pulumi-gcp 7.36.0a1723631483__py3-none-any.whl → 7.37.0a1723638212__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +72 -0
- pulumi_gcp/accesscontextmanager/__init__.py +2 -0
- pulumi_gcp/accesscontextmanager/_inputs.py +780 -0
- pulumi_gcp/accesscontextmanager/outputs.py +601 -0
- pulumi_gcp/accesscontextmanager/service_perimeter_dry_run_egress_policy.py +323 -0
- pulumi_gcp/accesscontextmanager/service_perimeter_dry_run_ingress_policy.py +332 -0
- pulumi_gcp/accesscontextmanager/service_perimeter_egress_policy.py +2 -24
- pulumi_gcp/accesscontextmanager/service_perimeter_ingress_policy.py +2 -24
- pulumi_gcp/applicationintegration/client.py +2 -2
- pulumi_gcp/clouddeploy/_inputs.py +21 -1
- pulumi_gcp/clouddeploy/outputs.py +15 -1
- pulumi_gcp/cloudrunv2/_inputs.py +40 -0
- pulumi_gcp/cloudrunv2/outputs.py +46 -0
- pulumi_gcp/compute/region_target_https_proxy.py +28 -0
- pulumi_gcp/container/_inputs.py +26 -0
- pulumi_gcp/container/outputs.py +29 -0
- pulumi_gcp/dataform/repository.py +80 -2
- pulumi_gcp/discoveryengine/data_store.py +93 -2
- pulumi_gcp/gkehub/_inputs.py +63 -0
- pulumi_gcp/gkehub/outputs.py +38 -0
- pulumi_gcp/logging/get_log_view_iam_policy.py +28 -2
- pulumi_gcp/logging/log_view_iam_binding.py +512 -0
- pulumi_gcp/logging/log_view_iam_member.py +512 -0
- pulumi_gcp/logging/log_view_iam_policy.py +512 -0
- pulumi_gcp/netapp/_inputs.py +6 -6
- pulumi_gcp/netapp/outputs.py +4 -4
- pulumi_gcp/networkconnectivity/regional_endpoint.py +6 -6
- pulumi_gcp/organizations/get_project.py +11 -1
- pulumi_gcp/organizations/project.py +76 -21
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/securitycenter/__init__.py +8 -0
- pulumi_gcp/securitycenter/_inputs.py +191 -0
- pulumi_gcp/securitycenter/get_v2_organization_source_iam_policy.py +146 -0
- pulumi_gcp/securitycenter/outputs.py +115 -0
- pulumi_gcp/securitycenter/v2_folder_mute_config.py +679 -0
- pulumi_gcp/securitycenter/v2_organization_source.py +416 -0
- pulumi_gcp/securitycenter/v2_organization_source_iam_binding.py +722 -0
- pulumi_gcp/securitycenter/v2_organization_source_iam_member.py +722 -0
- pulumi_gcp/securitycenter/v2_organization_source_iam_policy.py +561 -0
- pulumi_gcp/securitycenter/v2_project_mute_config.py +684 -0
- pulumi_gcp/securitycenter/v2_project_notification_config.py +559 -0
- pulumi_gcp/spanner/instance.py +0 -7
- pulumi_gcp/sql/_inputs.py +3 -3
- pulumi_gcp/sql/outputs.py +6 -6
- pulumi_gcp/storage/bucket_object.py +28 -0
- pulumi_gcp/storage/get_bucket_object.py +14 -1
- pulumi_gcp/storage/get_bucket_object_content.py +11 -1
- pulumi_gcp/storage/managed_folder.py +72 -2
- pulumi_gcp/vmwareengine/network_policy.py +6 -6
- {pulumi_gcp-7.36.0a1723631483.dist-info → pulumi_gcp-7.37.0a1723638212.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.36.0a1723631483.dist-info → pulumi_gcp-7.37.0a1723638212.dist-info}/RECORD +53 -43
- {pulumi_gcp-7.36.0a1723631483.dist-info → pulumi_gcp-7.37.0a1723638212.dist-info}/WHEEL +0 -0
- {pulumi_gcp-7.36.0a1723631483.dist-info → pulumi_gcp-7.37.0a1723638212.dist-info}/top_level.txt +0 -0
@@ -229,6 +229,262 @@ class LogViewIamPolicy(pulumi.CustomResource):
|
|
229
229
|
policy_data: Optional[pulumi.Input[str]] = None,
|
230
230
|
__props__=None):
|
231
231
|
"""
|
232
|
+
Three different resources help you manage your IAM policy for Cloud (Stackdriver) Logging LogView. Each of these resources serves a different use case:
|
233
|
+
|
234
|
+
* `logging.LogViewIamPolicy`: Authoritative. Sets the IAM policy for the logview and replaces any existing policy already attached.
|
235
|
+
* `logging.LogViewIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the logview are preserved.
|
236
|
+
* `logging.LogViewIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the logview are preserved.
|
237
|
+
|
238
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
239
|
+
|
240
|
+
* `logging.LogViewIamPolicy`: Retrieves the IAM policy for the logview
|
241
|
+
|
242
|
+
> **Note:** `logging.LogViewIamPolicy` **cannot** be used in conjunction with `logging.LogViewIamBinding` and `logging.LogViewIamMember` or they will fight over what your policy should be.
|
243
|
+
|
244
|
+
> **Note:** `logging.LogViewIamBinding` resources **can be** used in conjunction with `logging.LogViewIamMember` resources **only if** they do not grant privilege to the same role.
|
245
|
+
|
246
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
247
|
+
|
248
|
+
## logging.LogViewIamPolicy
|
249
|
+
|
250
|
+
```python
|
251
|
+
import pulumi
|
252
|
+
import pulumi_gcp as gcp
|
253
|
+
|
254
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
255
|
+
"role": "roles/logging.admin",
|
256
|
+
"members": ["user:jane@example.com"],
|
257
|
+
}])
|
258
|
+
policy = gcp.logging.LogViewIamPolicy("policy",
|
259
|
+
parent=logging_log_view["parent"],
|
260
|
+
location=logging_log_view["location"],
|
261
|
+
bucket=logging_log_view["bucket"],
|
262
|
+
name=logging_log_view["name"],
|
263
|
+
policy_data=admin.policy_data)
|
264
|
+
```
|
265
|
+
|
266
|
+
With IAM Conditions:
|
267
|
+
|
268
|
+
```python
|
269
|
+
import pulumi
|
270
|
+
import pulumi_gcp as gcp
|
271
|
+
|
272
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
273
|
+
"role": "roles/logging.admin",
|
274
|
+
"members": ["user:jane@example.com"],
|
275
|
+
"condition": {
|
276
|
+
"title": "expires_after_2019_12_31",
|
277
|
+
"description": "Expiring at midnight of 2019-12-31",
|
278
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
279
|
+
},
|
280
|
+
}])
|
281
|
+
policy = gcp.logging.LogViewIamPolicy("policy",
|
282
|
+
parent=logging_log_view["parent"],
|
283
|
+
location=logging_log_view["location"],
|
284
|
+
bucket=logging_log_view["bucket"],
|
285
|
+
name=logging_log_view["name"],
|
286
|
+
policy_data=admin.policy_data)
|
287
|
+
```
|
288
|
+
## logging.LogViewIamBinding
|
289
|
+
|
290
|
+
```python
|
291
|
+
import pulumi
|
292
|
+
import pulumi_gcp as gcp
|
293
|
+
|
294
|
+
binding = gcp.logging.LogViewIamBinding("binding",
|
295
|
+
parent=logging_log_view["parent"],
|
296
|
+
location=logging_log_view["location"],
|
297
|
+
bucket=logging_log_view["bucket"],
|
298
|
+
name=logging_log_view["name"],
|
299
|
+
role="roles/logging.admin",
|
300
|
+
members=["user:jane@example.com"])
|
301
|
+
```
|
302
|
+
|
303
|
+
With IAM Conditions:
|
304
|
+
|
305
|
+
```python
|
306
|
+
import pulumi
|
307
|
+
import pulumi_gcp as gcp
|
308
|
+
|
309
|
+
binding = gcp.logging.LogViewIamBinding("binding",
|
310
|
+
parent=logging_log_view["parent"],
|
311
|
+
location=logging_log_view["location"],
|
312
|
+
bucket=logging_log_view["bucket"],
|
313
|
+
name=logging_log_view["name"],
|
314
|
+
role="roles/logging.admin",
|
315
|
+
members=["user:jane@example.com"],
|
316
|
+
condition={
|
317
|
+
"title": "expires_after_2019_12_31",
|
318
|
+
"description": "Expiring at midnight of 2019-12-31",
|
319
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
320
|
+
})
|
321
|
+
```
|
322
|
+
## logging.LogViewIamMember
|
323
|
+
|
324
|
+
```python
|
325
|
+
import pulumi
|
326
|
+
import pulumi_gcp as gcp
|
327
|
+
|
328
|
+
member = gcp.logging.LogViewIamMember("member",
|
329
|
+
parent=logging_log_view["parent"],
|
330
|
+
location=logging_log_view["location"],
|
331
|
+
bucket=logging_log_view["bucket"],
|
332
|
+
name=logging_log_view["name"],
|
333
|
+
role="roles/logging.admin",
|
334
|
+
member="user:jane@example.com")
|
335
|
+
```
|
336
|
+
|
337
|
+
With IAM Conditions:
|
338
|
+
|
339
|
+
```python
|
340
|
+
import pulumi
|
341
|
+
import pulumi_gcp as gcp
|
342
|
+
|
343
|
+
member = gcp.logging.LogViewIamMember("member",
|
344
|
+
parent=logging_log_view["parent"],
|
345
|
+
location=logging_log_view["location"],
|
346
|
+
bucket=logging_log_view["bucket"],
|
347
|
+
name=logging_log_view["name"],
|
348
|
+
role="roles/logging.admin",
|
349
|
+
member="user:jane@example.com",
|
350
|
+
condition={
|
351
|
+
"title": "expires_after_2019_12_31",
|
352
|
+
"description": "Expiring at midnight of 2019-12-31",
|
353
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
354
|
+
})
|
355
|
+
```
|
356
|
+
|
357
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
358
|
+
|
359
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
360
|
+
---
|
361
|
+
|
362
|
+
# IAM policy for Cloud (Stackdriver) Logging LogView
|
363
|
+
Three different resources help you manage your IAM policy for Cloud (Stackdriver) Logging LogView. Each of these resources serves a different use case:
|
364
|
+
|
365
|
+
* `logging.LogViewIamPolicy`: Authoritative. Sets the IAM policy for the logview and replaces any existing policy already attached.
|
366
|
+
* `logging.LogViewIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the logview are preserved.
|
367
|
+
* `logging.LogViewIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the logview are preserved.
|
368
|
+
|
369
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
370
|
+
|
371
|
+
* `logging.LogViewIamPolicy`: Retrieves the IAM policy for the logview
|
372
|
+
|
373
|
+
> **Note:** `logging.LogViewIamPolicy` **cannot** be used in conjunction with `logging.LogViewIamBinding` and `logging.LogViewIamMember` or they will fight over what your policy should be.
|
374
|
+
|
375
|
+
> **Note:** `logging.LogViewIamBinding` resources **can be** used in conjunction with `logging.LogViewIamMember` resources **only if** they do not grant privilege to the same role.
|
376
|
+
|
377
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
378
|
+
|
379
|
+
## logging.LogViewIamPolicy
|
380
|
+
|
381
|
+
```python
|
382
|
+
import pulumi
|
383
|
+
import pulumi_gcp as gcp
|
384
|
+
|
385
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
386
|
+
"role": "roles/logging.admin",
|
387
|
+
"members": ["user:jane@example.com"],
|
388
|
+
}])
|
389
|
+
policy = gcp.logging.LogViewIamPolicy("policy",
|
390
|
+
parent=logging_log_view["parent"],
|
391
|
+
location=logging_log_view["location"],
|
392
|
+
bucket=logging_log_view["bucket"],
|
393
|
+
name=logging_log_view["name"],
|
394
|
+
policy_data=admin.policy_data)
|
395
|
+
```
|
396
|
+
|
397
|
+
With IAM Conditions:
|
398
|
+
|
399
|
+
```python
|
400
|
+
import pulumi
|
401
|
+
import pulumi_gcp as gcp
|
402
|
+
|
403
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
404
|
+
"role": "roles/logging.admin",
|
405
|
+
"members": ["user:jane@example.com"],
|
406
|
+
"condition": {
|
407
|
+
"title": "expires_after_2019_12_31",
|
408
|
+
"description": "Expiring at midnight of 2019-12-31",
|
409
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
410
|
+
},
|
411
|
+
}])
|
412
|
+
policy = gcp.logging.LogViewIamPolicy("policy",
|
413
|
+
parent=logging_log_view["parent"],
|
414
|
+
location=logging_log_view["location"],
|
415
|
+
bucket=logging_log_view["bucket"],
|
416
|
+
name=logging_log_view["name"],
|
417
|
+
policy_data=admin.policy_data)
|
418
|
+
```
|
419
|
+
## logging.LogViewIamBinding
|
420
|
+
|
421
|
+
```python
|
422
|
+
import pulumi
|
423
|
+
import pulumi_gcp as gcp
|
424
|
+
|
425
|
+
binding = gcp.logging.LogViewIamBinding("binding",
|
426
|
+
parent=logging_log_view["parent"],
|
427
|
+
location=logging_log_view["location"],
|
428
|
+
bucket=logging_log_view["bucket"],
|
429
|
+
name=logging_log_view["name"],
|
430
|
+
role="roles/logging.admin",
|
431
|
+
members=["user:jane@example.com"])
|
432
|
+
```
|
433
|
+
|
434
|
+
With IAM Conditions:
|
435
|
+
|
436
|
+
```python
|
437
|
+
import pulumi
|
438
|
+
import pulumi_gcp as gcp
|
439
|
+
|
440
|
+
binding = gcp.logging.LogViewIamBinding("binding",
|
441
|
+
parent=logging_log_view["parent"],
|
442
|
+
location=logging_log_view["location"],
|
443
|
+
bucket=logging_log_view["bucket"],
|
444
|
+
name=logging_log_view["name"],
|
445
|
+
role="roles/logging.admin",
|
446
|
+
members=["user:jane@example.com"],
|
447
|
+
condition={
|
448
|
+
"title": "expires_after_2019_12_31",
|
449
|
+
"description": "Expiring at midnight of 2019-12-31",
|
450
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
451
|
+
})
|
452
|
+
```
|
453
|
+
## logging.LogViewIamMember
|
454
|
+
|
455
|
+
```python
|
456
|
+
import pulumi
|
457
|
+
import pulumi_gcp as gcp
|
458
|
+
|
459
|
+
member = gcp.logging.LogViewIamMember("member",
|
460
|
+
parent=logging_log_view["parent"],
|
461
|
+
location=logging_log_view["location"],
|
462
|
+
bucket=logging_log_view["bucket"],
|
463
|
+
name=logging_log_view["name"],
|
464
|
+
role="roles/logging.admin",
|
465
|
+
member="user:jane@example.com")
|
466
|
+
```
|
467
|
+
|
468
|
+
With IAM Conditions:
|
469
|
+
|
470
|
+
```python
|
471
|
+
import pulumi
|
472
|
+
import pulumi_gcp as gcp
|
473
|
+
|
474
|
+
member = gcp.logging.LogViewIamMember("member",
|
475
|
+
parent=logging_log_view["parent"],
|
476
|
+
location=logging_log_view["location"],
|
477
|
+
bucket=logging_log_view["bucket"],
|
478
|
+
name=logging_log_view["name"],
|
479
|
+
role="roles/logging.admin",
|
480
|
+
member="user:jane@example.com",
|
481
|
+
condition={
|
482
|
+
"title": "expires_after_2019_12_31",
|
483
|
+
"description": "Expiring at midnight of 2019-12-31",
|
484
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
485
|
+
})
|
486
|
+
```
|
487
|
+
|
232
488
|
## Import
|
233
489
|
|
234
490
|
For all import syntaxes, the "resource in question" can take any of the following forms:
|
@@ -281,6 +537,262 @@ class LogViewIamPolicy(pulumi.CustomResource):
|
|
281
537
|
args: LogViewIamPolicyArgs,
|
282
538
|
opts: Optional[pulumi.ResourceOptions] = None):
|
283
539
|
"""
|
540
|
+
Three different resources help you manage your IAM policy for Cloud (Stackdriver) Logging LogView. Each of these resources serves a different use case:
|
541
|
+
|
542
|
+
* `logging.LogViewIamPolicy`: Authoritative. Sets the IAM policy for the logview and replaces any existing policy already attached.
|
543
|
+
* `logging.LogViewIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the logview are preserved.
|
544
|
+
* `logging.LogViewIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the logview are preserved.
|
545
|
+
|
546
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
547
|
+
|
548
|
+
* `logging.LogViewIamPolicy`: Retrieves the IAM policy for the logview
|
549
|
+
|
550
|
+
> **Note:** `logging.LogViewIamPolicy` **cannot** be used in conjunction with `logging.LogViewIamBinding` and `logging.LogViewIamMember` or they will fight over what your policy should be.
|
551
|
+
|
552
|
+
> **Note:** `logging.LogViewIamBinding` resources **can be** used in conjunction with `logging.LogViewIamMember` resources **only if** they do not grant privilege to the same role.
|
553
|
+
|
554
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
555
|
+
|
556
|
+
## logging.LogViewIamPolicy
|
557
|
+
|
558
|
+
```python
|
559
|
+
import pulumi
|
560
|
+
import pulumi_gcp as gcp
|
561
|
+
|
562
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
563
|
+
"role": "roles/logging.admin",
|
564
|
+
"members": ["user:jane@example.com"],
|
565
|
+
}])
|
566
|
+
policy = gcp.logging.LogViewIamPolicy("policy",
|
567
|
+
parent=logging_log_view["parent"],
|
568
|
+
location=logging_log_view["location"],
|
569
|
+
bucket=logging_log_view["bucket"],
|
570
|
+
name=logging_log_view["name"],
|
571
|
+
policy_data=admin.policy_data)
|
572
|
+
```
|
573
|
+
|
574
|
+
With IAM Conditions:
|
575
|
+
|
576
|
+
```python
|
577
|
+
import pulumi
|
578
|
+
import pulumi_gcp as gcp
|
579
|
+
|
580
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
581
|
+
"role": "roles/logging.admin",
|
582
|
+
"members": ["user:jane@example.com"],
|
583
|
+
"condition": {
|
584
|
+
"title": "expires_after_2019_12_31",
|
585
|
+
"description": "Expiring at midnight of 2019-12-31",
|
586
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
587
|
+
},
|
588
|
+
}])
|
589
|
+
policy = gcp.logging.LogViewIamPolicy("policy",
|
590
|
+
parent=logging_log_view["parent"],
|
591
|
+
location=logging_log_view["location"],
|
592
|
+
bucket=logging_log_view["bucket"],
|
593
|
+
name=logging_log_view["name"],
|
594
|
+
policy_data=admin.policy_data)
|
595
|
+
```
|
596
|
+
## logging.LogViewIamBinding
|
597
|
+
|
598
|
+
```python
|
599
|
+
import pulumi
|
600
|
+
import pulumi_gcp as gcp
|
601
|
+
|
602
|
+
binding = gcp.logging.LogViewIamBinding("binding",
|
603
|
+
parent=logging_log_view["parent"],
|
604
|
+
location=logging_log_view["location"],
|
605
|
+
bucket=logging_log_view["bucket"],
|
606
|
+
name=logging_log_view["name"],
|
607
|
+
role="roles/logging.admin",
|
608
|
+
members=["user:jane@example.com"])
|
609
|
+
```
|
610
|
+
|
611
|
+
With IAM Conditions:
|
612
|
+
|
613
|
+
```python
|
614
|
+
import pulumi
|
615
|
+
import pulumi_gcp as gcp
|
616
|
+
|
617
|
+
binding = gcp.logging.LogViewIamBinding("binding",
|
618
|
+
parent=logging_log_view["parent"],
|
619
|
+
location=logging_log_view["location"],
|
620
|
+
bucket=logging_log_view["bucket"],
|
621
|
+
name=logging_log_view["name"],
|
622
|
+
role="roles/logging.admin",
|
623
|
+
members=["user:jane@example.com"],
|
624
|
+
condition={
|
625
|
+
"title": "expires_after_2019_12_31",
|
626
|
+
"description": "Expiring at midnight of 2019-12-31",
|
627
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
628
|
+
})
|
629
|
+
```
|
630
|
+
## logging.LogViewIamMember
|
631
|
+
|
632
|
+
```python
|
633
|
+
import pulumi
|
634
|
+
import pulumi_gcp as gcp
|
635
|
+
|
636
|
+
member = gcp.logging.LogViewIamMember("member",
|
637
|
+
parent=logging_log_view["parent"],
|
638
|
+
location=logging_log_view["location"],
|
639
|
+
bucket=logging_log_view["bucket"],
|
640
|
+
name=logging_log_view["name"],
|
641
|
+
role="roles/logging.admin",
|
642
|
+
member="user:jane@example.com")
|
643
|
+
```
|
644
|
+
|
645
|
+
With IAM Conditions:
|
646
|
+
|
647
|
+
```python
|
648
|
+
import pulumi
|
649
|
+
import pulumi_gcp as gcp
|
650
|
+
|
651
|
+
member = gcp.logging.LogViewIamMember("member",
|
652
|
+
parent=logging_log_view["parent"],
|
653
|
+
location=logging_log_view["location"],
|
654
|
+
bucket=logging_log_view["bucket"],
|
655
|
+
name=logging_log_view["name"],
|
656
|
+
role="roles/logging.admin",
|
657
|
+
member="user:jane@example.com",
|
658
|
+
condition={
|
659
|
+
"title": "expires_after_2019_12_31",
|
660
|
+
"description": "Expiring at midnight of 2019-12-31",
|
661
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
662
|
+
})
|
663
|
+
```
|
664
|
+
|
665
|
+
## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
|
666
|
+
|
667
|
+
full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
|
668
|
+
---
|
669
|
+
|
670
|
+
# IAM policy for Cloud (Stackdriver) Logging LogView
|
671
|
+
Three different resources help you manage your IAM policy for Cloud (Stackdriver) Logging LogView. Each of these resources serves a different use case:
|
672
|
+
|
673
|
+
* `logging.LogViewIamPolicy`: Authoritative. Sets the IAM policy for the logview and replaces any existing policy already attached.
|
674
|
+
* `logging.LogViewIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the logview are preserved.
|
675
|
+
* `logging.LogViewIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the logview are preserved.
|
676
|
+
|
677
|
+
A data source can be used to retrieve policy data in advent you do not need creation
|
678
|
+
|
679
|
+
* `logging.LogViewIamPolicy`: Retrieves the IAM policy for the logview
|
680
|
+
|
681
|
+
> **Note:** `logging.LogViewIamPolicy` **cannot** be used in conjunction with `logging.LogViewIamBinding` and `logging.LogViewIamMember` or they will fight over what your policy should be.
|
682
|
+
|
683
|
+
> **Note:** `logging.LogViewIamBinding` resources **can be** used in conjunction with `logging.LogViewIamMember` resources **only if** they do not grant privilege to the same role.
|
684
|
+
|
685
|
+
> **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
|
686
|
+
|
687
|
+
## logging.LogViewIamPolicy
|
688
|
+
|
689
|
+
```python
|
690
|
+
import pulumi
|
691
|
+
import pulumi_gcp as gcp
|
692
|
+
|
693
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
694
|
+
"role": "roles/logging.admin",
|
695
|
+
"members": ["user:jane@example.com"],
|
696
|
+
}])
|
697
|
+
policy = gcp.logging.LogViewIamPolicy("policy",
|
698
|
+
parent=logging_log_view["parent"],
|
699
|
+
location=logging_log_view["location"],
|
700
|
+
bucket=logging_log_view["bucket"],
|
701
|
+
name=logging_log_view["name"],
|
702
|
+
policy_data=admin.policy_data)
|
703
|
+
```
|
704
|
+
|
705
|
+
With IAM Conditions:
|
706
|
+
|
707
|
+
```python
|
708
|
+
import pulumi
|
709
|
+
import pulumi_gcp as gcp
|
710
|
+
|
711
|
+
admin = gcp.organizations.get_iam_policy(bindings=[{
|
712
|
+
"role": "roles/logging.admin",
|
713
|
+
"members": ["user:jane@example.com"],
|
714
|
+
"condition": {
|
715
|
+
"title": "expires_after_2019_12_31",
|
716
|
+
"description": "Expiring at midnight of 2019-12-31",
|
717
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
718
|
+
},
|
719
|
+
}])
|
720
|
+
policy = gcp.logging.LogViewIamPolicy("policy",
|
721
|
+
parent=logging_log_view["parent"],
|
722
|
+
location=logging_log_view["location"],
|
723
|
+
bucket=logging_log_view["bucket"],
|
724
|
+
name=logging_log_view["name"],
|
725
|
+
policy_data=admin.policy_data)
|
726
|
+
```
|
727
|
+
## logging.LogViewIamBinding
|
728
|
+
|
729
|
+
```python
|
730
|
+
import pulumi
|
731
|
+
import pulumi_gcp as gcp
|
732
|
+
|
733
|
+
binding = gcp.logging.LogViewIamBinding("binding",
|
734
|
+
parent=logging_log_view["parent"],
|
735
|
+
location=logging_log_view["location"],
|
736
|
+
bucket=logging_log_view["bucket"],
|
737
|
+
name=logging_log_view["name"],
|
738
|
+
role="roles/logging.admin",
|
739
|
+
members=["user:jane@example.com"])
|
740
|
+
```
|
741
|
+
|
742
|
+
With IAM Conditions:
|
743
|
+
|
744
|
+
```python
|
745
|
+
import pulumi
|
746
|
+
import pulumi_gcp as gcp
|
747
|
+
|
748
|
+
binding = gcp.logging.LogViewIamBinding("binding",
|
749
|
+
parent=logging_log_view["parent"],
|
750
|
+
location=logging_log_view["location"],
|
751
|
+
bucket=logging_log_view["bucket"],
|
752
|
+
name=logging_log_view["name"],
|
753
|
+
role="roles/logging.admin",
|
754
|
+
members=["user:jane@example.com"],
|
755
|
+
condition={
|
756
|
+
"title": "expires_after_2019_12_31",
|
757
|
+
"description": "Expiring at midnight of 2019-12-31",
|
758
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
759
|
+
})
|
760
|
+
```
|
761
|
+
## logging.LogViewIamMember
|
762
|
+
|
763
|
+
```python
|
764
|
+
import pulumi
|
765
|
+
import pulumi_gcp as gcp
|
766
|
+
|
767
|
+
member = gcp.logging.LogViewIamMember("member",
|
768
|
+
parent=logging_log_view["parent"],
|
769
|
+
location=logging_log_view["location"],
|
770
|
+
bucket=logging_log_view["bucket"],
|
771
|
+
name=logging_log_view["name"],
|
772
|
+
role="roles/logging.admin",
|
773
|
+
member="user:jane@example.com")
|
774
|
+
```
|
775
|
+
|
776
|
+
With IAM Conditions:
|
777
|
+
|
778
|
+
```python
|
779
|
+
import pulumi
|
780
|
+
import pulumi_gcp as gcp
|
781
|
+
|
782
|
+
member = gcp.logging.LogViewIamMember("member",
|
783
|
+
parent=logging_log_view["parent"],
|
784
|
+
location=logging_log_view["location"],
|
785
|
+
bucket=logging_log_view["bucket"],
|
786
|
+
name=logging_log_view["name"],
|
787
|
+
role="roles/logging.admin",
|
788
|
+
member="user:jane@example.com",
|
789
|
+
condition={
|
790
|
+
"title": "expires_after_2019_12_31",
|
791
|
+
"description": "Expiring at midnight of 2019-12-31",
|
792
|
+
"expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
|
793
|
+
})
|
794
|
+
```
|
795
|
+
|
284
796
|
## Import
|
285
797
|
|
286
798
|
For all import syntaxes, the "resource in question" can take any of the following forms:
|
pulumi_gcp/netapp/_inputs.py
CHANGED
@@ -620,12 +620,12 @@ if not MYPY:
|
|
620
620
|
total_transfer_duration: NotRequired[pulumi.Input[str]]
|
621
621
|
"""
|
622
622
|
(Output)
|
623
|
-
|
623
|
+
Cumulative time taken across all transfers for the replication relationship.
|
624
624
|
"""
|
625
625
|
transfer_bytes: NotRequired[pulumi.Input[str]]
|
626
626
|
"""
|
627
627
|
(Output)
|
628
|
-
|
628
|
+
Cumulative bytes transferred so far for the replication relationship.
|
629
629
|
"""
|
630
630
|
update_time: NotRequired[pulumi.Input[str]]
|
631
631
|
"""
|
@@ -660,9 +660,9 @@ class VolumeReplicationTransferStatArgs:
|
|
660
660
|
:param pulumi.Input[str] last_transfer_error: (Output)
|
661
661
|
A message describing the cause of the last transfer failure.
|
662
662
|
:param pulumi.Input[str] total_transfer_duration: (Output)
|
663
|
-
|
663
|
+
Cumulative time taken across all transfers for the replication relationship.
|
664
664
|
:param pulumi.Input[str] transfer_bytes: (Output)
|
665
|
-
|
665
|
+
Cumulative bytes transferred so far for the replication relationship.
|
666
666
|
:param pulumi.Input[str] update_time: (Output)
|
667
667
|
Time when progress was updated last. A timestamp in RFC3339 UTC "Zulu" format. Examples: "2023-06-22T09:13:01.617Z".
|
668
668
|
"""
|
@@ -755,7 +755,7 @@ class VolumeReplicationTransferStatArgs:
|
|
755
755
|
def total_transfer_duration(self) -> Optional[pulumi.Input[str]]:
|
756
756
|
"""
|
757
757
|
(Output)
|
758
|
-
|
758
|
+
Cumulative time taken across all transfers for the replication relationship.
|
759
759
|
"""
|
760
760
|
return pulumi.get(self, "total_transfer_duration")
|
761
761
|
|
@@ -768,7 +768,7 @@ class VolumeReplicationTransferStatArgs:
|
|
768
768
|
def transfer_bytes(self) -> Optional[pulumi.Input[str]]:
|
769
769
|
"""
|
770
770
|
(Output)
|
771
|
-
|
771
|
+
Cumulative bytes transferred so far for the replication relationship.
|
772
772
|
"""
|
773
773
|
return pulumi.get(self, "transfer_bytes")
|
774
774
|
|
pulumi_gcp/netapp/outputs.py
CHANGED
@@ -505,9 +505,9 @@ class VolumeReplicationTransferStat(dict):
|
|
505
505
|
:param str last_transfer_error: (Output)
|
506
506
|
A message describing the cause of the last transfer failure.
|
507
507
|
:param str total_transfer_duration: (Output)
|
508
|
-
|
508
|
+
Cumulative time taken across all transfers for the replication relationship.
|
509
509
|
:param str transfer_bytes: (Output)
|
510
|
-
|
510
|
+
Cumulative bytes transferred so far for the replication relationship.
|
511
511
|
:param str update_time: (Output)
|
512
512
|
Time when progress was updated last. A timestamp in RFC3339 UTC "Zulu" format. Examples: "2023-06-22T09:13:01.617Z".
|
513
513
|
"""
|
@@ -580,7 +580,7 @@ class VolumeReplicationTransferStat(dict):
|
|
580
580
|
def total_transfer_duration(self) -> Optional[str]:
|
581
581
|
"""
|
582
582
|
(Output)
|
583
|
-
|
583
|
+
Cumulative time taken across all transfers for the replication relationship.
|
584
584
|
"""
|
585
585
|
return pulumi.get(self, "total_transfer_duration")
|
586
586
|
|
@@ -589,7 +589,7 @@ class VolumeReplicationTransferStat(dict):
|
|
589
589
|
def transfer_bytes(self) -> Optional[str]:
|
590
590
|
"""
|
591
591
|
(Output)
|
592
|
-
|
592
|
+
Cumulative bytes transferred so far for the replication relationship.
|
593
593
|
"""
|
594
594
|
return pulumi.get(self, "transfer_bytes")
|
595
595
|
|
@@ -511,12 +511,12 @@ class RegionalEndpoint(pulumi.CustomResource):
|
|
511
511
|
default = gcp.networkconnectivity.RegionalEndpoint("default",
|
512
512
|
name="my-rep",
|
513
513
|
location="us-central1",
|
514
|
-
target_google_api="
|
514
|
+
target_google_api="storage.us-central1.p.rep.googleapis.com",
|
515
515
|
access_type="REGIONAL",
|
516
516
|
address="192.168.0.5",
|
517
517
|
network=my_network.id,
|
518
518
|
subnetwork=my_subnetwork.id,
|
519
|
-
description="My RegionalEndpoint targeting Google API
|
519
|
+
description="My RegionalEndpoint targeting Google API storage.us-central1.p.rep.googleapis.com",
|
520
520
|
labels={
|
521
521
|
"env": "default",
|
522
522
|
})
|
@@ -538,7 +538,7 @@ class RegionalEndpoint(pulumi.CustomResource):
|
|
538
538
|
default = gcp.networkconnectivity.RegionalEndpoint("default",
|
539
539
|
name="my-rep",
|
540
540
|
location="us-central1",
|
541
|
-
target_google_api="
|
541
|
+
target_google_api="storage.us-central1.p.rep.googleapis.com",
|
542
542
|
access_type="GLOBAL",
|
543
543
|
address="192.168.0.4",
|
544
544
|
network=my_network.id,
|
@@ -625,12 +625,12 @@ class RegionalEndpoint(pulumi.CustomResource):
|
|
625
625
|
default = gcp.networkconnectivity.RegionalEndpoint("default",
|
626
626
|
name="my-rep",
|
627
627
|
location="us-central1",
|
628
|
-
target_google_api="
|
628
|
+
target_google_api="storage.us-central1.p.rep.googleapis.com",
|
629
629
|
access_type="REGIONAL",
|
630
630
|
address="192.168.0.5",
|
631
631
|
network=my_network.id,
|
632
632
|
subnetwork=my_subnetwork.id,
|
633
|
-
description="My RegionalEndpoint targeting Google API
|
633
|
+
description="My RegionalEndpoint targeting Google API storage.us-central1.p.rep.googleapis.com",
|
634
634
|
labels={
|
635
635
|
"env": "default",
|
636
636
|
})
|
@@ -652,7 +652,7 @@ class RegionalEndpoint(pulumi.CustomResource):
|
|
652
652
|
default = gcp.networkconnectivity.RegionalEndpoint("default",
|
653
653
|
name="my-rep",
|
654
654
|
location="us-central1",
|
655
|
-
target_google_api="
|
655
|
+
target_google_api="storage.us-central1.p.rep.googleapis.com",
|
656
656
|
access_type="GLOBAL",
|
657
657
|
address="192.168.0.4",
|
658
658
|
network=my_network.id,
|