pulumi-gcp 8.18.0a1738650987__py3-none-any.whl → 8.18.0a1738676305__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (69) hide show
  1. pulumi_gcp/__init__.py +24 -0
  2. pulumi_gcp/accesscontextmanager/service_perimeter_dry_run_resource.py +28 -0
  3. pulumi_gcp/alloydb/user.py +10 -1
  4. pulumi_gcp/assuredworkloads/workload.py +7 -7
  5. pulumi_gcp/beyondcorp/__init__.py +4 -0
  6. pulumi_gcp/beyondcorp/_inputs.py +130 -0
  7. pulumi_gcp/beyondcorp/get_security_gateway_iam_policy.py +180 -0
  8. pulumi_gcp/beyondcorp/outputs.py +76 -0
  9. pulumi_gcp/beyondcorp/security_gateway.py +52 -25
  10. pulumi_gcp/beyondcorp/security_gateway_iam_binding.py +1075 -0
  11. pulumi_gcp/beyondcorp/security_gateway_iam_member.py +1075 -0
  12. pulumi_gcp/beyondcorp/security_gateway_iam_policy.py +894 -0
  13. pulumi_gcp/bigquery/_inputs.py +33 -0
  14. pulumi_gcp/bigquery/dataset.py +7 -7
  15. pulumi_gcp/bigquery/outputs.py +36 -0
  16. pulumi_gcp/bigquery/table.py +61 -7
  17. pulumi_gcp/chronicle/retrohunt.py +0 -16
  18. pulumi_gcp/cloudquota/s_quota_adjuster_settings.py +23 -23
  19. pulumi_gcp/compute/_inputs.py +9 -9
  20. pulumi_gcp/compute/get_network.py +3 -3
  21. pulumi_gcp/compute/network.py +7 -7
  22. pulumi_gcp/compute/outputs.py +6 -6
  23. pulumi_gcp/compute/router_peer.py +112 -0
  24. pulumi_gcp/container/_inputs.py +79 -20
  25. pulumi_gcp/container/outputs.py +75 -12
  26. pulumi_gcp/dataproc/_inputs.py +34 -0
  27. pulumi_gcp/dataproc/outputs.py +37 -0
  28. pulumi_gcp/dataproc/workflow_template.py +47 -0
  29. pulumi_gcp/firestore/field.py +60 -0
  30. pulumi_gcp/gkehub/_inputs.py +20 -0
  31. pulumi_gcp/gkehub/membership_binding.py +6 -6
  32. pulumi_gcp/gkehub/membership_rbac_role_binding.py +4 -4
  33. pulumi_gcp/gkehub/namespace.py +4 -4
  34. pulumi_gcp/gkehub/outputs.py +26 -1
  35. pulumi_gcp/gkehub/scope_rbac_role_binding.py +4 -4
  36. pulumi_gcp/iap/tunnel_dest_group.py +2 -2
  37. pulumi_gcp/integrationconnectors/managed_zone.py +8 -8
  38. pulumi_gcp/netapp/storage_pool.py +1 -1
  39. pulumi_gcp/networkconnectivity/spoke.py +76 -14
  40. pulumi_gcp/orgpolicy/policy.py +2 -2
  41. pulumi_gcp/parametermanager/__init__.py +3 -0
  42. pulumi_gcp/parametermanager/get_parameter_version.py +216 -0
  43. pulumi_gcp/parametermanager/get_parameters.py +140 -0
  44. pulumi_gcp/parametermanager/get_regional_parameter_version.py +235 -0
  45. pulumi_gcp/parametermanager/outputs.py +156 -0
  46. pulumi_gcp/pubsub/_inputs.py +264 -0
  47. pulumi_gcp/pubsub/outputs.py +353 -0
  48. pulumi_gcp/pubsub/subscription.py +6 -6
  49. pulumi_gcp/pubsub/topic.py +70 -0
  50. pulumi_gcp/pulumi-plugin.json +1 -1
  51. pulumi_gcp/resourcemanager/lien.py +12 -0
  52. pulumi_gcp/secretmanager/regional_secret.py +4 -0
  53. pulumi_gcp/secretmanager/regional_secret_version.py +12 -0
  54. pulumi_gcp/secretmanager/secret.py +4 -0
  55. pulumi_gcp/secretmanager/secret_version.py +12 -0
  56. pulumi_gcp/securityposture/posture.py +4 -0
  57. pulumi_gcp/securityposture/posture_deployment.py +4 -0
  58. pulumi_gcp/serviceaccount/get_s.py +98 -8
  59. pulumi_gcp/spanner/_inputs.py +68 -0
  60. pulumi_gcp/spanner/backup_schedule.py +70 -4
  61. pulumi_gcp/spanner/outputs.py +60 -0
  62. pulumi_gcp/storage/get_bucket_object_content.py +4 -4
  63. pulumi_gcp/vertex/ai_endpoint.py +4 -4
  64. pulumi_gcp/vertex/ai_feature_online_store_featureview.py +4 -4
  65. pulumi_gcp/workflows/workflow.py +175 -0
  66. {pulumi_gcp-8.18.0a1738650987.dist-info → pulumi_gcp-8.18.0a1738676305.dist-info}/METADATA +1 -1
  67. {pulumi_gcp-8.18.0a1738650987.dist-info → pulumi_gcp-8.18.0a1738676305.dist-info}/RECORD +69 -62
  68. {pulumi_gcp-8.18.0a1738650987.dist-info → pulumi_gcp-8.18.0a1738676305.dist-info}/WHEEL +0 -0
  69. {pulumi_gcp-8.18.0a1738650987.dist-info → pulumi_gcp-8.18.0a1738676305.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,894 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['SecurityGatewayIamPolicyArgs', 'SecurityGatewayIamPolicy']
18
+
19
+ @pulumi.input_type
20
+ class SecurityGatewayIamPolicyArgs:
21
+ def __init__(__self__, *,
22
+ policy_data: pulumi.Input[str],
23
+ security_gateway_id: pulumi.Input[str],
24
+ location: Optional[pulumi.Input[str]] = None,
25
+ project: Optional[pulumi.Input[str]] = None):
26
+ """
27
+ The set of arguments for constructing a SecurityGatewayIamPolicy resource.
28
+ :param pulumi.Input[str] policy_data: The policy data generated by
29
+ a `organizations_get_iam_policy` data source.
30
+ :param pulumi.Input[str] location: Resource ID segment making up resource `name`. It identifies the resource within its parent collection as described in https://google.aip.dev/122. Must be omitted or set to `global`. Used to find the parent resource to bind the IAM policy to. If not specified,
31
+ the value will be parsed from the identifier of the parent resource. If no location is provided in the parent identifier and no
32
+ location is specified, it is taken from the provider configuration.
33
+ :param pulumi.Input[str] project: The ID of the project in which the resource belongs.
34
+ If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.
35
+ """
36
+ pulumi.set(__self__, "policy_data", policy_data)
37
+ pulumi.set(__self__, "security_gateway_id", security_gateway_id)
38
+ if location is not None:
39
+ pulumi.set(__self__, "location", location)
40
+ if project is not None:
41
+ pulumi.set(__self__, "project", project)
42
+
43
+ @property
44
+ @pulumi.getter(name="policyData")
45
+ def policy_data(self) -> pulumi.Input[str]:
46
+ """
47
+ The policy data generated by
48
+ a `organizations_get_iam_policy` data source.
49
+ """
50
+ return pulumi.get(self, "policy_data")
51
+
52
+ @policy_data.setter
53
+ def policy_data(self, value: pulumi.Input[str]):
54
+ pulumi.set(self, "policy_data", value)
55
+
56
+ @property
57
+ @pulumi.getter(name="securityGatewayId")
58
+ def security_gateway_id(self) -> pulumi.Input[str]:
59
+ return pulumi.get(self, "security_gateway_id")
60
+
61
+ @security_gateway_id.setter
62
+ def security_gateway_id(self, value: pulumi.Input[str]):
63
+ pulumi.set(self, "security_gateway_id", value)
64
+
65
+ @property
66
+ @pulumi.getter
67
+ def location(self) -> Optional[pulumi.Input[str]]:
68
+ """
69
+ Resource ID segment making up resource `name`. It identifies the resource within its parent collection as described in https://google.aip.dev/122. Must be omitted or set to `global`. Used to find the parent resource to bind the IAM policy to. If not specified,
70
+ the value will be parsed from the identifier of the parent resource. If no location is provided in the parent identifier and no
71
+ location is specified, it is taken from the provider configuration.
72
+ """
73
+ return pulumi.get(self, "location")
74
+
75
+ @location.setter
76
+ def location(self, value: Optional[pulumi.Input[str]]):
77
+ pulumi.set(self, "location", value)
78
+
79
+ @property
80
+ @pulumi.getter
81
+ def project(self) -> Optional[pulumi.Input[str]]:
82
+ """
83
+ The ID of the project in which the resource belongs.
84
+ If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.
85
+ """
86
+ return pulumi.get(self, "project")
87
+
88
+ @project.setter
89
+ def project(self, value: Optional[pulumi.Input[str]]):
90
+ pulumi.set(self, "project", value)
91
+
92
+
93
+ @pulumi.input_type
94
+ class _SecurityGatewayIamPolicyState:
95
+ def __init__(__self__, *,
96
+ etag: Optional[pulumi.Input[str]] = None,
97
+ location: Optional[pulumi.Input[str]] = None,
98
+ policy_data: Optional[pulumi.Input[str]] = None,
99
+ project: Optional[pulumi.Input[str]] = None,
100
+ security_gateway_id: Optional[pulumi.Input[str]] = None):
101
+ """
102
+ Input properties used for looking up and filtering SecurityGatewayIamPolicy resources.
103
+ :param pulumi.Input[str] etag: (Computed) The etag of the IAM policy.
104
+ :param pulumi.Input[str] location: Resource ID segment making up resource `name`. It identifies the resource within its parent collection as described in https://google.aip.dev/122. Must be omitted or set to `global`. Used to find the parent resource to bind the IAM policy to. If not specified,
105
+ the value will be parsed from the identifier of the parent resource. If no location is provided in the parent identifier and no
106
+ location is specified, it is taken from the provider configuration.
107
+ :param pulumi.Input[str] policy_data: The policy data generated by
108
+ a `organizations_get_iam_policy` data source.
109
+ :param pulumi.Input[str] project: The ID of the project in which the resource belongs.
110
+ If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.
111
+ """
112
+ if etag is not None:
113
+ pulumi.set(__self__, "etag", etag)
114
+ if location is not None:
115
+ pulumi.set(__self__, "location", location)
116
+ if policy_data is not None:
117
+ pulumi.set(__self__, "policy_data", policy_data)
118
+ if project is not None:
119
+ pulumi.set(__self__, "project", project)
120
+ if security_gateway_id is not None:
121
+ pulumi.set(__self__, "security_gateway_id", security_gateway_id)
122
+
123
+ @property
124
+ @pulumi.getter
125
+ def etag(self) -> Optional[pulumi.Input[str]]:
126
+ """
127
+ (Computed) The etag of the IAM policy.
128
+ """
129
+ return pulumi.get(self, "etag")
130
+
131
+ @etag.setter
132
+ def etag(self, value: Optional[pulumi.Input[str]]):
133
+ pulumi.set(self, "etag", value)
134
+
135
+ @property
136
+ @pulumi.getter
137
+ def location(self) -> Optional[pulumi.Input[str]]:
138
+ """
139
+ Resource ID segment making up resource `name`. It identifies the resource within its parent collection as described in https://google.aip.dev/122. Must be omitted or set to `global`. Used to find the parent resource to bind the IAM policy to. If not specified,
140
+ the value will be parsed from the identifier of the parent resource. If no location is provided in the parent identifier and no
141
+ location is specified, it is taken from the provider configuration.
142
+ """
143
+ return pulumi.get(self, "location")
144
+
145
+ @location.setter
146
+ def location(self, value: Optional[pulumi.Input[str]]):
147
+ pulumi.set(self, "location", value)
148
+
149
+ @property
150
+ @pulumi.getter(name="policyData")
151
+ def policy_data(self) -> Optional[pulumi.Input[str]]:
152
+ """
153
+ The policy data generated by
154
+ a `organizations_get_iam_policy` data source.
155
+ """
156
+ return pulumi.get(self, "policy_data")
157
+
158
+ @policy_data.setter
159
+ def policy_data(self, value: Optional[pulumi.Input[str]]):
160
+ pulumi.set(self, "policy_data", value)
161
+
162
+ @property
163
+ @pulumi.getter
164
+ def project(self) -> Optional[pulumi.Input[str]]:
165
+ """
166
+ The ID of the project in which the resource belongs.
167
+ If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.
168
+ """
169
+ return pulumi.get(self, "project")
170
+
171
+ @project.setter
172
+ def project(self, value: Optional[pulumi.Input[str]]):
173
+ pulumi.set(self, "project", value)
174
+
175
+ @property
176
+ @pulumi.getter(name="securityGatewayId")
177
+ def security_gateway_id(self) -> Optional[pulumi.Input[str]]:
178
+ return pulumi.get(self, "security_gateway_id")
179
+
180
+ @security_gateway_id.setter
181
+ def security_gateway_id(self, value: Optional[pulumi.Input[str]]):
182
+ pulumi.set(self, "security_gateway_id", value)
183
+
184
+
185
+ class SecurityGatewayIamPolicy(pulumi.CustomResource):
186
+ @overload
187
+ def __init__(__self__,
188
+ resource_name: str,
189
+ opts: Optional[pulumi.ResourceOptions] = None,
190
+ location: Optional[pulumi.Input[str]] = None,
191
+ policy_data: Optional[pulumi.Input[str]] = None,
192
+ project: Optional[pulumi.Input[str]] = None,
193
+ security_gateway_id: Optional[pulumi.Input[str]] = None,
194
+ __props__=None):
195
+ """
196
+ Three different resources help you manage your IAM policy for BeyondCorp SecurityGateway. Each of these resources serves a different use case:
197
+
198
+ * `beyondcorp.SecurityGatewayIamPolicy`: Authoritative. Sets the IAM policy for the securitygateway and replaces any existing policy already attached.
199
+ * `beyondcorp.SecurityGatewayIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the securitygateway are preserved.
200
+ * `beyondcorp.SecurityGatewayIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the securitygateway are preserved.
201
+
202
+ A data source can be used to retrieve policy data in advent you do not need creation
203
+
204
+ * `beyondcorp.SecurityGatewayIamPolicy`: Retrieves the IAM policy for the securitygateway
205
+
206
+ > **Note:** `beyondcorp.SecurityGatewayIamPolicy` **cannot** be used in conjunction with `beyondcorp.SecurityGatewayIamBinding` and `beyondcorp.SecurityGatewayIamMember` or they will fight over what your policy should be.
207
+
208
+ > **Note:** `beyondcorp.SecurityGatewayIamBinding` resources **can be** used in conjunction with `beyondcorp.SecurityGatewayIamMember` resources **only if** they do not grant privilege to the same role.
209
+
210
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
211
+
212
+ ## beyondcorp.SecurityGatewayIamPolicy
213
+
214
+ ```python
215
+ import pulumi
216
+ import pulumi_gcp as gcp
217
+
218
+ admin = gcp.organizations.get_iam_policy(bindings=[{
219
+ "role": "roles/beyondcorp.securityGatewayUser",
220
+ "members": ["user:jane@example.com"],
221
+ }])
222
+ policy = gcp.beyondcorp.SecurityGatewayIamPolicy("policy",
223
+ project=example["project"],
224
+ location=example["location"],
225
+ security_gateway_id=example["securityGatewayId"],
226
+ policy_data=admin.policy_data)
227
+ ```
228
+
229
+ With IAM Conditions:
230
+
231
+ ```python
232
+ import pulumi
233
+ import pulumi_gcp as gcp
234
+
235
+ admin = gcp.organizations.get_iam_policy(bindings=[{
236
+ "role": "roles/beyondcorp.securityGatewayUser",
237
+ "members": ["user:jane@example.com"],
238
+ "condition": {
239
+ "title": "expires_after_2019_12_31",
240
+ "description": "Expiring at midnight of 2019-12-31",
241
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
242
+ },
243
+ }])
244
+ policy = gcp.beyondcorp.SecurityGatewayIamPolicy("policy",
245
+ project=example["project"],
246
+ location=example["location"],
247
+ security_gateway_id=example["securityGatewayId"],
248
+ policy_data=admin.policy_data)
249
+ ```
250
+ ## beyondcorp.SecurityGatewayIamBinding
251
+
252
+ ```python
253
+ import pulumi
254
+ import pulumi_gcp as gcp
255
+
256
+ binding = gcp.beyondcorp.SecurityGatewayIamBinding("binding",
257
+ project=example["project"],
258
+ location=example["location"],
259
+ security_gateway_id=example["securityGatewayId"],
260
+ role="roles/beyondcorp.securityGatewayUser",
261
+ members=["user:jane@example.com"])
262
+ ```
263
+
264
+ With IAM Conditions:
265
+
266
+ ```python
267
+ import pulumi
268
+ import pulumi_gcp as gcp
269
+
270
+ binding = gcp.beyondcorp.SecurityGatewayIamBinding("binding",
271
+ project=example["project"],
272
+ location=example["location"],
273
+ security_gateway_id=example["securityGatewayId"],
274
+ role="roles/beyondcorp.securityGatewayUser",
275
+ members=["user:jane@example.com"],
276
+ condition={
277
+ "title": "expires_after_2019_12_31",
278
+ "description": "Expiring at midnight of 2019-12-31",
279
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
280
+ })
281
+ ```
282
+ ## beyondcorp.SecurityGatewayIamMember
283
+
284
+ ```python
285
+ import pulumi
286
+ import pulumi_gcp as gcp
287
+
288
+ member = gcp.beyondcorp.SecurityGatewayIamMember("member",
289
+ project=example["project"],
290
+ location=example["location"],
291
+ security_gateway_id=example["securityGatewayId"],
292
+ role="roles/beyondcorp.securityGatewayUser",
293
+ member="user:jane@example.com")
294
+ ```
295
+
296
+ With IAM Conditions:
297
+
298
+ ```python
299
+ import pulumi
300
+ import pulumi_gcp as gcp
301
+
302
+ member = gcp.beyondcorp.SecurityGatewayIamMember("member",
303
+ project=example["project"],
304
+ location=example["location"],
305
+ security_gateway_id=example["securityGatewayId"],
306
+ role="roles/beyondcorp.securityGatewayUser",
307
+ member="user:jane@example.com",
308
+ condition={
309
+ "title": "expires_after_2019_12_31",
310
+ "description": "Expiring at midnight of 2019-12-31",
311
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
312
+ })
313
+ ```
314
+
315
+ ## This resource supports User Project Overrides.
316
+
317
+ -
318
+
319
+ # IAM policy for BeyondCorp SecurityGateway
320
+ Three different resources help you manage your IAM policy for BeyondCorp SecurityGateway. Each of these resources serves a different use case:
321
+
322
+ * `beyondcorp.SecurityGatewayIamPolicy`: Authoritative. Sets the IAM policy for the securitygateway and replaces any existing policy already attached.
323
+ * `beyondcorp.SecurityGatewayIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the securitygateway are preserved.
324
+ * `beyondcorp.SecurityGatewayIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the securitygateway are preserved.
325
+
326
+ A data source can be used to retrieve policy data in advent you do not need creation
327
+
328
+ * `beyondcorp.SecurityGatewayIamPolicy`: Retrieves the IAM policy for the securitygateway
329
+
330
+ > **Note:** `beyondcorp.SecurityGatewayIamPolicy` **cannot** be used in conjunction with `beyondcorp.SecurityGatewayIamBinding` and `beyondcorp.SecurityGatewayIamMember` or they will fight over what your policy should be.
331
+
332
+ > **Note:** `beyondcorp.SecurityGatewayIamBinding` resources **can be** used in conjunction with `beyondcorp.SecurityGatewayIamMember` resources **only if** they do not grant privilege to the same role.
333
+
334
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
335
+
336
+ ## beyondcorp.SecurityGatewayIamPolicy
337
+
338
+ ```python
339
+ import pulumi
340
+ import pulumi_gcp as gcp
341
+
342
+ admin = gcp.organizations.get_iam_policy(bindings=[{
343
+ "role": "roles/beyondcorp.securityGatewayUser",
344
+ "members": ["user:jane@example.com"],
345
+ }])
346
+ policy = gcp.beyondcorp.SecurityGatewayIamPolicy("policy",
347
+ project=example["project"],
348
+ location=example["location"],
349
+ security_gateway_id=example["securityGatewayId"],
350
+ policy_data=admin.policy_data)
351
+ ```
352
+
353
+ With IAM Conditions:
354
+
355
+ ```python
356
+ import pulumi
357
+ import pulumi_gcp as gcp
358
+
359
+ admin = gcp.organizations.get_iam_policy(bindings=[{
360
+ "role": "roles/beyondcorp.securityGatewayUser",
361
+ "members": ["user:jane@example.com"],
362
+ "condition": {
363
+ "title": "expires_after_2019_12_31",
364
+ "description": "Expiring at midnight of 2019-12-31",
365
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
366
+ },
367
+ }])
368
+ policy = gcp.beyondcorp.SecurityGatewayIamPolicy("policy",
369
+ project=example["project"],
370
+ location=example["location"],
371
+ security_gateway_id=example["securityGatewayId"],
372
+ policy_data=admin.policy_data)
373
+ ```
374
+ ## beyondcorp.SecurityGatewayIamBinding
375
+
376
+ ```python
377
+ import pulumi
378
+ import pulumi_gcp as gcp
379
+
380
+ binding = gcp.beyondcorp.SecurityGatewayIamBinding("binding",
381
+ project=example["project"],
382
+ location=example["location"],
383
+ security_gateway_id=example["securityGatewayId"],
384
+ role="roles/beyondcorp.securityGatewayUser",
385
+ members=["user:jane@example.com"])
386
+ ```
387
+
388
+ With IAM Conditions:
389
+
390
+ ```python
391
+ import pulumi
392
+ import pulumi_gcp as gcp
393
+
394
+ binding = gcp.beyondcorp.SecurityGatewayIamBinding("binding",
395
+ project=example["project"],
396
+ location=example["location"],
397
+ security_gateway_id=example["securityGatewayId"],
398
+ role="roles/beyondcorp.securityGatewayUser",
399
+ members=["user:jane@example.com"],
400
+ condition={
401
+ "title": "expires_after_2019_12_31",
402
+ "description": "Expiring at midnight of 2019-12-31",
403
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
404
+ })
405
+ ```
406
+ ## beyondcorp.SecurityGatewayIamMember
407
+
408
+ ```python
409
+ import pulumi
410
+ import pulumi_gcp as gcp
411
+
412
+ member = gcp.beyondcorp.SecurityGatewayIamMember("member",
413
+ project=example["project"],
414
+ location=example["location"],
415
+ security_gateway_id=example["securityGatewayId"],
416
+ role="roles/beyondcorp.securityGatewayUser",
417
+ member="user:jane@example.com")
418
+ ```
419
+
420
+ With IAM Conditions:
421
+
422
+ ```python
423
+ import pulumi
424
+ import pulumi_gcp as gcp
425
+
426
+ member = gcp.beyondcorp.SecurityGatewayIamMember("member",
427
+ project=example["project"],
428
+ location=example["location"],
429
+ security_gateway_id=example["securityGatewayId"],
430
+ role="roles/beyondcorp.securityGatewayUser",
431
+ member="user:jane@example.com",
432
+ condition={
433
+ "title": "expires_after_2019_12_31",
434
+ "description": "Expiring at midnight of 2019-12-31",
435
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
436
+ })
437
+ ```
438
+
439
+ ## Import
440
+
441
+ For all import syntaxes, the "resource in question" can take any of the following forms:
442
+
443
+ * projects/{{project}}/locations/{{location}}/securityGateways/{{security_gateway_id}}
444
+
445
+ * {{project}}/{{location}}/{{security_gateway_id}}
446
+
447
+ * {{location}}/{{security_gateway_id}}
448
+
449
+ * {{security_gateway_id}}
450
+
451
+ Any variables not passed in the import command will be taken from the provider configuration.
452
+
453
+ BeyondCorp securitygateway IAM resources can be imported using the resource identifiers, role, and member.
454
+
455
+ IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
456
+
457
+ ```sh
458
+ $ pulumi import gcp:beyondcorp/securityGatewayIamPolicy:SecurityGatewayIamPolicy editor "projects/{{project}}/locations/{{location}}/securityGateways/{{security_gateway_id}} roles/beyondcorp.securityGatewayUser user:jane@example.com"
459
+ ```
460
+
461
+ IAM binding imports use space-delimited identifiers: the resource in question and the role, e.g.
462
+
463
+ ```sh
464
+ $ pulumi import gcp:beyondcorp/securityGatewayIamPolicy:SecurityGatewayIamPolicy editor "projects/{{project}}/locations/{{location}}/securityGateways/{{security_gateway_id}} roles/beyondcorp.securityGatewayUser"
465
+ ```
466
+
467
+ IAM policy imports use the identifier of the resource in question, e.g.
468
+
469
+ ```sh
470
+ $ pulumi import gcp:beyondcorp/securityGatewayIamPolicy:SecurityGatewayIamPolicy editor projects/{{project}}/locations/{{location}}/securityGateways/{{security_gateway_id}}
471
+ ```
472
+
473
+ -> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
474
+
475
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
476
+
477
+ :param str resource_name: The name of the resource.
478
+ :param pulumi.ResourceOptions opts: Options for the resource.
479
+ :param pulumi.Input[str] location: Resource ID segment making up resource `name`. It identifies the resource within its parent collection as described in https://google.aip.dev/122. Must be omitted or set to `global`. Used to find the parent resource to bind the IAM policy to. If not specified,
480
+ the value will be parsed from the identifier of the parent resource. If no location is provided in the parent identifier and no
481
+ location is specified, it is taken from the provider configuration.
482
+ :param pulumi.Input[str] policy_data: The policy data generated by
483
+ a `organizations_get_iam_policy` data source.
484
+ :param pulumi.Input[str] project: The ID of the project in which the resource belongs.
485
+ If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.
486
+ """
487
+ ...
488
+ @overload
489
+ def __init__(__self__,
490
+ resource_name: str,
491
+ args: SecurityGatewayIamPolicyArgs,
492
+ opts: Optional[pulumi.ResourceOptions] = None):
493
+ """
494
+ Three different resources help you manage your IAM policy for BeyondCorp SecurityGateway. Each of these resources serves a different use case:
495
+
496
+ * `beyondcorp.SecurityGatewayIamPolicy`: Authoritative. Sets the IAM policy for the securitygateway and replaces any existing policy already attached.
497
+ * `beyondcorp.SecurityGatewayIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the securitygateway are preserved.
498
+ * `beyondcorp.SecurityGatewayIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the securitygateway are preserved.
499
+
500
+ A data source can be used to retrieve policy data in advent you do not need creation
501
+
502
+ * `beyondcorp.SecurityGatewayIamPolicy`: Retrieves the IAM policy for the securitygateway
503
+
504
+ > **Note:** `beyondcorp.SecurityGatewayIamPolicy` **cannot** be used in conjunction with `beyondcorp.SecurityGatewayIamBinding` and `beyondcorp.SecurityGatewayIamMember` or they will fight over what your policy should be.
505
+
506
+ > **Note:** `beyondcorp.SecurityGatewayIamBinding` resources **can be** used in conjunction with `beyondcorp.SecurityGatewayIamMember` resources **only if** they do not grant privilege to the same role.
507
+
508
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
509
+
510
+ ## beyondcorp.SecurityGatewayIamPolicy
511
+
512
+ ```python
513
+ import pulumi
514
+ import pulumi_gcp as gcp
515
+
516
+ admin = gcp.organizations.get_iam_policy(bindings=[{
517
+ "role": "roles/beyondcorp.securityGatewayUser",
518
+ "members": ["user:jane@example.com"],
519
+ }])
520
+ policy = gcp.beyondcorp.SecurityGatewayIamPolicy("policy",
521
+ project=example["project"],
522
+ location=example["location"],
523
+ security_gateway_id=example["securityGatewayId"],
524
+ policy_data=admin.policy_data)
525
+ ```
526
+
527
+ With IAM Conditions:
528
+
529
+ ```python
530
+ import pulumi
531
+ import pulumi_gcp as gcp
532
+
533
+ admin = gcp.organizations.get_iam_policy(bindings=[{
534
+ "role": "roles/beyondcorp.securityGatewayUser",
535
+ "members": ["user:jane@example.com"],
536
+ "condition": {
537
+ "title": "expires_after_2019_12_31",
538
+ "description": "Expiring at midnight of 2019-12-31",
539
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
540
+ },
541
+ }])
542
+ policy = gcp.beyondcorp.SecurityGatewayIamPolicy("policy",
543
+ project=example["project"],
544
+ location=example["location"],
545
+ security_gateway_id=example["securityGatewayId"],
546
+ policy_data=admin.policy_data)
547
+ ```
548
+ ## beyondcorp.SecurityGatewayIamBinding
549
+
550
+ ```python
551
+ import pulumi
552
+ import pulumi_gcp as gcp
553
+
554
+ binding = gcp.beyondcorp.SecurityGatewayIamBinding("binding",
555
+ project=example["project"],
556
+ location=example["location"],
557
+ security_gateway_id=example["securityGatewayId"],
558
+ role="roles/beyondcorp.securityGatewayUser",
559
+ members=["user:jane@example.com"])
560
+ ```
561
+
562
+ With IAM Conditions:
563
+
564
+ ```python
565
+ import pulumi
566
+ import pulumi_gcp as gcp
567
+
568
+ binding = gcp.beyondcorp.SecurityGatewayIamBinding("binding",
569
+ project=example["project"],
570
+ location=example["location"],
571
+ security_gateway_id=example["securityGatewayId"],
572
+ role="roles/beyondcorp.securityGatewayUser",
573
+ members=["user:jane@example.com"],
574
+ condition={
575
+ "title": "expires_after_2019_12_31",
576
+ "description": "Expiring at midnight of 2019-12-31",
577
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
578
+ })
579
+ ```
580
+ ## beyondcorp.SecurityGatewayIamMember
581
+
582
+ ```python
583
+ import pulumi
584
+ import pulumi_gcp as gcp
585
+
586
+ member = gcp.beyondcorp.SecurityGatewayIamMember("member",
587
+ project=example["project"],
588
+ location=example["location"],
589
+ security_gateway_id=example["securityGatewayId"],
590
+ role="roles/beyondcorp.securityGatewayUser",
591
+ member="user:jane@example.com")
592
+ ```
593
+
594
+ With IAM Conditions:
595
+
596
+ ```python
597
+ import pulumi
598
+ import pulumi_gcp as gcp
599
+
600
+ member = gcp.beyondcorp.SecurityGatewayIamMember("member",
601
+ project=example["project"],
602
+ location=example["location"],
603
+ security_gateway_id=example["securityGatewayId"],
604
+ role="roles/beyondcorp.securityGatewayUser",
605
+ member="user:jane@example.com",
606
+ condition={
607
+ "title": "expires_after_2019_12_31",
608
+ "description": "Expiring at midnight of 2019-12-31",
609
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
610
+ })
611
+ ```
612
+
613
+ ## This resource supports User Project Overrides.
614
+
615
+ -
616
+
617
+ # IAM policy for BeyondCorp SecurityGateway
618
+ Three different resources help you manage your IAM policy for BeyondCorp SecurityGateway. Each of these resources serves a different use case:
619
+
620
+ * `beyondcorp.SecurityGatewayIamPolicy`: Authoritative. Sets the IAM policy for the securitygateway and replaces any existing policy already attached.
621
+ * `beyondcorp.SecurityGatewayIamBinding`: Authoritative for a given role. Updates the IAM policy to grant a role to a list of members. Other roles within the IAM policy for the securitygateway are preserved.
622
+ * `beyondcorp.SecurityGatewayIamMember`: Non-authoritative. Updates the IAM policy to grant a role to a new member. Other members for the role for the securitygateway are preserved.
623
+
624
+ A data source can be used to retrieve policy data in advent you do not need creation
625
+
626
+ * `beyondcorp.SecurityGatewayIamPolicy`: Retrieves the IAM policy for the securitygateway
627
+
628
+ > **Note:** `beyondcorp.SecurityGatewayIamPolicy` **cannot** be used in conjunction with `beyondcorp.SecurityGatewayIamBinding` and `beyondcorp.SecurityGatewayIamMember` or they will fight over what your policy should be.
629
+
630
+ > **Note:** `beyondcorp.SecurityGatewayIamBinding` resources **can be** used in conjunction with `beyondcorp.SecurityGatewayIamMember` resources **only if** they do not grant privilege to the same role.
631
+
632
+ > **Note:** This resource supports IAM Conditions but they have some known limitations which can be found [here](https://cloud.google.com/iam/docs/conditions-overview#limitations). Please review this article if you are having issues with IAM Conditions.
633
+
634
+ ## beyondcorp.SecurityGatewayIamPolicy
635
+
636
+ ```python
637
+ import pulumi
638
+ import pulumi_gcp as gcp
639
+
640
+ admin = gcp.organizations.get_iam_policy(bindings=[{
641
+ "role": "roles/beyondcorp.securityGatewayUser",
642
+ "members": ["user:jane@example.com"],
643
+ }])
644
+ policy = gcp.beyondcorp.SecurityGatewayIamPolicy("policy",
645
+ project=example["project"],
646
+ location=example["location"],
647
+ security_gateway_id=example["securityGatewayId"],
648
+ policy_data=admin.policy_data)
649
+ ```
650
+
651
+ With IAM Conditions:
652
+
653
+ ```python
654
+ import pulumi
655
+ import pulumi_gcp as gcp
656
+
657
+ admin = gcp.organizations.get_iam_policy(bindings=[{
658
+ "role": "roles/beyondcorp.securityGatewayUser",
659
+ "members": ["user:jane@example.com"],
660
+ "condition": {
661
+ "title": "expires_after_2019_12_31",
662
+ "description": "Expiring at midnight of 2019-12-31",
663
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
664
+ },
665
+ }])
666
+ policy = gcp.beyondcorp.SecurityGatewayIamPolicy("policy",
667
+ project=example["project"],
668
+ location=example["location"],
669
+ security_gateway_id=example["securityGatewayId"],
670
+ policy_data=admin.policy_data)
671
+ ```
672
+ ## beyondcorp.SecurityGatewayIamBinding
673
+
674
+ ```python
675
+ import pulumi
676
+ import pulumi_gcp as gcp
677
+
678
+ binding = gcp.beyondcorp.SecurityGatewayIamBinding("binding",
679
+ project=example["project"],
680
+ location=example["location"],
681
+ security_gateway_id=example["securityGatewayId"],
682
+ role="roles/beyondcorp.securityGatewayUser",
683
+ members=["user:jane@example.com"])
684
+ ```
685
+
686
+ With IAM Conditions:
687
+
688
+ ```python
689
+ import pulumi
690
+ import pulumi_gcp as gcp
691
+
692
+ binding = gcp.beyondcorp.SecurityGatewayIamBinding("binding",
693
+ project=example["project"],
694
+ location=example["location"],
695
+ security_gateway_id=example["securityGatewayId"],
696
+ role="roles/beyondcorp.securityGatewayUser",
697
+ members=["user:jane@example.com"],
698
+ condition={
699
+ "title": "expires_after_2019_12_31",
700
+ "description": "Expiring at midnight of 2019-12-31",
701
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
702
+ })
703
+ ```
704
+ ## beyondcorp.SecurityGatewayIamMember
705
+
706
+ ```python
707
+ import pulumi
708
+ import pulumi_gcp as gcp
709
+
710
+ member = gcp.beyondcorp.SecurityGatewayIamMember("member",
711
+ project=example["project"],
712
+ location=example["location"],
713
+ security_gateway_id=example["securityGatewayId"],
714
+ role="roles/beyondcorp.securityGatewayUser",
715
+ member="user:jane@example.com")
716
+ ```
717
+
718
+ With IAM Conditions:
719
+
720
+ ```python
721
+ import pulumi
722
+ import pulumi_gcp as gcp
723
+
724
+ member = gcp.beyondcorp.SecurityGatewayIamMember("member",
725
+ project=example["project"],
726
+ location=example["location"],
727
+ security_gateway_id=example["securityGatewayId"],
728
+ role="roles/beyondcorp.securityGatewayUser",
729
+ member="user:jane@example.com",
730
+ condition={
731
+ "title": "expires_after_2019_12_31",
732
+ "description": "Expiring at midnight of 2019-12-31",
733
+ "expression": "request.time < timestamp(\\"2020-01-01T00:00:00Z\\")",
734
+ })
735
+ ```
736
+
737
+ ## Import
738
+
739
+ For all import syntaxes, the "resource in question" can take any of the following forms:
740
+
741
+ * projects/{{project}}/locations/{{location}}/securityGateways/{{security_gateway_id}}
742
+
743
+ * {{project}}/{{location}}/{{security_gateway_id}}
744
+
745
+ * {{location}}/{{security_gateway_id}}
746
+
747
+ * {{security_gateway_id}}
748
+
749
+ Any variables not passed in the import command will be taken from the provider configuration.
750
+
751
+ BeyondCorp securitygateway IAM resources can be imported using the resource identifiers, role, and member.
752
+
753
+ IAM member imports use space-delimited identifiers: the resource in question, the role, and the member identity, e.g.
754
+
755
+ ```sh
756
+ $ pulumi import gcp:beyondcorp/securityGatewayIamPolicy:SecurityGatewayIamPolicy editor "projects/{{project}}/locations/{{location}}/securityGateways/{{security_gateway_id}} roles/beyondcorp.securityGatewayUser user:jane@example.com"
757
+ ```
758
+
759
+ IAM binding imports use space-delimited identifiers: the resource in question and the role, e.g.
760
+
761
+ ```sh
762
+ $ pulumi import gcp:beyondcorp/securityGatewayIamPolicy:SecurityGatewayIamPolicy editor "projects/{{project}}/locations/{{location}}/securityGateways/{{security_gateway_id}} roles/beyondcorp.securityGatewayUser"
763
+ ```
764
+
765
+ IAM policy imports use the identifier of the resource in question, e.g.
766
+
767
+ ```sh
768
+ $ pulumi import gcp:beyondcorp/securityGatewayIamPolicy:SecurityGatewayIamPolicy editor projects/{{project}}/locations/{{location}}/securityGateways/{{security_gateway_id}}
769
+ ```
770
+
771
+ -> **Custom Roles** If you're importing a IAM resource with a custom role, make sure to use the
772
+
773
+ full name of the custom role, e.g. `[projects/my-project|organizations/my-org]/roles/my-custom-role`.
774
+
775
+ :param str resource_name: The name of the resource.
776
+ :param SecurityGatewayIamPolicyArgs args: The arguments to use to populate this resource's properties.
777
+ :param pulumi.ResourceOptions opts: Options for the resource.
778
+ """
779
+ ...
780
+ def __init__(__self__, resource_name: str, *args, **kwargs):
781
+ resource_args, opts = _utilities.get_resource_args_opts(SecurityGatewayIamPolicyArgs, pulumi.ResourceOptions, *args, **kwargs)
782
+ if resource_args is not None:
783
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
784
+ else:
785
+ __self__._internal_init(resource_name, *args, **kwargs)
786
+
787
+ def _internal_init(__self__,
788
+ resource_name: str,
789
+ opts: Optional[pulumi.ResourceOptions] = None,
790
+ location: Optional[pulumi.Input[str]] = None,
791
+ policy_data: Optional[pulumi.Input[str]] = None,
792
+ project: Optional[pulumi.Input[str]] = None,
793
+ security_gateway_id: Optional[pulumi.Input[str]] = None,
794
+ __props__=None):
795
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
796
+ if not isinstance(opts, pulumi.ResourceOptions):
797
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
798
+ if opts.id is None:
799
+ if __props__ is not None:
800
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
801
+ __props__ = SecurityGatewayIamPolicyArgs.__new__(SecurityGatewayIamPolicyArgs)
802
+
803
+ __props__.__dict__["location"] = location
804
+ if policy_data is None and not opts.urn:
805
+ raise TypeError("Missing required property 'policy_data'")
806
+ __props__.__dict__["policy_data"] = policy_data
807
+ __props__.__dict__["project"] = project
808
+ if security_gateway_id is None and not opts.urn:
809
+ raise TypeError("Missing required property 'security_gateway_id'")
810
+ __props__.__dict__["security_gateway_id"] = security_gateway_id
811
+ __props__.__dict__["etag"] = None
812
+ super(SecurityGatewayIamPolicy, __self__).__init__(
813
+ 'gcp:beyondcorp/securityGatewayIamPolicy:SecurityGatewayIamPolicy',
814
+ resource_name,
815
+ __props__,
816
+ opts)
817
+
818
+ @staticmethod
819
+ def get(resource_name: str,
820
+ id: pulumi.Input[str],
821
+ opts: Optional[pulumi.ResourceOptions] = None,
822
+ etag: Optional[pulumi.Input[str]] = None,
823
+ location: Optional[pulumi.Input[str]] = None,
824
+ policy_data: Optional[pulumi.Input[str]] = None,
825
+ project: Optional[pulumi.Input[str]] = None,
826
+ security_gateway_id: Optional[pulumi.Input[str]] = None) -> 'SecurityGatewayIamPolicy':
827
+ """
828
+ Get an existing SecurityGatewayIamPolicy resource's state with the given name, id, and optional extra
829
+ properties used to qualify the lookup.
830
+
831
+ :param str resource_name: The unique name of the resulting resource.
832
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
833
+ :param pulumi.ResourceOptions opts: Options for the resource.
834
+ :param pulumi.Input[str] etag: (Computed) The etag of the IAM policy.
835
+ :param pulumi.Input[str] location: Resource ID segment making up resource `name`. It identifies the resource within its parent collection as described in https://google.aip.dev/122. Must be omitted or set to `global`. Used to find the parent resource to bind the IAM policy to. If not specified,
836
+ the value will be parsed from the identifier of the parent resource. If no location is provided in the parent identifier and no
837
+ location is specified, it is taken from the provider configuration.
838
+ :param pulumi.Input[str] policy_data: The policy data generated by
839
+ a `organizations_get_iam_policy` data source.
840
+ :param pulumi.Input[str] project: The ID of the project in which the resource belongs.
841
+ If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.
842
+ """
843
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
844
+
845
+ __props__ = _SecurityGatewayIamPolicyState.__new__(_SecurityGatewayIamPolicyState)
846
+
847
+ __props__.__dict__["etag"] = etag
848
+ __props__.__dict__["location"] = location
849
+ __props__.__dict__["policy_data"] = policy_data
850
+ __props__.__dict__["project"] = project
851
+ __props__.__dict__["security_gateway_id"] = security_gateway_id
852
+ return SecurityGatewayIamPolicy(resource_name, opts=opts, __props__=__props__)
853
+
854
+ @property
855
+ @pulumi.getter
856
+ def etag(self) -> pulumi.Output[str]:
857
+ """
858
+ (Computed) The etag of the IAM policy.
859
+ """
860
+ return pulumi.get(self, "etag")
861
+
862
+ @property
863
+ @pulumi.getter
864
+ def location(self) -> pulumi.Output[str]:
865
+ """
866
+ Resource ID segment making up resource `name`. It identifies the resource within its parent collection as described in https://google.aip.dev/122. Must be omitted or set to `global`. Used to find the parent resource to bind the IAM policy to. If not specified,
867
+ the value will be parsed from the identifier of the parent resource. If no location is provided in the parent identifier and no
868
+ location is specified, it is taken from the provider configuration.
869
+ """
870
+ return pulumi.get(self, "location")
871
+
872
+ @property
873
+ @pulumi.getter(name="policyData")
874
+ def policy_data(self) -> pulumi.Output[str]:
875
+ """
876
+ The policy data generated by
877
+ a `organizations_get_iam_policy` data source.
878
+ """
879
+ return pulumi.get(self, "policy_data")
880
+
881
+ @property
882
+ @pulumi.getter
883
+ def project(self) -> pulumi.Output[str]:
884
+ """
885
+ The ID of the project in which the resource belongs.
886
+ If it is not provided, the project will be parsed from the identifier of the parent resource. If no project is provided in the parent identifier and no project is specified, the provider project is used.
887
+ """
888
+ return pulumi.get(self, "project")
889
+
890
+ @property
891
+ @pulumi.getter(name="securityGatewayId")
892
+ def security_gateway_id(self) -> pulumi.Output[str]:
893
+ return pulumi.get(self, "security_gateway_id")
894
+