pulumi-gcp 7.19.0a1712989149__py3-none-any.whl → 7.19.0a1713335069__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (295) hide show
  1. pulumi_gcp/accesscontextmanager/access_policy_iam_binding.py +136 -47
  2. pulumi_gcp/accesscontextmanager/access_policy_iam_member.py +136 -47
  3. pulumi_gcp/accesscontextmanager/access_policy_iam_policy.py +90 -84
  4. pulumi_gcp/apigateway/api_config_iam_binding.py +147 -52
  5. pulumi_gcp/apigateway/api_config_iam_member.py +147 -52
  6. pulumi_gcp/apigateway/api_config_iam_policy.py +96 -84
  7. pulumi_gcp/apigateway/api_iam_binding.py +147 -52
  8. pulumi_gcp/apigateway/api_iam_member.py +147 -52
  9. pulumi_gcp/apigateway/api_iam_policy.py +96 -84
  10. pulumi_gcp/apigateway/gateway_iam_binding.py +153 -52
  11. pulumi_gcp/apigateway/gateway_iam_member.py +153 -52
  12. pulumi_gcp/apigateway/gateway_iam_policy.py +102 -84
  13. pulumi_gcp/apigee/environment_iam_binding.py +139 -44
  14. pulumi_gcp/apigee/environment_iam_member.py +139 -44
  15. pulumi_gcp/apigee/environment_iam_policy.py +96 -84
  16. pulumi_gcp/artifactregistry/repository_iam_binding.py +156 -55
  17. pulumi_gcp/artifactregistry/repository_iam_member.py +156 -55
  18. pulumi_gcp/artifactregistry/repository_iam_policy.py +102 -84
  19. pulumi_gcp/bigquery/connection_iam_binding.py +158 -57
  20. pulumi_gcp/bigquery/connection_iam_member.py +158 -57
  21. pulumi_gcp/bigquery/connection_iam_policy.py +102 -84
  22. pulumi_gcp/bigquery/dataset_iam_binding.py +135 -40
  23. pulumi_gcp/bigquery/dataset_iam_member.py +135 -40
  24. pulumi_gcp/bigquery/dataset_iam_policy.py +96 -70
  25. pulumi_gcp/bigquery/iam_binding.py +283 -54
  26. pulumi_gcp/bigquery/iam_member.py +283 -54
  27. pulumi_gcp/bigquery/iam_policy.py +230 -84
  28. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_binding.py +155 -54
  29. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_member.py +155 -54
  30. pulumi_gcp/bigqueryanalyticshub/data_exchange_iam_policy.py +102 -84
  31. pulumi_gcp/bigqueryanalyticshub/listing_iam_binding.py +161 -54
  32. pulumi_gcp/bigqueryanalyticshub/listing_iam_member.py +161 -54
  33. pulumi_gcp/bigqueryanalyticshub/listing_iam_policy.py +108 -84
  34. pulumi_gcp/bigquerydatapolicy/data_policy_iam_binding.py +155 -54
  35. pulumi_gcp/bigquerydatapolicy/data_policy_iam_member.py +155 -54
  36. pulumi_gcp/bigquerydatapolicy/data_policy_iam_policy.py +102 -84
  37. pulumi_gcp/bigtable/instance_iam_binding.py +123 -32
  38. pulumi_gcp/bigtable/instance_iam_member.py +123 -32
  39. pulumi_gcp/bigtable/instance_iam_policy.py +92 -63
  40. pulumi_gcp/bigtable/table_iam_binding.py +160 -63
  41. pulumi_gcp/bigtable/table_iam_member.py +160 -63
  42. pulumi_gcp/bigtable/table_iam_policy.py +98 -63
  43. pulumi_gcp/billing/account_iam_binding.py +120 -31
  44. pulumi_gcp/billing/account_iam_member.py +120 -31
  45. pulumi_gcp/billing/account_iam_policy.py +90 -49
  46. pulumi_gcp/binaryauthorization/attestor_iam_binding.py +147 -52
  47. pulumi_gcp/binaryauthorization/attestor_iam_member.py +147 -52
  48. pulumi_gcp/binaryauthorization/attestor_iam_policy.py +96 -84
  49. pulumi_gcp/certificateauthority/ca_pool_iam_binding.py +262 -57
  50. pulumi_gcp/certificateauthority/ca_pool_iam_member.py +262 -57
  51. pulumi_gcp/certificateauthority/ca_pool_iam_policy.py +206 -84
  52. pulumi_gcp/certificateauthority/certificate_template_iam_binding.py +259 -54
  53. pulumi_gcp/certificateauthority/certificate_template_iam_member.py +259 -54
  54. pulumi_gcp/certificateauthority/certificate_template_iam_policy.py +206 -84
  55. pulumi_gcp/cloudbuildv2/connection_iam_binding.py +161 -60
  56. pulumi_gcp/cloudbuildv2/connection_iam_member.py +161 -60
  57. pulumi_gcp/cloudbuildv2/connection_iam_policy.py +102 -84
  58. pulumi_gcp/cloudfunctions/function_iam_binding.py +153 -52
  59. pulumi_gcp/cloudfunctions/function_iam_member.py +153 -52
  60. pulumi_gcp/cloudfunctions/function_iam_policy.py +102 -84
  61. pulumi_gcp/cloudfunctionsv2/function_iam_binding.py +154 -53
  62. pulumi_gcp/cloudfunctionsv2/function_iam_member.py +154 -53
  63. pulumi_gcp/cloudfunctionsv2/function_iam_policy.py +102 -84
  64. pulumi_gcp/cloudrun/iam_binding.py +155 -54
  65. pulumi_gcp/cloudrun/iam_member.py +155 -54
  66. pulumi_gcp/cloudrun/iam_policy.py +102 -84
  67. pulumi_gcp/cloudrunv2/job_iam_binding.py +161 -60
  68. pulumi_gcp/cloudrunv2/job_iam_member.py +161 -60
  69. pulumi_gcp/cloudrunv2/job_iam_policy.py +102 -84
  70. pulumi_gcp/cloudrunv2/service_iam_binding.py +161 -60
  71. pulumi_gcp/cloudrunv2/service_iam_member.py +161 -60
  72. pulumi_gcp/cloudrunv2/service_iam_policy.py +102 -84
  73. pulumi_gcp/cloudtasks/queue_iam_binding.py +161 -60
  74. pulumi_gcp/cloudtasks/queue_iam_member.py +161 -60
  75. pulumi_gcp/cloudtasks/queue_iam_policy.py +102 -84
  76. pulumi_gcp/compute/backend_bucket_iam_binding.py +58 -59
  77. pulumi_gcp/compute/backend_bucket_iam_member.py +58 -59
  78. pulumi_gcp/compute/backend_bucket_iam_policy.py +0 -84
  79. pulumi_gcp/compute/backend_service_iam_binding.py +60 -61
  80. pulumi_gcp/compute/backend_service_iam_member.py +60 -61
  81. pulumi_gcp/compute/backend_service_iam_policy.py +0 -84
  82. pulumi_gcp/compute/disk_iam_binding.py +160 -59
  83. pulumi_gcp/compute/disk_iam_member.py +160 -59
  84. pulumi_gcp/compute/disk_iam_policy.py +102 -84
  85. pulumi_gcp/compute/image_iam_binding.py +271 -54
  86. pulumi_gcp/compute/image_iam_member.py +271 -54
  87. pulumi_gcp/compute/image_iam_policy.py +218 -84
  88. pulumi_gcp/compute/instance_iam_binding.py +283 -54
  89. pulumi_gcp/compute/instance_iam_member.py +283 -54
  90. pulumi_gcp/compute/instance_iam_policy.py +230 -84
  91. pulumi_gcp/compute/machine_image_iam_binding.py +271 -54
  92. pulumi_gcp/compute/machine_image_iam_member.py +271 -54
  93. pulumi_gcp/compute/machine_image_iam_policy.py +218 -84
  94. pulumi_gcp/compute/region_backend_service_iam_binding.py +60 -61
  95. pulumi_gcp/compute/region_backend_service_iam_member.py +60 -61
  96. pulumi_gcp/compute/region_backend_service_iam_policy.py +0 -84
  97. pulumi_gcp/compute/region_disk_iam_binding.py +160 -59
  98. pulumi_gcp/compute/region_disk_iam_member.py +160 -59
  99. pulumi_gcp/compute/region_disk_iam_policy.py +102 -84
  100. pulumi_gcp/compute/snapshot_iam_binding.py +154 -59
  101. pulumi_gcp/compute/snapshot_iam_member.py +154 -59
  102. pulumi_gcp/compute/snapshot_iam_policy.py +96 -84
  103. pulumi_gcp/compute/subnetwork_iam_binding.py +284 -55
  104. pulumi_gcp/compute/subnetwork_iam_member.py +284 -55
  105. pulumi_gcp/compute/subnetwork_iam_policy.py +230 -84
  106. pulumi_gcp/containeranalysis/note_iam_binding.py +154 -59
  107. pulumi_gcp/containeranalysis/note_iam_member.py +154 -59
  108. pulumi_gcp/containeranalysis/note_iam_policy.py +96 -84
  109. pulumi_gcp/datacatalog/entry_group_iam_binding.py +141 -52
  110. pulumi_gcp/datacatalog/entry_group_iam_member.py +141 -52
  111. pulumi_gcp/datacatalog/entry_group_iam_policy.py +90 -84
  112. pulumi_gcp/datacatalog/policy_tag_iam_binding.py +133 -44
  113. pulumi_gcp/datacatalog/policy_tag_iam_member.py +133 -44
  114. pulumi_gcp/datacatalog/policy_tag_iam_policy.py +90 -84
  115. pulumi_gcp/datacatalog/tag_template_iam_binding.py +142 -53
  116. pulumi_gcp/datacatalog/tag_template_iam_member.py +142 -53
  117. pulumi_gcp/datacatalog/tag_template_iam_policy.py +90 -84
  118. pulumi_gcp/datacatalog/taxonomy_iam_binding.py +142 -53
  119. pulumi_gcp/datacatalog/taxonomy_iam_member.py +142 -53
  120. pulumi_gcp/datacatalog/taxonomy_iam_policy.py +90 -84
  121. pulumi_gcp/dataplex/asset_iam_binding.py +165 -52
  122. pulumi_gcp/dataplex/asset_iam_member.py +165 -52
  123. pulumi_gcp/dataplex/asset_iam_policy.py +114 -84
  124. pulumi_gcp/dataplex/datascan_iam_binding.py +155 -54
  125. pulumi_gcp/dataplex/datascan_iam_member.py +155 -54
  126. pulumi_gcp/dataplex/datascan_iam_policy.py +102 -84
  127. pulumi_gcp/dataplex/lake_iam_binding.py +153 -52
  128. pulumi_gcp/dataplex/lake_iam_member.py +153 -52
  129. pulumi_gcp/dataplex/lake_iam_policy.py +102 -84
  130. pulumi_gcp/dataplex/task_iam_binding.py +161 -54
  131. pulumi_gcp/dataplex/task_iam_member.py +161 -54
  132. pulumi_gcp/dataplex/task_iam_policy.py +108 -84
  133. pulumi_gcp/dataplex/zone_iam_binding.py +159 -52
  134. pulumi_gcp/dataplex/zone_iam_member.py +159 -52
  135. pulumi_gcp/dataplex/zone_iam_policy.py +108 -84
  136. pulumi_gcp/dataproc/autoscaling_policy_iam_binding.py +173 -72
  137. pulumi_gcp/dataproc/autoscaling_policy_iam_member.py +173 -72
  138. pulumi_gcp/dataproc/autoscaling_policy_iam_policy.py +102 -84
  139. pulumi_gcp/dataproc/cluster_iam_binding.py +130 -37
  140. pulumi_gcp/dataproc/cluster_iam_member.py +130 -37
  141. pulumi_gcp/dataproc/cluster_iam_policy.py +94 -63
  142. pulumi_gcp/dataproc/job_iam_binding.py +156 -0
  143. pulumi_gcp/dataproc/job_iam_member.py +156 -0
  144. pulumi_gcp/dataproc/job_iam_policy.py +94 -0
  145. pulumi_gcp/dataproc/metastore_federation_iam_binding.py +53 -54
  146. pulumi_gcp/dataproc/metastore_federation_iam_member.py +53 -54
  147. pulumi_gcp/dataproc/metastore_federation_iam_policy.py +0 -84
  148. pulumi_gcp/dataproc/metastore_service_iam_binding.py +156 -55
  149. pulumi_gcp/dataproc/metastore_service_iam_member.py +156 -55
  150. pulumi_gcp/dataproc/metastore_service_iam_policy.py +102 -84
  151. pulumi_gcp/dns/dns_managed_zone_iam_binding.py +147 -52
  152. pulumi_gcp/dns/dns_managed_zone_iam_member.py +147 -52
  153. pulumi_gcp/dns/dns_managed_zone_iam_policy.py +96 -84
  154. pulumi_gcp/endpoints/consumers_iam_binding.py +83 -0
  155. pulumi_gcp/endpoints/consumers_iam_member.py +83 -0
  156. pulumi_gcp/endpoints/service_iam_binding.py +173 -0
  157. pulumi_gcp/endpoints/service_iam_member.py +173 -0
  158. pulumi_gcp/endpoints/service_iam_policy.py +90 -0
  159. pulumi_gcp/folder/iam_audit_config.py +270 -0
  160. pulumi_gcp/folder/iam_member.py +318 -0
  161. pulumi_gcp/folder/iam_policy.py +270 -0
  162. pulumi_gcp/gkebackup/backup_plan_iam_binding.py +162 -61
  163. pulumi_gcp/gkebackup/backup_plan_iam_member.py +162 -61
  164. pulumi_gcp/gkebackup/backup_plan_iam_policy.py +102 -84
  165. pulumi_gcp/gkehub/feature_iam_binding.py +161 -60
  166. pulumi_gcp/gkehub/feature_iam_member.py +161 -60
  167. pulumi_gcp/gkehub/feature_iam_policy.py +102 -84
  168. pulumi_gcp/gkehub/membership_iam_binding.py +159 -58
  169. pulumi_gcp/gkehub/membership_iam_member.py +159 -58
  170. pulumi_gcp/gkehub/membership_iam_policy.py +102 -84
  171. pulumi_gcp/gkehub/scope_iam_binding.py +147 -52
  172. pulumi_gcp/gkehub/scope_iam_member.py +147 -52
  173. pulumi_gcp/gkehub/scope_iam_policy.py +96 -84
  174. pulumi_gcp/healthcare/consent_store_iam_binding.py +139 -44
  175. pulumi_gcp/healthcare/consent_store_iam_member.py +139 -44
  176. pulumi_gcp/healthcare/consent_store_iam_policy.py +96 -84
  177. pulumi_gcp/healthcare/dataset_iam_binding.py +126 -37
  178. pulumi_gcp/healthcare/dataset_iam_member.py +126 -37
  179. pulumi_gcp/healthcare/dataset_iam_policy.py +90 -63
  180. pulumi_gcp/healthcare/dicom_store_iam_binding.py +126 -37
  181. pulumi_gcp/healthcare/dicom_store_iam_member.py +126 -37
  182. pulumi_gcp/healthcare/dicom_store_iam_policy.py +90 -63
  183. pulumi_gcp/healthcare/fhir_store_iam_binding.py +121 -32
  184. pulumi_gcp/healthcare/fhir_store_iam_member.py +121 -32
  185. pulumi_gcp/healthcare/fhir_store_iam_policy.py +90 -63
  186. pulumi_gcp/healthcare/hl7_store_iam_binding.py +121 -32
  187. pulumi_gcp/healthcare/hl7_store_iam_member.py +121 -32
  188. pulumi_gcp/healthcare/hl7_store_iam_policy.py +90 -63
  189. pulumi_gcp/iap/app_engine_service_iam_binding.py +284 -55
  190. pulumi_gcp/iap/app_engine_service_iam_member.py +284 -55
  191. pulumi_gcp/iap/app_engine_service_iam_policy.py +230 -84
  192. pulumi_gcp/iap/app_engine_version_iam_binding.py +297 -56
  193. pulumi_gcp/iap/app_engine_version_iam_member.py +297 -56
  194. pulumi_gcp/iap/app_engine_version_iam_policy.py +242 -84
  195. pulumi_gcp/iap/tunnel_dest_group_iam_binding.py +283 -54
  196. pulumi_gcp/iap/tunnel_dest_group_iam_member.py +283 -54
  197. pulumi_gcp/iap/tunnel_dest_group_iam_policy.py +230 -84
  198. pulumi_gcp/iap/tunnel_iam_binding.py +259 -54
  199. pulumi_gcp/iap/tunnel_iam_member.py +259 -54
  200. pulumi_gcp/iap/tunnel_iam_policy.py +206 -84
  201. pulumi_gcp/iap/tunnel_instance_iam_binding.py +283 -54
  202. pulumi_gcp/iap/tunnel_instance_iam_member.py +283 -54
  203. pulumi_gcp/iap/tunnel_instance_iam_policy.py +230 -84
  204. pulumi_gcp/iap/web_backend_service_iam_binding.py +272 -55
  205. pulumi_gcp/iap/web_backend_service_iam_member.py +272 -55
  206. pulumi_gcp/iap/web_backend_service_iam_policy.py +218 -84
  207. pulumi_gcp/iap/web_iam_binding.py +259 -54
  208. pulumi_gcp/iap/web_iam_member.py +259 -54
  209. pulumi_gcp/iap/web_iam_policy.py +206 -84
  210. pulumi_gcp/iap/web_region_backend_service_iam_binding.py +284 -55
  211. pulumi_gcp/iap/web_region_backend_service_iam_member.py +284 -55
  212. pulumi_gcp/iap/web_region_backend_service_iam_policy.py +230 -84
  213. pulumi_gcp/iap/web_type_app_enging_iam_binding.py +271 -54
  214. pulumi_gcp/iap/web_type_app_enging_iam_member.py +271 -54
  215. pulumi_gcp/iap/web_type_app_enging_iam_policy.py +218 -84
  216. pulumi_gcp/iap/web_type_compute_iam_binding.py +259 -54
  217. pulumi_gcp/iap/web_type_compute_iam_member.py +259 -54
  218. pulumi_gcp/iap/web_type_compute_iam_policy.py +206 -84
  219. pulumi_gcp/kms/crypto_key_iam_binding.py +36 -37
  220. pulumi_gcp/kms/crypto_key_iam_member.py +36 -37
  221. pulumi_gcp/kms/crypto_key_iam_policy.py +0 -63
  222. pulumi_gcp/kms/key_ring_iam_binding.py +253 -32
  223. pulumi_gcp/kms/key_ring_iam_member.py +253 -32
  224. pulumi_gcp/kms/key_ring_iam_policy.py +222 -63
  225. pulumi_gcp/networksecurity/address_group_iam_policy.py +0 -84
  226. pulumi_gcp/notebooks/instance_iam_binding.py +154 -53
  227. pulumi_gcp/notebooks/instance_iam_member.py +154 -53
  228. pulumi_gcp/notebooks/instance_iam_policy.py +102 -84
  229. pulumi_gcp/notebooks/runtime_iam_binding.py +155 -54
  230. pulumi_gcp/notebooks/runtime_iam_member.py +155 -54
  231. pulumi_gcp/notebooks/runtime_iam_policy.py +102 -84
  232. pulumi_gcp/organizations/iam_member.py +330 -0
  233. pulumi_gcp/organizations/iam_policy.py +282 -0
  234. pulumi_gcp/projects/iam_audit_config.py +270 -0
  235. pulumi_gcp/projects/iam_binding.py +318 -0
  236. pulumi_gcp/projects/iam_member.py +318 -0
  237. pulumi_gcp/projects/iam_policy.py +270 -0
  238. pulumi_gcp/pubsub/schema_iam_binding.py +148 -53
  239. pulumi_gcp/pubsub/schema_iam_member.py +148 -53
  240. pulumi_gcp/pubsub/schema_iam_policy.py +96 -84
  241. pulumi_gcp/pubsub/subscription_iam_binding.py +146 -57
  242. pulumi_gcp/pubsub/subscription_iam_member.py +146 -57
  243. pulumi_gcp/pubsub/subscription_iam_policy.py +90 -63
  244. pulumi_gcp/pubsub/topic_iam_binding.py +148 -53
  245. pulumi_gcp/pubsub/topic_iam_member.py +148 -53
  246. pulumi_gcp/pubsub/topic_iam_policy.py +96 -84
  247. pulumi_gcp/runtimeconfig/config_iam_binding.py +51 -52
  248. pulumi_gcp/runtimeconfig/config_iam_member.py +51 -52
  249. pulumi_gcp/runtimeconfig/config_iam_policy.py +0 -84
  250. pulumi_gcp/secretmanager/secret_iam_binding.py +147 -52
  251. pulumi_gcp/secretmanager/secret_iam_member.py +147 -52
  252. pulumi_gcp/secretmanager/secret_iam_policy.py +96 -84
  253. pulumi_gcp/serviceaccount/iam_binding.py +262 -51
  254. pulumi_gcp/serviceaccount/iam_member.py +262 -51
  255. pulumi_gcp/serviceaccount/iam_policy.py +212 -63
  256. pulumi_gcp/servicedirectory/namespace_iam_binding.py +136 -47
  257. pulumi_gcp/servicedirectory/namespace_iam_member.py +136 -47
  258. pulumi_gcp/servicedirectory/namespace_iam_policy.py +90 -84
  259. pulumi_gcp/servicedirectory/service_iam_binding.py +136 -47
  260. pulumi_gcp/servicedirectory/service_iam_member.py +136 -47
  261. pulumi_gcp/servicedirectory/service_iam_policy.py +90 -84
  262. pulumi_gcp/sourcerepo/repository_iam_binding.py +147 -52
  263. pulumi_gcp/sourcerepo/repository_iam_member.py +147 -52
  264. pulumi_gcp/sourcerepo/repository_iam_policy.py +96 -84
  265. pulumi_gcp/spanner/database_iam_binding.py +253 -32
  266. pulumi_gcp/spanner/database_iam_member.py +253 -32
  267. pulumi_gcp/spanner/database_iam_policy.py +222 -63
  268. pulumi_gcp/spanner/instance_iam_binding.py +121 -32
  269. pulumi_gcp/spanner/instance_iam_member.py +121 -32
  270. pulumi_gcp/spanner/instance_iam_policy.py +90 -63
  271. pulumi_gcp/storage/bucket_iam_binding.py +255 -50
  272. pulumi_gcp/storage/bucket_iam_member.py +255 -50
  273. pulumi_gcp/storage/bucket_iam_policy.py +206 -84
  274. pulumi_gcp/tags/tag_key_iam_binding.py +149 -60
  275. pulumi_gcp/tags/tag_key_iam_member.py +149 -60
  276. pulumi_gcp/tags/tag_key_iam_policy.py +90 -84
  277. pulumi_gcp/tags/tag_value_iam_binding.py +149 -60
  278. pulumi_gcp/tags/tag_value_iam_member.py +149 -60
  279. pulumi_gcp/tags/tag_value_iam_policy.py +90 -84
  280. pulumi_gcp/vertex/ai_feature_store_entity_type_iam_binding.py +33 -34
  281. pulumi_gcp/vertex/ai_feature_store_entity_type_iam_member.py +33 -34
  282. pulumi_gcp/vertex/ai_feature_store_entity_type_iam_policy.py +0 -84
  283. pulumi_gcp/vertex/ai_feature_store_iam_binding.py +51 -52
  284. pulumi_gcp/vertex/ai_feature_store_iam_member.py +51 -52
  285. pulumi_gcp/vertex/ai_feature_store_iam_policy.py +0 -84
  286. pulumi_gcp/workstations/workstation_config_iam_binding.py +53 -54
  287. pulumi_gcp/workstations/workstation_config_iam_member.py +53 -54
  288. pulumi_gcp/workstations/workstation_config_iam_policy.py +0 -84
  289. pulumi_gcp/workstations/workstation_iam_binding.py +53 -54
  290. pulumi_gcp/workstations/workstation_iam_member.py +53 -54
  291. pulumi_gcp/workstations/workstation_iam_policy.py +0 -84
  292. {pulumi_gcp-7.19.0a1712989149.dist-info → pulumi_gcp-7.19.0a1713335069.dist-info}/METADATA +1 -1
  293. {pulumi_gcp-7.19.0a1712989149.dist-info → pulumi_gcp-7.19.0a1713335069.dist-info}/RECORD +295 -295
  294. {pulumi_gcp-7.19.0a1712989149.dist-info → pulumi_gcp-7.19.0a1713335069.dist-info}/WHEEL +0 -0
  295. {pulumi_gcp-7.19.0a1712989149.dist-info → pulumi_gcp-7.19.0a1713335069.dist-info}/top_level.txt +0 -0
@@ -22,6 +22,12 @@ class IAMMemberArgs:
22
22
  condition: Optional[pulumi.Input['IAMMemberConditionArgs']] = None):
23
23
  """
24
24
  The set of arguments for constructing a IAMMember resource.
25
+ :param pulumi.Input[str] member: Identities that will be granted the privilege in `role`.
26
+ Each entry can have one of the following values:
27
+ * **user:{emailid}**: An email address that represents a specific Google account. For example, alice@gmail.com or joe@example.com.
28
+ * **serviceAccount:{emailid}**: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com.
29
+ * **group:{emailid}**: An email address that represents a Google group. For example, admins@example.com.
30
+ * **domain:{domain}**: A G Suite domain (primary, instead of alias) name that represents all the users of that domain. For example, google.com or example.com.
25
31
  :param pulumi.Input[str] org_id: The organization id of the target organization.
26
32
  :param pulumi.Input[str] role: The role that should be applied. Only one
27
33
  `organizations.IAMBinding` can be used per role. Note that custom roles must be of the format
@@ -38,6 +44,14 @@ class IAMMemberArgs:
38
44
  @property
39
45
  @pulumi.getter
40
46
  def member(self) -> pulumi.Input[str]:
47
+ """
48
+ Identities that will be granted the privilege in `role`.
49
+ Each entry can have one of the following values:
50
+ * **user:{emailid}**: An email address that represents a specific Google account. For example, alice@gmail.com or joe@example.com.
51
+ * **serviceAccount:{emailid}**: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com.
52
+ * **group:{emailid}**: An email address that represents a Google group. For example, admins@example.com.
53
+ * **domain:{domain}**: A G Suite domain (primary, instead of alias) name that represents all the users of that domain. For example, google.com or example.com.
54
+ """
41
55
  return pulumi.get(self, "member")
42
56
 
43
57
  @member.setter
@@ -97,6 +111,12 @@ class _IAMMemberState:
97
111
  :param pulumi.Input['IAMMemberConditionArgs'] condition: An [IAM Condition](https://cloud.google.com/iam/docs/conditions-overview) for a given binding.
98
112
  Structure is documented below.
99
113
  :param pulumi.Input[str] etag: (Computed) The etag of the organization's IAM policy.
114
+ :param pulumi.Input[str] member: Identities that will be granted the privilege in `role`.
115
+ Each entry can have one of the following values:
116
+ * **user:{emailid}**: An email address that represents a specific Google account. For example, alice@gmail.com or joe@example.com.
117
+ * **serviceAccount:{emailid}**: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com.
118
+ * **group:{emailid}**: An email address that represents a Google group. For example, admins@example.com.
119
+ * **domain:{domain}**: A G Suite domain (primary, instead of alias) name that represents all the users of that domain. For example, google.com or example.com.
100
120
  :param pulumi.Input[str] org_id: The organization id of the target organization.
101
121
  :param pulumi.Input[str] role: The role that should be applied. Only one
102
122
  `organizations.IAMBinding` can be used per role. Note that custom roles must be of the format
@@ -141,6 +161,14 @@ class _IAMMemberState:
141
161
  @property
142
162
  @pulumi.getter
143
163
  def member(self) -> Optional[pulumi.Input[str]]:
164
+ """
165
+ Identities that will be granted the privilege in `role`.
166
+ Each entry can have one of the following values:
167
+ * **user:{emailid}**: An email address that represents a specific Google account. For example, alice@gmail.com or joe@example.com.
168
+ * **serviceAccount:{emailid}**: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com.
169
+ * **group:{emailid}**: An email address that represents a Google group. For example, admins@example.com.
170
+ * **domain:{domain}**: A G Suite domain (primary, instead of alias) name that represents all the users of that domain. For example, google.com or example.com.
171
+ """
144
172
  return pulumi.get(self, "member")
145
173
 
146
174
  @member.setter
@@ -337,6 +365,147 @@ class IAMMember(pulumi.CustomResource):
337
365
  ```
338
366
  <!--End PulumiCodeChooser -->
339
367
 
368
+ ## google\\_organization\\_iam\\_policy
369
+
370
+ !> **Warning:** New organizations have several default policies which will,
371
+ without extreme caution, be **overwritten** by use of this resource.
372
+ The safest alternative is to use multiple `organizations.IAMBinding`
373
+ resources. This resource makes it easy to remove your own access to
374
+ an organization, which will require a call to Google Support to have
375
+ fixed, and can take multiple days to resolve.
376
+
377
+ In general, this resource should only be used with organizations
378
+ fully managed by this provider.I f you do use this resource,
379
+ the best way to be sure that you are not making dangerous changes is to start
380
+ by **importing** your existing policy, and examining the diff very closely.
381
+
382
+ <!--Start PulumiCodeChooser -->
383
+ ```python
384
+ import pulumi
385
+ import pulumi_gcp as gcp
386
+
387
+ admin = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
388
+ role="roles/editor",
389
+ members=["user:jane@example.com"],
390
+ )])
391
+ organization = gcp.organizations.IAMPolicy("organization",
392
+ org_id="1234567890",
393
+ policy_data=admin.policy_data)
394
+ ```
395
+ <!--End PulumiCodeChooser -->
396
+
397
+ With IAM Conditions:
398
+
399
+ <!--Start PulumiCodeChooser -->
400
+ ```python
401
+ import pulumi
402
+ import pulumi_gcp as gcp
403
+
404
+ admin = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
405
+ role="roles/editor",
406
+ members=["user:jane@example.com"],
407
+ condition=gcp.organizations.GetIAMPolicyBindingConditionArgs(
408
+ title="expires_after_2019_12_31",
409
+ description="Expiring at midnight of 2019-12-31",
410
+ expression="request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
411
+ ),
412
+ )])
413
+ organization = gcp.organizations.IAMPolicy("organization",
414
+ org_id="1234567890",
415
+ policy_data=admin.policy_data)
416
+ ```
417
+ <!--End PulumiCodeChooser -->
418
+
419
+ ## google\\_organization\\_iam\\_binding
420
+
421
+ > **Note:** If `role` is set to `roles/owner` and you don't specify a user or service account you have access to in `members`, you can lock yourself out of your organization.
422
+
423
+ <!--Start PulumiCodeChooser -->
424
+ ```python
425
+ import pulumi
426
+ import pulumi_gcp as gcp
427
+
428
+ organization = gcp.organizations.IAMBinding("organization",
429
+ org_id="1234567890",
430
+ role="roles/editor",
431
+ members=["user:jane@example.com"])
432
+ ```
433
+ <!--End PulumiCodeChooser -->
434
+
435
+ With IAM Conditions:
436
+
437
+ <!--Start PulumiCodeChooser -->
438
+ ```python
439
+ import pulumi
440
+ import pulumi_gcp as gcp
441
+
442
+ organization = gcp.organizations.IAMBinding("organization",
443
+ org_id="1234567890",
444
+ role="roles/editor",
445
+ members=["user:jane@example.com"],
446
+ condition=gcp.organizations.IAMBindingConditionArgs(
447
+ title="expires_after_2019_12_31",
448
+ description="Expiring at midnight of 2019-12-31",
449
+ expression="request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
450
+ ))
451
+ ```
452
+ <!--End PulumiCodeChooser -->
453
+
454
+ ## google\\_organization\\_iam\\_member
455
+
456
+ <!--Start PulumiCodeChooser -->
457
+ ```python
458
+ import pulumi
459
+ import pulumi_gcp as gcp
460
+
461
+ organization = gcp.organizations.IAMMember("organization",
462
+ org_id="1234567890",
463
+ role="roles/editor",
464
+ member="user:jane@example.com")
465
+ ```
466
+ <!--End PulumiCodeChooser -->
467
+
468
+ With IAM Conditions:
469
+
470
+ <!--Start PulumiCodeChooser -->
471
+ ```python
472
+ import pulumi
473
+ import pulumi_gcp as gcp
474
+
475
+ organization = gcp.organizations.IAMMember("organization",
476
+ org_id="1234567890",
477
+ role="roles/editor",
478
+ member="user:jane@example.com",
479
+ condition=gcp.organizations.IAMMemberConditionArgs(
480
+ title="expires_after_2019_12_31",
481
+ description="Expiring at midnight of 2019-12-31",
482
+ expression="request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
483
+ ))
484
+ ```
485
+ <!--End PulumiCodeChooser -->
486
+
487
+ ## google\\_organization\\_iam\\_audit\\_config
488
+
489
+ <!--Start PulumiCodeChooser -->
490
+ ```python
491
+ import pulumi
492
+ import pulumi_gcp as gcp
493
+
494
+ organization = gcp.organizations.IamAuditConfig("organization",
495
+ org_id="1234567890",
496
+ service="allServices",
497
+ audit_log_configs=[
498
+ gcp.organizations.IamAuditConfigAuditLogConfigArgs(
499
+ log_type="ADMIN_READ",
500
+ ),
501
+ gcp.organizations.IamAuditConfigAuditLogConfigArgs(
502
+ log_type="DATA_READ",
503
+ exempted_members=["user:joebloggs@example.com"],
504
+ ),
505
+ ])
506
+ ```
507
+ <!--End PulumiCodeChooser -->
508
+
340
509
  ## Import
341
510
 
342
511
  ### Importing Audit Configs
@@ -367,6 +536,12 @@ class IAMMember(pulumi.CustomResource):
367
536
  :param pulumi.ResourceOptions opts: Options for the resource.
368
537
  :param pulumi.Input[pulumi.InputType['IAMMemberConditionArgs']] condition: An [IAM Condition](https://cloud.google.com/iam/docs/conditions-overview) for a given binding.
369
538
  Structure is documented below.
539
+ :param pulumi.Input[str] member: Identities that will be granted the privilege in `role`.
540
+ Each entry can have one of the following values:
541
+ * **user:{emailid}**: An email address that represents a specific Google account. For example, alice@gmail.com or joe@example.com.
542
+ * **serviceAccount:{emailid}**: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com.
543
+ * **group:{emailid}**: An email address that represents a Google group. For example, admins@example.com.
544
+ * **domain:{domain}**: A G Suite domain (primary, instead of alias) name that represents all the users of that domain. For example, google.com or example.com.
370
545
  :param pulumi.Input[str] org_id: The organization id of the target organization.
371
546
  :param pulumi.Input[str] role: The role that should be applied. Only one
372
547
  `organizations.IAMBinding` can be used per role. Note that custom roles must be of the format
@@ -531,6 +706,147 @@ class IAMMember(pulumi.CustomResource):
531
706
  ```
532
707
  <!--End PulumiCodeChooser -->
533
708
 
709
+ ## google\\_organization\\_iam\\_policy
710
+
711
+ !> **Warning:** New organizations have several default policies which will,
712
+ without extreme caution, be **overwritten** by use of this resource.
713
+ The safest alternative is to use multiple `organizations.IAMBinding`
714
+ resources. This resource makes it easy to remove your own access to
715
+ an organization, which will require a call to Google Support to have
716
+ fixed, and can take multiple days to resolve.
717
+
718
+ In general, this resource should only be used with organizations
719
+ fully managed by this provider.I f you do use this resource,
720
+ the best way to be sure that you are not making dangerous changes is to start
721
+ by **importing** your existing policy, and examining the diff very closely.
722
+
723
+ <!--Start PulumiCodeChooser -->
724
+ ```python
725
+ import pulumi
726
+ import pulumi_gcp as gcp
727
+
728
+ admin = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
729
+ role="roles/editor",
730
+ members=["user:jane@example.com"],
731
+ )])
732
+ organization = gcp.organizations.IAMPolicy("organization",
733
+ org_id="1234567890",
734
+ policy_data=admin.policy_data)
735
+ ```
736
+ <!--End PulumiCodeChooser -->
737
+
738
+ With IAM Conditions:
739
+
740
+ <!--Start PulumiCodeChooser -->
741
+ ```python
742
+ import pulumi
743
+ import pulumi_gcp as gcp
744
+
745
+ admin = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
746
+ role="roles/editor",
747
+ members=["user:jane@example.com"],
748
+ condition=gcp.organizations.GetIAMPolicyBindingConditionArgs(
749
+ title="expires_after_2019_12_31",
750
+ description="Expiring at midnight of 2019-12-31",
751
+ expression="request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
752
+ ),
753
+ )])
754
+ organization = gcp.organizations.IAMPolicy("organization",
755
+ org_id="1234567890",
756
+ policy_data=admin.policy_data)
757
+ ```
758
+ <!--End PulumiCodeChooser -->
759
+
760
+ ## google\\_organization\\_iam\\_binding
761
+
762
+ > **Note:** If `role` is set to `roles/owner` and you don't specify a user or service account you have access to in `members`, you can lock yourself out of your organization.
763
+
764
+ <!--Start PulumiCodeChooser -->
765
+ ```python
766
+ import pulumi
767
+ import pulumi_gcp as gcp
768
+
769
+ organization = gcp.organizations.IAMBinding("organization",
770
+ org_id="1234567890",
771
+ role="roles/editor",
772
+ members=["user:jane@example.com"])
773
+ ```
774
+ <!--End PulumiCodeChooser -->
775
+
776
+ With IAM Conditions:
777
+
778
+ <!--Start PulumiCodeChooser -->
779
+ ```python
780
+ import pulumi
781
+ import pulumi_gcp as gcp
782
+
783
+ organization = gcp.organizations.IAMBinding("organization",
784
+ org_id="1234567890",
785
+ role="roles/editor",
786
+ members=["user:jane@example.com"],
787
+ condition=gcp.organizations.IAMBindingConditionArgs(
788
+ title="expires_after_2019_12_31",
789
+ description="Expiring at midnight of 2019-12-31",
790
+ expression="request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
791
+ ))
792
+ ```
793
+ <!--End PulumiCodeChooser -->
794
+
795
+ ## google\\_organization\\_iam\\_member
796
+
797
+ <!--Start PulumiCodeChooser -->
798
+ ```python
799
+ import pulumi
800
+ import pulumi_gcp as gcp
801
+
802
+ organization = gcp.organizations.IAMMember("organization",
803
+ org_id="1234567890",
804
+ role="roles/editor",
805
+ member="user:jane@example.com")
806
+ ```
807
+ <!--End PulumiCodeChooser -->
808
+
809
+ With IAM Conditions:
810
+
811
+ <!--Start PulumiCodeChooser -->
812
+ ```python
813
+ import pulumi
814
+ import pulumi_gcp as gcp
815
+
816
+ organization = gcp.organizations.IAMMember("organization",
817
+ org_id="1234567890",
818
+ role="roles/editor",
819
+ member="user:jane@example.com",
820
+ condition=gcp.organizations.IAMMemberConditionArgs(
821
+ title="expires_after_2019_12_31",
822
+ description="Expiring at midnight of 2019-12-31",
823
+ expression="request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
824
+ ))
825
+ ```
826
+ <!--End PulumiCodeChooser -->
827
+
828
+ ## google\\_organization\\_iam\\_audit\\_config
829
+
830
+ <!--Start PulumiCodeChooser -->
831
+ ```python
832
+ import pulumi
833
+ import pulumi_gcp as gcp
834
+
835
+ organization = gcp.organizations.IamAuditConfig("organization",
836
+ org_id="1234567890",
837
+ service="allServices",
838
+ audit_log_configs=[
839
+ gcp.organizations.IamAuditConfigAuditLogConfigArgs(
840
+ log_type="ADMIN_READ",
841
+ ),
842
+ gcp.organizations.IamAuditConfigAuditLogConfigArgs(
843
+ log_type="DATA_READ",
844
+ exempted_members=["user:joebloggs@example.com"],
845
+ ),
846
+ ])
847
+ ```
848
+ <!--End PulumiCodeChooser -->
849
+
534
850
  ## Import
535
851
 
536
852
  ### Importing Audit Configs
@@ -621,6 +937,12 @@ class IAMMember(pulumi.CustomResource):
621
937
  :param pulumi.Input[pulumi.InputType['IAMMemberConditionArgs']] condition: An [IAM Condition](https://cloud.google.com/iam/docs/conditions-overview) for a given binding.
622
938
  Structure is documented below.
623
939
  :param pulumi.Input[str] etag: (Computed) The etag of the organization's IAM policy.
940
+ :param pulumi.Input[str] member: Identities that will be granted the privilege in `role`.
941
+ Each entry can have one of the following values:
942
+ * **user:{emailid}**: An email address that represents a specific Google account. For example, alice@gmail.com or joe@example.com.
943
+ * **serviceAccount:{emailid}**: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com.
944
+ * **group:{emailid}**: An email address that represents a Google group. For example, admins@example.com.
945
+ * **domain:{domain}**: A G Suite domain (primary, instead of alias) name that represents all the users of that domain. For example, google.com or example.com.
624
946
  :param pulumi.Input[str] org_id: The organization id of the target organization.
625
947
  :param pulumi.Input[str] role: The role that should be applied. Only one
626
948
  `organizations.IAMBinding` can be used per role. Note that custom roles must be of the format
@@ -657,6 +979,14 @@ class IAMMember(pulumi.CustomResource):
657
979
  @property
658
980
  @pulumi.getter
659
981
  def member(self) -> pulumi.Output[str]:
982
+ """
983
+ Identities that will be granted the privilege in `role`.
984
+ Each entry can have one of the following values:
985
+ * **user:{emailid}**: An email address that represents a specific Google account. For example, alice@gmail.com or joe@example.com.
986
+ * **serviceAccount:{emailid}**: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com.
987
+ * **group:{emailid}**: An email address that represents a Google group. For example, admins@example.com.
988
+ * **domain:{domain}**: A G Suite domain (primary, instead of alias) name that represents all the users of that domain. For example, google.com or example.com.
989
+ """
660
990
  return pulumi.get(self, "member")
661
991
 
662
992
  @property
@@ -294,6 +294,147 @@ class IAMPolicy(pulumi.CustomResource):
294
294
  ```
295
295
  <!--End PulumiCodeChooser -->
296
296
 
297
+ ## google\\_organization\\_iam\\_policy
298
+
299
+ !> **Warning:** New organizations have several default policies which will,
300
+ without extreme caution, be **overwritten** by use of this resource.
301
+ The safest alternative is to use multiple `organizations.IAMBinding`
302
+ resources. This resource makes it easy to remove your own access to
303
+ an organization, which will require a call to Google Support to have
304
+ fixed, and can take multiple days to resolve.
305
+
306
+ In general, this resource should only be used with organizations
307
+ fully managed by this provider.I f you do use this resource,
308
+ the best way to be sure that you are not making dangerous changes is to start
309
+ by **importing** your existing policy, and examining the diff very closely.
310
+
311
+ <!--Start PulumiCodeChooser -->
312
+ ```python
313
+ import pulumi
314
+ import pulumi_gcp as gcp
315
+
316
+ admin = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
317
+ role="roles/editor",
318
+ members=["user:jane@example.com"],
319
+ )])
320
+ organization = gcp.organizations.IAMPolicy("organization",
321
+ org_id="1234567890",
322
+ policy_data=admin.policy_data)
323
+ ```
324
+ <!--End PulumiCodeChooser -->
325
+
326
+ With IAM Conditions:
327
+
328
+ <!--Start PulumiCodeChooser -->
329
+ ```python
330
+ import pulumi
331
+ import pulumi_gcp as gcp
332
+
333
+ admin = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
334
+ role="roles/editor",
335
+ members=["user:jane@example.com"],
336
+ condition=gcp.organizations.GetIAMPolicyBindingConditionArgs(
337
+ title="expires_after_2019_12_31",
338
+ description="Expiring at midnight of 2019-12-31",
339
+ expression="request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
340
+ ),
341
+ )])
342
+ organization = gcp.organizations.IAMPolicy("organization",
343
+ org_id="1234567890",
344
+ policy_data=admin.policy_data)
345
+ ```
346
+ <!--End PulumiCodeChooser -->
347
+
348
+ ## google\\_organization\\_iam\\_binding
349
+
350
+ > **Note:** If `role` is set to `roles/owner` and you don't specify a user or service account you have access to in `members`, you can lock yourself out of your organization.
351
+
352
+ <!--Start PulumiCodeChooser -->
353
+ ```python
354
+ import pulumi
355
+ import pulumi_gcp as gcp
356
+
357
+ organization = gcp.organizations.IAMBinding("organization",
358
+ org_id="1234567890",
359
+ role="roles/editor",
360
+ members=["user:jane@example.com"])
361
+ ```
362
+ <!--End PulumiCodeChooser -->
363
+
364
+ With IAM Conditions:
365
+
366
+ <!--Start PulumiCodeChooser -->
367
+ ```python
368
+ import pulumi
369
+ import pulumi_gcp as gcp
370
+
371
+ organization = gcp.organizations.IAMBinding("organization",
372
+ org_id="1234567890",
373
+ role="roles/editor",
374
+ members=["user:jane@example.com"],
375
+ condition=gcp.organizations.IAMBindingConditionArgs(
376
+ title="expires_after_2019_12_31",
377
+ description="Expiring at midnight of 2019-12-31",
378
+ expression="request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
379
+ ))
380
+ ```
381
+ <!--End PulumiCodeChooser -->
382
+
383
+ ## google\\_organization\\_iam\\_member
384
+
385
+ <!--Start PulumiCodeChooser -->
386
+ ```python
387
+ import pulumi
388
+ import pulumi_gcp as gcp
389
+
390
+ organization = gcp.organizations.IAMMember("organization",
391
+ org_id="1234567890",
392
+ role="roles/editor",
393
+ member="user:jane@example.com")
394
+ ```
395
+ <!--End PulumiCodeChooser -->
396
+
397
+ With IAM Conditions:
398
+
399
+ <!--Start PulumiCodeChooser -->
400
+ ```python
401
+ import pulumi
402
+ import pulumi_gcp as gcp
403
+
404
+ organization = gcp.organizations.IAMMember("organization",
405
+ org_id="1234567890",
406
+ role="roles/editor",
407
+ member="user:jane@example.com",
408
+ condition=gcp.organizations.IAMMemberConditionArgs(
409
+ title="expires_after_2019_12_31",
410
+ description="Expiring at midnight of 2019-12-31",
411
+ expression="request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
412
+ ))
413
+ ```
414
+ <!--End PulumiCodeChooser -->
415
+
416
+ ## google\\_organization\\_iam\\_audit\\_config
417
+
418
+ <!--Start PulumiCodeChooser -->
419
+ ```python
420
+ import pulumi
421
+ import pulumi_gcp as gcp
422
+
423
+ organization = gcp.organizations.IamAuditConfig("organization",
424
+ org_id="1234567890",
425
+ service="allServices",
426
+ audit_log_configs=[
427
+ gcp.organizations.IamAuditConfigAuditLogConfigArgs(
428
+ log_type="ADMIN_READ",
429
+ ),
430
+ gcp.organizations.IamAuditConfigAuditLogConfigArgs(
431
+ log_type="DATA_READ",
432
+ exempted_members=["user:joebloggs@example.com"],
433
+ ),
434
+ ])
435
+ ```
436
+ <!--End PulumiCodeChooser -->
437
+
297
438
  ## Import
298
439
 
299
440
  ### Importing Audit Configs
@@ -491,6 +632,147 @@ class IAMPolicy(pulumi.CustomResource):
491
632
  ```
492
633
  <!--End PulumiCodeChooser -->
493
634
 
635
+ ## google\\_organization\\_iam\\_policy
636
+
637
+ !> **Warning:** New organizations have several default policies which will,
638
+ without extreme caution, be **overwritten** by use of this resource.
639
+ The safest alternative is to use multiple `organizations.IAMBinding`
640
+ resources. This resource makes it easy to remove your own access to
641
+ an organization, which will require a call to Google Support to have
642
+ fixed, and can take multiple days to resolve.
643
+
644
+ In general, this resource should only be used with organizations
645
+ fully managed by this provider.I f you do use this resource,
646
+ the best way to be sure that you are not making dangerous changes is to start
647
+ by **importing** your existing policy, and examining the diff very closely.
648
+
649
+ <!--Start PulumiCodeChooser -->
650
+ ```python
651
+ import pulumi
652
+ import pulumi_gcp as gcp
653
+
654
+ admin = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
655
+ role="roles/editor",
656
+ members=["user:jane@example.com"],
657
+ )])
658
+ organization = gcp.organizations.IAMPolicy("organization",
659
+ org_id="1234567890",
660
+ policy_data=admin.policy_data)
661
+ ```
662
+ <!--End PulumiCodeChooser -->
663
+
664
+ With IAM Conditions:
665
+
666
+ <!--Start PulumiCodeChooser -->
667
+ ```python
668
+ import pulumi
669
+ import pulumi_gcp as gcp
670
+
671
+ admin = gcp.organizations.get_iam_policy(bindings=[gcp.organizations.GetIAMPolicyBindingArgs(
672
+ role="roles/editor",
673
+ members=["user:jane@example.com"],
674
+ condition=gcp.organizations.GetIAMPolicyBindingConditionArgs(
675
+ title="expires_after_2019_12_31",
676
+ description="Expiring at midnight of 2019-12-31",
677
+ expression="request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
678
+ ),
679
+ )])
680
+ organization = gcp.organizations.IAMPolicy("organization",
681
+ org_id="1234567890",
682
+ policy_data=admin.policy_data)
683
+ ```
684
+ <!--End PulumiCodeChooser -->
685
+
686
+ ## google\\_organization\\_iam\\_binding
687
+
688
+ > **Note:** If `role` is set to `roles/owner` and you don't specify a user or service account you have access to in `members`, you can lock yourself out of your organization.
689
+
690
+ <!--Start PulumiCodeChooser -->
691
+ ```python
692
+ import pulumi
693
+ import pulumi_gcp as gcp
694
+
695
+ organization = gcp.organizations.IAMBinding("organization",
696
+ org_id="1234567890",
697
+ role="roles/editor",
698
+ members=["user:jane@example.com"])
699
+ ```
700
+ <!--End PulumiCodeChooser -->
701
+
702
+ With IAM Conditions:
703
+
704
+ <!--Start PulumiCodeChooser -->
705
+ ```python
706
+ import pulumi
707
+ import pulumi_gcp as gcp
708
+
709
+ organization = gcp.organizations.IAMBinding("organization",
710
+ org_id="1234567890",
711
+ role="roles/editor",
712
+ members=["user:jane@example.com"],
713
+ condition=gcp.organizations.IAMBindingConditionArgs(
714
+ title="expires_after_2019_12_31",
715
+ description="Expiring at midnight of 2019-12-31",
716
+ expression="request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
717
+ ))
718
+ ```
719
+ <!--End PulumiCodeChooser -->
720
+
721
+ ## google\\_organization\\_iam\\_member
722
+
723
+ <!--Start PulumiCodeChooser -->
724
+ ```python
725
+ import pulumi
726
+ import pulumi_gcp as gcp
727
+
728
+ organization = gcp.organizations.IAMMember("organization",
729
+ org_id="1234567890",
730
+ role="roles/editor",
731
+ member="user:jane@example.com")
732
+ ```
733
+ <!--End PulumiCodeChooser -->
734
+
735
+ With IAM Conditions:
736
+
737
+ <!--Start PulumiCodeChooser -->
738
+ ```python
739
+ import pulumi
740
+ import pulumi_gcp as gcp
741
+
742
+ organization = gcp.organizations.IAMMember("organization",
743
+ org_id="1234567890",
744
+ role="roles/editor",
745
+ member="user:jane@example.com",
746
+ condition=gcp.organizations.IAMMemberConditionArgs(
747
+ title="expires_after_2019_12_31",
748
+ description="Expiring at midnight of 2019-12-31",
749
+ expression="request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
750
+ ))
751
+ ```
752
+ <!--End PulumiCodeChooser -->
753
+
754
+ ## google\\_organization\\_iam\\_audit\\_config
755
+
756
+ <!--Start PulumiCodeChooser -->
757
+ ```python
758
+ import pulumi
759
+ import pulumi_gcp as gcp
760
+
761
+ organization = gcp.organizations.IamAuditConfig("organization",
762
+ org_id="1234567890",
763
+ service="allServices",
764
+ audit_log_configs=[
765
+ gcp.organizations.IamAuditConfigAuditLogConfigArgs(
766
+ log_type="ADMIN_READ",
767
+ ),
768
+ gcp.organizations.IamAuditConfigAuditLogConfigArgs(
769
+ log_type="DATA_READ",
770
+ exempted_members=["user:joebloggs@example.com"],
771
+ ),
772
+ ])
773
+ ```
774
+ <!--End PulumiCodeChooser -->
775
+
494
776
  ## Import
495
777
 
496
778
  ### Importing Audit Configs