationSourceIamMember.d.ts +283 -0
  62. package/securitycenter/v2organizationSourceIamMember.js +230 -0
  63. package/securitycenter/v2organizationSourceIamMember.js.map +1 -0
  64. package/securitycenter/v2organizationSourceIamPolicy.d.ts +233 -0
  65. package/securitycenter/v2organizationSourceIamPolicy.js +223 -0
  66. package/securitycenter/v2organizationSourceIamPolicy.js.map +1 -0
  67. package/securitycenter/v2projectMuteConfig.d.ts +232 -0
  68. package/securitycenter/v2projectMuteConfig.js +128 -0
  69. package/securitycenter/v2projectMuteConfig.js.map +1 -0
  70. package/securitycenter/v2projectNotificationConfig.d.ts +184 -0
  71. package/securitycenter/v2projectNotificationConfig.js +129 -0
  72. package/securitycenter/v2projectNotificationConfig.js.map +1 -0
  73. package/spanner/instance.d.ts +0 -3
  74. package/spanner/instance.js.map +1 -1
  75. package/storage/bucketObject.d.ts +8 -0
  76. package/storage/bucketObject.js +2 -0
  77. package/storage/bucketObject.js.map +1 -1
  78. package/storage/getBucketObject.d.ts +4 -0
  79. package/storage/getBucketObject.js.map +1 -1
  80. package/storage/getBucketObjectContent.d.ts +1 -0
  81. package/storage/getBucketObjectContent.js.map +1 -1
  82. package/storage/managedFolder.d.ts +22 -0
  83. package/storage/managedFolder.js +3 -0
  84. package/storage/managedFolder.js.map +1 -1
  85. package/types/input.d.ts +242 -3
  86. package/types/output.d.ts +256 -5
  87. package/vmwareengine/networkPolicy.d.ts +3 -3
  88. package/vmwareengine/networkPolicy.js +3 -3
@@ -1,5 +1,281 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
2
  /**
3
+ * Three different resources help you manage your IAM policy for Cloud (Stackdriver) Logging LogView. Each of these resources serves a different use case:
4
+ *
5
+ * * `gcp.logging.LogViewIamPolicy`: Authoritative. Sets the IAM policy for the logview and replaces any existing policy already attached.
6
+ * * `gcp.logging.LogViewIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the logview are preserved.
7
+ * * `gcp.logging.LogViewIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the logview are preserved.
8
+ *
9
+ * A data source can be used to retrieve policy data in advent you do not need creation
10
+ *
11
+ * * `gcp.logging.LogViewIamPolicy`: Retrieves the IAM policy for the logview
12
+ *
13
+ * > **Note:** `gcp.logging.LogViewIamPolicy` **cannot** be used in conjunction with `gcp.logging.LogViewIamBinding` and `gcp.logging.LogViewIamMember` or they will fight over what your policy should be.
14
+ *
15
+ * > **Note:** `gcp.logging.LogViewIamBinding` resources **can be** used in conjunction with `gcp.logging.LogViewIamMember` resources **only if** they do not grant privilege to the same role.
16
+ *
17
+ * > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
18
+ *
19
+ * ## gcp.logging.LogViewIamPolicy
20
+ *
21
+ * ```typescript
22
+ * import * as pulumi from "@pulumi/pulumi";
23
+ * import * as gcp from "@pulumi/gcp";
24
+ *
25
+ * const admin = gcp.organizations.getIAMPolicy({
26
+ * bindings: [{
27
+ * role: "roles/logging.admin",
28
+ * members: ["user:jane@example.com"],
29
+ * }],
30
+ * });
31
+ * const policy = new gcp.logging.LogViewIamPolicy("policy", {
32
+ * parent: loggingLogView.parent,
33
+ * location: loggingLogView.location,
34
+ * bucket: loggingLogView.bucket,
35
+ * name: loggingLogView.name,
36
+ * policyData: admin.then(admin => admin.policyData),
37
+ * });
38
+ * ```
39
+ *
40
+ * With IAM Conditions:
41
+ *
42
+ * ```typescript
43
+ * import * as pulumi from "@pulumi/pulumi";
44
+ * import * as gcp from "@pulumi/gcp";
45
+ *
46
+ * const admin = gcp.organizations.getIAMPolicy({
47
+ * bindings: [{
48
+ * role: "roles/logging.admin",
49
+ * members: ["user:jane@example.com"],
50
+ * condition: {
51
+ * title: "expires_after_2019_12_31",
52
+ * description: "Expiring at midnight of 2019-12-31",
53
+ * expression: "request.time < timestamp(\"2020-01-01T00:00:00Z\")",
54
+ * },
55
+ * }],
56
+ * });
57
+ * const policy = new gcp.logging.LogViewIamPolicy("policy", {
58
+ * parent: loggingLogView.parent,
59
+ * location: loggingLogView.location,
60
+ * bucket: loggingLogView.bucket,
61
+ * name: loggingLogView.name,
62
+ * policyData: admin.then(admin => admin.policyData),
63
+ * });
64
+ * ```
65
+ * ## gcp.logging.LogViewIamBinding
66
+ *
67
+ * ```typescript
68
+ * import * as pulumi from "@pulumi/pulumi";
69
+ * import * as gcp from "@pulumi/gcp";
70
+ *
71
+ * const binding = new gcp.logging.LogViewIamBinding("binding", {
72
+ * parent: loggingLogView.parent,
73
+ * location: loggingLogView.location,
74
+ * bucket: loggingLogView.bucket,
75
+ * name: loggingLogView.name,
76
+ * role: "roles/logging.admin",
77
+ * members: ["user:jane@example.com"],
78
+ * });
79
+ * ```
80
+ *
81
+ * With IAM Conditions:
82
+ *
83
+ * ```typescript
84
+ * import * as pulumi from "@pulumi/pulumi";
85
+ * import * as gcp from "@pulumi/gcp";
86
+ *
87
+ * const binding = new gcp.logging.LogViewIamBinding("binding", {
88
+ * parent: loggingLogView.parent,
89
+ * location: loggingLogView.location,
90
+ * bucket: loggingLogView.bucket,
91
+ * name: loggingLogView.name,
92
+ * role: "roles/logging.admin",
93
+ * members: ["user:jane@example.com"],
94
+ * condition: {
95
+ * title: "expires_after_2019_12_31",
96
+ * description: "Expiring at midnight of 2019-12-31",
97
+ * expression: "request.time < timestamp(\"2020-01-01T00:00:00Z\")",
98
+ * },
99
+ * });
100
+ * ```
101
+ * ## gcp.logging.LogViewIamMember
102
+ *
103
+ * ```typescript
104
+ * import * as pulumi from "@pulumi/pulumi";
105
+ * import * as gcp from "@pulumi/gcp";
106
+ *
107
+ * const member = new gcp.logging.LogViewIamMember("member", {
108
+ * parent: loggingLogView.parent,
109
+ * location: loggingLogView.location,
110
+ * bucket: loggingLogView.bucket,
111
+ * name: loggingLogView.name,
112
+ * role: "roles/logging.admin",
113
+ * member: "user:jane@example.com",
114
+ * });
115
+ * ```
116
+ *
117
+ * With IAM Conditions:
118
+ *
119
+ * ```typescript
120
+ * import * as pulumi from "@pulumi/pulumi";
121
+ * import * as gcp from "@pulumi/gcp";
122
+ *
123
+ * const member = new gcp.logging.LogViewIamMember("member", {
124
+ * parent: loggingLogView.parent,
125
+ * location: loggingLogView.location,
126
+ * bucket: loggingLogView.bucket,
127
+ * name: loggingLogView.name,
128
+ * role: "roles/logging.admin",
129
+ * member: "user:jane@example.com",
130
+ * condition: {
131
+ * title: "expires_after_2019_12_31",
132
+ * description: "Expiring at midnight of 2019-12-31",
133
+ * expression: "request.time < timestamp(\"2020-01-01T00:00:00Z\")",
134
+ * },
135
+ * });
136
+ * ```
137
+ *
138
+ * ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
139
+ *
140
+ * full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
141
+ * ---
142
+ *
143
+ * # IAM policy for Cloud (Stackdriver) Logging LogView
144
+ * Three different resources help you manage your IAM policy for Cloud (Stackdriver) Logging LogView. Each of these resources serves a different use case:
145
+ *
146
+ * * `gcp.logging.LogViewIamPolicy`: Authoritative. Sets the IAM policy for the logview and replaces any existing policy already attached.
147
+ * * `gcp.logging.LogViewIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the logview are preserved.
148
+ * * `gcp.logging.LogViewIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the logview are preserved.
149
+ *
150
+ * A data source can be used to retrieve policy data in advent you do not need creation
151
+ *
152
+ * * `gcp.logging.LogViewIamPolicy`: Retrieves the IAM policy for the logview
153
+ *
154
+ * > **Note:** `gcp.logging.LogViewIamPolicy` **cannot** be used in conjunction with `gcp.logging.LogViewIamBinding` and `gcp.logging.LogViewIamMember` or they will fight over what your policy should be.
155
+ *
156
+ * > **Note:** `gcp.logging.LogViewIamBinding` resources **can be** used in conjunction with `gcp.logging.LogViewIamMember` resources **only if** they do not grant privilege to the same role.
157
+ *
158
+ * > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
159
+ *
160
+ * ## gcp.logging.LogViewIamPolicy
161
+ *
162
+ * ```typescript
163
+ * import * as pulumi from "@pulumi/pulumi";
164
+ * import * as gcp from "@pulumi/gcp";
165
+ *
166
+ * const admin = gcp.organizations.getIAMPolicy({
167
+ * bindings: [{
168
+ * role: "roles/logging.admin",
169
+ * members: ["user:jane@example.com"],
170
+ * }],
171
+ * });
172
+ * const policy = new gcp.logging.LogViewIamPolicy("policy", {
173
+ * parent: loggingLogView.parent,
174
+ * location: loggingLogView.location,
175
+ * bucket: loggingLogView.bucket,
176
+ * name: loggingLogView.name,
177
+ * policyData: admin.then(admin => admin.policyData),
178
+ * });
179
+ * ```
180
+ *
181
+ * With IAM Conditions:
182
+ *
183
+ * ```typescript
184
+ * import * as pulumi from "@pulumi/pulumi";
185
+ * import * as gcp from "@pulumi/gcp";
186
+ *
187
+ * const admin = gcp.organizations.getIAMPolicy({
188
+ * bindings: [{
189
+ * role: "roles/logging.admin",
190
+ * members: ["user:jane@example.com"],
191
+ * condition: {
192
+ * title: "expires_after_2019_12_31",
193
+ * description: "Expiring at midnight of 2019-12-31",
194
+ * expression: "request.time < timestamp(\"2020-01-01T00:00:00Z\")",
195
+ * },
196
+ * }],
197
+ * });
198
+ * const policy = new gcp.logging.LogViewIamPolicy("policy", {
199
+ * parent: loggingLogView.parent,
200
+ * location: loggingLogView.location,
201
+ * bucket: loggingLogView.bucket,
202
+ * name: loggingLogView.name,
203
+ * policyData: admin.then(admin => admin.policyData),
204
+ * });
205
+ * ```
206
+ * ## gcp.logging.LogViewIamBinding
207
+ *
208
+ * ```typescript
209
+ * import * as pulumi from "@pulumi/pulumi";
210
+ * import * as gcp from "@pulumi/gcp";
211
+ *
212
+ * const binding = new gcp.logging.LogViewIamBinding("binding", {
213
+ * parent: loggingLogView.parent,
214
+ * location: loggingLogView.location,
215
+ * bucket: loggingLogView.bucket,
216
+ * name: loggingLogView.name,
217
+ * role: "roles/logging.admin",
218
+ * members: ["user:jane@example.com"],
219
+ * });
220
+ * ```
221
+ *
222
+ * With IAM Conditions:
223
+ *
224
+ * ```typescript
225
+ * import * as pulumi from "@pulumi/pulumi";
226
+ * import * as gcp from "@pulumi/gcp";
227
+ *
228
+ * const binding = new gcp.logging.LogViewIamBinding("binding", {
229
+ * parent: loggingLogView.parent,
230
+ * location: loggingLogView.location,
231
+ * bucket: loggingLogView.bucket,
232
+ * name: loggingLogView.name,
233
+ * role: "roles/logging.admin",
234
+ * members: ["user:jane@example.com"],
235
+ * condition: {
236
+ * title: "expires_after_2019_12_31",
237
+ * description: "Expiring at midnight of 2019-12-31",
238
+ * expression: "request.time < timestamp(\"2020-01-01T00:00:00Z\")",
239
+ * },
240
+ * });
241
+ * ```
242
+ * ## gcp.logging.LogViewIamMember
243
+ *
244
+ * ```typescript
245
+ * import * as pulumi from "@pulumi/pulumi";
246
+ * import * as gcp from "@pulumi/gcp";
247
+ *
248
+ * const member = new gcp.logging.LogViewIamMember("member", {
249
+ * parent: loggingLogView.parent,
250
+ * location: loggingLogView.location,
251
+ * bucket: loggingLogView.bucket,
252
+ * name: loggingLogView.name,
253
+ * role: "roles/logging.admin",
254
+ * member: "user:jane@example.com",
255
+ * });
256
+ * ```
257
+ *
258
+ * With IAM Conditions:
259
+ *
260
+ * ```typescript
261
+ * import * as pulumi from "@pulumi/pulumi";
262
+ * import * as gcp from "@pulumi/gcp";
263
+ *
264
+ * const member = new gcp.logging.LogViewIamMember("member", {
265
+ * parent: loggingLogView.parent,
266
+ * location: loggingLogView.location,
267
+ * bucket: loggingLogView.bucket,
268
+ * name: loggingLogView.name,
269
+ * role: "roles/logging.admin",
270
+ * member: "user:jane@example.com",
271
+ * condition: {
272
+ * title: "expires_after_2019_12_31",
273
+ * description: "Expiring at midnight of 2019-12-31",
274
+ * expression: "request.time < timestamp(\"2020-01-01T00:00:00Z\")",
275
+ * },
276
+ * });
277
+ * ```
278
+ *
3
279
  * ## Import
4
280
  *
5
281
  * For all import syntaxes, the "resource in question" can take any of the following forms:
@@ -6,6 +6,282 @@ exports.LogViewIamPolicy = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("../utilities");
8
8
  /**
9
+ * Three different resources help you manage your IAM policy for Cloud (Stackdriver) Logging LogView. Each of these resources serves a different use case:
10
+ *
11
+ * * `gcp.logging.LogViewIamPolicy`: Authoritative. Sets the IAM policy for the logview and replaces any existing policy already attached.
12
+ * * `gcp.logging.LogViewIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the logview are preserved.
13
+ * * `gcp.logging.LogViewIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the logview are preserved.
14
+ *
15
+ * A data source can be used to retrieve policy data in advent you do not need creation
16
+ *
17
+ * * `gcp.logging.LogViewIamPolicy`: Retrieves the IAM policy for the logview
18
+ *
19
+ * > **Note:** `gcp.logging.LogViewIamPolicy` **cannot** be used in conjunction with `gcp.logging.LogViewIamBinding` and `gcp.logging.LogViewIamMember` or they will fight over what your policy should be.
20
+ *
21
+ * > **Note:** `gcp.logging.LogViewIamBinding` resources **can be** used in conjunction with `gcp.logging.LogViewIamMember` resources **only if** they do not grant privilege to the same role.
22
+ *
23
+ * > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
24
+ *
25
+ * ## gcp.logging.LogViewIamPolicy
26
+ *
27
+ * ```typescript
28
+ * import * as pulumi from "@pulumi/pulumi";
29
+ * import * as gcp from "@pulumi/gcp";
30
+ *
31
+ * const admin = gcp.organizations.getIAMPolicy({
32
+ * bindings: [{
33
+ * role: "roles/logging.admin",
34
+ * members: ["user:jane@example.com"],
35
+ * }],
36
+ * });
37
+ * const policy = new gcp.logging.LogViewIamPolicy("policy", {
38
+ * parent: loggingLogView.parent,
39
+ * location: loggingLogView.location,
40
+ * bucket: loggingLogView.bucket,
41
+ * name: loggingLogView.name,
42
+ * policyData: admin.then(admin => admin.policyData),
43
+ * });
44
+ * ```
45
+ *
46
+ * With IAM Conditions:
47
+ *
48
+ * ```typescript
49
+ * import * as pulumi from "@pulumi/pulumi";
50
+ * import * as gcp from "@pulumi/gcp";
51
+ *
52
+ * const admin = gcp.organizations.getIAMPolicy({
53
+ * bindings: [{
54
+ * role: "roles/logging.admin",
55
+ * members: ["user:jane@example.com"],
56
+ * condition: {
57
+ * title: "expires_after_2019_12_31",
58
+ * description: "Expiring at midnight of 2019-12-31",
59
+ * expression: "request.time < timestamp(\"2020-01-01T00:00:00Z\")",
60
+ * },
61
+ * }],
62
+ * });
63
+ * const policy = new gcp.logging.LogViewIamPolicy("policy", {
64
+ * parent: loggingLogView.parent,
65
+ * location: loggingLogView.location,
66
+ * bucket: loggingLogView.bucket,
67
+ * name: loggingLogView.name,
68
+ * policyData: admin.then(admin => admin.policyData),
69
+ * });
70
+ * ```
71
+ * ## gcp.logging.LogViewIamBinding
72
+ *
73
+ * ```typescript
74
+ * import * as pulumi from "@pulumi/pulumi";
75
+ * import * as gcp from "@pulumi/gcp";
76
+ *
77
+ * const binding = new gcp.logging.LogViewIamBinding("binding", {
78
+ * parent: loggingLogView.parent,
79
+ * location: loggingLogView.location,
80
+ * bucket: loggingLogView.bucket,
81
+ * name: loggingLogView.name,
82
+ * role: "roles/logging.admin",
83
+ * members: ["user:jane@example.com"],
84
+ * });
85
+ * ```
86
+ *
87
+ * With IAM Conditions:
88
+ *
89
+ * ```typescript
90
+ * import * as pulumi from "@pulumi/pulumi";
91
+ * import * as gcp from "@pulumi/gcp";
92
+ *
93
+ * const binding = new gcp.logging.LogViewIamBinding("binding", {
94
+ * parent: loggingLogView.parent,
95
+ * location: loggingLogView.location,
96
+ * bucket: loggingLogView.bucket,
97
+ * name: loggingLogView.name,
98
+ * role: "roles/logging.admin",
99
+ * members: ["user:jane@example.com"],
100
+ * condition: {
101
+ * title: "expires_after_2019_12_31",
102
+ * description: "Expiring at midnight of 2019-12-31",
103
+ * expression: "request.time < timestamp(\"2020-01-01T00:00:00Z\")",
104
+ * },
105
+ * });
106
+ * ```
107
+ * ## gcp.logging.LogViewIamMember
108
+ *
109
+ * ```typescript
110
+ * import * as pulumi from "@pulumi/pulumi";
111
+ * import * as gcp from "@pulumi/gcp";
112
+ *
113
+ * const member = new gcp.logging.LogViewIamMember("member", {
114
+ * parent: loggingLogView.parent,
115
+ * location: loggingLogView.location,
116
+ * bucket: loggingLogView.bucket,
117
+ * name: loggingLogView.name,
118
+ * role: "roles/logging.admin",
119
+ * member: "user:jane@example.com",
120
+ * });
121
+ * ```
122
+ *
123
+ * With IAM Conditions:
124
+ *
125
+ * ```typescript
126
+ * import * as pulumi from "@pulumi/pulumi";
127
+ * import * as gcp from "@pulumi/gcp";
128
+ *
129
+ * const member = new gcp.logging.LogViewIamMember("member", {
130
+ * parent: loggingLogView.parent,
131
+ * location: loggingLogView.location,
132
+ * bucket: loggingLogView.bucket,
133
+ * name: loggingLogView.name,
134
+ * role: "roles/logging.admin",
135
+ * member: "user:jane@example.com",
136
+ * condition: {
137
+ * title: "expires_after_2019_12_31",
138
+ * description: "Expiring at midnight of 2019-12-31",
139
+ * expression: "request.time < timestamp(\"2020-01-01T00:00:00Z\")",
140
+ * },
141
+ * });
142
+ * ```
143
+ *
144
+ * ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
145
+ *
146
+ * full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
147
+ * ---
148
+ *
149
+ * # IAM policy for Cloud (Stackdriver) Logging LogView
150
+ * Three different resources help you manage your IAM policy for Cloud (Stackdriver) Logging LogView. Each of these resources serves a different use case:
151
+ *
152
+ * * `gcp.logging.LogViewIamPolicy`: Authoritative. Sets the IAM policy for the logview and replaces any existing policy already attached.
153
+ * * `gcp.logging.LogViewIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the logview are preserved.
154
+ * * `gcp.logging.LogViewIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the logview are preserved.
155
+ *
156
+ * A data source can be used to retrieve policy data in advent you do not need creation
157
+ *
158
+ * * `gcp.logging.LogViewIamPolicy`: Retrieves the IAM policy for the logview
159
+ *
160
+ * > **Note:** `gcp.logging.LogViewIamPolicy` **cannot** be used in conjunction with `gcp.logging.LogViewIamBinding` and `gcp.logging.LogViewIamMember` or they will fight over what your policy should be.
161
+ *
162
+ * > **Note:** `gcp.logging.LogViewIamBinding` resources **can be** used in conjunction with `gcp.logging.LogViewIamMember` resources **only if** they do not grant privilege to the same role.
163
+ *
164
+ * > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
165
+ *
166
+ * ## gcp.logging.LogViewIamPolicy
167
+ *
168
+ * ```typescript
169
+ * import * as pulumi from "@pulumi/pulumi";
170
+ * import * as gcp from "@pulumi/gcp";
171
+ *
172
+ * const admin = gcp.organizations.getIAMPolicy({
173
+ * bindings: [{
174
+ * role: "roles/logging.admin",
175
+ * members: ["user:jane@example.com"],
176
+ * }],
177
+ * });
178
+ * const policy = new gcp.logging.LogViewIamPolicy("policy", {
179
+ * parent: loggingLogView.parent,
180
+ * location: loggingLogView.location,
181
+ * bucket: loggingLogView.bucket,
182
+ * name: loggingLogView.name,
183
+ * policyData: admin.then(admin => admin.policyData),
184
+ * });
185
+ * ```
186
+ *
187
+ * With IAM Conditions:
188
+ *
189
+ * ```typescript
190
+ * import * as pulumi from "@pulumi/pulumi";
191
+ * import * as gcp from "@pulumi/gcp";
192
+ *
193
+ * const admin = gcp.organizations.getIAMPolicy({
194
+ * bindings: [{
195
+ * role: "roles/logging.admin",
196
+ * members: ["user:jane@example.com"],
197
+ * condition: {
198
+ * title: "expires_after_2019_12_31",
199
+ * description: "Expiring at midnight of 2019-12-31",
200
+ * expression: "request.time < timestamp(\"2020-01-01T00:00:00Z\")",
201
+ * },
202
+ * }],
203
+ * });
204
+ * const policy = new gcp.logging.LogViewIamPolicy("policy", {
205
+ * parent: loggingLogView.parent,
206
+ * location: loggingLogView.location,
207
+ * bucket: loggingLogView.bucket,
208
+ * name: loggingLogView.name,
209
+ * policyData: admin.then(admin => admin.policyData),
210
+ * });
211
+ * ```
212
+ * ## gcp.logging.LogViewIamBinding
213
+ *
214
+ * ```typescript
215
+ * import * as pulumi from "@pulumi/pulumi";
216
+ * import * as gcp from "@pulumi/gcp";
217
+ *
218
+ * const binding = new gcp.logging.LogViewIamBinding("binding", {
219
+ * parent: loggingLogView.parent,
220
+ * location: loggingLogView.location,
221
+ * bucket: loggingLogView.bucket,
222
+ * name: loggingLogView.name,
223
+ * role: "roles/logging.admin",
224
+ * members: ["user:jane@example.com"],
225
+ * });
226
+ * ```
227
+ *
228
+ * With IAM Conditions:
229
+ *
230
+ * ```typescript
231
+ * import * as pulumi from "@pulumi/pulumi";
232
+ * import * as gcp from "@pulumi/gcp";
233
+ *
234
+ * const binding = new gcp.logging.LogViewIamBinding("binding", {
235
+ * parent: loggingLogView.parent,
236
+ * location: loggingLogView.location,
237
+ * bucket: loggingLogView.bucket,
238
+ * name: loggingLogView.name,
239
+ * role: "roles/logging.admin",
240
+ * members: ["user:jane@example.com"],
241
+ * condition: {
242
+ * title: "expires_after_2019_12_31",
243
+ * description: "Expiring at midnight of 2019-12-31",
244
+ * expression: "request.time < timestamp(\"2020-01-01T00:00:00Z\")",
245
+ * },
246
+ * });
247
+ * ```
248
+ * ## gcp.logging.LogViewIamMember
249
+ *
250
+ * ```typescript
251
+ * import * as pulumi from "@pulumi/pulumi";
252
+ * import * as gcp from "@pulumi/gcp";
253
+ *
254
+ * const member = new gcp.logging.LogViewIamMember("member", {
255
+ * parent: loggingLogView.parent,
256
+ * location: loggingLogView.location,
257
+ * bucket: loggingLogView.bucket,
258
+ * name: loggingLogView.name,
259
+ * role: "roles/logging.admin",
260
+ * member: "user:jane@example.com",
261
+ * });
262
+ * ```
263
+ *
264
+ * With IAM Conditions:
265
+ *
266
+ * ```typescript
267
+ * import * as pulumi from "@pulumi/pulumi";
268
+ * import * as gcp from "@pulumi/gcp";
269
+ *
270
+ * const member = new gcp.logging.LogViewIamMember("member", {
271
+ * parent: loggingLogView.parent,
272
+ * location: loggingLogView.location,
273
+ * bucket: loggingLogView.bucket,
274
+ * name: loggingLogView.name,
275
+ * role: "roles/logging.admin",
276
+ * member: "user:jane@example.com",
277
+ * condition: {
278
+ * title: "expires_after_2019_12_31",
279
+ * description: "Expiring at midnight of 2019-12-31",
280
+ * expression: "request.time < timestamp(\"2020-01-01T00:00:00Z\")",
281
+ * },
282
+ * });
283
+ * ```
284
+ *
9
285
  * ## Import
10
286
  *
11
287
  * For all import syntaxes, the "resource in question" can take any of the following forms:
@@ -1 +1 @@
1
- {"version":3,"file":"logViewIamPolicy.js","sourceRoot":"","sources":["../../logging/logViewIamPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAkCG;AACH,MAAa,gBAAiB,SAAQ,MAAM,CAAC,cAAc;IACvD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA6B,EAAE,IAAmC;QAC3H,OAAO,IAAI,gBAAgB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACvE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,gBAAgB,CAAC,YAAY,CAAC;IACjE,CAAC;IAsCD,YAAY,IAAY,EAAE,WAA0D,EAAE,IAAmC;QACrH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAgD,CAAC;YAC/D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;SACvE;aAAM;YACH,MAAM,IAAI,GAAG,WAA+C,CAAC;YAC7D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,UAAU,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvD,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,MAAM,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC9C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,gBAAgB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACrE,CAAC;;AA/FL,4CAgGC;AAlFG,gBAAgB;AACO,6BAAY,GAAG,+CAA+C,CAAC"}
1
+ {"version":3,"file":"logViewIamPolicy.js","sourceRoot":"","sources":["../../logging/logViewIamPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAsTG;AACH,MAAa,gBAAiB,SAAQ,MAAM,CAAC,cAAc;IACvD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA6B,EAAE,IAAmC;QAC3H,OAAO,IAAI,gBAAgB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACvE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,gBAAgB,CAAC,YAAY,CAAC;IACjE,CAAC;IAsCD,YAAY,IAAY,EAAE,WAA0D,EAAE,IAAmC;QACrH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAgD,CAAC;YAC/D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;SACvE;aAAM;YACH,MAAM,IAAI,GAAG,WAA+C,CAAC;YAC7D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,UAAU,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvD,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,MAAM,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC9C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,gBAAgB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACrE,CAAC;;AA/FL,4CAgGC;AAlFG,gBAAgB;AACO,6BAAY,GAAG,+CAA+C,CAAC"}
@@ -29,12 +29,12 @@ import * as pulumi from "@pulumi/pulumi";
29
29
  * const _default = new gcp.networkconnectivity.RegionalEndpoint("default", {
30
30
  * name: "my-rep",
31
31
  * location: "us-central1",
32
- * targetGoogleApi: "boqcodelabjaimin-pa.us-central1.p.rep.googleapis.com",
32
+ * targetGoogleApi: "storage.us-central1.p.rep.googleapis.com",
33
33
  * accessType: "REGIONAL",
34
34
  * address: "192.168.0.5",
35
35
  * network: myNetwork.id,
36
36
  * subnetwork: mySubnetwork.id,
37
- * description: "My RegionalEndpoint targeting Google API boqcodelabjaimin-pa.us-central1.p.rep.googleapis.com",
37
+ * description: "My RegionalEndpoint targeting Google API storage.us-central1.p.rep.googleapis.com",
38
38
  * labels: {
39
39
  * env: "default",
40
40
  * },
@@ -59,7 +59,7 @@ import * as pulumi from "@pulumi/pulumi";
59
59
  * const _default = new gcp.networkconnectivity.RegionalEndpoint("default", {
60
60
  * name: "my-rep",
61
61
  * location: "us-central1",
62
- * targetGoogleApi: "boqcodelabjaimin-pa.us-central1.p.rep.googleapis.com",
62
+ * targetGoogleApi: "storage.us-central1.p.rep.googleapis.com",
63
63
  * accessType: "GLOBAL",
64
64
  * address: "192.168.0.4",
65
65
  * network: myNetwork.id,
@@ -35,12 +35,12 @@ const utilities = require("../utilities");
35
35
  * const _default = new gcp.networkconnectivity.RegionalEndpoint("default", {
36
36
  * name: "my-rep",
37
37
  * location: "us-central1",
38
- * targetGoogleApi: "boqcodelabjaimin-pa.us-central1.p.rep.googleapis.com",
38
+ * targetGoogleApi: "storage.us-central1.p.rep.googleapis.com",
39
39
  * accessType: "REGIONAL",
40
40
  * address: "192.168.0.5",
41
41
  * network: myNetwork.id,
42
42
  * subnetwork: mySubnetwork.id,
43
- * description: "My RegionalEndpoint targeting Google API boqcodelabjaimin-pa.us-central1.p.rep.googleapis.com",
43
+ * description: "My RegionalEndpoint targeting Google API storage.us-central1.p.rep.googleapis.com",
44
44
  * labels: {
45
45
  * env: "default",
46
46
  * },
@@ -65,7 +65,7 @@ const utilities = require("../utilities");
65
65
  * const _default = new gcp.networkconnectivity.RegionalEndpoint("default", {
66
66
  * name: "my-rep",
67
67
  * location: "us-central1",
68
- * targetGoogleApi: "boqcodelabjaimin-pa.us-central1.p.rep.googleapis.com",
68
+ * targetGoogleApi: "storage.us-central1.p.rep.googleapis.com",
69
69
  * accessType: "GLOBAL",
70
70
  * address: "192.168.0.4",
71
71
  * network: myNetwork.id,
@@ -30,6 +30,7 @@ export interface GetProjectArgs {
30
30
  export interface GetProjectResult {
31
31
  readonly autoCreateNetwork: boolean;
32
32
  readonly billingAccount: string;
33
+ readonly deletionPolicy: string;
33
34
  readonly effectiveLabels: {
34
35
  [key: string]: string;
35
36
  };
@@ -1 +1 @@
1
- {"version":3,"file":"getProject.js","sourceRoot":"","sources":["../../organizations/getProject.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;GAcG;AACH,SAAgB,UAAU,CAAC,IAAqB,EAAE,IAA2B;IACzE,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAElB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,yCAAyC,EAAE;QACpE,WAAW,EAAE,IAAI,CAAC,SAAS;KAC9B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAPD,gCAOC;AAmCD;;;;;;;;;;;;;;GAcG;AACH,SAAgB,gBAAgB,CAAC,IAA2B,EAAE,IAA2B;IACrF,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,UAAU,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACrE,CAAC;AAFD,4CAEC"}
1
+ {"version":3,"file":"getProject.js","sourceRoot":"","sources":["../../organizations/getProject.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;GAcG;AACH,SAAgB,UAAU,CAAC,IAAqB,EAAE,IAA2B;IACzE,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAElB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,yCAAyC,EAAE;QACpE,WAAW,EAAE,IAAI,CAAC,SAAS;KAC9B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAPD,gCAOC;AAoCD;;;;;;;;;;;;;;GAcG;AACH,SAAgB,gBAAgB,CAAC,IAA2B,EAAE,IAA2B;IACrF,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,UAAU,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACrE,CAAC;AAFD,4CAEC"}