pulumi-gcp 7.31.0a1720765508__py3-none-any.whl → 7.31.0a1721039192__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (86) hide show
  1. pulumi_gcp/__init__.py +40 -0
  2. pulumi_gcp/applicationintegration/auth_config.py +2 -2
  3. pulumi_gcp/bigquery/reservation_assignment.py +48 -30
  4. pulumi_gcp/certificateauthority/certificate_template.py +2 -2
  5. pulumi_gcp/certificatemanager/_inputs.py +33 -0
  6. pulumi_gcp/certificatemanager/outputs.py +36 -0
  7. pulumi_gcp/certificatemanager/trust_config.py +107 -0
  8. pulumi_gcp/compute/_inputs.py +3 -6
  9. pulumi_gcp/compute/ca_external_account_key.py +2 -2
  10. pulumi_gcp/compute/get_health_check.py +11 -1
  11. pulumi_gcp/compute/global_forwarding_rule.py +2 -4
  12. pulumi_gcp/compute/health_check.py +124 -0
  13. pulumi_gcp/compute/instance.py +14 -14
  14. pulumi_gcp/compute/instance_group_membership.py +2 -2
  15. pulumi_gcp/compute/outputs.py +4 -8
  16. pulumi_gcp/compute/region_network_endpoint.py +2 -2
  17. pulumi_gcp/compute/region_network_endpoint_group.py +2 -2
  18. pulumi_gcp/compute/subnetwork.py +2 -2
  19. pulumi_gcp/config/__init__.pyi +2 -0
  20. pulumi_gcp/config/vars.py +4 -0
  21. pulumi_gcp/container/_inputs.py +3 -3
  22. pulumi_gcp/container/outputs.py +4 -4
  23. pulumi_gcp/containeranalysis/note.py +2 -2
  24. pulumi_gcp/dataloss/_inputs.py +3 -0
  25. pulumi_gcp/dataloss/outputs.py +2 -0
  26. pulumi_gcp/dataloss/prevention_job_trigger.py +90 -0
  27. pulumi_gcp/dataplex/_inputs.py +56 -0
  28. pulumi_gcp/dataplex/datascan.py +12 -0
  29. pulumi_gcp/dataplex/outputs.py +52 -0
  30. pulumi_gcp/filestore/backup.py +2 -2
  31. pulumi_gcp/filestore/instance.py +2 -2
  32. pulumi_gcp/filestore/snapshot.py +2 -2
  33. pulumi_gcp/gkehub/_inputs.py +20 -0
  34. pulumi_gcp/gkehub/outputs.py +12 -0
  35. pulumi_gcp/kms/__init__.py +2 -0
  36. pulumi_gcp/kms/crypto_key.py +7 -7
  37. pulumi_gcp/kms/get_crypto_keys.py +143 -0
  38. pulumi_gcp/kms/get_key_rings.py +119 -0
  39. pulumi_gcp/kms/outputs.py +270 -0
  40. pulumi_gcp/logging/_inputs.py +12 -12
  41. pulumi_gcp/logging/folder_bucket_config.py +6 -6
  42. pulumi_gcp/logging/organization_bucket_config.py +6 -6
  43. pulumi_gcp/logging/outputs.py +8 -8
  44. pulumi_gcp/logging/project_bucket_config.py +6 -6
  45. pulumi_gcp/looker/instance.py +2 -2
  46. pulumi_gcp/monitoring/custom_service.py +2 -2
  47. pulumi_gcp/monitoring/generic_service.py +2 -2
  48. pulumi_gcp/monitoring/notification_channel.py +2 -2
  49. pulumi_gcp/monitoring/slo.py +2 -2
  50. pulumi_gcp/netapp/storage_pool.py +132 -53
  51. pulumi_gcp/netapp/volume.py +60 -4
  52. pulumi_gcp/networksecurity/address_group.py +85 -1
  53. pulumi_gcp/networksecurity/firewall_endpoint.py +2 -2
  54. pulumi_gcp/networksecurity/firewall_endpoint_association.py +2 -2
  55. pulumi_gcp/networksecurity/security_profile_group.py +2 -2
  56. pulumi_gcp/orgpolicy/_inputs.py +40 -10
  57. pulumi_gcp/orgpolicy/outputs.py +28 -8
  58. pulumi_gcp/orgpolicy/policy.py +52 -35
  59. pulumi_gcp/provider.py +20 -0
  60. pulumi_gcp/pubsub/_inputs.py +3 -3
  61. pulumi_gcp/pubsub/outputs.py +4 -4
  62. pulumi_gcp/pulumi-plugin.json +1 -1
  63. pulumi_gcp/securesourcemanager/__init__.py +5 -0
  64. pulumi_gcp/securesourcemanager/_inputs.py +284 -0
  65. pulumi_gcp/securesourcemanager/get_repository_iam_policy.py +177 -0
  66. pulumi_gcp/securesourcemanager/outputs.py +202 -0
  67. pulumi_gcp/securesourcemanager/repository.py +715 -0
  68. pulumi_gcp/securesourcemanager/repository_iam_binding.py +804 -0
  69. pulumi_gcp/securesourcemanager/repository_iam_member.py +804 -0
  70. pulumi_gcp/securesourcemanager/repository_iam_policy.py +643 -0
  71. pulumi_gcp/securitycenter/__init__.py +1 -0
  72. pulumi_gcp/securitycenter/_inputs.py +93 -0
  73. pulumi_gcp/securitycenter/outputs.py +59 -0
  74. pulumi_gcp/securitycenter/v2_organization_notification_config.py +576 -0
  75. pulumi_gcp/securityposture/posture_deployment.py +0 -78
  76. pulumi_gcp/servicenetworking/vpc_service_controls.py +2 -2
  77. pulumi_gcp/vertex/_inputs.py +21 -1
  78. pulumi_gcp/vertex/ai_feature_online_store_featureview.py +222 -0
  79. pulumi_gcp/vertex/outputs.py +15 -1
  80. pulumi_gcp/workstations/_inputs.py +33 -1
  81. pulumi_gcp/workstations/outputs.py +23 -1
  82. pulumi_gcp/workstations/workstation_config.py +18 -0
  83. {pulumi_gcp-7.31.0a1720765508.dist-info → pulumi_gcp-7.31.0a1721039192.dist-info}/METADATA +1 -1
  84. {pulumi_gcp-7.31.0a1720765508.dist-info → pulumi_gcp-7.31.0a1721039192.dist-info}/RECORD +86 -78
  85. {pulumi_gcp-7.31.0a1720765508.dist-info → pulumi_gcp-7.31.0a1721039192.dist-info}/WHEEL +0 -0
  86. {pulumi_gcp-7.31.0a1720765508.dist-info → pulumi_gcp-7.31.0a1721039192.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,804 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+ from . import outputs
17
+ from ._inputs import *
18
+
19
+ __all__ = ['RepositoryIamMemberArgs', 'RepositoryIamMember']
20
+
21
+ @pulumi.input_type
22
+ class RepositoryIamMemberArgs:
23
+ def __init__(__self__, *,
24
+ member: pulumi.Input[str],
25
+ repository_id: pulumi.Input[str],
26
+ role: pulumi.Input[str],
27
+ condition: Optional[pulumi.Input['RepositoryIamMemberConditionArgs']] = None,
28
+ location: Optional[pulumi.Input[str]] = None,
29
+ project: Optional[pulumi.Input[str]] = None):
30
+ """
31
+ The set of arguments for constructing a RepositoryIamMember resource.
32
+ :param pulumi.Input[str] member: Identities that will be granted the privilege in `role`.
33
+ Each entry can have one of the following values:
34
+ * **allUsers**: A special identifier that represents anyone who is on the internet; with or without a Google account.
35
+ * **allAuthenticatedUsers**: A special identifier that represents anyone who is authenticated with a Google account or a service account.
36
+ * **user:{emailid}**: An email address that represents a specific Google account. For example, alice@gmail.com or joe@example.com.
37
+ * **serviceAccount:{emailid}**: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com.
38
+ * **group:{emailid}**: An email address that represents a Google group. For example, admins@example.com.
39
+ * **domain:{domain}**: A G Suite domain (primary, instead of alias) name that represents all the users of that domain. For example, google.com or example.com.
40
+ * **projectOwner:projectid**: Owners of the given project. For example, "projectOwner:my-example-project"
41
+ * **projectEditor:projectid**: Editors of the given project. For example, "projectEditor:my-example-project"
42
+ * **projectViewer:projectid**: Viewers of the given project. For example, "projectViewer:my-example-project"
43
+ :param pulumi.Input[str] repository_id: The ID for the Repository.
44
+ Used to find the parent resource to bind the IAM policy to
45
+ :param pulumi.Input[str] role: The role that should be applied. Only one
46
+ `securesourcemanager.RepositoryIamBinding` can be used per role. Note that custom roles must be of the format
47
+ `[projects|organizations]/{parent-name}/roles/{role-name}`.
48
+ :param pulumi.Input[str] location: The location for the Repository.
49
+ Used to find the parent resource to bind the IAM policy to. If not specified,
50
+ the value will be parsed from the identifier of the parent resource. If no location is provided in the parent identifier and no
51
+ location is specified, it is taken from the provider configuration.
52
+ :param pulumi.Input[str] project: The ID of the project in which the resource belongs.
53
+ If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.
54
+ """
55
+ pulumi.set(__self__, "member", member)
56
+ pulumi.set(__self__, "repository_id", repository_id)
57
+ pulumi.set(__self__, "role", role)
58
+ if condition is not None:
59
+ pulumi.set(__self__, "condition", condition)
60
+ if location is not None:
61
+ pulumi.set(__self__, "location", location)
62
+ if project is not None:
63
+ pulumi.set(__self__, "project", project)
64
+
65
+ @property
66
+ @pulumi.getter
67
+ def member(self) -> pulumi.Input[str]:
68
+ """
69
+ Identities that will be granted the privilege in `role`.
70
+ Each entry can have one of the following values:
71
+ * **allUsers**: A special identifier that represents anyone who is on the internet; with or without a Google account.
72
+ * **allAuthenticatedUsers**: A special identifier that represents anyone who is authenticated with a Google account or a service account.
73
+ * **user:{emailid}**: An email address that represents a specific Google account. For example, alice@gmail.com or joe@example.com.
74
+ * **serviceAccount:{emailid}**: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com.
75
+ * **group:{emailid}**: An email address that represents a Google group. For example, admins@example.com.
76
+ * **domain:{domain}**: A G Suite domain (primary, instead of alias) name that represents all the users of that domain. For example, google.com or example.com.
77
+ * **projectOwner:projectid**: Owners of the given project. For example, "projectOwner:my-example-project"
78
+ * **projectEditor:projectid**: Editors of the given project. For example, "projectEditor:my-example-project"
79
+ * **projectViewer:projectid**: Viewers of the given project. For example, "projectViewer:my-example-project"
80
+ """
81
+ return pulumi.get(self, "member")
82
+
83
+ @member.setter
84
+ def member(self, value: pulumi.Input[str]):
85
+ pulumi.set(self, "member", value)
86
+
87
+ @property
88
+ @pulumi.getter(name="repositoryId")
89
+ def repository_id(self) -> pulumi.Input[str]:
90
+ """
91
+ The ID for the Repository.
92
+ Used to find the parent resource to bind the IAM policy to
93
+ """
94
+ return pulumi.get(self, "repository_id")
95
+
96
+ @repository_id.setter
97
+ def repository_id(self, value: pulumi.Input[str]):
98
+ pulumi.set(self, "repository_id", value)
99
+
100
+ @property
101
+ @pulumi.getter
102
+ def role(self) -> pulumi.Input[str]:
103
+ """
104
+ The role that should be applied. Only one
105
+ `securesourcemanager.RepositoryIamBinding` can be used per role. Note that custom roles must be of the format
106
+ `[projects|organizations]/{parent-name}/roles/{role-name}`.
107
+ """
108
+ return pulumi.get(self, "role")
109
+
110
+ @role.setter
111
+ def role(self, value: pulumi.Input[str]):
112
+ pulumi.set(self, "role", value)
113
+
114
+ @property
115
+ @pulumi.getter
116
+ def condition(self) -> Optional[pulumi.Input['RepositoryIamMemberConditionArgs']]:
117
+ return pulumi.get(self, "condition")
118
+
119
+ @condition.setter
120
+ def condition(self, value: Optional[pulumi.Input['RepositoryIamMemberConditionArgs']]):
121
+ pulumi.set(self, "condition", value)
122
+
123
+ @property
124
+ @pulumi.getter
125
+ def location(self) -> Optional[pulumi.Input[str]]:
126
+ """
127
+ The location for the Repository.
128
+ Used to find the parent resource to bind the IAM policy to. If not specified,
129
+ the value will be parsed from the identifier of the parent resource. If no location is provided in the parent identifier and no
130
+ location is specified, it is taken from the provider configuration.
131
+ """
132
+ return pulumi.get(self, "location")
133
+
134
+ @location.setter
135
+ def location(self, value: Optional[pulumi.Input[str]]):
136
+ pulumi.set(self, "location", value)
137
+
138
+ @property
139
+ @pulumi.getter
140
+ def project(self) -> Optional[pulumi.Input[str]]:
141
+ """
142
+ The ID of the project in which the resource belongs.
143
+ If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.
144
+ """
145
+ return pulumi.get(self, "project")
146
+
147
+ @project.setter
148
+ def project(self, value: Optional[pulumi.Input[str]]):
149
+ pulumi.set(self, "project", value)
150
+
151
+
152
+ @pulumi.input_type
153
+ class _RepositoryIamMemberState:
154
+ def __init__(__self__, *,
155
+ condition: Optional[pulumi.Input['RepositoryIamMemberConditionArgs']] = None,
156
+ etag: Optional[pulumi.Input[str]] = None,
157
+ location: Optional[pulumi.Input[str]] = None,
158
+ member: Optional[pulumi.Input[str]] = None,
159
+ project: Optional[pulumi.Input[str]] = None,
160
+ repository_id: Optional[pulumi.Input[str]] = None,
161
+ role: Optional[pulumi.Input[str]] = None):
162
+ """
163
+ Input properties used for looking up and filtering RepositoryIamMember resources.
164
+ :param pulumi.Input[str] etag: (Computed) The etag of the IAM policy.
165
+ :param pulumi.Input[str] location: The location for the Repository.
166
+ Used to find the parent resource to bind the IAM policy to. If not specified,
167
+ the value will be parsed from the identifier of the parent resource. If no location is provided in the parent identifier and no
168
+ location is specified, it is taken from the provider configuration.
169
+ :param pulumi.Input[str] member: Identities that will be granted the privilege in `role`.
170
+ Each entry can have one of the following values:
171
+ * **allUsers**: A special identifier that represents anyone who is on the internet; with or without a Google account.
172
+ * **allAuthenticatedUsers**: A special identifier that represents anyone who is authenticated with a Google account or a service account.
173
+ * **user:{emailid}**: An email address that represents a specific Google account. For example, alice@gmail.com or joe@example.com.
174
+ * **serviceAccount:{emailid}**: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com.
175
+ * **group:{emailid}**: An email address that represents a Google group. For example, admins@example.com.
176
+ * **domain:{domain}**: A G Suite domain (primary, instead of alias) name that represents all the users of that domain. For example, google.com or example.com.
177
+ * **projectOwner:projectid**: Owners of the given project. For example, "projectOwner:my-example-project"
178
+ * **projectEditor:projectid**: Editors of the given project. For example, "projectEditor:my-example-project"
179
+ * **projectViewer:projectid**: Viewers of the given project. For example, "projectViewer:my-example-project"
180
+ :param pulumi.Input[str] project: The ID of the project in which the resource belongs.
181
+ If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.
182
+ :param pulumi.Input[str] repository_id: The ID for the Repository.
183
+ Used to find the parent resource to bind the IAM policy to
184
+ :param pulumi.Input[str] role: The role that should be applied. Only one
185
+ `securesourcemanager.RepositoryIamBinding` can be used per role. Note that custom roles must be of the format
186
+ `[projects|organizations]/{parent-name}/roles/{role-name}`.
187
+ """
188
+ if condition is not None:
189
+ pulumi.set(__self__, "condition", condition)
190
+ if etag is not None:
191
+ pulumi.set(__self__, "etag", etag)
192
+ if location is not None:
193
+ pulumi.set(__self__, "location", location)
194
+ if member is not None:
195
+ pulumi.set(__self__, "member", member)
196
+ if project is not None:
197
+ pulumi.set(__self__, "project", project)
198
+ if repository_id is not None:
199
+ pulumi.set(__self__, "repository_id", repository_id)
200
+ if role is not None:
201
+ pulumi.set(__self__, "role", role)
202
+
203
+ @property
204
+ @pulumi.getter
205
+ def condition(self) -> Optional[pulumi.Input['RepositoryIamMemberConditionArgs']]:
206
+ return pulumi.get(self, "condition")
207
+
208
+ @condition.setter
209
+ def condition(self, value: Optional[pulumi.Input['RepositoryIamMemberConditionArgs']]):
210
+ pulumi.set(self, "condition", value)
211
+
212
+ @property
213
+ @pulumi.getter
214
+ def etag(self) -> Optional[pulumi.Input[str]]:
215
+ """
216
+ (Computed) The etag of the IAM policy.
217
+ """
218
+ return pulumi.get(self, "etag")
219
+
220
+ @etag.setter
221
+ def etag(self, value: Optional[pulumi.Input[str]]):
222
+ pulumi.set(self, "etag", value)
223
+
224
+ @property
225
+ @pulumi.getter
226
+ def location(self) -> Optional[pulumi.Input[str]]:
227
+ """
228
+ The location for the Repository.
229
+ Used to find the parent resource to bind the IAM policy to. If not specified,
230
+ the value will be parsed from the identifier of the parent resource. If no location is provided in the parent identifier and no
231
+ location is specified, it is taken from the provider configuration.
232
+ """
233
+ return pulumi.get(self, "location")
234
+
235
+ @location.setter
236
+ def location(self, value: Optional[pulumi.Input[str]]):
237
+ pulumi.set(self, "location", value)
238
+
239
+ @property
240
+ @pulumi.getter
241
+ def member(self) -> Optional[pulumi.Input[str]]:
242
+ """
243
+ Identities that will be granted the privilege in `role`.
244
+ Each entry can have one of the following values:
245
+ * **allUsers**: A special identifier that represents anyone who is on the internet; with or without a Google account.
246
+ * **allAuthenticatedUsers**: A special identifier that represents anyone who is authenticated with a Google account or a service account.
247
+ * **user:{emailid}**: An email address that represents a specific Google account. For example, alice@gmail.com or joe@example.com.
248
+ * **serviceAccount:{emailid}**: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com.
249
+ * **group:{emailid}**: An email address that represents a Google group. For example, admins@example.com.
250
+ * **domain:{domain}**: A G Suite domain (primary, instead of alias) name that represents all the users of that domain. For example, google.com or example.com.
251
+ * **projectOwner:projectid**: Owners of the given project. For example, "projectOwner:my-example-project"
252
+ * **projectEditor:projectid**: Editors of the given project. For example, "projectEditor:my-example-project"
253
+ * **projectViewer:projectid**: Viewers of the given project. For example, "projectViewer:my-example-project"
254
+ """
255
+ return pulumi.get(self, "member")
256
+
257
+ @member.setter
258
+ def member(self, value: Optional[pulumi.Input[str]]):
259
+ pulumi.set(self, "member", value)
260
+
261
+ @property
262
+ @pulumi.getter
263
+ def project(self) -> Optional[pulumi.Input[str]]:
264
+ """
265
+ The ID of the project in which the resource belongs.
266
+ If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.
267
+ """
268
+ return pulumi.get(self, "project")
269
+
270
+ @project.setter
271
+ def project(self, value: Optional[pulumi.Input[str]]):
272
+ pulumi.set(self, "project", value)
273
+
274
+ @property
275
+ @pulumi.getter(name="repositoryId")
276
+ def repository_id(self) -> Optional[pulumi.Input[str]]:
277
+ """
278
+ The ID for the Repository.
279
+ Used to find the parent resource to bind the IAM policy to
280
+ """
281
+ return pulumi.get(self, "repository_id")
282
+
283
+ @repository_id.setter
284
+ def repository_id(self, value: Optional[pulumi.Input[str]]):
285
+ pulumi.set(self, "repository_id", value)
286
+
287
+ @property
288
+ @pulumi.getter
289
+ def role(self) -> Optional[pulumi.Input[str]]:
290
+ """
291
+ The role that should be applied. Only one
292
+ `securesourcemanager.RepositoryIamBinding` can be used per role. Note that custom roles must be of the format
293
+ `[projects|organizations]/{parent-name}/roles/{role-name}`.
294
+ """
295
+ return pulumi.get(self, "role")
296
+
297
+ @role.setter
298
+ def role(self, value: Optional[pulumi.Input[str]]):
299
+ pulumi.set(self, "role", value)
300
+
301
+
302
+ class RepositoryIamMember(pulumi.CustomResource):
303
+ @overload
304
+ def __init__(__self__,
305
+ resource_name: str,
306
+ opts: Optional[pulumi.ResourceOptions] = None,
307
+ condition: Optional[pulumi.Input[Union['RepositoryIamMemberConditionArgs', 'RepositoryIamMemberConditionArgsDict']]] = None,
308
+ location: Optional[pulumi.Input[str]] = None,
309
+ member: Optional[pulumi.Input[str]] = None,
310
+ project: Optional[pulumi.Input[str]] = None,
311
+ repository_id: Optional[pulumi.Input[str]] = None,
312
+ role: Optional[pulumi.Input[str]] = None,
313
+ __props__=None):
314
+ """
315
+ Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
316
+
317
+ * `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
318
+ * `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
319
+ * `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
320
+
321
+ A data source can be used to retrieve policy data in advent you do not need creation
322
+
323
+ * `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
324
+
325
+ > **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
326
+
327
+ > **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
328
+
329
+ ## securesourcemanager.RepositoryIamPolicy
330
+
331
+ ```python
332
+ import pulumi
333
+ import pulumi_gcp as gcp
334
+
335
+ admin = gcp.organizations.get_iam_policy(bindings=[{
336
+ "role": "roles/securesourcemanager.repoAdmin",
337
+ "members": ["user:jane@example.com"],
338
+ }])
339
+ policy = gcp.securesourcemanager.RepositoryIamPolicy("policy",
340
+ project=default["project"],
341
+ location=default["location"],
342
+ repository_id=default["repositoryId"],
343
+ policy_data=admin.policy_data)
344
+ ```
345
+
346
+ ## securesourcemanager.RepositoryIamBinding
347
+
348
+ ```python
349
+ import pulumi
350
+ import pulumi_gcp as gcp
351
+
352
+ binding = gcp.securesourcemanager.RepositoryIamBinding("binding",
353
+ project=default["project"],
354
+ location=default["location"],
355
+ repository_id=default["repositoryId"],
356
+ role="roles/securesourcemanager.repoAdmin",
357
+ members=["user:jane@example.com"])
358
+ ```
359
+
360
+ ## securesourcemanager.RepositoryIamMember
361
+
362
+ ```python
363
+ import pulumi
364
+ import pulumi_gcp as gcp
365
+
366
+ member = gcp.securesourcemanager.RepositoryIamMember("member",
367
+ project=default["project"],
368
+ location=default["location"],
369
+ repository_id=default["repositoryId"],
370
+ role="roles/securesourcemanager.repoAdmin",
371
+ member="user:jane@example.com")
372
+ ```
373
+
374
+ ## securesourcemanager.RepositoryIamPolicy
375
+
376
+ ```python
377
+ import pulumi
378
+ import pulumi_gcp as gcp
379
+
380
+ admin = gcp.organizations.get_iam_policy(bindings=[{
381
+ "role": "roles/securesourcemanager.repoAdmin",
382
+ "members": ["user:jane@example.com"],
383
+ }])
384
+ policy = gcp.securesourcemanager.RepositoryIamPolicy("policy",
385
+ project=default["project"],
386
+ location=default["location"],
387
+ repository_id=default["repositoryId"],
388
+ policy_data=admin.policy_data)
389
+ ```
390
+
391
+ ## securesourcemanager.RepositoryIamBinding
392
+
393
+ ```python
394
+ import pulumi
395
+ import pulumi_gcp as gcp
396
+
397
+ binding = gcp.securesourcemanager.RepositoryIamBinding("binding",
398
+ project=default["project"],
399
+ location=default["location"],
400
+ repository_id=default["repositoryId"],
401
+ role="roles/securesourcemanager.repoAdmin",
402
+ members=["user:jane@example.com"])
403
+ ```
404
+
405
+ ## securesourcemanager.RepositoryIamMember
406
+
407
+ ```python
408
+ import pulumi
409
+ import pulumi_gcp as gcp
410
+
411
+ member = gcp.securesourcemanager.RepositoryIamMember("member",
412
+ project=default["project"],
413
+ location=default["location"],
414
+ repository_id=default["repositoryId"],
415
+ role="roles/securesourcemanager.repoAdmin",
416
+ member="user:jane@example.com")
417
+ ```
418
+
419
+ ## Import
420
+
421
+ For all import syntaxes, the "resource in question" can take any of the following forms:
422
+
423
+ * projects/{{project}}/locations/{{location}}/repositories/{{repository_id}}
424
+
425
+ * {{project}}/{{location}}/{{repository_id}}
426
+
427
+ * {{location}}/{{repository_id}}
428
+
429
+ * {{repository_id}}
430
+
431
+ Any variables not passed in the import command will be taken from the provider configuration.
432
+
433
+ Secure Source Manager repository IAM resources can be imported using the resource identifiers, role, and member.
434
+
435
+ IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
436
+
437
+ ```sh
438
+ $ pulumi import gcp:securesourcemanager/repositoryIamMember:RepositoryIamMember editor "projects/{{project}}/locations/{{location}}/repositories/{{repository_id}} roles/securesourcemanager.repoAdmin user:jane@example.com"
439
+ ```
440
+
441
+ IAM binding imports use space-delimited identifiers: the resource in question and the role, e.g.
442
+
443
+ ```sh
444
+ $ pulumi import gcp:securesourcemanager/repositoryIamMember:RepositoryIamMember editor "projects/{{project}}/locations/{{location}}/repositories/{{repository_id}} roles/securesourcemanager.repoAdmin"
445
+ ```
446
+
447
+ IAM policy imports use the identifier of the resource in question, e.g.
448
+
449
+ ```sh
450
+ $ pulumi import gcp:securesourcemanager/repositoryIamMember:RepositoryIamMember editor projects/{{project}}/locations/{{location}}/repositories/{{repository_id}}
451
+ ```
452
+
453
+ -> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
454
+
455
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
456
+
457
+ :param str resource_name: The name of the resource.
458
+ :param pulumi.ResourceOptions opts: Options for the resource.
459
+ :param pulumi.Input[str] location: The location for the Repository.
460
+ Used to find the parent resource to bind the IAM policy to. If not specified,
461
+ the value will be parsed from the identifier of the parent resource. If no location is provided in the parent identifier and no
462
+ location is specified, it is taken from the provider configuration.
463
+ :param pulumi.Input[str] member: Identities that will be granted the privilege in `role`.
464
+ Each entry can have one of the following values:
465
+ * **allUsers**: A special identifier that represents anyone who is on the internet; with or without a Google account.
466
+ * **allAuthenticatedUsers**: A special identifier that represents anyone who is authenticated with a Google account or a service account.
467
+ * **user:{emailid}**: An email address that represents a specific Google account. For example, alice@gmail.com or joe@example.com.
468
+ * **serviceAccount:{emailid}**: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com.
469
+ * **group:{emailid}**: An email address that represents a Google group. For example, admins@example.com.
470
+ * **domain:{domain}**: A G Suite domain (primary, instead of alias) name that represents all the users of that domain. For example, google.com or example.com.
471
+ * **projectOwner:projectid**: Owners of the given project. For example, "projectOwner:my-example-project"
472
+ * **projectEditor:projectid**: Editors of the given project. For example, "projectEditor:my-example-project"
473
+ * **projectViewer:projectid**: Viewers of the given project. For example, "projectViewer:my-example-project"
474
+ :param pulumi.Input[str] project: The ID of the project in which the resource belongs.
475
+ If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.
476
+ :param pulumi.Input[str] repository_id: The ID for the Repository.
477
+ Used to find the parent resource to bind the IAM policy to
478
+ :param pulumi.Input[str] role: The role that should be applied. Only one
479
+ `securesourcemanager.RepositoryIamBinding` can be used per role. Note that custom roles must be of the format
480
+ `[projects|organizations]/{parent-name}/roles/{role-name}`.
481
+ """
482
+ ...
483
+ @overload
484
+ def __init__(__self__,
485
+ resource_name: str,
486
+ args: RepositoryIamMemberArgs,
487
+ opts: Optional[pulumi.ResourceOptions] = None):
488
+ """
489
+ Three different resources help you manage your IAM policy for Secure Source Manager Repository. Each of these resources serves a different use case:
490
+
491
+ * `securesourcemanager.RepositoryIamPolicy`: Authoritative. Sets the IAM policy for the repository and replaces any existing policy already attached.
492
+ * `securesourcemanager.RepositoryIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the repository are preserved.
493
+ * `securesourcemanager.RepositoryIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the repository are preserved.
494
+
495
+ A data source can be used to retrieve policy data in advent you do not need creation
496
+
497
+ * `securesourcemanager.RepositoryIamPolicy`: Retrieves the IAM policy for the repository
498
+
499
+ > **Note:** `securesourcemanager.RepositoryIamPolicy` **cannot** be used in conjunction with `securesourcemanager.RepositoryIamBinding` and `securesourcemanager.RepositoryIamMember` or they will fight over what your policy should be.
500
+
501
+ > **Note:** `securesourcemanager.RepositoryIamBinding` resources **can be** used in conjunction with `securesourcemanager.RepositoryIamMember` resources **only if** they do not grant privilege to the same role.
502
+
503
+ ## securesourcemanager.RepositoryIamPolicy
504
+
505
+ ```python
506
+ import pulumi
507
+ import pulumi_gcp as gcp
508
+
509
+ admin = gcp.organizations.get_iam_policy(bindings=[{
510
+ "role": "roles/securesourcemanager.repoAdmin",
511
+ "members": ["user:jane@example.com"],
512
+ }])
513
+ policy = gcp.securesourcemanager.RepositoryIamPolicy("policy",
514
+ project=default["project"],
515
+ location=default["location"],
516
+ repository_id=default["repositoryId"],
517
+ policy_data=admin.policy_data)
518
+ ```
519
+
520
+ ## securesourcemanager.RepositoryIamBinding
521
+
522
+ ```python
523
+ import pulumi
524
+ import pulumi_gcp as gcp
525
+
526
+ binding = gcp.securesourcemanager.RepositoryIamBinding("binding",
527
+ project=default["project"],
528
+ location=default["location"],
529
+ repository_id=default["repositoryId"],
530
+ role="roles/securesourcemanager.repoAdmin",
531
+ members=["user:jane@example.com"])
532
+ ```
533
+
534
+ ## securesourcemanager.RepositoryIamMember
535
+
536
+ ```python
537
+ import pulumi
538
+ import pulumi_gcp as gcp
539
+
540
+ member = gcp.securesourcemanager.RepositoryIamMember("member",
541
+ project=default["project"],
542
+ location=default["location"],
543
+ repository_id=default["repositoryId"],
544
+ role="roles/securesourcemanager.repoAdmin",
545
+ member="user:jane@example.com")
546
+ ```
547
+
548
+ ## securesourcemanager.RepositoryIamPolicy
549
+
550
+ ```python
551
+ import pulumi
552
+ import pulumi_gcp as gcp
553
+
554
+ admin = gcp.organizations.get_iam_policy(bindings=[{
555
+ "role": "roles/securesourcemanager.repoAdmin",
556
+ "members": ["user:jane@example.com"],
557
+ }])
558
+ policy = gcp.securesourcemanager.RepositoryIamPolicy("policy",
559
+ project=default["project"],
560
+ location=default["location"],
561
+ repository_id=default["repositoryId"],
562
+ policy_data=admin.policy_data)
563
+ ```
564
+
565
+ ## securesourcemanager.RepositoryIamBinding
566
+
567
+ ```python
568
+ import pulumi
569
+ import pulumi_gcp as gcp
570
+
571
+ binding = gcp.securesourcemanager.RepositoryIamBinding("binding",
572
+ project=default["project"],
573
+ location=default["location"],
574
+ repository_id=default["repositoryId"],
575
+ role="roles/securesourcemanager.repoAdmin",
576
+ members=["user:jane@example.com"])
577
+ ```
578
+
579
+ ## securesourcemanager.RepositoryIamMember
580
+
581
+ ```python
582
+ import pulumi
583
+ import pulumi_gcp as gcp
584
+
585
+ member = gcp.securesourcemanager.RepositoryIamMember("member",
586
+ project=default["project"],
587
+ location=default["location"],
588
+ repository_id=default["repositoryId"],
589
+ role="roles/securesourcemanager.repoAdmin",
590
+ member="user:jane@example.com")
591
+ ```
592
+
593
+ ## Import
594
+
595
+ For all import syntaxes, the "resource in question" can take any of the following forms:
596
+
597
+ * projects/{{project}}/locations/{{location}}/repositories/{{repository_id}}
598
+
599
+ * {{project}}/{{location}}/{{repository_id}}
600
+
601
+ * {{location}}/{{repository_id}}
602
+
603
+ * {{repository_id}}
604
+
605
+ Any variables not passed in the import command will be taken from the provider configuration.
606
+
607
+ Secure Source Manager repository IAM resources can be imported using the resource identifiers, role, and member.
608
+
609
+ IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
610
+
611
+ ```sh
612
+ $ pulumi import gcp:securesourcemanager/repositoryIamMember:RepositoryIamMember editor "projects/{{project}}/locations/{{location}}/repositories/{{repository_id}} roles/securesourcemanager.repoAdmin user:jane@example.com"
613
+ ```
614
+
615
+ IAM binding imports use space-delimited identifiers: the resource in question and the role, e.g.
616
+
617
+ ```sh
618
+ $ pulumi import gcp:securesourcemanager/repositoryIamMember:RepositoryIamMember editor "projects/{{project}}/locations/{{location}}/repositories/{{repository_id}} roles/securesourcemanager.repoAdmin"
619
+ ```
620
+
621
+ IAM policy imports use the identifier of the resource in question, e.g.
622
+
623
+ ```sh
624
+ $ pulumi import gcp:securesourcemanager/repositoryIamMember:RepositoryIamMember editor projects/{{project}}/locations/{{location}}/repositories/{{repository_id}}
625
+ ```
626
+
627
+ -> **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
628
+
629
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
630
+
631
+ :param str resource_name: The name of the resource.
632
+ :param RepositoryIamMemberArgs args: The arguments to use to populate this resource's properties.
633
+ :param pulumi.ResourceOptions opts: Options for the resource.
634
+ """
635
+ ...
636
+ def __init__(__self__, resource_name: str, *args, **kwargs):
637
+ resource_args, opts = _utilities.get_resource_args_opts(RepositoryIamMemberArgs, pulumi.ResourceOptions, *args, **kwargs)
638
+ if resource_args is not None:
639
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
640
+ else:
641
+ __self__._internal_init(resource_name, *args, **kwargs)
642
+
643
+ def _internal_init(__self__,
644
+ resource_name: str,
645
+ opts: Optional[pulumi.ResourceOptions] = None,
646
+ condition: Optional[pulumi.Input[Union['RepositoryIamMemberConditionArgs', 'RepositoryIamMemberConditionArgsDict']]] = None,
647
+ location: Optional[pulumi.Input[str]] = None,
648
+ member: Optional[pulumi.Input[str]] = None,
649
+ project: Optional[pulumi.Input[str]] = None,
650
+ repository_id: Optional[pulumi.Input[str]] = None,
651
+ role: Optional[pulumi.Input[str]] = None,
652
+ __props__=None):
653
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
654
+ if not isinstance(opts, pulumi.ResourceOptions):
655
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
656
+ if opts.id is None:
657
+ if __props__ is not None:
658
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
659
+ __props__ = RepositoryIamMemberArgs.__new__(RepositoryIamMemberArgs)
660
+
661
+ __props__.__dict__["condition"] = condition
662
+ __props__.__dict__["location"] = location
663
+ if member is None and not opts.urn:
664
+ raise TypeError("Missing required property 'member'")
665
+ __props__.__dict__["member"] = member
666
+ __props__.__dict__["project"] = project
667
+ if repository_id is None and not opts.urn:
668
+ raise TypeError("Missing required property 'repository_id'")
669
+ __props__.__dict__["repository_id"] = repository_id
670
+ if role is None and not opts.urn:
671
+ raise TypeError("Missing required property 'role'")
672
+ __props__.__dict__["role"] = role
673
+ __props__.__dict__["etag"] = None
674
+ super(RepositoryIamMember, __self__).__init__(
675
+ 'gcp:securesourcemanager/repositoryIamMember:RepositoryIamMember',
676
+ resource_name,
677
+ __props__,
678
+ opts)
679
+
680
+ @staticmethod
681
+ def get(resource_name: str,
682
+ id: pulumi.Input[str],
683
+ opts: Optional[pulumi.ResourceOptions] = None,
684
+ condition: Optional[pulumi.Input[Union['RepositoryIamMemberConditionArgs', 'RepositoryIamMemberConditionArgsDict']]] = None,
685
+ etag: Optional[pulumi.Input[str]] = None,
686
+ location: Optional[pulumi.Input[str]] = None,
687
+ member: Optional[pulumi.Input[str]] = None,
688
+ project: Optional[pulumi.Input[str]] = None,
689
+ repository_id: Optional[pulumi.Input[str]] = None,
690
+ role: Optional[pulumi.Input[str]] = None) -> 'RepositoryIamMember':
691
+ """
692
+ Get an existing RepositoryIamMember resource's state with the given name, id, and optional extra
693
+ properties used to qualify the lookup.
694
+
695
+ :param str resource_name: The unique name of the resulting resource.
696
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
697
+ :param pulumi.ResourceOptions opts: Options for the resource.
698
+ :param pulumi.Input[str] etag: (Computed) The etag of the IAM policy.
699
+ :param pulumi.Input[str] location: The location for the Repository.
700
+ Used to find the parent resource to bind the IAM policy to. If not specified,
701
+ the value will be parsed from the identifier of the parent resource. If no location is provided in the parent identifier and no
702
+ location is specified, it is taken from the provider configuration.
703
+ :param pulumi.Input[str] member: Identities that will be granted the privilege in `role`.
704
+ Each entry can have one of the following values:
705
+ * **allUsers**: A special identifier that represents anyone who is on the internet; with or without a Google account.
706
+ * **allAuthenticatedUsers**: A special identifier that represents anyone who is authenticated with a Google account or a service account.
707
+ * **user:{emailid}**: An email address that represents a specific Google account. For example, alice@gmail.com or joe@example.com.
708
+ * **serviceAccount:{emailid}**: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com.
709
+ * **group:{emailid}**: An email address that represents a Google group. For example, admins@example.com.
710
+ * **domain:{domain}**: A G Suite domain (primary, instead of alias) name that represents all the users of that domain. For example, google.com or example.com.
711
+ * **projectOwner:projectid**: Owners of the given project. For example, "projectOwner:my-example-project"
712
+ * **projectEditor:projectid**: Editors of the given project. For example, "projectEditor:my-example-project"
713
+ * **projectViewer:projectid**: Viewers of the given project. For example, "projectViewer:my-example-project"
714
+ :param pulumi.Input[str] project: The ID of the project in which the resource belongs.
715
+ If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.
716
+ :param pulumi.Input[str] repository_id: The ID for the Repository.
717
+ Used to find the parent resource to bind the IAM policy to
718
+ :param pulumi.Input[str] role: The role that should be applied. Only one
719
+ `securesourcemanager.RepositoryIamBinding` can be used per role. Note that custom roles must be of the format
720
+ `[projects|organizations]/{parent-name}/roles/{role-name}`.
721
+ """
722
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
723
+
724
+ __props__ = _RepositoryIamMemberState.__new__(_RepositoryIamMemberState)
725
+
726
+ __props__.__dict__["condition"] = condition
727
+ __props__.__dict__["etag"] = etag
728
+ __props__.__dict__["location"] = location
729
+ __props__.__dict__["member"] = member
730
+ __props__.__dict__["project"] = project
731
+ __props__.__dict__["repository_id"] = repository_id
732
+ __props__.__dict__["role"] = role
733
+ return RepositoryIamMember(resource_name, opts=opts, __props__=__props__)
734
+
735
+ @property
736
+ @pulumi.getter
737
+ def condition(self) -> pulumi.Output[Optional['outputs.RepositoryIamMemberCondition']]:
738
+ return pulumi.get(self, "condition")
739
+
740
+ @property
741
+ @pulumi.getter
742
+ def etag(self) -> pulumi.Output[str]:
743
+ """
744
+ (Computed) The etag of the IAM policy.
745
+ """
746
+ return pulumi.get(self, "etag")
747
+
748
+ @property
749
+ @pulumi.getter
750
+ def location(self) -> pulumi.Output[str]:
751
+ """
752
+ The location for the Repository.
753
+ Used to find the parent resource to bind the IAM policy to. If not specified,
754
+ the value will be parsed from the identifier of the parent resource. If no location is provided in the parent identifier and no
755
+ location is specified, it is taken from the provider configuration.
756
+ """
757
+ return pulumi.get(self, "location")
758
+
759
+ @property
760
+ @pulumi.getter
761
+ def member(self) -> pulumi.Output[str]:
762
+ """
763
+ Identities that will be granted the privilege in `role`.
764
+ Each entry can have one of the following values:
765
+ * **allUsers**: A special identifier that represents anyone who is on the internet; with or without a Google account.
766
+ * **allAuthenticatedUsers**: A special identifier that represents anyone who is authenticated with a Google account or a service account.
767
+ * **user:{emailid}**: An email address that represents a specific Google account. For example, alice@gmail.com or joe@example.com.
768
+ * **serviceAccount:{emailid}**: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com.
769
+ * **group:{emailid}**: An email address that represents a Google group. For example, admins@example.com.
770
+ * **domain:{domain}**: A G Suite domain (primary, instead of alias) name that represents all the users of that domain. For example, google.com or example.com.
771
+ * **projectOwner:projectid**: Owners of the given project. For example, "projectOwner:my-example-project"
772
+ * **projectEditor:projectid**: Editors of the given project. For example, "projectEditor:my-example-project"
773
+ * **projectViewer:projectid**: Viewers of the given project. For example, "projectViewer:my-example-project"
774
+ """
775
+ return pulumi.get(self, "member")
776
+
777
+ @property
778
+ @pulumi.getter
779
+ def project(self) -> pulumi.Output[str]:
780
+ """
781
+ The ID of the project in which the resource belongs.
782
+ If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.
783
+ """
784
+ return pulumi.get(self, "project")
785
+
786
+ @property
787
+ @pulumi.getter(name="repositoryId")
788
+ def repository_id(self) -> pulumi.Output[str]:
789
+ """
790
+ The ID for the Repository.
791
+ Used to find the parent resource to bind the IAM policy to
792
+ """
793
+ return pulumi.get(self, "repository_id")
794
+
795
+ @property
796
+ @pulumi.getter
797
+ def role(self) -> pulumi.Output[str]:
798
+ """
799
+ The role that should be applied. Only one
800
+ `securesourcemanager.RepositoryIamBinding` can be used per role. Note that custom roles must be of the format
801
+ `[projects|organizations]/{parent-name}/roles/{role-name}`.
802
+ """
803
+ return pulumi.get(self, "role")
804
+