pulumi-gcp 7.36.0a1723631483__py3-none-any.whl → 7.37.0a1723638212__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (53) hide show
  1. pulumi_gcp/__init__.py +72 -0
  2. pulumi_gcp/accesscontextmanager/__init__.py +2 -0
  3. pulumi_gcp/accesscontextmanager/_inputs.py +780 -0
  4. pulumi_gcp/accesscontextmanager/outputs.py +601 -0
  5. pulumi_gcp/accesscontextmanager/service_perimeter_dry_run_egress_policy.py +323 -0
  6. pulumi_gcp/accesscontextmanager/service_perimeter_dry_run_ingress_policy.py +332 -0
  7. pulumi_gcp/accesscontextmanager/service_perimeter_egress_policy.py +2 -24
  8. pulumi_gcp/accesscontextmanager/service_perimeter_ingress_policy.py +2 -24
  9. pulumi_gcp/applicationintegration/client.py +2 -2
  10. pulumi_gcp/clouddeploy/_inputs.py +21 -1
  11. pulumi_gcp/clouddeploy/outputs.py +15 -1
  12. pulumi_gcp/cloudrunv2/_inputs.py +40 -0
  13. pulumi_gcp/cloudrunv2/outputs.py +46 -0
  14. pulumi_gcp/compute/region_target_https_proxy.py +28 -0
  15. pulumi_gcp/container/_inputs.py +26 -0
  16. pulumi_gcp/container/outputs.py +29 -0
  17. pulumi_gcp/dataform/repository.py +80 -2
  18. pulumi_gcp/discoveryengine/data_store.py +93 -2
  19. pulumi_gcp/gkehub/_inputs.py +63 -0
  20. pulumi_gcp/gkehub/outputs.py +38 -0
  21. pulumi_gcp/logging/get_log_view_iam_policy.py +28 -2
  22. pulumi_gcp/logging/log_view_iam_binding.py +512 -0
  23. pulumi_gcp/logging/log_view_iam_member.py +512 -0
  24. pulumi_gcp/logging/log_view_iam_policy.py +512 -0
  25. pulumi_gcp/netapp/_inputs.py +6 -6
  26. pulumi_gcp/netapp/outputs.py +4 -4
  27. pulumi_gcp/networkconnectivity/regional_endpoint.py +6 -6
  28. pulumi_gcp/organizations/get_project.py +11 -1
  29. pulumi_gcp/organizations/project.py +76 -21
  30. pulumi_gcp/pulumi-plugin.json +1 -1
  31. pulumi_gcp/securitycenter/__init__.py +8 -0
  32. pulumi_gcp/securitycenter/_inputs.py +191 -0
  33. pulumi_gcp/securitycenter/get_v2_organization_source_iam_policy.py +146 -0
  34. pulumi_gcp/securitycenter/outputs.py +115 -0
  35. pulumi_gcp/securitycenter/v2_folder_mute_config.py +679 -0
  36. pulumi_gcp/securitycenter/v2_organization_source.py +416 -0
  37. pulumi_gcp/securitycenter/v2_organization_source_iam_binding.py +722 -0
  38. pulumi_gcp/securitycenter/v2_organization_source_iam_member.py +722 -0
  39. pulumi_gcp/securitycenter/v2_organization_source_iam_policy.py +561 -0
  40. pulumi_gcp/securitycenter/v2_project_mute_config.py +684 -0
  41. pulumi_gcp/securitycenter/v2_project_notification_config.py +559 -0
  42. pulumi_gcp/spanner/instance.py +0 -7
  43. pulumi_gcp/sql/_inputs.py +3 -3
  44. pulumi_gcp/sql/outputs.py +6 -6
  45. pulumi_gcp/storage/bucket_object.py +28 -0
  46. pulumi_gcp/storage/get_bucket_object.py +14 -1
  47. pulumi_gcp/storage/get_bucket_object_content.py +11 -1
  48. pulumi_gcp/storage/managed_folder.py +72 -2
  49. pulumi_gcp/vmwareengine/network_policy.py +6 -6
  50. {pulumi_gcp-7.36.0a1723631483.dist-info → pulumi_gcp-7.37.0a1723638212.dist-info}/METADATA +1 -1
  51. {pulumi_gcp-7.36.0a1723631483.dist-info → pulumi_gcp-7.37.0a1723638212.dist-info}/RECORD +53 -43
  52. {pulumi_gcp-7.36.0a1723631483.dist-info → pulumi_gcp-7.37.0a1723638212.dist-info}/WHEEL +0 -0
  53. {pulumi_gcp-7.36.0a1723631483.dist-info → pulumi_gcp-7.37.0a1723638212.dist-info}/top_level.txt +0 -0
@@ -229,6 +229,262 @@ class LogViewIamPolicy(pulumi.CustomResource):
229
229
  policy_data: Optional[pulumi.Input[str]] = None,
230
230
  __props__=None):
231
231
  """
232
+ Three different resources help you manage your IAM policy for Cloud (Stackdriver) Logging LogView. Each of these resources serves a different use case:
233
+
234
+ * `logging.LogViewIamPolicy`: Authoritative. Sets the IAM policy for the logview and replaces any existing policy already attached.
235
+ * `logging.LogViewIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the logview are preserved.
236
+ * `logging.LogViewIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the logview are preserved.
237
+
238
+ A data source can be used to retrieve policy data in advent you do not need creation
239
+
240
+ * `logging.LogViewIamPolicy`: Retrieves the IAM policy for the logview
241
+
242
+ > **Note:** `logging.LogViewIamPolicy` **cannot** be used in conjunction with `logging.LogViewIamBinding` and `logging.LogViewIamMember` or they will fight over what your policy should be.
243
+
244
+ > **Note:** `logging.LogViewIamBinding` resources **can be** used in conjunction with `logging.LogViewIamMember` resources **only if** they do not grant privilege to the same role.
245
+
246
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
247
+
248
+ ## logging.LogViewIamPolicy
249
+
250
+ ```python
251
+ import pulumi
252
+ import pulumi_gcp as gcp
253
+
254
+ admin = gcp.organizations.get_iam_policy(bindings=[{
255
+ "role": "roles/logging.admin",
256
+ "members": ["user:jane@example.com"],
257
+ }])
258
+ policy = gcp.logging.LogViewIamPolicy("policy",
259
+ parent=logging_log_view["parent"],
260
+ location=logging_log_view["location"],
261
+ bucket=logging_log_view["bucket"],
262
+ name=logging_log_view["name"],
263
+ policy_data=admin.policy_data)
264
+ ```
265
+
266
+ With IAM Conditions:
267
+
268
+ ```python
269
+ import pulumi
270
+ import pulumi_gcp as gcp
271
+
272
+ admin = gcp.organizations.get_iam_policy(bindings=[{
273
+ "role": "roles/logging.admin",
274
+ "members": ["user:jane@example.com"],
275
+ "condition": {
276
+ "title": "expires_after_2019_12_31",
277
+ "description": "Expiring at midnight of 2019-12-31",
278
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
279
+ },
280
+ }])
281
+ policy = gcp.logging.LogViewIamPolicy("policy",
282
+ parent=logging_log_view["parent"],
283
+ location=logging_log_view["location"],
284
+ bucket=logging_log_view["bucket"],
285
+ name=logging_log_view["name"],
286
+ policy_data=admin.policy_data)
287
+ ```
288
+ ## logging.LogViewIamBinding
289
+
290
+ ```python
291
+ import pulumi
292
+ import pulumi_gcp as gcp
293
+
294
+ binding = gcp.logging.LogViewIamBinding("binding",
295
+ parent=logging_log_view["parent"],
296
+ location=logging_log_view["location"],
297
+ bucket=logging_log_view["bucket"],
298
+ name=logging_log_view["name"],
299
+ role="roles/logging.admin",
300
+ members=["user:jane@example.com"])
301
+ ```
302
+
303
+ With IAM Conditions:
304
+
305
+ ```python
306
+ import pulumi
307
+ import pulumi_gcp as gcp
308
+
309
+ binding = gcp.logging.LogViewIamBinding("binding",
310
+ parent=logging_log_view["parent"],
311
+ location=logging_log_view["location"],
312
+ bucket=logging_log_view["bucket"],
313
+ name=logging_log_view["name"],
314
+ role="roles/logging.admin",
315
+ members=["user:jane@example.com"],
316
+ condition={
317
+ "title": "expires_after_2019_12_31",
318
+ "description": "Expiring at midnight of 2019-12-31",
319
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
320
+ })
321
+ ```
322
+ ## logging.LogViewIamMember
323
+
324
+ ```python
325
+ import pulumi
326
+ import pulumi_gcp as gcp
327
+
328
+ member = gcp.logging.LogViewIamMember("member",
329
+ parent=logging_log_view["parent"],
330
+ location=logging_log_view["location"],
331
+ bucket=logging_log_view["bucket"],
332
+ name=logging_log_view["name"],
333
+ role="roles/logging.admin",
334
+ member="user:jane@example.com")
335
+ ```
336
+
337
+ With IAM Conditions:
338
+
339
+ ```python
340
+ import pulumi
341
+ import pulumi_gcp as gcp
342
+
343
+ member = gcp.logging.LogViewIamMember("member",
344
+ parent=logging_log_view["parent"],
345
+ location=logging_log_view["location"],
346
+ bucket=logging_log_view["bucket"],
347
+ name=logging_log_view["name"],
348
+ role="roles/logging.admin",
349
+ member="user:jane@example.com",
350
+ condition={
351
+ "title": "expires_after_2019_12_31",
352
+ "description": "Expiring at midnight of 2019-12-31",
353
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
354
+ })
355
+ ```
356
+
357
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
358
+
359
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
360
+ ---
361
+
362
+ # IAM policy for Cloud (Stackdriver) Logging LogView
363
+ Three different resources help you manage your IAM policy for Cloud (Stackdriver) Logging LogView. Each of these resources serves a different use case:
364
+
365
+ * `logging.LogViewIamPolicy`: Authoritative. Sets the IAM policy for the logview and replaces any existing policy already attached.
366
+ * `logging.LogViewIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the logview are preserved.
367
+ * `logging.LogViewIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the logview are preserved.
368
+
369
+ A data source can be used to retrieve policy data in advent you do not need creation
370
+
371
+ * `logging.LogViewIamPolicy`: Retrieves the IAM policy for the logview
372
+
373
+ > **Note:** `logging.LogViewIamPolicy` **cannot** be used in conjunction with `logging.LogViewIamBinding` and `logging.LogViewIamMember` or they will fight over what your policy should be.
374
+
375
+ > **Note:** `logging.LogViewIamBinding` resources **can be** used in conjunction with `logging.LogViewIamMember` resources **only if** they do not grant privilege to the same role.
376
+
377
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
378
+
379
+ ## logging.LogViewIamPolicy
380
+
381
+ ```python
382
+ import pulumi
383
+ import pulumi_gcp as gcp
384
+
385
+ admin = gcp.organizations.get_iam_policy(bindings=[{
386
+ "role": "roles/logging.admin",
387
+ "members": ["user:jane@example.com"],
388
+ }])
389
+ policy = gcp.logging.LogViewIamPolicy("policy",
390
+ parent=logging_log_view["parent"],
391
+ location=logging_log_view["location"],
392
+ bucket=logging_log_view["bucket"],
393
+ name=logging_log_view["name"],
394
+ policy_data=admin.policy_data)
395
+ ```
396
+
397
+ With IAM Conditions:
398
+
399
+ ```python
400
+ import pulumi
401
+ import pulumi_gcp as gcp
402
+
403
+ admin = gcp.organizations.get_iam_policy(bindings=[{
404
+ "role": "roles/logging.admin",
405
+ "members": ["user:jane@example.com"],
406
+ "condition": {
407
+ "title": "expires_after_2019_12_31",
408
+ "description": "Expiring at midnight of 2019-12-31",
409
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
410
+ },
411
+ }])
412
+ policy = gcp.logging.LogViewIamPolicy("policy",
413
+ parent=logging_log_view["parent"],
414
+ location=logging_log_view["location"],
415
+ bucket=logging_log_view["bucket"],
416
+ name=logging_log_view["name"],
417
+ policy_data=admin.policy_data)
418
+ ```
419
+ ## logging.LogViewIamBinding
420
+
421
+ ```python
422
+ import pulumi
423
+ import pulumi_gcp as gcp
424
+
425
+ binding = gcp.logging.LogViewIamBinding("binding",
426
+ parent=logging_log_view["parent"],
427
+ location=logging_log_view["location"],
428
+ bucket=logging_log_view["bucket"],
429
+ name=logging_log_view["name"],
430
+ role="roles/logging.admin",
431
+ members=["user:jane@example.com"])
432
+ ```
433
+
434
+ With IAM Conditions:
435
+
436
+ ```python
437
+ import pulumi
438
+ import pulumi_gcp as gcp
439
+
440
+ binding = gcp.logging.LogViewIamBinding("binding",
441
+ parent=logging_log_view["parent"],
442
+ location=logging_log_view["location"],
443
+ bucket=logging_log_view["bucket"],
444
+ name=logging_log_view["name"],
445
+ role="roles/logging.admin",
446
+ members=["user:jane@example.com"],
447
+ condition={
448
+ "title": "expires_after_2019_12_31",
449
+ "description": "Expiring at midnight of 2019-12-31",
450
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
451
+ })
452
+ ```
453
+ ## logging.LogViewIamMember
454
+
455
+ ```python
456
+ import pulumi
457
+ import pulumi_gcp as gcp
458
+
459
+ member = gcp.logging.LogViewIamMember("member",
460
+ parent=logging_log_view["parent"],
461
+ location=logging_log_view["location"],
462
+ bucket=logging_log_view["bucket"],
463
+ name=logging_log_view["name"],
464
+ role="roles/logging.admin",
465
+ member="user:jane@example.com")
466
+ ```
467
+
468
+ With IAM Conditions:
469
+
470
+ ```python
471
+ import pulumi
472
+ import pulumi_gcp as gcp
473
+
474
+ member = gcp.logging.LogViewIamMember("member",
475
+ parent=logging_log_view["parent"],
476
+ location=logging_log_view["location"],
477
+ bucket=logging_log_view["bucket"],
478
+ name=logging_log_view["name"],
479
+ role="roles/logging.admin",
480
+ member="user:jane@example.com",
481
+ condition={
482
+ "title": "expires_after_2019_12_31",
483
+ "description": "Expiring at midnight of 2019-12-31",
484
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
485
+ })
486
+ ```
487
+
232
488
  ## Import
233
489
 
234
490
  For all import syntaxes, the "resource in question" can take any of the following forms:
@@ -281,6 +537,262 @@ class LogViewIamPolicy(pulumi.CustomResource):
281
537
  args: LogViewIamPolicyArgs,
282
538
  opts: Optional[pulumi.ResourceOptions] = None):
283
539
  """
540
+ Three different resources help you manage your IAM policy for Cloud (Stackdriver) Logging LogView. Each of these resources serves a different use case:
541
+
542
+ * `logging.LogViewIamPolicy`: Authoritative. Sets the IAM policy for the logview and replaces any existing policy already attached.
543
+ * `logging.LogViewIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the logview are preserved.
544
+ * `logging.LogViewIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the logview are preserved.
545
+
546
+ A data source can be used to retrieve policy data in advent you do not need creation
547
+
548
+ * `logging.LogViewIamPolicy`: Retrieves the IAM policy for the logview
549
+
550
+ > **Note:** `logging.LogViewIamPolicy` **cannot** be used in conjunction with `logging.LogViewIamBinding` and `logging.LogViewIamMember` or they will fight over what your policy should be.
551
+
552
+ > **Note:** `logging.LogViewIamBinding` resources **can be** used in conjunction with `logging.LogViewIamMember` resources **only if** they do not grant privilege to the same role.
553
+
554
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
555
+
556
+ ## logging.LogViewIamPolicy
557
+
558
+ ```python
559
+ import pulumi
560
+ import pulumi_gcp as gcp
561
+
562
+ admin = gcp.organizations.get_iam_policy(bindings=[{
563
+ "role": "roles/logging.admin",
564
+ "members": ["user:jane@example.com"],
565
+ }])
566
+ policy = gcp.logging.LogViewIamPolicy("policy",
567
+ parent=logging_log_view["parent"],
568
+ location=logging_log_view["location"],
569
+ bucket=logging_log_view["bucket"],
570
+ name=logging_log_view["name"],
571
+ policy_data=admin.policy_data)
572
+ ```
573
+
574
+ With IAM Conditions:
575
+
576
+ ```python
577
+ import pulumi
578
+ import pulumi_gcp as gcp
579
+
580
+ admin = gcp.organizations.get_iam_policy(bindings=[{
581
+ "role": "roles/logging.admin",
582
+ "members": ["user:jane@example.com"],
583
+ "condition": {
584
+ "title": "expires_after_2019_12_31",
585
+ "description": "Expiring at midnight of 2019-12-31",
586
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
587
+ },
588
+ }])
589
+ policy = gcp.logging.LogViewIamPolicy("policy",
590
+ parent=logging_log_view["parent"],
591
+ location=logging_log_view["location"],
592
+ bucket=logging_log_view["bucket"],
593
+ name=logging_log_view["name"],
594
+ policy_data=admin.policy_data)
595
+ ```
596
+ ## logging.LogViewIamBinding
597
+
598
+ ```python
599
+ import pulumi
600
+ import pulumi_gcp as gcp
601
+
602
+ binding = gcp.logging.LogViewIamBinding("binding",
603
+ parent=logging_log_view["parent"],
604
+ location=logging_log_view["location"],
605
+ bucket=logging_log_view["bucket"],
606
+ name=logging_log_view["name"],
607
+ role="roles/logging.admin",
608
+ members=["user:jane@example.com"])
609
+ ```
610
+
611
+ With IAM Conditions:
612
+
613
+ ```python
614
+ import pulumi
615
+ import pulumi_gcp as gcp
616
+
617
+ binding = gcp.logging.LogViewIamBinding("binding",
618
+ parent=logging_log_view["parent"],
619
+ location=logging_log_view["location"],
620
+ bucket=logging_log_view["bucket"],
621
+ name=logging_log_view["name"],
622
+ role="roles/logging.admin",
623
+ members=["user:jane@example.com"],
624
+ condition={
625
+ "title": "expires_after_2019_12_31",
626
+ "description": "Expiring at midnight of 2019-12-31",
627
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
628
+ })
629
+ ```
630
+ ## logging.LogViewIamMember
631
+
632
+ ```python
633
+ import pulumi
634
+ import pulumi_gcp as gcp
635
+
636
+ member = gcp.logging.LogViewIamMember("member",
637
+ parent=logging_log_view["parent"],
638
+ location=logging_log_view["location"],
639
+ bucket=logging_log_view["bucket"],
640
+ name=logging_log_view["name"],
641
+ role="roles/logging.admin",
642
+ member="user:jane@example.com")
643
+ ```
644
+
645
+ With IAM Conditions:
646
+
647
+ ```python
648
+ import pulumi
649
+ import pulumi_gcp as gcp
650
+
651
+ member = gcp.logging.LogViewIamMember("member",
652
+ parent=logging_log_view["parent"],
653
+ location=logging_log_view["location"],
654
+ bucket=logging_log_view["bucket"],
655
+ name=logging_log_view["name"],
656
+ role="roles/logging.admin",
657
+ member="user:jane@example.com",
658
+ condition={
659
+ "title": "expires_after_2019_12_31",
660
+ "description": "Expiring at midnight of 2019-12-31",
661
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
662
+ })
663
+ ```
664
+
665
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
666
+
667
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
668
+ ---
669
+
670
+ # IAM policy for Cloud (Stackdriver) Logging LogView
671
+ Three different resources help you manage your IAM policy for Cloud (Stackdriver) Logging LogView. Each of these resources serves a different use case:
672
+
673
+ * `logging.LogViewIamPolicy`: Authoritative. Sets the IAM policy for the logview and replaces any existing policy already attached.
674
+ * `logging.LogViewIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the logview are preserved.
675
+ * `logging.LogViewIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the logview are preserved.
676
+
677
+ A data source can be used to retrieve policy data in advent you do not need creation
678
+
679
+ * `logging.LogViewIamPolicy`: Retrieves the IAM policy for the logview
680
+
681
+ > **Note:** `logging.LogViewIamPolicy` **cannot** be used in conjunction with `logging.LogViewIamBinding` and `logging.LogViewIamMember` or they will fight over what your policy should be.
682
+
683
+ > **Note:** `logging.LogViewIamBinding` resources **can be** used in conjunction with `logging.LogViewIamMember` resources **only if** they do not grant privilege to the same role.
684
+
685
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
686
+
687
+ ## logging.LogViewIamPolicy
688
+
689
+ ```python
690
+ import pulumi
691
+ import pulumi_gcp as gcp
692
+
693
+ admin = gcp.organizations.get_iam_policy(bindings=[{
694
+ "role": "roles/logging.admin",
695
+ "members": ["user:jane@example.com"],
696
+ }])
697
+ policy = gcp.logging.LogViewIamPolicy("policy",
698
+ parent=logging_log_view["parent"],
699
+ location=logging_log_view["location"],
700
+ bucket=logging_log_view["bucket"],
701
+ name=logging_log_view["name"],
702
+ policy_data=admin.policy_data)
703
+ ```
704
+
705
+ With IAM Conditions:
706
+
707
+ ```python
708
+ import pulumi
709
+ import pulumi_gcp as gcp
710
+
711
+ admin = gcp.organizations.get_iam_policy(bindings=[{
712
+ "role": "roles/logging.admin",
713
+ "members": ["user:jane@example.com"],
714
+ "condition": {
715
+ "title": "expires_after_2019_12_31",
716
+ "description": "Expiring at midnight of 2019-12-31",
717
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
718
+ },
719
+ }])
720
+ policy = gcp.logging.LogViewIamPolicy("policy",
721
+ parent=logging_log_view["parent"],
722
+ location=logging_log_view["location"],
723
+ bucket=logging_log_view["bucket"],
724
+ name=logging_log_view["name"],
725
+ policy_data=admin.policy_data)
726
+ ```
727
+ ## logging.LogViewIamBinding
728
+
729
+ ```python
730
+ import pulumi
731
+ import pulumi_gcp as gcp
732
+
733
+ binding = gcp.logging.LogViewIamBinding("binding",
734
+ parent=logging_log_view["parent"],
735
+ location=logging_log_view["location"],
736
+ bucket=logging_log_view["bucket"],
737
+ name=logging_log_view["name"],
738
+ role="roles/logging.admin",
739
+ members=["user:jane@example.com"])
740
+ ```
741
+
742
+ With IAM Conditions:
743
+
744
+ ```python
745
+ import pulumi
746
+ import pulumi_gcp as gcp
747
+
748
+ binding = gcp.logging.LogViewIamBinding("binding",
749
+ parent=logging_log_view["parent"],
750
+ location=logging_log_view["location"],
751
+ bucket=logging_log_view["bucket"],
752
+ name=logging_log_view["name"],
753
+ role="roles/logging.admin",
754
+ members=["user:jane@example.com"],
755
+ condition={
756
+ "title": "expires_after_2019_12_31",
757
+ "description": "Expiring at midnight of 2019-12-31",
758
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
759
+ })
760
+ ```
761
+ ## logging.LogViewIamMember
762
+
763
+ ```python
764
+ import pulumi
765
+ import pulumi_gcp as gcp
766
+
767
+ member = gcp.logging.LogViewIamMember("member",
768
+ parent=logging_log_view["parent"],
769
+ location=logging_log_view["location"],
770
+ bucket=logging_log_view["bucket"],
771
+ name=logging_log_view["name"],
772
+ role="roles/logging.admin",
773
+ member="user:jane@example.com")
774
+ ```
775
+
776
+ With IAM Conditions:
777
+
778
+ ```python
779
+ import pulumi
780
+ import pulumi_gcp as gcp
781
+
782
+ member = gcp.logging.LogViewIamMember("member",
783
+ parent=logging_log_view["parent"],
784
+ location=logging_log_view["location"],
785
+ bucket=logging_log_view["bucket"],
786
+ name=logging_log_view["name"],
787
+ role="roles/logging.admin",
788
+ member="user:jane@example.com",
789
+ condition={
790
+ "title": "expires_after_2019_12_31",
791
+ "description": "Expiring at midnight of 2019-12-31",
792
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
793
+ })
794
+ ```
795
+
284
796
  ## Import
285
797
 
286
798
  For all import syntaxes, the "resource in question" can take any of the following forms:
@@ -620,12 +620,12 @@ if not MYPY:
620
620
  total_transfer_duration: NotRequired[pulumi.Input[str]]
621
621
  """
622
622
  (Output)
623
- Total time taken so far during current transfer.
623
+ Cumulative time taken across all transfers for the replication relationship.
624
624
  """
625
625
  transfer_bytes: NotRequired[pulumi.Input[str]]
626
626
  """
627
627
  (Output)
628
- Number of bytes transferred so far in current transfer.
628
+ Cumulative bytes transferred so far for the replication relationship.
629
629
  """
630
630
  update_time: NotRequired[pulumi.Input[str]]
631
631
  """
@@ -660,9 +660,9 @@ class VolumeReplicationTransferStatArgs:
660
660
  :param pulumi.Input[str] last_transfer_error: (Output)
661
661
  A message describing the cause of the last transfer failure.
662
662
  :param pulumi.Input[str] total_transfer_duration: (Output)
663
- Total time taken so far during current transfer.
663
+ Cumulative time taken across all transfers for the replication relationship.
664
664
  :param pulumi.Input[str] transfer_bytes: (Output)
665
- Number of bytes transferred so far in current transfer.
665
+ Cumulative bytes transferred so far for the replication relationship.
666
666
  :param pulumi.Input[str] update_time: (Output)
667
667
  Time when progress was updated last. A timestamp in RFC3339 UTC "Zulu" format. Examples: "2023-06-22T09:13:01.617Z".
668
668
  """
@@ -755,7 +755,7 @@ class VolumeReplicationTransferStatArgs:
755
755
  def total_transfer_duration(self) -> Optional[pulumi.Input[str]]:
756
756
  """
757
757
  (Output)
758
- Total time taken so far during current transfer.
758
+ Cumulative time taken across all transfers for the replication relationship.
759
759
  """
760
760
  return pulumi.get(self, "total_transfer_duration")
761
761
 
@@ -768,7 +768,7 @@ class VolumeReplicationTransferStatArgs:
768
768
  def transfer_bytes(self) -> Optional[pulumi.Input[str]]:
769
769
  """
770
770
  (Output)
771
- Number of bytes transferred so far in current transfer.
771
+ Cumulative bytes transferred so far for the replication relationship.
772
772
  """
773
773
  return pulumi.get(self, "transfer_bytes")
774
774
 
@@ -505,9 +505,9 @@ class VolumeReplicationTransferStat(dict):
505
505
  :param str last_transfer_error: (Output)
506
506
  A message describing the cause of the last transfer failure.
507
507
  :param str total_transfer_duration: (Output)
508
- Total time taken so far during current transfer.
508
+ Cumulative time taken across all transfers for the replication relationship.
509
509
  :param str transfer_bytes: (Output)
510
- Number of bytes transferred so far in current transfer.
510
+ Cumulative bytes transferred so far for the replication relationship.
511
511
  :param str update_time: (Output)
512
512
  Time when progress was updated last. A timestamp in RFC3339 UTC "Zulu" format. Examples: "2023-06-22T09:13:01.617Z".
513
513
  """
@@ -580,7 +580,7 @@ class VolumeReplicationTransferStat(dict):
580
580
  def total_transfer_duration(self) -> Optional[str]:
581
581
  """
582
582
  (Output)
583
- Total time taken so far during current transfer.
583
+ Cumulative time taken across all transfers for the replication relationship.
584
584
  """
585
585
  return pulumi.get(self, "total_transfer_duration")
586
586
 
@@ -589,7 +589,7 @@ class VolumeReplicationTransferStat(dict):
589
589
  def transfer_bytes(self) -> Optional[str]:
590
590
  """
591
591
  (Output)
592
- Number of bytes transferred so far in current transfer.
592
+ Cumulative bytes transferred so far for the replication relationship.
593
593
  """
594
594
  return pulumi.get(self, "transfer_bytes")
595
595
 
@@ -511,12 +511,12 @@ class RegionalEndpoint(pulumi.CustomResource):
511
511
  default = gcp.networkconnectivity.RegionalEndpoint("default",
512
512
  name="my-rep",
513
513
  location="us-central1",
514
- target_google_api="boqcodelabjaimin-pa.us-central1.p.rep.googleapis.com",
514
+ target_google_api="storage.us-central1.p.rep.googleapis.com",
515
515
  access_type="REGIONAL",
516
516
  address="192.168.0.5",
517
517
  network=my_network.id,
518
518
  subnetwork=my_subnetwork.id,
519
- description="My RegionalEndpoint targeting Google API boqcodelabjaimin-pa.us-central1.p.rep.googleapis.com",
519
+ description="My RegionalEndpoint targeting Google API storage.us-central1.p.rep.googleapis.com",
520
520
  labels={
521
521
  "env": "default",
522
522
  })
@@ -538,7 +538,7 @@ class RegionalEndpoint(pulumi.CustomResource):
538
538
  default = gcp.networkconnectivity.RegionalEndpoint("default",
539
539
  name="my-rep",
540
540
  location="us-central1",
541
- target_google_api="boqcodelabjaimin-pa.us-central1.p.rep.googleapis.com",
541
+ target_google_api="storage.us-central1.p.rep.googleapis.com",
542
542
  access_type="GLOBAL",
543
543
  address="192.168.0.4",
544
544
  network=my_network.id,
@@ -625,12 +625,12 @@ class RegionalEndpoint(pulumi.CustomResource):
625
625
  default = gcp.networkconnectivity.RegionalEndpoint("default",
626
626
  name="my-rep",
627
627
  location="us-central1",
628
- target_google_api="boqcodelabjaimin-pa.us-central1.p.rep.googleapis.com",
628
+ target_google_api="storage.us-central1.p.rep.googleapis.com",
629
629
  access_type="REGIONAL",
630
630
  address="192.168.0.5",
631
631
  network=my_network.id,
632
632
  subnetwork=my_subnetwork.id,
633
- description="My RegionalEndpoint targeting Google API boqcodelabjaimin-pa.us-central1.p.rep.googleapis.com",
633
+ description="My RegionalEndpoint targeting Google API storage.us-central1.p.rep.googleapis.com",
634
634
  labels={
635
635
  "env": "default",
636
636
  })
@@ -652,7 +652,7 @@ class RegionalEndpoint(pulumi.CustomResource):
652
652
  default = gcp.networkconnectivity.RegionalEndpoint("default",
653
653
  name="my-rep",
654
654
  location="us-central1",
655
- target_google_api="boqcodelabjaimin-pa.us-central1.p.rep.googleapis.com",
655
+ target_google_api="storage.us-central1.p.rep.googleapis.com",
656
656
  access_type="GLOBAL",
657
657
  address="192.168.0.4",
658
658
  network=my_network.id,