pulumi-gcp 7.36.0a1723631483__py3-none-any.whl → 7.37.0a1723638212__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (53) hide show
  1. pulumi_gcp/__init__.py +72 -0
  2. pulumi_gcp/accesscontextmanager/__init__.py +2 -0
  3. pulumi_gcp/accesscontextmanager/_inputs.py +780 -0
  4. pulumi_gcp/accesscontextmanager/outputs.py +601 -0
  5. pulumi_gcp/accesscontextmanager/service_perimeter_dry_run_egress_policy.py +323 -0
  6. pulumi_gcp/accesscontextmanager/service_perimeter_dry_run_ingress_policy.py +332 -0
  7. pulumi_gcp/accesscontextmanager/service_perimeter_egress_policy.py +2 -24
  8. pulumi_gcp/accesscontextmanager/service_perimeter_ingress_policy.py +2 -24
  9. pulumi_gcp/applicationintegration/client.py +2 -2
  10. pulumi_gcp/clouddeploy/_inputs.py +21 -1
  11. pulumi_gcp/clouddeploy/outputs.py +15 -1
  12. pulumi_gcp/cloudrunv2/_inputs.py +40 -0
  13. pulumi_gcp/cloudrunv2/outputs.py +46 -0
  14. pulumi_gcp/compute/region_target_https_proxy.py +28 -0
  15. pulumi_gcp/container/_inputs.py +26 -0
  16. pulumi_gcp/container/outputs.py +29 -0
  17. pulumi_gcp/dataform/repository.py +80 -2
  18. pulumi_gcp/discoveryengine/data_store.py +93 -2
  19. pulumi_gcp/gkehub/_inputs.py +63 -0
  20. pulumi_gcp/gkehub/outputs.py +38 -0
  21. pulumi_gcp/logging/get_log_view_iam_policy.py +28 -2
  22. pulumi_gcp/logging/log_view_iam_binding.py +512 -0
  23. pulumi_gcp/logging/log_view_iam_member.py +512 -0
  24. pulumi_gcp/logging/log_view_iam_policy.py +512 -0
  25. pulumi_gcp/netapp/_inputs.py +6 -6
  26. pulumi_gcp/netapp/outputs.py +4 -4
  27. pulumi_gcp/networkconnectivity/regional_endpoint.py +6 -6
  28. pulumi_gcp/organizations/get_project.py +11 -1
  29. pulumi_gcp/organizations/project.py +76 -21
  30. pulumi_gcp/pulumi-plugin.json +1 -1
  31. pulumi_gcp/securitycenter/__init__.py +8 -0
  32. pulumi_gcp/securitycenter/_inputs.py +191 -0
  33. pulumi_gcp/securitycenter/get_v2_organization_source_iam_policy.py +146 -0
  34. pulumi_gcp/securitycenter/outputs.py +115 -0
  35. pulumi_gcp/securitycenter/v2_folder_mute_config.py +679 -0
  36. pulumi_gcp/securitycenter/v2_organization_source.py +416 -0
  37. pulumi_gcp/securitycenter/v2_organization_source_iam_binding.py +722 -0
  38. pulumi_gcp/securitycenter/v2_organization_source_iam_member.py +722 -0
  39. pulumi_gcp/securitycenter/v2_organization_source_iam_policy.py +561 -0
  40. pulumi_gcp/securitycenter/v2_project_mute_config.py +684 -0
  41. pulumi_gcp/securitycenter/v2_project_notification_config.py +559 -0
  42. pulumi_gcp/spanner/instance.py +0 -7
  43. pulumi_gcp/sql/_inputs.py +3 -3
  44. pulumi_gcp/sql/outputs.py +6 -6
  45. pulumi_gcp/storage/bucket_object.py +28 -0
  46. pulumi_gcp/storage/get_bucket_object.py +14 -1
  47. pulumi_gcp/storage/get_bucket_object_content.py +11 -1
  48. pulumi_gcp/storage/managed_folder.py +72 -2
  49. pulumi_gcp/vmwareengine/network_policy.py +6 -6
  50. {pulumi_gcp-7.36.0a1723631483.dist-info → pulumi_gcp-7.37.0a1723638212.dist-info}/METADATA +1 -1
  51. {pulumi_gcp-7.36.0a1723631483.dist-info → pulumi_gcp-7.37.0a1723638212.dist-info}/RECORD +53 -43
  52. {pulumi_gcp-7.36.0a1723631483.dist-info → pulumi_gcp-7.37.0a1723638212.dist-info}/WHEEL +0 -0
  53. {pulumi_gcp-7.36.0a1723631483.dist-info → pulumi_gcp-7.37.0a1723638212.dist-info}/top_level.txt +0 -0
@@ -344,6 +344,262 @@ class LogViewIamBinding(pulumi.CustomResource):
344
344
  role: Optional[pulumi.Input[str]] = None,
345
345
  __props__=None):
346
346
  """
347
+ Three different resources help you manage your IAM policy for Cloud (Stackdriver) Logging LogView. Each of these resources serves a different use case:
348
+
349
+ * `logging.LogViewIamPolicy`: Authoritative. Sets the IAM policy for the logview and replaces any existing policy already attached.
350
+ * `logging.LogViewIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the logview are preserved.
351
+ * `logging.LogViewIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the logview are preserved.
352
+
353
+ A data source can be used to retrieve policy data in advent you do not need creation
354
+
355
+ * `logging.LogViewIamPolicy`: Retrieves the IAM policy for the logview
356
+
357
+ > **Note:** `logging.LogViewIamPolicy` **cannot** be used in conjunction with `logging.LogViewIamBinding` and `logging.LogViewIamMember` or they will fight over what your policy should be.
358
+
359
+ > **Note:** `logging.LogViewIamBinding` resources **can be** used in conjunction with `logging.LogViewIamMember` resources **only if** they do not grant privilege to the same role.
360
+
361
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
362
+
363
+ ## logging.LogViewIamPolicy
364
+
365
+ ```python
366
+ import pulumi
367
+ import pulumi_gcp as gcp
368
+
369
+ admin = gcp.organizations.get_iam_policy(bindings=[{
370
+ "role": "roles/logging.admin",
371
+ "members": ["user:jane@example.com"],
372
+ }])
373
+ policy = gcp.logging.LogViewIamPolicy("policy",
374
+ parent=logging_log_view["parent"],
375
+ location=logging_log_view["location"],
376
+ bucket=logging_log_view["bucket"],
377
+ name=logging_log_view["name"],
378
+ policy_data=admin.policy_data)
379
+ ```
380
+
381
+ With IAM Conditions:
382
+
383
+ ```python
384
+ import pulumi
385
+ import pulumi_gcp as gcp
386
+
387
+ admin = gcp.organizations.get_iam_policy(bindings=[{
388
+ "role": "roles/logging.admin",
389
+ "members": ["user:jane@example.com"],
390
+ "condition": {
391
+ "title": "expires_after_2019_12_31",
392
+ "description": "Expiring at midnight of 2019-12-31",
393
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
394
+ },
395
+ }])
396
+ policy = gcp.logging.LogViewIamPolicy("policy",
397
+ parent=logging_log_view["parent"],
398
+ location=logging_log_view["location"],
399
+ bucket=logging_log_view["bucket"],
400
+ name=logging_log_view["name"],
401
+ policy_data=admin.policy_data)
402
+ ```
403
+ ## logging.LogViewIamBinding
404
+
405
+ ```python
406
+ import pulumi
407
+ import pulumi_gcp as gcp
408
+
409
+ binding = gcp.logging.LogViewIamBinding("binding",
410
+ parent=logging_log_view["parent"],
411
+ location=logging_log_view["location"],
412
+ bucket=logging_log_view["bucket"],
413
+ name=logging_log_view["name"],
414
+ role="roles/logging.admin",
415
+ members=["user:jane@example.com"])
416
+ ```
417
+
418
+ With IAM Conditions:
419
+
420
+ ```python
421
+ import pulumi
422
+ import pulumi_gcp as gcp
423
+
424
+ binding = gcp.logging.LogViewIamBinding("binding",
425
+ parent=logging_log_view["parent"],
426
+ location=logging_log_view["location"],
427
+ bucket=logging_log_view["bucket"],
428
+ name=logging_log_view["name"],
429
+ role="roles/logging.admin",
430
+ members=["user:jane@example.com"],
431
+ condition={
432
+ "title": "expires_after_2019_12_31",
433
+ "description": "Expiring at midnight of 2019-12-31",
434
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
435
+ })
436
+ ```
437
+ ## logging.LogViewIamMember
438
+
439
+ ```python
440
+ import pulumi
441
+ import pulumi_gcp as gcp
442
+
443
+ member = gcp.logging.LogViewIamMember("member",
444
+ parent=logging_log_view["parent"],
445
+ location=logging_log_view["location"],
446
+ bucket=logging_log_view["bucket"],
447
+ name=logging_log_view["name"],
448
+ role="roles/logging.admin",
449
+ member="user:jane@example.com")
450
+ ```
451
+
452
+ With IAM Conditions:
453
+
454
+ ```python
455
+ import pulumi
456
+ import pulumi_gcp as gcp
457
+
458
+ member = gcp.logging.LogViewIamMember("member",
459
+ parent=logging_log_view["parent"],
460
+ location=logging_log_view["location"],
461
+ bucket=logging_log_view["bucket"],
462
+ name=logging_log_view["name"],
463
+ role="roles/logging.admin",
464
+ member="user:jane@example.com",
465
+ condition={
466
+ "title": "expires_after_2019_12_31",
467
+ "description": "Expiring at midnight of 2019-12-31",
468
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
469
+ })
470
+ ```
471
+
472
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
473
+
474
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
475
+ ---
476
+
477
+ # IAM policy for Cloud (Stackdriver) Logging LogView
478
+ Three different resources help you manage your IAM policy for Cloud (Stackdriver) Logging LogView. Each of these resources serves a different use case:
479
+
480
+ * `logging.LogViewIamPolicy`: Authoritative. Sets the IAM policy for the logview and replaces any existing policy already attached.
481
+ * `logging.LogViewIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the logview are preserved.
482
+ * `logging.LogViewIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the logview are preserved.
483
+
484
+ A data source can be used to retrieve policy data in advent you do not need creation
485
+
486
+ * `logging.LogViewIamPolicy`: Retrieves the IAM policy for the logview
487
+
488
+ > **Note:** `logging.LogViewIamPolicy` **cannot** be used in conjunction with `logging.LogViewIamBinding` and `logging.LogViewIamMember` or they will fight over what your policy should be.
489
+
490
+ > **Note:** `logging.LogViewIamBinding` resources **can be** used in conjunction with `logging.LogViewIamMember` resources **only if** they do not grant privilege to the same role.
491
+
492
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
493
+
494
+ ## logging.LogViewIamPolicy
495
+
496
+ ```python
497
+ import pulumi
498
+ import pulumi_gcp as gcp
499
+
500
+ admin = gcp.organizations.get_iam_policy(bindings=[{
501
+ "role": "roles/logging.admin",
502
+ "members": ["user:jane@example.com"],
503
+ }])
504
+ policy = gcp.logging.LogViewIamPolicy("policy",
505
+ parent=logging_log_view["parent"],
506
+ location=logging_log_view["location"],
507
+ bucket=logging_log_view["bucket"],
508
+ name=logging_log_view["name"],
509
+ policy_data=admin.policy_data)
510
+ ```
511
+
512
+ With IAM Conditions:
513
+
514
+ ```python
515
+ import pulumi
516
+ import pulumi_gcp as gcp
517
+
518
+ admin = gcp.organizations.get_iam_policy(bindings=[{
519
+ "role": "roles/logging.admin",
520
+ "members": ["user:jane@example.com"],
521
+ "condition": {
522
+ "title": "expires_after_2019_12_31",
523
+ "description": "Expiring at midnight of 2019-12-31",
524
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
525
+ },
526
+ }])
527
+ policy = gcp.logging.LogViewIamPolicy("policy",
528
+ parent=logging_log_view["parent"],
529
+ location=logging_log_view["location"],
530
+ bucket=logging_log_view["bucket"],
531
+ name=logging_log_view["name"],
532
+ policy_data=admin.policy_data)
533
+ ```
534
+ ## logging.LogViewIamBinding
535
+
536
+ ```python
537
+ import pulumi
538
+ import pulumi_gcp as gcp
539
+
540
+ binding = gcp.logging.LogViewIamBinding("binding",
541
+ parent=logging_log_view["parent"],
542
+ location=logging_log_view["location"],
543
+ bucket=logging_log_view["bucket"],
544
+ name=logging_log_view["name"],
545
+ role="roles/logging.admin",
546
+ members=["user:jane@example.com"])
547
+ ```
548
+
549
+ With IAM Conditions:
550
+
551
+ ```python
552
+ import pulumi
553
+ import pulumi_gcp as gcp
554
+
555
+ binding = gcp.logging.LogViewIamBinding("binding",
556
+ parent=logging_log_view["parent"],
557
+ location=logging_log_view["location"],
558
+ bucket=logging_log_view["bucket"],
559
+ name=logging_log_view["name"],
560
+ role="roles/logging.admin",
561
+ members=["user:jane@example.com"],
562
+ condition={
563
+ "title": "expires_after_2019_12_31",
564
+ "description": "Expiring at midnight of 2019-12-31",
565
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
566
+ })
567
+ ```
568
+ ## logging.LogViewIamMember
569
+
570
+ ```python
571
+ import pulumi
572
+ import pulumi_gcp as gcp
573
+
574
+ member = gcp.logging.LogViewIamMember("member",
575
+ parent=logging_log_view["parent"],
576
+ location=logging_log_view["location"],
577
+ bucket=logging_log_view["bucket"],
578
+ name=logging_log_view["name"],
579
+ role="roles/logging.admin",
580
+ member="user:jane@example.com")
581
+ ```
582
+
583
+ With IAM Conditions:
584
+
585
+ ```python
586
+ import pulumi
587
+ import pulumi_gcp as gcp
588
+
589
+ member = gcp.logging.LogViewIamMember("member",
590
+ parent=logging_log_view["parent"],
591
+ location=logging_log_view["location"],
592
+ bucket=logging_log_view["bucket"],
593
+ name=logging_log_view["name"],
594
+ role="roles/logging.admin",
595
+ member="user:jane@example.com",
596
+ condition={
597
+ "title": "expires_after_2019_12_31",
598
+ "description": "Expiring at midnight of 2019-12-31",
599
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
600
+ })
601
+ ```
602
+
347
603
  ## Import
348
604
 
349
605
  For all import syntaxes, the "resource in question" can take any of the following forms:
@@ -410,6 +666,262 @@ class LogViewIamBinding(pulumi.CustomResource):
410
666
  args: LogViewIamBindingArgs,
411
667
  opts: Optional[pulumi.ResourceOptions] = None):
412
668
  """
669
+ Three different resources help you manage your IAM policy for Cloud (Stackdriver) Logging LogView. Each of these resources serves a different use case:
670
+
671
+ * `logging.LogViewIamPolicy`: Authoritative. Sets the IAM policy for the logview and replaces any existing policy already attached.
672
+ * `logging.LogViewIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the logview are preserved.
673
+ * `logging.LogViewIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the logview are preserved.
674
+
675
+ A data source can be used to retrieve policy data in advent you do not need creation
676
+
677
+ * `logging.LogViewIamPolicy`: Retrieves the IAM policy for the logview
678
+
679
+ > **Note:** `logging.LogViewIamPolicy` **cannot** be used in conjunction with `logging.LogViewIamBinding` and `logging.LogViewIamMember` or they will fight over what your policy should be.
680
+
681
+ > **Note:** `logging.LogViewIamBinding` resources **can be** used in conjunction with `logging.LogViewIamMember` resources **only if** they do not grant privilege to the same role.
682
+
683
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
684
+
685
+ ## logging.LogViewIamPolicy
686
+
687
+ ```python
688
+ import pulumi
689
+ import pulumi_gcp as gcp
690
+
691
+ admin = gcp.organizations.get_iam_policy(bindings=[{
692
+ "role": "roles/logging.admin",
693
+ "members": ["user:jane@example.com"],
694
+ }])
695
+ policy = gcp.logging.LogViewIamPolicy("policy",
696
+ parent=logging_log_view["parent"],
697
+ location=logging_log_view["location"],
698
+ bucket=logging_log_view["bucket"],
699
+ name=logging_log_view["name"],
700
+ policy_data=admin.policy_data)
701
+ ```
702
+
703
+ With IAM Conditions:
704
+
705
+ ```python
706
+ import pulumi
707
+ import pulumi_gcp as gcp
708
+
709
+ admin = gcp.organizations.get_iam_policy(bindings=[{
710
+ "role": "roles/logging.admin",
711
+ "members": ["user:jane@example.com"],
712
+ "condition": {
713
+ "title": "expires_after_2019_12_31",
714
+ "description": "Expiring at midnight of 2019-12-31",
715
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
716
+ },
717
+ }])
718
+ policy = gcp.logging.LogViewIamPolicy("policy",
719
+ parent=logging_log_view["parent"],
720
+ location=logging_log_view["location"],
721
+ bucket=logging_log_view["bucket"],
722
+ name=logging_log_view["name"],
723
+ policy_data=admin.policy_data)
724
+ ```
725
+ ## logging.LogViewIamBinding
726
+
727
+ ```python
728
+ import pulumi
729
+ import pulumi_gcp as gcp
730
+
731
+ binding = gcp.logging.LogViewIamBinding("binding",
732
+ parent=logging_log_view["parent"],
733
+ location=logging_log_view["location"],
734
+ bucket=logging_log_view["bucket"],
735
+ name=logging_log_view["name"],
736
+ role="roles/logging.admin",
737
+ members=["user:jane@example.com"])
738
+ ```
739
+
740
+ With IAM Conditions:
741
+
742
+ ```python
743
+ import pulumi
744
+ import pulumi_gcp as gcp
745
+
746
+ binding = gcp.logging.LogViewIamBinding("binding",
747
+ parent=logging_log_view["parent"],
748
+ location=logging_log_view["location"],
749
+ bucket=logging_log_view["bucket"],
750
+ name=logging_log_view["name"],
751
+ role="roles/logging.admin",
752
+ members=["user:jane@example.com"],
753
+ condition={
754
+ "title": "expires_after_2019_12_31",
755
+ "description": "Expiring at midnight of 2019-12-31",
756
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
757
+ })
758
+ ```
759
+ ## logging.LogViewIamMember
760
+
761
+ ```python
762
+ import pulumi
763
+ import pulumi_gcp as gcp
764
+
765
+ member = gcp.logging.LogViewIamMember("member",
766
+ parent=logging_log_view["parent"],
767
+ location=logging_log_view["location"],
768
+ bucket=logging_log_view["bucket"],
769
+ name=logging_log_view["name"],
770
+ role="roles/logging.admin",
771
+ member="user:jane@example.com")
772
+ ```
773
+
774
+ With IAM Conditions:
775
+
776
+ ```python
777
+ import pulumi
778
+ import pulumi_gcp as gcp
779
+
780
+ member = gcp.logging.LogViewIamMember("member",
781
+ parent=logging_log_view["parent"],
782
+ location=logging_log_view["location"],
783
+ bucket=logging_log_view["bucket"],
784
+ name=logging_log_view["name"],
785
+ role="roles/logging.admin",
786
+ member="user:jane@example.com",
787
+ condition={
788
+ "title": "expires_after_2019_12_31",
789
+ "description": "Expiring at midnight of 2019-12-31",
790
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
791
+ })
792
+ ```
793
+
794
+ ## > **Custom Roles**: If you're importing a IAM resource with a custom role, make sure to use the
795
+
796
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
797
+ ---
798
+
799
+ # IAM policy for Cloud (Stackdriver) Logging LogView
800
+ Three different resources help you manage your IAM policy for Cloud (Stackdriver) Logging LogView. Each of these resources serves a different use case:
801
+
802
+ * `logging.LogViewIamPolicy`: Authoritative. Sets the IAM policy for the logview and replaces any existing policy already attached.
803
+ * `logging.LogViewIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the logview are preserved.
804
+ * `logging.LogViewIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the logview are preserved.
805
+
806
+ A data source can be used to retrieve policy data in advent you do not need creation
807
+
808
+ * `logging.LogViewIamPolicy`: Retrieves the IAM policy for the logview
809
+
810
+ > **Note:** `logging.LogViewIamPolicy` **cannot** be used in conjunction with `logging.LogViewIamBinding` and `logging.LogViewIamMember` or they will fight over what your policy should be.
811
+
812
+ > **Note:** `logging.LogViewIamBinding` resources **can be** used in conjunction with `logging.LogViewIamMember` resources **only if** they do not grant privilege to the same role.
813
+
814
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
815
+
816
+ ## logging.LogViewIamPolicy
817
+
818
+ ```python
819
+ import pulumi
820
+ import pulumi_gcp as gcp
821
+
822
+ admin = gcp.organizations.get_iam_policy(bindings=[{
823
+ "role": "roles/logging.admin",
824
+ "members": ["user:jane@example.com"],
825
+ }])
826
+ policy = gcp.logging.LogViewIamPolicy("policy",
827
+ parent=logging_log_view["parent"],
828
+ location=logging_log_view["location"],
829
+ bucket=logging_log_view["bucket"],
830
+ name=logging_log_view["name"],
831
+ policy_data=admin.policy_data)
832
+ ```
833
+
834
+ With IAM Conditions:
835
+
836
+ ```python
837
+ import pulumi
838
+ import pulumi_gcp as gcp
839
+
840
+ admin = gcp.organizations.get_iam_policy(bindings=[{
841
+ "role": "roles/logging.admin",
842
+ "members": ["user:jane@example.com"],
843
+ "condition": {
844
+ "title": "expires_after_2019_12_31",
845
+ "description": "Expiring at midnight of 2019-12-31",
846
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
847
+ },
848
+ }])
849
+ policy = gcp.logging.LogViewIamPolicy("policy",
850
+ parent=logging_log_view["parent"],
851
+ location=logging_log_view["location"],
852
+ bucket=logging_log_view["bucket"],
853
+ name=logging_log_view["name"],
854
+ policy_data=admin.policy_data)
855
+ ```
856
+ ## logging.LogViewIamBinding
857
+
858
+ ```python
859
+ import pulumi
860
+ import pulumi_gcp as gcp
861
+
862
+ binding = gcp.logging.LogViewIamBinding("binding",
863
+ parent=logging_log_view["parent"],
864
+ location=logging_log_view["location"],
865
+ bucket=logging_log_view["bucket"],
866
+ name=logging_log_view["name"],
867
+ role="roles/logging.admin",
868
+ members=["user:jane@example.com"])
869
+ ```
870
+
871
+ With IAM Conditions:
872
+
873
+ ```python
874
+ import pulumi
875
+ import pulumi_gcp as gcp
876
+
877
+ binding = gcp.logging.LogViewIamBinding("binding",
878
+ parent=logging_log_view["parent"],
879
+ location=logging_log_view["location"],
880
+ bucket=logging_log_view["bucket"],
881
+ name=logging_log_view["name"],
882
+ role="roles/logging.admin",
883
+ members=["user:jane@example.com"],
884
+ condition={
885
+ "title": "expires_after_2019_12_31",
886
+ "description": "Expiring at midnight of 2019-12-31",
887
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
888
+ })
889
+ ```
890
+ ## logging.LogViewIamMember
891
+
892
+ ```python
893
+ import pulumi
894
+ import pulumi_gcp as gcp
895
+
896
+ member = gcp.logging.LogViewIamMember("member",
897
+ parent=logging_log_view["parent"],
898
+ location=logging_log_view["location"],
899
+ bucket=logging_log_view["bucket"],
900
+ name=logging_log_view["name"],
901
+ role="roles/logging.admin",
902
+ member="user:jane@example.com")
903
+ ```
904
+
905
+ With IAM Conditions:
906
+
907
+ ```python
908
+ import pulumi
909
+ import pulumi_gcp as gcp
910
+
911
+ member = gcp.logging.LogViewIamMember("member",
912
+ parent=logging_log_view["parent"],
913
+ location=logging_log_view["location"],
914
+ bucket=logging_log_view["bucket"],
915
+ name=logging_log_view["name"],
916
+ role="roles/logging.admin",
917
+ member="user:jane@example.com",
918
+ condition={
919
+ "title": "expires_after_2019_12_31",
920
+ "description": "Expiring at midnight of 2019-12-31",
921
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
922
+ })
923
+ ```
924
+
413
925
  ## Import
414
926
 
415
927
  For all import syntaxes, the "resource in question" can take any of the following forms: